xref: /freebsd/sys/kern/kern_racct.c (revision d9f0ce31900a48d1a2bfc1c8c86f79d1e831451a)
1 /*-
2  * Copyright (c) 2010 The FreeBSD Foundation
3  * All rights reserved.
4  *
5  * This software was developed by Edward Tomasz Napierala under sponsorship
6  * from the FreeBSD Foundation.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  *
29  * $FreeBSD$
30  */
31 
32 #include <sys/cdefs.h>
33 __FBSDID("$FreeBSD$");
34 
35 #include "opt_sched.h"
36 
37 #include <sys/param.h>
38 #include <sys/buf.h>
39 #include <sys/systm.h>
40 #include <sys/eventhandler.h>
41 #include <sys/jail.h>
42 #include <sys/kernel.h>
43 #include <sys/kthread.h>
44 #include <sys/lock.h>
45 #include <sys/loginclass.h>
46 #include <sys/malloc.h>
47 #include <sys/mutex.h>
48 #include <sys/proc.h>
49 #include <sys/racct.h>
50 #include <sys/resourcevar.h>
51 #include <sys/sbuf.h>
52 #include <sys/sched.h>
53 #include <sys/sdt.h>
54 #include <sys/smp.h>
55 #include <sys/sx.h>
56 #include <sys/sysctl.h>
57 #include <sys/sysent.h>
58 #include <sys/sysproto.h>
59 #include <sys/umtx.h>
60 #include <machine/smp.h>
61 
62 #ifdef RCTL
63 #include <sys/rctl.h>
64 #endif
65 
66 #ifdef RACCT
67 
68 FEATURE(racct, "Resource Accounting");
69 
70 /*
71  * Do not block processes that have their %cpu usage <= pcpu_threshold.
72  */
73 static int pcpu_threshold = 1;
74 #ifdef RACCT_DEFAULT_TO_DISABLED
75 int racct_enable = 0;
76 #else
77 int racct_enable = 1;
78 #endif
79 
80 SYSCTL_NODE(_kern, OID_AUTO, racct, CTLFLAG_RW, 0, "Resource Accounting");
81 SYSCTL_UINT(_kern_racct, OID_AUTO, enable, CTLFLAG_RDTUN, &racct_enable,
82     0, "Enable RACCT/RCTL");
83 SYSCTL_UINT(_kern_racct, OID_AUTO, pcpu_threshold, CTLFLAG_RW, &pcpu_threshold,
84     0, "Processes with higher %cpu usage than this value can be throttled.");
85 
86 /*
87  * How many seconds it takes to use the scheduler %cpu calculations.  When a
88  * process starts, we compute its %cpu usage by dividing its runtime by the
89  * process wall clock time.  After RACCT_PCPU_SECS pass, we use the value
90  * provided by the scheduler.
91  */
92 #define RACCT_PCPU_SECS		3
93 
94 static struct mtx racct_lock;
95 MTX_SYSINIT(racct_lock, &racct_lock, "racct lock", MTX_DEF);
96 
97 #define RACCT_LOCK()		mtx_lock(&racct_lock)
98 #define RACCT_UNLOCK()		mtx_unlock(&racct_lock)
99 #define RACCT_LOCK_ASSERT()	mtx_assert(&racct_lock, MA_OWNED)
100 
101 static uma_zone_t racct_zone;
102 
103 static void racct_sub_racct(struct racct *dest, const struct racct *src);
104 static void racct_sub_cred_locked(struct ucred *cred, int resource,
105 		uint64_t amount);
106 static void racct_add_cred_locked(struct ucred *cred, int resource,
107 		uint64_t amount);
108 
109 SDT_PROVIDER_DEFINE(racct);
110 SDT_PROBE_DEFINE3(racct, , rusage, add,
111     "struct proc *", "int", "uint64_t");
112 SDT_PROBE_DEFINE3(racct, , rusage, add__failure,
113     "struct proc *", "int", "uint64_t");
114 SDT_PROBE_DEFINE3(racct, , rusage, add__cred,
115     "struct ucred *", "int", "uint64_t");
116 SDT_PROBE_DEFINE3(racct, , rusage, add__force,
117     "struct proc *", "int", "uint64_t");
118 SDT_PROBE_DEFINE3(racct, , rusage, set,
119     "struct proc *", "int", "uint64_t");
120 SDT_PROBE_DEFINE3(racct, , rusage, set__failure,
121     "struct proc *", "int", "uint64_t");
122 SDT_PROBE_DEFINE3(racct, , rusage, set__force,
123     "struct proc *", "int", "uint64_t");
124 SDT_PROBE_DEFINE3(racct, , rusage, sub,
125     "struct proc *", "int", "uint64_t");
126 SDT_PROBE_DEFINE3(racct, , rusage, sub__cred,
127     "struct ucred *", "int", "uint64_t");
128 SDT_PROBE_DEFINE1(racct, , racct, create,
129     "struct racct *");
130 SDT_PROBE_DEFINE1(racct, , racct, destroy,
131     "struct racct *");
132 SDT_PROBE_DEFINE2(racct, , racct, join,
133     "struct racct *", "struct racct *");
134 SDT_PROBE_DEFINE2(racct, , racct, join__failure,
135     "struct racct *", "struct racct *");
136 SDT_PROBE_DEFINE2(racct, , racct, leave,
137     "struct racct *", "struct racct *");
138 
139 int racct_types[] = {
140 	[RACCT_CPU] =
141 		RACCT_IN_MILLIONS,
142 	[RACCT_DATA] =
143 		RACCT_RECLAIMABLE | RACCT_INHERITABLE | RACCT_DENIABLE,
144 	[RACCT_STACK] =
145 		RACCT_RECLAIMABLE | RACCT_INHERITABLE | RACCT_DENIABLE,
146 	[RACCT_CORE] =
147 		RACCT_DENIABLE,
148 	[RACCT_RSS] =
149 		RACCT_RECLAIMABLE,
150 	[RACCT_MEMLOCK] =
151 		RACCT_RECLAIMABLE | RACCT_DENIABLE,
152 	[RACCT_NPROC] =
153 		RACCT_RECLAIMABLE | RACCT_DENIABLE,
154 	[RACCT_NOFILE] =
155 		RACCT_RECLAIMABLE | RACCT_INHERITABLE | RACCT_DENIABLE,
156 	[RACCT_VMEM] =
157 		RACCT_RECLAIMABLE | RACCT_INHERITABLE | RACCT_DENIABLE,
158 	[RACCT_NPTS] =
159 		RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
160 	[RACCT_SWAP] =
161 		RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
162 	[RACCT_NTHR] =
163 		RACCT_RECLAIMABLE | RACCT_DENIABLE,
164 	[RACCT_MSGQQUEUED] =
165 		RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
166 	[RACCT_MSGQSIZE] =
167 		RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
168 	[RACCT_NMSGQ] =
169 		RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
170 	[RACCT_NSEM] =
171 		RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
172 	[RACCT_NSEMOP] =
173 		RACCT_RECLAIMABLE | RACCT_INHERITABLE | RACCT_DENIABLE,
174 	[RACCT_NSHM] =
175 		RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
176 	[RACCT_SHMSIZE] =
177 		RACCT_RECLAIMABLE | RACCT_DENIABLE | RACCT_SLOPPY,
178 	[RACCT_WALLCLOCK] =
179 		RACCT_IN_MILLIONS,
180 	[RACCT_PCTCPU] =
181 		RACCT_DECAYING | RACCT_DENIABLE | RACCT_IN_MILLIONS,
182 	[RACCT_READBPS] =
183 		RACCT_DECAYING,
184 	[RACCT_WRITEBPS] =
185 		RACCT_DECAYING,
186 	[RACCT_READIOPS] =
187 		RACCT_DECAYING,
188 	[RACCT_WRITEIOPS] =
189 		RACCT_DECAYING };
190 
191 static const fixpt_t RACCT_DECAY_FACTOR = 0.3 * FSCALE;
192 
193 #ifdef SCHED_4BSD
194 /*
195  * Contains intermediate values for %cpu calculations to avoid using floating
196  * point in the kernel.
