xref: /illumos-gate/usr/src/cmd/wall/wall.c (revision 1eabc4be)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*	Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T	*/
23 /*	  All Rights Reserved  	*/
24 
25 
26 
27 /*
28  * Copyright 1988-2003 Sun Microsystems, Inc.  All rights reserved.
29  * Use is subject to license terms.
30  */
31 
32 /*
33  * Copyright 2012 Joyent, Inc. All rights reserved.
34  *
35  * Copyright (c) 2013 Gary Mills
36  */
37 
38 #include <signal.h>
39 #include <stdio.h>
40 #include <stdlib.h>
41 #include <grp.h>
42 #include <sys/types.h>
43 #include <unistd.h>
44 #include <string.h>
45 #include <ctype.h>
46 #include <sys/stat.h>
47 #include <utmpx.h>
48 #include <sys/utsname.h>
49 #include <dirent.h>
50 #include <pwd.h>
51 #include <fcntl.h>
52 #include <time.h>
53 #include <errno.h>
54 #include <locale.h>
55 #include <syslog.h>
56 #include <sys/wait.h>
57 #include <limits.h>
58 #include <libzonecfg.h>
59 #include <zone.h>
60 #include <sys/contract/process.h>
61 #include <libcontract.h>
62 #include <sys/ctfs.h>
63 
64 /*
65  * Use the full lengths from utmpx for user and line.
66  */
67 #define	NMAX	(sizeof (((struct utmpx *)0)->ut_user))
68 #define	LMAX	(sizeof (((struct utmpx *)0)->ut_line))
69 
70 static char	mesg[3000];
71 static char	*infile;
72 static int	gflag;
73 static struct	group *pgrp;
74 static char	*grpname;
75 static char	line[MAXNAMLEN+1] = "???";
76 static char	systm[MAXNAMLEN+1];
77 static time_t	tloc;
78 static struct	utsname utsn;
79 static char	who[NMAX+1]	= "???";
80 static char	time_buf[50];
81 #define	DATE_FMT	"%a %b %e %H:%M:%S"
82 
83 static void sendmes(struct utmpx *, zoneid_t);
84 static void sendmes_tozone(zoneid_t, int);
85 static int chkgrp(char *);
86 static char *copy_str_till(char *, char *, char, int);
87 
88 static int init_template(void);
89 int contract_abandon_id(ctid_t);
90 
91 int
main(int argc,char * argv[])92 main(int argc, char *argv[])
93 {
94 	FILE	*f;
95 	char	*ptr, *start;
96 	struct	passwd *pwd;
97 	char	*term_name;
98 	int	c;
99 	int	aflag = 0;
100 	int	errflg = 0;
101 	int zflg = 0;
102 	int Zflg = 0;
103 
104 	char *zonename = NULL;
105 	zoneid_t *zoneidlist = NULL;
106 	uint_t nzids_saved, nzids = 0;
107 
108 	(void) setlocale(LC_ALL, "");
109 
110 	while ((c = getopt(argc, argv, "g:az:Z")) != EOF)
111 		switch (c) {
112 		case 'a':
113 			aflag++;
114 			break;
115 		case 'g':
116 			if (gflag) {
117 				(void) fprintf(stderr,
118 				    "Only one group allowed\n");
119 				return (1);
120 			}
121 			if ((pgrp = getgrnam(grpname = optarg)) == NULL) {
122 				(void) fprintf(stderr, "Unknown group %s\n",
123 				    grpname);
124 				return (1);
125 			}
126 			gflag++;
127 			break;
128 		case 'z':
129 			zflg++;
130 			zonename = optarg;
131 			if (getzoneidbyname(zonename) == -1) {
132 				(void) fprintf(stderr, "Specified zone %s "
133 				    "is invalid", zonename);
134 				return (1);
135 			}
136 			break;
137 		case 'Z':
138 			Zflg++;
139 			break;
140 		case '?':
141 			errflg++;
142 			break;
143 		}
144 
145 	if (errflg) {
146 		(void) fprintf(stderr,
147 		    "Usage: wall [-a] [-g group] [-z zone] [-Z] [files...]\n");
148 		return (1);
149 	}
150 
151 	if (zflg && Zflg) {
152 		(void) fprintf(stderr, "Cannot use -z with -Z\n");
153 		return (1);
154 	}
155 
156 	if (optind < argc)
157 		infile = argv[optind];
158 
159 	if (uname(&utsn) == -1) {
160 		(void) fprintf(stderr, "wall: uname() failed, %s\n",
161 		    strerror(errno));
162 		return (2);
163 	}
164 	(void) strcpy(systm, utsn.nodename);
165 
166 	/*
167 	 * Get the name of the terminal wall is running from.
