]> git.saurik.com Git - apple/launchd.git/blobdiff - launchd/src/bootstrap_public.c
launchd-152.tar.gz
[apple/launchd.git] / launchd / src / bootstrap_public.c
diff --git a/launchd/src/bootstrap_public.c b/launchd/src/bootstrap_public.c
new file mode 100644 (file)
index 0000000..1845ed6
--- /dev/null
@@ -0,0 +1,285 @@
+/*
+ * Copyright (c) 1999-2005 Apple Computer, Inc. All rights reserved.
+ *
+ * @APPLE_APACHE_LICENSE_HEADER_START@
+ * 
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ * 
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ * 
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * 
+ * @APPLE_APACHE_LICENSE_HEADER_END@
+ */
+
+#include <mach/mach.h>
+#include <mach/vm_map.h>
+
+#include "bootstrap_public.h"
+#include "bootstrap_private.h"
+#include "launch.h"
+#include "launch_priv.h"
+
+#define mig_external static
+#include "bootstrap.h"
+#include "bootstrapUser.c"
+
+#include <sys/param.h>
+#include <stdlib.h>
+#include <errno.h>
+
+kern_return_t
+_launchd_to_launchd(mach_port_t bp, mach_port_t *reqport, mach_port_t *rcvright,
+               name_array_t *service_names, mach_msg_type_number_t *service_namesCnt,
+               mach_port_array_t *ports, mach_msg_type_number_t *portCnt)
+{
+       return raw_bootstrap_transfer_subset(bp, reqport, rcvright, service_names, service_namesCnt, ports, portCnt);
+}
+
+pid_t
+_spawn_via_launchd(const char *label, const char *const *argv, const struct spawn_via_launchd_attr *spawn_attrs, int struct_version)
+{
+       kern_return_t kr;
+       const char *const *tmpp;
+       size_t len, buf_len = strlen(label) + 1;
+       char *buf = strdup(label);
+       uint64_t flags = 0;
+       uint32_t argc = 0;
+       uint32_t envc = 0;
+       pid_t p = -1;
+       mode_t u_mask = CMASK;
+       mach_port_t obsvr_port = MACH_PORT_NULL;
+
+       for (tmpp = argv; *tmpp; tmpp++) {
+               argc++;
+               len = strlen(*tmpp) + 1;
+               buf = reallocf(buf, buf_len + len);
+               strcpy(buf + buf_len, *tmpp);
+               buf_len += len;
+       }
+
+       if (spawn_attrs) switch (struct_version) {
+       case 0:
+               if (spawn_attrs->spawn_flags & SPAWN_VIA_LAUNCHD_STOPPED) {
+                       flags |= SPAWN_WANTS_WAIT4DEBUGGER;
+               }
+               if (spawn_attrs->spawn_flags & SPAWN_VIA_LAUNCHD_FORCE_PPC) {
+                       flags |= SPAWN_WANTS_FORCE_PPC;
+               }
+
+               if (spawn_attrs->spawn_env) {
+                       for (tmpp = spawn_attrs->spawn_env; *tmpp; tmpp++) {
+                               envc++;
+                               len = strlen(*tmpp) + 1;
+                               buf = reallocf(buf, buf_len + len);
+                               strcpy(buf + buf_len, *tmpp);
+                               buf_len += len;
+                       }
+               }
+
+               if (spawn_attrs->spawn_path) {
+                       flags |= SPAWN_HAS_PATH;
+                       len = strlen(spawn_attrs->spawn_path) + 1;
+                       buf = reallocf(buf, buf_len + len);
+                       strcpy(buf + buf_len, spawn_attrs->spawn_path);
+                       buf_len += len;
+               }
+
+               if (spawn_attrs->spawn_chdir) {
+                       flags |= SPAWN_HAS_WDIR;
+                       len = strlen(spawn_attrs->spawn_chdir) + 1;
+                       buf = reallocf(buf, buf_len + len);
+                       strcpy(buf + buf_len, spawn_attrs->spawn_chdir);
+                       buf_len += len;
+               }
+
+               if (spawn_attrs->spawn_umask) {
+                       flags |= SPAWN_HAS_UMASK;
+                       u_mask = *spawn_attrs->spawn_umask;
+               }
+
+               break;
+       default:
+               break;
+       }
+
+       kr = raw_mpm_spawn(bootstrap_port, buf, buf_len, argc, envc, flags, u_mask, &p, &obsvr_port);
+
+       free(buf);
+
+       if (kr == BOOTSTRAP_SUCCESS) {
+               if (spawn_attrs && spawn_attrs->spawn_observer_port) {
+                       *spawn_attrs->spawn_observer_port = obsvr_port;
+               } else {
+                       mach_port_deallocate(mach_task_self(), obsvr_port);
+               }
+               return p;
+       }
+
+       switch (kr) {
+       case BOOTSTRAP_NOT_PRIVILEGED:
+               errno = EPERM; break;
+       case BOOTSTRAP_NO_MEMORY:
+               errno = ENOMEM; break;
+       default:
+               errno = EINVAL; break;
+       }
+       return -1;
+}
+
+kern_return_t
