17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 56d59ee37Spaulson * Common Development and Distribution License (the "License"). 66d59ee37Spaulson * You may not use this file except in compliance with the License. 77c478bd9Sstevel@tonic-gate * 87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 117c478bd9Sstevel@tonic-gate * and limitations under the License. 127c478bd9Sstevel@tonic-gate * 137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 187c478bd9Sstevel@tonic-gate * 197c478bd9Sstevel@tonic-gate * CDDL HEADER END 207c478bd9Sstevel@tonic-gate */ 217c478bd9Sstevel@tonic-gate /* 22*1a578a15Spaulson * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 237c478bd9Sstevel@tonic-gate * Use is subject to license terms. 247c478bd9Sstevel@tonic-gate */ 257c478bd9Sstevel@tonic-gate #pragma ident "%Z%%M% %I% %E% SMI" 267c478bd9Sstevel@tonic-gate 277c478bd9Sstevel@tonic-gate #include <fcntl.h> 287c478bd9Sstevel@tonic-gate #include <libscf.h> 297c478bd9Sstevel@tonic-gate #include <secdb.h> 307c478bd9Sstevel@tonic-gate #include <stdlib.h> 317c478bd9Sstevel@tonic-gate #include <stdio.h> 327c478bd9Sstevel@tonic-gate #include <string.h> 337c478bd9Sstevel@tonic-gate #include <sys/file.h> 347c478bd9Sstevel@tonic-gate #include <sys/types.h> 357c478bd9Sstevel@tonic-gate #include <sys/wait.h> 367c478bd9Sstevel@tonic-gate #include <signal.h> 377c478bd9Sstevel@tonic-gate #include <sys/param.h> 387c478bd9Sstevel@tonic-gate #include <unistd.h> 397c478bd9Sstevel@tonic-gate #include <bsm/audit.h> 407c478bd9Sstevel@tonic-gate #include <bsm/libbsm.h> 417c478bd9Sstevel@tonic-gate #include <locale.h> 427c478bd9Sstevel@tonic-gate #include <audit_sig_infc.h> 437c478bd9Sstevel@tonic-gate #include <zone.h> 447c478bd9Sstevel@tonic-gate 457c478bd9Sstevel@tonic-gate #if !defined(TEXT_DOMAIN) 467c478bd9Sstevel@tonic-gate #define TEXT_DOMAIN "SUNW_OST_OSCMD" 477c478bd9Sstevel@tonic-gate #endif 487c478bd9Sstevel@tonic-gate 497c478bd9Sstevel@tonic-gate #define VERIFY -1 507c478bd9Sstevel@tonic-gate 517c478bd9Sstevel@tonic-gate /* GLOBALS */ 527c478bd9Sstevel@tonic-gate static char *auditdatafile = AUDITDATAFILE; 537c478bd9Sstevel@tonic-gate static char *progname = "audit"; 547c478bd9Sstevel@tonic-gate static char *usage = "audit [-n] | [-s] | [-t] | [-v filepath]"; 557c478bd9Sstevel@tonic-gate static int silent = 0; 567c478bd9Sstevel@tonic-gate static char *instance_name = "svc:/system/auditd:default"; 577c478bd9Sstevel@tonic-gate 587c478bd9Sstevel@tonic-gate static int get_auditd_pid(); 597c478bd9Sstevel@tonic-gate static void display_smf_error(); 607c478bd9Sstevel@tonic-gate 617c478bd9Sstevel@tonic-gate static boolean_t is_audit_control_ok(char *); /* file validation */ 627c478bd9Sstevel@tonic-gate static boolean_t is_valid_zone(boolean_t); /* operation ok in this zone? */ 636d59ee37Spaulson static int start_auditd(); /* start audit daemon */ 647c478bd9Sstevel@tonic-gate 657c478bd9Sstevel@tonic-gate /* 667c478bd9Sstevel@tonic-gate * audit() - This program serves as a general administrator's interface to 677c478bd9Sstevel@tonic-gate * the audit trail. Only one option is valid at a time. 687c478bd9Sstevel@tonic-gate * 697c478bd9Sstevel@tonic-gate * input: 707c478bd9Sstevel@tonic-gate * audit -s 717c478bd9Sstevel@tonic-gate * - signal audit daemon to read audit_control file and 727c478bd9Sstevel@tonic-gate * start auditd if needed. 