]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - kernel/acct.c
userns: prevent speculative execution
[mirror_ubuntu-artful-kernel.git] / kernel / acct.c
CommitLineData
1da177e4
LT
1/*
2 * linux/kernel/acct.c
3 *
4 * BSD Process Accounting for Linux
5 *
6 * Author: Marco van Wieringen <mvw@planets.elm.net>
7 *
8 * Some code based on ideas and code from:
9 * Thomas K. Dyas <tdyas@eden.rutgers.edu>
10 *
11 * This file implements BSD-style process accounting. Whenever any
12 * process exits, an accounting record of type "struct acct" is
13 * written to the file specified with the acct() system call. It is
14 * up to user-level programs to do useful things with the accounting
15 * log. The kernel just provides the raw accounting information.
16 *
17 * (C) Copyright 1995 - 1997 Marco van Wieringen - ELM Consultancy B.V.
18 *
19 * Plugged two leaks. 1) It didn't return acct_file into the free_filps if
20 * the file happened to be read-only. 2) If the accounting was suspended
21 * due to the lack of space it happily allowed to reopen it and completely
22 * lost the old acct_file. 3/10/98, Al Viro.
23 *
24 * Now we silently close acct_file on attempt to reopen. Cleaned sys_acct().
25 * XTerms and EMACS are manifestations of pure evil. 21/10/98, AV.
26 *
27 * Fixed a nasty interaction with with sys_umount(). If the accointing
28 * was suspeneded we failed to stop it on umount(). Messy.
29 * Another one: remount to readonly didn't stop accounting.
30 * Question: what should we do if we have CAP_SYS_ADMIN but not
31 * CAP_SYS_PACCT? Current code does the following: umount returns -EBUSY
32 * unless we are messing with the root. In that case we are getting a
33 * real mess with do_remount_sb(). 9/11/98, AV.
34 *
35 * Fixed a bunch of races (and pair of leaks). Probably not the best way,
36 * but this one obviously doesn't introduce deadlocks. Later. BTW, found
37 * one race (and leak) in BSD implementation.
38 * OK, that's better. ANOTHER race and leak in BSD variant. There always
39 * is one more bug... 10/11/98, AV.
40 *
41 * Oh, fsck... Oopsable SMP race in do_process_acct() - we must hold
42 * ->mmap_sem to walk the vma list of current->mm. Nasty, since it leaks
43 * a struct file opened for write. Fixed. 2/6/2000, AV.
44 */
45
1da177e4
LT
46#include <linux/mm.h>
47#include <linux/slab.h>
48#include <linux/acct.h>
c59ede7b 49#include <linux/capability.h>
1da177e4
LT
50#include <linux/file.h>
51#include <linux/tty.h>
52#include <linux/security.h>
53#include <linux/vfs.h>
54#include <linux/jiffies.h>
55#include <linux/times.h>
56#include <linux/syscalls.h>
7b7b1ace 57#include <linux/mount.h>
7153e402 58#include <linux/uaccess.h>
32ef5517
IM
59#include <linux/sched/cputime.h>
60
1da177e4
LT
61#include <asm/div64.h>
62#include <linux/blkdev.h> /* sector_div */
5f7b703f 63#include <linux/pid_namespace.h>
efb170c2 64#include <linux/fs_pin.h>
1da177e4
LT
65
66/*
67 * These constants control the amount of freespace that suspend and
68 * resume the process accounting system, and the time delay between
69 * each check.
70 * Turned into sysctl-controllable parameters. AV, 12/11/98
71 */
72
73int acct_parm[3] = {4, 2, 30};
74#define RESUME (acct_parm[0]) /* >foo% free space - resume */
75#define SUSPEND (acct_parm[1]) /* <foo% free space - suspend */
76#define ACCT_TIMEOUT (acct_parm[2]) /* foo second timeout between checks */
77
78/*
79 * External references and all of the globals.
80 */
1da177e4 81
1629d0eb
AV
82struct bsd_acct_struct {
83 struct fs_pin pin;
34cece2e
AV
84 atomic_long_t count;
85 struct rcu_head rcu;
b8f00e6b 86 struct mutex lock;
32dc7308
AV
87 int active;
88 unsigned long needcheck;
1da177e4 89 struct file *file;
5f7b703f 90 struct pid_namespace *ns;
17c0a5aa
AV
91 struct work_struct work;
92 struct completion done;
1da177e4
LT
93};
94
59eda0e0
AV
95static void do_acct_process(struct bsd_acct_struct *acct);
96
1da177e4
LT
97/*
98 * Check the amount of free space and suspend/resume accordingly.
