* directory or online at http://www.openafs.org/dl/license10.html
*/
+#include <afsconfig.h>
#include <afs/param.h>
+
+RCSID
+ ("$Header$");
+
#include <fcntl.h>
#include <stdarg.h>
+#include <string.h>
+#include <sys/types.h>
+#include <sys/stat.h>
+#include <unistd.h>
#ifdef AFS_AIX32_ENV
#include <sys/audit.h>
+#else
+#define AUDIT_OK 0
+#define AUDIT_FAIL 1
+#define AUDIT_FAIL_AUTH 2
+#define AUDIT_FAIL_ACCESS 3
+#define AUDIT_FAIL_PRIV 4
#endif /* AFS_AIX32_ENV */
#include <errno.h>
#endif
#include <afs/afsutil.h>
-char *bufferPtr;
-int bufferLen;
-int osi_audit_all = (-1); /* Not determined yet */
-int osi_echo_trail = (-1);
+/* C99 requires va_copy. Older versions of GCC provide __va_copy. Per t
+ Autoconf manual, memcpy is a generally portable fallback. */
+#ifndef va_copy
+# ifdef __va_copy
+# define va_copy(d, s) __va_copy((d), (s))
+# else
+# define va_copy(d, s) memcpy(&(d), &(s), sizeof(va_list))
+# endif
+#endif
-#ifdef AFS_AIX_ENV /** all these functions are only defined for AIX */
+char *bufferPtr;
+int bufferLen;
+int osi_audit_all = (-1); /* Not determined yet */
+int osi_echo_trail = (-1);
-#ifndef AFS_OSF_ENV
-/*
- * These variadic functions work under AIX, and not all systems (osf1)
- */
-/* ************************************************************************** */
-/* AIX requires a buffer filled with values to record with each audit event.
- * aixmakebuf creates that buffer from the variable list of values we are given.
- * ************************************************************************** */
-static aixmakebuf (audEvent, vaList)
- char *audEvent;
- char *vaList;
-{
- int code;
- int vaEntry;
- int vaInt;
- afs_int32 vaLong;
- char *vaStr;
- char *vaLst;
- char hname[20];
- struct AFSFid *vaFid;
-
- vaEntry = va_arg(vaList, int);
- while ( vaEntry != AUD_END )
- {
- switch (vaEntry)
- {
- case AUD_STR : /* String */
- vaStr = (char *) va_arg(vaList, int);
- if ( vaStr )
- {
- strcpy (bufferPtr, vaStr);
- bufferPtr += strlen(vaStr) + 1;
- }
- else
- {
- strcpy (bufferPtr, "");
- bufferPtr++;
- }
- break;
- case AUD_INT : /* Integer */
- vaInt = va_arg(vaList, int);
- *(int *)bufferPtr = vaInt;
- bufferPtr += sizeof(vaInt);
- break;
- case AUD_DATE : /* Date */
- case AUD_HOST : /* Host ID */
- case AUD_LONG : /* long */
- vaLong = va_arg(vaList, afs_int32);
- *(afs_int32 *)bufferPtr = vaLong;
- bufferPtr += sizeof(vaLong);
- break;
- case AUD_LST : /* Ptr to another list */
- vaLst = (char *) va_arg(vaList, int);
- aixmakebuf(audEvent, vaLst);
- break;
- case AUD_FID : /* AFSFid - contains 3 entries */
- vaFid = (struct AFSFid *) va_arg(vaList, int);
- if (vaFid) {
- bcopy(vaFid, bufferPtr, sizeof(struct AFSFid));
- }
- else {
- bzero (bufferPtr, sizeof(struct AFSFid));
- }
- bufferPtr += sizeof(struct AFSFid);
- break;
+FILE *auditout = NULL;
- /* Whole array of fids-- don't know how to handle variable length audit
- * data with AIX audit package, so for now we just store the first fid.
