atrun.c revision 302408
1185377Ssam/* 2185377Ssam * atrun.c - run jobs queued by at; run with root privileges. 3185377Ssam * Copyright (C) 1993, 1994 Thomas Koenig 4185377Ssam * 5185377Ssam * Redistribution and use in source and binary forms, with or without 6185377Ssam * modification, are permitted provided that the following conditions 7185377Ssam * are met: 8185377Ssam * 1. Redistributions of source code must retain the above copyright 9185377Ssam * notice, this list of conditions and the following disclaimer. 10185377Ssam * 2. The name of the author(s) may not be used to endorse or promote 11185377Ssam * products derived from this software without specific prior written 12185377Ssam * permission. 13185377Ssam * 14185377Ssam * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR 15185377Ssam * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 16185377Ssam * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 17188970Ssam * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT, 18185377Ssam * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 19185377Ssam * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 20185377Ssam * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 21185377Ssam * THEORY OF LIABILITY, WETHER IN CONTRACT, STRICT LIABILITY, OR TORT 22185377Ssam * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 23185377Ssam * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 24185377Ssam */ 25189747Ssam 26189747Ssam#ifndef lint 27185377Ssamstatic const char rcsid[] = 28185377Ssam "$FreeBSD: stable/11/libexec/atrun/atrun.c 295079 2016-01-30 17:54:18Z ngie $"; 29185377Ssam#endif /* not lint */ 30185377Ssam 31185377Ssam/* System Headers */ 32185377Ssam 33188979Ssam#include <sys/fcntl.h> 34189747Ssam#include <sys/file.h> 35189747Ssam#include <sys/types.h> 36189747Ssam#include <sys/stat.h> 37189747Ssam#ifdef __FreeBSD__ 38188979Ssam#include <sys/sysctl.h> 39185377Ssam#endif 40185377Ssam#include <sys/wait.h> 41185377Ssam#include <sys/param.h> 42185377Ssam#include <ctype.h> 43185377Ssam#include <dirent.h> 44185377Ssam#include <err.h> 45185377Ssam#include <grp.h> 46185377Ssam#include <pwd.h> 47185377Ssam#include <signal.h> 48185377Ssam#include <stdarg.h> 49185377Ssam#include <stddef.h> 50185377Ssam#include <stdio.h> 51185377Ssam#include <stdlib.h> 52185377Ssam#include <string.h> 53185377Ssam#include <syslog.h> 54185377Ssam#include <time.h> 55185377Ssam#include <unistd.h> 56185377Ssam#ifdef __FreeBSD__ 57185377Ssam#include <paths.h> 58185377Ssam#else 59185377Ssam#include <getopt.h> 60219979Sadrian#endif 61222276Sadrian#ifdef LOGIN_CAP 62219979Sadrian#include <login_cap.h> 63185377Ssam#endif 64185377Ssam#ifdef PAM 65185377Ssam#include <security/pam_appl.h> 66219393Sadrian#include <security/openpam.h> 67219393Sadrian#endif 68219393Sadrian 69219393Sadrian/* Local headers */ 70219393Sadrian 71219393Sadrian#include "gloadavg.h" 72219393Sadrian#define MAIN 73219393Sadrian#include "privs.h" 74219393Sadrian 75219393Sadrian/* Macros */ 76219393Sadrian 77219393Sadrian#ifndef ATJOB_DIR 78219393Sadrian#define ATJOB_DIR "/usr/spool/atjobs/" 79185377Ssam#endif 80185377Ssam 81185377Ssam#ifndef ATSPOOL_DIR 82185377Ssam#define ATSPOOL_DIR "/usr/spool/atspool/" 83185377Ssam#endif 84185377Ssam 85185377Ssam#ifndef LOADAVG_MX 86185377Ssam#define LOADAVG_MX 1.5 87185377Ssam#endif 88185377Ssam 89185377Ssam/* File scope variables */ 90185377Ssam 91185377Ssamstatic const char * const atrun = "atrun"; /* service name for syslog etc. */ 92185377Ssamstatic int debug = 0; 93185377Ssam 94185377Ssamvoid perr(const char *fmt, ...); 95185377Ssamvoid perrx(const char *fmt, ...); 96185377Ssamstatic void usage(void); 97185377Ssam 98185377Ssam/* Local functions */ 99185377Ssamstatic int 100185377Ssamwrite_string(int fd, const char* a) 101188979Ssam{ 102185377Ssam return write(fd, a, strlen(a)); 103185380Ssam} 104185380Ssam 105185377Ssam#undef DEBUG_FORK 106203930Srpaulo#ifdef DEBUG_FORK 107203930Srpaulostatic pid_t 108185377Ssammyfork(void) 109185377Ssam{ 110185377Ssam pid_t res; 111185377Ssam res = fork(); 112185377Ssam if (res == 0) 113185377Ssam kill(getpid(),SIGSTOP); 114185377Ssam return res; 115217621Sadrian} 116219792Sadrian 117219792Sadrian#define fork myfork 118185377Ssam#endif 119185377Ssam 120224512Sadrianstatic void 121224512Sadrianrun_file(const char *filename, uid_t uid, gid_t gid) 122185377Ssam{ 123185377Ssam/* Run a file by spawning off a process which redirects I/O, 124185377Ssam * spawns a subshell, then waits for it to complete and sends 125185377Ssam * mail to the user. 126217687Sadrian */ 127217687Sadrian pid_t pid; 128217687Sadrian int fd_out, fd_in; 129185377Ssam int queue; 130185377Ssam char mailbuf[MAXLOGNAME], fmt[64]; 131217686Sadrian char *mailname = NULL; 132185377Ssam FILE *stream; 133185377Ssam int send_mail = 0; 134185377Ssam struct stat buf, lbuf; 135185377Ssam off_t size; 136185377Ssam struct passwd *pentry; 137185377Ssam int fflags; 138185377Ssam long nuid; 139225444Sadrian long ngid; 140185377Ssam#ifdef PAM 141185377Ssam pam_handle_t *pamh = NULL; 142185377Ssam int pam_err; 143185377Ssam struct pam_conv pamc = { 144185377Ssam .conv = openpam_nullconv, 145222644Sadrian .appdata_ptr = NULL 146185377Ssam }; 147185377Ssam#endif 148185377Ssam 149185377Ssam PRIV_START 150222584Sadrian 151222584Sadrian if (chmod(filename, S_IRUSR) != 0) 152222584Sadrian { 153222815Sadrian perr("cannot change file permissions"); 154224709Sadrian } 155222584Sadrian 156185377Ssam PRIV_END 157185377Ssam 158185377Ssam pid = fork(); 159185377Ssam if (pid == -1) 160185377Ssam perr("cannot fork"); 161185377Ssam 162185377Ssam else if (pid != 0) 163185377Ssam return; 164225444Sadrian 165185377Ssam /* Let's see who we mail to. Hopefully, we can read it from 166218066Sadrian * the command file; if not, send it to the owner, or, failing that, 167185377Ssam * to root. 168185377Ssam */ 169185377Ssam 170185377Ssam pentry = getpwuid(uid); 171226767Sadrian if (pentry == NULL) 172185377Ssam perrx("Userid %lu not found - aborting job %s", 173226767Sadrian (unsigned long) uid, filename); 174185377Ssam 175185377Ssam#ifdef PAM 176185377Ssam PRIV_START 177185377Ssam 178185377Ssam