737c478bd9Sstevel@tonic-gate * audit -n 747c478bd9Sstevel@tonic-gate * - signal audit daemon to use next audit_control audit directory. 757c478bd9Sstevel@tonic-gate * audit -t 767c478bd9Sstevel@tonic-gate * - signal audit daemon to disable auditing. 777c478bd9Sstevel@tonic-gate * audit -T 787c478bd9Sstevel@tonic-gate * - signal audit daemon to disable auditing report no errors. 797c478bd9Sstevel@tonic-gate * audit -v filepath 807c478bd9Sstevel@tonic-gate * - validate audit_control parameters but use filepath for 817c478bd9Sstevel@tonic-gate * the name. Emit errors or "syntax ok" 827c478bd9Sstevel@tonic-gate * 837c478bd9Sstevel@tonic-gate * 847c478bd9Sstevel@tonic-gate * output: 857c478bd9Sstevel@tonic-gate * 867c478bd9Sstevel@tonic-gate * returns: 0 - command successful 877c478bd9Sstevel@tonic-gate * >0 - command failed 887c478bd9Sstevel@tonic-gate */ 897c478bd9Sstevel@tonic-gate 907883e825Spaulson int 917c478bd9Sstevel@tonic-gate main(int argc, char *argv[]) 927c478bd9Sstevel@tonic-gate { 937c478bd9Sstevel@tonic-gate pid_t pid; /* process id of auditd read from auditdatafile */ 947c478bd9Sstevel@tonic-gate int sig = 0; /* signal to send auditd */ 957c478bd9Sstevel@tonic-gate char c; 967c478bd9Sstevel@tonic-gate char *first_option; 977c478bd9Sstevel@tonic-gate 987c478bd9Sstevel@tonic-gate /* Internationalization */ 997c478bd9Sstevel@tonic-gate (void) setlocale(LC_ALL, ""); 1007c478bd9Sstevel@tonic-gate (void) textdomain(TEXT_DOMAIN); 1017c478bd9Sstevel@tonic-gate 1027c478bd9Sstevel@tonic-gate /* first option required */ 1037c478bd9Sstevel@tonic-gate if ((c = getopt(argc, argv, "nstTv:")) == -1) { 1047c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("usage: %s\n"), usage); 1057c478bd9Sstevel@tonic-gate exit(3); 1067c478bd9Sstevel@tonic-gate } 1077c478bd9Sstevel@tonic-gate first_option = optarg; 1087c478bd9Sstevel@tonic-gate /* second or more options not allowed; please pick one */ 1097c478bd9Sstevel@tonic-gate if (getopt(argc, argv, "nstTv:") != -1) { 1107c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("usage: %s\n"), usage); 1117c478bd9Sstevel@tonic-gate exit(5); 1127c478bd9Sstevel@tonic-gate } 1137c478bd9Sstevel@tonic-gate switch (c) { 1147c478bd9Sstevel@tonic-gate case 'n': 1157c478bd9Sstevel@tonic-gate if (!is_valid_zone(1)) /* 1 == display error if any */ 1167c478bd9Sstevel@tonic-gate exit(10); 1177c478bd9Sstevel@tonic-gate 1187c478bd9Sstevel@tonic-gate sig = AU_SIG_NEXT_DIR; 1197c478bd9Sstevel@tonic-gate break; 1207c478bd9Sstevel@tonic-gate case 's': 1217c478bd9Sstevel@tonic-gate if (!is_valid_zone(1)) /* 1 == display error if any */ 1227c478bd9Sstevel@tonic-gate exit(10); 1237c478bd9Sstevel@tonic-gate else if (!is_audit_control_ok(NULL)) 1247c478bd9Sstevel@tonic-gate exit(7); 1257c478bd9Sstevel@tonic-gate 1266d59ee37Spaulson return (start_auditd()); 1277c478bd9Sstevel@tonic-gate case 't': 1287c478bd9Sstevel@tonic-gate if (!is_valid_zone(0)) /* 0 == no error message display */ 1296d59ee37Spaulson exit(10); 1307c478bd9Sstevel@tonic-gate /* use bmsunconv to permanently disable, -t for temporary */ 1316d59ee37Spaulson if (smf_disable_instance(instance_name, SMF_TEMPORARY) != 0) { 