Home
last modified time | relevance | path

Searched refs:we (Results 1 – 25 of 1171) sorted by relevance

12345678910>>...47

/Linux-v5.10/Documentation/driver-api/thermal/
Dcpu-idle-cooling.rst25 because of the OPP density, we can only choose an OPP with a power
35 If we can remove the static and the dynamic leakage for a specific
38 injection period, we can mitigate the temperature by modulating the
47 At a specific OPP, we can assume that injecting idle cycle on all CPUs
49 idle state target residency, we lead to dropping the static and the
132 - It is less than or equal to the latency we tolerate when the
134 user experience, reactivity vs performance trade off we want. This
137 - It is greater than the idle state’s target residency we want to go
138 for thermal mitigation, otherwise we end up consuming more energy.
143 When we reach the thermal trip point, we have to sustain a specified
[all …]
/Linux-v5.10/Documentation/devicetree/bindings/pinctrl/
Dsprd,pinctrl.txt12 to choose one function (like: UART0) for which system, since we
15 There are too much various configuration that we can not list all
16 of them, so we can not make every Spreadtrum-special configuration
18 global configuration in future. Then we add one "sprd,control" to
19 set these various global control configuration, and we need use
22 Moreover we recognise every fields comprising one bit or several
23 bits in one global control register as one pin, thus we should
32 Now we have 4 systems for sleep mode on SC9860 SoC: AP system,
42 In some situation we need set the pin sleep mode and pin sleep related
45 sleep mode. For example, if we set the pin sleep mode as PUBCP_SLEEP
[all …]
/Linux-v5.10/Documentation/x86/
Dentry_64.rst58 so. If we mess that up even slightly, we crash.
60 So when we have a secondary entry, already in kernel mode, we *must
61 not* use SWAPGS blindly - nor must we forget doing a SWAPGS when it's
87 If we are at an interrupt or user-trap/gate-alike boundary then we can
89 whether SWAPGS was already done: if we see that we are a secondary
90 entry interrupting kernel mode execution, then we know that the GS
91 base has already been switched. If it says that we interrupted
92 user-space execution then we must do the SWAPGS.
94 But if we are in an NMI/MCE/DEBUG/whatever super-atomic entry context,
96 stack but before we executed SWAPGS, then the only safe way to check
[all …]
/Linux-v5.10/fs/jffs2/
DTODO5 reservations will necessarily be pessimistic. With this we could even
6 do shared writable mmap, if we can have a fs hook for do_wp_page() to
11 - checkpointing (do we need this? scan is quite fast)
25 nodes to a different one, we can separate clean nodes from those which
28 - Stop keeping name in-core with struct jffs2_full_dirent. If we keep the hash in
29 the full dirent, we only need to go to the flash in lookup() when we think we've
/Linux-v5.10/tools/lib/perf/Documentation/
Dlibperf-counting.txt73 Once the setup is complete we start by defining specific events using the `struct perf_event_attr`.
97 In this case we will monitor current process, so we create threads map with single pid (0):
110 Now we create libperf's event list, which will serve as holder for the events we want:
121 We create libperf's events for the attributes we defined earlier and add them to the list:
156 so we need to enable the whole list explicitly (both events).
