Copyright © 2006–2025 SUSE LLC and contributors. All rights reserved.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”.
For SUSE trademarks, see https://www.suse.com/company/legal/. All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its affiliates. Asterisks (*) denote third-party trademarks.
All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its affiliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof.
1 Introduction #
The cset utility supports cpuset controller only
   on v1 hierarchy (legacy or hybrid in systemd lingo). On a system with the
   unified (v2) hierarchy, cset is not supported and
   cpuset controller can be used via systemd.
   
In the Linux kernel, the cpuset facility provides a mechanism for creating logical entities called “cpusets” that encompass definitions of CPUs and NUMA Memory Nodes (if NUMA is available). Cpusets constrain the CPU and Memory placement of a task to only the resources defined within that cpuset. These cpusets can then be arranged into a nested hierarchy visible in the “cpuset” virtual file system. Sets of tasks can be assigned to these cpusets to constrain the resources that they use. The tasks can be moved from one cpuset to another to use other resources defined in those other cpusets.
  The cset command is a Python application that provides
  a command line front-end for the Linux cpusets functionality. Working with
  cpusets directly can be confusing and slightly complex. The cset tool
  hides that complexity behind an easy-to-use command line interface.
 
  There are two distinct use cases for cset: the basic shielding use case
  and the “advanced” case of using raw set
  and proc subcommands. The basic shielding function is
  accessed with the shield subcommand and described in
  the next section. Using the raw set and
  proc subcommands allows one to set up arbitrarily
  complex cpusets and is described in
  Chapter 4, Full-featured cpuset manipulation commands.
 
  Note that in general, one either uses the shield
  subcommand or a combination of the set and
  proc subcommands. One rarely, if ever, uses all of
  these subcommands together. Doing so will likely become too confusing.
  Additionally, the shield subcommand sets up its
  required cpusets with exclusively marked CPUs. This can interfere with
  your cpuset strategy. If you find that you need more functionality for
  your strategy than shield provides, go ahead and
  transition to using set and proc
  exclusively. It is straightforward to implement what
  shield does with a few extra set and
  proc subcommands.
 
- For a full list of cset subcommands
 tux >csethelp- For in-depth help on individual subcommands
 tux >csethelp<subcommand>- For options on individual subcommands
 tux >cset<subcommand>(-h | --help)
2 The basic shielding model #
  Although any setup of cpusets can really be described as
  shielding, there is one prevalent shielding model in
  use that is so common that cset has a subcommand that is dedicated to its
  use. This subcommand is called shield.
 
  The concept behind this model is the use of three cpusets:
 
Root
cpuset. is always present in all configurations and contains all CPUs.System
cpuset. contains CPUs which are used for system tasks. These are the normal tasks that are not important, but which need to run on the system.User
cpuset. “the shield”, contains CPUs which are used for important tasks. Only those tasks that are somehow important, usually tasks whose performance determines the overall rating for the machine, are run in theusercpuset.
  The shield subcommand manages all of these cpusets and
  lets you define the CPUs and memory nodes that are in the
  shielded and unshielded sets. 
  The subcommand automatically moves all movable tasks on the system into the
  unshielded cpuset on shield activation, and back into
  the root cpuset on shield tear down. The subcommand
  lets you move tasks into and out of the shield. Kernel threads are excluded
  from these migrations.
 
  The shield subcommand abstracts the management of these cpusets away from
  you. It provides options that drive how the shield is set up, which tasks
  are to be shielded or not, and the status of the shield. In
  fact, you need not be bothered with the naming of the required cpusets or
  even where the cpuset file system is mounted. cset and
  the shield subcommand takes care of all that.
 
  If you need to define more cpusets for your application, it is likely
  that this simple shielding is not rich enough for you. In this
  case, you should transition to using the set and
  proc subcommands described in
  Chapter 4, Full-featured cpuset manipulation commands.
 
2.1 A simple shielding example #
Assume a four-core machine that has uniform memory access. This means there are four CPUs at your disposal and there is only one memory node available. On such machines, there is no need to specify any memory node parameters to cset, it sets up the only available memory node by default.
Usually, one wants to dedicate as many CPUs to the shield as possible and leave a minimal set of CPUs for normal system processing. The reasoning for this is, the performance of the important tasks will rule the performance of the installation as a whole. These important tasks need as many resources available to them as possible, exclusive of other, unimportant tasks that are running on the system.
In this document task is used to represent either a process or a thread that is running on the system.
2.2 Setup and teardown of the shield #
To set up a shield of three CPUs with one CPU left for low priority system processing, issue the following command.
tux >csetshield -c 1-3 cset: --> activating shielding: cset: moving 176 tasks from root into system cpuset... [==================================================]% cset: "system" cpuset of CPUSPEC(0) with 176 tasks running cset: "user" cpuset of CPUSPEC(1-3) with 0 tasks running
    This command does several things. First, it creates a
    user cpuset with what is called a CPUSPEC (CPU
    specification) from the -c/--cpu option. This CPUSPEC
    specifies to use CPUs 1 through 3 inclusively. Next, the command creates
    a system cpuset with a CPUSPEC that is the inverse of
    the -c option for the current machine. On this machine
    that cpuset will only contain the first CPU, CPU0. Next, all user space
    processes running in the root cpuset are transferred
    to the system cpuset. This makes all those processes
    run only on CPU0. The effect of this is that the shield consists of CPUs
    1 through 3 and they are now idling.
   
    Note that the command did not move the kernel threads that are running
    in the root cpuset to the system
cpuset. This is because you may want these kernel threads to use all
    available CPUs.
   
    The shield setup command above outputs the information of which cpusets
    were created and how many tasks are running on each. To see
    the current status of the shield again, issue this command:
   
tux >csetshield cset: --> shielding system active with cset: "system" cpuset of CPUSPEC(0) with 176 tasks running cset: "user" cpuset of CPUSPEC(1-3) with 0 tasks running
    Which shows us that the shield is set up and that 176 tasks are running
    in the system cpuset—the
    unshielded cpuset.
   
    It is important to move all possible tasks from the
    root cpuset to the unshielded
    system cpuset because a task’s cpuset property is
    inherited by its children. As all running tasks (including init) have been
    moved to the unshielded system cpuset,
    that means that any new tasks that are spawned will also run in the
    unshielded system cpuset.
   
Note. There is a minor chance that a task forks during move and its
    child remains in the root cpuset.
   
    Kernel threads can be both unbound or bound to specific CPUs.
    If a kernel thread is bound to a specific
    CPU, then it is generally not a good idea to move that thread to the
    system set because at worst it may hang the system
    and at best it will slow the system down significantly. These threads
    are usually the IRQ threads on a real time Linux kernel, for example,
    and you should not move these kernel threads into
    system. If you leave them in the
    root cpuset, then they will have access to all CPUs.
   
    However, if your application demands an even “quieter”
    shield, you should look at isolcpus= kernel command line
    argument.
   