1327c478bd9Sstevel@tonic-gate display_smf_error(); 1336d59ee37Spaulson exit(11); 1346d59ee37Spaulson } 1357c478bd9Sstevel@tonic-gate break; 1367c478bd9Sstevel@tonic-gate case 'T': 1377c478bd9Sstevel@tonic-gate silent = 1; 1386d59ee37Spaulson if (!is_valid_zone(0)) /* 0 == no error message display */ 1396d59ee37Spaulson exit(10); 1406d59ee37Spaulson 1416d59ee37Spaulson if (smf_disable_instance(instance_name, SMF_TEMPORARY) != 0) { 1426d59ee37Spaulson exit(11); 1436d59ee37Spaulson } 1447c478bd9Sstevel@tonic-gate break; 1457c478bd9Sstevel@tonic-gate case 'v': 1467c478bd9Sstevel@tonic-gate if (is_audit_control_ok(first_option)) { 1477c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("syntax ok\n")); 1487c478bd9Sstevel@tonic-gate exit(0); 1497c478bd9Sstevel@tonic-gate } else { 1507c478bd9Sstevel@tonic-gate exit(8); 1517c478bd9Sstevel@tonic-gate } 1527c478bd9Sstevel@tonic-gate break; 1537c478bd9Sstevel@tonic-gate default: 1547c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("usage: %s\n"), usage); 1557c478bd9Sstevel@tonic-gate exit(6); 1567c478bd9Sstevel@tonic-gate } 1577c478bd9Sstevel@tonic-gate 1586d59ee37Spaulson if (sig != 0) { 1597c478bd9Sstevel@tonic-gate if (get_auditd_pid(&pid) != 0) { 1606d59ee37Spaulson (void) fprintf(stderr, "%s: %s\n", progname, 1616d59ee37Spaulson gettext("can't get process id of auditd from " 1626d59ee37Spaulson "audit_data(4)")); 1637c478bd9Sstevel@tonic-gate exit(4); 1647c478bd9Sstevel@tonic-gate } 1657c478bd9Sstevel@tonic-gate 1666d59ee37Spaulson if (kill(pid, sig) != 0) { 1677c478bd9Sstevel@tonic-gate perror(progname); 1687c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 1697c478bd9Sstevel@tonic-gate gettext("%s: cannot signal auditd\n"), progname); 1707c478bd9Sstevel@tonic-gate exit(1); 1717c478bd9Sstevel@tonic-gate } 1727c478bd9Sstevel@tonic-gate } 1737c478bd9Sstevel@tonic-gate return (0); 1747c478bd9Sstevel@tonic-gate } 1757c478bd9Sstevel@tonic-gate 1767c478bd9Sstevel@tonic-gate 1777c478bd9Sstevel@tonic-gate /* 1787c478bd9Sstevel@tonic-gate * get_auditd_pid(&pid): 1797c478bd9Sstevel@tonic-gate * 1807c478bd9Sstevel@tonic-gate * reads PID from audit_data 1817c478bd9Sstevel@tonic-gate * 1827c478bd9Sstevel@tonic-gate * returns: 0 - successful 1837c478bd9Sstevel@tonic-gate * 1 - error 1847c478bd9Sstevel@tonic-gate */ 1857c478bd9Sstevel@tonic-gate 1867c478bd9Sstevel@tonic-gate static int 1877c478bd9Sstevel@tonic-gate get_auditd_pid(pid_t *p_pid) 1887c478bd9Sstevel@tonic-gate { 1897c478bd9Sstevel@tonic-gate FILE *adp; /* audit_data file pointer */ 1907c478bd9Sstevel@tonic-gate int retstat; 1917c478bd9Sstevel@tonic-gate 1927c478bd9Sstevel@tonic-gate if ((adp = fopen(auditdatafile, "r")) == NULL) { 1937c478bd9Sstevel@tonic-gate if (!silent) 1947c478bd9Sstevel@tonic-gate perror(progname); 1957c478bd9Sstevel@tonic-gate return (1); 1967c478bd9Sstevel@tonic-gate } 1977c478bd9Sstevel@tonic-gate retstat = (fscanf(adp, "%ld", p_pid) != 1); 1987c478bd9Sstevel@tonic-gate (void) fclose(adp); 1997c478bd9Sstevel@tonic-gate return (retstat); 2007c478bd9Sstevel@tonic-gate } 2017c478bd9Sstevel@tonic-gate 2027c478bd9Sstevel@tonic-gate /* 2037c478bd9Sstevel@tonic-gate * perform reasonableness check on audit_control or its standin; goal 2047c478bd9Sstevel@tonic-gate * is that "audit -s" (1) not crash the system and (2) c2audit/auditd 2057c478bd9Sstevel@tonic-gate * actually generates data. 2067c478bd9Sstevel@tonic-gate * 2077c478bd9Sstevel@tonic-gate * A NULL input is ok -- it is used to tell _openac() to use the 2087c478bd9Sstevel@tonic-gate * real audit_control file, not a substitute. 