Advanced Programming in UNIX Environment Episode 31

exec Functions

When a process calls one of the exec functions,that process is completely replaced by the new program,and the new program starts executing at its main function. The process ID does not change across an exec,because a new process is not created; exec merely replaces the current process — its text,data,heap,and stack segments — with a brand-new program from disk.

There are seven different exec functions,but we’ll often simply refer to ‘‘the exec function,’’ which means that we could use any of the seven functions. These seven functions round out the UNIX System process control primitives. With fork,we can create new processes; and with the exec functions,we can initiate new programs. The exit function and the wait functions handle termination and waiting for termination.

#include <unistd.h>

int execl(const char *pathname,const char *arg0,...);
int execv(const char *pathname,char *const argv[]);
int execle(const char *pathname,...
/* (char *)0,char *const envp[] */ );
int execve(const char *pathname,char *const argv[],char *const envp[]);
int execlp(const char *filename,... /* (char *)0 */ );
int execvp(const char *filename,char *const argv[]);
int fexecve(int fd,char *const envp[]);

The first difference in these functions is that the first four take a pathname argument,the next two take a filename argument,and the last one takes a file descriptor argument. When a filename argument is specified,

  • If filename contains a slash,it is taken as a pathname.
  • Otherwise,the executable file is searched for in the directories specified by the PATH environment variable.

The PATH variable contains a list of directories,called path prefixes,that are separated by colons.

Historically,the limit in older System V implementations was 5,120 bytes. Older BSD systems had a limit of 20,480 bytes. The limit in current systems is much higher.

We’ve mentioned that the process ID does not change after an exec,but the new
program inherits additional properties from the calling process:

  • Process ID and parent process ID
  • Real user ID and real group ID
  • Supplementary group IDs
  • Process group ID
  • Session ID
  • Controlling terminal
  • Time left until alarm clock
  • Current working directory
  • Root directory
  • File mode creation mask
  • File locks
  • Process signal mask
  • Pending signals
  • Resource limits
  • Nice value (on XSI-conformant systems)
  • Values for tms_utime,tms_stime,tms_cutime,and tms_cstime

POSIX.1 specifically requires that open directory streams (recall the opendir function from Section 4.22) be closed across an exec. This is normally done by the opendir function calling fcntl to set the close-on-exec flag for the descriptor corresponding to the open directory stream.

In many UNIX system implementations,only one of these seven functions,execve,is a system call within the kernel. The other six are just library functions that eventually invoke this system call.

The fexecve library function uses /proc to convert the file descriptor argument into a pathname that can be used by execve to execute the program.

This describes how fexecve is implemented in FreeBSD 8.0 and Linux 3.2.0. Other systems might take a different approach. For example,a system without /proc or /dev/fd could implement fexecve as a system call veneer that translates the file descriptor argument into an i-node pointer,implement execve as a system call veneer that translates the pathname argument into an i-node pointer,and place all the rest of the exec code common to both execve and fexecve in a separate function to be called with an i-node pointer for the file to be executed.

#include "apue.h"
#include <sys/wait.h>

char *env_init[]={"USER=unknown","PATH=/tmp",NULL};

int main(void)
{
    pid_t pid;
    TELL_WAIT();

    if((pid=fork())<0)
    {
        err_sys("fork error");
    }
    else if(pid==0)
    {
        if(execle("/home/sar/bin/echoall","echoall","myarg1","MY ARG2",(char*)0,env_init)<0)
            err_sys("execle error");
    }

    if(waitpid(pid,NULL,0)<0)
        err_sys("wait error");

    if((pid==fork())<0)
    {
        err_sys("fork error");
    }
    else if(pid==0)
    {
        if(execlp("echoall","only 1 arg",(char *)0)<0)
            err_sys("execlp error");
    }

    if(waitpid(pid,0)<0)
    {
        err_sys("wait error");
    }

    if((pid=fork())<0)
    {
        err_sys("fork_error");
    }
    else if(pid==0)
    {
        if(execlp("echoall",(char *)0)<0)
            err_sys("execlp error");
    }

