2 * Copyright (c) 2005 Apple Computer, Inc. All rights reserved.
4 * @APPLE_APACHE_LICENSE_HEADER_START@
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
18 * @APPLE_APACHE_LICENSE_HEADER_END@
21 static const char *const __rcs_file_version__
= "$Revision: 1.77 $";
23 #include <mach/mach.h>
24 #include <mach/mach_error.h>
25 #include <mach/boolean.h>
26 #include <mach/message.h>
27 #include <mach/notify.h>
28 #include <mach/mig_errors.h>
29 #include <mach/mach_traps.h>
30 #include <mach/mach_interface.h>
31 #include <mach/host_info.h>
32 #include <mach/mach_host.h>
33 #include <mach/exception.h>
34 #include <sys/types.h>
35 #include <sys/queue.h>
36 #include <sys/event.h>
37 #include <sys/ptrace.h>
39 #include <sys/ucred.h>
40 #include <sys/fcntl.h>
43 #include <sys/sysctl.h>
44 #include <sys/sockio.h>
46 #include <sys/resource.h>
47 #include <sys/ioctl.h>
48 #include <sys/mount.h>
50 #include <netinet/in.h>
51 #include <netinet/in_var.h>
52 #include <netinet6/nd6.h>
73 #include "launch_priv.h"
75 #include "launchd_core_logic.h"
76 #include "launchd_unix_ipc.h"
77 #include "bootstrap_private.h"
78 #include "bootstrap.h"
79 #include "bootstrapServer.h"
80 #include "mpm_reply.h"
82 /* <rdar://problem/2685209> sys/queue.h is not up to date */
83 #ifndef SLIST_FOREACH_SAFE
84 #define SLIST_FOREACH_SAFE(var, head, field, tvar) \
85 for ((var) = SLIST_FIRST((head)); \
86 (var) && ((tvar) = SLIST_NEXT((var), field), 1); \
91 SLIST_ENTRY(machservice
) sle
;
93 mach_port_name_t port
;
94 unsigned int isActive
:1, reset
:1, recv
:1, hide
:1, kUNCServer
:1, __junk
:27;
98 static void machservice_setup(launch_data_t obj
, const char *key
, void *context
);
99 static void machservice_setup_options(launch_data_t obj
, const char *key
, void *context
);
100 static void machservice_resetport(struct jobcb
*j
, struct machservice
*ms
);
104 SLIST_ENTRY(socketgroup
) sle
;
106 unsigned int junkfds
:1, fd_cnt
:31;
110 static bool socketgroup_new(struct jobcb
*j
, const char *name
, int *fds
, unsigned int fd_cnt
, bool junkfds
);
111 static void socketgroup_delete(struct jobcb
*j
, struct socketgroup
*sg
);
112 static void socketgroup_watch(struct jobcb
*j
, struct socketgroup
*sg
);
113 static void socketgroup_ignore(struct jobcb
*j
, struct socketgroup
*sg
);
114 static void socketgroup_callback(struct jobcb
*j
, struct kevent
*kev
);
115 static void socketgroup_setup(launch_data_t obj
, const char *key
, void *context
);
118 SLIST_ENTRY(watchpath
) sle
;
120 unsigned int is_qdir
:1, __junk
:31;
124 static bool watchpath_new(struct jobcb
*j
, const char *name
, bool qdir
);
125 static void watchpath_delete(struct jobcb
*j
, struct watchpath
*wp
);
126 static void watchpath_watch(struct jobcb
*j
, struct watchpath
*wp
);
127 static void watchpath_ignore(struct jobcb
*j
, struct watchpath
*wp
);
128 static void watchpath_callback(struct jobcb
*j
, struct kevent
*kev
);
130 struct calendarinterval
{
131 SLIST_ENTRY(calendarinterval
) sle
;
135 static bool calendarinterval_new(struct jobcb
*j
, struct tm
*w
);
136 static bool calendarinterval_new_from_obj(struct jobcb
*j
, launch_data_t obj
);
137 static void calendarinterval_delete(struct jobcb
*j
, struct calendarinterval
*ci
);
138 static void calendarinterval_setalarm(struct jobcb
*j
, struct calendarinterval
*ci
);
139 static void calendarinterval_callback(struct jobcb
*j
, struct kevent
*kev
);
142 SLIST_ENTRY(envitem
) sle
;
147 static bool envitem_new(struct jobcb
*j
, const char *k
, const char *v
, bool global
);
148 static void envitem_delete(struct jobcb
*j
, struct envitem
*ei
, bool global
);
149 static void envitem_setup(launch_data_t obj
, const char *key
, void *context
);
152 SLIST_ENTRY(limititem
) sle
;
154 unsigned int setsoft
:1, sethard
:1, which
:30;
157 static bool limititem_update(struct jobcb
*j
, int w
, rlim_t r
);
158 static void limititem_delete(struct jobcb
*j
, struct limititem
*li
);
159 static void limititem_setup(launch_data_t obj
, const char *key
, void *context
);
168 // FILESYSTEMTYPE_IS_MOUNTED, /* for nfsiod, but maybe others */
169 } semaphore_reason_t
;
171 struct semaphoreitem
{
172 SLIST_ENTRY(semaphoreitem
) sle
;
173 semaphore_reason_t why
;
177 static bool semaphoreitem_new(struct jobcb
*j
, semaphore_reason_t why
, const char *what
);
178 static void semaphoreitem_delete(struct jobcb
*j
, struct semaphoreitem
*si
);
179 static void semaphoreitem_setup(launch_data_t obj
, const char *key
, void *context
);
180 static void semaphoreitem_setup_paths(launch_data_t obj
, const char *key
, void *context
);
184 kq_callback kqjob_callback
;
185 SLIST_ENTRY(jobcb
) sle
;
186 SLIST_HEAD(, socketgroup
) sockets
;
187 SLIST_HEAD(, watchpath
) vnodes
;
188 SLIST_HEAD(, calendarinterval
) cal_intervals
;
189 SLIST_HEAD(, envitem
) global_env
;
190 SLIST_HEAD(, envitem
) env
;
191 SLIST_HEAD(, limititem
) limits
;
192 SLIST_HEAD(, machservice
) machservices
;
193 SLIST_HEAD(, semaphoreitem
) semaphores
;
194 SLIST_HEAD(, jobcb
) jobs
;
196 struct jobcb
*parent
;
198 mach_port_t req_port
;
199 mach_port_t wait_reply_port
;
212 int last_exit_status
;
218 unsigned int start_interval
;
219 unsigned int checkedin
:1, firstborn
:1, debug
:1, throttle
:1, inetcompat
:1, inetcompat_wait
:1,
220 ondemand
:1, session_create
:1, low_pri_io
:1, init_groups
:1, priv_port_has_senders
:1,
221 importing_global_env
:1, importing_hard_limits
:1, setmask
:1, legacy_mach_job
:1, runatload
:1;
223 unsigned int globargv
:1, wait4debugger
:1, transfer_bstrap
:1, unload_at_exit
:1, force_ppc
:1, stall_before_exec
:1, __pad
:26;
227 static struct jobcb
*job_import2(launch_data_t pload
);
228 static void job_import_keys(launch_data_t obj
, const char *key
, void *context
);
229 static void job_import_bool(struct jobcb
*j
, const char *key
, bool value
);
230 static void job_import_string(struct jobcb
*j
, const char *key
, const char *value
);
231 static void job_import_integer(struct jobcb
*j
, const char *key
, long long value
);
232 static void job_import_dictionary(struct jobcb
*j
, const char *key
, launch_data_t value
);
233 static void job_import_array(struct jobcb
*j
, const char *key
, launch_data_t value
);
234 static void job_watch(struct jobcb
*j
);
235 static void job_ignore(struct jobcb
*j
);
236 static void job_reap(struct jobcb
*j
);
237 static bool job_useless(struct jobcb
*j
);
238 static bool job_keepalive(struct jobcb
*j
);
239 static void job_start_child(struct jobcb
*j
, int execfd
) __attribute__((noreturn
));
240 static void job_setup_attributes(struct jobcb
*j
);
241 static bool job_setup_machport(struct jobcb
*j
);
242 static void job_callback(void *obj
, struct kevent
*kev
);
243 static pid_t
job_fork(struct jobcb
*j
);
244 static size_t job_prep_log_preface(struct jobcb
*j
, char *buf
);
245 static void job_setup_env_from_other_jobs(struct jobcb
*j
);
246 static void job_export_all2(struct jobcb
*j
, launch_data_t where
);
247 static launch_data_t
job_export2(struct jobcb
*j
, bool subjobs
);
250 static const struct {
253 } launchd_keys2limits
[] = {
254 { LAUNCH_JOBKEY_RESOURCELIMIT_CORE
, RLIMIT_CORE
},
255 { LAUNCH_JOBKEY_RESOURCELIMIT_CPU
, RLIMIT_CPU
},
256 { LAUNCH_JOBKEY_RESOURCELIMIT_DATA
, RLIMIT_DATA
},
257 { LAUNCH_JOBKEY_RESOURCELIMIT_FSIZE
, RLIMIT_FSIZE
},
258 { LAUNCH_JOBKEY_RESOURCELIMIT_MEMLOCK
, RLIMIT_MEMLOCK
},
259 { LAUNCH_JOBKEY_RESOURCELIMIT_NOFILE
, RLIMIT_NOFILE
},
260 { LAUNCH_JOBKEY_RESOURCELIMIT_NPROC
, RLIMIT_NPROC
},
261 { LAUNCH_JOBKEY_RESOURCELIMIT_RSS
, RLIMIT_RSS
},
262 { LAUNCH_JOBKEY_RESOURCELIMIT_STACK
, RLIMIT_STACK
},
265 static time_t cronemu(int mon
, int mday
, int hour
, int min
);
266 static time_t cronemu_wday(int wday
, int hour
, int min
);
267 static bool cronemu_mon(struct tm
