summaryrefslogtreecommitdiffstats
path: root/usr.sbin/daemon/daemon.8
Commit message (Collapse)AuthorAgeFilesLines
* MFC r307769: daemon: Allow logging daemon stdout/stderr to file or syslog.jilles2017-05-051-12/+66
| | | | | | | There are various new options, documented in the man page, to send the daemon's standard output and/or standard error to a file or to syslog. Relnotes: yes
* daemon(8): Add -t option to set process titlecem2016-03-021-2/+6
| | | | | | | | | | The default process title is taken from the argv[0] value (any particular hardlink name). Add a -t option to override the default. PR: 205016 Submitted by: Yuri <yuri@rawbw.com> No objection from: freebsd-current@ Sponsored by: EMC / Isilon Storage Division
* mdoc: remove EOL whitespace.joel2013-09-131-3/+3
| | | | Approved by: re (blanket)
* add support for writing the pid of the daemon program to a pid file sojmg2013-09-131-12/+52
| | | | | | | | | | that daemon can be used w/ rc.subr and ports can use the additional functionality, such as keeping the ldap daemon up and running, and have the proper program to signal to exit.. PR: bin/181341 Submitted by: feld Approved by: re (glebius)
* Document -r option in SYNOPSIS and usage statement.trociny2012-06-041-2/+2
| | | | | Submitted by: Andrey Zonov <andrey zonov.org> MFC after: 3 days
* Add -r option to restart the program if it has been terminated.trociny2012-02-191-5/+17
| | | | | Suggested by: Andrey Zonov <andrey zonov org> MFC after: 2 weeks
* If the supervising process receives SIGTERM, forward it to the spawnedtrociny2012-02-191-0/+6
| | | | | | | | | | | | process. Normally it will cause the child to exit followed by the termination of the supervisor after removing the pidfile. This looks like desirable behavior, because termination of a supervisor usually supposes termination of its charge. Also it will fix the issue with stale pid files after reboot due to init kills a supervisor before its child exits. MFC after: 2 weeks
* The pidfile_open(3) is going to be fixed to set close-on-exec in ordertrociny2012-02-191-8/+12
| | | | | | | | | | | | | | | | not to leak the descriptor after exec(3). This raises the issue for daemon(3) of the pidfile lock to be lost when the child process executes. To solve this and also to have the pidfile cleaned up when the program exits, if a pidfile is specified, spawn a child to exec the command and wait in the parent keeping the pidfile locked until the child process exits and remove the file. Reported by: Andrey Zonov <andrey zonov org> Suggested by: pjd Reviewed by: pjd MFC after: 2 weeks
* Change the notes about the pidfile to include Doug's preferenceghelmer2012-02-011-2/+3
| | | | | | for pre-creating the pidfile with appropriate owner and permissions. Requested by dougb
* Revert 229667: After some discussion of this change, it seems it isghelmer2012-01-251-0/+4
| | | | | | better to leave the pidfile open where it was. Add a note to the man page describing pidfile strategies to use if the daemon is to be run as a user other than root.
* Slightly improve wording.ivoras2010-05-171-1/+2
|
* Improve previous commit by using setusercontext(3) and removing the grouptrhodes2007-03-191-9/+6
| | | | | | option. Bump doc date for manual page changes. Reviewed by: rwatson, ru, will (older version)
* Add support for dropping privileges to a specified user and/or group.trhodes2007-03-091-1/+10
| | | | | | PR: 108523 Submitted by: Dmitri Alenitchev <dmitri@dworlds.ru> (original version) Reviewed by: mpp (first reply to PR)
* Teach daemon(8) how to use pidfile(3).pjd2005-08-241-2/+7
|
* Added the EXIT STATUS section where appropriate.ru2005-01-171-1/+2
|
* mdoc(7) fixes.ru2004-07-071-2/+4
|
* Give daemon(8) the ability to create a pid-file. Since the target programphk2004-06-021-1/+9
| | | | | | | | does not know anything about the pid-file and we don't keep a babysitting process for the task, the pid-file will linger. Submitted by: mi PR: 56398
* MFS: 1.2.2.2trhodes2003-02-051-1/+1
|
* mdoc(7) police: minor formatting tweaks.ru2001-08-311-8/+8
|
* Add a new utility that runs an executable detached from themike2001-08-301-0/+73
controlling terminal. Discussed on: -hackers Obtained from: BSD/OS
OpenPOWER on IntegriCloud