2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
4 * Copyright (c) 2007, 2008 Jeffrey Roberson <jeff@freebsd.org>
7 * Copyright (c) 2008 Nokia Corporation
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 #include <sys/cdefs.h>
33 __FBSDID("$FreeBSD$");
35 #define _WANT_FREEBSD_BITSET
37 #include <sys/param.h>
38 #include <sys/types.h>
40 #include <sys/resource.h>
41 #include <sys/cpuset.h>
42 #include <sys/domainset.h>
69 static cpulevel_t level;
70 static cpuwhich_t which;
72 static void usage(void);
79 static struct numa_policy policies[] = {
80 { "round-robin", DOMAINSET_POLICY_ROUNDROBIN },
81 { "rr", DOMAINSET_POLICY_ROUNDROBIN },
82 { "first-touch", DOMAINSET_POLICY_FIRSTTOUCH },
83 { "ft", DOMAINSET_POLICY_FIRSTTOUCH },
84 { "prefer", DOMAINSET_POLICY_PREFER },
85 { "interleave", DOMAINSET_POLICY_INTERLEAVE},
86 { "il", DOMAINSET_POLICY_INTERLEAVE},
87 { NULL, DOMAINSET_POLICY_INVALID }
90 static void printset(struct bitset *mask, int size);
93 parselist(char *list, struct bitset *mask, int size)
95 enum { NONE, NUM, DASH } state;
101 curnum = lastnum = 0;
102 for (l = list; *l != '\0';) {
107 "List entry %d exceeds maximum of %d",
117 for (; lastnum <= curnum; lastnum++)
118 BIT_SET(size, lastnum, mask);
133 BIT_SET(size, curnum, mask);
155 BIT_SET(size, curnum, mask);
162 errx(EXIT_FAILURE, "Malformed list %s", list);
166 parsecpulist(char *list, cpuset_t *mask)
169 if (strcasecmp(list, "all") == 0) {
170 if (cpuset_getaffinity(CPU_LEVEL_ROOT, CPU_WHICH_PID, -1,
171 sizeof(*mask), mask) != 0)
172 err(EXIT_FAILURE, "getaffinity");
175 parselist(list, (struct bitset *)mask, CPU_SETSIZE);
179 * permissively parse policy:domain list
181 * round-robin:0-4 explicit
182 * round-robin:all explicit root domains
183 * 0-4 implicit root policy
184 * round-robin implicit root domains
185 * all explicit root domains and implicit policy
188 parsedomainlist(char *list, domainset_t *mask, int *policyp)
190 domainset_t rootmask;
191 struct numa_policy *policy;
196 * Use the rootset's policy as the default for unspecified policies.
198 if (cpuset_getdomain(CPU_LEVEL_ROOT, CPU_WHICH_PID, -1,
199 sizeof(rootmask), &rootmask, &p) != 0)
200 err(EXIT_FAILURE, "getdomain");
203 for (policy = &policies[0]; policy->name != NULL; policy++) {
204 if (strncasecmp(l, policy->name, strlen(policy->name)) == 0) {
206 l += strlen(policy->name);
207 if (*l != ':' && *l != '\0')
208 errx(EXIT_FAILURE, "Malformed list %s", list);
215 if (strcasecmp(l, "all") == 0 || *l == '\0') {
216 DOMAINSET_COPY(&rootmask, mask);
219 parselist(l, (struct bitset *)mask, DOMAINSET_SETSIZE);
223 printset(struct bitset *mask, int size)
228 for (once = 0, bit = 0; bit < size; bit++) {
229 if (BIT_ISSET(size, bit, mask)) {
240 static const char *whichnames[] = { NULL, "tid", "pid", "cpuset", "irq", "jail",
242 static const char *levelnames[] = { NULL, " root", " cpuset", "" };
243 static const char *policynames[] = { "invalid", "round-robin", "first-touch",
244 "prefer", "interleave" };
253 if (cpuset_getaffinity(level, which, id, sizeof(mask), &mask) != 0)
254 err(EXIT_FAILURE, "getaffinity");
255 printf("%s %jd%s mask: ", whichnames[which], (intmax_t)id,
257 printset((struct bitset *)&mask, CPU_SETSIZE);
260 if (cpuset_getdomain(level, which, id, sizeof(domain), &domain,
262 err(EXIT_FAILURE, "getdomain");
263 printf("%s %jd%s domain policy: %s mask: ", whichnames[which],
264 (intmax_t)id, levelnames[level], policynames[policy]);
265 printset((struct bitset *)&domain, DOMAINSET_SETSIZE);
276 * Only LEVEL_WHICH && WHICH_CPUSET has a numbered id.
