Searched full:schemes (Results 1 – 25 of 37) sorted by relevance
12
| /Documentation/ABI/testing/ |
| D | sysfs-kernel-mm-damon | 31 schemes stats files of the kdamond. Writing 145 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/nr_schemes 150 of the context named '0' to 'N-1' under the schemes/ directory. 152 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/action 158 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/target_nid 164 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/apply_interval_us 171 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/access_pattern/sz/min 177 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/access_pattern/sz/max 183 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/access_pattern/nr_accesses/… 189 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/access_pattern/nr_accesses/… [all …]
|
| /Documentation/translations/zh_TW/admin-guide/mm/damon/ |
| D | usage.rst | 75 │ │ │ │ │ schemes/nr_schemes 138 ``targets``, 和 ``schemes``)。 198 contexts/<N>/schemes/ 208 schemes/<N>/ 226 schemes/<N>/access_pattern/ 236 schemes/<N>/quotas/ 255 schemes/<N>/watermarks/ 273 schemes/<N>/stats/ 284 schemes/<N>/tried_regions/ 314 # echo 1 > kdamonds/0/contexts/0/schemes/nr_schemes [all …]
|
| D | start.rst | 124 $ damo schemes -c test_scheme <pid of your workload>
|
| /Documentation/translations/zh_CN/admin-guide/mm/damon/ |
| D | usage.rst | 75 │ │ │ │ │ schemes/nr_schemes 138 ``targets``, 和 ``schemes``)。 198 contexts/<N>/schemes/ 208 schemes/<N>/ 226 schemes/<N>/access_pattern/ 236 schemes/<N>/quotas/ 255 schemes/<N>/watermarks/ 273 schemes/<N>/stats/ 284 schemes/<N>/tried_regions/ 314 # echo 1 > kdamonds/0/contexts/0/schemes/nr_schemes [all …]
|
| D | start.rst | 124 $ damo schemes -c test_scheme <pid of your workload>
|
| /Documentation/admin-guide/mm/damon/ |
| D | usage.rst | 80 │ │ │ │ │ :ref:`schemes <sysfs_schemes>`/nr_schemes 141 - ``commit_schemes_quota_goals``: Read the DAMON-based operation schemes' 183 and three directories (``monitoring_attrs``, ``targets``, and ``schemes``) 275 contexts/<N>/schemes/ 278 The directory for DAMON-based Operation Schemes (:ref:`DAMOS 279 <damon_design_damos>`). Users can get and set the schemes by reading from and 288 schemes/<N>/ 309 schemes/<N>/access_pattern/ 324 schemes/<N>/quotas/ 361 schemes/<N>/quotas/goals/ [all …]
|
| D | start.rst | 163 $ sudo damo schemes --damos_access_rate 0 0 --damos_sz_region 4K max \
|
| /Documentation/arch/mips/ |
| D | booting.rst | 8 Both schemes are supported; CONFIG_BOOT_RAW=y and CONFIG_NO_EXCEPT_FILL=y,
|
| /Documentation/mm/damon/ |
| D | design.rst | 14 specification and DAMON-based operation schemes are stored in a data structure 269 Operation Schemes 282 One straightforward approach for such schemes would be profile-guided 292 effective, and therefore widely be used. However, implementing such schemes 300 Schemes (DAMOS). It lets users specify their desired schemes at a high 368 The access pattern of the schemes' interest. The patterns are constructed with 484 is activated. If all schemes are deactivated by the watermarks, the monitoring 505 To let users optimize DAMOS schemes with such special knowledge, DAMOS provides
|
| D | index.rst | 25 :ref:`DAMOS <damon_design_damos>` (DAMon-based Operation Schemes) in addition
|
| /Documentation/scheduler/ |
| D | membarrier.rst | 25 before returning to user-space. The schemes providing this barrier on the various
|
| /Documentation/admin-guide/LSM/ |
| D | Smack.rst | 348 Computer systems employ a variety of schemes to constrain how information is 349 shared among the people and services using the machine. Some of these schemes 351 access to pieces of data. These schemes are called discretionary access 353 of the user. Other schemes do not leave the decision regarding what a user or 354 program can access up to users or programs. These schemes are called mandatory 502 be "born" highly classified. To accommodate such schemes Smack includes a 552 schemes and concepts from other systems. Most often, the other systems are 650 of systems that use compatible labeling schemes, and the DOI specified on the
|
| /Documentation/devicetree/bindings/reset/ |
| D | reset.txt | 17 are dictated by the binding of the reset provider, although common schemes
|
| /Documentation/infiniband/ |
| D | tag_matching.rst | 25 Implementations frequently use different matching schemes for these two
|
| /Documentation/driver-api/fpga/ |
| D | fpga-region.rst | 19 is intended to be used by other schemes that have other ways of accomplishing
|
| /Documentation/driver-api/gpio/ |
| D | intro.rst | 38 value might be driven, supporting "wire-OR" and similar schemes for the
|
| /Documentation/i2c/ |
| D | fault-codes.rst | 13 faults. There may be fancier recovery schemes that are appropriate in
|
| /Documentation/trace/coresight/ |
| D | coresight-cpu-debug.rst | 93 schemes and finally this heavily impacts external debug module. So we can
|
| /Documentation/block/ |
| D | data-integrity.rst | 22 for some protection schemes also that the I/O is written to the right
|
| /Documentation/ABI/obsolete/ |
| D | sysfs-driver-hid-roccat-isku | 149 Description: When written, this file lets one trigger temporary color schemes
|
| /Documentation/security/tpm/ |
| D | tpm-security.rst | 29 encryption`_ schemes. The next phase of research seems to be hacking
|
| /Documentation/driver-api/cxl/ |
| D | memory-devices.rst | 200 The port metadata and potential decode schemes that a give memory device may
|
| /Documentation/driver-api/ |
| D | mtdnand.rst | 611 has built in default placement schemes for the various chiptypes. If due 618 Placement schemes are defined by a nand_oobinfo structure 690 Spare area autoplacement default schemes
|
| /Documentation/userspace-api/media/rc/ |
| D | rc-protos.rst | 80 schemes. This bit is stored in bit 6 of the scancode, inverted. This is
|
| /Documentation/core-api/ |
| D | pin_user_pages.rst | 163 the pages. There may be other possible schemes, such as for example explicitly
|
12