99 */
54a4d58a 100static int check_free_space(struct bsd_acct_struct *acct)
1da177e4
LT
101{
102 struct kstatfs sbuf;
1da177e4 103
54a4d58a 104 if (time_is_before_jiffies(acct->needcheck))
1da177e4 105 goto out;
1da177e4
LT
106
107 /* May block */
54a4d58a 108 if (vfs_statfs(&acct->file->f_path, &sbuf))
1da177e4 109 goto out;
1da177e4 110
6248b1b3 111 if (acct->active) {
54a4d58a
AV
112 u64 suspend = sbuf.f_blocks * SUSPEND;
113 do_div(suspend, 100);
114 if (sbuf.f_bavail <= suspend) {
6248b1b3 115 acct->active = 0;
2577d92e 116 pr_info("Process accounting paused\n");
1da177e4
LT
117 }
118 } else {
54a4d58a
AV
119 u64 resume = sbuf.f_blocks * RESUME;
120 do_div(resume, 100);
121 if (sbuf.f_bavail >= resume) {
6248b1b3 122 acct->active = 1;
2577d92e 123 pr_info("Process accounting resumed\n");
1da177e4
LT
124 }
125 }
126
32dc7308 127 acct->needcheck = jiffies + ACCT_TIMEOUT*HZ;
1da177e4 128out:
54a4d58a 129 return acct->active;
1da177e4
LT
130}
131
9e251d02
AV
132static void acct_put(struct bsd_acct_struct *p)
133{
34cece2e
AV
134 if (atomic_long_dec_and_test(&p->count))
135 kfree_rcu(p, rcu);
9e251d02
AV
136}
137
59eda0e0
AV
138static inline struct bsd_acct_struct *to_acct(struct fs_pin *p)
139{
140 return p ? container_of(p, struct bsd_acct_struct, pin) : NULL;
141}
142
215752fc 143static struct bsd_acct_struct *acct_get(struct pid_namespace *ns)
b8f00e6b
AV
144{
145 struct bsd_acct_struct *res;
b8f00e6b 146again:
2798d4ce
AV
147 smp_rmb();
148 rcu_read_lock();
59eda0e0 149 res = to_acct(ACCESS_ONCE(ns->bacct));
2798d4ce
AV
150 if (!res) {
151 rcu_read_unlock();
215752fc 152 return NULL;
1da177e4 153 }
34cece2e 154 if (!atomic_long_inc_not_zero(&res->count)) {
efb170c2
AV
155 rcu_read_unlock();
156 cpu_relax();
215752fc 157 goto again;
efb170c2
AV
158 }
159 rcu_read_unlock();
160 mutex_lock(&res->lock);
59eda0e0 161 if (res != to_acct(ACCESS_ONCE(ns->bacct))) {
efb170c2 162 mutex_unlock(&res->lock);
9e251d02 163 acct_put(res);
efb170c2
AV
164 goto again;
165 }
b8f00e6b
AV
166 return res;
167}
168
59eda0e0
AV
169static void acct_pin_kill(struct fs_pin *pin)
170{
171 struct bsd_acct_struct *acct = to_acct(pin);
172 mutex_lock(&acct->lock);
173 do_acct_process(acct);
174 schedule_work(&acct->work);
175 wait_for_completion(&acct->done);
176 cmpxchg(&acct->ns->bacct, pin, NULL);
177 mutex_unlock(&acct->lock);
178 pin_remove(pin);
179 acct_put(acct);
180}
181
17c0a5aa
AV
182static void close_work(struct work_struct *work)
183{
184 struct bsd_acct_struct *acct = container_of(work, struct bsd_acct_struct, work);
185 struct file *file = acct->file;
17c0a5aa
AV
186 if (file->f_op->flush)
187 file->f_op->flush(file, NULL);
188 __fput_sync(file);
189 complete(&acct->done);
190}
191
669abf4e 192static int acct_on(struct filename *pathname)
7b7b1ace
AV
193{
194 struct file *file;
3064c356 195 struct vfsmount *mnt, *internal;
b8f00e6b 196 struct pid_namespace *ns = task_active_pid_ns(current);
59eda0e0
AV
197 struct bsd_acct_struct *acct;
198 struct fs_pin *old;
3064c356 199 int err;
b8f00e6b
AV
200
201 acct = kzalloc(sizeof(struct bsd_acct_struct), GFP_KERNEL);
202 if (!acct)
203 return -ENOMEM;
7b7b1ace
AV
204
