adt.c revision 5405:f7a026c6d133
1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21/*
22 * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
23 * Use is subject to license terms.
24 */
25
26#pragma ident	"%Z%%M%	%I%	%E% SMI"
27
28#include <bsm/adt.h>
29#include <bsm/adt_event.h>
30#include <assert.h>
31#include <bsm/audit.h>
32#include <bsm/audit_record.h>
33#include <bsm/libbsm.h>
34#include <door.h>
35#include <errno.h>
36#include <generic.h>
37#include <md5.h>
38#include <sys/mkdev.h>
39#include <netdb.h>
40#include <nss_dbdefs.h>
41#include <pwd.h>
42#include <sys/stat.h>
43#include <time.h>
44#include <stdlib.h>
45#include <string.h>
46#include <synch.h>
47#include <sys/systeminfo.h>
48#include <syslog.h>
49#include <thread.h>
50#include <unistd.h>
51#include <adt_xlate.h>
52#include <adt_ucred.h>
53
54static int adt_selected(struct adt_event_state *, au_event_t, int);
55static int adt_init(adt_internal_state_t *, int);
56static int adt_import(adt_internal_state_t *, const adt_export_data_t *);
57static m_label_t *adt_ucred_label(ucred_t *);
58static void adt_setto_unaudited(adt_internal_state_t *);
59
60#ifdef C2_DEBUG
61#define	DPRINTF(x) {printf x; }
62#define	DFLUSH fflush(stdout);
63#else
64#define	DPRINTF(x)
65#define	DFLUSH
66#endif
67
68extern int _mutex_lock(mutex_t *);
69extern int _mutex_unlock(mutex_t *);
70
71static int auditstate = AUC_DISABLED;	/* default state */
72
73/*
74 * adt_write_syslog
75 *
76 * errors that are not the user's fault (bugs or whatever in
77 * the underlying audit code are noted in syslog.)
78 *
79 * Avoid calling adt_write_syslog for things that can happen
80 * at high volume.
81 *
82 * syslog's open (openlog) and close (closelog) are interesting;
83 * openlog *may* create a file descriptor and is optional.  closelog
84 * *will* close any open file descriptors and is also optional.
85 *
86 * Since syslog may also be used by the calling application, the
87 * choice is to avoid openlog, which sets some otherwise useful
88 * parameters, and to embed "Solaris_audit" in the log message.
89 */
90
91void
92adt_write_syslog(const char *message, int err)
93{
94	int	save_errno;
95	int	mask_priority;
96
97	save_errno = errno;
98	errno = err;
99
100	DPRINTF(("syslog called: %s\n", message));
101
102	mask_priority = setlogmask(LOG_MASK(LOG_ALERT));
103	syslog(LOG_ALERT, "Solaris_audit %s: %m", message, err);
104	(void) setlogmask(mask_priority);
105	errno = save_errno;
106}
107
108/*
109 * return true if audit is enabled.  "Enabled" is any state
110 * other than AUC_DISABLED.
111 *
112 * states are
113 *		AUC_INIT_AUDIT	-- c2audit queuing enabled.
114 *		AUC_AUDITING	-- up and running
115 *		AUC_DISABLED	-- no audit subsystem loaded
116 *		AUC_UNSET	-- early boot state
117 *		AUC_NOAUDIT	-- subsystem loaded, turned off via
118 *				   auditon(A_SETCOND...)
119 *		AUC_NOSPACE	-- up and running, but log partitions are full
120 *
121 *	For purpose of this API, anything but AUC_DISABLED or
122 *	AUC_UNSET is enabled; however one never actually sees
123 *	AUC_DISABLED since auditon returns EINVAL in that case.  Any
124 *	auditon error is considered the same as EINVAL for our
125 *	purpose.  auditstate is not changed by auditon if an error
126 *	is returned.
127 */
128
129boolean_t
130adt_audit_enabled(void) {
131
132	(void) auditon(A_GETCOND, (caddr_t)&auditstate, sizeof (auditstate));
133
134	return (auditstate != AUC_DISABLED);
135}
136
137/*
138 * The man page for getpwuid_r says the buffer must be big enough
139 * or ERANGE will be returned, but offers no guidance for how big
140 * the buffer should be or a way to calculate it.  If you get
141 * ERANGE, double pwd_buff's size.
142 *
143 * This may be called even when auditing is off.
144 */
145
146#define	NAFLAG_LEN 512
147
148static int
149adt_get_mask_from_user(uid_t uid, au_mask_t *mask)
150{
151	struct passwd	pwd;
152	char		pwd_buff[NSS_BUFSIZ];
153	char		naflag_buf[NAFLAG_LEN];
154
155	if (auditstate == AUC_DISABLED) {
156		mask->am_success = 0;
157		mask->am_failure = 0;
158	} else if (uid <= MAXUID) {
159		if (getpwuid_r(uid, &pwd, pwd_buff, NSS_BUFSIZ) == NULL) {
160			/*
161			 * getpwuid_r returns NULL without setting
162			 * errno if the user does not exist; only
163			 * if the input is the wrong length does it
164			 * set errno.
165			 */
166			if (errno != ERANGE)
167				errno = EINVAL;
168			return (-1);
169		}
170		if (au_user_mask(pwd.pw_name, mask)) {
171			errno = EFAULT; /* undetermined failure */
172			return (-1);
173		}
174	} else if (getacna(naflag_buf, NAFLAG_LEN - 1) == 0) {
175		if (getauditflagsbin(naflag_buf, mask))
176			return (-1);
177	} else {
178		return (-1);
179	}
180	return (0);
181}
182
183/*
184 * adt_get_unique_id -- generate a hopefully unique 32 bit value
185 *
186 * there will be a follow up to replace this with the use of /dev/random
187 *
188 * An MD5 hash is taken on a buffer of
189 *     hostname . audit id . unix time . pid . count
190 *
191 * "count = noise++;" is subject to a race condition but I don't
192 * see a need to put a lock around it.
193 */
194
195au_id_t
196adt_get_unique_id(au_id_t uid)
197{
198	char		hostname[MAXHOSTNAMELEN];
199	union {
200		au_id_t		v[4];
201		unsigned char	obuff[128/8];
202	} output;
203	MD5_CTX	context;
204
205	static int	noise = 0;
206
207	int		count = noise++;
208	time_t		timebits = time(NULL);
209	pid_t		pidbits = getpid();
210	au_id_t		retval = 0;
211
212	if (gethostname(hostname, MAXHOSTNAMELEN)) {
213		adt_write_syslog("gethostname call failed", errno);
214		(void) strncpy(hostname, "invalidHostName", MAXHOSTNAMELEN);
215	}
216
217	while (retval == 0) {  /* 0 is the only invalid result */
218		MD5Init(&context);
219
220		MD5Update(&context, (unsigned char *)hostname,
221		    (unsigned int) strlen((const char *)hostname));
222
223		MD5Update(&context, (unsigned char *) &uid, sizeof (uid_t));
224
225		MD5Update(&context,
226		    (unsigned char *) &timebits, sizeof (time_t));
227
228		MD5Update(&context, (unsigned char *) &pidbits,
229		    sizeof (pid_t));
230
231		MD5Update(&context, (unsigned char *) &(count), sizeof (int));
232		MD5Final(output.obuff, &context);
233
234		retval = output.v[count % 4];
235	}
236	return (retval);
237}
238
239/*
240 * the following "port" function deals with the following issues:
241 *
242 * 1    the kernel and ucred deal with a dev_t as a 64 bit value made
243 *      up from a 32 bit major and 32 bit minor.
244 * 2    User space deals with a dev_t as either the above 64 bit value
245 *      or a 32 bit value made from a 14 bit major and an 18 bit minor.
246 * 3    The various audit interfaces (except ucred) pass the 32 or
247 *      64 bit version depending the architecture of the userspace
248 *      application.  If you get a port value from ucred and pass it
249 *      to the kernel via auditon(), it must be squeezed into a 32
250 *      bit value because the kernel knows the userspace app's bit
251 *      size.
252 *
253 * The internal state structure for adt (adt_internal_state_t) uses
254 * dev_t, so adt converts data from ucred to fit.  The import/export
255 * functions, however, can't know if they are importing/exporting
256 * from 64 or 32 bit applications, so they always send 64 bits and
257 * the 32 bit end(s) are responsible to convert 32 -> 64 -> 32 as
258 * appropriate.
259 */
260
261/*
262 * adt_cpy_tid() -- if lib is 64 bit, just copy it (dev_t and port are
263 * both 64 bits).  If lib is 32 bits, squeeze the two-int port into
264 * a 32 bit dev_t.  A port fits in the "minor" part of au_port_t,
265 * so it isn't broken up into pieces.  (When it goes to the kernel
266 * and back, however, it will have been split into major/minor
267 * pieces.)
