Power limit alterations of component types

ABSTRACT

In some examples, a non-transitory machine-readable medium can include instructions executable by a processing resource to: monitor system power for a computing system that includes a first computing component type and a second computing component type, determine a power event type for the computing system based on the monitored system power, and alter a power limit of the second computing component type by a predetermined increment based on the power event type while maintaining a power limit of the first computing component type when the second computing component type is a sub-system of the computing system.

BACKGROUND

A computing system can include a plurality of different systems. Forexample, the computing system can include a main circuit assembly and aprocessing resource such as a central processing unit (CPU). In someexamples, the computing system can include a plurality of sub-systemsthat can be communicatively coupled to the main circuit assembly toperform a number of functions for the computing system. In someexamples, the sub-systems can utilize processing resources that areseparate from the CPU.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an example of a system for altering powerlimits consistent with the disclosure.

FIG. 2 is a block diagram of an example of a system for altering powerlimits consistent with the disclosure.

FIG. 3 is a block diagram of an example of a method for altering powerlimits consistent with the disclosure.

FIG. 4 illustrates an example of a computing system consistent with thedisclosure.

DETAILED DESCRIPTION

A computing system can be a system that utilizes a plurality ofcomputing components and/or a plurality of computing systems. Forexample, a computing system can be a computing device that can includeprocessing resources, memory resources, circuit assemblies, networkresources, among other types of computing components. In some examples,the computing system can include computing thresholds that when exceededcan trigger an event. As used herein, a computing threshold can be anupper or lower limit of a computing metric. For example, a computingthreshold can include power thresholds for a power computing metric,temperature thresholds for a temperature computing metric, and/or othertypes of thresholds that correspond to other types of computing metrics.

In some examples, the computing thresholds can be applied to thecomputing system and/or applied to individual computing components. Forexample, a system power threshold can be applied to the overallcomputing system and a central processing unit (CPU) power threshold canbe applied to the CPU. The present disclosure relates to utilizing acomputing threshold of the overall computing system to alter a powerlimit or operating power limit of a sub-system of the computing system.As used herein, a sub-system of the computing system can include asystem or device of the computing system that does not include the CPU.For example, a sub-system of the computing system can include agraphical processing unit (GPU) of a graphics card or graphics circuitassembly. In this example, the graphics circuit assembly can include theGPU, but may be separate from the CPU.

In some examples, a monitor can be utilized to monitor computing metricsof the computing system. As used herein, a monitor can be a hardwaredevice or instructions stored on a memory resource that when executed bya processing resource can monitor the computing metrics of the computingsystem. For example, a monitor can be utilized to monitor power usagefor the overall computing system. In this example, the power usage forthe overall computing system can include power utilized by a main systemthat includes the CPU, sub-systems that include a GPU, and/or othersystems of the computing system.

In some examples, the monitor can trigger an event when a threshold isexceeded by the computing system. As used herein, an event can be anotification or signal that can indicate that a computing metric of thecomputing system has exceeded a corresponding threshold. For example, apower event can be a notification that the computing system has utilizea quantity of power that has exceeded a power threshold. In someexamples, a voltage power manager (VPM) can be utilized to alter a powerlimit of a sub-system when an event of the overall computing system hasoccurred. In this way, the computing metrics of the overall system canbe controlled by altering the performance (e.g., power limits, etc.) ofthe sub-systems, which can provide less impact on the main system of thecomputing system.

FIG. 1 is a block diagram of an example of a system 100 for alteringpower limits consistent with the disclosure. In some examples, thesystem 100 can include a memory resource 106 that can be utilized tostore instructions 108, 110, 112 that can be executed by a processingresource 102 to perform functions described herein. In some examples,the processing resource 102 can be coupled to the memory resource 106via a connection 104. Connection 104 can be a physical or wirelesscommunication connection that can be utilized to transfer data signalsbetween the processing resource 102 and the memory resource 106.

A processing resource 106 may be a central processing unit (CPU),microprocessor, and/or other hardware device suitable for retrieval andexecution of instructions stored in memory resource 106. In theparticular example shown in FIG. 1, processing resource 102 may receive,determine, and send instructions 108, 110, 112. As an alternative or inaddition to retrieving and executing instructions 108, 110, 112,processing resource 102 may include an electronic circuit comprising anumber of electronic components for performing the operations of theinstructions 108, 110, 112 in the memory resource 106. With respect tothe executable instruction representations or boxes described and shownherein, it should be understood that part or all of the executableinstructions 108, 110, 112 and/or electronic circuits included withinone box may be included in a different box shown in the figures or in adifferent box not shown.

