Bug Summary

File:obj-scan-build/trans/passwordServer.c
Location:line 80, column 12
Description:Value stored to 'msgh_simple' during its initialization is never read

Annotated Source Code

1/* Module password */
2
3#ifndef _GNU_SOURCE1
4#define _GNU_SOURCE1 1
5#endif
6
7#define EXPORT_BOOLEAN
8#include <mach/boolean.h>
9#include <mach/kern_return.h>
10#include <mach/message.h>
11#include <mach/mig_errors.h>
12#include <mach/mig_support.h>
13
14#ifndef mig_internalstatic
15#define mig_internalstatic static
16#endif
17
18#ifndef mig_external
19#define mig_external
20#endif
21
22#ifndef mig_unlikely
23#define mig_unlikely(X)__builtin_expect (!! (X), 0) __builtin_expect (!! (X), 0)
24#endif
25
26#ifndef TypeCheck1
27#define TypeCheck1 1
28#endif
29
30#ifndef UseExternRCSId1
31#define UseExternRCSId1 1
32#endif
33
34#define BAD_TYPECHECK(type, check)__builtin_expect (!! (({ union { mach_msg_type_t t; unsigned32_t
w; } _t, _c; _t.t = *(type); _c.t = *(check);_t.w != _c.w; }
)), 0)
mig_unlikely (({\__builtin_expect (!! (({ union { mach_msg_type_t t; unsigned32_t
w; } _t, _c; _t.t = *(type); _c.t = *(check);_t.w != _c.w; }
)), 0)
35 union { mach_msg_type_t t; unsigned32_t w; } _t, _c;\__builtin_expect (!! (({ union { mach_msg_type_t t; unsigned32_t
w; } _t, _c; _t.t = *(type); _c.t = *(check);_t.w != _c.w; }
)), 0)
36 _t.t = *(type); _c.t = *(check);_t.w != _c.w; }))__builtin_expect (!! (({ union { mach_msg_type_t t; unsigned32_t
w; } _t, _c; _t.t = *(type); _c.t = *(check);_t.w != _c.w; }
)), 0)
37#define msgh_request_portmsgh_local_port msgh_local_port
38#define MACH_MSGH_BITS_REQUEST(bits)(((bits) & 0x0000ff00) >> 8) MACH_MSGH_BITS_LOCAL(bits)(((bits) & 0x0000ff00) >> 8)
39#define msgh_reply_portmsgh_remote_port msgh_remote_port
40#define MACH_MSGH_BITS_REPLY(bits)((bits) & 0x000000ff) MACH_MSGH_BITS_REMOTE(bits)((bits) & 0x000000ff)
41
42#include "../libtrivfs/mig-decls.h"
43#include <hurd/ports.h>
44#include <mach/std_types.h>
45#include <mach/mach_types.h>
46#include <device/device_types.h>
47#include <device/net_status.h>
48#include <sys/types.h>
49#include <sys/stat.h>
50#include <sys/statfs.h>
51#include <sys/resource.h>
52#include <sys/utsname.h>
53#include <hurd/hurd_types.h>
54
55/* Routine password_check_user */
56mig_internalstatic void _Xpassword_check_user
57 (mach_msg_header_t *InHeadP, mach_msg_header_t *OutHeadP)
58{
59 typedef struct {
60 mach_msg_header_t Head;
61 mach_msg_type_t userType;
62 uid_t user;
63 mach_msg_type_t pwType;
64 string_t pw;
65 } Request;
66
67 typedef struct {
68 mach_msg_header_t Head;
69 mach_msg_type_t RetCodeType;
70 kern_return_t RetCode;
71 mach_msg_type_t authType;
72 mach_port_t auth;
73 } Reply;
74
75 Request *In0P = (Request *) InHeadP;
76 Reply *OutP = (Reply *) OutHeadP;
77 mig_external kern_return_t S_password_check_user
78 (trivfs_protid_t server, uid_t user, string_t pw, mach_port_t *auth, mach_msg_type_name_t *authPoly);
79
80 boolean_t msgh_simple = msgh_simple;