+mpm_wait(mach_port_t ajob, int *wstatus)
+{
+       return raw_mpm_wait(ajob, wstatus);
+}
+
+kern_return_t
+mpm_uncork_fork(mach_port_t ajob)
+{
+       return raw_mpm_uncork_fork(ajob);
+}
+
+kern_return_t
+bootstrap_create_server(mach_port_t bp, cmd_t server_cmd, uid_t server_uid, boolean_t on_demand, mach_port_t *server_port)
+{
+       return raw_bootstrap_create_server(bp, server_cmd, server_uid, on_demand, server_port);
+}
+
+kern_return_t
+bootstrap_subset(mach_port_t bp, mach_port_t requestor_port, mach_port_t *subset_port)
+{
+       return raw_bootstrap_subset(bp, requestor_port, subset_port);
+}
+
+kern_return_t
+bootstrap_unprivileged(mach_port_t bp, mach_port_t *unpriv_port)
+{
+       return raw_bootstrap_unprivileged(bp, unpriv_port);
+}
+
+kern_return_t
+bootstrap_getsocket(mach_port_t bp, name_t sockpath)
+{
+       return raw_bootstrap_getsocket(bp, sockpath);
+}
+
+kern_return_t
+bootstrap_parent(mach_port_t bp, mach_port_t *parent_port)
+{
+       return raw_bootstrap_parent(bp, parent_port);
+}
+
+kern_return_t
+bootstrap_register(mach_port_t bp, name_t service_name, mach_port_t sp)
+{
+       return raw_bootstrap_register(bp, service_name, sp);
+}
+
+kern_return_t
+bootstrap_create_service(mach_port_t bp, name_t service_name, mach_port_t *sp)
+{
+       return raw_bootstrap_create_service(bp, service_name, sp);
+}
+
+kern_return_t
+bootstrap_check_in(mach_port_t bp, name_t service_name, mach_port_t *sp)
+{
+       return raw_bootstrap_check_in(bp, service_name, sp);
+}
+
+kern_return_t
+bootstrap_look_up(mach_port_t bp, name_t service_name, mach_port_t *sp)
+{
+       return raw_bootstrap_look_up(bp, service_name, sp);
+}
+
+kern_return_t
+bootstrap_look_up_array(mach_port_t bp,
+               name_array_t names, mach_msg_type_number_t name_cnt,
+               mach_port_array_t *ports, mach_msg_type_number_t *port_cnt,
+               boolean_t *all)
+{
+       unsigned int i;
+       kern_return_t r;
+
+       if (name_cnt > BOOTSTRAP_MAX_LOOKUP_COUNT)
+               return BOOTSTRAP_BAD_COUNT;
+
+       *port_cnt = name_cnt;
+
+       r = vm_allocate(mach_task_self(), (vm_address_t *)&ports, name_cnt * sizeof(mach_port_t), true);
+
+       if (r != KERN_SUCCESS)
+               return r;
+
+       *all = true;
+
+       for (i = 0; i < name_cnt; i++) {
+               if (bootstrap_look_up(bp, names[i], &((*ports)[i])) == BOOTSTRAP_SUCCESS)
+                       continue;
+               *all = false;
+               ports[i] = MACH_PORT_NULL;
+       }
+
+       return BOOTSTRAP_SUCCESS;
+}
+
+kern_return_t
+bootstrap_status(mach_port_t bp, name_t service_name, bootstrap_status_t *service_active)
+{
+       mach_port_t p;
+
+       if (bootstrap_check_in(bp, service_name, &p) == BOOTSTRAP_SUCCESS) {
+               mach_port_mod_refs(mach_task_self(), p, MACH_PORT_RIGHT_RECEIVE, -1);
+               *service_active = BOOTSTRAP_STATUS_ON_DEMAND;
+               if (raw_bootstrap_unprivileged(bp, &p) == BOOTSTRAP_SUCCESS) {
+                       if (bp == p)
+                               *service_active = BOOTSTRAP_STATUS_INACTIVE;
+                       mach_port_deallocate(mach_task_self(), p);
+               }
+               return BOOTSTRAP_SUCCESS;
+       } else if (bootstrap_look_up(bp, service_name, &p) == BOOTSTRAP_SUCCESS) {
+               mach_port_deallocate(mach_task_self(), p);
+               *service_active = BOOTSTRAP_STATUS_ACTIVE;
+               return BOOTSTRAP_SUCCESS;
+       }
+
+       return BOOTSTRAP_UNKNOWN_SERVICE;
+}
+
+kern_return_t
+bootstrap_info(mach_port_t bp,
+               name_array_t *service_names, mach_msg_type_number_t *service_namesCnt,
+               bootstrap_status_array_t *service_active, mach_msg_type_number_t *service_activeCnt)
+{
+       return raw_bootstrap_info(bp, service_names, service_namesCnt,
+                       service_active, service_activeCnt);
+}
+
+const char *
+bootstrap_strerror(kern_return_t r)
+{
+       switch (r) {
+       case BOOTSTRAP_SUCCESS:
+               return "Success";
+       case BOOTSTRAP_NOT_PRIVILEGED:
+               return "Permission denied";
+       case BOOTSTRAP_NAME_IN_USE:
+       case BOOTSTRAP_SERVICE_ACTIVE:
+               return "Service name already exists";
+       case BOOTSTRAP_UNKNOWN_SERVICE:
+               return "Unknown service name";
+       case BOOTSTRAP_BAD_COUNT:
+               return "Too many lookups were requested in one request";
+       case BOOTSTRAP_NO_MEMORY:
+               return "Out of memory";
+       default:
+               return mach_error_string(r);
+       }
+}