xref: /titanic_50/usr/src/cmd/sgs/rtld/common/audit.c (revision 1bdd6c0e3710e91cb1f31aa78de33cb638494480)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  *
26  * Audit interfaces.  Auditing can be enabled in two ways:
27  *
28  *	o	Using the LD_AUDIT environment variable
29  *
30  *	o	From individual objects containing a DT_DEPAUDIT entry
31  *		(see ld(1) -P/-p options).
32  *
33  * The former establishes a global set of audit libraries which can inspect all
34  * objects from a given process.  The latter establishes a local set of audit
35  * libraries which can inspect the immediate dependencies of the caller.
36  *
37  * Audit library capabilities are indicated by flags within the link-map list
38  * header (for global auditing), see LML_TFLG_AUD_* flags, or by the same flags
39  * within the individual link-map (for local auditing).  Although both sets of
40  * flags can occur in different data items they are defined as one to simplify
41  * audit interface requirements.  The basic test for all audit interfaces is:
42  *
43  *    if (((lml->lm_tflags | AFLAGS(lmp)) & LML_TFLG_AUD_MASK) &&
44  *	(lml == LIST(lmp)))
45  *
46  * The latter link-map list equivalence test insures that auditors themselves
47  * (invoked through DT_DEPAUDIT) are not audited.
48  */
49 
50 #include	<stdio.h>
51 #include	<sys/types.h>
52 #include	<sys/lwp.h>
53 #include	<stdio.h>
54 #include	<stdarg.h>
55 #include	<dlfcn.h>
56 #include	<string.h>
57 #include	<debug.h>
58 #include	"_rtld.h"
59 #include	"_audit.h"
60 #include	"_elf.h"
61 #include	"msg.h"
62 
63 uint_t	audit_flags = 0;		/* Copy of specific audit flags to */
64 					/* simplify boot_elf.s access. */
65 
66 static Audit_client *
67 _audit_client(Audit_info *aip, Rt_map *almp)
68 {
69 	int	ndx;
70 
71 	if (aip == NULL)
72 		return (NULL);
73 
74 	for (ndx = 0; ndx < aip->ai_cnt; ndx++) {
75 		if (aip->ai_clients[ndx].ac_lmp == almp)
76 			return (&(aip->ai_clients[ndx]));
77 	}
78 	return (NULL);
79 }
80 
81 /*
82  * la_filter() caller.  Traverse through all audit libraries and call any
83  * la_filter() entry points found.  A zero return from an auditor indicates
84  * that the filtee should be ignored.
85  */
86 static int
87 _audit_objfilter(APlist *list, Rt_map *frlmp, const char *ref, Rt_map *felmp,
88     uint_t flags)
89 {
90 	Audit_list	*alp;
91 	Aliste		idx;
92 
93 	for (APLIST_TRAVERSE(list, idx, alp)) {
94 		Audit_client	*fracp, *feacp;
95 
96 		if (alp->al_objfilter == NULL)
97 			continue;
98 		if ((fracp = _audit_client(AUDINFO(frlmp),
99 		    alp->al_lmp)) == NULL)
100 			continue;
101 		if ((feacp = _audit_client(AUDINFO(felmp),
102 		    alp->al_lmp)) == NULL)
103 			continue;
104 
105 		leave(LIST(alp->al_lmp), thr_flg_reenter);
106 		if ((*alp->al_objfilter)(&(fracp->ac_cookie), ref,
107 		    &(feacp->ac_cookie), flags) == 0)
108 			return (0);
109 		(void) enter(thr_flg_reenter);
110 	}
111 	return (1);
112 }
113 
114 int
115 audit_objfilter(Rt_map *frlmp, const char *ref, Rt_map *felmp, uint_t flags)
116 {
117 	int	appl = 0, respond = 1;
118 
119 	if (rt_critical())
120 		return (respond);
121 
122 	if ((rtld_flags & RT_FL_APPLIC) == 0)
123 		appl = rtld_flags |= RT_FL_APPLIC;
124 
125 	if (auditors && (auditors->ad_flags & LML_TFLG_AUD_OBJFILTER))
126 		respond = _audit_objfilter(auditors->ad_list, frlmp,
127 		    ref, felmp, flags);
128 	if (respond && AUDITORS(frlmp) &&
129 	    (AUDITORS(frlmp)->ad_flags & LML_TFLG_AUD_OBJFILTER))
130 		respond = _audit_objfilter(AUDITORS(frlmp)->ad_list, frlmp,
131 		    ref, felmp, flags);
132 
133 	if (appl)
134 		rtld_flags &= ~RT_FL_APPLIC;
135 
136 	return (respond);
137 }
138 
139 /*
140  * la_objsearch() caller.  Traverse through all audit libraries and call any
141  * la_objsearch() entry points found.
142  *
143  * Effectively any audit library can change the name we're working with, so we
144  * continue to propagate the new name to each audit library.  Any 0 return
145  * terminates the search.
