blob: 62200d799b9b0066a770ffe308a5eae2250edfd7 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * linux/kernel/acct.c
4 *
5 * BSD Process Accounting for Linux
6 *
7 * Author: Marco van Wieringen <mvw@planets.elm.net>
8 *
9 * Some code based on ideas and code from:
10 * Thomas K. Dyas <tdyas@eden.rutgers.edu>
11 *
12 * This file implements BSD-style process accounting. Whenever any
13 * process exits, an accounting record of type "struct acct" is
14 * written to the file specified with the acct() system call. It is
15 * up to user-level programs to do useful things with the accounting
16 * log. The kernel just provides the raw accounting information.
17 *
18 * (C) Copyright 1995 - 1997 Marco van Wieringen - ELM Consultancy B.V.
19 *
20 * Plugged two leaks. 1) It didn't return acct_file into the free_filps if
21 * the file happened to be read-only. 2) If the accounting was suspended
22 * due to the lack of space it happily allowed to reopen it and completely
23 * lost the old acct_file. 3/10/98, Al Viro.
24 *
25 * Now we silently close acct_file on attempt to reopen. Cleaned sys_acct().
26 * XTerms and EMACS are manifestations of pure evil. 21/10/98, AV.
27 *
Randy Dunlap7b7b8a22020-10-15 20:10:28 -070028 * Fixed a nasty interaction with sys_umount(). If the accounting
Linus Torvalds1da177e2005-04-16 15:20:36 -070029 * was suspeneded we failed to stop it on umount(). Messy.
30 * Another one: remount to readonly didn't stop accounting.
31 * Question: what should we do if we have CAP_SYS_ADMIN but not
32 * CAP_SYS_PACCT? Current code does the following: umount returns -EBUSY
33 * unless we are messing with the root. In that case we are getting a
34 * real mess with do_remount_sb(). 9/11/98, AV.
35 *
36 * Fixed a bunch of races (and pair of leaks). Probably not the best way,
37 * but this one obviously doesn't introduce deadlocks. Later. BTW, found
38 * one race (and leak) in BSD implementation.
39 * OK, that's better. ANOTHER race and leak in BSD variant. There always
40 * is one more bug... 10/11/98, AV.
41 *
42 * Oh, fsck... Oopsable SMP race in do_process_acct() - we must hold
Michel Lespinassec1e8d7c2020-06-08 21:33:54 -070043 * ->mmap_lock to walk the vma list of current->mm. Nasty, since it leaks
Linus Torvalds1da177e2005-04-16 15:20:36 -070044 * a struct file opened for write. Fixed. 2/6/2000, AV.
45 */
46
Linus Torvalds1da177e2005-04-16 15:20:36 -070047#include <linux/mm.h>
48#include <linux/slab.h>
49#include <linux/acct.h>
Randy.Dunlapc59ede72006-01-11 12:17:46 -080050#include <linux/capability.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070051#include <linux/file.h>
52#include <linux/tty.h>
53#include <linux/security.h>
54#include <linux/vfs.h>
55#include <linux/jiffies.h>
56#include <linux/times.h>
57#include <linux/syscalls.h>
Al Viro7b7b1ac2005-11-07 17:13:39 -050058#include <linux/mount.h>
Paul McQuade7153e402014-06-06 14:37:37 -070059#include <linux/uaccess.h>
Ingo Molnar32ef5512017-02-05 11:48:36 +010060#include <linux/sched/cputime.h>
61
Linus Torvalds1da177e2005-04-16 15:20:36 -070062#include <asm/div64.h>
Pavel Emelyanov5f7b7032008-03-24 12:29:53 -070063#include <linux/pid_namespace.h>
Al Viroefb170c2014-08-07 08:39:04 -040064#include <linux/fs_pin.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070065
66/*
67 * These constants control the amount of freespace that suspend and
68 * resume the process accounting system, and the time delay between
69 * each check.
