1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*
23  * Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 /*	Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T	*/
28 /*	  All Rights Reserved  	*/
29 
30 /*
31  * Portions of this source code were derived from Berkeley 4.3 BSD
32  * under license from the Regents of the University of California.
33  */
34 
35 #pragma ident	"%Z%%M%	%I%	%E% SMI"
36 
37 #include <sys/types.h>
38 #include <sys/param.h>
39 #include <sys/socket.h>
40 #include <sys/sockio.h>
41 #include <sys/stat.h>
42 #include <sys/ioctl.h>
43 #include <sys/file.h>
44 #include <sys/loadavg.h>
45 
46 #include <net/if.h>
47 #include <netinet/in.h>
48 
49 #include <stdio.h>
50 #include <signal.h>
51 #include <errno.h>
52 #include <utmpx.h>
53 #include <ctype.h>
54 #include <netdb.h>
55 #include <syslog.h>
56 #include <fcntl.h>
57 #include <sys/isa_defs.h>	/* for ENDIAN defines */
58 #include <arpa/inet.h>
59 #include <protocols/rwhod.h>
60 
61 #include <strings.h>
62 #include <stdlib.h>
63 #include <unistd.h>
64 
65 /*
66  * This version of Berkeley's rwhod has been modified to use IP multicast
67  * datagrams, under control of a new command-line option:
68  *
69  *	rwhod -m	causes rwhod to use IP multicast (instead of
70  *			broadcast or unicast) on all interfaces that have
71  *			the IFF_MULTICAST flag set in their "ifnet" structs
72  *			(excluding the loopback interface).  The multicast
73  *			reports are sent with a time-to-live of 1, to prevent
74  *			forwarding beyond the directly-connected subnet(s).
75  *
76  *	rwhod -m <ttl>	causes rwhod to send IP multicast datagrams with a
77  *			time-to-live of <ttl>, via a SINGLE interface rather
78  *			than all interfaces.  <ttl> must be between 0 and
79  *			MAX_MULTICAST_SCOPE, defined below.  Note that "-m 1"
80  *			is different than "-m", in that "-m 1" specifies
81  *			transmission on one interface only.
82  *
83  * When "-m" is used without a <ttl> argument, the program accepts multicast
84  * rwhod reports from all multicast-capable interfaces.  If a <ttl> argument
85  * is given, it accepts multicast reports from only one interface, the one
86  * on which reports are sent (which may be controlled via the host's routing
87  * table).  Regardless of the "-m" option, the program accepts broadcast or
88  * unicast reports from all interfaces.  Thus, this program will hear the
89  * reports of old, non-multicasting rwhods, but, if multicasting is used,
90  * those old rwhods won't hear the reports generated by this program.
91  *
92  *                  -- Steve Deering, Stanford University, February 1989
93  */
94 
95 #define	NO_MULTICAST		0	  /* multicast modes */
96 #define	PER_INTERFACE_MULTICAST	1
97 #define	SCOPED_MULTICAST	2
98 
99 #define	MAX_MULTICAST_SCOPE	32	  /* "site-wide", by convention */
100 
101 #define	INADDR_WHOD_GROUP	(ulong_t)0xe0000103	/* 224.0.1.3 */
102 					/* (belongs in protocols/rwhod.h) */
103 
104 static int			multicast_mode  = NO_MULTICAST;
105 static int			multicast_scope;
106 static struct sockaddr_in	multicast_addr  = { AF_INET };
107 
108 
109 /*
110  * Alarm interval. Don't forget to change the down time check in ruptime
111  * if this is changed.
112  */
113 #define	AL_INTERVAL (3 * 60)
114 
115 static struct	sockaddr_in sin = { AF_INET };
116 
117 static char	myname[MAXHOSTNAMELEN];
118 
119 /*
120  * We communicate with each neighbor in
121  * a list constructed at the time we're
122  * started up.  Neighbors are currently
123  * directly connected via a hardware interface.