168 	 */
169 
170 	if ((term_name = ttyname(fileno(stderr))) != NULL) {
171 		/*
172 		 * skip the leading "/dev/" in term_name
173 		 */
174 		(void) strncpy(line, &term_name[5], sizeof (line) - 1);
175 	}
176 
177 	if (who[0] == '?') {
178 		if (pwd = getpwuid(getuid()))
179 			(void) strncpy(&who[0], pwd->pw_name, sizeof (who));
180 	}
181 
182 	f = stdin;
183 	if (infile) {
184 		f = fopen(infile, "r");
185 		if (f == NULL) {
186 			(void) fprintf(stderr, "Cannot open %s\n", infile);
187 			return (1);
188 		}
189 	}
190 
191 	start = &mesg[0];
192 	ptr = start;
193 	while ((ptr - start) < 3000) {
194 		size_t n;
195 
196 		if (fgets(ptr, &mesg[sizeof (mesg)] - ptr, f) == NULL)
197 			break;
198 		if ((n = strlen(ptr)) == 0)
199 			break;
200 		ptr += n;
201 	}
202 	(void) fclose(f);
203 
204 	/*
205 	 * If the request is from the rwall daemon then use the caller's
206 	 * name and host.  We determine this if all of the following is true:
207 	 *	1) First 5 characters are "From "
208 	 *	2) Next non-white characters are of the form "name@host:"
209 	 */
210 	if (strcmp(line, "???") == 0) {
211 		char rwho[MAXNAMLEN+1];
212 		char rsystm[MAXNAMLEN+1];
213 		char *cp;
214 
215 		if (strncmp(mesg, "From ", 5) == 0) {
216 			cp = &mesg[5];
217 			cp = copy_str_till(rwho, cp, '@', MAXNAMLEN + 1);
218 			if (rwho[0] != '\0') {
219 				cp = copy_str_till(rsystm, ++cp, ':',
220 				    MAXNAMLEN + 1);
221 				if (rsystm[0] != '\0') {
222 					(void) strcpy(systm, rsystm);
223 					(void) strncpy(rwho, who,
224 					    sizeof (who));
225 					(void) strcpy(line, "rpc.rwalld");
226 				}
227 			}
228 		}
229 	}
230 	(void) time(&tloc);
231 	(void) strftime(time_buf, sizeof (time_buf),
232 	    DATE_FMT, localtime(&tloc));
233 
234 	if (zflg != 0) {
235 		if ((zoneidlist =
236 		    malloc(sizeof (zoneid_t))) == NULL ||
237 		    (*zoneidlist = getzoneidbyname(zonename)) == -1)
238 			return (errno);
239 		nzids = 1;
240 	} else if (Zflg != 0) {
241 		if (zone_list(NULL, &nzids) != 0)
242 			return (errno);
243 again:
244 		nzids *= 2;
245 		if ((zoneidlist = malloc(nzids * sizeof (zoneid_t))) == NULL)
246 			exit(errno);
247 		nzids_saved = nzids;
248 		if (zone_list(zoneidlist, &nzids) != 0) {
249 			(void) free(zoneidlist);
250 			return (errno);
251 		}
252 		if (nzids > nzids_saved) {
253 			free(zoneidlist);
254 			goto again;
255 		}
256 	}
257 	if (zflg || Zflg) {
258 		for (; nzids > 0; --nzids)
259 			sendmes_tozone(zoneidlist[nzids-1], aflag);
260 		free(zoneidlist);
261 	} else
262 		sendmes_tozone(getzoneid(), aflag);
263 
264 	return (0);
265 }
266 
267 /*
268  * Copy src to destination upto but not including the delim.