pam_err = pam_start(atrun, pentry->pw_name, &pamc, &pamh); 179185377Ssam if (pam_err != PAM_SUCCESS) 180185377Ssam perrx("cannot start PAM: %s", pam_strerror(pamh, pam_err)); 181185377Ssam 182185377Ssam pam_err = pam_acct_mgmt(pamh, PAM_SILENT); 183185377Ssam /* Expired password shouldn't prevent the job from running. */ 184185377Ssam if (pam_err != PAM_SUCCESS && pam_err != PAM_NEW_AUTHTOK_REQD) 185185377Ssam perrx("Account %s (userid %lu) unavailable for job %s: %s", 186185377Ssam pentry->pw_name, (unsigned long)uid, 187185377Ssam filename, pam_strerror(pamh, pam_err)); 188185377Ssam 189185377Ssam pam_end(pamh, pam_err); 190185377Ssam 191185377Ssam PRIV_END 192185377Ssam#endif /* PAM */ 193219393Sadrian 194189747Ssam PRIV_START 195189747Ssam 196219393Sadrian stream=fopen(filename, "r"); 197220990Sadrian 198220990Sadrian PRIV_END 199220990Sadrian 200219480Sadrian if (stream == NULL) 201219480Sadrian perr("cannot open input file %s", filename); 202219480Sadrian 203219393Sadrian if ((fd_in = dup(fileno(stream))) <0) 204219393Sadrian perr("error duplicating input file descriptor"); 205219393Sadrian 206219393Sadrian if (fstat(fd_in, &buf) == -1) 207219393Sadrian perr("error in fstat of input file descriptor"); 208185377Ssam 209185377Ssam if (lstat(filename, &lbuf) == -1) 210185377Ssam perr("error in fstat of input file"); 211185377Ssam 212185377Ssam if (S_ISLNK(lbuf.st_mode)) 213218763Sadrian perrx("Symbolic link encountered in job %s - aborting", filename); 214218763Sadrian 215222276Sadrian if ((lbuf.st_dev != buf.st_dev) || (lbuf.st_ino != buf.st_ino) || 216222265Sadrian (lbuf.st_uid != buf.st_uid) || (lbuf.st_gid != buf.st_gid) || 217222265Sadrian (lbuf.st_size!=buf.st_size)) 218222265Sadrian perrx("Somebody changed files from under us for job %s - aborting", 219185377Ssam filename); 220185377Ssam 221188971Ssam if (buf.st_nlink > 1) 222188971Ssam perrx("Somebody is trying to run a linked script for job %s", filename); 223188971Ssam 224188971Ssam if ((fflags = fcntl(fd_in, F_GETFD)) <0) 225188971Ssam perr("error in fcntl"); 226188971Ssam 227188971Ssam fcntl(fd_in, F_SETFD, fflags & ~FD_CLOEXEC); 228188971Ssam 229188971Ssam snprintf(fmt, sizeof(fmt), 230188971Ssam "#!/bin/sh\n# atrun uid=%%ld gid=%%ld\n# mail %%%ds %%d", 231188971Ssam MAXLOGNAME - 1); 232188971Ssam 233188971Ssam if (fscanf(stream, fmt, &nuid, &ngid, mailbuf, &send_mail) != 4) 234188971Ssam perrx("File %s is in wrong format - aborting", filename); 235188971Ssam 236185377Ssam if (mailbuf[0] == '-') 237185377Ssam perrx("Illegal mail name %s in %s", mailbuf, filename); 238185377Ssam 239188972Ssam mailname = mailbuf; 240185377Ssam 241217624Sadrian if (nuid != uid) 242217624Sadrian perrx("Job %s - userid %ld does not match file uid %lu", 243185377Ssam filename, nuid, (unsigned long)uid); 244185377Ssam 245185377Ssam if (ngid != gid) 246185377Ssam perrx("Job %s - groupid %ld does not match file gid %lu", 247185377Ssam filename, ngid, (unsigned long)gid); 248185377Ssam 249185377Ssam fclose(stream); 250185377Ssam 251225883Sadrian if (chdir(ATSPOOL_DIR) < 0) 252185377Ssam perr("cannot chdir to %s", ATSPOOL_DIR); 253185377Ssam 254185377Ssam /* Create a file to hold the output of the job we are about to run. 255185377Ssam * Write the mail header. 