124  */
125 struct	neighbor {
126 	struct	neighbor *n_next;
127 	char	*n_name;		/* interface name */
128 	char	*n_addr;		/* who to send to */
129 	int	n_addrlen;		/* size of address */
130 	ulong_t	n_subnet;		/* AF_INET subnet */
131 	uint_t	n_flags;		/* should forward?, interface flags */
132 };
133 
134 static struct	neighbor *neighbors;
135 static struct	whod mywd;
136 static struct	servent *sp;
137 static int	s;
138 
139 #define	WHDRSIZE	(sizeof (mywd) - sizeof (mywd.wd_we))
140 #define	RWHODIR		"/var/spool/rwho"
141 
142 static void		onalrm(void);
143 static void		getkmem(void);
144 static boolean_t	configure(int);
145 static int		verify(const struct whod *);
146 
147 int
148 main(int argc, char *argv[])
149 {
150 	struct sockaddr_in from;
151 	struct stat st;
152 	char path[64];
153 	struct hostent *hp;
154 	int on = 1;
155 	char *cp;
156 	struct stat sb;
157 
158 	if (getuid()) {
159 		(void) fprintf(stderr, "in.rwhod: not super user\n");
160 		exit(1);
161 	}
162 	sp = getservbyname("who", "udp");
163 	if (sp == NULL) {
164 		(void) fprintf(stderr, "in.rwhod: udp/who: unknown service\n");
165 		exit(1);
166 	}
167 	argv++;
168 	argc--;
169 	while (argc > 0 && *argv[0] == '-') {
170 		if (strcmp(*argv, "-m") == 0) {
171 			if (argc > 1 && isdigit(*(argv + 1)[0])) {
172 				argv++;
173 				argc--;
174 				multicast_mode  = SCOPED_MULTICAST;
175 				multicast_scope = atoi(*argv);
176 				if (multicast_scope > MAX_MULTICAST_SCOPE) {
177 					(void) fprintf(stderr,
178 					    "in.rwhod: "
179 					    "ttl must not exceed %u\n",
180 					    MAX_MULTICAST_SCOPE);
181 					exit(1);
182 				}
183 			} else {
184 				multicast_mode = PER_INTERFACE_MULTICAST;
185 			}
186 		} else {
187 			goto usage;
188 		}
189 		argv++;
190 		argc--;
191 	}
192 	if (argc > 0)
193 		goto usage;
194 	if (chdir(RWHODIR) < 0) {
195 		perror(RWHODIR);
196 		exit(1);
197 	}
198 #ifndef DEBUG
199 	if (fork())
200 		exit(0);
201 	/* CSTYLED */
202 	{
203 		(void) close(0);
204 		(void) close(1);
205 		(void) close(2);
206 		(void) open("/", 0);
207 		(void) dup2(0, 1);
208 		(void) dup2(0, 2);
209 		(void) setsid();
210 	}
211 #endif
212 	(void) sigset(SIGHUP, (void (*)())getkmem);
213 	openlog("in.rwhod", LOG_PID, LOG_DAEMON);
214 	/*
215 	 * Establish host name as returned by system.
216 	 */
217 	if (gethostname(myname, sizeof (myname) - 1) < 0) {
218 		syslog(LOG_ERR, "main: gethostname: %m");
219 		exit(1);
220 	}
221 	if ((cp = index(myname, '.')) != NULL)
222 		*cp = '\0';
223 	(void) strlcpy(mywd.wd_hostname, myname, sizeof (mywd.wd_hostname));
224 
225 	if (stat(UTMPX_FILE, &sb) < 0) {
226 		syslog(LOG_ERR, "main: stat: %s: %m", UTMPX_FILE);
227 		exit(1);
228 	}
229 	getkmem();
230 	if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
231 		syslog(LOG_ERR, "main: socket: %m");
232 		exit(1);
233 	}
234 	if (setsockopt(s, SOL_SOCKET, SO_BROADCAST, &on, sizeof (on)) < 0) {
235 		syslog(LOG_ERR, "main: setsockopt SO_BROADCAST: %m");
236 		exit(1);
237 	}
238 	hp = gethostbyname(myname);
239 	if (hp == NULL) {
240 		syslog(LOG_ERR, "main: %s: don't know my own name\n", myname);
241 		exit(1);
242 	}
243 	sin.sin_family = hp->h_addrtype;
