2 * Copyright (c) 2019 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
16 #include <vcl/vcl_locked.h>
17 #include <vcl/vcl_private.h>
19 typedef struct vcl_locked_session_
25 u32 *workers_subscribed;
26 clib_bitmap_t *listeners;
27 } vcl_locked_session_t;
29 typedef struct vls_local_
32 volatile int vls_mt_n_threads;
33 pthread_mutex_t vls_mt_mq_mlock;
34 pthread_mutex_t vls_mt_spool_mlock;
35 volatile u8 select_mp_check;
36 volatile u8 epoll_mp_check;
37 } vls_process_local_t;
39 static vls_process_local_t vls_local;
40 static vls_process_local_t *vlsl = &vls_local;
42 typedef struct vls_main_
44 vcl_locked_session_t *vls_pool;
45 clib_rwlock_t vls_table_lock;
46 uword *session_index_to_vlsh_table;
52 vls_table_rlock (void)
54 clib_rwlock_reader_lock (&vlsm->vls_table_lock);
58 vls_table_runlock (void)
60 clib_rwlock_reader_unlock (&vlsm->vls_table_lock);
64 vls_table_wlock (void)
66 clib_rwlock_writer_lock (&vlsm->vls_table_lock);
70 vls_table_wunlock (void)
72 clib_rwlock_writer_unlock (&vlsm->vls_table_lock);
85 VLS_MT_LOCK_MQ = 1 << 0,
86 VLS_MT_LOCK_SPOOL = 1 << 1
92 vlsl->vls_mt_n_threads += 1;
93 vcl_set_worker_index (vlsl->vls_wrk_index);
99 pthread_mutex_lock (&vlsl->vls_mt_mq_mlock);
103 vls_mt_mq_unlock (void)
105 pthread_mutex_unlock (&vlsl->vls_mt_mq_mlock);
109 vls_mt_spool_lock (void)
111 pthread_mutex_lock (&vlsl->vls_mt_spool_mlock);
115 vls_mt_create_unlock (void)
117 pthread_mutex_unlock (&vlsl->vls_mt_spool_mlock);
121 vls_mt_locks_init (void)
123 pthread_mutex_init (&vlsl->vls_mt_mq_mlock, NULL);
124 pthread_mutex_init (&vlsl->vls_mt_spool_mlock, NULL);
127 static inline vcl_session_handle_t
128 vls_to_sh (vcl_locked_session_t * vls)
130 return vcl_session_handle_from_index (vls->session_index);
133 static inline vcl_session_handle_t
134 vls_to_sh_tu (vcl_locked_session_t * vls)
136 vcl_session_handle_t sh;
137 sh = vls_to_sh (vls);
138 vls_table_runlock ();
143 vls_alloc (vcl_session_handle_t sh)
145 vcl_locked_session_t *vls;
148 pool_get (vlsm->vls_pool, vls);
149 vls->session_index = vppcom_session_index (sh);
150 vls->worker_index = vppcom_session_worker (sh);
151 vls->vls_index = vls - vlsm->vls_pool;
152 hash_set (vlsm->session_index_to_vlsh_table, vls->session_index,
154 clib_spinlock_init (&vls->lock);
155 vls_table_wunlock ();
156 return vls->vls_index;
159 static vcl_locked_session_t *
160 vls_get (vls_handle_t vlsh)
162 if (pool_is_free_index (vlsm->vls_pool, vlsh))
164 return pool_elt_at_index (vlsm->vls_pool, vlsh);
168 vls_free (vcl_locked_session_t * vls)
171 hash_unset (vlsm->session_index_to_vlsh_table, vls->session_index);
172 clib_spinlock_free (&vls->lock);
173 pool_put (vlsm->vls_pool, vls);
176 static vcl_locked_session_t *
177 vls_get_and_lock (vls_handle_t vlsh)
179 vcl_locked_session_t *vls;
180 if (pool_is_free_index (vlsm->vls_pool, vlsh))
182 vls = pool_elt_at_index (vlsm->vls_pool, vlsh);
