blob: 9a4715a2f6bf67ecfc35310bdf7e42ead2ee11c8 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * linux/kernel/acct.c
3 *
4 * BSD Process Accounting for Linux
5 *
6 * Author: Marco van Wieringen <mvw@planets.elm.net>
7 *
8 * Some code based on ideas and code from:
9 * Thomas K. Dyas <tdyas@eden.rutgers.edu>
10 *
11 * This file implements BSD-style process accounting. Whenever any
12 * process exits, an accounting record of type "struct acct" is
13 * written to the file specified with the acct() system call. It is
14 * up to user-level programs to do useful things with the accounting
15 * log. The kernel just provides the raw accounting information.
16 *
17 * (C) Copyright 1995 - 1997 Marco van Wieringen - ELM Consultancy B.V.
18 *
19 * Plugged two leaks. 1) It didn't return acct_file into the free_filps if
20 * the file happened to be read-only. 2) If the accounting was suspended
21 * due to the lack of space it happily allowed to reopen it and completely
22 * lost the old acct_file. 3/10/98, Al Viro.
23 *
24 * Now we silently close acct_file on attempt to reopen. Cleaned sys_acct().
25 * XTerms and EMACS are manifestations of pure evil. 21/10/98, AV.
26 *
27 * Fixed a nasty interaction with with sys_umount(). If the accointing
28 * was suspeneded we failed to stop it on umount(). Messy.
29 * Another one: remount to readonly didn't stop accounting.
30 * Question: what should we do if we have CAP_SYS_ADMIN but not
31 * CAP_SYS_PACCT? Current code does the following: umount returns -EBUSY
32 * unless we are messing with the root. In that case we are getting a
33 * real mess with do_remount_sb(). 9/11/98, AV.
34 *
35 * Fixed a bunch of races (and pair of leaks). Probably not the best way,
36 * but this one obviously doesn't introduce deadlocks. Later. BTW, found
37 * one race (and leak) in BSD implementation.
38 * OK, that's better. ANOTHER race and leak in BSD variant. There always
39 * is one more bug... 10/11/98, AV.
40 *
41 * Oh, fsck... Oopsable SMP race in do_process_acct() - we must hold
42 * ->mmap_sem to walk the vma list of current->mm. Nasty, since it leaks
43 * a struct file opened for write. Fixed. 2/6/2000, AV.
44 */
45
Linus Torvalds1da177e2005-04-16 15:20:36 -070046#include <linux/mm.h>
47#include <linux/slab.h>
48#include <linux/acct.h>
Randy.Dunlapc59ede72006-01-11 12:17:46 -080049#include <linux/capability.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070050#include <linux/file.h>
51#include <linux/tty.h>
52#include <linux/security.h>
53#include <linux/vfs.h>
54#include <linux/jiffies.h>
55#include <linux/times.h>
56#include <linux/syscalls.h>
Al Viro7b7b1ac2005-11-07 17:13:39 -050057#include <linux/mount.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070058#include <asm/uaccess.h>
59#include <asm/div64.h>
60#include <linux/blkdev.h> /* sector_div */
Pavel Emelyanov5f7b7032008-03-24 12:29:53 -070061#include <linux/pid_namespace.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070062
63/*
64 * These constants control the amount of freespace that suspend and
65 * resume the process accounting system, and the time delay between
66 * each check.
67 * Turned into sysctl-controllable parameters. AV, 12/11/98
68 */
69
70int acct_parm[3] = {4, 2, 30};
71#define RESUME (acct_parm[0]) /* >foo% free space - resume */
72#define SUSPEND (acct_parm[1]) /* <foo% free space - suspend */
73#define ACCT_TIMEOUT (acct_parm[2]) /* foo second timeout between checks */
74
75/*
76 * External references and all of the globals.
77 */
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -070078static void do_acct_process(struct bsd_acct_struct *acct,
79 struct pid_namespace *ns, struct file *);
Linus Torvalds1da177e2005-04-16 15:20:36 -070080
81/*
82 * This structure is used so that all the data protected by lock
83 * can be placed in the same cache line as the lock. This primes
84 * the cache line to have the data after getting the lock.
