Lines Matching +full:read +full:- +full:enable +full:- +full:delay

1 # SPDX-License-Identifier: GPL-2.0-only
7 def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-distinguish-volatile=1)) || \
8 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-distinguish-volatile=1))
11 <file:Documentation/dev-tools/kcsan.rst>.
21 data-race detector that relies on compile-time instrumentation.
22 KCSAN uses a watchpoint-based sampling approach to detect races.
29 See <file:Documentation/dev-tools/kcsan.rst> for more details.
34 def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-compound-read-before-write=1)) || \
35 (CC_IS_GCC && $(cc-option,-fsanitize=thread --param tsan-compound-read-before-write=1))
37 The compiler instruments plain compound read-write operations
38 differently (++, --, +=, -=, |=, &=, etc.), which allows KCSAN to
84 bool "Early enable during boot"
98 due to reducing cache-line contention. The chosen default is a
103 int "Delay in microseconds (for tasks)"
106 For tasks, the microsecond delay after setting up a watchpoint.
109 int "Delay in microseconds (for interrupts)"
112 For interrupts, the microsecond delay after setting up a watchpoint.
113 Interrupts have tighter latency requirements, and their delay should
128 The number of per-CPU memory operations to skip, before another
129 watchpoint is set up, i.e. one in KCSAN_SKIP_WATCH per-CPU
150 Currently disabled by default, because not all safe per-CPU access
165 # are not expected to be switched frequently by non-testers or at runtime.
178 bool "Strict data-race checking"
181 closely aligns with the rules defined by the Linux-kernel memory
185 bool "Enable weak memory modeling to detect missing memory barriers"
189 Enable support for modeling a subset of weak memory, which allows
242 bool "Enable all additional permissive rules"
245 Enable additional permissive rules to ignore certain classes of data
248 to further reduce reported data races due to data-racy patterns