183 clib_spinlock_lock (&vls->lock);
187 static vcl_locked_session_t *
188 vls_get_w_dlock (vls_handle_t vlsh)
190 vcl_locked_session_t *vls;
192 vls = vls_get_and_lock (vlsh);
194 vls_table_runlock ();
199 vls_lock (vcl_locked_session_t * vls)
201 clib_spinlock_lock (&vls->lock);
205 vls_unlock (vcl_locked_session_t * vls)
207 clib_spinlock_unlock (&vls->lock);
211 vls_get_and_unlock (vls_handle_t vlsh)
213 vcl_locked_session_t *vls;
215 vls = vls_get (vlsh);
217 vls_table_runlock ();
221 vls_dunlock (vcl_locked_session_t * vls)
224 vls_table_runlock ();
228 vlsh_to_sh (vls_handle_t vlsh)
230 vcl_locked_session_t *vls;
233 vls = vls_get_w_dlock (vlsh);
235 return INVALID_SESSION_ID;
236 rv = vls_to_sh (vls);
242 vlsh_to_session_index (vls_handle_t vlsh)
244 vcl_session_handle_t sh;
245 sh = vlsh_to_sh (vlsh);
246 return vppcom_session_index (sh);
250 vls_si_to_vlsh (u32 session_index)
253 vlshp = hash_get (vlsm->session_index_to_vlsh_table, session_index);
254 return vlshp ? *vlshp : VLS_INVALID_HANDLE;
258 vls_session_index_to_vlsh (uint32_t session_index)
263 vlsh = vls_si_to_vlsh (session_index);
264 vls_table_runlock ();
270 vls_is_shared (vcl_locked_session_t * vls)
272 return vec_len (vls->workers_subscribed);
276 vls_is_shared_by_wrk (vcl_locked_session_t * vls, u32 wrk_index)
279 for (i = 0; i < vec_len (vls->workers_subscribed); i++)
280 if (vls->workers_subscribed[i] == wrk_index)
286 vls_listener_wrk_set (vcl_locked_session_t * vls, u32 wrk_index, u8 is_active)
288 clib_bitmap_set (vls->listeners, wrk_index, is_active);
292 vls_listener_wrk_is_active (vcl_locked_session_t * vls, u32 wrk_index)
294 return (clib_bitmap_get (vls->listeners, wrk_index) == 1);
298 vls_listener_wrk_start_listen (vcl_locked_session_t * vls, u32 wrk_index)
300 vppcom_session_listen (vls_to_sh (vls), ~0);
301 vls_listener_wrk_set (vls, wrk_index, 1 /* is_active */ );
305 vls_listener_wrk_stop_listen (vcl_locked_session_t * vls, u32 wrk_index)
310 wrk = vcl_worker_get (wrk_index);
311 s = vcl_session_get (wrk, vls->session_index);
312 if (s->session_state != STATE_LISTEN)
314 vppcom_send_unbind_sock (wrk, s->vpp_handle);
315 s->session_state = STATE_LISTEN_NO_MQ;
316 vls_listener_wrk_set (vls, wrk_index, 0 /* is_active */ );
320 vls_unshare_session (vcl_locked_session_t * vls, vcl_worker_t * wrk)
322 int i, do_disconnect;
325 s = vcl_session_get (wrk, vls->session_index);
326 if (s->session_state == STATE_LISTEN)
327 vls_listener_wrk_set (vls, wrk->wrk_index, 0 /* is_active */ );
329 for (i = 0; i < vec_len (vls->workers_subscribed); i++)
331 if (vls->workers_subscribed[i] != wrk->wrk_index)
336 svm_fifo_del_subscriber (s->rx_fifo, wrk->vpp_wrk_index);
337 svm_fifo_del_subscriber (s->tx_fifo, wrk->vpp_wrk_index);
339 vec_del1 (vls->workers_subscribed, i);
340 do_disconnect = s->session_state == STATE_LISTEN;
341 vcl_session_cleanup (wrk, s, vcl_session_handle (s), do_disconnect);
