]> git.saurik.com Git - apple/launchd.git/blob - launchd/src/init.c
83be58af836a3780af82e74d234ff54debc0024f
[apple/launchd.git] / launchd / src / init.c
1 /*
2 * Copyright (c) 1999 Apple Computer, Inc. All rights reserved.
3 *
4 * @APPLE_APACHE_LICENSE_HEADER_START@
5 *
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
9 *
10 * http://www.apache.org/licenses/LICENSE-2.0
11 *
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
17 *
18 * @APPLE_APACHE_LICENSE_HEADER_END@
19 */
20 /*-
21 * Copyright (c) 1991, 1993
22 * The Regents of the University of California. All rights reserved.
23 *
24 * This code is derived from software contributed to Berkeley by
25 * Donn Seeley at Berkeley Software Design, Inc.
26 *
27 * Redistribution and use in source and binary forms, with or without
28 * modification, are permitted provided that the following conditions
29 * are met:
30 * 1. Redistributions of source code must retain the above copyright
31 * notice, this list of conditions and the following disclaimer.
32 * 2. Redistributions in binary form must reproduce the above copyright
33 * notice, this list of conditions and the following disclaimer in the
34 * documentation and/or other materials provided with the distribution.
35 * 3. All advertising materials mentioning features or use of this software
36 * must display the following acknowledgement:
37 * This product includes software developed by the University of
38 * California, Berkeley and its contributors.
39 * 4. Neither the name of the University nor the names of its contributors
40 * may be used to endorse or promote products derived from this software
41 * without specific prior written permission.
42 *
43 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
44 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
45 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
46 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
47 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
48 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
49 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
50 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
51 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
52 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * SUCH DAMAGE.
54 */
55
56 static const char *const __rcs_file_version__ = "$Revision: 1.38 $";
57
58 #include <Security/Authorization.h>
59 #include <Security/AuthorizationTags.h>
60 #include <Security/AuthSession.h>
61
62 #include <sys/types.h>
63 #include <sys/queue.h>
64 #include <sys/param.h>
65 #include <sys/mount.h>
66 #include <sys/sysctl.h>
67 #include <sys/wait.h>
68 #include <sys/time.h>
69 #include <sys/resource.h>
70
71 #include <errno.h>
72 #include <fcntl.h>
73 #include <signal.h>
74 #include <stdio.h>
75 #include <stdlib.h>
76 #include <stdarg.h>
77 #include <stdbool.h>
78 #include <string.h>
79 #include <syslog.h>
80 #include <time.h>
81 #include <ttyent.h>
82 #include <unistd.h>
83 #include <paths.h>
84 #include <util.h>
85 #include <libgen.h>
86 #include <paths.h>
87 #include <termios.h>
88
89 #include "launchd.h"
90
91 #define _PATH_RUNCOM "/etc/rc"
92
93 /*
94 * Sleep times; used to prevent thrashing.
95 */
96 #define GETTY_SPACING 5 /* N secs minimum getty spacing */
97 #define GETTY_SLEEP 30 /* sleep N secs after spacing problem */
98 #define STALL_TIMEOUT 30 /* wait N secs after warning */
99 #define DEATH_WATCH 10 /* wait N secs for procs to die */
100 #define FAILED_HW_PASS 5 /* wait N secs before croaking user */
101
102 static void stall(char *, ...);
103
104 static void single_user_callback(void *, struct kevent *);
105 static kq_callback kqsingle_user_callback = single_user_callback;
106 static void runcom_callback(void *, struct kevent *);
107 static kq_callback kqruncom_callback = runcom_callback;
108
109 static void single_user(void);
110 static void runcom(void);
111
112 static bool runcom_safe = false;
113 static bool runcom_netboot = false;
114 static bool single_user_mode = false;
115 static bool run_runcom = true;
116 static pid_t single_user_pid = 0;
117 static pid_t runcom_pid = 0;
118
119 static void setctty(const char *, int);
120
121 // gvdl@next.com 14 Aug 1995
122 // - from ~apps/loginwindow_proj/loginwindow/common.h
123 #define REALLY_EXIT_TO_CONSOLE 229
124
125 // From old init.c
126 // These flags are used in the se_flags field of the init_session structure
127 #define SE_SHUTDOWN 0x1 /* session won't be restarted */
128
129 // The flags below control what sort of getty is launched.
