2 * Copyright (c) 1999-2004 Apple Computer, Inc. All rights reserved.
4 * @APPLE_APACHE_LICENSE_HEADER_START@
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
18 * @APPLE_APACHE_LICENSE_HEADER_END@
21 * bootstrap -- fundamental service initiator and port server
22 * Mike DeMoney, NeXT, Inc.
23 * Copyright, 1990. All rights reserved.
25 * bootstrap.c -- implementation of bootstrap main service loop
28 static const char *const __rcs_file_version__
= "$Revision: 1.52 $";
30 #include <mach/mach.h>
31 #include <mach/mach_error.h>
32 #include <mach/boolean.h>
33 #include <mach/message.h>
34 #include <mach/notify.h>
35 #include <mach/mig_errors.h>
36 #include <mach/mach_traps.h>
37 #include <mach/mach_interface.h>
38 #include <mach/host_info.h>
39 #include <mach/mach_host.h>
40 #include <mach/exception.h>
41 #include <sys/types.h>
43 #include <sys/event.h>
44 #include <sys/queue.h>
45 #include <sys/socket.h>
46 #include <bsm/libbsm.h>
57 #include "bootstrap_public.h"
58 #include "bootstrap_private.h"
59 #include "bootstrap.h"
60 #include "bootstrapServer.h"
61 #include "notifyServer.h"
62 #include "launchd_internal.h"
63 #include "launchd_internalServer.h"
65 #include "launchd_core_logic.h"
66 #include "launch_priv.h"
67 #include "launchd_unix_ipc.h"
78 static au_asid_t inherited_asid
= 0;
80 static bool canReceive(mach_port_t
);
81 static void init_ports(void);
82 static void *mport_demand_loop(void *arg
);
83 static void audit_token_to_launchd_cred(audit_token_t au_tok
, struct ldcred
*ldc
);
85 static mach_port_t inherited_bootstrap_port
= MACH_PORT_NULL
;
86 static mach_port_t demand_port_set
= MACH_PORT_NULL
;
87 static size_t port_to_obj_size
= 0;
88 static void **port_to_obj
= NULL
;
89 static pthread_t demand_thread
;
91 static bool trusted_client_check(struct jobcb
*j
, struct ldcred
*ldc
);
94 job_find_by_port(mach_port_t mp
)
96 return port_to_obj
[MACH_PORT_INDEX(mp
)];
100 x_handle_mport(mach_port_t junk
__attribute__((unused
)))
102 mach_port_name_array_t members
;
103 mach_msg_type_number_t membersCnt
;
104 mach_port_status_t status
;
105 mach_msg_type_number_t statusCnt
;
109 if (!launchd_assumes(mach_port_get_set_status(mach_task_self(), demand_port_set
, &members
, &membersCnt
) == KERN_SUCCESS
))
112 for (i
= 0; i
< membersCnt
; i
++) {
113 statusCnt
= MACH_PORT_RECEIVE_STATUS_COUNT
;
114 if (mach_port_get_attributes(mach_task_self(), members
[i
], MACH_PORT_RECEIVE_STATUS
,
115 (mach_port_info_t
)&status
, &statusCnt
) != KERN_SUCCESS
)
118 if (status
.mps_msgcount
) {
119 EV_SET(&kev
, members
[i
], EVFILT_MACHPORT
, 0, 0, 0, job_find_by_port(members
[i
]));
120 (*((kq_callback
*)kev
.udata
))(kev
.udata
, &kev
);
121 /* the callback may have tainted our ability to continue this for loop */
126 launchd_assumes(vm_deallocate(mach_task_self(), (vm_address_t
)members
,
127 (vm_size_t
) membersCnt
* sizeof(mach_port_name_t
)) == KERN_SUCCESS
);
133 mach_init_init(mach_port_t req_port
, mach_port_t checkin_port
,
