123370Smckusick /*
263174Sbostic * Copyright (c) 1982, 1986, 1989, 1991, 1993
363174Sbostic * The Regents of the University of California. All rights reserved.
465771Sbostic * (c) UNIX System Laboratories, Inc.
565771Sbostic * All or some portions of this file are derived from material licensed
665771Sbostic * to the University of California by American Telephone and Telegraph
765771Sbostic * Co. or Unix System Laboratories, Inc. and are reproduced herein with
865771Sbostic * the permission of UNIX System Laboratories, Inc.
923370Smckusick *
1044434Sbostic * %sccs.include.redist.c%
1137728Smckusick *
12*68302Scgd * @(#)kern_fork.c 8.8 (Berkeley) 02/14/95
1323370Smckusick */
1412791Ssam
1557050Smckusick #include <sys/param.h>
1657050Smckusick #include <sys/systm.h>
1757050Smckusick #include <sys/map.h>
1857050Smckusick #include <sys/filedesc.h>
1957050Smckusick #include <sys/kernel.h>
2057050Smckusick #include <sys/malloc.h>
2157050Smckusick #include <sys/proc.h>
2257050Smckusick #include <sys/resourcevar.h>
2357050Smckusick #include <sys/vnode.h>
2457050Smckusick #include <sys/file.h>
2557050Smckusick #include <sys/acct.h>
2657050Smckusick #include <sys/ktrace.h>
2712791Ssam
2842921Smckusick /* ARGSUSED */
2942921Smckusick fork(p, uap, retval)
3042921Smckusick struct proc *p;
31*68302Scgd void *uap;
32*68302Scgd register_t *retval;
3312791Ssam {
3412791Ssam
3544404Skarels return (fork1(p, 0, retval));
3612791Ssam }
3712791Ssam
3842921Smckusick /* ARGSUSED */
3942921Smckusick vfork(p, uap, retval)
4042921Smckusick struct proc *p;
41*68302Scgd void *uap;
42*68302Scgd register_t *retval;
4312791Ssam {
4412791Ssam
4544404Skarels return (fork1(p, 1, retval));
4612791Ssam }
4712791Ssam
4847547Skarels int nprocs = 1; /* process 0 */
4947547Skarels
fork1(p1,isvfork,retval)5042921Smckusick fork1(p1, isvfork, retval)
5142921Smckusick register struct proc *p1;
52*68302Scgd int isvfork;
53*68302Scgd register_t *retval;
5412791Ssam {
5542921Smckusick register struct proc *p2;
5655400Smckusick register uid_t uid;
5753699Smckusick struct proc *newproc;
5853646Smckusick struct proc **hash;
5955400Smckusick int count;
6047547Skarels static int nextpid, pidchecked = 0;
6112791Ssam
6212791Ssam /*
6353646Smckusick * Although process entries are dynamically created, we still keep
6453646Smckusick * a global limit on the maximum number we will create. Don't allow
6566737Smckusick * a nonprivileged user to use the last process; don't let root
6666737Smckusick * exceed the limit. The variable nprocs is the current number of
6766737Smckusick * processes, maxproc is the limit.
6812791Ssam */
6955400Smckusick uid = p1->p_cred->p_ruid;
7066737Smckusick if ((nprocs >= maxproc - 1 && uid != 0) || nprocs >= maxproc) {
7112791Ssam tablefull("proc");
7242921Smckusick return (EAGAIN);
7312791Ssam }
74*68302Scgd
7555400Smckusick /*
7655400Smckusick * Increment the count of procs running with this uid. Don't allow
7755400Smckusick * a nonprivileged user to exceed their current limit.
7855400Smckusick */
7955400Smckusick count = chgproccnt(uid, 1);
8055400Smckusick if (uid != 0 && count > p1->p_rlimit[RLIMIT_NPROC].rlim_cur) {
8155400Smckusick (void)chgproccnt(uid, -1);
8247547Skarels return (EAGAIN);
8355400Smckusick }
8412791Ssam
8553646Smckusick /* Allocate new proc. */
8653699Smckusick MALLOC(newproc, struct proc *, sizeof(struct proc), M_PROC, M_WAITOK);
8753646Smckusick
8812791Ssam /*
8953646Smckusick * Find an unused process ID. We remember a range of unused IDs
9053646Smckusick * ready to use (from nextpid+1 through pidchecked-1).
