+/*
+ * Copyright (c) 2005 Apple Computer, Inc. All rights reserved.
+ *
+ * @APPLE_APACHE_LICENSE_HEADER_START@
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ *
+ * @APPLE_APACHE_LICENSE_HEADER_END@
+ */
+
+static const char *const __rcs_file_version__ = "$Revision: 1.77 $";
+
+#include <mach/mach.h>
+#include <mach/mach_error.h>
+#include <mach/boolean.h>
+#include <mach/message.h>
+#include <mach/notify.h>
+#include <mach/mig_errors.h>
+#include <mach/mach_traps.h>
+#include <mach/mach_interface.h>
+#include <mach/host_info.h>
+#include <mach/mach_host.h>
+#include <mach/exception.h>
+#include <sys/types.h>
+#include <sys/queue.h>
+#include <sys/event.h>
+#include <sys/ptrace.h>
+#include <sys/stat.h>
+#include <sys/ucred.h>
+#include <sys/fcntl.h>
+#include <sys/un.h>
+#include <sys/wait.h>
+#include <sys/sysctl.h>
+#include <sys/sockio.h>
+#include <sys/time.h>
+#include <sys/resource.h>
+#include <sys/ioctl.h>
+#include <sys/mount.h>
+#include <net/if.h>
+#include <netinet/in.h>
+#include <netinet/in_var.h>
+#include <netinet6/nd6.h>
+#include <unistd.h>
+#include <signal.h>
+#include <errno.h>
+#include <syslog.h>
+#include <libgen.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <stdarg.h>
+#include <stdbool.h>
+#include <paths.h>
+#include <pwd.h>
+#include <grp.h>
+#include <ttyent.h>
+#include <dlfcn.h>
+#include <dirent.h>
+#include <string.h>
+#include <ctype.h>
+#include <glob.h>
+
+#include "launch.h"
+#include "launch_priv.h"
+#include "launchd.h"
+#include "launchd_core_logic.h"
+#include "launchd_unix_ipc.h"
+#include "bootstrap_private.h"
+#include "bootstrap.h"
+#include "bootstrapServer.h"
+#include "mpm_reply.h"
+
+/* <rdar://problem/2685209> sys/queue.h is not up to date */
+#ifndef SLIST_FOREACH_SAFE
+#define SLIST_FOREACH_SAFE(var, head, field, tvar) \
+ for ((var) = SLIST_FIRST((head)); \
+ (var) && ((tvar) = SLIST_NEXT((var), field), 1); \
+ (var) = (tvar))
+#endif
+
+struct machservice {
+ SLIST_ENTRY(machservice) sle;
+ struct jobcb *job;
+ mach_port_name_t port;
+ unsigned int isActive:1, reset:1, recv:1, hide:1, kUNCServer:1, __junk:27;
+ char name[0];
+};
+
+static void machservice_setup(launch_data_t obj, const char *key, void *context);
+static void machservice_setup_options(launch_data_t obj, const char *key, void *context);
+static void machservice_resetport(struct jobcb *j, struct machservice *ms);
+
+
+struct socketgroup {
+ SLIST_ENTRY(socketgroup) sle;
+ int *fds;
+ unsigned int junkfds:1, fd_cnt:31;
+ char name[0];
+};
+
+static bool socketgroup_new(struct jobcb *j, const char *name, int *fds, unsigned int fd_cnt, bool junkfds);
+static void socketgroup_delete(struct jobcb *j, struct socketgroup *sg);
+static void socketgroup_watch(struct jobcb *j, struct socketgroup *sg);
+static void socketgroup_ignore(struct jobcb *j, struct socketgroup *sg);
+static void socketgroup_callback(struct jobcb *j, struct kevent *kev);
+static void socketgroup_setup(launch_data_t obj, const char *key, void *context);
+
+struct watchpath {
+ SLIST_ENTRY(watchpath) sle;
+ int fd;
+ unsigned int is_qdir:1, __junk:31;
+ char name[0];
+};
+
+static bool watchpath_new(struct jobcb *j, const char *name, bool qdir);
+static void watchpath_delete(struct jobcb *j, struct watchpath *wp);
+static void watchpath_watch(struct jobcb *j, struct watchpath *wp);
+static void watchpath_ignore(struct jobcb *j, struct watchpath *wp);
+static void watchpath_callback(struct jobcb *j, struct kevent *kev);
+
+struct calendarinterval {
+ SLIST_ENTRY(calendarinterval) sle;
+ struct tm when;
+};
+
+static bool calendarinterval_new(struct jobcb *j, struct tm *w);
+static bool calendarinterval_new_from_obj(struct jobcb *j, launch_data_t obj);
+static void calendarinterval_delete(struct jobcb *j, struct calendarinterval *ci);
+static void calendarinterval_setalarm(struct jobcb *j, struct calendarinterval *ci);
+static void calendarinterval_callback(struct jobcb *j, struct kevent *kev);
+
+struct envitem {
+ SLIST_ENTRY(envitem) sle;
+ char *value;
+ char key[0];
+};
+
+static bool envitem_new(struct jobcb *j, const char *k, const char *v, bool global);
+static void envitem_delete(struct jobcb *j, struct envitem *ei, bool global);
+static void envitem_setup(launch_data_t obj, const char *key, void *context);
+
+struct limititem {
+ SLIST_ENTRY(limititem) sle;
+ struct rlimit lim;
+ unsigned int setsoft:1, sethard:1, which:30;
+};
+
+static bool limititem_update(struct jobcb *j, int w, rlim_t r);
+static void limititem_delete(struct jobcb *j, struct limititem *li);
+static void limititem_setup(launch_data_t obj, const char *key, void *context);
+
+typedef enum {
+ NETWORK_UP = 1,
+ NETWORK_DOWN,
+ SUCCESSFUL_EXIT,
+ FAILED_EXIT,
+ PATH_EXISTS,
+ PATH_MISSING,
+ // FILESYSTEMTYPE_IS_MOUNTED, /* for nfsiod, but maybe others */
+} semaphore_reason_t;
+
+struct semaphoreitem {
+ SLIST_ENTRY(semaphoreitem) sle;
+ semaphore_reason_t why;
+ char what[0];
+};
+
+static bool semaphoreitem_new(struct jobcb *j, semaphore_reason_t why, const char *what);
+static void semaphoreitem_delete(struct jobcb *j, struct semaphoreitem *si);
+static void semaphoreitem_setup(launch_data_t obj, const char *key, void *context);
+static void semaphoreitem_setup_paths(launch_data_t obj, const char *key, void *context);
+
+
+struct jobcb {
+ kq_callback kqjob_callback;
+ SLIST_ENTRY(jobcb) sle;
+ SLIST_HEAD(, socketgroup) sockets;
+ SLIST_HEAD(, watchpath) vnodes;
+ SLIST_HEAD(, calendarinterval) cal_intervals;
+ SLIST_HEAD(, envitem) global_env;
+ SLIST_HEAD(, envitem) env;
+ SLIST_HEAD(, limititem) limits;
+ SLIST_HEAD(, machservice) machservices;
+ SLIST_HEAD(, semaphoreitem) semaphores;
+ SLIST_HEAD(, jobcb) jobs;
+ struct rusage ru;
+ struct jobcb *parent;
+ mach_port_t bs_port;
+ mach_port_t req_port;
+ mach_port_t wait_reply_port;
+ uid_t mach_uid;
+ char **argv;
+ char *prog;
+ char *rootdir;
+ char *workingdir;
+ char *username;
+ char *groupname;
+ char *stdinpath;
+ char *stdoutpath;
+ char *stderrpath;
+ pid_t p;
+ int argc;
+ int last_exit_status;
+ int execfd;
+ int nice;
+ int timeout;
+ time_t start_time;
+ size_t failed_exits;
+ unsigned int start_interval;
+ unsigned int checkedin:1, firstborn:1, debug:1, throttle:1, inetcompat:1, inetcompat_wait:1,
+ ondemand:1, session_create:1, low_pri_io:1, init_groups:1, priv_port_has_senders:1,
+ importing_global_env:1, importing_hard_limits:1, setmask:1, legacy_mach_job:1, runatload:1;
+ mode_t mask;
+ unsigned int globargv:1, wait4debugger:1, transfer_bstrap:1, unload_at_exit:1, force_ppc:1, stall_before_exec:1, __pad:26;
+ char label[0];
+};
+
+static struct jobcb *job_import2(launch_data_t pload);
+static void job_import_keys(launch_data_t obj, const char *key, void *context);
+static void job_import_bool(struct jobcb *j, const char *key, bool value);
+static void job_import_string(struct jobcb *j, const char *key, const char *value);
+static void job_import_integer(struct jobcb *j, const char *key, long long value);
+static void job_import_dictionary(struct jobcb *j, const char *key, launch_data_t value);
+static void job_import_array(struct jobcb *j, const char *key, launch_data_t value);
+static void job_watch(struct jobcb *j);
+static void job_ignore(struct jobcb *j);
+static void job_reap(struct jobcb *j);
+static bool job_useless(struct jobcb *j);
+static bool job_keepalive(struct jobcb *j);
+static void job_start_child(struct jobcb *j, int execfd) __attribute__((noreturn));
+static void job_setup_attributes(struct jobcb *j);
+static bool job_setup_machport(struct jobcb *j);
+static void job_callback(void *obj, struct kevent *kev);
+static pid_t job_fork(struct jobcb *j);
+static size_t job_prep_log_preface(struct jobcb *j, char *buf);
+static void job_setup_env_from_other_jobs(struct jobcb *j);
+static void job_export_all2(struct jobcb *j, launch_data_t where);
+static launch_data_t job_export2(struct jobcb *j, bool subjobs);
+
+
+static const struct {
+ const char *key;
+ int val;
+} launchd_keys2limits[] = {
+ { LAUNCH_JOBKEY_RESOURCELIMIT_CORE, RLIMIT_CORE },
+ { LAUNCH_JOBKEY_RESOURCELIMIT_CPU, RLIMIT_CPU },
+ { LAUNCH_JOBKEY_RESOURCELIMIT_DATA, RLIMIT_DATA },
+ { LAUNCH_JOBKEY_RESOURCELIMIT_FSIZE, RLIMIT_FSIZE },
+ { LAUNCH_JOBKEY_RESOURCELIMIT_MEMLOCK, RLIMIT_MEMLOCK },
+ { LAUNCH_JOBKEY_RESOURCELIMIT_NOFILE, RLIMIT_NOFILE },
+ { LAUNCH_JOBKEY_RESOURCELIMIT_NPROC, RLIMIT_NPROC },
+ { LAUNCH_JOBKEY_RESOURCELIMIT_RSS, RLIMIT_RSS },
+ { LAUNCH_JOBKEY_RESOURCELIMIT_STACK, RLIMIT_STACK },
+};
+
+static time_t cronemu(int mon, int mday, int hour, int min);
+static time_t cronemu_wday(int wday, int hour, int min);
+static bool cronemu_mon(struct tm *wtm, int mon, int mday, int hour, int min);
+static bool cronemu_mday(struct tm *wtm, int mday, int hour, int min);
+static bool cronemu_hour(struct tm *wtm, int hour, int min);
+static bool cronemu_min(struct tm *wtm, int min);
+
+static void simple_zombie_reaper(void *, struct kevent *);
+
+kq_callback kqsimple_zombie_reaper = simple_zombie_reaper;
+
+static int dir_has_files(const char *path);
+static char **mach_cmd2argv(const char *string);
+struct jobcb *root_job = NULL;
+struct jobcb *gc_this_job = NULL;
+size_t total_children = 0;
+
+void
+simple_zombie_reaper(void *obj __attribute__((unused)), struct kevent *kev)
+{
+ waitpid(kev->ident, NULL, 0);
+}
+
+void
+job_ignore(struct jobcb *j)
+{
+ struct socketgroup *sg;
+ struct machservice *ms;
+ struct watchpath *wp;
+
+ SLIST_FOREACH(sg, &j->sockets, sle)
+ socketgroup_ignore(j, sg);
+
+ SLIST_FOREACH(wp, &j->vnodes, sle)
+ watchpath_ignore(j, wp);
+
+ SLIST_FOREACH(ms, &j->machservices, sle)
+ launchd_assumes(launchd_mport_request_callback(ms->port, NULL, false) == KERN_SUCCESS);
+}
+
+void
+job_watch(struct jobcb *j)
+{
+ struct socketgroup *sg;
+ struct machservice *ms;
+ struct watchpath *wp;
+
+ SLIST_FOREACH(sg, &j->sockets, sle)
+ socketgroup_watch(j, sg);
+
+ SLIST_FOREACH(wp, &j->vnodes, sle)
+ watchpath_watch(j, wp);
+
+ SLIST_FOREACH(ms, &j->machservices, sle)
+ launchd_assumes(launchd_mport_request_callback(ms->port, j, false) == KERN_SUCCESS);
+}
+
+void
+job_stop(struct jobcb *j)
+{
+ if (j->p)
+ kill(j->p, SIGTERM);
+}
+
+launch_data_t
+job_export(struct jobcb *j)
+{
+ return job_export2(j, true);
+}
+
+launch_data_t
+job_export2(struct jobcb *j, bool subjobs)
+{
+ launch_data_t tmp, tmp2, tmp3, r = launch_data_alloc(LAUNCH_DATA_DICTIONARY);
+
+ if (r == NULL)
+ return NULL;
+
+ if ((tmp = launch_data_new_string(j->label)))
+ launch_data_dict_insert(r, tmp, LAUNCH_JOBKEY_LABEL);
+
+ if ((tmp = launch_data_new_bool(j->ondemand)))
+ launch_data_dict_insert(r, tmp, LAUNCH_JOBKEY_ONDEMAND);
+
+ if ((tmp = launch_data_new_integer(j->last_exit_status)))
+ launch_data_dict_insert(r, tmp, LAUNCH_JOBKEY_LASTEXITSTATUS);
+
+ if (j->p && (tmp = launch_data_new_integer(j->p)))
+ launch_data_dict_insert(r, tmp, LAUNCH_JOBKEY_PID);
+
+ if ((tmp = launch_data_new_integer(j->timeout)))
+ launch_data_dict_insert(r, tmp, LAUNCH_JOBKEY_TIMEOUT);
+
+ if (j->prog && (tmp = launch_data_new_string(j->prog)))
+ launch_data_dict_insert(r, tmp, LAUNCH_JOBKEY_PROGRAM);
+
+ if (j->stdoutpath && (tmp = launch_data_new_string(j->stdoutpath)))
+ launch_data_dict_insert(r, tmp, LAUNCH_JOBKEY_STANDARDOUTPATH);
+
+ if (j->stderrpath && (tmp = launch_data_new_string(j->stderrpath)))
+ launch_data_dict_insert(r, tmp, LAUNCH_JOBKEY_STANDARDERRORPATH);
+
+ if (j->argv && (tmp = launch_data_alloc(LAUNCH_DATA_ARRAY))) {
+ int i;
+
+ for (i = 0; i < j->argc; i++) {
+ if ((tmp2 = launch_data_new_string(j->argv[i])))
+ launch_data_array_set_index(tmp, tmp2, i);
+ }
+
+ launch_data_dict_insert(r, tmp, LAUNCH_JOBKEY_PROGRAMARGUMENTS);
+ }
+
+ if (j->inetcompat && (tmp = launch_data_alloc(LAUNCH_DATA_DICTIONARY))) {
+ if ((tmp2 = launch_data_new_bool(j->inetcompat_wait)))
+ launch_data_dict_insert(tmp, tmp2, LAUNCH_JOBINETDCOMPATIBILITY_WAIT);
+ launch_data_dict_insert(r, tmp, LAUNCH_JOBKEY_INETDCOMPATIBILITY);
+ }
+
+ if (!SLIST_EMPTY(&j->sockets) && (tmp = launch_data_alloc(LAUNCH_DATA_DICTIONARY))) {
+ struct socketgroup *sg;
+ int i;
+
+ SLIST_FOREACH(sg, &j->sockets, sle) {
+ if ((tmp2 = launch_data_alloc(LAUNCH_DATA_ARRAY))) {
+ for (i = 0; i < sg->fd_cnt; i++) {
+ if ((tmp3 = launch_data_new_fd(sg->fds[i])))
+ launch_data_array_set_index(tmp2, tmp3, i);
+ }
+ launch_data_dict_insert(tmp, tmp2, sg->name);
+ }
+ }
+
+ launch_data_dict_insert(r, tmp, LAUNCH_JOBKEY_SOCKETS);
+ }
+
+ if (!SLIST_EMPTY(&j->machservices) && (tmp = launch_data_alloc(LAUNCH_DATA_DICTIONARY))) {
+ struct machservice *ms;
+
+ SLIST_FOREACH(ms, &j->machservices, sle) {
+ tmp2 = launch_data_new_machport(MACH_PORT_NULL);
+ launch_data_dict_insert(tmp, tmp2, ms->name);
+ }
+
+ launch_data_dict_insert(r, tmp, LAUNCH_JOBKEY_MACHSERVICES);
+ }
+
+ if (subjobs && !SLIST_EMPTY(&j->jobs) && (tmp = launch_data_alloc(LAUNCH_DATA_ARRAY))) {
+ struct jobcb *ji;
+ size_t i = 0;
+
+ SLIST_FOREACH(ji, &j->jobs, sle) {
+ tmp2 = job_export2(ji, true);
+ launch_data_array_set_index(tmp, tmp2, i);
+ i++;
+ }
+
+ launch_data_dict_insert(r, tmp, LAUNCH_JOBKEY_SUBJOBS);
+ }
+
+ return r;
+}
+
+void
+job_remove_all_inactive(struct jobcb *j)
+{
+ struct jobcb *ji;
+
+ SLIST_FOREACH(ji, &j->jobs, sle)
+ job_remove_all_inactive(ji);
+
+ if (!job_active(j)) {
+ job_remove(j);
+ } else if (getpid() != 1) {
+ job_stop(j);
+ }
+}
+
+void
+job_remove(struct jobcb *j)
+{
+ struct jobcb *ji;
+ struct calendarinterval *ci;
+ struct socketgroup *sg;
+ struct watchpath *wp;
+ struct limititem *li;
+ struct envitem *ei;
+ struct machservice *ms;
+ struct semaphoreitem *si;
+
+ job_log(j, LOG_DEBUG, "Removed");
+
+ if (j->p) {
+ if (kevent_mod(j->p, EVFILT_PROC, EV_ADD, NOTE_EXIT, 0, &kqsimple_zombie_reaper) == -1) {
+ job_reap(j);
+ } else {
+ /* we've attached the simple zombie reaper, we're going to delete the job before it is dead */
+ total_children--;
+ job_stop(j);
+ }
+ }
+
+ if (j->parent)
+ SLIST_REMOVE(&j->parent->jobs, j, jobcb, sle);
+
+ if (j->execfd)
+ launchd_assumes(close(j->execfd) == 0);
+
+ if (j->bs_port) {
+ if (j->transfer_bstrap) {
+ launchd_assumes(launchd_mport_deallocate(j->bs_port) == KERN_SUCCESS);
+ } else {
+ launchd_assumes(launchd_mport_close_recv(j->bs_port) == KERN_SUCCESS);
+ }
+ }
+
+ if (j->req_port)
+ launchd_assumes(launchd_mport_deallocate(j->req_port) == KERN_SUCCESS);
+
+#if 0
+ if (j->wait_reply_port) {
+ }
+#endif
+
+ while ((ji = SLIST_FIRST(&j->jobs)))
+ job_remove(ji);
+
+ while ((sg = SLIST_FIRST(&j->sockets)))
+ socketgroup_delete(j, sg);
+
+ while ((wp = SLIST_FIRST(&j->vnodes)))
+ watchpath_delete(j, wp);
+
+ while ((ci = SLIST_FIRST(&j->cal_intervals)))
+ calendarinterval_delete(j, ci);
+
+ while ((ei = SLIST_FIRST(&j->env)))
+ envitem_delete(j, ei, false);
+
+ while ((ei = SLIST_FIRST(&j->global_env)))
+ envitem_delete(j, ei, true);
+
+ while ((li = SLIST_FIRST(&j->limits)))
+ limititem_delete(j, li);
+
+ while ((ms = SLIST_FIRST(&j->machservices)))
+ machservice_delete(ms);
+
+ while ((si = SLIST_FIRST(&j->semaphores)))
+ semaphoreitem_delete(j, si);
+
+ if (j->prog)
+ free(j->prog);
+
+ if (j->argv)
+ free(j->argv);
+
+ if (j->rootdir)
+ free(j->rootdir);
+
+ if (j->workingdir)
+ free(j->workingdir);
+
+ if (j->username)
+ free(j->username);
+
+ if (j->groupname)
+ free(j->groupname);
+
+ if (j->stdinpath)
+ free(j->stdinpath);
+
+ if (j->stdoutpath)
+ free(j->stdoutpath);
+
+ if (j->stderrpath)
+ free(j->stderrpath);
+
+ if (j->start_interval)
+ kevent_mod((uintptr_t)&j->start_interval, EVFILT_TIMER, EV_DELETE, 0, 0, NULL);
+
+ kevent_mod((uintptr_t)j, EVFILT_TIMER, EV_DELETE, 0, 0, NULL);
+ free(j);
+}
+
+void
+socketgroup_setup(launch_data_t obj, const char *key, void *context)
+{
+ launch_data_t tmp_oai;
+ struct jobcb *j = context;
+ unsigned int i, fd_cnt = 1;
+ int *fds;
+
+ if (launch_data_get_type(obj) == LAUNCH_DATA_ARRAY)
+ fd_cnt = launch_data_array_get_count(obj);
+
+ fds = alloca(fd_cnt * sizeof(int));
+
+ for (i = 0; i < fd_cnt; i++) {
+ if (launch_data_get_type(obj) == LAUNCH_DATA_ARRAY)
+ tmp_oai = launch_data_array_get_index(obj, i);
+ else
+ tmp_oai = obj;
+
+ fds[i] = launch_data_get_fd(tmp_oai);
+ }
+
+ socketgroup_new(j, key, fds, fd_cnt, strcmp(key, LAUNCH_JOBKEY_BONJOURFDS) == 0);
+
+ ipc_revoke_fds(obj);
+}
+
+bool
+job_setup_machport(struct jobcb *j)
+{
+ if (!launchd_assumes(launchd_mport_create_recv(&j->bs_port) == KERN_SUCCESS))
+ goto out_bad;
+
+ if (!launchd_assumes(launchd_mport_request_callback(j->bs_port, j, true) == KERN_SUCCESS))
+ goto out_bad2;
+
+ return true;
+out_bad2:
+ launchd_assumes(launchd_mport_close_recv(j->bs_port) == KERN_SUCCESS);
+out_bad:
+ return false;
+}
+
+struct jobcb *
+job_new_via_mach_init(struct jobcb *jbs, const char *cmd, uid_t uid, bool ond)
+{
+ const char **argv = (const char **)mach_cmd2argv(cmd);
+ struct jobcb *j = NULL;
+ char buf[1000];
+
+ if (!launchd_assumes(argv != NULL))
+ goto out_bad;
+
+ /* preflight the string so we know how big it is */
+ sprintf(buf, "100000.%s", basename((char *)argv[0]));
+
+ j = job_new(jbs, buf, NULL, argv, NULL, MACH_PORT_NULL);
+
+ free(argv);
+
+ if (!launchd_assumes(j != NULL))
+ goto out_bad;
+
+ j->mach_uid = uid;
+ j->ondemand = ond;
+ j->legacy_mach_job = true;
+ j->priv_port_has_senders = true; /* the IPC that called us will make-send on this port */
+
+ if (!job_setup_machport(j))
+ goto out_bad;
+
+ if (!launchd_assumes(launchd_mport_notify_req(j->bs_port, MACH_NOTIFY_NO_SENDERS) == KERN_SUCCESS)) {
+ launchd_assumes(launchd_mport_close_recv(j->bs_port) == KERN_SUCCESS);
+ goto out_bad;
+ }
+
+ sprintf(j->label, "%d.%s", MACH_PORT_INDEX(j->bs_port), basename(j->argv[0]));
+
+ job_log(j, LOG_INFO, "New%s server in bootstrap: %x", ond ? " on-demand" : "", jbs->bs_port);
+
+ return j;
+
+out_bad:
+ if (j)
+ job_remove(j);
+ return NULL;
+}
+
+kern_return_t
+job_handle_mpm_wait(struct jobcb *j, mach_port_t srp, int *waitstatus)
+{
+ if (j->p) {
+ j->wait_reply_port = srp;
+ return MIG_NO_REPLY;
+ }
+
+ *waitstatus = j->last_exit_status;
+
+ return 0;
+}
+
+struct jobcb *
+job_new_spawn(const char *label, const char *path, const char *workingdir, const char *const *argv, const char *const *env, mode_t *u_mask, bool w4d, bool fppc)
+{
+ struct jobcb *jr;
+
+ if ((jr = job_find(root_job, label)) != NULL) {
+ errno = EEXIST;
+ return NULL;
+ }
+
+ jr = job_new(root_job, label, path, argv, NULL, MACH_PORT_NULL);
+
+ if (!jr)
+ return NULL;
+
+ jr->unload_at_exit = true;
+ jr->stall_before_exec = w4d;
+ jr->force_ppc = fppc;
+
+ if (!job_setup_machport(jr)) {
+ job_remove(jr);
+ return NULL;
+ }
+
+ if (workingdir)
+ jr->workingdir = strdup(workingdir);
+
+ if (u_mask) {
+ jr->mask = *u_mask;
+ jr->setmask = true;
+ }
+
+ if (env) for (; *env; env++) {
+ char newkey[strlen(*env) + 1], *eqoff = strchr(*env, '=');
+ if (!eqoff) {
+ job_log(jr, LOG_WARNING, "Environmental variable missing '=' separator: %s", *env);
+ continue;
+ }
+ strcpy(newkey, *env);
+ *eqoff = '\0';
+ envitem_new(jr, newkey, eqoff + 1, false);
+ }
+
+ job_start(jr);
+
+ return jr;
+}
+
+struct jobcb *
+job_new(struct jobcb *p, const char *label, const char *prog, const char *const *argv, const char *stdinpath, mach_port_t reqport)
+{
+ const char *const *argv_tmp = argv;
+ char *co;
+ int i, cc = 0;
+ struct jobcb *j;
+
+ if (reqport == MACH_PORT_NULL && prog == NULL && argv == NULL) {
+ errno = EINVAL;
+ return NULL;
+ }
+
+ j = calloc(1, sizeof(struct jobcb) + strlen(label) + 1);
+
+ if (!launchd_assumes(j != NULL))
+ goto out_bad;
+
+ strcpy(j->label, label);
+ j->kqjob_callback = job_callback;
+ j->parent = p ? job_get_bs(p) : NULL;
+ j->ondemand = true;
+ j->checkedin = true;
+ j->firstborn = (strcmp(label, FIRSTBORN_LABEL) == 0);
+
+ if (reqport != MACH_PORT_NULL) {
+ j->req_port = reqport;
+ if (!launchd_assumes(launchd_mport_notify_req(reqport, MACH_NOTIFY_DEAD_NAME) == KERN_SUCCESS))
+ goto out_bad;
+ }
+
+ if (prog) {
+ j->prog = strdup(prog);
+ if (!launchd_assumes(j->prog != NULL))
+ goto out_bad;
+ }
+
+ if (stdinpath) {
+ j->stdinpath = strdup(stdinpath);
+ if (!launchd_assumes(j->stdinpath != NULL))
+ goto out_bad;
+ }
+
+ if (argv) {
+ while (*argv_tmp++)
+ j->argc++;
+
+ for (i = 0; i < j->argc; i++)
+ cc += strlen(argv[i]) + 1;
+
+ j->argv = malloc((j->argc + 1) * sizeof(char *) + cc);
+
+ if (!launchd_assumes(j != NULL))
+ goto out_bad;
+
+ co = ((char *)j->argv) + ((j->argc + 1) * sizeof(char *));
+
+ for (i = 0; i < j->argc; i++) {
+ j->argv[i] = co;
+ strcpy(co, argv[i]);
+ co += strlen(argv[i]) + 1;
+ }
+ j->argv[i] = NULL;
+ }
+
+ if (j->parent) {
+ SLIST_INSERT_HEAD(&j->parent->jobs, j, sle);
+ job_log(j->parent, LOG_DEBUG, "Conceived");
+ }
+
+ return j;
+
+out_bad:
+ if (j) {
+ if (j->prog)
+ free(j->prog);
+ if (j->stdinpath)
+ free(j->stdinpath);
+ free(j);
+ }
+ return NULL;
+}
+
+struct jobcb *
+job_import(launch_data_t pload)
+{
+ struct jobcb *j = job_import2(pload);
+
+ if (j == NULL)
+ return NULL;
+
+ job_dispatch(j);
+
+ return j;
+}
+
+launch_data_t
+job_import_bulk(launch_data_t pload)
+{
+ launch_data_t resp = launch_data_alloc(LAUNCH_DATA_ARRAY);
+ struct jobcb **ja;
+ size_t i, c = launch_data_array_get_count(pload);
+
+ ja = alloca(c * sizeof(struct jobcb *));
+
+ for (i = 0; i < c; i++) {
+ if ((ja[i] = job_import2(launch_data_array_get_index(pload, i))))
+ errno = 0;
+ launch_data_array_set_index(resp, launch_data_new_errno(errno), i);
+ }
+
+ for (i = 0; i < c; i++) {
+ if (ja[i] == NULL)
+ continue;
+ job_dispatch(ja[i]);
+ }
+
+ return resp;
+}
+
+void
+job_import_bool(struct jobcb *j, const char *key, bool value)
+{
+ switch (key[0]) {
+ case 'f':
+ case 'F':
+ if (strcasecmp(key, LAUNCH_JOBKEY_FORCEPOWERPC) == 0)
+ j->force_ppc = value;
+ break;
+ case 'k':
+ case 'K':
+ if (strcasecmp(key, LAUNCH_JOBKEY_KEEPALIVE) == 0)
+ j->ondemand = !value;
+ break;
+ case 'o':
+ case 'O':
+ if (strcasecmp(key, LAUNCH_JOBKEY_ONDEMAND) == 0)
+ j->ondemand = value;
+ break;
+ case 'd':
+ case 'D':
+ if (strcasecmp(key, LAUNCH_JOBKEY_DEBUG) == 0)
+ j->debug = value;
+ break;
+ case 's':
+ case 'S':
+ if (strcasecmp(key, LAUNCH_JOBKEY_SESSIONCREATE) == 0)
+ j->session_create = value;
+ break;
+ case 'l':
+ case 'L':
+ if (strcasecmp(key, LAUNCH_JOBKEY_LOWPRIORITYIO) == 0)
+ j->low_pri_io = value;
+ break;
+ case 'i':
+ case 'I':
+ if (strcasecmp(key, LAUNCH_JOBKEY_INITGROUPS) == 0)
+ j->init_groups = value;
+ break;
+ case 'r':
+ case 'R':
+ if (strcasecmp(key, LAUNCH_JOBKEY_RUNATLOAD) == 0)
+ j->runatload = value;
+ break;
+ case 'e':
+ case 'E':
+ if (strcasecmp(key, LAUNCH_JOBKEY_ENABLEGLOBBING) == 0)
+ j->globargv = value;
+ break;
+ case 'w':
+ case 'W':
+ if (strcasecmp(key, LAUNCH_JOBKEY_WAITFORDEBUGGER) == 0)
+ j->wait4debugger = value;
+ break;
+ default:
+ break;
+ }
+}
+
+void
+job_import_string(struct jobcb *j, const char *key, const char *value)
+{
+ char **where2put = NULL;
+ char **ignore = (char **)-1;
+
+ switch (key[0]) {
+ case 'p':
+ case 'P':
+ if (strcasecmp(key, LAUNCH_JOBKEY_PROGRAM) == 0)
+ where2put = ignore;
+ break;
+ case 'l':
+ case 'L':
+ if (strcasecmp(key, LAUNCH_JOBKEY_LABEL) == 0)
+ where2put = ignore;
+ break;
+ case 'r':
+ case 'R':
+ if (strcasecmp(key, LAUNCH_JOBKEY_ROOTDIRECTORY) == 0)
+ where2put = &j->rootdir;
+ break;
+ case 'w':
+ case 'W':
+ if (strcasecmp(key, LAUNCH_JOBKEY_WORKINGDIRECTORY) == 0)
+ where2put = &j->workingdir;
+ break;
+ case 'u':
+ case 'U':
+ if (strcasecmp(key, LAUNCH_JOBKEY_USERNAME) == 0)
+ where2put = &j->username;
+ break;
+ case 'g':
+ case 'G':
+ if (strcasecmp(key, LAUNCH_JOBKEY_GROUPNAME) == 0)
+ where2put = &j->groupname;
+ break;
+ case 's':
+ case 'S':
+ if (strcasecmp(key, LAUNCH_JOBKEY_STANDARDOUTPATH) == 0) {
+ where2put = &j->stdoutpath;
+ } else if (strcasecmp(key, LAUNCH_JOBKEY_STANDARDERRORPATH) == 0) {
+ where2put = &j->stderrpath;
+ }
+ break;
+ default:
+ break;
+ }
+
+ if (where2put) {
+ if (where2put == ignore)
+ return;
+
+ launchd_assumes((*where2put = strdup(value)) != NULL);
+ } else {
+ job_log(j, LOG_WARNING, "Unknown value for key %s: %s", key, value);
+ }
+}
+
+void
+job_import_integer(struct jobcb *j, const char *key, long long value)
+{
+ switch (key[0]) {
+ case 'n':
+ case 'N':
+ if (strcasecmp(key, LAUNCH_JOBKEY_NICE) == 0)
+ j->nice = value;
+ break;
+ case 't':
+ case 'T':
+ if (strcasecmp(key, LAUNCH_JOBKEY_TIMEOUT) == 0) {
+ if (value <= 0)
+ job_log(j, LOG_WARNING, "Timeout less than or equal to zero. Ignoring.");
+ else
+ j->timeout = value;
+ }
+ break;
+ case 'u':
+ case 'U':
+ if (strcasecmp(key, LAUNCH_JOBKEY_UMASK) == 0) {
+ j->mask = value;
+ j->setmask = true;
+ }
+ break;
+ case 's':
+ case 'S':
+ if (strcasecmp(key, LAUNCH_JOBKEY_STARTINTERVAL) == 0) {
+ if (value <= 0)
+ job_log(j, LOG_WARNING, "StartInterval is not greater than zero, ignoring");
+ else
+ j->start_interval = value;
+ if (-1 == kevent_mod((uintptr_t)&j->start_interval, EVFILT_TIMER, EV_ADD, NOTE_SECONDS, value, j))
+ job_log_error(j, LOG_ERR, "adding kevent timer");
+ }
+ break;
+ default:
+ break;
+ }
+}
+
+void
+job_import_dictionary(struct jobcb *j, const char *key, launch_data_t value)
+{
+ launch_data_t tmp;
+
+ switch (key[0]) {
+ case 'k':
+ case 'K':
+ if (strcasecmp(key, LAUNCH_JOBKEY_KEEPALIVE) == 0)
+ launch_data_dict_iterate(value, semaphoreitem_setup, j);
+ break;
+ case 'i':
+ case 'I':
+ if (strcasecmp(key, LAUNCH_JOBKEY_INETDCOMPATIBILITY) == 0) {
+ j->inetcompat = true;
+ if ((tmp = launch_data_dict_lookup(value, LAUNCH_JOBINETDCOMPATIBILITY_WAIT)))
+ j->inetcompat_wait = launch_data_get_bool(tmp);
+ }
+ break;
+ case 'e':
+ case 'E':
+ if (strcasecmp(key, LAUNCH_JOBKEY_ENVIRONMENTVARIABLES) == 0)
+ launch_data_dict_iterate(value, envitem_setup, j);
+ break;
+ case 'u':
+ case 'U':
+ if (strcasecmp(key, LAUNCH_JOBKEY_USERENVIRONMENTVARIABLES) == 0) {
+ j->importing_global_env = true;
+ launch_data_dict_iterate(value, envitem_setup, j);
+ j->importing_global_env = false;
+ }
+ break;
+ case 's':
+ case 'S':
+ if (strcasecmp(key, LAUNCH_JOBKEY_SOCKETS) == 0) {
+ launch_data_dict_iterate(value, socketgroup_setup, j);
+ } else if (strcasecmp(key, LAUNCH_JOBKEY_STARTCALENDARINTERVAL) == 0) {
+ calendarinterval_new_from_obj(j, value);
+ } else if (strcasecmp(key, LAUNCH_JOBKEY_SOFTRESOURCELIMITS) == 0) {
+ launch_data_dict_iterate(value, limititem_setup, j);
+ }
+ break;
+ case 'h':
+ case 'H':
+ if (strcasecmp(key, LAUNCH_JOBKEY_HARDRESOURCELIMITS) == 0) {
+ j->importing_hard_limits = true;
+ launch_data_dict_iterate(value, limititem_setup, j);
+ j->importing_hard_limits = false;
+ }
+ break;
+ case 'm':
+ case 'M':
+ if (strcasecmp(key, LAUNCH_JOBKEY_MACHSERVICES) == 0) {
+ launch_data_dict_iterate(value, machservice_setup, j);
+ if (!SLIST_EMPTY(&j->machservices))
+ job_setup_machport(j);
+ }
+ break;
+ default:
+ break;
+ }
+}
+
+void
+job_import_array(struct jobcb *j, const char *key, launch_data_t value)
+{
+ bool is_q_dir = false;
+ bool is_wp = false;
+
+ switch (key[0]) {
+ case 'q':
+ case 'Q':
+ if (strcasecmp(key, LAUNCH_JOBKEY_QUEUEDIRECTORIES) == 0) {
+ is_q_dir = true;
+ is_wp = true;
+ }
+ break;
+ case 'w':
+ case 'W':
+ if (strcasecmp(key, LAUNCH_JOBKEY_WATCHPATHS) == 0)
+ is_wp = true;
+ break;
+ case 'b':
+ case 'B':
+ if (strcasecmp(key, LAUNCH_JOBKEY_BONJOURFDS) == 0)
+ socketgroup_setup(value, LAUNCH_JOBKEY_BONJOURFDS, j);
+ break;
+ case 's':
+ case 'S':
+ if (strcasecmp(key, LAUNCH_JOBKEY_STARTCALENDARINTERVAL) == 0) {
+ size_t i = 0, ci_cnt = launch_data_array_get_count(value);
+ for (i = 0; i < ci_cnt; i++)
+ calendarinterval_new_from_obj(j, launch_data_array_get_index(value, i));
+ }
+ break;
+ default:
+ break;
+ }
+
+ if (is_wp) {
+ size_t i, wp_cnt = launch_data_array_get_count(value);
+ const char *thepath;
+ for (i = 0; i < wp_cnt; i++) {
+ thepath = launch_data_get_string(launch_data_array_get_index(value, i));
+ watchpath_new(j, thepath, is_q_dir);
+ }
+ }
+}
+
+void
+job_import_keys(launch_data_t obj, const char *key, void *context)
+{
+ struct jobcb *j = context;
+ launch_data_type_t kind;
+
+ if (obj == NULL)
+ return;
+
+ kind = launch_data_get_type(obj);
+
+ switch (kind) {
+ case LAUNCH_DATA_BOOL:
+ job_import_bool(j, key, launch_data_get_bool(obj));
+ break;
+ case LAUNCH_DATA_STRING:
+ job_import_string(j, key, launch_data_get_string(obj));
+ break;
+ case LAUNCH_DATA_INTEGER:
+ job_import_integer(j, key, launch_data_get_integer(obj));
+ break;
+ case LAUNCH_DATA_DICTIONARY:
+ job_import_dictionary(j, key, obj);
+ break;
+ case LAUNCH_DATA_ARRAY:
+ job_import_array(j, key, obj);
+ break;
+ default:
+ job_log(j, LOG_WARNING, "Unknown value type '%d' for key: %s", kind, key);
+ break;
+ }
+}
+
+struct jobcb *
+job_import2(launch_data_t pload)
+{
+ launch_data_t tmp, ldpa;
+ const char *label = NULL, *prog = NULL;
+ const char **argv = NULL;
+ struct jobcb *j;
+
+ if (pload == NULL)
+ return NULL;
+
+ if (launch_data_get_type(pload) != LAUNCH_DATA_DICTIONARY)
+ return NULL;
+
+ if ((tmp = launch_data_dict_lookup(pload, LAUNCH_JOBKEY_LABEL)) &&
+ (launch_data_get_type(tmp) == LAUNCH_DATA_STRING)) {
+ label = launch_data_get_string(tmp);
+ }
+ if ((tmp = launch_data_dict_lookup(pload, LAUNCH_JOBKEY_PROGRAM)) &&
+ (launch_data_get_type(tmp) == LAUNCH_DATA_STRING)) {
+ prog = launch_data_get_string(tmp);
+ }
+ ldpa = launch_data_dict_lookup(pload, LAUNCH_JOBKEY_PROGRAMARGUMENTS);
+
+ if (label == NULL) {
+ errno = EINVAL;
+ return NULL;
+ } else if ((j = job_find(root_job, label)) != NULL) {
+ errno = EEXIST;
+ return NULL;
+ } else if (label[0] == '\0' || (strncasecmp(label, "", strlen("com.apple.launchd")) == 0) ||
+ (strtol(label, NULL, 10) != 0)) {
+ syslog(LOG_ERR, "Somebody attempted to use a reserved prefix for a label: %s", label);
+ /* the empty string, com.apple.launchd and number prefixes for labels are reserved */
+ errno = EINVAL;
+ return NULL;
+ }
+
+ if (ldpa) {
+ size_t i, c = launch_data_array_get_count(ldpa);
+
+ argv = alloca((c + 1) * sizeof(char *));
+
+ for (i = 0; i < c; i++)
+ argv[i] = launch_data_get_string(launch_data_array_get_index(ldpa, i));
+ argv[i] = NULL;
+ }
+
+ if ((j = job_new(root_job, label, prog, argv, NULL, MACH_PORT_NULL)))
+ launch_data_dict_iterate(pload, job_import_keys, j);
+
+ return j;
+}
+
+struct jobcb *
+job_find(struct jobcb *j, const char *label)
+{
+ struct jobcb *jr, *ji;
+
+ if (label[0] == '\0')
+ return root_job;
+
+ if (strcmp(j->label, label) == 0)
+ return j;
+
+ SLIST_FOREACH(ji, &j->jobs, sle) {
+ if ((jr = job_find(ji, label)))
+ return jr;
+ }
+
+ errno = ESRCH;
+ return NULL;
+}
+
+struct jobcb *
+job_find_by_pid(struct jobcb *j, pid_t p)
+{
+ struct jobcb *jr, *ji;
+
+ if (j->p == p)
+ return j;
+
+ SLIST_FOREACH(ji, &j->jobs, sle) {
+ if ((jr = job_find_by_pid(ji, p)))
+ return jr;
+ }
+
+ errno = ESRCH;
+ return NULL;
+}
+
+void
+job_export_all2(struct jobcb *j, launch_data_t where)
+{
+ launch_data_t tmp;
+ struct jobcb *ji;
+
+ if (launchd_assumes((tmp = job_export2(j, false)) != NULL))
+ launch_data_dict_insert(where, tmp, j->label);
+
+ SLIST_FOREACH(ji, &j->jobs, sle)
+ job_export_all2(ji, where);
+}
+
+launch_data_t
+job_export_all(void)
+{
+ launch_data_t resp = launch_data_alloc(LAUNCH_DATA_DICTIONARY);
+
+ job_export_all2(root_job, resp);
+
+ return resp;
+}
+
+void
+job_reap(struct jobcb *j)
+{
+ struct rusage ru;
+ time_t td = time(NULL) - j->start_time;
+ bool bad_exit = false;
+ int status;
+
+ job_log(j, LOG_DEBUG, "Reaping");
+
+ if (j->execfd) {
+ launchd_assumes(close(j->execfd) == 0);
+ j->execfd = 0;
+ }
+
+ if (!launchd_assumes(wait4(j->p, &status, 0, &ru) != -1)) {
+ return;
+ }
+
+ if (j->wait_reply_port) {
+ job_log(j, LOG_DEBUG, "MPM wait reply being sent");
+ launchd_assumes(mpm_wait_reply(j->wait_reply_port, 0, status) == 0);
+ j->wait_reply_port = MACH_PORT_NULL;
+ }
+
+ timeradd(&ru.ru_utime, &j->ru.ru_utime, &j->ru.ru_utime);
+ timeradd(&ru.ru_stime, &j->ru.ru_stime, &j->ru.ru_stime);
+ j->ru.ru_maxrss += ru.ru_maxrss;
+ j->ru.ru_ixrss += ru.ru_ixrss;
+ j->ru.ru_idrss += ru.ru_idrss;
+ j->ru.ru_isrss += ru.ru_isrss;
+ j->ru.ru_minflt += ru.ru_minflt;
+ j->ru.ru_majflt += ru.ru_majflt;
+ j->ru.ru_nswap += ru.ru_nswap;
+ j->ru.ru_inblock += ru.ru_inblock;
+ j->ru.ru_oublock += ru.ru_oublock;
+ j->ru.ru_msgsnd += ru.ru_msgsnd;
+ j->ru.ru_msgrcv += ru.ru_msgrcv;
+ j->ru.ru_nsignals += ru.ru_nsignals;
+ j->ru.ru_nvcsw += ru.ru_nvcsw;
+ j->ru.ru_nivcsw += ru.ru_nivcsw;
+
+ if (WIFEXITED(status) && WEXITSTATUS(status) != 0) {
+ job_log(j, LOG_WARNING, "exited with exit code: %d", WEXITSTATUS(status));
+ bad_exit = true;
+ }
+
+ if (WIFSIGNALED(status)) {
+ int s = WTERMSIG(status);
+ if (SIGKILL == s || SIGTERM == s) {
+ job_log(j, LOG_NOTICE, "Exited: %s", strsignal(s));
+ } else {
+ job_log(j, LOG_WARNING, "Exited abnormally: %s", strsignal(s));
+ bad_exit = true;
+ }
+ }
+
+ if (!j->ondemand && !j->legacy_mach_job) {
+ if (td < LAUNCHD_MIN_JOB_RUN_TIME) {
+ job_log(j, LOG_WARNING, "respawning too quickly! throttling");
+ bad_exit = true;
+ j->throttle = true;
+ } else if (td >= LAUNCHD_REWARD_JOB_RUN_TIME) {
+ job_log(j, LOG_INFO, "lived long enough, forgiving past exit failures");
+ j->failed_exits = 0;
+ }
+ }
+
+ if (!j->legacy_mach_job && bad_exit)
+ j->failed_exits++;
+
+ if (j->failed_exits > 0) {
+ int failures_left = LAUNCHD_FAILED_EXITS_THRESHOLD - j->failed_exits;
+ if (failures_left)
+ job_log(j, LOG_WARNING, "%d more failure%s without living at least %d seconds will cause job removal",
+ failures_left, failures_left > 1 ? "s" : "", LAUNCHD_REWARD_JOB_RUN_TIME);
+ }
+
+ total_children--;
+ j->last_exit_status = status;
+ j->p = 0;
+}
+
+void
+job_dispatch(struct jobcb *j)
+{
+ if (job_active(j)) {
+ return;
+ } else if (job_useless(j)) {
+ job_remove(j);
+ } else if (job_keepalive(j)) {
+ job_start(j);
+ } else {
+ job_watch(j);
+ }
+}
+
+void
+job_callback(void *obj, struct kevent *kev)
+{
+ struct jobcb *j = obj;
+ bool d = j->debug;
+ int oldmask = 0;
+
+ if (d) {
+ oldmask = setlogmask(LOG_UPTO(LOG_DEBUG));
+ }
+
+ switch (kev->filter) {
+ case EVFILT_PROC:
+ job_reap(j);
+
+ if (j->firstborn) {
+ job_log(j, LOG_DEBUG, "first born died, begin shutdown");
+ launchd_shutdown();
+ } else {
+ job_dispatch(j);
+ }
+ break;
+ case EVFILT_TIMER:
+ if ((uintptr_t)j == kev->ident) {
+ job_start(j);
+ } else {
+ calendarinterval_callback(j, kev);
+ }
+ break;
+ case EVFILT_VNODE:
+ watchpath_callback(j, kev);
+ break;
+ case EVFILT_READ:
+ if ((int)kev->ident != j->execfd) {
+ socketgroup_callback(j, kev);
+ break;
+ }
+ if (j->wait4debugger) {
+ /* Allow somebody else to attach */
+ launchd_assumes(kill(j->p, SIGSTOP) != -1);
+ launchd_assumes(ptrace(PT_DETACH, j->p, NULL, 0) != -1);
+ }
+ if (kev->data > 0) {
+ int e;
+
+ read(j->execfd, &e, sizeof(e));
+ errno = e;
+ job_log_error(j, LOG_ERR, "execve()");
+ job_remove(j);
+ j = NULL;
+ } else {
+ launchd_assumes(close(j->execfd) == 0);
+ j->execfd = 0;
+ }
+ break;
+ case EVFILT_MACHPORT:
+ job_start(j);
+ break;
+ default:
+ launchd_assumes(false);
+ break;
+ }
+
+ if (d) {
+ /* the job might have been removed, must not call job_log() */
+ setlogmask(oldmask);
+ }
+}
+
+void
+job_start(struct jobcb *j)
+{
+ int spair[2];
+ int execspair[2];
+ char nbuf[64];
+ pid_t c;
+ bool sipc = false;
+
+ if (!launchd_assumes(j->req_port == MACH_PORT_NULL))
+ return;
+
+ if (!launchd_assumes(j->parent != NULL))
+ return;
+
+ if (job_active(j)) {
+ job_log(j, LOG_DEBUG, "Already started");
+ return;
+ } else if (!j->legacy_mach_job && j->throttle) {
+ j->throttle = false;
+ job_log(j, LOG_WARNING, "Throttling: Will restart in %d seconds", LAUNCHD_MIN_JOB_RUN_TIME);
+ launchd_assumes(kevent_mod((uintptr_t)j, EVFILT_TIMER, EV_ADD|EV_ONESHOT,
+ NOTE_SECONDS, LAUNCHD_MIN_JOB_RUN_TIME, j) != -1);
+ return;
+ }
+
+ job_log(j, LOG_DEBUG, "Starting");
+
+ if (!j->legacy_mach_job)
+ sipc = (!SLIST_EMPTY(&j->sockets) || !SLIST_EMPTY(&j->machservices));
+
+ /* FIXME, using stdinpath is a hack for re-reading the conf file */
+ if (j->stdinpath)
+ sipc = true;
+
+ j->checkedin = false;
+
+ if (sipc)
+ socketpair(AF_UNIX, SOCK_STREAM, 0, spair);
+
+ socketpair(AF_UNIX, SOCK_STREAM, 0, execspair);
+
+ time(&j->start_time);
+
+ if (j->bs_port) {
+ launchd_assumes(launchd_mport_notify_req(j->bs_port, MACH_NOTIFY_NO_SENDERS) == KERN_SUCCESS);
+ }
+
+ switch (c = job_fork(j->bs_port ? j : j->parent)) {
+ case -1:
+ job_log_error(j, LOG_ERR, "fork() failed, will try again in one second");
+ launchd_assumes(close(execspair[0]) == 0);
+ launchd_assumes(close(execspair[1]) == 0);
+ if (sipc) {
+ launchd_assumes(close(spair[0]) == 0);
+ launchd_assumes(close(spair[1]) == 0);
+ }
+ break;
+ case 0:
+ launchd_assumes(close(execspair[0]) == 0);
+ /* wait for our parent to say they've attached a kevent to us */
+ read(_fd(execspair[1]), &c, sizeof(c));
+ if (j->firstborn) {
+ setpgid(getpid(), getpid());
+ if (isatty(STDIN_FILENO)) {
+ if (tcsetpgrp(STDIN_FILENO, getpid()) == -1)
+ job_log_error(j, LOG_WARNING, "tcsetpgrp()");
+ }
+ }
+
+ if (sipc) {
+ launchd_assumes(close(spair[0]) == 0);
+ sprintf(nbuf, "%d", spair[1]);
+ setenv(LAUNCHD_TRUSTED_FD_ENV, nbuf, 1);
+ }
+ job_start_child(j, execspair[1]);
+ break;
+ default:
+ if (!SLIST_EMPTY(&j->machservices))
+ j->priv_port_has_senders = true;
+ j->p = c;
+ total_children++;
+ launchd_assumes(close(execspair[1]) == 0);
+ j->execfd = _fd(execspair[0]);
+ if (sipc) {
+ launchd_assumes(close(spair[1]) == 0);
+ ipc_open(_fd(spair[0]), j);
+ }
+ if (kevent_mod(j->execfd, EVFILT_READ, EV_ADD, 0, 0, &j->kqjob_callback) == -1)
+ job_log_error(j, LOG_ERR, "kevent_mod(j->execfd): %m");
+ if (kevent_mod(c, EVFILT_PROC, EV_ADD, NOTE_EXIT, 0, &j->kqjob_callback) == -1) {
+ job_log_error(j, LOG_ERR, "kevent()");
+ job_reap(j);
+ } else {
+ if (j->ondemand)
+ job_ignore(j);
+ }
+
+ if (!j->stall_before_exec) {
+ /* this unblocks the child and avoids a race
+ * between the above fork() and the kevent_mod() */
+ write(j->execfd, &c, sizeof(c));
+ }
+ break;
+ }
+}
+
+void
+job_start_child(struct jobcb *j, int execfd)
+{
+ const char *file2exec = "/usr/libexec/launchproxy";
+ const char **argv;
+ int gflags = GLOB_NOSORT|GLOB_NOCHECK|GLOB_TILDE|GLOB_DOOFFS;
+ glob_t g;
+ int i;
+
+ job_setup_attributes(j);
+
+ if (j->argv && j->globargv) {
+ g.gl_offs = 1;
+ for (i = 0; i < j->argc; i++) {
+ if (i > 0)
+ gflags |= GLOB_APPEND;
+ if (glob(j->argv[i], gflags, NULL, &g) != 0) {
+ job_log_error(j, LOG_ERR, "glob(\"%s\")", j->argv[i]);
+ exit(EXIT_FAILURE);
+ }
+ }
+ g.gl_pathv[0] = (char *)file2exec;
+ argv = (const char **)g.gl_pathv;
+ } else if (j->argv) {
+ argv = alloca((j->argc + 2) * sizeof(char *));
+ argv[0] = file2exec;
+ for (i = 0; i < j->argc; i++)
+ argv[i + 1] = j->argv[i];
+ argv[i + 1] = NULL;
+ } else {
+ argv = alloca(3 * sizeof(char *));
+ argv[0] = file2exec;
+ argv[1] = j->prog;
+ argv[2] = NULL;
+ }
+
+ if (!j->inetcompat)
+ argv++;
+
+ if (j->wait4debugger && ptrace(PT_TRACE_ME, getpid(), NULL, 0) == -1)
+ job_log_error(j, LOG_ERR, "ptrace(PT_TRACE_ME, ...)");
+
+ if (j->force_ppc) {
+ int affinmib[] = { CTL_KERN, KERN_AFFINITY, 1, 1 };
+ size_t mibsz = sizeof(affinmib) / sizeof(affinmib[0]);
+
+ if (sysctl(affinmib, mibsz, NULL, NULL, NULL, 0) == -1)
+ job_log_error(j, LOG_WARNING, "Failed to force PowerPC execution");
+ }
+
+ if (j->prog) {
+ execv(j->inetcompat ? file2exec : j->prog, (char *const*)argv);
+ job_log_error(j, LOG_ERR, "execv(\"%s\", ...)", j->prog);
+ } else {
+ execvp(j->inetcompat ? file2exec : argv[0], (char *const*)argv);
+ job_log_error(j, LOG_ERR, "execvp(\"%s\", ...)", argv[0]);
+ }
+
+ write(execfd, &errno, sizeof(errno));
+ exit(EXIT_FAILURE);
+}
+
+void job_setup_env_from_other_jobs(struct jobcb *j)
+{
+ struct envitem *ei;
+ struct jobcb *ji;
+
+ SLIST_FOREACH(ji, &j->jobs, sle)
+ job_setup_env_from_other_jobs(ji);
+
+ SLIST_FOREACH(ei, &j->global_env, sle)
+ setenv(ei->key, ei->value, 1);
+}
+
+void
+job_setup_attributes(struct jobcb *j)
+{
+ struct limititem *li;
+ struct envitem *ei;
+ struct group *gre = NULL;
+ gid_t gre_g = 0;
+
+ setpriority(PRIO_PROCESS, 0, j->nice);
+
+ SLIST_FOREACH(li, &j->limits, sle) {
+ struct rlimit rl;
+
+ if (getrlimit(li->which, &rl) == -1) {
+ job_log_error(j, LOG_WARNING, "getrlimit()");
+ continue;
+ }
+
+ if (li->sethard)
+ rl.rlim_max = li->lim.rlim_max;
+ if (li->setsoft)
+ rl.rlim_cur = li->lim.rlim_cur;
+
+ if (setrlimit(li->which, &rl) == -1)
+ job_log_error(j, LOG_WARNING, "setrlimit()");
+ }
+
+ if (!j->inetcompat && j->session_create)
+ launchd_SessionCreate();
+
+ if (j->low_pri_io) {
+ int lowprimib[] = { CTL_KERN, KERN_PROC_LOW_PRI_IO };
+ int val = 1;
+
+ if (sysctl(lowprimib, sizeof(lowprimib) / sizeof(lowprimib[0]), NULL, NULL, &val, sizeof(val)) == -1)
+ job_log_error(j, LOG_WARNING, "sysctl(\"%s\")", "kern.proc_low_pri_io");
+ }
+ if (j->rootdir) {
+ chroot(j->rootdir);
+ chdir(".");
+ }
+ if (j->groupname) {
+ gre = getgrnam(j->groupname);
+ if (gre) {
+ gre_g = gre->gr_gid;
+ if (-1 == setgid(gre_g)) {
+ job_log_error(j, LOG_ERR, "setgid(%d)", gre_g);
+ exit(EXIT_FAILURE);
+ }
+ } else {
+ job_log(j, LOG_ERR, "getgrnam(\"%s\") failed", j->groupname);
+ exit(EXIT_FAILURE);
+ }
+ }
+ if (j->username || j->mach_uid) {
+ struct passwd *pwe;
+
+ if (j->username)
+ pwe = getpwnam(j->username);
+ else
+ pwe = getpwuid(j->mach_uid);
+
+ if (pwe) {
+ uid_t pwe_u = pwe->pw_uid;
+ uid_t pwe_g = pwe->pw_gid;
+
+ if (pwe->pw_expire && time(NULL) >= pwe->pw_expire) {
+ job_log(j, LOG_ERR, "expired account: %s", j->username);
+ exit(EXIT_FAILURE);
+ }
+ if (j->init_groups) {
+ if (-1 == initgroups(j->username, gre ? gre_g : pwe_g)) {
+ job_log_error(j, LOG_ERR, "initgroups()");
+ exit(EXIT_FAILURE);
+ }
+ }
+ if (!gre) {
+ if (-1 == setgid(pwe_g)) {
+ job_log_error(j, LOG_ERR, "setgid(%d)", pwe_g);
+ exit(EXIT_FAILURE);
+ }
+ }
+ if (-1 == setuid(pwe_u)) {
+ job_log_error(j, LOG_ERR, "setuid(%d)", pwe_u);
+ exit(EXIT_FAILURE);
+ }
+ } else {
+ if (j->username) {
+ job_log(j, LOG_WARNING, "getpwnam(\"%s\") failed", j->username);
+ } else {
+ job_log(j, LOG_WARNING, "getpwuid(\"%d\") failed", j->mach_uid);
+ }
+ exit(EXIT_FAILURE);
+ }
+ }
+ if (j->workingdir)
+ chdir(j->workingdir);
+ if (j->setmask)
+ umask(j->mask);
+ if (j->stdinpath) {
+ int sifd = open(j->stdinpath, O_RDONLY|O_NOCTTY);
+ if (sifd == -1) {
+ job_log_error(j, LOG_WARNING, "open(\"%s\", ...)", j->stdinpath);
+ } else {
+ launchd_assumes(dup2(sifd, STDIN_FILENO) != -1);
+ launchd_assumes(close(sifd) == 0);
+ }
+ }
+ if (j->stdoutpath) {
+ int sofd = open(j->stdoutpath, O_WRONLY|O_APPEND|O_CREAT|O_NOCTTY, DEFFILEMODE);
+ if (sofd == -1) {
+ job_log_error(j, LOG_WARNING, "open(\"%s\", ...)", j->stdoutpath);
+ } else {
+ launchd_assumes(dup2(sofd, STDOUT_FILENO) != -1);
+ launchd_assumes(close(sofd) == 0);
+ }
+ }
+ if (j->stderrpath) {
+ int sefd = open(j->stderrpath, O_WRONLY|O_APPEND|O_CREAT|O_NOCTTY, DEFFILEMODE);
+ if (sefd == -1) {
+ job_log_error(j, LOG_WARNING, "open(\"%s\", ...)", j->stderrpath);
+ } else {
+ launchd_assumes(dup2(sefd, STDERR_FILENO) != -1);
+ launchd_assumes(close(sefd) == 0);
+ }
+ }
+
+ job_setup_env_from_other_jobs(root_job);
+
+ SLIST_FOREACH(ei, &j->env, sle)
+ setenv(ei->key, ei->value, 1);
+
+ setsid();
+}
+
+int
+dir_has_files(const char *path)
+{
+ DIR *dd = opendir(path);
+ struct dirent *de;
+ bool r = 0;
+
+ if (!dd)
+ return -1;
+
+ while ((de = readdir(dd))) {
+ if (strcmp(de->d_name, ".") && strcmp(de->d_name, "..")) {
+ r = 1;
+ break;
+ }
+ }
+
+ launchd_assumes(closedir(dd) == 0);
+ return r;
+}
+
+void
+calendarinterval_setalarm(struct jobcb *j, struct calendarinterval *ci)
+{
+ time_t later;
+
+ later = cronemu(ci->when.tm_mon, ci->when.tm_mday, ci->when.tm_hour, ci->when.tm_min);
+
+ if (ci->when.tm_wday != -1) {
+ time_t otherlater = cronemu_wday(ci->when.tm_wday, ci->when.tm_hour, ci->when.tm_min);
+
+ if (ci->when.tm_mday == -1) {
+ later = otherlater;
+ } else {
+ later = later < otherlater ? later : otherlater;
+ }
+ }
+
+ if (-1 == kevent_mod((uintptr_t)ci, EVFILT_TIMER, EV_ADD, NOTE_ABSOLUTE|NOTE_SECONDS, later, j)) {
+ job_log_error(j, LOG_ERR, "adding kevent alarm");
+ } else {
+ job_log(j, LOG_INFO, "scheduled to run again at %s", ctime(&later));
+ }
+}
+
+size_t
+job_prep_log_preface(struct jobcb *j, char *buf)
+{
+ size_t lsz = strlen(j->label);
+ char newlabel[lsz * 2 + 1];
+ size_t i, o, r = 0;
+
+ for (i = 0, o = 0; i < lsz; i++, o++) {
+ if (j->label[i] == '%') {
+ newlabel[o] = '%';
+ o++;
+ newlabel[o] = '%';
+ } else {
+ newlabel[o] = j->label[i];
+ }
+ }
+ newlabel[o] = '\0';
+
+ if (j->parent)
+ r = job_prep_log_preface(j->parent, buf);
+
+ return r + sprintf(buf + r, "%s%s", j->parent ? "/" : "", newlabel);
+}
+
+void
+job_log_error(struct jobcb *j, int pri, const char *msg, ...)
+{
+ char newmsg[10000];
+ va_list ap;
+ size_t o;
+
+ o = job_prep_log_preface(j, newmsg);
+
+ sprintf(newmsg + o, ": %s: %s", msg, strerror(errno));
+
+ va_start(ap, msg);
+ vsyslog(pri, newmsg, ap);
+ va_end(ap);
+}
+
+void
+job_log(struct jobcb *j, int pri, const char *msg, ...)
+{
+ char newmsg[10000];
+ va_list ap;
+ size_t o;
+
+ o = job_prep_log_preface(j, newmsg);
+
+ sprintf(newmsg + o, ": %s", msg);
+
+ va_start(ap, msg);
+ vsyslog(pri, newmsg, ap);
+ va_end(ap);
+}
+
+bool
+watchpath_new(struct jobcb *j, const char *name, bool qdir)
+{
+ struct watchpath *wp = calloc(1, sizeof(struct watchpath) + strlen(name) + 1);
+
+ if (!launchd_assumes(wp != NULL))
+ return false;
+
+ wp->is_qdir = qdir;
+
+ wp->fd = -1; /* watchpath_watch() will open this */
+
+ strcpy(wp->name, name);
+
+ SLIST_INSERT_HEAD(&j->vnodes, wp, sle);
+
+ return true;
+}
+
+void
+watchpath_delete(struct jobcb *j, struct watchpath *wp)
+{
+ if (wp->fd != -1)
+ launchd_assumes(close(wp->fd) != -1);
+
+ SLIST_REMOVE(&j->vnodes, wp, watchpath, sle);
+
+ free(wp);
+}
+
+void
+watchpath_ignore(struct jobcb *j, struct watchpath *wp)
+{
+ if (wp->fd != -1) {
+ job_log(j, LOG_DEBUG, "Ignoring Vnode: %d", wp->fd);
+ launchd_assumes(kevent_mod(wp->fd, EVFILT_VNODE, EV_DELETE, 0, 0, NULL) != -1);
+ }
+}
+
+void
+watchpath_watch(struct jobcb *j, struct watchpath *wp)
+{
+ int fflags = NOTE_WRITE|NOTE_EXTEND|NOTE_ATTRIB|NOTE_LINK;
+ int qdir_file_cnt;
+
+ if (!wp->is_qdir)
+ fflags |= NOTE_DELETE|NOTE_RENAME|NOTE_REVOKE;
+
+ if (wp->fd == -1)
+ wp->fd = _fd(open(wp->name, O_EVTONLY|O_NOCTTY|O_NOFOLLOW));
+
+ if (wp->fd == -1)
+ return job_log_error(j, LOG_ERR, "Watchpath monitoring failed on \"%s\"", wp->name);
+
+ job_log(j, LOG_DEBUG, "Watching Vnode: %d", wp->fd);
+ launchd_assumes(kevent_mod(wp->fd, EVFILT_VNODE, EV_ADD|EV_CLEAR, fflags, 0, j) != -1);
+
+ if (!wp->is_qdir)
+ return;
+
+ if (-1 == (qdir_file_cnt = dir_has_files(wp->name))) {
+ job_log_error(j, LOG_ERR, "dir_has_files(\"%s\", ...)", wp->name);
+ } else if (qdir_file_cnt > 0) {
+ job_start(j);
+ }
+}
+
+void
+watchpath_callback(struct jobcb *j, struct kevent *kev)
+{
+ struct watchpath *wp;
+ int dir_file_cnt;
+
+ SLIST_FOREACH(wp, &j->vnodes, sle) {
+ if (wp->fd == (int)kev->ident)
+ break;
+ }
+
+ launchd_assumes(wp != NULL);
+
+ if ((NOTE_DELETE|NOTE_RENAME|NOTE_REVOKE) & kev->fflags) {
+ job_log(j, LOG_DEBUG, "Path invalidated: %s", wp->name);
+ launchd_assumes(close(wp->fd) == 0);
+ wp->fd = -1; /* this will get fixed in watchpath_watch() */
+ } else if (!wp->is_qdir) {
+ job_log(j, LOG_DEBUG, "Watch path modified: %s", wp->name);
+ } else {
+ job_log(j, LOG_DEBUG, "Queue directory modified: %s", wp->name);
+
+ if (-1 == (dir_file_cnt = dir_has_files(wp->name))) {
+ job_log_error(j, LOG_ERR, "dir_has_files(\"%s\", ...)", wp->name);
+ } else if (0 == dir_file_cnt) {
+ job_log(j, LOG_DEBUG, "Spurious wake up, directory is empty again: %s", wp->name);
+ return;
+ }
+ }
+
+ job_start(j);
+}
+
+bool
+calendarinterval_new_from_obj(struct jobcb *j, launch_data_t obj)
+{
+ launch_data_t tmp_k;
+ struct tm tmptm;
+
+ memset(&tmptm, 0, sizeof(0));
+
+ tmptm.tm_min = -1;
+ tmptm.tm_hour = -1;
+ tmptm.tm_mday = -1;
+ tmptm.tm_wday = -1;
+ tmptm.tm_mon = -1;
+
+ if (LAUNCH_DATA_DICTIONARY != launch_data_get_type(obj))
+ return false;
+
+ if ((tmp_k = launch_data_dict_lookup(obj, LAUNCH_JOBKEY_CAL_MINUTE)))
+ tmptm.tm_min = launch_data_get_integer(tmp_k);
+ if ((tmp_k = launch_data_dict_lookup(obj, LAUNCH_JOBKEY_CAL_HOUR)))
+ tmptm.tm_hour = launch_data_get_integer(tmp_k);
+ if ((tmp_k = launch_data_dict_lookup(obj, LAUNCH_JOBKEY_CAL_DAY)))
+ tmptm.tm_mday = launch_data_get_integer(tmp_k);
+ if ((tmp_k = launch_data_dict_lookup(obj, LAUNCH_JOBKEY_CAL_WEEKDAY)))
+ tmptm.tm_wday = launch_data_get_integer(tmp_k);
+ if ((tmp_k = launch_data_dict_lookup(obj, LAUNCH_JOBKEY_CAL_MONTH)))
+ tmptm.tm_mon = launch_data_get_integer(tmp_k);
+
+ return calendarinterval_new(j, &tmptm);
+}
+
+bool
+calendarinterval_new(struct jobcb *j, struct tm *w)
+{
+ struct calendarinterval *ci = calloc(1, sizeof(struct calendarinterval));
+
+ if (!launchd_assumes(ci != NULL))
+ return false;
+
+ ci->when = *w;
+
+ SLIST_INSERT_HEAD(&j->cal_intervals, ci, sle);
+
+ calendarinterval_setalarm(j, ci);
+
+ return true;
+}
+
+void
+calendarinterval_delete(struct jobcb *j, struct calendarinterval *ci)
+{
+ launchd_assumes(kevent_mod((uintptr_t)ci, EVFILT_TIMER, EV_DELETE, 0, 0, NULL) != -1);
+
+ SLIST_REMOVE(&j->cal_intervals, ci, calendarinterval, sle);
+
+ free(ci);
+}
+
+void
+calendarinterval_callback(struct jobcb *j, struct kevent *kev)
+{
+ struct calendarinterval *ci;
+
+ SLIST_FOREACH(ci, &j->cal_intervals, sle) {
+ if ((uintptr_t)ci == kev->ident)
+ break;
+ }
+
+ if (launchd_assumes(ci != NULL)) {
+ calendarinterval_setalarm(j, ci);
+ job_start(j);
+ }
+}
+
+bool
+socketgroup_new(struct jobcb *j, const char *name, int *fds, unsigned int fd_cnt, bool junkfds)
+{
+ struct socketgroup *sg = calloc(1, sizeof(struct socketgroup) + strlen(name) + 1);
+
+ if (!launchd_assumes(sg != NULL))
+ return false;
+
+ sg->fds = calloc(1, fd_cnt * sizeof(int));
+ sg->fd_cnt = fd_cnt;
+ sg->junkfds = junkfds;
+
+ if (!launchd_assumes(sg->fds != NULL)) {
+ free(sg);
+ return false;
+ }
+
+ memcpy(sg->fds, fds, fd_cnt * sizeof(int));
+ strcpy(sg->name, name);
+
+ SLIST_INSERT_HEAD(&j->sockets, sg, sle);
+
+ return true;
+}
+
+void
+socketgroup_delete(struct jobcb *j, struct socketgroup *sg)
+{
+ unsigned int i;
+
+ for (i = 0; i < sg->fd_cnt; i++)
+ launchd_assumes(close(sg->fds[i]) != -1);
+
+ SLIST_REMOVE(&j->sockets, sg, socketgroup, sle);
+
+ free(sg->fds);
+ free(sg);
+}
+
+void
+socketgroup_ignore(struct jobcb *j, struct socketgroup *sg)
+{
+ char buf[10000];
+ unsigned int i, buf_off = 0;
+
+ if (sg->junkfds)
+ return;
+
+ for (i = 0; i < sg->fd_cnt; i++)
+ buf_off += sprintf(buf + buf_off, " %d", sg->fds[i]);
+
+ job_log(j, LOG_DEBUG, "Ignoring Sockets:%s", buf);
+
+ for (i = 0; i < sg->fd_cnt; i++)
+ launchd_assumes(kevent_mod(sg->fds[i], EVFILT_READ, EV_DELETE, 0, 0, NULL) != -1);
+}
+
+void
+socketgroup_watch(struct jobcb *j, struct socketgroup *sg)
+{
+ char buf[10000];
+ unsigned int i, buf_off = 0;
+
+ if (sg->junkfds)
+ return;
+
+ for (i = 0; i < sg->fd_cnt; i++)
+ buf_off += sprintf(buf + buf_off, " %d", sg->fds[i]);
+
+ job_log(j, LOG_DEBUG, "Watching sockets:%s", buf);
+
+ for (i = 0; i < sg->fd_cnt; i++)
+ launchd_assumes(kevent_mod(sg->fds[i], EVFILT_READ, EV_ADD, 0, 0, j) != -1);
+}
+
+void
+socketgroup_callback(struct jobcb *j, struct kevent *kev)
+{
+ job_start(j);
+}
+
+bool
+envitem_new(struct jobcb *j, const char *k, const char *v, bool global)
+{
+ struct envitem *ei = calloc(1, sizeof(struct envitem) + strlen(k) + 1 + strlen(v) + 1);
+
+ if (!launchd_assumes(ei != NULL))
+ return false;
+
+ strcpy(ei->key, k);
+ ei->value = ei->key + strlen(k) + 1;
+ strcpy(ei->value, v);
+
+ if (global) {
+ SLIST_INSERT_HEAD(&j->global_env, ei, sle);
+ } else {
+ SLIST_INSERT_HEAD(&j->env, ei, sle);
+ }
+
+ return true;
+}
+
+void
+envitem_delete(struct jobcb *j, struct envitem *ei, bool global)
+{
+ if (global) {
+ SLIST_REMOVE(&j->global_env, ei, envitem, sle);
+ } else {
+ SLIST_REMOVE(&j->env, ei, envitem, sle);
+ }
+
+ free(ei);
+}
+
+void
+envitem_setup(launch_data_t obj, const char *key, void *context)
+{
+ struct jobcb *j = context;
+
+ if (launch_data_get_type(obj) != LAUNCH_DATA_STRING)
+ return;
+
+ envitem_new(j, key, launch_data_get_string(obj), j->importing_global_env);
+}
+
+bool
+limititem_update(struct jobcb *j, int w, rlim_t r)
+{
+ struct limititem *li;
+
+ SLIST_FOREACH(li, &j->limits, sle) {
+ if (li->which == w)
+ break;
+ }
+
+ if (li == NULL) {
+ li = calloc(1, sizeof(struct limititem));
+
+ if (!launchd_assumes(li != NULL))
+ return false;
+
+ li->which = w;
+ }
+
+ if (j->importing_hard_limits) {
+ li->lim.rlim_max = r;
+ li->sethard = true;
+ } else {
+ li->lim.rlim_cur = r;
+ li->setsoft = true;
+ }
+
+ return true;
+}
+
+void
+limititem_delete(struct jobcb *j, struct limititem *li)
+{
+ SLIST_REMOVE(&j->limits, li, limititem, sle);
+
+ free(li);
+}
+
+void
+limititem_setup(launch_data_t obj, const char *key, void *context)
+{
+ struct jobcb *j = context;
+ int i, limits_cnt = (sizeof(launchd_keys2limits) / sizeof(launchd_keys2limits[0]));
+ rlim_t rl;
+
+ if (launch_data_get_type(obj) != LAUNCH_DATA_INTEGER)
+ return;
+
+ rl = launch_data_get_integer(obj);
+
+ for (i = 0; i < limits_cnt; i++) {
+ if (strcasecmp(launchd_keys2limits[i].key, key) == 0)
+ break;
+ }
+
+ if (i == limits_cnt)
+ return;
+
+ limititem_update(j, launchd_keys2limits[i].val, rl);
+}
+
+bool
+job_useless(struct jobcb *j)
+{
+ if (j->unload_at_exit) {
+ job_log(j, LOG_INFO, "Exited. Was only configured to run once.");
+ return true;
+ } else if (shutdown_in_progress) {
+ job_log(j, LOG_INFO, "Exited while shutdown in progress.");
+ return true;
+ } else if (j->failed_exits >= LAUNCHD_FAILED_EXITS_THRESHOLD) {
+ job_log(j, LOG_WARNING, "too many failures in succession");
+ return true;
+ } else if (!j->checkedin && (!SLIST_EMPTY(&j->sockets) || !SLIST_EMPTY(&j->machservices))) {
+ job_log(j, LOG_WARNING, "Failed to check-in!");
+ return true;
+ } else if (j->legacy_mach_job && SLIST_EMPTY(&j->machservices)) {
+ job_log(j, LOG_INFO, "Garbage collecting");
+ return true;
+ }
+
+ return false;
+}
+
+bool
+job_keepalive(struct jobcb *j)
+{
+ mach_msg_type_number_t statusCnt;
+ mach_port_status_t status;
+ struct semaphoreitem *si;
+ struct machservice *ms;
+ struct stat sb;
+ bool good_exit = (WIFEXITED(j->last_exit_status) && WEXITSTATUS(j->last_exit_status) == 0);
+ bool dispatch_others = false;
+
+ if (j->runatload && j->start_time == 0) {