    You can get a detailed listing of what is running in the shield by
    adding either -s/--shield or
    -u/--unshield to the shield
    subcommand and using the verbose flag. You will get output similar to
    the following.
   
tux >csetshield --unshield -v cset: "system" cpuset of CPUSPEC(0) with 251 tasks running USER PID PPID SPPr TASK NAME -------- ----- ----- ---- --------- root 1 0 Soth init [5] root 2 0 Soth [kthreadd] root 84 2 Sf50 [IRQ-9 ]... tux 31796 31789 Soth less root 32653 25222 Roth python ./cset shield --unshield -v
    The previous listing is abbreviated—there are 251 tasks running in
    the system set. However, the SPPr
    field may need a little
    explanation. SPPr stands for State, Policy and
    Priority. You can see that the initial two tasks are Stopped
    and running in timeshare priority, marked as oth (for
    other). The [IRQ-9] task is also stopped, but marked
    at real time FIFO policy with a priority of 50. The last task in the
    listing is the cset command itself and is marked as
    running. Also note that adding a second -v/--verbose
    option will not restrict the output to fit into an 80 character screen.
   
    Tear down of the shield, stopping the shield in other words, is done
    with the -r/--reset option to the shield subcommand.
    When this command is issued, both the system and
    user cpusets are deleted and any tasks that are
    running in both of those cpusets are moved to the
    root cpuset. Once so moved, all tasks will have
    access to all resources on the system. For example:
   
tux >csetshield --reset cset: --> deactivating/reseting shielding cset: moving 0 tasks from "/user" user set to root set... cset: moving 250 tasks from "/system" system set to root set... [==================================================]% cset: deleting "/user" and "/system" sets cset: done
2.3 Moving interesting tasks into and out of the shield #
Now that a shield is running, the objective is to run processes that you have categorized as important in that shield. These processes can be anything, but usually they are directly related to the purpose of the machine. There are two ways to run tasks in the shield:
Execute a process into the shield
Move an already running task into the shield
2.3.1 Executing a process into the shield #
     Running a new process in the shield can be done with the
     -e/--exec option to the shield
     subcommand. This is the simplest way to get a task to run in the
     shield. For this example, execute a new Bash shell into the shield
     with the following commands.
    
tux >csetshield -s cset: "user" cpuset of CPUSPEC(1-3) with 0 tasks running cset: donetux >csetshield -e bash cset: --> last message, executed args into cpuset "/user", new pid is: 13300tux >csetshield -s -v cset: "user" cpuset of CPUSPEC(1-3) with 2 tasks running USER PID PPID SPPr TASK NAME -------- ----- ----- ---- --------- root 13300 8583 Soth bash root 13329 13300 Roth python ./cset shield -s -vtux >exittux >csetshield -s cset: "user" cpuset of CPUSPEC(1-3) with 0 tasks running cset: done
The first command above lists the status of the shield. You see that the shield is defined as CPUs 1 through 3 inclusive and currently there are no tasks running in it.
     The second command executes the Bash shell into the shield with the
     -e option. The last message of cset
     lists the PID of the new process.
    
cset command
cset follows the tradition of separating the tool
      options from the command to be executed options with a double hyphen
      (--). This is not shown in this simple example, but
      if the command you want to execute also takes options, separate them with
      the double hyphen as follows:
     
tux >csetshield -e mycommand -- -v
      The -v will be passed to mycommand, and not to cset.
     
     The next command lists the status of the shield again. There are two
     tasks running shielded: our new shell and the cset status command
     itself. Remember that the cpuset property of a task is inherited by its
     children. Since running the new shell in the shield, its child, which is
     the status command, also ran in the shield.
    
Executing a shell into a shield is a useful way to experiment with running tasks in the shield since all children of the shell will also run in the shield.
The last command exits the shell. After this, shield status is requested again but again, it does not contain any tasks.
     You may have noticed in the output above that both the new shell and
     the status command are running as the root user. This is
     because cset needs to run as root and so all it is children
     will also run as root. If you need to run a process under a
     different user and or group, you may use the --user
     and --group options for execution as follows.
    
tux >csetshield --user=tux --group=users -e bash cset: --> last message, executed args into cpuset "/user", new pid is: 14212tux >csetshield -s -v cset: "user" cpuset of CPUSPEC(1-3) with 2 tasks running USER PID PPID SPPr TASK NAME -------- ----- ----- ---- --------- tux 14212 8583 Soth bash tux 14241 14212 Roth python ./cset shield -s -v
2.3.2 Moving a running task into and out of the shield #
     While executing a process into the shield is undoubtedly useful, most of
     the time, you will want to move already running tasks into and out of
     the shield. The cset shield subcommand includes two
     options for doing this: -s/--shield and
     -u/--unshield. These options require a PIDSPEC
     (process specification) to also be specified with the
     -p/--pid option. The PIDSPEC defines which tasks get
     operated on. The PIDSPEC can be a single process ID, a list of process
     IDs separated by commas, and a list of process ID ranges separated by
     dashes, groups of which are separated by commas. For example:
    
--shield --pid1234This PIDSPEC argument specifies that PID
1234be shielded.--shield --pid1234,42,1934,15000,15001,15002This PIDSPEC argument specifies that this list of PIDs only be moved into the shield.
--unshield -p5000,5100,6010-7000,9232This PIDSPEC argument specifies that PIDs
5000,5100and9232be unshielded (moved out of the shield) along with any existing PID that is in the range6010through7000inclusive.
A range in a PIDSPEC does not need to have tasks running for every number in that range. In fact, it is not even an error if there are no tasks running in that range: none will be moved in that case. The range only specifies to act on any tasks that have a PID or TID that is within that range.
     Use of the appropriate PIDSPEC can thus be handy to move tasks and
     groups of tasks into and out of the shield. Additionally, there is one
     more option that can help with multi-threaded processes, and that is
     the --threads flag. If this flag is used together with a
     shield or unshield command with a
     PIDSPEC and if any of the task IDs in the PIDSPEC belong to a thread in
     a process container, then all the
     sibling threads in that process container will get shielded or
     unshielded as well. This flag provides an easy mechanism to
     shield/unshield all threads of a process by simply specifying one
     thread in that process.
    
The following example moves the current shell into the shield with a range PIDSPEC and back out with the Bash variable for the current PID.
tux >echo$$ 22018tux >csetshield -s -p 22010-22020 cset: --> shielding following pidspec: 22010-22020 cset: donetux >csetshield -s -v cset: "user" cpuset of CPUSPEC(1-3) with 2 tasks running USER PID PPID SPPr TASK NAME -------- ----- ----- ---- --------- root 3770 22018 Roth python ./cset shield -s -v root 22018 5034 Soth bash cset: donetux >csetshield -u -p $$ cset: --> unshielding following pidspec: 22018 cset: donetux >csetshield -s cset: "user" cpuset of CPUSPEC(1-3) with 0 tasks running cset: done
3 Shielding with systemd #
systemd has native support for the cpuset controller since SUSE Linux Enterprise Real Time 15 SP4. Shielding the sensitive workload can be achieved with the proper configuration of respective units. This is only supported with cgroup unified hierarchy (v2) and hence the shielded vs. unshielded division copies the structure of typical systemd cgroup tree.
3.1 Setup of the shield #
        The general idea is to have one cpuset for the main sensitive workload
        and a complementary cpuset for the supporting tasks.
        Resources are distributed in the top-down fashion, so to ensure proper
        allocation for the main workload we must take into consideration all the
        top-level cgroups on the system.
        systemd by default creates the following units:
           init.scope,
           system.slice,
           user.slice, and
           machine.slice.
   