158 From this moment events are counting and we can do our workload.
160 When we are done we disable the events list.
171 Now we need to get the counts from events, following code iterates through the
/Linux-v5.10/Documentation/arm64/
Dperf.rst38 For a VHE host this attribute is ignored as we consider the host kernel to
41 For a non-VHE host this attribute will exclude EL2 as we consider the
59 Due to the overlapping exception levels between host and guests we cannot
60 exclusively rely on the PMU's hardware exception filtering - therefore we
64 For non-VHE systems we exclude EL2 for exclude_host - upon entering and
65 exiting the guest we disable/enable the event as appropriate based on the
68 For VHE systems we exclude EL1 for exclude_guest and exclude both EL0,EL2
69 for exclude_host. Upon entering and exiting the guest we modify the event
80 On non-VHE hosts we enable/disable counters on the entry/exit of host/guest
/Linux-v5.10/Documentation/filesystems/
Dxfs-delayed-logging-design.rst28 That is, if we have a sequence of changes A through to F, and the object was
29 written to disk after change D, we would see in the log the following series
94 relogging technique XFS uses is that we can be relogging changed objects
95 multiple times before they are committed to disk in the log buffers. If we
101 contains all the changes from the previous changes. In other words, we have one
103 wasting space. When we are doing repeated operations on the same set of
106 log would greatly reduce the amount of metadata we write to the log, and this
113 formatting the changes in a transaction to the log buffer. Hence we cannot avoid
116 Delayed logging is the name we've given to keeping and tracking transactional
167 changes to the log buffers, we need to ensure that the object we are formatting
[all …]
Ddirectory-locking.rst10 When taking the i_rwsem on multiple non-directory objects, we
16 1) read access. Locking rules: caller locks directory we are accessing.
29 lock it. If we need to lock both, lock them in inode pointer order.
31 NB: we might get away with locking the source (and target in exchange
55 lock it. If we need to lock both, do so in inode pointer order.
58 All ->i_rwsem are taken exclusive. Again, we might get away with locking
69 First of all, at any moment we have a partial ordering of the
75 attempts to acquire lock on B, A will remain the parent of B until we
81 renames will be blocked on filesystem lock and we don't start changing
82 the order until we had acquired all locks).
[all …]
Dpath-lookup.txt49 the path given by the name's starting point (which we know in advance -- eg.
55 A parent, of course, must be a directory, and we must have appropriate
79 In order to lookup a dcache (parent, name) tuple, we take a hash on the tuple
81 in that bucket is then walked, and we do a full comparison of each entry
148 However, when inserting object 2 onto a new list, we end up with this:
161 Because we didn't wait for a grace period, there may be a concurrent lookup
182 As explained above, we would like to do path walking without taking locks or
188 than reloading from the dentry later on (otherwise we'd have interesting things
192 no non-atomic stores to shared data), and to recheck the seqcount when we are
194 Avoiding destructive or changing operations means we can easily unwind from
[all …]
Dxfs-self-describing-metadata.rst31 However, if we scale the filesystem up to 1PB, we now have 10x as much metadata
43 magic number in the metadata block, we have no other way of identifying what it
56 Hence we need to record more information into the metadata to allow us to
58 of analysis. We can't protect against every possible type of error, but we can
65 hence parse and verify the metadata object. IF we can't independently identify
71 magic numbers. Hence we can change the on-disk format of all these objects to
75 self identifying and we can do much more expansive automated verification of the
79 integrity checking. We cannot trust the metadata if we cannot verify that it has
80 not been changed as a result of external influences. Hence we need some form of
82 block. If we can verify the block contains the metadata it was intended to
[all …]
/Linux-v5.10/drivers/block/paride/
DTransition-notes9 ps_spinlock. C is always preceded by B, since we can't reach it
10 other than through B and we don't drop ps_spinlock between them.
14 A and each B is preceded by either A or C. Moments when we enter
37 * in ps_tq_int(): from the moment when we get ps_spinlock() to the
73 we would have to be called for the PIA that got ->claimed_cont
83 it is holding pd_lock. The only place within the area where we
87 we were acquiring the lock, (1) would be already false, since
89 If it was 0 before we tried to acquire pd_lock, (2) would be
96 (4) is done the same way - all places where we release pi_spinlock within
100 in the area, under pi_spinlock and we do not release it until after leaving
[all …]
/Linux-v5.10/drivers/scsi/aic7xxx/
Daic79xx.seq85 * If we have completions stalled waiting for the qfreeze
109 * ENSELO is cleared by a SELDO, so we must test for SELDO
169 * Since this status did not consume a FIFO, we have to
170 * be a bit more dilligent in how we check for FIFOs pertaining
178 * count in the SCB. In this case, we allow the routine servicing
183 * we detect case 1, we will properly defer the post of the SCB
222 * bad SCSI status (currently only for underruns), we
223 * queue the SCB for normal completion. Otherwise, we
258 * If we have relatively few commands outstanding, don't
303 * one byte of lun information we support.
