1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
3 *
4 * Copyright (c) 2007, 2008 Jeffrey Roberson <jeff@freebsd.org>
5 * All rights reserved.
6 *
7 * Copyright (c) 2008 Nokia Corporation
8 * All rights reserved.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include <sys/cdefs.h>
33 #define _WANT_FREEBSD_BITSET
34
35 #include <sys/param.h>
36 #include <sys/types.h>
37 #include <sys/time.h>
38 #include <sys/resource.h>
39 #include <sys/cpuset.h>
40 #include <sys/domainset.h>
41
42 #include <ctype.h>
43 #include <err.h>
44 #include <errno.h>
45 #include <jail.h>
46 #include <limits.h>
47 #include <stdio.h>
48 #include <stdlib.h>
49 #include <stdint.h>
50 #include <unistd.h>
51 #include <string.h>
52
53 static int Cflag;
54 static int cflag;
55 static int dflag;
56 static int gflag;
57 static int iflag;
58 static int jflag;
59 static int lflag;
60 static int nflag;
61 static int pflag;
62 static int rflag;
63 static int sflag;
64 static int tflag;
65 static int xflag;
66 static id_t id;
67 static cpulevel_t level;
68 static cpuwhich_t which;
69
70 static void usage(void) __dead2;
71
72 struct numa_policy {
73 const char *name;
74 int policy;
75 };
76
77 static struct numa_policy policies[] = {
78 { "round-robin", DOMAINSET_POLICY_ROUNDROBIN },
79 { "rr", DOMAINSET_POLICY_ROUNDROBIN },
80 { "first-touch", DOMAINSET_POLICY_FIRSTTOUCH },
81 { "ft", DOMAINSET_POLICY_FIRSTTOUCH },
82 { "prefer", DOMAINSET_POLICY_PREFER },
83 { "interleave", DOMAINSET_POLICY_INTERLEAVE},
84 { "il", DOMAINSET_POLICY_INTERLEAVE},
85 { NULL, DOMAINSET_POLICY_INVALID }
86 };
87
88 static void printset(struct bitset *mask, int size);
89
90 static void
parselist(char * list,struct bitset * mask,int size)91 parselist(char *list, struct bitset *mask, int size)
92 {
93 enum { NONE, NUM, DASH } state;
94 int lastnum;
95 int curnum;
96 char *l;
97
98 state = NONE;
99 curnum = lastnum = 0;
100 for (l = list; *l != '\0';) {
101 if (isdigit(*l)) {
102 curnum = atoi(l);
103 if (curnum >= size)
104 errx(EXIT_FAILURE,
105 "List entry %d exceeds maximum of %d",
106 curnum, size - 1);
107 while (isdigit(*l))
108 l++;
109 switch (state) {
110 case NONE:
111 lastnum = curnum;
112 state = NUM;
113 break;
114 case DASH:
115 for (; lastnum <= curnum; lastnum++)
116 BIT_SET(size, lastnum, mask);
117 state = NONE;
118 break;
119 case NUM:
120 default:
121 goto parserr;
122 }
123 continue;
124 }
125 switch (*l) {
126 case ',':
127 switch (state) {
128 case NONE:
129 break;
130 case NUM:
131 BIT_SET(size, curnum, mask);
132 state = NONE;
133 break;
134 case DASH:
135 goto parserr;
136 break;
137 }
138 break;
139 case '-':
140 if (state != NUM)
141 goto parserr;
142 state = DASH;
143 break;
144 default:
145 goto parserr;
146 }
147 l++;
148 }
149 switch (state) {
150 case NONE:
151 break;
152 case NUM:
153 BIT_SET(size, curnum, mask);
154 break;
155 case DASH:
156 goto parserr;
157 }
158 return;
159 parserr:
160 errx(EXIT_FAILURE, "Malformed list %s", list);
161 }
162
163 static void
parsecpulist(char * list,cpuset_t * mask)164 parsecpulist(char *list, cpuset_t *mask)
165 {
166
167 if (strcasecmp(list, "all") == 0) {
168 if (cpuset_getaffinity(CPU_LEVEL_ROOT, CPU_WHICH_PID, -1,
169 sizeof(*mask), mask) != 0)
170 err(EXIT_FAILURE, "getaffinity");
171 return;
172 }
173 parselist(list, (struct bitset *)mask, CPU_SETSIZE);
174 }
175
176 /*
177 * permissively parse policy:domain list
178 * allow:
179 * round-robin:0-4 explicit
180 * round-robin:all explicit root domains
181 * 0-4 implicit root policy
182 * round-robin implicit root domains
183 * all explicit root domains and implicit policy
184 */
185 static void
parsedomainlist(char * list,domainset_t * mask,int * policyp)186 parsedomainlist(char *list, domainset_t *mask, int *policyp)
187 {
188 domainset_t rootmask;
189 struct numa_policy *policy;
190 char *l;
191 int p;
192
193 /*
194 * Use the rootset's policy as the default for unspecified policies.
