blob: 37f1dc696fbd4f514796e84bd60a33e1d3882358 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * linux/kernel/acct.c
3 *
4 * BSD Process Accounting for Linux
5 *
6 * Author: Marco van Wieringen <mvw@planets.elm.net>
7 *
8 * Some code based on ideas and code from:
9 * Thomas K. Dyas <tdyas@eden.rutgers.edu>
10 *
11 * This file implements BSD-style process accounting. Whenever any
12 * process exits, an accounting record of type "struct acct" is
13 * written to the file specified with the acct() system call. It is
14 * up to user-level programs to do useful things with the accounting
15 * log. The kernel just provides the raw accounting information.
16 *
17 * (C) Copyright 1995 - 1997 Marco van Wieringen - ELM Consultancy B.V.
18 *
19 * Plugged two leaks. 1) It didn't return acct_file into the free_filps if
20 * the file happened to be read-only. 2) If the accounting was suspended
21 * due to the lack of space it happily allowed to reopen it and completely
22 * lost the old acct_file. 3/10/98, Al Viro.
23 *
24 * Now we silently close acct_file on attempt to reopen. Cleaned sys_acct().
25 * XTerms and EMACS are manifestations of pure evil. 21/10/98, AV.
26 *
27 * Fixed a nasty interaction with with sys_umount(). If the accointing
28 * was suspeneded we failed to stop it on umount(). Messy.
29 * Another one: remount to readonly didn't stop accounting.
30 * Question: what should we do if we have CAP_SYS_ADMIN but not
31 * CAP_SYS_PACCT? Current code does the following: umount returns -EBUSY
32 * unless we are messing with the root. In that case we are getting a
33 * real mess with do_remount_sb(). 9/11/98, AV.
34 *
35 * Fixed a bunch of races (and pair of leaks). Probably not the best way,
36 * but this one obviously doesn't introduce deadlocks. Later. BTW, found
37 * one race (and leak) in BSD implementation.
38 * OK, that's better. ANOTHER race and leak in BSD variant. There always
39 * is one more bug... 10/11/98, AV.
40 *
41 * Oh, fsck... Oopsable SMP race in do_process_acct() - we must hold
42 * ->mmap_sem to walk the vma list of current->mm. Nasty, since it leaks
43 * a struct file opened for write. Fixed. 2/6/2000, AV.
44 */
45
Linus Torvalds1da177e2005-04-16 15:20:36 -070046#include <linux/mm.h>
47#include <linux/slab.h>
48#include <linux/acct.h>
Randy.Dunlapc59ede72006-01-11 12:17:46 -080049#include <linux/capability.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070050#include <linux/file.h>
51#include <linux/tty.h>
52#include <linux/security.h>
53#include <linux/vfs.h>
54#include <linux/jiffies.h>
55#include <linux/times.h>
56#include <linux/syscalls.h>
Al Viro7b7b1ac2005-11-07 17:13:39 -050057#include <linux/mount.h>
Paul McQuade7153e402014-06-06 14:37:37 -070058#include <linux/uaccess.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070059#include <asm/div64.h>
60#include <linux/blkdev.h> /* sector_div */
Pavel Emelyanov5f7b7032008-03-24 12:29:53 -070061#include <linux/pid_namespace.h>
Al Viroefb170c2014-08-07 08:39:04 -040062#include <linux/fs_pin.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070063
64/*
65 * These constants control the amount of freespace that suspend and
66 * resume the process accounting system, and the time delay between
67 * each check.
68 * Turned into sysctl-controllable parameters. AV, 12/11/98
69 */
70
71int acct_parm[3] = {4, 2, 30};
72#define RESUME (acct_parm[0]) /* >foo% free space - resume */
73#define SUSPEND (acct_parm[1]) /* <foo% free space - suspend */
74#define ACCT_TIMEOUT (acct_parm[2]) /* foo second timeout between checks */
75
76/*
77 * External references and all of the globals.
