atrun.c revision 302408
1185377Ssam/*
2185377Ssam *  atrun.c - run jobs queued by at; run with root privileges.
3185377Ssam *  Copyright (C) 1993, 1994 Thomas Koenig
4185377Ssam *
5185377Ssam * Redistribution and use in source and binary forms, with or without
6185377Ssam * modification, are permitted provided that the following conditions
7185377Ssam * are met:
8185377Ssam * 1. Redistributions of source code must retain the above copyright
9185377Ssam *    notice, this list of conditions and the following disclaimer.
10185377Ssam * 2. The name of the author(s) may not be used to endorse or promote
11185377Ssam *    products derived from this software without specific prior written
12185377Ssam *    permission.
13185377Ssam *
14185377Ssam * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
15185377Ssam * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16185377Ssam * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17188970Ssam * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
18185377Ssam * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19185377Ssam * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20185377Ssam * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21185377Ssam * THEORY OF LIABILITY, WETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22185377Ssam * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23185377Ssam * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24185377Ssam */
25189747Ssam
26189747Ssam#ifndef lint
27185377Ssamstatic const char rcsid[] =
28185377Ssam  "$FreeBSD: stable/11/libexec/atrun/atrun.c 295079 2016-01-30 17:54:18Z ngie $";
29185377Ssam#endif /* not lint */
30185377Ssam
31185377Ssam/* System Headers */
32185377Ssam
33188979Ssam#include <sys/fcntl.h>
34189747Ssam#include <sys/file.h>
35189747Ssam#include <sys/types.h>
36189747Ssam#include <sys/stat.h>
37189747Ssam#ifdef __FreeBSD__
38188979Ssam#include <sys/sysctl.h>
39185377Ssam#endif
40185377Ssam#include <sys/wait.h>
41185377Ssam#include <sys/param.h>
42185377Ssam#include <ctype.h>
43185377Ssam#include <dirent.h>
44185377Ssam#include <err.h>
45185377Ssam#include <grp.h>
46185377Ssam#include <pwd.h>
47185377Ssam#include <signal.h>
48185377Ssam#include <stdarg.h>
49185377Ssam#include <stddef.h>
50185377Ssam#include <stdio.h>
51185377Ssam#include <stdlib.h>
52185377Ssam#include <string.h>
53185377Ssam#include <syslog.h>
54185377Ssam#include <time.h>
55185377Ssam#include <unistd.h>
56185377Ssam#ifdef __FreeBSD__
57185377Ssam#include <paths.h>
58185377Ssam#else
59185377Ssam#include <getopt.h>
60219979Sadrian#endif
61222276Sadrian#ifdef LOGIN_CAP
62219979Sadrian#include <login_cap.h>
63185377Ssam#endif
64185377Ssam#ifdef PAM
65185377Ssam#include <security/pam_appl.h>
66219393Sadrian#include <security/openpam.h>
67219393Sadrian#endif
68219393Sadrian
69219393Sadrian/* Local headers */
70219393Sadrian
71219393Sadrian#include "gloadavg.h"
72219393Sadrian#define MAIN
73219393Sadrian#include "privs.h"
74219393Sadrian
