xref: /titanic_41/usr/src/cmd/acct/accton.c (revision 414388d7cb2ee98771e2ac7c2338c460abd44304)
17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate  * CDDL HEADER START
37c478bd9Sstevel@tonic-gate  *
47c478bd9Sstevel@tonic-gate  * The contents of this file are subject to the terms of the
57c478bd9Sstevel@tonic-gate  * Common Development and Distribution License, Version 1.0 only
67c478bd9Sstevel@tonic-gate  * (the "License").  You may not use this file except in compliance
77c478bd9Sstevel@tonic-gate  * with the License.
87c478bd9Sstevel@tonic-gate  *
97c478bd9Sstevel@tonic-gate  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
107c478bd9Sstevel@tonic-gate  * or http://www.opensolaris.org/os/licensing.
117c478bd9Sstevel@tonic-gate  * See the License for the specific language governing permissions
127c478bd9Sstevel@tonic-gate  * and limitations under the License.
137c478bd9Sstevel@tonic-gate  *
147c478bd9Sstevel@tonic-gate  * When distributing Covered Code, include this CDDL HEADER in each
157c478bd9Sstevel@tonic-gate  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
167c478bd9Sstevel@tonic-gate  * If applicable, add the following below this CDDL HEADER, with the
177c478bd9Sstevel@tonic-gate  * fields enclosed by brackets "[]" replaced with your own identifying
187c478bd9Sstevel@tonic-gate  * information: Portions Copyright [yyyy] [name of copyright owner]
197c478bd9Sstevel@tonic-gate  *
207c478bd9Sstevel@tonic-gate  * CDDL HEADER END
217c478bd9Sstevel@tonic-gate  */
227c478bd9Sstevel@tonic-gate /*	Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T	*/
237c478bd9Sstevel@tonic-gate /*	  All Rights Reserved  	*/
247c478bd9Sstevel@tonic-gate 
257c478bd9Sstevel@tonic-gate /*
26*414388d7Ssl108498  * Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
277c478bd9Sstevel@tonic-gate  * Use is subject to license terms.
287c478bd9Sstevel@tonic-gate  */
297c478bd9Sstevel@tonic-gate #pragma ident	"%Z%%M%	%I%	%E% SMI"
307c478bd9Sstevel@tonic-gate 
317c478bd9Sstevel@tonic-gate /*
327c478bd9Sstevel@tonic-gate  *	accton - calls syscall with super-user privileges
337c478bd9Sstevel@tonic-gate  */
347c478bd9Sstevel@tonic-gate 
357c478bd9Sstevel@tonic-gate #include <stdio.h>
367c478bd9Sstevel@tonic-gate #include <sys/types.h>
377c478bd9Sstevel@tonic-gate #include <sys/param.h>
387c478bd9Sstevel@tonic-gate #include "acctdef.h"
397c478bd9Sstevel@tonic-gate #include <errno.h>
407c478bd9Sstevel@tonic-gate #include <sys/stat.h>
417c478bd9Sstevel@tonic-gate #include <pwd.h>
427c478bd9Sstevel@tonic-gate #include <fcntl.h>
43*414388d7Ssl108498 #include <stdlib.h>
447c478bd9Sstevel@tonic-gate 
457c478bd9Sstevel@tonic-gate uid_t	admuid;
46*414388d7Ssl108498 struct	passwd *pwd;
477c478bd9Sstevel@tonic-gate 
48*414388d7Ssl108498 void ckfile(char *);
49*414388d7Ssl108498 