130 #define SE_GETTY_LAUNCH 0x30 /* What type of getty to launch */
131 #define SE_COMMON 0x00 /* Usual command that is run - getty */
132 #define SE_ONERROR 0x10 /* Command to run if error condition occurs.
133 * This will almost always be the windowserver
134 * and loginwindow. This is so if the w.s.
135 * ever dies, that the naive user (stan)
136 * doesn't ever see the console window. */
137 #define SE_ONOPTION 0x20 /* Command to run when loginwindow exits with
138 * special error code (229). This signifies
139 * that the user typed "console" at l.w. and
140 * l.w. wants to exit and have init run getty
141 * which will then put up a console window. */
142
143 typedef struct _se_command {
144 char *path; /* what to run on that port */
145 char **argv; /* pre-parsed argument array */
146 } se_cmd_t;
147
148 typedef struct init_session {
149 kq_callback se_callback; /* run loop callback */
150 int se_index; /* index of entry in ttys file */
151 pid_t se_process; /* controlling process */
152 time_t se_started; /* used to avoid thrashing */
153 int se_flags; /* status of session */
154 char *se_device; /* filename of port */
155 se_cmd_t se_getty; /* what to run on that port */
156 se_cmd_t se_onerror; /* See SE_ONERROR above */
157 se_cmd_t se_onoption; /* See SE_ONOPTION above */
158 TAILQ_ENTRY(init_session) tqe;
159 } *session_t;
160
161 static TAILQ_HEAD(sessionshead, init_session) sessions = TAILQ_HEAD_INITIALIZER(sessions);
162
163 static void session_new(int, struct ttyent *);
164 static void session_free(session_t);
165 static void session_launch(session_t);
166 static void session_reap(session_t);
167 static void session_callback(void *, struct kevent *);
168
169 static char **construct_argv(char *);
170 static void setsecuritylevel(int);
171 static int getsecuritylevel(void);
172 static int setupargv(session_t, struct ttyent *);
173 static bool should_fsck(void);
174
175 void
176 init_boot(bool sflag)
177 {
178 int nbmib[2] = { CTL_KERN, KERN_NETBOOT };
179 int sbmib[2] = { CTL_KERN, KERN_SAFEBOOT };
180 uint32_t v = 0;
181 size_t vsz = sizeof(v);
182
183 if (sflag) {
184 single_user_mode = true;
185 run_runcom = false;
186 }
187
188 if (launchd_assumes(sysctl(nbmib, 2, &v, &vsz, NULL, 0) != -1)) {
189 if (v != 0)
190 runcom_netboot = true;
191 }
192 if (launchd_assumes(sysctl(sbmib, 2, &v, &vsz, NULL, 0) != -1)) {
193 if (v != 0)
194 runcom_safe = true;
195 }
196
197 }
198
199 void
200 init_pre_kevent(void)
201 {
202 session_t s;
203
204 if (single_user_pid || runcom_pid)
205 return;
206
207 if (single_user_mode)
208 return single_user();
209
210 if (run_runcom)
211 return runcom();
212
213 /*
214 * If the administrator has not set the security level to -1
215 * to indicate that the kernel should not run multiuser in secure
216 * mode, and the run script has not set a higher level of security
217 * than level 1, then put the kernel into secure mode.
218 */
219 if (getsecuritylevel() == 0)
220 setsecuritylevel(1);
221
222 TAILQ_FOREACH(s, &sessions, tqe) {
223 if (s->se_process == 0)
224 session_launch(s);
225 }
226 }
227
228 static void
229 stall(char *message, ...)
230 {
231 va_list ap;
232 va_start(ap, message);
233
234 vsyslog(LOG_ALERT, message, ap);
235 va_end(ap);
236 sleep(STALL_TIMEOUT);
237 }
238
239 static int
240 getsecuritylevel(void)
241 {
242 int name[2], curlevel;
243 size_t len;
244
245 name[0] = CTL_KERN;
246 name[1] = KERN_SECURELVL;
247 len = sizeof (curlevel);
248 if (sysctl(name, 2, &curlevel, &len, NULL, 0) == -1) {
249 syslog(LOG_ALERT, "cannot get kernel security level: %m");
250 return -1;
251 }
252 return curlevel;
253 }
254
255 static void
256 setsecuritylevel(int newlevel)
257 {
258 int name[2], curlevel;
259
260 curlevel = getsecuritylevel();
261 if (newlevel == curlevel)
262 return;
263 name[0] = CTL_KERN;
264 name[1] = KERN_SECURELVL;
265 if (sysctl(name, 2, NULL, NULL, &newlevel, sizeof newlevel) == -1) {
266 syslog(LOG_ALERT, "cannot change kernel security level from %d to %d: %m",
267 curlevel, newlevel);
268 return;
269 }
270 syslog(LOG_INFO, "kernel security level changed from %d to %d",
271 curlevel, newlevel);
272 }
273
274 /*
275 * Start a session and allocate a controlling terminal.
276 * Only called by children of init after forking.
277 */
278 static void
279 setctty(const char *name, int flags)
280 {
281 int fd;
282
283 revoke(name);
284 if ((fd = open(name, flags | O_RDWR)) == -1) {
285 stall("can't open %s: %m", name);
286 exit(EXIT_FAILURE);
287 }
288 if (login_tty(fd) == -1) {
289 stall("can't get %s for controlling terminal: %m", name);
290 exit(EXIT_FAILURE);
291 }
292 }
293
294 static void
295 single_user(void)
296 {
297 bool runcom_fsck = should_fsck();
298 char *argv[2];
299
300 if (getsecuritylevel() > 0)
301 setsecuritylevel(0);
302
303 if ((single_user_pid = launchd_fork()) == -1) {
304 syslog(LOG_ERR, "can't fork single-user shell, trying again: %m");
305 return;
306 } else if (single_user_pid == 0) {
307 setctty(_PATH_CONSOLE, O_POPUP);
308
309 setenv("TERM", "vt100", 1);
310 setenv("SafeBoot", runcom_safe ? "-x" : "", 1);
311 setenv("VerboseFlag", "-v", 1); /* single user mode implies verbose mode */
312 setenv("FsckSlash", runcom_fsck ? "-F" : "", 1);
313 setenv("NetBoot", runcom_netboot ? "-N" : "", 1);
314
315 if (runcom_fsck) {
316 fprintf(stdout, "Singleuser boot -- fsck not done\n");
317 fprintf(stdout, "Root device is mounted read-only\n\n");
318 fprintf(stdout, "If you want to make modifications to files:\n");
319 fprintf(stdout, "\t/sbin/fsck -fy\n\t/sbin/mount -uw /\n\n");
320 fprintf(stdout, "If you wish to boot the system:\n");
321 fprintf(stdout, "\texit\n\n");
322 fflush(stdout);
323 }
324
325 argv[0] = "-sh";
326 argv[1] = NULL;
327 execv(_PATH_BSHELL, argv);
328 syslog(LOG_ERR, "can't exec %s for single user: %m", _PATH_BSHELL);
329 sleep(STALL_TIMEOUT);
330 exit(EXIT_FAILURE);
331 } else {
332 if (kevent_mod(single_user_pid, EVFILT_PROC, EV_ADD,
333 NOTE_EXIT, 0, &kqsingle_user_callback) == -1)
334 single_user_callback(NULL, NULL);
335 }
336 }
337
338 static void
339 single_user_callback(void *obj __attribute__((unused)), struct kevent *kev __attribute__((unused)))
340 {
341 int status;
342
343 if (!launchd_assumes(waitpid(single_user_pid, &status, 0) == single_user_pid))
344 return;
345
346 if (WIFEXITED(status) && WEXITSTATUS(status) == EXIT_SUCCESS) {
347 syslog(LOG_INFO, "single user shell terminated, restarting");
348 run_runcom = true;
349 single_user_mode = false;
350 } else {
351 syslog(LOG_INFO, "single user shell terminated.");
352 run_runcom = false;
353 if (WTERMSIG(status) != SIGKILL)
354 single_user_mode = true;
355 }
356
357 single_user_pid = 0;
358 }
359
360 static struct timeval runcom_start_tv = { 0, 0 };
361 /*
362 * Run the system startup script.
