Skip to navigation

NUMA Programming on Red Hat Enterprise Linux 6 Part 3 - Bitmask Operations

Subscriber content preview. For full access to the Red Hat Knowledgebase, please log in.

Not a subscriber? Learn more about the benefits of Red Hat Subscriptions.

In part three of the NUMA video series, George Hacker looks at common bitmask operations such as bitmask allocation/destruction, manipulation and modification, and query and comparison.

Other videos in the series:
Part 1 - Introduction to NUMA
Part 2 - Getting Started with libnuma
Part 4 - Policy Operations & Memory Allocation
Part 5 - Miscellaneous NUMA Functions