pthread_atfork.c revision 1.7 1 /* $NetBSD: pthread_atfork.c,v 1.7 2008/03/07 17:56:39 ad Exp $ */
2
3 /*-
4 * Copyright (c) 2002 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Nathan J. Williams.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgement:
20 * This product includes software developed by the NetBSD
21 * Foundation, Inc. and its contributors.
22 * 4. Neither the name of The NetBSD Foundation nor the names of its
23 * contributors may be used to endorse or promote products derived
24 * from this software without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 * POSSIBILITY OF SUCH DAMAGE.
37 */
38
39 #include <sys/cdefs.h>
40 #if defined(LIBC_SCCS) && !defined(lint)
41 __RCSID("$NetBSD: pthread_atfork.c,v 1.7 2008/03/07 17:56:39 ad Exp $");
42 #endif /* LIBC_SCCS and not lint */
43
44 #include "namespace.h"
45
46 #include <errno.h>
47 #include <stdlib.h>
48 #include <unistd.h>
49 #include <sys/queue.h>
50 #include "reentrant.h"
51
52 #ifdef __weak_alias
53 __weak_alias(pthread_atfork, _pthread_atfork)
54 __weak_alias(fork, _fork)
55 #endif /* __weak_alias */
56
57 pid_t __fork __P((void)); /* XXX */
58
59 struct atfork_callback {
60 SIMPLEQ_ENTRY(atfork_callback) next;
61 void (*fn)(void);
62 };
63
64 /*
65 * Hypothetically, we could protect the queues with a rwlock which is
66 * write-locked by pthread_atfork() and read-locked by fork(), but
67 * since the intended use of the functions is obtaining locks to hold
68 * across the fork, forking is going to be serialized anyway.
69 */
70 static struct atfork_callback atfork_builtin;
71 static mutex_t atfork_lock = MUTEX_INITIALIZER;
72 SIMPLEQ_HEAD(atfork_callback_q, atfork_callback);
73
74 static struct atfork_callback_q prepareq = SIMPLEQ_HEAD_INITIALIZER(prepareq);
75 static struct atfork_callback_q parentq = SIMPLEQ_HEAD_INITIALIZER(parentq);
76 static struct atfork_callback_q childq = SIMPLEQ_HEAD_INITIALIZER(childq);
77
78 static struct atfork_callback *
79 af_alloc(void)
80 {
81
82 if (atfork_builtin.fn == NULL)
83 return &atfork_builtin;
84
85 return malloc(sizeof(atfork_builtin));
86 }
87
88 static void
89 af_free(struct atfork_callback *af)
90 {
91
92 if (af != &atfork_builtin)
93 free(af);
94 }
95
96 int
97 pthread_atfork(void (*prepare)(void), void (*parent)(void),
98 void (*child)(void))
99 {
100 struct atfork_callback *newprepare, *newparent, *newchild;
101
102 newprepare = newparent = newchild = NULL;
103
104 mutex_lock(&atfork_lock);
105 if (prepare != NULL) {
106 newprepare = af_alloc();
107 if (newprepare == NULL) {
108 mutex_unlock(&atfork_lock);
109 return ENOMEM;
110 }
111 newprepare->fn = prepare;
112 }
113
114 if (parent != NULL) {
115 newparent = af_alloc();
116 if (newparent == NULL) {
117 if (newprepare != NULL)
118 af_free(newprepare);
119 mutex_unlock(&atfork_lock);
120 return ENOMEM;
121 }
122 newparent->fn = parent;
123 }
124
125 if (child != NULL) {
126 newchild = af_alloc();
127 if (newchild == NULL) {
128 if (newprepare != NULL)
129 af_free(newprepare);
130 if (newparent != NULL)
131 af_free(newparent);
132 mutex_unlock(&atfork_lock);
133 return ENOMEM;
134 }
135 newchild->fn = child;
136 }
137
138 /*
139 * The order in which the functions are called is specified as
140 * LIFO for the prepare handler and FIFO for the others; insert
141 * at the head and tail as appropriate so that SIMPLEQ_FOREACH()
142 * produces the right order.
143 */
144 if (prepare)
145 SIMPLEQ_INSERT_HEAD(&prepareq, newprepare, next);
146 if (parent)
147 SIMPLEQ_INSERT_TAIL(&parentq, newparent, next);
148 if (child)
149 SIMPLEQ_INSERT_TAIL(&childq, newchild, next);
150 mutex_unlock(&atfork_lock);
151
152 return 0;
153 }
154
155 pid_t
156 fork(void)
157 {
158 struct atfork_callback *iter;
159 pid_t ret;
160
161 mutex_lock(&atfork_lock);
162 SIMPLEQ_FOREACH(iter, &prepareq, next)
163 (*iter->fn)();
164
165 ret = __fork();
166
167 if (ret != 0) {
168 /*
169 * We are the parent. It doesn't matter here whether
170 * the fork call succeeded or failed.
171 */
172 SIMPLEQ_FOREACH(iter, &parentq, next)
173 (*iter->fn)();
174 mutex_unlock(&atfork_lock);
175 } else {
176 /* We are the child */
177 SIMPLEQ_FOREACH(iter, &childq, next)
178 (*iter->fn)();
179 /*
180 * Note: We are explicitly *not* unlocking
181 * atfork_lock. Unlocking atfork_lock is problematic,
182 * because if any threads in the parent blocked on it
183 * between the initial lock and the fork() syscall,
184 * unlocking in the child will try to schedule
185 * threads, and either the internal mutex interlock or
186 * the runqueue spinlock could have been held at the
187 * moment of fork(). Since the other threads do not
188 * exist in this process, the spinlock will never be
189 * unlocked, and we would wedge.
190 * Instead, we reinitialize atfork_lock, since we know
191 * that the state of the atfork lists is consistent here,
192 * and that there are no other threads to be affected by
193 * the forcible cleaning of the queue.
194 * This permits double-forking to work, although
195 * it requires knowing that it's "safe" to initialize
196 * a locked mutex in this context.
197 *
198 * The problem exists for users of this interface,
199 * too, since the intented use of pthread_atfork() is
200 * to acquire locks across the fork call to ensure
201 * that the child sees consistent state. There's not
202 * much that can usefully be done in a child handler,
203 * and conventional wisdom discourages using them, but
204 * they're part of the interface, so here we are...
205 */
206 mutex_init(&atfork_lock, NULL);
207 }
208
209 return ret;
210 }
211