*wtm
, int mon
, int mday
, int hour
, int min
);
268 static bool cronemu_mday(struct tm
*wtm
, int mday
, int hour
, int min
);
269 static bool cronemu_hour(struct tm
*wtm
, int hour
, int min
);
270 static bool cronemu_min(struct tm
*wtm
, int min
);
272 static void simple_zombie_reaper(void *, struct kevent
*);
274 kq_callback kqsimple_zombie_reaper
= simple_zombie_reaper
;
276 static int dir_has_files(const char *path
);
277 static char **mach_cmd2argv(const char *string
);
278 struct jobcb
*root_job
= NULL
;
279 struct jobcb
*gc_this_job
= NULL
;
280 size_t total_children
= 0;
283 simple_zombie_reaper(void *obj
__attribute__((unused
)), struct kevent
*kev
)
285 waitpid(kev
->ident
, NULL
, 0);
289 job_ignore(struct jobcb
*j
)
291 struct socketgroup
*sg
;
292 struct machservice
*ms
;
293 struct watchpath
*wp
;
295 SLIST_FOREACH(sg
, &j
->sockets
, sle
)
296 socketgroup_ignore(j
, sg
);
298 SLIST_FOREACH(wp
, &j
->vnodes
, sle
)
299 watchpath_ignore(j
, wp
);
301 SLIST_FOREACH(ms
, &j
->machservices
, sle
)
302 launchd_assumes(launchd_mport_request_callback(ms
->port
, NULL
, false) == KERN_SUCCESS
);
306 job_watch(struct jobcb
*j
)
308 struct socketgroup
*sg
;
309 struct machservice
*ms
;
310 struct watchpath
*wp
;
312 SLIST_FOREACH(sg
, &j
->sockets
, sle
)
313 socketgroup_watch(j
, sg
);
315 SLIST_FOREACH(wp
, &j
->vnodes
, sle
)
316 watchpath_watch(j
, wp
);
318 SLIST_FOREACH(ms
, &j
->machservices
, sle
)
319 launchd_assumes(launchd_mport_request_callback(ms
->port
, j
, false) == KERN_SUCCESS
);
323 job_stop(struct jobcb
*j
)
330 job_export(struct jobcb
*j
)
332 return job_export2(j
, true);
336 job_export2(struct jobcb
*j
, bool subjobs
)
338 launch_data_t tmp
, tmp2
, tmp3
, r
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
343 if ((tmp
= launch_data_new_string(j
->label
)))
344 launch_data_dict_insert(r
, tmp
, LAUNCH_JOBKEY_LABEL
);
346 if ((tmp
= launch_data_new_bool(j
->ondemand
)))
347 launch_data_dict_insert(r
, tmp
, LAUNCH_JOBKEY_ONDEMAND
);
349 if ((tmp
= launch_data_new_integer(j
->last_exit_status
)))
350 launch_data_dict_insert(r
, tmp
, LAUNCH_JOBKEY_LASTEXITSTATUS
);
352 if (j
->p
&& (tmp
= launch_data_new_integer(j
->p
)))
353 launch_data_dict_insert(r
, tmp
, LAUNCH_JOBKEY_PID
);
355 if ((tmp
= launch_data_new_integer(j
->timeout
)))
356 launch_data_dict_insert(r
, tmp
, LAUNCH_JOBKEY_TIMEOUT
);
358 if (j
->prog
&& (tmp
= launch_data_new_string(j
->prog
)))
359 launch_data_dict_insert(r
, tmp
, LAUNCH_JOBKEY_PROGRAM
);
361 if (j
->stdoutpath
&& (tmp
= launch_data_new_string(j
->stdoutpath
)))
362 launch_data_dict_insert(r
, tmp
, LAUNCH_JOBKEY_STANDARDOUTPATH
);
364 if (j
->stderrpath
&& (tmp
= launch_data_new_string(j
->stderrpath
)))
365 launch_data_dict_insert(r
, tmp
, LAUNCH_JOBKEY_STANDARDERRORPATH
);
367 if (j
->argv
&& (tmp
= launch_data_alloc(LAUNCH_DATA_ARRAY
))) {
370 for (i
= 0; i
< j
->argc
; i
++) {
371 if ((tmp2
= launch_data_new_string(j
->argv
[i
])))
372 launch_data_array_set_index(tmp
, tmp2
, i
);
375 launch_data_dict_insert(r
, tmp
, LAUNCH_JOBKEY_PROGRAMARGUMENTS
);
378 if (j
->inetcompat
&& (tmp
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
))) {
379 if ((tmp2
= launch_data_new_bool(j
->inetcompat_wait
)))
380 launch_data_dict_insert(tmp
, tmp2
, LAUNCH_JOBINETDCOMPATIBILITY_WAIT
);
381 launch_data_dict_insert(r
, tmp
, LAUNCH_JOBKEY_INETDCOMPATIBILITY
);
384 if (!SLIST_EMPTY(&j
->sockets
) && (tmp
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
))) {
385 struct socketgroup
*sg
;
388 SLIST_FOREACH(sg
, &j
->sockets
, sle
) {
389 if ((tmp2
= launch_data_alloc(LAUNCH_DATA_ARRAY
))) {
390 for (i
= 0; i
< sg
->fd_cnt
; i
++) {
391 if ((tmp3
= launch_data_new_fd(sg
->fds
[i
])))
392 launch_data_array_set_index(tmp2
, tmp3
, i
);
394 launch_data_dict_insert(tmp
, tmp2
, sg
->name
);
398 launch_data_dict_insert(r
, tmp
, LAUNCH_JOBKEY_SOCKETS
);
401 if (!SLIST_EMPTY(&j
->machservices
) && (tmp
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
))) {
402 struct machservice
*ms
;
404 SLIST_FOREACH(ms
, &j
->machservices
, sle
) {
405 tmp2
= launch_data_new_machport(MACH_PORT_NULL
);
406 launch_data_dict_insert(tmp
, tmp2
, ms
->name
);
409 launch_data_dict_insert(r
, tmp
, LAUNCH_JOBKEY_MACHSERVICES
);
412 if (subjobs
&& !SLIST_EMPTY(&j
->jobs
) && (tmp
= launch_data_alloc(LAUNCH_DATA_ARRAY
))) {
416 SLIST_FOREACH(ji
, &j
->jobs
, sle
) {
417 tmp2
= job_export2(ji
, true);
418 launch_data_array_set_index(tmp
, tmp2
, i
);
422 launch_data_dict_insert(r
, tmp
, LAUNCH_JOBKEY_SUBJOBS
);
429 job_remove_all_inactive(struct jobcb
*j
)
433 SLIST_FOREACH(ji
, &j
->jobs
, sle
)
434 job_remove_all_inactive(ji
);
436 if (!job_active(j
)) {
438 } else if (getpid() != 1) {
444 job_remove(struct jobcb
*j
)
447 struct calendarinterval
*ci
;
448 struct socketgroup
*sg
;
449 struct watchpath
*wp
;
450 struct limititem
*li
;
452 struct machservice
*ms
;
453 struct semaphoreitem
*si
;
455 job_log(j
, LOG_DEBUG
, "Removed");
458 if (kevent_mod(j
->p
, EVFILT_PROC
, EV_ADD
, NOTE_EXIT
, 0, &kqsimple_zombie_reaper
) == -1) {
461 /* we've attached the simple zombie reaper, we're going to delete the job before it is dead */
468 SLIST_REMOVE(&j
->parent
->jobs
, j
, jobcb
, sle
);
471 launchd_assumes(close(j
->execfd
) == 0);
474 if (j
->transfer_bstrap
) {
475 launchd_assumes(launchd_mport_deallocate(j
->bs_port
) == KERN_SUCCESS
);
477 launchd_assumes(launchd_mport_close_recv(j
->bs_port
) == KERN_SUCCESS
);
482 launchd_assumes(launchd_mport_deallocate(j
->req_port
) == KERN_SUCCESS
);
485 if (j
->wait_reply_port
) {
489 while ((ji
= SLIST_FIRST(&j
->jobs
)))
492 while ((sg
= SLIST_FIRST(&j
->sockets
)))
493 socketgroup_delete(j
, sg
);
495 while ((wp
= SLIST_FIRST(&j
->vnodes
)))
496 watchpath_delete(j
, wp
);
498 while ((ci
= SLIST_FIRST(&j
->cal_intervals
)))
499 calendarinterval_delete(j
, ci
);
501 while ((ei
= SLIST_FIRST(&j
->env
)))
502 envitem_delete(j
, ei
, false);
504 while ((ei
= SLIST_FIRST(&j
->global_env
)))
505 envitem_delete(j
, ei
, true);
507 while ((li
= SLIST_FIRST(&j
->limits
)))
508 limititem_delete(j
, li
);
510 while ((ms
= SLIST_FIRST(&j
->machservices
)))
511 machservice_delete(ms
);
513 while ((si
= SLIST_FIRST(&j
->semaphores
)))
514 semaphoreitem_delete(j
, si
);
543 if (j
->start_interval
)
544 kevent_mod((uintptr_t)&j
->start_interval
, EVFILT_TIMER
, EV_DELETE
, 0, 0, NULL
);
546 kevent_mod((uintptr_t)j
, EVFILT_TIMER
, EV_DELETE
, 0, 0, NULL
);
551 socketgroup_setup(launch_data_t obj
, const char *key
, void *context
)
553 launch_data_t tmp_oai
;
554 struct jobcb
*j
= context
;
555 unsigned int i
, fd_cnt
= 1;
558 if (launch_data_get_type(obj
) == LAUNCH_DATA_ARRAY
)
559 fd_cnt
= launch_data_array_get_count(obj
);
561 fds
= alloca(fd_cnt
* sizeof(int));
563 for (i
= 0; i
< fd_cnt
; i
++) {
564 if (launch_data_get_type(obj
) == LAUNCH_DATA_ARRAY
)
565 tmp_oai
= launch_data_array_get_index(obj
, i
);
569 fds
[i
] = launch_data_get_fd(tmp_oai
);
572 socketgroup_new(j
, key
, fds
, fd_cnt
, strcmp(key
, LAUNCH_JOBKEY_BONJOURFDS
) == 0);
578 job_setup_machport(struct jobcb
*j
)
580 if (!launchd_assumes(launchd_mport_create_recv(&j
->bs_port
) == KERN_SUCCESS
))
583 if (!launchd_assumes(launchd_mport_request_callback(j
->bs_port
, j
, true) == KERN_SUCCESS
))
588 launchd_assumes(launchd_mport_close_recv(j
->bs_port
) == KERN_SUCCESS
);
594 job_new_via_mach_init(struct jobcb
*jbs
, const char *cmd
, uid_t uid
, bool ond
)
596 const char **argv
= (const char **)mach_cmd2argv(cmd
);
597 struct jobcb
*j
= NULL
;
600 if (!launchd_assumes(argv
!= NULL
))
603 /* preflight the string so we know how big it is */
604 sprintf(buf
, "100000.%s", basename((char *)argv
[0]));
606 j
= job_new(jbs
, buf
, NULL
, argv
, NULL