363 */
364 static void
365 runcom(void)
366 {
367 bool runcom_fsck = should_fsck();
368 char *argv[] = { "/bin/launchctl", "bootstrap", NULL };
369 struct termios term;
370 int vdisable;
371
372 gettimeofday(&runcom_start_tv, NULL);
373
374 if ((runcom_pid = launchd_fork()) == -1) {
375 syslog(LOG_ERR, "can't fork for %s on %s: %m", _PATH_BSHELL, _PATH_RUNCOM);
376 sleep(STALL_TIMEOUT);
377 runcom_pid = 0;
378 single_user_mode = true;
379 return;
380 } else if (runcom_pid > 0) {
381 run_runcom = false;
382 if (kevent_mod(runcom_pid, EVFILT_PROC, EV_ADD,
383 NOTE_EXIT, 0, &kqruncom_callback) == -1) {
384 runcom_callback(NULL, NULL);
385 }
386 return;
387 }
388
389 setctty(_PATH_CONSOLE, 0);
390
391 if ((vdisable = fpathconf(STDIN_FILENO, _PC_VDISABLE)) == -1) {
392 syslog(LOG_WARNING, "fpathconf(\"%s\") %m", _PATH_CONSOLE);
393 } else if (tcgetattr(STDIN_FILENO, &term) == -1) {
394 syslog(LOG_WARNING, "tcgetattr(\"%s\") %m", _PATH_CONSOLE);
395 } else {
396 term.c_cc[VINTR] = vdisable;
397 term.c_cc[VKILL] = vdisable;
398 term.c_cc[VQUIT] = vdisable;
399 term.c_cc[VSUSP] = vdisable;
400 term.c_cc[VSTART] = vdisable;
401 term.c_cc[VSTOP] = vdisable;
402 term.c_cc[VDSUSP] = vdisable;
403
404 if (tcsetattr(STDIN_FILENO, TCSAFLUSH, &term) == -1)
405 syslog(LOG_WARNING, "tcsetattr(\"%s\") %m", _PATH_CONSOLE);
406 }
407
408 setenv("SafeBoot", runcom_safe ? "-x" : "", 1);
409 setenv("FsckSlash", runcom_fsck ? "-F" : "", 1);
410 setenv("NetBoot", runcom_netboot ? "-N" : "", 1);
411
412 execv(argv[0], argv);
413 stall("can't exec %s for %s: %m", _PATH_BSHELL, _PATH_RUNCOM);
414 exit(EXIT_FAILURE);
415 }
416
417 static void
418 runcom_callback(void *obj __attribute__((unused)), struct kevent *kev __attribute__((unused)))
419 {
420 int status;
421 struct timeval runcom_end_tv, runcom_total_tv;
422 double sec;
423
424 gettimeofday(&runcom_end_tv, NULL);
425 timersub(&runcom_end_tv, &runcom_start_tv, &runcom_total_tv);
426 sec = runcom_total_tv.tv_sec;
427 sec += (double)runcom_total_tv.tv_usec / (double)1000000;
428 syslog(LOG_INFO, "%s finished in: %.3f seconds", _PATH_RUNCOM, sec);
429
430 if (launchd_assumes(waitpid(runcom_pid, &status, 0) == runcom_pid)) {
431 runcom_pid = 0;
432 } else {
433 syslog(LOG_ERR, "going to single user mode");
434 single_user_mode = true;
435 return;
436 }
437
438 if (WIFEXITED(status) && WEXITSTATUS(status) == EXIT_SUCCESS) {
439 logwtmp("~", "reboot", "");
440 return;
441 } else if (WIFSIGNALED(status) && (WTERMSIG(status) == SIGTERM || WTERMSIG(status) == SIGKILL)) {
442 return;
443 }
444
445 syslog(LOG_ERR, "%s on %s terminated abnormally, going to single user mode",
446 _PATH_BSHELL, _PATH_RUNCOM);
447 single_user_mode = true;
448 }
449
450 /*
451 * Construct an argument vector from a command line.
452 */
453 char **
454 construct_argv(command)
455 char *command;
456 {
457 int argc = 0;
458 char **argv = (char **) malloc(((strlen(command) + 1) / 2 + 1)
459 * sizeof (char *));
460 static const char separators[] = " \t";
461
462 if ((argv[argc++] = strtok(command, separators)) == 0)
463 return 0;
464 while ((argv[argc++] = strtok(NULL, separators)))
465 continue;
466 return argv;
467 }
468
469 /*
470 * Deallocate a session descriptor.
