This is still a work in progress. Expect some rough edges.
Contents
- The basics
-
Simple questions
- How do I run a job in the background?
- My script runs a job in the background. How do I get its PID?
- OK, I have its PID. How do I check that it's still running?
- I want to do something with a process I started earlier
- How do I kill a process by name? I need to get the PID out of ps aux | grep ....
- But I'm on some old legacy Unix system that doesn't have pgrep! What do I do?
- I want to run something in the background and then log out.
- I'm trying to kill -9 my job but blah blah blah...
- Make SURE you have run and understood these commands:
-
Advanced questions
- I want to run two jobs in the background, and then wait until they both finish.
- How can I check to see if my game server is still running? I'll put a script in crontab, and if it's not running, I'll restart it...
- How do I make sure only one copy of my script can run at a time?
- I want to process a bunch of files in parallel, and when one finishes, I want to start the next. And I want to make sure there are exactly 5 jobs running at a time.
- My script runs a pipeline. When the script is killed, I want the pipeline to die too.
- How to work with processes
- On processes, environments and inheritance
The basics
A process is a running instance of a program in memory. Every process is identified by a number, called the PID, or Process IDentifier. Each process has its own privately allocated segment of memory, which is not accessible from any other process. This is where it stores its variables and other data.
The kernel keeps track of all these processes, and stores a little bit of basic metadata about them in a process table. However, for the most part, each process is autonomous, within the privileges allowed to it by the kernel. Once a process has been started, it is difficult to do anything to it other than suspend (pause) it, or terminate it.
The metadata stored by the kernel includes a process "name" and "command line". These are not reliable; the "name" of a process is whatever you said it is when you ran it, and may have no relationship whatsoever to the program's file name. (On some systems, running processes can also change their own names. For example, sendmail uses this to show its status.) Therefore, when working with a process, you must know its PID in order to be able to do anything with it. Looking for processes by name is extremely fallible.
Simple questions
How do I run a job in the background?
1 command &
By the way, '&' is a command separator in bash and other Bourne shells. It can be used any place ';' can (but not in addition to ';' -- you have to choose one or the other). Thus, you can write this:
1 command one & command two & command three &
which runs all three in the background simultaneously, and is equivalent to:
Or:
1 for i in one two three; do command "$i" & done
While both & and ; can be used to separate commands, & runs them in the background and ; runs them in sequence.
My script runs a job in the background. How do I get its PID?
The $! special parameter holds the PID of the most recently executed background job. You can use that later on in your script to keep track of the job, terminate it, record it in a PID file (shudder), or whatever.
OK, I have its PID. How do I check that it's still running?
kill -0 "$pid" will check to see whether a signal is deliverable (i.e., the process still exists). If you need to check on a single child process asynchronously, that's the most portable solution. You might also be able to use the wait shell command to block until the child (or children) terminate -- it depends on what your program has to do.
There is no shell scripting equivalent to the select(2) or poll(2) system calls. If you need to manage a complex suite of child processes and events, don't try to do it in a shell script. (That said, there are a few tricks in the advanced section of this page.)
I want to do something with a process I started earlier
Store the PID when you start the process and use that PID later on:
If you're still in the parent process that started the child process you want to do something with, that's perfect. You're guaranteed the PID is your child process (dead or alive), for the reasons explained below. You can use kill to signal it, terminate it, or just check whether it's still running. You can use wait to wait for it to end or to get its exit code if it has ended.
If you're NOT in the parent process that started the child process you want to do something with, that's a shame. Try restructuring your logic so that you can be. If that's not possible, the things you can do are a little more limited and a little more risky.
The parent process that created the child process should've written its PID to some place where you can access it. Read the PID in from wherever the parent stored it, and hope that no other process has accidentally taken control of the PID while you weren't looking. You can use kill to signal it, terminate it, or just check whether it's still running. You cannot use wait to wait for it or get its exit code; this is only possible from the child's parent process. If you really want to wait for the process to end, you can poll kill -0:
Using PID files is risky. The PID in the file may have been recycled before you even got there. The PID could be recycled after you read it from the file but before you send a fatal signal (a RaceCondition). Even the loop shown above is risky: the PID could be recycled in the middle of your polling loop, leaving you in an infinite loop.
If you need to write programs that manage a process without maintaining a parent/child relationship, your best bet is to make sure that all of those programs run with the same User ID (UID) which is not used by any other programs on the system. That way, if the PID gets recycled, your attempt to query/kill it will fail. This is infinitely preferable to your sending SIGTERM to some innocent process.
