rwhod.c revision 48229
1169689Skan/* 2169689Skan * Copyright (c) 1983, 1993 3169689Skan * The Regents of the University of California. All rights reserved. 4169689Skan * 5169689Skan * Redistribution and use in source and binary forms, with or without 6169689Skan * modification, are permitted provided that the following conditions 7169689Skan * are met: 8169689Skan * 1. Redistributions of source code must retain the above copyright 9169689Skan * notice, this list of conditions and the following disclaimer. 10169689Skan * 2. Redistributions in binary form must reproduce the above copyright 11169689Skan * notice, this list of conditions and the following disclaimer in the 12169689Skan * documentation and/or other materials provided with the distribution. 13169689Skan * 3. All advertising materials mentioning features or use of this software 14169689Skan * must display the following acknowledgement: 15169689Skan * This product includes software developed by the University of 16169689Skan * California, Berkeley and its contributors. 17169689Skan * 4. Neither the name of the University nor the names of its contributors 18169689Skan * may be used to endorse or promote products derived from this software 19169689Skan * without specific prior written permission. 20169689Skan * 21169689Skan * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22169689Skan * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23169689Skan * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24169689Skan * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25169689Skan * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26169689Skan * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27169689Skan * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28169689Skan * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29169689Skan * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30169689Skan * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31169689Skan * SUCH DAMAGE. 32169689Skan */ 33169689Skan 34169689Skan#ifndef lint 35169689Skanstatic const char copyright[] = 36169689Skan"@(#) Copyright (c) 1983, 1993\n\ 37169689Skan The Regents of the University of California. All rights reserved.\n"; 38169689Skan#endif /* not lint */ 39169689Skan 40169689Skan#ifndef lint 41169689Skan#if 0 42169689Skanstatic char sccsid[] = "@(#)rwhod.c 8.1 (Berkeley) 6/6/93"; 43169689Skan#endif 44169689Skanstatic const char rcsid[] = 45169689Skan "$Id: rwhod.c,v 1.10 1999/06/16 21:05:21 brian Exp $"; 46169689Skan#endif /* not lint */ 47169689Skan 48169689Skan#include <sys/param.h> 49169689Skan#include <sys/socket.h> 50169689Skan#include <sys/stat.h> 51169689Skan#include <sys/signal.h> 52169689Skan#include <sys/ioctl.h> 53169689Skan#include <sys/sysctl.h> 54169689Skan 55169689Skan#include <net/if.h> 56169689Skan#include <net/if_dl.h> 57169689Skan#include <net/route.h> 58169689Skan#include <netinet/in.h> 59169689Skan#include <protocols/rwhod.h> 60169689Skan 61169689Skan#include <ctype.h> 62169689Skan#include <err.h> 63169689Skan#include <errno.h> 64169689Skan#include <fcntl.h> 65169689Skan#include <netdb.h> 66169689Skan#include <paths.h> 67169689Skan#include <stdio.h> 68169689Skan#include <stdlib.h> 69169689Skan#include <string.h> 70169689Skan#include <syslog.h> 71169689Skan#include <unistd.h> 72169689Skan#include <utmp.h> 73169689Skan#include <pwd.h> 74169689Skan#include <grp.h> 75169689Skan 76169689Skan/* 77169689Skan * This version of Berkeley's rwhod has been modified to use IP multicast 78169689Skan * datagrams, under control of a new command-line option: 79169689Skan * 80169689Skan * rwhod -m causes rwhod to use IP multicast (instead of 81169689Skan * broadcast or unicast) on all interfaces that have 82169689Skan * the IFF_MULTICAST flag set in their "ifnet" structs 83169689Skan * (excluding the loopback interface). The multicast 84169689Skan * reports are sent with a time-to-live of 1, to prevent 85169689Skan * forwarding beyond the directly-connected subnet(s). 86169689Skan * 87169689Skan * rwhod -m <ttl> causes rwhod to send IP multicast datagrams with a 88169689Skan * time-to-live of <ttl>, via a SINGLE interface rather 89169689Skan * than all interfaces. <ttl> must be between 0 and 90169689Skan * MAX_MULTICAST_SCOPE, defined below. Note that "-m 1" 91169689Skan * is different than "-m", in that "-m 1" specifies 92169689Skan * transmission on one interface only. 93169689Skan * 94169689Skan * When "-m" is used without a <ttl> argument, the program accepts multicast 95169689Skan * rwhod reports from all multicast-capable interfaces. If a <ttl> argument 96169689Skan * is given, it accepts multicast reports from only one interface, the one 97169689Skan * on which reports are sent (which may be controlled via the host's routing 98169689Skan * table). Regardless of the "-m" option, the program accepts broadcast or 99169689Skan * unicast reports from all interfaces. Thus, this program will hear the 100169689Skan * reports of old, non-multicasting rwhods, but, if multicasting is used, 101169689Skan * those old rwhods won't hear the reports generated by this program. 102169689Skan * 103169689Skan * -- Steve Deering, Stanford University, February 1989 104169689Skan */ 105169689Skan 106169689Skan#define UNPRIV_USER "daemon" 107169689Skan#define UNPRIV_GROUP "daemon" 108169689Skan 109169689Skan#define NO_MULTICAST 0 /* multicast modes */ 110169689Skan#define PER_INTERFACE_MULTICAST 1 111169689Skan#define SCOPED_MULTICAST 2 112169689Skan 113169689Skan#define MAX_MULTICAST_SCOPE 32 /* "site-wide", by convention */ 114169689Skan 115169689Skan#define INADDR_WHOD_GROUP (u_long)0xe0000103 /* 224.0.1.3 */ 116169689Skan /* (belongs in protocols/rwhod.h) */ 117169689Skan 118169689Skanint insecure_mode; 119169689Skanint quiet_mode; 120169689Skanint iff_flag = IFF_POINTOPOINT; 121169689Skanint multicast_mode = NO_MULTICAST; 122169689Skanint multicast_scope; 123169689Skanstruct sockaddr_in multicast_addr = { sizeof multicast_addr, AF_INET }; 124169689Skan 125169689Skan/* 126169689Skan * Alarm interval. Don't forget to change the down time check in ruptime 127169689Skan * if this is changed. 128169689Skan */ 129169689Skan#define AL_INTERVAL (3 * 60) 130169689Skan 131169689Skanchar myname[MAXHOSTNAMELEN]; 132169689Skan 133169689Skan/* 134169689Skan * We communicate with each neighbor in a list constructed at the time we're 135169689Skan * started up. Neighbors are currently directly connected via a hardware 136169689Skan * interface. 