+ job_log(j, LOG_DEBUG, "KeepAlive check: job needs to run at least once.");
+ return true;
+ }
+
+ if (!j->ondemand) {
+ job_log(j, LOG_DEBUG, "KeepAlive check: job configured to run continuously.");
+ return true;
+ }
+
+ SLIST_FOREACH(ms, &j->machservices, sle) {
+ statusCnt = MACH_PORT_RECEIVE_STATUS_COUNT;
+ if (mach_port_get_attributes(mach_task_self(), ms->port, MACH_PORT_RECEIVE_STATUS,
+ (mach_port_info_t)&status, &statusCnt) != KERN_SUCCESS)
+ continue;
+ if (status.mps_msgcount) {
+ job_log(j, LOG_DEBUG, "KeepAlive check: job restarted due to %d queued Mach messages on service: %s",
+ status.mps_msgcount, ms->name);
+ return true;
+ }
+ }
+
+
+ SLIST_FOREACH(si, &j->semaphores, sle) {
+ bool wanted_state = false;
+ switch (si->why) {
+ case NETWORK_UP:
+ wanted_state = true;
+ case NETWORK_DOWN:
+ if (network_up == wanted_state) {
+ job_log(j, LOG_DEBUG, "KeepAlive check: job configured to run while the network is %s.",
+ wanted_state ? "up" : "down");
+ return true;
+ }
+ break;
+ case SUCCESSFUL_EXIT:
+ wanted_state = true;
+ case FAILED_EXIT:
+ if (good_exit == wanted_state) {
+ job_log(j, LOG_DEBUG, "KeepAlive check: job configured to run while the exit state was %s.",
+ wanted_state ? "successful" : "failure");
+ return true;
+ }
+ break;
+ case PATH_EXISTS:
+ wanted_state = true;
+ case PATH_MISSING:
+ if ((bool)(stat(si->what, &sb) == 0) == wanted_state) {
+ job_log(j, LOG_DEBUG, "KeepAlive check: job configured to run while the following path %s: %s",
+ wanted_state ? "exists" : "is missing", si->what);
+ return true;
+ }
+ dispatch_others = true;
+ break;
+ }
+ }
+
+ /* Maybe another job has the inverse path based semaphore as this job */
+ if (dispatch_others)
+ job_dispatch_all_other_semaphores(root_job, j);
+
+ return false;
+}
+
+const char *
+job_prog(struct jobcb *j)
+{
+ if (j->prog) {
+ return j->prog;
+ } else if (j->argv) {
+ return j->argv[0];
+ } else {
+ return "";
+ }
+}
+
+bool
+job_active(struct jobcb *j)
+{
+ struct machservice *ms;
+
+ if (j->req_port)
+ return true;
+
+ if (j->p)
+ return true;
+
+ if (j->priv_port_has_senders) {
+ if (j->start_time && !j->checkedin) {
+ if (j->legacy_mach_job) {
+ job_log(j, LOG_NOTICE, "Daemonized. Extremely expensive no-op.");
+ } else if (!j->unload_at_exit) {
+ job_log(j, LOG_ERR, "Daemonization is not supported under launchd.");
+ return false;
+ }
+ }
+ return true;
+ }
+
+ SLIST_FOREACH(ms, &j->machservices, sle) {
+ if (ms->isActive)
+ return true;
+ }
+
+ return false;
+}
+
+pid_t
+launchd_fork(void)
+{
+ return job_fork(root_job);
+}
+
+pid_t
+job_fork(struct jobcb *j)
+{
+ mach_port_t p = j->bs_port;
+ pid_t r = -1;
+
+ sigprocmask(SIG_BLOCK, &blocked_signals, NULL);
+
+ launchd_assumes(launchd_mport_make_send(p) == KERN_SUCCESS);
+ launchd_assumes(launchd_set_bport(p) == KERN_SUCCESS);
+ launchd_assumes(launchd_mport_deallocate(p) == KERN_SUCCESS);
+
+ r = fork();
+
+ if (r != 0) {
+ launchd_assumes(launchd_set_bport(MACH_PORT_NULL) == KERN_SUCCESS);
+ } else if (r == 0) {
+ size_t i;
+
+ for (i = 0; i < NSIG; i++) {
+ if (sigismember(&blocked_signals, i))
+ signal(i, SIG_DFL);
+ }
+ }
+
+ sigprocmask(SIG_UNBLOCK, &blocked_signals, NULL);
+
+ return r;
+}
+
+void
+machservice_resetport(struct jobcb *j, struct machservice *ms)
+{
+ launchd_assumes(launchd_mport_close_recv(ms->port) == KERN_SUCCESS);
+ launchd_assumes(launchd_mport_deallocate(ms->port) == KERN_SUCCESS);
+ launchd_assumes(launchd_mport_create_recv(&ms->port) == KERN_SUCCESS);
+ launchd_assumes(launchd_mport_make_send(ms->port) == KERN_SUCCESS);
+}
+
+struct machservice *
+machservice_new(struct jobcb *j, const char *name, mach_port_t *serviceport)
+{
+ struct machservice *ms;
+
+ if ((ms = calloc(1, sizeof(struct machservice) + strlen(name) + 1)) == NULL)
+ return NULL;
+
+ strcpy(ms->name, name);
+ ms->job = j;
+
+ if (*serviceport == MACH_PORT_NULL) {
+ if (!launchd_assumes(launchd_mport_create_recv(&ms->port) == KERN_SUCCESS))
+ goto out_bad;
+
+ if (!launchd_assumes(launchd_mport_make_send(ms->port) == KERN_SUCCESS))
+ goto out_bad2;
+ *serviceport = ms->port;
+ ms->isActive = false;
+ ms->recv = true;
+ } else {
+ ms->port = *serviceport;
+ ms->isActive = true;
+ }
+
+ SLIST_INSERT_HEAD(&j->machservices, ms, sle);
+
+ job_log(j, LOG_INFO, "Mach service added: %s", name);
+
+ return ms;
+out_bad2:
+ launchd_assumes(launchd_mport_close_recv(ms->port) == KERN_SUCCESS);
+out_bad:
+ free(ms);
+ return NULL;
+}
+
+bootstrap_status_t
+machservice_status(struct machservice *ms)
+{
+ if (ms->isActive) {
+ return BOOTSTRAP_STATUS_ACTIVE;
+ } else if (ms->job->ondemand) {
+ return BOOTSTRAP_STATUS_ON_DEMAND;
+ } else {
+ return BOOTSTRAP_STATUS_INACTIVE;
+ }
+}
+
+void
+machservice_setup_options(launch_data_t obj, const char *key, void *context)
+{
+ struct machservice *ms = context;
+ mach_port_t mhp = mach_host_self();
+ mach_port_t mts = mach_task_self();
+ thread_state_flavor_t f = 0;
+ int which_port;
+ bool b;
+
+#if defined (__ppc__)
+ f = PPC_THREAD_STATE64;
+#elif defined(__i386__)
+ f = x86_THREAD_STATE;
+#endif
+
+ if (!launchd_assumes(mhp != MACH_PORT_NULL)) {
+ return;
+ }
+
+ switch (launch_data_get_type(obj)) {
+ case LAUNCH_DATA_INTEGER:
+ which_port = launch_data_get_integer(obj);
+ if (strcasecmp(key, LAUNCH_JOBKEY_MACH_TASKSPECIALPORT) == 0) {
+ launchd_assumes((errno = task_set_special_port(mts, which_port, ms->port)) == KERN_SUCCESS);
+ } else if (strcasecmp(key, LAUNCH_JOBKEY_MACH_HOSTSPECIALPORT) == 0 && getpid() == 1) {
+ launchd_assumes((errno = host_set_special_port(mhp, which_port, ms->port)) == KERN_SUCCESS);
+ }
+ case LAUNCH_DATA_BOOL:
+ b = launch_data_get_bool(obj);
+ if (strcasecmp(key, LAUNCH_JOBKEY_MACH_RESETATCLOSE) == 0) {
+ ms->reset = b;
+ } else if (strcasecmp(key, LAUNCH_JOBKEY_MACH_HIDEUNTILCHECKIN) == 0) {
+ ms->hide = b;
+ } else if (strcasecmp(key, LAUNCH_JOBKEY_MACH_EXCEPTIONSERVER) == 0) {
+ launchd_assumes(task_set_exception_ports(mts, EXC_MASK_ALL, ms->port,
+ EXCEPTION_STATE_IDENTITY, f) == KERN_SUCCESS);
+ } else if (strcasecmp(key, LAUNCH_JOBKEY_MACH_KUNCSERVER) == 0) {
+ ms->kUNCServer = b;
+ launchd_assumes(host_set_UNDServer(mhp, ms->port) == KERN_SUCCESS);
+ }
+ break;
+ default:
+ break;
+ }
+
+ launchd_assumes(launchd_mport_deallocate(mhp) == KERN_SUCCESS);
+}
+
+void
+machservice_setup(launch_data_t obj, const char *key, void *context)
+{
+ struct jobcb *j = context;
+ struct machservice *ms;
+ mach_port_t p = MACH_PORT_NULL;
+
+ if ((ms = job_lookup_service(j->parent, key, false))) {
+ job_log(j, LOG_WARNING, "Conflict with job: %s over Mach service: %s", ms->job->label, key);
+ return;
+ }
+
+ if ((ms = machservice_new(j, key, &p)) == NULL) {
+ job_log_error(j, LOG_WARNING, "Cannot add service: %s", key);
+ return;
+ }
+
+ ms->isActive = false;
+
+ if (launch_data_get_type(obj) == LAUNCH_DATA_DICTIONARY) {
+ launch_data_dict_iterate(obj, machservice_setup_options, ms);
+ }
+}
+
+struct jobcb *
+job_parent(struct jobcb *j)
+{
+ return j->parent;
+}
+
+void
+job_uncork_fork(struct jobcb *j)
+{
+ pid_t c = j->p;
+
+ if (j->stall_before_exec) {
+ job_log(j, LOG_DEBUG, "Uncorking the fork().");
+ /* this unblocks the child and avoids a race
+ * between the above fork() and the kevent_mod() */
+ write(j->execfd, &c, sizeof(c));
+ j->stall_before_exec = false;
+ } else {
+ job_log(j, LOG_WARNING, "Attempt to uncork a job that isn't in the middle of a fork().");
+ }
+}
+
+void
+job_foreach_service(struct jobcb *j, void (*bs_iter)(struct machservice *, void *), void *context, bool include_subjobs)
+{
+ struct machservice *ms;
+ struct jobcb *ji;
+
+ j = job_get_bs(j);
+
+ if (include_subjobs) {
+ SLIST_FOREACH(ji, &j->jobs, sle) {
+ if (ji->req_port)
+ continue;
+
+ SLIST_FOREACH(ms, &ji->machservices, sle)
+ bs_iter(ms, context);
+ }
+ }
+
+ SLIST_FOREACH(ms, &j->machservices, sle)
+ bs_iter(ms, context);
+}
+
+struct jobcb *
+job_new_bootstrap(struct jobcb *p, mach_port_t requestorport, mach_port_t checkin_port)
+{
+ char bslabel[1024] = "100000";
+ struct jobcb *j;
+
+ if (requestorport == MACH_PORT_NULL) {
+ if (p) {
+ job_log(p, LOG_ERR, "Mach sub-bootstrap create request requires a requester port");
+ }
+ return NULL;
+ }
+
+ j = job_new(p, bslabel, NULL, NULL, NULL, requestorport);
+
+ if (j == NULL)
+ return NULL;
+
+ if (checkin_port != MACH_PORT_NULL) {
+ j->bs_port = checkin_port;
+ } else if (!launchd_assumes(launchd_mport_create_recv(&j->bs_port) == KERN_SUCCESS)) {
+ goto out_bad;
+ }
+
+ sprintf(j->label, "%d", MACH_PORT_INDEX(j->bs_port));
+
+ if (!launchd_assumes(launchd_mport_request_callback(j->bs_port, j, true) == KERN_SUCCESS))
+ goto out_bad;
+
+ if (p) {
+ job_log(p, LOG_DEBUG, "Mach sub-bootstrap created: %s", j->label);
+ }
+
+ return j;
+
+out_bad:
+ if (j)
+ job_remove(j);
+ return NULL;
+}
+
+void
+job_delete_anything_with_port(struct jobcb *j, mach_port_t port)
+{
+ struct machservice *ms, *next_ms;
+ struct jobcb *ji, *jn;
+
+ /* Mach ports, unlike Unix descriptors, are reference counted. In other
+ * words, when some program hands us a second or subsequent send right
+ * to a port we already have open, the Mach kernel gives us the same
+ * port number back and increments an reference count associated with
+ * the port. This forces us, when discovering that a receive right at
+ * the other end has been deleted, to wander all of our objects to see
+ * what weird places clients might have handed us the same send right
+ * to use.
