2 * Copyright (c) 1999-2008 Apple Computer, Inc. All rights reserved.
4 * @APPLE_APACHE_LICENSE_HEADER_START@
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
18 * @APPLE_APACHE_LICENSE_HEADER_END@
21 static const char *const __rcs_file_version__
= "$Revision: 25122 $";
24 #include "launchd_runtime.h"
26 #include <mach/mach.h>
27 #include <mach/mach_error.h>
28 #include <mach/boolean.h>
29 #include <mach/message.h>
30 #include <mach/notify.h>
31 #include <mach/mig_errors.h>
32 #include <mach/mach_traps.h>
33 #include <mach/mach_interface.h>
34 #include <mach/host_info.h>
35 #include <mach/mach_host.h>
36 #include <mach/mach_time.h>
37 #include <mach/exception.h>
38 #include <sys/types.h>
40 #include <sys/sysctl.h>
43 #include <sys/event.h>
44 #include <sys/queue.h>
45 #include <sys/socket.h>
46 #include <sys/mount.h>
47 #include <sys/reboot.h>
48 #include <sys/fcntl.h>
49 #include <sys/kdebug.h>
50 #include <bsm/libbsm.h>
51 #include <malloc/malloc.h>
64 #include "launchd_internalServer.h"
65 #include "launchd_internal.h"
66 #include "notifyServer.h"
67 #include "mach_excServer.h"
69 /* We shouldn't be including these */
72 #include "launchd_core_logic.h"
74 #include "vproc_priv.h"
75 #include "vproc_internal.h"
76 #include "protocol_vprocServer.h"
77 #include "protocol_job_reply.h"
79 #if !TARGET_OS_EMBEDDED
80 #include "domainServer.h"
81 #endif /* !TARGET_OS_EMBEDDED */
82 #include "eventsServer.h"
84 static mach_port_t ipc_port_set
;
85 static mach_port_t demand_port_set
;
86 static mach_port_t launchd_internal_port
;
89 #define BULK_KEV_MAX 100
90 static struct kevent
*bulk_kev
;
91 static int bulk_kev_i
;
92 static int bulk_kev_cnt
;
94 static pthread_t kqueue_demand_thread
;
96 static void mportset_callback(void);
97 static kq_callback kqmportset_callback
= (kq_callback
)mportset_callback
;
98 static void *kqueue_demand_loop(void *arg
);
100 boolean_t
launchd_internal_demux(mach_msg_header_t
*Request
, mach_msg_header_t
*Reply
);
101 static void record_caller_creds(mach_msg_header_t
*mh
);
102 static void launchd_runtime2(mach_msg_size_t msg_size
, mig_reply_error_t
*bufRequest
, mig_reply_error_t
*bufReply
);
103 static mach_msg_size_t max_msg_size
;
104 static mig_callback
*mig_cb_table
;
105 static size_t mig_cb_table_sz
;
106 static timeout_callback runtime_idle_callback
;
107 static mach_msg_timeout_t runtime_idle_timeout
;
108 static struct ldcred ldc
;
109 static size_t runtime_standby_cnt
;
111 static STAILQ_HEAD(, logmsg_s
) logmsg_queue
= STAILQ_HEAD_INITIALIZER(logmsg_queue
);
112 static size_t logmsg_queue_sz
;
113 static size_t logmsg_queue_cnt
;
114 static mach_port_t drain_reply_port
;
115 static void runtime_log_uncork_pending_drain(void);
116 static kern_return_t
runtime_log_pack(vm_offset_t
*outval
, mach_msg_type_number_t
*outvalCnt
);
118 static bool logmsg_add(struct runtime_syslog_attr
*attr
, int err_num
, const char *msg
);
119 static void logmsg_remove(struct logmsg_s
*lm
);
121 static void do_file_init(void) __attribute__((constructor
));
122 static mach_timebase_info_data_t tbi
;
123 static uint64_t tbi_safe_math_max
;
124 static uint64_t time_of_mach_msg_return
;
125 static double tbi_float_val
;
127 static const int sigigns
[] = { SIGHUP
, SIGINT
, SIGPIPE
, SIGALRM
, SIGTERM
,
128 SIGURG
, SIGTSTP
, SIGTSTP
, SIGCONT
, SIGTTIN
, SIGTTOU
, SIGIO
, SIGXCPU
,
129 SIGXFSZ
, SIGVTALRM
, SIGPROF
, SIGWINCH
, SIGINFO
, SIGUSR1
, SIGUSR2
131 static sigset_t sigign_set
;
132 static FILE *ourlogfile
;
134 bool do_apple_internal_logging
;
135 bool low_level_debug
;
136 bool g_flat_mach_namespace
= true;
137 bool g_simulate_pid1_crash
= false;
138 bool g_malloc_log_stacks
= false;
139 bool g_use_gmalloc
= false;
140 bool g_log_per_user_shutdown
= false;
141 #if !TARGET_OS_EMBEDDED
142 bool g_log_pid1_shutdown
= true;
144 bool g_log_pid1_shutdown
= false;
146 bool g_log_strict_usage
= false;
147 bool g_trap_sigkill_bugs
= false;
149 size_t runtime_busy_cnt
;
152 runtime_get_kernel_port(void)
154 return launchd_internal_port
;
157 // static const char *__crashreporter_info__ = "";
159 static int internal_mask_pri
= LOG_UPTO(LOG_NOTICE
);
163 launchd_runtime_init(void)
165 mach_msg_size_t mxmsgsz
;
168 launchd_assert((mainkq
= kqueue()) != -1);
170 launchd_assert((errno
= mach_port_allocate(mach_task_self(), MACH_PORT_RIGHT_PORT_SET
, &demand_port_set
)) == KERN_SUCCESS
);
171 launchd_assert((errno
= mach_port_allocate(mach_task_self(), MACH_PORT_RIGHT_PORT_SET
, &ipc_port_set
)) == KERN_SUCCESS
);
173 launchd_assert(kevent_mod(demand_port_set
, EVFILT_MACHPORT
, EV_ADD
, 0, 0, &kqmportset_callback
) != -1);
175 launchd_assert(launchd_mport_create_recv(&launchd_internal_port
) == KERN_SUCCESS
);
176 launchd_assert(launchd_mport_make_send(launchd_internal_port
) == KERN_SUCCESS
);
178 /* Sigh... at the moment, MIG has maxsize == sizeof(reply union) */
179 mxmsgsz
= sizeof(union __RequestUnion__x_launchd_internal_subsystem
);
180 if (x_launchd_internal_subsystem
.maxsize
> mxmsgsz
) {
181 mxmsgsz
= x_launchd_internal_subsystem
.maxsize
;
184 launchd_assert(runtime_add_mport(launchd_internal_port
, launchd_internal_demux
, mxmsgsz
) == KERN_SUCCESS
);
185 launchd_assert(pthread_create(&kqueue_demand_thread
, NULL
, kqueue_demand_loop
, NULL
) == 0);
186 launchd_assert(pthread_detach(kqueue_demand_thread
) == 0);
188 (void)launchd_assumes(sysctlbyname("vfs.generic.noremotehang", NULL
, NULL
, &p
, sizeof(p
)) != -1);
192 launchd_runtime_init2(void)
196 for (i
= 0; i
< (sizeof(sigigns
) / sizeof(int)); i
++) {
197 sigaddset(&sigign_set
, sigigns
[i
]);
198 (void)launchd_assumes(signal(sigigns
[i
], SIG_IGN
) != SIG_ERR
);
202 #define FLAGIF(f) if (flags & f) { flags_off += sprintf(flags_off, #f); flags &= ~f; }
204 reboot_flags_to_C_names(unsigned int flags
)
206 #define MAX_RB_STR "RB_ASKNAME|RB_SINGLE|RB_NOSYNC|RB_HALT|RB_INITNAME|RB_DFLTROOT|RB_ALTBOOT|RB_UNIPROC|RB_SAFEBOOT|RB_UPSDELAY|0xdeadbeeffeedface"
207 static char flags_buf
[sizeof(MAX_RB_STR
)];
208 char *flags_off
= NULL
;
211 return "RB_AUTOBOOT";
220 flags_off
= flags_buf
;
224 else FLAGIF(RB_SINGLE
)
225 else FLAGIF(RB_NOSYNC
)
227 else FLAGIF(RB_INITNAME
)
228 else FLAGIF(RB_DFLTROOT
)
229 else FLAGIF(RB_ALTBOOT
)
230 else FLAGIF(RB_UNIPROC
)
231 else FLAGIF(RB_SAFEBOOT
)
232 else FLAGIF(RB_UPSDELAY
)
234 flags_off
+= sprintf(flags_off
, "0x%x", flags
);
243 signal_to_C_name(unsigned int sig
)
245 static char unknown
[25];
247 #define SIG2CASE(sg) case sg: return #sg
281 snprintf(unknown
, sizeof(unknown
), "%u", sig
);
287 log_kevent_struct(int level
, struct kevent
*kev_base
, int indx
)
289 struct kevent
*kev
= &kev_base
[indx
];
290 const char *filter_str
;
292 char filter_buf
[100];
293 char fflags_buf
[1000];
294 char flags_buf
[1000] = "0x0";
295 char *flags_off
= NULL
;
296 char *fflags_off
= NULL
;
297 unsigned short flags
= kev
->flags
;
298 unsigned int fflags
= kev
->fflags
;
300 if (likely(!(LOG_MASK(level
) & internal_mask_pri
))) {
304 if (flags
) while (flags
) {
310 flags_off
= flags_buf
;
314 else FLAGIF(EV_RECEIPT
)
315 else FLAGIF(EV_DELETE
)
316 else FLAGIF(EV_ENABLE
)
317 else FLAGIF(EV_DISABLE
)
318 else FLAGIF(EV_CLEAR
)
320 else FLAGIF(EV_ONESHOT
)
321 else FLAGIF(EV_ERROR
)
323 flags_off
+= sprintf(flags_off
, "0x%hx", flags
);
328 snprintf(ident_buf
, sizeof(ident_buf
), "%ld", kev
->ident
);
329 snprintf(fflags_buf
, sizeof(fflags_buf
), "0x%x", fflags
);
331 switch (kev
->filter
) {
333 filter_str
= "EVFILT_READ";
336 filter_str
= "EVFILT_WRITE";
339 filter_str
= "EVFILT_AIO";
342 filter_str
= "EVFILT_VNODE";
343 if (fflags
) while (fflags
) {
349 fflags_off
= fflags_buf
;
352 #define FFLAGIF(ff) if (fflags & ff) { fflags_off += sprintf(fflags_off, #ff); fflags &= ~ff; }
355 else FFLAGIF(NOTE_WRITE
)
356 else FFLAGIF(NOTE_EXTEND
)
357 else FFLAGIF(NOTE_ATTRIB
)
358 else FFLAGIF(NOTE_LINK
)
359 else FFLAGIF(NOTE_RENAME
)
360 else FFLAGIF(NOTE_REVOKE
)
362 fflags_off
+= sprintf(fflags_off
, "0x%x", fflags
);
368 filter_str
= "EVFILT_PROC";
369 if (fflags
) while (fflags
) {
375 fflags_off
= fflags_buf
;
379 else FFLAGIF(NOTE_REAP
)
380 else FFLAGIF(NOTE_FORK
)
381 else FFLAGIF(NOTE_EXEC
)
382 else FFLAGIF(NOTE_SIGNAL
)
383 else FFLAGIF(NOTE_TRACK
)
384 else FFLAGIF(NOTE_TRACKERR
)
385 else FFLAGIF(NOTE_CHILD
)
387 fflags_off
+= sprintf(fflags_off
, "0x%x", fflags
);
393 filter_str
= "EVFILT_SIGNAL";
394 strcpy(ident_buf
, signal_to_C_name(kev
->ident
));
397 filter_str
= "EVFILT_TIMER";
398 snprintf(ident_buf
, sizeof(ident_buf
), "0x%lx", kev
->ident
);
399 if (fflags
) while (fflags
) {
405 fflags_off
= fflags_buf
;
408 FFLAGIF(NOTE_SECONDS
)
409 else FFLAGIF(NOTE_USECONDS
)
410 else FFLAGIF(NOTE_NSECONDS
)
411 else FFLAGIF(NOTE_ABSOLUTE
)
413 fflags_off
+= sprintf(fflags_off
, "0x%x", fflags
);
418 case EVFILT_MACHPORT
:
419 filter_str
= "EVFILT_MACHPORT";
420 snprintf(ident_buf
, sizeof(ident_buf
), "0x%lx", kev
->ident
);
423 filter_str
= "EVFILT_FS";
424 snprintf(ident_buf
, sizeof(ident_buf
), "0x%lx", kev
->ident
);
425 if (fflags
) while (fflags
) {
431 fflags_off
= fflags_buf
;
435 else FFLAGIF(VQ_NEEDAUTH
)
436 else FFLAGIF(VQ_LOWDISK
)
437 else FFLAGIF(VQ_MOUNT
)
438 else FFLAGIF(VQ_UNMOUNT
)
439 else FFLAGIF(VQ_DEAD
)
440 else FFLAGIF(VQ_ASSIST
)
441 else FFLAGIF(VQ_NOTRESPLOCK
)
442 else FFLAGIF(VQ_UPDATE
)
444 fflags_off
+= sprintf(fflags_off
, "0x%x", fflags
);
450 snprintf(filter_buf
, sizeof(filter_buf
), "%hd", kev
->filter
);
451 filter_str
= filter_buf
;
455 runtime_syslog(level
, "KEVENT[%d]: udata = %p data = 0x%lx ident = %s filter = %s flags = %s fflags = %s",
456 indx
, kev
->udata
, kev
->data
, ident_buf
, filter_str
, flags_buf
, fflags_buf
);
460 mportset_callback(void)
462 mach_port_name_array_t members
;
463 mach_msg_type_number_t membersCnt
;
464 mach_port_status_t status
;
465 mach_msg_type_number_t statusCnt
;
469 if (!launchd_assumes((errno
= mach_port_get_set_status(mach_task_self(), demand_port_set
, &members
, &membersCnt
)) == KERN_SUCCESS
)) {
473 for (i
= 0; i
< membersCnt
; i
++) {
474 statusCnt
= MACH_PORT_RECEIVE_STATUS_COUNT
;
475 if (mach_port_get_attributes(mach_task_self(), members
[i
], MACH_PORT_RECEIVE_STATUS
, (mach_port_info_t
)&status
,
476 &statusCnt
) != KERN_SUCCESS
) {
479 if (status
.mps_msgcount
) {
480 EV_SET(&kev
, members
[i
], EVFILT_MACHPORT
, 0, 0, 0, job_find_by_service_port(members
[i
]));
482 if (launchd_assumes(kev
.udata
!= NULL
)) {
484 log_kevent_struct(LOG_DEBUG
, &kev
, 0);
485 (*((kq_callback
*)kev
.udata
))(kev
.udata
, &kev
);
488 log_kevent_struct(LOG_ERR
, &kev
, 0);
491 /* the callback may have tainted our ability to continue this for loop */
496 (void)launchd_assumes(vm_deallocate(mach_task_self(), (vm_address_t
)members
,
497 (vm_size_t
) membersCnt
* sizeof(mach_port_name_t
)) == KERN_SUCCESS
);
501 kqueue_demand_loop(void *arg
__attribute__((unused
)))
506 * Yes, at first glance, calling select() on a kqueue seems silly.