78 */
Linus Torvalds1da177e2005-04-16 15:20:36 -070079
Al Viro1629d0e2014-08-07 08:00:52 -040080struct bsd_acct_struct {
81 struct fs_pin pin;
Al Viro34cece22015-01-10 12:47:38 -050082 atomic_long_t count;
83 struct rcu_head rcu;
Al Virob8f00e62014-08-07 07:51:03 -040084 struct mutex lock;
Al Viro32dc7302011-12-08 20:08:42 -050085 int active;
86 unsigned long needcheck;
Linus Torvalds1da177e2005-04-16 15:20:36 -070087 struct file *file;
Pavel Emelyanov5f7b7032008-03-24 12:29:53 -070088 struct pid_namespace *ns;
Al Viro17c0a5a2014-08-07 07:35:19 -040089 struct work_struct work;
90 struct completion done;
Linus Torvalds1da177e2005-04-16 15:20:36 -070091};
92
Al Viro59eda0e2015-01-10 17:53:21 -050093static void do_acct_process(struct bsd_acct_struct *acct);
94
Linus Torvalds1da177e2005-04-16 15:20:36 -070095/*
Linus Torvalds1da177e2005-04-16 15:20:36 -070096 * Check the amount of free space and suspend/resume accordingly.
97 */
Al Viro54a4d582014-04-19 14:24:18 -040098static int check_free_space(struct bsd_acct_struct *acct)
Linus Torvalds1da177e2005-04-16 15:20:36 -070099{
100 struct kstatfs sbuf;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700101
Oleg Nesterov790080c2018-01-04 16:17:49 -0800102 if (time_is_after_jiffies(acct->needcheck))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700103 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700104
105 /* May block */
Al Viro54a4d582014-04-19 14:24:18 -0400106 if (vfs_statfs(&acct->file->f_path, &sbuf))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700107 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700108
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700109 if (acct->active) {
Al Viro54a4d582014-04-19 14:24:18 -0400110 u64 suspend = sbuf.f_blocks * SUSPEND;
111 do_div(suspend, 100);
112 if (sbuf.f_bavail <= suspend) {
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700113 acct->active = 0;
Ionut Alexa2577d922014-07-31 09:28:36 +1000114 pr_info("Process accounting paused\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700115 }
116 } else {
Al Viro54a4d582014-04-19 14:24:18 -0400117 u64 resume = sbuf.f_blocks * RESUME;
118 do_div(resume, 100);
119 if (sbuf.f_bavail >= resume) {
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700120 acct->active = 1;
Ionut Alexa2577d922014-07-31 09:28:36 +1000121 pr_info("Process accounting resumed\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122 }
123 }
124
Al Viro32dc7302011-12-08 20:08:42 -0500125 acct->needcheck = jiffies + ACCT_TIMEOUT*HZ;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700126out:
Al Viro54a4d582014-04-19 14:24:18 -0400127 return acct->active;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700128}
129
Al Viro9e251d02015-01-09 20:40:02 -0500130static void acct_put(struct bsd_acct_struct *p)
131{
Al Viro34cece22015-01-10 12:47:38 -0500132 if (atomic_long_dec_and_test(&p->count))
133 kfree_rcu(p, rcu);
Al Viro9e251d02015-01-09 20:40:02 -0500134}
135
Al Viro59eda0e2015-01-10 17:53:21 -0500136static inline struct bsd_acct_struct *to_acct(struct fs_pin *p)
137{
138 return p ? container_of(p, struct bsd_acct_struct, pin) : NULL;
139}
140
Al Viro215752f2014-08-07 06:23:41 -0400141static struct bsd_acct_struct *acct_get(struct pid_namespace *ns)
Al Virob8f00e62014-08-07 07:51:03 -0400142{
143 struct bsd_acct_struct *res;
Al Virob8f00e62014-08-07 07:51:03 -0400144again:
Al Viro2798d4c2014-08-07 07:04:28 -0400145 smp_rmb();
146 rcu_read_lock();
Al Viro59eda0e2015-01-10 17:53:21 -0500147 res = to_acct(ACCESS_ONCE(ns->bacct));