146  */
147 static char *
148 _audit_objsearch(APlist *list, char *name, Rt_map *clmp, uint_t flags)
149 {
150 	Audit_list	*alp;
151 	Aliste		idx;
152 	char		*nname = (char *)name;
153 
154 	for (APLIST_TRAVERSE(list, idx, alp)) {
155 		Audit_client	*acp;
156 
157 		if (alp->al_objsearch == NULL)
158 			continue;
159 		if ((acp = _audit_client(AUDINFO(clmp), alp->al_lmp)) == NULL)
160 			continue;
161 
162 		leave(LIST(alp->al_lmp), thr_flg_reenter);
163 		nname = (*alp->al_objsearch)(nname, &(acp->ac_cookie), flags);
164 		(void) enter(thr_flg_reenter);
165 		if (nname == NULL)
166 			break;
167 	}
168 	return (nname);
169 }
170 
171 char *
172 audit_objsearch(Rt_map *clmp, const char *name, uint_t flags)
173 {
174 	char	*nname = (char *)name;
175 	int	appl = 0;
176 
177 	if (rt_critical())
178 		return (nname);
179 
180 	if ((rtld_flags & RT_FL_APPLIC) == 0)
181 		appl = rtld_flags |= RT_FL_APPLIC;
182 
183 	if (auditors && (auditors->ad_flags & LML_TFLG_AUD_OBJSEARCH))
184 		nname = _audit_objsearch(auditors->ad_list, nname,
185 		    clmp, flags);
186 	if (nname && AUDITORS(clmp) &&
187 	    (AUDITORS(clmp)->ad_flags & LML_TFLG_AUD_OBJSEARCH))
188 		nname = _audit_objsearch(AUDITORS(clmp)->ad_list, nname,
189 		    clmp, flags);
190 
191 	if (appl)
192 		rtld_flags &= ~RT_FL_APPLIC;
193 
194 	DBG_CALL(Dbg_libs_audit(LIST(clmp), name, nname));
195 	return (nname);
196 }
197 
198 /*
199  * la_activity() caller.  Traverse through all audit libraries and call any
200  * la_activity() entry points found.
201  */
202 static void
203 _audit_activity(APlist *list, Rt_map *clmp, uint_t flags)
204 {
205 	Audit_list	*alp;
206 	Aliste		idx;
207 	Lm_list		*clml = LIST(clmp);
208 
209 	for (APLIST_TRAVERSE(list, idx, alp)) {
210 		Audit_client	*acp;
211 		Rt_map		*almp = alp->al_lmp;
212 		Lm_list		*alml = LIST(almp);
213 
214 		if (alp->al_activity == 0)
215 			continue;
216 		if ((acp = _audit_client(AUDINFO(clmp), alp->al_lmp)) == NULL)
217 			continue;
218 
219 		/*
220 		 * Make sure the audit library only sees one addition/deletion
221 		 * at a time.  This ensures the library doesn't see numerous
222 		 * events from lazy loading a series of libraries.  Keep track
223 		 * of this caller having called an auditor, so that the
224 		 * appropriate "consistent" event can be supplied on leaving
225 		 * ld.so.1.
226 		 */
227 		if ((flags == LA_ACT_ADD) || (flags == LA_ACT_DELETE)) {
228 
229 			if (alml->lm_flags & LML_FLG_AUDITNOTIFY)
230 				continue;
231 
232 			if (aplist_append(&clml->lm_actaudit, clmp,
233 			    AL_CNT_ACTAUDIT) == NULL)
234 				return;
235 
236 			alml->lm_flags |= LML_FLG_AUDITNOTIFY;
237 
238 		} else {
239 			if ((alml->lm_flags & LML_FLG_AUDITNOTIFY) == 0)
240 				continue;
241 
242 			alml->lm_flags &= ~LML_FLG_AUDITNOTIFY;
243 		}
244 
245 		leave(LIST(alp->al_lmp), thr_flg_reenter);
246 		(*alp->al_activity)(&(acp->ac_cookie), flags);
247 		(void) enter(thr_flg_reenter);
248 	}
249 }
250 
251 void
252 audit_activity(Rt_map *clmp, uint_t flags)
253 {
254 	int	appl = 0;
255 
256 	if (rt_critical())
257 		return;
258 
259 	if ((rtld_flags & RT_FL_APPLIC) == 0)
260 		appl = rtld_flags |= RT_FL_APPLIC;
261 
262 	if (auditors && (auditors->ad_flags & LML_TFLG_AUD_ACTIVITY))
263 		_audit_activity(auditors->ad_list, clmp, flags);
264 	if (AUDITORS(clmp) &&
265 	    (AUDITORS(clmp)->ad_flags & LML_TFLG_AUD_ACTIVITY))
266 		_audit_activity(AUDITORS(clmp)->ad_list, clmp, flags);
267 
268 	if (appl)
269 		rtld_flags &= ~RT_FL_APPLIC;
270 }
271 
272 /*
273  * la_objopen() caller.  Create an audit information structure for the indicated
274  * link-map, regardless of an la_objopen() entry point.  This structure is used
275  * to supply information to various audit interfaces (see LML_MSK_AUDINFO).
276  * Traverse through all audit library and call any la_objopen() entry points
277  * found.
278  */
279 static int
280 _audit_objopen(APlist *list, Rt_map *nlmp, Lmid_t lmid, Audit_info *aip,
281     int *ndx)
282 {
283 	Audit_list	*alp;
284 	Aliste		idx;
285 
286 	for (APLIST_TRAVERSE(list, idx, alp)) {
287 		uint_t		flags;
288 		Audit_client	*acp;
289 
290 		/*
291 		 * Associate a cookie with the audit library, and assign the
292 		 * initial cookie as the present link-map.
293 		 */
294 		acp = &aip->ai_clients[(*ndx)++];
295 		acp->ac_lmp = alp->al_lmp;
296 		acp->ac_cookie = (uintptr_t)nlmp;
297 
298 		if (alp->al_objopen == NULL)
299 			continue;
300 
301 		DBG_CALL(Dbg_audit_object(LIST(alp->al_lmp), alp->al_libname,
302 		    NAME(nlmp)));
303 
304 		leave(LIST(alp->al_lmp), thr_flg_reenter);
305 		flags = (*alp->al_objopen)((Link_map *)nlmp, lmid,
306 		    &(acp->ac_cookie));
307 		(void) enter(thr_flg_reenter);
308 
309 		if (flags & LA_FLG_BINDTO)
310 			acp->ac_flags |= FLG_AC_BINDTO;
311 
312 		if (flags & LA_FLG_BINDFROM) {
313 			ulong_t		pltcnt;
314 
315 			acp->ac_flags |= FLG_AC_BINDFROM;
316 
317 			/*
318 			 * We only need dynamic plt's if a pltenter and/or a
319 			 * pltexit() entry point exist in one of our auditing
320 			 * libraries.