[all …]
Daic7xxx.seq52 * After starting the selection hardware, we check for reconnecting targets
54 * bus arbitration. The problem with this is that we must keep track of the
55 * SCB that we've already pulled from the QINFIFO and started the selection
56 * on just in case the reselection wins so that we can retry the selection at
104 * We have at least one queued SCB now and we don't have any
124 * before we completed the DMA operation. If it was,
211 /* The Target ID we were selected at */
239 * Watch ATN closely now as we pull in messages from the
285 * we've got a failed selection and must transition to bus
333 * Reselection has been initiated by a target. Make a note that we've been
[all …]
/Linux-v5.10/drivers/gpu/drm/i915/
DKconfig.profile5 When listening to a foreign fence, we install a supplementary timer
6 to ensure that we are always signaled and our userspace is able to
17 On runtime suspend, as we suspend the device, we have to revoke
20 the GGTT mmap can be very slow and so we impose a small hysteris
65 we may spend some time polling for its completion. As the IRQ may
66 take a non-negligible time to setup, we do a short spin first to
73 May be 0 to disable the initial spin. In practice, we estimate
82 the GPU, we allow the innocent contexts also on the system to quiesce.
95 When two user batches of equal priority are executing, we will
/Linux-v5.10/Documentation/RCU/
Drculist_nulls.rst36 * reuse these object before the RCU grace period, we
39 if (obj->key != key) { // not the object we expected
104 * we need to make sure obj->key is updated before obj->next
115 Nothing special here, we can use a standard RCU hlist deletion.
135 With hlist_nulls we can avoid extra smp_rmb() in lockless_lookup()
138 For example, if we choose to store the slot number as the 'nulls'
139 end-of-list marker for each slot of the hash table, we can detect
143 is not the slot number, then we must restart the lookup at
161 if (obj->key != key) { // not the object we expected
168 * if the nulls value we got at the end of this lookup is
[all …]
/Linux-v5.10/Documentation/driver-api/firmware/
Dlookup-order.rst9 * The ''Built-in firmware'' is checked first, if the firmware is present we
11 * The ''Firmware cache'' is looked at next. If the firmware is found we
13 * The ''Direct filesystem lookup'' is performed next, if found we
16 firmware_request_platform() is used, if found we return it immediately
/Linux-v5.10/Documentation/block/
Ddeadline-iosched.rst20 service time for a request. As we focus mainly on read latencies, this is
49 When we have to move requests from the io scheduler queue to the block
50 device dispatch queue, we always give a preference to reads. However, we
52 how many times we give preference to reads over writes. When that has been
53 done writes_starved number of times, we dispatch some writes based on the
68 that comes at basically 0 cost we leave that on. We simply disable the
/Linux-v5.10/arch/mips/vdso/
DKconfig5 # of which we are forced to disable the VDSO symbols when building
6 # with < 2.25 binutils on pre-R6 kernels. For more references on why we
11 # of the GOT when targeting microMIPS, which we can't use in the VDSO due to
12 # the lack of relocations. As such, we disable the VDSO for microMIPS builds.
/Linux-v5.10/Documentation/power/
Dfreezing-of-tasks.rst22 we only consider hibernation, but the description also applies to suspend).
