Bug Summary

File:src/usr.sbin/ypldap/ypldap.c
Warning:line 189, column 8
Although the value stored to 'cp' is used in the enclosing expression, the value is never actually read from 'cp'

Annotated Source Code

Press '?' to see keyboard shortcuts

clang -cc1 -cc1 -triple amd64-unknown-openbsd7.4 -analyze -disable-free -clear-ast-before-backend -disable-llvm-verifier -discard-value-names -main-file-name ypldap.c -analyzer-checker=core -analyzer-checker=apiModeling -analyzer-checker=unix -analyzer-checker=deadcode -analyzer-checker=security.insecureAPI.UncheckedReturn -analyzer-checker=security.insecureAPI.getpw -analyzer-checker=security.insecureAPI.gets -analyzer-checker=security.insecureAPI.mktemp -analyzer-checker=security.insecureAPI.mkstemp -analyzer-checker=security.insecureAPI.vfork -analyzer-checker=nullability.NullPassedToNonnull -analyzer-checker=nullability.NullReturnedFromNonnull -analyzer-output plist -w -setup-static-analyzer -mrelocation-model pic -pic-level 1 -pic-is-pie -mframe-pointer=all -relaxed-aliasing -ffp-contract=on -fno-rounding-math -mconstructor-aliases -funwind-tables=2 -target-cpu x86-64 -target-feature +retpoline-indirect-calls -target-feature +retpoline-indirect-branches -tune-cpu generic -debugger-tuning=gdb -fcoverage-compilation-dir=/usr/src/usr.sbin/ypldap/obj -resource-dir /usr/local/llvm16/lib/clang/16 -I /usr/src/usr.sbin/ypldap -internal-isystem /usr/local/llvm16/lib/clang/16/include -internal-externc-isystem /usr/include -O2 -fdebug-compilation-dir=/usr/src/usr.sbin/ypldap/obj -ferror-limit 19 -fwrapv -D_RET_PROTECTOR -ret-protector -fcf-protection=branch -fno-jump-tables -fgnuc-version=4.2.1 -vectorize-loops -vectorize-slp -fno-builtin-malloc -fno-builtin-calloc -fno-builtin-realloc -fno-builtin-valloc -fno-builtin-free -fno-builtin-strdup -fno-builtin-strndup -analyzer-output=html -faddrsig -D__GCC_HAVE_DWARF2_CFI_ASM=1 -o /home/ben/Projects/scan/2024-01-11-140451-98009-1 -x c /usr/src/usr.sbin/ypldap/ypldap.c
1/* $OpenBSD: ypldap.c,v 1.24 2023/03/31 03:38:26 jmatthew Exp $ */
2
3/*
4 * Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org>
5 *
6 * Permission to use, copy, modify, and distribute this software for any
7 * purpose with or without fee is hereby granted, provided that the above
8 * copyright notice and this permission notice appear in all copies.
