]> git.ipfire.org Git - thirdparty/glibc.git/blame - nscd/pwdcache.c
nss_compat: query NIS domain only when needed
[thirdparty/glibc.git] / nscd / pwdcache.c
CommitLineData
67479a70 1/* Cache handling for passwd lookup.
a4c7ea7b 2 Copyright (C) 1998-2008, 2009, 2011 Free Software Foundation, Inc.
d67281a7 3 This file is part of the GNU C Library.
67479a70 4 Contributed by Ulrich Drepper <drepper@cygnus.com>, 1998.
d67281a7 5
43bc8ac6 6 This program is free software; you can redistribute it and/or modify
2e2efe65
RM
7 it under the terms of the GNU General Public License as published
8 by the Free Software Foundation; version 2 of the License, or
9 (at your option) any later version.
d67281a7 10
43bc8ac6 11 This program is distributed in the hope that it will be useful,
d67281a7 12 but WITHOUT ANY WARRANTY; without even the implied warranty of
43bc8ac6
UD
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
d67281a7 15
43bc8ac6
UD
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software Foundation,
18 Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
d67281a7 19
9caf4f1c 20#include <alloca.h>
a95a08b4 21#include <assert.h>
d67281a7 22#include <errno.h>
67479a70 23#include <error.h>
a95a08b4 24#include <libintl.h>
d67281a7 25#include <pwd.h>
c7a9b6e2 26#include <stdbool.h>
67479a70
UD
27#include <stddef.h>
28#include <stdio.h>
29#include <stdlib.h>
d67281a7 30#include <string.h>
67479a70 31#include <time.h>
ba9234d9 32#include <unistd.h>
a95a08b4 33#include <sys/mman.h>
0b20008e 34#include <sys/socket.h>
c7a9b6e2 35#include <stackinfo.h>
d67281a7 36
d67281a7 37#include "nscd.h"
67479a70 38#include "dbg_log.h"
eac10791
UD
39#ifdef HAVE_SENDFILE
40# include <kernel-features.h>
41#endif
d67281a7 42
67479a70
UD
43/* This is the standard reply in case the service is disabled. */
44static const pw_response_header disabled =
45{
c2e13112
RM
46 .version = NSCD_VERSION,
47 .found = -1,
48 .pw_name_len = 0,
49 .pw_passwd_len = 0,
50 .pw_uid = -1,
51 .pw_gid = -1,
52 .pw_gecos_len = 0,
53 .pw_dir_len = 0,
54 .pw_shell_len = 0
d67281a7 55};
d67281a7 56
67479a70
UD
57/* This is the struct describing how to write this record. */
58const struct iovec pwd_iov_disabled =
d67281a7 59{
c2e13112
RM
60 .iov_base = (void *) &disabled,
61 .iov_len = sizeof (disabled)
d67281a7 62};
d67281a7 63
d67281a7 64
67479a70
UD
65/* This is the standard reply in case we haven't found the dataset. */
66static const pw_response_header notfound =
d67281a7 67{
c2e13112
RM
68 .version = NSCD_VERSION,
69 .found = 0,
70 .pw_name_len = 0,
71 .pw_passwd_len = 0,
72 .pw_uid = -1,
73 .pw_gid = -1,
74 .pw_gecos_len = 0,
75 .pw_dir_len = 0,
76 .pw_shell_len = 0
67479a70 77};
d67281a7 78
d67281a7 79
a4c7ea7b 80static time_t
a95a08b4
UD
81cache_addpw (struct database_dyn *db, int fd, request_header *req,
82 const void *key, struct passwd *pwd, uid_t owner,
20e498bd 83 struct hashentry *const he, struct datahead *dh, int errval)
d67281a7 84{
67479a70
UD
85 ssize_t total;
86 ssize_t written;
87 time_t t = time (NULL);
d67281a7 88
a95a08b4
UD
89 /* We allocate all data in one memory block: the iov vector,
90 the response header and the dataset itself. */
91 struct dataset
92 {
93 struct datahead head;
94 pw_response_header resp;
95 char strdata[0];
96 } *dataset;
97
98 assert (offsetof (struct dataset, resp) == offsetof (struct datahead, data));
99
a4c7ea7b 100 time_t timeout = MAX_TIMEOUT_VALUE;
67479a70 101 if (pwd == NULL)
d67281a7 102 {
a95a08b4
UD
103 if (he != NULL && errval == EAGAIN)
104 {
105 /* If we have an old record available but cannot find one
106 now because the service is not available we keep the old
107 record and make sure it does not get removed. */
108 if (reload_count != UINT_MAX && dh->nreloads == reload_count)
