17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 545916cd2Sjpk * Common Development and Distribution License (the "License"). 645916cd2Sjpk * You may not use this file except in compliance with the License. 77c478bd9Sstevel@tonic-gate * 87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 117c478bd9Sstevel@tonic-gate * and limitations under the License. 127c478bd9Sstevel@tonic-gate * 137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 187c478bd9Sstevel@tonic-gate * 197c478bd9Sstevel@tonic-gate * CDDL HEADER END 207c478bd9Sstevel@tonic-gate */ 217c478bd9Sstevel@tonic-gate /* 22257ece65SRalph Turner - Sun UK - Contractor * Copyright (c) 1988, 2010, Oracle and/or its affiliates. All rights reserved. 23*506ea5b8SMilan Jurik * Copyright 2012 Milan Jurik. All rights reserved. 247c478bd9Sstevel@tonic-gate */ 257c478bd9Sstevel@tonic-gate 267c478bd9Sstevel@tonic-gate /* Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T */ 277c478bd9Sstevel@tonic-gate /* All Rights Reserved */ 287c478bd9Sstevel@tonic-gate 297c478bd9Sstevel@tonic-gate /* Copyright (c) 1987, 1988 Microsoft Corporation */ 307c478bd9Sstevel@tonic-gate /* All Rights Reserved */ 317c478bd9Sstevel@tonic-gate 327c478bd9Sstevel@tonic-gate /* 337c478bd9Sstevel@tonic-gate * Portions of this source code were derived from Berkeley 4.3 BSD 347c478bd9Sstevel@tonic-gate * under license from the Regents of the University of California. 357c478bd9Sstevel@tonic-gate */ 367c478bd9Sstevel@tonic-gate 377c478bd9Sstevel@tonic-gate #include <unistd.h> 387c478bd9Sstevel@tonic-gate #include <sys/types.h> 397c478bd9Sstevel@tonic-gate #include <sys/param.h> 407c478bd9Sstevel@tonic-gate #include <sys/stat.h> 417c478bd9Sstevel@tonic-gate #include <sys/mkdev.h> 427c478bd9Sstevel@tonic-gate #include <sys/wait.h> 437c478bd9Sstevel@tonic-gate #include <dirent.h> 447c478bd9Sstevel@tonic-gate #include <errno.h> 457c478bd9Sstevel@tonic-gate #include <stdio.h> 467c478bd9Sstevel@tonic-gate #include <signal.h> 477c478bd9Sstevel@tonic-gate #include <ctype.h> 487c478bd9Sstevel@tonic-gate #include <locale.h> 497c478bd9Sstevel@tonic-gate #include <nl_types.h> 507c478bd9Sstevel@tonic-gate #include <langinfo.h> 517c478bd9Sstevel@tonic-gate #include <pwd.h> 527c478bd9Sstevel@tonic-gate #include <grp.h> 537c478bd9Sstevel@tonic-gate #include <fcntl.h> 547c478bd9Sstevel@tonic-gate #include <string.h> 557c478bd9Sstevel@tonic-gate #include <malloc.h> 567c478bd9Sstevel@tonic-gate #include <time.h> 577c478bd9Sstevel@tonic-gate #include <utime.h> 587c478bd9Sstevel@tonic-gate #include <stdlib.h> 597c478bd9Sstevel@tonic-gate #include <stdarg.h> 607c478bd9Sstevel@tonic-gate #include <widec.h> 617c478bd9Sstevel@tonic-gate #include <sys/mtio.h> 627c478bd9Sstevel@tonic-gate #include <sys/acl.h> 637c478bd9Sstevel@tonic-gate #include <strings.h> 647c478bd9Sstevel@tonic-gate #include <deflt.h> 657c478bd9Sstevel@tonic-gate #include <limits.h> 667c478bd9Sstevel@tonic-gate #include <iconv.h> 677c478bd9Sstevel@tonic-gate #include <assert.h> 68da6c28aaSamw #include <libgen.h> 69da6c28aaSamw #include <libintl.h> 70fa9e4066Sahrens #include <aclutils.h> 71da6c28aaSamw #include <libnvpair.h> 72da6c28aaSamw #include <archives.h> 733d63ea05Sas145665 747c478bd9Sstevel@tonic-gate #if defined(__SunOS_5_6) || defined(__SunOS_5_7) 757c478bd9Sstevel@tonic-gate extern int defcntl(); 767c478bd9Sstevel@tonic-gate #endif 77da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 78da6c28aaSamw #include <attr.h> 79da6c28aaSamw #include <libcmdutils.h> 80da6c28aaSamw #endif 817c478bd9Sstevel@tonic-gate 8245916cd2Sjpk /* Trusted Extensions */ 8345916cd2Sjpk #include <zone.h> 8445916cd2Sjpk #include <tsol/label.h> 8545916cd2Sjpk #include <sys/tsol/label_macro.h> 8645916cd2Sjpk 87da6c28aaSamw #include "getresponse.h" 887c478bd9Sstevel@tonic-gate /* 897c478bd9Sstevel@tonic-gate * Source compatibility 907c478bd9Sstevel@tonic-gate */ 917c478bd9Sstevel@tonic-gate 927c478bd9Sstevel@tonic-gate /* 937c478bd9Sstevel@tonic-gate * These constants come from archives.h and sys/fcntl.h 947c478bd9Sstevel@tonic-gate * and were introduced by the extended attributes project 957c478bd9Sstevel@tonic-gate * in Solaris 9. 967c478bd9Sstevel@tonic-gate */ 977c478bd9Sstevel@tonic-gate #if !defined(O_XATTR) 987c478bd9Sstevel@tonic-gate #define AT_SYMLINK_NOFOLLOW 0x1000 997c478bd9Sstevel@tonic-gate #define AT_REMOVEDIR 0x1 1007c478bd9Sstevel@tonic-gate #define AT_FDCWD 0xffd19553 1017c478bd9Sstevel@tonic-gate #define _XATTR_HDRTYPE 'E' 1027c478bd9Sstevel@tonic-gate static int attropen(); 1037c478bd9Sstevel@tonic-gate static int fstatat(); 1047c478bd9Sstevel@tonic-gate static int renameat(); 1057c478bd9Sstevel@tonic-gate static int unlinkat(); 1067c478bd9Sstevel@tonic-gate static int openat(); 1077c478bd9Sstevel@tonic-gate static int fchownat(); 1087c478bd9Sstevel@tonic-gate static int futimesat(); 1097c478bd9Sstevel@tonic-gate #endif 1107c478bd9Sstevel@tonic-gate 1117c478bd9Sstevel@tonic-gate /* 1127c478bd9Sstevel@tonic-gate * Compiling with -D_XPG4_2 gets this but produces other problems, so 1137c478bd9Sstevel@tonic-gate * instead of including sys/time.h and compiling with -D_XPG4_2, I'm 1147c478bd9Sstevel@tonic-gate * explicitly doing the declaration here. 1157c478bd9Sstevel@tonic-gate */ 1167c478bd9Sstevel@tonic-gate int utimes(const char *path, const struct timeval timeval_ptr[]); 1177c478bd9Sstevel@tonic-gate 1187c478bd9Sstevel@tonic-gate #ifndef MINSIZE 1197c478bd9Sstevel@tonic-gate #define MINSIZE 250 1207c478bd9Sstevel@tonic-gate #endif 1217c478bd9Sstevel@tonic-gate #define DEF_FILE "/etc/default/tar" 1227c478bd9Sstevel@tonic-gate 1237c478bd9Sstevel@tonic-gate #define min(a, b) ((a) < (b) ? (a) : (b)) 1247c478bd9Sstevel@tonic-gate #define max(a, b) ((a) > (b) ? (a) : (b)) 1257c478bd9Sstevel@tonic-gate 1267c478bd9Sstevel@tonic-gate /* -DDEBUG ONLY for debugging */ 1277c478bd9Sstevel@tonic-gate #ifdef DEBUG 1287c478bd9Sstevel@tonic-gate #undef DEBUG 1297c478bd9Sstevel@tonic-gate #define DEBUG(a, b, c)\ 1307c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "DEBUG - "), (void) fprintf(stderr, a, b, c) 1317c478bd9Sstevel@tonic-gate #endif 1327c478bd9Sstevel@tonic-gate 1337c478bd9Sstevel@tonic-gate #define TBLOCK 512 /* tape block size--should be universal */ 1347c478bd9Sstevel@tonic-gate 1357c478bd9Sstevel@tonic-gate #ifdef BSIZE 1367c478bd9Sstevel@tonic-gate #define SYS_BLOCK BSIZE /* from sys/param.h: secondary block size */ 1377c478bd9Sstevel@tonic-gate #else /* BSIZE */ 1387c478bd9Sstevel@tonic-gate #define SYS_BLOCK 512 /* default if no BSIZE in param.h */ 1397c478bd9Sstevel@tonic-gate #endif /* BSIZE */ 1407c478bd9Sstevel@tonic-gate 1417c478bd9Sstevel@tonic-gate #define NBLOCK 20 1427c478bd9Sstevel@tonic-gate #define NAMSIZ 100 1437c478bd9Sstevel@tonic-gate #define PRESIZ 155 1447c478bd9Sstevel@tonic-gate #define MAXNAM 256 1457c478bd9Sstevel@tonic-gate #define MODEMASK 0777777 /* file creation mode mask */ 1467c478bd9Sstevel@tonic-gate #define POSIXMODES 07777 /* mask for POSIX mode bits */ 1477c478bd9Sstevel@tonic-gate #define MAXEXT 9 /* reasonable max # extents for a file */ 1487c478bd9Sstevel@tonic-gate #define EXTMIN 50 /* min blks left on floppy to split a file */ 1497c478bd9Sstevel@tonic-gate 1507c478bd9Sstevel@tonic-gate /* max value dblock.dbuf.efsize can store */ 1517c478bd9Sstevel@tonic-gate #define TAR_EFSIZE_MAX 0777777777 1527c478bd9Sstevel@tonic-gate 1537c478bd9Sstevel@tonic-gate /* 1547c478bd9Sstevel@tonic-gate * Symbols which specify the values at which the use of the 'E' function 1557c478bd9Sstevel@tonic-gate * modifier is required to properly store a file. 1567c478bd9Sstevel@tonic-gate * 1577c478bd9Sstevel@tonic-gate * TAR_OFFSET_MAX - the largest file size we can archive 1587c478bd9Sstevel@tonic-gate * OCTAL7CHAR - the limit for ustar gid, uid, dev 1597c478bd9Sstevel@tonic-gate */ 1607c478bd9Sstevel@tonic-gate 1617c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG 1627c478bd9Sstevel@tonic-gate /* tiny values which force the creation of extended header entries */ 1637c478bd9Sstevel@tonic-gate #define TAR_OFFSET_MAX 9 1647c478bd9Sstevel@tonic-gate #define OCTAL7CHAR 2 1657c478bd9Sstevel@tonic-gate #else 1667c478bd9Sstevel@tonic-gate /* normal values */ 167b7d62af5Sceastha #define TAR_OFFSET_MAX 077777777777ULL 1687c478bd9Sstevel@tonic-gate #define OCTAL7CHAR 07777777 1697c478bd9Sstevel@tonic-gate #endif 1707c478bd9Sstevel@tonic-gate 1717c478bd9Sstevel@tonic-gate #define TBLOCKS(bytes) (((bytes) + TBLOCK - 1) / TBLOCK) 1727c478bd9Sstevel@tonic-gate #define K(tblocks) ((tblocks+1)/2) /* tblocks to Kbytes for printing */ 1737c478bd9Sstevel@tonic-gate 1747c478bd9Sstevel@tonic-gate #define MAXLEV (PATH_MAX / 2) 1757c478bd9Sstevel@tonic-gate #define LEV0 1 1767c478bd9Sstevel@tonic-gate #define SYMLINK_LEV0 0 1777c478bd9Sstevel@tonic-gate 1787c478bd9Sstevel@tonic-gate #define TRUE 1 1797c478bd9Sstevel@tonic-gate #define FALSE 0 1807c478bd9Sstevel@tonic-gate 1817c478bd9Sstevel@tonic-gate #define XATTR_FILE 1 1827c478bd9Sstevel@tonic-gate #define NORMAL_FILE 0 1837c478bd9Sstevel@tonic-gate 1847c478bd9Sstevel@tonic-gate #define PUT_AS_LINK 1 1857c478bd9Sstevel@tonic-gate #define PUT_NOTAS_LINK 0 1867c478bd9Sstevel@tonic-gate 187da6c28aaSamw #ifndef VIEW_READONLY 188da6c28aaSamw #define VIEW_READONLY "SUNWattr_ro" 189da6c28aaSamw #endif 190da6c28aaSamw 191da6c28aaSamw #ifndef VIEW_READWRITE 192da6c28aaSamw #define VIEW_READWRITE "SUNWattr_rw" 193da6c28aaSamw #endif 194da6c28aaSamw 1957c478bd9Sstevel@tonic-gate #if _FILE_OFFSET_BITS == 64 1967c478bd9Sstevel@tonic-gate #define FMT_off_t "lld" 1977c478bd9Sstevel@tonic-gate #define FMT_off_t_o "llo" 1987c478bd9Sstevel@tonic-gate #define FMT_blkcnt_t "lld" 1997c478bd9Sstevel@tonic-gate #else 2007c478bd9Sstevel@tonic-gate #define FMT_off_t "ld" 2017c478bd9Sstevel@tonic-gate #define FMT_off_t_o "lo" 2027c478bd9Sstevel@tonic-gate #define FMT_blkcnt_t "ld" 2037c478bd9Sstevel@tonic-gate #endif 2047c478bd9Sstevel@tonic-gate 2057c478bd9Sstevel@tonic-gate /* ACL support */ 2067c478bd9Sstevel@tonic-gate 2077c478bd9Sstevel@tonic-gate static 2087c478bd9Sstevel@tonic-gate struct sec_attr { 2097c478bd9Sstevel@tonic-gate char attr_type; 2107c478bd9Sstevel@tonic-gate char attr_len[7]; 2117c478bd9Sstevel@tonic-gate char attr_info[1]; 2127c478bd9Sstevel@tonic-gate } *attr; 2137c478bd9Sstevel@tonic-gate 214da6c28aaSamw #if defined(O_XATTR) 215da6c28aaSamw typedef enum { 216da6c28aaSamw ATTR_OK, 217da6c28aaSamw ATTR_SKIP, 218da6c28aaSamw ATTR_CHDIR_ERR, 219da6c28aaSamw ATTR_OPEN_ERR, 220da6c28aaSamw ATTR_XATTR_ERR, 221da6c28aaSamw ATTR_SATTR_ERR 222da6c28aaSamw } attr_status_t; 223da6c28aaSamw #endif 224da6c28aaSamw 225da6c28aaSamw #if defined(O_XATTR) 226da6c28aaSamw typedef enum { 227da6c28aaSamw ARC_CREATE, 228da6c28aaSamw ARC_RESTORE 229da6c28aaSamw } arc_action_t; 230da6c28aaSamw #endif 231da6c28aaSamw 232da6c28aaSamw typedef struct attr_data { 233da6c28aaSamw char *attr_parent; 234da6c28aaSamw char *attr_path; 235da6c28aaSamw int attr_parentfd; 236da6c28aaSamw int attr_rw_sysattr; 237da6c28aaSamw } attr_data_t; 238da6c28aaSamw 2397c478bd9Sstevel@tonic-gate /* 2407c478bd9Sstevel@tonic-gate * 2417c478bd9Sstevel@tonic-gate * Tar has been changed to support extended attributes. 2427c478bd9Sstevel@tonic-gate * 2437c478bd9Sstevel@tonic-gate * As part of this change tar now uses the new *at() syscalls 2447c478bd9Sstevel@tonic-gate * such as openat, fchownat(), unlinkat()... 2457c478bd9Sstevel@tonic-gate * 2467c478bd9Sstevel@tonic-gate * This was done so that attributes can be handled with as few code changes 2477c478bd9Sstevel@tonic-gate * as possible. 2487c478bd9Sstevel@tonic-gate * 2497c478bd9Sstevel@tonic-gate * What this means is that tar now opens the directory that a file or directory 2507c478bd9Sstevel@tonic-gate * resides in and then performs *at() functions to manipulate the entry. 2517c478bd9Sstevel@tonic-gate * 2527c478bd9Sstevel@tonic-gate * For example a new file is now created like this: 2537c478bd9Sstevel@tonic-gate * 2547c478bd9Sstevel@tonic-gate * dfd = open(<some dir path>) 2557c478bd9Sstevel@tonic-gate * fd = openat(dfd, <name>,....); 2567c478bd9Sstevel@tonic-gate * 2577c478bd9Sstevel@tonic-gate * or in the case of an extended attribute 2587c478bd9Sstevel@tonic-gate * 2597c478bd9Sstevel@tonic-gate * dfd = attropen(<pathname>, ".", ....) 2607c478bd9Sstevel@tonic-gate * 2617c478bd9Sstevel@tonic-gate * Once we have a directory file descriptor all of the *at() functions can 2627c478bd9Sstevel@tonic-gate * be applied to it. 2637c478bd9Sstevel@tonic-gate * 2647c478bd9Sstevel@tonic-gate * unlinkat(dfd, <component name>,...) 2657c478bd9Sstevel@tonic-gate * fchownat(dfd, <component name>,..) 2667c478bd9Sstevel@tonic-gate * 2677c478bd9Sstevel@tonic-gate * This works for both normal namespace files and extended attribute file 2687c478bd9Sstevel@tonic-gate * 2697c478bd9Sstevel@tonic-gate */ 2707c478bd9Sstevel@tonic-gate 2717c478bd9Sstevel@tonic-gate /* 2727c478bd9Sstevel@tonic-gate * 2737c478bd9Sstevel@tonic-gate * Extended attribute Format 2747c478bd9Sstevel@tonic-gate * 2757c478bd9Sstevel@tonic-gate * Extended attributes are stored in two pieces. 2767c478bd9Sstevel@tonic-gate * 1. An attribute header which has information about 2777c478bd9Sstevel@tonic-gate * what file the attribute is for and what the attribute 2787c478bd9Sstevel@tonic-gate * is named. 2797c478bd9Sstevel@tonic-gate * 2. The attribute record itself. Stored as a normal file type 2807c478bd9Sstevel@tonic-gate * of entry. 2817c478bd9Sstevel@tonic-gate * Both the header and attribute record have special modes/typeflags 2827c478bd9Sstevel@tonic-gate * associated with them. 2837c478bd9Sstevel@tonic-gate * 2847c478bd9Sstevel@tonic-gate * The names of the header in the archive look like: 2857c478bd9Sstevel@tonic-gate * /dev/null/attr.hdr 2867c478bd9Sstevel@tonic-gate * 2877c478bd9Sstevel@tonic-gate * The name of the attribute looks like: 2887c478bd9Sstevel@tonic-gate * /dev/null/attr 2897c478bd9Sstevel@tonic-gate * 2907c478bd9Sstevel@tonic-gate * This is done so that an archiver that doesn't understand these formats 2917c478bd9Sstevel@tonic-gate * can just dispose of the attribute records. 2927c478bd9Sstevel@tonic-gate * 2937c478bd9Sstevel@tonic-gate * The format is composed of a fixed size header followed 2947c478bd9Sstevel@tonic-gate * by a variable sized xattr_buf. If the attribute is a hard link 2957c478bd9Sstevel@tonic-gate * to another attribute then another xattr_buf section is included 2967c478bd9Sstevel@tonic-gate * for the link. 2977c478bd9Sstevel@tonic-gate * 2987c478bd9Sstevel@tonic-gate * The xattr_buf is used to define the necessary "pathing" steps 2997c478bd9Sstevel@tonic-gate * to get to the extended attribute. This is necessary to support 3007c478bd9Sstevel@tonic-gate * a fully recursive attribute model where an attribute may itself 3017c478bd9Sstevel@tonic-gate * have an attribute. 3027c478bd9Sstevel@tonic-gate * 3037c478bd9Sstevel@tonic-gate * The basic layout looks like this. 3047c478bd9Sstevel@tonic-gate * 3057c478bd9Sstevel@tonic-gate * -------------------------------- 3067c478bd9Sstevel@tonic-gate * | | 3077c478bd9Sstevel@tonic-gate * | xattr_hdr | 3087c478bd9Sstevel@tonic-gate * | | 3097c478bd9Sstevel@tonic-gate * -------------------------------- 3107c478bd9Sstevel@tonic-gate * -------------------------------- 3117c478bd9Sstevel@tonic-gate * | | 3127c478bd9Sstevel@tonic-gate * | xattr_buf | 3137c478bd9Sstevel@tonic-gate * | | 3147c478bd9Sstevel@tonic-gate * -------------------------------- 3157c478bd9Sstevel@tonic-gate * -------------------------------- 3167c478bd9Sstevel@tonic-gate * | | 3177c478bd9Sstevel@tonic-gate * | (optional link info) | 3187c478bd9Sstevel@tonic-gate * | | 3197c478bd9Sstevel@tonic-gate * -------------------------------- 3207c478bd9Sstevel@tonic-gate * -------------------------------- 3217c478bd9Sstevel@tonic-gate * | | 3227c478bd9Sstevel@tonic-gate * | attribute itself | 3237c478bd9Sstevel@tonic-gate * | stored as normal tar | 3247c478bd9Sstevel@tonic-gate * | or cpio data with | 3257c478bd9Sstevel@tonic-gate * | special mode or | 3267c478bd9Sstevel@tonic-gate * | typeflag | 3277c478bd9Sstevel@tonic-gate * | | 3287c478bd9Sstevel@tonic-gate * -------------------------------- 3297c478bd9Sstevel@tonic-gate * 3307c478bd9Sstevel@tonic-gate */ 3317c478bd9Sstevel@tonic-gate 3327c478bd9Sstevel@tonic-gate /* 3337c478bd9Sstevel@tonic-gate * xattrhead is a pointer to the xattr_hdr 3347c478bd9Sstevel@tonic-gate * 3357c478bd9Sstevel@tonic-gate * xattrp is a pointer to the xattr_buf structure 3367c478bd9Sstevel@tonic-gate * which contains the "pathing" steps to get to attributes 3377c478bd9Sstevel@tonic-gate * 3387c478bd9Sstevel@tonic-gate * xattr_linkp is a pointer to another xattr_buf structure that is 3397c478bd9Sstevel@tonic-gate * only used when an attribute is actually linked to another attribute 3407c478bd9Sstevel@tonic-gate * 3417c478bd9Sstevel@tonic-gate */ 3427c478bd9Sstevel@tonic-gate 3437c478bd9Sstevel@tonic-gate static struct xattr_hdr *xattrhead; 3447c478bd9Sstevel@tonic-gate static struct xattr_buf *xattrp; 3457c478bd9Sstevel@tonic-gate static struct xattr_buf *xattr_linkp; /* pointer to link info, if any */ 346da6c28aaSamw static char *xattrapath; /* attribute name */ 3477c478bd9Sstevel@tonic-gate static char *xattr_linkaname; /* attribute attribute is linked to */ 3487c478bd9Sstevel@tonic-gate static char Hiddendir; /* are we processing hidden xattr dir */ 3497c478bd9Sstevel@tonic-gate static char xattrbadhead; 3507c478bd9Sstevel@tonic-gate 3517c478bd9Sstevel@tonic-gate /* Was statically allocated tbuf[NBLOCK] */ 3527c478bd9Sstevel@tonic-gate static 3537c478bd9Sstevel@tonic-gate union hblock { 3547c478bd9Sstevel@tonic-gate char dummy[TBLOCK]; 3557c478bd9Sstevel@tonic-gate struct header { 3567c478bd9Sstevel@tonic-gate char name[NAMSIZ]; /* If non-null prefix, path is */ 3577c478bd9Sstevel@tonic-gate /* <prefix>/<name>; otherwise */ 3587c478bd9Sstevel@tonic-gate /* <name> */ 3597c478bd9Sstevel@tonic-gate char mode[8]; 3607c478bd9Sstevel@tonic-gate char uid[8]; 3617c478bd9Sstevel@tonic-gate char gid[8]; 3627c478bd9Sstevel@tonic-gate char size[12]; /* size of this extent if file split */ 3637c478bd9Sstevel@tonic-gate char mtime[12]; 3647c478bd9Sstevel@tonic-gate char chksum[8]; 3657c478bd9Sstevel@tonic-gate char typeflag; 3667c478bd9Sstevel@tonic-gate char linkname[NAMSIZ]; 3677c478bd9Sstevel@tonic-gate char magic[6]; 3687c478bd9Sstevel@tonic-gate char version[2]; 3697c478bd9Sstevel@tonic-gate char uname[32]; 3707c478bd9Sstevel@tonic-gate char gname[32]; 3717c478bd9Sstevel@tonic-gate char devmajor[8]; 3727c478bd9Sstevel@tonic-gate char devminor[8]; 3737c478bd9Sstevel@tonic-gate char prefix[PRESIZ]; /* Together with "name", the path of */ 3747c478bd9Sstevel@tonic-gate /* the file: <prefix>/<name> */ 3757c478bd9Sstevel@tonic-gate char extno; /* extent #, null if not split */ 3767c478bd9Sstevel@tonic-gate char extotal; /* total extents */ 3777c478bd9Sstevel@tonic-gate char efsize[10]; /* size of entire file */ 3787c478bd9Sstevel@tonic-gate } dbuf; 3797c478bd9Sstevel@tonic-gate } dblock, *tbuf, xhdr_buf; 3807c478bd9Sstevel@tonic-gate 3817c478bd9Sstevel@tonic-gate static 3827c478bd9Sstevel@tonic-gate struct xtar_hdr { 3837c478bd9Sstevel@tonic-gate uid_t x_uid, /* Uid of file */ 3847c478bd9Sstevel@tonic-gate x_gid; /* Gid of file */ 3857c478bd9Sstevel@tonic-gate major_t x_devmajor; /* Device major node */ 3867c478bd9Sstevel@tonic-gate minor_t x_devminor; /* Device minor node */ 3877c478bd9Sstevel@tonic-gate off_t x_filesz; /* Length of file */ 3887c478bd9Sstevel@tonic-gate char *x_uname, /* Pointer to name of user */ 3897c478bd9Sstevel@tonic-gate *x_gname, /* Pointer to gid of user */ 3907c478bd9Sstevel@tonic-gate *x_linkpath, /* Path for a hard/symbolic link */ 3917c478bd9Sstevel@tonic-gate *x_path; /* Path of file */ 3927c478bd9Sstevel@tonic-gate timestruc_t x_mtime; /* Seconds and nanoseconds */ 3937c478bd9Sstevel@tonic-gate } Xtarhdr; 3947c478bd9Sstevel@tonic-gate 3957c478bd9Sstevel@tonic-gate static 3967c478bd9Sstevel@tonic-gate struct gen_hdr { 3977c478bd9Sstevel@tonic-gate ulong_t g_mode; /* Mode of file */ 3987c478bd9Sstevel@tonic-gate uid_t g_uid, /* Uid of file */ 3997c478bd9Sstevel@tonic-gate g_gid; /* Gid of file */ 4007c478bd9Sstevel@tonic-gate off_t g_filesz; /* Length of file */ 4017c478bd9Sstevel@tonic-gate time_t g_mtime; /* Modification time */ 4027c478bd9Sstevel@tonic-gate uint_t g_cksum; /* Checksum of file */ 4037c478bd9Sstevel@tonic-gate ulong_t g_devmajor, /* File system of file */ 4047c478bd9Sstevel@tonic-gate g_devminor; /* Major/minor of special files */ 4057c478bd9Sstevel@tonic-gate } Gen; 4067c478bd9Sstevel@tonic-gate 4077c478bd9Sstevel@tonic-gate static 4087c478bd9Sstevel@tonic-gate struct linkbuf { 4097c478bd9Sstevel@tonic-gate ino_t inum; 4107c478bd9Sstevel@tonic-gate dev_t devnum; 4117c478bd9Sstevel@tonic-gate int count; 4127c478bd9Sstevel@tonic-gate char pathname[MAXNAM+1]; /* added 1 for last NULL */ 4137c478bd9Sstevel@tonic-gate char attrname[MAXNAM+1]; 4147c478bd9Sstevel@tonic-gate struct linkbuf *nextp; 4157c478bd9Sstevel@tonic-gate } *ihead; 4167c478bd9Sstevel@tonic-gate 4177c478bd9Sstevel@tonic-gate /* see comments before build_table() */ 4187c478bd9Sstevel@tonic-gate #define TABLE_SIZE 512 4195e2174acSceastha typedef struct file_list { 4207c478bd9Sstevel@tonic-gate char *name; /* Name of file to {in,ex}clude */ 4217c478bd9Sstevel@tonic-gate struct file_list *next; /* Linked list */ 4225e2174acSceastha } file_list_t; 4235e2174acSceastha static file_list_t *exclude_tbl[TABLE_SIZE], 4247c478bd9Sstevel@tonic-gate *include_tbl[TABLE_SIZE]; 4257c478bd9Sstevel@tonic-gate 42645916cd2Sjpk static int append_secattr(char **, int *, int, char *, char); 4277c478bd9Sstevel@tonic-gate static void write_ancillary(union hblock *, char *, int, char); 4287c478bd9Sstevel@tonic-gate 4295e2174acSceastha static void add_file_to_table(file_list_t *table[], char *str); 4307c478bd9Sstevel@tonic-gate static void assert_string(char *s, char *msg); 4317c478bd9Sstevel@tonic-gate static int istape(int fd, int type); 4327c478bd9Sstevel@tonic-gate static void backtape(void); 4335e2174acSceastha static void build_table(file_list_t *table[], char *file); 434da6c28aaSamw static int check_prefix(char **namep, char **dirp, char **compp); 4357c478bd9Sstevel@tonic-gate static void closevol(void); 4367c478bd9Sstevel@tonic-gate static void copy(void *dst, void *src); 4377c478bd9Sstevel@tonic-gate static int convtoreg(off_t); 4382c0f0499Slovely static void delete_target(int fd, char *comp, char *namep); 4397c478bd9Sstevel@tonic-gate static void doDirTimes(char *name, timestruc_t modTime); 4407c478bd9Sstevel@tonic-gate static void done(int n); 4417c478bd9Sstevel@tonic-gate static void dorep(char *argv[]); 4427c478bd9Sstevel@tonic-gate static void dotable(char *argv[]); 4437c478bd9Sstevel@tonic-gate static void doxtract(char *argv[]); 444b25dbf38SRich Burridge static int tar_chdir(const char *path); 4453a1dab68SRich Burridge static int is_directory(char *name); 4461a431409SRich Burridge static int has_dot_dot(char *name); 4471a431409SRich Burridge static int is_absolute(char *name); 4481a431409SRich Burridge static char *make_relative_name(char *name, char **stripped_prefix); 4497c478bd9Sstevel@tonic-gate static void fatal(char *format, ...); 4507c478bd9Sstevel@tonic-gate static void vperror(int exit_status, char *fmt, ...); 4517c478bd9Sstevel@tonic-gate static void flushtape(void); 4527c478bd9Sstevel@tonic-gate static void getdir(void); 4537c478bd9Sstevel@tonic-gate static void *getmem(size_t); 4547c478bd9Sstevel@tonic-gate static void longt(struct stat *st, char aclchar); 455123523f8Sas158974 static void load_info_from_xtarhdr(u_longlong_t flag, struct xtar_hdr *xhdrp); 4567c478bd9Sstevel@tonic-gate static int makeDir(char *name); 4577c478bd9Sstevel@tonic-gate static void mterr(char *operation, int i, int exitcode); 4587c478bd9Sstevel@tonic-gate static void newvol(void); 4597c478bd9Sstevel@tonic-gate static void passtape(void); 4607c478bd9Sstevel@tonic-gate static void putempty(blkcnt_t n); 4617c478bd9Sstevel@tonic-gate static int putfile(char *longname, char *shortname, char *parent, 462da6c28aaSamw attr_data_t *attrinfo, int filetype, int lev, int symlink_lev); 4637c478bd9Sstevel@tonic-gate static void readtape(char *buffer); 4647c478bd9Sstevel@tonic-gate static void seekdisk(blkcnt_t blocks); 4657c478bd9Sstevel@tonic-gate static void setPathTimes(int dirfd, char *path, timestruc_t modTime); 466123523f8Sas158974 static void setbytes_to_skip(struct stat *st, int err); 4677c478bd9Sstevel@tonic-gate static void splitfile(char *longname, int ifd, char *name, 4687c478bd9Sstevel@tonic-gate char *prefix, int filetype); 4697c478bd9Sstevel@tonic-gate static void tomodes(struct stat *sp); 4707c478bd9Sstevel@tonic-gate static void usage(void); 471da6c28aaSamw static int xblocks(int issysattr, off_t bytes, int ofile); 472da6c28aaSamw static int xsfile(int issysattr, int ofd); 4737c478bd9Sstevel@tonic-gate static void resugname(int dirfd, char *name, int symflag); 4747c478bd9Sstevel@tonic-gate static int bcheck(char *bstr); 4757c478bd9Sstevel@tonic-gate static int checkdir(char *name); 4767c478bd9Sstevel@tonic-gate static int checksum(union hblock *dblockp); 4777c478bd9Sstevel@tonic-gate #ifdef EUC 4787c478bd9Sstevel@tonic-gate static int checksum_signed(union hblock *dblockp); 4797c478bd9Sstevel@tonic-gate #endif /* EUC */ 4807c478bd9Sstevel@tonic-gate static int checkupdate(char *arg); 4817c478bd9Sstevel@tonic-gate static int checkw(char c, char *name); 4827c478bd9Sstevel@tonic-gate static int cmp(char *b, char *s, int n); 4837c478bd9Sstevel@tonic-gate static int defset(char *arch); 4847c478bd9Sstevel@tonic-gate static int endtape(void); 4855e2174acSceastha static int is_in_table(file_list_t *table[], char *str); 4867c478bd9Sstevel@tonic-gate static int notsame(void); 4877c478bd9Sstevel@tonic-gate static int is_prefix(char *s1, char *s2); 4887c478bd9Sstevel@tonic-gate static int response(void); 4897c478bd9Sstevel@tonic-gate static int build_dblock(const char *, const char *, const char, 4907c478bd9Sstevel@tonic-gate const int filetype, const struct stat *, const dev_t, const char *); 4917c478bd9Sstevel@tonic-gate static unsigned int hash(char *str); 4927c478bd9Sstevel@tonic-gate 4937c478bd9Sstevel@tonic-gate static blkcnt_t kcheck(char *kstr); 4947c478bd9Sstevel@tonic-gate static off_t bsrch(char *s, int n, off_t l, off_t h); 4957c478bd9Sstevel@tonic-gate static void onintr(int sig); 4967c478bd9Sstevel@tonic-gate static void onquit(int sig); 4977c478bd9Sstevel@tonic-gate static void onhup(int sig); 4987c478bd9Sstevel@tonic-gate static uid_t getuidbyname(char *); 4997c478bd9Sstevel@tonic-gate static gid_t getgidbyname(char *); 5007c478bd9Sstevel@tonic-gate static char *getname(gid_t); 5017c478bd9Sstevel@tonic-gate static char *getgroup(gid_t); 5027c478bd9Sstevel@tonic-gate static int checkf(char *name, int mode, int howmuch); 5037c478bd9Sstevel@tonic-gate static int writetbuf(char *buffer, int n); 504da6c28aaSamw static int wantit(char *argv[], char **namep, char **dirp, char **comp, 505da6c28aaSamw attr_data_t **attrinfo); 50645916cd2Sjpk static void append_ext_attr(char *shortname, char **secinfo, int *len); 5077c478bd9Sstevel@tonic-gate static int get_xdata(void); 5087c478bd9Sstevel@tonic-gate static void gen_num(const char *keyword, const u_longlong_t number); 5097c478bd9Sstevel@tonic-gate static void gen_date(const char *keyword, const timestruc_t time_value); 5107c478bd9Sstevel@tonic-gate static void gen_string(const char *keyword, const char *value); 5117c478bd9Sstevel@tonic-gate static void get_xtime(char *value, timestruc_t *xtime); 5127c478bd9Sstevel@tonic-gate static int chk_path_build(char *name, char *longname, char *linkname, 5137c478bd9Sstevel@tonic-gate char *prefix, char type, int filetype); 5147c478bd9Sstevel@tonic-gate static int gen_utf8_names(const char *filename); 5157c478bd9Sstevel@tonic-gate static int utf8_local(char *option, char **Xhdr_ptrptr, char *target, 5167c478bd9Sstevel@tonic-gate const char *src, int max_val); 5177c478bd9Sstevel@tonic-gate static int local_utf8(char **Xhdr_ptrptr, char *target, const char *src, 5187c478bd9Sstevel@tonic-gate iconv_t iconv_cd, int xhdrflg, int max_val); 5197c478bd9Sstevel@tonic-gate static int c_utf8(char *target, const char *source); 520da6c28aaSamw static int getstat(int dirfd, char *longname, char *shortname, 521da6c28aaSamw char *attrparent); 522da6c28aaSamw static void xattrs_put(char *, char *, char *, char *); 5237c478bd9Sstevel@tonic-gate static void prepare_xattr(char **, char *, char *, 5247c478bd9Sstevel@tonic-gate char, struct linkbuf *, int *); 525da6c28aaSamw static int put_link(char *name, char *longname, char *component, 526da6c28aaSamw char *longattrname, char *prefix, int filetype, char typeflag); 5277c478bd9Sstevel@tonic-gate static int put_extra_attributes(char *longname, char *shortname, 528da6c28aaSamw char *longattrname, char *prefix, int filetype, char typeflag); 529da6c28aaSamw static int put_xattr_hdr(char *longname, char *shortname, char *longattrname, 530da6c28aaSamw char *prefix, int typeflag, int filetype, struct linkbuf *lp); 531da6c28aaSamw static int read_xattr_hdr(attr_data_t **attrinfo); 53245916cd2Sjpk 53345916cd2Sjpk /* Trusted Extensions */ 53445916cd2Sjpk #define AUTO_ZONE "/zone" 53545916cd2Sjpk 53645916cd2Sjpk static void extract_attr(char **file_ptr, struct sec_attr *); 53745916cd2Sjpk static int check_ext_attr(char *filename); 53845916cd2Sjpk static void rebuild_comp_path(char *str, char **namep); 53945916cd2Sjpk static int rebuild_lk_comp_path(char *str, char **namep); 54045916cd2Sjpk 5417c478bd9Sstevel@tonic-gate static void get_parent(char *path, char *dir); 5427c478bd9Sstevel@tonic-gate static char *get_component(char *path); 543da6c28aaSamw static int retry_open_attr(int pdirfd, int cwd, char *dirp, char *pattr, 544da6c28aaSamw char *name, int oflag, mode_t mode); 5457c478bd9Sstevel@tonic-gate static char *skipslashes(char *string, char *start); 5467c478bd9Sstevel@tonic-gate static void chop_endslashes(char *path); 54736802407SRich Burridge static pid_t compress_file(void); 54836802407SRich Burridge static void compress_back(void); 54936802407SRich Burridge static void decompress_file(void); 55036802407SRich Burridge static pid_t uncompress_file(void); 55136802407SRich Burridge static void *compress_malloc(size_t); 552*506ea5b8SMilan Jurik static void check_compression(void); 553*506ea5b8SMilan Jurik static char *bz_suffix(void); 554*506ea5b8SMilan Jurik static char *gz_suffix(void); 555*506ea5b8SMilan Jurik static char *xz_suffix(void); 55636802407SRich Burridge static char *add_suffix(); 55736802407SRich Burridge static void wait_pid(pid_t); 558fa9e4066Sahrens 5597c478bd9Sstevel@tonic-gate static struct stat stbuf; 5607c478bd9Sstevel@tonic-gate 561da6c28aaSamw static char *myname; 5627c478bd9Sstevel@tonic-gate static int checkflag = 0; 5637c478bd9Sstevel@tonic-gate static int Xflag, Fflag, iflag, hflag, Bflag, Iflag; 56436802407SRich Burridge static int rflag, xflag, vflag, tflag, mt, svmt, cflag, mflag, pflag; 5657c478bd9Sstevel@tonic-gate static int uflag; 566cc22b130SRich Burridge static int errflag; 5677c478bd9Sstevel@tonic-gate static int oflag; 568cc22b130SRich Burridge static int bflag, Aflag; 5697c478bd9Sstevel@tonic-gate static int Pflag; /* POSIX conformant archive */ 5707c478bd9Sstevel@tonic-gate static int Eflag; /* Allow files greater than 8GB */ 5717c478bd9Sstevel@tonic-gate static int atflag; /* traverse extended attributes */ 572da6c28aaSamw static int saflag; /* traverse extended sys attributes */ 5737c478bd9Sstevel@tonic-gate static int Dflag; /* Data change flag */ 57436802407SRich Burridge static int jflag; /* flag to use 'bzip2' */ 57536802407SRich Burridge static int zflag; /* flag to use 'gzip' */ 57636802407SRich Burridge static int Zflag; /* flag to use 'compress' */ 577*506ea5b8SMilan Jurik static int Jflag; /* flag to use 'xz' */ 57836802407SRich Burridge 57945916cd2Sjpk /* Trusted Extensions */ 58045916cd2Sjpk static int Tflag; /* Trusted Extensions attr flags */ 58145916cd2Sjpk static int dir_flag; /* for attribute extract */ 58245916cd2Sjpk static int mld_flag; /* for attribute extract */ 58345916cd2Sjpk static char *orig_namep; /* original namep - unadorned */ 58445916cd2Sjpk static int rpath_flag; /* MLD real path is rebuilt */ 58545916cd2Sjpk static char real_path[MAXPATHLEN]; /* MLD real path */ 58645916cd2Sjpk static int lk_rpath_flag; /* linked to real path is rebuilt */ 58745916cd2Sjpk static char lk_real_path[MAXPATHLEN]; /* linked real path */ 58845916cd2Sjpk static bslabel_t bs_label; /* for attribute extract */ 58945916cd2Sjpk static bslabel_t admin_low; 59045916cd2Sjpk static bslabel_t admin_high; 59145916cd2Sjpk static int ignored_aprivs = 0; 59245916cd2Sjpk static int ignored_fprivs = 0; 59345916cd2Sjpk static int ignored_fattrs = 0; 59445916cd2Sjpk 5957c478bd9Sstevel@tonic-gate static int term, chksum, wflag, 5967c478bd9Sstevel@tonic-gate first = TRUE, defaults_used = FALSE, linkerrok; 5977c478bd9Sstevel@tonic-gate static blkcnt_t recno; 5987c478bd9Sstevel@tonic-gate static int freemem = 1; 5997c478bd9Sstevel@tonic-gate static int nblock = NBLOCK; 6007c478bd9Sstevel@tonic-gate static int Errflg = 0; 6017c478bd9Sstevel@tonic-gate static int exitflag = 0; 6027c478bd9Sstevel@tonic-gate 6037c478bd9Sstevel@tonic-gate static dev_t mt_dev; /* device containing output file */ 6047c478bd9Sstevel@tonic-gate static ino_t mt_ino; /* inode number of output file */ 6057c478bd9Sstevel@tonic-gate static int mt_devtype; /* dev type of archive, from stat structure */ 6067c478bd9Sstevel@tonic-gate 6077c478bd9Sstevel@tonic-gate static int update = 1; /* for `open' call */ 6087c478bd9Sstevel@tonic-gate 6097c478bd9Sstevel@tonic-gate static off_t low; 6107c478bd9Sstevel@tonic-gate static off_t high; 6117c478bd9Sstevel@tonic-gate 6127c478bd9Sstevel@tonic-gate static FILE *tfile; 6137c478bd9Sstevel@tonic-gate static FILE *vfile = stdout; 61431a2de35SRich Burridge static char *tmpdir; 61531a2de35SRich Burridge static char *tmp_suffix = "/tarXXXXXX"; 61631a2de35SRich Burridge static char *tname; 6177c478bd9Sstevel@tonic-gate static char archive[] = "archive0="; 6187c478bd9Sstevel@tonic-gate static char *Xfile; 6197c478bd9Sstevel@tonic-gate static char *usefile; 62036802407SRich Burridge static char tfname[1024]; 6217c478bd9Sstevel@tonic-gate 6227c478bd9Sstevel@tonic-gate static int mulvol; /* multi-volume option selected */ 6237c478bd9Sstevel@tonic-gate static blkcnt_t blocklim; /* number of blocks to accept per volume */ 6247c478bd9Sstevel@tonic-gate static blkcnt_t tapepos; /* current block number to be written */ 6257c478bd9Sstevel@tonic-gate static int NotTape; /* true if tape is a disk */ 6267c478bd9Sstevel@tonic-gate static int dumping; /* true if writing a tape or other archive */ 6277c478bd9Sstevel@tonic-gate static int extno; /* number of extent: starts at 1 */ 6287c478bd9Sstevel@tonic-gate static int extotal; /* total extents in this file */ 6297c478bd9Sstevel@tonic-gate static off_t extsize; /* size of current extent during extraction */ 6307c478bd9Sstevel@tonic-gate static ushort_t Oumask = 0; /* old umask value */ 6317c478bd9Sstevel@tonic-gate static int is_posix; /* true if archive we're reading is POSIX-conformant */ 6327c478bd9Sstevel@tonic-gate static const char *magic_type = "ustar"; 6337c478bd9Sstevel@tonic-gate static size_t xrec_size = 8 * PATH_MAX; /* extended rec initial size */ 6347c478bd9Sstevel@tonic-gate static char *xrec_ptr; 6357c478bd9Sstevel@tonic-gate static off_t xrec_offset = 0; 6367c478bd9Sstevel@tonic-gate static int Xhdrflag; 6377c478bd9Sstevel@tonic-gate static int charset_type = 0; 6387c478bd9Sstevel@tonic-gate 6397c478bd9Sstevel@tonic-gate static u_longlong_t xhdr_flgs; /* Bits set determine which items */ 6407c478bd9Sstevel@tonic-gate /* need to be in extended header. */ 6417c478bd9Sstevel@tonic-gate #define _X_DEVMAJOR 0x1 6427c478bd9Sstevel@tonic-gate #define _X_DEVMINOR 0x2 6437c478bd9Sstevel@tonic-gate #define _X_GID 0x4 6447c478bd9Sstevel@tonic-gate #define _X_GNAME 0x8 6457c478bd9Sstevel@tonic-gate #define _X_LINKPATH 0x10 6467c478bd9Sstevel@tonic-gate #define _X_PATH 0x20 6477c478bd9Sstevel@tonic-gate #define _X_SIZE 0x40 6487c478bd9Sstevel@tonic-gate #define _X_UID 0x80 6497c478bd9Sstevel@tonic-gate #define _X_UNAME 0x100 6507c478bd9Sstevel@tonic-gate #define _X_ATIME 0x200 6517c478bd9Sstevel@tonic-gate #define _X_CTIME 0x400 6527c478bd9Sstevel@tonic-gate #define _X_MTIME 0x800 653123523f8Sas158974 #define _X_XHDR 0x1000 /* Bit flag that determines whether 'X' */ 654123523f8Sas158974 /* typeflag was followed by 'A' or non 'A' */ 655123523f8Sas158974 /* typeflag. */ 6567c478bd9Sstevel@tonic-gate #define _X_LAST 0x40000000 6577c478bd9Sstevel@tonic-gate 6587c478bd9Sstevel@tonic-gate #define PID_MAX_DIGITS (10 * sizeof (pid_t) / 4) 6597c478bd9Sstevel@tonic-gate #define TIME_MAX_DIGITS (10 * sizeof (time_t) / 4) 6607c478bd9Sstevel@tonic-gate #define LONG_MAX_DIGITS (10 * sizeof (long) / 4) 6617c478bd9Sstevel@tonic-gate #define ULONGLONG_MAX_DIGITS (10 * sizeof (u_longlong_t) / 4) 6627c478bd9Sstevel@tonic-gate /* 6637c478bd9Sstevel@tonic-gate * UTF_8 encoding requires more space than the current codeset equivalent. 