345 /* Return, if this is not the owning worker */
346 if (vls->worker_index != wrk->wrk_index)
349 /* Check if we can change owner or close */
350 if (vec_len (vls->workers_subscribed))
352 vls->worker_index = vls->workers_subscribed[0];
353 vec_del1 (vls->workers_subscribed, 0);
354 vcl_send_session_worker_update (wrk, s, vls->worker_index);
355 if (vec_len (vls->workers_subscribed))
356 clib_warning ("more workers need to be updated");
360 vcl_session_cleanup (wrk, s, vcl_session_handle (s),
361 1 /* do_disconnect */ );
368 vls_share_vcl_session (vcl_worker_t * wrk, vcl_session_t * s)
370 vcl_locked_session_t *vls;
372 vls = vls_get (vls_si_to_vlsh (s->session_index));
376 vec_add1 (vls->workers_subscribed, wrk->wrk_index);
379 svm_fifo_add_subscriber (s->rx_fifo, wrk->vpp_wrk_index);
380 svm_fifo_add_subscriber (s->tx_fifo, wrk->vpp_wrk_index);
382 else if (s->session_state == STATE_LISTEN)
384 s->session_state = STATE_LISTEN_NO_MQ;
391 vls_worker_copy_on_fork (vcl_worker_t * parent_wrk)
393 vcl_worker_t *wrk = vcl_worker_get_current ();
396 wrk->vpp_event_queues = vec_dup (parent_wrk->vpp_event_queues);
397 wrk->sessions = pool_dup (parent_wrk->sessions);
398 wrk->session_index_by_vpp_handles =
399 hash_dup (parent_wrk->session_index_by_vpp_handles);
403 pool_foreach (s, wrk->sessions, ({
404 vls_share_vcl_session (wrk, s);
408 vls_table_wunlock ();
412 vls_mt_acq_locks (vcl_locked_session_t * vls, vls_mt_ops_t op, int *locks_acq)
414 vcl_worker_t *wrk = vcl_worker_get_current ();
415 vcl_session_t *s = 0;
420 s = vcl_session_get (wrk, vls->session_index);
421 if (PREDICT_FALSE (!s))
423 is_nonblk = VCL_SESS_ATTR_TEST (s->attr, VCL_SESS_ATTR_NONBLOCK);
430 is_nonblk = vcl_session_read_ready (s) != 0;
434 *locks_acq |= VLS_MT_LOCK_MQ;
437 case VLS_MT_OP_WRITE:
440 is_nonblk = vcl_session_write_ready (s) != 0;
444 *locks_acq |= VLS_MT_LOCK_MQ;
447 case VLS_MT_OP_XPOLL:
449 *locks_acq |= VLS_MT_LOCK_MQ;
451 case VLS_MT_OP_SPOOL:
452 vls_mt_spool_lock ();
453 *locks_acq |= VLS_MT_LOCK_SPOOL;
461 vls_mt_rel_locks (int locks_acq)
463 if (locks_acq & VLS_MT_LOCK_MQ)
465 if (locks_acq & VLS_MT_LOCK_SPOOL)
466 vls_mt_create_unlock ();
469 #define vls_mt_guard(_vls, _op) \
470 int _locks_acq = 0; \
471 if (PREDICT_FALSE (vcl_get_worker_index () == ~0)); \
473 if (PREDICT_FALSE (vlsl->vls_mt_n_threads > 1)) \
474 vls_mt_acq_locks (_vls, _op, &_locks_acq); \
476 #define vls_mt_unguard() \
477 if (PREDICT_FALSE (_locks_acq)) \
478 vls_mt_rel_locks (_locks_acq)
481 vls_write (vls_handle_t vlsh, void *buf, size_t nbytes)
483 vcl_locked_session_t *vls;
486 if (!(vls = vls_get_w_dlock (vlsh)))
487 return VPPCOM_EBADFD;
489 vls_mt_guard (vls, VLS_MT_OP_WRITE);
490 rv = vppcom_session_write (vls_to_sh_tu (vls), buf, nbytes);
492 vls_get_and_unlock (vlsh);
497 vls_write_msg (vls_handle_t vlsh, void *buf, size_t nbytes)
499 vcl_locked_session_t *vls;
