Lines Matching refs:pseudo
47 pseudo-locking is a unique way of using cache control to "pin" or
118 Corresponding region is pseudo-locked. No
224 When the resource group is in pseudo-locked mode this file will
226 pseudo-locked region.
248 cache pseudo-locked region is created by first writing
249 "pseudo-locksetup" to the "mode" file before writing the cache
250 pseudo-locked region's schemata to the resource group's "schemata"
251 file. On successful pseudo-locked region creation the mode will
252 automatically change to "pseudo-locked".
485 application can fill. Cache pseudo-locking builds on the fact that a
487 allocated area on a cache hit. With cache pseudo-locking, data can be
490 pseudo-locked memory is made accessible to user space where an
494 The creation of a cache pseudo-locked region is triggered by a request
496 to be pseudo-locked. The cache pseudo-locked region is created as follows:
499 from the user of the cache region that will contain the pseudo-locked
502 while the pseudo-locked region exists.
510 pseudo-locked region is protected as long as its CBM does not appear in
511 any CAT allocation. Even though the cache pseudo-locked region will from
513 any CLOS will be able to access the memory in the pseudo-locked region since
518 Cache pseudo-locking increases the probability that data will remain
524 pseudo-locked region creation.
526 It is required that an application using a pseudo-locked region runs
528 with the cache on which the pseudo-locked region resides. A sanity check
529 within the code will not allow an application to map pseudo-locked memory
531 pseudo-locked region resides. The sanity check is only done during the
538 of cache that should be dedicated to pseudo-locking. At this time an
542 pseudo-locked memory into its address space.
546 A pseudo-locked region is created using the resctrl interface as follows:
549 2) Change the new resource group's mode to "pseudo-locksetup" by writing
550 "pseudo-locksetup" to the "mode" file.
551 3) Write the schemata of the pseudo-locked region to the "schemata" file. All
555 On successful pseudo-locked region creation the "mode" file will contain
556 "pseudo-locked" and a new character device with the same name as the resource
558 by user space in order to obtain access to the pseudo-locked memory region.
560 An example of cache pseudo-locked region creation and usage can be found below.
564 The pseudo-locking debugging interface is enabled by default (if
568 location is present in the cache. The pseudo-locking debugging interface uses
570 the pseudo-locked region:
574 example below). In this test the pseudo-locked region is traversed at
582 When a pseudo-locked region is created a new debugfs directory is created for
585 measurement of the pseudo-locked region depends on the number written to this
606 In this example a pseudo-locked region named "newlock" was created. Here is
640 In this example a pseudo-locked region named "newlock" was created on the L2
874 Ensure that there are bits available that can be pseudo-locked, since only
875 unused bits can be pseudo-locked the bits to be pseudo-locked needs to be
884 Create a new resource group that will be associated with the pseudo-locked
885 region, indicate that it will be used for a pseudo-locked region, and
886 configure the requested pseudo-locked region capacity bitmask::
889 # echo pseudo-locksetup > newlock/mode
892 On success the resource group's mode will change to pseudo-locked, the
893 bit_usage will reflect the pseudo-locked region, and the character device
894 exposing the pseudo-locked region will exist::
897 pseudo-locked
906 * Example code to access one page of pseudo-locked cache region
919 * cores associated with the pseudo-locked region. Here the cpu
956 /* Application interacts with pseudo-locked memory @mapping */