Al Viro2798d4c2014-08-07 07:04:28 -0400148 if (!res) {
149 rcu_read_unlock();
Al Viro215752f2014-08-07 06:23:41 -0400150 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700151 }
Al Viro34cece22015-01-10 12:47:38 -0500152 if (!atomic_long_inc_not_zero(&res->count)) {
Al Viroefb170c2014-08-07 08:39:04 -0400153 rcu_read_unlock();
154 cpu_relax();
Al Viro215752f2014-08-07 06:23:41 -0400155 goto again;
Al Viroefb170c2014-08-07 08:39:04 -0400156 }
157 rcu_read_unlock();
158 mutex_lock(&res->lock);
Al Viro59eda0e2015-01-10 17:53:21 -0500159 if (res != to_acct(ACCESS_ONCE(ns->bacct))) {
Al Viroefb170c2014-08-07 08:39:04 -0400160 mutex_unlock(&res->lock);
Al Viro9e251d02015-01-09 20:40:02 -0500161 acct_put(res);
Al Viroefb170c2014-08-07 08:39:04 -0400162 goto again;
163 }
Al Virob8f00e62014-08-07 07:51:03 -0400164 return res;
165}
166
Al Viro59eda0e2015-01-10 17:53:21 -0500167static void acct_pin_kill(struct fs_pin *pin)
168{
169 struct bsd_acct_struct *acct = to_acct(pin);
170 mutex_lock(&acct->lock);
171 do_acct_process(acct);
172 schedule_work(&acct->work);
173 wait_for_completion(&acct->done);
174 cmpxchg(&acct->ns->bacct, pin, NULL);
175 mutex_unlock(&acct->lock);
176 pin_remove(pin);
177 acct_put(acct);
178}
179
Al Viro17c0a5a2014-08-07 07:35:19 -0400180static void close_work(struct work_struct *work)
181{
182 struct bsd_acct_struct *acct = container_of(work, struct bsd_acct_struct, work);
183 struct file *file = acct->file;
Al Viro17c0a5a2014-08-07 07:35:19 -0400184 if (file->f_op->flush)
185 file->f_op->flush(file, NULL);
186 __fput_sync(file);
187 complete(&acct->done);
188}
189
Jeff Layton669abf42012-10-10 16:43:10 -0400190static int acct_on(struct filename *pathname)
Al Viro7b7b1ac2005-11-07 17:13:39 -0500191{
192 struct file *file;
Al Viro3064c352014-08-07 09:12:31 -0400193 struct vfsmount *mnt, *internal;
Al Virob8f00e62014-08-07 07:51:03 -0400194 struct pid_namespace *ns = task_active_pid_ns(current);
Al Viro59eda0e2015-01-10 17:53:21 -0500195 struct bsd_acct_struct *acct;
196 struct fs_pin *old;
Al Viro3064c352014-08-07 09:12:31 -0400197 int err;
Al Virob8f00e62014-08-07 07:51:03 -0400198
199 acct = kzalloc(sizeof(struct bsd_acct_struct), GFP_KERNEL);
200 if (!acct)
201 return -ENOMEM;
Al Viro7b7b1ac2005-11-07 17:13:39 -0500202
203 /* Difference from BSD - they don't do O_APPEND */
Jeff Layton669abf42012-10-10 16:43:10 -0400204 file = file_open_name(pathname, O_WRONLY|O_APPEND|O_LARGEFILE, 0);
Al Virob8f00e62014-08-07 07:51:03 -0400205 if (IS_ERR(file)) {
206 kfree(acct);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500207 return PTR_ERR(file);
Al Virob8f00e62014-08-07 07:51:03 -0400208 }
Al Viro7b7b1ac2005-11-07 17:13:39 -0500209
Al Viro496ad9a2013-01-23 17:07:38 -0500210 if (!S_ISREG(file_inode(file)->i_mode)) {
Al Virob8f00e62014-08-07 07:51:03 -0400211 kfree(acct);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500212 filp_close(file, NULL);
213 return -EACCES;
214 }
215
Al Virod0f88f82015-03-31 12:30:48 -0400216 if (!(file->f_mode & FMODE_CAN_WRITE)) {
Al Virob8f00e62014-08-07 07:51:03 -0400217 kfree(acct);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500218 filp_close(file, NULL);
219 return -EIO;
220 }
Al Viro3064c352014-08-07 09:12:31 -0400221 internal = mnt_clone_internal(&file->f_path);
222 if (IS_ERR(internal)) {
223 kfree(acct);
224 filp_close(file, NULL);
225 return PTR_ERR(internal);
226 }
227 err = mnt_want_write(internal);
228 if (err) {
229 mntput(internal);
230 kfree(acct);
231 filp_close(file, NULL);
232 return err;
233 }
