| /linux/tools/perf/Documentation/ |
| H A D | perf-c2c.txt | 37 for cachelines with highest contention - highest number of HITM accesses. 233 - cacheline percentage of all Remote/Local HITM accesses 236 - cacheline percentage of all peer accesses 245 - sum of all cachelines accesses 248 - sum of all load accesses 251 - sum of all store accesses 254 L1Hit - store accesses that hit L1 255 L1Miss - store accesses that missed L1 256 N/A - store accesses with memory level is not available 262 - count of LLC load accesses, includes LLC hits and LLC HITMs [all …]
|
| /linux/tools/memory-model/Documentation/ |
| H A D | ordering.txt | 15 2. Ordered memory accesses. These operations order themselves 16 against some or all of the CPU's prior accesses or some or all 17 of the CPU's subsequent accesses, depending on the subcategory 20 3. Unordered accesses, as the name indicates, have no ordering 48 a device driver, which must correctly order accesses to a physical 68 accesses against all subsequent accesses from the viewpoint of all CPUs. 89 CPU's accesses into three groups: 245 The Linux kernel provides a wide variety of ordered memory accesses: 264 of the CPU's prior memory accesses. Release operations often provide 323 memory accesses. Acquire operations often provide improved performance [all …]
|
| H A D | access-marking.txt | 5 normal accesses to shared memory, that is "normal" as in accesses that do 7 document these accesses, both with comments and with special assertions 18 1. Plain C-language accesses (unmarked), for example, "a = b;" 39 Neither plain C-language accesses nor data_race() (#1 and #2 above) place 46 C-language accesses. It is permissible to combine #2 and #3, for example, 51 C-language accesses, but marking all accesses involved in a given data 60 data_race() and even plain C-language accesses is preferable to 88 reads can enable better checking of the remaining accesses implementing 135 the other accesses to the relevant shared variables. But please note 172 Here are some example situations where plain C-language accesses should [all …]
|
| H A D | glossary.txt | 83 each pair of memory accesses, the outcome where r0, r1, and r2 118 its CPU's prior accesses with all of that CPU's subsequent 119 accesses, or a marked access such as atomic_add_return() 120 that orders all of its CPU's prior accesses, itself, and 121 all of its CPU's subsequent accesses. 123 Happens-Before (hb): A relation between two accesses in which LKMM 134 data between two CPUs requires that both CPUs their accesses.
|
| /linux/Documentation/i2c/ |
| H A D | i2c-topology.rst | 83 This means that accesses to D2 are lockout out for the full duration 84 of the entire operation. But accesses to D3 are possibly interleaved 165 This means that accesses to both D2 and D3 are locked out for the full 231 When device D1 is accessed, accesses to D2 are locked out for the 233 are locked). But accesses to D3 and D4 are possibly interleaved at 236 Accesses to D3 locks out D1 and D2, but accesses to D4 are still possibly 254 When device D1 is accessed, accesses to D2 and D3 are locked out 256 root adapter). But accesses to D4 are possibly interleaved at any 267 mux. In that case, any interleaved accesses to D4 might close M2 288 When D1 is accessed, accesses to D2 are locked out for the full [all …]
|
| /linux/Documentation/dev-tools/ |
| H A D | kcsan.rst | 78 the racing thread, but could also occur due to e.g. DMA accesses. Such reports 85 It may be desirable to disable data race detection for specific accesses, 90 any data races due to accesses in ``expr`` should be ignored and resulting 95 to document that all data races due to accesses to a variable are intended 138 accesses are aligned writes up to word size. 200 In an execution, two memory accesses form a *data race* if they *conflict*, 246 KCSAN relies on observing that two accesses happen concurrently. Crucially, we 253 address set up, and then observe the watchpoint to fire, two accesses to the 263 compiler instrumenting plain accesses. For each instrumented plain access: 274 To detect data races between plain and marked accesses, KCSAN also annotates [all …]