321 			 */
322 			if (aip->ai_dynplts || (JMPREL(nlmp) == 0) ||
323 			    ((audit_flags & (AF_PLTENTER | AF_PLTEXIT)) == 0))
324 				continue;
325 
326 			/*
327 			 * Create one dynplt for every 'PLT' that exists in the
328 			 * object.
329 			 */
330 			pltcnt = PLTRELSZ(nlmp) / RELENT(nlmp);
331 			if ((aip->ai_dynplts = calloc(pltcnt,
332 			    dyn_plt_ent_size)) == NULL)
333 				return (0);
334 		}
335 	}
336 	return (1);
337 }
338 
339 int
340 audit_objopen(Rt_map *clmp, Rt_map *nlmp)
341 {
342 	Lmid_t		lmid = get_linkmap_id(LIST(nlmp));
343 	int		appl = 0, respond = 1, ndx = 0;
344 	uint_t		clients = 0;
345 	Audit_info	*aip;
346 
347 	if (rt_critical())
348 		return (respond);
349 
350 	/*
351 	 * Determine the total number of audit libraries in use.  This provides
352 	 * the number of client structures required for this object.
353 	 */
354 	if (auditors)
355 		clients = auditors->ad_cnt;
356 	if (AUDITORS(clmp))
357 		clients += AUDITORS(clmp)->ad_cnt;
358 	if ((nlmp != clmp) && AUDITORS(nlmp))
359 		clients += AUDITORS(nlmp)->ad_cnt;
360 
361 	/*
362 	 * The initial allocation of the audit information structure includes
363 	 * an array of audit clients, 1 per audit library presently available.
364 	 *
365 	 *			 ---------------
366 	 *			| ai_cnt	|
367 	 * 	Audit_info	| ai_clients	|-------
368 	 *			| ai_dynplts	|	|
369 	 *			|---------------|	|
370 	 * 	Audit_client    |	1	|<------
371 	 *			|---------------|
372 	 *			|	2	|
373 	 *			    .........
374 	 */
375 	if ((AUDINFO(nlmp) = aip = calloc(1, sizeof (Audit_info) +
376 	    (sizeof (Audit_client) * clients))) == NULL)
377 		return (0);
378 
379 	aip->ai_cnt = clients;
380 	aip->ai_clients = (Audit_client *)((uintptr_t)aip +
381 	    sizeof (Audit_info));
382 
383 	if ((rtld_flags & RT_FL_APPLIC) == 0)
384 		appl = rtld_flags |= RT_FL_APPLIC;
385 
386 	if (auditors)
387 		respond = _audit_objopen(auditors->ad_list, nlmp,
388 		    lmid, aip, &ndx);
389 	if (respond && AUDITORS(clmp))
390 		respond = _audit_objopen(AUDITORS(clmp)->ad_list, nlmp,
391 		    lmid, aip, &ndx);
392 	if (respond && (nlmp != clmp) && AUDITORS(nlmp))
393 		respond = _audit_objopen(AUDITORS(nlmp)->ad_list, nlmp,
394 		    lmid, aip, &ndx);
395 
396 	if (appl)
397 		rtld_flags &= ~RT_FL_APPLIC;
398 
399 	return (respond);
400 }
401 
402 /*
403  * la_objclose() caller.  Traverse through all audit library and call any
404  * la_objclose() entry points found.
405  */
406 void
407 _audit_objclose(APlist *list, Rt_map *lmp)
408 {
409 	Audit_list	*alp;
410 	Aliste		idx;
411 
412 	for (APLIST_TRAVERSE(list, idx, alp)) {
413 		Audit_client	*acp;
414 
415 		if (alp->al_objclose == NULL)
416 			continue;
417 		if ((acp = _audit_client(AUDINFO(lmp), alp->al_lmp)) == NULL)
418 			continue;
419 
420 		leave(LIST(alp->al_lmp), thr_flg_reenter);
421 		(*alp->al_objclose)(&(acp->ac_cookie));
422 		(void) enter(thr_flg_reenter);
423 	}
424 }
425 
426 void
427 audit_objclose(Rt_map *clmp, Rt_map *lmp)
428 {
429 	int	appl = 0;
430 
431 	if (rt_critical())
432 		return;
433 
434 	if ((rtld_flags & RT_FL_APPLIC) == 0)
435 		appl = rtld_flags |= RT_FL_APPLIC;
436 
437 	if (auditors && (auditors->ad_flags & LML_TFLG_AUD_OBJCLOSE))
438 		_audit_objclose(auditors->ad_list, lmp);
439 	if (AUDITORS(clmp) &&
440 	    (AUDITORS(clmp)->ad_flags & LML_TFLG_AUD_OBJCLOSE))
441 		_audit_objclose(AUDITORS(clmp)->ad_list, lmp);
442 
443 	if (appl)
444 		rtld_flags &= ~RT_FL_APPLIC;
445 }
446 
447 /*
448  * la_pltenter() caller.  Traverse through all audit library and call any
449  * la_pltenter() entry points found.  NOTE: this routine is called via the
450  * glue code established in elf_plt_trace_write(), the symbol descriptor is
451  * created as part of the glue and for 32bit environments the st_name is a
452  * pointer to the real symbol name (ie. it's already been adjusted with the
453  * objects base offset).  For 64bit environments the st_name remains the
454  * original symbol offset and in this case it is used to compute the real name
455  * pointer and pass as a separate argument to the auditor.
456  */
457 static void
458 _audit_pltenter(APlist *list, Rt_map *rlmp, Rt_map *dlmp, Sym *sym,
459     uint_t ndx, void *regs, uint_t *flags)
460 {
461 	Audit_list	*alp;
462 	Aliste		idx;
463 #if	defined(_ELF64)
464 	const char	*name = (const char *)(sym->st_name + STRTAB(dlmp));
465 #else
466 	const char	*name = (const char *)(sym->st_name);
467 #endif
468 
469 	for (APLIST_TRAVERSE(list, idx, alp)) {
470 		Audit_client	*racp, *dacp;
471 		Addr		prev = sym->st_value;
472 
473 		if (alp->al_pltenter == 0)
474 			continue;
475 		if ((racp = _audit_client(AUDINFO(rlmp), alp->al_lmp)) == NULL)
476 			continue;
477 		if ((dacp = _audit_client(AUDINFO(dlmp), alp->al_lmp)) == NULL)
478 			continue;
479 		if (((racp->ac_flags & FLG_AC_BINDFROM) == 0) ||
480 		    ((dacp->ac_flags & FLG_AC_BINDTO) == 0))
481 			continue;
482 
483 		leave(LIST(alp->al_lmp), thr_flg_reenter);
484 		sym->st_value = (Addr)(*alp->al_pltenter)(sym, ndx,
485 		    &(racp->ac_cookie), &(dacp->ac_cookie), regs,
486 		/* BEGIN CSTYLED */
487 #if	defined(_ELF64)
488 		    flags, name);
489 #else
490 		    flags);
491 #endif
492 		/* END CSTYLED */
493 		(void) enter(thr_flg_reenter);
494 
495 		DBG_CALL(Dbg_audit_symval(LIST(alp->al_lmp), alp->al_libname,
496 		    MSG_ORIG(MSG_AUD_PLTENTER), name, prev, sym->st_name));
497 	}
498 }
499 
500 Addr
501 audit_pltenter(Rt_map *rlmp, Rt_map *dlmp, Sym *sym, uint_t ndx,
502     void *regs, uint_t *flags)
503 {
504 	Sym	_sym = *sym;
505 	int	_appl = 0;
506 
507 	if (rt_critical())
508 		return (_sym.st_value);
509 
510 	/*
511 	 * We're effectively entering ld.so.1 from user (glue) code.
512 	 */
513 	(void) enter(0);
514 	if ((rtld_flags & RT_FL_APPLIC) == 0)
515 		_appl = rtld_flags |= RT_FL_APPLIC;
516 
517 	if (auditors && (auditors->ad_flags & LML_TFLG_AUD_PLTENTER))
518 		_audit_pltenter(auditors->ad_list, rlmp, dlmp, &_sym,
519 		    ndx, regs, flags);
520 	if (AUDITORS(rlmp) &&
521 	    (AUDITORS(rlmp)->ad_flags & LML_TFLG_AUD_PLTENTER))
522 		_audit_pltenter(AUDITORS(rlmp)->ad_list, rlmp, dlmp, &_sym,
523 		    ndx, regs, flags);
524 
525 	if (_appl)
526 		rtld_flags &= ~RT_FL_APPLIC;
527 	leave(LIST(rlmp), 0);
528 
529 	return (_sym.st_value);
530 }
531 
532 /*
533  * la_pltexit() caller.  Traverse through all audit library and call any
534  * la_pltexit() entry points found.  See notes above (_audit_pltenter) for
535  * discussion on st_name.
536  */
537 static Addr
538 _audit_pltexit(APlist *list, uintptr_t retval, Rt_map *rlmp, Rt_map *dlmp,
539     Sym *sym, uint_t ndx)
540 {
541 	Audit_list	*alp;
542 	Aliste		idx;
543 #if	defined(_ELF64)
544 	const char	*name = (const char *)(sym->st_name + STRTAB(dlmp));
545 #endif
546 
547 	for (APLIST_TRAVERSE(list, idx, alp)) {
548 		Audit_client	*racp, *dacp;
549 
550 		if (alp->al_pltexit == 0)
551 			continue;
552 		if ((racp = _audit_client(AUDINFO(rlmp), alp->al_lmp)) == NULL)
553 			continue;
554 		if ((dacp = _audit_client(AUDINFO(dlmp), alp->al_lmp)) == NULL)
555 			continue;
556 		if (((racp->ac_flags & FLG_AC_BINDFROM) == 0) ||
557 		    ((dacp->ac_flags & FLG_AC_BINDTO) == 0))
558 			continue;
559 
560 		leave(LIST(alp->al_lmp), thr_flg_reenter);
561 		retval = (*alp->al_pltexit)(sym, ndx,
562 		    &(racp->ac_cookie), &(dacp->ac_cookie),
563 		/* BEGIN CSTYLED */
564 #if	defined(_ELF64)
565 		    retval, name);
566 #else
567 		    retval);
568 #endif
569 		/* END CSTYLED */
570 		(void) enter(thr_flg_reenter);
571 	}
572 	return (retval);
573 }
574 
575 Addr
576 audit_pltexit(uintptr_t retval, Rt_map *rlmp, Rt_map *dlmp, Sym *sym,
577     uint_t ndx)
578 {
579 	uintptr_t	_retval = retval;
580 	int		_appl = 0;
581 
582 	if (rt_critical())
583 		return (_retval);
584 
585 	/*
586 	 * We're effectively entering ld.so.1 from user (glue) code.