234 mnt = file->f_path.mnt;
235 file->f_path.mnt = internal;
Al Viro7b7b1ac2005-11-07 17:13:39 -0500236
Al Viro34cece22015-01-10 12:47:38 -0500237 atomic_long_set(&acct->count, 1);
Al Viro59eda0e2015-01-10 17:53:21 -0500238 init_fs_pin(&acct->pin, acct_pin_kill);
Al Virob8f00e62014-08-07 07:51:03 -0400239 acct->file = file;
240 acct->needcheck = jiffies;
241 acct->ns = ns;
242 mutex_init(&acct->lock);
Al Viro59eda0e2015-01-10 17:53:21 -0500243 INIT_WORK(&acct->work, close_work);
244 init_completion(&acct->done);
Al Viroefb170c2014-08-07 08:39:04 -0400245 mutex_lock_nested(&acct->lock, 1); /* nobody has seen it yet */
246 pin_insert(&acct->pin, mnt);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500247
Al Viro59eda0e2015-01-10 17:53:21 -0500248 rcu_read_lock();
249 old = xchg(&ns->bacct, &acct->pin);
Al Viroefb170c2014-08-07 08:39:04 -0400250 mutex_unlock(&acct->lock);
Al Viro59eda0e2015-01-10 17:53:21 -0500251 pin_kill(old);
Al Viro3064c352014-08-07 09:12:31 -0400252 mnt_drop_write(mnt);
253 mntput(mnt);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500254 return 0;
255}
256
Al Viro9df7fa12014-05-15 06:49:45 -0400257static DEFINE_MUTEX(acct_on_mutex);
258
Randy Dunlap417ef532005-09-10 00:26:39 -0700259/**
260 * sys_acct - enable/disable process accounting
261 * @name: file name for accounting records or NULL to shutdown accounting
262 *
263 * Returns 0 for success or negative errno values for failure.
264 *
265 * sys_acct() is the only system call needed to implement process
266 * accounting. It takes the name of the file where accounting records
267 * should be written. If the filename is NULL, accounting will be
268 * shutdown.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700269 */
Heiko Carstensb290ebe2009-01-14 14:14:06 +0100270SYSCALL_DEFINE1(acct, const char __user *, name)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700271{
Eric Paris05b90492010-04-07 15:15:25 -0400272 int error = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700273
274 if (!capable(CAP_SYS_PACCT))
275 return -EPERM;
276
277 if (name) {
Jeff Layton91a27b22012-10-10 15:25:28 -0400278 struct filename *tmp = getname(name);
Ionut Alexa2577d922014-07-31 09:28:36 +1000279
Al Viro7b7b1ac2005-11-07 17:13:39 -0500280 if (IS_ERR(tmp))
Paul McQuade46c0a8c2014-06-06 14:37:37 -0700281 return PTR_ERR(tmp);
Al Viro9df7fa12014-05-15 06:49:45 -0400282 mutex_lock(&acct_on_mutex);
Jeff Layton669abf42012-10-10 16:43:10 -0400283 error = acct_on(tmp);
Al Viro9df7fa12014-05-15 06:49:45 -0400284 mutex_unlock(&acct_on_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700285 putname(tmp);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500286 } else {
Al Viro59eda0e2015-01-10 17:53:21 -0500287 rcu_read_lock();
288 pin_kill(task_active_pid_ns(current)->bacct);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700289 }
Eric Paris05b90492010-04-07 15:15:25 -0400290
Al Viro7b7b1ac2005-11-07 17:13:39 -0500291 return error;
292}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700293
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700294void acct_exit_ns(struct pid_namespace *ns)
295{
Al Viro59eda0e2015-01-10 17:53:21 -0500296 rcu_read_lock();
297 pin_kill(ns->bacct);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700298}
299
300/*
301 * encode an unsigned long into a comp_t
302 *
303 * This routine has been adopted from the encode_comp_t() function in
304 * the kern_acct.c file of the FreeBSD operating system. The encoding
305 * is a 13-bit fraction with a 3-bit (base 8) exponent.