9 *
10 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17 */
18
19#include <sys/types.h>
20#include <sys/queue.h>
21#include <sys/socket.h>
22#include <sys/signal.h>
23#include <sys/tree.h>
24#include <sys/wait.h>
25
26#include <netinet/in.h>
27#include <arpa/inet.h>
28
29#include <err.h>
30#include <errno(*__errno()).h>
31#include <event.h>
32#include <unistd.h>
33#include <pwd.h>
34#include <stdio.h>
35#include <stdlib.h>
36#include <string.h>
37#include <limits.h>
38
39#include "ypldap.h"
40#include "log.h"
41
42__dead__attribute__((__noreturn__)) void usage(void);
43int check_child(pid_t, const char *);
44void main_sig_handler(int, short, void *);
45void main_shutdown(void);
46void main_dispatch_client(int, short, void *);
47void main_configure_client(struct env *);
48void main_init_timer(int, short, void *);
49void main_start_update(struct env *);
50void main_trash_update(struct env *);
51void main_end_update(struct env *);
52int main_create_user_groups(struct env *);
53void purge_config(struct env *);
54void reconfigure(struct env *);
55
56int pipe_main2client[2];
57
58pid_t client_pid = 0;
59char *conffile = YPLDAP_CONF_FILE"/etc/ypldap.conf";
60int opts = 0;
61
62enum privsep_procid ypldap_process;
63
64void
65usage(void)
66{
67 extern const char *__progname;
68
69 fprintf(stderr(&__sF[2]), "usage: %s [-dnv] [-D macro=value] [-f file]\n",
70 __progname);
71 exit(1);
72}
73
74int
75check_child(pid_t pid, const char *pname)
76{
77 int status;
78
79 if (waitpid(pid, &status, WNOHANG0x01) > 0) {
80 if (WIFEXITED(status)(((status) & 0177) == 0)) {
81 log_warnx("check_child: lost child %s exited", pname);
82 return (1);
83 }
84 if (WIFSIGNALED(status)(((status) & 0177) != 0177 && ((status) & 0177
) != 0)
) {
85 log_warnx("check_child: lost child %s terminated; "
86 "signal %d", pname, WTERMSIG(status)(((status) & 0177)));
87 return (1);
88 }
89 }
90 return (0);
91}
92
93/* ARGUSED */
94void
95main_sig_handler(int sig, short event, void *p)
96{
97 int die = 0;
98
99 switch (sig) {
100 case SIGTERM15:
101 case SIGINT2:
102 die = 1;
103 /* FALLTHROUGH */
104 case SIGCHLD20:
105 if (check_child(client_pid, "ldap client")) {
106 client_pid = 0;
107 die = 1;
108 }
109 if (die)
110 main_shutdown();
111 break;
112 case SIGHUP1:
113 /* reconfigure */
114 break;
115 default:
116 fatalx("unexpected signal");
117 }
118}
119
120void
121main_shutdown(void)
122{
123 _exit(0);
124}
125
126void
127main_start_update(struct env *env)
128{
129 env->update_trashed = 0;
130
131 log_debug("starting directory update");
132 env->sc_user_line_len = 0;
133 env->sc_group_line_len = 0;
134 if ((env->sc_user_names_t = calloc(1,
135 sizeof(*env->sc_user_names_t))) == NULL((void *)0) ||
136 (env->sc_group_names_t = calloc(1,
137 sizeof(*env->sc_group_names_t))) == NULL((void *)0))
138 fatal(NULL((void *)0));
139 RB_INIT(env->sc_user_names_t)do { (env->sc_user_names_t)->rbh_root = ((void *)0); } while
(0)
;
140 RB_INIT(env->sc_group_names_t)do { (env->sc_group_names_t)->rbh_root = ((void *)0); }
while (0)
;
141}
142
143/*
144 * XXX: Currently this function should only be called when updating is
145 * finished. A notification should be send to ldapclient that it should stop
146 * sending new pwd/grp entries before it can be called from different places.
