| /linux-4.1.27/net/ax25/ |
| D | TODO | 13 the race caused by the static variable in it's previous implementation.
|
| /linux-4.1.27/net/netfilter/ |
| D | xt_hashlimit.c | 161 const struct dsthash_dst *dst, bool *race) in dsthash_alloc_init() argument 173 *race = true; in dsthash_alloc_init() 613 bool race = false; in hashlimit_mt() local 622 dh = dsthash_alloc_init(hinfo, &dst, &race); in hashlimit_mt() 626 } else if (race) { in hashlimit_mt()
|
| /linux-4.1.27/Documentation/arm/ |
| D | 00-INDEX | 29 cluster-pm-race-avoidance.txt
|
| D | cluster-pm-race-avoidance.txt | 1 Cluster-wide Power-up/power-down race avoidance algorithm 176 race avoidance algorithm. 255 The race avoidance algorithm does not provide a way to determine 417 The race avoidance algorithm documented above does not provide a
|
| /linux-4.1.27/Documentation/filesystems/ |
| D | hpfs.txt | 220 Fixed a race-condition when write_inode is called while deleting file 223 Rewritten locking to avoid race-conditions 256 Fixed a possible bitmap race 259 Fixed a nondestructive race in rename 274 Fixed race-condition in buffer code - it is in all filesystems in Linux; 280 Fixed non-crashing race in unlink (Alexander Viro)
|
| D | locks.txt | 46 race and deadlock conditions that the current solution was the only
|
| D | files.txt | 78 that look-up may race with the last put() operation on the
|
| D | mandatory-locking.txt | 11 The Linux implementation is prey to a number of difficult-to-fix race
|
| D | squashfs.txt | 259 associated race conditions.
|
| D | fuse.txt | 173 It is also possible that there's a race between processing the
|
| D | path-lookup.txt | 172 rename seqlock is also used to cover this race in much the same way, by
|
| D | xfs-delayed-logging-design.txt | 603 object, we have a race with CIL being flushed between the check and the pin
|
| /linux-4.1.27/Documentation/ |
| D | DMA-attributes.txt | 22 could race with data DMA. Mapping the memory used for completion 23 indications with DMA_ATTR_WRITE_BARRIER would prevent the race.
|
| D | stable_kernel_rules.txt | 22 - No "theoretical race condition" issues, unless an explanation of how the 23 race can be exploited is also provided.
|
| D | robust-futexes.txt | 58 - it has quite complex locking and race scenarios. The vma-based 104 There is one race possible though: since adding to and removing from the
|
| D | futex-requeue-pi.txt | 92 acquire the rt_mutex as it would open a race window between the
|
| D | printk-formats.txt | 240 For printing dentry name; if we race with d_move(), the name might be
|
| D | unshare.txt | 192 do so will create race conditions and/or oops when trying
|
| D | HOWTO | 488 communication is the lack of discrimination based on gender or race.
|
| D | kernel-docs.txt | 356 Keywords: locks, locking, spinlock, semaphore, atomic, race
|
| D | memory-barriers.txt | 1884 a sleep-unlock race, but the locking primitive needs to resolve
|
| /linux-4.1.27/Documentation/virtual/kvm/ |
| D | locking.txt | 19 What we use to avoid all the race is the SPTE_HOST_WRITEABLE bit and 128 atomically update the spte, the race caused by fast page fault can be avoided,
|
| /linux-4.1.27/Documentation/input/ |
| D | bcm5974.txt | 37 different interfaces of the same usb device. This creates a race condition
|
| /linux-4.1.27/Documentation/power/ |
| D | suspend-and-cpuhotplug.txt | 16 What happens when regular CPU hotplug and Suspend-to-RAM race with each other 246 III. Are there any known problems when regular CPU hotplug and suspend race 260 2. If a regular CPU hotplug stress test happens to race with the freezer due
|
| D | freezing-of-tasks.txt | 126 safeguards against race conditions that might occur in such a case.
|
| D | pci.txt | 752 suspend_noirq() can carry out operations that would cause race conditions to 821 operations that might race with the interrupt handler. 826 it should only be used for performing operations that would lead to race
|
| D | runtime_pm.txt | 668 The PM core does its best to reduce the probability of race conditions between 902 the foo_runtime_suspend() callback may race with foo_read_or_write().
|
| /linux-4.1.27/Documentation/scsi/ |
| D | ChangeLog.ips | 105 0.99.04 - Fix race condition in the passthru mechanism
|
| D | ChangeLog.1992-1997 | 692 against race conditions. 977 active, else return NULL if inactive. Fixes race condition. 1492 * wd7000.c: Make stab at fixing race condition. 1501 * aha1542.c: Fix race condition in aha1542_out. 1824 NOT_READY to a SUGGEST_ABORT. Fix timeout race where time might 1886 (allocate_device): Fix race condition. Allow more space in dma pool 1897 * sd.c: Fix race condition for multiple disks. Use INIT_SCSI_REQUEST 1904 * sr.c: Fix race condition, a la sd.c. Increase the number of retries 1967 with SCint to fix race condition. Use recursion_depth to keep track 1984 Set SCint=NULL when we are done, to remove race condition.
|
| D | aic79xx.txt | 148 - Correct a race condition in our error recovery handler.