How do I kill a process by name? I need to get the PID out of ps aux | grep ....
No, you don't. Firstly, you probably do NOT want to find a process by name AT ALL. Make sure you have the PID of the process and do what the above answer says. If you don't know how to get the PID: Only the process that created your process knows the real PID. It should have stored it in a file for you. If you are IN the parent process, that's even better. Put the PID in a variable (process & mypid=$!) and use that.
If for some silly reason you really want to get to a process purely by name, you understand that this is a broken method, you don't care that this may set your hair on fire, and you want to do it anyway, you should probably use a command called pkill. You might also take a look at the command killall if you're on a legacy GNU/Linux system, but be warned: killall on some systems kills every process on the entire system. It's best to avoid it unless you really need it.
(Mac OS X comes with killall but not pkill. To get pkill, go to http://proctools.sourceforge.net/.)
If you just wanted to check for the existence of a process by name, use pgrep.
Please note that checking/killing processes by name is insecure, because processes can lie about their names, and there is nothing unique about the name of a process.
But I'm on some old legacy Unix system that doesn't have pgrep! What do I do?
As stated above, checking or killing processes by name is an extremely bad idea in the first place. So rather than agonize about shortcut tools like pgrep that you don't have, you'd do better to implement some sort of robust process management using the techniques we'll talk about later. But people love shortcuts, so let me fill in some legacy Unix issues and tricks here, even though you should not be using such things.
A legacy Unix system typically has no tool besides ps for inspecting running processes as a human system administrator. People then think that this is an appropriate tool to use in a script, even though it isn't. They fall into the mental trap of thinking that since this is the only tool provided by the OS for troubleshooting runaway processes as a human being, that it must be an appropriate tool for setting up services.
There are two entirely different ps commands on legacy Unix systems: System V Unix style (ps -ef) and BSD Unix style (ps auxw). In some slightly-less-old Unix systems, the two different syntaxes are combined, and the presence or absence of a hyphen tells ps which set of option letters is being used. (If you ever see ps -auxw with a hyphen, throw the program away immediately.) POSIX uses the System V style, and adds a -o option to tell ps which fields you want, so you don't have to write things like ps ... | awk '{print $2}' any more.
Now, the second real problem with ps -ef | grep foo (after the fact that process names are inherently unreliable) is that there is a RaceCondition in the output. In this pipeline, both the ps and the grep are spawned either simultaneously or nearly simultaneously. Depending on just how nearly simultaneously they are spawned, the grep process might or might not show up in the ps output. And the grep foo command is going to match both processes -- the foo daemon or whatever, and the grep foo command as well. Assuming both of them show up. You might get just one.
There are two workarounds for that issue. The first is to filter out the grep command. This is typically done by running ps -ef | grep -v grep | grep foo. Note that the grep -v is done first so that it is not the final command in the pipeline. This is so that the final command in the pipeline is the one whose exit status actually matters. This allows commands like the following to work properly:
1 if ps -ef | grep -v grep | grep -q foo; then
The second workaround involves crafting a grep command that will match the foo process but not the grep itself. There are many variants on this theme, but one of the most common is:
1 if ps -ef | grep '[f]oo'; then
You'll likely run into this a few times. The RegularExpression [f]oo matches only the literal string foo; it does not match the literal string [f]oo, and therefore the grep command won't be matched either. This approach saves one forked process (the grep -v), and some people find it clever.
I've seen one person try to do this:
Not only does this use a nonstandard GNU extension (grep -m -- stop after M matches), but it completely fails to avoid the race condition. If the race condition produces both grep and foo lines, there's no guarantee the foo one will be first! So, this is even worse than what we started with.
Anyway, these are just explanations of tricks you might see in other people's code, so that you can guess what they're attempting to do. You won't be writing such hacks, I hope.
I want to run something in the background and then log out.
If you want to be able to reconnect to it later, use screen or tmux. Launch either, then run whatever you want to run in the foreground, and detach (screen with Ctrl-A d and tmux with Ctrl-B d). You can reattach (as long as you didn't reboot the server) with screen -x to screen and with tmux attach to tmux. You can even attach multiple times, and each attached terminal will see (and control) the same thing. This is also great for remote teaching situations.