244 	sin.sin_port = sp->s_port;
245 	if (bind(s, (struct sockaddr *)&sin, sizeof (sin)) < 0) {
246 		syslog(LOG_ERR, "main: bind: %m");
247 		exit(1);
248 	}
249 	if (!configure(s))
250 		exit(1);
251 	(void) sigset(SIGALRM, (void (*)())onalrm);
252 	onalrm();
253 	for (;;) {
254 		struct whod wd;
255 		int cc, whod;
256 		socklen_t len = sizeof (from);
257 
258 		cc = recvfrom(s, &wd, sizeof (struct whod), 0,
259 		    (struct sockaddr *)&from, &len);
260 		if (cc <= 0) {
261 			if (cc < 0 && errno != EINTR)
262 				syslog(LOG_WARNING, "main: recvfrom: %m");
263 			continue;
264 		}
265 		if (from.sin_port != sp->s_port) {
266 			syslog(LOG_WARNING, "main: %d: bad from port",
267 			    ntohs(from.sin_port));
268 			continue;
269 		}
270 #ifdef notdef
271 		if (gethostbyname(wd.wd_hostname) == 0) {
272 			syslog(LOG_WARNING, "main: %s: unknown host",
273 			    wd.wd_hostname);
274 			continue;
275 		}
276 #endif
277 		if (wd.wd_vers != WHODVERSION)
278 			continue;
279 		if (wd.wd_type != WHODTYPE_STATUS)
280 			continue;
281 		if (!verify(&wd)) {
282 			syslog(LOG_WARNING, "main: malformed host name from %x",
283 			    from.sin_addr.s_addr);
284 			continue;
285 		}
286 		(void) sprintf(path, "whod.%s", wd.wd_hostname);
287 		/*
288 		 * Rather than truncating and growing the file each time,
289 		 * use ftruncate if size is less than previous size.
290 		 */
291 		whod = open(path, O_WRONLY | O_CREAT, 0644);
292 		if (whod < 0) {
293 			syslog(LOG_WARNING, "main: open: %s: %m", path);
294 			continue;
295 		}
296 #if defined(_LITTLE_ENDIAN)
297 		/* CSTYLED */
298 		{
299 			int i, n = (cc - WHDRSIZE)/sizeof (struct whoent);
300 			struct whoent *we;
301 
302 			/* undo header byte swapping before writing to file */
303 			wd.wd_sendtime = ntohl(wd.wd_sendtime);
304 			for (i = 0; i < 3; i++)
305 				wd.wd_loadav[i] = ntohl(wd.wd_loadav[i]);
306 			wd.wd_boottime = ntohl(wd.wd_boottime);
307 			we = wd.wd_we;
308 			for (i = 0; i < n; i++) {
309 				we->we_idle = ntohl(we->we_idle);
310 				we->we_utmp.out_time =
311 				    ntohl(we->we_utmp.out_time);
312 				we++;
313 			}
314 		}
315 #endif
316 		(void) time((time_t *)&wd.wd_recvtime);
317 		(void) write(whod, &wd, cc);
318 		if (fstat(whod, &st) < 0 || st.st_size > cc)
319 			(void) ftruncate(whod, cc);
320 		(void) close(whod);
321 	}
322 	/* NOTREACHED */
323 usage:
324 	(void) fprintf(stderr, "usage: in.rwhod [ -m [ ttl ] ]\n");
325 	return (1);
326 }
327 
328 /*
329  * Check out host name for unprintables
330  * and other funnies before allowing a file
331  * to be created.  Sorry, but blanks aren't allowed.
332  */
333 static int
334 verify(const struct whod *wd)
335 {
336 	int size = 0;
337 	const char *name = wd->wd_hostname;
338 
339 	/*
340 	 * We shouldn't assume the name is NUL terminated, so bound the
341 	 * checks at the size of the whod structures wd_hostname field.
342 	 */
343 	while ((size < sizeof (wd->wd_hostname)) &&
344 	    (*name != '\0')) {
345 		if (*name == '/' || !isascii(*name) ||
346 		    !(isalnum(*name) || ispunct(*name)))
347 			return (0);
348 		name++, size++;
349 	}
350 	/*
351 	 * Fail the verification if NULL name or it wasn't NUL terminated.