, MACH_PORT_NULL
);
610 if (!launchd_assumes(j
!= NULL
))
615 j
->legacy_mach_job
= true;
616 j
->priv_port_has_senders
= true; /* the IPC that called us will make-send on this port */
618 if (!job_setup_machport(j
))
621 if (!launchd_assumes(launchd_mport_notify_req(j
->bs_port
, MACH_NOTIFY_NO_SENDERS
) == KERN_SUCCESS
)) {
622 launchd_assumes(launchd_mport_close_recv(j
->bs_port
) == KERN_SUCCESS
);
626 sprintf(j
->label
, "%d.%s", MACH_PORT_INDEX(j
->bs_port
), basename(j
->argv
[0]));
628 job_log(j
, LOG_INFO
, "New%s server in bootstrap: %x", ond
? " on-demand" : "", jbs
->bs_port
);
639 job_handle_mpm_wait(struct jobcb
*j
, mach_port_t srp
, int *waitstatus
)
642 j
->wait_reply_port
= srp
;
646 *waitstatus
= j
->last_exit_status
;
652 job_new_spawn(const char *label
, const char *path
, const char *workingdir
, const char *const *argv
, const char *const *env
, mode_t
*u_mask
, bool w4d
, bool fppc
)
656 if ((jr
= job_find(root_job
, label
)) != NULL
) {
661 jr
= job_new(root_job
, label
, path
, argv
, NULL
, MACH_PORT_NULL
);
666 jr
->unload_at_exit
= true;
667 jr
->stall_before_exec
= w4d
;
668 jr
->force_ppc
= fppc
;
670 if (!job_setup_machport(jr
)) {
676 jr
->workingdir
= strdup(workingdir
);
683 if (env
) for (; *env
; env
++) {
684 char newkey
[strlen(*env
) + 1], *eqoff
= strchr(*env
, '=');
686 job_log(jr
, LOG_WARNING
, "Environmental variable missing '=' separator: %s", *env
);
689 strcpy(newkey
, *env
);
691 envitem_new(jr
, newkey
, eqoff
+ 1, false);
700 job_new(struct jobcb
*p
, const char *label
, const char *prog
, const char *const *argv
, const char *stdinpath
, mach_port_t reqport
)
702 const char *const *argv_tmp
= argv
;
707 if (reqport
== MACH_PORT_NULL
&& prog
== NULL
&& argv
== NULL
) {
712 j
= calloc(1, sizeof(struct jobcb
) + strlen(label
) + 1);
714 if (!launchd_assumes(j
!= NULL
))
717 strcpy(j
->label
, label
);
718 j
->kqjob_callback
= job_callback
;
719 j
->parent
= p
? job_get_bs(p
) : NULL
;
722 j
->firstborn
= (strcmp(label
, FIRSTBORN_LABEL
) == 0);
724 if (reqport
!= MACH_PORT_NULL
) {
725 j
->req_port
= reqport
;
726 if (!launchd_assumes(launchd_mport_notify_req(reqport
, MACH_NOTIFY_DEAD_NAME
) == KERN_SUCCESS
))
731 j
->prog
= strdup(prog
);
732 if (!launchd_assumes(j
->prog
!= NULL
))
737 j
->stdinpath
= strdup(stdinpath
);
738 if (!launchd_assumes(j
->stdinpath
!= NULL
))
746 for (i
= 0; i
< j
->argc
; i
++)
747 cc
+= strlen(argv
[i
]) + 1;
749 j
->argv
= malloc((j
->argc
+ 1) * sizeof(char *) + cc
);
751 if (!launchd_assumes(j
!= NULL
))
754 co
= ((char *)j
->argv
) + ((j
->argc
+ 1) * sizeof(char *));
756 for (i
= 0; i
< j
->argc
; i
++) {
759 co
+= strlen(argv
[i
]) + 1;
765 SLIST_INSERT_HEAD(&j
->parent
->jobs
, j
, sle
);
766 job_log(j
->parent
, LOG_DEBUG
, "Conceived");
783 job_import(launch_data_t pload
)
785 struct jobcb
*j
= job_import2(pload
);
796 job_import_bulk(launch_data_t pload
)
798 launch_data_t resp
= launch_data_alloc(LAUNCH_DATA_ARRAY
);
800 size_t i
, c
= launch_data_array_get_count(pload
);
802 ja
= alloca(c
* sizeof(struct jobcb
*));
804 for (i
= 0; i
< c
; i
++) {
805 if ((ja
[i
] = job_import2(launch_data_array_get_index(pload
, i
))))
807 launch_data_array_set_index(resp
, launch_data_new_errno(errno
), i
);
810 for (i
= 0; i
< c
; i
++) {
820 job_import_bool(struct jobcb
*j
, const char *key
, bool value
)
825 if (strcasecmp(key
, LAUNCH_JOBKEY_FORCEPOWERPC
) == 0)
826 j
->force_ppc
= value
;
830 if (strcasecmp(key
, LAUNCH_JOBKEY_KEEPALIVE
) == 0)
831 j
->ondemand
= !value
;
835 if (strcasecmp(key
, LAUNCH_JOBKEY_ONDEMAND
) == 0)
840 if (strcasecmp(key
, LAUNCH_JOBKEY_DEBUG
) == 0)
845 if (strcasecmp(key
, LAUNCH_JOBKEY_SESSIONCREATE
) == 0)
846 j
->session_create
= value
;
850 if (strcasecmp(key
, LAUNCH_JOBKEY_LOWPRIORITYIO
) == 0)
851 j
->low_pri_io
= value
;
855 if (strcasecmp(key
, LAUNCH_JOBKEY_INITGROUPS
) == 0)
856 j
->init_groups
= value
;
860 if (strcasecmp(key
, LAUNCH_JOBKEY_RUNATLOAD
) == 0)
861 j
->runatload
= value
;
865 if (strcasecmp(key
, LAUNCH_JOBKEY_ENABLEGLOBBING
) == 0)
870 if (strcasecmp(key
, LAUNCH_JOBKEY_WAITFORDEBUGGER
) == 0)
871 j
->wait4debugger
= value
;
879 job_import_string(struct jobcb
*j
, const char *key
, const char *value
)
881 char **where2put
= NULL
;
882 char **ignore
= (char **)-1;
887 if (strcasecmp(key
, LAUNCH_JOBKEY_PROGRAM
) == 0)
892 if (strcasecmp(key
, LAUNCH_JOBKEY_LABEL
) == 0)
897 if (strcasecmp(key
, LAUNCH_JOBKEY_ROOTDIRECTORY
) == 0)
898 where2put
= &j
->rootdir
;
902 if (strcasecmp(key
, LAUNCH_JOBKEY_WORKINGDIRECTORY
) == 0)
903 where2put
= &j
->workingdir
;
907 if (strcasecmp(key
, LAUNCH_JOBKEY_USERNAME
) == 0)
908 where2put
= &j
->username
;
912 if (strcasecmp(key
, LAUNCH_JOBKEY_GROUPNAME
) == 0)
913 where2put
= &j
->groupname
;
917 if (strcasecmp(key
, LAUNCH_JOBKEY_STANDARDOUTPATH
) == 0) {
918 where2put
= &j
->stdoutpath
;
919 } else if (strcasecmp(key
, LAUNCH_JOBKEY_STANDARDERRORPATH
) == 0) {
920 where2put
= &j
->stderrpath
;
928 if (where2put
== ignore
)
931 launchd_assumes((*where2put
= strdup(value
)) != NULL
);
933 job_log(j
, LOG_WARNING
, "Unknown value for key %s: %s", key
, value
);
938 job_import_integer(struct jobcb
*j
, const char *key
, long long value
)
943 if (strcasecmp(key
, LAUNCH_JOBKEY_NICE
) == 0)
948 if (strcasecmp(key
, LAUNCH_JOBKEY_TIMEOUT
) == 0) {
950 job_log(j
, LOG_WARNING
, "Timeout less than or equal to zero. Ignoring.");
957 if (strcasecmp(key
, LAUNCH_JOBKEY_UMASK
) == 0) {
964 if (strcasecmp(key
, LAUNCH_JOBKEY_STARTINTERVAL
) == 0) {
966 job_log(j
, LOG_WARNING
, "StartInterval is not greater than zero, ignoring");
968 j
->start_interval
= value
;
969 if (-1 == kevent_mod((uintptr_t)&j
->start_interval
, EVFILT_TIMER
, EV_ADD
, NOTE_SECONDS
, value
, j
))
970 job_log_error(j
, LOG_ERR
, "adding kevent timer");
979 job_import_dictionary(struct jobcb
*j
, const char *key
, launch_data_t value
)
986 if (strcasecmp(key
, LAUNCH_JOBKEY_KEEPALIVE
) == 0)
987 launch_data_dict_iterate(value
, semaphoreitem_setup
, j
);
991 if (strcasecmp(key
, LAUNCH_JOBKEY_INETDCOMPATIBILITY
) == 0) {
992 j
->inetcompat
= true;
993 if ((tmp
= launch_data_dict_lookup(value
, LAUNCH_JOBINETDCOMPATIBILITY_WAIT
)))
994 j
->inetcompat_wait
= launch_data_get_bool(tmp
);
999 if (strcasecmp(key
, LAUNCH_JOBKEY_ENVIRONMENTVARIABLES
) == 0)
1000 launch_data_dict_iterate(value
, envitem_setup
, j
);
1004 if (strcasecmp(key
, LAUNCH_JOBKEY_USERENVIRONMENTVARIABLES
) == 0) {
1005 j
->importing_global_env
= true;
1006 launch_data_dict_iterate(value
, envitem_setup
, j
);
1007 j
->importing_global_env
= false;
1012 if (strcasecmp(key
, LAUNCH_JOBKEY_SOCKETS
) == 0) {
1013 launch_data_dict_iterate(value
, socketgroup_setup
, j
);
1014 } else if (strcasecmp(key
, LAUNCH_JOBKEY_STARTCALENDARINTERVAL
) == 0) {
1015 calendarinterval_new_from_obj(j
, value
);
1016 } else if (strcasecmp(key
, LAUNCH_JOBKEY_SOFTRESOURCELIMITS
) == 0) {
1017 launch_data_dict_iterate(value
, limititem_setup
, j
);
1022 if (strcasecmp(key
, LAUNCH_JOBKEY_HARDRESOURCELIMITS
) == 0) {
1023 j
->importing_hard_limits
= true;
1024 launch_data_dict_iterate(value
, limititem_setup
, j
);
1025 j
->importing_hard_limits
= false;
1030 if (strcasecmp(key
, LAUNCH_JOBKEY_MACHSERVICES
) == 0) {
1031 launch_data_dict_iterate(value
, machservice_setup
, j
);
1032 if (!SLIST_EMPTY(&j
->machservices
))
1033 job_setup_machport(j
);
1042 job_import_array(struct jobcb
*j
, const char *key
, launch_data_t value
)
1044 bool is_q_dir
= false;
1050 if (strcasecmp(key
, LAUNCH_JOBKEY_QUEUEDIRECTORIES
) == 0) {
1057 if (strcasecmp(key
, LAUNCH_JOBKEY_WATCHPATHS
) == 0)
1062 if (strcasecmp(key
, LAUNCH_JOBKEY_BONJOURFDS
) == 0)
1063 socketgroup_setup(value
, LAUNCH_JOBKEY_BONJOURFDS
, j
);
