3 // Copyright (C) 2003 Enrico Scholz <enrico.scholz@informatik.tu-chemnitz.de>
5 // This program is free software; you can redistribute it and/or modify
6 // it under the terms of the GNU General Public License as published by
7 // the Free Software Foundation; version 2 of the License.
9 // This program is distributed in the hope that it will be useful,
10 // but WITHOUT ANY WARRANTY; without even the implied warranty of
11 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 // GNU General Public License for more details.
14 // You should have received a copy of the GNU General Public License
15 // along with this program; if not, write to the Free Software
16 // Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
19 // secure-mount <general mount(8) options> [--chroot]
20 // [--mtab <mtabfile>] [--fstab <fstabfile>]
22 // Executes mount-operations under the current directory: it assumes sources
23 // in the current root-dir while destinations are expected in the chroot
32 #include "pathconfig.h"
34 #include <lib/internal.h>
45 #include <sys/mount.h>
47 #include <sys/types.h>
57 #define ENSC_WRAPPERS_FCNTL 1
58 #define ENSC_WRAPPERS_UNISTD 1
61 #define MNTPOINT "/etc"
63 typedef enum { rfsYES, rfsNO, rfsONLY } RootFsOption;
85 char cur_dir_path[PATH_MAX];
90 #define OPTION_BIND 1024
91 #define OPTION_MOVE 1025
92 #define OPTION_MTAB 1026
93 #define OPTION_FSTAB 1027
94 #define OPTION_CHROOT 1028
95 #define OPTION_SECURE 1029
96 #define OPTION_RBIND 1030
97 #define OPTION_ROOTFS 1031
99 #define XFLAG_NOAUTO 0x01
100 #define XFLAG_FILE 0x02
101 #define XFLAG_NOMTAB 0x04
103 static struct option const
104 CMDLINE_OPTIONS[] = {
105 { "help", no_argument, 0, 'h' },
106 { "version", no_argument, 0, 'v' },
107 { "bind", no_argument, 0, OPTION_BIND },
108 { "move", no_argument, 0, OPTION_MOVE },
109 { "mtab", required_argument, 0, OPTION_MTAB },
110 { "fstab", required_argument, 0, OPTION_FSTAB },
111 { "rootfs", required_argument, 0, OPTION_ROOTFS },
112 { "chroot", no_argument, 0, OPTION_CHROOT },
113 { "secure", no_argument, 0, OPTION_SECURE },
114 { "rbind", no_argument, 0, OPTION_RBIND },
119 #define MS_REC 0x4000
121 #ifndef MS_UNBINDABLE
122 #define MS_UNBINDABLE (1<<17)
125 #define MS_PRIVATE (1<<18)
128 #define MS_SLAVE (1<<19)
131 #define MS_SHARED (1<<20)
134 static struct FstabOption {
135 char const * const opt;
136 unsigned long const flag;
137 unsigned long const mask;
138 unsigned long const xflag;
140 } const FSTAB_OPTIONS[] = {
141 { "defaults", MS_NODEV, (MS_RDONLY|MS_NOSUID|MS_NODEV|MS_NOEXEC|
142 MS_SYNCHRONOUS), 0, false },
143 { "rbind", MS_BIND|MS_REC, MS_BIND|MS_REC, 0, false },
144 { "bind", MS_BIND, MS_BIND, 0, false },
145 { "move", MS_MOVE, MS_MOVE, 0, false },
146 { "async", 0, MS_SYNCHRONOUS, 0, false },
147 { "sync", MS_SYNCHRONOUS, MS_SYNCHRONOUS, 0, false },
148 { "atime", 0, MS_NOATIME, 0, false },
149 { "noatime", MS_NOATIME, MS_NOATIME, 0, false },
150 { "dev", 0, MS_NODEV, 0, false },
151 { "nodev", MS_NODEV, MS_NODEV, 0, false },
152 { "exec", 0, MS_NOEXEC, 0, false },
153 { "noexec", MS_NOEXEC, MS_NOEXEC, 0, false },
154 { "suid", 0, MS_NOSUID, 0, false },
155 { "nosuid", MS_NOSUID, MS_NOSUID, 0, false },
156 { "ro", MS_RDONLY, MS_RDONLY, 0, false },
157 { "rw", 0, MS_RDONLY, 0, false },
159 { "remount", MS_REMOUNT, MS_REMOUNT, 0, false },