195 */
196 if (cpuset_getdomain(CPU_LEVEL_ROOT, CPU_WHICH_PID, -1,
197 sizeof(rootmask), &rootmask, &p) != 0)
198 err(EXIT_FAILURE, "getdomain");
199
200 l = list;
201 for (policy = &policies[0]; policy->name != NULL; policy++) {
202 if (strncasecmp(l, policy->name, strlen(policy->name)) == 0) {
203 p = policy->policy;
204 l += strlen(policy->name);
205 if (*l != ':' && *l != '\0')
206 errx(EXIT_FAILURE, "Malformed list %s", list);
207 if (*l == ':')
208 l++;
209 break;
210 }
211 }
212 *policyp = p;
213 if (strcasecmp(l, "all") == 0 || *l == '\0') {
214 DOMAINSET_COPY(&rootmask, mask);
215 return;
216 }
217 parselist(l, (struct bitset *)mask, DOMAINSET_SETSIZE);
218 }
219
220 static void
printset(struct bitset * mask,int size)221 printset(struct bitset *mask, int size)
222 {
223 int once;
224 int bit;
225
226 for (once = 0, bit = 0; bit < size; bit++) {
227 if (BIT_ISSET(size, bit, mask)) {
228 if (once == 0) {
229 printf("%d", bit);
230 once = 1;
231 } else
232 printf(", %d", bit);
233 }
234 }
235 printf("\n");
236 }
237
238 static const char *whichnames[] = { NULL, "tid", "pid", "cpuset", "irq", "jail",
239 "domain" };
240 static const char *levelnames[] = { NULL, " root", " cpuset", "" };
241 static const char *policynames[] = { "invalid", "round-robin", "first-touch",
242 "prefer", "interleave" };
243
244 static void
printaffinity(void)245 printaffinity(void)
246 {
247 domainset_t domain;
248 cpuset_t mask;
249 int policy;
250
251 if (cpuset_getaffinity(level, which, id, sizeof(mask), &mask) != 0)
252 err(EXIT_FAILURE, "getaffinity");
253 printf("%s %jd%s mask: ", whichnames[which], (intmax_t)id,
254 levelnames[level]);
255 printset((struct bitset *)&mask, CPU_SETSIZE);
256 if (dflag || xflag)
257 goto out;
258 if (cpuset_getdomain(level, which, id, sizeof(domain), &domain,
259 &policy) != 0)
260 err(EXIT_FAILURE, "getdomain");
261 printf("%s %jd%s domain policy: %s mask: ", whichnames[which],
262 (intmax_t)id, levelnames[level], policynames[policy]);
263 printset((struct bitset *)&domain, DOMAINSET_SETSIZE);
264 out:
265 exit(EXIT_SUCCESS);
266 }
267
268 static void
printsetid(void)269 printsetid(void)
270 {
271 cpusetid_t setid;
272
273 /*
274 * Only LEVEL_WHICH && WHICH_CPUSET has a numbered id.
275 */
276 if (level == CPU_LEVEL_WHICH && !sflag)
277 level = CPU_LEVEL_CPUSET;
278 if (cpuset_getid(level, which, id, &setid))
279 err(errno, "getid");
280 printf("%s %jd%s id: %d\n", whichnames[which], (intmax_t)id,
281 levelnames[level], setid);
282 }
283
284 int
main(int argc,char * argv[])285 main(int argc, char *argv[])
286 {
287 domainset_t domains;
288 cpusetid_t setid;
289 cpuset_t mask;
290 int policy;
291 lwpid_t tid;
292 pid_t pid;
293 int ch;
294
295 CPU_ZERO(&mask);
296 DOMAINSET_ZERO(&domains);
297 policy = DOMAINSET_POLICY_INVALID;
298 level = CPU_LEVEL_WHICH;
299 which = CPU_WHICH_PID;
300 id = pid = tid = setid = -1;
301 while ((ch = getopt(argc, argv, "Ccd:gij:l:n:p:rs:t:x:")) != -1) {
302 switch (ch) {
303 case 'C':
304 Cflag = 1;
305 break;
306 case 'c':
307 cflag = 1;
308 level = CPU_LEVEL_CPUSET;
309 break;
310 case 'd':
311 dflag = 1;
312 which = CPU_WHICH_DOMAIN;
313 id = atoi(optarg);
314 break;
315 case 'g':
316 gflag = 1;
317 break;
318 case 'i':
319 iflag = 1;
320 break;
321 case 'j':
322 jflag = 1;
323 which = CPU_WHICH_JAIL;
324 id = jail_getid(optarg);
325 if (id < 0)
326 errx(EXIT_FAILURE, "%s", jail_errmsg);
327 break;
328 case 'l':
329 lflag = 1;
330 parsecpulist(optarg, &mask);
331 break;
332 case 'n':
333 nflag = 1;
334 parsedomainlist(optarg, &domains, &policy);
335 break;
336 case 'p':
337 pflag = 1;
338 which = CPU_WHICH_PID;
339 id = pid = atoi(optarg);
340 break;
341 case 'r':
342 level = CPU_LEVEL_ROOT;
343 rflag = 1;
344 break;
345 case 's':
346 sflag = 1;
347 which = CPU_WHICH_CPUSET;
348 id = setid = atoi(optarg);
349 break;
350 case 't':
351 tflag = 1;
352 which = CPU_WHICH_TID;
353 id = tid = atoi(optarg);
354 break;
355 case 'x':
356 xflag = 1;
357 which = CPU_WHICH_IRQ;
358 id = atoi(optarg);
359 break;
360 default:
361 usage();
362 }
363 }
364 argc -= optind;
365 argv += optind;
366 if (gflag) {
367 if (argc || Cflag || lflag || nflag)
368 usage();
369 /* Only one identity specifier. */
370 if (dflag + jflag + xflag + sflag + pflag + tflag > 1)
371 usage();
372 if (iflag)
373 printsetid();
374 else
375 printaffinity();
376 exit(EXIT_SUCCESS);
377 }
378
379 if (dflag || iflag || rflag)
380 usage();
381 /*
382 * The user wants to run a command with a set and possibly cpumask.