109 /* Do not reset the value if we never not reload the record. */
110 dh->nreloads = reload_count - 1;
111
a4c7ea7b
UD
112 /* Reload with the same time-to-live value. */
113 timeout = dh->timeout = t + db->postimeout;
114
a95a08b4
UD
115 written = total = 0;
116 }
117 else
118 {
119 /* We have no data. This means we send the standard reply for this
120 case. */
121 written = total = sizeof (notfound);
d67281a7 122
a95a08b4 123 if (fd != -1)
2c210d1e
UD
124 written = TEMP_FAILURE_RETRY (send (fd, &notfound, total,
125 MSG_NOSIGNAL));
d67281a7 126
c52137d3 127 dataset = mempool_alloc (db, sizeof (struct dataset) + req->key_len,
20e498bd 128 1);
a95a08b4
UD
129 /* If we cannot permanently store the result, so be it. */
130 if (dataset != NULL)
131 {
132 dataset->head.allocsize = sizeof (struct dataset) + req->key_len;
133 dataset->head.recsize = total;
134 dataset->head.notfound = true;
135 dataset->head.nreloads = 0;
136 dataset->head.usable = true;
d67281a7 137
a95a08b4 138 /* Compute the timeout time. */
a4c7ea7b 139 timeout = dataset->head.timeout = t + db->negtimeout;
d67281a7 140
a95a08b4
UD
141 /* This is the reply. */
142 memcpy (&dataset->resp, &notfound, total);
d67281a7 143
a95a08b4
UD
144 /* Copy the key data. */
145 char *key_copy = memcpy (dataset->strdata, key, req->key_len);
d67281a7 146
cf244b74
UD
147 /* If necessary, we also propagate the data to disk. */
148 if (db->persistent)
149 {
150 // XXX async OK?
151 uintptr_t pval = (uintptr_t) dataset & ~pagesize_m1;
152 msync ((void *) pval,
153 ((uintptr_t) dataset & pagesize_m1)
154 + sizeof (struct dataset) + req->key_len, MS_ASYNC);
155 }
156
7e71e55f 157 (void) cache_add (req->type, key_copy, req->key_len,
528741cb 158 &dataset->head, true, db, owner, he == NULL);
a95a08b4 159
00ebd7ed
UD
160 pthread_rwlock_unlock (&db->lock);
161
a95a08b4
UD
162 /* Mark the old entry as obsolete. */
163 if (dh != NULL)
164 dh->usable = false;
165 }
99bb9f42 166 }
d67281a7
UD
167 }
168 else
169 {
67479a70 170 /* Determine the I/O structure. */
67479a70
UD
171 size_t pw_name_len = strlen (pwd->pw_name) + 1;
172 size_t pw_passwd_len = strlen (pwd->pw_passwd) + 1;
173 size_t pw_gecos_len = strlen (pwd->pw_gecos) + 1;
174 size_t pw_dir_len = strlen (pwd->pw_dir) + 1;
175 size_t pw_shell_len = strlen (pwd->pw_shell) + 1;
176 char *cp;
a95a08b4
UD
177 const size_t key_len = strlen (key);
178 const size_t buf_len = 3 * sizeof (pwd->pw_uid) + key_len + 1;
179 char *buf = alloca (buf_len);
67479a70
UD
180 ssize_t n;
181
182 /* We need this to insert the `byuid' entry. */
a95a08b4
UD
183 int key_offset;
184 n = snprintf (buf, buf_len, "%d%c%n%s", pwd->pw_uid, '\0',
185 &key_offset, (char *) key) + 1;
186
5a337776
UD
187 written = total = (offsetof (struct dataset, strdata)
188 + pw_name_len + pw_passwd_len
a95a08b4
UD
189 + pw_gecos_len + pw_dir_len + pw_shell_len);
190
191 /* If we refill the cache, first assume the reconrd did not
192 change. Allocate memory on the cache since it is likely
193 discarded anyway. If it turns out to be necessary to have a
194 new record we can still allocate real memory. */
195 bool alloca_used = false;
196 dataset = NULL;
197
198 if (he == NULL)
20e498bd 199 dataset = (struct dataset *) mempool_alloc (db, total + n, 1);
a95a08b4
UD
200
201 if (dataset == NULL)
202 {
203 /* We cannot permanently add the result in the moment. But
204 we can provide the result as is. Store the data in some
205 temporary memory. */
206 dataset = (struct dataset *) alloca (total + n);
207
208 /* We cannot add this record to the permanent database. */
209 alloca_used = true;
210 }
211
212 dataset->head.allocsize = total + n;
213 dataset->head.recsize = total - offsetof (struct dataset, resp);
214 dataset->head.notfound = false;
215 dataset->head.nreloads = he == NULL ? 0 : (dh->nreloads + 1);