137169689Skan */ 138169689Skanstruct neighbor { 139169689Skan struct neighbor *n_next; 140169689Skan char *n_name; /* interface name */ 141169689Skan struct sockaddr *n_addr; /* who to send to */ 142169689Skan int n_addrlen; /* size of address */ 143169689Skan int n_flags; /* should forward?, interface flags */ 144169689Skan}; 145169689Skan 146169689Skanstruct neighbor *neighbors; 147169689Skanstruct whod mywd; 148169689Skanstruct servent *sp; 149169689Skanint s, utmpf; 150169689Skan 151169689Skan#define WHDRSIZE (sizeof(mywd) - sizeof(mywd.wd_we)) 152169689Skan 153169689Skanvoid run_as __P((uid_t *, gid_t *)); 154169689Skanint configure __P((int)); 155169689Skanvoid getboottime __P((int)); 156169689Skanvoid onalrm __P((int)); 157169689Skanvoid quit __P((char *)); 158169689Skanvoid rt_xaddrs __P((caddr_t, caddr_t, struct rt_addrinfo *)); 159169689Skanint verify __P((char *, int)); 160169689Skanstatic void usage __P((void)); 161169689Skan#ifdef DEBUG 162169689Skanchar *interval __P((int, char *)); 163169689Skanvoid Sendto __P((int, const void *, size_t, int, 164169689Skan const struct sockaddr *, int)); 165169689Skan#define sendto Sendto 166169689Skan#endif 167169689Skan 168169689Skanint 169169689Skanmain(argc, argv) 170169689Skan int argc; 171169689Skan char *argv[]; 172169689Skan{ 173169689Skan struct sockaddr_in from; 174169689Skan struct stat st; 175169689Skan char path[64]; 176169689Skan int on = 1; 177169689Skan char *cp; 178169689Skan struct sockaddr_in sin; 179169689Skan uid_t unpriv_uid; 180169689Skan gid_t unpriv_gid; 181169689Skan 182169689Skan if (getuid()) 183169689Skan errx(1, "not super user"); 184169689Skan 185169689Skan run_as(&unpriv_uid, &unpriv_gid); 186169689Skan 187169689Skan argv++; argc--; 188169689Skan while (argc > 0 && *argv[0] == '-') { 189169689Skan if (strcmp(*argv, "-m") == 0) { 190169689Skan if (argc > 1 && isdigit(*(argv + 1)[0])) { 191169689Skan argv++, argc--; 192169689Skan multicast_mode = SCOPED_MULTICAST; 193169689Skan multicast_scope = atoi(*argv); 194169689Skan if (multicast_scope > MAX_MULTICAST_SCOPE) 195169689Skan errx(1, "ttl must not exceed %u", 196169689Skan MAX_MULTICAST_SCOPE); 197169689Skan } 198169689Skan else multicast_mode = PER_INTERFACE_MULTICAST; 199169689Skan } 200169689Skan else if (strcmp(*argv, "-i") == 0) 201169689Skan insecure_mode = 1; 202169689Skan else if (strcmp(*argv, "-l") == 0) 203169689Skan quiet_mode = 1; 204169689Skan else if (strcmp(*argv, "-p") == 0) 205169689Skan iff_flag = 0; 206169689Skan else 207169689Skan usage(); 208169689Skan argv++, argc--; 209169689Skan } 210169689Skan if (argc > 0) 211169689Skan usage(); 212169689Skan#ifndef DEBUG 213169689Skan daemon(1, 0); 214169689Skan#endif 215169689Skan (void) signal(SIGHUP, getboottime); 216169689Skan openlog("rwhod", LOG_PID, LOG_DAEMON); 217169689Skan sp = getservbyname("who", "udp"); 218169689Skan if (sp == NULL) { 219169689Skan syslog(LOG_ERR, "rwhod: udp/who: unknown service\n"); 220169689Skan exit(1); 221169689Skan } 222169689Skan if (chdir(_PATH_RWHODIR) < 0) { 223169689Skan syslog(LOG_ERR, "rwhod: %s: %m\n", _PATH_RWHODIR); 224169689Skan exit(1); 225169689Skan } 226169689Skan /* 227169689Skan * Establish host name as returned by system. 