17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate * CDDL HEADER START
37c478bd9Sstevel@tonic-gate *
47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the
545916cd2Sjpk * Common Development and Distribution License (the "License").
645916cd2Sjpk * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate *
87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate * and limitations under the License.
127c478bd9Sstevel@tonic-gate *
137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate *
197c478bd9Sstevel@tonic-gate * CDDL HEADER END
207c478bd9Sstevel@tonic-gate */
217c478bd9Sstevel@tonic-gate /*
22257ece65SRalph Turner - Sun UK - Contractor * Copyright (c) 1988, 2010, Oracle and/or its affiliates. All rights reserved.
23506ea5b8SMilan Jurik * Copyright 2012 Milan Jurik. All rights reserved.
24*28c4d110SJoshua M. Clulow * Copyright 2015 Joyent, Inc.
257c478bd9Sstevel@tonic-gate */
267c478bd9Sstevel@tonic-gate
277c478bd9Sstevel@tonic-gate /* Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T */
287c478bd9Sstevel@tonic-gate /* All Rights Reserved */
297c478bd9Sstevel@tonic-gate
307c478bd9Sstevel@tonic-gate /* Copyright (c) 1987, 1988 Microsoft Corporation */
317c478bd9Sstevel@tonic-gate /* All Rights Reserved */
327c478bd9Sstevel@tonic-gate
337c478bd9Sstevel@tonic-gate /*
347c478bd9Sstevel@tonic-gate * Portions of this source code were derived from Berkeley 4.3 BSD
357c478bd9Sstevel@tonic-gate * under license from the Regents of the University of California.
367c478bd9Sstevel@tonic-gate */
377c478bd9Sstevel@tonic-gate
387c478bd9Sstevel@tonic-gate #include <unistd.h>
397c478bd9Sstevel@tonic-gate #include <sys/types.h>
407c478bd9Sstevel@tonic-gate #include <sys/param.h>
417c478bd9Sstevel@tonic-gate #include <sys/stat.h>
427c478bd9Sstevel@tonic-gate #include <sys/mkdev.h>
437c478bd9Sstevel@tonic-gate #include <sys/wait.h>
447c478bd9Sstevel@tonic-gate #include <dirent.h>
457c478bd9Sstevel@tonic-gate #include <errno.h>
467c478bd9Sstevel@tonic-gate #include <stdio.h>
477c478bd9Sstevel@tonic-gate #include <signal.h>
487c478bd9Sstevel@tonic-gate #include <ctype.h>
497c478bd9Sstevel@tonic-gate #include <locale.h>
507c478bd9Sstevel@tonic-gate #include <nl_types.h>
517c478bd9Sstevel@tonic-gate #include <langinfo.h>
527c478bd9Sstevel@tonic-gate #include <pwd.h>
537c478bd9Sstevel@tonic-gate #include <grp.h>
547c478bd9Sstevel@tonic-gate #include <fcntl.h>
557c478bd9Sstevel@tonic-gate #include <string.h>
567c478bd9Sstevel@tonic-gate #include <malloc.h>
577c478bd9Sstevel@tonic-gate #include <time.h>
587c478bd9Sstevel@tonic-gate #include <utime.h>
597c478bd9Sstevel@tonic-gate #include <stdlib.h>
607c478bd9Sstevel@tonic-gate #include <stdarg.h>
617c478bd9Sstevel@tonic-gate #include <widec.h>
627c478bd9Sstevel@tonic-gate #include <sys/mtio.h>
637c478bd9Sstevel@tonic-gate #include <sys/acl.h>
647c478bd9Sstevel@tonic-gate #include <strings.h>
657c478bd9Sstevel@tonic-gate #include <deflt.h>
667c478bd9Sstevel@tonic-gate #include <limits.h>
677c478bd9Sstevel@tonic-gate #include <iconv.h>
687c478bd9Sstevel@tonic-gate #include <assert.h>
69da6c28aaSamw #include <libgen.h>
70da6c28aaSamw #include <libintl.h>
71fa9e4066Sahrens #include <aclutils.h>
72da6c28aaSamw #include <libnvpair.h>
73da6c28aaSamw #include <archives.h>
743d63ea05Sas145665
757c478bd9Sstevel@tonic-gate #if defined(__SunOS_5_6) || defined(__SunOS_5_7)
767c478bd9Sstevel@tonic-gate extern int defcntl();
777c478bd9Sstevel@tonic-gate #endif
78da6c28aaSamw #if defined(_PC_SATTR_ENABLED)
79da6c28aaSamw #include <attr.h>
80da6c28aaSamw #include <libcmdutils.h>
81da6c28aaSamw #endif
827c478bd9Sstevel@tonic-gate
8345916cd2Sjpk /* Trusted Extensions */
8445916cd2Sjpk #include <zone.h>
8545916cd2Sjpk #include <tsol/label.h>
8645916cd2Sjpk #include <sys/tsol/label_macro.h>
8745916cd2Sjpk
88da6c28aaSamw #include "getresponse.h"
897c478bd9Sstevel@tonic-gate /*
907c478bd9Sstevel@tonic-gate * Source compatibility
917c478bd9Sstevel@tonic-gate */
927c478bd9Sstevel@tonic-gate
937c478bd9Sstevel@tonic-gate /*
947c478bd9Sstevel@tonic-gate * These constants come from archives.h and sys/fcntl.h
957c478bd9Sstevel@tonic-gate * and were introduced by the extended attributes project
967c478bd9Sstevel@tonic-gate * in Solaris 9.
977c478bd9Sstevel@tonic-gate */
987c478bd9Sstevel@tonic-gate #if !defined(O_XATTR)
997c478bd9Sstevel@tonic-gate #define AT_SYMLINK_NOFOLLOW 0x1000
1007c478bd9Sstevel@tonic-gate #define AT_REMOVEDIR 0x1
1017c478bd9Sstevel@tonic-gate #define AT_FDCWD 0xffd19553
1027c478bd9Sstevel@tonic-gate #define _XATTR_HDRTYPE 'E'
1037c478bd9Sstevel@tonic-gate static int attropen();
1047c478bd9Sstevel@tonic-gate static int fstatat();
1057c478bd9Sstevel@tonic-gate static int renameat();
1067c478bd9Sstevel@tonic-gate static int unlinkat();
1077c478bd9Sstevel@tonic-gate static int openat();
1087c478bd9Sstevel@tonic-gate static int fchownat();
1097c478bd9Sstevel@tonic-gate static int futimesat();
1107c478bd9Sstevel@tonic-gate #endif
1117c478bd9Sstevel@tonic-gate
1127c478bd9Sstevel@tonic-gate /*
1137c478bd9Sstevel@tonic-gate * Compiling with -D_XPG4_2 gets this but produces other problems, so
1147c478bd9Sstevel@tonic-gate * instead of including sys/time.h and compiling with -D_XPG4_2, I'm
1157c478bd9Sstevel@tonic-gate * explicitly doing the declaration here.
1167c478bd9Sstevel@tonic-gate */
1177c478bd9Sstevel@tonic-gate int utimes(const char *path, const struct timeval timeval_ptr[]);
1187c478bd9Sstevel@tonic-gate
1197c478bd9Sstevel@tonic-gate #ifndef MINSIZE
1207c478bd9Sstevel@tonic-gate #define MINSIZE 250
1217c478bd9Sstevel@tonic-gate #endif
1227c478bd9Sstevel@tonic-gate #define DEF_FILE "/etc/default/tar"
1237c478bd9Sstevel@tonic-gate
1247c478bd9Sstevel@tonic-gate #define min(a, b) ((a) < (b) ? (a) : (b))
1257c478bd9Sstevel@tonic-gate #define max(a, b) ((a) > (b) ? (a) : (b))
1267c478bd9Sstevel@tonic-gate
1277c478bd9Sstevel@tonic-gate #define TBLOCK 512 /* tape block size--should be universal */
1287c478bd9Sstevel@tonic-gate
1297c478bd9Sstevel@tonic-gate #ifdef BSIZE
1307c478bd9Sstevel@tonic-gate #define SYS_BLOCK BSIZE /* from sys/param.h: secondary block size */
1317c478bd9Sstevel@tonic-gate #else /* BSIZE */
1327c478bd9Sstevel@tonic-gate #define SYS_BLOCK 512 /* default if no BSIZE in param.h */
1337c478bd9Sstevel@tonic-gate #endif /* BSIZE */
1347c478bd9Sstevel@tonic-gate
1357c478bd9Sstevel@tonic-gate #define NBLOCK 20
1367c478bd9Sstevel@tonic-gate #define NAMSIZ 100
1377c478bd9Sstevel@tonic-gate #define PRESIZ 155
1387c478bd9Sstevel@tonic-gate #define MAXNAM 256
1397c478bd9Sstevel@tonic-gate #define MODEMASK 0777777 /* file creation mode mask */
1407c478bd9Sstevel@tonic-gate #define POSIXMODES 07777 /* mask for POSIX mode bits */
1417c478bd9Sstevel@tonic-gate #define MAXEXT 9 /* reasonable max # extents for a file */
1427c478bd9Sstevel@tonic-gate #define EXTMIN 50 /* min blks left on floppy to split a file */
1437c478bd9Sstevel@tonic-gate
1447c478bd9Sstevel@tonic-gate /* max value dblock.dbuf.efsize can store */
1457c478bd9Sstevel@tonic-gate #define TAR_EFSIZE_MAX 0777777777
1467c478bd9Sstevel@tonic-gate
1477c478bd9Sstevel@tonic-gate /*
1487c478bd9Sstevel@tonic-gate * Symbols which specify the values at which the use of the 'E' function
1497c478bd9Sstevel@tonic-gate * modifier is required to properly store a file.
1507c478bd9Sstevel@tonic-gate *
1517c478bd9Sstevel@tonic-gate * TAR_OFFSET_MAX - the largest file size we can archive
1527c478bd9Sstevel@tonic-gate * OCTAL7CHAR - the limit for ustar gid, uid, dev
1537c478bd9Sstevel@tonic-gate */
1547c478bd9Sstevel@tonic-gate
1557c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG
1567c478bd9Sstevel@tonic-gate /* tiny values which force the creation of extended header entries */
1577c478bd9Sstevel@tonic-gate #define TAR_OFFSET_MAX 9
1587c478bd9Sstevel@tonic-gate #define OCTAL7CHAR 2
1597c478bd9Sstevel@tonic-gate #else
1607c478bd9Sstevel@tonic-gate /* normal values */
161b7d62af5Sceastha #define TAR_OFFSET_MAX 077777777777ULL
1627c478bd9Sstevel@tonic-gate #define OCTAL7CHAR 07777777
1637c478bd9Sstevel@tonic-gate #endif
1647c478bd9Sstevel@tonic-gate
1657c478bd9Sstevel@tonic-gate #define TBLOCKS(bytes) (((bytes) + TBLOCK - 1) / TBLOCK)
1667c478bd9Sstevel@tonic-gate #define K(tblocks) ((tblocks+1)/2) /* tblocks to Kbytes for printing */
1677c478bd9Sstevel@tonic-gate
1687c478bd9Sstevel@tonic-gate #define MAXLEV (PATH_MAX / 2)
1697c478bd9Sstevel@tonic-gate #define LEV0 1
1707c478bd9Sstevel@tonic-gate #define SYMLINK_LEV0 0
1717c478bd9Sstevel@tonic-gate
1727c478bd9Sstevel@tonic-gate #define TRUE 1
1737c478bd9Sstevel@tonic-gate #define FALSE 0
1747c478bd9Sstevel@tonic-gate
1757c478bd9Sstevel@tonic-gate #define XATTR_FILE 1
1767c478bd9Sstevel@tonic-gate #define NORMAL_FILE 0
1777c478bd9Sstevel@tonic-gate
1787c478bd9Sstevel@tonic-gate #define PUT_AS_LINK 1
1797c478bd9Sstevel@tonic-gate #define PUT_NOTAS_LINK 0
1807c478bd9Sstevel@tonic-gate
181da6c28aaSamw #ifndef VIEW_READONLY
182da6c28aaSamw #define VIEW_READONLY "SUNWattr_ro"
183da6c28aaSamw #endif
184da6c28aaSamw
185da6c28aaSamw #ifndef VIEW_READWRITE
186da6c28aaSamw #define VIEW_READWRITE "SUNWattr_rw"
187da6c28aaSamw #endif
188da6c28aaSamw
1897c478bd9Sstevel@tonic-gate #if _FILE_OFFSET_BITS == 64
1907c478bd9Sstevel@tonic-gate #define FMT_off_t "lld"
1917c478bd9Sstevel@tonic-gate #define FMT_off_t_o "llo"
1927c478bd9Sstevel@tonic-gate #define FMT_blkcnt_t "lld"
1937c478bd9Sstevel@tonic-gate #else
1947c478bd9Sstevel@tonic-gate #define FMT_off_t "ld"
1957c478bd9Sstevel@tonic-gate #define FMT_off_t_o "lo"
1967c478bd9Sstevel@tonic-gate #define FMT_blkcnt_t "ld"
1977c478bd9Sstevel@tonic-gate #endif
1987c478bd9Sstevel@tonic-gate
1997c478bd9Sstevel@tonic-gate /* ACL support */
2007c478bd9Sstevel@tonic-gate
2017c478bd9Sstevel@tonic-gate static
2027c478bd9Sstevel@tonic-gate struct sec_attr {
2037c478bd9Sstevel@tonic-gate char attr_type;
2047c478bd9Sstevel@tonic-gate char attr_len[7];
2057c478bd9Sstevel@tonic-gate char attr_info[1];
2067c478bd9Sstevel@tonic-gate } *attr;
2077c478bd9Sstevel@tonic-gate
208da6c28aaSamw #if defined(O_XATTR)
209da6c28aaSamw typedef enum {
210da6c28aaSamw ATTR_OK,
211da6c28aaSamw ATTR_SKIP,
212da6c28aaSamw ATTR_CHDIR_ERR,
213da6c28aaSamw ATTR_OPEN_ERR,
214da6c28aaSamw ATTR_XATTR_ERR,
215da6c28aaSamw ATTR_SATTR_ERR
216da6c28aaSamw } attr_status_t;
217da6c28aaSamw #endif
218da6c28aaSamw
219da6c28aaSamw #if defined(O_XATTR)
220da6c28aaSamw typedef enum {
221da6c28aaSamw ARC_CREATE,
222da6c28aaSamw ARC_RESTORE
223da6c28aaSamw } arc_action_t;
224da6c28aaSamw #endif
225da6c28aaSamw
226da6c28aaSamw typedef struct attr_data {
227da6c28aaSamw char *attr_parent;
228da6c28aaSamw char *attr_path;
229da6c28aaSamw int attr_parentfd;
230da6c28aaSamw int attr_rw_sysattr;
231da6c28aaSamw } attr_data_t;
232da6c28aaSamw
2337c478bd9Sstevel@tonic-gate /*
2347c478bd9Sstevel@tonic-gate *
2357c478bd9Sstevel@tonic-gate * Tar has been changed to support extended attributes.
2367c478bd9Sstevel@tonic-gate *
2377c478bd9Sstevel@tonic-gate * As part of this change tar now uses the new *at() syscalls
2387c478bd9Sstevel@tonic-gate * such as openat, fchownat(), unlinkat()...
2397c478bd9Sstevel@tonic-gate *
2407c478bd9Sstevel@tonic-gate * This was done so that attributes can be handled with as few code changes
2417c478bd9Sstevel@tonic-gate * as possible.
2427c478bd9Sstevel@tonic-gate *
2437c478bd9Sstevel@tonic-gate * What this means is that tar now opens the directory that a file or directory
2447c478bd9Sstevel@tonic-gate * resides in and then performs *at() functions to manipulate the entry.
2457c478bd9Sstevel@tonic-gate *
2467c478bd9Sstevel@tonic-gate * For example a new file is now created like this:
2477c478bd9Sstevel@tonic-gate *
2487c478bd9Sstevel@tonic-gate * dfd = open(<some dir path>)
2497c478bd9Sstevel@tonic-gate * fd = openat(dfd, <name>,....);
2507c478bd9Sstevel@tonic-gate *
2517c478bd9Sstevel@tonic-gate * or in the case of an extended attribute
2527c478bd9Sstevel@tonic-gate *
2537c478bd9Sstevel@tonic-gate * dfd = attropen(<pathname>, ".", ....)
2547c478bd9Sstevel@tonic-gate *
2557c478bd9Sstevel@tonic-gate * Once we have a directory file descriptor all of the *at() functions can
2567c478bd9Sstevel@tonic-gate * be applied to it.
2577c478bd9Sstevel@tonic-gate *
2587c478bd9Sstevel@tonic-gate * unlinkat(dfd, <component name>,...)
2597c478bd9Sstevel@tonic-gate * fchownat(dfd, <component name>,..)
2607c478bd9Sstevel@tonic-gate *
2617c478bd9Sstevel@tonic-gate * This works for both normal namespace files and extended attribute file
2627c478bd9Sstevel@tonic-gate *
2637c478bd9Sstevel@tonic-gate */
2647c478bd9Sstevel@tonic-gate
2657c478bd9Sstevel@tonic-gate /*
2667c478bd9Sstevel@tonic-gate *
2677c478bd9Sstevel@tonic-gate * Extended attribute Format
2687c478bd9Sstevel@tonic-gate *
2697c478bd9Sstevel@tonic-gate * Extended attributes are stored in two pieces.
2707c478bd9Sstevel@tonic-gate * 1. An attribute header which has information about
2717c478bd9Sstevel@tonic-gate * what file the attribute is for and what the attribute
2727c478bd9Sstevel@tonic-gate * is named.
2737c478bd9Sstevel@tonic-gate * 2. The attribute record itself. Stored as a normal file type
2747c478bd9Sstevel@tonic-gate * of entry.
2757c478bd9Sstevel@tonic-gate * Both the header and attribute record have special modes/typeflags
2767c478bd9Sstevel@tonic-gate * associated with them.
2777c478bd9Sstevel@tonic-gate *
2787c478bd9Sstevel@tonic-gate * The names of the header in the archive look like:
2797c478bd9Sstevel@tonic-gate * /dev/null/attr.hdr
2807c478bd9Sstevel@tonic-gate *
2817c478bd9Sstevel@tonic-gate * The name of the attribute looks like:
2827c478bd9Sstevel@tonic-gate * /dev/null/attr
2837c478bd9Sstevel@tonic-gate *
2847c478bd9Sstevel@tonic-gate * This is done so that an archiver that doesn't understand these formats
2857c478bd9Sstevel@tonic-gate * can just dispose of the attribute records.
2867c478bd9Sstevel@tonic-gate *
2877c478bd9Sstevel@tonic-gate * The format is composed of a fixed size header followed
2887c478bd9Sstevel@tonic-gate * by a variable sized xattr_buf. If the attribute is a hard link
2897c478bd9Sstevel@tonic-gate * to another attribute then another xattr_buf section is included
2907c478bd9Sstevel@tonic-gate * for the link.
2917c478bd9Sstevel@tonic-gate *
2927c478bd9Sstevel@tonic-gate * The xattr_buf is used to define the necessary "pathing" steps
2937c478bd9Sstevel@tonic-gate * to get to the extended attribute. This is necessary to support
2947c478bd9Sstevel@tonic-gate * a fully recursive attribute model where an attribute may itself
2957c478bd9Sstevel@tonic-gate * have an attribute.
2967c478bd9Sstevel@tonic-gate *
2977c478bd9Sstevel@tonic-gate * The basic layout looks like this.
2987c478bd9Sstevel@tonic-gate *
2997c478bd9Sstevel@tonic-gate * --------------------------------
3007c478bd9Sstevel@tonic-gate * | |
3017c478bd9Sstevel@tonic-gate * | xattr_hdr |
3027c478bd9Sstevel@tonic-gate * | |
3037c478bd9Sstevel@tonic-gate * --------------------------------
3047c478bd9Sstevel@tonic-gate * --------------------------------
3057c478bd9Sstevel@tonic-gate * | |
3067c478bd9Sstevel@tonic-gate * | xattr_buf |
3077c478bd9Sstevel@tonic-gate * | |
3087c478bd9Sstevel@tonic-gate * --------------------------------
3097c478bd9Sstevel@tonic-gate * --------------------------------
3107c478bd9Sstevel@tonic-gate * | |
3117c478bd9Sstevel@tonic-gate * | (optional link info) |
3127c478bd9Sstevel@tonic-gate * | |
3137c478bd9Sstevel@tonic-gate * --------------------------------
3147c478bd9Sstevel@tonic-gate * --------------------------------
3157c478bd9Sstevel@tonic-gate * | |
3167c478bd9Sstevel@tonic-gate * | attribute itself |
3177c478bd9Sstevel@tonic-gate * | stored as normal tar |
3187c478bd9Sstevel@tonic-gate * | or cpio data with |
3197c478bd9Sstevel@tonic-gate * | special mode or |
3207c478bd9Sstevel@tonic-gate * | typeflag |
3217c478bd9Sstevel@tonic-gate * | |
3227c478bd9Sstevel@tonic-gate * --------------------------------
3237c478bd9Sstevel@tonic-gate *
3247c478bd9Sstevel@tonic-gate */
3257c478bd9Sstevel@tonic-gate
3267c478bd9Sstevel@tonic-gate /*
3277c478bd9Sstevel@tonic-gate * xattrhead is a pointer to the xattr_hdr
3287c478bd9Sstevel@tonic-gate *
3297c478bd9Sstevel@tonic-gate * xattrp is a pointer to the xattr_buf structure
3307c478bd9Sstevel@tonic-gate * which contains the "pathing" steps to get to attributes
3317c478bd9Sstevel@tonic-gate *
3327c478bd9Sstevel@tonic-gate * xattr_linkp is a pointer to another xattr_buf structure that is
3337c478bd9Sstevel@tonic-gate * only used when an attribute is actually linked to another attribute
3347c478bd9Sstevel@tonic-gate *
3357c478bd9Sstevel@tonic-gate */
3367c478bd9Sstevel@tonic-gate
3377c478bd9Sstevel@tonic-gate static struct xattr_hdr *xattrhead;
3387c478bd9Sstevel@tonic-gate static struct xattr_buf *xattrp;
3397c478bd9Sstevel@tonic-gate static struct xattr_buf *xattr_linkp; /* pointer to link info, if any */
340da6c28aaSamw static char *xattrapath; /* attribute name */
3417c478bd9Sstevel@tonic-gate static char *xattr_linkaname; /* attribute attribute is linked to */
3427c478bd9Sstevel@tonic-gate static char Hiddendir; /* are we processing hidden xattr dir */
3437c478bd9Sstevel@tonic-gate static char xattrbadhead;
3447c478bd9Sstevel@tonic-gate
3457c478bd9Sstevel@tonic-gate /* Was statically allocated tbuf[NBLOCK] */
3467c478bd9Sstevel@tonic-gate static
3477c478bd9Sstevel@tonic-gate union hblock {
3487c478bd9Sstevel@tonic-gate char dummy[TBLOCK];
3497c478bd9Sstevel@tonic-gate struct header {
3507c478bd9Sstevel@tonic-gate char name[NAMSIZ]; /* If non-null prefix, path is */
3517c478bd9Sstevel@tonic-gate /* <prefix>/<name>; otherwise */
3527c478bd9Sstevel@tonic-gate /* <name> */
3537c478bd9Sstevel@tonic-gate char mode[8];
3547c478bd9Sstevel@tonic-gate char uid[8];
3557c478bd9Sstevel@tonic-gate char gid[8];
3567c478bd9Sstevel@tonic-gate char size[12]; /* size of this extent if file split */
3577c478bd9Sstevel@tonic-gate char mtime[12];
3587c478bd9Sstevel@tonic-gate char chksum[8];
3597c478bd9Sstevel@tonic-gate char typeflag;
3607c478bd9Sstevel@tonic-gate char linkname[NAMSIZ];
3617c478bd9Sstevel@tonic-gate char magic[6];
3627c478bd9Sstevel@tonic-gate char version[2];
3637c478bd9Sstevel@tonic-gate char uname[32];
3647c478bd9Sstevel@tonic-gate char gname[32];
3657c478bd9Sstevel@tonic-gate char devmajor[8];
3667c478bd9Sstevel@tonic-gate char devminor[8];
3677c478bd9Sstevel@tonic-gate char prefix[PRESIZ]; /* Together with "name", the path of */
3687c478bd9Sstevel@tonic-gate /* the file: <prefix>/<name> */
3697c478bd9Sstevel@tonic-gate char extno; /* extent #, null if not split */
3707c478bd9Sstevel@tonic-gate char extotal; /* total extents */
3717c478bd9Sstevel@tonic-gate char efsize[10]; /* size of entire file */
3727c478bd9Sstevel@tonic-gate } dbuf;
3737c478bd9Sstevel@tonic-gate } dblock, *tbuf, xhdr_buf;
3747c478bd9Sstevel@tonic-gate
3757c478bd9Sstevel@tonic-gate static
3767c478bd9Sstevel@tonic-gate struct xtar_hdr {
3777c478bd9Sstevel@tonic-gate uid_t x_uid, /* Uid of file */
3787c478bd9Sstevel@tonic-gate x_gid; /* Gid of file */
3797c478bd9Sstevel@tonic-gate major_t x_devmajor; /* Device major node */
3807c478bd9Sstevel@tonic-gate minor_t x_devminor; /* Device minor node */
3817c478bd9Sstevel@tonic-gate off_t x_filesz; /* Length of file */
3827c478bd9Sstevel@tonic-gate char *x_uname, /* Pointer to name of user */
3837c478bd9Sstevel@tonic-gate *x_gname, /* Pointer to gid of user */
3847c478bd9Sstevel@tonic-gate *x_linkpath, /* Path for a hard/symbolic link */
3857c478bd9Sstevel@tonic-gate *x_path; /* Path of file */
3867c478bd9Sstevel@tonic-gate timestruc_t x_mtime; /* Seconds and nanoseconds */
3877c478bd9Sstevel@tonic-gate } Xtarhdr;
3887c478bd9Sstevel@tonic-gate
3897c478bd9Sstevel@tonic-gate static
3907c478bd9Sstevel@tonic-gate struct gen_hdr {
3917c478bd9Sstevel@tonic-gate ulong_t g_mode; /* Mode of file */
3927c478bd9Sstevel@tonic-gate uid_t g_uid, /* Uid of file */
3937c478bd9Sstevel@tonic-gate g_gid; /* Gid of file */
3947c478bd9Sstevel@tonic-gate off_t g_filesz; /* Length of file */
3957c478bd9Sstevel@tonic-gate time_t g_mtime; /* Modification time */
3967c478bd9Sstevel@tonic-gate uint_t g_cksum; /* Checksum of file */
3977c478bd9Sstevel@tonic-gate ulong_t g_devmajor, /* File system of file */
3987c478bd9Sstevel@tonic-gate g_devminor; /* Major/minor of special files */
3997c478bd9Sstevel@tonic-gate } Gen;
4007c478bd9Sstevel@tonic-gate
4017c478bd9Sstevel@tonic-gate static
4027c478bd9Sstevel@tonic-gate struct linkbuf {
4037c478bd9Sstevel@tonic-gate ino_t inum;
4047c478bd9Sstevel@tonic-gate dev_t devnum;
4057c478bd9Sstevel@tonic-gate int count;
4067c478bd9Sstevel@tonic-gate char pathname[MAXNAM+1]; /* added 1 for last NULL */
4077c478bd9Sstevel@tonic-gate char attrname[MAXNAM+1];
4087c478bd9Sstevel@tonic-gate struct linkbuf *nextp;
4097c478bd9Sstevel@tonic-gate } *ihead;
4107c478bd9Sstevel@tonic-gate
4117c478bd9Sstevel@tonic-gate /* see comments before build_table() */
4127c478bd9Sstevel@tonic-gate #define TABLE_SIZE 512
4135e2174acSceastha typedef struct file_list {
4147c478bd9Sstevel@tonic-gate char *name; /* Name of file to {in,ex}clude */
4157c478bd9Sstevel@tonic-gate struct file_list *next; /* Linked list */
4165e2174acSceastha } file_list_t;
4175e2174acSceastha static file_list_t *exclude_tbl[TABLE_SIZE],
4187c478bd9Sstevel@tonic-gate *include_tbl[TABLE_SIZE];
4197c478bd9Sstevel@tonic-gate
42045916cd2Sjpk static int append_secattr(char **, int *, int, char *, char);
4217c478bd9Sstevel@tonic-gate static void write_ancillary(union hblock *, char *, int, char);
4227c478bd9Sstevel@tonic-gate
4235e2174acSceastha static void add_file_to_table(file_list_t *table[], char *str);
4247c478bd9Sstevel@tonic-gate static void assert_string(char *s, char *msg);
4257c478bd9Sstevel@tonic-gate static int istape(int fd, int type);
4267c478bd9Sstevel@tonic-gate static void backtape(void);
4275e2174acSceastha static void build_table(file_list_t *table[], char *file);
428da6c28aaSamw static int check_prefix(char **namep, char **dirp, char **compp);
4297c478bd9Sstevel@tonic-gate static void closevol(void);
4307c478bd9Sstevel@tonic-gate static void copy(void *dst, void *src);
4317c478bd9Sstevel@tonic-gate static int convtoreg(off_t);
4322c0f0499Slovely static void delete_target(int fd, char *comp, char *namep);
4337c478bd9Sstevel@tonic-gate static void doDirTimes(char *name, timestruc_t modTime);
4347c478bd9Sstevel@tonic-gate static void done(int n);
4357c478bd9Sstevel@tonic-gate static void dorep(char *argv[]);
4367c478bd9Sstevel@tonic-gate static void dotable(char *argv[]);
4377c478bd9Sstevel@tonic-gate static void doxtract(char *argv[]);
438b25dbf38SRich Burridge static int tar_chdir(const char *path);
4393a1dab68SRich Burridge static int is_directory(char *name);
4401a431409SRich Burridge static int has_dot_dot(char *name);
4411a431409SRich Burridge static int is_absolute(char *name);
4421a431409SRich Burridge static char *make_relative_name(char *name, char **stripped_prefix);
4437c478bd9Sstevel@tonic-gate static void fatal(char *format, ...);
4447c478bd9Sstevel@tonic-gate static void vperror(int exit_status, char *fmt, ...);
4457c478bd9Sstevel@tonic-gate static void flushtape(void);
4467c478bd9Sstevel@tonic-gate static void getdir(void);
4477c478bd9Sstevel@tonic-gate static void *getmem(size_t);
4487c478bd9Sstevel@tonic-gate static void longt(struct stat *st, char aclchar);
449123523f8Sas158974 static void load_info_from_xtarhdr(u_longlong_t flag, struct xtar_hdr *xhdrp);
4507c478bd9Sstevel@tonic-gate static int makeDir(char *name);
4517c478bd9Sstevel@tonic-gate static void mterr(char *operation, int i, int exitcode);
4527c478bd9Sstevel@tonic-gate static void newvol(void);
4537c478bd9Sstevel@tonic-gate static void passtape(void);
4547c478bd9Sstevel@tonic-gate static void putempty(blkcnt_t n);
4557c478bd9Sstevel@tonic-gate static int putfile(char *longname, char *shortname, char *parent,
456da6c28aaSamw attr_data_t *attrinfo, int filetype, int lev, int symlink_lev);
4577c478bd9Sstevel@tonic-gate static void readtape(char *buffer);
4587c478bd9Sstevel@tonic-gate static void seekdisk(blkcnt_t blocks);
4597c478bd9Sstevel@tonic-gate static void setPathTimes(int dirfd, char *path, timestruc_t modTime);
460123523f8Sas158974 static void setbytes_to_skip(struct stat *st, int err);
4617c478bd9Sstevel@tonic-gate static void splitfile(char *longname, int ifd, char *name,
4627c478bd9Sstevel@tonic-gate char *prefix, int filetype);
4637c478bd9Sstevel@tonic-gate static void tomodes(struct stat *sp);
4647c478bd9Sstevel@tonic-gate static void usage(void);
465da6c28aaSamw static int xblocks(int issysattr, off_t bytes, int ofile);
466da6c28aaSamw static int xsfile(int issysattr, int ofd);
4677c478bd9Sstevel@tonic-gate static void resugname(int dirfd, char *name, int symflag);
4687c478bd9Sstevel@tonic-gate static int bcheck(char *bstr);
4697c478bd9Sstevel@tonic-gate static int checkdir(char *name);
4707c478bd9Sstevel@tonic-gate static int checksum(union hblock *dblockp);
4717c478bd9Sstevel@tonic-gate #ifdef EUC
4727c478bd9Sstevel@tonic-gate static int checksum_signed(union hblock *dblockp);
4737c478bd9Sstevel@tonic-gate #endif /* EUC */
4747c478bd9Sstevel@tonic-gate static int checkupdate(char *arg);
4757c478bd9Sstevel@tonic-gate static int checkw(char c, char *name);
4767c478bd9Sstevel@tonic-gate static int cmp(char *b, char *s, int n);
4777c478bd9Sstevel@tonic-gate static int defset(char *arch);
478*28c4d110SJoshua M. Clulow static boolean_t endtape(void);
4795e2174acSceastha static int is_in_table(file_list_t *table[], char *str);
4807c478bd9Sstevel@tonic-gate static int notsame(void);
4817c478bd9Sstevel@tonic-gate static int is_prefix(char *s1, char *s2);
4827c478bd9Sstevel@tonic-gate static int response(void);
4837c478bd9Sstevel@tonic-gate static int build_dblock(const char *, const char *, const char,
4847c478bd9Sstevel@tonic-gate const int filetype, const struct stat *, const dev_t, const char *);
4857c478bd9Sstevel@tonic-gate static unsigned int hash(char *str);
4867c478bd9Sstevel@tonic-gate
4877c478bd9Sstevel@tonic-gate static blkcnt_t kcheck(char *kstr);
4887c478bd9Sstevel@tonic-gate static off_t bsrch(char *s, int n, off_t l, off_t h);
4897c478bd9Sstevel@tonic-gate static void onintr(int sig);
4907c478bd9Sstevel@tonic-gate static void onquit(int sig);
4917c478bd9Sstevel@tonic-gate static void onhup(int sig);
4927c478bd9Sstevel@tonic-gate static uid_t getuidbyname(char *);
4937c478bd9Sstevel@tonic-gate static gid_t getgidbyname(char *);
4947c478bd9Sstevel@tonic-gate static char *getname(gid_t);
4957c478bd9Sstevel@tonic-gate static char *getgroup(gid_t);
4967c478bd9Sstevel@tonic-gate static int checkf(char *name, int mode, int howmuch);
4977c478bd9Sstevel@tonic-gate static int writetbuf(char *buffer, int n);
498da6c28aaSamw static int wantit(char *argv[], char **namep, char **dirp, char **comp,
499da6c28aaSamw attr_data_t **attrinfo);
50045916cd2Sjpk static void append_ext_attr(char *shortname, char **secinfo, int *len);
5017c478bd9Sstevel@tonic-gate static int get_xdata(void);
5027c478bd9Sstevel@tonic-gate static void gen_num(const char *keyword, const u_longlong_t number);
5037c478bd9Sstevel@tonic-gate static void gen_date(const char *keyword, const timestruc_t time_value);
5047c478bd9Sstevel@tonic-gate static void gen_string(const char *keyword, const char *value);
5057c478bd9Sstevel@tonic-gate static void get_xtime(char *value, timestruc_t *xtime);
5067c478bd9Sstevel@tonic-gate static int chk_path_build(char *name, char *longname, char *linkname,
5077c478bd9Sstevel@tonic-gate char *prefix, char type, int filetype);
5087c478bd9Sstevel@tonic-gate static int gen_utf8_names(const char *filename);
5097c478bd9Sstevel@tonic-gate static int utf8_local(char *option, char **Xhdr_ptrptr, char *target,
5107c478bd9Sstevel@tonic-gate const char *src, int max_val);
5117c478bd9Sstevel@tonic-gate static int local_utf8(char **Xhdr_ptrptr, char *target, const char *src,
5127c478bd9Sstevel@tonic-gate iconv_t iconv_cd, int xhdrflg, int max_val);
5137c478bd9Sstevel@tonic-gate static int c_utf8(char *target, const char *source);
514da6c28aaSamw static int getstat(int dirfd, char *longname, char *shortname,
515da6c28aaSamw char *attrparent);
516da6c28aaSamw static void xattrs_put(char *, char *, char *, char *);
5177c478bd9Sstevel@tonic-gate static void prepare_xattr(char **, char *, char *,
5187c478bd9Sstevel@tonic-gate char, struct linkbuf *, int *);
519da6c28aaSamw static int put_link(char *name, char *longname, char *component,
520da6c28aaSamw char *longattrname, char *prefix, int filetype, char typeflag);
5217c478bd9Sstevel@tonic-gate static int put_extra_attributes(char *longname, char *shortname,
522da6c28aaSamw char *longattrname, char *prefix, int filetype, char typeflag);
523da6c28aaSamw static int put_xattr_hdr(char *longname, char *shortname, char *longattrname,
524da6c28aaSamw char *prefix, int typeflag, int filetype, struct linkbuf *lp);
525da6c28aaSamw static int read_xattr_hdr(attr_data_t **attrinfo);
52645916cd2Sjpk
52745916cd2Sjpk /* Trusted Extensions */
52845916cd2Sjpk #define AUTO_ZONE "/zone"
52945916cd2Sjpk
53045916cd2Sjpk static void extract_attr(char **file_ptr, struct sec_attr *);
53145916cd2Sjpk static int check_ext_attr(char *filename);
53245916cd2Sjpk static void rebuild_comp_path(char *str, char **namep);
53345916cd2Sjpk static int rebuild_lk_comp_path(char *str, char **namep);
53445916cd2Sjpk
5357c478bd9Sstevel@tonic-gate static void get_parent(char *path, char *dir);
5367c478bd9Sstevel@tonic-gate static char *get_component(char *path);
537da6c28aaSamw static int retry_open_attr(int pdirfd, int cwd, char *dirp, char *pattr,
538da6c28aaSamw char *name, int oflag, mode_t mode);
5397c478bd9Sstevel@tonic-gate static char *skipslashes(char *string, char *start);
5407c478bd9Sstevel@tonic-gate static void chop_endslashes(char *path);
54136802407SRich Burridge static pid_t compress_file(void);
54236802407SRich Burridge static void compress_back(void);
54336802407SRich Burridge static void decompress_file(void);
54436802407SRich Burridge static pid_t uncompress_file(void);
54536802407SRich Burridge static void *compress_malloc(size_t);
546506ea5b8SMilan Jurik static void check_compression(void);
547506ea5b8SMilan Jurik static char *bz_suffix(void);
548506ea5b8SMilan Jurik static char *gz_suffix(void);
549506ea5b8SMilan Jurik static char *xz_suffix(void);
55036802407SRich Burridge static char *add_suffix();
55136802407SRich Burridge static void wait_pid(pid_t);
552aa7166bdSMilan Jurik static void verify_compress_opt(const char *t);
553aa7166bdSMilan Jurik static void detect_compress(void);
554*28c4d110SJoshua M. Clulow static void dlog(const char *, ...);
555*28c4d110SJoshua M. Clulow static boolean_t should_enable_debug(void);
556fa9e4066Sahrens
5577c478bd9Sstevel@tonic-gate static struct stat stbuf;
5587c478bd9Sstevel@tonic-gate
559da6c28aaSamw static char *myname;
560c92bf99eSJoshua M. Clulow static char *xtract_chdir = NULL;
5617c478bd9Sstevel@tonic-gate static int checkflag = 0;
5627c478bd9Sstevel@tonic-gate static int Xflag, Fflag, iflag, hflag, Bflag, Iflag;
563c536b1f9SRobert Mustacchi static int rflag, xflag, vflag, tflag, mt, cflag, mflag, pflag;
5647c478bd9Sstevel@tonic-gate static int uflag;
565cc22b130SRich Burridge static int errflag;
5667c478bd9Sstevel@tonic-gate static int oflag;
567cc22b130SRich Burridge static int bflag, Aflag;
5687c478bd9Sstevel@tonic-gate static int Pflag; /* POSIX conformant archive */
5697c478bd9Sstevel@tonic-gate static int Eflag; /* Allow files greater than 8GB */
5707c478bd9Sstevel@tonic-gate static int atflag; /* traverse extended attributes */
571da6c28aaSamw static int saflag; /* traverse extended sys attributes */
5727c478bd9Sstevel@tonic-gate static int Dflag; /* Data change flag */
57336802407SRich Burridge static int jflag; /* flag to use 'bzip2' */
57436802407SRich Burridge static int zflag; /* flag to use 'gzip' */
57536802407SRich Burridge static int Zflag; /* flag to use 'compress' */
576506ea5b8SMilan Jurik static int Jflag; /* flag to use 'xz' */
577aa7166bdSMilan Jurik static int aflag; /* flag to use autocompression */
57836802407SRich Burridge
57945916cd2Sjpk /* Trusted Extensions */
58045916cd2Sjpk static int Tflag; /* Trusted Extensions attr flags */
58145916cd2Sjpk static int dir_flag; /* for attribute extract */
58245916cd2Sjpk static int mld_flag; /* for attribute extract */
58345916cd2Sjpk static char *orig_namep; /* original namep - unadorned */
58445916cd2Sjpk static int rpath_flag; /* MLD real path is rebuilt */
58545916cd2Sjpk static char real_path[MAXPATHLEN]; /* MLD real path */
58645916cd2Sjpk static int lk_rpath_flag; /* linked to real path is rebuilt */
58745916cd2Sjpk static char lk_real_path[MAXPATHLEN]; /* linked real path */
58845916cd2Sjpk static bslabel_t bs_label; /* for attribute extract */
58945916cd2Sjpk static bslabel_t admin_low;
59045916cd2Sjpk static bslabel_t admin_high;
59145916cd2Sjpk static int ignored_aprivs = 0;
59245916cd2Sjpk static int ignored_fprivs = 0;
59345916cd2Sjpk static int ignored_fattrs = 0;
59445916cd2Sjpk
5957c478bd9Sstevel@tonic-gate static int term, chksum, wflag,
5967c478bd9Sstevel@tonic-gate first = TRUE, defaults_used = FALSE, linkerrok;
5977c478bd9Sstevel@tonic-gate static blkcnt_t recno;
5987c478bd9Sstevel@tonic-gate static int freemem = 1;
5997c478bd9Sstevel@tonic-gate static int nblock = NBLOCK;
6007c478bd9Sstevel@tonic-gate static int Errflg = 0;
6017c478bd9Sstevel@tonic-gate static int exitflag = 0;
6027c478bd9Sstevel@tonic-gate
6037c478bd9Sstevel@tonic-gate static dev_t mt_dev; /* device containing output file */
6047c478bd9Sstevel@tonic-gate static ino_t mt_ino; /* inode number of output file */
6057c478bd9Sstevel@tonic-gate static int mt_devtype; /* dev type of archive, from stat structure */
6067c478bd9Sstevel@tonic-gate
6077c478bd9Sstevel@tonic-gate static int update = 1; /* for `open' call */
6087c478bd9Sstevel@tonic-gate
6097c478bd9Sstevel@tonic-gate static off_t low;
6107c478bd9Sstevel@tonic-gate static off_t high;
6117c478bd9Sstevel@tonic-gate
6127c478bd9Sstevel@tonic-gate static FILE *tfile;
6137c478bd9Sstevel@tonic-gate static FILE *vfile = stdout;
61431a2de35SRich Burridge static char *tmpdir;
61531a2de35SRich Burridge static char *tmp_suffix = "/tarXXXXXX";
61631a2de35SRich Burridge static char *tname;
6177c478bd9Sstevel@tonic-gate static char archive[] = "archive0=";
6187c478bd9Sstevel@tonic-gate static char *Xfile;
6197c478bd9Sstevel@tonic-gate static char *usefile;
62036802407SRich Burridge static char tfname[1024];
6217c478bd9Sstevel@tonic-gate
6227c478bd9Sstevel@tonic-gate static int mulvol; /* multi-volume option selected */
6237c478bd9Sstevel@tonic-gate static blkcnt_t blocklim; /* number of blocks to accept per volume */
6247c478bd9Sstevel@tonic-gate static blkcnt_t tapepos; /* current block number to be written */
6257c478bd9Sstevel@tonic-gate static int NotTape; /* true if tape is a disk */
6267c478bd9Sstevel@tonic-gate static int dumping; /* true if writing a tape or other archive */
6277c478bd9Sstevel@tonic-gate static int extno; /* number of extent: starts at 1 */
6287c478bd9Sstevel@tonic-gate static int extotal; /* total extents in this file */
6297c478bd9Sstevel@tonic-gate static off_t extsize; /* size of current extent during extraction */
6307c478bd9Sstevel@tonic-gate static ushort_t Oumask = 0; /* old umask value */
631*28c4d110SJoshua M. Clulow static boolean_t is_posix; /* true if archive is POSIX-conformant */
6327c478bd9Sstevel@tonic-gate static const char *magic_type = "ustar";
6337c478bd9Sstevel@tonic-gate static size_t xrec_size = 8 * PATH_MAX; /* extended rec initial size */
6347c478bd9Sstevel@tonic-gate static char *xrec_ptr;
6357c478bd9Sstevel@tonic-gate static off_t xrec_offset = 0;
6367c478bd9Sstevel@tonic-gate static int Xhdrflag;
6377c478bd9Sstevel@tonic-gate static int charset_type = 0;
6387c478bd9Sstevel@tonic-gate
6397c478bd9Sstevel@tonic-gate static u_longlong_t xhdr_flgs; /* Bits set determine which items */
6407c478bd9Sstevel@tonic-gate /* need to be in extended header. */
641c536b1f9SRobert Mustacchi static pid_t comp_pid = 0;
642c536b1f9SRobert Mustacchi
643*28c4d110SJoshua M. Clulow static boolean_t debug_output = B_FALSE;
644*28c4d110SJoshua M. Clulow
6457c478bd9Sstevel@tonic-gate #define _X_DEVMAJOR 0x1
6467c478bd9Sstevel@tonic-gate #define _X_DEVMINOR 0x2
6477c478bd9Sstevel@tonic-gate #define _X_GID 0x4
6487c478bd9Sstevel@tonic-gate #define _X_GNAME 0x8
6497c478bd9Sstevel@tonic-gate #define _X_LINKPATH 0x10
6507c478bd9Sstevel@tonic-gate #define _X_PATH 0x20
6517c478bd9Sstevel@tonic-gate #define _X_SIZE 0x40
6527c478bd9Sstevel@tonic-gate #define _X_UID 0x80
6537c478bd9Sstevel@tonic-gate #define _X_UNAME 0x100
6547c478bd9Sstevel@tonic-gate #define _X_ATIME 0x200
6557c478bd9Sstevel@tonic-gate #define _X_CTIME 0x400
6567c478bd9Sstevel@tonic-gate #define _X_MTIME 0x800
657123523f8Sas158974 #define _X_XHDR 0x1000 /* Bit flag that determines whether 'X' */
658123523f8Sas158974 /* typeflag was followed by 'A' or non 'A' */
659123523f8Sas158974 /* typeflag. */
6607c478bd9Sstevel@tonic-gate #define _X_LAST 0x40000000
6617c478bd9Sstevel@tonic-gate
6627c478bd9Sstevel@tonic-gate #define PID_MAX_DIGITS (10 * sizeof (pid_t) / 4)
6637c478bd9Sstevel@tonic-gate #define TIME_MAX_DIGITS (10 * sizeof (time_t) / 4)
6647c478bd9Sstevel@tonic-gate #define LONG_MAX_DIGITS (10 * sizeof (long) / 4)
6657c478bd9Sstevel@tonic-gate #define ULONGLONG_MAX_DIGITS (10 * sizeof (u_longlong_t) / 4)
6667c478bd9Sstevel@tonic-gate /*
6677c478bd9Sstevel@tonic-gate * UTF_8 encoding requires more space than the current codeset equivalent.
6687c478bd9Sstevel@tonic-gate * Currently a factor of 2-3 would suffice, but it is possible for a factor
6697c478bd9Sstevel@tonic-gate * of 6 to be needed in the future, so for saftey, we use that here.
6707c478bd9Sstevel@tonic-gate */
6717c478bd9Sstevel@tonic-gate #define UTF_8_FACTOR 6
6727c478bd9Sstevel@tonic-gate
6737c478bd9Sstevel@tonic-gate static u_longlong_t xhdr_count = 0;
6747c478bd9Sstevel@tonic-gate static char xhdr_dirname[PRESIZ + 1];
6757c478bd9Sstevel@tonic-gate static char pidchars[PID_MAX_DIGITS + 1];
6767c478bd9Sstevel@tonic-gate static char *tchar = ""; /* null linkpath */
6777c478bd9Sstevel@tonic-gate
6787c478bd9Sstevel@tonic-gate static char local_path[UTF_8_FACTOR * PATH_MAX + 1];
6797c478bd9Sstevel@tonic-gate static char local_linkpath[UTF_8_FACTOR * PATH_MAX + 1];
6807c478bd9Sstevel@tonic-gate static char local_gname[UTF_8_FACTOR * _POSIX_NAME_MAX + 1];
6817c478bd9Sstevel@tonic-gate static char local_uname[UTF_8_FACTOR * _POSIX_NAME_MAX + 1];
6827c478bd9Sstevel@tonic-gate
6837c478bd9Sstevel@tonic-gate /*
6847c478bd9Sstevel@tonic-gate * The following mechanism is provided to allow us to debug tar in complicated
6857c478bd9Sstevel@tonic-gate * situations, like when it is part of a pipe. The idea is that you compile
68636802407SRich Burridge * with -DWAITAROUND defined, and then add the 'D' function modifier to the
68736802407SRich Burridge * target tar invocation, eg. "tar cDf tarfile file". If stderr is available,
6887c478bd9Sstevel@tonic-gate * it will tell you to which pid to attach the debugger; otherwise, use ps to
6897c478bd9Sstevel@tonic-gate * find it. Attach to the process from the debugger, and, *PRESTO*, you are
6907c478bd9Sstevel@tonic-gate * there!
6917c478bd9Sstevel@tonic-gate *
6927c478bd9Sstevel@tonic-gate * Simply assign "waitaround = 0" once you attach to the process, and then
6937c478bd9Sstevel@tonic-gate * proceed from there as usual.
6947c478bd9Sstevel@tonic-gate */
6957c478bd9Sstevel@tonic-gate
6967c478bd9Sstevel@tonic-gate #ifdef WAITAROUND
6977c478bd9Sstevel@tonic-gate int waitaround = 0; /* wait for rendezvous with the debugger */
6987c478bd9Sstevel@tonic-gate #endif
6997c478bd9Sstevel@tonic-gate
70036802407SRich Burridge #define BZIP "/usr/bin/bzip2"
70136802407SRich Burridge #define GZIP "/usr/bin/gzip"
70236802407SRich Burridge #define COMPRESS "/usr/bin/compress"
703506ea5b8SMilan Jurik #define XZ "/usr/bin/xz"
70436802407SRich Burridge #define BZCAT "/usr/bin/bzcat"
70536802407SRich Burridge #define GZCAT "/usr/bin/gzcat"
70636802407SRich Burridge #define ZCAT "/usr/bin/zcat"
707506ea5b8SMilan Jurik #define XZCAT "/usr/bin/xzcat"
708506ea5b8SMilan Jurik #define GSUF 8 /* number of valid 'gzip' sufixes */
709506ea5b8SMilan Jurik #define BSUF 4 /* number of valid 'bzip2' sufixes */
710506ea5b8SMilan Jurik #define XSUF 1 /* number of valid 'xz' suffixes */
71136802407SRich Burridge
71236802407SRich Burridge static char *compress_opt; /* compression type */
71336802407SRich Burridge
71436802407SRich Burridge static char *gsuffix[] = {".gz", "-gz", ".z", "-z", "_z", ".Z",
71536802407SRich Burridge ".tgz", ".taz"};
71636802407SRich Burridge static char *bsuffix[] = {".bz2", ".bz", ".tbz2", ".tbz"};
717506ea5b8SMilan Jurik static char *xsuffix[] = {".xz"};
71836802407SRich Burridge static char *suffix;
71936802407SRich Burridge
7207c478bd9Sstevel@tonic-gate
7217c478bd9Sstevel@tonic-gate int
main(int argc,char * argv[])7227c478bd9Sstevel@tonic-gate main(int argc, char *argv[])
7237c478bd9Sstevel@tonic-gate {
7247c478bd9Sstevel@tonic-gate char *cp;
7257c478bd9Sstevel@tonic-gate char *tmpdirp;
7267c478bd9Sstevel@tonic-gate pid_t thispid;
7277c478bd9Sstevel@tonic-gate
7287c478bd9Sstevel@tonic-gate (void) setlocale(LC_ALL, "");
7297c478bd9Sstevel@tonic-gate #if !defined(TEXT_DOMAIN) /* Should be defined by cc -D */
7307c478bd9Sstevel@tonic-gate #define TEXT_DOMAIN "SYS_TEST" /* Use this only if it weren't */
7317c478bd9Sstevel@tonic-gate #endif
7327c478bd9Sstevel@tonic-gate (void) textdomain(TEXT_DOMAIN);
7337c478bd9Sstevel@tonic-gate if (argc < 2)
7347c478bd9Sstevel@tonic-gate usage();
7357c478bd9Sstevel@tonic-gate
736*28c4d110SJoshua M. Clulow debug_output = should_enable_debug();
737*28c4d110SJoshua M. Clulow
7387c478bd9Sstevel@tonic-gate tfile = NULL;
739da6c28aaSamw if ((myname = strdup(argv[0])) == NULL) {
740da6c28aaSamw (void) fprintf(stderr, gettext(
741da6c28aaSamw "tar: cannot allocate program name\n"));
742da6c28aaSamw exit(1);
743da6c28aaSamw }
7447c478bd9Sstevel@tonic-gate
7453d63ea05Sas145665 if (init_yes() < 0) {
7463d63ea05Sas145665 (void) fprintf(stderr, gettext(ERR_MSG_INIT_YES),
7473d63ea05Sas145665 strerror(errno));
7483d63ea05Sas145665 exit(2);
7493d63ea05Sas145665 }
7503d63ea05Sas145665
7517c478bd9Sstevel@tonic-gate /*
7527c478bd9Sstevel@tonic-gate * For XPG4 compatibility, we must be able to accept the "--"
7537c478bd9Sstevel@tonic-gate * argument normally recognized by getopt; it is used to delimit
7547c478bd9Sstevel@tonic-gate * the end opt the options section, and so can only appear in
7557c478bd9Sstevel@tonic-gate * the position of the first argument. We simply skip it.
7567c478bd9Sstevel@tonic-gate */
7577c478bd9Sstevel@tonic-gate
7587c478bd9Sstevel@tonic-gate if (strcmp(argv[1], "--") == 0) {
7597c478bd9Sstevel@tonic-gate argv++;
7607c478bd9Sstevel@tonic-gate argc--;
7617c478bd9Sstevel@tonic-gate if (argc < 3)
7627c478bd9Sstevel@tonic-gate usage();
7637c478bd9Sstevel@tonic-gate }
7647c478bd9Sstevel@tonic-gate
7657c478bd9Sstevel@tonic-gate argv[argc] = NULL;
7667c478bd9Sstevel@tonic-gate argv++;
7677c478bd9Sstevel@tonic-gate
7687c478bd9Sstevel@tonic-gate /*
7697c478bd9Sstevel@tonic-gate * Set up default values.
7707c478bd9Sstevel@tonic-gate * Search the operand string looking for the first digit or an 'f'.
7717c478bd9Sstevel@tonic-gate * If you find a digit, use the 'archive#' entry in DEF_FILE.
7727c478bd9Sstevel@tonic-gate * If 'f' is given, bypass looking in DEF_FILE altogether.
7737c478bd9Sstevel@tonic-gate * If no digit or 'f' is given, still look in DEF_FILE but use '0'.
7747c478bd9Sstevel@tonic-gate */
7757c478bd9Sstevel@tonic-gate if ((usefile = getenv("TAPE")) == (char *)NULL) {
7767c478bd9Sstevel@tonic-gate for (cp = *argv; *cp; ++cp)
7777c478bd9Sstevel@tonic-gate if (isdigit(*cp) || *cp == 'f')
7787c478bd9Sstevel@tonic-gate break;
7797c478bd9Sstevel@tonic-gate if (*cp != 'f') {
7807c478bd9Sstevel@tonic-gate archive[7] = (*cp)? *cp: '0';
7817c478bd9Sstevel@tonic-gate if (!(defaults_used = defset(archive))) {
7827c478bd9Sstevel@tonic-gate usefile = NULL;
7837c478bd9Sstevel@tonic-gate nblock = 1;
7847c478bd9Sstevel@tonic-gate blocklim = 0;
7857c478bd9Sstevel@tonic-gate NotTape = 0;
7867c478bd9Sstevel@tonic-gate }
7877c478bd9Sstevel@tonic-gate }
7887c478bd9Sstevel@tonic-gate }
7897c478bd9Sstevel@tonic-gate
7907c478bd9Sstevel@tonic-gate for (cp = *argv++; *cp; cp++)
7917c478bd9Sstevel@tonic-gate switch (*cp) {
7927c478bd9Sstevel@tonic-gate #ifdef WAITAROUND
79336802407SRich Burridge case 'D':
7947c478bd9Sstevel@tonic-gate /* rendezvous with the debugger */
7957c478bd9Sstevel@tonic-gate waitaround = 1;
7967c478bd9Sstevel@tonic-gate break;
7977c478bd9Sstevel@tonic-gate #endif
7987c478bd9Sstevel@tonic-gate case 'f':
7997c478bd9Sstevel@tonic-gate assert_string(*argv, gettext(
8007c478bd9Sstevel@tonic-gate "tar: tarfile must be specified with 'f' "
8017c478bd9Sstevel@tonic-gate "function modifier\n"));
8027c478bd9Sstevel@tonic-gate usefile = *argv++;
8037c478bd9Sstevel@tonic-gate break;
8047c478bd9Sstevel@tonic-gate case 'F':
8057c478bd9Sstevel@tonic-gate Fflag++;
8067c478bd9Sstevel@tonic-gate break;
8077c478bd9Sstevel@tonic-gate case 'c':
8087c478bd9Sstevel@tonic-gate cflag++;
8097c478bd9Sstevel@tonic-gate rflag++;
8107c478bd9Sstevel@tonic-gate update = 1;
8117c478bd9Sstevel@tonic-gate break;
8127c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
8137c478bd9Sstevel@tonic-gate case '@':
8147c478bd9Sstevel@tonic-gate atflag++;
8157c478bd9Sstevel@tonic-gate break;
816da6c28aaSamw #endif /* O_XATTR */
817da6c28aaSamw #if defined(_PC_SATTR_ENABLED)
818da6c28aaSamw case '/':
819da6c28aaSamw saflag++;
820da6c28aaSamw break;
821da6c28aaSamw #endif /* _PC_SATTR_ENABLED */
8227c478bd9Sstevel@tonic-gate case 'u':
8237c478bd9Sstevel@tonic-gate uflag++; /* moved code after signals caught */
8247c478bd9Sstevel@tonic-gate rflag++;
8257c478bd9Sstevel@tonic-gate update = 2;
8267c478bd9Sstevel@tonic-gate break;
8277c478bd9Sstevel@tonic-gate case 'r':
8287c478bd9Sstevel@tonic-gate rflag++;
8297c478bd9Sstevel@tonic-gate update = 2;
8307c478bd9Sstevel@tonic-gate break;
8317c478bd9Sstevel@tonic-gate case 'v':
8327c478bd9Sstevel@tonic-gate vflag++;
8337c478bd9Sstevel@tonic-gate break;
8347c478bd9Sstevel@tonic-gate case 'w':
8357c478bd9Sstevel@tonic-gate wflag++;
8367c478bd9Sstevel@tonic-gate break;
8377c478bd9Sstevel@tonic-gate case 'x':
8387c478bd9Sstevel@tonic-gate xflag++;
8397c478bd9Sstevel@tonic-gate break;
8407c478bd9Sstevel@tonic-gate case 'X':
8417c478bd9Sstevel@tonic-gate assert_string(*argv, gettext(
8427c478bd9Sstevel@tonic-gate "tar: exclude file must be specified with 'X' "
8437c478bd9Sstevel@tonic-gate "function modifier\n"));
8447c478bd9Sstevel@tonic-gate Xflag = 1;
8457c478bd9Sstevel@tonic-gate Xfile = *argv++;
8467c478bd9Sstevel@tonic-gate build_table(exclude_tbl, Xfile);
8477c478bd9Sstevel@tonic-gate break;
8487c478bd9Sstevel@tonic-gate case 't':
8497c478bd9Sstevel@tonic-gate tflag++;
8507c478bd9Sstevel@tonic-gate break;
8517c478bd9Sstevel@tonic-gate case 'm':
8527c478bd9Sstevel@tonic-gate mflag++;
8537c478bd9Sstevel@tonic-gate break;
8547c478bd9Sstevel@tonic-gate case 'p':
8557c478bd9Sstevel@tonic-gate pflag++;
8567c478bd9Sstevel@tonic-gate break;
8577c478bd9Sstevel@tonic-gate case 'D':
8587c478bd9Sstevel@tonic-gate Dflag++;
8597c478bd9Sstevel@tonic-gate break;
8607c478bd9Sstevel@tonic-gate case '-':
8617c478bd9Sstevel@tonic-gate /* ignore this silently */
8627c478bd9Sstevel@tonic-gate break;
8637c478bd9Sstevel@tonic-gate case '0': /* numeric entries used only for defaults */
8647c478bd9Sstevel@tonic-gate case '1':
8657c478bd9Sstevel@tonic-gate case '2':
8667c478bd9Sstevel@tonic-gate case '3':
8677c478bd9Sstevel@tonic-gate case '4':
8687c478bd9Sstevel@tonic-gate case '5':
8697c478bd9Sstevel@tonic-gate case '6':
8707c478bd9Sstevel@tonic-gate case '7':
8717c478bd9Sstevel@tonic-gate break;
8727c478bd9Sstevel@tonic-gate case 'b':
8737c478bd9Sstevel@tonic-gate assert_string(*argv, gettext(
8747c478bd9Sstevel@tonic-gate "tar: blocking factor must be specified "
8757c478bd9Sstevel@tonic-gate "with 'b' function modifier\n"));
8767c478bd9Sstevel@tonic-gate bflag++;
8777c478bd9Sstevel@tonic-gate nblock = bcheck(*argv++);
8787c478bd9Sstevel@tonic-gate break;
8797c478bd9Sstevel@tonic-gate case 'n': /* not a magtape (instead of 'k') */
8807c478bd9Sstevel@tonic-gate NotTape++; /* assume non-magtape */
8817c478bd9Sstevel@tonic-gate break;
8827c478bd9Sstevel@tonic-gate case 'l':
8837c478bd9Sstevel@tonic-gate linkerrok++;
8847c478bd9Sstevel@tonic-gate break;
8857c478bd9Sstevel@tonic-gate case 'e':
8867c478bd9Sstevel@tonic-gate errflag++;
8877c478bd9Sstevel@tonic-gate case 'o':
8887c478bd9Sstevel@tonic-gate oflag++;
8897c478bd9Sstevel@tonic-gate break;
8907c478bd9Sstevel@tonic-gate case 'h':
8917c478bd9Sstevel@tonic-gate hflag++;
8927c478bd9Sstevel@tonic-gate break;
8937c478bd9Sstevel@tonic-gate case 'i':
8947c478bd9Sstevel@tonic-gate iflag++;
8957c478bd9Sstevel@tonic-gate break;
8967c478bd9Sstevel@tonic-gate case 'B':
8977c478bd9Sstevel@tonic-gate Bflag++;
8987c478bd9Sstevel@tonic-gate break;
8997c478bd9Sstevel@tonic-gate case 'P':
9007c478bd9Sstevel@tonic-gate Pflag++;
9017c478bd9Sstevel@tonic-gate break;
9027c478bd9Sstevel@tonic-gate case 'E':
9037c478bd9Sstevel@tonic-gate Eflag++;
9047c478bd9Sstevel@tonic-gate Pflag++; /* Only POSIX archive made */
9057c478bd9Sstevel@tonic-gate break;
90645916cd2Sjpk case 'T':
90745916cd2Sjpk Tflag++; /* Handle Trusted Extensions attrs */
90845916cd2Sjpk pflag++; /* also set flag for ACL */
90945916cd2Sjpk break;
91036802407SRich Burridge case 'j': /* compession "bzip2" */
911506ea5b8SMilan Jurik jflag = 1;
91236802407SRich Burridge break;
91336802407SRich Burridge case 'z': /* compression "gzip" */
914506ea5b8SMilan Jurik zflag = 1;
91536802407SRich Burridge break;
91636802407SRich Burridge case 'Z': /* compression "compress" */
917506ea5b8SMilan Jurik Zflag = 1;
918506ea5b8SMilan Jurik break;
919506ea5b8SMilan Jurik case 'J': /* compression "xz" */
920506ea5b8SMilan Jurik Jflag = 1;
92136802407SRich Burridge break;
922aa7166bdSMilan Jurik case 'a':
923aa7166bdSMilan Jurik aflag = 1; /* autocompression */
924aa7166bdSMilan Jurik break;
9257c478bd9Sstevel@tonic-gate default:
9267c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
9277c478bd9Sstevel@tonic-gate "tar: %c: unknown function modifier\n"), *cp);
9287c478bd9Sstevel@tonic-gate usage();
9297c478bd9Sstevel@tonic-gate }
9307c478bd9Sstevel@tonic-gate
9317c478bd9Sstevel@tonic-gate if (!rflag && !xflag && !tflag)
9327c478bd9Sstevel@tonic-gate usage();
9337c478bd9Sstevel@tonic-gate if ((rflag && xflag) || (xflag && tflag) || (rflag && tflag)) {
9347c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
9357c478bd9Sstevel@tonic-gate "tar: specify only one of [ctxru].\n"));
9367c478bd9Sstevel@tonic-gate usage();
9377c478bd9Sstevel@tonic-gate }
93836802407SRich Burridge if (cflag) {
939aa7166bdSMilan Jurik if ((jflag + zflag + Zflag + Jflag + aflag) > 1) {
94036802407SRich Burridge (void) fprintf(stderr, gettext(
941aa7166bdSMilan Jurik "tar: specify only one of [ajJzZ] to "
94236802407SRich Burridge "create a compressed file.\n"));
94336802407SRich Burridge usage();
94436802407SRich Burridge }
94536802407SRich Burridge }
94645916cd2Sjpk /* Trusted Extensions attribute handling */
94745916cd2Sjpk if (Tflag && ((getzoneid() != GLOBAL_ZONEID) ||
94845916cd2Sjpk !is_system_labeled())) {
94945916cd2Sjpk (void) fprintf(stderr, gettext(
95045916cd2Sjpk "tar: the 'T' option is only available with "
95145916cd2Sjpk "Trusted Extensions\nand must be run from "
95245916cd2Sjpk "the global zone.\n"));
95345916cd2Sjpk usage();
95445916cd2Sjpk }
955cc22b130SRich Burridge if (cflag && *argv == NULL)
9567c478bd9Sstevel@tonic-gate fatal(gettext("Missing filenames"));
9577c478bd9Sstevel@tonic-gate if (usefile == NULL)
9587c478bd9Sstevel@tonic-gate fatal(gettext("device argument required"));
9597c478bd9Sstevel@tonic-gate
9607c478bd9Sstevel@tonic-gate /* alloc a buffer of the right size */
9617c478bd9Sstevel@tonic-gate if ((tbuf = (union hblock *)
9627c478bd9Sstevel@tonic-gate calloc(sizeof (union hblock) * nblock, sizeof (char))) ==
9637c478bd9Sstevel@tonic-gate (union hblock *)NULL) {
9647c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
9657c478bd9Sstevel@tonic-gate "tar: cannot allocate physio buffer\n"));
9667c478bd9Sstevel@tonic-gate exit(1);
9677c478bd9Sstevel@tonic-gate }
9687c478bd9Sstevel@tonic-gate
9697c478bd9Sstevel@tonic-gate if ((xrec_ptr = malloc(xrec_size)) == NULL) {
9707c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
9717c478bd9Sstevel@tonic-gate "tar: cannot allocate extended header buffer\n"));
9727c478bd9Sstevel@tonic-gate exit(1);
9737c478bd9Sstevel@tonic-gate }
9747c478bd9Sstevel@tonic-gate
9757c478bd9Sstevel@tonic-gate #ifdef WAITAROUND
9767c478bd9Sstevel@tonic-gate if (waitaround) {
9777c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("Rendezvous with tar on pid"
9787c478bd9Sstevel@tonic-gate " %d\n"), getpid());
9797c478bd9Sstevel@tonic-gate
9807c478bd9Sstevel@tonic-gate while (waitaround) {
9817c478bd9Sstevel@tonic-gate (void) sleep(10);
9827c478bd9Sstevel@tonic-gate }
9837c478bd9Sstevel@tonic-gate }
9847c478bd9Sstevel@tonic-gate #endif
9857c478bd9Sstevel@tonic-gate
9867c478bd9Sstevel@tonic-gate thispid = getpid();
9877c478bd9Sstevel@tonic-gate (void) sprintf(pidchars, "%ld", thispid);
9887c478bd9Sstevel@tonic-gate thispid = strlen(pidchars);
9897c478bd9Sstevel@tonic-gate
9907c478bd9Sstevel@tonic-gate if ((tmpdirp = getenv("TMPDIR")) == (char *)NULL)
9917c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_dirname, "/tmp");
9927c478bd9Sstevel@tonic-gate else {
9937c478bd9Sstevel@tonic-gate /*
9947c478bd9Sstevel@tonic-gate * Make sure that dir is no longer than what can
9957c478bd9Sstevel@tonic-gate * fit in the prefix part of the header.
9967c478bd9Sstevel@tonic-gate */
9977c478bd9Sstevel@tonic-gate if (strlen(tmpdirp) > (size_t)(PRESIZ - thispid - 12)) {
9987c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_dirname, "/tmp");
9997c478bd9Sstevel@tonic-gate if ((vflag > 0) && (Eflag > 0))
10007c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
10017c478bd9Sstevel@tonic-gate "Ignoring TMPDIR\n"));
10027c478bd9Sstevel@tonic-gate } else
10037c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_dirname, tmpdirp);
10047c478bd9Sstevel@tonic-gate }
10057c478bd9Sstevel@tonic-gate (void) strcat(xhdr_dirname, "/PaxHeaders.");
10067c478bd9Sstevel@tonic-gate (void) strcat(xhdr_dirname, pidchars);
10077c478bd9Sstevel@tonic-gate
10087c478bd9Sstevel@tonic-gate if (rflag) {
100936802407SRich Burridge if (cflag && usefile != NULL) {
101036802407SRich Burridge /* Set the compression type */
1011aa7166bdSMilan Jurik if (aflag)
1012aa7166bdSMilan Jurik detect_compress();
1013aa7166bdSMilan Jurik
101436802407SRich Burridge if (jflag) {
101536802407SRich Burridge compress_opt = compress_malloc(strlen(BZIP)
101636802407SRich Burridge + 1);
101736802407SRich Burridge (void) strcpy(compress_opt, BZIP);
101836802407SRich Burridge } else if (zflag) {
101936802407SRich Burridge compress_opt = compress_malloc(strlen(GZIP)
102036802407SRich Burridge + 1);
102136802407SRich Burridge (void) strcpy(compress_opt, GZIP);
102236802407SRich Burridge } else if (Zflag) {
102336802407SRich Burridge compress_opt =
102436802407SRich Burridge compress_malloc(strlen(COMPRESS) + 1);
102536802407SRich Burridge (void) strcpy(compress_opt, COMPRESS);
1026506ea5b8SMilan Jurik } else if (Jflag) {
1027506ea5b8SMilan Jurik compress_opt = compress_malloc(strlen(XZ) + 1);
1028506ea5b8SMilan Jurik (void) strcpy(compress_opt, XZ);
102936802407SRich Burridge }
103036802407SRich Burridge } else {
103136802407SRich Burridge /*
103236802407SRich Burridge * Decompress if the file is compressed for
103336802407SRich Burridge * an update or replace.
103436802407SRich Burridge */
103536802407SRich Burridge if (strcmp(usefile, "-") != 0) {
103636802407SRich Burridge check_compression();
103736802407SRich Burridge if (compress_opt != NULL) {
103836802407SRich Burridge decompress_file();
103936802407SRich Burridge }
104036802407SRich Burridge }
104136802407SRich Burridge }
104236802407SRich Burridge
10437c478bd9Sstevel@tonic-gate if (cflag && tfile != NULL)
10447c478bd9Sstevel@tonic-gate usage();
10457c478bd9Sstevel@tonic-gate if (signal(SIGINT, SIG_IGN) != SIG_IGN)
10467c478bd9Sstevel@tonic-gate (void) signal(SIGINT, onintr);
10477c478bd9Sstevel@tonic-gate if (signal(SIGHUP, SIG_IGN) != SIG_IGN)
10487c478bd9Sstevel@tonic-gate (void) signal(SIGHUP, onhup);
10497c478bd9Sstevel@tonic-gate if (signal(SIGQUIT, SIG_IGN) != SIG_IGN)
10507c478bd9Sstevel@tonic-gate (void) signal(SIGQUIT, onquit);
10517c478bd9Sstevel@tonic-gate if (uflag) {
10527c478bd9Sstevel@tonic-gate int tnum;
105331a2de35SRich Burridge struct stat sbuf;
105431a2de35SRich Burridge
105531a2de35SRich Burridge tmpdir = getenv("TMPDIR");
105631a2de35SRich Burridge /*
105731a2de35SRich Burridge * If the name is invalid or this isn't a directory,
105831a2de35SRich Burridge * or the directory is not writable, then reset to
105931a2de35SRich Burridge * a default temporary directory.
106031a2de35SRich Burridge */
106131a2de35SRich Burridge if (tmpdir == NULL || *tmpdir == '\0' ||
106231a2de35SRich Burridge (strlen(tmpdir) + strlen(tmp_suffix)) > PATH_MAX) {
106331a2de35SRich Burridge tmpdir = "/tmp";
106431a2de35SRich Burridge } else if (stat(tmpdir, &sbuf) < 0 ||
106531a2de35SRich Burridge (sbuf.st_mode & S_IFMT) != S_IFDIR ||
106631a2de35SRich Burridge (sbuf.st_mode & S_IWRITE) == 0) {
106731a2de35SRich Burridge tmpdir = "/tmp";
106831a2de35SRich Burridge }
106931a2de35SRich Burridge
107031a2de35SRich Burridge if ((tname = calloc(1, strlen(tmpdir) +
107131a2de35SRich Burridge strlen(tmp_suffix) + 1)) == NULL) {
107231a2de35SRich Burridge vperror(1, gettext("tar: out of memory, "
107331a2de35SRich Burridge "cannot create temporary file\n"));
107431a2de35SRich Burridge }
107531a2de35SRich Burridge (void) strcpy(tname, tmpdir);
107631a2de35SRich Burridge (void) strcat(tname, tmp_suffix);
107731a2de35SRich Burridge
10787c478bd9Sstevel@tonic-gate if ((tnum = mkstemp(tname)) == -1)
10797c478bd9Sstevel@tonic-gate vperror(1, "%s", tname);
10807c478bd9Sstevel@tonic-gate if ((tfile = fdopen(tnum, "w")) == NULL)
10817c478bd9Sstevel@tonic-gate vperror(1, "%s", tname);
10827c478bd9Sstevel@tonic-gate }
10837c478bd9Sstevel@tonic-gate if (strcmp(usefile, "-") == 0) {
10847c478bd9Sstevel@tonic-gate if (cflag == 0)
10857c478bd9Sstevel@tonic-gate fatal(gettext(
10867c478bd9Sstevel@tonic-gate "can only create standard output archives."));
10877c478bd9Sstevel@tonic-gate vfile = stderr;
10887c478bd9Sstevel@tonic-gate mt = dup(1);
10897c478bd9Sstevel@tonic-gate ++bflag;
10907c478bd9Sstevel@tonic-gate } else {
10917c478bd9Sstevel@tonic-gate if (cflag)
10927c478bd9Sstevel@tonic-gate mt = open(usefile,
10937c478bd9Sstevel@tonic-gate O_RDWR|O_CREAT|O_TRUNC, 0666);
10947c478bd9Sstevel@tonic-gate else
10957c478bd9Sstevel@tonic-gate mt = open(usefile, O_RDWR);
10967c478bd9Sstevel@tonic-gate
10977c478bd9Sstevel@tonic-gate if (mt < 0) {
10987c478bd9Sstevel@tonic-gate if (cflag == 0 || (mt = creat(usefile, 0666))
10997c478bd9Sstevel@tonic-gate < 0)
11007c478bd9Sstevel@tonic-gate vperror(1, "%s", usefile);
11017c478bd9Sstevel@tonic-gate }
11027c478bd9Sstevel@tonic-gate }
11037c478bd9Sstevel@tonic-gate /* Get inode and device number of output file */
11047c478bd9Sstevel@tonic-gate (void) fstat(mt, &stbuf);
11057c478bd9Sstevel@tonic-gate mt_ino = stbuf.st_ino;
11067c478bd9Sstevel@tonic-gate mt_dev = stbuf.st_dev;
11077c478bd9Sstevel@tonic-gate mt_devtype = stbuf.st_mode & S_IFMT;
11087c478bd9Sstevel@tonic-gate NotTape = !istape(mt, mt_devtype);
11097c478bd9Sstevel@tonic-gate
11107c478bd9Sstevel@tonic-gate if (rflag && !cflag && (mt_devtype == S_IFIFO))
11117c478bd9Sstevel@tonic-gate fatal(gettext("cannot append to pipe or FIFO."));
11127c478bd9Sstevel@tonic-gate
11137c478bd9Sstevel@tonic-gate if (Aflag && vflag)
11147c478bd9Sstevel@tonic-gate (void) printf(
11157c478bd9Sstevel@tonic-gate gettext("Suppressing absolute pathnames\n"));
1116c536b1f9SRobert Mustacchi if (cflag && compress_opt != NULL)
1117c536b1f9SRobert Mustacchi comp_pid = compress_file();
11187c478bd9Sstevel@tonic-gate dorep(argv);
111936802407SRich Burridge if (rflag && !cflag && (compress_opt != NULL))
112036802407SRich Burridge compress_back();
11217c478bd9Sstevel@tonic-gate } else if (xflag || tflag) {
11227c478bd9Sstevel@tonic-gate /*
11237c478bd9Sstevel@tonic-gate * for each argument, check to see if there is a "-I file" pair.
