Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1255645pxa; Thu, 6 Aug 2020 03:34:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyXrAWfb7Lxdl/GIFZDbH8NqyzRkIBuicXkbnoNdLIq3DYdrn9olsYSxbgyETepNFBSspvA X-Received: by 2002:a17:906:7c86:: with SMTP id w6mr3581986ejo.178.1596710055595; Thu, 06 Aug 2020 03:34:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596710055; cv=none; d=google.com; s=arc-20160816; b=BrdzhFrsrs0C8oEdigacMTQSKwrGSFzcuSclY626fLtiKtFs4I0ekVqiBLn6SQpTFG oB5RD8kFEyqsFBGkKw//msIrscA3lSiyTnXLmqGwE9qxexeQ1rEB8qlykGTHIdJMPlFV xvjsOrb2XCOVrgWYulpg6r+qATgc9IyEz8FLQgW3y4UR2HM/9lUtiJEDI9Sy2BLO1/50 zxF+14JVZS4pqNRpjeDR/BtcNYYSZ40jUV3k5iLkRyDwzzcR0TxmCEF6lzvjmRNSW5hV IwWTaoNA02y2utVQ9qGV1N7ZJtHD4DR2+akYYT5SKZLjcUckqXlpw9dfwJ4hsyWXMRef 5S0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=ypy/qALQFzmq+pA0XvKiGAPjinMvR6vyLxRwEn3AJFI=; b=rR1CjDBPSZ8xRrRh5oF8O6lrTv/DT+Ngdmk42T4XlYqz5SHXK++BXi16tPo/IvPeKo jx7ixycT9fgQYif23YAQZ/0DYyJQIM7BlHb5eXUQREul8G/gb7jn4BeOhTqhzSJt9eUY CFJ0XrHQXUbZ/3I2BOYD0l7qm3DIjg9qaQZ4HU0RQ7pFnpTGXjznm4h7yxSmKnCBABFA Yd/7TGN7l+wObtPN9sy3z29JfoFQy11gBWvKBNXxaP0Jn788tOaPlEwZyFkXrpL0FdES U3Ls7BOGHZc39mlghxI1ZCaRG5rUKgJxhEecoYmyfTSETbYv6FN0wo30rYpmQS/E24qq OLqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=gOvhi5v7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bv14si3021501ejb.249.2020.08.06.03.33.50; Thu, 06 Aug 2020 03:34:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=gOvhi5v7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729285AbgHFKcj (ORCPT + 99 others); Thu, 6 Aug 2020 06:32:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41348 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729279AbgHFKci (ORCPT ); Thu, 6 Aug 2020 06:32:38 -0400 Received: from mail-ot1-x32e.google.com (mail-ot1-x32e.google.com [IPv6:2607:f8b0:4864:20::32e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EC24FC0617A4 for ; Thu, 6 Aug 2020 03:31:50 -0700 (PDT) Received: by mail-ot1-x32e.google.com with SMTP id 93so25615984otx.2 for ; Thu, 06 Aug 2020 03:31:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ypy/qALQFzmq+pA0XvKiGAPjinMvR6vyLxRwEn3AJFI=; b=gOvhi5v7BbQFQoXJcbV51yRSVcKrTP34twEImtq5+qWngIgzldbxjrxCgTSeJBcVhP 618+tmwcLdKMfEJq5jbujOgUXAU90c0yN3Z2HHwNANalPBjJJKs0/OmkNsA4X4jC+DwO tY5S0ZeRPlwAkbX9ZzjlXSAO1SyCaVB+dqT6CsKr8lvUyIGHKquAap6l48keHVwHs9iy qJZdMO0bo2jBQmsa44AulU7Pjg+9lZN4XMcM2rFcOUQTwhUb71hZr7FeyxRFyFG9O+3A yLb8SAJlrVxYmQwwGY+EJl4lg3zxMnktNggdEbtcaqA0YTwlFFJ3rE9u9vew1hMn0oht nD4g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ypy/qALQFzmq+pA0XvKiGAPjinMvR6vyLxRwEn3AJFI=; b=JPV50fphlNMrgFLs/nw8Y1MV/mUwPkmi55k4P/0NGuXz6fcL+ECxkCc3oTsY0Rsz1h feDgudJzNNZLujXJ85jiTf+ibGYEiLJU1DwHuP8cJexYdHJ5Qe2shRratG8qe1CTvnBl 9dhVW3elBDiLkgDRR+Qov8t+ld2hsdVtaI2bZ9IHJxhUSdVYtYu5J89G5QoThRzM+7S8 gHFBU2EDB3R29rPLD17Xvm1aGOmiNUWRUfUl3NLjpAq9YHwzvPl0tSYM1sgJtSPrd/4Y oKW80qISZWBVHHqu7z8C4pCX8MeQ0a3AN4i4oxij7RzlAHZtQD3L6M5BAFw3tkFFVUPB MTfA== X-Gm-Message-State: AOAM532hqfvtggWMi3Zn0zgN6DtEZiqsj5YpK3EYtC/GhCxD58N9VG9o FfJ4Ysqmq1kDOYcHmHCTUqfhVvY4iU/Gjr1WsOj6eA== X-Received: by 2002:a9d:739a:: with SMTP id j26mr6861992otk.17.1596709908446; Thu, 06 Aug 2020 03:31:48 -0700 (PDT) MIME-Version: 1.0 References: <20200805230852.GA28727@paulmck-ThinkPad-P72> In-Reply-To: <20200805230852.GA28727@paulmck-ThinkPad-P72> From: Marco Elver Date: Thu, 6 Aug 2020 12:31:36 +0200 Message-ID: Subject: Re: Finally starting on short RCU grace periods, but... To: "Paul E. McKenney" Cc: Kostya Serebryany , Dmitry Vyukov , LKML , kasan-dev , Alexander Potapenko , Andrey Konovalov Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org +Cc kasan-dev On Thu, 6 Aug 2020 at 01:08, Paul E. McKenney wrote: > > Hello! > > If I remember correctly, one of you asked for a way to shorten RCU > grace periods so that KASAN would have a better chance of detecting bugs > such as pointers being leaked out of RCU read-side critical sections. > I am finally starting entering and testing code for this, but realized > that I had forgotten a couple of things: > > 1. I don't remember exactly who asked, but I suspect that it was > Kostya. I am using his Reported-by as a placeholder for the > moment, but please let me know if this should be adjusted. It certainly was not me. > 2. Although this work is necessary to detect situtions where > call_rcu() is used to initiate a grace period, there already > exists a way to make short grace periods that are initiated by > synchronize_rcu(), namely, the rcupdate.rcu_expedited kernel > boot parameter. This will cause all calls to synchronize_rcu() > to act like synchronize_rcu_expedited(), resulting in about 2-3 > orders of magnitude reduction in grace-period latency on small > systems (say 16 CPUs). > > In addition, I plan to make a few other adjustments that will > increase the probability of KASAN spotting a pointer leak even in the > rcupdate.rcu_expedited case. Thank you, that'll be useful I think. > But if you would like to start this sort of testing on current mainline, > rcupdate.rcu_expedited is your friend! Do any of you remember some bugs we missed due to this? Can we find them if we add this option? Thanks, -- Marco