]> git.ipfire.org Git - thirdparty/util-linux.git/blame - term-utils/wall.c
taskset: Accept 0 pid for current process
[thirdparty/util-linux.git] / term-utils / wall.c
CommitLineData
6dbe3af9 1/*
726f69e2
KZ
2 * Copyright (c) 1988, 1990, 1993
3 * The Regents of the University of California. All rights reserved.
6dbe3af9
KZ
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
726f69e2 33 * Modified Sun Mar 12 10:34:34 1995, faith@cs.unc.edu, for Linux
6dbe3af9
KZ
34 */
35
6dbe3af9
KZ
36/*
37 * This program is not related to David Wall, whose Stanford Ph.D. thesis
38 * is entitled "Mechanisms for Broadcast and Selective Broadcast".
7eda085c 39 *
b50945d4 40 * 1999-02-22 Arkadiusz Miśkiewicz <misiek@pld.ORG.PL>
7eda085c
KZ
41 * - added Native Language Support
42 *
6dbe3af9
KZ
43 */
44
45#include <sys/param.h>
46#include <sys/stat.h>
47#include <sys/time.h>
48#include <sys/uio.h>
726f69e2 49
aa00c136 50#include <errno.h>
726f69e2 51#include <paths.h>
7eda085c 52#include <ctype.h>
6dbe3af9
KZ
53#include <pwd.h>
54#include <stdio.h>
55#include <stdlib.h>
726f69e2 56#include <string.h>
c07ebfa1 57#include <time.h>
726f69e2 58#include <unistd.h>
b4b919fe 59#include <utmpx.h>
76cc41b7 60#include <getopt.h>
01544c52
JP
61#include <sys/types.h>
62#include <grp.h>
66ee8158 63
87fcd95a
TK
64#if defined(USE_SYSTEMD) && HAVE_DECL_SD_SESSION_GET_USERNAME == 1
65# include <systemd/sd-login.h>
66# include <systemd/sd-daemon.h>
67#endif
68
7eda085c 69#include "nls.h"
4b5156cb 70#include "xalloc.h"
8abcf290 71#include "strutils.h"
66ee8158 72#include "ttymsg.h"
726f69e2 73#include "pathnames.h"
66ee8158 74#include "carefulputc.h"
eb76ca98 75#include "c.h"
76b680b1 76#include "cctype.h"
a000bbb6 77#include "fileutils.h"
cdd2a8c3 78#include "closestream.h"
3160589d 79#include "timeutils.h"
11109352 80#include "pwdutils.h"
0af497c6 81#include "strv.h"
726f69e2 82
42e296b5
SK
83#define TERM_WIDTH 79
84#define WRITE_TIME_OUT 300 /* in seconds */
6dbe3af9 85
98e2d4de 86/* Function prototypes */
cdd3cc7f
KZ
87static char *makemsg(char *fname, char **mvec, int mvecsz,
88 size_t *mbufsize, int print_banner);
6dbe3af9 89
86be6a32 90static void __attribute__((__noreturn__)) usage(void)
dfdf2081 91{
86be6a32 92 FILE *out = stdout;
bbeae1ce 93 fputs(USAGE_HEADER, out);
a290362b 94 fprintf(out,
bbeae1ce 95 _(" %s [options] [<file> | <message>]\n"), program_invocation_short_name);
451dbcfa
BS
96
97 fputs(USAGE_SEPARATOR, out);
98 fputs(_("Write a message to all users.\n"), out);
99
bbeae1ce 100 fputs(USAGE_OPTIONS, out);
01544c52 101 fputs(_(" -g, --group <group> only send message to group\n"), out);
bbeae1ce
SK
102 fputs(_(" -n, --nobanner do not print banner, works only for root\n"), out);
103 fputs(_(" -t, --timeout <timeout> write timeout in seconds\n"), out);
104 fputs(USAGE_SEPARATOR, out);
bad4c729
MY
105 fprintf(out, USAGE_HELP_OPTIONS(25));
106 fprintf(out, USAGE_MAN_TAIL("wall(1)"));
76cc41b7 107
86be6a32 108 exit(EXIT_SUCCESS);
dfdf2081
DB