256185377Ssam */ 257185377Ssam if((fd_out=open(filename, 258185377Ssam O_WRONLY | O_CREAT | O_EXCL, S_IWUSR | S_IRUSR)) < 0) 259185377Ssam perr("cannot create output file"); 260225883Sadrian 261185377Ssam write_string(fd_out, "Subject: Output from your job "); 262185377Ssam write_string(fd_out, filename); 263185377Ssam write_string(fd_out, "\n\n"); 264185377Ssam fstat(fd_out, &buf); 265185377Ssam size = buf.st_size; 266185377Ssam 267185377Ssam close(STDIN_FILENO); 268185377Ssam close(STDOUT_FILENO); 269185377Ssam close(STDERR_FILENO); 270185377Ssam 271185377Ssam pid = fork(); 272185377Ssam if (pid < 0) 273185377Ssam perr("error in fork"); 274185377Ssam 275185377Ssam else if (pid == 0) 276185377Ssam { 277185377Ssam char *nul = NULL; 278185377Ssam char **nenvp = &nul; 279185377Ssam 280185377Ssam /* Set up things for the child; we want standard input from the input file, 281185377Ssam * and standard output and error sent to our output file. 282185377Ssam */ 283185377Ssam 284185377Ssam if (lseek(fd_in, (off_t) 0, SEEK_SET) < 0) 285188979Ssam perr("error in lseek"); 286185377Ssam 287185377Ssam if (dup(fd_in) != STDIN_FILENO) 288185377Ssam perr("error in I/O redirection"); 289185377Ssam 290185377Ssam if (dup(fd_out) != STDOUT_FILENO) 291185377Ssam perr("error in I/O redirection"); 292185377Ssam 293185377Ssam if (dup(fd_out) != STDERR_FILENO) 294185377Ssam perr("error in I/O redirection"); 295185377Ssam 296185377Ssam close(fd_in); 297185377Ssam close(fd_out); 298185377Ssam if (chdir(ATJOB_DIR) < 0) 299185377Ssam perr("cannot chdir to %s", ATJOB_DIR); 300219840Sadrian 301219839Sadrian queue = *filename; 302185377Ssam 303185377Ssam PRIV_START 304185377Ssam 305185377Ssam nice(tolower(queue) - 'a'); 306185377Ssam 307185377Ssam#ifdef LOGIN_CAP 308185377Ssam /* 309185377Ssam * For simplicity and safety, set all aspects of the user context 310185377Ssam * except for a selected subset: Don't set priority, which was 311185377Ssam * set based on the queue file name according to the tradition. 312188979Ssam * Don't bother to set environment, including path vars, either 313188979Ssam * because it will be discarded anyway. Although the job file 314188979Ssam * should set umask, preset it here just in case. 315188973Ssam */ 316188973Ssam if (setusercontext(NULL, pentry, uid, LOGIN_SETALL & 317188973Ssam ~(LOGIN_SETPRIORITY | LOGIN_SETPATH | LOGIN_SETENV)) != 0) 318188973Ssam exit(EXIT_FAILURE); /* setusercontext() logged the error */ 319185377Ssam#else /* LOGIN_CAP */ 320185377Ssam if (initgroups(pentry->pw_name,pentry->pw_gid)) 321185377Ssam perr("cannot init group access list"); 322185377Ssam 323185377Ssam if (setgid(gid) < 0 || setegid(pentry->pw_gid) < 0) 324185377Ssam perr("cannot change group"); 325185377Ssam 326185377Ssam if (setlogin(pentry->pw_name)) 327185377Ssam perr("cannot set login name"); 328185377Ssam 329185377Ssam if (setuid(uid) < 0 || seteuid(uid) < 