306 */
307
308#define MANTSIZE 13 /* 13 bit mantissa. */
309#define EXPSIZE 3 /* Base 8 (3 bit) exponent. */
310#define MAXFRACT ((1 << MANTSIZE) - 1) /* Maximum fractional value. */
311
312static comp_t encode_comp_t(unsigned long value)
313{
314 int exp, rnd;
315
316 exp = rnd = 0;
317 while (value > MAXFRACT) {
318 rnd = value & (1 << (EXPSIZE - 1)); /* Round up? */
319 value >>= EXPSIZE; /* Base 8 exponent == 3 bit shift. */
320 exp++;
321 }
322
323 /*
Daniel Walker6ae965c2007-10-18 03:06:04 -0700324 * If we need to round up, do it (and handle overflow correctly).
325 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700326 if (rnd && (++value > MAXFRACT)) {
327 value >>= EXPSIZE;
328 exp++;
329 }
330
331 /*
Daniel Walker6ae965c2007-10-18 03:06:04 -0700332 * Clean it up and polish it off.
333 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700334 exp <<= MANTSIZE; /* Shift the exponent into place */
335 exp += value; /* and add on the mantissa. */
336 return exp;
337}
338
Ionut Alexa2577d922014-07-31 09:28:36 +1000339#if ACCT_VERSION == 1 || ACCT_VERSION == 2
Linus Torvalds1da177e2005-04-16 15:20:36 -0700340/*
341 * encode an u64 into a comp2_t (24 bits)
342 *
343 * Format: 5 bit base 2 exponent, 20 bits mantissa.
344 * The leading bit of the mantissa is not stored, but implied for
345 * non-zero exponents.
346 * Largest encodable value is 50 bits.
347 */
348
349#define MANTSIZE2 20 /* 20 bit mantissa. */
350#define EXPSIZE2 5 /* 5 bit base 2 exponent. */
351#define MAXFRACT2 ((1ul << MANTSIZE2) - 1) /* Maximum fractional value. */
Ionut Alexa2577d922014-07-31 09:28:36 +1000352#define MAXEXP2 ((1 << EXPSIZE2) - 1) /* Maximum exponent. */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700353
354static comp2_t encode_comp2_t(u64 value)
355{
Daniel Walker6ae965c2007-10-18 03:06:04 -0700356 int exp, rnd;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700357
Daniel Walker6ae965c2007-10-18 03:06:04 -0700358 exp = (value > (MAXFRACT2>>1));
359 rnd = 0;
360 while (value > MAXFRACT2) {
361 rnd = value & 1;
362 value >>= 1;
363 exp++;
364 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700365
Daniel Walker6ae965c2007-10-18 03:06:04 -0700366 /*
367 * If we need to round up, do it (and handle overflow correctly).
