📄 smbmount.c
字号:
/* Unix SMB/CIFS implementation. SMBFS mount program Copyright (C) Andrew Tridgell 1999 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>.*/#include "includes.h"#include "system/passwd.h"#include <mntent.h>#include <asm/types.h>#include <linux/smb_fs.h>static pstring credentials;static pstring my_netbios_name;static pstring password;static pstring username;static pstring workgroup;static pstring mpoint;static pstring service;static pstring options;static struct in_addr dest_ip;static bool have_ip;static int smb_port = 0;static bool got_user;static bool got_pass;static uid_t mount_uid;static gid_t mount_gid;static int mount_ro;static uint_t mount_fmask;static uint_t mount_dmask;static bool use_kerberos;/* TODO: Add code to detect smbfs version in kernel */static bool status32_smbfs = false;static void usage(void);static void exit_parent(int sig){ /* parent simply exits when child says go... */ exit(0);}static void daemonize(void){ int j, status; pid_t child_pid; signal( SIGTERM, exit_parent ); if ((child_pid = sys_fork()) < 0) { DEBUG(0,("could not fork\n")); } if (child_pid > 0) { while( 1 ) { j = waitpid( child_pid, &status, 0 ); if( j < 0 ) { if( EINTR == errno ) { continue; } status = errno; } break; } /* If we get here - the child exited with some error status */ if (WIFSIGNALED(status)) exit(128 + WTERMSIG(status)); else exit(WEXITSTATUS(status)); } signal( SIGTERM, SIG_DFL ); chdir("/");}static void close_our_files(int client_fd){ int i; struct rlimit limits; getrlimit(RLIMIT_NOFILE,&limits); for (i = 0; i< limits.rlim_max; i++) { if (i == client_fd) continue; close(i); }}static void usr1_handler(int x){ return;}/***************************************************** return a connection to a server*******************************************************/static struct smbcli_state *do_connection(const char *the_service, bool unicode, int maxprotocol){ struct smbcli_state *c; struct nmb_name called, calling; char *server_n; struct in_addr ip; pstring server; char *share; if (the_service[0] != '\\' || the_service[1] != '\\') { usage(); exit(1); } pstrcpy(server, the_service+2); share = strchr_m(server,'\\'); if (!share) { usage(); exit(1); } *share = 0; share++; server_n = server; make_nmb_name(&calling, my_netbios_name, 0x0); choose_called_name(&called, server, 0x20); again: zero_ip(&ip); if (have_ip) ip = dest_ip; /* have to open a new connection */ if (!(c=smbcli_initialise(NULL)) || (smbcli_set_port(c, smb_port) != smb_port) || !smbcli_connect(c, server_n, &ip)) { DEBUG(0,("%d: Connection to %s failed\n", sys_getpid(), server_n)); if (c) { talloc_free(c); } return NULL; } /* SPNEGO doesn't work till we get NTSTATUS error support */ /* But it is REQUIRED for kerberos authentication */ if(!use_kerberos) c->use_spnego = false; /* The kernel doesn't yet know how to sign it's packets */ c->sign_info.allow_smb_signing = false; /* Use kerberos authentication if specified */ c->use_kerberos = use_kerberos; if (!smbcli_session_request(c, &calling, &called)) { char *p; DEBUG(0,("%d: session request to %s failed (%s)\n", sys_getpid(), called.name, smbcli_errstr(c))); talloc_free(c); if ((p=strchr_m(called.name, '.'))) { *p = 0; goto again; } if (strcmp(called.name, "*SMBSERVER")) { make_nmb_name(&called , "*SMBSERVER", 0x20); goto again; } return NULL; } DEBUG(4,("%d: session request ok\n", sys_getpid())); if (!smbcli_negprot(c, unicode, maxprotocol)) { DEBUG(0,("%d: protocol negotiation failed\n", sys_getpid())); talloc_free(c); return NULL; } if (!got_pass) { char *pass = getpass("Password: "); if (pass) { pstrcpy(password, pass); } } /* This should be right for current smbfs. Future versions will support large files as well as unicode and oplocks. */ if (status32_smbfs) { c->capabilities &= ~(CAP_UNICODE | CAP_LARGE_FILES | CAP_NT_SMBS | CAP_NT_FIND | CAP_LEVEL_II_OPLOCKS); } else { c->capabilities &= ~(CAP_UNICODE | CAP_LARGE_FILES | CAP_NT_SMBS | CAP_NT_FIND | CAP_STATUS32 | CAP_LEVEL_II_OPLOCKS); c->force_dos_errors = true; } if (!smbcli_session_setup(c, username, password, strlen(password), password, strlen(password), workgroup)) { /* if a password was not supplied then try again with a null username */ if (password[0] || !username[0] || !smbcli_session_setup(c, "", "", 0, "", 0, workgroup)) { DEBUG(0,("%d: session setup failed: %s\n", sys_getpid(), smbcli_errstr(c))); talloc_free(c); return NULL; } DEBUG(0,("Anonymous login successful\n")); } DEBUG(4,("%d: session setup ok\n", sys_getpid())); if (!smbcli_tconX(c, share, "?????", password, strlen(password)+1)) { DEBUG(0,("%d: tree connect failed: %s\n", sys_getpid(), smbcli_errstr(c))); talloc_free(c); return NULL; } DEBUG(4,("%d: tconx ok\n", sys_getpid())); got_pass = true; return c;}/****************************************************************************unmount smbfs (this is a bailout routine to clean up if a reconnect fails) Code blatently stolen from smbumount.c -mhw-****************************************************************************/static void smb_umount(const char *mount_point){ int fd; struct mntent *mnt; FILE* mtab; FILE* new_mtab; /* Programmers Note: This routine only gets called to the scene of a disaster to shoot the survivors... A connection that was working has now apparently failed. We have an active mount point (presumably) that we need to dump. If we get errors along the way - make some noise, but we are already turning out the lights to exit anyways... */ if (umount(mount_point) != 0) { DEBUG(0,("%d: Could not umount %s: %s\n", sys_getpid(), mount_point, strerror(errno))); return; } if ((fd = open(MOUNTED"~", O_RDWR|O_CREAT|O_EXCL, 0600)) == -1) { DEBUG(0,("%d: Can't get "MOUNTED"~ lock file", sys_getpid())); return; } close(fd); if ((mtab = setmntent(MOUNTED, "r")) == NULL) { DEBUG(0,("%d: Can't open " MOUNTED ": %s\n", sys_getpid(), strerror(errno))); return; }#define MOUNTED_TMP MOUNTED".tmp" if ((new_mtab = setmntent(MOUNTED_TMP, "w")) == NULL) { DEBUG(0,("%d: Can't open " MOUNTED_TMP ": %s\n", sys_getpid(), strerror(errno))); endmntent(mtab); return; } while ((mnt = getmntent(mtab)) != NULL) { if (strcmp(mnt->mnt_dir, mount_point) != 0) { addmntent(new_mtab, mnt); } } endmntent(mtab); if (fchmod (fileno (new_mtab), S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH) < 0) { DEBUG(0,("%d: Error changing mode of %s: %s\n", sys_getpid(), MOUNTED_TMP, strerror(errno))); return; } endmntent(new_mtab); if (rename(MOUNTED_TMP, MOUNTED) < 0) { DEBUG(0,("%d: Cannot rename %s to %s: %s\n", sys_getpid(), MOUNTED, MOUNTED_TMP, strerror(errno))); return; } if (unlink(MOUNTED"~") == -1) { DEBUG(0,("%d: Can't remove "MOUNTED"~", sys_getpid())); return; }}/* * Call the smbfs ioctl to install a connection socket, * then wait for a signal to reconnect. Note that we do * not exit after open_sockets() or