75219393Sadrian/* Macros */
76219393Sadrian
77219393Sadrian#ifndef ATJOB_DIR
78219393Sadrian#define ATJOB_DIR "/usr/spool/atjobs/"
79185377Ssam#endif
80185377Ssam
81185377Ssam#ifndef ATSPOOL_DIR
82185377Ssam#define ATSPOOL_DIR "/usr/spool/atspool/"
83185377Ssam#endif
84185377Ssam
85185377Ssam#ifndef LOADAVG_MX
86185377Ssam#define LOADAVG_MX 1.5
87185377Ssam#endif
88185377Ssam
89185377Ssam/* File scope variables */
90185377Ssam
91185377Ssamstatic const char * const atrun = "atrun"; /* service name for syslog etc. */
92185377Ssamstatic int debug = 0;
93185377Ssam
94185377Ssamvoid perr(const char *fmt, ...);
95185377Ssamvoid perrx(const char *fmt, ...);
96185377Ssamstatic void usage(void);
97185377Ssam
98185377Ssam/* Local functions */
99185377Ssamstatic int
100185377Ssamwrite_string(int fd, const char* a)
101188979Ssam{
102185377Ssam    return write(fd, a, strlen(a));
103185380Ssam}
104185380Ssam
105185377Ssam#undef DEBUG_FORK
106203930Srpaulo#ifdef DEBUG_FORK
107203930Srpaulostatic pid_t
108185377Ssammyfork(void)
109185377Ssam{
110185377Ssam	pid_t res;
111185377Ssam	res = fork();
112185377Ssam	if (res == 0)
113185377Ssam	    kill(getpid(),SIGSTOP);
114185377Ssam	return res;
115217621Sadrian}
116219792Sadrian
117219792Sadrian#define fork myfork
118185377Ssam#endif
119185377Ssam
120224512Sadrianstatic void
121224512Sadrianrun_file(const char *filename, uid_t uid, gid_t gid)
122185377Ssam{
123185377Ssam/* Run a file by spawning off a process which redirects I/O,
124185377Ssam * spawns a subshell, then waits for it to complete and sends
125185377Ssam * mail to the user.
126217687Sadrian */
127217687Sadrian    pid_t pid;
128217687Sadrian    int fd_out, fd_in;
129185377Ssam    int queue;
130185377Ssam    char mailbuf[MAXLOGNAME], fmt[64];
131217686Sadrian    char *mailname = NULL;
132185377Ssam    FILE *stream;
133185377Ssam    int send_mail = 0;
134185377Ssam    struct stat buf, lbuf;
135185377Ssam    off_t size;
136185377Ssam    struct passwd *pentry;
137185377Ssam    int fflags;
138185377Ssam    long nuid;
139225444Sadrian    long ngid;
140185377Ssam#ifdef PAM
141185377Ssam    pam_handle_t *pamh = NULL;
142185377Ssam    int pam_err;
143185377Ssam    struct pam_conv pamc = {
144185377Ssam	.conv = openpam_nullconv,
145222644Sadrian	.appdata_ptr = NULL
146185377Ssam    };
147185377Ssam#endif
148185377Ssam
149185377Ssam    PRIV_START
150222584Sadrian
151222584Sadrian    if (chmod(filename, S_IRUSR) != 0)
152222584Sadrian    {
153222815Sadrian	perr("cannot change file permissions");
154224709Sadrian    }
155222584Sadrian
156185377Ssam    PRIV_END
157185377Ssam
158185377Ssam    pid = fork();
159185377Ssam    if (pid == -1)
160185377Ssam	perr("cannot fork");
161185377Ssam
162185377Ssam    else if (pid != 0)
163185377Ssam	return;
164225444Sadrian
165185377Ssam    /* Let's see who we mail to.  Hopefully, we can read it from
166218066Sadrian     * the command file; if not, send it to the owner, or, failing that,
167185377Ssam     * to root.
