xref: /illumos-gate/usr/src/cmd/fs.d/smbclnt/mount/mount.c (revision 3afe87ebb25691cb6d158edaa34a6fb9b703a691)
1 /*
2  * Copyright (c) 2000-2001, Boris Popov
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *    This product includes software developed by Boris Popov.
16  * 4. Neither the name of the author nor the names of any co-contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  *
32  * $Id: mount_smbfs.c,v 1.28.44.2 2005/06/02 00:55:41 lindak Exp $
33  */
34 
35 /*
36  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
37  * Use is subject to license terms.
38  */
39 
40 #include <sys/param.h>
41 #include <sys/stat.h>
42 #include <sys/errno.h>
43 #include <sys/mount.h>
44 
45 #include <stdio.h>
46 #include <string.h>
47 #include <strings.h>
48 #include <pwd.h>
49 #include <grp.h>
50 #include <unistd.h>
51 #include <ctype.h>
52 #include <stdlib.h>
53 #include <errno.h>
54 #include <err.h>
55 #include <sysexits.h>
56 #include <libintl.h>
57 #include <locale.h>
58 #include <libscf.h>
59 
60 #include <sys/mntent.h>
61 #include <sys/mnttab.h>
62 
63 #include <cflib.h>
64 
65 #include <netsmb/smb.h>
66 #include <netsmb/smb_lib.h>
67 
68 #include <sys/fs/smbfs_mount.h>
69 
70 #include "mntopts.h"
71 
72 static char mount_point[MAXPATHLEN + 1];
73 static void usage(void);
74 static int setsubopt(int, char *, struct smbfs_args *);
75 
76 /* smbfs options */
77 #define	MNTOPT_RETRY		"retry"
78 #define	MNTOPT_TIMEOUT		"timeout"
79 #define	MNTOPT_DIRPERMS		"dirperms"
80 #define	MNTOPT_FILEPERMS	"fileperms"
81 #define	MNTOPT_GID		"gid"
82 #define	MNTOPT_UID		"uid"
83 #define	MNTOPT_NOPROMPT		"noprompt"
84 
85 #define	OPT_RETRY	1
86 #define	OPT_TIMEOUT	2
87 #define	OPT_DIRPERMS	3
88 #define	OPT_FILEPERMS	4
89 #define	OPT_GID		5
90 #define	OPT_UID		6
91 #define	OPT_NOPROMPT	7
92 
93 /* generic VFS options */
94 #define	OPT_RO		10
95 #define	OPT_RW		11
96 #define	OPT_SUID 	12
97 #define	OPT_NOSUID 	13
98 #define	OPT_DEVICES	14
99 #define	OPT_NODEVICES	15
100 #define	OPT_SETUID	16
101 #define	OPT_NOSETUID	17
102 #define	OPT_EXEC	18
103 #define	OPT_NOEXEC	19
104 
105 struct smbfsopts {
106 	char *name;
107 	int index;
108 };
109 
110 struct smbfsopts opts[] = {
111 	{MNTOPT_RETRY,		OPT_RETRY},
112 	{MNTOPT_TIMEOUT,	OPT_TIMEOUT},
113 	{MNTOPT_DIRPERMS,	OPT_DIRPERMS},
114 	{MNTOPT_FILEPERMS,	OPT_FILEPERMS},
115 	{MNTOPT_GID,		OPT_GID},
116 	{MNTOPT_UID,		OPT_UID},
117 	{MNTOPT_NOPROMPT,	OPT_NOPROMPT},
118 	{MNTOPT_RO,		OPT_RO},
119 	{MNTOPT_RW,		OPT_RW},
120 	{MNTOPT_SUID,		OPT_SUID},
121 	{MNTOPT_NOSUID,		OPT_NOSUID},
122 	{MNTOPT_DEVICES,	OPT_DEVICES},
123 	{MNTOPT_NODEVICES,	OPT_NODEVICES},
124 	{MNTOPT_SETUID,		OPT_SETUID},
125 	{MNTOPT_NOSETUID,	OPT_NOSETUID},
126 	{MNTOPT_EXEC,		OPT_EXEC},
127 	{MNTOPT_NOEXEC,		OPT_NOEXEC},
128 	{NULL,		0}
129 };
130 
131 static int Oflg = 0;    /* Overlay mounts */
132 static int qflg = 0;    /* quiet - don't print warnings on bad options */
133 static int ro = 0;	/* read-only mount */
