xref: /csrg-svn/sys/kern/kern_fork.c (revision 67732)
123370Smckusick /*
263174Sbostic  * Copyright (c) 1982, 1986, 1989, 1991, 1993
363174Sbostic  *	The Regents of the University of California.  All rights reserved.
465771Sbostic  * (c) UNIX System Laboratories, Inc.
565771Sbostic  * All or some portions of this file are derived from material licensed
665771Sbostic  * to the University of California by American Telephone and Telegraph
765771Sbostic  * Co. or Unix System Laboratories, Inc. and are reproduced herein with
865771Sbostic  * the permission of UNIX System Laboratories, Inc.
923370Smckusick  *
1044434Sbostic  * %sccs.include.redist.c%
1137728Smckusick  *
12*67732Smckusick  *	@(#)kern_fork.c	8.7 (Berkeley) 08/22/94
1323370Smckusick  */
1412791Ssam 
1557050Smckusick #include <sys/param.h>
1657050Smckusick #include <sys/systm.h>
1757050Smckusick #include <sys/map.h>
1857050Smckusick #include <sys/filedesc.h>
1957050Smckusick #include <sys/kernel.h>
2057050Smckusick #include <sys/malloc.h>
2157050Smckusick #include <sys/proc.h>
2257050Smckusick #include <sys/resourcevar.h>
2357050Smckusick #include <sys/vnode.h>
2457050Smckusick #include <sys/file.h>
2557050Smckusick #include <sys/acct.h>
2657050Smckusick #include <sys/ktrace.h>
2712791Ssam 
2854922Storek struct fork_args {
2954922Storek 	int	dummy;
3054922Storek };
3142921Smckusick /* ARGSUSED */
3242921Smckusick fork(p, uap, retval)
3342921Smckusick 	struct proc *p;
3454922Storek 	struct fork_args *uap;
3542921Smckusick 	int retval[];
3612791Ssam {
3712791Ssam 
3844404Skarels 	return (fork1(p, 0, retval));
3912791Ssam }
4012791Ssam 
4142921Smckusick /* ARGSUSED */
4242921Smckusick vfork(p, uap, retval)
4342921Smckusick 	struct proc *p;
4454922Storek 	struct fork_args *uap;
4542921Smckusick 	int retval[];
4612791Ssam {
4712791Ssam 
4844404Skarels 	return (fork1(p, 1, retval));
4912791Ssam }
5012791Ssam 
5147547Skarels int	nprocs = 1;		/* process 0 */
5247547Skarels 
5342921Smckusick fork1(p1, isvfork, retval)
5442921Smckusick 	register struct proc *p1;
5542921Smckusick 	int isvfork, retval[];
5612791Ssam {
5742921Smckusick 	register struct proc *p2;
5855400Smckusick 	register uid_t uid;
5953699Smckusick 	struct proc *newproc;
6053646Smckusick 	struct proc **hash;
6155400Smckusick 	int count;
6247547Skarels 	static int nextpid, pidchecked = 0;
6312791Ssam 
6412791Ssam 	/*
6553646Smckusick 	 * Although process entries are dynamically created, we still keep
6653646Smckusick 	 * a global limit on the maximum number we will create.  Don't allow
6766737Smckusick 	 * a nonprivileged user to use the last process; don't let root
6866737Smckusick 	 * exceed the limit. The variable nprocs is the current number of
6966737Smckusick 	 * processes, maxproc is the limit.
7012791Ssam 	 */
7155400Smckusick 	uid = p1->p_cred->p_ruid;
7266737Smckusick 	if ((nprocs >= maxproc - 1 && uid != 0) || nprocs >= maxproc) {
7312791Ssam 		tablefull("proc");
7442921Smckusick 		return (EAGAIN);
7512791Ssam 	}
7655400Smckusick 	/*
7755400Smckusick 	 * Increment the count of procs running with this uid. Don't allow
7855400Smckusick 	 * a nonprivileged user to exceed their current limit.
7955400Smckusick 	 */
8055400Smckusick 	count = chgproccnt(uid, 1);
8155400Smckusick 	if (uid != 0 && count > p1->p_rlimit[RLIMIT_NPROC].rlim_cur) {
8255400Smckusick 		(void)chgproccnt(uid, -1);
8347547Skarels 		return (EAGAIN);
8455400Smckusick 	}
8512791Ssam 
8653646Smckusick 	/* Allocate new proc. */
8753699Smckusick 	MALLOC(newproc, struct proc *, sizeof(struct proc), M_PROC, M_WAITOK);
8853646Smckusick 
8912791Ssam 	/*
9053646Smckusick 	 * Find an unused process ID.  We remember a range of unused IDs
9153646Smckusick 	 * ready to use (from nextpid+1 through pidchecked-1).