- * Better one than none. */
- case AUD_FIDS :
- {
- struct AFSCBFids *Fids;
-
- Fids = (struct AFSCBFids *) va_arg(vaList, int);
- if (Fids && Fids->AFSCBFids_len) {
- *((u_int *)bufferPtr) = Fids->AFSCBFids_len;
- bufferPtr += sizeof(u_int);
- bcopy(Fids->AFSCBFids_val, bufferPtr, sizeof(struct AFSFid));
- }
- else {
- struct AFSFid dummy;
- *((u_int *)bufferPtr) = 0;
- bufferPtr += sizeof(u_int);
- bzero (bufferPtr, sizeof(struct AFSFid));
- }
- bufferPtr += sizeof(struct AFSFid);
- break;
- }
- default:
+int osi_audit_check();
+
+static void
+audmakebuf(char *audEvent, va_list vaList)
+{
#ifdef AFS_AIX32_ENV
- code = auditlog("AFS_Aud_EINVAL", (-1), audEvent, (strlen(audEvent)+1));
+ int code;
#endif
- return;
- break;
- } /* end switch */
+ int vaEntry;
+ int vaInt;
+ afs_int32 vaLong;
+ char *vaStr;
+ va_list vaLst;
+ struct AFSFid *vaFid;
+
+ vaEntry = va_arg(vaList, int);
+ while (vaEntry != AUD_END) {
+ switch (vaEntry) {
+ case AUD_STR: /* String */
+ case AUD_NAME: /* Name */
+ case AUD_ACL: /* ACL */
+ vaStr = (char *)va_arg(vaList, char *);
+ if (vaStr) {
+ strcpy(bufferPtr, vaStr);
+ bufferPtr += strlen(vaStr) + 1;
+ } else {
+ strcpy(bufferPtr, "");
+ bufferPtr++;
+ }
+ break;
+ case AUD_INT: /* Integer */
+ case AUD_ID: /* ViceId */
+ vaInt = va_arg(vaList, int);
+ *(int *)bufferPtr = vaInt;
+ bufferPtr += sizeof(vaInt);
+ break;
+ case AUD_DATE: /* Date */
+ case AUD_HOST: /* Host ID */
+ case AUD_LONG: /* long */
+ vaLong = va_arg(vaList, afs_int32);
+ *(afs_int32 *) bufferPtr = vaLong;
+ bufferPtr += sizeof(vaLong);
+ break;
+ case AUD_FID: /* AFSFid - contains 3 entries */
+ vaFid = (struct AFSFid *)va_arg(vaList, struct AFSFid *);
+ if (vaFid) {
+ memcpy(bufferPtr, vaFid, sizeof(struct AFSFid));
+ } else {
+ memset(bufferPtr, 0, sizeof(struct AFSFid));
+ }
+ bufferPtr += sizeof(struct AFSFid);
+ break;
+
+ /* Whole array of fids-- don't know how to handle variable length audit
+ * data with AIX audit package, so for now we just store the first fid.
+ * Better one than none. */
+ case AUD_FIDS:
+ {
+ struct AFSCBFids *Fids;
+
+ Fids = (struct AFSCBFids *)va_arg(vaList, struct AFSCBFids *);
+ if (Fids && Fids->AFSCBFids_len) {
+ *((u_int *) bufferPtr) = Fids->AFSCBFids_len;
+ bufferPtr += sizeof(u_int);
+ memcpy(bufferPtr, Fids->AFSCBFids_val,
+ sizeof(struct AFSFid));
+ } else {
+ *((u_int *) bufferPtr) = 0;
+ bufferPtr += sizeof(u_int);
+ memset(bufferPtr, 0, sizeof(struct AFSFid));
+ }
+ bufferPtr += sizeof(struct AFSFid);
+ break;
+ }
+ default:
+#ifdef AFS_AIX32_ENV
+ code =
+ auditlog("AFS_Aud_EINVAL", (-1), audEvent,
+ (strlen(audEvent) + 1));
+#endif
+ return;
+ break;
+ } /* end switch */
- vaEntry = va_arg(vaList, int);
- } /* end while */
+ vaEntry = va_arg(vaList, int);
+ } /* end while */
}
-static printbuf (audEvent, errCode, vaList)
- char *audEvent;
