8322 nl: misleading-indentation
[unleashed.git] / usr / src / cmd / wall / wall.c
bloba78f8bcd7062331005a821a20fc27daa1e897550
1 /*
2 * CDDL HEADER START
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License, Version 1.0 only
6 * (the "License"). You may not use this file except in compliance
7 * with the License.
9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10 * or http://www.opensolaris.org/os/licensing.
11 * See the License for the specific language governing permissions
12 * and limitations under the License.
14 * When distributing Covered Code, include this CDDL HEADER in each
15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16 * If applicable, add the following below this CDDL HEADER, with the
17 * fields enclosed by brackets "[]" replaced with your own identifying
18 * information: Portions Copyright [yyyy] [name of copyright owner]
20 * CDDL HEADER END
22 /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */
23 /* All Rights Reserved */
28 * Copyright 1988-2003 Sun Microsystems, Inc. All rights reserved.
29 * Use is subject to license terms.
33 * Copyright 2012 Joyent, Inc. All rights reserved.
35 * Copyright (c) 2013 Gary Mills
38 #include <signal.h>
39 #include <stdio.h>
40 #include <stdlib.h>
41 #include <grp.h>
42 #include <sys/types.h>
43 #include <unistd.h>
44 #include <string.h>
45 #include <ctype.h>
46 #include <sys/stat.h>
47 #include <utmpx.h>
48 #include <sys/utsname.h>
49 #include <dirent.h>
50 #include <pwd.h>
51 #include <fcntl.h>
52 #include <time.h>
53 #include <errno.h>
54 #include <locale.h>
55 #include <syslog.h>
56 #include <sys/wait.h>
57 #include <limits.h>
58 #include <libzonecfg.h>
59 #include <zone.h>
60 #include <sys/contract/process.h>
61 #include <libcontract.h>
62 #include <sys/ctfs.h>
65 * Use the full lengths from utmpx for user and line.
67 #define NMAX (sizeof (((struct utmpx *)0)->ut_user))
68 #define LMAX (sizeof (((struct utmpx *)0)->ut_line))
70 static char mesg[3000];
71 static char *infile;
72 static int gflag;
73 static struct group *pgrp;
74 static char *grpname;
75 static char line[MAXNAMLEN+1] = "???";
76 static char systm[MAXNAMLEN+1];
77 static time_t tloc;
78 static struct utsname utsn;
79 static char who[NMAX+1] = "???";
80 static char time_buf[50];
81 #define DATE_FMT "%a %b %e %H:%M:%S"
83 static void sendmes(struct utmpx *, zoneid_t);
84 static void sendmes_tozone(zoneid_t, int);
85 static int chkgrp(char *);
86 static char *copy_str_till(char *, char *, char, int);
88 static int init_template(void);
89 int contract_abandon_id(ctid_t);
91 int
92 main(int argc, char *argv[])
94 FILE *f;
95 char *ptr, *start;
96 struct passwd *pwd;
97 char *term_name;
98 int c;
99 int aflag = 0;
100 int errflg = 0;
101 int zflg = 0;
102 int Zflg = 0;
104 char *zonename = NULL;
105 zoneid_t *zoneidlist = NULL;
106 uint_t nzids_saved, nzids = 0;
108 (void) setlocale(LC_ALL, "");
110 while ((c = getopt(argc, argv, "g:az:Z")) != EOF)
111 switch (c) {
112 case 'a':
113 aflag++;
114 break;
115 case 'g':
116 if (gflag) {
117 (void) fprintf(stderr,
118 "Only one group allowed\n");
119 return (1);
121 if ((pgrp = getgrnam(grpname = optarg)) == NULL) {
122 (void) fprintf(stderr, "Unknown group %s\n",
123 grpname);
124 return (1);
126 gflag++;
127 break;
128 case 'z':
129 zflg++;
130 zonename = optarg;
131 if (getzoneidbyname(zonename) == -1) {
132 (void) fprintf(stderr, "Specified zone %s "
133 "is invalid", zonename);
134 return (1);
136 break;
137 case 'Z':
138 Zflg++;
139 break;
140 case '?':
141 errflg++;
142 break;
145 if (errflg) {
146 (void) fprintf(stderr,
147 "Usage: wall [-a] [-g group] [-z zone] [-Z] [files...]\n");
148 return (1);
151 if (zflg && Zflg) {
152 (void) fprintf(stderr, "Cannot use -z with -Z\n");
153 return (1);
156 if (optind < argc)
157 infile = argv[optind];
159 if (uname(&utsn) == -1) {
160 (void) fprintf(stderr, "wall: uname() failed, %s\n",
161 strerror(errno));
162 return (2);
164 (void) strcpy(systm, utsn.nodename);
167 * Get the name of the terminal wall is running from.
