Home
last modified time | relevance | path

Searched refs:cpumasks (Results 1 – 10 of 10) sorted by relevance

/linux/kernel/sched/
H A Disolation.c27 cpumask_var_t cpumasks[HK_TYPE_MAX]; member
45 cpu = sched_numa_find_closest(housekeeping.cpumasks[type], smp_processor_id()); in housekeeping_any_cpu()
49 cpu = cpumask_any_and(housekeeping.cpumasks[type], cpu_online_mask); in housekeeping_any_cpu()
69 return housekeeping.cpumasks[type]; in housekeeping_cpumask()
78 set_cpus_allowed_ptr(t, housekeeping.cpumasks[type]); in housekeeping_affine()
86 return cpumask_test_cpu(cpu, housekeeping.cpumasks[type]); in housekeeping_test_cpu()
105 WARN_ON_ONCE(cpumask_empty(housekeeping.cpumasks[type])); in housekeeping_init()
113 alloc_bootmem_cpumask_var(&housekeeping.cpumasks[type]); in housekeeping_setup_type()
114 cpumask_copy(housekeeping.cpumasks[type], in housekeeping_setup_type()
168 housekeeping.cpumasks[type])) { in housekeeping_setup()
/linux/Documentation/translations/zh_CN/core-api/
H A Dpadata.rst50 修改cpumasks
63 一个实例的cpumasks可能有sysfs文件。例如,pcrypt的文件在
73 并行和一个串行cpumask组成)。用户提供的cpumasks在实例分配时默认为所有可能的CPU,
74 并且可以如上所述进行更改。可用的cpumasks总是用户提供的cpumasks的一个子集,只包
75 含用户提供的掩码中的在线CPU;这些是padata实际使用的cpumasks。因此,向padata提
104 在其他地方正在搞乱实例的CPU掩码,而当cb_cpu不在串行cpumask中、并行或串行cpumasks
/linux/Documentation/core-api/
H A Dpadata.rst42 Modifying cpumasks
57 There may be sysfs files for an instance's cpumasks. For example, pcrypt's
67 Padata maintains two pairs of cpumasks internally, the user-supplied cpumasks
68 and the 'usable' cpumasks. (Each pair consists of a parallel and a serial
69 cpumask.) The user-supplied cpumasks default to all possible CPUs on instance
70 allocation and may be changed as above. The usable cpumasks are always a
71 subset of the user-supplied cpumasks and contain only the online CPUs in the
72 user-supplied masks; these are the cpumasks padata actually uses. So it is
111 serial cpumask, no online CPUs in the parallel or serial cpumasks, or a stopped
/linux/Documentation/bpf/
H A Dcpumasks.rst13 reflect the CPUs on the system. Commonly, cpumasks are used to track which CPUs
19 used to allocate, mutate, query, and free cpumasks.
24 There are two different types of cpumasks that can be used by BPF programs.
30 BPF program, and whose lifecycle is entirely controlled by BPF. These cpumasks
195 kfuncs for mutating and querying cpumasks.
197 3.1 Mutating cpumasks
205 argument. :ref:`cpumasks-querying-label` below describes the read-only kfuncs.
269 3.1.2 Operations between cpumasks
273 callers can also perform bitwise operations between multiple cpumasks using
347 3.2 Querying cpumasks
[all …]
H A Dindex.rst23 cpumasks
H A Dkfuncs.rst677 destroy struct cpumask * objects. Please refer to :ref:`cpumasks-header-label`
/linux/Documentation/scheduler/
H A Dsched-domains.rst21 pointer. The union of cpumasks of these groups MUST be the same as the
24 read only data after they have been set up. The intersection of cpumasks from
/linux/Documentation/admin-guide/
H A Dcputopology.rst101 kernel start parameter as well as more information on the various cpumasks.
/linux/Documentation/accounting/
H A Dtaskstats.rst38 registered listener. Using cpumasks allows the data received by one listener
48 for reporting delay accounting statistics. Users can register cpumasks,
/linux/Documentation/admin-guide/sysctl/
H A Dkernel.rst1660 The argument value is the standard cpulist format for cpumasks,