Value stored to 'msgh_simple' during its initialization is never read
81 const mach_msg_type_t userCheck = {
82 /* msgt_name = */ 2,
83 /* msgt_size = */ 32,
84 /* msgt_number = */ 1,
85 /* msgt_inline = */ TRUE((boolean_t) 1),
86 /* msgt_longform = */ FALSE((boolean_t) 0),
87 /* msgt_deallocate = */ FALSE((boolean_t) 0),
88 /* msgt_unused = */ 0
89 };
90
91 const mach_msg_type_t pwCheck = {
92 /* msgt_name = */ MACH_MSG_TYPE_STRING_C12,
93 /* msgt_size = */ 8,
94 /* msgt_number = */ 1024,
95 /* msgt_inline = */ TRUE((boolean_t) 1),
96 /* msgt_longform = */ FALSE((boolean_t) 0),
97 /* msgt_deallocate = */ FALSE((boolean_t) 0),
98 /* msgt_unused = */ 0
99 };
100
101 const mach_msg_type_t authType = {
102 /* msgt_name = */ -1,
103 /* msgt_size = */ 32,
104 /* msgt_number = */ 1,
105 /* msgt_inline = */ TRUE((boolean_t) 1),
106 /* msgt_longform = */ FALSE((boolean_t) 0),
107 /* msgt_deallocate = */ FALSE((boolean_t) 0),
108 /* msgt_unused = */ 0
109 };
110
111 trivfs_protid_t server;
112 mach_msg_type_name_t authPoly;
113
114#if TypeCheck1
115 if (mig_unlikely ((In0P->Head.msgh_size != 1060) ||__builtin_expect (!! ((In0P->Head.msgh_size != 1060) || (In0P
->Head.msgh_bits & 0x80000000U)), 0)
116 (In0P->Head.msgh_bits & MACH_MSGH_BITS_COMPLEX))__builtin_expect (!! ((In0P->Head.msgh_size != 1060) || (In0P
->Head.msgh_bits & 0x80000000U)), 0)
)
117 { OutP->RetCode = MIG_BAD_ARGUMENTS-304; return; }
118#endif /* TypeCheck */
119
120#if TypeCheck1
121 if (BAD_TYPECHECK(&In0P->userType, &userCheck)__builtin_expect (!! (({ union { mach_msg_type_t t; unsigned32_t
w; } _t, _c; _t.t = *(&In0P->userType); _c.t = *(&
userCheck);_t.w != _c.w; })), 0)
)
122 { OutP->RetCode = MIG_BAD_ARGUMENTS-304; return; }
123#endif /* TypeCheck */
124
125#if TypeCheck1
126 if (BAD_TYPECHECK(&In0P->pwType, &pwCheck)__builtin_expect (!! (({ union { mach_msg_type_t t; unsigned32_t
w; } _t, _c; _t.t = *(&In0P->pwType); _c.t = *(&pwCheck
);_t.w != _c.w; })), 0)
)
127 { OutP->RetCode = MIG_BAD_ARGUMENTS-304; return; }
128#endif /* TypeCheck */
129
130 if (MACH_MSGH_BITS_LOCAL (In0P->Head.msgh_bits)(((In0P->Head.msgh_bits) & 0x0000ff00) >> 8) == MACH_MSG_TYPE_PROTECTED_PAYLOAD23)
131 server = trivfs_begin_using_protid_payload(In0P->Head.msgh_protected_payload);
132 else
133 server = trivfs_begin_using_protid(In0P->Head.msgh_request_portmsgh_local_port);
134
135 OutP->RetCode = S_password_check_user(server, In0P->user, In0P->pw, &OutP->auth, &authPoly);
136 trivfs_end_using_protid(server);
137 if (OutP->RetCode != KERN_SUCCESS0)
138 return;
139
140 msgh_simple = TRUE((boolean_t) 1);
141 OutP->Head.msgh_size = 40;
142
143 OutP->authType = authType;
144
145 if (MACH_MSG_TYPE_PORT_ANY(authPoly)(((authPoly) >= 16) && ((authPoly) <= 21)))
146 msgh_simple = FALSE((boolean_t) 0);
147
148 OutP->authType.msgt_name = authPoly;
149
150 if (!msgh_simple)
151 OutP->Head.msgh_bits |= MACH_MSGH_BITS_COMPLEX0x80000000U;
152}
153
154/* Default implementation of S_password_check_user */
