Received: by 10.213.65.68 with SMTP id h4csp903588imn; Tue, 27 Mar 2018 10:54:20 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+sj68jrxbbPyXEsgYecwrsufIqwDM63Xl8znFmsDw3BIDH7yS/oyilnz+vq1uq/1n6zY2K X-Received: by 2002:a17:902:5496:: with SMTP id e22-v6mr279394pli.81.1522173260148; Tue, 27 Mar 2018 10:54:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522173260; cv=none; d=google.com; s=arc-20160816; b=1A8dZE+a+srt2zGMd6FzUaKciYnjes8AqICEp2rnj2CShCxfSvK8TDNGAYU4clCIq9 sUd1kBNA3XgfxBLNAcRe9RxmMIAktuGWmzdQK08oZnsFqczre/N+Kh5AOSd46DqVY9kz IstldaH9kNztJrThtdlRmNGWakbrIeLia6dNN69UJkrKLUNTRTPF9XIvsppemjSmn0mp OKxWIJBgpkuXkbBYAZloiXgNaSrfW++PMDbc6EPIvJ1TYlzG1koTXWE9aNnSMF+k+cAk 4gy9yo+fxwiKLaQukhA6VnudoHqf7j4Npb0p0IGtrYKe13mT/Wlk20jQZYMs85j/Zx73 fhpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=PsiRuth7DiMGEZvjV2sM3V4g7rQDCQMAgfBqP0W7jxM=; b=FxD2vFcGRwLXmjAl/mPG0clsHw7aVwDClZX2vh6IKiM+opt1Z77jMq6L4yZop+Jzz8 uX6NN/LFF19PaQeF7RaojhbU0VydNcjZDI44Xs4x6OyqiZIdyRqPskISbhJEhjVWg8Br qN3u4zdsUpkP5lI5nupNy3jUQmnv3ebyOnzdtOFZnv5+Y6PTLI2v9J1aEriuEGMnB3Ad PSFJrxUz4bftWAY4yNjEyy2bOuKjs7uVU3CfZvkXvIEM4TGgCrBzWWrlrsy5M2seMzSV L08Wr4HZ/LsptnevQjK0S2mJxTiuZM72TKPxBGzgE+TDNedXuOeVFe+684kQjwMaPY5j jQCA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t190si1102393pgd.101.2018.03.27.10.54.05; Tue, 27 Mar 2018 10:54:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753675AbeC0Rwo (ORCPT + 99 others); Tue, 27 Mar 2018 13:52:44 -0400 Received: from mxchg04.rrz.uni-hamburg.de ([134.100.38.114]:34915 "EHLO mxchg04.rrz.uni-hamburg.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752537AbeC0QcI (ORCPT ); Tue, 27 Mar 2018 12:32:08 -0400 Received: from localhost (localhost [127.0.0.1]) by mxchg04.rrz.uni-hamburg.de (Postfix) with ESMTP id 2046A726FB1; Tue, 27 Mar 2018 18:32:06 +0200 (CEST) X-Virus-Scanned: by University of Hamburg ( RRZ / mgw01.rrz.uni-hamburg.de ) Received: from mxchg04.rrz.uni-hamburg.de ([127.0.0.1]) by localhost (mxchg04.rrz.uni-hamburg.de [127.0.0.1]) (amavisd-new, port 10424) with ESMTP id wMkecnPwI8D8; Tue, 27 Mar 2018 18:32:06 +0200 (CEST) Received: from mxchg03.rrz.uni-hamburg.de (mxchg03.rrz.uni-hamburg.de [134.100.38.113]) by mxchg04.rrz.uni-hamburg.de (Postfix) with ESMTPS; Tue, 27 Mar 2018 18:32:06 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mxchg03.rrz.uni-hamburg.de (Postfix) with ESMTP id 090431E0379; Tue, 27 Mar 2018 18:32:06 +0200 (CEST) X-Virus-Scanned: by University of Hamburg ( RRZ / mgw05.rrz.uni-hamburg.de ) Received: from mxchg03.rrz.uni-hamburg.de ([127.0.0.1]) by localhost (mxchg03.rrz.uni-hamburg.de [127.0.0.1]) (amavisd-new, port 10324) with ESMTP id 7SWNVRvBPcGZ; Tue, 27 Mar 2018 18:32:06 +0200 (CEST) Received: from mailhost.uni-hamburg.de (mailhost.uni-hamburg.de [134.100.38.99]) by mxchg03.rrz.uni-hamburg.de (Postfix) with ESMTPS; Tue, 27 Mar 2018 18:32:05 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mailhost.uni-hamburg.de (Postfix) with ESMTP id EFDAFF3B0; Tue, 27 Mar 2018 18:32:05 +0200 (CEST) X-Virus-Scanned: by University of Hamburg ( RRZ / mh01.rrz.uni-hamburg.de ) Received: from mailhost.uni-hamburg.de ([134.100.38.99]) by localhost (mailhost.uni-hamburg.de [127.0.0.1]) (amavisd-new, port 20124) with LMTP id vHFzuvVmcuKu; Tue, 27 Mar 2018 18:32:05 +0200 (CEST) Received: from cortex.rrz.uni-hamburg.de (cortex.rrz.uni-hamburg.de [134.100.3.33]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: rznv039@uni-hamburg.de) by mailhost.uni-hamburg.de (Postfix) with ESMTPSA id D97351F951; Tue, 27 Mar 2018 18:32:05 +0200 (CEST) Date: Tue, 27 Mar 2018 18:32:45 +0200 From: "Dr. Thomas Orgis" To: Cc: Balbir Singh Subject: [RFC PATCH v2] taskstats: introduce version 9 with exe file info Message-ID: <20180327183245.11b96d7d@cortex.rrz.uni-hamburg.de> In-Reply-To: <20180303095105.43084e93@sturbolzen> References: <20180303095105.43084e93@sturbolzen> Organization: =?UTF-8?B?VW5pdmVyc2l0w6R0?= Hamburg X-Mailer: Claws Mail 3.15.0-dirty (GTK+ 2.24.31; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This adds fields to the taskstats struct that give device and inode info for the executable file associated with the process as a safer way to get that than polling /proc/$pid/exe before a process ends. The getdelay example program is accompanied by a variant that just prints a stream of exiting tasks with the added info. The idea is to be able to collect global statistics about use of certain programs installed on a system by associating process/task stats with an absolute executable path. The command field is unsuitable as it does not distinguish between /foo/bar/v1.2.3/bin/bar_exe and /foo/bar/v2.3.4/bin/bar_exe and is generally rather arbitrary. I would like to just get the path communicated to userspace, but I presume the growth of the struct by PATH_MAX bytes would not be welcomed. This version of the patch returns correct device IDs by copying what fs/stat.c does, despite the claim that the s_dev member of struct super_block is not supposed to be a search index and not a device ID (include/linux/fs.h). --- include/uapi/linux/taskstats.h | 21 +- kernel/taskstats.c | 19 ++ tools/accounting/.gitignore | 1 + tools/accounting/Makefile | 2 +- tools/accounting/procacct.c | 425 +++++++++++++++++++++++++++++++++++++++++ 5 files changed, 466 insertions(+), 2 deletions(-) create mode 100644 tools/accounting/procacct.c diff --git a/include/uapi/linux/taskstats.h b/include/uapi/linux/taskstats.h index b7aa7bb2349f..17cbfeaf09a7 100644 --- a/include/uapi/linux/taskstats.h +++ b/include/uapi/linux/taskstats.h @@ -34,7 +34,7 @@ */ -#define TASKSTATS_VERSION 8 +#define TASKSTATS_VERSION 9 #define TS_COMM_LEN 32 /* should be >= TASK_COMM_LEN * in linux/sched.h */ @@ -164,6 +164,25 @@ struct taskstats { /* Delay waiting for memory reclaim */ __u64 freepages_count; __u64 freepages_delay_total; + + /* + * Version 9: + * Extra fields detailing executable file (/proc/$pid/exe). + * Values are both zero if there is no executable file + * Chose 64 bit for both to keep alignment, possibly really + * used for device, while userspace will usually only use + * 16 bits anyway. + * The client application is supposed to translate that to a + * file path