xref: /titanic_50/usr/src/cmd/audit/audit.c (revision 1a578a15d3f76161f037cd99883a1f54a9eda785)
17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate  * CDDL HEADER START
37c478bd9Sstevel@tonic-gate  *
47c478bd9Sstevel@tonic-gate  * The contents of this file are subject to the terms of the
56d59ee37Spaulson  * Common Development and Distribution License (the "License").
66d59ee37Spaulson  * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate  *
87c478bd9Sstevel@tonic-gate  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate  * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate  * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate  * and limitations under the License.
127c478bd9Sstevel@tonic-gate  *
137c478bd9Sstevel@tonic-gate  * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate  * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate  * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate  * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate  *
197c478bd9Sstevel@tonic-gate  * CDDL HEADER END
207c478bd9Sstevel@tonic-gate  */
217c478bd9Sstevel@tonic-gate /*
22*1a578a15Spaulson  * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
237c478bd9Sstevel@tonic-gate  * Use is subject to license terms.
247c478bd9Sstevel@tonic-gate  */
257c478bd9Sstevel@tonic-gate #pragma ident	"%Z%%M%	%I%	%E% SMI"
267c478bd9Sstevel@tonic-gate 
277c478bd9Sstevel@tonic-gate #include <fcntl.h>
287c478bd9Sstevel@tonic-gate #include <libscf.h>
297c478bd9Sstevel@tonic-gate #include <secdb.h>
307c478bd9Sstevel@tonic-gate #include <stdlib.h>
317c478bd9Sstevel@tonic-gate #include <stdio.h>
327c478bd9Sstevel@tonic-gate #include <string.h>
337c478bd9Sstevel@tonic-gate #include <sys/file.h>
347c478bd9Sstevel@tonic-gate #include <sys/types.h>
357c478bd9Sstevel@tonic-gate #include <sys/wait.h>
367c478bd9Sstevel@tonic-gate #include <signal.h>
377c478bd9Sstevel@tonic-gate #include <sys/param.h>
387c478bd9Sstevel@tonic-gate #include <unistd.h>
397c478bd9Sstevel@tonic-gate #include <bsm/audit.h>
407c478bd9Sstevel@tonic-gate #include <bsm/libbsm.h>
417c478bd9Sstevel@tonic-gate #include <locale.h>
427c478bd9Sstevel@tonic-gate #include <audit_sig_infc.h>
437c478bd9Sstevel@tonic-gate #include <zone.h>
447c478bd9Sstevel@tonic-gate 
457c478bd9Sstevel@tonic-gate #if !defined(TEXT_DOMAIN)
467c478bd9Sstevel@tonic-gate #define	TEXT_DOMAIN "SUNW_OST_OSCMD"
477c478bd9Sstevel@tonic-gate #endif
487c478bd9Sstevel@tonic-gate 
497c478bd9Sstevel@tonic-gate #define	VERIFY -1
507c478bd9Sstevel@tonic-gate 
517c478bd9Sstevel@tonic-gate /* GLOBALS */
527c478bd9Sstevel@tonic-gate static char	*auditdatafile = AUDITDATAFILE;
537c478bd9Sstevel@tonic-gate static char	*progname = "audit";
547c478bd9Sstevel@tonic-gate static char	*usage = "audit [-n] | [-s] | [-t] | [-v filepath]";
557c478bd9Sstevel@tonic-gate static int	silent = 0;
567c478bd9Sstevel@tonic-gate static char	*instance_name = "svc:/system/auditd:default";
577c478bd9Sstevel@tonic-gate 
587c478bd9Sstevel@tonic-gate static int	get_auditd_pid();
597c478bd9Sstevel@tonic-gate static void	display_smf_error();
607c478bd9Sstevel@tonic-gate 
617c478bd9Sstevel@tonic-gate static boolean_t is_audit_control_ok(char *);	/* file validation  */
627c478bd9Sstevel@tonic-gate static boolean_t is_valid_zone(boolean_t);	/* operation ok in this zone? */
636d59ee37Spaulson static int	start_auditd();			/* start audit daemon */
647c478bd9Sstevel@tonic-gate 
657c478bd9Sstevel@tonic-gate /*
667c478bd9Sstevel@tonic-gate  * audit() - This program serves as a general administrator's interface to
677c478bd9Sstevel@tonic-gate  *	the audit trail.  Only one option is valid at a time.