6647c478bd9Sstevel@tonic-gate * Currently a factor of 2-3 would suffice, but it is possible for a factor 6657c478bd9Sstevel@tonic-gate * of 6 to be needed in the future, so for saftey, we use that here. 6667c478bd9Sstevel@tonic-gate */ 6677c478bd9Sstevel@tonic-gate #define UTF_8_FACTOR 6 6687c478bd9Sstevel@tonic-gate 6697c478bd9Sstevel@tonic-gate static u_longlong_t xhdr_count = 0; 6707c478bd9Sstevel@tonic-gate static char xhdr_dirname[PRESIZ + 1]; 6717c478bd9Sstevel@tonic-gate static char pidchars[PID_MAX_DIGITS + 1]; 6727c478bd9Sstevel@tonic-gate static char *tchar = ""; /* null linkpath */ 6737c478bd9Sstevel@tonic-gate 6747c478bd9Sstevel@tonic-gate static char local_path[UTF_8_FACTOR * PATH_MAX + 1]; 6757c478bd9Sstevel@tonic-gate static char local_linkpath[UTF_8_FACTOR * PATH_MAX + 1]; 6767c478bd9Sstevel@tonic-gate static char local_gname[UTF_8_FACTOR * _POSIX_NAME_MAX + 1]; 6777c478bd9Sstevel@tonic-gate static char local_uname[UTF_8_FACTOR * _POSIX_NAME_MAX + 1]; 6787c478bd9Sstevel@tonic-gate 6797c478bd9Sstevel@tonic-gate /* 6807c478bd9Sstevel@tonic-gate * The following mechanism is provided to allow us to debug tar in complicated 6817c478bd9Sstevel@tonic-gate * situations, like when it is part of a pipe. The idea is that you compile 68236802407SRich Burridge * with -DWAITAROUND defined, and then add the 'D' function modifier to the 68336802407SRich Burridge * target tar invocation, eg. "tar cDf tarfile file". If stderr is available, 6847c478bd9Sstevel@tonic-gate * it will tell you to which pid to attach the debugger; otherwise, use ps to 6857c478bd9Sstevel@tonic-gate * find it. Attach to the process from the debugger, and, *PRESTO*, you are 6867c478bd9Sstevel@tonic-gate * there! 6877c478bd9Sstevel@tonic-gate * 6887c478bd9Sstevel@tonic-gate * Simply assign "waitaround = 0" once you attach to the process, and then 6897c478bd9Sstevel@tonic-gate * proceed from there as usual. 6907c478bd9Sstevel@tonic-gate */ 6917c478bd9Sstevel@tonic-gate 6927c478bd9Sstevel@tonic-gate #ifdef WAITAROUND 6937c478bd9Sstevel@tonic-gate int waitaround = 0; /* wait for rendezvous with the debugger */ 6947c478bd9Sstevel@tonic-gate #endif 6957c478bd9Sstevel@tonic-gate 69636802407SRich Burridge #define BZIP "/usr/bin/bzip2" 69736802407SRich Burridge #define GZIP "/usr/bin/gzip" 69836802407SRich Burridge #define COMPRESS "/usr/bin/compress" 699*506ea5b8SMilan Jurik #define XZ "/usr/bin/xz" 70036802407SRich Burridge #define BZCAT "/usr/bin/bzcat" 70136802407SRich Burridge #define GZCAT "/usr/bin/gzcat" 70236802407SRich Burridge #define ZCAT "/usr/bin/zcat" 703*506ea5b8SMilan Jurik #define XZCAT "/usr/bin/xzcat" 704*506ea5b8SMilan Jurik #define GSUF 8 /* number of valid 'gzip' sufixes */ 705*506ea5b8SMilan Jurik #define BSUF 4 /* number of valid 'bzip2' sufixes */ 706*506ea5b8SMilan Jurik #define XSUF 1 /* number of valid 'xz' suffixes */ 70736802407SRich Burridge 70836802407SRich Burridge static char *compress_opt; /* compression type */ 70936802407SRich Burridge 71036802407SRich Burridge static char *gsuffix[] = {".gz", "-gz", ".z", "-z", "_z", ".Z", 71136802407SRich Burridge ".tgz", ".taz"}; 71236802407SRich Burridge static char *bsuffix[] = {".bz2", ".bz", ".tbz2", ".tbz"}; 713*506ea5b8SMilan Jurik static char *xsuffix[] = {".xz"}; 71436802407SRich Burridge static char *suffix; 71536802407SRich Burridge 7167c478bd9Sstevel@tonic-gate 7177c478bd9Sstevel@tonic-gate int 7187c478bd9Sstevel@tonic-gate main(int argc, char *argv[]) 7197c478bd9Sstevel@tonic-gate { 7207c478bd9Sstevel@tonic-gate char *cp; 7217c478bd9Sstevel@tonic-gate char *tmpdirp; 7227c478bd9Sstevel@tonic-gate pid_t thispid; 72336802407SRich Burridge pid_t pid; 72436802407SRich Burridge int wstat; 7257c478bd9Sstevel@tonic-gate 7267c478bd9Sstevel@tonic-gate (void) setlocale(LC_ALL, ""); 7277c478bd9Sstevel@tonic-gate #if !defined(TEXT_DOMAIN) /* Should be defined by cc -D */ 7287c478bd9Sstevel@tonic-gate #define TEXT_DOMAIN "SYS_TEST" /* Use this only if it weren't */ 7297c478bd9Sstevel@tonic-gate #endif 7307c478bd9Sstevel@tonic-gate (void) textdomain(TEXT_DOMAIN); 7317c478bd9Sstevel@tonic-gate if (argc < 2) 7327c478bd9Sstevel@tonic-gate usage(); 7337c478bd9Sstevel@tonic-gate 7347c478bd9Sstevel@tonic-gate tfile = NULL; 735da6c28aaSamw if ((myname = strdup(argv[0])) == NULL) { 736da6c28aaSamw (void) fprintf(stderr, gettext( 737da6c28aaSamw "tar: cannot allocate program name\n")); 738da6c28aaSamw exit(1); 739da6c28aaSamw } 7407c478bd9Sstevel@tonic-gate 7413d63ea05Sas145665 if (init_yes() < 0) { 7423d63ea05Sas145665 (void) fprintf(stderr, gettext(ERR_MSG_INIT_YES), 7433d63ea05Sas145665 strerror(errno)); 7443d63ea05Sas145665 exit(2); 7453d63ea05Sas145665 } 7463d63ea05Sas145665 7477c478bd9Sstevel@tonic-gate /* 7487c478bd9Sstevel@tonic-gate * For XPG4 compatibility, we must be able to accept the "--" 7497c478bd9Sstevel@tonic-gate * argument normally recognized by getopt; it is used to delimit 7507c478bd9Sstevel@tonic-gate * the end opt the options section, and so can only appear in 7517c478bd9Sstevel@tonic-gate * the position of the first argument. We simply skip it. 7527c478bd9Sstevel@tonic-gate */ 7537c478bd9Sstevel@tonic-gate 7547c478bd9Sstevel@tonic-gate if (strcmp(argv[1], "--") == 0) { 7557c478bd9Sstevel@tonic-gate argv++; 7567c478bd9Sstevel@tonic-gate argc--; 7577c478bd9Sstevel@tonic-gate if (argc < 3) 7587c478bd9Sstevel@tonic-gate usage(); 7597c478bd9Sstevel@tonic-gate } 7607c478bd9Sstevel@tonic-gate 7617c478bd9Sstevel@tonic-gate argv[argc] = NULL; 7627c478bd9Sstevel@tonic-gate argv++; 7637c478bd9Sstevel@tonic-gate 7647c478bd9Sstevel@tonic-gate /* 7657c478bd9Sstevel@tonic-gate * Set up default values. 7667c478bd9Sstevel@tonic-gate * Search the operand string looking for the first digit or an 'f'. 7677c478bd9Sstevel@tonic-gate * If you find a digit, use the 'archive#' entry in DEF_FILE. 7687c478bd9Sstevel@tonic-gate * If 'f' is given, bypass looking in DEF_FILE altogether. 7697c478bd9Sstevel@tonic-gate * If no digit or 'f' is given, still look in DEF_FILE but use '0'. 7707c478bd9Sstevel@tonic-gate */ 7717c478bd9Sstevel@tonic-gate if ((usefile = getenv("TAPE")) == (char *)NULL) { 7727c478bd9Sstevel@tonic-gate for (cp = *argv; *cp; ++cp) 7737c478bd9Sstevel@tonic-gate if (isdigit(*cp) || *cp == 'f') 7747c478bd9Sstevel@tonic-gate break; 7757c478bd9Sstevel@tonic-gate if (*cp != 'f') { 7767c478bd9Sstevel@tonic-gate archive[7] = (*cp)? *cp: '0'; 7777c478bd9Sstevel@tonic-gate if (!(defaults_used = defset(archive))) { 7787c478bd9Sstevel@tonic-gate usefile = NULL; 7797c478bd9Sstevel@tonic-gate nblock = 1; 7807c478bd9Sstevel@tonic-gate blocklim = 0; 7817c478bd9Sstevel@tonic-gate NotTape = 0; 7827c478bd9Sstevel@tonic-gate } 7837c478bd9Sstevel@tonic-gate } 7847c478bd9Sstevel@tonic-gate } 7857c478bd9Sstevel@tonic-gate 7867c478bd9Sstevel@tonic-gate for (cp = *argv++; *cp; cp++) 7877c478bd9Sstevel@tonic-gate switch (*cp) { 7887c478bd9Sstevel@tonic-gate #ifdef WAITAROUND 78936802407SRich Burridge case 'D': 7907c478bd9Sstevel@tonic-gate /* rendezvous with the debugger */ 7917c478bd9Sstevel@tonic-gate waitaround = 1; 7927c478bd9Sstevel@tonic-gate break; 7937c478bd9Sstevel@tonic-gate #endif 7947c478bd9Sstevel@tonic-gate case 'f': 7957c478bd9Sstevel@tonic-gate assert_string(*argv, gettext( 7967c478bd9Sstevel@tonic-gate "tar: tarfile must be specified with 'f' " 7977c478bd9Sstevel@tonic-gate "function modifier\n")); 7987c478bd9Sstevel@tonic-gate usefile = *argv++; 7997c478bd9Sstevel@tonic-gate break; 8007c478bd9Sstevel@tonic-gate case 'F': 8017c478bd9Sstevel@tonic-gate Fflag++; 8027c478bd9Sstevel@tonic-gate break; 8037c478bd9Sstevel@tonic-gate case 'c': 8047c478bd9Sstevel@tonic-gate cflag++; 8057c478bd9Sstevel@tonic-gate rflag++; 8067c478bd9Sstevel@tonic-gate update = 1; 8077c478bd9Sstevel@tonic-gate break; 8087c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 8097c478bd9Sstevel@tonic-gate case '@': 8107c478bd9Sstevel@tonic-gate atflag++; 8117c478bd9Sstevel@tonic-gate break; 812da6c28aaSamw #endif /* O_XATTR */ 813da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 814da6c28aaSamw case '/': 815da6c28aaSamw saflag++; 816da6c28aaSamw break; 817da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 8187c478bd9Sstevel@tonic-gate case 'u': 8197c478bd9Sstevel@tonic-gate uflag++; /* moved code after signals caught */ 8207c478bd9Sstevel@tonic-gate rflag++; 8217c478bd9Sstevel@tonic-gate update = 2; 8227c478bd9Sstevel@tonic-gate break; 8237c478bd9Sstevel@tonic-gate case 'r': 8247c478bd9Sstevel@tonic-gate rflag++; 8257c478bd9Sstevel@tonic-gate update = 2; 8267c478bd9Sstevel@tonic-gate break; 8277c478bd9Sstevel@tonic-gate case 'v': 8287c478bd9Sstevel@tonic-gate vflag++; 8297c478bd9Sstevel@tonic-gate break; 8307c478bd9Sstevel@tonic-gate case 'w': 8317c478bd9Sstevel@tonic-gate wflag++; 8327c478bd9Sstevel@tonic-gate break; 8337c478bd9Sstevel@tonic-gate case 'x': 8347c478bd9Sstevel@tonic-gate xflag++; 8357c478bd9Sstevel@tonic-gate break; 8367c478bd9Sstevel@tonic-gate case 'X': 8377c478bd9Sstevel@tonic-gate assert_string(*argv, gettext( 8387c478bd9Sstevel@tonic-gate "tar: exclude file must be specified with 'X' " 8397c478bd9Sstevel@tonic-gate "function modifier\n")); 8407c478bd9Sstevel@tonic-gate Xflag = 1; 8417c478bd9Sstevel@tonic-gate Xfile = *argv++; 8427c478bd9Sstevel@tonic-gate build_table(exclude_tbl, Xfile); 8437c478bd9Sstevel@tonic-gate break; 8447c478bd9Sstevel@tonic-gate case 't': 8457c478bd9Sstevel@tonic-gate tflag++; 8467c478bd9Sstevel@tonic-gate break; 8477c478bd9Sstevel@tonic-gate case 'm': 8487c478bd9Sstevel@tonic-gate mflag++; 8497c478bd9Sstevel@tonic-gate break; 8507c478bd9Sstevel@tonic-gate case 'p': 8517c478bd9Sstevel@tonic-gate pflag++; 8527c478bd9Sstevel@tonic-gate break; 8537c478bd9Sstevel@tonic-gate case 'D': 8547c478bd9Sstevel@tonic-gate Dflag++; 8557c478bd9Sstevel@tonic-gate break; 8567c478bd9Sstevel@tonic-gate case '-': 8577c478bd9Sstevel@tonic-gate /* ignore this silently */ 8587c478bd9Sstevel@tonic-gate break; 8597c478bd9Sstevel@tonic-gate case '0': /* numeric entries used only for defaults */ 8607c478bd9Sstevel@tonic-gate case '1': 8617c478bd9Sstevel@tonic-gate case '2': 8627c478bd9Sstevel@tonic-gate case '3': 8637c478bd9Sstevel@tonic-gate case '4': 8647c478bd9Sstevel@tonic-gate case '5': 8657c478bd9Sstevel@tonic-gate case '6': 8667c478bd9Sstevel@tonic-gate case '7': 8677c478bd9Sstevel@tonic-gate break; 8687c478bd9Sstevel@tonic-gate case 'b': 8697c478bd9Sstevel@tonic-gate assert_string(*argv, gettext( 8707c478bd9Sstevel@tonic-gate "tar: blocking factor must be specified " 8717c478bd9Sstevel@tonic-gate "with 'b' function modifier\n")); 8727c478bd9Sstevel@tonic-gate bflag++; 8737c478bd9Sstevel@tonic-gate nblock = bcheck(*argv++); 8747c478bd9Sstevel@tonic-gate break; 8757c478bd9Sstevel@tonic-gate case 'n': /* not a magtape (instead of 'k') */ 8767c478bd9Sstevel@tonic-gate NotTape++; /* assume non-magtape */ 8777c478bd9Sstevel@tonic-gate break; 8787c478bd9Sstevel@tonic-gate case 'l': 8797c478bd9Sstevel@tonic-gate linkerrok++; 8807c478bd9Sstevel@tonic-gate break; 8817c478bd9Sstevel@tonic-gate case 'e': 8827c478bd9Sstevel@tonic-gate errflag++; 8837c478bd9Sstevel@tonic-gate case 'o': 8847c478bd9Sstevel@tonic-gate oflag++; 8857c478bd9Sstevel@tonic-gate break; 8867c478bd9Sstevel@tonic-gate case 'h': 8877c478bd9Sstevel@tonic-gate hflag++; 8887c478bd9Sstevel@tonic-gate break; 8897c478bd9Sstevel@tonic-gate case 'i': 8907c478bd9Sstevel@tonic-gate iflag++; 8917c478bd9Sstevel@tonic-gate break; 8927c478bd9Sstevel@tonic-gate case 'B': 8937c478bd9Sstevel@tonic-gate Bflag++; 8947c478bd9Sstevel@tonic-gate break; 8957c478bd9Sstevel@tonic-gate case 'P': 8967c478bd9Sstevel@tonic-gate Pflag++; 8977c478bd9Sstevel@tonic-gate break; 8987c478bd9Sstevel@tonic-gate case 'E': 8997c478bd9Sstevel@tonic-gate Eflag++; 9007c478bd9Sstevel@tonic-gate Pflag++; /* Only POSIX archive made */ 9017c478bd9Sstevel@tonic-gate break; 90245916cd2Sjpk case 'T': 90345916cd2Sjpk Tflag++; /* Handle Trusted Extensions attrs */ 90445916cd2Sjpk pflag++; /* also set flag for ACL */ 90545916cd2Sjpk break; 90636802407SRich Burridge case 'j': /* compession "bzip2" */ 907*506ea5b8SMilan Jurik jflag = 1; 90836802407SRich Burridge break; 90936802407SRich Burridge case 'z': /* compression "gzip" */ 910*506ea5b8SMilan Jurik zflag = 1; 91136802407SRich Burridge break; 91236802407SRich Burridge case 'Z': /* compression "compress" */ 913*506ea5b8SMilan Jurik Zflag = 1; 914*506ea5b8SMilan Jurik break; 915*506ea5b8SMilan Jurik case 'J': /* compression "xz" */ 916*506ea5b8SMilan Jurik Jflag = 1; 91736802407SRich Burridge break; 9187c478bd9Sstevel@tonic-gate default: 9197c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 9207c478bd9Sstevel@tonic-gate "tar: %c: unknown function modifier\n"), *cp); 9217c478bd9Sstevel@tonic-gate usage(); 9227c478bd9Sstevel@tonic-gate } 9237c478bd9Sstevel@tonic-gate 9247c478bd9Sstevel@tonic-gate if (!rflag && !xflag && !tflag) 9257c478bd9Sstevel@tonic-gate usage(); 9267c478bd9Sstevel@tonic-gate if ((rflag && xflag) || (xflag && tflag) || (rflag && tflag)) { 9277c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 9287c478bd9Sstevel@tonic-gate "tar: specify only one of [ctxru].\n")); 9297c478bd9Sstevel@tonic-gate usage(); 9307c478bd9Sstevel@tonic-gate } 93136802407SRich Burridge if (cflag) { 932*506ea5b8SMilan Jurik if ((jflag + zflag + Zflag + Jflag) > 1) { 93336802407SRich Burridge (void) fprintf(stderr, gettext( 934*506ea5b8SMilan Jurik "tar: specify only one of [jJzZ] to " 93536802407SRich Burridge "create a compressed file.\n")); 93636802407SRich Burridge usage(); 93736802407SRich Burridge } 93836802407SRich Burridge } 93945916cd2Sjpk /* Trusted Extensions attribute handling */ 94045916cd2Sjpk if (Tflag && ((getzoneid() != GLOBAL_ZONEID) || 94145916cd2Sjpk !is_system_labeled())) { 94245916cd2Sjpk (void) fprintf(stderr, gettext( 94345916cd2Sjpk "tar: the 'T' option is only available with " 94445916cd2Sjpk "Trusted Extensions\nand must be run from " 94545916cd2Sjpk "the global zone.\n")); 94645916cd2Sjpk usage(); 94745916cd2Sjpk } 948cc22b130SRich Burridge if (cflag && *argv == NULL) 9497c478bd9Sstevel@tonic-gate fatal(gettext("Missing filenames")); 9507c478bd9Sstevel@tonic-gate if (usefile == NULL) 9517c478bd9Sstevel@tonic-gate fatal(gettext("device argument required")); 9527c478bd9Sstevel@tonic-gate 9537c478bd9Sstevel@tonic-gate /* alloc a buffer of the right size */ 9547c478bd9Sstevel@tonic-gate if ((tbuf = (union hblock *) 9557c478bd9Sstevel@tonic-gate calloc(sizeof (union hblock) * nblock, sizeof (char))) == 9567c478bd9Sstevel@tonic-gate (union hblock *)NULL) { 9577c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 9587c478bd9Sstevel@tonic-gate "tar: cannot allocate physio buffer\n")); 9597c478bd9Sstevel@tonic-gate exit(1); 9607c478bd9Sstevel@tonic-gate } 9617c478bd9Sstevel@tonic-gate 9627c478bd9Sstevel@tonic-gate if ((xrec_ptr = malloc(xrec_size)) == NULL) { 9637c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 9647c478bd9Sstevel@tonic-gate "tar: cannot allocate extended header buffer\n")); 9657c478bd9Sstevel@tonic-gate exit(1); 9667c478bd9Sstevel@tonic-gate } 9677c478bd9Sstevel@tonic-gate 9687c478bd9Sstevel@tonic-gate #ifdef WAITAROUND 9697c478bd9Sstevel@tonic-gate if (waitaround) { 9707c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("Rendezvous with tar on pid" 9717c478bd9Sstevel@tonic-gate " %d\n"), getpid()); 9727c478bd9Sstevel@tonic-gate 9737c478bd9Sstevel@tonic-gate while (waitaround) { 9747c478bd9Sstevel@tonic-gate (void) sleep(10); 9757c478bd9Sstevel@tonic-gate } 9767c478bd9Sstevel@tonic-gate } 9777c478bd9Sstevel@tonic-gate #endif 9787c478bd9Sstevel@tonic-gate 9797c478bd9Sstevel@tonic-gate thispid = getpid(); 9807c478bd9Sstevel@tonic-gate (void) sprintf(pidchars, "%ld", thispid); 9817c478bd9Sstevel@tonic-gate thispid = strlen(pidchars); 9827c478bd9Sstevel@tonic-gate 9837c478bd9Sstevel@tonic-gate if ((tmpdirp = getenv("TMPDIR")) == (char *)NULL) 9847c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_dirname, "/tmp"); 9857c478bd9Sstevel@tonic-gate else { 9867c478bd9Sstevel@tonic-gate /* 9877c478bd9Sstevel@tonic-gate * Make sure that dir is no longer than what can 9887c478bd9Sstevel@tonic-gate * fit in the prefix part of the header. 9897c478bd9Sstevel@tonic-gate */ 9907c478bd9Sstevel@tonic-gate if (strlen(tmpdirp) > (size_t)(PRESIZ - thispid - 12)) { 9917c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_dirname, "/tmp"); 9927c478bd9Sstevel@tonic-gate if ((vflag > 0) && (Eflag > 0)) 9937c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 9947c478bd9Sstevel@tonic-gate "Ignoring TMPDIR\n")); 9957c478bd9Sstevel@tonic-gate } else 9967c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_dirname, tmpdirp); 9977c478bd9Sstevel@tonic-gate } 9987c478bd9Sstevel@tonic-gate (void) strcat(xhdr_dirname, "/PaxHeaders."); 9997c478bd9Sstevel@tonic-gate (void) strcat(xhdr_dirname, pidchars); 10007c478bd9Sstevel@tonic-gate 10017c478bd9Sstevel@tonic-gate if (rflag) { 100236802407SRich Burridge if (cflag && usefile != NULL) { 100336802407SRich Burridge /* Set the compression type */ 100436802407SRich Burridge if (jflag) { 100536802407SRich Burridge compress_opt = compress_malloc(strlen(BZIP) 100636802407SRich Burridge + 1); 100736802407SRich Burridge (void) strcpy(compress_opt, BZIP); 100836802407SRich Burridge } else if (zflag) { 100936802407SRich Burridge compress_opt = compress_malloc(strlen(GZIP) 101036802407SRich Burridge + 1); 101136802407SRich Burridge (void) strcpy(compress_opt, GZIP); 101236802407SRich Burridge } else if (Zflag) { 101336802407SRich Burridge compress_opt = 101436802407SRich Burridge compress_malloc(strlen(COMPRESS) + 1); 101536802407SRich Burridge (void) strcpy(compress_opt, COMPRESS); 1016*506ea5b8SMilan Jurik } else if (Jflag) { 1017*506ea5b8SMilan Jurik compress_opt = compress_malloc(strlen(XZ) + 1); 1018*506ea5b8SMilan Jurik (void) strcpy(compress_opt, XZ); 101936802407SRich Burridge } 102036802407SRich Burridge } else { 102136802407SRich Burridge /* 102236802407SRich Burridge * Decompress if the file is compressed for 102336802407SRich Burridge * an update or replace. 102436802407SRich Burridge */ 102536802407SRich Burridge if (strcmp(usefile, "-") != 0) { 102636802407SRich Burridge check_compression(); 102736802407SRich Burridge if (compress_opt != NULL) { 102836802407SRich Burridge decompress_file(); 102936802407SRich Burridge } 103036802407SRich Burridge } 103136802407SRich Burridge } 103236802407SRich Burridge 10337c478bd9Sstevel@tonic-gate if (cflag && tfile != NULL) 10347c478bd9Sstevel@tonic-gate usage(); 10357c478bd9Sstevel@tonic-gate if (signal(SIGINT, SIG_IGN) != SIG_IGN) 10367c478bd9Sstevel@tonic-gate (void) signal(SIGINT, onintr); 10377c478bd9Sstevel@tonic-gate if (signal(SIGHUP, SIG_IGN) != SIG_IGN) 10387c478bd9Sstevel@tonic-gate (void) signal(SIGHUP, onhup); 10397c478bd9Sstevel@tonic-gate if (signal(SIGQUIT, SIG_IGN) != SIG_IGN) 10407c478bd9Sstevel@tonic-gate (void) signal(SIGQUIT, onquit); 10417c478bd9Sstevel@tonic-gate if (uflag) { 10427c478bd9Sstevel@tonic-gate int tnum; 104331a2de35SRich Burridge struct stat sbuf; 104431a2de35SRich Burridge 104531a2de35SRich Burridge tmpdir = getenv("TMPDIR"); 104631a2de35SRich Burridge /* 104731a2de35SRich Burridge * If the name is invalid or this isn't a directory, 104831a2de35SRich Burridge * or the directory is not writable, then reset to 104931a2de35SRich Burridge * a default temporary directory. 105031a2de35SRich Burridge */ 105131a2de35SRich Burridge if (tmpdir == NULL || *tmpdir == '\0' || 105231a2de35SRich Burridge (strlen(tmpdir) + strlen(tmp_suffix)) > PATH_MAX) { 105331a2de35SRich Burridge tmpdir = "/tmp"; 105431a2de35SRich Burridge } else if (stat(tmpdir, &sbuf) < 0 || 105531a2de35SRich Burridge (sbuf.st_mode & S_IFMT) != S_IFDIR || 105631a2de35SRich Burridge (sbuf.st_mode & S_IWRITE) == 0) { 105731a2de35SRich Burridge tmpdir = "/tmp"; 105831a2de35SRich Burridge } 105931a2de35SRich Burridge 106031a2de35SRich Burridge if ((tname = calloc(1, strlen(tmpdir) + 106131a2de35SRich Burridge strlen(tmp_suffix) + 1)) == NULL) { 106231a2de35SRich Burridge vperror(1, gettext("tar: out of memory, " 106331a2de35SRich Burridge "cannot create temporary file\n")); 106431a2de35SRich Burridge } 106531a2de35SRich Burridge (void) strcpy(tname, tmpdir); 106631a2de35SRich Burridge (void) strcat(tname, tmp_suffix); 106731a2de35SRich Burridge 10687c478bd9Sstevel@tonic-gate if ((tnum = mkstemp(tname)) == -1) 10697c478bd9Sstevel@tonic-gate vperror(1, "%s", tname); 10707c478bd9Sstevel@tonic-gate if ((tfile = fdopen(tnum, "w")) == NULL) 10717c478bd9Sstevel@tonic-gate vperror(1, "%s", tname); 10727c478bd9Sstevel@tonic-gate } 10737c478bd9Sstevel@tonic-gate if (strcmp(usefile, "-") == 0) { 10747c478bd9Sstevel@tonic-gate if (cflag == 0) 10757c478bd9Sstevel@tonic-gate fatal(gettext( 10767c478bd9Sstevel@tonic-gate "can only create standard output archives.")); 10777c478bd9Sstevel@tonic-gate vfile = stderr; 10787c478bd9Sstevel@tonic-gate mt = dup(1); 10797c478bd9Sstevel@tonic-gate ++bflag; 10807c478bd9Sstevel@tonic-gate } else { 10817c478bd9Sstevel@tonic-gate if (cflag) 10827c478bd9Sstevel@tonic-gate mt = open(usefile, 10837c478bd9Sstevel@tonic-gate O_RDWR|O_CREAT|O_TRUNC, 0666); 10847c478bd9Sstevel@tonic-gate else 10857c478bd9Sstevel@tonic-gate mt = open(usefile, O_RDWR); 10867c478bd9Sstevel@tonic-gate 10877c478bd9Sstevel@tonic-gate if (mt < 0) { 10887c478bd9Sstevel@tonic-gate if (cflag == 0 || (mt = creat(usefile, 0666)) 10897c478bd9Sstevel@tonic-gate < 0) 10907c478bd9Sstevel@tonic-gate vperror(1, "%s", usefile); 10917c478bd9Sstevel@tonic-gate } 10927c478bd9Sstevel@tonic-gate } 10937c478bd9Sstevel@tonic-gate /* Get inode and device number of output file */ 10947c478bd9Sstevel@tonic-gate (void) fstat(mt, &stbuf); 10957c478bd9Sstevel@tonic-gate mt_ino = stbuf.st_ino; 10967c478bd9Sstevel@tonic-gate mt_dev = stbuf.st_dev; 10977c478bd9Sstevel@tonic-gate mt_devtype = stbuf.st_mode & S_IFMT; 10987c478bd9Sstevel@tonic-gate NotTape = !istape(mt, mt_devtype); 10997c478bd9Sstevel@tonic-gate 11007c478bd9Sstevel@tonic-gate if (rflag && !cflag && (mt_devtype == S_IFIFO)) 11017c478bd9Sstevel@tonic-gate fatal(gettext("cannot append to pipe or FIFO.")); 11027c478bd9Sstevel@tonic-gate 11037c478bd9Sstevel@tonic-gate if (Aflag && vflag) 11047c478bd9Sstevel@tonic-gate (void) printf( 11057c478bd9Sstevel@tonic-gate gettext("Suppressing absolute pathnames\n")); 110636802407SRich Burridge if (cflag && compress_opt != NULL) { 110736802407SRich Burridge pid = compress_file(); 110836802407SRich Burridge wait_pid(pid); 110936802407SRich Burridge } 11107c478bd9Sstevel@tonic-gate dorep(argv); 111136802407SRich Burridge if (rflag && !cflag && (compress_opt != NULL)) 111236802407SRich Burridge compress_back(); 11137c478bd9Sstevel@tonic-gate } else if (xflag || tflag) { 11147c478bd9Sstevel@tonic-gate /* 11157c478bd9Sstevel@tonic-gate * for each argument, check to see if there is a "-I file" pair. 11167c478bd9Sstevel@tonic-gate * if so, move the 3rd argument into "-I"'s place, build_table() 11177c478bd9Sstevel@tonic-gate * using "file"'s name and increment argc one (the second 11187c478bd9Sstevel@tonic-gate * increment appears in the for loop) which removes the two 11197c478bd9Sstevel@tonic-gate * args "-I" and "file" from the argument vector. 11207c478bd9Sstevel@tonic-gate */ 11217c478bd9Sstevel@tonic-gate for (argc = 0; argv[argc]; argc++) { 11227c478bd9Sstevel@tonic-gate if (strcmp(argv[argc], "-I") == 0) { 11237c478bd9Sstevel@tonic-gate if (!argv[argc+1]) { 11247c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 11257c478bd9Sstevel@tonic-gate "tar: missing argument for -I flag\n")); 11267c478bd9Sstevel@tonic-gate done(2); 11277c478bd9Sstevel@tonic-gate } else { 11287c478bd9Sstevel@tonic-gate Iflag = 1; 11297c478bd9Sstevel@tonic-gate argv[argc] = argv[argc+2]; 11307c478bd9Sstevel@tonic-gate build_table(include_tbl, argv[++argc]); 11317c478bd9Sstevel@tonic-gate } 11327c478bd9Sstevel@tonic-gate } 11337c478bd9Sstevel@tonic-gate } 11347c478bd9Sstevel@tonic-gate if (strcmp(usefile, "-") == 0) { 11357c478bd9Sstevel@tonic-gate mt = dup(0); 11367c478bd9Sstevel@tonic-gate ++bflag; 11377c478bd9Sstevel@tonic-gate /* try to recover from short reads when reading stdin */ 11387c478bd9Sstevel@tonic-gate ++Bflag; 11397c478bd9Sstevel@tonic-gate } else if ((mt = open(usefile, 0)) < 0) 11407c478bd9Sstevel@tonic-gate vperror(1, "%s", usefile); 11417c478bd9Sstevel@tonic-gate 114236802407SRich Burridge /* Decompress if the file is compressed */ 114336802407SRich Burridge 114436802407SRich Burridge if (strcmp(usefile, "-") != 0) { 114536802407SRich Burridge check_compression(); 114636802407SRich Burridge if (compress_opt != NULL) { 114736802407SRich Burridge pid = uncompress_file(); 114836802407SRich Burridge wait_pid(pid); 114936802407SRich Burridge } 115036802407SRich Burridge } 11517c478bd9Sstevel@tonic-gate if (xflag) { 11527c478bd9Sstevel@tonic-gate if (Aflag && vflag) 1153eace40a5Sceastha (void) printf(gettext( 1154eace40a5Sceastha "Suppressing absolute pathnames.\n")); 11557c478bd9Sstevel@tonic-gate 11567c478bd9Sstevel@tonic-gate doxtract(argv); 11577c478bd9Sstevel@tonic-gate } else if (tflag) 11587c478bd9Sstevel@tonic-gate dotable(argv); 11597c478bd9Sstevel@tonic-gate } 11607c478bd9Sstevel@tonic-gate else 11617c478bd9Sstevel@tonic-gate usage(); 11627c478bd9Sstevel@tonic-gate 11637c478bd9Sstevel@tonic-gate done(Errflg); 11647c478bd9Sstevel@tonic-gate 11657c478bd9Sstevel@tonic-gate /* Not reached: keep compiler quiet */ 11667c478bd9Sstevel@tonic-gate return (1); 11677c478bd9Sstevel@tonic-gate } 11687c478bd9Sstevel@tonic-gate 11697c478bd9Sstevel@tonic-gate static void 11707c478bd9Sstevel@tonic-gate usage(void) 11717c478bd9Sstevel@tonic-gate { 11727c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 11737c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 1174da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 1175cc22b130SRich Burridge "Usage: tar {c|r|t|u|x}[BDeEFhilmnopPTvw@/[0-7]][bf][X...] " 1176da6c28aaSamw #else 1177cc22b130SRich Burridge "Usage: tar {c|r|t|u|x}[BDeEFhilmnopPTvw@[0-7]][bf][X...] " 1178da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 11797c478bd9Sstevel@tonic-gate #else 1180cc22b130SRich Burridge "Usage: tar {c|r|t|u|x}[BDeEFhilmnopPTvw[0-7]][bf][X...] " 1181da6c28aaSamw #endif /* O_XATTR */ 1182*506ea5b8SMilan Jurik "[j|J|z|Z] " 11837c478bd9Sstevel@tonic-gate "[blocksize] [tarfile] [size] [exclude-file...] " 11847c478bd9Sstevel@tonic-gate "{file | -I include-file | -C directory file}...\n")); 11857c478bd9Sstevel@tonic-gate done(1); 11867c478bd9Sstevel@tonic-gate } 11877c478bd9Sstevel@tonic-gate 11887c478bd9Sstevel@tonic-gate /* 11897c478bd9Sstevel@tonic-gate * dorep - do "replacements" 11907c478bd9Sstevel@tonic-gate * 11917c478bd9Sstevel@tonic-gate * Dorep is responsible for creating ('c'), appending ('r') 11927c478bd9Sstevel@tonic-gate * and updating ('u'); 11937c478bd9Sstevel@tonic-gate */ 11947c478bd9Sstevel@tonic-gate 11957c478bd9Sstevel@tonic-gate static void 11967c478bd9Sstevel@tonic-gate dorep(char *argv[]) 11977c478bd9Sstevel@tonic-gate { 11987c478bd9Sstevel@tonic-gate char *cp, *cp2, *p; 11997c478bd9Sstevel@tonic-gate char wdir[PATH_MAX+2], tempdir[PATH_MAX+2], *parent; 12007c478bd9Sstevel@tonic-gate char file[PATH_MAX*2], origdir[PATH_MAX+1]; 12017c478bd9Sstevel@tonic-gate FILE *fp = (FILE *)NULL; 12027c478bd9Sstevel@tonic-gate int archtype; 1203123523f8Sas158974 int ret; 12047c478bd9Sstevel@tonic-gate 12057c478bd9Sstevel@tonic-gate 12067c478bd9Sstevel@tonic-gate if (!cflag) { 12077c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 12087c478bd9Sstevel@tonic-gate getdir(); /* read header for next file */ 12097c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) { 12107c478bd9Sstevel@tonic-gate if (!Eflag) 12117c478bd9Sstevel@tonic-gate fatal(gettext("Archive contains extended" 12127c478bd9Sstevel@tonic-gate " header. -E flag required.\n")); 1213123523f8Sas158974 ret = get_xdata(); /* Get extended header items */ 12147c478bd9Sstevel@tonic-gate /* and regular header */ 12157c478bd9Sstevel@tonic-gate } else { 12167c478bd9Sstevel@tonic-gate if (Eflag) 12177c478bd9Sstevel@tonic-gate fatal(gettext("Archive contains no extended" 12187c478bd9Sstevel@tonic-gate " header. -E flag not allowed.\n")); 12197c478bd9Sstevel@tonic-gate } 12207c478bd9Sstevel@tonic-gate while (!endtape()) { /* changed from a do while */ 1221123523f8Sas158974 setbytes_to_skip(&stbuf, ret); 12227c478bd9Sstevel@tonic-gate passtape(); /* skip the file data */ 12237c478bd9Sstevel@tonic-gate if (term) 12247c478bd9Sstevel@tonic-gate done(Errflg); /* received signal to stop */ 12257c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 12267c478bd9Sstevel@tonic-gate getdir(); 12277c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) 1228123523f8Sas158974 ret = get_xdata(); 1229123523f8Sas158974 } 1230123523f8Sas158974 if (ret == 0) { 1231123523f8Sas158974 if ((dblock.dbuf.typeflag != 'A') && 1232123523f8Sas158974 (xhdr_flgs != 0)) { 1233123523f8Sas158974 load_info_from_xtarhdr(xhdr_flgs, 1234123523f8Sas158974 &Xtarhdr); 1235123523f8Sas158974 xhdr_flgs |= _X_XHDR; 1236123523f8Sas158974 } 12377c478bd9Sstevel@tonic-gate } 12387c478bd9Sstevel@tonic-gate backtape(); /* was called by endtape */ 12397c478bd9Sstevel@tonic-gate if (tfile != NULL) { 124031a2de35SRich Burridge /* 124131a2de35SRich Burridge * Buffer size is calculated to be the size of the 124231a2de35SRich Burridge * tmpdir string, plus 6 times the size of the tname 124331a2de35SRich Burridge * string, plus a value that is known to be greater 124431a2de35SRich Burridge * than the command pipeline string. 124531a2de35SRich Burridge */ 124631a2de35SRich Burridge int buflen = strlen(tmpdir) + (6 * strlen(tname)) + 100; 124731a2de35SRich Burridge char *buf; 12487c478bd9Sstevel@tonic-gate 124931a2de35SRich Burridge if ((buf = (char *)calloc(1, buflen)) == NULL) { 125031a2de35SRich Burridge vperror(1, gettext("tar: out of memory, " 125131a2de35SRich Burridge "cannot create sort command file\n")); 125231a2de35SRich Burridge } 125331a2de35SRich Burridge 125431a2de35SRich Burridge (void) snprintf(buf, buflen, "env 'TMPDIR=%s' " 125531a2de35SRich Burridge "sort +0 -1 +1nr %s -o %s; awk '$1 " 12567c478bd9Sstevel@tonic-gate "!= prev {print; prev=$1}' %s >%sX;mv %sX %s", 125731a2de35SRich Burridge tmpdir, tname, tname, tname, tname, tname, tname); 12587c478bd9Sstevel@tonic-gate (void) fflush(tfile); 12597c478bd9Sstevel@tonic-gate (void) system(buf); 126031a2de35SRich Burridge free(buf); 12617c478bd9Sstevel@tonic-gate (void) freopen(tname, "r", tfile); 12627c478bd9Sstevel@tonic-gate (void) fstat(fileno(tfile), &stbuf); 12637c478bd9Sstevel@tonic-gate high = stbuf.st_size; 12647c478bd9Sstevel@tonic-gate } 12657c478bd9Sstevel@tonic-gate } 12667c478bd9Sstevel@tonic-gate 12677c478bd9Sstevel@tonic-gate dumping = 1; 12687c478bd9Sstevel@tonic-gate if (mulvol) { /* SP-1 */ 12697c478bd9Sstevel@tonic-gate if (nblock && (blocklim%nblock) != 0) 12707c478bd9Sstevel@tonic-gate fatal(gettext( 12717c478bd9Sstevel@tonic-gate "Volume size not a multiple of block size.")); 12727c478bd9Sstevel@tonic-gate blocklim -= 2; /* for trailer records */ 12737c478bd9Sstevel@tonic-gate if (vflag) 12747c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("Volume ends at %" 12757c478bd9Sstevel@tonic-gate FMT_blkcnt_t "K, blocking factor = %dK\n"), 12767c478bd9Sstevel@tonic-gate K((blocklim - 1)), K(nblock)); 12777c478bd9Sstevel@tonic-gate } 12787c478bd9Sstevel@tonic-gate 12797c478bd9Sstevel@tonic-gate /* 12807c478bd9Sstevel@tonic-gate * Save the original directory before it gets 12817c478bd9Sstevel@tonic-gate * changed. 12827c478bd9Sstevel@tonic-gate */ 12837c478bd9Sstevel@tonic-gate if (getcwd(origdir, (PATH_MAX+1)) == NULL) { 12847c478bd9Sstevel@tonic-gate vperror(0, gettext("A parent directory cannot be read")); 12857c478bd9Sstevel@tonic-gate exit(1); 12867c478bd9Sstevel@tonic-gate } 12877c478bd9Sstevel@tonic-gate 12887c478bd9Sstevel@tonic-gate (void) strcpy(wdir, origdir); 12897c478bd9Sstevel@tonic-gate 1290cc22b130SRich Burridge while ((*argv || fp) && !term) { 12917c478bd9Sstevel@tonic-gate if (fp || (strcmp(*argv, "-I") == 0)) { 12927c478bd9Sstevel@tonic-gate if (fp == NULL) { 12937c478bd9Sstevel@tonic-gate if (*++argv == NULL) 12947c478bd9Sstevel@tonic-gate fatal(gettext( 12957c478bd9Sstevel@tonic-gate "missing file name for -I flag.")); 12967c478bd9Sstevel@tonic-gate else if ((fp = fopen(*argv++, "r")) == NULL) 12977c478bd9Sstevel@tonic-gate vperror(0, "%s", argv[-1]); 12987c478bd9Sstevel@tonic-gate continue; 12997c478bd9Sstevel@tonic-gate } else if ((fgets(file, PATH_MAX-1, fp)) == NULL) { 13007c478bd9Sstevel@tonic-gate (void) fclose(fp); 13017c478bd9Sstevel@tonic-gate fp = NULL; 13027c478bd9Sstevel@tonic-gate continue; 13037c478bd9Sstevel@tonic-gate } else { 13047c478bd9Sstevel@tonic-gate cp = cp2 = file; 13057c478bd9Sstevel@tonic-gate if ((p = strchr(cp2, '\n'))) 13067c478bd9Sstevel@tonic-gate *p = 0; 13077c478bd9Sstevel@tonic-gate } 13087c478bd9Sstevel@tonic-gate } else if ((strcmp(*argv, "-C") == 0) && argv[1]) { 1309b25dbf38SRich Burridge if (tar_chdir(*++argv) < 0) 13107c478bd9Sstevel@tonic-gate vperror(0, gettext( 13117c478bd9Sstevel@tonic-gate "can't change directories to %s"), *argv); 13127c478bd9Sstevel@tonic-gate else 13137c478bd9Sstevel@tonic-gate (void) getcwd(wdir, (sizeof (wdir))); 13147c478bd9Sstevel@tonic-gate argv++; 13157c478bd9Sstevel@tonic-gate continue; 13167c478bd9Sstevel@tonic-gate } else 13177c478bd9Sstevel@tonic-gate cp = cp2 = strcpy(file, *argv++); 13187c478bd9Sstevel@tonic-gate 13197c478bd9Sstevel@tonic-gate /* 13207c478bd9Sstevel@tonic-gate * point cp2 to the last '/' in file, but not 13217c478bd9Sstevel@tonic-gate * to a trailing '/' 13227c478bd9Sstevel@tonic-gate */ 13237c478bd9Sstevel@tonic-gate for (; *cp; cp++) { 13247c478bd9Sstevel@tonic-gate if (*cp == '/') { 13257c478bd9Sstevel@tonic-gate while (*(cp+1) == '/') { 13267c478bd9Sstevel@tonic-gate ++cp; 13277c478bd9Sstevel@tonic-gate } 13287c478bd9Sstevel@tonic-gate if (*(cp+1) != '\0') { 13297c478bd9Sstevel@tonic-gate /* not trailing slash */ 13307c478bd9Sstevel@tonic-gate cp2 = cp; 13317c478bd9Sstevel@tonic-gate } 13327c478bd9Sstevel@tonic-gate } 13337c478bd9Sstevel@tonic-gate } 13347c478bd9Sstevel@tonic-gate if (cp2 != file) { 13357c478bd9Sstevel@tonic-gate *cp2 = '\0'; 1336b25dbf38SRich Burridge if (tar_chdir(file) < 0) { 13377c478bd9Sstevel@tonic-gate vperror(0, gettext( 13387c478bd9Sstevel@tonic-gate "can't change directories to %s"), file); 13397c478bd9Sstevel@tonic-gate continue; 13407c478bd9Sstevel@tonic-gate } 13417c478bd9Sstevel@tonic-gate *cp2 = '/'; 13427c478bd9Sstevel@tonic-gate cp2++; 13437c478bd9Sstevel@tonic-gate } 13447c478bd9Sstevel@tonic-gate 13457c478bd9Sstevel@tonic-gate parent = getcwd(tempdir, (sizeof (tempdir))); 1346da6c28aaSamw 1347da6c28aaSamw archtype = putfile(file, cp2, parent, NULL, NORMAL_FILE, 13487c478bd9Sstevel@tonic-gate LEV0, SYMLINK_LEV0); 13497c478bd9Sstevel@tonic-gate 13507c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 13517c478bd9Sstevel@tonic-gate if (!exitflag) { 1352da6c28aaSamw if ((atflag || saflag) && 1353da6c28aaSamw (archtype == PUT_NOTAS_LINK)) { 1354da6c28aaSamw xattrs_put(file, cp2, parent, NULL); 13557c478bd9Sstevel@tonic-gate } 13567c478bd9Sstevel@tonic-gate } 13577c478bd9Sstevel@tonic-gate #endif 13587c478bd9Sstevel@tonic-gate 1359b25dbf38SRich Burridge if (tar_chdir(origdir) < 0) 13607c478bd9Sstevel@tonic-gate vperror(0, gettext("cannot change back?: %s"), origdir); 13617c478bd9Sstevel@tonic-gate 13627c478bd9Sstevel@tonic-gate if (exitflag) { 13637c478bd9Sstevel@tonic-gate /* 13647c478bd9Sstevel@tonic-gate * If e function modifier has been specified 13657c478bd9Sstevel@tonic-gate * write the files (that are listed before the 13667c478bd9Sstevel@tonic-gate * file causing the error) to tape. exitflag is 13677c478bd9Sstevel@tonic-gate * used because only some of the error conditions 13687c478bd9Sstevel@tonic-gate * in putfile() recognize the e function modifier. 13697c478bd9Sstevel@tonic-gate */ 13707c478bd9Sstevel@tonic-gate break; 13717c478bd9Sstevel@tonic-gate } 13727c478bd9Sstevel@tonic-gate } 13737c478bd9Sstevel@tonic-gate 13747c478bd9Sstevel@tonic-gate putempty((blkcnt_t)2); 13757c478bd9Sstevel@tonic-gate flushtape(); 13767c478bd9Sstevel@tonic-gate closevol(); /* SP-1 */ 13777c478bd9Sstevel@tonic-gate if (linkerrok == 1) 13787c478bd9Sstevel@tonic-gate for (; ihead != NULL; ihead = ihead->nextp) { 13797c478bd9Sstevel@tonic-gate if (ihead->count == 0) 13807c478bd9Sstevel@tonic-gate continue; 13817c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 13827c478bd9Sstevel@tonic-gate "tar: missing links to %s\n"), ihead->pathname); 13837c478bd9Sstevel@tonic-gate if (errflag) 13847c478bd9Sstevel@tonic-gate done(1); 13857c478bd9Sstevel@tonic-gate else 13867c478bd9Sstevel@tonic-gate Errflg = 1; 13877c478bd9Sstevel@tonic-gate } 13887c478bd9Sstevel@tonic-gate } 13897c478bd9Sstevel@tonic-gate 13907c478bd9Sstevel@tonic-gate 13917c478bd9Sstevel@tonic-gate /* 13927c478bd9Sstevel@tonic-gate * endtape - check for tape at end 13937c478bd9Sstevel@tonic-gate * 13947c478bd9Sstevel@tonic-gate * endtape checks the entry in dblock.dbuf to see if its the 13957c478bd9Sstevel@tonic-gate * special EOT entry. Endtape is usually called after getdir(). 13967c478bd9Sstevel@tonic-gate * 13977c478bd9Sstevel@tonic-gate * endtape used to call backtape; it no longer does, he who 13987c478bd9Sstevel@tonic-gate * wants it backed up must call backtape himself 13997c478bd9Sstevel@tonic-gate * RETURNS: 0 if not EOT, tape position unaffected 14007c478bd9Sstevel@tonic-gate * 1 if EOT, tape position unaffected 14017c478bd9Sstevel@tonic-gate */ 14027c478bd9Sstevel@tonic-gate 14037c478bd9Sstevel@tonic-gate static int 14047c478bd9Sstevel@tonic-gate endtape(void) 14057c478bd9Sstevel@tonic-gate { 14067c478bd9Sstevel@tonic-gate if (dblock.dbuf.name[0] == '\0') { /* null header = EOT */ 14077c478bd9Sstevel@tonic-gate return (1); 14087c478bd9Sstevel@tonic-gate } else 14097c478bd9Sstevel@tonic-gate return (0); 14107c478bd9Sstevel@tonic-gate } 14117c478bd9Sstevel@tonic-gate 14127c478bd9Sstevel@tonic-gate /* 14137c478bd9Sstevel@tonic-gate * getdir - get directory entry from tar tape 14147c478bd9Sstevel@tonic-gate * 14157c478bd9Sstevel@tonic-gate * getdir reads the next tarblock off the tape and cracks 14167c478bd9Sstevel@tonic-gate * it as a directory. The checksum must match properly. 14177c478bd9Sstevel@tonic-gate * 14187c478bd9Sstevel@tonic-gate * If tfile is non-null getdir writes the file name and mod date 14197c478bd9Sstevel@tonic-gate * to tfile. 14207c478bd9Sstevel@tonic-gate */ 14217c478bd9Sstevel@tonic-gate 14227c478bd9Sstevel@tonic-gate static void 14237c478bd9Sstevel@tonic-gate getdir(void) 14247c478bd9Sstevel@tonic-gate { 14257c478bd9Sstevel@tonic-gate struct stat *sp; 14267c478bd9Sstevel@tonic-gate #ifdef EUC 14277c478bd9Sstevel@tonic-gate static int warn_chksum_sign = 0; 14287c478bd9Sstevel@tonic-gate #endif /* EUC */ 14297c478bd9Sstevel@tonic-gate 14307c478bd9Sstevel@tonic-gate top: 14317c478bd9Sstevel@tonic-gate readtape((char *)&dblock); 14327c478bd9Sstevel@tonic-gate if (dblock.dbuf.name[0] == '\0') 14337c478bd9Sstevel@tonic-gate return; 14347c478bd9Sstevel@tonic-gate sp = &stbuf; 14357c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.mode, "%8lo", &Gen.g_mode); 14367c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.uid, "%8lo", (ulong_t *)&Gen.g_uid); 14377c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.gid, "%8lo", (ulong_t *)&Gen.g_gid); 14387c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.size, "%12" FMT_off_t_o, &Gen.g_filesz); 14397c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.mtime, "%12lo", (ulong_t *)&Gen.g_mtime); 14407c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.chksum, "%8o", &Gen.g_cksum); 14417c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.devmajor, "%8lo", &Gen.g_devmajor); 14427c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.devminor, "%8lo", &Gen.g_devminor); 14437c478bd9Sstevel@tonic-gate 14447c478bd9Sstevel@tonic-gate is_posix = (strcmp(dblock.dbuf.magic, magic_type) == 0); 14457c478bd9Sstevel@tonic-gate 14467c478bd9Sstevel@tonic-gate sp->st_mode = Gen.g_mode; 14477c478bd9Sstevel@tonic-gate if (is_posix && (sp->st_mode & S_IFMT) == 0) 14487c478bd9Sstevel@tonic-gate switch (dblock.dbuf.typeflag) { 14497c478bd9Sstevel@tonic-gate case '0': case 0: case _XATTR_HDRTYPE: 14507c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFREG; 14517c478bd9Sstevel@tonic-gate break; 14527c478bd9Sstevel@tonic-gate case '1': /* hard link */ 14537c478bd9Sstevel@tonic-gate break; 14547c478bd9Sstevel@tonic-gate case '2': 14557c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFLNK; 14567c478bd9Sstevel@tonic-gate break; 14577c478bd9Sstevel@tonic-gate case '3': 14587c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFCHR; 14597c478bd9Sstevel@tonic-gate break; 14607c478bd9Sstevel@tonic-gate case '4': 14617c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFBLK; 14627c478bd9Sstevel@tonic-gate break; 14637c478bd9Sstevel@tonic-gate case '5': 14647c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFDIR; 14657c478bd9Sstevel@tonic-gate break; 14667c478bd9Sstevel@tonic-gate case '6': 14677c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFIFO; 14687c478bd9Sstevel@tonic-gate break; 14697c478bd9Sstevel@tonic-gate default: 14707c478bd9Sstevel@tonic-gate if (convtoreg(Gen.g_filesz)) 14717c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFREG; 14727c478bd9Sstevel@tonic-gate break; 14737c478bd9Sstevel@tonic-gate } 14747c478bd9Sstevel@tonic-gate 1475e765faefSRich Burridge if ((dblock.dbuf.typeflag == 'X') || (dblock.dbuf.typeflag == 'L')) { 14767c478bd9Sstevel@tonic-gate Xhdrflag = 1; /* Currently processing extended header */ 1477e765faefSRich Burridge } else { 14787c478bd9Sstevel@tonic-gate Xhdrflag = 0; 1479e765faefSRich Burridge } 14807c478bd9Sstevel@tonic-gate 14817c478bd9Sstevel@tonic-gate sp->st_uid = Gen.g_uid; 14827c478bd9Sstevel@tonic-gate sp->st_gid = Gen.g_gid; 14837c478bd9Sstevel@tonic-gate sp->st_size = Gen.g_filesz; 14847c478bd9Sstevel@tonic-gate sp->st_mtime = Gen.g_mtime; 14857c478bd9Sstevel@tonic-gate chksum = Gen.g_cksum; 14867c478bd9Sstevel@tonic-gate 14877c478bd9Sstevel@tonic-gate if (dblock.dbuf.extno != '\0') { /* split file? */ 14887c478bd9Sstevel@tonic-gate extno = dblock.dbuf.extno; 14897c478bd9Sstevel@tonic-gate extsize = Gen.g_filesz; 14907c478bd9Sstevel@tonic-gate extotal = dblock.dbuf.extotal; 14917c478bd9Sstevel@tonic-gate } else { 14927c478bd9Sstevel@tonic-gate extno = 0; /* tell others file not split */ 14937c478bd9Sstevel@tonic-gate extsize = 0; 14947c478bd9Sstevel@tonic-gate extotal = 0; 14957c478bd9Sstevel@tonic-gate } 14967c478bd9Sstevel@tonic-gate 14977c478bd9Sstevel@tonic-gate #ifdef EUC 14987c478bd9Sstevel@tonic-gate if (chksum != checksum(&dblock)) { 14997c478bd9Sstevel@tonic-gate if (chksum != checksum_signed(&dblock)) { 15007c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 15017c478bd9Sstevel@tonic-gate "tar: directory checksum error\n")); 150203d7b3c0SRich Burridge if (iflag) { 150303d7b3c0SRich Burridge Errflg = 2; 15047c478bd9Sstevel@tonic-gate goto top; 150503d7b3c0SRich Burridge } 15067c478bd9Sstevel@tonic-gate done(2); 15077c478bd9Sstevel@tonic-gate } else { 15087c478bd9Sstevel@tonic-gate if (! warn_chksum_sign) { 15097c478bd9Sstevel@tonic-gate warn_chksum_sign = 1; 15107c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 15117c478bd9Sstevel@tonic-gate "tar: warning: tar file made with signed checksum\n")); 15127c478bd9Sstevel@tonic-gate } 15137c478bd9Sstevel@tonic-gate } 15147c478bd9Sstevel@tonic-gate } 15157c478bd9Sstevel@tonic-gate #else 15167c478bd9Sstevel@tonic-gate if (chksum != checksum(&dblock)) { 15177c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 15187c478bd9Sstevel@tonic-gate "tar: directory checksum error\n")); 151903d7b3c0SRich Burridge if (iflag) { 152003d7b3c0SRich Burridge Errflg = 2; 15217c478bd9Sstevel@tonic-gate goto top; 152203d7b3c0SRich Burridge } 15237c478bd9Sstevel@tonic-gate done(2); 15247c478bd9Sstevel@tonic-gate } 15257c478bd9Sstevel@tonic-gate #endif /* EUC */ 15267c478bd9Sstevel@tonic-gate if (tfile != NULL && Xhdrflag == 0) { 15277c478bd9Sstevel@tonic-gate /* 15287c478bd9Sstevel@tonic-gate * If an extended header is present, then time is available 15297c478bd9Sstevel@tonic-gate * in nanoseconds in the extended header data, so set it. 15307c478bd9Sstevel@tonic-gate * Otherwise, give an invalid value so that checkupdate will 15317c478bd9Sstevel@tonic-gate * not test beyond seconds. 15327c478bd9Sstevel@tonic-gate */ 15337c478bd9Sstevel@tonic-gate if ((xhdr_flgs & _X_MTIME)) 15347c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec = Xtarhdr.x_mtime.tv_nsec; 15357c478bd9Sstevel@tonic-gate else 15367c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec = -1; 15377c478bd9Sstevel@tonic-gate 15387c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 15397c478bd9Sstevel@tonic-gate (void) fprintf(tfile, "%s %10ld.%9.9ld\n", 15407c478bd9Sstevel@tonic-gate Xtarhdr.x_path, sp->st_mtim.tv_sec, 15417c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec); 15427c478bd9Sstevel@tonic-gate else 15437c478bd9Sstevel@tonic-gate (void) fprintf(tfile, "%.*s %10ld.%9.9ld\n", 15447c478bd9Sstevel@tonic-gate NAMSIZ, dblock.dbuf.name, sp->st_mtim.tv_sec, 15457c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec); 15467c478bd9Sstevel@tonic-gate } 15477c478bd9Sstevel@tonic-gate 15487c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 15497c478bd9Sstevel@tonic-gate Hiddendir = 0; 15507c478bd9Sstevel@tonic-gate if (xattrp && dblock.dbuf.typeflag == _XATTR_HDRTYPE) { 15517c478bd9Sstevel@tonic-gate if (xattrbadhead) { 15527c478bd9Sstevel@tonic-gate free(xattrhead); 15537c478bd9Sstevel@tonic-gate xattrp = NULL; 15547c478bd9Sstevel@tonic-gate xattr_linkp = NULL; 15557c478bd9Sstevel@tonic-gate xattrhead = NULL; 15567c478bd9Sstevel@tonic-gate } else { 1557da6c28aaSamw char *aname = basename(xattrapath); 1558da6c28aaSamw size_t xindex = aname - xattrapath; 1559da6c28aaSamw 1560da6c28aaSamw if (xattrapath[xindex] == '.' && 1561da6c28aaSamw xattrapath[xindex + 1] == '\0' && 15627c478bd9Sstevel@tonic-gate xattrp->h_typeflag == '5') { 15637c478bd9Sstevel@tonic-gate Hiddendir = 1; 15647c478bd9Sstevel@tonic-gate sp->st_mode = 1565d2443e76Smarks (S_IFDIR | (sp->st_mode & POSIXMODES)); 15667c478bd9Sstevel@tonic-gate } 15677c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = xattrp->h_typeflag; 15687c478bd9Sstevel@tonic-gate } 15697c478bd9Sstevel@tonic-gate } 15707c478bd9Sstevel@tonic-gate #endif 15717c478bd9Sstevel@tonic-gate } 15727c478bd9Sstevel@tonic-gate 15737c478bd9Sstevel@tonic-gate 15747c478bd9Sstevel@tonic-gate /* 15757c478bd9Sstevel@tonic-gate * passtape - skip over a file on the tape 15767c478bd9Sstevel@tonic-gate * 15777c478bd9Sstevel@tonic-gate * passtape skips over the next data file on the tape. 15787c478bd9Sstevel@tonic-gate * The tape directory entry must be in dblock.dbuf. This 15797c478bd9Sstevel@tonic-gate * routine just eats the number of blocks computed from the 15807c478bd9Sstevel@tonic-gate * directory size entry; the tape must be (logically) positioned 15817c478bd9Sstevel@tonic-gate * right after thee directory info. 15827c478bd9Sstevel@tonic-gate */ 15837c478bd9Sstevel@tonic-gate 15847c478bd9Sstevel@tonic-gate static void 15857c478bd9Sstevel@tonic-gate passtape(void) 15867c478bd9Sstevel@tonic-gate { 15877c478bd9Sstevel@tonic-gate blkcnt_t blocks; 15887c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 15897c478bd9Sstevel@tonic-gate 15907c478bd9Sstevel@tonic-gate /* 15917c478bd9Sstevel@tonic-gate * Types link(1), sym-link(2), char special(3), blk special(4), 15927c478bd9Sstevel@tonic-gate * directory(5), and FIFO(6) do not have data blocks associated 15937c478bd9Sstevel@tonic-gate * with them so just skip reading the data block. 15947c478bd9Sstevel@tonic-gate */ 15957c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '1' || dblock.dbuf.typeflag == '2' || 15967c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == '3' || dblock.dbuf.typeflag == '4' || 15977c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == '5' || dblock.dbuf.typeflag == '6') 15987c478bd9Sstevel@tonic-gate return; 15997c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 16007c478bd9Sstevel@tonic-gate 16017c478bd9Sstevel@tonic-gate /* if operating on disk, seek instead of reading */ 16027c478bd9Sstevel@tonic-gate if (NotTape) 16037c478bd9Sstevel@tonic-gate seekdisk(blocks); 16047c478bd9Sstevel@tonic-gate else 16057c478bd9Sstevel@tonic-gate while (blocks-- > 0) 16067c478bd9Sstevel@tonic-gate readtape(buf); 16077c478bd9Sstevel@tonic-gate } 16087c478bd9Sstevel@tonic-gate 1609da6c28aaSamw #if defined(O_XATTR) 1610da6c28aaSamw static int 1611da6c28aaSamw is_sysattr(char *name) 1612da6c28aaSamw { 1613da6c28aaSamw return ((strcmp(name, VIEW_READONLY) == 0) || 1614da6c28aaSamw (strcmp(name, VIEW_READWRITE) == 0)); 1615da6c28aaSamw } 1616da6c28aaSamw #endif 1617da6c28aaSamw 1618da6c28aaSamw #if defined(O_XATTR) 1619da6c28aaSamw /* 1620da6c28aaSamw * Verify the attribute, attrname, is an attribute we want to restore. 1621da6c28aaSamw * Never restore read-only system attribute files. Only restore read-write 1622da6c28aaSamw * system attributes files when -/ was specified, and only traverse into 1623da6c28aaSamw * the 2nd level attribute directory containing only system attributes if 1624da6c28aaSamw * -@ was specified. This keeps us from archiving 1625da6c28aaSamw * <attribute name>/<read-write system attribute file> 1626da6c28aaSamw * when -/ was specified without -@. 1627da6c28aaSamw * 1628da6c28aaSamw * attrname - attribute file name 1629da6c28aaSamw * attrparent - attribute's parent name within the base file's attribute 1630da6c28aaSamw * directory hierarchy 1631da6c28aaSamw */ 1632da6c28aaSamw static attr_status_t 1633da6c28aaSamw verify_attr(char *attrname, char *attrparent, int arc_rwsysattr, 1634da6c28aaSamw int *rw_sysattr) 1635da6c28aaSamw { 1636da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 1637da6c28aaSamw int attr_supported; 1638da6c28aaSamw 1639da6c28aaSamw /* Never restore read-only system attribute files */ 1640da6c28aaSamw if ((attr_supported = sysattr_type(attrname)) == _RO_SATTR) { 1641da6c28aaSamw *rw_sysattr = 0; 1642da6c28aaSamw return (ATTR_SKIP); 1643da6c28aaSamw } else { 1644da6c28aaSamw *rw_sysattr = (attr_supported == _RW_SATTR); 1645da6c28aaSamw } 1646da6c28aaSamw #else 1647da6c28aaSamw /* 1648da6c28aaSamw * Only need to check if this attribute is an extended system 1649da6c28aaSamw * attribute. 1650da6c28aaSamw */ 1651da6c28aaSamw if (*rw_sysattr = is_sysattr(attrname)) { 1652da6c28aaSamw return (ATTR_SKIP); 1653da6c28aaSamw } else { 1654da6c28aaSamw return (ATTR_OK); 1655da6c28aaSamw } 1656da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 1657da6c28aaSamw 1658da6c28aaSamw /* 1659da6c28aaSamw * If the extended system attribute file is specified with the 1660da6c28aaSamw * arc_rwsysattr flag, as being transient (default extended 1661da6c28aaSamw * attributes), then don't archive it. 1662da6c28aaSamw */ 1663da6c28aaSamw if (*rw_sysattr && !arc_rwsysattr) { 1664da6c28aaSamw return (ATTR_SKIP); 1665da6c28aaSamw } 1666da6c28aaSamw 1667da6c28aaSamw /* 1668da6c28aaSamw * Only restore read-write system attribute files 1669da6c28aaSamw * when -/ was specified. Only restore extended 1670da6c28aaSamw * attributes when -@ was specified. 1671da6c28aaSamw */ 1672da6c28aaSamw if (atflag) { 1673da6c28aaSamw if (!saflag) { 1674da6c28aaSamw /* 1675da6c28aaSamw * Only archive/restore the hidden directory "." if 1676da6c28aaSamw * we're processing the top level hidden attribute 1677da6c28aaSamw * directory. We don't want to process the 1678da6c28aaSamw * hidden attribute directory of the attribute 1679da6c28aaSamw * directory that contains only extended system 1680da6c28aaSamw * attributes. 1681da6c28aaSamw */ 1682da6c28aaSamw if (*rw_sysattr || (Hiddendir && 1683da6c28aaSamw (attrparent != NULL))) { 1684da6c28aaSamw return (ATTR_SKIP); 1685da6c28aaSamw } 1686da6c28aaSamw } 1687da6c28aaSamw } else if (saflag) { 1688da6c28aaSamw /* 1689da6c28aaSamw * Only archive/restore read-write extended system attribute 1690da6c28aaSamw * files of the base file. 1691da6c28aaSamw */ 1692da6c28aaSamw if (!*rw_sysattr || (attrparent != NULL)) { 1693da6c28aaSamw return (ATTR_SKIP); 1694da6c28aaSamw } 1695da6c28aaSamw } else { 1696da6c28aaSamw return (ATTR_SKIP); 1697da6c28aaSamw } 1698da6c28aaSamw 1699da6c28aaSamw return (ATTR_OK); 1700da6c28aaSamw } 1701da6c28aaSamw #endif 17027c478bd9Sstevel@tonic-gate 17035e2174acSceastha static void 17045e2174acSceastha free_children(file_list_t *children) 17055e2174acSceastha { 17065e2174acSceastha file_list_t *child = children; 17075e2174acSceastha file_list_t *cptr; 17085e2174acSceastha 17095e2174acSceastha while (child != NULL) { 17105e2174acSceastha cptr = child->next; 17115e2174acSceastha if (child->name != NULL) { 17125e2174acSceastha free(child->name); 17135e2174acSceastha } 17145e2174acSceastha child = cptr; 17155e2174acSceastha } 17165e2174acSceastha } 17175e2174acSceastha 17187c478bd9Sstevel@tonic-gate static int 1719da6c28aaSamw putfile(char *longname, char *shortname, char *parent, attr_data_t *attrinfo, 17207c478bd9Sstevel@tonic-gate int filetype, int lev, int symlink_lev) 17217c478bd9Sstevel@tonic-gate { 17227c478bd9Sstevel@tonic-gate int infile = -1; /* deliberately invalid */ 17237c478bd9Sstevel@tonic-gate blkcnt_t blocks; 17247c478bd9Sstevel@tonic-gate char buf[PATH_MAX + 2]; /* Add trailing slash and null */ 17257c478bd9Sstevel@tonic-gate char *bigbuf; 17267c478bd9Sstevel@tonic-gate int maxread; 17277c478bd9Sstevel@tonic-gate int hint; /* amount to write to get "in sync" */ 17287c478bd9Sstevel@tonic-gate char filetmp[PATH_MAX + 1]; 17297c478bd9Sstevel@tonic-gate char *cp; 17307c478bd9Sstevel@tonic-gate char *name; 1731da6c28aaSamw char *attrparent = NULL; 1732da6c28aaSamw char *longattrname = NULL; 17335e2174acSceastha file_list_t *child = NULL; 17345e2174acSceastha file_list_t *child_end = NULL; 17355e2174acSceastha file_list_t *cptr; 17367c478bd9Sstevel@tonic-gate struct dirent *dp; 17377c478bd9Sstevel@tonic-gate DIR *dirp; 17387c478bd9Sstevel@tonic-gate int i; 17397c478bd9Sstevel@tonic-gate int split; 17407c478bd9Sstevel@tonic-gate int dirfd = -1; 17417c478bd9Sstevel@tonic-gate int rc = PUT_NOTAS_LINK; 17427c478bd9Sstevel@tonic-gate int archtype = 0; 1743da6c28aaSamw int rw_sysattr = 0; 17447c478bd9Sstevel@tonic-gate char newparent[PATH_MAX + MAXNAMLEN + 1]; 17457c478bd9Sstevel@tonic-gate char *prefix = ""; 17467c478bd9Sstevel@tonic-gate char *tmpbuf; 17477c478bd9Sstevel@tonic-gate char goodbuf[PRESIZ + 2]; 17487c478bd9Sstevel@tonic-gate char junkbuf[MAXNAM+1]; 17497c478bd9Sstevel@tonic-gate char *lastslash; 17507c478bd9Sstevel@tonic-gate int j; 17517c478bd9Sstevel@tonic-gate struct stat sbuf; 17527c478bd9Sstevel@tonic-gate int readlink_max; 17537c478bd9Sstevel@tonic-gate 17547c478bd9Sstevel@tonic-gate (void) memset(goodbuf, '\0', sizeof (goodbuf)); 17557c478bd9Sstevel@tonic-gate (void) memset(junkbuf, '\0', sizeof (junkbuf)); 17567c478bd9Sstevel@tonic-gate 17577c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 17587c478bd9Sstevel@tonic-gate 17597c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) { 1760da6c28aaSamw attrparent = attrinfo->attr_parent; 1761da6c28aaSamw longattrname = attrinfo->attr_path; 1762da6c28aaSamw dirfd = attrinfo->attr_parentfd; 1763ced83f9bSceastha rw_sysattr = attrinfo->attr_rw_sysattr; 17647c478bd9Sstevel@tonic-gate } else { 17657c478bd9Sstevel@tonic-gate dirfd = open(".", O_RDONLY); 17667c478bd9Sstevel@tonic-gate } 17677c478bd9Sstevel@tonic-gate 17687c478bd9Sstevel@tonic-gate if (dirfd == -1) { 17697c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 1770da6c28aaSamw "tar: unable to open%sdirectory %s%s%s%s\n"), 17717c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? gettext(" attribute ") : " ", 1772da6c28aaSamw (attrparent == NULL) ? "" : gettext("of attribute "), 1773da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 1774da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 17757c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? longname : parent); 17767c478bd9Sstevel@tonic-gate goto out; 17777c478bd9Sstevel@tonic-gate } 17787c478bd9Sstevel@tonic-gate 17797c478bd9Sstevel@tonic-gate if (lev > MAXLEV) { 17807c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 17817c478bd9Sstevel@tonic-gate gettext("tar: directory nesting too deep, %s not dumped\n"), 17827c478bd9Sstevel@tonic-gate longname); 17837c478bd9Sstevel@tonic-gate goto out; 17847c478bd9Sstevel@tonic-gate } 17857c478bd9Sstevel@tonic-gate 1786da6c28aaSamw if (getstat(dirfd, longname, shortname, attrparent)) 17877c478bd9Sstevel@tonic-gate goto out; 17887c478bd9Sstevel@tonic-gate 17897c478bd9Sstevel@tonic-gate if (hflag) { 17907c478bd9Sstevel@tonic-gate /* 17917c478bd9Sstevel@tonic-gate * Catch nesting where a file is a symlink to its directory. 