blob: afeaaa6f49bf741daa7ea0c95e4e51214fd92453 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * linux/kernel/acct.c
3 *
4 * BSD Process Accounting for Linux
5 *
6 * Author: Marco van Wieringen <mvw@planets.elm.net>
7 *
8 * Some code based on ideas and code from:
9 * Thomas K. Dyas <tdyas@eden.rutgers.edu>
10 *
11 * This file implements BSD-style process accounting. Whenever any
12 * process exits, an accounting record of type "struct acct" is
13 * written to the file specified with the acct() system call. It is
14 * up to user-level programs to do useful things with the accounting
15 * log. The kernel just provides the raw accounting information.
16 *
17 * (C) Copyright 1995 - 1997 Marco van Wieringen - ELM Consultancy B.V.
18 *
19 * Plugged two leaks. 1) It didn't return acct_file into the free_filps if
20 * the file happened to be read-only. 2) If the accounting was suspended
21 * due to the lack of space it happily allowed to reopen it and completely
22 * lost the old acct_file. 3/10/98, Al Viro.
23 *
24 * Now we silently close acct_file on attempt to reopen. Cleaned sys_acct().
25 * XTerms and EMACS are manifestations of pure evil. 21/10/98, AV.
26 *
27 * Fixed a nasty interaction with with sys_umount(). If the accointing
28 * was suspeneded we failed to stop it on umount(). Messy.
29 * Another one: remount to readonly didn't stop accounting.
30 * Question: what should we do if we have CAP_SYS_ADMIN but not
31 * CAP_SYS_PACCT? Current code does the following: umount returns -EBUSY
32 * unless we are messing with the root. In that case we are getting a
33 * real mess with do_remount_sb(). 9/11/98, AV.
34 *
35 * Fixed a bunch of races (and pair of leaks). Probably not the best way,
36 * but this one obviously doesn't introduce deadlocks. Later. BTW, found
37 * one race (and leak) in BSD implementation.
38 * OK, that's better. ANOTHER race and leak in BSD variant. There always
39 * is one more bug... 10/11/98, AV.
40 *
41 * Oh, fsck... Oopsable SMP race in do_process_acct() - we must hold
42 * ->mmap_sem to walk the vma list of current->mm. Nasty, since it leaks
43 * a struct file opened for write. Fixed. 2/6/2000, AV.
44 */
45
Linus Torvalds1da177e2005-04-16 15:20:36 -070046#include <linux/mm.h>
47#include <linux/slab.h>
48#include <linux/acct.h>
Randy.Dunlapc59ede72006-01-11 12:17:46 -080049#include <linux/capability.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070050#include <linux/file.h>
51#include <linux/tty.h>
52#include <linux/security.h>
53#include <linux/vfs.h>
54#include <linux/jiffies.h>
55#include <linux/times.h>
56#include <linux/syscalls.h>
Al Viro7b7b1ac2005-11-07 17:13:39 -050057#include <linux/mount.h>
Paul McQuade7153e402014-06-06 14:37:37 -070058#include <linux/uaccess.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070059#include <asm/div64.h>
60#include <linux/blkdev.h> /* sector_div */
Pavel Emelyanov5f7b7032008-03-24 12:29:53 -070061#include <linux/pid_namespace.h>
Al Viro215752f2014-08-07 06:23:41 -040062#include <../fs/mount.h> /* will go away when we refactor */
Linus Torvalds1da177e2005-04-16 15:20:36 -070063
64/*
65 * These constants control the amount of freespace that suspend and
66 * resume the process accounting system, and the time delay between
67 * each check.
68 * Turned into sysctl-controllable parameters. AV, 12/11/98
69 */
70
71int acct_parm[3] = {4, 2, 30};
72#define RESUME (acct_parm[0]) /* >foo% free space - resume */
73#define SUSPEND (acct_parm[1]) /* <foo% free space - suspend */
74#define ACCT_TIMEOUT (acct_parm[2]) /* foo second timeout between checks */
75
76/*
77 * External references and all of the globals.