85 */
Pavel Emelyanov081e4c82008-07-25 01:48:42 -070086struct bsd_acct_struct {
Linus Torvalds1da177e2005-04-16 15:20:36 -070087 volatile int active;
88 volatile int needcheck;
89 struct file *file;
Pavel Emelyanov5f7b7032008-03-24 12:29:53 -070090 struct pid_namespace *ns;
Linus Torvalds1da177e2005-04-16 15:20:36 -070091 struct timer_list timer;
Pavel Emelyanovb5a71742008-07-25 01:48:47 -070092 struct list_head list;
Linus Torvalds1da177e2005-04-16 15:20:36 -070093};
94
Pavel Emelyanova75d9792008-07-25 01:48:45 -070095static DEFINE_SPINLOCK(acct_lock);
Pavel Emelyanovb5a71742008-07-25 01:48:47 -070096static LIST_HEAD(acct_list);
Pavel Emelyanova75d9792008-07-25 01:48:45 -070097
Linus Torvalds1da177e2005-04-16 15:20:36 -070098/*
99 * Called whenever the timer says to check the free space.
100 */
Pavel Emelyanove59a04a2008-07-25 01:48:44 -0700101static void acct_timeout(unsigned long x)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700102{
Pavel Emelyanove59a04a2008-07-25 01:48:44 -0700103 struct bsd_acct_struct *acct = (struct bsd_acct_struct *)x;
104 acct->needcheck = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700105}
106
107/*
108 * Check the amount of free space and suspend/resume accordingly.
109 */
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700110static int check_free_space(struct bsd_acct_struct *acct, struct file *file)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111{
112 struct kstatfs sbuf;
113 int res;
114 int act;
115 sector_t resume;
116 sector_t suspend;
117
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700118 spin_lock(&acct_lock);
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700119 res = acct->active;
120 if (!file || !acct->needcheck)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700121 goto out;
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700122 spin_unlock(&acct_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700123
124 /* May block */
Josef "Jeff" Sipekf3a43f32006-12-08 02:36:43 -0800125 if (vfs_statfs(file->f_path.dentry, &sbuf))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700126 return res;
127 suspend = sbuf.f_blocks * SUSPEND;
128 resume = sbuf.f_blocks * RESUME;
129
130 sector_div(suspend, 100);
131 sector_div(resume, 100);
132
133 if (sbuf.f_bavail <= suspend)
134 act = -1;
135 else if (sbuf.f_bavail >= resume)
136 act = 1;
137 else
138 act = 0;
139
140 /*
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700141 * If some joker switched acct->file under us we'ld better be
Linus Torvalds1da177e2005-04-16 15:20:36 -0700142 * silent and _not_ touch anything.
143 */
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700144 spin_lock(&acct_lock);
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700145 if (file != acct->file) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700146 if (act)
147 res = act>0;
148 goto out;
149 }
150
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700151 if (acct->active) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700152 if (act < 0) {
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700153 acct->active = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700154 printk(KERN_INFO "Process accounting paused\n");
155 }
156 } else {
157 if (act > 0) {
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700158 acct->active = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700159 printk(KERN_INFO "Process accounting resumed\n");
160 }
161 }
162
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700163 del_timer(&acct->timer);
164 acct->needcheck = 0;
165 acct->timer.expires = jiffies + ACCT_TIMEOUT*HZ;
166 add_timer(&acct->timer);
167 res = acct->active;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700168out:
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700169 spin_unlock(&acct_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700170 return res;
171}
172
173/*
Randy Dunlap417ef532005-09-10 00:26:39 -0700174 * Close the old accounting file (if currently open) and then replace
Linus Torvalds1da177e2005-04-16 15:20:36 -0700175 * it with file (if non-NULL).