687c478bd9Sstevel@tonic-gate  *
697c478bd9Sstevel@tonic-gate  * input:
707c478bd9Sstevel@tonic-gate  *	audit -s
717c478bd9Sstevel@tonic-gate  *		- signal audit daemon to read audit_control file and
727c478bd9Sstevel@tonic-gate  *		  start auditd if needed.
737c478bd9Sstevel@tonic-gate  *	audit -n
747c478bd9Sstevel@tonic-gate  *		- signal audit daemon to use next audit_control audit directory.
757c478bd9Sstevel@tonic-gate  *	audit -t
767c478bd9Sstevel@tonic-gate  *		- signal audit daemon to disable auditing.
777c478bd9Sstevel@tonic-gate  *	audit -T
787c478bd9Sstevel@tonic-gate  *		- signal audit daemon to disable auditing report no errors.
797c478bd9Sstevel@tonic-gate  *	audit -v filepath
807c478bd9Sstevel@tonic-gate  *		- validate audit_control parameters but use filepath for
817c478bd9Sstevel@tonic-gate  *		  the name.  Emit errors or "syntax ok"
827c478bd9Sstevel@tonic-gate  *
837c478bd9Sstevel@tonic-gate  *
847c478bd9Sstevel@tonic-gate  * output:
857c478bd9Sstevel@tonic-gate  *
867c478bd9Sstevel@tonic-gate  * returns:	0 - command successful
877c478bd9Sstevel@tonic-gate  *		>0 - command failed
887c478bd9Sstevel@tonic-gate  */
897c478bd9Sstevel@tonic-gate 
907883e825Spaulson int
917c478bd9Sstevel@tonic-gate main(int argc, char *argv[])
927c478bd9Sstevel@tonic-gate {
937c478bd9Sstevel@tonic-gate 	pid_t pid; /* process id of auditd read from auditdatafile */
947c478bd9Sstevel@tonic-gate 	int	sig = 0; /* signal to send auditd */
957c478bd9Sstevel@tonic-gate 	char	c;
967c478bd9Sstevel@tonic-gate 	char	*first_option;
977c478bd9Sstevel@tonic-gate 
987c478bd9Sstevel@tonic-gate 	/* Internationalization */
997c478bd9Sstevel@tonic-gate 	(void) setlocale(LC_ALL, "");
1007c478bd9Sstevel@tonic-gate 	(void) textdomain(TEXT_DOMAIN);
1017c478bd9Sstevel@tonic-gate 
1027c478bd9Sstevel@tonic-gate 	/* first option required */
1037c478bd9Sstevel@tonic-gate 	if ((c = getopt(argc, argv, "nstTv:")) == -1) {
1047c478bd9Sstevel@tonic-gate 		(void) fprintf(stderr, gettext("usage: %s\n"), usage);
1057c478bd9Sstevel@tonic-gate 		exit(3);
1067c478bd9Sstevel@tonic-gate 	}
1077c478bd9Sstevel@tonic-gate 	first_option = optarg;
1087c478bd9Sstevel@tonic-gate 	/* second or more options not allowed; please pick one */
1097c478bd9Sstevel@tonic-gate 	if (getopt(argc, argv, "nstTv:") != -1) {
1107c478bd9Sstevel@tonic-gate 		(void) fprintf(stderr, gettext("usage: %s\n"), usage);
1117c478bd9Sstevel@tonic-gate 		exit(5);
1127c478bd9Sstevel@tonic-gate 	}
1137c478bd9Sstevel@tonic-gate 	switch (c) {
1147c478bd9Sstevel@tonic-gate 	case 'n':
1157c478bd9Sstevel@tonic-gate 		if (!is_valid_zone(1))	/* 1 == display error if any */
1167c478bd9Sstevel@tonic-gate 			exit(10);
1177c478bd9Sstevel@tonic-gate 
1187c478bd9Sstevel@tonic-gate 		sig = AU_SIG_NEXT_DIR;
1197c478bd9Sstevel@tonic-gate 		break;