147 */
148void
149main_trash_update(struct env *env)
150{
151 struct userent *ue;
152 struct groupent *ge;
153
154 env->update_trashed = 1;
155
156 while ((ue = RB_ROOT(env->sc_user_names_t)(env->sc_user_names_t)->rbh_root) != NULL((void *)0)) {
157 RB_REMOVE(user_name_tree,user_name_tree_RB_REMOVE(env->sc_user_names_t, ue)
158 env->sc_user_names_t, ue)user_name_tree_RB_REMOVE(env->sc_user_names_t, ue);
159 free(ue->ue_line);
160 free(ue->ue_netid_line);
161 free(ue);
162 }
163 free(env->sc_user_names_t);
164 env->sc_user_names_t = NULL((void *)0);
165 while ((ge = RB_ROOT(env->sc_group_names_t)(env->sc_group_names_t)->rbh_root)
166 != NULL((void *)0)) {
167 RB_REMOVE(group_name_tree,group_name_tree_RB_REMOVE(env->sc_group_names_t, ge)
168 env->sc_group_names_t, ge)group_name_tree_RB_REMOVE(env->sc_group_names_t, ge);
169 free(ge->ge_line);
170 free(ge);
171 }
172 free(env->sc_group_names_t);
173 env->sc_group_names_t = NULL((void *)0);
174}
175
176int
177main_create_user_groups(struct env *env)
178{
179 struct userent *ue;
180 struct userent ukey;
181 struct groupent *ge;
182 gid_t pw_gid;
183 char *bp, *cp;
184 char *p;
185 const char *errstr = NULL((void *)0);
186 size_t len;
187
188 RB_FOREACH(ue, user_name_tree, env->sc_user_names_t)for ((ue) = user_name_tree_RB_MINMAX(env->sc_user_names_t,
-1); (ue) != ((void *)0); (ue) = user_name_tree_RB_NEXT(ue))
{
189 bp = cp = ue->ue_line;
Although the value stored to 'cp' is used in the enclosing expression, the value is never actually read from 'cp'
190
191 /* name */
192 bp += strlen(bp) + 1;
193
194 /* password */
195 bp += strcspn(bp, ":") + 1;
196
197 /* uid */
198 bp += strcspn(bp, ":") + 1;
199
200 /* gid */
201 bp[strcspn(bp, ":")] = '\0';
202
203 pw_gid = (gid_t)strtonum(bp, 0, GID_MAX0xffffffffU, &errstr);
204 if (errstr) {
205 log_warnx("main: failed to parse gid for uid: %d",
206 ue->ue_uid);
207 return (-1);
208 }
209
210 /* bring gid column back to its proper state */
211 bp[strlen(bp)] = ':';
212
213 if ((ue->ue_netid_line = calloc(1, LINE_WIDTH1024)) == NULL((void *)0)) {
214 return (-1);
215 }
216
217 if (snprintf(ue->ue_netid_line, LINE_WIDTH1024-1, "%d:%d", ue->ue_uid, pw_gid) >= LINE_WIDTH1024) {
218
219 return (-1);
220 }
221
222 ue->ue_gid = pw_gid;
223 }
224
225 RB_FOREACH(ge, group_name_tree, env->sc_group_names_t)for ((ge) = group_name_tree_RB_MINMAX(env->sc_group_names_t
, -1); (ge) != ((void *)0); (ge) = group_name_tree_RB_NEXT(ge
))
{
226 bp = cp = ge->ge_line;
227
228 /* name */
229 bp += strlen(bp) + 1;
230
231 /* password */
232 bp += strcspn(bp, ":") + 1;
233
234 /* gid */
235 bp += strcspn(bp, ":") + 1;
236
237 cp = bp;
238 if (*bp == '\0')
239 continue;
240 bp = cp;
241 for (;;) {
242 if (!(cp = strsep(&bp, ",")))
243 break;
244 ukey.ue_line = cp;
245 if ((ue = RB_FIND(user_name_tree, env->sc_user_names_t,user_name_tree_RB_FIND(env->sc_user_names_t, &ukey)
246 &ukey)user_name_tree_RB_FIND(env->sc_user_names_t, &ukey)) == NULL((void *)0)) {
247 /* User not found */
248 log_warnx("main: unknown user %s in group %s",
249 ukey.ue_line, ge->ge_line);
250 if (bp != NULL((void *)0))
251 *(bp-1) = ',';
252 continue;
253 }
254 if (bp != NULL((void *)0))
255 *(bp-1) = ',';
256
257 /* Make sure the new group doesn't equal to the main gid */
258 if (ge->ge_gid == ue->ue_gid)
259 continue;
260
261 len = strlen(ue->ue_netid_line);
262 p = ue->ue_netid_line + len;
263
264 if ((snprintf(p, LINE_WIDTH1024-len-1, ",%d",
265 ge->ge_gid)) >= (int)(LINE_WIDTH1024-len)) {
266 return (-1);
267 }
268 }
269 }
270
271 return (0);
272}
273
274void
275main_end_update(struct env *env)
276{
277 struct userent *ue;
278 struct groupent *ge;
279
280 if (env->update_trashed)
281 return;
282
283 log_debug("updates are over, cleaning up trees now");
284
285 if (main_create_user_groups(env) == -1) {
286 main_trash_update(env);
287 return;
288 }
289
290 if (env->sc_user_names == NULL((void *)0)) {
291 env->sc_user_names = env->sc_user_names_t;
292 env->sc_user_lines = NULL((void *)0);
293 env->sc_user_names_t = NULL((void *)0);
294
295 env->sc_group_names = env->sc_group_names_t;
296 env->sc_group_lines = NULL((void *)0);
297 env->sc_group_names_t = NULL((void *)0);
298
299 flatten_entries(env);
300 goto make_uids;
301 }
302
303 /*
304 * clean previous tree.
305 */
306 while ((ue = RB_ROOT(env->sc_user_names)(env->sc_user_names)->rbh_root) != NULL((void *)0)) {
307 RB_REMOVE(user_name_tree, env->sc_user_names,user_name_tree_RB_REMOVE(env->sc_user_names, ue)
308 ue)user_name_tree_RB_REMOVE(env->sc_user_names, ue);
309 free(ue->ue_netid_line);
310 free(ue);
311 }
312 free(env->sc_user_names);
313 free(env->sc_user_lines);
314
315 env->sc_user_names = env->sc_user_names_t;
316 env->sc_user_lines = NULL((void *)0);
317 env->sc_user_names_t = NULL((void *)0);
318
319 while ((ge = RB_ROOT(env->sc_group_names)(env->sc_group_names)->rbh_root) != NULL((void *)0)) {
320 RB_REMOVE(group_name_tree,group_name_tree_RB_REMOVE(env->sc_group_names, ge)
321 env->sc_group_names, ge)group_name_tree_RB_REMOVE(env->sc_group_names, ge);
322 free(ge);
323 }
324 free(env->sc_group_names);
325 free(env->sc_group_lines);
326
327 env->sc_group_names = env->sc_group_names_t;
328 env->sc_group_lines = NULL((void *)0);
329 env->sc_group_names_t = NULL((void *)0);
330
331
332 flatten_entries(env);
333
334 /*
335 * trees are flat now. build up uid, gid and netid trees.
336 */
337
338make_uids:
339 RB_INIT(&env->sc_user_uids)do { (&env->sc_user_uids)->rbh_root = ((void *)0); }
while (0)
;
340 RB_INIT(&env->sc_group_gids)do { (&env->sc_group_gids)->rbh_root = ((void *)0);
} while (0)
;
341 RB_FOREACH(ue, user_name_tree, env->sc_user_names)for ((ue) = user_name_tree_RB_MINMAX(env->sc_user_names, -
1); (ue) != ((void *)0); (ue) = user_name_tree_RB_NEXT(ue))
342 RB_INSERT(user_uid_tree,user_uid_tree_RB_INSERT(&env->sc_user_uids, ue)
343 &env->sc_user_uids, ue)user_uid_tree_RB_INSERT(&env->sc_user_uids, ue);
344 RB_FOREACH(ge, group_name_tree, env->sc_group_names)for ((ge) = group_name_tree_RB_MINMAX(env->sc_group_names,
-1); (ge) != ((void *)0); (ge) = group_name_tree_RB_NEXT(ge)
)
345 RB_INSERT(group_gid_tree,group_gid_tree_RB_INSERT(&env->sc_group_gids, ge)
346 &env->sc_group_gids, ge)group_gid_tree_RB_INSERT(&env->sc_group_gids, ge);
347
348}
349
350void
351main_dispatch_client(int fd, short events, void *p)
352{
353 int n;
354 int shut = 0;
355 struct env *env = p;
356 struct imsgev *iev = env->sc_iev;
357 struct imsgbuf *ibuf = &iev->ibuf;
358 struct idm_req ir;
359 struct imsg imsg;
360
361 if ((events & (EV_READ0x02 | EV_WRITE0x04)) == 0)
362 fatalx("unknown event");
363
364 if (events & EV_READ0x02) {
365 if ((n = imsg_read(ibuf)) == -1 && errno(*__errno()) != EAGAIN35)
366 fatal("imsg_read error");
367 if (n == 0)
368 shut = 1;
369 }
370 if (events & EV_WRITE0x04) {
371 if ((n = msgbuf_write(&ibuf->w)) == -1 && errno(*__errno()) != EAGAIN35)
372 fatal("msgbuf_write");
373 if (n == 0)
374 shut = 1;
375 goto done;
