2 * Copyright (c) 2005 Apple Computer, Inc. All rights reserved.
4 * @APPLE_APACHE_LICENSE_HEADER_START@
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
18 * @APPLE_APACHE_LICENSE_HEADER_END@
21 static const char *const __rcs_file_version__
= "$Revision: 1.217 $";
23 #include <Security/Authorization.h>
24 #include <Security/AuthorizationTags.h>
25 #include <Security/AuthSession.h>
26 #include <sys/types.h>
27 #include <sys/queue.h>
28 #include <sys/event.h>
30 #include <sys/ucred.h>
31 #include <sys/fcntl.h>
34 #include <sys/sysctl.h>
35 #include <sys/sockio.h>
37 #include <sys/resource.h>
38 #include <sys/ioctl.h>
39 #include <sys/mount.h>
40 #include <sys/kern_event.h>
42 #include <netinet/in.h>
43 #include <netinet/in_var.h>
44 #include <netinet6/nd6.h>
64 #include "bootstrap_public.h"
65 #include "bootstrap_private.h"
67 #include "launch_priv.h"
69 #include "launchd_core_logic.h"
70 #include "launchd_unix_ipc.h"
72 #include "launchd_internalServer.h"
73 #include "launchd_internal.h"
74 #include "notifyServer.h"
75 #include "bootstrapServer.h"
77 union MaxRequestSize
{
78 union __RequestUnion__do_notify_subsystem req
;
79 union __ReplyUnion__do_notify_subsystem rep
;
80 union __RequestUnion__x_launchd_internal_subsystem req2
;
81 union __ReplyUnion__x_launchd_internal_subsystem rep2
;
82 union __RequestUnion__x_bootstrap_subsystem req3
;
83 union __ReplyUnion__x_bootstrap_subsystem rep3
;
86 static boolean_t
launchd_internal_demux(mach_msg_header_t
*Request
, mach_msg_header_t
*Reply
);
88 #define PID1LAUNCHD_CONF "/etc/launchd.conf"
89 #define LAUNCHD_CONF ".launchd.conf"
90 #define LAUNCHCTL_PATH "/bin/launchctl"
91 #define SECURITY_LIB "/System/Library/Frameworks/Security.framework/Versions/A/Security"
93 extern char **environ
;
95 static void async_callback(void);
96 static void signal_callback(void *, struct kevent
*);
97 static void fs_callback(void);
98 static void ppidexit_callback(void);
99 static void pfsystem_callback(void *, struct kevent
*);
101 static kq_callback kqasync_callback
= (kq_callback
)async_callback
;
102 static kq_callback kqsignal_callback
= signal_callback
;
103 static kq_callback kqfs_callback
= (kq_callback
)fs_callback
;
104 static kq_callback kqppidexit_callback
= (kq_callback
)ppidexit_callback
;
105 static kq_callback kqpfsystem_callback
= pfsystem_callback
;
107 static void pid1_magic_init(bool sflag
);
109 static void usage(FILE *where
);
111 static void testfd_or_openfd(int fd
, const char *path
, int flags
);
112 static bool get_network_state(void);
113 static void monitor_networking_state(void);
114 static void *kqueue_demand_loop(void *arg
);
116 static pthread_t kqueue_demand_thread
;
117 static int mainkq
= 0;
118 static int asynckq
= 0;
119 static bool re_exec_in_single_user_mode
= false;
120 static char *pending_stdout
= NULL
;
121 static char *pending_stderr
= NULL
;
122 static struct jobcb
*rlcj
= NULL
;
124 sigset_t blocked_signals
= 0;
125 bool shutdown_in_progress
= false;
126 bool network_up
= false;
127 int batch_disabler_count
= 0;
128 mach_port_t launchd_internal_port
= MACH_PORT_NULL
;
129 mach_port_t ipc_port_set
= MACH_PORT_NULL
;
132 main(int argc
, char *const *argv
)
134 static const int sigigns
[] = { SIGHUP
, SIGINT
, SIGPIPE
, SIGALRM
,
135 SIGTERM
, SIGURG
, SIGTSTP
, SIGTSTP
, SIGCONT
, /*SIGCHLD,*/
136 SIGTTIN
, SIGTTOU
, SIGIO
, SIGXCPU
, SIGXFSZ
, SIGVTALRM
, SIGPROF
,
137 SIGWINCH
, SIGINFO
, SIGUSR1
, SIGUSR2
139 bool sflag
= false, dflag
= false, Dflag
= false;
140 mach_msg_type_number_t l2l_name_cnt
= 0, l2l_port_cnt
= 0;
141 name_array_t l2l_names
= NULL
;
142 mach_port_array_t l2l_ports
= NULL
;
143 char ldconf
[PATH_MAX
] = PID1LAUNCHD_CONF
;
144 const char *h
= getenv("HOME");
145 const char *session_type
= NULL
;
146 const char *optargs
= NULL
;
147 launch_data_t ldresp
, ldmsg
= launch_data_new_string(LAUNCH_KEY_CHECKIN
);
148 struct jobcb
*fbj
= NULL
;
150 size_t i
, checkin_fdcnt
= 0;
151 int *checkin_fds
= NULL
;
152 mach_port_t req_mport
= MACH_PORT_NULL
;
153 mach_port_t checkin_mport
= MACH_PORT_NULL
;
154 int ch
, ker
, logopts
;
156 /* main() phase one: sanitize the process */
158 if (getpid() != 1 && (ldresp
= launch_msg(ldmsg
)) && launch_data_get_type(ldresp
) == LAUNCH_DATA_DICTIONARY
) {
159 const char *ldlabel
= launch_data_get_string(launch_data_dict_lookup(ldresp
, LAUNCH_JOBKEY_LABEL
));
162 if ((tmp
= launch_data_dict_lookup(ldresp
, LAUNCH_JOBKEY_SOCKETS
))) {
163 if ((tmp
= launch_data_dict_lookup(tmp
, "LaunchIPC"))) {
164 checkin_fdcnt
= launch_data_array_get_count(tmp
);
165 checkin_fds
= alloca(sizeof(int) * checkin_fdcnt
);
166 for (i
= 0; i
< checkin_fdcnt
; i
++) {
167 checkin_fds
[i
] = _fd(launch_data_get_fd(launch_data_array_get_index(tmp
, i
)));
171 if ((tmp
= launch_data_dict_lookup(ldresp
, LAUNCH_JOBKEY_MACHSERVICES
))) {
172 if ((tmp
= launch_data_dict_lookup(tmp
, ldlabel
))) {
173 checkin_mport
= launch_data_get_machport(tmp
);
176 launch_data_free(ldresp
);
178 int sigi
, fdi
, dts
= getdtablesize();
181 for (fdi
= STDERR_FILENO
+ 1; fdi
< dts
; fdi
++)
183 for (sigi
= 1; sigi
< NSIG
; sigi
++)
184 launchd_assumes(signal(sigi
, SIG_DFL
) != SIG_ERR
);
185 sigemptyset(&emptyset
);
186 launchd_assumes(sigprocmask(SIG_SETMASK
, &emptyset
, NULL
) == 0);
189 launch_data_free(ldmsg
);
191 testfd_or_openfd(STDIN_FILENO
, _PATH_DEVNULL
, O_RDONLY
|O_NOCTTY
);
192 testfd_or_openfd(STDOUT_FILENO
, _PATH_DEVNULL
, O_WRONLY
|O_NOCTTY
);
193 testfd_or_openfd(STDERR_FILENO
, _PATH_DEVNULL
, O_WRONLY
|O_NOCTTY
);
195 /* main phase two: parse arguments */
203 while ((ch
= getopt(argc
, argv
, optargs
)) != -1) {
205 case 'S': session_type
= optarg
; break; /* what type of session we're creating */
206 case 'D': Dflag
= true; break; /* debug */
207 case 'd': dflag
= true; break; /* daemonize */
208 case 's': sflag
= true; break; /* single user */
209 case 'h': usage(stdout
); break; /* help */
210 case '?': /* we should do something with the global optopt variable here */
212 fprintf(stderr
, "ignoring unknown arguments\n");
220 /* main phase three: get the party started */
223 launchd_assumes(daemon(0, 0) == 0);
225 launchd_assert((errno
= mach_port_allocate(mach_task_self(), MACH_PORT_RIGHT_PORT_SET
, &ipc_port_set
)) == KERN_SUCCESS
);
226 launchd_assert(launchd_mport_create_recv(&launchd_internal_port
) == KERN_SUCCESS
);
227 launchd_assert(launchd_mport_make_send(launchd_internal_port
) == KERN_SUCCESS
);
228 launchd_assert((errno
= mach_port_move_member(mach_task_self(), launchd_internal_port
, ipc_port_set
)) == KERN_SUCCESS
);
230 logopts
= LOG_PID
|LOG_CONS
;
232 logopts
|= LOG_PERROR
;
234 openlog(getprogname(), logopts
, LOG_LAUNCHD
);
235 setlogmask(LOG_UPTO(Dflag
? LOG_DEBUG
: LOG_NOTICE
));
237 launchd_assert((mainkq
= kqueue()) != -1);
239 launchd_assert((asynckq
= kqueue()) != -1);
241 launchd_assert(kevent_mod(asynckq
, EVFILT_READ
, EV_ADD
, 0, 0, &kqasync_callback
) != -1);
243 sigemptyset(&blocked_signals
);
245 for (i
= 0; i
< (sizeof(sigigns
) / sizeof(int)); i
++) {
246 launchd_assumes(kevent_mod(sigigns
[i
], EVFILT_SIGNAL
, EV_ADD
, 0, 0, &kqsignal_callback
) != -1);
247 sigaddset(&blocked_signals
, sigigns
[i
]);
248 launchd_assumes(signal(sigigns
[i
], SIG_IGN
) != SIG_ERR
);
251 /* sigh... ignoring SIGCHLD has side effects: we can't call wait*() */
252 launchd_assert(kevent_mod(SIGCHLD
, EVFILT_SIGNAL
, EV_ADD
, 0, 0, &kqsignal_callback
) != -1);
254 if (session_type
&& strcmp(session_type
, "Aqua") == 0) {
255 mach_port_t newparent
;
257 launchd_assert(bootstrap_parent(bootstrap_port
, &newparent
) == BOOTSTRAP_SUCCESS
);
259 launchd_assert(_launchd_to_launchd(bootstrap_port
, &req_mport
, &checkin_mport
,
260 &l2l_names
, &l2l_name_cnt
, &l2l_ports
, &l2l_port_cnt
) == BOOTSTRAP_SUCCESS
);
262 launchd_assert(l2l_name_cnt
== l2l_port_cnt
);
264 task_set_bootstrap_port(mach_task_self(), newparent
);
265 launchd_assumes(mach_port_deallocate(mach_task_self(), bootstrap_port
) == KERN_SUCCESS
);
266 bootstrap_port
= newparent
;
269 mach_init_init(req_mport
, checkin_mport
, l2l_names
, l2l_ports
, l2l_name_cnt
);
272 sprintf(ldconf
, "%s/%s", h
, LAUNCHD_CONF
);
274 rlcj
= job_new(root_job
, READCONF_LABEL
, LAUNCHCTL_PATH
, NULL
, ldconf
, MACH_PORT_NULL
);
275 launchd_assert(rlcj
!= NULL
);
278 fbj
= job_new(root_job
, FIRSTBORN_LABEL
, NULL
, (const char *const *)argv
, NULL
, MACH_PORT_NULL
);
280 if (NULL
== getenv("PATH"))
281 setenv("PATH", _PATH_STDPATH
, 1);
284 pid1_magic_init(sflag
);
286 ipc_server_init(checkin_fds
, checkin_fdcnt
);
289 monitor_networking_state();
291 /* do this after pid1_magic_init() to not catch ourselves mounting stuff */
292 launchd_assumes(kevent_mod(0, EVFILT_FS
, EV_ADD
, 0, 0, &kqfs_callback
) != -1);
295 pid_t pp
= getppid();
297 /* As a per session launchd, we need to exit if our parent dies.
299 * Normally, in Unix, SIGHUP would cause us to exit, but we're a
300 * daemon, and daemons use SIGHUP to signal the need to reread
301 * configuration files. "Weee."
307 ker
= kevent_mod(pp
, EVFILT_PROC
, EV_ADD
, NOTE_EXIT
, 0, &kqppidexit_callback
);
310 exit(launchd_assumes(errno
== ESRCH
) ? EXIT_SUCCESS
: EXIT_FAILURE
);
313 if (stat(ldconf
, &sb
) == 0)
320 pthread_attr_init(&attr
);
321 pthread_attr_setdetachstate(&attr
, PTHREAD_CREATE_JOINABLE
);
322 pthread_attr_setstacksize(&attr
, PTHREAD_STACK_MIN
);
323 launchd_assert(pthread_create(&kqueue_demand_thread
, &attr
, kqueue_demand_loop
, NULL
) == 0);
324 pthread_attr_destroy(&attr
);
326 mach_msg_return_t msgr
;
327 mach_msg_size_t mxmsgsz
= sizeof(union MaxRequestSize
) + MAX_TRAILER_SIZE
;
329 if (getpid() == 1 && !job_active(rlcj
))
333 msgr
= mach_msg_server(launchd_internal_demux
, mxmsgsz
, ipc_port_set
,
334 MACH_RCV_TRAILER_ELEMENTS(MACH_RCV_TRAILER_AUDIT
) |
335 MACH_RCV_TRAILER_TYPE(MACH_MSG_TRAILER_FORMAT_0
));
336 launchd_assumes(msgr
== MACH_MSG_SUCCESS
);
341 kqueue_demand_loop(void *arg
__attribute__((unused
)))
347 FD_SET(mainkq
, &rfds
);
348 if (launchd_assumes(select(mainkq
+ 1, &rfds
, NULL
, NULL
, NULL
) == 1))
349 launchd_assumes(handle_kqueue(launchd_internal_port
, mainkq
) == 0);
356 x_handle_kqueue(mach_port_t junk
__attribute__((unused
)), integer_t fd
)
358 struct timespec ts
= { 0, 0 };
362 launchd_assumes((kevr
= kevent(fd
, NULL
, 0, &kev
, 1, &ts
)) != -1);
365 (*((kq_callback
*)kev
.udata
))(kev
.udata
, &kev
);
367 if (shutdown_in_progress
&& total_children
== 0) {
370 shutdown_in_progress
= false;
374 } else if (re_exec_in_single_user_mode
) {
375 re_exec_in_single_user_mode
= false;
376 launchd_assumes(execl("/sbin/launchd", "/sbin/launchd", "-s", NULL
) != -1);
381 if (rlcj
&& job_active(rlcj
))
391 pid1_magic_init(bool sflag
)
393 launchd_assumes(setsid() != -1);
394 launchd_assumes(chdir("/") != -1);
395 launchd_assumes(setlogin("root") != -1);
396 launchd_assumes(mount("fdesc", "/dev", MNT_UNION
, NULL
) != -1);
405 const char *opts
= "[-d]";
408 opts
= "[-d] [-S <type> -U <user>]";
410 fprintf(where
, "%s: %s [-- command [args ...]]\n", getprogname(), opts
);
412 fprintf(where
, "\t-d Daemonize.\n");
413 fprintf(where
, "\t-h This usage statement.\n");
416 fprintf(where
, "\t-S <type> What type of session to create (Aqua, tty or X11).\n");
417 fprintf(where
, "\t-U <user> Which user to create the session as.\n");
425 kevent_mod(uintptr_t ident
, short filter
, u_short flags
, u_int fflags
, intptr_t data
, void *udata
)
430 if (EVFILT_TIMER
== filter
|| EVFILT_VNODE
== filter
)
433 if (flags
& EV_ADD
&& !launchd_assumes(udata
!= NULL
)) {
438 EV_SET(&kev
, ident
, filter
, flags
, fflags
, data
, udata
);
439 return kevent(q
, &kev
, 1, NULL
, 0, NULL
);
446 launchd_assumes(fcntl(fd
, F_SETFD
, 1) != -1);
451 ppidexit_callback(void)
455 /* Let's just bail for now. We should really try to wait for jobs to exit first. */
460 launchd_shutdown(void)
462 shutdown_in_progress
= true;
464 launchd_assumes(close(asynckq
) != -1);
468 job_remove_all_inactive(root_job
);
475 launchd_single_user(void)
483 for (tries
= 0; tries
< 10; tries
++) {
485 if (kill(-1, 0) == -1 && errno
== ESRCH
)
489 syslog(LOG_WARNING
, "Gave up waiting for processes to exit while going to single user mode, sending SIGKILL");
493 re_exec_in_single_user_mode
= true;
496 static void signal_callback(void *obj
__attribute__((unused
)), struct kevent
*kev
)
498 switch (kev
->ident
) {
514 if (pending_stdout
) {
515 int fd
= open(pending_stdout
, O_CREAT
|O_APPEND
|O_WRONLY
|O_NOCTTY
, DEFFILEMODE
);
517 launchd_assumes(dup2(fd
, STDOUT_FILENO
) != -1);
518 launchd_assumes(close(fd
) == 0);
519 free(pending_stdout
);
520 pending_stdout
= NULL
;
523 if (pending_stderr
) {
524 int fd
= open(pending_stderr
, O_CREAT
|O_APPEND
|O_WRONLY
|O_NOCTTY
, DEFFILEMODE
);
526 launchd_assumes(dup2(fd
, STDERR_FILENO
) != -1);
527 launchd_assumes(close(fd
) == 0);
528 free(pending_stderr
);
529 pending_stderr
= NULL
;
533 ipc_server_init(NULL
, 0);
537 launchd_SessionCreate(void)
539 OSStatus (*sescr
)(SessionCreationFlags flags
, SessionAttributeBits attributes
);
542 if (launchd_assumes((seclib
= dlopen(SECURITY_LIB
, RTLD_LAZY
)) != NULL
)) {
543 if (launchd_assumes((sescr
= dlsym(seclib
, "SessionCreate")) != NULL
))
544 launchd_assumes(sescr(0, 0) == noErr
);
545 launchd_assumes(dlclose(seclib
) != -1);
552 struct timespec timeout
= { 0, 0 };
555 if (launchd_assumes(kevent(asynckq
, NULL
, 0, &kev
, 1, &timeout
) == 1))
556 (*((kq_callback
*)kev
.udata
))(kev
.udata
, &kev
);
560 testfd_or_openfd(int fd
, const char *path
, int flags
)
564 if (-1 != (tmpfd
= dup(fd
))) {
565 launchd_assumes(close(tmpfd
) == 0);
567 if (-1 == (tmpfd
= open(path
, flags
))) {
568 syslog(LOG_ERR
, "open(\"%s\", ...): %m", path
);
569 } else if (tmpfd
!= fd
) {
570 launchd_assumes(dup2(tmpfd
, fd
) != -1);
571 launchd_assumes(close(tmpfd
) == 0);
577 launchd_setstdio(int d
, launch_data_t o
)
579 launch_data_t resp
= launch_data_new_errno(0);
581 if (launch_data_get_type(o
) == LAUNCH_DATA_STRING
) {
582 char **where
= &pending_stderr
;
584 if (d
== STDOUT_FILENO
)
585 where
= &pending_stdout
;
588 *where
= strdup(launch_data_get_string(o
));
589 } else if (launch_data_get_type(o
) == LAUNCH_DATA_FD
) {
590 launchd_assumes(dup2(launch_data_get_fd(o
), d
) != -1);
592 launch_data_set_errno(resp
, EINVAL
);
599 batch_job_enable(bool e
, struct conncb
*c
)
601 if (e
&& c
->disabled_batch
) {
602 batch_disabler_count
--;
603 c
->disabled_batch
= 0;
604 if (batch_disabler_count
== 0)
605 kevent_mod(asynckq
, EVFILT_READ
, EV_ENABLE
, 0, 0, &kqasync_callback
);
606 } else if (!e
&& !c
->disabled_batch
) {
607 if (batch_disabler_count
== 0)
608 kevent_mod(asynckq
, EVFILT_READ
, EV_DISABLE
, 0, 0, &kqasync_callback
);
609 batch_disabler_count
++;
610 c
->disabled_batch
= 1;
615 get_network_state(void)
617 struct ifaddrs
*ifa
, *ifai
;
620 if (!launchd_assumes(getifaddrs(&ifa
) != -1))
623 for (ifai
= ifa
; ifai
; ifai
= ifai
->ifa_next
) {
624 if (!(ifai
->ifa_flags
& IFF_UP
))
626 if (ifai
->ifa_flags
& IFF_LOOPBACK
)
628 if (ifai
->ifa_addr
->sa_family
!= AF_INET
&& ifai
->ifa_addr
->sa_family
!= AF_INET6
)
640 monitor_networking_state(void)
642 int pfs
= _fd(socket(PF_SYSTEM
, SOCK_RAW
, SYSPROTO_EVENT
));
643 struct kev_request kev_req
;
645 network_up
= get_network_state();
647 if (!launchd_assumes(pfs
!= -1))
650 memset(&kev_req
, 0, sizeof(kev_req
));
651 kev_req
.vendor_code
= KEV_VENDOR_APPLE
;
652 kev_req
.kev_class
= KEV_NETWORK_CLASS
;
654 if (!launchd_assumes(ioctl(pfs
, SIOCSKEVFILT
, &kev_req
) != -1)) {
659 launchd_assumes(kevent_mod(pfs
, EVFILT_READ
, EV_ADD
, 0, 0, &kqpfsystem_callback
) != -1);
663 pfsystem_callback(void *obj
, struct kevent
*kev
)
665 bool new_networking_state
;
668 launchd_assumes(read(kev
->ident
, &buf
, sizeof(buf
)) != -1);
670 new_networking_state
= get_network_state();
672 if (new_networking_state
!= network_up
) {
673 network_up
= new_networking_state
;
674 job_dispatch_all_other_semaphores(root_job
, NULL
);
679 _log_launchd_bug(const char *rcs_rev
, const char *path
, unsigned int line
, const char *test
)
681 int saved_errno
= errno
;
683 const char *file
= strrchr(path
, '/');
684 char *rcs_rev_tmp
= strchr(rcs_rev
, ' ');
693 strlcpy(buf
, rcs_rev
, sizeof(buf
));
695 strlcpy(buf
, rcs_rev_tmp
+ 1, sizeof(buf
));
696 rcs_rev_tmp
= strchr(buf
, ' ');
701 syslog(LOG_NOTICE
, "Bug: %s:%u (%s):%u: %s", file
, line
, buf
, saved_errno
, test
);
705 progeny_check(pid_t p
)
707 pid_t selfpid
= getpid();
709 while (p
!= selfpid
&& p
!= 1) {
710 int mib
[] = { CTL_KERN
, KERN_PROC
, KERN_PROC_PID
, p
};
711 size_t miblen
= sizeof(mib
) / sizeof(mib
[0]);
712 struct kinfo_proc kp
;
713 size_t kplen
= sizeof(kp
);
715 if (launchd_assumes(sysctl(mib
, miblen
, &kp
, &kplen
, NULL
, 0) != -1)
716 && launchd_assumes(kplen
== sizeof(kp
))) {
717 p
= kp
.kp_eproc
.e_ppid
;
730 launchd_internal_demux(mach_msg_header_t
*Request
, mach_msg_header_t
*Reply
)
733 job_remove(gc_this_job
);
737 if (Request
->msgh_local_port
== launchd_internal_port
) {
738 if (launchd_internal_server_routine(Request
))
739 return launchd_internal_server(Request
, Reply
);
741 if (bootstrap_server_routine(Request
))
742 return bootstrap_server(Request
, Reply
);
745 return notify_server(Request
, Reply
);