1067 if (strcasecmp(key
, LAUNCH_JOBKEY_STARTCALENDARINTERVAL
) == 0) {
1068 size_t i
= 0, ci_cnt
= launch_data_array_get_count(value
);
1069 for (i
= 0; i
< ci_cnt
; i
++)
1070 calendarinterval_new_from_obj(j
, launch_data_array_get_index(value
, i
));
1078 size_t i
, wp_cnt
= launch_data_array_get_count(value
);
1079 const char *thepath
;
1080 for (i
= 0; i
< wp_cnt
; i
++) {
1081 thepath
= launch_data_get_string(launch_data_array_get_index(value
, i
));
1082 watchpath_new(j
, thepath
, is_q_dir
);
1088 job_import_keys(launch_data_t obj
, const char *key
, void *context
)
1090 struct jobcb
*j
= context
;
1091 launch_data_type_t kind
;
1096 kind
= launch_data_get_type(obj
);
1099 case LAUNCH_DATA_BOOL
:
1100 job_import_bool(j
, key
, launch_data_get_bool(obj
));
1102 case LAUNCH_DATA_STRING
:
1103 job_import_string(j
, key
, launch_data_get_string(obj
));
1105 case LAUNCH_DATA_INTEGER
:
1106 job_import_integer(j
, key
, launch_data_get_integer(obj
));
1108 case LAUNCH_DATA_DICTIONARY
:
1109 job_import_dictionary(j
, key
, obj
);
1111 case LAUNCH_DATA_ARRAY
:
1112 job_import_array(j
, key
, obj
);
1115 job_log(j
, LOG_WARNING
, "Unknown value type '%d' for key: %s", kind
, key
);
1121 job_import2(launch_data_t pload
)
1123 launch_data_t tmp
, ldpa
;
1124 const char *label
= NULL
, *prog
= NULL
;
1125 const char **argv
= NULL
;
1131 if (launch_data_get_type(pload
) != LAUNCH_DATA_DICTIONARY
)
1134 if ((tmp
= launch_data_dict_lookup(pload
, LAUNCH_JOBKEY_LABEL
)) &&
1135 (launch_data_get_type(tmp
) == LAUNCH_DATA_STRING
)) {
1136 label
= launch_data_get_string(tmp
);
1138 if ((tmp
= launch_data_dict_lookup(pload
, LAUNCH_JOBKEY_PROGRAM
)) &&
1139 (launch_data_get_type(tmp
) == LAUNCH_DATA_STRING
)) {
1140 prog
= launch_data_get_string(tmp
);
1142 ldpa
= launch_data_dict_lookup(pload
, LAUNCH_JOBKEY_PROGRAMARGUMENTS
);
1144 if (label
== NULL
) {
1147 } else if ((j
= job_find(root_job
, label
)) != NULL
) {
1150 } else if (label
[0] == '\0' || (strncasecmp(label
, "", strlen("com.apple.launchd")) == 0) ||
1151 (strtol(label
, NULL
, 10) != 0)) {
1152 syslog(LOG_ERR
, "Somebody attempted to use a reserved prefix for a label: %s", label
);
1153 /* the empty string, com.apple.launchd and number prefixes for labels are reserved */
1159 size_t i
, c
= launch_data_array_get_count(ldpa
);
1161 argv
= alloca((c
+ 1) * sizeof(char *));
1163 for (i
= 0; i
< c
; i
++)
1164 argv
[i
] = launch_data_get_string(launch_data_array_get_index(ldpa
, i
));
1168 if ((j
= job_new(root_job
, label
, prog
, argv
, NULL
, MACH_PORT_NULL
)))
1169 launch_data_dict_iterate(pload
, job_import_keys
, j
);
1175 job_find(struct jobcb
*j
, const char *label
)
1177 struct jobcb
*jr
, *ji
;
1179 if (label
[0] == '\0')
1182 if (strcmp(j
->label
, label
) == 0)
1185 SLIST_FOREACH(ji
, &j
->jobs
, sle
) {
1186 if ((jr
= job_find(ji
, label
)))
1195 job_find_by_pid(struct jobcb
*j
, pid_t p
)
1197 struct jobcb
*jr
, *ji
;
1202 SLIST_FOREACH(ji
, &j
->jobs
, sle
) {
1203 if ((jr
= job_find_by_pid(ji
, p
)))
1212 job_export_all2(struct jobcb
*j
, launch_data_t where
)
1217 if (launchd_assumes((tmp
= job_export2(j
, false)) != NULL
))
1218 launch_data_dict_insert(where
, tmp
, j
->label
);
1220 SLIST_FOREACH(ji
, &j
->jobs
, sle
)
1221 job_export_all2(ji
, where
);
1225 job_export_all(void)
1227 launch_data_t resp
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
1229 job_export_all2(root_job
, resp
);
1235 job_reap(struct jobcb
*j
)
1238 time_t td
= time(NULL
) - j
->start_time
;
1239 bool bad_exit
= false;
1242 job_log(j
, LOG_DEBUG
, "Reaping");
1245 launchd_assumes(close(j
->execfd
) == 0);
1249 if (!launchd_assumes(wait4(j
->p
, &status
, 0, &ru
) != -1)) {
1253 if (j
->wait_reply_port
) {
1254 job_log(j
, LOG_DEBUG
, "MPM wait reply being sent");
1255 launchd_assumes(mpm_wait_reply(j
->wait_reply_port
, 0, status
) == 0);
1256 j
->wait_reply_port
= MACH_PORT_NULL
;
1259 timeradd(&ru
.ru_utime
, &j
->ru
.ru_utime
, &j
->ru
.ru_utime
);
1260 timeradd(&ru
.ru_stime
, &j
->ru
.ru_stime
, &j
->ru
.ru_stime
);
1261 j
->ru
.ru_maxrss
+= ru
.ru_maxrss
;
1262 j
->ru
.ru_ixrss
+= ru
.ru_ixrss
;
1263 j
->ru
.ru_idrss
+= ru
.ru_idrss
;
1264 j
->ru
.ru_isrss
+= ru
.ru_isrss
;
1265 j
->ru
.ru_minflt
+= ru
.ru_minflt
;
1266 j
->ru
.ru_majflt
+= ru
.ru_majflt
;
1267 j
->ru
.ru_nswap
+= ru
.ru_nswap
;
1268 j
->ru
.ru_inblock
+= ru
.ru_inblock
;
1269 j
->ru
.ru_oublock
+= ru
.ru_oublock
;
1270 j
->ru
.ru_msgsnd
+= ru
.ru_msgsnd
;
1271 j
->ru
.ru_msgrcv
+= ru
.ru_msgrcv
;
1272 j
->ru
.ru_nsignals
+= ru
.ru_nsignals
;
1273 j
->ru
.ru_nvcsw
+= ru
.ru_nvcsw
;
1274 j
->ru
.ru_nivcsw
+= ru
.ru_nivcsw
;
1276 if (WIFEXITED(status
) && WEXITSTATUS(status
) != 0) {
1277 job_log(j
, LOG_WARNING
, "exited with exit code: %d", WEXITSTATUS(status
));
1281 if (WIFSIGNALED(status
)) {
1282 int s
= WTERMSIG(status
);
1283 if (SIGKILL
== s
|| SIGTERM
== s
) {
1284 job_log(j
, LOG_NOTICE
, "Exited: %s", strsignal(s
));
1286 job_log(j
, LOG_WARNING
, "Exited abnormally: %s", strsignal(s
));
1291 if (!j
->ondemand
&& !j
->legacy_mach_job
) {
1292 if (td
< LAUNCHD_MIN_JOB_RUN_TIME
) {
1293 job_log(j
, LOG_WARNING
, "respawning too quickly! throttling");
1296 } else if (td
>= LAUNCHD_REWARD_JOB_RUN_TIME
) {
1297 job_log(j
, LOG_INFO
, "lived long enough, forgiving past exit failures");
1298 j
->failed_exits
= 0;
1302 if (!j
->legacy_mach_job
&& bad_exit
)
1305 if (j
->failed_exits
> 0) {
1306 int failures_left
= LAUNCHD_FAILED_EXITS_THRESHOLD
- j
->failed_exits
;
1308 job_log(j
, LOG_WARNING
, "%d more failure%s without living at least %d seconds will cause job removal",
1309 failures_left
, failures_left
> 1 ? "s" : "", LAUNCHD_REWARD_JOB_RUN_TIME
);
1313 j
->last_exit_status
= status
;
1318 job_dispatch(struct jobcb
*j
)
1320 if (job_active(j
)) {
1322 } else if (job_useless(j
)) {
1324 } else if (job_keepalive(j
)) {
1332 job_callback(void *obj
, struct kevent
*kev
)
1334 struct jobcb
*j
= obj
;
1339 oldmask
= setlogmask(LOG_UPTO(LOG_DEBUG
));
1342 switch (kev
->filter
) {
1347 job_log(j
, LOG_DEBUG
, "first born died, begin shutdown");
1354 if ((uintptr_t)j
== kev
->ident
) {
1357 calendarinterval_callback(j
, kev
);
1361 watchpath_callback(j
, kev
);
1364 if ((int)kev
->ident
!= j
->execfd
) {
1365 socketgroup_callback(j
, kev
);
1368 if (j
->wait4debugger
) {
1369 /* Allow somebody else to attach */
1370 launchd_assumes(kill(j
->p
, SIGSTOP
) != -1);
1371 launchd_assumes(ptrace(PT_DETACH
, j
->p
, NULL
, 0) != -1);
1373 if (kev
->data
> 0) {
1376 read(j
->execfd
, &e
, sizeof(e
));
1378 job_log_error(j
, LOG_ERR
, "execve()");
1382 launchd_assumes(close(j
->execfd
) == 0);
1386 case EVFILT_MACHPORT
:
1390 launchd_assumes(false);
1395 /* the job might have been removed, must not call job_log() */
1396 setlogmask(oldmask
);
1401 job_start(struct jobcb
*j
)
1409 if (!launchd_assumes(j
->req_port
== MACH_PORT_NULL
))
1412 if (!launchd_assumes(j
->parent
!= NULL
))
1415 if (job_active(j
)) {
1416 job_log(j
, LOG_DEBUG
, "Already started");
1418 } else if (!j
->legacy_mach_job
&& j
->throttle
) {
1419 j
->throttle
= false;
1420 job_log(j
, LOG_WARNING
, "Throttling: Will restart in %d seconds", LAUNCHD_MIN_JOB_RUN_TIME
);
1421 launchd_assumes(kevent_mod((uintptr_t)j
, EVFILT_TIMER
, EV_ADD
|EV_ONESHOT
,
1422 NOTE_SECONDS
, LAUNCHD_MIN_JOB_RUN_TIME
, j
) != -1);
1426 job_log(j
, LOG_DEBUG
, "Starting");
1428 if (!j
->legacy_mach_job
)
1429 sipc
= (!SLIST_EMPTY(&j
->sockets
) || !SLIST_EMPTY(&j
->machservices
));
1431 /* FIXME, using stdinpath is a hack for re-reading the conf file */
1435 j
->checkedin
= false;
1438 socketpair(AF_UNIX
, SOCK_STREAM
, 0, spair
);
1440 socketpair(AF_UNIX
, SOCK_STREAM
, 0, execspair
);
1442 time(&j
->start_time
);