78 */
Al Virob8f00e62014-08-07 07:51:03 -040079static void do_acct_process(struct bsd_acct_struct *acct);
Linus Torvalds1da177e2005-04-16 15:20:36 -070080
Al Viro1629d0e2014-08-07 08:00:52 -040081struct fs_pin {
Al Viro2798d4c2014-08-07 07:04:28 -040082 atomic_long_t count;
83 union {
84 struct {
85 struct hlist_node s_list;
86 struct hlist_node m_list;
87 };
88 struct rcu_head rcu;
89 };
Al Viro1629d0e2014-08-07 08:00:52 -040090};
91
92struct bsd_acct_struct {
93 struct fs_pin pin;
Al Virob8f00e62014-08-07 07:51:03 -040094 struct mutex lock;
Al Viro32dc7302011-12-08 20:08:42 -050095 int active;
96 unsigned long needcheck;
Linus Torvalds1da177e2005-04-16 15:20:36 -070097 struct file *file;
Pavel Emelyanov5f7b7032008-03-24 12:29:53 -070098 struct pid_namespace *ns;
Al Viro17c0a5a2014-08-07 07:35:19 -040099 struct work_struct work;
100 struct completion done;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700101};
102
Al Viro1629d0e2014-08-07 08:00:52 -0400103static void pin_free_rcu(struct rcu_head *head)
Al Viro2798d4c2014-08-07 07:04:28 -0400104{
Al Viro1629d0e2014-08-07 08:00:52 -0400105 kfree(container_of(head, struct fs_pin, rcu));
Al Viro2798d4c2014-08-07 07:04:28 -0400106}
107
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700108static DEFINE_SPINLOCK(acct_lock);
109
Linus Torvalds1da177e2005-04-16 15:20:36 -0700110/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111 * Check the amount of free space and suspend/resume accordingly.
112 */
Al Viro54a4d582014-04-19 14:24:18 -0400113static int check_free_space(struct bsd_acct_struct *acct)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700114{
115 struct kstatfs sbuf;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700116
Al Viro54a4d582014-04-19 14:24:18 -0400117 if (time_is_before_jiffies(acct->needcheck))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700118 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700119
120 /* May block */
Al Viro54a4d582014-04-19 14:24:18 -0400121 if (vfs_statfs(&acct->file->f_path, &sbuf))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700123
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700124 if (acct->active) {
Al Viro54a4d582014-04-19 14:24:18 -0400125 u64 suspend = sbuf.f_blocks * SUSPEND;
126 do_div(suspend, 100);
127 if (sbuf.f_bavail <= suspend) {
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700128 acct->active = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700129 printk(KERN_INFO "Process accounting paused\n");
130 }
131 } else {
Al Viro54a4d582014-04-19 14:24:18 -0400132 u64 resume = sbuf.f_blocks * RESUME;
133 do_div(resume, 100);
134 if (sbuf.f_bavail >= resume) {
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700135 acct->active = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136 printk(KERN_INFO "Process accounting resumed\n");
137 }
138 }
139
Al Viro32dc7302011-12-08 20:08:42 -0500140 acct->needcheck = jiffies + ACCT_TIMEOUT*HZ;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700141out:
Al Viro54a4d582014-04-19 14:24:18 -0400142 return acct->active;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700143}
144
Al Viro1629d0e2014-08-07 08:00:52 -0400145static void pin_put(struct fs_pin *p)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700146{
