xref: /illumos-gate/usr/src/cmd/uadmin/uadmin.c (revision 02b4e56ca3a4e4a4fe9e52fca9c2972101f0e57f)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2000, 2010, Oracle and/or its affiliates. All rights reserved.
23  */
24 
25 /*	Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T	*/
26 /*	  All Rights Reserved  	*/
27 
28 
29 
30 #include <errno.h>
31 #include <fcntl.h>
32 #include <stdio.h>
33 #include <stdlib.h>
34 #include <string.h>
35 #include <strings.h>
36 #include <signal.h>
37 #include <unistd.h>
38 #ifdef	__i386
39 #include <libscf_priv.h>
40 #endif /* __i386 */
41 
42 #include <bsm/adt.h>
43 #include <bsm/adt_event.h>
44 
45 #include <sys/types.h>
46 #include <sys/uadmin.h>
47 #include <sys/wait.h>
48 
49 #define	SMF_RST	"/etc/svc/volatile/resetting"
50 #define	RETRY_COUNT 15	/* number of 1 sec retries for audit(1M) to complete */
51 
52 static const char *Usage = "Usage: %s cmd fcn [mdep]\n";
53 
54 static int closeout_audit(int, int);
55 static int turnoff_auditd(void);
56 static void wait_for_auqueue();
57 static int change_audit_file(void);
58 
59 int
60 main(int argc, char *argv[])
61 {
62 	int cmd, fcn;
63 	uintptr_t mdep = NULL;
64 	sigset_t set;
65 	adt_session_data_t *ah;  /* audit session handle */
66 	adt_event_data_t *event = NULL; /* event to be generated */
67 	au_event_t event_id;
68 	enum adt_uadmin_fcn fcn_id;
69 
70 	if (argc < 3 || argc > 4) {
71 		(void) fprintf(stderr, Usage, argv[0]);
72 		return (1);
73 	}
74 
75 	(void) sigfillset(&set);
76 	(void) sigprocmask(SIG_BLOCK, &set, NULL);
77 
78 	cmd = atoi(argv[1]);
79 	fcn = atoi(argv[2]);
80 	if (argc == 4) {	/* mdep argument given */
81 		if (cmd != A_REBOOT && cmd != A_SHUTDOWN && cmd != A_DUMP &&
82 		    cmd != A_FREEZE) {
83 			(void) fprintf(stderr, "%s: mdep argument not "
84 			    "allowed for this cmd value\n", argv[0]);
85 			(void) fprintf(stderr, Usage, argv[0]);
86 			return (1);
87 		} else {
88 			mdep = (uintptr_t)argv[3];
89 		}
90 	}
91 
92 	/* set up audit session and event */
93 	if (adt_start_session(&ah, NULL, ADT_USE_PROC_DATA) != 0) {
94 		(void) fprintf(stderr, "%s: can't start audit session\n",
95 		    argv[0]);
96 	}
97 	switch (cmd) {
98 	case A_SHUTDOWN:
99 		event_id = ADT_uadmin_shutdown;
100 		break;
101 	case A_REBOOT:
102 		event_id = ADT_uadmin_reboot;
103 		break;
104 	case A_DUMP:
105 		event_id = ADT_uadmin_dump;
106 		break;
107 	case A_REMOUNT:
108 		event_id = ADT_uadmin_remount;
109 		break;
110 	case A_FREEZE:
111 		event_id = ADT_uadmin_freeze;
112 		break;
113 	case A_FTRACE:
114 		event_id = ADT_uadmin_ftrace;
115 		break;
116 	case A_CONFIG:
117 		event_id = ADT_uadmin_config;
118 		break;
119 	case A_SWAPCTL:
120 		event_id = ADT_uadmin_swapctl;
121 		break;
122 	default:
123 		event_id = 0;
124 	}
125 	if ((event_id != 0) &&
126 	    (event = adt_alloc_event(ah, event_id)) == NULL) {