1445 launchd_assumes(launchd_mport_notify_req(j
->bs_port
, MACH_NOTIFY_NO_SENDERS
) == KERN_SUCCESS
);
1448 switch (c
= job_fork(j
->bs_port
? j
: j
->parent
)) {
1450 job_log_error(j
, LOG_ERR
, "fork() failed, will try again in one second");
1451 launchd_assumes(close(execspair
[0]) == 0);
1452 launchd_assumes(close(execspair
[1]) == 0);
1454 launchd_assumes(close(spair
[0]) == 0);
1455 launchd_assumes(close(spair
[1]) == 0);
1459 launchd_assumes(close(execspair
[0]) == 0);
1460 /* wait for our parent to say they've attached a kevent to us */
1461 read(_fd(execspair
[1]), &c
, sizeof(c
));
1463 setpgid(getpid(), getpid());
1464 if (isatty(STDIN_FILENO
)) {
1465 if (tcsetpgrp(STDIN_FILENO
, getpid()) == -1)
1466 job_log_error(j
, LOG_WARNING
, "tcsetpgrp()");
1471 launchd_assumes(close(spair
[0]) == 0);
1472 sprintf(nbuf
, "%d", spair
[1]);
1473 setenv(LAUNCHD_TRUSTED_FD_ENV
, nbuf
, 1);
1475 job_start_child(j
, execspair
[1]);
1478 if (!SLIST_EMPTY(&j
->machservices
))
1479 j
->priv_port_has_senders
= true;
1482 launchd_assumes(close(execspair
[1]) == 0);
1483 j
->execfd
= _fd(execspair
[0]);
1485 launchd_assumes(close(spair
[1]) == 0);
1486 ipc_open(_fd(spair
[0]), j
);
1488 if (kevent_mod(j
->execfd
, EVFILT_READ
, EV_ADD
, 0, 0, &j
->kqjob_callback
) == -1)
1489 job_log_error(j
, LOG_ERR
, "kevent_mod(j->execfd): %m");
1490 if (kevent_mod(c
, EVFILT_PROC
, EV_ADD
, NOTE_EXIT
, 0, &j
->kqjob_callback
) == -1) {
1491 job_log_error(j
, LOG_ERR
, "kevent()");
1498 if (!j
->stall_before_exec
) {
1499 /* this unblocks the child and avoids a race
1500 * between the above fork() and the kevent_mod() */
1501 write(j
->execfd
, &c
, sizeof(c
));
1508 job_start_child(struct jobcb
*j
, int execfd
)
1510 const char *file2exec
= "/usr/libexec/launchproxy";
1512 int gflags
= GLOB_NOSORT
|GLOB_NOCHECK
|GLOB_TILDE
|GLOB_DOOFFS
;
1516 job_setup_attributes(j
);
1518 if (j
->argv
&& j
->globargv
) {
1520 for (i
= 0; i
< j
->argc
; i
++) {
1522 gflags
|= GLOB_APPEND
;
1523 if (glob(j
->argv
[i
], gflags
, NULL
, &g
) != 0) {
1524 job_log_error(j
, LOG_ERR
, "glob(\"%s\")", j
->argv
[i
]);
1528 g
.gl_pathv
[0] = (char *)file2exec
;
1529 argv
= (const char **)g
.gl_pathv
;
1530 } else if (j
->argv
) {
1531 argv
= alloca((j
->argc
+ 2) * sizeof(char *));
1532 argv
[0] = file2exec
;
1533 for (i
= 0; i
< j
->argc
; i
++)
1534 argv
[i
+ 1] = j
->argv
[i
];
1537 argv
= alloca(3 * sizeof(char *));
1538 argv
[0] = file2exec
;
1546 if (j
->wait4debugger
&& ptrace(PT_TRACE_ME
, getpid(), NULL
, 0) == -1)
1547 job_log_error(j
, LOG_ERR
, "ptrace(PT_TRACE_ME, ...)");
1550 int affinmib
[] = { CTL_KERN
, KERN_AFFINITY
, 1, 1 };
1551 size_t mibsz
= sizeof(affinmib
) / sizeof(affinmib
[0]);
1553 if (sysctl(affinmib
, mibsz
, NULL
, NULL
, NULL
, 0) == -1)
1554 job_log_error(j
, LOG_WARNING
, "Failed to force PowerPC execution");
1558 execv(j
->inetcompat
? file2exec
: j
->prog
, (char *const*)argv
);
1559 job_log_error(j
, LOG_ERR
, "execv(\"%s\", ...)", j
->prog
);
1561 execvp(j
->inetcompat
? file2exec
: argv
[0], (char *const*)argv
);
1562 job_log_error(j
, LOG_ERR
, "execvp(\"%s\", ...)", argv
[0]);
1565 write(execfd
, &errno
, sizeof(errno
));
1569 void job_setup_env_from_other_jobs(struct jobcb
*j
)
1574 SLIST_FOREACH(ji
, &j
->jobs
, sle
)
1575 job_setup_env_from_other_jobs(ji
);
1577 SLIST_FOREACH(ei
, &j
->global_env
, sle
)
1578 setenv(ei
->key
, ei
->value
, 1);
1582 job_setup_attributes(struct jobcb
*j
)
1584 struct limititem
*li
;
1586 struct group
*gre
= NULL
;
1589 setpriority(PRIO_PROCESS
, 0, j
->nice
);
1591 SLIST_FOREACH(li
, &j
->limits
, sle
) {
1594 if (getrlimit(li
->which
, &rl
) == -1) {
1595 job_log_error(j
, LOG_WARNING
, "getrlimit()");
1600 rl
.rlim_max
= li
->lim
.rlim_max
;
1602 rl
.rlim_cur
= li
->lim
.rlim_cur
;
1604 if (setrlimit(li
->which
, &rl
) == -1)
1605 job_log_error(j
, LOG_WARNING
, "setrlimit()");
1608 if (!j
->inetcompat
&& j
->session_create
)
1609 launchd_SessionCreate();
1611 if (j
->low_pri_io
) {
1612 int lowprimib
[] = { CTL_KERN
, KERN_PROC_LOW_PRI_IO
};
1615 if (sysctl(lowprimib
, sizeof(lowprimib
) / sizeof(lowprimib
[0]), NULL
, NULL
, &val
, sizeof(val
)) == -1)
1616 job_log_error(j
, LOG_WARNING
, "sysctl(\"%s\")", "kern.proc_low_pri_io");
1623 gre
= getgrnam(j
->groupname
);
1625 gre_g
= gre
->gr_gid
;
1626 if (-1 == setgid(gre_g
)) {
1627 job_log_error(j
, LOG_ERR
, "setgid(%d)", gre_g
);
1631 job_log(j
, LOG_ERR
, "getgrnam(\"%s\") failed", j
->groupname
);
1635 if (j
->username
|| j
->mach_uid
) {
1639 pwe
= getpwnam(j
->username
);
1641 pwe
= getpwuid(j
->mach_uid
);
1644 uid_t pwe_u
= pwe
->pw_uid
;
1645 uid_t pwe_g
= pwe
->pw_gid
;
1647 if (pwe
->pw_expire
&& time(NULL
) >= pwe
->pw_expire
) {
1648 job_log(j
, LOG_ERR
, "expired account: %s", j
->username
);
1651 if (j
->init_groups
) {
1652 if (-1 == initgroups(j
->username
, gre
? gre_g
: pwe_g
)) {
1653 job_log_error(j
, LOG_ERR
, "initgroups()");
1658 if (-1 == setgid(pwe_g
)) {
1659 job_log_error(j
, LOG_ERR
, "setgid(%d)", pwe_g
);
1663 if (-1 == setuid(pwe_u
)) {
1664 job_log_error(j
, LOG_ERR
, "setuid(%d)", pwe_u
);
1669 job_log(j
, LOG_WARNING
, "getpwnam(\"%s\") failed", j
->username
);
1671 job_log(j
, LOG_WARNING
, "getpwuid(\"%d\") failed", j
->mach_uid
);
1677 chdir(j
->workingdir
);
1681 int sifd
= open(j
->stdinpath
, O_RDONLY
|O_NOCTTY
);
1683 job_log_error(j
, LOG_WARNING
, "open(\"%s\", ...)", j
->stdinpath
);
1685 launchd_assumes(dup2(sifd
, STDIN_FILENO
) != -1);
1686 launchd_assumes(close(sifd
) == 0);
1689 if (j
->stdoutpath
) {
1690 int sofd
= open(j
->stdoutpath
, O_WRONLY
|O_APPEND
|O_CREAT
|O_NOCTTY
, DEFFILEMODE
);
1692 job_log_error(j
, LOG_WARNING
, "open(\"%s\", ...)", j
->stdoutpath
);
1694 launchd_assumes(dup2(sofd
, STDOUT_FILENO
) != -1);
1695 launchd_assumes(close(sofd
) == 0);
1698 if (j
->stderrpath
) {
1699 int sefd
= open(j
->stderrpath
, O_WRONLY
|O_APPEND
|O_CREAT
|O_NOCTTY
, DEFFILEMODE
);
1701 job_log_error(j
, LOG_WARNING
, "open(\"%s\", ...)", j
->stderrpath
);
1703 launchd_assumes(dup2(sefd
, STDERR_FILENO
) != -1);
1704 launchd_assumes(close(sefd
) == 0);
1708 job_setup_env_from_other_jobs(root_job
);
1710 SLIST_FOREACH(ei
, &j
->env
, sle
)
1711 setenv(ei
->key
, ei
->value
, 1);
1717 dir_has_files(const char *path
)
1719 DIR *dd
= opendir(path
);
1726 while ((de
= readdir(dd
))) {
1727 if (strcmp(de
->d_name
, ".") && strcmp(de
->d_name
, "..")) {
1733 launchd_assumes(closedir(dd
) == 0);
1738 calendarinterval_setalarm(struct jobcb
*j
, struct calendarinterval
*ci
)
1742 later
= cronemu(ci
->when
.tm_mon
, ci
->when
.tm_mday
, ci
->when
.tm_hour
, ci
->when
.tm_min
);
1744 if (ci
->when
.tm_wday
!= -1) {
1745 time_t otherlater
= cronemu_wday(ci
->when
.tm_wday
, ci
->when
.tm_hour
, ci
->when
.tm_min
);
1747 if (ci
->when
.tm_mday
== -1) {
1750 later
= later
< otherlater
? later
: otherlater
;
1754 if (-1 == kevent_mod((uintptr_t)ci
, EVFILT_TIMER
, EV_ADD
, NOTE_ABSOLUTE
|NOTE_SECONDS
, later
, j
)) {
1755 job_log_error(j
, LOG_ERR
, "adding kevent alarm");
1757 job_log(j
, LOG_INFO
, "scheduled to run again at %s", ctime(&later
));
1762 job_prep_log_preface(struct jobcb
*j
, char *buf
)
1764 size_t lsz
= strlen(j
->label
);
1765 char newlabel
[lsz
* 2 + 1];
1768 for (i
= 0, o
= 0; i
< lsz
; i
++, o
++) {
1769 if (j
->label
[i
] == '%') {
1774 newlabel
[o
] = j
->label
[i
];
1780 r
= job_prep_log_preface(j
->parent
, buf
);
1782 return r
+ sprintf(buf
+ r
, "%s%s", j
->parent
? "/" : "", newlabel
);
1786 job_log_error(struct jobcb
*j
, int pri
, const char *msg
, ...)
1792 o
= job_prep_log_preface(j
, newmsg
);
1794 sprintf(newmsg
+ o
, ": %s: %s", msg
, strerror(errno
));
1797 vsyslog(pri
, newmsg
, ap
);
1802 job_log(struct jobcb
*j
, int pri
, const char *msg
, ...)