587 	 */
588 	(void) enter(0);
589 	if ((rtld_flags & RT_FL_APPLIC) == 0)
590 		_appl = rtld_flags |= RT_FL_APPLIC;
591 
592 	if (auditors && (auditors->ad_flags & LML_TFLG_AUD_PLTEXIT))
593 		_retval = _audit_pltexit(auditors->ad_list, _retval,
594 		    rlmp, dlmp, sym, ndx);
595 	if (AUDITORS(rlmp) && (AUDITORS(rlmp)->ad_flags & LML_TFLG_AUD_PLTEXIT))
596 		_retval = _audit_pltexit(AUDITORS(rlmp)->ad_list, _retval,
597 		    rlmp, dlmp, sym, ndx);
598 
599 	if (_appl)
600 		rtld_flags &= ~RT_FL_APPLIC;
601 	leave(LIST(rlmp), 0);
602 
603 	return (_retval);
604 }
605 
606 
607 /*
608  * la_symbind() caller.  Traverse through all audit library and call any
609  * la_symbind() entry points found.
610  */
611 static Addr
612 _audit_symbind(APlist *list, Rt_map *rlmp, Rt_map *dlmp, Sym *sym, uint_t ndx,
613     uint_t *flags, int *called)
614 {
615 	Audit_list	*alp;
616 	Aliste		idx;
617 #if	defined(_ELF64)
618 	const char	*name = (const char *)(sym->st_name + STRTAB(dlmp));
619 #else
620 	const char	*name = (const char *)(sym->st_name);
621 #endif
622 
623 	for (APLIST_TRAVERSE(list, idx, alp)) {
624 		Audit_client	*racp, *dacp;
625 		Addr		prev = sym->st_value;
626 		uint_t		lflags;
627 
628 		if (alp->al_symbind == 0)
629 			continue;
630 		if ((racp = _audit_client(AUDINFO(rlmp), alp->al_lmp)) == NULL)
631 			continue;
632 		if ((dacp = _audit_client(AUDINFO(dlmp), alp->al_lmp)) == NULL)
633 			continue;
634 		if (((racp->ac_flags & FLG_AC_BINDFROM) == 0) ||
635 		    ((dacp->ac_flags & FLG_AC_BINDTO) == 0))
636 			continue;
637 
638 		/*
639 		 * The la_symbind interface is only called when the calling
640 		 * object has been identified as BINDFROM, and the destination
641 		 * object has been identified as BINDTO.  Use a local version of
642 		 * the flags, so that any user update can be collected.
643 		 */
644 		called++;
645 		lflags = (*flags & ~(LA_SYMB_NOPLTENTER | LA_SYMB_NOPLTEXIT));
646 
647 		leave(LIST(alp->al_lmp), thr_flg_reenter);
648 		sym->st_value = (*alp->al_symbind)(sym, ndx,
649 		    &(racp->ac_cookie), &(dacp->ac_cookie),
650 		/* BEGIN CSTYLED */
651 #if	defined(_ELF64)
652 		    &lflags, name);
653 #else
654 		    &lflags);
655 #endif
656 		/* END CSTYLED */
657 		(void) enter(thr_flg_reenter);
658 
659 		/*
660 		 * If the auditor indicated that they did not want to process
661 		 * pltenter, or pltexit audits for this symbol, retain this
662 		 * information.  Also retain whether an alternative symbol value
663 		 * has been supplied.
664 		 */
665 		*flags |= (lflags & (LA_SYMB_NOPLTENTER | LA_SYMB_NOPLTEXIT));
666 		if ((prev != sym->st_value) && (alp->al_vernum >= LAV_VERSION2))
667 			*flags |= LA_SYMB_ALTVALUE;
668 
669 		DBG_CALL(Dbg_audit_symval(LIST(alp->al_lmp), alp->al_libname,
670 		    MSG_ORIG(MSG_AUD_SYMBIND), name, prev, sym->st_value));
671 	}
672 	return (sym->st_value);
673 }
674 
675 Addr
676 audit_symbind(Rt_map *rlmp, Rt_map *dlmp, Sym *sym, uint_t ndx, Addr value,
677     uint_t *flags)
678 {
679 	Sym	_sym;
680 	int	_appl = 0, called = 0;
681 
682 	/*
683 	 * Construct a new symbol from that supplied but with the real address.
684 	 * In the 64-bit world the st_name field is only 32-bits which isn't
685 	 * big enough to hold a character pointer. We pass this pointer as a
686 	 * separate parameter for 64-bit audit libraries.
687 	 */
688 	_sym = *sym;
689 	_sym.st_value = value;
690 
691 	if (rt_critical())
692 		return (_sym.st_value);
693 
694 #if	!defined(_ELF64)
695 	_sym.st_name += (Word)STRTAB(dlmp);
696 #endif
697 	if ((rtld_flags & RT_FL_APPLIC) == 0)
698 		_appl = rtld_flags |= RT_FL_APPLIC;
699 
700 	if (auditors && (auditors->ad_flags & LML_TFLG_AUD_SYMBIND))
701 		_sym.st_value = _audit_symbind(auditors->ad_list,
702 		    rlmp, dlmp, &_sym, ndx, flags, &called);
703 	if (AUDITORS(rlmp) && (AUDITORS(rlmp)->ad_flags & LML_TFLG_AUD_SYMBIND))
704 		_sym.st_value = _audit_symbind(AUDITORS(rlmp)->ad_list,
705 		    rlmp, dlmp, &_sym, ndx, flags, &called);
706 
707 	/*
708 	 * If no la_symbind() was called for this interface, fabricate that no
709 	 * la_pltenter, or la_pltexit is required.  This helps reduce the glue
710 	 * code created for further auditing.