197  * ccpu_exp[k] = FSCALE * (ccpu/FSCALE)^k = FSCALE * exp(-k/20)
198  * It is needed only for the 4BSD scheduler, because in ULE, the ccpu equals to
199  * zero so the calculations are more straightforward.
200  */
201 fixpt_t ccpu_exp[] = {
202 	[0] = FSCALE * 1,
203 	[1] = FSCALE * 0.95122942450071400909,
204 	[2] = FSCALE * 0.90483741803595957316,
205 	[3] = FSCALE * 0.86070797642505780722,
206 	[4] = FSCALE * 0.81873075307798185866,
207 	[5] = FSCALE * 0.77880078307140486824,
208 	[6] = FSCALE * 0.74081822068171786606,
209 	[7] = FSCALE * 0.70468808971871343435,
210 	[8] = FSCALE * 0.67032004603563930074,
211 	[9] = FSCALE * 0.63762815162177329314,
212 	[10] = FSCALE * 0.60653065971263342360,
213 	[11] = FSCALE * 0.57694981038048669531,
214 	[12] = FSCALE * 0.54881163609402643262,
215 	[13] = FSCALE * 0.52204577676101604789,
216 	[14] = FSCALE * 0.49658530379140951470,
217 	[15] = FSCALE * 0.47236655274101470713,
218 	[16] = FSCALE * 0.44932896411722159143,
219 	[17] = FSCALE * 0.42741493194872666992,
220 	[18] = FSCALE * 0.40656965974059911188,
221 	[19] = FSCALE * 0.38674102345450120691,
222 	[20] = FSCALE * 0.36787944117144232159,
223 	[21] = FSCALE * 0.34993774911115535467,
224 	[22] = FSCALE * 0.33287108369807955328,
225 	[23] = FSCALE * 0.31663676937905321821,
226 	[24] = FSCALE * 0.30119421191220209664,
227 	[25] = FSCALE * 0.28650479686019010032,
228 	[26] = FSCALE * 0.27253179303401260312,
229 	[27] = FSCALE * 0.25924026064589150757,
230 	[28] = FSCALE * 0.24659696394160647693,
231 	[29] = FSCALE * 0.23457028809379765313,
232 	[30] = FSCALE * 0.22313016014842982893,
233 	[31] = FSCALE * 0.21224797382674305771,
234 	[32] = FSCALE * 0.20189651799465540848,
235 	[33] = FSCALE * 0.19204990862075411423,
236 	[34] = FSCALE * 0.18268352405273465022,
237 	[35] = FSCALE * 0.17377394345044512668,
238 	[36] = FSCALE * 0.16529888822158653829,
239 	[37] = FSCALE * 0.15723716631362761621,
240 	[38] = FSCALE * 0.14956861922263505264,
241 	[39] = FSCALE * 0.14227407158651357185,
242 	[40] = FSCALE * 0.13533528323661269189,
243 	[41] = FSCALE * 0.12873490358780421886,
244 	[42] = FSCALE * 0.12245642825298191021,
245 	[43] = FSCALE * 0.11648415777349695786,
246 	[44] = FSCALE * 0.11080315836233388333,
247 	[45] = FSCALE * 0.10539922456186433678,
248 	[46] = FSCALE * 0.10025884372280373372,
249 	[47] = FSCALE * 0.09536916221554961888,
250 	[48] = FSCALE * 0.09071795328941250337,
251 	[49] = FSCALE * 0.08629358649937051097,
252 	[50] = FSCALE * 0.08208499862389879516,
253 	[51] = FSCALE * 0.07808166600115315231,
254 	[52] = FSCALE * 0.07427357821433388042,
255 	[53] = FSCALE * 0.07065121306042958674,
256 	[54] = FSCALE * 0.06720551273974976512,
257 	[55] = FSCALE * 0.06392786120670757270,
258 	[56] = FSCALE * 0.06081006262521796499,
259 	[57] = FSCALE * 0.05784432087483846296,
260 	[58] = FSCALE * 0.05502322005640722902,
261 	[59] = FSCALE * 0.05233970594843239308,
262 	[60] = FSCALE * 0.04978706836786394297,
263 	[61] = FSCALE * 0.04735892439114092119,
264 	[62] = FSCALE * 0.04504920239355780606,
265 	[63] = FSCALE * 0.04285212686704017991,
266 	[64] = FSCALE * 0.04076220397836621516,
267 	[65] = FSCALE * 0.03877420783172200988,
268 	[66] = FSCALE * 0.03688316740124000544,
269 	[67] = FSCALE * 0.03508435410084502588,
270 	[68] = FSCALE * 0.03337326996032607948,
271 	[69] = FSCALE * 0.03174563637806794323,
272 	[70] = FSCALE * 0.03019738342231850073,
273 	[71] = FSCALE * 0.02872463965423942912,
274 	[72] = FSCALE * 0.02732372244729256080,
275 	[73] = FSCALE * 0.02599112877875534358,
276 	[74] = FSCALE * 0.02472352647033939120,
277 	[75] = FSCALE * 0.02351774585600910823,
278 	[76] = FSCALE * 0.02237077185616559577,
279 	[77] = FSCALE * 0.02127973643837716938,
280 	[78] = FSCALE * 0.02024191144580438847,
281 	[79] = FSCALE * 0.01925470177538692429,
282 	[80] = FSCALE * 0.01831563888873418029,
283 	[81] = FSCALE * 0.01742237463949351138,
284 	[82] = FSCALE * 0.01657267540176124754,
285 	[83] = FSCALE * 0.01576441648485449082,
286 	[84] = FSCALE * 0.01499557682047770621,
287 	[85] = FSCALE * 0.01426423390899925527,
288 	[86] = FSCALE * 0.01356855901220093175,
289 	[87] = FSCALE * 0.01290681258047986886,
290 	[88] = FSCALE * 0.01227733990306844117,