1207c478bd9Sstevel@tonic-gate 	case 's':
1217c478bd9Sstevel@tonic-gate 		if (!is_valid_zone(1))	/* 1 == display error if any */
1227c478bd9Sstevel@tonic-gate 			exit(10);
1237c478bd9Sstevel@tonic-gate 		else if (!is_audit_control_ok(NULL))
1247c478bd9Sstevel@tonic-gate 			exit(7);
1257c478bd9Sstevel@tonic-gate 
1266d59ee37Spaulson 		return (start_auditd());
1277c478bd9Sstevel@tonic-gate 	case 't':
1287c478bd9Sstevel@tonic-gate 		if (!is_valid_zone(0))	/* 0 == no error message display */
1296d59ee37Spaulson 			exit(10);
1307c478bd9Sstevel@tonic-gate 		/* use bmsunconv to permanently disable, -t for temporary */
1316d59ee37Spaulson 		if (smf_disable_instance(instance_name, SMF_TEMPORARY) != 0) {
1327c478bd9Sstevel@tonic-gate 			display_smf_error();
1336d59ee37Spaulson 			exit(11);
1346d59ee37Spaulson 		}
1357c478bd9Sstevel@tonic-gate 		break;
1367c478bd9Sstevel@tonic-gate 	case 'T':
1377c478bd9Sstevel@tonic-gate 		silent = 1;
1386d59ee37Spaulson 		if (!is_valid_zone(0))	/* 0 == no error message display */
1396d59ee37Spaulson 			exit(10);
1406d59ee37Spaulson 
1416d59ee37Spaulson 		if (smf_disable_instance(instance_name, SMF_TEMPORARY) != 0) {
1426d59ee37Spaulson 			exit(11);
1436d59ee37Spaulson 		}
1447c478bd9Sstevel@tonic-gate 		break;
1457c478bd9Sstevel@tonic-gate 	case 'v':
1467c478bd9Sstevel@tonic-gate 		if (is_audit_control_ok(first_option)) {
1477c478bd9Sstevel@tonic-gate 			(void) fprintf(stderr, gettext("syntax ok\n"));
1487c478bd9Sstevel@tonic-gate 			exit(0);
1497c478bd9Sstevel@tonic-gate 		} else {
1507c478bd9Sstevel@tonic-gate 			exit(8);
1517c478bd9Sstevel@tonic-gate 		}
1527c478bd9Sstevel@tonic-gate 		break;
1537c478bd9Sstevel@tonic-gate 	default:
1547c478bd9Sstevel@tonic-gate 		(void) fprintf(stderr, gettext("usage: %s\n"), usage);
1557c478bd9Sstevel@tonic-gate 		exit(6);
1567c478bd9Sstevel@tonic-gate 	}
1577c478bd9Sstevel@tonic-gate 
1586d59ee37Spaulson 	if (sig != 0) {
1597c478bd9Sstevel@tonic-gate 		if (get_auditd_pid(&pid) != 0) {
1606d59ee37Spaulson 			(void) fprintf(stderr, "%s: %s\n", progname,
1616d59ee37Spaulson 			    gettext("can't get process id of auditd from "
1626d59ee37Spaulson 			    "audit_data(4)"));
1637c478bd9Sstevel@tonic-gate 			exit(4);
1647c478bd9Sstevel@tonic-gate 		}
1657c478bd9Sstevel@tonic-gate 
1666d59ee37Spaulson 		if (kill(pid, sig) != 0) {
1677c478bd9Sstevel@tonic-gate 			perror(progname);
1687c478bd9Sstevel@tonic-gate 			(void) fprintf(stderr,
1697c478bd9Sstevel@tonic-gate 			    gettext("%s: cannot signal auditd\n"), progname);
1707c478bd9Sstevel@tonic-gate 			exit(1);
1717c478bd9Sstevel@tonic-gate 		}
1727c478bd9Sstevel@tonic-gate 	}
1737c478bd9Sstevel@tonic-gate 	return (0);
1747c478bd9Sstevel@tonic-gate }
1757c478bd9Sstevel@tonic-gate 
1767c478bd9Sstevel@tonic-gate 