0) 330185377Ssam perr("cannot set user id"); 331185377Ssam#endif /* LOGIN_CAP */ 332185377Ssam 333185377Ssam if (chdir(pentry->pw_dir)) 334185377Ssam chdir("/"); 335185377Ssam 336185377Ssam if(execle("/bin/sh","sh",(char *) NULL, nenvp) != 0) 337185377Ssam perr("exec failed for /bin/sh"); 338185377Ssam 339185377Ssam PRIV_END 340185377Ssam } 341185377Ssam /* We're the parent. Let's wait. 342185377Ssam */ 343185377Ssam close(fd_in); 344185377Ssam close(fd_out); 345185377Ssam waitpid(pid, (int *) NULL, 0); 346185377Ssam 347185377Ssam /* Send mail. Unlink the output file first, so it is deleted after 348185377Ssam * the run. 349185377Ssam */ 350185377Ssam stat(filename, &buf); 351185377Ssam if (open(filename, O_RDONLY) != STDIN_FILENO) 352185377Ssam perr("open of jobfile failed"); 353185377Ssam 354185377Ssam unlink(filename); 355185377Ssam if ((buf.st_size != size) || send_mail) 356185377Ssam { 357185377Ssam PRIV_START 358185377Ssam 359185377Ssam#ifdef LOGIN_CAP 360185377Ssam /* 361185377Ssam * This time set full context to run the mailer. 362185377Ssam */ 363185377Ssam if (setusercontext(NULL, pentry, uid, LOGIN_SETALL) != 0) 364185377Ssam exit(EXIT_FAILURE); /* setusercontext() logged the error */ 365185377Ssam#else /* LOGIN_CAP */ 366185377Ssam if (initgroups(pentry->pw_name,pentry->pw_gid)) 367185377Ssam perr("cannot init group access list"); 368185377Ssam 369185377Ssam if (setgid(gid) < 0 || setegid(pentry->pw_gid) < 0) 370185377Ssam perr("cannot change group"); 371185377Ssam 372185377Ssam if (setlogin(pentry->pw_name)) 373185377Ssam perr("cannot set login name"); 374185377Ssam 375185377Ssam if (setuid(uid) < 0 || seteuid(uid) < 0) 376185377Ssam perr("cannot set user id"); 377185377Ssam#endif /* LOGIN_CAP */ 378185377Ssam 379185377Ssam if (chdir(pentry->pw_dir)) 380185377Ssam chdir("/"); 381185377Ssam 382185377Ssam#ifdef __FreeBSD__ 383185377Ssam execl(_PATH_SENDMAIL, "sendmail", "-F", "Atrun Service", 384185377Ssam "-odi", "-oem", 385185377Ssam mailname, (char *) NULL); 386185377Ssam#else 387185377Ssam execl(MAIL_CMD, MAIL_CMD, mailname, (char *) NULL); 388185377Ssam#endif 389185377Ssam perr("exec failed for mail command"); 390221596Sadrian 391221596Sadrian PRIV_END 392185377Ssam } 393185377Ssam exit(EXIT_SUCCESS); 394185377Ssam} 395185377Ssam 396185377Ssam/* Global functions */ 397185380Ssam 398185377Ssam/* Needed in gloadavg.c */ 399185377Ssamvoid 400219771Sadrianperr(const char *fmt, ...) 401185377Ssam{ 402185377Ssam const char * const fmtadd = ": %m"; 403185377Ssam char nfmt[strlen(fmt) + strlen(fmtadd) + 1]; 404185377Ssam va_list ap; 405185377Ssam 406185377Ssam va_start(ap, fmt); 407185377Ssam if (debug) 408185377Ssam { 409185377Ssam vwarn(fmt, ap); 410218068Sadrian } 411218068Sadrian else 412218068Sadrian { 413218068Sadrian snprintf(nfmt, sizeof(nfmt), "%s%s", fmt, fmtadd); 414218068Sadrian vsyslog(LOG_ERR, nfmt, ap); 415218068Sadrian } 416218068Sadrian va_end(ap); 417218068Sadrian 418203882Srpaulo exit(EXIT_FAILURE); 419185377Ssam} 420185377Ssam 421185377Ssamvoid 422185377Ssamperrx(const char *fmt, ...) 