/* * Copyright (c) 2000-2001, Boris Popov * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by Boris Popov. * 4. Neither the name of the author nor the names of any co-contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * $Id: mount_smbfs.c,v 1.28.44.2 2005/06/02 00:55:41 lindak Exp $ */ /* * Copyright 2010 Sun Microsystems, Inc. All rights reserved. * Use is subject to license terms. * * Copyright 2019 Nexenta by DDN, Inc. All rights reserved. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include /* This needs to know ctx->ct_dev_fd, etc. */ #include extern char *optarg; extern int optind; static char mount_point[MAXPATHLEN + 1]; static void usage(void); static int setsubopt(smb_ctx_t *, struct smbfs_args *, char *); const char * const optlist[] = { /* Generic VFS options. */ #define OPT_RO 0 MNTOPT_RO, #define OPT_RW 1 MNTOPT_RW, #define OPT_SUID 2 MNTOPT_SUID, #define OPT_NOSUID 3 MNTOPT_NOSUID, #define OPT_DEVICES 4 MNTOPT_DEVICES, #define OPT_NODEVICES 5 MNTOPT_NODEVICES, #define OPT_SETUID 6 MNTOPT_SETUID, #define OPT_NOSETUID 7 MNTOPT_NOSETUID, #define OPT_EXEC 8 MNTOPT_EXEC, #define OPT_NOEXEC 9 MNTOPT_NOEXEC, #define OPT_XATTR 10 MNTOPT_XATTR, #define OPT_NOXATTR 11 MNTOPT_NOXATTR, /* Sort of generic (from NFS) */ #define OPT_NOAC 12 MNTOPT_NOAC, #define OPT_ACTIMEO 13 MNTOPT_ACTIMEO, #define OPT_ACREGMIN 14 MNTOPT_ACREGMIN, #define OPT_ACREGMAX 15 MNTOPT_ACREGMAX, #define OPT_ACDIRMIN 16 MNTOPT_ACDIRMIN, #define OPT_ACDIRMAX 17 MNTOPT_ACDIRMAX, /* smbfs-specifis options */ #define OPT_DOMAIN 18 "domain", #define OPT_USER 19 "user", #define OPT_UID 20 "uid", #define OPT_GID 21 "gid", #define OPT_DIRPERMS 22 "dirperms", #define OPT_FILEPERMS 23 "fileperms", #define OPT_NOPROMPT 24 "noprompt", #define OPT_ACL 25 MNTOPT_ACL, #define OPT_NOACL 26 MNTOPT_NOACL, NULL }; static int Oflg = 0; /* Overlay mounts */ static int qflg = 0; /* quiet - don't print warnings on bad options */ static int noprompt = 0; /* don't prompt for password */ /* Note: smbfs uses _both_ kinds of options. */ static int mntflags = MS_DATA | MS_OPTIONSTR; #define EX_OK 0 /* normal */ #define EX_OPT 1 /* bad options, usage, etc */ #define EX_MNT 2 /* mount point problems, etc */ #define RET_ERR 3 /* later errors */ #define SERVICE "svc:/network/smb/client:default" struct smbfs_args mdata; struct mnttab mnt; /* * Initialize this with "rw" just to have something there, * so we don't have to decide whether to add a comma when * we strcat another option. Note the "rw" may be changed * to an "ro" by option processing. */ char optbuf[MAX_MNTOPT_STR] = "rw"; char special[MAXPATHLEN]; int main(int argc, char *argv[]) { struct smb_ctx *ctx = NULL; struct stat st; int opt, error, err2; static char *fstype = MNTTYPE_SMBFS; char *env; (void) setlocale(LC_ALL, ""); #if !defined(TEXT_DOMAIN) #define TEXT_DOMAIN "SYS_TEST" #endif (void) textdomain(TEXT_DOMAIN); /* * Normal users are allowed to run "mount -F smbfs ..." * to mount on a directory they own. To allow that, this * program has an exec_attr that adds SYS_MOUNT priv. * * The __init_suid_priv call was designed for SUID programs, * but also works for privileges granted via exec_attr with * one difference: the added privileges are already effective * when the program starts, and remain effective after the call. * To make this work more like the SUID case we'll turn off the * additional privileges with a __priv_bracket() call here. * Later calls to __priv_bracket() make the extra privileges * effective only when we need them. */ if (__init_suid_priv(0, PRIV_SYS_MOUNT, (char *)NULL) < 0) { (void) fprintf(stderr, gettext("Insufficient privileges, " "%s should have sys_mount privilege via exec_attr\n"), argv[0]); exit(RET_ERR); } (void) __priv_bracket(PRIV_OFF); if (argc == 2) { if (strcmp(argv[1], "-h") == 0) { usage(); } else if (strcmp(argv[1], "-v") == 0) { errx(EX_OK, gettext("version %d.