We must configure all of these units not to stand in the way of our main workload. For instance with following drop-in file(s):
root # cat /etc/systemd/system/init.scope.d/40-shielding.conf
[Scope]
AllowedCPUs=0-1root # cat /etc/systemd/system/system.slice.d/40-shielding.conf
[Slice]
AllowedCPUs=0-1This way we constrain the supporting system workload just to the first two CPUs.
Finally, we create a dedicated slice for our sensitive workload with all the remaining system CPUs:
root # cat /etc/systemd/system/workload.slice
[Slice]
AllowedCPUs=2-15The setup can also be changed at runtime (for debugging reasons):
root #systemctl set-property --runtime workload.slice AllowedCPUs=4-15root #systemctl set-property --runtime init.scope AllowedCPUs=0-3root #systemctl set-property --runtime system.slice AllowedCPUs=0-3
3.2 Running jobs in the shield #
    When the workload.slice is prepared according to the previous section, running the sensitive jobs is as simple as configuring their service into that slice.
    
root # cat /etc/systemd/system/sensitive.service.d/40-shielding.conf
[Service]
Slice=workload.sliceBeware that the Slice= directive only takes effect upon service (re)start.
Should not the sensitive job have a form of a service but an ad-hoc command, you may start it in a systemd scope:
root # systemd-run --scope -p Slice=workload.slice command arg1 ...Existing processes cannot be moved under the shield since that would involve process migration between cgroups which would cause distortion of the accounting state. But sensitive workload should start with their resources secured in advance anyway.
4 Full-featured cpuset manipulation commands #
  While basic shielding as described above is useful and a common use model
  for cset, there comes a time when more functionality
  will be desired to implement your strategy. To implement this,
  cset provides two subcommands: set,
  which allows you to manipulate cpusets; and proc, which
  allows you to manipulate processes within those cpusets.
 
4.1 The set subcommand #
   To do anything with cpusets, you must be able to create, adjust,
   rename, move, and destroy them. The set subcommand
   allows the management of cpusets in such a manner.
  
4.1.1 Creating and destroying cpusets with set #
    The basic syntax of set for cpuset creation is:
   
tux >csetset -c 1-3 -s my_cpuset1 cset: --> created cpuset "my_cpuset1"
    This creates a cpuset named my_cpuset1 with a CPUSPEC
    of CPU1, CPU2 and CPU3. The CPUSPEC is the same concept as described in
    the Section 2.2, “Setup and teardown of the shield”. The
    set subcommand also takes a -m/--mem
    option that lets you specify the memory nodes the set
    will use and flags to make the CPUs and MEMs exclusive to the
    cpuset. If you are on a non-NUMA machine, leave the
    -m option out and the default memory node
    0 will be used.
   
    Like with shield, you can adjust the CPUs and
    MEMs with subsequent calls to set. If, for example, you want to adjust
    the my_cpuset1 cpuset to only use CPUs 1 and 3 (and
    omit CPU2), then issue the following command.
   
tux >csetset -c 1,3 -s my_cpuset1 cset: --> modified cpuset "my_cpuset
cset will then adjust the CPUs that are assigned to
    the my_cpuset1 set to only use CPU1 and CPU3.
   
    To rename a cpuset, use the -n/--newname option. For
    example:
   
tux >csetset -s my_cpuset1 -n super_set cset: --> renaming "/cpusets/my_cpuset1" to "super_set"
    Renames the cpuset called my_cpuset1 to
    super_set.
   
    To destroy a cpuset, use the -d/--destroy option as
    follows.
   
tux >csetset -d super_set cset: --> processing cpuset "super_set", moving 0 tasks to parent "/"... cset: --> deleting cpuset "/super_set" cset: done
    This command destroys the newly created cpuset called
    super_set. When a cpuset is destroyed, all the tasks
    running in it are moved to the parent cpuset. The root cpuset, which
    always exists and always contains all CPUs, cannot be destroyed. You may
    also give the --destroy option a list of cpusets to
    destroy.
   
     The cset subcommand creates the cpusets based on a
     mounted cpuset file system. You do not need to know where that file
     system is mounted, although it is easy to figure out (by default it is
     on /cpusets). When you give the
     set subcommand a name for a new cpuset, it is
     created wherever the cpuset file system is mounted.
    
    To create a cpuset hierarchy, then you must give a path to
    the cset set subcommand. This path will always begin
    with the root cpuset, for which the path is /. For
    example:
   
tux >csetset -c 1,3 -s top_set cset: --> created cpuset "top_set"tux >csetset -c 3 -s /top_set/sub_set cset: --> created cpuset "/top_set/sub_set"
    These commands created two cpusets: top_set and
    sub_set. The top_set uses CPU1 and
    CPU3. It has a subset of sub_set which only uses
    CPU3. Once you have created a subset with a path, then if the name is
    unique, you do not need to specify the path to affect it. If
    the name is not unique, then cset will complain and
    ask you to use the path. For example:
   
tux >csetset -c 1,3 -s sub_set cset: --> modified cpuset "sub_set
    This command adds CPU1 to the sub_set cpuset for its
    use. Note that using the path in this case is optional.
   
    If you attempt to destroy a cpuset which has sub-cpusets,
    cset will complain and not do it unless you use the
    -r/--recurse and the --force options.
    If you do use --force, then all the tasks running in
    all subsets of the deletion target cpuset will be moved to the
    target’s parent cpuset and all cpusets.
   
Moving a cpuset from under a certain cpuset to a different location is not implemented.
4.1.2 Listing cpusets with set #
    To list cpusets, use the set subcommand with the
    -l/--list option. For example:
   
tux >csetset -l cset: Name CPUs-X MEMs-X Tasks Subs Path ------------ ---------- - ------- - ----- ---- ---------- root 0-3 y 0 y 320 1 / one 3 n 0 n 0 1 /one
    This shows that there is currently one cpuset present called
    one. (Of course there is also the
    root set, which is always present.) The output shows
    that the one cpuset has no tasks running in it. The
    root cpuset has 320 tasks running. The
    -X for CPUs and MEMs fields denotes whether the CPUs
    and MEMs in the cpusets are marked exclusive to those cpusets. Note that
    the one cpuset has subsets as indicated by a
    1 in the Subs field. You can
    specify a cpuset to list with the set subcommand as
    follows:
   
tux >csetset -l -s one cset: Name CPUs-X MEMs-X Tasks Subs Path ------------ ---------- - ------- - ----- ---- ---------- one 3 n 0 n 0 1 /one two 3 n 0 n 0 1 /one/two
    This output shows that there is a cpuset called two
    in cpuset one and it also has subset. You can also
    ask for a recursive listing as follows:
   
tux >csetset -l -r cset: Name CPUs-X MEMs-X Tasks Subs Path ------------ ---------- - ------- - ----- ---- ---------- root 0-3 y 0 y 320 1 / one 3 n 0 n 0 1 /one two 3 n 0 n 0 1 /one/two three 3 n 0 n 0 0 /one/two/three
    This command lists all cpusets existing on the system since it asks for
    a recursive listing beginning at the root cpuset.
    Incidentally, should you need to specify the root
    cpuset you can use either root or
    / to specify it explicitly—just remember that the
    root cpuset cannot be deleted or modified.
   