216 dataset->head.usable = true;
217
218 /* Compute the timeout time. */
a4c7ea7b 219 timeout = dataset->head.timeout = t + db->postimeout;
a95a08b4
UD
220
221 dataset->resp.version = NSCD_VERSION;
222 dataset->resp.found = 1;
223 dataset->resp.pw_name_len = pw_name_len;
224 dataset->resp.pw_passwd_len = pw_passwd_len;
225 dataset->resp.pw_uid = pwd->pw_uid;
226 dataset->resp.pw_gid = pwd->pw_gid;
227 dataset->resp.pw_gecos_len = pw_gecos_len;
228 dataset->resp.pw_dir_len = pw_dir_len;
229 dataset->resp.pw_shell_len = pw_shell_len;
230
231 cp = dataset->strdata;
67479a70
UD
232
233 /* Copy the strings over into the buffer. */
234 cp = mempcpy (cp, pwd->pw_name, pw_name_len);
235 cp = mempcpy (cp, pwd->pw_passwd, pw_passwd_len);
236 cp = mempcpy (cp, pwd->pw_gecos, pw_gecos_len);
237 cp = mempcpy (cp, pwd->pw_dir, pw_dir_len);
238 cp = mempcpy (cp, pwd->pw_shell, pw_shell_len);
239
a95a08b4 240 /* Finally the stringified UID value. */
67479a70 241 memcpy (cp, buf, n);
a95a08b4
UD
242 char *key_copy = cp + key_offset;
243 assert (key_copy == (char *) rawmemchr (cp, '\0') + 1);
67479a70 244
5a337776
UD
245 assert (cp == dataset->strdata + total - offsetof (struct dataset,
246 strdata));
247
a95a08b4
UD
248 /* Now we can determine whether on refill we have to create a new
249 record or not. */
250 if (he != NULL)
251 {
252 assert (fd == -1);
801ddb6a 253
20e498bd 254 if (dataset->head.allocsize == dh->allocsize
5a337776 255 && dataset->head.recsize == dh->recsize
a95a08b4
UD
256 && memcmp (&dataset->resp, dh->data,
257 dh->allocsize - offsetof (struct dataset, resp)) == 0)
258 {
cf244b74 259 /* The data has not changed. We will just bump the
a95a08b4
UD
260 timeout value. Note that the new record has been
261 allocated on the stack and need not be freed. */
262 dh->timeout = dataset->head.timeout;
263 ++dh->nreloads;
264 }
265 else
266 {
267 /* We have to create a new record. Just allocate
268 appropriate memory and copy it. */
269 struct dataset *newp
20e498bd 270 = (struct dataset *) mempool_alloc (db, total + n, 1);
a95a08b4
UD
271 if (newp != NULL)
272 {
273 /* Adjust pointer into the memory block. */
274 cp = (char *) newp + (cp - (char *) dataset);
61705e06 275 key_copy = (char *) newp + (key_copy - (char *) dataset);
a95a08b4
UD
276
277 dataset = memcpy (newp, dataset, total + n);
278 alloca_used = false;
279 }
280
281 /* Mark the old record as obsolete. */
282 dh->usable = false;
283 }
284 }
285 else
286 {
287 /* We write the dataset before inserting it to the database
288 since while inserting this thread might block and so would
289 unnecessarily let the receiver wait. */
290 assert (fd != -1);
67479a70 291
eac10791 292#ifdef HAVE_SENDFILE
74158740 293 if (__builtin_expect (db->mmap_used, 1) && !alloca_used)
eac10791
UD
294 {
295 assert (db->wr_fd != -1);
296 assert ((char *) &dataset->resp > (char *) db->data);
ea547a1a 297 assert ((char *) dataset - (char *) db->head
eac10791
UD
298 + total
299 <= (sizeof (struct database_pers_head)
a4c7ea7b
UD
300 + db->head->module * sizeof (ref_t)
301 + db->head->data_size));
bd547139
UD
302 written = sendfileall (fd, db->wr_fd,
303 (char *) &dataset->resp
ea547a1a 304 - (char *) db->head, dataset->head.recsize );
eac10791
UD
305# ifndef __ASSUME_SENDFILE
306 if (written == -1 && errno == ENOSYS)
307 goto use_write;
308# endif
309 }
310 else
311# ifndef __ASSUME_SENDFILE
312 use_write:
313# endif
314#endif
ea547a1a 315 written = writeall (fd, &dataset->resp, dataset->head.recsize);
a95a08b4 316 }
67479a70 317
67479a70 318
a95a08b4
UD
319 /* Add the record to the database. But only if it has not been
320 stored on the stack. */
321 if (! alloca_used)
322 {
323 /* If necessary, we also propagate the data to disk. */
324 if (db->persistent)
3418007e
UD
325 {
326 // XXX async OK?