70 * Turned into sysctl-controllable parameters. AV, 12/11/98
71 */
72
tangmeng801b5012022-02-18 18:59:23 +080073static int acct_parm[3] = {4, 2, 30};
Linus Torvalds1da177e2005-04-16 15:20:36 -070074#define RESUME (acct_parm[0]) /* >foo% free space - resume */
75#define SUSPEND (acct_parm[1]) /* <foo% free space - suspend */
76#define ACCT_TIMEOUT (acct_parm[2]) /* foo second timeout between checks */
77
tangmeng801b5012022-02-18 18:59:23 +080078#ifdef CONFIG_SYSCTL
79static struct ctl_table kern_acct_table[] = {
80 {
81 .procname = "acct",
82 .data = &acct_parm,
83 .maxlen = 3*sizeof(int),
84 .mode = 0644,
85 .proc_handler = proc_dointvec,
86 },
87 { }
88};
89
90static __init int kernel_acct_sysctls_init(void)
91{
92 register_sysctl_init("kernel", kern_acct_table);
93 return 0;
94}
95late_initcall(kernel_acct_sysctls_init);
96#endif /* CONFIG_SYSCTL */
97
Linus Torvalds1da177e2005-04-16 15:20:36 -070098/*
99 * External references and all of the globals.
100 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700101
Al Viro1629d0e2014-08-07 08:00:52 -0400102struct bsd_acct_struct {
103 struct fs_pin pin;
Al Viro34cece22015-01-10 12:47:38 -0500104 atomic_long_t count;
105 struct rcu_head rcu;
Al Virob8f00e62014-08-07 07:51:03 -0400106 struct mutex lock;
Al Viro32dc7302011-12-08 20:08:42 -0500107 int active;
108 unsigned long needcheck;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700109 struct file *file;
Pavel Emelyanov5f7b7032008-03-24 12:29:53 -0700110 struct pid_namespace *ns;
Al Viro17c0a5a2014-08-07 07:35:19 -0400111 struct work_struct work;
112 struct completion done;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700113};
114
Al Viro59eda0e2015-01-10 17:53:21 -0500115static void do_acct_process(struct bsd_acct_struct *acct);
116
Linus Torvalds1da177e2005-04-16 15:20:36 -0700117/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700118 * Check the amount of free space and suspend/resume accordingly.
119 */
Al Viro54a4d582014-04-19 14:24:18 -0400120static int check_free_space(struct bsd_acct_struct *acct)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700121{
122 struct kstatfs sbuf;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700123
Oleg Nesterov4d957012018-01-04 16:17:49 -0800124 if (time_is_after_jiffies(acct->needcheck))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700126
127 /* May block */
Al Viro54a4d582014-04-19 14:24:18 -0400128 if (vfs_statfs(&acct->file->f_path, &sbuf))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700129 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700130
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700131 if (acct->active) {
Al Viro54a4d582014-04-19 14:24:18 -0400132 u64 suspend = sbuf.f_blocks * SUSPEND;
133 do_div(suspend, 100);
134 if (sbuf.f_bavail <= suspend) {
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700135 acct->active = 0;
Ionut Alexa2577d922014-07-31 09:28:36 +1000136 pr_info("Process accounting paused\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700137 }
138 } else {
Al Viro54a4d582014-04-19 14:24:18 -0400139 u64 resume = sbuf.f_blocks * RESUME;
140 do_div(resume, 100);
141 if (sbuf.f_bavail >= resume) {
Pavel Emelyanov6248b1b2008-07-25 01:48:46 -0700142 acct->active = 1;
Ionut Alexa2577d922014-07-31 09:28:36 +1000143 pr_info("Process accounting resumed\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700144 }
145 }
146
Al Viro32dc7302011-12-08 20:08:42 -0500147 acct->needcheck = jiffies + ACCT_TIMEOUT*HZ;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700148out:
Al Viro54a4d582014-04-19 14:24:18 -0400149 return acct->active;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700150}
151
Al Viro9e251d02015-01-09 20:40:02 -0500152static void acct_put(struct bsd_acct_struct *p)
153{
Al Viro34cece22015-01-10 12:47:38 -0500154 if (atomic_long_dec_and_test(&p->count))
155 kfree_rcu(p, rcu);
Al Viro9e251d02015-01-09 20:40:02 -0500156}
