2006-06-03 19:49:21 +00:00
|
|
|
/* vi: set sw=4 ts=4: */
|
2005-08-01 22:52:09 +00:00
|
|
|
/*
|
|
|
|
* setsid.c -- execute a command in a new session
|
|
|
|
* Rick Sladkey <jrs@world.std.com>
|
|
|
|
* In the public domain.
|
|
|
|
*
|
2008-03-17 09:29:43 +00:00
|
|
|
* 1999-02-22 Arkadiusz Mickiewicz <misiek@pld.ORG.PL>
|
2005-08-01 22:52:09 +00:00
|
|
|
* - added Native Language Support
|
|
|
|
*
|
|
|
|
* 2001-01-18 John Fremlin <vii@penguinpowered.com>
|
|
|
|
* - fork in case we are process group leader
|
|
|
|
*
|
|
|
|
* 2004-11-12 Paul Fox
|
|
|
|
* - busyboxed
|
|
|
|
*/
|
|
|
|
|
2011-04-11 01:29:49 +00:00
|
|
|
//usage:#define setsid_trivial_usage
|
2016-01-17 00:09:36 +00:00
|
|
|
//usage: "[-c] PROG ARGS"
|
2011-04-11 01:29:49 +00:00
|
|
|
//usage:#define setsid_full_usage "\n\n"
|
|
|
|
//usage: "Run PROG in a new session. PROG will have no controlling terminal\n"
|
2016-01-17 00:09:36 +00:00
|
|
|
//usage: "and will not be affected by keyboard signals (^C etc).\n"
|
|
|
|
//usage: "\n -c Set controlling terminal to stdin"
|
2011-04-11 01:29:49 +00:00
|
|
|
|
2007-05-26 19:00:18 +00:00
|
|
|
#include "libbb.h"
|
2005-08-01 22:52:09 +00:00
|
|
|
|
2007-10-11 10:05:36 +00:00
|
|
|
int setsid_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
|
2008-07-05 09:18:54 +00:00
|
|
|
int setsid_main(int argc UNUSED_PARAM, char **argv)
|
2006-03-23 02:07:41 +00:00
|
|
|
{
|
2016-01-17 00:09:36 +00:00
|
|
|
unsigned opt;
|
|
|
|
|
|
|
|
opt_complementary = "-1"; /* at least one arg */
|
2016-06-20 21:50:26 +00:00
|
|
|
opt = getopt32(argv, "+c"); /* +: stop on first non-opt */
|
2016-01-17 00:09:36 +00:00
|
|
|
argv += optind;
|
2005-08-01 22:52:09 +00:00
|
|
|
|
2008-03-17 09:29:43 +00:00
|
|
|
/* setsid() is allowed only when we are not a process group leader.
|
|
|
|
* Otherwise our PID serves as PGID of some existing process group
|
2013-08-07 16:49:51 +00:00
|
|
|
* and cannot be used as PGID of a new process group.
|
|
|
|
*
|
|
|
|
* Example: setsid() below fails when run alone in interactive shell:
|
|
|
|
* $ setsid PROG
|
|
|
|
* because shell's child (setsid) is put in a new process group.
|
|
|
|
* But doesn't fail if shell is not interactive
|
|
|
|
* (and therefore doesn't create process groups for pipes),
|
|
|
|
* or if setsid is not the first process in the process group:
|
|
|
|
* $ true | setsid PROG
|
|
|
|
* or if setsid is executed in backquotes (`setsid PROG`)...
|
|
|
|
*/
|
2010-05-16 00:12:56 +00:00
|
|
|
if (setsid() < 0) {
|
|
|
|
pid_t pid = fork_or_rexec(argv);
|
|
|
|
if (pid != 0) {
|
|
|
|
/* parent */
|
|
|
|
/* TODO:
|
|
|
|
* we can waitpid(pid, &status, 0) and then even
|
|
|
|
* emulate exitcode, making the behavior consistent
|
|
|
|
* in both forked and non forked cases.
|
|
|
|
* However, the code is larger and upstream
|
|
|
|
* does not do such trick.
|
|
|
|
*/
|
2013-08-07 16:49:51 +00:00
|
|
|
return EXIT_SUCCESS;
|
2010-05-16 00:12:56 +00:00
|
|
|
}
|
2005-08-01 22:52:09 +00:00
|
|
|
|
2010-05-16 00:12:56 +00:00
|
|
|
/* child */
|
|
|
|
/* now there should be no error: */
|
|
|
|
setsid();
|
|
|
|
}
|
2005-08-01 22:52:09 +00:00
|
|
|
|
2016-01-17 00:09:36 +00:00
|
|
|
if (opt) {
|
|
|
|
/* -c: set (with stealing) controlling tty */
|
|
|
|
ioctl(0, TIOCSCTTY, 1);
|
|
|
|
}
|
|
|
|
|
2010-07-03 22:57:03 +00:00
|
|
|
BB_EXECVP_or_die(argv);
|
2005-08-01 22:52:09 +00:00
|
|
|
}
|