/openbmc/linux/Documentation/dev-tools/ |
H A D | kcsan.rst | 7 The Kernel Concurrency Sanitizer (KCSAN) is a dynamic race detector, which 27 A typical data race report looks like this:: 30 BUG: KCSAN: data-race in test_kernel_read / test_kernel_write 52 the race. It is followed by the access types and stack traces of the 2 threads 53 involved in the data race. If KCSAN also observed a value change, the observed 56 The other less common type of data race report looks like this:: 59 BUG: KCSAN: data-race in test_kernel_rmw_array+0x71/0xd0 61 race at unknown origin, with read to 0xffffffffc009bdb0 of 8 bytes by task 515 on cpu 2: 75 racing thread, but a race was inferred due to the data value of the watched 85 It may be desirable to disable data race detection for specific accesses, [all …]
|
/openbmc/linux/lib/ |
H A D | Kconfig.kcsan | 14 bool "KCSAN: dynamic data race detector" 21 data-race detector that relies on compile-time instrumentation. 51 external functions on report generation; if a race report is 70 various race scenarios, and verifies the reports generated to 131 results in more aggressive race detection, whereas a larger value 155 int "Duration in milliseconds, in which any given race is only reported once" 158 Any given race is only reported once in the defined time window. 173 conflicting access is of unknown origin. This type of race is 174 reported if it was only possible to infer a race due to a data value 178 bool "Strict data-race checking" [all …]
|
H A D | rcuref.c | 37 * scheme, but the destruction race described below cannot be prevented 72 * The actual race is possible due to the unconditional increment and 102 * Deconstruction race 144 * Race conditions 149 * the occasional race vs. a dead or already saturated refcount into
|
/openbmc/linux/tools/memory-model/ |
H A D | linux-kernel.cat | 202 let pre-race = ext & ((Plain * M) | ((M \ IW) * Plain)) 205 let wr-incoh = pre-race & rf & rw-xbstar^-1 206 let rw-incoh = pre-race & fr & wr-vis^-1 207 let ww-incoh = pre-race & co & ww-vis^-1 212 let ww-race = (pre-race & co) \ ww-nonrace 213 let wr-race = (pre-race & (co? ; rf)) \ wr-vis \ rw-xbstar^-1 214 let rw-race = (pre-race & fr) \ rw-xbstar 216 flag ~empty (ww-race | wr-race | rw-race) as data-race
|
/openbmc/linux/kernel/kcsan/ |
H A D | kcsan.h | 55 * Total number of ASSERT failures due to races. If the observed race is 104 * race, depending on preferences. 109 * Did not observe a value-change, and it is invalid to report the race. 114 * The value was observed to change, and the race should be reported. 136 * No other thread was observed to race with the access, but the data value 137 * before and after the stall differs. Reports a race of "unknown origin".
|
H A D | report.c | 78 * The last time the race was reported. 115 * Checks if the race identified by thread frames frame1 and frame2 has 131 /* Check if a matching race report exists. */ in rate_limit_report() 155 /* Reported recently, check if race matches. */ in rate_limit_report() 261 return (type & KCSAN_ACCESS_ASSERT) != 0 ? "assert: race" : "data-race"; in get_bug_type() 462 pr_err("race at unknown origin, with %s to 0x%px of %zu bytes by %s on cpu %i:\n", in print_report() 525 * race with a task on the same CPU (KCSAN_INTERRUPT_WATCHER), provide a in set_other_info_task_blocking()
|
/openbmc/qemu/tests/tsan/ |
H A D | suppressions.tsan | 9 # TSan reports a race between pthread_mutex_init() and 12 race:pthread_mutex_init 13 race:pthread_mutex_lock
|
/openbmc/linux/Documentation/driver-api/firmware/ |
H A D | direct-fs-lookup.rst | 22 a race is possible with loading the driver and the real rootfs not yet being 23 available. Stuffing the firmware into initramfs resolves this race issue, 24 however note that using initrd does not suffice to address the same race.
