+/*
+ * Copyright (c) 1999-2004 Apple Computer, Inc. All rights reserved.
+ *
+ * @APPLE_APACHE_LICENSE_HEADER_START@
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ *
+ * @APPLE_APACHE_LICENSE_HEADER_END@
+ */
+/*
+ * bootstrap -- fundamental service initiator and port server
+ * Mike DeMoney, NeXT, Inc.
+ * Copyright, 1990. All rights reserved.
+ *
+ * bootstrap.c -- implementation of bootstrap main service loop
+ */
+
+static const char *const __rcs_file_version__ = "$Revision: 1.52 $";
+
+#include <mach/mach.h>
+#include <mach/mach_error.h>
+#include <mach/boolean.h>
+#include <mach/message.h>
+#include <mach/notify.h>
+#include <mach/mig_errors.h>
+#include <mach/mach_traps.h>
+#include <mach/mach_interface.h>
+#include <mach/host_info.h>
+#include <mach/mach_host.h>
+#include <mach/exception.h>
+#include <sys/types.h>
+#include <sys/time.h>
+#include <sys/event.h>
+#include <sys/queue.h>
+#include <sys/socket.h>
+#include <bsm/libbsm.h>
+#include <unistd.h>
+#include <pthread.h>
+#include <errno.h>
+#include <string.h>
+#include <ctype.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <stdbool.h>
+#include <syslog.h>
+
+#include "bootstrap_public.h"
+#include "bootstrap_private.h"
+#include "bootstrap.h"
+#include "bootstrapServer.h"
+#include "notifyServer.h"
+#include "launchd_internal.h"
+#include "launchd_internalServer.h"
+#include "launchd.h"
+#include "launchd_core_logic.h"
+#include "launch_priv.h"
+#include "launchd_unix_ipc.h"
+
+struct ldcred {
+ uid_t euid;
+ uid_t uid;
+ gid_t egid;
+ gid_t gid;
+ pid_t pid;
+ au_asid_t asid;
+};
+
+static au_asid_t inherited_asid = 0;
+
+static bool canReceive(mach_port_t);
+static void init_ports(void);
+static void *mport_demand_loop(void *arg);
+static void audit_token_to_launchd_cred(audit_token_t au_tok, struct ldcred *ldc);
+
+static mach_port_t inherited_bootstrap_port = MACH_PORT_NULL;
+static mach_port_t demand_port_set = MACH_PORT_NULL;
+static size_t port_to_obj_size = 0;
+static void **port_to_obj = NULL;
+static pthread_t demand_thread;
+
+static bool trusted_client_check(struct jobcb *j, struct ldcred *ldc);
+
+struct jobcb *
+job_find_by_port(mach_port_t mp)
+{
+ return port_to_obj[MACH_PORT_INDEX(mp)];
+}
+
+kern_return_t
+x_handle_mport(mach_port_t junk __attribute__((unused)))
+{
+ mach_port_name_array_t members;
+ mach_msg_type_number_t membersCnt;
+ mach_port_status_t status;
+ mach_msg_type_number_t statusCnt;
+ struct kevent kev;
+ unsigned int i;
+
+ if (!launchd_assumes(mach_port_get_set_status(mach_task_self(), demand_port_set, &members, &membersCnt) == KERN_SUCCESS))
+ return 1;
+
+ for (i = 0; i < membersCnt; i++) {
+ statusCnt = MACH_PORT_RECEIVE_STATUS_COUNT;
+ if (mach_port_get_attributes(mach_task_self(), members[i], MACH_PORT_RECEIVE_STATUS,
+ (mach_port_info_t)&status, &statusCnt) != KERN_SUCCESS)
+ continue;
+
+ if (status.mps_msgcount) {
+ EV_SET(&kev, members[i], EVFILT_MACHPORT, 0, 0, 0, job_find_by_port(members[i]));
+ (*((kq_callback *)kev.udata))(kev.udata, &kev);
+ /* the callback may have tainted our ability to continue this for loop */
+ break;
+ }
+ }
+
+ launchd_assumes(vm_deallocate(mach_task_self(), (vm_address_t)members,