160 { "users", MS_NOEXEC|MS_NOSUID|MS_NODEV,
161 MS_NOEXEC|MS_NOSUID|MS_NODEV, 0, false },
162 { "mandlock", MS_MANDLOCK, MS_MANDLOCK, 0, false },
163 { "nodiratime", MS_NODIRATIME, MS_NODIRATIME, 0, false },
165 { "dirsync", MS_DIRSYNC, MS_DIRSYNC, 0, false },
167 { "_netdev", 0, 0, 0, false },
168 { "auto", 0, 0, 0, false },
169 { "noauto", 0, 0, XFLAG_NOAUTO, false },
170 { "user", 0, 0, 0, false },
171 { "nouser", 0, 0, 0, false },
172 { "rec", MS_REC, MS_REC, 0, false },
173 { "unbindable", MS_UNBINDABLE, MS_UNBINDABLE, 0, false },
174 { "private", MS_PRIVATE, MS_PRIVATE, 0, false },
175 { "slave", MS_SLAVE, MS_SLAVE, 0, false },
176 { "shared", MS_SHARED, MS_SHARED, 0, false },
177 { "nomtab", 0, 0, XFLAG_NOMTAB, false },
180 int wrapper_exit_code = 1;
183 showHelp(int fd, char const *cmd, int res)
185 VSERVER_DECLARE_CMD(cmd);
187 WRITE_MSG(fd, "Usage: ");
190 " [--help] [--version] [--bind] [--move] [--rbind] [-t <type>] [--chroot]\n"
191 " [--mtab <filename>] [--fstab <filename>] [--rootfs yes|no|only]\n"
192 " [-n] -a|([-o <options>] [--] <src> <dst>)\n\n"
193 "Executes mount-operations under the current directory: it assumes sources in\n"
194 "the current root-dir while destinations are expected in the chroot environment.\n\n"
195 "For non-trivial mount-operations it uses the external 'mount' program which\n"
196 "can be overridden by the $MOUNT environment variable.\n\n"
198 " --bind|move|rbind ... set the correspond flags; with this options\n"
199 " the mount will be executed internally without\n"
200 " calling an external mount program.\n"
201 " -t <type> ... assume the given filesystem type\n"
202 " -o <options> ... set additional options; see mount(2) for details\n"
203 " -n ... do not update the mtab-file\n"
204 " --mtab <filename> ... use <filename> as an alternative mtab file\n"
205 " [default: /etc/mtab]\n"
206 " --chroot ... chroot into the current directory before\n"
207 " mounting the filesystem\n"
208 " --fstab <filename> ... use <filename> as an alternative fstab file;\n"
209 " this option has an effect only with the '-a'\n"
210 " option [default: /etc/fstab]\n"
211 " --rootfs yes|no|only ... specifies how to handle an entry for a rootfs\n"
212 " ('/') when processing an fstab file. 'yes' will\n"
213 " mount it among the other entries, 'only' will\n"
214 " mount only the rootfs entry, and 'no' will ignore\n"
215 " it and mount only the other entries [default: yes]\n"
216 " -a ... mount everything listed in the fstab-file\n\n"
217 " <src> ... the source-filesystem; this path is absolute\n"
218 " to the current root-filesystem. Only valid\n"
219 " without the '-a' option.\n"
220 " <dst> ... the destination mount-point; when used with\n"
221 " '--chroot', this path is relative to the current\n"
222 " directory. Only valid without the '-a' option\n\n"
223 "Please report bugs to " PACKAGE_BUGREPORT "\n");
232 "secure-mount " VERSION " -- secure mounting of directories\n"
233 "This program is part of " PACKAGE_STRING "\n\n"
234 "Copyright (C) 2003 Enrico Scholz\n"
235 VERSION_COPYRIGHT_DISCLAIMER);
240 isSameObject(struct stat const *lhs,
241 struct stat const *rhs)
243 return (lhs->st_dev==rhs->st_dev &&
244 lhs->st_ino==rhs->st_ino);
250 if (fchdir(fd)==-1 || chroot(".")==-1) return -1;
255 writeX(int fd, void const *buf, size_t len)
