diff options
author | Theo de Raadt <deraadt@cvs.openbsd.org> | 1995-10-18 08:53:40 +0000 |
---|---|---|
committer | Theo de Raadt <deraadt@cvs.openbsd.org> | 1995-10-18 08:53:40 +0000 |
commit | d6583bb2a13f329cf0332ef2570eb8bb8fc0e39c (patch) | |
tree | ece253b876159b39c620e62b6c9b1174642e070e /sbin/mount_msdos/mount_msdos.c |
initial import of NetBSD tree
Diffstat (limited to 'sbin/mount_msdos/mount_msdos.c')
-rw-r--r-- | sbin/mount_msdos/mount_msdos.c | 201 |
1 files changed, 201 insertions, 0 deletions
diff --git a/sbin/mount_msdos/mount_msdos.c b/sbin/mount_msdos/mount_msdos.c new file mode 100644 index 00000000000..16ec67fad91 --- /dev/null +++ b/sbin/mount_msdos/mount_msdos.c @@ -0,0 +1,201 @@ +/* $NetBSD: mount_msdos.c,v 1.10 1995/03/18 14:57:38 cgd Exp $ */ + +/* + * Copyright (c) 1994 Christopher G. Demetriou + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * 3. All advertising materials mentioning features or use of this software + * must display the following acknowledgement: + * This product includes software developed by Christopher G. Demetriou. + * 4. The name of the author may not be used to endorse or promote products + * derived from this software without specific prior written permission + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. + * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ + +#ifndef lint +static char rcsid[] = "$NetBSD: mount_msdos.c,v 1.10 1995/03/18 14:57:38 cgd Exp $"; +#endif /* not lint */ + +#include <sys/cdefs.h> +#include <sys/param.h> +#include <sys/mount.h> +#include <sys/stat.h> +#include <ctype.h> +#include <err.h> +#include <grp.h> +#include <pwd.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <unistd.h> + +#include "mntopts.h" + +struct mntopt mopts[] = { + MOPT_STDOPTS, + { NULL } +}; + +gid_t a_gid __P((char *)); +uid_t a_uid __P((char *)); +mode_t a_mask __P((char *)); +void usage __P((void)); + +int +main(argc, argv) + int argc; + char **argv; +{ + struct msdosfs_args args; + struct stat sb; + int c, mntflags, set_gid, set_uid, set_mask; + char *dev, *dir, ndir[MAXPATHLEN+1]; + + mntflags = set_gid = set_uid = set_mask = 0; + (void)memset(&args, '\0', sizeof(args)); + + while ((c = getopt(argc, argv, "u:g:m:o:")) != EOF) { + switch (c) { + case 'u': + args.uid = a_uid(optarg); + set_uid = 1; + break; + case 'g': + args.gid = a_gid(optarg); + set_gid = 1; + break; + case 'm': + args.mask = a_mask(optarg); + set_mask = 1; + break; + case 'o': + getmntopts(optarg, mopts, &mntflags); + break; + case '?': + default: + usage(); + break; + } + } + + if (optind + 2 != argc) + usage(); + + dev = argv[optind]; + dir = argv[optind + 1]; + if (dir[0] != '/') { + warnx("\"%s\" is a relative path.", dir); + if (getcwd(ndir, sizeof(ndir)) == NULL) + err(1, "getcwd"); + strncat(ndir, "/", sizeof(ndir) - strlen(ndir) - 1); + strncat(ndir, dir, sizeof(ndir) - strlen(ndir) - 1); + dir = ndir; + warnx("using \"%s\" instead.", dir); + } + + args.fspec = dev; + args.export.ex_root = -2; /* unchecked anyway on DOS fs */ + if (mntflags & MNT_RDONLY) + args.export.ex_flags = MNT_EXRDONLY; + else + args.export.ex_flags = 0; + if (!set_gid || !set_uid || !set_mask) { + if (stat(dir, &sb) == -1) + err(1, "stat %s", dir); + + if (!set_uid) + args.uid = sb.st_uid; + if (!set_gid) + args.gid = sb.st_gid; + if (!set_mask) + args.mask = sb.st_mode & (S_IRWXU | S_IRWXG | S_IRWXO); + } + + if (mount(MOUNT_MSDOS, dir, mntflags, &args) < 0) + err(1, "mount"); + + exit (0); +} + +gid_t +a_gid(s) + char *s; +{ + struct group *gr; + char *gname; + gid_t gid; + + if ((gr = getgrnam(s)) != NULL) + gid = gr->gr_gid; + else { + for (gname = s; *s && isdigit(*s); ++s); + if (!*s) + gid = atoi(gname); + else + errx(1, "unknown group id: %s", gname); + } + return (gid); +} + +uid_t +a_uid(s) + char *s; +{ + struct passwd *pw; + char *uname; + uid_t uid; + + if ((pw = getpwnam(s)) != NULL) + uid = pw->pw_uid; + else { + for (uname = s; *s && isdigit(*s); ++s); + if (!*s) + uid = atoi(uname); + else + errx(1, "unknown user id: %s", uname); + } + return (uid); +} + +mode_t +a_mask(s) + char *s; +{ + int done, rv; + char *ep; + + done = 0; + if (*s >= '0' && *s <= '7') { + done = 1; + rv = strtol(optarg, &ep, 8); + } + if (!done || rv < 0 || *ep) + errx(1, "invalid file mode: %s", s); + return (rv); +} + +void +usage() +{ + + fprintf(stderr, "usage: mount_msdos [-o options] [-u user] [-g group] [-m mask] bdev dir\n"); + exit(1); +} |