9112791Ssam */
9247547Skarels nextpid++;
9312791Ssam retry:
9447547Skarels /*
9547547Skarels * If the process ID prototype has wrapped around,
9647547Skarels * restart somewhat above 0, as the low-numbered procs
9747547Skarels * tend to include daemons that don't exit.
9847547Skarels */
9947547Skarels if (nextpid >= PID_MAX) {
10047547Skarels nextpid = 100;
10116528Skarels pidchecked = 0;
10212791Ssam }
10347547Skarels if (nextpid >= pidchecked) {
10416528Skarels int doingzomb = 0;
10516578Ssam
10645005Skarels pidchecked = PID_MAX;
10716528Skarels /*
10847547Skarels * Scan the active and zombie procs to check whether this pid
10916528Skarels * is in use. Remember the lowest pid that's greater
11047547Skarels * than nextpid, so we can avoid checking for a while.
11116528Skarels */
11267732Smckusick p2 = allproc.lh_first;
11316528Skarels again:
11467732Smckusick for (; p2 != 0; p2 = p2->p_list.le_next) {
11553646Smckusick while (p2->p_pid == nextpid ||
11647547Skarels p2->p_pgrp->pg_id == nextpid) {
11747547Skarels nextpid++;
11847547Skarels if (nextpid >= pidchecked)
11916528Skarels goto retry;
12016528Skarels }
12147547Skarels if (p2->p_pid > nextpid && pidchecked > p2->p_pid)
12247547Skarels pidchecked = p2->p_pid;
12347547Skarels if (p2->p_pgrp->pg_id > nextpid &&
12447547Skarels pidchecked > p2->p_pgrp->pg_id)
12547547Skarels pidchecked = p2->p_pgrp->pg_id;
12616528Skarels }
12716528Skarels if (!doingzomb) {
12816528Skarels doingzomb = 1;
12967732Smckusick p2 = zombproc.lh_first;
13016528Skarels goto again;
13116528Skarels }
13212791Ssam }
13312791Ssam
13447547Skarels nprocs++;
13553699Smckusick p2 = newproc;
13667732Smckusick p2->p_stat = SIDL; /* protect against others */
13767732Smckusick p2->p_pid = nextpid;
13867732Smckusick LIST_INSERT_HEAD(&allproc, p2, p_list);
13964591Sbostic p2->p_forw = p2->p_back = NULL; /* shouldn't be necessary */
14067732Smckusick LIST_INSERT_HEAD(PIDHASH(p2->p_pid), p2, p_hash);
14147547Skarels
14247547Skarels /*
14312791Ssam * Make a proc table entry for the new process.
14447547Skarels * Start by zeroing the section of proc that is zero-initialized,
14547547Skarels * then copy the section that is copied directly from the parent.
14612791Ssam */
14747547Skarels bzero(&p2->p_startzero,
14847547Skarels (unsigned) ((caddr_t)&p2->p_endzero - (caddr_t)&p2->p_startzero));
14947547Skarels bcopy(&p1->p_startcopy, &p2->p_startcopy,
15047547Skarels (unsigned) ((caddr_t)&p2->p_endcopy - (caddr_t)&p2->p_startcopy));
15147547Skarels
15247547Skarels /*
15347547Skarels * Duplicate sub-structures as needed.
15447547Skarels * Increase reference counts on shared objects.
15548405Skarels * The p_stats and p_sigacts substructs are set in vm_fork.
15647547Skarels */
15764591Sbostic p2->p_flag = P_INMEM;
15864591Sbostic if (p1->p_flag & P_PROFIL)
15954132Smckusick startprofclock(p2);
16047547Skarels MALLOC(p2->p_cred, struct pcred *, sizeof(struct pcred),
16147547Skarels M_SUBPROC, M_WAITOK);
16247547Skarels bcopy(p1->p_cred, p2->p_cred, sizeof(*p2->p_cred));
16349746Smckusick p2->p_cred->p_refcnt = 1;
16447547Skarels crhold(p1->p_ucred);
16547547Skarels
16665117Spendry /* bump references to the text vnode (for procfs) */
16765117Spendry p2->p_textvp = p1->p_textvp;
16865117Spendry if (p2->p_textvp)
16965117Spendry VREF(p2->p_textvp);
17065117Spendry
17147547Skarels p2->p_fd = fdcopy(p1);
17247547Skarels /*
17347547Skarels * If p_limit is still copy-on-write, bump refcnt,
17447547Skarels * otherwise get a copy that won't be modified.