    return 0;
}

Example of exec functions

#include "apue.h"

int main(int argc,char *argv[])
{
    int i;
    char **ptr;
    extern char **environ;

    for(i=0;i<argc;i++)
        printf("argv[%d]: %d\n",i,argv[i]);

    for(ptr=environ;*ptr!=0;ptr++)
        printf("%d\n",*ptr);

    return 0;
}

Echo all command-line arguments and all environment strings

Changing User IDs and Group IDs

In the UNIX System,privileges,such as being able to change the system’s notion of the current date,and access control,such as being able to read or write a particular file,are based on user and group IDs. When our programs need additional privileges or need to gain access to resources that they currently aren’t allowed to access,they need to change their user or group ID to an ID that has the appropriate privilege or access.

#include <unistd.h>
int setuid(uid_t uid);
int setgid(gid_t gid);

There are rules for who can change the IDs. Let’s consider only the user ID for now. (Everything we describe for the user ID also applies to the group ID.)

1.If the process has superuser privileges,the setuid function sets the real user ID,effective user ID,and saved set-user-ID to uid.
2.If the process does not have superuser privileges,but uid equals either the real user ID or the saved set-user-ID,setuid sets only the effective user ID to uid.
The real user ID and the saved set-user-ID are not changed.
3.If neither of these two conditions is true,errno is set to EPERM and −1 is returned.

Here,we are assuming that _POSIX_SAVED_IDS is true. If this feature isn’t provided,then delete all preceding references to the saved set-user-ID.

We can make a few statements about the three user IDs that the kernel maintains.

1.Only a superuser process can change the real user ID. Normally,the real user ID is set by the login(1) program when we log in and never changes. Because login is a superuser process,it sets all three user IDs when it calls setuid.
2.The effective user ID is set by the exec functions only if the set-user-ID bit is set for the program file. If the set-user-ID bit is not set,the exec functions leave the effective user ID as its current value. We can call setuid at any time to set the effective user ID to either the real user ID or the saved set-user-ID. Naturally,we can’t set the effective user ID to any random value.
3.The saved set-user-ID is copied from the effective user ID by exec. If the file’s set-user-ID bit is set,this copy is saved after exec stores the effective user ID from the file’s user ID.

FreeBSD 8.0 and LINUX 3.2.0 provide the getresuid and getresgid functions,which can be used to get the saved set-user-ID and saved set-group-ID,respectively.

#include <unistd.h>

int setreuid(uid_t ruid,uid_t euid);
int setregid(gid_t rgid,gid_t egid);

Both setreuid and setregid are included in the XSI option in POSIX.1. As such,all UNIX System implementations are expected to provide support for them.

#include <unistd.h>

int seteuid(uid_t uid);
int setegid(gid_t gid);

An unprivileged user can set its effective user ID to either its real user ID or its saved set-user-ID. For a privileged user,only the effective user ID is set to uid. (This behavior differs from that of the setuid function,which changes all three user IDs.)

On Linux 3.2.0,the at program is installed set-user-ID to user daemon. On FreeBSD 8.0,Mac OS X 10.6.8,and Solaris 10,the at program is installed set-user-ID to user root. This allows the at command to write privileged files owned by the daemon that will run the commands on behalf of the user running the at command.
On Linux 3.2.0,the programs are run by the atd(8) daemon. On FreeBSD 8.0 and Solaris 10,the programs are run by the cron(1M) daemon. On Mac OS X 10.6.8,the programs are run by the launchd(8) daemon.

The following steps take place.