423185377Ssam{ 424185377Ssam va_list ap; 425185377Ssam 426185377Ssam va_start(ap, fmt); 427185377Ssam if (debug) 428185377Ssam vwarnx(fmt, ap); 429185377Ssam else 430185377Ssam vsyslog(LOG_ERR, fmt, ap); 431185377Ssam va_end(ap); 432185377Ssam 433185377Ssam exit(EXIT_FAILURE); 434185377Ssam} 435185377Ssam 436185377Ssamint 437185377Ssammain(int argc, char *argv[]) 438185377Ssam{ 439221777Sadrian/* Browse through ATJOB_DIR, checking all the jobfiles wether they should 440221777Sadrian * be executed and or deleted. The queue is coded into the first byte of 441221777Sadrian * the job filename, the date (in minutes since Eon) as a hex number in the 442221777Sadrian * following eight bytes, followed by a dot and a serial number. A file 443221777Sadrian * which has not been executed yet is denoted by its execute - bit set. 444221777Sadrian * For those files which are to be executed, run_file() is called, which forks 445185380Ssam * off a child which takes care of I/O redirection, forks off another child 446185377Ssam * for execution and yet another one, optionally, for sending mail. 447185377Ssam * Files which already have run are removed during the next invocation. 448185377Ssam */ 449185377Ssam DIR *spool; 450185377Ssam struct dirent *dirent; 451185377Ssam struct stat buf; 452185377Ssam unsigned long ctm; 453188979Ssam unsigned long jobno; 454188979Ssam char queue; 455188979Ssam time_t now, run_time; 456188979Ssam char batch_name[] = "Z2345678901234"; 457188979Ssam uid_t batch_uid; 458188979Ssam gid_t batch_gid; 459188979Ssam int c; 460188979Ssam int run_batch; 461188979Ssam#ifdef __FreeBSD__ 462188979Ssam size_t ncpusz; 463188979Ssam double load_avg = -1; 464188979Ssam int ncpu; 465188979Ssam#else 466188979Ssam double load_avg = LOADAVG_MX; 467188979Ssam#endif 468188979Ssam 469188979Ssam/* We don't need root privileges all the time; running under uid and gid daemon 470188979Ssam * is fine. 471188979Ssam */ 472188979Ssam 473189747Ssam RELINQUISH_PRIVS_ROOT(DAEMON_UID, DAEMON_GID) 474189747Ssam 475189747Ssam openlog(atrun, LOG_PID, LOG_CRON); 476189747Ssam 477189747Ssam opterr = 0; 478189747Ssam while((c=getopt(argc, argv, "dl:"))!= -1) 479189747Ssam { 480189747Ssam switch (c) 481189747Ssam { 482189747Ssam case 'l': 483189747Ssam if (sscanf(optarg, "%lf", &load_avg) != 1) 484189747Ssam perr("garbled option -l"); 485189747Ssam#ifndef __FreeBSD__ 486189747Ssam if (load_avg <= 0.) 487189747Ssam load_avg = LOADAVG_MX; 488189747Ssam#endif 489189747Ssam break; 490189747Ssam 491189747Ssam case 'd': 492189747Ssam debug ++; 493189747Ssam break; 494189747Ssam 495189747Ssam case '?': 496189747Ssam default: 497189747Ssam usage(); 498189747Ssam } 499189747Ssam } 500189747Ssam 501189747Ssam if (chdir(ATJOB_DIR) != 0) 502189747Ssam perr("cannot change to %s", ATJOB_DIR); 503189747Ssam 504189747Ssam#ifdef __FreeBSD__ 505219863Sadrian if (load_avg <= 0.) { 506189747Ssam ncpusz = sizeof(size_t); 507219863Sadrian if (sysctlbyname("hw.ncpu", &ncpu, &ncpusz, NULL, 0) < 0) 508219863Sadrian ncpu = 1; 509219863Sadrian load_avg = LOADAVG_MX * ncpu; 510189747Ssam } 