291 	[89] = FSCALE * 0.01167856697039544521,
292 	[90] = FSCALE * 0.01110899653824230649,
293 	[91] = FSCALE * 0.01056720438385265337,
294 	[92] = FSCALE * 0.01005183574463358164,
295 	[93] = FSCALE * 0.00956160193054350793,
296 	[94] = FSCALE * 0.00909527710169581709,
297 	[95] = FSCALE * 0.00865169520312063417,
298 	[96] = FSCALE * 0.00822974704902002884,
299 	[97] = FSCALE * 0.00782837754922577143,
300 	[98] = FSCALE * 0.00744658307092434051,
301 	[99] = FSCALE * 0.00708340892905212004,
302 	[100] = FSCALE * 0.00673794699908546709,
303 	[101] = FSCALE * 0.00640933344625638184,
304 	[102] = FSCALE * 0.00609674656551563610,
305 	[103] = FSCALE * 0.00579940472684214321,
306 	[104] = FSCALE * 0.00551656442076077241,
307 	[105] = FSCALE * 0.00524751839918138427,
308 	[106] = FSCALE * 0.00499159390691021621,
309 	[107] = FSCALE * 0.00474815099941147558,
310 	[108] = FSCALE * 0.00451658094261266798,
311 	[109] = FSCALE * 0.00429630469075234057,
312 	[110] = FSCALE * 0.00408677143846406699,
313 };
314 #endif
315 
316 #define	CCPU_EXP_MAX	110
317 
318 /*
319  * This function is analogical to the getpcpu() function in the ps(1) command.
320  * They should both calculate in the same way so that the racct %cpu
321  * calculations are consistent with the values showed by the ps(1) tool.
322  * The calculations are more complex in the 4BSD scheduler because of the value
323  * of the ccpu variable.  In ULE it is defined to be zero which saves us some
324  * work.
325  */
326 static uint64_t
327 racct_getpcpu(struct proc *p, u_int pcpu)
328 {
329 	u_int swtime;
330 #ifdef SCHED_4BSD
331 	fixpt_t pctcpu, pctcpu_next;
332 #endif
333 #ifdef SMP
334 	struct pcpu *pc;
335 	int found;
336 #endif
337 	fixpt_t p_pctcpu;
338 	struct thread *td;
339 
340 	ASSERT_RACCT_ENABLED();
341 
342 	/*
343 	 * If the process is swapped out, we count its %cpu usage as zero.
344 	 * This behaviour is consistent with the userland ps(1) tool.
345 	 */
346 	if ((p->p_flag & P_INMEM) == 0)
347 		return (0);
348 	swtime = (ticks - p->p_swtick) / hz;
349 
350 	/*
351 	 * For short-lived processes, the sched_pctcpu() returns small
352 	 * values even for cpu intensive processes.  Therefore we use
353 	 * our own estimate in this case.
354 	 */
355 	if (swtime < RACCT_PCPU_SECS)
356 		return (pcpu);
357 
358 	p_pctcpu = 0;
359 	FOREACH_THREAD_IN_PROC(p, td) {
360 		if (td == PCPU_GET(idlethread))
361 			continue;
362 #ifdef SMP
363 		found = 0;
364 		STAILQ_FOREACH(pc, &cpuhead, pc_allcpu) {
365 			if (td == pc->pc_idlethread) {
366 				found = 1;
367 				break;
368 			}
369 		}
370 		if (found)
371 			continue;
372 #endif
373 		thread_lock(td);
374 #ifdef SCHED_4BSD
375 		pctcpu = sched_pctcpu(td);
376 		/* Count also the yet unfinished second. */
377 		pctcpu_next = (pctcpu * ccpu_exp[1]) >> FSHIFT;
378 		pctcpu_next += sched_pctcpu_delta(td);
379 		p_pctcpu += max(pctcpu, pctcpu_next);
380 #else
381 		/*
382 		 * In ULE the %cpu statistics are updated on every
383 		 * sched_pctcpu() call.  So special calculations to
384 		 * account for the latest (unfinished) second are
385 		 * not needed.
386 		 */
387 		p_pctcpu += sched_pctcpu(td);
388 #endif
389 		thread_unlock(td);
390 	}
391 
392 #ifdef SCHED_4BSD
393 	if (swtime <= CCPU_EXP_MAX)
394 		return ((100 * (uint64_t)p_pctcpu * 1000000) /
395 		    (FSCALE - ccpu_exp[swtime]));
396 #endif
397 
398 	return ((100 * (uint64_t)p_pctcpu * 1000000) / FSCALE);
399 }
400 
401 static void
402 racct_add_racct(struct racct *dest, const struct racct *src)
403 {
404 	int i;
405 
406 	ASSERT_RACCT_ENABLED();
407 	RACCT_LOCK_ASSERT();
408 
409 	/*
410 	 * Update resource usage in dest.
411 	 */
412 	for (i = 0; i <= RACCT_MAX; i++) {
413 		KASSERT(dest->r_resources[i] >= 0,
414 		    ("%s: resource %d propagation meltdown: dest < 0",
415 		    __func__, i));
416 		KASSERT(src->r_resources[i] >= 0,
417 		    ("%s: resource %d propagation meltdown: src < 0",
418 		    __func__, i));
419 		dest->r_resources[i] += src->r_resources[i];
420 	}
421 }
422 
423 static void
424 racct_sub_racct(struct racct *dest, const struct racct *src)
425 {
426 	int i;
427 
428 	ASSERT_RACCT_ENABLED();
429 	RACCT_LOCK_ASSERT();
430 
431 	/*
432 	 * Update resource usage in dest.