268 */
269
270static void
271adt_cpy_tid(au_tid_addr_t *dest, const au_tid64_addr_t *src)
272{
273#ifdef _LP64
274	(void) memcpy(dest, src, sizeof (au_tid_addr_t));
275#else
276	dest->at_type = src->at_type;
277
278	dest->at_port  = src->at_port.at_minor & MAXMIN32;
279	dest->at_port |= (src->at_port.at_major & MAXMAJ32) <<
280	    NBITSMINOR32;
281
282	(void) memcpy(dest->at_addr, src->at_addr, 4 * sizeof (uint32_t));
283#endif
284}
285
286/*
287 * adt_start_session -- create interface handle, create context
288 *
289 * The imported_state input is normally NULL, if not, it represents
290 * a continued session; its values obviate the need for a subsequent
291 * call to adt_set_user().
292 *
293 * The flag is used to decide how to set the initial state of the session.
294 * If 0, the session is "no audit" until a call to adt_set_user; if
295 * ADT_USE_PROC_DATA, the session is built from the process audit
296 * characteristics obtained from the kernel.  If imported_state is
297 * not NULL, the resulting audit mask is an OR of the current process
298 * audit mask and that passed in.
299 *
300 * The basic model is that the caller can use the pointer returned
301 * by adt_start_session whether or not auditing is enabled or an
302 * error was returned.  The functions that take the session handle
303 * as input generally return without doing anything if auditing is
304 * disabled.
305 */
306
307int
308adt_start_session(adt_session_data_t **new_session,
309    const adt_export_data_t *imported_state, adt_session_flags_t flags)
310{
311	adt_internal_state_t	*state;
312	adt_session_flags_t	flgmask = ADT_FLAGS_ALL;
313
314	*new_session = NULL;	/* assume failure */
315
316	/* ensure that auditstate is set */
317	(void) adt_audit_enabled();
318
319	if ((flags & ~flgmask) != 0) {
320		errno = EINVAL;
321		goto return_err;
322	}
323	state = calloc(1, sizeof (adt_internal_state_t));
324
325	if (state == NULL)
326		goto return_err;
327
328	if (adt_init(state, flags & ADT_USE_PROC_DATA) != 0)
329		goto return_err_free;    /* errno from adt_init() */
330
331	/*
332	 * The imported state overwrites the initial state if the
333	 * imported state represents a valid audit trail
334	 */
335
336	if (imported_state != NULL) {
337		if (adt_import(state, imported_state) != 0) {
338			goto return_err_free;
339		}
340	} else if (flags & ADT_USE_PROC_DATA) {
341		state->as_session_model = ADT_PROCESS_MODEL;
342	}
343	state->as_flags = flags;
344	DPRINTF(("(%d) Starting session id = %08X\n",
345	    getpid(), state->as_info.ai_asid));
346
347	if (state->as_audit_enabled) {
348		*new_session = (adt_session_data_t *)state;
349	} else {
350		free(state);
351	}
352
353	return (0);
354return_err_free:
355	free(state);
356return_err:
357	adt_write_syslog("audit session create failed", errno);
358	return (-1);
359}
360
361/*
362 * adt_get_asid() and adt_set_asid()
363 *
364 * if you use this interface, you are responsible to insure that the
365 * rest of the session data is populated correctly before calling
366 * adt_proccess_attr()
367 *
368 * neither of these are intended for general use and will likely
369 * remain private interfaces for a long time.  Forever is a long
370 * time.  In the case of adt_set_asid(), you should have a very,
371 * very good reason for setting your own session id.  The process
372 * audit characteristics are not changed by put, use adt_set_proc().
373 *
374 * These are "volatile" (more changable than "evolving") and will
375 * probably change in the S10 period.
376 */
377
378void
379adt_get_asid(const adt_session_data_t *session_data, au_asid_t *asid)
380{
381
382	if (session_data == NULL) {
383		*asid = 0;
384	} else {
385		assert(((adt_internal_state_t *)session_data)->as_check ==
386		    ADT_VALID);
387
388		*asid = ((adt_internal_state_t *)session_data)->as_info.ai_asid;
389	}
390}
391
392void
393adt_set_asid(const adt_session_data_t *session_data, const au_asid_t session_id)
394{
395
396	if (session_data != NULL) {
397		assert(((adt_internal_state_t *)session_data)->as_check ==
398		    ADT_VALID);
399
400		((adt_internal_state_t *)session_data)->as_have_user_data |=
401		    ADT_HAVE_ASID;
402		((adt_internal_state_t *)session_data)->as_info.ai_asid =
403		    session_id;
404	}
405}
406
407/*
408 * adt_get_auid() and adt_set_auid()
409 *
410 * neither of these are intended for general use and will likely
411 * remain private interfaces for a long time.  Forever is a long
412 * time.  In the case of adt_set_auid(), you should have a very,
413 * very good reason for setting your own audit id.  The process
414 * audit characteristics are not changed by put, use adt_set_proc().
415 */
416
417void
418adt_get_auid(const adt_session_data_t *session_data, au_id_t *auid)
419{
420
421	if (session_data == NULL) {
422		*auid = AU_NOAUDITID;
423	} else {
424		assert(((adt_internal_state_t *)session_data)->as_check ==
425		    ADT_VALID);
426
427		*auid = ((adt_internal_state_t *)session_data)->as_info.ai_auid;
428	}
429}
430
431void
432adt_set_auid(const adt_session_data_t *session_data, const au_id_t audit_id)
433{
434
435	if (session_data != NULL) {
436		assert(((adt_internal_state_t *)session_data)->as_check ==
437		    ADT_VALID);
438
439		((adt_internal_state_t *)session_data)->as_have_user_data |=
440		    ADT_HAVE_AUID;
441		((adt_internal_state_t *)session_data)->as_info.ai_auid =
442		    audit_id;
443	}
444}
445
446/*
447 * adt_get_termid(), adt_set_termid()
448 *
449 * if you use this interface, you are responsible to insure that the
450 * rest of the session data is populated correctly before calling
451 * adt_proccess_attr()
452 *
453 * The process  audit characteristics are not changed by put, use
454 * adt_set_proc().
455 */
456
457void
458adt_get_termid(const adt_session_data_t *session_data, au_tid_addr_t *termid)
459{
460
461	if (session_data == NULL) {
462		(void) memset(termid, 0, sizeof (au_tid_addr_t));
463		termid->at_type = AU_IPv4;
464	} else {
465		assert(((adt_internal_state_t *)session_data)->as_check ==
466		    ADT_VALID);
467
468		*termid =
469		    ((adt_internal_state_t *)session_data)->as_info.ai_termid;
470	}
471}
472
473void
474adt_set_termid(const adt_session_data_t *session_data,
475    const au_tid_addr_t *termid)
476{
477
478	if (session_data != NULL) {
479		assert(((adt_internal_state_t *)session_data)->as_check ==
480		    ADT_VALID);
481
482		((adt_internal_state_t *)session_data)->as_info.ai_termid =
483		    *termid;
484
485		((adt_internal_state_t *)session_data)->as_have_user_data |=
486		    ADT_HAVE_TID;
487	}
488}
489
490/*
491 * adt_get_mask(), adt_set_mask()
492 *
493 * if you use this interface, you are responsible to insure that the
494 * rest of the session data is populated correctly before calling
495 * adt_proccess_attr()
496 *
497 * The process  audit characteristics are not changed by put, use
498 * adt_set_proc().
499 */
500
501void
502adt_get_mask(const adt_session_data_t *session_data, au_mask_t *mask)
503{
504
505	if (session_data == NULL) {
506		mask->am_success = 0;
507		mask->am_failure = 0;
508	} else {
509		assert(((adt_internal_state_t *)session_data)->as_check ==
510		    ADT_VALID);
511
512		*mask = ((adt_internal_state_t *)session_data)->as_info.ai_mask;
513	}
514}
515
516void
517adt_set_mask(const adt_session_data_t *session_data, const au_mask_t *mask)
518{
519
520	if (session_data != NULL) {
521		assert(((adt_internal_state_t *)session_data)->as_check ==
522		    ADT_VALID);
523
524		((adt_internal_state_t *)session_data)->as_info.ai_mask = *mask;
525
526		((adt_internal_state_t *)session_data)->as_have_user_data |=
527		    ADT_HAVE_MASK;
528	}
529}
530
531/*
532 * helpers for adt_load_termid
533 */
534
535static void
536adt_do_ipv6_address(struct sockaddr_in6 *peer, struct sockaddr_in6 *sock,
537    au_tid_addr_t *termid)
538{
539
540	termid->at_port = ((peer->sin6_port<<16) | (sock->sin6_port));
541	termid->at_type = AU_IPv6;
542	(void) memcpy(termid->at_addr, &peer->sin6_addr, 4 * sizeof (uint_t));
543}
544
545static void
546adt_do_ipv4_address(struct sockaddr_in *peer, struct sockaddr_in *sock,
547    au_tid_addr_t *termid)
548{
549
550	termid->at_port = ((peer->sin_port<<16) | (sock->sin_port));
551
552	termid->at_type = AU_IPv4;
553	termid->at_addr[0] = (uint32_t)peer->sin_addr.s_addr;
554	(void) memset(&(termid->at_addr[1]), 0, 3 * sizeof (uint_t));
555}
556
557/*
558 * adt_load_termid:  convenience function; inputs file handle and
559 * outputs an au_tid_addr struct.
560 *
561 * This code was stolen from audit_settid.c; it differs from audit_settid()
562 * in that it does not write the terminal id to the process.
563 */
564
565int
566adt_load_termid(int fd, adt_termid_t **termid)
567{
568	au_tid_addr_t		*p_term;
569	struct sockaddr_in6	peer;
570	struct sockaddr_in6	sock;
571	int			peerlen = sizeof (peer);
572	int			socklen = sizeof (sock);
573
574	*termid = NULL;
575
576	/* get peer name if its a socket, else assume local terminal */
577
578	if (getpeername(fd, (struct sockaddr *)&peer, (socklen_t *)&peerlen)
579	    < 0) {
580		if (errno == ENOTSOCK)
581			return (adt_load_hostname(NULL, termid));
582		goto return_err;
583	}
584
585	if ((p_term = calloc(1, sizeof (au_tid_addr_t))) == NULL)
586		goto return_err;
587
588	/* get sock name */
589	if (getsockname(fd, (struct sockaddr *)&sock,
590	    (socklen_t *)&socklen) < 0)
591		goto return_err_free;
592
593	if (peer.sin6_family == AF_INET6) {
594		adt_do_ipv6_address(&peer, &sock, p_term);
595	} else {
596		adt_do_ipv4_address((struct sockaddr_in *)&peer,
597		    (struct sockaddr_in *)&sock, p_term);
598	}
599	*termid = (adt_termid_t *)p_term;
600
601	return (0);
602
603return_err_free:
604	free(p_term);
605return_err:
606	return (-1);
607}
608
609static boolean_t
610adt_have_termid(au_tid_addr_t *dest)
611{
612	struct auditinfo_addr	audit_data;
613
614	if (getaudit_addr(&audit_data, sizeof (audit_data)) < 0) {
615		adt_write_syslog("getaudit failed", errno);
616		return (B_FALSE);
617	}
618
619	if ((audit_data.ai_termid.at_type == 0) ||
620	    (audit_data.ai_termid.at_addr[0] |
621	    audit_data.ai_termid.at_addr[1]  |
622	    audit_data.ai_termid.at_addr[2]  |
623	    audit_data.ai_termid.at_addr[3]) == 0)
624		return (B_FALSE);
625
626	(void) memcpy(dest, &(audit_data.ai_termid),
627	    sizeof (au_tid_addr_t));
628
629	return (B_TRUE);
630}
631
632static int
633adt_get_hostIP(const char *hostname, au_tid_addr_t *p_term)
634{
635	struct addrinfo	*ai;
636	void		*p;
637
638	if (getaddrinfo(hostname, NULL, NULL, &ai) != 0)
639		return (-1);
640
641	switch (ai->ai_family) {
642		case AF_INET:
643			/* LINTED */
644			p = &((struct sockaddr_in *)ai->ai_addr)->sin_addr;
645			(void) memcpy(p_term->at_addr, p,
646			    sizeof (((struct sockaddr_in *)NULL)->sin_addr));
647			p_term->at_type = AU_IPv4;
648			break;
649		case AF_INET6:
650			/* LINTED */
651			p = &((struct sockaddr_in6 *)ai->ai_addr)->sin6_addr,
652			    (void) memcpy(p_term->at_addr, p,
653			    sizeof (((struct sockaddr_in6 *)NULL)->sin6_addr));
654			p_term->at_type = AU_IPv6;
655			break;
656		default:
657			return (-1);
658	}
659
660	freeaddrinfo(ai);
661
662	return (0);
663}
664
665/*
666 * adt_load_hostname() is called when the caller does not have a file
667 * handle that gives access to the socket info or any other way to
668 * pass in both port and ip address.  The hostname input is ignored if
669 * the terminal id has already been set; instead it returns the
670 * existing terminal id.
671 *
672 * If audit is off and the hostname lookup fails, no error is
673 * returned, since an error may be interpreted by the caller
674 * as grounds for denying a login.  Otherwise the caller would
675 * need to be aware of the audit state.
676 */
677
678int
679adt_load_hostname(const char *hostname, adt_termid_t **termid)
680{
681	char		localhost[ADT_STRING_MAX + 1];
682	au_tid_addr_t	*p_term;
683
684	*termid = NULL;
685
686	if (!adt_audit_enabled())
687		return (0);
688
689	if ((p_term = calloc(1, sizeof (au_tid_addr_t))) == NULL)
690		goto return_err;
691
692	if (adt_have_termid(p_term)) {
693		*termid = (adt_termid_t *)p_term;
694		return (0);
695	}
696	p_term->at_port = 0;
697
698	if (hostname == NULL || *hostname == '\0') {
699		(void) sysinfo(SI_HOSTNAME, localhost, ADT_STRING_MAX);
700		hostname = localhost;
701	}
702	if (adt_get_hostIP(hostname, p_term))
703		goto return_err_free;
704
705	*termid = (adt_termid_t *)p_term;
706	return (0);
707
708return_err_free:
709	free(p_term);
710
711return_err:
712	if ((auditstate == AUC_DISABLED) ||
713	    (auditstate == AUC_NOAUDIT))
714		return (0);
715
716	return (-1);
717}
718
719/*
720 * adt_load_ttyname() is called when the caller does not have a file
721 * handle that gives access to the local terminal or any other way
722 * of determining the device id.  The ttyname input is ignored if
723 * the terminal id has already been set; instead it returns the
724 * existing terminal id.
725 *
726 * If audit is off and the ttyname lookup fails, no error is
727 * returned, since an error may be interpreted by the caller
728 * as grounds for denying a login.  Otherwise the caller would
729 * need to be aware of the audit state.
730 */
731
732int
733adt_load_ttyname(const char *ttyname, adt_termid_t **termid)
734{
735	char		localhost[ADT_STRING_MAX + 1];
736	au_tid_addr_t	*p_term;
737	struct stat	stat_buf;
738
739	*termid = NULL;
740
741	if (!adt_audit_enabled())
742		return (0);
743
744	if ((p_term = calloc(1, sizeof (au_tid_addr_t))) == NULL)
745		goto return_err;
746
747	if (adt_have_termid(p_term)) {
748		*termid = (adt_termid_t *)p_term;
749		return (0);
750	}
751
752	p_term->at_port = 0;
753
754	if (sysinfo(SI_HOSTNAME, localhost, ADT_STRING_MAX) < 0)
755		goto return_err_free; /* errno from sysinfo */
756
757	if (ttyname != NULL) {
758		if (stat(ttyname, &stat_buf) < 0)
759			goto return_err_free;
760
761		p_term->at_port = stat_buf.st_rdev;
762	}
763
764	if (adt_get_hostIP(localhost, p_term))
765		goto return_err_free;
766
767	*termid = (adt_termid_t *)p_term;
768	return (0);
769
770return_err_free:
771	free(p_term);
772
773return_err:
774	if ((auditstate == AUC_DISABLED) ||
775	    (auditstate == AUC_NOAUDIT))
776		return (0);
777
778	return (-1);
779}
780
781/*
782 * adt_get_session_id returns a stringified representation of
783 * the audit session id.  See also adt_get_asid() for how to
784 * get the unexpurgated version.  No guarantees as to how long
785 * the returned string will be or its general form; hex for now.
786 *
787 * An empty string is returned if auditing is off; length = 1
788 * and the pointer is valid.
789 *
790 * returns strlen + 1 if buffer is valid; else 0 and errno.
791 */
792
793size_t
794adt_get_session_id(const adt_session_data_t *session_data, char **buff)
795{
796	au_asid_t	session_id;
797	size_t		length;
798	/*
799	 * output is 0x followed by
800	 * two characters per byte
801	 * plus terminator,
802	 * except leading 0's are suppressed, so a few bytes may
803	 * be unused.
804	 */
805	length = 2 + (2 * sizeof (session_id)) + 1;
806	*buff = malloc(length);
807
808	if (*buff == NULL) {
809		return (0);
810	}
811	if (session_data == NULL) { /* NULL is not an error */
812		**buff = '\0';
813		return (1);
814	}
815	adt_get_asid(session_data, &session_id);
816
817	length = snprintf(*buff, length, "0x%X", (int)session_id);
818
819	/* length < 1 is a bug: the session data type may have changed */
820	assert(length > 0);
821
822	return (length);
823}
824
825/*
826 * adt_end_session -- close handle, clear context
827 *
828 * if as_check is invalid, no harm, no foul, EXCEPT that this could
829 * be an attempt to free data already free'd, so output to syslog
830 * to help explain why the process cored dumped.