376 }
377
378 for (;;) {
379 if ((n = imsg_get(ibuf, &imsg)) == -1)
380 fatal("main_dispatch_client: imsg_get error");
381 if (n == 0)
382 break;
383
384 switch (imsg.hdr.type) {
385 case IMSG_START_UPDATE:
386 main_start_update(env);
387 break;
388 case IMSG_PW_ENTRY: {
389 struct userent *ue;
390 size_t len;
391
392 if (env->update_trashed)
393 break;
394
395 (void)memcpy(&ir, imsg.data, n - IMSG_HEADER_SIZEsizeof(struct imsg_hdr));
396 if ((ue = calloc(1, sizeof(*ue))) == NULL((void *)0) ||
397 (ue->ue_line = strdup(ir.ir_line)) == NULL((void *)0)) {
398 /*
399 * should cancel tree update instead.
400 */
401 fatal("out of memory");
402 }
403 ue->ue_uid = ir.ir_key.ik_uid;
404 len = strlen(ue->ue_line) + 1;
405 ue->ue_line[strcspn(ue->ue_line, ":")] = '\0';
406 if (RB_INSERT(user_name_tree, env->sc_user_names_t,user_name_tree_RB_INSERT(env->sc_user_names_t, ue)
407 ue)user_name_tree_RB_INSERT(env->sc_user_names_t, ue) != NULL((void *)0)) { /* dup */
408 free(ue->ue_line);
409 free(ue);
410 } else
411 env->sc_user_line_len += len;
412 break;
413 }
414 case IMSG_GRP_ENTRY: {
415 struct groupent *ge;
416 size_t len;
417
418 if (env->update_trashed)
419 break;
420
421 (void)memcpy(&ir, imsg.data, n - IMSG_HEADER_SIZEsizeof(struct imsg_hdr));
422 if ((ge = calloc(1, sizeof(*ge))) == NULL((void *)0) ||
423 (ge->ge_line = strdup(ir.ir_line)) == NULL((void *)0)) {
424 /*
425 * should cancel tree update instead.
426 */
427 fatal("out of memory");
428 }
429 ge->ge_gid = ir.ir_key.ik_gid;
430 len = strlen(ge->ge_line) + 1;
431 ge->ge_line[strcspn(ge->ge_line, ":")] = '\0';
432 if (RB_INSERT(group_name_tree, env->sc_group_names_t,group_name_tree_RB_INSERT(env->sc_group_names_t, ge)
433 ge)group_name_tree_RB_INSERT(env->sc_group_names_t, ge) != NULL((void *)0)) { /* dup */
434 free(ge->ge_line);
435 free(ge);
436 } else
437 env->sc_group_line_len += len;
438 break;
439 }
440 case IMSG_TRASH_UPDATE:
441 main_trash_update(env);
442 break;
443 case IMSG_END_UPDATE: {
444 main_end_update(env);
445 break;
446 }
447 default:
448 log_debug("main_dispatch_client: unexpected imsg %d",
449 imsg.hdr.type);
450 break;
451 }
452 imsg_free(&imsg);
453 }
454
455done:
456 if (!shut)
457 imsg_event_add(iev);
458 else {
459 log_debug("king bula sez: ran into dead pipe");
460 event_del(&iev->ev);
461 event_loopexit(NULL((void *)0));
462 }
463}
464
465void
466main_configure_client(struct env *env)
467{
468 struct idm *idm;
469 struct imsgev *iev = env->sc_iev;
470
471 imsg_compose_event(iev, IMSG_CONF_START, 0, 0, -1, env, sizeof(*env));
472 TAILQ_FOREACH(idm, &env->sc_idms, idm_entry)for((idm) = ((&env->sc_idms)->tqh_first); (idm) != (
(void *)0); (idm) = ((idm)->idm_entry.tqe_next))