383 */
384 if (argc) {
385 if (Cflag || pflag || tflag || xflag || jflag)
386 usage();
387 if (sflag) {
388 if (cpuset_setid(CPU_WHICH_PID, -1, setid))
389 err(argc, "setid");
390 } else {
391 if (cpuset(&setid))
392 err(argc, "newid");
393 }
394 if (lflag) {
395 if (cpuset_setaffinity(level, CPU_WHICH_PID,
396 -1, sizeof(mask), &mask) != 0)
397 err(EXIT_FAILURE, "setaffinity");
398 }
399 if (nflag) {
400 if (cpuset_setdomain(level, CPU_WHICH_PID,
401 -1, sizeof(domains), &domains, policy) != 0)
402 err(EXIT_FAILURE, "setdomain");
403 }
404 errno = 0;
405 execvp(*argv, argv);
406 err(errno == ENOENT ? 127 : 126, "%s", *argv);
407 }
408 /*
409 * We're modifying something that presently exists.
410 */
411 if (Cflag && (jflag || !pflag || sflag || tflag || xflag))
412 usage();
413 if ((!lflag && !nflag) && cflag)
414 usage();
415 if ((!lflag && !nflag) && !(Cflag || sflag))
416 usage();
417 /* You can only set a mask on a thread. */
418 if (tflag && (sflag | pflag | xflag | jflag))
419 usage();
420 /* You can only set a mask on an irq. */
421 if (xflag && (jflag | pflag | sflag | tflag))
422 usage();
423 if (Cflag) {
424 /*
425 * Create a new cpuset and move the specified process
426 * into the set.
427 */
428 if (cpuset(&setid) < 0)
429 err(EXIT_FAILURE, "newid");
430 sflag = 1;
431 }
432 if (pflag && sflag) {
433 if (cpuset_setid(CPU_WHICH_PID, pid, setid))
434 err(EXIT_FAILURE, "setid");
435 /*
436 * If the user specifies a set and a list we want the mask
437 * to effect the pid and not the set.
438 */
439 which = CPU_WHICH_PID;
440 id = pid;
441 }
442 if (lflag) {
443 if (cpuset_setaffinity(level, which, id, sizeof(mask),
444 &mask) != 0)
445 err(EXIT_FAILURE, "setaffinity");
446 }
447 if (nflag) {
448 if (cpuset_setdomain(level, which, id, sizeof(domains),
449 &domains, policy) != 0)
450 err(EXIT_FAILURE, "setdomain");
451 }
452
453 exit(EXIT_SUCCESS);
454 }
455
456 static void
usage(void)457 usage(void)
458 {
459
460 fprintf(stderr,
461 "usage: cpuset [-l cpu-list] [-n policy:domain-list] [-s setid] cmd ...\n");
462 fprintf(stderr,
463 " cpuset [-l cpu-list] [-n policy:domain-list] [-s setid] -p pid\n");
464 fprintf(stderr,
465 " cpuset [-c] [-l cpu-list] [-n policy:domain-list] -C -p pid\n");
466 fprintf(stderr,
467 " cpuset [-c] [-l cpu-list] [-n policy:domain-list]\n"
468 " [-j jailid | -p pid | -t tid | -s setid | -x irq]\n");
469 fprintf(stderr,
470 " cpuset -g [-cir]\n"
471 " [-d domain | -j jailid | -p pid | -t tid | -s setid | -x irq]\n");
472 exit(1);
473 }
474