%d.%d"), SMBFS_VERSION / 100000, (SMBFS_VERSION % 10000) / 1000, (SMBFS_VERSION % 1000) / 100); } } if (argc < 3) usage(); /* Debugging support. */ if ((env = getenv("SMBFS_DEBUG")) != NULL) { smb_debug = atoi(env); if (smb_debug < 1) smb_debug = 1; } error = smb_lib_init(); if (error) exit(RET_ERR); mnt.mnt_mntopts = optbuf; bzero(&mdata, sizeof (mdata)); mdata.version = SMBFS_VERSION; /* smbfs mount version */ mdata.uid = (uid_t)-1; mdata.gid = (gid_t)-1; error = smb_ctx_alloc(&ctx); if (error) exit(RET_ERR); /* * Parse the UNC path so we have the server (etc.) * that we need during rcfile+sharectl parsing. */ if (argc < 3) usage(); error = smb_ctx_parseunc(ctx, argv[argc - 2], SMBL_SHARE, SMBL_SHARE, USE_DISKDEV, NULL); if (error) exit(EX_OPT); error = smb_ctx_readrc(ctx); if (error) exit(EX_OPT); while ((opt = getopt(argc, argv, "ro:Oq")) != -1) { switch (opt) { case 'O': Oflg++; break; case 'q': qflg++; break; case 'r': mntflags |= MS_RDONLY; break; case 'o': { char *nextopt, *comma, *sopt; int ret; for (sopt = optarg; sopt != NULL; sopt = nextopt) { comma = strchr(sopt, ','); if (comma) { nextopt = comma + 1; *comma = '\0'; } else nextopt = NULL; ret = setsubopt(ctx, &mdata, sopt); if (ret != 0) exit(EX_OPT); /* undo changes to optarg */ if (comma) *comma = ','; } break; } case '?': default: usage(); } } if (Oflg) mntflags |= MS_OVERLAY; if (mntflags & MS_RDONLY) { char *p; /* convert "rw"->"ro" */ if (p = strstr(optbuf, "rw")) { if (*(p+2) == ',' || *(p+2) == '\0') *(p+1) = 'o'; } } if (optind + 2 != argc) usage(); (void) snprintf(special, sizeof (special), "//%s/%s", ctx->ct_fullserver, ctx->ct_origshare); mnt.mnt_special = special; mnt.mnt_mountp = argv[optind+1]; if ((realpath(argv[optind+1], mount_point) == NULL) || (stat(mount_point, &st) == -1)) { err(EX_MNT, gettext("could not find mount point %s"), argv[optind+1]); } if (!S_ISDIR(st.st_mode)) { errno = ENOTDIR; err(EX_MNT, gettext("can't mount on %s"), mount_point); } /* * Fill in mdata defaults. */ if (mdata.uid == (uid_t)-1) mdata.uid = getuid(); if (mdata.gid == (gid_t)-1) mdata.gid = getgid(); if (mdata.file_mode == 0) mdata.file_mode = S_IRWXU; if (mdata.dir_mode == 0) { mdata.dir_mode = mdata.file_mode; if (mdata.dir_mode & S_IRUSR) mdata.dir_mode |= S_IXUSR; if (mdata.dir_mode & S_IRGRP) mdata.dir_mode |= S_IXGRP; if (mdata.dir_mode & S_IROTH) mdata.dir_mode |= S_IXOTH; } ctx->ct_ssn.ssn_owner = SMBM_ANY_OWNER; if (noprompt) ctx->ct_flags |= SMBCF_NOPWD; /* * Resolve the server address, * setup derived defaults. */ error = smb_ctx_resolve(ctx); if (error) exit(RET_ERR); /* * Have server, share, etc. from above: * smb_ctx_scan_argv, option settings. * Get the session and tree. */ again: error = smb_ctx_get_ssn(ctx); if (error == EAUTH && noprompt == 0) { err2 = smb_get_authentication(ctx); if (err2 == 0) goto again; } if (error) { smb_error(gettext("//%s: login failed"), error, ctx->ct_fullserver); exit(RET_ERR); } error = smb_ctx_get_tree(ctx); if (error) { smb_error(gettext("//%s/%s: tree connect failed"), error, ctx->ct_fullserver, ctx->ct_origshare); exit(RET_ERR); } /* * Have tree connection, now mount it. */ mdata.devfd = ctx->ct_dev_fd; /* Need sys_mount privilege for the mount call. */ (void) __priv_bracket(PRIV_ON); err2 = mount(mnt.mnt_special, mnt.mnt_mountp, mntflags, fstype, &mdata, sizeof (mdata), mnt.mnt_mntopts, MAX_MNTOPT_STR); (void) __priv_bracket(PRIV_OFF); if (err2 < 0) { if (errno != ENOENT) { err(EX_MNT, gettext("mount_smbfs: %s"), mnt.mnt_mountp); } else { struct stat sb; if (stat(mnt.mnt_mountp, &sb) < 0 && errno == ENOENT) err(EX_MNT, gettext("mount_smbfs: %s"), mnt.mnt_mountp); else err(EX_MNT, gettext("mount_smbfs: %s"), mnt.mnt_special); } } smb_ctx_free(ctx); return (0); } #define bad(val) (val == NULL || !isdigit(*val)) int setsubopt(smb_ctx_t *ctx, struct smbfs_args *mdatap, char *subopt) { char *equals, *optarg; struct passwd *pwd; struct group *grp; long val; int rc = EX_OK; int index; char *p; equals = strchr(subopt, '='); if (equals) { *equals = '\0'; optarg = equals + 1; } else optarg = NULL; for (index = 0; optlist[index] != NULL; index++) { if (strcmp(subopt, optlist[index]) == 0) break; } /* * Note: if the option was unknown, index will * point to the NULL at the end of optlist[], * and we'll take the switch default. */ switch (index) { case OPT_ACL: case OPT_NOACL: case OPT_SUID: case OPT_NOSUID: case OPT_DEVICES: case OPT_NODEVICES: case OPT_SETUID: case OPT_NOSETUID: case OPT_EXEC: case OPT_NOEXEC: case OPT_XATTR: case OPT_NOXATTR: /* * These options are handled via the * generic option string mechanism. * None of these take an optarg. */ if (optarg != NULL) goto badval; (void) strlcat(optbuf, ",", sizeof (optbuf)); if (strlcat(optbuf, subopt, sizeof (optbuf)) >= sizeof (optbuf)) { if (!qflg) warnx(gettext("option string too long")); rc = EX_OPT; } break; /* * OPT_RO, OPT_RW, are actually generic too, * but we use the mntflags for these, and * then update the options string later. */ case OPT_RO: mntflags |= MS_RDONLY; break; case OPT_RW: mntflags &= ~MS_RDONLY; break; /* * NFS-derived options for attribute cache * handling (disable, set min/max timeouts) */ case OPT_NOAC: mdatap->flags |= SMBFS_MF_NOAC; break; case OPT_ACTIMEO: errno = 0; val = strtol(optarg, &p, 10); if (errno || *p != 0) goto badval; mdatap->acdirmin = mdatap->acregmin = val; mdatap->acdirmax = mdatap->acregmax = val; mdatap->flags |= SMBFS_MF_ACDIRMAX; mdatap->flags |= SMBFS_MF_ACREGMAX; mdatap->flags |= SMBFS_MF_ACDIRMIN; mdatap->flags |= SMBFS_MF_ACREGMIN; break; case OPT_ACREGMIN: errno = 0; val = strtol(optarg, &p, 10); if (errno || *p != 0) goto badval; mdatap->acregmin = val; mdatap->flags |= SMBFS_MF_ACREGMIN; break; case OPT_ACREGMAX: errno = 0; val = strtol(optarg, &p, 10); if (errno || *p != 0) goto badval; mdatap->acregmax = val; mdatap->flags |= SMBFS_MF_ACREGMAX; break; case OPT_ACDIRMIN: errno = 0; val = strtol(optarg, &p, 10); if (errno || *p != 0) goto badval; mdatap->acdirmin = val; mdatap->flags |= SMBFS_MF_ACDIRMIN; break; case OPT_ACDIRMAX: errno = 0; val = strtol(optarg, &p, 10); if (errno || *p != 0) goto badval; mdatap->acdirmax = val; mdatap->flags |= SMBFS_MF_ACDIRMAX; break; /* * SMBFS-specific options. Some of these * don't go through the mount system call, * but just set libsmbfs options. */ case OPT_DOMAIN: if (smb_ctx_setdomain(ctx, optarg, B_TRUE) != 0) rc = EX_OPT; break; case OPT_USER: if (smb_ctx_setuser(ctx, optarg, B_TRUE) != 0) rc = EX_OPT; break; case OPT_UID: pwd = isdigit(optarg[0]) ? getpwuid(atoi(optarg)) : getpwnam(optarg); if (pwd == NULL) { if (!qflg) warnx(gettext("unknown user '%s'"), optarg); rc = EX_OPT; } else { mdatap->uid = pwd->pw_uid; } break; case OPT_GID: grp = isdigit(optarg[0]) ? getgrgid(atoi(optarg)) : getgrnam(optarg); if (grp == NULL) { if (!qflg) warnx(gettext("unknown group '%s'"), optarg); rc = EX_OPT; } else { mdatap->gid = grp->gr_gid; } break; case OPT_DIRPERMS: errno = 0; val = strtol(optarg, &p, 8); if (errno || *p != 0) goto badval; mdatap->dir_mode = val; break; case OPT_FILEPERMS: errno = 0; val = strtol(optarg, &p, 8); if (errno || *p != 0) goto badval; mdatap->file_mode = val; break; case OPT_NOPROMPT: noprompt++; break; default: badopt: if (!qflg) warnx(gettext("unknown option %s"), subopt); rc = EX_OPT; break; badval: if (!qflg) warnx(gettext("invalid value for %s"), subopt); rc = EX_OPT; break; } /* Undo changes made to subopt */ if (equals) *equals = '='; return (rc); } static void usage(void) { (void) fprintf(stderr, "%s\n", gettext("usage: mount -F smbfs [-Orq] [-o option[,option]]" " //[workgroup;][user[:password]@]server[/share] path")); exit(EX_OPT); }