352 	 */
353 	return ((size > 0) && (size < sizeof (wd->wd_hostname)));
354 }
355 
356 static int	utmpxtime;
357 static int	utmpxent;
358 static int	alarmcount;
359 struct	utmpx *utmpx;
360 
361 static void
362 onalrm(void)
363 {
364 	int i;
365 	struct stat stb;
366 	int	utmpxsize = 0;
367 	int	entries;
368 	struct	utmpx *utp;
369 	struct	utmpx *utmpxbegin;
370 	struct whoent *we = mywd.wd_we, *wlast;
371 	int cc, cnt;
372 	double avenrun[3];
373 
374 	time_t now = time(0);
375 	struct neighbor *np;
376 
377 	if (alarmcount % 10 == 0)
378 		getkmem();
379 	alarmcount++;
380 	(void) stat(UTMPX_FILE, &stb);
381 	entries = stb.st_size / sizeof (struct futmpx);
382 	if ((stb.st_mtime != utmpxtime) || (entries > utmpxent)) {
383 		utmpxtime = stb.st_mtime;
384 		if (entries > utmpxent) {
385 			utmpxent = entries;
386 			utmpxsize = utmpxent * sizeof (struct utmpx);
387 			utmpx = realloc(utmpx, utmpxsize);
388 			if (utmpx == NULL) {
389 				syslog(LOG_ERR, "onalrm: realloc: %m");
390 				utmpxsize = 0;
391 				goto done;
392 			}
393 		}
394 		utmpxbegin = utmpx;
395 		setutxent();
396 		cnt = 0;
397 		while (cnt++ < utmpxent && (utp = getutxent()) != NULL)
398 			(void) memcpy(utmpxbegin++, utp, sizeof (struct utmpx));
399 		endutxent();
400 		wlast = &mywd.wd_we[1024 / sizeof (struct whoent) - 1];
401 		for (i = 0; i < utmpxent; i++) {
402 			if (utmpx[i].ut_name[0] &&
403 			    utmpx[i].ut_type == USER_PROCESS) {
404 				/*
405 				 * XXX - utmpx name and line lengths should
406 				 * be here
407 				 */
408 				bcopy(utmpx[i].ut_line, we->we_utmp.out_line,
409 				    sizeof (we->we_utmp.out_line));
410 				bcopy(utmpx[i].ut_name, we->we_utmp.out_name,
411 				    sizeof (we->we_utmp.out_name));
412 				we->we_utmp.out_time =
413 				    htonl(utmpx[i].ut_xtime);
414 				if (we >= wlast)
415 					break;
416 				we++;
417 			}
418 		}
419 		utmpxent = we - mywd.wd_we;
420 	}
421 
422 	/*
423 	 * The test on utmpxent looks silly---after all, if no one is
424 	 * logged on, why worry about efficiency?---but is useful on
425 	 * (e.g.) compute servers.
426 	 */
427 	if (utmpxent > 0 && chdir("/dev") == -1) {
428 		syslog(LOG_ERR, "onalrm: chdir /dev: %m");
429 		exit(1);
430 	}
431 	we = mywd.wd_we;
432 	for (i = 0; i < utmpxent; i++) {
433 		if (stat(we->we_utmp.out_line, &stb) >= 0)
434 			we->we_idle = htonl(now - stb.st_atime);
435 		we++;
436 	}
437 	if (getloadavg(avenrun, 3) == -1) {
438 		syslog(LOG_ERR, "onalrm: getloadavg: %m");
439 		exit(1);
440 	}
441 
442 	for (i = 0; i < 3; i++)
443 		mywd.wd_loadav[i] = htonl((ulong_t)(avenrun[i] * 100));
444 	cc = (char *)we - (char *)&mywd;
445 	mywd.wd_sendtime = htonl(time(0));
446 	mywd.wd_vers = WHODVERSION;
447 	mywd.wd_type = WHODTYPE_STATUS;
448 	if (multicast_mode == SCOPED_MULTICAST) {
449 		(void) sendto(s, &mywd, cc, 0,
450 		    (struct sockaddr *)&multicast_addr,
451 		    sizeof (multicast_addr));
452 	} else for (np = neighbors; np != NULL; np = np->n_next) {
453 		if (multicast_mode == PER_INTERFACE_MULTICAST &&
454 		    np->n_flags & IFF_MULTICAST) {
455 			/*
456 			 * Select the outgoing interface for the multicast.