50*414388d7Ssl108498 int
main(int argc,char ** argv)51*414388d7Ssl108498 main(int argc, char **argv)
527c478bd9Sstevel@tonic-gate {
53*414388d7Ssl108498 	uid_t	uid;
547c478bd9Sstevel@tonic-gate 
557c478bd9Sstevel@tonic-gate 	uid = getuid();
567c478bd9Sstevel@tonic-gate 	if ((pwd = getpwnam("adm")) == NULL) {
577c478bd9Sstevel@tonic-gate 		perror("cannot determine adm's uid"), exit(1);
587c478bd9Sstevel@tonic-gate 	}
597c478bd9Sstevel@tonic-gate 	admuid = pwd->pw_uid;
607c478bd9Sstevel@tonic-gate 	if (uid == ROOT || uid == admuid) {
617c478bd9Sstevel@tonic-gate 		if (setuid(ROOT) == ERR) {
627c478bd9Sstevel@tonic-gate 			perror("cannot setuid (check command mode and owner)");
637c478bd9Sstevel@tonic-gate 			exit(1);
647c478bd9Sstevel@tonic-gate 		}
657c478bd9Sstevel@tonic-gate 		if (argv[1])
667c478bd9Sstevel@tonic-gate 			ckfile(argv[1]);
677c478bd9Sstevel@tonic-gate 		if (acct(argc > 1 ? argv[1] : 0) < 0) {
687c478bd9Sstevel@tonic-gate 			perror(argv[1]), exit(1);
697c478bd9Sstevel@tonic-gate 		}
707c478bd9Sstevel@tonic-gate 		exit(0);
717c478bd9Sstevel@tonic-gate 
727c478bd9Sstevel@tonic-gate 	}
737c478bd9Sstevel@tonic-gate 	fprintf(stderr, "%s: permission denied\n", argv[0]);
747c478bd9Sstevel@tonic-gate 	exit(1);
757c478bd9Sstevel@tonic-gate }
767c478bd9Sstevel@tonic-gate 
77*414388d7Ssl108498 void
ckfile(char * admfile)78*414388d7Ssl108498 ckfile(char *admfile)
797c478bd9Sstevel@tonic-gate {
807c478bd9Sstevel@tonic-gate 	struct stat		stbuf;
81*414388d7Ssl108498 	struct stat	*s = &stbuf;
827c478bd9Sstevel@tonic-gate 	int fd;
837c478bd9Sstevel@tonic-gate 
847c478bd9Sstevel@tonic-gate 	if ((fd = open(admfile, O_RDONLY|O_CREAT, 0644)) == ERR) {
857c478bd9Sstevel@tonic-gate 		perror("creat"), exit(1);
867c478bd9Sstevel@tonic-gate 	}
877c478bd9Sstevel@tonic-gate 
887c478bd9Sstevel@tonic-gate 	if (fstat(fd, s) == ERR) {
897c478bd9Sstevel@tonic-gate 		perror("fstat");
907c478bd9Sstevel@tonic-gate 		exit(1);
917c478bd9Sstevel@tonic-gate 	}
927c478bd9Sstevel@tonic-gate 
937c478bd9Sstevel@tonic-gate 	if (s->st_uid != admuid || s->st_gid != (gid_t)admuid)
947c478bd9Sstevel@tonic-gate 		if (fchown(fd, admuid, (gid_t)admuid) == ERR) {
957c478bd9Sstevel@tonic-gate 			perror("cannot change owner"), exit(1);
967c478bd9Sstevel@tonic-gate 		}
977c478bd9Sstevel@tonic-gate 
987c478bd9Sstevel@tonic-gate 	/* was if(s->st_mode & 0777 != 0664) */
997c478bd9Sstevel@tonic-gate 	if ((s->st_mode & S_IAMB) != S_IRUSR|S_IWUSR|S_IRGRP|S_IWUSR|S_IROTH)
1007c478bd9Sstevel@tonic-gate 	    if (fchmod(fd, S_IRUSR|S_IWUSR|S_IRGRP|S_IWUSR|S_IROTH) == ERR) {
1017c478bd9Sstevel@tonic-gate 			perror("cannot chmod"), exit(1);
1027c478bd9Sstevel@tonic-gate 	    }
1037c478bd9Sstevel@tonic-gate 
1047c478bd9Sstevel@tonic-gate 	(void) close(fd);
1057c478bd9Sstevel@tonic-gate }
106