From owner-freebsd-hackers Tue Sep 16 01:41:30 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id BAA11800 for hackers-outgoing; Tue, 16 Sep 1997 01:41:30 -0700 (PDT) Received: from lestat.nas.nasa.gov (lestat.nas.nasa.gov [129.99.50.29]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id BAA11791 for ; Tue, 16 Sep 1997 01:41:27 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by lestat.nas.nasa.gov (8.8.6/8.6.12) with SMTP id BAA28756; Tue, 16 Sep 1997 01:35:09 -0700 (PDT) Message-Id: <199709160835.BAA28756@lestat.nas.nasa.gov> X-Authentication-Warning: lestat.nas.nasa.gov: localhost [127.0.0.1] didn't use HELO protocol To: Simon Shapiro Cc: Julian Elischer , freebsd-hackers@freebsd.org Subject: Re: What is wrong with this snipet? Reply-To: Jason Thorpe From: Jason Thorpe Date: Tue, 16 Sep 1997 01:35:08 -0700 Sender: owner-freebsd-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk On Tue, 16 Sep 1997 01:20:56 -0700 (PDT) Simon Shapiro wrote: > >From my naive point of view, what is less than very useful is the fact that > one process exiting blows up the other which is not. One would think that > since all processes now share the same address space, early exiters do not > take the memory with them, but leave it for the others. Um, I think people might have misunderstood what I originally pointed out about the FreeBSD rfork() ... I was merely pointing out that the RFMEM semantics were different from Plan 9's (my interpretation of the Plan 9 semantics are that only text/data/bss are shared, not the entire address space, which we could do in a similar fashion by using a sharing map), and that when the child executes a "return" statement, he's going to smash the stack of the parent, or vice versa. When the child exits (actually, _exits :-) or exec's, the only thing that happens to the vmspace is that the refcount drops. It's worth noting that even with a Real vfork(2), the danger of stack smashing (and the restriction that one must use _exit(), not exit()) exists. That's why all of the special vfork system call stubs exist - they pop the return-address early (before the actual system call), save it in a register, and then return to the caller via an indirect jump (through the function pointer saved in the register). This works because vfork() takes no arguments (if it did, the kernel's syscall gate would look for the argument in the wrong place, since the RA has been popped). Jason R. Thorpe thorpej@nas.nasa.gov NASA Ames Research Center Home: +1 408 866 1912 NAS: M/S 258-6 Work: +1 415 604 0935 Moffett Field, CA 94035 Pager: +1 415 428 6939