Memory resource 106 may be any electronic, magnetic, optical, or otherphysical storage device that stores executable instructions 108, 110,112. Thus, memory resource 106 may be, for example, Random Access Memory(RAM), an Electrically-Erasable Programmable Read-Only Memory (EEPROM),a storage drive, an optical disc, and the like. The executableinstructions 108, 110, 112 may be stored on the memory resource 106.Memory resource 106 may be a portable, external or remote storagemedium, for example, that allows the system 100 to download theinstructions 108, 110, 112 from the portable/external/remote storagemedium. In this situation, the executable instructions 108, 110, 112 maybe part of an “installation package”. As described herein, memoryresource 106 may be encoded with executable instructions 108, 110, 112for remote device configurations as described herein.

In some examples, the memory resource 106 can include instructions 108that are executable by the processing resource 102 to monitor systempower for a computing system that includes a first computing componenttype and a second computing component type. As described herein,monitoring system power for the computing system can include utilizing amonitor to determine a quantity of electrical power being utilized bythe computing system. For example, the monitor can determine a quantityof power that is being utilized by the first computing component and thesecond computing component. In this example, the monitor can compare thequantity of power being utilized by the computing system to a powerthreshold to determine when a power event occurs. In this example, apower event can occur when the quantity of power being utilized by thecomputing system meets or exceeds the power threshold.

In some examples, the computing system can include a first computingcomponent type and a second computing component type. As used herein, afirst computing component type can be a main circuit assembly and asecond computing component type can be a sub-circuit assembly. Asdescribed herein, the main circuit assembly can be a circuit assemblythat includes a CPU for the computing system. In addition, thesub-circuit assembly can be a circuit assembly that does not include theCPU for the computing system. In some examples, the sub-circuit assemblycan include other types of processing resources such as a GPU, As usedherein, a circuit assembly can be a mechanical support that canelectrically connect electrical components utilizing conductive tracksor other features separated by a non-conductive substrate. For example,a circuit assembly can include a printed circuit board (PCB) or printedcircuit assembly (PCA) and structural features to protect the circuitassembly.

In some examples, the memory resource 106 can include instructions 108that are executable by the processing resource 102 to determine a powerevent type for the computing system based on the monitored system power.In some examples, determining the power event can include receiving asignal from a monitor that detects a computing metric, such aselectrical power, has exceeded a corresponding threshold. For example,determining the power event can include a monitor has provided a signalthat electrical power utilized by the computing system has exceeded apower threshold for the computing system.

In some examples, the power event type can be an event for the overallcomputing system. In some examples, the power event type can be aparticular type of event based on monitored computing metrics for theoverall system and not specific to a particular system or sub-system ofthe computing system. For example, the power event type can be a powerevent that utilizes the power computing metrics for the overall systemand not a specific system or sub-system of the computing system.

In some examples, the power event type can be a particular type of powerevent from a plurality of power event types. For example, the powerevent type can be an initial event type, a subsequent event type, and/orother type event that can occur on the computing system. As used herein,an initial event type can include a relatively short duration of acomputing metric exceeding a threshold. For example, an initial eventtype can be an event that is a relatively short duration of electricalpower exceeding a power threshold for the computing system. As usedherein, a subsequent type can include a relatively long duration of acomputing metric exceeding a threshold that may demand a relativelylarger alteration of a computing system compared to the initial eventtype. In some examples, the subsequent event type can be an event thatexists after actions have been taken to cure to the initial event type.For example, the subsequent event type can occur when a power level of acomponent is reduced in response to an initial event type and the eventcontinues.

In some examples, the event type of the computing system can be utilizedto determine an alteration of a power limit of a sub-system for thecomputing system. For example, a level of the alteration of the powerlimit for the sub-system can be based on the event type. For example,when the event type is an initial event type, the sub-system can bealtered to a first power limit and when the event type is a subsequentevent, the sub-system can be altered to a second power limit when theevent type is a subsequent event. As described herein, the event can bebased on computing metrics of the overall system and the sub-system canbe altered without altering a main system.