457 			 */
458 			if (setsockopt(s, IPPROTO_IP, IP_MULTICAST_IF,
459 			    &(((struct sockaddr_in *)np->n_addr)->sin_addr),
460 			    sizeof (struct in_addr)) < 0) {
461 				syslog(LOG_ERR,
462 				    "onalrm: setsockopt IP_MULTICAST_IF: %m");
463 				exit(1);
464 			}
465 			(void) sendto(s, &mywd, cc, 0,
466 			    (struct sockaddr *)&multicast_addr,
467 			    sizeof (multicast_addr));
468 		} else {
469 			(void) sendto(s, &mywd, cc, 0,
470 			    (struct sockaddr *)np->n_addr, np->n_addrlen);
471 		}
472 	}
473 	if (utmpxent > 0 && chdir(RWHODIR) == -1) {
474 		syslog(LOG_ERR, "onalrm: chdir %s: %m", RWHODIR);
475 		exit(1);
476 	}
477 done:
478 	(void) alarm(AL_INTERVAL);
479 }
480 
481 static void
482 getkmem(void)
483 {
484 	struct utmpx *utmpx, utmpx_id;
485 
486 	utmpx_id.ut_type = BOOT_TIME;
487 	if ((utmpx = getutxid(&utmpx_id)) != NULL)
488 		mywd.wd_boottime = utmpx->ut_xtime;
489 	endutxent();
490 	mywd.wd_boottime = htonl(mywd.wd_boottime);
491 }
492 
493 /*
494  * Figure out device configuration and select
495  * networks which deserve status information.
496  */
497 static boolean_t
498 configure(int s)
499 {
500 	char *buf;
501 	struct ifconf ifc;
502 	struct ifreq ifreq, *ifr;
503 	struct sockaddr_in *sin;
504 	struct neighbor *np;
505 	struct neighbor *np2;
506 	int n;
507 	int numifs;
508 	unsigned bufsize;
509 
510 	if (multicast_mode == SCOPED_MULTICAST) {
511 		struct ip_mreq mreq;
512 		unsigned char ttl;
513 
514 		mreq.imr_multiaddr.s_addr = htonl(INADDR_WHOD_GROUP);
515 		mreq.imr_interface.s_addr = htonl(INADDR_ANY);
516 		if (setsockopt(s, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq,
517 		    sizeof (mreq)) < 0) {
518 			syslog(LOG_ERR,
519 			    "configure: setsockopt IP_ADD_MEMBERSHIP: %m");
520 			return (B_FALSE);
521 		}
522 		ttl = multicast_scope;
523 		if (setsockopt(s, IPPROTO_IP, IP_MULTICAST_TTL, &ttl,
524 		    sizeof (ttl)) < 0) {
525 			syslog(LOG_ERR,
526 			    "configure: setsockopt IP_MULTICAST_TTL: %m");
527 			return (B_FALSE);
528 		}
529 		multicast_addr.sin_addr.s_addr = htonl(INADDR_WHOD_GROUP);
530 		multicast_addr.sin_port = sp->s_port;
531 		return (B_TRUE);
532 	}
533 
534 	if (ioctl(s, SIOCGIFNUM, (char *)&numifs) < 0) {
535 		syslog(LOG_ERR, "configure: ioctl SIOCGIFNUM: %m");
536 		return (B_FALSE);
537 	}
538 	bufsize = numifs * sizeof (struct ifreq);
539 	buf = malloc(bufsize);
540 	if (buf == NULL) {
541 		syslog(LOG_ERR, "configure: malloc: %m");
542 		return (B_FALSE);
543 	}
544 	ifc.ifc_len = bufsize;
545 	ifc.ifc_buf = buf;
546 	if (ioctl(s, SIOCGIFCONF, (char *)&ifc) < 0) {
547 		syslog(LOG_ERR,
548 		    "configure: ioctl (get interface configuration): %m");
549 		(void) free(buf);
550 		return (B_FALSE);
551 	}
552 	ifr = ifc.ifc_req;
553 	for (n = ifc.ifc_len / sizeof (struct ifreq); n > 0; n--, ifr++) {
554 		/* Skip all logical interfaces */
555 		if (index(ifr->ifr_name, ':') != NULL)
556 			continue;
557 
558 		for (np = neighbors; np != NULL; np = np->n_next) {
559 			if (np->n_name &&
560 			    strcmp(ifr->ifr_name, np->n_name) == 0)
561 				break;
562 		}
563 		if (np != NULL)
564 			continue;
565 		ifreq = *ifr;
566 		np = (struct neighbor *)malloc(sizeof (*np));
567 		if (np == NULL)
568 			continue;
569 		np->n_name = malloc(strlen(ifr->ifr_name) + 1);
570 		if (np->n_name == NULL) {
571 			free(np);
572 			continue;
573 		}
574 		(void) strcpy(np->n_name, ifr->ifr_name);
575 		np->n_addrlen = sizeof (ifr->ifr_addr);