502 if (!(vls = vls_get_w_dlock (vlsh)))
503 return VPPCOM_EBADFD;
504 vls_mt_guard (vls, VLS_MT_OP_WRITE);
505 rv = vppcom_session_write_msg (vls_to_sh_tu (vls), buf, nbytes);
507 vls_get_and_unlock (vlsh);
512 vls_sendto (vls_handle_t vlsh, void *buf, int buflen, int flags,
515 vcl_locked_session_t *vls;
518 if (!(vls = vls_get_w_dlock (vlsh)))
519 return VPPCOM_EBADFD;
520 vls_mt_guard (vls, VLS_MT_OP_WRITE);
521 rv = vppcom_session_sendto (vls_to_sh_tu (vls), buf, buflen, flags, ep);
523 vls_get_and_unlock (vlsh);
528 vls_read (vls_handle_t vlsh, void *buf, size_t nbytes)
530 vcl_locked_session_t *vls;
533 if (!(vls = vls_get_w_dlock (vlsh)))
534 return VPPCOM_EBADFD;
535 vls_mt_guard (vls, VLS_MT_OP_READ);
536 rv = vppcom_session_read (vls_to_sh_tu (vls), buf, nbytes);
538 vls_get_and_unlock (vlsh);
543 vls_recvfrom (vls_handle_t vlsh, void *buffer, uint32_t buflen, int flags,
546 vcl_locked_session_t *vls;
549 if (!(vls = vls_get_w_dlock (vlsh)))
550 return VPPCOM_EBADFD;
551 vls_mt_guard (vls, VLS_MT_OP_READ);
552 rv = vppcom_session_recvfrom (vls_to_sh_tu (vls), buffer, buflen, flags,
555 vls_get_and_unlock (vlsh);
560 vls_attr (vls_handle_t vlsh, uint32_t op, void *buffer, uint32_t * buflen)
562 vcl_locked_session_t *vls;
565 if (!(vls = vls_get_w_dlock (vlsh)))
566 return VPPCOM_EBADFD;
567 rv = vppcom_session_attr (vls_to_sh_tu (vls), op, buffer, buflen);
568 vls_get_and_unlock (vlsh);
573 vls_bind (vls_handle_t vlsh, vppcom_endpt_t * ep)
575 vcl_locked_session_t *vls;
578 if (!(vls = vls_get_w_dlock (vlsh)))
579 return VPPCOM_EBADFD;
580 rv = vppcom_session_bind (vls_to_sh_tu (vls), ep);
581 vls_get_and_unlock (vlsh);
586 vls_listen (vls_handle_t vlsh, int q_len)
588 vcl_locked_session_t *vls;
591 if (!(vls = vls_get_w_dlock (vlsh)))
592 return VPPCOM_EBADFD;
593 vls_mt_guard (vls, VLS_MT_OP_XPOLL);
594 rv = vppcom_session_listen (vls_to_sh_tu (vls), q_len);
596 vls_get_and_unlock (vlsh);
601 vls_connect (vls_handle_t vlsh, vppcom_endpt_t * server_ep)
603 vcl_locked_session_t *vls;
606 if (!(vls = vls_get_w_dlock (vlsh)))
607 return VPPCOM_EBADFD;
608 vls_mt_guard (vls, VLS_MT_OP_XPOLL);
609 rv = vppcom_session_connect (vls_to_sh_tu (vls), server_ep);
611 vls_get_and_unlock (vlsh);
616 vls_mp_checks (vcl_locked_session_t * vls, int is_add)
618 vcl_worker_t *wrk = vcl_worker_get_current ();
621 s = vcl_session_get (wrk, vls->session_index);
622 switch (s->session_state)
627 if (vls->worker_index == wrk->wrk_index)
628 vls_listener_wrk_set (vls, wrk->wrk_index, 1 /* is_active */ );
631 vls_listener_wrk_stop_listen (vls, vls->worker_index);
633 case STATE_LISTEN_NO_MQ:
637 /* Register worker as listener */
638 vls_listener_wrk_start_listen (vls, wrk->wrk_index);
640 /* If owner worker did not attempt to accept/xpoll on the session,
641 * force a listen stop for it, since it may not be interested in
642 * accepting new sessions.