1777c478bd9Sstevel@tonic-gate /*
1787c478bd9Sstevel@tonic-gate  * get_auditd_pid(&pid):
1797c478bd9Sstevel@tonic-gate  *
1807c478bd9Sstevel@tonic-gate  * reads PID from audit_data
1817c478bd9Sstevel@tonic-gate  *
1827c478bd9Sstevel@tonic-gate  * returns:	0 - successful
1837c478bd9Sstevel@tonic-gate  *		1 - error
1847c478bd9Sstevel@tonic-gate  */
1857c478bd9Sstevel@tonic-gate 
1867c478bd9Sstevel@tonic-gate static int
1877c478bd9Sstevel@tonic-gate get_auditd_pid(pid_t *p_pid)
1887c478bd9Sstevel@tonic-gate {
1897c478bd9Sstevel@tonic-gate 	FILE	*adp;		/* audit_data file pointer */
1907c478bd9Sstevel@tonic-gate 	int	retstat;
1917c478bd9Sstevel@tonic-gate 
1927c478bd9Sstevel@tonic-gate 	if ((adp = fopen(auditdatafile, "r")) == NULL) {
1937c478bd9Sstevel@tonic-gate 		if (!silent)
1947c478bd9Sstevel@tonic-gate 			perror(progname);
1957c478bd9Sstevel@tonic-gate 		return (1);
1967c478bd9Sstevel@tonic-gate 	}
1977c478bd9Sstevel@tonic-gate 	retstat = (fscanf(adp, "%ld", p_pid) != 1);
1987c478bd9Sstevel@tonic-gate 	(void) fclose(adp);
1997c478bd9Sstevel@tonic-gate 	return (retstat);
2007c478bd9Sstevel@tonic-gate }
2017c478bd9Sstevel@tonic-gate 
2027c478bd9Sstevel@tonic-gate /*
2037c478bd9Sstevel@tonic-gate  * perform reasonableness check on audit_control or its standin; goal
2047c478bd9Sstevel@tonic-gate  * is that "audit -s" (1) not crash the system and (2) c2audit/auditd
2057c478bd9Sstevel@tonic-gate  * actually generates data.
2067c478bd9Sstevel@tonic-gate  *
2077c478bd9Sstevel@tonic-gate  * A NULL input is ok -- it is used to tell _openac() to use the
2087c478bd9Sstevel@tonic-gate  * real audit_control file, not a substitute.
2097c478bd9Sstevel@tonic-gate  */
2107c478bd9Sstevel@tonic-gate #define	TRADITIONAL_MAX	1024
2117c478bd9Sstevel@tonic-gate 
2127c478bd9Sstevel@tonic-gate static boolean_t
2137c478bd9Sstevel@tonic-gate is_audit_control_ok(char *filename) {
2147c478bd9Sstevel@tonic-gate 	char		buf[TRADITIONAL_MAX];
2157c478bd9Sstevel@tonic-gate 	int		outputs = 0;
2167c478bd9Sstevel@tonic-gate 	int		state = 1;	/* 1 is ok, 0 is not */
2177c478bd9Sstevel@tonic-gate 	int		rc;
2187c478bd9Sstevel@tonic-gate 	int		min;
2197c478bd9Sstevel@tonic-gate 	kva_t		*kvlist;
220*1a578a15Spaulson 	char		*plugin_name;
221*1a578a15Spaulson 	char		*plugin_dir;
2227c478bd9Sstevel@tonic-gate 	au_acinfo_t	*ach;
2237c478bd9Sstevel@tonic-gate 
2247c478bd9Sstevel@tonic-gate 	ach = _openac(filename);	/* open audit_control */
2257c478bd9Sstevel@tonic-gate 	if (ach == NULL) {
2267c478bd9Sstevel@tonic-gate 		perror(progname);
2277c478bd9Sstevel@tonic-gate 		exit(9);
2287c478bd9Sstevel@tonic-gate 	}
2297c478bd9Sstevel@tonic-gate 	/*
2307c478bd9Sstevel@tonic-gate 	 * There must be at least one directory or one plugin
2317c478bd9Sstevel@tonic-gate 	 * defined.