4.2 The proc subcommand #
   Now that you know how to create, rename and destroy cpusets with the
   set subcommand, the next step is to manage threads and
   processes in those cpusets. The subcommand to do this is called
   proc and it allows you to execute processes into a
   cpuset, move existing tasks around existing cpusets, and list tasks
   running in specified cpusets. For the following examples, let us assume a
   cpuset setup of two sets as follows:
  
tux >csetset -l cset: Name CPUs-X MEMs-X Tasks Subs Path ------------ ---------- - ------- - ----- ---- ---------- root 0-3 y 0 y 309 2 / two 2 n 0 n 3 0 /two three 3 n 0 n 10 0 /three
4.2.1 Listing tasks with proc #
    Operation of the proc subcommand follows the same
    model as the set subcommand. For example, to list
    tasks in a cpuset, you need to use the -l/--list option
    and specify the cpuset by name or, if the name exists multiple times in
    the cpuset hierarchy, by path. For example:
   
tux >csetproc -l -s two cset: "two" cpuset of CPUSPEC(2) with 3 tasks running USER PID PPID SPPr TASK NAME -------- ----- ----- ---- --------- root 16141 4300 Soth bash root 16171 16141 Soth bash root 16703 16171 Roth python ./cset proc -l two
    This output shows us that the cpuset called two has CPU2 only attached
    to it and is running three tasks: two shells and the
    python command to list it. Note that cpusets are
    inherited so that if a process is contained in a cpuset, then any
    children it spawns also run within that set. In this case, the
    python command to list set two was
    run from a shell already running in set two. This can
    be seen by the PPID (parent process ID) of the python
    command matching the PID of the shell.
   
    Additionally, the SPPr field needs explanation. SPPr
    stands for State, Policy and Priority. You can see
    that the initial two tasks are stopped and running in timeshare
    priority, marked as oth (for
    other). The last task is marked as running,
    R and at timeshare priority,
    oth. If any of these tasks would have been at real
    time priority, the policy would be shown as f
    for FIFO or r for round robin. The priority would
    be a number from 1 to 99. See below for an example.
   
tux >csetproc -l -s root | head -7 cset: "root" cpuset of CPUSPEC(0-3) with 309 tasks running USER PID PPID SPPr TASK NAME -------- ----- ----- ---- --------- root 1 0 Soth init [5] root 2 0 Soth [kthreadd] root 3 2 Sf99 [migration/0] root 4 2 Sf99 [posix_cpu_timer]
    This output shows the first few tasks in the root
    cpuset. Note that both  init and
    [kthread] are running at timeshare; however, the
    [migration/0] and
    [posix_cpu_timer] kernel threads are running at
    real-time policy of FIFO and priority of 99.
    Incidentally, this output is from a system running the real-time Linux
    kernel which runs some kernel threads at real-time priorities. And
    finally, note that you can use cset as any other
    Linux tool and include it in pipelines as in the example above.
   
    Taking a peek into the third cpuset called three, you
    can see output such as:
   
tux >csetproc -l -s three cset: "three" cpuset of CPUSPEC(3) with 10 tasks running USER PID PPID SPPr TASK NAME -------- ----- ----- ---- --------- tux 16165 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16169 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16170 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16237 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16491 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16492 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16493 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 17243 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 17244 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 17265 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -...
    This output shows that a lot of beagled tasks are
    running in this cpuset and it also shows an ellipsis
    (…) at the end of their listings. If you see this
    ellipsis, that means that the command was too long to fit onto an 80
    character screen. To see the entire command line, use the
    -v/--verbose flag:
   
tux >csetproc -l -s three -v | head -4 cset: "three" cpuset of CPUSPEC(3) with 10 tasks running USER PID PPID SPPr TASK NAME -------- ----- ----- ---- --------- tux 16165 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg --autostarted --indexing-delay 300
4.2.2 Execing tasks with proc #
    To execute a task into a cpuset, the proc subcommand
    needs to be employed with the -e/--exec option. Let us
    execute a shell into the cpuset named two in our set.
    First, check to see what is running that set:
   
tux >csetproc -l -s two cset: "two" cpuset of CPUSPEC(2) with 0 tasks runningtux >csetproc -s two -e bash cset: --> last message, executed args into cpuset "/two", new pid is: 20955tux >csetproc -l -s two cset: "two" cpuset of CPUSPEC(2) with 2 tasks running USER PID PPID SPPr TASK NAME -------- ----- ----- ---- --------- root 20955 19253 Soth bash root 20981 20955 Roth python ./cset proc -l two
    You can see that initially, two had nothing running
    in it. After the completion of the second command, list
    two again and see that there are two tasks running:
    the shell which you executed and the python cset command
    that is listing the cpuset. The reason for the second task is that the
    cpuset property of a running task is inherited by all its children.
    Because you executed the listing command from the new shell which was bound
    to cpuset two, the resulting process for the listing is also bound to
    cpuset two. Let us test that by running a new
    shell with no prefixed cset command.
   
tux >bashtux >csetproc -l -s two cset: "two" cpuset of CPUSPEC(2) with 3 tasks running USER PID PPID SPPr TASK NAME -------- ----- ----- ---- --------- root 20955 19253 Soth bash root 21118 20955 Soth bash root 21147 21118 Roth python ./cset proc -l two
    Here again, you can see that the second shell, PID 21118,
    has a parent PID of 20955 which is the first shell.
    Both shells, and the listing command, are running in the two cpuset.
   
cset follows the tradition of separating the tool
     options from the command to be executed options with a double hyphen
     (--). This is not shown in this simple example, but
     if the command you want to execute also takes options, separate them with
     the double hyphen as follows:
    
tux >csetproc -s myset -e mycommand -- -v
     The -v will be passed to
     mycommand, and not to cset.
    
Executing a shell into a cpuset is a useful way to experiment with running tasks in that cpuset since all children of the shell will also run in the same cpuset.
If you misspell the command to be executed, the result may be puzzling. For example:
tux >csetproc -s two -e blah-blah cset: --> last message, executed args into cpuset "/two", new pid is: 21655 cset: **> [Errno 2] No such file or directory
    The result is no new process even though a new PID is output. The reason
    for the message is of course that the cset process
    forked in preparation of the execution, but the command
    blah-blah was not found to execute it.
   
4.2.3 Moving tasks with proc #
    Although the ability to execute a task into a cpuset is fundamental, you
    will most likely be moving tasks between cpusets more often. Moving
    tasks is accomplished with the -m/--move and
    -p/--pid options to the proc
    subcommand of cset. The move option
    tells the proc subcommand that a task move is
    requested. The -p/--pid option takes an argument called
    a PIDSPEC (PID Specification). The PIDSPEC defines which tasks get
    operated on.
   