471 */
472
473 static void free_command(se_cmd_t *se_cmd)
474 {
475 if (se_cmd->path) {
476 free(se_cmd->path);
477 free(se_cmd->argv);
478 }
479 }
480
481 void
482 session_free(session_t s)
483 {
484 TAILQ_REMOVE(&sessions, s, tqe);
485 if (s->se_process) {
486 if (kevent_mod(s->se_process, EVFILT_PROC, EV_ADD,
487 NOTE_EXIT, 0, &kqsimple_zombie_reaper) == -1)
488 session_reap(s);
489 else
490 kill(s->se_process, SIGHUP);
491 }
492 free(s->se_device);
493 free_command(&s->se_getty);
494 free_command(&s->se_onerror);
495 free_command(&s->se_onoption);
496 free(s);
497 }
498
499 static int setup_command(se_cmd_t *se_cmd, char *command, char *arg )
500 {
501 char *commandWithArg;
502
503 asprintf(&commandWithArg, "%s %s", command, arg);
504
505 free_command(se_cmd);
506
507 se_cmd->path = commandWithArg;
508 se_cmd->argv = construct_argv(commandWithArg);
509 if (se_cmd->argv == NULL) {
510 free(se_cmd->path);
511 se_cmd->path = NULL;
512 return 0;
513 }
514 return 1;
515 }
516
517 /*
518 * Calculate getty and if useful window argv vectors.
519 */
520 static int
521 setupargv(sp, typ)
522 session_t sp;
523 struct ttyent *typ;
524 {
525 char *type;
526
527 if ( !setup_command(&sp->se_getty, typ->ty_getty, typ->ty_name) )
528 {
529 type = "getty";
530 goto bad_args;
531 }
532
533 if (typ->ty_onerror
534 && !setup_command(&sp->se_onerror, typ->ty_onerror, typ->ty_name) )
535 {
536 type = "onerror";
537 goto bad_args;
538 }
539
540 if (typ->ty_onoption
541 && !setup_command(&sp->se_onoption, typ->ty_onoption, typ->ty_name) )
542 {
543 type = "onoption";
544 goto bad_args;
545 }
546
547 return 1;
548
549 bad_args:
550 syslog(LOG_WARNING, "can't parse %s for port %s", type, sp->se_device);
551 return 0;
552 }
553
554
555 /*
556 * Allocate a new session descriptor.
557 */
558 void
559 session_new(session_index, typ)
560 int session_index;
561 struct ttyent *typ;
562 {
563 session_t s;
564
565 if ((typ->ty_status & TTY_ON) == 0 ||
566 typ->ty_name == 0 ||
567 typ->ty_getty == 0)
568 return;
569
570 s = calloc(1, sizeof(struct init_session));
571
572 s->se_callback = session_callback;
573 s->se_index = session_index;
574
575 TAILQ_INSERT_TAIL(&sessions, s, tqe);
576
577 asprintf(&s->se_device, "%s%s", _PATH_DEV, typ->ty_name);
578
579 if (setupargv(s, typ) == 0)
580 session_free(s);
581 }
582
583 static void
584 session_launch(session_t s)
585 {
586 pid_t pid;
587 sigset_t mask;
588 se_cmd_t *se_cmd;
589 const char *session_type = NULL;
590 time_t current_time = time(NULL);
591 bool is_loginwindow = false;
592
593 // Setup the default values;
594 switch (s->se_flags & SE_GETTY_LAUNCH) {
595 case SE_ONOPTION:
596 if (s->se_onoption.path) {
597 se_cmd = &s->se_onoption;
598 session_type = "onoption";
599 break;
600 }
601 /* No break */
602 case SE_ONERROR:
603 if (s->se_onerror.path) {
604 se_cmd = &s->se_onerror;
605 session_type = "onerror";
606 break;
607 }
608 /* No break */
609 case SE_COMMON:
610 default:
611 se_cmd = &s->se_getty;
612 session_type = "getty";
613 break;
614 }
615
616 if (strcmp(se_cmd->argv[0], "/System/Library/CoreServices/loginwindow.app/Contents/MacOS/loginwindow") == 0)
617 is_loginwindow = true;
618
619 pid = launchd_fork();
620
621 if (pid == -1) {
622 syslog(LOG_ERR, "can't fork for %s on port %s: %m",
623 session_type, s->se_device);
624 return;
625 }
626
627 if (pid) {
628 s->se_process = pid;
629 s->se_started = time(NULL);