11247c478bd9Sstevel@tonic-gate * if so, move the 3rd argument into "-I"'s place, build_table()
11257c478bd9Sstevel@tonic-gate * using "file"'s name and increment argc one (the second
11267c478bd9Sstevel@tonic-gate * increment appears in the for loop) which removes the two
11277c478bd9Sstevel@tonic-gate * args "-I" and "file" from the argument vector.
11287c478bd9Sstevel@tonic-gate */
11297c478bd9Sstevel@tonic-gate for (argc = 0; argv[argc]; argc++) {
11307c478bd9Sstevel@tonic-gate if (strcmp(argv[argc], "-I") == 0) {
11317c478bd9Sstevel@tonic-gate if (!argv[argc+1]) {
11327c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
11337c478bd9Sstevel@tonic-gate "tar: missing argument for -I flag\n"));
11347c478bd9Sstevel@tonic-gate done(2);
11357c478bd9Sstevel@tonic-gate } else {
11367c478bd9Sstevel@tonic-gate Iflag = 1;
11377c478bd9Sstevel@tonic-gate argv[argc] = argv[argc+2];
11387c478bd9Sstevel@tonic-gate build_table(include_tbl, argv[++argc]);
11397c478bd9Sstevel@tonic-gate }
1140c92bf99eSJoshua M. Clulow } else if (strcmp(argv[argc], "-C") == 0) {
1141c92bf99eSJoshua M. Clulow if (!argv[argc+1]) {
1142c92bf99eSJoshua M. Clulow (void) fprintf(stderr, gettext("tar: "
1143c92bf99eSJoshua M. Clulow "missing argument for -C flag\n"));
1144c92bf99eSJoshua M. Clulow done(2);
1145c92bf99eSJoshua M. Clulow } else if (xtract_chdir != NULL) {
1146c92bf99eSJoshua M. Clulow (void) fprintf(stderr, gettext("tar: "
1147c92bf99eSJoshua M. Clulow "extract should have only one -C "
1148c92bf99eSJoshua M. Clulow "flag\n"));
1149c92bf99eSJoshua M. Clulow done(2);
1150c92bf99eSJoshua M. Clulow } else {
1151c92bf99eSJoshua M. Clulow argv[argc] = argv[argc+2];
1152c92bf99eSJoshua M. Clulow xtract_chdir = argv[++argc];
1153c92bf99eSJoshua M. Clulow }
11547c478bd9Sstevel@tonic-gate }
11557c478bd9Sstevel@tonic-gate }
11567c478bd9Sstevel@tonic-gate if (strcmp(usefile, "-") == 0) {
11577c478bd9Sstevel@tonic-gate mt = dup(0);
11587c478bd9Sstevel@tonic-gate ++bflag;
11597c478bd9Sstevel@tonic-gate /* try to recover from short reads when reading stdin */
11607c478bd9Sstevel@tonic-gate ++Bflag;
11617c478bd9Sstevel@tonic-gate } else if ((mt = open(usefile, 0)) < 0)
11627c478bd9Sstevel@tonic-gate vperror(1, "%s", usefile);
11637c478bd9Sstevel@tonic-gate
116436802407SRich Burridge /* Decompress if the file is compressed */
116536802407SRich Burridge
116636802407SRich Burridge if (strcmp(usefile, "-") != 0) {
116736802407SRich Burridge check_compression();
1168c536b1f9SRobert Mustacchi if (compress_opt != NULL)
1169c536b1f9SRobert Mustacchi comp_pid = uncompress_file();
117036802407SRich Burridge }
11717c478bd9Sstevel@tonic-gate if (xflag) {
1172c92bf99eSJoshua M. Clulow if (xtract_chdir != NULL) {
1173c92bf99eSJoshua M. Clulow if (tar_chdir(xtract_chdir) < 0) {
1174c92bf99eSJoshua M. Clulow vperror(1, gettext("can't change "
1175c92bf99eSJoshua M. Clulow "directories to %s"), xtract_chdir);
1176c92bf99eSJoshua M. Clulow }
1177c92bf99eSJoshua M. Clulow }
11787c478bd9Sstevel@tonic-gate if (Aflag && vflag)
1179eace40a5Sceastha (void) printf(gettext(
1180eace40a5Sceastha "Suppressing absolute pathnames.\n"));
11817c478bd9Sstevel@tonic-gate
11827c478bd9Sstevel@tonic-gate doxtract(argv);
11837c478bd9Sstevel@tonic-gate } else if (tflag)
11847c478bd9Sstevel@tonic-gate dotable(argv);
11857c478bd9Sstevel@tonic-gate }
11867c478bd9Sstevel@tonic-gate else
11877c478bd9Sstevel@tonic-gate usage();
11887c478bd9Sstevel@tonic-gate
11897c478bd9Sstevel@tonic-gate done(Errflg);
11907c478bd9Sstevel@tonic-gate
11917c478bd9Sstevel@tonic-gate /* Not reached: keep compiler quiet */
11927c478bd9Sstevel@tonic-gate return (1);
11937c478bd9Sstevel@tonic-gate }
11947c478bd9Sstevel@tonic-gate
1195*28c4d110SJoshua M. Clulow static boolean_t
should_enable_debug(void)1196*28c4d110SJoshua M. Clulow should_enable_debug(void)
1197*28c4d110SJoshua M. Clulow {
1198*28c4d110SJoshua M. Clulow const char *val;
1199*28c4d110SJoshua M. Clulow const char *truth[] = {
1200*28c4d110SJoshua M. Clulow "true",
1201*28c4d110SJoshua M. Clulow "1",
1202*28c4d110SJoshua M. Clulow "yes",
1203*28c4d110SJoshua M. Clulow "y",
1204*28c4d110SJoshua M. Clulow "please",
1205*28c4d110SJoshua M. Clulow NULL
1206*28c4d110SJoshua M. Clulow };
1207*28c4d110SJoshua M. Clulow unsigned int i;
1208*28c4d110SJoshua M. Clulow
1209*28c4d110SJoshua M. Clulow if ((val = getenv("DEBUG_TAR")) == NULL) {
1210*28c4d110SJoshua M. Clulow return (B_FALSE);
1211*28c4d110SJoshua M. Clulow }
1212*28c4d110SJoshua M. Clulow
1213*28c4d110SJoshua M. Clulow for (i = 0; truth[i] != NULL; i++) {
1214*28c4d110SJoshua M. Clulow if (strcmp(val, truth[i]) == 0) {
1215*28c4d110SJoshua M. Clulow return (B_TRUE);
1216*28c4d110SJoshua M. Clulow }
1217*28c4d110SJoshua M. Clulow }
1218*28c4d110SJoshua M. Clulow
1219*28c4d110SJoshua M. Clulow return (B_FALSE);
1220*28c4d110SJoshua M. Clulow }
1221*28c4d110SJoshua M. Clulow
1222*28c4d110SJoshua M. Clulow /*PRINTFLIKE1*/
1223*28c4d110SJoshua M. Clulow static void
dlog(const char * format,...)1224*28c4d110SJoshua M. Clulow dlog(const char *format, ...)
1225*28c4d110SJoshua M. Clulow {
1226*28c4d110SJoshua M. Clulow va_list ap;
1227*28c4d110SJoshua M. Clulow
1228*28c4d110SJoshua M. Clulow if (!debug_output) {
1229*28c4d110SJoshua M. Clulow return;
1230*28c4d110SJoshua M. Clulow }
1231*28c4d110SJoshua M. Clulow
1232*28c4d110SJoshua M. Clulow va_start(ap, format);
1233*28c4d110SJoshua M. Clulow (void) fprintf(stderr, "tar: DEBUG: ");
1234*28c4d110SJoshua M. Clulow (void) vfprintf(stderr, format, ap);
1235*28c4d110SJoshua M. Clulow va_end(ap);
1236*28c4d110SJoshua M. Clulow }
1237*28c4d110SJoshua M. Clulow
12387c478bd9Sstevel@tonic-gate static void
usage(void)12397c478bd9Sstevel@tonic-gate usage(void)
12407c478bd9Sstevel@tonic-gate {
12417c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
12427c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
1243da6c28aaSamw #if defined(_PC_SATTR_ENABLED)
1244cc22b130SRich Burridge "Usage: tar {c|r|t|u|x}[BDeEFhilmnopPTvw@/[0-7]][bf][X...] "
1245da6c28aaSamw #else
1246cc22b130SRich Burridge "Usage: tar {c|r|t|u|x}[BDeEFhilmnopPTvw@[0-7]][bf][X...] "
1247da6c28aaSamw #endif /* _PC_SATTR_ENABLED */
12487c478bd9Sstevel@tonic-gate #else
1249cc22b130SRich Burridge "Usage: tar {c|r|t|u|x}[BDeEFhilmnopPTvw[0-7]][bf][X...] "
1250da6c28aaSamw #endif /* O_XATTR */
1251506ea5b8SMilan Jurik "[j|J|z|Z] "
12527c478bd9Sstevel@tonic-gate "[blocksize] [tarfile] [size] [exclude-file...] "
12537c478bd9Sstevel@tonic-gate "{file | -I include-file | -C directory file}...\n"));
12547c478bd9Sstevel@tonic-gate done(1);
12557c478bd9Sstevel@tonic-gate }
12567c478bd9Sstevel@tonic-gate
12577c478bd9Sstevel@tonic-gate /*
12587c478bd9Sstevel@tonic-gate * dorep - do "replacements"
12597c478bd9Sstevel@tonic-gate *
12607c478bd9Sstevel@tonic-gate * Dorep is responsible for creating ('c'), appending ('r')
12617c478bd9Sstevel@tonic-gate * and updating ('u');
12627c478bd9Sstevel@tonic-gate */
12637c478bd9Sstevel@tonic-gate
12647c478bd9Sstevel@tonic-gate static void
dorep(char * argv[])12657c478bd9Sstevel@tonic-gate dorep(char *argv[])
12667c478bd9Sstevel@tonic-gate {
12677c478bd9Sstevel@tonic-gate char *cp, *cp2, *p;
12687c478bd9Sstevel@tonic-gate char wdir[PATH_MAX+2], tempdir[PATH_MAX+2], *parent;
12697c478bd9Sstevel@tonic-gate char file[PATH_MAX*2], origdir[PATH_MAX+1];
12707c478bd9Sstevel@tonic-gate FILE *fp = (FILE *)NULL;
12717c478bd9Sstevel@tonic-gate int archtype;
1272123523f8Sas158974 int ret;
12737c478bd9Sstevel@tonic-gate
12747c478bd9Sstevel@tonic-gate
12757c478bd9Sstevel@tonic-gate if (!cflag) {
12767c478bd9Sstevel@tonic-gate xhdr_flgs = 0;
12777c478bd9Sstevel@tonic-gate getdir(); /* read header for next file */
12787c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) {
12797c478bd9Sstevel@tonic-gate if (!Eflag)
12807c478bd9Sstevel@tonic-gate fatal(gettext("Archive contains extended"
12817c478bd9Sstevel@tonic-gate " header. -E flag required.\n"));
1282123523f8Sas158974 ret = get_xdata(); /* Get extended header items */
12837c478bd9Sstevel@tonic-gate /* and regular header */
12847c478bd9Sstevel@tonic-gate } else {
12857c478bd9Sstevel@tonic-gate if (Eflag)
12867c478bd9Sstevel@tonic-gate fatal(gettext("Archive contains no extended"
12877c478bd9Sstevel@tonic-gate " header. -E flag not allowed.\n"));
12887c478bd9Sstevel@tonic-gate }
12897c478bd9Sstevel@tonic-gate while (!endtape()) { /* changed from a do while */
1290123523f8Sas158974 setbytes_to_skip(&stbuf, ret);
12917c478bd9Sstevel@tonic-gate passtape(); /* skip the file data */
12927c478bd9Sstevel@tonic-gate if (term)
12937c478bd9Sstevel@tonic-gate done(Errflg); /* received signal to stop */
12947c478bd9Sstevel@tonic-gate xhdr_flgs = 0;
12957c478bd9Sstevel@tonic-gate getdir();
12967c478bd9Sstevel@tonic-gate if (Xhdrflag > 0)
1297123523f8Sas158974 ret = get_xdata();
1298123523f8Sas158974 }
1299123523f8Sas158974 if (ret == 0) {
1300123523f8Sas158974 if ((dblock.dbuf.typeflag != 'A') &&
1301123523f8Sas158974 (xhdr_flgs != 0)) {
1302123523f8Sas158974 load_info_from_xtarhdr(xhdr_flgs,
1303123523f8Sas158974 &Xtarhdr);
1304123523f8Sas158974 xhdr_flgs |= _X_XHDR;
1305123523f8Sas158974 }
13067c478bd9Sstevel@tonic-gate }
13077c478bd9Sstevel@tonic-gate backtape(); /* was called by endtape */
13087c478bd9Sstevel@tonic-gate if (tfile != NULL) {
130931a2de35SRich Burridge /*
131031a2de35SRich Burridge * Buffer size is calculated to be the size of the
131131a2de35SRich Burridge * tmpdir string, plus 6 times the size of the tname
131231a2de35SRich Burridge * string, plus a value that is known to be greater
131331a2de35SRich Burridge * than the command pipeline string.
131431a2de35SRich Burridge */
131531a2de35SRich Burridge int buflen = strlen(tmpdir) + (6 * strlen(tname)) + 100;
131631a2de35SRich Burridge char *buf;
13177c478bd9Sstevel@tonic-gate
131831a2de35SRich Burridge if ((buf = (char *)calloc(1, buflen)) == NULL) {
131931a2de35SRich Burridge vperror(1, gettext("tar: out of memory, "
132031a2de35SRich Burridge "cannot create sort command file\n"));
132131a2de35SRich Burridge }
132231a2de35SRich Burridge
132331a2de35SRich Burridge (void) snprintf(buf, buflen, "env 'TMPDIR=%s' "
132431a2de35SRich Burridge "sort +0 -1 +1nr %s -o %s; awk '$1 "
13257c478bd9Sstevel@tonic-gate "!= prev {print; prev=$1}' %s >%sX;mv %sX %s",
132631a2de35SRich Burridge tmpdir, tname, tname, tname, tname, tname, tname);
13277c478bd9Sstevel@tonic-gate (void) fflush(tfile);
13287c478bd9Sstevel@tonic-gate (void) system(buf);
132931a2de35SRich Burridge free(buf);
13307c478bd9Sstevel@tonic-gate (void) freopen(tname, "r", tfile);
13317c478bd9Sstevel@tonic-gate (void) fstat(fileno(tfile), &stbuf);
13327c478bd9Sstevel@tonic-gate high = stbuf.st_size;
13337c478bd9Sstevel@tonic-gate }
13347c478bd9Sstevel@tonic-gate }
13357c478bd9Sstevel@tonic-gate
13367c478bd9Sstevel@tonic-gate dumping = 1;
13377c478bd9Sstevel@tonic-gate if (mulvol) { /* SP-1 */
13387c478bd9Sstevel@tonic-gate if (nblock && (blocklim%nblock) != 0)
13397c478bd9Sstevel@tonic-gate fatal(gettext(
13407c478bd9Sstevel@tonic-gate "Volume size not a multiple of block size."));
13417c478bd9Sstevel@tonic-gate blocklim -= 2; /* for trailer records */
13427c478bd9Sstevel@tonic-gate if (vflag)
13437c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("Volume ends at %"
13447c478bd9Sstevel@tonic-gate FMT_blkcnt_t "K, blocking factor = %dK\n"),
13457c478bd9Sstevel@tonic-gate K((blocklim - 1)), K(nblock));
13467c478bd9Sstevel@tonic-gate }
13477c478bd9Sstevel@tonic-gate
13487c478bd9Sstevel@tonic-gate /*
13497c478bd9Sstevel@tonic-gate * Save the original directory before it gets
13507c478bd9Sstevel@tonic-gate * changed.
13517c478bd9Sstevel@tonic-gate */
13527c478bd9Sstevel@tonic-gate if (getcwd(origdir, (PATH_MAX+1)) == NULL) {
13537c478bd9Sstevel@tonic-gate vperror(0, gettext("A parent directory cannot be read"));
13547c478bd9Sstevel@tonic-gate exit(1);
13557c478bd9Sstevel@tonic-gate }
13567c478bd9Sstevel@tonic-gate
13577c478bd9Sstevel@tonic-gate (void) strcpy(wdir, origdir);
13587c478bd9Sstevel@tonic-gate
1359cc22b130SRich Burridge while ((*argv || fp) && !term) {
13607c478bd9Sstevel@tonic-gate if (fp || (strcmp(*argv, "-I") == 0)) {
13617c478bd9Sstevel@tonic-gate if (fp == NULL) {
13627c478bd9Sstevel@tonic-gate if (*++argv == NULL)
13637c478bd9Sstevel@tonic-gate fatal(gettext(
13647c478bd9Sstevel@tonic-gate "missing file name for -I flag."));
13657c478bd9Sstevel@tonic-gate else if ((fp = fopen(*argv++, "r")) == NULL)
13667c478bd9Sstevel@tonic-gate vperror(0, "%s", argv[-1]);
13677c478bd9Sstevel@tonic-gate continue;
13687c478bd9Sstevel@tonic-gate } else if ((fgets(file, PATH_MAX-1, fp)) == NULL) {
13697c478bd9Sstevel@tonic-gate (void) fclose(fp);
13707c478bd9Sstevel@tonic-gate fp = NULL;
13717c478bd9Sstevel@tonic-gate continue;
13727c478bd9Sstevel@tonic-gate } else {
13737c478bd9Sstevel@tonic-gate cp = cp2 = file;
13747c478bd9Sstevel@tonic-gate if ((p = strchr(cp2, '\n')))
13757c478bd9Sstevel@tonic-gate *p = 0;
13767c478bd9Sstevel@tonic-gate }
13777c478bd9Sstevel@tonic-gate } else if ((strcmp(*argv, "-C") == 0) && argv[1]) {
1378b25dbf38SRich Burridge if (tar_chdir(*++argv) < 0)
13797c478bd9Sstevel@tonic-gate vperror(0, gettext(
13807c478bd9Sstevel@tonic-gate "can't change directories to %s"), *argv);
13817c478bd9Sstevel@tonic-gate else
13827c478bd9Sstevel@tonic-gate (void) getcwd(wdir, (sizeof (wdir)));
13837c478bd9Sstevel@tonic-gate argv++;
13847c478bd9Sstevel@tonic-gate continue;
13857c478bd9Sstevel@tonic-gate } else
13867c478bd9Sstevel@tonic-gate cp = cp2 = strcpy(file, *argv++);
13877c478bd9Sstevel@tonic-gate
13887c478bd9Sstevel@tonic-gate /*
13897c478bd9Sstevel@tonic-gate * point cp2 to the last '/' in file, but not
13907c478bd9Sstevel@tonic-gate * to a trailing '/'
13917c478bd9Sstevel@tonic-gate */
13927c478bd9Sstevel@tonic-gate for (; *cp; cp++) {
13937c478bd9Sstevel@tonic-gate if (*cp == '/') {
13947c478bd9Sstevel@tonic-gate while (*(cp+1) == '/') {
13957c478bd9Sstevel@tonic-gate ++cp;
13967c478bd9Sstevel@tonic-gate }
13977c478bd9Sstevel@tonic-gate if (*(cp+1) != '\0') {
13987c478bd9Sstevel@tonic-gate /* not trailing slash */
13997c478bd9Sstevel@tonic-gate cp2 = cp;
14007c478bd9Sstevel@tonic-gate }
14017c478bd9Sstevel@tonic-gate }
14027c478bd9Sstevel@tonic-gate }
14037c478bd9Sstevel@tonic-gate if (cp2 != file) {
14047c478bd9Sstevel@tonic-gate *cp2 = '\0';
1405b25dbf38SRich Burridge if (tar_chdir(file) < 0) {
14067c478bd9Sstevel@tonic-gate vperror(0, gettext(
14077c478bd9Sstevel@tonic-gate "can't change directories to %s"), file);
14087c478bd9Sstevel@tonic-gate continue;
14097c478bd9Sstevel@tonic-gate }
14107c478bd9Sstevel@tonic-gate *cp2 = '/';
14117c478bd9Sstevel@tonic-gate cp2++;
14127c478bd9Sstevel@tonic-gate }
14137c478bd9Sstevel@tonic-gate
14147c478bd9Sstevel@tonic-gate parent = getcwd(tempdir, (sizeof (tempdir)));
1415da6c28aaSamw
1416da6c28aaSamw archtype = putfile(file, cp2, parent, NULL, NORMAL_FILE,
14177c478bd9Sstevel@tonic-gate LEV0, SYMLINK_LEV0);
14187c478bd9Sstevel@tonic-gate
14197c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
14207c478bd9Sstevel@tonic-gate if (!exitflag) {
1421da6c28aaSamw if ((atflag || saflag) &&
1422da6c28aaSamw (archtype == PUT_NOTAS_LINK)) {
1423da6c28aaSamw xattrs_put(file, cp2, parent, NULL);
14247c478bd9Sstevel@tonic-gate }
14257c478bd9Sstevel@tonic-gate }
14267c478bd9Sstevel@tonic-gate #endif
14277c478bd9Sstevel@tonic-gate
1428b25dbf38SRich Burridge if (tar_chdir(origdir) < 0)
14297c478bd9Sstevel@tonic-gate vperror(0, gettext("cannot change back?: %s"), origdir);
14307c478bd9Sstevel@tonic-gate
14317c478bd9Sstevel@tonic-gate if (exitflag) {
14327c478bd9Sstevel@tonic-gate /*
14337c478bd9Sstevel@tonic-gate * If e function modifier has been specified
14347c478bd9Sstevel@tonic-gate * write the files (that are listed before the
14357c478bd9Sstevel@tonic-gate * file causing the error) to tape. exitflag is
14367c478bd9Sstevel@tonic-gate * used because only some of the error conditions
14377c478bd9Sstevel@tonic-gate * in putfile() recognize the e function modifier.
14387c478bd9Sstevel@tonic-gate */
14397c478bd9Sstevel@tonic-gate break;
14407c478bd9Sstevel@tonic-gate }
14417c478bd9Sstevel@tonic-gate }
14427c478bd9Sstevel@tonic-gate
14437c478bd9Sstevel@tonic-gate putempty((blkcnt_t)2);
14447c478bd9Sstevel@tonic-gate flushtape();
14457c478bd9Sstevel@tonic-gate closevol(); /* SP-1 */
14467c478bd9Sstevel@tonic-gate if (linkerrok == 1)
14477c478bd9Sstevel@tonic-gate for (; ihead != NULL; ihead = ihead->nextp) {
14487c478bd9Sstevel@tonic-gate if (ihead->count == 0)
14497c478bd9Sstevel@tonic-gate continue;
14507c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
14517c478bd9Sstevel@tonic-gate "tar: missing links to %s\n"), ihead->pathname);
14527c478bd9Sstevel@tonic-gate if (errflag)
14537c478bd9Sstevel@tonic-gate done(1);
14547c478bd9Sstevel@tonic-gate else
14557c478bd9Sstevel@tonic-gate Errflg = 1;
14567c478bd9Sstevel@tonic-gate }
14577c478bd9Sstevel@tonic-gate }
14587c478bd9Sstevel@tonic-gate
14597c478bd9Sstevel@tonic-gate
14607c478bd9Sstevel@tonic-gate /*
14617c478bd9Sstevel@tonic-gate * endtape - check for tape at end
14627c478bd9Sstevel@tonic-gate *
14637c478bd9Sstevel@tonic-gate * endtape checks the entry in dblock.dbuf to see if its the
14647c478bd9Sstevel@tonic-gate * special EOT entry. Endtape is usually called after getdir().
14657c478bd9Sstevel@tonic-gate *
14667c478bd9Sstevel@tonic-gate * endtape used to call backtape; it no longer does, he who
14677c478bd9Sstevel@tonic-gate * wants it backed up must call backtape himself
14687c478bd9Sstevel@tonic-gate * RETURNS: 0 if not EOT, tape position unaffected
14697c478bd9Sstevel@tonic-gate * 1 if EOT, tape position unaffected
14707c478bd9Sstevel@tonic-gate */
14717c478bd9Sstevel@tonic-gate
1472*28c4d110SJoshua M. Clulow static boolean_t
endtape(void)14737c478bd9Sstevel@tonic-gate endtape(void)
14747c478bd9Sstevel@tonic-gate {
1475*28c4d110SJoshua M. Clulow if (dblock.dbuf.name[0] != '\0') {
1476*28c4d110SJoshua M. Clulow /*
1477*28c4d110SJoshua M. Clulow * The name field is populated.
1478*28c4d110SJoshua M. Clulow */
1479*28c4d110SJoshua M. Clulow return (B_FALSE);
1480*28c4d110SJoshua M. Clulow }
1481*28c4d110SJoshua M. Clulow
1482*28c4d110SJoshua M. Clulow if (is_posix && dblock.dbuf.prefix[0] != '\0') {
1483*28c4d110SJoshua M. Clulow /*
1484*28c4d110SJoshua M. Clulow * This is a ustar/POSIX archive, and although the name
1485*28c4d110SJoshua M. Clulow * field is empty the prefix field is not.
1486*28c4d110SJoshua M. Clulow */
1487*28c4d110SJoshua M. Clulow return (B_FALSE);
1488*28c4d110SJoshua M. Clulow }
1489*28c4d110SJoshua M. Clulow
1490*28c4d110SJoshua M. Clulow dlog("endtape(): found null header; EOT\n");
1491*28c4d110SJoshua M. Clulow return (B_TRUE);
14927c478bd9Sstevel@tonic-gate }
14937c478bd9Sstevel@tonic-gate
14947c478bd9Sstevel@tonic-gate /*
14957c478bd9Sstevel@tonic-gate * getdir - get directory entry from tar tape
14967c478bd9Sstevel@tonic-gate *
14977c478bd9Sstevel@tonic-gate * getdir reads the next tarblock off the tape and cracks
14987c478bd9Sstevel@tonic-gate * it as a directory. The checksum must match properly.
14997c478bd9Sstevel@tonic-gate *
15007c478bd9Sstevel@tonic-gate * If tfile is non-null getdir writes the file name and mod date
15017c478bd9Sstevel@tonic-gate * to tfile.
15027c478bd9Sstevel@tonic-gate */
15037c478bd9Sstevel@tonic-gate
15047c478bd9Sstevel@tonic-gate static void
getdir(void)15057c478bd9Sstevel@tonic-gate getdir(void)
15067c478bd9Sstevel@tonic-gate {
15077c478bd9Sstevel@tonic-gate struct stat *sp;
15087c478bd9Sstevel@tonic-gate #ifdef EUC
15097c478bd9Sstevel@tonic-gate static int warn_chksum_sign = 0;
15107c478bd9Sstevel@tonic-gate #endif /* EUC */
15117c478bd9Sstevel@tonic-gate
15127c478bd9Sstevel@tonic-gate top:
15137c478bd9Sstevel@tonic-gate readtape((char *)&dblock);
15147c478bd9Sstevel@tonic-gate if (dblock.dbuf.name[0] == '\0')
15157c478bd9Sstevel@tonic-gate return;
15167c478bd9Sstevel@tonic-gate sp = &stbuf;
15177c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.mode, "%8lo", &Gen.g_mode);
15187c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.uid, "%8lo", (ulong_t *)&Gen.g_uid);
15197c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.gid, "%8lo", (ulong_t *)&Gen.g_gid);
15207c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.size, "%12" FMT_off_t_o, &Gen.g_filesz);
15217c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.mtime, "%12lo", (ulong_t *)&Gen.g_mtime);
15227c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.chksum, "%8o", &Gen.g_cksum);
15237c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.devmajor, "%8lo", &Gen.g_devmajor);
15247c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.devminor, "%8lo", &Gen.g_devminor);
15257c478bd9Sstevel@tonic-gate
15267c478bd9Sstevel@tonic-gate is_posix = (strcmp(dblock.dbuf.magic, magic_type) == 0);
15277c478bd9Sstevel@tonic-gate
15287c478bd9Sstevel@tonic-gate sp->st_mode = Gen.g_mode;
1529*28c4d110SJoshua M. Clulow if (is_posix && (sp->st_mode & S_IFMT) == 0) {
15307c478bd9Sstevel@tonic-gate switch (dblock.dbuf.typeflag) {
1531*28c4d110SJoshua M. Clulow case '0':
1532*28c4d110SJoshua M. Clulow case 0:
1533*28c4d110SJoshua M. Clulow case _XATTR_HDRTYPE:
15347c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFREG;
15357c478bd9Sstevel@tonic-gate break;
15367c478bd9Sstevel@tonic-gate case '1': /* hard link */
15377c478bd9Sstevel@tonic-gate break;
15387c478bd9Sstevel@tonic-gate case '2':
15397c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFLNK;
15407c478bd9Sstevel@tonic-gate break;
15417c478bd9Sstevel@tonic-gate case '3':
15427c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFCHR;
15437c478bd9Sstevel@tonic-gate break;
15447c478bd9Sstevel@tonic-gate case '4':
15457c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFBLK;
15467c478bd9Sstevel@tonic-gate break;
15477c478bd9Sstevel@tonic-gate case '5':
15487c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFDIR;
15497c478bd9Sstevel@tonic-gate break;
15507c478bd9Sstevel@tonic-gate case '6':
15517c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFIFO;
15527c478bd9Sstevel@tonic-gate break;
15537c478bd9Sstevel@tonic-gate default:
15547c478bd9Sstevel@tonic-gate if (convtoreg(Gen.g_filesz))
15557c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFREG;
15567c478bd9Sstevel@tonic-gate break;
15577c478bd9Sstevel@tonic-gate }
1558*28c4d110SJoshua M. Clulow }
15597c478bd9Sstevel@tonic-gate
1560e765faefSRich Burridge if ((dblock.dbuf.typeflag == 'X') || (dblock.dbuf.typeflag == 'L')) {
15617c478bd9Sstevel@tonic-gate Xhdrflag = 1; /* Currently processing extended header */
1562e765faefSRich Burridge } else {
15637c478bd9Sstevel@tonic-gate Xhdrflag = 0;
1564e765faefSRich Burridge }
15657c478bd9Sstevel@tonic-gate
15667c478bd9Sstevel@tonic-gate sp->st_uid = Gen.g_uid;
15677c478bd9Sstevel@tonic-gate sp->st_gid = Gen.g_gid;
15687c478bd9Sstevel@tonic-gate sp->st_size = Gen.g_filesz;
15697c478bd9Sstevel@tonic-gate sp->st_mtime = Gen.g_mtime;
15707c478bd9Sstevel@tonic-gate chksum = Gen.g_cksum;
15717c478bd9Sstevel@tonic-gate
15727c478bd9Sstevel@tonic-gate if (dblock.dbuf.extno != '\0') { /* split file? */
15737c478bd9Sstevel@tonic-gate extno = dblock.dbuf.extno;
15747c478bd9Sstevel@tonic-gate extsize = Gen.g_filesz;
15757c478bd9Sstevel@tonic-gate extotal = dblock.dbuf.extotal;
15767c478bd9Sstevel@tonic-gate } else {
15777c478bd9Sstevel@tonic-gate extno = 0; /* tell others file not split */
15787c478bd9Sstevel@tonic-gate extsize = 0;
15797c478bd9Sstevel@tonic-gate extotal = 0;
15807c478bd9Sstevel@tonic-gate }
15817c478bd9Sstevel@tonic-gate
15827c478bd9Sstevel@tonic-gate #ifdef EUC
15837c478bd9Sstevel@tonic-gate if (chksum != checksum(&dblock)) {
15847c478bd9Sstevel@tonic-gate if (chksum != checksum_signed(&dblock)) {
15857c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
15867c478bd9Sstevel@tonic-gate "tar: directory checksum error\n"));
158703d7b3c0SRich Burridge if (iflag) {
158803d7b3c0SRich Burridge Errflg = 2;
15897c478bd9Sstevel@tonic-gate goto top;
159003d7b3c0SRich Burridge }
15917c478bd9Sstevel@tonic-gate done(2);
15927c478bd9Sstevel@tonic-gate } else {
15937c478bd9Sstevel@tonic-gate if (! warn_chksum_sign) {
15947c478bd9Sstevel@tonic-gate warn_chksum_sign = 1;
15957c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
15967c478bd9Sstevel@tonic-gate "tar: warning: tar file made with signed checksum\n"));
15977c478bd9Sstevel@tonic-gate }
15987c478bd9Sstevel@tonic-gate }
15997c478bd9Sstevel@tonic-gate }
16007c478bd9Sstevel@tonic-gate #else
16017c478bd9Sstevel@tonic-gate if (chksum != checksum(&dblock)) {
16027c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
16037c478bd9Sstevel@tonic-gate "tar: directory checksum error\n"));
160403d7b3c0SRich Burridge if (iflag) {
160503d7b3c0SRich Burridge Errflg = 2;
16067c478bd9Sstevel@tonic-gate goto top;
160703d7b3c0SRich Burridge }
16087c478bd9Sstevel@tonic-gate done(2);
16097c478bd9Sstevel@tonic-gate }
16107c478bd9Sstevel@tonic-gate #endif /* EUC */
16117c478bd9Sstevel@tonic-gate if (tfile != NULL && Xhdrflag == 0) {
16127c478bd9Sstevel@tonic-gate /*
16137c478bd9Sstevel@tonic-gate * If an extended header is present, then time is available
16147c478bd9Sstevel@tonic-gate * in nanoseconds in the extended header data, so set it.
16157c478bd9Sstevel@tonic-gate * Otherwise, give an invalid value so that checkupdate will
16167c478bd9Sstevel@tonic-gate * not test beyond seconds.
16177c478bd9Sstevel@tonic-gate */
16187c478bd9Sstevel@tonic-gate if ((xhdr_flgs & _X_MTIME))
16197c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec = Xtarhdr.x_mtime.tv_nsec;
16207c478bd9Sstevel@tonic-gate else
16217c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec = -1;
16227c478bd9Sstevel@tonic-gate
16237c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH)
16247c478bd9Sstevel@tonic-gate (void) fprintf(tfile, "%s %10ld.%9.9ld\n",
16257c478bd9Sstevel@tonic-gate Xtarhdr.x_path, sp->st_mtim.tv_sec,
16267c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec);
16277c478bd9Sstevel@tonic-gate else
16287c478bd9Sstevel@tonic-gate (void) fprintf(tfile, "%.*s %10ld.%9.9ld\n",
16297c478bd9Sstevel@tonic-gate NAMSIZ, dblock.dbuf.name, sp->st_mtim.tv_sec,
16307c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec);
16317c478bd9Sstevel@tonic-gate }
16327c478bd9Sstevel@tonic-gate
16337c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
16347c478bd9Sstevel@tonic-gate Hiddendir = 0;
16357c478bd9Sstevel@tonic-gate if (xattrp && dblock.dbuf.typeflag == _XATTR_HDRTYPE) {
16367c478bd9Sstevel@tonic-gate if (xattrbadhead) {
16377c478bd9Sstevel@tonic-gate free(xattrhead);
16387c478bd9Sstevel@tonic-gate xattrp = NULL;
16397c478bd9Sstevel@tonic-gate xattr_linkp = NULL;
16407c478bd9Sstevel@tonic-gate xattrhead = NULL;
16417c478bd9Sstevel@tonic-gate } else {
1642da6c28aaSamw char *aname = basename(xattrapath);
1643da6c28aaSamw size_t xindex = aname - xattrapath;
1644da6c28aaSamw
1645da6c28aaSamw if (xattrapath[xindex] == '.' &&
1646da6c28aaSamw xattrapath[xindex + 1] == '\0' &&
16477c478bd9Sstevel@tonic-gate xattrp->h_typeflag == '5') {
16487c478bd9Sstevel@tonic-gate Hiddendir = 1;
16497c478bd9Sstevel@tonic-gate sp->st_mode =
1650d2443e76Smarks (S_IFDIR | (sp->st_mode & POSIXMODES));
16517c478bd9Sstevel@tonic-gate }
16527c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = xattrp->h_typeflag;
16537c478bd9Sstevel@tonic-gate }
16547c478bd9Sstevel@tonic-gate }
16557c478bd9Sstevel@tonic-gate #endif
16567c478bd9Sstevel@tonic-gate }
16577c478bd9Sstevel@tonic-gate
16587c478bd9Sstevel@tonic-gate
16597c478bd9Sstevel@tonic-gate /*
16607c478bd9Sstevel@tonic-gate * passtape - skip over a file on the tape
16617c478bd9Sstevel@tonic-gate *
16627c478bd9Sstevel@tonic-gate * passtape skips over the next data file on the tape.
16637c478bd9Sstevel@tonic-gate * The tape directory entry must be in dblock.dbuf. This
16647c478bd9Sstevel@tonic-gate * routine just eats the number of blocks computed from the
16657c478bd9Sstevel@tonic-gate * directory size entry; the tape must be (logically) positioned
1666*28c4d110SJoshua M. Clulow * right after the directory info.
16677c478bd9Sstevel@tonic-gate */
16687c478bd9Sstevel@tonic-gate
16697c478bd9Sstevel@tonic-gate static void
passtape(void)16707c478bd9Sstevel@tonic-gate passtape(void)
16717c478bd9Sstevel@tonic-gate {
16727c478bd9Sstevel@tonic-gate blkcnt_t blocks;
16737c478bd9Sstevel@tonic-gate char buf[TBLOCK];
16747c478bd9Sstevel@tonic-gate
16757c478bd9Sstevel@tonic-gate /*
1676*28c4d110SJoshua M. Clulow * Print some debugging information about the directory entry
1677*28c4d110SJoshua M. Clulow * we are skipping over:
1678*28c4d110SJoshua M. Clulow */
1679*28c4d110SJoshua M. Clulow dlog("passtape: typeflag \"%c\"\n", dblock.dbuf.typeflag);
1680*28c4d110SJoshua M. Clulow if (dblock.dbuf.name[0] != '\0') {
1681*28c4d110SJoshua M. Clulow dlog("passtape: name \"%s\"\n", dblock.dbuf.name);
1682*28c4d110SJoshua M. Clulow }
1683*28c4d110SJoshua M. Clulow if (is_posix && dblock.dbuf.prefix[0] != '\0') {
1684*28c4d110SJoshua M. Clulow dlog("passtape: prefix \"%s\"\n", dblock.dbuf.prefix);
1685*28c4d110SJoshua M. Clulow }
1686*28c4d110SJoshua M. Clulow
1687*28c4d110SJoshua M. Clulow /*
16887c478bd9Sstevel@tonic-gate * Types link(1), sym-link(2), char special(3), blk special(4),
16897c478bd9Sstevel@tonic-gate * directory(5), and FIFO(6) do not have data blocks associated
16907c478bd9Sstevel@tonic-gate * with them so just skip reading the data block.
16917c478bd9Sstevel@tonic-gate */
16927c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '1' || dblock.dbuf.typeflag == '2' ||
16937c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == '3' || dblock.dbuf.typeflag == '4' ||
16947c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == '5' || dblock.dbuf.typeflag == '6')
16957c478bd9Sstevel@tonic-gate return;
16967c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size);
16977c478bd9Sstevel@tonic-gate
1698*28c4d110SJoshua M. Clulow dlog("passtape: block count %" FMT_blkcnt_t "\n", blocks);
1699*28c4d110SJoshua M. Clulow
17007c478bd9Sstevel@tonic-gate /* if operating on disk, seek instead of reading */
17017c478bd9Sstevel@tonic-gate if (NotTape)
17027c478bd9Sstevel@tonic-gate seekdisk(blocks);
17037c478bd9Sstevel@tonic-gate else
17047c478bd9Sstevel@tonic-gate while (blocks-- > 0)
17057c478bd9Sstevel@tonic-gate readtape(buf);
17067c478bd9Sstevel@tonic-gate }
17077c478bd9Sstevel@tonic-gate
1708da6c28aaSamw #if defined(O_XATTR)
1709da6c28aaSamw static int
is_sysattr(char * name)1710da6c28aaSamw is_sysattr(char *name)
1711da6c28aaSamw {
1712da6c28aaSamw return ((strcmp(name, VIEW_READONLY) == 0) ||
1713da6c28aaSamw (strcmp(name, VIEW_READWRITE) == 0));
1714da6c28aaSamw }
1715da6c28aaSamw #endif
1716da6c28aaSamw
1717da6c28aaSamw #if defined(O_XATTR)
1718da6c28aaSamw /*
1719da6c28aaSamw * Verify the attribute, attrname, is an attribute we want to restore.
1720da6c28aaSamw * Never restore read-only system attribute files. Only restore read-write
1721da6c28aaSamw * system attributes files when -/ was specified, and only traverse into
1722da6c28aaSamw * the 2nd level attribute directory containing only system attributes if
1723da6c28aaSamw * -@ was specified. This keeps us from archiving
1724da6c28aaSamw * <attribute name>/<read-write system attribute file>
1725da6c28aaSamw * when -/ was specified without -@.
1726da6c28aaSamw *
1727da6c28aaSamw * attrname - attribute file name
1728da6c28aaSamw * attrparent - attribute's parent name within the base file's attribute
1729da6c28aaSamw * directory hierarchy
1730da6c28aaSamw */
1731da6c28aaSamw static attr_status_t
verify_attr(char * attrname,char * attrparent,int arc_rwsysattr,int * rw_sysattr)1732da6c28aaSamw verify_attr(char *attrname, char *attrparent, int arc_rwsysattr,
1733da6c28aaSamw int *rw_sysattr)
1734da6c28aaSamw {
1735da6c28aaSamw #if defined(_PC_SATTR_ENABLED)
1736da6c28aaSamw int attr_supported;
1737da6c28aaSamw
1738da6c28aaSamw /* Never restore read-only system attribute files */
1739da6c28aaSamw if ((attr_supported = sysattr_type(attrname)) == _RO_SATTR) {
1740da6c28aaSamw *rw_sysattr = 0;
1741da6c28aaSamw return (ATTR_SKIP);
1742da6c28aaSamw } else {
1743da6c28aaSamw *rw_sysattr = (attr_supported == _RW_SATTR);
1744da6c28aaSamw }
1745da6c28aaSamw #else
1746da6c28aaSamw /*
1747da6c28aaSamw * Only need to check if this attribute is an extended system
1748da6c28aaSamw * attribute.
1749da6c28aaSamw */
1750da6c28aaSamw if (*rw_sysattr = is_sysattr(attrname)) {
1751da6c28aaSamw return (ATTR_SKIP);
1752da6c28aaSamw } else {
1753da6c28aaSamw return (ATTR_OK);
1754da6c28aaSamw }
1755da6c28aaSamw #endif /* _PC_SATTR_ENABLED */
1756da6c28aaSamw
1757da6c28aaSamw /*
1758da6c28aaSamw * If the extended system attribute file is specified with the
1759da6c28aaSamw * arc_rwsysattr flag, as being transient (default extended
1760da6c28aaSamw * attributes), then don't archive it.
1761da6c28aaSamw */
1762da6c28aaSamw if (*rw_sysattr && !arc_rwsysattr) {
1763da6c28aaSamw return (ATTR_SKIP);
1764da6c28aaSamw }
1765da6c28aaSamw
1766da6c28aaSamw /*
1767da6c28aaSamw * Only restore read-write system attribute files
1768da6c28aaSamw * when -/ was specified. Only restore extended
1769da6c28aaSamw * attributes when -@ was specified.
1770da6c28aaSamw */
1771da6c28aaSamw if (atflag) {
1772da6c28aaSamw if (!saflag) {
1773da6c28aaSamw /*
1774da6c28aaSamw * Only archive/restore the hidden directory "." if
1775da6c28aaSamw * we're processing the top level hidden attribute
1776da6c28aaSamw * directory. We don't want to process the
1777da6c28aaSamw * hidden attribute directory of the attribute
1778da6c28aaSamw * directory that contains only extended system
1779da6c28aaSamw * attributes.
1780da6c28aaSamw */
1781da6c28aaSamw if (*rw_sysattr || (Hiddendir &&
1782da6c28aaSamw (attrparent != NULL))) {
1783da6c28aaSamw return (ATTR_SKIP);
1784da6c28aaSamw }
1785da6c28aaSamw }
1786da6c28aaSamw } else if (saflag) {
1787da6c28aaSamw /*
1788da6c28aaSamw * Only archive/restore read-write extended system attribute
1789da6c28aaSamw * files of the base file.
1790da6c28aaSamw */
1791da6c28aaSamw if (!*rw_sysattr || (attrparent != NULL)) {
1792da6c28aaSamw return (ATTR_SKIP);
1793da6c28aaSamw }
1794da6c28aaSamw } else {
1795da6c28aaSamw return (ATTR_SKIP);
1796da6c28aaSamw }
1797da6c28aaSamw
1798da6c28aaSamw return (ATTR_OK);
1799da6c28aaSamw }
1800da6c28aaSamw #endif
18017c478bd9Sstevel@tonic-gate
18025e2174acSceastha static void
free_children(file_list_t * children)18035e2174acSceastha free_children(file_list_t *children)
18045e2174acSceastha {
18055e2174acSceastha file_list_t *child = children;
18065e2174acSceastha file_list_t *cptr;
18075e2174acSceastha
18085e2174acSceastha while (child != NULL) {
18095e2174acSceastha cptr = child->next;
18105e2174acSceastha if (child->name != NULL) {
18115e2174acSceastha free(child->name);
18125e2174acSceastha }
18135e2174acSceastha child = cptr;
18145e2174acSceastha }
18155e2174acSceastha }
18165e2174acSceastha
18177c478bd9Sstevel@tonic-gate static int
putfile(char * longname,char * shortname,char * parent,attr_data_t * attrinfo,int filetype,int lev,int symlink_lev)1818da6c28aaSamw putfile(char *longname, char *shortname, char *parent, attr_data_t *attrinfo,
18197c478bd9Sstevel@tonic-gate int filetype, int lev, int symlink_lev)
18207c478bd9Sstevel@tonic-gate {
18217c478bd9Sstevel@tonic-gate int infile = -1; /* deliberately invalid */
18227c478bd9Sstevel@tonic-gate blkcnt_t blocks;
18237c478bd9Sstevel@tonic-gate char buf[PATH_MAX + 2]; /* Add trailing slash and null */
18247c478bd9Sstevel@tonic-gate char *bigbuf;
18257c478bd9Sstevel@tonic-gate int maxread;
18267c478bd9Sstevel@tonic-gate int hint; /* amount to write to get "in sync" */
18277c478bd9Sstevel@tonic-gate char filetmp[PATH_MAX + 1];
18287c478bd9Sstevel@tonic-gate char *cp;
18297c478bd9Sstevel@tonic-gate char *name;
1830da6c28aaSamw char *attrparent = NULL;
1831da6c28aaSamw char *longattrname = NULL;
18325e2174acSceastha file_list_t *child = NULL;
18335e2174acSceastha file_list_t *child_end = NULL;
18345e2174acSceastha file_list_t *cptr;
18357c478bd9Sstevel@tonic-gate struct dirent *dp;
18367c478bd9Sstevel@tonic-gate DIR *dirp;
18377c478bd9Sstevel@tonic-gate int i;
18387c478bd9Sstevel@tonic-gate int split;
18397c478bd9Sstevel@tonic-gate int dirfd = -1;
18407c478bd9Sstevel@tonic-gate int rc = PUT_NOTAS_LINK;
18417c478bd9Sstevel@tonic-gate int archtype = 0;
1842da6c28aaSamw int rw_sysattr = 0;
18437c478bd9Sstevel@tonic-gate char newparent[PATH_MAX + MAXNAMLEN + 1];
18447c478bd9Sstevel@tonic-gate char *prefix = "";
18457c478bd9Sstevel@tonic-gate char *tmpbuf;
18467c478bd9Sstevel@tonic-gate char goodbuf[PRESIZ + 2];
18477c478bd9Sstevel@tonic-gate char junkbuf[MAXNAM+1];
18487c478bd9Sstevel@tonic-gate char *lastslash;
18497c478bd9Sstevel@tonic-gate int j;
18507c478bd9Sstevel@tonic-gate struct stat sbuf;
18517c478bd9Sstevel@tonic-gate int readlink_max;
18527c478bd9Sstevel@tonic-gate
18537c478bd9Sstevel@tonic-gate (void) memset(goodbuf, '\0', sizeof (goodbuf));
18547c478bd9Sstevel@tonic-gate (void) memset(junkbuf, '\0', sizeof (junkbuf));
18557c478bd9Sstevel@tonic-gate
18567c478bd9Sstevel@tonic-gate xhdr_flgs = 0;
18577c478bd9Sstevel@tonic-gate
18587c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) {
1859da6c28aaSamw attrparent = attrinfo->attr_parent;
1860da6c28aaSamw longattrname = attrinfo->attr_path;
1861da6c28aaSamw dirfd = attrinfo->attr_parentfd;
1862ced83f9bSceastha rw_sysattr = attrinfo->attr_rw_sysattr;
18637c478bd9Sstevel@tonic-gate } else {
18647c478bd9Sstevel@tonic-gate dirfd = open(".", O_RDONLY);
18657c478bd9Sstevel@tonic-gate }
18667c478bd9Sstevel@tonic-gate
18677c478bd9Sstevel@tonic-gate if (dirfd == -1) {
18687c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
1869da6c28aaSamw "tar: unable to open%sdirectory %s%s%s%s\n"),
18707c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? gettext(" attribute ") : " ",
1871da6c28aaSamw (attrparent == NULL) ? "" : gettext("of attribute "),
1872da6c28aaSamw (attrparent == NULL) ? "" : attrparent,
1873da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "),
18747c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? longname : parent);
18757c478bd9Sstevel@tonic-gate goto out;
18767c478bd9Sstevel@tonic-gate }
18777c478bd9Sstevel@tonic-gate
18787c478bd9Sstevel@tonic-gate if (lev > MAXLEV) {
18797c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
18807c478bd9Sstevel@tonic-gate gettext("tar: directory nesting too deep, %s not dumped\n"),
18817c478bd9Sstevel@tonic-gate longname);
18827c478bd9Sstevel@tonic-gate goto out;
18837c478bd9Sstevel@tonic-gate }
18847c478bd9Sstevel@tonic-gate
1885da6c28aaSamw if (getstat(dirfd, longname, shortname, attrparent))
18867c478bd9Sstevel@tonic-gate goto out;
18877c478bd9Sstevel@tonic-gate
18887c478bd9Sstevel@tonic-gate if (hflag) {
18897c478bd9Sstevel@tonic-gate /*
18907c478bd9Sstevel@tonic-gate * Catch nesting where a file is a symlink to its directory.
18917c478bd9Sstevel@tonic-gate */
18927c478bd9Sstevel@tonic-gate j = fstatat(dirfd, shortname, &sbuf, AT_SYMLINK_NOFOLLOW);
18937c478bd9Sstevel@tonic-gate if (S_ISLNK(sbuf.st_mode)) {
18947c478bd9Sstevel@tonic-gate if (symlink_lev++ >= MAXSYMLINKS) {
18957c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
18967c478bd9Sstevel@tonic-gate "tar: %s: Number of symbolic links "
18977c478bd9Sstevel@tonic-gate "encountered during path name traversal "
18987c478bd9Sstevel@tonic-gate "exceeds MAXSYMLINKS\n"), longname);
18997c478bd9Sstevel@tonic-gate Errflg = 1;
19007c478bd9Sstevel@tonic-gate goto out;
19017c478bd9Sstevel@tonic-gate }
19027c478bd9Sstevel@tonic-gate }
19037c478bd9Sstevel@tonic-gate }
19047c478bd9Sstevel@tonic-gate
19057c478bd9Sstevel@tonic-gate /*
19067c478bd9Sstevel@tonic-gate * Check if the input file is the same as the tar file we
19077c478bd9Sstevel@tonic-gate * are creating
19087c478bd9Sstevel@tonic-gate */
19097c478bd9Sstevel@tonic-gate if ((mt_ino == stbuf.st_ino) && (mt_dev == stbuf.st_dev)) {
19107c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
1911da6c28aaSamw "tar: %s%s%s%s%s same as archive file\n"),
1912da6c28aaSamw rw_sysattr ? gettext("system ") : "",
1913da6c28aaSamw (longattrname == NULL) ? "" : gettext("attribute "),
1914da6c28aaSamw (longattrname == NULL) ? "" : longattrname,
1915da6c28aaSamw (longattrname == NULL) ? "" : gettext(" of "),
1916da6c28aaSamw longname);
19177c478bd9Sstevel@tonic-gate Errflg = 1;
19187c478bd9Sstevel@tonic-gate goto out;
19197c478bd9Sstevel@tonic-gate }
19207c478bd9Sstevel@tonic-gate /*
19217c478bd9Sstevel@tonic-gate * Check size limit - we can't archive files that
19227c478bd9Sstevel@tonic-gate * exceed TAR_OFFSET_MAX bytes because of header
19237c478bd9Sstevel@tonic-gate * limitations. Exclude file types that set
19247c478bd9Sstevel@tonic-gate * st_size to zero below because they take no
19257c478bd9Sstevel@tonic-gate * archive space to represent contents.
19267c478bd9Sstevel@tonic-gate */
19277c478bd9Sstevel@tonic-gate if ((stbuf.st_size > (off_t)TAR_OFFSET_MAX) &&
19287c478bd9Sstevel@tonic-gate !S_ISDIR(stbuf.st_mode) &&
19297c478bd9Sstevel@tonic-gate !S_ISCHR(stbuf.st_mode) &&
19307c478bd9Sstevel@tonic-gate !S_ISBLK(stbuf.st_mode) &&
19317c478bd9Sstevel@tonic-gate (Eflag == 0)) {
19327c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
1933da6c28aaSamw "tar: %s%s%s%s%s too large to archive. "
1934da6c28aaSamw "Use E function modifier.\n"),
1935da6c28aaSamw rw_sysattr ? gettext("system ") : "",
1936da6c28aaSamw (longattrname == NULL) ? "" : gettext("attribute "),
1937da6c28aaSamw (longattrname == NULL) ? "" : longattrname,
1938da6c28aaSamw (longattrname == NULL) ? "" : gettext(" of "),
1939da6c28aaSamw longname);
19407c478bd9Sstevel@tonic-gate if (errflag)
19417c478bd9Sstevel@tonic-gate exitflag = 1;
19427c478bd9Sstevel@tonic-gate Errflg = 1;
19437c478bd9Sstevel@tonic-gate goto out;
19447c478bd9Sstevel@tonic-gate }
19457c478bd9Sstevel@tonic-gate
19467c478bd9Sstevel@tonic-gate if (tfile != NULL && checkupdate(longname) == 0) {
19477c478bd9Sstevel@tonic-gate goto out;
19487c478bd9Sstevel@tonic-gate }
19497c478bd9Sstevel@tonic-gate if (checkw('r', longname) == 0) {
19507c478bd9Sstevel@tonic-gate goto out;
19517c478bd9Sstevel@tonic-gate }
19527c478bd9Sstevel@tonic-gate
19533a1dab68SRich Burridge if (Fflag &&
19543a1dab68SRich Burridge checkf(longname, (stbuf.st_mode & S_IFMT) == S_IFDIR, Fflag) == 0)
19557c478bd9Sstevel@tonic-gate goto out;
19567c478bd9Sstevel@tonic-gate
19577c478bd9Sstevel@tonic-gate if (Xflag) {
19587c478bd9Sstevel@tonic-gate if (is_in_table(exclude_tbl, longname)) {
19597c478bd9Sstevel@tonic-gate if (vflag) {
19607c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
19617c478bd9Sstevel@tonic-gate "a %s excluded\n"), longname);
19627c478bd9Sstevel@tonic-gate }
19637c478bd9Sstevel@tonic-gate goto out;
19647c478bd9Sstevel@tonic-gate }
19657c478bd9Sstevel@tonic-gate }
19667c478bd9Sstevel@tonic-gate
19677c478bd9Sstevel@tonic-gate /*
19687c478bd9Sstevel@tonic-gate * If the length of the fullname is greater than MAXNAM,
19697c478bd9Sstevel@tonic-gate * print out a message and return (unless extended headers are used,
19707c478bd9Sstevel@tonic-gate * in which case fullname is limited to PATH_MAX).
19717c478bd9Sstevel@tonic-gate */
19727c478bd9Sstevel@tonic-gate
19737c478bd9Sstevel@tonic-gate if ((((split = (int)strlen(longname)) > MAXNAM) && (Eflag == 0)) ||
19747c478bd9Sstevel@tonic-gate (split > PATH_MAX)) {
19757c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
19767c478bd9Sstevel@tonic-gate "tar: %s: file name too long\n"), longname);
19777c478bd9Sstevel@tonic-gate if (errflag)
19787c478bd9Sstevel@tonic-gate exitflag = 1;
19797c478bd9Sstevel@tonic-gate Errflg = 1;
19807c478bd9Sstevel@tonic-gate goto out;
19817c478bd9Sstevel@tonic-gate }
19827c478bd9Sstevel@tonic-gate
19837c478bd9Sstevel@tonic-gate /*
19847c478bd9Sstevel@tonic-gate * We split the fullname into prefix and name components if any one
19857c478bd9Sstevel@tonic-gate * of three conditions holds:
19867c478bd9Sstevel@tonic-gate * -- the length of the fullname exceeds NAMSIZ,
19877c478bd9Sstevel@tonic-gate * -- the length of the fullname equals NAMSIZ, and the shortname
19887c478bd9Sstevel@tonic-gate * is less than NAMSIZ, (splitting in this case preserves
19897c478bd9Sstevel@tonic-gate * compatibility with 5.6 and 5.5.1 tar), or
19907c478bd9Sstevel@tonic-gate * -- the length of the fullname equals NAMSIZ, the file is a
19917c478bd9Sstevel@tonic-gate * directory and we are not in POSIX-conformant mode (where
19927c478bd9Sstevel@tonic-gate * trailing slashes are removed from directories).
19937c478bd9Sstevel@tonic-gate */
19947c478bd9Sstevel@tonic-gate if ((split > NAMSIZ) ||
19957c478bd9Sstevel@tonic-gate (split == NAMSIZ && strlen(shortname) < NAMSIZ) ||
19964bc0a2efScasper (split == NAMSIZ && S_ISDIR(stbuf.st_mode) && !Pflag)) {
19977c478bd9Sstevel@tonic-gate /*
19987c478bd9Sstevel@tonic-gate * Since path is limited to PRESIZ characters, look for the
19997c478bd9Sstevel@tonic-gate * last slash within PRESIZ + 1 characters only.
20007c478bd9Sstevel@tonic-gate */
20017c478bd9Sstevel@tonic-gate (void) strncpy(&goodbuf[0], longname, min(split, PRESIZ + 1));
20027c478bd9Sstevel@tonic-gate tmpbuf = goodbuf;
20037c478bd9Sstevel@tonic-gate lastslash = strrchr(tmpbuf, '/');
20047c478bd9Sstevel@tonic-gate if (lastslash == NULL) {
20057c478bd9Sstevel@tonic-gate i = split; /* Length of name */
20067c478bd9Sstevel@tonic-gate j = 0; /* Length of prefix */
20077c478bd9Sstevel@tonic-gate goodbuf[0] = '\0';
20087c478bd9Sstevel@tonic-gate } else {
20097c478bd9Sstevel@tonic-gate *lastslash = '\0'; /* Terminate the prefix */
20107c478bd9Sstevel@tonic-gate j = strlen(tmpbuf);
20117c478bd9Sstevel@tonic-gate i = split - j - 1;
20127c478bd9Sstevel@tonic-gate }
20137c478bd9Sstevel@tonic-gate /*
20147c478bd9Sstevel@tonic-gate * If the filename is greater than NAMSIZ we can't
20157c478bd9Sstevel@tonic-gate * archive the file unless we are using extended headers.
20167c478bd9Sstevel@tonic-gate */
20174bc0a2efScasper if ((i > NAMSIZ) || (i == NAMSIZ && S_ISDIR(stbuf.st_mode) &&
20187c478bd9Sstevel@tonic-gate !Pflag)) {
20197c478bd9Sstevel@tonic-gate /* Determine which (filename or path) is too long. */
20207c478bd9Sstevel@tonic-gate lastslash = strrchr(longname, '/');
20217c478bd9Sstevel@tonic-gate if (lastslash != NULL)
20227c478bd9Sstevel@tonic-gate i = strlen(lastslash + 1);
20237c478bd9Sstevel@tonic-gate if (Eflag > 0) {
20247c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_PATH;
20257c478bd9Sstevel@tonic-gate Xtarhdr.x_path = longname;
20267c478bd9Sstevel@tonic-gate if (i <= NAMSIZ)
20277c478bd9Sstevel@tonic-gate (void) strcpy(junkbuf, lastslash + 1);
20287c478bd9Sstevel@tonic-gate else
20297c478bd9Sstevel@tonic-gate (void) sprintf(junkbuf, "%llu",
20307c478bd9Sstevel@tonic-gate xhdr_count + 1);
20317c478bd9Sstevel@tonic-gate if (split - i - 1 > PRESIZ)
20327c478bd9Sstevel@tonic-gate (void) strcpy(goodbuf, xhdr_dirname);
20337c478bd9Sstevel@tonic-gate } else {
20347c478bd9Sstevel@tonic-gate if ((i > NAMSIZ) || (i == NAMSIZ &&
20354bc0a2efScasper S_ISDIR(stbuf.st_mode) && !Pflag))
20367c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
20377c478bd9Sstevel@tonic-gate "tar: %s: filename is greater than "
20387c478bd9Sstevel@tonic-gate "%d\n"), lastslash == NULL ?
20397c478bd9Sstevel@tonic-gate longname : lastslash + 1, NAMSIZ);
20407c478bd9Sstevel@tonic-gate else
20417c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
20427c478bd9Sstevel@tonic-gate "tar: %s: prefix is greater than %d"
20437c478bd9Sstevel@tonic-gate "\n"), longname, PRESIZ);
20447c478bd9Sstevel@tonic-gate if (errflag)
20457c478bd9Sstevel@tonic-gate exitflag = 1;
20467c478bd9Sstevel@tonic-gate Errflg = 1;
20477c478bd9Sstevel@tonic-gate goto out;
20487c478bd9Sstevel@tonic-gate }
20497c478bd9Sstevel@tonic-gate } else
20507c478bd9Sstevel@tonic-gate (void) strncpy(&junkbuf[0], longname + j + 1,
20517c478bd9Sstevel@tonic-gate strlen(longname + j + 1));
20527c478bd9Sstevel@tonic-gate name = junkbuf;
20537c478bd9Sstevel@tonic-gate prefix = goodbuf;
20547c478bd9Sstevel@tonic-gate } else {
20557c478bd9Sstevel@tonic-gate name = longname;
20567c478bd9Sstevel@tonic-gate }
20577c478bd9Sstevel@tonic-gate if (Aflag) {
20587c478bd9Sstevel@tonic-gate if ((prefix != NULL) && (*prefix != '\0'))
20597c478bd9Sstevel@tonic-gate while (*prefix == '/')
20607c478bd9Sstevel@tonic-gate ++prefix;
20617c478bd9Sstevel@tonic-gate else
20627c478bd9Sstevel@tonic-gate while (*name == '/')
20637c478bd9Sstevel@tonic-gate ++name;
20647c478bd9Sstevel@tonic-gate }
20657c478bd9Sstevel@tonic-gate
20667c478bd9Sstevel@tonic-gate switch (stbuf.st_mode & S_IFMT) {
20677c478bd9Sstevel@tonic-gate case S_IFDIR:
20687c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0;
20697c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size);
20707c478bd9Sstevel@tonic-gate
20717c478bd9Sstevel@tonic-gate if (filetype != XATTR_FILE && Hiddendir == 0) {
20727c478bd9Sstevel@tonic-gate i = 0;
20737c478bd9Sstevel@tonic-gate cp = buf;
20747c478bd9Sstevel@tonic-gate while ((*cp++ = longname[i++]))
20757c478bd9Sstevel@tonic-gate ;
20767c478bd9Sstevel@tonic-gate *--cp = '/';
20777c478bd9Sstevel@tonic-gate *++cp = 0;
20787c478bd9Sstevel@tonic-gate }
20797c478bd9Sstevel@tonic-gate if (!oflag) {
20807c478bd9Sstevel@tonic-gate tomodes(&stbuf);
20817c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '5', filetype,
20827c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) {
20837c478bd9Sstevel@tonic-gate goto out;
20847c478bd9Sstevel@tonic-gate }
20857c478bd9Sstevel@tonic-gate if (!Pflag) {
20867c478bd9Sstevel@tonic-gate /*
20877c478bd9Sstevel@tonic-gate * Old archives require a slash at the end
20887c478bd9Sstevel@tonic-gate * of a directory name.
20897c478bd9Sstevel@tonic-gate *
20907c478bd9Sstevel@tonic-gate * XXX
20917c478bd9Sstevel@tonic-gate * If directory name is too long, will
20927c478bd9Sstevel@tonic-gate * slash overfill field?
20937c478bd9Sstevel@tonic-gate */
20947c478bd9Sstevel@tonic-gate if (strlen(name) > (unsigned)NAMSIZ-1) {
20957c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
20967c478bd9Sstevel@tonic-gate "tar: %s: filename is greater "
20977c478bd9Sstevel@tonic-gate "than %d\n"), name, NAMSIZ);
20987c478bd9Sstevel@tonic-gate if (errflag)
20997c478bd9Sstevel@tonic-gate exitflag = 1;
21007c478bd9Sstevel@tonic-gate Errflg = 1;
21017c478bd9Sstevel@tonic-gate goto out;
21027c478bd9Sstevel@tonic-gate } else {
21037c478bd9Sstevel@tonic-gate if (strlen(name) == (NAMSIZ - 1)) {
21047c478bd9Sstevel@tonic-gate (void) memcpy(dblock.dbuf.name,
21057c478bd9Sstevel@tonic-gate name, NAMSIZ);
21067c478bd9Sstevel@tonic-gate dblock.dbuf.name[NAMSIZ-1]
21077c478bd9Sstevel@tonic-gate = '/';
21087c478bd9Sstevel@tonic-gate } else
21097c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.name,
21107c478bd9Sstevel@tonic-gate "%s/", name);
21117c478bd9Sstevel@tonic-gate
21127c478bd9Sstevel@tonic-gate /*
21137c478bd9Sstevel@tonic-gate * need to recalculate checksum
21147c478bd9Sstevel@tonic-gate * because the name changed.
21157c478bd9Sstevel@tonic-gate */
21167c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum,
21177c478bd9Sstevel@tonic-gate "%07o", checksum(&dblock));
21187c478bd9Sstevel@tonic-gate }
21197c478bd9Sstevel@tonic-gate }
21207c478bd9Sstevel@tonic-gate
2121da6c28aaSamw if (put_extra_attributes(longname, shortname,
2122da6c28aaSamw longattrname, prefix, filetype, '5') != 0)
21237c478bd9Sstevel@tonic-gate goto out;
21247c478bd9Sstevel@tonic-gate
21257c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
21267c478bd9Sstevel@tonic-gate /*
21277c478bd9Sstevel@tonic-gate * Reset header typeflag when archiving directory, since
21287c478bd9Sstevel@tonic-gate * build_dblock changed it on us.
21297c478bd9Sstevel@tonic-gate */
21307c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) {
21317c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = _XATTR_HDRTYPE;
21327c478bd9Sstevel@tonic-gate } else {
21337c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '5';
21347c478bd9Sstevel@tonic-gate }
21357c478bd9Sstevel@tonic-gate #else
21367c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '5';
21377c478bd9Sstevel@tonic-gate #endif
21387c478bd9Sstevel@tonic-gate
21397c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o",
21407c478bd9Sstevel@tonic-gate checksum(&dblock));
21417c478bd9Sstevel@tonic-gate
21427c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1);
21437c478bd9Sstevel@tonic-gate }
21447c478bd9Sstevel@tonic-gate if (vflag) {
2145*28c4d110SJoshua M. Clulow if (NotTape) {
2146*28c4d110SJoshua M. Clulow dlog("seek = %" FMT_blkcnt_t "K\n", K(tapepos));
2147*28c4d110SJoshua M. Clulow }
21487c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE && Hiddendir) {
21498e4a71aeSRich Burridge (void) fprintf(vfile,
21508e4a71aeSRich Burridge gettext("a %s attribute %s "),
2151da6c28aaSamw longname, longattrname);
21527c478bd9Sstevel@tonic-gate
21537c478bd9Sstevel@tonic-gate } else {
21547c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "a %s/ ", longname);
21557c478bd9Sstevel@tonic-gate }
2156*28c4d110SJoshua M. Clulow if (NotTape) {
21577c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n",
21587c478bd9Sstevel@tonic-gate K(blocks));
2159*28c4d110SJoshua M. Clulow } else {
21607c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" FMT_blkcnt_t
21617c478bd9Sstevel@tonic-gate " tape blocks\n"), blocks);
21627c478bd9Sstevel@tonic-gate }
2163*28c4d110SJoshua M. Clulow }
21647c478bd9Sstevel@tonic-gate
21657c478bd9Sstevel@tonic-gate /*
21667c478bd9Sstevel@tonic-gate * If hidden dir then break now since xattrs_put() will do
21677c478bd9Sstevel@tonic-gate * the iterating of the directory.
21687c478bd9Sstevel@tonic-gate *
2169da6c28aaSamw * At the moment, there can only be system attributes on
2170da6c28aaSamw * attributes. There can be no attributes on attributes or
2171da6c28aaSamw * directories within the attributes hidden directory hierarchy.
21727c478bd9Sstevel@tonic-gate */
21737c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE)
21747c478bd9Sstevel@tonic-gate break;
21757c478bd9Sstevel@tonic-gate
21767c478bd9Sstevel@tonic-gate if (*shortname != '/')
21777c478bd9Sstevel@tonic-gate (void) sprintf(newparent, "%s/%s", parent, shortname);
21787c478bd9Sstevel@tonic-gate else
21797c478bd9Sstevel@tonic-gate (void) sprintf(newparent, "%s", shortname);
21807c478bd9Sstevel@tonic-gate
2181b25dbf38SRich Burridge if (tar_chdir(shortname) < 0) {
21827c478bd9Sstevel@tonic-gate vperror(0, "%s", newparent);
21837c478bd9Sstevel@tonic-gate goto out;
21847c478bd9Sstevel@tonic-gate }
21857c478bd9Sstevel@tonic-gate
21867c478bd9Sstevel@tonic-gate if ((dirp = opendir(".")) == NULL) {
21877c478bd9Sstevel@tonic-gate vperror(0, gettext(
21887c478bd9Sstevel@tonic-gate "can't open directory %s"), longname);
2189b25dbf38SRich Burridge if (tar_chdir(parent) < 0)
21907c478bd9Sstevel@tonic-gate vperror(0, gettext("cannot change back?: %s"),
21917c478bd9Sstevel@tonic-gate parent);
21927c478bd9Sstevel@tonic-gate goto out;
21937c478bd9Sstevel@tonic-gate }
21947c478bd9Sstevel@tonic-gate
21955e2174acSceastha /*
21965e2174acSceastha * Create a list of files (children) in this directory to avoid
21975e2174acSceastha * having to perform telldir()/seekdir().
21985e2174acSceastha */
21997c478bd9Sstevel@tonic-gate while ((dp = readdir(dirp)) != NULL && !term) {
22007c478bd9Sstevel@tonic-gate if ((strcmp(".", dp->d_name) == 0) ||
22017c478bd9Sstevel@tonic-gate (strcmp("..", dp->d_name) == 0))
22027c478bd9Sstevel@tonic-gate continue;
22035e2174acSceastha if (((cptr = (file_list_t *)calloc(sizeof (char),
22045e2174acSceastha sizeof (file_list_t))) == NULL) ||
22055e2174acSceastha ((cptr->name = strdup(dp->d_name)) == NULL)) {
22065e2174acSceastha vperror(1, gettext(
22075e2174acSceastha "Insufficient memory for directory "
22085e2174acSceastha "list entry %s/%s\n"),
22095e2174acSceastha newparent, dp->d_name);
22105e2174acSceastha }
22117c478bd9Sstevel@tonic-gate
22125e2174acSceastha /* Add the file to the list */
22135e2174acSceastha if (child == NULL) {
22145e2174acSceastha child = cptr;
22155e2174acSceastha } else {
22165e2174acSceastha child_end->next = cptr;
22175e2174acSceastha }
22185e2174acSceastha child_end = cptr;
22195e2174acSceastha }
22205e2174acSceastha (void) closedir(dirp);
22215e2174acSceastha
22225e2174acSceastha /*
22235e2174acSceastha * Archive each of the files in the current directory.
22245e2174acSceastha * If a file is a directory, putfile() is called
22255e2174acSceastha * recursively to archive the file hierarchy of the
22265e2174acSceastha * directory before archiving the next file in the
22275e2174acSceastha * current directory.
