1/*	$NetBSD: mount_umap.c,v 1.22 2008/07/20 01:20:22 lukem Exp $	*/
2
3/*
4 * Copyright (c) 1992, 1993, 1994
5 *	The Regents of the University of California.  All rights reserved.
6 *
7 * This code is derived from software donated to Berkeley by
8 * Jan-Simon Pendry.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 *    notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 *    notice, this list of conditions and the following disclaimer in the
17 *    documentation and/or other materials provided with the distribution.
18 * 3. Neither the name of the University nor the names of its contributors
19 *    may be used to endorse or promote products derived from this software
20 *    without specific prior written permission.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 * SUCH DAMAGE.
33 */
34
35#include <sys/cdefs.h>
36#ifndef lint
37__COPYRIGHT("@(#) Copyright (c) 1992, 1993, 1994\
38 The Regents of the University of California.  All rights reserved.");
39#endif /* not lint */
40
41#ifndef lint
42#if 0
43static char sccsid[] = "@(#)mount_umap.c	8.5 (Berkeley) 4/26/95";
44#else
45__RCSID("$NetBSD: mount_umap.c,v 1.22 2008/07/20 01:20:22 lukem Exp $");
46#endif
47#endif /* not lint */
48
49#include <sys/param.h>
50#include <sys/mount.h>
51#include <sys/stat.h>
52
53#include <miscfs/umapfs/umap.h>
54
55#include <err.h>
56#include <stdio.h>
57#include <stdlib.h>
58#include <string.h>
59#include <unistd.h>
60
61#include <mntopts.h>
62
63#define ROOTUSER 0
64/*
65 * This define controls whether any user but the superuser can own and
66 * write mapfiles.  If other users can, system security can be gravely
67 * compromised.  If this is not a concern, undefine SECURITY.
68 */
69#define MAPSECURITY 1
70
71/*
72 * This routine provides the user interface to mounting a umap layer.
73 * It takes 4 mandatory parameters.  The mandatory arguments are the place
74 * where the next lower level is mounted, the place where the umap layer is to
75 * be mounted, the name of the user mapfile, and the name of the group
76 * mapfile.  The routine checks the ownerships and permissions on the
77 * mapfiles, then opens and reads them.  Then it calls mount(), which
78 * will, in turn, call the umap version of mount.
79 */
80
81static const struct mntopt mopts[] = {
82	MOPT_STDOPTS,
83	MOPT_NULL,
84};
85
86int	mount_umap(int argc, char **argv);
87__dead static void	usage(void);
88
89#ifndef MOUNT_NOMAIN
90int
91main(int argc, char **argv)
92{
93	return mount_umap(argc, argv);
94}
95#endif
96
97int
98mount_umap(int argc, char *argv[])
99{
100	static char not[] = "; not mounted.";
101	struct stat statbuf;
102	struct umap_args args;
103	FILE *fp, *gfp;
104	long d1, d2;
105	u_long mapdata[MAPFILEENTRIES][2];
106	u_long gmapdata[GMAPFILEENTRIES][2];
107	int ch, count, gnentries, mntflags, nentries;
108	char *gmapfile, *mapfile, buf[20];
109	char source[MAXPATHLEN], target[MAXPATHLEN];
110	mntoptparse_t mp;
111
112	mntflags = 0;
113	mapfile = gmapfile = NULL;
114	while ((ch = getopt(argc, argv, "g:o:u:")) != -1)
115		switch (ch) {
116		case 'g':
117			gmapfile = optarg;
118			break;
119		case 'o':
120			mp = getmntopts(optarg, mopts, &mntflags, 0);
121			if (mp == NULL)
122				err(1, "getmntopts");
123			freemntopts(mp);
124			break;
125		case 'u':
126			mapfile = optarg;
127			break;
128		case '?':
129		default:
130			usage();
131		}
132	argc -= optind;
133	argv += optind;
134
135	if (argc != 2 || mapfile == NULL || gmapfile == NULL)
136		usage();
137
138	if (realpath(argv[0], source) == NULL)        /* Check source path */
139		err(1, "realpath %s", argv[0]);
140	if (strncmp(argv[0], source, MAXPATHLEN)) {
141		warnx("\"%s\" is a relative path.", argv[0]);
142		warnx("using \"%s\" instead.", source);
143	}
144
145	if (realpath(argv[1], target) == NULL)        /* Check mounton path */
146		err(1, "realpath %s", argv[1]);
147	if (strncmp(argv[1], target, MAXPATHLEN)) {
148		warnx("\"%s\" is a relative path.", argv[1]);
149		warnx("using \"%s\" instead.", target);
150	}
151
152	/* Read in uid mapping data. */
153	if ((fp = fopen(mapfile, "r")) == NULL)
154		err(1, "%s%s", mapfile, not);
155
156#ifdef MAPSECURITY
157	/*
158	 * Check that group and other don't have write permissions on
159	 * this mapfile, and that the mapfile belongs to root.