205 /* Difference from BSD - they don't do O_APPEND */
669abf4e 206 file = file_open_name(pathname, O_WRONLY|O_APPEND|O_LARGEFILE, 0);
b8f00e6b
AV
207 if (IS_ERR(file)) {
208 kfree(acct);
7b7b1ace 209 return PTR_ERR(file);
b8f00e6b 210 }
7b7b1ace 211
496ad9aa 212 if (!S_ISREG(file_inode(file)->i_mode)) {
b8f00e6b 213 kfree(acct);
7b7b1ace
AV
214 filp_close(file, NULL);
215 return -EACCES;
216 }
217
d0f88f8d 218 if (!(file->f_mode & FMODE_CAN_WRITE)) {
b8f00e6b 219 kfree(acct);
7b7b1ace
AV
220 filp_close(file, NULL);
221 return -EIO;
222 }
3064c356
AV
223 internal = mnt_clone_internal(&file->f_path);
224 if (IS_ERR(internal)) {
225 kfree(acct);
226 filp_close(file, NULL);
227 return PTR_ERR(internal);
228 }
229 err = mnt_want_write(internal);
230 if (err) {
231 mntput(internal);
232 kfree(acct);
233 filp_close(file, NULL);
234 return err;
235 }
236 mnt = file->f_path.mnt;
237 file->f_path.mnt = internal;
7b7b1ace 238
34cece2e 239 atomic_long_set(&acct->count, 1);
59eda0e0 240 init_fs_pin(&acct->pin, acct_pin_kill);
b8f00e6b
AV
241 acct->file = file;
242 acct->needcheck = jiffies;
243 acct->ns = ns;
244 mutex_init(&acct->lock);
59eda0e0
AV
245 INIT_WORK(&acct->work, close_work);
246 init_completion(&acct->done);
efb170c2
AV
247 mutex_lock_nested(&acct->lock, 1); /* nobody has seen it yet */
248 pin_insert(&acct->pin, mnt);
0b6b030f 249
59eda0e0
AV
250 rcu_read_lock();
251 old = xchg(&ns->bacct, &acct->pin);
efb170c2 252 mutex_unlock(&acct->lock);
59eda0e0 253 pin_kill(old);
3064c356
AV
254 mnt_drop_write(mnt);
255 mntput(mnt);
7b7b1ace
AV
256 return 0;
257}
258
9df7fa16
AV
259static DEFINE_MUTEX(acct_on_mutex);
260
417ef531
RD
261/**
262 * sys_acct - enable/disable process accounting
263 * @name: file name for accounting records or NULL to shutdown accounting
264 *
265 * Returns 0 for success or negative errno values for failure.
266 *
267 * sys_acct() is the only system call needed to implement process
268 * accounting. It takes the name of the file where accounting records
269 * should be written. If the filename is NULL, accounting will be
270 * shutdown.
1da177e4 271 */
b290ebe2 272SYSCALL_DEFINE1(acct, const char __user *, name)
1da177e4 273{
05b90496 274 int error = 0;
1da177e4
LT
275
276 if (!capable(CAP_SYS_PACCT))
277 return -EPERM;
278
279 if (name) {
91a27b2a 280 struct filename *tmp = getname(name);
2577d92e 281
7b7b1ace 282 if (IS_ERR(tmp))
46c0a8ca 283 return PTR_ERR(tmp);
9df7fa16 284 mutex_lock(&acct_on_mutex);
669abf4e 285 error = acct_on(tmp);
9df7fa16 286 mutex_unlock(&acct_on_mutex);
1da177e4 287 putname(tmp);
7b7b1ace 288 } else {
59eda0e0
AV
289 rcu_read_lock();
290 pin_kill(task_active_pid_ns(current)->bacct);
1da177e4 291 }
05b90496 292
7b7b1ace
AV
293 return error;
294}
1da177e4 295
0b6b030f
PE
296void acct_exit_ns(struct pid_namespace *ns)
297{
59eda0e0
AV
298 rcu_read_lock();
299 pin_kill(ns->bacct);
1da177e4
LT
300}
301
302/*
303 * encode an unsigned long into a comp_t
304 *
305 * This routine has been adopted from the encode_comp_t() function in
306 * the kern_acct.c file of the FreeBSD operating system. The encoding
307 * is a 13-bit fraction with a 3-bit (base 8) exponent.