157
Al Viro59eda0e2015-01-10 17:53:21 -0500158static inline struct bsd_acct_struct *to_acct(struct fs_pin *p)
159{
160 return p ? container_of(p, struct bsd_acct_struct, pin) : NULL;
161}
162
Al Viro215752f2014-08-07 06:23:41 -0400163static struct bsd_acct_struct *acct_get(struct pid_namespace *ns)
Al Virob8f00e62014-08-07 07:51:03 -0400164{
165 struct bsd_acct_struct *res;
Al Virob8f00e62014-08-07 07:51:03 -0400166again:
Al Viro2798d4c2014-08-07 07:04:28 -0400167 smp_rmb();
168 rcu_read_lock();
Mark Rutland6aa7de02017-10-23 14:07:29 -0700169 res = to_acct(READ_ONCE(ns->bacct));
Al Viro2798d4c2014-08-07 07:04:28 -0400170 if (!res) {
171 rcu_read_unlock();
Al Viro215752f2014-08-07 06:23:41 -0400172 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700173 }
Al Viro34cece22015-01-10 12:47:38 -0500174 if (!atomic_long_inc_not_zero(&res->count)) {
Al Viroefb170c2014-08-07 08:39:04 -0400175 rcu_read_unlock();
176 cpu_relax();
Al Viro215752f2014-08-07 06:23:41 -0400177 goto again;
Al Viroefb170c2014-08-07 08:39:04 -0400178 }
179 rcu_read_unlock();
180 mutex_lock(&res->lock);
Mark Rutland6aa7de02017-10-23 14:07:29 -0700181 if (res != to_acct(READ_ONCE(ns->bacct))) {
Al Viroefb170c2014-08-07 08:39:04 -0400182 mutex_unlock(&res->lock);
Al Viro9e251d02015-01-09 20:40:02 -0500183 acct_put(res);
Al Viroefb170c2014-08-07 08:39:04 -0400184 goto again;
185 }
Al Virob8f00e62014-08-07 07:51:03 -0400186 return res;
187}
188
Al Viro59eda0e2015-01-10 17:53:21 -0500189static void acct_pin_kill(struct fs_pin *pin)
190{
191 struct bsd_acct_struct *acct = to_acct(pin);
192 mutex_lock(&acct->lock);
193 do_acct_process(acct);
194 schedule_work(&acct->work);
195 wait_for_completion(&acct->done);
196 cmpxchg(&acct->ns->bacct, pin, NULL);
197 mutex_unlock(&acct->lock);
198 pin_remove(pin);
199 acct_put(acct);
200}
201
Al Viro17c0a5a2014-08-07 07:35:19 -0400202static void close_work(struct work_struct *work)
203{
204 struct bsd_acct_struct *acct = container_of(work, struct bsd_acct_struct, work);
205 struct file *file = acct->file;
Al Viro17c0a5a2014-08-07 07:35:19 -0400206 if (file->f_op->flush)
207 file->f_op->flush(file, NULL);
208 __fput_sync(file);
209 complete(&acct->done);
210}
211
Jeff Layton669abf42012-10-10 16:43:10 -0400212static int acct_on(struct filename *pathname)
Al Viro7b7b1ac2005-11-07 17:13:39 -0500213{
214 struct file *file;
Al Viro3064c352014-08-07 09:12:31 -0400215 struct vfsmount *mnt, *internal;
Al Virob8f00e62014-08-07 07:51:03 -0400216 struct pid_namespace *ns = task_active_pid_ns(current);
Al Viro59eda0e2015-01-10 17:53:21 -0500217 struct bsd_acct_struct *acct;
218 struct fs_pin *old;
Al Viro3064c352014-08-07 09:12:31 -0400219 int err;
Al Virob8f00e62014-08-07 07:51:03 -0400220
221 acct = kzalloc(sizeof(struct bsd_acct_struct), GFP_KERNEL);
222 if (!acct)
223 return -ENOMEM;
Al Viro7b7b1ac2005-11-07 17:13:39 -0500224
225 /* Difference from BSD - they don't do O_APPEND */
Jeff Layton669abf42012-10-10 16:43:10 -0400226 file = file_open_name(pathname, O_WRONLY|O_APPEND|O_LARGEFILE, 0);
Al Virob8f00e62014-08-07 07:51:03 -0400227 if (IS_ERR(file)) {
228 kfree(acct);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500229 return PTR_ERR(file);
Al Virob8f00e62014-08-07 07:51:03 -0400230 }
Al Viro7b7b1ac2005-11-07 17:13:39 -0500231
Al Viro496ad9a2013-01-23 17:07:38 -0500232 if (!S_ISREG(file_inode(file)->i_mode)) {
Al Virob8f00e62014-08-07 07:51:03 -0400233 kfree(acct);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500234 filp_close(file, NULL);
235 return -EACCES;
236 }
237
Al Virod0f88f82015-03-31 12:30:48 -0400238 if (!(file->f_mode & FMODE_CAN_WRITE)) {
Al Virob8f00e62014-08-07 07:51:03 -0400239 kfree(acct);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500240 filp_close(file, NULL);
241 return -EIO;
242 }
Al Viro3064c352014-08-07 09:12:31 -0400243 internal = mnt_clone_internal(&file->f_path);
244 if (IS_ERR(internal)) {
245 kfree(acct);