send_login() errors, * as the smbfs mount would then have no way to recover. */static void send_fs_socket(struct loadparm_context *lp_ctx, const char *the_service, const char *mount_point, struct smbcli_state *c){ int fd, closed = 0, res = 1; pid_t parentpid = getppid(); struct smb_conn_opt conn_options; memset(&conn_options, 0, sizeof(conn_options)); while (1) { if ((fd = open(mount_point, O_RDONLY)) < 0) { DEBUG(0,("mount.smbfs[%d]: can't open %s\n", sys_getpid(), mount_point)); break; } conn_options.fd = c->fd; conn_options.protocol = c->protocol; conn_options.case_handling = SMB_CASE_DEFAULT; conn_options.max_xmit = c->max_xmit; conn_options.server_uid = c->vuid; conn_options.tid = c->cnum; conn_options.secmode = c->sec_mode; conn_options.rawmode = 0; conn_options.sesskey = c->sesskey; conn_options.maxraw = 0; conn_options.capabilities = c->capabilities; conn_options.serverzone = c->serverzone/60; res = ioctl(fd, SMB_IOC_NEWCONN, &conn_options); if (res != 0) { DEBUG(0,("mount.smbfs[%d]: ioctl failed, res=%d\n", sys_getpid(), res)); close(fd); break; } if (parentpid) { /* Ok... We are going to kill the parent. Now is the time to break the process group... */ setsid(); /* Send a signal to the parent to terminate */ kill(parentpid, SIGTERM); parentpid = 0; } close(fd); /* This looks wierd but we are only closing the userspace side, the connection has already been passed to smbfs and it has increased the usage count on the socket. If we don't do this we will "leak" sockets and memory on each reconnection we have to make. */ talloc_free(c); c = NULL; if (!closed) { /* redirect stdout & stderr since we can't know that the library functions we use are using DEBUG. */ if ( (fd = open("/dev/null", O_WRONLY)) < 0) DEBUG(2,("mount.smbfs: can't open /dev/null\n")); close_our_files(fd); if (fd >= 0) { dup2(fd, STDOUT_FILENO); dup2(fd, STDERR_FILENO); close(fd); } /* here we are no longer interactive */ set_remote_machine_name("smbmount"); /* sneaky ... */ setup_logging("mount.smbfs", DEBUG_STDERR); reopen_logs(); DEBUG(0, ("mount.smbfs: entering daemon mode for service %s, pid=%d\n", the_service, sys_getpid())); closed = 1; } /* Wait for a signal from smbfs ... but don't continue until we actually get a new connection. */ while (!c) { CatchSignal(SIGUSR1, &usr1_handler); pause(); DEBUG(2,("mount.smbfs[%d]: got signal, getting new socket\n", sys_getpid())); c = do_connection(the_service, lp_unicode(lp_ctx), lp_cli_maxprotocol(lp_ctx)); } } smb_umount(mount_point); DEBUG(2,("mount.smbfs[%d]: exit\n", sys_getpid())); exit(1);}/** * Mount a smbfs **/static void init_mount(struct loadparm_context *lp_ctx){ char mount_point[MAXPATHLEN+1]; pstring tmp; pstring svc2; struct smbcli_state *c; char *args[20]; int i, status; if (realpath(mpoint, mount_point) == NULL) { fprintf(stderr, "Could not resolve mount point %s\n", mpoint); return; } c = do_connection(service, lp_unicode(lp_ctx), lp_cli_maxprotocol(lp_ctx)); if (!c) { fprintf(stderr,"SMB connection failed\n"); exit(1); } /* Set up to return as a daemon child and wait in the parent until the child say it's ready... */ daemonize(); pstrcpy(svc2, service); string_replace(svc2, '\\','/'); string_replace(svc2, ' ','_'); memset(args, 0, sizeof(args[0])*20); i=0; args[i++] = "smbmnt"; args[i++] = mount_point; args[i++] = "-s"; args[i++] = svc2; if (mount_ro) { args[i++] = "-r";
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -