17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 57c478bd9Sstevel@tonic-gate * Common Development and Distribution License, Version 1.0 only 67c478bd9Sstevel@tonic-gate * (the "License"). You may not use this file except in compliance 77c478bd9Sstevel@tonic-gate * with the License. 87c478bd9Sstevel@tonic-gate * 97c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 107c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 117c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 127c478bd9Sstevel@tonic-gate * and limitations under the License. 137c478bd9Sstevel@tonic-gate * 147c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 157c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 167c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 177c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 187c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 197c478bd9Sstevel@tonic-gate * 207c478bd9Sstevel@tonic-gate * CDDL HEADER END 217c478bd9Sstevel@tonic-gate */ 227c478bd9Sstevel@tonic-gate /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */ 237c478bd9Sstevel@tonic-gate /* All Rights Reserved */ 247c478bd9Sstevel@tonic-gate 257c478bd9Sstevel@tonic-gate /* 26*414388d7Ssl108498 * Copyright 2005 Sun Microsystems, Inc. All rights reserved. 277c478bd9Sstevel@tonic-gate * Use is subject to license terms. 287c478bd9Sstevel@tonic-gate */ 297c478bd9Sstevel@tonic-gate #pragma ident "%Z%%M% %I% %E% SMI" 307c478bd9Sstevel@tonic-gate 317c478bd9Sstevel@tonic-gate /* 327c478bd9Sstevel@tonic-gate * accton - calls syscall with super-user privileges 337c478bd9Sstevel@tonic-gate */ 347c478bd9Sstevel@tonic-gate 357c478bd9Sstevel@tonic-gate #include <stdio.h> 367c478bd9Sstevel@tonic-gate #include <sys/types.h> 377c478bd9Sstevel@tonic-gate #include <sys/param.h> 387c478bd9Sstevel@tonic-gate #include "acctdef.h" 397c478bd9Sstevel@tonic-gate #include <errno.h> 407c478bd9Sstevel@tonic-gate #include <sys/stat.h> 417c478bd9Sstevel@tonic-gate #include <pwd.h> 427c478bd9Sstevel@tonic-gate #include <fcntl.h> 43*414388d7Ssl108498 #include <stdlib.h> 447c478bd9Sstevel@tonic-gate 457c478bd9Sstevel@tonic-gate uid_t admuid; 46*414388d7Ssl108498 struct passwd *pwd; 477c478bd9Sstevel@tonic-gate 48*414388d7Ssl108498 void ckfile(char *); 49*414388d7Ssl108498 50*414388d7Ssl108498 int 51*414388d7Ssl108498 main(int argc, char **argv) 527c478bd9Sstevel@tonic-gate { 53*414388d7Ssl108498 uid_t uid; 547c478bd9Sstevel@tonic-gate 557c478bd9Sstevel@tonic-gate uid = getuid(); 567c478bd9Sstevel@tonic-gate if ((pwd = getpwnam("adm")) == NULL) { 577c478bd9Sstevel@tonic-gate perror("cannot determine adm's uid"), exit(1); 587c478bd9Sstevel@tonic-gate } 597c478bd9Sstevel@tonic-gate admuid = pwd->pw_uid; 607c478bd9Sstevel@tonic-gate if (uid == ROOT || uid == admuid) { 617c478bd9Sstevel@tonic-gate if (setuid(ROOT) == ERR) { 627c478bd9Sstevel@tonic-gate perror("cannot setuid (check command mode and owner)"); 637c478bd9Sstevel@tonic-gate exit(1); 647c478bd9Sstevel@tonic-gate } 657c478bd9Sstevel@tonic-gate if (argv[1]) 667c478bd9Sstevel@tonic-gate ckfile(argv[1]); 677c478bd9Sstevel@tonic-gate if (acct(argc > 1 ? argv[1] : 0) < 0) { 687c478bd9Sstevel@tonic-gate perror(argv[1]), exit(1); 697c478bd9Sstevel@tonic-gate } 707c478bd9Sstevel@tonic-gate exit(0); 717c478bd9Sstevel@tonic-gate 727c478bd9Sstevel@tonic-gate } 737c478bd9Sstevel@tonic-gate fprintf(stderr, "%s: permission denied\n", argv[0]); 747c478bd9Sstevel@tonic-gate exit(1); 757c478bd9Sstevel@tonic-gate } 767c478bd9Sstevel@tonic-gate 77*414388d7Ssl108498 void 78*414388d7Ssl108498 ckfile(char *admfile) 797c478bd9Sstevel@tonic-gate { 807c478bd9Sstevel@tonic-gate struct stat stbuf; 81*414388d7Ssl108498 struct stat *s = &stbuf; 827c478bd9Sstevel@tonic-gate int fd; 837c478bd9Sstevel@tonic-gate 847c478bd9Sstevel@tonic-gate if ((fd = open(admfile, O_RDONLY|O_CREAT, 0644)) == ERR) { 857c478bd9Sstevel@tonic-gate perror("creat"), exit(1); 867c478bd9Sstevel@tonic-gate } 877c478bd9Sstevel@tonic-gate 887c478bd9Sstevel@tonic-gate if (fstat(fd, s) == ERR) { 897c478bd9Sstevel@tonic-gate perror("fstat"); 907c478bd9Sstevel@tonic-gate exit(1); 917c478bd9Sstevel@tonic-gate } 927c478bd9Sstevel@tonic-gate 937c478bd9Sstevel@tonic-gate if (s->st_uid != admuid || s->st_gid != (gid_t)admuid) 947c478bd9Sstevel@tonic-gate if (fchown(fd, admuid, (gid_t)admuid) == ERR) { 957c478bd9Sstevel@tonic-gate perror("cannot change owner"), exit(1); 967c478bd9Sstevel@tonic-gate } 977c478bd9Sstevel@tonic-gate 987c478bd9Sstevel@tonic-gate /* was if(s->st_mode & 0777 != 0664) */ 997c478bd9Sstevel@tonic-gate if ((s->st_mode & S_IAMB) != S_IRUSR|S_IWUSR|S_IRGRP|S_IWUSR|S_IROTH) 1007c478bd9Sstevel@tonic-gate if (fchmod(fd, S_IRUSR|S_IWUSR|S_IRGRP|S_IWUSR|S_IROTH) == ERR) { 1017c478bd9Sstevel@tonic-gate perror("cannot chmod"), exit(1); 1027c478bd9Sstevel@tonic-gate } 1037c478bd9Sstevel@tonic-gate 1047c478bd9Sstevel@tonic-gate (void) close(fd); 1057c478bd9Sstevel@tonic-gate } 106