|
| H A D | kasan.rst | 118 asynchronously checked accesses (including reads). 147 checks the write (store) accesses only or all accesses (default: ``off``). 159 of allocations chosen by sampling and thus miss bad accesses to these 332 memory accesses are valid or not by checking corresponding shadow memory. 364 emits callbacks to check memory accesses; and inline, which performs the shadow 370 Software Tag-Based KASAN uses 0xFF as a match-all pointer tag (accesses through 391 Hardware Tag-Based KASAN uses 0xFF as a match-all pointer tag (accesses through 423 declares all memory accesses as permitted. 428 This allows detection of invalid accesses to module globals, for example. 470 Ignoring accesses [all …]
|
| /linux/Documentation/core-api/ |
| H A D | unaligned-memory-access.rst | 15 unaligned accesses, why you need to write code that doesn't cause them, 22 Unaligned memory accesses occur when you try to read N bytes of data starting 59 - Some architectures are able to perform unaligned memory accesses 61 - Some architectures raise processor exceptions when unaligned accesses 64 - Some architectures raise processor exceptions when unaligned accesses 72 memory accesses to happen, your code will not work correctly on certain 103 to pad structures so that accesses to fields are suitably aligned (assuming 136 lead to unaligned accesses when accessing fields that do not satisfy 183 Here is another example of some code that could cause unaligned accesses:: 192 This code will cause unaligned accesses every time the data parameter points [all …]
|
| /linux/drivers/acpi/acpica/ |
| H A D | exprep.c | 65 u32 accesses; in acpi_ex_generate_access() local 115 accesses = field_end_offset - field_start_offset; in acpi_ex_generate_access() 124 accesses)); in acpi_ex_generate_access() 128 if (accesses <= 1) { in acpi_ex_generate_access() 140 if (accesses < minimum_accesses) { in acpi_ex_generate_access() 141 minimum_accesses = accesses; in acpi_ex_generate_access()
|
| /linux/arch/mips/kvm/ |
| H A D | Kconfig | 32 bool "Maintain counters for COP0 accesses" 35 Maintain statistics for Guest COP0 accesses. 36 A histogram of COP0 accesses is printed when the VM is
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-fs-ubifs | 8 This counter keeps track of the number of accesses of nodes 20 This counter keeps track of the number of accesses of nodes 32 This counter keeps track of the number of accesses of nodes
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | special-register-buffer-data-sampling.rst | 8 infer values returned from special register accesses. Special register 9 accesses are accesses to off core registers. According to Intel's evaluation, 70 accesses from other logical processors will be delayed until the special 82 #. Executing RDRAND, RDSEED or EGETKEY will delay memory accesses from other 84 legacy locked cache-line-split accesses. 91 processors memory accesses. The opt-out mechanism does not affect Intel SGX
|
| /linux/Documentation/arch/riscv/ |
| H A D | hwprobe.rst | 297 the performance of misaligned scalar native word accesses on the selected set 301 misaligned scalar accesses is unknown. 304 accesses are emulated via software, either in or below the kernel. These 305 accesses are always extremely slow. 308 word sized accesses are slower than the equivalent quantity of byte 309 accesses. Misaligned accesses may be supported directly in hardware, or 313 word sized accesses are faster than the equivalent quantity of byte 314 accesses. 317 accesses are not supported at all and will generate a misaligned address 329 performance of misaligned vector accesses on the selected set of processors. [all …]
|
| /linux/Documentation/devicetree/bindings/ |
| H A D | common-properties.txt | 13 - big-endian: Boolean; force big endian register accesses 16 - little-endian: Boolean; force little endian register accesses 19 - native-endian: Boolean; always use register accesses matched to the 30 default to LE for their MMIO accesses.