134 name_array_t l2l_names
, mach_port_array_t l2l_ports
, mach_msg_type_number_t l2l_cnt
)
136 mach_msg_type_number_t l2l_i
;
137 auditinfo_t inherited_audit
;
140 getaudit(&inherited_audit
);
141 inherited_asid
= inherited_audit
.ai_asid
;
145 launchd_assert((root_job
= job_new_bootstrap(NULL
, req_port
? req_port
: mach_task_self(), checkin_port
)) != NULL
);
147 launchd_assumes(launchd_get_bport(&inherited_bootstrap_port
) == KERN_SUCCESS
);
150 launchd_assumes(inherited_bootstrap_port
!= MACH_PORT_NULL
);
152 /* We set this explicitly as we start each child */
153 launchd_assumes(launchd_set_bport(MACH_PORT_NULL
) == KERN_SUCCESS
);
155 pthread_attr_init(&attr
);
156 pthread_attr_setdetachstate(&attr
, PTHREAD_CREATE_JOINABLE
);
157 pthread_attr_setstacksize(&attr
, PTHREAD_STACK_MIN
);
159 launchd_assert(pthread_create(&demand_thread
, &attr
, mport_demand_loop
, NULL
) == 0);
161 pthread_attr_destroy(&attr
);
163 /* cut off the Libc cache, we don't want to deadlock against ourself */
164 bootstrap_port
= MACH_PORT_NULL
;
166 if (l2l_names
== NULL
)
169 for (l2l_i
= 0; l2l_i
< l2l_cnt
; l2l_i
++) {
170 struct machservice
*ms
;
172 if ((ms
= machservice_new(root_job
, l2l_names
[l2l_i
], l2l_ports
+ l2l_i
)))
173 machservice_watch(ms
);
177 void mach_init_reap(void)
181 launchd_assumes(mach_port_destroy(mach_task_self(), demand_port_set
) == KERN_SUCCESS
);
183 launchd_assumes(pthread_join(demand_thread
, &status
) == 0);
189 launchd_assert((errno
= mach_port_allocate(mach_task_self(), MACH_PORT_RIGHT_PORT_SET
,
190 &demand_port_set
)) == KERN_SUCCESS
);
194 mport_demand_loop(void *arg
__attribute__((unused
)))
196 mach_msg_empty_rcv_t dummy
;
200 kr
= mach_msg(&dummy
.header
, MACH_RCV_MSG
|MACH_RCV_LARGE
, 0, 0, demand_port_set
, 0, MACH_PORT_NULL
);
201 if (kr
== MACH_RCV_PORT_CHANGED
) {
203 } else if (!launchd_assumes(kr
== MACH_RCV_TOO_LARGE
)) {
206 launchd_assumes(handle_mport(launchd_internal_port
) == 0);
213 launchd_mach_ipc_demux(mach_msg_header_t
*Request
, mach_msg_header_t
*Reply
)
215 if (bootstrap_server_routine(Request
))
216 return bootstrap_server(Request
, Reply
);
218 return notify_server(Request
, Reply
);
222 canReceive(mach_port_t port
)
224 mach_port_type_t p_type
;
226 if (!launchd_assumes(mach_port_type(mach_task_self(), port
, &p_type
) == KERN_SUCCESS
))
229 return ((p_type
& MACH_PORT_TYPE_RECEIVE
) != 0);
233 launchd_set_bport(mach_port_t name
)
235 return errno
= task_set_bootstrap_port(mach_task_self(), name
);
239 launchd_get_bport(mach_port_t
*name
)
241 return errno
= task_get_bootstrap_port(mach_task_self(), name
);
245 launchd_mport_notify_req(mach_port_t name
, mach_msg_id_t which
)
247 mach_port_mscount_t msgc
= (which
== MACH_NOTIFY_NO_SENDERS
) ? 1 : 0;
248 mach_port_t previous
, where
= (which
== MACH_NOTIFY_NO_SENDERS
) ? name
: launchd_internal_port
;
250 if (which
== MACH_NOTIFY_NO_SENDERS
) {
251 /* Always make sure the send count is zero, in case a receive right is reused */
252 errno
= mach_port_set_mscount(mach_task_self(), name
, 0);
253 if (errno
!= KERN_SUCCESS
)
257 errno
= mach_port_request_notification(mach_task_self(), name
, which
, msgc
, where
,
258 MACH_MSG_TYPE_MAKE_SEND_ONCE
, &previous
);
260 if (errno
== 0 && previous
!= MACH_PORT_NULL
)
261 launchd_assumes(launchd_mport_deallocate(previous
) == KERN_SUCCESS
);
267 launchd_mport_request_callback(mach_port_t name
, void *obj
, bool readmsg
)
272 return errno
= mach_port_move_member(mach_task_self(), name
, MACH_PORT_NULL
);
274 needed_size
= (MACH_PORT_INDEX(name
) + 1) * sizeof(void *);
276 if (needed_size
> port_to_obj_size
) {
277 if (port_to_obj
== NULL
) {
278 launchd_assumes((port_to_obj
= calloc(1, needed_size
* 2)) != NULL
);
280 launchd_assumes((port_to_obj
= reallocf(port_to_obj
, needed_size
* 2)) != NULL
);
281 memset((uint8_t *)port_to_obj
+ port_to_obj_size
, 0, needed_size
* 2 - port_to_obj_size
);
283 port_to_obj_size
= needed_size
* 2;
286 port_to_obj
[MACH_PORT_INDEX(name
)] = obj
;
288 return errno
= mach_port_move_member(mach_task_self(), name
, readmsg
? ipc_port_set
: demand_port_set
);
292 launchd_mport_make_send(mach_port_t name
)
294 return errno
= mach_port_insert_right(mach_task_self(), name
, name
, MACH_MSG_TYPE_MAKE_SEND
);
298 launchd_mport_close_recv(mach_port_t name
)
300 if (launchd_assumes(port_to_obj
!= NULL
)) {
301 port_to_obj
[MACH_PORT_INDEX(name
)] = NULL
;
302 return errno
= mach_port_mod_refs(mach_task_self(), name
, MACH_PORT_RIGHT_RECEIVE
, -1);
304 return errno
= KERN_FAILURE
;
309 launchd_mport_create_recv(mach_port_t
*name
)
311 return errno
= mach_port_allocate(mach_task_self(), MACH_PORT_RIGHT_RECEIVE
, name
);
315 launchd_mport_deallocate(mach_port_t name
)
317 return errno
= mach_port_deallocate(mach_task_self(), name
);
321 audit_token_to_launchd_cred(audit_token_t au_tok
, struct ldcred
*ldc
)
323 audit_token_to_au32(au_tok
, /* audit UID */ NULL
,
324 &ldc
->euid
, &ldc
->egid
,
325 &ldc
->uid
, &ldc
->gid
, &ldc
->pid
,
326 &ldc
->asid
, /* au_tid_t */ NULL
);
330 x_bootstrap_create_server(mach_port_t bp
, cmd_t server_cmd
, uid_t server_uid
, boolean_t on_demand
,
331 audit_token_t au_tok
, mach_port_t
*server_portp
)
333 struct jobcb
*js
, *j
= job_find_by_port(bp
);
336 audit_token_to_launchd_cred(au_tok
, &ldc
);
338 job_log(j
, LOG_DEBUG
, "Server create attempt: %s", server_cmd
);
340 #define LET_MERE_MORTALS_ADD_SERVERS_TO_PID1
341 /* XXX - This code should go away once the per session launchd is integrated with the rest of the system */
342 #ifdef LET_MERE_MORTALS_ADD_SERVERS_TO_PID1
344 if (ldc
.euid
!= 0 && ldc
.euid
!= server_uid
) {
345 job_log(j
, LOG_WARNING
, "Server create: \"%s\": Will run as UID %d, not UID %d as they told us to",
346 server_cmd
, ldc
.euid
, server_uid
);
347 server_uid
= ldc
.euid
;
351 if (!trusted_client_check(j
, &ldc
)) {
352 return BOOTSTRAP_NOT_PRIVILEGED
;
353 } else if (server_uid
!= getuid()) {
354 job_log(j
, LOG_WARNING