Al Viro2798d4c2014-08-07 07:04:28 -0400147 if (atomic_long_dec_and_test(&p->count))
Al Viro1629d0e2014-08-07 08:00:52 -0400148 call_rcu(&p->rcu, pin_free_rcu);
Al Virob8f00e62014-08-07 07:51:03 -0400149}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700150
Al Viro215752f2014-08-07 06:23:41 -0400151static struct bsd_acct_struct *__acct_get(struct bsd_acct_struct *res)
152{
Al Viro1629d0e2014-08-07 08:00:52 -0400153 if (!atomic_long_inc_not_zero(&res->pin.count)) {
Al Viro2798d4c2014-08-07 07:04:28 -0400154 rcu_read_unlock();
155 cpu_relax();
156 return NULL;
157 }
158 rcu_read_unlock();
Al Viro215752f2014-08-07 06:23:41 -0400159 mutex_lock(&res->lock);
160 if (!res->ns) {
161 mutex_unlock(&res->lock);
Al Viro1629d0e2014-08-07 08:00:52 -0400162 pin_put(&res->pin);
Al Viro215752f2014-08-07 06:23:41 -0400163 return NULL;
164 }
165 return res;
166}
167
168static struct bsd_acct_struct *acct_get(struct pid_namespace *ns)
Al Virob8f00e62014-08-07 07:51:03 -0400169{
170 struct bsd_acct_struct *res;
Al Virob8f00e62014-08-07 07:51:03 -0400171again:
Al Viro2798d4c2014-08-07 07:04:28 -0400172 smp_rmb();
173 rcu_read_lock();
174 res = ACCESS_ONCE(ns->bacct);
175 if (!res) {
176 rcu_read_unlock();
Al Viro215752f2014-08-07 06:23:41 -0400177 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700178 }
Al Viro2798d4c2014-08-07 07:04:28 -0400179 res = __acct_get(res);
Al Viro215752f2014-08-07 06:23:41 -0400180 if (!res)
181 goto again;
Al Virob8f00e62014-08-07 07:51:03 -0400182 return res;
183}
184
Al Viro17c0a5a2014-08-07 07:35:19 -0400185static void close_work(struct work_struct *work)
186{
187 struct bsd_acct_struct *acct = container_of(work, struct bsd_acct_struct, work);
188 struct file *file = acct->file;
189 mnt_unpin(file->f_path.mnt);
190 if (file->f_op->flush)
191 file->f_op->flush(file, NULL);
192 __fput_sync(file);
193 complete(&acct->done);
194}
195
Al Virob8f00e62014-08-07 07:51:03 -0400196static void acct_kill(struct bsd_acct_struct *acct,
197 struct bsd_acct_struct *new)
198{
199 if (acct) {
Al Virob8f00e62014-08-07 07:51:03 -0400200 struct pid_namespace *ns = acct->ns;
Al Viro2798d4c2014-08-07 07:04:28 -0400201 do_acct_process(acct);
Al Viro17c0a5a2014-08-07 07:35:19 -0400202 INIT_WORK(&acct->work, close_work);
203 init_completion(&acct->done);
204 schedule_work(&acct->work);
205 wait_for_completion(&acct->done);
Pavel Emelyanova75d9792008-07-25 01:48:45 -0700206 spin_lock(&acct_lock);
Al Viro1629d0e2014-08-07 08:00:52 -0400207 hlist_del(&acct->pin.m_list);
208 hlist_del(&acct->pin.s_list);
Al Virob8f00e62014-08-07 07:51:03 -0400209 spin_unlock(&acct_lock);
Al Virob8f00e62014-08-07 07:51:03 -0400210 ns->bacct = new;
211 if (new) {
Al Viro215752f2014-08-07 06:23:41 -0400212 struct vfsmount *m = new->file->f_path.mnt;
Al Viro2798d4c2014-08-07 07:04:28 -0400213 spin_lock(&acct_lock);
Al Viro1629d0e2014-08-07 08:00:52 -0400214 hlist_add_head(&new->pin.s_list, &m->mnt_sb->s_pins);
215 hlist_add_head(&new->pin.m_list, &real_mount(m)->mnt_pins);
Al Viro2798d4c2014-08-07 07:04:28 -0400216 spin_unlock(&acct_lock);
217 mutex_unlock(&new->lock);
Al Virob8f00e62014-08-07 07:51:03 -0400218 }
219 acct->ns = NULL;
Al Viro1629d0e2014-08-07 08:00:52 -0400220 atomic_long_dec(&acct->pin.count);