If you can't or don't want to do that, the traditional approach still works: nohup something &
Bash also has a disown command, if you want to log out with a background job running, and you forgot to nohup it initially.
If you need to logout of an ssh session with background jobs still running, make sure their file descriptors have been redirected so they aren't holding the terminal open, or the ssh client may hang.
I'm trying to kill -9 my job but blah blah blah...
Woah! Stop right there! Do not use kill -9, ever. For any reason. Unless you wrote the program to which you're sending the SIGKILL, and know that you can clean up the mess it leaves. Because you're debugging it.
If a process is not responding to normal signals, it's probably in "state D" (as shown on ps u), which means it's currently executing a system call. If that's the case, you're probably looking at a dead hard drive, or a dead NFS server, or a kernel bug, or something else along those lines. And you won't be able to kill the process anyway, SIGKILL or not.
If the process is ignoring normal SIGTERMs, then get the source code and fix it!
If you have an employee whose first instinct any time a job needs to be terminated is to break out the fucking howitzers, then fire him or her. Now.
Make SURE you have run and understood these commands:
help kill
help trap
man pkill
man pgrep
OK, now let's move on to the interesting stuff....
Advanced questions
I want to run two jobs in the background, and then wait until they both finish.
By default, wait waits for all of your shell's children to exit.
You can specify one or more jobs (either by PID, or by jobspec -- see Job Control for that). The help wait page is misleading (implying that only one argument may be given); refer to the full Bash manual instead.
There is no way to wait for "child process foo to end, OR something else to happen", other than setting a trap, which will only help if "something else to happen" is a signal being sent to the script.
There is also no way to wait for a process that is not your child. You can't hang around the schoolyard and pick up someone else's kids.
How can I check to see if my game server is still running? I'll put a script in crontab, and if it's not running, I'll restart it...
We get that question (in various forms) way too often. A user has some daemon, and they want to restart it whenever it dies. Yes, one could probably write a bash script that would try to parse the output of ps (or preferably pgrep if your system has it), and try to guess which process ID belongs to the daemon we want, and try to guess whether it's not there any more. But that's haphazard and dangerous. There are much better ways.
Most Unix systems already have a feature that allows you to respawn dead processes: init and inittab. If you want to make a new daemon instance pop up whenever the old one dies, typically all you need to do is put an appropriate line into /etc/inittab with the "respawn" action in column 3, and your process's invocation in column 4. Then run telinit q or your system's equivalent to make init re-read its inittab.
Some Unix systems don't have inittab, and some system administrators might want finer control over the daemons and their logging. Those people may want to look into daemontools, or runit.
This leads into the issue of self-daemonizing programs. There was a trend during the 1980s for Unix daemons such as inetd to put themselves into the background automatically. It seems to be particularly common on BSD systems, although it's widespread across all flavors of Unix.
The problem with this is that any sane method of managing a daemon requires that you keep track of it after starting it. If init is told to respawn a command, it simply launches that command as a child, then uses the wait() system call; so, when the child exits, the parent can spawn another one. Daemontools works the same way: a user-supplied run script establishes the environment, and then execs the process, thereby giving the daemontools supervisor direct parental authority over the process, including standard input and output, etc.
If a process double-forks itself into the background (the way inetd and sendmail and named do), it breaks the connection to its parent -- intentionally. This makes it unmanageable; the parent can no longer receive the child's output, and can no longer wait() for the child in order to be informed of its death. And the parent won't even know the new daemon's process ID. The child has run away from home without even leaving a note.
So, the Unix/BSD people came up with workarounds... they created "PID files", in which a long-running daemon would write its process ID, since the parent had no other way to determine it. But PID files are not reliable. A daemon could have died, and then some other process could have taken over its PID, rendering the PID file useless. Or the PID file could simply get deleted, or corrupted. They came up with pgrep and pkill to attempt to track down processes by name instead of by number... but what if the process doesn't have a unique name? What if there's more than one of it at a time, like nfsd or Apache?
These workarounds and tricks are only in place because of the original hack of self-backgrounding. Get rid of that, and everything else becomes easy! Init or daemontools or runit can just control the child process directly. And even the most raw beginner could write their own wrapper script:
Then simply arrange for that to be executed at boot time, with a simple & to put it in the background, and voila! An instant one-shot respawn.
Most modern software packages no longer require self-backgrounding; even for those where it's the default behavior (for compatibility with older versions), there's often a switch or a set of switches which allows one to control the process. For instance, Samba's smbd now has a -F switch specifically for use with daemontools and other such programs.
