From owner-p4-projects@FreeBSD.ORG Sun Oct 11 15:48:37 2009 Return-Path: Delivered-To: p4-projects@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 32767) id BDF1B106568B; Sun, 11 Oct 2009 15:48:37 +0000 (UTC) Delivered-To: perforce@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 68C241065670 for ; Sun, 11 Oct 2009 15:48:37 +0000 (UTC) (envelope-from trasz@freebsd.org) Received: from repoman.freebsd.org (repoman.freebsd.org [IPv6:2001:4f8:fff6::29]) by mx1.freebsd.org (Postfix) with ESMTP id 222188FC13 for ; Sun, 11 Oct 2009 15:48:37 +0000 (UTC) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.14.3/8.14.3) with ESMTP id n9BFmaf0041476 for ; Sun, 11 Oct 2009 15:48:36 GMT (envelope-from trasz@freebsd.org) Received: (from perforce@localhost) by repoman.freebsd.org (8.14.3/8.14.3/Submit) id n9BFmapx041474 for perforce@freebsd.org; Sun, 11 Oct 2009 15:48:36 GMT (envelope-from trasz@freebsd.org) Date: Sun, 11 Oct 2009 15:48:36 GMT Message-Id: <200910111548.n9BFmapx041474@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: perforce set sender to trasz@freebsd.org using -f From: Edward Tomasz Napierala To: Perforce Change Reviews Cc: Subject: PERFORCE change 169399 for review X-BeenThere: p4-projects@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: p4 projects tree changes List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Oct 2009 15:48:38 -0000 http://perforce.freebsd.org/chv.cgi?CH=169399 Change 169399 by trasz@trasz_victim on 2009/10/11 15:48:10 Move two routines; no functional changes. Affected files ... .. //depot/projects/soc2009/trasz_limits/sys/kern/kern_hrl.c#69 edit Differences ... ==== //depot/projects/soc2009/trasz_limits/sys/kern/kern_hrl.c#69 (text+ko) ==== @@ -114,57 +114,6 @@ MALLOC_DEFINE(M_HRL, "hrl", "Hierarchical Resource Limits"); -#ifdef DIAGNOSTIC -/* - * Go through the resource usage info and verify that it makes sense. - */ -static void -hrl_assert_proc(const struct proc *p __unused) -{ - int resource; - struct ucred *cred; - struct prison *pr; - - cred = p->p_ucred; - mtx_assert(&hrl_lock, MA_OWNED); - for (resource = 0; resource <= HRL_RESOURCE_MAX; resource++) - KASSERT(p->p_container.hc_resources[resource] >= 0, - ("resource usage propagation meltdown")); - KASSERT(cred->cr_ruidinfo->ui_container.hc_resources[resource] >= 0, - ("resource usage propagation meltdown")); - KASSERT(cred->cr_ruidinfo->ui_container.hc_resources[resource] >= - p->p_container.hc_resources[resource], - ("resource usage propagation meltdown")); - for (pr = cred->cr_prison; pr != NULL; pr = pr->pr_parent) { - KASSERT(pr->pr_container.hc_resources[resource] >= 0, - ("resource usage propagation meltdown")); - KASSERT(pr->pr_container.hc_resources[resource] >= - p->p_container.hc_resources[resource], - ("resource usage propagation meltdown")); - } -} -#endif /* DIAGNOSTIC */ - -void -hrl_proc_exiting(struct proc *p) -{ - int i; - - /* - * XXX: Free these three some other way. - */ - hrl_allocated(p, HRL_RESOURCE_FILESIZE, 0); - hrl_allocated(p, HRL_RESOURCE_COREDUMPSIZE, 0); - hrl_allocated(p, HRL_RESOURCE_PTY, 0); - - mtx_lock(&hrl_lock); - for (i = 0; i <= HRL_RESOURCE_MAX; i++) { - KASSERT(p->p_container.hc_resources[i] == 0, - ("dead process still holding resources")); - } - mtx_unlock(&hrl_lock); -} - static int hrl_resource_inheritable(int resource) { @@ -437,7 +386,38 @@ } } +#ifdef DIAGNOSTIC +/* + * Go through the resource usage info and verify that it makes sense. + */ static void +hrl_assert_proc(const struct proc *p __unused) +{ + int resource; + struct ucred *cred; + struct prison *pr; + + cred = p->p_ucred; + mtx_assert(&hrl_lock, MA_OWNED); + for (resource = 0; resource <= HRL_RESOURCE_MAX; resource++) + KASSERT(p->p_container.hc_resources[resource] >= 0, + ("resource usage propagation meltdown")); + KASSERT(cred->cr_ruidinfo->ui_container.hc_resources[resource] >= 0, + ("resource usage propagation meltdown")); + KASSERT(cred->cr_ruidinfo->ui_container.hc_resources[resource] >= + p->p_container.hc_resources[resource], + ("resource usage propagation meltdown")); + for (pr = cred->cr_prison; pr != NULL; pr = pr->pr_parent) { + KASSERT(pr->pr_container.hc_resources[resource] >= 0, + ("resource usage propagation meltdown")); + KASSERT(pr->pr_container.hc_resources[resource] >= + p->p_container.hc_resources[resource], + ("resource usage propagation meltdown")); + } +} +#endif /* DIAGNOSTIC */ + +static void hrl_container_add(struct hrl_container *dest, const struct hrl_container *src) { int i; @@ -1847,6 +1827,26 @@ PROC_UNLOCK(parent); } +void +hrl_proc_exiting(struct proc *p) +{ + int i; + + /* + * XXX: Free these three some other way. + */ + hrl_allocated(p, HRL_RESOURCE_FILESIZE, 0); + hrl_allocated(p, HRL_RESOURCE_COREDUMPSIZE, 0); + hrl_allocated(p, HRL_RESOURCE_PTY, 0); + + mtx_lock(&hrl_lock); + for (i = 0; i <= HRL_RESOURCE_MAX; i++) { + KASSERT(p->p_container.hc_resources[i] == 0, + ("dead process still holding resources")); + } + mtx_unlock(&hrl_lock); +} + /* * Go through the process' limits, freeing them. */