From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.9 required=3.0 tests=DKIM_ADSP_ALL,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7B963C32771 for ; Thu, 9 Jan 2020 10:47:42 +0000 (UTC) Received: from shelob.surriel.com (shelob.surriel.com [96.67.55.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id D3AAB2067D for ; Thu, 9 Jan 2020 10:47:41 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=valentin-vidic.from.hr header.i=@valentin-vidic.from.hr header.b="kGIzpCJS" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org D3AAB2067D Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=valentin-vidic.from.hr Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kernelnewbies-bounces@kernelnewbies.org Received: from localhost ([::1] helo=shelob.surriel.com) by shelob.surriel.com with esmtp (Exim 4.92.3) (envelope-from ) id 1ipVLS-0000nV-LE; Thu, 09 Jan 2020 05:47:18 -0500 Received: from valentin-vidic.from.hr ([2001:470:1f0b:3b7::1]) by shelob.surriel.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92.3) (envelope-from ) id 1ipVLP-0000nN-Df for kernelnewbies@kernelnewbies.org; Thu, 09 Jan 2020 05:47:16 -0500 X-Virus-Scanned: Debian amavisd-new at valentin-vidic.from.hr Received: by valentin-vidic.from.hr (Postfix, from userid 1000) id 136BE330; Thu, 9 Jan 2020 11:47:12 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=valentin-vidic.from.hr; s=2017; t=1578566832; bh=GH4ZE4xYBifsETVr+hSua5BahQNAh1i6N9/NEQYtWOA=; h=Date:From:To:Subject:References:In-Reply-To:From; b=kGIzpCJSwF/jDjHZnVvtorBSnNUbPIuV+LhD769ynfleBJ2KbmWUUxmreSKxx/S6p VV60mvrjwJiIBhhqWRa902hp80xqQ19MVKCjczOUIvk5W+WnujsofsS+YLt2+Wy23V gmmeTuor6Sz8dHMgPMjz3UvT9iq1EqnhHpgRlis/5AfvjJH3k4c/SMrloG2Se5R32e Q2w7Re9X+w9jw7dNFPi8ZckeqT6WAa6oDLOUcH/rYYSzFGLsTT9FH4JFCjivu4kS3c 2rQu2jNUwlrpmFJNIkpFaA5ZMgekIZLyZObrgje0DrdetyUKpmlJ5NhxX0gKgc6WC8 4tWE7VW30nLQg== Date: Thu, 9 Jan 2020 11:47:12 +0100 From: Valentin =?utf-8?B?VmlkacSH?= To: kernelnewbies@kernelnewbies.org Subject: Re: Fork Message-ID: <20200109104711.GE8238@valentin-vidic.from.hr> References: MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) X-BeenThere: kernelnewbies@kernelnewbies.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Learn about the Linux kernel List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: kernelnewbies-bounces@kernelnewbies.org On Thu, Jan 09, 2020 at 10:35:16AM +0000, Christophe DUMONT wrote: > How does the kernel knows when a process calls the fork function that > he has the rights to create a new process ? Not sure what you mean by rights, but in copy_process you can see different checks and errors that can happen when creating a new process: https://elixir.bootlin.com/linux/latest/source/kernel/fork.c#L1760 -- Valentin _______________________________________________ Kernelnewbies mailing list Kernelnewbies@kernelnewbies.org https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies