X-Git-Url: https://git.saurik.com/apple/launchd.git/blobdiff_plain/ddbbfbc16a73ae4ed2ebe2c11ac6fb84b944c0dd..eabd170121c913d6b497fa2503e49f09f5412ddc:/launchd/src/libbootstrap.c?ds=sidebyside diff --git a/launchd/src/libbootstrap.c b/launchd/src/libbootstrap.c deleted file mode 100644 index be0209c..0000000 --- a/launchd/src/libbootstrap.c +++ /dev/null @@ -1,298 +0,0 @@ -/* - * Copyright (c) 1999-2005 Apple Computer, Inc. All rights reserved. - * - * @APPLE_APACHE_LICENSE_HEADER_START@ - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - * - * @APPLE_APACHE_LICENSE_HEADER_END@ - */ - -#include "config.h" -#include "launch.h" -#include "launch_priv.h" -#include "bootstrap.h" -#include "bootstrap_priv.h" -#include "vproc.h" -#include "vproc_priv.h" - -#include -#include -#include -#include -#include -#include - -#include "protocol_vproc.h" - -kern_return_t -bootstrap_create_server(mach_port_t bp, cmd_t server_cmd, uid_t server_uid, boolean_t on_demand, mach_port_t *server_port) -{ - kern_return_t kr; - - kr = vproc_mig_create_server(bp, server_cmd, server_uid, on_demand, server_port); - - if (kr == VPROC_ERR_TRY_PER_USER) { - mach_port_t puc; - - if (vproc_mig_lookup_per_user_context(bp, 0, &puc) == 0) { - kr = vproc_mig_create_server(puc, server_cmd, server_uid, on_demand, server_port); - mach_port_deallocate(mach_task_self(), puc); - } - } - - return kr; -} - -kern_return_t -bootstrap_subset(mach_port_t bp, mach_port_t requestor_port, mach_port_t *subset_port) -{ - return vproc_mig_subset(bp, requestor_port, subset_port); -} - -kern_return_t -bootstrap_unprivileged(mach_port_t bp, mach_port_t *unpriv_port) -{ - kern_return_t kr; - - *unpriv_port = MACH_PORT_NULL; - - kr = mach_port_mod_refs(mach_task_self(), bp, MACH_PORT_RIGHT_SEND, 1); - - if (kr == KERN_SUCCESS) { - *unpriv_port = bp; - } - - return kr; -} - -kern_return_t -bootstrap_parent(mach_port_t bp, mach_port_t *parent_port) -{ - return vproc_mig_parent(bp, parent_port); -} - -kern_return_t -bootstrap_register(mach_port_t bp, name_t service_name, mach_port_t sp) -{ - return bootstrap_register2(bp, service_name, sp, 0); -} - -kern_return_t -bootstrap_register2(mach_port_t bp, name_t service_name, mach_port_t sp, uint64_t flags) -{ - kern_return_t kr = vproc_mig_register2(bp, service_name, sp, flags); - - if (kr == VPROC_ERR_TRY_PER_USER) { - mach_port_t puc; - - if (vproc_mig_lookup_per_user_context(bp, 0, &puc) == 0) { - kr = vproc_mig_register2(puc, service_name, sp, flags); - mach_port_deallocate(mach_task_self(), puc); - } - } - - return kr; -} - -kern_return_t -bootstrap_create_service(mach_port_t bp, name_t service_name, mach_port_t *sp) -{ - kern_return_t kr; - - if ((kr = bootstrap_check_in(bp, service_name, sp))) { - return kr; - } - - if ((kr = mach_port_mod_refs(mach_task_self(), *sp, MACH_PORT_RIGHT_RECEIVE, -1))) { - return kr; - } - - return bootstrap_look_up(bp, service_name, sp); -} - -kern_return_t -bootstrap_check_in(mach_port_t bp, const name_t service_name, mach_port_t *sp) -{ - return vproc_mig_check_in2(bp, (char *)service_name, sp, 0); -} - -kern_return_t -bootstrap_check_in2(mach_port_t bp, const name_t service_name, mach_port_t *sp, uint64_t flags) -{ - return vproc_mig_check_in2(bp, (char *)service_name, sp, flags); -} - -kern_return_t -bootstrap_look_up_per_user(mach_port_t bp, const name_t service_name, uid_t target_user, mach_port_t *sp) -{ - audit_token_t au_tok; - kern_return_t kr; - mach_port_t puc; - - /* See rdar://problem/4890134. */ - - if ((kr = vproc_mig_lookup_per_user_context(bp, target_user, &puc)) != 0) { - return kr; - } - - if( !service_name ) { - *sp = puc; - } else { - kr = vproc_mig_look_up2(puc, (char *)service_name, sp, &au_tok, 0, 0); - mach_port_deallocate(mach_task_self(), puc); - } - - return kr; -} - -kern_return_t -bootstrap_lookup_children(mach_port_t bp, mach_port_array_t *children, name_array_t *names, bootstrap_property_array_t *properties, mach_msg_type_number_t *n_children) -{ - mach_msg_type_number_t junk = 