433 	 */
434 	for (i = 0; i <= RACCT_MAX; i++) {
435 		if (!RACCT_IS_SLOPPY(i) && !RACCT_IS_DECAYING(i)) {
436 			KASSERT(dest->r_resources[i] >= 0,
437 			    ("%s: resource %d propagation meltdown: dest < 0",
438 			    __func__, i));
439 			KASSERT(src->r_resources[i] >= 0,
440 			    ("%s: resource %d propagation meltdown: src < 0",
441 			    __func__, i));
442 			KASSERT(src->r_resources[i] <= dest->r_resources[i],
443 			    ("%s: resource %d propagation meltdown: src > dest",
444 			    __func__, i));
445 		}
446 		if (RACCT_CAN_DROP(i)) {
447 			dest->r_resources[i] -= src->r_resources[i];
448 			if (dest->r_resources[i] < 0) {
449 				KASSERT(RACCT_IS_SLOPPY(i) ||
450 				    RACCT_IS_DECAYING(i),
451 				    ("%s: resource %d usage < 0", __func__, i));
452 				dest->r_resources[i] = 0;
453 			}
454 		}
455 	}
456 }
457 
458 void
459 racct_create(struct racct **racctp)
460 {
461 
462 	if (!racct_enable)
463 		return;
464 
465 	SDT_PROBE1(racct, , racct, create, racctp);
466 
467 	KASSERT(*racctp == NULL, ("racct already allocated"));
468 
469 	*racctp = uma_zalloc(racct_zone, M_WAITOK | M_ZERO);
470 }
471 
472 static void
473 racct_destroy_locked(struct racct **racctp)
474 {
475 	struct racct *racct;
476 	int i;
477 
478 	ASSERT_RACCT_ENABLED();
479 
480 	SDT_PROBE1(racct, , racct, destroy, racctp);
481 
482 	RACCT_LOCK_ASSERT();
483 	KASSERT(racctp != NULL, ("NULL racctp"));
484 	KASSERT(*racctp != NULL, ("NULL racct"));
485 
486 	racct = *racctp;
487 
488 	for (i = 0; i <= RACCT_MAX; i++) {
489 		if (RACCT_IS_SLOPPY(i))
490 			continue;
491 		if (!RACCT_IS_RECLAIMABLE(i))
492 			continue;
493 		KASSERT(racct->r_resources[i] == 0,
494 		    ("destroying non-empty racct: "
495 		    "%ju allocated for resource %d\n",
496 		    racct->r_resources[i], i));
497 	}
498 	uma_zfree(racct_zone, racct);
499 	*racctp = NULL;
500 }
501 
502 void
503 racct_destroy(struct racct **racct)
504 {
505 
506 	if (!racct_enable)
507 		return;
508 
509 	RACCT_LOCK();
510 	racct_destroy_locked(racct);
511 	RACCT_UNLOCK();
512 }
513 
514 /*
515  * Increase consumption of 'resource' by 'amount' for 'racct',
516  * but not its parents.  Differently from other cases, 'amount' here
517  * may be less than zero.
518  */
519 static void
520 racct_adjust_resource(struct racct *racct, int resource,
521     int64_t amount)
522 {
523 
524 	ASSERT_RACCT_ENABLED();
525 	RACCT_LOCK_ASSERT();
526 	KASSERT(racct != NULL, ("NULL racct"));
527 
528 	racct->r_resources[resource] += amount;
529 	if (racct->r_resources[resource] < 0) {
530 		KASSERT(RACCT_IS_SLOPPY(resource) || RACCT_IS_DECAYING(resource),
531 		    ("%s: resource %d usage < 0", __func__, resource));
532 		racct->r_resources[resource] = 0;
533 	}
534 
535 	/*
536 	 * There are some cases where the racct %cpu resource would grow
537 	 * beyond 100% per core.  For example in racct_proc_exit() we add
538 	 * the process %cpu usage to the ucred racct containers.  If too
539 	 * many processes terminated in a short time span, the ucred %cpu
540 	 * resource could grow too much.  Also, the 4BSD scheduler sometimes
541 	 * returns for a thread more than 100% cpu usage. So we set a sane
542 	 * boundary here to 100% * the maxumum number of CPUs.
543 	 */
544 	if ((resource == RACCT_PCTCPU) &&
545 	    (racct->r_resources[RACCT_PCTCPU] > 100 * 1000000 * (int64_t)MAXCPU))
546 		racct->r_resources[RACCT_PCTCPU] = 100 * 1000000 * (int64_t)MAXCPU;
547 }
548 
549 static int
550 racct_add_locked(struct proc *p, int resource, uint64_t amount, int force)
551 {
552 #ifdef RCTL
553 	int error;
554 #endif
555 
556 	ASSERT_RACCT_ENABLED();
557 
558 	/*
559 	 * We need proc lock to dereference p->p_ucred.
560 	 */
561 	PROC_LOCK_ASSERT(p, MA_OWNED);
562 
563 #ifdef RCTL
564 	error = rctl_enforce(p, resource, amount);
565 	if (error && !force && RACCT_IS_DENIABLE(resource)) {
566 		SDT_PROBE3(racct, , rusage, add__failure, p, resource, amount);
567 		return (error);
568 	}
569 #endif
570 	racct_adjust_resource(p->p_racct, resource, amount);
571 	racct_add_cred_locked(p->p_ucred, resource, amount);
572 
573 	return (0);
574 }
575 
576 /*
577  * Increase allocation of 'resource' by 'amount' for process 'p'.
578  * Return 0 if it's below limits, or errno, if it's not.
579  */
580 int
581 racct_add(struct proc *p, int resource, uint64_t amount)
582 {
583 	int error;
584 
585 	if (!racct_enable)
586 		return (0);
587 
588 	SDT_PROBE3(racct, , rusage, add, p, resource, amount);
589 
590 	RACCT_LOCK();
591 	error = racct_add_locked(p, resource, amount, 0);
592 	RACCT_UNLOCK();
593 	return (error);
594 }
595 
596 /*
597  * Increase allocation of 'resource' by 'amount' for process 'p'.
598  * Doesn't check for limits and never fails.