+ (vm_size_t) membersCnt * sizeof(mach_port_name_t)) == KERN_SUCCESS);
+
+ return 0;
+}
+
+void
+mach_init_init(mach_port_t req_port, mach_port_t checkin_port,
+ name_array_t l2l_names, mach_port_array_t l2l_ports, mach_msg_type_number_t l2l_cnt)
+{
+ mach_msg_type_number_t l2l_i;
+ auditinfo_t inherited_audit;
+ pthread_attr_t attr;
+
+ getaudit(&inherited_audit);
+ inherited_asid = inherited_audit.ai_asid;
+
+ init_ports();
+
+ launchd_assert((root_job = job_new_bootstrap(NULL, req_port ? req_port : mach_task_self(), checkin_port)) != NULL);
+
+ launchd_assumes(launchd_get_bport(&inherited_bootstrap_port) == KERN_SUCCESS);
+
+ if (getpid() != 1)
+ launchd_assumes(inherited_bootstrap_port != MACH_PORT_NULL);
+
+ /* We set this explicitly as we start each child */
+ launchd_assumes(launchd_set_bport(MACH_PORT_NULL) == KERN_SUCCESS);
+
+ pthread_attr_init(&attr);
+ pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_JOINABLE);
+ pthread_attr_setstacksize(&attr, PTHREAD_STACK_MIN);
+
+ launchd_assert(pthread_create(&demand_thread, &attr, mport_demand_loop, NULL) == 0);
+
+ pthread_attr_destroy(&attr);
+
+ /* cut off the Libc cache, we don't want to deadlock against ourself */
+ bootstrap_port = MACH_PORT_NULL;
+
+ if (l2l_names == NULL)
+ return;
+
+ for (l2l_i = 0; l2l_i < l2l_cnt; l2l_i++) {
+ struct machservice *ms;
+
+ if ((ms = machservice_new(root_job, l2l_names[l2l_i], l2l_ports + l2l_i)))
+ machservice_watch(ms);
+ }
+}
+
+void mach_init_reap(void)
+{
+ void *status;
+
+ launchd_assumes(mach_port_destroy(mach_task_self(), demand_port_set) == KERN_SUCCESS);
+
+ launchd_assumes(pthread_join(demand_thread, &status) == 0);
+}
+
+void
+init_ports(void)
+{
+ launchd_assert((errno = mach_port_allocate(mach_task_self(), MACH_PORT_RIGHT_PORT_SET,
+ &demand_port_set)) == KERN_SUCCESS);
+}
+
+void *
+mport_demand_loop(void *arg __attribute__((unused)))
+{
+ mach_msg_empty_rcv_t dummy;
+ kern_return_t kr;
+
+ for (;;) {
+ kr = mach_msg(&dummy.header, MACH_RCV_MSG|MACH_RCV_LARGE, 0, 0, demand_port_set, 0, MACH_PORT_NULL);
+ if (kr == MACH_RCV_PORT_CHANGED) {
+ break;
+ } else if (!launchd_assumes(kr == MACH_RCV_TOO_LARGE)) {
+ continue;
+ }
+ launchd_assumes(handle_mport(launchd_internal_port) == 0);
+ }
+
+ return NULL;
+}
+
+boolean_t
+launchd_mach_ipc_demux(mach_msg_header_t *Request, mach_msg_header_t *Reply)
+{
+ if (bootstrap_server_routine(Request))
+ return bootstrap_server(Request, Reply);
+
+ return notify_server(Request, Reply);
+}
+
+bool
+canReceive(mach_port_t port)
+{
+ mach_port_type_t p_type;
+
+ if (!launchd_assumes(mach_port_type(mach_task_self(), port, &p_type) == KERN_SUCCESS))
+ return false;
+
+ return ((p_type & MACH_PORT_TYPE_RECEIVE) != 0);
+}
+
+kern_return_t
+launchd_set_bport(mach_port_t name)
+{
+ return errno = task_set_bootstrap_port(mach_task_self(), name);
+}
+
+kern_return_t
+launchd_get_bport(mach_port_t *name)
+{
+ return errno = task_get_bootstrap_port(mach_task_self(), name);
+}
+
+kern_return_t
+launchd_mport_notify_req(mach_port_t name, mach_msg_id_t which)
+{
+ mach_port_mscount_t msgc = (which == MACH_NOTIFY_NO_SENDERS) ? 1 : 0;
+ mach_port_t previous, where = (which == MACH_NOTIFY_NO_SENDERS) ? name : launchd_internal_port;
