2 * Acess2 System Init Task
12 #define DEFAULT_SHELL "/Acess/SBin/login"
13 #define INITTAB_FILE "/Acess/Conf/inittab"
15 #define ARRAY_SIZE(x) ((sizeof(x))/(sizeof((x)[0])))
18 int ProcessInittab(const char *Path);
19 char *ReadQuotedString(FILE *FP);
20 char **ReadCommand(FILE *FP);
21 void FreeCommand(char **Command);
23 tInitProgram *AllocateProgram(char **Command, enum eProgType Type, size_t ExtraSpace);
24 void RespawnProgam(tInitProgram *Program);
26 int AddKTerminal(int TerminalSpec, char **Command);
27 int AddSerialTerminal(const char *DevPathSegment, const char *ModeStr, char **Command);
28 int AddDaemon(char *StdoutPath, char *StderrPath, char **Command);
30 int SpawnCommand(int c_stdin, int c_stdout, int c_stderr, char **ArgV);
31 int SpawnKTerm(tInitProgram *Program);
32 int SpawnSTerm(tInitProgram *Program);
33 int SpawnDaemon(tInitProgram *Program);
36 const char *gsInittabPath = INITTAB_FILE;
37 tInitProgram *gpInitPrograms;
41 * \fn int main(int argc, char *argv[])
44 int main(int argc, char *argv[])
46 // Parse commandline args
49 // TODO: Behave differently if not invoked as first process?
52 if( ProcessInittab(gsInittabPath) != 0 )
54 // No inittab file found, default to:
55 _SysDebug("inittab '%s' is invalid, falling back to one VT", gsInittabPath);
60 int pid = SpawnCommand(0, 1, 1, (char *[]){DEFAULT_SHELL, NULL});
61 // TODO: Detect errors
62 _SysWaitTID(pid, NULL);
69 // TODO: Implement message watching
73 pid = _SysWaitTID(-1, &status);
74 _SysDebug("PID %i died, looking for respawn entry", pid);
80 char *ReadQuotedString(FILE *FP)
84 while( isblank(ch = fgetc(FP)) )
93 int pos = 0, space = 0;
94 for( ; !feof(FP); ch = fgetc(FP) )
99 // Add escaped/special character
106 fseek(FP, -1, SEEK_CUR);
109 else if( ch == '\\' )
120 // Double-quoted string
125 else if( ch == '\\' )
132 // Single-quoted string
137 else if( ch == '\\' )
149 void *tmp = realloc(retstr, space+1);
151 _SysDebug("ReadQuotedString - realloc(%i) failure", space+1);
165 char **ReadCommand(FILE *FP)
169 char **ret = malloc(space*sizeof(char*));
172 arg = ReadQuotedString(FP);
175 if( pos == space - 1 ) {
176 _SysDebug("Too many arguments %i", pos);
182 } while(arg != NULL);
193 void FreeCommand(char **Command)
196 while( Command[pos] )
204 int ProcessInittab(const char *Path)
207 FILE *fp = fopen(Path, "r");
219 if( (rv = fscanf(fp, "%64s%*[ \t]", cmdbuf)) != 1 ) {
220 _SysDebug("fscanf rv %i != exp 1", rv);
225 if( cmdbuf[0] == '#' ) {
226 while( !feof(fp) && fgetc(fp) != '\n' )
230 if( cmdbuf[0] == '\0' ) {
232 if( ch != '\n' && ch != -1 ) {
234 _SysDebug("Unexpected char 0x%x, expecting EOL", ch);
235 return 2; // Unexpected character?
241 if( strcmp(cmdbuf, "ktty") == 0 ) {
242 // ktty <ID> <command...>
243 // - Spins off a console on the specified kernel TTY
245 if( fscanf(fp, "%d ", &id) != 1 ) {
246 _SysDebug("init[ktty] - TTY ID read failed");
249 char **command = ReadCommand(fp);
251 _SysDebug("init[ktty] - Command read failure");
254 AddKTerminal(id, command);
256 else if(strcmp(cmdbuf, "stty") == 0 ) {
257 // stty <devpath> [78][NOE][012][bB]<baud> <command...>
259 char modespec[4+6+1];
260 if( fscanf(fp, "%32s %10s ", path_seg, modespec) != 2 ) {
263 char **command = ReadCommand(fp);
266 AddSerialTerminal(path_seg, modespec, command);
268 else if(strcmp(cmdbuf, "daemon") == 0 ) {
269 // daemon <stdout> <stderr> <command...>
270 // - Runs a daemon (respawning) that logs to the specified files
271 // - Will append a header whenever the daemon starts
272 char *stdout_path = ReadQuotedString(fp);
275 char *stderr_path = ReadQuotedString(fp);
278 char **command = ReadCommand(fp);
282 AddDaemon(stdout_path, stderr_path, command);
284 else if(strcmp(cmdbuf, "exec") == 0 ) {
286 // - Runs a command and waits for it to complete before continuing
287 // - NOTE: No other commands will respawn while this is running
288 char **command = ReadCommand(fp);
292 int handles[] = {0, 1, 2};
293 int pid = _SysSpawn(command[0], (const char **)command, NULL, 3, handles, NULL);
295 _SysWaitTID(pid, &retstatus);
296 _SysDebug("Command '%s' returned %i", command[0], retstatus);
298 FreeCommand(command);
302 _SysDebug("Unknown command '%s'", cmdbuf);
308 _SysDebug("label lineError: goto'd - line %i, cmdbuf='%s'", line_num, cmdbuf);
309 while( !feof(fp) && fgetc(fp) != '\n' )
316 if( gpInitPrograms == NULL )
322 tInitProgram *AllocateProgram(char **Command, enum eProgType Type, size_t ExtraSpace)
326 ret = malloc( sizeof(tInitProgram) - sizeof(union uProgTypes) + ExtraSpace );
330 ret->Command = Command;
333 ret->Next = gpInitPrograms;
334 gpInitPrograms = ret;
339 void RespawnProgam(tInitProgram *Program)
342 switch(Program->Type)
344 case PT_KTERM: rv = SpawnKTerm(Program); break;
345 case PT_STERM: rv = SpawnSTerm(Program); break;
346 case PT_DAEMON: rv = SpawnDaemon(Program); break;
348 _SysDebug("BUGCHECK - Program Type %i unknown", Program->Type);
352 _SysDebug("Respawn failure!");
353 // TODO: Remove from list?
357 int AddKTerminal(int TerminalID, char **Command)
359 // TODO: Smarter validation
360 if( TerminalID < 0 || TerminalID > 7 )
363 tInitProgram *ent = AllocateProgram(Command, PT_KTERM, sizeof(struct sKTerm));
364 ent->TypeInfo.KTerm.ID = TerminalID;
370 int AddSerialTerminal(const char *DevPathSegment, const char *ModeStr, char **Command)
372 char dbit, parity, sbit;
376 if( sscanf(ModeStr, "%1[78]%1[NOE]%1[012]%*1[bB]%d", &dbit, &parity, &sbit, &baud) != 4 ) {
378 _SysDebug("Serial mode string is invalid ('%s')", ModeStr);
382 // Validate baud rate / build mode word
383 // TODO: Does baud rate need validation?
384 uint32_t modeword = 0;
385 modeword |= (dbit == '7' ? 1 : 0) << 0;
386 modeword |= (parity == 'O' ? 1 : (parity == 'E' ? 2 : 0)) << 1;
387 modeword |= (sbit - '0') << 3;
390 const char DEVPREFIX[] = "/Devices/";
391 int pathlen = sizeof(DEVPREFIX) + strlen(DevPathSegment);
392 tInitProgram *ent = AllocateProgram(Command, PT_STERM, sizeof(struct sSTerm)+pathlen);
393 ent->TypeInfo.STerm.FormatBits = modeword;
394 ent->TypeInfo.STerm.BaudRate = baud;
395 strcpy(ent->TypeInfo.STerm.Path, DEVPREFIX);
396 strcat(ent->TypeInfo.STerm.Path, DevPathSegment);
402 int AddDaemon(char *StdoutPath, char *StderrPath, char **Command)
404 tInitProgram *ent = AllocateProgram(Command, PT_DAEMON, sizeof(struct sDaemon));
405 ent->TypeInfo.Daemon.StdoutPath = StdoutPath;
406 ent->TypeInfo.Daemon.StderrPath = StderrPath;
412 int SpawnCommand(int c_stdin, int c_stdout, int c_stderr, char **ArgV)
414 int handles[] = {c_stdin, c_stdout, c_stderr};
416 int rv = _SysSpawn(ArgV[0], (const char **)ArgV, NULL, 3, handles, NULL);
419 if( c_stdout != c_stdin )
421 if( c_stderr != c_stdin && c_stderr != c_stdout )
427 int SpawnKTerm(tInitProgram *Program)
429 const char fmt[] = "/Devices/pts/vt%ic";
430 char path[sizeof(fmt)];
432 snprintf(path, sizeof(path), fmt, Program->TypeInfo.KTerm.ID);
434 int in = _SysOpen(path, OPENFLAG_READ);
435 int out = _SysOpen(path, OPENFLAG_WRITE);
437 return SpawnCommand(in, out, out, Program->Command);
440 int SpawnSTerm(tInitProgram *Program)
442 int in = _SysOpen(Program->TypeInfo.STerm.Path, OPENFLAG_READ);
443 int out = _SysOpen(Program->TypeInfo.STerm.Path, OPENFLAG_WRITE);
445 if(in == -1 || out == -1 ) {
446 _SysDebug("Unable to open serial port '%s'", Program->TypeInfo.STerm.Path);
451 if( _SysIOCtl(in, 0, NULL) != DRV_TYPE_SERIAL )
456 _SysIOCtl(in, SERIAL_IOCTL_GETSETBAUD, &Program->TypeInfo.STerm.BaudRate);
457 _SysIOCtl(in, SERIAL_IOCTL_GETSETFORMAT, &Program->TypeInfo.STerm.FormatBits);
460 return SpawnCommand(in, out, out, Program->Command);
463 int SpawnDaemon(tInitProgram *Program)
465 int in = _SysOpen("/Devices/null", OPENFLAG_READ);
466 int out = _SysOpen(Program->TypeInfo.Daemon.StdoutPath, OPENFLAG_WRITE);
467 int err = _SysOpen(Program->TypeInfo.Daemon.StderrPath, OPENFLAG_WRITE);
469 if( in == -1 || out == -1 || err == -1 ) {
479 size_t len = snprintf(buffer, 100, "[%i] init spawning '%s'\n", _SysTimestamp(), Program->Command);
480 _SysWrite(out, buffer, len);
483 return SpawnCommand(in, out, err, Program->Command);