xref: /illumos-gate/usr/src/cmd/wall/wall.c (revision 69a119caa6570c7077699161b7c28b6ee9f8b0f4)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*	Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T	*/
23 /*	  All Rights Reserved  	*/
24 
25 
26 
27 /*
28  * Copyright 1988-2003 Sun Microsystems, Inc.  All rights reserved.
29  * Use is subject to license terms.
30  */
31 
32 /*
33  * Copyright 2012 Joyent, Inc. All rights reserved.
34  */
35 
36 #include <signal.h>
37 #include <stdio.h>
38 #include <stdlib.h>
39 #include <grp.h>
40 #include <sys/types.h>
41 #include <unistd.h>
42 #include <string.h>
43 #include <ctype.h>
44 #include <sys/stat.h>
45 #include <utmpx.h>
46 #include <sys/utsname.h>
47 #include <dirent.h>
48 #include <pwd.h>
49 #include <fcntl.h>
50 #include <time.h>
51 #include <errno.h>
52 #include <locale.h>
53 #include <syslog.h>
54 #include <sys/wait.h>
55 #include <limits.h>
56 #include <libzonecfg.h>
57 #include <zone.h>
58 #include <sys/contract/process.h>
59 #include <libcontract.h>
60 #include <sys/ctfs.h>
61 
62 /*
63  * utmpx defines wider fields for user and line.  For compatibility of output,
64  * we are limiting these to the old maximums in utmp. Define UTMPX_NAMELEN
65  * to use the full lengths.
66  */
67 #ifndef UTMPX_NAMELEN
68 /* XXX - utmp -fix name length */
69 #define	NMAX	(_POSIX_LOGIN_NAME_MAX - 1)
70 #define	LMAX	12
71 #else /* UTMPX_NAMELEN */
72 #define	NMAX	(sizeof (((struct utmpx *)0)->ut_user)
73 #define	LMAX	(sizeof (((struct utmpx *)0)->ut_line)
74 #endif /* UTMPX_NAMELEN */
75 
76 static char	mesg[3000];
77 static char	*infile;
78 static int	gflag;
79 static struct	group *pgrp;
80 static char	*grpname;
81 static char	line[MAXNAMLEN+1] = "???";
82 static char	systm[MAXNAMLEN+1];
83 static time_t	tloc;
84 static struct	utsname utsn;
85 static char	who[9]	= "???";
86 static char	time_buf[50];
87 #define	DATE_FMT	"%a %b %e %H:%M:%S"
88 
89 static void sendmes(struct utmpx *, zoneid_t);
90 static void sendmes_tozone(zoneid_t, int);
91 static int chkgrp(char *);
92 static char *copy_str_till(char *, char *, char, int);
93 
94 static int init_template(void);
95 int contract_abandon_id(ctid_t);
96 
97 int
98 main(int argc, char *argv[])
99 {
100 	FILE	*f;
101 	char	*ptr, *start;
102 	struct	passwd *pwd;
103 	char	*term_name;
104 	int	c;
105 	int	aflag = 0;
106 	int	errflg = 0;
107 	int zflg = 0;
108 	int Zflg = 0;
109 
110 	char *zonename = NULL;
111 	zoneid_t *zoneidlist = NULL;
112 	uint_t nzids_saved, nzids = 0;
113 
114 	(void) setlocale(LC_ALL, "");
115 
116 	while ((c = getopt(argc, argv, "g:az:Z")) != EOF)
117 		switch (c) {
118 		case 'a':
119 			aflag++;
120 			break;
121 		case 'g':
122 			if (gflag) {
123 				(void) fprintf(stderr,
124 				    "Only one group allowed\n");
125 				return (1);
126 			}
127 			if ((pgrp = getgrnam(grpname = optarg)) == NULL) {
128 				(void) fprintf(stderr, "Unknown group %s\n",
129 				    grpname);
130 				return (1);
131 			}
132 			gflag++;
133 			break;
134 		case 'z':
135 			zflg++;
136 			zonename = optarg;
137 			if (getzoneidbyname(zonename) == -1) {
138 				(void) fprintf(stderr, "Specified zone %s "
139 				    "is invalid", zonename);
140 				return (1);
141 			}
142 			break;
143 		case 'Z':
144 			Zflg++;
145 			break;
146 		case '?':
147 			errflg++;
148 			break;
149 		}
150 
151 	if (errflg) {
152 		(void) fprintf(stderr,
153 		    "Usage: wall [-a] [-g group] [-z zone] [-Z] [files...]\n");
154 		return (1);
155 	}
156 
157 	if (zflg && Zflg) {
158 		(void) fprintf(stderr, "Cannot use -z with -Z\n");
159 		return (1);
160 	}
161 
162 	if (optind < argc)
163 		infile = argv[optind];
164 
165 	if (uname(&utsn) == -1) {
166 		(void) fprintf(stderr, "wall: uname() failed, %s\n",
167 		    strerror(errno));
168 		return (2);
169 	}
170 	(void) strcpy(systm, utsn.nodename);
171 
172 	/*
173 	 * Get the name of the terminal wall is running from.
174 	 */
175 
176 	if ((term_name = ttyname(fileno(stderr))) != NULL) {
177 		/*
178 		 * skip the leading "/dev/" in term_name
179 		 */
180 		(void) strncpy(line, &term_name[5], sizeof (line) - 1);
181 	}
182 
183 	if (who[0] == '?') {
184 		if (pwd = getpwuid(getuid()))
185 			(void) strncpy(&who[0], pwd->pw_name, sizeof (who));
186 	}
187 
188 	f = stdin;
189 	if (infile) {
190 		f = fopen(infile, "r");
191 		if (f == NULL) {
192 			(void) fprintf(stderr, "Cannot open %s\n", infile);
193 			return (1);
194 		}
195 	}
196 
197 	start = &mesg[0];
198 	ptr = start;
199 	while ((ptr - start) < 3000) {
200 		size_t n;
201 
202 		if (fgets(ptr, &mesg[sizeof (mesg)] - ptr, f) == NULL)
203 			break;
204 		if ((n = strlen(ptr)) == 0)
205 			break;
206 		ptr += n;
207 	}
208 	(void) fclose(f);
209 
210 	/*
211 	 * If the request is from the rwall daemon then use the caller's
212 	 * name and host.  We determine this if all of the following is true:
213 	 *	1) First 5 characters are "From "
214 	 *	2) Next non-white characters are of the form "name@host:"
215 	 */
216 	if (strcmp(line, "???") == 0) {
217 		char rwho[MAXNAMLEN+1];
218 		char rsystm[MAXNAMLEN+1];
219 		char *cp;
220 
221 		if (strncmp(mesg, "From ", 5) == 0) {
222 			cp = &mesg[5];
223 			cp = copy_str_till(rwho, cp, '@', MAXNAMLEN + 1);
224 			if (rwho[0] != '\0') {
225 				cp = copy_str_till(rsystm, ++cp, ':',
226 				    MAXNAMLEN + 1);
227 				if (rsystm[0] != '\0') {
228 					(void) strcpy(systm, rsystm);
229 					(void) strncpy(rwho, who, 9);
230 					(void) strcpy(line, "rpc.rwalld");
231 				}
232 			}
233 		}
234 	}
235 	(void) time(&tloc);
236 	(void) strftime(time_buf, sizeof (time_buf),
237 	    DATE_FMT, localtime(&tloc));
238 
239 	if (zflg != 0) {
240 		if ((zoneidlist =
241 		    malloc(sizeof (zoneid_t))) == NULL ||
242 		    (*zoneidlist = getzoneidbyname(zonename)) == -1)
243 			return (errno);
244 		nzids = 1;
245 	} else if (Zflg != 0) {
246 		if (zone_list(NULL, &nzids) != 0)
247 			return (errno);
248 again:
249 		nzids *= 2;
250 		if ((zoneidlist = malloc(nzids * sizeof (zoneid_t))) == NULL)
251 			exit(errno);
252 		nzids_saved = nzids;
253 		if (zone_list(zoneidlist, &nzids) != 0) {
254 			(void) free(zoneidlist);
255 			return (errno);
256 		}
257 		if (nzids > nzids_saved) {
258 			free(zoneidlist);
259 			goto again;
260 		}
261 	}
262 	if (zflg || Zflg) {
263 		for (; nzids > 0; --nzids)
264 			sendmes_tozone(zoneidlist[nzids-1], aflag);
265 		free(zoneidlist);
266 	} else
267 		sendmes_tozone(getzoneid(), aflag);
268 
269 	return (0);
270 }
271 
272 /*
273  * Copy src to destination upto but not including the delim.
274  * Leave dst empty if delim not found or whitespace encountered.
275  * Return pointer to next character (delim, whitespace, or '\0')
276  */
277 static char *
278 copy_str_till(char *dst, char *src, char delim, int len)
279 {
280 	int i = 0;
281 
282 	while (*src != '\0' && i < len) {
283 		if (isspace(*src)) {
284 			dst[0] = '\0';
285 			return (src);
286 		}
287 		if (*src == delim) {
288 			dst[i] = '\0';
289 			return (src);
290 		}
291 		dst[i++] = *src++;
292 	}
293 	dst[0] = '\0';
294 	return (src);
295 }
296 
297 static void
298 sendmes_tozone(zoneid_t zid, int aflag) {
299 	int i = 0;
300 	char zonename[ZONENAME_MAX], root[MAXPATHLEN];
301 	struct utmpx *p;
302 
303 	if (zid != getzoneid()) {
304 		root[0] = '\0';
305 		(void) getzonenamebyid(zid, zonename, ZONENAME_MAX);
306 		(void) zone_get_rootpath(zonename, root, sizeof (root));
307 		(void) strlcat(root, UTMPX_FILE, sizeof (root));
308 		if (!utmpxname(root)) {
309 			(void) fprintf(stderr, "Cannot open %s\n", root);
310 			return;
311 		}
312 	} else {
313 		(void) utmpxname(UTMPX_FILE);
314 	}
315 	setutxent();
316 	while ((p = getutxent()) != NULL) {
317 		if (p->ut_type != USER_PROCESS)
318 			continue;
319 		/*
320 		 * if (-a option OR NOT pty window login), send the message
321 		 */
322 		if (aflag || !nonuser(*p))
323 			sendmes(p, zid);
324 	}
325 	endutxent();
326 
327 	(void) alarm(60);
328 	do {
329 		i = (int)wait((int *)0);
330 	} while (i != -1 || errno != ECHILD);
331 
332 }
333 
334 /*
335  * Note to future maintainers: with the change of wall to use the
336  * getutxent() API, the forked children (created by this function)
337  * must call _exit as opposed to exit. This is necessary to avoid
338  * unwanted fflushing of getutxent's stdio stream (caused by atexit
339  * processing).
340  */
341 static void
342 sendmes(struct utmpx *p, zoneid_t zid)
343 {
344 	int i;
345 	char *s;
346 	static char device[LMAX + 6];
347 	char *bp;
348 	int ibp;
349 	FILE *f;
350 	int fd, tmpl_fd;
351 	boolean_t zoneenter = B_FALSE;
352 
353 	if (zid != getzoneid()) {
354 		zoneenter = B_TRUE;
355 		tmpl_fd = init_template();
356 		if (tmpl_fd == -1) {
357 			(void) fprintf(stderr, "Could not initialize "
358 			    "process contract");
359 			return;
360 		}
361 	}
362 
363 	while ((i = (int)fork()) == -1) {
364 		(void) alarm(60);
365 		(void) wait((int *)0);
366 		(void) alarm(0);
367 	}
368 
369 	if (i)
370 		return;
371 
372 	if (zoneenter && zone_enter(zid) == -1) {
373 		char zonename[ZONENAME_MAX];
374 		(void) getzonenamebyid(zid, zonename, ZONENAME_MAX);
375 		(void) fprintf(stderr, "Could not enter zone "
376 		    "%s\n", zonename);
377 	}
378 	if (zoneenter)
379 		(void) ct_tmpl_clear(tmpl_fd);
380 
381 	if (gflag)
382 		if (!chkgrp(p->ut_user))
383 			_exit(0);
384 
385 	(void) signal(SIGHUP, SIG_IGN);
386 	(void) alarm(60);
387 	s = &device[0];
388 	(void) snprintf(s, sizeof (device), "/dev/%.*s", LMAX, p->ut_line);
389 
390 	/* check if the device is really a tty */
391 	if ((fd = open(s, O_WRONLY|O_NOCTTY|O_NONBLOCK)) == -1) {
392 		(void) fprintf(stderr, "Cannot send to %.*s on %s\n",
393 		    NMAX, p->ut_user, s);
394 		perror("open");
395 		(void) fflush(stderr);
396 		_exit(1);
397 	} else {
398 		if (!isatty(fd)) {
399 			(void) fprintf(stderr,
400 			    "Cannot send to device %.*s %s\n",
401 			    LMAX, p->ut_line,
402 			    "because it's not a tty");
403 			openlog("wall", 0, LOG_AUTH);
404 			syslog(LOG_CRIT, "%.*s in utmpx is not a tty\n",
405 			    LMAX, p->ut_line);
406 			closelog();
407 			(void) fflush(stderr);
408 			_exit(1);
409 		}
410 	}
411 #ifdef DEBUG
412 	(void) close(fd);
413 	f = fopen("wall.debug", "a");
414 #else
415 	f = fdopen(fd, "w");
416 #endif
417 	if (f == NULL) {
418 		(void) fprintf(stderr, "Cannot send to %-.*s on %s\n",
419 		    NMAX, &p->ut_user[0], s);
420 		perror("open");
421 		(void) fflush(stderr);
422 		_exit(1);
423 	}
424 	(void) fprintf(f,
425 	    "\07\07\07Broadcast Message from %s (%s) on %s %19.19s",
426 	    who, line, systm, time_buf);
427 	if (gflag)
428 		(void) fprintf(f, " to group %s", grpname);
429 	(void) fprintf(f, "...\n");
430 #ifdef DEBUG
431 	(void) fprintf(f, "DEBUG: To %.8s on %s\n", p->ut_user, s);
432 #endif
433 	i = strlen(mesg);
434 	for (bp = mesg; --i >= 0; bp++) {
435 		ibp = (unsigned int)((unsigned char) *bp);
436 		if (*bp == '\n')
437 			(void) putc('\r', f);
438 		if (isprint(ibp) || *bp == '\r' || *bp == '\013' ||
439 		    *bp == ' ' || *bp == '\t' || *bp == '\n' || *bp == '\007') {
440 			(void) putc(*bp, f);
441 		} else {
442 			if (!isascii(*bp)) {
443 				(void) fputs("M-", f);
444 				*bp = toascii(*bp);
445 			}
446 			if (iscntrl(*bp)) {
447 				(void) putc('^', f);
448 				(void) putc(*bp + 0100, f);
449 			}
450 			else
451 				(void) putc(*bp, f);
452 		}
453 
454 		if (*bp == '\n')
455 			(void) fflush(f);
456 
457 		if (ferror(f) || feof(f)) {
458 			(void) printf("\n\007Write failed\n");
459 			(void) fflush(stdout);
460 			_exit(1);
461 		}
462 	}
463 	(void) fclose(f);
464 	(void) close(fd);
465 	_exit(0);
466 }
467 
468 
469 static int
470 chkgrp(char *name)
471 {
472 	int i;
473 	char *p;
474 
475 	for (i = 0; pgrp->gr_mem[i] && pgrp->gr_mem[i][0]; i++) {
476 		for (p = name; *p && *p != ' '; p++)
477 		;
478 		*p = 0;
479 		if (strncmp(name, pgrp->gr_mem[i], 8) == 0)
480 			return (1);
481 	}
482 
483 	return (0);
484 }
485 
486 static int
487 init_template(void) {
488 	int fd = 0;
489 	int err = 0;
490 
491 	fd = open64(CTFS_ROOT "/process/template", O_RDWR);
492 	if (fd == -1)
493 		return (-1);
494 
495 	err |= ct_tmpl_set_critical(fd, 0);
496 	err |= ct_tmpl_set_informative(fd, 0);
497 	err |= ct_pr_tmpl_set_fatal(fd, CT_PR_EV_HWERR);
498 	err |= ct_pr_tmpl_set_param(fd, CT_PR_PGRPONLY | CT_PR_REGENT);
499 	if (err || ct_tmpl_activate(fd)) {
500 		(void) close(fd);
501 		return (-1);
502 	}
503 
504 	return (fd);
505 }
506