2 * Copyright (c) 1999 Apple Computer, Inc. All rights reserved.
4 * @APPLE_APACHE_LICENSE_HEADER_START@
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
18 * @APPLE_APACHE_LICENSE_HEADER_END@
21 * Copyright (c) 1991, 1993
22 * The Regents of the University of California. All rights reserved.
24 * This code is derived from software contributed to Berkeley by
25 * Donn Seeley at Berkeley Software Design, Inc.
27 * Redistribution and use in source and binary forms, with or without
28 * modification, are permitted provided that the following conditions
30 * 1. Redistributions of source code must retain the above copyright
31 * notice, this list of conditions and the following disclaimer.
32 * 2. Redistributions in binary form must reproduce the above copyright
33 * notice, this list of conditions and the following disclaimer in the
34 * documentation and/or other materials provided with the distribution.
35 * 3. All advertising materials mentioning features or use of this software
36 * must display the following acknowledgement:
37 * This product includes software developed by the University of
38 * California, Berkeley and its contributors.
39 * 4. Neither the name of the University nor the names of its contributors
40 * may be used to endorse or promote products derived from this software
41 * without specific prior written permission.
43 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
44 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
45 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
46 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
47 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
48 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
49 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
50 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
51 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
52 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
56 static const char *const __rcs_file_version__
= "$Revision: 1.38 $";
58 #include <Security/Authorization.h>
59 #include <Security/AuthorizationTags.h>
60 #include <Security/AuthSession.h>
62 #include <sys/types.h>
63 #include <sys/queue.h>
64 #include <sys/param.h>
65 #include <sys/mount.h>
66 #include <sys/sysctl.h>
69 #include <sys/resource.h>
91 #define _PATH_RUNCOM "/etc/rc"
94 * Sleep times; used to prevent thrashing.
96 #define GETTY_SPACING 5 /* N secs minimum getty spacing */
97 #define GETTY_SLEEP 30 /* sleep N secs after spacing problem */
98 #define STALL_TIMEOUT 30 /* wait N secs after warning */
99 #define DEATH_WATCH 10 /* wait N secs for procs to die */
100 #define FAILED_HW_PASS 5 /* wait N secs before croaking user */
102 static void stall(char *, ...);
104 static void single_user_callback(void *, struct kevent
*);
105 static kq_callback kqsingle_user_callback
= single_user_callback
;
106 static void runcom_callback(void *, struct kevent
*);
107 static kq_callback kqruncom_callback
= runcom_callback
;
109 static void single_user(void);
110 static void runcom(void);
112 static bool runcom_safe
= false;
113 static bool runcom_netboot
= false;
114 static bool single_user_mode
= false;
115 static bool run_runcom
= true;
116 static pid_t single_user_pid
= 0;
117 static pid_t runcom_pid
= 0;
119 static void setctty(const char *, int);
121 // gvdl@next.com 14 Aug 1995
122 // - from ~apps/loginwindow_proj/loginwindow/common.h
123 #define REALLY_EXIT_TO_CONSOLE 229
126 // These flags are used in the se_flags field of the init_session structure
127 #define SE_SHUTDOWN 0x1 /* session won't be restarted */
129 // The flags below control what sort of getty is launched.
130 #define SE_GETTY_LAUNCH 0x30 /* What type of getty to launch */
131 #define SE_COMMON 0x00 /* Usual command that is run - getty */
132 #define SE_ONERROR 0x10 /* Command to run if error condition occurs.
133 * This will almost always be the windowserver
134 * and loginwindow. This is so if the w.s.
135 * ever dies, that the naive user (stan)
136 * doesn't ever see the console window. */
137 #define SE_ONOPTION 0x20 /* Command to run when loginwindow exits with
138 * special error code (229). This signifies
139 * that the user typed "console" at l.w. and
140 * l.w. wants to exit and have init run getty
141 * which will then put up a console window. */
143 typedef struct _se_command
{
144 char *path
; /* what to run on that port */
145 char **argv
; /* pre-parsed argument array */
148 typedef struct init_session
{
149 kq_callback se_callback
; /* run loop callback */
150 int se_index
; /* index of entry in ttys file */
151 pid_t se_process
; /* controlling process */
152 time_t se_started
; /* used to avoid thrashing */
153 int se_flags
; /* status of session */
154 char *se_device
; /* filename of port */
155 se_cmd_t se_getty
; /* what to run on that port */
156 se_cmd_t se_onerror
; /* See SE_ONERROR above */
157 se_cmd_t se_onoption
; /* See SE_ONOPTION above */
158 TAILQ_ENTRY(init_session
) tqe
;
161 static TAILQ_HEAD(sessionshead
, init_session
) sessions
= TAILQ_HEAD_INITIALIZER(sessions
);
163 static void session_new(int, struct ttyent
*);
164 static void session_free(session_t
);
165 static void session_launch(session_t
);
166 static void session_reap(session_t
);
167 static void session_callback(void *, struct kevent
*);
169 static char **construct_argv(char *);
170 static void setsecuritylevel(int);
171 static int getsecuritylevel(void);
172 static int setupargv(session_t
, struct ttyent
*);
173 static bool should_fsck(void);
176 init_boot(bool sflag
)
178 int nbmib
[2] = { CTL_KERN
, KERN_NETBOOT
};
179 int sbmib
[2] = { CTL_KERN
, KERN_SAFEBOOT
};
181 size_t vsz
= sizeof(v
);
184 single_user_mode
= true;
188 if (launchd_assumes(sysctl(nbmib
, 2, &v
, &vsz
, NULL
, 0) != -1)) {
190 runcom_netboot
= true;
192 if (launchd_assumes(sysctl(sbmib
, 2, &v
, &vsz
, NULL
, 0) != -1)) {
200 init_pre_kevent(void)
204 if (single_user_pid
|| runcom_pid
)
207 if (single_user_mode
)
208 return single_user();
214 * If the administrator has not set the security level to -1
215 * to indicate that the kernel should not run multiuser in secure
216 * mode, and the run script has not set a higher level of security
217 * than level 1, then put the kernel into secure mode.
219 if (getsecuritylevel() == 0)
222 TAILQ_FOREACH(s
, &sessions
, tqe
) {
223 if (s
->se_process
== 0)
229 stall(char *message
, ...)
232 va_start(ap
, message
);
234 vsyslog(LOG_ALERT
, message
, ap
);
236 sleep(STALL_TIMEOUT
);
240 getsecuritylevel(void)
242 int name
[2], curlevel
;
246 name
[1] = KERN_SECURELVL
;
247 len
= sizeof (curlevel
);
248 if (sysctl(name
, 2, &curlevel
, &len
, NULL
, 0) == -1) {
249 syslog(LOG_ALERT
, "cannot get kernel security level: %m");
256 setsecuritylevel(int newlevel
)
258 int name
[2], curlevel
;
260 curlevel
= getsecuritylevel();
261 if (newlevel
== curlevel
)
264 name
[1] = KERN_SECURELVL
;
265 if (sysctl(name
, 2, NULL
, NULL
, &newlevel
, sizeof newlevel
) == -1) {
266 syslog(LOG_ALERT
, "cannot change kernel security level from %d to %d: %m",
270 syslog(LOG_INFO
, "kernel security level changed from %d to %d",
275 * Start a session and allocate a controlling terminal.
276 * Only called by children of init after forking.