Al Virob8f00e62014-08-07 07:51:03 -0400221 mutex_unlock(&acct->lock);
Al Viro1629d0e2014-08-07 08:00:52 -0400222 pin_put(&acct->pin);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700223 }
224}
225
Jeff Layton669abf42012-10-10 16:43:10 -0400226static int acct_on(struct filename *pathname)
Al Viro7b7b1ac2005-11-07 17:13:39 -0500227{
228 struct file *file;
Renaud Lottiauxdf279ca2009-06-30 11:41:34 -0700229 struct vfsmount *mnt;
Al Virob8f00e62014-08-07 07:51:03 -0400230 struct pid_namespace *ns = task_active_pid_ns(current);
231 struct bsd_acct_struct *acct, *old;
232
233 acct = kzalloc(sizeof(struct bsd_acct_struct), GFP_KERNEL);
234 if (!acct)
235 return -ENOMEM;
Al Viro7b7b1ac2005-11-07 17:13:39 -0500236
237 /* Difference from BSD - they don't do O_APPEND */
Jeff Layton669abf42012-10-10 16:43:10 -0400238 file = file_open_name(pathname, O_WRONLY|O_APPEND|O_LARGEFILE, 0);
Al Virob8f00e62014-08-07 07:51:03 -0400239 if (IS_ERR(file)) {
240 kfree(acct);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500241 return PTR_ERR(file);
Al Virob8f00e62014-08-07 07:51:03 -0400242 }
Al Viro7b7b1ac2005-11-07 17:13:39 -0500243
Al Viro496ad9a2013-01-23 17:07:38 -0500244 if (!S_ISREG(file_inode(file)->i_mode)) {
Al Virob8f00e62014-08-07 07:51:03 -0400245 kfree(acct);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500246 filp_close(file, NULL);
247 return -EACCES;
248 }
249
250 if (!file->f_op->write) {
Al Virob8f00e62014-08-07 07:51:03 -0400251 kfree(acct);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500252 filp_close(file, NULL);
253 return -EIO;
254 }
255
Al Viro1629d0e2014-08-07 08:00:52 -0400256 atomic_long_set(&acct->pin.count, 1);
Al Virob8f00e62014-08-07 07:51:03 -0400257 acct->file = file;
258 acct->needcheck = jiffies;
259 acct->ns = ns;
260 mutex_init(&acct->lock);
Renaud Lottiauxdf279ca2009-06-30 11:41:34 -0700261 mnt = file->f_path.mnt;
Al Viro215748e2014-08-07 07:51:29 -0400262 mnt_pin(mnt);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500263
Al Viro215752f2014-08-07 06:23:41 -0400264 old = acct_get(ns);
Al Viro2798d4c2014-08-07 07:04:28 -0400265 mutex_lock_nested(&acct->lock, 1); /* nobody has seen it yet */
Al Virob8f00e62014-08-07 07:51:03 -0400266 if (old) {
267 acct_kill(old, acct);
268 } else {
Al Virob8f00e62014-08-07 07:51:03 -0400269 ns->bacct = acct;
Al Viro2798d4c2014-08-07 07:04:28 -0400270 spin_lock(&acct_lock);
Al Viro1629d0e2014-08-07 08:00:52 -0400271 hlist_add_head(&acct->pin.s_list, &mnt->mnt_sb->s_pins);
272 hlist_add_head(&acct->pin.m_list, &real_mount(mnt)->mnt_pins);
Al Virob8f00e62014-08-07 07:51:03 -0400273 spin_unlock(&acct_lock);
Al Viro2798d4c2014-08-07 07:04:28 -0400274 mutex_unlock(&acct->lock);
Al Virob8f00e62014-08-07 07:51:03 -0400275 }
Renaud Lottiauxdf279ca2009-06-30 11:41:34 -0700276 mntput(mnt); /* it's pinned, now give up active reference */
Al Viro7b7b1ac2005-11-07 17:13:39 -0500277 return 0;
278}
279
Al Viro9df7fa12014-05-15 06:49:45 -0400280static DEFINE_MUTEX(acct_on_mutex);
281
Randy Dunlap417ef532005-09-10 00:26:39 -0700282/**
283 * sys_acct - enable/disable process accounting
284 * @name: file name for accounting records or NULL to shutdown accounting
285 *
286 * Returns 0 for success or negative errno values for failure.
