2005-07-14 17:12:12 +02:00
|
|
|
/* The system call implemented in this file:
|
|
|
|
* m_type: SYS_FORK
|
|
|
|
*
|
|
|
|
* The parameters for this system call are:
|
|
|
|
* m1_i1: PR_PROC_NR (child's process table slot)
|
|
|
|
* m1_i2: PR_PPROC_NR (parent, process that forked)
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "../system.h"
|
|
|
|
#include <signal.h>
|
|
|
|
#if (CHIP == INTEL)
|
|
|
|
#include "../protect.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if USE_FORK
|
|
|
|
|
|
|
|
/*===========================================================================*
|
|
|
|
* do_fork *
|
|
|
|
*===========================================================================*/
|
|
|
|
PUBLIC int do_fork(m_ptr)
|
|
|
|
register message *m_ptr; /* pointer to request message */
|
|
|
|
{
|
|
|
|
/* Handle sys_fork(). PR_PPROC_NR has forked. The child is PR_PROC_NR. */
|
|
|
|
#if (CHIP == INTEL)
|
|
|
|
reg_t old_ldt_sel;
|
|
|
|
#endif
|
2005-07-19 14:21:36 +02:00
|
|
|
register struct proc *rpc; /* child process pointer */
|
|
|
|
struct proc *rpp; /* parent process pointer */
|
2005-07-26 14:48:34 +02:00
|
|
|
int i;
|
2005-07-14 17:12:12 +02:00
|
|
|
|
|
|
|
rpp = proc_addr(m_ptr->PR_PPROC_NR);
|
|
|
|
rpc = proc_addr(m_ptr->PR_PROC_NR);
|
2005-07-19 14:21:36 +02:00
|
|
|
if (isemptyp(rpp) || ! isemptyp(rpc)) return(EINVAL);
|
2005-07-14 17:12:12 +02:00
|
|
|
|
2005-08-02 17:28:09 +02:00
|
|
|
#if DEAD_CODE
|
|
|
|
/* If the parent is a privileged process, ensure the child process also gets
|
|
|
|
* its own privilege structure for accounting. This is the only part that can
|
|
|
|
* fail, so do this before allocating the process table slot.
|
2005-07-29 17:26:23 +02:00
|
|
|
*/
|
2005-08-02 17:28:09 +02:00
|
|
|
if (priv(rpp)->s_flags & SYS_PROC) {
|
2005-07-29 17:26:23 +02:00
|
|
|
if (OK != (i=get_priv(rpc, SYS_PROC))) return(i); /* get structure */
|
|
|
|
for (i=0; i< BITMAP_CHUNKS(NR_SYS_PROCS); i++) /* remove pending: */
|
|
|
|
priv(rpc)->s_notify_pending.chunk[i] = 0; /* - notifications */
|
|
|
|
priv(rpc)->s_int_pending = 0; /* - interrupts */
|
|
|
|
sigemptyset(&priv(rpc)->s_sig_pending); /* - signals */
|
|
|
|
}
|
2005-08-02 17:28:09 +02:00
|
|
|
#endif
|
2005-07-29 17:26:23 +02:00
|
|
|
|
2005-07-19 14:21:36 +02:00
|
|
|
/* Copy parent 'proc' struct to child. And reinitialize some fields. */
|
2005-07-14 17:12:12 +02:00
|
|
|
#if (CHIP == INTEL)
|
2005-07-19 14:21:36 +02:00
|
|
|
old_ldt_sel = rpc->p_ldt_sel; /* backup local descriptors */
|
|
|
|
*rpc = *rpp; /* copy 'proc' struct */
|
|
|
|
rpc->p_ldt_sel = old_ldt_sel; /* restore descriptors */
|
|
|
|
#else
|
|
|
|
*rpc = *rpp; /* copy 'proc' struct */
|
2005-07-14 17:12:12 +02:00
|
|
|
#endif
|
|
|
|
rpc->p_nr = m_ptr->PR_PROC_NR; /* this was obliterated by copy */
|
2005-07-19 14:21:36 +02:00
|
|
|
|
2005-07-14 17:12:12 +02:00
|
|
|
/* Only one in group should have SIGNALED, child doesn't inherit tracing. */
|
|
|
|
rpc->p_rts_flags |= NO_MAP; /* inhibit process from running */
|
|
|
|
rpc->p_rts_flags &= ~(SIGNALED | SIG_PENDING | P_STOP);
|
|
|
|
sigemptyset(&rpc->p_pending);
|
|
|
|
|
|
|
|
rpc->p_reg.retreg = 0; /* child sees pid = 0 to know it is child */
|
|
|
|
rpc->p_user_time = 0; /* set all the accounting times to 0 */
|
|
|
|
rpc->p_sys_time = 0;
|
|
|
|
|
2005-08-02 17:28:09 +02:00
|
|
|
/* If the parent is a privileged process, take away the privileges from the
|
|
|
|
* child process and inhibit it from running by setting the NO_PRIV flag.
|
|
|
|
* The caller should explicitely set the new privileges before executing.
|
|
|
|
*/
|
|
|
|
if (priv(rpp)->s_flags & SYS_PROC) {
|
|
|
|
rpc->p_priv = priv_addr(USER_PRIV_ID);
|
|
|
|
rpc->p_rts_flags |= NO_PRIV;
|
|
|
|
}
|
2005-07-14 17:12:12 +02:00
|
|
|
return(OK);
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* USE_FORK */
|
|
|
|
|