2006-06-04 01:19:21 +05:30
|
|
|
/* vi: set sw=4 ts=4: */
|
2005-08-02 04:22:09 +05:30
|
|
|
/*
|
|
|
|
* setsid.c -- execute a command in a new session
|
|
|
|
* Rick Sladkey <jrs@world.std.com>
|
|
|
|
* In the public domain.
|
|
|
|
*
|
2008-03-17 14:59:43 +05:30
|
|
|
* 1999-02-22 Arkadiusz Mickiewicz <misiek@pld.ORG.PL>
|
2005-08-02 04:22:09 +05:30
|
|
|
* - added Native Language Support
|
|
|
|
*
|
|
|
|
* 2001-01-18 John Fremlin <vii@penguinpowered.com>
|
|
|
|
* - fork in case we are process group leader
|
|
|
|
*
|
|
|
|
* 2004-11-12 Paul Fox
|
|
|
|
* - busyboxed
|
|
|
|
*/
|
|
|
|
|
2011-04-11 06:59:49 +05:30
|
|
|
//usage:#define setsid_trivial_usage
|
2016-01-17 05:39:36 +05:30
|
|
|
//usage: "[-c] PROG ARGS"
|
2011-04-11 06:59:49 +05:30
|
|
|
//usage:#define setsid_full_usage "\n\n"
|
|
|
|
//usage: "Run PROG in a new session. PROG will have no controlling terminal\n"
|
2016-01-17 05:39:36 +05:30
|
|
|
//usage: "and will not be affected by keyboard signals (^C etc).\n"
|
|
|
|
//usage: "\n -c Set controlling terminal to stdin"
|
2011-04-11 06:59:49 +05:30
|
|
|
|
2007-05-27 00:30:18 +05:30
|
|
|
#include "libbb.h"
|
2005-08-02 04:22:09 +05:30
|
|
|
|
2007-10-11 15:35:36 +05:30
|
|
|
int setsid_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
|
2008-07-05 14:48:54 +05:30
|
|
|
int setsid_main(int argc UNUSED_PARAM, char **argv)
|
2006-03-23 07:37:41 +05:30
|
|
|
{
|
2016-01-17 05:39:36 +05:30
|
|
|
unsigned opt;
|
|
|
|
|
|
|
|
opt_complementary = "-1"; /* at least one arg */
|
2016-06-21 03:20:26 +05:30
|
|
|
opt = getopt32(argv, "+c"); /* +: stop on first non-opt */
|
2016-01-17 05:39:36 +05:30
|
|
|
argv += optind;
|
2005-08-02 04:22:09 +05:30
|
|
|
|
2008-03-17 14:59:43 +05:30
|
|
|
/* setsid() is allowed only when we are not a process group leader.
|
|
|
|
* Otherwise our PID serves as PGID of some existing process group
|
2013-08-07 22:19:51 +05:30
|
|
|
* and cannot be used as PGID of a new process group.
|
|
|
|
*
|
|
|
|
* Example: setsid() below fails when run alone in interactive shell:
|
|
|
|
* $ setsid PROG
|
|
|
|
* because shell's child (setsid) is put in a new process group.
|
|
|
|
* But doesn't fail if shell is not interactive
|
|
|
|
* (and therefore doesn't create process groups for pipes),
|
|
|
|
* or if setsid is not the first process in the process group:
|
|
|
|
* $ true | setsid PROG
|
|
|
|
* or if setsid is executed in backquotes (`setsid PROG`)...
|
|
|
|
*/
|
2010-05-16 05:42:56 +05:30
|
|
|
if (setsid() < 0) {
|
|
|
|
pid_t pid = fork_or_rexec(argv);
|
|
|
|
if (pid != 0) {
|
|
|
|
/* parent */
|
|
|
|
/* TODO:
|
|
|
|
* we can waitpid(pid, &status, 0) and then even
|
|
|
|
* emulate exitcode, making the behavior consistent
|
|
|
|
* in both forked and non forked cases.
|
|
|
|
* However, the code is larger and upstream
|
|
|
|
* does not do such trick.
|
|
|
|
*/
|
2013-08-07 22:19:51 +05:30
|
|
|
return EXIT_SUCCESS;
|
2010-05-16 05:42:56 +05:30
|
|
|
}
|
2005-08-02 04:22:09 +05:30
|
|
|
|
2010-05-16 05:42:56 +05:30
|
|
|
/* child */
|
|
|
|
/* now there should be no error: */
|
|
|
|
setsid();
|
|
|
|
}
|
2005-08-02 04:22:09 +05:30
|
|
|
|
2016-01-17 05:39:36 +05:30
|
|
|
if (opt) {
|
|
|
|
/* -c: set (with stealing) controlling tty */
|
|
|
|
ioctl(0, TIOCSCTTY, 1);
|
|
|
|
}
|
|
|
|
|
2010-07-04 04:27:03 +05:30
|
|
|
BB_EXECVP_or_die(argv);
|
2005-08-02 04:22:09 +05:30
|
|
|
}
|