257 if ((size_t)(write(fd, buf, len))!=len) return -1;
262 writeStrX(int fd, char const *str)
264 return writeX(fd, str, strlen(str));
267 static inline char const *
268 getType(struct MountInfo const *mnt)
270 if (mnt->type==0) return "none";
271 else if (strncmp(mnt->type, "ext", 3)==0) return "ufs";
272 else return mnt->type;
276 restoreRoot(struct Options const *opt)
278 if (opt->do_chroot!=0 && fchroot(opt->cur_rootdir_fd)==-1) {
279 perror("secure-mount: fchdir(\"/\")");
280 WRITE_MSG(2, "Failed to restore root-directory; aborting\n");
286 updateMtab(struct MountInfo const *mnt, struct Options const *opt)
290 assert(opt->mtab!=0);
292 if (opt->do_chroot && fchroot(opt->cur_dir_fd)==-1) {
293 perror("secure-mount: fchroot(\".\")");
297 fd=open(opt->mtab, O_CREAT|O_APPEND|O_WRONLY, 0644);
300 perror("secure-mount: open(<mtab>)");
304 if (lockf(fd, F_LOCK, 0)==-1) {
305 perror("secure-mount: lockf()");
309 if (writeStrX(fd, mnt->src)==-1 ||
310 writeStrX(fd, " ")==-1 ||
311 writeStrX(fd, mnt->dst)==-1 ||
312 writeStrX(fd, mnt->xflag & XFLAG_FILE ? "/" : "")==-1 ||
313 writeStrX(fd, mnt->xflag & XFLAG_FILE ? mnt->name : "")==-1 ||
314 writeStrX(fd, " ")==-1 ||
315 writeStrX(fd, getType(mnt))==-1 ||
316 writeStrX(fd, " ")==-1 ||
317 writeStrX(fd, mnt->data ? mnt->data : "defaults")==-1 ||
318 writeStrX(fd, " 0 0\n")==-1) {
319 perror("secure-mount: write()");
332 callExternalMount(struct MountInfo const *mnt)
334 char const * argv[10];
338 char const * mount_prog = getenv("MOUNT");
340 if (mount_prog==0) mount_prog = MOUNT_PROG;
342 argv[idx++] = mount_prog;
344 if (mnt->flag & MS_BIND) argv[idx++] = "--bind";
345 else if (mnt->flag & MS_MOVE) argv[idx++] = "--move";
348 if (mnt->data && *mnt->data &&
349 strcmp(mnt->data, "defaults")!=0) {
350 if (mnt->mask & MS_NODEV)
351 argv[idx++] = mnt->data;
353 char * tmp = alloca(strlen(mnt->data) + sizeof("nodev,"));
354 strcpy(tmp, "nodev,");
355 strcat(tmp, mnt->data);
360 argv[idx++] = "nodev";
364 argv[idx++] = mnt->type;
367 argv[idx++] = mnt->src;
368 argv[idx++] = mnt->name;
373 perror("secure-mount: fork()");
378 execv(mount_prog, const_cast(char **)(argv));
379 PERROR_Q("secure-mount: execv", mount_prog);
383 if (wait4(pid, &status, 0, 0)==-1) {
384 perror("secure-mount: wait4()");
388 return (WIFEXITED(status)) && (WEXITSTATUS(status)==0);
392 secureChdir(char const *dir, struct Options const *opt)
397 if (opt->do_chroot!=0 && fchroot(opt->cur_dir_fd)==-1) {
398 perror("secure-mount: fchroot(\".\")");
402 if (chdir(dir)==-1) {
403 PERROR_Q("secure-mount: chdir", dir);
407 dir_fd = open(".", O_RDONLY|O_DIRECTORY);
409 perror("secure-mount: open(\".\")");
414 if (fchdir(dir_fd)==-1)
415 PERROR_Q("secure-mount: fchdir", dir);
428 canHandleInternal(struct MountInfo const *mnt)
430 static char const * FS[] = {
431 "tmpfs", "sysfs", "proc", "sockfs", "pipefs", "futexfs",
432 "inotifyfs", "devpts", "ext3", "ext2", "ramfs",
433 "hugetlbfs", "usbfs", "binfmt_misc",
438 if (!mnt) return false;
439 else if ((mnt->flag & (MS_BIND|MS_MOVE))) return true;
440 else if ((mnt->flag & (MS_SHARED|MS_SLAVE|MS_PRIVATE|
441 MS_UNBINDABLE))) return true;
442 else if (mnt->type==0) return false;
444 for (i=FS+0; *i!=0; ++i)
445 if (strcmp(mnt->type, *i)==0) return true;
451 mountSingle(struct MountInfo const *mnt, struct Options *opt)
