1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License, Version 1.0 only
6 * (the "License"). You may not use this file except in compliance
7 * with the License.
8 *
9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10 * or http://www.opensolaris.org/os/licensing.
11 * See the License for the specific language governing permissions
12 * and limitations under the License.
13 *
14 * When distributing Covered Code, include this CDDL HEADER in each
15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16 * If applicable, add the following below this CDDL HEADER, with the
17 * fields enclosed by brackets "[]" replaced with your own identifying
18 * information: Portions Copyright [yyyy] [name of copyright owner]
19 *
20 * CDDL HEADER END
21 */
22 /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */
23 /* All Rights Reserved */
24
25
26
27 /*
28 * Copyright 1988-2003 Sun Microsystems, Inc. All rights reserved.
29 * Use is subject to license terms.
30 */
31
32 /*
33 * Copyright 2012 Joyent, Inc. All rights reserved.
34 */
35
36 #include <signal.h>
37 #include <stdio.h>
38 #include <stdlib.h>
39 #include <grp.h>
40 #include <sys/types.h>
41 #include <unistd.h>
42 #include <string.h>
43 #include <ctype.h>
44 #include <sys/stat.h>
45 #include <utmpx.h>
46 #include <sys/utsname.h>
47 #include <dirent.h>
48 #include <pwd.h>
49 #include <fcntl.h>
50 #include <time.h>
51 #include <errno.h>
52 #include <locale.h>
53 #include <syslog.h>
54 #include <sys/wait.h>
55 #include <limits.h>
56 #include <libzonecfg.h>
57 #include <zone.h>
58 #include <sys/contract/process.h>
59 #include <libcontract.h>
60 #include <sys/ctfs.h>
61
62 /*
63 * utmpx defines wider fields for user and line. For compatibility of output,
64 * we are limiting these to the old maximums in utmp. Define UTMPX_NAMELEN
65 * to use the full lengths.
66 */
67 #ifndef UTMPX_NAMELEN
68 /* XXX - utmp -fix name length */
69 #define NMAX (_POSIX_LOGIN_NAME_MAX - 1)
70 #define LMAX 12
71 #else /* UTMPX_NAMELEN */
72 #define NMAX (sizeof (((struct utmpx *)0)->ut_user)
73 #define LMAX (sizeof (((struct utmpx *)0)->ut_line)
74 #endif /* UTMPX_NAMELEN */
75
76 static char mesg[3000];
77 static char *infile;
78 static int gflag;
79 static struct group *pgrp;
80 static char *grpname;
81 static char line[MAXNAMLEN+1] = "???";
82 static char systm[MAXNAMLEN+1];
83 static time_t tloc;
84 static struct utsname utsn;
85 static char who[9] = "???";
86 static char time_buf[50];
87 #define DATE_FMT "%a %b %e %H:%M:%S"
88
89 static void sendmes(struct utmpx *, zoneid_t);
90 static void sendmes_tozone(zoneid_t, int);
91 static int chkgrp(char *);
92 static char *copy_str_till(char *, char *, char, int);
93
94 static int init_template(void);
95 int contract_abandon_id(ctid_t);
96
97 int
98 main(int argc, char *argv[])
99 {
100 FILE *f;
101 char *ptr, *start;
102 struct passwd *pwd;
103 char *term_name;
104 int c;
105 int aflag = 0;
106 int errflg = 0;
107 int zflg = 0;
108 int Zflg = 0;
109
110 char *zonename = NULL;
111 zoneid_t *zoneidlist = NULL;
112 uint_t nzids_saved, nzids = 0;
113
114 (void) setlocale(LC_ALL, "");
115
116 while ((c = getopt(argc, argv, "g:az:Z")) != EOF)
117 switch (c) {
118 case 'a':
119 aflag++;
120 break;
121 case 'g':
122 if (gflag) {
123 (void) fprintf(stderr,
124 "Only one group allowed\n");
125 return (1);
126 }
127 if ((pgrp = getgrnam(grpname = optarg)) == NULL) {
128 (void) fprintf(stderr, "Unknown group %s\n",
129 grpname);
130 return (1);
131 }
132 gflag++;
133 break;
134 case 'z':
135 zflg++;
136 zonename = optarg;
137 if (getzoneidbyname(zonename) == -1) {
138 (void) fprintf(stderr, "Specified zone %s "
139 "is invalid", zonename);
140 return (1);
141 }
142 break;
143 case 'Z':
144 Zflg++;
145 break;
146 case '?':
147 errflg++;
148 break;
149 }
150
151 if (errflg) {
152 (void) fprintf(stderr,
153 "Usage: wall [-a] [-g group] [-z zone] [-Z] [files...]\n");
154 return (1);
155 }
156
157 if (zflg && Zflg) {
158 (void) fprintf(stderr, "Cannot use -z with -Z\n");
159 return (1);
160 }
161
162 if (optind < argc)
163 infile = argv[optind];
164
165 if (uname(&utsn) == -1) {
166 (void) fprintf(stderr, "wall: uname() failed, %s\n",
167 strerror(errno));
168 return (2);
169 }
170 (void) strcpy(systm, utsn.nodename);
171
172 /*
173 * Get the name of the terminal wall is running from.
174 */
175
176 if ((term_name = ttyname(fileno(stderr))) != NULL) {
177 /*
178 * skip the leading "/dev/" in term_name
179 */
180 (void) strncpy(line, &term_name[5], sizeof (line) - 1);
181 }
182
183 if (who[0] == '?') {
184 if (pwd = getpwuid(getuid()))
185 (void) strncpy(&who[0], pwd->pw_name, sizeof (who));
186 }
187
188 f = stdin;
189 if (infile) {
190 f = fopen(infile, "r");
191 if (f == NULL) {
192 (void) fprintf(stderr, "Cannot open %s\n", infile);
193 return (1);
194 }
195 }
196
197 start = &mesg[0];
198 ptr = start;
199 while ((ptr - start) < 3000) {
200 size_t n;
201
202 if (fgets(ptr, &mesg[sizeof (mesg)] - ptr, f) == NULL)
203 break;
204 if ((n = strlen(ptr)) == 0)
205 break;
206 ptr += n;
207 }
208 (void) fclose(f);
209
210 /*
211 * If the request is from the rwall daemon then use the caller's
212 * name and host. We determine this if all of the following is true:
213 * 1) First 5 characters are "From "
214 * 2) Next non-white characters are of the form "name@host:"
215 */
216 if (strcmp(line, "???") == 0) {
217 char rwho[MAXNAMLEN+1];
218 char rsystm[MAXNAMLEN+1];
219 char *cp;
220
221 if (strncmp(mesg, "From ", 5) == 0) {
222 cp = &mesg[5];
223 cp = copy_str_till(rwho, cp, '@', MAXNAMLEN + 1);
224 if (rwho[0] != '\0') {
225 cp = copy_str_till(rsystm, ++cp, ':',
226 MAXNAMLEN + 1);
227 if (rsystm[0] != '\0') {
228 (void) strcpy(systm, rsystm);
229 (void) strncpy(rwho, who, 9);
230 (void) strcpy(line, "rpc.rwalld");
231 }
232 }
233 }
234 }
235 (void) time(&tloc);
236 (void) strftime(time_buf, sizeof (time_buf),
237 DATE_FMT, localtime(&tloc));
238
239 if (zflg != 0) {
240 if ((zoneidlist =
241 malloc(sizeof (zoneid_t))) == NULL ||
242 (*zoneidlist = getzoneidbyname(zonename)) == -1)
243 return (errno);
244 nzids = 1;
245 } else if (Zflg != 0) {
246 if (zone_list(NULL, &nzids) != 0)
247 return (errno);
248 again:
249 nzids *= 2;
250 if ((zoneidlist = malloc(nzids * sizeof (zoneid_t))) == NULL)
251 exit(errno);
252 nzids_saved = nzids;
253 if (zone_list(zoneidlist, &nzids) != 0) {
254 (void) free(zoneidlist);
255 return (errno);
256 }
257 if (nzids > nzids_saved) {
258 free(zoneidlist);
259 goto again;
260 }
261 }
262 if (zflg || Zflg) {
263 for (; nzids > 0; --nzids)
264 sendmes_tozone(zoneidlist[nzids-1], aflag);
265 free(zoneidlist);
266 } else
267 sendmes_tozone(getzoneid(), aflag);
268
269 return (0);
270 }
271
272 /*
273 * Copy src to destination upto but not including the delim.
274 * Leave dst empty if delim not found or whitespace encountered.
275 * Return pointer to next character (delim, whitespace, or '\0')
276 */
277 static char *
278 copy_str_till(char *dst, char *src, char delim, int len)
279 {
280 int i = 0;
281
282 while (*src != '\0' && i < len) {
283 if (isspace(*src)) {
284 dst[0] = '\0';
285 return (src);
286 }
287 if (*src == delim) {
288 dst[i] = '\0';
289 return (src);
290 }
291 dst[i++] = *src++;
292 }
293 dst[0] = '\0';
294 return (src);
295 }
296
297 static void
298 sendmes_tozone(zoneid_t zid, int aflag) {
299 int i = 0;
300 char zonename[ZONENAME_MAX], root[MAXPATHLEN];
301 struct utmpx *p;
302
303 if (zid != getzoneid()) {
304 root[0] = '\0';
305 (void) getzonenamebyid(zid, zonename, ZONENAME_MAX);
306 (void) zone_get_rootpath(zonename, root, sizeof (root));
307 (void) strlcat(root, UTMPX_FILE, sizeof (root));
308 if (!utmpxname(root)) {
309 (void) fprintf(stderr, "Cannot open %s\n", root);
310 return;
311 }
312 } else {
313 (void) utmpxname(UTMPX_FILE);
314 }
315 setutxent();
316 while ((p = getutxent()) != NULL) {
317 if (p->ut_type != USER_PROCESS)
318 continue;
319 /*
320 * if (-a option OR NOT pty window login), send the message
321 */
322 if (aflag || !nonuser(*p))
323 sendmes(p, zid);
324 }
325 endutxent();
326
327 (void) alarm(60);
328 do {
329 i = (int)wait((int *)0);
330 } while (i != -1 || errno != ECHILD);
331
332 }
333
334 /*
335 * Note to future maintainers: with the change of wall to use the
336 * getutxent() API, the forked children (created by this function)
337 * must call _exit as opposed to exit. This is necessary to avoid
338 * unwanted fflushing of getutxent's stdio stream (caused by atexit
339 * processing).
340 */
341 static void
342 sendmes(struct utmpx *p, zoneid_t zid)
343 {
344 int i;
345 char *s;
346 static char device[LMAX + 6];
347 char *bp;
348 int ibp;
349 FILE *f;
350 int fd, tmpl_fd;
351 boolean_t zoneenter = B_FALSE;
352
353 if (zid != getzoneid()) {
354 zoneenter = B_TRUE;
355 tmpl_fd = init_template();
356 if (tmpl_fd == -1) {
357 (void) fprintf(stderr, "Could not initialize "
358 "process contract");
359 return;
360 }
361 }
362
363 while ((i = (int)fork()) == -1) {
364 (void) alarm(60);
365 (void) wait((int *)0);
366 (void) alarm(0);
367 }
368
369 if (i)
370 return;
371
372 if (zoneenter && zone_enter(zid) == -1) {
373 char zonename[ZONENAME_MAX];
374 (void) getzonenamebyid(zid, zonename, ZONENAME_MAX);
375 (void) fprintf(stderr, "Could not enter zone "
376 "%s\n", zonename);
377 }
378 if (zoneenter)
379 (void) ct_tmpl_clear(tmpl_fd);
380
381 if (gflag)
382 if (!chkgrp(p->ut_user))
383 _exit(0);
384
385 (void) signal(SIGHUP, SIG_IGN);
386 (void) alarm(60);
387 s = &device[0];
388 (void) snprintf(s, sizeof (device), "/dev/%.*s", LMAX, p->ut_line);