- afs_int32 errCode;
- char *vaList;
+static void
+printbuf(FILE *out, int rec, char *audEvent, char *afsName, afs_int32 hostId,
+ afs_int32 errCode, va_list vaList)
{
- int vaEntry;
- int vaInt;
- afs_int32 vaLong;
- char *vaStr;
- char *vaLst;
- char hname[20];
- struct AFSFid *vaFid;
- struct AFSCBFids *vaFids;
-
- if ( osi_echo_trail < 0 ) osi_audit_check();
- if ( ! osi_echo_trail ) return;
-
- if ( strcmp(audEvent,"VALST") != 0 )
- printf ("%s %d ", audEvent, errCode);
-
- vaEntry = va_arg(vaList, int);
- while ( vaEntry != AUD_END )
- {
- switch (vaEntry)
- {
- case AUD_STR : /* String */
- vaStr = (char *) va_arg(vaList, int);
- if ( vaStr ) printf("%s ", vaStr);
- else printf("<null>", vaStr);
- break;
- case AUD_INT : /* Integer */
- vaInt = va_arg(vaList, int);
- printf("%d ", vaInt);
- break;
- case AUD_DATE : /* Date */
- case AUD_HOST : /* Host ID */
- vaLong = va_arg(vaList, afs_int32);
- printf("%u ", vaLong);
- break;
- case AUD_LONG : /* afs_int32 */
- vaLong = va_arg(vaList, afs_int32);
- printf("%d ", vaLong);
- break;
- case AUD_LST : /* Ptr to another list */
- vaLst = (char *) va_arg(vaList, int);
- printbuf("VALST", 0, vaLst);
- break;
- case AUD_FID : /* AFSFid - contains 3 entries */
- vaFid = (struct AFSFid *) va_arg(vaList, int);
- if (vaFid) printf ("%u:%u:%u ", vaFid->Volume, vaFid->Vnode, vaFid->Unique);
- else printf ("%u:%u:%u ", 0, 0, 0);
- break;
- case AUD_FIDS : /* array of Fids */
- vaFids = (struct AFSCBFids *) va_arg(vaList, int);
- vaFid = NULL;
-
- if (vaFids)
- vaFid = vaFids->AFSCBFids_val;
- if (vaFid)
- printf ("%u %u:%u:%u ", vaFids->AFSCBFids_len, vaFid->Volume,
- vaFid->Vnode, vaFid->Unique);
- else printf ("0 0:0:0 ");
- break;
- default:
- printf ("--badval-- ");
- break;
- } /* end switch */
- vaEntry = va_arg(vaList, int);
- } /* end while */
+ int vaEntry;
+ int vaInt;
+ afs_int32 vaLong;
+ char *vaStr;
+ va_list vaLst;
+ struct AFSFid *vaFid;
+ struct AFSCBFids *vaFids;
+ int num = LogThreadNum();
+ struct in_addr hostAddr;
+ time_t currenttime;
+ char *timeStamp;
+ char tbuffer[26];
+
+ /* Don't print the timestamp or thread id if we recursed */
+ if (rec == 0) {
+ currenttime = time(0);
+ timeStamp = afs_ctime(¤ttime, tbuffer,
+ sizeof(tbuffer));
+ timeStamp[24] = ' '; /* ts[24] is the newline, 25 is the null */
+ fprintf(out, timeStamp);
+
+ if (num > -1)
+ fprintf(out, "[%d] ", num);
+ }
+
+ fprintf(out, "EVENT %s CODE %d ", audEvent, errCode);
- if ( strcmp(audEvent,"VALST") != 0 )
- printf ("\n");
-}
-#else
-static aixmakebuf (audEvent, vaList)
- char *audEvent;
- va_list vaList;
-{
- return;
+ if (afsName) {
+ hostAddr.s_addr = hostId;
+ fprintf(out, "NAME %s HOST %s ", afsName, inet_ntoa(hostAddr));
+ }
+
+ vaEntry = va_arg(vaList, int);
+ while (vaEntry != AUD_END) {
+ switch (vaEntry) {
+ case AUD_STR: /* String */