228169689Skan */ 229169689Skan if (gethostname(myname, sizeof(myname) - 1) < 0) { 230169689Skan syslog(LOG_ERR, "gethostname: %m"); 231169689Skan exit(1); 232169689Skan } 233169689Skan if ((cp = index(myname, '.')) != NULL) 234169689Skan *cp = '\0'; 235169689Skan strncpy(mywd.wd_hostname, myname, sizeof(mywd.wd_hostname) - 1); 236169689Skan mywd.wd_hostname[sizeof(mywd.wd_hostname) - 1] = '\0'; 237169689Skan utmpf = open(_PATH_UTMP, O_RDONLY|O_CREAT, 0644); 238169689Skan if (utmpf < 0) { 239169689Skan syslog(LOG_ERR, "%s: %m", _PATH_UTMP); 240169689Skan exit(1); 241169689Skan } 242169689Skan getboottime(0); 243169689Skan if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0) { 244169689Skan syslog(LOG_ERR, "socket: %m"); 245169689Skan exit(1); 246169689Skan } 247169689Skan if (setsockopt(s, SOL_SOCKET, SO_BROADCAST, &on, sizeof(on)) < 0) { 248169689Skan syslog(LOG_ERR, "setsockopt SO_BROADCAST: %m"); 249169689Skan exit(1); 250169689Skan } 251169689Skan memset(&sin, 0, sizeof(sin)); 252169689Skan sin.sin_len = sizeof(sin); 253169689Skan sin.sin_family = AF_INET; 254169689Skan sin.sin_port = sp->s_port; 255169689Skan if (bind(s, (struct sockaddr *)&sin, sizeof(sin)) < 0) { 256169689Skan syslog(LOG_ERR, "bind: %m"); 257169689Skan exit(1); 258169689Skan } 259169689Skan setgid(unpriv_gid); 260169689Skan setgroups(1, &unpriv_gid); /* XXX BOGUS groups[0] = egid */ 261169689Skan setuid(unpriv_uid); 262169689Skan if (!configure(s)) 263169689Skan exit(1); 264169689Skan if (!quiet_mode) { 265169689Skan signal(SIGALRM, onalrm); 266169689Skan onalrm(0); 267169689Skan } 268169689Skan for (;;) { 269169689Skan struct whod wd; 270169689Skan int cc, whod, len = sizeof(from); 271169689Skan 272169689Skan cc = recvfrom(s, (char *)&wd, sizeof(struct whod), 0, 273169689Skan (struct sockaddr *)&from, &len); 274169689Skan if (cc <= 0) { 275169689Skan if (cc < 0 && errno != EINTR) 276169689Skan syslog(LOG_WARNING, "recv: %m"); 277169689Skan continue; 278169689Skan } 279169689Skan if (from.sin_port != sp->s_port && !insecure_mode) { 280169689Skan syslog(LOG_WARNING, "%d: bad from port", 281169689Skan ntohs(from.sin_port)); 282169689Skan continue; 283169689Skan } 284169689Skan if (wd.wd_vers != WHODVERSION) 285169689Skan continue; 286169689Skan if (wd.wd_type != WHODTYPE_STATUS) 287169689Skan continue; 288169689Skan if (!verify(wd.wd_hostname, sizeof wd.wd_hostname)) { 289169689Skan syslog(LOG_WARNING, "malformed host name from %x", 290169689Skan from.sin_addr); 291169689Skan continue; 292169689Skan } 293169689Skan (void) snprintf(path, sizeof path, "whod.%s", wd.wd_hostname); 294169689Skan /* 295169689Skan * Rather than truncating and growing the file each time, 296169689Skan * use ftruncate if size is less than previous size. 297169689Skan */ 298169689Skan whod = open(path, O_WRONLY | O_CREAT, 0644); 299169689Skan if (whod < 0) { 300169689Skan syslog(LOG_WARNING, "%s: %m", path); 301169689Skan continue; 302169689Skan } 303169689Skan#if ENDIAN != BIG_ENDIAN 304169689Skan { 305169689Skan int i, n = (cc - WHDRSIZE)/sizeof(struct whoent); 306169689Skan struct whoent *we; 307169689Skan 308169689Skan /* undo header byte swapping before writing to file */ 309169689Skan wd.wd_sendtime = ntohl(wd.wd_sendtime); 310169689Skan for (i = 0; i < 3; i++) 311169689Skan wd.wd_loadav[i] = ntohl(wd.wd_loadav[i]); 312169689Skan wd.wd_boottime = ntohl(wd.wd_boottime); 313169689Skan we = wd.wd_we; 314169689Skan for (i = 0; i < n; i++) { 315169689Skan we->we_idle = ntohl(we->we_idle); 316169689Skan we->we_utmp.out_time = 317169689Skan ntohl(we->we_utmp.out_time); 318169689Skan we++; 319169689Skan } 320169689Skan } 321169689Skan#endif 322169689Skan (void) time((time_t *)&wd.wd_recvtime); 323169689Skan (void) write(whod, (char *)&wd, cc); 324169689Skan if (fstat(whod, &st) < 0 || st.st_size > cc) 325169689Skan ftruncate(whod, cc); 326169689Skan (void) close(whod); 327169689Skan } 328169689Skan} 329169689Skan 330169689Skanstatic void 331169689Skanusage() 332169689Skan{ 333169689Skan fprintf(stderr, "usage: rwhod [-i] [-p] [-l] [-m [ttl]]\n"); 334169689Skan exit(1); 335169689Skan} 336169689Skan 337169689Skanvoid 338169689Skanrun_as(uid, gid) 339169689Skan uid_t *uid; 340169689Skan gid_t *gid; 341169689Skan{ 342169689Skan struct passwd *pw; 343169689Skan struct group *gr; 344169689Skan 345169689Skan pw = getpwnam(UNPRIV_USER); 346169689Skan if (!pw) { 347169689Skan syslog(LOG_ERR, "getpwnam(%s): %m", UNPRIV_USER); 348169689Skan exit(1); 349169689Skan } 350169689Skan *uid = pw->pw_uid; 351169689Skan 352169689Skan gr = getgrnam(UNPRIV_GROUP); 353169689Skan if (!gr) { 354169689Skan syslog(LOG_ERR, "getgrnam(%s): %m", UNPRIV_GROUP); 355169689Skan exit(1); 356169689Skan } 357169689Skan *gid = gr->gr_gid; 358169689Skan} 359169689Skan 360169689Skan/* 361169689Skan * Check out host name for unprintables 362169689Skan * and other funnies before allowing a file 363169689Skan * to be created. Sorry, but blanks aren't allowed. 364169689Skan */ 365169689Skanint 366169689Skanverify(name, maxlen) 367169689Skan register char *name; 368169689Skan register int maxlen; 369169689Skan{ 370169689Skan register int size = 0; 371169689Skan 372169689Skan while (*name && size < maxlen - 1) { 373169689Skan if (!isascii(*name) || !(isalnum(*name) || ispunct(*name))) 374169689Skan return (0); 375169689Skan name++, size++; 376169689Skan } 377169689Skan *name = '\0'; 378169689Skan return (size > 0); 379169689Skan} 380169689Skan 381169689Skanint utmptime; 382169689Skanint utmpent; 383169689Skanint utmpsize = 0; 384169689Skanstruct utmp *utmp; 385169689Skanint alarmcount; 386169689Skan 387169689Skanvoid 388169689Skanonalrm(signo) 389169689Skan int signo; 390169689Skan{ 391169689Skan register struct neighbor *np; 392169689Skan register struct whoent *we = mywd.wd_we, *wlast; 393169689Skan register int i; 394169689Skan struct stat stb; 395169689Skan double avenrun[3]; 396169689Skan time_t now; 397169689Skan int cc; 398169689Skan 399169689Skan now = time(NULL); 400169689Skan if (alarmcount % 10 == 0) 401169689Skan getboottime(0); 402169689Skan alarmcount++; 403169689Skan (void) fstat(utmpf, &stb); 404169689Skan if ((stb.st_mtime != utmptime) || (stb.st_size > utmpsize)) { 405169689Skan utmptime = stb.st_mtime; 406169689Skan if (stb.st_size > utmpsize) { 407169689Skan utmpsize = stb.st_size + 10 * sizeof(struct utmp); 408169689Skan if (utmp) 409169689Skan utmp = (struct utmp *)realloc(utmp, utmpsize); 410169689Skan else 411169689Skan