Systems and methods of reporting multiple threads involved in a potential data race
First Claim
1. A method of reporting a warning involving a prospective data race, comprising:
- determining if a violation of a locking discipline has occurred;
reporting a warning if the violation has occurred;
detecting a subsequent violation;
determining if at least one predetermined criterion regarding the subsequent violation is met; and
reporting a warning directed to the subsequent violation if the at least one predetermined criterion is met.
2 Assignments
0 Petitions
Accused Products
Abstract
Criteria are defined for determining when additional stack dumps would be saved and presented (e.g., to the developer). This provides more information for the developer to use for debugging, and yet does not overburden the developer with irrelevent information. Suspicious activity worthy of an additional stack dumps may be defined as a thread accessing an already suspicious location that is different than the original thread, a write access being made and no write access having yet been made to the target location, or if the lockset being held by the thread accessing the location is omitted from the intersection of all locksets involved in stack dumps for the location.
33 Citations
20 Claims
-
1. A method of reporting a warning involving a prospective data race, comprising:
-
determining if a violation of a locking discipline has occurred;
reporting a warning if the violation has occurred;
detecting a subsequent violation;
determining if at least one predetermined criterion regarding the subsequent violation is met; and
reporting a warning directed to the subsequent violation if the at least one predetermined criterion is met. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of reporting a warning involving a prospective data race, comprising:
-
detecting a suspicious access pattern at a location pursuant to a thread;
dumping a stack;
detecting a subsequent suspicious access pattern at the location; and
dumping another stack if the subsequent suspicious access pattern is caused by a different thread. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable medium with computer-executable instructions stored thereon for:
-
determining if a violation of a locking discipline has occurred;
reporting a warning if the violation has occurred;
detecting a subsequent violation;
determining if at least one predetermined criterion regarding the subsequent violation is met; and
reporting a warning directed to the subsequent violation if the at least one predetermined criterion is met. - View Dependent Claims (18, 19, 20)
-
Specification