In some examples, the memory resource 106 can include instructions 108that are executable by the processing resource 102 to alter a powerlimit of the second computing component type by a predeterminedincrement based on the power event type while maintaining a power limitof the first computing component type when the second computingcomponent type is a sub-system of the computing system. As used herein,a power limit includes a maximum quantity of electrical power to beutilized by a particular device or system. For example, a sub-system ofthe computing system can include a power limit of 35 Watts (W). In thisexample, the sub-system can be limited to utilizing 35 W of electricalpower during operation.

In some examples, the power limit of the sub-system can be altered inresponse to the event that is based on the overall system. For example,the overall system can exceed a power threshold and a power event canoccur. In this example, a power limit of the second computing componenttype or sub-system of the overall system can be altered to a lower powerlimit. In some examples, the power limit of the second computingcomponent type can be altered despite a power usage of the secondcomputing component type. Thus, in some examples, the power utilized bythe second computing component type may not be monitored individuallyfrom the overall computing or utilized to determine power alterationsfor the overall computing system.

In some examples, the second computing component type can be altered bya predetermined increment based on the power event type. As used herein,the predetermined increment can include a predetermined level orpercentage. For example, the predetermined increment can be a quantityof power or percentage of power. In one example, the predeterminedincrement can be a percentage of 80% of a present power limit of aparticular sub-system. That is, the power limit of the sub-system can bealtered from 100% to 80% when a particular event type has occurred forthe computing system. In some examples, the predetermined increment canbe a particular value of power. For example, the predetermined incrementcan be a value of 5 W. In this example, the power limit of a sub-systemcan be 35 W and the power limit of the sub-system can be altered to 30 Wduring an event.

In some examples, the predetermined increment can be based on the powerevent type. In some examples, a first event type can result in alteringa power limit a predetermined increment of a first value and a secondevent type can result in altering the power limit a predeterminedincrement of a second value. For example, an initial event can result inaltering the power limit of a sub-system by 5 W and a subsequent eventcan result in altering the power limit of the sub-system by 10 W.

In some examples, the predetermined increment can be based on a devicetype or system type of the second computing component type. For example,the predetermined increment can be based on an initial power limit ormanufacturer power limit. As used herein, an initial power limit ormanufacturer power limit can be a recommended power limit for normaloperation of the device or system. For example, the initial power limitcan be a preset power limit for the device or system. In some examples,a first sub-system with a first initial power limit can have a firstpredetermined increment for a particular event type and a secondsub-system with a second initial power limit can have a secondpredetermined increment for the particular event type. In some examples,the second initial power limit can be greater than the first initialpower limit. In these examples, the second predetermined increment canbe greater than the first predetermined increment. That is, a greaterinitial power limit can correspond to a greater predetermined increment.

In some examples, the memory resource 106 can include instructions thatare executable by the processing resource 102 to monitor system powerfor the computing system with the altered power limit of the secondcomputing component type. For example, the monitor that determined orprovided the signal that the event occurred can be utilized to continueto monitor the overall system.

In addition, the memory resource 106 can include instructions that areexecutable by the processing resource 102 to alter the power limit ofthe second computing component type by an additional predeterminedincrement when the power event type is monitored with the altered powerlimit of the second computing component type. In some examples, theevent that prompted altering the power limit of the second computingcomponent type can continue even after the power limit of the secondcomputing component type is altered to a lower power limit. In theseexamples, the power limit of the second computing component type can bealtered by an additional predetermined increment. In some examples, theadditional predetermined increment can be the same as the initialpredetermined increment. For example, the second computing component canbe altered by 5 W in the initial predetermined increment and the secondcomputing component can be altered by 5 W in the additionalpredetermined increment. In this example, the second computing componentcan have an initial power limit of 35 W and after the initialpredetermined increment have a power limit of 30 W, and after theadditional predetermined increment have a power limit of 25 W.

In some examples, the memory resource 106 can include instructions thatare executable by the processing resource 102 to determine when thepower event for the computing system has ended based on monitored powerfor the computing system and alter the power limit of the secondcomputing component type to an original power level or initial powerlimit. For example, when it is determined that the power level of theoverall system has fallen below an event threshold, the power limit ofthe second computing component type can be altered back to the initialpower limit. In some examples, the power limit of the second computingcomponent type can be altered to an intermediary power limit beforealtering the power limit back to the initial power limit. For example,the initial power limit for the second computing component type can be35 W. In this example, the power limit can be altered from 25 W to 30 Wwhen it is determined that the event has ended. In this example, if theevent has ended while the power limit of the second computing componentis operating at 30 W, the power limit can be altered back to the initialpower limit of 35 \N.

