Home
last modified time | relevance | path

Searched refs:locking (Results 1 – 25 of 208) sorted by relevance

123456789

/linux/tools/memory-model/Documentation/
H A Dsimple.txt39 This approach is called "code locking".
41 Code locking can severely limit both performance and scalability, so it
47 One of the advantages of locking is that, in happy contrast with the
48 year 1981, almost all kernel developers are very familiar with locking.
52 Please use the standard locking primitives provided by the kernel rather
58 locking functions must carefully prevent both the CPU and the compiler
59 from moving code in either direction across the locking function.
86 Data locking
89 With code locking, we use single-threaded code execution to guarantee
104 As the number of buckets increases, data locking scales naturally.
[all …]
H A Dlocking.txt16 The basic rule of locking is worth repeating:
82 locking basic rule extend across multiple acquisitions of a given lock
90 double-checked locking work correctly, This litmus test illustrates
93 /* See Documentation/litmus-tests/locking/DCL-broken.litmus. */
118 /* See Documentation/litmus-tests/locking/DCL-fixed.litmus. */
151 It is not necessarily the case that accesses ordered by locking will be
232 /* See Documentation/litmus-tests/locking/RM-fixed.litmus. */
269 /* See Documentation/litmus-tests/locking/RM-broken.litmus. */
/linux/fs/gfs2/
H A DKconfig22 the locking module below. Documentation and utilities for GFS2 can
29 bool "GFS2 DLM locking"
33 Multiple node locking module for GFS2
35 Most users of GFS2 will require this. It provides the locking
/linux/Documentation/litmus-tests/
H A DREADME41 locking (/locking directory)
45 Demonstrates that double-checked locking needs more than just
49 Demonstrates corrected double-checked locking that uses
54 Demonstrates problems with "roach motel" locking, where code is
/linux/Documentation/locking/
H A Dlockdep-design.rst1 Runtime locking correctness validator
14 respect to locking rules, even if the locks may have multiple (possibly
51 where the n STATEs are coded in kernel/locking/lockdep_states.h and as of
61 When locking rules are violated, these usage bits are presented in the
62 locking error messages, inside curlies, with a total of 2 * n STATEs bits.
152 i.e., there can be any other locking sequence between the acquire-lock
168 The above rules are enforced for any locking sequence that occurs in the
192 Exception: Nested data dependencies leading to nested locking
202 An example of such an object hierarchy that results in "nested locking"
207 automatically detect this natural ordering, as the locking rule behind
[all …]
H A Dpreempt-locking.rst12 A preemptible kernel creates new locking issues. The issues are the same as
14 kernel model leverages existing SMP locking mechanisms. Thus, the kernel
15 requires explicit additional locking for very few additional situations.
32 First, since the data is per-CPU, it may not have explicit SMP locking, but
132 in doubt, rely on locking or explicit preemption disabling.
H A Dpi-futex.rst18 recursive locking, etc.
26 improve the statistical distribution of locking related application
54 to think about how to offer the option of a deterministic locking
62 problems as other user-space locking constructs). Fact is, pretty much
122 Documentation/locking/rt-mutex.rst.
H A Dlocktorture.rst9 that runs torture tests on core kernel locking primitives. The kernel
76 Torture-framework (RCU + locking)
145 -only- be positive if there is a bug in the locking primitive's
167 were no locking failures, CPU-hotplug problems were detected.
H A Drt-mutex.rst7 (PTHREAD_PRIO_INHERIT). [See Documentation/locking/pi-futex.rst for more details
41 locking overhead when locking an uncontended mutex or unlocking a mutex
/linux/Documentation/translations/zh_CN/locking/
H A Dindex.rst4 :Original: Documentation/locking/index.rst
30 * preempt-locking
H A Dmutex-design.rst4 :Original: Documentation/locking/mutex-design.rst
37 kernel/locking/mutex.c中实现。这些锁使用一个原子变量(->owner)来跟踪
/linux/Documentation/litmus-tests/locking/
H A DDCL-broken.litmus6 * This litmus test demonstrates more than just locking is required to
7 * correctly implement double-checked locking.
H A DDCL-fixed.litmus6 * This litmus test demonstrates that double-checked locking can be
8 * in addition to the locking.
/linux/Documentation/filesystems/
H A Dlocking.rst5 The text below describes the locking rules for VFS-related methods.
7 prototypes or locking protocols - update this file. And update the relevant
37 locking rules:
95 locking rules:
135 See Documentation/filesystems/directory-locking.rst for more detailed discussion
136 of the locking scheme for directory operations.
152 locking rules:
186 locking rules:
221 writes to quota files with quotas on). For other details about locking
233 locking rules:
[all …]
H A Dgfs2.rst15 GFS2 uses interchangeable inter-node locking mechanisms, the currently
22 - uses the distributed lock manager (dlm) for inter-node locking.
/linux/Documentation/gpu/
H A Ddrm-vm-bind-locking.rst4 VM_BIND locking
7 This document attempts to describe what's needed to get VM_BIND locking right,
8 including the userptr mmu_notifier locking. It also discusses some
11 implementation. In addition, there is a section describing the VM_BIND locking
18 set of helpers implements much, but not all of the locking described
53 allows deadlock-safe locking of multiple dma_resvs in arbitrary
69 Locks and locking order
77 The following locks and locking orders are used:
111 lists are manipulated. However, to avoid locking order violations
128 over the gpu_vm_bo and gpu_vma lists to avoid locking-order violations.
[all …]
H A Dimplementation_guidelines.rst10 drm-vm-bind-locking
/linux/Documentation/sound/cards/
H A Dimg-spdif-in.rst43 This control is used to modify the locking/jitter rejection characteristics
44 of the block. Larger values increase the locking range, but reduce jitter
/linux/Documentation/kernel-hacking/
H A Dindex.rst11 locking
/linux/Documentation/process/
H A Dvolatile-considered-harmful.rst35 If all the code follows the locking rules, the value of shared_data cannot
45 If shared_data were declared volatile, the locking would still be
49 volatile. When dealing with shared data, proper locking makes volatile
87 locking. So jiffies can be volatile, but the addition of other
/linux/Documentation/driver-api/soundwire/
H A Dindex.rst11 locking
/linux/Documentation/pcmcia/
H A Dindex.rst12 locking
/linux/Documentation/translations/zh_CN/kernel-hacking/
H A Dindex.rst22 - locking
/linux/Documentation/virt/kvm/
H A Dindex.rst19 locking
/linux/Documentation/translations/it_IT/kernel-hacking/
H A Dindex.rst16 locking

123456789