368 */
369 if (rnd && (++value > MAXFRACT2)) {
370 value >>= 1;
371 exp++;
372 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700373
Daniel Walker6ae965c2007-10-18 03:06:04 -0700374 if (exp > MAXEXP2) {
375 /* Overflow. Return largest representable number instead. */
376 return (1ul << (MANTSIZE2+EXPSIZE2-1)) - 1;
377 } else {
378 return (value & (MAXFRACT2>>1)) | (exp << (MANTSIZE2-1));
379 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700380}
381#endif
382
Ionut Alexa2577d922014-07-31 09:28:36 +1000383#if ACCT_VERSION == 3
Linus Torvalds1da177e2005-04-16 15:20:36 -0700384/*
385 * encode an u64 into a 32 bit IEEE float
386 */
387static u32 encode_float(u64 value)
388{
389 unsigned exp = 190;
390 unsigned u;
391
Ionut Alexa2577d922014-07-31 09:28:36 +1000392 if (value == 0)
393 return 0;
394 while ((s64)value > 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700395 value <<= 1;
396 exp--;
397 }
398 u = (u32)(value >> 40) & 0x7fffffu;
399 return u | (exp << 23);
400}
401#endif
402
403/*
404 * Write an accounting entry for an exiting process
405 *
406 * The acct_process() call is the workhorse of the process
407 * accounting system. The struct acct is built here and then written
408 * into the accounting file. This function should only be called from
Ingo Molnarbcbe4a02007-11-26 21:21:49 +0100409 * do_exit() or when switching to a different output file.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700410 */
411
Al Virocdd37e22014-04-26 23:45:53 -0400412static void fill_ac(acct_t *ac)
413{
414 struct pacct_struct *pacct = &current->signal->pacct;
415 u64 elapsed, run_time;
416 struct tty_struct *tty;
417
418 /*
419 * Fill the accounting struct with the needed info as recorded
420 * by the different kernel functions.
421 */
422 memset(ac, 0, sizeof(acct_t));
423
424 ac->ac_version = ACCT_VERSION | ACCT_BYTEORDER;
425 strlcpy(ac->ac_comm, current->comm, sizeof(ac->ac_comm));
426
427 /* calculate run_time in nsec*/
428 run_time = ktime_get_ns();
429 run_time -= current->group_leader->start_time;
430 /* convert nsec -> AHZ */
431 elapsed = nsec_to_AHZ(run_time);
Ionut Alexa2577d922014-07-31 09:28:36 +1000432#if ACCT_VERSION == 3
Al Virocdd37e22014-04-26 23:45:53 -0400433 ac->ac_etime = encode_float(elapsed);
434#else
435 ac->ac_etime = encode_comp_t(elapsed < (unsigned long) -1l ?
Ionut Alexa2577d922014-07-31 09:28:36 +1000436 (unsigned long) elapsed : (unsigned long) -1l);
Al Virocdd37e22014-04-26 23:45:53 -0400437#endif
Ionut Alexa2577d922014-07-31 09:28:36 +1000438#if ACCT_VERSION == 1 || ACCT_VERSION == 2
Al Virocdd37e22014-04-26 23:45:53 -0400439 {
440 /* new enlarged etime field */
441 comp2_t etime = encode_comp2_t(elapsed);
Ionut Alexa2577d922014-07-31 09:28:36 +1000442
Al Virocdd37e22014-04-26 23:45:53 -0400443 ac->ac_etime_hi = etime >> 16;
444 ac->ac_etime_lo = (u16) etime;
445 }
446#endif
447 do_div(elapsed, AHZ);
448 ac->ac_btime = get_seconds() - elapsed;
449#if ACCT_VERSION==2
450 ac->ac_ahz = AHZ;
451#endif
452
453 spin_lock_irq(&current->sighand->siglock);
454 tty = current->signal->tty; /* Safe as we hold the siglock */
455 ac->ac_tty = tty ? old_encode_dev(tty_devnum(tty)) : 0;
456 ac->ac_utime = encode_comp_t(jiffies_to_AHZ(cputime_to_jiffies(pacct->ac_utime)));
457 ac->ac_stime = encode_comp_t(jiffies_to_AHZ(cputime_to_jiffies(pacct->ac_stime)));
458 ac->ac_flag = pacct->ac_flag;
459 ac->ac_mem = encode_comp_t(pacct->ac_mem);
460 ac->ac_minflt = encode_comp_t(pacct->ac_minflt);
461 ac->ac_majflt = encode_comp_t(pacct->ac_majflt);
462 ac->ac_exitcode = pacct->ac_exitcode;
463 spin_unlock_irq(&current->sighand->siglock);
464}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700465/*
466 * do_acct_process does all actual work. Caller holds the reference to file.