269  * Leave dst empty if delim not found or whitespace encountered.
270  * Return pointer to next character (delim, whitespace, or '\0')
271  */
272 static char *
copy_str_till(char * dst,char * src,char delim,int len)273 copy_str_till(char *dst, char *src, char delim, int len)
274 {
275 	int i = 0;
276 
277 	while (*src != '\0' && i < len) {
278 		if (isspace(*src)) {
279 			dst[0] = '\0';
280 			return (src);
281 		}
282 		if (*src == delim) {
283 			dst[i] = '\0';
284 			return (src);
285 		}
286 		dst[i++] = *src++;
287 	}
288 	dst[0] = '\0';
289 	return (src);
290 }
291 
292 static void
sendmes_tozone(zoneid_t zid,int aflag)293 sendmes_tozone(zoneid_t zid, int aflag) {
294 	int i = 0;
295 	char zonename[ZONENAME_MAX], root[MAXPATHLEN];
296 	struct utmpx *p;
297 
298 	if (zid != getzoneid()) {
299 		root[0] = '\0';
300 		(void) getzonenamebyid(zid, zonename, ZONENAME_MAX);
301 		(void) zone_get_rootpath(zonename, root, sizeof (root));
302 		(void) strlcat(root, UTMPX_FILE, sizeof (root));
303 		if (!utmpxname(root)) {
304 			(void) fprintf(stderr, "Cannot open %s\n", root);
305 			return;
306 		}
307 	} else {
308 		(void) utmpxname(UTMPX_FILE);
309 	}
310 	setutxent();
311 	while ((p = getutxent()) != NULL) {
312 		if (p->ut_type != USER_PROCESS)
313 			continue;
314 		/*
315 		 * if (-a option OR NOT pty window login), send the message
316 		 */
317 		if (aflag || !nonuserx(*p))
318 			sendmes(p, zid);
319 	}
320 	endutxent();
321 
322 	(void) alarm(60);
323 	do {
324 		i = (int)wait((int *)0);
325 	} while (i != -1 || errno != ECHILD);
326 
327 }
328 
329 /*
330  * Note to future maintainers: with the change of wall to use the
331  * getutxent() API, the forked children (created by this function)
332  * must call _exit as opposed to exit. This is necessary to avoid
333  * unwanted fflushing of getutxent's stdio stream (caused by atexit
334  * processing).
335  */
336 static void
sendmes(struct utmpx * p,zoneid_t zid)337 sendmes(struct utmpx *p, zoneid_t zid)
338 {
339 	int i;
340 	char *s;
341 	static char device[LMAX + 6];
342 	char *bp;
343 	int ibp;
344 	FILE *f;
345 	int fd, tmpl_fd;
346 	boolean_t zoneenter = B_FALSE;
347 
348 	if (zid != getzoneid()) {
349 		zoneenter = B_TRUE;
350 		tmpl_fd = init_template();
351 		if (tmpl_fd == -1) {
352 			(void) fprintf(stderr, "Could not initialize "
353 			    "process contract");
354 			return;
355 		}
356 	}
357 
358 	while ((i = (int)fork()) == -1) {
359 		(void) alarm(60);
360 		(void) wait((int *)0);
361 		(void) alarm(0);
362 	}
363 
364 	if (i)
365 		return;
366 
367 	if (zoneenter && zone_enter(zid) == -1) {
368 		char zonename[ZONENAME_MAX];
369 		(void) getzonenamebyid(zid, zonename, ZONENAME_MAX);
370 		(void) fprintf(stderr, "Could not enter zone "
371 		    "%s\n", zonename);
372 	}
373 	if (zoneenter)
374 		(void) ct_tmpl_clear(tmpl_fd);
375 
376 	if (gflag)
377 		if (!chkgrp(p->ut_user))
378 			_exit(0);
379 
380 	(void) signal(SIGHUP, SIG_IGN);
381 	(void) alarm(60);
382 	s = &device[0];
383 	(void) snprintf(s, sizeof (device), "/dev/%.*s", LMAX, p->ut_line);
384 
385 	/* check if the device is really a tty */
386 	if ((fd = open(s, O_WRONLY|O_NOCTTY|O_NONBLOCK)) == -1) {
387 		(void) fprintf(stderr, "Cannot send to %.*s on %s\n",
388 		    NMAX, p->ut_user, s);
389 		perror("open");
390 		(void) fflush(stderr);
391 		_exit(1);
392 	} else {
393 		if (!isatty(fd)) {
394 			(void) fprintf(stderr,
395 			    "Cannot send to device %.*s %s\n",
396 			    LMAX, p->ut_line,
397 			    "because it's not a tty");
398 			openlog("wall", 0, LOG_AUTH);
399 			syslog(LOG_CRIT, "%.*s in utmpx is not a tty\n",
400 			    LMAX, p->ut_line);
401 			closelog();
402 			(void) fflush(stderr);
403 			_exit(1);
404 		}
405 	}
406 #ifdef DEBUG
407 	(void) close(fd);
408 	f = fopen("wall.debug", "a");
409 #else
410 	f = fdopen(fd, "w");
411 #endif
412 	if (f == NULL) {
413 		(void) fprintf(stderr, "Cannot send to %-.*s on %s\n",
414 		    NMAX, &p->ut_user[0], s);
415 		perror("open");
416 		(void) fflush(stderr);
417 		_exit(1);
418 	}
419 	(void) fprintf(f,
420 	    "\07\07\07Broadcast Message from %s (%s) on %s %19.19s",
421 	    who, line, systm, time_buf);
422 	if (gflag)
423 		(void) fprintf(f, " to group %s", grpname);
424 	(void) fprintf(f, "...\n");
425 #ifdef DEBUG
426 	(void) fprintf(f, "DEBUG: To %.*s on %s\n", NMAX, p->ut_user, s);
427 #endif
428 	i = strlen(mesg);
429 	for (bp = mesg; --i >= 0; bp++) {
430 		ibp = (unsigned int)((unsigned char) *bp);
431 		if (*bp == '\n')
432 			(void) putc('\r', f);
433 		if (isprint(ibp) || *bp == '\r' || *bp == '\013' ||
434 		    *bp == ' ' || *bp == '\t' || *bp == '\n' || *bp == '\007') {
435 			(void) putc(*bp, f);
436 		} else {
437 			if (!isascii(*bp)) {
438 				(void) fputs("M-", f);
439 				*bp = toascii(*bp);
440 			}
441 			if (iscntrl(*bp)) {
442 				(void) putc('^', f);
443 				(void) putc(*bp + 0100, f);
444 			}
445 			else
446 				(void) putc(*bp, f);
447 		}
448 
449 		if (*bp == '\n')
450 			(void) fflush(f);
451 
452 		if (ferror(f) || feof(f)) {
453 			(void) printf("\n\007Write failed\n");
454 			(void) fflush(stdout);
455 			_exit(1);
456 		}
457 	}
458 	(void) fclose(f);
459 	(void) close(fd);
460 	_exit(0);
461 }
462 
463 
464 static int
chkgrp(char * name)465 chkgrp(char *name)
466 {
467 	int i;
468 	char user[NMAX + 1];
469 
470 	(void) strlcpy(user, name, sizeof (user));
471 	for (i = 0; pgrp->gr_mem[i] && pgrp->gr_mem[i][0]; i++) {
472 		if (strcmp(user, pgrp->gr_mem[i]) == 0)
473 			return (1);
474 	}
475 
476 	return (0);
477 }
478 
479 static int
init_template(void)480 init_template(void) {
481 	int fd = 0;
482 	int err = 0;
483 
484 	fd = open64(CTFS_ROOT "/process/template", O_RDWR);
485 	if (fd == -1)
486 		return (-1);
487 
488 	err |= ct_tmpl_set_critical(fd, 0);
489 	err |= ct_tmpl_set_informative(fd, 0);
490 	err |= ct_pr_tmpl_set_fatal(fd, CT_PR_EV_HWERR);
491 	err |= ct_pr_tmpl_set_param(fd, CT_PR_PGRPONLY | CT_PR_REGENT);
492 	if (err || ct_tmpl_activate(fd)) {
493 		(void) close(fd);
494 		return (-1);
495 	}
496 
497 	return (fd);
498 }
499