246 filp_close(file, NULL);
247 return PTR_ERR(internal);
248 }
Al Viro9419a312019-04-04 21:04:13 -0400249 err = __mnt_want_write(internal);
Al Viro3064c352014-08-07 09:12:31 -0400250 if (err) {
251 mntput(internal);
252 kfree(acct);
253 filp_close(file, NULL);
254 return err;
255 }
256 mnt = file->f_path.mnt;
257 file->f_path.mnt = internal;
Al Viro7b7b1ac2005-11-07 17:13:39 -0500258
Al Viro34cece22015-01-10 12:47:38 -0500259 atomic_long_set(&acct->count, 1);
Al Viro59eda0e2015-01-10 17:53:21 -0500260 init_fs_pin(&acct->pin, acct_pin_kill);
Al Virob8f00e62014-08-07 07:51:03 -0400261 acct->file = file;
262 acct->needcheck = jiffies;
263 acct->ns = ns;
264 mutex_init(&acct->lock);
Al Viro59eda0e2015-01-10 17:53:21 -0500265 INIT_WORK(&acct->work, close_work);
266 init_completion(&acct->done);
Al Viroefb170c2014-08-07 08:39:04 -0400267 mutex_lock_nested(&acct->lock, 1); /* nobody has seen it yet */
268 pin_insert(&acct->pin, mnt);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500269
Al Viro59eda0e2015-01-10 17:53:21 -0500270 rcu_read_lock();
271 old = xchg(&ns->bacct, &acct->pin);
Al Viroefb170c2014-08-07 08:39:04 -0400272 mutex_unlock(&acct->lock);
Al Viro59eda0e2015-01-10 17:53:21 -0500273 pin_kill(old);
Al Viro9419a312019-04-04 21:04:13 -0400274 __mnt_drop_write(mnt);
Al Viro3064c352014-08-07 09:12:31 -0400275 mntput(mnt);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500276 return 0;
277}
278
Al Viro9df7fa12014-05-15 06:49:45 -0400279static DEFINE_MUTEX(acct_on_mutex);
280
Randy Dunlap417ef532005-09-10 00:26:39 -0700281/**
282 * sys_acct - enable/disable process accounting
283 * @name: file name for accounting records or NULL to shutdown accounting
284 *
Randy Dunlap417ef532005-09-10 00:26:39 -0700285 * sys_acct() is the only system call needed to implement process
286 * accounting. It takes the name of the file where accounting records
287 * should be written. If the filename is NULL, accounting will be
288 * shutdown.
Randy Dunlapb7621eb2020-10-15 20:10:31 -0700289 *
290 * Returns: 0 for success or negative errno values for failure.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700291 */
Heiko Carstensb290ebe2009-01-14 14:14:06 +0100292SYSCALL_DEFINE1(acct, const char __user *, name)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700293{
Eric Paris05b90492010-04-07 15:15:25 -0400294 int error = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700295
296 if (!capable(CAP_SYS_PACCT))
297 return -EPERM;
298
299 if (name) {
Jeff Layton91a27b22012-10-10 15:25:28 -0400300 struct filename *tmp = getname(name);
Ionut Alexa2577d922014-07-31 09:28:36 +1000301
Al Viro7b7b1ac2005-11-07 17:13:39 -0500302 if (IS_ERR(tmp))
Paul McQuade46c0a8c2014-06-06 14:37:37 -0700303 return PTR_ERR(tmp);
Al Viro9df7fa12014-05-15 06:49:45 -0400304 mutex_lock(&acct_on_mutex);
Jeff Layton669abf42012-10-10 16:43:10 -0400305 error = acct_on(tmp);
Al Viro9df7fa12014-05-15 06:49:45 -0400306 mutex_unlock(&acct_on_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700307 putname(tmp);
Al Viro7b7b1ac2005-11-07 17:13:39 -0500308 } else {
Al Viro59eda0e2015-01-10 17:53:21 -0500309 rcu_read_lock();
310 pin_kill(task_active_pid_ns(current)->bacct);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700311 }
Eric Paris05b90492010-04-07 15:15:25 -0400312
Al Viro7b7b1ac2005-11-07 17:13:39 -0500313 return error;
314}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700315
Pavel Emelyanov0b6b0302008-07-25 01:48:47 -0700316void acct_exit_ns(struct pid_namespace *ns)
317{
Al Viro59eda0e2015-01-10 17:53:21 -0500318 rcu_read_lock();
319 pin_kill(ns->bacct);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700320}
321
322/*
323 * encode an unsigned long into a comp_t
324 *
325 * This routine has been adopted from the encode_comp_t() function in
326 * the kern_acct.c file of the FreeBSD operating system. The encoding
327 * is a 13-bit fraction with a 3-bit (base 8) exponent.