134 static int noprompt = 0;	/* don't prompt for password */
135 static int retry = -1;
136 static int timeout = -1;
137 
138 #define	RET_ERR	33
139 #define	SERVICE "svc:/network/smb/client:default"
140 
141 int
142 main(int argc, char *argv[])
143 {
144 	struct smb_ctx sctx, *ctx = &sctx;
145 	struct smbfs_args mdata;
146 	struct stat st;
147 	int opt, error, mntflags;
148 	struct mnttab mnt;
149 	struct mnttab *mntp = &mnt;
150 	char optbuf[MAX_MNTOPT_STR];
151 	static char *fstype = MNTTYPE_SMBFS;
152 	char *env, *state;
153 
154 	(void) setlocale(LC_ALL, "");
155 #if !defined(TEXT_DOMAIN)
156 #define	TEXT_DOMAIN	"SYS_TEST"
157 #endif
158 	(void) textdomain(TEXT_DOMAIN);
159 	if (argc == 2) {
160 		if (strcmp(argv[1], "-h") == 0) {
161 			usage();
162 		} else if (strcmp(argv[1], "-v") == 0) {
163 			errx(EX_OK, gettext("version %d.%d.%d"),
164 			    SMBFS_VERSION / 100000,
165 			    (SMBFS_VERSION % 10000) / 1000,
166 			    (SMBFS_VERSION % 1000) / 100);
167 		}
168 	}
169 	if (argc < 3)
170 		usage();
171 
172 	state = smf_get_state(SERVICE);
173 	if (state == NULL || strcmp(state, SCF_STATE_STRING_ONLINE) != 0) {
174 		fprintf(stderr,
175 		    gettext("mount_smbfs: service \"%s\" not enabled.\n"),
176 		    SERVICE);
177 		exit(1);
178 	}
179 
180 	/* Debugging support. */
181 	if ((env = getenv("SMBFS_DEBUG")) != NULL) {
182 		smb_debug = atoi(env);
183 		if (smb_debug < 1)
184 			smb_debug = 1;
185 	}
186 
187 	error = smb_lib_init();
188 	if (error)
189 		exit(error);
190 
191 	mnt.mnt_mntopts = optbuf;
192 	mntflags = MS_DATA;
193 	bzero(&mdata, sizeof (mdata));
194 	mdata.uid = (uid_t)-1;
195 	mdata.gid = (gid_t)-1;
196 	mdata.caseopt = SMB_CS_NONE;
197 
198 	error = smb_ctx_init(ctx, argc, argv, SMBL_SHARE, SMBL_SHARE,
199 	    SMB_ST_DISK);
200 	if (error)
201 		exit(error);
202 	error = smb_ctx_readrc(ctx);
203 	if (error)
204 		exit(error);
205 
206 	while ((opt = getopt(argc, argv, "ro:Oq")) != -1) {
207 		switch (opt) {
208 		case 'O':
209 			Oflg++;
210 			break;
211 
212 		case 'q':
213 			qflg++;
214 			break;
215 
216 		case 'r':
217 			ro++;
218 			break;
219 
220 		case 'o': {
221 			char *nextopt, *comma, *equals, *sopt, *soptval;
222 			int i, ret;
223 
224 			if (strlen(optarg) >= MAX_MNTOPT_STR) {
225 				if (!qflg)
226 					warnx(gettext(
227 					    "option string too long"));
228 				exit(RET_ERR);
229 			}
230 			for (sopt = optarg; sopt != NULL; sopt = nextopt) {
231 				comma = strchr(sopt, ',');
232 				if (comma) {
233 					nextopt = comma + 1;
234 					*comma = '\0';
235 				} else
236 					nextopt = NULL;
237 				equals = strchr(sopt, '=');
238 				if (equals) {
239 					soptval = equals + 1;
240 					*equals = '\0';
241 				} else
242 					soptval = NULL;
243 				for (i = 0; opts[i].name != NULL; i++) {
244 					if (strcmp(sopt, opts[i].name) == 0)
245 						break;
246 				}
247 				if (opts[i].name == NULL) {
248 					if (equals)
249 						*equals = '=';
250 					if (!qflg)