327 uintptr_t pval = (uintptr_t) dataset & ~pagesize_m1;
328 msync ((void *) pval,
329 ((uintptr_t) dataset & pagesize_m1) + total + n,
330 MS_ASYNC);
331 }
67479a70 332
a95a08b4
UD
333 /* NB: in the following code we always must add the entry
334 marked with FIRST first. Otherwise we end up with
335 dangling "pointers" in case a latter hash entry cannot be
336 added. */
797ed6f7 337 bool first = true;
67479a70 338
a95a08b4 339 /* If the request was by UID, add that entry first. */
797ed6f7 340 if (req->type == GETPWBYUID)
a95a08b4 341 {
03e157d8 342 if (cache_add (GETPWBYUID, cp, key_offset, &dataset->head, true,
528741cb 343 db, owner, he == NULL) < 0)
7e71e55f 344 goto out;
797ed6f7
UD
345
346 first = false;
a95a08b4
UD
347 }
348 /* If the key is different from the name add a separate entry. */
349 else if (strcmp (key_copy, dataset->strdata) != 0)
350 {
351 if (cache_add (GETPWBYNAME, key_copy, key_len + 1,
528741cb 352 &dataset->head, true, db, owner, he == NULL) < 0)
7e71e55f 353 goto out;
a95a08b4
UD
354
355 first = false;
356 }
357
358 /* We have to add the value for both, byname and byuid. */
797ed6f7
UD
359 if ((req->type == GETPWBYNAME || db->propagate)
360 && __builtin_expect (cache_add (GETPWBYNAME, dataset->strdata,
361 pw_name_len, &dataset->head,
528741cb
UD
362 first, db, owner, he == NULL)
363 == 0, 1))
a95a08b4 364 {
797ed6f7 365 if (req->type == GETPWBYNAME && db->propagate)
03e157d8 366 (void) cache_add (GETPWBYUID, cp, key_offset, &dataset->head,
528741cb 367 false, db, owner, false);
a95a08b4 368 }
00ebd7ed
UD
369
370 out:
371 pthread_rwlock_unlock (&db->lock);
a95a08b4 372 }
d67281a7 373 }
14e9dd67 374
23700036 375 if (__builtin_expect (written != total, 0) && debug_level > 0)
d67281a7 376 {
67479a70
UD
377 char buf[256];
378 dbg_log (_("short write in %s: %s"), __FUNCTION__,
379 strerror_r (errno, buf, sizeof (buf)));
d67281a7 380 }
a4c7ea7b
UD
381
382 return timeout;
d67281a7
UD
383}
384
d67281a7 385
a95a08b4
UD
386union keytype
387{
388 void *v;
389 uid_t u;
390};
391
392
393static int
394lookup (int type, union keytype key, struct passwd *resultbufp, char *buffer,
395 size_t buflen, struct passwd **pwd)
396{
397 if (type == GETPWBYNAME)
398 return __getpwnam_r (key.v, resultbufp, buffer, buflen, pwd);
399 else
400 return __getpwuid_r (key.u, resultbufp, buffer, buflen, pwd);
401}
402
403
a4c7ea7b 404static time_t
a95a08b4
UD
405addpwbyX (struct database_dyn *db, int fd, request_header *req,
406 union keytype key, const char *keystr, uid_t c_uid,
407 struct hashentry *he, struct datahead *dh)
67479a70
UD
408{
409 /* Search for the entry matching the key. Please note that we don't
410 look again in the table whether the dataset is now available. We
411 simply insert it. It does not matter if it is in there twice. The
412 pruning function only will look at the timestamp. */
a95a08b4 413 size_t buflen = 1024;
c7a9b6e2 414 char *buffer = (char *) alloca (buflen);
67479a70
UD
415 struct passwd resultbuf;
416 struct passwd *pwd;
c7a9b6e2 417 bool use_malloc = false;
a95a08b4 418 int errval = 0;
d67281a7 419
c7a9b6e2 420 if (__builtin_expect (debug_level > 0, 0))
a95a08b4
UD
421 {
422 if (he == NULL)
423 dbg_log (_("Haven't found \"%s\" in password cache!"), keystr);
424 else