If all else fails, you can try using fghack (from the daemontools package) to prevent the self-backgrounding.
How do I make sure only one copy of my script can run at a time?
First, ask yourself why you think that restriction is necessary. Are you using a temporary file with a fixed name, rather than generating a new temporary file in a secure manner each time? If so, correct that bug in your script. Are you using some system resource without locking it to prevent corruption if multiple processes use it simultaneously? In that case, you should probably use file locking, by rewriting your application in a language that supports it.
The naive answer to this question, which is given all too frequently by well-meaning but inexperienced scripters, would be to run some variant of ps -ef | grep -v grep | grep "$(basename "$0")" | wc -l to count how many copies of the script are in existence at the moment. I won't even attempt to describe how horribly wrong that approach is... if you can't see it for yourself, you'll simply have to take my word for it.
Unfortunately, bash has no facility for locking a file. Bash FAQ #45 contains examples of using a directory, a symlink, etc. as a means of mutual exclusion; but you cannot lock a file directly.
I believe you can use (set -C; >lockfile) to atomically create a lockfile, please verify this. (see: Bash FAQ #45) --Andy753421
You could also run your program or shell script under the setlock program from the daemontools package. Presuming that you use the same lockfile to prevent concurrent or simultaneous execution of your script(s), you have effectively made sure that your script will only run once. Here's an example where we want to make sure that only one "sleep" is running at a given time.
$ setlock -nX lockfile sleep 100 & [1] 1169 $ setlock -nX lockfile sleep 100 setlock: fatal: unable to lock lockfile: temporary failure
If environmental restrictions require the use of a shell script, then you may be stuck using that. Otherwise, you should seriously consider rewriting the functionality you require in a more powerful language.
I want to process a bunch of files in parallel, and when one finishes, I want to start the next. And I want to make sure there are exactly 5 jobs running at a time.
For most of these examples, we will assume the task you want to run is a command, which takes a filename as an argument. Thus, you'll be feeding a stream of filenames into something that dispatches the job-commands.
Many xargs allow running tasks in parallel, including FreeBSD, OpenBSD and GNU (but not POSIX). If your xargs has -0 and -P options, it's a great choice for this task.
1 find . -print0 | xargs -0 -n 1 -P 5 command
One may also choose to use GNU Parallel (if available) instead of xargs, as GNU Parallel makes sure the output from different jobs do not mix.
1 find . -print0 | parallel -0 command | use_output_if_needed
In a script where the loop is very big you can use sem from GNU Parallel. Here 10 jobs are run in parallel:
Bash 4.3 introduced wait -n, which waits for any single job to complete. This can be used to run N processes in parallel:
1 #!/usr/bin/env bash
2 set -m # See below
3
4 # number of processes to run in parallel
5 num_procs=5
6
7 # function that processes one item
8 my_job() {
9 printf 'Processing %s\n' "$1"
10 sleep "$(( RANDOM % 5 + 1 ))"
11 }
12
13 i=0
14 while IFS= read -r line; do
15 if (( i++ >= num_procs )); then
16 wait -n # wait for any job to complete. New in 4.3
17 fi
18 my_job "$line" &
19 done < inputlist
20
21 wait # wait for the remaining processes
See Chet Ramey's notes about wait -n to see why set -m is used.
It seems a few people are perplexed by the preceding example. Bash retains a list of all completed-but-not-waited-for jobs in memory. When wait -n is called, if there's a job in this list, it gets removed from the list, $? is set appropriately, and the wait command terminates quickly. If there are no jobs in this list, wait blocks until a job completes.
For older versions of bash, one way is to divide the job into N "equal" parts, and then just launch them all in parallel. Here's an example:
1 #!/usr/bin/env bash
2 # Read all the files (from a text file, 1 per line) into an array.
3 mapfile -t files < inputlist
4
5 # Here's what we plan to do to them.
6 do_it() {
7 for f; do [[ -f $f ]] && my_job "$f"; done
8 }
9
10 # Divide the list into 5 sub-lists.
