2 * Copyright (c) 1988, 1990, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * Modified Sun Mar 12 10:34:34 1995, faith@cs.unc.edu, for Linux
37 * This program is not related to David Wall, whose Stanford Ph.D. thesis
38 * is entitled "Mechanisms for Broadcast and Selective Broadcast".
40 * 1999-02-22 Arkadiusz MiĆkiewicz <misiek@pld.ORG.PL>
41 * - added Native Language Support
45 #include <sys/param.h>
61 #include <sys/types.h>
68 #include "pathnames.h"
69 #include "carefulputc.h"
72 #include "fileutils.h"
73 #include "closestream.h"
76 #define WRITE_TIME_OUT 300 /* in seconds */
78 /* Function prototypes */
79 static char *makemsg(char *fname
, char **mvec
, int mvecsz
,
80 size_t *mbufsize
, int print_banner
);
82 static void __attribute__((__noreturn__
)) usage(void)
85 fputs(USAGE_HEADER
, out
);
87 _(" %s [options] [<file> | <message>]\n"), program_invocation_short_name
);
89 fputs(USAGE_SEPARATOR
, out
);
90 fputs(_("Write a message to all users.\n"), out
);
92 fputs(USAGE_OPTIONS
, out
);
93 fputs(_(" -g, --group <group> only send message to group\n"), out
);
94 fputs(_(" -n, --nobanner do not print banner, works only for root\n"), out
);
95 fputs(_(" -t, --timeout <timeout> write timeout in seconds\n"), out
);
96 fputs(USAGE_SEPARATOR
, out
);
97 printf(USAGE_HELP_OPTIONS(25));
98 printf(USAGE_MAN_TAIL("wall(1)"));
103 struct group_workspace
{
104 gid_t requested_group
;
107 /* getgrouplist() on OSX takes int* not gid_t* */
115 static gid_t
get_group_gid(const char *group
)
120 if ((gr
= getgrnam(group
)))
123 gid
= strtou32_or_err(group
, _("invalid group argument"));
125 errx(EXIT_FAILURE
, _("%s: unknown gid"), group
);
130 static struct group_workspace
*init_group_workspace(const char *group
)
132 struct group_workspace
*buf
= xmalloc(sizeof(struct group_workspace
));
134 buf
->requested_group
= get_group_gid(group
);
135 buf
->ngroups
= sysconf(_SC_NGROUPS_MAX
) + 1; /* room for the primary gid */
136 buf
->groups
= xcalloc(sizeof(*buf
->groups
), buf
->ngroups
);
141 static void free_group_workspace(struct group_workspace
*buf
)
150 static int is_gr_member(const char *login
, const struct group_workspace
*buf
)
153 int ngroups
= buf
->ngroups
;
156 pw
= getpwnam(login
);
160 if (buf
->requested_group
== pw
->pw_gid
)
163 rc
= getgrouplist(login
, pw
->pw_gid
, buf
->groups
, &ngroups
);
165 /* buffer too small, not sure how this can happen, since
166 we used sysconf to get the size... */
168 _("getgrouplist found more groups than sysconf allows"));
171 for (; ngroups
>= 0; --ngroups
) {
172 if (buf
->requested_group
== (gid_t
) buf
->groups
[ngroups
])
179 int main(int argc
, char **argv
)
183 struct utmpx
*utmpptr
;
185 char line
[sizeof(utmpptr
->ut_line
) + 1];
186 int print_banner
= TRUE
;
187 struct group_workspace
*group_buf
= NULL
;
188 char *mbuf
, *fname
= NULL
;
190 unsigned timeout
= WRITE_TIME_OUT
;
194 static const struct option longopts
[] = {
195 { "nobanner", no_argument
, NULL
, 'n' },
196 { "timeout", required_argument
, NULL
, 't' },
197 { "group", required_argument
, NULL
, 'g' },
198 { "version", no_argument
, NULL
, 'V' },
199 { "help", no_argument
, NULL
, 'h' },
203 setlocale(LC_ALL
, "");
204 bindtextdomain(PACKAGE
, LOCALEDIR
);
206 close_stdout_atexit();
208 while ((ch
= getopt_long(argc
, argv
, "nt:g:Vh", longopts
, NULL
)) != -1) {
212 print_banner
= FALSE
;
214 warnx(_("--nobanner is available only for root"));
217 timeout
= strtou32_or_err(optarg
, _("invalid timeout argument"));
219 errx(EXIT_FAILURE
, _("invalid timeout argument: %s"), optarg
);
222 group_buf
= init_group_workspace(optarg
);
226 print_version(EXIT_SUCCESS
);
230 errtryhelp(EXIT_FAILURE
);
236 if (argc
== 1 && access(argv
[0], F_OK
) == 0)
238 else if (argc
>= 1) {
243 mbuf
= makemsg(fname
, mvec
, mvecsz
, &mbufsize
, print_banner
);
246 iov
.iov_len
= mbufsize
;
247 while((utmpptr
= getutxent())) {
248 if (!utmpptr
->ut_user
[0])
251 if (utmpptr
->ut_type
!= USER_PROCESS
)
254 /* Joey Hess reports that use-sessreg in /etc/X11/wdm/ produces
255 * ut_line entries like :0, and a write to /dev/:0 fails.
257 * It also seems that some login manager may produce empty ut_line.
