summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authortrasz <trasz@FreeBSD.org>2011-03-29 18:44:07 +0000
committertrasz <trasz@FreeBSD.org>2011-03-29 18:44:07 +0000
commit1a5143a0f73e77c0829a6cd66ecdd68aa778be36 (patch)
tree46ee461048f4c254f7f40a47e03a8170108a8e3d
parent02c98d7ccf020f4163431cf36a27464472bb66f6 (diff)
downloadFreeBSD-src-1a5143a0f73e77c0829a6cd66ecdd68aa778be36.zip
FreeBSD-src-1a5143a0f73e77c0829a6cd66ecdd68aa778be36.tar.gz
Revert file added in a wrong place by mistake. D'oh.
-rw-r--r--kern_racct.c842
1 files changed, 0 insertions, 842 deletions
diff --git a/kern_racct.c b/kern_racct.c
deleted file mode 100644
index 229977a..0000000
--- a/kern_racct.c
+++ /dev/null
@@ -1,842 +0,0 @@
-/*-
- * Copyright (c) 2010 The FreeBSD Foundation
- * All rights reserved.
- *
- * This software was developed by Edward Tomasz Napierala under sponsorship
- * from the FreeBSD Foundation.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- *
- * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- *
- * $FreeBSD$
- */
-
-#include <sys/cdefs.h>
-__FBSDID("$FreeBSD$");
-
-#include "opt_kdtrace.h"
-
-#include <sys/param.h>
-#include <sys/eventhandler.h>
-#include <sys/param.h>
-#include <sys/jail.h>
-#include <sys/kernel.h>
-#include <sys/kthread.h>
-#include <sys/lock.h>
-#include <sys/loginclass.h>
-#include <sys/malloc.h>
-#include <sys/mutex.h>
-#include <sys/proc.h>
-#include <sys/racct.h>
-#include <sys/resourcevar.h>
-#include <sys/sbuf.h>
-#include <sys/sched.h>
-#include <sys/sdt.h>
-#include <sys/sx.h>
-#include <sys/sysent.h>
-#include <sys/sysproto.h>
-#include <sys/systm.h>
-#include <sys/umtx.h>
-
-#ifdef RCTL
-#include <sys/rctl.h>
-#endif
-
-#ifdef RACCT
-
-FEATURE(racct, "Resource Accounting");
-
-static struct mtx racct_lock;
-MTX_SYSINIT(racct_lock, &racct_lock, "racct lock", MTX_DEF);
-
-static uma_zone_t racct_zone;
-
-static void racct_sub_racct(struct racct *dest, const struct racct *src);
-static void racct_sub_cred_locked(struct ucred *cred, int resource,
- uint64_t amount);
-static void racct_add_cred_locked(struct ucred *cred, int resource,
- uint64_t amount);
-
-SDT_PROVIDER_DEFINE(racct);
-SDT_PROBE_DEFINE3(racct, kernel, rusage, add, add, "struct proc *", "int",
- "uint64_t");
-SDT_PROBE_DEFINE3(racct, kernel, rusage, add_failure, add-failure,
- "struct proc *", "int", "uint64_t");
-SDT_PROBE_DEFINE3(racct, kernel, rusage, add_cred, add-cred, "struct ucred *",
- "int", "uint64_t");
-SDT_PROBE_DEFINE3(racct, kernel, rusage, add_force, add-force, "struct proc *",
- "int", "uint64_t");
-SDT_PROBE_DEFINE3(racct, kernel, rusage, set, set, "struct proc *", "int",
- "uint64_t");
-SDT_PROBE_DEFINE3(racct, kernel, rusage, set_failure, set-failure,
- "struct proc *", "int", "uint64_t");