251 						errx(RET_ERR, gettext(
252 						    "Bad option '%s'"), sopt);
253 					if (comma)
254 						*comma = ',';
255 					continue;
256 				}
257 				ret = setsubopt(opts[i].index, soptval, &mdata);
258 				if (ret != 0)
259 					exit(RET_ERR);
260 				if (equals)
261 					*equals = '=';
262 				(void) strcat(mnt.mnt_mntopts, sopt);
263 				if (comma)
264 					*comma = ',';
265 			}
266 			break;
267 		}
268 
269 		case '?':
270 		default:
271 			usage();
272 		}
273 	}
274 
275 	if (Oflg)
276 		mntflags |= MS_OVERLAY;
277 
278 	if (ro) {
279 		char *p;
280 
281 		mntflags |= MS_RDONLY;
282 		/* convert "rw"->"ro" */
283 		if (p = strstr(mntp->mnt_mntopts, "rw")) {
284 			if (*(p+2) == ',' || *(p+2) == '\0')
285 				*(p+1) = 'o';
286 		}
287 	}
288 
289 	mnt.mnt_special = argv[optind];
290 	mnt.mnt_mountp = argv[optind+1];
291 
292 	mdata.version = SMBFS_VERSION;		    /* smbfs mount version */
293 
294 	if (optind == argc - 2)
295 		optind++;
296 
297 	if (optind != argc - 1)
298 		usage();
299 	realpath(unpercent(argv[optind]), mount_point);
300 
301 	if (stat(mount_point, &st) == -1)
302 		err(EX_OSERR, gettext("could not find mount point %s"),
303 		    mount_point);
304 	if (!S_ISDIR(st.st_mode)) {
305 		errno = ENOTDIR;
306 		err(EX_OSERR, gettext("can't mount on %s"), mount_point);
307 	}
308 
309 	/*
310 	 * Darwin takes defaults from the
311 	 * mounted-on directory.
312 	 * We want the real uid/gid.
313 	 * XXX: Is this correct?
314 	 */
315 #ifdef __sun
316 	if (mdata.uid == (uid_t)-1)
317 		mdata.uid = getuid();
318 	if (mdata.gid == (gid_t)-1)
319 		mdata.gid = getgid();
320 #else
321 	if (mdata.uid == (uid_t)-1)
322 		mdata.uid = st.st_uid;
323 	if (mdata.gid == (gid_t)-1)
324 		mdata.gid = st.st_gid;
325 #endif
326 
327 	if (mdata.file_mode == 0)
328 		mdata.file_mode = st.st_mode & (S_IRWXU | S_IRWXG | S_IRWXO);
329 	if (mdata.dir_mode == 0) {
330 		mdata.dir_mode = mdata.file_mode;
331 		if (mdata.dir_mode & S_IRUSR)
332 			mdata.dir_mode |= S_IXUSR;
333 		if (mdata.dir_mode & S_IRGRP)
334 			mdata.dir_mode |= S_IXGRP;
335 		if (mdata.dir_mode & S_IROTH)
336 			mdata.dir_mode |= S_IXOTH;
337 	}
338 
339 	/*
340 	 * XXX: The driver can fill these in more reliably,
341 	 * so why do we set them here?  (Just set both = -1)
342 	 */
343 	ctx->ct_ssn.ioc_owner = ctx->ct_sh.ioc_owner = getuid();
344 	ctx->ct_ssn.ioc_group = ctx->ct_sh.ioc_group = getgid();
345 	opt = 0;
346 	if (mdata.dir_mode & S_IXGRP)
347 		opt |= SMBM_EXECGRP;
348 	if (mdata.dir_mode & S_IXOTH)
349 		opt |= SMBM_EXECOTH;
350 	ctx->ct_ssn.ioc_rights |= opt;
351 	ctx->ct_sh.ioc_rights |= opt;
352 	if (noprompt)
353 		ctx->ct_flags |= SMBCF_NOPWD;
354 	if (retry != -1)
355 		ctx->ct_ssn.ioc_retrycount = retry;
356 	if (timeout != -1)
357 		ctx->ct_ssn.ioc_timeout = timeout;
358 
359 	/*
360 	 * If we got our password from the keychain and get an
361 	 * authorization error, we come back here to obtain a new
362 	 * password from user input.
363 	 */
364 reauth:
365 	error = smb_ctx_resolve(ctx);
366 	if (error)
367 		exit(error);
368 
369 	mdata.devfd = ctx->ct_fd;		/* file descriptor */
370 
371 again:
372 	error = smb_ctx_lookup(ctx, SMBL_SHARE, SMBLK_CREATE);
373 	if (error == ENOENT && ctx->ct_origshare) {
374 		strcpy(ctx->ct_sh.ioc_share, ctx->ct_origshare);
375 		free(ctx->ct_origshare);
376 		ctx->ct_origshare = NULL;
377 		goto again; /* try again using share name as given */
378 	}
379 	if (ctx->ct_flags & SMBCF_KCFOUND && smb_autherr(error)) {
380 		ctx->ct_ssn.ioc_password[0] = '\0';
381 		smb_error(gettext("main(lookup): bad keychain entry"), 0);
382 		ctx->ct_flags |= SMBCF_KCBAD;
383 		goto reauth;
384 	}
385 	if (error)
386 		exit(error);
387 
388 	mdata.version = SMBFS_VERSION;
389 	mdata.devfd = ctx->ct_fd;
390 
391 	if (mount(mntp->mnt_special, mntp->mnt_mountp,
392 	    mntflags, fstype, &mdata, sizeof (mdata),
393 	    mntp->mnt_mntopts, MAX_MNTOPT_STR) < 0) {
394 		if (errno != ENOENT) {
395 			err(EX_OSERR, gettext("mount_smbfs: %s"),
396 			    mntp->mnt_mountp);
397 		} else {
398 			struct stat sb;
399 			if (stat(mntp->mnt_mountp, &sb) < 0 &&
400 			    errno == ENOENT)
401 				err(EX_OSERR, gettext("mount_smbfs: %s"),
402 				    mntp->mnt_mountp);
403 			else
404 				err(EX_OSERR, gettext("mount_smbfs: %s"),
405 				    mntp->mnt_special);
406 
407 			error = smb_ctx_tdis(ctx);
408 			if (error) /* unable to clean up?! */
409 				exit(error);
410 		}
411 	}
412 
413 	smb_ctx_done(ctx);
414 	if (error) {
415 		smb_error(gettext("mount error: %s"), error, mount_point);
416 		exit(errno);
417 	}
418 	return (0);
419 }
420 
421 int
422 setsubopt(int index, char *optarg, struct smbfs_args *mdatap)
423 {
424 	struct passwd *pwd;
425 	struct group *grp;
426 	long l;
427 	int err = 0;
428 	char *next;
429 
430 	switch (index) {
431 	case OPT_RO:
432 	case OPT_RW:
433 	case OPT_SUID:
434 	case OPT_NOSUID:
435 	case OPT_DEVICES:
436 	case OPT_NODEVICES:
437 	case OPT_SETUID:
438 	case OPT_NOSETUID:
439 	case OPT_EXEC:
440 	case OPT_NOEXEC:
441 		/* We don't have to handle generic options here */
442 		return (0);
443 	case OPT_UID:
444 		pwd = isdigit(optarg[0]) ?
445 		    getpwuid(atoi(optarg)) : getpwnam(optarg);
446 		if (pwd == NULL) {
447 			if (!qflg)
448 				warnx(gettext("unknown user '%s'"), optarg);
449 			err = -1;
450 		} else {
451 			mdatap->uid = pwd->pw_uid;
452 		}
453 		break;
454 	case OPT_GID:
455 		grp = isdigit(optarg[0]) ?
456 		    getgrgid(atoi(optarg)) : getgrnam(optarg);
457 		if (grp == NULL) {
458 			if (!qflg)
459 				warnx(gettext("unknown group '%s'"), optarg);
460 			err = -1;
461 		} else {
462 			mdatap->gid = grp->gr_gid;
463 		}
464 		break;
465 	case OPT_DIRPERMS:
466 		errno = 0;
467 		l = strtol(optarg, &next, 8);
468 		if (errno || *next != 0) {
469 			if (!qflg)
470 				warnx(gettext(
471 				    "invalid value for directory mode"));
472 			err = -1;
473 		} else {
474 			mdatap->dir_mode = l;
475 		}
476 		break;
477 	case OPT_FILEPERMS:
478 		errno = 0;
479 		l = strtol(optarg, &next, 8);
480 		if (errno || *next != 0) {
481 			if (!qflg)
482 				warnx(gettext("invalid value for file mode"));
483 			err = -1;
484 		} else {
485 			mdatap->file_mode = l;
486 		}
487 		break;
488 	case OPT_RETRY:
489 		retry = atoi(optarg);
490 		break;
491 	case OPT_TIMEOUT:
492 		timeout = atoi(optarg);
493 		break;
494 	case OPT_NOPROMPT:
495 		noprompt++;
496 	}
497 	return (err);
498 }
499 
500 static void
501 usage(void)
502 {
503 	fprintf(stderr, "%s\n",
504 	gettext("usage: mount -F smbfs [-Orq] [-o option[,option]]"
505 	"	//[workgroup;][user[:password]@]server[/share] path"));
506 
507 	exit(EX_USAGE);
508 }
509