643 * This is pretty much a hack done to give app workers the illusion
644 * that it is fine to listen and not accept new sessions for a
645 * given listener. Without it, we would accumulate unhandled
646 * accepts on the passive worker message queue. */
647 if (!vls_listener_wrk_is_active (vls, vls->worker_index))
648 vls_listener_wrk_stop_listen (vls, vls->worker_index);
656 vls_accept (vls_handle_t listener_vlsh, vppcom_endpt_t * ep, int flags)
658 vls_handle_t accepted_vlsh;
659 vcl_locked_session_t *vls;
662 if (!(vls = vls_get_w_dlock (listener_vlsh)))
663 return VPPCOM_EBADFD;
664 if (vcl_n_workers () > 1)
665 vls_mp_checks (vls, 1 /* is_add */ );
666 vls_mt_guard (vls, VLS_MT_OP_SPOOL);
667 sh = vppcom_session_accept (vls_to_sh_tu (vls), ep, flags);
669 vls_get_and_unlock (listener_vlsh);
672 accepted_vlsh = vls_alloc (sh);
673 if (PREDICT_FALSE (accepted_vlsh == VLS_INVALID_HANDLE))
674 vppcom_session_close (sh);
675 return accepted_vlsh;
679 vls_create (uint8_t proto, uint8_t is_nonblocking)
681 vcl_session_handle_t sh;
684 vls_mt_guard (0, VLS_MT_OP_SPOOL);
685 sh = vppcom_session_create (proto, is_nonblocking);
687 if (sh == INVALID_SESSION_ID)
688 return VLS_INVALID_HANDLE;
690 vlsh = vls_alloc (sh);
691 if (PREDICT_FALSE (vlsh == VLS_INVALID_HANDLE))
692 vppcom_session_close (sh);
698 vls_close (vls_handle_t vlsh)
700 vcl_locked_session_t *vls;
705 vls = vls_get_and_lock (vlsh);
708 vls_table_wunlock ();
709 return VPPCOM_EBADFD;
712 vls_mt_guard (0, VLS_MT_OP_SPOOL);
713 if (vls_is_shared (vls))
715 /* At least two workers share the session so vls won't be freed */
716 vls_unshare_session (vls, vcl_worker_get_current ());
719 vls_table_wunlock ();
723 rv = vppcom_session_close (vls_to_sh (vls));
727 vls_table_wunlock ();
733 vls_epoll_create (void)
735 vcl_session_handle_t sh;
738 sh = vppcom_epoll_create ();
739 if (sh == INVALID_SESSION_ID)
740 return VLS_INVALID_HANDLE;
742 vlsh = vls_alloc (sh);
743 if (vlsh == VLS_INVALID_HANDLE)
744 vppcom_session_close (sh);
750 vls_epoll_ctl_mp_checks (vcl_locked_session_t * vls, int op)
752 if (vcl_n_workers () <= 1)
754 vlsl->epoll_mp_check = 1;
758 if (op == EPOLL_CTL_MOD)
761 vlsl->epoll_mp_check = 1;
762 vls_mp_checks (vls, op == EPOLL_CTL_ADD);
766 vls_epoll_ctl (vls_handle_t ep_vlsh, int op, vls_handle_t vlsh,
767 struct epoll_event *event)
769 vcl_locked_session_t *ep_vls, *vls;
770 vcl_session_handle_t ep_sh, sh;
774 ep_vls = vls_get_and_lock (ep_vlsh);
775 vls = vls_get_and_lock (vlsh);
776 ep_sh = vls_to_sh (ep_vls);
777 sh = vls_to_sh (vls);
779 if (PREDICT_FALSE (!vlsl->epoll_mp_check))
780 vls_epoll_ctl_mp_checks (vls, op);
782 vls_table_runlock ();
784 rv = vppcom_epoll_ctl (ep_sh, op, sh, event);