In some examples, the memory resource 106 can include instructions thatare executable by the processing resource 102 to assert a processor hot(PROCHOT) function of the second computing component type to alter thepower limit of the second computing component type. As used herein aPROCHOT function can include a function of a processing resource thatcan be utilized to alter a power limit of the processing resource. Forexample, the PROCHOT function can be a function that forcibly reducespower consumption to a minimum operating power. As used herein, theminimum operating power for a device is a power level that can provide astart-up function. For example, a power level below the minimumoperating power may not start up or function. In some examples, thePROCHOT function can be utilized to alter the power limit of the secondcomputing component type when the second computing component type is aGPU that includes PROCHOT function capabilities.

FIG. 2 is a block diagram of an example of a system 220 for alteringpower limits consistent with the disclosure. In some examples, thesystem 220 can include a main circuit assembly 222 and a sub-circuitassembly 226. As described herein, the main circuit assembly 222 caninclude a CPU 224 and the sub-circuit assembly 226 can include a non-CPUprocessing resource 228. For example, the non-CPU processing resourcecan be a GPU. In some examples, the main circuit assembly 222 can beseparate from the sub-circuit assembly. However, the main circuitassembly 222 can be communicatively coupled to the sub-circuit assemblyvia a connection 230. In this way, the main circuit assembly 222 cancommunicate or transfer communication packets with the sub-circuitassembly 226 via the connection 230.

In some example, the system 220 can include a voltage power manager(VPM) 232 that can be communicatively coupled to the main circuitassembly 222 and/or the sub-circuit assembly 226. In some examples, theVPM 232 can be utilized to monitor and control particular functions ofthe system 220 including the main circuit assembly 222 and thesub-circuit assembly 226, For example, the VPM 232 can monitor powerusage of the system 220. In some examples, the VPM 232 can be coupled toother monitoring circuitry to monitor temperature of the system 220.

In some examples, the VPM can include instructions 234, 236, 238, 240.In some examples, the VPM can utilize a memory resource (e.g., memoryresource 106 as referenced in FIG. 1, etc.) to store the instructions234, 236, 238, 240. As described herein, the instructions 234, 236, 238,240 can be executed by a processing resource (e.g., processing resource102, etc.) to perform particular functions.

In some examples, the VPM can include instructions 234 that areexecutable by a processing resource to assert a first processor hot(PROCHOT) function of the sub-circuit assembly 226 to alter a powerstate of the sub-circuit assembly 226 from a first state to a secondstate in response to an event of the system 220. As described herein, aPROCHOT function can be a function of a processing resource 228 of thesub-circuit assembly 226 that can be utilized to alter a power limit ofthe processing resource 228 and/or the sub-circuit assembly.

In some examples, a duty cycle of the PROCHOT function can be utilizedto alter the power state of the sub-circuit assembly 226 by apredetermined increment as described herein. For example, a duty cycleof the PROCHOT function can be utilized to alter a power limit of thesub-circuit assembly 226 from 35 W to 30 W in response to a particulartype of event occurring on the system 220. As used herein, the dutycycle of the PROCHOT function includes a percent of time the PROCHOT isasserted on a processing resource such as processing resource 228.

In some examples, the first state of the sub-circuit assembly 226 can bean initial power state for the sub-circuit assembly 226. For example,the first state of the sub-circuit assembly 226 can be a manufacturerset power state for the sub-circuit assembly 226. In some examples, thesecond state of the sub-circuit assembly 226 can be an altered powerstate of the second sub-circuit assembly 226. For example, the secondstate of the sub-circuit assembly can be a state when the sub-circuitassembly 226 includes a power limit that is lower than the first stateby a predetermined increment. In some examples, the predeterminedincrement can be based on the first state of the sub-circuit assembly226. For example, the predetermined increment can be based on theinitial power limit of the sub-circuit assembly 226. In some examples,the predetermined increment can be proportional to the initial powerlimit. That is, a relatively larger initial power limit can correspondto a relatively larger predetermined increment.

