Current Path : /usr/src/contrib/openbsm/bin/auditd/ |
FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64 |
Current File : //usr/src/contrib/openbsm/bin/auditd/audit_warn.c |
/*- * Copyright (c) 2005-2009 Apple Inc. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of Apple Inc. ("Apple") nor the names of * its contributors may be used to endorse or promote products derived * from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * $P4: //depot/projects/trustedbsd/openbsm/bin/auditd/audit_warn.c#11 $ */ #include <sys/types.h> #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include "auditd.h" /* * Write an audit-related error to the system log via syslog(3). */ static int auditwarnlog(char *args[]) { char *loc_args[9]; pid_t pid; int i; loc_args[0] = AUDITWARN_SCRIPT; for (i = 0; args[i] != NULL && i < 8; i++) loc_args[i+1] = args[i]; loc_args[i+1] = NULL; pid = fork(); if (pid == -1) return (-1); if (pid == 0) { /* * Child. */ execv(AUDITWARN_SCRIPT, loc_args); syslog(LOG_ERR, "Could not exec %s (%m)\n", AUDITWARN_SCRIPT); exit(1); } /* * Parent. */ return (0); } /* * Indicates that the hard limit for all filesystems has been exceeded. */ int audit_warn_allhard(void) { char *args[2]; args[0] = HARDLIM_ALL_WARN; args[1] = NULL; return (auditwarnlog(args)); } /* * Indicates that the soft limit for all filesystems has been exceeded. */ int audit_warn_allsoft(void) { char *args[2]; args[0] = SOFTLIM_ALL_WARN; args[1] = NULL; return (auditwarnlog(args)); } /* * Indicates that someone other than the audit daemon turned off auditing. * XXX Its not clear at this point how this function will be invoked. * * XXXRW: This function is not used. */ int audit_warn_auditoff(void) { char *args[2]; args[0] = AUDITOFF_WARN; args[1] = NULL; return (auditwarnlog(args)); } /* * Indicate that a trail file has been closed, so can now be post-processed. */ int audit_warn_closefile(char *filename) { char *args[3]; args[0] = CLOSEFILE_WARN; args[1] = filename; args[2] = NULL; return (auditwarnlog(args)); } /* * Indicates that the audit deammn is already running */ int audit_warn_ebusy(void) { char *args[2]; args[0] = EBUSY_WARN; args[1] = NULL; return (auditwarnlog(args)); } /* * Indicates that there is a problem getting the directory from * audit_control. * * XXX Note that we take the filename instead of a count as the argument here * (different from BSM). */ int audit_warn_getacdir(char *filename) { char *args[3]; args[0] = GETACDIR_WARN; args[1] = filename; args[2] = NULL; return (auditwarnlog(args)); } /* * Indicates that the hard limit for this file has been exceeded. */ int audit_warn_hard(char *filename) { char *args[3]; args[0] = HARDLIM_WARN; args[1] = filename; args[2] = NULL; return (auditwarnlog(args)); } /* * Indicates that auditing could not be started. */ int audit_warn_nostart(void) { char *args[2]; args[0] = NOSTART_WARN; args[1] = NULL; return (auditwarnlog(args)); } /* * Indicaes that an error occrred during the orderly shutdown of the audit * daemon. */ int audit_warn_postsigterm(void) { char *args[2]; args[0] = POSTSIGTERM_WARN; args[1] = NULL; return (auditwarnlog(args)); } /* * Indicates that the soft limit for this file has been exceeded. */ int audit_warn_soft(char *filename) { char *args[3]; args[0] = SOFTLIM_WARN; args[1] = filename; args[2] = NULL; return (auditwarnlog(args)); } /* * Indicates that the temporary audit file already exists indicating a fatal * error. */ int audit_warn_tmpfile(void) { char *args[2]; args[0] = TMPFILE_WARN; args[1] = NULL; return (auditwarnlog(args)); } /* * Indicates that this trail file has expired and was removed. */ int audit_warn_expired(char *filename) { char *args[3]; args[0] = EXPIRED_WARN; args[1] = filename; args[2] = NULL; return (auditwarnlog(args)); }