Home System Tutorial LINUX Analyzing the Patron Saint of Linux

Analyzing the Patron Saint of Linux

Apr 29, 2024 pm 12:28 PM
linux linux tutorial Red Hat linux system linux command linux certification red hat linux linux video

The difference between background process and daemon process
    The biggest differences are as follows:
  • (a) The daemon process has completely separated from the terminal console, but the background program has not completely separated from the terminal (results will still be output to the terminal before the terminal is closed);
  • (b) The daemon process will not be affected when closing the terminal console, but the background program will stop when the user exits. It needs to be run in the nohup command & format to avoid the impact;
  • (c) The session group, current directory, and file descriptors of the daemon process are independent. Running in the background is just a fork of the terminal to allow the program to execute in the background. None of this has changed;

Analyzing the Patron Saint of Linux

Characteristics of daemon process

Daemon is a special process that runs in the background. It is separated from the terminal. This prevents the process from being interrupted by signals generated by any terminal. The information generated during the execution of the process is not stored in any terminal. displayed on. A daemon process periodically performs certain tasks or waits for processing of certain events that occur. Most Linux servers are implemented using daemon processes.

Key points of daemon programming
    1. Shielding some signals related to the control terminal operation is to prevent the control terminal from being disturbed and exiting or hanging before the daemon process is started normally. code show as below:
      /* 处理可能的终端信号 */
      signal(SIGTTOU, SIG_IGN);
      signal(SIGTTIN, SIG_IGN);
      signal(SIGTSTP, SIG_IGN);
      signal(SIGHUP , SIG_IGN);
      
      Copy after login
    2. Run in the background.
      /* 是父进程,结束父进程,子进程继续 */
      if(fork())
          exit(0);
      
      Copy after login
    3. Leave the control terminal and process group:
      • (1) A process belongs to a process group, and the process group number (PGID) is the process number (PID) of the process group leader
      • (2) Processes in the same process group share a control terminal. This control terminal defaults to the terminal where the process was created
      • (3) The control terminal and process group associated with a process are usually inherited from the parent process. Therefore, the child process is still affected by the terminal of the parent process, because the signals generated by the terminal will be sent to all the foreground process groups. process.

      Based on the above reasons, it is necessary to completely get rid of the influence of the terminal for the child process. It is necessary to call setsid() to make the child process the new session leader. The code is as follows:

      setsid();
      Copy after login

      After the setsid() call is successful, the process calling this function becomes the new session group leader and new process group leader, and is separated from the original process group. Due to the exclusivity of the session process to the controlling terminal, the process is detached from the controlling terminal at the same time.

    4. To prohibit the process from reopening the control terminal, the method used is to create a child process again and let the parent process exit. The child process is no longer the session leader, thus achieving the goal. code show as below:
      /* 结束第一子进程,第二子进程继续 */
      if(fork())
          exit(0);
      
      Copy after login
    5. Close the open file descriptor. Because a process inherits open file descriptors from the parent process that created it, they are generally no longer needed. If it is not closed, system resources will be wasted. code show as below:
      #define NOFILE  256
      
      for(i=0; i
      Copy after login

    6. Change the current working directory. While a process is active, the file system containing its working directory cannot be unmounted. Therefore, you need to change the daemon's working directory to an appropriate directory. code show as below:
      chdir("/tmp");
      Copy after login
    7. Reset file creation mask. A process inherits the file creation mask from the parent process that created it. It may modify the access permissions of files created by the daemon. code show as below:
      umask(0);
      
      Copy after login
    8. Handle the SIGCHLD signal (child process exit signal). If you do not wait for the child process to end, the child process will become a zombie process and occupy system kernel resources.
      /* 将子进程退出信号设为SIG_IGN,让系统帮助回收进程资源 */
      signal(SIGCHLD, SIG_IGN);
      Copy after login

      The overall code is as follows:

      #define NOFILE      256
      
      void DaemonMode()
      {
          int num = 0;
          int fd0, fd1, fd2;
      
          /* 屏蔽可能的信号 */
          signal(SIGTTOU, SIG_IGN);
          signal(SIGTTIN, SIG_IGN);
          signal(SIGTSTP, SIG_IGN);
          signal(SIGHUP , SIG_IGN);
      
          if(fork())
              exit(0);
      
          setsid();
      
          if(fork())
              exit(0);
      
          chdir("/tmp/httpd");
      
          umask(0);
      
          for(; num
      Copy after login

Supplementary setsid() function function:

If the calling process is already the leader of a process group, this function returns an error. In order to prevent this situation, fork() is usually called to create a child process, and then its parent process is terminated, while the child process continues, and this function is called in the child process.

If the process calling this function is not a process group leader, this function will create a new session, and the process calling the setsid() function will become the leader process of the new session, and will be associated with the session group and process group of its parent process. Detach. Because the session is exclusive to the controlling terminal, the process is simultaneously detached from the controlling terminal.

The above is the detailed content of Analyzing the Patron Saint of Linux. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Two Point Museum: All Exhibits And Where To Find Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

deepseek web version entrance deepseek official website entrance deepseek web version entrance deepseek official website entrance Feb 19, 2025 pm 04:54 PM

DeepSeek is a powerful intelligent search and analysis tool that provides two access methods: web version and official website. The web version is convenient and efficient, and can be used without installation; the official website provides comprehensive product information, download resources and support services. Whether individuals or corporate users, they can easily obtain and analyze massive data through DeepSeek to improve work efficiency, assist decision-making and promote innovation.

How to install deepseek How to install deepseek Feb 19, 2025 pm 05:48 PM

There are many ways to install DeepSeek, including: compile from source (for experienced developers) using precompiled packages (for Windows users) using Docker containers (for most convenient, no need to worry about compatibility) No matter which method you choose, Please read the official documents carefully and prepare them fully to avoid unnecessary trouble.

Ouyi okx installation package is directly included Ouyi okx installation package is directly included Feb 21, 2025 pm 08:00 PM

Ouyi OKX, the world's leading digital asset exchange, has now launched an official installation package to provide a safe and convenient trading experience. The OKX installation package of Ouyi does not need to be accessed through a browser. It can directly install independent applications on the device, creating a stable and efficient trading platform for users. The installation process is simple and easy to understand. Users only need to download the latest version of the installation package and follow the prompts to complete the installation step by step.

BITGet official website installation (2025 beginner's guide) BITGet official website installation (2025 beginner's guide) Feb 21, 2025 pm 08:42 PM

BITGet is a cryptocurrency exchange that provides a variety of trading services including spot trading, contract trading and derivatives. Founded in 2018, the exchange is headquartered in Singapore and is committed to providing users with a safe and reliable trading platform. BITGet offers a variety of trading pairs, including BTC/USDT, ETH/USDT and XRP/USDT. Additionally, the exchange has a reputation for security and liquidity and offers a variety of features such as premium order types, leveraged trading and 24/7 customer support.

Get the gate.io installation package for free Get the gate.io installation package for free Feb 21, 2025 pm 08:21 PM

Gate.io is a popular cryptocurrency exchange that users can use by downloading its installation package and installing it on their devices. The steps to obtain the installation package are as follows: Visit the official website of Gate.io, click "Download", select the corresponding operating system (Windows, Mac or Linux), and download the installation package to your computer. It is recommended to temporarily disable antivirus software or firewall during installation to ensure smooth installation. After completion, the user needs to create a Gate.io account to start using it.

Ouyi Exchange Download Official Portal Ouyi Exchange Download Official Portal Feb 21, 2025 pm 07:51 PM

Ouyi, also known as OKX, is a world-leading cryptocurrency trading platform. The article provides a download portal for Ouyi's official installation package, which facilitates users to install Ouyi client on different devices. This installation package supports Windows, Mac, Android and iOS systems. Users can choose the corresponding version to download according to their device type. After the installation is completed, users can register or log in to the Ouyi account, start trading cryptocurrencies and enjoy other services provided by the platform.

How to automatically set permissions of unixsocket after system restart? How to automatically set permissions of unixsocket after system restart? Mar 31, 2025 pm 11:54 PM

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

Why does an error occur when installing an extension using PECL in a Docker environment? How to solve it? Why does an error occur when installing an extension using PECL in a Docker environment? How to solve it? Apr 01, 2025 pm 03:06 PM

Causes and solutions for errors when using PECL to install extensions in Docker environment When using Docker environment, we often encounter some headaches...

See all articles