328 */
329
330#define MANTSIZE 13 /* 13 bit mantissa. */
331#define EXPSIZE 3 /* Base 8 (3 bit) exponent. */
332#define MAXFRACT ((1 << MANTSIZE) - 1) /* Maximum fractional value. */
333
334static comp_t encode_comp_t(unsigned long value)
335{
336 int exp, rnd;
337
338 exp = rnd = 0;
339 while (value > MAXFRACT) {
340 rnd = value & (1 << (EXPSIZE - 1)); /* Round up? */
341 value >>= EXPSIZE; /* Base 8 exponent == 3 bit shift. */
342 exp++;
343 }
344
345 /*
Daniel Walker6ae965c2007-10-18 03:06:04 -0700346 * If we need to round up, do it (and handle overflow correctly).
347 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700348 if (rnd && (++value > MAXFRACT)) {
349 value >>= EXPSIZE;
350 exp++;
351 }
352
353 /*
Daniel Walker6ae965c2007-10-18 03:06:04 -0700354 * Clean it up and polish it off.
355 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700356 exp <<= MANTSIZE; /* Shift the exponent into place */
357 exp += value; /* and add on the mantissa. */
358 return exp;
359}
360
Ionut Alexa2577d922014-07-31 09:28:36 +1000361#if ACCT_VERSION == 1 || ACCT_VERSION == 2
Linus Torvalds1da177e2005-04-16 15:20:36 -0700362/*
363 * encode an u64 into a comp2_t (24 bits)
364 *
365 * Format: 5 bit base 2 exponent, 20 bits mantissa.
366 * The leading bit of the mantissa is not stored, but implied for
367 * non-zero exponents.
368 * Largest encodable value is 50 bits.
369 */
370
371#define MANTSIZE2 20 /* 20 bit mantissa. */
372#define EXPSIZE2 5 /* 5 bit base 2 exponent. */
373#define MAXFRACT2 ((1ul << MANTSIZE2) - 1) /* Maximum fractional value. */
Ionut Alexa2577d922014-07-31 09:28:36 +1000374#define MAXEXP2 ((1 << EXPSIZE2) - 1) /* Maximum exponent. */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700375
376static comp2_t encode_comp2_t(u64 value)
377{
Daniel Walker6ae965c2007-10-18 03:06:04 -0700378 int exp, rnd;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700379
Daniel Walker6ae965c2007-10-18 03:06:04 -0700380 exp = (value > (MAXFRACT2>>1));
381 rnd = 0;
382 while (value > MAXFRACT2) {
383 rnd = value & 1;
384 value >>= 1;
385 exp++;
386 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700387
Daniel Walker6ae965c2007-10-18 03:06:04 -0700388 /*
389 * If we need to round up, do it (and handle overflow correctly).
