/* $OpenBSD: mount_umap.c,v 1.13 2003/06/11 06:22:14 deraadt Exp $ */ /* $NetBSD: mount_umap.c,v 1.5 1996/04/13 01:32:05 jtc Exp $ */ /* * Copyright (c) 1992, 1993, 1994 * The Regents of the University of California. All rights reserved. * * This code is derived from software donated to Berkeley by * Jan-Simon Pendry. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #ifndef lint char copyright[] = "@(#) Copyright (c) 1992, 1993, 1994\n\ The Regents of the University of California. All rights reserved.\n"; #endif /* not lint */ #ifndef lint #if 0 static char sccsid[] = "@(#)mount_umap.c 8.3 (Berkeley) 3/27/94"; #else static char rcsid[] = "$OpenBSD: mount_umap.c,v 1.13 2003/06/11 06:22:14 deraadt Exp $"; #endif #endif /* not lint */ #include #include #include #include #include #include #include #include #include #include #include "mntopts.h" #define ROOTUSER 0 /* * This define controls whether any user but the superuser can own and * write mapfiles. If other users can, system security can be gravely * compromised. If this is not a concern, undefine SECURITY. */ #define MAPSECURITY 1 /* * This routine provides the user interface to mounting a umap layer. * It takes 4 mandatory parameters. The mandatory arguments are the place * where the next lower level is mounted, the place where the umap layer is to * be mounted, the name of the user mapfile, and the name of the group * mapfile. The routine checks the ownerships and permissions on the * mapfiles, then opens and reads them. Then it calls mount(), which * will, in turn, call the umap version of mount. */ const struct mntopt mopts[] = { MOPT_STDOPTS, { NULL } }; void usage(void); int main(int argc, char *argv[]) { static char not[] = "; not mounted."; struct stat statbuf; struct umap_args args; FILE *fp, *gfp; long d1, d2; u_long umapdata[UMAPFILEENTRIES][2]; u_long gmapdata[GMAPFILEENTRIES][2]; int ch, count, gnentries, mntflags, unentries; char *gmapfile, *umapfile, *source, *target, buf[20]; mntflags = 0; umapfile = gmapfile = NULL; while ((ch = getopt(argc, argv, "g:o:u:")) != -1) switch (ch) { case 'g': gmapfile = optarg; break; case 'o': getmntopts(optarg, mopts, &mntflags); break; case 'u': umapfile = optarg; break; case '?': default: usage(); } argc -= optind; argv += optind; if (argc != 2 || umapfile == NULL || gmapfile == NULL) usage(); source = argv[0]; target = argv[1]; /* Read in uid mapping data. */ if ((fp = fopen(umapfile, "r")) == NULL) err(1, "%s%s", umapfile, not); #ifdef MAPSECURITY /* * Check that group and other don't have write permissions on * this umapfile, and that the umapfile belongs to root. */ if (fstat(fileno(fp), &statbuf)) err(1, "%s%s", umapfile, not); if (statbuf.st_mode & S_IWGRP || statbuf.st_mode & S_IWOTH) { strmode(statbuf.st_mode, buf); err(1, "%s: improper write permissions (%s)%s", umapfile, buf, not); } if (statbuf.st_uid != ROOTUSER) errx(1, "%s does not belong to root%s", umapfile, not); #endif /* MAPSECURITY */ if ((fscanf(fp, "%d\n", &unentries)) != 1) errx(1, "%s: nentries not found%s", umapfile, not); if (unentries > UMAPFILEENTRIES) errx(1, "maximum number of entries is %d%s", UMAPFILEENTRIES, not); #if 0 (void)printf("reading %d entries\n", unentries); #endif for (count = 0; count < unentries; ++count) { if ((fscanf(fp, "%lu %lu\n", &d1, &d2)) != 2) { if (ferror(fp)) err(1, "%s%s", umapfile, not); if (feof(fp)) errx(1, "%s: unexpected end-of-file%s", umapfile, not); errx(1, "%s: illegal format (line %d)%s", umapfile, count + 2, not); } umapdata[count][0] = d1; umapdata[count][1] = d2; #if 0 /* Fix a security hole. */ if (umapdata[count][1] == 0) errx(1, "mapping id 0 not permitted (line %d)%s", count + 2, not); #endif } /* Read in gid mapping data. */ if ((gfp = fopen(gmapfile, "r")) == NULL) err(1, "%s%s", gmapfile, not); #ifdef MAPSECURITY /* * Check that group and other don't have write permissions on * this group mapfile, and that the file belongs to root. */ if (fstat(fileno(gfp), &statbuf)) err(1, "%s%s", gmapfile, not); if (statbuf.st_mode & S_IWGRP || statbuf.st_mode & S_IWOTH) { strmode(statbuf.st_mode, buf); err(1, "%s: improper write permissions (%s)%s", gmapfile, buf, not); } if (statbuf.st_uid != ROOTUSER) errx(1, "%s does not belong to root%s", gmapfile, not); #endif /* MAPSECURITY */ if ((fscanf(gfp, "%d\n", &gnentries)) != 1) errx(1, "%s: nentries not found%s", gmapfile, not); if (gnentries > GMAPFILEENTRIES) errx(1, "maximum number of entries is %d%s", GMAPFILEENTRIES, not); #if 0 (void)printf("reading %d group entries\n", gnentries); #endif for (count = 0; count < gnentries; ++count) { if ((fscanf(gfp, "%lu %lu\n", &d1, &d2)) != 2) { if (ferror(gfp)) err(1, "%s%s", gmapfile, not); if (feof(gfp)) errx(1, "%s: unexpected end-of-file%s", gmapfile, not); errx(1, "%s: illegal format (line %d)%s", gmapfile, count + 2, not); } gmapdata[count][0] = d1; gmapdata[count][1] = d2; } /* Setup mount call args. */ args.la.target = source; args.unentries = unentries; args.umapdata = umapdata; args.gnentries = gnentries; args.gmapdata = gmapdata; if (mount(MOUNT_UMAP, argv[1], mntflags, &args)) { if (errno == EOPNOTSUPP) errx(1, "%s: Filesystem not supported by kernel", argv[1]); else err(1, "%s", argv[1]); } exit(0); } void usage(void) { (void)fprintf(stderr, "usage: mount_umap [-o options] -u usermap -g groupmap target_fs mount_point\n"); exit(1); }