599  */
600 void
601 racct_add_force(struct proc *p, int resource, uint64_t amount)
602 {
603 
604 	if (!racct_enable)
605 		return;
606 
607 	SDT_PROBE3(racct, , rusage, add__force, p, resource, amount);
608 
609 	RACCT_LOCK();
610 	racct_add_locked(p, resource, amount, 1);
611 	RACCT_UNLOCK();
612 }
613 
614 static void
615 racct_add_cred_locked(struct ucred *cred, int resource, uint64_t amount)
616 {
617 	struct prison *pr;
618 
619 	ASSERT_RACCT_ENABLED();
620 
621 	SDT_PROBE3(racct, , rusage, add__cred, cred, resource, amount);
622 
623 	racct_adjust_resource(cred->cr_ruidinfo->ui_racct, resource, amount);
624 	for (pr = cred->cr_prison; pr != NULL; pr = pr->pr_parent)
625 		racct_adjust_resource(pr->pr_prison_racct->prr_racct, resource,
626 		    amount);
627 	racct_adjust_resource(cred->cr_loginclass->lc_racct, resource, amount);
628 }
629 
630 /*
631  * Increase allocation of 'resource' by 'amount' for credential 'cred'.
632  * Doesn't check for limits and never fails.
633  */
634 void
635 racct_add_cred(struct ucred *cred, int resource, uint64_t amount)
636 {
637 
638 	if (!racct_enable)
639 		return;
640 
641 	RACCT_LOCK();
642 	racct_add_cred_locked(cred, resource, amount);
643 	RACCT_UNLOCK();
644 }
645 
646 /*
647  * Account for disk IO resource consumption.  Checks for limits,
648  * but never fails, due to disk limits being undeniable.
649  */
650 void
651 racct_add_buf(struct proc *p, const struct buf *bp, int is_write)
652 {
653 
654 	ASSERT_RACCT_ENABLED();
655 	PROC_LOCK_ASSERT(p, MA_OWNED);
656 
657 	RACCT_LOCK();
658 	if (is_write) {
659 		racct_add_locked(curproc, RACCT_WRITEBPS, bp->b_bcount, 1);
660 		racct_add_locked(curproc, RACCT_WRITEIOPS, 1, 1);
661 	} else {
662 		racct_add_locked(curproc, RACCT_READBPS, bp->b_bcount, 1);
663 		racct_add_locked(curproc, RACCT_READIOPS, 1, 1);
664 	}
665 	RACCT_UNLOCK();
666 }
667 
668 static int
669 racct_set_locked(struct proc *p, int resource, uint64_t amount, int force)
670 {
671 	int64_t old_amount, decayed_amount, diff_proc, diff_cred;
672 #ifdef RCTL
673 	int error;
674 #endif
675 
676 	ASSERT_RACCT_ENABLED();
677 
678 	/*
679 	 * We need proc lock to dereference p->p_ucred.
680 	 */
681 	PROC_LOCK_ASSERT(p, MA_OWNED);
682 
683 	old_amount = p->p_racct->r_resources[resource];
684 	/*
685 	 * The diffs may be negative.
686 	 */
687 	diff_proc = amount - old_amount;
688 	if (resource == RACCT_PCTCPU) {
689 		/*
690 		 * Resources in per-credential racct containers may decay.
691 		 * If this is the case, we need to calculate the difference
692 		 * between the new amount and the proportional value of the
693 		 * old amount that has decayed in the ucred racct containers.
694 		 */
695 		decayed_amount = old_amount * RACCT_DECAY_FACTOR / FSCALE;
696 		diff_cred = amount - decayed_amount;
697 	} else
698 		diff_cred = diff_proc;
699 #ifdef notyet
700 	KASSERT(diff_proc >= 0 || RACCT_CAN_DROP(resource),
701 	    ("%s: usage of non-droppable resource %d dropping", __func__,
702 	     resource));
703 #endif
704 #ifdef RCTL
705 	if (diff_proc > 0) {
706 		error = rctl_enforce(p, resource, diff_proc);
707 		if (error && !force && RACCT_IS_DENIABLE(resource)) {
708 			SDT_PROBE3(racct, , rusage, set__failure, p, resource,
709 			    amount);
710 			return (error);
711 		}
712 	}
713 #endif
714 	racct_adjust_resource(p->p_racct, resource, diff_proc);
715 	if (diff_cred > 0)
716 		racct_add_cred_locked(p->p_ucred, resource, diff_cred);
717 	else if (diff_cred < 0)
718 		racct_sub_cred_locked(p->p_ucred, resource, -diff_cred);
719 
720 	return (0);
721 }
722 
723 /*
724  * Set allocation of 'resource' to 'amount' for process 'p'.
725  * Return 0 if it's below limits, or errno, if it's not.
726  *
727  * Note that decreasing the allocation always returns 0,
728  * even if it's above the limit.
729  */
730 int
731 racct_set(struct proc *p, int resource, uint64_t amount)
732 {
733 	int error;
734 
735 	if (!racct_enable)
736 		return (0);
737 
738 	SDT_PROBE3(racct, , rusage, set__force, p, resource, amount);
739 
740 	RACCT_LOCK();
741 	error = racct_set_locked(p, resource, amount, 0);
742 	RACCT_UNLOCK();
743 	return (error);
744 }
745 
746 void
747 racct_set_force(struct proc *p, int resource, uint64_t amount)
748 {
749 
750 	if (!racct_enable)
751 		return;
752 
753 	SDT_PROBE3(racct, , rusage, set, p, resource, amount);
754 
755 	RACCT_LOCK();
756 	racct_set_locked(p, resource, amount, 1);
757 	RACCT_UNLOCK();
758 }
759 
760 /*
761  * Returns amount of 'resource' the process 'p' can keep allocated.
762  * Allocating more than that would be denied, unless the resource
763  * is marked undeniable.  Amount of already allocated resource does
764  * not matter.
765  */
766 uint64_t
767 racct_get_limit(struct proc *p, int resource)
768 {
769 
770 	if (!racct_enable)
771 		return (UINT64_MAX);
772 
773 #ifdef RCTL
774 	return (rctl_get_limit(p, resource));
775 #else
776 	return (UINT64_MAX);
777 #endif
778 }
779 
780 /*
781  * Returns amount of 'resource' the process 'p' can keep allocated.
782  * Allocating more than that would be denied, unless the resource
783  * is marked undeniable.  Amount of already allocated resource does
784  * matter.