+ vaStr = (char *)va_arg(vaList, char *);
+ if (vaStr)
+ fprintf(out, "STR %s ", vaStr);
+ else
+ fprintf(out, "STR <null>");
+ break;
+ case AUD_NAME: /* Name */
+ vaStr = (char *)va_arg(vaList, char *);
+ if (vaStr)
+ fprintf(out, "NAME %s ", vaStr);
+ else
+ fprintf(out, "NAME <null>");
+ break;
+ case AUD_ACL: /* ACL */
+ vaStr = (char *)va_arg(vaList, char *);
+ if (vaStr)
+ fprintf(out, "ACL %s ", vaStr);
+ else
+ fprintf(out, "ACL <null>");
+ break;
+ case AUD_INT: /* Integer */
+ vaInt = va_arg(vaList, int);
+ fprintf(out, "INT %d ", vaInt);
+ break;
+ case AUD_ID: /* ViceId */
+ vaInt = va_arg(vaList, int);
+ fprintf(out, "ID %d ", vaInt);
+ break;
+ case AUD_DATE: /* Date */
+ vaLong = va_arg(vaList, afs_int32);
+ fprintf(out, "DATE %u ", vaLong);
+ break;
+ case AUD_HOST: /* Host ID */
+ vaLong = va_arg(vaList, afs_int32);
+ hostAddr.s_addr = vaLong;
+ fprintf(out, "HOST %s ", inet_ntoa(hostAddr));
+ break;
+ case AUD_LONG: /* afs_int32 */
+ vaLong = va_arg(vaList, afs_int32);
+ fprintf(out, "LONG %d ", vaLong);
+ break;
+ case AUD_FID: /* AFSFid - contains 3 entries */
+ vaFid = va_arg(vaList, struct AFSFid *);
+ if (vaFid)
+ fprintf(out, "FID %u:%u:%u ", vaFid->Volume, vaFid->Vnode,
+ vaFid->Unique);
+ else
+ fprintf(out, "FID %u:%u:%u ", 0, 0, 0);
+ break;
+ case AUD_FIDS: /* array of Fids */
+ vaFids = va_arg(vaList, struct AFSCBFids *);
+
+ if (vaFids) {
+ int i;
+
+ vaFid = vaFids->AFSCBFids_val;
+
+ if (vaFid) {
+ fprintf(out, "FIDS %u FID %u:%u:%u ", vaFids->AFSCBFids_len, vaFid->Volume,
+ vaFid->Vnode, vaFid->Unique);
+ for ( i = 1; i < vaFids->AFSCBFids_len; i++, vaFid++ )
+ fprintf(out, "FID %u:%u:%u ", vaFid->Volume,
+ vaFid->Vnode, vaFid->Unique);
+ } else
+ fprintf(out, "FIDS 0 FID 0:0:0 ");
+
+ }
+ break;
+ default:
+ fprintf(out, "--badval-- ");
+ break;
+ } /* end switch */
+ vaEntry = va_arg(vaList, int);
+ } /* end while */
+
+ fprintf(out, "\n");
}
-static printbuf (audEvent, errCode, vaList)
- char *audEvent;
- long errCode;
- va_list vaList;
+#ifdef AFS_PTHREAD_ENV
+static pthread_mutex_t audit_lock;
+static volatile afs_int32 audit_lock_initialized = 0;
+static pthread_once_t audit_lock_once = PTHREAD_ONCE_INIT;
+
+static void
+osi_audit_init_lock(void)
{
- return;
+ pthread_mutex_init(&audit_lock, NULL);
+ audit_lock_initialized = 1;
}
-
#endif
+void
+osi_audit_init(void)
+{
+#ifdef AFS_PTHREAD_ENV
+ if (!audit_lock_initialized) {
+ pthread_once(&audit_lock_once, osi_audit_init_lock);
+ }
+#endif /* AFS_PTHREAD_ENV */
+}
/* ************************************************************************** */
/* The routine that acually does the audit call.
* ************************************************************************** */
-int osi_audit (char *audEvent, /* Event name (15 chars or less) */
- afs_int32 errCode, /* The error code */
- ...)
+int
+osi_audit_internal(char *audEvent, /* Event name (15 chars or less) */
+ afs_int32 errCode, /* The error code */
+ char *afsName,
+ afs_int32 hostId,
+ va_list vaList)
{
#ifdef AFS_AIX32_ENV
- afs_int32 code;
- afs_int32 err;
- int result;
+ afs_int32 code;
+ afs_int32 err;
+ static char BUFFER[32768];
+#endif
+ int result;
+ va_list vaCopy;
- va_list vaList;
- static struct Lock audbuflock = {0,0,0,0,
#ifdef AFS_PTHREAD_ENV
- PTHREAD_MUTEX_INITIALIZER,
- PTHREAD_COND_INITIALIZER,
- PTHREAD_COND_INITIALIZER
+ /* i'm pretty sure all the server apps now call osi_audit_init(),
+ * but to be extra careful we'll leave this assert in here for a
+ * while to make sure */
+ assert(audit_lock_initialized);
#endif /* AFS_PTHREAD_ENV */
- };
- static char BUFFER[32768];
-
- if ( osi_audit_all < 0 ) osi_audit_check();
- if ( ! osi_audit_all ) return;
-
- switch (errCode)
- {
- case 0 :
- result = AUDIT_OK;
- break;
- case KANOAUTH : /* kautils.h */
- case RXKADNOAUTH : /* rxkad.h */
- result = AUDIT_FAIL_AUTH;
- break;
- case EPERM : /* errno.h */
- case EACCES : /* errno.h */
- case PRPERM : /* pterror.h */
- result = AUDIT_FAIL_ACCESS;
- break;
- case VL_PERM : /* vlserver.h */
- case BUDB_NOTPERMITTED : /* budb_errs.h */
-/* case KRB_RD_AP_UNAUTHOR : */
- case BZACCESS : /* bnode.h */
- case VOLSERBAD_ACCESS : /* volser.h */
- result = AUDIT_FAIL_PRIV;
- break;
+
+ if ((osi_audit_all < 0) || (osi_echo_trail < 0))
+ osi_audit_check();
+ if (!osi_audit_all && !auditout)
+ return 0;
+
+ va_copy(vaCopy, vaList);
+
+ switch (errCode) {
+ case 0:
+ result = AUDIT_OK;
+ break;
+ case KANOAUTH: /* kautils.h */
+ case RXKADNOAUTH: /* rxkad.h */
+ result = AUDIT_FAIL_AUTH;
+ break;
+ case EPERM: /* errno.h */
+ case EACCES: /* errno.h */
+ case PRPERM: /* pterror.h */
+ result = AUDIT_FAIL_ACCESS;
+ break;
+ case VL_PERM: /* vlserver.h */
+ case BUDB_NOTPERMITTED: /* budb_errs.h */
+ case BZACCESS: /* bnode.h */
+ case VOLSERBAD_ACCESS: /* volser.h */
+ result = AUDIT_FAIL_PRIV;
+ break;
default:
- result = AUDIT_FAIL;
- break;
- }
-
- ObtainWriteLock(&audbuflock);
- bufferPtr = BUFFER;
-
- /* Put the error code into the buffer list */
- *(int *)bufferPtr = errCode;
- bufferPtr += sizeof(errCode);
-
- va_start(vaList, errCode);
- aixmakebuf(audEvent, vaList);
-
- va_start(vaList, errCode);
- printbuf(audEvent, errCode, vaList);
-
- bufferLen = (int)((afs_int32)bufferPtr - (afs_int32)&BUFFER[0]);
- code = auditlog (audEvent, result, BUFFER, bufferLen);
-#ifdef notdef
- if (code)
- {
- err = errno;
- code = auditlog ("AFS_Aud_Fail", result, &err, sizeof(err));
- if (code)
- printf("Error while writing audit entry: %d.\n", errno);
- }
-#endif /* notdef */
- ReleaseWriteLock(&audbuflock);
+ result = AUDIT_FAIL;
+ break;
+ }
+
+#ifdef AFS_PTHREAD_ENV
+ pthread_mutex_lock(&audit_lock);
+#endif
+#ifdef AFS_AIX32_ENV
+ bufferPtr = BUFFER;
+
+ /* Put the error code into the buffer list */
+ *(int *)bufferPtr = errCode;
+ bufferPtr += sizeof(errCode);
+
+ audmakebuf(audEvent, vaList);
#endif
+
+ if (osi_echo_trail) {
+ printbuf(stdout, 0, audEvent, afsName, hostId, errCode, vaList);
+ }
+ va_end(vaCopy);
+
+#ifdef AFS_AIX32_ENV
+ bufferLen = (int)((afs_int32) bufferPtr - (afs_int32) & BUFFER[0]);
+ code = auditlog(audEvent, result, BUFFER, bufferLen);
+#else
+ if (auditout) {
+ printbuf(auditout, 0, audEvent, afsName, hostId, errCode, vaList);
+ fflush(auditout);
+ }
+#endif
+#ifdef AFS_PTHREAD_ENV
+ pthread_mutex_unlock(&audit_lock);
+#endif
+
+ return 0;
+}
+int
+osi_audit(char *audEvent, /* Event name (15 chars or less) */
+ afs_int32 errCode, /* The error code */
+ ...)
+{
+ va_list vaList;
+
+ if ((osi_audit_all < 0) || (osi_echo_trail < 0))
+ osi_audit_check();
+ if (!osi_audit_all && !auditout)
+ return 0;
+
+ va_start(vaList, errCode);
+ osi_audit_internal(audEvent, errCode, NULL, 0, vaList);
+ va_end(vaList);
+
+ return 0;
}
/* ************************************************************************** */
/* Given a RPC call structure, this routine extracts the name and host id from the
* call and includes it within the audit information.
* ************************************************************************** */
-int osi_auditU (struct rx_call *call,
- char *audEvent,
- int errCode,
- ...)
+int
+osi_auditU(struct rx_call *call, char *audEvent, int errCode, ...)
{
- struct rx_connection *conn;
- struct rx_peer *peer;
- afs_int32 secClass;
- afs_int32 code;
- char afsName[MAXKTCNAMELEN];
- afs_int32 hostId;
- va_list vaList;
-
-
- if ( osi_audit_all < 0 ) osi_audit_check();
- if ( !osi_audit_all ) return;
-
- strcpy (afsName, "--Unknown--");
- hostId = 0;
-
- if ( call )
- {
- conn = rx_ConnectionOf(call); /* call -> conn) */
- if (conn)
- {
- secClass = rx_SecurityClassOf(conn); /* conn -> securityIndex */
- if (secClass == 0) /* unauthenticated */
- {
- osi_audit ("AFS_Aud_Unauth", (-1), AUD_STR, audEvent, AUD_END);
- strcpy (afsName, "--UnAuth--");
- }
- else if (secClass == 2) /* authenticated */
- {
- code = rxkad_GetServerInfo(conn, (char *)0, (char *)0, afsName,
- (char *)0, (char *)0, (char *)0);
- if (code)
- {
- osi_audit ("AFS_Aud_NoAFSId", (-1), AUD_STR, audEvent, AUD_END);
- strcpy (afsName, "--NoName--");
+ struct rx_connection *conn;
+ struct rx_peer *peer;
+ afs_int32 secClass;
+ afs_int32 code;
+ char afsName[MAXKTCNAMELEN];
+ afs_int32 hostId;
+ va_list vaList;
+
+ if (osi_audit_all < 0)
+ osi_audit_check();
+ if (!osi_audit_all && !auditout)
+ return 0;
+
+ strcpy(afsName, "--Unknown--");
+ hostId = 0;
+
+ if (call) {
+ conn = rx_ConnectionOf(call); /* call -> conn) */
+ if (conn) {
+ secClass = rx_SecurityClassOf(conn); /* conn -> securityIndex */
+ if (secClass == 0) { /* unauthenticated */
+ osi_audit("AFS_Aud_Unauth", (-1), AUD_STR, audEvent, AUD_END);
+ strcpy(afsName, "--UnAuth--");
+ } else if (secClass == 2) { /* authenticated */
+ char tcell[MAXKTCREALMLEN];
+ char name[MAXKTCNAMELEN];
+ char inst[MAXKTCNAMELEN];