279 setctty(const char *name
, int flags
)
284 if ((fd
= open(name
, flags
| O_RDWR
)) == -1) {
285 stall("can't open %s: %m", name
);
288 if (login_tty(fd
) == -1) {
289 stall("can't get %s for controlling terminal: %m", name
);
297 bool runcom_fsck
= should_fsck();
300 if (getsecuritylevel() > 0)
303 if ((single_user_pid
= launchd_fork()) == -1) {
304 syslog(LOG_ERR
, "can't fork single-user shell, trying again: %m");
306 } else if (single_user_pid
== 0) {
307 setctty(_PATH_CONSOLE
, O_POPUP
);
309 setenv("TERM", "vt100", 1);
310 setenv("SafeBoot", runcom_safe
? "-x" : "", 1);
311 setenv("VerboseFlag", "-v", 1); /* single user mode implies verbose mode */
312 setenv("FsckSlash", runcom_fsck
? "-F" : "", 1);
313 setenv("NetBoot", runcom_netboot
? "-N" : "", 1);
316 fprintf(stdout
, "Singleuser boot -- fsck not done\n");
317 fprintf(stdout
, "Root device is mounted read-only\n\n");
318 fprintf(stdout
, "If you want to make modifications to files:\n");
319 fprintf(stdout
, "\t/sbin/fsck -fy\n\t/sbin/mount -uw /\n\n");
320 fprintf(stdout
, "If you wish to boot the system:\n");
321 fprintf(stdout
, "\texit\n\n");
327 execv(_PATH_BSHELL
, argv
);
328 syslog(LOG_ERR
, "can't exec %s for single user: %m", _PATH_BSHELL
);
329 sleep(STALL_TIMEOUT
);
332 if (kevent_mod(single_user_pid
, EVFILT_PROC
, EV_ADD
,
333 NOTE_EXIT
, 0, &kqsingle_user_callback
) == -1)
334 single_user_callback(NULL
, NULL
);
339 single_user_callback(void *obj
__attribute__((unused
)), struct kevent
*kev
__attribute__((unused
)))
343 if (!launchd_assumes(waitpid(single_user_pid
, &status
, 0) == single_user_pid
))
346 if (WIFEXITED(status
) && WEXITSTATUS(status
) == EXIT_SUCCESS
) {
347 syslog(LOG_INFO
, "single user shell terminated, restarting");
349 single_user_mode
= false;
351 syslog(LOG_INFO
, "single user shell terminated.");
353 if (WTERMSIG(status
) != SIGKILL
)
354 single_user_mode
= true;
360 static struct timeval runcom_start_tv
= { 0, 0 };
362 * Run the system startup script.
367 bool runcom_fsck
= should_fsck();
368 char *argv
[] = { "/bin/launchctl", "bootstrap", NULL
};
372 gettimeofday(&runcom_start_tv
, NULL
);
374 if ((runcom_pid
= launchd_fork()) == -1) {
375 syslog(LOG_ERR
, "can't fork for %s on %s: %m", _PATH_BSHELL
, _PATH_RUNCOM
);
376 sleep(STALL_TIMEOUT
);
378 single_user_mode
= true;
380 } else if (runcom_pid
> 0) {
382 if (kevent_mod(runcom_pid
, EVFILT_PROC
, EV_ADD
,
383 NOTE_EXIT
, 0, &kqruncom_callback
) == -1) {
384 runcom_callback(NULL
, NULL
);
389 setctty(_PATH_CONSOLE
, 0);
391 if ((vdisable
= fpathconf(STDIN_FILENO
, _PC_VDISABLE
)) == -1) {
392 syslog(LOG_WARNING
, "fpathconf(\"%s\") %m", _PATH_CONSOLE
);
393 } else if (tcgetattr(STDIN_FILENO
, &term
) == -1) {
394 syslog(LOG_WARNING
, "tcgetattr(\"%s\") %m", _PATH_CONSOLE
);
396 term
.c_cc
[VINTR
] = vdisable
;
397 term
.c_cc
[VKILL
] = vdisable
;
398 term
.c_cc
[VQUIT
] = vdisable
;
399 term
.c_cc
[VSUSP