785  */
786 uint64_t
787 racct_get_available(struct proc *p, int resource)
788 {
789 
790 	if (!racct_enable)
791 		return (UINT64_MAX);
792 
793 #ifdef RCTL
794 	return (rctl_get_available(p, resource));
795 #else
796 	return (UINT64_MAX);
797 #endif
798 }
799 
800 /*
801  * Returns amount of the %cpu resource that process 'p' can add to its %cpu
802  * utilization.  Adding more than that would lead to the process being
803  * throttled.
804  */
805 static int64_t
806 racct_pcpu_available(struct proc *p)
807 {
808 
809 	ASSERT_RACCT_ENABLED();
810 
811 #ifdef RCTL
812 	return (rctl_pcpu_available(p));
813 #else
814 	return (INT64_MAX);
815 #endif
816 }
817 
818 /*
819  * Decrease allocation of 'resource' by 'amount' for process 'p'.
820  */
821 void
822 racct_sub(struct proc *p, int resource, uint64_t amount)
823 {
824 
825 	if (!racct_enable)
826 		return;
827 
828 	SDT_PROBE3(racct, , rusage, sub, p, resource, amount);
829 
830 	/*
831 	 * We need proc lock to dereference p->p_ucred.
832 	 */
833 	PROC_LOCK_ASSERT(p, MA_OWNED);
834 	KASSERT(RACCT_CAN_DROP(resource),
835 	    ("%s: called for non-droppable resource %d", __func__, resource));
836 
837 	RACCT_LOCK();
838 	KASSERT(amount <= p->p_racct->r_resources[resource],
839 	    ("%s: freeing %ju of resource %d, which is more "
840 	     "than allocated %jd for %s (pid %d)", __func__, amount, resource,
841 	    (intmax_t)p->p_racct->r_resources[resource], p->p_comm, p->p_pid));
842 
843 	racct_adjust_resource(p->p_racct, resource, -amount);
844 	racct_sub_cred_locked(p->p_ucred, resource, amount);
845 	RACCT_UNLOCK();
846 }
847 
848 static void
849 racct_sub_cred_locked(struct ucred *cred, int resource, uint64_t amount)
850 {
851 	struct prison *pr;
852 
853 	ASSERT_RACCT_ENABLED();
854 
855 	SDT_PROBE3(racct, , rusage, sub__cred, cred, resource, amount);
856 
857 #ifdef notyet
858 	KASSERT(RACCT_CAN_DROP(resource),
859 	    ("%s: called for resource %d which can not drop", __func__,
860 	     resource));
861 #endif
862 
863 	racct_adjust_resource(cred->cr_ruidinfo->ui_racct, resource, -amount);
864 	for (pr = cred->cr_prison; pr != NULL; pr = pr->pr_parent)
865 		racct_adjust_resource(pr->pr_prison_racct->prr_racct, resource,
866 		    -amount);
867 	racct_adjust_resource(cred->cr_loginclass->lc_racct, resource, -amount);
868 }
869 
870 /*
871  * Decrease allocation of 'resource' by 'amount' for credential 'cred'.
872  */
873 void
874 racct_sub_cred(struct ucred *cred, int resource, uint64_t amount)
875 {
876 
877 	if (!racct_enable)
878 		return;
879 
880 	RACCT_LOCK();
881 	racct_sub_cred_locked(cred, resource, amount);
882 	RACCT_UNLOCK();
883 }
884 
885 /*
886  * Inherit resource usage information from the parent process.
887  */
888 int
889 racct_proc_fork(struct proc *parent, struct proc *child)
890 {
891 	int i, error = 0;
892 
893 	if (!racct_enable)
894 		return (0);
895 
896 	/*
897 	 * Create racct for the child process.
898 	 */
899 	racct_create(&child->p_racct);
900 
901 	PROC_LOCK(parent);
902 	PROC_LOCK(child);
903 	RACCT_LOCK();
904 
905 #ifdef RCTL
906 	error = rctl_proc_fork(parent, child);
907 	if (error != 0)
908 		goto out;
909 #endif
910 
911 	/* Init process cpu time. */
912 	child->p_prev_runtime = 0;
913 	child->p_throttled = 0;
914 
915 	/*
916 	 * Inherit resource usage.
917 	 */
918 	for (i = 0; i <= RACCT_MAX; i++) {
919 		if (parent->p_racct->r_resources[i] == 0 ||
920 		    !RACCT_IS_INHERITABLE(i))
921 			continue;
922 
923 		error = racct_set_locked(child, i,
924 		    parent->p_racct->r_resources[i], 0);
925 		if (error != 0)
926 			goto out;
927 	}
928 
929 	error = racct_add_locked(child, RACCT_NPROC, 1, 0);
930 	error += racct_add_locked(child, RACCT_NTHR, 1, 0);
931 
932 out:
933 	RACCT_UNLOCK();
934 	PROC_UNLOCK(child);
935 	PROC_UNLOCK(parent);
936 
937 	if (error != 0)
938 		racct_proc_exit(child);
939 
940 	return (error);
941 }
942 
943 /*
944  * Called at the end of fork1(), to handle rules that require the process
945  * to be fully initialized.
946  */
947 void
948 racct_proc_fork_done(struct proc *child)
949 {
950 
951 	PROC_LOCK_ASSERT(child, MA_OWNED);
952 #ifdef RCTL
953 	if (!racct_enable)
954 		return;
955 
956 	RACCT_LOCK();
957 	rctl_enforce(child, RACCT_NPROC, 0);
958 	rctl_enforce(child, RACCT_NTHR, 0);
959 	RACCT_UNLOCK();
960 #endif
961 }
962 
963 void
964 racct_proc_exit(struct proc *p)
965 {
966 	struct timeval wallclock;
967 	uint64_t pct_estimate, pct, runtime;
968 	int i;
969 
970 	if (!racct_enable)
971 		return;
972 
973 	PROC_LOCK(p);
974 	/*
975 	 * We don't need to calculate rux, proc_reap() has already done this.