127 		(void) fprintf(stderr, "%s: can't allocate audit event\n",
128 		    argv[0]);
129 	}
130 	switch (fcn) {
131 	case AD_HALT:
132 		fcn_id = ADT_UADMIN_FCN_AD_HALT;
133 		break;
134 	case AD_POWEROFF:
135 		fcn_id = ADT_UADMIN_FCN_AD_POWEROFF;
136 		break;
137 	case AD_BOOT:
138 		fcn_id = ADT_UADMIN_FCN_AD_BOOT;
139 		break;
140 	case AD_IBOOT:
141 		fcn_id = ADT_UADMIN_FCN_AD_IBOOT;
142 		break;
143 	case AD_SBOOT:
144 		fcn_id = ADT_UADMIN_FCN_AD_SBOOT;
145 		break;
146 	case AD_SIBOOT:
147 		fcn_id = ADT_UADMIN_FCN_AD_SIBOOT;
148 		break;
149 	case AD_NOSYNC:
150 		fcn_id = ADT_UADMIN_FCN_AD_NOSYNC;
151 		break;
152 	case AD_FASTREBOOT:
153 #ifdef __i386
154 		fcn_id = ADT_UADMIN_FCN_AD_FASTREBOOT;
155 		mdep = NULL;	/* Ignore all arguments */
156 #else /* __i386 */
157 		fcn = AD_BOOT;
158 		fcn_id = ADT_UADMIN_FCN_AD_BOOT;
159 #endif /* __i386 */
160 		break;
161 	case AD_FASTREBOOT_DRYRUN:
162 		fcn_id = ADT_UADMIN_FCN_AD_FASTREBOOT_DRYRUN;
163 		mdep = NULL;	/* Ignore all arguments */
164 		break;
165 	default:
166 		fcn_id = 0;
167 	}
168 	if (cmd == A_FREEZE) {
169 		switch (fcn) {
170 		case AD_SUSPEND_TO_DISK:
171 			fcn_id = ADT_UADMIN_FCN_AD_SUSPEND_TO_DISK;
172 			break;
173 		case AD_CHECK_SUSPEND_TO_DISK:
174 			fcn_id = ADT_UADMIN_FCN_AD_CHECK_SUSPEND_TO_DISK;
175 			break;
176 		case AD_FORCE:
177 			fcn_id = ADT_UADMIN_FCN_AD_FORCE;
178 			break;
179 		case AD_SUSPEND_TO_RAM:
180 			fcn_id = ADT_UADMIN_FCN_AD_SUSPEND_TO_RAM;
181 			break;
182 		case AD_CHECK_SUSPEND_TO_RAM:
183 			fcn_id = ADT_UADMIN_FCN_AD_CHECK_SUSPEND_TO_RAM;
184 			break;
185 		case AD_REUSEINIT:
186 			fcn_id = ADT_UADMIN_FCN_AD_REUSEINIT;
187 			break;
188 		case AD_REUSABLE:
189 			fcn_id = ADT_UADMIN_FCN_AD_REUSABLE;
190 			break;
191 		case AD_REUSEFINI:
192 			fcn_id = ADT_UADMIN_FCN_AD_REUSEFINI;
193 			break;
194 		}
195 	} else if (cmd == A_FTRACE) {
196 		switch (fcn) {
197 		case AD_FTRACE_START:
198 			fcn_id = ADT_UADMIN_FCN_AD_FTRACE_START;
199 			break;
200 		case AD_FTRACE_STOP:
201 			fcn_id = ADT_UADMIN_FCN_AD_FTRACE_STOP;
202 			break;
203 		}
204 #ifdef	__i386
205 	} else if (cmd == A_CONFIG) {
206 		uint8_t boot_config = 0;
207 		uint8_t boot_config_ovr = 0;
208 
209 		switch (fcn) {
210 		case AD_UPDATE_BOOT_CONFIG:
211 			fcn_id = ADT_UADMIN_FCN_AD_UPDATE_BOOT_CONFIG;
212 			scf_get_boot_config(&boot_config);
213 			boot_config_ovr = boot_config;
214 			scf_get_boot_config_ovr(&boot_config_ovr);
215 			boot_config &= boot_config_ovr;
216 			mdep = (uintptr_t)(&boot_config);
217 			break;
218 		}
219 #endif /* __i386 */
220 	}
221 
222 	if (geteuid() == 0) {
223 		if (event != NULL) {
224 			switch (cmd) {
225 			case A_SHUTDOWN:
226 				event->adt_uadmin_shutdown.fcn = fcn_id;
227 				event->adt_uadmin_shutdown.mdep = (char *)mdep;
228 				break;
229 			case A_REBOOT:
230 				event->adt_uadmin_reboot.fcn = fcn_id;
231 				event->adt_uadmin_reboot.mdep = (char *)mdep;
232 				break;
233 			case A_DUMP:
234 				event->adt_uadmin_dump.fcn = fcn_id;
235 				event->adt_uadmin_dump.mdep = (char *)mdep;
236 				break;
237 			case A_REMOUNT:
238 				/* no parameters */
239 				break;
240 			case A_FREEZE:
241 				event->adt_uadmin_freeze.fcn = fcn_id;
242 				event->adt_uadmin_freeze.mdep = (char *)mdep;
243 				break;
244 			case A_FTRACE:
245 				event->adt_uadmin_ftrace.fcn = fcn_id;
246 				event->adt_uadmin_ftrace.mdep = (char *)mdep;
247 				break;
248 			case A_CONFIG:
249 				event->adt_uadmin_config.fcn = fcn_id;
250 				event->adt_uadmin_config.mdep = (char *)mdep;
251 				break;
252 			case A_SWAPCTL:
253 				event->adt_uadmin_swapctl.fcn = fcn_id;
254 				break;
255 			}
256 
257 			if (adt_put_event(event, ADT_SUCCESS, 0) != 0) {
258 				(void) fprintf(stderr,
259 				    "%s: can't put audit event\n", argv[0]);
260 			}
261 			/*
262 			 * allow audit record to be processed in the kernel
263 			 * audit queue
264 			 */
265 			wait_for_auqueue();
266 		}
267 
268 		if (closeout_audit(cmd, fcn) == -1)
269 			(void) fprintf(stderr, "%s: can't turn off auditd\n",
270 			    argv[0]);
271 
272 		if (cmd == A_SHUTDOWN || cmd == A_REBOOT)
273 			(void) creat(SMF_RST, 0777);
274 	}
275 
276 	(void) adt_free_event(event);
277 	if (uadmin(cmd, fcn, mdep) < 0) {
278 		perror("uadmin");
279 
280 		(void) unlink(SMF_RST);
281 
282 		return (1);
283 	}
284 
285 	/* If returning from a suspend, audit thaw */
286 	if ((cmd == A_FREEZE) &&
287 	    ((fcn == AD_FORCE) ||
288 	    (fcn == AD_REUSABLE) ||
289 	    (fcn == AD_SUSPEND_TO_DISK) ||
290 	    (fcn == AD_SUSPEND_TO_RAM))) {
291 		if ((event = adt_alloc_event(ah, ADT_uadmin_thaw)) == NULL) {
292 			(void) fprintf(stderr, "%s: can't allocate thaw audit "
293 			    "event\n", argv[0]);
294 		}
295 		event->adt_uadmin_thaw.fcn = fcn_id;
296 		if (adt_put_event(event, ADT_SUCCESS, 0) != 0) {
297 			(void) fprintf(stderr, "%s: can't put thaw audit "
298 			    "event\n", argv[0]);
299 		}
300 		(void) adt_free_event(event);
301 	}
302 	(void) adt_end_session(ah);
303 
304 	return (0);
305 }
306 
307 static int
308 closeout_audit(int cmd, int fcn)
309 {
310 	if (!adt_audit_state(AUC_AUDITING)) {
311 		/* auditd not running, just return */
312 		return (0);
313 	}
314 	switch (cmd) {
315 	case A_SHUTDOWN:
316 		switch (fcn) {
317 		case AD_FASTREBOOT_DRYRUN:
318 			/* No system discontinuity, don't turn off auditd */
319 			return (0);
320 		default:
321 			break;	/* For all the other shutdown functions */
322 		}
323 		/* FALLTHROUGH */
324 	case A_REBOOT:
325 	case A_DUMP:
326 		/* system shutting down, turn off auditd */
327 		return (turnoff_auditd());
328 	case A_REMOUNT:
329 	case A_SWAPCTL:
330 	case A_FTRACE:
331 	case A_CONFIG:
332 		/* No system discontinuity, don't turn off auditd */
333 		return (0);
334 	case A_FREEZE:
335 		switch (fcn) {
336 		case AD_CHECK_SUSPEND_TO_DISK:	/* AD_CHECK */
337 		case AD_CHECK_SUSPEND_TO_RAM:
338 		case AD_REUSEINIT:
339 		case AD_REUSEFINI:
340 			/* No system discontinuity, don't turn off auditd */
341 			return (0);
342 		case AD_REUSABLE:
343 		case AD_SUSPEND_TO_DISK:	/* AD_COMPRESS */
344 		case AD_SUSPEND_TO_RAM:
345 		case AD_FORCE:
346 			/* suspend the system, change audit files */
347 			return (change_audit_file());
348 		default:
349 			return (0);	/* not an audit error */
350 		}
351 	default:
352 		return (0);	/* not an audit error */
353 	}
354 }
355 
356 static int
357 turnoff_auditd(void)
358 {
359 	int	rc;
360 	int	retries = RETRY_COUNT;
361 
362 	if ((rc = (int)fork()) == 0) {
363 		(void) execl("/usr/sbin/audit", "audit", "-T", NULL);
364 		(void) fprintf(stderr, "error disabling auditd: %s\n",
365 		    strerror(errno));
366 		_exit(-1);
367 	} else if (rc == -1) {
368 		(void) fprintf(stderr, "error disabling auditd: %s\n",
369 		    strerror(errno));
370 		return (-1);
371 	}
372 
373 	/*
374 	 * wait for auditd to finish its work.  auditd will change the
375 	 * auditstart from AUC_AUDITING (auditd up and running) to
376 	 * AUC_NOAUDIT.  Other states are errors, so we're done as well.
377 	 */
378 	do {
379 		int	auditstate;
380 
381 		rc = -1;
382 		if ((auditon(A_GETCOND, (caddr_t)&auditstate,
383 		    sizeof (auditstate)) == 0) &&
384 		    (auditstate == AUC_AUDITING)) {
385 			retries--;
386 			(void) sleep(1);
387 		} else {
388 			rc = 0;
389 		}
390 	} while ((rc != 0) && (retries != 0));
391 
392 	return (rc);
393 }
394 
395 static int
396 change_audit_file(void)
397 {
398 	pid_t	pid;
399 
400 	if ((pid = fork()) == 0) {
401 		(void) execl("/usr/sbin/audit", "audit", "-n", NULL);
402 		(void) fprintf(stderr, "error changing audit files: %s\n",
403 		    strerror(errno));
404 		_exit(-1);
405 	} else if (pid == -1) {
406 		(void) fprintf(stderr, "error changing audit files: %s\n",
407 		    strerror(errno));
408 		return (-1);
409 	} else {
410 		pid_t	rc;
411 		int	retries = RETRY_COUNT;
412 
413 		/*
414 		 * Wait for audit(1M) -n process to complete
415 		 *
416 		 */
417 		do {
418 			if ((rc = waitpid(pid, NULL, WNOHANG)) == pid) {
419 				return (0);
420 			} else if (rc == -1) {
421 				return (-1);
422 			} else {
423 				(void) sleep(1);
424 				retries--;
425 			}
426 
427 		} while (retries != 0);
428 	}
429 	return (-1);
430 }
431 
432 static void
433 wait_for_auqueue()
434 {
435 	au_stat_t	au_stat;
436 	int		retries = 10;
437 
438 	while (retries-- && auditon(A_GETSTAT, (caddr_t)&au_stat, NULL) == 0) {
439 		if (au_stat.as_enqueue == au_stat.as_written) {
440 			break;
441 		}
442 		(void) sleep(1);
443 	}
444 }
445