utmp = (struct utmp *)malloc(utmpsize); 412169689Skan if (! utmp) { 413169689Skan syslog(LOG_WARNING, "malloc failed"); 414169689Skan utmpsize = 0; 415169689Skan goto done; 416169689Skan } 417169689Skan } 418169689Skan (void) lseek(utmpf, (off_t)0, L_SET); 419169689Skan cc = read(utmpf, (char *)utmp, stb.st_size); 420169689Skan if (cc < 0) { 421169689Skan syslog(LOG_ERR, "read(%s): %m", _PATH_UTMP); 422169689Skan goto done; 423169689Skan } 424169689Skan wlast = &mywd.wd_we[1024 / sizeof(struct whoent) - 1]; 425169689Skan utmpent = cc / sizeof(struct utmp); 426169689Skan for (i = 0; i < utmpent; i++) 427169689Skan if (utmp[i].ut_name[0]) { 428169689Skan memcpy(we->we_utmp.out_line, utmp[i].ut_line, 429169689Skan sizeof(utmp[i].ut_line)); 430169689Skan memcpy(we->we_utmp.out_name, utmp[i].ut_name, 431169689Skan sizeof(utmp[i].ut_name)); 432169689Skan we->we_utmp.out_time = htonl(utmp[i].ut_time); 433169689Skan if (we >= wlast) 434169689Skan break; 435169689Skan we++; 436169689Skan } 437169689Skan utmpent = we - mywd.wd_we; 438169689Skan } 439169689Skan 440169689Skan /* 441169689Skan * The test on utmpent looks silly---after all, if no one is 442 * logged on, why worry about efficiency?---but is useful on 443 * (e.g.) compute servers. 444 */ 445 if (utmpent && chdir(_PATH_DEV)) { 446 syslog(LOG_ERR, "chdir(%s): %m", _PATH_DEV); 447 exit(1); 448 } 449 we = mywd.wd_we; 450 for (i = 0; i < utmpent; i++) { 451 if (stat(we->we_utmp.out_line, &stb) >= 0) 452 we->we_idle = htonl(now - stb.st_atime); 453 we++; 454 } 455 (void)getloadavg(avenrun, sizeof(avenrun)/sizeof(avenrun[0])); 456 for (i = 0; i < 3; i++) 457 mywd.wd_loadav[i] = htonl((u_long)(avenrun[i] * 100)); 458 cc = (char *)we - (char *)&mywd; 459 mywd.wd_sendtime = htonl(time(0)); 460 mywd.wd_vers = WHODVERSION; 461 mywd.wd_type = WHODTYPE_STATUS; 462 if (multicast_mode == SCOPED_MULTICAST) { 463 (void) sendto(s, (char *)&mywd, cc, 0, 464 (struct sockaddr *)&multicast_addr, 465 sizeof(multicast_addr)); 466 } 467 else for (np = neighbors; np != NULL; np = np->n_next) { 468 if (multicast_mode == PER_INTERFACE_MULTICAST && 469 np->n_flags & IFF_MULTICAST) { 470 /* 471 * Select the outgoing interface for the multicast. 472 */ 473 if (setsockopt(s, IPPROTO_IP, IP_MULTICAST_IF, 474 &(((struct sockaddr_in *)np->n_addr)->sin_addr), 475 sizeof(struct in_addr)) < 0) { 476 syslog(LOG_ERR, 477 "setsockopt IP_MULTICAST_IF: %m"); 478 exit(1); 479 } 480 (void) sendto(s, (char *)&mywd, cc, 0, 481 (struct sockaddr *)&multicast_addr, 482 sizeof(multicast_addr)); 483 } else (void) sendto(s, (char *)&mywd, cc, 0, 484 np->n_addr, np->n_addrlen); 485 } 486 if (utmpent && chdir(_PATH_RWHODIR)) { 487 syslog(LOG_ERR, "chdir(%s): %m", _PATH_RWHODIR); 488 exit(1); 489 } 490done: 491 (void) alarm(AL_INTERVAL); 492} 493 494void 495getboottime(signo) 496 int signo; 497{ 498 int mib[2]; 499 size_t size; 500 struct timeval tm; 501 502 mib[0] = CTL_KERN; 503 mib[1] = KERN_BOOTTIME; 504 size = sizeof(tm); 505 if (sysctl(mib, 2, &tm, &size, NULL, 0) == -1) { 506 syslog(LOG_ERR, "cannot get boottime: %m"); 507 exit(1); 508 } 509 mywd.wd_boottime = htonl(tm.tv_sec); 510} 511 512void 513quit(msg) 514 char *msg; 515{ 516 syslog(LOG_ERR, msg); 517 exit(1); 518} 