- 论坛徽章:
- 0
|
[HP-UX 11.00]
Reading from a classic UNIX book, a strict daemon process should have the following template:
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
int main(void)
{
pid_t pid;
if ( (pid = fork()) < 0)
exit(-1);
else if (pid != 0)
exit(0); /* parent goes bye-bye */
/* child continues */
setsid(); /* become session leader */
chdir(\"/\" ; /* change working directory */
umask(0); /* clear our file mode creation mask */
if ( (pid = fork()) < 0)
exit(-1);
else if (pid != 0)
exit(0); /* parent goes bye-bye again */
for (;
sleep(10);
}
However, running on HP-UX 11.00, our system starts up as a daemon, using a quite different procedure:
#include <sys/types.h>
#include <stdio.h>
#include <errno.h>
#include <fcntl.h>
#include <signal.h>
static void sig_hup(int);
#define LOGFILE \"daemon3.log\"
FILE *fp;
int run_flag;
int main(void)
{ char c;
pid_t pid;
int fd;
signal(SIGHUP, sig_hup); /* establish signal handler */
setpgrp();
umask(0);
fd = open( \"myfile\", 0 );
dup2( fd, 0 );
close( fd );
fd = open( \"myfile\", 1 );
dup2( fd, 1 );
close( fd );
fd = open( \"myfile\", 1 );
dup2( fd, 2 );
close( fd );
if (fork()>0)
exit(0);
run_flag = 1;
while (run_flag)
sleep(5);
exit(0);
}
static void sig_hup(int signo)
{ long now;
now = time(0);
fp = fopen(LOGFILE, \"a\" ;
fprintf(fp, \"%sSIGHUP received, ppid=%d\\n\", ctime((time_t *)&now), getppid());
fclose(fp);
run_flag = 0;
return;
}
Is it a strict daemon process? I doubt that it is not. But what are the security holes?
|
|