]> git.ipfire.org Git - thirdparty/glibc.git/blame - nscd/nscd_getpw_r.c
Use glibc_likely instead __builtin_expect.
[thirdparty/glibc.git] / nscd / nscd_getpw_r.c
CommitLineData
d4697bc9 1/* Copyright (C) 1998-2014 Free Software Foundation, Inc.
d67281a7
UD
2 This file is part of the GNU C Library.
3 Contributed by Thorsten Kukuk <kukuk@uni-paderborn.de>, 1998.
4
5 The GNU C Library is free software; you can redistribute it and/or
41bdb6e2
AJ
6 modify it under the terms of the GNU Lesser General Public
7 License as published by the Free Software Foundation; either
8 version 2.1 of the License, or (at your option) any later version.
d67281a7
UD
9
10 The GNU C Library is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
41bdb6e2 13 Lesser General Public License for more details.
d67281a7 14
41bdb6e2 15 You should have received a copy of the GNU Lesser General Public
59ba27a6
PE
16 License along with the GNU C Library; if not, see
17 <http://www.gnu.org/licenses/>. */
d67281a7 18
c207f23b 19#include <assert.h>
d67281a7
UD
20#include <errno.h>
21#include <pwd.h>
390955cb 22#include <stdint.h>
d67281a7
UD
23#include <stdio.h>
24#include <stdlib.h>
25#include <string.h>
26#include <unistd.h>
c207f23b 27#include <sys/mman.h>
d67281a7
UD
28#include <sys/socket.h>
29#include <sys/uio.h>
30#include <sys/un.h>
40c38b6c 31#include <not-cancel.h>
eb96ffb0 32#include <_itoa.h>
d67281a7 33
3f804c95 34#include "nscd-client.h"
348ed515 35#include "nscd_proto.h"
d67281a7 36
ac16e905
UD
37int __nss_not_use_nscd_passwd;
38
813f4f4d 39static int nscd_getpw_r (const char *key, size_t keylen, request_type type,
67479a70 40 struct passwd *resultbuf, char *buffer,
261eada2
UD
41 size_t buflen, struct passwd **result)
42 internal_function;
d67281a7
UD
43
44int
45__nscd_getpwnam_r (const char *name, struct passwd *resultbuf, char *buffer,
261eada2 46 size_t buflen, struct passwd **result)
d67281a7
UD
47{
48 if (name == NULL)
1670698f 49 return -1;
d67281a7 50
813f4f4d 51 return nscd_getpw_r (name, strlen (name) + 1, GETPWBYNAME, resultbuf,
261eada2 52 buffer, buflen, result);
d67281a7
UD
53}
54
55int
56__nscd_getpwuid_r (uid_t uid, struct passwd *resultbuf, char *buffer,
261eada2 57 size_t buflen, struct passwd **result)
d67281a7 58{
40c38b6c
UD
59 char buf[3 * sizeof (uid_t)];
60 buf[sizeof (buf) - 1] = '\0';
61 char *cp = _itoa_word (uid, buf + sizeof (buf) - 1, 10, 0);
d67281a7 62
40c38b6c
UD
63 return nscd_getpw_r (cp, buf + sizeof (buf) - cp, GETPWBYUID, resultbuf,
64 buffer, buflen, result);
d67281a7
UD
65}
66
d67281a7 67
5429ff76 68libc_locked_map_ptr (static, map_handle);
c207f23b
UD
69/* Note that we only free the structure if necessary. The memory
70 mapping is not removed since it is not visible to the malloc
71 handling. */
5429ff76 72libc_freeres_fn (pw_map_free)
c207f23b 73{
c207f23b 74 if (map_handle.mapped != NO_MAPPING)
5429ff76
UD
75 {
76 void *p = map_handle.mapped;
77 map_handle.mapped = NO_MAPPING;
78 free (p);
79 }
c207f23b
UD
80}
81
82
d67281a7 83static int
813f4f4d
UD
84internal_function
85nscd_getpw_r (const char *key, size_t keylen, request_type type,
261eada2
UD
86 struct passwd *resultbuf, char *buffer, size_t buflen,
87 struct passwd **result)
d67281a7 88{
0891f970 89 int gc_cycle;
1a77d37f
JJ
90 int nretries = 0;
91
0891f970
UD
92 /* If the mapping is available, try to search there instead of
93 communicating with the nscd. */
94 struct mapped_database *mapped;
95 mapped = __nscd_get_map_ref (GETFDPW, "passwd", &map_handle, &gc_cycle);
96
97 retry:;
c207f23b
UD
98 const char *pw_name = NULL;
99 int retval = -1;
c207f23b 100 const char *recend = (const char *) ~UINTMAX_C (0);
1a77d37f 101 pw_response_header pw_resp;
c207f23b 102
c207f23b 103 if (mapped != NO_MAPPING)
ac16e905 104 {
cfe1fc10
JJ
105 struct datahead *found = __nscd_cache_search (type, key, keylen, mapped,
106 sizeof pw_resp);
c207f23b
UD
107 if (found != NULL)
108 {
1a77d37f
JJ
109 pw_name = (const char *) (&found->data[0].pwdata + 1);
110 pw_resp = found->data[0].pwdata;
