How to use the fork function in Linux
Usage of fork function in Linux
In the Linux operating system, the fork() function is a very important system call function, used to create a new process. It is widely used in Unix and Unix-like operating systems. In this article, we will introduce the usage of the fork function in detail and provide some specific code examples.
1. Overview of the fork function
The prototype of the fork function is as follows:
#include <sys/types.h> #include <unistd.h> pid_t fork(void);
The fork function will create a new process, which is a copy of the process that calls fork. After calling fork, two identical processes will be generated, namely the parent process and the child process. The two processes are independent in memory and have independent address spaces.
The parent process calls fork and returns a non-negative number, indicating the PID (process ID) of the child process. The child process calls fork and returns 0. If the fork call fails, -1 is returned, indicating that the creation of the child process failed.
2. Usage of fork function
The following is the general usage of fork function:
#include <stdio.h> #include <sys/types.h> #include <unistd.h> int main() { pid_t pid; pid = fork(); if (pid < 0) { // fork调用失败 perror("fork"); return 1; } else if (pid == 0) { // 子进程 printf("Hello from child process! PID=%d ", getpid()); } else { // 父进程 printf("Hello from parent process! PID=%d, Child PID=%d ", getpid(), pid); } return 0; }
In the above example, we created a new child process through the fork function. In the child process, we print out "Hello from child process!" and the PID of the current process. In the parent process, we print out "Hello from parent process!" along with the PID of the current process and the PID of the child process.
When we run the above code, we will get the following output:
Hello from parent process! PID=1234, Child PID=1235 Hello from child process! PID=1235
It can be seen that when the fork function is called successfully, the parent process and the child process will execute the subsequent code of the program at the same time.
3. The return value of the fork function
In the above example, we use the return value of the fork function to determine whether the current process is a parent process or a child process.
- If the return value is a negative number (-1), it means that the fork call failed.
- If the return value is 0, it means that the current process is a child process.
- If the return value is greater than 0, it means that the current process is the parent process, and the return value is the PID of the child process.
4. Practical application of fork function
The fork function has many application scenarios in actual development, such as multi-process concurrent servers, process pools, etc. Below is a simple example showing how to use the fork function to implement a simple concurrent server.
#include <stdio.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <unistd.h> #define PORT 8888 #define MAX_BUFFER_SIZE 1024 int main() { int server_fd, new_socket; struct sockaddr_in address; pid_t child_pid; // 创建socket server_fd = socket(AF_INET, SOCK_STREAM, 0); // 设置address address.sin_family = AF_INET; address.sin_addr.s_addr = INADDR_ANY; address.sin_port = htons(PORT); // 绑定socket和address bind(server_fd, (struct sockaddr *)&address, sizeof(address)); // 监听socket listen(server_fd, 5); while (1) { // 接受客户端连接 new_socket = accept(server_fd, NULL, NULL); // 创建子进程来处理客户端请求 child_pid = fork(); if (child_pid < 0) { // fork调用失败 perror("fork"); return 1; } else if (child_pid == 0) { // 子进程 char buffer[MAX_BUFFER_SIZE] = {0}; read(new_socket, buffer, MAX_BUFFER_SIZE); printf("Received message: %s ", buffer); close(new_socket); return 0; } else { // 父进程 // 关闭父进程不需要的socket close(new_socket); } } return 0; }
In the above example, we use the fork function to implement a multi-process concurrent server. When a client connects, we create a child process to handle the client request. The parent process continues to listen for connections from other clients. In this way, we can handle multiple client connection requests at the same time and improve the concurrent performance of the server.
Summary:
In this article, we introduced the usage of the fork function in Linux and provided some specific code examples. The fork function is a very important system call function in the Linux operating system. It can create a new process and make the concurrent execution of the process possible. By rationally using the fork function, we can implement some complex concurrent applications and improve system performance.
The above is the detailed content of How to use the fork function in Linux. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Linux's cost of ownership is usually lower than Windows. 1) Linux does not require license fees, saving a lot of costs, while Windows requires purchasing a license. 2) Linux has low hardware requirements and can extend the service life of the device. 3) The Linux community provides free support to reduce maintenance costs. 4) Linux is highly secure and reduces productivity losses. 5) The Linux learning curve is steep, but Windows is easier to use. The choice should be based on specific needs and budget.