425 dbg_log (_("Reloading \"%s\" in password cache!"), keystr);
426 }
d67281a7 427
a95a08b4
UD
428 while (lookup (req->type, key, &resultbuf, buffer, buflen, &pwd) != 0
429 && (errval = errno) == ERANGE)
d67281a7 430 {
67479a70 431 errno = 0;
c7a9b6e2
UD
432
433 if (__builtin_expect (buflen > 32768, 0))
434 {
b21fa963 435 char *old_buffer = buffer;
4379b403 436 buflen *= 2;
c7a9b6e2
UD
437 buffer = (char *) realloc (use_malloc ? buffer : NULL, buflen);
438 if (buffer == NULL)
439 {
440 /* We ran out of memory. We cannot do anything but
441 sending a negative response. In reality this should
442 never happen. */
443 pwd = NULL;
444 buffer = old_buffer;
a95a08b4
UD
445
446 /* We set the error to indicate this is (possibly) a
447 temporary error and that it does not mean the entry
448 is not available at all. */
449 errval = EAGAIN;
c7a9b6e2
UD
450 break;
451 }
452 use_malloc = true;
453 }
454 else
9caf4f1c
UD
455 /* Allocate a new buffer on the stack. If possible combine it
456 with the previously allocated buffer. */
4379b403 457 buffer = (char *) extend_alloca (buffer, buflen, 2 * buflen);
d67281a7 458 }
14e9dd67 459
a95a08b4 460 /* Add the entry to the cache. */
a4c7ea7b
UD
461 time_t timeout = cache_addpw (db, fd, req, keystr, pwd, c_uid, he, dh,
462 errval);
c7a9b6e2
UD
463
464 if (use_malloc)
465 free (buffer);
a4c7ea7b
UD
466
467 return timeout;
d67281a7
UD
468}
469
d67281a7 470
67479a70 471void
a95a08b4
UD
472addpwbyname (struct database_dyn *db, int fd, request_header *req,
473 void *key, uid_t c_uid)
474{
475 union keytype u = { .v = key };
476
477 addpwbyX (db, fd, req, u, key, c_uid, NULL, NULL);
478}
479
480
a4c7ea7b 481time_t
a95a08b4
UD
482readdpwbyname (struct database_dyn *db, struct hashentry *he,
483 struct datahead *dh)
484{
485 request_header req =
486 {
487 .type = GETPWBYNAME,
488 .key_len = he->len
489 };
490 union keytype u = { .v = db->data + he->key };
491
a4c7ea7b 492 return addpwbyX (db, -1, &req, u, db->data + he->key, he->owner, he, dh);
a95a08b4
UD
493}
494
495
496void
497addpwbyuid (struct database_dyn *db, int fd, request_header *req,
a1c542bf 498 void *key, uid_t c_uid)
67479a70 499{
8e9b2075 500 char *ep;
c7a9b6e2 501 uid_t uid = strtoul ((char *) key, &ep, 10);
c7a9b6e2
UD
502
503 if (*(char *) key == '\0' || *ep != '\0') /* invalid numeric uid */
8e9b2075 504 {
c7a9b6e2 505 if (debug_level > 0)
a4c7ea7b 506 dbg_log (_("Invalid numeric uid \"%s\"!"), (char *) key);
8e9b2075
UD
507
508 errno = EINVAL;
509 return;
510 }
d67281a7 511
a95a08b4 512 union keytype u = { .u = uid };
d67281a7 513
a95a08b4
UD
514 addpwbyX (db, fd, req, u, key, c_uid, NULL, NULL);
515}
a1c542bf 516
c7a9b6e2 517
a4c7ea7b 518time_t
a95a08b4
UD
519readdpwbyuid (struct database_dyn *db, struct hashentry *he,
520 struct datahead *dh)
521{
522 char *ep;
523 uid_t uid = strtoul (db->data + he->key, &ep, 10);
d67281a7 524
a95a08b4
UD
525 /* Since the key has been added before it must be OK. */
526 assert (*(db->data + he->key) != '\0' && *ep == '\0');
a1c542bf 527
a95a08b4
UD
528 request_header req =
529 {
530 .type = GETPWBYUID,
531 .key_len = he->len
532 };
533 union keytype u = { .u = uid };
c7a9b6e2 534
a4c7ea7b 535 return addpwbyX (db, -1, &req, u, db->data + he->key, he->owner, he, dh);
d67281a7 536}