Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp4341936rwb; Tue, 20 Sep 2022 12:23:00 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7FkoWL7I4DpJEaWODdA5nctpQSCapPOVhtNBe6Q9H+0xJc9uErtomBLUY57lzNnjmSPn4G X-Received: by 2002:a17:902:e851:b0:178:2989:e26e with SMTP id t17-20020a170902e85100b001782989e26emr1106254plg.83.1663701779845; Tue, 20 Sep 2022 12:22:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663701779; cv=none; d=google.com; s=arc-20160816; b=H+Y6ZbG1BPhFpUXLiS1/M6A8C+kuMlpwIjTAZ+XWejcT/FEmr8xBAmDedQFFpE/w4E RqyL19dp0K1x5HkuVwiVhAh3qoyZOT+YIoetMc5LiZZjUE77Bpgcm/PLkJ7P1oxoUosD rb2CaPnhvXWOfGid06eIuWNM29bff4hOOE7eQbHSKWx/l4gZ3d9L5URfLa0a+QE58gDO uT4U90h8ZjAQPXK9nK8OfGxUqD/hm1BAznM8zOBftF1IW18YTVeirkG4ySb/sThpEX8B i/Md9OdNpsBOsngSHXiJbH9shx+nJrYuV8pNTALpUOCeMwZ4pgDYXTyfZbiUE7RbuWiF uVDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=vhcZzgEgF161dV3JAs/7wiPgpLh5ucK8PQ1AhMND7Wk=; b=WHTpRs5mTth/CO93hnUn4qECq9iYxAg/lBmkLPb7fKYTm+hlO+eyDWq8I2FZh2JrUy SHlsR8BJsOsuKaybYUJ5+BmImXs1KLrF7oDrYhpu3L9QUIFeL+rPPXDcjmUppAKC/2tk SVUvhkQnWtRMsGITXV3CtDAqI/enndoQkQLkFOKw6jthsaMj+x8kAtV9chUp5hrAJCcn t1R9uGB7ieFBALsBO6n1Syd6VJQuobfydG2hWVmCRwkaKq30MU84RjVgfzNAWZGwBPB5 qhXv31ZKwf6e+b8t0RASBzggew/0jQxzlrI81CDfCWPefx8ry677xRULUWrE3gzk0+Kh nNUA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=rY1HK3uJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d7-20020a056a0010c700b00535c451053esi545514pfu.296.2022.09.20.12.22.48; Tue, 20 Sep 2022 12:22:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=rY1HK3uJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229630AbiITTKY (ORCPT + 99 others); Tue, 20 Sep 2022 15:10:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53398 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229647AbiITTKV (ORCPT ); Tue, 20 Sep 2022 15:10:21 -0400 Received: from mail-wm1-x32e.google.com (mail-wm1-x32e.google.com [IPv6:2a00:1450:4864:20::32e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D6F562A273 for ; Tue, 20 Sep 2022 12:10:20 -0700 (PDT) Received: by mail-wm1-x32e.google.com with SMTP id n8so2794912wmr.5 for ; Tue, 20 Sep 2022 12:10:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=vhcZzgEgF161dV3JAs/7wiPgpLh5ucK8PQ1AhMND7Wk=; b=rY1HK3uJjfj2GdveigAJaHAIvNjngvON3srR39Y7URQ5VrSPuVK2+OL+P1leo7oifp 8mH6IEmU5/pSmHl3+nIG5/NKAbpvbMEKvahuQd7kzY8kOJFuZXzydRIUbp01/FXOXmTO v09Ja0htbn82UV8KqclijMQgPcAcOpgzEldfL1tFIhnjXR8TKuROgz/ylILhEOi9m4dU 6jyrbSOR0xR+JdlkjhSqouRZQUHs18haHauvkJbxDZPTu52OPy2+KcmgA9AcMRvOTo13 guJqDVErDp+7aWIsht+9yYFtlir2/WGbzfB6GHiJc7tY3ztIEyoQ1mc6mCLkp5cPf+DW nKkQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=vhcZzgEgF161dV3JAs/7wiPgpLh5ucK8PQ1AhMND7Wk=; b=IjCfonBCwvqpZuz11HEj8Zk0RupKs3IRh5FpxY5J2Tb5yX9unC04dmk8Lq4XLRwrE4 h7hkN3RdjOinVcTEbD5xenRhozq/t6JkHCvy56xZNZZyf+PW4sOahHkdFEq8Td0CB4IP Uzz72MHkk1Zjhv3ENZkInm4WLS8yztNxkUsjJ81LRWrLkh1W6VjnQMJFQsgfaBrLzdB/ vrZbjFNAkEDP8hvl28gRpjDSkNBgMvO7YbeELIgMxn9cjYDDGqycRsV4mO63KvGmuP6R zF7Noc2efW5lfyVr9lgiChn2nqrHcRAHE0d+uvGuLxOFA4ALWrdULZClLYw1UElWLn+j x4qQ== X-Gm-Message-State: ACrzQf3oRzBGPMYTMxCJtIf/He+pVcwVmKqsJiCTwu0qDFZFW/SioWGV qGqkwPb5msCU2V61QcjK+ClmRpv8HDf6MvGBsit9Yg== X-Received: by 2002:a05:600c:1d11:b0:3b4:7644:b788 with SMTP id l17-20020a05600c1d1100b003b47644b788mr3742800wms.114.1663701019260; Tue, 20 Sep 2022 12:10:19 -0700 (PDT) MIME-Version: 1.0 References: <576182d194e27531e8090bad809e4136953895f4.1663700262.git.andreyknvl@google.com> In-Reply-To: <576182d194e27531e8090bad809e4136953895f4.1663700262.git.andreyknvl@google.com> From: Marco Elver Date: Tue, 20 Sep 2022 21:09:42 +0200 Message-ID: Subject: Re: [PATCH mm] kasan: initialize read-write lock in stack ring To: andrey.konovalov@linux.dev Cc: Andrew Morton , Andrey Konovalov , Alexander Potapenko , Dmitry Vyukov , Andrey Ryabinin , kasan-dev@googlegroups.com, linux-mm@kvack.org, Yu Zhao , linux-kernel@vger.kernel.org, Andrey Konovalov Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 20 Sept 2022 at 20:58, wrote: > > From: Andrey Konovalov > > Use __RW_LOCK_UNLOCKED to initialize stack_ring.lock. > > Reported-by: Yu Zhao > Signed-off-by: Andrey Konovalov > > --- > > Andrew, could you please fold this patch into: > "kasan: implement stack ring for tag-based modes". > --- > mm/kasan/tags.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/mm/kasan/tags.c b/mm/kasan/tags.c > index 9d867cae1b7b..67a222586846 100644 > --- a/mm/kasan/tags.c > +++ b/mm/kasan/tags.c > @@ -36,7 +36,9 @@ DEFINE_STATIC_KEY_TRUE(kasan_flag_stacktrace); > /* Non-zero, as initial pointer values are 0. */ > #define STACK_RING_BUSY_PTR ((void *)1) > > -struct kasan_stack_ring stack_ring; > +struct kasan_stack_ring stack_ring = { > + .lock = __RW_LOCK_UNLOCKED(stack_ring.lock) > +}; Reviewed-by: Marco Elver > /* kasan.stacktrace=off/on */ > static int __init early_kasan_flag_stacktrace(char *arg) > -- > 2.25.1 >