109}
110
01544c52
JP
111struct group_workspace {
112 gid_t requested_group;
113 int ngroups;
098a75a1
KZ
114
115/* getgrouplist() on OSX takes int* not gid_t* */
116#ifdef __APPLE__
117 int *groups;
118#else
01544c52 119 gid_t *groups;
098a75a1 120#endif
01544c52
JP
121};
122
123eb9ef 123static gid_t get_group_gid(const char *group)
01544c52
JP
124{
125 struct group *gr;
e0383e3e 126 gid_t gid;
01544c52 127
123eb9ef 128 if ((gr = getgrnam(group)))
01544c52 129 return gr->gr_gid;
e0383e3e 130
123eb9ef 131 gid = strtou32_or_err(group, _("invalid group argument"));
e0383e3e 132 if (!getgrgid(gid))
123eb9ef 133 errx(EXIT_FAILURE, _("%s: unknown gid"), group);
e0383e3e
KZ
134
135 return gid;
01544c52
JP
136}
137
123eb9ef 138static struct group_workspace *init_group_workspace(const char *group)
01544c52 139{
3c92af3a
KZ
140 struct group_workspace *buf;
141 long n;
142
143 n = sysconf(_SC_NGROUPS_MAX);
144 if (n < 0 || n > INT_MAX - 1)
145 return NULL;
146
147 buf = xmalloc(sizeof(struct group_workspace));
148 buf->ngroups = n + 1; /* room for the primary gid */
01544c52 149
123eb9ef 150 buf->requested_group = get_group_gid(group);
07f0f0f5 151 buf->groups = xcalloc(buf->ngroups, sizeof(*buf->groups));
01544c52
JP
152
153 return buf;
154}
155
156static void free_group_workspace(struct group_workspace *buf)
157{
158 if (!buf)
159 return;
160
161 free(buf->groups);
162 free(buf);
163}
164
165static int is_gr_member(const char *login, const struct group_workspace *buf)
166{
167 struct passwd *pw;
168 int ngroups = buf->ngroups;
169 int rc;
170
171 pw = getpwnam(login);
b4cb2b48
KZ
172 if (!pw)
173 return 0;
174
01544c52
JP
175 if (buf->requested_group == pw->pw_gid)
176 return 1;
177
178 rc = getgrouplist(login, pw->pw_gid, buf->groups, &ngroups);
179 if (rc < 0) {
180 /* buffer too small, not sure how this can happen, since
181 we used sysconf to get the size... */
182 errx(EXIT_FAILURE,
183 _("getgrouplist found more groups than sysconf allows"));
184 }
185
186 for (; ngroups >= 0; --ngroups) {
098a75a1 187 if (buf->requested_group == (gid_t) buf->groups[ngroups])
01544c52
JP
188 return 1;
189 }
190
191 return 0;
192}
193
0af497c6
KZ
194static int has_tty(char **ttys, char *name)
195{
196 char **str;
197
f39ffccf 198 UL_STRV_FOREACH(str, ttys) {
0af497c6
KZ
199 if (strcmp(*str, name) == 0)
200 return 1;
201 }
202
203 return 0;
204}
205
d81c3055
KZ
206int main(int argc, char **argv)
207{
6dbe3af9
KZ
208 int ch;
209 struct iovec iov;
b4b919fe 210 struct utmpx *utmpptr;
7eda085c 211 char line[sizeof(utmpptr->ut_line) + 1];
98e2d4de 212 int print_banner = TRUE;
01544c52 213 struct group_workspace *group_buf = NULL;
cdd3cc7f 214 char *mbuf, *fname = NULL;
98e2d4de 215 size_t mbufsize;
b43d3a3a 216 unsigned timeout = WRITE_TIME_OUT;
0af497c6 217 char **mvec = NULL, **ttys = NULL, **str;
cdd3cc7f 218 int mvecsz = 0;
7eda085c 219
76cc41b7 220 static const struct option longopts[] = {
87918040
SK
221 { "nobanner", no_argument, NULL, 'n' },