170 if ((term_name = ttyname(fileno(stderr))) != NULL) {
172 * skip the leading "/dev/" in term_name
174 (void) strncpy(line, &term_name[5], sizeof (line) - 1);
177 if (who[0] == '?') {
178 if (pwd = getpwuid(getuid()))
179 (void) strncpy(&who[0], pwd->pw_name, sizeof (who));
182 f = stdin;
183 if (infile) {
184 f = fopen(infile, "r");
185 if (f == NULL) {
186 (void) fprintf(stderr, "Cannot open %s\n", infile);
187 return (1);
191 start = &mesg[0];
192 ptr = start;
193 while ((ptr - start) < 3000) {
194 size_t n;
196 if (fgets(ptr, &mesg[sizeof (mesg)] - ptr, f) == NULL)
197 break;
198 if ((n = strlen(ptr)) == 0)
199 break;
200 ptr += n;
202 (void) fclose(f);
205 * If the request is from the rwall daemon then use the caller's
206 * name and host. We determine this if all of the following is true:
207 * 1) First 5 characters are "From "
208 * 2) Next non-white characters are of the form "name@host:"
210 if (strcmp(line, "???") == 0) {
211 char rwho[MAXNAMLEN+1];
212 char rsystm[MAXNAMLEN+1];
213 char *cp;
215 if (strncmp(mesg, "From ", 5) == 0) {
216 cp = &mesg[5];
217 cp = copy_str_till(rwho, cp, '@', MAXNAMLEN + 1);
218 if (rwho[0] != '\0') {
219 cp = copy_str_till(rsystm, ++cp, ':',
220 MAXNAMLEN + 1);
221 if (rsystm[0] != '\0') {
222 (void) strcpy(systm, rsystm);
223 (void) strncpy(rwho, who,
224 sizeof (who));
225 (void) strcpy(line, "rpc.rwalld");
230 (void) time(&tloc);
231 (void) strftime(time_buf, sizeof (time_buf),
232 DATE_FMT, localtime(&tloc));
234 if (zflg != 0) {
235 if ((zoneidlist =
236 malloc(sizeof (zoneid_t))) == NULL ||
237 (*zoneidlist = getzoneidbyname(zonename)) == -1)
238 return (errno);
239 nzids = 1;
240 } else if (Zflg != 0) {
241 if (zone_list(NULL, &nzids) != 0)
242 return (errno);
243 again:
244 nzids *= 2;
245 if ((zoneidlist = malloc(nzids * sizeof (zoneid_t))) == NULL)
246 exit(errno);
247 nzids_saved = nzids;
248 if (zone_list(zoneidlist, &nzids) != 0) {
249 (void) free(zoneidlist);
250 return (errno);
252 if (nzids > nzids_saved) {
253 free(zoneidlist);
254 goto again;
257 if (zflg || Zflg) {
258 for (; nzids > 0; --nzids)
259 sendmes_tozone(zoneidlist[nzids-1], aflag);
260 free(zoneidlist);
261 } else
262 sendmes_tozone(getzoneid(), aflag);
264 return (0);
268 * Copy src to destination upto but not including the delim.
269 * Leave dst empty if delim not found or whitespace encountered.
270 * Return pointer to next character (delim, whitespace, or '\0')
272 static char *
273 copy_str_till(char *dst, char *src, char delim, int len)
275 int i = 0;
277 while (*src != '\0' && i < len) {
278 if (isspace(*src)) {
279 dst[0] = '\0';
280 return (src);
282 if (*src == delim) {
283 dst[i] = '\0';
284 return (src);
286 dst[i++] = *src++;
288 dst[0] = '\0';
289 return (src);
292 static void
293 sendmes_tozone(zoneid_t zid, int aflag) {
294 int i = 0;
295 char zonename[ZONENAME_MAX], root[MAXPATHLEN];
296 struct utmpx *p;
298 if (zid != getzoneid()) {
299 root[0] = '\0';
300 (void) getzonenamebyid(zid, zonename, ZONENAME_MAX);
301 (void) zone_get_rootpath(zonename, root, sizeof (root));
302 (void) strlcat(root, UTMPX_FILE, sizeof (root));
303 if (!utmpxname(root)) {
304 (void) fprintf(stderr, "Cannot open %s\n", root);
305 return;
307 } else {
308 (void) utmpxname(UTMPX_FILE);
310 setutxent();
311 while ((p = getutxent()) != NULL) {
312 if (p->ut_type != USER_PROCESS)
313 continue;
315 * if (-a option OR NOT pty window login), send the message
317 if (aflag || !nonuserx(*p))
318 sendmes(p, zid);
320 endutxent();
322 (void) alarm(60);
323 do {
324 i = (int)wait((int *)0);
325 } while (i != -1 || errno != ECHILD);
330 * Note to future maintainers: with the change of wall to use the
331 * getutxent() API, the forked children (created by this function)
332 * must call _exit as opposed to exit. This is necessary to avoid
333 * unwanted fflushing of getutxent's stdio stream (caused by atexit
334 * processing).
336 static void
337 sendmes(struct utmpx *p, zoneid_t zid)
339 int i;
340 char *s;
341 static char device[LMAX + 6];
342 char *bp;
343 int ibp;
344 FILE *f;
345 int fd, tmpl_fd;
346 boolean_t zoneenter = B_FALSE;
348 if (zid != getzoneid()) {
349 zoneenter = B_TRUE;
350 tmpl_fd = init_template();
351 if (tmpl_fd == -1) {
352 (void) fprintf(stderr, "Could not initialize "
353 "process contract");
354 return;
358 while ((i = (int)fork()) == -1) {
359 (void) alarm(60);
360 (void) wait((int *)0);
361 (void) alarm(0);
364 if (i)
365 return;
367 if (zoneenter && zone_enter(zid) == -1) {
368 char zonename[ZONENAME_MAX];
369 (void) getzonenamebyid(zid, zonename, ZONENAME_MAX);
370 (void) fprintf(stderr, "Could not enter zone "
371 "%s\n", zonename);
373 if (zoneenter)
374 (void) ct_tmpl_clear(tmpl_fd);
376 if (gflag)
377 if (!chkgrp(p->ut_user))
378 _exit(0);
380 (void) signal(SIGHUP, SIG_IGN);
381 (void) alarm(60);
382 s = &device[0];
383 (void) snprintf(s, sizeof (device), "/dev/%.*s", LMAX, p->ut_line);
385 /* check if the device is really a tty */
386 if ((fd = open(s, O_WRONLY|O_NOCTTY|O_NONBLOCK)) == -1) {
387 (void) fprintf(stderr, "Cannot send to %.*s on %s\n",
388 NMAX, p->ut_user, s);
389 perror("open");
390 (void) fflush(stderr);
391 _exit(1);
392 } else {
393 if (!isatty(fd)) {
394 (void) fprintf(stderr,
395 "Cannot send to device %.*s %s\n",
396 LMAX, p->ut_line,
397 "because it's not a tty");
398 openlog("wall", 0, LOG_AUTH);
399 syslog(LOG_CRIT, "%.*s in utmpx is not a tty\n",
400 LMAX, p->ut_line);
401 closelog();
402 (void) fflush(stderr);
403 _exit(1);
406 #ifdef DEBUG
407 (void) close(fd);
408 f = fopen("wall.debug", "a");
409 #else
410 f = fdopen(fd, "w");
411 #endif
412 if (f == NULL) {
413 (void) fprintf(stderr, "Cannot send to %-.*s on %s\n",
414 NMAX, &p->ut_user[0], s);
415 perror("open");
416 (void) fflush(stderr);
417 _exit(1);
419 (void) fprintf(f,
420 "\07\07\07Broadcast Message from %s (%s) on %s %19.19s",
421 who, line, systm, time_buf);
422 if (gflag)
423 (void) fprintf(f, " to group %s", grpname);
424 (void) fprintf(f, "...\n");
425 #ifdef DEBUG
426 (void) fprintf(f, "DEBUG: To %.*s on %s\n", NMAX, p->ut_user, s);
427 #endif
428 i = strlen(mesg);
429 for (bp = mesg; --i >= 0; bp++) {
430 ibp = (unsigned int)((unsigned char) *bp);
431 if (*bp == '\n')
432 (void) putc('\r', f);
433 if (isprint(ibp) || *bp == '\r' || *bp == '\013' ||
434 *bp == ' ' || *bp == '\t' || *bp == '\n' || *bp == '\007') {
435 (void) putc(*bp, f);
436 } else {
437 if (!isascii(*bp)) {
438 (void) fputs("M-", f);
439 *bp = toascii(*bp);
441 if (iscntrl(*bp)) {
442 (void) putc('^', f);
443 (void) putc(*bp + 0100, f);
445 else
446 (void) putc(*bp, f);
449 if (*bp == '\n')
450 (void) fflush(f);
452 if (ferror(f) || feof(f)) {
453 (void) printf("\n\007Write failed\n");
454 (void) fflush(stdout);
455 _exit(1);
458 (void) fclose(f);
459 (void) close(fd);
460 _exit(0);
464 static int
465 chkgrp(char *name)
467 int i;
468 char user[NMAX + 1];
470 (void) strlcpy(user, name, sizeof (user));
471 for (i = 0; pgrp->gr_mem[i] && pgrp->gr_mem[i][0]; i++) {
472 if (strcmp(user, pgrp->gr_mem[i]) == 0)
473 return (1);
476 return (0);
479 static int
480 init_template(void) {
481 int fd = 0;
482 int err = 0;
484 fd = open64(CTFS_ROOT "/process/template", O_RDWR);
485 if (fd == -1)
486 return (-1);
488 err |= ct_tmpl_set_critical(fd, 0);
489 err |= ct_tmpl_set_informative(fd, 0);
490 err |= ct_pr_tmpl_set_fatal(fd, CT_PR_EV_HWERR);
491 err |= ct_pr_tmpl_set_param(fd, CT_PR_PGRPONLY | CT_PR_REGENT);
492 if (err || ct_tmpl_activate(fd)) {
493 (void) close(fd);
494 return (-1);
497 return (fd);