+ */
+
+ if (j->req_port == port)
+ return job_remove(j);
+
+ SLIST_FOREACH_SAFE(ji, &j->jobs, sle, jn)
+ job_delete_anything_with_port(ji, port);
+
+ SLIST_FOREACH_SAFE(ms, &j->machservices, sle, next_ms) {
+ if (ms->port == port)
+ machservice_delete(ms);
+ }
+}
+
+struct machservice *
+job_lookup_service(struct jobcb *j, const char *name, bool check_parent)
+{
+ struct machservice *ms;
+ struct jobcb *ji;
+
+ j = job_get_bs(j);
+
+ SLIST_FOREACH(ji, &j->jobs, sle) {
+ if (ji->req_port)
+ continue;
+
+ SLIST_FOREACH(ms, &ji->machservices, sle) {
+ if (strcmp(name, ms->name) == 0)
+ return ms;
+ }
+ }
+
+ SLIST_FOREACH(ms, &j->machservices, sle) {
+ if (strcmp(name, ms->name) == 0)
+ return ms;
+ }
+
+ if (j->parent == NULL)
+ return NULL;
+
+ if (!check_parent)
+ return NULL;
+
+ return job_lookup_service(j->parent, name, true);
+}
+
+mach_port_t
+machservice_port(struct machservice *ms)
+{
+ return ms->port;
+}
+
+struct jobcb *
+machservice_job(struct machservice *ms)
+{
+ return ms->job;
+}
+
+bool
+machservice_hidden(struct machservice *ms)
+{
+ return ms->hide;
+}
+
+bool
+machservice_active(struct machservice *ms)
+{
+ return ms->isActive;
+}
+
+const char *
+machservice_name(struct machservice *ms)
+{
+ return ms->name;
+}
+
+void
+machservice_delete(struct machservice *ms)
+{
+ if (ms->recv) {
+ if (ms->isActive) {
+ /* FIXME we should cancel the notification */
+ } else {
+ launchd_assumes(launchd_mport_close_recv(ms->port) == KERN_SUCCESS);
+ }
+ }
+
+ launchd_assumes(launchd_mport_deallocate(ms->port) == KERN_SUCCESS);
+
+ job_log(ms->job, LOG_INFO, "Mach service deleted: %s", ms->name);
+
+ SLIST_REMOVE(&ms->job->machservices, ms, machservice, sle);
+
+ free(ms);
+}
+
+void
+machservice_watch(struct machservice *ms)
+{
+ mach_msg_id_t which = MACH_NOTIFY_DEAD_NAME;
+
+ ms->isActive = true;
+
+ if (ms->job->req_port == MACH_PORT_NULL) {
+ which = MACH_NOTIFY_PORT_DESTROYED;
+ job_checkin(ms->job);
+ }
+
+ launchd_assumes(launchd_mport_notify_req(ms->port, which) == KERN_SUCCESS);
+}
+
+#define NELEM(x) (sizeof(x)/sizeof(x[0]))
+#define END_OF(x) (&(x)[NELEM(x)])
+
+char **
+mach_cmd2argv(const char *string)
+{
+ char *argv[100], args[1000];
+ const char *cp;
+ char *argp = args, term, **argv_ret, *co;
+ unsigned int nargs = 0, i;
+
+ for (cp = string; *cp;) {
+ while (isspace(*cp))
+ cp++;
+ term = (*cp == '"') ? *cp++ : '\0';
+ if (nargs < NELEM(argv))
+ argv[nargs++] = argp;
+ while (*cp && (term ? *cp != term : !isspace(*cp)) && argp < END_OF(args)) {
+ if (*cp == '\\')
+ cp++;
+ *argp++ = *cp;
+ if (*cp)
+ cp++;
+ }
+ *argp++ = '\0';
+ }
+ argv[nargs] = NULL;
+
+ if (nargs == 0)
+ return NULL;
+
+ argv_ret = malloc((nargs + 1) * sizeof(char *) + strlen(string) + 1);
+
+ if (!launchd_assumes(argv_ret != NULL))
+ return NULL;
+
+ co = (char *)argv_ret + (nargs + 1) * sizeof(char *);
+
+ for (i = 0; i < nargs; i++) {
+ strcpy(co, argv[i]);
+ argv_ret[i] = co;
+ co += strlen(argv[i]) + 1;
+ }
+ argv_ret[i] = NULL;
+
+ return argv_ret;
+}
+
+void
+job_checkin(struct jobcb *j)
+{
+ j->checkedin = true;
+}
+
+bool
+job_ack_port_destruction(struct jobcb *j, mach_port_t p)
+{
+ struct jobcb *ji;
+ struct machservice *ms;
+
+ SLIST_FOREACH(ji, &j->jobs, sle) {
+ if (job_ack_port_destruction(ji, p))
+ return true;
+ }
+
+ SLIST_FOREACH(ms, &j->machservices, sle) {
+ if (ms->port == p)
+ break;
+ }
+
+ if (ms == NULL)
+ return false;
+
+ ms->isActive = false;
+
+ if (ms->reset)
+ machservice_resetport(j, ms);
+
+ job_log(j, LOG_DEBUG, "Receive right returned to us: %s", ms->name);
+
+ job_dispatch(j);
+
+ return true;
+}
+
+void
+job_ack_no_senders(struct jobcb *j)
+{
+ j->priv_port_has_senders = false;
+
+ job_log(j, LOG_DEBUG, "No more senders on privileged Mach bootstrap port");
+
+ job_dispatch(j);
+}
+
+mach_port_t
+job_get_reqport(struct jobcb *j)
+{
+ j->transfer_bstrap = true;
+ gc_this_job = j;
+
+ return j->req_port;
+}
+
+mach_port_t
+job_get_bsport(struct jobcb *j)
+{
+ return j->bs_port;
+}
+
+struct jobcb *
+job_get_bs(struct jobcb *j)
+{
+ if (j->req_port)
+ return j;
+
+ if (launchd_assumes(j->parent != NULL))
+ return j->parent;
+
+ return NULL;
+}
+
+pid_t
+job_get_pid(struct jobcb *j)
+{
+ return j->p;
+}
+
+bool
+semaphoreitem_new(struct jobcb *j, semaphore_reason_t why, const char *what)
+{
+ struct semaphoreitem *si;
+ size_t alloc_sz = sizeof(struct semaphoreitem);
+
+ if (what)
+ alloc_sz += strlen(what) + 1;
+
+ if (!launchd_assumes(si = calloc(1, alloc_sz)))
+ return false;
+
+ si->why = why;
+
+ if (what)
+ strcpy(si->what, what);
+
+ SLIST_INSERT_HEAD(&j->semaphores, si, sle);
+
+ return true;
+}
+
+void
+semaphoreitem_delete(struct jobcb *j, struct semaphoreitem *ri)
+{
+ SLIST_REMOVE(&j->semaphores, ri, semaphoreitem, sle);
+
+ free(ri);
+}
+
+void
+semaphoreitem_setup_paths(launch_data_t obj, const char *key, void *context)
+{
+ struct jobcb *j = context;
+ semaphore_reason_t why;
+
+ why = launch_data_get_bool(obj) ? PATH_EXISTS : PATH_MISSING;
+
+ semaphoreitem_new(j, why, key);
+}
+
+void
+semaphoreitem_setup(launch_data_t obj, const char *key, void *context)
+{
+ struct jobcb *j = context;
+ semaphore_reason_t why;
+
+ if (strcasecmp(key, LAUNCH_JOBKEY_KEEPALIVE_NETWORKSTATE) == 0) {
+ why = launch_data_get_bool(obj) ? NETWORK_UP : NETWORK_DOWN;
+ semaphoreitem_new(j, why, NULL);
+ } else if (strcasecmp(key, LAUNCH_JOBKEY_KEEPALIVE_SUCCESSFULEXIT) == 0) {
+ why = launch_data_get_bool(obj) ? SUCCESSFUL_EXIT : FAILED_EXIT;
+ semaphoreitem_new(j, why, NULL);
+ j->runatload = true;
+ } else if (strcasecmp(key, LAUNCH_JOBKEY_KEEPALIVE_PATHSTATE) == 0 &&
+ launch_data_get_type(obj) == LAUNCH_DATA_DICTIONARY) {
+ launch_data_dict_iterate(obj, semaphoreitem_setup_paths, j);
+ }
+}
+
+void
+job_dispatch_all_other_semaphores(struct jobcb *j, struct jobcb *nj)
+{
+ struct jobcb *ji;
+
+ if (j == nj)
+ return;
+
+ if (!SLIST_EMPTY(&j->semaphores))
+ job_dispatch(j);
+
+ SLIST_FOREACH(ji, &j->jobs, sle)
+ job_dispatch_all_other_semaphores(ji, nj);
+}
+
+time_t
+cronemu(int mon, int mday, int hour, int min)
+{
+ struct tm workingtm;
+ time_t now;
+
+ now = time(NULL);
+ workingtm = *localtime(&now);
+
+ workingtm.tm_isdst = -1;
+ workingtm.tm_sec = 0;
+ workingtm.tm_min++;
+
+ while (!cronemu_mon(&workingtm, mon, mday, hour, min)) {
+ workingtm.tm_year++;
+ workingtm.tm_mon = 0;
+ workingtm.tm_mday = 1;
+ workingtm.tm_hour = 0;
+ workingtm.tm_min = 0;
+ mktime(&workingtm);
+ }
+
+ return mktime(&workingtm);
+}
+
+time_t
+cronemu_wday(int wday, int hour, int min)
+{
+ struct tm workingtm;
+ time_t now;
+
+ now = time(NULL);
+ workingtm = *localtime(&now);
+
+ workingtm.tm_isdst = -1;
+ workingtm.tm_sec = 0;
+ workingtm.tm_min++;
+
+ if (wday == 7)
+ wday = 0;
+
+ while (!(workingtm.tm_wday == wday && cronemu_hour(&workingtm, hour, min))) {
+ workingtm.tm_mday++;
+ workingtm.tm_hour = 0;
+ workingtm.tm_min = 0;
+ mktime(&workingtm);
+ }
+
+ return mktime(&workingtm);
+}
+
+bool
+cronemu_mon(struct tm *wtm, int mon, int mday, int hour, int min)
+{
+ if (mon == -1) {
+ struct tm workingtm = *wtm;
+ int carrytest;
+
+ while (!cronemu_mday(&workingtm, mday, hour, min)) {
+ workingtm.tm_mon++;
+ workingtm.tm_mday = 1;
+ workingtm.tm_hour = 0;
+ workingtm.tm_min = 0;
+ carrytest = workingtm.tm_mon;
+ mktime(&workingtm);
+ if (carrytest != workingtm.tm_mon)
+ return false;
+ }
+ *wtm = workingtm;
+ return true;
+ }
+
+ if (mon < wtm->tm_mon)
+ return false;
+
+ if (mon > wtm->tm_mon) {
+ wtm->tm_mon = mon;
+ wtm->tm_mday = 1;
+ wtm->tm_hour = 0;
+ wtm->tm_min = 0;
+ }
+
+ return cronemu_mday(wtm, mday, hour, min);
+}
+
+bool
+cronemu_mday(struct tm *wtm, int mday, int hour, int min)
+{
+ if (mday == -1) {
+ struct tm workingtm = *wtm;
+ int carrytest;
+
+ while (!cronemu_hour(&workingtm, hour, min)) {
+ workingtm.tm_mday++;
+ workingtm.tm_hour = 0;
+ workingtm.tm_min = 0;
+ carrytest = workingtm.tm_mday;
+ mktime(&workingtm);
+ if (carrytest != workingtm.tm_mday)
+ return false;
+ }
+ *wtm = workingtm;
+ return true;
+ }
+
+ if (mday < wtm->tm_mday)
+ return false;
+
+ if (mday > wtm->tm_mday) {
+ wtm->tm_mday = mday;
+ wtm->tm_hour = 0;
+ wtm->tm_min = 0;
+ }
+
+ return cronemu_hour(wtm, hour, min);
+}
+
+bool
+cronemu_hour(struct tm *wtm, int hour, int min)
+{
+ if (hour == -1) {
+ struct tm workingtm = *wtm;
+ int carrytest;
+
+ while (!cronemu_min(&workingtm, min)) {
+ workingtm.tm_hour++;
+ workingtm.tm_min = 0;
+ carrytest = workingtm.tm_hour;
+ mktime(&workingtm);
+ if (carrytest != workingtm.tm_hour)
+ return false;
+ }
+ *wtm = workingtm;
+ return true;
+ }
+
+ if (hour < wtm->tm_hour)
+ return false;
+
+ if (hour > wtm->tm_hour) {
+ wtm->tm_hour = hour;
+ wtm->tm_min = 0;
+ }
+
+ return cronemu_min(wtm, min);
+}
+
+bool
+cronemu_min(struct tm *wtm, int min)
+{
+ if (min == -1)
+ return true;
+
+ if (min < wtm->tm_min)
+ return false;
+
+ if (min > wtm->tm_min) {
+ wtm->tm_min = min;
+ }
+
+ return true;
+}