168185377Ssam     */
169185377Ssam
170185377Ssam    pentry = getpwuid(uid);
171226767Sadrian    if (pentry == NULL)
172185377Ssam	perrx("Userid %lu not found - aborting job %s",
173226767Sadrian		(unsigned long) uid, filename);
174185377Ssam
175185377Ssam#ifdef PAM
176185377Ssam    PRIV_START
177185377Ssam
178185377Ssam    pam_err = pam_start(atrun, pentry->pw_name, &pamc, &pamh);
179185377Ssam    if (pam_err != PAM_SUCCESS)
180185377Ssam	perrx("cannot start PAM: %s", pam_strerror(pamh, pam_err));
181185377Ssam
182185377Ssam    pam_err = pam_acct_mgmt(pamh, PAM_SILENT);
183185377Ssam    /* Expired password shouldn't prevent the job from running. */
184185377Ssam    if (pam_err != PAM_SUCCESS && pam_err != PAM_NEW_AUTHTOK_REQD)
185185377Ssam	perrx("Account %s (userid %lu) unavailable for job %s: %s",
186185377Ssam	    pentry->pw_name, (unsigned long)uid,
187185377Ssam	    filename, pam_strerror(pamh, pam_err));
188185377Ssam
189185377Ssam    pam_end(pamh, pam_err);
190185377Ssam
191185377Ssam    PRIV_END
192185377Ssam#endif /* PAM */
193219393Sadrian
194189747Ssam    PRIV_START
195189747Ssam
196219393Sadrian    stream=fopen(filename, "r");
197220990Sadrian
198220990Sadrian    PRIV_END
199220990Sadrian
200219480Sadrian    if (stream == NULL)
201219480Sadrian	perr("cannot open input file %s", filename);
202219480Sadrian
203219393Sadrian    if ((fd_in = dup(fileno(stream))) <0)
204219393Sadrian	perr("error duplicating input file descriptor");
205219393Sadrian
206219393Sadrian    if (fstat(fd_in, &buf) == -1)
207219393Sadrian	perr("error in fstat of input file descriptor");
208185377Ssam
209185377Ssam    if (lstat(filename, &lbuf) == -1)
210185377Ssam	perr("error in fstat of input file");
211185377Ssam
212185377Ssam    if (S_ISLNK(lbuf.st_mode))
213218763Sadrian	perrx("Symbolic link encountered in job %s - aborting", filename);
214218763Sadrian
215222276Sadrian    if ((lbuf.st_dev != buf.st_dev) || (lbuf.st_ino != buf.st_ino) ||
216222265Sadrian        (lbuf.st_uid != buf.st_uid) || (lbuf.st_gid != buf.st_gid) ||
217222265Sadrian        (lbuf.st_size!=buf.st_size))
218222265Sadrian	perrx("Somebody changed files from under us for job %s - aborting",
219185377Ssam		filename);
220185377Ssam
221188971Ssam    if (buf.st_nlink > 1)
222188971Ssam	perrx("Somebody is trying to run a linked script for job %s", filename);
223188971Ssam
224188971Ssam    if ((fflags = fcntl(fd_in, F_GETFD)) <0)
225188971Ssam	perr("error in fcntl");
226188971Ssam
227188971Ssam    fcntl(fd_in, F_SETFD, fflags & ~FD_CLOEXEC);
228188971Ssam
229188971Ssam    snprintf(fmt, sizeof(fmt),
230188971Ssam	"#!/bin/sh\n# atrun uid=%%ld gid=%%ld\n# mail %%%ds %%d",
231188971Ssam                          MAXLOGNAME - 1);
232188971Ssam
233188971Ssam    if (fscanf(stream, fmt, &nuid, &ngid, mailbuf, &send_mail) != 4)
234188971Ssam	perrx("File %s is in wrong format - aborting", filename);
235188971Ssam
236185377Ssam    if (mailbuf[0] == '-')
237185377Ssam	perrx("Illegal mail name %s in %s", mailbuf, filename);
238185377Ssam
239188972Ssam    mailname = mailbuf;
240185377Ssam
241217624Sadrian    if (nuid != uid)
242217624Sadrian	perrx("Job %s - userid %ld does not match file uid %lu",
243185377Ssam		filename, nuid, (unsigned long)uid);
244185377Ssam
245185377Ssam    if (ngid != gid)
246185377Ssam	perrx("Job %s - groupid %ld does not match file gid %lu",
247185377Ssam		filename, ngid, (unsigned long)gid);
248185377Ssam
249185377Ssam    fclose(stream);
250185377Ssam
251225883Sadrian    if (chdir(ATSPOOL_DIR) < 0)
252185377Ssam	perr("cannot chdir to %s", ATSPOOL_DIR);
253185377Ssam
254185377Ssam    /* Create a file to hold the output of the job we are about to run.
255185377Ssam     * Write the mail header.
256185377Ssam     */
257185377Ssam    if((fd_out=open(filename,
258185377Ssam		O_WRONLY | O_CREAT | O_EXCL, S_IWUSR | S_IRUSR)) < 0)
259185377Ssam	perr("cannot create output file");
260225883Sadrian
261185377Ssam    write_string(fd_out, "Subject: Output from your job ");
262185377Ssam    write_string(fd_out, filename);
263185377Ssam    write_string(fd_out, "\n\n");
264185377Ssam    fstat(fd_out, &buf);
265185377Ssam    size = buf.st_size;
266185377Ssam
267185377Ssam    close(STDIN_FILENO);
268185377Ssam    close(STDOUT_FILENO);
269185377Ssam    close(STDERR_FILENO);
270185377Ssam
271185377Ssam    pid = fork();
272185377Ssam    if (pid < 0)
273185377Ssam	perr("error in fork");
274185377Ssam
275185377Ssam    else if (pid == 0)
276185377Ssam    {
277185377Ssam	char *nul = NULL;
278185377Ssam	char **nenvp = &nul;
279185377Ssam
280185377Ssam	/* Set up things for the child; we want standard input from the input file,
281185377Ssam	 * and standard output and error sent to our output file.
282185377Ssam	 */
283185377Ssam
284185377Ssam	if (lseek(fd_in, (off_t) 0, SEEK_SET) < 0)
285188979Ssam	    perr("error in lseek");
286185377Ssam
287185377Ssam	if (dup(fd_in) != STDIN_FILENO)
288185377Ssam	    perr("error in I/O redirection");
289185377Ssam
290185377Ssam	if (dup(fd_out) != STDOUT_FILENO)
291185377Ssam	    perr("error in I/O redirection");
292185377Ssam
293185377Ssam	if (dup(fd_out) != STDERR_FILENO)
294185377Ssam	    perr("error in I/O redirection");
295185377Ssam
296185377Ssam	close(fd_in);
297185377Ssam	close(fd_out);
298185377Ssam	if (chdir(ATJOB_DIR) < 0)
299185377Ssam	    perr("cannot chdir to %s", ATJOB_DIR);
300219840Sadrian
301219839Sadrian	queue = *filename;
302185377Ssam
303185377Ssam	PRIV_START
304185377Ssam
305185377Ssam        nice(tolower(queue) - 'a');
306185377Ssam
307185377Ssam#ifdef LOGIN_CAP
308185377Ssam	/*
309185377Ssam	 * For simplicity and safety, set all aspects of the user context
310185377Ssam	 * except for a selected subset:  Don't set priority, which was
311185377Ssam	 * set based on the queue file name according to the tradition.
312188979Ssam	 * Don't bother to set environment, including path vars, either
313188979Ssam	 * because it will be discarded anyway.  Although the job file
314188979Ssam	 * should set umask, preset it here just in case.
315188973Ssam	 */
316188973Ssam	if (setusercontext(NULL, pentry, uid, LOGIN_SETALL &
317188973Ssam		~(LOGIN_SETPRIORITY | LOGIN_SETPATH | LOGIN_SETENV)) != 0)
318188973Ssam	    exit(EXIT_FAILURE);	/* setusercontext() logged the error */
319185377Ssam#else /* LOGIN_CAP */
320185377Ssam	if (initgroups(pentry->pw_name,pentry->pw_gid))
321185377Ssam	    perr("cannot init group access list");
322185377Ssam
323185377Ssam	if (setgid(gid) < 0 || setegid(pentry->pw_gid) < 0)
324185377Ssam	    perr("cannot change group");
325185377Ssam
326185377Ssam	if (setlogin(pentry->pw_name))
327185377Ssam	    perr("cannot set login name");
328185377Ssam
329185377Ssam	if (setuid(uid) < 0 || seteuid(uid) < 0)
330185377Ssam	    perr("cannot set user id");
331185377Ssam#endif /* LOGIN_CAP */
332185377Ssam
333185377Ssam	if (chdir(pentry->pw_dir))
334185377Ssam		chdir("/");
335185377Ssam
336185377Ssam	if(execle("/bin/sh","sh",(char *) NULL, nenvp) != 0)
337185377Ssam	    perr("exec failed for /bin/sh");
338185377Ssam
339185377Ssam	PRIV_END
340185377Ssam    }
341185377Ssam    /* We're the parent.  Let's wait.