787 ep_vls = vls_get (ep_vlsh);
788 vls = vls_get (vlsh);
791 vls_table_runlock ();
796 vls_epoll_wait (vls_handle_t ep_vlsh, struct epoll_event *events,
797 int maxevents, double wait_for_time)
799 vcl_locked_session_t *vls;
802 if (!(vls = vls_get_w_dlock (ep_vlsh)))
803 return VPPCOM_EBADFD;
804 vls_mt_guard (0, VLS_MT_OP_XPOLL);
805 rv = vppcom_epoll_wait (vls_to_sh_tu (vls), events, maxevents,
808 vls_get_and_unlock (ep_vlsh);
813 vls_select_mp_checks (vcl_si_set * read_map)
815 vcl_locked_session_t *vls;
820 if (vcl_n_workers () <= 1)
822 vlsl->select_mp_check = 1;
829 vlsl->select_mp_check = 1;
830 wrk = vcl_worker_get_current ();
833 clib_bitmap_foreach (si, read_map, ({
834 s = vcl_session_get (wrk, si);
835 if (s->session_state == STATE_LISTEN)
837 vls = vls_get (vls_session_index_to_vlsh (si));
838 vls_mp_checks (vls, 1 /* is_add */);
845 vls_select (int n_bits, vcl_si_set * read_map, vcl_si_set * write_map,
846 vcl_si_set * except_map, double wait_for_time)
850 vls_mt_guard (0, VLS_MT_OP_XPOLL);
851 if (PREDICT_FALSE (!vlsl->select_mp_check))
852 vls_select_mp_checks (read_map);
853 rv = vppcom_select (n_bits, read_map, write_map, except_map, wait_for_time);
859 vls_unshare_vcl_worker_sessions (vcl_worker_t * wrk)
861 u32 current_wrk, is_current;
862 vcl_locked_session_t *vls;
865 if (pool_elts (vcm->workers) <= 1)
868 current_wrk = vcl_get_worker_index ();
869 is_current = current_wrk == wrk->wrk_index;
873 pool_foreach (s, wrk->sessions, ({
874 vls = vls_get (vls_si_to_vlsh (s->session_index));
875 if (vls && (is_current || vls_is_shared_by_wrk (vls, current_wrk)))
876 vls_unshare_session (vls, wrk);
880 vls_table_wunlock ();
884 vls_cleanup_vcl_worker (vcl_worker_t * wrk)
886 /* Unshare sessions and also cleanup worker since child may have
887 * called _exit () and therefore vcl may not catch the event */
888 vls_unshare_vcl_worker_sessions (wrk);
889 vcl_worker_cleanup (wrk, 1 /* notify vpp */ );
893 vls_cleanup_forked_child (vcl_worker_t * wrk, vcl_worker_t * child_wrk)
895 vcl_worker_t *sub_child;
898 if (child_wrk->forked_child != ~0)
900 sub_child = vcl_worker_get_if_valid (child_wrk->forked_child);
903 /* Wait a bit, maybe the process is going away */
904 while (kill (sub_child->current_pid, 0) >= 0 && tries++ < 50)
906 if (kill (sub_child->current_pid, 0) < 0)
907 vls_cleanup_forked_child (child_wrk, sub_child);
910 vls_cleanup_vcl_worker (child_wrk);
911 VDBG (0, "Cleaned up forked child wrk %u", child_wrk->wrk_index);
912 wrk->forked_child = ~0;
915 static struct sigaction old_sa;
918 vls_intercept_sigchld_handler (int signum, siginfo_t * si, void *uc)
920 vcl_worker_t *wrk, *child_wrk;
922 if (vcl_get_worker_index () == ~0)
