fork.cpp 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <Kernel/Debug.h>
  7. #include <Kernel/FileSystem/Custody.h>
  8. #include <Kernel/FileSystem/FileDescription.h>
  9. #include <Kernel/Memory/Region.h>
  10. #include <Kernel/PerformanceManager.h>
  11. #include <Kernel/Process.h>
  12. namespace Kernel {
  13. KResultOr<FlatPtr> Process::sys$fork(RegisterState& regs)
  14. {
  15. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this);
  16. REQUIRE_PROMISE(proc);
  17. RefPtr<Thread> child_first_thread;
  18. auto child = Process::create(child_first_thread, m_name, uid(), gid(), pid(), m_is_kernel_process, m_cwd, m_executable, m_tty, this);
  19. if (!child || !child_first_thread)
  20. return ENOMEM;
  21. child->m_veil_state = m_veil_state;
  22. child->m_unveiled_paths = m_unveiled_paths.deep_copy();
  23. if (auto result = child->m_fds.try_clone(m_fds); result.is_error())
  24. return result.error();
  25. child->m_pg = m_pg;
  26. {
  27. ProtectedDataMutationScope scope { *child };
  28. child->m_protected_values.promises = m_protected_values.promises.load();
  29. child->m_protected_values.execpromises = m_protected_values.execpromises.load();
  30. child->m_protected_values.has_promises = m_protected_values.has_promises.load();
  31. child->m_protected_values.has_execpromises = m_protected_values.has_execpromises.load();
  32. child->m_protected_values.sid = m_protected_values.sid;
  33. child->m_protected_values.extra_gids = m_protected_values.extra_gids;
  34. child->m_protected_values.umask = m_protected_values.umask;
  35. child->m_protected_values.signal_trampoline = m_protected_values.signal_trampoline;
  36. child->m_protected_values.dumpable = m_protected_values.dumpable;
  37. }
  38. dbgln_if(FORK_DEBUG, "fork: child={}", child);
  39. child->address_space().set_enforces_syscall_regions(address_space().enforces_syscall_regions());
  40. #if ARCH(I386)
  41. auto& child_regs = child_first_thread->m_regs;
  42. child_regs.eax = 0; // fork() returns 0 in the child :^)
  43. child_regs.ebx = regs.ebx;
  44. child_regs.ecx = regs.ecx;
  45. child_regs.edx = regs.edx;
  46. child_regs.ebp = regs.ebp;
  47. child_regs.esp = regs.userspace_esp;
  48. child_regs.esi = regs.esi;
  49. child_regs.edi = regs.edi;
  50. child_regs.eflags = regs.eflags;
  51. child_regs.eip = regs.eip;
  52. child_regs.cs = regs.cs;
  53. child_regs.ds = regs.ds;
  54. child_regs.es = regs.es;
  55. child_regs.fs = regs.fs;
  56. child_regs.gs = regs.gs;
  57. child_regs.ss = regs.userspace_ss;
  58. dbgln_if(FORK_DEBUG, "fork: child will begin executing at {:#04x}:{:p} with stack {:#04x}:{:p}, kstack {:#04x}:{:p}",
  59. child_regs.cs, child_regs.eip, child_regs.ss, child_regs.esp, child_regs.ss0, child_regs.esp0);
  60. #else
  61. auto& child_regs = child_first_thread->m_regs;
  62. child_regs.rax = 0; // fork() returns 0 in the child :^)
  63. child_regs.rbx = regs.rbx;
  64. child_regs.rcx = regs.rcx;
  65. child_regs.rdx = regs.rdx;
  66. child_regs.rbp = regs.rbp;
  67. child_regs.rsp = regs.userspace_rsp;
  68. child_regs.rsi = regs.rsi;
  69. child_regs.rdi = regs.rdi;
  70. child_regs.r8 = regs.r8;
  71. child_regs.r9 = regs.r9;
  72. child_regs.r10 = regs.r10;
  73. child_regs.r11 = regs.r11;
  74. child_regs.r12 = regs.r12;
  75. child_regs.r13 = regs.r13;
  76. child_regs.r14 = regs.r14;
  77. child_regs.r15 = regs.r15;
  78. child_regs.rflags = regs.rflags;
  79. child_regs.rip = regs.rip;
  80. child_regs.cs = regs.cs;
  81. dbgln_if(FORK_DEBUG, "fork: child will begin executing at {:#04x}:{:p} with stack {:p}, kstack {:p}",
  82. child_regs.cs, child_regs.rip, child_regs.rsp, child_regs.rsp0);
  83. #endif
  84. {
  85. SpinlockLocker lock(address_space().get_lock());
  86. for (auto& region : address_space().regions()) {
  87. dbgln_if(FORK_DEBUG, "fork: cloning Region({}) '{}' @ {}", region, region->name(), region->vaddr());
  88. auto maybe_region_clone = region->try_clone();
  89. if (maybe_region_clone.is_error()) {
  90. dbgln("fork: Cannot clone region, insufficient memory");
  91. // TODO: tear down new process?
  92. return maybe_region_clone.error();
  93. }
  94. auto* child_region = child->address_space().add_region(maybe_region_clone.release_value());
  95. if (!child_region) {
  96. dbgln("fork: Cannot add region, insufficient memory");
  97. // TODO: tear down new process?
  98. return ENOMEM;
  99. }
  100. child_region->map(child->address_space().page_directory(), Memory::ShouldFlushTLB::No);
  101. if (region == m_master_tls_region.unsafe_ptr())
  102. child->m_master_tls_region = child_region;
  103. }
  104. }
  105. Process::register_new(*child);
  106. PerformanceManager::add_process_created_event(*child);
  107. SpinlockLocker lock(g_scheduler_lock);
  108. child_first_thread->set_affinity(Thread::current()->affinity());
  109. child_first_thread->set_state(Thread::State::Runnable);
  110. auto child_pid = child->pid().value();
  111. // NOTE: All user processes have a leaked ref on them. It's balanced by Thread::WaitBlockCondition::finalize().
  112. (void)child.leak_ref();
  113. return child_pid;
  114. }
  115. }