390 */
391 if (rnd && (++value > MAXFRACT2)) {
392 value >>= 1;
393 exp++;
394 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700395
Daniel Walker6ae965c2007-10-18 03:06:04 -0700396 if (exp > MAXEXP2) {
397 /* Overflow. Return largest representable number instead. */
398 return (1ul << (MANTSIZE2+EXPSIZE2-1)) - 1;
399 } else {
400 return (value & (MAXFRACT2>>1)) | (exp << (MANTSIZE2-1));
401 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700402}
Hui Su35189b82020-12-15 20:42:52 -0800403#elif ACCT_VERSION == 3
Linus Torvalds1da177e2005-04-16 15:20:36 -0700404/*
405 * encode an u64 into a 32 bit IEEE float
406 */
407static u32 encode_float(u64 value)
408{
409 unsigned exp = 190;
410 unsigned u;
411
Ionut Alexa2577d922014-07-31 09:28:36 +1000412 if (value == 0)
413 return 0;
414 while ((s64)value > 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700415 value <<= 1;
416 exp--;
417 }
418 u = (u32)(value >> 40) & 0x7fffffu;
419 return u | (exp << 23);
420}
421#endif
422
423/*
424 * Write an accounting entry for an exiting process
425 *
426 * The acct_process() call is the workhorse of the process
427 * accounting system. The struct acct is built here and then written
428 * into the accounting file. This function should only be called from
Ingo Molnarbcbe4a02007-11-26 21:21:49 +0100429 * do_exit() or when switching to a different output file.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700430 */
431
Al Virocdd37e22014-04-26 23:45:53 -0400432static void fill_ac(acct_t *ac)
433{
434 struct pacct_struct *pacct = &current->signal->pacct;
435 u64 elapsed, run_time;
Arnd Bergmann2d602bf2019-10-24 16:34:25 +0200436 time64_t btime;
Al Virocdd37e22014-04-26 23:45:53 -0400437 struct tty_struct *tty;
438
439 /*
440 * Fill the accounting struct with the needed info as recorded
441 * by the different kernel functions.
442 */
443 memset(ac, 0, sizeof(acct_t));
444
445 ac->ac_version = ACCT_VERSION | ACCT_BYTEORDER;
446 strlcpy(ac->ac_comm, current->comm, sizeof(ac->ac_comm));
447
448 /* calculate run_time in nsec*/
449 run_time = ktime_get_ns();
450 run_time -= current->group_leader->start_time;
451 /* convert nsec -> AHZ */
452 elapsed = nsec_to_AHZ(run_time);
Ionut Alexa2577d922014-07-31 09:28:36 +1000453#if ACCT_VERSION == 3
Al Virocdd37e22014-04-26 23:45:53 -0400454 ac->ac_etime = encode_float(elapsed);
455#else
456 ac->ac_etime = encode_comp_t(elapsed < (unsigned long) -1l ?
Ionut Alexa2577d922014-07-31 09:28:36 +1000457 (unsigned long) elapsed : (unsigned long) -1l);
Al Virocdd37e22014-04-26 23:45:53 -0400458#endif
Ionut Alexa2577d922014-07-31 09:28:36 +1000459#if ACCT_VERSION == 1 || ACCT_VERSION == 2
Al Virocdd37e22014-04-26 23:45:53 -0400460 {
461 /* new enlarged etime field */
462 comp2_t etime = encode_comp2_t(elapsed);
Ionut Alexa2577d922014-07-31 09:28:36 +1000463
Al Virocdd37e22014-04-26 23:45:53 -0400464 ac->ac_etime_hi = etime >> 16;
465 ac->ac_etime_lo = (u16) etime;
466 }
467#endif
468 do_div(elapsed, AHZ);
Arnd Bergmann2d602bf2019-10-24 16:34:25 +0200469 btime = ktime_get_real_seconds() - elapsed;
470 ac->ac_btime = clamp_t(time64_t, btime, 0, U32_MAX);
Al Virocdd37e22014-04-26 23:45:53 -0400471#if ACCT_VERSION==2
472 ac->ac_ahz = AHZ;
473#endif
474
475 spin_lock_irq(&current->sighand->siglock);
476 tty = current->signal->tty; /* Safe as we hold the siglock */
477 ac->ac_tty = tty ? old_encode_dev(tty_devnum(tty)) : 0;
Frederic Weisbeckerd4bc42a2017-01-31 04:09:28 +0100478 ac->ac_utime = encode_comp_t(nsec_to_AHZ(pacct->ac_utime));
479 ac->ac_stime = encode_comp_t(nsec_to_AHZ(pacct->ac_stime));
Al Virocdd37e22014-04-26 23:45:53 -0400480 ac->ac_flag = pacct->ac_flag;
481 ac->ac_mem = encode_comp_t(pacct->ac_mem);
482 ac->ac_minflt = encode_comp_t(pacct->ac_minflt);
483 ac->ac_majflt = encode_comp_t(pacct->ac_majflt);
484 ac->ac_exitcode = pacct->ac_exitcode;
485 spin_unlock_irq(&current->sighand->siglock);
486}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700487/*
488 * do_acct_process does all actual work. Caller holds the reference to file.