1.Assuming that the at program file is owned by root and has its set-user-ID bit
set,when we run it,we have

real user ID = our user ID (unchanged)
effective user ID = root
saved set-user-ID = root

2.The first thing the at command does is reduce its privileges so that it runs with
our privileges. It calls the seteuid function to set the effective user ID to our

real user ID. After this,we have
real user ID = our user ID (unchanged)
effective user ID = our user ID
saved set-user-ID = root (unchanged)

3.The at program runs with our privileges until it needs to access the configuration files that control which commands are to be run and the time at which they need to run. These files are owned by the daemon that will run the commands for us. The at command calls seteuid to set the effective user ID to root. This call is allowed because the argument to seteuid equals the saved set-user-ID. (This is why we need the saved set-user-ID.) After this,we have

real user ID = our user ID (unchanged)
effective user ID = root
saved set-user-ID = root (unchanged)

Because the effective user ID is root,file access is allowed.

4.After the files are modified to record the commands to be run and the time at which they are to be run,the at command lowers its privileges by calling seteuid to set its effective user ID to our user ID. This prevents any accidental misuse of privilege. At this point,we have

real user ID = our user ID (unchanged)
effective user ID = our user ID
saved set-user-ID = root (unchanged)

5.The daemon starts out running with root privileges. To run commands on our
behalf,the daemon calls fork and the child calls setuid to change its user ID
to our user ID. Because the child is running with root privileges,this changes
all of the IDs. We have

real user ID = our user ID
effective user ID = our user ID
saved set-user-ID = our user ID

Now the daemon can safely execute commands on our behalf,because it can access only the files to which we normally have access. We have no additional permissions.

版权声明:本文内容由互联网用户自发贡献,该文观点与技术仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请发送邮件至 dio@foxmail.com 举报,一经查实,本站将立刻删除。

