xref: /titanic_50/usr/src/cmd/cron/cron.c (revision 8ad60789b9913d5b2118fe76d8cd7a661d8ae8b6)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*
23  * Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 /*	Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T	*/
28 /*	  All Rights Reserved  	*/
29 
30 /*	Copyright (c) 1987, 1988 Microsoft Corporation	*/
31 /*	  All Rights Reserved	*/
32 
33 #pragma ident	"%Z%%M%	%I%	%E% SMI"
34 
35 #ifdef lint
36 /* make lint happy */
37 #define	__EXTENSIONS__
38 #endif
39 
40 #include <sys/contract/process.h>
41 #include <sys/ctfs.h>
42 #include <sys/param.h>
43 #include <sys/resource.h>
44 #include <sys/stat.h>
45 #include <sys/task.h>
46 #include <sys/time.h>
47 #include <sys/types.h>
48 #include <sys/utsname.h>
49 #include <sys/wait.h>
50 
51 #include <security/pam_appl.h>
52 
53 #include <alloca.h>
54 #include <ctype.h>
55 #include <deflt.h>
56 #include <dirent.h>
57 #include <errno.h>
58 #include <fcntl.h>
59 #include <grp.h>
60 #include <libcontract.h>
61 #include <libcontract_priv.h>
62 #include <limits.h>
63 #include <locale.h>
64 #include <poll.h>
65 #include <project.h>
66 #include <pwd.h>
67 #include <signal.h>
68 #include <stdarg.h>
69 #include <stdio.h>
70 #include <stdlib.h>
71 #include <string.h>
72 #include <stropts.h>
73 #include <time.h>
74 #include <unistd.h>
75 
76 #include "cron.h"
77 
78 /*
79  * #define	DEBUG
80  */
81 
82 #define	MAIL		"/usr/bin/mail"	/* mail program to use */
83 #define	CONSOLE		"/dev/console"	/* where messages go when cron dies */
84 
85 #define	TMPINFILE	"/tmp/crinXXXXXX"  /* file to put stdin in for cmd  */
86 #define	TMPDIR		"/tmp"
87 #define	PFX		"crout"
88 #define	TMPOUTFILE	"/tmp/croutXXXXXX" /* file to place stdout, stderr */
89 
90 #define	INMODE		00400		/* mode for stdin file	*/
91 #define	OUTMODE		00600		/* mode for stdout file */
92 #define	ISUID		S_ISUID		/* mode for verifing at jobs */
93 
94 #define	INFINITY	2147483647L	/* upper bound on time	*/
95 #define	CUSHION		180L
96 #define	MAXRUN		100		/* max total jobs allowed in system */
97 #define	ZOMB		100		/* proc slot used for mailing output */
98 
99 #define	JOBF		'j'
100 #define	NICEF		'n'
101 #define	USERF		'u'
102 #define	WAITF		'w'
103 
104 #define	BCHAR		'>'
105 #define	ECHAR		'<'
106 
107 #define	DEFAULT		0
108 #define	LOAD		1
109 #define	QBUFSIZ		80
110 
111 /* Defined actions for crabort() routine */
112 #define	NO_ACTION	000
113 #define	REMOVE_FIFO	001
114 #define	CONSOLE_MSG	002
115 
116 #define	BADCD		"can't change directory to the crontab directory."
117 #define	NOREADDIR	"can't read the crontab directory."
118 
119 #define	BADJOBOPEN	"unable to read your at job."
120 #define	BADSHELL	"because your login shell \
121 isn't /usr/bin/sh, you can't use cron."
122 
123 #define	BADSTAT		"can't access your crontab file.  Resubmit it."
124 #define	BADPROJID	"can't set project id for your job."
125 #define	CANTCDHOME	"can't change directory to your home directory.\
126 \nYour commands will not be executed."
127 #define	CANTEXECSH	"unable to exec the shell for one of your commands."
128 #define	NOREAD		"can't read your crontab file.  Resubmit it."
129 #define	BADTYPE		"crontab is not a regular file.\n"
130 #define	NOSTDIN		"unable to create a standard input file for \
131 one of your crontab commands. \
132 \nThat command was not executed."
133 
134 #define	NOTALLOWED	"you are not authorized to use cron.  Sorry."
135 #define	STDERRMSG	"\n\n********************************************\
136 *****\nCron: The previous message is the \
137 standard output and standard error \
138 \nof one of your cron commands.\n"
139 
140 #define	STDOUTERR	"one of your commands generated output or errors, \
141 but cron was unable to mail you this output.\
142 \nRemember to redirect standard output and standard \
143 error for each of your commands."
144 
145 #define	CLOCK_DRIFT	"clock time drifted backwards after event!\n"
146 #define	PIDERR		"unexpected pid returned %d (ignored)"
147 #define	CRONTABERR	"Subject: Your crontab file has an error in it\n\n"
148 #define	CRONOUT		"Subject: Output from \"cron\" command\n\n"
149 #define	MALLOCERR	"out of space, cannot create new string\n"
150 
151 #define	DIDFORK didfork
152 #define	NOFORK !didfork
153 
154 #define	MAILBUFLEN	(8*1024)
155 #define	LINELIMIT	80
156 #define	MAILBINITFREE	(MAILBUFLEN - (sizeof (cte_intro) - 1) \
157 	    - (sizeof (cte_trail1) - 1) - (sizeof (cte_trail2) - 1) - 1)
158 
159 #define	ERR_CRONTABENT	0	/* error in crontab file entry */
160 #define	ERR_UNIXERR	1	/* error in some system call */
161 #define	ERR_CANTEXECCRON 2	/* error setting up "cron" job environment */
162 #define	ERR_CANTEXECAT	3	/* error setting up "at" job environment */
163 
164 #define	PROJECT		"project="
165 
166 #define	MAX_LOST_CONTRACTS	2048	/* reset if this many failed abandons */
167 
168 #define	FORMAT	"%a %b %e %H:%M:%S %Y"
169 static char	timebuf[80];
170 
171 struct event {
172 	time_t time;	/* time of the event	*/
173 	short etype;	/* what type of event; 0=cron, 1=at	*/
174 	char *cmd;	/* command for cron, job name for at	*/
175 	struct usr *u;	/* ptr to the owner (usr) of this event	*/
176 	struct event *link;	/* ptr to another event for this user */
177 	union {
178 		struct { /* for crontab events */
179 			char *minute;	/*  (these	*/
180 			char *hour;	/*   fields	*/
181 			char *daymon;	/*   are	*/
182 			char *month;	/*   from	*/
183 			char *dayweek;	/*   crontab)	*/
184 			char *input;	/* ptr to stdin	*/
185 		} ct;
186 		struct { /* for at events */
187 			short exists;	/* for revising at events	*/
188 			int eventid;	/* for el_remove-ing at events	*/
189 		} at;
190 	} of;
191 };
192 
193 struct usr {
194 	char *name;	/* name of user (e.g. "root")	*/
195 	char *home;	/* home directory for user	*/
196 	uid_t uid;	/* user id	*/
197 	gid_t gid;	/* group id	*/
198 	int aruncnt;	/* counter for running jobs per uid */
199 	int cruncnt;	/* counter for running cron jobs per uid */
200 	int ctid;	/* for el_remove-ing crontab events */
201 	short ctexists;	/* for revising crontab events	*/
202 	struct event *ctevents;	/* list of this usr's crontab events */
203 	struct event *atevents;	/* list of this usr's at events */
204 	struct usr *nextusr;
205 };	/* ptr to next user	*/
206 
207 static struct	queue
208 {
209 	int njob;	/* limit */
210 	int nice;	/* nice for execution */
211 	int nwait;	/* wait time to next execution attempt */
212 	int nrun;	/* number running */
213 }
214 	qd = {100, 2, 60},		/* default values for queue defs */
215 	qt[NQUEUE];
216 static struct	queue	qq;
217 
218 struct runinfo
219 {
220 	pid_t	pid;
221 	short	que;
222 	struct  usr *rusr;	/* pointer to usr struct */
223 	char	*outfile;	/* file where stdout & stderr are trapped */
224 	short	jobtype;	/* what type of event: 0=cron, 1=at */
225 	char	*jobname;	/* command for "cron", jobname for "at" */
226 	int	mailwhendone;	/* 1 = send mail even if no ouptut */
227 }	rt[MAXRUN];
228 
229 static struct miscpid {
230 	pid_t		pid;
231 	struct miscpid	*next;
232 }	*miscpid_head;
233 
234 static pid_t cron_pid;	/* own pid */
235 static char didfork = 0; /* flag to see if I'm process group leader */
236 static int msgfd;	/* file descriptor for fifo queue */
237 static int ecid = 1;	/* event class id for el_remove(); MUST be set to 1 */
238 static int delayed;	/* is job being rescheduled or did it run first time */
239 static int cwd;		/* current working directory */
240 static struct event *next_event;	/* the next event to execute	*/
241 static struct usr *uhead;		/* ptr to the list of users	*/
242 
243 /* Variables for error handling at reading crontabs. */
244 static char cte_intro[] = "Line(s) with errors:\n\n";
245 static char cte_trail1[] = "\nMax number of errors encountered.";
246 static char cte_trail2[] = " Evaluation of crontab aborted.\n";
247 static int cte_free = MAILBINITFREE;	/* Free buffer space */
248 static char *cte_text = NULL;		/* Text buffer pointer */
249 static char *cte_lp;			/* Next free line in cte_text */
250 static int cte_nvalid;			/* Valid lines found */
251 
252 /* user's default environment for the shell */
253 #define	ROOTPATH	"PATH=/usr/sbin:/usr/bin"
254 #define	NONROOTPATH	"PATH=/usr/bin:"
255 
256 static char *Def_supath	= NULL;
257 static char *Def_path		= NULL;
258 static char path[LINE_MAX]	= "PATH=";
259 static char supath[LINE_MAX]	= "PATH=";
260 static char homedir[LINE_MAX]	= "HOME=";
261 static char logname[LINE_MAX]	= "LOGNAME=";
262 static char tzone[LINE_MAX]	= "TZ=";
263 static char *envinit[] = {
264 	homedir,
265 	logname,
266 	ROOTPATH,
267 	"SHELL=/usr/bin/sh",
268 	tzone,
269 	NULL
270 };
271 
272 extern char **environ;
273 
274 #define	DEFTZ		"GMT"
275 static	int	log = 0;
276 static	char	hzname[10];
277 
278 static void cronend(int);
279 static void thaw_handler(int);
280 static void child_handler(int);
281 static void child_sigreset(void);
282 
283 static void dscan(DIR *dir, void (*fp)(char *, time_t));
284 static void mod_ctab(char *, time_t);
285 static void mod_atjob(char *, time_t);
286 static void add_atevent(struct usr *, char *, time_t, int);
287 static void rm_ctevents(struct usr *);
288 static void cleanup(struct runinfo *rn, int r);
289 static void crabort(char *, int);
290 static void msg(char *fmt, ...);
291 static void logit(int, struct runinfo *, int);
292 static void parsqdef(char *);
293 static void defaults();
294 static void initialize(int);
295 static void quedefs(int);
296 static int idle(long);
297 static struct usr *find_usr(char *);
298 static int ex(struct event *e);
299 static void read_dirs(void);
300 static void mail(char *, char *, int);
301 static char *next_field(int, int);
302 static void readcron(struct usr *, time_t);
303 static int next_ge(int, char *);
304 static void free_if_unused(struct usr *);
305 static void del_atjob(char *, char *);
306 static void del_ctab(char *);
307 static void resched(int);
308 static int msg_wait(long);
309 static struct runinfo *rinfo_get(pid_t);
310 static void rinfo_free(struct runinfo *rp);
311 static void mail_result(struct usr *p, struct runinfo *pr, size_t filesize);
312 static time_t next_time(struct event *, time_t);
313 static time_t get_switching_time(int, time_t);
314 static time_t xmktime(struct tm *);
315 static void process_msg(struct message *, time_t);
316 static void reap_child(void);
317 static void miscpid_insert(pid_t);
318 static int miscpid_delete(pid_t);
319 static void contract_set_template(void);
320 static void contract_clear_template(void);
321 static void contract_abandon_latest(pid_t);
322 
323 static void cte_init(void);
324 static void cte_add(int, char *);
325 static void cte_valid(void);
326 static int cte_istoomany(void);
327 static void cte_sendmail(char *);
328 
329 static int set_user_cred(const struct usr *, struct project *);
330 
331 /*
332  * last_time is set immediately prior to exection of an event (via ex())
333  * to indicate the last time an event was executed.  This was (surely)
334  * it's original intended use.
335  */
336 static time_t last_time, init_time, t_old;
337 
338 static int		accept_sigcld, notifypipe[2];
339 static sigset_t		defmask, childmask;
340 
341 /*
342  * BSM hooks
343  */
344 extern int	audit_cron_session(char *, char *, uid_t, gid_t, char *);
345 extern void	audit_cron_new_job(char *, int, void *);
346 extern void	audit_cron_bad_user(char *);
347 extern void	audit_cron_user_acct_expired(char *);
348 extern int	audit_cron_create_anc_file(char *, char *, char *, uid_t);
349 extern int	audit_cron_delete_anc_file(char *, char *);
350 extern int	audit_cron_is_anc_name(char *);
351 extern int	audit_cron_mode();
352 
353 static int cron_conv(int, struct pam_message **,
354 		struct pam_response **, void *);
355 
356 static struct pam_conv pam_conv = {cron_conv, NULL};
357 static pam_handle_t *pamh;	/* Authentication handle */
358 
359 /*
360  * Function to help check a user's credentials.
361  */
362 
363 static int verify_user_cred(const struct usr *u);
364 
365 /*
366  * Values returned by verify_user_cred and set_user_cred:
367  */
368 
369 #define	VUC_OK		0
370 #define	VUC_BADUSER	1
371 #define	VUC_NOTINGROUP	2
372 #define	VUC_EXPIRED	3
373 #define	VUC_NEW_AUTH	4
374 
375 /*
376  * Modes of process_anc_files function
377  */
378 #define	CRON_ANC_DELETE	1
379 #define	CRON_ANC_CREATE	0
380 
381 /*
382  * Functions to remove a user or job completely from the running database.
383  */
384 static void clean_out_atjobs(struct usr *u);
385 static void clean_out_ctab(struct usr *u);
386 static void clean_out_user(struct usr *u);
387 static void cron_unlink(char *name);
388 static void process_anc_files(int);
389 
390 /*
391  * functions in elm.c
392  */
393 extern void el_init(int, time_t, time_t, int);
394 extern void el_add(void *, time_t, int);
395 extern void el_remove(int, int);
396 extern int el_empty(void);
397 extern void *el_first(void);
398 extern void el_delete(void);
399 
400 int
401 main(int argc, char *argv[])
402 {
403 	time_t t;
404 	time_t ne_time;		/* amt of time until next event execution */
405 	time_t newtime, lastmtime = 0L;
406 	struct usr *u;
407 	struct event *e, *e2, *eprev;
408 	struct stat buf;
409 	pid_t rfork;
410 	struct sigaction act;
411 
412 	/*
413 	 * reset is set to 1 via the return from ex() should ex() find
414 	 * that the event to be executed is being run at the wrong time.
415 	 * We immediately return to the top of the while (TRUE) loop in
416 	 * main() where the event list is cleared and rebuilt, and reset
417 	 * is set back to 0.
418 	 */
419 	int reset = 0;
420 
421 	/*
422 	 * Only the privileged user can run this command.
423 	 */
424 	if (getuid() != 0)
425 		crabort(NOTALLOWED, 0);
426 
427 begin:
428 	(void) setlocale(LC_ALL, "");
429 	/* fork unless 'nofork' is specified */
430 	if ((argc <= 1) || (strcmp(argv[1], "nofork"))) {
431 		if (rfork = fork()) {
432 			if (rfork == (pid_t)-1) {
433 				(void) sleep(30);
434 				goto begin;
435 			}
436 			return (0);
437 		}
438 		didfork++;
439 		(void) setpgrp();	/* detach cron from console */
440 	}
441 
442 	(void) umask(022);
443 	(void) signal(SIGHUP, SIG_IGN);
444 	(void) signal(SIGINT, SIG_IGN);
445 	(void) signal(SIGQUIT, SIG_IGN);
446 	(void) signal(SIGTERM, cronend);
447 
448 	defaults();
449 	initialize(1);
450 	quedefs(DEFAULT);	/* load default queue definitions */
451 	cron_pid = getpid();
452 	msg("*** cron started ***   pid = %d", cron_pid);
453 	(void) sigset(SIGTHAW, thaw_handler);
454 	/*
455 	 * setup SIGCLD handler/mask
456 	 */
457 	act.sa_handler = child_handler;
458 	act.sa_flags = 0;
459 	(void) sigemptyset(&act.sa_mask);
460 	(void) sigaddset(&act.sa_mask, SIGCLD);
461 	(void) sigaction(SIGCLD, &act, NULL);
462 	(void) sigemptyset(&childmask);
463 	(void) sigaddset(&childmask, SIGCLD);
464 	(void) sigprocmask(SIG_BLOCK, &childmask, &defmask);
465 
466 	if (pipe(notifypipe) != 0) {
467 		crabort("cannot create pipe", REMOVE_FIFO|CONSOLE_MSG);
468 	}
469 	/*
470 	 * will set O_NONBLOCK, so that the write() from child_handler
471 	 * never be blocked.
472 	 */
473 	(void) fcntl(notifypipe[0], F_SETFL, O_WRONLY|O_NONBLOCK);
474 
475 	t_old = time(NULL);
476 	last_time = t_old;
477 	for (;;) {		/* MAIN LOOP */
478 		t = time(NULL);
479 		if ((t_old > t) || (t-last_time > CUSHION) || reset) {
480 			reset = 0;
481 			/* the time was set backwards or forward */
482 			el_delete();
483 			u = uhead;
484 			while (u != NULL) {
485 				rm_ctevents(u);
486 				e = u->atevents;
487 				while (e != NULL) {
488 					free(e->cmd);
489 					e2 = e->link;
490 					free(e);
491 					e = e2;
492 				}
493 				u->atevents = NULL;
494 				u = u->nextusr;
495 			}
496 			(void) close(msgfd);
497 			initialize(0);
498 			t = time(NULL);
499 			last_time = t;
500 		}
501 		t_old = t;
502 
503 		if (next_event == NULL && !el_empty()) {
504 			next_event = (struct event *)el_first();
505 		}
506 		if (next_event == NULL) {
507 			ne_time = INFINITY;
508 		} else {
509 			ne_time = next_event->time - t;
510 #ifdef DEBUG
511 			cftime(timebuf, "%C", &next_event->time);
512 			(void) fprintf(stderr, "next_time=%ld %s\n",
513 				next_event->time, timebuf);
514 #endif
515 		}
516 		if (ne_time > 0) {
517 			if ((reset = idle(ne_time)) != 0)
518 				continue;
519 		}
520 
521 		if (stat(QUEDEFS, &buf)) {
522 			msg("cannot stat QUEDEFS file");
523 		} else if (lastmtime != buf.st_mtime) {
524 			quedefs(LOAD);
525 			lastmtime = buf.st_mtime;
526 		}
527 
528 		last_time = next_event->time; /* save execution time */
529 
530 		if (reset = ex(next_event))
531 			continue;
532 
533 		switch (next_event->etype) {
534 		case CRONEVENT:
535 			/* add cronevent back into the main event list */
536 			if (delayed) {
537 				delayed = 0;
538 				break;
539 			}
540 
541 			/*
542 			 * check if time(0)< last_time. if so, then the
543 			 * system clock has gone backwards. to prevent this
544 			 * job from being started twice, we reschedule this
545 			 * job for the >>next time after last_time<<, and
546 			 * then set next_event->time to this. note that
547 			 * crontab's resolution is 1 minute.
548 			 */
549 
550 			if (last_time > time(NULL)) {
551 				msg(CLOCK_DRIFT);
552 				/*
553 				 * bump up to next 30 second
554 				 * increment
555 				 * 1 <= newtime <= 30
556 				 */
557 				newtime = 30 - (last_time % 30);
558 				newtime += last_time;
559 
560 				/*
561 				 * get the next scheduled event,
562 				 * not the one that we just
563 				 * kicked off!
564 				 */
565 				next_event->time =
566 					next_time(next_event, newtime);
567 				t_old = time(NULL);
568 			} else {
569 				next_event->time =
570 					next_time(next_event, (time_t)0);
571 			}
572 #ifdef DEBUG
573 			cftime(timebuf, "%C", &next_event->time);
574 			(void) fprintf(stderr,
575 				"pushing back cron event %s at %ld (%s)\n",
576 				next_event->cmd, next_event->time, timebuf);
577 #endif
578 
579 			el_add(next_event, next_event->time,
580 				(next_event->u)->ctid);
581 			break;
582 		default:
583 			/* remove at or batch job from system */
584 			if (delayed) {
585 				delayed = 0;
586 				break;
587 			}
588 			eprev = NULL;
589 			e = (next_event->u)->atevents;
590 			while (e != NULL) {
591 				if (e == next_event) {
592 					if (eprev == NULL)
593 						(e->u)->atevents = e->link;
594 					else
595 						eprev->link = e->link;
596 					free(e->cmd);
597 					free(e);
598 					break;
599 				} else {
600 					eprev = e;
601 					e = e->link;
602 				}
603 			}
604 			break;
605 		}
606 		next_event = NULL;
607 	}
608 
609 	/*NOTREACHED*/
610 }
611 
612 static void
613 initialize(int firstpass)
614 {
615 #ifdef DEBUG
616 	(void) fprintf(stderr, "in initialize\n");
617 #endif
618 	init_time = time(NULL);
619 	el_init(8, init_time, (time_t)(60*60*24), 10);
620 	if (firstpass) {
621 		/* for mail(1), make sure messages come from root */
622 		if (putenv("LOGNAME=root") != 0) {
623 			crabort("cannot expand env variable",
624 				REMOVE_FIFO|CONSOLE_MSG);
625 		}
626 		if (access(FIFO, R_OK) == -1) {
627 			if (errno == ENOENT) {
628 				if (mknod(FIFO, S_IFIFO|0600, 0) != 0)
629 					crabort("cannot create fifo queue",
630 						REMOVE_FIFO|CONSOLE_MSG);
631 			} else {
632 				if (NOFORK) {
633 					/* didn't fork... init(1M) is waiting */
634 					(void) sleep(60);
635 				}
636 				perror("FIFO");
637 				crabort("cannot access fifo queue",
638 					REMOVE_FIFO|CONSOLE_MSG);
639 			}
640 		} else {
641 			if (NOFORK) {
642 				/* didn't fork... init(1M) is waiting */
643 				(void) sleep(60);
644 				/*
645 				 * the wait is painful, but we don't want
646 				 * init respawning this quickly
647 				 */
648 			}
649 			crabort("cannot start cron; FIFO exists", CONSOLE_MSG);
650 		}
651 	}
652 
653 	if ((msgfd = open(FIFO, O_RDWR)) < 0) {
654 		perror("! open");
655 		crabort("cannot open fifo queue", REMOVE_FIFO|CONSOLE_MSG);
656 	}
657 
658 	/*
659 	 * read directories, create users list, and add events to the
660 	 * main event list. Only zero user list on firstpass.
661 	 */
662 	if (firstpass)
663 		uhead = NULL;
664 	read_dirs();
665 	next_event = NULL;
666 
667 	if (!firstpass)
668 		return;
669 
670 	/* stdout is log file */
671 	if (freopen(ACCTFILE, "a", stdout) == NULL)
672 		(void) fprintf(stderr, "cannot open %s\n", ACCTFILE);
673 
674 	/* log should be root-only */
675 	(void) fchmod(1, S_IRUSR|S_IWUSR);
676 
677 	/* stderr also goes to ACCTFILE */
678 	(void) close(fileno(stderr));
679 	(void) dup(1);
680 
681 	/* null for stdin */
682 	(void) freopen("/dev/null", "r", stdin);
683 
684 	contract_set_template();
685 }
686 
687 static void
688 read_dirs()
689 {
690 	DIR	*dir;
691 
692 	if (chdir(CRONDIR) == -1)
693 		crabort(BADCD, REMOVE_FIFO|CONSOLE_MSG);
694 	cwd = CRON;
695 	if ((dir = opendir(".")) == NULL)
696 		crabort(NOREADDIR, REMOVE_FIFO|CONSOLE_MSG);
697 	dscan(dir, mod_ctab);
698 	(void) closedir(dir);
699 	if (chdir(ATDIR) == -1) {
700 		msg("cannot chdir to at directory");
701 		return;
702 	}
703 	cwd = AT;
704 	if ((dir = opendir(".")) == NULL) {
705 		msg("cannot read at at directory");
706 		return;
707 	}
708 	dscan(dir, mod_atjob);
709 	(void) closedir(dir);
710 }
711 
712 static void
713 dscan(DIR *df, void (*fp)(char *, time_t))
714 {
715 	struct dirent	*dp;
716 
717 	while ((dp = readdir(df)) != NULL) {
718 		if (strcmp(dp->d_name, ".") == 0 ||
719 		    strcmp(dp->d_name, "..") == 0) {
720 			continue;
721 		}
722 		(*fp)(dp->d_name, 0);
723 	}
724 }
725 
726 static void
727 mod_ctab(char *name, time_t reftime)
728 {
729 	struct	passwd	*pw;
730 	struct	stat	buf;
731 	struct	usr	*u;
732 	char	namebuf[PATH_MAX];
733 	char	*pname;
734 
735 	/* skip over ancillary file names */
736 	if (audit_cron_is_anc_name(name))
737 		return;
738 
739 	if ((pw = getpwnam(name)) == NULL) {
740 		msg("No such user as %s - cron entries not created", name);
741 		return;
742 	}
743 	if (cwd != CRON) {
744 		if (snprintf(namebuf, sizeof (namebuf), "%s/%s",
745 				CRONDIR, name) >= sizeof (namebuf)) {
746 			msg("Too long path name %s - cron entries not created",
747 				namebuf);
748 			return;
749 		}
750 		pname = namebuf;
751 	} else {
752 		pname = name;
753 	}
754 	/*
755 	 * a warning message is given by the crontab command so there is
756 	 * no need to give one here......  use this code if you only want
757 	 * users with a login shell of /usr/bin/sh to use cron
758 	 */
759 #ifdef BOURNESHELLONLY
760 	if ((strcmp(pw->pw_shell, "") != 0) &&
761 	    (strcmp(pw->pw_shell, SHELL) != 0)) {
762 		mail(name, BADSHELL, ERR_CANTEXECCRON);
763 		cron_unlink(pname);
764 		return;
765 	}
766 #endif
767 	if (stat(pname, &buf)) {
768 		mail(name, BADSTAT, ERR_UNIXERR);
769 		cron_unlink(pname);
770 		return;
771 	}
772 	if (!S_ISREG(buf.st_mode)) {
773 		mail(name, BADTYPE, ERR_CRONTABENT);
774 		return;
775 	}
776 	if ((u = find_usr(name)) == NULL) {
777 #ifdef DEBUG
778 		(void) fprintf(stderr, "new user (%s) with a crontab\n", name);
779 #endif
780 		u = xmalloc(sizeof (struct usr));
781 		u->name = xmalloc(strlen(name)+1);
782 		(void) strcpy(u->name, name);
783 		u->home = xmalloc(strlen(pw->pw_dir)+1);
784 		(void) strcpy(u->home, pw->pw_dir);
785 		u->uid = pw->pw_uid;
786 		u->gid = pw->pw_gid;
787 		u->ctexists = TRUE;
788 		u->ctid = ecid++;
789 		u->ctevents = NULL;
790 		u->atevents = NULL;
791 		u->aruncnt = 0;
792 		u->cruncnt = 0;
793 		u->nextusr = uhead;
794 		uhead = u;
795 		readcron(u, reftime);
796 	} else {
797 		u->uid = pw->pw_uid;
798 		u->gid = pw->pw_gid;
799 		if (strcmp(u->home, pw->pw_dir) != 0) {
800 			free(u->home);
801 			u->home = xmalloc(strlen(pw->pw_dir)+1);
802 			(void) strcpy(u->home, pw->pw_dir);
803 		}
804 		u->ctexists = TRUE;
805 		if (u->ctid == 0) {
806 #ifdef DEBUG
807 			(void) fprintf(stderr, "%s now has a crontab\n",
808 			    u->name);
809 #endif
810 			/* user didnt have a crontab last time */
811 			u->ctid = ecid++;
812 			u->ctevents = NULL;
813 			readcron(u, reftime);
814 			return;
815 		}
816 #ifdef DEBUG
817 		(void) fprintf(stderr, "%s has revised his crontab\n", u->name);
818 #endif
819 		rm_ctevents(u);
820 		el_remove(u->ctid, 0);
821 		readcron(u, reftime);
822 	}
823 }
824 
825 /* ARGSUSED */
826 static void
827 mod_atjob(char *name, time_t reftime)
828 {
829 	char	*ptr;
830 	time_t	tim;
831 	struct	passwd	*pw;
832 	struct	stat	buf;
833 	struct	usr	*u;
834 	struct	event	*e;
835 	char	namebuf[PATH_MAX];
836 	char	*pname;
837 	int	jobtype;
838 
839 	ptr = name;
840 	if (((tim = num(&ptr)) == 0) || (*ptr != '.'))
841 		return;
842 	ptr++;
843 	if (!isalpha(*ptr))
844 		return;
845 	jobtype = *ptr - 'a';
846 
847 	/* check for audit ancillary file */
848 	if (audit_cron_is_anc_name(name))
849 		return;
850 
851 	if (cwd != AT) {
852 		if (snprintf(namebuf, sizeof (namebuf), "%s/%s", ATDIR, name)
853 		    >= sizeof (namebuf)) {
854 			return;
855 		}
856 		pname = namebuf;
857 	} else {
858 		pname = name;
859 	}
860 	if (stat(pname, &buf) || jobtype >= NQUEUE) {
861 		cron_unlink(pname);
862 		return;
863 	}
864 	if (!(buf.st_mode & ISUID) || !S_ISREG(buf.st_mode)) {
865 		cron_unlink(pname);
866 		return;
867 	}
868 	if ((pw = getpwuid(buf.st_uid)) == NULL) {
869 		cron_unlink(pname);
870 		return;
871 	}
872 	/*
873 	 * a warning message is given by the at command so there is no
874 	 * need to give one here......use this code if you only want
875 	 * users with a login shell of /usr/bin/sh to use cron
876 	 */
877 #ifdef BOURNESHELLONLY
878 	if ((strcmp(pw->pw_shell, "") != 0) &&
879 	    (strcmp(pw->pw_shell, SHELL) != 0)) {
880 		mail(pw->pw_name, BADSHELL, ERR_CANTEXECAT);
881 		cron_unlink(pname);
882 		return;
883 	}
884 #endif
885 	if ((u = find_usr(pw->pw_name)) == NULL) {
886 #ifdef DEBUG
887 		(void) fprintf(stderr, "new user (%s) with an at job = %s\n",
888 			pw->pw_name, name);
889 #endif
890 		u = xmalloc(sizeof (struct usr));
891 		u->name = xmalloc(strlen(pw->pw_name)+1);
892 		(void) strcpy(u->name, pw->pw_name);
893 		u->home = xmalloc(strlen(pw->pw_dir)+1);
894 		(void) strcpy(u->home, pw->pw_dir);
895 		u->uid = pw->pw_uid;
896 		u->gid = pw->pw_gid;
897 		u->ctexists = FALSE;
898 		u->ctid = 0;
899 		u->ctevents = NULL;
900 		u->atevents = NULL;
901 		u->aruncnt = 0;
902 		u->cruncnt = 0;
903 		u->nextusr = uhead;
904 		uhead = u;
905 		add_atevent(u, name, tim, jobtype);
906 	} else {
907 		u->uid = pw->pw_uid;
908 		u->gid = pw->pw_gid;
909 		if (strcmp(u->home, pw->pw_dir) != 0) {
910 			free(u->home);
911 			u->home = xmalloc(strlen(pw->pw_dir)+1);
912 			(void) strcpy(u->home, pw->pw_dir);
913 		}
914 		e = u->atevents;
915 		while (e != NULL) {
916 			if (strcmp(e->cmd, name) == 0) {
917 				e->of.at.exists = TRUE;
918 				break;
919 			} else {
920 				e = e->link;
921 			}
922 		}
923 		if (e == NULL) {
924 #ifdef DEBUG
925 			(void) fprintf(stderr, "%s has a new at job = %s\n",
926 				u->name, name);
927 #endif
928 			add_atevent(u, name, tim, jobtype);
929 		}
930 	}
931 }
932 
933 static void
934 add_atevent(struct usr *u, char *job, time_t tim, int jobtype)
935 {
936 	struct event *e;
937 
938 	e = xmalloc(sizeof (struct event));
939 	e->etype = jobtype;
940 	e->cmd = xmalloc(strlen(job)+1);
941 	(void) strcpy(e->cmd, job);
942 	e->u = u;
943 	e->link = u->atevents;
944 	u->atevents = e;
945 	e->of.at.exists = TRUE;
946 	e->of.at.eventid = ecid++;
947 	if (tim < init_time)	/* old job */
948 		e->time = init_time;
949 	else
950 		e->time = tim;
951 #ifdef DEBUG
952 	(void) fprintf(stderr, "add_atevent: user=%s, job=%s, time=%ld\n",
953 		u->name, e->cmd, e->time);
954 #endif
955 	el_add(e, e->time, e->of.at.eventid);
956 }
957 
958 
959 static char line[CTLINESIZE];	/* holds a line from a crontab file */
960 static int cursor;		/* cursor for the above line */
961 
962 static void
963 readcron(struct usr *u, time_t reftime)
964 {
965 	/*
966 	 * readcron reads in a crontab file for a user (u). The list of
967 	 * events for user u is built, and u->events is made to point to
968 	 * this list. Each event is also entered into the main event
969 	 * list.
970 	 */
971 	FILE *cf;	/* cf will be a user's crontab file */
972 	struct event *e;
973 	int start;
974 	unsigned int i;
975 	char namebuf[PATH_MAX];
976 	char *pname;
977 	int lineno = 0;
978 
979 	/* read the crontab file */
980 	cte_init();		/* Init error handling */
981 	if (cwd != CRON) {
982 		if (snprintf(namebuf, sizeof (namebuf), "%s/%s",
983 		    CRONDIR, u->name) >= sizeof (namebuf)) {
984 			return;
985 		}
986 		pname = namebuf;
987 	} else {
988 		pname = u->name;
989 	}
990 	if ((cf = fopen(pname, "r")) == NULL) {
991 		mail(u->name, NOREAD, ERR_UNIXERR);
992 		return;
993 	}
994 	while (fgets(line, CTLINESIZE, cf) != NULL) {
995 		/* process a line of a crontab file */
996 		lineno++;
997 		if (cte_istoomany())
998 			break;
999 		cursor = 0;
1000 		while (line[cursor] == ' ' || line[cursor] == '\t')
1001 			cursor++;
1002 		if (line[cursor] == '#' || line[cursor] == '\n')
1003 			continue;
1004 		e = xmalloc(sizeof (struct event));
1005 		e->etype = CRONEVENT;
1006 		if (!(((e->of.ct.minute = next_field(0, 59)) != NULL) &&
1007 		    ((e->of.ct.hour = next_field(0, 23)) != NULL) &&
1008 		    ((e->of.ct.daymon = next_field(1, 31)) != NULL) &&
1009 		    ((e->of.ct.month = next_field(1, 12)) != NULL) &&
1010 		    ((e->of.ct.dayweek = next_field(0, 6)) != NULL))) {
1011 			free(e);
1012 			cte_add(lineno, line);
1013 			continue;
1014 		}
1015 		while (line[cursor] == ' ' || line[cursor] == '\t')
1016 			cursor++;
1017 		if (line[cursor] == '\n' || line[cursor] == '\0')
1018 			continue;
1019 		/* get the command to execute	*/
1020 		start = cursor;
1021 again:
1022 		while ((line[cursor] != '%') &&
1023 		    (line[cursor] != '\n') &&
1024 		    (line[cursor] != '\0') &&
1025 		    (line[cursor] != '\\'))
1026 			cursor++;
1027 		if (line[cursor] == '\\') {
1028 			cursor += 2;
1029 			goto again;
1030 		}
1031 		e->cmd = xmalloc(cursor-start+1);
1032 		(void) strncpy(e->cmd, line+start, cursor-start);
1033 		e->cmd[cursor-start] = '\0';
1034 		/* see if there is any standard input	*/
1035 		if (line[cursor] == '%') {
1036 			e->of.ct.input = xmalloc(strlen(line)-cursor+1);
1037 			(void) strcpy(e->of.ct.input, line+cursor+1);
1038 			for (i = 0; i < strlen(e->of.ct.input); i++) {
1039 				if (e->of.ct.input[i] == '%')
1040 					e->of.ct.input[i] = '\n';
1041 			}
1042 		} else {
1043 			e->of.ct.input = NULL;
1044 		}
1045 		/* have the event point to it's owner	*/
1046 		e->u = u;
1047 		/* insert this event at the front of this user's event list */
1048 		e->link = u->ctevents;
1049 		u->ctevents = e;
1050 		/* set the time for the first occurance of this event	*/
1051 		e->time = next_time(e, reftime);
1052 		/* finally, add this event to the main event list	*/
1053 		el_add(e, e->time, u->ctid);
1054 		cte_valid();
1055 #ifdef DEBUG
1056 		cftime(timebuf, "%C", &e->time);
1057 		(void) fprintf(stderr, "inserting cron event %s at %ld (%s)\n",
1058 			e->cmd, e->time, timebuf);
1059 #endif
1060 	}
1061 	cte_sendmail(u->name);	/* mail errors if any to user */
1062 	(void) fclose(cf);
1063 }
1064 
1065 /*
1066  * Below are the functions for handling of errors in crontabs. Concept is to
1067  * collect faulty lines and send one email at the end of the crontab
1068  * evaluation. If there are erroneous lines only ((cte_nvalid == 0), evaluation
1069  * of crontab is aborted. Otherwise reading of crontab is continued to the end
1070  * of the file but no further error logging appears.
1071  */
1072 static void
1073 cte_init()
1074 {
1075 	if (cte_text == NULL)
1076 		cte_text = xmalloc(MAILBUFLEN);
1077 	(void) strlcpy(cte_text, cte_intro, MAILBUFLEN);
1078 	cte_lp = cte_text + sizeof (cte_intro) - 1;
1079 	cte_free = MAILBINITFREE;
1080 	cte_nvalid = 0;
1081 }
1082 
1083 static void
1084 cte_add(int lineno, char *ctline)
1085 {
1086 	int len;
1087 	char *p;
1088 
1089 	if (cte_free >= LINELIMIT) {
1090 		(void) sprintf(cte_lp, "%4d: ", lineno);
1091 		(void) strlcat(cte_lp, ctline, LINELIMIT - 1);
1092 		len = strlen(cte_lp);
1093 		if (cte_lp[len - 1] != '\n') {
1094 			cte_lp[len++] = '\n';
1095 			cte_lp[len] = '\0';
1096 		}
1097 		for (p = cte_lp; *p; p++) {
1098 			if (isprint(*p) || *p == '\n' || *p == '\t')
1099 				continue;
1100 			*p = '.';
1101 		}
1102 		cte_lp += len;
1103 		cte_free -= len;
1104 		if (cte_free < LINELIMIT) {
1105 			size_t buflen = MAILBUFLEN - (cte_lp - cte_text);
1106 			(void) strlcpy(cte_lp, cte_trail1, buflen);
1107 			if (cte_nvalid == 0)
1108 				(void) strlcat(cte_lp, cte_trail2, buflen);
1109 		}
1110 	}
1111 }
1112 
1113 static void
1114 cte_valid()
1115 {
1116 	cte_nvalid++;
1117 }
1118 
1119 static int
1120 cte_istoomany()
1121 {
1122 	/*
1123 	 * Return TRUE only if all lines are faulty. So evaluation of
1124 	 * a crontab is not aborted if at least one valid line was found.
1125 	 */
1126 	return (cte_nvalid == 0 && cte_free < LINELIMIT);
1127 }
1128 
1129 static void
1130 cte_sendmail(char *username)
1131 {
1132 	if (cte_free < MAILBINITFREE)
1133 		mail(username, cte_text, ERR_CRONTABENT);
1134 }
1135 
1136 /*
1137  * Send mail with error message to a user
1138  */
1139 static void
1140 mail(char *usrname, char *mesg, int format)
1141 {
1142 	/* mail mails a user a message.	*/
1143 	FILE *pipe;
1144 	char *temp;
1145 	struct passwd	*ruser_ids;
1146 	pid_t fork_val;
1147 	int saveerrno = errno;
1148 	struct utsname	name;
1149 
1150 #ifdef TESTING
1151 	return;
1152 #endif
1153 	(void) uname(&name);
1154 	if ((fork_val = fork()) == (pid_t)-1) {
1155 		msg("cron cannot fork\n");
1156 		return;
1157 	}
1158 	if (fork_val == 0) {
1159 		child_sigreset();
1160 		contract_clear_template();
1161 		if ((ruser_ids = getpwnam(usrname)) == NULL)
1162 			exit(0);
1163 		(void) setuid(ruser_ids->pw_uid);
1164 		temp = xmalloc(strlen(MAIL)+strlen(usrname)+2);
1165 		(void) sprintf(temp, "%s %s", MAIL, usrname);
1166 		pipe = popen(temp, "w");
1167 		if (pipe != NULL) {
1168 			(void) fprintf(pipe, "To: %s\n", usrname);
1169 			switch (format) {
1170 			case ERR_CRONTABENT:
1171 				(void) fprintf(pipe, CRONTABERR);
1172 				(void) fprintf(pipe, "Your \"crontab\" on %s\n",
1173 				    name.nodename);
1174 				(void) fprintf(pipe, mesg);
1175 				(void) fprintf(pipe,
1176 				    "\nEntries or crontab have been ignored\n");
1177 				break;
1178 			case ERR_UNIXERR:
1179 				(void) fprintf(pipe, "Subject: %s\n\n", mesg);
1180 				(void) fprintf(pipe,
1181 				    "The error on %s was \"%s\"\n",
1182 				    name.nodename, errmsg(saveerrno));
1183 				break;
1184 
1185 			case ERR_CANTEXECCRON:
1186 				(void) fprintf(pipe,
1187 				"Subject: Couldn't run your \"cron\" job\n\n");
1188 				(void) fprintf(pipe,
1189 				    "Your \"cron\" job on %s ", name.nodename);
1190 				(void) fprintf(pipe, "couldn't be run\n");
1191 				(void) fprintf(pipe, "%s\n", mesg);
1192 				(void) fprintf(pipe,
1193 				"The error was \"%s\"\n", errmsg(saveerrno));
1194 				break;
1195 
1196 			case ERR_CANTEXECAT:
1197 				(void) fprintf(pipe,
1198 				"Subject: Couldn't run your \"at\" job\n\n");
1199 				(void) fprintf(pipe, "Your \"at\" job on %s ",
1200 				    name.nodename);
1201 				(void) fprintf(pipe, "couldn't be run\n");
1202 				(void) fprintf(pipe, "%s\n", mesg);
1203 				(void) fprintf(pipe,
1204 				"The error was \"%s\"\n", errmsg(saveerrno));
1205 				break;
1206 
1207 			default:
1208 				break;
1209 			}
1210 			(void) pclose(pipe);
1211 		}
1212 		free(temp);
1213 		exit(0);
1214 	}
1215 
1216 	contract_abandon_latest(fork_val);
1217 
1218 	if (cron_pid == getpid()) {
1219 		miscpid_insert(fork_val);
1220 	}
1221 }
1222 
1223 static char *
1224 next_field(int lower, int upper)
1225 {
1226 	/*
1227 	 * next_field returns a pointer to a string which holds the next
1228 	 * field of a line of a crontab file.
1229 	 *   if (numbers in this field are out of range (lower..upper),
1230 	 *	or there is a syntax error) then
1231 	 *	NULL is returned, and a mail message is sent to the
1232 	 *	user telling him which line the error was in.
1233 	 */
1234 
1235 	char *s;
1236 	int num, num2, start;
1237 
1238 	while ((line[cursor] == ' ') || (line[cursor] == '\t'))
1239 		cursor++;
1240 	start = cursor;
1241 	if (line[cursor] == '\0') {
1242 		return (NULL);
1243 	}
1244 	if (line[cursor] == '*') {
1245 		cursor++;
1246 		if ((line[cursor] != ' ') && (line[cursor] != '\t'))
1247 			return (NULL);
1248 		s = xmalloc(2);
1249 		(void) strcpy(s, "*");
1250 		return (s);
1251 	}
1252 	for (;;) {
1253 		if (!isdigit(line[cursor]))
1254 			return (NULL);
1255 		num = 0;
1256 		do {
1257 			num = num*10 + (line[cursor]-'0');
1258 		} while (isdigit(line[++cursor]));
1259 		if ((num < lower) || (num > upper))
1260 			return (NULL);
1261 		if (line[cursor] == '-') {
1262 			if (!isdigit(line[++cursor]))
1263 				return (NULL);
1264 			num2 = 0;
1265 			do {
1266 				num2 = num2*10 + (line[cursor]-'0');
1267 			} while (isdigit(line[++cursor]));
1268 			if ((num2 < lower) || (num2 > upper))
1269 				return (NULL);
1270 		}
1271 		if ((line[cursor] == ' ') || (line[cursor] == '\t'))
1272 			break;
1273 		if (line[cursor] == '\0')
1274 			return (NULL);
1275 		if (line[cursor++] != ',')
1276 			return (NULL);
1277 	}
1278 	s = xmalloc(cursor-start+1);
1279 	(void) strncpy(s, line+start, cursor-start);
1280 	s[cursor-start] = '\0';
1281 	return (s);
1282 }
1283 
1284 #define	tm_cmp(t1, t2) (\
1285 	(t1)->tm_year == (t2)->tm_year && \
1286 	(t1)->tm_mon == (t2)->tm_mon && \
1287 	(t1)->tm_mday == (t2)->tm_mday && \
1288 	(t1)->tm_hour == (t2)->tm_hour && \
1289 	(t1)->tm_min == (t2)->tm_min)
1290 
1291 #define	tm_setup(tp, yr, mon, dy, hr, min, dst) \
1292 	(tp)->tm_year = yr; \
1293 	(tp)->tm_mon = mon; \
1294 	(tp)->tm_mday = dy; \
1295 	(tp)->tm_hour = hr; \
1296 	(tp)->tm_min = min; \
1297 	(tp)->tm_isdst = dst; \
1298 	(tp)->tm_sec = 0; \
1299 	(tp)->tm_wday = 0; \
1300 	(tp)->tm_yday = 0;
1301 
1302 /*
1303  * modification for bugid 1104537. the second argument to next_time is
1304  * now the value of time(2) to be used. if this is 0, then use the
1305  * current time. otherwise, the second argument is the time from which to
1306  * calculate things. this is useful to correct situations where you've
1307  * gone backwards in time (I.e. the system's internal clock is correcting
1308  * itself backwards).
1309  */
1310 
1311 static time_t
1312 next_time(struct event *e, time_t tflag)
1313 {
1314 	/*
1315 	 * returns the integer time for the next occurance of event e.
1316 	 * the following fields have ranges as indicated:
1317 	 * PRGM  | min	hour	day of month	mon	day of week
1318 	 * ------|-------------------------------------------------------
1319 	 * cron  | 0-59	0-23	    1-31	1-12	0-6 (0=sunday)
1320 	 * time  | 0-59	0-23	    1-31	0-11	0-6 (0=sunday)
1321 	 * NOTE: this routine is hard to understand.
1322 	 */
1323 
1324 	struct tm *tm, ref_tm, tmp, tmp1, tmp2;
1325 	int tm_mon, tm_mday, tm_wday, wday, m, min, h, hr, carry, day, days,
1326 	d1, day1, carry1, d2, day2, carry2, daysahead, mon, yr, db, wd, today;
1327 	time_t t, ref_t, t1, t2, zone_start;
1328 	int fallback;
1329 	extern int days_btwn(int, int, int, int, int, int);
1330 
1331 	if (tflag == 0) {
1332 		t = time(NULL);	/* original way of doing things	*/
1333 	} else {
1334 		t =  tflag;
1335 	}
1336 
1337 	tm = &ref_tm;	/* use a local variable and call localtime_r() */
1338 	ref_t = t;	/* keep a copy of the reference time */
1339 
1340 recalc:
1341 	fallback = 0;
1342 
1343 	(void) localtime_r(&t, tm);
1344 
1345 	if (daylight) {
1346 		tmp = *tm;
1347 		tmp.tm_isdst = (tm->tm_isdst > 0 ? 0 : 1);
1348 		t1 = xmktime(&tmp);
1349 		/*
1350 		 * see if we will have timezone switch over, and clock will
1351 		 * fall back. zone_start will hold the time when it happens
1352 		 * (ie time of PST -> PDT switch over).
1353 		 */
1354 		if (tm->tm_isdst != tmp.tm_isdst &&
1355 		    (t1 - t) == (timezone - altzone) &&
1356 		    tm_cmp(tm, &tmp)) {
1357 			zone_start = get_switching_time(tmp.tm_isdst, t);
1358 			fallback = 1;
1359 		}
1360 	}
1361 
1362 	tm_mon = next_ge(tm->tm_mon+1, e->of.ct.month) - 1;	/* 0-11 */
1363 	tm_mday = next_ge(tm->tm_mday, e->of.ct.daymon);	/* 1-31 */
1364 	tm_wday = next_ge(tm->tm_wday, e->of.ct.dayweek);	/* 0-6	*/
1365 	today = TRUE;
1366 	if ((strcmp(e->of.ct.daymon, "*") == 0 && tm->tm_wday != tm_wday) ||
1367 	    (strcmp(e->of.ct.dayweek, "*") == 0 && tm->tm_mday != tm_mday) ||
1368 	    (tm->tm_mday != tm_mday && tm->tm_wday != tm_wday) ||
1369 	    (tm->tm_mon != tm_mon)) {
1370 		today = FALSE;
1371 	}
1372 	m = tm->tm_min + (t == ref_t ? 1 : 0);
1373 	if ((tm->tm_hour + 1) <= next_ge(tm->tm_hour, e->of.ct.hour)) {
1374 		m = 0;
1375 	}
1376 	min = next_ge(m%60, e->of.ct.minute);
1377 	carry = (min < m) ? 1 : 0;
1378 	h = tm->tm_hour + carry;
1379 	hr = next_ge(h%24, e->of.ct.hour);
1380 	carry = (hr < h) ? 1 : 0;
1381 
1382 	if (carry == 0 && today) {
1383 		/* this event must occur today */
1384 		tm_setup(&tmp, tm->tm_year, tm->tm_mon, tm->tm_mday,
1385 			hr, min, tm->tm_isdst);
1386 		tmp1 = tmp;
1387 		if ((t1 = xmktime(&tmp1)) == (time_t)-1) {
1388 			return (0);
1389 		}
1390 		if (daylight && tmp.tm_isdst != tmp1.tm_isdst) {
1391 			/* In case we are falling back */
1392 			if (fallback) {
1393 				/* we may need to run the job once more. */
1394 				t = zone_start;
1395 				goto recalc;
1396 			}
1397 
1398 			/*
1399 			 * In case we are not in falling back period,
1400 			 * calculate the time assuming the DST. If the
1401 			 * date/time is not altered by mktime, it is the
1402 			 * time to execute the job.
1403 			 */
1404 			tmp2 = tmp;
1405 			tmp2.tm_isdst = tmp1.tm_isdst;
1406 			if ((t1 = xmktime(&tmp2)) == (time_t)-1) {
1407 				return (0);
1408 			}
1409 			if (tmp1.tm_isdst == tmp2.tm_isdst &&
1410 			    tm_cmp(&tmp, &tmp2)) {
1411 				/*
1412 				 * We got a valid time.
1413 				 */
1414 				return (t1);
1415 			} else {
1416 				/*
1417 				 * If the date does not match even if
1418 				 * we assume the alternate timezone, then
1419 				 * it must be the invalid time. eg
1420 				 * 2am while switching 1:59am to 3am.
1421 				 * t1 should point the time before the
1422 				 * switching over as we've calculate the
1423 				 * time with assuming alternate zone.
1424 				 */
1425 				if (tmp1.tm_isdst != tmp2.tm_isdst) {
1426 					t = get_switching_time(tmp1.tm_isdst,
1427 						t1);
1428 				} else {
1429 					/* does this really happen? */
1430 					t = get_switching_time(tmp1.tm_isdst,
1431 						t1 - abs(timezone - altzone));
1432 				}
1433 				if (t == (time_t)-1)
1434 					return (0);
1435 			}
1436 			goto recalc;
1437 		}
1438 		if (tm_cmp(&tmp, &tmp1)) {
1439 			/* got valid time */
1440 			return (t1);
1441 		} else {
1442 			/*
1443 			 * This should never happen, but just in
1444 			 * case, we fall back to the old code.
1445 			 */
1446 			if (tm->tm_min > min) {
1447 				t += (time_t)(hr-tm->tm_hour-1) * HOUR +
1448 					(time_t)(60-tm->tm_min+min) * MINUTE;
1449 			} else {
1450 				t += (time_t)(hr-tm->tm_hour) * HOUR +
1451 					(time_t)(min-tm->tm_min) * MINUTE;
1452 			}
1453 			t1 = t;
1454 			t -= (time_t)tm->tm_sec;
1455 			(void) localtime_r(&t, &tmp);
1456 			if ((tm->tm_isdst == 0) && (tmp.tm_isdst > 0))
1457 				t -= (timezone - altzone);
1458 			return ((t <= ref_t) ? t1 : t);
1459 		}
1460 	}
1461 
1462 	/*
1463 	 * Job won't run today, however if we have a switch over within
1464 	 * one hour and we will have one hour time drifting back in this
1465 	 * period, we may need to run the job one more time if the job was
1466 	 * set to run on this hour of clock.
1467 	 */
1468 	if (fallback) {
1469 		t = zone_start;
1470 		goto recalc;
1471 	}
1472 
1473 	min = next_ge(0, e->of.ct.minute);
1474 	hr = next_ge(0, e->of.ct.hour);
1475 
1476 	/*
1477 	 * calculate the date of the next occurance of this event, which
1478 	 * will be on a different day than the current
1479 	 */
1480 
1481 	/* check monthly day specification	*/
1482 	d1 = tm->tm_mday+1;
1483 	day1 = next_ge((d1-1)%days_in_mon(tm->tm_mon, tm->tm_year)+1,
1484 			e->of.ct.daymon);
1485 	carry1 = (day1 < d1) ? 1 : 0;
1486 
1487 	/* check weekly day specification	*/
1488 	d2 = tm->tm_wday+1;
1489 	wday = next_ge(d2%7, e->of.ct.dayweek);
1490 	if (wday < d2)
1491 		daysahead = 7 - d2 + wday;
1492 	else
1493 		daysahead = wday - d2;
1494 	day2 = (d1+daysahead-1)%days_in_mon(tm->tm_mon, tm->tm_year)+1;
1495 	carry2 = (day2 < d1) ? 1 : 0;
1496 
1497 	/*
1498 	 *	based on their respective specifications, day1, and day2 give
1499 	 *	the day of the month for the next occurance of this event.
1500 	 */
1501 	if ((strcmp(e->of.ct.daymon, "*") == 0) &&
1502 	    (strcmp(e->of.ct.dayweek, "*") != 0)) {
1503 		day1 = day2;
1504 		carry1 = carry2;
1505 	}
1506 	if ((strcmp(e->of.ct.daymon, "*") != 0) &&
1507 	    (strcmp(e->of.ct.dayweek, "*") == 0)) {
1508 		day2 = day1;
1509 		carry2 = carry1;
1510 	}
1511 
1512 	yr = tm->tm_year;
1513 	if ((carry1 && carry2) || (tm->tm_mon != tm_mon)) {
1514 		/* event does not occur in this month	*/
1515 		m = tm->tm_mon+1;
1516 		mon = next_ge(m%12+1, e->of.ct.month) - 1;	/* 0..11 */
1517 		carry = (mon < m) ? 1 : 0;
1518 		yr += carry;
1519 		/* recompute day1 and day2	*/
1520 		day1 = next_ge(1, e->of.ct.daymon);
1521 		db = days_btwn(tm->tm_mon, tm->tm_mday, tm->tm_year, mon,
1522 				1, yr) + 1;
1523 		wd = (tm->tm_wday+db)%7;
1524 		/* wd is the day of the week of the first of month mon	*/
1525 		wday = next_ge(wd, e->of.ct.dayweek);
1526 		if (wday < wd)
1527 			day2 = 1 + 7 - wd + wday;
1528 		else
1529 			day2 = 1 + wday - wd;
1530 		if ((strcmp(e->of.ct.daymon, "*") != 0) &&
1531 		    (strcmp(e->of.ct.dayweek, "*") == 0))
1532 			day2 = day1;
1533 		if ((strcmp(e->of.ct.daymon, "*") == 0) &&
1534 		    (strcmp(e->of.ct.dayweek, "*") != 0))
1535 			day1 = day2;
1536 		day = (day1 < day2) ? day1 : day2;
1537 	} else {			/* event occurs in this month	*/
1538 		mon = tm->tm_mon;
1539 		if (!carry1 && !carry2)
1540 			day = (day1 < day2) ? day1 : day2;
1541 		else if (!carry1)
1542 			day = day1;
1543 		else
1544 			day = day2;
1545 	}
1546 
1547 	/*
1548 	 * now that we have the min, hr, day, mon, yr of the next event,
1549 	 * figure out what time that turns out to be.
1550 	 */
1551 	tm_setup(&tmp, yr, mon, day, hr, min, -1);
1552 	tmp2 = tmp;
1553 	if ((t1 = xmktime(&tmp2)) == (time_t)-1) {
1554 		return (0);
1555 	}
1556 	if (tm_cmp(&tmp, &tmp2)) {
1557 		/*
1558 		 * mktime returns clock for the current time zone. If the
1559 		 * target date was in fallback period, it needs to be adjusted
1560 		 * to the time comes first.
1561 		 * Suppose, we are at Jan and scheduling job at 1:30am10/26/03.
1562 		 * mktime returns the time in PST, but 1:30am in PDT comes
1563 		 * first. So reverse the tm_isdst, and see if we have such
1564 		 * time/date.
1565 		 */
1566 		if (daylight) {
1567 			int dst = tmp2.tm_isdst;
1568 
1569 			tmp2 = tmp;
1570 			tmp2.tm_isdst = (dst > 0 ? 0 : 1);
1571 			if ((t2 = xmktime(&tmp2)) == (time_t)-1) {
1572 				return (0);
1573 			}
1574 			if (tm_cmp(&tmp, &tmp2)) {
1575 				/*
1576 				 * same time/date found in the opposite zone.
1577 				 * check the clock to see which comes early.
1578 				 */
1579 				if (t2 > ref_t && t2 < t1) {
1580 					t1 = t2;
1581 				}
1582 			}
1583 		}
1584 		return (t1);
1585 	} else {
1586 		/*
1587 		 * mktime has set different time/date for the given date.
1588 		 * This means that the next job is scheduled to be run on the
1589 		 * invalid time. There are three possible invalid date/time.
1590 		 * 1. Non existing day of the month. such as April 31th.
1591 		 * 2. Feb 29th in the non-leap year.
1592 		 * 3. Time gap during the DST switch over.
1593 		 */
1594 		d1 = days_in_mon(mon, yr);
1595 		if ((mon != 1 && day > d1) || (mon == 1 && day > 29)) {
1596 			/*
1597 			 * see if we have got a specific date which
1598 			 * is invalid.
1599 			 */
1600 			if (strcmp(e->of.ct.dayweek, "*") == 0 &&
1601 			    mon == (next_ge((mon+1)%12+1, e->of.ct.month)-1) &&
1602 			    day <= next_ge(1, e->of.ct.daymon)) {
1603 				/* job never run */
1604 				return (0);
1605 			}
1606 			/*
1607 			 * Since the day has gone invalid, we need to go to
1608 			 * next month, and recalcuate the first occurrence.
1609 			 * eg the cron tab such as:
1610 			 * 0 0 1,15,31 1,2,3,4,5 * /usr/bin....
1611 			 * 2/31 is invalid, so the next job is 3/1.
1612 			 */
1613 			tmp2 = tmp;
1614 			tmp2.tm_min = 0;
1615 			tmp2.tm_hour = 0;
1616 			tmp2.tm_mday = 1; /* 1st day of the month */
1617 			if (mon == 11) {
1618 				tmp2.tm_mon = 0;
1619 				tmp2.tm_year = yr + 1;
1620 			} else {
1621 				tmp2.tm_mon = mon + 1;
1622 			}
1623 			if ((t = xmktime(&tmp2)) == (time_t)-1) {
1624 				return (0);
1625 			}
1626 		} else if (mon == 1 && day > d1) {
1627 			/*
1628 			 * ie 29th in the non-leap year. Forwarding the
1629 			 * clock to Feb 29th 00:00 (March 1st), and recalculate
1630 			 * the next time.
1631 			 */
1632 			tmp2 = tmp;
1633 			tmp2.tm_min = 0;
1634 			tmp2.tm_hour = 0;
1635 			if ((t = xmktime(&tmp2)) == (time_t)-1) {
1636 				return (0);
1637 			}
1638 		} else if (daylight) {
1639 			/*
1640 			 * Non existing time, eg 2am PST during summer time
1641 			 * switch.
1642 			 * We need to get the correct isdst which we are
1643 			 * swithing to, by adding time difference to make sure
1644 			 * that t2 is in the zone being switched.
1645 			 */
1646 			t2 = t1;
1647 			t2 += abs(timezone - altzone);
1648 			(void) localtime_r(&t2, &tmp2);
1649 			zone_start = get_switching_time(tmp2.tm_isdst,
1650 						t1 - abs(timezone - altzone));
1651 			if (zone_start == (time_t)-1) {
1652 				return (0);
1653 			}
1654 			t = zone_start;
1655 		} else {
1656 			/*
1657 			 * This should never happen, but fall back to the
1658 			 * old code.
1659 			 */
1660 			days = days_btwn(tm->tm_mon,
1661 				tm->tm_mday, tm->tm_year, mon, day, yr);
1662 			t += (time_t)(23-tm->tm_hour)*HOUR
1663 				+ (time_t)(60-tm->tm_min)*MINUTE
1664 				+ (time_t)hr*HOUR + (time_t)min*MINUTE
1665 				+ (time_t)days*DAY;
1666 			t1 = t;
1667 			t -= (time_t)tm->tm_sec;
1668 			(void) localtime_r(&t, &tmp);
1669 			if ((tm->tm_isdst == 0) && (tmp.tm_isdst > 0))
1670 				t -= (timezone - altzone);
1671 			return (t <= ref_t ? t1 : t);
1672 		}
1673 		goto recalc;
1674 	}
1675 	/*NOTREACHED*/
1676 }
1677 
1678 /*
1679  * This returns TOD in time_t that zone switch will happen, and this
1680  * will be called when clock fallback is about to happen.
1681  * (ie 30minutes before the time of PST -> PDT switch. 2:00 AM PST
1682  * will fall back to 1:00 PDT. So this function will be called only
1683  * for the time between 1:00 AM PST and 2:00 PST(1:00 PST)).
1684  * First goes through the common time differences to see if zone
1685  * switch happens at those minutes later. If not, check every minutes
1686  * until 6 hours ahead see if it happens(We might have 45minutes
1687  * fallback).
1688  */
1689 static time_t
1690 get_switching_time(int to_dst, time_t t_ref)
1691 {
1692 	time_t t, t1;
1693 	struct tm tmp, tmp1;
1694 	int hints[] = { 60, 120, 30, 90, 0}; /* minutes */
1695 	int i;
1696 
1697 	(void) localtime_r(&t_ref, &tmp);
1698 	tmp1 = tmp;
1699 	tmp1.tm_sec = 0;
1700 	tmp1.tm_min = 0;
1701 	if ((t = xmktime(&tmp1)) == (time_t)-1)
1702 		return ((time_t)-1);
1703 
1704 	/* fast path */
1705 	for (i = 0; hints[i] != 0; i++) {
1706 		t1 = t + hints[i] * 60;
1707 		(void) localtime_r(&t1, &tmp1);
1708 		if (tmp1.tm_isdst == to_dst) {
1709 			t1--;
1710 			(void) localtime_r(&t1, &tmp1);
1711 			if (tmp1.tm_isdst != to_dst) {
1712 				return (t1 + 1);
1713 			}
1714 		}
1715 	}
1716 
1717 	/* ugly, but don't know other than this. */
1718 	tmp1 = tmp;
1719 	tmp1.tm_sec = 0;
1720 	if ((t = xmktime(&tmp1)) == (time_t)-1)
1721 		return ((time_t)-1);
1722 	while (t < (t_ref + 6*60*60)) { /* 6 hours should be enough */
1723 		t += 60; /* at least one minute, I assume */
1724 		(void) localtime_r(&t, &tmp);
1725 		if (tmp.tm_isdst == to_dst)
1726 			return (t);
1727 	}
1728 	return ((time_t)-1);
1729 }
1730 
1731 static time_t
1732 xmktime(struct tm *tmp)
1733 {
1734 	time_t ret;
1735 
1736 	if ((ret = mktime(tmp)) == (time_t)-1) {
1737 		if (errno == EOVERFLOW) {
1738 			return ((time_t)-1);
1739 		}
1740 		crabort("internal error: mktime failed",
1741 			REMOVE_FIFO|CONSOLE_MSG);
1742 	}
1743 	return (ret);
1744 }
1745 
1746 #define	DUMMY	100
1747 
1748 static int
1749 next_ge(int current, char *list)
1750 {
1751 	/*
1752 	 * list is a character field as in a crontab file;
1753 	 * for example: "40, 20, 50-10"
1754 	 * next_ge returns the next number in the list that is
1755 	 * greater than  or equal to current. if no numbers of list
1756 	 * are >= current, the smallest element of list is returned.
1757 	 * NOTE: current must be in the appropriate range.
1758 	 */
1759 
1760 	char *ptr;
1761 	int n, n2, min, min_gt;
1762 
1763 	if (strcmp(list, "*") == 0)
1764 		return (current);
1765 	ptr = list;
1766 	min = DUMMY;
1767 	min_gt = DUMMY;
1768 	for (;;) {
1769 		if ((n = (int)num(&ptr)) == current)
1770 			return (current);
1771 		if (n < min)
1772 			min = n;
1773 		if ((n > current) && (n < min_gt))
1774 			min_gt = n;
1775 		if (*ptr == '-') {
1776 			ptr++;
1777 			if ((n2 = (int)num(&ptr)) > n) {
1778 				if ((current > n) && (current <= n2))
1779 					return (current);
1780 			} else {	/* range that wraps around */
1781 				if (current > n)
1782 					return (current);
1783 				if (current <= n2)
1784 					return (current);
1785 			}
1786 		}
1787 		if (*ptr == '\0')
1788 			break;
1789 		ptr += 1;
1790 	}
1791 	if (min_gt != DUMMY)
1792 		return (min_gt);
1793 	else
1794 		return (min);
1795 }
1796 
1797 static void
1798 free_if_unused(struct usr *u)
1799 {
1800 	struct usr *cur, *prev;
1801 	/*
1802 	 *	To make sure a usr structure is idle we must check that
1803 	 *	there are no at jobs queued for the user; the user does
1804 	 *	not have a crontab, and also that there are no running at
1805 	 *	or cron jobs (since the runinfo structure also has a
1806 	 *	pointer to the usr structure).
1807 	 */
1808 	if (!u->ctexists && u->atevents == NULL &&
1809 	    u->cruncnt == 0 && u->aruncnt == 0) {
1810 #ifdef DEBUG
1811 		(void) fprintf(stderr, "%s removed from usr list\n", u->name);
1812 #endif
1813 		for (cur = uhead, prev = NULL;
1814 			cur != u;
1815 			prev = cur, cur = cur->nextusr) {
1816 			if (cur == NULL) {
1817 				return;
1818 			}
1819 		}
1820 
1821 		if (prev == NULL)
1822 			uhead = u->nextusr;
1823 		else
1824 			prev->nextusr = u->nextusr;
1825 		free(u->name);
1826 		free(u->home);
1827 		free(u);
1828 	}
1829 }
1830 
1831 static void
1832 del_atjob(char *name, char *usrname)
1833 {
1834 
1835 	struct	event	*e, *eprev;
1836 	struct	usr	*u;
1837 
1838 	if ((u = find_usr(usrname)) == NULL)
1839 		return;
1840 	e = u->atevents;
1841 	eprev = NULL;
1842 	while (e != NULL) {
1843 		if (strcmp(name, e->cmd) == 0) {
1844 			if (next_event == e)
1845 				next_event = NULL;
1846 			if (eprev == NULL)
1847 				u->atevents = e->link;
1848 			else
1849 				eprev->link = e->link;
1850 			el_remove(e->of.at.eventid, 1);
1851 			free(e->cmd);
1852 			free(e);
1853 			break;
1854 		} else {
1855 			eprev = e;
1856 			e = e->link;
1857 		}
1858 	}
1859 
1860 	free_if_unused(u);
1861 }
1862 
1863 static void
1864 del_ctab(char *name)
1865 {
1866 
1867 	struct	usr *u;
1868 
1869 	if ((u = find_usr(name)) == NULL)
1870 		return;
1871 	rm_ctevents(u);
1872 	el_remove(u->ctid, 0);
1873 	u->ctid = 0;
1874 	u->ctexists = 0;
1875 
1876 	free_if_unused(u);
1877 }
1878 
1879 static void
1880 rm_ctevents(struct usr *u)
1881 {
1882 	struct event *e2, *e3;
1883 
1884 	/*
1885 	 * see if the next event (to be run by cron) is a cronevent
1886 	 * owned by this user.
1887 	 */
1888 
1889 	if ((next_event != NULL) &&
1890 	    (next_event->etype == CRONEVENT) &&
1891 	    (next_event->u == u)) {
1892 		next_event = NULL;
1893 	}
1894 	e2 = u->ctevents;
1895 	while (e2 != NULL) {
1896 		free(e2->cmd);
1897 		free(e2->of.ct.minute);
1898 		free(e2->of.ct.hour);
1899 		free(e2->of.ct.daymon);
1900 		free(e2->of.ct.month);
1901 		free(e2->of.ct.dayweek);
1902 		if (e2->of.ct.input != NULL)
1903 			free(e2->of.ct.input);
1904 		e3 = e2->link;
1905 		free(e2);
1906 		e2 = e3;
1907 	}
1908 	u->ctevents = NULL;
1909 }
1910 
1911 
1912 static struct usr *
1913 find_usr(char *uname)
1914 {
1915 	struct usr *u;
1916 
1917 	u = uhead;
1918 	while (u != NULL) {
1919 		if (strcmp(u->name, uname) == 0)
1920 			return (u);
1921 		u = u->nextusr;
1922 	}
1923 	return (NULL);
1924 }
1925 
1926 /*
1927  * Execute cron command or at/batch job.
1928  * If ever a premature return is added to this function pay attention to
1929  * free at_cmdfile and outfile plus jobname buffers of the runinfo structure.
1930  */
1931 static int
1932 ex(struct event *e)
1933 {
1934 	int r;
1935 	int fd;
1936 	pid_t rfork;
1937 	FILE *atcmdfp;
1938 	char mailvar[4];
1939 	char *at_cmdfile = NULL;
1940 	struct stat buf;
1941 	struct queue *qp;
1942 	struct runinfo *rp;
1943 	struct project proj, *pproj = NULL;
1944 	char mybuf[PROJECT_BUFSZ];
1945 	char mybuf2[PROJECT_BUFSZ];
1946 	char *tmpfile;
1947 	FILE *fptr;
1948 	time_t dhltime;
1949 	projid_t projid;
1950 	int projflag = 0;
1951 
1952 	qp = &qt[e->etype];	/* set pointer to queue defs */
1953 	if (qp->nrun >= qp->njob) {
1954 		msg("%c queue max run limit reached", e->etype+'a');
1955 		resched(qp->nwait);
1956 		return (0);
1957 	}
1958 	if ((rp = rinfo_get(0)) == NULL) {
1959 		msg("MAXRUN (%d) procs reached", MAXRUN);
1960 		resched(qp->nwait);
1961 		return (0);
1962 	}
1963 
1964 #ifdef ATLIMIT
1965 	if ((e->u)->uid != 0 && (e->u)->aruncnt >= ATLIMIT) {
1966 		msg("ATLIMIT (%d) reached for uid %d",
1967 			ATLIMIT, (e->u)->uid);
1968 		rinfo_free(rp);
1969 		resched(qp->nwait);
1970 		return (0);
1971 	}
1972 #endif
1973 #ifdef CRONLIMIT
1974 	if ((e->u)->uid != 0 && (e->u)->cruncnt >= CRONLIMIT) {
1975 		msg("CRONLIMIT (%d) reached for uid %d",
1976 			CRONLIMIT, (e->u)->uid);
1977 		rinfo_free(rp);
1978 		resched(qp->nwait);
1979 		return (0);
1980 	}
1981 #endif
1982 	if ((e->u)->uid == 0) {	/* set default path */
1983 		/* path settable in defaults file */
1984 		envinit[2] = supath;
1985 	} else {
1986 		envinit[2] = path;
1987 	}
1988 
1989 	/*
1990 	 * the tempnam() function uses malloc(3C) to allocate space for the
1991 	 * constructed file name, and returns a pointer to this area, which
1992 	 * is assigned to rp->outfile. Here rp->outfile is not overwritten.
1993 	 */
1994 
1995 	rp->outfile = tempnam(TMPDIR, PFX);
1996 	rp->jobtype = e->etype;
1997 	if (e->etype == CRONEVENT) {
1998 		rp->jobname = xmalloc(strlen(e->cmd)+1);
1999 		(void) strcpy(rp->jobname, e->cmd);
2000 		/* "cron" jobs only produce mail if there's output */
2001 		rp->mailwhendone = 0;
2002 	} else {
2003 		at_cmdfile = xmalloc(strlen(ATDIR)+strlen(e->cmd)+2);
2004 		(void) sprintf(at_cmdfile, "%s/%s", ATDIR, e->cmd);
2005 		if ((atcmdfp = fopen(at_cmdfile, "r")) == NULL) {
2006 			if (errno == ENAMETOOLONG) {
2007 				if (chdir(ATDIR) == 0)
2008 					cron_unlink(e->cmd);
2009 			} else {
2010 				cron_unlink(at_cmdfile);
2011 			}
2012 			mail((e->u)->name, BADJOBOPEN, ERR_CANTEXECAT);
2013 			free(at_cmdfile);
2014 			rinfo_free(rp);
2015 			return (0);
2016 		}
2017 		rp->jobname = xmalloc(strlen(at_cmdfile)+1);
2018 		(void) strcpy(rp->jobname, at_cmdfile);
2019 
2020 		/*
2021 		 * Skip over the first two lines.
2022 		 */
2023 		(void) fscanf(atcmdfp, "%*[^\n]\n");
2024 		(void) fscanf(atcmdfp, "%*[^\n]\n");
2025 		if (fscanf(atcmdfp, ": notify by mail: %3s%*[^\n]\n",
2026 			mailvar) == 1) {
2027 			/*
2028 			 * Check to see if we should always send mail
2029 			 * to the owner.
2030 			 */
2031 			rp->mailwhendone = (strcmp(mailvar, "yes") == 0);
2032 		} else {
2033 			rp->mailwhendone = 0;
2034 		}
2035 
2036 		if (fscanf(atcmdfp, "\n: project: %d\n", &projid) == 1) {
2037 			projflag = 1;
2038 		}
2039 		(void) fclose(atcmdfp);
2040 	}
2041 
2042 	/*
2043 	 * we make sure that the system time
2044 	 * hasn't drifted backwards. if it has, el_add() is now
2045 	 * called, to make sure that the event queue is back in order,
2046 	 * and we set the delayed flag. cron will pick up the request
2047 	 * later on at the proper time.
2048 	 */
2049 	dhltime = time(NULL);
2050 	if ((dhltime - e->time) < 0) {
2051 		msg("clock time drifted backwards!\n");
2052 		if (next_event->etype == CRONEVENT) {
2053 			msg("correcting cron event\n");
2054 			next_event->time = next_time(next_event, dhltime);
2055 			el_add(next_event, next_event->time,
2056 				(next_event->u)->ctid);
2057 		} else { /* etype == ATEVENT */
2058 			msg("correcting batch event\n");
2059 			el_add(next_event, next_event->time,
2060 				next_event->of.at.eventid);
2061 		}
2062 		delayed++;
2063 		t_old = time(NULL);
2064 		free(at_cmdfile);
2065 		rinfo_free(rp);
2066 		return (0);
2067 	}
2068 
2069 	if ((rfork = fork()) == (pid_t)-1) {
2070 		reap_child();
2071 		if ((rfork = fork()) == (pid_t)-1) {
2072 			msg("cannot fork");
2073 			free(at_cmdfile);
2074 			rinfo_free(rp);
2075 			resched(60);
2076 			(void) sleep(30);
2077 			return (0);
2078 		}
2079 	}
2080 	if (rfork) {		/* parent process */
2081 		contract_abandon_latest(rfork);
2082 
2083 		++qp->nrun;
2084 		rp->pid = rfork;
2085 		rp->que = e->etype;
2086 		if (e->etype != CRONEVENT)
2087 			(e->u)->aruncnt++;
2088 		else
2089 			(e->u)->cruncnt++;
2090 		rp->rusr = (e->u);
2091 		logit(BCHAR, rp, 0);
2092 		free(at_cmdfile);
2093 
2094 		return (0);
2095 	}
2096 
2097 	child_sigreset();
2098 	contract_clear_template();
2099 
2100 	if (e->etype != CRONEVENT) {
2101 		/* open jobfile as stdin to shell */
2102 		if (stat(at_cmdfile, &buf)) {
2103 			if (errno == ENAMETOOLONG) {
2104 				if (chdir(ATDIR) == 0)
2105 					cron_unlink(e->cmd);
2106 			} else
2107 				cron_unlink(at_cmdfile);
2108 			mail((e->u)->name, BADJOBOPEN, ERR_CANTEXECCRON);
2109 			exit(1);
2110 		}
2111 		if (!(buf.st_mode&ISUID)) {
2112 			/*
2113 			 * if setuid bit off, original owner has
2114 			 * given this file to someone else
2115 			 */
2116 			cron_unlink(at_cmdfile);
2117 			exit(1);
2118 		}
2119 		if ((fd = open(at_cmdfile, O_RDONLY)) == -1) {
2120 			mail((e->u)->name, BADJOBOPEN, ERR_CANTEXECCRON);
2121 			cron_unlink(at_cmdfile);
2122 			exit(1);
2123 		}
2124 		if (fd != 0) {
2125 			(void) dup2(fd, 0);
2126 			(void) close(fd);
2127 		}
2128 		/*
2129 		 * retrieve the project id of the at job and convert it
2130 		 * to a project name.  fail if it's not a valid project
2131 		 * or if the user isn't a member of the project.
2132 		 */
2133 		if (projflag == 1) {
2134 			if ((pproj = getprojbyid(projid, &proj,
2135 			    (void *)&mybuf, sizeof (mybuf))) == NULL ||
2136 			    !inproj(e->u->name, pproj->pj_name,
2137 			    mybuf2, sizeof (mybuf2))) {
2138 				cron_unlink(at_cmdfile);
2139 				mail((e->u)->name, BADPROJID, ERR_CANTEXECAT);
2140 				exit(1);
2141 			}
2142 		}
2143 	}
2144 
2145 	/*
2146 	 * Put process in a new session, and create a new task.
2147 	 */
2148 	if (setsid() < 0) {
2149 		msg("setsid failed with errno = %d. job failed (%s)"
2150 		    " for user %s", errno, e->cmd, e->u->name);
2151 		if (e->etype != CRONEVENT)
2152 			cron_unlink(at_cmdfile);
2153 		exit(1);
2154 	}
2155 
2156 	/*
2157 	 * set correct user identification and check his account
2158 	 */
2159 	r = set_user_cred(e->u, pproj);
2160 	if (r == VUC_EXPIRED) {
2161 		msg("user (%s) account is expired", e->u->name);
2162 		audit_cron_user_acct_expired(e->u->name);
2163 		clean_out_user(e->u);
2164 		exit(1);
2165 	}
2166 	if (r == VUC_NEW_AUTH) {
2167 		msg("user (%s) password has expired", e->u->name);
2168 		audit_cron_user_acct_expired(e->u->name);
2169 		clean_out_user(e->u);
2170 		exit(1);
2171 	}
2172 	if (r != VUC_OK) {
2173 		msg("bad user (%s)", e->u->name);
2174 		audit_cron_bad_user(e->u->name);
2175 		clean_out_user(e->u);
2176 		exit(1);
2177 	}
2178 	/*
2179 	 * check user and initialize the supplementary group access list.
2180 	 * bugid 1230784: deleted from parent to avoid cron hang. Now
2181 	 * only child handles the call.
2182 	 */
2183 
2184 	if (verify_user_cred(e->u) != VUC_OK ||
2185 	    setgid(e->u->gid) == -1 ||
2186 	    initgroups(e->u->name, e->u->gid) == -1) {
2187 		msg("bad user (%s) or setgid failed (%s)",
2188 			e->u->name, e->u->name);
2189 		audit_cron_bad_user(e->u->name);
2190 		clean_out_user(e->u);
2191 		exit(1);
2192 	}
2193 
2194 	if (e->etype != CRONEVENT) {
2195 		r = audit_cron_session(e->u->name, NULL,
2196 					e->u->uid, e->u->gid,
2197 					at_cmdfile);
2198 		cron_unlink(at_cmdfile);
2199 	} else {
2200 		r = audit_cron_session(e->u->name, CRONDIR,
2201 					e->u->uid, e->u->gid,
2202 					NULL);
2203 	}
2204 	if (r != 0) {
2205 		msg("cron audit problem. job failed (%s) for user %s",
2206 			e->cmd, e->u->name);
2207 		exit(1);
2208 	}
2209 
2210 	audit_cron_new_job(e->cmd, e->etype, (void *)e);
2211 
2212 	if (setuid(e->u->uid) == -1)  {
2213 		msg("setuid failed (%s)", e->u->name);
2214 		clean_out_user(e->u);
2215 		exit(1);
2216 	}
2217 
2218 	if (e->etype == CRONEVENT) {
2219 		/* check for standard input to command	*/
2220 		if (e->of.ct.input != NULL) {
2221 			if ((tmpfile = strdup(TMPINFILE)) == NULL) {
2222 				mail((e->u)->name, MALLOCERR,
2223 					ERR_CANTEXECCRON);
2224 				exit(1);
2225 			}
2226 			if ((fd = mkstemp(tmpfile)) == -1 ||
2227 				(fptr = fdopen(fd, "w")) == NULL) {
2228 				mail((e->u)->name, NOSTDIN,
2229 					ERR_CANTEXECCRON);
2230 				cron_unlink(tmpfile);
2231 				free(tmpfile);
2232 				exit(1);
2233 			}
2234 			if ((fwrite(e->of.ct.input, sizeof (char),
2235 				strlen(e->of.ct.input), fptr)) !=
2236 					strlen(e->of.ct.input)) {
2237 				mail((e->u)->name, NOSTDIN, ERR_CANTEXECCRON);
2238 				cron_unlink(tmpfile);
2239 				free(tmpfile);
2240 				(void) close(fd);
2241 				(void) fclose(fptr);
2242 				exit(1);
2243 			}
2244 			if (fseek(fptr, (off_t)0, SEEK_SET) != -1) {
2245 				if (fd != 0) {
2246 					(void) dup2(fd, 0);
2247 					(void) close(fd);
2248 				}
2249 			}
2250 			cron_unlink(tmpfile);
2251 			free(tmpfile);
2252 			(void) fclose(fptr);
2253 		} else if ((fd = open("/dev/null", O_RDONLY)) > 0) {
2254 			(void) dup2(fd, 0);
2255 			(void) close(fd);
2256 		}
2257 	}
2258 
2259 	/* redirect stdout and stderr for the shell	*/
2260 	if ((fd = open(rp->outfile, O_WRONLY|O_CREAT|O_EXCL, OUTMODE)) == 1)
2261 		fd = open("/dev/null", O_WRONLY);
2262 
2263 	if (fd >= 0 && fd != 1)
2264 		(void) dup2(fd, 1);
2265 
2266 	if (fd >= 0 && fd != 2) {
2267 		(void) dup2(fd, 2);
2268 		if (fd != 1)
2269 			(void) close(fd);
2270 	}
2271 
2272 	(void) strlcat(homedir, (e->u)->home, sizeof (homedir));
2273 	(void) strlcat(logname, (e->u)->name, sizeof (logname));
2274 	environ = envinit;
2275 	if (chdir((e->u)->home) == -1) {
2276 		mail((e->u)->name, CANTCDHOME,
2277 			e->etype == CRONEVENT ? ERR_CANTEXECCRON :
2278 				ERR_CANTEXECAT);
2279 		exit(1);
2280 	}
2281 #ifdef TESTING
2282 	exit(1);
2283 #endif
2284 	/*
2285 	 * make sure that all file descriptors EXCEPT 0, 1 and 2
2286 	 * will be closed.
2287 	 */
2288 	closefrom(3);
2289 
2290 	if ((e->u)->uid != 0)
2291 		(void) nice(qp->nice);
2292 	if (e->etype == CRONEVENT)
2293 		(void) execl(SHELL, "sh", "-c", e->cmd, 0);
2294 	else		/* type == ATEVENT */
2295 		(void) execl(SHELL, "sh", 0);
2296 	mail((e->u)->name, CANTEXECSH,
2297 		e->etype == CRONEVENT ? ERR_CANTEXECCRON : ERR_CANTEXECAT);
2298 	exit(1);
2299 	/*NOTREACHED*/
2300 }
2301 
2302 static int
2303 idle(long t)
2304 {
2305 	time_t	now;
2306 
2307 	while (t > 0L) {
2308 
2309 		if (msg_wait(t) != 0) {
2310 			/* we need to run next job immediately */
2311 			return (0);
2312 		}
2313 
2314 		reap_child();
2315 
2316 		now = time(NULL);
2317 		if (last_time > now) {
2318 			/* clock has been reset */
2319 			return (1);
2320 		}
2321 
2322 		if (next_event == NULL && !el_empty()) {
2323 			next_event = (struct event *)el_first();
2324 		}
2325 		if (next_event == NULL)
2326 			t = INFINITY;
2327 		else
2328 			t = (long)next_event->time - now;
2329 	}
2330 	return (0);
2331 }
2332 
2333 /*
2334  * This used to be in the idle(), but moved to the separate function.
2335  * This called from various place when cron needs to reap the
2336  * child. It includes the situation that cron hit maxrun, and needs
2337  * to reschedule the job.
2338  */
2339 static void
2340 reap_child()
2341 {
2342 	pid_t	pid;
2343 	int	prc;
2344 	struct	runinfo	*rp;
2345 
2346 	for (;;) {
2347 		pid = waitpid((pid_t)-1, &prc, WNOHANG);
2348 		if (pid <= 0)
2349 			break;
2350 #ifdef DEBUG
2351 		fprintf(stderr,
2352 			"wait returned %x for process %d\n", prc, pid);
2353 #endif
2354 		if ((rp = rinfo_get(pid)) == NULL) {
2355 			if (miscpid_delete(pid) == 0) {
2356 				/* not found in anywhere */
2357 				msg(PIDERR, pid);
2358 			}
2359 		} else if (rp->que == ZOMB) {
2360 			(void) unlink(rp->outfile);
2361 			rinfo_free(rp);
2362 		} else {
2363 			cleanup(rp, prc);
2364 		}
2365 	}
2366 }
2367 
2368 static void
2369 cleanup(struct runinfo *pr, int rc)
2370 {
2371 	int	nextfork = 1;
2372 	struct	usr	*p;
2373 	struct	stat	buf;
2374 
2375 	logit(ECHAR, pr, rc);
2376 	--qt[pr->que].nrun;
2377 	p = pr->rusr;
2378 	if (pr->que != CRONEVENT)
2379 		--p->aruncnt;
2380 	else
2381 		--p->cruncnt;
2382 
2383 	if (!lstat(pr->outfile, &buf)) {
2384 		if ((buf.st_mode != S_IFLNK) &&
2385 		    (buf.st_size > 0 || pr->mailwhendone)) {
2386 			/* mail user stdout and stderr */
2387 			for (;;) {
2388 				if ((pr->pid = fork()) < 0) {
2389 					/*
2390 					 * if fork fails try forever in doubling
2391 					 * retry times, up to 16 seconds
2392 					 */
2393 					(void) sleep(nextfork);
2394 					if (nextfork < 16)
2395 						nextfork += nextfork;
2396 					continue;
2397 				} else if (pr->pid == 0) {
2398 					child_sigreset();
2399 					contract_clear_template();
2400 
2401 					mail_result(p, pr, buf.st_size);
2402 					/* NOTREACHED */
2403 				} else {
2404 					contract_abandon_latest(pr->pid);
2405 					pr->que = ZOMB;
2406 					break;
2407 				}
2408 			}
2409 		} else {
2410 			(void) unlink(pr->outfile);
2411 			rinfo_free(pr);
2412 		}
2413 	} else {
2414 		rinfo_free(pr);
2415 	}
2416 
2417 	free_if_unused(p);
2418 }
2419 
2420 /*
2421  * Mail stdout and stderr of a job to user. Get uid for real user and become
2422  * that person. We do this so that mail won't come from root since this
2423  * could be a security hole. If failure, quit - don't send mail as root.
2424  */
2425 static void
2426 mail_result(struct usr *p, struct runinfo *pr, size_t filesize)
2427 {
2428 	struct	passwd	*ruser_ids;
2429 	FILE	*mailpipe;
2430 	FILE	*st;
2431 	struct utsname	name;
2432 	int	nbytes;
2433 	char	iobuf[BUFSIZ];
2434 	char	*cmd;
2435 
2436 	(void) uname(&name);
2437 	if ((ruser_ids = getpwnam(p->name)) == NULL)
2438 		exit(0);
2439 	(void) setuid(ruser_ids->pw_uid);
2440 
2441 	cmd = xmalloc(strlen(MAIL)+strlen(p->name)+2);
2442 	(void) sprintf(cmd, "%s %s", MAIL, p->name);
2443 	mailpipe = popen(cmd, "w");
2444 	contract_abandon_latest(0);
2445 	free(cmd);
2446 	if (mailpipe == NULL)
2447 		exit(127);
2448 	(void) fprintf(mailpipe, "To: %s\n", p->name);
2449 	if (pr->jobtype == CRONEVENT) {
2450 		(void) fprintf(mailpipe, CRONOUT);
2451 		(void) fprintf(mailpipe, "Your \"cron\" job on %s\n",
2452 			name.nodename);
2453 		if (pr->jobname != NULL) {
2454 			(void) fprintf(mailpipe, "%s\n\n", pr->jobname);
2455 		}
2456 	} else {
2457 		(void) fprintf(mailpipe, "Subject: Output from \"at\" job\n\n");
2458 		(void) fprintf(mailpipe, "Your \"at\" job on %s\n",
2459 			name.nodename);
2460 		if (pr->jobname != NULL) {
2461 			(void) fprintf(mailpipe, "\"%s\"\n\n", pr->jobname);
2462 		}
2463 	}
2464 	/* Tmp. file is fopen'ed w/ "r",  secure open */
2465 	if (filesize > 0 &&
2466 	    (st = fopen(pr->outfile, "r")) != NULL) {
2467 		(void) fprintf(mailpipe,
2468 			"produced the following output:\n\n");
2469 		while ((nbytes = fread(iobuf, sizeof (char), BUFSIZ, st)) != 0)
2470 			(void) fwrite(iobuf, sizeof (char), nbytes, mailpipe);
2471 		(void) fclose(st);
2472 	} else {
2473 		(void) fprintf(mailpipe, "completed.\n");
2474 	}
2475 	(void) pclose(mailpipe);
2476 	exit(0);
2477 }
2478 
2479 static int
2480 msg_wait(long tim)
2481 {
2482 	struct	message	msg;
2483 	int	cnt;
2484 	time_t	reftime;
2485 	struct	pollfd pfd[2];
2486 	int64_t	tl;
2487 	int	timeout;
2488 	static int	pending_msg;
2489 	static time_t	pending_reftime;
2490 
2491 	if (pending_msg) {
2492 		process_msg(&msgbuf, pending_reftime);
2493 		pending_msg = 0;
2494 		return (0);
2495 	}
2496 
2497 	/*
2498 	 * We are opening the signal mask to receive SIGCLD. The notifypipe
2499 	 * is used to avoid race condition between SIGCLD and poll system
2500 	 * call.
2501 	 * If SIGCLD is delivered in poll(), poll will be interrupted, and
2502 	 * we will return to idle() to reap the dead children.
2503 	 * If SIGCLD is delivered between sigprocmask() below and poll(),
2504 	 * there is no way we can detect the SIGCLD because poll() won't
2505 	 * be interrupted. In such case, the dead children can't be wait'ed
2506 	 * until poll returns by timeout or a new job. To avoid this race
2507 	 * condition, child_handler write to the notifypipe, so that
2508 	 * poll() will be able to return with POLLIN which indicates that
2509 	 * we have received SIGCLD.
2510 	 *
2511 	 * Since the notifypipe is used to just let poll return from
2512 	 * system call, the data in the pipe won't be read. Therefore,
2513 	 * any data in the pipe needs to be flushed before opening signal
2514 	 * mask.
2515 	 *
2516 	 * Note that we can probably re-write this code with pselect()
2517 	 * which can handle this situation easily.
2518 	 */
2519 	(void) ioctl(notifypipe[0], I_FLUSH, FLUSHW);
2520 
2521 	pfd[0].fd = msgfd;
2522 	pfd[0].events = POLLIN;
2523 	pfd[1].fd = notifypipe[1];
2524 	pfd[1].events = POLLIN;
2525 
2526 #ifdef CRON_MAXSLEEP
2527 	/*
2528 	 * CRON_MAXSLEEP can be defined to have cron periodically wake
2529 	 * up, so that cron can detect a change of TOD and adjust the
2530 	 * sleep time accordingly.
2531 	 */
2532 	tim = (tim > CRON_MAXSLEEP) ? CRON_MAXSLEEP : tim;
2533 #endif
2534 	tl = (tim == INFINITY) ? -1ll : (int64_t)tim * 1000;
2535 
2536 	accept_sigcld = 1;
2537 	(void) sigprocmask(SIG_UNBLOCK, &childmask, NULL);
2538 	do {
2539 		timeout = (tl > INT_MAX ? INT_MAX : (int)tl);
2540 		tl -= timeout;
2541 		cnt = poll(pfd, 2, timeout);
2542 		if (cnt == -1 && errno != EINTR) {
2543 			perror("! poll");
2544 		}
2545 	} while (tl > 0 && cnt == 0);
2546 	(void) sigprocmask(SIG_BLOCK, &childmask, NULL);
2547 	accept_sigcld = 0;
2548 
2549 	/*
2550 	 * poll timeout or interrupted.
2551 	 */
2552 	if (cnt <= 0)
2553 		return (0);
2554 
2555 	/*
2556 	 * Not the timeout or new job, but a SIGCLD has been delivered.
2557 	 */
2558 	if ((pfd[0].revents & POLLIN) == 0)
2559 		return (0);
2560 
2561 	errno = 0;
2562 	if ((cnt = read(msgfd, &msg, sizeof (msg))) != sizeof (msg)) {
2563 		if (cnt != -1 || errno != EAGAIN)
2564 			perror("! read");
2565 		return (0);
2566 	}
2567 	reftime = time(NULL);
2568 	if (next_event != NULL && reftime >= next_event->time) {
2569 		/*
2570 		 * we need to run the job before reloading crontab.
2571 		 */
2572 		(void) memcpy(&msgbuf, &msg, sizeof (msg));
2573 		pending_msg = 1;
2574 		pending_reftime = reftime;
2575 		return (1);
2576 	}
2577 	process_msg(&msg, reftime);
2578 	return (0);
2579 }
2580 
2581 /*
2582  * process the message supplied via pipe. This will be called either
2583  * immediately after cron read the message from pipe, or idle time
2584  * if the message was pending due to the job execution.
2585  */
2586 static void
2587 process_msg(struct message *pmsg, time_t reftime)
2588 {
2589 	if (pmsg->etype == NULL)
2590 		return;
2591 
2592 	switch (pmsg->etype) {
2593 	case AT:
2594 		if (pmsg->action == DELETE)
2595 			del_atjob(pmsg->fname, pmsg->logname);
2596 		else
2597 			mod_atjob(pmsg->fname, (time_t)0);
2598 		break;
2599 	case CRON:
2600 		if (pmsg->action == DELETE)
2601 			del_ctab(pmsg->fname);
2602 		else
2603 			mod_ctab(pmsg->fname, reftime);
2604 		break;
2605 	default:
2606 		msg("message received - bad format");
2607 		break;
2608 	}
2609 	if (next_event != NULL) {
2610 		if (next_event->etype == CRONEVENT)
2611 			el_add(next_event, next_event->time,
2612 				(next_event->u)->ctid);
2613 		else	/* etype == ATEVENT */
2614 			el_add(next_event, next_event->time,
2615 				next_event->of.at.eventid);
2616 		next_event = NULL;
2617 	}
2618 	(void) fflush(stdout);
2619 	pmsg->etype = NULL;
2620 }
2621 
2622 static struct runinfo *
2623 rinfo_get(pid_t pid)
2624 {
2625 	struct runinfo *rp;
2626 
2627 	for (rp = rt; rp < rt+MAXRUN; rp++) {
2628 		if (rp->pid == pid)
2629 			break;
2630 	}
2631 	if (rp >= rt+MAXRUN)
2632 		return (NULL);
2633 	else
2634 		return (rp);
2635 }
2636 
2637 /*
2638  * Free memory used for output file name and job name in runinfo structure
2639  */
2640 static void
2641 rinfo_free(struct runinfo *rp)
2642 {
2643 	free(rp->outfile);
2644 	free(rp->jobname);
2645 	rp->outfile = rp->jobname = NULL;
2646 	rp->pid = 0;
2647 }
2648 
2649 /* ARGSUSED */
2650 static void
2651 thaw_handler(int sig)
2652 {
2653 	;
2654 }
2655 
2656 
2657 /* ARGSUSED */
2658 static void
2659 cronend(int sig)
2660 {
2661 	crabort("SIGTERM", REMOVE_FIFO);
2662 }
2663 
2664 /*ARGSUSED*/
2665 static void
2666 child_handler(int sig)
2667 {
2668 	/*
2669 	 * Just in case someone changes the signal mask.
2670 	 * we don't want to notify the SIGCLD.
2671 	 */
2672 	if (accept_sigcld) {
2673 		(void) write(notifypipe[0], &sig, 1);
2674 	}
2675 }
2676 
2677 static void
2678 child_sigreset(void)
2679 {
2680 	(void) signal(SIGCLD, SIG_DFL);
2681 	(void) sigprocmask(SIG_SETMASK, &defmask, NULL);
2682 }
2683 
2684 /*
2685  * crabort() - handle exits out of cron
2686  */
2687 static void
2688 crabort(char *mssg, int action)
2689 {
2690 	int	c;
2691 
2692 	if (action & REMOVE_FIFO) {
2693 		/* FIFO vanishes when cron finishes */
2694 		if (unlink(FIFO) < 0)
2695 			perror("cron could not unlink FIFO");
2696 	}
2697 
2698 	if (action & CONSOLE_MSG) {
2699 		/* write error msg to console */
2700 		if ((c = open(CONSOLE, O_WRONLY)) >= 0) {
2701 			(void) write(c, "cron aborted: ", 14);
2702 			(void) write(c, mssg, strlen(mssg));
2703 			(void) write(c, "\n", 1);
2704 			(void) close(c);
2705 		}
2706 	}
2707 
2708 	/* always log the message */
2709 	msg(mssg);
2710 	msg("******* CRON ABORTED ********");
2711 	exit(1);
2712 }
2713 
2714 /*
2715  * msg() - time-stamped error reporting function
2716  */
2717 /*PRINTFLIKE1*/
2718 static void
2719 msg(char *fmt, ...)
2720 {
2721 	va_list args;
2722 	time_t	t;
2723 
2724 	t = time(NULL);
2725 
2726 	(void) fflush(stdout);
2727 
2728 	(void) fprintf(stderr, "! ");
2729 
2730 	va_start(args, fmt);
2731 	(void) vfprintf(stderr, fmt, args);
2732 	va_end(args);
2733 
2734 	(void) strftime(timebuf, sizeof (timebuf), FORMAT, localtime(&t));
2735 	(void) fprintf(stderr, " %s\n", timebuf);
2736 
2737 	(void) fflush(stderr);
2738 }
2739 
2740 static void
2741 logit(int cc, struct runinfo *rp, int rc)
2742 {
2743 	time_t t;
2744 	int    ret;
2745 
2746 	if (!log)
2747 		return;
2748 
2749 	t = time(NULL);
2750 	if (cc == BCHAR)
2751 		(void) printf("%c  CMD: %s\n", cc, next_event->cmd);
2752 	(void) strftime(timebuf, sizeof (timebuf), FORMAT, localtime(&t));
2753 	(void) printf("%c  %.8s %u %c %s",
2754 		cc, (rp->rusr)->name, rp->pid, QUE(rp->que), timebuf);
2755 	if ((ret = TSTAT(rc)) != 0)
2756 		(void) printf(" ts=%d", ret);
2757 	if ((ret = RCODE(rc)) != 0)
2758 		(void) printf(" rc=%d", ret);
2759 	(void) putchar('\n');
2760 	(void) fflush(stdout);
2761 }
2762 
2763 static void
2764 resched(int delay)
2765 {
2766 	time_t	nt;
2767 
2768 	/* run job at a later time */
2769 	nt = next_event->time + delay;
2770 	if (next_event->etype == CRONEVENT) {
2771 		next_event->time = next_time(next_event, (time_t)0);
2772 		if (nt < next_event->time)
2773 			next_event->time = nt;
2774 		el_add(next_event, next_event->time, (next_event->u)->ctid);
2775 		delayed = 1;
2776 		msg("rescheduling a cron job");
2777 		return;
2778 	}
2779 	add_atevent(next_event->u, next_event->cmd, nt, next_event->etype);
2780 	msg("rescheduling at job");
2781 }
2782 
2783 static void
2784 quedefs(int action)
2785 {
2786 	int	i;
2787 	int	j;
2788 	char	qbuf[QBUFSIZ];
2789 	FILE	*fd;
2790 
2791 	/* set up default queue definitions */
2792 	for (i = 0; i < NQUEUE; i++) {
2793 		qt[i].njob = qd.njob;
2794 		qt[i].nice = qd.nice;
2795 		qt[i].nwait = qd.nwait;
2796 	}
2797 	if (action == DEFAULT)
2798 		return;
2799 	if ((fd = fopen(QUEDEFS, "r")) == NULL) {
2800 		msg("cannot open quedefs file");
2801 		msg("using default queue definitions");
2802 		return;
2803 	}
2804 	while (fgets(qbuf, QBUFSIZ, fd) != NULL) {
2805 		if ((j = qbuf[0]-'a') < 0 || j >= NQUEUE || qbuf[1] != '.')
2806 			continue;
2807 		parsqdef(&qbuf[2]);
2808 		qt[j].njob = qq.njob;
2809 		qt[j].nice = qq.nice;
2810 		qt[j].nwait = qq.nwait;
2811 	}
2812 	(void) fclose(fd);
2813 }
2814 
2815 static void
2816 parsqdef(char *name)
2817 {
2818 	int i;
2819 
2820 	qq = qd;
2821 	while (*name) {
2822 		i = 0;
2823 		while (isdigit(*name)) {
2824 			i *= 10;
2825 			i += *name++ - '0';
2826 		}
2827 		switch (*name++) {
2828 		case JOBF:
2829 			qq.njob = i;
2830 			break;
2831 		case NICEF:
2832 			qq.nice = i;
2833 			break;
2834 		case WAITF:
2835 			qq.nwait = i;
2836 			break;
2837 		}
2838 	}
2839 }
2840 
2841 /*
2842  * defaults - read defaults from /etc/default/cron
2843  */
2844 static void
2845 defaults()
2846 {
2847 	int  flags;
2848 	char *deflog;
2849 	char *hz, *tz;
2850 
2851 	/*
2852 	 * get HZ value for environment
2853 	 */
2854 	if ((hz = getenv("HZ")) == (char *)NULL)
2855 		(void) sprintf(hzname, "HZ=%d", HZ);
2856 	else
2857 		(void) snprintf(hzname, sizeof (hzname), "HZ=%s", hz);
2858 	/*
2859 	 * get TZ value for environment
2860 	 */
2861 	(void) snprintf(tzone, sizeof (tzone), "TZ=%s",
2862 		((tz = getenv("TZ")) != NULL) ? tz : DEFTZ);
2863 
2864 	if (defopen(DEFFILE) == 0) {
2865 		/* ignore case */
2866 		flags = defcntl(DC_GETFLAGS, 0);
2867 		TURNOFF(flags, DC_CASE);
2868 		(void) defcntl(DC_SETFLAGS, flags);
2869 
2870 		if (((deflog = defread("CRONLOG=")) == NULL) ||
2871 		    (*deflog == 'N') || (*deflog == 'n'))
2872 			log = 0;
2873 		else
2874 			log = 1;
2875 		/* fix for 1087611 - allow paths to be set in defaults file */
2876 		if ((Def_path = defread("PATH=")) != NULL) {
2877 			(void) strlcat(path, Def_path, LINE_MAX);
2878 		} else {
2879 			(void) strlcpy(path, NONROOTPATH, LINE_MAX);
2880 		}
2881 		if ((Def_supath = defread("SUPATH=")) != NULL) {
2882 			(void) strlcat(supath, Def_supath, LINE_MAX);
2883 		} else {
2884 			(void) strlcpy(supath, ROOTPATH, LINE_MAX);
2885 		}
2886 		(void) defopen(NULL);
2887 	}
2888 }
2889 
2890 /*
2891  * Determine if a user entry for a job is still ok.  The method used here
2892  * is a lot (about 75x) faster than using setgrent() / getgrent()
2893  * endgrent().  It should be safe because we use the sysconf to determine
2894  * the max, and it tolerates the max being 0.
2895  */
2896 
2897 static int
2898 verify_user_cred(const struct usr *u)
2899 {
2900 	struct passwd *pw;
2901 	size_t numUsrGrps = 0;
2902 	size_t numOrigGrps = 0;
2903 	size_t i;
2904 	int retval;
2905 
2906 	/*
2907 	 * Maximum number of groups a user may be in concurrently.  This
2908 	 * is a value which we obtain at runtime through a sysconf()
2909 	 * call.
2910 	 */
2911 
2912 	static size_t nGroupsMax = (size_t)-1;
2913 
2914 	/*
2915 	 * Arrays for cron user's group list, constructed at startup to
2916 	 * be nGroupsMax elements long, used for verifying user
2917 	 * credentials prior to execution.
2918 	 */
2919 
2920 	static gid_t *UsrGrps;
2921 	static gid_t *OrigGrps;
2922 
2923 	if (((pw = getpwnam(u->name)) == NULL) ||
2924 	    (pw->pw_uid != u->uid)) {
2925 		return (VUC_BADUSER);
2926 	}
2927 
2928 	/*
2929 	 * Create the group id lists needed for job credential
2930 	 * verification.
2931 	 */
2932 
2933 	if (nGroupsMax == (size_t)-1) {
2934 		if ((nGroupsMax = sysconf(_SC_NGROUPS_MAX)) > 0) {
2935 			UsrGrps = xcalloc(nGroupsMax, sizeof (gid_t));
2936 			OrigGrps = xcalloc(nGroupsMax, sizeof (gid_t));
2937 		}
2938 
2939 #ifdef DEBUG
2940 		(void) fprintf(stderr, "nGroupsMax = %ld\n", nGroupsMax);
2941 #endif
2942 	}
2943 
2944 #ifdef DEBUG
2945 	(void) fprintf(stderr, "verify_user_cred (%s-%d)\n", pw->pw_name,
2946 	    pw->pw_uid);
2947 	(void) fprintf(stderr, "verify_user_cred: pw->pw_gid = %d, "
2948 	    "u->gid = %d\n", pw->pw_gid, u->gid);
2949 #endif
2950 
2951 	retval = (u->gid == pw->pw_gid) ? VUC_OK : VUC_NOTINGROUP;
2952 
2953 	if (nGroupsMax > 0) {
2954 		numOrigGrps = getgroups(nGroupsMax, OrigGrps);
2955 
2956 		(void) initgroups(pw->pw_name, pw->pw_gid);
2957 		numUsrGrps = getgroups(nGroupsMax, UsrGrps);
2958 
2959 		for (i = 0; i < numUsrGrps; i++) {
2960 			if (UsrGrps[i] == u->gid) {
2961 				retval = VUC_OK;
2962 				break;
2963 			}
2964 		}
2965 
2966 		if (OrigGrps) {
2967 			(void) setgroups(numOrigGrps, OrigGrps);
2968 		}
2969 	}
2970 
2971 #ifdef DEBUG
2972 	(void) fprintf(stderr, "verify_user_cred: VUC = %d\n", retval);
2973 #endif
2974 
2975 	return (retval);
2976 }
2977 
2978 static int
2979 set_user_cred(const struct usr *u, struct project *pproj)
2980 {
2981 	static char *progname = "cron";
2982 	int r = 0, rval = 0;
2983 
2984 	if ((r = pam_start(progname, u->name, &pam_conv, &pamh))
2985 		!= PAM_SUCCESS) {
2986 #ifdef DEBUG
2987 		msg("pam_start returns %d\n", r);
2988 #endif
2989 		rval = VUC_BADUSER;
2990 		goto set_eser_cred_exit;
2991 	}
2992 
2993 	r = pam_acct_mgmt(pamh, 0);
2994 #ifdef DEBUG
2995 	msg("pam_acc_mgmt returns %d\n", r);
2996 #endif
2997 	if (r == PAM_ACCT_EXPIRED) {
2998 		rval = VUC_EXPIRED;
2999 		goto set_eser_cred_exit;
3000 	}
3001 	if (r == PAM_NEW_AUTHTOK_REQD) {
3002 		rval = VUC_NEW_AUTH;
3003 		goto set_eser_cred_exit;
3004 	}
3005 	if (r != PAM_SUCCESS) {
3006 		rval = VUC_BADUSER;
3007 		goto set_eser_cred_exit;
3008 	}
3009 
3010 	if (pproj != NULL) {
3011 		size_t sz = sizeof (PROJECT) + strlen(pproj->pj_name);
3012 		char *buf = alloca(sz);
3013 
3014 		(void) snprintf(buf, sz, PROJECT "%s", pproj->pj_name);
3015 		(void) pam_set_item(pamh, PAM_RESOURCE, buf);
3016 	}
3017 
3018 	r = pam_setcred(pamh, PAM_ESTABLISH_CRED);
3019 	if (r != PAM_SUCCESS)
3020 		rval = VUC_BADUSER;
3021 
3022 set_eser_cred_exit:
3023 	(void) pam_end(pamh, r);
3024 	return (rval);
3025 }
3026 
3027 static void
3028 clean_out_user(struct usr *u)
3029 {
3030 	if (next_event->u == u) {
3031 		next_event = NULL;
3032 	}
3033 
3034 	clean_out_ctab(u);
3035 	clean_out_atjobs(u);
3036 	free_if_unused(u);
3037 }
3038 
3039 static void
3040 clean_out_atjobs(struct usr *u)
3041 {
3042 	struct event *ev, *pv;
3043 
3044 	for (pv = NULL, ev = u->atevents;
3045 		ev != NULL;
3046 		pv = ev, ev = ev->link, free(pv)) {
3047 		el_remove(ev->of.at.eventid, 1);
3048 		if (cwd == AT)
3049 			cron_unlink(ev->cmd);
3050 		else {
3051 			char buf[PATH_MAX];
3052 			if (strlen(ATDIR) + strlen(ev->cmd) + 2
3053 				< PATH_MAX) {
3054 				(void) sprintf(buf, "%s/%s", ATDIR, ev->cmd);
3055 				cron_unlink(buf);
3056 			}
3057 		}
3058 		free(ev->cmd);
3059 	}
3060 
3061 	u->atevents = NULL;
3062 }
3063 
3064 static void
3065 clean_out_ctab(struct usr *u)
3066 {
3067 	rm_ctevents(u);
3068 	el_remove(u->ctid, 0);
3069 	u->ctid = 0;
3070 	u->ctexists = 0;
3071 }
3072 
3073 static void
3074 cron_unlink(char *name)
3075 {
3076 	int r;
3077 
3078 	r = unlink(name);
3079 	if (r == 0 || (r == -1 && errno == ENOENT)) {
3080 		(void) audit_cron_delete_anc_file(name, NULL);
3081 	}
3082 }
3083 
3084 static void
3085 create_anc_ctab(struct event *e)
3086 {
3087 	if (audit_cron_create_anc_file(e->u->name,
3088 		(cwd == CRON) ? NULL:CRONDIR,
3089 		e->u->name,
3090 		e->u->uid) == -1) {
3091 		process_anc_files(CRON_ANC_DELETE);
3092 		crabort("cannot create ancillary files for crontabs",
3093 			REMOVE_FIFO|CONSOLE_MSG);
3094 	}
3095 }
3096 
3097 static void
3098 delete_anc_ctab(struct event *e)
3099 {
3100 	(void) audit_cron_delete_anc_file(e->u->name,
3101 		(cwd == CRON) ? NULL:CRONDIR);
3102 }
3103 
3104 static void
3105 create_anc_atjob(struct event *e)
3106 {
3107 	if (!e->of.at.exists)
3108 		return;
3109 
3110 	if (audit_cron_create_anc_file(e->cmd,
3111 		(cwd == AT) ? NULL:ATDIR,
3112 		e->u->name,
3113 		e->u->uid) == -1) {
3114 		process_anc_files(CRON_ANC_DELETE);
3115 		crabort("cannot create ancillary files for atjobs",
3116 			REMOVE_FIFO|CONSOLE_MSG);
3117 	}
3118 }
3119 
3120 static void
3121 delete_anc_atjob(struct event *e)
3122 {
3123 	if (!e->of.at.exists)
3124 		return;
3125 
3126 	(void) audit_cron_delete_anc_file(e->cmd,
3127 		(cwd == AT) ? NULL:ATDIR);
3128 }
3129 
3130 
3131 static void
3132 process_anc_files(int del)
3133 {
3134 	struct usr	*u = uhead;
3135 	struct event	*e;
3136 
3137 	if (!audit_cron_mode())
3138 		return;
3139 
3140 	for (;;) {
3141 		if (u->ctexists && u->ctevents != NULL) {
3142 			e = u->ctevents;
3143 			for (;;) {
3144 				if (del)
3145 					delete_anc_ctab(e);
3146 				else
3147 					create_anc_ctab(e);
3148 				if ((e = e->link) == NULL)
3149 					break;
3150 			}
3151 		}
3152 
3153 		if (u->atevents != NULL) {
3154 			e = u->atevents;
3155 			for (;;) {
3156 				if (del)
3157 					delete_anc_atjob(e);
3158 				else
3159 					create_anc_atjob(e);
3160 				if ((e = e->link) == NULL)
3161 					break;
3162 			}
3163 		}
3164 
3165 		if ((u = u->nextusr)  == NULL)
3166 			break;
3167 	}
3168 }
3169 
3170 /*ARGSUSED*/
3171 static int
3172 cron_conv(int num_msg, struct pam_message **msgs,
3173     struct pam_response **response, void *appdata_ptr)
3174 {
3175 	struct pam_message	**m = msgs;
3176 	int i;
3177 
3178 	for (i = 0; i < num_msg; i++) {
3179 		switch (m[i]->msg_style) {
3180 		case PAM_ERROR_MSG:
3181 		case PAM_TEXT_INFO:
3182 			if (m[i]->msg != NULL) {
3183 				(void) msg("%s\n", m[i]->msg);
3184 			}
3185 			break;
3186 
3187 		default:
3188 			break;
3189 		}
3190 	}
3191 	return (0);
3192 }
3193 
3194 /*
3195  * Cron creates process for other than job. Mail process is the
3196  * one which rinfo does not cover. Therefore, miscpid will keep
3197  * track of the pids executed from cron. Otherwise, we will see
3198  * "unexpected pid returned.." messages appear in the log file.
3199  */
3200 static void
3201 miscpid_insert(pid_t pid)
3202 {
3203 	struct miscpid *mp;
3204 
3205 	mp = xmalloc(sizeof (*mp));
3206 	mp->pid = pid;
3207 	mp->next = miscpid_head;
3208 	miscpid_head = mp;
3209 }
3210 
3211 static int
3212 miscpid_delete(pid_t pid)
3213 {
3214 	struct miscpid *mp, *omp;
3215 	int found = 0;
3216 
3217 	omp = NULL;
3218 	for (mp = miscpid_head; mp != NULL; mp = mp->next) {
3219 		if (mp->pid == pid) {
3220 			found = 1;
3221 			break;
3222 		}
3223 		omp = mp;
3224 	}
3225 	if (found) {
3226 		if (omp != NULL)
3227 			omp->next = mp->next;
3228 		else
3229 			miscpid_head = NULL;
3230 		free(mp);
3231 	}
3232 	return (found);
3233 }
3234 
3235 /*
3236  * Establish contract terms such that all children are in abandoned
3237  * process contracts.
3238  */
3239 static void
3240 contract_set_template(void)
3241 {
3242 	int fd;
3243 
3244 	if ((fd = open64(CTFS_ROOT "/process/template", O_RDWR)) < 0)
3245 		crabort("cannot open process contract template",
3246 		    REMOVE_FIFO | CONSOLE_MSG);
3247 
3248 	if (ct_pr_tmpl_set_param(fd, 0) ||
3249 	    ct_tmpl_set_informative(fd, 0) ||
3250 	    ct_pr_tmpl_set_fatal(fd, CT_PR_EV_HWERR))
3251 		crabort("cannot establish contract template terms",
3252 		    REMOVE_FIFO | CONSOLE_MSG);
3253 
3254 	if (ct_tmpl_activate(fd))
3255 		crabort("cannot activate contract template",
3256 		    REMOVE_FIFO | CONSOLE_MSG);
3257 
3258 	(void) close(fd);
3259 }
3260 
3261 /*
3262  * Clear active process contract template.
3263  */
3264 static void
3265 contract_clear_template(void)
3266 {
3267 	int fd;
3268 
3269 	if ((fd = open64(CTFS_ROOT "/process/template", O_RDWR)) < 0)
3270 		crabort("cannot open process contract template",
3271 		    REMOVE_FIFO | CONSOLE_MSG);
3272 
3273 	if (ct_tmpl_clear(fd))
3274 		crabort("cannot clear contract template",
3275 		    REMOVE_FIFO | CONSOLE_MSG);
3276 
3277 	(void) close(fd);
3278 }
3279 
3280 /*
3281  * Abandon latest process contract unconditionally.  If we have leaked [some
3282  * critical amount], exit such that the kernel reaps our contracts.
3283  */
3284 static void
3285 contract_abandon_latest(pid_t pid)
3286 {
3287 	int r;
3288 	ctid_t id;
3289 	static uint_t cts_lost;
3290 
3291 	if (cts_lost > MAX_LOST_CONTRACTS)
3292 		crabort("repeated failure to abandon contracts",
3293 		    REMOVE_FIFO | CONSOLE_MSG);
3294 
3295 	if (r = contract_latest(&id)) {
3296 		if (pid == 0)
3297 			msg("could not obtain latest contract from "
3298 			    "popen(3C): %s", strerror(r));
3299 		else
3300 			msg("could not obtain latest contract for "
3301 			    "PID %ld: %s", pid, strerror(r));
3302 		cts_lost++;
3303 		return;
3304 	}
3305 
3306 	if (r = contract_abandon_id(id)) {
3307 		msg("could not abandon latest contract %ld: %s", id,
3308 		    strerror(r));
3309 		cts_lost++;
3310 		return;
3311 	}
3312 }
3313