From mboxrd@z Thu Jan 1 00:00:00 1970 X-Msuck: nntp://news.gmane.io/gmane.comp.sysutils.supervision.general/2134 Path: news.gmane.org!not-for-mail From: Mike Buland Newsgroups: gmane.comp.sysutils.supervision.general Subject: Re: What is the process group hack Date: Thu, 26 Apr 2012 09:52:12 -0600 Message-ID: References: NNTP-Posting-Host: plane.gmane.org Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-Trace: dough.gmane.org 1335455538 13336 80.91.229.3 (26 Apr 2012 15:52:18 GMT) X-Complaints-To: usenet@dough.gmane.org NNTP-Posting-Date: Thu, 26 Apr 2012 15:52:18 +0000 (UTC) To: supervision@list.skarnet.org Original-X-From: supervision-return-2368-gcsg-supervision=m.gmane.org@list.skarnet.org Thu Apr 26 17:52:17 2012 Return-path: Envelope-to: gcsg-supervision@plane.gmane.org Original-Received: from antah.skarnet.org ([212.85.147.14]) by plane.gmane.org with smtp (Exim 4.69) (envelope-from ) id 1SNQzN-0000Yn-P2 for gcsg-supervision@plane.gmane.org; Thu, 26 Apr 2012 17:52:13 +0200 Original-Received: (qmail 15067 invoked by uid 76); 26 Apr 2012 15:55:59 -0000 Mailing-List: contact supervision-help@list.skarnet.org; run by ezmlm List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Archive: Original-Received: (qmail 15057 invoked from network); 26 Apr 2012 15:55:59 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=o0hNkFS8h9OGIO5h1945Dw6U9X7vxgX5EloxXQ4XQ2A=; b=cM7OvifqoY2haqmeW2CY5BJkqSOvyFZ78pUGV0+vb7elEq/3hN+llYWl4w1I0effMD +054bVjpxGo60H6Un2Knlg+zwf3lUHpVMh96gDW+DzgzTEOfTmWJ4TQ/gJhgL0aBGbKV xZi5qNg5OBZ59eZCttPPW0vykfWn2A0+NEikT8aJzJ6AZ5kOTJRFCsrF6e7VEP6YoU6k Kx/RSTNH7dfKHLYArzK5BCIAT7Z8Ou4wLTYGe0yz52C6I7V3N/rs9X0IGcmQl3m+7Meu bm4TGDh7qrqAVITUhmuxltgy0NbdWLhi0RvATsQY30If773nHuoJ/rdXyktYsoj7pgk4 7otA== In-Reply-To: Xref: news.gmane.org gmane.comp.sysutils.supervision.general:2134 Archived-At: Hello, At least one good example is getty processes. There are a number of systems (including newer linux kernels, but this may be optional) that will not allow a process that is not the parent of it's own process group to take an unclaimed terminal device as it's controlling terminal. getty programs don't generally make their own process groups, and neither does runit for it's services, so the program group hack is necessary to run a getty program on many systems. Although I believe that you're right, it was intended in daemontools as a way to try to supervise a process that wanted to daemonize, I've never had experience using it in that capacity myself. --Mike Buland On Thu, Apr 26, 2012 at 9:15 AM, harish badrinath wrote: > Hello, > > I Could not figure out what "process group hack" is supposed to be > utilized for ?? > Is it used to supervise daemons that stubbornly fork into the background. > Could anyone please explain with an example, i would be really helpful. > I have to the best of my abilities RTFM'ed and searched the internet. > > Thank you, > Harish