22285e2174acSceastha */
22295e2174acSceastha while ((child != NULL) && !term) {
22305e2174acSceastha (void) strcpy(cp, child->name);
2231da6c28aaSamw archtype = putfile(buf, cp, newparent, NULL,
22327c478bd9Sstevel@tonic-gate NORMAL_FILE, lev + 1, symlink_lev);
22337c478bd9Sstevel@tonic-gate
22347c478bd9Sstevel@tonic-gate if (!exitflag) {
2235da6c28aaSamw if ((atflag || saflag) &&
2236da6c28aaSamw (archtype == PUT_NOTAS_LINK)) {
2237da6c28aaSamw xattrs_put(buf, cp, newparent, NULL);
22387c478bd9Sstevel@tonic-gate }
22397c478bd9Sstevel@tonic-gate }
22407c478bd9Sstevel@tonic-gate if (exitflag)
22417c478bd9Sstevel@tonic-gate break;
22427c478bd9Sstevel@tonic-gate
22435e2174acSceastha /* Free each child as we are done processing it. */
22445e2174acSceastha cptr = child;
22455e2174acSceastha child = child->next;
22465e2174acSceastha free(cptr->name);
22475e2174acSceastha free(cptr);
22487c478bd9Sstevel@tonic-gate }
22495e2174acSceastha if ((child != NULL) && !term) {
22505e2174acSceastha free_children(child);
22517c478bd9Sstevel@tonic-gate }
22527c478bd9Sstevel@tonic-gate
2253b25dbf38SRich Burridge if (tar_chdir(parent) < 0) {
22547c478bd9Sstevel@tonic-gate vperror(0, gettext("cannot change back?: %s"), parent);
22557c478bd9Sstevel@tonic-gate }
22567c478bd9Sstevel@tonic-gate
22577c478bd9Sstevel@tonic-gate break;
22587c478bd9Sstevel@tonic-gate
22597c478bd9Sstevel@tonic-gate case S_IFLNK:
22607c478bd9Sstevel@tonic-gate readlink_max = NAMSIZ;
22617c478bd9Sstevel@tonic-gate if (stbuf.st_size > NAMSIZ) {
22627c478bd9Sstevel@tonic-gate if (Eflag > 0) {
22637c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_LINKPATH;
22647c478bd9Sstevel@tonic-gate readlink_max = PATH_MAX;
22657c478bd9Sstevel@tonic-gate } else {
22667c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
22677c478bd9Sstevel@tonic-gate "tar: %s: symbolic link too long\n"),
22687c478bd9Sstevel@tonic-gate longname);
22697c478bd9Sstevel@tonic-gate if (errflag)
22707c478bd9Sstevel@tonic-gate exitflag = 1;
22717c478bd9Sstevel@tonic-gate Errflg = 1;
22727c478bd9Sstevel@tonic-gate goto out;
22737c478bd9Sstevel@tonic-gate }
22747c478bd9Sstevel@tonic-gate }
22757c478bd9Sstevel@tonic-gate /*
22767c478bd9Sstevel@tonic-gate * Sym-links need header size of zero since you
22777c478bd9Sstevel@tonic-gate * don't store any data for this type.
22787c478bd9Sstevel@tonic-gate */
22797c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0;
22807c478bd9Sstevel@tonic-gate tomodes(&stbuf);
22817c478bd9Sstevel@tonic-gate i = readlink(shortname, filetmp, readlink_max);
22827c478bd9Sstevel@tonic-gate if (i < 0) {
22837c478bd9Sstevel@tonic-gate vperror(0, gettext(
22847c478bd9Sstevel@tonic-gate "can't read symbolic link %s"), longname);
22857c478bd9Sstevel@tonic-gate goto out;
22867c478bd9Sstevel@tonic-gate } else {
22877c478bd9Sstevel@tonic-gate filetmp[i] = 0;
22887c478bd9Sstevel@tonic-gate }
22897c478bd9Sstevel@tonic-gate if (vflag)
22907c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
22917c478bd9Sstevel@tonic-gate "a %s symbolic link to %s\n"),
22927c478bd9Sstevel@tonic-gate longname, filetmp);
22937c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) {
22947c478bd9Sstevel@tonic-gate Xtarhdr.x_linkpath = filetmp;
22957c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '2', filetype, &stbuf,
22967c478bd9Sstevel@tonic-gate stbuf.st_dev, prefix) != 0)
22977c478bd9Sstevel@tonic-gate goto out;
22987c478bd9Sstevel@tonic-gate } else
22997c478bd9Sstevel@tonic-gate if (build_dblock(name, filetmp, '2', filetype, &stbuf,
23007c478bd9Sstevel@tonic-gate stbuf.st_dev, prefix) != 0)
23017c478bd9Sstevel@tonic-gate goto out;
23027c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1);
23037c478bd9Sstevel@tonic-gate /*
23047c478bd9Sstevel@tonic-gate * No acls for symlinks: mode is always 777
23057c478bd9Sstevel@tonic-gate * dont call write ancillary
23067c478bd9Sstevel@tonic-gate */
23077c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK;
23087c478bd9Sstevel@tonic-gate break;
23097c478bd9Sstevel@tonic-gate case S_IFREG:
23107c478bd9Sstevel@tonic-gate if ((infile = openat(dirfd, shortname, 0)) < 0) {
23118e4a71aeSRich Burridge vperror(0, gettext("unable to open %s%s%s%s"), longname,
2312da6c28aaSamw rw_sysattr ? gettext(" system") : "",
23137c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ?
23147c478bd9Sstevel@tonic-gate gettext(" attribute ") : "",
2315da6c28aaSamw (filetype == XATTR_FILE) ? (longattrname == NULL) ?
2316da6c28aaSamw shortname : longattrname : "");
23177c478bd9Sstevel@tonic-gate goto out;
23187c478bd9Sstevel@tonic-gate }
23197c478bd9Sstevel@tonic-gate
23207c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size);
23217c478bd9Sstevel@tonic-gate
2322da6c28aaSamw if (put_link(name, longname, shortname, longattrname,
23237c478bd9Sstevel@tonic-gate prefix, filetype, '1') == 0) {
23247c478bd9Sstevel@tonic-gate (void) close(infile);
23257c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK;
23267c478bd9Sstevel@tonic-gate goto out;
23277c478bd9Sstevel@tonic-gate }
23287c478bd9Sstevel@tonic-gate
23297c478bd9Sstevel@tonic-gate tomodes(&stbuf);
23307c478bd9Sstevel@tonic-gate
23317c478bd9Sstevel@tonic-gate /* correctly handle end of volume */
23327c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) {
23337c478bd9Sstevel@tonic-gate /* split if floppy has some room and file is large */
23347c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) &&
23357c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) {
23367c478bd9Sstevel@tonic-gate splitfile(longname, infile,
23377c478bd9Sstevel@tonic-gate name, prefix, filetype);
23387c478bd9Sstevel@tonic-gate (void) close(dirfd);
23397c478bd9Sstevel@tonic-gate (void) close(infile);
23407c478bd9Sstevel@tonic-gate goto out;
23417c478bd9Sstevel@tonic-gate }
23427c478bd9Sstevel@tonic-gate newvol(); /* not worth it--just get new volume */
23437c478bd9Sstevel@tonic-gate }
2344*28c4d110SJoshua M. Clulow dlog("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname,
23457c478bd9Sstevel@tonic-gate blocks);
23467c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '0', filetype,
23477c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) {
23487c478bd9Sstevel@tonic-gate goto out;
23497c478bd9Sstevel@tonic-gate }
23507c478bd9Sstevel@tonic-gate if (vflag) {
2351*28c4d110SJoshua M. Clulow if (NotTape) {
2352*28c4d110SJoshua M. Clulow dlog("seek = %" FMT_blkcnt_t "K\n", K(tapepos));
2353*28c4d110SJoshua M. Clulow }
2354da6c28aaSamw (void) fprintf(vfile, "a %s%s%s%s ", longname,
2355da6c28aaSamw rw_sysattr ? gettext(" system") : "",
2356da6c28aaSamw (filetype == XATTR_FILE) ? gettext(
2357da6c28aaSamw " attribute ") : "",
23587c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ?
2359da6c28aaSamw longattrname : "");
23607c478bd9Sstevel@tonic-gate if (NotTape)
23617c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n",
23627c478bd9Sstevel@tonic-gate K(blocks));
23637c478bd9Sstevel@tonic-gate else
23647c478bd9Sstevel@tonic-gate (void) fprintf(vfile,
23657c478bd9Sstevel@tonic-gate gettext("%" FMT_blkcnt_t " tape blocks\n"),
23667c478bd9Sstevel@tonic-gate blocks);
23677c478bd9Sstevel@tonic-gate }
23687c478bd9Sstevel@tonic-gate
2369da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname,
2370da6c28aaSamw prefix, filetype, '0') != 0)
23717c478bd9Sstevel@tonic-gate goto out;
23727c478bd9Sstevel@tonic-gate
23737c478bd9Sstevel@tonic-gate /*
23747c478bd9Sstevel@tonic-gate * No need to reset typeflag for extended attribute here, since
23757c478bd9Sstevel@tonic-gate * put_extra_attributes already set it and we haven't called
23767c478bd9Sstevel@tonic-gate * build_dblock().
23777c478bd9Sstevel@tonic-gate */
23787c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock));
23797c478bd9Sstevel@tonic-gate hint = writetbuf((char *)&dblock, 1);
2380eace40a5Sceastha maxread = max(min(stbuf.st_blksize, stbuf.st_size),
2381eace40a5Sceastha (nblock * TBLOCK));
23827c478bd9Sstevel@tonic-gate if ((bigbuf = calloc((unsigned)maxread, sizeof (char))) == 0) {
23837c478bd9Sstevel@tonic-gate maxread = TBLOCK;
23847c478bd9Sstevel@tonic-gate bigbuf = buf;
23857c478bd9Sstevel@tonic-gate }
23867c478bd9Sstevel@tonic-gate
23877c478bd9Sstevel@tonic-gate while (((i = (int)
23887c478bd9Sstevel@tonic-gate read(infile, bigbuf, min((hint*TBLOCK), maxread))) > 0) &&
23897c478bd9Sstevel@tonic-gate blocks) {
23907c478bd9Sstevel@tonic-gate blkcnt_t nblks;
23917c478bd9Sstevel@tonic-gate
23927c478bd9Sstevel@tonic-gate nblks = ((i-1)/TBLOCK)+1;
23937c478bd9Sstevel@tonic-gate if (nblks > blocks)
23947c478bd9Sstevel@tonic-gate nblks = blocks;
23957c478bd9Sstevel@tonic-gate hint = writetbuf(bigbuf, nblks);
23967c478bd9Sstevel@tonic-gate blocks -= nblks;
23977c478bd9Sstevel@tonic-gate }
23987c478bd9Sstevel@tonic-gate (void) close(infile);
23997c478bd9Sstevel@tonic-gate if (bigbuf != buf)
24007c478bd9Sstevel@tonic-gate free(bigbuf);
24017c478bd9Sstevel@tonic-gate if (i < 0)
24027c478bd9Sstevel@tonic-gate vperror(0, gettext("Read error on %s"), longname);
24037c478bd9Sstevel@tonic-gate else if (blocks != 0 || i != 0) {
24047c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
24057c478bd9Sstevel@tonic-gate "tar: %s: file changed size\n"), longname);
24067c478bd9Sstevel@tonic-gate if (errflag) {
24077c478bd9Sstevel@tonic-gate exitflag = 1;
24087c478bd9Sstevel@tonic-gate Errflg = 1;
24097c478bd9Sstevel@tonic-gate } else if (!Dflag) {
24107c478bd9Sstevel@tonic-gate Errflg = 1;
24117c478bd9Sstevel@tonic-gate }
24127c478bd9Sstevel@tonic-gate }
24137c478bd9Sstevel@tonic-gate putempty(blocks);
24147c478bd9Sstevel@tonic-gate break;
24157c478bd9Sstevel@tonic-gate case S_IFIFO:
24167c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size);
24177c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0;
24187c478bd9Sstevel@tonic-gate
2419da6c28aaSamw if (put_link(name, longname, shortname, longattrname,
24207c478bd9Sstevel@tonic-gate prefix, filetype, '6') == 0) {
24217c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK;
24227c478bd9Sstevel@tonic-gate goto out;
24237c478bd9Sstevel@tonic-gate }
24247c478bd9Sstevel@tonic-gate tomodes(&stbuf);
24257c478bd9Sstevel@tonic-gate
24267c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) {
24277c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) &&
24287c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) {
24297c478bd9Sstevel@tonic-gate splitfile(longname, infile, name,
24307c478bd9Sstevel@tonic-gate prefix, filetype);
24317c478bd9Sstevel@tonic-gate (void) close(dirfd);
24327c478bd9Sstevel@tonic-gate (void) close(infile);
24337c478bd9Sstevel@tonic-gate goto out;
24347c478bd9Sstevel@tonic-gate }
24357c478bd9Sstevel@tonic-gate newvol();
24367c478bd9Sstevel@tonic-gate }
2437*28c4d110SJoshua M. Clulow dlog("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname,
24387c478bd9Sstevel@tonic-gate blocks);
24397c478bd9Sstevel@tonic-gate if (vflag) {
2440*28c4d110SJoshua M. Clulow if (NotTape) {
2441*28c4d110SJoshua M. Clulow dlog("seek = %" FMT_blkcnt_t "K\n", K(tapepos));
2442*28c4d110SJoshua M. Clulow
24437c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %"
24447c478bd9Sstevel@tonic-gate FMT_blkcnt_t "K\n "), longname, K(blocks));
2445*28c4d110SJoshua M. Clulow } else {
24467c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
24477c478bd9Sstevel@tonic-gate "a %s %" FMT_blkcnt_t " tape blocks\n"),
24487c478bd9Sstevel@tonic-gate longname, blocks);
24497c478bd9Sstevel@tonic-gate }
2450*28c4d110SJoshua M. Clulow }
24517c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '6', filetype,
24527c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0)
24537c478bd9Sstevel@tonic-gate goto out;
24547c478bd9Sstevel@tonic-gate
2455da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname,
2456da6c28aaSamw prefix, filetype, '6') != 0)
24577c478bd9Sstevel@tonic-gate goto out;
24587c478bd9Sstevel@tonic-gate
24597c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock));
24607c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '6';
24617c478bd9Sstevel@tonic-gate
24627c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1);
24637c478bd9Sstevel@tonic-gate break;
24647c478bd9Sstevel@tonic-gate case S_IFCHR:
24657c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0;
24667c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size);
2467da6c28aaSamw if (put_link(name, longname, shortname, longattrname,
2468da6c28aaSamw prefix, filetype, '3') == 0) {
24697c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK;
24707c478bd9Sstevel@tonic-gate goto out;
24717c478bd9Sstevel@tonic-gate }
24727c478bd9Sstevel@tonic-gate tomodes(&stbuf);
24737c478bd9Sstevel@tonic-gate
24747c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) {
24757c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) &&
24767c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) {
24777c478bd9Sstevel@tonic-gate splitfile(longname, infile, name,
24787c478bd9Sstevel@tonic-gate prefix, filetype);
24797c478bd9Sstevel@tonic-gate (void) close(dirfd);
24807c478bd9Sstevel@tonic-gate goto out;
24817c478bd9Sstevel@tonic-gate }
24827c478bd9Sstevel@tonic-gate newvol();
24837c478bd9Sstevel@tonic-gate }
2484*28c4d110SJoshua M. Clulow dlog("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname,
24857c478bd9Sstevel@tonic-gate blocks);
24867c478bd9Sstevel@tonic-gate if (vflag) {
2487*28c4d110SJoshua M. Clulow if (NotTape) {
2488*28c4d110SJoshua M. Clulow dlog("seek = %" FMT_blkcnt_t "K\t", K(tapepos));
2489*28c4d110SJoshua M. Clulow
24907c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %"
24917c478bd9Sstevel@tonic-gate FMT_blkcnt_t "K\n"), longname, K(blocks));
2492*28c4d110SJoshua M. Clulow } else {
24937c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %"
24947c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), longname,
24957c478bd9Sstevel@tonic-gate blocks);
24967c478bd9Sstevel@tonic-gate }
2497*28c4d110SJoshua M. Clulow }
24987c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '3',
24997c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_rdev, prefix) != 0)
25007c478bd9Sstevel@tonic-gate goto out;
25017c478bd9Sstevel@tonic-gate
2502da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname,
25037c478bd9Sstevel@tonic-gate prefix, filetype, '3') != 0)
25047c478bd9Sstevel@tonic-gate goto out;
25057c478bd9Sstevel@tonic-gate
25067c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock));
25077c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '3';
25087c478bd9Sstevel@tonic-gate
25097c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1);
25107c478bd9Sstevel@tonic-gate break;
25117c478bd9Sstevel@tonic-gate case S_IFBLK:
25127c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0;
25137c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size);
2514da6c28aaSamw if (put_link(name, longname, shortname, longattrname,
2515da6c28aaSamw prefix, filetype, '4') == 0) {
25167c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK;
25177c478bd9Sstevel@tonic-gate goto out;
25187c478bd9Sstevel@tonic-gate }
25197c478bd9Sstevel@tonic-gate tomodes(&stbuf);
25207c478bd9Sstevel@tonic-gate
25217c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) {
25227c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) &&
25237c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) {
25247c478bd9Sstevel@tonic-gate splitfile(longname, infile,
25257c478bd9Sstevel@tonic-gate name, prefix, filetype);
25267c478bd9Sstevel@tonic-gate (void) close(dirfd);
25277c478bd9Sstevel@tonic-gate goto out;
25287c478bd9Sstevel@tonic-gate }
25297c478bd9Sstevel@tonic-gate newvol();
25307c478bd9Sstevel@tonic-gate }
2531*28c4d110SJoshua M. Clulow dlog("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname,
25327c478bd9Sstevel@tonic-gate blocks);
25337c478bd9Sstevel@tonic-gate if (vflag) {
2534*28c4d110SJoshua M. Clulow if (NotTape) {
2535*28c4d110SJoshua M. Clulow dlog("seek = %" FMT_blkcnt_t "K\n", K(tapepos));
2536*28c4d110SJoshua M. Clulow }
2537*28c4d110SJoshua M. Clulow
25387c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "a %s ", longname);
25397c478bd9Sstevel@tonic-gate if (NotTape)
25407c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n",
25417c478bd9Sstevel@tonic-gate K(blocks));
25427c478bd9Sstevel@tonic-gate else
25437c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%"
25447c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), blocks);
25457c478bd9Sstevel@tonic-gate }
25467c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '4',
25477c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_rdev, prefix) != 0)
25487c478bd9Sstevel@tonic-gate goto out;
25497c478bd9Sstevel@tonic-gate
2550da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname,
25517c478bd9Sstevel@tonic-gate prefix, filetype, '4') != 0)
25527c478bd9Sstevel@tonic-gate goto out;
25537c478bd9Sstevel@tonic-gate
25547c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock));
25557c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '4';
25567c478bd9Sstevel@tonic-gate
25577c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1);
25587c478bd9Sstevel@tonic-gate break;
25597c478bd9Sstevel@tonic-gate default:
25607c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
25617c478bd9Sstevel@tonic-gate "tar: %s is not a file. Not dumped\n"), longname);
25627c478bd9Sstevel@tonic-gate if (errflag)
25637c478bd9Sstevel@tonic-gate exitflag = 1;
25647c478bd9Sstevel@tonic-gate Errflg = 1;
25657c478bd9Sstevel@tonic-gate goto out;
25667c478bd9Sstevel@tonic-gate }
25677c478bd9Sstevel@tonic-gate
25687c478bd9Sstevel@tonic-gate out:
2569da6c28aaSamw if ((dirfd != -1) && (filetype != XATTR_FILE)) {
25707c478bd9Sstevel@tonic-gate (void) close(dirfd);
25717c478bd9Sstevel@tonic-gate }
25727c478bd9Sstevel@tonic-gate return (rc);
25737c478bd9Sstevel@tonic-gate }
25747c478bd9Sstevel@tonic-gate
25757c478bd9Sstevel@tonic-gate
25767c478bd9Sstevel@tonic-gate /*
25777c478bd9Sstevel@tonic-gate * splitfile dump a large file across volumes
25787c478bd9Sstevel@tonic-gate *
25797c478bd9Sstevel@tonic-gate * splitfile(longname, fd);
25807c478bd9Sstevel@tonic-gate * char *longname; full name of file
25817c478bd9Sstevel@tonic-gate * int ifd; input file descriptor
25827c478bd9Sstevel@tonic-gate *
25837c478bd9Sstevel@tonic-gate * NOTE: only called by putfile() to dump a large file.
25847c478bd9Sstevel@tonic-gate */
25857c478bd9Sstevel@tonic-gate
25867c478bd9Sstevel@tonic-gate static void
splitfile(char * longname,int ifd,char * name,char * prefix,int filetype)25877c478bd9Sstevel@tonic-gate splitfile(char *longname, int ifd, char *name, char *prefix, int filetype)
25887c478bd9Sstevel@tonic-gate {
25897c478bd9Sstevel@tonic-gate blkcnt_t blocks;
25907c478bd9Sstevel@tonic-gate off_t bytes, s;
25917c478bd9Sstevel@tonic-gate char buf[TBLOCK];
25927c478bd9Sstevel@tonic-gate int i, extents;
25937c478bd9Sstevel@tonic-gate
25947c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); /* blocks file needs */
25957c478bd9Sstevel@tonic-gate
25967c478bd9Sstevel@tonic-gate /*
25977c478bd9Sstevel@tonic-gate * # extents =
25987c478bd9Sstevel@tonic-gate * size of file after using up rest of this floppy
25997c478bd9Sstevel@tonic-gate * blocks - (blocklim - tapepos) + 1 (for header)
26007c478bd9Sstevel@tonic-gate * plus roundup value before divide by blocklim-1
26017c478bd9Sstevel@tonic-gate * + (blocklim - 1) - 1
26027c478bd9Sstevel@tonic-gate * all divided by blocklim-1 (one block for each header).
26037c478bd9Sstevel@tonic-gate * this gives
26047c478bd9Sstevel@tonic-gate * (blocks - blocklim + tapepos + 1 + blocklim - 2)/(blocklim-1)
26057c478bd9Sstevel@tonic-gate * which reduces to the expression used.
26067c478bd9Sstevel@tonic-gate * one is added to account for this first extent.
26077c478bd9Sstevel@tonic-gate *
26087c478bd9Sstevel@tonic-gate * When one is dealing with extremely large archives, one may want
26097c478bd9Sstevel@tonic-gate * to allow for a large number of extents. This code should be
26107c478bd9Sstevel@tonic-gate * revisited to determine if extents should be changed to something
26117c478bd9Sstevel@tonic-gate * larger than an int.
26127c478bd9Sstevel@tonic-gate */
26137c478bd9Sstevel@tonic-gate extents = (int)((blocks + tapepos - 1ULL)/(blocklim - 1ULL) + 1);
26147c478bd9Sstevel@tonic-gate
26157c478bd9Sstevel@tonic-gate if (extents < 2 || extents > MAXEXT) { /* let's be reasonable */
26167c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
26177c478bd9Sstevel@tonic-gate "tar: %s needs unusual number of volumes to split\n"
26187c478bd9Sstevel@tonic-gate "tar: %s not dumped\n"), longname, longname);
26197c478bd9Sstevel@tonic-gate return;
26207c478bd9Sstevel@tonic-gate }
26217c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '0', filetype,
26227c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0)
26237c478bd9Sstevel@tonic-gate return;
26247c478bd9Sstevel@tonic-gate
26257c478bd9Sstevel@tonic-gate dblock.dbuf.extotal = extents;
26267c478bd9Sstevel@tonic-gate bytes = stbuf.st_size;
26277c478bd9Sstevel@tonic-gate
26287c478bd9Sstevel@tonic-gate /*
26297c478bd9Sstevel@tonic-gate * The value contained in dblock.dbuf.efsize was formerly used when the
26307c478bd9Sstevel@tonic-gate * v flag was specified in conjunction with the t flag. Although it is
26317c478bd9Sstevel@tonic-gate * no longer used, older versions of tar will expect the former
26327c478bd9Sstevel@tonic-gate * behaviour, so we must continue to write it to the archive.
26337c478bd9Sstevel@tonic-gate *
26347c478bd9Sstevel@tonic-gate * Since dblock.dbuf.efsize is 10 chars in size, the maximum value it
26357c478bd9Sstevel@tonic-gate * can store is TAR_EFSIZE_MAX. If bytes exceeds that value, simply
26367c478bd9Sstevel@tonic-gate * store 0.
26377c478bd9Sstevel@tonic-gate */
26387c478bd9Sstevel@tonic-gate if (bytes <= TAR_EFSIZE_MAX)
26397c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.efsize, "%9" FMT_off_t_o, bytes);
26407c478bd9Sstevel@tonic-gate else
26417c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.efsize, "%9" FMT_off_t_o, (off_t)0);
26427c478bd9Sstevel@tonic-gate
26437c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
26447c478bd9Sstevel@tonic-gate "tar: large file %s needs %d extents.\n"
26457c478bd9Sstevel@tonic-gate "tar: current device seek position = %" FMT_blkcnt_t "K\n"),
26467c478bd9Sstevel@tonic-gate longname, extents, K(tapepos));
26477c478bd9Sstevel@tonic-gate
26487c478bd9Sstevel@tonic-gate s = (off_t)(blocklim - tapepos - 1) * TBLOCK;
26497c478bd9Sstevel@tonic-gate for (i = 1; i <= extents; i++) {
26507c478bd9Sstevel@tonic-gate if (i > 1) {
26517c478bd9Sstevel@tonic-gate newvol();
26527c478bd9Sstevel@tonic-gate if (i == extents)
26537c478bd9Sstevel@tonic-gate s = bytes; /* last ext. gets true bytes */
26547c478bd9Sstevel@tonic-gate else
26557c478bd9Sstevel@tonic-gate s = (off_t)(blocklim - 1)*TBLOCK; /* all */
26567c478bd9Sstevel@tonic-gate }
26577c478bd9Sstevel@tonic-gate bytes -= s;
26587c478bd9Sstevel@tonic-gate blocks = TBLOCKS(s);
26597c478bd9Sstevel@tonic-gate
26607c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o, s);
26617c478bd9Sstevel@tonic-gate dblock.dbuf.extno = i;
26627c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock));
26637c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1);
26647c478bd9Sstevel@tonic-gate
26657c478bd9Sstevel@tonic-gate if (vflag)
26667c478bd9Sstevel@tonic-gate (void) fprintf(vfile,
26678e4a71aeSRich Burridge gettext("+++ a %s %" FMT_blkcnt_t
26688e4a71aeSRich Burridge "K [extent #%d of %d]\n"),
26697c478bd9Sstevel@tonic-gate longname, K(blocks), i, extents);
26707c478bd9Sstevel@tonic-gate while (blocks && read(ifd, buf, TBLOCK) > 0) {
26717c478bd9Sstevel@tonic-gate blocks--;
26727c478bd9Sstevel@tonic-gate (void) writetbuf(buf, 1);
26737c478bd9Sstevel@tonic-gate }
26747c478bd9Sstevel@tonic-gate if (blocks != 0) {
26757c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
26767c478bd9Sstevel@tonic-gate "tar: %s: file changed size\n"), longname);
26777c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
26787c478bd9Sstevel@tonic-gate "tar: aborting split file %s\n"), longname);
26797c478bd9Sstevel@tonic-gate (void) close(ifd);
26807c478bd9Sstevel@tonic-gate return;
26817c478bd9Sstevel@tonic-gate }
26827c478bd9Sstevel@tonic-gate }
26837c478bd9Sstevel@tonic-gate (void) close(ifd);
26847c478bd9Sstevel@tonic-gate if (vflag)
26857c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %" FMT_off_t "K (in %d "
26867c478bd9Sstevel@tonic-gate "extents)\n"), longname, K(TBLOCKS(stbuf.st_size)),
26877c478bd9Sstevel@tonic-gate extents);
26887c478bd9Sstevel@tonic-gate }
26897c478bd9Sstevel@tonic-gate
26907c478bd9Sstevel@tonic-gate /*
26917c478bd9Sstevel@tonic-gate * convtoreg - determines whether the file should be converted to a
26927c478bd9Sstevel@tonic-gate * regular file when extracted
26937c478bd9Sstevel@tonic-gate *
26947c478bd9Sstevel@tonic-gate * Returns 1 when file size > 0 and typeflag is not recognized
26957c478bd9Sstevel@tonic-gate * Otherwise returns 0
26967c478bd9Sstevel@tonic-gate */
26977c478bd9Sstevel@tonic-gate static int
convtoreg(off_t size)26987c478bd9Sstevel@tonic-gate convtoreg(off_t size)
26997c478bd9Sstevel@tonic-gate {
27007c478bd9Sstevel@tonic-gate if ((size > 0) && (dblock.dbuf.typeflag != '0') &&
27017c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != NULL) && (dblock.dbuf.typeflag != '1') &&
27027c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != '2') && (dblock.dbuf.typeflag != '3') &&
27037c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != '4') && (dblock.dbuf.typeflag != '5') &&
27047c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != '6') && (dblock.dbuf.typeflag != 'A') &&
2705e765faefSRich Burridge (dblock.dbuf.typeflag != 'L') &&
27067c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != _XATTR_HDRTYPE) &&
27077c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != 'X')) {
27087c478bd9Sstevel@tonic-gate return (1);
27097c478bd9Sstevel@tonic-gate }
27107c478bd9Sstevel@tonic-gate return (0);
27117c478bd9Sstevel@tonic-gate }
27127c478bd9Sstevel@tonic-gate
2713da6c28aaSamw #if defined(O_XATTR)
2714da6c28aaSamw static int
save_cwd(void)2715da6c28aaSamw save_cwd(void)
2716da6c28aaSamw {
2717da6c28aaSamw return (open(".", O_RDONLY));
2718da6c28aaSamw }
2719da6c28aaSamw #endif
2720da6c28aaSamw
2721da6c28aaSamw #if defined(O_XATTR)
2722da6c28aaSamw static void
rest_cwd(int * cwd)2723da6c28aaSamw rest_cwd(int *cwd)
2724da6c28aaSamw {
2725da6c28aaSamw if (*cwd != -1) {
2726da6c28aaSamw if (fchdir(*cwd) < 0) {
2727da6c28aaSamw vperror(0, gettext(
2728da6c28aaSamw "Cannot fchdir to attribute directory"));
2729da6c28aaSamw exit(1);
2730da6c28aaSamw }
2731da6c28aaSamw (void) close(*cwd);
2732da6c28aaSamw *cwd = -1;
2733da6c28aaSamw }
2734da6c28aaSamw }
2735da6c28aaSamw #endif
2736da6c28aaSamw
2737da6c28aaSamw /*
2738da6c28aaSamw * Verify the underlying file system supports the attribute type.
2739da6c28aaSamw * Only archive extended attribute files when '-@' was specified.
2740da6c28aaSamw * Only archive system extended attribute files if '-/' was specified.
2741da6c28aaSamw */
2742da6c28aaSamw #if defined(O_XATTR)
2743da6c28aaSamw static attr_status_t
verify_attr_support(char * filename,int attrflg,arc_action_t actflag,int * ext_attrflg)2744ced83f9bSceastha verify_attr_support(char *filename, int attrflg, arc_action_t actflag,
2745ced83f9bSceastha int *ext_attrflg)
2746da6c28aaSamw {
2747da6c28aaSamw /*
2748ced83f9bSceastha * Verify extended attributes are supported/exist. We only
2749ced83f9bSceastha * need to check if we are processing a base file, not an
2750ced83f9bSceastha * extended attribute.
2751da6c28aaSamw */
2752ced83f9bSceastha if (attrflg) {
2753ced83f9bSceastha *ext_attrflg = (pathconf(filename, (actflag == ARC_CREATE) ?
2754ced83f9bSceastha _PC_XATTR_EXISTS : _PC_XATTR_ENABLED) == 1);
2755ced83f9bSceastha }
2756ced83f9bSceastha
2757da6c28aaSamw if (atflag) {
2758ced83f9bSceastha if (!*ext_attrflg) {
2759da6c28aaSamw #if defined(_PC_SATTR_ENABLED)
2760da6c28aaSamw if (saflag) {
2761da6c28aaSamw /* Verify system attributes are supported */
2762da6c28aaSamw if (sysattr_support(filename,
2763da6c28aaSamw (actflag == ARC_CREATE) ? _PC_SATTR_EXISTS :
2764da6c28aaSamw _PC_SATTR_ENABLED) != 1) {
2765da6c28aaSamw return (ATTR_SATTR_ERR);
2766da6c28aaSamw }
2767da6c28aaSamw } else
2768da6c28aaSamw return (ATTR_XATTR_ERR);
2769da6c28aaSamw #else
2770da6c28aaSamw return (ATTR_XATTR_ERR);
2771da6c28aaSamw #endif /* _PC_SATTR_ENABLED */
2772da6c28aaSamw }
2773da6c28aaSamw
2774da6c28aaSamw #if defined(_PC_SATTR_ENABLED)
2775da6c28aaSamw } else if (saflag) {
2776da6c28aaSamw /* Verify system attributes are supported */
2777da6c28aaSamw if (sysattr_support(filename, (actflag == ARC_CREATE) ?
2778da6c28aaSamw _PC_SATTR_EXISTS : _PC_SATTR_ENABLED) != 1) {
2779da6c28aaSamw return (ATTR_SATTR_ERR);
2780da6c28aaSamw }
2781da6c28aaSamw #endif /* _PC_SATTR_ENABLED */
2782da6c28aaSamw } else {
2783da6c28aaSamw return (ATTR_SKIP);
2784da6c28aaSamw }
2785da6c28aaSamw
2786da6c28aaSamw return (ATTR_OK);
2787da6c28aaSamw }
2788da6c28aaSamw #endif
2789da6c28aaSamw
2790da6c28aaSamw #if defined(O_XATTR)
2791da6c28aaSamw /*
2792da6c28aaSamw * Recursively open attribute directories until the attribute directory
2793da6c28aaSamw * containing the specified attribute, attrname, is opened.
2794da6c28aaSamw *
2795da6c28aaSamw * Currently, only 2 directory levels of attributes are supported, (i.e.,
2796da6c28aaSamw * extended system attributes on extended attributes). The following are
2797da6c28aaSamw * the possible input combinations:
2798da6c28aaSamw * 1. Open the attribute directory of the base file (don't change
2799da6c28aaSamw * into it).
2800da6c28aaSamw * attrinfo->parent = NULL
2801da6c28aaSamw * attrname = '.'
2802da6c28aaSamw * 2. Open the attribute directory of the base file and change into it.
2803da6c28aaSamw * attrinfo->parent = NULL
2804da6c28aaSamw * attrname = <attr> | <sys_attr>
2805da6c28aaSamw * 3. Open the attribute directory of the base file, change into it,
2806da6c28aaSamw * then recursively call open_attr_dir() to open the attribute's
2807da6c28aaSamw * parent directory (don't change into it).
2808da6c28aaSamw * attrinfo->parent = <attr>
2809da6c28aaSamw * attrname = '.'
2810da6c28aaSamw * 4. Open the attribute directory of the base file, change into it,
2811da6c28aaSamw * then recursively call open_attr_dir() to open the attribute's
2812da6c28aaSamw * parent directory and change into it.
2813da6c28aaSamw * attrinfo->parent = <attr>
2814da6c28aaSamw * attrname = <attr> | <sys_attr>
2815da6c28aaSamw *
2816da6c28aaSamw * An attribute directory will be opened only if the underlying file system
2817da6c28aaSamw * supports the attribute type, and if the command line specifications (atflag
2818da6c28aaSamw * and saflag) enable the processing of the attribute type.
2819da6c28aaSamw *
2820da6c28aaSamw * On succesful return, attrinfo->parentfd will be the file descriptor of the
2821da6c28aaSamw * opened attribute directory. In addition, if the attribute is a read-write
2822da6c28aaSamw * extended system attribute, attrinfo->rw_sysattr will be set to 1, otherwise
2823da6c28aaSamw * it will be set to 0.
2824da6c28aaSamw *
2825da6c28aaSamw * Possible return values:
2826da6c28aaSamw * ATTR_OK Successfully opened and, if needed, changed into the
2827da6c28aaSamw * attribute directory containing attrname.
2828da6c28aaSamw * ATTR_SKIP The command line specifications don't enable the
2829da6c28aaSamw * processing of the attribute type.
2830da6c28aaSamw * ATTR_CHDIR_ERR An error occurred while trying to change into an
2831da6c28aaSamw * attribute directory.
2832da6c28aaSamw * ATTR_OPEN_ERR An error occurred while trying to open an
2833da6c28aaSamw * attribute directory.
2834da6c28aaSamw * ATTR_XATTR_ERR The underlying file system doesn't support extended
2835da6c28aaSamw * attributes.
2836da6c28aaSamw * ATTR_SATTR_ERR The underlying file system doesn't support extended
2837da6c28aaSamw * system attributes.
2838da6c28aaSamw */
2839da6c28aaSamw static int
open_attr_dir(char * attrname,char * dirp,int cwd,attr_data_t * attrinfo)2840da6c28aaSamw open_attr_dir(char *attrname, char *dirp, int cwd, attr_data_t *attrinfo)
2841da6c28aaSamw {
2842da6c28aaSamw attr_status_t rc;
2843da6c28aaSamw int firsttime = (attrinfo->attr_parentfd == -1);
2844da6c28aaSamw int saveerrno;
2845ced83f9bSceastha int ext_attr;
2846da6c28aaSamw
2847da6c28aaSamw /*
2848da6c28aaSamw * open_attr_dir() was recursively called (input combination number 4),
2849da6c28aaSamw * close the previously opened file descriptor as we've already changed
2850da6c28aaSamw * into it.
2851da6c28aaSamw */
2852da6c28aaSamw if (!firsttime) {
2853da6c28aaSamw (void) close(attrinfo->attr_parentfd);
2854da6c28aaSamw attrinfo->attr_parentfd = -1;
2855da6c28aaSamw }
2856da6c28aaSamw
2857da6c28aaSamw /*
2858da6c28aaSamw * Verify that the underlying file system supports the restoration
2859da6c28aaSamw * of the attribute.
2860da6c28aaSamw */
2861ced83f9bSceastha if ((rc = verify_attr_support(dirp, firsttime, ARC_RESTORE,
2862ced83f9bSceastha &ext_attr)) != ATTR_OK) {
2863da6c28aaSamw return (rc);
2864da6c28aaSamw }
2865da6c28aaSamw
2866da6c28aaSamw /* Open the base file's attribute directory */
2867da6c28aaSamw if ((attrinfo->attr_parentfd = attropen(dirp, ".", O_RDONLY)) == -1) {
2868da6c28aaSamw /*
2869da6c28aaSamw * Save the errno from the attropen so it can be reported
2870da6c28aaSamw * if the retry of the attropen fails.
2871da6c28aaSamw */
2872da6c28aaSamw saveerrno = errno;
2873da6c28aaSamw if ((attrinfo->attr_parentfd = retry_open_attr(-1, cwd, dirp,
2874da6c28aaSamw NULL, ".", O_RDONLY, 0)) == -1) {
2875da6c28aaSamw /*
2876da6c28aaSamw * Reset typeflag back to real value so passtape
2877da6c28aaSamw * will skip ahead correctly.
2878da6c28aaSamw */
2879da6c28aaSamw dblock.dbuf.typeflag = _XATTR_HDRTYPE;
2880da6c28aaSamw (void) close(attrinfo->attr_parentfd);
2881da6c28aaSamw attrinfo->attr_parentfd = -1;
2882da6c28aaSamw errno = saveerrno;
2883da6c28aaSamw return (ATTR_OPEN_ERR);
2884da6c28aaSamw }
2885da6c28aaSamw }
2886da6c28aaSamw
2887da6c28aaSamw /*
2888da6c28aaSamw * Change into the parent attribute's directory unless we are
2889da6c28aaSamw * processing the hidden attribute directory of the base file itself.
2890da6c28aaSamw */
2891da6c28aaSamw if ((Hiddendir == 0) || (firsttime && attrinfo->attr_parent != NULL)) {
2892da6c28aaSamw if (fchdir(attrinfo->attr_parentfd) != 0) {
2893da6c28aaSamw saveerrno = errno;
2894da6c28aaSamw (void) close(attrinfo->attr_parentfd);
2895da6c28aaSamw attrinfo->attr_parentfd = -1;
2896da6c28aaSamw errno = saveerrno;
2897da6c28aaSamw return (ATTR_CHDIR_ERR);
2898da6c28aaSamw }
2899da6c28aaSamw }
2900da6c28aaSamw
2901da6c28aaSamw /* Determine if the attribute should be processed */
2902da6c28aaSamw if ((rc = verify_attr(attrname, attrinfo->attr_parent, 1,
2903da6c28aaSamw &attrinfo->attr_rw_sysattr)) != ATTR_OK) {
2904da6c28aaSamw saveerrno = errno;
2905da6c28aaSamw (void) close(attrinfo->attr_parentfd);
2906da6c28aaSamw attrinfo->attr_parentfd = -1;
2907da6c28aaSamw errno = saveerrno;
2908da6c28aaSamw return (rc);
2909da6c28aaSamw }
2910da6c28aaSamw
2911da6c28aaSamw /*
2912da6c28aaSamw * If the attribute is an extended attribute, or extended system
2913da6c28aaSamw * attribute, of an attribute (i.e., <attr>/<sys_attr>), then
2914da6c28aaSamw * recursively call open_attr_dir() to open the attribute directory
2915da6c28aaSamw * of the parent attribute.
2916da6c28aaSamw */
2917da6c28aaSamw if (firsttime && (attrinfo->attr_parent != NULL)) {
2918da6c28aaSamw return (open_attr_dir(attrname, attrinfo->attr_parent,
2919da6c28aaSamw attrinfo->attr_parentfd, attrinfo));
2920da6c28aaSamw }
2921da6c28aaSamw
2922da6c28aaSamw return (ATTR_OK);
2923da6c28aaSamw }
2924da6c28aaSamw #endif
2925da6c28aaSamw
29267c478bd9Sstevel@tonic-gate static void
doxtract(char * argv[])29277c478bd9Sstevel@tonic-gate doxtract(char *argv[])
29287c478bd9Sstevel@tonic-gate {
29297c478bd9Sstevel@tonic-gate struct stat xtractbuf; /* stat on file after extracting */
29307c478bd9Sstevel@tonic-gate blkcnt_t blocks;
29317c478bd9Sstevel@tonic-gate off_t bytes;
29327c478bd9Sstevel@tonic-gate int ofile;
29337c478bd9Sstevel@tonic-gate int newfile; /* Does the file already exist */
29347c478bd9Sstevel@tonic-gate int xcnt = 0; /* count # files extracted */
29357c478bd9Sstevel@tonic-gate int fcnt = 0; /* count # files in argv list */
29367c478bd9Sstevel@tonic-gate int dir;
29377c478bd9Sstevel@tonic-gate int dirfd = -1;
2938da6c28aaSamw int cwd = -1;
2939ced83f9bSceastha int rw_sysattr;
2940da6c28aaSamw int saveerrno;
29417c478bd9Sstevel@tonic-gate uid_t Uid;
29427c478bd9Sstevel@tonic-gate char *namep, *dirp, *comp, *linkp; /* for removing absolute paths */
29437c478bd9Sstevel@tonic-gate char dirname[PATH_MAX+1];
29447c478bd9Sstevel@tonic-gate char templink[PATH_MAX+1]; /* temp link with terminating NULL */
29457c478bd9Sstevel@tonic-gate int once = 1;
29467c478bd9Sstevel@tonic-gate int error;
29477c478bd9Sstevel@tonic-gate int symflag;
29487c478bd9Sstevel@tonic-gate int want;
2949da6c28aaSamw attr_data_t *attrinfo = NULL; /* attribute info */
2950fa9e4066Sahrens acl_t *aclp = NULL; /* acl info */
295145916cd2Sjpk char dot[] = "."; /* dirp for using realpath */
29527c478bd9Sstevel@tonic-gate timestruc_t time_zero; /* used for call to doDirTimes */
29537c478bd9Sstevel@tonic-gate int dircreate;
29547c478bd9Sstevel@tonic-gate int convflag;
29557c478bd9Sstevel@tonic-gate time_zero.tv_sec = 0;
29567c478bd9Sstevel@tonic-gate time_zero.tv_nsec = 0;
29577c478bd9Sstevel@tonic-gate
295845916cd2Sjpk /* reset Trusted Extensions variables */
295945916cd2Sjpk rpath_flag = 0;
296045916cd2Sjpk lk_rpath_flag = 0;
296145916cd2Sjpk dir_flag = 0;
296245916cd2Sjpk mld_flag = 0;
296345916cd2Sjpk bslundef(&bs_label);
296445916cd2Sjpk bsllow(&admin_low);
296545916cd2Sjpk bslhigh(&admin_high);
296645916cd2Sjpk orig_namep = 0;
296745916cd2Sjpk
29687c478bd9Sstevel@tonic-gate dumping = 0; /* for newvol(), et al: we are not writing */
29697c478bd9Sstevel@tonic-gate
29707c478bd9Sstevel@tonic-gate Uid = getuid();
29717c478bd9Sstevel@tonic-gate
29727c478bd9Sstevel@tonic-gate for (;;) {
29737c478bd9Sstevel@tonic-gate convflag = 0;
29747c478bd9Sstevel@tonic-gate symflag = 0;
29757c478bd9Sstevel@tonic-gate dir = 0;
2976ced83f9bSceastha Hiddendir = 0;
2977ced83f9bSceastha rw_sysattr = 0;
29787c478bd9Sstevel@tonic-gate ofile = -1;
29797c478bd9Sstevel@tonic-gate
2980da6c28aaSamw if (dirfd != -1) {
2981da6c28aaSamw (void) close(dirfd);
2982da6c28aaSamw dirfd = -1;
2983da6c28aaSamw }
2984da6c28aaSamw if (ofile != -1) {
2985da6c28aaSamw if (close(ofile) != 0)
2986da6c28aaSamw vperror(2, gettext("close error"));
2987da6c28aaSamw }
2988da6c28aaSamw
29897c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
2990da6c28aaSamw if (cwd != -1) {
2991da6c28aaSamw rest_cwd(&cwd);
2992da6c28aaSamw }
2993da6c28aaSamw #endif
2994da6c28aaSamw
2995da6c28aaSamw /* namep is set by wantit to point to the full name */
2996da6c28aaSamw if ((want = wantit(argv, &namep, &dirp, &comp,
2997da6c28aaSamw &attrinfo)) == 0) {
2998da6c28aaSamw #if defined(O_XATTR)
2999da6c28aaSamw if (xattrp != NULL) {
30007c478bd9Sstevel@tonic-gate free(xattrhead);
30017c478bd9Sstevel@tonic-gate xattrp = NULL;
30027c478bd9Sstevel@tonic-gate xattr_linkp = NULL;
30037c478bd9Sstevel@tonic-gate xattrhead = NULL;
30047c478bd9Sstevel@tonic-gate }
30057c478bd9Sstevel@tonic-gate #endif
30067c478bd9Sstevel@tonic-gate continue;
30077c478bd9Sstevel@tonic-gate }
30087c478bd9Sstevel@tonic-gate if (want == -1)
30097c478bd9Sstevel@tonic-gate break;
30107c478bd9Sstevel@tonic-gate
301145916cd2Sjpk /* Trusted Extensions */
301245916cd2Sjpk /*
301345916cd2Sjpk * During tar extract (x):
301445916cd2Sjpk * If the pathname of the restored file has been
301545916cd2Sjpk * reconstructed from the ancillary file,
301645916cd2Sjpk * use it to process the normal file.
301745916cd2Sjpk */
301845916cd2Sjpk if (mld_flag) { /* Skip over .MLD. directory */
301945916cd2Sjpk mld_flag = 0;
302045916cd2Sjpk passtape();
302145916cd2Sjpk continue;
302245916cd2Sjpk }
302345916cd2Sjpk orig_namep = namep; /* save original */
302445916cd2Sjpk if (rpath_flag) {
302545916cd2Sjpk namep = real_path; /* use zone path */
302645916cd2Sjpk comp = real_path; /* use zone path */
302745916cd2Sjpk dirp = dot; /* work from the top */
302845916cd2Sjpk rpath_flag = 0; /* reset */
302945916cd2Sjpk }
303045916cd2Sjpk
30317c478bd9Sstevel@tonic-gate if (dirfd != -1)
30327c478bd9Sstevel@tonic-gate (void) close(dirfd);
30337c478bd9Sstevel@tonic-gate
30347c478bd9Sstevel@tonic-gate (void) strcpy(&dirname[0], namep);
30357c478bd9Sstevel@tonic-gate dircreate = checkdir(&dirname[0]);
30367c478bd9Sstevel@tonic-gate
30377c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
3038da6c28aaSamw if (xattrp != NULL) {
3039da6c28aaSamw int rc;
30407c478bd9Sstevel@tonic-gate
3041da6c28aaSamw if (((cwd = save_cwd()) == -1) ||
3042da6c28aaSamw ((rc = open_attr_dir(comp, dirp, cwd,
3043da6c28aaSamw attrinfo)) != ATTR_OK)) {
3044da6c28aaSamw if (cwd == -1) {
3045da6c28aaSamw vperror(0, gettext(
3046da6c28aaSamw "unable to save current working "
3047da6c28aaSamw "directory while processing "
3048da6c28aaSamw "attribute %s of %s"),
3049da6c28aaSamw dirp, attrinfo->attr_path);
3050da6c28aaSamw } else if (rc != ATTR_SKIP) {
3051d2443e76Smarks (void) fprintf(vfile,
3052d2443e76Smarks gettext("tar: cannot open "
3053da6c28aaSamw "%sattribute %s of file %s: %s\n"),
3054da6c28aaSamw attrinfo->attr_rw_sysattr ? gettext(
3055da6c28aaSamw "system ") : "",
3056da6c28aaSamw comp, dirp, strerror(errno));
3057da6c28aaSamw }
3058d2443e76Smarks free(xattrhead);
3059d2443e76Smarks xattrp = NULL;
3060d2443e76Smarks xattr_linkp = NULL;
3061d2443e76Smarks xattrhead = NULL;
3062da6c28aaSamw
30637c478bd9Sstevel@tonic-gate passtape();
30647c478bd9Sstevel@tonic-gate continue;
3065da6c28aaSamw } else {
3066da6c28aaSamw dirfd = attrinfo->attr_parentfd;
3067da6c28aaSamw rw_sysattr = attrinfo->attr_rw_sysattr;
30687c478bd9Sstevel@tonic-gate }
3069da6c28aaSamw } else {
3070da6c28aaSamw dirfd = open(dirp, O_RDONLY);
3071da6c28aaSamw }
3072da6c28aaSamw #else
3073da6c28aaSamw dirfd = open(dirp, O_RDONLY);
3074da6c28aaSamw #endif
3075da6c28aaSamw if (dirfd == -1) {
3076da6c28aaSamw (void) fprintf(vfile, gettext(
3077da6c28aaSamw "tar: cannot open %s: %s\n"),
3078da6c28aaSamw dirp, strerror(errno));
3079da6c28aaSamw passtape();
3080da6c28aaSamw continue;
30817c478bd9Sstevel@tonic-gate }
30827c478bd9Sstevel@tonic-gate
30837c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH)
30847c478bd9Sstevel@tonic-gate (void) strcpy(templink, Xtarhdr.x_linkpath);
30857c478bd9Sstevel@tonic-gate else {
30867c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
30877c478bd9Sstevel@tonic-gate if (xattrp && dblock.dbuf.typeflag == '1') {
30887c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ,
30897c478bd9Sstevel@tonic-gate xattrp->h_names);
30907c478bd9Sstevel@tonic-gate } else {
30917c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ,
30927c478bd9Sstevel@tonic-gate dblock.dbuf.linkname);
30937c478bd9Sstevel@tonic-gate }
30947c478bd9Sstevel@tonic-gate #else
30957c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ,
30967c478bd9Sstevel@tonic-gate dblock.dbuf.linkname);
30977c478bd9Sstevel@tonic-gate #endif
30987c478bd9Sstevel@tonic-gate }
30997c478bd9Sstevel@tonic-gate
31007c478bd9Sstevel@tonic-gate if (Fflag) {
31013a1dab68SRich Burridge if (checkf(namep, is_directory(namep), Fflag) == 0) {
31027c478bd9Sstevel@tonic-gate passtape();
31037c478bd9Sstevel@tonic-gate continue;
31047c478bd9Sstevel@tonic-gate }
31057c478bd9Sstevel@tonic-gate }
31067c478bd9Sstevel@tonic-gate
31077c478bd9Sstevel@tonic-gate if (checkw('x', namep) == 0) {
31087c478bd9Sstevel@tonic-gate passtape();
31097c478bd9Sstevel@tonic-gate continue;
31107c478bd9Sstevel@tonic-gate }
31117c478bd9Sstevel@tonic-gate if (once) {
31127c478bd9Sstevel@tonic-gate if (strcmp(dblock.dbuf.magic, magic_type) == 0) {
31137c478bd9Sstevel@tonic-gate if (geteuid() == (uid_t)0) {
31147c478bd9Sstevel@tonic-gate checkflag = 1;
31157c478bd9Sstevel@tonic-gate pflag = 1;
31167c478bd9Sstevel@tonic-gate } else {
31177c478bd9Sstevel@tonic-gate /* get file creation mask */
31187c478bd9Sstevel@tonic-gate Oumask = umask(0);
31197c478bd9Sstevel@tonic-gate (void) umask(Oumask);
31207c478bd9Sstevel@tonic-gate }
31217c478bd9Sstevel@tonic-gate once = 0;
31227c478bd9Sstevel@tonic-gate } else {
31237c478bd9Sstevel@tonic-gate if (geteuid() == (uid_t)0) {
31247c478bd9Sstevel@tonic-gate pflag = 1;
31257c478bd9Sstevel@tonic-gate checkflag = 2;
31267c478bd9Sstevel@tonic-gate }
31277c478bd9Sstevel@tonic-gate if (!pflag) {
31287c478bd9Sstevel@tonic-gate /* get file creation mask */
31297c478bd9Sstevel@tonic-gate Oumask = umask(0);
31307c478bd9Sstevel@tonic-gate (void) umask(Oumask);
31317c478bd9Sstevel@tonic-gate }
31327c478bd9Sstevel@tonic-gate once = 0;
31337c478bd9Sstevel@tonic-gate }
31347c478bd9Sstevel@tonic-gate }
31357c478bd9Sstevel@tonic-gate
31367c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
31377c478bd9Sstevel@tonic-gate /*
31387c478bd9Sstevel@tonic-gate * Handle extraction of hidden attr dir.
31397c478bd9Sstevel@tonic-gate * Dir is automatically created, we only
31407c478bd9Sstevel@tonic-gate * need to update mode and perm's.
31417c478bd9Sstevel@tonic-gate */
3142da6c28aaSamw if ((xattrp != NULL) && Hiddendir == 1) {
3143da6c28aaSamw bytes = stbuf.st_size;
3144da6c28aaSamw blocks = TBLOCKS(bytes);
3145da6c28aaSamw if (vflag) {
3146da6c28aaSamw (void) fprintf(vfile,
31478e4a71aeSRich Burridge "x %s%s%s, %" FMT_off_t " %s, ", namep,
3148da6c28aaSamw gettext(" attribute "),
31498e4a71aeSRich Burridge xattrapath, bytes,
31508e4a71aeSRich Burridge gettext("bytes"));
3151da6c28aaSamw if (NotTape)
3152da6c28aaSamw (void) fprintf(vfile,
3153da6c28aaSamw "%" FMT_blkcnt_t "K\n", K(blocks));
3154da6c28aaSamw else
3155da6c28aaSamw (void) fprintf(vfile, gettext("%"
3156da6c28aaSamw FMT_blkcnt_t " tape blocks\n"),
3157da6c28aaSamw blocks);
3158da6c28aaSamw }
3159da6c28aaSamw
3160da6c28aaSamw /*
3161da6c28aaSamw * Set the permissions and mode of the attribute
3162da6c28aaSamw * unless the attribute is a system attribute (can't
3163da6c28aaSamw * successfully do this) or the hidden attribute
3164da6c28aaSamw * directory (".") of an attribute (when the attribute
3165da6c28aaSamw * is restored, the hidden attribute directory of an
3166da6c28aaSamw * attribute is transient). Note: when the permissions
3167da6c28aaSamw * and mode are set for the hidden attribute directory
3168da6c28aaSamw * of a file on a system supporting extended system
3169da6c28aaSamw * attributes, even though it returns successfully, it
3170da6c28aaSamw * will not have any affect since the attribute
3171da6c28aaSamw * directory is transient.
3172da6c28aaSamw */
3173da6c28aaSamw if (attrinfo->attr_parent == NULL) {
31747c478bd9Sstevel@tonic-gate if (fchownat(dirfd, ".", stbuf.st_uid,
31757c478bd9Sstevel@tonic-gate stbuf.st_gid, 0) != 0) {
31767c478bd9Sstevel@tonic-gate vperror(0, gettext(
3177da6c28aaSamw "%s%s%s: failed to set ownership "
3178da6c28aaSamw "of attribute directory"), namep,
3179da6c28aaSamw gettext(" attribute "), xattrapath);
31807c478bd9Sstevel@tonic-gate }
31817c478bd9Sstevel@tonic-gate
31827c478bd9Sstevel@tonic-gate if (fchmod(dirfd, stbuf.st_mode) != 0) {
31837c478bd9Sstevel@tonic-gate vperror(0, gettext(
3184da6c28aaSamw "%s%s%s: failed to set permissions "
3185da6c28aaSamw "of attribute directory"), namep,
3186da6c28aaSamw gettext(" attribute "), xattrapath);
3187da6c28aaSamw }
31887c478bd9Sstevel@tonic-gate }
31897c478bd9Sstevel@tonic-gate goto filedone;
31907c478bd9Sstevel@tonic-gate }
31917c478bd9Sstevel@tonic-gate #endif
31927c478bd9Sstevel@tonic-gate
31937c478bd9Sstevel@tonic-gate if (dircreate && (!is_posix || dblock.dbuf.typeflag == '5')) {
31947c478bd9Sstevel@tonic-gate dir = 1;
31957c478bd9Sstevel@tonic-gate if (vflag) {
31968e4a71aeSRich Burridge (void) fprintf(vfile, "x %s, 0 %s, ",
31978e4a71aeSRich Burridge &dirname[0], gettext("bytes"));
31987c478bd9Sstevel@tonic-gate if (NotTape)
31997c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "0K\n");
32007c478bd9Sstevel@tonic-gate else
32017c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%"
32027c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"),
32037c478bd9Sstevel@tonic-gate (blkcnt_t)0);
32047c478bd9Sstevel@tonic-gate }
32057c478bd9Sstevel@tonic-gate goto filedone;
32067c478bd9Sstevel@tonic-gate }
32077c478bd9Sstevel@tonic-gate
32087c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '6') { /* FIFO */
32097c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) {
32107c478bd9Sstevel@tonic-gate if (errno == ENOTDIR)
32117c478bd9Sstevel@tonic-gate (void) unlink(namep);
32127c478bd9Sstevel@tonic-gate }
32137c478bd9Sstevel@tonic-gate linkp = templink;
32147c478bd9Sstevel@tonic-gate if (*linkp != NULL) {
32157c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/')
32167c478bd9Sstevel@tonic-gate linkp++;
32177c478bd9Sstevel@tonic-gate if (link(linkp, namep) < 0) {
32187c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
32197c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep);
32207c478bd9Sstevel@tonic-gate continue;
32217c478bd9Sstevel@tonic-gate }
32227c478bd9Sstevel@tonic-gate if (vflag)
32237c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
3224da6c28aaSamw "x %s linked to %s\n"), namep,
3225da6c28aaSamw linkp);
32267c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */
32277c478bd9Sstevel@tonic-gate continue;
32287c478bd9Sstevel@tonic-gate }
32297c478bd9Sstevel@tonic-gate if (mknod(namep, (int)(Gen.g_mode|S_IFIFO),
32307c478bd9Sstevel@tonic-gate (int)Gen.g_devmajor) < 0) {
32317c478bd9Sstevel@tonic-gate vperror(0, gettext("%s: mknod failed"), namep);
32327c478bd9Sstevel@tonic-gate continue;
32337c478bd9Sstevel@tonic-gate }
32347c478bd9Sstevel@tonic-gate bytes = stbuf.st_size;
32357c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes);
32367c478bd9Sstevel@tonic-gate if (vflag) {
32377c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "x %s, %" FMT_off_t
32388e4a71aeSRich Burridge " %s, ", namep, bytes, gettext("bytes"));
32397c478bd9Sstevel@tonic-gate if (NotTape)
32407c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t
32417c478bd9Sstevel@tonic-gate "K\n", K(blocks));
32427c478bd9Sstevel@tonic-gate else
32437c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%"
32447c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"),
32457c478bd9Sstevel@tonic-gate blocks);
32467c478bd9Sstevel@tonic-gate }
32477c478bd9Sstevel@tonic-gate goto filedone;
32487c478bd9Sstevel@tonic-gate }
32497c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '3' && !Uid) { /* CHAR SPECIAL */
32507c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) {
32517c478bd9Sstevel@tonic-gate if (errno == ENOTDIR)
32527c478bd9Sstevel@tonic-gate (void) unlink(namep);
32537c478bd9Sstevel@tonic-gate }
32547c478bd9Sstevel@tonic-gate linkp = templink;
32557c478bd9Sstevel@tonic-gate if (*linkp != NULL) {
32567c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/')
32577c478bd9Sstevel@tonic-gate linkp++;
32587c478bd9Sstevel@tonic-gate if (link(linkp, namep) < 0) {
32597c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
32607c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep);
32617c478bd9Sstevel@tonic-gate continue;
32627c478bd9Sstevel@tonic-gate }
32637c478bd9Sstevel@tonic-gate if (vflag)
32647c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
3265da6c28aaSamw "x %s linked to %s\n"), namep,
3266da6c28aaSamw linkp);
32677c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */
32687c478bd9Sstevel@tonic-gate continue;
32697c478bd9Sstevel@tonic-gate }
32707c478bd9Sstevel@tonic-gate if (mknod(namep, (int)(Gen.g_mode|S_IFCHR),
32717c478bd9Sstevel@tonic-gate (int)makedev(Gen.g_devmajor, Gen.g_devminor)) < 0) {
32727c478bd9Sstevel@tonic-gate vperror(0, gettext(
32737c478bd9Sstevel@tonic-gate "%s: mknod failed"), namep);
32747c478bd9Sstevel@tonic-gate continue;
32757c478bd9Sstevel@tonic-gate }
32767c478bd9Sstevel@tonic-gate bytes = stbuf.st_size;
32777c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes);
32787c478bd9Sstevel@tonic-gate if (vflag) {
32797c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "x %s, %" FMT_off_t
32808e4a71aeSRich Burridge " %s, ", namep, bytes, gettext("bytes"));
32817c478bd9Sstevel@tonic-gate if (NotTape)
32827c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t
32837c478bd9Sstevel@tonic-gate "K\n", K(blocks));
32847c478bd9Sstevel@tonic-gate else
32857c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%"
32867c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"),
32877c478bd9Sstevel@tonic-gate blocks);
32887c478bd9Sstevel@tonic-gate }
32897c478bd9Sstevel@tonic-gate goto filedone;
32907c478bd9Sstevel@tonic-gate } else if (dblock.dbuf.typeflag == '3' && Uid) {
32917c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
32927c478bd9Sstevel@tonic-gate "Can't create special %s\n"), namep);
32937c478bd9Sstevel@tonic-gate continue;
32947c478bd9Sstevel@tonic-gate }
32957c478bd9Sstevel@tonic-gate
32967c478bd9Sstevel@tonic-gate /* BLOCK SPECIAL */
32977c478bd9Sstevel@tonic-gate
32987c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '4' && !Uid) {
32997c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) {
33007c478bd9Sstevel@tonic-gate if (errno == ENOTDIR)
33017c478bd9Sstevel@tonic-gate (void) unlink(namep);
33027c478bd9Sstevel@tonic-gate }
33037c478bd9Sstevel@tonic-gate linkp = templink;
33047c478bd9Sstevel@tonic-gate if (*linkp != NULL) {
33057c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/')
33067c478bd9Sstevel@tonic-gate linkp++;
33077c478bd9Sstevel@tonic-gate if (link(linkp, namep) < 0) {
33087c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
33097c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep);
33107c478bd9Sstevel@tonic-gate continue;
33117c478bd9Sstevel@tonic-gate }
33127c478bd9Sstevel@tonic-gate if (vflag)
33137c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
3314da6c28aaSamw "x %s linked to %s\n"), namep,
3315da6c28aaSamw linkp);
33167c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */
33177c478bd9Sstevel@tonic-gate continue;
33187c478bd9Sstevel@tonic-gate }
33197c478bd9Sstevel@tonic-gate if (mknod(namep, (int)(Gen.g_mode|S_IFBLK),
33207c478bd9Sstevel@tonic-gate (int)makedev(Gen.g_devmajor, Gen.g_devminor)) < 0) {
33217c478bd9Sstevel@tonic-gate vperror(0, gettext("%s: mknod failed"), namep);
33227c478bd9Sstevel@tonic-gate continue;
33237c478bd9Sstevel@tonic-gate }
33247c478bd9Sstevel@tonic-gate bytes = stbuf.st_size;
33257c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes);
33267c478bd9Sstevel@tonic-gate if (vflag) {
33277c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("x %s, %"
33287c478bd9Sstevel@tonic-gate FMT_off_t " bytes, "), namep, bytes);
33297c478bd9Sstevel@tonic-gate if (NotTape)
33307c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t
33317c478bd9Sstevel@tonic-gate "K\n", K(blocks));
33327c478bd9Sstevel@tonic-gate else
33337c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%"
33347c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"),
33357c478bd9Sstevel@tonic-gate blocks);
33367c478bd9Sstevel@tonic-gate }
33377c478bd9Sstevel@tonic-gate goto filedone;
33387c478bd9Sstevel@tonic-gate } else if (dblock.dbuf.typeflag == '4' && Uid) {
33397c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
33407c478bd9Sstevel@tonic-gate gettext("Can't create special %s\n"), namep);
33417c478bd9Sstevel@tonic-gate continue;
33427c478bd9Sstevel@tonic-gate }
33437c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '2') { /* symlink */
334445916cd2Sjpk if ((Tflag) && (lk_rpath_flag == 1))
334545916cd2Sjpk linkp = lk_real_path;
334645916cd2Sjpk else
33477c478bd9Sstevel@tonic-gate linkp = templink;
33487c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/')
33497c478bd9Sstevel@tonic-gate linkp++;
33507c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) {
33517c478bd9Sstevel@tonic-gate if (errno == ENOTDIR)
33527c478bd9Sstevel@tonic-gate (void) unlink(namep);
33537c478bd9Sstevel@tonic-gate }
33547c478bd9Sstevel@tonic-gate if (symlink(linkp, namep) < 0) {
33557c478bd9Sstevel@tonic-gate vperror(0, gettext("%s: symbolic link failed"),
33567c478bd9Sstevel@tonic-gate namep);
33577c478bd9Sstevel@tonic-gate continue;
33587c478bd9Sstevel@tonic-gate }
33597c478bd9Sstevel@tonic-gate if (vflag)
33607c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
33617c478bd9Sstevel@tonic-gate "x %s symbolic link to %s\n"),
33627c478bd9Sstevel@tonic-gate namep, linkp);
33637c478bd9Sstevel@tonic-gate
33647c478bd9Sstevel@tonic-gate symflag = AT_SYMLINK_NOFOLLOW;
33657c478bd9Sstevel@tonic-gate goto filedone;
33667c478bd9Sstevel@tonic-gate }
33677c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '1') {
33687c478bd9Sstevel@tonic-gate linkp = templink;
33697c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/')
33707c478bd9Sstevel@tonic-gate linkp++;
33717c478bd9Sstevel@tonic-gate if (unlinkat(dirfd, comp, AT_REMOVEDIR) < 0) {
33727c478bd9Sstevel@tonic-gate if (errno == ENOTDIR)
33737c478bd9Sstevel@tonic-gate (void) unlinkat(dirfd, comp, 0);
33747c478bd9Sstevel@tonic-gate }
33757c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
33767c478bd9Sstevel@tonic-gate if (xattrp && xattr_linkp) {
33777c478bd9Sstevel@tonic-gate if (fchdir(dirfd) < 0) {
33787c478bd9Sstevel@tonic-gate vperror(0, gettext(
33797c478bd9Sstevel@tonic-gate "Cannot fchdir to attribute "
3380da6c28aaSamw "directory %s"),
3381da6c28aaSamw (attrinfo->attr_parent == NULL) ?
3382da6c28aaSamw dirp : attrinfo->attr_parent);
33837c478bd9Sstevel@tonic-gate exit(1);
33847c478bd9Sstevel@tonic-gate }
33857c478bd9Sstevel@tonic-gate
3386da6c28aaSamw error = link(xattr_linkaname, xattrapath);
33877c478bd9Sstevel@tonic-gate } else {
33887c478bd9Sstevel@tonic-gate error = link(linkp, namep);
33897c478bd9Sstevel@tonic-gate }
33907c478bd9Sstevel@tonic-gate #else
33917c478bd9Sstevel@tonic-gate error = link(linkp, namep);
33927c478bd9Sstevel@tonic-gate #endif
33937c478bd9Sstevel@tonic-gate
33947c478bd9Sstevel@tonic-gate if (error < 0) {
33957c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
33967c478bd9Sstevel@tonic-gate "tar: %s%s%s: cannot link\n"),
33977c478bd9Sstevel@tonic-gate namep, (xattr_linkp != NULL) ?
33987c478bd9Sstevel@tonic-gate gettext(" attribute ") : "",
33997c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ?
3400da6c28aaSamw xattrapath : "");
34017c478bd9Sstevel@tonic-gate continue;
34027c478bd9Sstevel@tonic-gate }
34037c478bd9Sstevel@tonic-gate if (vflag)
34047c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
3405da6c28aaSamw "x %s%s%s linked to %s%s%s\n"), namep,
34067c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ?
34077c478bd9Sstevel@tonic-gate gettext(" attribute ") : "",
34087c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ?
34097c478bd9Sstevel@tonic-gate xattr_linkaname : "",
3410da6c28aaSamw linkp,
34117c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ?
3412da6c28aaSamw gettext(" attribute ") : "",
3413da6c28aaSamw (xattr_linkp != NULL) ? xattrapath : "");
34147c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */
34157c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
3416da6c28aaSamw if (xattrp != NULL) {
34177c478bd9Sstevel@tonic-gate free(xattrhead);
34187c478bd9Sstevel@tonic-gate xattrp = NULL;
34197c478bd9Sstevel@tonic-gate xattr_linkp = NULL;
34207c478bd9Sstevel@tonic-gate xattrhead = NULL;
34217c478bd9Sstevel@tonic-gate }
34227c478bd9Sstevel@tonic-gate #endif
34237c478bd9Sstevel@tonic-gate continue;
34247c478bd9Sstevel@tonic-gate }
34257c478bd9Sstevel@tonic-gate
34267c478bd9Sstevel@tonic-gate /* REGULAR FILES */
34277c478bd9Sstevel@tonic-gate
34287c478bd9Sstevel@tonic-gate if (convtoreg(stbuf.st_size)) {
34297c478bd9Sstevel@tonic-gate convflag = 1;
34307c478bd9Sstevel@tonic-gate if (errflag) {
34317c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
34327c478bd9Sstevel@tonic-gate "tar: %s: typeflag '%c' not recognized\n"),
34337c478bd9Sstevel@tonic-gate namep, dblock.dbuf.typeflag);
34347c478bd9Sstevel@tonic-gate done(1);
34357c478bd9Sstevel@tonic-gate } else {
34367c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
34377c478bd9Sstevel@tonic-gate "tar: %s: typeflag '%c' not recognized, "
34387c478bd9Sstevel@tonic-gate "converting to regular file\n"), namep,
34397c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag);
34407c478bd9Sstevel@tonic-gate Errflg = 1;
34417c478bd9Sstevel@tonic-gate }
34427c478bd9Sstevel@tonic-gate }
34437c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '0' ||
34447c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == NULL || convflag) {
34452c0f0499Slovely delete_target(dirfd, comp, namep);
34467c478bd9Sstevel@tonic-gate linkp = templink;
34477c478bd9Sstevel@tonic-gate if (*linkp != NULL) {
34487c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/')
34497c478bd9Sstevel@tonic-gate linkp++;
34507c478bd9Sstevel@tonic-gate if (link(linkp, comp) < 0) {
34517c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
34527c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep);
34537c478bd9Sstevel@tonic-gate continue;
34547c478bd9Sstevel@tonic-gate }
34557c478bd9Sstevel@tonic-gate if (vflag)
34567c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
3457da6c28aaSamw "x %s linked to %s\n"), comp,
3458da6c28aaSamw linkp);
34597c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */
3460da6c28aaSamw #if defined(O_XATTR)
3461da6c28aaSamw if (xattrp != NULL) {
3462da6c28aaSamw free(xattrhead);
3463da6c28aaSamw xattrp = NULL;
3464da6c28aaSamw xattr_linkp = NULL;
3465da6c28aaSamw xattrhead = NULL;
3466da6c28aaSamw }
3467da6c28aaSamw #endif
34687c478bd9Sstevel@tonic-gate continue;
34697c478bd9Sstevel@tonic-gate }
34707c478bd9Sstevel@tonic-gate newfile = ((fstatat(dirfd, comp,
34717c478bd9Sstevel@tonic-gate &xtractbuf, 0) == -1) ? TRUE : FALSE);
3472da6c28aaSamw ofile = openat(dirfd, comp, O_RDWR|O_CREAT|O_TRUNC,
3473da6c28aaSamw stbuf.st_mode & MODEMASK);
3474da6c28aaSamw saveerrno = errno;
3475da6c28aaSamw
3476da6c28aaSamw #if defined(O_XATTR)
3477da6c28aaSamw if (xattrp != NULL) {
3478da6c28aaSamw if (ofile < 0) {
3479da6c28aaSamw ofile = retry_open_attr(dirfd, cwd,
3480da6c28aaSamw dirp, attrinfo->attr_parent, comp,
3481da6c28aaSamw O_RDWR|O_CREAT|O_TRUNC,
3482da6c28aaSamw stbuf.st_mode & MODEMASK);
3483da6c28aaSamw }
3484da6c28aaSamw }
3485da6c28aaSamw #endif
3486da6c28aaSamw if (ofile < 0) {
3487da6c28aaSamw errno = saveerrno;
34887c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
3489da6c28aaSamw "tar: %s%s%s%s - cannot create\n"),
3490da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ?
34918e4a71aeSRich Burridge gettext("system attribute ") :
3492da6c28aaSamw gettext("attribute ")),
3493da6c28aaSamw (xattrp == NULL) ? "" : xattrapath,
3494da6c28aaSamw (xattrp == NULL) ? "" : gettext(" of "),
3495da6c28aaSamw (xattrp == NULL) ? comp : namep);
34967c478bd9Sstevel@tonic-gate if (errflag)
34977c478bd9Sstevel@tonic-gate done(1);
34987c478bd9Sstevel@tonic-gate else
34997c478bd9Sstevel@tonic-gate Errflg = 1;
3500da6c28aaSamw #if defined(O_XATTR)
3501da6c28aaSamw if (xattrp != NULL) {
3502da6c28aaSamw dblock.dbuf.typeflag = _XATTR_HDRTYPE;
3503da6c28aaSamw free(xattrhead);
3504da6c28aaSamw xattrp = NULL;
3505da6c28aaSamw xattr_linkp = NULL;
3506da6c28aaSamw xattrhead = NULL;
3507da6c28aaSamw }
3508da6c28aaSamw #endif
35097c478bd9Sstevel@tonic-gate passtape();
35107c478bd9Sstevel@tonic-gate continue;
35117c478bd9Sstevel@tonic-gate }
35127c478bd9Sstevel@tonic-gate
351345916cd2Sjpk if (Tflag && (check_ext_attr(namep) == 0)) {
351445916cd2Sjpk if (errflag)
351545916cd2Sjpk done(1);
351645916cd2Sjpk else
351745916cd2Sjpk Errflg = 1;
351845916cd2Sjpk passtape();
351945916cd2Sjpk continue;
352045916cd2Sjpk }
352145916cd2Sjpk
35227c478bd9Sstevel@tonic-gate if (extno != 0) { /* file is in pieces */
35237c478bd9Sstevel@tonic-gate if (extotal < 1 || extotal > MAXEXT)
35247c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
3525da6c28aaSamw "tar: ignoring bad extent info for "
3526da6c28aaSamw "%s%s%s%s\n"),
3527da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ?
3528da6c28aaSamw gettext("system attribute ") :
3529da6c28aaSamw gettext("attribute ")),
3530da6c28aaSamw (xattrp == NULL) ? "" : xattrapath,
3531da6c28aaSamw (xattrp == NULL) ? "" : gettext(" of "),
3532da6c28aaSamw (xattrp == NULL) ? comp : namep);
35337c478bd9Sstevel@tonic-gate else {
3534da6c28aaSamw /* extract it */
3535da6c28aaSamw (void) xsfile(rw_sysattr, ofile);
35367c478bd9Sstevel@tonic-gate }
35377c478bd9Sstevel@tonic-gate }
35387c478bd9Sstevel@tonic-gate extno = 0; /* let everyone know file is not split */
35397c478bd9Sstevel@tonic-gate bytes = stbuf.st_size;
35407c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes);
35417c478bd9Sstevel@tonic-gate if (vflag) {
35427c478bd9Sstevel@tonic-gate (void) fprintf(vfile,
35438e4a71aeSRich Burridge "x %s%s%s, %" FMT_off_t " %s, ",
35447c478bd9Sstevel@tonic-gate (xattrp == NULL) ? "" : dirp,
3545da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ?