17927c478bd9Sstevel@tonic-gate */ 17937c478bd9Sstevel@tonic-gate j = fstatat(dirfd, shortname, &sbuf, AT_SYMLINK_NOFOLLOW); 17947c478bd9Sstevel@tonic-gate if (S_ISLNK(sbuf.st_mode)) { 17957c478bd9Sstevel@tonic-gate if (symlink_lev++ >= MAXSYMLINKS) { 17967c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 17977c478bd9Sstevel@tonic-gate "tar: %s: Number of symbolic links " 17987c478bd9Sstevel@tonic-gate "encountered during path name traversal " 17997c478bd9Sstevel@tonic-gate "exceeds MAXSYMLINKS\n"), longname); 18007c478bd9Sstevel@tonic-gate Errflg = 1; 18017c478bd9Sstevel@tonic-gate goto out; 18027c478bd9Sstevel@tonic-gate } 18037c478bd9Sstevel@tonic-gate } 18047c478bd9Sstevel@tonic-gate } 18057c478bd9Sstevel@tonic-gate 18067c478bd9Sstevel@tonic-gate /* 18077c478bd9Sstevel@tonic-gate * Check if the input file is the same as the tar file we 18087c478bd9Sstevel@tonic-gate * are creating 18097c478bd9Sstevel@tonic-gate */ 18107c478bd9Sstevel@tonic-gate if ((mt_ino == stbuf.st_ino) && (mt_dev == stbuf.st_dev)) { 18117c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 1812da6c28aaSamw "tar: %s%s%s%s%s same as archive file\n"), 1813da6c28aaSamw rw_sysattr ? gettext("system ") : "", 1814da6c28aaSamw (longattrname == NULL) ? "" : gettext("attribute "), 1815da6c28aaSamw (longattrname == NULL) ? "" : longattrname, 1816da6c28aaSamw (longattrname == NULL) ? "" : gettext(" of "), 1817da6c28aaSamw longname); 18187c478bd9Sstevel@tonic-gate Errflg = 1; 18197c478bd9Sstevel@tonic-gate goto out; 18207c478bd9Sstevel@tonic-gate } 18217c478bd9Sstevel@tonic-gate /* 18227c478bd9Sstevel@tonic-gate * Check size limit - we can't archive files that 18237c478bd9Sstevel@tonic-gate * exceed TAR_OFFSET_MAX bytes because of header 18247c478bd9Sstevel@tonic-gate * limitations. Exclude file types that set 18257c478bd9Sstevel@tonic-gate * st_size to zero below because they take no 18267c478bd9Sstevel@tonic-gate * archive space to represent contents. 18277c478bd9Sstevel@tonic-gate */ 18287c478bd9Sstevel@tonic-gate if ((stbuf.st_size > (off_t)TAR_OFFSET_MAX) && 18297c478bd9Sstevel@tonic-gate !S_ISDIR(stbuf.st_mode) && 18307c478bd9Sstevel@tonic-gate !S_ISCHR(stbuf.st_mode) && 18317c478bd9Sstevel@tonic-gate !S_ISBLK(stbuf.st_mode) && 18327c478bd9Sstevel@tonic-gate (Eflag == 0)) { 18337c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 1834da6c28aaSamw "tar: %s%s%s%s%s too large to archive. " 1835da6c28aaSamw "Use E function modifier.\n"), 1836da6c28aaSamw rw_sysattr ? gettext("system ") : "", 1837da6c28aaSamw (longattrname == NULL) ? "" : gettext("attribute "), 1838da6c28aaSamw (longattrname == NULL) ? "" : longattrname, 1839da6c28aaSamw (longattrname == NULL) ? "" : gettext(" of "), 1840da6c28aaSamw longname); 18417c478bd9Sstevel@tonic-gate if (errflag) 18427c478bd9Sstevel@tonic-gate exitflag = 1; 18437c478bd9Sstevel@tonic-gate Errflg = 1; 18447c478bd9Sstevel@tonic-gate goto out; 18457c478bd9Sstevel@tonic-gate } 18467c478bd9Sstevel@tonic-gate 18477c478bd9Sstevel@tonic-gate if (tfile != NULL && checkupdate(longname) == 0) { 18487c478bd9Sstevel@tonic-gate goto out; 18497c478bd9Sstevel@tonic-gate } 18507c478bd9Sstevel@tonic-gate if (checkw('r', longname) == 0) { 18517c478bd9Sstevel@tonic-gate goto out; 18527c478bd9Sstevel@tonic-gate } 18537c478bd9Sstevel@tonic-gate 18543a1dab68SRich Burridge if (Fflag && 18553a1dab68SRich Burridge checkf(longname, (stbuf.st_mode & S_IFMT) == S_IFDIR, Fflag) == 0) 18567c478bd9Sstevel@tonic-gate goto out; 18577c478bd9Sstevel@tonic-gate 18587c478bd9Sstevel@tonic-gate if (Xflag) { 18597c478bd9Sstevel@tonic-gate if (is_in_table(exclude_tbl, longname)) { 18607c478bd9Sstevel@tonic-gate if (vflag) { 18617c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 18627c478bd9Sstevel@tonic-gate "a %s excluded\n"), longname); 18637c478bd9Sstevel@tonic-gate } 18647c478bd9Sstevel@tonic-gate goto out; 18657c478bd9Sstevel@tonic-gate } 18667c478bd9Sstevel@tonic-gate } 18677c478bd9Sstevel@tonic-gate 18687c478bd9Sstevel@tonic-gate /* 18697c478bd9Sstevel@tonic-gate * If the length of the fullname is greater than MAXNAM, 18707c478bd9Sstevel@tonic-gate * print out a message and return (unless extended headers are used, 18717c478bd9Sstevel@tonic-gate * in which case fullname is limited to PATH_MAX). 18727c478bd9Sstevel@tonic-gate */ 18737c478bd9Sstevel@tonic-gate 18747c478bd9Sstevel@tonic-gate if ((((split = (int)strlen(longname)) > MAXNAM) && (Eflag == 0)) || 18757c478bd9Sstevel@tonic-gate (split > PATH_MAX)) { 18767c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 18777c478bd9Sstevel@tonic-gate "tar: %s: file name too long\n"), longname); 18787c478bd9Sstevel@tonic-gate if (errflag) 18797c478bd9Sstevel@tonic-gate exitflag = 1; 18807c478bd9Sstevel@tonic-gate Errflg = 1; 18817c478bd9Sstevel@tonic-gate goto out; 18827c478bd9Sstevel@tonic-gate } 18837c478bd9Sstevel@tonic-gate 18847c478bd9Sstevel@tonic-gate /* 18857c478bd9Sstevel@tonic-gate * We split the fullname into prefix and name components if any one 18867c478bd9Sstevel@tonic-gate * of three conditions holds: 18877c478bd9Sstevel@tonic-gate * -- the length of the fullname exceeds NAMSIZ, 18887c478bd9Sstevel@tonic-gate * -- the length of the fullname equals NAMSIZ, and the shortname 18897c478bd9Sstevel@tonic-gate * is less than NAMSIZ, (splitting in this case preserves 18907c478bd9Sstevel@tonic-gate * compatibility with 5.6 and 5.5.1 tar), or 18917c478bd9Sstevel@tonic-gate * -- the length of the fullname equals NAMSIZ, the file is a 18927c478bd9Sstevel@tonic-gate * directory and we are not in POSIX-conformant mode (where 18937c478bd9Sstevel@tonic-gate * trailing slashes are removed from directories). 18947c478bd9Sstevel@tonic-gate */ 18957c478bd9Sstevel@tonic-gate if ((split > NAMSIZ) || 18967c478bd9Sstevel@tonic-gate (split == NAMSIZ && strlen(shortname) < NAMSIZ) || 18974bc0a2efScasper (split == NAMSIZ && S_ISDIR(stbuf.st_mode) && !Pflag)) { 18987c478bd9Sstevel@tonic-gate /* 18997c478bd9Sstevel@tonic-gate * Since path is limited to PRESIZ characters, look for the 19007c478bd9Sstevel@tonic-gate * last slash within PRESIZ + 1 characters only. 19017c478bd9Sstevel@tonic-gate */ 19027c478bd9Sstevel@tonic-gate (void) strncpy(&goodbuf[0], longname, min(split, PRESIZ + 1)); 19037c478bd9Sstevel@tonic-gate tmpbuf = goodbuf; 19047c478bd9Sstevel@tonic-gate lastslash = strrchr(tmpbuf, '/'); 19057c478bd9Sstevel@tonic-gate if (lastslash == NULL) { 19067c478bd9Sstevel@tonic-gate i = split; /* Length of name */ 19077c478bd9Sstevel@tonic-gate j = 0; /* Length of prefix */ 19087c478bd9Sstevel@tonic-gate goodbuf[0] = '\0'; 19097c478bd9Sstevel@tonic-gate } else { 19107c478bd9Sstevel@tonic-gate *lastslash = '\0'; /* Terminate the prefix */ 19117c478bd9Sstevel@tonic-gate j = strlen(tmpbuf); 19127c478bd9Sstevel@tonic-gate i = split - j - 1; 19137c478bd9Sstevel@tonic-gate } 19147c478bd9Sstevel@tonic-gate /* 19157c478bd9Sstevel@tonic-gate * If the filename is greater than NAMSIZ we can't 19167c478bd9Sstevel@tonic-gate * archive the file unless we are using extended headers. 19177c478bd9Sstevel@tonic-gate */ 19184bc0a2efScasper if ((i > NAMSIZ) || (i == NAMSIZ && S_ISDIR(stbuf.st_mode) && 19197c478bd9Sstevel@tonic-gate !Pflag)) { 19207c478bd9Sstevel@tonic-gate /* Determine which (filename or path) is too long. */ 19217c478bd9Sstevel@tonic-gate lastslash = strrchr(longname, '/'); 19227c478bd9Sstevel@tonic-gate if (lastslash != NULL) 19237c478bd9Sstevel@tonic-gate i = strlen(lastslash + 1); 19247c478bd9Sstevel@tonic-gate if (Eflag > 0) { 19257c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_PATH; 19267c478bd9Sstevel@tonic-gate Xtarhdr.x_path = longname; 19277c478bd9Sstevel@tonic-gate if (i <= NAMSIZ) 19287c478bd9Sstevel@tonic-gate (void) strcpy(junkbuf, lastslash + 1); 19297c478bd9Sstevel@tonic-gate else 19307c478bd9Sstevel@tonic-gate (void) sprintf(junkbuf, "%llu", 19317c478bd9Sstevel@tonic-gate xhdr_count + 1); 19327c478bd9Sstevel@tonic-gate if (split - i - 1 > PRESIZ) 19337c478bd9Sstevel@tonic-gate (void) strcpy(goodbuf, xhdr_dirname); 19347c478bd9Sstevel@tonic-gate } else { 19357c478bd9Sstevel@tonic-gate if ((i > NAMSIZ) || (i == NAMSIZ && 19364bc0a2efScasper S_ISDIR(stbuf.st_mode) && !Pflag)) 19377c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 19387c478bd9Sstevel@tonic-gate "tar: %s: filename is greater than " 19397c478bd9Sstevel@tonic-gate "%d\n"), lastslash == NULL ? 19407c478bd9Sstevel@tonic-gate longname : lastslash + 1, NAMSIZ); 19417c478bd9Sstevel@tonic-gate else 19427c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 19437c478bd9Sstevel@tonic-gate "tar: %s: prefix is greater than %d" 19447c478bd9Sstevel@tonic-gate "\n"), longname, PRESIZ); 19457c478bd9Sstevel@tonic-gate if (errflag) 19467c478bd9Sstevel@tonic-gate exitflag = 1; 19477c478bd9Sstevel@tonic-gate Errflg = 1; 19487c478bd9Sstevel@tonic-gate goto out; 19497c478bd9Sstevel@tonic-gate } 19507c478bd9Sstevel@tonic-gate } else 19517c478bd9Sstevel@tonic-gate (void) strncpy(&junkbuf[0], longname + j + 1, 19527c478bd9Sstevel@tonic-gate strlen(longname + j + 1)); 19537c478bd9Sstevel@tonic-gate name = junkbuf; 19547c478bd9Sstevel@tonic-gate prefix = goodbuf; 19557c478bd9Sstevel@tonic-gate } else { 19567c478bd9Sstevel@tonic-gate name = longname; 19577c478bd9Sstevel@tonic-gate } 19587c478bd9Sstevel@tonic-gate if (Aflag) { 19597c478bd9Sstevel@tonic-gate if ((prefix != NULL) && (*prefix != '\0')) 19607c478bd9Sstevel@tonic-gate while (*prefix == '/') 19617c478bd9Sstevel@tonic-gate ++prefix; 19627c478bd9Sstevel@tonic-gate else 19637c478bd9Sstevel@tonic-gate while (*name == '/') 19647c478bd9Sstevel@tonic-gate ++name; 19657c478bd9Sstevel@tonic-gate } 19667c478bd9Sstevel@tonic-gate 19677c478bd9Sstevel@tonic-gate switch (stbuf.st_mode & S_IFMT) { 19687c478bd9Sstevel@tonic-gate case S_IFDIR: 19697c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 19707c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 19717c478bd9Sstevel@tonic-gate 19727c478bd9Sstevel@tonic-gate if (filetype != XATTR_FILE && Hiddendir == 0) { 19737c478bd9Sstevel@tonic-gate i = 0; 19747c478bd9Sstevel@tonic-gate cp = buf; 19757c478bd9Sstevel@tonic-gate while ((*cp++ = longname[i++])) 19767c478bd9Sstevel@tonic-gate ; 19777c478bd9Sstevel@tonic-gate *--cp = '/'; 19787c478bd9Sstevel@tonic-gate *++cp = 0; 19797c478bd9Sstevel@tonic-gate } 19807c478bd9Sstevel@tonic-gate if (!oflag) { 19817c478bd9Sstevel@tonic-gate tomodes(&stbuf); 19827c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '5', filetype, 19837c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) { 19847c478bd9Sstevel@tonic-gate goto out; 19857c478bd9Sstevel@tonic-gate } 19867c478bd9Sstevel@tonic-gate if (!Pflag) { 19877c478bd9Sstevel@tonic-gate /* 19887c478bd9Sstevel@tonic-gate * Old archives require a slash at the end 19897c478bd9Sstevel@tonic-gate * of a directory name. 19907c478bd9Sstevel@tonic-gate * 19917c478bd9Sstevel@tonic-gate * XXX 19927c478bd9Sstevel@tonic-gate * If directory name is too long, will 19937c478bd9Sstevel@tonic-gate * slash overfill field? 19947c478bd9Sstevel@tonic-gate */ 19957c478bd9Sstevel@tonic-gate if (strlen(name) > (unsigned)NAMSIZ-1) { 19967c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 19977c478bd9Sstevel@tonic-gate "tar: %s: filename is greater " 19987c478bd9Sstevel@tonic-gate "than %d\n"), name, NAMSIZ); 19997c478bd9Sstevel@tonic-gate if (errflag) 20007c478bd9Sstevel@tonic-gate exitflag = 1; 20017c478bd9Sstevel@tonic-gate Errflg = 1; 20027c478bd9Sstevel@tonic-gate goto out; 20037c478bd9Sstevel@tonic-gate } else { 20047c478bd9Sstevel@tonic-gate if (strlen(name) == (NAMSIZ - 1)) { 20057c478bd9Sstevel@tonic-gate (void) memcpy(dblock.dbuf.name, 20067c478bd9Sstevel@tonic-gate name, NAMSIZ); 20077c478bd9Sstevel@tonic-gate dblock.dbuf.name[NAMSIZ-1] 20087c478bd9Sstevel@tonic-gate = '/'; 20097c478bd9Sstevel@tonic-gate } else 20107c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.name, 20117c478bd9Sstevel@tonic-gate "%s/", name); 20127c478bd9Sstevel@tonic-gate 20137c478bd9Sstevel@tonic-gate /* 20147c478bd9Sstevel@tonic-gate * need to recalculate checksum 20157c478bd9Sstevel@tonic-gate * because the name changed. 20167c478bd9Sstevel@tonic-gate */ 20177c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, 20187c478bd9Sstevel@tonic-gate "%07o", checksum(&dblock)); 20197c478bd9Sstevel@tonic-gate } 20207c478bd9Sstevel@tonic-gate } 20217c478bd9Sstevel@tonic-gate 2022da6c28aaSamw if (put_extra_attributes(longname, shortname, 2023da6c28aaSamw longattrname, prefix, filetype, '5') != 0) 20247c478bd9Sstevel@tonic-gate goto out; 20257c478bd9Sstevel@tonic-gate 20267c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 20277c478bd9Sstevel@tonic-gate /* 20287c478bd9Sstevel@tonic-gate * Reset header typeflag when archiving directory, since 20297c478bd9Sstevel@tonic-gate * build_dblock changed it on us. 20307c478bd9Sstevel@tonic-gate */ 20317c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) { 20327c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = _XATTR_HDRTYPE; 20337c478bd9Sstevel@tonic-gate } else { 20347c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '5'; 20357c478bd9Sstevel@tonic-gate } 20367c478bd9Sstevel@tonic-gate #else 20377c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '5'; 20387c478bd9Sstevel@tonic-gate #endif 20397c478bd9Sstevel@tonic-gate 20407c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", 20417c478bd9Sstevel@tonic-gate checksum(&dblock)); 20427c478bd9Sstevel@tonic-gate 20437c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 20447c478bd9Sstevel@tonic-gate } 20457c478bd9Sstevel@tonic-gate if (vflag) { 20467c478bd9Sstevel@tonic-gate #ifdef DEBUG 20477c478bd9Sstevel@tonic-gate if (NotTape) 20487c478bd9Sstevel@tonic-gate DEBUG("seek = %" FMT_blkcnt_t "K\t", K(tapepos), 20497c478bd9Sstevel@tonic-gate 0); 20507c478bd9Sstevel@tonic-gate #endif 20517c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE && Hiddendir) { 20528e4a71aeSRich Burridge (void) fprintf(vfile, 20538e4a71aeSRich Burridge gettext("a %s attribute %s "), 2054da6c28aaSamw longname, longattrname); 20557c478bd9Sstevel@tonic-gate 20567c478bd9Sstevel@tonic-gate } else { 20577c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "a %s/ ", longname); 20587c478bd9Sstevel@tonic-gate } 20597c478bd9Sstevel@tonic-gate if (NotTape) 20607c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n", 20617c478bd9Sstevel@tonic-gate K(blocks)); 20627c478bd9Sstevel@tonic-gate else 20637c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" FMT_blkcnt_t 20647c478bd9Sstevel@tonic-gate " tape blocks\n"), blocks); 20657c478bd9Sstevel@tonic-gate } 20667c478bd9Sstevel@tonic-gate 20677c478bd9Sstevel@tonic-gate /* 20687c478bd9Sstevel@tonic-gate * If hidden dir then break now since xattrs_put() will do 20697c478bd9Sstevel@tonic-gate * the iterating of the directory. 20707c478bd9Sstevel@tonic-gate * 2071da6c28aaSamw * At the moment, there can only be system attributes on 2072da6c28aaSamw * attributes. There can be no attributes on attributes or 2073da6c28aaSamw * directories within the attributes hidden directory hierarchy. 20747c478bd9Sstevel@tonic-gate */ 20757c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) 20767c478bd9Sstevel@tonic-gate break; 20777c478bd9Sstevel@tonic-gate 20787c478bd9Sstevel@tonic-gate if (*shortname != '/') 20797c478bd9Sstevel@tonic-gate (void) sprintf(newparent, "%s/%s", parent, shortname); 20807c478bd9Sstevel@tonic-gate else 20817c478bd9Sstevel@tonic-gate (void) sprintf(newparent, "%s", shortname); 20827c478bd9Sstevel@tonic-gate 2083b25dbf38SRich Burridge if (tar_chdir(shortname) < 0) { 20847c478bd9Sstevel@tonic-gate vperror(0, "%s", newparent); 20857c478bd9Sstevel@tonic-gate goto out; 20867c478bd9Sstevel@tonic-gate } 20877c478bd9Sstevel@tonic-gate 20887c478bd9Sstevel@tonic-gate if ((dirp = opendir(".")) == NULL) { 20897c478bd9Sstevel@tonic-gate vperror(0, gettext( 20907c478bd9Sstevel@tonic-gate "can't open directory %s"), longname); 2091b25dbf38SRich Burridge if (tar_chdir(parent) < 0) 20927c478bd9Sstevel@tonic-gate vperror(0, gettext("cannot change back?: %s"), 20937c478bd9Sstevel@tonic-gate parent); 20947c478bd9Sstevel@tonic-gate goto out; 20957c478bd9Sstevel@tonic-gate } 20967c478bd9Sstevel@tonic-gate 20975e2174acSceastha /* 20985e2174acSceastha * Create a list of files (children) in this directory to avoid 20995e2174acSceastha * having to perform telldir()/seekdir(). 21005e2174acSceastha */ 21017c478bd9Sstevel@tonic-gate while ((dp = readdir(dirp)) != NULL && !term) { 21027c478bd9Sstevel@tonic-gate if ((strcmp(".", dp->d_name) == 0) || 21037c478bd9Sstevel@tonic-gate (strcmp("..", dp->d_name) == 0)) 21047c478bd9Sstevel@tonic-gate continue; 21055e2174acSceastha if (((cptr = (file_list_t *)calloc(sizeof (char), 21065e2174acSceastha sizeof (file_list_t))) == NULL) || 21075e2174acSceastha ((cptr->name = strdup(dp->d_name)) == NULL)) { 21085e2174acSceastha vperror(1, gettext( 21095e2174acSceastha "Insufficient memory for directory " 21105e2174acSceastha "list entry %s/%s\n"), 21115e2174acSceastha newparent, dp->d_name); 21125e2174acSceastha } 21137c478bd9Sstevel@tonic-gate 21145e2174acSceastha /* Add the file to the list */ 21155e2174acSceastha if (child == NULL) { 21165e2174acSceastha child = cptr; 21175e2174acSceastha } else { 21185e2174acSceastha child_end->next = cptr; 21195e2174acSceastha } 21205e2174acSceastha child_end = cptr; 21215e2174acSceastha } 21225e2174acSceastha (void) closedir(dirp); 21235e2174acSceastha 21245e2174acSceastha /* 21255e2174acSceastha * Archive each of the files in the current directory. 21265e2174acSceastha * If a file is a directory, putfile() is called 21275e2174acSceastha * recursively to archive the file hierarchy of the 21285e2174acSceastha * directory before archiving the next file in the 21295e2174acSceastha * current directory. 