2327c478bd9Sstevel@tonic-gate 	 */
2337c478bd9Sstevel@tonic-gate 	if ((rc = _getacdir(ach, buf, TRADITIONAL_MAX)) == 0) {
2347c478bd9Sstevel@tonic-gate 		outputs++;
2357c478bd9Sstevel@tonic-gate 	} else if (rc < -1) {	/* -1 is not found, others are errors */
2367c478bd9Sstevel@tonic-gate 		(void) fprintf(stderr,
2377c478bd9Sstevel@tonic-gate 			gettext("%s: audit_control \"dir:\" spec invalid\n"),
2387c478bd9Sstevel@tonic-gate 				progname);
2397c478bd9Sstevel@tonic-gate 		state = 0;	/* is_not_ok */
2407c478bd9Sstevel@tonic-gate 	}
2417c478bd9Sstevel@tonic-gate 
2427c478bd9Sstevel@tonic-gate 	/*
2437c478bd9Sstevel@tonic-gate 	 * _getacplug -- all that is of interest is the return code.
2447c478bd9Sstevel@tonic-gate 	 */
2457c478bd9Sstevel@tonic-gate 	_rewindac(ach);	/* rewind audit_control */
246*1a578a15Spaulson 	while ((rc = _getacplug(ach, &kvlist)) == 0) {
247*1a578a15Spaulson 		plugin_name = kva_match(kvlist, "name");
248*1a578a15Spaulson 		if (plugin_name == NULL) {
2497c478bd9Sstevel@tonic-gate 			(void) fprintf(stderr, gettext("%s: audit_control "
2507c478bd9Sstevel@tonic-gate 			    "\"plugin:\" missing name\n"), progname);
2517c478bd9Sstevel@tonic-gate 			state = 0;	/* is_not_ok */
252*1a578a15Spaulson 		} else {
253*1a578a15Spaulson 			if (strcmp(plugin_name, "audit_binfile.so") == 0) {
254*1a578a15Spaulson 				plugin_dir = kva_match(kvlist, "p_dir");
255*1a578a15Spaulson 				if ((plugin_dir == NULL) && (outputs == 0)) {
256*1a578a15Spaulson 					(void) fprintf(stderr,
257*1a578a15Spaulson 					    gettext("%s: audit_control "
258*1a578a15Spaulson 					    "\"plugin:\" missing p_dir\n"),
259*1a578a15Spaulson 					    progname);
260*1a578a15Spaulson 					state = 0;	/* is_not_ok */
261*1a578a15Spaulson 				} else {
2627c478bd9Sstevel@tonic-gate 					outputs++;
263*1a578a15Spaulson 				}
264*1a578a15Spaulson 			}
265*1a578a15Spaulson 		}
2667c478bd9Sstevel@tonic-gate 		_kva_free(kvlist);
267*1a578a15Spaulson 	}
268*1a578a15Spaulson 	if (rc < -1) {
2697c478bd9Sstevel@tonic-gate 		(void) fprintf(stderr,
2707c478bd9Sstevel@tonic-gate 			gettext("%s: audit_control \"plugin:\" spec invalid\n"),
2717c478bd9Sstevel@tonic-gate 				progname);
2727c478bd9Sstevel@tonic-gate 		state = 0;	/* is_not_ok */
2737c478bd9Sstevel@tonic-gate 	}
2747c478bd9Sstevel@tonic-gate 	if (outputs == 0) {
2757c478bd9Sstevel@tonic-gate 		(void) fprintf(stderr,
2767c478bd9Sstevel@tonic-gate 			gettext("%s: audit_control must have either a "
277*1a578a15Spaulson 				"valid \"dir:\" entry or a valid \"plugin:\" "
278*1a578a15Spaulson 				"entry with \"p_dir:\" specified.\n"),
2797c478bd9Sstevel@tonic-gate 				progname);
2807c478bd9Sstevel@tonic-gate 		state = 0;	/* is_not_ok */
2817c478bd9Sstevel@tonic-gate 	}
2827c478bd9Sstevel@tonic-gate 	/* minfree is not required */
2837c478bd9Sstevel@tonic-gate 	_rewindac(ach);
2847c478bd9Sstevel@tonic-gate 	if ((rc = _getacmin(ach, &min)) < -1) {
2857c478bd9Sstevel@tonic-gate 		(void) fprintf(stderr,
2867c478bd9Sstevel@tonic-gate 			gettext(
2877c478bd9Sstevel@tonic-gate 			    "%s: audit_control \"minfree:\" spec invalid\n"),
2887c478bd9Sstevel@tonic-gate 			    progname);
2897c478bd9Sstevel@tonic-gate 		state = 0;	/* is_not_ok */