222 { "timeout", required_argument, NULL, 't' },
223 { "group", required_argument, NULL, 'g' },
224 { "version", no_argument, NULL, 'V' },
225 { "help", no_argument, NULL, 'h' },
226 { NULL, 0, NULL, 0 }
76cc41b7
SK
227 };
228
3acc206d
SK
229 setlocale(LC_ALL, "");
230 bindtextdomain(PACKAGE, LOCALEDIR);
231 textdomain(PACKAGE);
2c308875 232 close_stdout_atexit();
3acc206d 233
01544c52 234 while ((ch = getopt_long(argc, argv, "nt:g:Vh", longopts, NULL)) != -1) {
6dbe3af9
KZ
235 switch (ch) {
236 case 'n':
6dbe3af9 237 if (geteuid() == 0)
98e2d4de 238 print_banner = FALSE;
76cc41b7
SK
239 else
240 warnx(_("--nobanner is available only for root"));
6dbe3af9 241 break;
cae7485e 242 case 't':
b43d3a3a 243 timeout = strtou32_or_err(optarg, _("invalid timeout argument"));
cae7485e
SK
244 if (timeout < 1)
245 errx(EXIT_FAILURE, _("invalid timeout argument: %s"), optarg);
246 break;
01544c52
JP
247 case 'g':
248 group_buf = init_group_workspace(optarg);
249 break;
2c308875 250
76cc41b7 251 case 'V':
2c308875 252 print_version(EXIT_SUCCESS);
76cc41b7 253 case 'h':
86be6a32 254 usage();
6dbe3af9 255 default:
677ec86c 256 errtryhelp(EXIT_FAILURE);
6dbe3af9 257 }
00f41c7d 258 }
6dbe3af9
KZ
259 argc -= optind;
260 argv += optind;
6dbe3af9 261
cdd3cc7f
KZ
262 if (argc == 1 && access(argv[0], F_OK) == 0)
263 fname = argv[0];
264 else if (argc >= 1) {
265 mvec = argv;
266 mvecsz = argc;
267 }
268
269 mbuf = makemsg(fname, mvec, mvecsz, &mbufsize, print_banner);
7eda085c 270
6dbe3af9
KZ
271 iov.iov_base = mbuf;
272 iov.iov_len = mbufsize;
71abc103 273
87fcd95a
TK
274#if defined(USE_SYSTEMD) && HAVE_DECL_SD_SESSION_GET_USERNAME == 1
275 if (sd_booted() > 0) {
276 char **sessions_list;
277 int sessions;
278
279 sessions = sd_get_sessions(&sessions_list);
0af497c6
KZ
280 if (sessions < 0) {
281 warnx(_("error getting sessions: %s"), strerror(-sessions));
282 goto utmp;
283 }
87fcd95a
TK
284
285 for (int i = 0; i < sessions; i++) {
286 char *name, *tty;
287 int r;
288
0af497c6
KZ
289 if ((r = sd_session_get_username(sessions_list[i], &name)) < 0) {
290 warnx(_("get user name failed: %s"), strerror (-r));
291 goto utmp;
87fcd95a 292 }
0af497c6
KZ
293 if (!(group_buf && !is_gr_member(name, group_buf))
294 && sd_session_get_tty(sessions_list[i], &tty) >= 0
f39ffccf 295 && ul_strv_consume(&ttys, tty) < 0)
0af497c6
KZ
296 err(EXIT_FAILURE, _("failed to allocate lines list"));
297
87fcd95a
TK
298 free(name);
299 free(sessions_list[i]);
300 }
301 free(sessions_list);
0af497c6
KZ
302 }
303utmp:
87fcd95a 304#endif
71abc103
KZ
305 {
306 while ((utmpptr = getutxent())) {
307 if (!utmpptr->ut_user[0])
308 continue;
7eda085c 309#ifdef USER_PROCESS
71abc103
KZ
310 if (utmpptr->ut_type != USER_PROCESS)
311 continue;
6dbe3af9 312#endif
71abc103
KZ
313 /* Joey Hess reports that use-sessreg in /etc/X11/wdm/ produces
314 * ut_line entries like :0, and a write to /dev/:0 fails.
315 *
316 * It also seems that some login manager may produce empty ut_line.
317 */
318 if (!*utmpptr->ut_line || *utmpptr->ut_line == ':')
319 continue;
320
321 if (group_buf && !is_gr_member(utmpptr->ut_user, group_buf))
322 continue;
323
324 mem2strcpy(line, utmpptr->ut_line, sizeof(utmpptr->ut_line), sizeof(line));
0af497c6
KZ
325 if (has_tty(ttys, line))
326 continue;
f39ffccf 327 if (ul_strv_extend(&ttys, line) < 0)
0af497c6 328 err(EXIT_FAILURE, _("failed to allocate lines list"));
71abc103
KZ
329 }
330 endutxent();
87fcd95a 331 }
71abc103 332
f39ffccf 333 UL_STRV_FOREACH(str, ttys) {
0af497c6
KZ
334 char *er = ttymsg(&iov, 1, *str, timeout);
335 if (er)
336 warnx("%s", er);
337 }
338
f39ffccf 339 ul_strv_free(ttys);
98e2d4de 340 free(mbuf);
01544c52 341 free_group_workspace(group_buf);
d0acbd38 342 exit(EXIT_SUCCESS);
6dbe3af9
KZ
343}
344
d81c3055
KZ
345static char *makemsg(char *fname, char **mvec, int mvecsz,
346 size_t *mbufsize, int print_banner)
6dbe3af9 347{
aa13246a 348 char *lbuf, *retbuf;
27ee6446 349 FILE * fs = open_memstream(&retbuf, mbufsize);
aa13246a 350 size_t lbuflen = 512;
351 lbuf = xmalloc(lbuflen);
d0acbd38 352
98e2d4de 353 if (print_banner == TRUE) {
2281e1ed 354 char *hostname = xgethostname();
828f6506 355 char *whombuf, *whom, *where, date[CTIME_BUFSIZ];
d81c3055
KZ
356 time_t now;
357
828f6506 358 whombuf = whom = xgetlogin();
98e2d4de 359 if (!whom) {
11109352 360 whom = "<someone>";
98e2d4de
SK
361 warn(_("cannot get passwd uid"));
362 }
363 where = ttyname(STDOUT_FILENO);
364 if (!where) {
2b6fc908 365 where = "somewhere";
d81c3055
KZ
366 } else if (strncmp(where, "/dev/", 5) == 0)
367 where += 5;
368
00f41c7d 369 time(&now);
3160589d 370 ctime_r(&now, date);
d81c3055 371 date[strlen(date) - 1] = '\0';
6dbe3af9
KZ
372
373 /*
374 * all this stuff is to blank out a square for the message;
375 * we wrap message lines at column 79, not 80, because some
376 * terminals wrap after 79, some do not, and we can't tell.
377 * Which means that we may leave a non-blank character
378 * in column 80, but that can't be helped.
379 */
2b6fc908
KZ
380 /* snprintf is not always available, but the sprintf's here
381 will not overflow as long as %d takes at most 100 chars */
27ee6446 382 fprintf(fs, "\r%*s\r\n", TERM_WIDTH, " ");
890e1035 383
aa13246a 384 snprintf(lbuf, lbuflen,
890e1035
KZ
385 _("Broadcast message from %s@%s (%s) (%s):"),
386 whom, hostname, where, date);
27ee6446 387 fprintf(fs, "%-*.*s\007\007\r\n", TERM_WIDTH, TERM_WIDTH, lbuf);
d81c3055 388 free(hostname);
828f6506 389 free(whombuf);
6dbe3af9 390 }
27ee6446 391 fprintf(fs, "%*s\r\n", TERM_WIDTH, " ");
6dbe3af9 392
cdd3cc7f
KZ
393 if (mvec) {
394 /*
395 * Read message from argv[]
396 */
397 int i;
398
399 for (i = 0; i < mvecsz; i++) {
f4f0782f 400 fputs_careful(mvec[i], fs, '^', true, TERM_WIDTH);
cdd3cc7f 401 if (i < mvecsz - 1)
27ee6446 402 fputc(' ', fs);
cdd3cc7f 403 }
27ee6446 404 fputs("\r\n", fs);
cdd3cc7f 405 } else {
66ee8158 406 /*
cdd3cc7f 407 * read message from <file>
66ee8158 408 */
cdd3cc7f
KZ
409 if (fname) {
410 /*
411 * When we are not root, but suid or sgid, refuse to read files
412 * (e.g. device files) that the user may not have access to.
413 * After all, our invoker can easily do "wall < file"
414 * instead of "wall file".
415 */
78914c80 416 if (getuid() && is_privileged_execution())
cdd3cc7f
KZ
417 errx(EXIT_FAILURE, _("will not read %s - use stdin."),
418 fname);
d0acbd38 419
cdd3cc7f
KZ
420 if (!freopen(fname, "r", stdin))
421 err(EXIT_FAILURE, _("cannot open %s"), fname);
422
423 }
66ee8158 424
cdd3cc7f
KZ
425 /*
426 * Read message from stdin.
427 */
aa13246a 428 while (getline(&lbuf, &lbuflen, stdin) >= 0)
429 fputs_careful(lbuf, fs, '^', true, TERM_WIDTH);
66ee8158 430 }
27ee6446 431 fprintf(fs, "%*s\r\n", TERM_WIDTH, " ");
98e2d4de
SK
432
433 free(lbuf);
d0acbd38 434
27ee6446 435 fclose(fs);
436 return retbuf;
6dbe3af9 437}