9212791Ssam 	 */
9347547Skarels 	nextpid++;
9412791Ssam retry:
9547547Skarels 	/*
9647547Skarels 	 * If the process ID prototype has wrapped around,
9747547Skarels 	 * restart somewhat above 0, as the low-numbered procs
9847547Skarels 	 * tend to include daemons that don't exit.
9947547Skarels 	 */
10047547Skarels 	if (nextpid >= PID_MAX) {
10147547Skarels 		nextpid = 100;
10216528Skarels 		pidchecked = 0;
10312791Ssam 	}
10447547Skarels 	if (nextpid >= pidchecked) {
10516528Skarels 		int doingzomb = 0;
10616578Ssam 
10745005Skarels 		pidchecked = PID_MAX;
10816528Skarels 		/*
10947547Skarels 		 * Scan the active and zombie procs to check whether this pid
11016528Skarels 		 * is in use.  Remember the lowest pid that's greater
11147547Skarels 		 * than nextpid, so we can avoid checking for a while.
11216528Skarels 		 */
113*67732Smckusick 		p2 = allproc.lh_first;
11416528Skarels again:
115*67732Smckusick 		for (; p2 != 0; p2 = p2->p_list.le_next) {
11653646Smckusick 			while (p2->p_pid == nextpid ||
11747547Skarels 			    p2->p_pgrp->pg_id == nextpid) {
11847547Skarels 				nextpid++;
11947547Skarels 				if (nextpid >= pidchecked)
12016528Skarels 					goto retry;
12116528Skarels 			}
12247547Skarels 			if (p2->p_pid > nextpid && pidchecked > p2->p_pid)
12347547Skarels 				pidchecked = p2->p_pid;
12447547Skarels 			if (p2->p_pgrp->pg_id > nextpid &&
12547547Skarels 			    pidchecked > p2->p_pgrp->pg_id)
12647547Skarels 				pidchecked = p2->p_pgrp->pg_id;
12716528Skarels 		}
12816528Skarels 		if (!doingzomb) {
12916528Skarels 			doingzomb = 1;
130*67732Smckusick 			p2 = zombproc.lh_first;
13116528Skarels 			goto again;
13216528Skarels 		}
13312791Ssam 	}
13412791Ssam 
13516528Skarels 
13647547Skarels 	nprocs++;
13753699Smckusick 	p2 = newproc;
138*67732Smckusick 	p2->p_stat = SIDL;			/* protect against others */
139*67732Smckusick 	p2->p_pid = nextpid;
140*67732Smckusick 	LIST_INSERT_HEAD(&allproc, p2, p_list);
14164591Sbostic 	p2->p_forw = p2->p_back = NULL;		/* shouldn't be necessary */
142*67732Smckusick 	LIST_INSERT_HEAD(PIDHASH(p2->p_pid), p2, p_hash);
14347547Skarels 
14447547Skarels 	/*
14512791Ssam 	 * Make a proc table entry for the new process.
14647547Skarels 	 * Start by zeroing the section of proc that is zero-initialized,
14747547Skarels 	 * then copy the section that is copied directly from the parent.
14812791Ssam 	 */
14947547Skarels 	bzero(&p2->p_startzero,
15047547Skarels 	    (unsigned) ((caddr_t)&p2->p_endzero - (caddr_t)&p2->p_startzero));
15147547Skarels 	bcopy(&p1->p_startcopy, &p2->p_startcopy,
15247547Skarels 	    (unsigned) ((caddr_t)&p2->p_endcopy - (caddr_t)&p2->p_startcopy));
15347547Skarels 
15447547Skarels 	/*
15547547Skarels 	 * Duplicate sub-structures as needed.
15647547Skarels 	 * Increase reference counts on shared objects.
15748405Skarels 	 * The p_stats and p_sigacts substructs are set in vm_fork.
15847547Skarels 	 */
15964591Sbostic 	p2->p_flag = P_INMEM;
16064591Sbostic 	if (p1->p_flag & P_PROFIL)
16154132Smckusick 		startprofclock(p2);
16247547Skarels 	MALLOC(p2->p_cred, struct pcred *, sizeof(struct pcred),
16347547Skarels 	    M_SUBPROC, M_WAITOK);
16447547Skarels 	bcopy(p1->p_cred, p2->p_cred, sizeof(*p2->p_cred));
16549746Smckusick 	p2->p_cred->p_refcnt = 1;
16647547Skarels 	crhold(p1->p_ucred);
16747547Skarels 
16865117Spendry 	/* bump references to the text vnode (for procfs) */
16965117Spendry 	p2->p_textvp = p1->p_textvp;
17065117Spendry 	if (p2->p_textvp)
17165117Spendry 		VREF(p2->p_textvp);
17265117Spendry 
17347547Skarels 	p2->p_fd = fdcopy(p1);
17447547Skarels 	/*
17547547Skarels 	 * If p_limit is still copy-on-write, bump refcnt,
17647547Skarels 	 * otherwise get a copy that won't be modified.
