FORK(2) System Calls FORK(2)

NAME


fork, fork1, forkall, forkx, forkallx - create a new process

SYNOPSIS


#include <sys/types.h>
#include <unistd.h>

pid_t fork(void);


pid_t fork1(void);


pid_t forkall(void);


#include <sys/fork.h>

pid_t forkx(int flags);


pid_t forkallx(int flags);


DESCRIPTION


The fork(), fork1(), forkall(), forkx(), and forkallx() functions
create a new process. The address space of the new process (child
process) is an exact copy of the address space of the calling process
(parent process). The child process inherits the following attributes
from the parent process:

o real user ID, real group ID, effective user ID, effective
group ID

o environment

o open file descriptors (except those marked close-on-fork,
see discussion below)

o close-on-exec flags (see exec(2))

o signal handling settings (that is, SIG_DFL, SIG_IGN,
SIG_HOLD, function address)

o supplementary group IDs

o set-user-ID mode bit

o set-group-ID mode bit

o profiling on/off status

o nice value (see nice(2))

o scheduler class (see priocntl(2))

o all attached shared memory segments (see shmop(2))

o process group ID -- memory mappings (see mmap(2))

o session ID (see exit(2))

o current working directory

o root directory

o file mode creation mask (see umask(2))

o resource limits (see getrlimit(2))

o controlling terminal

o saved user ID and group ID

o task ID and project ID

o processor bindings (see processor_bind(2))

o processor set bindings (see pset_bind(2))

o process privilege sets (see getppriv(2))

o process flags (see getpflags(2))

o active contract templates (see contract(5))


Scheduling priority and any per-process scheduling parameters that
are specific to a given scheduling class might or might not be
inherited according to the policy of that particular class (see
priocntl(2)). The child process might or might not be in the same
process contract as the parent (see process(5)). The child process
differs from the parent process in the following ways:

o The child process has a unique process ID which does not
match any active process group ID.

o The child process has a different parent process ID (that
is, the process ID of the parent process).

o The child process has its own copy of the parent's file
descriptors and directory streams. Each of the child's
file descriptors shares a common file pointer with the
corresponding file descriptor of the parent. In addition,
any file descriptors that were marked with the close-on-
fork flag, FD_CLOFORK (see fcntl(2) and O_CLOFORK in
open(2)), will not be present in the child process, but
remain open in the parent.

o Each shared memory segment remains attached and the value
of shm_nattach is incremented by 1.

o All semadj values are cleared (see semop(2)).

o Process locks, text locks, data locks, and other memory
locks are not inherited by the child (see plock(3C) and
memcntl(2)).

o The child process's tms structure is cleared: tms_utime,
stime, cutime, and cstime are set to 0 (see times(2)).

o The child processes resource utilizations are set to 0;
see getrlimit(2). The it_value and it_interval values for
the ITIMER_REAL timer are reset to 0; see getitimer(2).

o The set of signals pending for the child process is
initialized to the empty set.

o Timers created by timer_create(3C) are not inherited by
the child process.

o No asynchronous input or asynchronous output operations
are inherited by the child.

o Any preferred hardware address translation sizes (see
memcntl(2)) are inherited by the child.

o The child process holds no contracts (see contract(5)).


Record locks set by the parent process are not inherited by the child
process (see fcntl(2)).


Although any open door descriptors in the parent are shared by the
child, only the parent will receive a door invocation from clients
even if the door descriptor is open in the child. If a descriptor is
closed in the parent, attempts to operate on the door descriptor will
fail even if it is still open in the child.

Threads


A call to forkall() or forkallx() replicates in the child process all
of the threads (see thr_create(3C) and pthread_create(3C)) in the
parent process. A call to fork1() or forkx() replicates only the
calling thread in the child process.


A call to fork() is identical to a call to fork1(); only the calling
thread is replicated in the child process. This is the POSIX-
specified behavior for fork().


In releases of Solaris prior to Solaris 10, the behavior of fork()
depended on whether or not the application was linked with the POSIX
threads library. When linked with -lthread (Solaris Threads) but not
linked with -lpthread (POSIX Threads), fork() was the same as
forkall(). When linked with -lpthread, whether or not also linked
with -lthread, fork() was the same as fork1().


Prior to Solaris 10, either -lthread or -lpthread was required for
multithreaded applications. This is no longer the case. The standard
C library provides all threading support for both sets of application
programming interfaces. Applications that require replicate-all fork
semantics must call forkall() or forkallx().