342185377Ssam     */
343185377Ssam    close(fd_in);
344185377Ssam    close(fd_out);
345185377Ssam    waitpid(pid, (int *) NULL, 0);
346185377Ssam
347185377Ssam    /* Send mail.  Unlink the output file first, so it is deleted after
348185377Ssam     * the run.
349185377Ssam     */
350185377Ssam    stat(filename, &buf);
351185377Ssam    if (open(filename, O_RDONLY) != STDIN_FILENO)
352185377Ssam        perr("open of jobfile failed");
353185377Ssam
354185377Ssam    unlink(filename);
355185377Ssam    if ((buf.st_size != size) || send_mail)
356185377Ssam    {
357185377Ssam	PRIV_START
358185377Ssam
359185377Ssam#ifdef LOGIN_CAP
360185377Ssam	/*
361185377Ssam	 * This time set full context to run the mailer.
362185377Ssam	 */
363185377Ssam	if (setusercontext(NULL, pentry, uid, LOGIN_SETALL) != 0)
364185377Ssam	    exit(EXIT_FAILURE);	/* setusercontext() logged the error */
365185377Ssam#else /* LOGIN_CAP */
366185377Ssam	if (initgroups(pentry->pw_name,pentry->pw_gid))
367185377Ssam	    perr("cannot init group access list");
368185377Ssam
369185377Ssam	if (setgid(gid) < 0 || setegid(pentry->pw_gid) < 0)
370185377Ssam	    perr("cannot change group");
371185377Ssam
372185377Ssam	if (setlogin(pentry->pw_name))
373185377Ssam	    perr("cannot set login name");
374185377Ssam
375185377Ssam	if (setuid(uid) < 0 || seteuid(uid) < 0)
376185377Ssam	    perr("cannot set user id");
377185377Ssam#endif /* LOGIN_CAP */
378185377Ssam
379185377Ssam	if (chdir(pentry->pw_dir))
380185377Ssam		chdir("/");
381185377Ssam
382185377Ssam#ifdef __FreeBSD__
383185377Ssam	execl(_PATH_SENDMAIL, "sendmail", "-F", "Atrun Service",
384185377Ssam			"-odi", "-oem",
385185377Ssam			mailname, (char *) NULL);
386185377Ssam#else
387185377Ssam        execl(MAIL_CMD, MAIL_CMD, mailname, (char *) NULL);
388185377Ssam#endif
389185377Ssam	    perr("exec failed for mail command");
390221596Sadrian
391221596Sadrian	PRIV_END
392185377Ssam    }
393185377Ssam    exit(EXIT_SUCCESS);
394185377Ssam}
395185377Ssam
396185377Ssam/* Global functions */
397185380Ssam
398185377Ssam/* Needed in gloadavg.c */
399185377Ssamvoid
400219771Sadrianperr(const char *fmt, ...)
401185377Ssam{
402185377Ssam    const char * const fmtadd = ": %m";
403185377Ssam    char nfmt[strlen(fmt) + strlen(fmtadd) + 1];
404185377Ssam    va_list ap;
405185377Ssam
406185377Ssam    va_start(ap, fmt);
407185377Ssam    if (debug)
408185377Ssam    {
409185377Ssam	vwarn(fmt, ap);
410218068Sadrian    }
411218068Sadrian    else
412218068Sadrian    {
413218068Sadrian	snprintf(nfmt, sizeof(nfmt), "%s%s", fmt, fmtadd);
414218068Sadrian	vsyslog(LOG_ERR, nfmt, ap);
415218068Sadrian    }
416218068Sadrian    va_end(ap);
417218068Sadrian
418203882Srpaulo    exit(EXIT_FAILURE);
419185377Ssam}
420185377Ssam
421185377Ssamvoid
422185377Ssamperrx(const char *fmt, ...)