The PIDSPEC can be a single process ID, a list of process IDs separated by commas, and a list of process ID ranges also separated by commas. For example:
--pid1234This PIDSPEC argument specifies that PID
1234will be moved.--pid1234,42,1934,15000,15001,15002This PIDSPEC argument specifies that only listed tasks will be moved.
-p5000,5100,6010-7000,9232This PIDSPEC argument specifies that tasks
5000,5100and9232will be moved along with any existing task with PID in the range6010through7000inclusive.
A range in a PIDSPEC does not need to have running tasks for every number in that range. In fact, it is not even an error if there are no tasks running in that range; none will be moved in that case. The range simply specifies to act on any tasks that have a PID or TID that is within that range.
    The following example moves the current shell into the cpuset
    named two with a range PIDSPEC and back out to the
    root cpuset with the Bash variable for the current
    PID.
   
tux >csetproc -l -s two cset: "two" cpuset of CPUSPEC(2) with 0 tasks runningtux >echo$$ 19253tux >csetproc -m -p 19250-19260 -t two cset: moving following pidspec: 19253 cset: moving 1 userspace tasks to /two cset: donetux >csetproc -l -s two cset: "two" cpuset of CPUSPEC(2) with 2 tasks running USER PID PPID SPPr TASK NAME -------- ----- ----- ---- --------- root 19253 16447 Roth bash root 29456 19253 Roth python ./cset proc -l -s twotux >csetproc -m -p $$ -t root cset: moving following pidspec: 19253 cset: moving 1 userspace tasks to / cset: donetux >csetproc -l -s two cset: "two" cpuset of CPUSPEC(2) with 0 tasks running
    Use of the appropriate PIDSPEC can thus be handy to move tasks and
    groups of tasks. Additionally, there is one more option that can help
    with multi-threaded processes, and that is the
    --threads flag. If this flag is used together with the
    proc move command with a PIDSPEC and if any of the
    task IDs in the PIDSPEC belongs to a thread in a process container, then
    all the sibling threads in that process container
    will also get moved. This flag provides an easy mechanism to move all
    threads of a process by simply specifying one thread in that process.
    The following example moves all threads running in cpuset
    three to cpuset two by using the
    --threads flag.
   
tux >csetset two three cset: Name CPUs-X MEMs-X Tasks Subs Path ------------ ---------- - ------- - ----- ---- ---------- two 2 n 0 n 0 0 /two three 3 n 0 n 10 0 /threetux >csetproc -l -s three cset: "three" cpuset of CPUSPEC(3) with 10 tasks running USER PID PPID SPPr TASK NAME -------- ----- ----- ---- --------- tux 16165 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16169 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16170 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16237 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16491 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16492 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16493 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 17243 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 17244 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 27133 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -...tux >csetproc -m -p 16165 --threads -t two cset: moving following pidspec: 16491,16493,16492,16170,16165,16169,27133,17244,17243,16237 cset: moving 10 userspace tasks to /two [==================================================]% cset: donetux >csetset two three cset: Name CPUs-X MEMs-X Tasks Subs Path ------------ ---------- - ------- - ----- ---- ---------- two 2 n 0 n 10 0 /two three 3 n 0 n 0 0 /three
4.2.3.1 Moving all tasks from one cpuset to another #
     There is a special case for moving all tasks currently running in one
     cpuset to another. This can be a common use case, and when you need to
     do it, specifying a PIDSPEC with -p is not necessary
     so long as you use the -f/--fromset
and the -t/--toset options.
    
     The following example moves all 10 beagled
     threads back to cpuset three with this method.
    
tux >csetproc -l two three cset: "two" cpuset of CPUSPEC(2) with 10 tasks running USER PID PPID SPPr TASK NAME -------- ----- ----- ---- --------- tux 16165 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -… tux 16169 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16170 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16237 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16491 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16492 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 16493 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 17243 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 17244 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... tux 27133 1 Soth beagled /usr/lib64/beagle/BeagleDaemon.exe --bg -... cset: "three" cpuset of CPUSPEC(3) with 0 tasks runningtux >csetproc -m -f two -t three cset: moving all tasks from two to /three cset: moving 10 userspace tasks to /three [==================================================]% cset: donetux >csetset two three cset: Name CPUs-X MEMs-X Tasks Subs Path ------------ ---------- - ------- - ----- ---- ---------- two 2 n 0 n 0 0 /two three 3 n 0 n 10 0 /three
4.2.3.2 Kernel threads and proc #
     Kernel threads are special and cset detects tasks
     that are kernel threads and will refuse to move them (since they typically
     play a vital role on particular CPU).
    
-k or --force with care
       Overriding a task move command with -k or --force
       can have dire consequences for the system. Be sure of the command before
       you force it.
     
4.2.4 Destroying tasks #
    There actually is no cset subcommand or option to
    destroy tasks—it is not really needed. Tasks exist and are accessible
    on the system as normal, even if they happen to be running in one cpuset
    or another. To destroy tasks, use the usual
    Ctrl–C
    method or by using the kill(1) command.
   
4.3 Implementing shielding with set and proc #
   With the preceding material on the set and
   proc subcommands, you now have the background to
   implement the basic shielding model, like the shield
   subcommand.
  
   While shield provides this functionality already, doing
   this manually can still be useful. For example, to implement a shielding
   strategy that need more functionality than shield can
   provide. In such cases, you need to first
   stop using shield since that subcommand will interfere
   with the further application of set and
   proc. However, you will still need to implement the
   functionality of shield to implement
   successful shielding.
  
   Remember from the above sections describing shield,
   that shielding has at minimum three cpusets: root,
   which is always present and contains all CPUs; system
   which is the non-shielded set of CPUs and runs
   unimportant system tasks; and user, which is the
   shielded set of CPUs and runs your important tasks.
   Remember also that shield moves all movable tasks into
   system (except for kernel threads).
  
   You start first by creating the system and
   user cpusets as follows. Let us assume that the machine
   is a four-CPU machine without NUMA memory features. The system cpuset
   should hold only CPU0 while the user cpuset should hold the rest of the
   CPUs.
  
tux >csetset -c 0 -s system cset: --> created cpuset "system"tux >csetset -c 1-3 -s user cset: --> created cpuset "user"tux >csetset -l cset: Name CPUs-X MEMs-X Tasks Subs Path ------------ ---------- - ------- - ----- ---- ---------- root 0-3 y 0 y 333 2 / user 1-3 n 0 n 0 0 /user system 0 n 0 n 0 0 /system
   Now, move all running user processes into the
   system cpuset:
  
tux >csetproc -m -f root -t system cset: moving all tasks from root to /system cset: moving 188 userspace tasks to /system [==================================================]% cset: donetux >csetset -l cset: Name CPUs-X MEMs-X Tasks Subs Path ------------ ---------- - ------- - ----- ---- ---------- root 0-3 y 0 y 146 2 / user 1-3 n 0 n 0 0 /user system 0 n 0 n 187 0 /system
   This completes the basic shielding setup. Since all user space tasks are
   running in system, anything that is spawned from them
   will also run in system. The user
   cpuset has nothing running in it unless you put tasks there with the
   proc subcommand as described above. If you also want
   to eliminate kernel threads from root that could interfere
   with user workload (to achieve a form of “interrupt
   shielding” on a real time Linux kernel, for example), you should look
   at isolcpus= kernel command line argument.
  
   At this point, you have achieved the simple shielding model that the
   shield subcommand provides. You can now add other
   cpuset definitions to expand your shielding strategy beyond that simple
   model.
  
4.4 Implementing hierarchy with set and proc #
One popular extended shielding model is based on hierarchical cpusets, each with diminishing numbers of CPUs. This model is used to create priority cpusets that allow assignment of CPU resources to tasks based on some arbitrary priority definition. The idea is that a higher priority task will get access to more CPU resources than a lower priority task.
The example provided here once again assumes a machine with four CPUs and no NUMA memory features. This base serves to illustrate the point well; however, note that if your machine has (many) more CPUs, then strategies such as this and others get more interesting.
   Define a shielding setup as in the previous section where there is a
   system cpuset with only CPU0 that takes care of
   “unimportant” system tasks. You will usually require this
   type of cpuset since it forms the basis of shielding. Modify the
   strategy to not use a user cpuset—instead create
   several new cpusets each holding one more CPU than the other. These
   cpusets will be called prio_low with one CPU,
   prio_med with two CPUs, prio_high
   with three CPUs, and prio_all with all CPUs.
  