508 * This avoids a race condition between the main thread and this helper
509 * thread by ensuring that we drain kqueue events on the same thread
510 * that manipulates the kqueue.
515 FD_SET(mainkq
, &rfds
);
516 if (launchd_assumes(select(mainkq
+ 1, &rfds
, NULL
, NULL
, NULL
) == 1)) {
517 (void)launchd_assumes(handle_kqueue(launchd_internal_port
, mainkq
) == 0);
525 x_handle_kqueue(mach_port_t junk
__attribute__((unused
)), integer_t fd
)
527 struct timespec ts
= { 0, 0 };
528 struct kevent
*kevi
, kev
[BULK_KEV_MAX
];
533 if (launchd_assumes((bulk_kev_cnt
= kevent(fd
, NULL
, 0, kev
, BULK_KEV_MAX
, &ts
)) != -1)) {
535 for (i
= 0; i
< bulk_kev_cnt
; i
++) {
536 log_kevent_struct(LOG_DEBUG
, &kev
[0], i
);
539 for (i
= 0; i
< bulk_kev_cnt
; i
++) {
544 runtime_syslog(LOG_DEBUG
, "Dispatching kevent...");
545 log_kevent_struct(LOG_DEBUG
, kev
, i
);
547 /* Check if kevi->udata was either malloc(3)ed or is a valid function pointer.
548 * If neither, it's probably an invalid pointer and we should log it.
551 if (launchd_assumes(malloc_size(kevi
->udata
) || dladdr(kevi
->udata
, &dli
))) {
552 runtime_ktrace(RTKT_LAUNCHD_BSD_KEVENT
|DBG_FUNC_START
, kevi
->ident
, kevi
->filter
, kevi
->fflags
);
553 (*((kq_callback
*)kevi
->udata
))(kevi
->udata
, kevi
);
554 runtime_ktrace0(RTKT_LAUNCHD_BSD_KEVENT
|DBG_FUNC_END
);
556 runtime_syslog(LOG_ERR
, "The following kevent had invalid context data.");
557 log_kevent_struct(LOG_EMERG
, &kev
[0], i
);
564 struct job_check_s
*check
= kevi
->udata
;
565 if (check
&& check
->kqc
) {
566 runtime_ktrace(RTKT_LAUNCHD_BSD_KEVENT
|DBG_FUNC_START
, kevi
->ident
, kevi
->filter
, kevi
->fflags
);
567 (*((kq_callback
*)kevi
->udata
))(kevi
->udata
, kevi
);
568 runtime_ktrace0(RTKT_LAUNCHD_BSD_KEVENT
|DBG_FUNC_END
);
570 runtime_syslog(LOG_ERR
, "The following kevent had invalid context data. Please file a bug with the following information:");
571 log_kevent_struct(LOG_EMERG
, &kev
[0], i
);
584 launchd_runtime(void)
586 mig_reply_error_t
*req
= NULL
, *resp
= NULL
;
587 mach_msg_size_t mz
= max_msg_size
;
588 int flags
= VM_MAKE_TAG(VM_MEMORY_MACH_MSG
)|TRUE
;
592 (void)launchd_assumes(vm_deallocate(mach_task_self(), (vm_address_t
)req
, mz
) == KERN_SUCCESS
);
596 (void)launchd_assumes(vm_deallocate(mach_task_self(), (vm_address_t
)resp
, mz
) == KERN_SUCCESS
);
602 if (!launchd_assumes(vm_allocate(mach_task_self(), (vm_address_t
*)&req
, mz
, flags
) == KERN_SUCCESS
)) {
605 if (!launchd_assumes(vm_allocate(mach_task_self(), (vm_address_t
*)&resp
, mz
, flags
) == KERN_SUCCESS
)) {
609 launchd_runtime2(mz
, req
, resp
);
611 /* If we get here, max_msg_size probably changed... */
616 launchd_set_bport(mach_port_t name
)
618 return errno
= task_set_bootstrap_port(mach_task_self(), name
);
622 launchd_get_bport(mach_port_t
*name
)
624 return errno
= task_get_bootstrap_port(mach_task_self(), name
);
628 launchd_mport_notify_req(mach_port_t name
, mach_msg_id_t which
)
630 mach_port_mscount_t msgc
= (which
== MACH_NOTIFY_PORT_DESTROYED
) ? 0 : 1;
631 mach_port_t previous
, where
= (which
== MACH_NOTIFY_NO_SENDERS
) ? name
: launchd_internal_port
;
633 if (which
== MACH_NOTIFY_NO_SENDERS
) {
634 /* Always make sure the send count is zero, in case a receive right is reused */
635 errno
= mach_port_set_mscount(mach_task_self(), name
, 0);
636 if (unlikely(errno
!= KERN_SUCCESS
)) {
641 errno
= mach_port_request_notification(mach_task_self(), name
, which
, msgc
, where
,
642 MACH_MSG_TYPE_MAKE_SEND_ONCE
, &previous
);
644 if (likely(errno
== 0) && previous
!= MACH_PORT_NULL
) {
645 (void)launchd_assumes(launchd_mport_deallocate(previous
) == KERN_SUCCESS
);
652 runtime_fork(mach_port_t bsport
)
654 sigset_t emptyset
, oset
;
659 sigemptyset(&emptyset
);
661 (void)launchd_assumes(launchd_mport_make_send(bsport
) == KERN_SUCCESS
);
662 (void)launchd_assumes(launchd_set_bport(bsport
) == KERN_SUCCESS
);
663 (void)launchd_assumes(launchd_mport_deallocate(bsport
) == KERN_SUCCESS
);
665 (void)launchd_assumes(sigprocmask(SIG_BLOCK
, &sigign_set
, &oset
) != -1);
666 for (i
= 0; i
< (sizeof(sigigns
) / sizeof(int)); i
++) {
667 (void)launchd_assumes(signal(sigigns
[i
], SIG_DFL
) != SIG_ERR
);
674 for (i
= 0; i
< (sizeof(sigigns
) / sizeof(int)); i
++) {
675 (void)launchd_assumes(signal(sigigns
[i
], SIG_IGN
) != SIG_ERR
);
677 (void)launchd_assumes(sigprocmask(SIG_SETMASK
, &oset
, NULL
) != -1);
678 (void)launchd_assumes(launchd_set_bport(MACH_PORT_NULL
) == KERN_SUCCESS
);
681 (void)launchd_assumes(sysctlbyname("vfs.generic.noremotehang", NULL
, NULL
, &p
, sizeof(p
)) != -1);
683 (void)launchd_assumes(sigprocmask(SIG_SETMASK
, &emptyset
, NULL
) != -1);
693 runtime_set_timeout(timeout_callback to_cb
, unsigned int sec
)
695 if (sec
== 0 || to_cb
== NULL
) {
696 runtime_idle_callback
= NULL
;
697 runtime_idle_timeout
= 0;
700 runtime_idle_callback
= to_cb
;
701 runtime_idle_timeout
= sec
* 1000;