+
+ if (which == MACH_NOTIFY_NO_SENDERS) {
+ /* Always make sure the send count is zero, in case a receive right is reused */
+ errno = mach_port_set_mscount(mach_task_self(), name, 0);
+ if (errno != KERN_SUCCESS)
+ return errno;
+ }
+
+ errno = mach_port_request_notification(mach_task_self(), name, which, msgc, where,
+ MACH_MSG_TYPE_MAKE_SEND_ONCE, &previous);
+
+ if (errno == 0 && previous != MACH_PORT_NULL)
+ launchd_assumes(launchd_mport_deallocate(previous) == KERN_SUCCESS);
+
+ return errno;
+}
+
+kern_return_t
+launchd_mport_request_callback(mach_port_t name, void *obj, bool readmsg)
+{
+ size_t needed_size;
+
+ if (!obj)
+ return errno = mach_port_move_member(mach_task_self(), name, MACH_PORT_NULL);
+
+ needed_size = (MACH_PORT_INDEX(name) + 1) * sizeof(void *);
+
+ if (needed_size > port_to_obj_size) {
+ if (port_to_obj == NULL) {
+ launchd_assumes((port_to_obj = calloc(1, needed_size * 2)) != NULL);
+ } else {
+ launchd_assumes((port_to_obj = reallocf(port_to_obj, needed_size * 2)) != NULL);
+ memset((uint8_t *)port_to_obj + port_to_obj_size, 0, needed_size * 2 - port_to_obj_size);
+ }
+ port_to_obj_size = needed_size * 2;
+ }
+
+ port_to_obj[MACH_PORT_INDEX(name)] = obj;
+
+ return errno = mach_port_move_member(mach_task_self(), name, readmsg ? ipc_port_set : demand_port_set);
+}
+
+kern_return_t
+launchd_mport_make_send(mach_port_t name)
+{
+ return errno = mach_port_insert_right(mach_task_self(), name, name, MACH_MSG_TYPE_MAKE_SEND);
+}
+
+kern_return_t
+launchd_mport_close_recv(mach_port_t name)
+{
+ if (launchd_assumes(port_to_obj != NULL)) {
+ port_to_obj[MACH_PORT_INDEX(name)] = NULL;
+ return errno = mach_port_mod_refs(mach_task_self(), name, MACH_PORT_RIGHT_RECEIVE, -1);
+ } else {
+ return errno = KERN_FAILURE;
+ }
+}
+
+kern_return_t
+launchd_mport_create_recv(mach_port_t *name)
+{
+ return errno = mach_port_allocate(mach_task_self(), MACH_PORT_RIGHT_RECEIVE, name);
+}
+
+kern_return_t
+launchd_mport_deallocate(mach_port_t name)
+{
+ return errno = mach_port_deallocate(mach_task_self(), name);
+}
+
+void
+audit_token_to_launchd_cred(audit_token_t au_tok, struct ldcred *ldc)
+{
+ audit_token_to_au32(au_tok, /* audit UID */ NULL,
+ &ldc->euid, &ldc->egid,
+ &ldc->uid, &ldc->gid, &ldc->pid,
+ &ldc->asid, /* au_tid_t */ NULL);
+}
+
+kern_return_t
+x_bootstrap_create_server(mach_port_t bp, cmd_t server_cmd, uid_t server_uid, boolean_t on_demand,
+ audit_token_t au_tok, mach_port_t *server_portp)
+{
+ struct jobcb *js, *j = job_find_by_port(bp);
+ struct ldcred ldc;
+
+ audit_token_to_launchd_cred(au_tok, &ldc);
+
+ job_log(j, LOG_DEBUG, "Server create attempt: %s", server_cmd);
+
+#define LET_MERE_MORTALS_ADD_SERVERS_TO_PID1
+ /* XXX - This code should go away once the per session launchd is integrated with the rest of the system */
+ #ifdef LET_MERE_MORTALS_ADD_SERVERS_TO_PID1
+ if (getpid() == 1) {
+ if (ldc.euid != 0 && ldc.euid != server_uid) {
+ job_log(j, LOG_WARNING, "Server create: \"%s\": Will run as UID %d, not UID %d as they told us to",
+ server_cmd, ldc.euid, server_uid);
+ server_uid = ldc.euid;
+ }
+ } else
+#endif
+ if (!trusted_client_check(j, &ldc)) {
+ return BOOTSTRAP_NOT_PRIVILEGED;
