daemon reparented / init --user .

来源:互联网 发布:淘宝爱护佳腰带 编辑:程序博客网 时间:2024/06/05 06:21

While I was battling an obscure Ubuntu shutdown issue — more about that later — I noticed that daemonized jobs started from my X session were not reparented to PID 1init, but to a custom init --user, owned by me.


What? I cannot start daemon that outlive my X session?

That's right, I cannot. Check this out:

[html] view plain copy print?
  1. $ sh -c 'sleep 61 &'  
  2. $ ps faxu | egrep 'init|sleep 61'  
  3. root         1  ... /sbin/init  
  4. walter    2198  ...      \_ init --user  
  5. walter    6673  ...          |   |   \_ egrep --color=auto init|sleep 61  
  6. walter    6671  ...          \_ sleep 61  

Okay then. What is this black magic?

It's apparently caused by PR_SET_CHILD_SUBREAPER; available through prctl since Linux kernel 3.4. Ubuntu added that in Raring (13.04), according toRaring Upstart User Sessions, PIDtracking.


Can I work around that?

Short answer: no, the PR_SET_CHILD_SUBREAPER interface allows a single process to enable or disable the feature, but not for someone else to disable it.

Long answer: yes, but only if we alter the subreaper state of the UserSession init; like this:

[html] view plain copy print?
  1. $ sudo gdb `which init` `pgrep -xf 'init --user'` \  
  2.     -batch -ex 'call prctl(36,0,0,0,0)'  
  3. Password:   
  4. [Thread debugging using libthread_db enabled]  
  5. Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".  
  6. 0x00007f3b7a6848c3 in __select_nocancel () at ../sysdeps/unix/syscall-template.S:81  
  7. 81  ../sysdeps/unix/syscall-template.S: No such file or directory.  
  8. $1 = 0  
  9. $ sh -c 'sleep 61 &'  
  10. $ ps faxu | egrep 'init|sleep 61'  
  11. root         1  ... /sbin/init  
  12. walter    2198  ...      \_ init --user  
  13. walter    6986  ...          |   |   \_ egrep --color=auto init|sleep 61  
  14. walter    6957  ...          |       \_ man 5 init  
  15. walter    6984  ... sleep 61  

Hah! sleep 61 is now owned by PID 1 directly. By the way, reverting that hack is as easy as changing the second argument to prctl from 0 to1.

So, apparently I really am barred from creating PID 1 owned daemons unless I hack init --user.

That does raise the question how initctl daemons are spawned, but that's done by asking/sbin/init to do that for us:

[html] view plain copy print?
  1. # netstat -lnAunix  | grep '/com/ubuntu/upstart$'  
  2. unix  2      [ ACC ]     STREAM     LISTENING     8049     @/com/ubuntu/upstart  
  3. # strace start cups  
  4. ...  
  5. connect(3, {sa_family=AF_LOCALsun_path=@"/com/ubuntu/upstart"}, 22) = 0  
  6. ...  
  7. cups start/running, process 6883  

Yuck! Did I mention I'm glad we're moving to systemd


原文链接:https://www.osso.nl/blog/daemon-reparented-init-user/


0 0