2 * Copyright (c) 1984 through 2008, William LeFebvre
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
11 * * Redistributions in binary form must reproduce the above
12 * copyright notice, this list of conditions and the following disclaimer
13 * in the documentation and/or other materials provided with the
16 * * Neither the name of William LeFebvre nor the names of other
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 * Top users/processes display for Unix
39 * Username translation code for top.
41 * These routines handle uid to username mapping. They use a hash table to
42 * reduce reading overhead. Entries are refreshed every EXPIRETIME seconds.
44 * The old ad-hoc hash functions have been replaced with something a little
45 * more formal and (hopefully) more robust (found in hash.c)
57 #define EXPIRETIME (60 * 5)
59 /* we need some sort of idea how long usernames can be */
61 #ifdef _POSIX_LOGIN_NAME_MAX
62 #define MAXLOGNAME _POSIX_LOGIN_NAME_MAX
70 char name
[MAXLOGNAME
]; /* big enough? */
81 userhash
= hash_create(211);
88 struct hash_data
*data
;
92 /* what time is it? */
95 /* get whatever is in the cache */
96 data
= hash_lookup_uint(userhash
, (unsigned int)xuid
);
98 /* if we had a cache miss, then create space for a new entry */
102 data
= emalloc(sizeof(struct hash_data
));
104 /* fill in some data, including an already expired time */
106 data
->expire
= (time_t)0;
108 /* add it to the hash: the rest gets filled in later */
109 hash_add_uint(userhash
, xuid
, data
);
112 /* Now data points to the correct hash entry for "xuid". If this is
113 a new entry, then expire is 0 and the next test will be true. */
114 if (data
->expire
<= now
)
116 if ((pw
= getpwuid(xuid
)) != NULL
)
118 strncpy(data
->name
, pw
->pw_name
, MAXLOGNAME
-1);
119 data
->expire
= now
+ EXPIRETIME
;
120 dprintf("username: updating %d with %s, expires %d\n",
121 data
->uid
, data
->name
, data
->expire
);
125 /* username doesnt exist ... so invent one */
126 snprintf(data
->name
, sizeof(data
->name
), "%d", xuid
);
127 data
->expire
= now
+ EXPIRETIME
;
128 dprintf("username: updating %d with %s, expires %d\n",
129 data
->uid
, data
->name
, data
->expire
);
133 /* return what we have */
138 userid(char *xusername
)
143 if ((pwd
= getpwnam(xusername
)) == NULL
)
148 /* return our result */