2097c478bd9Sstevel@tonic-gate */ 2107c478bd9Sstevel@tonic-gate #define TRADITIONAL_MAX 1024 2117c478bd9Sstevel@tonic-gate 2127c478bd9Sstevel@tonic-gate static boolean_t 2137c478bd9Sstevel@tonic-gate is_audit_control_ok(char *filename) { 2147c478bd9Sstevel@tonic-gate char buf[TRADITIONAL_MAX]; 2157c478bd9Sstevel@tonic-gate int outputs = 0; 2167c478bd9Sstevel@tonic-gate int state = 1; /* 1 is ok, 0 is not */ 2177c478bd9Sstevel@tonic-gate int rc; 2187c478bd9Sstevel@tonic-gate int min; 2197c478bd9Sstevel@tonic-gate kva_t *kvlist; 220*1a578a15Spaulson char *plugin_name; 221*1a578a15Spaulson char *plugin_dir; 2227c478bd9Sstevel@tonic-gate au_acinfo_t *ach; 2237c478bd9Sstevel@tonic-gate 2247c478bd9Sstevel@tonic-gate ach = _openac(filename); /* open audit_control */ 2257c478bd9Sstevel@tonic-gate if (ach == NULL) { 2267c478bd9Sstevel@tonic-gate perror(progname); 2277c478bd9Sstevel@tonic-gate exit(9); 2287c478bd9Sstevel@tonic-gate } 2297c478bd9Sstevel@tonic-gate /* 2307c478bd9Sstevel@tonic-gate * There must be at least one directory or one plugin 2317c478bd9Sstevel@tonic-gate * defined. 2327c478bd9Sstevel@tonic-gate */ 2337c478bd9Sstevel@tonic-gate if ((rc = _getacdir(ach, buf, TRADITIONAL_MAX)) == 0) { 2347c478bd9Sstevel@tonic-gate outputs++; 2357c478bd9Sstevel@tonic-gate } else if (rc < -1) { /* -1 is not found, others are errors */ 2367c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 2377c478bd9Sstevel@tonic-gate gettext("%s: audit_control \"dir:\" spec invalid\n"), 2387c478bd9Sstevel@tonic-gate progname); 2397c478bd9Sstevel@tonic-gate state = 0; /* is_not_ok */ 2407c478bd9Sstevel@tonic-gate } 2417c478bd9Sstevel@tonic-gate 2427c478bd9Sstevel@tonic-gate /* 2437c478bd9Sstevel@tonic-gate * _getacplug -- all that is of interest is the return code. 2447c478bd9Sstevel@tonic-gate */ 2457c478bd9Sstevel@tonic-gate _rewindac(ach); /* rewind audit_control */ 246*1a578a15Spaulson while ((rc = _getacplug(ach, &kvlist)) == 0) { 247*1a578a15Spaulson plugin_name = kva_match(kvlist, "name"); 248*1a578a15Spaulson if (plugin_name == NULL) { 2497c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("%s: audit_control " 2507c478bd9Sstevel@tonic-gate "\"plugin:\" missing name\n"), progname); 2517c478bd9Sstevel@tonic-gate state = 0; /* is_not_ok */ 252*1a578a15Spaulson } else { 253*1a578a15Spaulson if (strcmp(plugin_name, "audit_binfile.so") == 0) { 254*1a578a15Spaulson plugin_dir = kva_match(kvlist, "p_dir"); 255*1a578a15Spaulson if ((plugin_dir == NULL) && (outputs == 0)) { 256*1a578a15Spaulson (void) fprintf(stderr, 257*1a578a15Spaulson gettext("%s: audit_control " 258*1a578a15Spaulson "\"plugin:\" missing p_dir\n"), 259*1a578a15Spaulson progname); 260*1a578a15Spaulson state = 0; /* is_not_ok */ 261*1a578a15Spaulson } else { 2627c478bd9Sstevel@tonic-gate outputs++; 263*1a578a15Spaulson } 264*1a578a15Spaulson } 265*1a578a15Spaulson } 2667c478bd9Sstevel@tonic-gate _kva_free(kvlist); 267*1a578a15Spaulson } 268*1a578a15Spaulson if (rc < -1) { 2697c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 2707c478bd9Sstevel@tonic-gate gettext("%s: audit_control \"plugin:\" spec invalid\n"), 2717c478bd9Sstevel@tonic-gate progname); 2727c478bd9Sstevel@tonic-gate state = 0; /* is_not_ok */ 2737c478bd9Sstevel@tonic-gate } 2747c478bd9Sstevel@tonic-gate if (outputs == 0) { 2757c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 2767c478bd9Sstevel@tonic-gate gettext("%s: audit_control must have either a " 277*1a578a15Spaulson "valid \"dir:\" entry or a valid \"plugin:\" " 278*1a578a15Spaulson "entry with \"p_dir:\" specified.\n"), 2797c478bd9Sstevel@tonic-gate progname); 2807c478bd9Sstevel@tonic-gate state = 0; /* is_not_ok */ 2817c478bd9Sstevel@tonic-gate } 2827c478bd9Sstevel@tonic-gate /* minfree is not required */ 2837c478bd9Sstevel@tonic-gate _rewindac(ach); 2847c478bd9Sstevel@tonic-gate if ((rc = _getacmin(ach, &min)) < -1) { 2857c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 2867c478bd9Sstevel@tonic-gate gettext( 2877c478bd9Sstevel@tonic-gate "%s: audit_control \"minfree:\" spec invalid\n"), 2887c478bd9Sstevel@tonic-gate progname); 2897c478bd9Sstevel@tonic-gate state = 0; /* is_not_ok */ 2907c478bd9Sstevel@tonic-gate } 2917c478bd9Sstevel@tonic-gate /* flags is not required */ 2927c478bd9Sstevel@tonic-gate _rewindac(ach); 2937c478bd9Sstevel@tonic-gate if ((rc = _getacflg(ach, buf, TRADITIONAL_MAX)) < -1) { 2947c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 2957c478bd9Sstevel@tonic-gate gettext("%s: audit_control \"flags:\" spec invalid\n"), 2967c478bd9Sstevel@tonic-gate progname); 2977c478bd9Sstevel@tonic-gate state = 0; /* is_not_ok */ 2987c478bd9Sstevel@tonic-gate } 2997c478bd9Sstevel@tonic-gate /* naflags is not required */ 3007c478bd9Sstevel@tonic-gate _rewindac(ach); 3017c478bd9Sstevel@tonic-gate if ((rc = _getacna(ach, buf, TRADITIONAL_MAX)) < -1) { 3027c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 3037c478bd9Sstevel@tonic-gate gettext( 3047c478bd9Sstevel@tonic-gate "%s: audit_control \"naflags:\" spec invalid\n"), 3057c478bd9Sstevel@tonic-gate progname); 3067c478bd9Sstevel@tonic-gate state = 0; /* is_not_ok */ 3077c478bd9Sstevel@tonic-gate } 3087c478bd9Sstevel@tonic-gate _endac(ach); 3097c478bd9Sstevel@tonic-gate return (state); 3107c478bd9Sstevel@tonic-gate } 3117c478bd9Sstevel@tonic-gate 3127c478bd9Sstevel@tonic-gate /* 3137c478bd9Sstevel@tonic-gate * The operations that call this function are only valid in the global 3147c478bd9Sstevel@tonic-gate * zone unless the perzone audit policy is set. 3157c478bd9Sstevel@tonic-gate * 3167c478bd9Sstevel@tonic-gate * "!silent" and "show_err" are slightly different; silent is from 3177c478bd9Sstevel@tonic-gate * -T for which no error messages should be displayed and show_err 3187c478bd9Sstevel@tonic-gate * applies to more options (including -T) 3197c478bd9Sstevel@tonic-gate * 3207c478bd9Sstevel@tonic-gate */ 3217c478bd9Sstevel@tonic-gate 3227c478bd9Sstevel@tonic-gate static boolean_t 3237c478bd9Sstevel@tonic-gate is_valid_zone(boolean_t show_err) 3247c478bd9Sstevel@tonic-gate { 3257c478bd9Sstevel@tonic-gate long policy; 3267c478bd9Sstevel@tonic-gate 3277c478bd9Sstevel@tonic-gate if (auditon(A_GETPOLICY, (char *)&policy, 0) == -1) { 3287c478bd9Sstevel@tonic-gate if (!silent) 