17747547Skarels 	 * (If PL_SHAREMOD is clear, the structure is shared
17847547Skarels 	 * copy-on-write.)
17947547Skarels 	 */
18047547Skarels 	if (p1->p_limit->p_lflags & PL_SHAREMOD)
18147547Skarels 		p2->p_limit = limcopy(p1->p_limit);
18247547Skarels 	else {
18347547Skarels 		p2->p_limit = p1->p_limit;
18447547Skarels 		p2->p_limit->p_refcnt++;
18547547Skarels 	}
18647547Skarels 
18764591Sbostic 	if (p1->p_session->s_ttyvp != NULL && p1->p_flag & P_CONTROLT)
18864591Sbostic 		p2->p_flag |= P_CONTROLT;
18945727Smckusick 	if (isvfork)
19064591Sbostic 		p2->p_flag |= P_PPWAIT;
191*67732Smckusick 	LIST_INSERT_AFTER(p1, p2, p_pglist);
19247547Skarels 	p2->p_pptr = p1;
193*67732Smckusick 	LIST_INSERT_HEAD(&p1->p_children, p2, p_sibling);
194*67732Smckusick 	LIST_INIT(&p2->p_children);
195*67732Smckusick 
19647547Skarels #ifdef KTRACE
19712791Ssam 	/*
19847547Skarels 	 * Copy traceflag and tracefile if enabled.
19947547Skarels 	 * If not inherited, these were zeroed above.
20012791Ssam 	 */
20147547Skarels 	if (p1->p_traceflag&KTRFAC_INHERIT) {
20247547Skarels 		p2->p_traceflag = p1->p_traceflag;
20347547Skarels 		if ((p2->p_tracep = p1->p_tracep) != NULL)
20447547Skarels 			VREF(p2->p_tracep);
20547547Skarels 	}
20645727Smckusick #endif
20712791Ssam 
20812791Ssam 	/*
20912791Ssam 	 * This begins the section where we must prevent the parent
21012791Ssam 	 * from being swapped.
21112791Ssam 	 */
21264591Sbostic 	p1->p_flag |= P_NOSWAP;
21348405Skarels 	/*
21448405Skarels 	 * Set return values for child before vm_fork,
21548405Skarels 	 * so they can be copied to child stack.
21648405Skarels 	 * We return parent pid, and mark as child in retval[1].
21749099Skarels 	 * NOTE: the kernel stack may be at a different location in the child
21849099Skarels 	 * process, and thus addresses of automatic variables (including retval)
21949099Skarels 	 * may be invalid after vm_fork returns in the child process.
22048405Skarels 	 */
22148405Skarels 	retval[0] = p1->p_pid;
22248405Skarels 	retval[1] = 1;
22347547Skarels 	if (vm_fork(p1, p2, isvfork)) {
22447547Skarels 		/*
22548405Skarels 		 * Child process.  Set start time and get to work.
22647547Skarels 		 */
22741180Smarc 		(void) splclock();
22847547Skarels 		p2->p_stats->p_start = time;
22941180Smarc 		(void) spl0();
23047547Skarels 		p2->p_acflag = AFORK;
23147547Skarels 		return (0);
23241180Smarc 	}
23312791Ssam 
23412791Ssam 	/*
23512791Ssam 	 * Make child runnable and add to run queue.
23612791Ssam 	 */
23747547Skarels 	(void) splhigh();
23847547Skarels 	p2->p_stat = SRUN;
23964532Sbostic 	setrunqueue(p2);
24012791Ssam 	(void) spl0();
24112791Ssam 
24212791Ssam 	/*
24312791Ssam 	 * Now can be swapped.
24412791Ssam 	 */
24564591Sbostic 	p1->p_flag &= ~P_NOSWAP;
24612791Ssam 
24712791Ssam 	/*
24864591Sbostic 	 * Preserve synchronization semantics of vfork.  If waiting for
24964591Sbostic 	 * child to exec or exit, set P_PPWAIT on child, and sleep on our
25064591Sbostic 	 * proc (in case of exit).
25112791Ssam 	 */
25247547Skarels 	if (isvfork)
25364591Sbostic 		while (p2->p_flag & P_PPWAIT)
25464591Sbostic 			tsleep(p1, PWAIT, "ppwait", 0);
25512791Ssam 
25612791Ssam 	/*
25748405Skarels 	 * Return child pid to parent process,
25848405Skarels 	 * marking us as parent via retval[1].
25912791Ssam 	 */
26047547Skarels 	retval[0] = p2->p_pid;
26148405Skarels 	retval[1] = 0;
26212791Ssam 	return (0);
26312791Ssam }
264