|
| /linux/Documentation/hwmon/ |
| H A D | w83627hf.rst | 5 * Winbond W83627HF (ISA accesses ONLY) 41 This driver implements support for ISA accesses *only* for 45 This driver supports ISA accesses, which should be more reliable 46 than i2c accesses. Also, for Tyan boards which contain both a 51 If you really want i2c accesses for these Super I/O chips,
|
| /linux/Documentation/devicetree/bindings/mtd/ |
| H A D | gpio-control-nand.txt | 10 resource describes the data bus connected to the NAND flash and all accesses 23 location used to guard against bus reordering with regards to accesses to 26 read to ensure that the GPIO accesses have completed.
|
| /linux/tools/memory-model/ |
| H A D | linux-kernel.cat | 183 (* Plain accesses and data races *) 186 (* Warn about plain writes and marked accesses in the same region *) 187 let mixed-accesses = ([Plain & W] ; (po-loc \ barrier) ; [Marked]) | 189 flag ~empty mixed-accesses as mixed-accesses 196 (* Boundaries for lifetimes of plain accesses *) 204 (* Visibility and executes-before for plain accesses *) 214 (* Coherence requirements for plain accesses *)
|
| /linux/tools/memory-model/litmus-tests/ |
| H A D | dep+plain.litmus | 6 * This litmus test demonstrates that in LKMM, plain accesses 7 * carry dependencies much like accesses to registers:
|
| H A D | LB+unlocklockonceonce+poacquireonce.litmus | 6 * If two locked critical sections execute on the same CPU, all accesses 7 * in the first must execute before any accesses in the second, even if the
|
| H A D | MP+polocks.litmus | 9 * given lock), a CPU is not only guaranteed to see the accesses that other 11 * to see all prior accesses by those other CPUs.
|
| H A D | MP+porevlocks.litmus | 9 * given lock), a CPU is not only guaranteed to see the accesses that other 11 * see all prior accesses by those other CPUs.
|
| /linux/Documentation/driver-api/ |
| H A D | device-io.rst | 30 part of the CPU's address space is interpreted not as accesses to 31 memory, but as accesses to a device. Some architectures define devices 54 historical accident, these are named byte, word, long and quad accesses. 55 Both read and write accesses are supported; there is no prefetch support 127 addresses is generally not as fast as accesses to the memory mapped 137 allow 8-bit, 16-bit and 32-bit accesses; also known as byte, word and 143 that accesses to their ports are slowed down. This functionality is 172 MMIO accesses and DMA accesses as well as fixed endianness for accessing 223 on 32-bit architectures but allow two consecutive 32-bit accesses instead. 238 multiple consecutive accesses can be combined on the bus. In portable code, it [all …]
|
| /linux/lib/ |
| H A D | Kconfig.kcsan | 39 distinguish them from other plain accesses. This is currently 193 plain accesses by default (depending on !KCSAN_STRICT) reduce the 194 ability to detect any data races invoving reordered accesses, in 217 races due to conflicts where the only plain accesses are aligned 224 bool "Do not instrument marked atomic accesses" 227 Never instrument marked atomic accesses. This option can be used for 236 accesses, conflicting marked atomic reads and plain writes will not
|
| /linux/Documentation/process/ |
| H A D | volatile-considered-harmful.rst | 39 meaning that data accesses will not be optimized across them. So the 43 accesses to that data. 53 registers. Within the kernel, register accesses, too, should be protected 55 accesses within a critical section. But, within the kernel, I/O memory 56 accesses are always done through accessor functions; accessing I/O memory
|
| /linux/arch/riscv/ |
| H A D | Kconfig | 948 This determines the level of support for unaligned accesses. This 958 speed of unaligned accesses. This probing will dynamically determine 959 the speed of unaligned accesses on the underlying system. If unaligned 960 memory accesses trap into the kernel as they are not supported by the 961 system, the kernel will emulate the unaligned accesses to preserve the 968 If unaligned memory accesses trap into the kernel as they are not 970 accesses to preserve the UABI. When the underlying system does support 971 unaligned accesses, the unaligned accesses are assumed to be slow. 974 bool "Assume the system supports slow unaligned memory accesses" 977 Assume that the system supports slow unaligned memory accesses. The [all …]
|