389
390 /* check if the device is really a tty */
391 if ((fd = open(s, O_WRONLY|O_NOCTTY|O_NONBLOCK)) == -1) {
392 (void) fprintf(stderr, "Cannot send to %.*s on %s\n",
393 NMAX, p->ut_user, s);
394 perror("open");
395 (void) fflush(stderr);
396 _exit(1);
397 } else {
398 if (!isatty(fd)) {
399 (void) fprintf(stderr,
400 "Cannot send to device %.*s %s\n",
401 LMAX, p->ut_line,
402 "because it's not a tty");
403 openlog("wall", 0, LOG_AUTH);
404 syslog(LOG_CRIT, "%.*s in utmpx is not a tty\n",
405 LMAX, p->ut_line);
406 closelog();
407 (void) fflush(stderr);
408 _exit(1);
409 }
410 }
411 #ifdef DEBUG
412 (void) close(fd);
413 f = fopen("wall.debug", "a");
414 #else
415 f = fdopen(fd, "w");
416 #endif
417 if (f == NULL) {
418 (void) fprintf(stderr, "Cannot send to %-.*s on %s\n",
419 NMAX, &p->ut_user[0], s);
420 perror("open");
421 (void) fflush(stderr);
422 _exit(1);
423 }
424 (void) fprintf(f,
425 "\07\07\07Broadcast Message from %s (%s) on %s %19.19s",
426 who, line, systm, time_buf);
427 if (gflag)
428 (void) fprintf(f, " to group %s", grpname);
429 (void) fprintf(f, "...\n");
430 #ifdef DEBUG
431 (void) fprintf(f, "DEBUG: To %.8s on %s\n", p->ut_user, s);
432 #endif
433 i = strlen(mesg);
434 for (bp = mesg; --i >= 0; bp++) {
435 ibp = (unsigned int)((unsigned char) *bp);
436 if (*bp == '\n')
437 (void) putc('\r', f);
438 if (isprint(ibp) || *bp == '\r' || *bp == '\013' ||
439 *bp == ' ' || *bp == '\t' || *bp == '\n' || *bp == '\007') {
440 (void) putc(*bp, f);
441 } else {
442 if (!isascii(*bp)) {
443 (void) fputs("M-", f);
444 *bp = toascii(*bp);
445 }
446 if (iscntrl(*bp)) {
447 (void) putc('^', f);
448 (void) putc(*bp + 0100, f);
449 }
450 else
451 (void) putc(*bp, f);
452 }
453
454 if (*bp == '\n')
455 (void) fflush(f);
456
457 if (ferror(f) || feof(f)) {
458 (void) printf("\n\007Write failed\n");
459 (void) fflush(stdout);
460 _exit(1);
461 }
462 }
463 (void) fclose(f);
464 (void) close(fd);
465 _exit(0);
466 }
467
468
469 static int
470 chkgrp(char *name)
471 {
472 int i;
473 char *p;
474
475 for (i = 0; pgrp->gr_mem[i] && pgrp->gr_mem[i][0]; i++) {
476 for (p = name; *p && *p != ' '; p++)
477 ;
478 *p = 0;
479 if (strncmp(name, pgrp->gr_mem[i], 8) == 0)
480 return (1);
481 }
482
483 return (0);
484 }
485
486 static int
487 init_template(void) {
488 int fd = 0;
489 int err = 0;
490
491 fd = open64(CTFS_ROOT "/process/template", O_RDWR);
492 if (fd == -1)
493 return (-1);
494
495 err |= ct_tmpl_set_critical(fd, 0);
496 err |= ct_tmpl_set_informative(fd, 0);
497 err |= ct_pr_tmpl_set_fatal(fd, CT_PR_EV_HWERR);
498 err |= ct_pr_tmpl_set_param(fd, CT_PR_PGRPONLY | CT_PR_REGENT);
499 if (err || ct_tmpl_activate(fd)) {
500 (void) close(fd);
501 return (-1);
502 }
503
504 return (fd);
505 }