33 it loop until PF_FROZEN is cleared for it. Then, we say that the task is
80 - freezes all tasks (including kernel threads) because we can't freeze
84 - thaws only kernel threads; this is particularly useful if we need to do
86 userspace tasks, or if we want to postpone the thawing of userspace tasks
89 - thaws all tasks (including kernel threads) because we can't thaw userspace
101 IV. Why do we do that?
107 hibernation. At the moment we have no simple means of checkpointing
109 metadata on disks, we cannot bring them back to the state from before the
121 2. Next, to create the hibernation image we need to free a sufficient amount of
[all …]
/Linux-v5.10/Documentation/powerpc/
Dpci_iov_resource_on_powernv.rst40 The following section provides a rough description of what we have on P8
52 For DMA, MSIs and inbound PCIe error messages, we have a table (in
57 - For DMA we then provide an entire address space for each PE that can
63 - For MSIs, we have two windows in the address space (one at the top of
91 reserved for MSIs but this is not a problem at this point; we just
93 ignores that however and will forward in that space if we try).
100 Now, this is the "main" window we use in Linux today (excluding
105 Ideally we would like to be able to have individual functions in PEs
116 bits which are not conveyed by PowerBus but we don't use this.
118 * Can be configured to be segmented. When not segmented, we can
[all …]
/Linux-v5.10/Documentation/virt/kvm/
Dlocking.rst34 tracking i.e. the SPTE_SPECIAL_MASK is set. That means we need to
38 caused by write-protect. That means we just need to change the W bit of
41 What we use to avoid all the race is the SPTE_HOST_WRITEABLE bit and
49 On fast page fault path, we will use cmpxchg to atomically set the spte W
54 But we need carefully check these cases:
58 The mapping from gfn to pfn may be changed since we can only ensure the pfn
98 For direct sp, we can easily avoid it since the spte of direct sp is fixed
99 to gfn. For indirect sp, we disabled fast page fault for simplicity.
109 Then, we can ensure the dirty bitmaps is correctly set for a gfn.
159 In order to avoid this kind of issue, we always treat the spte as "volatile"
[all …]
/Linux-v5.10/Documentation/devicetree/bindings/usb/
Dgeneric.txt4 - maximum-speed: tells USB controllers we want to work up to a certain
10 - dr_mode: tells Dual-Role USB controllers that we want to work on a
15 - phy_type: tells USB controllers that we want to configure the core to support
27 - hnp-disable: tells OTG controllers we want to disable OTG HNP, normally HNP
30 - srp-disable: tells OTG controllers we want to disable OTG SRP, SRP is
32 - adp-disable: tells OTG controllers we want to disable OTG ADP, ADP is
/Linux-v5.10/Documentation/devicetree/bindings/i2c/
Di2c-arb-gpio-challenge.txt24 - OUR_CLAIM: output from us signaling to other hosts that we want the bus
31 Let's say we want to claim the bus. We:
35 3. Check THEIR_CLAIMS. If none are asserted then the we have the bus and we are
44 - our-claim-gpio: The GPIO that we use to claim the bus.
51 - wait-retry-us: we'll attempt another claim after this many microseconds.
53 - wait-free-us: we'll give up after this many microseconds. Default is 50000 us.
/Linux-v5.10/arch/arm64/boot/dts/qcom/
Dsc7180-trogdor-lazor-r0.dts19 * Lane 0 was incorrectly mapped on the cable, but we've now decided
20 * that the cable is canon and in -rev1+ we'll make a board change
21 * that means we no longer need the swizzle.
/Linux-v5.10/Documentation/networking/
Dfib_trie.rst37 verify that they actually do match the key we are searching for.
72 fib_find_node(). Inserting a new node means we might have to run the
107 slower than the corresponding fib_hash function, as we have to walk the
124 trie, key segment by key segment, until we find a leaf. check_leaf() does
127 If we find a match, we are done.
129 If we don't find a match, we enter prefix matching mode. The prefix length,
131 and we backtrack upwards through the trie trying to find a longest matching
137 the child index until we find a match or the child index consists of nothing but
140 At this point we backtrack (t->stats.backtrack++) up the trie, continuing to
143 At this point we will repeatedly descend subtries to look for a match, and there

12345678910>>...47