831 */
832
833int
834adt_end_session(adt_session_data_t *session_data)
835{
836	adt_internal_state_t	*state;
837
838	if (session_data != NULL) {
839		state = (adt_internal_state_t *)session_data;
840		if (state->as_check != ADT_VALID) {
841			adt_write_syslog("freeing invalid data", EINVAL);
842		} else {
843			state->as_check = 0;
844			m_label_free(state->as_label);
845			free(session_data);
846		}
847	}
848	/* no errors yet defined */
849	return (0);
850}
851
852/*
853 * adt_dup_session -- copy the session data
854 */
855
856int
857adt_dup_session(const adt_session_data_t *source, adt_session_data_t **dest)
858{
859	adt_internal_state_t	*source_state;
860	adt_internal_state_t	*dest_state = NULL;
861	int			rc = 0;
862
863	if (source != NULL) {
864		source_state = (adt_internal_state_t *)source;
865		assert(source_state->as_check == ADT_VALID);
866
867		dest_state = malloc(sizeof (adt_internal_state_t));
868		if (dest_state == NULL) {
869			rc = -1;
870			goto return_rc;
871		}
872		(void) memcpy(dest_state, source,
873		    sizeof (struct adt_internal_state));
874
875		if (source_state->as_label != NULL) {
876			dest_state->as_label = NULL;
877			if ((rc = m_label_dup(&dest_state->as_label,
878			    source_state->as_label)) != 0) {
879				free(dest_state);
880				dest_state = NULL;
881			}
882		}
883	}
884return_rc:
885	*dest = (adt_session_data_t *)dest_state;
886	return (rc);
887}
888
889/*
890 * from_export_format()
891 * read from a network order buffer into struct adt_session_data
892 */
893
894static size_t
895adt_from_export_format(adt_internal_state_t *internal,
896    const adt_export_data_t *external)
897{
898	struct export_header	head;
899	struct export_link	link;
900	adr_t			context;
901	int32_t 		offset;
902	int32_t 		length;
903	int32_t 		version;
904	size_t			label_len;
905	char			*p = (char *)external;
906
907	adrm_start(&context, (char *)external);
908	adrm_int32(&context, (int *)&head, 4);
909
910	if ((internal->as_check = head.ax_check) != ADT_VALID) {
911		errno = EINVAL;
912		return (0);
913	}
914	offset = head.ax_link.ax_offset;
915	version = head.ax_link.ax_version;
916	length = head.ax_buffer_length;
917
918	/*
919	 * Skip newer versions.
920	 */
921	while (version > PROTOCOL_VERSION_2) {
922		if (offset < 1) {
923			return (0);	/* failed to match version */
924		}
925		p += offset;		/* point to next version # */
926
927		if (p > (char *)external + length) {
928			return (0);
929		}
930		adrm_start(&context, p);
931		adrm_int32(&context, (int *)&link, 2);
932		offset = link.ax_offset;
933		version = link.ax_version;
934		assert(version != 0);
935	}
936	/*
937	 * Adjust buffer pointer to the first data item (euid).
938	 */
939	if (p == (char *)external) {
940		adrm_start(&context, (char *)(p + sizeof (head)));
941	} else {
942		adrm_start(&context, (char *)(p + sizeof (link)));
943	}
944	/*
945	 * if down rev version, neither pid nor label are included
946	 * in v1 ax_size_of_tsol_data intentionally ignored
947	 */
948	if (version == PROTOCOL_VERSION_1) {
949		adrm_int32(&context, (int *)&(internal->as_euid), 1);
950		adrm_int32(&context, (int *)&(internal->as_ruid), 1);
951		adrm_int32(&context, (int *)&(internal->as_egid), 1);
952		adrm_int32(&context, (int *)&(internal->as_rgid), 1);
953		adrm_int32(&context, (int *)&(internal->as_info.ai_auid), 1);
954		adrm_int32(&context,
955		    (int *)&(internal->as_info.ai_mask.am_success), 2);
956		adrm_int32(&context,
957		    (int *)&(internal->as_info.ai_termid.at_port), 1);
958		adrm_int32(&context,
959		    (int *)&(internal->as_info.ai_termid.at_type), 1);
960		adrm_int32(&context,
961		    (int *)&(internal->as_info.ai_termid.at_addr[0]), 4);
962		adrm_int32(&context, (int *)&(internal->as_info.ai_asid), 1);
963		adrm_int32(&context, (int *)&(internal->as_audit_enabled), 1);
964		internal->as_pid = (pid_t)-1;
965		internal->as_label = NULL;
966	} else if (version == PROTOCOL_VERSION_2) {
967		adrm_int32(&context, (int *)&(internal->as_euid), 1);
968		adrm_int32(&context, (int *)&(internal->as_ruid), 1);
969		adrm_int32(&context, (int *)&(internal->as_egid), 1);
970		adrm_int32(&context, (int *)&(internal->as_rgid), 1);
971		adrm_int32(&context, (int *)&(internal->as_info.ai_auid), 1);
972		adrm_int32(&context,
973		    (int *)&(internal->as_info.ai_mask.am_success), 2);
974		adrm_int32(&context,
975		    (int *)&(internal->as_info.ai_termid.at_port), 1);
976		adrm_int32(&context,
977		    (int *)&(internal->as_info.ai_termid.at_type), 1);
978		adrm_int32(&context,
979		    (int *)&(internal->as_info.ai_termid.at_addr[0]), 4);
980		adrm_int32(&context, (int *)&(internal->as_info.ai_asid), 1);
981		adrm_int32(&context, (int *)&(internal->as_audit_enabled), 1);
982		adrm_int32(&context, (int *)&(internal->as_pid), 1);
983		adrm_int32(&context, (int *)&label_len, 1);
984		if (label_len > 0) {
985			/* read in and deal with different sized labels. */
986			size_t	my_label_len = blabel_size();
987
988			if ((internal->as_label =
989			    m_label_alloc(MAC_LABEL)) == NULL) {
990				return (0);
991			}
992			if (label_len > my_label_len) {
993				errno = EINVAL;
994				m_label_free(internal->as_label);
995				return (0);
996			}
997			(void) memset(internal->as_label, 0, my_label_len);
998			adrm_int32(&context, (int *)(internal->as_label),
999			    label_len / sizeof (int32_t));
1000		} else {
1001			internal->as_label = NULL;
1002		}
1003	}
1004
1005	return (length);
1006}
1007
1008/*
1009 * adt_to_export_format
1010 * read from struct adt_session_data into a network order buffer.
1011 *
1012 * (network order 'cause this data may be shared with a remote host.)