-SDT_PROBE_DEFINE3(racct, kernel, rusage, sub, sub, "struct proc *", "int",
- "uint64_t");
-SDT_PROBE_DEFINE3(racct, kernel, rusage, sub_cred, sub-cred, "struct ucred *",
- "int", "uint64_t");
-SDT_PROBE_DEFINE1(racct, kernel, racct, create, create, "struct racct *");
-SDT_PROBE_DEFINE1(racct, kernel, racct, destroy, destroy, "struct racct *");
-SDT_PROBE_DEFINE2(racct, kernel, racct, join, join, "struct racct *",
- "struct racct *");
-SDT_PROBE_DEFINE2(racct, kernel, racct, join_failure, join-failure,
- "struct racct *", "struct racct *");
-SDT_PROBE_DEFINE2(racct, kernel, racct, leave, leave, "struct racct *",
- "struct racct *");
-
-int racct_types[] = {
- [RACCT_CPU] =
- RACCT_IN_THOUSANDS,
- [RACCT_FSIZE] =
- RACCT_RECLAIMABLE | RACCT_INHERITABLE | RACCT_DENIABLE,
- [RACCT_DATA] =
- RACCT_RECLAIMABLE | RACCT_INHERITABLE | RACCT_DENIABLE,
- [RACCT_STACK] =
- RACCT_RECLAIMABLE | RACCT_INHERITABLE | RACCT_DENIABLE,
- [RACCT_CORE] =
- RACCT_DENIABLE,
- [RACCT_RSS] =
- RACCT_RECLAIMABLE,
- [RACCT_MEMLOCK] =
- RACCT_RECLAIMABLE | RACCT_DENIABLE,
- [RACCT_NPROC] =
- RACCT_RECLAIMABLE | RACCT_DENIABLE,
- [RACCT_NOFILE] =
- RACCT_RECLAIMABLE | RACCT_INHERITABLE | RACCT_DENIABLE,
- [RACCT_SBSIZE] =
- RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
- [RACCT_VMEM] =
- RACCT_RECLAIMABLE | RACCT_INHERITABLE | RACCT_DENIABLE,
- [RACCT_NPTS] =
- RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
- [RACCT_SWAP] =
- RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
- [RACCT_NTHR] =
- RACCT_RECLAIMABLE | RACCT_DENIABLE,
- [RACCT_MSGQQUEUED] =
- RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
- [RACCT_MSGQSIZE] =
- RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
- [RACCT_NMSGQ] =
- RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
- [RACCT_NSEM] =
- RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
- [RACCT_NSEMOP] =
- RACCT_RECLAIMABLE | RACCT_INHERITABLE | RACCT_DENIABLE,
- [RACCT_NSHM] =
- RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
- [RACCT_SHMSIZE] =
- RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
- [RACCT_WALLCLOCK] =
- RACCT_IN_THOUSANDS };
-
-static void
-racct_add_racct(struct racct *dest, const struct racct *src)
-{
- int i;
-
- mtx_assert(&racct_lock, MA_OWNED);
-
- /*
- * Update resource usage in dest.
- */
- for (i = 0; i <= RACCT_MAX; i++) {
- KASSERT(dest->r_resources[i] >= 0,
- ("racct propagation meltdown: dest < 0"));
- KASSERT(src->r_resources[i] >= 0,
- ("racct propagation meltdown: src < 0"));
- dest->r_resources[i] += src->r_resources[i];
- }
-}
-
-static void
-racct_sub_racct(struct racct *dest, const struct racct *src)
-{
- int i;
-
- mtx_assert(&racct_lock, MA_OWNED);
-
- /*
- * Update resource usage in dest.
