bsm_user.c revision 293161
1/*- 2 * Copyright (c) 2004 Apple Inc. 3 * Copyright (c) 2006 Robert N. M. Watson 4 * All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 1. Redistributions of source code must retain the above copyright 10 * notice, this list of conditions and the following disclaimer. 11 * 2. Redistributions in binary form must reproduce the above copyright 12 * notice, this list of conditions and the following disclaimer in the 13 * documentation and/or other materials provided with the distribution. 14 * 3. Neither the name of Apple Inc. ("Apple") nor the names of 15 * its contributors may be used to endorse or promote products derived 16 * from this software without specific prior written permission. 17 * 18 * THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND 19 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21 * ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR 22 * ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 23 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 24 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 26 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING 27 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 28 * POSSIBILITY OF SUCH DAMAGE. 29 */ 30 31#include <config/config.h> 32 33#include <bsm/libbsm.h> 34 35#include <string.h> 36#ifdef HAVE_PTHREAD_MUTEX_LOCK 37#include <pthread.h> 38#endif 39#include <stdio.h> 40#include <stdlib.h> 41 42#ifndef HAVE_STRLCPY 43#include <compat/strlcpy.h> 44#endif 45 46/* 47 * Parse the contents of the audit_user file into au_user_ent structures. 48 */ 49 50static FILE *fp = NULL; 51static char linestr[AU_LINE_MAX]; 52static const char *user_delim = ":"; 53 54#ifdef HAVE_PTHREAD_MUTEX_LOCK 55static pthread_mutex_t mutex = PTHREAD_MUTEX_INITIALIZER; 56#endif 57 58/* 59 * Parse one line from the audit_user file into the au_user_ent structure. 60 */ 61static struct au_user_ent * 62userfromstr(char *str, struct au_user_ent *u) 63{ 64 char *username, *always, *never; 65 char *last; 66 67 username = strtok_r(str, user_delim, &last); 68 always = strtok_r(NULL, user_delim, &last); 69 never = strtok_r(NULL, user_delim, &last); 70 71 if ((username == NULL) || (always == NULL) || (never == NULL)) 72 return (NULL); 73 74 if (strlen(username) >= AU_USER_NAME_MAX) 75 return (NULL); 76 77 strlcpy(u->au_name, username, AU_USER_NAME_MAX); 78 if (getauditflagsbin(always, &(u->au_always)) == -1) 79 return (NULL); 80 81 if (getauditflagsbin(never, &(u->au_never)) == -1) 82 return (NULL); 83 84 return (u); 85} 86 87/* 88 * Rewind to beginning of the file 89 */ 90static void 91setauuser_locked(void) 92{ 93 94 if (fp != NULL) 95 fseek(fp, 0, SEEK_SET); 96} 97 98void 99setauuser(void) 100{ 101 102#ifdef HAVE_PTHREAD_MUTEX_LOCK 103 pthread_mutex_lock(&mutex); 104#endif 105 setauuser_locked(); 106#ifdef HAVE_PTHREAD_MUTEX_LOCK 107 pthread_mutex_unlock(&mutex); 108#endif 109} 110 111/* 112 * Close the file descriptor 113 */ 114void 115endauuser(void) 116{ 117 118#ifdef HAVE_PTHREAD_MUTEX_LOCK 119 pthread_mutex_lock(&mutex); 120#endif 121 if (fp != NULL) { 122 fclose(fp); 123 fp = NULL; 124 } 125#ifdef HAVE_PTHREAD_MUTEX_LOCK 126 pthread_mutex_unlock(&mutex); 127#endif 128} 129 130/* 131 * Enumerate the au_user_ent structures from the file 132 */ 133static struct au_user_ent * 134getauuserent_r_locked(struct au_user_ent *u) 135{ 136 char *nl; 137 138 if ((fp == NULL) && ((fp = fopen(AUDIT_USER_FILE, "r")) == NULL)) 139 return (NULL); 140 141 while (1) { 142 if (fgets(linestr, AU_LINE_MAX, fp) == NULL) 