711 	 */
712 	if (caller == 0)
713 		*flags |= (LA_SYMB_NOPLTENTER | LA_SYMB_NOPLTEXIT);
714 
715 	if (_appl)
716 		rtld_flags &= ~RT_FL_APPLIC;
717 
718 	return (_sym.st_value);
719 }
720 
721 /*
722  * la_preinit() caller.  Traverse through all audit libraries and call any
723  * la_preinit() entry points found.
724  */
725 static void
726 _audit_preinit(APlist *list, Rt_map *clmp)
727 {
728 	Audit_list	*alp;
729 	Aliste		idx;
730 
731 	for (APLIST_TRAVERSE(list, idx, alp)) {
732 		Audit_client	*acp;
733 
734 		if (alp->al_preinit == 0)
735 			continue;
736 		if ((acp = _audit_client(AUDINFO(clmp), alp->al_lmp)) == NULL)
737 			continue;
738 
739 		leave(LIST(alp->al_lmp), thr_flg_reenter);
740 		(*alp->al_preinit)(&(acp->ac_cookie));
741 		(void) enter(thr_flg_reenter);
742 	}
743 }
744 
745 void
746 audit_preinit(Rt_map *clmp)
747 {
748 	int	appl = 0;
749 
750 	if (rt_critical())
751 		return;
752 
753 	if ((rtld_flags & RT_FL_APPLIC) == 0)
754 		appl = rtld_flags |= RT_FL_APPLIC;
755 
756 	if (auditors && (auditors->ad_flags & LML_TFLG_AUD_PREINIT))
757 		_audit_preinit(auditors->ad_list, clmp);
758 	if (AUDITORS(clmp) && (AUDITORS(clmp)->ad_flags & LML_TFLG_AUD_PREINIT))
759 		_audit_preinit(AUDITORS(clmp)->ad_list, clmp);
760 
761 	if (appl)
762 		rtld_flags &= ~RT_FL_APPLIC;
763 }
764 
765 /*
766  * Clean up (free) an audit descriptor.  First, gather a list of all handles,
767  * and then close each one down.  This is done rather than using the handles
768  * directly from the auditors, as the audit list can be torn down as a result
769  * of the dlclose.  In other words, what you're pointing at can be removed
770  * while your still pointing at it.
771  */
772 void
773 audit_desc_cleanup(Rt_map *clmp)
774 {
775 	Audit_desc	*adp = AUDITORS(clmp);
776 	Audit_list	*alp;
777 	Aliste		idx;
778 	APlist		*ghalp = NULL;
779 
780 	if (adp == NULL)
781 		return;
782 	if (adp->ad_name)
783 		free(adp->ad_name);
784 
785 	for (APLIST_TRAVERSE(adp->ad_list, idx, alp))
786 		(void) aplist_append(&ghalp, alp->al_ghp, AL_CNT_GROUPS);
787 
788 	free(adp->ad_list);
789 	adp->ad_list = NULL;
790 
791 	free(adp);
792 	AUDITORS(clmp) = NULL;
793 
794 	if (ghalp) {
795 		Grp_hdl		*ghp;
796 		Aliste		idx;
797 
798 		for (APLIST_TRAVERSE(ghalp, idx, ghp)) {
799 			(void) dlclose_intn(ghp, clmp);
800 		}
801 		free(ghalp);
802 	}
803 }
804 
805 /*
806  * Clean up (free) an audit information structure.
807  */
808 void
809 audit_info_cleanup(Rt_map *clmp)
810 {
811 	Audit_info	*aip = AUDINFO(clmp);
812 
813 	if (aip == NULL)
814 		return;
815 
816 	if (aip->ai_dynplts)
817 		free(aip->ai_dynplts);
818 	free(aip);
819 }
820 
821 /*
822  * Create a data structure of symbol lookup names and associated flags to help
823  * simplify audit_symget() use.
824  */
825 typedef struct {
826 	Msg	sname;
827 	uint_t	alflag;
828 	uint_t	auflag;
829 } Aud_info;
830 
831 static const Aud_info aud_info[] = {
832 	{ MSG_SYM_LAVERSION,	0 },	/* MSG_ORIG(MSG_SYM_LAVERSION) */
833 	{ MSG_SYM_LAPREINIT,		/* MSG_ORIG(MSG_SYM_LAPREINIT) */
834 	    LML_TFLG_AUD_PREINIT, 0 },
835 	{ MSG_SYM_LAOBJSEARCH,		/* MSG_ORIG(MSG_SYM_LAOBJSEARCH) */
836 	    LML_TFLG_AUD_OBJSEARCH, 0 },
837 	{ MSG_SYM_LAOBJOPEN,		/* MSG_ORIG(MSG_SYM_LAOBJOPEN) */
838 	    LML_TFLG_AUD_OBJOPEN, 0 },
839 	{ MSG_SYM_LAOBJFILTER,		/* MSG_ORIG(MSG_SYM_LAOBJFILTER */
840 	    LML_TFLG_AUD_OBJFILTER, 0 },
841 	{ MSG_SYM_LAOBJCLOSE,		/* MSG_ORIG(MSG_SYM_LAOBJCLOSE) */
842 	    LML_TFLG_AUD_OBJCLOSE, 0 },
843 	{ MSG_SYM_LAACTIVITY,		/* MSG_ORIG(MSG_SYM_LAACTIVITY) */
844 	    LML_TFLG_AUD_ACTIVITY, 0 },
845 
846 #if	defined(_ELF64)
847 	{ MSG_SYM_LASYMBIND_64,		/* MSG_ORIG(MSG_SYM_LASYMBIND_64) */
848 #else
849 	{ MSG_SYM_LASYMBIND,		/* MSG_ORIG(MSG_SYM_LASYMBIND) */
850 #endif
851 	    LML_TFLG_AUD_SYMBIND, 0 },
852 
853 #if	defined(__sparcv9)
854 	{ MSG_SYM_LAV9PLTENTER,		/* MSG_ORIG(MSG_SYM_LAV9PLTENTER) */
855 #elif   defined(__sparc)
856 	{ MSG_SYM_LAV8PLTENTER,		/* MSG_ORIG(MSG_SYM_LAV8PLTENTER) */
857 #elif	defined(__amd64)
858 	{ MSG_SYM_LAAMD64PLTENTER, /* MSG_ORIG(MSG_SYM_LAAMD64PLTENTER) */
859 #elif	defined(__i386)
860 	{ MSG_SYM_LAX86PLTENTER,	/* MSG_ORIG(MSG_SYM_LAX86PLTENTER) */
861 #else
862 #error platform not defined!
