1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 #pragma ident "%Z%%M% %I% %E% SMI" 28 29 /* 30 * util.c contains a set of miscellaneous utility functions which: 31 * - syslog(LOG_DEBUG, ...) if debugging is enabled 32 * - check for an IP interface being marked running 33 * - look up all flags for an IP interface 34 * - start a child process 35 * - schedule a timer 36 * - check to see if a user is logged in to a graphical console 37 * - look up the zone name 38 */ 39 40 #include <stdarg.h> 41 #include <stdio.h> 42 #include <stdlib.h> 43 #include <unistd.h> 44 #include <pthread.h> 45 #include <string.h> 46 #include <strings.h> 47 #include <stropts.h> 48 #include <syslog.h> 49 #include <sys/types.h> 50 #include <sys/socket.h> 51 #include <sys/sockio.h> 52 #include <net/if.h> 53 #include <spawn.h> 54 #include <wait.h> 55 #include <inetcfg.h> 56 #include <utmpx.h> 57 #include <pwd.h> 58 #include <limits.h> 59 #include <errno.h> 60 #include <zone.h> 61 62 #include "defines.h" 63 #include "structures.h" 64 #include "functions.h" 65 #include "variables.h" 66 67 extern char **environ; 68 boolean_t debug = B_FALSE; 69 70 void 71 dprintf(const char *fmt, ...) 72 { 73 va_list ap; 74 char vbuf[1024]; 75 76 va_start(ap, fmt); 77 if (debug) { 78 (void) vsnprintf(vbuf, sizeof (vbuf), fmt, ap); 79 syslog(LOG_DEBUG, "%d: %s", pthread_self(), vbuf); 80 } 81 va_end(ap); 82 } 83 84 boolean_t 85 is_plugged_in(struct interface *i) 86 { 87 if (i->if_type == IF_WIRELESS) 88 return (B_TRUE); 89 90 return ((get_ifflags(i->if_name, i->if_family) & IFF_RUNNING) != 0); 91 } 92 93 uint64_t 94 get_ifflags(const char *name, sa_family_t family) 95 { 96 icfg_if_t intf; 97 icfg_handle_t h; 98 uint64_t flags = 0; 99 100 (void) strlcpy(intf.if_name, name, sizeof (intf.if_name)); 101 intf.if_protocol = family; 102 103 if (icfg_open(&h, &intf) != ICFG_SUCCESS) 104 return (0); 105 106 if (icfg_get_flags(h, &flags) != ICFG_SUCCESS) { 107 /* 108 * Interfaces can be ripped out from underneath us (for example 109 * by DHCP). We don't want to spam the console for those. 110 */ 111 if (errno == ENOENT) 112 dprintf("get_ifflags: icfg_get_flags failed for '%s'", 113 name); 114 else 115 syslog(LOG_ERR, "get_ifflags: icfg_get_flags %s af " 116 "%d: %m", name, family); 117 /* just to be sure... */ 118 flags = 0; 119 } 120 icfg_close(h); 121 122 return (flags); 123 } 124 125 /* 126 * 127 * This starts a child process determined by command. If command contains a 128 * slash then it is assumed to be a full path; otherwise the path is searched 129 * for an executable file with the name command. Command is also used as 130 * argv[0] of the new process. The rest of the arguments of the function 131 * up to the first NULL make up pointers to arguments of the new process. 132 * 133 * This function returns child exit status on success and -1 on failure. 134 * 135 * NOTE: original_sigmask must be set before this function is called. 136 */ 137 int 138 start_childv(const char *command, char const * const *argv) 139 { 140 posix_spawnattr_t attr; 141 sigset_t fullset; 142 int i, rc, status, n; 143 pid_t pid; 144 char vbuf[1024]; 145 146 vbuf[0] = 0; 147 n = sizeof (vbuf); 148 for (i = 1; argv[i] != NULL && n > 2; i++) { 149 n -= strlcat(vbuf, " ", n); 150 n -= strlcat(vbuf, argv[i], n); 151 } 152 if (argv[i] != NULL || n < 0) 153 syslog(LOG_ERR, "start_childv can't log full arg vector"); 154 155 if ((rc = posix_spawnattr_init(&attr)) != 0) { 156 dprintf("posix_spawnattr_init %d %s\n", rc, strerror(rc)); 157 return (-1); 158 } 159 (void) sigfillset(&fullset); 160 if ((rc = posix_spawnattr_setsigdefault(&attr, &fullset)) != 0) { 161 dprintf("setsigdefault %d %s\n", rc, strerror(rc)); 162 return (-1); 163 } 164 if ((rc = posix_spawnattr_setsigmask(&attr, &original_sigmask)) != 0) { 165 dprintf("setsigmask %d %s\n", rc, strerror(rc)); 166 return (-1); 167 } 168 if ((rc = posix_spawnattr_setflags(&attr, 169 POSIX_SPAWN_SETSIGDEF|POSIX_SPAWN_SETSIGMASK)) != 0) { 170 dprintf("setflags %d %s\n", rc, strerror(rc)); 171 return (-1); 172 } 173 174 if ((rc = posix_spawnp(&pid, command, NULL, &attr, (char * const *)argv, 175 environ)) > 0) { 176 dprintf("posix_spawnp failed errno %d", rc); 177 return (-1); 178 } 179 180 if ((rc = posix_spawnattr_destroy(&attr)) != 0) { 181 dprintf("posix_spawn_attr_destroy %d %s\n", rc, strerror(rc)); 182 return (-1); 183 } 184 185 (void) waitpid(pid, &status, 0); 186 if (WIFSIGNALED(status) || WIFSTOPPED(status)) { 187 i = WIFSIGNALED(status) ? WTERMSIG(status) : WSTOPSIG(status); 188 syslog(LOG_ERR, "'%s%s' %s with signal %d (%s)", command, vbuf, 189 (WIFSIGNALED(status) ? "terminated" : "stopped"), i, 190 strsignal(i)); 191 return (-2); 192 } else { 193 syslog(LOG_INFO, "'%s%s' completed normally: %d", command, vbuf, 194 WEXITSTATUS(status)); 195 return (WEXITSTATUS(status)); 196 } 197 } 198 199 int 200 start_child(const char *command, ...) 201 { 202 const char **argv = NULL; 203 int argv_len = 0; 204 va_list ap; 205 int i = 1, rc; 206 207 va_start(ap, command); 208 do { 209 if (i >= argv_len) { 210 void *p; 211 212 argv_len = argv_len != 0 ? argv_len * 2 : 4; 213 p = realloc(argv, sizeof (*argv)*argv_len); 214 if (p != NULL) { 215 argv = p; 216 } else { 217 syslog(LOG_ERR, "Out of memory in start_child"); 218 free(argv); 219 return (-1); 220 } 221 } 222 223 argv[i] = va_arg(ap, const char *); 224 } while (argv[i++] != NULL); 225 va_end(ap); 226 argv[0] = command; 227 228 rc = start_childv(command, argv); 229 free(argv); 230 231 return (rc); 232 } 233 234 uint32_t timer_expire = TIMER_INFINITY; 235 236 /* 237 * Schedules a SIGALRM in delay seconds, unless one is already 238 * scheduled sooner. If one is already scheduled later than 239 * delay seconds from now, that one will be replaced. 240 */ 241 void 242 start_timer(uint32_t now, uint32_t delay) 243 { 244 if (now + delay > timer_expire) 245 return; 246 247 timer_expire = now + delay; 248 (void) alarm(delay); 249 } 250 251 boolean_t 252 valid_graphical_user(boolean_t query) 253 { 254 struct utmpx *utp; 255 char *user = NULL; 256 const char HOMESTR[] = "HOME="; 257 char buf[1024]; /* == sysconf(_SC_GETPW_R_SIZE_MAX) == NSS_BUFSIZ */ 258 static char home_dir[PATH_MAX + sizeof (HOMESTR)]; 259 struct passwd passwd; 260 struct passwd *pw; 261 boolean_t popup_ok; 262 263 /* 264 * Check to see if our SMF property says popups are OK. 265 */ 266 if ((lookup_boolean_property(OUR_PG, query ? "popup_query" : 267 "popup_info", &popup_ok) == 0) && !popup_ok) 268 return (B_FALSE); 269 270 /* 271 * Look for someone logged into the console from host ":0" (i.e., 272 * the X display. Down the road, we should generalize this so 273 * ":0" is not hard-coded. 274 */ 275 setutxent(); 276 while ((utp = getutxent()) != NULL) { 277 if ((utp->ut_type == USER_PROCESS) && 278 (strcmp(utp->ut_line, "console") == 0) && 279 (strcmp(utp->ut_host, ":0") == 0)) { 280 user = strdup(utp->ut_user); 281 break; 282 } 283 } 284 endutxent(); 285 dprintf("utmpx: done %s", user != NULL ? user : ""); 286 287 if (user == NULL) 288 return (B_FALSE); 289 290 pw = getpwnam_r(user, &passwd, buf, sizeof (buf)); 291 if (pw == NULL) { 292 syslog(LOG_ERR, "couldn't get user %s: %m", user); 293 free(user); 294 return (B_FALSE); 295 } 296 free(user); 297 298 /* 299 * We shouldn't be dumping this into our environment or changing 300 * our uid/gid but instead starting up the zenity processes with 301 * this display as this user. RFE to change this. 302 */ 303 (void) putenv("DISPLAY=:0.0"); 304 305 (void) strlcpy(home_dir, HOMESTR, sizeof (home_dir)); 306 (void) strlcat(home_dir, pw->pw_dir, sizeof (home_dir)); 307 (void) putenv(home_dir); 308 309 return (pw != NULL); 310 } 311 312 void 313 lookup_zonename(char *zonename, size_t zonesize) 314 { 315 zoneid_t zoneid = getzoneid(); 316 317 if (getzonenamebyid(zoneid, zonename, zonesize) >= 0) 318 return; 319 syslog(LOG_ERR, "could not determine zone name"); 320 (void) strlcpy(zonename, GLOBAL_ZONENAME, zonesize); 321 } 322