2 * Copyright (c) 2005-2010 Apple Inc. All rights reserved.
4 * @APPLE_APACHE_LICENSE_HEADER_START@
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
18 * @APPLE_APACHE_LICENSE_HEADER_END@
21 static const char *const __rcs_file_version__
= "$Revision: 25957 $";
25 #include "launch_priv.h"
26 #include "bootstrap.h"
28 #include "vproc_priv.h"
29 #include "vproc_internal.h"
30 #include "bootstrap_priv.h"
31 #include "launch_internal.h"
33 #include <CoreFoundation/CoreFoundation.h>
34 #include <CoreFoundation/CFPriv.h>
35 #include <CoreFoundation/CFLogUtilities.h>
36 #include <ServiceManagement/ServiceManagement_Private.h>
37 #include <TargetConditionals.h>
38 #include <IOKit/IOKitLib.h>
39 #include <NSSystemDirectories.h>
40 #include <mach/mach.h>
41 #include <sys/types.h>
42 #include <sys/sysctl.h>
44 #include <sys/sysctl.h>
46 #include <sys/socket.h>
48 /* This is just so it's easy for me to compile launchctl without buildit. */
49 #define SO_EXECPATH 0x1085
52 #include <sys/fcntl.h>
53 #include <sys/event.h>
54 #include <sys/resource.h>
55 #include <sys/param.h>
56 #include <sys/mount.h>
57 #include <sys/reboot.h>
59 #include <netinet/in.h>
60 #include <netinet/in_var.h>
61 #include <netinet6/nd6.h>
74 #include <readline/readline.h>
75 #include <readline/history.h>
79 #include <bootfiles.h>
83 #include <sys/syslimits.h>
87 #include <bsm/auditd_lib.h>
88 #ifndef AUDITD_PLIST_FILE
89 #define AUDITD_PLIST_FILE "/System/Library/LaunchDaemons/com.apple.auditd.plist"
93 extern char **environ
;
96 #define LAUNCH_SECDIR _PATH_TMP "launch-XXXXXX"
97 #define LAUNCH_ENV_KEEPCONTEXT "LaunchKeepContext"
99 #define MACHINIT_JOBKEY_ONDEMAND "OnDemand"
100 #define MACHINIT_JOBKEY_SERVICENAME "ServiceName"
101 #define MACHINIT_JOBKEY_COMMAND "Command"
102 #define MACHINIT_JOBKEY_SERVERPORT "ServerPort"
103 #define MACHINIT_JOBKEY_SERVICEPORT "ServicePort"
106 (__builtin_expect(!(e), 0) ? _log_launchctl_bug(__rcs_file_version__, __FILE__, __LINE__, #e), false : true)
108 #define CFTypeCheck(cf, type) (CFGetTypeID(cf) == type ## GetTypeID())
110 struct load_unload_state
{
114 bool editondisk
:1, load
:1, forceload
:1;
117 static void myCFDictionaryApplyFunction(const void *key
, const void *value
, void *context
);
118 static void job_override(CFTypeRef key
, CFTypeRef val
, CFMutableDictionaryRef job
);
119 static CFTypeRef
CFTypeCreateFromLaunchData(launch_data_t obj
);
120 static CFArrayRef
CFArrayCreateFromLaunchArray(launch_data_t arr
);
121 static CFDictionaryRef
CFDictionaryCreateFromLaunchDictionary(launch_data_t dict
);
122 static bool launch_data_array_append(launch_data_t a
, launch_data_t o
);
123 static void distill_jobs(launch_data_t
);
124 static void distill_config_file(launch_data_t
);
125 static void sock_dict_cb(launch_data_t what
, const char *key
, void *context
);
126 static void sock_dict_edit_entry(launch_data_t tmp
, const char *key
, launch_data_t fdarray
, launch_data_t thejob
);
127 static launch_data_t
CF2launch_data(CFTypeRef
);
128 static launch_data_t
read_plist_file(const char *file
, bool editondisk
, bool load
);
129 static CFPropertyListRef
CreateMyPropertyListFromFile(const char *);
130 static CFPropertyListRef
CFPropertyListCreateFromFile(CFURLRef plistURL
);
131 static void WriteMyPropertyListToFile(CFPropertyListRef
, const char *);
132 static bool path_goodness_check(const char *path
, bool forceload
);
133 static void readpath(const char *, struct load_unload_state
*);
134 static void readfile(const char *, struct load_unload_state
*);
136 static int demux_cmd(int argc
, char *const argv
[]);
137 static launch_data_t
do_rendezvous_magic(const struct addrinfo
*res
, const char *serv
);
138 static void submit_job_pass(launch_data_t jobs
);
139 static void do_mgroup_join(int fd
, int family
, int socktype
, int protocol
, const char *mgroup
);
140 static mach_port_t
str2bsport(const char *s
);
141 static void print_jobs(launch_data_t j
, const char *key
, void *context
);
142 static void print_obj(launch_data_t obj
, const char *key
, void *context
);
143 static bool delay_to_second_pass(launch_data_t o
);
144 static void delay_to_second_pass2(launch_data_t o
, const char *key
, void *context
);
145 static bool str2lim(const char *buf
, rlim_t
*res
);
146 static const char *lim2str(rlim_t val
, char *buf
);
147 static const char *num2name(int n
);
148 static ssize_t
name2num(const char *n
);
149 static void unloadjob(launch_data_t job
);
150 static void print_key_value(launch_data_t obj
, const char *key
, void *context
);
151 static void print_launchd_env(launch_data_t obj
, const char *key
, void *context
);
152 static void _log_launchctl_bug(const char *rcs_rev
, const char *path
, unsigned int line
, const char *test
);
153 static void loopback_setup_ipv4(void);
154 static void loopback_setup_ipv6(void);
155 static pid_t
fwexec(const char *const *argv
, int *wstatus
);
156 static void do_potential_fsck(void);
157 static bool path_check(const char *path
);
158 static bool is_safeboot(void);
159 static bool is_netboot(void);
160 static void apply_sysctls_from_file(const char *thefile
);
161 static void empty_dir(const char *thedir
, struct stat
*psb
);
162 static int touch_file(const char *path
, mode_t m
);
163 static void do_sysversion_sysctl(void);
164 static void do_application_firewall_magic(int sfd
, launch_data_t thejob
);
165 static void preheat_page_cache_hack(void);
166 static void do_bootroot_magic(void);
167 static void do_single_user_mode(bool);
168 static bool do_single_user_mode2(void);
169 static void do_crash_debug_mode(void);
170 static bool do_crash_debug_mode2(void);
171 static void read_launchd_conf(void);
172 static void read_environment_dot_plist(void);
173 static bool job_disabled_logic(launch_data_t obj
);
174 static void fix_bogus_file_metadata(void);
175 static void do_file_init(void) __attribute__((constructor
));
176 static void setup_system_context(void);
177 static void handle_system_bootstrapper_crashes_separately(void);
178 static void fatal_signal_handler(int sig
, siginfo_t
*si
, void *uap
);
184 } BootCache_action_t
;
186 static void do_BootCache_magic(BootCache_action_t what
);
188 static int bootstrap_cmd(int argc
, char *const argv
[]);
189 static int load_and_unload_cmd(int argc
, char *const argv
[]);
190 //static int reload_cmd(int argc, char *const argv[]);
191 static int start_stop_remove_cmd(int argc
, char *const argv
[]);
192 static int submit_cmd(int argc
, char *const argv
[]);
193 static int list_cmd(int argc
, char *const argv
[]);
195 static int setenv_cmd(int argc
, char *const argv
[]);
196 static int unsetenv_cmd(int argc
, char *const argv
[]);
197 static int getenv_and_export_cmd(int argc
, char *const argv
[]);
198 static int wait4debugger_cmd(int argc
, char *const argv
[]);
200 static int limit_cmd(int argc
, char *const argv
[]);
201 static int stdio_cmd(int argc
, char *const argv
[]);
202 static int fyi_cmd(int argc
, char *const argv
[]);
203 static int logupdate_cmd(int argc
, char *const argv
[]);
204 static int umask_cmd(int argc
, char *const argv
[]);
205 static int getrusage_cmd(int argc
, char *const argv
[]);
206 static int bsexec_cmd(int argc
, char *const argv
[]);
207 static int _bslist_cmd(mach_port_t bport
, unsigned int depth
, bool show_job
, bool local_only
);
208 static int bslist_cmd(int argc
, char *const argv
[]);
209 static int _bstree_cmd(mach_port_t bsport
, unsigned int depth
, bool show_jobs
);
210 static int bstree_cmd(int argc
__attribute__((unused
)), char * const argv
[] __attribute__((unused
)));
211 static int managerpid_cmd(int argc
__attribute__((unused
)), char * const argv
[] __attribute__((unused
)));
212 static int manageruid_cmd(int argc
__attribute__((unused
)), char * const argv
[] __attribute__((unused
)));
213 static int managername_cmd(int argc
__attribute__((unused
)), char * const argv
[] __attribute__((unused
)));
214 static int asuser_cmd(int argc
, char * const argv
[]);
215 static int exit_cmd(int argc
, char *const argv
[]) __attribute__((noreturn
));
216 static int help_cmd(int argc
, char *const argv
[]);
218 static const struct {
220 int (*func
)(int argc
, char *const argv
[]);
223 { "load", load_and_unload_cmd
, "Load configuration files and/or directories" },
224 { "unload", load_and_unload_cmd
, "Unload configuration files and/or directories" },
225 // { "reload", reload_cmd, "Reload configuration files and/or directories" },
226 { "start", start_stop_remove_cmd
, "Start specified job" },
227 { "stop", start_stop_remove_cmd
, "Stop specified job" },
228 { "submit", submit_cmd
, "Submit a job from the command line" },
229 { "remove", start_stop_remove_cmd
, "Remove specified job" },
230 { "bootstrap", bootstrap_cmd
, "Bootstrap launchd" },
231 { "list", list_cmd
, "List jobs and information about jobs" },
232 { "setenv", setenv_cmd
, "Set an environmental variable in launchd" },
233 { "unsetenv", unsetenv_cmd
, "Unset an environmental variable in launchd" },
234 { "getenv", getenv_and_export_cmd
, "Get an environmental variable from launchd" },
235 { "export", getenv_and_export_cmd
, "Export shell settings from launchd" },
236 { "debug", wait4debugger_cmd
, "Set the WaitForDebugger flag for the target job to true." },
237 { "limit", limit_cmd
, "View and adjust launchd resource limits" },
238 { "stdout", stdio_cmd
, "Redirect launchd's standard out to the given path" },
239 { "stderr", stdio_cmd
, "Redirect launchd's standard error to the given path" },
240 { "shutdown", fyi_cmd
, "Prepare for system shutdown" },
241 { "singleuser", fyi_cmd
, "Switch to single-user mode" },
242 { "getrusage", getrusage_cmd
, "Get resource usage statistics from launchd" },
243 { "log", logupdate_cmd
, "Adjust the logging level or mask of launchd" },
244 { "umask", umask_cmd
, "Change launchd's umask" },
245 { "bsexec", bsexec_cmd
, "Execute a process within a different Mach bootstrap subset" },
246 { "bslist", bslist_cmd
, "List Mach bootstrap services and optional servers" },
247 { "bstree", bstree_cmd
, "Show the entire Mach bootstrap tree. Requires root privileges." },
248 { "managerpid", managerpid_cmd
, "Print the PID of the launchd managing this Mach bootstrap." },
249 { "manageruid", manageruid_cmd
, "Print the UID of the launchd managing this Mach bootstrap." },
250 { "managername", managername_cmd
, "Print the name of this Mach bootstrap." },
251 { "asuser", asuser_cmd
, "Execute a subcommand in the given user's context." },
252 { "exit", exit_cmd
, "Exit the interactive invocation of launchctl" },
253 { "quit", exit_cmd
, "Quit the interactive invocation of launchctl" },
254 { "help", help_cmd
, "This help output" },
259 static bool is_managed
;
260 static bool do_apple_internal_magic
;
261 static bool system_context
;
262 static bool rootuser_context
;
263 static bool bootstrapping_system
;
264 static bool bootstrapping_peruser
;
265 static bool g_verbose_boot
= false;
266 static bool g_startup_debugging
= false;
268 static bool g_job_overrides_db_has_changed
= false;
269 static CFMutableDictionaryRef g_job_overrides_db
= NULL
;
270 static char g_job_overrides_db_path
[PATH_MAX
];
273 static bool g_job_cache_db_has_changed
= false;
274 static launch_data_t g_job_cache_db
= NULL
;
275 static char g_job_cache_db_path
[PATH_MAX
];
279 main(int argc
, char *const argv
[])
281 int64_t is_managed_val
= 0;
284 if (vproc_swap_integer(NULL
, VPROC_GSK_IS_MANAGED
, NULL
, &is_managed_val
) == NULL
&& is_managed_val
) {
288 istty
= isatty(STDIN_FILENO
);
291 if (argc
> 0 && argv
[0][0] == '-') {
294 for (flago
= argv
[0] + 1; *flago
; flago
++) {
301 if (strncmp(argv
[1], "root", sizeof("root")) == 0) {
302 rootuser_context
= true;
304 fprintf(stderr
, "Unknown user: %s\n", argv
[1]);
309 fprintf(stderr
, "-u option requires an argument.\n");
313 system_context
= true;
316 fprintf(stderr
, "Unknown argument: '-%c'\n", *flago
);
323 /* Running in the context of the root user's per-user launchd is only supported ... well
324 * in the root user's per-user context. I know it's confusing. I'm genuinely sorry.
326 if (rootuser_context
) {
327 int64_t manager_uid
= -1, manager_pid
= -1;
328 if (vproc_swap_integer(NULL
, VPROC_GSK_MGR_UID
, NULL
, &manager_uid
) == NULL
) {
329 if (vproc_swap_integer(NULL
, VPROC_GSK_MGR_PID
, NULL
, &manager_pid
) == NULL
) {
330 if (manager_uid
|| manager_pid
== 1) {
331 fprintf(stderr
, "Running in the root user's per-user context is not supported outside of the root user's bootstrap.\n");
336 } else if (!(system_context
|| rootuser_context
)) {
337 /* Running in the system context is implied when we're running as root and not running as a bootstrapper. */
338 system_context
= (!is_managed
&& getuid() == 0);
341 if (system_context
) {
343 setup_system_context();
345 fprintf(stderr
, "You must be root to run in the system context.\n");
348 } else if (rootuser_context
) {
350 fprintf(stderr
, "You must be root to run in the root user context.\n");
355 if (NULL
== readline
) {
356 fprintf(stderr
, "missing library: readline\n");
361 while ((l
= readline(istty
? "launchd% " : NULL
))) {
362 char *inputstring
= l
, *argv2
[100], **ap
= argv2
;
365 while ((*ap
= strsep(&inputstring
, " \t"))) {
385 exit(demux_cmd(argc
, argv
));
392 demux_cmd(int argc
, char *const argv
[])
399 for (i
= 0; i
< (sizeof cmds
/ sizeof cmds
[0]); i
++) {
400 if (!strcmp(cmds
[i
].name
, argv
[0])) {
401 return cmds
[i
].func(argc
, argv
);
405 fprintf(stderr
, "%s: unknown subcommand \"%s\"\n", getprogname(), argv
[0]);
410 read_launchd_conf(void)
412 char s
[1000], *c
, *av
[100];
418 if (getppid() == 1) {
419 file
= "/etc/launchd.conf";
421 file
= "/etc/launchd-user.conf";
424 if (!(f
= fopen(file
, "r"))) {
428 while ((c
= fgets(s
, (int) sizeof s
, f
))) {
430 if (len
&& c
[len
- 1] == '\n') {
436 while ((av
[i
] = strsep(&c
, " \t"))) {
437 if (*(av
[i
]) != '\0') {
450 CFPropertyListRef
CFPropertyListCreateFromFile(CFURLRef plistURL
)
452 CFReadStreamRef plistReadStream
= CFReadStreamCreateWithFile(NULL
, plistURL
);
454 CFErrorRef streamErr
= NULL
;
455 if (!CFReadStreamOpen(plistReadStream
)) {
456 streamErr
= CFReadStreamCopyError(plistReadStream
);
457 CFStringRef errString
= CFErrorCopyDescription(streamErr
);
461 CFRelease(errString
);
462 CFRelease(streamErr
);
465 CFPropertyListRef plist
= NULL
;
466 if (plistReadStream
) {
467 CFStringRef errString
= NULL
;
468 CFPropertyListFormat plistFormat
= 0;
469 plist
= CFPropertyListCreateFromStream(NULL
, plistReadStream
, 0, kCFPropertyListImmutable
, &plistFormat
, &errString
);
472 CFRelease(errString
);
476 CFReadStreamClose(plistReadStream
);
477 CFRelease(plistReadStream
);
483 sanitize_environment_dot_plist(const launch_data_t val
, const char *key
, void *ctx
)
485 launch_data_t copy
= (launch_data_t
)ctx
;
486 if (strncmp("DYLD_", key
, sizeof("DYLD_") - 1) != 0) {
487 launch_data_t copyi
= launch_data_copy(val
);
488 launch_data_dict_insert(copy
, copyi
, key
);
492 #define CFReleaseIfNotNULL(cf) if (cf) CFRelease(cf);
494 read_environment_dot_plist(void)
496 CFStringRef plistPath
= NULL
;
497 CFURLRef plistURL
= NULL
;
498 CFDictionaryRef envPlist
= NULL
;
499 launch_data_t req
= NULL
, launch_env_dict
= NULL
, resp
= NULL
;
501 char plist_path_str
[PATH_MAX
];
502 plist_path_str
[PATH_MAX
- 1] = 0;
503 snprintf(plist_path_str
, sizeof(plist_path_str
), "%s/.MacOSX/environment.plist", getenv("HOME"));
506 if (stat(plist_path_str
, &sb
) == -1) {
510 plistPath
= CFStringCreateWithFormat(NULL
, NULL
, CFSTR("%s"), plist_path_str
);
511 if (!assumes(plistPath
!= NULL
)) {
515 plistURL
= CFURLCreateWithFileSystemPath(NULL
, plistPath
, kCFURLPOSIXPathStyle
, false);
516 if (!assumes(plistURL
!= NULL
)) {
520 envPlist
= (CFDictionaryRef
)CFPropertyListCreateFromFile(plistURL
);
521 if (!assumes(envPlist
!= NULL
)) {
525 launch_env_dict
= CF2launch_data(envPlist
);
526 if (!assumes(launch_env_dict
!= NULL
)) {
530 launch_data_t sanitized
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
531 if (!assumes(sanitized
!= NULL
)) {
535 launch_data_dict_iterate(launch_env_dict
, sanitize_environment_dot_plist
, sanitized
);
536 launch_data_free(launch_env_dict
);
538 req
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
539 if (!assumes(req
!= NULL
)) {
543 launch_data_dict_insert(req
, sanitized
, LAUNCH_KEY_SETUSERENVIRONMENT
);
545 resp
= launch_msg(req
);
546 if (!assumes(resp
!= NULL
)) {
550 if (!assumes(launch_data_get_type(resp
) == LAUNCH_DATA_ERRNO
)) {
554 (void)assumes(launch_data_get_errno(resp
) == 0);
556 CFReleaseIfNotNULL(plistPath
);
557 CFReleaseIfNotNULL(plistURL
);
558 CFReleaseIfNotNULL(envPlist
);
560 launch_data_free(req
);
564 launch_data_free(resp
);
569 unsetenv_cmd(int argc
, char *const argv
[])
571 launch_data_t resp
, tmp
, msg
;
574 fprintf(stderr
, "%s usage: unsetenv <key>\n", getprogname());
578 msg
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
580 tmp
= launch_data_new_string(argv
[1]);
581 launch_data_dict_insert(msg
, tmp
, LAUNCH_KEY_UNSETUSERENVIRONMENT
);
583 resp
= launch_msg(msg
);
585 launch_data_free(msg
);
588 launch_data_free(resp
);
590 fprintf(stderr
, "launch_msg(\"%s\"): %s\n", LAUNCH_KEY_UNSETUSERENVIRONMENT
, strerror(errno
));
597 setenv_cmd(int argc
, char *const argv
[])
599 launch_data_t resp
, tmp
, tmpv
, msg
;
602 fprintf(stderr
, "%s usage: setenv <key> <value>\n", getprogname());
606 msg
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
607 tmp
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
609 tmpv
= launch_data_new_string(argv
[2]);
610 launch_data_dict_insert(tmp
, tmpv
, argv
[1]);
611 launch_data_dict_insert(msg
, tmp
, LAUNCH_KEY_SETUSERENVIRONMENT
);
613 resp
= launch_msg(msg
);
614 launch_data_free(msg
);
617 launch_data_free(resp
);
619 fprintf(stderr
, "launch_msg(\"%s\"): %s\n", LAUNCH_KEY_SETUSERENVIRONMENT
, strerror(errno
));
626 print_launchd_env(launch_data_t obj
, const char *key
, void *context
)
628 bool *is_csh
= context
;
630 /* XXX escape the double quotes */
632 fprintf(stdout
, "setenv %s \"%s\";\n", key
, launch_data_get_string(obj
));
634 fprintf(stdout
, "%s=\"%s\"; export %s;\n", key
, launch_data_get_string(obj
), key
);
639 print_key_value(launch_data_t obj
, const char *key
, void *context
)
641 const char *k
= context
;
643 if (!strcmp(key
, k
)) {
644 fprintf(stdout
, "%s\n", launch_data_get_string(obj
));
649 getenv_and_export_cmd(int argc
, char *const argv
[])
655 if (!strcmp(argv
[0], "export")) {
656 char *s
= getenv("SHELL");
658 is_csh
= strstr(s
, "csh") ? true : false;
660 } else if (argc
!= 2) {
661 fprintf(stderr
, "%s usage: getenv <key>\n", getprogname());
667 if (vproc_swap_complex(NULL
, VPROC_GSK_ENVIRONMENT
, NULL
, &resp
) == NULL
) {
668 if (!strcmp(argv
[0], "export")) {
669 launch_data_dict_iterate(resp
, print_launchd_env
, &is_csh
);
671 launch_data_dict_iterate(resp
, print_key_value
, k
);
673 launch_data_free(resp
);
683 wait4debugger_cmd(int argc
, char * const argv
[])
686 fprintf(stderr
, "%s usage: debug <label> <value>\n", argv
[0]);
692 if (strncmp(argv
[2], "true", sizeof("true")) == 0) {
694 } else if (strncmp(argv
[2], "false", sizeof("false")) != 0) {
695 inval
= atoi(argv
[2]);
699 vproc_t vp
= vprocmgr_lookup_vproc(argv
[1]);
701 vproc_err_t verr
= vproc_swap_integer(vp
, VPROC_GSK_WAITFORDEBUGGER
, &inval
, NULL
);
703 fprintf(stderr
, "Failed to set WaitForDebugger flag on %s.\n", argv
[1]);
714 unloadjob(launch_data_t job
)
718 tmps
= launch_data_dict_lookup(job
, LAUNCH_JOBKEY_LABEL
);
721 fprintf(stderr
, "%s: Error: Missing Key: %s\n", getprogname(), LAUNCH_JOBKEY_LABEL
);
725 if (_vproc_send_signal_by_label(launch_data_get_string(tmps
), VPROC_MAGIC_UNLOAD_SIGNAL
) != NULL
) {
726 fprintf(stderr
, "%s: Error unloading: %s\n", getprogname(), launch_data_get_string(tmps
));
731 job_override(CFTypeRef key
, CFTypeRef val
, CFMutableDictionaryRef job
)
733 if (!CFTypeCheck(key
, CFString
)) {
736 if (CFStringCompare(key
, CFSTR(LAUNCH_JOBKEY_LABEL
), kCFCompareCaseInsensitive
) == 0) {
740 CFDictionarySetValue(job
, key
, val
);
744 read_plist_file(const char *file
, bool editondisk
, bool load
)
746 CFPropertyListRef plist
= CreateMyPropertyListFromFile(file
);
747 launch_data_t r
= NULL
;
750 fprintf(stderr
, "%s: no plist was returned for: %s\n", getprogname(), file
);
754 CFStringRef label
= CFDictionaryGetValue(plist
, CFSTR(LAUNCH_JOBKEY_LABEL
));
755 if (g_job_overrides_db
&& label
&& CFTypeCheck(label
, CFString
)) {
756 CFDictionaryRef overrides
= CFDictionaryGetValue(g_job_overrides_db
, label
);
757 if (overrides
&& CFTypeCheck(overrides
, CFDictionary
)) {
758 CFDictionaryApplyFunction(overrides
, (CFDictionaryApplierFunction
)job_override
, (void *)plist
);
763 if (g_job_overrides_db
) {
764 CFMutableDictionaryRef job
= (CFMutableDictionaryRef
)CFDictionaryGetValue(g_job_overrides_db
, label
);
765 if (!job
|| !CFTypeCheck(job
, CFDictionary
)) {
766 job
= CFDictionaryCreateMutable(NULL
, 0, &kCFTypeDictionaryKeyCallBacks
, &kCFTypeDictionaryValueCallBacks
);
767 CFDictionarySetValue(g_job_overrides_db
, label
, job
);
771 CFDictionarySetValue(job
, CFSTR(LAUNCH_JOBKEY_DISABLED
), load
? kCFBooleanFalse
: kCFBooleanTrue
);
772 CFDictionarySetValue((CFMutableDictionaryRef
)plist
, CFSTR(LAUNCH_JOBKEY_DISABLED
), load
? kCFBooleanFalse
: kCFBooleanTrue
);
773 g_job_overrides_db_has_changed
= true;
776 CFDictionaryRemoveValue((CFMutableDictionaryRef
)plist
, CFSTR(LAUNCH_JOBKEY_DISABLED
));
778 CFDictionarySetValue((CFMutableDictionaryRef
)plist
, CFSTR(LAUNCH_JOBKEY_DISABLED
), kCFBooleanTrue
);
780 WriteMyPropertyListToFile(plist
, file
);
784 r
= CF2launch_data(plist
);
792 delay_to_second_pass2(launch_data_t o
, const char *key
, void *context
)
797 if (key
&& 0 == strcmp(key
, LAUNCH_JOBSOCKETKEY_BONJOUR
)) {
802 switch (launch_data_get_type(o
)) {
803 case LAUNCH_DATA_DICTIONARY
:
804 launch_data_dict_iterate(o
, delay_to_second_pass2
, context
);
806 case LAUNCH_DATA_ARRAY
:
807 for (i
= 0; i
< launch_data_array_get_count(o
); i
++) {
808 delay_to_second_pass2(launch_data_array_get_index(o
, i
), NULL
, context
);
817 delay_to_second_pass(launch_data_t o
)
821 launch_data_t socks
= launch_data_dict_lookup(o
, LAUNCH_JOBKEY_SOCKETS
);
827 delay_to_second_pass2(socks
, NULL
, &res
);
833 sysctl_hw_streq(int mib_slot
, const char *str
)
836 size_t bufsz
= sizeof(buf
);
837 int mib
[] = { CTL_HW
, mib_slot
};
839 if (sysctl(mib
, 2, buf
, &bufsz
, NULL
, 0) != -1) {
840 if (strcmp(buf
, str
) == 0) {
849 limitloadtohardware_iterator(launch_data_t val
, const char *key
, void *ctx
)
854 (void)snprintf(name
, sizeof(name
), "hw.%s", key
);
858 if (*result
!= true && assumes(sysctlnametomib(name
, mib
, &sz
) != -1)) {
859 if (launch_data_get_type(val
) == LAUNCH_DATA_ARRAY
) {
860 size_t c
= launch_data_array_get_count(val
);
863 for (i
= 0; i
< c
; i
++) {
864 launch_data_t oai
= launch_data_array_get_index(val
, i
);
865 if (sysctl_hw_streq(mib
[1], launch_data_get_string(oai
))) {
875 readfile(const char *what
, struct load_unload_state
*lus
)
877 char ourhostname
[1024];
878 launch_data_t tmpd
, tmps
, thejob
, tmpa
;
879 bool job_disabled
= false;
882 gethostname(ourhostname
, sizeof(ourhostname
));
884 if (NULL
== (thejob
= read_plist_file(what
, lus
->editondisk
, lus
->load
))) {
885 fprintf(stderr
, "%s: no plist was returned for: %s\n", getprogname(), what
);
890 if (NULL
== launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_LABEL
)) {
891 fprintf(stderr
, "%s: missing the Label key: %s\n", getprogname(), what
);
895 if ((launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_PROGRAM
) == NULL
) &&
896 (launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_PROGRAMARGUMENTS
) == NULL
)) {
897 fprintf(stderr
, "%s: neither a Program nor a ProgramArguments key was specified: %s", getprogname(), what
);
901 if (NULL
!= (tmpa
= launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_LIMITLOADFROMHOSTS
))) {
902 c
= launch_data_array_get_count(tmpa
);
904 for (i
= 0; i
< c
; i
++) {
905 launch_data_t oai
= launch_data_array_get_index(tmpa
, i
);
906 if (!strcasecmp(ourhostname
, launch_data_get_string(oai
))) {
912 if (NULL
!= (tmpa
= launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_LIMITLOADTOHOSTS
))) {
913 c
= launch_data_array_get_count(tmpa
);
915 for (i
= 0; i
< c
; i
++) {
916 launch_data_t oai
= launch_data_array_get_index(tmpa
, i
);
917 if (!strcasecmp(ourhostname
, launch_data_get_string(oai
))) {
927 if (NULL
!= (tmpd
= launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_LIMITLOADTOHARDWARE
))) {
929 launch_data_dict_iterate(tmpd
, limitloadtohardware_iterator
, &result
);
935 if (NULL
!= (tmpd
= launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_LIMITLOADFROMHARDWARE
))) {
937 launch_data_dict_iterate(tmpd
, limitloadtohardware_iterator
, &result
);
943 // if the manager is Aqua, the LimitLoadToSessionType should default to 'Aqua'
944 // fixes <rdar://problem/8297909>
945 char *manager
= "Bogus";
946 vproc_swap_string(NULL
, VPROC_GSK_MGR_NAME
, NULL
, &manager
);
947 if (!lus
->session_type
) {
948 if (strcmp(manager
, "Aqua") == 0) {
949 lus
->session_type
= "Aqua";
953 if (lus
->session_type
&& !(tmpa
= launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_LIMITLOADTOSESSIONTYPE
))) {
954 tmpa
= launch_data_new_string("Aqua");
955 launch_data_dict_insert(thejob
, tmpa
, LAUNCH_JOBKEY_LIMITLOADTOSESSIONTYPE
);
958 if ((tmpa
= launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_LIMITLOADTOSESSIONTYPE
))) {
959 const char *allowed_session
;
962 /* My sincere apologies to anyone who has to deal with this
963 * LimitLoadToSessionType madness. It was like this when I got here, but
964 * I've knowingly made it worse, hopefully to the benefit of the end
967 * See <rdar://problem/8769211> and <rdar://problem/7114980>.
969 if (!lus
->session_type
&& launch_data_get_type(tmpa
) == LAUNCH_DATA_STRING
) {
970 if (strcasecmp("System", manager
) == 0 && strcasecmp("System", launch_data_get_string(tmpa
)) == 0) {
975 if (lus
->session_type
) switch (launch_data_get_type(tmpa
)) {
976 case LAUNCH_DATA_ARRAY
:
977 c
= launch_data_array_get_count(tmpa
);
978 for (i
= 0; i
< c
; i
++) {
979 tmps
= launch_data_array_get_index(tmpa
, i
);
980 allowed_session
= launch_data_get_string(tmps
);
981 if (strcasecmp(lus
->session_type
, allowed_session
) == 0) {
983 /* we have to do the following so job_reparent_hack() works within launchd */
984 tmpa
= launch_data_new_string(lus
->session_type
);
985 launch_data_dict_insert(thejob
, tmpa
, LAUNCH_JOBKEY_LIMITLOADTOSESSIONTYPE
);
990 case LAUNCH_DATA_STRING
:
991 allowed_session
= launch_data_get_string(tmpa
);
992 if (strcasecmp(lus
->session_type
, allowed_session
) == 0) {
1005 if ((tmpd
= launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_DISABLED
))) {
1006 job_disabled
= job_disabled_logic(tmpd
);
1009 if (lus
->forceload
) {
1010 job_disabled
= false;
1013 if (job_disabled
&& lus
->load
) {
1017 if (bootstrapping_system
|| bootstrapping_peruser
) {
1021 launch_data_t uuid_d
= launch_data_new_opaque(uuid
, sizeof(uuid_t
));
1022 launch_data_dict_insert(thejob
, uuid_d
, LAUNCH_JOBKEY_SECURITYSESSIONUUID
);
1025 if (delay_to_second_pass(thejob
)) {
1026 launch_data_array_append(lus
->pass2
, thejob
);
1028 launch_data_array_append(lus
->pass1
, thejob
);
1032 fprintf(stdout
, "Will load: %s\n", what
);
1038 fprintf(stdout
, "Ignored: %s\n", what
);
1040 launch_data_free(thejob
);
1044 job_disabled_dict_logic(launch_data_t obj
, const char *key
, void *context
)
1048 if (launch_data_get_type(obj
) != LAUNCH_DATA_STRING
) {
1052 if (strcasecmp(key
, LAUNCH_JOBKEY_DISABLED_MACHINETYPE
) == 0) {
1053 if (sysctl_hw_streq(HW_MACHINE
, launch_data_get_string(obj
))) {
1056 } else if (strcasecmp(key
, LAUNCH_JOBKEY_DISABLED_MODELNAME
) == 0) {
1057 if (sysctl_hw_streq(HW_MODEL
, launch_data_get_string(obj
))) {
1064 job_disabled_logic(launch_data_t obj
)
1068 switch (launch_data_get_type(obj
)) {
1069 case LAUNCH_DATA_DICTIONARY
:
1070 launch_data_dict_iterate(obj
, job_disabled_dict_logic
, &r
);
1072 case LAUNCH_DATA_BOOL
:
1073 r
= launch_data_get_bool(obj
);
1083 path_goodness_check(const char *path
, bool forceload
)
1087 if (stat(path
, &sb
) == -1) {
1088 fprintf(stderr
, "%s: Couldn't stat(\"%s\"): %s\n", getprogname(), path
, strerror(errno
));
1096 if (sb
.st_mode
& (S_IWOTH
|S_IWGRP
)) {
1097 fprintf(stderr
, "%s: Dubious permissions on file (skipping): %s\n", getprogname(), path
);
1101 if (sb
.st_uid
!= 0 && sb
.st_uid
!= getuid()) {
1102 fprintf(stderr
, "%s: Dubious ownership on file (skipping): %s\n", getprogname(), path
);
1106 if (!(S_ISREG(sb
.st_mode
) || S_ISDIR(sb
.st_mode
))) {
1107 fprintf(stderr
, "%s: Dubious path. Not a regular file or directory (skipping): %s\n", getprogname(), path
);
1111 if ((!S_ISDIR(sb
.st_mode
)) && (fnmatch("*.plist", path
, FNM_CASEFOLD
) == FNM_NOMATCH
)) {
1112 fprintf(stderr
, "%s: Dubious file. Not of type .plist (skipping): %s\n", getprogname(), path
);
1120 readpath(const char *what
, struct load_unload_state
*lus
)
1122 char buf
[MAXPATHLEN
];
1127 if (!path_goodness_check(what
, lus
->forceload
)) {
1131 if (stat(what
, &sb
) == -1) {
1135 if (S_ISREG(sb
.st_mode
)) {
1136 readfile(what
, lus
);
1137 } else if (S_ISDIR(sb
.st_mode
)) {
1138 if ((d
= opendir(what
)) == NULL
) {
1139 fprintf(stderr
, "%s: opendir() failed to open the directory\n", getprogname());
1143 while ((de
= readdir(d
))) {
1144 if ((de
->d_name
[0] == '.')) {
1147 snprintf(buf
, sizeof(buf
), "%s/%s", what
, de
->d_name
);
1149 if (!path_goodness_check(buf
, lus
->forceload
)) {
1159 struct distill_context
{
1161 launch_data_t newsockdict
;
1165 distill_jobs(launch_data_t jobs
)
1167 size_t i
, c
= launch_data_array_get_count(jobs
);
1169 for (i
= 0; i
< c
; i
++)
1170 distill_config_file(launch_data_array_get_index(jobs
, i
));
1174 distill_config_file(launch_data_t id_plist
)
1176 struct distill_context dc
= { id_plist
, NULL
};
1179 if ((tmp
= launch_data_dict_lookup(dc
.base
, LAUNCH_JOBKEY_SOCKETS
))) {
1180 dc
.newsockdict
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
1181 launch_data_dict_iterate(tmp
, sock_dict_cb
, &dc
);
1182 launch_data_dict_insert(dc
.base
, dc
.newsockdict
, LAUNCH_JOBKEY_SOCKETS
);
1187 sock_dict_cb(launch_data_t what
, const char *key
, void *context
)
1189 struct distill_context
*dc
= context
;
1190 launch_data_t fdarray
= launch_data_alloc(LAUNCH_DATA_ARRAY
);
1192 launch_data_dict_insert(dc
->newsockdict
, fdarray
, key
);
1194 if (launch_data_get_type(what
) == LAUNCH_DATA_DICTIONARY
) {
1195 sock_dict_edit_entry(what
, key
, fdarray
, dc
->base
);
1196 } else if (launch_data_get_type(what
) == LAUNCH_DATA_ARRAY
) {
1200 for (i
= 0; i
< launch_data_array_get_count(what
); i
++) {
1201 tmp
= launch_data_array_get_index(what
, i
);
1202 sock_dict_edit_entry(tmp
, key
, fdarray
, dc
->base
);
1208 sock_dict_edit_entry(launch_data_t tmp
, const char *key
, launch_data_t fdarray
, launch_data_t thejob
)
1210 launch_data_t a
, val
;
1211 int sfd
, st
= SOCK_STREAM
;
1212 bool passive
= true;
1214 if ((val
= launch_data_dict_lookup(tmp
, LAUNCH_JOBSOCKETKEY_TYPE
))) {
1215 if (!strcasecmp(launch_data_get_string(val
), "stream")) {
1217 } else if (!strcasecmp(launch_data_get_string(val
), "dgram")) {
1219 } else if (!strcasecmp(launch_data_get_string(val
), "seqpacket")) {
1220 st
= SOCK_SEQPACKET
;
1224 if ((val
= launch_data_dict_lookup(tmp
, LAUNCH_JOBSOCKETKEY_PASSIVE
))) {
1225 passive
= launch_data_get_bool(val
);
1228 if ((val
= launch_data_dict_lookup(tmp
, LAUNCH_JOBSOCKETKEY_SECUREWITHKEY
))) {
1229 char secdir
[] = LAUNCH_SECDIR
, buf
[1024];
1230 launch_data_t uenv
= launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_USERENVIRONMENTVARIABLES
);
1233 uenv
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
1234 launch_data_dict_insert(thejob
, uenv
, LAUNCH_JOBKEY_USERENVIRONMENTVARIABLES
);
1239 sprintf(buf
, "%s/%s", secdir
, key
);
1241 a
= launch_data_new_string(buf
);
1242 launch_data_dict_insert(tmp
, a
, LAUNCH_JOBSOCKETKEY_PATHNAME
);
1243 a
= launch_data_new_string(buf
);
1244 launch_data_dict_insert(uenv
, a
, launch_data_get_string(val
));
1247 if ((val
= launch_data_dict_lookup(tmp
, LAUNCH_JOBSOCKETKEY_PATHNAME
))) {
1248 struct sockaddr_un sun
;
1249 mode_t sun_mode
= 0;
1253 memset(&sun
, 0, sizeof(sun
));
1255 sun
.sun_family
= AF_UNIX
;
1257 strncpy(sun
.sun_path
, launch_data_get_string(val
), sizeof(sun
.sun_path
));
1259 if ((sfd
= _fd(socket(AF_UNIX
, st
, 0))) == -1) {
1263 if ((val
= launch_data_dict_lookup(tmp
, LAUNCH_JOBSOCKETKEY_PATHMODE
))) {
1264 sun_mode
= (mode_t
)launch_data_get_integer(val
);
1269 if (unlink(sun
.sun_path
) == -1 && errno
!= ENOENT
) {
1273 oldmask
= umask(S_IRWXG
|S_IRWXO
);
1274 if (bind(sfd
, (struct sockaddr
*)&sun
, (socklen_t
) sizeof sun
) == -1) {
1281 chmod(sun
.sun_path
, sun_mode
);
1283 if ((st
== SOCK_STREAM
|| st
== SOCK_SEQPACKET
) && listen(sfd
, -1) == -1) {
1287 } else if (connect(sfd
, (struct sockaddr
*)&sun
, (socklen_t
) sizeof sun
) == -1) {
1292 val
= launch_data_new_fd(sfd
);
1293 launch_data_array_append(fdarray
, val
);
1295 launch_data_t rnames
= NULL
;
1296 const char *node
= NULL
, *serv
= NULL
, *mgroup
= NULL
;
1298 struct addrinfo hints
, *res0
, *res
;
1299 int gerr
, sock_opt
= 1;
1300 bool rendezvous
= false;
1302 memset(&hints
, 0, sizeof(hints
));
1304 hints
.ai_socktype
= st
;
1306 hints
.ai_flags
|= AI_PASSIVE
;
1309 if ((val
= launch_data_dict_lookup(tmp
, LAUNCH_JOBSOCKETKEY_NODENAME
))) {
1310 node
= launch_data_get_string(val
);
1312 if ((val
= launch_data_dict_lookup(tmp
, LAUNCH_JOBSOCKETKEY_MULTICASTGROUP
))) {
1313 mgroup
= launch_data_get_string(val
);
1315 if ((val
= launch_data_dict_lookup(tmp
, LAUNCH_JOBSOCKETKEY_SERVICENAME
))) {
1316 if (LAUNCH_DATA_INTEGER
== launch_data_get_type(val
)) {
1317 sprintf(servnbuf
, "%lld", launch_data_get_integer(val
));
1320 serv
= launch_data_get_string(val
);
1323 if ((val
= launch_data_dict_lookup(tmp
, LAUNCH_JOBSOCKETKEY_FAMILY
))) {
1324 if (!strcasecmp("IPv4", launch_data_get_string(val
))) {
1325 hints
.ai_family
= AF_INET
;
1326 } else if (!strcasecmp("IPv6", launch_data_get_string(val
))) {
1327 hints
.ai_family
= AF_INET6
;
1330 if ((val
= launch_data_dict_lookup(tmp
, LAUNCH_JOBSOCKETKEY_PROTOCOL
))) {
1331 if (!strcasecmp("TCP", launch_data_get_string(val
))) {
1332 hints
.ai_protocol
= IPPROTO_TCP
;
1333 } else if (!strcasecmp("UDP", launch_data_get_string(val
))) {
1334 hints
.ai_protocol
= IPPROTO_UDP
;
1337 if ((rnames
= launch_data_dict_lookup(tmp
, LAUNCH_JOBSOCKETKEY_BONJOUR
))) {
1339 if (LAUNCH_DATA_BOOL
== launch_data_get_type(rnames
)) {
1340 rendezvous
= launch_data_get_bool(rnames
);
1345 if ((gerr
= getaddrinfo(node
, serv
, &hints
, &res0
)) != 0) {
1346 fprintf(stderr
, "getaddrinfo(): %s\n", gai_strerror(gerr
));
1350 for (res
= res0
; res
; res
= res
->ai_next
) {
1351 launch_data_t rvs_fd
= NULL
;
1352 if ((sfd
= _fd(socket(res
->ai_family
, res
->ai_socktype
, res
->ai_protocol
))) == -1) {
1353 fprintf(stderr
, "socket(): %s\n", strerror(errno
));
1357 do_application_firewall_magic(sfd
, thejob
);
1359 if (hints
.ai_flags
& AI_PASSIVE
) {
1360 if (AF_INET6
== res
->ai_family
&& -1 == setsockopt(sfd
, IPPROTO_IPV6
, IPV6_V6ONLY
,
1361 (void *)&sock_opt
, (socklen_t
) sizeof sock_opt
)) {
1362 fprintf(stderr
, "setsockopt(IPV6_V6ONLY): %m");
1366 if (setsockopt(sfd
, SOL_SOCKET
, SO_REUSEPORT
, (void *)&sock_opt
, (socklen_t
) sizeof sock_opt
) == -1) {
1367 fprintf(stderr
, "setsockopt(SO_REUSEPORT): %s\n", strerror(errno
));
1371 if (setsockopt(sfd
, SOL_SOCKET
, SO_REUSEADDR
, (void *)&sock_opt
, (socklen_t
) sizeof sock_opt
) == -1) {
1372 fprintf(stderr
, "setsockopt(SO_REUSEADDR): %s\n", strerror(errno
));
1376 if (bind(sfd
, res
->ai_addr
, res
->ai_addrlen
) == -1) {
1377 fprintf(stderr
, "bind(): %s\n", strerror(errno
));
1380 /* The kernel may have dynamically assigned some part of the
1381 * address. (The port being a common example.)
1383 if (getsockname(sfd
, res
->ai_addr
, &res
->ai_addrlen
) == -1) {
1384 fprintf(stderr
, "getsockname(): %s\n", strerror(errno
));
1389 do_mgroup_join(sfd
, res
->ai_family
, res
->ai_socktype
, res
->ai_protocol
, mgroup
);
1391 if ((res
->ai_socktype
== SOCK_STREAM
|| res
->ai_socktype
== SOCK_SEQPACKET
) && listen(sfd
, -1) == -1) {
1392 fprintf(stderr
, "listen(): %s\n", strerror(errno
));
1395 if (rendezvous
&& (res
->ai_family
== AF_INET
|| res
->ai_family
== AF_INET6
) &&
1396 (res
->ai_socktype
== SOCK_STREAM
|| res
->ai_socktype
== SOCK_DGRAM
)) {
1397 launch_data_t rvs_fds
= launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_BONJOURFDS
);
1398 if (NULL
== rvs_fds
) {
1399 rvs_fds
= launch_data_alloc(LAUNCH_DATA_ARRAY
);
1400 launch_data_dict_insert(thejob
, rvs_fds
, LAUNCH_JOBKEY_BONJOURFDS
);
1402 if (NULL
== rnames
) {
1403 rvs_fd
= do_rendezvous_magic(res
, serv
);
1405 launch_data_array_append(rvs_fds
, rvs_fd
);
1407 } else if (LAUNCH_DATA_STRING
== launch_data_get_type(rnames
)) {
1408 rvs_fd
= do_rendezvous_magic(res
, launch_data_get_string(rnames
));
1410 launch_data_array_append(rvs_fds
, rvs_fd
);
1412 } else if (LAUNCH_DATA_ARRAY
== launch_data_get_type(rnames
)) {
1413 size_t rn_i
, rn_ac
= launch_data_array_get_count(rnames
);
1415 for (rn_i
= 0; rn_i
< rn_ac
; rn_i
++) {
1416 launch_data_t rn_tmp
= launch_data_array_get_index(rnames
, rn_i
);
1418 rvs_fd
= do_rendezvous_magic(res
, launch_data_get_string(rn_tmp
));
1420 launch_data_array_append(rvs_fds
, rvs_fd
);
1426 if (connect(sfd
, res
->ai_addr
, res
->ai_addrlen
) == -1) {
1427 fprintf(stderr
, "connect(): %s\n", strerror(errno
));
1431 val
= launch_data_new_fd(sfd
);
1433 /* <rdar://problem/3964648> Launchd should not register the same service more than once */
1434 /* <rdar://problem/3965154> Switch to DNSServiceRegisterAddrInfo() */
1437 launch_data_array_append(fdarray
, val
);
1443 do_mgroup_join(int fd
, int family
, int socktype
, int protocol
, const char *mgroup
)
1445 struct addrinfo hints
, *res0
, *res
;
1446 struct ip_mreq mreq
;
1447 struct ipv6_mreq m6req
;
1450 memset(&hints
, 0, sizeof(hints
));
1452 hints
.ai_flags
|= AI_PASSIVE
;
1453 hints
.ai_family
= family
;
1454 hints
.ai_socktype
= socktype
;
1455 hints
.ai_protocol
= protocol
;
1457 if ((gerr
= getaddrinfo(mgroup
, NULL
, &hints
, &res0
)) != 0) {
1458 fprintf(stderr
, "getaddrinfo(): %s\n", gai_strerror(gerr
));
1462 for (res
= res0
; res
; res
= res
->ai_next
) {
1463 if (AF_INET
== family
) {
1464 memset(&mreq
, 0, sizeof(mreq
));
1465 mreq
.imr_multiaddr
= ((struct sockaddr_in
*)res
->ai_addr
)->sin_addr
;
1466 if (setsockopt(fd
, IPPROTO_IP
, IP_ADD_MEMBERSHIP
, &mreq
, (socklen_t
) sizeof mreq
) == -1) {
1467 fprintf(stderr
, "setsockopt(IP_ADD_MEMBERSHIP): %s\n", strerror(errno
));
1471 } else if (AF_INET6
== family
) {
1472 memset(&m6req
, 0, sizeof(m6req
));
1473 m6req
.ipv6mr_multiaddr
= ((struct sockaddr_in6
*)res
->ai_addr
)->sin6_addr
;
1474 if (setsockopt(fd
, IPPROTO_IPV6
, IPV6_JOIN_GROUP
, &m6req
, (socklen_t
) sizeof m6req
) == -1) {
1475 fprintf(stderr
, "setsockopt(IPV6_JOIN_GROUP): %s\n", strerror(errno
));
1480 fprintf(stderr
, "unknown family during multicast group bind!\n");
1490 do_rendezvous_magic(const struct addrinfo
*res
, const char *serv
)
1493 DNSServiceRef service
;
1494 DNSServiceErrorType error
;
1497 static int statres
= 1;
1500 statres
= stat("/usr/sbin/mDNSResponder", &sb
);
1503 if (-1 == statres
) {
1507 sprintf(rvs_buf
, "_%s._%s.", serv
, res
->ai_socktype
== SOCK_STREAM
? "tcp" : "udp");
1509 if (res
->ai_family
== AF_INET
) {
1510 port
= ((struct sockaddr_in
*)res
->ai_addr
)->sin_port
;
1512 port
= ((struct sockaddr_in6
*)res
->ai_addr
)->sin6_port
;
1515 error
= DNSServiceRegister(&service
, 0, 0, NULL
, rvs_buf
, NULL
, NULL
, port
, 0, NULL
, NULL
, NULL
);
1517 if (error
== kDNSServiceErr_NoError
) {
1518 return launch_data_new_fd(DNSServiceRefSockFD(service
));
1521 fprintf(stderr
, "DNSServiceRegister(\"%s\"): %d\n", serv
, error
);
1526 CreateMyPropertyListFromFile(const char *posixfile
)
1528 CFPropertyListRef propertyList
;
1529 CFStringRef errorString
;
1530 CFDataRef resourceData
;
1534 fileURL
= CFURLCreateFromFileSystemRepresentation(kCFAllocatorDefault
, (const UInt8
*)posixfile
, strlen(posixfile
), false);
1536 fprintf(stderr
, "%s: CFURLCreateFromFileSystemRepresentation(%s) failed\n", getprogname(), posixfile
);
1538 if (!CFURLCreateDataAndPropertiesFromResource(kCFAllocatorDefault
, fileURL
, &resourceData
, NULL
, NULL
, &errorCode
)) {
1539 fprintf(stderr
, "%s: CFURLCreateDataAndPropertiesFromResource(%s) failed: %d\n", getprogname(), posixfile
, (int)errorCode
);
1542 propertyList
= CFPropertyListCreateFromXMLData(kCFAllocatorDefault
, resourceData
, kCFPropertyListMutableContainersAndLeaves
, &errorString
);
1548 CFRelease(resourceData
);
1551 return propertyList
;
1555 WriteMyPropertyListToFile(CFPropertyListRef plist
, const char *posixfile
)
1557 CFDataRef resourceData
;
1561 fileURL
= CFURLCreateFromFileSystemRepresentation(kCFAllocatorDefault
, (const UInt8
*)posixfile
, strlen(posixfile
), false);
1563 fprintf(stderr
, "%s: CFURLCreateFromFileSystemRepresentation(%s) failed\n", getprogname(), posixfile
);
1565 resourceData
= CFPropertyListCreateXMLData(kCFAllocatorDefault
, plist
);
1566 if (resourceData
== NULL
) {
1567 fprintf(stderr
, "%s: CFPropertyListCreateXMLData(%s) failed", getprogname(), posixfile
);
1569 if (!CFURLWriteDataAndPropertiesToResource(fileURL
, resourceData
, NULL
, &errorCode
)) {
1570 fprintf(stderr
, "%s: CFURLWriteDataAndPropertiesToResource(%s) failed: %d\n", getprogname(), posixfile
, (int)errorCode
);
1574 CFRelease(resourceData
);
1578 static inline Boolean
__is_launch_data_t(launch_data_t obj
)
1580 Boolean result
= true;
1582 switch (launch_data_get_type(obj
)) {
1583 case LAUNCH_DATA_STRING
: break;
1584 case LAUNCH_DATA_INTEGER
: break;
1585 case LAUNCH_DATA_REAL
: break;
1586 case LAUNCH_DATA_BOOL
: break;
1587 case LAUNCH_DATA_ARRAY
: break;
1588 case LAUNCH_DATA_DICTIONARY
: break;
1589 case LAUNCH_DATA_FD
: break;
1590 case LAUNCH_DATA_MACHPORT
: break;
1591 default : result
= false;
1597 static void __launch_data_iterate(launch_data_t obj
, const char *key
, CFMutableDictionaryRef dict
)
1599 if (obj
&& __is_launch_data_t(obj
)) {
1600 CFStringRef cfKey
= CFStringCreateWithCString(NULL
, key
, kCFStringEncodingUTF8
);
1601 CFTypeRef cfVal
= CFTypeCreateFromLaunchData(obj
);
1604 CFDictionarySetValue(dict
, cfKey
, cfVal
);
1611 static CFTypeRef
CFTypeCreateFromLaunchData(launch_data_t obj
)
1613 CFTypeRef cfObj
= NULL
;
1615 switch (launch_data_get_type(obj
)) {
1616 case LAUNCH_DATA_STRING
:
1618 const char *str
= launch_data_get_string(obj
);
1619 cfObj
= CFStringCreateWithCString(NULL
, str
, kCFStringEncodingUTF8
);
1623 case LAUNCH_DATA_INTEGER
:
1625 long long integer
= launch_data_get_integer(obj
);
1626 cfObj
= CFNumberCreate(NULL
, kCFNumberLongLongType
, &integer
);
1630 case LAUNCH_DATA_REAL
:
1632 double real
= launch_data_get_real(obj
);
1633 cfObj
= CFNumberCreate(NULL
, kCFNumberDoubleType
, &real
);
1637 case LAUNCH_DATA_BOOL
:
1639 bool yesno
= launch_data_get_bool(obj
);
1640 cfObj
= yesno
? kCFBooleanTrue
: kCFBooleanFalse
;
1644 case LAUNCH_DATA_ARRAY
:
1646 cfObj
= (CFTypeRef
)CFArrayCreateFromLaunchArray(obj
);
1650 case LAUNCH_DATA_DICTIONARY
:
1652 cfObj
= (CFTypeRef
)CFDictionaryCreateFromLaunchDictionary(obj
);
1656 case LAUNCH_DATA_FD
:
1658 int fd
= launch_data_get_fd(obj
);
1659 cfObj
= CFNumberCreate(NULL
, kCFNumberIntType
, &fd
);
1663 case LAUNCH_DATA_MACHPORT
:
1665 mach_port_t port
= launch_data_get_machport(obj
);
1666 cfObj
= CFNumberCreate(NULL
, kCFNumberIntType
, &port
);
1676 #pragma mark CFArray
1677 CFArrayRef
CFArrayCreateFromLaunchArray(launch_data_t arr
)
1679 CFArrayRef result
= NULL
;
1680 CFMutableArrayRef mutResult
= CFArrayCreateMutable(NULL
, 0, &kCFTypeArrayCallBacks
);
1682 if (launch_data_get_type(arr
) == LAUNCH_DATA_ARRAY
) {
1683 unsigned int count
= launch_data_array_get_count(arr
);
1686 for (i
= 0; i
< count
; i
++) {
1687 launch_data_t launch_obj
= launch_data_array_get_index(arr
, i
);
1688 CFTypeRef obj
= CFTypeCreateFromLaunchData(launch_obj
);
1691 CFArrayAppendValue(mutResult
, obj
);
1696 result
= CFArrayCreateCopy(NULL
, mutResult
);
1700 CFRelease(mutResult
);
1705 #pragma mark CFDictionary / CFPropertyList
1706 static CFDictionaryRef
CFDictionaryCreateFromLaunchDictionary(launch_data_t dict
)
1708 CFDictionaryRef result
= NULL
;
1710 if (launch_data_get_type(dict
) == LAUNCH_DATA_DICTIONARY
) {
1711 CFMutableDictionaryRef mutResult
= CFDictionaryCreateMutable(NULL
, 0, &kCFTypeDictionaryKeyCallBacks
, &kCFTypeDictionaryValueCallBacks
);
1713 launch_data_dict_iterate(dict
, (void (*)(launch_data_t
, const char *, void *))__launch_data_iterate
, mutResult
);
1715 result
= CFDictionaryCreateCopy(NULL
, mutResult
);
1716 CFRelease(mutResult
);
1723 myCFDictionaryApplyFunction(const void *key
, const void *value
, void *context
)
1725 launch_data_t ik
, iw
, where
= context
;
1727 ik
= CF2launch_data(key
);
1728 iw
= CF2launch_data(value
);
1730 launch_data_dict_insert(where
, iw
, launch_data_get_string(ik
));
1731 launch_data_free(ik
);
1735 CF2launch_data(CFTypeRef cfr
)
1738 CFTypeID cft
= CFGetTypeID(cfr
);
1740 if (cft
== CFStringGetTypeID()) {
1742 CFStringGetCString(cfr
, buf
, sizeof(buf
), kCFStringEncodingUTF8
);
1743 r
= launch_data_alloc(LAUNCH_DATA_STRING
);
1744 launch_data_set_string(r
, buf
);
1745 } else if (cft
== CFBooleanGetTypeID()) {
1746 r
= launch_data_alloc(LAUNCH_DATA_BOOL
);
1747 launch_data_set_bool(r
, CFBooleanGetValue(cfr
));
1748 } else if (cft
== CFArrayGetTypeID()) {
1749 CFIndex i
, ac
= CFArrayGetCount(cfr
);
1750 r
= launch_data_alloc(LAUNCH_DATA_ARRAY
);
1751 for (i
= 0; i
< ac
; i
++) {
1752 CFTypeRef v
= CFArrayGetValueAtIndex(cfr
, i
);
1754 launch_data_t iv
= CF2launch_data(v
);
1755 launch_data_array_set_index(r
, iv
, i
);
1758 } else if (cft
== CFDictionaryGetTypeID()) {
1759 r
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
1760 CFDictionaryApplyFunction(cfr
, myCFDictionaryApplyFunction
, r
);
1761 } else if (cft
== CFDataGetTypeID()) {
1762 r
= launch_data_alloc(LAUNCH_DATA_OPAQUE
);
1763 launch_data_set_opaque(r
, CFDataGetBytePtr(cfr
), CFDataGetLength(cfr
));
1764 } else if (cft
== CFNumberGetTypeID()) {
1767 CFNumberType cfnt
= CFNumberGetType(cfr
);
1769 case kCFNumberSInt8Type
:
1770 case kCFNumberSInt16Type
:
1771 case kCFNumberSInt32Type
:
1772 case kCFNumberSInt64Type
:
1773 case kCFNumberCharType
:
1774 case kCFNumberShortType
:
1775 case kCFNumberIntType
:
1776 case kCFNumberLongType
:
1777 case kCFNumberLongLongType
:
1778 CFNumberGetValue(cfr
, kCFNumberLongLongType
, &n
);
1779 r
= launch_data_alloc(LAUNCH_DATA_INTEGER
);
1780 launch_data_set_integer(r
, n
);
1782 case kCFNumberFloat32Type
:
1783 case kCFNumberFloat64Type
:
1784 case kCFNumberFloatType
:
1785 case kCFNumberDoubleType
:
1786 CFNumberGetValue(cfr
, kCFNumberDoubleType
, &d
);
1787 r
= launch_data_alloc(LAUNCH_DATA_REAL
);
1788 launch_data_set_real(r
, d
);
1801 help_cmd(int argc
, char *const argv
[])
1803 FILE *where
= stdout
;
1804 size_t i
, l
, cmdwidth
= 0;
1806 if (argc
== 0 || argv
== NULL
)
1809 fprintf(where
, "usage: %s <subcommand>\n", getprogname());
1811 for (i
= 0; i
< (sizeof cmds
/ sizeof cmds
[0]); i
++) {
1812 l
= strlen(cmds
[i
].name
);
1818 for (i
= 0; i
< (sizeof cmds
/ sizeof cmds
[0]); i
++) {
1819 fprintf(where
, "\t%-*s\t%s\n", (int)cmdwidth
, cmds
[i
].name
, cmds
[i
].desc
);
1826 exit_cmd(int argc
__attribute__((unused
)), char *const argv
[] __attribute__((unused
)))
1835 fcntl(fd
, F_SETFD
, 1);
1840 do_single_user_mode(bool sflag
)
1843 while (!do_single_user_mode2()) {
1850 do_single_user_mode2(void)
1852 bool runcom_fsck
= true; /* should_fsck(); */
1857 switch ((p
= fork())) {
1859 syslog(LOG_ERR
, "can't fork single-user shell, trying again: %m");
1864 (void)assumes(waitpid(p
, &wstatus
, 0) != -1);
1865 if (WIFEXITED(wstatus
)) {
1866 if (WEXITSTATUS(wstatus
) == EXIT_SUCCESS
) {
1869 fprintf(stdout
, "single user mode: exit status: %d\n", WEXITSTATUS(wstatus
));
1872 fprintf(stdout
, "single user mode shell: %s\n", strsignal(WTERMSIG(wstatus
)));
1877 revoke(_PATH_CONSOLE
);
1878 if (!assumes((fd
= open(_PATH_CONSOLE
, O_RDWR
)) != -1)) {
1879 _exit(EXIT_FAILURE
);
1881 if (!assumes(login_tty(fd
) != -1)) {
1882 _exit(EXIT_FAILURE
);
1885 mach_timespec_t wt
= { 5, 0 };
1886 IOKitWaitQuiet(kIOMasterPortDefault
, &wt
); /* This will hopefully return after all the kexts have shut up. */
1888 setenv("TERM", "vt100", 1);
1890 fprintf(stdout
, "Singleuser boot -- fsck not done\n");
1891 fprintf(stdout
, "Root device is mounted read-only\n\n");
1892 fprintf(stdout
, "If you want to make modifications to files:\n");
1893 fprintf(stdout
, "\t/sbin/fsck -fy\n\t/sbin/mount -uw /\n\n");
1894 fprintf(stdout
, "If you wish to boot the system:\n");
1895 fprintf(stdout
, "\texit\n\n");
1899 execl(_PATH_BSHELL
, "-sh", NULL
);
1900 syslog(LOG_ERR
, "can't exec %s for single user: %m", _PATH_BSHELL
);
1901 _exit(EXIT_FAILURE
);
1905 do_crash_debug_mode(void)
1907 while (!do_crash_debug_mode2()) {
1913 do_crash_debug_mode2(void)
1919 switch ((p
= fork())) {
1921 syslog(LOG_ERR
, "can't fork crash debug shell, trying again: %m");
1926 (void)assumes(waitpid(p
, &wstatus
, 0) != -1);
1927 if (WIFEXITED(wstatus
)) {
1928 if (WEXITSTATUS(wstatus
) == EXIT_SUCCESS
) {
1931 fprintf(stdout
, "crash debug mode: exit status: %d\n", WEXITSTATUS(wstatus
));
1934 fprintf(stdout
, "crash debug mode shell: %s\n", strsignal(WTERMSIG(wstatus
)));
1939 revoke(_PATH_CONSOLE
);
1940 if (!assumes((fd
= open(_PATH_CONSOLE
, O_RDWR
)) != -1)) {
1941 _exit(EXIT_FAILURE
);
1943 if (!assumes(login_tty(fd
) != -1)) {
1944 _exit(EXIT_FAILURE
);
1947 mach_timespec_t wt
= { 5, 0 };
1948 IOKitWaitQuiet(kIOMasterPortDefault
, &wt
); /* This will hopefully return after all the kexts have shut up. */
1950 setenv("TERM", "vt100", 1);
1951 fprintf(stdout
, "Entering boot-time debugging mode...\n");
1952 fprintf(stdout
, "The system bootstrapper process has crashed. To debug:\n");
1953 fprintf(stdout
, "\tgdb attach %i\n", getppid());
1954 fprintf(stdout
, "You can try booting the system with:\n");
1955 fprintf(stdout
, "\tlaunchctl load -S System -D All\n\n");
1957 execl(_PATH_BSHELL
, "-sh", NULL
);
1958 syslog(LOG_ERR
, "can't exec %s for crash debug: %m", _PATH_BSHELL
);
1959 _exit(EXIT_FAILURE
);
1963 exit_at_sigterm(int sig
)
1965 if (sig
== SIGTERM
) {
1966 _exit(EXIT_SUCCESS
);
1971 fatal_signal_handler(int sig
__attribute__((unused
)), siginfo_t
*si
__attribute__((unused
)), void *uap
__attribute__((unused
)))
1973 do_crash_debug_mode();
1977 handle_system_bootstrapper_crashes_separately(void)
1979 if (!g_startup_debugging
) {
1983 fprintf(stdout
, "com.apple.launchctl.System\t\t\t*** Handling system bootstrapper crashes separately. ***\n");
1984 struct sigaction fsa
;
1986 fsa
.sa_sigaction
= fatal_signal_handler
;
1987 fsa
.sa_flags
= SA_SIGINFO
;
1988 sigemptyset(&fsa
.sa_mask
);
1990 (void)assumes(sigaction(SIGILL
, &fsa
, NULL
) != -1);
1991 (void)assumes(sigaction(SIGFPE
, &fsa
, NULL
) != -1);
1992 (void)assumes(sigaction(SIGBUS
, &fsa
, NULL
) != -1);
1993 (void)assumes(sigaction(SIGSEGV
, &fsa
, NULL
) != -1);
1994 (void)assumes(sigaction(SIGTRAP
, &fsa
, NULL
) != -1);
1995 (void)assumes(sigaction(SIGABRT
, &fsa
, NULL
) != -1);
1999 system_specific_bootstrap(bool sflag
)
2001 int hnmib
[] = { CTL_KERN
, KERN_HOSTNAME
};
2005 launch_data_t lda
, ldb
;
2008 handle_system_bootstrapper_crashes_separately();
2010 // Disable Libinfo lookups to mdns and ds while bootstrapping (8698260)
2011 si_search_module_set_flags("mdns", 1);
2012 si_search_module_set_flags("ds", 1);
2014 do_sysversion_sysctl();
2016 do_single_user_mode(sflag
);
2018 (void)assumes((kq
= kqueue()) != -1);
2020 EV_SET(&kev
, 0, EVFILT_TIMER
, EV_ADD
|EV_ONESHOT
, NOTE_SECONDS
, 60, 0);
2021 (void)assumes(kevent(kq
, &kev
, 1, NULL
, 0, NULL
) != -1);
2023 EV_SET(&kev
, SIGTERM
, EVFILT_SIGNAL
, EV_ADD
, 0, 0, 0);
2024 (void)assumes(kevent(kq
, &kev
, 1, NULL
, 0, NULL
) != -1);
2025 (void)assumes(signal(SIGTERM
, SIG_IGN
) != SIG_ERR
);
2027 (void)assumes(sysctl(hnmib
, 2, NULL
, NULL
, "localhost", sizeof("localhost")) != -1);
2029 loopback_setup_ipv4();
2030 loopback_setup_ipv6();
2032 apply_sysctls_from_file("/etc/sysctl.conf");
2034 #if TARGET_OS_EMBEDDED
2035 if (path_check("/etc/rc.boot")) {
2036 const char *rcboot_tool
[] = { "/etc/rc.boot", NULL
};
2038 (void)assumes(signal(SIGTERM
, exit_at_sigterm
) != SIG_ERR
);
2039 (void)assumes(fwexec(rcboot_tool
, NULL
) != -1);
2043 if (path_check("/etc/rc.cdrom")) {
2044 const char *rccdrom_tool
[] = { _PATH_BSHELL
, "/etc/rc.cdrom", "multiuser", NULL
};
2046 /* The bootstrapper should always be killable during install-time (rdar://problem/6103485).
2047 * This is a special case for /etc/rc.cdrom, which runs a process and never exits.
2049 (void)assumes(signal(SIGTERM
, exit_at_sigterm
) != SIG_ERR
);
2050 (void)assumes(fwexec(rccdrom_tool
, NULL
) != -1);
2051 (void)assumes(reboot(RB_HALT
) != -1);
2052 _exit(EXIT_FAILURE
);
2053 } else if (is_netboot()) {
2054 const char *rcnetboot_tool
[] = { _PATH_BSHELL
, "/etc/rc.netboot", "init", NULL
};
2055 if (!assumes(fwexec(rcnetboot_tool
, NULL
) != -1)) {
2056 (void)assumes(reboot(RB_HALT
) != -1);
2057 _exit(EXIT_FAILURE
);
2060 do_potential_fsck();
2063 #if TARGET_OS_EMBEDDED
2064 if (path_check("/usr/libexec/cc_fips_test")) {
2065 const char *fips_tool
[] = { "/usr/libexec/cc_fips_test", "-P", NULL
};
2066 if (fwexec(fips_tool
, NULL
) == -1) {
2067 printf("FIPS self check failure\n");
2068 (void)assumes(reboot(RB_HALT
) != -1);
2069 _exit(EXIT_FAILURE
);
2074 if (path_check("/etc/rc.server")) {
2075 const char *rcserver_tool
[] = { _PATH_BSHELL
, "/etc/rc.server", NULL
};
2076 (void)assumes(fwexec(rcserver_tool
, NULL
) != -1);
2079 read_launchd_conf();
2081 if (path_check("/var/account/acct")) {
2082 (void)assumes(acct("/var/account/acct") != -1);
2085 #if !TARGET_OS_EMBEDDED
2086 if (path_check("/etc/fstab")) {
2087 const char *mount_tool
[] = { "mount", "-vat", "nonfs", NULL
};
2088 (void)assumes(fwexec(mount_tool
, NULL
) != -1);
2092 if (path_check("/etc/rc.installer_cleanup")) {
2093 const char *rccleanup_tool
[] = { _PATH_BSHELL
, "/etc/rc.installer_cleanup", "multiuser", NULL
};
2094 (void)assumes(fwexec(rccleanup_tool
, NULL
) != -1);
2097 if (path_check("/etc/rc.deferred_install")) {
2099 const char *deferredinstall_tool
[] = { _PATH_BSHELL
, "/etc/rc.deferred_install", NULL
};
2100 if (assumes(fwexec(deferredinstall_tool
, &status
) != -1)) {
2101 if (WEXITSTATUS(status
) == EXIT_SUCCESS
) {
2102 if (do_apple_internal_magic
) {
2103 fprintf(stdout
, "Deferred install script completed successfully. Rebooting in 3 seconds...\n");
2107 (void)assumes(remove(deferredinstall_tool
[1]) != -1);
2108 (void)assumes(reboot(RB_AUTOBOOT
) != -1);
2111 fprintf(stdout
, "Deferred install script exited with status %i. Continuing boot and hoping it'll work...\n", WEXITSTATUS(status
));
2112 (void)assumes(remove(deferredinstall_tool
[1]) != -1);
2117 empty_dir(_PATH_VARRUN
, NULL
);
2118 empty_dir(_PATH_TMP
, NULL
);
2119 remove(_PATH_NOLOGIN
);
2121 if (path_check("/usr/libexec/dirhelper")) {
2122 const char *dirhelper_tool
[] = { "/usr/libexec/dirhelper", "-machineBoot", NULL
};
2123 (void)assumes(fwexec(dirhelper_tool
, NULL
) != -1);
2126 (void)assumes(touch_file(_PATH_UTMPX
, DEFFILEMODE
) != -1);
2127 #if !TARGET_OS_EMBEDDED
2128 (void)assumes(touch_file(_PATH_VARRUN
"/.systemStarterRunning", DEFFILEMODE
) != -1);
2133 * Only start auditing if not "Disabled" in auditd plist.
2135 if ((lda
= read_plist_file(AUDITD_PLIST_FILE
, false, false)) != NULL
&&
2136 ((ldb
= launch_data_dict_lookup(lda
, LAUNCH_JOBKEY_DISABLED
)) == NULL
||
2137 job_disabled_logic(ldb
) == false))
2139 (void)assumes(audit_quick_start() == 0);
2140 launch_data_free(lda
);
2143 if (path_check("/etc/security/rc.audit")) {
2144 const char *audit_tool
[] = { _PATH_BSHELL
, "/etc/security/rc.audit", NULL
};
2145 (void)assumes(fwexec(audit_tool
, NULL
) != -1);
2149 do_BootCache_magic(BOOTCACHE_START
);
2151 preheat_page_cache_hack();
2153 _vproc_set_global_on_demand(true);
2155 char *load_launchd_items
[] = { "load", "-D", "all", NULL
};
2156 int load_launchd_items_cnt
= 3;
2158 if (is_safeboot()) {
2159 load_launchd_items
[2] = "system";
2162 (void)assumes(load_and_unload_cmd(load_launchd_items_cnt
, load_launchd_items
) == 0);
2167 * We need to revisit this after Leopard ships.
2169 * I want a plist defined knob for jobs to give advisory hints that
2170 * will "hopefully" serialize bootstrap. Reasons for doing so include
2171 * pragmatic performance optimizations and attempts to workaround bugs
2172 * in jobs. Something like what follows might work:
2174 * The BootCache would switch to launchd and add this to the plist:
2176 * <key>HopefullyStartsSerially<key>
2178 * <key>ReadyTimeout</key>
2179 * <integer>2</integer>
2182 * And kextd would add the following:
2184 * <key>HopefullyStartsSerially<key>
2186 * <key>ReadyTimeout</key>
2187 * <integer>5</integer>
2188 * <key>HopefullyStartsAfter</key>
2189 * <string>com.apple.BootCache.daemon</string>
2193 * Then both the BootCache and kextd could call something like:
2195 * vproc_declare_ready_state();
2197 * To tell launchd to short circuit the readiness timeout and let the
2198 * next wave of jobs start.
2200 * Yes, this mechanism smells a lot like SystemStarter, rc.d and
2201 * friends. I think as long as we document that artificial
2202 * serialization is only advisory and not guaranteed, we should be
2203 * fine. Remember: IPC is the preferred way to serialize operations.
2206 if (!do_apple_internal_magic
) {
2207 mach_timespec_t w
= { 5, 0 };
2208 IOKitWaitQuiet(kIOMasterPortDefault
, &w
);
2211 do_BootCache_magic(BOOTCACHE_TAG
);
2213 do_bootroot_magic();
2215 _vproc_set_global_on_demand(false);
2217 (void)assumes(kevent(kq
, NULL
, 0, &kev
, 1, NULL
) == 1);
2219 /* warmd now handles cutting off the BootCache. We just kick it off. */
2221 (void)assumes(close(kq
) != -1);
2225 do_BootCache_magic(BootCache_action_t what
)
2227 const char *bcc_tool
[] = { "/usr/sbin/BootCacheControl", NULL
, NULL
};
2229 if (is_safeboot() || !path_check(bcc_tool
[0])) {
2234 case BOOTCACHE_START
:
2235 bcc_tool
[1] = "start";
2238 bcc_tool
[1] = "tag";
2240 case BOOTCACHE_STOP
:
2241 bcc_tool
[1] = "stop";
2245 fwexec(bcc_tool
, NULL
);
2249 bootstrap_cmd(int argc
, char *const argv
[])
2251 char *session_type
= NULL
;
2255 while ((ch
= getopt(argc
, argv
, "sS:")) != -1) {
2261 session_type
= optarg
;
2272 if (!session_type
) {
2273 fprintf(stderr
, "usage: %s bootstrap [-s] -S <session-type>\n", getprogname());
2277 if (strcasecmp(session_type
, "System") == 0) {
2278 bootstrapping_system
= true;
2279 system_specific_bootstrap(sflag
);
2281 char *load_launchd_items
[] = { "load", "-S", session_type
, "-D", "all", NULL
, NULL
, NULL
, NULL
, NULL
, NULL
};
2284 char *load_launchd_items_user
[] = { "load", "-S", VPROCMGR_SESSION_BACKGROUND
, "-D", "user", NULL
};
2285 int the_argc_user
= 0;
2287 if (is_safeboot()) {
2288 load_launchd_items
[4] = "system";
2291 if (strcasecmp(session_type
, VPROCMGR_SESSION_BACKGROUND
) == 0 || strcasecmp(session_type
, VPROCMGR_SESSION_LOGINWINDOW
) == 0) {
2292 load_launchd_items
[4] = "system";
2293 if (!is_safeboot()) {
2294 load_launchd_items
[5] = "-D";
2295 load_launchd_items
[6] = "local";
2298 } else if (strcasecmp(session_type
, VPROCMGR_SESSION_AQUA
) == 0) {
2299 /* For now, we'll just load user Background agents when
2300 * bootstrapping the Aqua session. This way, we can
2301 * safely assume that the home directory is present. If
2302 * we try reading the user's Background agents when we're
2303 * actually bootstrapping the Background session, we run the
2304 * risk of deadlocking against mount_url. But this fix should
2305 * satisfy <rdar://problem/5279345>.
2309 /* We want to read environment.plist, which is in the user's home directory.
2310 * Since the dance to mount a network home directory is fairly complex, all we
2311 * can do is try and read environment.plist when bootstrapping the Aqua session,
2312 * which is when we assume the home directory is present.
2314 * The drawback here is that jobs bootstrapped in the Background session won't
2315 * get the new environment until they quit and relaunch. But then again, they
2316 * won't get the updated HOME directory or anything either. This is just a messy
2319 read_environment_dot_plist();
2322 if (strcasecmp(session_type
, VPROCMGR_SESSION_BACKGROUND
) == 0) {
2323 bootstrapping_peruser
= true;
2324 read_launchd_conf();
2325 #if 0 /* XXX PR-6456403 */
2326 (void)assumes(SessionCreate(sessionKeepCurrentBootstrap
, 0) == 0);
2330 int retval
= load_and_unload_cmd(the_argc
, load_launchd_items
);
2331 if (retval
== 0 && the_argc_user
!= 0) {
2334 vproc_err_t err
= vproc_swap_integer(NULL
, VPROC_GSK_WEIRD_BOOTSTRAP
, &junk
, NULL
);
2336 retval
= load_and_unload_cmd(the_argc_user
, load_launchd_items_user
);
2338 _SMLoginItemBootstrapItems();
2350 load_and_unload_cmd(int argc
, char *const argv
[])
2352 NSSearchPathEnumerationState es
= 0;
2353 char nspath
[PATH_MAX
* 2]; /* safe side, we need to append */
2354 bool badopts
= false;
2355 struct load_unload_state lus
;
2359 memset(&lus
, 0, sizeof(lus
));
2361 if (strcmp(argv
[0], "load") == 0) {
2365 while ((ch
= getopt(argc
, argv
, "wFS:D:")) != -1) {
2368 lus
.editondisk
= true;
2371 lus
.forceload
= true;
2374 lus
.session_type
= optarg
;
2377 if (strcasecmp(optarg
, "all") == 0) {
2378 es
|= NSAllDomainsMask
;
2379 } else if (strcasecmp(optarg
, "user") == 0) {
2380 es
|= NSUserDomainMask
;
2381 } else if (strcasecmp(optarg
, "local") == 0) {
2382 es
|= NSLocalDomainMask
;
2383 } else if (strcasecmp(optarg
, "network") == 0) {
2384 es
|= NSNetworkDomainMask
;
2385 } else if (strcasecmp(optarg
, "system") == 0) {
2386 es
|= NSSystemDomainMask
;
2400 if (lus
.session_type
== NULL
) {
2401 es
&= ~NSUserDomainMask
;
2404 if (argc
== 0 && es
== 0) {
2409 fprintf(stderr
, "usage: %s load [-wF] [-D <user|local|network|system|all>] paths...\n", getprogname());
2415 vproc_err_t verr
= vproc_swap_string(NULL
, VPROC_GSK_JOB_OVERRIDES_DB
, NULL
, &db
);
2417 fprintf(stderr
, "Could not get location of job overrides database.\n");
2418 g_job_overrides_db_path
[0] = 0;
2420 strncpy(g_job_overrides_db_path
, db
, strlen(db
));
2422 /* If we can't create or lock the overrides database, we'll fall back to writing to the
2423 * plist file directly.
2425 (void)assumes((dbfd
= open(g_job_overrides_db_path
, O_RDONLY
| O_EXLOCK
| O_CREAT
, S_IRUSR
| S_IWUSR
)) != -1);
2427 g_job_overrides_db
= (CFMutableDictionaryRef
)CreateMyPropertyListFromFile(g_job_overrides_db_path
);
2428 if (!g_job_overrides_db
) {
2429 g_job_overrides_db
= CFDictionaryCreateMutable(NULL
, 0, &kCFTypeDictionaryKeyCallBacks
, &kCFTypeDictionaryValueCallBacks
);
2435 /* I wish I didn't need to do three passes, but I need to load mDNSResponder and use it too.
2436 * And loading legacy mach init jobs is extra fun.
2438 * In later versions of launchd, I hope to load everything in the first pass,
2439 * then do the Bonjour magic on the jobs that need it, and reload them, but for now,
2440 * I haven't thought through the various complexities of reloading jobs, and therefore
2441 * launchd doesn't have reload support right now.
2444 lus
.pass1
= launch_data_alloc(LAUNCH_DATA_ARRAY
);
2445 lus
.pass2
= launch_data_alloc(LAUNCH_DATA_ARRAY
);
2447 es
= NSStartSearchPathEnumeration(NSLibraryDirectory
, es
);
2449 while ((es
= NSGetNextSearchPathEnumeration(es
, nspath
))) {
2452 if (lus
.session_type
) {
2453 strcat(nspath
, "/LaunchAgents");
2455 strcat(nspath
, "/LaunchDaemons");
2458 if (glob(nspath
, GLOB_TILDE
|GLOB_NOSORT
, NULL
, &g
) == 0) {
2459 for (i
= 0; i
< g
.gl_pathc
; i
++) {
2460 readpath(g
.gl_pathv
[i
], &lus
);
2466 for (i
= 0; i
< (size_t)argc
; i
++) {
2467 readpath(argv
[i
], &lus
);
2470 if (launch_data_array_get_count(lus
.pass1
) == 0 &&
2471 launch_data_array_get_count(lus
.pass2
) == 0) {
2473 fprintf(stderr
, "nothing found to %s\n", lus
.load
? "load" : "unload");
2475 launch_data_free(lus
.pass1
);
2476 launch_data_free(lus
.pass2
);
2477 return is_managed
? 0 : 1;
2481 distill_jobs(lus
.pass1
);
2482 submit_job_pass(lus
.pass1
);
2483 distill_jobs(lus
.pass2
);
2484 submit_job_pass(lus
.pass2
);
2486 for (i
= 0; i
< launch_data_array_get_count(lus
.pass1
); i
++) {
2487 unloadjob(launch_data_array_get_index(lus
.pass1
, i
));
2489 for (i
= 0; i
< launch_data_array_get_count(lus
.pass2
); i
++) {
2490 unloadjob(launch_data_array_get_index(lus
.pass2
, i
));
2494 if (g_job_overrides_db_has_changed
) {
2495 WriteMyPropertyListToFile(g_job_overrides_db
, g_job_overrides_db_path
);
2498 flock(dbfd
, LOCK_UN
);
2504 submit_job_pass(launch_data_t jobs
)
2506 launch_data_t msg
, resp
;
2510 if (launch_data_array_get_count(jobs
) == 0)
2513 msg
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
2515 launch_data_dict_insert(msg
, jobs
, LAUNCH_KEY_SUBMITJOB
);
2517 resp
= launch_msg(msg
);
2520 switch (launch_data_get_type(resp
)) {
2521 case LAUNCH_DATA_ERRNO
:
2522 if ((e
= launch_data_get_errno(resp
)))
2523 fprintf(stderr
, "%s\n", strerror(e
));
2525 case LAUNCH_DATA_ARRAY
:
2526 for (i
= 0; i
< launch_data_array_get_count(jobs
); i
++) {
2527 launch_data_t obatind
= launch_data_array_get_index(resp
, i
);
2528 launch_data_t jatind
= launch_data_array_get_index(jobs
, i
);
2529 const char *lab4job
= launch_data_get_string(launch_data_dict_lookup(jatind
, LAUNCH_JOBKEY_LABEL
));
2530 if (LAUNCH_DATA_ERRNO
== launch_data_get_type(obatind
)) {
2531 e
= launch_data_get_errno(obatind
);
2534 fprintf(stderr
, "%s: %s\n", lab4job
, "Already loaded");
2537 fprintf(stderr
, "%s: %s\n", lab4job
, "Not loaded");
2540 fprintf(stderr
, "%s: %s\n", lab4job
, "Could not set security session");
2542 fprintf(stderr
, "%s: %s\n", lab4job
, strerror(e
));
2550 fprintf(stderr
, "unknown respose from launchd!\n");
2553 launch_data_free(resp
);
2555 fprintf(stderr
, "launch_msg(): %s\n", strerror(errno
));
2558 launch_data_free(msg
);
2562 start_stop_remove_cmd(int argc
, char *const argv
[])
2564 launch_data_t resp
, msg
;
2565 const char *lmsgcmd
= LAUNCH_KEY_STOPJOB
;
2568 if (0 == strcmp(argv
[0], "start"))
2569 lmsgcmd
= LAUNCH_KEY_STARTJOB
;
2571 if (0 == strcmp(argv
[0], "remove"))
2572 lmsgcmd
= LAUNCH_KEY_REMOVEJOB
;
2575 fprintf(stderr
, "usage: %s %s <job label>\n", getprogname(), argv
[0]);
2579 msg
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
2580 launch_data_dict_insert(msg
, launch_data_new_string(argv
[1]), lmsgcmd
);
2582 resp
= launch_msg(msg
);
2583 launch_data_free(msg
);
2586 fprintf(stderr
, "launch_msg(): %s\n", strerror(errno
));
2588 } else if (launch_data_get_type(resp
) == LAUNCH_DATA_ERRNO
) {
2589 if ((e
= launch_data_get_errno(resp
))) {
2590 fprintf(stderr
, "%s %s error: %s\n", getprogname(), argv
[0], strerror(e
));
2594 fprintf(stderr
, "%s %s returned unknown response\n", getprogname(), argv
[0]);
2598 launch_data_free(resp
);
2603 print_jobs(launch_data_t j
, const char *key
__attribute__((unused
)), void *context
__attribute__((unused
)))
2605 static size_t depth
= 0;
2606 launch_data_t lo
= launch_data_dict_lookup(j
, LAUNCH_JOBKEY_LABEL
);
2607 launch_data_t pido
= launch_data_dict_lookup(j
, LAUNCH_JOBKEY_PID
);
2608 launch_data_t stato
= launch_data_dict_lookup(j
, LAUNCH_JOBKEY_LASTEXITSTATUS
);
2609 const char *label
= launch_data_get_string(lo
);
2613 fprintf(stdout
, "%lld\t-\t", launch_data_get_integer(pido
));
2615 int wstatus
= (int)launch_data_get_integer(stato
);
2616 if (WIFEXITED(wstatus
)) {
2617 fprintf(stdout
, "-\t%d\t", WEXITSTATUS(wstatus
));
2618 } else if (WIFSIGNALED(wstatus
)) {
2619 fprintf(stdout
, "-\t-%d\t", WTERMSIG(wstatus
));
2621 fprintf(stdout
, "-\t???\t");
2624 fprintf(stdout
, "-\t-\t");
2626 for (i
= 0; i
< depth
; i
++)
2627 fprintf(stdout
, "\t");
2629 fprintf(stdout
, "%s\n", label
);
2633 print_obj(launch_data_t obj
, const char *key
, void *context
__attribute__((unused
)))
2635 static size_t indent
= 0;
2638 for (i
= 0; i
< indent
; i
++)
2639 fprintf(stdout
, "\t");
2642 fprintf(stdout
, "\"%s\" = ", key
);
2644 switch (launch_data_get_type(obj
)) {
2645 case LAUNCH_DATA_STRING
:
2646 fprintf(stdout
, "\"%s\";\n", launch_data_get_string(obj
));
2648 case LAUNCH_DATA_INTEGER
:
2649 fprintf(stdout
, "%lld;\n", launch_data_get_integer(obj
));
2651 case LAUNCH_DATA_REAL
:
2652 fprintf(stdout
, "%f;\n", launch_data_get_real(obj
));
2654 case LAUNCH_DATA_BOOL
:
2655 fprintf(stdout
, "%s;\n", launch_data_get_bool(obj
) ? "true" : "false");
2657 case LAUNCH_DATA_ARRAY
:
2658 c
= launch_data_array_get_count(obj
);
2659 fprintf(stdout
, "(\n");
2661 for (i
= 0; i
< c
; i
++)
2662 print_obj(launch_data_array_get_index(obj
, i
), NULL
, NULL
);
2664 for (i
= 0; i
< indent
; i
++)
2665 fprintf(stdout
, "\t");
2666 fprintf(stdout
, ");\n");
2668 case LAUNCH_DATA_DICTIONARY
:
2669 fprintf(stdout
, "{\n");
2671 launch_data_dict_iterate(obj
, print_obj
, NULL
);
2673 for (i
= 0; i
< indent
; i
++)
2674 fprintf(stdout
, "\t");
2675 fprintf(stdout
, "};\n");
2677 case LAUNCH_DATA_FD
:
2678 fprintf(stdout
, "file-descriptor-object;\n");
2680 case LAUNCH_DATA_MACHPORT
:
2681 fprintf(stdout
, "mach-port-object;\n");
2684 fprintf(stdout
, "???;\n");
2690 list_cmd(int argc
, char *const argv
[])
2692 launch_data_t resp
, msg
= NULL
;
2695 bool plist_output
= false;
2698 fprintf(stderr
, "usage: %s list [-x] [label]\n", getprogname());
2700 } else if (argc
>= 2) {
2701 plist_output
= ( strncmp(argv
[1], "-x", sizeof("-x")) == 0 );
2702 label
= plist_output
? argv
[2] : argv
[1];
2706 msg
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
2707 launch_data_dict_insert(msg
, launch_data_new_string(label
), LAUNCH_KEY_GETJOB
);
2709 resp
= launch_msg(msg
);
2710 launch_data_free(msg
);
2713 fprintf(stderr
, "launch_msg(): %s\n", strerror(errno
));
2715 } else if (launch_data_get_type(resp
) == LAUNCH_DATA_DICTIONARY
) {
2717 CFDictionaryRef respDict
= CFDictionaryCreateFromLaunchDictionary(resp
);
2718 CFStringRef plistStr
= NULL
;
2720 CFDataRef plistData
= CFPropertyListCreateXMLData(NULL
, (CFPropertyListRef
)respDict
);
2721 CFRelease(respDict
);
2723 plistStr
= CFStringCreateWithBytes(NULL
, CFDataGetBytePtr(plistData
), CFDataGetLength(plistData
), kCFStringEncodingUTF8
, false);
2724 CFRelease(plistData
);
2734 CFRelease(plistStr
);
2738 print_obj(resp
, NULL
, NULL
);
2741 launch_data_free(resp
);
2743 fprintf(stderr
, "%s %s returned unknown response\n", getprogname(), argv
[0]);
2745 launch_data_free(resp
);
2747 } else if (vproc_swap_complex(NULL
, VPROC_GSK_ALLJOBS
, NULL
, &resp
) == NULL
) {
2748 fprintf(stdout
, "PID\tStatus\tLabel\n");
2749 launch_data_dict_iterate(resp
, print_jobs
, NULL
);
2750 launch_data_free(resp
);
2759 stdio_cmd(int argc
__attribute__((unused
)), char *const argv
[])
2761 fprintf(stderr
, "%s %s: This sub-command no longer does anything\n", getprogname(), argv
[0]);
2766 fyi_cmd(int argc
, char *const argv
[])
2768 launch_data_t resp
, msg
;
2769 const char *lmsgk
= NULL
;
2773 fprintf(stderr
, "usage: %s %s\n", getprogname(), argv
[0]);
2777 if (!strcmp(argv
[0], "shutdown")) {
2778 lmsgk
= LAUNCH_KEY_SHUTDOWN
;
2779 } else if (!strcmp(argv
[0], "singleuser")) {
2780 lmsgk
= LAUNCH_KEY_SINGLEUSER
;
2785 msg
= launch_data_new_string(lmsgk
);
2786 resp
= launch_msg(msg
);
2787 launch_data_free(msg
);
2790 fprintf(stderr
, "launch_msg(): %s\n", strerror(errno
));
2792 } else if (launch_data_get_type(resp
) == LAUNCH_DATA_ERRNO
) {
2793 if ((e
= launch_data_get_errno(resp
))) {
2794 fprintf(stderr
, "%s %s error: %s\n", getprogname(), argv
[0], strerror(e
));
2798 fprintf(stderr
, "%s %s returned unknown response\n", getprogname(), argv
[0]);
2802 launch_data_free(resp
);
2808 logupdate_cmd(int argc
, char *const argv
[])
2810 int64_t inval
, outval
;
2811 bool badargs
= false, maskmode
= false, onlymode
= false, levelmode
= false;
2812 static const struct {
2816 { "debug", LOG_DEBUG
},
2817 { "info", LOG_INFO
},
2818 { "notice", LOG_NOTICE
},
2819 { "warning", LOG_WARNING
},
2820 { "error", LOG_ERR
},
2821 { "critical", LOG_CRIT
},
2822 { "alert", LOG_ALERT
},
2823 { "emergency", LOG_EMERG
},
2825 size_t i
, j
, logtblsz
= sizeof logtbl
/ sizeof logtbl
[0];
2829 if (!strcmp(argv
[1], "mask"))
2831 else if (!strcmp(argv
[1], "only"))
2833 else if (!strcmp(argv
[1], "level"))
2840 m
= LOG_UPTO(LOG_DEBUG
);
2842 if (argc
> 2 && (maskmode
|| onlymode
)) {
2843 for (i
= 2; i
< (size_t)argc
; i
++) {
2844 for (j
= 0; j
< logtblsz
; j
++) {
2845 if (!strcmp(argv
[i
], logtbl
[j
].name
)) {
2847 m
&= ~(LOG_MASK(logtbl
[j
].level
));
2849 m
|= LOG_MASK(logtbl
[j
].level
);
2853 if (j
== logtblsz
) {
2858 } else if (argc
> 2 && levelmode
) {
2859 for (j
= 0; j
< logtblsz
; j
++) {
2860 if (!strcmp(argv
[2], logtbl
[j
].name
)) {
2861 m
= LOG_UPTO(logtbl
[j
].level
);
2867 } else if (argc
!= 1) {
2872 fprintf(stderr
, "usage: %s [[mask loglevels...] | [only loglevels...] [level loglevel]]\n", getprogname());
2878 if (vproc_swap_integer(NULL
, VPROC_GSK_GLOBAL_LOG_MASK
, argc
!= 1 ? &inval
: NULL
, &outval
) == NULL
) {
2880 for (j
= 0; j
< logtblsz
; j
++) {
2881 if (outval
& LOG_MASK(logtbl
[j
].level
)) {
2882 fprintf(stdout
, "%s ", logtbl
[j
].name
);
2885 fprintf(stdout
, "\n");
2893 static const struct {
2897 { "cpu", RLIMIT_CPU
},
2898 { "filesize", RLIMIT_FSIZE
},
2899 { "data", RLIMIT_DATA
},
2900 { "stack", RLIMIT_STACK
},
2901 { "core", RLIMIT_CORE
},
2902 { "rss", RLIMIT_RSS
},
2903 { "memlock", RLIMIT_MEMLOCK
},
2904 { "maxproc", RLIMIT_NPROC
},
2905 { "maxfiles", RLIMIT_NOFILE
}
2908 static const size_t limlookupcnt
= sizeof limlookup
/ sizeof limlookup
[0];
2911 name2num(const char *n
)
2915 for (i
= 0; i
< limlookupcnt
; i
++) {
2916 if (!strcmp(limlookup
[i
].name
, n
)) {
2917 return limlookup
[i
].lim
;
2928 for (i
= 0; i
< limlookupcnt
; i
++) {
2929 if (limlookup
[i
].lim
== n
)
2930 return limlookup
[i
].name
;
2936 lim2str(rlim_t val
, char *buf
)
2938 if (val
== RLIM_INFINITY
)
2939 strcpy(buf
, "unlimited");
2941 sprintf(buf
, "%lld", val
);
2946 str2lim(const char *buf
, rlim_t
*res
)
2949 *res
= strtoll(buf
, &endptr
, 10);
2950 if (!strcmp(buf
, "unlimited")) {
2951 *res
= RLIM_INFINITY
;
2953 } else if (*endptr
== '\0') {
2960 limit_cmd(int argc
, char *const argv
[])
2964 struct rlimit
*lmts
= NULL
;
2965 launch_data_t resp
, resp1
= NULL
, msg
, tmp
;
2969 rlim_t slim
= -1, hlim
= -1;
2970 bool badargs
= false;
2975 if (argc
>= 3 && str2lim(argv
[2], &slim
))
2980 if (argc
== 4 && str2lim(argv
[3], &hlim
))
2983 if (argc
>= 2 && -1 == (which
= name2num(argv
[1])))
2987 fprintf(stderr
, "usage: %s %s [", getprogname(), argv
[0]);
2988 for (i
= 0; i
< limlookupcnt
; i
++)
2989 fprintf(stderr
, "%s %s", limlookup
[i
].name
, (i
+ 1) == limlookupcnt
? "" : "| ");
2990 fprintf(stderr
, "[both | soft hard]]\n");
2994 msg
= launch_data_new_string(LAUNCH_KEY_GETRESOURCELIMITS
);
2995 resp
= launch_msg(msg
);
2996 launch_data_free(msg
);
2999 fprintf(stderr
, "launch_msg(): %s\n", strerror(errno
));
3001 } else if (launch_data_get_type(resp
) == LAUNCH_DATA_OPAQUE
) {
3002 lmts
= launch_data_get_opaque(resp
);
3003 lsz
= launch_data_get_opaque_size(resp
);
3005 for (i
= 0; i
< (lsz
/ sizeof(struct rlimit
)); i
++) {
3006 if (argc
== 2 && (size_t)which
!= i
)
3008 fprintf(stdout
, "\t%-12s%-15s%-15s\n", num2name((int)i
),
3009 lim2str(lmts
[i
].rlim_cur
, slimstr
),
3010 lim2str(lmts
[i
].rlim_max
, hlimstr
));
3013 } else if (launch_data_get_type(resp
) == LAUNCH_DATA_STRING
) {
3014 fprintf(stderr
, "%s %s error: %s\n", getprogname(), argv
[0], launch_data_get_string(resp
));
3017 fprintf(stderr
, "%s %s returned unknown response\n", getprogname(), argv
[0]);
3021 if (argc
<= 2 || r
!= 0) {
3022 launch_data_free(resp
);
3028 lmts
[which
].rlim_cur
= slim
;
3029 lmts
[which
].rlim_max
= hlim
;
3031 bool maxfiles_exceeded
= false;
3032 if (strncmp(argv
[1], "maxfiles", sizeof("maxfiles")) == 0) {
3034 maxfiles_exceeded
= ( strncmp(argv
[2], "unlimited", sizeof("unlimited")) == 0 );
3038 maxfiles_exceeded
= ( maxfiles_exceeded
|| strncmp(argv
[3], "unlimited", sizeof("unlimited")) == 0 );
3041 if (maxfiles_exceeded
) {
3042 fprintf(stderr
, "Neither the hard nor soft limit for \"maxfiles\" can be unlimited. Please use a numeric parameter for both.\n");
3047 msg
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
3048 tmp
= launch_data_new_opaque(lmts
, lsz
);
3049 launch_data_dict_insert(msg
, tmp
, LAUNCH_KEY_SETRESOURCELIMITS
);
3050 resp
= launch_msg(msg
);
3051 launch_data_free(msg
);
3054 fprintf(stderr
, "launch_msg(): %s\n", strerror(errno
));
3056 } else if (launch_data_get_type(resp
) == LAUNCH_DATA_STRING
) {
3057 fprintf(stderr
, "%s %s error: %s\n", getprogname(), argv
[0], launch_data_get_string(resp
));
3059 } else if (launch_data_get_type(resp
) != LAUNCH_DATA_OPAQUE
) {
3060 fprintf(stderr
, "%s %s returned unknown response\n", getprogname(), argv
[0]);
3064 launch_data_free(resp
);
3065 launch_data_free(resp1
);
3071 umask_cmd(int argc
, char *const argv
[])
3073 bool badargs
= false;
3076 int64_t inval
, outval
;
3079 m
= strtol(argv
[1], &endptr
, 8);
3080 if (*endptr
!= '\0' || m
> 0777)
3084 if (argc
> 2 || badargs
) {
3085 fprintf(stderr
, "usage: %s %s <mask>\n", getprogname(), argv
[0]);
3091 if (vproc_swap_integer(NULL
, VPROC_GSK_GLOBAL_UMASK
, argc
== 2 ? &inval
: NULL
, &outval
) == NULL
) {
3093 fprintf(stdout
, "%o\n", (unsigned int)outval
);
3102 setup_system_context(void)
3104 if (getenv(LAUNCHD_SOCKET_ENV
)) {
3108 if (getenv(LAUNCH_ENV_KEEPCONTEXT
)) {
3112 if (geteuid() != 0) {
3113 fprintf(stderr
, "You must be the root user to perform this operation.\n");
3117 /* Use the system launchd's socket. */
3118 setenv("__USE_SYSTEM_LAUNCHD", "1", 0);
3120 /* Put ourselves in the system launchd's bootstrap. */
3121 mach_port_t rootbs
= str2bsport("/");
3122 mach_port_deallocate(mach_task_self(), bootstrap_port
);
3123 task_set_bootstrap_port(mach_task_self(), rootbs
);
3124 bootstrap_port
= rootbs
;
3128 submit_cmd(int argc
, char *const argv
[])
3130 launch_data_t msg
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
3131 launch_data_t job
= launch_data_alloc(LAUNCH_DATA_DICTIONARY
);
3132 launch_data_t resp
, largv
= launch_data_alloc(LAUNCH_DATA_ARRAY
);
3135 launch_data_dict_insert(job
, launch_data_new_bool(false), LAUNCH_JOBKEY_ONDEMAND
);
3137 while ((ch
= getopt(argc
, argv
, "l:p:o:e:")) != -1) {
3140 launch_data_dict_insert(job
, launch_data_new_string(optarg
), LAUNCH_JOBKEY_LABEL
);
3143 launch_data_dict_insert(job
, launch_data_new_string(optarg
), LAUNCH_JOBKEY_PROGRAM
);
3146 launch_data_dict_insert(job
, launch_data_new_string(optarg
), LAUNCH_JOBKEY_STANDARDOUTPATH
);
3149 launch_data_dict_insert(job
, launch_data_new_string(optarg
), LAUNCH_JOBKEY_STANDARDERRORPATH
);
3152 fprintf(stderr
, "usage: %s submit ...\n", getprogname());
3159 for (i
= 0; argv
[i
]; i
++) {
3160 launch_data_array_append(largv
, launch_data_new_string(argv
[i
]));
3163 launch_data_dict_insert(job
, largv
, LAUNCH_JOBKEY_PROGRAMARGUMENTS
);
3165 launch_data_dict_insert(msg
, job
, LAUNCH_KEY_SUBMITJOB
);
3167 resp
= launch_msg(msg
);
3168 launch_data_free(msg
);
3171 fprintf(stderr
, "launch_msg(): %s\n", strerror(errno
));
3173 } else if (launch_data_get_type(resp
) == LAUNCH_DATA_ERRNO
) {
3174 errno
= launch_data_get_errno(resp
);
3176 fprintf(stderr
, "%s %s error: %s\n", getprogname(), argv
[0], strerror(errno
));
3180 fprintf(stderr
, "%s %s error: %s\n", getprogname(), argv
[0], "unknown response");
3183 launch_data_free(resp
);
3189 getrusage_cmd(int argc
, char *const argv
[])
3191 launch_data_t resp
, msg
;
3192 bool badargs
= false;
3197 else if (strcmp(argv
[1], "self") && strcmp(argv
[1], "children"))
3201 fprintf(stderr
, "usage: %s %s self | children\n", getprogname(), argv
[0]);
3205 if (!strcmp(argv
[1], "self")) {
3206 msg
= launch_data_new_string(LAUNCH_KEY_GETRUSAGESELF
);
3208 msg
= launch_data_new_string(LAUNCH_KEY_GETRUSAGECHILDREN
);
3211 resp
= launch_msg(msg
);
3212 launch_data_free(msg
);
3215 fprintf(stderr
, "launch_msg(): %s\n", strerror(errno
));
3217 } else if (launch_data_get_type(resp
) == LAUNCH_DATA_ERRNO
) {
3218 fprintf(stderr
, "%s %s error: %s\n", getprogname(), argv
[0], strerror(launch_data_get_errno(resp
)));
3220 } else if (launch_data_get_type(resp
) == LAUNCH_DATA_OPAQUE
) {
3221 struct rusage
*rusage
= launch_data_get_opaque(resp
);
3222 fprintf(stdout
, "\t%-10f\tuser time used\n",
3223 (double)rusage
->ru_utime
.tv_sec
+ (double)rusage
->ru_utime
.tv_usec
/ (double)1000000);
3224 fprintf(stdout
, "\t%-10f\tsystem time used\n",
3225 (double)rusage
->ru_stime
.tv_sec
+ (double)rusage
->ru_stime
.tv_usec
/ (double)1000000);
3226 fprintf(stdout
, "\t%-10ld\tmax resident set size\n", rusage
->ru_maxrss
);
3227 fprintf(stdout
, "\t%-10ld\tshared text memory size\n", rusage
->ru_ixrss
);
3228 fprintf(stdout
, "\t%-10ld\tunshared data size\n", rusage
->ru_idrss
);
3229 fprintf(stdout
, "\t%-10ld\tunshared stack size\n", rusage
->ru_isrss
);
3230 fprintf(stdout
, "\t%-10ld\tpage reclaims\n", rusage
->ru_minflt
);
3231 fprintf(stdout
, "\t%-10ld\tpage faults\n", rusage
->ru_majflt
);
3232 fprintf(stdout
, "\t%-10ld\tswaps\n", rusage
->ru_nswap
);
3233 fprintf(stdout
, "\t%-10ld\tblock input operations\n", rusage
->ru_inblock
);
3234 fprintf(stdout
, "\t%-10ld\tblock output operations\n", rusage
->ru_oublock
);
3235 fprintf(stdout
, "\t%-10ld\tmessages sent\n", rusage
->ru_msgsnd
);
3236 fprintf(stdout
, "\t%-10ld\tmessages received\n", rusage
->ru_msgrcv
);
3237 fprintf(stdout
, "\t%-10ld\tsignals received\n", rusage
->ru_nsignals
);
3238 fprintf(stdout
, "\t%-10ld\tvoluntary context switches\n", rusage
->ru_nvcsw
);
3239 fprintf(stdout
, "\t%-10ld\tinvoluntary context switches\n", rusage
->ru_nivcsw
);
3241 fprintf(stderr
, "%s %s returned unknown response\n", getprogname(), argv
[0]);
3245 launch_data_free(resp
);
3251 launch_data_array_append(launch_data_t a
, launch_data_t o
)
3253 size_t offt
= launch_data_array_get_count(a
);
3255 return launch_data_array_set_index(a
, o
, offt
);
3259 str2bsport(const char *s
)
3261 bool getrootbs
= strcmp(s
, "/") == 0;
3262 mach_port_t last_bport
, bport
= bootstrap_port
;
3263 task_t task
= mach_task_self();
3264 kern_return_t result
;
3266 if (strcmp(s
, "..") == 0 || getrootbs
) {
3269 result
= bootstrap_parent(last_bport
, &bport
);
3271 if (result
== BOOTSTRAP_NOT_PRIVILEGED
) {
3272 fprintf(stderr
, "Permission denied\n");
3274 } else if (result
!= BOOTSTRAP_SUCCESS
) {
3275 fprintf(stderr
, "bootstrap_parent() %d\n", result
);
3278 } while (getrootbs
&& last_bport
!= bport
);
3279 } else if (strcmp(s
, "0") == 0 || strcmp(s
, "NULL") == 0) {
3280 bport
= MACH_PORT_NULL
;
3284 result
= task_for_pid(mach_task_self(), pid
, &task
);
3286 if (result
!= KERN_SUCCESS
) {
3287 fprintf(stderr
, "task_for_pid() %s\n", mach_error_string(result
));
3291 result
= task_get_bootstrap_port(task
, &bport
);
3293 if (result
!= KERN_SUCCESS
) {
3294 fprintf(stderr
, "Couldn't get bootstrap port: %s\n", mach_error_string(result
));
3303 bsexec_cmd(int argc
, char *const argv
[])
3305 kern_return_t result
;
3309 fprintf(stderr
, "usage: %s bsexec <PID> prog...\n", getprogname());
3313 bport
= str2bsport(argv
[1]);
3315 result
= task_set_bootstrap_port(mach_task_self(), bport
);
3317 if (result
!= KERN_SUCCESS
) {
3318 fprintf(stderr
, "Couldn't switch to new bootstrap port: %s\n", mach_error_string(result
));
3325 setenv(LAUNCH_ENV_KEEPCONTEXT
, "1", 1);
3326 if (fwexec((const char *const *)argv
+ 2, NULL
) == -1) {
3327 fprintf(stderr
, "%s bsexec failed: %s\n", getprogname(), strerror(errno
));
3335 _bslist_cmd(mach_port_t bport
, unsigned int depth
, bool show_job
, bool local_only
)
3337 kern_return_t result
;
3338 name_array_t service_names
;
3339 name_array_t service_jobs
;
3340 mach_msg_type_number_t service_cnt
, service_jobs_cnt
, service_active_cnt
;
3341 bootstrap_status_array_t service_actives
;
3344 if (bport
== MACH_PORT_NULL
) {
3345 fprintf(stderr
, "Invalid bootstrap port\n");
3350 flags
|= local_only
? BOOTSTRAP_FORCE_LOCAL
: 0;
3351 result
= bootstrap_info(bport
, &service_names
, &service_cnt
, &service_jobs
, &service_jobs_cnt
, &service_actives
, &service_active_cnt
, flags
);
3352 if (result
!= BOOTSTRAP_SUCCESS
) {
3353 fprintf(stderr
, "bootstrap_info(): %d\n", result
);
3357 #define bport_state(x) (((x) == BOOTSTRAP_STATUS_ACTIVE) ? "A" : ((x) == BOOTSTRAP_STATUS_ON_DEMAND) ? "D" : "I")
3359 for (i
= 0; i
< service_cnt
; i
++) {
3360 fprintf(stdout
, "%*s%-3s%s", depth
, "", bport_state((service_actives
[i
])), service_names
[i
]);
3362 fprintf(stdout
, " (%s)", service_jobs
[i
]);
3364 fprintf(stdout
, "\n");
3371 bslist_cmd(int argc
, char *const argv
[])
3373 mach_port_t bport
= bootstrap_port
;
3374 bool show_jobs
= false;
3375 if (argc
> 2 && strcmp(argv
[2], "-j") == 0) {
3381 bport
= str2bsport(argv
[1]);
3382 } else if (strcmp(argv
[1], "-j") == 0) {
3387 if (bport
== MACH_PORT_NULL
) {
3388 fprintf(stderr
, "Invalid bootstrap port\n");
3392 return _bslist_cmd(bport
, 0, show_jobs
, false);
3396 _bstree_cmd(mach_port_t bsport
, unsigned int depth
, bool show_jobs
)
3398 if (bsport
== MACH_PORT_NULL
) {
3399 fprintf(stderr
, "No root port!\n");
3403 mach_port_array_t child_ports
= NULL
;
3404 name_array_t child_names
= NULL
;
3405 bootstrap_property_array_t child_props
= NULL
;
3406 unsigned int cnt
= 0;
3408 kern_return_t kr
= bootstrap_lookup_children(bsport
, &child_ports
, &child_names
, &child_props
, (mach_msg_type_number_t
*)&cnt
);
3409 if (kr
!= BOOTSTRAP_SUCCESS
&& kr
!= BOOTSTRAP_NO_CHILDREN
) {
3410 if (kr
== BOOTSTRAP_NOT_PRIVILEGED
) {
3411 fprintf(stderr
, "You must be root to perform this operation.\n");
3413 fprintf(stderr
, "bootstrap_lookup_children(): %d\n", kr
);
3420 _bslist_cmd(bsport
, depth
, show_jobs
, true);
3422 for (i
= 0; i
< cnt
; i
++) {
3424 if (child_props
[i
] & BOOTSTRAP_PROPERTY_PERUSER
) {
3426 } else if (child_props
[i
] & BOOTSTRAP_PROPERTY_EXPLICITSUBSET
) {
3427 type
= "Explicit Subset";
3428 } else if (child_props
[i
] & BOOTSTRAP_PROPERTY_IMPLICITSUBSET
) {
3429 type
= "Implicit Subset";
3430 } else if (child_props
[i
] & BOOTSTRAP_PROPERTY_MOVEDSUBSET
) {
3431 type
= "Moved Subset";
3432 } else if (child_props
[i
] & BOOTSTRAP_PROPERTY_XPC_SINGLETON
) {
3433 type
= "XPC Singleton Domain";
3434 } else if (child_props
[i
] & BOOTSTRAP_PROPERTY_XPC_DOMAIN
) {
3435 type
= "XPC Private Domain";
3440 fprintf(stdout
, "%*s%s (%s)/\n", depth
, "", child_names
[i
], type
);
3441 if (child_ports
[i
] != MACH_PORT_NULL
) {
3442 _bstree_cmd(child_ports
[i
], depth
+ 4, show_jobs
);
3450 bstree_cmd(int argc
, char * const argv
[])
3452 bool show_jobs
= false;
3453 if (geteuid() != 0) {
3454 fprintf(stderr
, "You must be root to perform this operation.\n");
3457 if (argc
== 2 && strcmp(argv
[1], "-j") == 0) {
3460 fprintf(stdout
, "System/\n");
3463 return _bstree_cmd(str2bsport("/"), 4, show_jobs
);
3467 managerpid_cmd(int argc
__attribute__((unused
)), char * const argv
[] __attribute__((unused
)))
3469 int64_t manager_pid
= 0;
3470 vproc_err_t verr
= vproc_swap_integer(NULL
, VPROC_GSK_MGR_PID
, NULL
, (int64_t *)&manager_pid
);
3472 fprintf(stdout
, "Unknown job manager!\n");
3476 fprintf(stdout
, "%d\n", (pid_t
)manager_pid
);
3481 manageruid_cmd(int argc
__attribute__((unused
)), char * const argv
[] __attribute__((unused
)))
3483 int64_t manager_uid
= 0;
3484 vproc_err_t verr
= vproc_swap_integer(NULL
, VPROC_GSK_MGR_UID
, NULL
, (int64_t *)&manager_uid
);
3486 fprintf(stdout
, "Unknown job manager!\n");
3490 fprintf(stdout
, "%lli\n", manager_uid
);
3495 managername_cmd(int argc
__attribute__((unused
)), char * const argv
[] __attribute__((unused
)))
3497 char *manager_name
= NULL
;
3498 vproc_err_t verr
= vproc_swap_string(NULL
, VPROC_GSK_MGR_NAME
, NULL
, &manager_name
);
3500 fprintf(stdout
, "Unknown job manager!\n");
3504 fprintf(stdout
, "%s\n", manager_name
);
3511 asuser_cmd(int argc
, char * const argv
[])
3513 /* This code plays fast and loose with Mach ports. Do NOT use it as any sort
3514 * of reference for port handling. Or really anything else in this file.
3516 uid_t req_uid
= (uid_t
)-2;
3518 req_uid
= atoi(argv
[1]);
3519 if (req_uid
== (uid_t
)-2) {
3520 fprintf(stderr
, "You cannot run a command nobody.\n");
3524 fprintf(stderr
, "Usage: launchctl asuser <UID> <command> [arguments...].\n");
3528 if (geteuid() != 0) {
3529 fprintf(stderr
, "You must be root to run a command as another user.\n");
3533 mach_port_t rbs
= MACH_PORT_NULL
;
3534 kern_return_t kr
= bootstrap_get_root(bootstrap_port
, &rbs
);
3535 if (kr
!= BOOTSTRAP_SUCCESS
) {
3536 fprintf(stderr
, "bootstrap_get_root(): %u\n", kr
);
3540 mach_port_t bp
= MACH_PORT_NULL
;
3541 kr
= bootstrap_look_up_per_user(rbs
, NULL
, req_uid
, &bp
);
3542 if (kr
!= BOOTSTRAP_SUCCESS
) {
3543 fprintf(stderr
, "bootstrap_look_up_per_user(): %u\n", kr
);
3547 bootstrap_port
= bp
;
3548 kr
= task_set_bootstrap_port(mach_task_self(), bp
);
3549 if (kr
!= KERN_SUCCESS
) {
3550 fprintf(stderr
, "task_set_bootstrap_port(): 0x%x: %s\n", kr
, mach_error_string(kr
));
3556 kr
= _vprocmgr_getsocket(sockpath
);
3557 if (kr
!= BOOTSTRAP_SUCCESS
) {
3558 fprintf(stderr
, "_vprocmgr_getsocket(): %u\n", kr
);
3562 setenv(LAUNCHD_SOCKET_ENV
, sockpath
, 1);
3563 setenv(LAUNCH_ENV_KEEPCONTEXT
, "1", 1);
3564 if (fwexec((const char *const *)argv
+ 2, NULL
) == -1) {
3565 fprintf(stderr
, "Couldn't spawn command: %s\n", argv
[2]);
3573 _log_launchctl_bug(const char *rcs_rev
, const char *path
, unsigned int line
, const char *test
)
3575 int saved_errno
= errno
;
3577 const char *file
= strrchr(path
, '/');
3578 char *rcs_rev_tmp
= strchr(rcs_rev
, ' ');
3587 strlcpy(buf
, rcs_rev
, sizeof(buf
));
3589 strlcpy(buf
, rcs_rev_tmp
+ 1, sizeof(buf
));
3590 rcs_rev_tmp
= strchr(buf
, ' ');
3592 *rcs_rev_tmp
= '\0';
3595 fprintf(stderr
, "Bug: %s:%u (%s):%u: %s\n", file
, line
, buf
, saved_errno
, test
);
3599 loopback_setup_ipv4(void)
3601 struct ifaliasreq ifra
;
3605 memset(&ifr
, 0, sizeof(ifr
));
3606 strcpy(ifr
.ifr_name
, "lo0");
3608 if ((s
= socket(AF_INET
, SOCK_DGRAM
, 0)) == -1)
3611 if (assumes(ioctl(s
, SIOCGIFFLAGS
, &ifr
) != -1)) {
3612 ifr
.ifr_flags
|= IFF_UP
;
3613 (void)assumes(ioctl(s
, SIOCSIFFLAGS
, &ifr
) != -1);
3616 memset(&ifra
, 0, sizeof(ifra
));
3617 strcpy(ifra
.ifra_name
, "lo0");
3618 ((struct sockaddr_in
*)&ifra
.ifra_addr
)->sin_family
= AF_INET
;
3619 ((struct sockaddr_in
*)&ifra
.ifra_addr
)->sin_addr
.s_addr
= htonl(INADDR_LOOPBACK
);
3620 ((struct sockaddr_in
*)&ifra
.ifra_addr
)->sin_len
= sizeof(struct sockaddr_in
);
3621 ((struct sockaddr_in
*)&ifra
.ifra_mask
)->sin_family
= AF_INET
;
3622 ((struct sockaddr_in
*)&ifra
.ifra_mask
)->sin_addr
.s_addr
= htonl(IN_CLASSA_NET
);
3623 ((struct sockaddr_in
*)&ifra
.ifra_mask
)->sin_len
= sizeof(struct sockaddr_in
);
3625 (void)assumes(ioctl(s
, SIOCAIFADDR
, &ifra
) != -1);
3627 (void)assumes(close(s
) == 0);
3631 loopback_setup_ipv6(void)
3633 struct in6_aliasreq ifra6
;
3637 memset(&ifr
, 0, sizeof(ifr
));
3638 strcpy(ifr
.ifr_name
, "lo0");
3640 if ((s6
= socket(AF_INET6
, SOCK_DGRAM
, 0)) == -1)
3643 memset(&ifr
, 0, sizeof(ifr
));
3644 strcpy(ifr
.ifr_name
, "lo0");
3646 if (assumes(ioctl(s6
, SIOCGIFFLAGS
, &ifr
) != -1)) {
3647 ifr
.ifr_flags
|= IFF_UP
;
3648 (void)assumes(ioctl(s6
, SIOCSIFFLAGS
, &ifr
) != -1);
3651 memset(&ifra6
, 0, sizeof(ifra6
));
3652 strcpy(ifra6
.ifra_name
, "lo0");
3654 ifra6
.ifra_addr
.sin6_family
= AF_INET6
;
3655 ifra6
.ifra_addr
.sin6_addr
= in6addr_loopback
;
3656 ifra6
.ifra_addr
.sin6_len
= sizeof(struct sockaddr_in6
);
3657 ifra6
.ifra_prefixmask
.sin6_family
= AF_INET6
;
3658 memset(&ifra6
.ifra_prefixmask
.sin6_addr
, 0xff, sizeof(struct in6_addr
));
3659 ifra6
.ifra_prefixmask
.sin6_len
= sizeof(struct sockaddr_in6
);
3660 ifra6
.ifra_lifetime
.ia6t_vltime
= ND6_INFINITE_LIFETIME
;
3661 ifra6
.ifra_lifetime
.ia6t_pltime
= ND6_INFINITE_LIFETIME
;
3663 if (ioctl(s6
, SIOCAIFADDR_IN6
, &ifra6
) == -1) {
3664 (void)assumes(errno
== EEXIST
);
3667 (void)assumes(close(s6
) == 0);
3671 fwexec(const char *const *argv
, int *wstatus
)
3676 /* We'd use posix_spawnp(), but we want to workaround: 6288899 */
3677 if ((p
= vfork()) == -1) {
3679 } else if (p
== 0) {
3680 execvp(argv
[0], (char *const *)argv
);
3681 _exit(EXIT_FAILURE
);
3684 if (waitpid(p
, wstatus
? wstatus
: &wstatus2
, 0) == -1) {
3690 } else if (WIFEXITED(wstatus2
) && WEXITSTATUS(wstatus2
) == EXIT_SUCCESS
) {
3698 do_potential_fsck(void)
3700 const char *safe_fsck_tool
[] = { "fsck", "-fy", NULL
};
3701 const char *fsck_tool
[] = { "fsck", "-q", NULL
};
3702 const char *remount_tool
[] = { "mount", "-uw", "/", NULL
};
3703 #if TARGET_OS_EMBEDDED
3704 const char *nvram_tool
[] = { "/usr/sbin/nvram", "auto-boot=false", NULL
};
3705 #endif /* TARGET_OS_EMBEDDED */
3708 if (!assumes(statfs("/", &sfs
) != -1)) {
3712 if (!(sfs
.f_flags
& MNT_RDONLY
)) {
3716 if (!is_safeboot()) {
3718 /* We have disabled this block for now. We need to revisit this optimization after Leopard. */
3719 if (sfs
.f_flags
& MNT_JOURNALED
) {
3723 fprintf(stdout
, "Running fsck on the boot volume...\n");
3724 if (fwexec(fsck_tool
, NULL
) != -1) {
3729 fprintf(stdout
, "Running safe fsck on the boot volume...\n");
3730 if (fwexec(safe_fsck_tool
, NULL
) != -1) {
3734 fprintf(stdout
, "fsck failed!\n");
3736 /* someday, we should keep booting read-only, but as of today, other sub-systems cannot handle that scenario */
3737 #if TARGET_OS_EMBEDDED
3738 (void)assumes(fwexec(nvram_tool
, NULL
) != -1);
3739 (void)assumes(reboot(RB_AUTOBOOT
) != -1);
3741 (void)assumes(reboot(RB_HALT
) != -1);
3747 * Once this is fixed:
3749 * <rdar://problem/3948774> Mount flag updates should be possible with NULL as the forth argument to mount()
3751 * We can then do this one system call instead of calling out a full blown process.
3753 * assumes(mount(sfs.f_fstypename, "/", MNT_UPDATE, NULL) != -1);
3755 #if TARGET_OS_EMBEDDED
3756 if (path_check("/etc/fstab")) {
3757 const char *mount_tool
[] = { "mount", "-vat", "nonfs", NULL
};
3758 if (!assumes(fwexec(mount_tool
, NULL
) != -1)) {
3759 (void)assumes(fwexec(nvram_tool
, NULL
) != -1);
3760 (void)assumes(reboot(RB_AUTOBOOT
) != -1);
3765 (void)assumes(fwexec(remount_tool
, NULL
) != -1);
3768 fix_bogus_file_metadata();
3772 fix_bogus_file_metadata(void)
3774 static const struct {
3778 const mode_t needed_bits
;
3779 const mode_t bad_bits
;
3782 { "/sbin/launchd", 0, 0, S_IRUSR
|S_IXUSR
|S_IRGRP
|S_IXGRP
|S_IROTH
|S_IXOTH
, S_ISUID
|S_ISGID
|S_ISVTX
|S_IWOTH
, false },
3783 { _PATH_TMP
, 0, 0, S_ISTXT
|S_IRWXU
|S_IRWXG
|S_IRWXO
, S_ISUID
|S_ISGID
, true },
3784 { _PATH_VARTMP
, 0, 0, S_ISTXT
|S_IRWXU
|S_IRWXG
|S_IRWXO
, S_ISUID
|S_ISGID
, true },
3785 { "/var/folders", 0, 0, S_IRWXU
| S_IRGRP
| S_IXGRP
| S_IROTH
| S_IXOTH
, S_ISUID
| S_ISGID
, true },
3786 { LAUNCHD_DB_PREFIX
, 0, 0, S_IRWXU
| S_IRGRP
| S_IXGRP
| S_IROTH
| S_IXOTH
, S_IWGRP
| S_IWOTH
, true },
3787 { LAUNCHD_DB_PREFIX
"/com.apple.launchd", 0, 0, S_IRWXU
| S_IRGRP
| S_IXGRP
| S_IROTH
| S_IXOTH
, S_IWGRP
| S_IWOTH
, true },
3788 // Fixing <rdar://problem/7571633>.
3789 { _PATH_VARDB
, 0, 0, S_IRWXU
| S_IRGRP
| S_IXGRP
| S_IROTH
| S_IXOTH
, S_IWGRP
| S_IWOTH
| S_ISUID
| S_ISGID
, true },
3790 { _PATH_VARDB
"mds/", 0, 0, S_IRWXU
| S_IRGRP
| S_IXGRP
| S_IROTH
| S_IXOTH
, S_IWGRP
| S_IWOTH
| S_ISUID
| S_ISGID
, true },
3791 #if !TARGET_OS_EMBEDDED
3792 // Similar fix for <rdar://problem/6550172>.
3793 { "/Library/StartupItems", 0, 0, S_IRWXU
| S_IRGRP
| S_IXGRP
| S_IROTH
| S_IXOTH
, S_IWGRP
| S_IWOTH
| S_ISUID
| S_ISGID
, true },
3799 for (i
= 0; i
< (sizeof(f
) / sizeof(f
[0])); i
++) {
3800 mode_t i_needed_bits
;
3802 bool fix_mode
= false;
3803 bool fix_id
= false;
3805 if (!assumes(stat(f
[i
].path
, &sb
) != -1)) {
3806 fprintf(stdout
, "Crucial filesystem check: Path not present: %s. %s\n", f
[i
].path
, f
[i
].create
? "Will create." : "");
3808 if (!assumes(mkdir(f
[i
].path
, f
[i
].needed_bits
) != -1)) {
3810 } else if (!assumes(stat(f
[i
].path
, &sb
) != -1)) {
3818 i_needed_bits
= ~sb
.st_mode
& f
[i
].needed_bits
;
3819 i_bad_bits
= sb
.st_mode
& f
[i
].bad_bits
;
3822 fprintf(stderr
, "Crucial filesystem check: Removing bogus mode bits 0%o on path: %s\n", i_bad_bits
, f
[i
].path
);
3825 if (i_needed_bits
) {
3826 fprintf(stderr
, "Crucial filesystem check: Adding missing mode bits 0%o on path: %s\n", i_needed_bits
, f
[i
].path
);
3829 if (sb
.st_uid
!= f
[i
].owner
) {
3830 fprintf(stderr
, "Crucial filesystem check: Fixing bogus UID %u on path: %s\n", sb
.st_uid
, f
[i
].path
);
3833 if (sb
.st_gid
!= f
[i
].group
) {
3834 fprintf(stderr
, "Crucial filesystem check: Fixing bogus GID %u on path: %s\n", sb
.st_gid
, f
[i
].path
);
3839 (void)assumes(chmod(f
[i
].path
, (sb
.st_mode
& ~i_bad_bits
) | i_needed_bits
) != -1);
3842 (void)assumes(chown(f
[i
].path
, f
[i
].owner
, f
[i
].group
) != -1);
3849 path_check(const char *path
)
3853 if (stat(path
, &sb
) == 0)
3861 int sbmib
[] = { CTL_KERN
, KERN_SAFEBOOT
};
3863 size_t sbsz
= sizeof(sb
);
3865 if (!assumes(sysctl(sbmib
, 2, &sb
, &sbsz
, NULL
, 0) == 0))
3874 int nbmib
[] = { CTL_KERN
, KERN_NETBOOT
};
3876 size_t nbsz
= sizeof(nb
);
3878 if (!assumes(sysctl(nbmib
, 2, &nb
, &nbsz
, NULL
, 0) == 0))
3885 empty_dir(const char *thedir
, struct stat
*psb
)
3894 if (!assumes(lstat(thedir
, psb
) != -1)) {
3899 if (!assumes((currend_dir_fd
= open(".", 0)) != -1)) {
3903 if (!assumes(chdir(thedir
) != -1)) {
3907 if (!assumes(od
= opendir("."))) {
3911 while ((de
= readdir(od
))) {
3914 if (strcmp(de
->d_name
, ".") == 0) {
3918 if (strcmp(de
->d_name
, "..") == 0) {
3922 if (!assumes(lstat(de
->d_name
, &sb
) != -1)) {
3926 if (psb
->st_dev
!= sb
.st_dev
) {
3927 (void)assumes(unmount(de
->d_name
, MNT_FORCE
) != -1);
3929 /* Let's lstat() again to see if the unmount() worked and what was under it */
3930 if (!assumes(lstat(de
->d_name
, &sb
) != -1)) {
3934 if (!assumes(psb
->st_dev
== sb
.st_dev
)) {
3939 if (S_ISDIR(sb
.st_mode
)) {
3940 empty_dir(de
->d_name
, &sb
);
3943 (void)assumes(lchflags(de
->d_name
, 0) != -1);
3944 (void)assumes(remove(de
->d_name
) != -1);
3947 (void)assumes(closedir(od
) != -1);
3950 (void)assumes(fchdir(currend_dir_fd
) != -1);
3951 (void)assumes(close(currend_dir_fd
) != -1);
3955 touch_file(const char *path
, mode_t m
)
3957 int fd
= open(path
, O_CREAT
, m
);
3966 apply_sysctls_from_file(const char *thefile
)
3968 const char *sysctl_tool
[] = { "sysctl", "-w", NULL
, NULL
};
3973 if (!(sf
= fopen(thefile
, "r")))
3976 while ((val
= fgetln(sf
, &ln_len
))) {
3980 if (!assumes((tmpstr
= malloc(ln_len
+ 1)) != NULL
)) {
3983 memcpy(tmpstr
, val
, ln_len
);
3987 if (val
[ln_len
- 1] == '\n' || val
[ln_len
- 1] == '\r') {
3988 val
[ln_len
- 1] = '\0';
3991 while (*val
&& isspace(*val
))
3993 if (*val
== '\0' || *val
== '#') {
3994 goto skip_sysctl_tool
;
3996 sysctl_tool
[2] = val
;
3997 (void)assumes(fwexec(sysctl_tool
, NULL
) != -1);
4002 (void)assumes(fclose(sf
) == 0);
4006 copySystemBuildVersion(void)
4008 CFStringRef build
= NULL
;
4009 const char path
[] = "/System/Library/CoreServices/SystemVersion.plist";
4010 CFURLRef plistURL
= CFURLCreateFromFileSystemRepresentation(kCFAllocatorSystemDefault
, (const uint8_t *)path
, sizeof(path
) - 1, false);
4012 CFPropertyListRef plist
= NULL
;
4013 if (plistURL
&& (plist
= CFPropertyListCreateFromFile(plistURL
))) {
4014 if (CFTypeCheck(plist
, CFDictionary
)) {
4015 build
= (CFStringRef
)CFDictionaryGetValue((CFDictionaryRef
)plist
, _kCFSystemVersionBuildVersionKey
);
4016 if (build
&& CFTypeCheck(build
, CFString
)) {
4019 build
= CFSTR("99Z999");
4025 build
= CFSTR("99Z999");
4029 CFRelease(plistURL
);
4036 do_sysversion_sysctl(void)
4038 int mib
[] = { CTL_KERN
, KERN_OSVERSION
};
4039 CFStringRef buildvers
;
4041 size_t bufsz
= sizeof(buf
);
4043 /* <rdar://problem/4477682> ER: launchd should set kern.osversion very early in boot */
4045 if (sysctl(mib
, 2, buf
, &bufsz
, NULL
, 0) == -1) {
4046 fprintf(stderr
, "sysctl(): %s\n", strerror(errno
));
4050 if (buf
[0] != '\0') {
4054 buildvers
= copySystemBuildVersion();
4055 if (assumes(buildvers
)) {
4056 CFStringGetCString(buildvers
, buf
, sizeof(buf
), kCFStringEncodingUTF8
);
4057 (void)assumes(sysctl(mib
, 2, NULL
, 0, buf
, strlen(buf
) + 1) != -1);
4060 CFRelease(buildvers
);
4064 do_application_firewall_magic(int sfd
, launch_data_t thejob
)
4066 const char *prog
= NULL
, *partialprog
= NULL
;
4067 char *path
, *pathtmp
, **pathstmp
;
4073 * <rdar://problem/4684434> setsockopt() with the executable path as the argument
4076 if ((tmp
= launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_PROGRAM
))) {
4077 prog
= launch_data_get_string(tmp
);
4081 if ((tmp
= launch_data_dict_lookup(thejob
, LAUNCH_JOBKEY_PROGRAMARGUMENTS
))) {
4082 if ((tmp
= launch_data_array_get_index(tmp
, 0))) {
4083 if (assumes((partialprog
= launch_data_get_string(tmp
)) != NULL
)) {
4084 if (partialprog
[0] == '/') {
4093 pathtmp
= path
= strdup(getenv("PATH"));
4097 while ((*pathstmp
= strsep(&pathtmp
, ":"))) {
4098 if (**pathstmp
!= '\0') {
4104 pathtmp
= alloca(MAXPATHLEN
);
4108 for (; *pathstmp
; pathstmp
++) {
4109 snprintf(pathtmp
, MAXPATHLEN
, "%s/%s", *pathstmp
, partialprog
);
4110 if (path_check(pathtmp
)) {
4117 if (assumes(prog
!= NULL
)) {
4118 /* The networking team has asked us to ignore the failure of this API if errno == ENOPROTOOPT */
4119 (void)assumes(setsockopt(sfd
, SOL_SOCKET
, SO_EXECPATH
, prog
, (socklen_t
)(strlen(prog
) + 1)) != -1 || errno
== ENOPROTOOPT
);
4125 preheat_page_cache_hack(void)
4130 /* Disable this hack for now */
4133 if ((thedir
= opendir("/etc/preheat_at_boot")) == NULL
) {
4137 while ((de
= readdir(thedir
))) {
4142 if (de
->d_name
[0] == '.') {
4146 if ((fd
= open(de
->d_name
, O_RDONLY
)) == -1) {
4150 if (fstat(fd
, &sb
) != -1) {
4151 if ((sb
.st_size
< 10*1024*1024) && (junkbuf
= malloc((size_t)sb
.st_size
)) != NULL
) {
4152 (void)assumes(read(fd
, junkbuf
, (size_t)sb
.st_size
) == (ssize_t
)sb
.st_size
);
4165 do_bootroot_magic(void)
4167 const char *kextcache_tool
[] = { "kextcache", "-U", "/", NULL
};
4168 CFTypeRef bootrootProp
;
4169 io_service_t chosen
;
4173 chosen
= IORegistryEntryFromPath(kIOMasterPortDefault
, "IODeviceTree:/chosen");
4175 if (!assumes(chosen
)) {
4179 bootrootProp
= IORegistryEntryCreateCFProperty(chosen
, CFSTR(kBootRootActiveKey
), kCFAllocatorDefault
, 0);
4181 IOObjectRelease(chosen
);
4183 if (!bootrootProp
) {
4187 CFRelease(bootrootProp
);
4189 if (!assumes((p
= fwexec(kextcache_tool
, &wstatus
)) != -1)) {
4193 if (WIFEXITED(wstatus
) && WEXITSTATUS(wstatus
) == EX_OSFILE
) {
4194 (void)assumes(reboot(RB_AUTOBOOT
) != -1);
4203 if (stat("/AppleInternal", &sb
) == 0 && stat("/var/db/disableAppleInternal", &sb
) == -1) {
4204 do_apple_internal_magic
= true;
4208 size_t len
= sizeof(bootargs
);
4209 int r
= sysctlbyname("kern.bootargs", bootargs
, &len
, NULL
, 0);
4210 if (r
== 0 && (strnstr(bootargs
, "-v", len
) != NULL
|| strnstr(bootargs
, "-s", len
))) {
4211 g_verbose_boot
= true;
4214 if (stat("/var/db/.launchd_shutdown_debugging", &sb
) == 0 && g_verbose_boot
) {
4215 g_startup_debugging
= true;