From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A553C63C3 for ; Sat, 13 Jan 2024 09:31:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="W8NCNXA4" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1705138270; x=1736674270; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=SjTM9ZlVdC+zj2d9f7k7IlQgeOjiVf2LBGRGd/ifRbk=; b=W8NCNXA4TU5t2pLwkBNUXTYgZO2qkYVhzL2k5LYXoRYzGoMLkodETBjg CvRBv5i9cyte+wMY4HKOxsHIFnO6Jw4A8sXAx+aOhgptoVP6apjP64n5a X4+QJvtESYU93gvY3CX1Zwcc4tmLEa7TjpCYKhSknVOCANiOMjn5M/1qb R91EIaFBYQYei/eTGzJmZUEoRuMPF01K10lPzLsepKTRxEvAyroCFQ9J7 M1hJ9rD8Syy6twBB3K13PnIUkJ7neijIO1K91HPQE2Q4wEEsePDw+TPHz ca+uSOGEddxCc+gnxOFd6w95jt2YDzlOw7y83Dmn05dPtDR9in2wMUCxV A==; X-IronPort-AV: E=McAfee;i="6600,9927,10951"; a="463646410" X-IronPort-AV: E=Sophos;i="6.04,192,1695711600"; d="scan'208";a="463646410" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Jan 2024 01:31:09 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10951"; a="956337463" X-IronPort-AV: E=Sophos;i="6.04,192,1695711600"; d="scan'208";a="956337463" Received: from tassilo.jf.intel.com (HELO tassilo) ([10.54.38.190]) by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Jan 2024 01:31:09 -0800 Date: Sat, 13 Jan 2024 01:31:08 -0800 From: Andi Kleen To: Marco Elver Cc: Andrey Konovalov , Oscar Salvador , andrey.konovalov@linux.dev, Andrew Morton , Alexander Potapenko , Dmitry Vyukov , Vlastimil Babka , kasan-dev@googlegroups.com, Evgenii Stepanov , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Andrey Konovalov Subject: Re: [PATCH v4 12/22] lib/stackdepot: use read/write lock Message-ID: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: > This function is only refilling the freelist. Readers don't see it yet > because it's in none of the hash table buckets. The freelist is only > ever accessed under the lock. > > Once an entry is allocated from the freelist, its size is overwritten > with something non-zero (since it then contains a stack trace). Those > updates are released into the right hash table bucket with > list_add_rcu() (which implies a release). > > Am I missing something else? It's probably ok semantically here, but at least I would be consistent with using the macro for a specific field. -Andi