Received: by 2002:a25:b323:0:0:0:0:0 with SMTP id l35csp1787124ybj; Sun, 22 Sep 2019 11:55:59 -0700 (PDT) X-Google-Smtp-Source: APXvYqz4MH3Yb3j69XzNTtvb8/fQtLOF9CY5KGq/7Qm4PamXupPcbiHS16qaH3Aoa3qZX/QT2Jgr X-Received: by 2002:a17:906:6d4:: with SMTP id v20mr27046545ejb.223.1569178558999; Sun, 22 Sep 2019 11:55:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569178558; cv=none; d=google.com; s=arc-20160816; b=CVlud0hXLflAr5nV7CI+5BzUx/MSMbfWwiIQv0wnfohMwAw6HspGpIwUmBt3CmPFFg bg++DP2BIyB6c8IxX/qqKHdP4YMLyhO8z6unOdp15Z0P3O/N1hgaYXKA2Kp3h1M8LWVD 5r5rGNVJR1uZw3PGwuAXstnHjavB57dFCzdVLeUP53UHwsk+tVdfg8eu/N/UNGECz+I2 34pmn8M2Lz5d5/i43yt5gwwdAdzAsKFSPHlwxScSyiETU5mCSBZKkCD0zxUyPb4x8jPD QUfC276cnGVIp45i6lwlvvGNCqbMouwGVCTjE2FuyZ5dRrTAyWvZOi4TFXVoFdDQJO9F dcbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=s3unpMgOm3xIrUPGVdKeRbnRcKEIImFSUY0v31tSpJ4=; b=aAG6s0vxjVE6pVA4GB1otN+F6PY5Xsy/0i9hrBQh3P/KZEZmlyyFEKpazxhu0wiNqA fy6njixtO81tPNvy2quuuac/m9VOJsIUB7ZkmfR48LP58sGZuiNpQOTmAMszvWgX/am8 Bh8ETFHDbm+q8MgXFuTAltTKVAiq84YOqIiELtgxky3VFFpocoOpXgx1AmeaytT8yW1P RywOmcf+PHZfVsBlTNLZKJXuvqo5h/PW1VcBr4xjvsTyKgtv7i5IOIAP8thANu4SWH/2 0dJVTr5uUnNJcQAzULUJjIxeVFVgqDH/P0FTQPn/rsf2JK8MfidDLPWMWpeIcicboKwr 4MyQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t18si3960422ejx.135.2019.09.22.11.55.35; Sun, 22 Sep 2019 11:55:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391327AbfITQbb (ORCPT + 99 others); Fri, 20 Sep 2019 12:31:31 -0400 Received: from foss.arm.com ([217.140.110.172]:47182 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387631AbfITQbb (ORCPT ); Fri, 20 Sep 2019 12:31:31 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A0090337; Fri, 20 Sep 2019 09:31:30 -0700 (PDT) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 4C4CE3F575; Fri, 20 Sep 2019 09:31:28 -0700 (PDT) Date: Fri, 20 Sep 2019 17:31:25 +0100 From: Mark Rutland To: Marco Elver Cc: kasan-dev , LKML , Dmitry Vyukov , Andrey Konovalov , Alexander Potapenko , paulmck@linux.ibm.com, Paul Turner , Daniel Axtens , Anatol Pomazau , Will Deacon , Andrea Parri , stern@rowland.harvard.edu, akiyks@gmail.com, npiggin@gmail.com, boqun.feng@gmail.com, dlustig@nvidia.com, j.alglave@ucl.ac.uk, luc.maranget@inria.fr Subject: Re: Kernel Concurrency Sanitizer (KCSAN) Message-ID: <20190920163123.GC55224@lakrids.cambridge.arm.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.11.1+11 (2f07cb52) (2018-12-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 20, 2019 at 04:18:57PM +0200, Marco Elver wrote: > Hi all, Hi, > We would like to share a new data-race detector for the Linux kernel: > Kernel Concurrency Sanitizer (KCSAN) -- > https://github.com/google/ktsan/wiki/KCSAN (Details: > https://github.com/google/ktsan/blob/kcsan/Documentation/dev-tools/kcsan.rst) Nice! BTW kcsan_atomic_next() is missing a stub definition in when !CONFIG_KCSAN: https://github.com/google/ktsan/commit/a22a093a0f0d0b582c82cdbac4f133a3f61d207c#diff-19d7c475b4b92aab8ba440415ab786ec ... and I think the kcsan_{begin,end}_atomic() stubs need to be static inline too. It looks like this is easy enough to enable on arm64, with the only real special case being secondary_start_kernel() which we might want to refactor to allow some portions to be instrumented. I pushed the trivial patches I needed to get arm64 booting to my arm64/kcsan branch: git://git.kernel.org/pub/scm/linux/kernel/git/mark/linux.git arm64/kcsan We have some interesting splats at boot time in stop_machine, which don't seem to have been hit/fixed on x86 yet in the kcsan-with-fixes branch, e.g. [ 0.237939] ================================================================== [ 0.239431] BUG: KCSAN: data-race in multi_cpu_stop+0xa8/0x198 and set_state+0x80/0xb0 [ 0.241189] [ 0.241606] write to 0xffff00001003bd00 of 4 bytes by task 24 on cpu 3: [ 0.243435] set_state+0x80/0xb0 [ 0.244328] multi_cpu_stop+0x16c/0x198 [ 0.245406] cpu_stopper_thread+0x170/0x298 [ 0.246565] smpboot_thread_fn+0x40c/0x560 [ 0.247696] kthread+0x1a8/0x1b0 [ 0.248586] ret_from_fork+0x10/0x18 [ 0.249589] [ 0.250006] read to 0xffff00001003bd00 of 4 bytes by task 14 on cpu 1: [ 0.251804] multi_cpu_stop+0xa8/0x198 [ 0.252851] cpu_stopper_thread+0x170/0x298 [ 0.254008] smpboot_thread_fn+0x40c/0x560 [ 0.255135] kthread+0x1a8/0x1b0 [ 0.256027] ret_from_fork+0x10/0x18 [ 0.257036] [ 0.257449] Reported by Kernel Concurrency Sanitizer on: [ 0.258918] CPU: 1 PID: 14 Comm: migration/1 Not tainted 5.3.0-00007-g67ab35a199f4-dirty #3 [ 0.261241] Hardware name: linux,dummy-virt (DT) [ 0.262517] ================================================================== > To those of you who we mentioned at LPC that we're working on a > watchpoint-based KTSAN inspired by DataCollider [1], this is it (we > renamed it to KCSAN to avoid confusion with KTSAN). > [1] http://usenix.org/legacy/events/osdi10/tech/full_papers/Erickson.pdf > > In the coming weeks we're planning to: > * Set up a syzkaller instance. > * Share the dashboard so that you can see the races that are found. > * Attempt to send fixes for some races upstream (if you find that the > kcsan-with-fixes branch contains an important fix, please feel free to > point it out and we'll prioritize that). > > There are a few open questions: > * The big one: most of the reported races are due to unmarked > accesses; prioritization or pruning of races to focus initial efforts > to fix races might be required. Comments on how best to proceed are > welcome. We're aware that these are issues that have recently received > attention in the context of the LKMM > (https://lwn.net/Articles/793253/). I think the big risk here is drive-by "fixes" masking the warnings rather than fixing the actual issue. It's easy for people to suppress a warning with {READ,WRITE}_ONCE(), so they're liable to do that even the resulting race isn't benign. I don't have a clue how to prevent that, though. > * How/when to upstream KCSAN? I would love to see this soon! Thanks, Mark.