925 if (sigaction (SIGCHLD, &old_sa, 0))
927 VERR ("couldn't restore sigchld");
931 wrk = vcl_worker_get_current ();
932 if (wrk->forked_child == ~0)
935 child_wrk = vcl_worker_get_if_valid (wrk->forked_child);
939 if (si && si->si_pid != child_wrk->current_pid)
941 VDBG (0, "unexpected child pid %u", si->si_pid);
944 vls_cleanup_forked_child (wrk, child_wrk);
947 if (old_sa.sa_flags & SA_SIGINFO)
949 void (*fn) (int, siginfo_t *, void *) = old_sa.sa_sigaction;
954 void (*fn) (int) = old_sa.sa_handler;
961 vls_incercept_sigchld ()
964 clib_memset (&sa, 0, sizeof (sa));
965 sa.sa_sigaction = vls_intercept_sigchld_handler;
966 sa.sa_flags = SA_SIGINFO;
967 if (sigaction (SIGCHLD, &sa, &old_sa))
969 VERR ("couldn't intercept sigchld");
975 vls_app_pre_fork (void)
977 vls_incercept_sigchld ();
978 vcl_flush_mq_events ();
982 vls_app_fork_child_handler (void)
984 vcl_worker_t *parent_wrk;
985 int rv, parent_wrk_index;
988 parent_wrk_index = vcl_get_worker_index ();
989 VDBG (0, "initializing forked child %u with parent wrk %u", getpid (),
995 vcl_set_worker_index (~0);
996 if (!vcl_worker_alloc_and_init ())
997 VERR ("couldn't allocate new worker");
1000 * Attach to binary api
1002 child_name = format (0, "%v-child-%u%c", vcm->app_name, getpid (), 0);
1003 vcl_cleanup_bapi ();
1004 vppcom_api_hookup ();
1005 vcm->app_state = STATE_APP_START;
1006 rv = vppcom_connect_to_vpp ((char *) child_name);
1007 vec_free (child_name);
1010 VERR ("couldn't connect to VPP!");
1015 * Register worker with vpp and share sessions
1017 vcl_worker_register_with_vpp ();
1018 parent_wrk = vcl_worker_get (parent_wrk_index);
1019 vls_worker_copy_on_fork (parent_wrk);
1020 parent_wrk->forked_child = vcl_get_worker_index ();
1022 /* Reset number of threads and set wrk index */
1023 vlsl->vls_mt_n_threads = 0;
1024 vlsl->vls_wrk_index = vcl_get_worker_index ();
1025 vlsl->select_mp_check = 0;
1026 vlsl->epoll_mp_check = 0;
1027 vls_mt_locks_init ();
1029 VDBG (0, "forked child main worker initialized");
1034 vls_app_fork_parent_handler (void)
1037 while (vcm->forking)
1044 /* Unshare the sessions. VCL will clean up the worker */
1045 vls_unshare_vcl_worker_sessions (vcl_worker_get_current ());
1049 vls_app_create (char *app_name)
1053 if ((rv = vppcom_app_create (app_name)))
1055 vlsm = clib_mem_alloc (sizeof (vls_main_t));
1056 clib_memset (vlsm, 0, sizeof (*vlsm));
1057 clib_rwlock_init (&vlsm->vls_table_lock);
1058 pthread_atfork (vls_app_pre_fork, vls_app_fork_parent_handler,
1059 vls_app_fork_child_handler);
1060 atexit (vls_app_exit);
1061 vlsl->vls_wrk_index = vcl_get_worker_index ();
1062 vls_mt_locks_init ();
1067 * fd.io coding-style-patch-verification: ON
1070 * eval: (c-set-style "gnu")