467 */
Al Virob8f00e62014-08-07 07:51:03 -0400468static void do_acct_process(struct bsd_acct_struct *acct)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700469{
470 acct_t ac;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700471 unsigned long flim;
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700472 const struct cred *orig_cred;
Al Virob8f00e62014-08-07 07:51:03 -0400473 struct file *file = acct->file;
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700474
Al Viroed447242014-04-19 14:37:20 -0400475 /*
476 * Accounting records are not subject to resource limits.
477 */
478 flim = current->signal->rlim[RLIMIT_FSIZE].rlim_cur;
479 current->signal->rlim[RLIMIT_FSIZE].rlim_cur = RLIM_INFINITY;
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700480 /* Perform file operations on behalf of whoever enabled accounting */
481 orig_cred = override_creds(file->f_cred);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700482
483 /*
484 * First check to see if there is enough free_space to continue
485 * the process accounting system.
486 */
Al Viro54a4d582014-04-19 14:24:18 -0400487 if (!check_free_space(acct))
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700488 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700489
Al Virocdd37e22014-04-26 23:45:53 -0400490 fill_ac(&ac);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700491 /* we really need to bite the bullet and change layout */
Eric W. Biedermanf8f3d4d2012-02-07 16:54:50 -0800492 ac.ac_uid = from_kuid_munged(file->f_cred->user_ns, orig_cred->uid);
493 ac.ac_gid = from_kgid_munged(file->f_cred->user_ns, orig_cred->gid);
Ionut Alexa2577d922014-07-31 09:28:36 +1000494#if ACCT_VERSION == 1 || ACCT_VERSION == 2
Linus Torvalds1da177e2005-04-16 15:20:36 -0700495 /* backward-compatible 16 bit fields */
David Howells76aac0e2008-11-14 10:39:12 +1100496 ac.ac_uid16 = ac.ac_uid;
497 ac.ac_gid16 = ac.ac_gid;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700498#endif
Ionut Alexa2577d922014-07-31 09:28:36 +1000499#if ACCT_VERSION == 3
Ying Xue067b7222014-10-09 15:30:21 -0700500 {
501 struct pid_namespace *ns = acct->ns;
502
503 ac.ac_pid = task_tgid_nr_ns(current, ns);
504 rcu_read_lock();
505 ac.ac_ppid = task_tgid_nr_ns(rcu_dereference(current->real_parent),
506 ns);
507 rcu_read_unlock();
508 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700509#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700510 /*
Jan Kara5ae98f12013-05-04 00:11:23 +0200511 * Get freeze protection. If the fs is frozen, just skip the write
512 * as we could deadlock the system otherwise.
513 */
Al Viroed447242014-04-19 14:37:20 -0400514 if (file_start_write_trylock(file)) {
515 /* it's been opened O_APPEND, so position is irrelevant */
516 loff_t pos = 0;
517 __kernel_write(file, (char *)&ac, sizeof(acct_t), &pos);
518 file_end_write(file);
519 }
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700520out:
Al Viroed447242014-04-19 14:37:20 -0400521 current->signal->rlim[RLIMIT_FSIZE].rlim_cur = flim;
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700522 revert_creds(orig_cred);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700523}
524
Randy Dunlap417ef532005-09-10 00:26:39 -0700525/**
KaiGai Kohei0e464812006-06-25 05:49:24 -0700526 * acct_collect - collect accounting information into pacct_struct
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700527 * @exitcode: task exit code
528 * @group_dead: not 0, if this thread is the last one in the process.