相关推荐


用的openwrt路由器,家里宽带申请了动态公网ip,为了方便把2280端口映射到公网,发现经常被暴力破解,自己写了个临时封禁ip功能的脚本,实现5分钟内同一个ip登录密码错误10次就封禁这个ip5分钟,并且进行邮件通知使用步骤openwrt为19.07.03版本,其他版本没有测试过安装bashmsmtpopkg
#!/bin/bashcommand1&command2&wait从Shell脚本并行运行多个程序–杨河老李(kviccn.github.io)
1.先查出MAMP下面集成的PHP版本cd/Applications/MAMP/bin/phpls-ls 2.编辑修改.bash_profile文件(没有.bash_profile文件的情况下回自动创建)sudovim~/.bash_profile在文件的最后输入以下信息,然后保存退出exportPATH="/Applications/MAMP/bin/php/php7.2.20/b
1、先输入locale-a,查看一下现在已安装的语言2、若不存在如zh_CN之类的语言包,进行中文语言包装:apt-getinstalllanguage-pack-zh-hans3、安装好后我们可以进行临时修改:然后添加中文支持: locale-genzh_CN.UTF-8临时修改> export LC_ALL='zh_CN.utf8'> locale永久
BashPerlTclsyntaxdiff1.进制数表示Languagebinaryoctalhexadecimalbash2#[0~1]0[0~7]0x[0~f]or0X[0~f]perl0b[0~1]0[0~7]0x[0~f]tcl0b[0~1]0o[0~7]0x[0~f]bashdifferentbaserepresntationreference2.StringlengthLanguageStr
正常安装了k8s后,使用kubect工具后接的命令不能直接tab补全命令补全方法:yum-yinstallbash-completionsource/usr/share/bash-completion/bash_completionsource<(kubectlcompletionbash)echo"source<(kubectlcompletionbash)">>~/.bashrc 
参考这里启动jar包shell脚本修改过来的#!/bin/bash#默认应用名称defaultAppName='./gadmin'appName=''if[[$1&&$1!=0]]thenappName=$1elseappName=$defaultAppNamefiecho">>>>>>本次重启的应用:$appName<
#一个数字的行#!/bin/bashwhilereadlinedon=`echo$line|sed's/[^0-9]//g'|wc-L`if[$n-eq1]thenecho$linefidone<1.txt#日志切割归档#!/bin/bashcd/data/logslog=1.logmv_log(){[-f$1]&&mv$1$2
#文件增加内容#!/bin/bashn=0cat1.txt|whilereadlinedon=[$n+1]if[$n-eq5]thenecho$lineecho-e"#Thisisatestfile.\n#Testinsertlineintothisfile."elseecho$linefidone#备份/etc目录#
# su - oraclesu: /usr/bin/ksh: No such file or directory根据报错信息:显示无法找到文件 /usr/bin/ksh果然没有该文件,但是发现存在文件/bin/ksh,于是创建了一个软连接,可以规避问题,可以成功切换到用户下,但无法执行系统自带命令。$. .bash_profile-ksh: .: .b
history显示历史指令记录内容,下达历史纪录中的指令主要的使用方法如果你想禁用history,可以将HISTSIZE设置为0:#exportHISTSIZE=0使用HISTIGNORE忽略历史中的特定命令下面的例子,将忽略pwd、ls、ls-ltr等命令:#exportHISTIGNORE=”pwd:ls:ls-ltr:”使用HIS
一.命令历史  1.history环境变量:    HISTSIZE:输出的命令历史条数,如history的记录数    HISTFILESIZE:~/.bash_history保存的命令历史记录数    HISTFILLE:历史记录的文件路径    HISTCONTROL:     ignorespace:忽略以空格开头的命令
之前在网上看到很多师傅们总结的linux反弹shell的一些方法,为了更熟练的去运用这些技术,于是自己花精力查了很多资料去理解这些命令的含义,将研究的成果记录在这里,所谓的反弹shell,指的是我们在自己的机器上开启监听,然后在被攻击者的机器上发送连接请求去连接我们的机器,将被攻击者的she
BashOne-LinersExplained,PartI:Workingwithfileshttps://catonmat.net/bash-one-liners-explained-part-oneBashOne-LinersExplained,PartII:Workingwithstringshttps://catonmat.net/bash-one-liners-explained-part-twoBashOne-LinersExplained,PartII
Shell中变量的作用域:在当前Shell会话中使用,全局变量。在函数内部使用,局部变量。可以在其他Shell会话中使用,环境变量。局部变量:默认情况下函数内的变量也是全局变量#!/bin/bashfunctionfunc(){a=99}funcecho$a输出>>99为了让全局变量变成局部变量
1、多命令顺序执行;  命令1;命令2  多个命令顺序执行,命令之间没有任何逻辑联系&&  命令1&&命令2  逻辑与,当命令1正确执行,才会执行命令2||  命令1||命令2  逻辑或,当命令1执行不正确,才会执行命令2例如:ls;date;cd/home/lsx;pwd;who ddif=输入文件of=输
原博文使用Linux或者unix系统的同学可能都对#!这个符号并不陌生,但是你真的了解它吗?首先,这个符号(#!)的名称,叫做"Shebang"或者"Sha-bang"。Linux执行文件时发现这个格式,会把!后的内容提取出来拼接在脚本文件或路径之前,当作实际执行的命令。 Shebang这个符号通常在Unix系统的脚本
1、历史命令history[选项][历史命令保存文件]选项:-c:  清空历史命令-w:  把缓存中的历史命令写入历史命令保存文件 ~/.bash_historyvim/etc/profile中的Histsize可改存储历史命令数量历史命令的调用使用上、下箭头调用以前的历史命令使用“!n”重复执行第n条历史
目录1.Shell脚本规范2.Shell脚本执行3.Shell脚本变量3.1环境变量3.1.1自定义环境变量3.1.2显示与取消环境变量3.1.3环境变量初始化与对应文件的生效顺序3.2普通变量3.2.1定义本地变量3.2.2shell调用变量3.2.3grep调用变量3.2.4awk调用变量3.3
   http://www.voidcn.com/blog/wszzdanm/article/p-6145895.html命令功能:显示登录用户的信息命令格式:常用选项:举例:w显示已经登录的用户及正在进行的操作[root@localhost~]#w 11:22:01up4days,21:22, 3users, loadaverage:0.00,0.00,0.00USER