1 /* 2 * Copyright (c) 2005 Apple Computer, Inc. 3 * All rights reserved. 4 * 5 * @APPLE_BSD_LICENSE_HEADER_START@ 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the name of Apple Computer, Inc. ("Apple") nor the names of 17 * its contributors may be used to endorse or promote products derived 18 * from this software without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY 21 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 22 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 23 * DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY 24 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES 25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 26 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND 27 * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 28 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 29 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 30 * 31 * @APPLE_BSD_LICENSE_HEADER_END@ 32 * 33 * $P4: //depot/projects/trustedbsd/openbsm/bin/auditd/audit_warn.c#6 $ 34 */ 35 36 #include <sys/types.h> 37 38 #include <stdio.h> 39 #include <stdlib.h> 40 #include <unistd.h> 41 42 #include "auditd.h" 43 44 /* 45 * Write an audit-related error to the system log via syslog(3). 46 */ 47 static int 48 auditwarnlog(char *args[]) 49 { 50 char *loc_args[9]; 51 pid_t pid; 52 int i; 53 54 loc_args[0] = AUDITWARN_SCRIPT; 55 for (i = 0; args[i] != NULL && i < 8; i++) 56 loc_args[i+1] = args[i]; 57 loc_args[i+1] = NULL; 58 59 pid = fork(); 60 if (pid == -1) 61 return (-1); 62 if (pid == 0) { 63 /* 64 * Child. 65 */ 66 execv(AUDITWARN_SCRIPT, loc_args); 67 syslog(LOG_ERR, "Could not exec %s (%m)\n", 68 AUDITWARN_SCRIPT); 69 exit(1); 70 } 71 /* 72 * Parent. 73 */ 74 return (0); 75 } 76 77 /* 78 * Indicates that the hard limit for all filesystems has been exceeded count 79 * times. 80 */ 81 int 82 audit_warn_allhard(int count) 83 { 84 char intstr[12]; 85 char *args[3]; 86 87 snprintf(intstr, 12, "%d", count); 88 89 args[0] = HARDLIM_ALL_WARN; 90 args[1] = intstr; 91 args[2] = NULL; 92 93 return (auditwarnlog(args)); 94 } 95 96 /* 97 * Indicates that the soft limit for all filesystems has been exceeded. 98 */ 99 int 100 audit_warn_allsoft(void) 101 { 102 char *args[2]; 103 104 args[0] = SOFTLIM_ALL_WARN; 105 args[1] = NULL; 106 107 return (auditwarnlog(args)); 108 } 109 110 /* 111 * Indicates that someone other than the audit daemon turned off auditing. 112 * XXX Its not clear at this point how this function will be invoked. 113 * 114 * XXXRW: This function is not used. 115 */ 116 int 117 audit_warn_auditoff(void) 118 { 119 char *args[2]; 120 121 args[0] = AUDITOFF_WARN; 122 args[1] = NULL; 123 124 return (auditwarnlog(args)); 125 } 126 127 /* 128 * Indicates that the audit deammn is already running 129 */ 130 int 131 audit_warn_ebusy(void) 132 { 133 char *args[2]; 134 135 args[0] = EBUSY_WARN; 136 args[1] = NULL; 137 138 return (auditwarnlog(args)); 139 } 140 141 /* 142 * Indicates that there is a problem getting the directory from 143 * audit_control. 144 * 145 * XXX Note that we take the filename instead of a count as the argument here 146 * (different from BSM). 147 */ 148 int 149 audit_warn_getacdir(char *filename) 150 { 151 char *args[3]; 152 153 args[0] = GETACDIR_WARN; 154 args[1] = filename; 155 args[2] = NULL; 156 157 return (auditwarnlog(args)); 158 } 159 160 /* 161 * Indicates that the hard limit for this file has been exceeded. 162 */ 163 int 164 audit_warn_hard(char *filename) 165 { 166 char *args[3]; 167 168 args[0] = HARDLIM_WARN; 169 args[1] = filename; 170 args[2] = NULL; 171 172 return (auditwarnlog(args)); 173 } 174 175 /* 176 * Indicates that auditing could not be started. 177 */ 178 int 179 audit_warn_nostart(void) 180 { 181 char *args[2]; 182 183 args[0] = NOSTART_WARN; 184 args[1] = NULL; 185 186 return (auditwarnlog(args)); 187 } 188 189 /* 190 * Indicaes that an error occrred during the orderly shutdown of the audit 191 * daemon. 192 */ 193 int 194 audit_warn_postsigterm(void) 195 { 196 char *args[2]; 197 198 args[0] = POSTSIGTERM_WARN; 199 args[1] = NULL; 200 201 return (auditwarnlog(args)); 202 } 203 204 /* 205 * Indicates that the soft limit for this file has been exceeded. 206 */ 207 int 208 audit_warn_soft(char *filename) 209 { 210 char *args[3]; 211 212 args[0] = SOFTLIM_WARN; 213 args[1] = filename; 214 args[2] = NULL; 215 216 return (auditwarnlog(args)); 217 } 218 219 /* 220 * Indicates that the temporary audit file already exists indicating a fatal 221 * error. 222 */ 223 int 224 audit_warn_tmpfile(void) 225 { 226 char *args[2]; 227 228 args[0] = TMPFILE_WARN; 229 args[1] = NULL; 230 231 return (auditwarnlog(args)); 232 } 233