160	 */
161	if (fstat(fileno(fp), &statbuf))
162		err(1, "%s%s", mapfile, not);
163	if (statbuf.st_mode & S_IWGRP || statbuf.st_mode & S_IWOTH) {
164		strmode(statbuf.st_mode, buf);
165		err(1, "%s: improper write permissions (%s)%s",
166		    mapfile, buf, not);
167	}
168	if (statbuf.st_uid != ROOTUSER)
169		errx(1, "%s does not belong to root%s", mapfile, not);
170#endif /* MAPSECURITY */
171
172	if ((fscanf(fp, "%d\n", &nentries)) != 1)
173		errx(1, "%s: nentries not found%s", mapfile, not);
174	if (nentries > MAPFILEENTRIES)
175		errx(1,
176		    "maximum number of entries is %d%s", MAPFILEENTRIES, not);
177#if 0
178	(void)printf("reading %d entries\n", nentries);
179#endif
180	for (count = 0; count < nentries; ++count) {
181		if ((fscanf(fp, "%lu %lu\n", &d1, &d2)) != 2) {
182			if (ferror(fp))
183				err(1, "%s%s", mapfile, not);
184			if (feof(fp))
185				errx(1, "%s: unexpected end-of-file%s",
186				    mapfile, not);
187			errx(1, "%s: illegal format (line %d)%s",
188			    mapfile, count + 2, not);
189		}
190		mapdata[count][0] = d1;
191		mapdata[count][1] = d2;
192#if 0
193		/* Fix a security hole. */
194		if (mapdata[count][1] == 0)
195			errx(1, "mapping id 0 not permitted (line %d)%s",
196			    count + 2, not);
197#endif
198	}
199
200	/* Read in gid mapping data. */
201	if ((gfp = fopen(gmapfile, "r")) == NULL)
202		err(1, "%s%s", gmapfile, not);
203
204#ifdef MAPSECURITY
205	/*
206	 * Check that group and other don't have write permissions on
207	 * this group mapfile, and that the file belongs to root.
208	 */
209	if (fstat(fileno(gfp), &statbuf))
210		err(1, "%s%s", gmapfile, not);
211	if (statbuf.st_mode & S_IWGRP || statbuf.st_mode & S_IWOTH) {
212		strmode(statbuf.st_mode, buf);
213		err(1, "%s: improper write permissions (%s)%s",
214		    gmapfile, buf, not);
215	}
216	if (statbuf.st_uid != ROOTUSER)
217		errx(1, "%s does not belong to root%s", gmapfile, not);
218#endif /* MAPSECURITY */
219
220	if ((fscanf(gfp, "%d\n", &gnentries)) != 1)
221		errx(1, "nentries not found%s", not);
222	if (gnentries > MAPFILEENTRIES)
223		errx(1,
224		    "maximum number of entries is %d%s", GMAPFILEENTRIES, not);
225#if 0
226	(void)printf("reading %d group entries\n", gnentries);
227#endif
228
229	for (count = 0; count < gnentries; ++count) {
230		if ((fscanf(gfp, "%lu %lu\n",
231		    &(gmapdata[count][0]), &(gmapdata[count][1]))) != 2) {
232			if (ferror(gfp))
233				err(1, "%s%s", gmapfile, not);
234			if (feof(gfp))
235				errx(1, "%s: unexpected end-of-file%s",
236				    gmapfile, not);
237			errx(1, "%s: illegal format (line %d)%s",
238			    gmapfile, count + 2, not);
239		}
240	}
241
242
243	/* Setup mount call args. */
244	args.la.target = source;
245	args.nentries = nentries;
246	args.mapdata = mapdata;
247	args.gnentries = gnentries;
248	args.gmapdata = gmapdata;
249
250	if (mount(MOUNT_UMAP, target, mntflags, &args, sizeof args) == -1)
251		err(1, "%s on %s", source, target);
252	if (mntflags & MNT_GETARGS) {
253		printf("nentries=%d, gnentries=%d\n", args.nentries,
254		    args.gnentries);
255	}
256	exit(0);
257}
258
259static void
260usage(void)
261{
262	(void)fprintf(stderr,
263"usage: mount_umap [-o options] -g groupmap -u usermap target_fs mount_point\n");
264	exit(1);
265}
266