0; - return vproc_mig_lookup_children(bp, children, &junk, names, n_children, properties, &junk); -} - -kern_return_t -bootstrap_look_up(mach_port_t bp, const name_t service_name, mach_port_t *sp) -{ - return bootstrap_look_up2(bp, service_name, sp, 0, 0); -} - -kern_return_t -bootstrap_look_up2(mach_port_t bp, const name_t service_name, mach_port_t *sp, pid_t target_pid, uint64_t flags) -{ - static pthread_mutex_t bslu2_lock = PTHREAD_MUTEX_INITIALIZER; - static mach_port_t prev_bp; - static mach_port_t prev_sp; - static name_t prev_name; - audit_token_t au_tok; - bool per_pid_lookup = flags & BOOTSTRAP_PER_PID_SERVICE; - bool privileged_server_lookup = flags & BOOTSTRAP_PRIVILEGED_SERVER; - kern_return_t kr = 0; - mach_port_t puc; - - pthread_mutex_lock(&bslu2_lock); - - if (per_pid_lookup || privileged_server_lookup) { - goto skip_cache; - } - - if (prev_sp) { - if ((bp == prev_bp) && (strncmp(prev_name, service_name, sizeof(name_t)) == 0) - && (mach_port_mod_refs(mach_task_self(), prev_sp, MACH_PORT_RIGHT_SEND, 1) == 0)) { - *sp = prev_sp; - goto out; - } else { - mach_port_deallocate(mach_task_self(), prev_sp); - prev_sp = 0; - } - } - -skip_cache: - if ((kr = vproc_mig_look_up2(bp, (char *)service_name, sp, &au_tok, target_pid, flags)) != VPROC_ERR_TRY_PER_USER) { - goto out; - } - - if ((kr = vproc_mig_lookup_per_user_context(bp, 0, &puc)) != 0) { - goto out; - } - - kr = vproc_mig_look_up2(puc, (char *)service_name, sp, &au_tok, target_pid, flags); - mach_port_deallocate(mach_task_self(), puc); - -out: - if (!(per_pid_lookup || privileged_server_lookup) && kr == 0 && prev_sp == 0 && mach_port_mod_refs(mach_task_self(), *sp, MACH_PORT_RIGHT_SEND, 1) == 0) { - /* We're going to hold on to a send right as a MRU cache */ - prev_bp = bp; - prev_sp = *sp; - strlcpy(prev_name, service_name, sizeof(name_t)); - } - - if ((kr == 0) && privileged_server_lookup) { - uid_t server_euid; - - /* - * The audit token magic is dependent on the per-user launchd - * forwarding MIG requests to the root launchd when it cannot - * find the answer locally. - */ - - /* This API should be in Libsystem, but is not */ - //audit_token_to_au32(au_tok, NULL, &server_euid, NULL, NULL, NULL, NULL, NULL, NULL); - - server_euid = au_tok.val[1]; - - if (server_euid) { - mach_port_deallocate(mach_task_self(), *sp); - kr = BOOTSTRAP_NOT_PRIVILEGED; - } - } - /* If performance becomes a problem, we should restructure this. */ - pthread_mutex_unlock(&bslu2_lock); - - return kr; -} - -kern_return_t -bootstrap_status(mach_port_t bp, name_t service_name, bootstrap_status_t *service_active) -{ - kern_return_t kr; - mach_port_t p; - - if ((kr = bootstrap_look_up(bp, service_name, &p))) { - return kr; - } - - mach_port_deallocate(mach_task_self(), p); - *service_active = BOOTSTRAP_STATUS_ACTIVE; - - if (bootstrap_check_in(bp, service_name, &p) == BOOTSTRAP_SUCCESS) { - mach_port_mod_refs(mach_task_self(), p, MACH_PORT_RIGHT_RECEIVE, -1); - *service_active = BOOTSTRAP_STATUS_ON_DEMAND; - } - - return BOOTSTRAP_SUCCESS; -} - -kern_return_t -bootstrap_info(mach_port_t bp, - name_array_t *service_names, mach_msg_type_number_t *service_namesCnt, - name_array_t *service_jobs, mach_msg_type_number_t *service_jobsCnt, - bootstrap_status_array_t *service_active, mach_msg_type_number_t *service_activeCnt, - uint64_t flags) -{ - return vproc_mig_info(bp, service_names, service_namesCnt, service_jobs, service_jobsCnt, service_active, service_activeCnt, flags); -} - -const char * -bootstrap_strerror(kern_return_t r) -{ - switch (r) { - case BOOTSTRAP_SUCCESS: - return "Success"; - case BOOTSTRAP_NOT_PRIVILEGED: - return "Permission denied"; - case BOOTSTRAP_NAME_IN_USE: - case BOOTSTRAP_SERVICE_ACTIVE: - return "Service name already exists"; - case BOOTSTRAP_UNKNOWN_SERVICE: - return "Unknown service name"; - case BOOTSTRAP_BAD_COUNT: - return "Too many lookups were requested in one request"; - case BOOTSTRAP_NO_MEMORY: - return "Out of memory"; - default: - return mach_error_string(r); - } -}