287 *
288 * sys_acct() is the only system call needed to implement process
289 * accounting. It takes the name of the file where accounting records
290 * should be written. If the filename is NULL, accounting will be
291 * shutdown.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700292 */
Heiko Carstensb290ebe2009-01-14 14:14:06 +0100293SYSCALL_DEFINE1(acct, const char __user *, name)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700294{
Eric Paris05b90492010-04-07 15:15:25 -0400295 int error = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700296
297 if (!capable(CAP_SYS_PACCT))
298 return -EPERM;
299
300 if (name) {
Jeff Layton91a27b22012-10-10 15:25:28 -0400301 struct filename *tmp = getname(name);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500302 if (IS_ERR(tmp))
Paul McQuade46c0a8c2014-06-06 14:37:37 -0700303 return PTR_ERR(tmp);
Al Viro9df7fa12014-05-15 06:49:45 -0400304 mutex_lock(&acct_on_mutex);
Jeff Layton669abf42012-10-10 16:43:10 -0400305 error = acct_on(tmp);
Al Viro9df7fa12014-05-15 06:49:45 -0400306 mutex_unlock(&acct_on_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700307 putname(tmp);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500308 } else {
Al Viro215752f2014-08-07 06:23:41 -0400309 acct_kill(acct_get(task_active_pid_ns(current)), NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700310 }
Eric Paris05b90492010-04-07 15:15:25 -0400311
Al Viro7b7b1ac2005-11-07 17:13:39 -0500312 return error;
313}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700314
Al Viro215752f2014-08-07 06:23:41 -0400315void acct_auto_close_mnt(struct hlist_head *list)
Al Viro7b7b1ac2005-11-07 17:13:39 -0500316{
Al Viro2798d4c2014-08-07 07:04:28 -0400317 rcu_read_lock();
Al Viro215752f2014-08-07 06:23:41 -0400318 while (1) {
Al Viro2798d4c2014-08-07 07:04:28 -0400319 struct hlist_node *p = ACCESS_ONCE(list->first);
320 if (!p)
Al Viro215752f2014-08-07 06:23:41 -0400321 break;
Al Viro2798d4c2014-08-07 07:04:28 -0400322 acct_kill(__acct_get(hlist_entry(p,
Al Viro215752f2014-08-07 06:23:41 -0400323 struct bsd_acct_struct,
Al Viro1629d0e2014-08-07 08:00:52 -0400324 pin.m_list)), NULL);
Al Viro2798d4c2014-08-07 07:04:28 -0400325 rcu_read_lock();
Al Viro215752f2014-08-07 06:23:41 -0400326 }
Al Viro2798d4c2014-08-07 07:04:28 -0400327 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700328}
329
Al Viro215752f2014-08-07 06:23:41 -0400330void acct_auto_close(struct hlist_head *list)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700331{
Al Viro2798d4c2014-08-07 07:04:28 -0400332 rcu_read_lock();
Al Viro215752f2014-08-07 06:23:41 -0400333 while (1) {
Al Viro2798d4c2014-08-07 07:04:28 -0400334 struct hlist_node *p = ACCESS_ONCE(list->first);
335 if (!p)
Al Viro215752f2014-08-07 06:23:41 -0400336 break;
Al Viro2798d4c2014-08-07 07:04:28 -0400337 acct_kill(__acct_get(hlist_entry(p,
Al Viro215752f2014-08-07 06:23:41 -0400338 struct bsd_acct_struct,
Al Viro1629d0e2014-08-07 08:00:52 -0400339 pin.s_list)), NULL);
Al Viro2798d4c2014-08-07 07:04:28 -0400340 rcu_read_lock();
Al Viro215752f2014-08-07 06:23:41 -0400341 }
Al Viro2798d4c2014-08-07 07:04:28 -0400342 rcu_read_unlock();
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700343}
344
345void acct_exit_ns(struct pid_namespace *ns)
346{
Al Viro215752f2014-08-07 06:23:41 -0400347 acct_kill(acct_get(ns), NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700348}
349
350/*
351 * encode an unsigned long into a comp_t
352 *
353 * This routine has been adopted from the encode_comp_t() function in
354 * the kern_acct.c file of the FreeBSD operating system. The encoding
355 * is a 13-bit fraction with a 3-bit (base 8) exponent.
356 */
357
358#define MANTSIZE 13 /* 13 bit mantissa. */
359#define EXPSIZE 3 /* Base 8 (3 bit) exponent. */
360#define MAXFRACT ((1 << MANTSIZE) - 1) /* Maximum fractional value. */
361
362static comp_t encode_comp_t(unsigned long value)
363{
364 int exp, rnd;
365
366 exp = rnd = 0;
367 while (value > MAXFRACT) {
368 rnd = value & (1 << (EXPSIZE - 1)); /* Round up? */
369 value >>= EXPSIZE; /* Base 8 exponent == 3 bit shift. */
370 exp++;
371 }
372
373 /*
Daniel Walker6ae965c2007-10-18 03:06:04 -0700374 * If we need to round up, do it (and handle overflow correctly).
375 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700376 if (rnd && (++value > MAXFRACT)) {
377 value >>= EXPSIZE;
378 exp++;
379 }
380
381 /*
Daniel Walker6ae965c2007-10-18 03:06:04 -0700382 * Clean it up and polish it off.