511189747Ssam#endif 512189747Ssam 513189747Ssam /* Main loop. Open spool directory for reading and look over all the 514189747Ssam * files in there. If the filename indicates that the job should be run 515189747Ssam * and the x bit is set, fork off a child which sets its user and group 516189747Ssam * id to that of the files and exec a /bin/sh which executes the shell 517189747Ssam * script. Unlink older files if they should no longer be run. For 518189747Ssam * deletion, their r bit has to be turned on. 519189747Ssam * 520189747Ssam * Also, pick the oldest batch job to run, at most one per invocation of 521189747Ssam * atrun. 522189747Ssam */ 523185377Ssam if ((spool = opendir(".")) == NULL) 524189747Ssam perr("cannot read %s", ATJOB_DIR); 525189747Ssam 526189747Ssam if (flock(dirfd(spool), LOCK_EX) == -1) 527189747Ssam perr("cannot lock %s", ATJOB_DIR); 528189747Ssam 529189747Ssam now = time(NULL); 530189747Ssam run_batch = 0; 531189747Ssam batch_uid = (uid_t) -1; 532189747Ssam batch_gid = (gid_t) -1; 533189747Ssam 534189747Ssam while ((dirent = readdir(spool)) != NULL) { 535189747Ssam if (stat(dirent->d_name,&buf) != 0) 536189747Ssam perr("cannot stat in %s", ATJOB_DIR); 537189747Ssam 538189747Ssam /* We don't want directories 539189747Ssam */ 540189747Ssam if (!S_ISREG(buf.st_mode)) 541189747Ssam continue; 542189747Ssam 543189747Ssam if (sscanf(dirent->d_name,"%c%5lx%8lx",&queue,&jobno,&ctm) != 3) 544189747Ssam continue; 545189747Ssam 546189747Ssam run_time = (time_t) ctm*60; 547189747Ssam 548189747Ssam if ((S_IXUSR & buf.st_mode) && (run_time <=now)) { 549189747Ssam if (isupper(queue) && (strcmp(batch_name,dirent->d_name) > 0)) { 550189747Ssam run_batch = 1; 551189747Ssam strlcpy(batch_name, dirent->d_name, sizeof(batch_name)); 552189747Ssam batch_uid = buf.st_uid; 553189747Ssam batch_gid = buf.st_gid; 554189747Ssam } 555189747Ssam 556189747Ssam /* The file is executable and old enough 557189747Ssam */ 558189747Ssam if (islower(queue)) 559189747Ssam run_file(dirent->d_name, buf.st_uid, buf.st_gid); 560189747Ssam } 561189747Ssam /* Delete older files 562189747Ssam */ 563189747Ssam if ((run_time < now) && !(S_IXUSR & buf.st_mode) && (S_IRUSR & buf.st_mode)) 564189747Ssam unlink(dirent->d_name); 565189747Ssam } 566189747Ssam /* run the single batch file, if any 567189747Ssam */ 568189747Ssam if (run_batch && (gloadavg() < load_avg)) 569189747Ssam run_file(batch_name, batch_uid, batch_gid); 570189747Ssam 571189747Ssam if (flock(dirfd(spool), LOCK_UN) == -1) 572189747Ssam perr("cannot unlock %s", ATJOB_DIR); 573189747Ssam 574189747Ssam if (closedir(spool) == -1) 575189747Ssam perr("cannot closedir %s", ATJOB_DIR); 576189747Ssam 577189747Ssam closelog(); 578189747Ssam exit(EXIT_SUCCESS); 579189747Ssam} 580189747Ssam 581189747Ssamstatic void 582189747Ssamusage(void) 583189747Ssam{ 584189747Ssam if (debug) 585189747Ssam fprintf(stderr, "usage: atrun [-l load_avg] [-d]\n"); 586189747Ssam else 587189747Ssam syslog(LOG_ERR, "usage: atrun [-l load_avg] [-d]"); 588189747Ssam 589189747Ssam exit(EXIT_FAILURE); 590189747Ssam} 591189747Ssam