3546da6c28aaSamw gettext(" system attribute ") :
3547da6c28aaSamw gettext(" attribute ")),
35488e4a71aeSRich Burridge (xattrp == NULL) ? namep : xattrapath, bytes,
35498e4a71aeSRich Burridge gettext("bytes"));
35507c478bd9Sstevel@tonic-gate if (NotTape)
35517c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n",
35527c478bd9Sstevel@tonic-gate K(blocks));
35537c478bd9Sstevel@tonic-gate else
35547c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%"
35557c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), blocks);
35567c478bd9Sstevel@tonic-gate }
35577c478bd9Sstevel@tonic-gate
3558da6c28aaSamw if (xblocks(rw_sysattr, bytes, ofile) != 0) {
3559da6c28aaSamw #if defined(O_XATTR)
3560da6c28aaSamw if (xattrp != NULL) {
3561da6c28aaSamw free(xattrhead);
3562da6c28aaSamw xattrp = NULL;
3563da6c28aaSamw xattr_linkp = NULL;
3564da6c28aaSamw xattrhead = NULL;
3565da6c28aaSamw }
3566da6c28aaSamw #endif
3567da6c28aaSamw continue;
3568da6c28aaSamw }
35697c478bd9Sstevel@tonic-gate filedone:
35707c478bd9Sstevel@tonic-gate if (mflag == 0 && !symflag) {
35717c478bd9Sstevel@tonic-gate if (dir)
35727c478bd9Sstevel@tonic-gate doDirTimes(namep, stbuf.st_mtim);
3573da6c28aaSamw
35747c478bd9Sstevel@tonic-gate else
3575da6c28aaSamw #if defined(O_XATTR)
3576da6c28aaSamw if (xattrp != NULL) {
3577da6c28aaSamw /*
3578da6c28aaSamw * Set the time on the attribute unless
3579da6c28aaSamw * the attribute is a system attribute
3580da6c28aaSamw * (can't successfully do this) or the
3581da6c28aaSamw * hidden attribute directory, "." (the
3582da6c28aaSamw * time on the hidden attribute
3583da6c28aaSamw * directory will be updated when
3584da6c28aaSamw * attributes are restored, otherwise
3585da6c28aaSamw * it's transient).
3586da6c28aaSamw */
3587da6c28aaSamw if (!rw_sysattr && (Hiddendir == 0)) {
3588da6c28aaSamw setPathTimes(dirfd, comp,
3589da6c28aaSamw stbuf.st_mtim);
3590da6c28aaSamw }
3591da6c28aaSamw } else
3592da6c28aaSamw setPathTimes(dirfd, comp,
3593da6c28aaSamw stbuf.st_mtim);
3594da6c28aaSamw #else
35957c478bd9Sstevel@tonic-gate setPathTimes(dirfd, comp, stbuf.st_mtim);
3596da6c28aaSamw #endif
35977c478bd9Sstevel@tonic-gate }
35987c478bd9Sstevel@tonic-gate
35997c478bd9Sstevel@tonic-gate /* moved this code from above */
36007c478bd9Sstevel@tonic-gate if (pflag && !symflag && Hiddendir == 0) {
3601da6c28aaSamw if (xattrp != NULL)
36027c478bd9Sstevel@tonic-gate (void) fchmod(ofile, stbuf.st_mode & MODEMASK);
36037c478bd9Sstevel@tonic-gate else
36047c478bd9Sstevel@tonic-gate (void) chmod(namep, stbuf.st_mode & MODEMASK);
36057c478bd9Sstevel@tonic-gate }
36067c478bd9Sstevel@tonic-gate
36077c478bd9Sstevel@tonic-gate
36087c478bd9Sstevel@tonic-gate /*
36097c478bd9Sstevel@tonic-gate * Because ancillary file preceeds the normal file,
36107c478bd9Sstevel@tonic-gate * acl info may have been retrieved (in aclp).
36117c478bd9Sstevel@tonic-gate * All file types are directed here (go filedone).
36127c478bd9Sstevel@tonic-gate * Always restore ACLs if there are ACLs.
36137c478bd9Sstevel@tonic-gate */
36147c478bd9Sstevel@tonic-gate if (aclp != NULL) {
36157c478bd9Sstevel@tonic-gate int ret;
36167c478bd9Sstevel@tonic-gate
36177c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
3618da6c28aaSamw if (xattrp != NULL) {
36197c478bd9Sstevel@tonic-gate if (Hiddendir)
3620fa9e4066Sahrens ret = facl_set(dirfd, aclp);
36217c478bd9Sstevel@tonic-gate else
3622fa9e4066Sahrens ret = facl_set(ofile, aclp);
36237c478bd9Sstevel@tonic-gate } else {
3624fa9e4066Sahrens ret = acl_set(namep, aclp);
36257c478bd9Sstevel@tonic-gate }
36267c478bd9Sstevel@tonic-gate #else
362745916cd2Sjpk ret = acl_set(namep, aclp);
36287c478bd9Sstevel@tonic-gate #endif
36297c478bd9Sstevel@tonic-gate if (ret < 0) {
36307c478bd9Sstevel@tonic-gate if (pflag) {
36317c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
3632da6c28aaSamw "%s%s%s%s: failed to set acl "
3633da6c28aaSamw "entries\n"), namep,
3634da6c28aaSamw (xattrp == NULL) ? "" :
3635da6c28aaSamw (rw_sysattr ? gettext(
3636da6c28aaSamw " system attribute ") :
3637da6c28aaSamw gettext(" attribute ")),
3638da6c28aaSamw (xattrp == NULL) ? "" :
3639da6c28aaSamw xattrapath);
36407c478bd9Sstevel@tonic-gate }
36417c478bd9Sstevel@tonic-gate /* else: silent and continue */
36427c478bd9Sstevel@tonic-gate }
3643fa9e4066Sahrens acl_free(aclp);
36447c478bd9Sstevel@tonic-gate aclp = NULL;
36457c478bd9Sstevel@tonic-gate }
36467c478bd9Sstevel@tonic-gate
36477c478bd9Sstevel@tonic-gate if (!oflag)
3648cc22b130SRich Burridge /* set file ownership */
3649cc22b130SRich Burridge resugname(dirfd, comp, symflag);
36507c478bd9Sstevel@tonic-gate
36517c478bd9Sstevel@tonic-gate if (pflag && newfile == TRUE && !dir &&
36527c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag == '0' ||
36537c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == NULL ||
36547c478bd9Sstevel@tonic-gate convflag || dblock.dbuf.typeflag == '1')) {
36557c478bd9Sstevel@tonic-gate if (fstat(ofile, &xtractbuf) == -1)
36567c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
3657da6c28aaSamw "tar: cannot stat extracted file "
3658da6c28aaSamw "%s%s%s%s\n"),
3659da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ?
3660da6c28aaSamw gettext("system attribute ") :
3661da6c28aaSamw gettext("attribute ")),
3662da6c28aaSamw (xattrp == NULL) ? "" : xattrapath,
3663da6c28aaSamw (xattrp == NULL) ? "" :
3664da6c28aaSamw gettext(" of "), namep);
3665da6c28aaSamw
36667c478bd9Sstevel@tonic-gate else if ((xtractbuf.st_mode & (MODEMASK & ~S_IFMT))
36677c478bd9Sstevel@tonic-gate != (stbuf.st_mode & (MODEMASK & ~S_IFMT))) {
36687c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
36697c478bd9Sstevel@tonic-gate "tar: warning - file permissions have "
3670da6c28aaSamw "changed for %s%s%s%s (are 0%o, should be "
36717c478bd9Sstevel@tonic-gate "0%o)\n"),
3672da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ?
3673da6c28aaSamw gettext("system attribute ") :
3674da6c28aaSamw gettext("attribute ")),
3675da6c28aaSamw (xattrp == NULL) ? "" : xattrapath,
3676da6c28aaSamw (xattrp == NULL) ? "" :
3677da6c28aaSamw gettext(" of "), namep,
3678da6c28aaSamw xtractbuf.st_mode, stbuf.st_mode);
3679da6c28aaSamw
36807c478bd9Sstevel@tonic-gate }
36817c478bd9Sstevel@tonic-gate }
3682ced83f9bSceastha #if defined(O_XATTR)
3683ced83f9bSceastha if (xattrp != NULL) {
3684ced83f9bSceastha free(xattrhead);
3685ced83f9bSceastha xattrp = NULL;
3686ced83f9bSceastha xattr_linkp = NULL;
3687ced83f9bSceastha xattrhead = NULL;
3688ced83f9bSceastha }
3689ced83f9bSceastha #endif
3690ced83f9bSceastha
36917c478bd9Sstevel@tonic-gate if (ofile != -1) {
36927c478bd9Sstevel@tonic-gate (void) close(dirfd);
36937c478bd9Sstevel@tonic-gate dirfd = -1;
36947c478bd9Sstevel@tonic-gate if (close(ofile) != 0)
36957c478bd9Sstevel@tonic-gate vperror(2, gettext("close error"));
3696da6c28aaSamw ofile = -1;
36977c478bd9Sstevel@tonic-gate }
36987c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */
36997c478bd9Sstevel@tonic-gate }
370045916cd2Sjpk
370145916cd2Sjpk /*
370245916cd2Sjpk * Process ancillary file.
370345916cd2Sjpk *
370445916cd2Sjpk */
370545916cd2Sjpk
37067c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == 'A') { /* acl info */
37077c478bd9Sstevel@tonic-gate char buf[TBLOCK];
37087c478bd9Sstevel@tonic-gate char *secp;
37097c478bd9Sstevel@tonic-gate char *tp;
37107c478bd9Sstevel@tonic-gate int attrsize;
37117c478bd9Sstevel@tonic-gate int cnt;
37127c478bd9Sstevel@tonic-gate
371345916cd2Sjpk /* reset Trusted Extensions flags */
371445916cd2Sjpk dir_flag = 0;
371545916cd2Sjpk mld_flag = 0;
371645916cd2Sjpk lk_rpath_flag = 0;
371745916cd2Sjpk rpath_flag = 0;
37187c478bd9Sstevel@tonic-gate
37197c478bd9Sstevel@tonic-gate if (pflag) {
37207c478bd9Sstevel@tonic-gate bytes = stbuf.st_size;
37217c478bd9Sstevel@tonic-gate if ((secp = malloc((int)bytes)) == NULL) {
37227c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
37237c478bd9Sstevel@tonic-gate "Insufficient memory for acl\n"));
37247c478bd9Sstevel@tonic-gate passtape();
37257c478bd9Sstevel@tonic-gate continue;
37267c478bd9Sstevel@tonic-gate }
37277c478bd9Sstevel@tonic-gate tp = secp;
37287c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes);
372945916cd2Sjpk
373045916cd2Sjpk /*
373145916cd2Sjpk * Display a line for each ancillary file.
373245916cd2Sjpk */
373345916cd2Sjpk if (vflag && Tflag)
373445916cd2Sjpk (void) fprintf(vfile, "x %s(A), %"
37358e4a71aeSRich Burridge FMT_blkcnt_t " %s, %"
37368e4a71aeSRich Burridge FMT_blkcnt_t " %s\n",
37378e4a71aeSRich Burridge namep, bytes, gettext("bytes"),
37388e4a71aeSRich Burridge blocks, gettext("tape blocks"));
373945916cd2Sjpk
37407c478bd9Sstevel@tonic-gate while (blocks-- > 0) {
37417c478bd9Sstevel@tonic-gate readtape(buf);
37427c478bd9Sstevel@tonic-gate if (bytes <= TBLOCK) {
37437c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf,
37447c478bd9Sstevel@tonic-gate (size_t)bytes);
37457c478bd9Sstevel@tonic-gate break;
37467c478bd9Sstevel@tonic-gate } else {
37477c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf,
37487c478bd9Sstevel@tonic-gate TBLOCK);
37497c478bd9Sstevel@tonic-gate tp += TBLOCK;
37507c478bd9Sstevel@tonic-gate }
37517c478bd9Sstevel@tonic-gate bytes -= TBLOCK;
37527c478bd9Sstevel@tonic-gate }
3753fa9e4066Sahrens bytes = stbuf.st_size;
37547c478bd9Sstevel@tonic-gate /* got all attributes in secp */
37557c478bd9Sstevel@tonic-gate tp = secp;
37567c478bd9Sstevel@tonic-gate do {
37577c478bd9Sstevel@tonic-gate attr = (struct sec_attr *)tp;
37587c478bd9Sstevel@tonic-gate switch (attr->attr_type) {
37597c478bd9Sstevel@tonic-gate case UFSD_ACL:
3760fa9e4066Sahrens case ACE_ACL:
37617c478bd9Sstevel@tonic-gate (void) sscanf(attr->attr_len,
3762fa9e4066Sahrens "%7o",
3763fa9e4066Sahrens (uint_t *)
3764fa9e4066Sahrens &cnt);
37657c478bd9Sstevel@tonic-gate /* header is 8 */
37667c478bd9Sstevel@tonic-gate attrsize = 8 + (int)strlen(
37677c478bd9Sstevel@tonic-gate &attr->attr_info[0]) + 1;
3768fa9e4066Sahrens error =
3769fa9e4066Sahrens acl_fromtext(
3770fa9e4066Sahrens &attr->attr_info[0], &aclp);
3771fa9e4066Sahrens
3772fa9e4066Sahrens if (error != 0) {
37737c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
37747c478bd9Sstevel@tonic-gate gettext(
37757c478bd9Sstevel@tonic-gate "aclfromtext "
3776fa9e4066Sahrens "failed: %s\n"),
3777fa9e4066Sahrens acl_strerror(
3778fa9e4066Sahrens error));
3779fa9e4066Sahrens bytes -= attrsize;
37807c478bd9Sstevel@tonic-gate break;
37817c478bd9Sstevel@tonic-gate }
3782fa9e4066Sahrens if (acl_cnt(aclp) != cnt) {
37837c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
37847c478bd9Sstevel@tonic-gate gettext(
37857c478bd9Sstevel@tonic-gate "aclcnt error\n"));
3786fa9e4066Sahrens bytes -= attrsize;
37877c478bd9Sstevel@tonic-gate break;
37887c478bd9Sstevel@tonic-gate }
37897c478bd9Sstevel@tonic-gate bytes -= attrsize;
37907c478bd9Sstevel@tonic-gate break;
37917c478bd9Sstevel@tonic-gate
379245916cd2Sjpk /* Trusted Extensions */
379345916cd2Sjpk
379445916cd2Sjpk case DIR_TYPE:
379545916cd2Sjpk case LBL_TYPE:
379645916cd2Sjpk case APRIV_TYPE:
379745916cd2Sjpk case FPRIV_TYPE:
379845916cd2Sjpk case COMP_TYPE:
379945916cd2Sjpk case LK_COMP_TYPE:
380045916cd2Sjpk case ATTR_FLAG_TYPE:
380145916cd2Sjpk attrsize =
380245916cd2Sjpk sizeof (struct sec_attr) +
380345916cd2Sjpk strlen(&attr->attr_info[0]);
380445916cd2Sjpk bytes -= attrsize;
380545916cd2Sjpk if (Tflag)
380645916cd2Sjpk extract_attr(&namep,
380745916cd2Sjpk attr);
380845916cd2Sjpk break;
38097c478bd9Sstevel@tonic-gate
38107c478bd9Sstevel@tonic-gate default:
38117c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
38127c478bd9Sstevel@tonic-gate "unrecognized attr"
38137c478bd9Sstevel@tonic-gate " type\n"));
38147c478bd9Sstevel@tonic-gate bytes = (off_t)0;
38157c478bd9Sstevel@tonic-gate break;
38167c478bd9Sstevel@tonic-gate }
38177c478bd9Sstevel@tonic-gate
38187c478bd9Sstevel@tonic-gate /* next attributes */
38197c478bd9Sstevel@tonic-gate tp += attrsize;
38207c478bd9Sstevel@tonic-gate } while (bytes != 0);
38217c478bd9Sstevel@tonic-gate free(secp);
3822da6c28aaSamw } else {
38237c478bd9Sstevel@tonic-gate passtape();
3824da6c28aaSamw }
38257c478bd9Sstevel@tonic-gate } /* acl */
38267c478bd9Sstevel@tonic-gate
38277c478bd9Sstevel@tonic-gate } /* for */
38287c478bd9Sstevel@tonic-gate
38297c478bd9Sstevel@tonic-gate /*
38307c478bd9Sstevel@tonic-gate * Ensure that all the directories still on the directory stack
38317c478bd9Sstevel@tonic-gate * get their modification times set correctly by flushing the
38327c478bd9Sstevel@tonic-gate * stack.
38337c478bd9Sstevel@tonic-gate */
38347c478bd9Sstevel@tonic-gate
38357c478bd9Sstevel@tonic-gate doDirTimes(NULL, time_zero);
38367c478bd9Sstevel@tonic-gate
3837da6c28aaSamw #if defined(O_XATTR)
3838da6c28aaSamw if (xattrp != NULL) {
3839da6c28aaSamw free(xattrhead);
3840da6c28aaSamw xattrp = NULL;
3841da6c28aaSamw xattr_linkp = NULL;
3842da6c28aaSamw xattrhead = NULL;
3843da6c28aaSamw }
3844da6c28aaSamw #endif
3845da6c28aaSamw
38467c478bd9Sstevel@tonic-gate /*
38477c478bd9Sstevel@tonic-gate * Check if the number of files extracted is different from the
38487c478bd9Sstevel@tonic-gate * number of files listed on the command line
38497c478bd9Sstevel@tonic-gate */
38507c478bd9Sstevel@tonic-gate if (fcnt > xcnt) {
38517c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
38527c478bd9Sstevel@tonic-gate gettext("tar: %d file(s) not extracted\n"),
38537c478bd9Sstevel@tonic-gate fcnt-xcnt);
38547c478bd9Sstevel@tonic-gate Errflg = 1;
38557c478bd9Sstevel@tonic-gate }
38567c478bd9Sstevel@tonic-gate }
38577c478bd9Sstevel@tonic-gate
38587c478bd9Sstevel@tonic-gate /*
38597c478bd9Sstevel@tonic-gate * xblocks extract file/extent from tape to output file
38607c478bd9Sstevel@tonic-gate *
3861ced83f9bSceastha * xblocks(issysattr, bytes, ofile);
3862ced83f9bSceastha *
3863ced83f9bSceastha * issysattr flag set if the files being extracted
3864ced83f9bSceastha * is an extended system attribute file.
3865ced83f9bSceastha * unsigned long long bytes size of extent or file to be extracted
3866ced83f9bSceastha * ofile output file
38677c478bd9Sstevel@tonic-gate *
38687c478bd9Sstevel@tonic-gate * called by doxtract() and xsfile()
38697c478bd9Sstevel@tonic-gate */
38707c478bd9Sstevel@tonic-gate
3871da6c28aaSamw static int
xblocks(int issysattr,off_t bytes,int ofile)3872da6c28aaSamw xblocks(int issysattr, off_t bytes, int ofile)
38737c478bd9Sstevel@tonic-gate {
3874ced83f9bSceastha char *buf;
38757c478bd9Sstevel@tonic-gate char tempname[NAMSIZ+1];
3876ced83f9bSceastha size_t maxwrite;
3877ced83f9bSceastha size_t bytesread;
3878ced83f9bSceastha size_t piosize; /* preferred I/O size */
3879ced83f9bSceastha struct stat tsbuf;
38807c478bd9Sstevel@tonic-gate
3881ced83f9bSceastha /* Don't need to do anything if this is a zero size file */
3882ced83f9bSceastha if (bytes <= 0) {
3883ced83f9bSceastha return (0);
3884ced83f9bSceastha }
3885ced83f9bSceastha
3886ced83f9bSceastha /*
3887ced83f9bSceastha * To figure out the size of the buffer used to accumulate data
3888ced83f9bSceastha * from readtape() and to write to the file, we need to determine
3889ced83f9bSceastha * the largest chunk of data to be written to the file at one time.
3890ced83f9bSceastha * This is determined based on the smallest of the following two
3891ced83f9bSceastha * things:
3892ced83f9bSceastha * 1) The size of the archived file.
3893ced83f9bSceastha * 2) The preferred I/O size of the file.
3894ced83f9bSceastha */
3895ced83f9bSceastha if (issysattr || (bytes <= TBLOCK)) {
3896ced83f9bSceastha /*
3897ced83f9bSceastha * Writes to system attribute files must be
3898ced83f9bSceastha * performed in one operation.
3899ced83f9bSceastha */
3900ced83f9bSceastha maxwrite = bytes;
3901ced83f9bSceastha } else {
3902ced83f9bSceastha /*
3903ced83f9bSceastha * fstat() the file to get the preferred I/O size.
3904ced83f9bSceastha * If it fails, then resort back to just writing
3905ced83f9bSceastha * one block at a time.
3906ced83f9bSceastha */
3907ced83f9bSceastha if (fstat(ofile, &tsbuf) == 0) {
3908ced83f9bSceastha piosize = tsbuf.st_blksize;
3909ced83f9bSceastha } else {
3910ced83f9bSceastha piosize = TBLOCK;
3911ced83f9bSceastha }
3912ced83f9bSceastha maxwrite = min(bytes, piosize);
3913ced83f9bSceastha }
3914ced83f9bSceastha
3915ced83f9bSceastha /*
3916ced83f9bSceastha * The buffer used to accumulate the data for the write operation
3917ced83f9bSceastha * needs to be the maximum number of bytes to be written rounded up
3918ced83f9bSceastha * to the nearest TBLOCK since readtape reads one block at a time.
3919ced83f9bSceastha */
3920ced83f9bSceastha if ((buf = malloc(TBLOCKS(maxwrite) * TBLOCK)) == NULL) {
3921ced83f9bSceastha fatal(gettext("cannot allocate buffer"));
3922ced83f9bSceastha }
3923ced83f9bSceastha
3924ced83f9bSceastha while (bytes > 0) {
3925ced83f9bSceastha
3926ced83f9bSceastha /*
3927ced83f9bSceastha * readtape() obtains one block (TBLOCK) of data at a time.
3928ced83f9bSceastha * Accumulate as many blocks of data in buf as we can write
3929ced83f9bSceastha * in one operation.
3930ced83f9bSceastha */
3931ced83f9bSceastha for (bytesread = 0; bytesread < maxwrite; bytesread += TBLOCK) {
3932ced83f9bSceastha readtape(buf + bytesread);
3933ced83f9bSceastha }
3934ced83f9bSceastha
3935ced83f9bSceastha if (write(ofile, buf, maxwrite) < 0) {
3936da6c28aaSamw int saveerrno = errno;
3937da6c28aaSamw
39387c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH)
3939ced83f9bSceastha (void) strlcpy(tempname, Xtarhdr.x_path,
3940ced83f9bSceastha sizeof (tempname));
39417c478bd9Sstevel@tonic-gate else
39427c478bd9Sstevel@tonic-gate (void) sprintf(tempname, "%.*s", NAMSIZ,
39437c478bd9Sstevel@tonic-gate dblock.dbuf.name);
3944da6c28aaSamw /*
3945da6c28aaSamw * If the extended system attribute being extracted
3946da6c28aaSamw * contains attributes that the user needs privileges
3947da6c28aaSamw * for, then just display a warning message, skip
3948da6c28aaSamw * the extraction of this file, and return.
3949da6c28aaSamw */
3950da6c28aaSamw if ((saveerrno == EPERM) && issysattr) {
39517c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
3952da6c28aaSamw "tar: unable to extract system attribute "
3953da6c28aaSamw "%s: insufficient privileges\n"), tempname);
3954da6c28aaSamw Errflg = 1;
3955ced83f9bSceastha (void) free(buf);
3956da6c28aaSamw return (1);
3957da6c28aaSamw } else {
3958da6c28aaSamw (void) fprintf(stderr, gettext(
3959da6c28aaSamw "tar: %s: HELP - extract write error\n"),
3960da6c28aaSamw tempname);
39617c478bd9Sstevel@tonic-gate done(2);
39627c478bd9Sstevel@tonic-gate }
3963da6c28aaSamw }
3964ced83f9bSceastha bytes -= maxwrite;
3965ced83f9bSceastha
3966ced83f9bSceastha /*
3967ced83f9bSceastha * If we've reached this point and there is still data
3968ced83f9bSceastha * to be written, maxwrite had to have been determined
3969ced83f9bSceastha * by the preferred I/O size. If the number of bytes
3970ced83f9bSceastha * left to write is smaller than the preferred I/O size,
3971ced83f9bSceastha * then we're about to do our final write to the file, so
3972ced83f9bSceastha * just set maxwrite to the number of bytes left to write.
3973ced83f9bSceastha */
3974ced83f9bSceastha if ((bytes > 0) && (bytes < maxwrite)) {
3975ced83f9bSceastha maxwrite = bytes;
39767c478bd9Sstevel@tonic-gate }
3977ced83f9bSceastha }
3978ced83f9bSceastha free(buf);
3979da6c28aaSamw
3980da6c28aaSamw return (0);
39817c478bd9Sstevel@tonic-gate }
39827c478bd9Sstevel@tonic-gate
39837c478bd9Sstevel@tonic-gate /*
39847c478bd9Sstevel@tonic-gate * xsfile extract split file
39857c478bd9Sstevel@tonic-gate *
39867c478bd9Sstevel@tonic-gate * xsfile(ofd); ofd = output file descriptor
39877c478bd9Sstevel@tonic-gate *
39887c478bd9Sstevel@tonic-gate * file extracted and put in ofd via xblocks()
39897c478bd9Sstevel@tonic-gate *
39907c478bd9Sstevel@tonic-gate * NOTE: only called by doxtract() to extract one large file
39917c478bd9Sstevel@tonic-gate */
39927c478bd9Sstevel@tonic-gate
39937c478bd9Sstevel@tonic-gate static union hblock savedblock; /* to ensure same file across volumes */
39947c478bd9Sstevel@tonic-gate
3995da6c28aaSamw static int
xsfile(int issysattr,int ofd)3996da6c28aaSamw xsfile(int issysattr, int ofd)
39977c478bd9Sstevel@tonic-gate {
39987c478bd9Sstevel@tonic-gate int i, c;
3999da6c28aaSamw int sysattrerr = 0;
40007c478bd9Sstevel@tonic-gate char name[PATH_MAX+1]; /* holds name for diagnostics */
40017c478bd9Sstevel@tonic-gate int extents, totalext;
40027c478bd9Sstevel@tonic-gate off_t bytes, totalbytes;
40037c478bd9Sstevel@tonic-gate
40047c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH)
40057c478bd9Sstevel@tonic-gate (void) strcpy(name, Xtarhdr.x_path);
40067c478bd9Sstevel@tonic-gate else
40077c478bd9Sstevel@tonic-gate (void) sprintf(name, "%.*s", NAMSIZ, dblock.dbuf.name);
40087c478bd9Sstevel@tonic-gate
40097c478bd9Sstevel@tonic-gate totalbytes = (off_t)0; /* in case we read in half the file */
40107c478bd9Sstevel@tonic-gate totalext = 0; /* these keep count */
40117c478bd9Sstevel@tonic-gate
40127c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
40137c478bd9Sstevel@tonic-gate "tar: %s split across %d volumes\n"), name, extotal);
40147c478bd9Sstevel@tonic-gate
40157c478bd9Sstevel@tonic-gate /* make sure we do extractions in order */
40167c478bd9Sstevel@tonic-gate if (extno != 1) { /* starting in middle of file? */
40177c478bd9Sstevel@tonic-gate (void) printf(gettext(
40187c478bd9Sstevel@tonic-gate "tar: first extent read is not #1\n"
40193d63ea05Sas145665 "OK to read file beginning with extent #%d (%s/%s) ? "),
40203d63ea05Sas145665 extno, yesstr, nostr);
40213d63ea05Sas145665 if (yes() == 0) {
40227c478bd9Sstevel@tonic-gate canit:
40237c478bd9Sstevel@tonic-gate passtape();
40247c478bd9Sstevel@tonic-gate if (close(ofd) != 0)
40257c478bd9Sstevel@tonic-gate vperror(2, gettext("close error"));
4026da6c28aaSamw if (sysattrerr) {
4027da6c28aaSamw return (1);
4028da6c28aaSamw } else {
4029da6c28aaSamw return (0);
4030da6c28aaSamw }
40317c478bd9Sstevel@tonic-gate }
40327c478bd9Sstevel@tonic-gate }
40337c478bd9Sstevel@tonic-gate extents = extotal;
40347c478bd9Sstevel@tonic-gate i = extno;
40357c478bd9Sstevel@tonic-gate /*CONSTCOND*/
40367c478bd9Sstevel@tonic-gate while (1) {
40377c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_SIZE) {
40387c478bd9Sstevel@tonic-gate bytes = extsize;
40397c478bd9Sstevel@tonic-gate } else {
40407c478bd9Sstevel@tonic-gate bytes = stbuf.st_size;
40417c478bd9Sstevel@tonic-gate }
40427c478bd9Sstevel@tonic-gate
40437c478bd9Sstevel@tonic-gate if (vflag)
40448e4a71aeSRich Burridge (void) fprintf(vfile, "+++ x %s [%s #%d], %"
40458e4a71aeSRich Burridge FMT_off_t " %s, %ldK\n",
40468e4a71aeSRich Burridge name, gettext("extent"), extno,
40478e4a71aeSRich Burridge bytes, gettext("bytes"),
40487c478bd9Sstevel@tonic-gate (long)K(TBLOCKS(bytes)));
4049da6c28aaSamw if (xblocks(issysattr, bytes, ofd) != 0) {
4050da6c28aaSamw sysattrerr = 1;
4051da6c28aaSamw goto canit;
4052da6c28aaSamw }
40537c478bd9Sstevel@tonic-gate
40547c478bd9Sstevel@tonic-gate totalbytes += bytes;
40557c478bd9Sstevel@tonic-gate totalext++;
40567c478bd9Sstevel@tonic-gate if (++i > extents)
40577c478bd9Sstevel@tonic-gate break;
40587c478bd9Sstevel@tonic-gate
40597c478bd9Sstevel@tonic-gate /* get next volume and verify it's the right one */
40607c478bd9Sstevel@tonic-gate copy(&savedblock, &dblock);
40617c478bd9Sstevel@tonic-gate tryagain:
40627c478bd9Sstevel@tonic-gate newvol();
40637c478bd9Sstevel@tonic-gate xhdr_flgs = 0;
40647c478bd9Sstevel@tonic-gate getdir();
40657c478bd9Sstevel@tonic-gate if (Xhdrflag > 0)
40667c478bd9Sstevel@tonic-gate (void) get_xdata(); /* Get x-header & regular hdr */
4067123523f8Sas158974 if ((dblock.dbuf.typeflag != 'A') && (xhdr_flgs != 0)) {
4068123523f8Sas158974 load_info_from_xtarhdr(xhdr_flgs, &Xtarhdr);
4069123523f8Sas158974 xhdr_flgs |= _X_XHDR;
4070123523f8Sas158974 }
40717c478bd9Sstevel@tonic-gate if (endtape()) { /* seemingly empty volume */
40727c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
40737c478bd9Sstevel@tonic-gate "tar: first record is null\n"));
40747c478bd9Sstevel@tonic-gate asknicely:
40757c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
40767c478bd9Sstevel@tonic-gate "tar: need volume with extent #%d of %s\n"),
40777c478bd9Sstevel@tonic-gate i, name);
40787c478bd9Sstevel@tonic-gate goto tryagain;
40797c478bd9Sstevel@tonic-gate }
40807c478bd9Sstevel@tonic-gate if (notsame()) {
40817c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
40827c478bd9Sstevel@tonic-gate "tar: first file on that volume is not "
40837c478bd9Sstevel@tonic-gate "the same file\n"));
40847c478bd9Sstevel@tonic-gate goto asknicely;
40857c478bd9Sstevel@tonic-gate }
40867c478bd9Sstevel@tonic-gate if (i != extno) {
40877c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
4088eace40a5Sceastha "tar: extent #%d received out of order\ntar: "
4089eace40a5Sceastha "should be #%d\n"), extno, i);
40907c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
40917c478bd9Sstevel@tonic-gate "Ignore error, Abort this file, or "
40927c478bd9Sstevel@tonic-gate "load New volume (i/a/n) ? "));
40937c478bd9Sstevel@tonic-gate c = response();
40947c478bd9Sstevel@tonic-gate if (c == 'a')
40957c478bd9Sstevel@tonic-gate goto canit;
40967c478bd9Sstevel@tonic-gate if (c != 'i') /* default to new volume */
40977c478bd9Sstevel@tonic-gate goto asknicely;
40987c478bd9Sstevel@tonic-gate i = extno; /* okay, start from there */
40997c478bd9Sstevel@tonic-gate }
41007c478bd9Sstevel@tonic-gate }
41017c478bd9Sstevel@tonic-gate if (vflag)
41027c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
41037c478bd9Sstevel@tonic-gate "x %s (in %d extents), %" FMT_off_t " bytes, %ldK\n"),
41047c478bd9Sstevel@tonic-gate name, totalext, totalbytes, (long)K(TBLOCKS(totalbytes)));
4105da6c28aaSamw
4106da6c28aaSamw return (0);
41077c478bd9Sstevel@tonic-gate }
41087c478bd9Sstevel@tonic-gate
41097c478bd9Sstevel@tonic-gate
41107c478bd9Sstevel@tonic-gate /*
41117c478bd9Sstevel@tonic-gate * notsame() check if extract file extent is invalid
41127c478bd9Sstevel@tonic-gate *
41137c478bd9Sstevel@tonic-gate * returns true if anything differs between savedblock and dblock
41147c478bd9Sstevel@tonic-gate * except extno (extent number), checksum, or size (extent size).
41157c478bd9Sstevel@tonic-gate * Determines if this header belongs to the same file as the one we're
41167c478bd9Sstevel@tonic-gate * extracting.
41177c478bd9Sstevel@tonic-gate *
41187c478bd9Sstevel@tonic-gate * NOTE: though rather bulky, it is only called once per file
41197c478bd9Sstevel@tonic-gate * extension, and it can withstand changes in the definition
41207c478bd9Sstevel@tonic-gate * of the header structure.
41217c478bd9Sstevel@tonic-gate *
41227c478bd9Sstevel@tonic-gate * WARNING: this routine is local to xsfile() above
41237c478bd9Sstevel@tonic-gate */
41247c478bd9Sstevel@tonic-gate
41257c478bd9Sstevel@tonic-gate static int
notsame(void)41267c478bd9Sstevel@tonic-gate notsame(void)
41277c478bd9Sstevel@tonic-gate {
41287c478bd9Sstevel@tonic-gate return (
41297c478bd9Sstevel@tonic-gate (strncmp(savedblock.dbuf.name, dblock.dbuf.name, NAMSIZ)) ||
41307c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.mode, dblock.dbuf.mode)) ||
41317c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.uid, dblock.dbuf.uid)) ||
41327c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.gid, dblock.dbuf.gid)) ||
41337c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.mtime, dblock.dbuf.mtime)) ||
41347c478bd9Sstevel@tonic-gate (savedblock.dbuf.typeflag != dblock.dbuf.typeflag) ||
41357c478bd9Sstevel@tonic-gate (strncmp(savedblock.dbuf.linkname, dblock.dbuf.linkname, NAMSIZ)) ||
41367c478bd9Sstevel@tonic-gate (savedblock.dbuf.extotal != dblock.dbuf.extotal) ||
41377c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.efsize, dblock.dbuf.efsize)));
41387c478bd9Sstevel@tonic-gate }
41397c478bd9Sstevel@tonic-gate
41407c478bd9Sstevel@tonic-gate static void
dotable(char * argv[])41417c478bd9Sstevel@tonic-gate dotable(char *argv[])
41427c478bd9Sstevel@tonic-gate {
4143cc22b130SRich Burridge int tcnt = 0; /* count # files tabled */
4144cc22b130SRich Burridge int fcnt = 0; /* count # files in argv list */
41457c478bd9Sstevel@tonic-gate char *namep, *dirp, *comp;
41467c478bd9Sstevel@tonic-gate int want;
41477c478bd9Sstevel@tonic-gate char aclchar = ' '; /* either blank or '+' */
41487c478bd9Sstevel@tonic-gate char templink[PATH_MAX+1];
4149da6c28aaSamw attr_data_t *attrinfo = NULL;
41507c478bd9Sstevel@tonic-gate
41517c478bd9Sstevel@tonic-gate dumping = 0;
41527c478bd9Sstevel@tonic-gate
41537c478bd9Sstevel@tonic-gate /* if not on magtape, maximize seek speed */
41547c478bd9Sstevel@tonic-gate if (NotTape && !bflag) {
41557c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK
41567c478bd9Sstevel@tonic-gate nblock = SYS_BLOCK / TBLOCK;
41577c478bd9Sstevel@tonic-gate #else
41587c478bd9Sstevel@tonic-gate nblock = 1;
41597c478bd9Sstevel@tonic-gate #endif
41607c478bd9Sstevel@tonic-gate }
41617c478bd9Sstevel@tonic-gate
41627c478bd9Sstevel@tonic-gate for (;;) {
41637c478bd9Sstevel@tonic-gate
41647c478bd9Sstevel@tonic-gate /* namep is set by wantit to point to the full name */
4165da6c28aaSamw if ((want = wantit(argv, &namep, &dirp, &comp, &attrinfo)) == 0)
41667c478bd9Sstevel@tonic-gate continue;
41677c478bd9Sstevel@tonic-gate if (want == -1)
41687c478bd9Sstevel@tonic-gate break;
41697c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag != 'A')
41707c478bd9Sstevel@tonic-gate ++tcnt;
41717c478bd9Sstevel@tonic-gate
41723a1dab68SRich Burridge if (Fflag) {
41733a1dab68SRich Burridge if (checkf(namep, is_directory(namep), Fflag) == 0) {
41743a1dab68SRich Burridge passtape();
41753a1dab68SRich Burridge continue;
41763a1dab68SRich Burridge }
41773a1dab68SRich Burridge }
41787c478bd9Sstevel@tonic-gate /*
41797c478bd9Sstevel@tonic-gate * ACL support:
41807c478bd9Sstevel@tonic-gate * aclchar is introduced to indicate if there are
41817c478bd9Sstevel@tonic-gate * acl entries. longt() now takes one extra argument.
41827c478bd9Sstevel@tonic-gate */
41837c478bd9Sstevel@tonic-gate if (vflag) {
41847c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == 'A') {
41857c478bd9Sstevel@tonic-gate aclchar = '+';
41867c478bd9Sstevel@tonic-gate passtape();
41877c478bd9Sstevel@tonic-gate continue;
41887c478bd9Sstevel@tonic-gate }
41897c478bd9Sstevel@tonic-gate longt(&stbuf, aclchar);
41907c478bd9Sstevel@tonic-gate aclchar = ' ';
41917c478bd9Sstevel@tonic-gate }
41927c478bd9Sstevel@tonic-gate
41937c478bd9Sstevel@tonic-gate
41947c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
4195da6c28aaSamw if (xattrp != NULL) {
4196da6c28aaSamw int issysattr;
4197da6c28aaSamw char *bn = basename(attrinfo->attr_path);
41987c478bd9Sstevel@tonic-gate
4199da6c28aaSamw /*
4200da6c28aaSamw * We could use sysattr_type() to test whether or not
4201da6c28aaSamw * the attribute we are processing is really an
4202da6c28aaSamw * extended system attribute, which as of this writing
4203da6c28aaSamw * just does a strcmp(), however, sysattr_type() may
4204da6c28aaSamw * be changed to issue a pathconf() call instead, which
4205da6c28aaSamw * would require being changed into the parent attribute
4206da6c28aaSamw * directory. So instead, just do simple string
4207da6c28aaSamw * comparisons to see if we are processing an extended
4208da6c28aaSamw * system attribute.
4209da6c28aaSamw */
4210da6c28aaSamw issysattr = is_sysattr(bn);
4211da6c28aaSamw
4212da6c28aaSamw (void) printf(gettext("%s %sattribute %s"),
4213da6c28aaSamw xattrp->h_names,
4214da6c28aaSamw issysattr ? gettext("system ") : "",
4215da6c28aaSamw attrinfo->attr_path);
42167c478bd9Sstevel@tonic-gate } else {
42177c478bd9Sstevel@tonic-gate (void) printf("%s", namep);
42187c478bd9Sstevel@tonic-gate }
42197c478bd9Sstevel@tonic-gate #else
42207c478bd9Sstevel@tonic-gate (void) printf("%s", namep);
42217c478bd9Sstevel@tonic-gate #endif
42227c478bd9Sstevel@tonic-gate
42237c478bd9Sstevel@tonic-gate if (extno != 0) {
42247c478bd9Sstevel@tonic-gate if (vflag) {
42257c478bd9Sstevel@tonic-gate /* keep the '\n' for backwards compatibility */
42267c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
42277c478bd9Sstevel@tonic-gate "\n [extent #%d of %d]"), extno, extotal);
42287c478bd9Sstevel@tonic-gate } else {
42297c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
42307c478bd9Sstevel@tonic-gate " [extent #%d of %d]"), extno, extotal);
42317c478bd9Sstevel@tonic-gate }
42327c478bd9Sstevel@tonic-gate }
42337c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) {
42347c478bd9Sstevel@tonic-gate (void) strcpy(templink, Xtarhdr.x_linkpath);
42357c478bd9Sstevel@tonic-gate } else {
42367c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
4237da6c28aaSamw if (xattrp != NULL) {
42387c478bd9Sstevel@tonic-gate (void) sprintf(templink,
42397c478bd9Sstevel@tonic-gate "file %.*s", NAMSIZ, xattrp->h_names);
42407c478bd9Sstevel@tonic-gate } else {
42417c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ,
42427c478bd9Sstevel@tonic-gate dblock.dbuf.linkname);
42437c478bd9Sstevel@tonic-gate }
42447c478bd9Sstevel@tonic-gate #else
42457c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ,
42467c478bd9Sstevel@tonic-gate dblock.dbuf.linkname);
42477c478bd9Sstevel@tonic-gate #endif
42487c478bd9Sstevel@tonic-gate templink[NAMSIZ] = '\0';
42497c478bd9Sstevel@tonic-gate }
42507c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '1') {
42517c478bd9Sstevel@tonic-gate /*
42527c478bd9Sstevel@tonic-gate * TRANSLATION_NOTE
42537c478bd9Sstevel@tonic-gate * Subject is omitted here.
42547c478bd9Sstevel@tonic-gate * Translate this as if
42557c478bd9Sstevel@tonic-gate * <subject> linked to %s
42567c478bd9Sstevel@tonic-gate */
42577c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
4258da6c28aaSamw if (xattrp != NULL) {
42597c478bd9Sstevel@tonic-gate (void) printf(
42607c478bd9Sstevel@tonic-gate gettext(" linked to attribute %s"),
42617c478bd9Sstevel@tonic-gate xattr_linkp->h_names +
42627c478bd9Sstevel@tonic-gate strlen(xattr_linkp->h_names) + 1);
42637c478bd9Sstevel@tonic-gate } else {
42647c478bd9Sstevel@tonic-gate (void) printf(
42657c478bd9Sstevel@tonic-gate gettext(" linked to %s"), templink);
42667c478bd9Sstevel@tonic-gate }
42677c478bd9Sstevel@tonic-gate #else
42687c478bd9Sstevel@tonic-gate (void) printf(
42697c478bd9Sstevel@tonic-gate gettext(" linked to %s"), templink);
42707c478bd9Sstevel@tonic-gate
42717c478bd9Sstevel@tonic-gate #endif
42727c478bd9Sstevel@tonic-gate }
42737c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '2')
42747c478bd9Sstevel@tonic-gate (void) printf(gettext(
42757c478bd9Sstevel@tonic-gate /*
42767c478bd9Sstevel@tonic-gate * TRANSLATION_NOTE
42777c478bd9Sstevel@tonic-gate * Subject is omitted here.
42787c478bd9Sstevel@tonic-gate * Translate this as if
42797c478bd9Sstevel@tonic-gate * <subject> symbolic link to %s
42807c478bd9Sstevel@tonic-gate */
42817c478bd9Sstevel@tonic-gate " symbolic link to %s"), templink);
42827c478bd9Sstevel@tonic-gate (void) printf("\n");
42837c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
4284da6c28aaSamw if (xattrp != NULL) {
42857c478bd9Sstevel@tonic-gate free(xattrhead);
42867c478bd9Sstevel@tonic-gate xattrp = NULL;
42877c478bd9Sstevel@tonic-gate xattrhead = NULL;
42887c478bd9Sstevel@tonic-gate }
42897c478bd9Sstevel@tonic-gate #endif
42907c478bd9Sstevel@tonic-gate passtape();
42917c478bd9Sstevel@tonic-gate }
42927c478bd9Sstevel@tonic-gate /*
42937c478bd9Sstevel@tonic-gate * Check if the number of files tabled is different from the
42947c478bd9Sstevel@tonic-gate * number of files listed on the command line
42957c478bd9Sstevel@tonic-gate */
42967c478bd9Sstevel@tonic-gate if (fcnt > tcnt) {
42977c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
42987c478bd9Sstevel@tonic-gate "tar: %d file(s) not found\n"), fcnt-tcnt);
42997c478bd9Sstevel@tonic-gate Errflg = 1;
43007c478bd9Sstevel@tonic-gate }
43017c478bd9Sstevel@tonic-gate }
43027c478bd9Sstevel@tonic-gate
43037c478bd9Sstevel@tonic-gate static void
putempty(blkcnt_t n)43047c478bd9Sstevel@tonic-gate putempty(blkcnt_t n)
43057c478bd9Sstevel@tonic-gate {
43067c478bd9Sstevel@tonic-gate char buf[TBLOCK];
43077c478bd9Sstevel@tonic-gate char *cp;
43087c478bd9Sstevel@tonic-gate
43097c478bd9Sstevel@tonic-gate for (cp = buf; cp < &buf[TBLOCK]; )
43107c478bd9Sstevel@tonic-gate *cp++ = '\0';
43117c478bd9Sstevel@tonic-gate while (n-- > 0)
43127c478bd9Sstevel@tonic-gate (void) writetbuf(buf, 1);
43137c478bd9Sstevel@tonic-gate }
43147c478bd9Sstevel@tonic-gate
43157c478bd9Sstevel@tonic-gate static ushort_t Ftype = S_IFMT;
43167c478bd9Sstevel@tonic-gate
43177c478bd9Sstevel@tonic-gate static void
verbose(struct stat * st,char aclchar)43187c478bd9Sstevel@tonic-gate verbose(struct stat *st, char aclchar)
43197c478bd9Sstevel@tonic-gate {
43207c478bd9Sstevel@tonic-gate int i, j, temp;
43217c478bd9Sstevel@tonic-gate mode_t mode;
43227c478bd9Sstevel@tonic-gate char modestr[12];
43237c478bd9Sstevel@tonic-gate
43247c478bd9Sstevel@tonic-gate for (i = 0; i < 11; i++)
43257c478bd9Sstevel@tonic-gate modestr[i] = '-';
43267c478bd9Sstevel@tonic-gate modestr[i] = '\0';
43277c478bd9Sstevel@tonic-gate
43287c478bd9Sstevel@tonic-gate /* a '+' sign is printed if there is ACL */
43297c478bd9Sstevel@tonic-gate modestr[i-1] = aclchar;
43307c478bd9Sstevel@tonic-gate
43317c478bd9Sstevel@tonic-gate mode = st->st_mode;
43327c478bd9Sstevel@tonic-gate for (i = 0; i < 3; i++) {
43337c478bd9Sstevel@tonic-gate temp = (mode >> (6 - (i * 3)));
43347c478bd9Sstevel@tonic-gate j = (i * 3) + 1;
43357c478bd9Sstevel@tonic-gate if (S_IROTH & temp)
43367c478bd9Sstevel@tonic-gate modestr[j] = 'r';
43377c478bd9Sstevel@tonic-gate if (S_IWOTH & temp)
43387c478bd9Sstevel@tonic-gate modestr[j + 1] = 'w';
43397c478bd9Sstevel@tonic-gate if (S_IXOTH & temp)
43407c478bd9Sstevel@tonic-gate modestr[j + 2] = 'x';
43417c478bd9Sstevel@tonic-gate }
43427c478bd9Sstevel@tonic-gate temp = st->st_mode & Ftype;
43437c478bd9Sstevel@tonic-gate switch (temp) {
43447c478bd9Sstevel@tonic-gate case (S_IFIFO):
43457c478bd9Sstevel@tonic-gate modestr[0] = 'p';
43467c478bd9Sstevel@tonic-gate break;
43477c478bd9Sstevel@tonic-gate case (S_IFCHR):
43487c478bd9Sstevel@tonic-gate modestr[0] = 'c';
43497c478bd9Sstevel@tonic-gate break;
43507c478bd9Sstevel@tonic-gate case (S_IFDIR):
43517c478bd9Sstevel@tonic-gate modestr[0] = 'd';
43527c478bd9Sstevel@tonic-gate break;
43537c478bd9Sstevel@tonic-gate case (S_IFBLK):
43547c478bd9Sstevel@tonic-gate modestr[0] = 'b';
43557c478bd9Sstevel@tonic-gate break;
43567c478bd9Sstevel@tonic-gate case (S_IFREG): /* was initialized to '-' */
43577c478bd9Sstevel@tonic-gate break;
43587c478bd9Sstevel@tonic-gate case (S_IFLNK):
43597c478bd9Sstevel@tonic-gate modestr[0] = 'l';
43607c478bd9Sstevel@tonic-gate break;
43617c478bd9Sstevel@tonic-gate default:
43627c478bd9Sstevel@tonic-gate /* This field may be zero in old archives. */
43637c478bd9Sstevel@tonic-gate if (is_posix && dblock.dbuf.typeflag != '1') {
43647c478bd9Sstevel@tonic-gate /*
43657c478bd9Sstevel@tonic-gate * For POSIX compliant archives, the mode field
43667c478bd9Sstevel@tonic-gate * consists of 12 bits, ie: the file type bits
43677c478bd9Sstevel@tonic-gate * are not stored in dblock.dbuf.mode.
43687c478bd9Sstevel@tonic-gate * For files other than hard links, getdir() sets
43697c478bd9Sstevel@tonic-gate * the file type bits in the st_mode field of the
43707c478bd9Sstevel@tonic-gate * stat structure based upon dblock.dbuf.typeflag.
43717c478bd9Sstevel@tonic-gate */
43727c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
43737c478bd9Sstevel@tonic-gate "tar: impossible file type"));
43747c478bd9Sstevel@tonic-gate }
43757c478bd9Sstevel@tonic-gate }
43767c478bd9Sstevel@tonic-gate
43777c478bd9Sstevel@tonic-gate if ((S_ISUID & Gen.g_mode) == S_ISUID)
43787c478bd9Sstevel@tonic-gate modestr[3] = 's';
43797c478bd9Sstevel@tonic-gate if ((S_ISVTX & Gen.g_mode) == S_ISVTX)
43807c478bd9Sstevel@tonic-gate modestr[9] = 't';
43817c478bd9Sstevel@tonic-gate if ((S_ISGID & Gen.g_mode) == S_ISGID && modestr[6] == 'x')
43827c478bd9Sstevel@tonic-gate modestr[6] = 's';
43837c478bd9Sstevel@tonic-gate else if ((S_ENFMT & Gen.g_mode) == S_ENFMT && modestr[6] != 'x')
43847c478bd9Sstevel@tonic-gate modestr[6] = 'l';
43857c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%s", modestr);
43867c478bd9Sstevel@tonic-gate }
43877c478bd9Sstevel@tonic-gate
43887c478bd9Sstevel@tonic-gate static void
longt(struct stat * st,char aclchar)43897c478bd9Sstevel@tonic-gate longt(struct stat *st, char aclchar)
43907c478bd9Sstevel@tonic-gate {
43917c478bd9Sstevel@tonic-gate char fileDate[30];
43927c478bd9Sstevel@tonic-gate struct tm *tm;
43937c478bd9Sstevel@tonic-gate
43947c478bd9Sstevel@tonic-gate verbose(st, aclchar);
43957c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%3ld/%-3ld", st->st_uid, st->st_gid);
43967c478bd9Sstevel@tonic-gate
43977c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '2') {
43987c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH)
43997c478bd9Sstevel@tonic-gate st->st_size = (off_t)strlen(Xtarhdr.x_linkpath);
44007c478bd9Sstevel@tonic-gate else
44017c478bd9Sstevel@tonic-gate st->st_size = (off_t)(memchr(dblock.dbuf.linkname,
44027c478bd9Sstevel@tonic-gate '\0', NAMSIZ) ?
44037c478bd9Sstevel@tonic-gate (strlen(dblock.dbuf.linkname)) : (NAMSIZ));
44047c478bd9Sstevel@tonic-gate }
44057c478bd9Sstevel@tonic-gate (void) fprintf(vfile, " %6" FMT_off_t, st->st_size);
44067c478bd9Sstevel@tonic-gate
44077c478bd9Sstevel@tonic-gate tm = localtime(&(st->st_mtime));
44087c478bd9Sstevel@tonic-gate (void) strftime(fileDate, sizeof (fileDate),
44097c478bd9Sstevel@tonic-gate dcgettext((const char *)0, "%b %e %R %Y", LC_TIME), tm);
44107c478bd9Sstevel@tonic-gate (void) fprintf(vfile, " %s ", fileDate);
44117c478bd9Sstevel@tonic-gate }
44127c478bd9Sstevel@tonic-gate
44137c478bd9Sstevel@tonic-gate
44147c478bd9Sstevel@tonic-gate /*
44157c478bd9Sstevel@tonic-gate * checkdir - Attempt to ensure that the path represented in name
44167c478bd9Sstevel@tonic-gate * exists, and return 1 if this is true and name itself is a
44177c478bd9Sstevel@tonic-gate * directory.
44187c478bd9Sstevel@tonic-gate * Return 0 if this path cannot be created or if name is not
44197c478bd9Sstevel@tonic-gate * a directory.
44207c478bd9Sstevel@tonic-gate */
44217c478bd9Sstevel@tonic-gate
44227c478bd9Sstevel@tonic-gate static int
checkdir(char * name)44237c478bd9Sstevel@tonic-gate checkdir(char *name)
44247c478bd9Sstevel@tonic-gate {
44257c478bd9Sstevel@tonic-gate char lastChar; /* the last character in name */
44267c478bd9Sstevel@tonic-gate char *cp; /* scratch pointer into name */
44277c478bd9Sstevel@tonic-gate char *firstSlash = NULL; /* first slash in name */
44287c478bd9Sstevel@tonic-gate char *lastSlash = NULL; /* last slash in name */
44297c478bd9Sstevel@tonic-gate int nameLen; /* length of name */
44307c478bd9Sstevel@tonic-gate int trailingSlash; /* true if name ends in slash */
44317c478bd9Sstevel@tonic-gate int leadingSlash; /* true if name begins with slash */
44327c478bd9Sstevel@tonic-gate int markedDir; /* true if name denotes a directory */
44337c478bd9Sstevel@tonic-gate int success; /* status of makeDir call */
44347c478bd9Sstevel@tonic-gate
44357c478bd9Sstevel@tonic-gate
44367c478bd9Sstevel@tonic-gate /*
44377c478bd9Sstevel@tonic-gate * Scan through the name, and locate first and last slashes.
44387c478bd9Sstevel@tonic-gate */
44397c478bd9Sstevel@tonic-gate
44407c478bd9Sstevel@tonic-gate for (cp = name; *cp; cp++) {
44417c478bd9Sstevel@tonic-gate if (*cp == '/') {
44427c478bd9Sstevel@tonic-gate if (! firstSlash) {
44437c478bd9Sstevel@tonic-gate firstSlash = cp;
44447c478bd9Sstevel@tonic-gate }
44457c478bd9Sstevel@tonic-gate lastSlash = cp;
44467c478bd9Sstevel@tonic-gate }
44477c478bd9Sstevel@tonic-gate }
44487c478bd9Sstevel@tonic-gate
44497c478bd9Sstevel@tonic-gate /*
44507c478bd9Sstevel@tonic-gate * Determine what you can from the proceeds of the scan.
44517c478bd9Sstevel@tonic-gate */
44527c478bd9Sstevel@tonic-gate
44537c478bd9Sstevel@tonic-gate lastChar = *(cp - 1);
44547c478bd9Sstevel@tonic-gate nameLen = (int)(cp - name);
44557c478bd9Sstevel@tonic-gate trailingSlash = (lastChar == '/');
44567c478bd9Sstevel@tonic-gate leadingSlash = (*name == '/');
44577c478bd9Sstevel@tonic-gate markedDir = (dblock.dbuf.typeflag == '5' || trailingSlash);
44587c478bd9Sstevel@tonic-gate
44597c478bd9Sstevel@tonic-gate if (! lastSlash && ! markedDir) {
44607c478bd9Sstevel@tonic-gate /*
44617c478bd9Sstevel@tonic-gate * The named file does not have any subdrectory
44627c478bd9Sstevel@tonic-gate * structure; just bail out.
44637c478bd9Sstevel@tonic-gate */
44647c478bd9Sstevel@tonic-gate
44657c478bd9Sstevel@tonic-gate return (0);
44667c478bd9Sstevel@tonic-gate }
44677c478bd9Sstevel@tonic-gate
44687c478bd9Sstevel@tonic-gate /*
44697c478bd9Sstevel@tonic-gate * Make sure that name doesn`t end with slash for the loop.
44707c478bd9Sstevel@tonic-gate * This ensures that the makeDir attempt after the loop is
44717c478bd9Sstevel@tonic-gate * meaningful.
44727c478bd9Sstevel@tonic-gate */
44737c478bd9Sstevel@tonic-gate
44747c478bd9Sstevel@tonic-gate if (trailingSlash) {
44757c478bd9Sstevel@tonic-gate name[nameLen-1] = '\0';
44767c478bd9Sstevel@tonic-gate }
44777c478bd9Sstevel@tonic-gate
44787c478bd9Sstevel@tonic-gate /*
44797c478bd9Sstevel@tonic-gate * Make the path one component at a time.
44807c478bd9Sstevel@tonic-gate */
44817c478bd9Sstevel@tonic-gate
44827c478bd9Sstevel@tonic-gate for (cp = strchr(leadingSlash ? name+1 : name, '/');
44837c478bd9Sstevel@tonic-gate cp;
44847c478bd9Sstevel@tonic-gate cp = strchr(cp+1, '/')) {
44857c478bd9Sstevel@tonic-gate *cp = '\0';
44867c478bd9Sstevel@tonic-gate success = makeDir(name);
44877c478bd9Sstevel@tonic-gate *cp = '/';
44887c478bd9Sstevel@tonic-gate
44897c478bd9Sstevel@tonic-gate if (!success) {
44907c478bd9Sstevel@tonic-gate name[nameLen-1] = lastChar;
44917c478bd9Sstevel@tonic-gate return (0);
44927c478bd9Sstevel@tonic-gate }
44937c478bd9Sstevel@tonic-gate }
44947c478bd9Sstevel@tonic-gate
44957c478bd9Sstevel@tonic-gate /*
44967c478bd9Sstevel@tonic-gate * This makes the last component of the name, if it is a
44977c478bd9Sstevel@tonic-gate * directory.
44987c478bd9Sstevel@tonic-gate */
44997c478bd9Sstevel@tonic-gate
45007c478bd9Sstevel@tonic-gate if (markedDir) {
45017c478bd9Sstevel@tonic-gate if (! makeDir(name)) {
45027c478bd9Sstevel@tonic-gate name[nameLen-1] = lastChar;
45037c478bd9Sstevel@tonic-gate return (0);
45047c478bd9Sstevel@tonic-gate }
45057c478bd9Sstevel@tonic-gate }
45067c478bd9Sstevel@tonic-gate
45077c478bd9Sstevel@tonic-gate name[nameLen-1] = (lastChar == '/') ? '\0' : lastChar;
45087c478bd9Sstevel@tonic-gate return (markedDir);
45097c478bd9Sstevel@tonic-gate }
45107c478bd9Sstevel@tonic-gate
45117c478bd9Sstevel@tonic-gate /*
45127c478bd9Sstevel@tonic-gate * resugname - Restore the user name and group name. Search the NIS
45137c478bd9Sstevel@tonic-gate * before using the uid and gid.
45147c478bd9Sstevel@tonic-gate * (It is presumed that an archive entry cannot be
45157c478bd9Sstevel@tonic-gate * simultaneously a symlink and some other type.)
45167c478bd9Sstevel@tonic-gate */
45177c478bd9Sstevel@tonic-gate
45187c478bd9Sstevel@tonic-gate static void
resugname(int dirfd,char * name,int symflag)45197c478bd9Sstevel@tonic-gate resugname(int dirfd, /* dir fd file resides in */
45207c478bd9Sstevel@tonic-gate char *name, /* name of the file to be modified */
45217c478bd9Sstevel@tonic-gate int symflag) /* true if file is a symbolic link */
45227c478bd9Sstevel@tonic-gate {
45237c478bd9Sstevel@tonic-gate uid_t duid;
45247c478bd9Sstevel@tonic-gate gid_t dgid;
45257c478bd9Sstevel@tonic-gate struct stat *sp = &stbuf;
45267c478bd9Sstevel@tonic-gate char *u_g_name;
45277c478bd9Sstevel@tonic-gate
45287c478bd9Sstevel@tonic-gate if (checkflag == 1) { /* Extended tar format and euid == 0 */
45297c478bd9Sstevel@tonic-gate
45307c478bd9Sstevel@tonic-gate /*
45317c478bd9Sstevel@tonic-gate * Try and extract the intended uid and gid from the name
45327c478bd9Sstevel@tonic-gate * service before believing the uid and gid in the header.
45337c478bd9Sstevel@tonic-gate *
45347c478bd9Sstevel@tonic-gate * In the case where we archived a setuid or setgid file
45357c478bd9Sstevel@tonic-gate * owned by someone with a large uid, then it will
45367c478bd9Sstevel@tonic-gate * have made it into the archive with a uid of nobody. If
45377c478bd9Sstevel@tonic-gate * the corresponding username doesn't appear to exist, then we
45387c478bd9Sstevel@tonic-gate * want to make sure it *doesn't* end up as setuid nobody!
45397c478bd9Sstevel@tonic-gate *
45407c478bd9Sstevel@tonic-gate * Our caller will print an error message about the fact
45417c478bd9Sstevel@tonic-gate * that the restore didn't work out quite right ..
45427c478bd9Sstevel@tonic-gate */
45437c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_UNAME)
45447c478bd9Sstevel@tonic-gate u_g_name = Xtarhdr.x_uname;
45457c478bd9Sstevel@tonic-gate else
45467c478bd9Sstevel@tonic-gate u_g_name = dblock.dbuf.uname;
45477c478bd9Sstevel@tonic-gate if ((duid = getuidbyname(u_g_name)) == -1) {
45487c478bd9Sstevel@tonic-gate if (S_ISREG(sp->st_mode) && sp->st_uid == UID_NOBODY &&
45497c478bd9Sstevel@tonic-gate (sp->st_mode & S_ISUID) == S_ISUID)
45507c478bd9Sstevel@tonic-gate (void) chmod(name,
45517c478bd9Sstevel@tonic-gate MODEMASK & sp->st_mode & ~S_ISUID);
45527c478bd9Sstevel@tonic-gate duid = sp->st_uid;
45537c478bd9Sstevel@tonic-gate }
45547c478bd9Sstevel@tonic-gate
45557c478bd9Sstevel@tonic-gate /* (Ditto for gids) */
45567c478bd9Sstevel@tonic-gate
45577c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_GNAME)
45587c478bd9Sstevel@tonic-gate u_g_name = Xtarhdr.x_gname;
45597c478bd9Sstevel@tonic-gate else
45607c478bd9Sstevel@tonic-gate u_g_name = dblock.dbuf.gname;
45617c478bd9Sstevel@tonic-gate if ((dgid = getgidbyname(u_g_name)) == -1) {
45627c478bd9Sstevel@tonic-gate if (S_ISREG(sp->st_mode) && sp->st_gid == GID_NOBODY &&
45637c478bd9Sstevel@tonic-gate (sp->st_mode & S_ISGID) == S_ISGID)
45647c478bd9Sstevel@tonic-gate (void) chmod(name,
45657c478bd9Sstevel@tonic-gate MODEMASK & sp->st_mode & ~S_ISGID);
45667c478bd9Sstevel@tonic-gate dgid = sp->st_gid;
45677c478bd9Sstevel@tonic-gate }
45687c478bd9Sstevel@tonic-gate } else if (checkflag == 2) { /* tar format and euid == 0 */
45697c478bd9Sstevel@tonic-gate duid = sp->st_uid;
45707c478bd9Sstevel@tonic-gate dgid = sp->st_gid;
45717c478bd9Sstevel@tonic-gate }
45727c478bd9Sstevel@tonic-gate if ((checkflag == 1) || (checkflag == 2))
45737c478bd9Sstevel@tonic-gate (void) fchownat(dirfd, name, duid, dgid, symflag);
45747c478bd9Sstevel@tonic-gate }
45757c478bd9Sstevel@tonic-gate
45767c478bd9Sstevel@tonic-gate /*ARGSUSED*/
45777c478bd9Sstevel@tonic-gate static void
onintr(int sig)45787c478bd9Sstevel@tonic-gate onintr(int sig)
45797c478bd9Sstevel@tonic-gate {
45807c478bd9Sstevel@tonic-gate (void) signal(SIGINT, SIG_IGN);
45817c478bd9Sstevel@tonic-gate term++;
45827c478bd9Sstevel@tonic-gate }
45837c478bd9Sstevel@tonic-gate
45847c478bd9Sstevel@tonic-gate /*ARGSUSED*/
45857c478bd9Sstevel@tonic-gate static void
onquit(int sig)45867c478bd9Sstevel@tonic-gate onquit(int sig)
45877c478bd9Sstevel@tonic-gate {
45887c478bd9Sstevel@tonic-gate (void) signal(SIGQUIT, SIG_IGN);
45897c478bd9Sstevel@tonic-gate term++;
45907c478bd9Sstevel@tonic-gate }
45917c478bd9Sstevel@tonic-gate
45927c478bd9Sstevel@tonic-gate /*ARGSUSED*/
45937c478bd9Sstevel@tonic-gate static void
onhup(int sig)45947c478bd9Sstevel@tonic-gate onhup(int sig)
45957c478bd9Sstevel@tonic-gate {
45967c478bd9Sstevel@tonic-gate (void) signal(SIGHUP, SIG_IGN);
45977c478bd9Sstevel@tonic-gate term++;
45987c478bd9Sstevel@tonic-gate }
45997c478bd9Sstevel@tonic-gate
46007c478bd9Sstevel@tonic-gate static void
tomodes(struct stat * sp)46017c478bd9Sstevel@tonic-gate tomodes(struct stat *sp)
46027c478bd9Sstevel@tonic-gate {
46037c478bd9Sstevel@tonic-gate uid_t uid;
46047c478bd9Sstevel@tonic-gate gid_t gid;
46057c478bd9Sstevel@tonic-gate
46067c478bd9Sstevel@tonic-gate bzero(dblock.dummy, TBLOCK);
46077c478bd9Sstevel@tonic-gate
46087c478bd9Sstevel@tonic-gate /*
46097c478bd9Sstevel@tonic-gate * If the uid or gid is too large, we can't put it into
46107c478bd9Sstevel@tonic-gate * the archive. We could fail to put anything in the
46117c478bd9Sstevel@tonic-gate * archive at all .. but most of the time the name service
46127c478bd9Sstevel@tonic-gate * will save the day when we do a lookup at restore time.
46137c478bd9Sstevel@tonic-gate *
46147c478bd9Sstevel@tonic-gate * Instead we choose a "safe" uid and gid, and fix up whether
46157c478bd9Sstevel@tonic-gate * or not the setuid and setgid bits are left set to extraction
46167c478bd9Sstevel@tonic-gate * time.
46177c478bd9Sstevel@tonic-gate */
46187c478bd9Sstevel@tonic-gate if (Eflag) {
46197c478bd9Sstevel@tonic-gate if ((ulong_t)(uid = sp->st_uid) > (ulong_t)OCTAL7CHAR) {
46207c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_UID;
46217c478bd9Sstevel@tonic-gate Xtarhdr.x_uid = uid;
46227c478bd9Sstevel@tonic-gate }
46237c478bd9Sstevel@tonic-gate if ((ulong_t)(gid = sp->st_gid) > (ulong_t)OCTAL7CHAR) {
46247c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_GID;
46257c478bd9Sstevel@tonic-gate Xtarhdr.x_gid = gid;
46267c478bd9Sstevel@tonic-gate }
46277c478bd9Sstevel@tonic-gate if (sp->st_size > TAR_OFFSET_MAX) {
46287c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_SIZE;
46297c478bd9Sstevel@tonic-gate Xtarhdr.x_filesz = sp->st_size;
46307c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o,
46317c478bd9Sstevel@tonic-gate (off_t)0);
46327c478bd9Sstevel@tonic-gate } else
46337c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o,
46347c478bd9Sstevel@tonic-gate sp->st_size);
46357c478bd9Sstevel@tonic-gate } else {
46367c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o,
46377c478bd9Sstevel@tonic-gate sp->st_size);
46387c478bd9Sstevel@tonic-gate }
46397c478bd9Sstevel@tonic-gate if ((ulong_t)(uid = sp->st_uid) > (ulong_t)OCTAL7CHAR)
46407c478bd9Sstevel@tonic-gate uid = UID_NOBODY;
46417c478bd9Sstevel@tonic-gate if ((ulong_t)(gid = sp->st_gid) > (ulong_t)OCTAL7CHAR)
46427c478bd9Sstevel@tonic-gate gid = GID_NOBODY;
46437c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.gid, "%07lo", gid);
46447c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.uid, "%07lo", uid);
46457c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mode, "%07lo", sp->st_mode & POSIXMODES);
46467c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mtime, "%011lo", sp->st_mtime);
46477c478bd9Sstevel@tonic-gate }
46487c478bd9Sstevel@tonic-gate
46497c478bd9Sstevel@tonic-gate static int
46507c478bd9Sstevel@tonic-gate #ifdef EUC
46517c478bd9Sstevel@tonic-gate /*
46527c478bd9Sstevel@tonic-gate * Warning: the result of this function depends whether 'char' is a
46537c478bd9Sstevel@tonic-gate * signed or unsigned data type. This a source of potential
46547c478bd9Sstevel@tonic-gate * non-portability among heterogeneous systems. It is retained here
46557c478bd9Sstevel@tonic-gate * for backward compatibility.
46567c478bd9Sstevel@tonic-gate */
checksum_signed(union hblock * dblockp)46577c478bd9Sstevel@tonic-gate checksum_signed(union hblock *dblockp)
46587c478bd9Sstevel@tonic-gate #else
46597c478bd9Sstevel@tonic-gate checksum(union hblock *dblockp)
46607c478bd9Sstevel@tonic-gate #endif /* EUC */
46617c478bd9Sstevel@tonic-gate {
46627c478bd9Sstevel@tonic-gate int i;
46637c478bd9Sstevel@tonic-gate char *cp;
46647c478bd9Sstevel@tonic-gate
46657c478bd9Sstevel@tonic-gate for (cp = dblockp->dbuf.chksum;
46667c478bd9Sstevel@tonic-gate cp < &dblockp->dbuf.chksum[sizeof (dblockp->dbuf.chksum)]; cp++)
46677c478bd9Sstevel@tonic-gate *cp = ' ';
46687c478bd9Sstevel@tonic-gate i = 0;
46697c478bd9Sstevel@tonic-gate for (cp = dblockp->dummy; cp < &(dblockp->dummy[TBLOCK]); cp++)
46707c478bd9Sstevel@tonic-gate i += *cp;
46717c478bd9Sstevel@tonic-gate return (i);
46727c478bd9Sstevel@tonic-gate }
46737c478bd9Sstevel@tonic-gate
46747c478bd9Sstevel@tonic-gate #ifdef EUC
46757c478bd9Sstevel@tonic-gate /*
46767c478bd9Sstevel@tonic-gate * Generate unsigned checksum, regardless of what C compiler is
46777c478bd9Sstevel@tonic-gate * used. Survives in the face of arbitrary 8-bit clean filenames,
46787c478bd9Sstevel@tonic-gate * e.g., internationalized filenames.
46797c478bd9Sstevel@tonic-gate */
46807c478bd9Sstevel@tonic-gate static int
checksum(union hblock * dblockp)46817c478bd9Sstevel@tonic-gate checksum(union hblock *dblockp)
46827c478bd9Sstevel@tonic-gate {
46837c478bd9Sstevel@tonic-gate unsigned i;
46847c478bd9Sstevel@tonic-gate unsigned char *cp;
46857c478bd9Sstevel@tonic-gate
46867c478bd9Sstevel@tonic-gate for (cp = (unsigned char *) dblockp->dbuf.chksum;
46877c478bd9Sstevel@tonic-gate cp < (unsigned char *)
46887c478bd9Sstevel@tonic-gate &(dblockp->dbuf.chksum[sizeof (dblockp->dbuf.chksum)]); cp++)
46897c478bd9Sstevel@tonic-gate *cp = ' ';
46907c478bd9Sstevel@tonic-gate i = 0;
46917c478bd9Sstevel@tonic-gate for (cp = (unsigned char *) dblockp->dummy;
46927c478bd9Sstevel@tonic-gate cp < (unsigned char *) &(dblockp->dummy[TBLOCK]); cp++)
46937c478bd9Sstevel@tonic-gate i += *cp;
46947c478bd9Sstevel@tonic-gate
46957c478bd9Sstevel@tonic-gate return (i);
46967c478bd9Sstevel@tonic-gate }
46977c478bd9Sstevel@tonic-gate #endif /* EUC */
46987c478bd9Sstevel@tonic-gate
46997c478bd9Sstevel@tonic-gate /*
47007c478bd9Sstevel@tonic-gate * If the w flag is set, output the action to be taken and the name of the
47017c478bd9Sstevel@tonic-gate * file. Perform the action if the user response is affirmative.
47027c478bd9Sstevel@tonic-gate */
47037c478bd9Sstevel@tonic-gate
47047c478bd9Sstevel@tonic-gate static int
checkw(char c,char * name)47057c478bd9Sstevel@tonic-gate checkw(char c, char *name)
47067c478bd9Sstevel@tonic-gate {
47077c478bd9Sstevel@tonic-gate if (wflag) {
47087c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%c ", c);
47097c478bd9Sstevel@tonic-gate if (vflag)
47107c478bd9Sstevel@tonic-gate longt(&stbuf, ' '); /* do we have acl info here */
47117c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%s: ", name);
47123d63ea05Sas145665 if (yes() == 1) {
47137c478bd9Sstevel@tonic-gate return (1);
47147c478bd9Sstevel@tonic-gate }
47157c478bd9Sstevel@tonic-gate return (0);
47167c478bd9Sstevel@tonic-gate }
47177c478bd9Sstevel@tonic-gate return (1);
47187c478bd9Sstevel@tonic-gate }
47197c478bd9Sstevel@tonic-gate
47207c478bd9Sstevel@tonic-gate /*
47213a1dab68SRich Burridge * When the F flag is set, exclude RCS and SCCS directories (and any files
47223a1dab68SRich Burridge * or directories under them). If F is set twice, also exclude .o files,
47233a1dab68SRich Burridge * and files names errs, core, and a.out.
47243a1dab68SRich Burridge *
47253a1dab68SRich Burridge * Return 0 if file should be excluded, 1 otherwise.
47267c478bd9Sstevel@tonic-gate */
47277c478bd9Sstevel@tonic-gate
47287c478bd9Sstevel@tonic-gate static int
checkf(char * longname,int is_dir,int howmuch)47293a1dab68SRich Burridge checkf(char *longname, int is_dir, int howmuch)
47307c478bd9Sstevel@tonic-gate {
47313a1dab68SRich Burridge static char fullname[PATH_MAX + 1];
47323a1dab68SRich Burridge char *dir, *name;
47337c478bd9Sstevel@tonic-gate
47343a1dab68SRich Burridge #if defined(O_XATTR)
47353a1dab68SRich Burridge /*
47363a1dab68SRich Burridge * If there is an xattr_buf structure associated with this file,
47373a1dab68SRich Burridge * always return 1.
47383a1dab68SRich Burridge */
47393a1dab68SRich Burridge if (xattrp) {
47407c478bd9Sstevel@tonic-gate return (1);
47417c478bd9Sstevel@tonic-gate }
47423a1dab68SRich Burridge #endif
47433a1dab68SRich Burridge
47443a1dab68SRich Burridge /*
47453a1dab68SRich Burridge * First check to see if the base name is an RCS or SCCS directory.
47463a1dab68SRich Burridge */
47473a1dab68SRich Burridge if (strlcpy(fullname, longname, sizeof (fullname)) >= sizeof (fullname))
47487c478bd9Sstevel@tonic-gate return (1);
47493a1dab68SRich Burridge
47503a1dab68SRich Burridge name = basename(fullname);
47513a1dab68SRich Burridge if (is_dir) {
47523a1dab68SRich Burridge if ((strcmp(name, "SCCS") == 0) || (strcmp(name, "RCS") == 0))
47537c478bd9Sstevel@tonic-gate return (0);
47543a1dab68SRich Burridge }
47553a1dab68SRich Burridge
47563a1dab68SRich Burridge /*
47573a1dab68SRich Burridge * If two -F command line options were given then exclude .o files,
47583a1dab68SRich Burridge * and files named errs, core, and a.out.
47593a1dab68SRich Burridge */
47603a1dab68SRich Burridge if (howmuch > 1 && !is_dir) {
47613a1dab68SRich Burridge size_t l = strlen(name);
47623a1dab68SRich Burridge
47633a1dab68SRich Burridge if (l >= 3 && name[l - 2] == '.' && name[l - 1] == 'o')
47643a1dab68SRich Burridge return (0);
47657c478bd9Sstevel@tonic-gate if (strcmp(name, "core") == 0 || strcmp(name, "errs") == 0 ||
47667c478bd9Sstevel@tonic-gate strcmp(name, "a.out") == 0)
47677c478bd9Sstevel@tonic-gate return (0);
47687c478bd9Sstevel@tonic-gate }
47697c478bd9Sstevel@tonic-gate
47703a1dab68SRich Burridge /*
47713a1dab68SRich Burridge * At this point, check to see if this file has a parent directory
47723a1dab68SRich Burridge * named RCS or SCCS. If so, then this file should be excluded too.
47733a1dab68SRich Burridge * The strcpy() operation is done again, because basename(3C) may
47743a1dab68SRich Burridge * modify the path string passed to it.
47753a1dab68SRich Burridge */
47763a1dab68SRich Burridge if (strlcpy(fullname, longname, sizeof (fullname)) >= sizeof (fullname))
47773a1dab68SRich Burridge return (1);
47783a1dab68SRich Burridge
47793a1dab68SRich Burridge dir = dirname(fullname);
47803a1dab68SRich Burridge while (strcmp(dir, ".") != 0) {
47813a1dab68SRich Burridge name = basename(dir);
47823a1dab68SRich Burridge if ((strcmp(name, "SCCS") == 0) || (strcmp(name, "RCS") == 0))
47833a1dab68SRich Burridge return (0);
47843a1dab68SRich Burridge dir = dirname(dir);
47853a1dab68SRich Burridge }
47863a1dab68SRich Burridge
47877c478bd9Sstevel@tonic-gate return (1);
47887c478bd9Sstevel@tonic-gate }
47897c478bd9Sstevel@tonic-gate
47907c478bd9Sstevel@tonic-gate static int
response(void)47917c478bd9Sstevel@tonic-gate response(void)
47927c478bd9Sstevel@tonic-gate {
47937c478bd9Sstevel@tonic-gate int c;
47947c478bd9Sstevel@tonic-gate
47957c478bd9Sstevel@tonic-gate c = getchar();
47967c478bd9Sstevel@tonic-gate if (c != '\n')
4797eace40a5Sceastha while (getchar() != '\n')
4798eace40a5Sceastha ;
47997c478bd9Sstevel@tonic-gate else c = 'n';
48007c478bd9Sstevel@tonic-gate return ((c >= 'A' && c <= 'Z') ? c + ('a'-'A') : c);
48017c478bd9Sstevel@tonic-gate }
48027c478bd9Sstevel@tonic-gate
48037c478bd9Sstevel@tonic-gate /* Has file been modified since being put into archive? If so, return > 0. */
48047c478bd9Sstevel@tonic-gate
4805d67944fbSScott Rotondo static off_t lookup(char *);
4806d67944fbSScott Rotondo
48077c478bd9Sstevel@tonic-gate static int
checkupdate(char * arg)48087c478bd9Sstevel@tonic-gate checkupdate(char *arg)
48097c478bd9Sstevel@tonic-gate {
48107c478bd9Sstevel@tonic-gate char name[PATH_MAX+1];
48117c478bd9Sstevel@tonic-gate time_t mtime;
48127c478bd9Sstevel@tonic-gate long nsecs;
48137c478bd9Sstevel@tonic-gate off_t seekp;
48147c478bd9Sstevel@tonic-gate
48157c478bd9Sstevel@tonic-gate rewind(tfile);
48167c478bd9Sstevel@tonic-gate if ((seekp = lookup(arg)) < 0)
48177c478bd9Sstevel@tonic-gate return (1);
48187c478bd9Sstevel@tonic-gate (void) fseek(tfile, seekp, 0);
48197c478bd9Sstevel@tonic-gate (void) fscanf(tfile, "%s %ld.%ld", name, &mtime, &nsecs);
48207c478bd9Sstevel@tonic-gate
48217c478bd9Sstevel@tonic-gate /*
48227c478bd9Sstevel@tonic-gate * Unless nanoseconds were stored in the file, only use seconds for
48237c478bd9Sstevel@tonic-gate * comparison of time. Nanoseconds are stored when -E is specified.
48247c478bd9Sstevel@tonic-gate */
48257c478bd9Sstevel@tonic-gate if (Eflag == 0)
48267c478bd9Sstevel@tonic-gate return (stbuf.st_mtime > mtime);
48277c478bd9Sstevel@tonic-gate
48287c478bd9Sstevel@tonic-gate if ((stbuf.st_mtime < mtime) ||
48297c478bd9Sstevel@tonic-gate ((stbuf.st_mtime == mtime) && (stbuf.st_mtim.tv_nsec <= nsecs)))
48307c478bd9Sstevel@tonic-gate return (0);
48317c478bd9Sstevel@tonic-gate return (1);
48327c478bd9Sstevel@tonic-gate }
48337c478bd9Sstevel@tonic-gate
48347c478bd9Sstevel@tonic-gate
48357c478bd9Sstevel@tonic-gate /*
48367c478bd9Sstevel@tonic-gate * newvol get new floppy (or tape) volume
48377c478bd9Sstevel@tonic-gate *
48387c478bd9Sstevel@tonic-gate * newvol(); resets tapepos and first to TRUE, prompts for
48397c478bd9Sstevel@tonic-gate * for new volume, and waits.
48407c478bd9Sstevel@tonic-gate * if dumping, end-of-file is written onto the tape.
48417c478bd9Sstevel@tonic-gate */
48427c478bd9Sstevel@tonic-gate
48437c478bd9Sstevel@tonic-gate static void
newvol(void)48447c478bd9Sstevel@tonic-gate newvol(void)
48457c478bd9Sstevel@tonic-gate {
48467c478bd9Sstevel@tonic-gate int c;
48477c478bd9Sstevel@tonic-gate
48487c478bd9Sstevel@tonic-gate if (dumping) {
4849*28c4d110SJoshua M. Clulow dlog("newvol called with 'dumping' set\n");
48507c478bd9Sstevel@tonic-gate putempty((blkcnt_t)2); /* 2 EOT marks */
48517c478bd9Sstevel@tonic-gate closevol();
48527c478bd9Sstevel@tonic-gate flushtape();
48537c478bd9Sstevel@tonic-gate sync();
48547c478bd9Sstevel@tonic-gate tapepos = 0;
48557c478bd9Sstevel@tonic-gate } else
48567c478bd9Sstevel@tonic-gate first = TRUE;
48577c478bd9Sstevel@tonic-gate if (close(mt) != 0)
48587c478bd9Sstevel@tonic-gate vperror(2, gettext("close error"));
48597c478bd9Sstevel@tonic-gate mt = 0;
48607c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
48617c478bd9Sstevel@tonic-gate "tar: \007please insert new volume, then press RETURN."));
48627c478bd9Sstevel@tonic-gate (void) fseek(stdin, (off_t)0, 2); /* scan over read-ahead */
48637c478bd9Sstevel@tonic-gate while ((c = getchar()) != '\n' && ! term)
48647c478bd9Sstevel@tonic-gate if (c == EOF)
48657c478bd9Sstevel@tonic-gate done(Errflg);
48667c478bd9Sstevel@tonic-gate if (term)
48677c478bd9Sstevel@tonic-gate done(Errflg);
48687c478bd9Sstevel@tonic-gate
48697c478bd9Sstevel@tonic-gate errno = 0;
48707c478bd9Sstevel@tonic-gate
48717c478bd9Sstevel@tonic-gate if (strcmp(usefile, "-") == 0) {
48727c478bd9Sstevel@tonic-gate mt = dup(1);
48737c478bd9Sstevel@tonic-gate } else {
48747c478bd9Sstevel@tonic-gate mt = open(usefile, dumping ? update : 0);
48757c478bd9Sstevel@tonic-gate }
48767c478bd9Sstevel@tonic-gate
48777c478bd9Sstevel@tonic-gate if (mt < 0) {
48787c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
48797c478bd9Sstevel@tonic-gate "tar: cannot reopen %s (%s)\n"),
48807c478bd9Sstevel@tonic-gate dumping ? gettext("output") : gettext("input"), usefile);
48817c478bd9Sstevel@tonic-gate
4882*28c4d110SJoshua M. Clulow dlog("update=%d, usefile=%s ", update, usefile);
4883*28c4d110SJoshua M. Clulow dlog("mt=%d, [%s]\n", mt, strerror(errno));
48847c478bd9Sstevel@tonic-gate
48857c478bd9Sstevel@tonic-gate done(2);
48867c478bd9Sstevel@tonic-gate }
48877c478bd9Sstevel@tonic-gate }
48887c478bd9Sstevel@tonic-gate
48897c478bd9Sstevel@tonic-gate /*
48907c478bd9Sstevel@tonic-gate * Write a trailer portion to close out the current output volume.
48917c478bd9Sstevel@tonic-gate */
48927c478bd9Sstevel@tonic-gate
48937c478bd9Sstevel@tonic-gate static void
closevol(void)48947c478bd9Sstevel@tonic-gate closevol(void)
48957c478bd9Sstevel@tonic-gate {
48967c478bd9Sstevel@tonic-gate if (mulvol) {
48977c478bd9Sstevel@tonic-gate /*
48987c478bd9Sstevel@tonic-gate * blocklim does not count the 2 EOT marks;
48997c478bd9Sstevel@tonic-gate * tapepos does count the 2 EOT marks;
49007c478bd9Sstevel@tonic-gate * therefore we need the +2 below.
49017c478bd9Sstevel@tonic-gate */
49027c478bd9Sstevel@tonic-gate putempty(blocklim + (blkcnt_t)2 - tapepos);
49037c478bd9Sstevel@tonic-gate }
49047c478bd9Sstevel@tonic-gate }
49057c478bd9Sstevel@tonic-gate
49067c478bd9Sstevel@tonic-gate static void
done(int n)49077c478bd9Sstevel@tonic-gate done(int n)
49087c478bd9Sstevel@tonic-gate {
490931732068SRich Burridge /*
491031732068SRich Burridge * If we were terminated in some way, and we would otherwise have
491131732068SRich Burridge * exited with a value of 0, adjust to 1, so that external callers
491231732068SRich Burridge * can determine this by looking at the exit status.
491331732068SRich Burridge */
491431732068SRich Burridge if (term && n == 0)
491531732068SRich Burridge n = 1;
491631732068SRich Burridge
49178f1d104bSRich Burridge if (tfile != NULL)
49187c478bd9Sstevel@tonic-gate (void) unlink(tname);
491936802407SRich Burridge if (compress_opt != NULL)
492036802407SRich Burridge (void) free(compress_opt);
49217c478bd9Sstevel@tonic-gate if (mt > 0) {
49227c478bd9Sstevel@tonic-gate if ((close(mt) != 0) || (fclose(stdout) != 0)) {
49237c478bd9Sstevel@tonic-gate perror(gettext("tar: close error"));
49247c478bd9Sstevel@tonic-gate exit(2);
49257c478bd9Sstevel@tonic-gate }
49267c478bd9Sstevel@tonic-gate }
4927c536b1f9SRobert Mustacchi /*
4928c536b1f9SRobert Mustacchi * If we have a compression child, we should have a child process that
4929c536b1f9SRobert Mustacchi * we're waiting for to finish compressing or uncompressing the tar
4930c536b1f9SRobert Mustacchi * stream.
4931c536b1f9SRobert Mustacchi */
4932c536b1f9SRobert Mustacchi if (comp_pid != 0)
4933c536b1f9SRobert Mustacchi wait_pid(comp_pid);
49347c478bd9Sstevel@tonic-gate exit(n);
49357c478bd9Sstevel@tonic-gate }
49367c478bd9Sstevel@tonic-gate
49377c478bd9Sstevel@tonic-gate /*
49387c478bd9Sstevel@tonic-gate * Determine if s1 is a prefix portion of s2 (or the same as s2).
49397c478bd9Sstevel@tonic-gate */
49407c478bd9Sstevel@tonic-gate
49417c478bd9Sstevel@tonic-gate static int
is_prefix(char * s1,char * s2)49427c478bd9Sstevel@tonic-gate is_prefix(char *s1, char *s2)
49437c478bd9Sstevel@tonic-gate {
49447c478bd9Sstevel@tonic-gate while (*s1)
49457c478bd9Sstevel@tonic-gate if (*s1++ != *s2++)
49467c478bd9Sstevel@tonic-gate return (0);
49477c478bd9Sstevel@tonic-gate if (*s2)
49487c478bd9Sstevel@tonic-gate return (*s2 == '/');
49497c478bd9Sstevel@tonic-gate return (1);
49507c478bd9Sstevel@tonic-gate }
49517c478bd9Sstevel@tonic-gate
49527c478bd9Sstevel@tonic-gate /*
49537c478bd9Sstevel@tonic-gate * lookup and bsrch look through tfile entries to find a match for a name.
49547c478bd9Sstevel@tonic-gate * The name can be up to PATH_MAX bytes. bsrch compares what it sees between
49557c478bd9Sstevel@tonic-gate * a pair of newline chars, so the buffer it uses must be long enough for
49567c478bd9Sstevel@tonic-gate * two lines: name and modification time as well as period, newline and space.
49577c478bd9Sstevel@tonic-gate *
49587c478bd9Sstevel@tonic-gate * A kludge was added to bsrch to take care of matching on the first entry
49597c478bd9Sstevel@tonic-gate * in the file--there is no leading newline. So, if we are reading from the
49607c478bd9Sstevel@tonic-gate * start of the file, read into byte two and set the first byte to a newline.
49617c478bd9Sstevel@tonic-gate * Otherwise, the first entry cannot be matched.
49627c478bd9Sstevel@tonic-gate *
49637c478bd9Sstevel@tonic-gate */
49647c478bd9Sstevel@tonic-gate
49657c478bd9Sstevel@tonic-gate #define N (2 * (PATH_MAX + TIME_MAX_DIGITS + LONG_MAX_DIGITS + 3))
49667c478bd9Sstevel@tonic-gate static off_t
lookup(char * s)49677c478bd9Sstevel@tonic-gate lookup(char *s)
49687c478bd9Sstevel@tonic-gate {
49697c478bd9Sstevel@tonic-gate int i;
49707c478bd9Sstevel@tonic-gate off_t a;
49717c478bd9Sstevel@tonic-gate
49727c478bd9Sstevel@tonic-gate for (i = 0; s[i]; i++)
49737c478bd9Sstevel@tonic-gate if (s[i] == ' ')
49747c478bd9Sstevel@tonic-gate break;
49757c478bd9Sstevel@tonic-gate a = bsrch(s, i, low, high);
49767c478bd9Sstevel@tonic-gate return (a);
49777c478bd9Sstevel@tonic-gate }
49787c478bd9Sstevel@tonic-gate
49797c478bd9Sstevel@tonic-gate static off_t
bsrch(char * s,int n,off_t l,off_t h)49807c478bd9Sstevel@tonic-gate bsrch(char *s, int n, off_t l, off_t h)
49817c478bd9Sstevel@tonic-gate {
49827c478bd9Sstevel@tonic-gate int i, j;
49837c478bd9Sstevel@tonic-gate char b[N];
49847c478bd9Sstevel@tonic-gate off_t m, m1;
49857c478bd9Sstevel@tonic-gate
49867c478bd9Sstevel@tonic-gate
49877c478bd9Sstevel@tonic-gate loop:
49887c478bd9Sstevel@tonic-gate if (l >= h)
49897c478bd9Sstevel@tonic-gate return ((off_t)-1);
49907c478bd9Sstevel@tonic-gate m = l + (h-l)/2 - N/2;
49917c478bd9Sstevel@tonic-gate if (m < l)
49927c478bd9Sstevel@tonic-gate m = l;
49937c478bd9Sstevel@tonic-gate (void) fseek(tfile, m, 0);
49947c478bd9Sstevel@tonic-gate if (m == 0) {
49957c478bd9Sstevel@tonic-gate (void) fread(b+1, 1, N-1, tfile);
49967c478bd9Sstevel@tonic-gate b[0] = '\n';
49977c478bd9Sstevel@tonic-gate m--;
49987c478bd9Sstevel@tonic-gate } else
49997c478bd9Sstevel@tonic-gate (void) fread(b, 1, N, tfile);
50007c478bd9Sstevel@tonic-gate for (i = 0; i < N; i++) {
50017c478bd9Sstevel@tonic-gate if (b[i] == '\n')
50027c478bd9Sstevel@tonic-gate break;
50037c478bd9Sstevel@tonic-gate m++;
50047c478bd9Sstevel@tonic-gate }
50057c478bd9Sstevel@tonic-gate if (m >= h)
50067c478bd9Sstevel@tonic-gate return ((off_t)-1);
50077c478bd9Sstevel@tonic-gate m1 = m;
50087c478bd9Sstevel@tonic-gate j = i;
50097c478bd9Sstevel@tonic-gate for (i++; i < N; i++) {
50107c478bd9Sstevel@tonic-gate m1++;
50117c478bd9Sstevel@tonic-gate if (b[i] == '\n')
50127c478bd9Sstevel@tonic-gate break;
50137c478bd9Sstevel@tonic-gate }
50147c478bd9Sstevel@tonic-gate i = cmp(b+j, s, n);
50157c478bd9Sstevel@tonic-gate if (i < 0) {
50167c478bd9Sstevel@tonic-gate h = m;
50177c478bd9Sstevel@tonic-gate goto loop;
50187c478bd9Sstevel@tonic-gate }
50197c478bd9Sstevel@tonic-gate if (i > 0) {
50207c478bd9Sstevel@tonic-gate l = m1;
50217c478bd9Sstevel@tonic-gate goto loop;
50227c478bd9Sstevel@tonic-gate }
50237c478bd9Sstevel@tonic-gate if (m < 0)
50247c478bd9Sstevel@tonic-gate m = 0;
50257c478bd9Sstevel@tonic-gate return (m);
50267c478bd9Sstevel@tonic-gate }
50277c478bd9Sstevel@tonic-gate
50287c478bd9Sstevel@tonic-gate static int
cmp(char * b,char * s,int n)50297c478bd9Sstevel@tonic-gate cmp(char *b, char *s, int n)
50307c478bd9Sstevel@tonic-gate {
50317c478bd9Sstevel@tonic-gate int i;
50327c478bd9Sstevel@tonic-gate
50337c478bd9Sstevel@tonic-gate assert(b[0] == '\n');
50347c478bd9Sstevel@tonic-gate
50357c478bd9Sstevel@tonic-gate for (i = 0; i < n; i++) {
50367c478bd9Sstevel@tonic-gate if (b[i+1] > s[i])
50377c478bd9Sstevel@tonic-gate return (-1);
50387c478bd9Sstevel@tonic-gate if (b[i+1] < s[i])
50397c478bd9Sstevel@tonic-gate return (1);
50407c478bd9Sstevel@tonic-gate }
50417c478bd9Sstevel@tonic-gate return (b[i+1] == ' '? 0 : -1);
50427c478bd9Sstevel@tonic-gate }
50437c478bd9Sstevel@tonic-gate
50447c478bd9Sstevel@tonic-gate
50457c478bd9Sstevel@tonic-gate /*
50467c478bd9Sstevel@tonic-gate * seekdisk seek to next file on archive
50477c478bd9Sstevel@tonic-gate *
50487c478bd9Sstevel@tonic-gate * called by passtape() only
50497c478bd9Sstevel@tonic-gate *
50507c478bd9Sstevel@tonic-gate * WARNING: expects "nblock" to be set, that is, readtape() to have
50517c478bd9Sstevel@tonic-gate * already been called. Since passtape() is only called
50527c478bd9Sstevel@tonic-gate * after a file header block has been read (why else would
50537c478bd9Sstevel@tonic-gate * we skip to next file?), this is currently safe.
50547c478bd9Sstevel@tonic-gate *
50557c478bd9Sstevel@tonic-gate * changed to guarantee SYS_BLOCK boundary
50567c478bd9Sstevel@tonic-gate */
50577c478bd9Sstevel@tonic-gate
50587c478bd9Sstevel@tonic-gate static void
seekdisk(blkcnt_t blocks)50597c478bd9Sstevel@tonic-gate seekdisk(blkcnt_t blocks)
50607c478bd9Sstevel@tonic-gate {
50617c478bd9Sstevel@tonic-gate off_t seekval;
50627c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK
50637c478bd9Sstevel@tonic-gate /* handle non-multiple of SYS_BLOCK */
50647c478bd9Sstevel@tonic-gate blkcnt_t nxb; /* # extra blocks */
50657c478bd9Sstevel@tonic-gate #endif
50667c478bd9Sstevel@tonic-gate
50677c478bd9Sstevel@tonic-gate tapepos += blocks;
5068*28c4d110SJoshua M. Clulow dlog("seekdisk(%" FMT_blkcnt_t ") called\n", blocks);
50697c478bd9Sstevel@tonic-gate if (recno + blocks <= nblock) {
50707c478bd9Sstevel@tonic-gate recno += blocks;
50717c478bd9Sstevel@tonic-gate return;
50727c478bd9Sstevel@tonic-gate }
50737c478bd9Sstevel@tonic-gate if (recno > nblock)
50747c478bd9Sstevel@tonic-gate recno = nblock;
50757c478bd9Sstevel@tonic-gate seekval = (off_t)blocks - (nblock - recno);
50767c478bd9Sstevel@tonic-gate recno = nblock; /* so readtape() reads next time through */
50777c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK
50787c478bd9Sstevel@tonic-gate nxb = (blkcnt_t)(seekval % (off_t)(SYS_BLOCK / TBLOCK));
5079*28c4d110SJoshua M. Clulow dlog("xtrablks=%" FMT_blkcnt_t " seekval=%" FMT_blkcnt_t " blks\n",
50807c478bd9Sstevel@tonic-gate nxb, seekval);
50817c478bd9Sstevel@tonic-gate if (nxb && nxb > seekval) /* don't seek--we'll read */
50827c478bd9Sstevel@tonic-gate goto noseek;
50837c478bd9Sstevel@tonic-gate seekval -= nxb; /* don't seek quite so far */
50847c478bd9Sstevel@tonic-gate #endif
50857c478bd9Sstevel@tonic-gate if (lseek(mt, (off_t)(TBLOCK * seekval), 1) == (off_t)-1) {
50867c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
50877c478bd9Sstevel@tonic-gate "tar: device seek error\n"));
50887c478bd9Sstevel@tonic-gate done(3);
50897c478bd9Sstevel@tonic-gate }
50907c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK
50917c478bd9Sstevel@tonic-gate /* read those extra blocks */
50927c478bd9Sstevel@tonic-gate noseek:
50937c478bd9Sstevel@tonic-gate if (nxb) {
5094*28c4d110SJoshua M. Clulow dlog("reading extra blocks\n");
50957c478bd9Sstevel@tonic-gate if (read(mt, tbuf, TBLOCK*nblock) < 0) {
50967c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
50977c478bd9Sstevel@tonic-gate "tar: read error while skipping file\n"));
50987c478bd9Sstevel@tonic-gate done(8);
50997c478bd9Sstevel@tonic-gate }
51007c478bd9Sstevel@tonic-gate recno = nxb; /* so we don't read in next readtape() */
51017c478bd9Sstevel@tonic-gate }
51027c478bd9Sstevel@tonic-gate #endif
51037c478bd9Sstevel@tonic-gate }
51047c478bd9Sstevel@tonic-gate
51057c478bd9Sstevel@tonic-gate static void
readtape(char * buffer)51067c478bd9Sstevel@tonic-gate readtape(char *buffer)
51077c478bd9Sstevel@tonic-gate {
51087c478bd9Sstevel@tonic-gate int i, j;
51097c478bd9Sstevel@tonic-gate
51107c478bd9Sstevel@tonic-gate ++tapepos;
51117c478bd9Sstevel@tonic-gate if (recno >= nblock || first) {
51127c478bd9Sstevel@tonic-gate if (first) {
51137c478bd9Sstevel@tonic-gate /*
51147c478bd9Sstevel@tonic-gate * set the number of blocks to read initially, based on
51157c478bd9Sstevel@tonic-gate * the defined defaults for the device, or on the
51167c478bd9Sstevel@tonic-gate * explicit block factor given.
51177c478bd9Sstevel@tonic-gate */
511853329f75SRich Burridge if (bflag || defaults_used || NotTape)
51197c478bd9Sstevel@tonic-gate j = nblock;
51207c478bd9Sstevel@tonic-gate else
51217c478bd9Sstevel@tonic-gate j = NBLOCK;
51227c478bd9Sstevel@tonic-gate } else
51237c478bd9Sstevel@tonic-gate j = nblock;
51247c478bd9Sstevel@tonic-gate
51257c478bd9Sstevel@tonic-gate if ((i = read(mt, tbuf, TBLOCK*j)) < 0) {
51267c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
51277c478bd9Sstevel@tonic-gate "tar: tape read error\n"));
51287c478bd9Sstevel@tonic-gate done(3);
51297c478bd9Sstevel@tonic-gate /*
5130b35e803cSss161016 * i == 0 and !rflag means that EOF is reached and we are
5131b35e803cSss161016 * trying to update or replace an empty tar file, so exit
5132b35e803cSss161016 * with an error.
5133b35e803cSss161016 *
5134b35e803cSss161016 * If i == 0 and !first and NotTape, it means the pointer
5135b35e803cSss161016 * has gone past the EOF. It could happen if two processes
5136b35e803cSss161016 * try to update the same tar file simultaneously. So exit
5137b35e803cSss161016 * with an error.
51387c478bd9Sstevel@tonic-gate */
5139b35e803cSss161016
5140b35e803cSss161016 } else if (i == 0) {
5141b35e803cSss161016 if (first && !rflag) {
51427c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
51437c478bd9Sstevel@tonic-gate "tar: blocksize = %d\n"), i);
51447c478bd9Sstevel@tonic-gate done(Errflg);
5145b35e803cSss161016 } else if (!first && (!rflag || NotTape)) {
51467c478bd9Sstevel@tonic-gate mterr("read", 0, 2);
5147b35e803cSss161016 }
51487c478bd9Sstevel@tonic-gate } else if ((!first || Bflag) && i != TBLOCK*j) {
51497c478bd9Sstevel@tonic-gate /*
51507c478bd9Sstevel@tonic-gate * Short read - try to get the remaining bytes.
51517c478bd9Sstevel@tonic-gate */
51527c478bd9Sstevel@tonic-gate
51537c478bd9Sstevel@tonic-gate int remaining = (TBLOCK * j) - i;
51547c478bd9Sstevel@tonic-gate char *b = (char *)tbuf + i;
51557c478bd9Sstevel@tonic-gate int r;
51567c478bd9Sstevel@tonic-gate
51577c478bd9Sstevel@tonic-gate do {
51587c478bd9Sstevel@tonic-gate if ((r = read(mt, b, remaining)) < 0) {
51597c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
51607c478bd9Sstevel@tonic-gate gettext("tar: tape read error\n"));
51617c478bd9Sstevel@tonic-gate done(3);
51627c478bd9Sstevel@tonic-gate }
51637c478bd9Sstevel@tonic-gate b += r;
51647c478bd9Sstevel@tonic-gate remaining -= r;
51657c478bd9Sstevel@tonic-gate i += r;
51667c478bd9Sstevel@tonic-gate } while (remaining > 0 && r != 0);
51677c478bd9Sstevel@tonic-gate }
51687c478bd9Sstevel@tonic-gate if (first) {
51697c478bd9Sstevel@tonic-gate if ((i % TBLOCK) != 0) {
51707c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
51717c478bd9Sstevel@tonic-gate "tar: tape blocksize error\n"));
51727c478bd9Sstevel@tonic-gate done(3);
51737c478bd9Sstevel@tonic-gate }
51747c478bd9Sstevel@tonic-gate i /= TBLOCK;
51757c478bd9Sstevel@tonic-gate if (vflag && i != nblock && i != 1) {
51767c478bd9Sstevel@tonic-gate if (!NotTape)
51777c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
51787c478bd9Sstevel@tonic-gate "tar: blocksize = %d\n"), i);
51797c478bd9Sstevel@tonic-gate }
51807c478bd9Sstevel@tonic-gate
51817c478bd9Sstevel@tonic-gate /*
51827c478bd9Sstevel@tonic-gate * If we are reading a tape, then a short read is
51837c478bd9Sstevel@tonic-gate * understood to signify that the amount read is
51847c478bd9Sstevel@tonic-gate * the tape's actual blocking factor. We adapt
51857c478bd9Sstevel@tonic-gate * nblock accordingly. There is no reason to do
51867c478bd9Sstevel@tonic-gate * this when the device is not blocked.
51877c478bd9Sstevel@tonic-gate */
51887c478bd9Sstevel@tonic-gate
51897c478bd9Sstevel@tonic-gate if (!NotTape)
51907c478bd9Sstevel@tonic-gate nblock = i;
51917c478bd9Sstevel@tonic-gate }
51927c478bd9Sstevel@tonic-gate recno = 0;
51937c478bd9Sstevel@tonic-gate }
51947c478bd9Sstevel@tonic-gate
51957c478bd9Sstevel@tonic-gate first = FALSE;
51967c478bd9Sstevel@tonic-gate copy(buffer, &tbuf[recno++]);
51977c478bd9Sstevel@tonic-gate }
51987c478bd9Sstevel@tonic-gate
51997c478bd9Sstevel@tonic-gate
52007c478bd9Sstevel@tonic-gate /*
52017c478bd9Sstevel@tonic-gate * replacement for writetape.
52027c478bd9Sstevel@tonic-gate */
52037c478bd9Sstevel@tonic-gate
52047c478bd9Sstevel@tonic-gate static int
writetbuf(char * buffer,int n)52057c478bd9Sstevel@tonic-gate writetbuf(char *buffer, int n)
52067c478bd9Sstevel@tonic-gate {
52077c478bd9Sstevel@tonic-gate int i;
52087c478bd9Sstevel@tonic-gate
52097c478bd9Sstevel@tonic-gate tapepos += n; /* output block count */
52107c478bd9Sstevel@tonic-gate
52117c478bd9Sstevel@tonic-gate if (recno >= nblock) {
52127c478bd9Sstevel@tonic-gate i = write(mt, (char *)tbuf, TBLOCK*nblock);
52137c478bd9Sstevel@tonic-gate if (i != TBLOCK*nblock)
52147c478bd9Sstevel@tonic-gate mterr("write", i, 2);
52157c478bd9Sstevel@tonic-gate recno = 0;
52167c478bd9Sstevel@tonic-gate }
52177c478bd9Sstevel@tonic-gate
52187c478bd9Sstevel@tonic-gate /*
52197c478bd9Sstevel@tonic-gate * Special case: We have an empty tape buffer, and the
52207c478bd9Sstevel@tonic-gate * users data size is >= the tape block size: Avoid
52217c478bd9Sstevel@tonic-gate * the bcopy and dma direct to tape. BIG WIN. Add the
52227c478bd9Sstevel@tonic-gate * residual to the tape buffer.
52237c478bd9Sstevel@tonic-gate */
52247c478bd9Sstevel@tonic-gate while (recno == 0 && n >= nblock) {
52257c478bd9Sstevel@tonic-gate i = (int)write(mt, buffer, TBLOCK*nblock);
52267c478bd9Sstevel@tonic-gate if (i != TBLOCK*nblock)
52277c478bd9Sstevel@tonic-gate mterr("write", i, 2);
52287c478bd9Sstevel@tonic-gate n -= nblock;
52297c478bd9Sstevel@tonic-gate buffer += (nblock * TBLOCK);
52307c478bd9Sstevel@tonic-gate }
52317c478bd9Sstevel@tonic-gate
52327c478bd9Sstevel@tonic-gate while (n-- > 0) {
52337c478bd9Sstevel@tonic-gate (void) memcpy((char *)&tbuf[recno++], buffer, TBLOCK);
52347c478bd9Sstevel@tonic-gate buffer += TBLOCK;
52357c478bd9Sstevel@tonic-gate if (recno >= nblock) {
52367c478bd9Sstevel@tonic-gate i = (int)write(mt, (char *)tbuf, TBLOCK*nblock);
52377c478bd9Sstevel@tonic-gate if (i != TBLOCK*nblock)
52387c478bd9Sstevel@tonic-gate mterr("write", i, 2);
52397c478bd9Sstevel@tonic-gate recno = 0;
52407c478bd9Sstevel@tonic-gate }
52417c478bd9Sstevel@tonic-gate }
52427c478bd9Sstevel@tonic-gate
52437c478bd9Sstevel@tonic-gate /* Tell the user how much to write to get in sync */
52447c478bd9Sstevel@tonic-gate return (nblock - recno);
52457c478bd9Sstevel@tonic-gate }
52467c478bd9Sstevel@tonic-gate
52477c478bd9Sstevel@tonic-gate /*
52487c478bd9Sstevel@tonic-gate * backtape - reposition tape after reading soft "EOF" record
52497c478bd9Sstevel@tonic-gate *
52507c478bd9Sstevel@tonic-gate * Backtape tries to reposition the tape back over the EOF
52517c478bd9Sstevel@tonic-gate * record. This is for the 'u' and 'r' function letters so that the
52527c478bd9Sstevel@tonic-gate * tape can be extended. This code is not well designed, but
52537c478bd9Sstevel@tonic-gate * I'm confident that the only callers who care about the
52547c478bd9Sstevel@tonic-gate * backspace-over-EOF feature are those involved in 'u' and 'r'.
52557c478bd9Sstevel@tonic-gate *
52567c478bd9Sstevel@tonic-gate * The proper way to backup the tape is through the use of mtio.
52577c478bd9Sstevel@tonic-gate * Earlier spins used lseek combined with reads in a confusing
52587c478bd9Sstevel@tonic-gate * maneuver that only worked on 4.x, but shouldn't have, even
52597c478bd9Sstevel@tonic-gate * there. Lseeks are explicitly not supported for tape devices.
52607c478bd9Sstevel@tonic-gate */
52617c478bd9Sstevel@tonic-gate
52627c478bd9Sstevel@tonic-gate static void
backtape(void)52637c478bd9Sstevel@tonic-gate backtape(void)
52647c478bd9Sstevel@tonic-gate {
52657c478bd9Sstevel@tonic-gate struct mtop mtcmd;
5266*28c4d110SJoshua M. Clulow dlog("backtape() called, recno=%" FMT_blkcnt_t " nblock=%d\n", recno,
52677c478bd9Sstevel@tonic-gate nblock);
52687c478bd9Sstevel@tonic-gate /*
52697c478bd9Sstevel@tonic-gate * Backup to the position in the archive where the record
52707c478bd9Sstevel@tonic-gate * currently sitting in the tbuf buffer is situated.
52717c478bd9Sstevel@tonic-gate */
52727c478bd9Sstevel@tonic-gate
52737c478bd9Sstevel@tonic-gate if (NotTape) {
52747c478bd9Sstevel@tonic-gate /*
52757c478bd9Sstevel@tonic-gate * For non-tape devices, this means lseeking to the
52767c478bd9Sstevel@tonic-gate * correct position. The absolute location tapepos-recno
52777c478bd9Sstevel@tonic-gate * should be the beginning of the current record.
52787c478bd9Sstevel@tonic-gate */
52797c478bd9Sstevel@tonic-gate
52807c478bd9Sstevel@tonic-gate if (lseek(mt, (off_t)(TBLOCK*(tapepos-recno)), SEEK_SET) ==
52817c478bd9Sstevel@tonic-gate (off_t)-1) {
52827c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
52837c478bd9Sstevel@tonic-gate gettext("tar: lseek to end of archive failed\n"));
52847c478bd9Sstevel@tonic-gate done(4);
52857c478bd9Sstevel@tonic-gate }
52867c478bd9Sstevel@tonic-gate } else {
52877c478bd9Sstevel@tonic-gate /*
52887c478bd9Sstevel@tonic-gate * For tape devices, we backup over the most recently
52897c478bd9Sstevel@tonic-gate * read record.
52907c478bd9Sstevel@tonic-gate */
52917c478bd9Sstevel@tonic-gate
52927c478bd9Sstevel@tonic-gate mtcmd.mt_op = MTBSR;
52937c478bd9Sstevel@tonic-gate mtcmd.mt_count = 1;
52947c478bd9Sstevel@tonic-gate
52957c478bd9Sstevel@tonic-gate if (ioctl(mt, MTIOCTOP, &mtcmd) < 0) {
52967c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
52977c478bd9Sstevel@tonic-gate gettext("tar: backspace over record failed\n"));
52987c478bd9Sstevel@tonic-gate done(4);
52997c478bd9Sstevel@tonic-gate }
53007c478bd9Sstevel@tonic-gate }
53017c478bd9Sstevel@tonic-gate
53027c478bd9Sstevel@tonic-gate /*
53037c478bd9Sstevel@tonic-gate * Decrement the tape and tbuf buffer indices to prepare for the
53047c478bd9Sstevel@tonic-gate * coming write to overwrite the soft EOF record.
53057c478bd9Sstevel@tonic-gate */
53067c478bd9Sstevel@tonic-gate
53077c478bd9Sstevel@tonic-gate recno--;
53087c478bd9Sstevel@tonic-gate tapepos--;
53097c478bd9Sstevel@tonic-gate }
53107c478bd9Sstevel@tonic-gate
53117c478bd9Sstevel@tonic-gate
53127c478bd9Sstevel@tonic-gate /*
53137c478bd9Sstevel@tonic-gate * flushtape write buffered block(s) onto tape
53147c478bd9Sstevel@tonic-gate *
53157c478bd9Sstevel@tonic-gate * recno points to next free block in tbuf. If nonzero, a write is done.
53167c478bd9Sstevel@tonic-gate * Care is taken to write in multiples of SYS_BLOCK when device is
53177c478bd9Sstevel@tonic-gate * non-magtape in case raw i/o is used.
53187c478bd9Sstevel@tonic-gate *
53197c478bd9Sstevel@tonic-gate * NOTE: this is called by writetape() to do the actual writing
53207c478bd9Sstevel@tonic-gate */
53217c478bd9Sstevel@tonic-gate
53227c478bd9Sstevel@tonic-gate static void
flushtape(void)53237c478bd9Sstevel@tonic-gate flushtape(void)
53247c478bd9Sstevel@tonic-gate {
5325*28c4d110SJoshua M. Clulow dlog("flushtape() called, recno=%" FMT_blkcnt_t "\n", recno);
53267c478bd9Sstevel@tonic-gate if (recno > 0) { /* anything buffered? */
53277c478bd9Sstevel@tonic-gate if (NotTape) {
53287c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK
53297c478bd9Sstevel@tonic-gate int i;
53307c478bd9Sstevel@tonic-gate
53317c478bd9Sstevel@tonic-gate /*
53327c478bd9Sstevel@tonic-gate * an odd-block write can only happen when
53337c478bd9Sstevel@tonic-gate * we are at the end of a volume that is not a tape.
53347c478bd9Sstevel@tonic-gate * Here we round recno up to an even SYS_BLOCK
53357c478bd9Sstevel@tonic-gate * boundary.
53367c478bd9Sstevel@tonic-gate */
53377c478bd9Sstevel@tonic-gate if ((i = recno % (SYS_BLOCK / TBLOCK)) != 0) {
5338*28c4d110SJoshua M. Clulow dlog("flushtape() %d rounding blocks\n", i);
53397c478bd9Sstevel@tonic-gate recno += i; /* round up to even SYS_BLOCK */
53407c478bd9Sstevel@tonic-gate }
53417c478bd9Sstevel@tonic-gate #endif
53427c478bd9Sstevel@tonic-gate if (recno > nblock)
53437c478bd9Sstevel@tonic-gate recno = nblock;
53447c478bd9Sstevel@tonic-gate }
5345*28c4d110SJoshua M. Clulow dlog("writing out %" FMT_blkcnt_t " blocks of %" FMT_blkcnt_t
53467c478bd9Sstevel@tonic-gate " bytes\n", (blkcnt_t)(NotTape ? recno : nblock),
53477c478bd9Sstevel@tonic-gate (blkcnt_t)(NotTape ? recno : nblock) * TBLOCK);
53487c478bd9Sstevel@tonic-gate if (write(mt, tbuf,
53497c478bd9Sstevel@tonic-gate (size_t)(NotTape ? recno : nblock) * TBLOCK) < 0) {
53507c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
53517c478bd9Sstevel@tonic-gate "tar: tape write error\n"));
53527c478bd9Sstevel@tonic-gate done(2);
53537c478bd9Sstevel@tonic-gate }
53547c478bd9Sstevel@tonic-gate recno = 0;
53557c478bd9Sstevel@tonic-gate }
53567c478bd9Sstevel@tonic-gate }
53577c478bd9Sstevel@tonic-gate
53587c478bd9Sstevel@tonic-gate static void
copy(void * dst,void * src)53597c478bd9Sstevel@tonic-gate copy(void *dst, void *src)
53607c478bd9Sstevel@tonic-gate {
53617c478bd9Sstevel@tonic-gate (void) memcpy(dst, src, TBLOCK);
53627c478bd9Sstevel@tonic-gate }
53637c478bd9Sstevel@tonic-gate
53647c478bd9Sstevel@tonic-gate /*
53657c478bd9Sstevel@tonic-gate * kcheck()
53667c478bd9Sstevel@tonic-gate * - checks the validity of size values for non-tape devices
53677c478bd9Sstevel@tonic-gate * - if size is zero, mulvol tar is disabled and size is
53687c478bd9Sstevel@tonic-gate * assumed to be infinite.
53697c478bd9Sstevel@tonic-gate * - returns volume size in TBLOCKS
53707c478bd9Sstevel@tonic-gate */
53717c478bd9Sstevel@tonic-gate
53727c478bd9Sstevel@tonic-gate static blkcnt_t
kcheck(char * kstr)53737c478bd9Sstevel@tonic-gate kcheck(char *kstr)
53747c478bd9Sstevel@tonic-gate {
53757c478bd9Sstevel@tonic-gate blkcnt_t kval;
53767c478bd9Sstevel@tonic-gate
53777c478bd9Sstevel@tonic-gate kval = strtoll(kstr, NULL, 0);
53787c478bd9Sstevel@tonic-gate if (kval == (blkcnt_t)0) { /* no multi-volume; size is infinity. */
53797c478bd9Sstevel@tonic-gate mulvol = 0; /* definitely not mulvol, but we must */
53807c478bd9Sstevel@tonic-gate return (0); /* took out setting of NotTape */
53817c478bd9Sstevel@tonic-gate }
53827c478bd9Sstevel@tonic-gate if (kval < (blkcnt_t)MINSIZE) {
53837c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
53847c478bd9Sstevel@tonic-gate "tar: sizes below %luK not supported (%" FMT_blkcnt_t
53857c478bd9Sstevel@tonic-gate ").\n"), (ulong_t)MINSIZE, kval);
53867c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
53877c478bd9Sstevel@tonic-gate "bad size entry for %s in %s.\n"),
53887c478bd9Sstevel@tonic-gate archive, DEF_FILE);
53897c478bd9Sstevel@tonic-gate done(1);
53907c478bd9Sstevel@tonic-gate }
53917c478bd9Sstevel@tonic-gate mulvol++;
53927c478bd9Sstevel@tonic-gate NotTape++; /* implies non-tape */
53937c478bd9Sstevel@tonic-gate return (kval * 1024 / TBLOCK); /* convert to TBLOCKS */
53947c478bd9Sstevel@tonic-gate }
53957c478bd9Sstevel@tonic-gate
53967c478bd9Sstevel@tonic-gate
53977c478bd9Sstevel@tonic-gate /*
53987c478bd9Sstevel@tonic-gate * bcheck()
53997c478bd9Sstevel@tonic-gate * - checks the validity of blocking factors
54007c478bd9Sstevel@tonic-gate * - returns blocking factor
54017c478bd9Sstevel@tonic-gate */
54027c478bd9Sstevel@tonic-gate
54037c478bd9Sstevel@tonic-gate static int
bcheck(char * bstr)54047c478bd9Sstevel@tonic-gate bcheck(char *bstr)
54057c478bd9Sstevel@tonic-gate {
54067c478bd9Sstevel@tonic-gate blkcnt_t bval;
54077c478bd9Sstevel@tonic-gate
54087c478bd9Sstevel@tonic-gate bval = strtoll(bstr, NULL, 0);
54097c478bd9Sstevel@tonic-gate if ((bval <= 0) || (bval > INT_MAX / TBLOCK)) {
54107c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
54117c478bd9Sstevel@tonic-gate "tar: invalid blocksize \"%s\".\n"), bstr);
54127c478bd9Sstevel@tonic-gate if (!bflag)
54137c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
54147c478bd9Sstevel@tonic-gate "bad blocksize entry for '%s' in %s.\n"),
54157c478bd9Sstevel@tonic-gate archive, DEF_FILE);
54167c478bd9Sstevel@tonic-gate done(1);
54177c478bd9Sstevel@tonic-gate }
54187c478bd9Sstevel@tonic-gate
54197c478bd9Sstevel@tonic-gate return ((int)bval);
54207c478bd9Sstevel@tonic-gate }
54217c478bd9Sstevel@tonic-gate
54227c478bd9Sstevel@tonic-gate
54237c478bd9Sstevel@tonic-gate /*
54247c478bd9Sstevel@tonic-gate * defset()
54257c478bd9Sstevel@tonic-gate * - reads DEF_FILE for the set of default values specified.
54267c478bd9Sstevel@tonic-gate * - initializes 'usefile', 'nblock', and 'blocklim', and 'NotTape'.
54277c478bd9Sstevel@tonic-gate * - 'usefile' points to static data, so will be overwritten
54287c478bd9Sstevel@tonic-gate * if this routine is called a second time.
54297c478bd9Sstevel@tonic-gate * - the pattern specified by 'arch' must be followed by four
54307c478bd9Sstevel@tonic-gate * blank-separated fields (1) device (2) blocking,
54317c478bd9Sstevel@tonic-gate * (3) size(K), and (4) tape
54327c478bd9Sstevel@tonic-gate * for example: archive0=/dev/fd 1 400 n
54337c478bd9Sstevel@tonic-gate */
54347c478bd9Sstevel@tonic-gate
54357c478bd9Sstevel@tonic-gate static int
defset(char * arch)54367c478bd9Sstevel@tonic-gate defset(char *arch)
54377c478bd9Sstevel@tonic-gate {
54387c478bd9Sstevel@tonic-gate char *bp;
54397c478bd9Sstevel@tonic-gate
54407c478bd9Sstevel@tonic-gate if (defopen(DEF_FILE) != 0)
54417c478bd9Sstevel@tonic-gate return (FALSE);
54427c478bd9Sstevel@tonic-gate if (defcntl(DC_SETFLAGS, (DC_STD & ~(DC_CASE))) == -1) {
54437c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
54447c478bd9Sstevel@tonic-gate "tar: error setting parameters for %s.\n"), DEF_FILE);
54457c478bd9Sstevel@tonic-gate return (FALSE); /* & following ones too */
54467c478bd9Sstevel@tonic-gate }
54477c478bd9Sstevel@tonic-gate if ((bp = defread(arch)) == NULL) {
54487c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
54497c478bd9Sstevel@tonic-gate "tar: missing or invalid '%s' entry in %s.\n"),
54507c478bd9Sstevel@tonic-gate arch, DEF_FILE);
54517c478bd9Sstevel@tonic-gate return (FALSE);
54527c478bd9Sstevel@tonic-gate }
54537c478bd9Sstevel@tonic-gate if ((usefile = strtok(bp, " \t")) == NULL) {
54547c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
54557c478bd9Sstevel@tonic-gate "tar: '%s' entry in %s is empty!\n"), arch, DEF_FILE);
54567c478bd9Sstevel@tonic-gate return (FALSE);
54577c478bd9Sstevel@tonic-gate }
54587c478bd9Sstevel@tonic-gate if ((bp = strtok(NULL, " \t")) == NULL) {
54597c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
54607c478bd9Sstevel@tonic-gate "tar: block component missing in '%s' entry in %s.\n"),
54617c478bd9Sstevel@tonic-gate arch, DEF_FILE);
54627c478bd9Sstevel@tonic-gate return (FALSE);
54637c478bd9Sstevel@tonic-gate }
54647c478bd9Sstevel@tonic-gate nblock = bcheck(bp);
54657c478bd9Sstevel@tonic-gate if ((bp = strtok(NULL, " \t")) == NULL) {
54667c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
54677c478bd9Sstevel@tonic-gate "tar: size component missing in '%s' entry in %s.\n"),
54687c478bd9Sstevel@tonic-gate arch, DEF_FILE);
54697c478bd9Sstevel@tonic-gate return (FALSE);
54707c478bd9Sstevel@tonic-gate }
54717c478bd9Sstevel@tonic-gate blocklim = kcheck(bp);
54727c478bd9Sstevel@tonic-gate if ((bp = strtok(NULL, " \t")) != NULL)
54737c478bd9Sstevel@tonic-gate NotTape = (*bp == 'n' || *bp == 'N');
54747c478bd9Sstevel@tonic-gate else
54757c478bd9Sstevel@tonic-gate NotTape = (blocklim != 0);
54767c478bd9Sstevel@tonic-gate (void) defopen(NULL);
5477*28c4d110SJoshua M. Clulow dlog("defset: archive='%s'; usefile='%s'\n", arch, usefile);
5478*28c4d110SJoshua M. Clulow dlog("defset: nblock='%d'; blocklim='%" FMT_blkcnt_t "'\n",
54797c478bd9Sstevel@tonic-gate nblock, blocklim);
5480*28c4d110SJoshua M. Clulow dlog("defset: not tape = %d\n", NotTape);
54817c478bd9Sstevel@tonic-gate return (TRUE);
54827c478bd9Sstevel@tonic-gate }
54837c478bd9Sstevel@tonic-gate
54847c478bd9Sstevel@tonic-gate
54857c478bd9Sstevel@tonic-gate /*
54867c478bd9Sstevel@tonic-gate * Following code handles excluded and included files.
54877c478bd9Sstevel@tonic-gate * A hash table of file names to be {in,ex}cluded is built.
54887c478bd9Sstevel@tonic-gate * For excluded files, before writing or extracting a file
54897c478bd9Sstevel@tonic-gate * check to see if it is in the exclude_tbl.
54907c478bd9Sstevel@tonic-gate * For included files, the wantit() procedure will check to
54917c478bd9Sstevel@tonic-gate * see if the named file is in the include_tbl.
54927c478bd9Sstevel@tonic-gate */
54937c478bd9Sstevel@tonic-gate
54947c478bd9Sstevel@tonic-gate static void
build_table(file_list_t * table[],char * file)54955e2174acSceastha build_table(file_list_t *table[], char *file)
54967c478bd9Sstevel@tonic-gate {
54977c478bd9Sstevel@tonic-gate FILE *fp;
54987c478bd9Sstevel@tonic-gate char buf[PATH_MAX + 1];
54997c478bd9Sstevel@tonic-gate
55007c478bd9Sstevel@tonic-gate if ((fp = fopen(file, "r")) == (FILE *)NULL)
55017c478bd9Sstevel@tonic-gate vperror(1, gettext("could not open %s"), file);
55027c478bd9Sstevel@tonic-gate while (fgets(buf, sizeof (buf), fp) != NULL) {
55037c478bd9Sstevel@tonic-gate if (buf[strlen(buf) - 1] == '\n')
55047c478bd9Sstevel@tonic-gate buf[strlen(buf) - 1] = '\0';
55057c478bd9Sstevel@tonic-gate /* Only add to table if line has something in it */
55067c478bd9Sstevel@tonic-gate if (strspn(buf, " \t") != strlen(buf))
55077c478bd9Sstevel@tonic-gate add_file_to_table(table, buf);
55087c478bd9Sstevel@tonic-gate }
55097c478bd9Sstevel@tonic-gate (void) fclose(fp);
55107c478bd9Sstevel@tonic-gate }
55117c478bd9Sstevel@tonic-gate
55127c478bd9Sstevel@tonic-gate
55137c478bd9Sstevel@tonic-gate /*
55147c478bd9Sstevel@tonic-gate * Add a file name to the the specified table, if the file name has any
55157c478bd9Sstevel@tonic-gate * trailing '/'s then delete them before inserting into the table
55167c478bd9Sstevel@tonic-gate */
55177c478bd9Sstevel@tonic-gate
55187c478bd9Sstevel@tonic-gate static void
add_file_to_table(file_list_t * table[],char * str)55195e2174acSceastha add_file_to_table(file_list_t *table[], char *str)
55207c478bd9Sstevel@tonic-gate {
55217c478bd9Sstevel@tonic-gate char name[PATH_MAX + 1];
55227c478bd9Sstevel@tonic-gate unsigned int h;
55235e2174acSceastha file_list_t *exp;
55247c478bd9Sstevel@tonic-gate
55257c478bd9Sstevel@tonic-gate (void) strcpy(name, str);
55267c478bd9Sstevel@tonic-gate while (name[strlen(name) - 1] == '/') {
55277c478bd9Sstevel@tonic-gate name[strlen(name) - 1] = NULL;
55287c478bd9Sstevel@tonic-gate }
55297c478bd9Sstevel@tonic-gate
55307c478bd9Sstevel@tonic-gate h = hash(name);
55315e2174acSceastha if ((exp = (file_list_t *)calloc(sizeof (file_list_t),
55327c478bd9Sstevel@tonic-gate sizeof (char))) == NULL) {
55337c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
55347c478bd9Sstevel@tonic-gate "tar: out of memory, exclude/include table(entry)\n"));
55357c478bd9Sstevel@tonic-gate exit(1);
55367c478bd9Sstevel@tonic-gate }
55377c478bd9Sstevel@tonic-gate
55387c478bd9Sstevel@tonic-gate if ((exp->name = strdup(name)) == NULL) {
55397c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
55407c478bd9Sstevel@tonic-gate "tar: out of memory, exclude/include table(file name)\n"));
55417c478bd9Sstevel@tonic-gate exit(1);
55427c478bd9Sstevel@tonic-gate }
55437c478bd9Sstevel@tonic-gate
55447c478bd9Sstevel@tonic-gate exp->next = table[h];
55457c478bd9Sstevel@tonic-gate table[h] = exp;
55467c478bd9Sstevel@tonic-gate }
55477c478bd9Sstevel@tonic-gate
55487c478bd9Sstevel@tonic-gate
55497c478bd9Sstevel@tonic-gate /*
55507c478bd9Sstevel@tonic-gate * See if a file name or any of the file's parent directories is in the
55517c478bd9Sstevel@tonic-gate * specified table, if the file name has any trailing '/'s then delete
55527c478bd9Sstevel@tonic-gate * them before searching the table
55537c478bd9Sstevel@tonic-gate */
55547c478bd9Sstevel@tonic-gate
55557c478bd9Sstevel@tonic-gate static int
is_in_table(file_list_t * table[],char * str)55565e2174acSceastha is_in_table(file_list_t *table[], char *str)
55577c478bd9Sstevel@tonic-gate {
55587c478bd9Sstevel@tonic-gate char name[PATH_MAX + 1];
55597c478bd9Sstevel@tonic-gate unsigned int h;
55605e2174acSceastha file_list_t *exp;
55617c478bd9Sstevel@tonic-gate char *ptr;
55627c478bd9Sstevel@tonic-gate
55637c478bd9Sstevel@tonic-gate (void) strcpy(name, str);
55647c478bd9Sstevel@tonic-gate while (name[strlen(name) - 1] == '/') {
55657c478bd9Sstevel@tonic-gate name[strlen(name) - 1] = NULL;
55667c478bd9Sstevel@tonic-gate }
55677c478bd9Sstevel@tonic-gate
55687c478bd9Sstevel@tonic-gate /*
55697c478bd9Sstevel@tonic-gate * check for the file name in the passed list
55707c478bd9Sstevel@tonic-gate */
55717c478bd9Sstevel@tonic-gate h = hash(name);
55727c478bd9Sstevel@tonic-gate exp = table[h];
55737c478bd9Sstevel@tonic-gate while (exp != NULL) {
55747c478bd9Sstevel@tonic-gate if (strcmp(name, exp->name) == 0) {
55757c478bd9Sstevel@tonic-gate return (1);
55767c478bd9Sstevel@tonic-gate }
55777c478bd9Sstevel@tonic-gate exp = exp->next;
55787c478bd9Sstevel@tonic-gate }
55797c478bd9Sstevel@tonic-gate
55807c478bd9Sstevel@tonic-gate /*
55817c478bd9Sstevel@tonic-gate * check for any parent directories in the file list
55827c478bd9Sstevel@tonic-gate */
55837c478bd9Sstevel@tonic-gate while ((ptr = strrchr(name, '/'))) {
55847c478bd9Sstevel@tonic-gate *ptr = NULL;
55857c478bd9Sstevel@tonic-gate h = hash(name);
55867c478bd9Sstevel@tonic-gate exp = table[h];
55877c478bd9Sstevel@tonic-gate while (exp != NULL) {
55887c478bd9Sstevel@tonic-gate if (strcmp(name, exp->name) == 0) {
55897c478bd9Sstevel@tonic-gate return (1);
55907c478bd9Sstevel@tonic-gate }
55917c478bd9Sstevel@tonic-gate exp = exp->next;
55927c478bd9Sstevel@tonic-gate }
55937c478bd9Sstevel@tonic-gate }
55947c478bd9Sstevel@tonic-gate
55957c478bd9Sstevel@tonic-gate return (0);
55967c478bd9Sstevel@tonic-gate }
55977c478bd9Sstevel@tonic-gate
55987c478bd9Sstevel@tonic-gate
55997c478bd9Sstevel@tonic-gate /*
56007c478bd9Sstevel@tonic-gate * Compute a hash from a string.
56017c478bd9Sstevel@tonic-gate */
56027c478bd9Sstevel@tonic-gate
56037c478bd9Sstevel@tonic-gate static unsigned int
hash(char * str)56047c478bd9Sstevel@tonic-gate hash(char *str)
56057c478bd9Sstevel@tonic-gate {
56067c478bd9Sstevel@tonic-gate char *cp;
56077c478bd9Sstevel@tonic-gate unsigned int h;
56087c478bd9Sstevel@tonic-gate
56097c478bd9Sstevel@tonic-gate h = 0;
56107c478bd9Sstevel@tonic-gate for (cp = str; *cp; cp++) {
56117c478bd9Sstevel@tonic-gate h += *cp;
56127c478bd9Sstevel@tonic-gate }
56137c478bd9Sstevel@tonic-gate return (h % TABLE_SIZE);
56147c478bd9Sstevel@tonic-gate }
56157c478bd9Sstevel@tonic-gate
56167c478bd9Sstevel@tonic-gate static void *
getmem(size_t size)56177c478bd9Sstevel@tonic-gate getmem(size_t size)
56187c478bd9Sstevel@tonic-gate {
56197c478bd9Sstevel@tonic-gate void *p = calloc((unsigned)size, sizeof (char));
56207c478bd9Sstevel@tonic-gate
56217c478bd9Sstevel@tonic-gate if (p == NULL && freemem) {
56227c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
56237c478bd9Sstevel@tonic-gate "tar: out of memory, link and directory modtime "
56247c478bd9Sstevel@tonic-gate "info lost\n"));
56257c478bd9Sstevel@tonic-gate freemem = 0;
56267c478bd9Sstevel@tonic-gate if (errflag)
56277c478bd9Sstevel@tonic-gate done(1);
56287c478bd9Sstevel@tonic-gate else
56297c478bd9Sstevel@tonic-gate Errflg = 1;
56307c478bd9Sstevel@tonic-gate }
56317c478bd9Sstevel@tonic-gate return (p);
56327c478bd9Sstevel@tonic-gate }
56337c478bd9Sstevel@tonic-gate
56347c478bd9Sstevel@tonic-gate /*
56357c478bd9Sstevel@tonic-gate * vperror() --variable argument perror.
56367c478bd9Sstevel@tonic-gate * Takes 3 args: exit_status, formats, args. If exit_status is 0, then
56377c478bd9Sstevel@tonic-gate * the errflag (exit on error) is checked -- if it is non-zero, tar exits
56387c478bd9Sstevel@tonic-gate * with the value of whatever "errno" is set to. If exit_status is not
56397c478bd9Sstevel@tonic-gate * zero, then tar exits with that error status. If errflag and exit_status
56407c478bd9Sstevel@tonic-gate * are both zero, the routine returns to where it was called and sets Errflg
56417c478bd9Sstevel@tonic-gate * to errno.
56427c478bd9Sstevel@tonic-gate */
56437c478bd9Sstevel@tonic-gate
56447c478bd9Sstevel@tonic-gate static void
vperror(int exit_status,char * fmt,...)56457c478bd9Sstevel@tonic-gate vperror(int exit_status, char *fmt, ...)
56467c478bd9Sstevel@tonic-gate {
56477c478bd9Sstevel@tonic-gate va_list ap;
56487c478bd9Sstevel@tonic-gate
56497c478bd9Sstevel@tonic-gate va_start(ap, fmt);
56507c478bd9Sstevel@tonic-gate (void) fputs("tar: ", stderr);
56517c478bd9Sstevel@tonic-gate (void) vfprintf(stderr, fmt, ap);
56527c478bd9Sstevel@tonic-gate (void) fprintf(stderr, ": %s\n", strerror(errno));
56537c478bd9Sstevel@tonic-gate va_end(ap);
56547c478bd9Sstevel@tonic-gate if (exit_status)
56557c478bd9Sstevel@tonic-gate done(exit_status);
56567c478bd9Sstevel@tonic-gate else
56577c478bd9Sstevel@tonic-gate if (errflag)
56587c478bd9Sstevel@tonic-gate done(errno);
56597c478bd9Sstevel@tonic-gate else
56607c478bd9Sstevel@tonic-gate Errflg = errno;
56617c478bd9Sstevel@tonic-gate }
56627c478bd9Sstevel@tonic-gate
56637c478bd9Sstevel@tonic-gate
56647c478bd9Sstevel@tonic-gate static void
fatal(char * format,...)56657c478bd9Sstevel@tonic-gate fatal(char *format, ...)
56667c478bd9Sstevel@tonic-gate {
56677c478bd9Sstevel@tonic-gate va_list ap;
56687c478bd9Sstevel@tonic-gate
56697c478bd9Sstevel@tonic-gate va_start(ap, format);
56707c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "tar: ");
56717c478bd9Sstevel@tonic-gate (void) vfprintf(stderr, format, ap);
56727c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n");
56737c478bd9Sstevel@tonic-gate va_end(ap);
56747c478bd9Sstevel@tonic-gate done(1);
56757c478bd9Sstevel@tonic-gate }
56767c478bd9Sstevel@tonic-gate
56777c478bd9Sstevel@tonic-gate
56787c478bd9Sstevel@tonic-gate /*
56797c478bd9Sstevel@tonic-gate * Check to make sure that argument is a char * ptr.
56807c478bd9Sstevel@tonic-gate * Actually, we just check to see that it is non-null.
56817c478bd9Sstevel@tonic-gate * If it is null, print out the message and call usage(), bailing out.
56827c478bd9Sstevel@tonic-gate */
56837c478bd9Sstevel@tonic-gate
56847c478bd9Sstevel@tonic-gate static void
assert_string(char * s,char * msg)56857c478bd9Sstevel@tonic-gate assert_string(char *s, char *msg)
56867c478bd9Sstevel@tonic-gate {
56877c478bd9Sstevel@tonic-gate if (s == NULL) {
56887c478bd9Sstevel@tonic-gate (void) fprintf(stderr, msg);
56897c478bd9Sstevel@tonic-gate usage();
56907c478bd9Sstevel@tonic-gate }
56917c478bd9Sstevel@tonic-gate }
56927c478bd9Sstevel@tonic-gate
56937c478bd9Sstevel@tonic-gate
56947c478bd9Sstevel@tonic-gate static void
mterr(char * operation,int i,int exitcode)56957c478bd9Sstevel@tonic-gate mterr(char *operation, int i, int exitcode)
56967c478bd9Sstevel@tonic-gate {
56977c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
56987c478bd9Sstevel@tonic-gate "tar: %s error: "), operation);
56997c478bd9Sstevel@tonic-gate if (i < 0)
57007c478bd9Sstevel@tonic-gate perror("");
57017c478bd9Sstevel@tonic-gate else
57027c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("unexpected EOF\n"));
57037c478bd9Sstevel@tonic-gate done(exitcode);
57047c478bd9Sstevel@tonic-gate }
57057c478bd9Sstevel@tonic-gate
57067c478bd9Sstevel@tonic-gate static int
wantit(char * argv[],char ** namep,char ** dirp,char ** component,attr_data_t ** attrinfo)5707da6c28aaSamw wantit(char *argv[], char **namep, char **dirp, char **component,
5708da6c28aaSamw attr_data_t **attrinfo)
57097c478bd9Sstevel@tonic-gate {
57107c478bd9Sstevel@tonic-gate char **cp;
57117c478bd9Sstevel@tonic-gate int gotit; /* true if we've found a match */
5712123523f8Sas158974 int ret;
57137c478bd9Sstevel@tonic-gate
57147c478bd9Sstevel@tonic-gate top:
5715123523f8Sas158974 if (xhdr_flgs & _X_XHDR) {
57167c478bd9Sstevel@tonic-gate xhdr_flgs = 0;
5717123523f8Sas158974 }
57187c478bd9Sstevel@tonic-gate getdir();
57197c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) {
5720123523f8Sas158974 ret = get_xdata();
5721123523f8Sas158974 if (ret != 0) { /* Xhdr items and regular header */
5722123523f8Sas158974 setbytes_to_skip(&stbuf, ret);
57237c478bd9Sstevel@tonic-gate passtape();
57247c478bd9Sstevel@tonic-gate return (0); /* Error--don't want to extract */
57257c478bd9Sstevel@tonic-gate }
57267c478bd9Sstevel@tonic-gate }
57277c478bd9Sstevel@tonic-gate
5728123523f8Sas158974 /*
5729123523f8Sas158974 * If typeflag is not 'A' and xhdr_flgs is set, then processing
5730123523f8Sas158974 * of ancillary file is either over or ancillary file
5731123523f8Sas158974 * processing is not required, load info from Xtarhdr and set
5732123523f8Sas158974 * _X_XHDR bit in xhdr_flgs.
5733123523f8Sas158974 */
5734123523f8Sas158974 if ((dblock.dbuf.typeflag != 'A') && (xhdr_flgs != 0)) {
5735123523f8Sas158974 load_info_from_xtarhdr(xhdr_flgs, &Xtarhdr);
5736123523f8Sas158974 xhdr_flgs |= _X_XHDR;
5737123523f8Sas158974 }
5738123523f8Sas158974
57397c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
57407c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == _XATTR_HDRTYPE && xattrbadhead == 0) {
5741da6c28aaSamw /*
5742da6c28aaSamw * Always needs to read the extended header. If atflag, saflag,
5743da6c28aaSamw * or tflag isn't set, then we'll have the correct info for
5744da6c28aaSamw * passtape() later.
5745da6c28aaSamw */
5746da6c28aaSamw (void) read_xattr_hdr(attrinfo);
57477c478bd9Sstevel@tonic-gate goto top;
57487c478bd9Sstevel@tonic-gate }
5749da6c28aaSamw /*
5750ced83f9bSceastha * Now that we've read the extended header, call passtape()
5751ced83f9bSceastha * if we don't want to restore attributes or system attributes.
5752ced83f9bSceastha * Don't restore the attribute if we are extracting
5753ced83f9bSceastha * a file from an archive (as opposed to doing a table of
5754ced83f9bSceastha * contents) and any of the following are true:
5755ced83f9bSceastha * 1. neither -@ or -/ was specified.
5756ced83f9bSceastha * 2. -@ was specified, -/ wasn't specified, and we're
5757ced83f9bSceastha * processing a hidden attribute directory of an attribute
5758ced83f9bSceastha * or we're processing a read-write system attribute file.
5759ced83f9bSceastha * 3. -@ wasn't specified, -/ was specified, and the file
5760ced83f9bSceastha * we're processing is not a read-write system attribute file,
5761ced83f9bSceastha * or we're processing the hidden attribute directory of an
5762ced83f9bSceastha * attribute.
5763ced83f9bSceastha *
5764ced83f9bSceastha * We always process the attributes if we're just generating
5765ced83f9bSceastha * generating a table of contents, or if both -@ and -/ were
5766ced83f9bSceastha * specified.
5767da6c28aaSamw */
5768ced83f9bSceastha if (xattrp != NULL) {
5769ced83f9bSceastha attr_data_t *ainfo = *attrinfo;
5770ced83f9bSceastha
5771ced83f9bSceastha if (!tflag &&
5772ced83f9bSceastha ((!atflag && !saflag) ||
5773ced83f9bSceastha (atflag && !saflag && ((ainfo->attr_parent != NULL) ||
5774ced83f9bSceastha ainfo->attr_rw_sysattr)) ||
5775ced83f9bSceastha (!atflag && saflag && ((ainfo->attr_parent != NULL) ||
5776ced83f9bSceastha !ainfo->attr_rw_sysattr)))) {
5777da6c28aaSamw passtape();
5778da6c28aaSamw return (0);
5779da6c28aaSamw }
5780ced83f9bSceastha }
57817c478bd9Sstevel@tonic-gate #endif
57827c478bd9Sstevel@tonic-gate
57837c478bd9Sstevel@tonic-gate /* sets *namep to point at the proper name */
5784da6c28aaSamw if (check_prefix(namep, dirp, component) != 0) {
5785da6c28aaSamw passtape();
5786da6c28aaSamw return (0);
5787da6c28aaSamw }
57887c478bd9Sstevel@tonic-gate
57897c478bd9Sstevel@tonic-gate if (endtape()) {
57907c478bd9Sstevel@tonic-gate if (Bflag) {
5791*28c4d110SJoshua M. Clulow ssize_t sz;
5792*28c4d110SJoshua M. Clulow size_t extra_blocks = 0;
5793*28c4d110SJoshua M. Clulow
57947c478bd9Sstevel@tonic-gate /*
57957c478bd9Sstevel@tonic-gate * Logically at EOT - consume any extra blocks
57967c478bd9Sstevel@tonic-gate * so that write to our stdin won't fail and
57977c478bd9Sstevel@tonic-gate * emit an error message; otherwise something
57987c478bd9Sstevel@tonic-gate * like "dd if=foo.tar | (cd bar; tar xvf -)"
57997c478bd9Sstevel@tonic-gate * will produce a bogus error message from "dd".
58007c478bd9Sstevel@tonic-gate */
58017c478bd9Sstevel@tonic-gate
5802*28c4d110SJoshua M. Clulow while ((sz = read(mt, tbuf, TBLOCK*nblock)) > 0) {
5803*28c4d110SJoshua M. Clulow extra_blocks += sz;
58047c478bd9Sstevel@tonic-gate }
5805*28c4d110SJoshua M. Clulow dlog("wantit(): %d bytes of extra blocks\n",
5806*28c4d110SJoshua M. Clulow extra_blocks);
58077c478bd9Sstevel@tonic-gate }
5808*28c4d110SJoshua M. Clulow dlog("wantit(): at end of tape.\n");
58097c478bd9Sstevel@tonic-gate return (-1);
58107c478bd9Sstevel@tonic-gate }
58117c478bd9Sstevel@tonic-gate
58127c478bd9Sstevel@tonic-gate gotit = 0;
58137c478bd9Sstevel@tonic-gate
58147c478bd9Sstevel@tonic-gate if ((Iflag && is_in_table(include_tbl, *namep)) ||
58157c478bd9Sstevel@tonic-gate (! Iflag && *argv == NULL)) {
58167c478bd9Sstevel@tonic-gate gotit = 1;
58177c478bd9Sstevel@tonic-gate } else {
58187c478bd9Sstevel@tonic-gate for (cp = argv; *cp; cp++) {
58197c478bd9Sstevel@tonic-gate if (is_prefix(*cp, *namep)) {
58207c478bd9Sstevel@tonic-gate gotit = 1;
58217c478bd9Sstevel@tonic-gate break;
58227c478bd9Sstevel@tonic-gate }
58237c478bd9Sstevel@tonic-gate }
58247c478bd9Sstevel@tonic-gate }
58257c478bd9Sstevel@tonic-gate
58267c478bd9Sstevel@tonic-gate if (! gotit) {
58277c478bd9Sstevel@tonic-gate passtape();
58287c478bd9Sstevel@tonic-gate return (0);
58297c478bd9Sstevel@tonic-gate }
58307c478bd9Sstevel@tonic-gate
58317c478bd9Sstevel@tonic-gate if (Xflag && is_in_table(exclude_tbl, *namep)) {
58327c478bd9Sstevel@tonic-gate if (vflag) {
58337c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("%s excluded\n"),
58347c478bd9Sstevel@tonic-gate *namep);
58357c478bd9Sstevel@tonic-gate }
58367c478bd9Sstevel@tonic-gate passtape();
58377c478bd9Sstevel@tonic-gate return (0);
58387c478bd9Sstevel@tonic-gate }
58397c478bd9Sstevel@tonic-gate
58407c478bd9Sstevel@tonic-gate return (1);
58417c478bd9Sstevel@tonic-gate }
58427c478bd9Sstevel@tonic-gate
5843123523f8Sas158974
5844123523f8Sas158974 static void
setbytes_to_skip(struct stat * st,int err)5845123523f8Sas158974 setbytes_to_skip(struct stat *st, int err)
5846123523f8Sas158974 {
5847123523f8Sas158974 /*
5848123523f8Sas158974 * In a scenario where a typeflag 'X' was followed by
5849123523f8Sas158974 * a typeflag 'A' and typeflag 'O', then the number of
5850123523f8Sas158974 * bytes to skip should be the size of ancillary file,
5851123523f8Sas158974 * plus the dblock for regular file, and the size
5852123523f8Sas158974 * from Xtarhdr. However, if the typeflag was just 'X'
5853123523f8Sas158974 * followed by typeflag 'O', then the number of bytes
5854123523f8Sas158974 * to skip should be the size from Xtarhdr.