576 		np->n_addr = malloc(np->n_addrlen);
577 		if (np->n_addr == NULL) {
578 			free(np->n_name);
579 			free(np);
580 			continue;
581 		}
582 		bcopy(&ifr->ifr_addr, np->n_addr, np->n_addrlen);
583 		if (ioctl(s, SIOCGIFFLAGS, (char *)&ifreq) < 0) {
584 			syslog(LOG_ERR,
585 			    "configure: ioctl (get interface flags): %m");
586 			free(np->n_addr);
587 			free(np->n_name);
588 			free(np);
589 			continue;
590 		}
591 		np->n_flags = ifreq.ifr_flags;
592 		if (((struct sockaddr_in *)np->n_addr)->sin_family == AF_INET &&
593 		    ioctl(s, SIOCGIFNETMASK, (char *)&ifreq) >= 0) {
594 			sin = (struct sockaddr_in *)np->n_addr;
595 
596 			np->n_subnet = sin->sin_addr.s_addr &
597 			    ((struct sockaddr_in *)&ifreq.ifr_addr)->
598 			    sin_addr.s_addr;
599 		}
600 		if (multicast_mode == PER_INTERFACE_MULTICAST &&
601 		    (np->n_flags & IFF_UP) &&
602 		    (np->n_flags & IFF_MULTICAST) &&
603 		    !(np->n_flags & IFF_LOOPBACK)) {
604 			struct ip_mreq mreq;
605 
606 			/*
607 			 * Skip interfaces that have matching subnets i.e.
608 			 * (addr & netmask) are identical.
609 			 * Such interfaces are connected to the same
610 			 * physical wire.
611 			 */
612 			for (np2 = neighbors; np2 != NULL; np2 = np2->n_next) {
613 
614 				if (!(np->n_flags & IFF_POINTOPOINT) &&
615 				    !(np2->n_flags & IFF_POINTOPOINT) &&
616 				    (np->n_subnet == np2->n_subnet)) {
617 					free(np->n_addr);
618 					free(np->n_name);
619 					free(np);
620 					break;
621 				}
622 			}
623 			if (np2 != NULL)
624 				continue;
625 
626 			mreq.imr_multiaddr.s_addr = htonl(INADDR_WHOD_GROUP);
627 			mreq.imr_interface.s_addr =
628 			    ((struct sockaddr_in *)np->n_addr)->sin_addr.s_addr;
629 			if (setsockopt(s, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq,
630 			    sizeof (mreq)) < 0) {
631 				syslog(LOG_ERR,
632 				    "configure: "
633 				    "setsockopt IP_ADD_MEMBERSHIP: %m");
634 				free(np->n_addr);
635 				free(np->n_name);
636 				free(np);
637 				continue;
638 			}
639 			multicast_addr.sin_addr.s_addr =
640 			    htonl(INADDR_WHOD_GROUP);
641 			multicast_addr.sin_port = sp->s_port;
642 			np->n_next = neighbors;
643 			neighbors = np;
644 			continue;
645 		}
646 		if ((np->n_flags & IFF_UP) == 0 ||
647 		    (np->n_flags & (IFF_BROADCAST|IFF_POINTOPOINT)) == 0) {
648 			free(np->n_addr);
649 			free(np->n_name);
650 			free(np);
651 			continue;
652 		}
653 		if (np->n_flags & IFF_POINTOPOINT) {
654 			if (ioctl(s, SIOCGIFDSTADDR, (char *)&ifreq) < 0) {
655 				syslog(LOG_ERR,
656 				    "configure: ioctl (get dstaddr): %m");
657 				free(np->n_addr);
658 				free(np->n_name);
659 				free(np);
660 				continue;
661 			}
662 			/* we assume addresses are all the same size */
663 			bcopy(&ifreq.ifr_dstaddr, np->n_addr, np->n_addrlen);
664 		}
665 		if (np->n_flags & IFF_BROADCAST) {
666 			if (ioctl(s, SIOCGIFBRDADDR, (char *)&ifreq) < 0) {
667 				syslog(LOG_ERR,
668 				    "configure: ioctl (get broadaddr): %m");
669 				free(np->n_addr);
670 				free(np->n_name);
671 				free(np);
672 				continue;
673 			}
674 			/* we assume addresses are all the same size */
675 			bcopy(&ifreq.ifr_broadaddr, np->n_addr, np->n_addrlen);
676 		}
677 		/* gag, wish we could get rid of Internet dependencies */
678 		sin = (struct sockaddr_in *)np->n_addr;
679 		sin->sin_port = sp->s_port;
680 
681 		/*
682 		 * Avoid adding duplicate broadcast and pt-pt destinations
683 		 * to the list.