423185377Ssam{
424185377Ssam    va_list ap;
425185377Ssam
426185377Ssam    va_start(ap, fmt);
427185377Ssam    if (debug)
428185377Ssam	vwarnx(fmt, ap);
429185377Ssam    else
430185377Ssam	vsyslog(LOG_ERR, fmt, ap);
431185377Ssam    va_end(ap);
432185377Ssam
433185377Ssam    exit(EXIT_FAILURE);
434185377Ssam}
435185377Ssam
436185377Ssamint
437185377Ssammain(int argc, char *argv[])
438185377Ssam{
439221777Sadrian/* Browse through  ATJOB_DIR, checking all the jobfiles wether they should
440221777Sadrian * be executed and or deleted. The queue is coded into the first byte of
441221777Sadrian * the job filename, the date (in minutes since Eon) as a hex number in the
442221777Sadrian * following eight bytes, followed by a dot and a serial number.  A file
443221777Sadrian * which has not been executed yet is denoted by its execute - bit set.
444221777Sadrian * For those files which are to be executed, run_file() is called, which forks
445185380Ssam * off a child which takes care of I/O redirection, forks off another child
446185377Ssam * for execution and yet another one, optionally, for sending mail.
447185377Ssam * Files which already have run are removed during the next invocation.
448185377Ssam */
449185377Ssam    DIR *spool;
450185377Ssam    struct dirent *dirent;
451185377Ssam    struct stat buf;
452185377Ssam    unsigned long ctm;
453188979Ssam    unsigned long jobno;
454188979Ssam    char queue;
455188979Ssam    time_t now, run_time;
456188979Ssam    char batch_name[] = "Z2345678901234";
457188979Ssam    uid_t batch_uid;
458188979Ssam    gid_t batch_gid;
459188979Ssam    int c;
460188979Ssam    int run_batch;
461188979Ssam#ifdef __FreeBSD__
462188979Ssam    size_t ncpusz;
463188979Ssam    double load_avg = -1;
464188979Ssam    int ncpu;
465188979Ssam#else
466188979Ssam    double load_avg = LOADAVG_MX;
467188979Ssam#endif
468188979Ssam
469188979Ssam/* We don't need root privileges all the time; running under uid and gid daemon
470188979Ssam * is fine.
471188979Ssam */
472188979Ssam
473189747Ssam    RELINQUISH_PRIVS_ROOT(DAEMON_UID, DAEMON_GID)
474189747Ssam
475189747Ssam    openlog(atrun, LOG_PID, LOG_CRON);
476189747Ssam
477189747Ssam    opterr = 0;
478189747Ssam    while((c=getopt(argc, argv, "dl:"))!= -1)
479189747Ssam    {
480189747Ssam	switch (c)
481189747Ssam	{
482189747Ssam	case 'l':
483189747Ssam	    if (sscanf(optarg, "%lf", &load_avg) != 1)
484189747Ssam		perr("garbled option -l");
485189747Ssam#ifndef __FreeBSD__
486189747Ssam	    if (load_avg <= 0.)
487189747Ssam		load_avg = LOADAVG_MX;
488189747Ssam#endif
489189747Ssam	    break;
490189747Ssam
491189747Ssam	case 'd':
492189747Ssam	    debug ++;
493189747Ssam	    break;
494189747Ssam
495189747Ssam	case '?':
496189747Ssam	default:
497189747Ssam	    usage();
498189747Ssam	}
499189747Ssam    }
500189747Ssam
501189747Ssam    if (chdir(ATJOB_DIR) != 0)
502189747Ssam	perr("cannot change to %s", ATJOB_DIR);
503189747Ssam
504189747Ssam#ifdef __FreeBSD__
505219863Sadrian    if (load_avg <= 0.) {
506189747Ssam	ncpusz = sizeof(size_t);
507219863Sadrian	if (sysctlbyname("hw.ncpu", &ncpu, &ncpusz, NULL, 0) < 0)
508219863Sadrian		ncpu = 1;
509219863Sadrian	load_avg = LOADAVG_MX * ncpu;
510189747Ssam    }
511189747Ssam#endif
512189747Ssam
513189747Ssam    /* Main loop. Open spool directory for reading and look over all the
514189747Ssam     * files in there. If the filename indicates that the job should be run
515189747Ssam     * and the x bit is set, fork off a child which sets its user and group
516189747Ssam     * id to that of the files and exec a /bin/sh which executes the shell
517189747Ssam     * script. Unlink older files if they should no longer be run.  For
518189747Ssam     * deletion, their r bit has to be turned on.