5855123523f8Sas158974 */
5856123523f8Sas158974 if ((err != 0) && (dblock.dbuf.typeflag == 'A') &&
5857257ece65SRalph Turner - Sun UK - Contractor (xhdr_flgs & _X_SIZE)) {
5858ced83f9bSceastha st->st_size += TBLOCK + Xtarhdr.x_filesz;
5859123523f8Sas158974 xhdr_flgs |= _X_XHDR;
5860123523f8Sas158974 } else if ((dblock.dbuf.typeflag != 'A') &&
5861257ece65SRalph Turner - Sun UK - Contractor (xhdr_flgs & _X_SIZE)) {
5862257ece65SRalph Turner - Sun UK - Contractor st->st_size += Xtarhdr.x_filesz;
5863123523f8Sas158974 xhdr_flgs |= _X_XHDR;
5864123523f8Sas158974 }
5865123523f8Sas158974 }
5866123523f8Sas158974
5867da6c28aaSamw static int
fill_in_attr_info(char * attr,char * longname,char * attrparent,int atparentfd,int rw_sysattr,attr_data_t ** attrinfo)5868da6c28aaSamw fill_in_attr_info(char *attr, char *longname, char *attrparent, int atparentfd,
5869da6c28aaSamw int rw_sysattr, attr_data_t **attrinfo)
5870da6c28aaSamw {
5871da6c28aaSamw size_t pathlen;
5872da6c28aaSamw char *tpath;
5873da6c28aaSamw char *tparent;
5874da6c28aaSamw
5875da6c28aaSamw /* parent info */
5876da6c28aaSamw if (attrparent != NULL) {
5877da6c28aaSamw if ((tparent = strdup(attrparent)) == NULL) {
5878da6c28aaSamw vperror(0, gettext(
5879da6c28aaSamw "unable to allocate memory for attribute parent "
5880da6c28aaSamw "name for %sattribute %s/%s of %s"),
5881da6c28aaSamw rw_sysattr ? gettext("system ") : "",
5882da6c28aaSamw attrparent, attr, longname);
5883da6c28aaSamw return (1);
5884da6c28aaSamw }
5885da6c28aaSamw } else {
5886da6c28aaSamw tparent = NULL;
5887da6c28aaSamw }
5888da6c28aaSamw
5889da6c28aaSamw /* path info */
5890da6c28aaSamw pathlen = strlen(attr) + 1;
5891da6c28aaSamw if (attrparent != NULL) {
5892da6c28aaSamw pathlen += strlen(attrparent) + 1; /* add 1 for '/' */
5893da6c28aaSamw }
5894da6c28aaSamw if ((tpath = calloc(1, pathlen)) == NULL) {
5895da6c28aaSamw vperror(0, gettext(
5896da6c28aaSamw "unable to allocate memory for full "
5897da6c28aaSamw "attribute path name for %sattribute %s%s%s of %s"),
5898da6c28aaSamw rw_sysattr ? gettext("system ") : "",
5899da6c28aaSamw (attrparent == NULL) ? "" : attrparent,
5900da6c28aaSamw (attrparent == NULL) ? "" : "/",
5901da6c28aaSamw attr, longname);
5902da6c28aaSamw if (tparent != NULL) {
5903da6c28aaSamw free(tparent);
5904da6c28aaSamw }
5905da6c28aaSamw return (1);
5906da6c28aaSamw }
5907da6c28aaSamw (void) snprintf(tpath, pathlen, "%s%s%s",
5908da6c28aaSamw (attrparent == NULL) ? "" : attrparent,
5909da6c28aaSamw (attrparent == NULL) ? "" : "/",
5910da6c28aaSamw attr);
5911da6c28aaSamw
5912da6c28aaSamw /* fill in the attribute info */
5913da6c28aaSamw if (*attrinfo == NULL) {
5914da6c28aaSamw if ((*attrinfo = malloc(sizeof (attr_data_t))) == NULL) {
5915da6c28aaSamw vperror(0, gettext(
5916da6c28aaSamw "unable to allocate memory for attribute "
5917da6c28aaSamw "information for %sattribute %s%s%s of %s"),
5918da6c28aaSamw rw_sysattr ? gettext("system ") : "",
5919da6c28aaSamw (attrparent == NULL) ? "" : attrparent,
5920da6c28aaSamw (attrparent == NULL) ? "" : gettext("/"),
5921da6c28aaSamw attr, longname);
5922da6c28aaSamw if (tparent != NULL) {
5923da6c28aaSamw free(tparent);
5924da6c28aaSamw }
5925da6c28aaSamw free(tpath);
5926da6c28aaSamw return (1);
5927da6c28aaSamw }
5928da6c28aaSamw } else {
5929da6c28aaSamw if ((*attrinfo)->attr_parent != NULL) {
5930da6c28aaSamw free((*attrinfo)->attr_parent);
5931da6c28aaSamw }
5932da6c28aaSamw if ((*attrinfo)->attr_path != NULL) {
5933da6c28aaSamw free((*attrinfo)->attr_path);
5934da6c28aaSamw }
5935da6c28aaSamw /*
5936da6c28aaSamw * The parent file descriptor is passed in, so don't
5937da6c28aaSamw * close it here as it should be closed by the function
5938da6c28aaSamw * that opened it.
5939da6c28aaSamw */
5940da6c28aaSamw }
5941da6c28aaSamw (*attrinfo)->attr_parent = tparent;
5942da6c28aaSamw (*attrinfo)->attr_path = tpath;
5943da6c28aaSamw (*attrinfo)->attr_rw_sysattr = rw_sysattr;
5944da6c28aaSamw (*attrinfo)->attr_parentfd = atparentfd;
5945da6c28aaSamw
5946da6c28aaSamw return (0);
5947da6c28aaSamw }
59487c478bd9Sstevel@tonic-gate
59497c478bd9Sstevel@tonic-gate /*
59503a1dab68SRich Burridge * Test to see if name is a directory.
59513a1dab68SRich Burridge *
59523a1dab68SRich Burridge * Return 1 if true, 0 otherwise.
59533a1dab68SRich Burridge */
59543a1dab68SRich Burridge
59553a1dab68SRich Burridge static int
is_directory(char * name)59563a1dab68SRich Burridge is_directory(char *name)
59573a1dab68SRich Burridge {
59583a1dab68SRich Burridge #if defined(O_XATTR)
59593a1dab68SRich Burridge /*
59603a1dab68SRich Burridge * If there is an xattr_buf structure associated with this file,
59613a1dab68SRich Burridge * then the directory test is based on whether the name has a
59623a1dab68SRich Burridge * trailing slash.
59633a1dab68SRich Burridge */
59643a1dab68SRich Burridge if (xattrp)
59653a1dab68SRich Burridge return (name[strlen(name) - 1] == '/');
59663a1dab68SRich Burridge #endif
59673a1dab68SRich Burridge if (is_posix)
59683a1dab68SRich Burridge return (dblock.dbuf.typeflag == '5');
59693a1dab68SRich Burridge else
59703a1dab68SRich Burridge return (name[strlen(name) - 1] == '/');
59713a1dab68SRich Burridge }
59723a1dab68SRich Burridge
59733a1dab68SRich Burridge /*
5974b25dbf38SRich Burridge * Version of chdir that handles directory pathnames of greater than PATH_MAX
5975b25dbf38SRich Burridge * length, by changing the working directory to manageable portions of the
5976b25dbf38SRich Burridge * complete directory pathname. If any of these attempts fail, then it exits
5977b25dbf38SRich Burridge * non-zero.
5978b25dbf38SRich Burridge *
5979b25dbf38SRich Burridge * If a segment (i.e. a portion of "path" between two "/"'s) of the overall
5980b25dbf38SRich Burridge * pathname is greater than PATH_MAX, then this still won't work, and this
5981b25dbf38SRich Burridge * routine will return -1 with errno set to ENAMETOOLONG.
5982b25dbf38SRich Burridge *
5983b25dbf38SRich Burridge * NOTE: this routine is semantically different to the system chdir in
5984b25dbf38SRich Burridge * that it is remotely possible for the currently working directory to be
5985b25dbf38SRich Burridge * changed to a different directory, if a chdir call fails when processing
5986b25dbf38SRich Burridge * one of the segments of a path that is greater than PATH_MAX. This isn't
5987b25dbf38SRich Burridge * a problem as this is tar's own specific version of chdir.
5988b25dbf38SRich Burridge */
5989b25dbf38SRich Burridge
5990b25dbf38SRich Burridge static int
tar_chdir(const char * path)5991b25dbf38SRich Burridge tar_chdir(const char *path) {
5992b25dbf38SRich Burridge const char *sep = "/";
5993b25dbf38SRich Burridge char *path_copy = NULL;
5994b25dbf38SRich Burridge char *ptr = NULL;
5995b25dbf38SRich Burridge
5996b25dbf38SRich Burridge /* The trivial case. */
5997b25dbf38SRich Burridge if (chdir(path) == 0) {
5998b25dbf38SRich Burridge return (0);
5999b25dbf38SRich Burridge }
6000b25dbf38SRich Burridge if (errno == ENAMETOOLONG) {
6001b25dbf38SRich Burridge if (path[0] == '/' && chdir(sep) != 0)
6002b25dbf38SRich Burridge return (-1);
6003b25dbf38SRich Burridge
6004b25dbf38SRich Burridge /* strtok(3C) modifies the string, so make a copy. */
6005b25dbf38SRich Burridge if ((path_copy = strdup(path)) == NULL) {
6006b25dbf38SRich Burridge return (-1);
6007b25dbf38SRich Burridge }
6008b25dbf38SRich Burridge
6009b25dbf38SRich Burridge /* chdir(2) for every path element. */
6010b25dbf38SRich Burridge for (ptr = strtok(path_copy, sep);
6011b25dbf38SRich Burridge ptr != NULL;
6012b25dbf38SRich Burridge ptr = strtok(NULL, sep)) {
6013b25dbf38SRich Burridge if (chdir(ptr) != 0) {
6014b25dbf38SRich Burridge free(path_copy);
6015b25dbf38SRich Burridge return (-1);
6016b25dbf38SRich Burridge }
6017b25dbf38SRich Burridge }
6018b25dbf38SRich Burridge free(path_copy);
6019b25dbf38SRich Burridge return (0);
6020b25dbf38SRich Burridge }
6021b25dbf38SRich Burridge
6022b25dbf38SRich Burridge /* If chdir fails for any reason except ENAMETOOLONG. */
6023b25dbf38SRich Burridge return (-1);
6024b25dbf38SRich Burridge }
6025b25dbf38SRich Burridge
6026b25dbf38SRich Burridge /*
60271a431409SRich Burridge * Test if name has a '..' sequence in it.
60281a431409SRich Burridge *
60291a431409SRich Burridge * Return 1 if found, 0 otherwise.
60301a431409SRich Burridge */
60311a431409SRich Burridge
60321a431409SRich Burridge static int
has_dot_dot(char * name)60331a431409SRich Burridge has_dot_dot(char *name)
60341a431409SRich Burridge {
60351a431409SRich Burridge char *s;
60361a431409SRich Burridge size_t name_len = strlen(name);
60371a431409SRich Burridge
60381a431409SRich Burridge for (s = name; s < (name + name_len - 2); s++) {
60391a431409SRich Burridge if (s[0] == '.' && s[1] == '.' && ((s[2] == '/') || !s[2]))
60401a431409SRich Burridge return (1);
60411a431409SRich Burridge
60421a431409SRich Burridge while (! (*s == '/')) {
60431a431409SRich Burridge if (! *s++)
60441a431409SRich Burridge return (0);
60451a431409SRich Burridge }
60461a431409SRich Burridge }
60471a431409SRich Burridge
60481a431409SRich Burridge return (0);
60491a431409SRich Burridge }
60501a431409SRich Burridge
60511a431409SRich Burridge /*
60521a431409SRich Burridge * Test if name is an absolute path name.
60531a431409SRich Burridge *
60541a431409SRich Burridge * Return 1 if true, 0 otherwise.
60551a431409SRich Burridge */
60561a431409SRich Burridge
60571a431409SRich Burridge static int
is_absolute(char * name)60581a431409SRich Burridge is_absolute(char *name)
60591a431409SRich Burridge {
6060fe5a79a9SRich Burridge #if defined(O_XATTR)
6061fe5a79a9SRich Burridge /*
6062fe5a79a9SRich Burridge * If this is an extended attribute (whose name will begin with
6063fe5a79a9SRich Burridge * "/dev/null/", always return 0 as they should be extracted with
6064fe5a79a9SRich Burridge * the name intact, to allow other tar archiving programs that
6065fe5a79a9SRich Burridge * don't understand extended attributes, to correctly throw them away.
6066fe5a79a9SRich Burridge */
6067fe5a79a9SRich Burridge if (xattrp)
6068fe5a79a9SRich Burridge return (0);
6069fe5a79a9SRich Burridge #endif
6070fe5a79a9SRich Burridge
60711a431409SRich Burridge return (name[0] == '/');
60721a431409SRich Burridge }
60731a431409SRich Burridge
60741a431409SRich Burridge /*
60751a431409SRich Burridge * Adjust the pathname to make it a relative one. Strip off any leading
60761a431409SRich Burridge * '/' characters and if the pathname contains any '..' sequences, strip
60771a431409SRich Burridge * upto and including the last occurance of '../' (or '..' if found at
60781a431409SRich Burridge * the very end of the pathname).
60791a431409SRich Burridge *
60801a431409SRich Burridge * Return the relative pathname. stripped_prefix will also return the
60811a431409SRich Burridge * portion of name that was stripped off and should be freed by the
60821a431409SRich Burridge * calling routine when no longer needed.
60831a431409SRich Burridge */
60841a431409SRich Burridge
60851a431409SRich Burridge static char *
make_relative_name(char * name,char ** stripped_prefix)60861a431409SRich Burridge make_relative_name(char *name, char **stripped_prefix)
60871a431409SRich Burridge {
60881a431409SRich Burridge char *s;
60891a431409SRich Burridge size_t prefix_len = 0;
60901a431409SRich Burridge size_t name_len = strlen(name);
60911a431409SRich Burridge
60921a431409SRich Burridge for (s = name + prefix_len; s < (name + name_len - 2); ) {
60931a431409SRich Burridge if (s[0] == '.' && s[1] == '.' && ((s[2] == '/') || !s[2]))
60941a431409SRich Burridge prefix_len = s + 2 - name;
60951a431409SRich Burridge
60961a431409SRich Burridge do {
60971a431409SRich Burridge char c = *s++;
60981a431409SRich Burridge
60991a431409SRich Burridge if (c == '/')
61001a431409SRich Burridge break;
61011a431409SRich Burridge } while (*s);
61021a431409SRich Burridge }
61031a431409SRich Burridge
61041a431409SRich Burridge for (s = name + prefix_len; *s == '/'; s++)
61051a431409SRich Burridge continue;
61061a431409SRich Burridge prefix_len = s - name;
61071a431409SRich Burridge
61081a431409SRich Burridge /* Create the portion of the name that was stripped off. */
61091a431409SRich Burridge s = malloc(prefix_len + 1);
61101a431409SRich Burridge memcpy(s, name, prefix_len);
61111a431409SRich Burridge s[prefix_len] = 0;
61121a431409SRich Burridge *stripped_prefix = s;
61131a431409SRich Burridge s = &name[prefix_len];
61141a431409SRich Burridge
61151a431409SRich Burridge return (s);
61161a431409SRich Burridge }
61171a431409SRich Burridge
61181a431409SRich Burridge /*
61197c478bd9Sstevel@tonic-gate * Return through *namep a pointer to the proper fullname (i.e "<name> |
61207c478bd9Sstevel@tonic-gate * <prefix>/<name>"), as represented in the header entry dblock.dbuf.
6121da6c28aaSamw *
6122da6c28aaSamw * Returns 0 if successful, otherwise returns 1.
61237c478bd9Sstevel@tonic-gate */
61247c478bd9Sstevel@tonic-gate
6125da6c28aaSamw static int
check_prefix(char ** namep,char ** dirp,char ** compp)61267c478bd9Sstevel@tonic-gate check_prefix(char **namep, char **dirp, char **compp)
61277c478bd9Sstevel@tonic-gate {
61287c478bd9Sstevel@tonic-gate static char fullname[PATH_MAX + 1];
61297c478bd9Sstevel@tonic-gate static char dir[PATH_MAX + 1];
61307c478bd9Sstevel@tonic-gate static char component[PATH_MAX + 1];
61317c478bd9Sstevel@tonic-gate static char savename[PATH_MAX + 1];
61327c478bd9Sstevel@tonic-gate char *s;
61337c478bd9Sstevel@tonic-gate
61347c478bd9Sstevel@tonic-gate (void) memset(dir, 0, sizeof (dir));
61357c478bd9Sstevel@tonic-gate (void) memset(component, 0, sizeof (component));
61367c478bd9Sstevel@tonic-gate
61377c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) {
61387c478bd9Sstevel@tonic-gate (void) strcpy(fullname, Xtarhdr.x_path);
61397c478bd9Sstevel@tonic-gate } else {
61407c478bd9Sstevel@tonic-gate if (dblock.dbuf.prefix[0] != '\0')
61417c478bd9Sstevel@tonic-gate (void) sprintf(fullname, "%.*s/%.*s", PRESIZ,
61427c478bd9Sstevel@tonic-gate dblock.dbuf.prefix, NAMSIZ, dblock.dbuf.name);
61437c478bd9Sstevel@tonic-gate else
61447c478bd9Sstevel@tonic-gate (void) sprintf(fullname, "%.*s", NAMSIZ,
61457c478bd9Sstevel@tonic-gate dblock.dbuf.name);
61467c478bd9Sstevel@tonic-gate }
61477c478bd9Sstevel@tonic-gate
61487c478bd9Sstevel@tonic-gate /*
61491a431409SRich Burridge * If we are printing a table of contents or extracting an archive,
61501a431409SRich Burridge * make absolute pathnames relative and prohibit the unpacking of
61511a431409SRich Burridge * files contain ".." in their name (unless the user has supplied
61521a431409SRich Burridge * the -P option).
61531a431409SRich Burridge */
61541a431409SRich Burridge if ((tflag || xflag) && !Pflag) {
61551a431409SRich Burridge if (is_absolute(fullname) || has_dot_dot(fullname)) {
61561a431409SRich Burridge char *stripped_prefix;
61571a431409SRich Burridge
61581a431409SRich Burridge (void) strcpy(savename, fullname);
61591a431409SRich Burridge strcpy(fullname,
61601a431409SRich Burridge make_relative_name(savename, &stripped_prefix));
61611a431409SRich Burridge (void) fprintf(stderr,
61621a431409SRich Burridge gettext("tar: Removing leading '%s' from '%s'\n"),
61631a431409SRich Burridge stripped_prefix, savename);
61641a431409SRich Burridge free(stripped_prefix);
61651a431409SRich Burridge }
61661a431409SRich Burridge }
61671a431409SRich Burridge
61681a431409SRich Burridge /*
61697c478bd9Sstevel@tonic-gate * Set dir and component names
61707c478bd9Sstevel@tonic-gate */
61717c478bd9Sstevel@tonic-gate
61727c478bd9Sstevel@tonic-gate get_parent(fullname, dir);
61737c478bd9Sstevel@tonic-gate
61747c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
6175da6c28aaSamw if (xattrp == NULL) {
61767c478bd9Sstevel@tonic-gate #endif
61777c478bd9Sstevel@tonic-gate /*
61787c478bd9Sstevel@tonic-gate * Save of real name since were going to chop off the
61797c478bd9Sstevel@tonic-gate * trailing slashes.
61807c478bd9Sstevel@tonic-gate */
61817c478bd9Sstevel@tonic-gate (void) strcpy(savename, fullname);
61827c478bd9Sstevel@tonic-gate /*
61837c478bd9Sstevel@tonic-gate * first strip of trailing slashes.
61847c478bd9Sstevel@tonic-gate */
61857c478bd9Sstevel@tonic-gate chop_endslashes(savename);
61867c478bd9Sstevel@tonic-gate s = get_component(savename);
61877c478bd9Sstevel@tonic-gate (void) strcpy(component, s);
61887c478bd9Sstevel@tonic-gate
61897c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
61907c478bd9Sstevel@tonic-gate } else {
61917c478bd9Sstevel@tonic-gate (void) strcpy(fullname, xattrp->h_names);
61927c478bd9Sstevel@tonic-gate (void) strcpy(dir, fullname);
6193da6c28aaSamw (void) strcpy(component, basename(xattrp->h_names +
6194da6c28aaSamw strlen(xattrp->h_names) + 1));
61957c478bd9Sstevel@tonic-gate }
61967c478bd9Sstevel@tonic-gate #endif
61977c478bd9Sstevel@tonic-gate *namep = fullname;
61987c478bd9Sstevel@tonic-gate *dirp = dir;
61997c478bd9Sstevel@tonic-gate *compp = component;
6200da6c28aaSamw
6201da6c28aaSamw return (0);
62027c478bd9Sstevel@tonic-gate }
62037c478bd9Sstevel@tonic-gate
62047c478bd9Sstevel@tonic-gate /*
62057c478bd9Sstevel@tonic-gate * Return true if the object indicated by the file descriptor and type
62067c478bd9Sstevel@tonic-gate * is a tape device, false otherwise
62077c478bd9Sstevel@tonic-gate */
62087c478bd9Sstevel@tonic-gate
62097c478bd9Sstevel@tonic-gate static int
istape(int fd,int type)62107c478bd9Sstevel@tonic-gate istape(int fd, int type)
62117c478bd9Sstevel@tonic-gate {
62127c478bd9Sstevel@tonic-gate int result = 0;
62137c478bd9Sstevel@tonic-gate
62144bc0a2efScasper if (S_ISCHR(type)) {
62157c478bd9Sstevel@tonic-gate struct mtget mtg;
62167c478bd9Sstevel@tonic-gate
62177c478bd9Sstevel@tonic-gate if (ioctl(fd, MTIOCGET, &mtg) != -1) {
62187c478bd9Sstevel@tonic-gate result = 1;
62197c478bd9Sstevel@tonic-gate }
62207c478bd9Sstevel@tonic-gate }
62217c478bd9Sstevel@tonic-gate
62227c478bd9Sstevel@tonic-gate return (result);
62237c478bd9Sstevel@tonic-gate }
62247c478bd9Sstevel@tonic-gate
62257c478bd9Sstevel@tonic-gate #include <utmpx.h>
62267c478bd9Sstevel@tonic-gate
62277c478bd9Sstevel@tonic-gate struct utmpx utmpx;
62287c478bd9Sstevel@tonic-gate
62297c478bd9Sstevel@tonic-gate #define NMAX (sizeof (utmpx.ut_name))
62307c478bd9Sstevel@tonic-gate
62317c478bd9Sstevel@tonic-gate typedef struct cachenode { /* this struct must be zeroed before using */
62327c478bd9Sstevel@tonic-gate struct cachenode *next; /* next in hash chain */
62337c478bd9Sstevel@tonic-gate int val; /* the uid or gid of this entry */
62347c478bd9Sstevel@tonic-gate int namehash; /* name's hash signature */
62357c478bd9Sstevel@tonic-gate char name[NMAX+1]; /* the string that val maps to */
62367c478bd9Sstevel@tonic-gate } cachenode_t;
62377c478bd9Sstevel@tonic-gate
62387c478bd9Sstevel@tonic-gate #define HASHSIZE 256
62397c478bd9Sstevel@tonic-gate
62407c478bd9Sstevel@tonic-gate static cachenode_t *names[HASHSIZE];
62417c478bd9Sstevel@tonic-gate static cachenode_t *groups[HASHSIZE];
62427c478bd9Sstevel@tonic-gate static cachenode_t *uids[HASHSIZE];
62437c478bd9Sstevel@tonic-gate static cachenode_t *gids[HASHSIZE];
62447c478bd9Sstevel@tonic-gate
62457c478bd9Sstevel@tonic-gate static int
hash_byname(char * name)62467c478bd9Sstevel@tonic-gate hash_byname(char *name)
62477c478bd9Sstevel@tonic-gate {
62487c478bd9Sstevel@tonic-gate int i, c, h = 0;
62497c478bd9Sstevel@tonic-gate
62507c478bd9Sstevel@tonic-gate for (i = 0; i < NMAX; i++) {
62517c478bd9Sstevel@tonic-gate c = name[i];
62527c478bd9Sstevel@tonic-gate if (c == '\0')
62537c478bd9Sstevel@tonic-gate break;
62547c478bd9Sstevel@tonic-gate h = (h << 4) + h + c;
62557c478bd9Sstevel@tonic-gate }
62567c478bd9Sstevel@tonic-gate return (h);
62577c478bd9Sstevel@tonic-gate }
62587c478bd9Sstevel@tonic-gate
62597c478bd9Sstevel@tonic-gate static cachenode_t *
hash_lookup_byval(cachenode_t * table[],int val)62607c478bd9Sstevel@tonic-gate hash_lookup_byval(cachenode_t *table[], int val)
62617c478bd9Sstevel@tonic-gate {
62627c478bd9Sstevel@tonic-gate int h = val;
62637c478bd9Sstevel@tonic-gate cachenode_t *c;
62647c478bd9Sstevel@tonic-gate
62657c478bd9Sstevel@tonic-gate for (c = table[h & (HASHSIZE - 1)]; c != NULL; c = c->next) {
62667c478bd9Sstevel@tonic-gate if (c->val == val)
62677c478bd9Sstevel@tonic-gate return (c);
62687c478bd9Sstevel@tonic-gate }
62697c478bd9Sstevel@tonic-gate return (NULL);
62707c478bd9Sstevel@tonic-gate }
62717c478bd9Sstevel@tonic-gate
62727c478bd9Sstevel@tonic-gate static cachenode_t *
hash_lookup_byname(cachenode_t * table[],char * name)62737c478bd9Sstevel@tonic-gate hash_lookup_byname(cachenode_t *table[], char *name)
62747c478bd9Sstevel@tonic-gate {
62757c478bd9Sstevel@tonic-gate int h = hash_byname(name);
62767c478bd9Sstevel@tonic-gate cachenode_t *c;
62777c478bd9Sstevel@tonic-gate
62787c478bd9Sstevel@tonic-gate for (c = table[h & (HASHSIZE - 1)]; c != NULL; c = c->next) {
62797c478bd9Sstevel@tonic-gate if (c->namehash == h && strcmp(c->name, name) == 0)
62807c478bd9Sstevel@tonic-gate return (c);
62817c478bd9Sstevel@tonic-gate }
62827c478bd9Sstevel@tonic-gate return (NULL);
62837c478bd9Sstevel@tonic-gate }
62847c478bd9Sstevel@tonic-gate
62857c478bd9Sstevel@tonic-gate static cachenode_t *
hash_insert(cachenode_t * table[],char * name,int value)62867c478bd9Sstevel@tonic-gate hash_insert(cachenode_t *table[], char *name, int value)
62877c478bd9Sstevel@tonic-gate {
62887c478bd9Sstevel@tonic-gate cachenode_t *c;
62897c478bd9Sstevel@tonic-gate int signature;
62907c478bd9Sstevel@tonic-gate
62917c478bd9Sstevel@tonic-gate c = calloc(1, sizeof (cachenode_t));
62927c478bd9Sstevel@tonic-gate if (c == NULL) {
62937c478bd9Sstevel@tonic-gate perror("malloc");
62947c478bd9Sstevel@tonic-gate exit(1);
62957c478bd9Sstevel@tonic-gate }
62967c478bd9Sstevel@tonic-gate if (name != NULL) {
62977c478bd9Sstevel@tonic-gate (void) strncpy(c->name, name, NMAX);
62987c478bd9Sstevel@tonic-gate c->namehash = hash_byname(name);
62997c478bd9Sstevel@tonic-gate }
63007c478bd9Sstevel@tonic-gate c->val = value;
63017c478bd9Sstevel@tonic-gate if (table == uids || table == gids)
63027c478bd9Sstevel@tonic-gate signature = c->val;
63037c478bd9Sstevel@tonic-gate else
63047c478bd9Sstevel@tonic-gate signature = c->namehash;
63057c478bd9Sstevel@tonic-gate c->next = table[signature & (HASHSIZE - 1)];
63067c478bd9Sstevel@tonic-gate table[signature & (HASHSIZE - 1)] = c;
63077c478bd9Sstevel@tonic-gate return (c);
63087c478bd9Sstevel@tonic-gate }
63097c478bd9Sstevel@tonic-gate
63107c478bd9Sstevel@tonic-gate static char *
getname(uid_t uid)63117c478bd9Sstevel@tonic-gate getname(uid_t uid)
63127c478bd9Sstevel@tonic-gate {
63137c478bd9Sstevel@tonic-gate cachenode_t *c;
63147c478bd9Sstevel@tonic-gate
63157c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byval(uids, uid)) == NULL) {
63167c478bd9Sstevel@tonic-gate struct passwd *pwent = getpwuid(uid);
63177c478bd9Sstevel@tonic-gate c = hash_insert(uids, pwent ? pwent->pw_name : NULL, uid);
63187c478bd9Sstevel@tonic-gate }
63197c478bd9Sstevel@tonic-gate return (c->name);
63207c478bd9Sstevel@tonic-gate }
63217c478bd9Sstevel@tonic-gate
63227c478bd9Sstevel@tonic-gate static char *
getgroup(gid_t gid)63237c478bd9Sstevel@tonic-gate getgroup(gid_t gid)
63247c478bd9Sstevel@tonic-gate {
63257c478bd9Sstevel@tonic-gate cachenode_t *c;
63267c478bd9Sstevel@tonic-gate
63277c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byval(gids, gid)) == NULL) {
63287c478bd9Sstevel@tonic-gate struct group *grent = getgrgid(gid);
63297c478bd9Sstevel@tonic-gate c = hash_insert(gids, grent ? grent->gr_name : NULL, gid);
63307c478bd9Sstevel@tonic-gate }
63317c478bd9Sstevel@tonic-gate return (c->name);
63327c478bd9Sstevel@tonic-gate }
63337c478bd9Sstevel@tonic-gate
63347c478bd9Sstevel@tonic-gate static uid_t
getuidbyname(char * name)63357c478bd9Sstevel@tonic-gate getuidbyname(char *name)
63367c478bd9Sstevel@tonic-gate {
63377c478bd9Sstevel@tonic-gate cachenode_t *c;
63387c478bd9Sstevel@tonic-gate
63397c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byname(names, name)) == NULL) {
63407c478bd9Sstevel@tonic-gate struct passwd *pwent = getpwnam(name);
63417c478bd9Sstevel@tonic-gate c = hash_insert(names, name, pwent ? (int)pwent->pw_uid : -1);
63427c478bd9Sstevel@tonic-gate }
63437c478bd9Sstevel@tonic-gate return ((uid_t)c->val);
63447c478bd9Sstevel@tonic-gate }
63457c478bd9Sstevel@tonic-gate
63467c478bd9Sstevel@tonic-gate static gid_t
getgidbyname(char * group)63477c478bd9Sstevel@tonic-gate getgidbyname(char *group)
63487c478bd9Sstevel@tonic-gate {
63497c478bd9Sstevel@tonic-gate cachenode_t *c;
63507c478bd9Sstevel@tonic-gate
63517c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byname(groups, group)) == NULL) {
63527c478bd9Sstevel@tonic-gate struct group *grent = getgrnam(group);
63537c478bd9Sstevel@tonic-gate c = hash_insert(groups, group, grent ? (int)grent->gr_gid : -1);
63547c478bd9Sstevel@tonic-gate }
63557c478bd9Sstevel@tonic-gate return ((gid_t)c->val);
63567c478bd9Sstevel@tonic-gate }
63577c478bd9Sstevel@tonic-gate
63587c478bd9Sstevel@tonic-gate /*
63597c478bd9Sstevel@tonic-gate * Build the header.
63607c478bd9Sstevel@tonic-gate * Determine whether or not an extended header is also needed. If needed,
63617c478bd9Sstevel@tonic-gate * create and write the extended header and its data.
63627c478bd9Sstevel@tonic-gate * Writing of the extended header assumes that "tomodes" has been called and
63637c478bd9Sstevel@tonic-gate * the relevant information has been placed in the header block.
63647c478bd9Sstevel@tonic-gate */
63657c478bd9Sstevel@tonic-gate
63667c478bd9Sstevel@tonic-gate static int
build_dblock(const char * name,const char * linkname,const char typeflag,const int filetype,const struct stat * sp,const dev_t device,const char * prefix)63677c478bd9Sstevel@tonic-gate build_dblock(
63687c478bd9Sstevel@tonic-gate const char *name,
63697c478bd9Sstevel@tonic-gate const char *linkname,
63707c478bd9Sstevel@tonic-gate const char typeflag,
63717c478bd9Sstevel@tonic-gate const int filetype,
63727c478bd9Sstevel@tonic-gate const struct stat *sp,
63737c478bd9Sstevel@tonic-gate const dev_t device,
63747c478bd9Sstevel@tonic-gate const char *prefix)
63757c478bd9Sstevel@tonic-gate {
63767c478bd9Sstevel@tonic-gate int nblks;
63777c478bd9Sstevel@tonic-gate major_t dev;
63787c478bd9Sstevel@tonic-gate const char *filename;
63797c478bd9Sstevel@tonic-gate const char *lastslash;
63807c478bd9Sstevel@tonic-gate
63817c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE)
63827c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = _XATTR_HDRTYPE;
63837c478bd9Sstevel@tonic-gate else
63847c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = typeflag;
63857c478bd9Sstevel@tonic-gate (void) memset(dblock.dbuf.name, '\0', NAMSIZ);
63867c478bd9Sstevel@tonic-gate (void) memset(dblock.dbuf.linkname, '\0', NAMSIZ);
63877c478bd9Sstevel@tonic-gate (void) memset(dblock.dbuf.prefix, '\0', PRESIZ);
63887c478bd9Sstevel@tonic-gate
63897c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH)
63907c478bd9Sstevel@tonic-gate filename = Xtarhdr.x_path;
63917c478bd9Sstevel@tonic-gate else
63927c478bd9Sstevel@tonic-gate filename = name;
63937c478bd9Sstevel@tonic-gate
63947c478bd9Sstevel@tonic-gate if ((dev = major(device)) > OCTAL7CHAR) {
63957c478bd9Sstevel@tonic-gate if (Eflag) {
63967c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMAJOR;
63977c478bd9Sstevel@tonic-gate Xtarhdr.x_devmajor = dev;
63987c478bd9Sstevel@tonic-gate } else {
63997c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
64007c478bd9Sstevel@tonic-gate "Device major too large for %s. Use -E flag."),
64017c478bd9Sstevel@tonic-gate filename);
64027c478bd9Sstevel@tonic-gate if (errflag)
64037c478bd9Sstevel@tonic-gate done(1);
64047c478bd9Sstevel@tonic-gate else
64057c478bd9Sstevel@tonic-gate Errflg = 1;
64067c478bd9Sstevel@tonic-gate }
64077c478bd9Sstevel@tonic-gate dev = 0;
64087c478bd9Sstevel@tonic-gate }
64097c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.devmajor, "%07lo", dev);
64107c478bd9Sstevel@tonic-gate if ((dev = minor(device)) > OCTAL7CHAR) {
64117c478bd9Sstevel@tonic-gate if (Eflag) {
64127c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMINOR;
64137c478bd9Sstevel@tonic-gate Xtarhdr.x_devminor = dev;
64147c478bd9Sstevel@tonic-gate } else {
64157c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
64167c478bd9Sstevel@tonic-gate "Device minor too large for %s. Use -E flag."),
64177c478bd9Sstevel@tonic-gate filename);
64187c478bd9Sstevel@tonic-gate if (errflag)
64197c478bd9Sstevel@tonic-gate done(1);
64207c478bd9Sstevel@tonic-gate else
64217c478bd9Sstevel@tonic-gate Errflg = 1;
64227c478bd9Sstevel@tonic-gate }
64237c478bd9Sstevel@tonic-gate dev = 0;
64247c478bd9Sstevel@tonic-gate }
64257c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.devminor, "%07lo", dev);
64267c478bd9Sstevel@tonic-gate
64277c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.name, name, NAMSIZ);
64287c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.linkname, linkname, NAMSIZ);
64297c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.magic, "%.5s", magic_type);
64307c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.version, "00");
64317c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.uname, "%.31s", getname(sp->st_uid));
64327c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.gname, "%.31s", getgroup(sp->st_gid));
64337c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.prefix, prefix, PRESIZ);
64347c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock));
64357c478bd9Sstevel@tonic-gate
64367c478bd9Sstevel@tonic-gate if (Eflag) {
64377c478bd9Sstevel@tonic-gate (void) bcopy(dblock.dummy, xhdr_buf.dummy, TBLOCK);
64387c478bd9Sstevel@tonic-gate (void) memset(xhdr_buf.dbuf.name, '\0', NAMSIZ);
64397c478bd9Sstevel@tonic-gate lastslash = strrchr(name, '/');
64407c478bd9Sstevel@tonic-gate if (lastslash == NULL)
64417c478bd9Sstevel@tonic-gate lastslash = name;
64427c478bd9Sstevel@tonic-gate else
64437c478bd9Sstevel@tonic-gate lastslash++;
64447c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_buf.dbuf.name, lastslash);
64457c478bd9Sstevel@tonic-gate (void) memset(xhdr_buf.dbuf.linkname, '\0', NAMSIZ);
64467c478bd9Sstevel@tonic-gate (void) memset(xhdr_buf.dbuf.prefix, '\0', PRESIZ);
64477c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_buf.dbuf.prefix, xhdr_dirname);
64487c478bd9Sstevel@tonic-gate xhdr_count++;
64497c478bd9Sstevel@tonic-gate xrec_offset = 0;
64507c478bd9Sstevel@tonic-gate gen_date("mtime", sp->st_mtim);
64517c478bd9Sstevel@tonic-gate xhdr_buf.dbuf.typeflag = 'X';
64527c478bd9Sstevel@tonic-gate if (gen_utf8_names(filename) != 0)
64537c478bd9Sstevel@tonic-gate return (1);
64547c478bd9Sstevel@tonic-gate
64557c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG
64567c478bd9Sstevel@tonic-gate Xtarhdr.x_uname = dblock.dbuf.uname;
64577c478bd9Sstevel@tonic-gate Xtarhdr.x_gname = dblock.dbuf.gname;
64587c478bd9Sstevel@tonic-gate xhdr_flgs |= (_X_UNAME | _X_GNAME);
64597c478bd9Sstevel@tonic-gate #endif
64607c478bd9Sstevel@tonic-gate if (xhdr_flgs) {
64617c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_DEVMAJOR)
64627c478bd9Sstevel@tonic-gate gen_num("SUN.devmajor", Xtarhdr.x_devmajor);
64637c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_DEVMINOR)
64647c478bd9Sstevel@tonic-gate gen_num("SUN.devminor", Xtarhdr.x_devminor);
64657c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_GID)
64667c478bd9Sstevel@tonic-gate gen_num("gid", Xtarhdr.x_gid);
64677c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_UID)
64687c478bd9Sstevel@tonic-gate gen_num("uid", Xtarhdr.x_uid);
64697c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_SIZE)
64707c478bd9Sstevel@tonic-gate gen_num("size", Xtarhdr.x_filesz);
64717c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH)
64727c478bd9Sstevel@tonic-gate gen_string("path", Xtarhdr.x_path);
64737c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH)
64747c478bd9Sstevel@tonic-gate gen_string("linkpath", Xtarhdr.x_linkpath);
64757c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_GNAME)
64767c478bd9Sstevel@tonic-gate gen_string("gname", Xtarhdr.x_gname);
64777c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_UNAME)
64787c478bd9Sstevel@tonic-gate gen_string("uname", Xtarhdr.x_uname);
64797c478bd9Sstevel@tonic-gate }
64807c478bd9Sstevel@tonic-gate (void) sprintf(xhdr_buf.dbuf.size,
64817c478bd9Sstevel@tonic-gate "%011" FMT_off_t_o, xrec_offset);
64827c478bd9Sstevel@tonic-gate (void) sprintf(xhdr_buf.dbuf.chksum, "%07o",
64837c478bd9Sstevel@tonic-gate checksum(&xhdr_buf));
64847c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&xhdr_buf, 1);
64857c478bd9Sstevel@tonic-gate nblks = TBLOCKS(xrec_offset);
64867c478bd9Sstevel@tonic-gate (void) writetbuf(xrec_ptr, nblks);
64877c478bd9Sstevel@tonic-gate }
64887c478bd9Sstevel@tonic-gate return (0);
64897c478bd9Sstevel@tonic-gate }
64907c478bd9Sstevel@tonic-gate
64917c478bd9Sstevel@tonic-gate
64927c478bd9Sstevel@tonic-gate /*
64937c478bd9Sstevel@tonic-gate * makeDir - ensure that a directory with the pathname denoted by name
64947c478bd9Sstevel@tonic-gate * exists, and return 1 on success, and 0 on failure (e.g.,
64957c478bd9Sstevel@tonic-gate * read-only file system, exists but not-a-directory).
64967c478bd9Sstevel@tonic-gate */
64977c478bd9Sstevel@tonic-gate
64987c478bd9Sstevel@tonic-gate static int
makeDir(char * name)64997c478bd9Sstevel@tonic-gate makeDir(char *name)
65007c478bd9Sstevel@tonic-gate {
65017c478bd9Sstevel@tonic-gate struct stat buf;
65027c478bd9Sstevel@tonic-gate
65037c478bd9Sstevel@tonic-gate if (access(name, 0) < 0) { /* name doesn't exist */
65047c478bd9Sstevel@tonic-gate if (mkdir(name, 0777) < 0) {
65057c478bd9Sstevel@tonic-gate vperror(0, "%s", name);
65067c478bd9Sstevel@tonic-gate return (0);
65077c478bd9Sstevel@tonic-gate }
65087c478bd9Sstevel@tonic-gate } else { /* name exists */
65097c478bd9Sstevel@tonic-gate if (stat(name, &buf) < 0) {
65107c478bd9Sstevel@tonic-gate vperror(0, "%s", name);
65117c478bd9Sstevel@tonic-gate return (0);
65127c478bd9Sstevel@tonic-gate }
65137c478bd9Sstevel@tonic-gate
65147c478bd9Sstevel@tonic-gate return ((buf.st_mode & S_IFMT) == S_IFDIR);
65157c478bd9Sstevel@tonic-gate }
65167c478bd9Sstevel@tonic-gate
65177c478bd9Sstevel@tonic-gate return (1);
65187c478bd9Sstevel@tonic-gate }
65197c478bd9Sstevel@tonic-gate
65207c478bd9Sstevel@tonic-gate
65217c478bd9Sstevel@tonic-gate /*
65227c478bd9Sstevel@tonic-gate * Save this directory and its mtime on the stack, popping and setting
65237c478bd9Sstevel@tonic-gate * the mtimes of any stacked dirs which aren't parents of this one.
65247c478bd9Sstevel@tonic-gate * A null name causes the entire stack to be unwound and set.
65257c478bd9Sstevel@tonic-gate *
65267c478bd9Sstevel@tonic-gate * Since all the elements of the directory "stack" share a common
65277c478bd9Sstevel@tonic-gate * prefix, we can make do with one string. We keep only the current
65287c478bd9Sstevel@tonic-gate * directory path, with an associated array of mtime's. A negative
65297c478bd9Sstevel@tonic-gate * mtime means no mtime.
65307c478bd9Sstevel@tonic-gate *
65317c478bd9Sstevel@tonic-gate * This stack algorithm is not guaranteed to work for tapes created
65327c478bd9Sstevel@tonic-gate * with the 'r' function letter, but the vast majority of tapes with
65337c478bd9Sstevel@tonic-gate * directories are not. This avoids saving every directory record on
65347c478bd9Sstevel@tonic-gate * the tape and setting all the times at the end.
65357c478bd9Sstevel@tonic-gate *
65367c478bd9Sstevel@tonic-gate * (This was borrowed from the 4.1.3 source, and adapted to the 5.x
65377c478bd9Sstevel@tonic-gate * environment)
65387c478bd9Sstevel@tonic-gate */
65397c478bd9Sstevel@tonic-gate
65407c478bd9Sstevel@tonic-gate static void
doDirTimes(char * name,timestruc_t modTime)65417c478bd9Sstevel@tonic-gate doDirTimes(char *name, timestruc_t modTime)
65427c478bd9Sstevel@tonic-gate {
65437c478bd9Sstevel@tonic-gate static char dirstack[PATH_MAX+2];
65447c478bd9Sstevel@tonic-gate /* Add spaces for the last slash and last NULL */
65457c478bd9Sstevel@tonic-gate static timestruc_t modtimes[PATH_MAX+1]; /* hash table */
65467c478bd9Sstevel@tonic-gate char *p = dirstack;
65477c478bd9Sstevel@tonic-gate char *q = name;
65487c478bd9Sstevel@tonic-gate char *savp;
65497c478bd9Sstevel@tonic-gate
65507c478bd9Sstevel@tonic-gate if (q) {
65517c478bd9Sstevel@tonic-gate /*
65527c478bd9Sstevel@tonic-gate * Find common prefix
65537c478bd9Sstevel@tonic-gate */
65547c478bd9Sstevel@tonic-gate
65557c478bd9Sstevel@tonic-gate while (*p == *q && *p) {
65567c478bd9Sstevel@tonic-gate p++; q++;
65577c478bd9Sstevel@tonic-gate }
65587c478bd9Sstevel@tonic-gate }
65597c478bd9Sstevel@tonic-gate
65607c478bd9Sstevel@tonic-gate savp = p;
65617c478bd9Sstevel@tonic-gate while (*p) {
65627c478bd9Sstevel@tonic-gate /*
65637c478bd9Sstevel@tonic-gate * Not a child: unwind the stack, setting the times.
65647c478bd9Sstevel@tonic-gate * The order we do this doesn't matter, so we go "forward."
65657c478bd9Sstevel@tonic-gate */
65667c478bd9Sstevel@tonic-gate
65677c478bd9Sstevel@tonic-gate if (*p == '/')
65687c478bd9Sstevel@tonic-gate if (modtimes[p - dirstack].tv_sec >= 0) {
65697c478bd9Sstevel@tonic-gate *p = '\0'; /* zap the slash */
65707c478bd9Sstevel@tonic-gate setPathTimes(AT_FDCWD, dirstack,
65717c478bd9Sstevel@tonic-gate modtimes[p - dirstack]);
65727c478bd9Sstevel@tonic-gate *p = '/';
65737c478bd9Sstevel@tonic-gate }
65747c478bd9Sstevel@tonic-gate ++p;
65757c478bd9Sstevel@tonic-gate }
65767c478bd9Sstevel@tonic-gate
65777c478bd9Sstevel@tonic-gate p = savp;
65787c478bd9Sstevel@tonic-gate
65797c478bd9Sstevel@tonic-gate /*
65807c478bd9Sstevel@tonic-gate * Push this one on the "stack"
65817c478bd9Sstevel@tonic-gate */
65827c478bd9Sstevel@tonic-gate
65837c478bd9Sstevel@tonic-gate if (q) {
65847c478bd9Sstevel@tonic-gate
65857c478bd9Sstevel@tonic-gate /*
65867c478bd9Sstevel@tonic-gate * Since the name parameter points the dir pathname
65877c478bd9Sstevel@tonic-gate * which is limited only to contain PATH_MAX chars
65887c478bd9Sstevel@tonic-gate * at maximum, we can ignore the overflow case of p.
65897c478bd9Sstevel@tonic-gate */
65907c478bd9Sstevel@tonic-gate
65917c478bd9Sstevel@tonic-gate while ((*p = *q++)) { /* append the rest of the new dir */
65927c478bd9Sstevel@tonic-gate modtimes[p - dirstack].tv_sec = -1;
65937c478bd9Sstevel@tonic-gate p++;
65947c478bd9Sstevel@tonic-gate }
65957c478bd9Sstevel@tonic-gate
65967c478bd9Sstevel@tonic-gate /*
65977c478bd9Sstevel@tonic-gate * If the tar file had used 'P' or 'E' function modifier,
65987c478bd9Sstevel@tonic-gate * append the last slash.
65997c478bd9Sstevel@tonic-gate */
66007c478bd9Sstevel@tonic-gate if (*(p - 1) != '/') {
66017c478bd9Sstevel@tonic-gate *p++ = '/';
66027c478bd9Sstevel@tonic-gate *p = '\0';
66037c478bd9Sstevel@tonic-gate }
66047c478bd9Sstevel@tonic-gate /* overwrite the last one */
66057c478bd9Sstevel@tonic-gate modtimes[p - dirstack - 1] = modTime;
66067c478bd9Sstevel@tonic-gate }
66077c478bd9Sstevel@tonic-gate }
66087c478bd9Sstevel@tonic-gate
66097c478bd9Sstevel@tonic-gate
66107c478bd9Sstevel@tonic-gate /*
66117c478bd9Sstevel@tonic-gate * setPathTimes - set the modification time for given path. Return 1 if
66127c478bd9Sstevel@tonic-gate * successful and 0 if not successful.
66137c478bd9Sstevel@tonic-gate */
66147c478bd9Sstevel@tonic-gate
66157c478bd9Sstevel@tonic-gate static void
setPathTimes(int dirfd,char * path,timestruc_t modTime)66167c478bd9Sstevel@tonic-gate setPathTimes(int dirfd, char *path, timestruc_t modTime)
66177c478bd9Sstevel@tonic-gate
66187c478bd9Sstevel@tonic-gate {
66197c478bd9Sstevel@tonic-gate struct timeval timebuf[2];
66207c478bd9Sstevel@tonic-gate
66217c478bd9Sstevel@tonic-gate /*
66227c478bd9Sstevel@tonic-gate * futimesat takes an array of two timeval structs.
66237c478bd9Sstevel@tonic-gate * The first entry contains access time.
66247c478bd9Sstevel@tonic-gate * The second entry contains modification time.
66257c478bd9Sstevel@tonic-gate * Unlike a timestruc_t, which uses nanoseconds, timeval uses
66267c478bd9Sstevel@tonic-gate * microseconds.
66277c478bd9Sstevel@tonic-gate */
66287c478bd9Sstevel@tonic-gate timebuf[0].tv_sec = time((time_t *)0);
66297c478bd9Sstevel@tonic-gate timebuf[0].tv_usec = 0;
66307c478bd9Sstevel@tonic-gate timebuf[1].tv_sec = modTime.tv_sec;
66317c478bd9Sstevel@tonic-gate
66327c478bd9Sstevel@tonic-gate /* Extended header: use microseconds */
66337c478bd9Sstevel@tonic-gate timebuf[1].tv_usec = (xhdr_flgs & _X_MTIME) ? modTime.tv_nsec/1000 : 0;
66347c478bd9Sstevel@tonic-gate
66357c478bd9Sstevel@tonic-gate if (futimesat(dirfd, path, timebuf) < 0)
66368e4a71aeSRich Burridge vperror(0, gettext("can't set time on %s"), path);
66377c478bd9Sstevel@tonic-gate }
66387c478bd9Sstevel@tonic-gate
66397c478bd9Sstevel@tonic-gate
66407c478bd9Sstevel@tonic-gate /*
66417c478bd9Sstevel@tonic-gate * If hflag is set then delete the symbolic link's target.
66427c478bd9Sstevel@tonic-gate * If !hflag then delete the target.
66437c478bd9Sstevel@tonic-gate */
66447c478bd9Sstevel@tonic-gate
66457c478bd9Sstevel@tonic-gate static void
delete_target(int fd,char * comp,char * namep)66462c0f0499Slovely delete_target(int fd, char *comp, char *namep)
66477c478bd9Sstevel@tonic-gate {
66487c478bd9Sstevel@tonic-gate struct stat xtractbuf;
66497c478bd9Sstevel@tonic-gate char buf[PATH_MAX + 1];
66507c478bd9Sstevel@tonic-gate int n;
66517c478bd9Sstevel@tonic-gate
66527c478bd9Sstevel@tonic-gate
66532c0f0499Slovely if (unlinkat(fd, comp, AT_REMOVEDIR) < 0) {
66547c478bd9Sstevel@tonic-gate if (errno == ENOTDIR && !hflag) {
66552c0f0499Slovely (void) unlinkat(fd, comp, 0);
66567c478bd9Sstevel@tonic-gate } else if (errno == ENOTDIR && hflag) {
66577c478bd9Sstevel@tonic-gate if (!lstat(namep, &xtractbuf)) {
66587c478bd9Sstevel@tonic-gate if ((xtractbuf.st_mode & S_IFMT) != S_IFLNK) {
66592c0f0499Slovely (void) unlinkat(fd, comp, 0);
66607c478bd9Sstevel@tonic-gate } else if ((n = readlink(namep, buf,
66617c478bd9Sstevel@tonic-gate PATH_MAX)) != -1) {
66627c478bd9Sstevel@tonic-gate buf[n] = (char)NULL;
66637c478bd9Sstevel@tonic-gate (void) unlinkat(fd, buf,
66647c478bd9Sstevel@tonic-gate AT_REMOVEDIR);
66657c478bd9Sstevel@tonic-gate if (errno == ENOTDIR)
66667c478bd9Sstevel@tonic-gate (void) unlinkat(fd, buf, 0);
66677c478bd9Sstevel@tonic-gate } else {
66682c0f0499Slovely (void) unlinkat(fd, comp, 0);
66697c478bd9Sstevel@tonic-gate }
66707c478bd9Sstevel@tonic-gate } else {
66712c0f0499Slovely (void) unlinkat(fd, comp, 0);
66727c478bd9Sstevel@tonic-gate }
66737c478bd9Sstevel@tonic-gate }
66747c478bd9Sstevel@tonic-gate }
66757c478bd9Sstevel@tonic-gate }
66767c478bd9Sstevel@tonic-gate
66777c478bd9Sstevel@tonic-gate
66787c478bd9Sstevel@tonic-gate /*
66797c478bd9Sstevel@tonic-gate * ACL changes:
66807c478bd9Sstevel@tonic-gate * putfile():
66817c478bd9Sstevel@tonic-gate * Get acl info after stat. Write out ancillary file
66827c478bd9Sstevel@tonic-gate * before the normal file, i.e. directory, regular, FIFO,
66837c478bd9Sstevel@tonic-gate * link, special. If acl count is less than 4, no need to
66847c478bd9Sstevel@tonic-gate * create ancillary file. (i.e. standard permission is in
66857c478bd9Sstevel@tonic-gate * use.
66867c478bd9Sstevel@tonic-gate * doxtract():
66877c478bd9Sstevel@tonic-gate * Process ancillary file. Read it in and set acl info.
66887c478bd9Sstevel@tonic-gate * watch out for 'o' function modifier.
66897c478bd9Sstevel@tonic-gate * 't' function letter to display table
66907c478bd9Sstevel@tonic-gate */
66917c478bd9Sstevel@tonic-gate
66927c478bd9Sstevel@tonic-gate /*
66937c478bd9Sstevel@tonic-gate * New functions for ACLs and other security attributes
66947c478bd9Sstevel@tonic-gate */
66957c478bd9Sstevel@tonic-gate
66967c478bd9Sstevel@tonic-gate /*
66977c478bd9Sstevel@tonic-gate * The function appends the new security attribute info to the end of
66987c478bd9Sstevel@tonic-gate * existing secinfo.
66997c478bd9Sstevel@tonic-gate */
67007c478bd9Sstevel@tonic-gate int
append_secattr(char ** secinfo,int * secinfo_len,int size,char * attrtext,char attr_type)67017c478bd9Sstevel@tonic-gate append_secattr(
67027c478bd9Sstevel@tonic-gate char **secinfo, /* existing security info */
67037c478bd9Sstevel@tonic-gate int *secinfo_len, /* length of existing security info */
670445916cd2Sjpk int size, /* new attribute size: unit depends on type */
670545916cd2Sjpk char *attrtext, /* new attribute text */
670645916cd2Sjpk char attr_type) /* new attribute type */
67077c478bd9Sstevel@tonic-gate {
67087c478bd9Sstevel@tonic-gate char *new_secinfo;
67097c478bd9Sstevel@tonic-gate int newattrsize;
67107c478bd9Sstevel@tonic-gate int oldsize;
671145916cd2Sjpk struct sec_attr *attr;
67127c478bd9Sstevel@tonic-gate
67137c478bd9Sstevel@tonic-gate /* no need to add */
671445916cd2Sjpk if (attr_type != DIR_TYPE) {
671545916cd2Sjpk if (attrtext == NULL)
67167c478bd9Sstevel@tonic-gate return (0);
671745916cd2Sjpk }
67187c478bd9Sstevel@tonic-gate
671945916cd2Sjpk switch (attr_type) {
672045916cd2Sjpk case UFSD_ACL:
672145916cd2Sjpk case ACE_ACL:
67227c478bd9Sstevel@tonic-gate if (attrtext == NULL) {
67238e4a71aeSRich Burridge (void) fprintf(stderr, gettext("acltotext failed\n"));
67247c478bd9Sstevel@tonic-gate return (-1);
67257c478bd9Sstevel@tonic-gate }
67267c478bd9Sstevel@tonic-gate /* header: type + size = 8 */
67277c478bd9Sstevel@tonic-gate newattrsize = 8 + (int)strlen(attrtext) + 1;
67287c478bd9Sstevel@tonic-gate attr = (struct sec_attr *)malloc(newattrsize);
67297c478bd9Sstevel@tonic-gate if (attr == NULL) {
67308e4a71aeSRich Burridge (void) fprintf(stderr,
67318e4a71aeSRich Burridge gettext("can't allocate memory\n"));
67327c478bd9Sstevel@tonic-gate return (-1);
67337c478bd9Sstevel@tonic-gate }
673445916cd2Sjpk attr->attr_type = attr_type;
67357c478bd9Sstevel@tonic-gate (void) sprintf(attr->attr_len,
673645916cd2Sjpk "%06o", size); /* acl entry count */
67377c478bd9Sstevel@tonic-gate (void) strcpy((char *)&attr->attr_info[0], attrtext);
67387c478bd9Sstevel@tonic-gate free(attrtext);
67397c478bd9Sstevel@tonic-gate break;
67407c478bd9Sstevel@tonic-gate
674145916cd2Sjpk /* Trusted Extensions */
674245916cd2Sjpk case DIR_TYPE:
674345916cd2Sjpk case LBL_TYPE:
674445916cd2Sjpk newattrsize = sizeof (struct sec_attr) + strlen(attrtext);
674545916cd2Sjpk attr = (struct sec_attr *)malloc(newattrsize);
674645916cd2Sjpk if (attr == NULL) {
674745916cd2Sjpk (void) fprintf(stderr,
674845916cd2Sjpk gettext("can't allocate memory\n"));
674945916cd2Sjpk return (-1);
675045916cd2Sjpk }
675145916cd2Sjpk attr->attr_type = attr_type;
675245916cd2Sjpk (void) sprintf(attr->attr_len,
675345916cd2Sjpk "%06d", size); /* len of attr data */
675445916cd2Sjpk (void) strcpy((char *)&attr->attr_info[0], attrtext);
675545916cd2Sjpk break;
67567c478bd9Sstevel@tonic-gate
67577c478bd9Sstevel@tonic-gate default:
67588e4a71aeSRich Burridge (void) fprintf(stderr,
67598e4a71aeSRich Burridge gettext("unrecognized attribute type\n"));
67607c478bd9Sstevel@tonic-gate return (-1);
67617c478bd9Sstevel@tonic-gate }
67627c478bd9Sstevel@tonic-gate
67637c478bd9Sstevel@tonic-gate /* old security info + new attr header(8) + new attr */
67647c478bd9Sstevel@tonic-gate oldsize = *secinfo_len;
67657c478bd9Sstevel@tonic-gate *secinfo_len += newattrsize;
67667c478bd9Sstevel@tonic-gate new_secinfo = (char *)malloc(*secinfo_len);
67677c478bd9Sstevel@tonic-gate if (new_secinfo == NULL) {
67688e4a71aeSRich Burridge (void) fprintf(stderr, gettext("can't allocate memory\n"));
67697c478bd9Sstevel@tonic-gate *secinfo_len -= newattrsize;
677045916cd2Sjpk free(attr);
67717c478bd9Sstevel@tonic-gate return (-1);
67727c478bd9Sstevel@tonic-gate }
67737c478bd9Sstevel@tonic-gate
67747c478bd9Sstevel@tonic-gate (void) memcpy(new_secinfo, *secinfo, oldsize);
67757c478bd9Sstevel@tonic-gate (void) memcpy(new_secinfo + oldsize, attr, newattrsize);
67767c478bd9Sstevel@tonic-gate
67777c478bd9Sstevel@tonic-gate free(*secinfo);
677845916cd2Sjpk free(attr);
67797c478bd9Sstevel@tonic-gate *secinfo = new_secinfo;
67807c478bd9Sstevel@tonic-gate return (0);
67817c478bd9Sstevel@tonic-gate }
67827c478bd9Sstevel@tonic-gate
67837c478bd9Sstevel@tonic-gate /*
67847c478bd9Sstevel@tonic-gate * write_ancillary(): write out an ancillary file.
67857c478bd9Sstevel@tonic-gate * The file has the same header as normal file except the type and size
67867c478bd9Sstevel@tonic-gate * fields. The type is 'A' and size is the sum of all attributes
67877c478bd9Sstevel@tonic-gate * in bytes.
67887c478bd9Sstevel@tonic-gate * The body contains a list of attribute type, size and info. Currently,
67897c478bd9Sstevel@tonic-gate * there is only ACL info. This file is put before the normal file.
67907c478bd9Sstevel@tonic-gate */
67917c478bd9Sstevel@tonic-gate void
write_ancillary(union hblock * dblockp,char * secinfo,int len,char hdrtype)67927c478bd9Sstevel@tonic-gate write_ancillary(union hblock *dblockp, char *secinfo, int len, char hdrtype)
67937c478bd9Sstevel@tonic-gate {
67947c478bd9Sstevel@tonic-gate long blocks;
67957c478bd9Sstevel@tonic-gate int savflag;
67967c478bd9Sstevel@tonic-gate int savsize;
67977c478bd9Sstevel@tonic-gate
67987c478bd9Sstevel@tonic-gate /* Just tranditional permissions or no security attribute info */
67997c478bd9Sstevel@tonic-gate if (len == 0 || secinfo == NULL)
68007c478bd9Sstevel@tonic-gate return;
68017c478bd9Sstevel@tonic-gate
68027c478bd9Sstevel@tonic-gate /* save flag and size */
68037c478bd9Sstevel@tonic-gate savflag = (dblockp->dbuf).typeflag;
68047c478bd9Sstevel@tonic-gate (void) sscanf(dblockp->dbuf.size, "%12o", (uint_t *)&savsize);
68057c478bd9Sstevel@tonic-gate
68067c478bd9Sstevel@tonic-gate /* special flag for ancillary file */
68077c478bd9Sstevel@tonic-gate if (hdrtype == _XATTR_HDRTYPE)
68087c478bd9Sstevel@tonic-gate dblockp->dbuf.typeflag = _XATTR_HDRTYPE;
68097c478bd9Sstevel@tonic-gate else
68107c478bd9Sstevel@tonic-gate dblockp->dbuf.typeflag = 'A';
68117c478bd9Sstevel@tonic-gate
68127c478bd9Sstevel@tonic-gate /* for pre-2.5 versions of tar, need to make sure */
68137c478bd9Sstevel@tonic-gate /* the ACL file is readable */
68147c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mode, "%07lo",
68157c478bd9Sstevel@tonic-gate (stbuf.st_mode & POSIXMODES) | 0000200);
68167c478bd9Sstevel@tonic-gate (void) sprintf(dblockp->dbuf.size, "%011o", len);
68177c478bd9Sstevel@tonic-gate (void) sprintf(dblockp->dbuf.chksum, "%07o", checksum(dblockp));
68187c478bd9Sstevel@tonic-gate
68197c478bd9Sstevel@tonic-gate /* write out the header */
68207c478bd9Sstevel@tonic-gate (void) writetbuf((char *)dblockp, 1);
68217c478bd9Sstevel@tonic-gate
68227c478bd9Sstevel@tonic-gate /* write out security info */
68237c478bd9Sstevel@tonic-gate blocks = TBLOCKS(len);
68247c478bd9Sstevel@tonic-gate (void) writetbuf((char *)secinfo, (int)blocks);
68257c478bd9Sstevel@tonic-gate
68267c478bd9Sstevel@tonic-gate /* restore mode, flag and size */
68277c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mode, "%07lo", stbuf.st_mode & POSIXMODES);
68287c478bd9Sstevel@tonic-gate dblockp->dbuf.typeflag = savflag;
68297c478bd9Sstevel@tonic-gate (void) sprintf(dblockp->dbuf.size, "%011o", savsize);
68307c478bd9Sstevel@tonic-gate }
68317c478bd9Sstevel@tonic-gate
68327c478bd9Sstevel@tonic-gate /*
68337c478bd9Sstevel@tonic-gate * Read the data record for extended headers and then the regular header.
68347c478bd9Sstevel@tonic-gate * The data are read into the buffer and then null-terminated. Entries
6835e765faefSRich Burridge * for typeflag 'X' extended headers are of the format:
68367c478bd9Sstevel@tonic-gate * "%d %s=%s\n"
68377c478bd9Sstevel@tonic-gate *
68387c478bd9Sstevel@tonic-gate * When an extended header record is found, the extended header must
68397c478bd9Sstevel@tonic-gate * be processed and its values used to override the values in the
68407c478bd9Sstevel@tonic-gate * normal header. The way this is done is to process the extended
68417c478bd9Sstevel@tonic-gate * header data record and set the data values, then call getdir
68427c478bd9Sstevel@tonic-gate * to process the regular header, then then to reconcile the two
68437c478bd9Sstevel@tonic-gate * sets of data.
68447c478bd9Sstevel@tonic-gate */
68457c478bd9Sstevel@tonic-gate
68467c478bd9Sstevel@tonic-gate static int
get_xdata(void)68477c478bd9Sstevel@tonic-gate get_xdata(void)
68487c478bd9Sstevel@tonic-gate {
68497c478bd9Sstevel@tonic-gate struct keylist_pair {
68507c478bd9Sstevel@tonic-gate int keynum;
68517c478bd9Sstevel@tonic-gate char *keylist;
68527c478bd9Sstevel@tonic-gate } keylist_pair[] = { _X_DEVMAJOR, "SUN.devmajor",
68537c478bd9Sstevel@tonic-gate _X_DEVMINOR, "SUN.devminor",
68547c478bd9Sstevel@tonic-gate _X_GID, "gid",
68557c478bd9Sstevel@tonic-gate _X_GNAME, "gname",
68567c478bd9Sstevel@tonic-gate _X_LINKPATH, "linkpath",
68577c478bd9Sstevel@tonic-gate _X_PATH, "path",
68587c478bd9Sstevel@tonic-gate _X_SIZE, "size",
68597c478bd9Sstevel@tonic-gate _X_UID, "uid",
68607c478bd9Sstevel@tonic-gate _X_UNAME, "uname",
68617c478bd9Sstevel@tonic-gate _X_MTIME, "mtime",
68627c478bd9Sstevel@tonic-gate _X_LAST, "NULL" };
68637c478bd9Sstevel@tonic-gate char *lineloc;
68647c478bd9Sstevel@tonic-gate int length, i;
68657c478bd9Sstevel@tonic-gate char *keyword, *value;
68667c478bd9Sstevel@tonic-gate blkcnt_t nblocks;
68677c478bd9Sstevel@tonic-gate int bufneeded;
68687c478bd9Sstevel@tonic-gate int errors;
68697c478bd9Sstevel@tonic-gate
6870123523f8Sas158974 (void) memset(&Xtarhdr, 0, sizeof (Xtarhdr));
68717c478bd9Sstevel@tonic-gate xhdr_count++;
68727c478bd9Sstevel@tonic-gate errors = 0;
68737c478bd9Sstevel@tonic-gate
68747c478bd9Sstevel@tonic-gate nblocks = TBLOCKS(stbuf.st_size);
68757c478bd9Sstevel@tonic-gate bufneeded = nblocks * TBLOCK;
68767c478bd9Sstevel@tonic-gate if (bufneeded >= xrec_size) {
68777c478bd9Sstevel@tonic-gate free(xrec_ptr);
68787c478bd9Sstevel@tonic-gate xrec_size = bufneeded + 1;
68797c478bd9Sstevel@tonic-gate if ((xrec_ptr = malloc(xrec_size)) == NULL)
68807c478bd9Sstevel@tonic-gate fatal(gettext("cannot allocate buffer"));
68817c478bd9Sstevel@tonic-gate }
68827c478bd9Sstevel@tonic-gate
68837c478bd9Sstevel@tonic-gate lineloc = xrec_ptr;
68847c478bd9Sstevel@tonic-gate
68857c478bd9Sstevel@tonic-gate while (nblocks-- > 0) {
68867c478bd9Sstevel@tonic-gate readtape(lineloc);
68877c478bd9Sstevel@tonic-gate lineloc += TBLOCK;
68887c478bd9Sstevel@tonic-gate }
68897c478bd9Sstevel@tonic-gate lineloc = xrec_ptr;
68907c478bd9Sstevel@tonic-gate xrec_ptr[stbuf.st_size] = '\0';
68917c478bd9Sstevel@tonic-gate while (lineloc < xrec_ptr + stbuf.st_size) {
6892e765faefSRich Burridge if (dblock.dbuf.typeflag == 'L') {
6893e765faefSRich Burridge length = xrec_size;
6894e765faefSRich Burridge keyword = "path";
6895e765faefSRich Burridge value = lineloc;
6896e765faefSRich Burridge } else {
68977c478bd9Sstevel@tonic-gate length = atoi(lineloc);
68987c478bd9Sstevel@tonic-gate *(lineloc + length - 1) = '\0';
68997c478bd9Sstevel@tonic-gate keyword = strchr(lineloc, ' ') + 1;
69007c478bd9Sstevel@tonic-gate value = strchr(keyword, '=') + 1;
69017c478bd9Sstevel@tonic-gate *(value - 1) = '\0';
6902e765faefSRich Burridge }
69037c478bd9Sstevel@tonic-gate i = 0;
69047c478bd9Sstevel@tonic-gate lineloc += length;
69057c478bd9Sstevel@tonic-gate while (keylist_pair[i].keynum != (int)_X_LAST) {
69067c478bd9Sstevel@tonic-gate if (strcmp(keyword, keylist_pair[i].keylist) == 0)
69077c478bd9Sstevel@tonic-gate break;
69087c478bd9Sstevel@tonic-gate i++;
69097c478bd9Sstevel@tonic-gate }
69107c478bd9Sstevel@tonic-gate errno = 0;
69117c478bd9Sstevel@tonic-gate switch (keylist_pair[i].keynum) {
69127c478bd9Sstevel@tonic-gate case _X_DEVMAJOR:
69137c478bd9Sstevel@tonic-gate Xtarhdr.x_devmajor = (major_t)strtoul(value, NULL, 0);
69147c478bd9Sstevel@tonic-gate if (errno) {
69157c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
69167c478bd9Sstevel@tonic-gate "tar: Extended header major value error "
69177c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count);
69187c478bd9Sstevel@tonic-gate errors++;
69197c478bd9Sstevel@tonic-gate } else
69207c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMAJOR;
69217c478bd9Sstevel@tonic-gate break;
69227c478bd9Sstevel@tonic-gate case _X_DEVMINOR:
69237c478bd9Sstevel@tonic-gate Xtarhdr.x_devminor = (minor_t)strtoul(value, NULL, 0);
69247c478bd9Sstevel@tonic-gate if (errno) {
69257c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
69267c478bd9Sstevel@tonic-gate "tar: Extended header minor value error "
69277c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count);
69287c478bd9Sstevel@tonic-gate errors++;
69297c478bd9Sstevel@tonic-gate } else
69307c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMINOR;
69317c478bd9Sstevel@tonic-gate break;
69327c478bd9Sstevel@tonic-gate case _X_GID:
69337c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_GID;
69347c478bd9Sstevel@tonic-gate Xtarhdr.x_gid = strtol(value, NULL, 0);
69357c478bd9Sstevel@tonic-gate if ((errno) || (Xtarhdr.x_gid > UID_MAX)) {
69367c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
69377c478bd9Sstevel@tonic-gate "tar: Extended header gid value error "
69387c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count);
69397c478bd9Sstevel@tonic-gate Xtarhdr.x_gid = GID_NOBODY;
69407c478bd9Sstevel@tonic-gate }
69417c478bd9Sstevel@tonic-gate break;
69427c478bd9Sstevel@tonic-gate case _X_GNAME:
69437c478bd9Sstevel@tonic-gate if (utf8_local("gname", &Xtarhdr.x_gname,
69447c478bd9Sstevel@tonic-gate local_gname, value, _POSIX_NAME_MAX) == 0)
69457c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_GNAME;
69467c478bd9Sstevel@tonic-gate break;
69477c478bd9Sstevel@tonic-gate case _X_LINKPATH:
69487c478bd9Sstevel@tonic-gate if (utf8_local("linkpath", &Xtarhdr.x_linkpath,
69497c478bd9Sstevel@tonic-gate local_linkpath, value, PATH_MAX) == 0)
69507c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_LINKPATH;
69517c478bd9Sstevel@tonic-gate else
69527c478bd9Sstevel@tonic-gate errors++;
69537c478bd9Sstevel@tonic-gate break;
69547c478bd9Sstevel@tonic-gate case _X_PATH:
69557c478bd9Sstevel@tonic-gate if (utf8_local("path", &Xtarhdr.x_path,
69567c478bd9Sstevel@tonic-gate local_path, value, PATH_MAX) == 0)
69577c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_PATH;
69587c478bd9Sstevel@tonic-gate else
69597c478bd9Sstevel@tonic-gate errors++;
69607c478bd9Sstevel@tonic-gate break;
69617c478bd9Sstevel@tonic-gate case _X_SIZE:
69627c478bd9Sstevel@tonic-gate Xtarhdr.x_filesz = strtoull(value, NULL, 0);
69637c478bd9Sstevel@tonic-gate if (errno) {
69647c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
69657c478bd9Sstevel@tonic-gate "tar: Extended header invalid filesize "
69667c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count);
69677c478bd9Sstevel@tonic-gate errors++;
69687c478bd9Sstevel@tonic-gate } else
69697c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_SIZE;
69707c478bd9Sstevel@tonic-gate break;
69717c478bd9Sstevel@tonic-gate case _X_UID:
69727c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_UID;
69737c478bd9Sstevel@tonic-gate Xtarhdr.x_uid = strtol(value, NULL, 0);
69747c478bd9Sstevel@tonic-gate if ((errno) || (Xtarhdr.x_uid > UID_MAX)) {
69757c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
69767c478bd9Sstevel@tonic-gate "tar: Extended header uid value error "
69777c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count);
69787c478bd9Sstevel@tonic-gate Xtarhdr.x_uid = UID_NOBODY;
69797c478bd9Sstevel@tonic-gate }
69807c478bd9Sstevel@tonic-gate break;
69817c478bd9Sstevel@tonic-gate case _X_UNAME:
69827c478bd9Sstevel@tonic-gate if (utf8_local("uname", &Xtarhdr.x_uname,
69837c478bd9Sstevel@tonic-gate local_uname, value, _POSIX_NAME_MAX) == 0)
69847c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_UNAME;
69857c478bd9Sstevel@tonic-gate break;
69867c478bd9Sstevel@tonic-gate case _X_MTIME:
69877c478bd9Sstevel@tonic-gate get_xtime(value, &(Xtarhdr.x_mtime));
69887c478bd9Sstevel@tonic-gate if (errno)
69897c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
69907c478bd9Sstevel@tonic-gate "tar: Extended header modification time "
69917c478bd9Sstevel@tonic-gate "value error for file # %llu.\n"),
69927c478bd9Sstevel@tonic-gate xhdr_count);
69937c478bd9Sstevel@tonic-gate else
69947c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_MTIME;
69957c478bd9Sstevel@tonic-gate break;
69967c478bd9Sstevel@tonic-gate default:
69977c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
69987c478bd9Sstevel@tonic-gate gettext("tar: unrecognized extended"
69997c478bd9Sstevel@tonic-gate " header keyword '%s'. Ignored.\n"), keyword);
70007c478bd9Sstevel@tonic-gate break;
70017c478bd9Sstevel@tonic-gate }
70027c478bd9Sstevel@tonic-gate }
70037c478bd9Sstevel@tonic-gate
70047c478bd9Sstevel@tonic-gate getdir(); /* get regular header */
70057c478bd9Sstevel@tonic-gate if (errors && errflag)
70067c478bd9Sstevel@tonic-gate done(1);
70077c478bd9Sstevel@tonic-gate else
70087c478bd9Sstevel@tonic-gate if (errors)
70097c478bd9Sstevel@tonic-gate Errflg = 1;
70107c478bd9Sstevel@tonic-gate return (errors);
70117c478bd9Sstevel@tonic-gate }
70127c478bd9Sstevel@tonic-gate
70137c478bd9Sstevel@tonic-gate /*
7014123523f8Sas158974 * load_info_from_xtarhdr - sets Gen and stbuf variables from
7015123523f8Sas158974 * extended header
7016123523f8Sas158974 * load_info_from_xtarhdr(flag, xhdrp);
7017123523f8Sas158974 * u_longlong_t flag; xhdr_flgs
7018123523f8Sas158974 * struct xtar_hdr *xhdrp; pointer to extended header
7019123523f8Sas158974 * NOTE: called when typeflag is not 'A' and xhdr_flgs
7020123523f8Sas158974 * is set.
7021123523f8Sas158974 */
7022123523f8Sas158974 static void
load_info_from_xtarhdr(u_longlong_t flag,struct xtar_hdr * xhdrp)7023123523f8Sas158974 load_info_from_xtarhdr(u_longlong_t flag, struct xtar_hdr *xhdrp)
7024123523f8Sas158974 {
7025123523f8Sas158974 if (flag & _X_DEVMAJOR) {
7026123523f8Sas158974 Gen.g_devmajor = xhdrp->x_devmajor;
7027123523f8Sas158974 }
7028123523f8Sas158974 if (flag & _X_DEVMINOR) {
7029123523f8Sas158974 Gen.g_devminor = xhdrp->x_devminor;
7030123523f8Sas158974 }
7031123523f8Sas158974 if (flag & _X_GID) {
7032123523f8Sas158974 Gen.g_gid = xhdrp->x_gid;
7033123523f8Sas158974 stbuf.st_gid = xhdrp->x_gid;
7034123523f8Sas158974 }
7035123523f8Sas158974 if (flag & _X_UID) {
7036123523f8Sas158974 Gen.g_uid = xhdrp->x_uid;
7037123523f8Sas158974 stbuf.st_uid = xhdrp->x_uid;
7038123523f8Sas158974 }
7039123523f8Sas158974 if (flag & _X_SIZE) {
7040123523f8Sas158974 Gen.g_filesz = xhdrp->x_filesz;
7041123523f8Sas158974 stbuf.st_size = xhdrp->x_filesz;
7042123523f8Sas158974 }
7043123523f8Sas158974 if (flag & _X_MTIME) {
7044123523f8Sas158974 Gen.g_mtime = xhdrp->x_mtime.tv_sec;
7045123523f8Sas158974 stbuf.st_mtim.tv_sec = xhdrp->x_mtime.tv_sec;
7046123523f8Sas158974 stbuf.st_mtim.tv_nsec = xhdrp->x_mtime.tv_nsec;
7047123523f8Sas158974 }
7048123523f8Sas158974 }
7049123523f8Sas158974
7050123523f8Sas158974 /*
70517c478bd9Sstevel@tonic-gate * gen_num creates a string from a keyword and an usigned long long in the
70527c478bd9Sstevel@tonic-gate * format: %d %s=%s\n
70537c478bd9Sstevel@tonic-gate * This is part of the extended header data record.
70547c478bd9Sstevel@tonic-gate */
70557c478bd9Sstevel@tonic-gate
70567c478bd9Sstevel@tonic-gate void
gen_num(const char * keyword,const u_longlong_t number)70577c478bd9Sstevel@tonic-gate gen_num(const char *keyword, const u_longlong_t number)
70587c478bd9Sstevel@tonic-gate {
70597c478bd9Sstevel@tonic-gate char save_val[ULONGLONG_MAX_DIGITS + 1];
70607c478bd9Sstevel@tonic-gate int len;
70617c478bd9Sstevel@tonic-gate char *curr_ptr;
70627c478bd9Sstevel@tonic-gate
70637c478bd9Sstevel@tonic-gate (void) sprintf(save_val, "%llu", number);
70647c478bd9Sstevel@tonic-gate /*
70657c478bd9Sstevel@tonic-gate * len = length of entire line, including itself. len will be
70667c478bd9Sstevel@tonic-gate * two digits. So, add the string lengths plus the length of len,
70677c478bd9Sstevel@tonic-gate * plus a blank, an equal sign, and a newline.
70687c478bd9Sstevel@tonic-gate */
70697c478bd9Sstevel@tonic-gate len = strlen(save_val) + strlen(keyword) + 5;
70707c478bd9Sstevel@tonic-gate if (xrec_offset + len > xrec_size) {
70717c478bd9Sstevel@tonic-gate if (((curr_ptr = realloc(xrec_ptr, 2 * xrec_size)) == NULL))
70727c478bd9Sstevel@tonic-gate fatal(gettext(
70737c478bd9Sstevel@tonic-gate "cannot allocate extended header buffer"));
70747c478bd9Sstevel@tonic-gate xrec_ptr = curr_ptr;
70757c478bd9Sstevel@tonic-gate xrec_size *= 2;
70767c478bd9Sstevel@tonic-gate }
70777c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset],
70787c478bd9Sstevel@tonic-gate "%d %s=%s\n", len, keyword, save_val);
70797c478bd9Sstevel@tonic-gate xrec_offset += len;
70807c478bd9Sstevel@tonic-gate }
70817c478bd9Sstevel@tonic-gate
70827c478bd9Sstevel@tonic-gate /*
70837c478bd9Sstevel@tonic-gate * gen_date creates a string from a keyword and a timestruc_t in the
70847c478bd9Sstevel@tonic-gate * format: %d %s=%s\n
70857c478bd9Sstevel@tonic-gate * This is part of the extended header data record.
70867c478bd9Sstevel@tonic-gate * Currently, granularity is only microseconds, so the low-order three digits
70877c478bd9Sstevel@tonic-gate * will be truncated.
70887c478bd9Sstevel@tonic-gate */
70897c478bd9Sstevel@tonic-gate
70907c478bd9Sstevel@tonic-gate void
gen_date(const char * keyword,const timestruc_t time_value)70917c478bd9Sstevel@tonic-gate gen_date(const char *keyword, const timestruc_t time_value)
70927c478bd9Sstevel@tonic-gate {
70937c478bd9Sstevel@tonic-gate /* Allow for <seconds>.<nanoseconds>\n */
70947c478bd9Sstevel@tonic-gate char save_val[TIME_MAX_DIGITS + LONG_MAX_DIGITS + 2];
70957c478bd9Sstevel@tonic-gate int len;
70967c478bd9Sstevel@tonic-gate char *curr_ptr;
70977c478bd9Sstevel@tonic-gate
70987c478bd9Sstevel@tonic-gate (void) sprintf(save_val, "%ld", time_value.tv_sec);
70997c478bd9Sstevel@tonic-gate len = strlen(save_val);
71007c478bd9Sstevel@tonic-gate save_val[len] = '.';
71017c478bd9Sstevel@tonic-gate (void) sprintf(&save_val[len + 1], "%9.9ld", time_value.tv_nsec);
71027c478bd9Sstevel@tonic-gate
71037c478bd9Sstevel@tonic-gate /*
71047c478bd9Sstevel@tonic-gate * len = length of entire line, including itself. len will be
71057c478bd9Sstevel@tonic-gate * two digits. So, add the string lengths plus the length of len,
71067c478bd9Sstevel@tonic-gate * plus a blank, an equal sign, and a newline.
71077c478bd9Sstevel@tonic-gate */
71087c478bd9Sstevel@tonic-gate len = strlen(save_val) + strlen(keyword) + 5;
71097c478bd9Sstevel@tonic-gate if (xrec_offset + len > xrec_size) {
71107c478bd9Sstevel@tonic-gate if (((curr_ptr = realloc(xrec_ptr, 2 * xrec_size)) == NULL))
71117c478bd9Sstevel@tonic-gate fatal(gettext(
71127c478bd9Sstevel@tonic-gate "cannot allocate extended header buffer"));
71137c478bd9Sstevel@tonic-gate xrec_ptr = curr_ptr;
71147c478bd9Sstevel@tonic-gate xrec_size *= 2;
71157c478bd9Sstevel@tonic-gate }
71167c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset],
71177c478bd9Sstevel@tonic-gate "%d %s=%s\n", len, keyword, save_val);
71187c478bd9Sstevel@tonic-gate xrec_offset += len;
71197c478bd9Sstevel@tonic-gate }
71207c478bd9Sstevel@tonic-gate
71217c478bd9Sstevel@tonic-gate /*
71227c478bd9Sstevel@tonic-gate * gen_string creates a string from a keyword and a char * in the
71237c478bd9Sstevel@tonic-gate * format: %d %s=%s\n
71247c478bd9Sstevel@tonic-gate * This is part of the extended header data record.
71257c478bd9Sstevel@tonic-gate */
71267c478bd9Sstevel@tonic-gate
71277c478bd9Sstevel@tonic-gate void
gen_string(const char * keyword,const char * value)71287c478bd9Sstevel@tonic-gate gen_string(const char *keyword, const char *value)
71297c478bd9Sstevel@tonic-gate {
71307c478bd9Sstevel@tonic-gate int len;
71317c478bd9Sstevel@tonic-gate char *curr_ptr;
71327c478bd9Sstevel@tonic-gate
71337c478bd9Sstevel@tonic-gate /*
71347c478bd9Sstevel@tonic-gate * len = length of entire line, including itself. The character length
71357c478bd9Sstevel@tonic-gate * of len must be 1-4 characters, because the maximum size of the path
71367c478bd9Sstevel@tonic-gate * or the name is PATH_MAX, which is 1024. So, assume 1 character
71377c478bd9Sstevel@tonic-gate * for len, one for the space, one for the "=", and one for the newline.
71387c478bd9Sstevel@tonic-gate * Then adjust as needed.
71397c478bd9Sstevel@tonic-gate */
71407c478bd9Sstevel@tonic-gate /* LINTED constant expression */
71417c478bd9Sstevel@tonic-gate assert(PATH_MAX <= 9996);
71427c478bd9Sstevel@tonic-gate len = strlen(value) + strlen(keyword) + 4;
71437c478bd9Sstevel@tonic-gate if (len > 997)
71447c478bd9Sstevel@tonic-gate len += 3;
71457c478bd9Sstevel@tonic-gate else if (len > 98)
71467c478bd9Sstevel@tonic-gate len += 2;
71477c478bd9Sstevel@tonic-gate else if (len > 9)
71487c478bd9Sstevel@tonic-gate len += 1;
71497c478bd9Sstevel@tonic-gate if (xrec_offset + len > xrec_size) {
71507c478bd9Sstevel@tonic-gate if (((curr_ptr = realloc(xrec_ptr, 2 * xrec_size)) == NULL))
71517c478bd9Sstevel@tonic-gate fatal(gettext(
71527c478bd9Sstevel@tonic-gate "cannot allocate extended header buffer"));
71537c478bd9Sstevel@tonic-gate xrec_ptr = curr_ptr;
71547c478bd9Sstevel@tonic-gate xrec_size *= 2;
71557c478bd9Sstevel@tonic-gate }
71567c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG
71577c478bd9Sstevel@tonic-gate if (strcmp(keyword+1, "name") != 0)
71587c478bd9Sstevel@tonic-gate #endif
71597c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset],
71607c478bd9Sstevel@tonic-gate "%d %s=%s\n", len, keyword, value);
71617c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG
71627c478bd9Sstevel@tonic-gate else {
71637c478bd9Sstevel@tonic-gate len += 11;
71647c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset],
71657c478bd9Sstevel@tonic-gate "%d %s=%snametoolong\n", len, keyword, value);
71667c478bd9Sstevel@tonic-gate }
71677c478bd9Sstevel@tonic-gate #endif
71687c478bd9Sstevel@tonic-gate xrec_offset += len;
71697c478bd9Sstevel@tonic-gate }
71707c478bd9Sstevel@tonic-gate
71717c478bd9Sstevel@tonic-gate /*
71727c478bd9Sstevel@tonic-gate * Convert time found in the extended header data to seconds and nanoseconds.
71737c478bd9Sstevel@tonic-gate */
71747c478bd9Sstevel@tonic-gate
71757c478bd9Sstevel@tonic-gate void
get_xtime(char * value,timestruc_t * xtime)71767c478bd9Sstevel@tonic-gate get_xtime(char *value, timestruc_t *xtime)
71777c478bd9Sstevel@tonic-gate {
71787c478bd9Sstevel@tonic-gate char nanosec[10];
71797c478bd9Sstevel@tonic-gate char *period;
71807c478bd9Sstevel@tonic-gate int i;
71817c478bd9Sstevel@tonic-gate
71827c478bd9Sstevel@tonic-gate (void) memset(nanosec, '0', 9);
71837c478bd9Sstevel@tonic-gate nanosec[9] = '\0';
71847c478bd9Sstevel@tonic-gate
71857c478bd9Sstevel@tonic-gate period = strchr(value, '.');
71867c478bd9Sstevel@tonic-gate if (period != NULL)
71877c478bd9Sstevel@tonic-gate period[0] = '\0';
71887c478bd9Sstevel@tonic-gate xtime->tv_sec = strtol(value, NULL, 10);
71897c478bd9Sstevel@tonic-gate if (period == NULL)
71907c478bd9Sstevel@tonic-gate xtime->tv_nsec = 0;
71917c478bd9Sstevel@tonic-gate else {
71927c478bd9Sstevel@tonic-gate i = strlen(period +1);
71937c478bd9Sstevel@tonic-gate (void) strncpy(nanosec, period + 1, min(i, 9));
71947c478bd9Sstevel@tonic-gate xtime->tv_nsec = strtol(nanosec, NULL, 10);
71957c478bd9Sstevel@tonic-gate }
71967c478bd9Sstevel@tonic-gate }
71977c478bd9Sstevel@tonic-gate
71987c478bd9Sstevel@tonic-gate /*
71997c478bd9Sstevel@tonic-gate * Check linkpath for length.
72007c478bd9Sstevel@tonic-gate * Emit an error message and return 1 if too long.
72017c478bd9Sstevel@tonic-gate */
72027c478bd9Sstevel@tonic-gate
72037c478bd9Sstevel@tonic-gate int
chk_path_build(char * name,char * longname,char * linkname,char * prefix,char type,int filetype)72047c478bd9Sstevel@tonic-gate chk_path_build(
72057c478bd9Sstevel@tonic-gate char *name,
72067c478bd9Sstevel@tonic-gate char *longname,
72077c478bd9Sstevel@tonic-gate char *linkname,
72087c478bd9Sstevel@tonic-gate char *prefix,
72097c478bd9Sstevel@tonic-gate char type,
72107c478bd9Sstevel@tonic-gate int filetype)
72117c478bd9Sstevel@tonic-gate {
72127c478bd9Sstevel@tonic-gate
72137c478bd9Sstevel@tonic-gate if (strlen(linkname) > (size_t)NAMSIZ) {
72147c478bd9Sstevel@tonic-gate if (Eflag > 0) {
72157c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_LINKPATH;
72167c478bd9Sstevel@tonic-gate Xtarhdr.x_linkpath = linkname;
72177c478bd9Sstevel@tonic-gate } else {
72187c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
72197c478bd9Sstevel@tonic-gate "tar: %s: linked to %s\n"), longname, linkname);
72207c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
72217c478bd9Sstevel@tonic-gate "tar: %s: linked name too long\n"), linkname);
72227c478bd9Sstevel@tonic-gate if (errflag)
72237c478bd9Sstevel@tonic-gate done(1);
72247c478bd9Sstevel@tonic-gate else
72257c478bd9Sstevel@tonic-gate Errflg = 1;
72267c478bd9Sstevel@tonic-gate return (1);
72277c478bd9Sstevel@tonic-gate }
72287c478bd9Sstevel@tonic-gate }
72297c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH)
72307c478bd9Sstevel@tonic-gate return (build_dblock(name, tchar, type,
72317c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_dev,
72327c478bd9Sstevel@tonic-gate prefix));
72337c478bd9Sstevel@tonic-gate else
72347c478bd9Sstevel@tonic-gate return (build_dblock(name, linkname, type,
72357c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_dev, prefix));
72367c478bd9Sstevel@tonic-gate }
72377c478bd9Sstevel@tonic-gate
72387c478bd9Sstevel@tonic-gate /*
72397c478bd9Sstevel@tonic-gate * Convert from UTF-8 to local character set.
72407c478bd9Sstevel@tonic-gate */
72417c478bd9Sstevel@tonic-gate
72427c478bd9Sstevel@tonic-gate static int
utf8_local(char * option,char ** Xhdr_ptrptr,char * target,const char * source,int max_val)72437c478bd9Sstevel@tonic-gate utf8_local(
72447c478bd9Sstevel@tonic-gate char *option,
72457c478bd9Sstevel@tonic-gate char **Xhdr_ptrptr,
72467c478bd9Sstevel@tonic-gate char *target,
72477c478bd9Sstevel@tonic-gate const char *source,
72487c478bd9Sstevel@tonic-gate int max_val)
72497c478bd9Sstevel@tonic-gate {
72507c478bd9Sstevel@tonic-gate static iconv_t iconv_cd;
72517c478bd9Sstevel@tonic-gate char *nl_target;
72527c478bd9Sstevel@tonic-gate const char *iconv_src;
72537c478bd9Sstevel@tonic-gate char *iconv_trg;
7254eace40a5Sceastha size_t inlen;
7255eace40a5Sceastha size_t outlen;
72567c478bd9Sstevel@tonic-gate
72577c478bd9Sstevel@tonic-gate if (charset_type == -1) { /* iconv_open failed in earlier try */
72587c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
72597c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion failed.\n"),
72607c478bd9Sstevel@tonic-gate xhdr_count, source);
72617c478bd9Sstevel@tonic-gate return (1);
72627c478bd9Sstevel@tonic-gate } else if (charset_type == 0) { /* iconv_open has not yet been done */
72637c478bd9Sstevel@tonic-gate nl_target = nl_langinfo(CODESET);
72647c478bd9Sstevel@tonic-gate if (strlen(nl_target) == 0) /* locale using 7-bit codeset */
72657c478bd9Sstevel@tonic-gate nl_target = "646";
72667c478bd9Sstevel@tonic-gate if (strcmp(nl_target, "646") == 0)
72677c478bd9Sstevel@tonic-gate charset_type = 1;
72687c478bd9Sstevel@tonic-gate else if (strcmp(nl_target, "UTF-8") == 0)
72697c478bd9Sstevel@tonic-gate charset_type = 3;
72707c478bd9Sstevel@tonic-gate else {
72717c478bd9Sstevel@tonic-gate if (strncmp(nl_target, "ISO", 3) == 0)
72727c478bd9Sstevel@tonic-gate nl_target += 3;
72737c478bd9Sstevel@tonic-gate charset_type = 2;
72747c478bd9Sstevel@tonic-gate errno = 0;
72757c478bd9Sstevel@tonic-gate if ((iconv_cd = iconv_open(nl_target, "UTF-8")) ==
72767c478bd9Sstevel@tonic-gate (iconv_t)-1) {
72777c478bd9Sstevel@tonic-gate if (errno == EINVAL)
72787c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
72797c478bd9Sstevel@tonic-gate "tar: conversion routines not "
72807c478bd9Sstevel@tonic-gate "available for current locale. "));
72817c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
72827c478bd9Sstevel@tonic-gate "file # %llu: (%s) UTF-8 conversion"
72837c478bd9Sstevel@tonic-gate " failed.\n"), xhdr_count, source);
72847c478bd9Sstevel@tonic-gate charset_type = -1;
72857c478bd9Sstevel@tonic-gate return (1);
72867c478bd9Sstevel@tonic-gate }
72877c478bd9Sstevel@tonic-gate }
72887c478bd9Sstevel@tonic-gate }
72897c478bd9Sstevel@tonic-gate
72907c478bd9Sstevel@tonic-gate /* locale using 7-bit codeset or UTF-8 locale */
72917c478bd9Sstevel@tonic-gate if (charset_type == 1 || charset_type == 3) {
72927c478bd9Sstevel@tonic-gate if (strlen(source) > max_val) {
72937c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
72947c478bd9Sstevel@tonic-gate "tar: file # %llu: Extended header %s too long.\n"),
72957c478bd9Sstevel@tonic-gate xhdr_count, option);
72967c478bd9Sstevel@tonic-gate return (1);
72977c478bd9Sstevel@tonic-gate }
72987c478bd9Sstevel@tonic-gate if (charset_type == 3)
72997c478bd9Sstevel@tonic-gate (void) strcpy(target, source);
73007c478bd9Sstevel@tonic-gate else if (c_utf8(target, source) != 0) {
73017c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
73027c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion"
73037c478bd9Sstevel@tonic-gate " failed.\n"), xhdr_count, source);
73047c478bd9Sstevel@tonic-gate return (1);
73057c478bd9Sstevel@tonic-gate }
73067c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target;
73077c478bd9Sstevel@tonic-gate return (0);
73087c478bd9Sstevel@tonic-gate }
73097c478bd9Sstevel@tonic-gate
73107c478bd9Sstevel@tonic-gate iconv_src = source;
73117c478bd9Sstevel@tonic-gate iconv_trg = target;
73127c478bd9Sstevel@tonic-gate inlen = strlen(source);
73137c478bd9Sstevel@tonic-gate outlen = max_val * UTF_8_FACTOR;
73147c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) ==
73157c478bd9Sstevel@tonic-gate (size_t)-1) { /* Error occurred: didn't convert */
73167c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
73177c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion failed.\n"),
73187c478bd9Sstevel@tonic-gate xhdr_count, source);
73197c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */
73207c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL;
73217c478bd9Sstevel@tonic-gate inlen = 0;
73227c478bd9Sstevel@tonic-gate (void) iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen);
73237c478bd9Sstevel@tonic-gate return (1);
73247c478bd9Sstevel@tonic-gate }
73257c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */
73267c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL;
73277c478bd9Sstevel@tonic-gate inlen = 0;
73287c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) ==
73297c478bd9Sstevel@tonic-gate (size_t)-1) { /* Error occurred: didn't convert */
73307c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
73317c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion failed.\n"),
73327c478bd9Sstevel@tonic-gate xhdr_count, source);
73337c478bd9Sstevel@tonic-gate return (1);
73347c478bd9Sstevel@tonic-gate }
73357c478bd9Sstevel@tonic-gate
73367c478bd9Sstevel@tonic-gate *iconv_trg = '\0'; /* Null-terminate iconv output string */
73377c478bd9Sstevel@tonic-gate if (strlen(target) > max_val) {
73387c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
73397c478bd9Sstevel@tonic-gate "tar: file # %llu: Extended header %s too long.\n"),
73407c478bd9Sstevel@tonic-gate xhdr_count, option);
73417c478bd9Sstevel@tonic-gate return (1);
73427c478bd9Sstevel@tonic-gate }
73437c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target;
73447c478bd9Sstevel@tonic-gate return (0);
73457c478bd9Sstevel@tonic-gate }
73467c478bd9Sstevel@tonic-gate
73477c478bd9Sstevel@tonic-gate /*
73487c478bd9Sstevel@tonic-gate * Check gname, uname, path, and linkpath to see if they need to go in an
73497c478bd9Sstevel@tonic-gate * extended header. If they are already slated to be in an extended header,
73507c478bd9Sstevel@tonic-gate * or if they are not ascii, then they need to be in the extended header.
73517c478bd9Sstevel@tonic-gate * Then, convert all extended names to UTF-8.
73527c478bd9Sstevel@tonic-gate */
73537c478bd9Sstevel@tonic-gate
73547c478bd9Sstevel@tonic-gate int
gen_utf8_names(const char * filename)73557c478bd9Sstevel@tonic-gate gen_utf8_names(const char *filename)
73567c478bd9Sstevel@tonic-gate {
73577c478bd9Sstevel@tonic-gate static iconv_t iconv_cd;
73587c478bd9Sstevel@tonic-gate char *nl_target;
73597c478bd9Sstevel@tonic-gate char tempbuf[MAXNAM + 1];
7360eace40a5Sceastha int nbytes;
7361eace40a5Sceastha int errors;
73627c478bd9Sstevel@tonic-gate
73637c478bd9Sstevel@tonic-gate if (charset_type == -1) { /* Previous failure to open. */
73647c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
73657c478bd9Sstevel@tonic-gate "tar: file # %llu: UTF-8 conversion failed.\n"),
73667c478bd9Sstevel@tonic-gate xhdr_count);
73677c478bd9Sstevel@tonic-gate return (1);
73687c478bd9Sstevel@tonic-gate }
73697c478bd9Sstevel@tonic-gate
73707c478bd9Sstevel@tonic-gate if (charset_type == 0) { /* Need to get conversion descriptor */
73717c478bd9Sstevel@tonic-gate nl_target = nl_langinfo(CODESET);
73727c478bd9Sstevel@tonic-gate if (strlen(nl_target) == 0) /* locale using 7-bit codeset */
73737c478bd9Sstevel@tonic-gate nl_target = "646";
73747c478bd9Sstevel@tonic-gate if (strcmp(nl_target, "646") == 0)
73757c478bd9Sstevel@tonic-gate charset_type = 1;
73767c478bd9Sstevel@tonic-gate else if (strcmp(nl_target, "UTF-8") == 0)
73777c478bd9Sstevel@tonic-gate charset_type = 3;
73787c478bd9Sstevel@tonic-gate else {
73797c478bd9Sstevel@tonic-gate if (strncmp(nl_target, "ISO", 3) == 0)
73807c478bd9Sstevel@tonic-gate nl_target += 3;
73817c478bd9Sstevel@tonic-gate charset_type = 2;
73827c478bd9Sstevel@tonic-gate errno = 0;
73837c478bd9Sstevel@tonic-gate #ifdef ICONV_DEBUG
73847c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
73858e4a71aeSRich Burridge gettext("Opening iconv_cd with target %s\n"),
73867c478bd9Sstevel@tonic-gate nl_target);
73877c478bd9Sstevel@tonic-gate #endif
73887c478bd9Sstevel@tonic-gate if ((iconv_cd = iconv_open("UTF-8", nl_target)) ==
73897c478bd9Sstevel@tonic-gate (iconv_t)-1) {
73907c478bd9Sstevel@tonic-gate if (errno == EINVAL)
73917c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
73927c478bd9Sstevel@tonic-gate "tar: conversion routines not "
73937c478bd9Sstevel@tonic-gate "available for current locale. "));
73947c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
73957c478bd9Sstevel@tonic-gate "file (%s): UTF-8 conversion failed.\n"),
73967c478bd9Sstevel@tonic-gate filename);
73977c478bd9Sstevel@tonic-gate charset_type = -1;
73987c478bd9Sstevel@tonic-gate return (1);
73997c478bd9Sstevel@tonic-gate }
74007c478bd9Sstevel@tonic-gate }
74017c478bd9Sstevel@tonic-gate }
74027c478bd9Sstevel@tonic-gate
74037c478bd9Sstevel@tonic-gate errors = 0;
74047c478bd9Sstevel@tonic-gate
74057c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_gname, local_gname,
74067c478bd9Sstevel@tonic-gate dblock.dbuf.gname, iconv_cd, _X_GNAME, _POSIX_NAME_MAX);
74077c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_uname, local_uname,
74087c478bd9Sstevel@tonic-gate dblock.dbuf.uname, iconv_cd, _X_UNAME, _POSIX_NAME_MAX);
74097c478bd9Sstevel@tonic-gate if ((xhdr_flgs & _X_LINKPATH) == 0) { /* Need null-terminated str. */
74107c478bd9Sstevel@tonic-gate (void) strncpy(tempbuf, dblock.dbuf.linkname, NAMSIZ);
74117c478bd9Sstevel@tonic-gate tempbuf[NAMSIZ] = '\0';
74127c478bd9Sstevel@tonic-gate }
74137c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_linkpath, local_linkpath,
74147c478bd9Sstevel@tonic-gate tempbuf, iconv_cd, _X_LINKPATH, PATH_MAX);
74157c478bd9Sstevel@tonic-gate if ((xhdr_flgs & _X_PATH) == 0) { /* Concatenate prefix & name */
74167c478bd9Sstevel@tonic-gate (void) strncpy(tempbuf, dblock.dbuf.prefix, PRESIZ);
74170578ac30Ssr161167 tempbuf[PRESIZ] = '\0';
74187c478bd9Sstevel@tonic-gate nbytes = strlen(tempbuf);
74197c478bd9Sstevel@tonic-gate if (nbytes > 0) {
74207c478bd9Sstevel@tonic-gate tempbuf[nbytes++] = '/';
74217c478bd9Sstevel@tonic-gate tempbuf[nbytes] = '\0';
74227c478bd9Sstevel@tonic-gate }
74230578ac30Ssr161167 (void) strncat(tempbuf + nbytes, dblock.dbuf.name,
74240578ac30Ssr161167 (MAXNAM - nbytes));
74250578ac30Ssr161167 tempbuf[MAXNAM] = '\0';
74267c478bd9Sstevel@tonic-gate }
74277c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_path, local_path,
74287c478bd9Sstevel@tonic-gate tempbuf, iconv_cd, _X_PATH, PATH_MAX);
74297c478bd9Sstevel@tonic-gate
74307c478bd9Sstevel@tonic-gate if (errors > 0)
74317c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
74327c478bd9Sstevel@tonic-gate "tar: file (%s): UTF-8 conversion failed.\n"), filename);
74337c478bd9Sstevel@tonic-gate
74347c478bd9Sstevel@tonic-gate if (errors && errflag)
74357c478bd9Sstevel@tonic-gate done(1);
74367c478bd9Sstevel@tonic-gate else
74377c478bd9Sstevel@tonic-gate if (errors)
74387c478bd9Sstevel@tonic-gate Errflg = 1;
74397c478bd9Sstevel@tonic-gate return (errors);
74407c478bd9Sstevel@tonic-gate }
74417c478bd9Sstevel@tonic-gate
74427c478bd9Sstevel@tonic-gate static int
local_utf8(char ** Xhdr_ptrptr,char * target,const char * source,iconv_t iconv_cd,int xhdrflg,int max_val)74437c478bd9Sstevel@tonic-gate local_utf8(
74447c478bd9Sstevel@tonic-gate char **Xhdr_ptrptr,
74457c478bd9Sstevel@tonic-gate char *target,
74467c478bd9Sstevel@tonic-gate const char *source,
74477c478bd9Sstevel@tonic-gate iconv_t iconv_cd,
74487c478bd9Sstevel@tonic-gate int xhdrflg,
74497c478bd9Sstevel@tonic-gate int max_val)
74507c478bd9Sstevel@tonic-gate {
74517c478bd9Sstevel@tonic-gate const char *iconv_src;
74527c478bd9Sstevel@tonic-gate const char *starting_src;
74537c478bd9Sstevel@tonic-gate char *iconv_trg;
7454eace40a5Sceastha size_t inlen;
7455eace40a5Sceastha size_t outlen;
74567c478bd9Sstevel@tonic-gate #ifdef ICONV_DEBUG
74577c478bd9Sstevel@tonic-gate unsigned char c_to_hex;
74587c478bd9Sstevel@tonic-gate #endif
74597c478bd9Sstevel@tonic-gate
74607c478bd9Sstevel@tonic-gate /*
74617c478bd9Sstevel@tonic-gate * If the item is already slated for extended format, get the string
74627c478bd9Sstevel@tonic-gate * to convert from the extended header record. Otherwise, get it from
74637c478bd9Sstevel@tonic-gate * the regular (dblock) area.
74647c478bd9Sstevel@tonic-gate */
74657c478bd9Sstevel@tonic-gate if (xhdr_flgs & xhdrflg) {
74667c478bd9Sstevel@tonic-gate if (charset_type == 3) { /* Already UTF-8, just copy */
74677c478bd9Sstevel@tonic-gate (void) strcpy(target, *Xhdr_ptrptr);
74687c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target;
74697c478bd9Sstevel@tonic-gate return (0);
74707c478bd9Sstevel@tonic-gate } else
74717c478bd9Sstevel@tonic-gate iconv_src = (const char *) *Xhdr_ptrptr;
74727c478bd9Sstevel@tonic-gate } else {
74737c478bd9Sstevel@tonic-gate if (charset_type == 3) /* Already in UTF-8 format */
74747c478bd9Sstevel@tonic-gate return (0); /* Don't create xhdr record */
74757c478bd9Sstevel@tonic-gate iconv_src = source;
74767c478bd9Sstevel@tonic-gate }
74777c478bd9Sstevel@tonic-gate starting_src = iconv_src;
74787c478bd9Sstevel@tonic-gate iconv_trg = target;
74797c478bd9Sstevel@tonic-gate if ((inlen = strlen(iconv_src)) == 0)
74807c478bd9Sstevel@tonic-gate return (0);
74817c478bd9Sstevel@tonic-gate
74827c478bd9Sstevel@tonic-gate if (charset_type == 1) { /* locale using 7-bit codeset */
74837c478bd9Sstevel@tonic-gate if (c_utf8(target, starting_src) != 0) {
74847c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
74857c478bd9Sstevel@tonic-gate gettext("tar: invalid character in"
74867c478bd9Sstevel@tonic-gate " UTF-8 conversion of '%s'\n"), starting_src);
74877c478bd9Sstevel@tonic-gate return (1);
74887c478bd9Sstevel@tonic-gate }
74897c478bd9Sstevel@tonic-gate return (0);
74907c478bd9Sstevel@tonic-gate }
74917c478bd9Sstevel@tonic-gate
74927c478bd9Sstevel@tonic-gate outlen = max_val * UTF_8_FACTOR;
74937c478bd9Sstevel@tonic-gate errno = 0;
74947c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) ==
74957c478bd9Sstevel@tonic-gate (size_t)-1) {
74967c478bd9Sstevel@tonic-gate /* An error occurred, or not all characters were converted */
74977c478bd9Sstevel@tonic-gate if (errno == EILSEQ)
74987c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
74997c478bd9Sstevel@tonic-gate gettext("tar: invalid character in"
75007c478bd9Sstevel@tonic-gate " UTF-8 conversion of '%s'\n"), starting_src);
75017c478bd9Sstevel@tonic-gate else
75027c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
75037c478bd9Sstevel@tonic-gate "tar: conversion to UTF-8 aborted for '%s'.\n"),
75047c478bd9Sstevel@tonic-gate starting_src);
75057c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */
75067c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL;
75077c478bd9Sstevel@tonic-gate inlen = 0;
75087c478bd9Sstevel@tonic-gate (void) iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen);
75097c478bd9Sstevel@tonic-gate return (1);
75107c478bd9Sstevel@tonic-gate }
75117c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */
75127c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL;
75137c478bd9Sstevel@tonic-gate inlen = 0;
75147c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) ==
75157c478bd9Sstevel@tonic-gate (size_t)-1) { /* Error occurred: didn't convert */
75167c478bd9Sstevel@tonic-gate if (errno == EILSEQ)
75177c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
75187c478bd9Sstevel@tonic-gate gettext("tar: invalid character in"
75197c478bd9Sstevel@tonic-gate " UTF-8 conversion of '%s'\n"), starting_src);
75207c478bd9Sstevel@tonic-gate else
75217c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
75227c478bd9Sstevel@tonic-gate "tar: conversion to UTF-8 aborted for '%s'.\n"),
75237c478bd9Sstevel@tonic-gate starting_src);
75247c478bd9Sstevel@tonic-gate return (1);
75257c478bd9Sstevel@tonic-gate }
75267c478bd9Sstevel@tonic-gate
75277c478bd9Sstevel@tonic-gate *iconv_trg = '\0'; /* Null-terminate iconv output string */
75287c478bd9Sstevel@tonic-gate if (strcmp(starting_src, target) != 0) {
75297c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target;
75307c478bd9Sstevel@tonic-gate xhdr_flgs |= xhdrflg;
75317c478bd9Sstevel@tonic-gate #ifdef ICONV_DEBUG
75327c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "*** inlen: %d %d; outlen: %d %d\n",
75337c478bd9Sstevel@tonic-gate strlen(starting_src), inlen, max_val, outlen);
75347c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "Input string:\n ");
75357c478bd9Sstevel@tonic-gate for (inlen = 0; inlen < strlen(starting_src); inlen++) {
75367c478bd9Sstevel@tonic-gate c_to_hex = (unsigned char)starting_src[inlen];
75377c478bd9Sstevel@tonic-gate (void) fprintf(stderr, " %2.2x", c_to_hex);
75387c478bd9Sstevel@tonic-gate if (inlen % 20 == 19)
75397c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n ");
75407c478bd9Sstevel@tonic-gate }
75417c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\nOutput string:\n ");
75427c478bd9Sstevel@tonic-gate for (inlen = 0; inlen < strlen(target); inlen++) {
75437c478bd9Sstevel@tonic-gate c_to_hex = (unsigned char)target[inlen];
75447c478bd9Sstevel@tonic-gate (void) fprintf(stderr, " %2.2x", c_to_hex);
75457c478bd9Sstevel@tonic-gate if (inlen % 20 == 19)
75467c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n ");
75477c478bd9Sstevel@tonic-gate }
75487c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n");
75497c478bd9Sstevel@tonic-gate #endif
75507c478bd9Sstevel@tonic-gate }
75517c478bd9Sstevel@tonic-gate
75527c478bd9Sstevel@tonic-gate return (0);
75537c478bd9Sstevel@tonic-gate }
75547c478bd9Sstevel@tonic-gate
75557c478bd9Sstevel@tonic-gate /*
75567c478bd9Sstevel@tonic-gate * Function to test each byte of the source string to make sure it is
75577c478bd9Sstevel@tonic-gate * in within bounds (value between 0 and 127).
75587c478bd9Sstevel@tonic-gate * If valid, copy source to target.
75597c478bd9Sstevel@tonic-gate */
75607c478bd9Sstevel@tonic-gate
75617c478bd9Sstevel@tonic-gate int
c_utf8(char * target,const char * source)75627c478bd9Sstevel@tonic-gate c_utf8(char *target, const char *source)
75637c478bd9Sstevel@tonic-gate {
75647c478bd9Sstevel@tonic-gate size_t len;
75657c478bd9Sstevel@tonic-gate const char *thischar;
75667c478bd9Sstevel@tonic-gate
75677c478bd9Sstevel@tonic-gate len = strlen(source);
75687c478bd9Sstevel@tonic-gate thischar = source;
75697c478bd9Sstevel@tonic-gate while (len-- > 0) {
75707c478bd9Sstevel@tonic-gate if (!isascii((int)(*thischar++)))
75717c478bd9Sstevel@tonic-gate return (1);
75727c478bd9Sstevel@tonic-gate }
75737c478bd9Sstevel@tonic-gate
75747c478bd9Sstevel@tonic-gate (void) strcpy(target, source);
75757c478bd9Sstevel@tonic-gate return (0);
75767c478bd9Sstevel@tonic-gate }
75777c478bd9Sstevel@tonic-gate
75787c478bd9Sstevel@tonic-gate
75797c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
75807c478bd9Sstevel@tonic-gate #define ROUNDTOTBLOCK(a) ((a + (TBLOCK -1)) & ~(TBLOCK -1))
75817c478bd9Sstevel@tonic-gate
75827c478bd9Sstevel@tonic-gate static void
prepare_xattr(char ** attrbuf,char * filename,char * attrpath,char typeflag,struct linkbuf * linkinfo,int * rlen)75837c478bd9Sstevel@tonic-gate prepare_xattr(
75847c478bd9Sstevel@tonic-gate char **attrbuf,
75857c478bd9Sstevel@tonic-gate char *filename,
7586da6c28aaSamw char *attrpath,
75877c478bd9Sstevel@tonic-gate char typeflag,
75887c478bd9Sstevel@tonic-gate struct linkbuf *linkinfo,
75897c478bd9Sstevel@tonic-gate int *rlen)
75907c478bd9Sstevel@tonic-gate {
75917c478bd9Sstevel@tonic-gate char *bufhead; /* ptr to full buffer */
7592da6c28aaSamw char *aptr;
75937c478bd9Sstevel@tonic-gate struct xattr_hdr *hptr; /* ptr to header in bufhead */
75947c478bd9Sstevel@tonic-gate struct xattr_buf *tptr; /* ptr to pathing pieces */
75957c478bd9Sstevel@tonic-gate int totalen; /* total buffer length */
75967c478bd9Sstevel@tonic-gate int len; /* length returned to user */
75977c478bd9Sstevel@tonic-gate int stringlen; /* length of filename + attr */
75987c478bd9Sstevel@tonic-gate /*
75997c478bd9Sstevel@tonic-gate * length of filename + attr
76007c478bd9Sstevel@tonic-gate * in link section
76017c478bd9Sstevel@tonic-gate */
76027c478bd9Sstevel@tonic-gate int linkstringlen;
76037c478bd9Sstevel@tonic-gate int complen; /* length of pathing section */
76047c478bd9Sstevel@tonic-gate int linklen; /* length of link section */
7605da6c28aaSamw int attrnames_index; /* attrnames starting index */
76067c478bd9Sstevel@tonic-gate
76077c478bd9Sstevel@tonic-gate /*
76087c478bd9Sstevel@tonic-gate * Release previous buffer
76097c478bd9Sstevel@tonic-gate */
76107c478bd9Sstevel@tonic-gate
76117c478bd9Sstevel@tonic-gate if (*attrbuf != (char *)NULL) {
76127c478bd9Sstevel@tonic-gate free(*attrbuf);
76137c478bd9Sstevel@tonic-gate *attrbuf = NULL;
76147c478bd9Sstevel@tonic-gate }
76157c478bd9Sstevel@tonic-gate
76167c478bd9Sstevel@tonic-gate /*
76177c478bd9Sstevel@tonic-gate * First add in fixed size stuff
76187c478bd9Sstevel@tonic-gate */
76197c478bd9Sstevel@tonic-gate len = sizeof (struct xattr_hdr) + sizeof (struct xattr_buf);
76207c478bd9Sstevel@tonic-gate
76217c478bd9Sstevel@tonic-gate /*
76227c478bd9Sstevel@tonic-gate * Add space for two nulls
76237c478bd9Sstevel@tonic-gate */
7624da6c28aaSamw stringlen = strlen(attrpath) + strlen(filename) + 2;
76257c478bd9Sstevel@tonic-gate complen = stringlen + sizeof (struct xattr_buf);
76267c478bd9Sstevel@tonic-gate
76277c478bd9Sstevel@tonic-gate len += stringlen;
76287c478bd9Sstevel@tonic-gate
76297c478bd9Sstevel@tonic-gate /*
76307c478bd9Sstevel@tonic-gate * Now add on space for link info if any
76317c478bd9Sstevel@tonic-gate */
76327c478bd9Sstevel@tonic-gate
76337c478bd9Sstevel@tonic-gate if (linkinfo != NULL) {
76347c478bd9Sstevel@tonic-gate /*
76357c478bd9Sstevel@tonic-gate * Again add space for two nulls
76367c478bd9Sstevel@tonic-gate */
76377c478bd9Sstevel@tonic-gate linkstringlen = strlen(linkinfo->pathname) +
76387c478bd9Sstevel@tonic-gate strlen(linkinfo->attrname) + 2;
7639da6c28aaSamw linklen = linkstringlen + sizeof (struct xattr_buf);
7640da6c28aaSamw len += linklen;
7641da6c28aaSamw } else {
7642da6c28aaSamw linklen = 0;
76437c478bd9Sstevel@tonic-gate }
76447c478bd9Sstevel@tonic-gate
76457c478bd9Sstevel@tonic-gate /*
76467c478bd9Sstevel@tonic-gate * Now add padding to end to fill out TBLOCK
76477c478bd9Sstevel@tonic-gate *
76487c478bd9Sstevel@tonic-gate * Function returns size of real data and not size + padding.
76497c478bd9Sstevel@tonic-gate */
76507c478bd9Sstevel@tonic-gate
76517c478bd9Sstevel@tonic-gate totalen = ROUNDTOTBLOCK(len);
76527c478bd9Sstevel@tonic-gate
76537c478bd9Sstevel@tonic-gate if ((bufhead = calloc(1, totalen)) == NULL) {
76547c478bd9Sstevel@tonic-gate fatal(gettext("Out of memory."));
76557c478bd9Sstevel@tonic-gate }
76567c478bd9Sstevel@tonic-gate
76577c478bd9Sstevel@tonic-gate
76587c478bd9Sstevel@tonic-gate /*
76597c478bd9Sstevel@tonic-gate * Now we can fill in the necessary pieces
76607c478bd9Sstevel@tonic-gate */
76617c478bd9Sstevel@tonic-gate
76627c478bd9Sstevel@tonic-gate /*
76637c478bd9Sstevel@tonic-gate * first fill in the fixed header
76647c478bd9Sstevel@tonic-gate */
76657c478bd9Sstevel@tonic-gate hptr = (struct xattr_hdr *)bufhead;
76667c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_version, "%s", XATTR_ARCH_VERS);
76677c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_component_len, "%0*d",
76687c478bd9Sstevel@tonic-gate sizeof (hptr->h_component_len) - 1, complen);
76697c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_link_component_len, "%0*d",
76707c478bd9Sstevel@tonic-gate sizeof (hptr->h_link_component_len) - 1, linklen);
76717c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_size, "%0*d", sizeof (hptr->h_size) - 1, len);
76727c478bd9Sstevel@tonic-gate
76737c478bd9Sstevel@tonic-gate /*
76747c478bd9Sstevel@tonic-gate * Now fill in the filename + attrnames section
7675da6c28aaSamw * The filename and attrnames section can be composed of two or more
7676da6c28aaSamw * path segments separated by a null character. The first segment
7677da6c28aaSamw * is the path to the parent file that roots the entire sequence in
7678da6c28aaSamw * the normal name space. The remaining segments describes a path
7679da6c28aaSamw * rooted at the hidden extended attribute directory of the leaf file of
7680da6c28aaSamw * the previous segment, making it possible to name attributes on
7681da6c28aaSamw * attributes. Thus, if we are just archiving an extended attribute,
7682da6c28aaSamw * the second segment will contain the attribute name. If we are
7683da6c28aaSamw * archiving a system attribute of an extended attribute, then the
7684da6c28aaSamw * second segment will contain the attribute name, and a third segment
7685da6c28aaSamw * will contain the system attribute name. The attribute pathing
7686da6c28aaSamw * information is obtained from 'attrpath'.
76877c478bd9Sstevel@tonic-gate */
76887c478bd9Sstevel@tonic-gate
76897c478bd9Sstevel@tonic-gate tptr = (struct xattr_buf *)(bufhead + sizeof (struct xattr_hdr));
76907c478bd9Sstevel@tonic-gate (void) sprintf(tptr->h_namesz, "%0*d", sizeof (tptr->h_namesz) - 1,
76917c478bd9Sstevel@tonic-gate stringlen);
76927c478bd9Sstevel@tonic-gate (void) strcpy(tptr->h_names, filename);
7693da6c28aaSamw attrnames_index = strlen(filename) + 1;
7694da6c28aaSamw (void) strcpy(&tptr->h_names[attrnames_index], attrpath);
76957c478bd9Sstevel@tonic-gate tptr->h_typeflag = typeflag;
76967c478bd9Sstevel@tonic-gate
76977c478bd9Sstevel@tonic-gate /*
7698da6c28aaSamw * Split the attrnames section into two segments if 'attrpath'
7699da6c28aaSamw * contains pathing information for a system attribute of an
7700da6c28aaSamw * extended attribute. We split them by replacing the '/' with
7701da6c28aaSamw * a '\0'.
7702da6c28aaSamw */
7703da6c28aaSamw if ((aptr = strpbrk(&tptr->h_names[attrnames_index], "/")) != NULL) {
7704da6c28aaSamw *aptr = '\0';
7705da6c28aaSamw }
7706da6c28aaSamw
7707da6c28aaSamw /*
77087c478bd9Sstevel@tonic-gate * Now fill in the optional link section if we have one
77097c478bd9Sstevel@tonic-gate */
77107c478bd9Sstevel@tonic-gate
77117c478bd9Sstevel@tonic-gate if (linkinfo != (struct linkbuf *)NULL) {
77127c478bd9Sstevel@tonic-gate tptr = (struct xattr_buf *)(bufhead +
77137c478bd9Sstevel@tonic-gate sizeof (struct xattr_hdr) + complen);
77147c478bd9Sstevel@tonic-gate
77157c478bd9Sstevel@tonic-gate (void) sprintf(tptr->h_namesz, "%0*d",
77167c478bd9Sstevel@tonic-gate sizeof (tptr->h_namesz) - 1, linkstringlen);
77177c478bd9Sstevel@tonic-gate (void) strcpy(tptr->h_names, linkinfo->pathname);
77187c478bd9Sstevel@tonic-gate (void) strcpy(
77197c478bd9Sstevel@tonic-gate &tptr->h_names[strlen(linkinfo->pathname) + 1],
77207c478bd9Sstevel@tonic-gate linkinfo->attrname);
77217c478bd9Sstevel@tonic-gate tptr->h_typeflag = typeflag;
77227c478bd9Sstevel@tonic-gate }
77237c478bd9Sstevel@tonic-gate *attrbuf = (char *)bufhead;
77247c478bd9Sstevel@tonic-gate *rlen = len;
77257c478bd9Sstevel@tonic-gate }
77267c478bd9Sstevel@tonic-gate
77277c478bd9Sstevel@tonic-gate #else
77287c478bd9Sstevel@tonic-gate static void
prepare_xattr(char ** attrbuf,char * filename,char * attrname,char typeflag,struct linkbuf * linkinfo,int * rlen)77297c478bd9Sstevel@tonic-gate prepare_xattr(
77307c478bd9Sstevel@tonic-gate char **attrbuf,
77317c478bd9Sstevel@tonic-gate char *filename,
77327c478bd9Sstevel@tonic-gate char *attrname,
77337c478bd9Sstevel@tonic-gate char typeflag,
77347c478bd9Sstevel@tonic-gate struct linkbuf *linkinfo,
77357c478bd9Sstevel@tonic-gate int *rlen)
77367c478bd9Sstevel@tonic-gate {
77377c478bd9Sstevel@tonic-gate *attrbuf = NULL;
77387c478bd9Sstevel@tonic-gate *rlen = 0;
77397c478bd9Sstevel@tonic-gate }
77407c478bd9Sstevel@tonic-gate #endif
77417c478bd9Sstevel@tonic-gate
77427c478bd9Sstevel@tonic-gate int
getstat(int dirfd,char * longname,char * shortname,char * attrparent)7743da6c28aaSamw getstat(int dirfd, char *longname, char *shortname, char *attrparent)
77447c478bd9Sstevel@tonic-gate {
77457c478bd9Sstevel@tonic-gate
77467c478bd9Sstevel@tonic-gate int i, j;
77477c478bd9Sstevel@tonic-gate int printerr;
77487c478bd9Sstevel@tonic-gate int slnkerr;
77497c478bd9Sstevel@tonic-gate struct stat symlnbuf;
77507c478bd9Sstevel@tonic-gate
77517c478bd9Sstevel@tonic-gate if (!hflag)
77527c478bd9Sstevel@tonic-gate i = fstatat(dirfd, shortname, &stbuf, AT_SYMLINK_NOFOLLOW);
77537c478bd9Sstevel@tonic-gate else
77547c478bd9Sstevel@tonic-gate i = fstatat(dirfd, shortname, &stbuf, 0);
77557c478bd9Sstevel@tonic-gate
77567c478bd9Sstevel@tonic-gate if (i < 0) {
77577c478bd9Sstevel@tonic-gate /* Initialize flag to print error mesg. */
77587c478bd9Sstevel@tonic-gate printerr = 1;
77597c478bd9Sstevel@tonic-gate /*
77607c478bd9Sstevel@tonic-gate * If stat is done, then need to do lstat
77617c478bd9Sstevel@tonic-gate * to determine whether it's a sym link
77627c478bd9Sstevel@tonic-gate */
77637c478bd9Sstevel@tonic-gate if (hflag) {
77647c478bd9Sstevel@tonic-gate /* Save returned error */
77657c478bd9Sstevel@tonic-gate slnkerr = errno;
77667c478bd9Sstevel@tonic-gate
77677c478bd9Sstevel@tonic-gate j = fstatat(dirfd, shortname,
77687c478bd9Sstevel@tonic-gate &symlnbuf, AT_SYMLINK_NOFOLLOW);
77697c478bd9Sstevel@tonic-gate /*
77707c478bd9Sstevel@tonic-gate * Suppress error message when file is a symbolic link
77717c478bd9Sstevel@tonic-gate * and function modifier 'l' is off. Exception: when
77727c478bd9Sstevel@tonic-gate * a symlink points to a symlink points to a
77737c478bd9Sstevel@tonic-gate * symlink ... and we get past MAXSYMLINKS. That
77747c478bd9Sstevel@tonic-gate * error will cause a file not to be archived, and
77757c478bd9Sstevel@tonic-gate * needs to be printed.
77767c478bd9Sstevel@tonic-gate */
77777c478bd9Sstevel@tonic-gate if ((j == 0) && (!linkerrok) && (slnkerr != ELOOP) &&
77787c478bd9Sstevel@tonic-gate (S_ISLNK(symlnbuf.st_mode)))
77797c478bd9Sstevel@tonic-gate printerr = 0;
77807c478bd9Sstevel@tonic-gate
77817c478bd9Sstevel@tonic-gate /*
77827c478bd9Sstevel@tonic-gate * Restore errno in case the lstat
77837c478bd9Sstevel@tonic-gate * on symbolic link change
77847c478bd9Sstevel@tonic-gate */
77857c478bd9Sstevel@tonic-gate errno = slnkerr;
77867c478bd9Sstevel@tonic-gate }
77877c478bd9Sstevel@tonic-gate
77887c478bd9Sstevel@tonic-gate if (printerr) {
77897c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
7790da6c28aaSamw "tar: %s%s%s%s: %s\n"),
7791da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "),
7792da6c28aaSamw (attrparent == NULL) ? "" : attrparent,
7793da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "),
7794da6c28aaSamw longname, strerror(errno));
77957c478bd9Sstevel@tonic-gate Errflg = 1;
77967c478bd9Sstevel@tonic-gate }
77977c478bd9Sstevel@tonic-gate return (1);
77987c478bd9Sstevel@tonic-gate }
77997c478bd9Sstevel@tonic-gate return (0);
78007c478bd9Sstevel@tonic-gate }
78017c478bd9Sstevel@tonic-gate
7802da6c28aaSamw /*
7803da6c28aaSamw * Recursively archive the extended attributes and/or extended system attributes
7804da6c28aaSamw * of the base file, longname. Note: extended system attribute files will be
7805da6c28aaSamw * archived only if the extended system attributes are not transient (i.e. the
7806da6c28aaSamw * extended system attributes are other than the default values).
7807da6c28aaSamw *
7808da6c28aaSamw * If -@ was specified and the underlying file system supports it, archive the
7809da6c28aaSamw * extended attributes, and if there is a system attribute associated with the
7810da6c28aaSamw * extended attribute, then recursively call xattrs_put() to archive the
7811da6c28aaSamw * hidden attribute directory and the extended system attribute. If -/ was
7812da6c28aaSamw * specified and the underlying file system supports it, archive the extended
7813da6c28aaSamw * system attributes. Read-only extended system attributes are never archived.
7814da6c28aaSamw *
7815da6c28aaSamw * Currently, there cannot be attributes on attributes; only system
7816da6c28aaSamw * attributes on attributes. In addition, there cannot be attributes on
7817da6c28aaSamw * system attributes. A file and it's attribute directory hierarchy looks as
7818da6c28aaSamw * follows:
7819da6c28aaSamw * longname ----> . ("." is the hidden attribute directory)
7820da6c28aaSamw * |
7821da6c28aaSamw * ----------------------------
7822da6c28aaSamw * | |
7823da6c28aaSamw * <sys_attr_name> <attr_name> ----> .
7824da6c28aaSamw * |
7825da6c28aaSamw * <sys_attr_name>
7826da6c28aaSamw *
7827da6c28aaSamw */
78287c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
78297c478bd9Sstevel@tonic-gate static void
xattrs_put(char * longname,char * shortname,char * parent,char * attrparent)7830da6c28aaSamw xattrs_put(char *longname, char *shortname, char *parent, char *attrparent)
78317c478bd9Sstevel@tonic-gate {
7832da6c28aaSamw char *filename = (attrparent == NULL) ? shortname : attrparent;
7833da6c28aaSamw int arc_rwsysattr = 0;
78347c478bd9Sstevel@tonic-gate int dirfd;
7835da6c28aaSamw int fd = -1;
7836da6c28aaSamw int rw_sysattr = 0;
7837ced83f9bSceastha int ext_attr = 0;
7838da6c28aaSamw int rc;
78397c478bd9Sstevel@tonic-gate DIR *dirp;
78407c478bd9Sstevel@tonic-gate struct dirent *dp;
7841da6c28aaSamw attr_data_t *attrinfo = NULL;
78427c478bd9Sstevel@tonic-gate
7843da6c28aaSamw /*
7844da6c28aaSamw * If the underlying file system supports it, then archive the extended
7845da6c28aaSamw * attributes if -@ was specified, and the extended system attributes
7846da6c28aaSamw * if -/ was specified.
7847da6c28aaSamw */
7848ced83f9bSceastha if (verify_attr_support(filename, (attrparent == NULL), ARC_CREATE,
7849ced83f9bSceastha &ext_attr) != ATTR_OK) {
78507c478bd9Sstevel@tonic-gate return;
78517c478bd9Sstevel@tonic-gate }
78527c478bd9Sstevel@tonic-gate
7853da6c28aaSamw /*
7854da6c28aaSamw * Only want to archive a read-write extended system attribute file
7855da6c28aaSamw * if it contains extended system attribute settings that are not the
7856da6c28aaSamw * default values.
7857da6c28aaSamw */
7858da6c28aaSamw #if defined(_PC_SATTR_ENABLED)
7859da6c28aaSamw if (saflag) {
7860da6c28aaSamw int filefd;
7861da6c28aaSamw nvlist_t *slist = NULL;
7862da6c28aaSamw
7863da6c28aaSamw /* Determine if there are non-transient system attributes */
7864da6c28aaSamw errno = 0;
7865da6c28aaSamw if ((filefd = open(filename, O_RDONLY)) == -1) {
7866da6c28aaSamw if (attrparent == NULL) {
7867da6c28aaSamw vperror(0, gettext(
7868da6c28aaSamw "unable to open file %s"), longname);
7869da6c28aaSamw }
7870da6c28aaSamw return;
7871da6c28aaSamw }
7872da6c28aaSamw if (((slist = sysattr_list(basename(myname), filefd,
7873da6c28aaSamw filename)) != NULL) || (errno != 0)) {
7874da6c28aaSamw arc_rwsysattr = 1;
7875da6c28aaSamw }
7876da6c28aaSamw if (slist != NULL) {
7877da6c28aaSamw (void) nvlist_free(slist);
7878da6c28aaSamw slist = NULL;
7879da6c28aaSamw }
7880da6c28aaSamw (void) close(filefd);
7881da6c28aaSamw }
7882ced83f9bSceastha
7883ced83f9bSceastha /*
7884ced83f9bSceastha * If we aren't archiving extended system attributes, and we are
7885ced83f9bSceastha * processing an attribute, or if we are archiving extended system
7886ced83f9bSceastha * attributes, and there are are no extended attributes, then there's
7887ced83f9bSceastha * no need to open up the attribute directory of the file unless the
7888ced83f9bSceastha * extended system attributes are not transient (i.e, the system
7889ced83f9bSceastha * attributes are not the default values).
7890ced83f9bSceastha */
7891ced83f9bSceastha if ((arc_rwsysattr == 0) && ((attrparent != NULL) ||
7892ced83f9bSceastha (saflag && !ext_attr))) {
7893ced83f9bSceastha return;
7894ced83f9bSceastha }
7895da6c28aaSamw #endif /* _PC_SATTR_ENABLED */
7896da6c28aaSamw
7897da6c28aaSamw /* open the parent attribute directory */
7898da6c28aaSamw fd = attropen(filename, ".", O_RDONLY);
7899da6c28aaSamw if (fd < 0) {
7900da6c28aaSamw vperror(0, gettext(
7901da6c28aaSamw "unable to open attribute directory for %s%s%sfile %s"),
7902da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "),
7903da6c28aaSamw (attrparent == NULL) ? "" : attrparent,
7904da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "),
79057c478bd9Sstevel@tonic-gate longname);
79067c478bd9Sstevel@tonic-gate return;
79077c478bd9Sstevel@tonic-gate }
79087c478bd9Sstevel@tonic-gate
7909da6c28aaSamw /*
7910da6c28aaSamw * We need to change into the parent's attribute directory to determine
7911da6c28aaSamw * if each of the attributes should be archived.
7912da6c28aaSamw */
7913da6c28aaSamw if (fchdir(fd) < 0) {
7914da6c28aaSamw vperror(0, gettext(
7915da6c28aaSamw "cannot change to attribute directory of %s%s%sfile %s"),
7916da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "),
7917da6c28aaSamw (attrparent == NULL) ? "" : attrparent,
7918da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "),
7919da6c28aaSamw longname);
7920da6c28aaSamw (void) close(fd);
7921da6c28aaSamw return;
7922da6c28aaSamw }
7923da6c28aaSamw
7924da6c28aaSamw if (((dirfd = dup(fd)) == -1) ||
7925da6c28aaSamw ((dirp = fdopendir(dirfd)) == NULL)) {
79267c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
7927da6c28aaSamw "tar: unable to open dir pointer for %s%s%sfile %s\n"),
7928da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "),
7929da6c28aaSamw (attrparent == NULL) ? "" : attrparent,
7930da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "),
7931da6c28aaSamw longname);
7932da6c28aaSamw if (fd > 0) {
7933da6c28aaSamw (void) close(fd);
7934da6c28aaSamw }
79357c478bd9Sstevel@tonic-gate return;
79367c478bd9Sstevel@tonic-gate }
79377c478bd9Sstevel@tonic-gate
7938c536b1f9SRobert Mustacchi while ((dp = readdir(dirp)) != NULL) {
7939da6c28aaSamw if (strcmp(dp->d_name, "..") == 0) {
79407c478bd9Sstevel@tonic-gate continue;
7941da6c28aaSamw } else if (strcmp(dp->d_name, ".") == 0) {
79427c478bd9Sstevel@tonic-gate Hiddendir = 1;
7943da6c28aaSamw } else {
79447c478bd9Sstevel@tonic-gate Hiddendir = 0;
7945da6c28aaSamw }
79467c478bd9Sstevel@tonic-gate
7947da6c28aaSamw /* Determine if this attribute should be archived */
7948da6c28aaSamw if (verify_attr(dp->d_name, attrparent, arc_rwsysattr,
7949da6c28aaSamw &rw_sysattr) != ATTR_OK) {
7950da6c28aaSamw continue;
7951da6c28aaSamw }
7952da6c28aaSamw
7953da6c28aaSamw /* gather the attribute's information to pass to putfile() */
7954da6c28aaSamw if ((fill_in_attr_info(dp->d_name, longname, attrparent,
7955da6c28aaSamw fd, rw_sysattr, &attrinfo)) == 1) {
7956da6c28aaSamw continue;
7957da6c28aaSamw }
7958da6c28aaSamw
7959da6c28aaSamw /* add the attribute to the archive */
7960da6c28aaSamw rc = putfile(longname, dp->d_name, parent, attrinfo,
79617c478bd9Sstevel@tonic-gate XATTR_FILE, LEV0, SYMLINK_LEV0);
79627c478bd9Sstevel@tonic-gate
7963da6c28aaSamw if (exitflag) {
79647c478bd9Sstevel@tonic-gate break;
79657c478bd9Sstevel@tonic-gate }
79667c478bd9Sstevel@tonic-gate
7967da6c28aaSamw #if defined(_PC_SATTR_ENABLED)
7968da6c28aaSamw /*
7969da6c28aaSamw * If both -/ and -@ were specified, then archive the
7970da6c28aaSamw * attribute's extended system attributes and hidden directory
7971da6c28aaSamw * by making a recursive call to xattrs_put().
7972da6c28aaSamw */
7973da6c28aaSamw if (!rw_sysattr && saflag && atflag && (rc != PUT_AS_LINK) &&
7974da6c28aaSamw (Hiddendir == 0)) {
7975da6c28aaSamw
7976da6c28aaSamw xattrs_put(longname, shortname, parent, dp->d_name);
7977da6c28aaSamw
7978da6c28aaSamw /*
7979da6c28aaSamw * Change back to the parent's attribute directory
7980da6c28aaSamw * to process any further attributes.
7981da6c28aaSamw */
7982da6c28aaSamw if (fchdir(fd) < 0) {
7983da6c28aaSamw vperror(0, gettext(
7984da6c28aaSamw "cannot change back to attribute directory "
7985da6c28aaSamw "of file %s"), longname);
7986da6c28aaSamw break;
7987da6c28aaSamw }
7988da6c28aaSamw }
7989da6c28aaSamw #endif /* _PC_SATTR_ENABLED */
7990da6c28aaSamw }
7991da6c28aaSamw
7992da6c28aaSamw if (attrinfo != NULL) {
7993da6c28aaSamw if (attrinfo->attr_parent != NULL) {
7994da6c28aaSamw free(attrinfo->attr_parent);
7995da6c28aaSamw }
7996da6c28aaSamw free(attrinfo->attr_path);
7997da6c28aaSamw free(attrinfo);
7998da6c28aaSamw }
79997c478bd9Sstevel@tonic-gate (void) closedir(dirp);
8000da6c28aaSamw if (fd != -1) {
8001da6c28aaSamw (void) close(fd);
8002da6c28aaSamw }
8003da6c28aaSamw
8004da6c28aaSamw /* Change back to the parent directory of the base file */
8005da6c28aaSamw if (attrparent == NULL) {
8006b25dbf38SRich Burridge (void) tar_chdir(parent);
8007da6c28aaSamw }
8008ced83f9bSceastha Hiddendir = 0;
80097c478bd9Sstevel@tonic-gate }
80107c478bd9Sstevel@tonic-gate #else
80117c478bd9Sstevel@tonic-gate static void
xattrs_put(char * longname,char * shortname,char * parent,char * attrppath)8012da6c28aaSamw xattrs_put(char *longname, char *shortname, char *parent, char *attrppath)
80137c478bd9Sstevel@tonic-gate {
80147c478bd9Sstevel@tonic-gate }
80157c478bd9Sstevel@tonic-gate #endif /* O_XATTR */
80167c478bd9Sstevel@tonic-gate
80177c478bd9Sstevel@tonic-gate static int
put_link(char * name,char * longname,char * component,char * longattrname,char * prefix,int filetype,char type)8018da6c28aaSamw put_link(char *name, char *longname, char *component, char *longattrname,
80197c478bd9Sstevel@tonic-gate char *prefix, int filetype, char type)
80207c478bd9Sstevel@tonic-gate {
80217c478bd9Sstevel@tonic-gate
80227c478bd9Sstevel@tonic-gate if (stbuf.st_nlink > 1) {
80237c478bd9Sstevel@tonic-gate struct linkbuf *lp;
80247c478bd9Sstevel@tonic-gate int found = 0;
80257c478bd9Sstevel@tonic-gate
80267c478bd9Sstevel@tonic-gate for (lp = ihead; lp != NULL; lp = lp->nextp)
80277c478bd9Sstevel@tonic-gate if (lp->inum == stbuf.st_ino &&
80287c478bd9Sstevel@tonic-gate lp->devnum == stbuf.st_dev) {
80297c478bd9Sstevel@tonic-gate found++;
80307c478bd9Sstevel@tonic-gate break;
80317c478bd9Sstevel@tonic-gate }
80327c478bd9Sstevel@tonic-gate if (found) {
80337c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
80347c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE)
8035da6c28aaSamw if (put_xattr_hdr(longname, component,
8036da6c28aaSamw longattrname, prefix, type, filetype, lp)) {
80377c478bd9Sstevel@tonic-gate goto out;
80387c478bd9Sstevel@tonic-gate }
80397c478bd9Sstevel@tonic-gate #endif
80407c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0;
80417c478bd9Sstevel@tonic-gate if (filetype != XATTR_FILE) {
80427c478bd9Sstevel@tonic-gate tomodes(&stbuf);
80437c478bd9Sstevel@tonic-gate if (chk_path_build(name, longname, lp->pathname,
80447c478bd9Sstevel@tonic-gate prefix, type, filetype) > 0) {
80457c478bd9Sstevel@tonic-gate goto out;
80467c478bd9Sstevel@tonic-gate }
80477c478bd9Sstevel@tonic-gate }
80487c478bd9Sstevel@tonic-gate
80497c478bd9Sstevel@tonic-gate if (mulvol && tapepos + 1 >= blocklim)
80507c478bd9Sstevel@tonic-gate newvol();
80517c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1);
80527c478bd9Sstevel@tonic-gate /*
80537c478bd9Sstevel@tonic-gate * write_ancillary() is not needed here.
80547c478bd9Sstevel@tonic-gate * The first link is handled in the following
80557c478bd9Sstevel@tonic-gate * else statement. No need to process ACLs
80567c478bd9Sstevel@tonic-gate * for other hard links since they are the
80577c478bd9Sstevel@tonic-gate * same file.
80587c478bd9Sstevel@tonic-gate */
80597c478bd9Sstevel@tonic-gate
80607c478bd9Sstevel@tonic-gate if (vflag) {
80617c478bd9Sstevel@tonic-gate if (NotTape)
8062*28c4d110SJoshua M. Clulow dlog("seek = %" FMT_blkcnt_t
8063*28c4d110SJoshua M. Clulow "K\n", K(tapepos));
80647c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) {
80657c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
80667c478bd9Sstevel@tonic-gate "a %s attribute %s link to "
8067da6c28aaSamw "%s attribute %s\n"),
8068da6c28aaSamw name, component, name,
8069da6c28aaSamw lp->attrname);
80707c478bd9Sstevel@tonic-gate } else {
80717c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext(
80727c478bd9Sstevel@tonic-gate "a %s link to %s\n"),
80737c478bd9Sstevel@tonic-gate longname, lp->pathname);
80747c478bd9Sstevel@tonic-gate }
80757c478bd9Sstevel@tonic-gate }
80767c478bd9Sstevel@tonic-gate lp->count--;
80777c478bd9Sstevel@tonic-gate return (0);
80787c478bd9Sstevel@tonic-gate } else {
80797c478bd9Sstevel@tonic-gate lp = (struct linkbuf *)getmem(sizeof (*lp));
80807c478bd9Sstevel@tonic-gate if (lp != (struct linkbuf *)NULL) {
80817c478bd9Sstevel@tonic-gate lp->nextp = ihead;
80827c478bd9Sstevel@tonic-gate ihead = lp;
80837c478bd9Sstevel@tonic-gate lp->inum = stbuf.st_ino;
80847c478bd9Sstevel@tonic-gate lp->devnum = stbuf.st_dev;
80857c478bd9Sstevel@tonic-gate lp->count = stbuf.st_nlink - 1;
80867c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) {
80877c478bd9Sstevel@tonic-gate (void) strcpy(lp->pathname, longname);
8088da6c28aaSamw (void) strcpy(lp->attrname,
8089da6c28aaSamw component);
80907c478bd9Sstevel@tonic-gate } else {
80917c478bd9Sstevel@tonic-gate (void) strcpy(lp->pathname, longname);
80927c478bd9Sstevel@tonic-gate (void) strcpy(lp->attrname, "");
80937c478bd9Sstevel@tonic-gate }
80947c478bd9Sstevel@tonic-gate }
80957c478bd9Sstevel@tonic-gate }
80967c478bd9Sstevel@tonic-gate }
80977c478bd9Sstevel@tonic-gate
80987c478bd9Sstevel@tonic-gate out:
80997c478bd9Sstevel@tonic-gate return (1);
81007c478bd9Sstevel@tonic-gate }
81017c478bd9Sstevel@tonic-gate
81027c478bd9Sstevel@tonic-gate static int
put_extra_attributes(char * longname,char * shortname,char * longattrname,char * prefix,int filetype,char typeflag)8103da6c28aaSamw put_extra_attributes(char *longname, char *shortname, char *longattrname,
8104da6c28aaSamw char *prefix, int filetype, char typeflag)
81057c478bd9Sstevel@tonic-gate {
8106fa9e4066Sahrens static acl_t *aclp = NULL;
8107fa9e4066Sahrens int error;
81087c478bd9Sstevel@tonic-gate
8109fa9e4066Sahrens if (aclp != NULL) {
8110fa9e4066Sahrens acl_free(aclp);
81117c478bd9Sstevel@tonic-gate aclp = NULL;
81127c478bd9Sstevel@tonic-gate }
81137c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
8114da6c28aaSamw if ((atflag || saflag) && (filetype == XATTR_FILE)) {
8115da6c28aaSamw if (put_xattr_hdr(longname, shortname, longattrname, prefix,
81167c478bd9Sstevel@tonic-gate typeflag, filetype, NULL)) {
81177c478bd9Sstevel@tonic-gate return (1);
81187c478bd9Sstevel@tonic-gate }
81197c478bd9Sstevel@tonic-gate }
81207c478bd9Sstevel@tonic-gate #endif
81217c478bd9Sstevel@tonic-gate
81227c478bd9Sstevel@tonic-gate /* ACL support */
81237c478bd9Sstevel@tonic-gate if (pflag) {
81247c478bd9Sstevel@tonic-gate char *secinfo = NULL;
81257c478bd9Sstevel@tonic-gate int len = 0;
81267c478bd9Sstevel@tonic-gate
81277c478bd9Sstevel@tonic-gate /* ACL support */
81287c478bd9Sstevel@tonic-gate if (((stbuf.st_mode & S_IFMT) != S_IFLNK)) {
81297c478bd9Sstevel@tonic-gate /*
81307c478bd9Sstevel@tonic-gate * Get ACL info: dont bother allocating space if
8131fa9e4066Sahrens * there is only a trivial ACL.
81327c478bd9Sstevel@tonic-gate */
8133fa9e4066Sahrens if ((error = acl_get(shortname, ACL_NO_TRIVIAL,
8134fa9e4066Sahrens &aclp)) != 0) {
81357c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
8136fa9e4066Sahrens "%s: failed to retrieve acl : %s\n"),
8137fa9e4066Sahrens longname, acl_strerror(error));
81387c478bd9Sstevel@tonic-gate return (1);
81397c478bd9Sstevel@tonic-gate }
81407c478bd9Sstevel@tonic-gate }
81417c478bd9Sstevel@tonic-gate
81427c478bd9Sstevel@tonic-gate /* append security attributes if any */
8143fa9e4066Sahrens if (aclp != NULL) {
814445916cd2Sjpk (void) append_secattr(&secinfo, &len, acl_cnt(aclp),
8145b249c65cSmarks acl_totext(aclp, ACL_APPEND_ID | ACL_COMPACT_FMT |
8146b249c65cSmarks ACL_SID_FMT), (acl_type(aclp) == ACLENT_T) ?