176 *
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700177 * NOTE: acct_lock MUST be held on entry and exit.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700178 */
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700179static void acct_file_reopen(struct bsd_acct_struct *acct, struct file *file,
180 struct pid_namespace *ns)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700181{
182 struct file *old_acct = NULL;
Pavel Emelyanov5f7b7032008-03-24 12:29:53 -0700183 struct pid_namespace *old_ns = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700184
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700185 if (acct->file) {
186 old_acct = acct->file;
187 old_ns = acct->ns;
188 del_timer(&acct->timer);
189 acct->active = 0;
190 acct->needcheck = 0;
191 acct->file = NULL;
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700192 acct->ns = NULL;
Pavel Emelyanovb5a71742008-07-25 01:48:47 -0700193 list_del(&acct->list);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700194 }
195 if (file) {
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700196 acct->file = file;
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700197 acct->ns = ns;
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700198 acct->needcheck = 0;
199 acct->active = 1;
Pavel Emelyanovb5a71742008-07-25 01:48:47 -0700200 list_add(&acct->list, &acct_list);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700201 /* It's been deleted if it was used before so this is safe */
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700202 setup_timer(&acct->timer, acct_timeout, (unsigned long)acct);
203 acct->timer.expires = jiffies + ACCT_TIMEOUT*HZ;
204 add_timer(&acct->timer);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700205 }
206 if (old_acct) {
Josef "Jeff" Sipekf3a43f32006-12-08 02:36:43 -0800207 mnt_unpin(old_acct->f_path.mnt);
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700208 spin_unlock(&acct_lock);
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700209 do_acct_process(acct, old_ns, old_acct);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700210 filp_close(old_acct, NULL);
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700211 spin_lock(&acct_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700212 }
213}
214
Al Viro7b7b1ac2005-11-07 17:13:39 -0500215static int acct_on(char *name)
216{
217 struct file *file;
Renaud Lottiauxdf279ca2009-06-30 11:41:34 -0700218 struct vfsmount *mnt;
Al Viro7b7b1ac2005-11-07 17:13:39 -0500219 int error;
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700220 struct pid_namespace *ns;
221 struct bsd_acct_struct *acct = NULL;
Al Viro7b7b1ac2005-11-07 17:13:39 -0500222
223 /* Difference from BSD - they don't do O_APPEND */
224 file = filp_open(name, O_WRONLY|O_APPEND|O_LARGEFILE, 0);
225 if (IS_ERR(file))
226 return PTR_ERR(file);
227
Josef "Jeff" Sipekf3a43f32006-12-08 02:36:43 -0800228 if (!S_ISREG(file->f_path.dentry->d_inode->i_mode)) {
Al Viro7b7b1ac2005-11-07 17:13:39 -0500229 filp_close(file, NULL);
230 return -EACCES;
231 }
232
233 if (!file->f_op->write) {
234 filp_close(file, NULL);
235 return -EIO;
236 }
237
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700238 ns = task_active_pid_ns(current);
239 if (ns->bacct == NULL) {
240 acct = kzalloc(sizeof(struct bsd_acct_struct), GFP_KERNEL);
241 if (acct == NULL) {
242 filp_close(file, NULL);
243 return -ENOMEM;
244 }
245 }
246
Al Viro7b7b1ac2005-11-07 17:13:39 -0500247 error = security_acct(file);
248 if (error) {
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700249 kfree(acct);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500250 filp_close(file, NULL);
251 return error;
252 }
253
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700254 spin_lock(&acct_lock);
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700255 if (ns->bacct == NULL) {
256 ns->bacct = acct;
257 acct = NULL;
258 }
259
Renaud Lottiauxdf279ca2009-06-30 11:41:34 -0700260 mnt = file->f_path.mnt;
261 mnt_pin(mnt);
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700262 acct_file_reopen(ns->bacct, file, ns);
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700263 spin_unlock(&acct_lock);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500264
Renaud Lottiauxdf279ca2009-06-30 11:41:34 -0700265 mntput(mnt); /* it's pinned, now give up active reference */
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700266 kfree(acct);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500267
268 return 0;
269}
270
Randy Dunlap417ef532005-09-10 00:26:39 -0700271/**
272 * sys_acct - enable/disable process accounting
273 * @name: file name for accounting records or NULL to shutdown accounting
274 *
275 * Returns 0 for success or negative errno values for failure.
276 *
277 * sys_acct() is the only system call needed to implement process
278 * accounting. It takes the name of the file where accounting records
279 * should be written. If the filename is NULL, accounting will be
280 * shutdown.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700281 */
Heiko Carstensb290ebe2009-01-14 14:14:06 +0100282SYSCALL_DEFINE1(acct, const char __user *, name)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700283{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700284 int error;
285
286 if (!capable(CAP_SYS_PACCT))
287 return -EPERM;
288
289 if (name) {
Al Viro7b7b1ac2005-11-07 17:13:39 -0500290 char *tmp = getname(name);
291 if (IS_ERR(tmp))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700292 return (PTR_ERR(tmp));
Al Viro7b7b1ac2005-11-07 17:13:39 -0500293 error = acct_on(tmp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700294 putname(tmp);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500295 } else {
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700296 struct bsd_acct_struct *acct;
297
298 acct = task_active_pid_ns(current)->bacct;
299 if (acct == NULL)
300 return 0;
301
Al Viro7b7b1ac2005-11-07 17:13:39 -0500302 error = security_acct(NULL);
303 if (!error) {
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700304 spin_lock(&acct_lock);
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700305 acct_file_reopen(acct, NULL, NULL);
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700306 spin_unlock(&acct_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700307 }
308 }
Al Viro7b7b1ac2005-11-07 17:13:39 -0500309 return error;
310}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700311
Al Viro7b7b1ac2005-11-07 17:13:39 -0500312/**
313 * acct_auto_close - turn off a filesystem's accounting if it is on
314 * @m: vfsmount being shut down
315 *
316 * If the accounting is turned on for a file in the subtree pointed to
317 * to by m, turn accounting off. Done when m is about to die.