684 		 */
685 		for (np2 = neighbors; np2 != NULL; np2 = np2->n_next) {
686 			struct sockaddr_in *sin2;
687 
688 			sin2 = (struct sockaddr_in *)np2->n_addr;
689 			if (sin2->sin_addr.s_addr == sin->sin_addr.s_addr) {
690 				free(np->n_addr);
691 				free(np->n_name);
692 				free(np);
693 				break;
694 			}
695 		}
696 		if (np2 != NULL)
697 			continue;
698 
699 		np->n_next = neighbors;
700 		neighbors = np;
701 	}
702 	(void) free(buf);
703 	return (B_TRUE);
704 }
705 
706 #ifdef DEBUG
707 static char *interval(uint_t, char *);
708 
709 /* ARGSUSED */
710 static ssize_t
711 sendto(int s, const void *buf, size_t cc, int flags, const struct sockaddr *to,
712     socklen_t tolen)
713 {
714 	struct whod *w = (struct whod *)buf;
715 	struct whoent *we;
716 	struct sockaddr_in *sin = (struct sockaddr_in *)to;
717 	int nsz;
718 
719 	(void) printf("sendto %x.%d\n", ntohl(sin->sin_addr.s_addr),
720 	    ntohs(sin->sin_port));
721 	(void) printf("hostname %s %s\n", w->wd_hostname,
722 	    interval(ntohl(w->wd_sendtime) - ntohl(w->wd_boottime), "  up"));
723 	(void) printf("load %4.2f, %4.2f, %4.2f\n",
724 	    ntohl(w->wd_loadav[0]) / 100.0, ntohl(w->wd_loadav[1]) / 100.0,
725 	    ntohl(w->wd_loadav[2]) / 100.0);
726 	cc -= WHDRSIZE;
727 	for (we = w->wd_we, cc /= sizeof (struct whoent); cc > 0; cc--, we++) {
728 		time_t t = ntohl(we->we_utmp.out_time);
729 
730 		nsz = sizeof (we->we_utmp.out_name);
731 		(void) printf("%-*.*s %s:%s %.12s",
732 		    nsz,
733 		    nsz,
734 		    we->we_utmp.out_name,
735 		    w->wd_hostname,
736 		    we->we_utmp.out_line,
737 		    ctime(&t)+4);
738 		we->we_idle = ntohl(we->we_idle) / 60;
739 		if (we->we_idle) {
740 			if (we->we_idle >= 100*60)
741 				we->we_idle = 100*60 - 1;
742 			if (we->we_idle >= 60)
743 				(void) printf(" %2d", we->we_idle / 60);
744 			else
745 				(void) printf("   ");
746 			(void) printf(":%02d", we->we_idle % 60);
747 		}
748 		(void) printf("\n");
749 	}
750 	return (0);
751 }
752 
753 static char *
754 interval(uint_t time, char *updown)
755 {
756 	static char resbuf[32];
757 	int days, hours, minutes;
758 
759 	if (time > 3*30*24*60*60) {
760 		(void) sprintf(resbuf, "   %s ??:??", updown);
761 		return (resbuf);
762 	}
763 	minutes = (time + 59) / 60;		/* round to minutes */
764 	hours = minutes / 60;
765 	minutes %= 60;
766 	days = hours / 24;
767 	hours %= 24;
768 	if (days > 0) {
769 		(void) sprintf(resbuf, "%s %2d+%02d:%02d",
770 		    updown, days, hours, minutes);
771 	} else {
772 		(void) sprintf(resbuf, "%s    %2d:%02d",
773 		    updown, hours, minutes);
774 	}
775 	return (resbuf);
776 }
777 #endif
778