21305e2174acSceastha */ 21315e2174acSceastha while ((child != NULL) && !term) { 21325e2174acSceastha (void) strcpy(cp, child->name); 2133da6c28aaSamw archtype = putfile(buf, cp, newparent, NULL, 21347c478bd9Sstevel@tonic-gate NORMAL_FILE, lev + 1, symlink_lev); 21357c478bd9Sstevel@tonic-gate 21367c478bd9Sstevel@tonic-gate if (!exitflag) { 2137da6c28aaSamw if ((atflag || saflag) && 2138da6c28aaSamw (archtype == PUT_NOTAS_LINK)) { 2139da6c28aaSamw xattrs_put(buf, cp, newparent, NULL); 21407c478bd9Sstevel@tonic-gate } 21417c478bd9Sstevel@tonic-gate } 21427c478bd9Sstevel@tonic-gate if (exitflag) 21437c478bd9Sstevel@tonic-gate break; 21447c478bd9Sstevel@tonic-gate 21455e2174acSceastha /* Free each child as we are done processing it. */ 21465e2174acSceastha cptr = child; 21475e2174acSceastha child = child->next; 21485e2174acSceastha free(cptr->name); 21495e2174acSceastha free(cptr); 21507c478bd9Sstevel@tonic-gate } 21515e2174acSceastha if ((child != NULL) && !term) { 21525e2174acSceastha free_children(child); 21537c478bd9Sstevel@tonic-gate } 21547c478bd9Sstevel@tonic-gate 2155b25dbf38SRich Burridge if (tar_chdir(parent) < 0) { 21567c478bd9Sstevel@tonic-gate vperror(0, gettext("cannot change back?: %s"), parent); 21577c478bd9Sstevel@tonic-gate } 21587c478bd9Sstevel@tonic-gate 21597c478bd9Sstevel@tonic-gate break; 21607c478bd9Sstevel@tonic-gate 21617c478bd9Sstevel@tonic-gate case S_IFLNK: 21627c478bd9Sstevel@tonic-gate readlink_max = NAMSIZ; 21637c478bd9Sstevel@tonic-gate if (stbuf.st_size > NAMSIZ) { 21647c478bd9Sstevel@tonic-gate if (Eflag > 0) { 21657c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_LINKPATH; 21667c478bd9Sstevel@tonic-gate readlink_max = PATH_MAX; 21677c478bd9Sstevel@tonic-gate } else { 21687c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 21697c478bd9Sstevel@tonic-gate "tar: %s: symbolic link too long\n"), 21707c478bd9Sstevel@tonic-gate longname); 21717c478bd9Sstevel@tonic-gate if (errflag) 21727c478bd9Sstevel@tonic-gate exitflag = 1; 21737c478bd9Sstevel@tonic-gate Errflg = 1; 21747c478bd9Sstevel@tonic-gate goto out; 21757c478bd9Sstevel@tonic-gate } 21767c478bd9Sstevel@tonic-gate } 21777c478bd9Sstevel@tonic-gate /* 21787c478bd9Sstevel@tonic-gate * Sym-links need header size of zero since you 21797c478bd9Sstevel@tonic-gate * don't store any data for this type. 21807c478bd9Sstevel@tonic-gate */ 21817c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 21827c478bd9Sstevel@tonic-gate tomodes(&stbuf); 21837c478bd9Sstevel@tonic-gate i = readlink(shortname, filetmp, readlink_max); 21847c478bd9Sstevel@tonic-gate if (i < 0) { 21857c478bd9Sstevel@tonic-gate vperror(0, gettext( 21867c478bd9Sstevel@tonic-gate "can't read symbolic link %s"), longname); 21877c478bd9Sstevel@tonic-gate goto out; 21887c478bd9Sstevel@tonic-gate } else { 21897c478bd9Sstevel@tonic-gate filetmp[i] = 0; 21907c478bd9Sstevel@tonic-gate } 21917c478bd9Sstevel@tonic-gate if (vflag) 21927c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 21937c478bd9Sstevel@tonic-gate "a %s symbolic link to %s\n"), 21947c478bd9Sstevel@tonic-gate longname, filetmp); 21957c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) { 21967c478bd9Sstevel@tonic-gate Xtarhdr.x_linkpath = filetmp; 21977c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '2', filetype, &stbuf, 21987c478bd9Sstevel@tonic-gate stbuf.st_dev, prefix) != 0) 21997c478bd9Sstevel@tonic-gate goto out; 22007c478bd9Sstevel@tonic-gate } else 22017c478bd9Sstevel@tonic-gate if (build_dblock(name, filetmp, '2', filetype, &stbuf, 22027c478bd9Sstevel@tonic-gate stbuf.st_dev, prefix) != 0) 22037c478bd9Sstevel@tonic-gate goto out; 22047c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 22057c478bd9Sstevel@tonic-gate /* 22067c478bd9Sstevel@tonic-gate * No acls for symlinks: mode is always 777 22077c478bd9Sstevel@tonic-gate * dont call write ancillary 22087c478bd9Sstevel@tonic-gate */ 22097c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 22107c478bd9Sstevel@tonic-gate break; 22117c478bd9Sstevel@tonic-gate case S_IFREG: 22127c478bd9Sstevel@tonic-gate if ((infile = openat(dirfd, shortname, 0)) < 0) { 22138e4a71aeSRich Burridge vperror(0, gettext("unable to open %s%s%s%s"), longname, 2214da6c28aaSamw rw_sysattr ? gettext(" system") : "", 22157c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? 22167c478bd9Sstevel@tonic-gate gettext(" attribute ") : "", 2217da6c28aaSamw (filetype == XATTR_FILE) ? (longattrname == NULL) ? 2218da6c28aaSamw shortname : longattrname : ""); 22197c478bd9Sstevel@tonic-gate goto out; 22207c478bd9Sstevel@tonic-gate } 22217c478bd9Sstevel@tonic-gate 22227c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 22237c478bd9Sstevel@tonic-gate 2224da6c28aaSamw if (put_link(name, longname, shortname, longattrname, 22257c478bd9Sstevel@tonic-gate prefix, filetype, '1') == 0) { 22267c478bd9Sstevel@tonic-gate (void) close(infile); 22277c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 22287c478bd9Sstevel@tonic-gate goto out; 22297c478bd9Sstevel@tonic-gate } 22307c478bd9Sstevel@tonic-gate 22317c478bd9Sstevel@tonic-gate tomodes(&stbuf); 22327c478bd9Sstevel@tonic-gate 22337c478bd9Sstevel@tonic-gate /* correctly handle end of volume */ 22347c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) { 22357c478bd9Sstevel@tonic-gate /* split if floppy has some room and file is large */ 22367c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) && 22377c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) { 22387c478bd9Sstevel@tonic-gate splitfile(longname, infile, 22397c478bd9Sstevel@tonic-gate name, prefix, filetype); 22407c478bd9Sstevel@tonic-gate (void) close(dirfd); 22417c478bd9Sstevel@tonic-gate (void) close(infile); 22427c478bd9Sstevel@tonic-gate goto out; 22437c478bd9Sstevel@tonic-gate } 22447c478bd9Sstevel@tonic-gate newvol(); /* not worth it--just get new volume */ 22457c478bd9Sstevel@tonic-gate } 22467c478bd9Sstevel@tonic-gate #ifdef DEBUG 22477c478bd9Sstevel@tonic-gate DEBUG("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname, 22487c478bd9Sstevel@tonic-gate blocks); 22497c478bd9Sstevel@tonic-gate #endif 22507c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '0', filetype, 22517c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) { 22527c478bd9Sstevel@tonic-gate goto out; 22537c478bd9Sstevel@tonic-gate } 22547c478bd9Sstevel@tonic-gate if (vflag) { 22557c478bd9Sstevel@tonic-gate #ifdef DEBUG 22567c478bd9Sstevel@tonic-gate if (NotTape) 22577c478bd9Sstevel@tonic-gate DEBUG("seek = %" FMT_blkcnt_t "K\t", K(tapepos), 22587c478bd9Sstevel@tonic-gate 0); 22597c478bd9Sstevel@tonic-gate #endif 2260da6c28aaSamw (void) fprintf(vfile, "a %s%s%s%s ", longname, 2261da6c28aaSamw rw_sysattr ? gettext(" system") : "", 2262da6c28aaSamw (filetype == XATTR_FILE) ? gettext( 2263da6c28aaSamw " attribute ") : "", 22647c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? 2265da6c28aaSamw longattrname : ""); 22667c478bd9Sstevel@tonic-gate if (NotTape) 22677c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n", 22687c478bd9Sstevel@tonic-gate K(blocks)); 22697c478bd9Sstevel@tonic-gate else 22707c478bd9Sstevel@tonic-gate (void) fprintf(vfile, 22717c478bd9Sstevel@tonic-gate gettext("%" FMT_blkcnt_t " tape blocks\n"), 22727c478bd9Sstevel@tonic-gate blocks); 22737c478bd9Sstevel@tonic-gate } 22747c478bd9Sstevel@tonic-gate 2275da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname, 2276da6c28aaSamw prefix, filetype, '0') != 0) 22777c478bd9Sstevel@tonic-gate goto out; 22787c478bd9Sstevel@tonic-gate 22797c478bd9Sstevel@tonic-gate /* 22807c478bd9Sstevel@tonic-gate * No need to reset typeflag for extended attribute here, since 22817c478bd9Sstevel@tonic-gate * put_extra_attributes already set it and we haven't called 22827c478bd9Sstevel@tonic-gate * build_dblock(). 22837c478bd9Sstevel@tonic-gate */ 22847c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 22857c478bd9Sstevel@tonic-gate hint = writetbuf((char *)&dblock, 1); 2286eace40a5Sceastha maxread = max(min(stbuf.st_blksize, stbuf.st_size), 2287eace40a5Sceastha (nblock * TBLOCK)); 22887c478bd9Sstevel@tonic-gate if ((bigbuf = calloc((unsigned)maxread, sizeof (char))) == 0) { 22897c478bd9Sstevel@tonic-gate maxread = TBLOCK; 22907c478bd9Sstevel@tonic-gate bigbuf = buf; 22917c478bd9Sstevel@tonic-gate } 22927c478bd9Sstevel@tonic-gate 22937c478bd9Sstevel@tonic-gate while (((i = (int) 22947c478bd9Sstevel@tonic-gate read(infile, bigbuf, min((hint*TBLOCK), maxread))) > 0) && 22957c478bd9Sstevel@tonic-gate blocks) { 22967c478bd9Sstevel@tonic-gate blkcnt_t nblks; 22977c478bd9Sstevel@tonic-gate 22987c478bd9Sstevel@tonic-gate nblks = ((i-1)/TBLOCK)+1; 22997c478bd9Sstevel@tonic-gate if (nblks > blocks) 23007c478bd9Sstevel@tonic-gate nblks = blocks; 23017c478bd9Sstevel@tonic-gate hint = writetbuf(bigbuf, nblks); 23027c478bd9Sstevel@tonic-gate blocks -= nblks; 23037c478bd9Sstevel@tonic-gate } 23047c478bd9Sstevel@tonic-gate (void) close(infile); 23057c478bd9Sstevel@tonic-gate if (bigbuf != buf) 23067c478bd9Sstevel@tonic-gate free(bigbuf); 23077c478bd9Sstevel@tonic-gate if (i < 0) 23087c478bd9Sstevel@tonic-gate vperror(0, gettext("Read error on %s"), longname); 23097c478bd9Sstevel@tonic-gate else if (blocks != 0 || i != 0) { 23107c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 23117c478bd9Sstevel@tonic-gate "tar: %s: file changed size\n"), longname); 23127c478bd9Sstevel@tonic-gate if (errflag) { 23137c478bd9Sstevel@tonic-gate exitflag = 1; 23147c478bd9Sstevel@tonic-gate Errflg = 1; 23157c478bd9Sstevel@tonic-gate } else if (!Dflag) { 23167c478bd9Sstevel@tonic-gate Errflg = 1; 23177c478bd9Sstevel@tonic-gate } 23187c478bd9Sstevel@tonic-gate } 23197c478bd9Sstevel@tonic-gate putempty(blocks); 23207c478bd9Sstevel@tonic-gate break; 23217c478bd9Sstevel@tonic-gate case S_IFIFO: 23227c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 23237c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 23247c478bd9Sstevel@tonic-gate 2325da6c28aaSamw if (put_link(name, longname, shortname, longattrname, 23267c478bd9Sstevel@tonic-gate prefix, filetype, '6') == 0) { 23277c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 23287c478bd9Sstevel@tonic-gate goto out; 23297c478bd9Sstevel@tonic-gate } 23307c478bd9Sstevel@tonic-gate tomodes(&stbuf); 23317c478bd9Sstevel@tonic-gate 23327c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) { 23337c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) && 23347c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) { 23357c478bd9Sstevel@tonic-gate splitfile(longname, infile, name, 23367c478bd9Sstevel@tonic-gate prefix, filetype); 23377c478bd9Sstevel@tonic-gate (void) close(dirfd); 23387c478bd9Sstevel@tonic-gate (void) close(infile); 23397c478bd9Sstevel@tonic-gate goto out; 23407c478bd9Sstevel@tonic-gate } 23417c478bd9Sstevel@tonic-gate newvol(); 23427c478bd9Sstevel@tonic-gate } 23437c478bd9Sstevel@tonic-gate #ifdef DEBUG 23447c478bd9Sstevel@tonic-gate DEBUG("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname, 23457c478bd9Sstevel@tonic-gate blocks); 23467c478bd9Sstevel@tonic-gate #endif 23477c478bd9Sstevel@tonic-gate if (vflag) { 23487c478bd9Sstevel@tonic-gate #ifdef DEBUG 23497c478bd9Sstevel@tonic-gate if (NotTape) 23507c478bd9Sstevel@tonic-gate DEBUG("seek = %" FMT_blkcnt_t "K\t", K(tapepos), 23517c478bd9Sstevel@tonic-gate 0); 23527c478bd9Sstevel@tonic-gate #endif 23537c478bd9Sstevel@tonic-gate if (NotTape) 23547c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %" 23557c478bd9Sstevel@tonic-gate FMT_blkcnt_t "K\n "), longname, K(blocks)); 23567c478bd9Sstevel@tonic-gate else 23577c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 23587c478bd9Sstevel@tonic-gate "a %s %" FMT_blkcnt_t " tape blocks\n"), 23597c478bd9Sstevel@tonic-gate longname, blocks); 23607c478bd9Sstevel@tonic-gate } 23617c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '6', filetype, 23627c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) 23637c478bd9Sstevel@tonic-gate goto out; 23647c478bd9Sstevel@tonic-gate 2365da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname, 2366da6c28aaSamw prefix, filetype, '6') != 0) 23677c478bd9Sstevel@tonic-gate goto out; 23687c478bd9Sstevel@tonic-gate 23697c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 23707c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '6'; 23717c478bd9Sstevel@tonic-gate 23727c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 23737c478bd9Sstevel@tonic-gate break; 23747c478bd9Sstevel@tonic-gate case S_IFCHR: 23757c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 23767c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 2377da6c28aaSamw if (put_link(name, longname, shortname, longattrname, 2378da6c28aaSamw prefix, filetype, '3') == 0) { 23797c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 23807c478bd9Sstevel@tonic-gate goto out; 23817c478bd9Sstevel@tonic-gate } 23827c478bd9Sstevel@tonic-gate tomodes(&stbuf); 23837c478bd9Sstevel@tonic-gate 23847c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) { 23857c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) && 23867c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) { 23877c478bd9Sstevel@tonic-gate splitfile(longname, infile, name, 23887c478bd9Sstevel@tonic-gate prefix, filetype); 23897c478bd9Sstevel@tonic-gate (void) close(dirfd); 23907c478bd9Sstevel@tonic-gate goto out; 23917c478bd9Sstevel@tonic-gate } 23927c478bd9Sstevel@tonic-gate newvol(); 23937c478bd9Sstevel@tonic-gate } 23947c478bd9Sstevel@tonic-gate #ifdef DEBUG 23957c478bd9Sstevel@tonic-gate DEBUG("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname, 23967c478bd9Sstevel@tonic-gate blocks); 23977c478bd9Sstevel@tonic-gate #endif 23987c478bd9Sstevel@tonic-gate if (vflag) { 23997c478bd9Sstevel@tonic-gate #ifdef DEBUG 24007c478bd9Sstevel@tonic-gate if (NotTape) 24017c478bd9Sstevel@tonic-gate DEBUG("seek = %" FMT_blkcnt_t "K\t", K(tapepos), 24027c478bd9Sstevel@tonic-gate 0); 24037c478bd9Sstevel@tonic-gate #endif 24047c478bd9Sstevel@tonic-gate if (NotTape) 24057c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %" 24067c478bd9Sstevel@tonic-gate FMT_blkcnt_t "K\n"), longname, K(blocks)); 24077c478bd9Sstevel@tonic-gate else 24087c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %" 24097c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), longname, 24107c478bd9Sstevel@tonic-gate blocks); 24117c478bd9Sstevel@tonic-gate } 24127c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '3', 24137c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_rdev, prefix) != 0) 24147c478bd9Sstevel@tonic-gate goto out; 24157c478bd9Sstevel@tonic-gate 2416da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname, 24177c478bd9Sstevel@tonic-gate prefix, filetype, '3') != 0) 24187c478bd9Sstevel@tonic-gate goto out; 24197c478bd9Sstevel@tonic-gate 24207c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 24217c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '3'; 24227c478bd9Sstevel@tonic-gate 24237c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 24247c478bd9Sstevel@tonic-gate break; 24257c478bd9Sstevel@tonic-gate case S_IFBLK: 24267c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 24277c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 2428da6c28aaSamw if (put_link(name, longname, shortname, longattrname, 2429da6c28aaSamw prefix, filetype, '4') == 0) { 24307c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 24317c478bd9Sstevel@tonic-gate goto out; 24327c478bd9Sstevel@tonic-gate } 24337c478bd9Sstevel@tonic-gate tomodes(&stbuf); 24347c478bd9Sstevel@tonic-gate 24357c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) { 24367c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) && 24377c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) { 24387c478bd9Sstevel@tonic-gate splitfile(longname, infile, 24397c478bd9Sstevel@tonic-gate name, prefix, filetype); 24407c478bd9Sstevel@tonic-gate (void) close(dirfd); 24417c478bd9Sstevel@tonic-gate goto out; 24427c478bd9Sstevel@tonic-gate } 24437c478bd9Sstevel@tonic-gate newvol(); 24447c478bd9Sstevel@tonic-gate } 24457c478bd9Sstevel@tonic-gate #ifdef DEBUG 24467c478bd9Sstevel@tonic-gate DEBUG("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname, 24477c478bd9Sstevel@tonic-gate blocks); 24487c478bd9Sstevel@tonic-gate #endif 24497c478bd9Sstevel@tonic-gate if (vflag) { 24507c478bd9Sstevel@tonic-gate #ifdef DEBUG 24517c478bd9Sstevel@tonic-gate if (NotTape) 24527c478bd9Sstevel@tonic-gate DEBUG("seek = %" FMT_blkcnt_t "K\t", K(tapepos), 24537c478bd9Sstevel@tonic-gate 0); 24547c478bd9Sstevel@tonic-gate #endif 24557c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "a %s ", longname); 24567c478bd9Sstevel@tonic-gate if (NotTape) 24577c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n", 24587c478bd9Sstevel@tonic-gate K(blocks)); 24597c478bd9Sstevel@tonic-gate else 24607c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 24617c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), blocks); 24627c478bd9Sstevel@tonic-gate } 24637c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '4', 24647c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_rdev, prefix) != 0) 24657c478bd9Sstevel@tonic-gate goto out; 24667c478bd9Sstevel@tonic-gate 2467da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname, 24687c478bd9Sstevel@tonic-gate prefix, filetype, '4') != 0) 24697c478bd9Sstevel@tonic-gate goto out; 24707c478bd9Sstevel@tonic-gate 24717c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 24727c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '4'; 24737c478bd9Sstevel@tonic-gate 24747c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 24757c478bd9Sstevel@tonic-gate break; 24767c478bd9Sstevel@tonic-gate default: 24777c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 24787c478bd9Sstevel@tonic-gate "tar: %s is not a file. Not dumped\n"), longname); 24797c478bd9Sstevel@tonic-gate if (errflag) 24807c478bd9Sstevel@tonic-gate exitflag = 1; 24817c478bd9Sstevel@tonic-gate Errflg = 1; 24827c478bd9Sstevel@tonic-gate goto out; 24837c478bd9Sstevel@tonic-gate } 24847c478bd9Sstevel@tonic-gate 24857c478bd9Sstevel@tonic-gate out: 2486da6c28aaSamw if ((dirfd != -1) && (filetype != XATTR_FILE)) { 24877c478bd9Sstevel@tonic-gate (void) close(dirfd); 24887c478bd9Sstevel@tonic-gate } 24897c478bd9Sstevel@tonic-gate return (rc); 24907c478bd9Sstevel@tonic-gate } 24917c478bd9Sstevel@tonic-gate 24927c478bd9Sstevel@tonic-gate 24937c478bd9Sstevel@tonic-gate /* 24947c478bd9Sstevel@tonic-gate * splitfile dump a large file across volumes 24957c478bd9Sstevel@tonic-gate * 24967c478bd9Sstevel@tonic-gate * splitfile(longname, fd); 24977c478bd9Sstevel@tonic-gate * char *longname; full name of file 24987c478bd9Sstevel@tonic-gate * int ifd; input file descriptor 24997c478bd9Sstevel@tonic-gate * 25007c478bd9Sstevel@tonic-gate * NOTE: only called by putfile() to dump a large file. 25017c478bd9Sstevel@tonic-gate */ 25027c478bd9Sstevel@tonic-gate 25037c478bd9Sstevel@tonic-gate static void 25047c478bd9Sstevel@tonic-gate splitfile(char *longname, int ifd, char *name, char *prefix, int filetype) 25057c478bd9Sstevel@tonic-gate { 25067c478bd9Sstevel@tonic-gate blkcnt_t blocks; 25077c478bd9Sstevel@tonic-gate off_t bytes, s; 25087c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 25097c478bd9Sstevel@tonic-gate int i, extents; 25107c478bd9Sstevel@tonic-gate 25117c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); /* blocks file needs */ 25127c478bd9Sstevel@tonic-gate 25137c478bd9Sstevel@tonic-gate /* 25147c478bd9Sstevel@tonic-gate * # extents = 25157c478bd9Sstevel@tonic-gate * size of file after using up rest of this floppy 25167c478bd9Sstevel@tonic-gate * blocks - (blocklim - tapepos) + 1 (for header) 25177c478bd9Sstevel@tonic-gate * plus roundup value before divide by blocklim-1 25187c478bd9Sstevel@tonic-gate * + (blocklim - 1) - 1 25197c478bd9Sstevel@tonic-gate * all divided by blocklim-1 (one block for each header). 25207c478bd9Sstevel@tonic-gate * this gives 25217c478bd9Sstevel@tonic-gate * (blocks - blocklim + tapepos + 1 + blocklim - 2)/(blocklim-1) 25227c478bd9Sstevel@tonic-gate * which reduces to the expression used. 25237c478bd9Sstevel@tonic-gate * one is added to account for this first extent. 