+ } else if (server_uid != getuid()) {
+ job_log(j, LOG_WARNING, "Server create: \"%s\": As UID %d, we will not be able to switch to UID %d",
+ server_cmd, getuid(), server_uid);
+ server_uid = getuid();
+ }
+
+ js = job_new_via_mach_init(j, server_cmd, server_uid, on_demand);
+
+ if (js == NULL)
+ return BOOTSTRAP_NO_MEMORY;
+
+ *server_portp = job_get_bsport(js);
+ return BOOTSTRAP_SUCCESS;
+}
+
+kern_return_t
+x_bootstrap_getsocket(mach_port_t bp, name_t spr)
+{
+ if (!sockpath) {
+ return BOOTSTRAP_NO_MEMORY;
+ } else if (getpid() == 1) {
+ return BOOTSTRAP_NOT_PRIVILEGED;
+ }
+
+ strncpy(spr, sockpath, sizeof(name_t));
+
+ return BOOTSTRAP_SUCCESS;
+}
+
+kern_return_t
+x_bootstrap_unprivileged(mach_port_t bp, mach_port_t *unprivportp)
+{
+ struct jobcb *j = job_find_by_port(bp);
+
+ job_log(j, LOG_DEBUG, "Requested unprivileged bootstrap port");
+
+ j = job_get_bs(j);
+
+ *unprivportp = job_get_bsport(j);
+
+ return BOOTSTRAP_SUCCESS;
+}
+
+
+kern_return_t
+x_bootstrap_check_in(mach_port_t bp, name_t servicename, audit_token_t au_tok, mach_port_t *serviceportp)
+{
+ static pid_t last_warned_pid = 0;
+ struct jobcb *j = job_find_by_port(bp);
+ struct machservice *ms;
+ struct ldcred ldc;
+
+ audit_token_to_launchd_cred(au_tok, &ldc);
+
+ trusted_client_check(j, &ldc);
+
+ ms = job_lookup_service(j, servicename, true);
+
+ if (ms == NULL) {
+ job_log(j, LOG_DEBUG, "Check-in of Mach service failed. Unknown: %s", servicename);
+ return BOOTSTRAP_UNKNOWN_SERVICE;
+ }
+ if (machservice_job(ms) != j) {
+ if (last_warned_pid != ldc.pid) {
+ job_log(j, LOG_NOTICE, "Check-in of Mach service failed. PID %d is not privileged: %s",
+ ldc.pid, servicename);
+ last_warned_pid = ldc.pid;
+ }
+ return BOOTSTRAP_NOT_PRIVILEGED;
+ }
+ if (!canReceive(machservice_port(ms))) {
+ launchd_assumes(machservice_active(ms));
+ job_log(j, LOG_DEBUG, "Check-in of Mach service failed. Already active: %s", servicename);
+ return BOOTSTRAP_SERVICE_ACTIVE;
+ }
+
+ machservice_watch(ms);
+
+ job_log(j, LOG_INFO, "Check-in of service: %s", servicename);
+
+ *serviceportp = machservice_port(ms);
+ return BOOTSTRAP_SUCCESS;
+}
+
+kern_return_t
+x_bootstrap_register(mach_port_t bp, audit_token_t au_tok, name_t servicename, mach_port_t serviceport)
+{
+ struct jobcb *j = job_find_by_port(bp);
+ struct machservice *ms;
+ struct ldcred ldc;
+
+ audit_token_to_launchd_cred(au_tok, &ldc);
+
+ trusted_client_check(j, &ldc);
+
+ job_log(j, LOG_DEBUG, "Mach service registration attempt: %s", servicename);
+
+ ms = job_lookup_service(j, servicename, false);
+
+ if (ms) {
+ if (machservice_job(ms) != j)
+ return BOOTSTRAP_NOT_PRIVILEGED;
+ if (machservice_active(ms)) {
+ job_log(j, LOG_DEBUG, "Mach service registration failed. Already active: %s", servicename);
+ launchd_assumes(!canReceive(machservice_port(ms)));
+ return BOOTSTRAP_SERVICE_ACTIVE;
+ }
+ job_checkin(machservice_job(ms));
+ machservice_delete(ms);
+ }
+
+ if (serviceport != MACH_PORT_NULL) {
+ if ((ms = machservice_new(job_get_bs(j), servicename, &serviceport))) {
+ machservice_watch(ms);
+ } else {
+ return BOOTSTRAP_NO_MEMORY;
+ }
+ }
+
+ return BOOTSTRAP_SUCCESS;
+}
+
+kern_return_t