155#ifdef MIG_EOPNOTSUPP
156kern_return_t __attribute__ ((weak))
157S_password_check_user
158(
159 trivfs_protid_t server,
160 uid_t user,
161 string_t pw,
162 mach_port_t *auth,
163 mach_msg_type_name_t *authPoly
164) { return MIG_EOPNOTSUPP; }
165#endif /* MIG_EOPNOTSUPP */
166
167/* Routine password_check_group */
168mig_internalstatic void _Xpassword_check_group
169 (mach_msg_header_t *InHeadP, mach_msg_header_t *OutHeadP)
170{
171 typedef struct {
172 mach_msg_header_t Head;
173 mach_msg_type_t groupType;
174 uid_t group;
175 mach_msg_type_t pwType;
176 string_t pw;
177 } Request;
178
179 typedef struct {
180 mach_msg_header_t Head;
181 mach_msg_type_t RetCodeType;
182 kern_return_t RetCode;
183 mach_msg_type_t authType;
184 mach_port_t auth;
185 } Reply;
186
187 Request *In0P = (Request *) InHeadP;
188 Reply *OutP = (Reply *) OutHeadP;
189 mig_external kern_return_t S_password_check_group
190 (trivfs_protid_t server, uid_t group, string_t pw, mach_port_t *auth, mach_msg_type_name_t *authPoly);
191
192 boolean_t msgh_simple = msgh_simple;
193 const mach_msg_type_t groupCheck = {
194 /* msgt_name = */ 2,
195 /* msgt_size = */ 32,
196 /* msgt_number = */ 1,
197 /* msgt_inline = */ TRUE((boolean_t) 1),
198 /* msgt_longform = */ FALSE((boolean_t) 0),
199 /* msgt_deallocate = */ FALSE((boolean_t) 0),
200 /* msgt_unused = */ 0
201 };
202
203 const mach_msg_type_t pwCheck = {
204 /* msgt_name = */ MACH_MSG_TYPE_STRING_C12,
205 /* msgt_size = */ 8,
206 /* msgt_number = */ 1024,
207 /* msgt_inline = */ TRUE((boolean_t) 1),
208 /* msgt_longform = */ FALSE((boolean_t) 0),
209 /* msgt_deallocate = */ FALSE((boolean_t) 0),
210 /* msgt_unused = */ 0
211 };
212
213 const mach_msg_type_t authType = {
214 /* msgt_name = */ -1,
215 /* msgt_size = */ 32,
216 /* msgt_number = */ 1,
217 /* msgt_inline = */ TRUE((boolean_t) 1),
218 /* msgt_longform = */ FALSE((boolean_t) 0),
219 /* msgt_deallocate = */ FALSE((boolean_t) 0),
220 /* msgt_unused = */ 0
221 };
222
223 trivfs_protid_t server;
224 mach_msg_type_name_t authPoly;
225
226#if TypeCheck1
227 if (mig_unlikely ((In0P->Head.msgh_size != 1060) ||__builtin_expect (!! ((In0P->Head.msgh_size != 1060) || (In0P
->Head.msgh_bits & 0x80000000U)), 0)
228 (In0P->Head.msgh_bits & MACH_MSGH_BITS_COMPLEX))__builtin_expect (!! ((In0P->Head.msgh_size != 1060) || (In0P
->Head.msgh_bits & 0x80000000U)), 0)
)
229 { OutP->RetCode = MIG_BAD_ARGUMENTS-304; return; }
230#endif /* TypeCheck */
231
232#if TypeCheck1
233 if (BAD_TYPECHECK(&In0P->groupType, &groupCheck)__builtin_expect (!! (({ union { mach_msg_type_t t; unsigned32_t
w; } _t, _c; _t.t = *(&In0P->groupType); _c.t = *(&
groupCheck);_t.w != _c.w; })), 0)
)
234 { OutP->RetCode = MIG_BAD_ARGUMENTS-304; return; }
235#endif /* TypeCheck */
236
237#if TypeCheck1
238 if (BAD_TYPECHECK(&In0P->pwType, &pwCheck)__builtin_expect (!! (({ union { mach_msg_type_t t; unsigned32_t
w; } _t, _c; _t.t = *(&In0P->pwType); _c.t = *(&pwCheck
);_t.w != _c.w; })), 0)
)