519189747Ssam     *
520189747Ssam     * Also, pick the oldest batch job to run, at most one per invocation of
521189747Ssam     * atrun.
522189747Ssam     */
523185377Ssam    if ((spool = opendir(".")) == NULL)
524189747Ssam	perr("cannot read %s", ATJOB_DIR);
525189747Ssam
526189747Ssam    if (flock(dirfd(spool), LOCK_EX) == -1)
527189747Ssam	perr("cannot lock %s", ATJOB_DIR);
528189747Ssam
529189747Ssam    now = time(NULL);
530189747Ssam    run_batch = 0;
531189747Ssam    batch_uid = (uid_t) -1;
532189747Ssam    batch_gid = (gid_t) -1;
533189747Ssam
534189747Ssam    while ((dirent = readdir(spool)) != NULL) {
535189747Ssam	if (stat(dirent->d_name,&buf) != 0)
536189747Ssam	    perr("cannot stat in %s", ATJOB_DIR);
537189747Ssam
538189747Ssam	/* We don't want directories
539189747Ssam	 */
540189747Ssam	if (!S_ISREG(buf.st_mode))
541189747Ssam	    continue;
542189747Ssam
543189747Ssam	if (sscanf(dirent->d_name,"%c%5lx%8lx",&queue,&jobno,&ctm) != 3)
544189747Ssam	    continue;
545189747Ssam
546189747Ssam	run_time = (time_t) ctm*60;
547189747Ssam
548189747Ssam	if ((S_IXUSR & buf.st_mode) && (run_time <=now)) {
549189747Ssam	    if (isupper(queue) && (strcmp(batch_name,dirent->d_name) > 0)) {
550189747Ssam		run_batch = 1;
551189747Ssam		strlcpy(batch_name, dirent->d_name, sizeof(batch_name));
552189747Ssam		batch_uid = buf.st_uid;
553189747Ssam		batch_gid = buf.st_gid;
554189747Ssam	    }
555189747Ssam
556189747Ssam	/* The file is executable and old enough
557189747Ssam	 */
558189747Ssam	    if (islower(queue))
559189747Ssam		run_file(dirent->d_name, buf.st_uid, buf.st_gid);
560189747Ssam	}
561189747Ssam	/*  Delete older files
562189747Ssam	 */
563189747Ssam	if ((run_time < now) && !(S_IXUSR & buf.st_mode) && (S_IRUSR & buf.st_mode))
564189747Ssam	    unlink(dirent->d_name);
565189747Ssam    }
566189747Ssam    /* run the single batch file, if any
567189747Ssam    */
568189747Ssam    if (run_batch && (gloadavg() < load_avg))
569189747Ssam	run_file(batch_name, batch_uid, batch_gid);
570189747Ssam
571189747Ssam    if (flock(dirfd(spool), LOCK_UN) == -1)
572189747Ssam	perr("cannot unlock %s", ATJOB_DIR);
573189747Ssam
574189747Ssam    if (closedir(spool) == -1)
575189747Ssam	perr("cannot closedir %s", ATJOB_DIR);
576189747Ssam
577189747Ssam    closelog();
578189747Ssam    exit(EXIT_SUCCESS);
579189747Ssam}
580189747Ssam
581189747Ssamstatic void
582189747Ssamusage(void)
583189747Ssam{
584189747Ssam    if (debug)
585189747Ssam	fprintf(stderr, "usage: atrun [-l load_avg] [-d]\n");
586189747Ssam    else
587189747Ssam	syslog(LOG_ERR, "usage: atrun [-l load_avg] [-d]");
588189747Ssam
589189747Ssam    exit(EXIT_FAILURE);
590189747Ssam}
591189747Ssam