+x_bootstrap_look_up(mach_port_t bp, audit_token_t au_tok, name_t servicename, mach_port_t *serviceportp, mach_msg_type_name_t *ptype)
+{
+ struct jobcb *j = job_find_by_port(bp);
+ struct machservice *ms;
+ struct ldcred ldc;
+
+ audit_token_to_launchd_cred(au_tok, &ldc);
+
+ trusted_client_check(j, &ldc);
+
+ ms = job_lookup_service(j, servicename, true);
+
+ if (ms && machservice_hidden(ms) && !job_active(machservice_job(ms))) {
+ ms = NULL;
+ }
+
+ if (ms) {
+ launchd_assumes(machservice_port(ms) != MACH_PORT_NULL);
+ job_log(j, LOG_DEBUG, "Mach service lookup (by PID %d): %s", ldc.pid, servicename);
+ *serviceportp = machservice_port(ms);
+ *ptype = MACH_MSG_TYPE_COPY_SEND;
+ return BOOTSTRAP_SUCCESS;
+ } else if (inherited_bootstrap_port != MACH_PORT_NULL) {
+ job_log(j, LOG_DEBUG, "Mach service lookup (by PID %d) forwarded: %s", ldc.pid, servicename);
+ *ptype = MACH_MSG_TYPE_MOVE_SEND;
+ return bootstrap_look_up(inherited_bootstrap_port, servicename, serviceportp);
+ } else {
+ job_log(j, LOG_DEBUG, "Mach service lookup (by PID %d) failed: %s", ldc.pid, servicename);
+ return BOOTSTRAP_UNKNOWN_SERVICE;
+ }
+}
+
+kern_return_t
+x_bootstrap_parent(mach_port_t bp, mach_port_t *parentport, mach_msg_type_name_t *pptype)
+{
+ struct jobcb *j = job_find_by_port(bp);
+
+ job_log(j, LOG_DEBUG, "Requested parent bootstrap port");
+
+ j = job_get_bs(j);
+
+ *pptype = MACH_MSG_TYPE_MAKE_SEND;
+
+ if (job_parent(j)) {
+ *parentport = job_get_bsport(job_parent(j));
+ } else if (MACH_PORT_NULL == inherited_bootstrap_port) {
+ *parentport = job_get_bsport(j);
+ } else {
+ *pptype = MACH_MSG_TYPE_COPY_SEND;
+ *parentport = inherited_bootstrap_port;
+ }
+ return BOOTSTRAP_SUCCESS;
+}
+
+static void
+x_bootstrap_info_countservices(struct machservice *ms, void *context)
+{
+ unsigned int *cnt = context;
+
+ (*cnt)++;
+}
+
+struct x_bootstrap_info_copyservices_cb {
+ name_array_t service_names;
+ bootstrap_status_array_t service_actives;
+ mach_port_array_t ports;
+ unsigned int i;
+};
+
+static void
+x_bootstrap_info_copyservices(struct machservice *ms, void *context)
+{
+ struct x_bootstrap_info_copyservices_cb *info_resp = context;
+
+ strlcpy(info_resp->service_names[info_resp->i], machservice_name(ms), sizeof(info_resp->service_names[0]));
+
+ launchd_assumes(info_resp->service_actives || info_resp->ports);
+
+ if (info_resp->service_actives) {
+ info_resp->service_actives[info_resp->i] = machservice_status(ms);
+ } else {
+ info_resp->ports[info_resp->i] = machservice_port(ms);
+ }
+ info_resp->i++;
+}
+
+kern_return_t
+x_bootstrap_info(mach_port_t bp, name_array_t *servicenamesp, unsigned int *servicenames_cnt,
+ bootstrap_status_array_t *serviceactivesp, unsigned int *serviceactives_cnt)
+{
+ struct x_bootstrap_info_copyservices_cb info_resp = { NULL, NULL, NULL, 0 };
+ struct jobcb *ji, *j = job_find_by_port(bp);
+ kern_return_t result;
+ unsigned int cnt = 0;
+
+ for (ji = j; ji; ji = job_parent(ji))
+ job_foreach_service(ji, x_bootstrap_info_countservices, &cnt, true);
+
+ result = vm_allocate(mach_task_self(), (vm_address_t *)&info_resp.service_names, cnt * sizeof(info_resp.service_names[0]), true);
+ if (!launchd_assumes(result == KERN_SUCCESS))
+ goto out_bad;
+
