From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-dl1-f42.google.com (mail-dl1-f42.google.com [74.125.82.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id ED5C039DBC7 for ; Mon, 13 Apr 2026 07:45:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=74.125.82.42 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776066325; cv=none; b=fV4oRB/jtHVTQ2Ei91+lpP97u1r/98D3rFTzhoXB5klOfURC83/Tk4X/MFpXmucxvbANW44LyV8pnn4qM2JZxp2AgLk+eGxjoNlQO0yyUP9GyCmxe1GJs05OhhJuQuPahUUrGJpsNLBzD/YgDwZhARZ8zPhwSrCawGr7VmK0aM8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776066325; c=relaxed/simple; bh=11ce8bUKvUSdcebzsjZtiRLgXFylySnevizU5TDAFts=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=n5xy66vdtn7zpqJl4+JBOQHM7iAIgp6KXUMysfQ8SUbcBpfLf/HZiVurkCjTmJ5rm8hn8dd5vBpu6Ca+VBHcVaAOnLrdTPPtaBi4SJsuQrik016qLIX0twmipAwtGWXUW9wYIGFJd0hb+3C5AqNjILcuqkqN/TiUjlNvbwNs4Rg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=rlaFdogi; arc=none smtp.client-ip=74.125.82.42 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="rlaFdogi" Received: by mail-dl1-f42.google.com with SMTP id a92af1059eb24-12c45281a06so1611480c88.1 for ; Mon, 13 Apr 2026 00:45:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776066322; x=1776671122; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=eNYrrMihyJ/UopuSP8NsPFIh0brjDU9y6jBpikXxsOI=; b=rlaFdogizaH8E48QTvwAewMKrEOKvjVGk8NUiMvPfxXtudCAn6AJJck1u1sPsjApvw V+jykR2eah19Ul04Ggv5O/draHnzso2rriDuTYkLDG69k2TUR5AV1Okwx63H/SEcQT2L o/VzvNMyv85GFv4tCobyFzT9S3zFYCjCVqsKNoaufkPQtko+tYf//rrd9BCFCSuG+FK+ AkhYscxlwAjBzJA22sYZ5r/rxj/rwKw3zptSsQ/VFOLgVdpFWutMjHkQ+VBDXz8p2/Dv EoMHOmZOnDj/LNg+fv5UlS4Uhq7el9M/AggMd+8SQFoRSNoia/I7j/qH9kMjuUGwQ1qo imOA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776066322; x=1776671122; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=eNYrrMihyJ/UopuSP8NsPFIh0brjDU9y6jBpikXxsOI=; b=G7cVlwxQabugrXZgmDVww9yTddoUrUA3TiavU53AkmBvLDxJ7hFoUQ67UGfEteLVUc BC1sL1t/O/oNkWQ9A9i7sOOl6jNrTUaxBn+b1YZCoad6HxtacG92GeqhWACudle9OP5c EnZwHlC/2LX7+quQdjvIfu+45d4mQs8hXcFnZPLPnrriGfWKaFi4ql0B0z9AQhhODo+i QY4LRW06X8lwg7JeLW1pwdOshJveg9fadFT3XJPOTOcANaKN3M4NBUtDVEs4FRCSMZt9 WE7yghufpjT9TPU4/QcbhYXLXz2WMz2MT6cvmOL2niZQd/1O06ED9lFdwUxSfR7irFya kaSw== X-Forwarded-Encrypted: i=1; AFNElJ/bScCzcoY+sw3XqbPT+sN6LRCHmCcjoYq4kuxuBdO6Rh6FdRMtycGOiF8P+v5FmDnnEA+C6fS2wZAzDeyjQ1Q=@vger.kernel.org X-Gm-Message-State: AOJu0YxpxKHvV7WogfLT4saRTTkXL6cz+AA6n/h24siGFtk1uCjvLVLH DkFSdSzYdIf5rxjOSYa5wpg19ZCgEMoMzBDytLvrGtm1OIAlP5kFttip X-Gm-Gg: AeBDiesbwF9GUIP/kb+jBh6HPzTspY3j1UJRRFpfosyrQQRmu0e0m9FKBKCf6ee4w1F yOa9KvXcpU8qh+UzB3E1EIPEHmZN3+z5UXyNOkTtRu5cHjjLSbyBSS+d89pH1ZsCyFLpJoZHNS6 zhaqpP9BwC2CIZFtBi6vVunLzMZeZMK7f0+fNmWII/9x8wlFjN9V0+mz57qHhcO7WtFOlCa1eIU 7GY/fkIQRHeg+TQpjH8f1iY2OOIVGmJLDgaVqVNueO5HanXbjk72D5EmHby+k0HzZNeLLRXZabp z+Kx3Go2g3K4m9mi6Z0IeNP8tZSQrppFuZO6WB9yM1xICL3KX5DkqxKG8I/dNH+tbcHDZ/fjw/P O5ED/YxWdDSYspI35Spcuk3KjIt5lNFAAHI9l902AKYSMiA+jPgOO4up/cTpPxSFd/FP6Ps9uFR CPIERBqG+nZYHsDqBi X-Received: by 2002:a05:7022:69a2:b0:12c:8b9:7208 with SMTP id a92af1059eb24-12c34eeb95cmr7021315c88.26.1776066322024; Mon, 13 Apr 2026 00:45:22 -0700 (PDT) Received: from wujing. ([74.48.213.230]) by smtp.gmail.com with ESMTPSA id a92af1059eb24-12c347fa2c9sm12884610c88.15.2026.04.13.00.45.