630 s->se_flags &= ~SE_GETTY_LAUNCH; // clear down getty launch type
631 if (kevent_mod(pid, EVFILT_PROC, EV_ADD, NOTE_EXIT, 0, &s->se_callback) == -1)
632 session_reap(s);
633 return;
634 }
635
636 if (current_time > s->se_started &&
637 current_time - s->se_started < GETTY_SPACING) {
638 syslog(LOG_WARNING, "%s repeating too quickly on port %s, sleeping",
639 session_type, s->se_device);
640 sleep(GETTY_SLEEP);
641 }
642
643 sigemptyset(&mask);
644 sigprocmask(SIG_SETMASK, &mask, NULL);
645
646
647 if (!is_loginwindow)
648 launchd_SessionCreate();
649
650 execv(se_cmd->argv[0], se_cmd->argv);
651 stall("can't exec %s '%s' for port %s: %m", session_type,
652 se_cmd->argv[0], s->se_device);
653 exit(EXIT_FAILURE);
654 }
655
656 static void
657 session_callback(void *obj, struct kevent *kev __attribute__((unused)))
658 {
659 session_t s = obj;
660
661 session_reap(s);
662 if (s->se_flags & SE_SHUTDOWN) {
663 session_free(s);
664 } else {
665 session_launch(s);
666 }
667 }
668
669 static void
670 session_reap(session_t s)
671 {
672 char *line;
673 int status;
674
675 if (!launchd_assumes(waitpid(s->se_process, &status, 0) == s->se_process))
676 return;
677
678 if (WIFSIGNALED(status)) {
679 syslog(LOG_WARNING, "%s port %s exited abnormally: %s",
680 s->se_getty.path, s->se_device, strsignal(WTERMSIG(status)));
681 s->se_flags |= SE_ONERROR;
682 } else if (WEXITSTATUS(status) == REALLY_EXIT_TO_CONSOLE) {
683 /* WIFEXITED(status) assumed */
684 s->se_flags |= SE_ONOPTION;
685 } else {
686 s->se_flags |= SE_ONERROR;
687 }
688
689 s->se_process = 0;
690 line = s->se_device + sizeof(_PATH_DEV) - 1;
691
692 if (logout(line))
693 logwtmp(line, "", "");
694 }
695
696 /*
697 * This is an n-squared algorithm. We hope it isn't run often...
698 */
699 void
700 update_ttys(void)
701 {
702 session_t sp;
703 struct ttyent *typ;
704 int session_index = 0;
705 int devlen;
706
707 devlen = sizeof(_PATH_DEV) - 1;
708 while ((typ = getttyent())) {
709 ++session_index;
710
711 TAILQ_FOREACH(sp, &sessions, tqe) {
712 if (strcmp(typ->ty_name, sp->se_device + devlen) == 0)
713 break;
714 }
715
716 if (sp == NULL) {
717 session_new(session_index, typ);
718 continue;
719 }
720
721 if (sp->se_index != session_index) {
722 syslog(LOG_INFO, "port %s changed utmp index from %d to %d",
723 sp->se_device, sp->se_index,
724 session_index);
725 sp->se_index = session_index;
726 }
727
728 if ((typ->ty_status & TTY_ON) == 0 ||
729 typ->ty_getty == 0) {
730 session_free(sp);
731 continue;
732 }
733
734 sp->se_flags &= ~SE_SHUTDOWN;
735
736 if (setupargv(sp, typ) == 0) {
737 syslog(LOG_WARNING, "can't parse getty for port %s",
738 sp->se_device);
739 session_free(sp);
740 }
741 }
742
743 endttyent();
744 }
745
746 /*
747 * Block further logins.
748 */
749 void
750 catatonia(void)
751 {
752 session_t s;
753
754 TAILQ_FOREACH(s, &sessions, tqe)
755 s->se_flags |= SE_SHUTDOWN;
756 }
757
758 bool init_check_pid(pid_t p)
759 {
760 session_t s;
761
762 TAILQ_FOREACH(s, &sessions, tqe) {
763 if (s->se_process == p)
764 return true;
765 }
766
767 if (single_user_pid == p)
768 return true;
769
770 if (runcom_pid == p)
771 return true;
772
773 return false;
774 }
775
776 bool
777 should_fsck(void)
778 {
779 struct statfs sfs;
780 bool r = true;
781
782 if (launchd_assumes(statfs("/", &sfs) != -1)) {
783 if (!(sfs.f_flags & MNT_RDONLY)) {
784 r = false;
785 }
786 }
787
788 return r;
789 }