143 return (NULL); 144 145 /* Remove new lines. */ 146 if ((nl = strrchr(linestr, '\n')) != NULL) 147 *nl = '\0'; 148 149 /* Skip comments. */ 150 if (linestr[0] == '#') 151 continue; 152 153 /* Get the next structure. */ 154 if (userfromstr(linestr, u) == NULL) 155 return (NULL); 156 break; 157 } 158 159 return (u); 160} 161 162struct au_user_ent * 163getauuserent_r(struct au_user_ent *u) 164{ 165 struct au_user_ent *up; 166 167#ifdef HAVE_PTHREAD_MUTEX_LOCK 168 pthread_mutex_lock(&mutex); 169#endif 170 up = getauuserent_r_locked(u); 171#ifdef HAVE_PTHREAD_MUTEX_LOCK 172 pthread_mutex_unlock(&mutex); 173#endif 174 return (up); 175} 176 177struct au_user_ent * 178getauuserent(void) 179{ 180 static char user_ent_name[AU_USER_NAME_MAX]; 181 static struct au_user_ent u; 182 183 bzero(&u, sizeof(u)); 184 bzero(user_ent_name, sizeof(user_ent_name)); 185 u.au_name = user_ent_name; 186 187 return (getauuserent_r(&u)); 188} 189 190/* 191 * Find a au_user_ent structure matching the given user name. 192 */ 193struct au_user_ent * 194getauusernam_r(struct au_user_ent *u, const char *name) 195{ 196 struct au_user_ent *up; 197 198 if (name == NULL) 199 return (NULL); 200 201#ifdef HAVE_PTHREAD_MUTEX_LOCK 202 pthread_mutex_lock(&mutex); 203#endif 204 205 setauuser_locked(); 206 while ((up = getauuserent_r_locked(u)) != NULL) { 207 if (strcmp(name, u->au_name) == 0) { 208#ifdef HAVE_PTHREAD_MUTEX_LOCK 209 pthread_mutex_unlock(&mutex); 210#endif 211 return (up); 212 } 213 } 214 215#ifdef HAVE_PTHREAD_MUTEX_LOCK 216 pthread_mutex_unlock(&mutex); 217#endif 218 return (NULL); 219 220} 221 222struct au_user_ent * 223getauusernam(const char *name) 224{ 225 static char user_ent_name[AU_USER_NAME_MAX]; 226 static struct au_user_ent u; 227 228 bzero(&u, sizeof(u)); 229 bzero(user_ent_name, sizeof(user_ent_name)); 230 u.au_name = user_ent_name; 231 232 return (getauusernam_r(&u, name)); 233} 234 235/* 236 * Read the default system wide audit classes from audit_control, combine with 237 * the per-user audit class and update the binary preselection mask. 238 */ 239int 240au_user_mask(char *username, au_mask_t *mask_p) 241{ 242 char auditstring[MAX_AUDITSTRING_LEN + 1]; 243 char user_ent_name[AU_USER_NAME_MAX]; 244 struct au_user_ent u, *up; 245 246 bzero(&u, sizeof(u)); 247 bzero(user_ent_name, sizeof(user_ent_name)); 248 u.au_name = user_ent_name; 249 250 /* Get user mask. */ 251 if ((up = getauusernam_r(&u, username)) != NULL) { 252 if (-1 == getfauditflags(&up->au_always, &up->au_never, 253 mask_p)) 254 return (-1); 255 return (0); 256 } 257 258 /* Read the default system mask. */ 259 if (getacflg(auditstring, MAX_AUDITSTRING_LEN) == 0) { 260 if (-1 == getauditflagsbin(auditstring, mask_p)) 261 return (-1); 262 return (0); 263 } 264 265 /* No masks defined. */ 266 return (-1); 267} 268 269/* 270 * Generate the process audit state by combining the audit masks passed as 271 * parameters with the system audit masks. 272 */ 273int 274getfauditflags(au_mask_t *usremask, au_mask_t *usrdmask, au_mask_t *lastmask) 275{ 276 char auditstring[MAX_AUDITSTRING_LEN + 1]; 277 278 if ((usremask == NULL) || (usrdmask == NULL) || (lastmask == NULL)) 279 return (-1); 280 281 lastmask->am_success = 0; 282 lastmask->am_failure = 0; 283 284 /* Get the system mask. */ 285 if (getacflg(auditstring, MAX_AUDITSTRING_LEN) == 0) { 286 if (getauditflagsbin(auditstring, lastmask) != 0) 287 return (-1); 288 } 289 290 ADDMASK(lastmask, usremask); 291 SUBMASK(lastmask, usrdmask); 292 293 return (0); 294} 295