1013 */
1014
1015static size_t
1016adt_to_export_format(adt_export_data_t *external,
1017    adt_internal_state_t *internal)
1018{
1019	struct export_header	head;
1020	struct export_link	tail;
1021	adr_t			context;
1022	size_t			label_len = 0;
1023
1024	adrm_start(&context, (char *)external);
1025
1026	if (internal->as_label != NULL) {
1027		label_len = blabel_size();
1028	}
1029
1030	head.ax_check = ADT_VALID;
1031	head.ax_buffer_length = sizeof (struct adt_export_data) + label_len;
1032
1033	/* version 2 first */
1034
1035	head.ax_link.ax_version = PROTOCOL_VERSION_2;
1036	head.ax_link.ax_offset = sizeof (struct export_header) +
1037	    sizeof (struct adt_export_v2) + label_len;
1038
1039	adrm_putint32(&context, (int *)&head, 4);
1040
1041	adrm_putint32(&context, (int *)&(internal->as_euid), 1);
1042	adrm_putint32(&context, (int *)&(internal->as_ruid), 1);
1043	adrm_putint32(&context, (int *)&(internal->as_egid), 1);
1044	adrm_putint32(&context, (int *)&(internal->as_rgid), 1);
1045	adrm_putint32(&context, (int *)&(internal->as_info.ai_auid), 1);
1046	adrm_putint32(&context,
1047	    (int *)&(internal->as_info.ai_mask.am_success), 2);
1048	adrm_putint32(&context,
1049	    (int *)&(internal->as_info.ai_termid.at_port), 1);
1050	adrm_putint32(&context,
1051	    (int *)&(internal->as_info.ai_termid.at_type), 1);
1052	adrm_putint32(&context,
1053	    (int *)&(internal->as_info.ai_termid.at_addr[0]), 4);
1054	adrm_putint32(&context, (int *)&(internal->as_info.ai_asid), 1);
1055	adrm_putint32(&context, (int *)&(internal->as_audit_enabled), 1);
1056	adrm_putint32(&context, (int *)&(internal->as_pid), 1);
1057	adrm_putint32(&context, (int *)&label_len, 1);
1058	if (internal->as_label != NULL) {
1059		/* serialize the label */
1060		adrm_putint32(&context, (int *)(internal->as_label),
1061		    (label_len / sizeof (int32_t)));
1062	}
1063
1064	/* now version 1 */
1065
1066	tail.ax_version = PROTOCOL_VERSION_1;
1067	tail.ax_offset = 0;
1068
1069	adrm_putint32(&context, (int *)&tail, 2);
1070
1071	adrm_putint32(&context, (int *)&(internal->as_euid), 1);
1072	adrm_putint32(&context, (int *)&(internal->as_ruid), 1);
1073	adrm_putint32(&context, (int *)&(internal->as_egid), 1);
1074	adrm_putint32(&context, (int *)&(internal->as_rgid), 1);
1075	adrm_putint32(&context, (int *)&(internal->as_info.ai_auid), 1);
1076	adrm_putint32(&context,
1077	    (int *)&(internal->as_info.ai_mask.am_success), 2);
1078	adrm_putint32(&context,
1079	    (int *)&(internal->as_info.ai_termid.at_port), 1);
1080	adrm_putint32(&context,
1081	    (int *)&(internal->as_info.ai_termid.at_type), 1);
1082	adrm_putint32(&context,
1083	    (int *)&(internal->as_info.ai_termid.at_addr[0]), 4);
1084	adrm_putint32(&context, (int *)&(internal->as_info.ai_asid), 1);
1085	adrm_putint32(&context, (int *)&(internal->as_audit_enabled), 1);
1086	/* ignored in v1 */
1087	adrm_putint32(&context, (int *)&label_len, 1);
1088
1089	/* finally terminator */
1090
1091	tail.ax_version = 0; /* invalid version number */
1092	tail.ax_offset = 0;
1093
1094	adrm_putint32(&context, (int *)&tail, 2);
1095
1096	return (head.ax_buffer_length);
1097}
1098
1099
1100/*
1101 * adt_import_proc() is used by a server acting on behalf
1102 * of a client which has connected via an ipc mechanism such as
1103 * a door.
1104 *
1105 * Since the interface is via ucred, the info.ap_termid.port
1106 * value is always the 64 bit version.  What is stored depends
1107 * on how libbsm is compiled.
1108 */
1109
1110size_t
1111adt_import_proc(pid_t pid, uid_t euid, gid_t egid, uid_t ruid, gid_t rgid,
1112    adt_export_data_t **external)
1113{
1114	size_t			length = 0;
1115	adt_internal_state_t	*state;
1116	ucred_t			*ucred;
1117	const au_tid64_addr_t	*tid;
1118
1119	state = calloc(1, sizeof (adt_internal_state_t));
1120
1121	if (state == NULL)
1122		return (0);
1123
1124	if (adt_init(state, 0) != 0)
1125		goto return_length_free;    /* errno from adt_init() */
1126
1127	/*
1128	 * ucred_getauid() returns AU_NOAUDITID if audit is off, which
1129	 * is the right answer for adt_import_proc().
1130	 *
1131	 * Create a local context as near as possible.
1132	 */
1133
1134	ucred = ucred_get(pid);
1135
1136	if (ucred == NULL)
1137		goto return_length_free;
1138
1139	state->as_ruid = ruid != ADT_NO_CHANGE ? ruid : ucred_getruid(ucred);
1140	state->as_euid = euid != ADT_NO_CHANGE ? euid : ucred_geteuid(ucred);
1141	state->as_rgid = rgid != ADT_NO_CHANGE ? rgid : ucred_getrgid(ucred);
1142	state->as_egid = egid != ADT_NO_CHANGE ? egid : ucred_getegid(ucred);
1143
1144	state->as_info.ai_auid = ucred_getauid(ucred);
1145
1146	if (state->as_info.ai_auid == AU_NOAUDITID) {
1147		state->as_info.ai_asid = adt_get_unique_id(ruid);
1148
1149		if (adt_get_mask_from_user(ruid, &(state->as_info.ai_mask)))
1150			goto return_all_free;
1151	} else {
1152		const au_mask_t *mask = ucred_getamask(ucred);
1153
1154		if (mask != NULL)
1155			state->as_info.ai_mask = *mask;
1156		else
1157			goto return_all_free;
1158
1159		state->as_info.ai_asid = ucred_getasid(ucred);
1160	}
1161
1162	tid = ucred_getatid(ucred);
1163
1164	if (tid != NULL) {
1165		adt_cpy_tid(&(state->as_info.ai_termid), tid);
1166	} else {
1167		(void) memset((void *)&(state->as_info.ai_termid), 0,
1168		    sizeof (au_tid_addr_t));
1169		state->as_info.ai_termid.at_type = AU_IPv4;
1170	}
1171
1172	DPRINTF(("import_proc/asid = %X %u\n", state->as_info.ai_asid,
1173	    state->as_info.ai_asid));
1174
1175	DPRINTF(("import_proc/masks = %X %X\n",
1176	    state->as_info.ai_mask.am_success,
1177	    state->as_info.ai_mask.am_failure));
1178
1179	if (state->as_label == NULL) {
1180		*external = malloc(sizeof (adt_export_data_t));
1181	} else {
1182		*external = malloc(sizeof (adt_export_data_t) + blabel_size());
1183	}
1184
1185	if (*external == NULL)
1186		goto return_all_free;
1187
1188	length = adt_to_export_format(*external, state);
1189	/*
1190	 * yes, state is supposed to be free'd for both pass and fail
1191	 */
1192return_all_free:
1193	ucred_free(ucred);
1194return_length_free:
1195	free(state);
1196	return (length);
1197}
1198
1199/*
1200 * adt_ucred_label() -- if label is available, duplicate it.
1201 */
1202
1203static m_label_t *
1204adt_ucred_label(ucred_t *uc)
1205{
1206	m_label_t	*ul = NULL;
1207
1208	if (ucred_getlabel(uc) != NULL) {
1209		(void) m_label_dup(&ul, ucred_getlabel(uc));
1210	}
1211
1212	return (ul);
1213}
1214
1215/*
1216 * adt_import() -- convert from network order to machine-specific order
1217 */
1218
1219static int
1220adt_import(adt_internal_state_t *internal, const adt_export_data_t *external)
1221{
1222	au_mask_t mask;
1223
1224	/* save local audit enabled state */
1225	int	local_audit_enabled = internal->as_audit_enabled;
1226
1227	if (adt_from_export_format(internal, external) < 1)
1228		return (-1); /* errno from adt_from_export_format */
1229
1230	/*
1231	 * If audit isn't enabled on the remote, they were unable
1232	 * to generate the audit mask, so generate it based on
1233	 * local configuration.  If the user id has changed, the
1234	 * resulting mask may miss some subtleties that occurred
1235	 * on the remote system.
1236	 *
1237	 * If the remote failed to generate a terminal id, it is not
1238	 * recoverable.
1239	 */
1240
1241	if (!internal->as_audit_enabled) {
1242		if (adt_get_mask_from_user(internal->as_info.ai_auid,
1243		    &(internal->as_info.ai_mask)))
1244			return (-1);
1245		if (internal->as_info.ai_auid != internal->as_ruid) {
1246			if (adt_get_mask_from_user(internal->as_info.ai_auid,
1247			    &mask))
1248				return (-1);
1249			internal->as_info.ai_mask.am_success |=
1250			    mask.am_success;
1251			internal->as_info.ai_mask.am_failure |=
1252			    mask.am_failure;
1253		}
1254	}
1255	internal->as_audit_enabled = local_audit_enabled;
1256
1257	DPRINTF(("(%d)imported asid = %X %u\n", getpid(),
1258	    internal->as_info.ai_asid,
1259	    internal->as_info.ai_asid));
1260
1261	internal->as_have_user_data = ADT_HAVE_ALL;
1262
1263	return (0);
1264}
1265
1266/*
1267 * adt_export_session_data()
1268 * copies a adt_session_data struct into a network order buffer
1269 *
1270 * In a misconfigured network, the local host may have auditing
1271 * off while the destination may have auditing on, so if there
1272 * is sufficient memory, a buffer will be returned even in the
1273 * audit off case.