itself, with knowledge about possible failure + * modes (changes in mounts, filesystem operations). + * Communicating the path from the kernel's view would mean + * adding PATH_MAX bytes to this struct and more work. + * I guess we do not want that. It would be convenient, though. + */ + __u64 ac_exe_dev; /* device ID */ + __u64 ac_exe_inode; /* inode number */ + /* Version 9 ends here. */ + }; diff --git a/kernel/taskstats.c b/kernel/taskstats.c index 4e62a4a8fa91..520ff6eb3a2f 100644 --- a/kernel/taskstats.c +++ b/kernel/taskstats.c @@ -166,6 +166,22 @@ static void send_cpu_listeners(struct sk_buff *skb, up_write(&listeners->sem); } +static void exe_add_tsk(struct taskstats *stats, struct task_struct *tsk) +{ + /* No idea if I'm allowed to access that here, now. */ + struct file *exe_file = get_task_exe_file(tsk); + if (exe_file) { + /* Following cp_new_stat64() in stat.c . */ + stats->ac_exe_dev = + huge_encode_dev(exe_file->f_inode->i_sb->s_dev); + stats->ac_exe_inode = exe_file->f_inode->i_ino; + fput(exe_file); + } else { + stats->ac_exe_dev = 0; + stats->ac_exe_inode = 0; + } +} + static void fill_stats(struct user_namespace *user_ns, struct pid_namespace *pid_ns, struct task_struct *tsk, struct taskstats *stats) @@ -188,6 +204,9 @@ static void fill_stats(struct user_namespace *user_ns, /* fill in extended acct fields */ xacct_add_tsk(stats, tsk); + + /* add executable info */ + exe_add_tsk(stats, tsk); } static int fill_stats_for_pid(pid_t pid, struct taskstats *stats) diff --git a/tools/accounting/.gitignore b/tools/accounting/.gitignore index 86485203c4ae..6a420bc8a63d 100644 --- a/tools/accounting/.gitignore +++ b/tools/accounting/.gitignore @@ -1 +1,2 @@ getdelays +procacct diff --git a/tools/accounting/Makefile b/tools/accounting/Makefile index 03687f19cbb1..11def1ad046c 100644 --- a/tools/accounting/Makefile +++ b/tools/accounting/Makefile @@ -2,7 +2,7 @@ CC := $(CROSS_COMPILE)gcc CFLAGS := -I../../usr/include -PROGS := getdelays +PROGS := getdelays procacct all: $(PROGS) diff --git a/tools/accounting/procacct.c b/tools/accounting/procacct.c new file mode 100644 index 000000000000..1e1238bbbee7 --- /dev/null +++ b/tools/accounting/procacct.c @@ -0,0 +1,425 @@ +/* getdelays.c + * + * Utility to get per-pid and per-tgid delay accounting statistics + * Also illustrates usage of the taskstats interface + * + * Copyright (C) Shailabh Nagar, IBM Corp. 2005 + * Copyright (C) Balbir Singh, IBM Corp. 2006 + * Copyright (c) Jay Lan, SGI. 2006 + * + * Compile with + * gcc -I/usr/src/linux/include getdelays.c -o getdelays + * + * I intended to only count processes (tgid stats), but that + * gives empty values for the ones I am interested in. There was + * a patch posted ages ago that would have added the accounting + * fields in the aggregation ... but did not make it, apparently. + * Linux kernel folks are interested in stuff like that delay + * accounting (not sure I know what this is about), while I want + * a reliable way to add up the compute/memory resources used + * by certain processes. + * + * So, this reports task stats