+ result = vm_allocate(mach_task_self(), (vm_address_t *)&info_resp.service_actives, cnt * sizeof(info_resp.service_actives[0]), true);
+ if (!launchd_assumes(result == KERN_SUCCESS))
+ goto out_bad;
+
+ for (ji = j; ji; ji = job_parent(ji))
+ job_foreach_service(ji, x_bootstrap_info_copyservices, &info_resp, true);
+
+ launchd_assumes(info_resp.i == cnt);
+
+ *servicenamesp = info_resp.service_names;
+ *serviceactivesp = info_resp.service_actives;
+ *servicenames_cnt = *serviceactives_cnt = cnt;
+
+ return BOOTSTRAP_SUCCESS;
+
+out_bad:
+ if (info_resp.service_names)
+ vm_deallocate(mach_task_self(), (vm_address_t)info_resp.service_names, cnt * sizeof(info_resp.service_names[0]));
+
+ return BOOTSTRAP_NO_MEMORY;
+}
+
+kern_return_t
+x_bootstrap_transfer_subset(mach_port_t bp, mach_port_t *reqport, mach_port_t *rcvright,
+ name_array_t *servicenamesp, unsigned int *servicenames_cnt,
+ mach_port_array_t *ports, unsigned int *ports_cnt)
+{
+ struct x_bootstrap_info_copyservices_cb info_resp = { NULL, NULL, NULL, 0 };
+ struct jobcb *j = job_find_by_port(bp);
+ unsigned int cnt = 0;
+ kern_return_t result;
+
+ if (getpid() != 1) {
+ job_log(j, LOG_ERR, "Only the system launchd will transfer Mach sub-bootstraps.");
+ return BOOTSTRAP_NOT_PRIVILEGED;
+ } else if (!job_parent(j)) {
+ job_log(j, LOG_ERR, "Root Mach bootstrap cannot be transferred.");
+ return BOOTSTRAP_NOT_PRIVILEGED;
+ }
+
+ job_log(j, LOG_DEBUG, "Transferring sub-bootstrap to the per session launchd.");
+
+ job_foreach_service(j, x_bootstrap_info_countservices, &cnt, false);
+
+ result = vm_allocate(mach_task_self(), (vm_address_t *)&info_resp.service_names, cnt * sizeof(info_resp.service_names[0]), true);
+ if (!launchd_assumes(result == KERN_SUCCESS))
+ goto out_bad;
+
+ result = vm_allocate(mach_task_self(), (vm_address_t *)&info_resp.ports, cnt * sizeof(info_resp.ports[0]), true);
+ if (!launchd_assumes(result == KERN_SUCCESS))
+ goto out_bad;
+
+ job_foreach_service(j, x_bootstrap_info_copyservices, &info_resp, false);
+
+ launchd_assumes(info_resp.i == cnt);
+
+ *servicenamesp = info_resp.service_names;
+ *ports = info_resp.ports;
+ *servicenames_cnt = *ports_cnt = cnt;
+
+ *reqport = job_get_reqport(j);
+ *rcvright = job_get_bsport(j);
+
+ launchd_assumes(launchd_mport_request_callback(*rcvright, NULL, true) == KERN_SUCCESS);
+
+ launchd_assumes(launchd_mport_make_send(*rcvright) == KERN_SUCCESS);
+
+ return BOOTSTRAP_SUCCESS;
+
+out_bad:
+ if (info_resp.service_names)
+ vm_deallocate(mach_task_self(), (vm_address_t)info_resp.service_names, cnt * sizeof(info_resp.service_names[0]));
+
+ return BOOTSTRAP_NO_MEMORY;
+}
+
+kern_return_t
+x_bootstrap_subset(mach_port_t bp, mach_port_t requestorport, mach_port_t *subsetportp)
+{
+ struct jobcb *js, *j = job_find_by_port(bp);
+ int bsdepth = 0;
+
+ while ((j = job_parent(j)) != NULL)
+ bsdepth++;
+
+ j = job_find_by_port(bp);
+
+ /* Since we use recursion, we need an artificial depth for subsets */
+ if (bsdepth > 100) {
+ job_log(j, LOG_ERR, "Mach sub-bootstrap create request failed. Depth greater than: %d", bsdepth);
+ return BOOTSTRAP_NO_MEMORY;
+ }
+
+ if ((js = job_new_bootstrap(j, requestorport, MACH_PORT_NULL)) == NULL) {
+ if (requestorport == MACH_PORT_NULL)