863 #endif
864 	    LML_TFLG_AUD_PLTENTER, AF_PLTENTER },
865 
866 #if	defined(_ELF64)
867 	{ MSG_SYM_LAPLTEXIT_64,		/* MSG_ORIG(MSG_SYM_LAPLTEXIT_64) */
868 #else
869 	{ MSG_SYM_LAPLTEXIT,		/* MSG_ORIG(MSG_SYM_LAPLTEXIT) */
870 #endif
871 	    LML_TFLG_AUD_PLTEXIT, AF_PLTEXIT }
872 };
873 
874 #define	AI_LAVERSION	0
875 #define	AI_LAPREINIT	1
876 #define	AI_LAOBJSEARCH	2
877 #define	AI_LAOBJOPEN	3
878 #define	AI_LAOBJFILTER	4
879 #define	AI_LAOBJCLOSE	5
880 #define	AI_LAACTIVITY	6
881 #define	AI_LASYMBIND	7
882 #define	AI_LAPLTENTER	8
883 #define	AI_LAPLTEXIT	9
884 
885 static Addr
886 audit_symget(Audit_list *alp, int info, int *in_nfavl)
887 {
888 	Rt_map		*_lmp, *lmp = alp->al_lmp;
889 	const char	*sname = MSG_ORIG(aud_info[info].sname);
890 	uint_t		alflag = aud_info[info].alflag;
891 	uint_t		auflag = aud_info[info].auflag;
892 	uint_t		binfo;
893 	Sym		*sym;
894 	Slookup		sl;
895 
896 	/*
897 	 * Initialize the symbol lookup data structure.
898 	 */
899 	SLOOKUP_INIT(sl, sname, lml_rtld.lm_head, lmp, ld_entry_cnt,
900 	    0, 0, 0, 0, LKUP_FIRST);
901 
902 	if (sym = LM_LOOKUP_SYM(lmp)(&sl, &_lmp, &binfo, in_nfavl)) {
903 		Addr	addr = sym->st_value;
904 
905 		if (!(FLAGS(lmp) & FLG_RT_FIXED))
906 			addr += ADDR(lmp);
907 
908 		if (alflag)
909 			alp->al_flags |= alflag;
910 		if (auflag)
911 			audit_flags |= auflag;
912 
913 		DBG_CALL(Dbg_audit_interface(LIST(alp->al_lmp),
914 		    alp->al_libname, sname));
915 		return (addr);
916 	} else
917 		return (0);
918 }
919 
920 /*
921  * Centralize cleanup routines.
922  */
923 static int
924 audit_disable(char *name, Rt_map *clmp, Grp_hdl *ghp, Audit_list *alp)
925 {
926 	eprintf(LIST(clmp), ERR_FATAL, MSG_INTL(MSG_AUD_DISABLED), name);
927 	if (ghp)
928 		(void) dlclose_intn(ghp, clmp);
929 	if (alp)
930 		free(alp);
931 
932 	return (0);
933 }
934 
935 /*
936  * Given a list of one or more audit libraries, open each one and establish a
937  * a descriptor representing the entry points it provides.
938  */
939 int
940 audit_setup(Rt_map *clmp, Audit_desc *adp, uint_t orig, int *in_nfavl)
941 {
942 	char	*ptr, *next;
943 	Lm_list	*clml = LIST(clmp);
944 	int	error = 1;
945 
946 	DBG_CALL(Dbg_audit_lib(clml, adp->ad_name));
947 
948 	/*
949 	 * Mark that we have at least one auditing link map
950 	 */
951 	rtld_flags2 |= RT_FL2_HASAUDIT;
952 
953 	/*
954 	 * The audit definitions may be a list (which will already have been
955 	 * dupped) so split it into individual tokens.
956 	 */
957 	for (ptr = strtok_r(adp->ad_name, MSG_ORIG(MSG_STR_DELIMIT), &next);
958 	    ptr; ptr = strtok_r(NULL,  MSG_ORIG(MSG_STR_DELIMIT), &next)) {
959 		Grp_hdl		*ghp;
960 		Rt_map		*lmp;
961 		Rt_map		**tobj;
962 		Audit_list	*alp;
963 
964 		/*
965 		 * Open the audit library on its own link-map.
966 		 */
967 		if ((ghp = dlmopen_intn((Lm_list *)LM_ID_NEWLM, ptr,
968 		    (RTLD_FIRST | RTLD_GLOBAL | RTLD_WORLD), clmp,
969 		    FLG_RT_AUDIT, orig)) == NULL) {
970 			error = audit_disable(ptr, clmp, 0, 0);
971 			continue;
972 		}
973 		lmp = ghp->gh_ownlmp;
974 
975 		/*
976 		 * If this auditor has already been loaded, reuse it.