In some examples, the VPM 232 can include instructions 236 that areexecutable by a processing resource to determine if the event of thesystem 220 continues when the sub-circuit assembly 226 is performing atthe second state. In some examples, a monitor can be utilized to comparecomputing metrics of the system 220 to corresponding threshold values.In some examples, the event that initiated altering the sub-circuitassembly 226 from the first state to the second state can be the sameevent that is monitored to determine it the event is continuing when thesub-circuit assembly 226 is performing at the second state. As describedherein, the monitor can utilize computing metrics for the overall system220 to determine when the event is occurring or when the event hasended.

In some examples, the VPM 232 can include instructions 238 that areexecutable by a processing resource to assert a second PROCHOT functionof the sub-circuit assembly 226 to alter the power state of thesub-circuit assembly 226 from the second state to a third state inresponse to the event of the system 220 continuing when the sub-circuitassembly 226 is performing at the second state. In some examples, theevent may still exist or continue to exist for the system 220 even whenthe sub-circuit assembly 226 is operating at the second state. In theseexamples, the second PROCHOT function can be utilized to alter thesub-circuit assembly 226 from the second state to the third state.

In some examples, the third state of the sub-circuit assembly 226 caninclude a power limit for the sub-circuit assembly 226 that is lowerthan the second state of the sub-circuit assembly 226. For example, thepower limit of the sub-circuit assembly 226 can be lowered by apredetermined increment to alter the sub-circuit assembly 226 from thesecond state to the third state. As described herein, the predeterminedincrement can be based on the event type and/or based on device type.For example, the predetermined increment can be based on the initialpower limit of the sub-circuit assembly 226 and/or based on whether thetype of event.

In some examples, the VPM 232 can include instructions 240 that areexecutable by a processing resource to de-assert the first PROCHOT andsecond PROCHOT function in response to a determination that the event ofthe system has ended. In some examples, the altered state of thesub-circuit assembly 226 can be returned to the first state or initialstate of the sub-circuit assembly 226. For example, the predeterminedincrement alterations of the power limit of the sub-circuit assembly 226can be restored to a previous state or increased by the samepredetermined increment. In this way, the sub-circuit assembly 226 canbe dynamically altered during events and restored to a relatively higherpower limit when the event has ended. In addition, the power limit orstate of the main circuit assembly 222 and/or CPU 224 can remainconstant during the event.

FIG. 3 is a block diagram of an example of a method 350 for alteringpower limits consistent with the disclosure. In some examples, themethod 350 can be executed by a computing device or system. For example,the method 350 can include instructions stored on a memory resource(e.g., memory resource 106 as referenced in FIG. 1) that are executableby a processing resource (e.g., processing resource 102 as referenced inFIG. 1, etc.).

At 352, the method 350 can include determining a power limit for a firststate of a graphics processing unit (GPU) of a computing system thatincludes the GPU and a central processing unit (CPU). As describedherein, the power limit for the first state of the GPU can be an initialstate of the GPU. For example, the first state of the GPU can be amanufacturer setting that can be established by the manufacturer of theGPU. In some examples, the GPU can be designed by the manufacturer tooperate safely at the first state of the GPU.

At 354, the method 350 can include determining when an event occurs onthe computing system that is affected by a first power state of the GPU.In some examples, the event can be based on monitored computing metricsfor the computing system. That is, the monitored computing metrics forthe overall computing system can be utilized to determine when an eventoccurs. As described herein, the event can be a determination that aparticular computing metric, such as power or temperature, has met orexceeded a corresponding threshold value. In some examples, the event ofthe computing system can be affected by the first power state of the GPUwhen the power state of the GPU can alter the computing metrics thatwere used to determine that the event has occurred. For example, theevent can be a power event and altering the state of the GPU can alterthe electrical power utilized by the overall computing system.

At 356, the method 350 can include altering the first power state of theGPU to a second power state that is lower than the first power state inresponse to determining that the event has occurred. In some examples,altering the first power state of the GPU to the second power state caninclude utilizing a PROCHOT function of the GPU to alter a power limitof the GPU. In some examples, altering the first power state of the GPUto the second power state can include lowering the power limit of theGPU by a predetermined increment or value. For example, the power limitof the GPU can be lowered by a quantity or percentage of Watts whenaltering the first power state of the GPU to the second power state ofthe GPU. As described herein, the predetermined increment can be basedon the type of event that has occurred and/or based on the first powerstate of the GPU.