{
473 imsg_compose_event(iev, IMSG_CONF_IDM, 0, 0, -1,
474 idm, sizeof(*idm));
475 }
476 imsg_compose_event(iev, IMSG_CONF_END, 0, 0, -1, NULL((void *)0), 0);
477}
478
479void
480main_init_timer(int fd, short event, void *p)
481{
482 struct env *env = p;
483
484 main_configure_client(env);
485}
486
487void
488purge_config(struct env *env)
489{
490 struct idm *idm;
491
492 while ((idm = TAILQ_FIRST(&env->sc_idms)((&env->sc_idms)->tqh_first)) != NULL((void *)0)) {
493 TAILQ_REMOVE(&env->sc_idms, idm, idm_entry)do { if (((idm)->idm_entry.tqe_next) != ((void *)0)) (idm)
->idm_entry.tqe_next->idm_entry.tqe_prev = (idm)->idm_entry
.tqe_prev; else (&env->sc_idms)->tqh_last = (idm)->
idm_entry.tqe_prev; *(idm)->idm_entry.tqe_prev = (idm)->
idm_entry.tqe_next; ; ; } while (0)
;
494 free(idm);
495 }
496}
497
498int
499main(int argc, char *argv[])
500{
501 int c;
502 int debug;
503 struct passwd *pw;
504 struct env env;
505 struct event ev_sigint;
506 struct event ev_sigterm;
507 struct event ev_sigchld;
508 struct event ev_sighup;
509 struct event ev_timer;
510 struct timeval tv;
511
512 debug = 0;
513 ypldap_process = PROC_MAIN;
514 log_procname = log_procnames[ypldap_process];
515
516 log_init(1);
517
518 while ((c = getopt(argc, argv, "dD:nf:v")) != -1) {
519 switch (c) {
520 case 'd':
521 debug = 2;
522 log_verbose(debug);
523 break;
524 case 'D':
525 if (cmdline_symset(optarg) < 0)
526 log_warnx("could not parse macro definition %s",
527 optarg);
528 break;
529 case 'n':
530 debug = 2;
531 opts |= YPLDAP_OPT_NOACTION0x02;
532 break;
533 case 'f':
534 conffile = optarg;
535 break;
536 case 'v':
537 opts |= YPLDAP_OPT_VERBOSE0x01;
538 break;
539 default:
540 usage();
541 }
542 }
543
544 argc -= optind;
545 argv += optind;
546
547 if (argc)
548 usage();
549
550 RB_INIT(&env.sc_user_uids)do { (&env.sc_user_uids)->rbh_root = ((void *)0); } while
(0)
;
551 RB_INIT(&env.sc_group_gids)do { (&env.sc_group_gids)->rbh_root = ((void *)0); } while
(0)
;
552
553 if (parse_config(&env, conffile, opts))
554 exit(1);
555 if (opts & YPLDAP_OPT_NOACTION0x02) {
556 fprintf(stderr(&__sF[2]), "configuration OK\n");
557 exit(0);
558 }
559
560 if (geteuid())
561 errx(1, "need root privileges");
562
563 log_init(debug);
564
565 if (!debug) {
566 if (daemon(1, 0) == -1)
567 err(1, "failed to daemonize");
568 }
569
570 log_info("startup%s", (debug > 1)?" [debug mode]":"");
571
572 if (socketpair(AF_UNIX1, SOCK_STREAM1 | SOCK_NONBLOCK0x4000, PF_UNSPEC0,
573 pipe_main2client) == -1)
574 fatal("socketpair");
575
576 client_pid = ldapclient(pipe_main2client);
577
578 setproctitle("parent");
579 event_init();
580
