xref: /csrg-svn/sys/kern/kern_fork.c (revision 52493)
123370Smckusick /*
248405Skarels  * Copyright (c) 1982, 1986, 1989, 1991 Regents of the University of California.
337728Smckusick  * All rights reserved.
423370Smckusick  *
544434Sbostic  * %sccs.include.redist.c%
637728Smckusick  *
7*52493Storek  *	@(#)kern_fork.c	7.32 (Berkeley) 02/14/92
823370Smckusick  */
912791Ssam 
1017090Sbloom #include "param.h"
1117090Sbloom #include "systm.h"
1217090Sbloom #include "map.h"
1345914Smckusick #include "filedesc.h"
1417090Sbloom #include "kernel.h"
1547547Skarels #include "malloc.h"
1617090Sbloom #include "proc.h"
1747547Skarels #include "resourcevar.h"
1837728Smckusick #include "vnode.h"
1917090Sbloom #include "file.h"
2017090Sbloom #include "acct.h"
2140812Smarc #include "ktrace.h"
2212791Ssam 
2342921Smckusick /* ARGSUSED */
2442921Smckusick fork(p, uap, retval)
2542921Smckusick 	struct proc *p;
26*52493Storek 	struct args *uap;
2742921Smckusick 	int retval[];
2812791Ssam {
2912791Ssam 
3044404Skarels 	return (fork1(p, 0, retval));
3112791Ssam }
3212791Ssam 
3342921Smckusick /* ARGSUSED */
3442921Smckusick vfork(p, uap, retval)
3542921Smckusick 	struct proc *p;
36*52493Storek 	struct args *uap;
3742921Smckusick 	int retval[];
3812791Ssam {
3912791Ssam 
4044404Skarels 	return (fork1(p, 1, retval));
4112791Ssam }
4212791Ssam 
4347547Skarels int	nprocs = 1;		/* process 0 */
4447547Skarels 
4542921Smckusick fork1(p1, isvfork, retval)
4642921Smckusick 	register struct proc *p1;
4742921Smckusick 	int isvfork, retval[];
4812791Ssam {
4942921Smckusick 	register struct proc *p2;
5047547Skarels 	register int count, uid;
5147547Skarels 	static int nextpid, pidchecked = 0;
5212791Ssam 
5347547Skarels 	count = 0;
5447547Skarels 	if ((uid = p1->p_ucred->cr_uid) != 0) {
5542921Smckusick 		for (p2 = allproc; p2; p2 = p2->p_nxt)
5647547Skarels 			if (p2->p_ucred->cr_uid == uid)
5747547Skarels 				count++;
5842921Smckusick 		for (p2 = zombproc; p2; p2 = p2->p_nxt)
5947547Skarels 			if (p2->p_ucred->cr_uid == uid)
6047547Skarels 				count++;
6112791Ssam 	}
6212791Ssam 	/*
6351017Sralph 	 * Although process entries are dynamically created,
6447547Skarels 	 * we still keep a global limit on the maximum number
6547547Skarels 	 * we will create.  Don't allow a nonprivileged user
6647547Skarels 	 * to exceed its current limit or to bring us within one
6747547Skarels 	 * of the global limit; don't let root exceed the limit.
6847547Skarels 	 * nprocs is the current number of processes,
6947547Skarels 	 * maxproc is the limit.
7012791Ssam 	 */
7147547Skarels 	if (nprocs >= maxproc || uid == 0 && nprocs >= maxproc + 1) {
7212791Ssam 		tablefull("proc");
7342921Smckusick 		return (EAGAIN);
7412791Ssam 	}
7547547Skarels 	if (count > p1->p_rlimit[RLIMIT_NPROC].rlim_cur)
7647547Skarels 		return (EAGAIN);
7712791Ssam 
7812791Ssam 	/*
7947547Skarels 	 * Find an unused process ID.
8047547Skarels 	 * We remember a range of unused IDs ready to use
8147547Skarels 	 * (from nextpid+1 through pidchecked-1).
8212791Ssam 	 */
8347547Skarels 	nextpid++;
8412791Ssam retry:
8547547Skarels 	/*
8647547Skarels 	 * If the process ID prototype has wrapped around,
8747547Skarels 	 * restart somewhat above 0, as the low-numbered procs
8847547Skarels 	 * tend to include daemons that don't exit.
8947547Skarels 	 */
9047547Skarels 	if (nextpid >= PID_MAX) {
9147547Skarels 		nextpid = 100;
9216528Skarels 		pidchecked = 0;
9312791Ssam 	}
9447547Skarels 	if (nextpid >= pidchecked) {
9516528Skarels 		int doingzomb = 0;
9616578Ssam 
9745005Skarels 		pidchecked = PID_MAX;
9816528Skarels 		/*
9947547Skarels 		 * Scan the active and zombie procs to check whether this pid
10016528Skarels 		 * is in use.  Remember the lowest pid that's greater
10147547Skarels 		 * than nextpid, so we can avoid checking for a while.