318 */
319void acct_auto_close_mnt(struct vfsmount *m)
320{
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700321 struct bsd_acct_struct *acct;
322
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700323 spin_lock(&acct_lock);
Pavel Emelyanovb5a71742008-07-25 01:48:47 -0700324restart:
325 list_for_each_entry(acct, &acct_list, list)
326 if (acct->file && acct->file->f_path.mnt == m) {
327 acct_file_reopen(acct, NULL, NULL);
328 goto restart;
329 }
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700330 spin_unlock(&acct_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700331}
332
Randy Dunlap417ef532005-09-10 00:26:39 -0700333/**
334 * acct_auto_close - turn off a filesystem's accounting if it is on
335 * @sb: super block for the filesystem
336 *
337 * If the accounting is turned on for a file in the filesystem pointed
338 * to by sb, turn accounting off.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700339 */
340void acct_auto_close(struct super_block *sb)
341{
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700342 struct bsd_acct_struct *acct;
343
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700344 spin_lock(&acct_lock);
Pavel Emelyanovb5a71742008-07-25 01:48:47 -0700345restart:
346 list_for_each_entry(acct, &acct_list, list)
347 if (acct->file && acct->file->f_path.mnt->mnt_sb == sb) {
348 acct_file_reopen(acct, NULL, NULL);
349 goto restart;
350 }
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700351 spin_unlock(&acct_lock);
352}
353
354void acct_exit_ns(struct pid_namespace *ns)
355{
356 struct bsd_acct_struct *acct;
357
358 spin_lock(&acct_lock);
359 acct = ns->bacct;
360 if (acct != NULL) {
361 if (acct->file != NULL)
362 acct_file_reopen(acct, NULL, NULL);
363
364 kfree(acct);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700365 }
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700366 spin_unlock(&acct_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700367}
368
369/*
370 * encode an unsigned long into a comp_t
371 *
372 * This routine has been adopted from the encode_comp_t() function in
373 * the kern_acct.c file of the FreeBSD operating system. The encoding
374 * is a 13-bit fraction with a 3-bit (base 8) exponent.
375 */
376
377#define MANTSIZE 13 /* 13 bit mantissa. */
378#define EXPSIZE 3 /* Base 8 (3 bit) exponent. */
379#define MAXFRACT ((1 << MANTSIZE) - 1) /* Maximum fractional value. */
380
381static comp_t encode_comp_t(unsigned long value)
382{
383 int exp, rnd;
384
385 exp = rnd = 0;
386 while (value > MAXFRACT) {
387 rnd = value & (1 << (EXPSIZE - 1)); /* Round up? */
388 value >>= EXPSIZE; /* Base 8 exponent == 3 bit shift. */
389 exp++;
390 }
391
392 /*
Daniel Walker6ae965c2007-10-18 03:06:04 -0700393 * If we need to round up, do it (and handle overflow correctly).
394 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700395 if (rnd && (++value > MAXFRACT)) {
396 value >>= EXPSIZE;
397 exp++;
398 }
399
400 /*
Daniel Walker6ae965c2007-10-18 03:06:04 -0700401 * Clean it up and polish it off.
402 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700403 exp <<= MANTSIZE; /* Shift the exponent into place */
404 exp += value; /* and add on the mantissa. */
405 return exp;
406}
407
408#if ACCT_VERSION==1 || ACCT_VERSION==2
409/*
410 * encode an u64 into a comp2_t (24 bits)
411 *
412 * Format: 5 bit base 2 exponent, 20 bits mantissa.
413 * The leading bit of the mantissa is not stored, but implied for
414 * non-zero exponents.
415 * Largest encodable value is 50 bits.