KaiGai Kohei0e464812006-06-25 05:49:24 -0700529 */
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700530void acct_collect(long exitcode, int group_dead)
KaiGai Kohei0e464812006-06-25 05:49:24 -0700531{
532 struct pacct_struct *pacct = &current->signal->pacct;
Frederic Weisbecker6fac4822012-11-13 14:20:55 +0100533 cputime_t utime, stime;
KaiGai Kohei0e464812006-06-25 05:49:24 -0700534 unsigned long vsize = 0;
535
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700536 if (group_dead && current->mm) {
KaiGai Kohei0e464812006-06-25 05:49:24 -0700537 struct vm_area_struct *vma;
Ionut Alexa2577d922014-07-31 09:28:36 +1000538
KaiGai Kohei0e464812006-06-25 05:49:24 -0700539 down_read(&current->mm->mmap_sem);
540 vma = current->mm->mmap;
541 while (vma) {
542 vsize += vma->vm_end - vma->vm_start;
543 vma = vma->vm_next;
544 }
545 up_read(&current->mm->mmap_sem);
546 }
547
KaiGai Kohei77787bf2006-06-25 05:49:26 -0700548 spin_lock_irq(&current->sighand->siglock);
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700549 if (group_dead)
550 pacct->ac_mem = vsize / 1024;
551 if (thread_group_leader(current)) {
552 pacct->ac_exitcode = exitcode;
553 if (current->flags & PF_FORKNOEXEC)
554 pacct->ac_flag |= AFORK;
555 }
556 if (current->flags & PF_SUPERPRIV)
557 pacct->ac_flag |= ASU;
558 if (current->flags & PF_DUMPCORE)
559 pacct->ac_flag |= ACORE;
560 if (current->flags & PF_SIGNALED)
561 pacct->ac_flag |= AXSIG;
Frederic Weisbecker6fac4822012-11-13 14:20:55 +0100562 task_cputime(current, &utime, &stime);
563 pacct->ac_utime += utime;
564 pacct->ac_stime += stime;
KaiGai Kohei77787bf2006-06-25 05:49:26 -0700565 pacct->ac_minflt += current->min_flt;
566 pacct->ac_majflt += current->maj_flt;
567 spin_unlock_irq(&current->sighand->siglock);
KaiGai Kohei0e464812006-06-25 05:49:24 -0700568}
569
Al Viroe25ff112014-05-07 05:12:09 -0400570static void slow_acct_process(struct pid_namespace *ns)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700571{
Al Viroe25ff112014-05-07 05:12:09 -0400572 for ( ; ns; ns = ns->parent) {
Al Viro215752f2014-08-07 06:23:41 -0400573 struct bsd_acct_struct *acct = acct_get(ns);
Al Virob8f00e62014-08-07 07:51:03 -0400574 if (acct) {
575 do_acct_process(acct);
576 mutex_unlock(&acct->lock);
Al Viro9e251d02015-01-09 20:40:02 -0500577 acct_put(acct);
Al Viroe25ff112014-05-07 05:12:09 -0400578 }
Al Viroe25ff112014-05-07 05:12:09 -0400579 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700580}
Pavel Emelyanov7d1e1352008-07-25 01:48:48 -0700581
582/**
Al Viroe25ff112014-05-07 05:12:09 -0400583 * acct_process
Pavel Emelyanov7d1e1352008-07-25 01:48:48 -0700584 *
585 * handles process accounting for an exiting task
586 */
587void acct_process(void)
588{
589 struct pid_namespace *ns;
590
Pavel Emelyanov0c18d7a2008-07-25 01:48:49 -0700591 /*
592 * This loop is safe lockless, since current is still
593 * alive and holds its namespace, which in turn holds
594 * its parent.
595 */
Al Viroe25ff112014-05-07 05:12:09 -0400596 for (ns = task_active_pid_ns(current); ns != NULL; ns = ns->parent) {
Al Virob8f00e62014-08-07 07:51:03 -0400597 if (ns->bacct)
Al Viroe25ff112014-05-07 05:12:09 -0400598 break;
599 }
600 if (unlikely(ns))
601 slow_acct_process(ns);
Pavel Emelyanov7d1e1352008-07-25 01:48:48 -0700602}