] = vdisable
;
400 term
.c_cc
[VSTART
] = vdisable
;
401 term
.c_cc
[VSTOP
] = vdisable
;
402 term
.c_cc
[VDSUSP
] = vdisable
;
404 if (tcsetattr(STDIN_FILENO
, TCSAFLUSH
, &term
) == -1)
405 syslog(LOG_WARNING
, "tcsetattr(\"%s\") %m", _PATH_CONSOLE
);
408 setenv("SafeBoot", runcom_safe
? "-x" : "", 1);
409 setenv("FsckSlash", runcom_fsck
? "-F" : "", 1);
410 setenv("NetBoot", runcom_netboot
? "-N" : "", 1);
412 execv(argv
[0], argv
);
413 stall("can't exec %s for %s: %m", _PATH_BSHELL
, _PATH_RUNCOM
);
418 runcom_callback(void *obj
__attribute__((unused
)), struct kevent
*kev
__attribute__((unused
)))
421 struct timeval runcom_end_tv
, runcom_total_tv
;
424 gettimeofday(&runcom_end_tv
, NULL
);
425 timersub(&runcom_end_tv
, &runcom_start_tv
, &runcom_total_tv
);
426 sec
= runcom_total_tv
.tv_sec
;
427 sec
+= (double)runcom_total_tv
.tv_usec
/ (double)1000000;
428 syslog(LOG_INFO
, "%s finished in: %.3f seconds", _PATH_RUNCOM
, sec
);
430 if (launchd_assumes(waitpid(runcom_pid
, &status
, 0) == runcom_pid
)) {
433 syslog(LOG_ERR
, "going to single user mode");
434 single_user_mode
= true;
438 if (WIFEXITED(status
) && WEXITSTATUS(status
) == EXIT_SUCCESS
) {
439 logwtmp("~", "reboot", "");
441 } else if (WIFSIGNALED(status
) && (WTERMSIG(status
) == SIGTERM
|| WTERMSIG(status
) == SIGKILL
)) {
445 syslog(LOG_ERR
, "%s on %s terminated abnormally, going to single user mode",
446 _PATH_BSHELL
, _PATH_RUNCOM
);
447 single_user_mode
= true;
451 * Construct an argument vector from a command line.
454 construct_argv(command
)
458 char **argv
= (char **) malloc(((strlen(command
) + 1) / 2 + 1)
460 static const char separators
[] = " \t";
462 if ((argv
[argc
++] = strtok(command
, separators
)) == 0)
464 while ((argv
[argc
++] = strtok(NULL
, separators
)))
470 * Deallocate a session descriptor.
473 static void free_command(se_cmd_t
*se_cmd
)
482 session_free(session_t s
)
484 TAILQ_REMOVE(&sessions
, s
, tqe
);
486 if (kevent_mod(s
->se_process
, EVFILT_PROC
, EV_ADD
,
487 NOTE_EXIT
, 0, &kqsimple_zombie_reaper
) == -1)
490 kill(s
->se_process
, SIGHUP
);
493 free_command(&s
->se_getty
);
494 free_command(&s
->se_onerror
);
495 free_command(&s
->se_onoption
);
499 static int setup_command(se_cmd_t
*se_cmd
, char *command
, char *arg
)
501 char *commandWithArg
;
503 asprintf(&commandWithArg
, "%s %s", command
, arg
);
505 free_command(se_cmd
);
507 se_cmd
->path
= commandWithArg
;
508 se_cmd
->argv
= construct_argv(commandWithArg
);
509 if (se_cmd
->argv
== NULL
) {
518 * Calculate getty and if useful window argv vectors.
527 if ( !setup_command(&sp
->se_getty
, typ
->ty_getty
, typ
->ty_name
) )
534 && !setup_command(&sp
->se_onerror
, typ
->ty_onerror
, typ
->ty_name
) )
541 && !setup_command(&sp
->se_onoption
, typ
->ty_onoption
, typ
->ty_name
) )
550 syslog(LOG_WARNING
, "can't parse %s for port %s", type
, sp
->se_device
);
556 * Allocate a new session descriptor.