455 if (!secureChdir(mnt->dst, opt))
458 if (canHandleInternal(mnt)) {
459 if (mount(mnt->src, mnt->name,
460 mnt->type ? mnt->type : "",
461 mnt->flag, mnt->data_parsed)==-1) {
462 perror("secure-mount: mount()");
465 if (strcmp(mnt->dst, "/") == 0) {
467 if (chdir(opt->cur_dir_path) == -1) {
468 perror("secure-mount: chdir(.)");
471 close(opt->cur_dir_fd);
472 opt->cur_dir_fd = Eopen(".", O_RDONLY|O_DIRECTORY, 0);
473 Efcntl(opt->cur_dir_fd, F_SETFD, FD_CLOEXEC);
475 if (!vc_isSupported(vcFEATURE_BME) &&
476 (mnt->flag & MS_BIND) &&
477 (mnt->mask & ~(MS_BIND|MS_REC))) {
478 /* This is needed to put us in the new mountpoint */
479 if (!secureChdir(mnt->dst, opt))
481 if (mount(mnt->src, mnt->name,
482 mnt->type ? mnt->type : "",
483 (mnt->flag | MS_REMOUNT), NULL) == -1 &&
484 errno != EBUSY) { /* Returned on older kernels */
485 perror("secure-mount: mount()");
490 else if (!callExternalMount(mnt))
493 if (!opt->ignore_mtab && (mnt->xflag & XFLAG_NOMTAB)==0 &&
494 updateMtab(mnt, opt)==-1) {
495 WRITE_MSG(2, "Failed to update mtab-file\n");
502 static struct FstabOption const *
503 searchOption(char const *opt, size_t len)
505 struct FstabOption const * i;
506 for (i=FSTAB_OPTIONS+0; i<FSTAB_OPTIONS+DIM_OF(FSTAB_OPTIONS); ++i)
507 if (strncmp(i->opt, opt, len)==0) return i;
513 transformOptionList(struct MountInfo *info, size_t UNUSED *col)
515 char const * ptr = info->data;
516 char * data = malloc(strlen(info->data));
520 char const * pos = strchr(ptr, ',');
521 struct FstabOption const * opt;
523 if (pos==0) pos = ptr+strlen(ptr);
524 opt = searchOption(ptr, pos-ptr);
527 info->flag &= ~opt->mask;
528 info->flag |= opt->flag;
529 info->mask |= opt->mask;
530 info->xflag |= opt->xflag;
535 strncpy(dst, ptr, pos-ptr);
545 } while (*ptr!='\0');
547 info->data_parsed = data;
551 #define MOVE_TO_NEXT_FIELD(PTR,ALLOW_EOL) \
552 while (!isspace(*PTR) && *PTR!='\0') ++PTR; \
553 if (col) *col = buf-start_buf+1; \
554 if (!(ALLOW_EOL) && *PTR=='\0') return prFAIL; \
556 while (isspace(*PTR)) ++PTR
558 static enum {prDOIT, prFAIL, prIGNORE}
559 parseFstabLine(struct MountInfo *info, char *buf, size_t *col)
561 char const * const start_buf = buf;
564 while (isspace(*buf)) ++buf;
565 if (*buf=='#' || *buf=='\0') return prIGNORE;
568 MOVE_TO_NEXT_FIELD(buf, false);
570 MOVE_TO_NEXT_FIELD(buf, false);
572 MOVE_TO_NEXT_FIELD(buf, false);
573 err_col = buf-start_buf+1;
575 MOVE_TO_NEXT_FIELD(buf, true);
577 info->flag = MS_NODEV;
582 if (strcmp(info->type, "swap") ==0) return prIGNORE;
583 else if (strcmp(info->type, "none") ==0) info->type = 0;
584 else if (strcmp(info->type, "devpts")==0) {
585 info->mask |= MS_NODEV;
586 info->flag &= ~MS_NODEV;
589 if (col) *col = err_col;
590 if (!transformOptionList(info,col)) return prFAIL;
591 if (info->xflag & XFLAG_NOAUTO) return prIGNORE;
596 #undef MOVE_TO_NEXT_FIELD
599 showFstabPosition(int fd, char const *fname, size_t line_nr, size_t col_nr)
601 char buf[3*sizeof(line_nr)*2 + 4];
602 size_t len = utilvserver_fmt_uint(buf+1, line_nr)+1;
606 len += utilvserver_fmt_uint(buf+len, col_nr);
607 WRITE_STR(fd, fname);
608 Vwrite(fd, buf, len);
612 adjustFileMount(struct MountInfo *mnt)
614 char *buf = strrchr(mnt->dst, '/');
620 mnt->xflag |= XFLAG_FILE;
624 mountFstab(struct Options *opt)