- */
- for (i = 0; i <= RACCT_MAX; i++) {
- if (!racct_is_sloppy(i) &&
- !racct_is_dampened(i)) {
- KASSERT(dest->r_resources[i] >= 0,
- ("racct propagation meltdown: dest < 0"));
- KASSERT(src->r_resources[i] >= 0,
- ("racct propagation meltdown: src < 0"));
- KASSERT(src->r_resources[i] <= dest->r_resources[i],
- ("racct propagation meltdown: src > dest"));
- }
- if (racct_is_reclaimable(i)) {
- dest->r_resources[i] -= src->r_resources[i];
- if (dest->r_resources[i] < 0) {
- KASSERT(racct_is_sloppy(i) ||
- racct_is_dampened(i),
- ("racct_sub_racct: usage < 0"));
- dest->r_resources[i] = 0;
- }
- }
- }
-}
-
-void
-racct_create(struct racct **racctp)
-{
-
- SDT_PROBE(racct, kernel, racct, create, racctp, 0, 0, 0, 0);
-
- KASSERT(*racctp == NULL, ("racct already allocated"));
-
- *racctp = uma_zalloc(racct_zone, M_WAITOK | M_ZERO);
-}
-
-static void
-racct_destroy_locked(struct racct **racctp)
-{
- int i;
- struct racct *racct;
-
- SDT_PROBE(racct, kernel, racct, destroy, racctp, 0, 0, 0, 0);
-
- mtx_assert(&racct_lock, MA_OWNED);
- KASSERT(racctp != NULL, ("NULL racctp"));
- KASSERT(*racctp != NULL, ("NULL racct"));
-
- racct = *racctp;
-
- for (i = 0; i <= RACCT_MAX; i++) {
- if (racct_is_sloppy(i))
- continue;
- if (!racct_is_reclaimable(i))
- continue;
- if (racct_is_dampened(i))
- continue;
- KASSERT(racct->r_resources[i] == 0,
- ("destroying non-empty racct: "
- "%ju allocated for resource %d\n",
- racct->r_resources[i], i));
- }
- uma_zfree(racct_zone, racct);
- *racctp = NULL;
-}
-
-void
-racct_destroy(struct racct **racct)
-{
-
- mtx_lock(&racct_lock);
- racct_destroy_locked(racct);
- mtx_unlock(&racct_lock);
-}
-
-/*
- * Increase consumption of 'resource' by 'amount' for 'racct'
- * and all its parents. Differently from other cases, 'amount' here
- * may be less than zero.
- */
-static void
-racct_alloc_resource(struct racct *racct, int resource,
- uint64_t amount)
-{
-
- mtx_assert(&racct_lock, MA_OWNED);
- KASSERT(racct != NULL, ("NULL racct"));
-
- racct->r_resources[resource] += amount;
- if (racct->r_resources[resource] < 0) {
- KASSERT(racct_is_sloppy(resource) ||
- racct_is_dampened(resource),
- ("racct_alloc_resource: usage < 0"));
- racct->r_resources[resource] = 0;
- }
-}
-
-/*
- * Increase allocation of 'resource' by 'amount' for process 'p'.
- * Return 0 if it's below limits, or errno, if it's not.
- */
-int
-racct_add(struct proc *p, int resource, uint64_t amount)
-{
-#ifdef RCTL
- int error;
-#endif
-
- if (p->p_flag & P_SYSTEM)
- return (0);
-
- SDT_PROBE(racct, kernel, rusage, add, p, resource, amount, 0, 0);
-
- /*
- * We need proc lock to dereference p->p_ucred.
- */
- PROC_LOCK_ASSERT(p, MA_OWNED);
- KASSERT(amount >= 0, ("racct_add: invalid amount for resource %d: %ju",
- resource, amount));
-
- mtx_lock(&racct_lock);
-#ifdef RCTL
- error = rctl_enforce(p, resource, amount);
- if (error && racct_is_deniable(resource)) {
- SDT_PROBE(racct, kernel, rusage, add_failure, p, resource,
- amount, 0, 0);
- mtx_unlock(&racct_lock);
- return (error);
- }
-#endif
- racct_alloc_resource(p->p_racct, resource, amount);
- racct_add_cred_locked(p->p_ucred, resource, amount);
- mtx_unlock(&racct_lock);
-
- return (0);
-}
-
-static void
-racct_add_cred_locked(struct ucred *cred, int resource, uint64_t amount)
-{
- struct prison *pr;
-
- SDT_PROBE(racct, kernel, rusage, add_cred, cred, resource, amount,
- 0, 0);
-
- KASSERT(amount >= 0,
- ("racct_add_cred: invalid amount for resource %d: %ju",
- resource, amount));
-
- racct_alloc_resource(cred->cr_ruidinfo->ui_racct, resource, amount);
- for (pr = cred->cr_prison; pr != NULL; pr = pr->pr_parent)
- racct_alloc_resource(pr->pr_racct, resource, amount);
- racct_alloc_resource(cred->cr_loginclass->lc_racct, resource, amount);
-}
-
-/*
- * Increase allocation of 'resource' by 'amount' for credential 'cred'.