383 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700384 exp <<= MANTSIZE; /* Shift the exponent into place */
385 exp += value; /* and add on the mantissa. */
386 return exp;
387}
388
389#if ACCT_VERSION==1 || ACCT_VERSION==2
390/*
391 * encode an u64 into a comp2_t (24 bits)
392 *
393 * Format: 5 bit base 2 exponent, 20 bits mantissa.
394 * The leading bit of the mantissa is not stored, but implied for
395 * non-zero exponents.
396 * Largest encodable value is 50 bits.
397 */
398
399#define MANTSIZE2 20 /* 20 bit mantissa. */
400#define EXPSIZE2 5 /* 5 bit base 2 exponent. */
401#define MAXFRACT2 ((1ul << MANTSIZE2) - 1) /* Maximum fractional value. */
402#define MAXEXP2 ((1 <<EXPSIZE2) - 1) /* Maximum exponent. */
403
404static comp2_t encode_comp2_t(u64 value)
405{
Daniel Walker6ae965c2007-10-18 03:06:04 -0700406 int exp, rnd;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700407
Daniel Walker6ae965c2007-10-18 03:06:04 -0700408 exp = (value > (MAXFRACT2>>1));
409 rnd = 0;
410 while (value > MAXFRACT2) {
411 rnd = value & 1;
412 value >>= 1;
413 exp++;
414 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700415
Daniel Walker6ae965c2007-10-18 03:06:04 -0700416 /*
417 * If we need to round up, do it (and handle overflow correctly).
418 */
419 if (rnd && (++value > MAXFRACT2)) {
420 value >>= 1;
421 exp++;
422 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700423
Daniel Walker6ae965c2007-10-18 03:06:04 -0700424 if (exp > MAXEXP2) {
425 /* Overflow. Return largest representable number instead. */
426 return (1ul << (MANTSIZE2+EXPSIZE2-1)) - 1;
427 } else {
428 return (value & (MAXFRACT2>>1)) | (exp << (MANTSIZE2-1));
429 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700430}
431#endif
432
433#if ACCT_VERSION==3
434/*
435 * encode an u64 into a 32 bit IEEE float
436 */
437static u32 encode_float(u64 value)
438{
439 unsigned exp = 190;
440 unsigned u;
441
442 if (value==0) return 0;
443 while ((s64)value > 0){
444 value <<= 1;
445 exp--;
446 }
447 u = (u32)(value >> 40) & 0x7fffffu;
448 return u | (exp << 23);
449}
450#endif
451
452/*
453 * Write an accounting entry for an exiting process
454 *
455 * The acct_process() call is the workhorse of the process
456 * accounting system. The struct acct is built here and then written
457 * into the accounting file. This function should only be called from
Ingo Molnarbcbe4a02007-11-26 21:21:49 +0100458 * do_exit() or when switching to a different output file.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700459 */
460
Al Virocdd37e22014-04-26 23:45:53 -0400461static void fill_ac(acct_t *ac)
462{
463 struct pacct_struct *pacct = &current->signal->pacct;
464 u64 elapsed, run_time;
465 struct tty_struct *tty;
466
467 /*
468 * Fill the accounting struct with the needed info as recorded
469 * by the different kernel functions.
470 */
471 memset(ac, 0, sizeof(acct_t));
472
473 ac->ac_version = ACCT_VERSION | ACCT_BYTEORDER;
474 strlcpy(ac->ac_comm, current->comm, sizeof(ac->ac_comm));
475
476 /* calculate run_time in nsec*/
477 run_time = ktime_get_ns();
478 run_time -= current->group_leader->start_time;
479 /* convert nsec -> AHZ */
480 elapsed = nsec_to_AHZ(run_time);
481#if ACCT_VERSION==3
482 ac->ac_etime = encode_float(elapsed);
483#else
484 ac->ac_etime = encode_comp_t(elapsed < (unsigned long) -1l ?
485 (unsigned long) elapsed : (unsigned long) -1l);
486#endif
487#if ACCT_VERSION==1 || ACCT_VERSION==2
488 {
489 /* new enlarged etime field */
490 comp2_t etime = encode_comp2_t(elapsed);
491 ac->ac_etime_hi = etime >> 16;
492 ac->ac_etime_lo = (u16) etime;
493 }
494#endif
495 do_div(elapsed, AHZ);
496 ac->ac_btime = get_seconds() - elapsed;
497#if ACCT_VERSION==2
498 ac->ac_ahz = AHZ;
499#endif
500
501 spin_lock_irq(&current->sighand->siglock);
502 tty = current->signal->tty; /* Safe as we hold the siglock */
503 ac->ac_tty = tty ? old_encode_dev(tty_devnum(tty)) : 0;
504 ac->ac_utime = encode_comp_t(jiffies_to_AHZ(cputime_to_jiffies(pacct->ac_utime)));
505 ac->ac_stime = encode_comp_t(jiffies_to_AHZ(cputime_to_jiffies(pacct->ac_stime)));
506 ac->ac_flag = pacct->ac_flag;
507 ac->ac_mem = encode_comp_t(pacct->ac_mem);
508 ac->ac_minflt = encode_comp_t(pacct->ac_minflt);
509 ac->ac_majflt = encode_comp_t(pacct->ac_majflt);
510 ac->ac_exitcode = pacct->ac_exitcode;
511 spin_unlock_irq(&current->sighand->siglock);
512}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700513/*
514 * do_acct_process does all actual work. Caller holds the reference to file.
515 */
Al Virob8f00e62014-08-07 07:51:03 -0400516static void do_acct_process(struct bsd_acct_struct *acct)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700517{
518 acct_t ac;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700519 unsigned long flim;
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700520 const struct cred *orig_cred;
Al Virob8f00e62014-08-07 07:51:03 -0400521 struct pid_namespace *ns = acct->ns;
522 struct file *file = acct->file;
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700523
Al Viroed447242014-04-19 14:37:20 -0400524 /*
525 * Accounting records are not subject to resource limits.
526 */
527 flim = current->signal->rlim[RLIMIT_FSIZE].rlim_cur;
528 current->signal->rlim[RLIMIT_FSIZE].rlim_cur = RLIM_INFINITY;
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700529 /* Perform file operations on behalf of whoever enabled accounting */
530 orig_cred = override_creds(file->f_cred);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700531
532 /*
533 * First check to see if there is enough free_space to continue
534 * the process accounting system.
535 */
Al Viro54a4d582014-04-19 14:24:18 -0400536 if (!check_free_space(acct))
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700537 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700538
Al Virocdd37e22014-04-26 23:45:53 -0400539 fill_ac(&ac);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700540 /* we really need to bite the bullet and change layout */
Eric W. Biedermanf8f3d4d2012-02-07 16:54:50 -0800541 ac.ac_uid = from_kuid_munged(file->f_cred->user_ns, orig_cred->uid);
542 ac.ac_gid = from_kgid_munged(file->f_cred->user_ns, orig_cred->gid);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700543#if ACCT_VERSION==1 || ACCT_VERSION==2
544 /* backward-compatible 16 bit fields */
David Howells76aac0e2008-11-14 10:39:12 +1100545 ac.ac_uid16 = ac.ac_uid;
546 ac.ac_gid16 = ac.ac_gid;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700547#endif
548#if ACCT_VERSION==3
Pavel Emelyanov5f7b7032008-03-24 12:29:53 -0700549 ac.ac_pid = task_tgid_nr_ns(current, ns);
Pavel Emelyanova846a192008-03-24 12:29:52 -0700550 rcu_read_lock();
Pavel Emelyanov5f7b7032008-03-24 12:29:53 -0700551 ac.ac_ppid = task_tgid_nr_ns(rcu_dereference(current->real_parent), ns);
Pavel Emelyanova846a192008-03-24 12:29:52 -0700552 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700553#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700554 /*
Jan Kara5ae98f12013-05-04 00:11:23 +0200555 * Get freeze protection. If the fs is frozen, just skip the write
556 * as we could deadlock the system otherwise.
557 */
Al Viroed447242014-04-19 14:37:20 -0400558 if (file_start_write_trylock(file)) {
559 /* it's been opened O_APPEND, so position is irrelevant */
560 loff_t pos = 0;
561 __kernel_write(file, (char *)&ac, sizeof(acct_t), &pos);
562 file_end_write(file);
563 }
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700564out:
Al Viroed447242014-04-19 14:37:20 -0400565 current->signal->rlim[RLIMIT_FSIZE].rlim_cur = flim;
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700566 revert_creds(orig_cred);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700567}
568
Randy Dunlap417ef532005-09-10 00:26:39 -0700569/**
KaiGai Kohei0e464812006-06-25 05:49:24 -0700570 * acct_collect - collect accounting information into pacct_struct
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700571 * @exitcode: task exit code
572 * @group_dead: not 0, if this thread is the last one in the process.
