Searched refs:slice_ctrl (Results 1 – 6 of 6) sorted by relevance
| /linux/tools/testing/selftests/rseq/ |
| H A D | slice_test.c | 177 RSEQ_WRITE_ONCE(rs->slice_ctrl.request, 1); in TEST_F() 186 if (RSEQ_READ_ONCE(rs->slice_ctrl.request)) { in TEST_F() 187 RSEQ_WRITE_ONCE(rs->slice_ctrl.request, 0); in TEST_F() 193 if (RSEQ_READ_ONCE(rs->slice_ctrl.granted)) { in TEST_F()
|
| H A D | rseq-abi.h | 192 struct rseq_abi_slice_ctrl slice_ctrl; member
|
| /linux/Documentation/userspace-api/ |
| H A D | rseq.rst | 170 slice extension by setting rseq::slice_ctrl::request to 1. If the thread is 181 The kernel indicates the grant by clearing rseq::slice_ctrl::request and 182 setting rseq::slice_ctrl::granted to 1. If there is a reschedule of the 200 rseq->slice_ctrl.request = 1; 204 rseq->slice_ctrl.request = 0; 205 if (rseq->slice_ctrl.granted) 211 if (rseq->slice_ctrl.granted)
|
| /linux/include/linux/ |
| H A D | rseq_entry.h | 125 unsafe_put_user(0U, &rseq->slice_ctrl.all, efault); \ 159 unsafe_put_user(0U, &rseq->slice_ctrl.all, efault); in __rseq_grant_slice_extension() 164 unsafe_get_user(usr_ctrl.all, &rseq->slice_ctrl.all, efault); in __rseq_grant_slice_extension() 171 unsafe_put_user(usr_ctrl.all, &rseq->slice_ctrl.all, efault); in __rseq_grant_slice_extension()
|
| /linux/include/uapi/linux/ |
| H A D | rseq.h | 191 struct rseq_slice_ctrl slice_ctrl; member
|
| /linux/kernel/ |
| H A D | rseq.c | 462 unsafe_put_user(0U, &rseq->slice_ctrl.all, efault); in rseq_register() 678 u32 __user *sctrl = ¤t->rseq.usrptr->slice_ctrl.all; in rseq_slice_validate_ctrl() 742 if (put_user(0U, &curr->rseq.usrptr->slice_ctrl.all)) in rseq_syscall_enter_work()
|