Home
last modified time | relevance | path

Searched refs:accesses (Results 1 – 25 of 209) sorted by relevance

123456789

/linux/tools/perf/Documentation/
H A Dperf-c2c.txt37 for cachelines with highest contention - highest number of HITM accesses.
233 - cacheline percentage of all Remote/Local HITM accesses
236 - cacheline percentage of all peer accesses
245 - sum of all cachelines accesses
248 - sum of all load accesses
251 - sum of all store accesses
254 L1Hit - store accesses that hit L1
255 L1Miss - store accesses that missed L1
256 N/A - store accesses with memory level is not available
262 - count of LLC load accesses, includes LLC hits and LLC HITMs
[all …]
/linux/tools/memory-model/Documentation/
H A Dordering.txt15 2. Ordered memory accesses. These operations order themselves
16 against some or all of the CPU's prior accesses or some or all
17 of the CPU's subsequent accesses, depending on the subcategory
20 3. Unordered accesses, as the name indicates, have no ordering
48 a device driver, which must correctly order accesses to a physical
68 accesses against all subsequent accesses from the viewpoint of all CPUs.
89 CPU's accesses into three groups:
245 The Linux kernel provides a wide variety of ordered memory accesses:
264 of the CPU's prior memory accesses. Release operations often provide
323 memory accesses. Acquire operations often provide improved performance
[all …]
H A Daccess-marking.txt5 normal accesses to shared memory, that is "normal" as in accesses that do
7 document these accesses, both with comments and with special assertions
18 1. Plain C-language accesses (unmarked), for example, "a = b;"
39 Neither plain C-language accesses nor data_race() (#1 and #2 above) place
46 C-language accesses. It is permissible to combine #2 and #3, for example,
51 C-language accesses, but marking all accesses involved in a given data
60 data_race() and even plain C-language accesses is preferable to
88 reads can enable better checking of the remaining accesses implementing
135 the other accesses to the relevant shared variables. But please note
172 Here are some example situations where plain C-language accesses should
[all …]
H A Dglossary.txt83 each pair of memory accesses, the outcome where r0, r1, and r2
118 its CPU's prior accesses with all of that CPU's subsequent
119 accesses, or a marked access such as atomic_add_return()
120 that orders all of its CPU's prior accesses, itself, and
121 all of its CPU's subsequent accesses.
123 Happens-Before (hb): A relation between two accesses in which LKMM
134 data between two CPUs requires that both CPUs their accesses.
H A Dexplanation.txt87 factors such as DMA and mixed-size accesses.) But on multiprocessor
88 systems, with multiple CPUs making concurrent accesses to shared
141 This pattern of memory accesses, where one CPU stores values to two
152 accesses by the CPUs.
277 In short, if a memory model requires certain accesses to be ordered,
279 if those accesses would form a cycle, then the memory model predicts
306 Atomic read-modify-write accesses, such as atomic_inc() or xchg(),
313 logical computations, control-flow instructions, or accesses to
343 po-loc is a sub-relation of po. It links two memory accesses when the
358 that add memory accesses, eliminate accesses, combine them, split them
[all …]
H A Dcheatsheet.txt34 SELF: Orders self, as opposed to accesses before and/or after
35 SV: Orders later accesses to the same variable
/linux/Documentation/i2c/
H A Di2c-topology.rst83 This means that accesses to D2 are lockout out for the full duration
84 of the entire operation. But accesses to D3 are possibly interleaved
165 This means that accesses to both D2 and D3 are locked out for the full
231 When device D1 is accessed, accesses to D2 are locked out for the
233 are locked). But accesses to D3 and D4 are possibly interleaved at
236 Accesses to D3 locks out D1 and D2, but accesses to D4 are still possibly
254 When device D1 is accessed, accesses to D2 and D3 are locked out
256 root adapter). But accesses to D4 are possibly interleaved at any
267 mux. In that case, any interleaved accesses to D4 might close M2
288 When D1 is accessed, accesses to D2 are locked out for the full
[all …]
/linux/Documentation/core-api/
H A Dunaligned-memory-access.rst15 unaligned accesses, why you need to write code that doesn't cause them,
22 Unaligned memory accesses occur when you try to read N bytes of data starting
59 - Some architectures are able to perform unaligned memory accesses
61 - Some architectures raise processor exceptions when unaligned accesses
64 - Some architectures raise processor exceptions when unaligned accesses
72 memory accesses to happen, your code will not work correctly on certain
103 to pad structures so that accesses to fields are suitably aligned (assuming
136 lead to unaligned accesses when accessing fields that do not satisfy
183 Here is another example of some code that could cause unaligned accesses::
192 This code will cause unaligned accesses every time the data parameter points
[all …]
/linux/drivers/acpi/acpica/
H A Dexprep.c65 u32 accesses; in acpi_ex_generate_access() local
115 accesses = field_end_offset - field_start_offset; in acpi_ex_generate_access()
124 accesses)); in acpi_ex_generate_access()
128 if (accesses <= 1) { in acpi_ex_generate_access()
140 if (accesses < minimum_accesses) { in acpi_ex_generate_access()
141 minimum_accesses = accesses; in acpi_ex_generate_access()
/linux/arch/mips/kvm/
H A DKconfig32 bool "Maintain counters for COP0 accesses"
35 Maintain statistics for Guest COP0 accesses.
36 A histogram of COP0 accesses is printed when the VM is
/linux/Documentation/ABI/testing/
H A Dsysfs-fs-ubifs8 This counter keeps track of the number of accesses of nodes
20 This counter keeps track of the number of accesses of nodes
32 This counter keeps track of the number of accesses of nodes
/linux/Documentation/admin-guide/hw-vuln/
H A Dspecial-register-buffer-data-sampling.rst8 infer values returned from special register accesses. Special register
9 accesses are accesses to off core registers. According to Intel's evaluation,
70 accesses from other logical processors will be delayed until the special
82 #. Executing RDRAND, RDSEED or EGETKEY will delay memory accesses from other
84 legacy locked cache-line-split accesses.
91 processors memory accesses. The opt-out mechanism does not affect Intel SGX
/linux/Documentation/arch/riscv/
H A Dhwprobe.rst297 the performance of misaligned scalar native word accesses on the selected set
301 misaligned scalar accesses is unknown.
304 accesses are emulated via software, either in or below the kernel. These
305 accesses are always extremely slow.
308 word sized accesses are slower than the equivalent quantity of byte
309 accesses. Misaligned accesses may be supported directly in hardware, or
313 word sized accesses are faster than the equivalent quantity of byte
314 accesses.
317 accesses are not supported at all and will generate a misaligned address
329 performance of misaligned vector accesses on the selected set of processors.
[all …]
/linux/Documentation/devicetree/bindings/
H A Dcommon-properties.txt13 - big-endian: Boolean; force big endian register accesses
16 - little-endian: Boolean; force little endian register accesses
19 - native-endian: Boolean; always use register accesses matched to the
30 default to LE for their MMIO accesses.
/linux/tools/memory-model/
H A Dlinux-kernel.cat183 (* Plain accesses and data races *)
186 (* Warn about plain writes and marked accesses in the same region *)
187 let mixed-accesses = ([Plain & W] ; (po-loc \ barrier) ; [Marked]) |
189 flag ~empty mixed-accesses as mixed-accesses
196 (* Boundaries for lifetimes of plain accesses *)
204 (* Visibility and executes-before for plain accesses *)
214 (* Coherence requirements for plain accesses *)
/linux/Documentation/hwmon/
H A Dw83627hf.rst5 * Winbond W83627HF (ISA accesses ONLY)
41 This driver implements support for ISA accesses *only* for
45 This driver supports ISA accesses, which should be more reliable
46 than i2c accesses. Also, for Tyan boards which contain both a
51 If you really want i2c accesses for these Super I/O chips,
/linux/Documentation/devicetree/bindings/mtd/
H A Dgpio-control-nand.txt10 resource describes the data bus connected to the NAND flash and all accesses
23 location used to guard against bus reordering with regards to accesses to
26 read to ensure that the GPIO accesses have completed.
/linux/tools/memory-model/litmus-tests/
H A Ddep+plain.litmus6 * This litmus test demonstrates that in LKMM, plain accesses
7 * carry dependencies much like accesses to registers:
H A DLB+unlocklockonceonce+poacquireonce.litmus6 * If two locked critical sections execute on the same CPU, all accesses
7 * in the first must execute before any accesses in the second, even if the
H A DMP+porevlocks.litmus9 * given lock), a CPU is not only guaranteed to see the accesses that other
11 * see all prior accesses by those other CPUs.
H A DMP+polocks.litmus9 * given lock), a CPU is not only guaranteed to see the accesses that other
11 * to see all prior accesses by those other CPUs.
H A DREADME40 litmus test is visible to an external process whose accesses are
149 spin_lock() sufficient to make ordering apparent to accesses
158 to make ordering apparent to accesses by a process that does
181 Each class defines the pattern of accesses and of the variables accessed.
214 accesses with descriptions of the second access in the pair.
228 to a different variable ("d"), and both accesses are reads ("RR").
254 The descriptors that describe connections between consecutive accesses
/linux/Documentation/dev-tools/
H A Dkasan.rst118 asynchronously checked accesses (including reads).
147 checks the write (store) accesses only or all accesses (default: ``off``).
159 of allocations chosen by sampling and thus miss bad accesses to these
332 memory accesses are valid or not by checking corresponding shadow memory.
364 emits callbacks to check memory accesses; and inline, which performs the shadow
370 Software Tag-Based KASAN uses 0xFF as a match-all pointer tag (accesses through
391 Hardware Tag-Based KASAN uses 0xFF as a match-all pointer tag (accesses through
423 declares all memory accesses as permitted.
428 This allows detection of invalid accesses to module globals, for example.
470 Ignoring accesses
[all …]
/linux/Documentation/process/
H A Dvolatile-considered-harmful.rst39 meaning that data accesses will not be optimized across them. So the
43 accesses to that data.
53 registers. Within the kernel, register accesses, too, should be protected
55 accesses within a critical section. But, within the kernel, I/O memory
56 accesses are always done through accessor functions; accessing I/O memory
/linux/Documentation/
H A Dmemory-barriers.txt76 - Acquires vs memory accesses.
155 The set of accesses as seen by the memory system in the middle can be arranged
228 (*) On any given CPU, dependent memory accesses will be issued in order, with
288 (*) It _must_ be assumed that overlapping memory accesses may be merged or
400 implicit in all marked accesses. For more up-to-date information,
503 ACQUIRE on a given variable, all memory accesses preceding any prior
505 words, within a given variable's critical section, all accesses of all
534 (*) There is no guarantee that any of the memory accesses specified before a
537 access queue that accesses of the appropriate type may not cross.
542 of the first CPU's accesses occur, but see the next point:
[all …]

123456789