3297c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3307c478bd9Sstevel@tonic-gate "%s: Cannot read audit policy: %s\n"), 3317c478bd9Sstevel@tonic-gate progname, strerror(errno)); 3327c478bd9Sstevel@tonic-gate return (0); 3337c478bd9Sstevel@tonic-gate } 3347c478bd9Sstevel@tonic-gate if (policy & AUDIT_PERZONE) 3357c478bd9Sstevel@tonic-gate return (1); 3367c478bd9Sstevel@tonic-gate 3377c478bd9Sstevel@tonic-gate if (getzoneid() != GLOBAL_ZONEID) { 3387c478bd9Sstevel@tonic-gate if (show_err) 3397c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 3407c478bd9Sstevel@tonic-gate gettext("%s: Not valid in a local zone.\n"), 3417c478bd9Sstevel@tonic-gate progname); 3427c478bd9Sstevel@tonic-gate return (0); 3437c478bd9Sstevel@tonic-gate } else { 3447c478bd9Sstevel@tonic-gate return (1); 3457c478bd9Sstevel@tonic-gate } 3467c478bd9Sstevel@tonic-gate } 3477c478bd9Sstevel@tonic-gate 3487c478bd9Sstevel@tonic-gate /* 3497c478bd9Sstevel@tonic-gate * if auditd isn't running, start it. Otherwise refresh. 3507c478bd9Sstevel@tonic-gate * First check to see if c2audit is loaded via the auditon() 3517c478bd9Sstevel@tonic-gate * system call, then check SMF state. 3527c478bd9Sstevel@tonic-gate */ 3536d59ee37Spaulson static int 3547c478bd9Sstevel@tonic-gate start_auditd() 3557c478bd9Sstevel@tonic-gate { 3567c478bd9Sstevel@tonic-gate int audit_state; 3577c478bd9Sstevel@tonic-gate char *state; 3587c478bd9Sstevel@tonic-gate 3597c478bd9Sstevel@tonic-gate if (auditon(A_GETCOND, (caddr_t)&audit_state, 3607c478bd9Sstevel@tonic-gate sizeof (audit_state)) != 0) 3616d59ee37Spaulson return (12); 3627c478bd9Sstevel@tonic-gate 3637c478bd9Sstevel@tonic-gate if ((state = smf_get_state(instance_name)) == NULL) { 3647c478bd9Sstevel@tonic-gate display_smf_error(); 3656d59ee37Spaulson return (13); 3667c478bd9Sstevel@tonic-gate } 3677c478bd9Sstevel@tonic-gate if (strcmp(SCF_STATE_STRING_ONLINE, state) != 0) { 3686d59ee37Spaulson if (smf_enable_instance(instance_name, 0) != 0) { 3697c478bd9Sstevel@tonic-gate display_smf_error(); 3706d59ee37Spaulson free(state); 3716d59ee37Spaulson return (14); 3726d59ee37Spaulson } 3737c478bd9Sstevel@tonic-gate } else { 3746d59ee37Spaulson if (smf_refresh_instance(instance_name) != 0) { 3757c478bd9Sstevel@tonic-gate display_smf_error(); 3766d59ee37Spaulson free(state); 3776d59ee37Spaulson return (15); 3786d59ee37Spaulson } 3797c478bd9Sstevel@tonic-gate } 3807c478bd9Sstevel@tonic-gate free(state); 3816d59ee37Spaulson return (0); 3827c478bd9Sstevel@tonic-gate } 3837c478bd9Sstevel@tonic-gate 3847c478bd9Sstevel@tonic-gate static void 3857c478bd9Sstevel@tonic-gate display_smf_error() 3867c478bd9Sstevel@tonic-gate { 3877c478bd9Sstevel@tonic-gate int rc = scf_error(); 3887c478bd9Sstevel@tonic-gate 3897c478bd9Sstevel@tonic-gate switch (rc) { 3907c478bd9Sstevel@tonic-gate case SCF_ERROR_NOT_FOUND: 3917c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 3927c478bd9Sstevel@tonic-gate "SMF error: \"%s\" not found.\n", 3937c478bd9Sstevel@tonic-gate instance_name); 3947c478bd9Sstevel@tonic-gate break; 3957c478bd9Sstevel@tonic-gate default: 3966d59ee37Spaulson (void) fprintf(stderr, "SMF error: %s\n", scf_strerror(rc)); 3977c478bd9Sstevel@tonic-gate break; 3987c478bd9Sstevel@tonic-gate } 3997c478bd9Sstevel@tonic-gate } 400