239 { OutP->RetCode = MIG_BAD_ARGUMENTS-304; return; }
240#endif /* TypeCheck */
241
242 if (MACH_MSGH_BITS_LOCAL (In0P->Head.msgh_bits)(((In0P->Head.msgh_bits) & 0x0000ff00) >> 8) == MACH_MSG_TYPE_PROTECTED_PAYLOAD23)
243 server = trivfs_begin_using_protid_payload(In0P->Head.msgh_protected_payload);
244 else
245 server = trivfs_begin_using_protid(In0P->Head.msgh_request_portmsgh_local_port);
246
247 OutP->RetCode = S_password_check_group(server, In0P->group, In0P->pw, &OutP->auth, &authPoly);
248 trivfs_end_using_protid(server);
249 if (OutP->RetCode != KERN_SUCCESS0)
250 return;
251
252 msgh_simple = TRUE((boolean_t) 1);
253 OutP->Head.msgh_size = 40;
254
255 OutP->authType = authType;
256
257 if (MACH_MSG_TYPE_PORT_ANY(authPoly)(((authPoly) >= 16) && ((authPoly) <= 21)))
258 msgh_simple = FALSE((boolean_t) 0);
259
260 OutP->authType.msgt_name = authPoly;
261
262 if (!msgh_simple)
263 OutP->Head.msgh_bits |= MACH_MSGH_BITS_COMPLEX0x80000000U;
264}
265
266/* Default implementation of S_password_check_group */
267#ifdef MIG_EOPNOTSUPP
268kern_return_t __attribute__ ((weak))
269S_password_check_group
270(
271 trivfs_protid_t server,
272 uid_t group,
273 string_t pw,
274 mach_port_t *auth,
275 mach_msg_type_name_t *authPoly
276) { return MIG_EOPNOTSUPP; }
277#endif /* MIG_EOPNOTSUPP */
278
279mig_routine_t password_server_routines[] = {
280 _Xpassword_check_user,
281 _Xpassword_check_group,
282};
283
284mig_external boolean_t password_server
285 (mach_msg_header_t *InHeadP, mach_msg_header_t *OutHeadP)
286{
287 mach_msg_header_t *InP = InHeadP;
288 mig_reply_header_t *OutP = (mig_reply_header_t *) OutHeadP;
289
290 const mach_msg_type_t RetCodeType = {
291 /* msgt_name = */ MACH_MSG_TYPE_INTEGER_322,
292 /* msgt_size = */ 32,
293 /* msgt_number = */ 1,
294 /* msgt_inline = */ TRUE((boolean_t) 1),
295 /* msgt_longform = */ FALSE((boolean_t) 0),
296 /* msgt_deallocate = */ FALSE((boolean_t) 0),
297 /* msgt_unused = */ 0
298 };
299
300 mig_routine_t routine;
301
302 OutP->Head.msgh_bits = MACH_MSGH_BITS(MACH_MSGH_BITS_REPLY(InP->msgh_bits), 0)((((InP->msgh_bits) & 0x000000ff)) | ((0) << 8));
303 OutP->Head.msgh_size = sizeof *OutP;
304 OutP->Head.msgh_remote_port = InP->msgh_reply_portmsgh_remote_port;
305 OutP->Head.msgh_local_port = MACH_PORT_NULL((mach_port_t) 0);
306 OutP->Head.msgh_seqno = 0;
307 OutP->Head.msgh_id = InP->msgh_id + 100;
308
309 OutP->RetCodeType = RetCodeType;
310
311 if ((InP->msgh_id > 38001) || (InP->msgh_id < 38000) ||
312 ((routine = password_server_routines[InP->msgh_id - 38000]) == 0)) {
313 OutP->RetCode = MIG_BAD_ID-303;
314 return FALSE((boolean_t) 0);
315 }
316 (*routine) (InP, &OutP->Head);
317 return TRUE((boolean_t) 1);
318}
319
320mig_external mig_routine_t password_server_routine
321 (const mach_msg_header_t *InHeadP)
322{
323 int msgh_id;
324
325 msgh_id = InHeadP->msgh_id - 38000;
326
327 if ((msgh_id > 1) || (msgh_id < 0))
328 return 0;
329
330 return password_server_routines[msgh_id];
331}
332