308 */
309
310#define MANTSIZE 13 /* 13 bit mantissa. */
311#define EXPSIZE 3 /* Base 8 (3 bit) exponent. */
312#define MAXFRACT ((1 << MANTSIZE) - 1) /* Maximum fractional value. */
313
314static comp_t encode_comp_t(unsigned long value)
315{
316 int exp, rnd;
317
318 exp = rnd = 0;
319 while (value > MAXFRACT) {
320 rnd = value & (1 << (EXPSIZE - 1)); /* Round up? */
321 value >>= EXPSIZE; /* Base 8 exponent == 3 bit shift. */
322 exp++;
323 }
324
325 /*
6ae965cd
DW
326 * If we need to round up, do it (and handle overflow correctly).
327 */
1da177e4
LT
328 if (rnd && (++value > MAXFRACT)) {
329 value >>= EXPSIZE;
330 exp++;
331 }
332
333 /*
6ae965cd
DW
334 * Clean it up and polish it off.
335 */
1da177e4
LT
336 exp <<= MANTSIZE; /* Shift the exponent into place */
337 exp += value; /* and add on the mantissa. */
338 return exp;
339}
340
2577d92e 341#if ACCT_VERSION == 1 || ACCT_VERSION == 2
1da177e4
LT
342/*
343 * encode an u64 into a comp2_t (24 bits)
344 *
345 * Format: 5 bit base 2 exponent, 20 bits mantissa.
346 * The leading bit of the mantissa is not stored, but implied for
347 * non-zero exponents.
348 * Largest encodable value is 50 bits.
349 */
350
351#define MANTSIZE2 20 /* 20 bit mantissa. */
352#define EXPSIZE2 5 /* 5 bit base 2 exponent. */
353#define MAXFRACT2 ((1ul << MANTSIZE2) - 1) /* Maximum fractional value. */
2577d92e 354#define MAXEXP2 ((1 << EXPSIZE2) - 1) /* Maximum exponent. */
1da177e4
LT
355
356static comp2_t encode_comp2_t(u64 value)
357{
6ae965cd
DW
358 int exp, rnd;
359
360 exp = (value > (MAXFRACT2>>1));
361 rnd = 0;
362 while (value > MAXFRACT2) {
363 rnd = value & 1;
364 value >>= 1;
365 exp++;
366 }
367
368 /*
369 * If we need to round up, do it (and handle overflow correctly).
370 */
371 if (rnd && (++value > MAXFRACT2)) {
372 value >>= 1;
373 exp++;
374 }
375
376 if (exp > MAXEXP2) {
377 /* Overflow. Return largest representable number instead. */
378 return (1ul << (MANTSIZE2+EXPSIZE2-1)) - 1;
379 } else {
380 return (value & (MAXFRACT2>>1)) | (exp << (MANTSIZE2-1));
381 }
1da177e4
LT
382}
383#endif
384
2577d92e 385#if ACCT_VERSION == 3
1da177e4
LT
386/*
387 * encode an u64 into a 32 bit IEEE float
388 */
389static u32 encode_float(u64 value)
390{
391 unsigned exp = 190;
392 unsigned u;
393
2577d92e
IA
394 if (value == 0)
395 return 0;
396 while ((s64)value > 0) {
1da177e4
LT
397 value <<= 1;
398 exp--;
399 }
400 u = (u32)(value >> 40) & 0x7fffffu;
401 return u | (exp << 23);
402}
403#endif
404
405/*
406 * Write an accounting entry for an exiting process
407 *
408 * The acct_process() call is the workhorse of the process
409 * accounting system. The struct acct is built here and then written
410 * into the accounting file. This function should only be called from
bcbe4a07 411 * do_exit() or when switching to a different output file.
1da177e4
LT
412 */
413
cdd37e23 414static void fill_ac(acct_t *ac)
1da177e4 415{
0e464814 416 struct pacct_struct *pacct = &current->signal->pacct;
ccbf62d8 417 u64 elapsed, run_time;
24ec839c 418 struct tty_struct *tty;
1da177e4
LT
419
420 /*
421 * Fill the accounting struct with the needed info as recorded
422 * by the different kernel functions.