1808 o
= job_prep_log_preface(j
, newmsg
);
1810 sprintf(newmsg
+ o
, ": %s", msg
);
1813 vsyslog(pri
, newmsg
, ap
);
1818 watchpath_new(struct jobcb
*j
, const char *name
, bool qdir
)
1820 struct watchpath
*wp
= calloc(1, sizeof(struct watchpath
) + strlen(name
) + 1);
1822 if (!launchd_assumes(wp
!= NULL
))
1827 wp
->fd
= -1; /* watchpath_watch() will open this */
1829 strcpy(wp
->name
, name
);
1831 SLIST_INSERT_HEAD(&j
->vnodes
, wp
, sle
);
1837 watchpath_delete(struct jobcb
*j
, struct watchpath
*wp
)
1840 launchd_assumes(close(wp
->fd
) != -1);
1842 SLIST_REMOVE(&j
->vnodes
, wp
, watchpath
, sle
);
1848 watchpath_ignore(struct jobcb
*j
, struct watchpath
*wp
)
1851 job_log(j
, LOG_DEBUG
, "Ignoring Vnode: %d", wp
->fd
);
1852 launchd_assumes(kevent_mod(wp
->fd
, EVFILT_VNODE
, EV_DELETE
, 0, 0, NULL
) != -1);
1857 watchpath_watch(struct jobcb
*j
, struct watchpath
*wp
)
1859 int fflags
= NOTE_WRITE
|NOTE_EXTEND
|NOTE_ATTRIB
|NOTE_LINK
;
1863 fflags
|= NOTE_DELETE
|NOTE_RENAME
|NOTE_REVOKE
;
1866 wp
->fd
= _fd(open(wp
->name
, O_EVTONLY
|O_NOCTTY
|O_NOFOLLOW
));
1869 return job_log_error(j
, LOG_ERR
, "Watchpath monitoring failed on \"%s\"", wp
->name
);
1871 job_log(j
, LOG_DEBUG
, "Watching Vnode: %d", wp
->fd
);
1872 launchd_assumes(kevent_mod(wp
->fd
, EVFILT_VNODE
, EV_ADD
|EV_CLEAR
, fflags
, 0, j
) != -1);
1877 if (-1 == (qdir_file_cnt
= dir_has_files(wp
->name
))) {
1878 job_log_error(j
, LOG_ERR
, "dir_has_files(\"%s\", ...)", wp
->name
);
1879 } else if (qdir_file_cnt
> 0) {
1885 watchpath_callback(struct jobcb
*j
, struct kevent
*kev
)
1887 struct watchpath
*wp
;
1890 SLIST_FOREACH(wp
, &j
->vnodes
, sle
) {
1891 if (wp
->fd
== (int)kev
->ident
)
1895 launchd_assumes(wp
!= NULL
);
1897 if ((NOTE_DELETE
|NOTE_RENAME
|NOTE_REVOKE
) & kev
->fflags
) {
1898 job_log(j
, LOG_DEBUG
, "Path invalidated: %s", wp
->name
);
1899 launchd_assumes(close(wp
->fd
) == 0);
1900 wp
->fd
= -1; /* this will get fixed in watchpath_watch() */
1901 } else if (!wp
->is_qdir
) {
1902 job_log(j
, LOG_DEBUG
, "Watch path modified: %s", wp
->name
);
1904 job_log(j
, LOG_DEBUG
, "Queue directory modified: %s", wp
->name
);
1906 if (-1 == (dir_file_cnt
= dir_has_files(wp
->name
))) {
1907 job_log_error(j
, LOG_ERR
, "dir_has_files(\"%s\", ...)", wp
->name
);
1908 } else if (0 == dir_file_cnt
) {
1909 job_log(j
, LOG_DEBUG
, "Spurious wake up, directory is empty again: %s", wp
->name
);
1918 calendarinterval_new_from_obj(struct jobcb
*j
, launch_data_t obj
)
1920 launch_data_t tmp_k
;
1923 memset(&tmptm
, 0, sizeof(0));
1931 if (LAUNCH_DATA_DICTIONARY
!= launch_data_get_type(obj
))
1934 if ((tmp_k
= launch_data_dict_lookup(obj
, LAUNCH_JOBKEY_CAL_MINUTE
)))
1935 tmptm
.tm_min
= launch_data_get_integer(tmp_k
);
1936 if ((tmp_k
= launch_data_dict_lookup(obj
, LAUNCH_JOBKEY_CAL_HOUR
)))
1937 tmptm
.tm_hour
= launch_data_get_integer(tmp_k
);
1938 if ((tmp_k
= launch_data_dict_lookup(obj
, LAUNCH_JOBKEY_CAL_DAY
)))
1939 tmptm
.tm_mday
= launch_data_get_integer(tmp_k
);
1940 if ((tmp_k
= launch_data_dict_lookup(obj
, LAUNCH_JOBKEY_CAL_WEEKDAY
)))
1941 tmptm
.tm_wday
= launch_data_get_integer(tmp_k
);
1942 if ((tmp_k
= launch_data_dict_lookup(obj
, LAUNCH_JOBKEY_CAL_MONTH
)))
1943 tmptm
.tm_mon
= launch_data_get_integer(tmp_k
);
1945 return calendarinterval_new(j
, &tmptm
);
1949 calendarinterval_new(struct jobcb
*j
, struct tm
*w
)
1951 struct calendarinterval
*ci
= calloc(1, sizeof(struct calendarinterval
));
1953 if (!launchd_assumes(ci
!= NULL
))
1958 SLIST_INSERT_HEAD(&j
->cal_intervals
, ci
, sle
);
1960 calendarinterval_setalarm(j
, ci
);
1966 calendarinterval_delete(struct jobcb
*j
, struct calendarinterval
*ci
)
1968 launchd_assumes(kevent_mod((uintptr_t)ci
, EVFILT_TIMER
, EV_DELETE
, 0, 0, NULL
) != -1);
1970 SLIST_REMOVE(&j
->cal_intervals
, ci
, calendarinterval
, sle
);
1976 calendarinterval_callback(struct jobcb
*j
, struct kevent
*kev
)
1978 struct calendarinterval
*ci
;
1980 SLIST_FOREACH(ci
, &j
->cal_intervals
, sle
) {
1981 if ((uintptr_t)ci
== kev
->ident
)
1985 if (launchd_assumes(ci
!= NULL
)) {
1986 calendarinterval_setalarm(j
, ci
);
1992 socketgroup_new(struct jobcb
*j
, const char *name
, int *fds
, unsigned int fd_cnt
, bool junkfds
)
1994 struct socketgroup
*sg
= calloc(1, sizeof(struct socketgroup
) + strlen(name
) + 1);
1996 if (!launchd_assumes(sg
!= NULL
))
1999 sg
->fds
= calloc(1, fd_cnt
* sizeof(int));
2000 sg
->fd_cnt
= fd_cnt
;
2001 sg
->junkfds
= junkfds
;
2003 if (!launchd_assumes(sg
->fds
!= NULL
)) {
2008 memcpy(sg
->fds
, fds
, fd_cnt
* sizeof(int));
2009 strcpy(sg
->name
, name
);
2011 SLIST_INSERT_HEAD(&j
->sockets
, sg
, sle
);
2017 socketgroup_delete(struct jobcb
*j
, struct socketgroup
*sg
)
2021 for (i
= 0; i
< sg
->fd_cnt
; i
++)
2022 launchd_assumes(close(sg
->fds
[i
]) != -1);
2024 SLIST_REMOVE(&j
->sockets
, sg
, socketgroup
, sle
);
2031 socketgroup_ignore(struct jobcb
*j
, struct socketgroup
*sg
)
2034 unsigned int i
, buf_off
= 0;
2039 for (i
= 0; i
< sg
->fd_cnt
; i
++)
2040 buf_off
+= sprintf(buf
+ buf_off
, " %d", sg
->fds
[i
]);
2042 job_log(j
, LOG_DEBUG
, "Ignoring Sockets:%s", buf
);
2044 for (i
= 0; i
< sg
->fd_cnt
; i
++)
2045 launchd_assumes(kevent_mod(sg
->fds
[i
], EVFILT_READ
, EV_DELETE
, 0, 0, NULL
) != -1);
2049 socketgroup_watch(struct jobcb
*j
, struct socketgroup
*sg
)
2052 unsigned int i
, buf_off
= 0;
2057 for (i
= 0; i
< sg
->fd_cnt
; i
++)
2058 buf_off
+= sprintf(buf
+ buf_off
, " %d", sg
->fds
[i
]);
2060 job_log(j
, LOG_DEBUG
, "Watching sockets:%s", buf
);
2062 for (i
= 0; i
< sg
->fd_cnt
; i
++)
2063 launchd_assumes(kevent_mod(sg
->fds
[i
], EVFILT_READ
, EV_ADD
, 0, 0, j
) != -1);
2067 socketgroup_callback(struct jobcb
*j
, struct kevent
*kev
)
2073 envitem_new(struct jobcb
*j
, const char *k
, const char *v
, bool global
)
2075 struct envitem
*ei
= calloc(1, sizeof(struct envitem
) + strlen(k
) + 1 + strlen(v
) + 1);
2077 if (!launchd_assumes(ei
!= NULL
))
2081 ei
->value
= ei
->key
+ strlen(k
) + 1;
2082 strcpy(ei
->value
, v
);
2085 SLIST_INSERT_HEAD(&j
->global_env
, ei
, sle
);
2087 SLIST_INSERT_HEAD(&j
->env
, ei
, sle
);
2094 envitem_delete(struct jobcb
*j
, struct envitem
*ei
, bool global
)
2097 SLIST_REMOVE(&j
->global_env
, ei
, envitem
, sle
);
2099 SLIST_REMOVE(&j
->env
, ei
, envitem
, sle
);
2106 envitem_setup(launch_data_t obj
, const char *key
, void *context
)
2108 struct jobcb
*j
= context
;
2110 if (launch_data_get_type(obj
) != LAUNCH_DATA_STRING
)
2113 envitem_new(j
, key
, launch_data_get_string(obj
), j
->importing_global_env
);
2117 limititem_update(struct jobcb
*j
, int w
, rlim_t r
)
2119 struct limititem
*li
;
2121 SLIST_FOREACH(li
, &j
->limits
, sle
) {
2127 li
= calloc(1, sizeof(struct limititem
));
2129 if (!launchd_assumes(li
!= NULL
))
2135 if (j
->importing_hard_limits
) {
2136 li
->lim
.rlim_max
= r
;
2139 li
->lim
.rlim_cur
= r
;
2147 limititem_delete(struct jobcb
*j
, struct limititem
*li
)
2149 SLIST_REMOVE(&j
->limits
, li
, limititem
, sle
);
2155 limititem_setup(launch_data_t obj
, const char *key
, void *context
)
2157 struct jobcb
*j
= context
;
2158 int i
, limits_cnt
= (sizeof(launchd_keys2limits
) / sizeof(launchd_keys2limits
[0]));
2161 if (launch_data_get_type(obj
) != LAUNCH_DATA_INTEGER
)
2164 rl
= launch_data_get_integer(obj
);
2166 for (i
= 0; i
< limits_cnt
; i
++) {
2167 if (strcasecmp(launchd_keys2limits
[i
].key
, key
) == 0)
2171 if (i
== limits_cnt
)
2174 limititem_update(j
, launchd_keys2limits
[i
].val
, rl
);
2178 job_useless(struct jobcb
*j
)
2180 if (j
->unload_at_exit
) {
2181 job_log(j
, LOG_INFO
, "Exited. Was only configured to run once.");
2183 } else if (shutdown_in_progress
) {
2184 job_log(j
, LOG_INFO
, "Exited while shutdown in progress.");
2186 } else if (j
->failed_exits
>= LAUNCHD_FAILED_EXITS_THRESHOLD
) {
2187 job_log(j
, LOG_WARNING
, "too many failures in succession");
2189 } else if (!j
->checkedin
&& (!SLIST_EMPTY(&j
->sockets
) || !SLIST_EMPTY(&j
->machservices
))) {
2190 job_log(j
, LOG_WARNING
, "Failed to check-in!");
2192 } else if (j
->legacy_mach_job
&& SLIST_EMPTY(&j
