xref: /illumos-gate/usr/src/cmd/acct/accton.c (revision 2a8bcb4e)
17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate  * CDDL HEADER START
37c478bd9Sstevel@tonic-gate  *
47c478bd9Sstevel@tonic-gate  * The contents of this file are subject to the terms of the
57c478bd9Sstevel@tonic-gate  * Common Development and Distribution License, Version 1.0 only
67c478bd9Sstevel@tonic-gate  * (the "License").  You may not use this file except in compliance
77c478bd9Sstevel@tonic-gate  * with the License.
87c478bd9Sstevel@tonic-gate  *
97c478bd9Sstevel@tonic-gate  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
107c478bd9Sstevel@tonic-gate  * or http://www.opensolaris.org/os/licensing.
117c478bd9Sstevel@tonic-gate  * See the License for the specific language governing permissions
127c478bd9Sstevel@tonic-gate  * and limitations under the License.
137c478bd9Sstevel@tonic-gate  *
147c478bd9Sstevel@tonic-gate  * When distributing Covered Code, include this CDDL HEADER in each
157c478bd9Sstevel@tonic-gate  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
167c478bd9Sstevel@tonic-gate  * If applicable, add the following below this CDDL HEADER, with the
177c478bd9Sstevel@tonic-gate  * fields enclosed by brackets "[]" replaced with your own identifying
187c478bd9Sstevel@tonic-gate  * information: Portions Copyright [yyyy] [name of copyright owner]
197c478bd9Sstevel@tonic-gate  *
207c478bd9Sstevel@tonic-gate  * CDDL HEADER END
217c478bd9Sstevel@tonic-gate  */
227c478bd9Sstevel@tonic-gate /*	Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T	*/
237c478bd9Sstevel@tonic-gate /*	  All Rights Reserved  	*/
247c478bd9Sstevel@tonic-gate 
257c478bd9Sstevel@tonic-gate /*
26*414388d7Ssl  * Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
277c478bd9Sstevel@tonic-gate  * Use is subject to license terms.
287c478bd9Sstevel@tonic-gate  */
297c478bd9Sstevel@tonic-gate 
307c478bd9Sstevel@tonic-gate /*
317c478bd9Sstevel@tonic-gate  *	accton - calls syscall with super-user privileges
327c478bd9Sstevel@tonic-gate  */
337c478bd9Sstevel@tonic-gate 
347c478bd9Sstevel@tonic-gate #include <stdio.h>
357c478bd9Sstevel@tonic-gate #include <sys/types.h>
367c478bd9Sstevel@tonic-gate #include <sys/param.h>
37*414388d7Ssl #include "acctdef.h"
38*414388d7Ssl #include <errno.h>
39*414388d7Ssl #include <sys/stat.h>
40*414388d7Ssl #include <pwd.h>
41*414388d7Ssl #include <fcntl.h>
42*414388d7Ssl #include <stdlib.h>
437c478bd9Sstevel@tonic-gate 
447c478bd9Sstevel@tonic-gate uid_t	admuid;
45*414388d7Ssl struct	passwd *pwd;
46*414388d7Ssl 
47*414388d7Ssl void ckfile(char *);
487c478bd9Sstevel@tonic-gate 
49*414388d7Ssl int
main(int argc,char ** argv)50*414388d7Ssl main(int argc, char **argv)
517c478bd9Sstevel@tonic-gate {
52*414388d7Ssl 	uid_t	uid;
537c478bd9Sstevel@tonic-gate 
547c478bd9Sstevel@tonic-gate 	uid = getuid();
557c478bd9Sstevel@tonic-gate 	if ((pwd = getpwnam("adm")) == NULL) {
567c478bd9Sstevel@tonic-gate 		perror("cannot determine adm's uid"), exit(1);
577c478bd9Sstevel@tonic-gate 	}
587c478bd9Sstevel@tonic-gate 	admuid = pwd->pw_uid;
597c478bd9Sstevel@tonic-gate 	if (uid == ROOT || uid == admuid) {
607c478bd9Sstevel@tonic-gate 		if (setuid(ROOT) == ERR) {
617c478bd9Sstevel@tonic-gate 			perror("cannot setuid (check command mode and owner)");
627c478bd9Sstevel@tonic-gate 			exit(1);
637c478bd9Sstevel@tonic-gate 		}
647c478bd9Sstevel@tonic-gate 		if (argv[1])
657c478bd9Sstevel@tonic-gate 			ckfile(argv[1]);
667c478bd9Sstevel@tonic-gate 		if (acct(argc > 1 ? argv[1] : 0) < 0) {
677c478bd9Sstevel@tonic-gate 			perror(argv[1]), exit(1);
687c478bd9Sstevel@tonic-gate 		}
697c478bd9Sstevel@tonic-gate 		exit(0);
707c478bd9Sstevel@tonic-gate 
717c478bd9Sstevel@tonic-gate 	}
727c478bd9Sstevel@tonic-gate 	fprintf(stderr, "%s: permission denied\n", argv[0]);
737c478bd9Sstevel@tonic-gate 	exit(1);
747c478bd9Sstevel@tonic-gate }
757c478bd9Sstevel@tonic-gate 
76*414388d7Ssl void
ckfile(char * admfile)77*414388d7Ssl ckfile(char *admfile)
787c478bd9Sstevel@tonic-gate {
797c478bd9Sstevel@tonic-gate 	struct stat		stbuf;
80*414388d7Ssl 	struct stat	*s = &stbuf;
817c478bd9Sstevel@tonic-gate 	int fd;
827c478bd9Sstevel@tonic-gate 
837c478bd9Sstevel@tonic-gate 	if ((fd = open(admfile, O_RDONLY|O_CREAT, 0644)) == ERR) {
847c478bd9Sstevel@tonic-gate 		perror("creat"), exit(1);
857c478bd9Sstevel@tonic-gate 	}
867c478bd9Sstevel@tonic-gate 
877c478bd9Sstevel@tonic-gate 	if (fstat(fd, s) == ERR) {
887c478bd9Sstevel@tonic-gate 		perror("fstat");
897c478bd9Sstevel@tonic-gate 		exit(1);
907c478bd9Sstevel@tonic-gate 	}
917c478bd9Sstevel@tonic-gate 
927c478bd9Sstevel@tonic-gate 	if (s->st_uid != admuid || s->st_gid != (gid_t)admuid)
937c478bd9Sstevel@tonic-gate 		if (fchown(fd, admuid, (gid_t)admuid) == ERR) {
947c478bd9Sstevel@tonic-gate 			perror("cannot change owner"), exit(1);
957c478bd9Sstevel@tonic-gate 		}
967c478bd9Sstevel@tonic-gate 
977c478bd9Sstevel@tonic-gate 	/* was if(s->st_mode & 0777 != 0664) */
987c478bd9Sstevel@tonic-gate 	if ((s->st_mode & S_IAMB) != S_IRUSR|S_IWUSR|S_IRGRP|S_IWUSR|S_IROTH)
997c478bd9Sstevel@tonic-gate 	    if (fchmod(fd, S_IRUSR|S_IWUSR|S_IRGRP|S_IWUSR|S_IROTH) == ERR) {
1007c478bd9Sstevel@tonic-gate 			perror("cannot chmod"), exit(1);
1017c478bd9Sstevel@tonic-gate 	    }
1027c478bd9Sstevel@tonic-gate 
1037c478bd9Sstevel@tonic-gate 	(void) close(fd);
1047c478bd9Sstevel@tonic-gate }
105