- * Doesn't check for limits and never fails.
- *
- * XXX: Shouldn't this ever return an error?
- */
-void
-racct_add_cred(struct ucred *cred, int resource, uint64_t amount)
-{
-
- mtx_lock(&racct_lock);
- racct_add_cred_locked(cred, resource, amount);
- mtx_unlock(&racct_lock);
-}
-
-/*
- * Increase allocation of 'resource' by 'amount' for process 'p'.
- * Doesn't check for limits and never fails.
- */
-void
-racct_add_force(struct proc *p, int resource, uint64_t amount)
-{
-
- if (p->p_flag & P_SYSTEM)
- return;
-
- SDT_PROBE(racct, kernel, rusage, add_force, p, resource, amount, 0, 0);
-
- /*
- * We need proc lock to dereference p->p_ucred.
- */
- PROC_LOCK_ASSERT(p, MA_OWNED);
- KASSERT(amount >= 0,
- ("racct_add_force: invalid amount for resource %d: %ju",
- resource, amount));
-
- mtx_lock(&racct_lock);
- racct_alloc_resource(p->p_racct, resource, amount);
- mtx_unlock(&racct_lock);
- racct_add_cred(p->p_ucred, resource, amount);
-}
-
-static int
-racct_set_locked(struct proc *p, int resource, uint64_t amount)
-{
- int64_t diff;
-#ifdef RCTL
- int error;
-#endif
-
- if (p->p_flag & P_SYSTEM)
- return (0);
-
- SDT_PROBE(racct, kernel, rusage, set, p, resource, amount, 0, 0);
-
- /*
- * We need proc lock to dereference p->p_ucred.
- */
- PROC_LOCK_ASSERT(p, MA_OWNED);
- KASSERT(amount >= 0, ("racct_set: invalid amount for resource %d: %ju",
- resource, amount));
-
- diff = amount - p->p_racct->r_resources[resource];
-#ifdef notyet
- KASSERT(diff >= 0 || racct_is_reclaimable(resource),
- ("racct_set: usage of non-reclaimable resource %d dropping",
- resource));
-#endif
-#ifdef RCTL
- if (diff > 0) {
- error = rctl_enforce(p, resource, diff);
- if (error && racct_is_deniable(resource)) {
- SDT_PROBE(racct, kernel, rusage, set_failure, p,
- resource, amount, 0, 0);
- return (error);
- }
- }
-#endif
- racct_alloc_resource(p->p_racct, resource, diff);
- if (diff > 0)
- racct_add_cred_locked(p->p_ucred, resource, diff);
- else if (diff < 0)
- racct_sub_cred_locked(p->p_ucred, resource, -diff);
-
- return (0);
-}
-
-/*
- * Set allocation of 'resource' to 'amount' for process 'p'.
- * Return 0 if it's below limits, or errno, if it's not.
- *
- * Note that decreasing the allocation always returns 0,
- * even if it's above the limit.
- */
-int
-racct_set(struct proc *p, int resource, uint64_t amount)
-{
- int error;
-
- mtx_lock(&racct_lock);
- error = racct_set_locked(p, resource, amount);
- mtx_unlock(&racct_lock);
- return (error);
-}
-
-void
-racct_set_force(struct proc *p, int resource, uint64_t amount)
-{
- int64_t diff;
-
- if (p->p_flag & P_SYSTEM)
- return;
-
- SDT_PROBE(racct, kernel, rusage, set, p, resource, amount, 0, 0);
-
- /*
- * We need proc lock to dereference p->p_ucred.