+ char vname[256];
+ int ilen, clen;
+
+ code =
+ rxkad_GetServerInfo(conn, NULL, NULL, name, inst, tcell,
+ NULL);
+ if (code) {
+ osi_audit("AFS_Aud_NoAFSId", (-1), AUD_STR, audEvent, AUD_END);
+ strcpy(afsName, "--NoName--");
+ } else {
+ strncpy(vname, name, sizeof(vname));
+ if ((ilen = strlen(inst))) {
+ if (strlen(vname) + 1 + ilen >= sizeof(vname))
+ goto done;
+ strcat(vname, ".");
+ strcat(vname, inst);
+ }
+ if ((clen = strlen(tcell))) {
+#if defined(AFS_ATHENA_STDENV) || defined(AFS_KERBREALM_ENV)
+ static char local_realms[AFS_NUM_LREALMS][AFS_REALM_SZ];
+ static int num_lrealms = -1;
+ int i, lrealm_match;
+
+ if (num_lrealms == -1) {
+ for (i=0; i<AFS_NUM_LREALMS; i++) {
+ if (afs_krb_get_lrealm(local_realms[i], i) != 0 /*KSUCCESS*/)
+ break;
+ }
+
+ if (i == 0)
+ strncpy(local_realms[0], "UNKNOWN.LOCAL.REALM", AFS_REALM_SZ);
+ num_lrealms = i;
+ }
+
+ /* Check to see if the ticket cell matches one of the local realms */
+ lrealm_match = 0;
+ for ( i=0;i<num_lrealms;i++ ) {
+ if (!strcasecmp(local_realms[i], tcell)) {
+ lrealm_match = 1;
+ break;
+ }
+ }
+ /* If yes, then make sure that the name is not present in
+ * an exclusion list */
+ if (lrealm_match) {
+ char uname[256];
+ if (inst[0])
+ snprintf(uname,sizeof(uname),"%s.%s@%s",name,inst,tcell);
+ else
+ snprintf(uname,sizeof(uname),"%s@%s",name,tcell);
+
+ if (afs_krb_exclusion(uname))
+ lrealm_match = 0;
+ }
+
+ if (!lrealm_match) {
+ if (strlen(vname) + 1 + clen >= sizeof(vname))
+ goto done;
+ strcat(vname, "@");
+ strcat(vname, tcell);
+ }
+#endif
+ }
+ strcpy(afsName, vname);
+ }
+ } else { /* Unauthenticated & unknown */
+ osi_audit("AFS_Aud_UnknSec", (-1), AUD_STR, audEvent, AUD_END);
+ strcpy(afsName, "--Unknown--");
+ }
+ done:
+ peer = rx_PeerOf(conn); /* conn -> peer */
+ if (peer)
+ hostId = rx_HostOf(peer); /* peer -> host */
+ else
+ osi_audit("AFS_Aud_NoHost", (-1), AUD_STR, audEvent, AUD_END);
+ } else { /* null conn */
+ osi_audit("AFS_Aud_NoConn", (-1), AUD_STR, audEvent, AUD_END);
}
- }
- else /* Unauthenticated & unknown */
- {
- osi_audit ("AFS_Aud_UnknSec", (-1), AUD_STR, audEvent, AUD_END);
- }
-
- peer = rx_PeerOf(conn); /* conn -> peer */
- if ( peer )
- hostId = rx_HostOf(peer); /* peer -> host */
- else
- osi_audit ("AFS_Aud_NoHost", (-1), AUD_STR, audEvent, AUD_END);
+ } else { /* null call */
+ osi_audit("AFS_Aud_NoCall", (-1), AUD_STR, audEvent, AUD_END);
}
- else /* null conn */
- {
- osi_audit ("AFS_Aud_NoConn", (-1), AUD_STR, audEvent, AUD_END);
- }
- }
- else /* null call */
- {
- osi_audit ("AFS_Aud_NoCall", (-1), AUD_STR, audEvent, AUD_END);
- }
-
- va_start(vaList, errCode);
- osi_audit (audEvent, errCode, AUD_STR, afsName,
- AUD_HOST, hostId,
- AUD_LST, vaList,
- AUD_END);
+ va_start(vaList, errCode);
+ osi_audit_internal(audEvent, errCode, afsName, hostId, vaList);
+ va_end(vaList);
+ return 0;
}
/* ************************************************************************** */
* enabled.