11 i=0 n=0 a=() b=() c=() d=() e=()
12 while ((i < ${#files[*]})); do
13 a[n]=${files[i]}
14 b[n]=${files[i+1]}
15 c[n]=${files[i+2]}
16 d[n]=${files[i+3]}
17 e[n]=${files[i+4]}
18 ((i+=5, n++))
19 done
20
21 # Process the sub-lists in parallel
22 do_it "${a[@]}" > a.out 2>&1 &
23 do_it "${b[@]}" > b.out 2>&1 &
24 do_it "${c[@]}" > c.out 2>&1 &
25 do_it "${d[@]}" > d.out 2>&1 &
26 do_it "${e[@]}" > e.out 2>&1 &
27 wait
See reading a file line-by-line and arrays and ArithmeticExpression for explanations of the syntax used in this example.
Even if the lists aren't quite identical in terms of the amount of work required, this approach is close enough for many purposes.
Another approach involves using a named pipe to tell a "manager" when a job is finished, so it can launch the next job. Here is an example of that approach:
1 #!/usr/bin/env bash
2
3 # FD 3 will be tied to a named pipe.
4 mkfifo pipe; exec 3<>pipe
5
6 # This is the job we're running.
7 s() {
8 printf 'Sleeping %s\n' "$1"
9 sleep "$1"
10 }
11
12 # Start off with 3 instances of it.
13 # Each time an instance terminates, write a newline to the named pipe.
14 { s 5; printf '\n' >&3; } &
15 { s 7; printf '\n' >&3; } &
16 { s 8; printf '\n' >&3; } &
17
18 # Each time we get a line from the named pipe, launch another job.
19 while read; do
20 { s "$(( RANDOM % 5 + 7 ))"; printf '\n' >&3; } &
21 done <&3
If you need something more sophisticated than these, you're probably looking at the wrong language. A C program could fork 5 children and manage them closely using select() or similar, to assign the next file in line to whichever child is ready to handle it. But bash has nothing equivalent to select or poll.
My script runs a pipeline. When the script is killed, I want the pipeline to die too.
One approach is to set up a signal handler (or an EXIT trap) to kill your child processes right before you die. Then, you need the PIDs of the children -- which, in the case of a pipeline, is not so easy. You can use a named pipe instead of a pipeline, so that you can collect the PIDs yourself:
This example sets up a FIFO with one writer and one reader, and stores their PIDs in an array named kids. The EXIT trap sends SIGTERM to them all, removes the FIFO, and exits. See Bash FAQ #62 for notes on the use of temporary files.
Another approach is to enable job control, which allows whole pipelines to be treated as units.
In this example, we enable job control with set -m. The %% in the EXIT trap refers to the current job (the most recently executed background pipeline qualifies for that). Telling bash to kill the current job takes out the entire pipeline, rather than just the last command in the pipeline (which is what we would get if we had stored and used $! instead of %%).
How to work with processes
The best way to do process management in Bash is to start the managed process(es) from your script, remember its PID, and use that PID to do things with your process later on.
If at ALL possible, AVOID ps, pgrep, killall, and any other process table parsing tools. These tools have no clue what process YOU WANT to talk to. They only guess at it based on filtering unreliable information. These tools may work fine in your little test environment, they may work fine in production for a while, but inevitably they WILL fail, because they ARE a broken approach to process management.
PIDs and parents
In UNIX, processes are identified by a number called a PID (for Process IDentifier). Each running process has a unique identifier. You cannot reliably determine when or how a process was started purely from the identifier number: for all intents and purposes, it is random. (On some systems, it is literally random, but even on ones which use sequential PID allocation, you cannot safely assume anything about processes based on their PID numbers.)
Each UNIX process also has a parent process. This parent process is the process that started it, but can change to the init process if the parent process ends before the new process does. (That is, init will pick up orphaned processes.) Understanding this parent/child relationship is vital because it is the key to reliable process management in UNIX. A process's PID will NEVER be freed up for use after the process dies UNTIL the parent process waits for the PID to see whether it ended and retrieve its exit code. If the parent ends, the process is returned to init, which does this for you.
This is important for one major reason: if the parent process manages its child process, it can be absolutely certain that, even if the child process dies, no other new process can accidentally recycle the child process's PID until the parent process has waited for that PID and noticed the child died. This gives the parent process the guarantee that the PID it has for the child process will ALWAYS point to that child process, whether it is alive or a "zombie". Nobody else has that guarantee.
Unfortunately, this guarantee doesn't apply to shell scripts. Shells aggressively reap their child processes and store the exit status in memory, where it becomes available to your script upon calling wait. But because the child has already been reaped before you call wait, there is no zombie to hold the PID. The kernel is free to reuse that PID, and your guarantee has been violated.