1274 */
1275
1276size_t
1277adt_export_session_data(const adt_session_data_t *internal,
1278    adt_export_data_t **external)
1279{
1280	size_t			length = 0;
1281
1282	if ((internal != NULL) &&
1283	    ((adt_internal_state_t *)internal)->as_label != NULL) {
1284		length = blabel_size();
1285	}
1286
1287	*external = malloc(sizeof (adt_export_data_t) + length);
1288
1289	if (*external == NULL)
1290		return (0);
1291
1292	if (internal == NULL) {
1293		adt_internal_state_t	*dummy;
1294
1295		dummy = malloc(sizeof (adt_internal_state_t));
1296		if (dummy == NULL)
1297			goto return_length_free;
1298
1299		if (adt_init(dummy, 0)) { /* 0 == don't copy from proc */
1300			free(dummy);
1301			goto return_length_free;
1302		}
1303		length = adt_to_export_format(*external, dummy);
1304		free(dummy);
1305	} else {
1306		length = adt_to_export_format(*external,
1307		    (adt_internal_state_t *)internal);
1308	}
1309	return (length);
1310
1311return_length_free:
1312	free(*external);
1313	*external = NULL;
1314	return (0);
1315}
1316
1317static void
1318adt_setto_unaudited(adt_internal_state_t *state)
1319{
1320	state->as_ruid = AU_NOAUDITID;
1321	state->as_euid = AU_NOAUDITID;
1322	state->as_rgid = AU_NOAUDITID;
1323	state->as_egid = AU_NOAUDITID;
1324	state->as_pid = (pid_t)-1;
1325	state->as_label = NULL;
1326
1327	if (state->as_audit_enabled) {
1328		state->as_info.ai_asid = 0;
1329		state->as_info.ai_auid = AU_NOAUDITID;
1330
1331		(void) memset((void *)&(state->as_info.ai_termid), 0,
1332		    sizeof (au_tid_addr_t));
1333		state->as_info.ai_termid.at_type = AU_IPv4;
1334
1335		(void) memset((void *)&(state->as_info.ai_mask), 0,
1336		    sizeof (au_mask_t));
1337		state->as_have_user_data = 0;
1338	}
1339}
1340
1341/*
1342 * adt_init -- set session context by copying the audit characteristics
1343 * from the proc and picking up current uid/tid information.
1344 *
1345 * By default, an audit session is based on the process; the default
1346 * is overriden by adt_set_user()
1347 */
1348
1349static int
1350adt_init(adt_internal_state_t *state, int use_proc_data)
1351{
1352
1353	state->as_audit_enabled = (auditstate == AUC_DISABLED) ? 0 : 1;
1354
1355	if (use_proc_data) {
1356		state->as_ruid = getuid();
1357		state->as_euid = geteuid();
1358		state->as_rgid = getgid();
1359		state->as_egid = getegid();
1360		state->as_pid = getpid();
1361
1362		if (state->as_audit_enabled) {
1363			const au_tid64_addr_t	*tid;
1364			const au_mask_t		*mask;
1365			ucred_t			*ucred = ucred_get(P_MYID);
1366
1367			/*
1368			 * Even if the ucred is NULL, the underlying
1369			 * credential may have a valid terminal id; if the
1370			 * terminal id is set, then that's good enough.  An
1371			 * example of where this matters is failed login,
1372			 * where rlogin/telnet sets the terminal id before
1373			 * calling login; login does not load the credential
1374			 * since auth failed.
1375			 */
1376			if (ucred == NULL) {
1377				if (!adt_have_termid(
1378				    &(state->as_info.ai_termid)))
1379					return (-1);
1380			} else {
1381				mask = ucred_getamask(ucred);
1382				if (mask != NULL) {
1383					state->as_info.ai_mask = *mask;
1384				} else {
1385					ucred_free(ucred);
1386					return (-1);
1387				}
1388				tid = ucred_getatid(ucred);
1389				if (tid != NULL) {
1390					adt_cpy_tid(&(state->as_info.ai_termid),
1391					    tid);
1392				} else {
1393					ucred_free(ucred);
1394					return (-1);
1395				}
1396				state->as_info.ai_asid = ucred_getasid(ucred);
1397				state->as_info.ai_auid = ucred_getauid(ucred);
1398				state->as_label = adt_ucred_label(ucred);
1399				ucred_free(ucred);
1400			}
1401			state->as_have_user_data = ADT_HAVE_ALL;
1402		}
1403	} else {
1404		adt_setto_unaudited(state);
1405	}
1406	state->as_session_model = ADT_SESSION_MODEL;	/* default */
1407
1408	if (state->as_audit_enabled &&
1409	    auditon(A_GETPOLICY, (caddr_t)&(state->as_kernel_audit_policy),
1410	    sizeof (state->as_kernel_audit_policy))) {
1411		return (-1);  /* errno set by auditon */
1412	}
1413	state->as_check = ADT_VALID;
1414	return (0);
1415}
1416
1417/*
1418 * adt_set_proc
1419 *
1420 * Copy the current session state to the process.  If this function
1421 * is called, the model becomes a process model rather than a
1422 * session model.
1423 *
1424 * In the current implementation, the value state->as_have_user_data
1425 * must contain all of: ADT_HAVE_{AUID,MASK,TID,ASID}.  These are all set
1426 * by adt_set_user() when the ADT_SETTID or ADT_NEW flag is passed in.
1427 *
1428 */
1429
1430int
1431adt_set_proc(const adt_session_data_t *session_data)
1432{
1433	int			rc;
1434	adt_internal_state_t	*state;
1435
1436	if (auditstate == AUC_DISABLED || (session_data == NULL))
1437		return (0);
1438
1439	state = (adt_internal_state_t *)session_data;
1440
1441	assert(state->as_check == ADT_VALID);
1442
1443	if ((state->as_have_user_data & (ADT_HAVE_ALL & ~ADT_HAVE_IDS)) !=
1444	    (ADT_HAVE_ALL & ~ADT_HAVE_IDS)) {
1445		errno = EINVAL;
1446		goto return_err;
1447	}
1448
1449	rc = setaudit_addr((auditinfo_addr_t *)&(state->as_info),
1450	    sizeof (auditinfo_addr_t));
1451
1452	if (rc < 0)
1453		goto return_err;	/* errno set by setaudit_addr() */
1454
1455	state->as_session_model = ADT_PROCESS_MODEL;
1456
1457	return (0);
1458
1459return_err:
1460	adt_write_syslog("failed to set process audit characteristics", errno);
1461	return (-1);
1462}
1463
1464static int
1465adt_newuser(adt_internal_state_t *state, uid_t ruid, au_tid_addr_t *termid)
1466{
1467	au_tid_addr_t	no_tid = {0, AU_IPv4, 0, 0, 0, 0};
1468	au_mask_t	no_mask = {0, 0};
1469
1470	if (ruid == ADT_NO_AUDIT) {
1471		state->as_info.ai_auid = AU_NOAUDITID;
1472		state->as_info.ai_asid = 0;
1473		state->as_info.ai_termid = no_tid;
1474		state->as_info.ai_mask = no_mask;
1475		return (0);
1476	}
1477	state->as_info.ai_auid = ruid;
1478	state->as_info.ai_asid = adt_get_unique_id(ruid);
1479	if (termid != NULL)
1480		state->as_info.ai_termid = *termid;
1481
1482	if (adt_get_mask_from_user(ruid, &(state->as_info.ai_mask)))
1483		return (-1);
1484
1485	/* Assume intending to audit as this process */
1486
1487	if (state->as_pid == (pid_t)-1)
1488		state->as_pid = getpid();
1489
1490	if (is_system_labeled() && state->as_label == NULL) {
1491		ucred_t	*ucred = ucred_get(P_MYID);
1492
1493		state->as_label = adt_ucred_label(ucred);
1494		ucred_free(ucred);
1495	}
1496
1497	return (0);
1498}
1499
1500static int
1501adt_changeuser(adt_internal_state_t *state, uid_t ruid)
1502{
1503	au_mask_t		mask;
1504
1505	if (!(state->as_have_user_data & ADT_HAVE_AUID))
1506		state->as_info.ai_auid = ruid;
1507	if (!(state->as_have_user_data & ADT_HAVE_ASID))
1508		state->as_info.ai_asid = adt_get_unique_id(ruid);
1509
1510	if (ruid <= MAXEPHUID) {
1511		if (adt_get_mask_from_user(ruid, &mask))
1512			return (-1);
1513
1514		state->as_info.ai_mask.am_success |= mask.am_success;
1515		state->as_info.ai_mask.am_failure |= mask.am_failure;
1516	}
1517	DPRINTF(("changed mask to %08X/%08X for ruid=%d\n",
1518	    state->as_info.ai_mask.am_success,
1519	    state->as_info.ai_mask.am_failure,
1520	    ruid));
1521	return (0);
1522}
1523
1524/*
1525 * adt_set_user -- see also adt_set_from_ucred()
1526 *
1527 * ADT_NO_ATTRIB is a valid uid/gid meaning "not known" or
1528 * "unattributed."  If ruid, change the model to session.
1529 *
1530 * ADT_NO_CHANGE is a valid uid/gid meaning "do not change this value"
1531 * only valid with ADT_UPDATE.