->machservices
)) {
2193 job_log(j
, LOG_INFO
, "Garbage collecting");
2201 job_keepalive(struct jobcb
*j
)
2203 mach_msg_type_number_t statusCnt
;
2204 mach_port_status_t status
;
2205 struct semaphoreitem
*si
;
2206 struct machservice
*ms
;
2208 bool good_exit
= (WIFEXITED(j
->last_exit_status
) && WEXITSTATUS(j
->last_exit_status
) == 0);
2209 bool dispatch_others
= false;
2211 if (j
->runatload
&& j
->start_time
== 0) {
2212 job_log(j
, LOG_DEBUG
, "KeepAlive check: job needs to run at least once.");
2217 job_log(j
, LOG_DEBUG
, "KeepAlive check: job configured to run continuously.");
2221 SLIST_FOREACH(ms
, &j
->machservices
, sle
) {
2222 statusCnt
= MACH_PORT_RECEIVE_STATUS_COUNT
;
2223 if (mach_port_get_attributes(mach_task_self(), ms
->port
, MACH_PORT_RECEIVE_STATUS
,
2224 (mach_port_info_t
)&status
, &statusCnt
) != KERN_SUCCESS
)
2226 if (status
.mps_msgcount
) {
2227 job_log(j
, LOG_DEBUG
, "KeepAlive check: job restarted due to %d queued Mach messages on service: %s",
2228 status
.mps_msgcount
, ms
->name
);
2234 SLIST_FOREACH(si
, &j
->semaphores
, sle
) {
2235 bool wanted_state
= false;
2238 wanted_state
= true;
2240 if (network_up
== wanted_state
) {
2241 job_log(j
, LOG_DEBUG
, "KeepAlive check: job configured to run while the network is %s.",
2242 wanted_state
? "up" : "down");
2246 case SUCCESSFUL_EXIT
:
2247 wanted_state
= true;
2249 if (good_exit
== wanted_state
) {
2250 job_log(j
, LOG_DEBUG
, "KeepAlive check: job configured to run while the exit state was %s.",
2251 wanted_state
? "successful" : "failure");
2256 wanted_state
= true;
2258 if ((bool)(stat(si
->what
, &sb
) == 0) == wanted_state
) {
2259 job_log(j
, LOG_DEBUG
, "KeepAlive check: job configured to run while the following path %s: %s",
2260 wanted_state
? "exists" : "is missing", si
->what
);
2263 dispatch_others
= true;
2268 /* Maybe another job has the inverse path based semaphore as this job */
2269 if (dispatch_others
)
2270 job_dispatch_all_other_semaphores(root_job
, j
);
2276 job_prog(struct jobcb
*j
)
2280 } else if (j
->argv
) {
2288 job_active(struct jobcb
*j
)
2290 struct machservice
*ms
;
2298 if (j
->priv_port_has_senders
) {
2299 if (j
->start_time
&& !j
->checkedin
) {
2300 if (j
->legacy_mach_job
) {
2301 job_log(j
, LOG_NOTICE
, "Daemonized. Extremely expensive no-op.");
2302 } else if (!j
->unload_at_exit
) {
2303 job_log(j
, LOG_ERR
, "Daemonization is not supported under launchd.");
2310 SLIST_FOREACH(ms
, &j
->machservices
, sle
) {
2321 return job_fork(root_job
);
2325 job_fork(struct jobcb
*j
)
2327 mach_port_t p
= j
->bs_port
;
2330 sigprocmask(SIG_BLOCK
, &blocked_signals
, NULL
);
2332 launchd_assumes(launchd_mport_make_send(p
) == KERN_SUCCESS
);
2333 launchd_assumes(launchd_set_bport(p
) == KERN_SUCCESS
);
2334 launchd_assumes(launchd_mport_deallocate(p
) == KERN_SUCCESS
);
2339 launchd_assumes(launchd_set_bport(MACH_PORT_NULL
) == KERN_SUCCESS
);
2340 } else if (r
== 0) {
2343 for (i
= 0; i
< NSIG
; i
++) {
2344 if (sigismember(&blocked_signals
, i
))
2349 sigprocmask(SIG_UNBLOCK
, &blocked_signals
, NULL
);
2355 machservice_resetport(struct jobcb
*j
, struct machservice
*ms
)
2357 launchd_assumes(launchd_mport_close_recv(ms
->port
) == KERN_SUCCESS
);
2358 launchd_assumes(launchd_mport_deallocate(ms
->port
) == KERN_SUCCESS
);
2359 launchd_assumes(launchd_mport_create_recv(&ms
->port
) == KERN_SUCCESS
);
2360 launchd_assumes(launchd_mport_make_send(ms
->port
) == KERN_SUCCESS
);
2363 struct machservice
*
2364 machservice_new(struct jobcb
*j
, const char *name
, mach_port_t
*serviceport
)
2366 struct machservice
*ms
;
2368 if ((ms
= calloc(1, sizeof(struct machservice
) + strlen(name
) + 1)) == NULL
)
2371 strcpy(ms
->name
, name
);
2374 if (*serviceport
== MACH_PORT_NULL
) {
2375 if (!launchd_assumes(launchd_mport_create_recv(&ms
->port
) == KERN_SUCCESS
))
2378 if (!launchd_assumes(launchd_mport_make_send(ms
->port
) == KERN_SUCCESS
))
2380 *serviceport
= ms
->port
;
2381 ms
->isActive
= false;
2384 ms
->port
= *serviceport
;
2385 ms
->isActive
= true;
2388 SLIST_INSERT_HEAD(&j
->machservices
, ms
, sle
);
2390 job_log(j
, LOG_INFO
, "Mach service added: %s", name
);
2394 launchd_assumes(launchd_mport_close_recv(ms
->port
) == KERN_SUCCESS
);
2401 machservice_status(struct machservice
*ms
)
2404 return BOOTSTRAP_STATUS_ACTIVE
;
2405 } else if (ms
->job
->ondemand
) {
2406 return BOOTSTRAP_STATUS_ON_DEMAND
;
2408 return BOOTSTRAP_STATUS_INACTIVE
;
2413 machservice_setup_options(launch_data_t obj
, const char *key
, void *context
)
2415 struct machservice
*ms
= context
;
2416 mach_port_t mhp
= mach_host_self();
2417 mach_port_t mts
= mach_task_self();
2418 thread_state_flavor_t f
= 0;
2422 #if defined (__ppc__)
2423 f
= PPC_THREAD_STATE64
;
2424 #elif defined(__i386__)
2425 f
= x86_THREAD_STATE
;
2428 if (!launchd_assumes(mhp
!= MACH_PORT_NULL
)) {
2432 switch (launch_data_get_type(obj
)) {
2433 case LAUNCH_DATA_INTEGER
:
2434 which_port
= launch_data_get_integer(obj
);
2435 if (strcasecmp(key
, LAUNCH_JOBKEY_MACH_TASKSPECIALPORT
) == 0) {
2436 launchd_assumes((errno
= task_set_special_port(mts
, which_port
, ms
->port
)) == KERN_SUCCESS
);
2437 } else if (strcasecmp(key
, LAUNCH_JOBKEY_MACH_HOSTSPECIALPORT
) == 0 && getpid() == 1) {
2438 launchd_assumes((errno
= host_set_special_port(mhp
, which_port
, ms
->port
)) == KERN_SUCCESS
);
2440 case LAUNCH_DATA_BOOL
:
2441 b
= launch_data_get_bool(obj
);
2442 if (strcasecmp(key
, LAUNCH_JOBKEY_MACH_RESETATCLOSE
) == 0) {
2444 } else if (strcasecmp(key
, LAUNCH_JOBKEY_MACH_HIDEUNTILCHECKIN
) == 0) {
2446 } else if (strcasecmp(key
, LAUNCH_JOBKEY_MACH_EXCEPTIONSERVER
) == 0) {
2447 launchd_assumes(task_set_exception_ports(mts
, EXC_MASK_ALL
, ms
->port
,
2448 EXCEPTION_STATE_IDENTITY
, f
) == KERN_SUCCESS
);
2449 } else if (strcasecmp(key
, LAUNCH_JOBKEY_MACH_KUNCSERVER
) == 0) {
2451 launchd_assumes(host_set_UNDServer(mhp
, ms
->port
) == KERN_SUCCESS
);
2458 launchd_assumes(launchd_mport_deallocate(mhp
) == KERN_SUCCESS
);
2462 machservice_setup(launch_data_t obj
, const char *key
, void *context
)
2464 struct jobcb
*j
= context
;
2465 struct machservice
*ms
;
2466 mach_port_t p
= MACH_PORT_NULL
;
2468 if ((ms
= job_lookup_service(j
->parent
, key
, false))) {
2469 job_log(j
, LOG_WARNING
, "Conflict with job: %s over Mach service: %s", ms
->job
->label
, key
);
2473 if ((ms
= machservice_new(j
, key
, &p
)) == NULL
) {
2474 job_log_error(j
, LOG_WARNING
, "Cannot add service: %s", key
);
2478 ms
->isActive
= false;
2480 if (launch_data_get_type(obj
) == LAUNCH_DATA_DICTIONARY
) {
2481 launch_data_dict_iterate(obj
, machservice_setup_options
, ms
);
2486 job_parent(struct jobcb
*j
)
2492 job_uncork_fork(struct jobcb
*j
)
2496 if (j
->stall_before_exec
) {
2497 job_log(j
, LOG_DEBUG
, "Uncorking the fork().");
2498 /* this unblocks the child and avoids a race
2499 * between the above fork() and the kevent_mod() */
2500 write(j
->execfd
, &c
, sizeof(c
));
2501 j
->stall_before_exec
= false;
2503 job_log(j
, LOG_WARNING
, "Attempt to uncork a job that isn't in the middle of a fork().");
2508 job_foreach_service(struct jobcb
*j
, void (*bs_iter
)(struct machservice
*, void *), void *context
, bool include_subjobs
)
2510 struct machservice
*ms
;
2515 if (include_subjobs
) {
2516 SLIST_FOREACH(ji
, &j
->jobs
, sle
) {
2520 SLIST_FOREACH(ms
, &ji
->machservices
, sle
)
2521 bs_iter(ms
, context
);
2525 SLIST_FOREACH(ms
, &j
->machservices
, sle
)
2526 bs_iter(ms
, context
);
2530 job_new_bootstrap(struct jobcb
*p
, mach_port_t requestorport
, mach_port_t checkin_port
)
2532 char bslabel
[1024] = "100000";
2535 if (requestorport
== MACH_PORT_NULL
) {
2537 job_log(p
, LOG_ERR
, "Mach sub-bootstrap create request requires a requester port");
2542 j
= job_new(p
, bslabel
, NULL
, NULL
, NULL
, requestorport
);
2547 if (checkin_port
!= MACH_PORT_NULL
) {
2548 j
->bs_port
= checkin_port
;
2549 } else if (!launchd_assumes(launchd_mport_create_recv(&j
->bs_port
) == KERN_SUCCESS
)) {
2553 sprintf(j
->label
, "%d", MACH_PORT_INDEX(j
->bs_port
));
2555 if (!launchd_assumes(launchd_mport_request_callback(j