    You may ask, why create a prio_all with all CPUs when
    that is substantially the definition of the root
    cpuset? The answer is that it is best to keep a separation between the
    root cpuset and everything else, even if a particular
    cpuset duplicates root exactly. Usually, automation
    is build on top of a cpuset strategy. In these cases, it is best to
    avoid using invariant names of cpusets, such as root
    for example, in this automation.
   
   All of these prio_* cpusets can be created under root,
   in a flat way; however, it is advantageous to create them as a hierarchy.
   The reasoning for this is twofold: first, if a cpuset is destroyed, all
   its tasks are moved to its parent; second, one can use exclusive CPUs in
   a hierarchy.
  
If a cpuset has CPUs that are exclusive to it, then other cpusets may not use those CPUs unless they are children of that cpuset. This has more relevance to machines with many CPUs and more complex strategies.
Start with a clean slate and build the appropriate cpusets as follows:
tux >csetset -r cset: Name CPUs-X MEMs-X Tasks Subs Path ------------ ---------- - ------- - ----- ---- ---------- root 0-3 y 0 y 344 0 /tux >csetset -c 0-3 prio_all cset: --> created cpuset "prio_all"tux >csetset -c 1-3 /prio_all/prio_high cset: --> created cpuset "/prio_all/prio_high"tux >csetset -c 2-3 /prio_all/prio_high/prio_med cset: --> created cpuset "/prio_all/prio_high/prio_med"tux >csetset -c 3 /prio_all/prio_high/prio_med/prio_low cset: --> created cpuset "/prio_all/prio_high/prio_med/prio_low"tux >csetset -c 0 system cset: --> created cpuset "system"tux >csetset -l -r cset: Name CPUs-X MEMs-X Tasks Subs Path ------------ ---------- - ------- - ----- ---- ---------- root 0-3 y 0 y 344 2 / system 0 n 0 n 0 0 /system prio_all 0-3 n 0 n 0 1 /prio_all prio_high 1-3 n 0 n 0 1 /prio_all/prio_high prio_med 2-3 n 0 n 0 1 /prio_all/prio_high/prio_med prio_low 3 n 0 n 0 0 /prio_all/pr...rio_med/prio_low
-r/--recurse is needed in this case
    The option -r/--recurse lists all the
    sets in the last command above. If you execute that command without
    -r/--recurse, prio_med and
    prio_low cpusets would not appear.
   
   The strategy is now implemented. This means that you can move all user space
   tasks into the system cpuset to activate the shield.
  
tux >csetproc -m -f root -t system cset: moving all tasks from root to /system cset: moving 198 userspace tasks to /system cset: *** not moving kernel threads, need both --force and --kthread [==================================================]% cset: donetux >csetset -l -r cset: Name CPUs-X MEMs-X Tasks Subs Path ------------ ---------- - ------- - ----- ---- ---------- root 0-3 y 0 y 146 2 / system 0 n 0 n 198 0 /system prio_all 0-3 n 0 n 0 1 /prio_all prio_high 1-3 n 0 n 0 1 /prio_all/prio_high prio_med 2-3 n 0 n 0 1 /prio_all/prio_high/prio_med prio_low 3 n 0 n 0 0 /prio_all/pr...rio_med/prio_low
   The shield is now active. Since the prio_* cpuset
   names are unique, you can assign tasks to them either via their simple
   name, or their full path (as described in
   Section 4.2.2, “Execing tasks with proc”).
  
   You may have noted that there is an ellipsis in the path of the
   prio_low cpuset in the listing above. This is done
   to fit the output onto an 80 character screen. To see
   the entire line, use the -v/--verbose
   flag as follows:
  
tux >csetset -l -r -v cset: Name CPUs-X MEMs-X Tasks Subs Path ------------ ---------- - ------- - ----- ---- ---------- root 0-3 y 0 y 146 2 / system 0 n 0 n 198 0 /system prio_all 0-3 n 0 n 0 1 /prio_all prio_high 1-3 n 0 n 0 1 /prio_all/prio_high prio_med 2-3 n 0 n 0 1 /prio_all/prio_high/prio_med prio_low 3 n 0 n 0 0 /prio_all/prio_high/prio_med/prio_low
5 Using shortcuts #
  The commands listed in the previous sections always used all the required
  options. However, cset does have a shortcut facility
  that will execute certain commands without specifying all options. An
  effort has been made to do this with the “principle of least
  surprise”. This means that if you do not specify options, but do
  specify parameters, then the outcome of the command should be intuitive as
  possible.
 
  Using shortcuts is not necessary. In fact, you can use either shortcuts or
  long options. However, using long options instead of shortcuts does have a
  use case: when you write a script intended to be self-documenting, or
  perhaps when you generate cset documentation.
 
  To begin, the subcommands shield,
  set and proc can themselves be
  shortened to the fewest number of characters that are unambiguous. For
  example, the following commands are identical:
 
| 
 Long method  | 
 Short method  | 
|---|---|
  | 
  | 
  | 
  | 
  | 
  | 
  The proc command can be shortened to
  p, while shield and
  set need two letters to disambiguate.
 
5.1 shield subcommand shortcuts #
   The shield subcommand supports two areas with
   shortcuts: the short method (when there are no options given and where to
   shield is the common use case), and the long method (which makes
   -p/--pid optional for the -s/--shield
   and -u/--unshield options).
  
   For the common use case of actually shielding either a PIDSPEC or executing
   a command into the shield, the following cset commands
   are equivalent.
  
Long method  | Short method  | 
|---|---|
  | 
  | 
  | 
  | 
   When using the -s or -u shield/unshield
   options, it is optional to use the -p option to specify
   a PIDSPEC. For example:
  
| 
 Long method  | 
 Short method  | 
|---|---|
  | 
  | 
  | 
  | 
5.2 set subcommand shortcuts #
   The set subcommand has a limited number of shortcuts.
   The option --set is optional usually
   and the --list option is also optional to
   list sets. For example, these commands are equivalent:
  
| 
 Long method  | 
 Short method  | 
|---|---|
  | 
  | 
  | 
  | 
  | 
  | 
  | 
  | 
  | 
  | 
   In fact, if you want to apply either the list or the destroy options to
   multiple cpusets with one cset command, you will not
   need to use the -s option. For example:
  
csetse -d myset yourset ourset --> destroys cpusets: myset, yourset and oursetcsetse -l prio_high prio_med prio_low --> lists only cpusets prio_high, prio_med and prio_low --> the -l is optional in this case since list is default
5.3 proc subcommand shortcuts #
   For the proc subcommand, the -s, -t and
   -f options to specify the cpuset, the origination cpuset
   and the destination cpuset can sometimes be optional. For example, the
   following commands are equivalent. To list tasks in cpusets:
  
| 
 Long method  | 
 Short method  | 
|---|---|
 or 
 or 
  | 
  | 
  | 
  | 
  | 
  | 
  | 
  | 
   To execute a process into a cpuset:
  
| 
 Long method  | 
 Short method  | 
|---|---|
  | 
  | 
   Moving tasks into and out of cpusets have the following shortcuts.
   To move a PIDSPEC into a cpuset:
  
| 
 Long method  | 
 Short method  | 
|---|---|
  | 
  | 
  | 
  | 
   To move all tasks from one cpuset to another:
  
| 
 Long method  | 
 Short method  | 
|---|---|
 or 
 or 
  | 
  | 
6 What to do if there are problems #
  If you are using cset on a supported operating system
  such as SUSE Linux Enterprise Server 15 SP7 or SUSE Linux Enterprise Real Time 15 SP7,
  then should use the following Bugzilla product listing here:
 
cset contains a logging application that is invaluable
  for our developers to diagnose problems and find quick solutions. To
  create a log of your issue, use the --log
  option with a file name as an argument to the main cset application. For
  example:
 
tux >cset-l logfile.txt set -n newname oldname
  If the issue persists and is reproducible, Including this report in your
  bug submission greatly reduces development time. This command saves
  debugging information within the file logfile.txt.
 