only, hoping that a consumer of the + * data will sum up the threads sharing a common executable. + * Counters for program instances do not make sense as long as + * I cannot really tell processes and mere threads apart. + */ + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include +#include +#include + +/* + * Generic macros for dealing with netlink sockets. Might be duplicated + * elsewhere. It is recommended that commercial grade applications use + * libnl or libnetlink and use the interfaces provided by the library + */ +#define GENLMSG_DATA(glh) ((void *)(NLMSG_DATA(glh) + GENL_HDRLEN)) +#define GENLMSG_PAYLOAD(glh) (NLMSG_PAYLOAD(glh, 0) - GENL_HDRLEN) +#define NLA_DATA(na) ((void *)((char*)(na) + NLA_HDRLEN)) +#define NLA_PAYLOAD(len) (len - NLA_HDRLEN) + +#define err(code, fmt, arg...) \ + do { \ + fprintf(stderr, fmt, ##arg); \ + exit(code); \ + } while (0) + +int done; +int rcvbufsz; +char name[100]; +int dbg; +int print_delays; +int print_io_accounting; +int print_task_context_switch_counts; + +#define PRINTF(fmt, arg...) { \ + if (dbg) { \ + printf(fmt, ##arg); \ + } \ + } + +/* Maximum size of response requested or message sent */ +#define MAX_MSG_SIZE 1024 +/* Maximum number of cpus expected to be specified in a cpumask */ +#define MAX_CPUS 32 + +struct msgtemplate { + struct nlmsghdr n; + struct genlmsghdr g; + char buf[MAX_MSG_SIZE]; +}; + +char cpumask[100+6*MAX_CPUS]; + +static void usage(void) +{ + fprintf(stderr, "getdelays [-dilv] [-w logfile] [-r bufsize] " + "[-m cpumask] [-t tgid] [-p pid]\n"); + fprintf(stderr, " -d: print delayacct stats\n"); + fprintf(stderr, " -i: print IO accounting (works only with -p)\n"); + fprintf(stderr, " -l: listen forever\n"); + fprintf(stderr, " -v: debug on\n"); + fprintf(stderr, " -C: container path\n"); +} + +/* + * Create a raw netlink socket and bind + */ +static int create_nl_socket(int protocol) +{ + int fd; + struct sockaddr_nl local; + + fd = socket(AF_NETLINK, SOCK_RAW, protocol); + if (fd < 0) + return -1; + + if (rcvbufsz) + if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, + &rcvbufsz, sizeof(rcvbufsz)) < 0) { + fprintf(stderr, "Unable to set socket rcv buf size to %d\n", + rcvbufsz); + goto error; + } + + memset(&local, 0, sizeof(local)); + local.nl_family = AF_NETLINK; + + if (bind(fd, (struct sockaddr *) &local, sizeof(local)) < 0) + goto error; + + return fd; +error: + close(fd); + return -1; +} + + +static int send_cmd(int sd, __u16 nlmsg_type, __u32 nlmsg_pid, + __u8 genl_cmd, __u16 nla_type, + void *nla_data, int nla_len) +{ + struct nlattr *na; + struct sockaddr_nl nladdr; + int r, buflen; + char *buf; + + struct msgtemplate msg; + + msg.n.nlmsg_len = NLMSG_LENGTH(GENL_HDRLEN); + msg.n.nlmsg_type = nlmsg_type; + msg.n.nlmsg_flags = NLM_F_REQUEST; + msg.n.nlmsg_seq = 0; + msg.n.nlmsg_pid = nlmsg_pid; + msg.g.cmd = genl_cmd; + msg.g.version = 0x1; + na = (struct nlattr *) GENLMSG_DATA(&msg); + na->nla_type = nla_type; + na->nla_len = nla_len + 1 + NLA_HDRLEN; + memcpy(NLA_DATA(na), nla_data, nla_len); + msg.n.nlmsg_len += NLMSG_ALIGN(na->nla_len); + + buf = (char *) &msg; + buflen = msg.n.nlmsg_len ; + memset(&nladdr, 0, sizeof(nladdr)); + nladdr.nl_family = AF_NETLINK; + while ((r = sendto(sd, buf, buflen, 0, (struct sockaddr *) &nladdr, + sizeof(nladdr))) < buflen) { + if (r > 0) { + buf += r; + buflen -= r; + } else if (errno != EAGAIN) + return -1; + } + return 0; +} + + +/* + * Probe the controller in genetlink to find the family id + * for the TASKSTATS family + */ +static int get_family_id(int sd) +{ + struct { + struct nlmsghdr n; + struct genlmsghdr g; + char buf[256]; + } ans; + + int id = 0, rc; + struct nlattr *na; + int rep_len; + + strcpy(name, TASKSTATS_GENL_NAME); + rc = send_cmd(sd, GENL_ID_CTRL, getpid(), CTRL_CMD_GETFAMILY, + CTRL_ATTR_FAMILY_NAME, (void *)name, + strlen(TASKSTATS_GENL_NAME)+1); + if (rc < 0) + return 0; /* sendto() failure? */ + + rep_len = recv(sd, &ans, sizeof(ans), 0); + if (ans.n.nlmsg_type == NLMSG_ERROR || + (rep_len < 0) || !NLMSG_OK((&ans.n), rep_len)) + return 0; + + na = (struct nlattr *) GENLMSG_DATA(&ans); + na = (struct nlattr *) ((char *) na + NLA_ALIGN(na->nla_len)); + if (na->nla_type == CTRL_ATTR_FAMILY_ID) { + id = *(__u16 *) NLA_DATA(na); + } + return id; +} + +#define average_ms(t, c) (t / 1000000ULL / (c ? c : 1)) + +static void print_procacct(struct taskstats *t) +{ + printf("pid=%lu uid=%lu wall=%llu cpu=%llu vmpeak=%llu rsspeak=%llu dev=%llu:%llu inode=%llu comm=%s\n" + , (unsigned long)t->ac_pid + , (unsigned long)t->ac_uid + , (unsigned long long)t->ac_etime + , (unsigned long long)(t->ac_utime+t->ac_stime) + , (unsigned long long)t->hiwater_vm + , (unsigned long long)t->hiwater_rss + , (unsigned long)(t->version >= 9 ? MAJOR(t->ac_exe_dev) : 0) + , (unsigned long)(t->version >= 9 ? MINOR(t->ac_exe_dev) : 0) + , (unsigned long long)(t->version >= 9 ? t->ac_exe_inode : 0) + , t->ac_comm + ); +} + +int main(int argc, char *argv[]) +{ + int c, rc, rep_len, aggr_len, len2; + int cmd_type = TASKSTATS_CMD_ATTR_UNSPEC; + __u16 id; + __u32 mypid; + + struct nlattr *na; + int nl_sd = -1; + int len = 0; + pid_t tid = 0; + pid_t rtid = 0; + + int fd = 0; + int count = 0; + int write_file = 0; + int maskset = 0; + char *logfile = NULL; + int loop = 1; + int containerset = 0; + char *containerpath = NULL; + int cfd = 0; + int forking = 0; + sigset_t sigset; + + struct msgtemplate msg; + + while (!forking) { + c = getopt(argc, argv, "m:vr:"); + if (c < 0) + break; + + switch (c) { + case 'w': + logfile = strdup(optarg); + printf("write to file %s\n", logfile); + write_file = 1; + break; + case 'r': + rcvbufsz = atoi(optarg); + printf("receive buf size %d\n", rcvbufsz); + if (rcvbufsz < 0) + err(1, "Invalid rcv buf size\n"); + break; + case 'm': + strncpy(cpumask, optarg, sizeof(cpumask)); + cpumask[sizeof(cpumask) - 1] = '\0'; + maskset = 1; + break; + case 'v': + printf("debug on\n"); + dbg = 1; + break; + default: + usage(); + exit(-1); + } + } + if(!maskset) + { + maskset = 1; + strncpy(cpumask, "1", sizeof(cpumask)); + cpumask[sizeof(cpumask) - 1] = '\0'; + } + printf("cpumask %s maskset %d\n", cpumask, maskset); + + if (write_file) { + fd = open(logfile, O_WRONLY | O_CREAT | O_TRUNC, + S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH); + if (fd == -1) { + perror("Cannot open output file\n"); + exit(1); + } + } + + nl_sd = create_nl_socket(NETLINK_GENERIC); + if (nl_sd < 0) + err(1, "error creating Netlink socket\n"); + + + mypid = getpid(); + id = get_family_id(nl_sd); + if (!id) { + fprintf(stderr, "Error getting family id, errno %d\n", errno); + goto err; + } + PRINTF("family id %d\n", id); + + if (maskset) { + rc = send_cmd(nl_sd, id, mypid, TASKSTATS_CMD_GET, + TASKSTATS_CMD_ATTR_REGISTER_CPUMASK, + &cpumask, strlen(cpumask) + 1); + PRINTF("Sent register cpumask, retval %d\n", rc); + if (rc < 0) { + fprintf(stderr, "error sending register cpumask\n"); + goto err; + } + } + + do { + rep_len = recv(nl_sd, &msg, sizeof(msg), 0); + PRINTF("received %d bytes\n", rep_len); + + if (rep_len < 0) { + fprintf(stderr, "nonfatal reply error: errno %d\n", + errno); + continue; + } + if (msg.n.nlmsg_type == NLMSG_ERROR || + !NLMSG_OK((&msg.n), rep_len)) { + struct nlmsgerr *err = NLMSG_DATA(&msg); + fprintf(stderr, "fatal reply error, errno %d\n", + err->error); + goto done; + } + + PRINTF("nlmsghdr size=%zu, nlmsg_len=%d, rep_len=%d\n", + sizeof(struct nlmsghdr), msg.n.nlmsg_len, rep_len); + + + rep_len = GENLMSG_PAYLOAD(&msg.n); + + na = (struct nlattr *) GENLMSG_DATA(&msg); + len = 0; + while (len < rep_len) { + len += NLA_ALIGN(na->nla_len); + int mother = na->nla_type; + PRINTF("mother=%i\n", mother); + switch (na->nla_type) { + case TASKSTATS_TYPE_AGGR_PID: + /* Fall through */ + case TASKSTATS_TYPE_AGGR_TGID: + /* Fall through */ + aggr_len = NLA_PAYLOAD(na->nla_len); + len2 = 0; + /* For nested attributes, na follows */ + na = (struct nlattr *) NLA_DATA(na); + done = 0; + while (len2 < aggr_len) { + switch (na->nla_type) { + case TASKSTATS_TYPE_PID: + rtid = *(int *) NLA_DATA(na); + PRINTF("PID\t%d\n", rtid); + break; + case TASKSTATS_TYPE_TGID: + rtid = *(int *) NLA_DATA(na); + PRINTF("TGID\t%d\n", rtid); + break; + case TASKSTATS_TYPE_STATS: + count++; + if(mother == TASKSTATS_TYPE_AGGR_PID) + print_procacct((struct taskstats *) NLA_DATA(na)); + if (fd) { + if (write(fd, NLA_DATA(na), na->nla_len) < 0) { + err(1,"write error\n"); + } + } + if (!loop) + goto done; + break; + case TASKSTATS_TYPE_NULL: + break; + default: + fprintf(stderr, "Unknown nested" + " nla_type %d\n", + na->nla_type); + break; + } + len2 += NLA_ALIGN(na->nla_len); + na = (struct nlattr *)((char *)na + + NLA_ALIGN(na->nla_len)); + } + break; + + default: + fprintf(stderr, "Unexpected nla_type %d\n", + na->nla_type); + case TASKSTATS_TYPE_NULL: + break; + } + na = (struct nlattr *) (GENLMSG_DATA(&msg) + len); + } + } while (loop); +done: + if (maskset) { + rc = send_cmd(nl_sd, id, mypid, TASKSTATS_CMD_GET, + TASKSTATS_CMD_ATTR_DEREGISTER_CPUMASK, + &cpumask, strlen(cpumask) + 1); + printf("Sent deregister mask, retval %d\n", rc); + if (rc < 0) + err(rc, "error sending deregister cpumask\n"); + } +err: + close(nl_sd); + if (fd) + close(fd); + if (cfd) + close(cfd); + return 0; +} -- 2.15.0