- */
- PROC_LOCK_ASSERT(p, MA_OWNED);
- KASSERT(amount >= 0,
- ("racct_set_force: invalid amount for resource %d: %ju",
- resource, amount));
-
- mtx_lock(&racct_lock);
- diff = amount - p->p_racct->r_resources[resource];
- racct_alloc_resource(p->p_racct, resource, diff);
- if (diff > 0)
- racct_add_cred_locked(p->p_ucred, resource, diff);
- else if (diff < 0)
- racct_sub_cred_locked(p->p_ucred, resource, -diff);
- mtx_unlock(&racct_lock);
-}
-
-/*
- * Returns amount of 'resource' the process 'p' can keep allocated.
- * Allocating more than that would be denied, unless the resource
- * is marked undeniable. Amount of already allocated resource does
- * not matter.
- */
-uint64_t
-racct_get_limit(struct proc *p, int resource)
-{
-
-#ifdef RCTL
- return (rctl_get_limit(p, resource));
-#else
- return (UINT64_MAX);
-#endif
-}
-
-/*
- * Returns amount of 'resource' the process 'p' can keep allocated.
- * Allocating more than that would be denied, unless the resource
- * is marked undeniable. Amount of already allocated resource does
- * matter.
- */
-uint64_t
-racct_get_available(struct proc *p, int resource)
-{
-
-#ifdef RCTL
- return (rctl_get_available(p, resource));
-#else
- return (UINT64_MAX);
-#endif
-}
-
-/*
- * Decrease allocation of 'resource' by 'amount' for process 'p'.
- */
-void
-racct_sub(struct proc *p, int resource, uint64_t amount)
-{
-
- if (p->p_flag & P_SYSTEM)
- return;
-
- SDT_PROBE(racct, kernel, rusage, sub, p, resource, amount, 0, 0);
-
- /*
- * We need proc lock to dereference p->p_ucred.
- */
- PROC_LOCK_ASSERT(p, MA_OWNED);
- KASSERT(amount >= 0, ("racct_sub: invalid amount for resource %d: %ju",
- resource, amount));
- KASSERT(racct_is_reclaimable(resource),
- ("racct_sub: called for non-reclaimable resource %d", resource));
-
- mtx_lock(&racct_lock);
- KASSERT(amount <= p->p_racct->r_resources[resource],
- ("racct_sub: freeing %ju of resource %d, which is more "
- "than allocated %jd for %s (pid %d)", amount, resource,
- (intmax_t)p->p_racct->r_resources[resource], p->p_comm, p->p_pid));
-
- racct_alloc_resource(p->p_racct, resource, -amount);
- racct_sub_cred_locked(p->p_ucred, resource, amount);
- mtx_unlock(&racct_lock);
-}
-
-static void
-racct_sub_cred_locked(struct ucred *cred, int resource, uint64_t amount)
-{
- struct prison *pr;
-
- SDT_PROBE(racct, kernel, rusage, sub_cred, cred, resource, amount,
- 0, 0);
-
- KASSERT(amount >= 0,
- ("racct_sub_cred: invalid amount for resource %d: %ju",
- resource, amount));
-#ifdef notyet
- KASSERT(racct_is_reclaimable(resource),
- ("racct_sub_cred: called for non-reclaimable resource %d",
- resource));
-#endif
-
- racct_alloc_resource(cred->cr_ruidinfo->ui_racct, resource, -amount);
- for (pr = cred->cr_prison; pr != NULL; pr = pr->pr_parent)
- racct_alloc_resource(pr->pr_racct, resource, -amount);
- racct_alloc_resource(cred->cr_loginclass->lc_racct, resource, -amount);
-}
-
-/*
- * Decrease allocation of 'resource' by 'amount' for credential 'cred'.
