2 * Copyright (c) 1984 through 2008, William LeFebvre
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
11 * * Redistributions in binary form must reproduce the above
12 * copyright notice, this list of conditions and the following disclaimer
13 * in the documentation and/or other materials provided with the
16 * * Neither the name of William LeFebvre nor the names of other
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 * Top users/processes display for Unix
39 * Username translation code for top.
41 * These routines handle uid to username mapping. They use a hash table to
42 * reduce reading overhead. Entries are refreshed every EXPIRETIME seconds.
44 * The old ad-hoc hash functions have been replaced with something a little
45 * more formal and (hopefully) more robust (found in hash.c)
56 #define EXPIRETIME (60 * 5)
58 /* we need some sort of idea how long usernames can be */
60 #ifdef _POSIX_LOGIN_NAME_MAX
61 #define MAXLOGNAME _POSIX_LOGIN_NAME_MAX
69 char name
[MAXLOGNAME
]; /* big enough? */
80 userhash
= hash_create(211);
87 struct hash_data
*data
;
91 /* what time is it? */
94 /* get whatever is in the cache */
95 data
= hash_lookup_uint(userhash
, (unsigned int)uid
);
97 /* if we had a cache miss, then create space for a new entry */
101 data
= (struct hash_data
*)malloc(sizeof(struct hash_data
));
103 /* fill in some data, including an already expired time */
105 data
->expire
= (time_t)0;
107 /* add it to the hash: the rest gets filled in later */
108 hash_add_uint(userhash
, uid
, data
);
111 /* Now data points to the correct hash entry for "uid". If this is
112 a new entry, then expire is 0 and the next test will be true. */
113 if (data
->expire
<= now
)
115 if ((pw
= getpwuid(uid
)) != NULL
)
117 strncpy(data
->name
, pw
->pw_name
, MAXLOGNAME
-1);
118 data
->expire
= now
+ EXPIRETIME
;
119 dprintf("username: updating %d with %s, expires %d\n",
120 data
->uid
, data
->name
, data
->expire
);
124 /* username doesnt exist ... so invent one */
125 snprintf(data
->name
, sizeof(data
->name
), "%d", uid
);
126 data
->expire
= now
+ EXPIRETIME
;
127 dprintf("username: updating %d with %s, expires %d\n",
128 data
->uid
, data
->name
, data
->expire
);
132 /* return what we have */
137 userid(char *username
)
142 if ((pwd
= getpwnam(username
)) == NULL
)
147 /* return our result */