416 */
417
418#define MANTSIZE2 20 /* 20 bit mantissa. */
419#define EXPSIZE2 5 /* 5 bit base 2 exponent. */
420#define MAXFRACT2 ((1ul << MANTSIZE2) - 1) /* Maximum fractional value. */
421#define MAXEXP2 ((1 <<EXPSIZE2) - 1) /* Maximum exponent. */
422
423static comp2_t encode_comp2_t(u64 value)
424{
Daniel Walker6ae965c2007-10-18 03:06:04 -0700425 int exp, rnd;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700426
Daniel Walker6ae965c2007-10-18 03:06:04 -0700427 exp = (value > (MAXFRACT2>>1));
428 rnd = 0;
429 while (value > MAXFRACT2) {
430 rnd = value & 1;
431 value >>= 1;
432 exp++;
433 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700434
Daniel Walker6ae965c2007-10-18 03:06:04 -0700435 /*
436 * If we need to round up, do it (and handle overflow correctly).
437 */
438 if (rnd && (++value > MAXFRACT2)) {
439 value >>= 1;
440 exp++;
441 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700442
Daniel Walker6ae965c2007-10-18 03:06:04 -0700443 if (exp > MAXEXP2) {
444 /* Overflow. Return largest representable number instead. */
445 return (1ul << (MANTSIZE2+EXPSIZE2-1)) - 1;
446 } else {
447 return (value & (MAXFRACT2>>1)) | (exp << (MANTSIZE2-1));
448 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700449}
450#endif
451
452#if ACCT_VERSION==3
453/*
454 * encode an u64 into a 32 bit IEEE float
455 */
456static u32 encode_float(u64 value)
457{
458 unsigned exp = 190;
459 unsigned u;
460
461 if (value==0) return 0;
462 while ((s64)value > 0){
463 value <<= 1;
464 exp--;
465 }
466 u = (u32)(value >> 40) & 0x7fffffu;
467 return u | (exp << 23);
468}
469#endif
470
471/*
472 * Write an accounting entry for an exiting process
473 *
474 * The acct_process() call is the workhorse of the process
475 * accounting system. The struct acct is built here and then written
476 * into the accounting file. This function should only be called from
Ingo Molnarbcbe4a02007-11-26 21:21:49 +0100477 * do_exit() or when switching to a different output file.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700478 */
479
480/*
481 * do_acct_process does all actual work. Caller holds the reference to file.
482 */
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700483static void do_acct_process(struct bsd_acct_struct *acct,
484 struct pid_namespace *ns, struct file *file)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700485{
KaiGai Kohei0e464812006-06-25 05:49:24 -0700486 struct pacct_struct *pacct = &current->signal->pacct;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700487 acct_t ac;
488 mm_segment_t fs;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700489 unsigned long flim;
490 u64 elapsed;
491 u64 run_time;
492 struct timespec uptime;
Peter Zijlstra24ec8392006-12-08 02:36:04 -0800493 struct tty_struct *tty;
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700494 const struct cred *orig_cred;
495
496 /* Perform file operations on behalf of whoever enabled accounting */
497 orig_cred = override_creds(file->f_cred);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700498
499 /*
500 * First check to see if there is enough free_space to continue
501 * the process accounting system.
502 */
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700503 if (!check_free_space(acct, file))
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700504 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700505
506 /*
507 * Fill the accounting struct with the needed info as recorded
508 * by the different kernel functions.
509 */
510 memset((caddr_t)&ac, 0, sizeof(acct_t));
511
512 ac.ac_version = ACCT_VERSION | ACCT_BYTEORDER;
513 strlcpy(ac.ac_comm, current->comm, sizeof(ac.ac_comm));
514
515 /* calculate run_time in nsec*/
516 do_posix_clock_monotonic_gettime(&uptime);
517 run_time = (u64)uptime.tv_sec*NSEC_PER_SEC + uptime.tv_nsec;
KaiGai Koheibb231fe2006-03-31 02:30:45 -0800518 run_time -= (u64)current->group_leader->start_time.tv_sec * NSEC_PER_SEC
519 + current->group_leader->start_time.tv_nsec;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700520 /* convert nsec -> AHZ */
521 elapsed = nsec_to_AHZ(run_time);
522#if ACCT_VERSION==3
523 ac.ac_etime = encode_float(elapsed);
524#else
525 ac.ac_etime = encode_comp_t(elapsed < (unsigned long) -1l ?