423 */
cdd37e23 424 memset(ac, 0, sizeof(acct_t));
1da177e4 425
cdd37e23
AV
426 ac->ac_version = ACCT_VERSION | ACCT_BYTEORDER;
427 strlcpy(ac->ac_comm, current->comm, sizeof(ac->ac_comm));
1da177e4
LT
428
429 /* calculate run_time in nsec*/
ccbf62d8
TG
430 run_time = ktime_get_ns();
431 run_time -= current->group_leader->start_time;
1da177e4
LT
432 /* convert nsec -> AHZ */
433 elapsed = nsec_to_AHZ(run_time);
2577d92e 434#if ACCT_VERSION == 3
cdd37e23 435 ac->ac_etime = encode_float(elapsed);
1da177e4 436#else
cdd37e23 437 ac->ac_etime = encode_comp_t(elapsed < (unsigned long) -1l ?
2577d92e 438 (unsigned long) elapsed : (unsigned long) -1l);
1da177e4 439#endif
2577d92e 440#if ACCT_VERSION == 1 || ACCT_VERSION == 2
1da177e4
LT
441 {
442 /* new enlarged etime field */
443 comp2_t etime = encode_comp2_t(elapsed);
2577d92e 444
cdd37e23
AV
445 ac->ac_etime_hi = etime >> 16;
446 ac->ac_etime_lo = (u16) etime;
1da177e4
LT
447 }
448#endif
449 do_div(elapsed, AHZ);
cdd37e23
AV
450 ac->ac_btime = get_seconds() - elapsed;
451#if ACCT_VERSION==2
452 ac->ac_ahz = AHZ;
453#endif
454
455 spin_lock_irq(&current->sighand->siglock);
456 tty = current->signal->tty; /* Safe as we hold the siglock */
457 ac->ac_tty = tty ? old_encode_dev(tty_devnum(tty)) : 0;
d4bc42af
FW
458 ac->ac_utime = encode_comp_t(nsec_to_AHZ(pacct->ac_utime));
459 ac->ac_stime = encode_comp_t(nsec_to_AHZ(pacct->ac_stime));
cdd37e23
AV
460 ac->ac_flag = pacct->ac_flag;
461 ac->ac_mem = encode_comp_t(pacct->ac_mem);
462 ac->ac_minflt = encode_comp_t(pacct->ac_minflt);
463 ac->ac_majflt = encode_comp_t(pacct->ac_majflt);
464 ac->ac_exitcode = pacct->ac_exitcode;
465 spin_unlock_irq(&current->sighand->siglock);
466}
467/*
468 * do_acct_process does all actual work. Caller holds the reference to file.
469 */
b8f00e6b 470static void do_acct_process(struct bsd_acct_struct *acct)
cdd37e23
AV
471{
472 acct_t ac;
473 unsigned long flim;
474 const struct cred *orig_cred;
b8f00e6b 475 struct file *file = acct->file;
cdd37e23
AV
476
477 /*
478 * Accounting records are not subject to resource limits.
479 */
480 flim = current->signal->rlim[RLIMIT_FSIZE].rlim_cur;
481 current->signal->rlim[RLIMIT_FSIZE].rlim_cur = RLIM_INFINITY;
482 /* Perform file operations on behalf of whoever enabled accounting */
483 orig_cred = override_creds(file->f_cred);
484
485 /*
486 * First check to see if there is enough free_space to continue
487 * the process accounting system.
488 */
54a4d58a 489 if (!check_free_space(acct))
cdd37e23
AV
490 goto out;
491
492 fill_ac(&ac);
1da177e4 493 /* we really need to bite the bullet and change layout */
f8f3d4de
EB
494 ac.ac_uid = from_kuid_munged(file->f_cred->user_ns, orig_cred->uid);
495 ac.ac_gid = from_kgid_munged(file->f_cred->user_ns, orig_cred->gid);
2577d92e 496#if ACCT_VERSION == 1 || ACCT_VERSION == 2
1da177e4 497 /* backward-compatible 16 bit fields */
76aac0e9
DH
498 ac.ac_uid16 = ac.ac_uid;
499 ac.ac_gid16 = ac.ac_gid;
1da177e4 500#endif
2577d92e 501#if ACCT_VERSION == 3
067b722f
YX
502 {
503 struct pid_namespace *ns = acct->ns;
504
505 ac.ac_pid = task_tgid_nr_ns(current, ns);
506 rcu_read_lock();
507 ac.ac_ppid = task_tgid_nr_ns(rcu_dereference(current->real_parent),
508 ns);
509 rcu_read_unlock();
510 }
1da177e4 511#endif
5ae98f15
JK
512 /*
513 * Get freeze protection. If the fs is frozen, just skip the write
514 * as we could deadlock the system otherwise.