Therefore, you cannot write a general purpose service manager in a shell. You need a real language, or an existing tool. Don't try to reinvent this wheel. There are lots of service managers out there (daemontools, runit, systemd, etc.). Your system may already be using one of them. If it isn't, runit or daemontools or one of their siblings can be installed and used. (As of this writing [2019], the wiki you're reading right now is launched by a daemontools run script on a pre-systemd Debian system. You are not locked into your vendor's choice of init system, even on older operating systems.)
The risk of letting the parent die
Why is this all so important? Why should you care? Consider what happens if we use a "PID file". Assume the following sequence of events:
You're a boot script (for example, one in /etc/init.d). You are told to start the foodaemon.
- You start a foodaemon child process in the background and grab its PID.
- You write this PID to a file.
- You exit, assuming you've done your job.
- Later, you're started up again and told to kill the foodaemon.
- You look for the child process's PID in a file.
You send the SIGTERM signal to this PID, telling it to clean up and exit.
There is absolutely no way you can be certain that the process you told to exit is actually the one you started. The process you wanted to check up on could have died and another random new process could have easily recycled its PID that was released by init.
This is why sysv-rc and PID files are fundamentally broken. This is why almost every Linux system is finally moving away from sysv-rc.
Doing it right
As mentioned before, the right way to do something with your child process is by using its PID, preferably (if at all possible) from the parent process that created it.
You may have come here hoping for a quick hint on how to finish your script only to find these recommendations don't apply to any of your existing code or setup. That's probably not because your code or setup is an exception and you should disregard this; but more likely because you need to take the time and re-evaluate your existing code or setup and rework it. This will require you to think for a moment. Take that moment and do it right.
Starting a process and remembering its PID
To start a process asynchronously (so the main script can continue while the process runs in the "background"), use the & operator. To get the PID that was assigned to it, expand the ! parameter. You can, for example, save it in a variable:
Checking up on your process or terminating it
At a later time, you may be interested in whether your process is still running and if it is, you may decide it's time to terminate it. If it's not running anymore, you may be interested in its exit code to see whether it experienced a problem or ended successfully.
To send a process a signal, we use the kill command. Signals can be used to tell a process to do something, but kill can also be used to check if the process is still alive:
kill sends the SIGTERM signal, by default. This tells a program it's time to terminate. You can use the -0 option to kill if you don't want to terminate the process but just check up on whether it's still running. In either case, the kill command will have a 0 exit code (success) if it managed to send the signal (or found the process to still be alive).
Unless you intend to send a very specific signal to a process, do not use any other kill options; in particular, avoid using -9 or SIGKILL at all cost. The KILL signal is a very dangerous signal to send to a process and using it is almost always a bug. Send the default SIGTERM instead and have patience.
To wait for a child process to finish or to read in the exit code of a process that you know has already finished (because you did a kill -0 check, for example), use the wait built-in command:
1 night() { sleep 10; } # Define 'night' as a function that takes 10 seconds.
2 # Adjust seconds according to current season and latitude
3 # for a more realistic simulation.
4
5 night & nightpid=$!
6 sheep=0
7 while sleep 1; do
8 kill -0 "$nightpid" || break # Break the loop when we see the process has gone away.
9 echo "$(( ++sheep )) sheep jumped over the fence."
10 done
11
12 wait "$nightpid"; nightexit=$?
13 echo "The night ended with exit code $nightexit. We counted $sheep sheep."
Starting a "daemon" and checking whether it started successfully
This is a very common request. The problem is that there is no answer! There is no such thing as "the daemon started up successfully", and if your specific daemon were to have a relevant definition to that statement, it would be so completely daemon-specific, that there is no generic way for us to tell you how to check for that condition.
What people generally resort to in an attempt to provide something "good enough", is: "Let's start the daemon, wait a few seconds, check whether the daemon process is still running, and if so, let's assume it's doing the right thing.". Ignoring the fact that this is a totally lousy check which could easily be defeated by a stressed kernel, timing issues, latency or delay in the daemon's operations, and many other conditions, let's just see how we would implement this if we actually wanted to do this:
To be honest, this problem is much better solved by doing a daemon-specific check. For example, say you're starting a web server called httpd. The sensible thing to check in order to determine whether the web server started successfully... is whether it's actually serving your web content! Who'd have thought!