10216528Skarels 		 */
10347547Skarels 		p2 = allproc;
10416528Skarels again:
10547547Skarels 		for (; p2 != NULL; p2 = p2->p_nxt) {
10647547Skarels 			if (p2->p_pid == nextpid ||
10747547Skarels 			    p2->p_pgrp->pg_id == nextpid) {
10847547Skarels 				nextpid++;
10947547Skarels 				if (nextpid >= pidchecked)
11016528Skarels 					goto retry;
11116528Skarels 			}
11247547Skarels 			if (p2->p_pid > nextpid && pidchecked > p2->p_pid)
11347547Skarels 				pidchecked = p2->p_pid;
11447547Skarels 			if (p2->p_pgrp->pg_id > nextpid &&
11547547Skarels 			    pidchecked > p2->p_pgrp->pg_id)
11647547Skarels 				pidchecked = p2->p_pgrp->pg_id;
11716528Skarels 		}
11816528Skarels 		if (!doingzomb) {
11916528Skarels 			doingzomb = 1;
12047547Skarels 			p2 = zombproc;
12116528Skarels 			goto again;
12216528Skarels 		}
12312791Ssam 	}
12412791Ssam 
12516528Skarels 
12612791Ssam 	/*
12747547Skarels 	 * Allocate new proc.
12847547Skarels 	 * Link onto allproc (this should probably be delayed).
12947547Skarels 	 */
13047547Skarels 	MALLOC(p2, struct proc *, sizeof(struct proc), M_PROC, M_WAITOK);
13147547Skarels 	nprocs++;
132*52493Storek 	p2->p_stat = SIDL;			/* protect against others */
13347547Skarels 	p2->p_nxt = allproc;
13447547Skarels 	p2->p_nxt->p_prev = &p2->p_nxt;		/* allproc is never NULL */
13547547Skarels 	p2->p_prev = &allproc;
13647547Skarels 	allproc = p2;
13747547Skarels 	p2->p_link = NULL;			/* shouldn't be necessary */
13847547Skarels 	p2->p_rlink = NULL;			/* shouldn't be necessary */
13947547Skarels 
14047547Skarels 	/*
14112791Ssam 	 * Make a proc table entry for the new process.
14247547Skarels 	 * Start by zeroing the section of proc that is zero-initialized,
14347547Skarels 	 * then copy the section that is copied directly from the parent.
14412791Ssam 	 */
14547547Skarels 	bzero(&p2->p_startzero,
14647547Skarels 	    (unsigned) ((caddr_t)&p2->p_endzero - (caddr_t)&p2->p_startzero));
14747547Skarels 	bcopy(&p1->p_startcopy, &p2->p_startcopy,
14847547Skarels 	    (unsigned) ((caddr_t)&p2->p_endcopy - (caddr_t)&p2->p_startcopy));
14949731Smckusick 	p2->p_spare[0] = 0;	/* XXX - should be in zero range */
15049731Smckusick 	p2->p_spare[1] = 0;	/* XXX - should be in zero range */
15149731Smckusick 	p2->p_spare[2] = 0;	/* XXX - should be in zero range */
15249731Smckusick 	p2->p_spare[3] = 0;	/* XXX - should be in zero range */
15347547Skarels 
15447547Skarels 	/*
15547547Skarels 	 * Duplicate sub-structures as needed.
15647547Skarels 	 * Increase reference counts on shared objects.
15748405Skarels 	 * The p_stats and p_sigacts substructs are set in vm_fork.
15847547Skarels 	 */
15947547Skarels 	MALLOC(p2->p_cred, struct pcred *, sizeof(struct pcred),
16047547Skarels 	    M_SUBPROC, M_WAITOK);
16147547Skarels 	bcopy(p1->p_cred, p2->p_cred, sizeof(*p2->p_cred));
16249746Smckusick 	p2->p_cred->p_refcnt = 1;
16347547Skarels 	crhold(p1->p_ucred);
16447547Skarels 
16547547Skarels 	p2->p_fd = fdcopy(p1);
16647547Skarels 	/*
16747547Skarels 	 * If p_limit is still copy-on-write, bump refcnt,
16847547Skarels 	 * otherwise get a copy that won't be modified.
16947547Skarels 	 * (If PL_SHAREMOD is clear, the structure is shared
17047547Skarels 	 * copy-on-write.)