|
/openbmc/linux/drivers/md/ |
H A D | dm-builtin.c | 12 * The release method suffers from module unload race. We may prevent the 18 * If this code were placed in the dm module, the following race may 40 * In order to fix this module unload race, we place the release method
|
/openbmc/linux/tools/testing/selftests/kvm/x86_64/ |
H A D | recalc_apic_map_test.c | 3 * Test edge cases and race conditions in kvm_recalculate_apic_map(). 21 static void *race(void *arg) in race() function 60 TEST_ASSERT_EQ(pthread_create(&thread, NULL, race, vcpus[0]), 0); in main()
|
/openbmc/linux/tools/memory-model/Documentation/ |
H A D | access-marking.txt | 19 2. Data-race marking, for example, "data_race(a = b);" 37 Therefore, if a given access is involved in an intentional data race, 46 race with one of data_race(), READ_ONCE(), or WRITE_ONCE(), will prevent 98 that the resulting data race was intentional. 108 in a retry. Unless the race condition that resulted in the bogus value 122 that the resulting data race was intentional. 143 that the resulting data race was intentional. 159 because KCSAN will have no way of knowing that the resulting data race 517 Checking Stress-Test Race Coverage 520 When designing stress tests it is important to ensure that race conditions [all …]
|
/openbmc/linux/tools/memory-model/scripts/ |
H A D | judgelitmus.sh | 8 # "DATARACE" marker in the "Result:" comment or a "Flag data-race" marker 56 if grep -q '^Flag data-race$' "$LKMM_DESTDIR/$litmusout" 69 echo '!!! Predicted data race not modeled' $litmus 74 echo '!!! Unexpected data race modeled' $litmus
|
/openbmc/linux/drivers/gpu/drm/ci/xfails/ |
H A D | rockchip-rk3399-flakes.txt | 3 kms_flip@dpms-vs-vblank-race-interruptible 5 kms_flip@modeset-vs-vblank-race-interruptible
|
/openbmc/qemu/include/user/ |
H A D | safe-syscall.h | 2 * safe-syscall.h: prototypes for linux-user signal-race-safe syscalls 71 * most of the time, but there will be a race condition where a 104 * (1) signal came in just before we took the host syscall (a race); 108 * signal really did win the race
|
/openbmc/openbmc/meta-security/recipes-security/ecryptfs-utils/files/ |
H A D | 0001-avoid-race-condition.patch | 4 Subject: [PATCH] avoid race condition 9 This would avoid race condition which causes install failure.
|
/openbmc/openbmc/poky/meta/recipes-devtools/tcltk8/tcl8/ |
H A D | interp.patch | 4 Subject: [PATCH] tcl: fix race in interp.test 6 The interp-36.7 patch has race conditions and is missing cleanup. This patch by
|
/openbmc/openbmc/poky/meta/recipes-devtools/tcltk/tcl/ |
H A D | 0005-tcl-fix-race-in-interp.test.patch | 4 Subject: [PATCH] tcl: fix race in interp.test 6 The interp-36.7 patch has race conditions and is missing cleanup. This patch by
|
/openbmc/openbmc/poky/meta/recipes-devtools/python/python3/ |
H A D | makerace.patch | 4 Subject: [PATCH] python3: Fix make race 11 Add a dependency to avoid the race.
|
/openbmc/openbmc/poky/meta/recipes-extended/groff/files/ |
H A D | 0001-contrib-hdtbl-hdtbl.am-Fix-race-issues-for-parallel-.patch | 4 Subject: [PATCH] contrib/hdtbl/hdtbl.am: Fix race issues for parallel build 6 Fixed race issues for parallel build:
|
/openbmc/openbmc/meta-openembedded/meta-webserver/recipes-httpd/apache2/apache2/ |
H A D | 0006-apache2-fix-the-race-issue-of-parallel-installation.patch | 4 Subject: [PATCH] apache2: fix the race issue of parallel installation 8 fix following race issue when do parallel install
|
/openbmc/linux/include/asm-generic/bitops/ |
H A D | instrumented-non-atomic.h | 93 * This operation is non-atomic. If two instances of this operation race, one 108 * This operation is non-atomic. If two instances of this operation race, one 123 * This operation is non-atomic. If two instances of this operation race, one
|
/openbmc/openbmc/poky/meta/recipes-devtools/python/python3-numpy/ |
H A D | fix_reproducibility.patch | 19 The autobuilder race depended upon whether qemux86-world or the 20 reproducible target ran first and won the race to populate sstate.
|
/openbmc/linux/Documentation/filesystems/ |
H A D | hpfs.rst | 239 Fixed a race-condition when write_inode is called while deleting file 243 Rewritten locking to avoid race-conditions 296 Fixed a possible bitmap race 302 Fixed a nondestructive race in rename 325 Fixed race-condition in buffer code - it is in all filesystems in Linux; 332 Fixed non-crashing race in unlink (Alexander Viro)
|
/openbmc/linux/tools/testing/selftests/powerpc/pmu/ebb/ |
H A D | lost_exception_test.c | 55 * We are trying to get the EBB exception to race exactly with in test_body() 65 /* Change the sample period slightly to try and hit the race */ in test_body()
|
/openbmc/qemu/include/qemu/ |
H A D | tsan.h | 39 * This has the effect of disabling race detection for this section of code. 47 * WRITES. This has the effect of disabling race detection for this
|