At 358, the method 350 can include altering the second power state ofthe GPU to a third power state that is lower than the second power statein response to determining that the event is occurring when the GPU isin the second power state. In some examples, altering the GPU from thesecond power state to the third power state can include lowering thepower limit of the GPU an additional predetermined increment or value.In some examples, the additional predetermined increment or value can bethe same as the predetermined increment utilized to alter the GPU fromthe first power state to the second power state.

In some examples, the method 350 can include altering the third powerstate to the first power state in response to determining that the eventhas ended. As described herein, the GPU can be returned to an originalpower limit when the event has ended. In some examples, the GPU canfirst be altered from the third power state to the second power state todetermine if the event continues while the GPU is in the second powerstate. In these examples, a monitor can determine whether the event hasended while the GPU is in the second power state. In these examples, theGPU can be altered from the second power state to the first power statewhen the event has ended while the GPU is in the second power state.

In some examples, the method 350 can include maintaining a power stateof the CPU when altering the first power state of the GPU to the secondpower state. As described herein, the power state of the CPU can bemaintained when altering the power state of the GPU. In this way, theCPU can continue to provide functions for the computing system duringevents.

FIG. 4 illustrates an example of a computing system 460 consistent withthe disclosure. In some examples, the computing system 460 can include avoltage power manager (VPM) 432. In some examples, the VPM 432 can beutilized to monitor computing metrics of the computing system 460 and/oralter states of elements of the computing system 460.

In some examples, the computing system 460 can include an enclosure 462.The enclosure can be utilized to encase or surround computingcomponents. In some examples, the enclosure 462 can be utilized toprotect the computing components within the enclosure 462. In someexamples, the enclosure 462 can include a main circuit assembly 464(e.g., motherboard, etc.) that can include a CPU 466. In some examples,the main circuit assembly 464 can be utilized to perform a plurality offunctions for the computing system 460.

In some examples, the computing system 460 can include a sub-circuitassembly 468 with a processing resource 470 position within theenclosure 462. As described herein, the sub-circuit assembly 468 can beutilized to perform a particular function. For example, the sub-circuitassembly 468 can be a graphics card that can be utilized to processgraphics for a display of the computing system 460. In this example, theprocessing resource 470 can be a GPU.

In some examples, the computing system 460 can include a plurality ofsub-circuit assemblies 472-1, 472-2, 472-3, 472-N that are coupled tothe enclosure 462. For example, the plurality of sub-circuit assemblies472-1, 472-2, 472-3, 472-N can be coupled to a bus of a computing devicethat utilizes the enclosure 462. In some examples, the plurality ofsub-circuit assemblies 472-1, 472-2, 472-3, 472-N can each be graphicscards similar to the sub-circuit assembly 468. In some examples, theplurality of sub-circuit assemblies 472-1, 472-2, 472-3, 472-N can eachbe a sub-circuit assembly that can perform a specific function. Forexample, the plurality of sub-circuit assemblies 472-1, 472-2, 472-3,472-N can each be a graphics card with a corresponding GPU 474-1, 474-2,474-3, 474-N.

As described herein, the VPM 432 can utilize a monitor to determinecomputing metrics for the overall computing system 460. For example, theVPM 432 can utilize a monitor to determine a power usage for the maincircuit assembly 464, the sub-circuit assembly 468, and the plurality ofsub-circuit assemblies 472-1, 472-2, 472-3, 472-N. In addition, the VPM432 can be utilized to determine when an event occurs for the overallcomputing system 460. That is, the VPM 432 can determine when a powerevent occurs based on the monitored computing metrics for the maincircuit assembly 464, the sub-circuit assembly 468, and the plurality ofsub-circuit assemblies 472-1, 472-2, 472-3, 472-N.

As described herein, the VPM 432 can be utilized to alter a state orpower limit of the sub-circuit assembly 468 and/or the plurality ofsub-circuit assemblies 472-1, 472-2, 472-3, 472-N in response todetermining that an event has occurred or is occurring for the overallcomputing system 460. In some examples, the VPM 432 can be utilized todetermine a particular sub-circuit assembly from the sub-circuitassembly 468 and the plurality of sub-circuit assemblies 472-1, 472-2,472-3, 472-N to alter a state. For example, the VPM can select thesub-circuit assembly 472-1 from the sub-circuit assembly 468 and theplurality of sub-circuit assemblies 472-1, 472-2, 472-3, 472-N, In thisexample, the VPM can alter a state of the sub-circuit assembly 472-1when an event for the overall computing system 460 has occurred. Inaddition, the VPM 432 can maintain a state or power limit of the maincircuit assembly 464 when the event has occurred for the overallcomputing system 460.