581 signal_set(&ev_sigint, SIGINT, main_sig_handler, &env)event_set(&ev_sigint, 2, 0x08|0x10, main_sig_handler, &
env)
;
582 signal_set(&ev_sigterm, SIGTERM, main_sig_handler, &env)event_set(&ev_sigterm, 15, 0x08|0x10, main_sig_handler, &
env)
;
583 signal_set(&ev_sighup, SIGHUP, main_sig_handler, &env)event_set(&ev_sighup, 1, 0x08|0x10, main_sig_handler, &
env)
;
584 signal_set(&ev_sigchld, SIGCHLD, main_sig_handler, &env)event_set(&ev_sigchld, 20, 0x08|0x10, main_sig_handler, &
env)
;
585 signal_add(&ev_sigint, NULL)event_add(&ev_sigint, ((void *)0));
586 signal_add(&ev_sigterm, NULL)event_add(&ev_sigterm, ((void *)0));
587 signal_add(&ev_sighup, NULL)event_add(&ev_sighup, ((void *)0));
588 signal_add(&ev_sigchld, NULL)event_add(&ev_sigchld, ((void *)0));
589
590 close(pipe_main2client[1]);
591 if ((env.sc_iev = calloc(1, sizeof(*env.sc_iev))) == NULL((void *)0))
592 fatal(NULL((void *)0));
593 imsg_init(&env.sc_iev->ibuf, pipe_main2client[0]);
594 env.sc_iev->handler = main_dispatch_client;
595
596 env.sc_iev->events = EV_READ0x02;
597 env.sc_iev->data = &env;
598 event_set(&env.sc_iev->ev, env.sc_iev->ibuf.fd, env.sc_iev->events,
599 env.sc_iev->handler, &env);
600 event_add(&env.sc_iev->ev, NULL((void *)0));
601
602 yp_init(&env);
603
604 if ((pw = getpwnam(YPLDAP_USER"_ypldap")) == NULL((void *)0))
605 fatal("getpwnam");
606
607#ifndef DEBUG
608 if (setgroups(1, &pw->pw_gid) ||
609 setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) ||
610 setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid))
611 fatal("cannot drop privileges");
612#else
613#warning disabling privilege revocation in debug mode
614#endif
615
616 if (pledge("stdio inet", NULL((void *)0)) == -1)
617 fatal("pledge");
618
619 memset(&tv, 0, sizeof(tv));
620 evtimer_set(&ev_timer, main_init_timer, &env)event_set(&ev_timer, -1, 0, main_init_timer, &env);
621 evtimer_add(&ev_timer, &tv)event_add(&ev_timer, &tv);
622
623 yp_enable_events();
624 event_dispatch();
625 main_shutdown();
626
627 return (0);
628}
629
630void
631imsg_event_add(struct imsgev *iev)
632{
633 if (iev->handler == NULL((void *)0)) {
634 imsg_flush(&iev->ibuf);
635 return;
636 }
637
638 iev->events = EV_READ0x02;
639 if (iev->ibuf.w.queued)
640 iev->events |= EV_WRITE0x04;
641
642 event_del(&iev->ev);
643 event_set(&iev->ev, iev->ibuf.fd, iev->events, iev->handler, iev->data);
644 event_add(&iev->ev, NULL((void *)0));
645}
646
647int
648imsg_compose_event(struct imsgev *iev, u_int16_t type, u_int32_t peerid,
649 pid_t pid, int fd, void *data, u_int16_t datalen)
650{
651 int ret;
652
653 if ((ret = imsg_compose(&iev->ibuf, type, peerid,
654 pid, fd, data, datalen)) != -1)
655 imsg_event_add(iev);
656 return (ret);
657}