/kernel/linux/linux-5.10/tools/perf/Documentation/ |
D | perf-c2c.txt | 32 for cachelines with highest contention - highest number of HITM accesses. 178 - cacheline percentage of all Remote/Local HITM accesses 184 - sum of all cachelines accesses 187 - sum of all load accesses 190 - sum of all store accesses 193 L1Hit - store accesses that hit L1 194 L1Miss - store accesses that missed L1 200 - count of LLC load accesses, includes LLC hits and LLC HITMs 203 - count of remote load accesses, includes remote hits and remote HITMs 206 - count of local and remote DRAM accesses [all …]
|
/kernel/linux/linux-5.10/include/linux/ |
D | kcsan-checks.h | 51 * Accesses within the atomic region may appear to race with other accesses but 64 * Accesses within the atomic region may appear to race with other accesses but 75 * kcsan_atomic_next - consider following accesses as atomic 77 * Force treating the next n memory accesses for the current context as atomic 80 * @n: number of following memory accesses to treat as atomic. 87 * Set the access mask for all accesses for the current context if non-zero. 116 * Scoped accesses are implemented by appending @sa to an internal list for the 172 * Only use these to disable KCSAN for accesses in the current compilation unit; 237 * Check for atomic accesses: if atomic accesses are not ignored, this simply 261 * readers, to avoid data races, all these accesses must be marked; even [all …]
|
/kernel/linux/linux-5.10/Documentation/core-api/ |
D | unaligned-memory-access.rst | 2 Unaligned Memory Accesses 15 unaligned accesses, why you need to write code that doesn't cause them, 22 Unaligned memory accesses occur when you try to read N bytes of data starting 59 - Some architectures are able to perform unaligned memory accesses 61 - Some architectures raise processor exceptions when unaligned accesses 64 - Some architectures raise processor exceptions when unaligned accesses 72 memory accesses to happen, your code will not work correctly on certain 103 to pad structures so that accesses to fields are suitably aligned (assuming 136 lead to unaligned accesses when accessing fields that do not satisfy 183 Here is another example of some code that could cause unaligned accesses:: [all …]
|
/kernel/linux/linux-5.10/Documentation/driver-api/ |
D | device-io.rst | 10 Bus-Independent Device Accesses 30 part of the CPU's address space is interpreted not as accesses to 31 memory, but as accesses to a device. Some architectures define devices 54 historical accident, these are named byte, word, long and quad accesses. 55 Both read and write accesses are supported; there is no prefetch support 119 Port Space Accesses 127 addresses is generally not as fast as accesses to the memory mapped 136 Accesses to this space are provided through a set of functions which 137 allow 8-bit, 16-bit and 32-bit accesses; also known as byte, word and 143 that accesses to their ports are slowed down. This functionality is
|
/kernel/linux/linux-5.10/Documentation/dev-tools/ |
D | kcsan.rst | 94 instrumentation or e.g. DMA accesses. These reports will only be generated if 100 It may be desirable to disable data race detection for specific accesses, 105 any data races due to accesses in ``expr`` should be ignored and resulting 140 accesses are aligned writes up to word size. 190 In an execution, two memory accesses form a *data race* if they *conflict*, 194 Accesses and Data Races" in the LKMM`_. 196 .. _"Plain Accesses and Data Races" in the LKMM: https://git.kernel.org/pub/scm/linux/kernel/git/to… 236 KCSAN relies on observing that two accesses happen concurrently. Crucially, we 243 address set up, and then observe the watchpoint to fire, two accesses to the 253 compiler instrumenting plain accesses. For each instrumented plain access: [all …]
|
/kernel/linux/linux-5.10/arch/arm/include/uapi/asm/ |
D | byteorder.h | 6 * that byte accesses appear as: 8 * and word accesses (data or instruction) appear as: 11 * When in big endian mode, byte accesses appear as: 13 * and word accesses (data or instruction) appear as:
|
D | swab.h | 6 * that byte accesses appear as: 8 * and word accesses (data or instruction) appear as: 11 * When in big endian mode, byte accesses appear as: 13 * and word accesses (data or instruction) appear as:
|
/kernel/linux/linux-5.10/tools/perf/pmu-events/arch/nds32/n13/ |
D | atcpmu.json | 75 "PublicDescription": "uITLB accesses", 78 "BriefDescription": "V3 uITLB accesses" 81 "PublicDescription": "uDTLB accesses", 84 "BriefDescription": "V3 uDTLB accesses" 87 "PublicDescription": "MTLB accesses", 90 "BriefDescription": "V3 MTLB accesses" 108 "BriefDescription": "V3 ILM accesses"
|
/kernel/linux/linux-5.10/Documentation/i2c/ |
D | i2c-topology.rst | 152 This means that accesses to D2 are lockout out for the full duration 153 of the entire operation. But accesses to D3 are possibly interleaved 216 This means that accesses to both D2 and D3 are locked out for the full 261 When device D1 is accessed, accesses to D2 are locked out for the 263 are locked). But accesses to D3 and D4 are possibly interleaved at 264 any point. Accesses to D3 locks out D1 and D2, but accesses to D4 282 When device D1 is accessed, accesses to D2 and D3 are locked out 284 root adapter). But accesses to D4 are possibly interleaved at any 295 mux. In that case, any interleaved accesses to D4 might close M2 316 When D1 is accessed, accesses to D2 are locked out for the full [all …]
|
/kernel/linux/linux-5.10/tools/perf/pmu-events/arch/x86/amdzen1/ |
D | recommended.json | 12 "BriefDescription": "All L1 Data Cache Accesses", 17 "BriefDescription": "All L2 Cache Accesses", 24 "BriefDescription": "L2 Cache Accesses from L1 Instruction Cache Misses (including prefetch)", 30 "BriefDescription": "L2 Cache Accesses from L1 Data Cache Misses (including prefetch)", 35 "BriefDescription": "L2 Cache Accesses from L2 HWPF", 90 "BriefDescription": "L3 Accesses",
|
/kernel/linux/linux-5.10/tools/perf/pmu-events/arch/x86/amdzen2/ |
D | recommended.json | 12 "BriefDescription": "All L1 Data Cache Accesses", 17 "BriefDescription": "All L2 Cache Accesses", 24 "BriefDescription": "L2 Cache Accesses from L1 Instruction Cache Misses (including prefetch)", 30 "BriefDescription": "L2 Cache Accesses from L1 Data Cache Misses (including prefetch)", 35 "BriefDescription": "L2 Cache Accesses from L2 HWPF", 90 "BriefDescription": "L3 Accesses",
|
/kernel/linux/linux-5.10/arch/arm/include/asm/ |
D | swab.h | 6 * that byte accesses appear as: 8 * and word accesses (data or instruction) appear as: 11 * When in big endian mode, byte accesses appear as: 13 * and word accesses (data or instruction) appear as:
|
/kernel/linux/linux-5.10/tools/memory-model/Documentation/ |
D | explanation.txt | 32 24. PLAIN ACCESSES AND DATA RACES 86 factors such as DMA and mixed-size accesses.) But on multiprocessor 87 systems, with multiple CPUs making concurrent accesses to shared 140 This pattern of memory accesses, where one CPU stores values to two 151 accesses by the CPUs. 276 In short, if a memory model requires certain accesses to be ordered, 278 if those accesses would form a cycle, then the memory model predicts 305 Atomic read-modify-write accesses, such as atomic_inc() or xchg(), 312 logical computations, control-flow instructions, or accesses to 342 po-loc is a sub-relation of po. It links two memory accesses when the [all …]
|
/kernel/linux/linux-5.10/Documentation/admin-guide/hw-vuln/ |
D | special-register-buffer-data-sampling.rst | 7 infer values returned from special register accesses. Special register 8 accesses are accesses to off core registers. According to Intel's evaluation, 69 accesses from other logical processors will be delayed until the special 81 #. Executing RDRAND, RDSEED or EGETKEY will delay memory accesses from other 83 legacy locked cache-line-split accesses. 90 processors memory accesses. The opt-out mechanism does not affect Intel SGX
|
/kernel/linux/linux-5.10/tools/perf/pmu-events/arch/arm64/hisilicon/hip08/ |
D | uncore-l3c.json | 5 "BriefDescription": "Total read accesses", 6 "PublicDescription": "Total read accesses", 12 "BriefDescription": "Total write accesses", 13 "PublicDescription": "Total write accesses",
|
/kernel/linux/linux-5.10/lib/ |
D | Kconfig.ubsan | 45 array accesses, where the array size is known at compile time. 59 Enabling this option detects errors due to accesses through a 93 This option enables the check of unaligned memory accesses. 95 accesses may produce a lot of false positives.