489 */
Al Virob8f00e62014-08-07 07:51:03 -0400490static void do_acct_process(struct bsd_acct_struct *acct)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700491{
492 acct_t ac;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700493 unsigned long flim;
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700494 const struct cred *orig_cred;
Al Virob8f00e62014-08-07 07:51:03 -0400495 struct file *file = acct->file;
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700496
Al Viroed447242014-04-19 14:37:20 -0400497 /*
498 * Accounting records are not subject to resource limits.
499 */
Yang Yang3c91dda2021-09-07 19:58:18 -0700500 flim = rlimit(RLIMIT_FSIZE);
Al Viroed447242014-04-19 14:37:20 -0400501 current->signal->rlim[RLIMIT_FSIZE].rlim_cur = RLIM_INFINITY;
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700502 /* Perform file operations on behalf of whoever enabled accounting */
503 orig_cred = override_creds(file->f_cred);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700504
505 /*
506 * First check to see if there is enough free_space to continue
507 * the process accounting system.
508 */
Al Viro54a4d582014-04-19 14:24:18 -0400509 if (!check_free_space(acct))
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700510 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700511
Al Virocdd37e22014-04-26 23:45:53 -0400512 fill_ac(&ac);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700513 /* we really need to bite the bullet and change layout */
Eric W. Biedermanf8f3d4d2012-02-07 16:54:50 -0800514 ac.ac_uid = from_kuid_munged(file->f_cred->user_ns, orig_cred->uid);
515 ac.ac_gid = from_kgid_munged(file->f_cred->user_ns, orig_cred->gid);
Ionut Alexa2577d922014-07-31 09:28:36 +1000516#if ACCT_VERSION == 1 || ACCT_VERSION == 2
Linus Torvalds1da177e2005-04-16 15:20:36 -0700517 /* backward-compatible 16 bit fields */
David Howells76aac0e2008-11-14 10:39:12 +1100518 ac.ac_uid16 = ac.ac_uid;
519 ac.ac_gid16 = ac.ac_gid;
Hui Su35189b82020-12-15 20:42:52 -0800520#elif ACCT_VERSION == 3
Ying Xue067b7222014-10-09 15:30:21 -0700521 {
522 struct pid_namespace *ns = acct->ns;
523
524 ac.ac_pid = task_tgid_nr_ns(current, ns);
525 rcu_read_lock();
526 ac.ac_ppid = task_tgid_nr_ns(rcu_dereference(current->real_parent),
527 ns);
528 rcu_read_unlock();
529 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700530#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700531 /*
Jan Kara5ae98f12013-05-04 00:11:23 +0200532 * Get freeze protection. If the fs is frozen, just skip the write
533 * as we could deadlock the system otherwise.
534 */
Al Viroed447242014-04-19 14:37:20 -0400535 if (file_start_write_trylock(file)) {
536 /* it's been opened O_APPEND, so position is irrelevant */
537 loff_t pos = 0;
Christoph Hellwig73e18f72017-09-01 17:39:15 +0200538 __kernel_write(file, &ac, sizeof(acct_t), &pos);
Al Viroed447242014-04-19 14:37:20 -0400539 file_end_write(file);
540 }
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700541out:
Al Viroed447242014-04-19 14:37:20 -0400542 current->signal->rlim[RLIMIT_FSIZE].rlim_cur = flim;
Michal Schmidtd8e180d2009-08-20 14:39:52 -0700543 revert_creds(orig_cred);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700544}
545
Randy Dunlap417ef532005-09-10 00:26:39 -0700546/**
KaiGai Kohei0e464812006-06-25 05:49:24 -0700547 * acct_collect - collect accounting information into pacct_struct
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700548 * @exitcode: task exit code
549 * @group_dead: not 0, if this thread is the last one in the process.