2907c478bd9Sstevel@tonic-gate 	}
2917c478bd9Sstevel@tonic-gate 	/* flags is not required */
2927c478bd9Sstevel@tonic-gate 	_rewindac(ach);
2937c478bd9Sstevel@tonic-gate 	if ((rc = _getacflg(ach, buf, TRADITIONAL_MAX)) < -1) {
2947c478bd9Sstevel@tonic-gate 		(void) fprintf(stderr,
2957c478bd9Sstevel@tonic-gate 			gettext("%s: audit_control \"flags:\" spec invalid\n"),
2967c478bd9Sstevel@tonic-gate 				progname);
2977c478bd9Sstevel@tonic-gate 		state = 0;	/* is_not_ok */
2987c478bd9Sstevel@tonic-gate 	}
2997c478bd9Sstevel@tonic-gate 	/* naflags is not required */
3007c478bd9Sstevel@tonic-gate 	_rewindac(ach);
3017c478bd9Sstevel@tonic-gate 	if ((rc = _getacna(ach, buf, TRADITIONAL_MAX)) < -1) {
3027c478bd9Sstevel@tonic-gate 		(void) fprintf(stderr,
3037c478bd9Sstevel@tonic-gate 			gettext(
3047c478bd9Sstevel@tonic-gate 			    "%s: audit_control \"naflags:\" spec invalid\n"),
3057c478bd9Sstevel@tonic-gate 			    progname);
3067c478bd9Sstevel@tonic-gate 		state = 0;	/* is_not_ok */
3077c478bd9Sstevel@tonic-gate 	}
3087c478bd9Sstevel@tonic-gate 	_endac(ach);
3097c478bd9Sstevel@tonic-gate 	return (state);
3107c478bd9Sstevel@tonic-gate }
3117c478bd9Sstevel@tonic-gate 
3127c478bd9Sstevel@tonic-gate /*
3137c478bd9Sstevel@tonic-gate  * The operations that call this function are only valid in the global
3147c478bd9Sstevel@tonic-gate  * zone unless the perzone audit policy is set.
3157c478bd9Sstevel@tonic-gate  *
3167c478bd9Sstevel@tonic-gate  * "!silent" and "show_err" are slightly different; silent is from
3177c478bd9Sstevel@tonic-gate  * -T for which no error messages should be displayed and show_err
3187c478bd9Sstevel@tonic-gate  * applies to more options (including -T)
3197c478bd9Sstevel@tonic-gate  *
3207c478bd9Sstevel@tonic-gate  */
3217c478bd9Sstevel@tonic-gate 
3227c478bd9Sstevel@tonic-gate static boolean_t
3237c478bd9Sstevel@tonic-gate is_valid_zone(boolean_t show_err)
3247c478bd9Sstevel@tonic-gate {
3257c478bd9Sstevel@tonic-gate 	long	policy;
3267c478bd9Sstevel@tonic-gate 
3277c478bd9Sstevel@tonic-gate 	if (auditon(A_GETPOLICY, (char *)&policy, 0) == -1) {
3287c478bd9Sstevel@tonic-gate 		if (!silent)
3297c478bd9Sstevel@tonic-gate 			(void) fprintf(stderr, gettext(
3307c478bd9Sstevel@tonic-gate 			    "%s: Cannot read audit policy:  %s\n"),
3317c478bd9Sstevel@tonic-gate 			    progname, strerror(errno));
3327c478bd9Sstevel@tonic-gate 		return (0);
3337c478bd9Sstevel@tonic-gate 	}
3347c478bd9Sstevel@tonic-gate 	if (policy & AUDIT_PERZONE)
3357c478bd9Sstevel@tonic-gate 		return (1);
3367c478bd9Sstevel@tonic-gate 
3377c478bd9Sstevel@tonic-gate 	if (getzoneid() != GLOBAL_ZONEID) {
3387c478bd9Sstevel@tonic-gate 		if (show_err)
3397c478bd9Sstevel@tonic-gate 			(void) fprintf(stderr,
3407c478bd9Sstevel@tonic-gate 			    gettext("%s: Not valid in a local zone.\n"),
3417c478bd9Sstevel@tonic-gate 			    progname);
3427c478bd9Sstevel@tonic-gate 		return (0);
3437c478bd9Sstevel@tonic-gate 	} else {
3447c478bd9Sstevel@tonic-gate 		return (1);
3457c478bd9Sstevel@tonic-gate 	}
3467c478bd9Sstevel@tonic-gate }
3477c478bd9Sstevel@tonic-gate 
3487c478bd9Sstevel@tonic-gate /*
3497c478bd9Sstevel@tonic-gate  * if auditd isn't running, start it.  Otherwise refresh.