278 if (level == CPU_LEVEL_WHICH && !sflag)
279 level = CPU_LEVEL_CPUSET;
280 if (cpuset_getid(level, which, id, &setid))
282 printf("%s %jd%s id: %d\n", whichnames[which], (intmax_t)id,
283 levelnames[level], setid);
287 main(int argc, char *argv[])
298 DOMAINSET_ZERO(&domains);
299 policy = DOMAINSET_POLICY_INVALID;
300 level = CPU_LEVEL_WHICH;
301 which = CPU_WHICH_PID;
302 id = pid = tid = setid = -1;
303 while ((ch = getopt(argc, argv, "Ccd:gij:l:n:p:rs:t:x:")) != -1) {
310 level = CPU_LEVEL_CPUSET;
314 which = CPU_WHICH_DOMAIN;
325 which = CPU_WHICH_JAIL;
326 id = jail_getid(optarg);
328 errx(EXIT_FAILURE, "%s", jail_errmsg);
332 parsecpulist(optarg, &mask);
336 parsedomainlist(optarg, &domains, &policy);
340 which = CPU_WHICH_PID;
341 id = pid = atoi(optarg);
344 level = CPU_LEVEL_ROOT;
349 which = CPU_WHICH_CPUSET;
350 id = setid = atoi(optarg);
354 which = CPU_WHICH_TID;
355 id = tid = atoi(optarg);
359 which = CPU_WHICH_IRQ;
369 if (argc || Cflag || lflag || nflag)
371 /* Only one identity specifier. */
372 if (dflag + jflag + xflag + sflag + pflag + tflag > 1)
381 if (dflag || iflag || rflag)
384 * The user wants to run a command with a set and possibly cpumask.
387 if (Cflag || pflag || tflag || xflag || jflag)
390 if (cpuset_setid(CPU_WHICH_PID, -1, setid))
397 if (cpuset_setaffinity(level, CPU_WHICH_PID,
398 -1, sizeof(mask), &mask) != 0)
399 err(EXIT_FAILURE, "setaffinity");
402 if (cpuset_setdomain(level, CPU_WHICH_PID,
403 -1, sizeof(domains), &domains, policy) != 0)
404 err(EXIT_FAILURE, "setdomain");
408 err(errno == ENOENT ? 127 : 126, "%s", *argv);
411 * We're modifying something that presently exists.
413 if (Cflag && (jflag || !pflag || sflag || tflag || xflag))
415 if ((!lflag && !nflag) && cflag)
417 if ((!lflag && !nflag) && !(Cflag || sflag))
419 /* You can only set a mask on a thread. */
420 if (tflag && (sflag | pflag | xflag | jflag))
422 /* You can only set a mask on an irq. */
423 if (xflag && (jflag | pflag | sflag | tflag))
427 * Create a new cpuset and move the specified process
430 if (cpuset(&setid) < 0)
431 err(EXIT_FAILURE, "newid");
434 if (pflag && sflag) {
435 if (cpuset_setid(CPU_WHICH_PID, pid, setid))
436 err(EXIT_FAILURE, "setid");
438 * If the user specifies a set and a list we want the mask
439 * to effect the pid and not the set.
441 which = CPU_WHICH_PID;
445 if (cpuset_setaffinity(level, which, id, sizeof(mask),
447 err(EXIT_FAILURE, "setaffinity");
450 if (cpuset_setdomain(level, which, id, sizeof(domains),
451 &domains, policy) != 0)
452 err(EXIT_FAILURE, "setdomain");
463 "usage: cpuset [-l cpu-list] [-n policy:domain-list] [-s setid] cmd ...\n");
465 " cpuset [-l cpu-list] [-n policy:domain-list] [-s setid] -p pid\n");
467 " cpuset [-c] [-l cpu-list] [-n policy:domain-list] -C -p pid\n");
469 " cpuset [-c] [-l cpu-list] [-n policy:domain-list]\n"
470 " [-j jailid | -p pid | -t tid | -s setid | -x irq]\n");
472 " cpuset -g [-cir]\n"
473 " [-d domain | -j jailid | -p pid | -t tid | -s setid | -x irq]\n");