KaiGai Kohei0e464812006-06-25 05:49:24 -0700573 */
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700574void acct_collect(long exitcode, int group_dead)
KaiGai Kohei0e464812006-06-25 05:49:24 -0700575{
576 struct pacct_struct *pacct = &current->signal->pacct;
Frederic Weisbecker6fac4822012-11-13 14:20:55 +0100577 cputime_t utime, stime;
KaiGai Kohei0e464812006-06-25 05:49:24 -0700578 unsigned long vsize = 0;
579
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700580 if (group_dead && current->mm) {
KaiGai Kohei0e464812006-06-25 05:49:24 -0700581 struct vm_area_struct *vma;
582 down_read(&current->mm->mmap_sem);
583 vma = current->mm->mmap;
584 while (vma) {
585 vsize += vma->vm_end - vma->vm_start;
586 vma = vma->vm_next;
587 }
588 up_read(&current->mm->mmap_sem);
589 }
590
KaiGai Kohei77787bf2006-06-25 05:49:26 -0700591 spin_lock_irq(&current->sighand->siglock);
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700592 if (group_dead)
593 pacct->ac_mem = vsize / 1024;
594 if (thread_group_leader(current)) {
595 pacct->ac_exitcode = exitcode;
596 if (current->flags & PF_FORKNOEXEC)
597 pacct->ac_flag |= AFORK;
598 }
599 if (current->flags & PF_SUPERPRIV)
600 pacct->ac_flag |= ASU;
601 if (current->flags & PF_DUMPCORE)
602 pacct->ac_flag |= ACORE;
603 if (current->flags & PF_SIGNALED)
604 pacct->ac_flag |= AXSIG;
Frederic Weisbecker6fac4822012-11-13 14:20:55 +0100605 task_cputime(current, &utime, &stime);
606 pacct->ac_utime += utime;
607 pacct->ac_stime += stime;
KaiGai Kohei77787bf2006-06-25 05:49:26 -0700608 pacct->ac_minflt += current->min_flt;
609 pacct->ac_majflt += current->maj_flt;
610 spin_unlock_irq(&current->sighand->siglock);
KaiGai Kohei0e464812006-06-25 05:49:24 -0700611}
612
Al Viroe25ff112014-05-07 05:12:09 -0400613static void slow_acct_process(struct pid_namespace *ns)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700614{
Al Viroe25ff112014-05-07 05:12:09 -0400615 for ( ; ns; ns = ns->parent) {
Al Viro215752f2014-08-07 06:23:41 -0400616 struct bsd_acct_struct *acct = acct_get(ns);
Al Virob8f00e62014-08-07 07:51:03 -0400617 if (acct) {
618 do_acct_process(acct);
619 mutex_unlock(&acct->lock);
Al Viro1629d0e2014-08-07 08:00:52 -0400620 pin_put(&acct->pin);
Al Viroe25ff112014-05-07 05:12:09 -0400621 }
Al Viroe25ff112014-05-07 05:12:09 -0400622 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700623}
Pavel Emelyanov7d1e1352008-07-25 01:48:48 -0700624
625/**
Al Viroe25ff112014-05-07 05:12:09 -0400626 * acct_process
Pavel Emelyanov7d1e1352008-07-25 01:48:48 -0700627 *
628 * handles process accounting for an exiting task
629 */
630void acct_process(void)
631{
632 struct pid_namespace *ns;
633
Pavel Emelyanov0c18d7a2008-07-25 01:48:49 -0700634 /*
635 * This loop is safe lockless, since current is still
636 * alive and holds its namespace, which in turn holds
637 * its parent.
638 */
Al Viroe25ff112014-05-07 05:12:09 -0400639 for (ns = task_active_pid_ns(current); ns != NULL; ns = ns->parent) {
Al Virob8f00e62014-08-07 07:51:03 -0400640 if (ns->bacct)
Al Viroe25ff112014-05-07 05:12:09 -0400641 break;
642 }
643 if (unlikely(ns))
644 slow_acct_process(ns);
Pavel Emelyanov7d1e1352008-07-25 01:48:48 -0700645}