519 520#define ROUNDUP(a) \ 521 ((a) > 0 ? (1 + (((a) - 1) | (sizeof(long) - 1))) : sizeof(long)) 522#define ADVANCE(x, n) (x += ROUNDUP((n)->sa_len)) 523 524void 525rt_xaddrs(cp, cplim, rtinfo) 526 register caddr_t cp, cplim; 527 register struct rt_addrinfo *rtinfo; 528{ 529 register struct sockaddr *sa; 530 register int i; 531 532 memset(rtinfo->rti_info, 0, sizeof(rtinfo->rti_info)); 533 for (i = 0; (i < RTAX_MAX) && (cp < cplim); i++) { 534 if ((rtinfo->rti_addrs & (1 << i)) == 0) 535 continue; 536 rtinfo->rti_info[i] = sa = (struct sockaddr *)cp; 537 ADVANCE(cp, sa); 538 } 539} 540 541/* 542 * Figure out device configuration and select 543 * networks which deserve status information. 544 */ 545int 546configure(s) 547 int s; 548{ 549 register struct neighbor *np; 550 register struct if_msghdr *ifm; 551 register struct ifa_msghdr *ifam; 552 struct sockaddr_dl *sdl; 553 size_t needed; 554 int mib[6], flags = 0, len; 555 char *buf, *lim, *next; 556 struct rt_addrinfo info; 557 558 if (multicast_mode != NO_MULTICAST) { 559 multicast_addr.sin_addr.s_addr = htonl(INADDR_WHOD_GROUP); 560 multicast_addr.sin_port = sp->s_port; 561 } 562 563 if (multicast_mode == SCOPED_MULTICAST) { 564 struct ip_mreq mreq; 565 unsigned char ttl; 566 567 mreq.imr_multiaddr.s_addr = htonl(INADDR_WHOD_GROUP); 568 mreq.imr_interface.s_addr = htonl(INADDR_ANY); 569 if (setsockopt(s, IPPROTO_IP, IP_ADD_MEMBERSHIP, 570 &mreq, sizeof(mreq)) < 0) { 571 syslog(LOG_ERR, 572 "setsockopt IP_ADD_MEMBERSHIP: %m"); 573 return(0); 574 } 575 ttl = multicast_scope; 576 if (setsockopt(s, IPPROTO_IP, IP_MULTICAST_TTL, 577 &ttl, sizeof(ttl)) < 0) { 578 syslog(LOG_ERR, 579 "setsockopt IP_MULTICAST_TTL: %m"); 580 return(0); 581 } 582 return(1); 583 } 584 585 mib[0] = CTL_NET; 586 mib[1] = PF_ROUTE; 587 mib[2] = 0; 588 mib[3] = AF_INET; 589 mib[4] = NET_RT_IFLIST; 590 mib[5] = 0; 591 if (sysctl(mib, 6, NULL, &needed, NULL, 0) < 0) 592 quit("route-sysctl-estimate"); 593 if ((buf = malloc(needed)) == NULL) 594 quit("malloc"); 595 if (sysctl(mib, 6, buf, &needed, NULL, 0) < 0) 596 quit("actual retrieval of interface table"); 597 lim = buf + needed; 598 599 sdl = NULL; /* XXX just to keep gcc -Wall happy */ 600 for (next = buf; next < lim; next += ifm->ifm_msglen) { 601 ifm = (struct if_msghdr *)next; 602 if (ifm->ifm_type == RTM_IFINFO) { 603 sdl = (struct sockaddr_dl *)(ifm + 1); 604 flags = ifm->ifm_flags; 605 continue; 606 } 607 if ((flags & IFF_UP) == 0 || 608 (flags & (((multicast_mode == PER_INTERFACE_MULTICAST) ? 609 IFF_MULTICAST : 0) | 610 IFF_BROADCAST|iff_flag)) == 0) 611 continue; 612 if (ifm->ifm_type != RTM_NEWADDR) 613 quit("out of sync parsing NET_RT_IFLIST"); 614 ifam = (struct ifa_msghdr *)ifm; 615 info.rti_addrs = ifam->ifam_addrs; 616 rt_xaddrs((char *)(ifam + 1), ifam->ifam_msglen + (char *)ifam, 617 &info); 618 /* gag, wish we could get rid of Internet dependencies */ 619#define dstaddr info.rti_info[RTAX_BRD] 620#define ifaddr info.rti_info[RTAX_IFA] 621#define IPADDR_SA(x) ((struct sockaddr_in *)(x))->sin_addr.s_addr 622#define PORT_SA(x) ((struct sockaddr_in *)(x))->sin_port 623 if (dstaddr == 0 || dstaddr->sa_family != AF_INET) 624 continue; 625 PORT_SA(dstaddr) = sp->s_port; 626 for (np = neighbors; np != NULL; np = np->n_next) 627 if (memcmp(sdl->sdl_data, np->n_name, 628 sdl->sdl_nlen) == 0 && 629 IPADDR_SA(np->n_addr) == IPADDR_SA(dstaddr)) 630 break; 631 if (np != NULL) 632 continue; 633 len = sizeof(*np) + dstaddr->sa_len + sdl->sdl_nlen + 1; 634 np = (struct neighbor *)malloc(len); 635 if (np == NULL) 636 quit("malloc of neighbor structure"); 637 memset(np, 0, len); 638 np->n_flags = flags; 639 np->n_addr = (struct sockaddr *)(np + 1); 640 np->n_addrlen = dstaddr->sa_len; 641 np->n_name = np->n_addrlen + (char *)np->n_addr; 642 memcpy((char *)np->n_addr, (char *)dstaddr, np->n_addrlen); 643 memcpy(np->n_name, sdl->sdl_data, sdl->sdl_nlen); 644 if (multicast_mode == PER_INTERFACE_MULTICAST && 645 (flags & IFF_MULTICAST) && 646 !(flags & IFF_LOOPBACK)) { 647 struct ip_mreq mreq; 648 649 memcpy((char *)np->n_addr, (char *)ifaddr, 650 np->n_addrlen); 651 mreq.imr_multiaddr.s_addr = htonl(INADDR_WHOD_GROUP); 652 mreq.imr_interface.s_addr = 653 ((struct sockaddr_in *)np->n_addr)->sin_addr.s_addr; 654 if (setsockopt(s, IPPROTO_IP, IP_ADD_MEMBERSHIP, 655 &mreq, sizeof(mreq)) < 0) { 656 syslog(LOG_ERR, 657 "setsockopt IP_ADD_MEMBERSHIP: %m"); 658#if 0 659 /* Fall back to broadcast on this if. */ 660 np->n_flags &= ~IFF_MULTICAST; 661#else 662 free((char *)np); 663 continue; 664#endif 665 } 666 } 667 np->n_next = neighbors; 668 neighbors = np; 669 } 670 free(buf); 671 return (1); 672} 673 674#ifdef DEBUG 675void 676Sendto(s, buf, cc, flags, to, tolen) 677 int s; 678 const void *buf; 679 size_t cc; 680 int flags; 681 const struct sockaddr *to; 682 int tolen; 683{ 684 register struct whod *w = (struct whod *)buf; 685 register struct whoent *we; 686 struct sockaddr_in *sin = (struct sockaddr_in *)to; 687 688 printf("sendto %x.%d\n", ntohl(sin->sin_addr.s_addr), 689 ntohs(sin->sin_port)); 690 printf("hostname %s %s\n", w->wd_hostname, 691 interval(ntohl(w->wd_sendtime) - ntohl(w->wd_boottime), " up")); 692 printf("load %4.2f, %4.2f, %4.2f\n", 693 ntohl(w->wd_loadav[0]) / 100.0, ntohl(w->wd_loadav[1]) / 100.0, 694 ntohl(w->wd_loadav[2]) / 100.0); 695 cc -= WHDRSIZE; 696 for (we = w->wd_we, cc /= sizeof(struct whoent); cc > 0; cc--, we++) { 697 time_t t = ntohl(we->we_utmp.out_time); 698 printf("%-8.8s %s:%s %.12s", 699 we->we_utmp.out_name, 700 w->wd_hostname, we->we_utmp.out_line, 701 ctime(&t)+4); 702 we->we_idle = ntohl(we->we_idle) / 60; 703 if (we->we_idle) { 704 if (we->we_idle >= 100*60) 705 we->we_idle = 100*60 - 1; 706 if (we->we_idle >= 60) 707 printf(" %2d", we->we_idle / 60); 708 else 709 printf(" "); 710 printf(":%02d", we->we_idle % 60); 711 } 712 printf("\n"); 713 } 714} 715 716char * 717interval(time, updown) 718 int time; 719 char *updown; 720{ 721 static char resbuf[32]; 722 int days, hours, minutes; 723 724 if (time < 0 || time > 3*30*24*60*60) { 725 (void) sprintf(resbuf, " %s ??:??", updown); 726 return (resbuf); 727 } 728 minutes = (time + 59) / 60; /* round to minutes */ 729 hours = minutes / 60; minutes %= 60; 730 days = hours / 24; hours %= 24; 731 if (days) 732 (void) sprintf(resbuf, "%s %2d+%02d:%02d", 733 updown, days, hours, minutes); 734 else 735 (void) sprintf(resbuf, "%s %2d:%02d", 736 updown, hours, minutes); 737 return (resbuf); 738} 739#endif 740