+ return BOOTSTRAP_NOT_PRIVILEGED;
+ return BOOTSTRAP_NO_MEMORY;
+ }
+
+ *subsetportp = job_get_bsport(js);
+ return BOOTSTRAP_SUCCESS;
+}
+
+kern_return_t
+x_bootstrap_create_service(mach_port_t bp, name_t servicename, mach_port_t *serviceportp)
+{
+ struct jobcb *j = job_find_by_port(bp);
+ struct machservice *ms;
+
+ if (job_prog(j)[0] == '\0') {
+ job_log(j, LOG_ERR, "Mach service creation requires a target server: %s", servicename);
+ return BOOTSTRAP_NOT_PRIVILEGED;
+ }
+
+ ms = job_lookup_service(j, servicename, false);
+ if (ms) {
+ job_log(j, LOG_DEBUG, "Mach service creation attempt for failed. Already exists: %s", servicename);
+ return BOOTSTRAP_NAME_IN_USE;
+ }
+
+ job_checkin(j);
+
+ *serviceportp = MACH_PORT_NULL;
+ ms = machservice_new(j, servicename, serviceportp);
+
+ if (!launchd_assumes(ms != NULL))
+ goto out_bad;
+
+ return BOOTSTRAP_SUCCESS;
+
+out_bad:
+ launchd_assumes(launchd_mport_close_recv(*serviceportp) == KERN_SUCCESS);
+ return BOOTSTRAP_NO_MEMORY;
+}
+
+kern_return_t
+x_mpm_wait(mach_port_t bp, mach_port_t srp, audit_token_t au_tok, integer_t *waitstatus)
+{
+ struct jobcb *j = job_find_by_port(bp);
+#if 0
+ struct ldcred ldc;
+ audit_token_to_launchd_cred(au_tok, &ldc);
+#endif
+ return job_handle_mpm_wait(j, srp, waitstatus);
+}
+
+kern_return_t
+x_mpm_uncork_fork(mach_port_t bp, audit_token_t au_tok)
+{
+ struct jobcb *j = job_find_by_port(bp);
+
+ if (!j)
+ return BOOTSTRAP_NOT_PRIVILEGED;
+
+ job_uncork_fork(j);
+
+ return 0;
+}
+
+kern_return_t
+x_mpm_spawn(mach_port_t bp, audit_token_t au_tok,
+ _internal_string_t charbuf, mach_msg_type_number_t charbuf_cnt,
+ uint32_t argc, uint32_t envc, uint64_t flags, uint16_t mig_umask,
+ pid_t *child_pid, mach_port_t *obsvr_port)
+{
+ struct jobcb *jr, *j = job_find_by_port(bp);
+ struct ldcred ldc;
+ size_t offset = 0;
+ char *tmpp;
+ const char **argv = NULL, **env = NULL;
+ const char *label = NULL;
+ const char *path = NULL;
+ const char *workingdir = NULL;
+ size_t argv_i = 0, env_i = 0;
+
+ audit_token_to_launchd_cred(au_tok, &ldc);
+
+#if 0
+ if (ldc.asid != inherited_asid) {
+ job_log(j, LOG_ERR, "Security: PID %d (ASID %d) was denied a request to spawn a process in this session (ASID %d)",
+ ldc.pid, ldc.asid, inherited_asid);
+ return BOOTSTRAP_NOT_PRIVILEGED;
+ }
+#endif
+
+ argv = alloca((argc + 1) * sizeof(char *));
+ memset(argv, 0, (argc + 1) * sizeof(char *));
+
+ if (envc > 0) {
+ env = alloca((envc + 1) * sizeof(char *));
+ memset(env, 0, (envc + 1) * sizeof(char *));
+ }
+
+ while (offset < charbuf_cnt) {
+ tmpp = charbuf + offset;
+ offset += strlen(tmpp) + 1;
+ if (!label) {
+ label = tmpp;
+ } else if (argc > 0) {
+ argv[argv_i] = tmpp;
+ argv_i++;
+ argc--;
+ } else if (envc > 0) {
+ env[env_i] = tmpp;
+ env_i++;
+ envc--;
+ } else if (flags & SPAWN_HAS_PATH) {
+ path = tmpp;
+ flags &= ~SPAWN_HAS_PATH;
+ } else if (flags & SPAWN_HAS_WDIR) {
+ workingdir = tmpp;
+ flags &= ~SPAWN_HAS_WDIR;
+ }
+ }
+
+ jr = job_new_spawn(label, path, workingdir, argv, env, flags & SPAWN_HAS_UMASK ? &mig_umask : NULL,
+ flags & SPAWN_WANTS_WAIT4DEBUGGER, flags & SPAWN_WANTS_FORCE_PPC);
+
+ if (jr == NULL) switch (errno) {
+ case EEXIST:
+ return BOOTSTRAP_NAME_IN_USE;