976 	 */
977 	runtime = cputick2usec(p->p_rux.rux_runtime);
978 #ifdef notyet
979 	KASSERT(runtime >= p->p_prev_runtime, ("runtime < p_prev_runtime"));
980 #else
981 	if (runtime < p->p_prev_runtime)
982 		runtime = p->p_prev_runtime;
983 #endif
984 	microuptime(&wallclock);
985 	timevalsub(&wallclock, &p->p_stats->p_start);
986 	if (wallclock.tv_sec > 0 || wallclock.tv_usec > 0) {
987 		pct_estimate = (1000000 * runtime * 100) /
988 		    ((uint64_t)wallclock.tv_sec * 1000000 +
989 		    wallclock.tv_usec);
990 	} else
991 		pct_estimate = 0;
992 	pct = racct_getpcpu(p, pct_estimate);
993 
994 	RACCT_LOCK();
995 	racct_set_locked(p, RACCT_CPU, runtime, 0);
996 	racct_add_cred_locked(p->p_ucred, RACCT_PCTCPU, pct);
997 
998 	for (i = 0; i <= RACCT_MAX; i++) {
999 		if (p->p_racct->r_resources[i] == 0)
1000 			continue;
1001 	    	if (!RACCT_IS_RECLAIMABLE(i))
1002 			continue;
1003 		racct_set_locked(p, i, 0, 0);
1004 	}
1005 
1006 	RACCT_UNLOCK();
1007 	PROC_UNLOCK(p);
1008 
1009 #ifdef RCTL
1010 	rctl_racct_release(p->p_racct);
1011 #endif
1012 	racct_destroy(&p->p_racct);
1013 }
1014 
1015 /*
1016  * Called after credentials change, to move resource utilisation
1017  * between raccts.
1018  */
1019 void
1020 racct_proc_ucred_changed(struct proc *p, struct ucred *oldcred,
1021     struct ucred *newcred)
1022 {
1023 	struct uidinfo *olduip, *newuip;
1024 	struct loginclass *oldlc, *newlc;
1025 	struct prison *oldpr, *newpr, *pr;
1026 
1027 	if (!racct_enable)
1028 		return;
1029 
1030 	PROC_LOCK_ASSERT(p, MA_NOTOWNED);
1031 
1032 	newuip = newcred->cr_ruidinfo;
1033 	olduip = oldcred->cr_ruidinfo;
1034 	newlc = newcred->cr_loginclass;
1035 	oldlc = oldcred->cr_loginclass;
1036 	newpr = newcred->cr_prison;
1037 	oldpr = oldcred->cr_prison;
1038 
1039 	RACCT_LOCK();
1040 	if (newuip != olduip) {
1041 		racct_sub_racct(olduip->ui_racct, p->p_racct);
1042 		racct_add_racct(newuip->ui_racct, p->p_racct);
1043 	}
1044 	if (newlc != oldlc) {
1045 		racct_sub_racct(oldlc->lc_racct, p->p_racct);
1046 		racct_add_racct(newlc->lc_racct, p->p_racct);
1047 	}
1048 	if (newpr != oldpr) {
1049 		for (pr = oldpr; pr != NULL; pr = pr->pr_parent)
1050 			racct_sub_racct(pr->pr_prison_racct->prr_racct,
1051 			    p->p_racct);
1052 		for (pr = newpr; pr != NULL; pr = pr->pr_parent)
1053 			racct_add_racct(pr->pr_prison_racct->prr_racct,
1054 			    p->p_racct);
1055 	}
1056 	RACCT_UNLOCK();
1057 
1058 #ifdef RCTL
1059 	rctl_proc_ucred_changed(p, newcred);
1060 #endif
1061 }
1062 
1063 void
1064 racct_move(struct racct *dest, struct racct *src)
1065 {
1066 
1067 	ASSERT_RACCT_ENABLED();
1068 
1069 	RACCT_LOCK();
1070 	racct_add_racct(dest, src);
1071 	racct_sub_racct(src, src);
1072 	RACCT_UNLOCK();
1073 }
1074 
1075 /*
1076  * Make the process sleep in userret() for 'timeout' ticks.  Setting
1077  * timeout to -1 makes it sleep until woken up by racct_proc_wakeup().
1078  */
1079 void
1080 racct_proc_throttle(struct proc *p, int timeout)
1081 {
1082 	struct thread *td;
1083 #ifdef SMP
1084 	int cpuid;
1085 #endif
1086 
1087 	KASSERT(timeout != 0, ("timeout %d", timeout));
1088 	ASSERT_RACCT_ENABLED();
1089 	PROC_LOCK_ASSERT(p, MA_OWNED);
1090 
1091 	/*
1092 	 * Do not block kernel processes.  Also do not block processes with
1093 	 * low %cpu utilization to improve interactivity.
1094 	 */
1095 	if ((p->p_flag & (P_SYSTEM | P_KPROC)) != 0)
1096 		return;
1097 
1098 	if (p->p_throttled < 0 || (timeout > 0 && p->p_throttled > timeout))
1099 		return;
1100 
1101 	p->p_throttled = timeout;
1102 
1103 	FOREACH_THREAD_IN_PROC(p, td) {
1104 		thread_lock(td);
1105 		switch (td->td_state) {
1106 		case TDS_RUNQ:
1107 			/*
1108 			 * If the thread is on the scheduler run-queue, we can
1109 			 * not just remove it from there.  So we set the flag
1110 			 * TDF_NEEDRESCHED for the thread, so that once it is
1111 			 * running, it is taken off the cpu as soon as possible.
1112 			 */
1113 			td->td_flags |= TDF_NEEDRESCHED;
1114 			break;
1115 		case TDS_RUNNING:
1116 			/*
1117 			 * If the thread is running, we request a context
1118 			 * switch for it by setting the TDF_NEEDRESCHED flag.