1532 *
1533 * ADT_NO_AUDIT is the external equivalent to AU_NOAUDITID -- there
1534 * isn't a good reason to call adt_set_user() with it unless you don't
1535 * have a good value yet and intend to replace it later; auid will be
1536 * AU_NOAUDITID.
1537 *
1538 * adt_set_user should be called even if auditing is not enabled
1539 * so that adt_export_session_data() will have useful stuff to
1540 * work with.
1541 *
1542 * See the note preceding adt_set_proc() about the use of ADT_HAVE_TID
1543 * and ADT_HAVE_ALL.
1544 */
1545
1546int
1547adt_set_user(const adt_session_data_t *session_data, uid_t euid, gid_t egid,
1548    uid_t ruid, gid_t rgid, const adt_termid_t *termid,
1549    enum adt_user_context user_context)
1550{
1551	adt_internal_state_t	*state;
1552	int			rc;
1553
1554	if (session_data == NULL) /* no session exists to audit */
1555		return (0);
1556
1557	state = (adt_internal_state_t *)session_data;
1558	assert(state->as_check == ADT_VALID);
1559
1560	switch (user_context) {
1561	case ADT_NEW:
1562		if (ruid == ADT_NO_CHANGE || euid == ADT_NO_CHANGE ||
1563		    rgid == ADT_NO_CHANGE || egid == ADT_NO_CHANGE) {
1564			errno = EINVAL;
1565			return (-1);
1566		}
1567		if ((rc = adt_newuser(state, ruid,
1568		    (au_tid_addr_t *)termid)) != 0)
1569			return (rc);
1570
1571		state->as_have_user_data = ADT_HAVE_ALL;
1572		break;
1573	case ADT_UPDATE:
1574		if (state->as_have_user_data != ADT_HAVE_ALL) {
1575			errno = EINVAL;
1576			return (-1);
1577		}
1578
1579		if (ruid != ADT_NO_CHANGE)
1580			if ((rc = adt_changeuser(state, ruid)) != 0)
1581				return (rc);
1582		break;
1583	case ADT_USER:
1584		if (state->as_have_user_data != ADT_HAVE_ALL) {
1585			errno = EINVAL;
1586			return (-1);
1587		}
1588		break;
1589	case ADT_SETTID:
1590		assert(termid != NULL);
1591		state->as_info.ai_termid = *((au_tid_addr_t *)termid);
1592		/* avoid fooling pam_setcred()... */
1593		state->as_info.ai_auid = AU_NOAUDITID;
1594		state->as_info.ai_asid = 0;
1595		state->as_info.ai_mask.am_failure = 0;
1596		state->as_info.ai_mask.am_success = 0;
1597		state->as_have_user_data = ADT_HAVE_TID |
1598		    ADT_HAVE_AUID | ADT_HAVE_ASID | ADT_HAVE_MASK;
1599		return (0);
1600	default:
1601		errno = EINVAL;
1602		return (-1);
1603	}
1604
1605	if (ruid == ADT_NO_AUDIT) {
1606		state->as_ruid = AU_NOAUDITID;
1607		state->as_euid = AU_NOAUDITID;
1608		state->as_rgid = AU_NOAUDITID;
1609		state->as_egid = AU_NOAUDITID;
1610	} else {
1611		if (ruid != ADT_NO_CHANGE)
1612			state->as_ruid = ruid;
1613		if (euid != ADT_NO_CHANGE)
1614			state->as_euid = euid;
1615		if (rgid != ADT_NO_CHANGE)
1616			state->as_rgid = rgid;
1617		if (egid != ADT_NO_CHANGE)
1618			state->as_egid = egid;
1619	}
1620
1621	if (ruid == ADT_NO_ATTRIB) {
1622		state->as_session_model = ADT_SESSION_MODEL;
1623	}
1624
1625	return (0);
1626}
1627
1628/*
1629 * adt_set_from_ucred()
1630 *
1631 * an alternate to adt_set_user that fills the same role but uses
1632 * a pointer to a ucred rather than a list of id's.  If the ucred
1633 * pointer is NULL, use the credential from the this process.
1634 *
1635 * A key difference is that for ADT_NEW, adt_set_from_ucred() does
1636 * not overwrite the asid and auid unless auid has not been set.
1637 * ADT_NEW differs from ADT_UPDATE in that it does not OR together
1638 * the incoming audit mask with the one that already exists.
1639 *
1640 * adt_set_from_ucred should be called even if auditing is not enabled
1641 * so that adt_export_session_data() will have useful stuff to
1642 * work with.
1643 */
1644
1645int
1646adt_set_from_ucred(const adt_session_data_t *session_data, const ucred_t *uc,
1647    enum adt_user_context user_context)
1648{
1649	adt_internal_state_t	*state;
1650	int			rc = -1;
1651	const au_tid64_addr_t		*tid64;
1652	au_tid_addr_t		termid, *tid;
1653	ucred_t	*ucred = (ucred_t *)uc;
1654	boolean_t	local_uc = B_FALSE;
1655
1656	if (session_data == NULL) /* no session exists to audit */
1657		return (0);
1658
1659	state = (adt_internal_state_t *)session_data;
1660	assert(state->as_check == ADT_VALID);
1661
1662	if (ucred == NULL) {
1663		ucred = ucred_get(P_MYID);
1664
1665		if (ucred == NULL)
1666			goto return_rc;
1667		local_uc = B_TRUE;
1668	}
1669
1670	switch (user_context) {
1671	case ADT_NEW:
1672		tid64 = ucred_getatid(ucred);
1673		if (tid64 != NULL) {
1674			adt_cpy_tid(&termid, tid64);
1675			tid = &termid;
1676		} else {
1677			tid = NULL;
1678		}
1679		if (ucred_getauid(ucred) == AU_NOAUDITID) {
1680			adt_setto_unaudited(state);
1681			state->as_have_user_data = ADT_HAVE_ALL;
1682			rc = 0;
1683			goto return_rc;
1684		} else {
1685			state->as_info.ai_auid = ucred_getauid(ucred);
1686			state->as_info.ai_asid = ucred_getasid(ucred);
1687			state->as_info.ai_mask = *ucred_getamask(ucred);
1688			state->as_info.ai_termid = *tid;
1689		}
1690		state->as_have_user_data = ADT_HAVE_ALL;
1691		break;
1692	case ADT_UPDATE:
1693		if (state->as_have_user_data != ADT_HAVE_ALL) {
1694			errno = EINVAL;
1695			goto return_rc;
1696		}
1697
1698		if ((rc = adt_changeuser(state, ucred_getruid(ucred))) != 0)
1699			goto return_rc;
1700		break;
1701	case ADT_USER:
1702		if (state->as_have_user_data != ADT_HAVE_ALL) {
1703			errno = EINVAL;
1704			goto return_rc;
1705		}
1706		break;
1707	default:
1708		errno = EINVAL;
1709		goto return_rc;
1710	}
1711	rc = 0;
1712
1713	state->as_ruid = ucred_getruid(ucred);
1714	state->as_euid = ucred_geteuid(ucred);
1715	state->as_rgid = ucred_getrgid(ucred);
1716	state->as_egid = ucred_getegid(ucred);
1717	state->as_pid = ucred_getpid(ucred);
1718	state->as_label = adt_ucred_label(ucred);
1719
1720return_rc:
1721	if (local_uc) {
1722		ucred_free(ucred);
1723	}
1724	return (rc);
1725}
1726
1727/*
1728 * adt_alloc_event() returns a pointer to allocated memory
1729 *
1730 */
1731
1732adt_event_data_t
1733*adt_alloc_event(const adt_session_data_t *session_data, au_event_t event_id)
1734{
1735	struct adt_event_state	*event_state;
1736	adt_internal_state_t	*session_state;
1737	adt_event_data_t	*return_event = NULL;
1738	/*
1739	 * need to return a valid event pointer even if audit is
1740	 * off, else the caller will end up either (1) keeping its
1741	 * own flags for on/off or (2) writing to a NULL pointer.
1742	 * If auditing is on, the session data must be valid; otherwise
1743	 * we don't care.
1744	 */
1745	if (session_data != NULL) {
1746		session_state = (adt_internal_state_t *)session_data;
1747		assert(session_state->as_check == ADT_VALID);
1748	}
1749	event_state = calloc(1, sizeof (struct adt_event_state));
1750	if (event_state == NULL)
1751		goto return_ptr;
1752
1753	event_state->ae_check = ADT_VALID;
1754
1755	event_state->ae_event_id = event_id;
1756	event_state->ae_session = (struct adt_internal_state *)session_data;
1757
1758	return_event = (adt_event_data_t *)&(event_state->ae_event_data);
1759
1760	/*
1761	 * preload data so the adt_au_*() functions can detect un-supplied
1762	 * values (0 and NULL are free via calloc()).