* ************************************************************************** */
-int osi_audit_check ()
+int
+osi_audit_check()
{
- FILE *fds;
- int onoff;
- char event[257];
-
- osi_audit_all = 1; /* say we made check (>= 0) */
- /* and assume audit all events (for now) */
- onoff = 0; /* assume we will turn auditing off */
- osi_echo_trail = 0; /* assume no echoing */
-
- fds = fopen(AFSDIR_SERVER_AUDIT_FILEPATH, "r");
- if (fds)
- {
- while ( fscanf(fds, "%256s", event) > 0)
- {
- if ( strcmp(event,"AFS_AUDIT_AllEvents") == 0 )
- onoff = 1;
+ FILE *fds;
+ int onoff;
+ char event[257];
+
+ osi_audit_all = 1; /* say we made check (>= 0) */
+ /* and assume audit all events (for now) */
+ onoff = 0; /* assume we will turn auditing off */
+ osi_echo_trail = 0; /* assume no echoing */
+
+ fds = fopen(AFSDIR_SERVER_AUDIT_FILEPATH, "r");
+ if (fds) {
+ while (fscanf(fds, "%256s", event) > 0) {
+ if (strcmp(event, "AFS_AUDIT_AllEvents") == 0)
+ onoff = 1;
+
+ if (strcmp(event, "Echo_Trail") == 0)
+ osi_echo_trail = 1;
+ }
+ fclose(fds);
+ }
- if ( strcmp(event,"Echo_Trail") == 0 )
- osi_echo_trail = 1;
- }
- fclose(fds);
- }
+ /* Audit this event all of the time */
+ if (onoff)
+ osi_audit("AFS_Aud_On", 0, AUD_END);
+ else
+ osi_audit("AFS_Aud_Off", 0, AUD_END);
- /* Audit this event all of the time */
- if (onoff) osi_audit("AFS_Aud_On", 0, AUD_END);
- else osi_audit("AFS_Aud_Off", 0, AUD_END);
+ /* Now set whether we audit all events from here on out */
+ osi_audit_all = onoff;
- /* Now set whether we audit all events from here on out */
- osi_audit_all = onoff;
+ return 0;
}
-
-#else /* ! AFS_AIX_ENV */
-
-int osi_audit (char *audEvent, afs_int32 errCode, ...)
-{ return 0; }
-
-int osi_auditU (struct rx_call *call, char *audEvent, int errCode, ...)
-{ return 0; }
-
+int
+osi_audit_file(char *fileName)
+{
+ int tempfd, flags;
+ char oldName[MAXPATHLEN];
+
+#ifndef AFS_NT40_ENV
+ struct stat statbuf;
+
+ if ((lstat(fileName, &statbuf) == 0)
+ && (S_ISFIFO(statbuf.st_mode))) {
+ flags = O_WRONLY | O_NONBLOCK;
+ } else
#endif
-
+ {
+ strcpy(oldName, fileName);
+ strcat(oldName, ".old");
+ renamefile(fileName, oldName);
+ flags = O_WRONLY | O_TRUNC | O_CREAT;
+ }
+ tempfd = open(fileName, flags, 0666);
+ if (tempfd > -1) {
+ auditout = fdopen(tempfd, "a");
+ if (!auditout) {
+ printf("Warning: auditlog %s not writable, ignored.\n", fileName);
+ return 1;
+ }
+ } else {
+ printf("Warning: auditlog %s not writable, ignored.\n", fileName);
+ return 1;
+ }
+ return 0;
+}