->bs_port
, j
, true) == KERN_SUCCESS
))
2559 job_log(p
, LOG_DEBUG
, "Mach sub-bootstrap created: %s", j
->label
);
2571 job_delete_anything_with_port(struct jobcb
*j
, mach_port_t port
)
2573 struct machservice
*ms
, *next_ms
;
2574 struct jobcb
*ji
, *jn
;
2576 /* Mach ports, unlike Unix descriptors, are reference counted. In other
2577 * words, when some program hands us a second or subsequent send right
2578 * to a port we already have open, the Mach kernel gives us the same
2579 * port number back and increments an reference count associated with
2580 * the port. This forces us, when discovering that a receive right at
2581 * the other end has been deleted, to wander all of our objects to see
2582 * what weird places clients might have handed us the same send right
2586 if (j
->req_port
== port
)
2587 return job_remove(j
);
2589 SLIST_FOREACH_SAFE(ji
, &j
->jobs
, sle
, jn
)
2590 job_delete_anything_with_port(ji
, port
);
2592 SLIST_FOREACH_SAFE(ms
, &j
->machservices
, sle
, next_ms
) {
2593 if (ms
->port
== port
)
2594 machservice_delete(ms
);
2598 struct machservice
*
2599 job_lookup_service(struct jobcb
*j
, const char *name
, bool check_parent
)
2601 struct machservice
*ms
;
2606 SLIST_FOREACH(ji
, &j
->jobs
, sle
) {
2610 SLIST_FOREACH(ms
, &ji
->machservices
, sle
) {
2611 if (strcmp(name
, ms
->name
) == 0)
2616 SLIST_FOREACH(ms
, &j
->machservices
, sle
) {
2617 if (strcmp(name
, ms
->name
) == 0)
2621 if (j
->parent
== NULL
)
2627 return job_lookup_service(j
->parent
, name
, true);
2631 machservice_port(struct machservice
*ms
)
2637 machservice_job(struct machservice
*ms
)
2643 machservice_hidden(struct machservice
*ms
)
2649 machservice_active(struct machservice
*ms
)
2651 return ms
->isActive
;
2655 machservice_name(struct machservice
*ms
)
2661 machservice_delete(struct machservice
*ms
)
2665 /* FIXME we should cancel the notification */
2667 launchd_assumes(launchd_mport_close_recv(ms
->port
) == KERN_SUCCESS
);
2671 launchd_assumes(launchd_mport_deallocate(ms
->port
) == KERN_SUCCESS
);
2673 job_log(ms
->job
, LOG_INFO
, "Mach service deleted: %s", ms
->name
);
2675 SLIST_REMOVE(&ms
->job
->machservices
, ms
, machservice
, sle
);
2681 machservice_watch(struct machservice
*ms
)
2683 mach_msg_id_t which
= MACH_NOTIFY_DEAD_NAME
;
2685 ms
->isActive
= true;
2687 if (ms
->job
->req_port
== MACH_PORT_NULL
) {
2688 which
= MACH_NOTIFY_PORT_DESTROYED
;
2689 job_checkin(ms
->job
);
2692 launchd_assumes(launchd_mport_notify_req(ms
->port
, which
) == KERN_SUCCESS
);
2695 #define NELEM(x) (sizeof(x)/sizeof(x[0]))
2696 #define END_OF(x) (&(x)[NELEM(x)])
2699 mach_cmd2argv(const char *string
)
2701 char *argv
[100], args
[1000];
2703 char *argp
= args
, term
, **argv_ret
, *co
;
2704 unsigned int nargs
= 0, i
;
2706 for (cp
= string
; *cp
;) {
2707 while (isspace(*cp
))
2709 term
= (*cp
== '"') ? *cp
++ : '\0';
2710 if (nargs
< NELEM(argv
))
2711 argv
[nargs
++] = argp
;
2712 while (*cp
&& (term
? *cp
!= term
: !isspace(*cp
)) && argp
< END_OF(args
)) {
2726 argv_ret
= malloc((nargs
+ 1) * sizeof(char *) + strlen(string
) + 1);
2728 if (!launchd_assumes(argv_ret
!= NULL
))
2731 co
= (char *)argv_ret
+ (nargs
+ 1) * sizeof(char *);
2733 for (i
= 0; i
< nargs
; i
++) {
2734 strcpy(co
, argv
[i
]);
2736 co
+= strlen(argv
[i
]) + 1;
2744 job_checkin(struct jobcb
*j
)
2746 j
->checkedin
= true;
2750 job_ack_port_destruction(struct jobcb
*j
, mach_port_t p
)
2753 struct machservice
*ms
;
2755 SLIST_FOREACH(ji
, &j
->jobs
, sle
) {
2756 if (job_ack_port_destruction(ji
, p
))
2760 SLIST_FOREACH(ms
, &j
->machservices
, sle
) {
2768 ms
->isActive
= false;
2771 machservice_resetport(j
, ms
);
2773 job_log(j
, LOG_DEBUG
, "Receive right returned to us: %s", ms
->name
);
2781 job_ack_no_senders(struct jobcb
*j
)
2783 j
->priv_port_has_senders
= false;
2785 job_log(j
, LOG_DEBUG
, "No more senders on privileged Mach bootstrap port");
2791 job_get_reqport(struct jobcb
*j
)
2793 j
->transfer_bstrap
= true;
2800 job_get_bsport(struct jobcb
*j
)
2806 job_get_bs(struct jobcb
*j
)
2811 if (launchd_assumes(j
->parent
!= NULL
))
2818 job_get_pid(struct jobcb
*j
)
2824 semaphoreitem_new(struct jobcb
*j
, semaphore_reason_t why
, const char *what
)
2826 struct semaphoreitem
*si
;
2827 size_t alloc_sz
= sizeof(struct semaphoreitem
);
2830 alloc_sz
+= strlen(what
) + 1;
2832 if (!launchd_assumes(si
= calloc(1, alloc_sz
)))
2838 strcpy(si
->what
, what
);
2840 SLIST_INSERT_HEAD(&j
->semaphores
, si
, sle
);
2846 semaphoreitem_delete(struct jobcb
*j
, struct semaphoreitem
*ri
)
2848 SLIST_REMOVE(&j
->semaphores
, ri
, semaphoreitem
, sle
);
2854 semaphoreitem_setup_paths(launch_data_t obj
, const char *key
, void *context
)
2856 struct jobcb
*j
= context
;
2857 semaphore_reason_t why
;
2859 why
= launch_data_get_bool(obj
) ? PATH_EXISTS
: PATH_MISSING
;
2861 semaphoreitem_new(j
, why
, key
);
2865 semaphoreitem_setup(launch_data_t obj
, const char *key
, void *context
)
2867 struct jobcb
*j
= context
;
2868 semaphore_reason_t why
;
2870 if (strcasecmp(key
, LAUNCH_JOBKEY_KEEPALIVE_NETWORKSTATE
) == 0) {
2871 why
= launch_data_get_bool(obj
) ? NETWORK_UP
: NETWORK_DOWN
;
2872 semaphoreitem_new(j
, why
, NULL
);
2873 } else if (strcasecmp(key
, LAUNCH_JOBKEY_KEEPALIVE_SUCCESSFULEXIT
) == 0) {
2874 why
= launch_data_get_bool(obj
) ? SUCCESSFUL_EXIT
: FAILED_EXIT
;
2875 semaphoreitem_new(j
, why
, NULL
);
2876 j
->runatload
= true;
2877 } else if (strcasecmp(key
, LAUNCH_JOBKEY_KEEPALIVE_PATHSTATE
) == 0 &&
2878 launch_data_get_type(obj
) == LAUNCH_DATA_DICTIONARY
) {
2879 launch_data_dict_iterate(obj
, semaphoreitem_setup_paths
, j
);
2884 job_dispatch_all_other_semaphores(struct jobcb
*j
, struct jobcb
*nj
)
2891 if (!SLIST_EMPTY(&j
->semaphores
))
2894 SLIST_FOREACH(ji
, &j
->jobs
, sle
)
2895 job_dispatch_all_other_semaphores(ji
, nj
);
2899 cronemu(int mon
, int mday
, int hour
, int min
)
2901 struct tm workingtm
;
2905 workingtm
= *localtime(&now
);
2907 workingtm
.tm_isdst
= -1;
2908 workingtm
.tm_sec
= 0;
2911 while (!cronemu_mon(&workingtm
, mon
, mday
, hour
, min
)) {
2912 workingtm
.tm_year
++;
2913 workingtm
.tm_mon
= 0;
2914 workingtm
.tm_mday
= 1;
2915 workingtm
.tm_hour
= 0;
2916 workingtm
.tm_min
= 0;
2920 return mktime(&workingtm
);
2924 cronemu_wday(int wday
, int hour
, int min
)
2926 struct tm workingtm
;
2930 workingtm
= *localtime(&now
);
2932 workingtm
.tm_isdst
= -1;
2933 workingtm
.tm_sec
= 0;
2939 while (!(workingtm
.tm_wday
== wday
&& cronemu_hour(&workingtm
, hour
, min
))) {
2940 workingtm
.tm_mday
++;
2941 workingtm
.tm_hour
= 0;
2942 workingtm
.tm_min
= 0;
2946 return mktime(&workingtm
);
2950 cronemu_mon(struct tm
*wtm
, int mon
, int mday
, int hour
, int min
)
2953 struct tm workingtm
= *wtm
;
2956 while (!cronemu_mday(&workingtm
, mday
, hour
, min
)) {
2958 workingtm
.tm_mday
= 1;
2959 workingtm
.tm_hour
= 0;
2960 workingtm
.tm_min
= 0;
2961 carrytest
= workingtm
.tm_mon
;
2963 if (carrytest
!= workingtm
.tm_mon
)
2970 if (mon
< wtm
->tm_mon
)
2973 if (mon
> wtm
->tm_mon
) {
2980 return cronemu_mday(wtm
, mday
, hour
, min
);
2984 cronemu_mday(struct tm
*wtm
, int mday
, int hour
, int min
)
2987 struct tm workingtm
= *wtm
;
2990 while (!cronemu_hour(&workingtm
, hour
, min
)) {
2991 workingtm
.tm_mday
++;
2992 workingtm
.tm_hour
= 0;
2993 workingtm
.tm_min
= 0;
2994 carrytest
= workingtm
.tm_mday
;
2996 if (carrytest
!= workingtm
.tm_mday
)
3003 if (mday
< wtm
->tm_mday
)
3006 if (mday
> wtm
->tm_mday
) {
3007 wtm
->tm_mday
= mday
;
3012 return cronemu_hour(wtm
, hour
, min
);
3016 cronemu_hour(struct tm
*wtm
, int hour
, int min
)
3019 struct tm workingtm
= *wtm
;
3022 while (!cronemu_min(&workingtm
, min
)) {
3023 workingtm
.tm_hour
++;
3024 workingtm
.tm_min
= 0;
3025 carrytest
= workingtm
.tm_hour
;
3027 if (carrytest
!= workingtm
.tm_hour
)
3034 if (hour
< wtm
->tm_hour
)
3037 if (hour
> wtm
->tm_hour
) {
3038 wtm
->tm_hour
= hour
;
3042 return cronemu_min(wtm
, min
);
3046 cronemu_min(struct tm
*wtm
, int min
)
3051 if (min
< wtm
->tm_min
)
3054 if (min
> wtm
->tm_min
) {