The figures herein follow a numbering convention in which the firstdigit corresponds to the drawing figure number and the remaining digitsidentify an element or component in the drawing, Similar elements orcomponents between different figures can be identified by the use ofsimilar digits. For example, 102 can reference element “02” in FIG. 1,and a similar element can be referenced as 202 in FIG. 2, Elements shownin the various figures herein can be added, exchanged, and/or eliminatedso as to provide a plurality of additional examples of the disclosure.

In addition, the proportion and the relative scale of the elementsprovided in the figures are intended to illustrate the examples of thedisclosure, and should not be taken in a limiting sense. As used herein,the designator “N”, particularly with respect to reference numerals inthe drawings, indicates that a plurality of the particular feature sodesignated can be included with examples of the disclosure. Thedesignators can represent the same or different numbers of theparticular features. Further, as used herein, “a plurality of” anelement and/or feature can refer to more than one of such elementsand/or features.

What is claimed:
 1. A non-transitory machine-readable medium including instructions executable by a processing resource to: monitor system power for a computing system that includes a first computing component type and a second computing component type; determine a power event type for the computing system based on the monitored system power; and alter a power limit of the second computing component type by a predetermined increment based on the power event type while maintaining a power limit of the first computing component type when the second computing component type is a sub-system of the computing system.
 2. The medium of claim 1, wherein the sub-system of the computing system is a system that is separate from a central processing unit (CPU′ of the computing system.
 3. The medium of claim 1, comprising instructions executable by the processing resource to: monitor system power for the computing system with the altered power limit of the second computing component type; and alter the power limit of the second computing component type by an additional predetermined increment when the power event type is monitored with the altered power limit of the second computing component type.
 4. The medium of claim 1, wherein the predetermined increment is based on a power delivery limit of the second computing component type.
 5. The medium of claim 1, comprising instructions executable by the processing resource to: determine when the power event for the computing system has ended based on monitored power for the computing system; and alter the power limit of the second computing component type to an original power level.
 6. The medium of claim 1, wherein the first computing component type is a main system of the computing system that includes a CPU.
 7. The medium of claim 1, comprising instructions executable by the processing resource to assert a processor hot (PROCHOT) function of the second computing component type to alter the power limit of the second computing component type.
 8. A system comprising: a main circuit assembly that includes a central processing unit (CPU) of a computing system; a sub-circuit assembly that includes a sub processing unit of the computing system; a voltage power manager (VPM) device to: assert a first processor hot (PROCHOT) function of the sub-circuit assembly to alter a power state of the sub-circuit assembly from a first state to a second state in response to an event of the system; determine if the event of the system continues when the sub-circuit assembly is performing at the second state; assert a second PROCHOT function of the sub-circuit assembly to alter the power state of the sub-circuit assembly from the second state to a third state in response to the event of the system continuing when the sub-circuit assembly is performing at the second state; and de-assert the first PROCHOT and second PROCHOT function in response to a determination that the event of the system has ended.
 9. The system of claim 8, wherein the event is a power event of the system.
 10. The system of claim 8, wherein the event is a temperature event of the system, wherein the temperature event includes a monitored temperature of the system exceeding a threshold temperature.
 11. The system of claim 8, wherein the second state is based on a power limit of the sub-circuit assembly.
 12. A method comprising: determining a power limit for a first state of a graphics processing unit (GPU) of a computing system that includes the GPU and a central processing unit (CPU); determining when an event occurs on the computing system that is affected by a first power state of the GPU; altering the first power state of the GPU to a second power state that is lower than the first power state in response to determining that the event has occurred; and altering the second power state of the GPU to a third power state that is lower than the second power state in response to determining that the event is occurring when the GPU is in the second power state.
 13. The method of claim 12, further comprising altering the third power state to the first power state in response to determining that the event has ended.
 14. The method of claim 12, wherein the first power state is a first power delivery limit of the GPU represented by a first max voltage, the second power state is a second power delivery limit of the GPU represented by a second max voltage that is less than the first max voltage.
 15. The method of claim 12, further comprising maintaining a power state of the CPU when altering the first power state of the GPU to the second power state. 