17547547Skarels * (If PL_SHAREMOD is clear, the structure is shared
17647547Skarels * copy-on-write.)
17747547Skarels */
17847547Skarels if (p1->p_limit->p_lflags & PL_SHAREMOD)
17947547Skarels p2->p_limit = limcopy(p1->p_limit);
18047547Skarels else {
18147547Skarels p2->p_limit = p1->p_limit;
18247547Skarels p2->p_limit->p_refcnt++;
18347547Skarels }
18447547Skarels
18564591Sbostic if (p1->p_session->s_ttyvp != NULL && p1->p_flag & P_CONTROLT)
18664591Sbostic p2->p_flag |= P_CONTROLT;
18745727Smckusick if (isvfork)
18864591Sbostic p2->p_flag |= P_PPWAIT;
18967732Smckusick LIST_INSERT_AFTER(p1, p2, p_pglist);
19047547Skarels p2->p_pptr = p1;
19167732Smckusick LIST_INSERT_HEAD(&p1->p_children, p2, p_sibling);
19267732Smckusick LIST_INIT(&p2->p_children);
19367732Smckusick
19447547Skarels #ifdef KTRACE
19512791Ssam /*
19647547Skarels * Copy traceflag and tracefile if enabled.
19747547Skarels * If not inherited, these were zeroed above.
19812791Ssam */
19947547Skarels if (p1->p_traceflag&KTRFAC_INHERIT) {
20047547Skarels p2->p_traceflag = p1->p_traceflag;
20147547Skarels if ((p2->p_tracep = p1->p_tracep) != NULL)
20247547Skarels VREF(p2->p_tracep);
20347547Skarels }
20445727Smckusick #endif
20512791Ssam
20612791Ssam /*
20712791Ssam * This begins the section where we must prevent the parent
20812791Ssam * from being swapped.
20912791Ssam */
21064591Sbostic p1->p_flag |= P_NOSWAP;
21148405Skarels /*
21248405Skarels * Set return values for child before vm_fork,
21348405Skarels * so they can be copied to child stack.
21448405Skarels * We return parent pid, and mark as child in retval[1].
21549099Skarels * NOTE: the kernel stack may be at a different location in the child
21649099Skarels * process, and thus addresses of automatic variables (including retval)
21749099Skarels * may be invalid after vm_fork returns in the child process.
21848405Skarels */
21948405Skarels retval[0] = p1->p_pid;
22048405Skarels retval[1] = 1;
22147547Skarels if (vm_fork(p1, p2, isvfork)) {
22247547Skarels /*
22348405Skarels * Child process. Set start time and get to work.
22447547Skarels */
22541180Smarc (void) splclock();
22647547Skarels p2->p_stats->p_start = time;
22741180Smarc (void) spl0();
22847547Skarels p2->p_acflag = AFORK;
22947547Skarels return (0);
23041180Smarc }
23112791Ssam
23212791Ssam /*
23312791Ssam * Make child runnable and add to run queue.
23412791Ssam */
23547547Skarels (void) splhigh();
23647547Skarels p2->p_stat = SRUN;
23764532Sbostic setrunqueue(p2);
23812791Ssam (void) spl0();
23912791Ssam
24012791Ssam /*
24112791Ssam * Now can be swapped.
24212791Ssam */
24364591Sbostic p1->p_flag &= ~P_NOSWAP;
24412791Ssam
24512791Ssam /*
24664591Sbostic * Preserve synchronization semantics of vfork. If waiting for
24764591Sbostic * child to exec or exit, set P_PPWAIT on child, and sleep on our
24864591Sbostic * proc (in case of exit).
24912791Ssam */
25047547Skarels if (isvfork)
25164591Sbostic while (p2->p_flag & P_PPWAIT)
25264591Sbostic tsleep(p1, PWAIT, "ppwait", 0);
25312791Ssam
25412791Ssam /*
25548405Skarels * Return child pid to parent process,
25648405Skarels * marking us as parent via retval[1].
25712791Ssam */
25847547Skarels retval[0] = p2->p_pid;
25948405Skarels retval[1] = 0;
26012791Ssam return (0);
26112791Ssam }
262