Skip to content

Commit 1e029b7

Browse files
committed
tools/memory-model: Add KCSAN LF mentorship session citation
Add a citation to Marco's LF mentorship session presentation entitled "The Kernel Concurrency Sanitizer" [ paulmck: Apply Marco Elver feedback. ] Reported-by: Marco Elver <[email protected]> Signed-off-by: Paul E. McKenney <[email protected]> Acked-by: Andrea Parri <[email protected]> Reviewed-by: Akira Yokosawa <[email protected]> Acked-by: Marco Elver <[email protected]> Cc: Alan Stern <[email protected]> Cc: Will Deacon <[email protected]> Cc: Peter Zijlstra <[email protected]> Cc: Boqun Feng <[email protected]> Cc: Nicholas Piggin <[email protected]> Cc: David Howells <[email protected]> Cc: Jade Alglave <[email protected]> Cc: Luc Maranget <[email protected]> Cc: Daniel Lustig <[email protected]> Cc: Joel Fernandes <[email protected]> Cc: <[email protected]>
1 parent 1613e60 commit 1e029b7

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

tools/memory-model/Documentation/access-marking.txt

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@ normal accesses to shared memory, that is "normal" as in accesses that do
66
not use read-modify-write atomic operations. It also describes how to
77
document these accesses, both with comments and with special assertions
88
processed by the Kernel Concurrency Sanitizer (KCSAN). This discussion
9-
builds on an earlier LWN article [1].
9+
builds on an earlier LWN article [1] and Linux Foundation mentorship
10+
session [2].
1011

1112

1213
ACCESS-MARKING OPTIONS
@@ -31,7 +32,7 @@ example:
3132
WRITE_ONCE(a, b + data_race(c + d) + READ_ONCE(e));
3233

3334
Neither plain C-language accesses nor data_race() (#1 and #2 above) place
34-
any sort of constraint on the compiler's choice of optimizations [2].
35+
any sort of constraint on the compiler's choice of optimizations [3].
3536
In contrast, READ_ONCE() and WRITE_ONCE() (#3 and #4 above) restrict the
3637
compiler's use of code-motion and common-subexpression optimizations.
3738
Therefore, if a given access is involved in an intentional data race,
@@ -594,5 +595,8 @@ REFERENCES
594595
[1] "Concurrency bugs should fear the big bad data-race detector (part 2)"
595596
https://lwn.net/Articles/816854/
596597

597-
[2] "Who's afraid of a big bad optimizing compiler?"
598+
[2] "The Kernel Concurrency Sanitizer"
599+
https://www.linuxfoundation.org/webinars/the-kernel-concurrency-sanitizer
600+
601+
[3] "Who's afraid of a big bad optimizing compiler?"
598602
https://lwn.net/Articles/793253/

0 commit comments

Comments
 (0)