559 session_new(session_index
, typ
)
565 if ((typ
->ty_status
& TTY_ON
) == 0 ||
570 s
= calloc(1, sizeof(struct init_session
));
572 s
->se_callback
= session_callback
;
573 s
->se_index
= session_index
;
575 TAILQ_INSERT_TAIL(&sessions
, s
, tqe
);
577 asprintf(&s
->se_device
, "%s%s", _PATH_DEV
, typ
->ty_name
);
579 if (setupargv(s
, typ
) == 0)
584 session_launch(session_t s
)
589 const char *session_type
= NULL
;
590 time_t current_time
= time(NULL
);
591 bool is_loginwindow
= false;
593 // Setup the default values;
594 switch (s
->se_flags
& SE_GETTY_LAUNCH
) {
596 if (s
->se_onoption
.path
) {
597 se_cmd
= &s
->se_onoption
;
598 session_type
= "onoption";
603 if (s
->se_onerror
.path
) {
604 se_cmd
= &s
->se_onerror
;
605 session_type
= "onerror";
611 se_cmd
= &s
->se_getty
;
612 session_type
= "getty";
616 if (strcmp(se_cmd
->argv
[0], "/System/Library/CoreServices/loginwindow.app/Contents/MacOS/loginwindow") == 0)
617 is_loginwindow
= true;
619 pid
= launchd_fork();
622 syslog(LOG_ERR
, "can't fork for %s on port %s: %m",
623 session_type
, s
->se_device
);
629 s
->se_started
= time(NULL
);
630 s
->se_flags
&= ~SE_GETTY_LAUNCH
; // clear down getty launch type
631 if (kevent_mod(pid
, EVFILT_PROC
, EV_ADD
, NOTE_EXIT
, 0, &s
->se_callback
) == -1)
636 if (current_time
> s
->se_started
&&
637 current_time
- s
->se_started
< GETTY_SPACING
) {
638 syslog(LOG_WARNING
, "%s repeating too quickly on port %s, sleeping",
639 session_type
, s
->se_device
);
644 sigprocmask(SIG_SETMASK
, &mask
, NULL
);
648 launchd_SessionCreate();
650 execv(se_cmd
->argv
[0], se_cmd
->argv
);
651 stall("can't exec %s '%s' for port %s: %m", session_type
,
652 se_cmd
->argv
[0], s
->se_device
);
657 session_callback(void *obj
, struct kevent
*kev
__attribute__((unused
)))
662 if (s
->se_flags
& SE_SHUTDOWN
) {
670 session_reap(session_t s
)
675 if (!launchd_assumes(waitpid(s
->se_process
, &status
, 0) == s
->se_process
))
678 if (WIFSIGNALED(status
)) {
679 syslog(LOG_WARNING
, "%s port %s exited abnormally: %s",
680 s
->se_getty
.path
, s
->se_device
, strsignal(WTERMSIG(status
)));
681 s
->se_flags
|= SE_ONERROR
;
682 } else if (WEXITSTATUS(status
) == REALLY_EXIT_TO_CONSOLE
) {
683 /* WIFEXITED(status) assumed */
684 s
->se_flags
|= SE_ONOPTION
;
686 s
->se_flags
|= SE_ONERROR
;
690 line
= s
->se_device
+ sizeof(_PATH_DEV
) - 1;
693 logwtmp(line
, "", "");
697 * This is an n-squared algorithm. We hope it isn't run often...
704 int session_index
= 0;
707 devlen
= sizeof(_PATH_DEV
) - 1;
708 while ((typ
= getttyent())) {
711 TAILQ_FOREACH(sp
, &sessions
, tqe
) {
712 if (strcmp(typ
->ty_name
, sp
->se_device
+ devlen
) == 0)
717 session_new(session_index
, typ
);
721 if (sp
->se_index
!= session_index
) {
722 syslog(LOG_INFO
, "port %s changed utmp index from %d to %d",
723 sp
->se_device
, sp
->se_index
,
725 sp
->se_index
= session_index
;
728 if ((typ
->ty_status
& TTY_ON
) == 0 ||
729 typ
->ty_getty
== 0) {
734 sp
->se_flags
&= ~SE_SHUTDOWN
;
736 if (setupargv(sp
, typ
) == 0) {
737 syslog(LOG_WARNING
, "can't parse getty for port %s",
747 * Block further logins.
754 TAILQ_FOREACH(s
, &sessions
, tqe
)
755 s
->se_flags
|= SE_SHUTDOWN
;
758 bool init_check_pid(pid_t p
)
762 TAILQ_FOREACH(s
, &sessions
, tqe
) {
763 if (s
->se_process
== p
)
767 if (single_user_pid
== p
)
782 if (launchd_assumes(statfs("/", &sfs
) != -1)) {
783 if (!(sfs
.f_flags
& MNT_RDONLY
)) {