A GNU Licenses #
This appendix contains the GNU Free Documentation License version 1.2.
GNU Free Documentation License #
Copyright (C) 2000, 2001, 2002 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
0. PREAMBLE #
The purpose of this License is to make a manual, textbook, or other functional and useful document "free" in the sense of freedom: to assure everyone the effective freedom to copy and redistribute it, with or without modifying it, either commercially or noncommercially. Secondarily, this License preserves for the author and publisher a way to get credit for their work, while not being considered responsible for modifications made by others.
This License is a kind of "copyleft", which means that derivative works of the document must themselves be free in the same sense. It complements the GNU General Public License, which is a copyleft license designed for free software.
We have designed this License in order to use it for manuals for free software, because free software needs free documentation: a free program should come with manuals providing the same freedoms that the software does. But this License is not limited to software manuals; it can be used for any textual work, regardless of subject matter or whether it is published as a printed book. We recommend this License principally for works whose purpose is instruction or reference.
1. APPLICABILITY AND DEFINITIONS #
This License applies to any manual or other work, in any medium, that contains a notice placed by the copyright holder saying it can be distributed under the terms of this License. Such a notice grants a world-wide, royalty-free license, unlimited in duration, to use that work under the conditions stated herein. The "Document", below, refers to any such manual or work. Any member of the public is a licensee, and is addressed as "you". You accept the license if you copy, modify or distribute the work in a way requiring permission under copyright law.
A "Modified Version" of the Document means any work containing the Document or a portion of it, either copied verbatim, or with modifications and/or translated into another language.
A "Secondary Section" is a named appendix or a front-matter section of the Document that deals exclusively with the relationship of the publishers or authors of the Document to the Document's overall subject (or to related matters) and contains nothing that could fall directly within that overall subject. (Thus, if the Document is in part a textbook of mathematics, a Secondary Section may not explain any mathematics.) The relationship could be a matter of historical connection with the subject or with related matters, or of legal, commercial, philosophical, ethical or political position regarding them.
The "Invariant Sections" are certain Secondary Sections whose titles are designated, as being those of Invariant Sections, in the notice that says that the Document is released under this License. If a section does not fit the above definition of Secondary then it is not allowed to be designated as Invariant. The Document may contain zero Invariant Sections. If the Document does not identify any Invariant Sections then there are none.
The "Cover Texts" are certain short passages of text that are listed, as Front-Cover Texts or Back-Cover Texts, in the notice that says that the Document is released under this License. A Front-Cover Text may be at most 5 words, and a Back-Cover Text may be at most 25 words.
A "Transparent" copy of the Document means a machine-readable copy, represented in a format whose specification is available to the general public, that is suitable for revising the document straightforwardly with generic text editors or (for images composed of pixels) generic paint programs or (for drawings) some widely available drawing editor, and that is suitable for input to text formatters or for automatic translation to a variety of formats suitable for input to text formatters. A copy made in an otherwise Transparent file format whose markup, or absence of markup, has been arranged to thwart or discourage subsequent modification by readers is not Transparent. An image format is not Transparent if used for any substantial amount of text. A copy that is not "Transparent" is called "Opaque".
Examples of suitable formats for Transparent copies include plain ASCII without markup, Texinfo input format, LaTeX input format, SGML or XML using a publicly available DTD, and standard-conforming simple HTML, PostScript or PDF designed for human modification. Examples of transparent image formats include PNG, XCF and JPG. Opaque formats include proprietary formats that can be read and edited only by proprietary word processors, SGML or XML for which the DTD and/or processing tools are not generally available, and the machine-generated HTML, PostScript or PDF produced by some word processors for output purposes only.
The "Title Page" means, for a printed book, the title page itself, plus such following pages as are needed to hold, legibly, the material this License requires to appear in the title page. For works in formats which do not have any title page as such, "Title Page" means the text near the most prominent appearance of the work's title, preceding the beginning of the body of the text.
A section "Entitled XYZ" means a named subunit of the Document whose title either is precisely XYZ or contains XYZ in parentheses following text that translates XYZ in another language. (Here XYZ stands for a specific section name mentioned below, such as "Acknowledgements", "Dedications", "Endorsements", or "History".) To "Preserve the Title" of such a section when you modify the Document means that it remains a section "Entitled XYZ" according to this definition.
The Document may include Warranty Disclaimers next to the notice which states that this License applies to the Document. These Warranty Disclaimers are considered to be included by reference in this License, but only as regards disclaiming warranties: any other implication that these Warranty Disclaimers may have is void and has no effect on the meaning of this License.
2. VERBATIM COPYING #
You may copy and distribute the Document in any medium, either commercially or noncommercially, provided that this License, the copyright notices, and the license notice saying this License applies to the Document are reproduced in all copies, and that you add no other conditions whatsoever to those of this License. You may not use technical measures to obstruct or control the reading or further copying of the copies you make or distribute. However, you may accept compensation in exchange for copies. If you distribute a large enough number of copies you must also follow the conditions in section 3.
You may also lend copies, under the same conditions stated above, and you may publicly display copies.
3. COPYING IN QUANTITY #
If you publish printed copies (or copies in media that commonly have printed covers) of the Document, numbering more than 100, and the Document's license notice requires Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all these Cover Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on the back cover. Both covers must also clearly and legibly identify you as the publisher of these copies. The front cover must present the full title with all words of the title equally prominent and visible. You may add other material on the covers in addition. Copying with changes limited to the covers, as long as they preserve the title of the Document and satisfy these conditions, can be treated as verbatim copying in other respects.
If the required texts for either cover are too voluminous to fit legibly, you should put the first ones listed (as many as fit reasonably) on the actual cover, and continue the rest onto adjacent pages.
If you publish or distribute Opaque copies of the Document numbering more than 100, you must either include a machine-readable Transparent copy along with each Opaque copy, or state in or with each Opaque copy a computer-network location from which the general network-using public has access to download using public-standard network protocols a complete Transparent copy of the Document, free of added material. If you use the latter option, you must take reasonably prudent steps, when you begin distribution of Opaque copies in quantity, to ensure that this Transparent copy will remain thus accessible at the stated location until at least one year after the last time you distribute an Opaque copy (directly or through your agents or retailers) of that edition to the public.
It is requested, but not required, that you contact the authors of the Document well before redistributing any large number of copies, to give them a chance to provide you with an updated version of the Document.
4. MODIFICATIONS #
You may copy and distribute a Modified Version of the Document under the conditions of sections 2 and 3 above, provided that you release the Modified Version under precisely this License, with the Modified Version filling the role of the Document, thus licensing distribution and modification of the Modified Version to whoever possesses a copy of it. In addition, you must do these things in the Modified Version:
Use in the Title Page (and on the covers, if any) a title distinct from that of the Document, and from those of previous versions (which should, if there were any, be listed in the History section of the Document). You may use the same title as a previous version if the original publisher of that version gives permission.