259 if (!*utmpptr
->ut_line
|| *utmpptr
->ut_line
== ':')
262 if (group_buf
&& !is_gr_member(utmpptr
->ut_user
, group_buf
))
265 mem2strcpy(line
, utmpptr
->ut_line
, sizeof(utmpptr
->ut_line
), sizeof(line
));
266 if ((p
= ttymsg(&iov
, 1, line
, timeout
)) != NULL
)
271 free_group_workspace(group_buf
);
281 static void buf_enlarge(struct buffer
*bs
, size_t len
)
283 if (bs
->sz
== 0 || len
> bs
->sz
- bs
->used
) {
284 bs
->sz
+= len
< 128 ? 128 : len
;
285 bs
->data
= xrealloc(bs
->data
, bs
->sz
);
289 static void buf_puts(struct buffer
*bs
, const char *s
)
291 size_t len
= strlen(s
);
293 buf_enlarge(bs
, len
+ 1);
294 memcpy(bs
->data
+ bs
->used
, s
, len
+ 1);
298 static void buf_printf(struct buffer
*bs
, const char *fmt
, ...)
304 buf_enlarge(bs
, 0); /* default size */
305 limit
= bs
->sz
- bs
->used
;
308 rc
= vsnprintf(bs
->data
+ bs
->used
, limit
, fmt
, ap
);
311 if (rc
>= 0 && (size_t) rc
>= limit
) { /* not enough, enlarge */
312 buf_enlarge(bs
, (size_t)rc
+ 1);
313 limit
= bs
->sz
- bs
->used
;
315 rc
= vsnprintf(bs
->data
+ bs
->used
, limit
, fmt
, ap
);
323 static void buf_putc_careful(struct buffer
*bs
, int c
)
325 if (isprint(c
) || c
== '\a' || c
== '\t' || c
== '\r' || c
== '\n') {
327 bs
->data
[bs
->used
++] = c
;
328 } else if (!c_isascii(c
))
329 buf_printf(bs
, "\\%3o", (unsigned char)c
);
331 char tmp
[] = { '^', c
^ 0x40, '\0' };
336 static char *makemsg(char *fname
, char **mvec
, int mvecsz
,
337 size_t *mbufsize
, int print_banner
)
339 struct buffer _bs
= {.used
= 0}, *bs
= &_bs
;
340 register int ch
, cnt
;
344 line_max
= sysconf(_SC_LINE_MAX
);
348 lbuf
= xmalloc(line_max
);
350 if (print_banner
== TRUE
) {
351 char *hostname
= xgethostname();
352 char *whom
, *where
, *date
;
356 if (!(whom
= getlogin()) || !*whom
)
357 whom
= (pw
= getpwuid(getuid())) ? pw
->pw_name
: "???";
360 warn(_("cannot get passwd uid"));
362 where
= ttyname(STDOUT_FILENO
);
365 } else if (strncmp(where
, "/dev/", 5) == 0)
369 date
= xstrdup(ctime(&now
));
370 date
[strlen(date
) - 1] = '\0';
373 * all this stuff is to blank out a square for the message;
374 * we wrap message lines at column 79, not 80, because some
375 * terminals wrap after 79, some do not, and we can't tell.
376 * Which means that we may leave a non-blank character
377 * in column 80, but that can't be helped.
379 /* snprintf is not always available, but the sprintf's here
380 will not overflow as long as %d takes at most 100 chars */
381 buf_printf(bs
, "\r%*s\r\n", TERM_WIDTH
, " ");
383 snprintf(lbuf
, line_max
,
384 _("Broadcast message from %s@%s (%s) (%s):"),
385 whom
, hostname
, where
, date
);
386 buf_printf(bs
, "%-*.*s\007\007\r\n", TERM_WIDTH
, TERM_WIDTH
, lbuf
);
390 buf_printf(bs
, "%*s\r\n", TERM_WIDTH
, " ");
394 * Read message from argv[]
398 for (i
= 0; i
< mvecsz
; i
++) {
399 buf_puts(bs
, mvec
[i
]);
403 buf_puts(bs
, "\r\n");
406 * read message from <file>
410 * When we are not root, but suid or sgid, refuse to read files
411 * (e.g. device files) that the user may not have access to.
412 * After all, our invoker can easily do "wall < file"
413 * instead of "wall file".
415 uid_t uid
= getuid();
416 if (uid
&& (uid
!= geteuid() || getgid() != getegid()))
417 errx(EXIT_FAILURE
, _("will not read %s - use stdin."),
420 if (!freopen(fname
, "r", stdin
))
421 err(EXIT_FAILURE
, _("cannot open %s"), fname
);
426 * Read message from stdin.
428 while (fgets(lbuf
, line_max
, stdin
)) {
429 for (cnt
= 0, p
= lbuf
; (ch
= *p
) != '\0'; ++p
, ++cnt
) {
430 if (cnt
== TERM_WIDTH
|| ch
== '\n') {
431 for (; cnt
< TERM_WIDTH
; ++cnt
)
433 buf_puts(bs
, "\r\n");
437 cnt
+= (7 - (cnt
% 8));
439 buf_putc_careful(bs
, ch
);
443 buf_printf(bs
, "%*s\r\n", TERM_WIDTH
, " ");
447 bs
->data
[bs
->used
] = '\0'; /* be paranoid */
448 *mbufsize
= bs
->used
;