-
Notifications
You must be signed in to change notification settings - Fork 0
/
daemon.py
123 lines (102 loc) · 4.96 KB
/
daemon.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
"""Disk And Execution MONitor (Daemon)
Default daemon behaviors (they can be modified):
1.) Ignore SIGHUP signals.
2.) Default current working directory to the "/" directory.
3.) Set the current file creation mode mask to 0.
4.) Close all open files (0 to [SC_OPEN_MAX or 256]).
5.) Redirect standard I/O streams to "/dev/null".
Failed fork() calls will return a tuple: (errno, strerror). This behavior
can be modified to meet your program's needs.
Resources:
Advanced Programming in the Unix Environment: W. Richard Stevens
Unix Network Programming (Volume 1): W. Richard Stevens
http://www.erlenstar.demon.co.uk/unix/faq_2.html#SEC16
"""
#__author__ = "Chad J. Schroeder"
#__version__ = "$Id$"
import os # Miscellaneous OS interfaces.
import sys # System-specific parameters and functions.
import signal # Set handlers for asynchronous events.
def createDaemon():
"""Detach a process from the controlling terminal and run it in the
background as a daemon.
"""
try:
# Fork a child process so the parent can exit. This will return control
# to the command line or shell. This is required so that the new process
# is guaranteed not to be a process group leader. We have this guarantee
# because the process GID of the parent is inherited by the child, but
# the child gets a new PID, making it impossible for its PID to equal its
# PGID.
pid = os.fork()
except OSError, e:
#return((e.errno, e.strerror)) # ERROR (return a tuple)
return e.errno
if (pid == 0): # The first child.
# Next we call os.setsid() to become the session leader of this new
# session. The process also becomes the process group leader of the
# new process group. Since a controlling terminal is associated with a
# session, and this new session has not yet acquired a controlling
# terminal our process now has no controlling terminal. This shouldn't
# fail, since we're guaranteed that the child is not a process group
# leader.
os.setsid()
# When the first child terminates, all processes in the second child
# are sent a SIGHUP, so it's ignored.
signal.signal(signal.SIGHUP, signal.SIG_IGN)
try:
# Fork a second child to prevent zombies. Since the first child is
# a session leader without a controlling terminal, it's possible for
# it to acquire one by opening a terminal in the future. This second
# fork guarantees that the child is no longer a session leader, thus
# preventing the daemon from ever acquiring a controlling terminal.
pid = os.fork() # Fork a second child.
except OSError, e:
#return((e.errno, e.strerror)) # ERROR (return a tuple)
return e.errno
if (pid == 0): # The second child.
# Ensure that the daemon doesn't keep any directory in use. Failure
# to do this could make a filesystem unmountable.
os.chdir("/")
# Give the child complete control over permissions.
os.umask(0)
else:
os._exit(0) # Exit parent (the first child) of the second child.
else:
os._exit(0) # Exit parent of the first child.
# Close all open files. Try the system configuration variable, SC_OPEN_MAX,
# for the maximum number of open files to close. If it doesn't exist, use
# the default value (configurable).
try:
maxfd = os.sysconf("SC_OPEN_MAX")
except (AttributeError, ValueError):
maxfd = 256 # default maximum
# we can't close the fds because we get an error from os.urandom about
# the fd having disappeared...
# this isnt a problem anymore with python 2.4.4
if sys.version_info < (2,4,4,'final',0):
maxfd = 3
for fd in range(0, maxfd):
try:
os.close(fd)
except OSError: # ERROR (ignore)
pass
os.umask(022) # chrb - this seems more sensible
# Redirect the standard file descriptors to /dev/null.
os.open("/dev/null", os.O_RDONLY) # standard input (0)
# os.open("/dev/null", os.O_RDWR) # standard output (1)
os.open("/tmp/client.stdout", os.O_WRONLY|os.O_TRUNC|os.O_CREAT,0666) # standard output (1)
# os.open("/dev/null", os.O_RDWR) # standard error (2)
os.open("/tmp/client.stderr", os.O_WRONLY|os.O_TRUNC|os.O_CREAT,0666) # standard error (2)
return 0
if __name__ == "__main__":
# Self-test.
retCode = createDaemon()
# If executed with superuser privilages, there should be a new file in the
# "/" directory. It should contain the function's return code, the daemon's
# PID, PPID, and PGRP. Its PID should not equal its PGRP, and its PPID
# should equal 1. If it's executed without superuser privilages, the file
# won't be created and no errors will be reported.
open("createDaemon.log", "w").write("rc: %s; pid: %d; ppid: %d; pgrp: %d" %\
(retCode, os.getpid(), os.getppid(), os.getpgrp()))
sys.exit(0)