|
D | Kconfig.kasan | 29 designed to find out-of-bounds accesses and use-after-free bugs. 58 but detection of out-of-bounds accesses for global variables is 113 memory accesses. This is faster than outline (in some workloads 175 out of bounds and use after free accesses. It is useful for testing 187 accesses.
|
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/ |
D | common-properties.txt | 13 - big-endian: Boolean; force big endian register accesses 16 - little-endian: Boolean; force little endian register accesses 19 - native-endian: Boolean; always use register accesses matched to the 30 default to LE for their MMIO accesses.
|
/kernel/linux/linux-5.10/tools/perf/pmu-events/arch/x86/goldmont/ |
D | frontend.json | 4 …t). The event strives to count on a cache line basis, so that multiple accesses which hit in a si… 14 …s). The event strives to count on a cache line basis, so that multiple accesses which miss in a s… 24 …e line count as one ICACHE.ACCESS. Specifically, the event counts when accesses from straight lin… 28 "EventName": "ICACHE.ACCESSES",
|
/kernel/linux/linux-5.10/Documentation/process/ |
D | volatile-considered-harmful.rst | 39 meaning that data accesses will not be optimized across them. So the 43 accesses to that data. 53 registers. Within the kernel, register accesses, too, should be protected 55 accesses within a critical section. But, within the kernel, I/O memory 56 accesses are always done through accessor functions; accessing I/O memory
|
/kernel/linux/linux-5.10/Documentation/hwmon/ |
D | w83627hf.rst | 5 * Winbond W83627HF (ISA accesses ONLY) 41 This driver implements support for ISA accesses *only* for 45 This driver supports ISA accesses, which should be more reliable 46 than i2c accesses. Also, for Tyan boards which contain both a 51 If you really want i2c accesses for these Super I/O chips,
|
/kernel/linux/linux-5.10/tools/perf/pmu-events/arch/x86/tremontx/ |
D | frontend.json | 4 …s). The event strives to count on a cache line basis, so that multiple accesses which miss in a s… 16 …e line count as one ICACHE.ACCESS. Specifically, the event counts when accesses from straight lin… 21 "EventName": "ICACHE.ACCESSES",
|
/kernel/linux/linux-5.10/arch/mips/kvm/ |
D | Kconfig | 68 bool "Maintain counters for COP0 accesses" 71 Maintain statistics for Guest COP0 accesses. 72 A histogram of COP0 accesses is printed when the VM is
|
/kernel/linux/linux-5.10/tools/perf/pmu-events/arch/x86/goldmontplus/ |
D | frontend.json | 4 …t). The event strives to count on a cache line basis, so that multiple accesses which hit in a si… 16 …s). The event strives to count on a cache line basis, so that multiple accesses which miss in a s… 28 …e line count as one ICACHE.ACCESS. Specifically, the event counts when accesses from straight lin… 33 "EventName": "ICACHE.ACCESSES",
|
/kernel/linux/linux-5.10/tools/memory-model/ |
D | linux-kernel.cat | 160 (* Plain accesses and data races *) 163 (* Warn about plain writes and marked accesses in the same region *) 164 let mixed-accesses = ([Plain & W] ; (po-loc \ barrier) ; [Marked]) | 166 flag ~empty mixed-accesses as mixed-accesses 173 (* Boundaries for lifetimes of plain accesses *) 181 (* Visibility and executes-before for plain accesses *) 191 (* Coherence requirements for plain accesses *)
|