526 (unsigned long) elapsed : (unsigned long) -1l);
527#endif
528#if ACCT_VERSION==1 || ACCT_VERSION==2
529 {
530 /* new enlarged etime field */
531 comp2_t etime = encode_comp2_t(elapsed);
532 ac.ac_etime_hi = etime >> 16;
533 ac.ac_etime_lo = (u16) etime;
534 }
535#endif
536 do_div(elapsed, AHZ);
john stultz2c6b47d2007-07-24 17:47:43 -0700537 ac.ac_btime = get_seconds() - elapsed;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700538 /* we really need to bite the bullet and change layout */
David Howells76aac0e2008-11-14 10:39:12 +1100539 current_uid_gid(&ac.ac_uid, &ac.ac_gid);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700540#if ACCT_VERSION==2
541 ac.ac_ahz = AHZ;
542#endif
543#if ACCT_VERSION==1 || ACCT_VERSION==2
544 /* backward-compatible 16 bit fields */
David Howells76aac0e2008-11-14 10:39:12 +1100545 ac.ac_uid16 = ac.ac_uid;
546 ac.ac_gid16 = ac.ac_gid;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700547#endif
548#if ACCT_VERSION==3
Pavel Emelyanov5f7b7032008-03-24 12:29:53 -0700549 ac.ac_pid = task_tgid_nr_ns(current, ns);
Pavel Emelyanova846a192008-03-24 12:29:52 -0700550 rcu_read_lock();
Pavel Emelyanov5f7b7032008-03-24 12:29:53 -0700551 ac.ac_ppid = task_tgid_nr_ns(rcu_dereference(current->real_parent), ns);
Pavel Emelyanova846a192008-03-24 12:29:52 -0700552 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700553#endif
554
OGAWA Hirofumia4afee02006-07-14 00:24:18 -0700555 spin_lock_irq(&current->sighand->siglock);
Alan Coxdbda4c02008-10-13 10:40:53 +0100556 tty = current->signal->tty; /* Safe as we hold the siglock */
Oleg Nesterov7bcfa952006-12-08 02:36:07 -0800557 ac.ac_tty = tty ? old_encode_dev(tty_devnum(tty)) : 0;
KaiGai Kohei77787bf2006-06-25 05:49:26 -0700558 ac.ac_utime = encode_comp_t(jiffies_to_AHZ(cputime_to_jiffies(pacct->ac_utime)));
559 ac.ac_stime = encode_comp_t(jiffies_to_AHZ(cputime_to_jiffies(pacct->ac_stime)));
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700560 ac.ac_flag = pacct->ac_flag;
KaiGai Kohei0e464812006-06-25 05:49:24 -0700561 ac.ac_mem = encode_comp_t(pacct->ac_mem);
KaiGai Kohei77787bf2006-06-25 05:49:26 -0700562 ac.ac_minflt = encode_comp_t(pacct->ac_minflt);
563 ac.ac_majflt = encode_comp_t(pacct->ac_majflt);
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700564 ac.ac_exitcode = pacct->ac_exitcode;
OGAWA Hirofumia4afee02006-07-14 00:24:18 -0700565 spin_unlock_irq(&current->sighand->siglock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700566 ac.ac_io = encode_comp_t(0 /* current->io_usage */); /* %% */
567 ac.ac_rw = encode_comp_t(ac.ac_io / 1024);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700568 ac.ac_swaps = encode_comp_t(0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700569
570 /*
Daniel Walker6ae965c2007-10-18 03:06:04 -0700571 * Kernel segment override to datasegment and write it
572 * to the accounting file.
573 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700574 fs = get_fs();
575 set_fs(KERNEL_DS);
576 /*
Daniel Walker6ae965c2007-10-18 03:06:04 -0700577 * Accounting records are not subject to resource limits.
