daemonize.c 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220
  1. /*
  2. * This code is mainly taken from Doug Potter's page
  3. *
  4. * http://www-theorie.physik.unizh.ch/~dpotter/howto/daemonize
  5. *
  6. * I contacted him 2007-04-16 about the license for the original code,
  7. * he replied it is Public Domain. Use the URL above to get the original
  8. * Public Domain version if you want it.
  9. *
  10. * This version is LGPL2.1+SLE like the rest of libwebsockets and is
  11. * Copyright (c)2006 - 2013 Andy Green <andy@warmcat.com>
  12. */
  13. #include <stdlib.h>
  14. #include <string.h>
  15. #include <stdio.h>
  16. #include <signal.h>
  17. #include <sys/types.h>
  18. #include <sys/stat.h>
  19. #include <fcntl.h>
  20. #include <limits.h>
  21. #include <unistd.h>
  22. #include <errno.h>
  23. #include "private-libwebsockets.h"
  24. int pid_daemon;
  25. static char *lock_path;
  26. int get_daemonize_pid()
  27. {
  28. return pid_daemon;
  29. }
  30. static void
  31. child_handler(int signum)
  32. {
  33. int fd, len, sent;
  34. char sz[20];
  35. switch (signum) {
  36. case SIGALRM: /* timed out daemonizing */
  37. exit(0);
  38. break;
  39. case SIGUSR1: /* positive confirmation we daemonized well */
  40. /* Create the lock file as the current user */
  41. fd = open(lock_path, O_TRUNC | O_RDWR | O_CREAT, 0640);
  42. if (fd < 0) {
  43. fprintf(stderr,
  44. "unable to create lock file %s, code=%d (%s)\n",
  45. lock_path, errno, strerror(errno));
  46. exit(5);
  47. }
  48. len = sprintf(sz, "%u", pid_daemon);
  49. sent = write(fd, sz, len);
  50. if (sent != len)
  51. fprintf(stderr,
  52. "unable to write pid to lock file %s, code=%d (%s)\n",
  53. lock_path, errno, strerror(errno));
  54. close(fd);
  55. exit(0);
  56. //!!(sent == len));
  57. case SIGCHLD: /* daemonization failed */
  58. exit(6);
  59. break;
  60. }
  61. }
  62. static void lws_daemon_closing(int sigact)
  63. {
  64. if (getpid() == pid_daemon)
  65. if (lock_path) {
  66. unlink(lock_path);
  67. lws_free_set_NULL(lock_path);
  68. }
  69. kill(getpid(), SIGKILL);
  70. }
  71. /*
  72. * You just need to call this from your main(), when it
  73. * returns you are all set "in the background" decoupled
  74. * from the console you were started from.
  75. *
  76. * The process context you called from has been terminated then.
  77. */
  78. LWS_VISIBLE int
  79. lws_daemonize(const char *_lock_path)
  80. {
  81. struct sigaction act;
  82. pid_t sid, parent;
  83. int n, fd, ret;
  84. char buf[10];
  85. /* already a daemon */
  86. // if (getppid() == 1)
  87. // return 1;
  88. fd = open(_lock_path, O_RDONLY);
  89. if (fd >= 0) {
  90. n = read(fd, buf, sizeof(buf));
  91. close(fd);
  92. if (n) {
  93. n = atoi(buf);
  94. ret = kill(n, 0);
  95. if (ret >= 0) {
  96. fprintf(stderr,
  97. "Daemon already running from pid %d\n", n);
  98. exit(1);
  99. }
  100. fprintf(stderr,
  101. "Removing stale lock file %s from dead pid %d\n",
  102. _lock_path, n);
  103. unlink(lock_path);
  104. }
  105. }
  106. n = strlen(_lock_path) + 1;
  107. lock_path = lws_malloc(n);
  108. if (!lock_path) {
  109. fprintf(stderr, "Out of mem in lws_daemonize\n");
  110. return 1;
  111. }
  112. strcpy(lock_path, _lock_path);
  113. /* Trap signals that we expect to receive */
  114. signal(SIGCHLD, child_handler); /* died */
  115. signal(SIGUSR1, child_handler); /* was happy */
  116. signal(SIGALRM, child_handler); /* timeout daemonizing */
  117. /* Fork off the parent process */
  118. pid_daemon = fork();
  119. if (pid_daemon < 0) {
  120. fprintf(stderr, "unable to fork daemon, code=%d (%s)",
  121. errno, strerror(errno));
  122. exit(9);
  123. }
  124. /* If we got a good PID, then we can exit the parent process. */
  125. if (pid_daemon > 0) {
  126. /*
  127. * Wait for confirmation signal from the child via
  128. * SIGCHILD / USR1, or for two seconds to elapse
  129. * (SIGALRM). pause() should not return.
  130. */
  131. alarm(2);
  132. pause();
  133. /* should not be reachable */
  134. exit(1);
  135. }
  136. /* At this point we are executing as the child process */
  137. parent = getppid();
  138. pid_daemon = getpid();
  139. /* Cancel certain signals */
  140. signal(SIGCHLD, SIG_DFL); /* A child process dies */
  141. signal(SIGTSTP, SIG_IGN); /* Various TTY signals */
  142. signal(SIGTTOU, SIG_IGN);
  143. signal(SIGTTIN, SIG_IGN);
  144. signal(SIGHUP, SIG_IGN); /* Ignore hangup signal */
  145. /* Change the file mode mask */
  146. umask(0);
  147. /* Create a new SID for the child process */
  148. sid = setsid();
  149. if (sid < 0) {
  150. fprintf(stderr,
  151. "unable to create a new session, code %d (%s)",
  152. errno, strerror(errno));
  153. exit(2);
  154. }
  155. /*
  156. * Change the current working directory. This prevents the current
  157. * directory from being locked; hence not being able to remove it.
  158. */
  159. if (chdir("/tmp") < 0) {
  160. fprintf(stderr,
  161. "unable to change directory to %s, code %d (%s)",
  162. "/", errno, strerror(errno));
  163. exit(3);
  164. }
  165. /* Redirect standard files to /dev/null */
  166. if (!freopen("/dev/null", "r", stdin))
  167. fprintf(stderr, "unable to freopen() stdin, code %d (%s)",
  168. errno, strerror(errno));
  169. if (!freopen("/dev/null", "w", stdout))
  170. fprintf(stderr, "unable to freopen() stdout, code %d (%s)",
  171. errno, strerror(errno));
  172. if (!freopen("/dev/null", "w", stderr))
  173. fprintf(stderr, "unable to freopen() stderr, code %d (%s)",
  174. errno, strerror(errno));
  175. /* Tell the parent process that we are A-okay */
  176. kill(parent, SIGUSR1);
  177. act.sa_handler = lws_daemon_closing;
  178. sigemptyset(&act.sa_mask);
  179. act.sa_flags = 0;
  180. sigaction(SIGTERM, &act, NULL);
  181. /* return to continue what is now "the daemon" */
  182. return 0;
  183. }