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 13 Apr 2026 00:45:21 -0700 (PDT) From: Qiliang Yuan Date: Mon, 13 Apr 2026 15:43:17 +0800 Subject: [PATCH v2 11/12] Documentation: cgroup-v2: Document dynamic housekeeping (DHM) Precedence: bulk X-Mailing-List: linux-kselftest@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20260413-wujing-dhm-v2-11-06df21caba5d@gmail.com> References: <20260413-wujing-dhm-v2-0-06df21caba5d@gmail.com> In-Reply-To: <20260413-wujing-dhm-v2-0-06df21caba5d@gmail.com> To: Ingo Molnar , Peter Zijlstra , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Valentin Schneider , "Paul E. McKenney" , Frederic Weisbecker , Neeraj Upadhyay , Joel Fernandes , Josh Triplett , Boqun Feng , Uladzislau Rezki , Mathieu Desnoyers , Lai Jiangshan , Zqiang , Anna-Maria Behnsen , Ingo Molnar , Thomas Gleixner , Tejun Heo , Andrew Morton , Vlastimil Babka , Suren Baghdasaryan , Michal Hocko , Brendan Jackman , Johannes Weiner , Zi Yan , Waiman Long , Chen Ridong , =?utf-8?q?Michal_Koutn=C3=BD?= , Jonathan Corbet , Shuah Khan , Shuah Khan Cc: linux-kernel@vger.kernel.org, rcu@vger.kernel.org, linux-mm@kvack.org, cgroups@vger.kernel.org, linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org, Qiliang Yuan X-Mailer: b4 0.13.0 Update the admin-guide for cgroup-v2 to explicitly document the newly introduced cpuset.housekeeping.cpus and cpuset.housekeeping.smt_aware files. The documentation explains the use of the DHM framework for reconfiguring kernel subsystem isolation masks natively through the root cpuset without incurring system reboots, and describes the functional restrictions of SMT grouping safety constraints. Signed-off-by: Qiliang Yuan --- Documentation/admin-guide/cgroup-v2.rst | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) diff --git a/Documentation/admin-guide/cgroup-v2.rst b/Documentation/admin-guide/cgroup-v2.rst index 91beaa6798ce0..deb644b88509f 100644 --- a/Documentation/admin-guide/cgroup-v2.rst +++ b/Documentation/admin-guide/cgroup-v2.rst @@ -2592,6 +2592,30 @@ Cpuset Interface Files isolated partitions. It will be empty if no isolated partition is created. + cpuset.housekeeping.cpus + A read-write multiple values file that exists only on the root cgroup. + + This file is part of the Dynamic Housekeeping Management (DHM) + framework. It allows dynamic reconfiguration of the global + kernel housekeeping CPU mask without a system reboot. + + By writing a mask of CPUs (e.g. "0-3,8"), DHM will update all internal + housekeeping subsystem masks (scheduler domains, RCU NOCB, tick offload, + timers, unbound workqueues, and managed IRQs) in real time. + + The new mask must have at least one online CPU. The value stays constant + until changed or affected by CPU hot-unplug. + + cpuset.housekeeping.smt_aware + A read-write single value file that exists only on the root cgroup. + It accepts "0" or "1". The default value is "0" (false). + + This file enables the SMT-aware pipeline logic for DHM. When enabled (1), + any update to "cpuset.housekeeping.cpus" is strictly validated to ensure + Hardware Threads (SMT siblings) are kept together. If an SMT sibling pair + is split across the housekeeping boundary, the mask update is rejected + with an error to avoid severe cache and pipeline contention penalties. + cpuset.cpus.partition A read-write single value file which exists on non-root cpuset-enabled cgroups. This flag is owned by the parent cgroup -- 2.43.0