maxv b7edd3d132 Add Kernel Concurrency Sanitizer (kCSan) support. This sanitizer allows us
to detect race conditions at runtime. It is a variation of TSan that is
easy to implement and more suited to kernel internals, albeit theoretically
less precise than TSan's happens-before.

We do basically two things:

 - On every KCSAN_NACCESSES (=2000) memory accesses, we create a cell
   describing the access, and delay the calling CPU (10ms).

 - On all memory accesses, we verify if the memory we're reading/writing
   is referenced in a cell already.

The combination of the two means that, if for example cpu0 does a read that
is selected and cpu1 does a write at the same address, kCSan will fire,
because cpu1's write collides with cpu0's read cell.

The coverage of the instrumentation is the same as that of kASan. Also, the
code is organized in a way similar to kASan, so it is easy to add support
for more architectures than amd64. kCSan is compatible with KCOV.

Reviewed by Kamil.
2019-11-05 20:19:17 +00:00
..
2017-05-04 11:01:16 +00:00
2019-10-21 14:23:53 +00:00
2019-05-26 19:23:04 +00:00
2019-06-24 06:24:33 +00:00
2019-02-20 19:42:14 +00:00
2019-10-12 10:55:23 +00:00
2019-10-12 10:55:23 +00:00
2019-10-09 05:59:51 +00:00
2017-06-25 04:10:47 +00:00
2019-10-12 10:55:23 +00:00
2019-10-13 22:31:19 +00:00
2018-12-01 02:08:16 +00:00
2019-01-27 02:08:33 +00:00
2019-08-15 09:04:22 +00:00
2018-02-08 09:05:16 +00:00
2017-10-16 15:03:57 +00:00
2019-05-21 04:57:02 +00:00
2019-09-22 23:03:20 +00:00
2019-09-22 23:03:20 +00:00
2019-09-22 23:03:20 +00:00
2018-12-27 07:56:43 +00:00
2018-10-18 05:44:19 +00:00
2019-09-15 17:37:25 +00:00
2019-09-14 21:23:34 +00:00
2019-09-15 20:24:25 +00:00
2018-12-10 21:19:33 +00:00
2019-10-11 08:05:19 +00:00