KaiGai Kohei0e464812006-06-25 05:49:24 -0700550 */
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700551void acct_collect(long exitcode, int group_dead)
KaiGai Kohei0e464812006-06-25 05:49:24 -0700552{
553 struct pacct_struct *pacct = &current->signal->pacct;
Frederic Weisbeckerd4bc42a2017-01-31 04:09:28 +0100554 u64 utime, stime;
KaiGai Kohei0e464812006-06-25 05:49:24 -0700555 unsigned long vsize = 0;
556
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700557 if (group_dead && current->mm) {
Matthew Wilcox (Oracle)160c8202022-09-06 19:48:58 +0000558 struct mm_struct *mm = current->mm;
559 VMA_ITERATOR(vmi, mm, 0);
KaiGai Kohei0e464812006-06-25 05:49:24 -0700560 struct vm_area_struct *vma;
Ionut Alexa2577d922014-07-31 09:28:36 +1000561
Matthew Wilcox (Oracle)160c8202022-09-06 19:48:58 +0000562 mmap_read_lock(mm);
563 for_each_vma(vmi, vma)
KaiGai Kohei0e464812006-06-25 05:49:24 -0700564 vsize += vma->vm_end - vma->vm_start;
Matthew Wilcox (Oracle)160c8202022-09-06 19:48:58 +0000565 mmap_read_unlock(mm);
KaiGai Kohei0e464812006-06-25 05:49:24 -0700566 }
567
KaiGai Kohei77787bf2006-06-25 05:49:26 -0700568 spin_lock_irq(&current->sighand->siglock);
KaiGai Koheif6ec29a2006-06-25 05:49:25 -0700569 if (group_dead)
570 pacct->ac_mem = vsize / 1024;
571 if (thread_group_leader(current)) {
572 pacct->ac_exitcode = exitcode;
573 if (current->flags & PF_FORKNOEXEC)
574 pacct->ac_flag |= AFORK;
575 }
576 if (current->flags & PF_SUPERPRIV)
577 pacct->ac_flag |= ASU;
578 if (current->flags & PF_DUMPCORE)
579 pacct->ac_flag |= ACORE;
580 if (current->flags & PF_SIGNALED)
581 pacct->ac_flag |= AXSIG;
Frederic Weisbeckerd4bc42a2017-01-31 04:09:28 +0100582
583 task_cputime(current, &utime, &stime);
Frederic Weisbecker6fac4822012-11-13 14:20:55 +0100584 pacct->ac_utime += utime;
585 pacct->ac_stime += stime;
KaiGai Kohei77787bf2006-06-25 05:49:26 -0700586 pacct->ac_minflt += current->min_flt;
587 pacct->ac_majflt += current->maj_flt;
588 spin_unlock_irq(&current->sighand->siglock);
KaiGai Kohei0e464812006-06-25 05:49:24 -0700589}
590
Al Viroe25ff112014-05-07 05:12:09 -0400591static void slow_acct_process(struct pid_namespace *ns)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700592{
Al Viroe25ff112014-05-07 05:12:09 -0400593 for ( ; ns; ns = ns->parent) {
Al Viro215752f2014-08-07 06:23:41 -0400594 struct bsd_acct_struct *acct = acct_get(ns);
Al Virob8f00e62014-08-07 07:51:03 -0400595 if (acct) {
596 do_acct_process(acct);
597 mutex_unlock(&acct->lock);
Al Viro9e251d02015-01-09 20:40:02 -0500598 acct_put(acct);
Al Viroe25ff112014-05-07 05:12:09 -0400599 }
Al Viroe25ff112014-05-07 05:12:09 -0400600 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700601}
Pavel Emelyanov7d1e1352008-07-25 01:48:48 -0700602
603/**
Randy Dunlapb7621eb2020-10-15 20:10:31 -0700604 * acct_process - handles process accounting for an exiting task
Pavel Emelyanov7d1e1352008-07-25 01:48:48 -0700605 */
606void acct_process(void)
607{
608 struct pid_namespace *ns;
609
Pavel Emelyanov0c18d7a2008-07-25 01:48:49 -0700610 /*
611 * This loop is safe lockless, since current is still
612 * alive and holds its namespace, which in turn holds
613 * its parent.
614 */
Al Viroe25ff112014-05-07 05:12:09 -0400615 for (ns = task_active_pid_ns(current); ns != NULL; ns = ns->parent) {
Al Virob8f00e62014-08-07 07:51:03 -0400616 if (ns->bacct)
Al Viroe25ff112014-05-07 05:12:09 -0400617 break;
618 }
619 if (unlikely(ns))
620 slow_acct_process(ns);
Pavel Emelyanov7d1e1352008-07-25 01:48:48 -0700621}