515 */
ed44724b
AV
516 if (file_start_write_trylock(file)) {
517 /* it's been opened O_APPEND, so position is irrelevant */
518 loff_t pos = 0;
519 __kernel_write(file, (char *)&ac, sizeof(acct_t), &pos);
520 file_end_write(file);
521 }
d8e180dc 522out:
ed44724b 523 current->signal->rlim[RLIMIT_FSIZE].rlim_cur = flim;
d8e180dc 524 revert_creds(orig_cred);
1da177e4
LT
525}
526
0e464814
KK
527/**
528 * acct_collect - collect accounting information into pacct_struct
f6ec29a4
KK
529 * @exitcode: task exit code
530 * @group_dead: not 0, if this thread is the last one in the process.
0e464814 531 */
f6ec29a4 532void acct_collect(long exitcode, int group_dead)
0e464814
KK
533{
534 struct pacct_struct *pacct = &current->signal->pacct;
d4bc42af 535 u64 utime, stime;
0e464814
KK
536 unsigned long vsize = 0;
537
f6ec29a4 538 if (group_dead && current->mm) {
0e464814 539 struct vm_area_struct *vma;
2577d92e 540
0e464814
KK
541 down_read(&current->mm->mmap_sem);
542 vma = current->mm->mmap;
543 while (vma) {
544 vsize += vma->vm_end - vma->vm_start;
545 vma = vma->vm_next;
546 }
547 up_read(&current->mm->mmap_sem);
548 }
549
77787bfb 550 spin_lock_irq(&current->sighand->siglock);
f6ec29a4
KK
551 if (group_dead)
552 pacct->ac_mem = vsize / 1024;
553 if (thread_group_leader(current)) {
554 pacct->ac_exitcode = exitcode;
555 if (current->flags & PF_FORKNOEXEC)
556 pacct->ac_flag |= AFORK;
557 }
558 if (current->flags & PF_SUPERPRIV)
559 pacct->ac_flag |= ASU;
560 if (current->flags & PF_DUMPCORE)
561 pacct->ac_flag |= ACORE;
562 if (current->flags & PF_SIGNALED)
563 pacct->ac_flag |= AXSIG;
d4bc42af
FW
564
565 task_cputime(current, &utime, &stime);
6fac4829
FW
566 pacct->ac_utime += utime;
567 pacct->ac_stime += stime;
77787bfb
KK
568 pacct->ac_minflt += current->min_flt;
569 pacct->ac_majflt += current->maj_flt;
570 spin_unlock_irq(&current->sighand->siglock);
0e464814
KK
571}
572
e25ff11f 573static void slow_acct_process(struct pid_namespace *ns)
1da177e4 574{
e25ff11f 575 for ( ; ns; ns = ns->parent) {
215752fc 576 struct bsd_acct_struct *acct = acct_get(ns);
b8f00e6b
AV
577 if (acct) {
578 do_acct_process(acct);
579 mutex_unlock(&acct->lock);
9e251d02 580 acct_put(acct);
e25ff11f 581 }
e25ff11f 582 }
1da177e4 583}
7d1e1350
PE
584
585/**
e25ff11f 586 * acct_process
7d1e1350
PE
587 *
588 * handles process accounting for an exiting task
589 */
590void acct_process(void)
591{
592 struct pid_namespace *ns;
593
0c18d7a5
PE
594 /*
595 * This loop is safe lockless, since current is still
596 * alive and holds its namespace, which in turn holds
597 * its parent.
598 */
e25ff11f 599 for (ns = task_active_pid_ns(current); ns != NULL; ns = ns->parent) {
b8f00e6b 600 if (ns->bacct)
e25ff11f
AV
601 break;
602 }
603 if (unlikely(ns))
604 slow_acct_process(ns);
7d1e1350 605}