- */
-void
-racct_sub_cred(struct ucred *cred, int resource, uint64_t amount)
-{
-
- mtx_lock(&racct_lock);
- racct_sub_cred_locked(cred, resource, amount);
- mtx_unlock(&racct_lock);
-}
-
-/*
- * Inherit resource usage information from the parent process.
- */
-int
-racct_proc_fork(struct proc *parent, struct proc *child)
-{
- int i, error = 0;
-
- /*
- * Create racct for the child process.
- */
- racct_create(&child->p_racct);
-
- /*
- * No resource accounting for kernel processes.
- */
- if (child->p_flag & P_SYSTEM)
- return (0);
-
- PROC_LOCK(parent);
- PROC_LOCK(child);
- mtx_lock(&racct_lock);
-
- /*
- * Inherit resource usage.
- */
- for (i = 0; i <= RACCT_MAX; i++) {
- if (parent->p_racct->r_resources[i] == 0 ||
- !racct_is_inheritable(i))
- continue;
-
- error = racct_set_locked(child, i,
- parent->p_racct->r_resources[i]);
- if (error != 0) {
- /*
- * XXX: The only purpose of these two lines is
- * to prevent from tripping checks in racct_destroy().
- */
- for (i = 0; i <= RACCT_MAX; i++)
- racct_set_locked(child, i, 0);
- goto out;
- }
- }
-
-#ifdef RCTL
- error = rctl_proc_fork(parent, child);
- if (error != 0) {
- /*
- * XXX: The only purpose of these two lines is to prevent from
- * tripping checks in racct_destroy().
- */
- for (i = 0; i <= RACCT_MAX; i++)
- racct_set_locked(child, i, 0);
- }
-#endif
-
-out:
- if (error != 0)
- racct_destroy_locked(&child->p_racct);
- mtx_unlock(&racct_lock);
- PROC_UNLOCK(child);
- PROC_UNLOCK(parent);
-
- return (error);
-}
-
-void
-racct_proc_exit(struct proc *p)
-{
- uint64_t runtime;
-
- PROC_LOCK(p);
- /*
- * We don't need to calculate rux, proc_reap() has already done this.
- */
- runtime = cputick2usec(p->p_rux.rux_runtime);
-#ifdef notyet
- KASSERT(runtime >= p->p_prev_runtime, ("runtime < p_prev_runtime"));
-#else
- if (runtime < p->p_prev_runtime)
- runtime = p->p_prev_runtime;
-#endif
- racct_set(p, RACCT_CPU, runtime);
-
- /*
- * XXX: Free this some other way.
- */
- racct_set(p, RACCT_FSIZE, 0);
- racct_set(p, RACCT_NPTS, 0);
- racct_set(p, RACCT_NTHR, 0);
- racct_set(p, RACCT_RSS, 0);
- PROC_UNLOCK(p);
-
-#ifdef RCTL
- rctl_racct_release(p->p_racct);
-#endif
- racct_destroy(&p->p_racct);
-}
-
-/*
- * Called after credentials change, to move resource utilisation
- * between raccts.