8147b249c65cSmarks UFSD_ACL : ACE_ACL);
814845916cd2Sjpk }
814945916cd2Sjpk
815045916cd2Sjpk if (Tflag) {
815145916cd2Sjpk /* append Trusted Extensions extended attributes */
815245916cd2Sjpk append_ext_attr(shortname, &secinfo, &len);
815345916cd2Sjpk (void) write_ancillary(&dblock, secinfo, len, ACL_HDR);
815445916cd2Sjpk
815545916cd2Sjpk } else if (aclp != NULL) {
81567c478bd9Sstevel@tonic-gate (void) write_ancillary(&dblock, secinfo, len, ACL_HDR);
81577c478bd9Sstevel@tonic-gate }
81587c478bd9Sstevel@tonic-gate }
81597c478bd9Sstevel@tonic-gate return (0);
81607c478bd9Sstevel@tonic-gate }
81617c478bd9Sstevel@tonic-gate
81627c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
81637c478bd9Sstevel@tonic-gate static int
put_xattr_hdr(char * longname,char * shortname,char * longattrname,char * prefix,int typeflag,int filetype,struct linkbuf * lp)8164da6c28aaSamw put_xattr_hdr(char *longname, char *shortname, char *longattrname, char *prefix,
81657c478bd9Sstevel@tonic-gate int typeflag, int filetype, struct linkbuf *lp)
81667c478bd9Sstevel@tonic-gate {
81677c478bd9Sstevel@tonic-gate char *lname = NULL;
81687c478bd9Sstevel@tonic-gate char *sname = NULL;
81697c478bd9Sstevel@tonic-gate int error = 0;
81707c478bd9Sstevel@tonic-gate static char *attrbuf = NULL;
81717c478bd9Sstevel@tonic-gate int attrlen;
81727c478bd9Sstevel@tonic-gate
81737c478bd9Sstevel@tonic-gate lname = malloc(sizeof (char) * strlen("/dev/null") + 1 +
81747c478bd9Sstevel@tonic-gate strlen(shortname) + strlen(".hdr") + 1);
81757c478bd9Sstevel@tonic-gate
81767c478bd9Sstevel@tonic-gate if (lname == NULL) {
81777c478bd9Sstevel@tonic-gate fatal(gettext("Out of Memory."));
81787c478bd9Sstevel@tonic-gate }
81797c478bd9Sstevel@tonic-gate sname = malloc(sizeof (char) * strlen(shortname) +
8180da6c28aaSamw strlen(".hdr") + 1);
81817c478bd9Sstevel@tonic-gate if (sname == NULL) {
81827c478bd9Sstevel@tonic-gate fatal(gettext("Out of Memory."));
81837c478bd9Sstevel@tonic-gate }
81847c478bd9Sstevel@tonic-gate
81857c478bd9Sstevel@tonic-gate (void) sprintf(sname, "%s.hdr", shortname);
81867c478bd9Sstevel@tonic-gate (void) sprintf(lname, "/dev/null/%s", sname);
81877c478bd9Sstevel@tonic-gate
81887c478bd9Sstevel@tonic-gate if (strlcpy(dblock.dbuf.name, lname, sizeof (dblock.dbuf.name)) >=
81897c478bd9Sstevel@tonic-gate sizeof (dblock.dbuf.name)) {
81907c478bd9Sstevel@tonic-gate fatal(gettext(
81917c478bd9Sstevel@tonic-gate "Buffer overflow writing extended attribute file name"));
81927c478bd9Sstevel@tonic-gate }
81937c478bd9Sstevel@tonic-gate
81947c478bd9Sstevel@tonic-gate /*
81957c478bd9Sstevel@tonic-gate * dump extended attr lookup info
81967c478bd9Sstevel@tonic-gate */
8197da6c28aaSamw prepare_xattr(&attrbuf, longname, longattrname, typeflag, lp, &attrlen);
81987c478bd9Sstevel@tonic-gate write_ancillary(&dblock, attrbuf, attrlen, _XATTR_HDRTYPE);
81997c478bd9Sstevel@tonic-gate
82007c478bd9Sstevel@tonic-gate (void) sprintf(lname, "/dev/null/%s", shortname);
82017c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.name, sname, NAMSIZ);
82027c478bd9Sstevel@tonic-gate
82037c478bd9Sstevel@tonic-gate /*
82047c478bd9Sstevel@tonic-gate * Set up filename for attribute
82057c478bd9Sstevel@tonic-gate */
82067c478bd9Sstevel@tonic-gate
82077c478bd9Sstevel@tonic-gate error = build_dblock(lname, tchar, '0', filetype,
82087c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix);
82097c478bd9Sstevel@tonic-gate free(lname);
82107c478bd9Sstevel@tonic-gate free(sname);
82117c478bd9Sstevel@tonic-gate
82127c478bd9Sstevel@tonic-gate return (error);
82137c478bd9Sstevel@tonic-gate }
82147c478bd9Sstevel@tonic-gate #endif
82157c478bd9Sstevel@tonic-gate
82167c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
82177c478bd9Sstevel@tonic-gate static int
read_xattr_hdr(attr_data_t ** attrinfo)8218da6c28aaSamw read_xattr_hdr(attr_data_t **attrinfo)
82197c478bd9Sstevel@tonic-gate {
82207c478bd9Sstevel@tonic-gate char buf[TBLOCK];
8221da6c28aaSamw char *attrparent = NULL;
82227c478bd9Sstevel@tonic-gate blkcnt_t blocks;
82237c478bd9Sstevel@tonic-gate char *tp;
82247c478bd9Sstevel@tonic-gate off_t bytes;
82257c478bd9Sstevel@tonic-gate int comp_len, link_len;
82267c478bd9Sstevel@tonic-gate int namelen;
8227da6c28aaSamw int attrparentlen;
8228da6c28aaSamw int parentfilelen;
82297c478bd9Sstevel@tonic-gate
82307c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag != _XATTR_HDRTYPE)
82317c478bd9Sstevel@tonic-gate return (1);
82327c478bd9Sstevel@tonic-gate
82337c478bd9Sstevel@tonic-gate bytes = stbuf.st_size;
82347c478bd9Sstevel@tonic-gate if ((xattrhead = calloc(1, (int)bytes)) == NULL) {
82357c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext(
82367c478bd9Sstevel@tonic-gate "Insufficient memory for extended attribute\n"));
82377c478bd9Sstevel@tonic-gate return (1);
82387c478bd9Sstevel@tonic-gate }
82397c478bd9Sstevel@tonic-gate
82407c478bd9Sstevel@tonic-gate tp = (char *)xattrhead;
82417c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes);
82427c478bd9Sstevel@tonic-gate while (blocks-- > 0) {
82437c478bd9Sstevel@tonic-gate readtape(buf);
82447c478bd9Sstevel@tonic-gate if (bytes <= TBLOCK) {
82457c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, (size_t)bytes);
82467c478bd9Sstevel@tonic-gate break;
82477c478bd9Sstevel@tonic-gate } else {
82487c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, TBLOCK);
82497c478bd9Sstevel@tonic-gate tp += TBLOCK;
82507c478bd9Sstevel@tonic-gate }
82517c478bd9Sstevel@tonic-gate bytes -= TBLOCK;
82527c478bd9Sstevel@tonic-gate }
82537c478bd9Sstevel@tonic-gate
82547c478bd9Sstevel@tonic-gate /*
82557c478bd9Sstevel@tonic-gate * Validate that we can handle header format
82567c478bd9Sstevel@tonic-gate */
82577c478bd9Sstevel@tonic-gate if (strcmp(xattrhead->h_version, XATTR_ARCH_VERS) != 0) {
82587c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
82597c478bd9Sstevel@tonic-gate gettext("Unknown extended attribute format encountered\n"));
82607c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
82617c478bd9Sstevel@tonic-gate gettext("Disabling extended attribute parsing\n"));
82627c478bd9Sstevel@tonic-gate xattrbadhead = 1;
82637c478bd9Sstevel@tonic-gate return (0);
82647c478bd9Sstevel@tonic-gate }
82657c478bd9Sstevel@tonic-gate (void) sscanf(xattrhead->h_component_len, "%10d", &comp_len);
82667c478bd9Sstevel@tonic-gate (void) sscanf(xattrhead->h_link_component_len, "%10d", &link_len);
82677c478bd9Sstevel@tonic-gate xattrp = (struct xattr_buf *)(((char *)xattrhead) +
82687c478bd9Sstevel@tonic-gate sizeof (struct xattr_hdr));
82697c478bd9Sstevel@tonic-gate (void) sscanf(xattrp->h_namesz, "%7d", &namelen);
82707c478bd9Sstevel@tonic-gate if (link_len > 0)
82717c478bd9Sstevel@tonic-gate xattr_linkp = (struct xattr_buf *)
82727c478bd9Sstevel@tonic-gate ((int)xattrp + (int)comp_len);
82737c478bd9Sstevel@tonic-gate else
82747c478bd9Sstevel@tonic-gate xattr_linkp = NULL;
82757c478bd9Sstevel@tonic-gate
8276da6c28aaSamw /*
8277da6c28aaSamw * Gather the attribute path from the filename and attrnames section.
8278da6c28aaSamw * The filename and attrnames section can be composed of two or more
8279da6c28aaSamw * path segments separated by a null character. The first segment
8280da6c28aaSamw * is the path to the parent file that roots the entire sequence in
8281da6c28aaSamw * the normal name space. The remaining segments describes a path
8282da6c28aaSamw * rooted at the hidden extended attribute directory of the leaf file of
8283da6c28aaSamw * the previous segment, making it possible to name attributes on
8284da6c28aaSamw * attributes.
8285da6c28aaSamw */
8286da6c28aaSamw parentfilelen = strlen(xattrp->h_names);
8287da6c28aaSamw xattrapath = xattrp->h_names + parentfilelen + 1;
8288da6c28aaSamw if ((strlen(xattrapath) + parentfilelen + 2) < namelen) {
8289da6c28aaSamw /*
8290da6c28aaSamw * The attrnames section contains a system attribute on an
8291da6c28aaSamw * attribute. Save the name of the attribute for use later,
8292da6c28aaSamw * and replace the null separating the attribute name from
8293da6c28aaSamw * the system attribute name with a '/' so that xattrapath can
8294da6c28aaSamw * be used to display messages with the full attribute path name
8295da6c28aaSamw * rooted at the hidden attribute directory of the base file
8296da6c28aaSamw * in normal name space.
8297da6c28aaSamw */
8298da6c28aaSamw attrparent = strdup(xattrapath);
8299da6c28aaSamw attrparentlen = strlen(attrparent);
8300da6c28aaSamw xattrapath[attrparentlen] = '/';
8301da6c28aaSamw }
8302da6c28aaSamw if ((fill_in_attr_info((attrparent == NULL) ? xattrapath :
8303da6c28aaSamw xattrapath + attrparentlen + 1, xattrapath, attrparent,
8304da6c28aaSamw -1, 0, attrinfo)) == 1) {
8305da6c28aaSamw free(attrparent);
8306da6c28aaSamw return (1);
8307da6c28aaSamw }
8308da6c28aaSamw
8309da6c28aaSamw /* Gather link info */
83107c478bd9Sstevel@tonic-gate if (xattr_linkp) {
83117c478bd9Sstevel@tonic-gate xattr_linkaname = xattr_linkp->h_names +
83127c478bd9Sstevel@tonic-gate strlen(xattr_linkp->h_names) + 1;
83137c478bd9Sstevel@tonic-gate } else {
83147c478bd9Sstevel@tonic-gate xattr_linkaname = NULL;
83157c478bd9Sstevel@tonic-gate }
8316d2443e76Smarks
83177c478bd9Sstevel@tonic-gate return (0);
83187c478bd9Sstevel@tonic-gate }
83197c478bd9Sstevel@tonic-gate #else
83207c478bd9Sstevel@tonic-gate static int
read_xattr_hdr(attr_data_t ** attrinfo)8321da6c28aaSamw read_xattr_hdr(attr_data_t **attrinfo)
83227c478bd9Sstevel@tonic-gate {
83237c478bd9Sstevel@tonic-gate return (0);
83247c478bd9Sstevel@tonic-gate }
83257c478bd9Sstevel@tonic-gate #endif
83267c478bd9Sstevel@tonic-gate
83277c478bd9Sstevel@tonic-gate /*
83287c478bd9Sstevel@tonic-gate * skip over extra slashes in string.
83297c478bd9Sstevel@tonic-gate *
83307c478bd9Sstevel@tonic-gate * For example:
83317c478bd9Sstevel@tonic-gate * /usr/tmp/////
83327c478bd9Sstevel@tonic-gate *
83337c478bd9Sstevel@tonic-gate * would return pointer at
83347c478bd9Sstevel@tonic-gate * /usr/tmp/////
83357c478bd9Sstevel@tonic-gate * ^
83367c478bd9Sstevel@tonic-gate */
83377c478bd9Sstevel@tonic-gate static char *
skipslashes(char * string,char * start)83387c478bd9Sstevel@tonic-gate skipslashes(char *string, char *start)
83397c478bd9Sstevel@tonic-gate {
83407c478bd9Sstevel@tonic-gate while ((string > start) && *(string - 1) == '/') {
83417c478bd9Sstevel@tonic-gate string--;
83427c478bd9Sstevel@tonic-gate }
83437c478bd9Sstevel@tonic-gate
83447c478bd9Sstevel@tonic-gate return (string);
83457c478bd9Sstevel@tonic-gate }
83467c478bd9Sstevel@tonic-gate
83477c478bd9Sstevel@tonic-gate /*
83487c478bd9Sstevel@tonic-gate * Return the parent directory of a given path.
83497c478bd9Sstevel@tonic-gate *
83507c478bd9Sstevel@tonic-gate * Examples:
83517c478bd9Sstevel@tonic-gate * /usr/tmp return /usr
83527c478bd9Sstevel@tonic-gate * /usr/tmp/file return /usr/tmp
83537c478bd9Sstevel@tonic-gate * / returns .
83547c478bd9Sstevel@tonic-gate * /usr returns /
83557c478bd9Sstevel@tonic-gate * file returns .
83567c478bd9Sstevel@tonic-gate *
83577c478bd9Sstevel@tonic-gate * dir is assumed to be at least as big as path.
83587c478bd9Sstevel@tonic-gate */
83597c478bd9Sstevel@tonic-gate static void
get_parent(char * path,char * dir)83607c478bd9Sstevel@tonic-gate get_parent(char *path, char *dir)
83617c478bd9Sstevel@tonic-gate {
83627c478bd9Sstevel@tonic-gate char *s;
83637c478bd9Sstevel@tonic-gate char tmpdir[PATH_MAX + 1];
83647c478bd9Sstevel@tonic-gate
83657c478bd9Sstevel@tonic-gate if (strlen(path) > PATH_MAX) {
83667c478bd9Sstevel@tonic-gate fatal(gettext("pathname is too long"));
83677c478bd9Sstevel@tonic-gate }
83687c478bd9Sstevel@tonic-gate (void) strcpy(tmpdir, path);
83697c478bd9Sstevel@tonic-gate chop_endslashes(tmpdir);
83707c478bd9Sstevel@tonic-gate
83717c478bd9Sstevel@tonic-gate if ((s = strrchr(tmpdir, '/')) == NULL) {
83727c478bd9Sstevel@tonic-gate (void) strcpy(dir, ".");
83737c478bd9Sstevel@tonic-gate } else {
83747c478bd9Sstevel@tonic-gate s = skipslashes(s, tmpdir);
83757c478bd9Sstevel@tonic-gate *s = '\0';
83767c478bd9Sstevel@tonic-gate if (s == tmpdir)
83777c478bd9Sstevel@tonic-gate (void) strcpy(dir, "/");
83787c478bd9Sstevel@tonic-gate else
83797c478bd9Sstevel@tonic-gate (void) strcpy(dir, tmpdir);
83807c478bd9Sstevel@tonic-gate }
83817c478bd9Sstevel@tonic-gate }
83827c478bd9Sstevel@tonic-gate
83837c478bd9Sstevel@tonic-gate #if defined(O_XATTR)
83847c478bd9Sstevel@tonic-gate static char *
get_component(char * path)83857c478bd9Sstevel@tonic-gate get_component(char *path)
83867c478bd9Sstevel@tonic-gate {
83877c478bd9Sstevel@tonic-gate char *ptr;
83887c478bd9Sstevel@tonic-gate
83897c478bd9Sstevel@tonic-gate ptr = strrchr(path, '/');
83907c478bd9Sstevel@tonic-gate if (ptr == NULL) {
83917c478bd9Sstevel@tonic-gate return (path);
83927c478bd9Sstevel@tonic-gate } else {
83937c478bd9Sstevel@tonic-gate /*
83947c478bd9Sstevel@tonic-gate * Handle trailing slash
83957c478bd9Sstevel@tonic-gate */
83967c478bd9Sstevel@tonic-gate if (*(ptr + 1) == '\0')
83977c478bd9Sstevel@tonic-gate return (ptr);
83987c478bd9Sstevel@tonic-gate else
83997c478bd9Sstevel@tonic-gate return (ptr + 1);
84007c478bd9Sstevel@tonic-gate }
84017c478bd9Sstevel@tonic-gate }
84027c478bd9Sstevel@tonic-gate #else
84037c478bd9Sstevel@tonic-gate static char *
get_component(char * path)84047c478bd9Sstevel@tonic-gate get_component(char *path)
84057c478bd9Sstevel@tonic-gate {
84067c478bd9Sstevel@tonic-gate return (path);
84077c478bd9Sstevel@tonic-gate }
84087c478bd9Sstevel@tonic-gate #endif
84097c478bd9Sstevel@tonic-gate
8410da6c28aaSamw #if defined(O_XATTR)
84117c478bd9Sstevel@tonic-gate static int
retry_open_attr(int pdirfd,int cwd,char * dirp,char * pattr,char * name,int oflag,mode_t mode)8412da6c28aaSamw retry_open_attr(int pdirfd, int cwd, char *dirp, char *pattr, char *name,
8413da6c28aaSamw int oflag, mode_t mode)
84147c478bd9Sstevel@tonic-gate {
8415da6c28aaSamw int dirfd;
8416da6c28aaSamw int ofilefd = -1;
84177c478bd9Sstevel@tonic-gate struct timeval times[2];
84187c478bd9Sstevel@tonic-gate mode_t newmode;
84197c478bd9Sstevel@tonic-gate struct stat parentstat;
8420d2443e76Smarks acl_t *aclp = NULL;
8421d2443e76Smarks int error;
84227c478bd9Sstevel@tonic-gate
84237c478bd9Sstevel@tonic-gate /*
84247c478bd9Sstevel@tonic-gate * We couldn't get to attrdir. See if its
84257c478bd9Sstevel@tonic-gate * just a mode problem on the parent file.
84267c478bd9Sstevel@tonic-gate * for example: a mode such as r-xr--r--
8427da6c28aaSamw * on a ufs file system without extended
8428da6c28aaSamw * system attribute support won't let us
8429da6c28aaSamw * create an attribute dir if it doesn't
8430da6c28aaSamw * already exist, and on a ufs file system
8431da6c28aaSamw * with extended system attribute support
8432da6c28aaSamw * won't let us open the attribute for
8433da6c28aaSamw * write.
8434d2443e76Smarks *
8435d2443e76Smarks * If file has a non-trivial ACL, then save it
8436d2443e76Smarks * off so that we can place it back on after doing
8437d2443e76Smarks * chmod's.
84387c478bd9Sstevel@tonic-gate */
8439da6c28aaSamw if ((dirfd = openat(cwd, (pattr == NULL) ? dirp : pattr,
8440da6c28aaSamw O_RDONLY)) == -1) {
8441d2443e76Smarks return (-1);
84427c478bd9Sstevel@tonic-gate }
8443da6c28aaSamw if (fstat(dirfd, &parentstat) == -1) {
8444da6c28aaSamw (void) fprintf(stderr, gettext(
8445da6c28aaSamw "tar: cannot stat %sfile %s: %s\n"),
8446da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "),
8447da6c28aaSamw (pdirfd == -1) ? dirp : name, strerror(errno));
8448da6c28aaSamw return (-1);
8449da6c28aaSamw }
8450da6c28aaSamw if ((error = facl_get(dirfd, ACL_NO_TRIVIAL, &aclp)) != 0) {
8451da6c28aaSamw (void) fprintf(stderr, gettext(
8452da6c28aaSamw "tar: failed to retrieve ACL on %sfile %s: %s\n"),
8453da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "),
8454da6c28aaSamw (pdirfd == -1) ? dirp : name, strerror(errno));
8455d2443e76Smarks return (-1);
8456d2443e76Smarks }
8457d2443e76Smarks
84587c478bd9Sstevel@tonic-gate newmode = S_IWUSR | parentstat.st_mode;
8459da6c28aaSamw if (fchmod(dirfd, newmode) == -1) {
84607c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
8461da6c28aaSamw gettext(
8462da6c28aaSamw "tar: cannot fchmod %sfile %s to %o: %s\n"),
8463da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "),
8464da6c28aaSamw (pdirfd == -1) ? dirp : name, newmode, strerror(errno));
8465d2443e76Smarks if (aclp)
8466d2443e76Smarks acl_free(aclp);
8467d2443e76Smarks return (-1);
84687c478bd9Sstevel@tonic-gate }
84697c478bd9Sstevel@tonic-gate
8470d2443e76Smarks
8471da6c28aaSamw if (pdirfd == -1) {
8472d2443e76Smarks /*
8473da6c28aaSamw * We weren't able to create the attribute directory before.
8474da6c28aaSamw * Now try again.
8475d2443e76Smarks */
8476da6c28aaSamw ofilefd = attropen(dirp, ".", oflag);
8477da6c28aaSamw } else {
8478da6c28aaSamw /*
8479da6c28aaSamw * We weren't able to create open the attribute before.
8480da6c28aaSamw * Now try again.
8481da6c28aaSamw */
8482da6c28aaSamw ofilefd = openat(pdirfd, name, oflag, mode);
8483da6c28aaSamw }
84847c478bd9Sstevel@tonic-gate
84857c478bd9Sstevel@tonic-gate /*
84867c478bd9Sstevel@tonic-gate * Put mode back to original
84877c478bd9Sstevel@tonic-gate */
8488da6c28aaSamw if (fchmod(dirfd, parentstat.st_mode) == -1) {
8489d2443e76Smarks (void) fprintf(stderr,
8490da6c28aaSamw gettext("tar: cannot chmod %sfile %s to %o: %s\n"),
8491da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "),
8492da6c28aaSamw (pdirfd == -1) ? dirp : name, newmode, strerror(errno));
8493d2443e76Smarks }
8494d2443e76Smarks
8495d2443e76Smarks if (aclp) {
8496da6c28aaSamw error = facl_set(dirfd, aclp);
8497d2443e76Smarks if (error) {
8498d2443e76Smarks (void) fprintf(stderr,
8499da6c28aaSamw gettext("tar: failed to set acl entries on "
8500da6c28aaSamw "%sfile %s\n"),
8501da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "),
8502da6c28aaSamw (pdirfd == -1) ? dirp : name);
8503d2443e76Smarks }
8504d2443e76Smarks acl_free(aclp);
8505d2443e76Smarks }
85067c478bd9Sstevel@tonic-gate
85077c478bd9Sstevel@tonic-gate /*
85087c478bd9Sstevel@tonic-gate * Put back time stamps
85097c478bd9Sstevel@tonic-gate */
85107c478bd9Sstevel@tonic-gate
85117c478bd9Sstevel@tonic-gate times[0].tv_sec = parentstat.st_atime;
85127c478bd9Sstevel@tonic-gate times[0].tv_usec = 0;
85137c478bd9Sstevel@tonic-gate times[1].tv_sec = parentstat.st_mtime;
85147c478bd9Sstevel@tonic-gate times[1].tv_usec = 0;
85157c478bd9Sstevel@tonic-gate
8516da6c28aaSamw (void) futimesat(cwd, (pattr == NULL) ? dirp : pattr, times);
8517da6c28aaSamw
8518da6c28aaSamw (void) close(dirfd);
8519da6c28aaSamw
8520da6c28aaSamw return (ofilefd);
85217c478bd9Sstevel@tonic-gate }
8522da6c28aaSamw #endif
85237c478bd9Sstevel@tonic-gate
85247c478bd9Sstevel@tonic-gate #if !defined(O_XATTR)
85257c478bd9Sstevel@tonic-gate static int
openat64(int fd,const char * name,int oflag,mode_t cmode)85267c478bd9Sstevel@tonic-gate openat64(int fd, const char *name, int oflag, mode_t cmode)
85277c478bd9Sstevel@tonic-gate {
85287c478bd9Sstevel@tonic-gate return (open64(name, oflag, cmode));
85297c478bd9Sstevel@tonic-gate }
85307c478bd9Sstevel@tonic-gate
85317c478bd9Sstevel@tonic-gate static int
openat(int fd,const char * name,int oflag,mode_t cmode)85327c478bd9Sstevel@tonic-gate openat(int fd, const char *name, int oflag, mode_t cmode)
85337c478bd9Sstevel@tonic-gate {
85347c478bd9Sstevel@tonic-gate return (open(name, oflag, cmode));
85357c478bd9Sstevel@tonic-gate }
85367c478bd9Sstevel@tonic-gate
85377c478bd9Sstevel@tonic-gate static int
fchownat(int fd,const char * name,uid_t owner,gid_t group,int flag)85387c478bd9Sstevel@tonic-gate fchownat(int fd, const char *name, uid_t owner, gid_t group, int flag)
85397c478bd9Sstevel@tonic-gate {
85407c478bd9Sstevel@tonic-gate if (flag == AT_SYMLINK_NOFOLLOW)
85417c478bd9Sstevel@tonic-gate return (lchown(name, owner, group));
85427c478bd9Sstevel@tonic-gate else
85437c478bd9Sstevel@tonic-gate return (chown(name, owner, group));
85447c478bd9Sstevel@tonic-gate }
85457c478bd9Sstevel@tonic-gate
85467c478bd9Sstevel@tonic-gate static int
renameat(int fromfd,char * old,int tofd,char * new)85477c478bd9Sstevel@tonic-gate renameat(int fromfd, char *old, int tofd, char *new)
85487c478bd9Sstevel@tonic-gate {
85497c478bd9Sstevel@tonic-gate return (rename(old, new));
85507c478bd9Sstevel@tonic-gate }
85517c478bd9Sstevel@tonic-gate
85527c478bd9Sstevel@tonic-gate static int
futimesat(int fd,char * path,struct timeval times[2])85537c478bd9Sstevel@tonic-gate futimesat(int fd, char *path, struct timeval times[2])
85547c478bd9Sstevel@tonic-gate {
85557c478bd9Sstevel@tonic-gate return (utimes(path, times));
85567c478bd9Sstevel@tonic-gate }
85577c478bd9Sstevel@tonic-gate
85587c478bd9Sstevel@tonic-gate static int
unlinkat(int dirfd,char * path,int flag)85597c478bd9Sstevel@tonic-gate unlinkat(int dirfd, char *path, int flag)
85607c478bd9Sstevel@tonic-gate {
85617c478bd9Sstevel@tonic-gate if (flag == AT_REMOVEDIR)
85627c478bd9Sstevel@tonic-gate return (rmdir(path));
85637c478bd9Sstevel@tonic-gate else
85647c478bd9Sstevel@tonic-gate return (unlink(path));
85657c478bd9Sstevel@tonic-gate }
85667c478bd9Sstevel@tonic-gate
85677c478bd9Sstevel@tonic-gate static int
fstatat(int fd,char * path,struct stat * buf,int flag)85687c478bd9Sstevel@tonic-gate fstatat(int fd, char *path, struct stat *buf, int flag)
85697c478bd9Sstevel@tonic-gate {
85707c478bd9Sstevel@tonic-gate if (flag == AT_SYMLINK_NOFOLLOW)
85717c478bd9Sstevel@tonic-gate return (lstat(path, buf));
85727c478bd9Sstevel@tonic-gate else
85737c478bd9Sstevel@tonic-gate return (stat(path, buf));
85747c478bd9Sstevel@tonic-gate }
85757c478bd9Sstevel@tonic-gate
85767c478bd9Sstevel@tonic-gate static int
attropen(char * file,char * attr,int omode,mode_t cmode)85777c478bd9Sstevel@tonic-gate attropen(char *file, char *attr, int omode, mode_t cmode)
85787c478bd9Sstevel@tonic-gate {
85797c478bd9Sstevel@tonic-gate errno = ENOTSUP;
85807c478bd9Sstevel@tonic-gate return (-1);
85817c478bd9Sstevel@tonic-gate }
85827c478bd9Sstevel@tonic-gate #endif
85837c478bd9Sstevel@tonic-gate
85847c478bd9Sstevel@tonic-gate static void
chop_endslashes(char * path)85857c478bd9Sstevel@tonic-gate chop_endslashes(char *path)
85867c478bd9Sstevel@tonic-gate {
85877c478bd9Sstevel@tonic-gate char *end, *ptr;
85887c478bd9Sstevel@tonic-gate
85897c478bd9Sstevel@tonic-gate /*
85907c478bd9Sstevel@tonic-gate * Chop of slashes, but not if all we have is slashes
85917c478bd9Sstevel@tonic-gate * for example: ////
85927c478bd9Sstevel@tonic-gate * should make no changes, otherwise it will screw up
85937c478bd9Sstevel@tonic-gate * checkdir
85947c478bd9Sstevel@tonic-gate */
85957c478bd9Sstevel@tonic-gate end = &path[strlen(path) -1];
85967c478bd9Sstevel@tonic-gate if (*end == '/' && end != path) {
85977c478bd9Sstevel@tonic-gate ptr = skipslashes(end, path);
85987c478bd9Sstevel@tonic-gate if (ptr != NULL && ptr != path) {
85997c478bd9Sstevel@tonic-gate *ptr = '\0';
86007c478bd9Sstevel@tonic-gate }
86017c478bd9Sstevel@tonic-gate }
86027c478bd9Sstevel@tonic-gate }
860345916cd2Sjpk /* Trusted Extensions */
860445916cd2Sjpk
860545916cd2Sjpk /*
860645916cd2Sjpk * append_ext_attr():
860745916cd2Sjpk *
860845916cd2Sjpk * Append extended attributes and other information into the buffer
860945916cd2Sjpk * that gets written to the ancillary file.
861045916cd2Sjpk *
861145916cd2Sjpk * With option 'T', we create a tarfile which
861245916cd2Sjpk * has an ancillary file each corresponding archived file.
861345916cd2Sjpk * Each ancillary file contains 1 or more of the
861445916cd2Sjpk * following attributes:
861545916cd2Sjpk *
861645916cd2Sjpk * attribute type attribute process procedure
861745916cd2Sjpk * ---------------- ---------------- --------------------------
861845916cd2Sjpk * DIR_TYPE = 'D' directory flag append if a directory
861945916cd2Sjpk * LBL_TYPE = 'L' SL[IL] or SL append ascii label
862045916cd2Sjpk *
862145916cd2Sjpk *
862245916cd2Sjpk */
862345916cd2Sjpk static void
append_ext_attr(char * shortname,char ** secinfo,int * len)862445916cd2Sjpk append_ext_attr(char *shortname, char **secinfo, int *len)
862545916cd2Sjpk {
862645916cd2Sjpk bslabel_t b_slabel; /* binary sensitvity label */
862745916cd2Sjpk char *ascii = NULL; /* ascii label */
862845916cd2Sjpk
862945916cd2Sjpk /*
863045916cd2Sjpk * For each attribute type, append it if it is
863145916cd2Sjpk * relevant to the file type.
863245916cd2Sjpk */
863345916cd2Sjpk
863445916cd2Sjpk /*
863545916cd2Sjpk * For attribute type DIR_TYPE,
863645916cd2Sjpk * append it to the following file type:
863745916cd2Sjpk *
863845916cd2Sjpk * S_IFDIR: directories
863945916cd2Sjpk */
864045916cd2Sjpk
864145916cd2Sjpk /*
864245916cd2Sjpk * For attribute type LBL_TYPE,
864345916cd2Sjpk * append it to the following file type:
864445916cd2Sjpk *
864545916cd2Sjpk * S_IFDIR: directories (including mld, sld)
864645916cd2Sjpk * S_IFLNK: symbolic link
864745916cd2Sjpk * S_IFREG: regular file but not hard link
864845916cd2Sjpk * S_IFIFO: FIFO file but not hard link
864945916cd2Sjpk * S_IFCHR: char special file but not hard link
865045916cd2Sjpk * S_IFBLK: block special file but not hard link
865145916cd2Sjpk */
865245916cd2Sjpk switch (stbuf.st_mode & S_IFMT) {
865345916cd2Sjpk
865445916cd2Sjpk case S_IFDIR:
865545916cd2Sjpk
865645916cd2Sjpk /*
865745916cd2Sjpk * append DIR_TYPE
865845916cd2Sjpk */
865945916cd2Sjpk (void) append_secattr(secinfo, len, 1,
866045916cd2Sjpk "\0", DIR_TYPE);
866145916cd2Sjpk
866245916cd2Sjpk /*
866345916cd2Sjpk * Get and append attribute types LBL_TYPE.
866445916cd2Sjpk * For directories, LBL_TYPE contains SL.
866545916cd2Sjpk */
866645916cd2Sjpk /* get binary sensitivity label */
866745916cd2Sjpk if (getlabel(shortname, &b_slabel) != 0) {
866845916cd2Sjpk (void) fprintf(stderr,
866945916cd2Sjpk gettext("tar: can't get sensitvity label for "
867045916cd2Sjpk " %s, getlabel() error: %s\n"),
867145916cd2Sjpk shortname, strerror(errno));
867245916cd2Sjpk } else {
867345916cd2Sjpk /* get ascii SL */
867445916cd2Sjpk if (bsltos(&b_slabel, &ascii,
867545916cd2Sjpk 0, 0) <= 0) {
867645916cd2Sjpk (void) fprintf(stderr,
867745916cd2Sjpk gettext("tar: can't get ascii SL for"
867845916cd2Sjpk " %s\n"), shortname);
867945916cd2Sjpk } else {
868045916cd2Sjpk /* append LBL_TYPE */
868145916cd2Sjpk (void) append_secattr(secinfo, len,
868245916cd2Sjpk strlen(ascii) + 1, ascii,
868345916cd2Sjpk LBL_TYPE);
868445916cd2Sjpk
868545916cd2Sjpk /* free storage */
868645916cd2Sjpk if (ascii != NULL) {
868745916cd2Sjpk free(ascii);
868845916cd2Sjpk ascii = (char *)0;
868945916cd2Sjpk }
869045916cd2Sjpk }
869145916cd2Sjpk
869245916cd2Sjpk }
869345916cd2Sjpk break;
869445916cd2Sjpk
869545916cd2Sjpk case S_IFLNK:
869645916cd2Sjpk case S_IFREG:
869745916cd2Sjpk case S_IFIFO:
869845916cd2Sjpk case S_IFCHR:
869945916cd2Sjpk case S_IFBLK:
870045916cd2Sjpk
870145916cd2Sjpk /* get binary sensitivity label */
870245916cd2Sjpk if (getlabel(shortname, &b_slabel) != 0) {
870345916cd2Sjpk (void) fprintf(stderr,
870445916cd2Sjpk gettext("tar: can't get sensitivty label for %s, "
870545916cd2Sjpk "getlabel() error: %s\n"),
870645916cd2Sjpk shortname, strerror(errno));
870745916cd2Sjpk } else {
870845916cd2Sjpk /* get ascii IL[SL] */
870945916cd2Sjpk if (bsltos(&b_slabel, &ascii, 0, 0) <= 0) {
871045916cd2Sjpk (void) fprintf(stderr,
871145916cd2Sjpk gettext("tar: can't translate sensitivity "
871245916cd2Sjpk " label for %s\n"), shortname);
871345916cd2Sjpk } else {
871445916cd2Sjpk char *cmw_label;
871545916cd2Sjpk size_t cmw_length;
871645916cd2Sjpk
871745916cd2Sjpk cmw_length = strlen("ADMIN_LOW [] ") +
871845916cd2Sjpk strlen(ascii);
871945916cd2Sjpk if ((cmw_label = malloc(cmw_length)) == NULL) {
872045916cd2Sjpk (void) fprintf(stderr, gettext(
872145916cd2Sjpk "Insufficient memory for label\n"));
872245916cd2Sjpk exit(1);
872345916cd2Sjpk }
872445916cd2Sjpk /* append LBL_TYPE */
872545916cd2Sjpk (void) snprintf(cmw_label, cmw_length,
872645916cd2Sjpk "ADMIN_LOW [%s]", ascii);
872745916cd2Sjpk (void) append_secattr(secinfo, len,
872845916cd2Sjpk strlen(cmw_label) + 1, cmw_label,
872945916cd2Sjpk LBL_TYPE);
873045916cd2Sjpk
873145916cd2Sjpk /* free storage */
873245916cd2Sjpk if (ascii != NULL) {
873345916cd2Sjpk free(cmw_label);
873445916cd2Sjpk free(ascii);
873545916cd2Sjpk ascii = (char *)0;
873645916cd2Sjpk }
873745916cd2Sjpk }
873845916cd2Sjpk }
873945916cd2Sjpk break;
874045916cd2Sjpk
874145916cd2Sjpk default:
874245916cd2Sjpk break;
874345916cd2Sjpk } /* end switch for LBL_TYPE */
874445916cd2Sjpk
874545916cd2Sjpk
874645916cd2Sjpk /* DONE !! */
874745916cd2Sjpk return;
874845916cd2Sjpk
874945916cd2Sjpk } /* end of append_ext_attr */
875045916cd2Sjpk
875145916cd2Sjpk
875245916cd2Sjpk /*
875345916cd2Sjpk * Name: extract_attr()
875445916cd2Sjpk *
875545916cd2Sjpk * Description:
875645916cd2Sjpk * Process attributes from the ancillary file due to
875745916cd2Sjpk * the T option.
875845916cd2Sjpk *
875945916cd2Sjpk * Call by doxtract() as part of the switch case structure.
876045916cd2Sjpk * Making this a separate routine because the nesting are too
876145916cd2Sjpk * deep in doxtract, thus, leaving very little space
876245916cd2Sjpk * on each line for instructions.
876345916cd2Sjpk *
876445916cd2Sjpk * With option 'T', we extract from a TS 8 or TS 2.5 ancillary file
876545916cd2Sjpk *
876645916cd2Sjpk * For option 'T', following are possible attributes in
876745916cd2Sjpk * a TS 8 ancillary file: (NOTE: No IL support)
876845916cd2Sjpk *
876945916cd2Sjpk * attribute type attribute process procedure
877045916cd2Sjpk * ---------------- ---------------- -------------------------
877145916cd2Sjpk * # LBL_TYPE = 'L' SL construct binary label
877245916cd2Sjpk * # APRIV_TYPE = 'P' allowed priv construct privileges
877345916cd2Sjpk * # FPRIV_TYPE = 'p' forced priv construct privileges
877445916cd2Sjpk * # COMP_TYPE = 'C' path component construct real path
877545916cd2Sjpk * # DIR_TYPE = 'D' directory flag note it is a directory
877645916cd2Sjpk * $ UFSD_ACL = '1' ACL data construct ACL entries
877745916cd2Sjpk * ATTR_FLAG_TYPE = 'F' file attr flags construct binary flags
877845916cd2Sjpk * LK_COMP_TYPE = 'K' linked path comp construct linked real path
877945916cd2Sjpk *
878045916cd2Sjpk * note: # = attribute names common between TS 8 & TS 2.5 ancillary
878145916cd2Sjpk * files.
878245916cd2Sjpk * $ = ACL attribute is processed for the option 'p', it doesn't
878345916cd2Sjpk * need option 'T'.
878445916cd2Sjpk *
878545916cd2Sjpk * Trusted Extensions ignores APRIV_TYPE, FPRIV_TYPE, and ATTR_FLAG_TYPE
878645916cd2Sjpk *
878745916cd2Sjpk */
878845916cd2Sjpk static void
extract_attr(char ** file_ptr,struct sec_attr * attr)878945916cd2Sjpk extract_attr(char **file_ptr, struct sec_attr *attr)
879045916cd2Sjpk {
879145916cd2Sjpk int reterr, err;
879245916cd2Sjpk char *dummy_buf; /* for attribute extract */
879345916cd2Sjpk
879445916cd2Sjpk dummy_buf = attr->attr_info;
879545916cd2Sjpk
879645916cd2Sjpk switch (attr->attr_type) {
879745916cd2Sjpk
879845916cd2Sjpk case DIR_TYPE:
879945916cd2Sjpk
880045916cd2Sjpk dir_flag++;
880145916cd2Sjpk break;
880245916cd2Sjpk
880345916cd2Sjpk case LBL_TYPE:
880445916cd2Sjpk
880545916cd2Sjpk /*
880645916cd2Sjpk * LBL_TYPE is used to indicate SL for directory, and
880745916cd2Sjpk * CMW label for other file types.
880845916cd2Sjpk */
880945916cd2Sjpk
881045916cd2Sjpk if (!dir_flag) { /* not directory */
881145916cd2Sjpk /* Skip over IL portion */
881245916cd2Sjpk char *sl_ptr = strchr(dummy_buf, '[');
881345916cd2Sjpk
881445916cd2Sjpk if (sl_ptr == NULL)
881545916cd2Sjpk err = 0;
881645916cd2Sjpk else
881745916cd2Sjpk err = stobsl(sl_ptr, &bs_label,
881845916cd2Sjpk NEW_LABEL, &reterr);
881945916cd2Sjpk } else { /* directory */
882045916cd2Sjpk err = stobsl(dummy_buf, &bs_label,
882145916cd2Sjpk NEW_LABEL, &reterr);
882245916cd2Sjpk }
882345916cd2Sjpk if (err == 0) {
882445916cd2Sjpk (void) fprintf(stderr, gettext("tar: "
882545916cd2Sjpk "can't convert %s to binary label\n"),
882645916cd2Sjpk dummy_buf);
882745916cd2Sjpk bslundef(&bs_label);
882845916cd2Sjpk } else if (!blequal(&bs_label, &admin_low) &&
882945916cd2Sjpk !blequal(&bs_label, &admin_high)) {
883045916cd2Sjpk bslabel_t *from_label;
883145916cd2Sjpk char *buf;
883245916cd2Sjpk char tempbuf[MAXPATHLEN];
883345916cd2Sjpk
883445916cd2Sjpk if (*orig_namep != '/') {
883545916cd2Sjpk /* got relative linked to path */
883645916cd2Sjpk (void) getcwd(tempbuf, (sizeof (tempbuf)));
883745916cd2Sjpk (void) strncat(tempbuf, "/", MAXPATHLEN);
883845916cd2Sjpk } else
883945916cd2Sjpk *tempbuf = '\0';
884045916cd2Sjpk
884145916cd2Sjpk buf = real_path;
884245916cd2Sjpk (void) strncat(tempbuf, orig_namep, MAXPATHLEN);
884345916cd2Sjpk from_label = getlabelbypath(tempbuf);
884445916cd2Sjpk if (from_label != NULL) {
884545916cd2Sjpk if (blequal(from_label, &admin_low)) {
884645916cd2Sjpk if ((getpathbylabel(tempbuf, buf,
884745916cd2Sjpk MAXPATHLEN, &bs_label) == NULL)) {
884845916cd2Sjpk (void) fprintf(stderr,
884945916cd2Sjpk gettext("tar: "
885045916cd2Sjpk "can't get zone root path for "
885145916cd2Sjpk "%s\n"), tempbuf);
885245916cd2Sjpk } else
885345916cd2Sjpk rpath_flag = 1;
885445916cd2Sjpk }
885545916cd2Sjpk free(from_label);
885645916cd2Sjpk }
885745916cd2Sjpk }
885845916cd2Sjpk break;
885945916cd2Sjpk
886045916cd2Sjpk case COMP_TYPE:
886145916cd2Sjpk
886245916cd2Sjpk rebuild_comp_path(dummy_buf, file_ptr);
886345916cd2Sjpk break;
886445916cd2Sjpk
886545916cd2Sjpk case LK_COMP_TYPE:
886645916cd2Sjpk
886745916cd2Sjpk if (rebuild_lk_comp_path(dummy_buf, file_ptr)
886845916cd2Sjpk == 0) {
886945916cd2Sjpk lk_rpath_flag = 1;
887045916cd2Sjpk } else {
887145916cd2Sjpk (void) fprintf(stderr, gettext("tar: warning: link's "
887245916cd2Sjpk "target pathname might be invalid.\n"));
887345916cd2Sjpk lk_rpath_flag = 0;
887445916cd2Sjpk }
887545916cd2Sjpk break;
887645916cd2Sjpk case APRIV_TYPE:
887745916cd2Sjpk ignored_aprivs++;
887845916cd2Sjpk break;
887945916cd2Sjpk case FPRIV_TYPE:
888045916cd2Sjpk ignored_fprivs++;
888145916cd2Sjpk break;
888245916cd2Sjpk case ATTR_FLAG_TYPE:
888345916cd2Sjpk ignored_fattrs++;
888445916cd2Sjpk break;
888545916cd2Sjpk
888645916cd2Sjpk default:
888745916cd2Sjpk
888845916cd2Sjpk break;
888945916cd2Sjpk }
889045916cd2Sjpk
889145916cd2Sjpk /* done */
889245916cd2Sjpk return;
889345916cd2Sjpk
889445916cd2Sjpk } /* end extract_attr */
889545916cd2Sjpk
889645916cd2Sjpk
889745916cd2Sjpk
889845916cd2Sjpk /*
889945916cd2Sjpk * Name: rebuild_comp_path()
890045916cd2Sjpk *
890145916cd2Sjpk * Description:
890245916cd2Sjpk * Take the string of components passed down by the calling
890345916cd2Sjpk * routine and parse the values and rebuild the path.
890445916cd2Sjpk * This routine no longer needs to produce a new real_path
890545916cd2Sjpk * string because it is produced when the 'L' LABEL_TYPE is
890645916cd2Sjpk * interpreted. So the only thing done here is to distinguish
890745916cd2Sjpk * between an SLD and an MLD entry. We only want one, so we
890845916cd2Sjpk * ignore the MLD entry by setting the mld_flag.
890945916cd2Sjpk *
891045916cd2Sjpk * return value:
891145916cd2Sjpk * none
891245916cd2Sjpk */
891345916cd2Sjpk static void
rebuild_comp_path(char * str,char ** namep)891445916cd2Sjpk rebuild_comp_path(char *str, char **namep)
891545916cd2Sjpk {
891645916cd2Sjpk char *cp;
891745916cd2Sjpk
891845916cd2Sjpk while (*str != '\0') {
891945916cd2Sjpk
892045916cd2Sjpk switch (*str) {
892145916cd2Sjpk
892245916cd2Sjpk case MLD_TYPE:
892345916cd2Sjpk
892445916cd2Sjpk str++;
892545916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) {
892645916cd2Sjpk *cp = '\0';
892745916cd2Sjpk str = cp + 2;
892845916cd2Sjpk *cp = ';';
892945916cd2Sjpk }
893045916cd2Sjpk mld_flag = 1;
893145916cd2Sjpk break;
893245916cd2Sjpk
893345916cd2Sjpk case SLD_TYPE:
893445916cd2Sjpk
893545916cd2Sjpk str++;
893645916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) {
893745916cd2Sjpk *cp = '\0';
893845916cd2Sjpk str = cp + 2;
893945916cd2Sjpk *cp = ';';
894045916cd2Sjpk }
894145916cd2Sjpk mld_flag = 0;
894245916cd2Sjpk break;
894345916cd2Sjpk
894445916cd2Sjpk case PATH_TYPE:
894545916cd2Sjpk
894645916cd2Sjpk str++;
894745916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) {
894845916cd2Sjpk *cp = '\0';
894945916cd2Sjpk str = cp + 2;
895045916cd2Sjpk *cp = ';';
895145916cd2Sjpk }
895245916cd2Sjpk break;
895345916cd2Sjpk }
895445916cd2Sjpk }
895545916cd2Sjpk if (rpath_flag)
895645916cd2Sjpk *namep = real_path;
895745916cd2Sjpk return;
895845916cd2Sjpk
895945916cd2Sjpk } /* end rebuild_comp_path() */
896045916cd2Sjpk
896145916cd2Sjpk /*
896245916cd2Sjpk * Name: rebuild_lk_comp_path()
896345916cd2Sjpk *
896445916cd2Sjpk * Description:
896545916cd2Sjpk * Take the string of components passed down by the calling
896645916cd2Sjpk * routine and parse the values and rebuild the path.
896745916cd2Sjpk *
896845916cd2Sjpk * return value:
896945916cd2Sjpk * 0 = succeeded
897045916cd2Sjpk * -1 = failed
897145916cd2Sjpk */
897245916cd2Sjpk static int
rebuild_lk_comp_path(char * str,char ** namep)897345916cd2Sjpk rebuild_lk_comp_path(char *str, char **namep)
897445916cd2Sjpk {
897545916cd2Sjpk char *cp;
897645916cd2Sjpk int reterr;
897745916cd2Sjpk bslabel_t bslabel;
897845916cd2Sjpk char *buf;
897945916cd2Sjpk char pbuf[MAXPATHLEN];
898045916cd2Sjpk char *ptr1, *ptr2;
898145916cd2Sjpk int plen;
898245916cd2Sjpk int use_pbuf;
898345916cd2Sjpk char tempbuf[MAXPATHLEN];
898445916cd2Sjpk int mismatch;
898545916cd2Sjpk bslabel_t *from_label;
898645916cd2Sjpk char zonename[ZONENAME_MAX];
898745916cd2Sjpk zoneid_t zoneid;
898845916cd2Sjpk
898945916cd2Sjpk /* init stuff */
899045916cd2Sjpk use_pbuf = 0;
899145916cd2Sjpk mismatch = 0;
899245916cd2Sjpk
899345916cd2Sjpk /*
899445916cd2Sjpk * For linked to pathname (LK_COMP_TYPE):
899545916cd2Sjpk * - If the linked to pathname is absolute (start with /), we
899645916cd2Sjpk * will use it as is.
899745916cd2Sjpk * - If it is a relative pathname then it is relative to 1 of 2
899845916cd2Sjpk * directories. For a hardlink, it is relative to the current
899945916cd2Sjpk * directory. For a symbolic link, it is relative to the
900045916cd2Sjpk * directory the symbolic link is in. For the symbolic link
900145916cd2Sjpk * case, set a flag to indicate we need to use the prefix of
900245916cd2Sjpk * the restored file's pathname with the linked to pathname.
900345916cd2Sjpk *
900445916cd2Sjpk * NOTE: At this point, we have no way to determine if we have
900545916cd2Sjpk * a hardlink or a symbolic link. We will compare the 1st
900645916cd2Sjpk * component in the prefix portion of the restore file's
900745916cd2Sjpk * pathname to the 1st component in the attribute data
900845916cd2Sjpk * (the linked pathname). If they are the same, we will assume
900945916cd2Sjpk * the link pathname to reconstruct is relative to the current
901045916cd2Sjpk * directory. Otherwise, we will set a flag indicate we need
901145916cd2Sjpk * to use a prefix with the reconstructed name. Need to compare
901245916cd2Sjpk * both the adorned and unadorned version before deciding a
901345916cd2Sjpk * mismatch.
901445916cd2Sjpk */
901545916cd2Sjpk
901645916cd2Sjpk buf = lk_real_path;
901745916cd2Sjpk if (*(str + 1) != '/') { /* got relative linked to path */
901845916cd2Sjpk ptr1 = orig_namep;
901945916cd2Sjpk ptr2 = strrchr(ptr1, '/');
902045916cd2Sjpk plen = ptr2 - ptr1;
902145916cd2Sjpk if (plen > 0) {
902245916cd2Sjpk pbuf[0] = '\0';
902345916cd2Sjpk plen++; /* include '/' */
902445916cd2Sjpk (void) strncpy(pbuf, ptr1, plen);
902545916cd2Sjpk *(pbuf + plen) = '\0';
902645916cd2Sjpk ptr2 = strchr(pbuf, '/');
902745916cd2Sjpk if (strncmp(pbuf, str + 1, ptr2 - pbuf) != 0)
902845916cd2Sjpk mismatch = 1;
902945916cd2Sjpk }
903045916cd2Sjpk
903145916cd2Sjpk if (mismatch == 1)
903245916cd2Sjpk use_pbuf = 1;
903345916cd2Sjpk }
903445916cd2Sjpk
903545916cd2Sjpk buf[0] = '\0';
903645916cd2Sjpk
903745916cd2Sjpk while (*str != '\0') {
903845916cd2Sjpk
903945916cd2Sjpk switch (*str) {
904045916cd2Sjpk
904145916cd2Sjpk case MLD_TYPE:
904245916cd2Sjpk
904345916cd2Sjpk str++;
904445916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) {
904545916cd2Sjpk *cp = '\0';
904645916cd2Sjpk
904745916cd2Sjpk /*
904845916cd2Sjpk * Ignore attempts to backup over .MLD.
904945916cd2Sjpk */
905045916cd2Sjpk if (strcmp(str, "../") != 0)
905145916cd2Sjpk (void) strncat(buf, str, MAXPATHLEN);
905245916cd2Sjpk str = cp + 2;
905345916cd2Sjpk *cp = ';';
905445916cd2Sjpk }
905545916cd2Sjpk break;
905645916cd2Sjpk
905745916cd2Sjpk case SLD_TYPE:
905845916cd2Sjpk
905945916cd2Sjpk str++;
906045916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) {
906145916cd2Sjpk *cp = '\0';
906245916cd2Sjpk
906345916cd2Sjpk /*
906445916cd2Sjpk * Use the path name in the header if
906545916cd2Sjpk * error occurs when processing the
906645916cd2Sjpk * SLD type.
906745916cd2Sjpk */
906845916cd2Sjpk
906945916cd2Sjpk if (!stobsl(str, &bslabel,
907045916cd2Sjpk NO_CORRECTION, &reterr)) {
907145916cd2Sjpk (void) fprintf(stderr, gettext(
907245916cd2Sjpk "tar: can't translate to binary"
907345916cd2Sjpk "SL for SLD, stobsl() error:"
907445916cd2Sjpk " %s\n"), strerror(errno));
907545916cd2Sjpk return (-1);
907645916cd2Sjpk }
907745916cd2Sjpk
907845916cd2Sjpk str = cp + 2;
907945916cd2Sjpk *cp = ';';
908045916cd2Sjpk
908145916cd2Sjpk if (use_pbuf == 1) {
908245916cd2Sjpk if (*pbuf != '/') {
908345916cd2Sjpk /* relative linked to path */
908445916cd2Sjpk
908545916cd2Sjpk (void) getcwd(tempbuf,
908645916cd2Sjpk (sizeof (tempbuf)));
908745916cd2Sjpk (void) strncat(tempbuf, "/",
908845916cd2Sjpk MAXPATHLEN);
908945916cd2Sjpk (void) strncat(tempbuf, pbuf,
909045916cd2Sjpk MAXPATHLEN);
909145916cd2Sjpk }
909245916cd2Sjpk else
909345916cd2Sjpk (void) strcpy(tempbuf, pbuf);
909445916cd2Sjpk
909545916cd2Sjpk } else if (*buf != '/') {
909645916cd2Sjpk /* got relative linked to path */
909745916cd2Sjpk
909845916cd2Sjpk (void) getcwd(tempbuf,
909945916cd2Sjpk (sizeof (tempbuf)));
910045916cd2Sjpk (void) strncat(tempbuf, "/",
910145916cd2Sjpk MAXPATHLEN);
910245916cd2Sjpk } else
910345916cd2Sjpk *tempbuf = '\0';
910445916cd2Sjpk
910545916cd2Sjpk (void) strncat(tempbuf, buf, MAXPATHLEN);
910645916cd2Sjpk *buf = '\0';
910745916cd2Sjpk
910845916cd2Sjpk if (blequal(&bslabel, &admin_high)) {
910945916cd2Sjpk bslabel = admin_low;
911045916cd2Sjpk }
911145916cd2Sjpk
911245916cd2Sjpk
911345916cd2Sjpk /*
911445916cd2Sjpk * Check for cross-zone symbolic links
911545916cd2Sjpk */
911645916cd2Sjpk from_label = getlabelbypath(real_path);
911745916cd2Sjpk if (rpath_flag && (from_label != NULL) &&
911845916cd2Sjpk !blequal(&bslabel, from_label)) {
911945916cd2Sjpk if ((zoneid =
912045916cd2Sjpk getzoneidbylabel(&bslabel)) == -1) {
912145916cd2Sjpk (void) fprintf(stderr,
912245916cd2Sjpk gettext("tar: can't get "
912345916cd2Sjpk "zone ID for %s\n"),
912445916cd2Sjpk tempbuf);
912545916cd2Sjpk return (-1);
912645916cd2Sjpk }
912745916cd2Sjpk if (zone_getattr(zoneid, ZONE_ATTR_NAME,
912845916cd2Sjpk &zonename, ZONENAME_MAX) == -1) {
912945916cd2Sjpk /* Badly configured zone info */
913045916cd2Sjpk (void) fprintf(stderr,
913145916cd2Sjpk gettext("tar: can't get "
913245916cd2Sjpk "zonename for %s\n"),
913345916cd2Sjpk tempbuf);
913445916cd2Sjpk return (-1);
913545916cd2Sjpk }
913645916cd2Sjpk (void) strncpy(buf, AUTO_ZONE,
913745916cd2Sjpk MAXPATHLEN);
913845916cd2Sjpk (void) strncat(buf, "/",
913945916cd2Sjpk MAXPATHLEN);
914045916cd2Sjpk (void) strncat(buf, zonename,
914145916cd2Sjpk MAXPATHLEN);
914245916cd2Sjpk }
914345916cd2Sjpk if (from_label != NULL)
914445916cd2Sjpk free(from_label);
914545916cd2Sjpk (void) strncat(buf, tempbuf, MAXPATHLEN);
914645916cd2Sjpk break;
914745916cd2Sjpk }
914845916cd2Sjpk mld_flag = 0;
914945916cd2Sjpk break;
915045916cd2Sjpk
915145916cd2Sjpk case PATH_TYPE:
915245916cd2Sjpk
915345916cd2Sjpk str++;
915445916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) {
915545916cd2Sjpk *cp = '\0';
915645916cd2Sjpk (void) strncat(buf, str, MAXPATHLEN);
915745916cd2Sjpk str = cp + 2;
915845916cd2Sjpk *cp = ';';
915945916cd2Sjpk }
916045916cd2Sjpk break;
916145916cd2Sjpk
916245916cd2Sjpk default:
916345916cd2Sjpk
916445916cd2Sjpk (void) fprintf(stderr, gettext(
916545916cd2Sjpk "tar: error rebuilding path %s\n"),
916645916cd2Sjpk *namep);
916745916cd2Sjpk *buf = '\0';
916845916cd2Sjpk str++;
916945916cd2Sjpk return (-1);
917045916cd2Sjpk }
917145916cd2Sjpk }
917245916cd2Sjpk
917345916cd2Sjpk /*
917445916cd2Sjpk * Done for LK_COMP_TYPE
917545916cd2Sjpk */
917645916cd2Sjpk
917745916cd2Sjpk return (0); /* component path is rebuilt successfully */
917845916cd2Sjpk
917945916cd2Sjpk } /* end rebuild_lk_comp_path() */
918045916cd2Sjpk
918145916cd2Sjpk /*
918245916cd2Sjpk * Name: check_ext_attr()
918345916cd2Sjpk *
918445916cd2Sjpk * Description:
918545916cd2Sjpk * Check the extended attributes for a file being extracted.
918645916cd2Sjpk * The attributes being checked here are CMW labels.
918745916cd2Sjpk * ACLs are not set here because they are set by the
918845916cd2Sjpk * pflag in doxtract().
918945916cd2Sjpk *
919045916cd2Sjpk * If the label doesn't match, return 0
919145916cd2Sjpk * else return 1
919245916cd2Sjpk */
919345916cd2Sjpk static int
check_ext_attr(char * filename)919445916cd2Sjpk check_ext_attr(char *filename)
919545916cd2Sjpk {
919645916cd2Sjpk bslabel_t currentlabel; /* label from zone */
919745916cd2Sjpk
919845916cd2Sjpk if (bltype(&bs_label, SUN_SL_UN)) {
919945916cd2Sjpk /* No label check possible */
920045916cd2Sjpk return (0);
920145916cd2Sjpk }
920245916cd2Sjpk if (getlabel(filename, ¤tlabel) != 0) {
920345916cd2Sjpk (void) fprintf(stderr,
920445916cd2Sjpk gettext("tar: can't get label for "
920545916cd2Sjpk " %s, getlabel() error: %s\n"),
920645916cd2Sjpk filename, strerror(errno));
920745916cd2Sjpk return (0);
920845916cd2Sjpk } else if ((blequal(¤tlabel, &bs_label)) == 0) {
920945916cd2Sjpk char *src_label = NULL; /* ascii label */
921045916cd2Sjpk
921145916cd2Sjpk /* get current src SL */
921245916cd2Sjpk if (bsltos(&bs_label, &src_label, 0, 0) <= 0) {
921345916cd2Sjpk (void) fprintf(stderr,
921445916cd2Sjpk gettext("tar: can't interpret requested label for"
921545916cd2Sjpk " %s\n"), filename);
921645916cd2Sjpk } else {
921745916cd2Sjpk (void) fprintf(stderr,
921845916cd2Sjpk gettext("tar: can't apply label %s to %s\n"),
921945916cd2Sjpk src_label, filename);
922045916cd2Sjpk free(src_label);
922145916cd2Sjpk }
922245916cd2Sjpk (void) fprintf(stderr,
922345916cd2Sjpk gettext("tar: %s not restored\n"), filename);
922445916cd2Sjpk return (0);
922545916cd2Sjpk }
922645916cd2Sjpk return (1);
922745916cd2Sjpk
922845916cd2Sjpk } /* end check_ext_attr */
922936802407SRich Burridge
923036802407SRich Burridge /* Compressing a tar file using compression method provided in 'opt' */
923136802407SRich Burridge
923236802407SRich Burridge static void
compress_back()923336802407SRich Burridge compress_back()
923436802407SRich Burridge {
923536802407SRich Burridge pid_t pid;
923636802407SRich Burridge
923736802407SRich Burridge if (vflag) {
923836802407SRich Burridge (void) fprintf(vfile,
923936802407SRich Burridge gettext("Compressing '%s' with '%s'...\n"),
924036802407SRich Burridge usefile, compress_opt);
924136802407SRich Burridge }
924236802407SRich Burridge if ((pid = fork()) == 0) {
9243aa7166bdSMilan Jurik verify_compress_opt(compress_opt);
924436802407SRich Burridge (void) execlp(compress_opt, compress_opt,
924536802407SRich Burridge usefile, NULL);
924636802407SRich Burridge } else if (pid == -1) {
924736802407SRich Burridge vperror(1, "%s", gettext("Could not fork"));
924836802407SRich Burridge }
924936802407SRich Burridge wait_pid(pid);
925036802407SRich Burridge if (suffix == 0) {
925136802407SRich Burridge (void) rename(tfname, usefile);
925236802407SRich Burridge }
925336802407SRich Burridge }
925436802407SRich Burridge
925536802407SRich Burridge /* The magic numbers from /etc/magic */
925636802407SRich Burridge
925736802407SRich Burridge #define GZIP_MAGIC "\037\213"
925836802407SRich Burridge #define BZIP_MAGIC "BZh"
925936802407SRich Burridge #define COMP_MAGIC "\037\235"
9260506ea5b8SMilan Jurik #define XZ_MAGIC "\375\067\172\130\132\000"
926136802407SRich Burridge
926236802407SRich Burridge void
check_compression(void)9263506ea5b8SMilan Jurik check_compression(void)
926436802407SRich Burridge {
9265506ea5b8SMilan Jurik char magic[16];
926636802407SRich Burridge FILE *fp;
926736802407SRich Burridge
926836802407SRich Burridge if ((fp = fopen(usefile, "r")) != NULL) {
9269506ea5b8SMilan Jurik (void) fread(magic, sizeof (char), 6, fp);
927036802407SRich Burridge (void) fclose(fp);
927136802407SRich Burridge }
927236802407SRich Burridge
927336802407SRich Burridge if (memcmp(magic, GZIP_MAGIC, 2) == 0) {
927436802407SRich Burridge if (xflag || tflag) {
927536802407SRich Burridge compress_opt = compress_malloc(strlen(GZCAT) + 1);
927636802407SRich Burridge (void) strcpy(compress_opt, GZCAT);
927736802407SRich Burridge } else if (uflag || rflag) {
927836802407SRich Burridge compress_opt = compress_malloc(strlen(GZIP) + 1);
927936802407SRich Burridge (void) strcpy(compress_opt, GZIP);
928036802407SRich Burridge }
928136802407SRich Burridge } else if (memcmp(magic, BZIP_MAGIC, 2) == 0) {
928236802407SRich Burridge if (xflag || tflag) {
928336802407SRich Burridge compress_opt = compress_malloc(strlen(BZCAT) + 1);
928436802407SRich Burridge (void) strcpy(compress_opt, BZCAT);
928536802407SRich Burridge } else if (uflag || rflag) {
928636802407SRich Burridge compress_opt = compress_malloc(strlen(BZIP) + 1);
928736802407SRich Burridge (void) strcpy(compress_opt, BZIP);
928836802407SRich Burridge }
928936802407SRich Burridge } else if (memcmp(magic, COMP_MAGIC, 2) == 0) {
929036802407SRich Burridge if (xflag || tflag) {
929136802407SRich Burridge compress_opt = compress_malloc(strlen(ZCAT) + 1);
929236802407SRich Burridge (void) strcpy(compress_opt, ZCAT);
929336802407SRich Burridge } else if (uflag || rflag) {
929436802407SRich Burridge compress_opt = compress_malloc(strlen(COMPRESS) + 1);
929536802407SRich Burridge (void) strcpy(compress_opt, COMPRESS);
929636802407SRich Burridge }
9297506ea5b8SMilan Jurik } else if (memcmp(magic, XZ_MAGIC, 6) == 0) {
9298506ea5b8SMilan Jurik if (xflag || tflag) {
9299506ea5b8SMilan Jurik compress_opt = compress_malloc(strlen(XZCAT) + 1);
9300506ea5b8SMilan Jurik (void) strcpy(compress_opt, XZCAT);
9301506ea5b8SMilan Jurik } else if (uflag || rflag) {
9302506ea5b8SMilan Jurik compress_opt = compress_malloc(strlen(XZ) + 1);
9303506ea5b8SMilan Jurik (void) strcpy(compress_opt, XZ);
9304506ea5b8SMilan Jurik }
930536802407SRich Burridge }
930636802407SRich Burridge }
930736802407SRich Burridge
930836802407SRich Burridge char *
add_suffix()930936802407SRich Burridge add_suffix()
931036802407SRich Burridge {
931136802407SRich Burridge (void) strcpy(tfname, usefile);
931236802407SRich Burridge if (strcmp(compress_opt, GZIP) == 0) {
931336802407SRich Burridge if ((suffix = gz_suffix()) == NULL) {
931436802407SRich Burridge strlcat(tfname, gsuffix[0], sizeof (tfname));
931536802407SRich Burridge return (gsuffix[0]);
931636802407SRich Burridge }
931736802407SRich Burridge } else if (strcmp(compress_opt, COMPRESS) == 0) {
931836802407SRich Burridge if ((suffix = gz_suffix()) == NULL) {
931936802407SRich Burridge strlcat(tfname, gsuffix[6], sizeof (tfname));
932036802407SRich Burridge return (gsuffix[6]);
932136802407SRich Burridge }
932236802407SRich Burridge } else if (strcmp(compress_opt, BZIP) == 0) {
932336802407SRich Burridge if ((suffix = bz_suffix()) == NULL) {
932436802407SRich Burridge strlcat(tfname, bsuffix[0], sizeof (tfname));
932536802407SRich Burridge return (bsuffix[0]);
932636802407SRich Burridge }
9327506ea5b8SMilan Jurik } else if (strcmp(compress_opt, XZ) == 0) {
9328506ea5b8SMilan Jurik if ((suffix = xz_suffix()) == NULL) {
9329506ea5b8SMilan Jurik strlcat(tfname, xsuffix[0], sizeof (tfname));
9330506ea5b8SMilan Jurik return (xsuffix[0]);
9331506ea5b8SMilan Jurik }
933236802407SRich Burridge }
933336802407SRich Burridge return (NULL);
933436802407SRich Burridge }
933536802407SRich Burridge
933636802407SRich Burridge /* Decompressing a tar file using compression method from the file type */
933736802407SRich Burridge void
decompress_file(void)933836802407SRich Burridge decompress_file(void)
933936802407SRich Burridge {
934036802407SRich Burridge pid_t pid;
934136802407SRich Burridge char *added_suffix;
934236802407SRich Burridge
934336802407SRich Burridge
934436802407SRich Burridge added_suffix = add_suffix();
934536802407SRich Burridge if (added_suffix != NULL) {
934636802407SRich Burridge (void) rename(usefile, tfname);
934736802407SRich Burridge }
934836802407SRich Burridge if ((pid = fork()) == 0) {
934936802407SRich Burridge if (vflag) {
935036802407SRich Burridge (void) fprintf(vfile,
935136802407SRich Burridge gettext("Decompressing '%s' with "
935236802407SRich Burridge "'%s'...\n"), usefile, compress_opt);
935336802407SRich Burridge }
9354aa7166bdSMilan Jurik verify_compress_opt(compress_opt);
935536802407SRich Burridge (void) execlp(compress_opt, compress_opt, "-df",
935636802407SRich Burridge tfname, NULL);
935753329f75SRich Burridge vperror(1, gettext("Could not exec %s"), compress_opt);
935836802407SRich Burridge } else if (pid == -1) {
93598e4a71aeSRich Burridge vperror(1, gettext("Could not fork"));
936036802407SRich Burridge }
936136802407SRich Burridge wait_pid(pid);
936236802407SRich Burridge if (suffix != NULL) {
936336802407SRich Burridge /* restore the file name - original file was without suffix */
936436802407SRich Burridge *(usefile + strlen(usefile) - strlen(suffix)) = '\0';
936536802407SRich Burridge }
936636802407SRich Burridge }
936736802407SRich Burridge
936836802407SRich Burridge /* Set the archive for writing and then compress the archive */
936936802407SRich Burridge pid_t
compress_file(void)937036802407SRich Burridge compress_file(void)
937136802407SRich Burridge {
937236802407SRich Burridge int fd[2];
937336802407SRich Burridge pid_t pid;
937436802407SRich Burridge
937536802407SRich Burridge if (vflag) {
937636802407SRich Burridge (void) fprintf(vfile, gettext("Compressing '%s' with "
937736802407SRich Burridge "'%s'...\n"), usefile, compress_opt);
937836802407SRich Burridge }
937936802407SRich Burridge
938036802407SRich Burridge if (pipe(fd) < 0) {
938136802407SRich Burridge vperror(1, gettext("Could not create pipe"));
938236802407SRich Burridge }
9383c536b1f9SRobert Mustacchi if ((pid = fork()) > 0) {
938436802407SRich Burridge mt = fd[1];
938536802407SRich Burridge (void) close(fd[0]);
938636802407SRich Burridge return (pid);
938736802407SRich Burridge }
938836802407SRich Burridge /* child */
938936802407SRich Burridge (void) dup2(fd[0], STDIN_FILENO);
939036802407SRich Burridge (void) close(fd[1]);
939136802407SRich Burridge (void) dup2(mt, STDOUT_FILENO);
9392aa7166bdSMilan Jurik verify_compress_opt(compress_opt);
939336802407SRich Burridge (void) execlp(compress_opt, compress_opt, NULL);
939453329f75SRich Burridge vperror(1, gettext("Could not exec %s"), compress_opt);
939536802407SRich Burridge return (0); /*NOTREACHED*/
939636802407SRich Burridge }
939736802407SRich Burridge
939836802407SRich Burridge pid_t
uncompress_file(void)939936802407SRich Burridge uncompress_file(void)
940036802407SRich Burridge {
940136802407SRich Burridge int fd[2];
940236802407SRich Burridge pid_t pid;
940336802407SRich Burridge
940436802407SRich Burridge if (vflag) {
940536802407SRich Burridge (void) fprintf(vfile, gettext("Decompressing '%s' with "
940636802407SRich Burridge "'%s'...\n"), usefile, compress_opt);
940736802407SRich Burridge }
940836802407SRich Burridge
940936802407SRich Burridge if (pipe(fd) < 0) {
941036802407SRich Burridge vperror(1, gettext("Could not create pipe"));
941136802407SRich Burridge }
9412c536b1f9SRobert Mustacchi if ((pid = fork()) > 0) {
941336802407SRich Burridge mt = fd[0];
941436802407SRich Burridge (void) close(fd[1]);
941536802407SRich Burridge return (pid);
941636802407SRich Burridge }
941736802407SRich Burridge /* child */
941836802407SRich Burridge (void) dup2(fd[1], STDOUT_FILENO);
941936802407SRich Burridge (void) close(fd[0]);
942036802407SRich Burridge (void) dup2(mt, STDIN_FILENO);
9421aa7166bdSMilan Jurik verify_compress_opt(compress_opt);
942236802407SRich Burridge (void) execlp(compress_opt, compress_opt, NULL);
942353329f75SRich Burridge vperror(1, gettext("Could not exec %s"), compress_opt);
942436802407SRich Burridge return (0); /*NOTREACHED*/
942536802407SRich Burridge }
942636802407SRich Burridge
9427506ea5b8SMilan Jurik /* Checking suffix validity */
942836802407SRich Burridge char *
check_suffix(char ** suf,int size)9429506ea5b8SMilan Jurik check_suffix(char **suf, int size)
943036802407SRich Burridge {
943136802407SRich Burridge int i;
943236802407SRich Burridge int slen;
943336802407SRich Burridge int nlen = strlen(usefile);
943436802407SRich Burridge
9435506ea5b8SMilan Jurik for (i = 0; i < size; i++) {
9436506ea5b8SMilan Jurik slen = strlen(suf[i]);
943736802407SRich Burridge if (nlen < slen)
943836802407SRich Burridge return (NULL);
9439506ea5b8SMilan Jurik if (strcmp(usefile + nlen - slen, suf[i]) == 0)
9440506ea5b8SMilan Jurik return (suf[i]);
944136802407SRich Burridge }
944236802407SRich Burridge return (NULL);
9443506ea5b8SMilan Jurik }
9444506ea5b8SMilan Jurik
9445506ea5b8SMilan Jurik /* Checking valid 'bzip2' suffix */
9446506ea5b8SMilan Jurik char *
bz_suffix(void)9447506ea5b8SMilan Jurik bz_suffix(void)
9448506ea5b8SMilan Jurik {
9449506ea5b8SMilan Jurik return (check_suffix(bsuffix, BSUF));
945036802407SRich Burridge }
945136802407SRich Burridge
945236802407SRich Burridge /* Checking valid 'gzip' suffix */
945336802407SRich Burridge char *
gz_suffix(void)9454506ea5b8SMilan Jurik gz_suffix(void)
945536802407SRich Burridge {
9456506ea5b8SMilan Jurik return (check_suffix(gsuffix, GSUF));
945736802407SRich Burridge }
9458506ea5b8SMilan Jurik
9459506ea5b8SMilan Jurik /* Checking valid 'xz' suffix */
9460506ea5b8SMilan Jurik char *
xz_suffix(void)9461506ea5b8SMilan Jurik xz_suffix(void)
9462506ea5b8SMilan Jurik {
9463506ea5b8SMilan Jurik return (check_suffix(xsuffix, XSUF));
946436802407SRich Burridge }
946536802407SRich Burridge
946636802407SRich Burridge void *
compress_malloc(size_t size)946736802407SRich Burridge compress_malloc(size_t size)
946836802407SRich Burridge {
946936802407SRich Burridge void *opt;
947036802407SRich Burridge
947136802407SRich Burridge if ((opt = malloc(size)) == NULL) {
947236802407SRich Burridge vperror(1, "%s",
947336802407SRich Burridge gettext("Could not allocate compress buffer\n"));
947436802407SRich Burridge }
947536802407SRich Burridge return (opt);
947636802407SRich Burridge }
947736802407SRich Burridge
947836802407SRich Burridge void
wait_pid(pid_t pid)947936802407SRich Burridge wait_pid(pid_t pid)
948036802407SRich Burridge {
948136802407SRich Burridge int status;
948236802407SRich Burridge
948336802407SRich Burridge while (waitpid(pid, &status, 0) == -1 && errno == EINTR)
948436802407SRich Burridge ;
948536802407SRich Burridge }
9486aa7166bdSMilan Jurik
9487aa7166bdSMilan Jurik static void
verify_compress_opt(const char * t)9488aa7166bdSMilan Jurik verify_compress_opt(const char *t)
9489aa7166bdSMilan Jurik {
9490aa7166bdSMilan Jurik struct stat statbuf;
9491aa7166bdSMilan Jurik
9492aa7166bdSMilan Jurik if (stat(t, &statbuf) == -1)
9493aa7166bdSMilan Jurik vperror(1, "%s %s: %s\n", gettext("Could not stat"),
9494aa7166bdSMilan Jurik t, strerror(errno));
9495aa7166bdSMilan Jurik }
9496aa7166bdSMilan Jurik
9497aa7166bdSMilan Jurik static void
detect_compress(void)9498aa7166bdSMilan Jurik detect_compress(void)
9499aa7166bdSMilan Jurik {
9500aa7166bdSMilan Jurik char *zsuf[] = {".Z"};
9501aa7166bdSMilan Jurik if (check_suffix(zsuf, 1) != NULL) {
9502aa7166bdSMilan Jurik Zflag = 1;
9503aa7166bdSMilan Jurik } else if (check_suffix(bsuffix, BSUF) != NULL) {
9504aa7166bdSMilan Jurik jflag = 1;
9505aa7166bdSMilan Jurik } else if (check_suffix(gsuffix, GSUF) != NULL) {
9506aa7166bdSMilan Jurik zflag = 1;
9507aa7166bdSMilan Jurik } else if (check_suffix(xsuffix, XSUF) != NULL) {
9508aa7166bdSMilan Jurik Jflag = 1;
9509aa7166bdSMilan Jurik } else {
9510aa7166bdSMilan Jurik vperror(1, "%s\n", gettext("No compression method detected"));
9511aa7166bdSMilan Jurik }
9512aa7166bdSMilan Jurik }
9513