705 runtime_add_mport(mach_port_t name
, mig_callback demux
, mach_msg_size_t msg_size
)
707 size_t needed_table_sz
= (MACH_PORT_INDEX(name
) + 1) * sizeof(mig_callback
);
708 mach_port_t target_set
= demux
? ipc_port_set
: demand_port_set
;
710 msg_size
= round_page(msg_size
+ MAX_TRAILER_SIZE
);
712 if (unlikely(needed_table_sz
> mig_cb_table_sz
)) {
713 needed_table_sz
*= 2; /* Let's try and avoid realloc'ing for a while */
714 mig_callback
*new_table
= malloc(needed_table_sz
);
716 if (!launchd_assumes(new_table
!= NULL
)) {
717 return KERN_RESOURCE_SHORTAGE
;
720 if (likely(mig_cb_table
)) {
721 memcpy(new_table
, mig_cb_table
, mig_cb_table_sz
);
725 mig_cb_table_sz
= needed_table_sz
;
726 mig_cb_table
= new_table
;
729 mig_cb_table
[MACH_PORT_INDEX(name
)] = demux
;
731 if (msg_size
> max_msg_size
) {
732 max_msg_size
= msg_size
;
735 return errno
= mach_port_move_member(mach_task_self(), name
, target_set
);
739 runtime_remove_mport(mach_port_t name
)
741 mig_cb_table
[MACH_PORT_INDEX(name
)] = NULL
;
743 return errno
= mach_port_move_member(mach_task_self(), name
, MACH_PORT_NULL
);
747 launchd_mport_make_send(mach_port_t name
)
749 return errno
= mach_port_insert_right(mach_task_self(), name
, name
, MACH_MSG_TYPE_MAKE_SEND
);
753 launchd_mport_copy_send(mach_port_t name
)
755 return errno
= mach_port_insert_right(mach_task_self(), name
, name
, MACH_MSG_TYPE_COPY_SEND
);
759 launchd_mport_make_send_once(mach_port_t name
, mach_port_t
*so
)
761 mach_msg_type_name_t right
= 0;
762 return errno
= mach_port_extract_right(mach_task_self(), name
, MACH_MSG_TYPE_MAKE_SEND_ONCE
, so
, &right
);
766 launchd_mport_close_recv(mach_port_t name
)
768 return errno
= mach_port_mod_refs(mach_task_self(), name
, MACH_PORT_RIGHT_RECEIVE
, -1);
772 launchd_mport_create_recv(mach_port_t
*name
)
774 return errno
= mach_port_allocate(mach_task_self(), MACH_PORT_RIGHT_RECEIVE
, name
);
778 launchd_mport_deallocate(mach_port_t name
)
780 return errno
= mach_port_deallocate(mach_task_self(), name
);
784 kevent_bulk_mod(struct kevent
*kev
, size_t kev_cnt
)
788 for (i
= 0; i
< kev_cnt
; i
++) {
789 kev
[i
].flags
|= EV_CLEAR
|EV_RECEIPT
;
792 return kevent(mainkq
, kev
, kev_cnt
, kev
, kev_cnt
, NULL
);
796 kevent_mod(uintptr_t ident
, short filter
, u_short flags
, u_int fflags
, intptr_t data
, void *udata
)
806 /* Workaround 5225889 */
807 if (flags
& EV_ADD
) {
808 kevent_mod(ident
, EVFILT_TIMER
, EV_DELETE
, 0, 0, NULL
);
818 if (flags
& EV_ADD
&& !launchd_assumes(udata
!= NULL
)) {
821 } else if ((flags
& EV_DELETE
) && bulk_kev
) {
823 for (i
= bulk_kev_i
+ 1; i
< bulk_kev_cnt
; i
++) {
824 if (bulk_kev
[i
].filter
== filter
&& bulk_kev
[i
].ident
== ident
) {
825 runtime_syslog(LOG_DEBUG
, "Pruning the following kevent:");
826 log_kevent_struct(LOG_DEBUG
, &bulk_kev
[0], i
);
827 bulk_kev
[i
].filter
= (short)0;
832 EV_SET(&kev
, ident
, filter
, flags
, fflags
, data
, udata
);
834 r
= kevent(mainkq
, &kev
, 1, &kev
, 1, NULL
);
836 if (!launchd_assumes(r
== 1)) {
840 if (launchd_assumes(kev
.flags
& EV_ERROR
)) {
841 if ((flags
& EV_ADD
) && kev
.data
) {
842 runtime_syslog(LOG_DEBUG
, "%s(): See the next line...", __func__
);
843 log_kevent_struct(LOG_DEBUG
, &kev
, 0);
853 launchd_internal_demux(mach_msg_header_t
*Request
, mach_msg_header_t
*Reply
)
855 if (launchd_internal_server_routine(Request
)) {
856 return launchd_internal_server(Request
, Reply
);
857 } else if (notify_server_routine(Request
)) {
858 return notify_server(Request
, Reply
);
860 return mach_exc_server(Request
, Reply
);
865 do_mach_notify_port_destroyed(mach_port_t notify
__attribute__((unused
)), mach_port_t rights
)
867 /* This message is sent to us when a receive right is returned to us. */
869 if (!launchd_assumes(job_ack_port_destruction(rights
))) {
870 (void)launchd_assumes(launchd_mport_close_recv(rights
) == KERN_SUCCESS
);
877 do_mach_notify_port_deleted(mach_port_t notify
__attribute__((unused
)), mach_port_name_t name
__attribute__((unused
)))
879 /* If we deallocate/destroy/mod_ref away a port with a pending
880 * notification, the original notification message is replaced with
881 * this message. To quote a Mach kernel expert, "the kernel has a
882 * send-once right that has to be used somehow."
888 do_mach_notify_no_senders(mach_port_t notify
, mach_port_mscount_t mscount
__attribute__((unused
)))
890 job_t j
= job_mig_intran(notify
);
892 /* This message is sent to us when the last customer of one of our
896 if (!launchd_assumes(j
!= NULL
)) {
900 job_ack_no_senders(j
);
906 do_mach_notify_send_once(mach_port_t notify
__attribute__((unused
)))
909 * This message is sent for each send-once right that is deallocated
910 * without being used.
917 do_mach_notify_dead_name(mach_port_t notify
__attribute__((unused
)), mach_port_name_t name
)
919 /* This message is sent to us when one of our send rights no longer has
920 * a receiver somewhere else on the system.
923 if (name
== drain_reply_port
) {
924 (void)launchd_assumes(launchd_mport_deallocate(name
) == KERN_SUCCESS
);
925 drain_reply_port
= MACH_PORT_NULL
;
928 if (launchd_assumes(root_jobmgr
!= NULL
)) {
929 root_jobmgr
= jobmgr_delete_anything_with_port(root_jobmgr
, name
);
932 /* A dead-name notification about a port appears to increment the
933 * rights on said port. Let's deallocate it so that we don't leak
936 (void)launchd_assumes(launchd_mport_deallocate(name
) == KERN_SUCCESS
);
942 record_caller_creds(mach_msg_header_t
*mh
)
944 mach_msg_max_trailer_t
*tp
;
947 tp
= (mach_msg_max_trailer_t
*)((vm_offset_t
)mh
+ round_msg(mh
->msgh_size
));
949 trailer_size
= tp
->msgh_trailer_size
- (mach_msg_size_t
)(sizeof(mach_msg_trailer_type_t
) - sizeof(mach_msg_trailer_size_t
));
951 if (launchd_assumes(trailer_size
>= (mach_msg_size_t
)sizeof(audit_token_t
))) {
952 audit_token_to_au32(tp
->msgh_audit
, /* audit UID */ NULL
, &ldc
.euid
,
953 &ldc
.egid
, &ldc
.uid
, &ldc
.gid
, &ldc
.pid
,
954 &ldc
.asid
, /* au_tid_t */ NULL
);
960 runtime_get_caller_creds(void)
966 launchd_exc_runtime_once(mach_port_t port
, mach_msg_size_t rcv_msg_size
, mach_msg_size_t send_msg_size
, mig_reply_error_t
*bufRequest
, mig_reply_error_t
*bufReply
, mach_msg_timeout_t to
)
968 mach_msg_return_t mr
= ~MACH_MSG_SUCCESS
;
969 mach_msg_option_t rcv_options
= MACH_RCV_MSG
|
971 MACH_RCV_TRAILER_ELEMENTS(MACH_RCV_TRAILER_AUDIT
) |
972 MACH_RCV_TRAILER_TYPE(MACH_MSG_TRAILER_FORMAT_0
) ;
975 mr
= mach_msg(&bufRequest
->Head
, rcv_options
, 0, rcv_msg_size
, port
, to
, MACH_PORT_NULL
);
977 case MACH_RCV_TIMED_OUT
:
978 runtime_syslog(LOG_DEBUG
, "Message queue is empty.");
980 case MACH_RCV_TOO_LARGE
:
981 runtime_syslog(LOG_INFO
, "Message is larger than %u bytes.", rcv_msg_size
);
984 (void)launchd_assumes(mr
== MACH_MSG_SUCCESS
);
987 if (mr
== MACH_MSG_SUCCESS
) {
988 if (!launchd_assumes(mach_exc_server(&bufRequest
->Head
, &bufReply
->Head
) == TRUE
)) {
989 runtime_syslog(LOG_WARNING
, "Exception server routine failed.");
993 mach_msg_return_t smr
= ~MACH_MSG_SUCCESS
;
994 mach_msg_option_t send_options
= MACH_SEND_MSG
|
997 (void)launchd_assumes(bufReply
->Head
.msgh_size
<= send_msg_size
);
998 smr
= mach_msg(&bufReply
->Head
, send_options
, bufReply
->Head
.msgh_size
, 0, MACH_PORT_NULL
, to
+ 100, MACH_PORT_NULL
);
1000 case MACH_SEND_TIMED_OUT
:
1001 runtime_syslog(LOG_WARNING
, "Timed out while trying to send reply to exception message.");
1003 case MACH_SEND_INVALID_DEST
:
1004 runtime_syslog(LOG_WARNING
, "Tried sending a message to a port that we don't possess a send right to.");
1007 if (!launchd_assumes(smr
== MACH_MSG_SUCCESS
)) {
1008 runtime_syslog(LOG_WARNING
, "Couldn't deliver exception reply: 0x%x", smr
);
1019 launchd_runtime2(mach_msg_size_t msg_size
, mig_reply_error_t
*bufRequest
, mig_reply_error_t
*bufReply
)
1021 mach_msg_options_t options
, tmp_options
;
1022 mig_reply_error_t
*bufTemp
;
1023 mig_callback the_demux
;
1024 mach_msg_timeout_t to
;
1025 mach_msg_return_t mr
;
1028 options
= MACH_RCV_MSG
|MACH_RCV_TRAILER_ELEMENTS(MACH_RCV_TRAILER_AUDIT
) |
1029 MACH_RCV_TRAILER_TYPE(MACH_MSG_TRAILER_FORMAT_0
);
1031 tmp_options
= options
;
1034 busy_cnt
= runtime_busy_cnt
+ runtime_standby_cnt
;
1035 to
= MACH_MSG_TIMEOUT_NONE
;
1037 if (unlikely(msg_size
!= max_msg_size
)) {
1038 /* The buffer isn't big enough to receive messages anymore... */
1039 tmp_options
&= ~MACH_RCV_MSG
;
1040 options
&= ~MACH_RCV_MSG
;
1041 if (!(tmp_options
& MACH_SEND_MSG
)) {
1046 if ((tmp_options
& MACH_RCV_MSG
) && (runtime_idle_callback
|| (busy_cnt
== 0))) {
1047 tmp_options
|= MACH_RCV_TIMEOUT
;
1049 if (!(tmp_options
& MACH_SEND_TIMEOUT
)) {
1050 #if !TARGET_OS_EMBEDDED
1051 to
= busy_cnt
? runtime_idle_timeout
: (_vproc_standby_timeout() * 1000);
1053 to
= runtime_idle_timeout
;
1060 mr
= mach_msg(&bufReply
->Head
, tmp_options
, bufReply
->Head
.msgh_size
,
1061 msg_size
, ipc_port_set
, to
, MACH_PORT_NULL
);
1063 time_of_mach_msg_return
= runtime_get_opaque_time();
1065 tmp_options
= options
;
1067 /* It looks like the compiler doesn't optimize switch(unlikely(...)) See: 5691066 */
1068 if (unlikely(mr
)) switch (mr
) {
1069 case MACH_SEND_INVALID_DEST
:
1070 case MACH_SEND_TIMED_OUT
:
1071 /* We need to clean up and start over. */
1072 if (bufReply
->Head
.msgh_bits
& MACH_MSGH_BITS_COMPLEX
) {
1073 mach_msg_destroy(&bufReply
->Head
);
1076 case MACH_RCV_TIMED_OUT
:
1077 if (to
!= MACH_MSG_TIMEOUT_NONE
) {
1078 if (busy_cnt
== 0) {
1079 runtime_syslog(LOG_INFO
, "Idle exiting.");
1081 } else if (runtime_idle_callback
) {
1082 runtime_idle_callback();
1087 if (!launchd_assumes(mr
== MACH_MSG_SUCCESS
)) {
1088 runtime_syslog(LOG_ERR
, "mach_msg(): %u: %s", mr
, mach_error_string(mr
));
1093 bufTemp
= bufRequest
;
1094 bufRequest
= bufReply
;
1097 if (unlikely(!(tmp_options
& MACH_RCV_MSG
))) {
1101 /* we have another request message */
1103 if (!launchd_assumes(mig_cb_table
!= NULL
)) {
1108 the_demux
= mig_cb_table
[MACH_PORT_INDEX(bufRequest
->Head
.msgh_local_port
)];
1111 if (!launchd_assumes(the_demux
!= NULL
)) {
1116 record_caller_creds(&bufRequest
->Head
);
1117 runtime_ktrace(RTKT_LAUNCHD_MACH_IPC
|DBG_FUNC_START
, bufRequest
->Head
.msgh_local_port
, bufRequest
->Head
.msgh_id
, (long)the_demux
);
1119 if (the_demux(&bufRequest
->Head
, &bufReply
->Head
) == FALSE
) {
1120 /* XXX - also gross */
1121 if (likely(bufRequest
->Head
.msgh_id
== MACH_NOTIFY_NO_SENDERS
)) {
1122 notify_server(&bufRequest
->Head
, &bufReply
->Head
);
1123 } else if (the_demux
== protocol_vproc_server
) {
1125 #if !TARGET_OS_EMBEDDED
1126 /* Similarly gross. */
1127 if (xpc_domain_server(&bufRequest
->Head
, &bufReply
->Head
) == FALSE
) {
1128 (void)xpc_events_server(&bufRequest
->Head
, &bufReply
->Head
);
1131 (void)xpc_events_server(&bufRequest
->Head
, &bufReply
->Head
);
1132 #endif /* !TARGET_OS_EMBEDDED */
1136 runtime_ktrace(RTKT_LAUNCHD_MACH_IPC
|DBG_FUNC_END
, bufReply
->Head
.msgh_remote_port
, bufReply
->Head
.msgh_bits
, bufReply
->RetCode
);
1138 /* bufReply is a union. If MACH_MSGH_BITS_COMPLEX is set, then bufReply->RetCode is assumed to be zero. */
1139 if (!(bufReply
->Head
.msgh_bits
& MACH_MSGH_BITS_COMPLEX
)) {
1140 if (unlikely(bufReply
->RetCode
!= KERN_SUCCESS
)) {
1141 if (likely(bufReply
->RetCode
== MIG_NO_REPLY
)) {
1142 bufReply
->Head
.msgh_remote_port
= MACH_PORT_NULL
;
1143 } else if (bufRequest
->Head
.msgh_bits
& MACH_MSGH_BITS_COMPLEX
) {
1144 /* destroy the request - but not the reply port */
1145 bufRequest
->Head
.msgh_remote_port
= MACH_PORT_NULL
;
1146 mach_msg_destroy(&bufRequest
->Head
);
1151 if (likely(bufReply
->Head
.msgh_remote_port
!= MACH_PORT_NULL
)) {
1152 tmp_options
|= MACH_SEND_MSG
;
1154 if (unlikely(MACH_MSGH_BITS_REMOTE(bufReply
->Head
.msgh_bits
) != MACH_MSG_TYPE_MOVE_SEND_ONCE
)) {
1155 tmp_options
|= MACH_SEND_TIMEOUT
;
1162 runtime_close(int fd
)
1166 if (bulk_kev
) for (i
= bulk_kev_i
+ 1; i
< bulk_kev_cnt
; i
++) {
1167 switch (bulk_kev
[i
].filter
) {
1171 if (unlikely((int)bulk_kev
[i
].ident
== fd
)) {
1172 runtime_syslog(LOG_DEBUG
, "Skipping kevent index: %d", i
);
1173 bulk_kev
[i
].filter
= 0;
1184 runtime_closelog(void)
1189 (void)launchd_assumes(fflush(ourlogfile
) == 0);
1190 (void)launchd_assumes(runtime_fsync(fileno(ourlogfile
)) != -1);
1195 runtime_fsync(int fd
)
1198 if (do_apple_internal_logging
) {
1199 return fcntl(fd
, F_FULLFSYNC
, NULL
);
1209 runtime_setlogmask(int maskpri
)
1211 internal_mask_pri
= maskpri
;
1213 return internal_mask_pri
;
1217 runtime_syslog(int pri
, const char *message
, ...)
1219 struct runtime_syslog_attr attr
= {
1222 pid1_magic
? "System" : "Background",
1230 va_start(ap
, message
);
1231 runtime_vsyslog(&attr
, message
, ap
);
1237 runtime_vsyslog(struct runtime_syslog_attr
*attr
, const char *message
, va_list args
)
1239 int saved_errno
= errno
;
1241 bool echo_to_console
= false;
1243 if (attr
->priority
== LOG_APPLEONLY
) {
1244 if (do_apple_internal_logging
) {
1245 attr
->priority
= LOG_NOTICE
;
1249 } else if (attr
->priority
== LOG_SCOLDING
) {
1250 attr
->priority
= g_log_strict_usage
? LOG_NOTICE
: LOG_DEBUG
;
1253 if (attr
->priority
& LOG_CONSOLE
) {
1254 echo_to_console
= true;
1255 attr
->priority
&= ~LOG_CONSOLE
;
1258 if (!(LOG_MASK(attr
->priority
) & internal_mask_pri
)) {
1262 vsnprintf(newmsg
, sizeof(newmsg
), message
, args
);
1264 if (g_console
&& (unlikely(low_level_debug
) || echo_to_console
)) {
1265 fprintf(g_console
, "%s %u\t%s %u\t%s\n", attr
->from_name
, attr
->from_pid
, attr
->about_name
, attr
->about_pid
, newmsg
);
1268 logmsg_add(attr
, saved_errno
, newmsg
);
1272 logmsg_add(struct runtime_syslog_attr
*attr
, int err_num
, const char *msg
)
1274 size_t lm_sz
= sizeof(struct logmsg_s
) + strlen(msg
) + strlen(attr
->from_name
) + strlen(attr
->about_name
) + strlen(attr
->session_name
) + 4;
1276 struct logmsg_s
*lm
;
1278 #define ROUND_TO_64BIT_WORD_SIZE(x) ((x + 7) & ~7)
1280 /* we do this to make the unpacking for the log_drain cause unalignment faults */
1281 lm_sz
= ROUND_TO_64BIT_WORD_SIZE(lm_sz
);
1283 if (unlikely((lm
= calloc(1, lm_sz
)) == NULL
)) {
1287 data_off
= lm
->data
;
1289 lm
->when
= runtime_get_wall_time();
1290 lm
->from_pid
= attr
->from_pid
;
1291 lm
->about_pid
= attr
->about_pid
;
1292 lm
->err_num
= err_num
;
1293 lm
->pri
= attr
->priority
;
1296 data_off
+= sprintf(data_off
, "%s", msg
) + 1;
1297 lm
->from_name
= data_off
;
1298 data_off
+= sprintf(data_off
, "%s", attr
->from_name
) + 1;
1299 lm
->about_name
= data_off
;
1300 data_off
+= sprintf(data_off
, "%s", attr
->about_name
) + 1;
1301 lm
->session_name
= data_off
;
1302 data_off
+= sprintf(data_off
, "%s", attr
->session_name
) + 1;
1304 STAILQ_INSERT_TAIL(&logmsg_queue
, lm
, sqe
);
1305 logmsg_queue_sz
+= lm_sz
;
1312 logmsg_remove(struct logmsg_s
*lm
)
1314 STAILQ_REMOVE(&logmsg_queue
, lm
, logmsg_s
, sqe
);
1315 logmsg_queue_sz
-= lm
->obj_sz
;
1322 runtime_log_pack(vm_offset_t
*outval
, mach_msg_type_number_t
*outvalCnt
)
1324 struct logmsg_s
*lm
;
1327 *outvalCnt
= logmsg_queue_sz
;
1329 mig_allocate(outval
, *outvalCnt
);
1331 if (unlikely(*outval
== 0)) {
1335 offset
= (void *)*outval
;
1337 if (g_log_per_user_shutdown
&& !ourlogfile
&& !pid1_magic
&& shutdown_in_progress
) {
1338 char logfile
[NAME_MAX
];
1339 snprintf(logfile
, sizeof(logfile
), "/var/tmp/launchd-%s.shutdown.log", g_username
);
1341 char logfile1
[NAME_MAX
];
1342 snprintf(logfile1
, sizeof(logfile1
), "/var/tmp/launchd-%s.shutdown.log.1", g_username
);
1344 rename(logfile
, logfile1
);
1345 ourlogfile
= fopen(logfile
, "a");
1348 static int64_t shutdown_start
= 0;
1349 if (shutdown_start
== 0) {
1350 shutdown_start
= runtime_get_wall_time();
1353 while ((lm
= STAILQ_FIRST(&logmsg_queue
))) {
1354 int64_t log_delta
= lm
->when
- shutdown_start
;
1355 if (!pid1_magic
&& ourlogfile
) {
1356 fprintf(ourlogfile
, "%8lld%6u %-40s%6u %-40s %s\n", log_delta
,
1357 lm
->from_pid
, lm
->from_name
, lm
->about_pid
, lm
->about_name
, lm
->msg
);
1361 lm
->from_name_offset
= lm
->from_name
- (char *)lm
;
1362 lm
->about_name_offset
= lm
->about_name
- (char *)lm
;
1363 lm
->msg_offset
= lm
->msg
- (char *)lm
;
1364 lm
->session_name_offset
= lm
->session_name
- (char *)lm
;
1366 memcpy(offset
, lm
, lm
->obj_sz
);
1368 offset
+= lm
->obj_sz
;
1381 runtime_log_uncork_pending_drain(void)
1383 mach_msg_type_number_t outvalCnt
;
1384 mach_port_t tmp_port
;
1387 if (!drain_reply_port
) {
1391 if (logmsg_queue_cnt
== 0) {
1395 if (runtime_log_pack(&outval
, &outvalCnt
) != 0) {
1399 tmp_port
= drain_reply_port
;
1400 drain_reply_port
= MACH_PORT_NULL
;
1402 if (unlikely(errno
= job_mig_log_drain_reply(tmp_port
, 0, outval
, outvalCnt
))) {
1403 (void)launchd_assumes(errno
== MACH_SEND_INVALID_DEST
);
1404 (void)launchd_assumes(launchd_mport_deallocate(tmp_port
) == KERN_SUCCESS
);
1407 mig_deallocate(outval
, outvalCnt
);
1411 runtime_log_push(void)
1413 static pthread_mutex_t ourlock
= PTHREAD_MUTEX_INITIALIZER
;
1414 static int64_t shutdown_start
, log_delta
;
1415 mach_msg_type_number_t outvalCnt
;
1416 struct logmsg_s
*lm
;
1419 if (logmsg_queue_cnt
== 0) {
1420 (void)launchd_assumes(STAILQ_EMPTY(&logmsg_queue
));
1422 } else if (!pid1_magic
) {
1423 if (runtime_log_pack(&outval
, &outvalCnt
) == 0) {
1424 (void)launchd_assumes(_vprocmgr_log_forward(inherited_bootstrap_port
, (void *)outval
, outvalCnt
) == NULL
);
1425 mig_deallocate(outval
, outvalCnt
);
1430 if (likely(!shutdown_in_progress
&& !fake_shutdown_in_progress
)) {
1431 runtime_log_uncork_pending_drain();
1435 if (unlikely(shutdown_start
== 0)) {
1436 shutdown_start
= runtime_get_wall_time();
1437 launchd_log_vm_stats();
1440 pthread_mutex_lock(&ourlock
);
1442 if (unlikely(ourlogfile
== NULL
) && g_log_pid1_shutdown
) {
1443 rename("/var/log/launchd-shutdown.log", "/var/log/launchd-shutdown.log.1");
1444 ourlogfile
= fopen("/var/log/launchd-shutdown.log", "a");
1447 pthread_mutex_unlock(&ourlock
);
1449 if (unlikely(!ourlogfile
)) {
1453 while ((lm
= STAILQ_FIRST(&logmsg_queue
))) {
1454 log_delta
= lm
->when
- shutdown_start
;
1456 fprintf(ourlogfile
, "%8lld%6u %-40s%6u %-40s %s\n", log_delta
,
1457 lm
->from_pid
, lm
->from_name
, lm
->about_pid
, lm
->about_name
, lm
->msg
);
1466 runtime_log_forward(uid_t forward_uid
, gid_t forward_gid
, vm_offset_t inval
, mach_msg_type_number_t invalCnt
)
1468 struct logmsg_s
*lm
, *lm_walk
;
1469 mach_msg_type_number_t data_left
= invalCnt
;
1475 for (lm_walk
= (struct logmsg_s
*)inval
; (data_left
> 0) && (lm_walk
->obj_sz
<= data_left
); lm_walk
= ((void *)lm_walk
+ lm_walk
->obj_sz
)) {
1476 /* malloc() does not return NULL if you ask it for an allocation of size 0.
1477 * It will return a valid pointer that can be passed to free(). If we don't
1478 * do this check, we'll wind up corrupting our heap in the subsequent
1481 * We break out if this check fails because, obj_sz is supposed to include
1482 * the size of the logmsg_s struct. If it claims to be of zero size, we
1483 * can't safely increment our counter because something obviously got screwed
1484 * up along the way, since this should always be at least sizeof(struct logmsg_s).
1486 if (!launchd_assumes(lm_walk
->obj_sz
> 0)) {
1487 runtime_syslog(LOG_WARNING
, "Encountered a log message of size 0 with %u bytes left in forwarded data. Ignoring remaining messages.", data_left
);
1491 /* If malloc() keeps failing, we shouldn't put additional pressure on the system
1492 * by attempting to add more messages to the log until it returns success
1493 * log a failure, hope pressure lets off, and move on.
1495 if (!launchd_assumes(lm
= malloc(lm_walk
->obj_sz
))) {
1496 runtime_syslog(LOG_WARNING
, "Failed to allocate %llu bytes for log message with %u bytes left in forwarded data. Ignoring remaining messages.", lm_walk
->obj_sz
, data_left
);
1500 memcpy(lm
, lm_walk
, lm_walk
->obj_sz
);
1501 lm
->sender_uid
= forward_uid
;
1502 lm
->sender_gid
= forward_gid
;
1504 lm
->from_name
+= (size_t)lm
;
1505 lm
->about_name
+= (size_t)lm
;
1506 lm
->msg
+= (size_t)lm
;
1507 lm
->session_name
+= (size_t)lm
;
1509 STAILQ_INSERT_TAIL(&logmsg_queue
, lm
, sqe
);
1510 logmsg_queue_sz
+= lm
->obj_sz
;
1513 data_left
-= lm
->obj_sz
;
1516 mig_deallocate(inval
, invalCnt
);
1522 runtime_log_drain(mach_port_t srp
, vm_offset_t
*outval
, mach_msg_type_number_t
*outvalCnt
)
1524 (void)launchd_assumes(drain_reply_port
== 0);
1526 if ((logmsg_queue_cnt
== 0) || shutdown_in_progress
|| fake_shutdown_in_progress
) {
1527 drain_reply_port
= srp
;
1528 (void)launchd_assumes(launchd_mport_notify_req(drain_reply_port
, MACH_NOTIFY_DEAD_NAME
) == KERN_SUCCESS
);
1530 return MIG_NO_REPLY
;
1533 return runtime_log_pack(outval
, outvalCnt
);
1537 * We should break this into two reference counts.
1539 * One for hard references that would prevent exiting.
1540 * One for soft references that would only prevent idle exiting.
1542 * In the long run, reference counting should completely automate when a
1543 * process can and should exit.
1546 runtime_add_ref(void)
1549 #if !TARGET_OS_EMBEDDED
1550 _vproc_transaction_begin();
1555 runtime_remove_timer();
1559 runtime_del_ref(void)
1562 #if !TARGET_OS_EMBEDDED
1563 if (_vproc_transaction_count() == 0) {
1564 runtime_syslog(LOG_INFO
, "Exiting cleanly.");
1568 _vproc_transaction_end();
1573 runtime_install_timer();
1577 runtime_add_weak_ref(void)
1580 #if !TARGET_OS_EMBEDDED
1581 _vproc_standby_begin();
1584 runtime_standby_cnt
++;
1588 runtime_del_weak_ref(void)
1591 #if !TARGET_OS_EMBEDDED
1592 _vproc_standby_end();
1595 runtime_standby_cnt
--;
1599 runtime_install_timer(void)
1601 if (!pid1_magic
&& runtime_busy_cnt
== 0) {
1602 (void)launchd_assumes(kevent_mod((uintptr_t)&g_runtime_busy_time
, EVFILT_TIMER
, EV_ADD
, NOTE_SECONDS
, 30, root_jobmgr
) != -1);
1607 runtime_remove_timer(void)
1609 if (!pid1_magic
&& runtime_busy_cnt
> 0) {
1610 (void)launchd_assumes(kevent_mod((uintptr_t)&g_runtime_busy_time
, EVFILT_TIMER
, EV_DELETE
, 0, 0, NULL
) != -1);
1615 catch_mach_exception_raise(mach_port_t exception_port
__attribute__((unused
)), mach_port_t thread
, mach_port_t task
,
1616 exception_type_t exception
, mach_exception_data_t code
, mach_msg_type_number_t codeCnt
)
1620 (void)launchd_assumes(pid_for_task(task
, &p4t
) == 0);
1622 runtime_syslog(LOG_NOTICE
, "%s(): PID: %u thread: 0x%x type: 0x%x code: %p codeCnt: 0x%x",
1623 __func__
, p4t
, thread
, exception
, code
, codeCnt
);
1625 (void)launchd_assumes(launchd_mport_deallocate(thread
) == KERN_SUCCESS
);
1626 (void)launchd_assumes(launchd_mport_deallocate(task
) == KERN_SUCCESS
);
1628 return KERN_SUCCESS
;
1632 catch_mach_exception_raise_state(mach_port_t exception_port
__attribute__((unused
)),
1633 exception_type_t exception
, const mach_exception_data_t code
, mach_msg_type_number_t codeCnt
,
1634 int *flavor
, const thread_state_t old_state
, mach_msg_type_number_t old_stateCnt
,
1635 thread_state_t new_state
, mach_msg_type_number_t
*new_stateCnt
)
1637 runtime_syslog(LOG_NOTICE
, "%s(): type: 0x%x code: %p codeCnt: 0x%x flavor: %p old_state: %p old_stateCnt: 0x%x new_state: %p new_stateCnt: %p",
1638 __func__
, exception
, code
, codeCnt
, flavor
, old_state
, old_stateCnt
, new_state
, new_stateCnt
);
1640 memcpy(new_state
, old_state
, old_stateCnt
* sizeof(old_state
[0]));
1641 *new_stateCnt
= old_stateCnt
;
1643 return KERN_SUCCESS
;
1647 catch_mach_exception_raise_state_identity(mach_port_t exception_port
__attribute__((unused
)), mach_port_t thread
, mach_port_t task
,
1648 exception_type_t exception
, mach_exception_data_t code
, mach_msg_type_number_t codeCnt
,
1649 int *flavor
, thread_state_t old_state
, mach_msg_type_number_t old_stateCnt
,
1650 thread_state_t new_state
, mach_msg_type_number_t
*new_stateCnt
)
1654 (void)launchd_assumes(pid_for_task(task
, &p4t
) == 0);
1656 runtime_syslog(LOG_NOTICE
, "%s(): PID: %u thread: 0x%x type: 0x%x code: %p codeCnt: 0x%x flavor: %p old_state: %p old_stateCnt: 0x%x new_state: %p new_stateCnt: %p",
1657 __func__
, p4t
, thread
, exception
, code
, codeCnt
, flavor
, old_state
, old_stateCnt
, new_state
, new_stateCnt
);
1659 memcpy(new_state
, old_state
, old_stateCnt
* sizeof(old_state
[0]));
1660 *new_stateCnt
= old_stateCnt
;
1662 (void)launchd_assumes(launchd_mport_deallocate(thread
) == KERN_SUCCESS
);
1663 (void)launchd_assumes(launchd_mport_deallocate(task
) == KERN_SUCCESS
);
1665 return KERN_SUCCESS
;
1669 launchd_log_vm_stats(void)
1671 static struct vm_statistics orig_stats
;
1672 static bool did_first_pass
;
1673 unsigned int count
= HOST_VM_INFO_COUNT
;
1674 struct vm_statistics stats
, *statsp
;
1675 mach_port_t mhs
= mach_host_self();
1677 statsp
= did_first_pass
? &stats
: &orig_stats
;
1679 if (!launchd_assumes(host_statistics(mhs
, HOST_VM_INFO
, (host_info_t
)statsp
, &count
) == KERN_SUCCESS
)) {
1683 (void)launchd_assumes(count
== HOST_VM_INFO_COUNT
);
1685 if (did_first_pass
) {
1686 runtime_syslog(LOG_DEBUG
, "VM statistics (now - orig): Free: %d Active: %d Inactive: %d Reactivations: %d PageIns: %d PageOuts: %d Faults: %d COW-Faults: %d Purgeable: %d Purges: %d",
1687 stats
.free_count
- orig_stats
.free_count
,
1688 stats
.active_count
- orig_stats
.active_count
,
1689 stats
.inactive_count
- orig_stats
.inactive_count
,
1690 stats
.reactivations
- orig_stats
.reactivations
,
1691 stats
.pageins
- orig_stats
.pageins
,
1692 stats
.pageouts
- orig_stats
.pageouts
,
1693 stats
.faults
- orig_stats
.faults
,
1694 stats
.cow_faults
- orig_stats
.cow_faults
,
1695 stats
.purgeable_count
- orig_stats
.purgeable_count
,
1696 stats
.purges
- orig_stats
.purges
);
1698 runtime_syslog(LOG_DEBUG
, "VM statistics (now): Free: %d Active: %d Inactive: %d Reactivations: %d PageIns: %d PageOuts: %d Faults: %d COW-Faults: %d Purgeable: %d Purges: %d",
1699 orig_stats
.free_count
,
1700 orig_stats
.active_count
,
1701 orig_stats
.inactive_count
,
1702 orig_stats
.reactivations
,
1704 orig_stats
.pageouts
,
1706 orig_stats
.cow_faults
,
1707 orig_stats
.purgeable_count
,
1710 did_first_pass
= true;
1713 launchd_mport_deallocate(mhs
);
1717 runtime_get_wall_time(void)
1722 (void)launchd_assumes(gettimeofday(&tv
, NULL
) != -1);
1732 runtime_get_opaque_time(void)
1734 return mach_absolute_time();
1738 runtime_get_opaque_time_of_event(void)
1740 return time_of_mach_msg_return
;
1744 runtime_get_nanoseconds_since(uint64_t o
)
1746 return runtime_opaque_time_to_nano(runtime_get_opaque_time_of_event() - o
);
1750 runtime_opaque_time_to_nano(uint64_t o
)
1752 #if defined(__i386__) || defined(__x86_64__)
1753 if (unlikely(tbi
.numer
!= tbi
.denom
)) {
1754 #elif defined(__ppc__) || defined(__ppc64__)
1755 if (likely(tbi
.numer
!= tbi
.denom
)) {
1757 if (tbi
.numer
!= tbi
.denom
) {
1760 __uint128_t tmp
= o
;
1765 if (o
<= tbi_safe_math_max
) {
1784 launchd_assert(mach_timebase_info(&tbi
) == 0);
1785 tbi_float_val
= tbi
.numer
;
1786 tbi_float_val
/= tbi
.denom
;
1787 tbi_safe_math_max
= UINT64_MAX
/ tbi
.numer
;
1789 if (getpid() == 1) {
1793 if (stat("/AppleInternal", &sb
) == 0 && stat("/var/db/disableAppleInternal", &sb
) == -1) {
1794 do_apple_internal_logging
= true;
1797 if (stat("/var/db/.debug_launchd", &sb
) == 0) {
1798 internal_mask_pri
= LOG_UPTO(LOG_DEBUG
);
1799 low_level_debug
= true;
1802 if (stat("/var/db/.launchd_log_per_user_shutdown", &sb
) == 0) {
1803 g_log_per_user_shutdown
= true;
1806 if (stat("/var/db/.launchd_use_gmalloc", &sb
) == 0) {
1807 g_use_gmalloc
= true;
1810 if (stat("/var/db/.launchd_malloc_log_stacks", &sb
) == 0) {
1811 g_malloc_log_stacks
= true;
1812 g_use_gmalloc
= false;
1815 if (pid1_magic
&& stat("/var/db/.launchd_log_pid1_shutdown", &sb
) == 0) {
1816 g_log_pid1_shutdown
= true;
1820 size_t len
= sizeof(bootargs
) - 1;
1821 int r
= pid1_magic
? sysctlbyname("kern.bootargs", bootargs
, &len
, NULL
, 0) : -1;
1823 if (strnstr(bootargs
, "-v", len
)) {
1824 g_verbose_boot
= true;
1826 if (strnstr(bootargs
, "launchd_trap_sigkill_bugs", len
)) {
1827 g_trap_sigkill_bugs
= true;
1831 if (pid1_magic
&& g_verbose_boot
&& stat("/var/db/.launchd_shutdown_debugging", &sb
) == 0) {
1832 g_shutdown_debugging
= true;
1835 if (stat("/var/db/.launchd_log_strict_usage", &sb
) == 0) {
1836 g_log_strict_usage
= true;