|
| D | ChangeLog.lpfc | 382 * Fix race condition in lpfc_do_dpc. If wake_up interrupt occurs 609 potentially call fc_target_unblock which may cause a race in 842 Used host_lock for DPC to avoid race (remove dpc_lock)
|
| /linux-4.1.27/Documentation/sysctl/ |
| D | fs.txt | 165 time-of-check-time-of-use race, most commonly seen in world-writable 185 time-of-check-time-of-use race, most commonly seen in world-writable
|
| D | net.txt | 297 any form of transaction handling. This means that different race scenarios are
|
| /linux-4.1.27/Documentation/ide/ |
| D | ChangeLog.ide-cd.1994-2004 | 54 * Fix a race condition in retrieving error information. 59 * Fix race condition in setting up interrupt handlers
|
| D | ChangeLog.ide-tape.1995-2002 | 90 * Ver 1.2 Jan 1 96 Eliminated pipelined mode race condition. 160 * Ver 1.15 Mar 25 99 Fix SMP race condition by replacing hwgroup
|
| /linux-4.1.27/Documentation/RCU/ |
| D | rculist_nulls.txt | 117 a race (some writer did a delete and/or a move of an object
|
| D | RTFP.txt | 2468 Data-race detector incorporating RCU.
|
| /linux-4.1.27/Documentation/hwmon/ |
| D | submitting-patches | 91 * Make sure there are no race conditions in the probe function. Specifically,
|
| /linux-4.1.27/Documentation/locking/ |
| D | ww-mutex-design.txt | 147 /* we lost out in a seqno race, lock and retry.. */ 180 /* we lost out in a seqno race, lock and retry.. */
|
| D | rt-mutex-design.txt | 502 Isn't this a race condition if the task becomes the new owner? 754 pi_lock is taken. Remember that this is the trick to prevent the race
|
| /linux-4.1.27/Documentation/usb/ |
| D | error-codes.txt | 73 This is because otherwise there would be a race between HCDs updating
|
| /linux-4.1.27/drivers/atm/ |
| D | Kconfig | 60 Note that extended debugging may create certain race conditions 175 Note that extended debugging may create certain race conditions
|
| /linux-4.1.27/Documentation/networking/ |
| D | phonet.txt | 182 intrinsic race condition whereby writability might be lost between the
|
| D | packet_mmap.txt | 499 It doesn't incur in a race condition to first check the status value and
|
| D | ip-sysctl.txt | 1519 race condition where the sender deletes the cached link-layer address
|
| /linux-4.1.27/Documentation/filesystems/cifs/ |
| D | CHANGES | 103 umount race that can cause oops in mount or umount or reconnect. 174 that mount. Fix hang on spinlock in find_writable_file (race when 211 enhancement and eliminates the network race between the mkdir and set 276 vs. rename race which could cause each to hang. Return . and .. even 529 Fix race on tcpStatus field between unmount and reconnection code, causing 673 failure. Fix invalid dentry - race in mkdir when directory gets created
|
| /linux-4.1.27/Documentation/trace/ |
| D | mmiotrace.txt | 116 Setting the page present in the page fault handler has a race condition on SMP
|
| D | ring-buffer-design.txt | 661 This is not a race condition, because the commit page can only be moved
|
| /linux-4.1.27/Documentation/cgroups/ |
| D | memcg_test.txt | 199 race and lock dependency with other cgroup subsystems.
|
| D | unified-hierarchy.txt | 430 access "my cgroup" in a race-free way or make multiple operations
|
| /linux-4.1.27/Documentation/scheduler/ |
| D | completion.txt | 11 race-free solution to this problem. Semantically they are somewhat like a
|
| /linux-4.1.27/Documentation/vm/ |
| D | transhuge.txt | 220 dropped due race with other allocation. Note, it doesn't count 385 refcount without race conditions, put_page has to serialize against
|
| D | unevictable-lru.txt | 230 retries, including the page_unevictable() test. Because such a race is a rare 439 Note that page migration can race with mlocking or munlocking of the same page. 450 list because of a race between munlock and migration, page migration uses the
|
| D | cleancache.txt | 180 a great deal of race conditions and potential coherency issues
|
| D | frontswap.txt | 216 required to ensure the dynamicity of the backend and to avoid thorny race
|
| D | numa_memory_policy.txt | 345 potential race, the shared policy infrastructure adds an extra reference
|
| /linux-4.1.27/drivers/edac/ |
| D | Kconfig | 99 error mechanism won't work well, as BIOS will race with OS, while
|
| /linux-4.1.27/Documentation/security/ |
| D | credentials.txt | 421 get_cred() as this may race with commit_cred().
|
| /linux-4.1.27/Documentation/filesystems/configfs/ |
| D | configfs.txt | 339 to see the tree created by the subsystem. This can race with configfs'
|
| /linux-4.1.27/Documentation/PCI/ |
| D | pci.txt | 404 2) MSI avoids DMA/IRQ race conditions. DMA to host memory is guaranteed
|
| /linux-4.1.27/lib/ |
| D | Kconfig.debug | 993 timing: if a race and a resulting deadlock is possible 994 theoretically (no matter how unlikely the race scenario
|
| /linux-4.1.27/drivers/scsi/aic7xxx/ |
| D | aic79xx.reg | 195 * the race for the command to
|
| D | aic79xx.seq | 1883 * have lost the race (e.g. host paused us) and our attempts
|
| /linux-4.1.27/Documentation/virtual/uml/ |
| D | UserModeLinux-HOWTO.txt | 3893 This is a syslogd bug. There's a race between a parent process
|