630 assert(opt->fstab!=0);
631 fd = open(opt->fstab, O_RDONLY);
633 perror("secure-mount: open(<fstab>)");
637 len = lseek(fd, 0, SEEK_END);
639 lseek(fd, 0, SEEK_SET)==-1) {
640 perror("secure-mount: lseek(<fstab>)");
647 size_t line_nr=0, col_nr;
649 if (read(fd, buf, len+1)!=len) {
650 perror("secure-mount: read()");
653 buf[len] = '#'; // workaround for broken dietlibc strtok_r()
658 while ((ptr=strsep(&ptrptr, "\n")) != 0) {
659 struct MountInfo mnt;
662 switch (parseFstabLine(&mnt, ptr, &col_nr)) {
664 showFstabPosition(2, opt->fstab, line_nr, col_nr);
665 WRITE_MSG(2, ": syntax error\n");
668 case prIGNORE : break;
670 bool is_rootfs = (strcmp(mnt.dst, "/")==0);
672 if (( is_rootfs && opt->rootfs==rfsNO) ||
673 (!is_rootfs && opt->rootfs==rfsONLY)) { /* ignore the entry */ }
675 if (utilvserver_isFile(mnt.dst, 0))
676 adjustFileMount(&mnt);
677 if (!mountSingle(&mnt, opt)) {
678 showFstabPosition(2, opt->fstab, line_nr, 1);
679 WRITE_MSG(2, ": failed to mount fstab-entry\n");
697 initFDs(struct Options *opt)
699 opt->cur_dir_fd = Eopen(".", O_RDONLY|O_DIRECTORY, 0);
700 opt->cur_rootdir_fd = Eopen("/", O_RDONLY|O_DIRECTORY, 0);
702 Efcntl(opt->cur_dir_fd, F_SETFD, FD_CLOEXEC);
703 Efcntl(opt->cur_rootdir_fd, F_SETFD, FD_CLOEXEC);
705 if (getcwd(opt->cur_dir_path, sizeof(opt->cur_dir_path)) == NULL) {
706 perror("secure-mount: getcwd()");
707 exit(wrapper_exit_code);
712 parseRootFS(char const *str)
714 if (strcasecmp(str, "yes")==0) return rfsYES;
715 else if (strcasecmp(str, "no")==0) return rfsNO;
716 else if (strcasecmp(str, "only")==0) return rfsONLY;
718 WRITE_MSG(2, "secure-mount: invalid option for '--rootfs': '");
721 exit(wrapper_exit_code);
725 int main(int argc, char *argv[])
727 struct MountInfo mnt = {
737 struct Options opt = {
739 .fstab = "/etc/fstab",
741 .ignore_mtab = false,
744 .cur_rootdir_fd = -1,
749 int c = getopt_long(argc, argv, "ht:nao:", CMDLINE_OPTIONS, 0);
753 case 'h' : showHelp(1, argv[0], 0);
754 case 'v' : showVersion();
755 case 't' : mnt.type = optarg; break;
756 case 'n' : opt.ignore_mtab = true; break;
757 case 'a' : opt.mount_all = true; break;
758 case 'o' : mnt.data = optarg; break;
759 case OPTION_RBIND : mnt.flag |= MS_REC; /*@fallthrough@*/
760 case OPTION_BIND : mnt.flag |= MS_BIND; break;
761 case OPTION_MOVE : mnt.flag |= MS_MOVE; break;
762 case OPTION_MTAB : opt.mtab = optarg; break;
763 case OPTION_FSTAB : opt.fstab = optarg; break;
764 case OPTION_CHROOT: opt.do_chroot = true; break;
765 case OPTION_ROOTFS: opt.rootfs = parseRootFS(optarg); break;
767 WRITE_MSG(2, "secure-mount: The '--secure' option is deprecated...\n");
770 WRITE_MSG(2, "Try '");
771 WRITE_STR(2, argv[0]);
772 WRITE_MSG(2, " --help' for more information.\n");
779 if (opt.mount_all && optind<argc) {
780 WRITE_MSG(2, "Can not specify <src> and '-a' at the same time\n");
785 signal(SIGCHLD, SIG_DFL);
788 if (!mountFstab(&opt)) return EXIT_FAILURE;
789 else return EXIT_SUCCESS;
792 if (optind+2!=argc) {
793 WRITE_MSG(2, "Invalid <src> <dst> pair specified\n");
798 mnt.data = strdup(mnt.data);
799 if (!transformOptionList(&mnt, 0)) {
800 WRITE_MSG(2, "Invalid options specified\n");
805 mnt.src = argv[optind++];
806 mnt.dst = argv[optind++];
808 if (utilvserver_isFile(mnt.dst, 0))
809 adjustFileMount(&mnt);
810 if (!mountSingle(&mnt, &opt))