1119 			 */
1120 			td->td_flags |= TDF_NEEDRESCHED;
1121 #ifdef SMP
1122 			cpuid = td->td_oncpu;
1123 			if ((cpuid != NOCPU) && (td != curthread))
1124 				ipi_cpu(cpuid, IPI_AST);
1125 #endif
1126 			break;
1127 		default:
1128 			break;
1129 		}
1130 		thread_unlock(td);
1131 	}
1132 }
1133 
1134 static void
1135 racct_proc_wakeup(struct proc *p)
1136 {
1137 
1138 	ASSERT_RACCT_ENABLED();
1139 
1140 	PROC_LOCK_ASSERT(p, MA_OWNED);
1141 
1142 	if (p->p_throttled != 0) {
1143 		p->p_throttled = 0;
1144 		wakeup(p->p_racct);
1145 	}
1146 }
1147 
1148 static void
1149 racct_decay_callback(struct racct *racct, void *dummy1, void *dummy2)
1150 {
1151 	int64_t r_old, r_new;
1152 
1153 	ASSERT_RACCT_ENABLED();
1154 	RACCT_LOCK_ASSERT();
1155 
1156 #ifdef RCTL
1157 	rctl_throttle_decay(racct, RACCT_READBPS);
1158 	rctl_throttle_decay(racct, RACCT_WRITEBPS);
1159 	rctl_throttle_decay(racct, RACCT_READIOPS);
1160 	rctl_throttle_decay(racct, RACCT_WRITEIOPS);
1161 #endif
1162 
1163 	r_old = racct->r_resources[RACCT_PCTCPU];
1164 
1165 	/* If there is nothing to decay, just exit. */
1166 	if (r_old <= 0)
1167 		return;
1168 
1169 	r_new = r_old * RACCT_DECAY_FACTOR / FSCALE;
1170 	racct->r_resources[RACCT_PCTCPU] = r_new;
1171 }
1172 
1173 static void
1174 racct_decay_pre(void)
1175 {
1176 
1177 	RACCT_LOCK();
1178 }
1179 
1180 static void
1181 racct_decay_post(void)
1182 {
1183 
1184 	RACCT_UNLOCK();
1185 }
1186 
1187 static void
1188 racct_decay(void)
1189 {
1190 
1191 	ASSERT_RACCT_ENABLED();
1192 
1193 	ui_racct_foreach(racct_decay_callback, racct_decay_pre,
1194 	    racct_decay_post, NULL, NULL);
1195 	loginclass_racct_foreach(racct_decay_callback, racct_decay_pre,
1196 	    racct_decay_post, NULL, NULL);
1197 	prison_racct_foreach(racct_decay_callback, racct_decay_pre,
1198 	    racct_decay_post, NULL, NULL);
1199 }
1200 
1201 static void
1202 racctd(void)
1203 {
1204 	struct thread *td;
1205 	struct proc *p;
1206 	struct timeval wallclock;
1207 	uint64_t pct, pct_estimate, runtime;
1208 
1209 	ASSERT_RACCT_ENABLED();
1210 
1211 	for (;;) {
1212 		racct_decay();
1213 
1214 		sx_slock(&allproc_lock);
1215 
1216 		LIST_FOREACH(p, &zombproc, p_list) {
1217 			PROC_LOCK(p);
1218 			racct_set(p, RACCT_PCTCPU, 0);
1219 			PROC_UNLOCK(p);
1220 		}
1221 
1222 		FOREACH_PROC_IN_SYSTEM(p) {
1223 			PROC_LOCK(p);
1224 			if (p->p_state != PRS_NORMAL) {
1225 				PROC_UNLOCK(p);
1226 				continue;
1227 			}
1228 
1229 			microuptime(&wallclock);
1230 			timevalsub(&wallclock, &p->p_stats->p_start);
1231 			PROC_STATLOCK(p);
1232 			FOREACH_THREAD_IN_PROC(p, td)
1233 				ruxagg(p, td);
1234 			runtime = cputick2usec(p->p_rux.rux_runtime);
1235 			PROC_STATUNLOCK(p);
1236 #ifdef notyet
1237 			KASSERT(runtime >= p->p_prev_runtime,
1238 			    ("runtime < p_prev_runtime"));
1239 #else
1240 			if (runtime < p->p_prev_runtime)
1241 				runtime = p->p_prev_runtime;
1242 #endif
1243 			p->p_prev_runtime = runtime;
1244 			if (wallclock.tv_sec > 0 || wallclock.tv_usec > 0) {
1245 				pct_estimate = (1000000 * runtime * 100) /
1246 				    ((uint64_t)wallclock.tv_sec * 1000000 +
1247 				    wallclock.tv_usec);
1248 			} else
1249 				pct_estimate = 0;
1250 			pct = racct_getpcpu(p, pct_estimate);
1251 			RACCT_LOCK();
1252 #ifdef RCTL
1253 			rctl_throttle_decay(p->p_racct, RACCT_READBPS);
1254 			rctl_throttle_decay(p->p_racct, RACCT_WRITEBPS);
1255 			rctl_throttle_decay(p->p_racct, RACCT_READIOPS);
1256 			rctl_throttle_decay(p->p_racct, RACCT_WRITEIOPS);
1257 #endif
1258 			racct_set_locked(p, RACCT_PCTCPU, pct, 1);
1259 			racct_set_locked(p, RACCT_CPU, runtime, 0);
1260 			racct_set_locked(p, RACCT_WALLCLOCK,
1261 			    (uint64_t)wallclock.tv_sec * 1000000 +
1262 			    wallclock.tv_usec, 0);
1263 			RACCT_UNLOCK();
1264 			PROC_UNLOCK(p);
1265 		}
1266 
1267 		/*
1268 		 * To ensure that processes are throttled in a fair way, we need
1269 		 * to iterate over all processes again and check the limits
1270 		 * for %cpu resource only after ucred racct containers have been
1271 		 * properly filled.
1272 		 */
1273 		FOREACH_PROC_IN_SYSTEM(p) {
1274 			PROC_LOCK(p);
1275 			if (p->p_state != PRS_NORMAL) {
1276 				PROC_UNLOCK(p);
1277 				continue;
1278 			}
1279 
1280 			if (racct_pcpu_available(p) <= 0) {
1281 				if (p->p_racct->r_resources[RACCT_PCTCPU] >
1282 				    pcpu_threshold)
1283 					racct_proc_throttle(p, -1);
1284 			} else if (p->p_throttled == -1) {
1285 				racct_proc_wakeup(p);
1286 			}
1287 			PROC_UNLOCK(p);
1288 		}
1289 		sx_sunlock(&allproc_lock);
1290 		pause("-", hz);
1291 	}
1292 }
1293 
1294 static struct kproc_desc racctd_kp = {
1295 	"racctd",
1296 	racctd,
1297 	NULL
1298 };
1299 
1300 static void
1301 racctd_init(void)
1302 {
1303 	if (!racct_enable)
1304 		return;
1305 
1306 	kproc_start(&racctd_kp);
1307 }
1308 SYSINIT(racctd, SI_SUB_RACCTD, SI_ORDER_FIRST, racctd_init, NULL);
1309 
1310 static void
1311 racct_init(void)
1312 {
1313 	if (!racct_enable)
1314 		return;
1315 
1316 	racct_zone = uma_zcreate("racct", sizeof(struct racct),
1317 	    NULL, NULL, NULL, NULL, UMA_ALIGN_PTR, 0);
1318 	/*
1319 	 * XXX: Move this somewhere.
1320 	 */
1321 	prison0.pr_prison_racct = prison_racct_find("0");
1322 }
1323 SYSINIT(racct, SI_SUB_RACCT, SI_ORDER_FIRST, racct_init, NULL);
1324 
1325 #endif /* !RACCT */
1326