Fork Extensions


The forkx() and forkallx() functions accept a flags argument
consisting of a bitwise inclusive-OR of zero or more of the following
flags, which are defined in the header <sys/fork.h>:

FORK_NOSIGCHLD

Do not post a SIGCHLD signal to the parent process when the child
process terminates, regardless of the disposition of the SIGCHLD
signal in the parent. SIGCHLD signals are still possible for job
control stop and continue actions if the parent has requested
them.


FORK_WAITPID

Do not allow wait-for-multiple-pids by the parent, as in wait(),
waitid(P_ALL), or waitid(P_PGID), to reap the child and do not
allow the child to be reaped automatically due the disposition of
the SIGCHLD signal being set to be ignored in the parent. Only a
specific wait for the child, as in waitid(P_PID, pid), is allowed
and it is required, else when the child exits it will remain a
zombie until the parent exits.


If the flags argument is 0 forkx() is identical to fork() and
forkallx() is identical to forkall().

fork() Safety
If a multithreaded application calls fork(), fork1(), or forkx(), and
the child does more than simply call one of the exec(2) functions,
there is a possibility of deadlock occurring in the child. The
application should use pthread_atfork(3C) to ensure safety with
respect to this deadlock. Should there be any outstanding mutexes
throughout the process, the application should call pthread_atfork()
to wait for and acquire those mutexes prior to calling fork(),
fork1(), or forkx(). See "MT-Level" on the attributes(7) manual
page.


The pthread_atfork() mechanism is used to protect the locks that
libc(3LIB) uses to implement interfaces such as malloc(3C). All
interfaces provided by libc are safe to use in a child process
following a fork(), except when fork() is executed within a signal
handler.


The POSIX standard (see standards(7)) requires fork to be Async-
Signal-Safe (see attributes(7)). This cannot be made to happen with
fork handlers in place, because they acquire locks. To be in nominal
compliance, no fork handlers are called when fork() is executed
within a signal context. This leaves the child process in a
questionable state with respect to its locks, but at least the
calling thread will not deadlock itself attempting to acquire a lock
that it already owns. In this situation, the application should
strictly adhere to the advice given in the POSIX specification: "To
avoid errors, the child process may only execute Async-Signal-Safe
operations until such time as one of the exec(2) functions is
called."

RETURN VALUES


Upon successful completion, fork(), fork1(), forkall(), forkx(), and
forkallx() return 0 to the child process and return the process ID of
the child process to the parent process. Otherwise, (pid_t)-1 is
returned to the parent process, no child process is created, and
errno is set to indicate the error.

ERRORS


The fork(), fork1(), forkall(), forkx(), and forkallx() functions
will fail if:

EAGAIN
A resource control or limit on the total number of
processes, tasks or LWPs under execution by a single user,
task, project, or zone has been exceeded, or the total
amount of system memory available is temporarily
insufficient to duplicate this process.


ENOMEM
There is not enough swap space.


EPERM
The {PRIV_PROC_FORK} privilege is not asserted in the
effective set of the calling process.


The forkx() and forkallx() functions will fail if:

EINVAL
The flags argument is invalid.


ATTRIBUTES


See attributes(7) for descriptions of the following attributes:


+--------------------+--------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+--------------------+--------------------+
|Interface Stability | Committed |
+--------------------+--------------------+
|MT-Level | Async-Signal-Safe. |
+--------------------+--------------------+
|Standard | See below. |
+--------------------+--------------------+


For fork(), see standards(7).

SEE ALSO


alarm(2), exec(2), exit(2), fcntl(2), getitimer(2), getrlimit(2),
memcntl(2), mmap(2), nice(2), priocntl(2), semop(2), shmop(2),
times(2), umask(2), waitid(2), door_create(3C), exit(3C), plock(3C),
pthread_atfork(3C), pthread_create(3C), signal(3C), system(3C),
thr_create(3C) timer_create(3C), wait(3C), contract(5), process(5),
attributes(7), privileges(7), standards(7)

NOTES


An application should call _exit() rather than exit(3C) if it cannot
execve(), since exit() will flush and close standard I/O channels and
thereby corrupt the parent process's standard I/O data structures.
Using exit(3C) will flush buffered data twice. See exit(2).


The thread in the child that calls fork(), fork1(), or fork1x() must
not depend on any resources held by threads that no longer exist in
the child. In particular, locks held by these threads will not be
released.


In a multithreaded process, forkall() in one thread can cause
blocking system calls to be interrupted and return with an EINTR
error.

June 21, 2024 FORK(2)

tribblix@gmail.com :: GitHub :: Privacy