+ default:
+ return BOOTSTRAP_NO_MEMORY;
+ }
+
+ job_log(j, LOG_INFO, "Spawned with flags:%s%s",
+ flags & SPAWN_WANTS_FORCE_PPC ? " ppc": "",
+ flags & SPAWN_WANTS_WAIT4DEBUGGER ? " stopped": "");
+
+ *child_pid = job_get_pid(jr);
+ *obsvr_port = job_get_bsport(jr);
+
+ return BOOTSTRAP_SUCCESS;
+}
+
+kern_return_t
+do_mach_notify_port_destroyed(mach_port_t notify, mach_port_t rights)
+{
+ /* This message is sent to us when a receive right is returned to us. */
+
+ if (!job_ack_port_destruction(root_job, rights)) {
+ launchd_assumes(launchd_mport_close_recv(rights) == KERN_SUCCESS);
+ }
+
+ return KERN_SUCCESS;
+}
+
+kern_return_t
+do_mach_notify_port_deleted(mach_port_t notify, mach_port_name_t name)
+{
+ /* If we deallocate/destroy/mod_ref away a port with a pending notification,
+ * the original notification message is replaced with this message.
+ *
+ * To quote a Mach kernel expert, "the kernel has a send-once right that has
+ * to be used somehow."
+ */
+ return KERN_SUCCESS;
+}
+
+kern_return_t
+do_mach_notify_no_senders(mach_port_t notify, mach_port_mscount_t mscount)
+{
+ struct jobcb *j = job_find_by_port(notify);
+
+ /* This message is sent to us when the last customer of one of our objects
+ * goes away.
+ */
+
+ if (!launchd_assumes(j != NULL))
+ return KERN_FAILURE;
+
+ job_ack_no_senders(j);
+
+ return KERN_SUCCESS;
+}
+
+kern_return_t
+do_mach_notify_send_once(mach_port_t notify)
+{
+ /*
+ * This message is sent to us every time we close a port that we have
+ * outstanding Mach notification requests on. We can safely ignore
+ * this message.
+ */
+ return KERN_SUCCESS;
+}
+
+kern_return_t
+do_mach_notify_dead_name(mach_port_t notify, mach_port_name_t name)
+{
+ /* This message is sent to us when one of our send rights no longer has
+ * a receiver somewhere else on the system.
+ */
+
+ if (name == inherited_bootstrap_port) {
+ launchd_assumes(launchd_mport_deallocate(name) == KERN_SUCCESS);
+ inherited_bootstrap_port = MACH_PORT_NULL;
+ }
+
+ job_delete_anything_with_port(root_job, name);
+
+ /* A dead-name notification about a port appears to increment the
+ * rights on said port. Let's deallocate it so that we don't leak
+ * dead-name ports.
+ */
+ launchd_assumes(launchd_mport_deallocate(name) == KERN_SUCCESS);
+
+ return KERN_SUCCESS;
+}
+
+bool
+trusted_client_check(struct jobcb *j, struct ldcred *ldc)
+{
+ static pid_t last_warned_pid = 0;
+
+ /* In the long run, we wish to enforce the progeny rule, but for now,
+ * we'll let root and the user be forgiven. Once we get CoreProcesses
+ * to switch to using launchd rather than the WindowServer for indirect
+ * process invocation, we can then seriously look at cranking up the
+ * warning level here.
+ */
+
+ if (inherited_asid == ldc->asid)
+ return true;
+ if (progeny_check(ldc->pid))
+ return true;
+ if (ldc->euid == geteuid())
+ return true;
+ if (ldc->euid == 0 && ldc->uid == 0)
+ return true;
+ if (last_warned_pid == ldc->pid)
+ return false;
+
+ job_log(j, LOG_NOTICE, "Security: PID %d (ASID %d) was leaked into this session (ASID %d). This will be denied in the future.", ldc->pid, ldc->asid, inherited_asid);
+
+ last_warned_pid = ldc->pid;
+
+ return false;
+}