If something goes wrong, though, this will wait forever trying to connect to port 80. So let's check whether httpd died unexpectedly or whether a certain "timeout" time elapsed:
1 httpd -h 127.0.0.1 & httpdpid=$!
2 time=0 timeout=60
3 while sleep 1; do
4 nc -z 127.0.0.1 80 && break # See if we can establish a TCP connection to port 80.
5
6 # Connection not yet available.
7 if ! kill -0 "$httpdpid"; then
8 wait "$httpdpid"; httpdexit=$?
9 echo "httpd died unexpectedly with exit code: $httpdexit"
10 exit "$httpdexit"
11 fi
12 if (( ++time > timeout )); then
13 echo "httpd hasn't gotten ready after $time seconds. Something must've gone wrong.."
14 # kill "$httpdpid"; wait "$httpdpid" # You could terminate httpd here, if you like.
15 exit
16 fi
17 done
18
19 echo "httpd ready for duty."
On processes, environments and inheritance
Every process on a Unix system (except init) has a parent process from which it inherits certain things. A process can change some of these things, and not others. You cannot change things inside another process other than by being its parent, or attaching (attacking?) it with a debugger.
It is of paramount importance that you understand this model if you plan to use or administer a Unix system successfully. For example, a user with 10 windows open might wonder why he can't tell all of his shells to change the contents of their PATH variable, short of going to each one individually and running a command. And even then, the changed PATH variable won't be set in the user's window manager or desktop environment, which means any new windows he creates will still get the old variable.
The solution, of course, is that the user needs to edit a shell dot file, then logout and back in, so that his top-level processes will get the new variable, and can pass it along to their children.
Likewise, a system administrator might want to tell her in.ftpd to use a default umask of 002 instead of whatever it's currently using. Achieving that goal will require an understanding of how in.ftpd is launched on her system, either as a child of inetd or as a standalone daemon with some sort of boot script; making the appropriate modifications; and restarting the appropriate daemons, if any.
So, let's take a closer look at how processes are created.
The Unix process creation model revolves around two system calls: fork() and exec(). (There is actually a family of related system calls that begin with exec which all behave in slightly different manners, but we'll treat them all equally for now.) fork() creates a child process which is a duplicate of the parent who called fork() (with a few exceptions). The parent receives the child process's PID (Process ID) number as the return value of the fork() function, while the child gets a "0" to tell it that it's the child. exec() replaces the current process with a different program.
So, the usual sequence is:
A program calls fork() and checks the return value of the system call. If the status is greater than 0, then it's the parent process, so it calls wait() on the child process ID (unless we want it to continue running while the child runs in the background).
If the status is 0, then it's the child process, so it calls exec() to do whatever it's supposed to be doing.
But before that, the child might decide to close() some file descriptors, open() new ones, set environment variables, change resource limits, and so on. All of these changes will remain in effect after the exec() and will affect the task that is executed.
If the return value of fork() is negative, something bad happened (we ran out of memory, or the process table filled up, etc.).
Let's take an example of a shell command:
1 echo hello world 1>&2
The process executing this is a shell, which reads commands and executes them. For external commands, it uses the standard fork()/exec() model to do so. Let's show it step by step:
The parent shell calls fork().
The parent gets the child's process ID as the return value of fork() and waits for it to terminate.
The child gets a 0 from fork() so it knows it's the child.
The child is supposed to redirect standard output to standard error (due to the 1>&2 directive). It does this now:
- Close file descriptor 1.
- Duplicate file descriptor 2, and make sure the duplicate is FD 1.
The child calls exec("echo", "echo", "hello", "world", (char *)NULL) or something similar to execute the command. (Here, we're assuming echo is an external command.)
Once the echo terminates, the parent's wait call also terminates, and the parent resumes normal operation.
There are other things the child of the shell might do before executing the final command. For example, it might set environment variables:
1 http_proxy=http://tempproxy:3128/ lynx http://someURL/
In this case, the child will put http_proxy=http://tempproxy:3128/ into the environment before calling exec(). The parent's environment is unaffected.
A child process inherits many things from its parent:
- Open file descriptors: The child gets copies of these, referring to the same files.
Environment variables: The child gets its own copies of these, and changes made by the child do not affect the parent's copy.
Current working directory: If the child changes its working directory, the parent will never know about it.
- User ID, group ID and supplementary groups: A child process is spawned with the same privileges as its parent. Unless the child process is running with superuser UID (UID 0), it cannot change these privileges.