List on the Title Page, as authors, one or more persons or entities responsible for authorship of the modifications in the Modified Version, together with at least five of the principal authors of the Document (all of its principal authors, if it has fewer than five), unless they release you from this requirement.
State on the Title page the name of the publisher of the Modified Version, as the publisher.
Preserve all the copyright notices of the Document.
Add an appropriate copyright notice for your modifications adjacent to the other copyright notices.
Include, immediately after the copyright notices, a license notice giving the public permission to use the Modified Version under the terms of this License, in the form shown in the Addendum below.
Preserve in that license notice the full lists of Invariant Sections and required Cover Texts given in the Document's license notice.
Include an unaltered copy of this License.
Preserve the section Entitled "History", Preserve its Title, and add to it an item stating at least the title, year, new authors, and publisher of the Modified Version as given on the Title Page. If there is no section Entitled "History" in the Document, create one stating the title, year, authors, and publisher of the Document as given on its Title Page, then add an item describing the Modified Version as stated in the previous sentence.
Preserve the network location, if any, given in the Document for public access to a Transparent copy of the Document, and likewise the network locations given in the Document for previous versions it was based on. These may be placed in the "History" section. You may omit a network location for a work that was published at least four years before the Document itself, or if the original publisher of the version it refers to gives permission.
For any section Entitled "Acknowledgements" or "Dedications", Preserve the Title of the section, and preserve in the section all the substance and tone of each of the contributor acknowledgements and/or dedications given therein.
Preserve all the Invariant Sections of the Document, unaltered in their text and in their titles. Section numbers or the equivalent are not considered part of the section titles.
Delete any section Entitled "Endorsements". Such a section may not be included in the Modified Version.
Do not retitle any existing section to be Entitled "Endorsements" or to conflict in title with any Invariant Section.
Preserve any Warranty Disclaimers.
If the Modified Version includes new front-matter sections or appendices that qualify as Secondary Sections and contain no material copied from the Document, you may at your option designate some or all of these sections as invariant. To do this, add their titles to the list of Invariant Sections in the Modified Version's license notice. These titles must be distinct from any other section titles.
You may add a section Entitled "Endorsements", provided it contains nothing but endorsements of your Modified Version by various parties--for example, statements of peer review or that the text has been approved by an organization as the authoritative definition of a standard.
You may add a passage of up to five words as a Front-Cover Text, and a passage of up to 25 words as a Back-Cover Text, to the end of the list of Cover Texts in the Modified Version. Only one passage of Front-Cover Text and one of Back-Cover Text may be added by (or through arrangements made by) any one entity. If the Document already includes a cover text for the same cover, previously added by you or by arrangement made by the same entity you are acting on behalf of, you may not add another; but you may replace the old one, on explicit permission from the previous publisher that added the old one.
The author(s) and publisher(s) of the Document do not by this License give permission to use their names for publicity for or to assert or imply endorsement of any Modified Version.
5. COMBINING DOCUMENTS #
You may combine the Document with other documents released under this License, under the terms defined in section 4 above for modified versions, provided that you include in the combination all of the Invariant Sections of all of the original documents, unmodified, and list them all as Invariant Sections of your combined work in its license notice, and that you preserve all their Warranty Disclaimers.
The combined work need only contain one copy of this License, and multiple identical Invariant Sections may be replaced with a single copy. If there are multiple Invariant Sections with the same name but different contents, make the title of each such section unique by adding at the end of it, in parentheses, the name of the original author or publisher of that section if known, or else a unique number. Make the same adjustment to the section titles in the list of Invariant Sections in the license notice of the combined work.
In the combination, you must combine any sections Entitled "History" in the various original documents, forming one section Entitled "History"; likewise combine any sections Entitled "Acknowledgements", and any sections Entitled "Dedications". You must delete all sections Entitled "Endorsements".
6. COLLECTIONS OF DOCUMENTS #
You may make a collection consisting of the Document and other documents released under this License, and replace the individual copies of this License in the various documents with a single copy that is included in the collection, provided that you follow the rules of this License for verbatim copying of each of the documents in all other respects.
You may extract a single document from such a collection, and distribute it individually under this License, provided you insert a copy of this License into the extracted document, and follow this License in all other respects regarding verbatim copying of that document.
7. AGGREGATION WITH INDEPENDENT WORKS #
A compilation of the Document or its derivatives with other separate and independent documents or works, in or on a volume of a storage or distribution medium, is called an "aggregate" if the copyright resulting from the compilation is not used to limit the legal rights of the compilation's users beyond what the individual works permit. When the Document is included in an aggregate, this License does not apply to the other works in the aggregate which are not themselves derivative works of the Document.
If the Cover Text requirement of section 3 is applicable to these copies of the Document, then if the Document is less than one half of the entire aggregate, the Document's Cover Texts may be placed on covers that bracket the Document within the aggregate, or the electronic equivalent of covers if the Document is in electronic form. Otherwise they must appear on printed covers that bracket the whole aggregate.
8. TRANSLATION #
Translation is considered a kind of modification, so you may distribute translations of the Document under the terms of section 4. Replacing Invariant Sections with translations requires special permission from their copyright holders, but you may include translations of some or all Invariant Sections in addition to the original versions of these Invariant Sections. You may include a translation of this License, and all the license notices in the Document, and any Warranty Disclaimers, provided that you also include the original English version of this License and the original versions of those notices and disclaimers. In case of a disagreement between the translation and the original version of this License or a notice or disclaimer, the original version will prevail.
If a section in the Document is Entitled "Acknowledgements", "Dedications", or "History", the requirement (section 4) to Preserve its Title (section 1) will typically require changing the actual title.
9. TERMINATION #
You may not copy, modify, sublicense, or distribute the Document except as expressly provided for under this License. Any other attempt to copy, modify, sublicense or distribute the Document is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
10. FUTURE REVISIONS OF THIS LICENSE #
The Free Software Foundation may publish new, revised versions of the GNU Free Documentation License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. See http://www.gnu.org/copyleft/.
Each version of the License is given a distinguishing version number. If the Document specifies that a particular numbered version of this License "or any later version" applies to it, you have the option of following the terms and conditions either of that specified version or of any later version that has been published (not as a draft) by the Free Software Foundation. If the Document does not specify a version number of this License, you may choose any version ever published (not as a draft) by the Free Software Foundation.
ADDENDUM: How to use this License for your documents #
Copyright (c) YEAR YOUR NAME. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”.
If you have Invariant Sections, Front-Cover Texts and Back-Cover Texts, replace the “with...Texts.” line with this:
with the Invariant Sections being LIST THEIR TITLES, with the Front-Cover Texts being LIST, and with the Back-Cover Texts being LIST.
If you have Invariant Sections without Cover Texts, or some other combination of the three, merge those two alternatives to suit the situation.
If your document contains nontrivial examples of program code, we recommend releasing these examples in parallel under your choice of free software license, such as the GNU General Public License, to permit their use in free software.