The key to installing dual systems in Linux and Windows is partitioning and boot settings. 1. Preparation includes backing up data and compressing existing partitions to make space; 2. Use Ventoy or Rufus to make Linux boot USB disk, recommend Ubuntu; 3. Select "Coexist with other systems" or manually partition during installation (/at least 20GB, /home remaining space, swap optional); 4. Check the installation of third-party drivers to avoid hardware problems; 5. If you do not enter the Grub boot menu after installation, you can use boot-repair to repair the boot or adjust the BIOS startup sequence. As long as the steps are clear and the operation is done properly, the whole process is not complicated.

The key to enabling EPEL repository is to select the correct installation method according to the system version. First, confirm the system type and version, and use the command cat/etc/os-release to obtain information; second, enable EPEL through dnfinstallepel-release on CentOS/RockyLinux, and the 8 and 9 version commands are the same; third, you need to manually download the corresponding version of the .repo file and install it on RHEL; fourth, you can re-import the GPG key when encountering problems. Note that the old version may not be supported, and you can also consider enabling epel-next to obtain the test package. After completing the above steps, use dnfrepolist to verify that the EPEL repository is successfully added.

Newbie users should first clarify their usage requirements when choosing a Linux distribution. 1. Choose Ubuntu or LinuxMint for daily use; programming and development are suitable for Manjaro or Fedora; use Lubuntu and other lightweight systems for old devices; recommend CentOSStream or Debian to learn the underlying principles. 2. Stability is preferred for UbuntuLTS or Debian; you can choose Arch or Manjaro to pursue new features. 3. In terms of community support, Ubuntu and LinuxMint are rich in resources, and Arch documents are technically oriented. 4. In terms of installation difficulty, Ubuntu and LinuxMint are relatively simple, and Arch is suitable for those with basic needs. It is recommended to try it first and then decide.

The steps to add a new hard disk to the Linux system are as follows: 1. Confirm that the hard disk is recognized and use lsblk or fdisk-l to check; 2. Use fdisk or parted partitions, such as fdisk/dev/sdb and create and save; 3. Format the partition to a file system, such as mkfs.ext4/dev/sdb1; 4. Use the mount command for temporary mounts, such as mount/dev/sdb1/mnt/data; 5. Modify /etc/fstab to achieve automatic mount on the computer, and test the mount first to ensure correctness. Be sure to confirm data security before operation to avoid hardware connection problems.

Have problems uploading files in Google Chrome? This may be annoying, right? Whether you are attaching documents to emails, sharing images on social media, or submitting important files for work or school, a smooth file upload process is crucial. So, it can be frustrating if your file uploads continue to fail in Chrome on Windows PC. If you're not ready to give up your favorite browser, here are some tips for fixes that can't upload files on Windows Google Chrome 1. Start with Universal Repair Before we learn about any advanced troubleshooting tips, it's best to try some of the basic solutions mentioned below. Troubleshooting Internet connection issues: Internet connection

Logs in Linux systems are usually stored in the /var/log directory, which contains a variety of key log files, such as syslog or messages (record system logs), auth.log (record authentication events), kern.log (record kernel messages), dpkg.log or yum.log (record package operations), boot.log (record startup information); log content can be viewed through cat, tail-f or journalctl commands; application logs are often located in subdirectories under /var/log, such as Apache's apache2 or httpd directory, MySQL log files, etc.; at the same time, it is necessary to note that log permissions usually require s

sudo stands for "substituteuserdo" or "superuserdo", allowing users to run commands with permissions of other users (usually root). Its core uses include: 1. Perform system-level operations such as installing software or editing system files; 2. Accessing protected directories or logs; 3. Manage services such as restarting nginx; 4. Modify global settings such as /etc/hosts. When using it, the system will check the /etc/sudoers configuration and verify the user password, provide temporary permissions instead of continuously logging in as root, ensuring security. Best practices include: only when necessary, avoid blindly executing network commands, editing sudoers files with visudo, and considering continuous operations.