System resource limits: The child inherits the limits of its parent. A process that runs as superuser UID can raise its resource limits (setrlimit(2)). A process running as non-superuser can only lower its resource limits; it can't raise them.
An active Unix system may be perceived as a tree of processes, with parent/child relationships shown as vertical ("branch") connections between nodes. For example,
(init) | (login) | startx | xinit | bash .xinitrc / | \ rxvt rxvt fvwm2 | | \ bash screen \____________________ / | \ | | \ bash bash bash xclock xload firefox ... | | mutt rtorrent
This is a simplified version of an actual set of processes run by one user on a real system. I have omitted many, to keep things readable. The root of the tree, shown as (init), as well as the first child process (login), are running as root (superuser UID 0). Here is how this scenario came about:
The kernel (Linux in this case) is hard-coded to run /sbin/init as process number 1 when it has finished its startup. init never dies; it is the ultimate ancestor of every process on the system.
init reads /etc/inittab which tells it to spawn some getty processes on some of the Linux virtual terminal devices (among other things).
Each getty process presents a bit of information plus a login prompt.
After reading a username, getty exec()s /bin/login to read the password. (Thus, getty no longer appears in the tree; it has replaced itself.)
If the password is valid, login fork()s the user's login shell (in this case bash). Presumably, it hangs around (instead of using exec()) because it wants to do some clean-up after the user's shell has terminated.
The user types exec startx at the bash shell prompt. This causes bash to exec() startx (and therefore the login shell no longer appears in the tree).
startx is a wrapper that launches an X session, which includes an X server process (not shown -- it runs as root), and a whole slew of client programs. On this particular system, .xinitrc in the user's home directory is a script that tells which X client programs to run.
Two rxvt terminal emulators are launched from the .xinitrc file (in the background using &), and each of them runs a new copy of the user's shell, bash.
In one of them, the user has typed exec screen (or something similar) to replace bash with screen. Screen, in turn, has three bash child processes of its own, two of which have terminal-based programs running in them (mutt, rtorrent).
The user's window manager, fvwm2, is run in the foreground by the .xinitrc script. A window manager or desktop environment is usually the last thing run by the .xinitrc script; when the WM or DE terminates, the script terminates, and brings down the whole session.
- The window manager runs several processes of its own (xclock, xload, firefox, ...). It typically has a menu, or icons, or a control panel, or some other means of launching new programs. We will not cover window manager configurations here.
Other parts of a Unix system use similar process trees to accomplish their goals, although few of them are quite as deep or complex as an X session. For example, inetd runs as a daemon which listens on several UDP and TCP ports, and launches programs (ftpd, telnetd, etc.) when it receives network connections. lpd runs as a managing daemon for printer jobs, and will launch children to handle individual jobs when a printer is ready. sshd listens for incoming SSH connections, and launches children when it receives them. Some electronic mail systems (particularly qmail) use relatively large numbers of small processes working together.
Understanding the relationship among a set of processes is vital to administering a system. For example, suppose you would like to change the way your FTP service behaves. You've located a configuration file that it is known to read at startup time, and you've changed it. Now what? You could reboot the entire system to be sure your change takes effect, but most people consider that overkill. Generally, people prefer to restart only the minimal number of processes, thereby causing the least amount of disruption to the other services and the other users of the system.
So, you need to understand how your FTP service starts up. Is it a standalone daemon? If so, you probably have some system-specific way of restarting it (either by running a BootScript, or manually killing and restarting it, or perhaps by issuing some special service management command). More commonly, an FTP service runs under the control of inetd. If this is the case, you don't need to restart anything at all. inetd will launch a fresh FTP service daemon every time it receives a connection, and the fresh daemon will read the changed configuration file every time.
On the other hand, suppose your FTP service doesn't have its own configuration file that lets you make the change you want (for example, changing its umask for the default Permissions of uploaded files). In this case, you know that it inherits its umask from inetd, which in turn gets its umask from whatever boot script launched it. If you would like to change FTP's umask in this scenario, you would have to edit inetd's boot script, and then kill and restart inetd so that the FTP service daemons (inetd's children) will inherit the new value. And by doing this, you are also changing the default umask of every other service that inetd manages! Is that acceptable? Only you can answer that. If not, then you may have to change how your FTP service runs, possibly moving it to a standalone daemon. This is a system administrator's job.