, "Server create: \"%s\": As UID %d, we will not be able to switch to UID %d",
355 server_cmd
, getuid(), server_uid
);
356 server_uid
= getuid();
359 js
= job_new_via_mach_init(j
, server_cmd
, server_uid
, on_demand
);
362 return BOOTSTRAP_NO_MEMORY
;
364 *server_portp
= job_get_bsport(js
);
365 return BOOTSTRAP_SUCCESS
;
369 x_bootstrap_getsocket(mach_port_t bp
, name_t spr
)
372 return BOOTSTRAP_NO_MEMORY
;
373 } else if (getpid() == 1) {
374 return BOOTSTRAP_NOT_PRIVILEGED
;
377 strncpy(spr
, sockpath
, sizeof(name_t
));
379 return BOOTSTRAP_SUCCESS
;
383 x_bootstrap_unprivileged(mach_port_t bp
, mach_port_t
*unprivportp
)
385 struct jobcb
*j
= job_find_by_port(bp
);
387 job_log(j
, LOG_DEBUG
, "Requested unprivileged bootstrap port");
391 *unprivportp
= job_get_bsport(j
);
393 return BOOTSTRAP_SUCCESS
;
398 x_bootstrap_check_in(mach_port_t bp
, name_t servicename
, audit_token_t au_tok
, mach_port_t
*serviceportp
)
400 static pid_t last_warned_pid
= 0;
401 struct jobcb
*j
= job_find_by_port(bp
);
402 struct machservice
*ms
;
405 audit_token_to_launchd_cred(au_tok
, &ldc
);
407 trusted_client_check(j
, &ldc
);
409 ms
= job_lookup_service(j
, servicename
, true);
412 job_log(j
, LOG_DEBUG
, "Check-in of Mach service failed. Unknown: %s", servicename
);
413 return BOOTSTRAP_UNKNOWN_SERVICE
;
415 if (machservice_job(ms
) != j
) {
416 if (last_warned_pid
!= ldc
.pid
) {
417 job_log(j
, LOG_NOTICE
, "Check-in of Mach service failed. PID %d is not privileged: %s",
418 ldc
.pid
, servicename
);
419 last_warned_pid
= ldc
.pid
;
421 return BOOTSTRAP_NOT_PRIVILEGED
;
423 if (!canReceive(machservice_port(ms
))) {
424 launchd_assumes(machservice_active(ms
));
425 job_log(j
, LOG_DEBUG
, "Check-in of Mach service failed. Already active: %s", servicename
);
426 return BOOTSTRAP_SERVICE_ACTIVE
;
429 machservice_watch(ms
);
431 job_log(j
, LOG_INFO
, "Check-in of service: %s", servicename
);
433 *serviceportp
= machservice_port(ms
);
434 return BOOTSTRAP_SUCCESS
;
438 x_bootstrap_register(mach_port_t bp
, audit_token_t au_tok
, name_t servicename
, mach_port_t serviceport
)
440 struct jobcb
*j
= job_find_by_port(bp
);
441 struct machservice
*ms
;
444 audit_token_to_launchd_cred(au_tok
, &ldc
);
446 trusted_client_check(j
, &ldc
);
448 job_log(j
, LOG_DEBUG
, "Mach service registration attempt: %s", servicename
);
450 ms
= job_lookup_service(j
, servicename
, false);
453 if (machservice_job(ms
) != j
)
454 return BOOTSTRAP_NOT_PRIVILEGED
;
455 if (machservice_active(ms
)) {
456 job_log(j
, LOG_DEBUG
, "Mach service registration failed. Already active: %s", servicename
);
457 launchd_assumes(!canReceive(machservice_port(ms
)));
458 return BOOTSTRAP_SERVICE_ACTIVE
;
460 job_checkin(machservice_job(ms
));
461 machservice_delete(ms
);
464 if (serviceport
!= MACH_PORT_NULL
) {
465 if ((ms
= machservice_new(job_get_bs(j
), servicename
, &serviceport
))) {
466 machservice_watch(ms
);
468 return BOOTSTRAP_NO_MEMORY
;
472 return BOOTSTRAP_SUCCESS
;
476 x_bootstrap_look_up(mach_port_t bp
, audit_token_t au_tok
, name_t servicename
, mach_port_t
*serviceportp
, mach_msg_type_name_t
*ptype
)
478 struct jobcb
*j
= job_find_by_port(bp
);
479 struct machservice
*ms
;
482 audit_token_to_launchd_cred(au_tok
, &ldc
);
484 trusted_client_check(j
, &ldc
);
486 ms
= job_lookup_service(j
, servicename
, true);
488 if (ms
&& machservice_hidden(ms
) && !job_active(machservice_job(ms
))) {
493 launchd_assumes(machservice_port(ms
) != MACH_PORT_NULL
);
494 job_log(j
, LOG_DEBUG
, "Mach service lookup (by PID %d): %s", ldc
.pid
, servicename
);
495 *serviceportp
= machservice_port(ms
);
496 *ptype
= MACH_MSG_TYPE_COPY_SEND
;
497 return BOOTSTRAP_SUCCESS
;
498 } else if (inherited_bootstrap_port
!= MACH_PORT_NULL
) {
499 job_log(j
, LOG_DEBUG
, "Mach service lookup (by PID %d) forwarded: %s", ldc
.pid
, servicename
);
500 *ptype
= MACH_MSG_TYPE_MOVE_SEND
;
501 return bootstrap_look_up(inherited_bootstrap_port
, servicename
, serviceportp
);
503 job_log(j
, LOG_DEBUG
, "Mach service lookup (by PID %d) failed: %s", ldc
.pid
, servicename
);
504 return BOOTSTRAP_UNKNOWN_SERVICE
;
509 x_bootstrap_parent(mach_port_t bp
, mach_port_t
*parentport
, mach_msg_type_name_t
*pptype
)
511 struct jobcb
*j
= job_find_by_port(bp
);
513 job_log(j
, LOG_DEBUG
, "Requested parent bootstrap port");
517 *pptype
= MACH_MSG_TYPE_MAKE_SEND
;
520 *parentport
= job_get_bsport(job_parent(j
));
521 } else if (MACH_PORT_NULL
== inherited_bootstrap_port
) {
522 *parentport
= job_get_bsport(j
);
524 *pptype
= MACH_MSG_TYPE_COPY_SEND
;
525 *parentport
= inherited_bootstrap_port
;
527 return BOOTSTRAP_SUCCESS
;
531 x_bootstrap_info_countservices(struct machservice
*ms
, void *context
)
533 unsigned int *cnt
= context
;
538 struct x_bootstrap_info_copyservices_cb
{
539 name_array_t service_names
;
540 bootstrap_status_array_t service_actives
;
541 mach_port_array_t ports
;
546 x_bootstrap_info_copyservices(struct machservice
*ms
, void *context
)
548 struct x_bootstrap_info_copyservices_cb
*info_resp
= context
;
550 strlcpy(info_resp
->service_names
[info_resp
->i
], machservice_name(ms
), sizeof(info_resp
->service_names
[0]));
552 launchd_assumes(info_resp
->service_actives
|| info_resp
->ports
);
554 if (info_resp
->service_actives
) {
555 info_resp
->service_actives
[info_resp
->i
] = machservice_status(ms
);
557 info_resp
->ports
[info_resp
->i
] = machservice_port(ms
);
563 x_bootstrap_info(mach_port_t bp
, name_array_t
*servicenamesp
, unsigned int *servicenames_cnt
,
564 bootstrap_status_array_t
*serviceactivesp
, unsigned int *serviceactives_cnt
)
566 struct x_bootstrap_info_copyservices_cb info_resp
= { NULL
, NULL
, NULL
, 0 };
567 struct jobcb
*ji
, *j
= job_find_by_port(bp
);
568 kern_return_t result
;
569 unsigned int cnt
= 0;
571 for (ji
= j
; ji
; ji
= job_parent(ji
))
572 job_foreach_service(ji
, x_bootstrap_info_countservices
, &cnt
, true);
574 result
= vm_allocate(mach_task_self(), (vm_address_t
*)&info_resp
.service_names
, cnt
* sizeof(info_resp
.service_names
[0]), true);
575 if (!launchd_assumes(result
== KERN_SUCCESS
))
578 result
= vm_allocate(mach_task_self(), (vm_address_t
*)&info_resp
.service_actives
, cnt
* sizeof(info_resp
.service_actives
[0]), true);
579 if (!launchd_assumes(result
== KERN_SUCCESS
))
582 for (ji
= j
; ji
; ji
= job_parent(ji
))
583 job_foreach_service(ji
, x_bootstrap_info_copyservices
, &info_resp
, true);
585 launchd_assumes(info_resp
.i
== cnt
);
587 *servicenamesp
= info_resp
.service_names
;
588 *serviceactivesp
= info_resp
.service_actives
;
589 *servicenames_cnt
= *serviceactives_cnt
= cnt
;
591 return BOOTSTRAP_SUCCESS
;
594 if (info_resp
.service_names
)
595 vm_deallocate(mach_task_self(), (vm_address_t
)info_resp
.service_names
, cnt
* sizeof(info_resp
.service_names
[0]));
597 return BOOTSTRAP_NO_MEMORY
;
601 x_bootstrap_transfer_subset(mach_port_t bp
, mach_port_t
*reqport
, mach_port_t
*rcvright
,
602 name_array_t
*servicenamesp
, unsigned int *servicenames_cnt
,
603 mach_port_array_t
*ports
, unsigned int *ports_cnt
)
605 struct x_bootstrap_info_copyservices_cb info_resp
= { NULL
, NULL
, NULL
, 0 };
606 struct jobcb
*j
= job_find_by_port(bp
);
607 unsigned int cnt
= 0;
608 kern_return_t result
;
611 job_log(j
, LOG_ERR
, "Only the system launchd will transfer Mach sub-bootstraps.");
612 return BOOTSTRAP_NOT_PRIVILEGED
;
613 } else if (!job_parent(j
)) {
614 job_log(j
, LOG_ERR
, "Root Mach bootstrap cannot be transferred.");
615 return BOOTSTRAP_NOT_PRIVILEGED
;
618 job_log(j
, LOG_DEBUG
, "Transferring sub-bootstrap to the per session launchd.");
620 job_foreach_service(j
, x_bootstrap_info_countservices
, &cnt
, false);
622 result
= vm_allocate(mach_task_self(), (vm_address_t
*)&info_resp
.service_names
, cnt
* sizeof(info_resp
.service_names
[0]), true);
623 if (!launchd_assumes(result
== KERN_SUCCESS
))
626 result
= vm_allocate(mach_task_self(), (vm_address_t
*)&info_resp
.ports
, cnt
* sizeof(info_resp
.ports
[0]), true);
627 if (!launchd_assumes(result
== KERN_SUCCESS
))
630 job_foreach_service(j
, x_bootstrap_info_copyservices
, &info_resp
, false);
632 launchd_assumes(info_resp
.i
== cnt
);
634 *servicenamesp
= info_resp
.service_names
;
635 *ports
= info_resp
.ports
;
636 *servicenames_cnt
= *ports_cnt
= cnt
;
638 *reqport
= job_get_reqport(j
);
639 *rcvright
= job_get_bsport(j
);
641 launchd_assumes(launchd_mport_request_callback(*rcvright
, NULL
, true) == KERN_SUCCESS
);
643 launchd_assumes(launchd_mport_make_send(*rcvright
) == KERN_SUCCESS
);
645 return BOOTSTRAP_SUCCESS
;
648 if (info_resp
.service_names
)
649 vm_deallocate(mach_task_self(), (vm_address_t
)info_resp
.service_names
, cnt
* sizeof(info_resp
.service_names
[0]));
651 return BOOTSTRAP_NO_MEMORY
;
655 x_bootstrap_subset(mach_port_t bp
, mach_port_t requestorport
, mach_port_t
*subsetportp
)
657 struct jobcb
*js
, *j
= job_find_by_port(bp
);
660 while ((j
= job_parent(j
)) != NULL
)
663 j
= job_find_by_port(bp
);
665 /* Since we use recursion, we need an artificial depth for subsets */
667 job_log(j
, LOG_ERR
, "Mach sub-bootstrap create request failed. Depth greater than: %d", bsdepth
);
668 return BOOTSTRAP_NO_MEMORY
;
671 if ((js
= job_new_bootstrap(j
, requestorport
, MACH_PORT_NULL
)) == NULL
) {
672 if (requestorport
== MACH_PORT_NULL
)
673 return BOOTSTRAP_NOT_PRIVILEGED
;
674 return BOOTSTRAP_NO_MEMORY
;
677 *subsetportp
= job_get_bsport(js
);
678 return BOOTSTRAP_SUCCESS
;
682 x_bootstrap_create_service(mach_port_t bp
, name_t servicename
, mach_port_t
*serviceportp
)
684 struct jobcb
*j
= job_find_by_port(bp
);
685 struct machservice
*ms
;
687 if (job_prog(j
)[0] == '\0') {
688 job_log(j
, LOG_ERR
, "Mach service creation requires a target server: %s", servicename
);
689 return BOOTSTRAP_NOT_PRIVILEGED
;
692 ms
= job_lookup_service(j
, servicename
, false);
694 job_log(j
, LOG_DEBUG
, "Mach service creation attempt for failed. Already exists: %s", servicename
);
695 return BOOTSTRAP_NAME_IN_USE
;
700 *serviceportp
= MACH_PORT_NULL
;
701 ms
= machservice_new(j
, servicename
, serviceportp
);
703 if (!launchd_assumes(ms
!= NULL
))
706 return BOOTSTRAP_SUCCESS
;
709 launchd_assumes(launchd_mport_close_recv(*serviceportp
) == KERN_SUCCESS
);
710 return BOOTSTRAP_NO_MEMORY
;
714 x_mpm_wait(mach_port_t bp
, mach_port_t srp
, audit_token_t au_tok
, integer_t
*waitstatus
)
716 struct jobcb
*j
= job_find_by_port(bp
);
719 audit_token_to_launchd_cred(au_tok
, &ldc
);
721 return job_handle_mpm_wait(j
, srp
, waitstatus
);
725 x_mpm_uncork_fork(mach_port_t bp
, audit_token_t au_tok
)
727 struct jobcb
*j
= job_find_by_port(bp
);
730 return BOOTSTRAP_NOT_PRIVILEGED
;
738 x_mpm_spawn(mach_port_t bp
, audit_token_t au_tok
,
739 _internal_string_t charbuf
, mach_msg_type_number_t charbuf_cnt
,
740 uint32_t argc
, uint32_t envc
, uint64_t flags
, uint16_t mig_umask
,
741 pid_t
*child_pid
, mach_port_t
*obsvr_port
)
743 struct jobcb
*jr
, *j
= job_find_by_port(bp
);
747 const char **argv
= NULL
, **env
= NULL
;
748 const char *label
= NULL
;
749 const char *path
= NULL
;
750 const char *workingdir
= NULL
;
751 size_t argv_i
= 0, env_i
= 0;
753 audit_token_to_launchd_cred(au_tok
, &ldc
);
756 if (ldc
.asid
!= inherited_asid
) {
757 job_log(j
, LOG_ERR
, "Security: PID %d (ASID %d) was denied a request to spawn a process in this session (ASID %d)",
758 ldc
.pid
, ldc
.asid
, inherited_asid
);
759 return BOOTSTRAP_NOT_PRIVILEGED
;
763 argv
= alloca((argc
+ 1) * sizeof(char *));
764 memset(argv
, 0, (argc
+ 1) * sizeof(char *));
767 env
= alloca((envc
+ 1) * sizeof(char *));
768 memset(env
, 0, (envc
+ 1) * sizeof(char *));
771 while (offset
< charbuf_cnt
) {
772 tmpp
= charbuf
+ offset
;
773 offset
+= strlen(tmpp
) + 1;
776 } else if (argc
> 0) {
780 } else if (envc
> 0) {
784 } else if (flags
& SPAWN_HAS_PATH
) {
786 flags
&= ~SPAWN_HAS_PATH
;
787 } else if (flags
& SPAWN_HAS_WDIR
) {
789 flags
&= ~SPAWN_HAS_WDIR
;
793 jr
= job_new_spawn(label
, path
, workingdir
, argv
, env
, flags
& SPAWN_HAS_UMASK
? &mig_umask
: NULL
,
794 flags
& SPAWN_WANTS_WAIT4DEBUGGER
, flags
& SPAWN_WANTS_FORCE_PPC
);
796 if (jr
== NULL
) switch (errno
) {
798 return BOOTSTRAP_NAME_IN_USE
;
800 return BOOTSTRAP_NO_MEMORY
;
803 job_log(j
, LOG_INFO
, "Spawned with flags:%s%s",
804 flags
& SPAWN_WANTS_FORCE_PPC
? " ppc": "",
805 flags
& SPAWN_WANTS_WAIT4DEBUGGER
? " stopped": "");
807 *child_pid
= job_get_pid(jr
);
808 *obsvr_port
= job_get_bsport(jr
);
810 return BOOTSTRAP_SUCCESS
;
814 do_mach_notify_port_destroyed(mach_port_t notify
, mach_port_t rights
)
816 /* This message is sent to us when a receive right is returned to us. */
818 if (!job_ack_port_destruction(root_job
, rights
)) {
819 launchd_assumes(launchd_mport_close_recv(rights
) == KERN_SUCCESS
);
826 do_mach_notify_port_deleted(mach_port_t notify
, mach_port_name_t name
)
828 /* If we deallocate/destroy/mod_ref away a port with a pending notification,
829 * the original notification message is replaced with this message.
831 * To quote a Mach kernel expert, "the kernel has a send-once right that has
832 * to be used somehow."
838 do_mach_notify_no_senders(mach_port_t notify
, mach_port_mscount_t mscount
)
840 struct jobcb
*j
= job_find_by_port(notify
);
842 /* This message is sent to us when the last customer of one of our objects
846 if (!launchd_assumes(j
!= NULL
))
849 job_ack_no_senders(j
);
855 do_mach_notify_send_once(mach_port_t notify
)
858 * This message is sent to us every time we close a port that we have
859 * outstanding Mach notification requests on. We can safely ignore
866 do_mach_notify_dead_name(mach_port_t notify
, mach_port_name_t name
)
868 /* This message is sent to us when one of our send rights no longer has
869 * a receiver somewhere else on the system.
872 if (name
== inherited_bootstrap_port
) {
873 launchd_assumes(launchd_mport_deallocate(name
) == KERN_SUCCESS
);
874 inherited_bootstrap_port
= MACH_PORT_NULL
;
877 job_delete_anything_with_port(root_job
, name
);
879 /* A dead-name notification about a port appears to increment the
880 * rights on said port. Let's deallocate it so that we don't leak
883 launchd_assumes(launchd_mport_deallocate(name
) == KERN_SUCCESS
);
889 trusted_client_check(struct jobcb
*j
, struct ldcred
*ldc
)
891 static pid_t last_warned_pid
= 0;
893 /* In the long run, we wish to enforce the progeny rule, but for now,
894 * we'll let root and the user be forgiven. Once we get CoreProcesses
895 * to switch to using launchd rather than the WindowServer for indirect
896 * process invocation, we can then seriously look at cranking up the
897 * warning level here.
900 if (inherited_asid
== ldc
->asid
)
902 if (progeny_check(ldc
->pid
))
904 if (ldc
->euid
== geteuid())
906 if (ldc
->euid
== 0 && ldc
->uid
== 0)
908 if (last_warned_pid
== ldc
->pid
)
911 job_log(j
, LOG_NOTICE
, "Security: PID %d (ASID %d) was leaked into this session (ASID %d). This will be denied in the future.", ldc
->pid
, ldc
->asid
, inherited_asid
);
913 last_warned_pid
= ldc
->pid
;