c207f23b 111 recend = (const char *) found->data + found->recsize;
1a77d37f
JJ
112 /* Now check if we can trust pw_resp fields. If GC is
113 in progress, it can contain anything. */
114 if (mapped->head->gc_cycle != gc_cycle)
115 {
116 retval = -2;
117 goto out;
118 }
c207f23b
UD
119 }
120 }
121
c207f23b 122 int sock = -1;
1a77d37f 123 if (pw_name == NULL)
c207f23b 124 {
1a77d37f
JJ
125 sock = __nscd_open_socket (key, keylen, type, &pw_resp,
126 sizeof (pw_resp));
c207f23b
UD
127 if (sock == -1)
128 {
129 __nss_not_use_nscd_passwd = 1;
130 goto out;
131 }
ac16e905 132 }
d67281a7 133
261eada2
UD
134 /* No value found so far. */
135 *result = NULL;
136
a1ffb40e 137 if (__glibc_unlikely (pw_resp.found == -1))
d67281a7 138 {
ac16e905 139 /* The daemon does not cache this database. */
ac16e905 140 __nss_not_use_nscd_passwd = 1;
c207f23b 141 goto out_close;
d67281a7
UD
142 }
143
1a77d37f 144 if (pw_resp.found == 1)
d67281a7 145 {
67479a70 146 /* Set the information we already have. */
1a77d37f
JJ
147 resultbuf->pw_uid = pw_resp.pw_uid;
148 resultbuf->pw_gid = pw_resp.pw_gid;
67479a70 149
c207f23b 150 char *p = buffer;
d67281a7 151 /* get pw_name */
67479a70 152 resultbuf->pw_name = p;
1a77d37f 153 p += pw_resp.pw_name_len;
d67281a7 154 /* get pw_passwd */
67479a70 155 resultbuf->pw_passwd = p;
1a77d37f 156 p += pw_resp.pw_passwd_len;
d67281a7 157 /* get pw_gecos */
67479a70 158 resultbuf->pw_gecos = p;
1a77d37f 159 p += pw_resp.pw_gecos_len;
d67281a7 160 /* get pw_dir */
67479a70 161 resultbuf->pw_dir = p;
1a77d37f 162 p += pw_resp.pw_dir_len;
d67281a7 163 /* get pw_pshell */
67479a70 164 resultbuf->pw_shell = p;
1a77d37f 165 p += pw_resp.pw_shell_len;
d67281a7 166
c207f23b 167 ssize_t total = p - buffer;
a1ffb40e 168 if (__glibc_unlikely (pw_name + total > recend))
c207f23b 169 goto out_close;
a1ffb40e 170 if (__glibc_unlikely (buflen < total))
c207f23b
UD
171 {
172 __set_errno (ERANGE);
173 retval = ERANGE;
174 goto out_close;
175 }
d67281a7 176
c207f23b
UD
177 retval = 0;
178 if (pw_name == NULL)
179 {
d2dc7d84 180 ssize_t nbytes = __readall (sock, buffer, total);
c207f23b 181
a1ffb40e 182 if (__glibc_unlikely (nbytes != total))
c207f23b
UD
183 {
184 /* The `errno' to some value != ERANGE. */
185 __set_errno (ENOENT);
186 retval = ENOENT;
187 }
188 else
189 *result = resultbuf;
190 }
191 else
261eada2 192 {
c207f23b
UD
193 /* Copy the various strings. */
194 memcpy (resultbuf->pw_name, pw_name, total);
195
5429ff76 196 /* Try to detect corrupt databases. */
1a77d37f
JJ
197 if (resultbuf->pw_name[pw_resp.pw_name_len - 1] != '\0'
198 || resultbuf->pw_passwd[pw_resp.pw_passwd_len - 1] != '\0'
199 || resultbuf->pw_gecos[pw_resp.pw_gecos_len - 1] != '\0'
200 || resultbuf->pw_dir[pw_resp.pw_dir_len - 1] != '\0'
201 || resultbuf->pw_shell[pw_resp.pw_shell_len - 1] != '\0')
5429ff76
UD
202 {
203 /* We cannot use the database. */
1a77d37f 204 retval = mapped->head->gc_cycle != gc_cycle ? -2 : -1;
5429ff76
UD
205 goto out_close;
206 }
207
261eada2
UD
208 *result = resultbuf;
209 }
d67281a7
UD
210 }
211 else
212 {
cfca0aa3
UD
213 /* Set errno to 0 to indicate no error, just no found record. */
214 __set_errno (0);
261eada2
UD
215 /* Even though we have not found anything, the result is zero. */
216 retval = 0;
d67281a7 217 }
12c80513 218
c207f23b
UD
219 out_close:
220 if (sock != -1)
221 close_not_cancel_no_status (sock);
12c80513 222 out:
1a77d37f 223 if (__nscd_drop_map_ref (mapped, &gc_cycle) != 0)
0891f970
UD
224 {
225 /* When we come here this means there has been a GC cycle while we
226 were looking for the data. This means the data might have been
227 inconsistent. Retry if possible. */
1a77d37f 228 if ((gc_cycle & 1) != 0 || ++nretries == 5 || retval == -1)
0891f970
UD
229 {
230 /* nscd is just running gc now. Disable using the mapping. */
1a77d37f
JJ
231 if (atomic_decrement_val (&mapped->counter) == 0)
232 __nscd_unmap (mapped);
0891f970
UD
233 mapped = NO_MAPPING;
234 }
235
1a77d37f
JJ
236 if (retval != -1)
237 goto retry;
0891f970 238 }
12c80513 239
261eada2 240 return retval;
d67281a7 241}