Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp1241869iog; Thu, 16 Jun 2022 02:02:56 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vIJN7hIi+OOyAqiEDjb0zJL6ncbQyacQUXsTKCxmnKviTRieYTNUy1L22mL+SgAnOZdzMa X-Received: by 2002:a65:4907:0:b0:3fd:bc3e:fb0a with SMTP id p7-20020a654907000000b003fdbc3efb0amr3615628pgs.123.1655370176041; Thu, 16 Jun 2022 02:02:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655370176; cv=none; d=google.com; s=arc-20160816; b=LvFuxxjTax6yOdCbB8L0XYEnYRv3WYBycADckRMqS/MycNZRf70+1oDWxvzj4b2pui EwLj3IOFxFIZCeHANOC5tbhH7Aj7lv52FD51VQkfBG462ps0s0IMN0vwRZ2CwvDt9sG6 XtPMUpcRI0xgvyC0pDj4yP+723pemFmLgdT8Ch7uXYfokVzPRs7K1dyJH4J+3iDhjZVE 86KvdEOe+UIt7M13HN019HBIz7VTwOJ+uNdbYzh7mzSX5yDFyDJwg7EAi+JRFtCCEIoL 6kuNSPo/SAL3v7J4F0AEcXDzlnOFzqYVRDz7+xilLiwqh0VeFKMjoQfPdqb3kYt2hiWz Gytg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=IjCegwAI4yPx0TvbI6/Yc6MyS8GQtq346D+LbhHkayQ=; b=dHH0IzeVDFYPkRkgxF5bmSytlIYDE1QwwIEbC7SDQCLT/Yab/a98gNHNgBKWQZBx6K 3cHuGKdxRMZJPy/tCnKUHpZ0swIEcA+gQCf3/4qwDz0jg9WH8/e3PeZqkdw5le1iprbK zhh3+ZDNpJhyyw04TpD+YdO1DGslVGJ94ANbFgu3h1mXvglpWwaUBEw8ou2YrkUzC3mF 8R0Y1kzDNySyiIoLe1oUBLxPfchj+BDV3ttW2bY0BJ3zuWG14KFYq/nSRNumnDs02JXG q7/QAORmC39RKj+Iu/VNjTNv22COjj9bzoAi5ILz9iki7aGA7CAqHuqg47jDUD+7TsUR LSEg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=WM0aUNV5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t12-20020a17090340cc00b0016392e24919si1521947pld.509.2022.06.16.02.02.40; Thu, 16 Jun 2022 02:02:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=WM0aUNV5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1359720AbiFPIpU (ORCPT + 99 others); Thu, 16 Jun 2022 04:45:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34192 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231386AbiFPIpS (ORCPT ); Thu, 16 Jun 2022 04:45:18 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 28CEF5D1B3; Thu, 16 Jun 2022 01:45:17 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id C8C13B8228D; Thu, 16 Jun 2022 08:45:15 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D11A1C34114; Thu, 16 Jun 2022 08:45:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1655369114; bh=LKVkEI79gQ3zEb+YWBO7UZ94NekxU8wC7UG+XnoHRRE=; h=From:To:Cc:Subject:Date:From; b=WM0aUNV5C2hiWXNEqJE92dzaboeUou4do1OhuxEEBmgWY+Gown/m86PSb6autlozT sFjS5EMicwsdrH37OBJMxE9Wz3SEtFmY8q8n8X5G+nKJg1LjY3GyEHV/+EpoOzxe3z i/d5mv13s57DCIpYlmbkvqiJKCC7x21M6W7fwxKHJxnYbkWN+76knyVV5GKt/zNmnY z6w7k+lrfWI6foOo/fRDKk6pE/AYk2O2YlGl1hVcha0XhPFbFmBVd0cgiIeXFKNEkD L/qf+z7b4vMR3btEyPNGWg2QtIYpihxsMfI1yNXY4MLQK9ZLmLRhgumLTNHi31wuOx tsiJUfaa8wbQQ== From: Daniel Bristot de Oliveira To: Steven Rostedt Cc: Daniel Bristot de Oliveira , Wim Van Sebroeck , Guenter Roeck , Jonathan Corbet , Ingo Molnar , Thomas Gleixner , Peter Zijlstra , Will Deacon , Catalin Marinas , Marco Elver , Dmitry Vyukov , "Paul E. McKenney" , Shuah Khan , Gabriele Paoloni , Juri Lelli , Clark Williams , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-trace-devel@vger.kernel.org Subject: [PATCH V4 00/20] The Runtime Verification (RV) interface Date: Thu, 16 Jun 2022 10:44:42 +0200 Message-Id: X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Over the last years, I've been exploring the possibility of verifying the Linux kernel behavior using Runtime Verification. Runtime Verification (RV) is a lightweight (yet rigorous) method that complements classical exhaustive verification techniques (such as model checking and theorem proving) with a more practical approach for complex systems. Instead of relying on a fine-grained model of a system (e.g., a re-implementation a instruction level), RV works by analyzing the trace of the system's actual execution, comparing it against a formal specification of the system behavior. The usage of deterministic automaton for RV is a well-established approach. In the specific case of the Linux kernel, you can check how to model complex behavior of the Linux kernel with this paper: DE OLIVEIRA, Daniel Bristot; CUCINOTTA, Tommaso; DE OLIVEIRA, Romulo Silva. *Efficient formal verification for the Linux kernel.* In: International Conference on Software Engineering and Formal Methods. Springer, Cham, 2019. p. 315-332. And how efficient is this approach here: DE OLIVEIRA, Daniel B.; DE OLIVEIRA, Romulo S.; CUCINOTTA, Tommaso. *A thread synchronization model for the PREEMPT_RT Linux kernel.* Journal of Systems Architecture, 2020, 107: 101729. tlrd: it is possible to model complex behaviors in a modular way, with an acceptable overhead (even for production systems). See this presentation at 2019's ELCE: https://www.youtube.com/watch?v=BfTuEHafNgg Here I am proposing a more practical approach for the usage of deterministic automata for runtime verification, and it includes: - An interface for controlling the verification; - A tool and set of headers that enables the automatic code generation of the RV monitor (Monitor Synthesis); - Sample monitors to evaluate the interface; - A sample monitor developed in the context of the Elisa Project demonstrating how to use RV in the context of safety-critical systems. Given that RV is a tracing consumer, the code is being placed inside the tracing subsystem (Steven and I have been talking about it for a while). Changes from v3: - Rebased on 5.19 (rostedt's request were made on 1x1 meetings) - Moved monitors to monitors/$name/ (Rostedt) - Consolidate the tracepoints into a single include file in the default directory (trave/events/rv.h) (Rostedt) - The tracepoints now record the entire string to the buffer. - Change the enable_monitors to disable monitors with ! (instead of -). (Rostedt) - Add a suffix to the state/events enums, to avoid conflict in the vmlinux.h used by eBPF. - The models are now placed in the $name.h (it used to store the tracepoints, but they are now consolidated in a single file) - dot2c and dot2k updated to the changes - models re-generated with these new standards. - user-space tools moved to an directory outside of tools/tracing as other methods of verification/log sources are planned. Changes from v2: - Tons of checkpatch and kernel test robot - Moved files to better places - Adjusted watchdog tracepoints patch (Guenter Roeck) - Added pretimeout watchdog events (Peter Enderborg) - Used task struct to store per-task monitors (Peter Zijlstra) - Changed the instrumentation to use internal definition of tracepoint and check the callback signature (Steven Rostedt) - Used printk_deferred() and removed the comment about deadlocks (Shuah Khan/John Ogness) - Some simplifications: - Removed the safe watchdog nowayout for now (myself) - Removed export symbols for now (myself) Changes from V1: - rebased to the latest kernel; - code cleanup; - the watchdog dev monitor; - safety app; Things kept for a second moment (after this patchset): - Add a reactor tha enables the visualization of the visited states via KCOV (Marco Elver & Dmitry Vyukov) - Add a CRC method to check from user-space if the values exported by the monitor were not corrupted by any other kernel task (Gabriele Paoloni) - Export symbols for external modules - dot2bpf Daniel Bristot de Oliveira (20): rv: Add Runtime Verification (RV) interface rv: Add runtime reactors interface rv/include: Add helper functions for deterministic automata rv/include: Add deterministic automata monitor definition via C macros rv/include: Add instrumentation helper functions tools/rv: Add dot2c tools/rv: Add dot2k rv/monitor: Add the wip monitor skeleton created by dot2k rv/monitor: wip instrumentation and Makefile/Kconfig entries rv/monitor: Add the wwnr monitor skeleton created by dot2k rv/monitor: wwnr instrumentation and Makefile/Kconfig entries rv/reactor: Add the printk reactor rv/reactor: Add the panic reactor Documentation/rv: Add a basic documentation Documentation/rv: Add deterministic automata monitor synthesis documentation Documentation/rv: Add deterministic automata instrumentation documentation watchdog/dev: Add tracepoints rv/monitor: Add safe watchdog monitor rv/safety_app: Add a safety_app sample Documentation/rv: Add watchdog-monitor documentation Documentation/trace/index.rst | 1 + .../trace/rv/da_monitor_instrumentation.rst | 223 ++++++ .../trace/rv/da_monitor_synthesis.rst | 284 +++++++ Documentation/trace/rv/index.rst | 9 + .../trace/rv/runtime-verification.rst | 233 ++++++ Documentation/trace/rv/watchdog-monitor.rst | 250 ++++++ drivers/watchdog/watchdog_dev.c | 43 +- drivers/watchdog/watchdog_pretimeout.c | 2 + include/linux/rv.h | 38 + include/linux/sched.h | 11 + include/linux/watchdog.h | 7 +- include/rv/automata.h | 49 ++ include/rv/da_monitor.h | 419 ++++++++++ include/rv/instrumentation.h | 23 + include/rv/rv.h | 32 + include/trace/events/rv.h | 153 ++++ include/trace/events/watchdog.h | 101 +++ kernel/fork.c | 14 + kernel/trace/Kconfig | 2 + kernel/trace/Makefile | 2 + kernel/trace/rv/Kconfig | 84 ++ kernel/trace/rv/Makefile | 9 + kernel/trace/rv/monitors/safe_wtd/safe_wtd.c | 300 +++++++ kernel/trace/rv/monitors/safe_wtd/safe_wtd.h | 84 ++ kernel/trace/rv/monitors/wip/wip.c | 110 +++ kernel/trace/rv/monitors/wip/wip.h | 38 + kernel/trace/rv/monitors/wwnr/wwnr.c | 109 +++ kernel/trace/rv/monitors/wwnr/wwnr.h | 38 + kernel/trace/rv/reactor_panic.c | 44 + kernel/trace/rv/reactor_printk.c | 43 + kernel/trace/rv/rv.c | 757 ++++++++++++++++++ kernel/trace/rv/rv.h | 54 ++ kernel/trace/rv/rv_reactors.c | 476 +++++++++++ kernel/trace/trace.c | 4 + kernel/trace/trace.h | 2 + tools/verification/dot2/Makefile | 26 + tools/verification/dot2/automata.py | 179 +++++ tools/verification/dot2/dot2c | 30 + tools/verification/dot2/dot2c.py | 244 ++++++ tools/verification/dot2/dot2k | 50 ++ tools/verification/dot2/dot2k.py | 177 ++++ .../dot2/dot2k_templates/main_global.c | 94 +++ .../dot2/dot2k_templates/main_per_cpu.c | 94 +++ .../dot2/dot2k_templates/main_per_task.c | 94 +++ tools/verification/safety_app/Makefile | 51 ++ tools/verification/safety_app/safety_app.c | 614 ++++++++++++++ 46 files changed, 5691 insertions(+), 10 deletions(-) create mode 100644 Documentation/trace/rv/da_monitor_instrumentation.rst create mode 100644 Documentation/trace/rv/da_monitor_synthesis.rst create mode 100644 Documentation/trace/rv/index.rst create mode 100644 Documentation/trace/rv/runtime-verification.rst create mode 100644 Documentation/trace/rv/watchdog-monitor.rst create mode 100644 include/linux/rv.h create mode 100644 include/rv/automata.h create mode 100644 include/rv/da_monitor.h create mode 100644 include/rv/instrumentation.h create mode 100644 include/rv/rv.h create mode 100644 include/trace/events/rv.h create mode 100644 include/trace/events/watchdog.h create mode 100644 kernel/trace/rv/Kconfig create mode 100644 kernel/trace/rv/Makefile create mode 100644 kernel/trace/rv/monitors/safe_wtd/safe_wtd.c create mode 100644 kernel/trace/rv/monitors/safe_wtd/safe_wtd.h create mode 100644 kernel/trace/rv/monitors/wip/wip.c create mode 100644 kernel/trace/rv/monitors/wip/wip.h create mode 100644 kernel/trace/rv/monitors/wwnr/wwnr.c create mode 100644 kernel/trace/rv/monitors/wwnr/wwnr.h create mode 100644 kernel/trace/rv/reactor_panic.c create mode 100644 kernel/trace/rv/reactor_printk.c create mode 100644 kernel/trace/rv/rv.c create mode 100644 kernel/trace/rv/rv.h create mode 100644 kernel/trace/rv/rv_reactors.c create mode 100644 tools/verification/dot2/Makefile create mode 100644 tools/verification/dot2/automata.py create mode 100644 tools/verification/dot2/dot2c create mode 100644 tools/verification/dot2/dot2c.py create mode 100644 tools/verification/dot2/dot2k create mode 100644 tools/verification/dot2/dot2k.py create mode 100644 tools/verification/dot2/dot2k_templates/main_global.c create mode 100644 tools/verification/dot2/dot2k_templates/main_per_cpu.c create mode 100644 tools/verification/dot2/dot2k_templates/main_per_task.c create mode 100644 tools/verification/safety_app/Makefile create mode 100644 tools/verification/safety_app/safety_app.c -- 2.35.1