- */
-void
-racct_proc_ucred_changed(struct proc *p, struct ucred *oldcred,
- struct ucred *newcred)
-{
- struct uidinfo *olduip, *newuip;
- struct loginclass *oldlc, *newlc;
- struct prison *oldpr, *newpr, *pr;
-
- PROC_LOCK_ASSERT(p, MA_NOTOWNED);
-
- newuip = newcred->cr_ruidinfo;
- olduip = oldcred->cr_ruidinfo;
- newlc = newcred->cr_loginclass;
- oldlc = oldcred->cr_loginclass;
- newpr = newcred->cr_prison;
- oldpr = oldcred->cr_prison;
-
- mtx_lock(&racct_lock);
- if (newuip != olduip) {
- racct_sub_racct(olduip->ui_racct, p->p_racct);
- racct_add_racct(newuip->ui_racct, p->p_racct);
- }
- if (newlc != oldlc) {
- racct_sub_racct(oldlc->lc_racct, p->p_racct);
- racct_add_racct(newlc->lc_racct, p->p_racct);
- }
- if (newpr != oldpr) {
- for (pr = oldpr; pr != NULL; pr = pr->pr_parent)
- racct_sub_racct(pr->pr_racct, p->p_racct);
- for (pr = newpr; pr != NULL; pr = pr->pr_parent)
- racct_add_racct(pr->pr_racct, p->p_racct);
- }
- mtx_unlock(&racct_lock);
-
-#ifdef RCTL
- rctl_proc_ucred_changed(p, newcred);
-#endif
-}
-
-static void
-racctd(void)
-{
- struct thread *td;
- struct proc *p;
- struct timeval wallclock;
- uint64_t runtime;
-
- for (;;) {
- sx_slock(&allproc_lock);
-
- FOREACH_PROC_IN_SYSTEM(p) {
- if (p->p_state != PRS_NORMAL)
- continue;
- if (p->p_flag & P_SYSTEM)
- continue;
-
- microuptime(&wallclock);
- timevalsub(&wallclock, &p->p_stats->p_start);
- PROC_LOCK(p);
- PROC_SLOCK(p);
- FOREACH_THREAD_IN_PROC(p, td) {
- ruxagg(p, td);
- thread_lock(td);
- thread_unlock(td);
- }
- runtime = cputick2usec(p->p_rux.rux_runtime);
- PROC_SUNLOCK(p);
-#ifdef notyet
- KASSERT(runtime >= p->p_prev_runtime,
- ("runtime < p_prev_runtime"));
-#else
- if (runtime < p->p_prev_runtime)
- runtime = p->p_prev_runtime;
-#endif
- p->p_prev_runtime = runtime;
- mtx_lock(&racct_lock);
- racct_set_locked(p, RACCT_CPU, runtime);
- racct_set_locked(p, RACCT_WALLCLOCK,
- wallclock.tv_sec * 1000000 + wallclock.tv_usec);
- mtx_unlock(&racct_lock);
- PROC_UNLOCK(p);
- }
- sx_sunlock(&allproc_lock);
- pause("-", hz);
- }
-}
-
-static struct kproc_desc racctd_kp = {
- "racctd",
- racctd,
- NULL
-};
-SYSINIT(racctd, SI_SUB_RACCTD, SI_ORDER_FIRST, kproc_start, &racctd_kp);
-
-static void
-racct_init(void)
-{
-
- racct_zone = uma_zcreate("racct", sizeof(struct racct),
- NULL, NULL, NULL, NULL, UMA_ALIGN_PTR, UMA_ZONE_NOFREE);
- /*
- * XXX: Move this somewhere.
- */
- racct_create(&prison0.pr_racct);
-}
-SYSINIT(racct, SI_SUB_RACCT, SI_ORDER_FIRST, racct_init, NULL);
-
-#else /* !RACCT */
-
-int
-racct_add(struct proc *p, int resource, uint64_t amount)
-{
-
- return (0);
-}
-
-void
-racct_add_cred(struct ucred *cred, int resource, uint64_t amount)
-{
-}
-
-void
-racct_add_force(struct proc *p, int resource, uint64_t amount)
-{
-
- return (0);
-}
-
-int
-racct_set(struct proc *p, int resource, uint64_t amount)
-{
-
- return (0);
-}
-
-void
-racct_sub(struct proc *p, int resource, uint64_t amount)
-{
-}
-
-void
-racct_sub_cred(struct ucred *cred, int resource, uint64_t amount)
-{
-}
-
-uint64_t
-racct_get_limit(struct proc *p, int resource)
-{
-
- return (UINT64_MAX);
-}
-
-void
-racct_create(struct racct **racctp)
-{
-}
-
-void
-racct_destroy(struct racct **racctp)
-{
-}
-
-int
-racct_proc_fork(struct proc *parent, struct proc *child)
-{
-
- return (0);
-}
-
-void
-racct_proc_exit(struct proc *p)
-{
-}
-
-#endif /* !RACCT */
OpenPOWER on IntegriCloud