1763	 */
1764	adt_preload(event_id, return_event);
1765
1766return_ptr:
1767	return (return_event);
1768}
1769
1770/*
1771 * adt_getXlateTable -- look up translation table address for event id
1772 */
1773
1774static struct translation *
1775adt_getXlateTable(au_event_t event_id)
1776{
1777	/* xlate_table is global in adt_xlate.c */
1778	struct translation	**p_xlate = &xlate_table[0];
1779	struct translation	*p_event;
1780
1781	while (*p_xlate != NULL) {
1782		p_event = *p_xlate;
1783		if (event_id == p_event->tx_external_event)
1784			return (p_event);
1785		p_xlate++;
1786	}
1787	return (NULL);
1788}
1789
1790/*
1791 * adt_calcOffsets
1792 *
1793 * the call to this function is surrounded by a mutex.
1794 *
1795 * i walks down the table picking up next_token.  j walks again to
1796 * calculate the offset to the input data.  k points to the next
1797 * token's row.  Finally, l, is used to sum the values in the
1798 * datadef array.
1799 *
1800 * What's going on?  The entry array is in the order of the input
1801 * fields but the processing of array entries is in the order of
1802 * the output (see next_token).  Calculating the offset to the
1803 * "next" input can't be done in the outer loop (i) since i doesn't
1804 * point to the current entry and it can't be done with the k index
1805 * because it doesn't represent the order of input fields.
1806 *
1807 * While the resulting algorithm is n**2, it is only done once per
1808 * event type.
1809 */
1810
1811/*
1812 * adt_calcOffsets is only called once per event type, but it uses
1813 * the address alignment of memory allocated for that event as if it
1814 * were the same for all subsequently allocated memory.  This is
1815 * guaranteed by calloc/malloc.  Arrays take special handling since
1816 * what matters for figuring out the correct alignment is the size
1817 * of the array element.
1818 */
1819
1820static void
1821adt_calcOffsets(struct entry *p_entry, int tablesize, void *p_data)
1822{
1823	int		i, j;
1824	size_t		this_size, prev_size;
1825	void		*struct_start = p_data;
1826
1827	for (i = 0; i < tablesize; i++) {
1828		if (p_entry[i].en_type_def == NULL) {
1829			p_entry[i].en_offset = 0;
1830			continue;
1831		}
1832		prev_size = 0;
1833		p_entry[i].en_offset = (char *)p_data - (char *)struct_start;
1834
1835		for (j = 0; j < p_entry[i].en_count_types; j++) {
1836			if (p_entry[i].en_type_def[j].dd_datatype == ADT_MSG)
1837				this_size = sizeof (enum adt_generic);
1838			else
1839				this_size =
1840				    p_entry[i].en_type_def[j].dd_input_size;
1841
1842			/* adj for first entry */
1843			if (prev_size == 0)
1844				prev_size = this_size;
1845
1846			if (p_entry[i].en_type_def[j].dd_datatype ==
1847			    ADT_UINT32ARRAY) {
1848				p_data = (char *)adt_adjust_address(p_data,
1849				    prev_size, sizeof (uint32_t)) +
1850				    this_size - sizeof (uint32_t);
1851
1852				prev_size = sizeof (uint32_t);
1853			} else {
1854				p_data = adt_adjust_address(p_data, prev_size,
1855				    this_size);
1856				prev_size = this_size;
1857			}
1858		}
1859	}
1860}
1861
1862/*
1863 * adt_generate_event
1864 * generate event record from external struct.  The order is based on
1865 * the output tokens, allowing for the possibility that the input data
1866 * is in a different order.
1867 *
1868 */
1869
1870static void
1871adt_generate_event(const adt_event_data_t *p_extdata,
1872    struct adt_event_state *p_event,
1873    struct translation *p_xlate)
1874{
1875	struct entry		*p_entry;
1876	static mutex_t	lock = DEFAULTMUTEX;
1877
1878	p_entry = p_xlate->tx_first_entry;
1879	assert(p_entry != NULL);
1880
1881	p_event->ae_internal_id = p_xlate->tx_internal_event;
1882	adt_token_open(p_event);
1883
1884	/*
1885	 * offsets are not pre-calculated; the initial offsets are all
1886	 * 0; valid offsets are >= 0.  Offsets for no-input tokens such
1887	 * as subject are set to -1 by adt_calcOffset()
1888	 */
1889	if (p_xlate->tx_offsetsCalculated == 0) {
1890		(void) _mutex_lock(&lock);
1891		p_xlate->tx_offsetsCalculated = 1;
1892
1893		adt_calcOffsets(p_xlate->tx_top_entry, p_xlate->tx_entries,
1894		    (void *)p_extdata);
1895		(void) _mutex_unlock(&lock);
1896	}
1897	while (p_entry != NULL) {
1898		adt_generate_token(p_entry, (char *)p_extdata,
1899		    p_event);
1900
1901		p_entry = p_entry->en_next_token;
1902	}
1903	adt_token_close(p_event);
1904}
1905
1906/*
1907 * adt_put_event -- main event generation function.
1908 * The input "event" is the address of the struct containing
1909 * event-specific data.
1910 *
1911 * However if auditing is off or the session handle
1912 * is NULL, no attempt to write a record is made.
1913 */
1914
1915int
1916adt_put_event(const adt_event_data_t *event, int status, int return_val)
1917{
1918	struct adt_event_state	*event_state;
1919	struct translation	*xlate;
1920	int			rc = 0;
1921
1922	if (event == NULL) {
1923		errno = EINVAL;
1924		rc = -1;
1925		goto return_rc;
1926	}
1927	event_state = (struct adt_event_state *)event;
1928
1929	/* if audit off or this is a broken session, exit */
1930	if (auditstate == AUC_DISABLED || (event_state->ae_session == NULL))
1931		goto return_rc;
1932
1933	assert(event_state->ae_check == ADT_VALID);
1934
1935	event_state->ae_rc = status;
1936	event_state->ae_type = return_val;
1937
1938	/* look up the event */
1939
1940	xlate = adt_getXlateTable(event_state->ae_event_id);
1941
1942	if (xlate == NULL) {
1943		errno = EINVAL;
1944		rc = -1;
1945		goto return_rc;
1946	}
1947	DPRINTF(("got event %d\n", xlate->tx_internal_event));
1948
1949	if (adt_selected(event_state, xlate->tx_internal_event, status))
1950		adt_generate_event(event, event_state, xlate);
1951
1952return_rc:
1953	return (rc);
1954}
1955
1956/*
1957 * adt_free_event -- invalidate and free
1958 */
1959
1960void
1961adt_free_event(adt_event_data_t *event)
1962{
1963	struct adt_event_state	*event_state;
1964
1965	if (event == NULL)
1966		return;
1967
1968	event_state = (struct adt_event_state *)event;
1969
1970	assert(event_state->ae_check == ADT_VALID);
1971
1972	event_state->ae_check = 0;
1973
1974	free(event_state);
1975}
1976
1977/*
1978 * adt_is_selected -- helper to adt_selected(), below.
1979 *
1980 * "sorf" is "success or fail" status; au_preselect compares
1981 * that with success, fail, or both.
1982 */
1983
1984static int
1985adt_is_selected(au_event_t e, au_mask_t *m, int sorf)
1986{
1987	int prs_sorf;
1988
1989	if (sorf == 0)
1990		prs_sorf = AU_PRS_SUCCESS;
1991	else
1992		prs_sorf = AU_PRS_FAILURE;
1993
1994	return (au_preselect(e, m, prs_sorf, AU_PRS_REREAD));
1995}
1996
1997/*
1998 * selected -- see if this event is preselected.
1999 *
2000 * if errors are encountered trying to check a preselection mask
2001 * or look up a user name, the event is selected.  Otherwise, the
2002 * preselection mask is used for the job.
2003 */
2004
2005static int
2006adt_selected(struct adt_event_state *event, au_event_t actual_id, int status)
2007{
2008	adt_internal_state_t *sp;
2009	au_mask_t	namask;
2010
2011	sp = event->ae_session;
2012
2013	if ((sp->as_have_user_data & ADT_HAVE_IDS) == 0) {
2014		adt_write_syslog("No user data available", EINVAL);
2015		return (1);	/* default is "selected" */
2016	}
2017
2018	/* non-attributable? */
2019	if ((sp->as_info.ai_auid == AU_NOAUDITID) ||
2020	    (sp->as_info.ai_auid == ADT_NO_AUDIT)) {
2021		if (auditon(A_GETKMASK, (caddr_t)&namask,
2022		    sizeof (namask)) != 0) {
2023			adt_write_syslog("auditon failure", errno);
2024			return (1);
2025		}
2026		return (adt_is_selected(actual_id, &namask, status));
2027	} else {
2028		return (adt_is_selected(actual_id, &(sp->as_info.ai_mask),
2029		    status));
2030	}
2031}
2032