Lines Matching +full:read +full:- +full:access +full:- +full:delay

1 # SPDX-License-Identifier: GPL-2.0-only
7 def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-distinguish-volatile=1)) || \
8 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-distinguish-volatile=1))
11 <file:Documentation/dev-tools/kcsan.rst>.
21 data-race detector that relies on compile-time instrumentation.
22 KCSAN uses a watchpoint-based sampling approach to detect races.
25 also provides assertions to check data access constraints.
29 See <file:Documentation/dev-tools/kcsan.rst> for more details.
34 def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-compound-read-before-write=1)) || \
35 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-compound-read-before-write=1))
37 The compiler instruments plain compound read-write operations
38 differently (++, --, +=, -=, |=, &=, etc.), which allows KCSAN to
98 due to reducing cache-line contention. The chosen default is a
103 int "Delay in microseconds (for tasks)"
106 For tasks, the microsecond delay after setting up a watchpoint.
109 int "Delay in microseconds (for interrupts)"
112 For interrupts, the microsecond delay after setting up a watchpoint.
113 Interrupts have tighter latency requirements, and their delay should
128 The number of per-CPU memory operations to skip, before another
129 watchpoint is set up, i.e. one in KCSAN_SKIP_WATCH per-CPU
150 Currently disabled by default, because not all safe per-CPU access
165 # are not expected to be switched frequently by non-testers or at runtime.
172 If KCSAN should report races where only one access is known, and the
173 conflicting access is of unknown origin. This type of race is
175 change while an access is being delayed on a watchpoint.
178 bool "Strict data-race checking"
181 closely aligns with the rules defined by the Linux-kernel memory
232 races where at least one access is marked atomic will never be
248 to further reduce reported data races due to data-racy patterns