3507c478bd9Sstevel@tonic-gate  * First check to see if c2audit is loaded via the auditon()
3517c478bd9Sstevel@tonic-gate  * system call, then check SMF state.
3527c478bd9Sstevel@tonic-gate  */
3536d59ee37Spaulson static int
3547c478bd9Sstevel@tonic-gate start_auditd()
3557c478bd9Sstevel@tonic-gate {
3567c478bd9Sstevel@tonic-gate 	int	audit_state;
3577c478bd9Sstevel@tonic-gate 	char	*state;
3587c478bd9Sstevel@tonic-gate 
3597c478bd9Sstevel@tonic-gate 	if (auditon(A_GETCOND, (caddr_t)&audit_state,
3607c478bd9Sstevel@tonic-gate 	    sizeof (audit_state)) != 0)
3616d59ee37Spaulson 		return (12);
3627c478bd9Sstevel@tonic-gate 
3637c478bd9Sstevel@tonic-gate 	if ((state = smf_get_state(instance_name)) == NULL) {
3647c478bd9Sstevel@tonic-gate 		display_smf_error();
3656d59ee37Spaulson 		return (13);
3667c478bd9Sstevel@tonic-gate 	}
3677c478bd9Sstevel@tonic-gate 	if (strcmp(SCF_STATE_STRING_ONLINE, state) != 0) {
3686d59ee37Spaulson 		if (smf_enable_instance(instance_name, 0) != 0) {
3697c478bd9Sstevel@tonic-gate 			display_smf_error();
3706d59ee37Spaulson 			free(state);
3716d59ee37Spaulson 			return (14);
3726d59ee37Spaulson 		}
3737c478bd9Sstevel@tonic-gate 	} else {
3746d59ee37Spaulson 		if (smf_refresh_instance(instance_name) != 0) {
3757c478bd9Sstevel@tonic-gate 			display_smf_error();
3766d59ee37Spaulson 			free(state);
3776d59ee37Spaulson 			return (15);
3786d59ee37Spaulson 		}
3797c478bd9Sstevel@tonic-gate 	}
3807c478bd9Sstevel@tonic-gate 	free(state);
3816d59ee37Spaulson 	return (0);
3827c478bd9Sstevel@tonic-gate }
3837c478bd9Sstevel@tonic-gate 
3847c478bd9Sstevel@tonic-gate static void
3857c478bd9Sstevel@tonic-gate display_smf_error()
3867c478bd9Sstevel@tonic-gate {
3877c478bd9Sstevel@tonic-gate 	int	rc = scf_error();
3887c478bd9Sstevel@tonic-gate 
3897c478bd9Sstevel@tonic-gate 	switch (rc) {
3907c478bd9Sstevel@tonic-gate 	case SCF_ERROR_NOT_FOUND:
3917c478bd9Sstevel@tonic-gate 		(void) fprintf(stderr,
3927c478bd9Sstevel@tonic-gate 		    "SMF error: \"%s\" not found.\n",
3937c478bd9Sstevel@tonic-gate 		    instance_name);
3947c478bd9Sstevel@tonic-gate 		break;
3957c478bd9Sstevel@tonic-gate 	default:
3966d59ee37Spaulson 		(void) fprintf(stderr, "SMF error: %s\n", scf_strerror(rc));
3977c478bd9Sstevel@tonic-gate 		break;
3987c478bd9Sstevel@tonic-gate 	}
3997c478bd9Sstevel@tonic-gate }
400