From 783d57af7bb2b851c16cf87df848e0365e5052da Mon Sep 17 00:00:00 2001 From: Denys Vlasenko Date: Wed, 12 Apr 2017 13:58:40 +0200 Subject: Sort some miscutils/ applets into coreutils or util-linux No code changes Signed-off-by: Denys Vlasenko --- util-linux/setsid.c | 82 +++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 82 insertions(+) create mode 100644 util-linux/setsid.c (limited to 'util-linux/setsid.c') diff --git a/util-linux/setsid.c b/util-linux/setsid.c new file mode 100644 index 000000000..143a8f8fa --- /dev/null +++ b/util-linux/setsid.c @@ -0,0 +1,82 @@ +/* vi: set sw=4 ts=4: */ +/* + * setsid.c -- execute a command in a new session + * Rick Sladkey + * In the public domain. + * + * 1999-02-22 Arkadiusz Mickiewicz + * - added Native Language Support + * + * 2001-01-18 John Fremlin + * - fork in case we are process group leader + * + * 2004-11-12 Paul Fox + * - busyboxed + */ +//config:config SETSID +//config: bool "setsid" +//config: default y +//config: help +//config: setsid runs a program in a new session + +//applet:IF_SETSID(APPLET(setsid, BB_DIR_USR_BIN, BB_SUID_DROP)) + +//kbuild:lib-$(CONFIG_SETSID) += setsid.o + +//usage:#define setsid_trivial_usage +//usage: "[-c] PROG ARGS" +//usage:#define setsid_full_usage "\n\n" +//usage: "Run PROG in a new session. PROG will have no controlling terminal\n" +//usage: "and will not be affected by keyboard signals (^C etc).\n" +//usage: "\n -c Set controlling terminal to stdin" + +#include "libbb.h" + +int setsid_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; +int setsid_main(int argc UNUSED_PARAM, char **argv) +{ + unsigned opt; + + opt_complementary = "-1"; /* at least one arg */ + opt = getopt32(argv, "+c"); /* +: stop on first non-opt */ + argv += optind; + + /* setsid() is allowed only when we are not a process group leader. + * Otherwise our PID serves as PGID of some existing process group + * and cannot be used as PGID of a new process group. + * + * Example: setsid() below fails when run alone in interactive shell: + * $ setsid PROG + * because shell's child (setsid) is put in a new process group. + * But doesn't fail if shell is not interactive + * (and therefore doesn't create process groups for pipes), + * or if setsid is not the first process in the process group: + * $ true | setsid PROG + * or if setsid is executed in backquotes (`setsid PROG`)... + */ + if (setsid() < 0) { + pid_t pid = fork_or_rexec(argv); + if (pid != 0) { + /* parent */ + /* TODO: + * we can waitpid(pid, &status, 0) and then even + * emulate exitcode, making the behavior consistent + * in both forked and non forked cases. + * However, the code is larger and upstream + * does not do such trick. + */ + return EXIT_SUCCESS; + } + + /* child */ + /* now there should be no error: */ + setsid(); + } + + if (opt) { + /* -c: set (with stealing) controlling tty */ + ioctl(0, TIOCSCTTY, 1); + } + + BB_EXECVP_or_die(argv); +} -- cgit v1.2.3