578 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700579 flim = current->signal->rlim[RLIMIT_FSIZE].rlim_cur;
580 current->signal->rlim[RLIMIT_FSIZE].rlim_cur = RLIM_INFINITY;
581 file->f_op->write(file, (char *)&ac,
582 sizeof(acct_t), &file->f_pos);
583 current->signal->rlim[RLIMIT_FSIZE].rlim_cur = flim;
584 set_fs(fs);
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700585out:
586 revert_creds(orig_cred);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700587}
588
Randy Dunlap417ef532005-09-10 00:26:39 -0700589/**
KaiGai Kohei0e464812006-06-25 05:49:24 -0700590 * acct_init_pacct - initialize a new pacct_struct
Randy Dunlap1dbe83c2006-06-27 02:54:01 -0700591 * @pacct: per-process accounting info struct to initialize
KaiGai Kohei0e464812006-06-25 05:49:24 -0700592 */
593void acct_init_pacct(struct pacct_struct *pacct)
594{
595 memset(pacct, 0, sizeof(struct pacct_struct));
KaiGai Kohei77787bf2006-06-25 05:49:26 -0700596 pacct->ac_utime = pacct->ac_stime = cputime_zero;
KaiGai Kohei0e464812006-06-25 05:49:24 -0700597}
598
599/**
600 * acct_collect - collect accounting information into pacct_struct
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700601 * @exitcode: task exit code
602 * @group_dead: not 0, if this thread is the last one in the process.
KaiGai Kohei0e464812006-06-25 05:49:24 -0700603 */
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700604void acct_collect(long exitcode, int group_dead)
KaiGai Kohei0e464812006-06-25 05:49:24 -0700605{
606 struct pacct_struct *pacct = &current->signal->pacct;
607 unsigned long vsize = 0;
608
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700609 if (group_dead && current->mm) {
KaiGai Kohei0e464812006-06-25 05:49:24 -0700610 struct vm_area_struct *vma;
611 down_read(&current->mm->mmap_sem);
612 vma = current->mm->mmap;
613 while (vma) {
614 vsize += vma->vm_end - vma->vm_start;
615 vma = vma->vm_next;
616 }
617 up_read(&current->mm->mmap_sem);
618 }
619
KaiGai Kohei77787bf2006-06-25 05:49:26 -0700620 spin_lock_irq(&current->sighand->siglock);
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700621 if (group_dead)
622 pacct->ac_mem = vsize / 1024;
623 if (thread_group_leader(current)) {
624 pacct->ac_exitcode = exitcode;
625 if (current->flags & PF_FORKNOEXEC)
626 pacct->ac_flag |= AFORK;
627 }
628 if (current->flags & PF_SUPERPRIV)
629 pacct->ac_flag |= ASU;
630 if (current->flags & PF_DUMPCORE)
631 pacct->ac_flag |= ACORE;
632 if (current->flags & PF_SIGNALED)
633 pacct->ac_flag |= AXSIG;
KaiGai Kohei77787bf2006-06-25 05:49:26 -0700634 pacct->ac_utime = cputime_add(pacct->ac_utime, current->utime);
635 pacct->ac_stime = cputime_add(pacct->ac_stime, current->stime);
636 pacct->ac_minflt += current->min_flt;
637 pacct->ac_majflt += current->maj_flt;
638 spin_unlock_irq(&current->sighand->siglock);
KaiGai Kohei0e464812006-06-25 05:49:24 -0700639}
640
Pavel Emelyanov7d1e1352008-07-25 01:48:48 -0700641static void acct_process_in_ns(struct pid_namespace *ns)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700642{
643 struct file *file = NULL;
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700644 struct bsd_acct_struct *acct;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700645
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700646 acct = ns->bacct;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700647 /*
648 * accelerate the common fastpath:
649 */
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700650 if (!acct || !acct->file)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700651 return;
652
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700653 spin_lock(&acct_lock);
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700654 file = acct->file;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700655 if (unlikely(!file)) {
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700656 spin_unlock(&acct_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700657 return;
658 }
659 get_file(file);
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700660 spin_unlock(&acct_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700661
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700662 do_acct_process(acct, ns, file);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700663 fput(file);
664}
Pavel Emelyanov7d1e1352008-07-25 01:48:48 -0700665
666/**
Pavel Emelyanov0c18d7a2008-07-25 01:48:49 -0700667 * acct_process - now just a wrapper around acct_process_in_ns,
668 * which in turn is a wrapper around do_acct_process.
Pavel Emelyanov7d1e1352008-07-25 01:48:48 -0700669 *
670 * handles process accounting for an exiting task
671 */
672void acct_process(void)
673{
674 struct pid_namespace *ns;
675
Pavel Emelyanov0c18d7a2008-07-25 01:48:49 -0700676 /*
677 * This loop is safe lockless, since current is still
678 * alive and holds its namespace, which in turn holds
679 * its parent.
680 */
Pavel Emelyanov7d1e1352008-07-25 01:48:48 -0700681 for (ns = task_active_pid_ns(current); ns != NULL; ns = ns->parent)
682 acct_process_in_ns(ns);
683}