977 		 */
978 		if ((alp = LIST(lmp)->lm_alp) != NULL) {
979 			if (aplist_append(&(adp->ad_list), alp,
980 			    AL_CNT_AUDITORS) == NULL)
981 				return (audit_disable(ptr, clmp, ghp, alp));
982 
983 			adp->ad_cnt++;
984 			DBG_CALL(Dbg_audit_version(clml, alp->al_libname,
985 			    alp->al_vernum));
986 			adp->ad_flags |= alp->al_flags;
987 			continue;
988 		}
989 
990 		/*
991 		 * Prior to the Unified Process Model (UPM) environment, an
992 		 * rtld lock had to be held upon leave().  However, even within
993 		 * a UPM environment, an old auditor, that has a lazy dependency
994 		 * on libc, is still a possibility.  As libc isn't loaded, we
995 		 * don't know the process model, and will determine this later.
996 		 * Refer to external.c:get_lcinterface().
997 		 */
998 		if ((rtld_flags2 & RT_FL2_UNIFPROC) == 0)
999 			LIST(lmp)->lm_flags |= LML_FLG_HOLDLOCK;
1000 
1001 		/*
1002 		 * Allocate an audit list descriptor for this object and
1003 		 * search for all known entry points.
1004 		 */
1005 		if ((alp = calloc(1, sizeof (Audit_list))) == NULL)
1006 			return (audit_disable(ptr, clmp, ghp, 0));
1007 
1008 		alp->al_libname = NAME(lmp);
1009 		alp->al_lmp = lmp;
1010 		alp->al_ghp = ghp;
1011 
1012 		/*
1013 		 * All audit libraries must handshake through la_version().
1014 		 * Determine that the symbol exists, finish initializing the
1015 		 * object, and then call the function.
1016 		 */
1017 		if ((alp->al_version = (uint_t(*)())audit_symget(alp,
1018 		    AI_LAVERSION, in_nfavl)) == 0) {
1019 			eprintf(LIST(lmp), ERR_FATAL, MSG_INTL(MSG_GEN_NOSYM),
1020 			    MSG_ORIG(MSG_SYM_LAVERSION));
1021 			error = audit_disable(ptr, clmp, ghp, alp);
1022 			continue;
1023 		}
1024 
1025 		if ((tobj = tsort(lmp, LIST(lmp)->lm_init, RT_SORT_REV)) ==
1026 		    (Rt_map **)S_ERROR)
1027 			return (audit_disable(ptr, clmp, ghp, alp));
1028 
1029 		rtld_flags |= RT_FL_APPLIC;
1030 		if (tobj != (Rt_map **)NULL)
1031 			call_init(tobj, DBG_INIT_SORT);
1032 
1033 		alp->al_vernum = alp->al_version(LAV_CURRENT);
1034 		rtld_flags &= ~RT_FL_APPLIC;
1035 
1036 		if ((alp->al_vernum < LAV_VERSION1) ||
1037 		    (alp->al_vernum > LAV_CURRENT)) {
1038 			eprintf(LIST(lmp), ERR_FATAL, MSG_INTL(MSG_AUD_BADVERS),
1039 			    LAV_CURRENT, alp->al_vernum);
1040 			error = audit_disable(ptr, clmp, ghp, alp);
1041 			continue;
1042 		}
1043 
1044 		if (aplist_append(&(adp->ad_list), alp,
1045 		    AL_CNT_AUDITORS) == NULL)
1046 			return (audit_disable(ptr, clmp, ghp, alp));
1047 
1048 		adp->ad_cnt++;
1049 		DBG_CALL(Dbg_audit_version(clml, alp->al_libname,
1050 		    alp->al_vernum));
1051 
1052 		/*
1053 		 * Collect any remaining entry points.
1054 		 */
1055 		alp->al_preinit = (void(*)())audit_symget(alp,
1056 		    AI_LAPREINIT, in_nfavl);
1057 		alp->al_objsearch = (char *(*)())audit_symget(alp,
1058 		    AI_LAOBJSEARCH, in_nfavl);
1059 		alp->al_objopen = (uint_t(*)())audit_symget(alp,
1060 		    AI_LAOBJOPEN, in_nfavl);
1061 		alp->al_objfilter = (int(*)())audit_symget(alp,
1062 		    AI_LAOBJFILTER, in_nfavl);
1063 		alp->al_objclose = (uint_t(*)())audit_symget(alp,
1064 		    AI_LAOBJCLOSE, in_nfavl);
1065 		alp->al_activity = (void (*)())audit_symget(alp,
1066 		    AI_LAACTIVITY, in_nfavl);
1067 		alp->al_symbind = (uintptr_t(*)())audit_symget(alp,
1068 		    AI_LASYMBIND, in_nfavl);
1069 		alp->al_pltenter = (uintptr_t(*)())audit_symget(alp,
1070 		    AI_LAPLTENTER, in_nfavl);
1071 		alp->al_pltexit = (uintptr_t(*)())audit_symget(alp,
1072 		    AI_LAPLTEXIT, in_nfavl);
1073 
1074 		/*
1075 		 * Collect the individual object flags, and assign this audit
1076 		 * list descriptor to its associated link-map list.
1077 		 */
1078 		adp->ad_flags |= alp->al_flags;
1079 		LIST(lmp)->lm_alp = alp;
1080 	}
1081 
1082 	/*
1083 	 * Free the original audit string, as this descriptor may be used again
1084 	 * to add additional auditing.
1085 	 */
1086 	free(adp->ad_name);
1087 	adp->ad_name = NULL;
1088 
1089 	return (error);
1090 }
1091