17147547Skarels 	 */
17247547Skarels 	if (p1->p_limit->p_lflags & PL_SHAREMOD)
17347547Skarels 		p2->p_limit = limcopy(p1->p_limit);
17447547Skarels 	else {
17547547Skarels 		p2->p_limit = p1->p_limit;
17647547Skarels 		p2->p_limit->p_refcnt++;
17747547Skarels 	}
17847547Skarels 
17948405Skarels 	p2->p_flag = SLOAD | (p1->p_flag & SHPUX);
18047547Skarels 	if (p1->p_session->s_ttyvp != NULL && p1->p_flag & SCTTY)
18147547Skarels 		p2->p_flag |= SCTTY;
18245727Smckusick 	if (isvfork)
18347547Skarels 		p2->p_flag |= SPPWAIT;
18447547Skarels 	p2->p_pid = nextpid;
18540812Smarc 	{
18647547Skarels 	struct proc **hash = &pidhash[PIDHASH(p2->p_pid)];
18740812Smarc 
18847547Skarels 	p2->p_hash = *hash;
18947547Skarels 	*hash = p2;
19040812Smarc 	}
19147547Skarels 	p2->p_pgrpnxt = p1->p_pgrpnxt;
19247547Skarels 	p1->p_pgrpnxt = p2;
19347547Skarels 	p2->p_pptr = p1;
19447547Skarels 	p2->p_osptr = p1->p_cptr;
19547547Skarels 	if (p1->p_cptr)
19647547Skarels 		p1->p_cptr->p_ysptr = p2;
19747547Skarels 	p1->p_cptr = p2;
19847547Skarels #ifdef KTRACE
19912791Ssam 	/*
20047547Skarels 	 * Copy traceflag and tracefile if enabled.
20147547Skarels 	 * If not inherited, these were zeroed above.
20212791Ssam 	 */
20347547Skarels 	if (p1->p_traceflag&KTRFAC_INHERIT) {
20447547Skarels 		p2->p_traceflag = p1->p_traceflag;
20547547Skarels 		if ((p2->p_tracep = p1->p_tracep) != NULL)
20647547Skarels 			VREF(p2->p_tracep);
20747547Skarels 	}
20845727Smckusick #endif
20912791Ssam 
21047547Skarels #if defined(tahoe)
21147547Skarels 	p2->p_vmspace->p_ckey = p1->p_vmspace->p_ckey; /* XXX move this */
21247547Skarels #endif
21347547Skarels 
21412791Ssam 	/*
21512791Ssam 	 * This begins the section where we must prevent the parent
21612791Ssam 	 * from being swapped.
21712791Ssam 	 */
21847547Skarels 	p1->p_flag |= SKEEP;
21948405Skarels 	/*
22048405Skarels 	 * Set return values for child before vm_fork,
22148405Skarels 	 * so they can be copied to child stack.
22248405Skarels 	 * We return parent pid, and mark as child in retval[1].
22349099Skarels 	 * NOTE: the kernel stack may be at a different location in the child
22449099Skarels 	 * process, and thus addresses of automatic variables (including retval)
22549099Skarels 	 * may be invalid after vm_fork returns in the child process.
22648405Skarels 	 */
22748405Skarels 	retval[0] = p1->p_pid;
22848405Skarels 	retval[1] = 1;
22947547Skarels 	if (vm_fork(p1, p2, isvfork)) {
23047547Skarels 		/*
23148405Skarels 		 * Child process.  Set start time and get to work.
23247547Skarels 		 */
23341180Smarc 		(void) splclock();
23447547Skarels 		p2->p_stats->p_start = time;
23541180Smarc 		(void) spl0();
23647547Skarels 		p2->p_acflag = AFORK;
23747547Skarels 		return (0);
23841180Smarc 	}
23912791Ssam 
24012791Ssam 	/*
24112791Ssam 	 * Make child runnable and add to run queue.
24212791Ssam 	 */
24347547Skarels 	(void) splhigh();
24447547Skarels 	p2->p_stat = SRUN;
24547547Skarels 	setrq(p2);
24612791Ssam 	(void) spl0();
24712791Ssam 
24812791Ssam 	/*
24912791Ssam 	 * Now can be swapped.
25012791Ssam 	 */
25147547Skarels 	p1->p_flag &= ~SKEEP;
25212791Ssam 
25312791Ssam 	/*
25449099Skarels 	 * Preserve synchronization semantics of vfork.
25547547Skarels 	 * If waiting for child to exec or exit, set SPPWAIT
25647547Skarels 	 * on child, and sleep on our proc (in case of exit).
25712791Ssam 	 */
25847547Skarels 	if (isvfork)
25947547Skarels 		while (p2->p_flag & SPPWAIT)
26048405Skarels 			tsleep((caddr_t)p1, PWAIT, "ppwait", 0);
26112791Ssam 
26212791Ssam 	/*
26348405Skarels 	 * Return child pid to parent process,
26448405Skarels 	 * marking us as parent via retval[1].
26512791Ssam 	 */
26647547Skarels 	retval[0] = p2->p_pid;
26748405Skarels 	retval[1] = 0;
26812791Ssam 	return (0);
26912791Ssam }
270