25247c478bd9Sstevel@tonic-gate * 25257c478bd9Sstevel@tonic-gate * When one is dealing with extremely large archives, one may want 25267c478bd9Sstevel@tonic-gate * to allow for a large number of extents. This code should be 25277c478bd9Sstevel@tonic-gate * revisited to determine if extents should be changed to something 25287c478bd9Sstevel@tonic-gate * larger than an int. 25297c478bd9Sstevel@tonic-gate */ 25307c478bd9Sstevel@tonic-gate extents = (int)((blocks + tapepos - 1ULL)/(blocklim - 1ULL) + 1); 25317c478bd9Sstevel@tonic-gate 25327c478bd9Sstevel@tonic-gate if (extents < 2 || extents > MAXEXT) { /* let's be reasonable */ 25337c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 25347c478bd9Sstevel@tonic-gate "tar: %s needs unusual number of volumes to split\n" 25357c478bd9Sstevel@tonic-gate "tar: %s not dumped\n"), longname, longname); 25367c478bd9Sstevel@tonic-gate return; 25377c478bd9Sstevel@tonic-gate } 25387c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '0', filetype, 25397c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) 25407c478bd9Sstevel@tonic-gate return; 25417c478bd9Sstevel@tonic-gate 25427c478bd9Sstevel@tonic-gate dblock.dbuf.extotal = extents; 25437c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 25447c478bd9Sstevel@tonic-gate 25457c478bd9Sstevel@tonic-gate /* 25467c478bd9Sstevel@tonic-gate * The value contained in dblock.dbuf.efsize was formerly used when the 25477c478bd9Sstevel@tonic-gate * v flag was specified in conjunction with the t flag. Although it is 25487c478bd9Sstevel@tonic-gate * no longer used, older versions of tar will expect the former 25497c478bd9Sstevel@tonic-gate * behaviour, so we must continue to write it to the archive. 25507c478bd9Sstevel@tonic-gate * 25517c478bd9Sstevel@tonic-gate * Since dblock.dbuf.efsize is 10 chars in size, the maximum value it 25527c478bd9Sstevel@tonic-gate * can store is TAR_EFSIZE_MAX. If bytes exceeds that value, simply 25537c478bd9Sstevel@tonic-gate * store 0. 25547c478bd9Sstevel@tonic-gate */ 25557c478bd9Sstevel@tonic-gate if (bytes <= TAR_EFSIZE_MAX) 25567c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.efsize, "%9" FMT_off_t_o, bytes); 25577c478bd9Sstevel@tonic-gate else 25587c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.efsize, "%9" FMT_off_t_o, (off_t)0); 25597c478bd9Sstevel@tonic-gate 25607c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 25617c478bd9Sstevel@tonic-gate "tar: large file %s needs %d extents.\n" 25627c478bd9Sstevel@tonic-gate "tar: current device seek position = %" FMT_blkcnt_t "K\n"), 25637c478bd9Sstevel@tonic-gate longname, extents, K(tapepos)); 25647c478bd9Sstevel@tonic-gate 25657c478bd9Sstevel@tonic-gate s = (off_t)(blocklim - tapepos - 1) * TBLOCK; 25667c478bd9Sstevel@tonic-gate for (i = 1; i <= extents; i++) { 25677c478bd9Sstevel@tonic-gate if (i > 1) { 25687c478bd9Sstevel@tonic-gate newvol(); 25697c478bd9Sstevel@tonic-gate if (i == extents) 25707c478bd9Sstevel@tonic-gate s = bytes; /* last ext. gets true bytes */ 25717c478bd9Sstevel@tonic-gate else 25727c478bd9Sstevel@tonic-gate s = (off_t)(blocklim - 1)*TBLOCK; /* all */ 25737c478bd9Sstevel@tonic-gate } 25747c478bd9Sstevel@tonic-gate bytes -= s; 25757c478bd9Sstevel@tonic-gate blocks = TBLOCKS(s); 25767c478bd9Sstevel@tonic-gate 25777c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o, s); 25787c478bd9Sstevel@tonic-gate dblock.dbuf.extno = i; 25797c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 25807c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 25817c478bd9Sstevel@tonic-gate 25827c478bd9Sstevel@tonic-gate if (vflag) 25837c478bd9Sstevel@tonic-gate (void) fprintf(vfile, 25848e4a71aeSRich Burridge gettext("+++ a %s %" FMT_blkcnt_t 25858e4a71aeSRich Burridge "K [extent #%d of %d]\n"), 25867c478bd9Sstevel@tonic-gate longname, K(blocks), i, extents); 25877c478bd9Sstevel@tonic-gate while (blocks && read(ifd, buf, TBLOCK) > 0) { 25887c478bd9Sstevel@tonic-gate blocks--; 25897c478bd9Sstevel@tonic-gate (void) writetbuf(buf, 1); 25907c478bd9Sstevel@tonic-gate } 25917c478bd9Sstevel@tonic-gate if (blocks != 0) { 25927c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 25937c478bd9Sstevel@tonic-gate "tar: %s: file changed size\n"), longname); 25947c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 25957c478bd9Sstevel@tonic-gate "tar: aborting split file %s\n"), longname); 25967c478bd9Sstevel@tonic-gate (void) close(ifd); 25977c478bd9Sstevel@tonic-gate return; 25987c478bd9Sstevel@tonic-gate } 25997c478bd9Sstevel@tonic-gate } 26007c478bd9Sstevel@tonic-gate (void) close(ifd); 26017c478bd9Sstevel@tonic-gate if (vflag) 26027c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %" FMT_off_t "K (in %d " 26037c478bd9Sstevel@tonic-gate "extents)\n"), longname, K(TBLOCKS(stbuf.st_size)), 26047c478bd9Sstevel@tonic-gate extents); 26057c478bd9Sstevel@tonic-gate } 26067c478bd9Sstevel@tonic-gate 26077c478bd9Sstevel@tonic-gate /* 26087c478bd9Sstevel@tonic-gate * convtoreg - determines whether the file should be converted to a 26097c478bd9Sstevel@tonic-gate * regular file when extracted 26107c478bd9Sstevel@tonic-gate * 26117c478bd9Sstevel@tonic-gate * Returns 1 when file size > 0 and typeflag is not recognized 26127c478bd9Sstevel@tonic-gate * Otherwise returns 0 26137c478bd9Sstevel@tonic-gate */ 26147c478bd9Sstevel@tonic-gate static int 26157c478bd9Sstevel@tonic-gate convtoreg(off_t size) 26167c478bd9Sstevel@tonic-gate { 26177c478bd9Sstevel@tonic-gate if ((size > 0) && (dblock.dbuf.typeflag != '0') && 26187c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != NULL) && (dblock.dbuf.typeflag != '1') && 26197c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != '2') && (dblock.dbuf.typeflag != '3') && 26207c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != '4') && (dblock.dbuf.typeflag != '5') && 26217c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != '6') && (dblock.dbuf.typeflag != 'A') && 2622e765faefSRich Burridge (dblock.dbuf.typeflag != 'L') && 26237c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != _XATTR_HDRTYPE) && 26247c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != 'X')) { 26257c478bd9Sstevel@tonic-gate return (1); 26267c478bd9Sstevel@tonic-gate } 26277c478bd9Sstevel@tonic-gate return (0); 26287c478bd9Sstevel@tonic-gate } 26297c478bd9Sstevel@tonic-gate 2630da6c28aaSamw #if defined(O_XATTR) 2631da6c28aaSamw static int 2632da6c28aaSamw save_cwd(void) 2633da6c28aaSamw { 2634da6c28aaSamw return (open(".", O_RDONLY)); 2635da6c28aaSamw } 2636da6c28aaSamw #endif 2637da6c28aaSamw 2638da6c28aaSamw #if defined(O_XATTR) 2639da6c28aaSamw static void 2640da6c28aaSamw rest_cwd(int *cwd) 2641da6c28aaSamw { 2642da6c28aaSamw if (*cwd != -1) { 2643da6c28aaSamw if (fchdir(*cwd) < 0) { 2644da6c28aaSamw vperror(0, gettext( 2645da6c28aaSamw "Cannot fchdir to attribute directory")); 2646da6c28aaSamw exit(1); 2647da6c28aaSamw } 2648da6c28aaSamw (void) close(*cwd); 2649da6c28aaSamw *cwd = -1; 2650da6c28aaSamw } 2651da6c28aaSamw } 2652da6c28aaSamw #endif 2653da6c28aaSamw 2654da6c28aaSamw /* 2655da6c28aaSamw * Verify the underlying file system supports the attribute type. 2656da6c28aaSamw * Only archive extended attribute files when '-@' was specified. 2657da6c28aaSamw * Only archive system extended attribute files if '-/' was specified. 2658da6c28aaSamw */ 2659da6c28aaSamw #if defined(O_XATTR) 2660da6c28aaSamw static attr_status_t 2661ced83f9bSceastha verify_attr_support(char *filename, int attrflg, arc_action_t actflag, 2662ced83f9bSceastha int *ext_attrflg) 2663da6c28aaSamw { 2664da6c28aaSamw /* 2665ced83f9bSceastha * Verify extended attributes are supported/exist. We only 2666ced83f9bSceastha * need to check if we are processing a base file, not an 2667ced83f9bSceastha * extended attribute. 2668da6c28aaSamw */ 2669ced83f9bSceastha if (attrflg) { 2670ced83f9bSceastha *ext_attrflg = (pathconf(filename, (actflag == ARC_CREATE) ? 2671ced83f9bSceastha _PC_XATTR_EXISTS : _PC_XATTR_ENABLED) == 1); 2672ced83f9bSceastha } 2673ced83f9bSceastha 2674da6c28aaSamw if (atflag) { 2675ced83f9bSceastha if (!*ext_attrflg) { 2676da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 2677da6c28aaSamw if (saflag) { 2678da6c28aaSamw /* Verify system attributes are supported */ 2679da6c28aaSamw if (sysattr_support(filename, 2680da6c28aaSamw (actflag == ARC_CREATE) ? _PC_SATTR_EXISTS : 2681da6c28aaSamw _PC_SATTR_ENABLED) != 1) { 2682da6c28aaSamw return (ATTR_SATTR_ERR); 2683da6c28aaSamw } 2684da6c28aaSamw } else 2685da6c28aaSamw return (ATTR_XATTR_ERR); 2686da6c28aaSamw #else 2687da6c28aaSamw return (ATTR_XATTR_ERR); 2688da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 2689da6c28aaSamw } 2690da6c28aaSamw 2691da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 2692da6c28aaSamw } else if (saflag) { 2693da6c28aaSamw /* Verify system attributes are supported */ 2694da6c28aaSamw if (sysattr_support(filename, (actflag == ARC_CREATE) ? 2695da6c28aaSamw _PC_SATTR_EXISTS : _PC_SATTR_ENABLED) != 1) { 2696da6c28aaSamw return (ATTR_SATTR_ERR); 2697da6c28aaSamw } 2698da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 2699da6c28aaSamw } else { 2700da6c28aaSamw return (ATTR_SKIP); 2701da6c28aaSamw } 2702da6c28aaSamw 2703da6c28aaSamw return (ATTR_OK); 2704da6c28aaSamw } 2705da6c28aaSamw #endif 2706da6c28aaSamw 2707da6c28aaSamw #if defined(O_XATTR) 2708da6c28aaSamw /* 2709da6c28aaSamw * Recursively open attribute directories until the attribute directory 2710da6c28aaSamw * containing the specified attribute, attrname, is opened. 2711da6c28aaSamw * 2712da6c28aaSamw * Currently, only 2 directory levels of attributes are supported, (i.e., 2713da6c28aaSamw * extended system attributes on extended attributes). The following are 2714da6c28aaSamw * the possible input combinations: 2715da6c28aaSamw * 1. Open the attribute directory of the base file (don't change 2716da6c28aaSamw * into it). 2717da6c28aaSamw * attrinfo->parent = NULL 2718da6c28aaSamw * attrname = '.' 2719da6c28aaSamw * 2. Open the attribute directory of the base file and change into it. 2720da6c28aaSamw * attrinfo->parent = NULL 2721da6c28aaSamw * attrname = <attr> | <sys_attr> 2722da6c28aaSamw * 3. Open the attribute directory of the base file, change into it, 2723da6c28aaSamw * then recursively call open_attr_dir() to open the attribute's 2724da6c28aaSamw * parent directory (don't change into it). 2725da6c28aaSamw * attrinfo->parent = <attr> 2726da6c28aaSamw * attrname = '.' 2727da6c28aaSamw * 4. Open the attribute directory of the base file, change into it, 2728da6c28aaSamw * then recursively call open_attr_dir() to open the attribute's 2729da6c28aaSamw * parent directory and change into it. 2730da6c28aaSamw * attrinfo->parent = <attr> 2731da6c28aaSamw * attrname = <attr> | <sys_attr> 2732da6c28aaSamw * 2733da6c28aaSamw * An attribute directory will be opened only if the underlying file system 2734da6c28aaSamw * supports the attribute type, and if the command line specifications (atflag 2735da6c28aaSamw * and saflag) enable the processing of the attribute type. 2736da6c28aaSamw * 2737da6c28aaSamw * On succesful return, attrinfo->parentfd will be the file descriptor of the 2738da6c28aaSamw * opened attribute directory. In addition, if the attribute is a read-write 2739da6c28aaSamw * extended system attribute, attrinfo->rw_sysattr will be set to 1, otherwise 2740da6c28aaSamw * it will be set to 0. 2741da6c28aaSamw * 2742da6c28aaSamw * Possible return values: 2743da6c28aaSamw * ATTR_OK Successfully opened and, if needed, changed into the 2744da6c28aaSamw * attribute directory containing attrname. 2745da6c28aaSamw * ATTR_SKIP The command line specifications don't enable the 2746da6c28aaSamw * processing of the attribute type. 2747da6c28aaSamw * ATTR_CHDIR_ERR An error occurred while trying to change into an 2748da6c28aaSamw * attribute directory. 2749da6c28aaSamw * ATTR_OPEN_ERR An error occurred while trying to open an 2750da6c28aaSamw * attribute directory. 2751da6c28aaSamw * ATTR_XATTR_ERR The underlying file system doesn't support extended 2752da6c28aaSamw * attributes. 2753da6c28aaSamw * ATTR_SATTR_ERR The underlying file system doesn't support extended 2754da6c28aaSamw * system attributes. 2755da6c28aaSamw */ 2756da6c28aaSamw static int 2757da6c28aaSamw open_attr_dir(char *attrname, char *dirp, int cwd, attr_data_t *attrinfo) 2758da6c28aaSamw { 2759da6c28aaSamw attr_status_t rc; 2760da6c28aaSamw int firsttime = (attrinfo->attr_parentfd == -1); 2761da6c28aaSamw int saveerrno; 2762ced83f9bSceastha int ext_attr; 2763da6c28aaSamw 2764da6c28aaSamw /* 2765da6c28aaSamw * open_attr_dir() was recursively called (input combination number 4), 2766da6c28aaSamw * close the previously opened file descriptor as we've already changed 2767da6c28aaSamw * into it. 2768da6c28aaSamw */ 2769da6c28aaSamw if (!firsttime) { 2770da6c28aaSamw (void) close(attrinfo->attr_parentfd); 2771da6c28aaSamw attrinfo->attr_parentfd = -1; 2772da6c28aaSamw } 2773da6c28aaSamw 2774da6c28aaSamw /* 2775da6c28aaSamw * Verify that the underlying file system supports the restoration 2776da6c28aaSamw * of the attribute. 2777da6c28aaSamw */ 2778ced83f9bSceastha if ((rc = verify_attr_support(dirp, firsttime, ARC_RESTORE, 2779ced83f9bSceastha &ext_attr)) != ATTR_OK) { 2780da6c28aaSamw return (rc); 2781da6c28aaSamw } 2782da6c28aaSamw 2783da6c28aaSamw /* Open the base file's attribute directory */ 2784da6c28aaSamw if ((attrinfo->attr_parentfd = attropen(dirp, ".", O_RDONLY)) == -1) { 2785da6c28aaSamw /* 2786da6c28aaSamw * Save the errno from the attropen so it can be reported 2787da6c28aaSamw * if the retry of the attropen fails. 2788da6c28aaSamw */ 2789da6c28aaSamw saveerrno = errno; 2790da6c28aaSamw if ((attrinfo->attr_parentfd = retry_open_attr(-1, cwd, dirp, 2791da6c28aaSamw NULL, ".", O_RDONLY, 0)) == -1) { 2792da6c28aaSamw /* 2793da6c28aaSamw * Reset typeflag back to real value so passtape 2794da6c28aaSamw * will skip ahead correctly. 2795da6c28aaSamw */ 2796da6c28aaSamw dblock.dbuf.typeflag = _XATTR_HDRTYPE; 2797da6c28aaSamw (void) close(attrinfo->attr_parentfd); 2798da6c28aaSamw attrinfo->attr_parentfd = -1; 2799da6c28aaSamw errno = saveerrno; 2800da6c28aaSamw return (ATTR_OPEN_ERR); 2801da6c28aaSamw } 2802da6c28aaSamw } 2803da6c28aaSamw 2804da6c28aaSamw /* 2805da6c28aaSamw * Change into the parent attribute's directory unless we are 2806da6c28aaSamw * processing the hidden attribute directory of the base file itself. 2807da6c28aaSamw */ 2808da6c28aaSamw if ((Hiddendir == 0) || (firsttime && attrinfo->attr_parent != NULL)) { 2809da6c28aaSamw if (fchdir(attrinfo->attr_parentfd) != 0) { 2810da6c28aaSamw saveerrno = errno; 2811da6c28aaSamw (void) close(attrinfo->attr_parentfd); 2812da6c28aaSamw attrinfo->attr_parentfd = -1; 2813da6c28aaSamw errno = saveerrno; 2814da6c28aaSamw return (ATTR_CHDIR_ERR); 2815da6c28aaSamw } 2816da6c28aaSamw } 2817da6c28aaSamw 2818da6c28aaSamw /* Determine if the attribute should be processed */ 2819da6c28aaSamw if ((rc = verify_attr(attrname, attrinfo->attr_parent, 1, 2820da6c28aaSamw &attrinfo->attr_rw_sysattr)) != ATTR_OK) { 2821da6c28aaSamw saveerrno = errno; 2822da6c28aaSamw (void) close(attrinfo->attr_parentfd); 2823da6c28aaSamw attrinfo->attr_parentfd = -1; 2824da6c28aaSamw errno = saveerrno; 2825da6c28aaSamw return (rc); 2826da6c28aaSamw } 2827da6c28aaSamw 2828da6c28aaSamw /* 2829da6c28aaSamw * If the attribute is an extended attribute, or extended system 2830da6c28aaSamw * attribute, of an attribute (i.e., <attr>/<sys_attr>), then 2831da6c28aaSamw * recursively call open_attr_dir() to open the attribute directory 2832da6c28aaSamw * of the parent attribute. 2833da6c28aaSamw */ 2834da6c28aaSamw if (firsttime && (attrinfo->attr_parent != NULL)) { 2835da6c28aaSamw return (open_attr_dir(attrname, attrinfo->attr_parent, 2836da6c28aaSamw attrinfo->attr_parentfd, attrinfo)); 2837da6c28aaSamw } 2838da6c28aaSamw 2839da6c28aaSamw return (ATTR_OK); 2840da6c28aaSamw } 2841da6c28aaSamw #endif 2842da6c28aaSamw 28437c478bd9Sstevel@tonic-gate static void 28447c478bd9Sstevel@tonic-gate doxtract(char *argv[]) 28457c478bd9Sstevel@tonic-gate { 28467c478bd9Sstevel@tonic-gate struct stat xtractbuf; /* stat on file after extracting */ 28477c478bd9Sstevel@tonic-gate blkcnt_t blocks; 28487c478bd9Sstevel@tonic-gate off_t bytes; 28497c478bd9Sstevel@tonic-gate int ofile; 28507c478bd9Sstevel@tonic-gate int newfile; /* Does the file already exist */ 28517c478bd9Sstevel@tonic-gate int xcnt = 0; /* count # files extracted */ 28527c478bd9Sstevel@tonic-gate int fcnt = 0; /* count # files in argv list */ 28537c478bd9Sstevel@tonic-gate int dir; 28547c478bd9Sstevel@tonic-gate int dirfd = -1; 2855da6c28aaSamw int cwd = -1; 2856ced83f9bSceastha int rw_sysattr; 2857da6c28aaSamw int saveerrno; 28587c478bd9Sstevel@tonic-gate uid_t Uid; 28597c478bd9Sstevel@tonic-gate char *namep, *dirp, *comp, *linkp; /* for removing absolute paths */ 28607c478bd9Sstevel@tonic-gate char dirname[PATH_MAX+1]; 28617c478bd9Sstevel@tonic-gate char templink[PATH_MAX+1]; /* temp link with terminating NULL */ 28627c478bd9Sstevel@tonic-gate int once = 1; 28637c478bd9Sstevel@tonic-gate int error; 28647c478bd9Sstevel@tonic-gate int symflag; 28657c478bd9Sstevel@tonic-gate int want; 2866da6c28aaSamw attr_data_t *attrinfo = NULL; /* attribute info */ 2867fa9e4066Sahrens acl_t *aclp = NULL; /* acl info */ 286845916cd2Sjpk char dot[] = "."; /* dirp for using realpath */ 28697c478bd9Sstevel@tonic-gate timestruc_t time_zero; /* used for call to doDirTimes */ 28707c478bd9Sstevel@tonic-gate int dircreate; 28717c478bd9Sstevel@tonic-gate int convflag; 28727c478bd9Sstevel@tonic-gate time_zero.tv_sec = 0; 28737c478bd9Sstevel@tonic-gate time_zero.tv_nsec = 0; 28747c478bd9Sstevel@tonic-gate 287545916cd2Sjpk /* reset Trusted Extensions variables */ 287645916cd2Sjpk rpath_flag = 0; 287745916cd2Sjpk lk_rpath_flag = 0; 287845916cd2Sjpk dir_flag = 0; 287945916cd2Sjpk mld_flag = 0; 288045916cd2Sjpk bslundef(&bs_label); 288145916cd2Sjpk bsllow(&admin_low); 288245916cd2Sjpk bslhigh(&admin_high); 288345916cd2Sjpk orig_namep = 0; 288445916cd2Sjpk 28857c478bd9Sstevel@tonic-gate dumping = 0; /* for newvol(), et al: we are not writing */ 28867c478bd9Sstevel@tonic-gate 28877c478bd9Sstevel@tonic-gate Uid = getuid(); 28887c478bd9Sstevel@tonic-gate 28897c478bd9Sstevel@tonic-gate for (;;) { 28907c478bd9Sstevel@tonic-gate convflag = 0; 28917c478bd9Sstevel@tonic-gate symflag = 0; 28927c478bd9Sstevel@tonic-gate dir = 0; 2893ced83f9bSceastha Hiddendir = 0; 2894ced83f9bSceastha rw_sysattr = 0; 28957c478bd9Sstevel@tonic-gate ofile = -1; 28967c478bd9Sstevel@tonic-gate 2897da6c28aaSamw if (dirfd != -1) { 2898da6c28aaSamw (void) close(dirfd); 2899da6c28aaSamw dirfd = -1; 2900da6c28aaSamw } 2901da6c28aaSamw if (ofile != -1) { 2902da6c28aaSamw if (close(ofile) != 0) 2903da6c28aaSamw vperror(2, gettext("close error")); 2904da6c28aaSamw } 2905da6c28aaSamw 29067c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 2907da6c28aaSamw if (cwd != -1) { 2908da6c28aaSamw rest_cwd(&cwd); 2909da6c28aaSamw } 2910da6c28aaSamw #endif 2911da6c28aaSamw 2912da6c28aaSamw /* namep is set by wantit to point to the full name */ 2913da6c28aaSamw if ((want = wantit(argv, &namep, &dirp, &comp, 2914da6c28aaSamw &attrinfo)) == 0) { 2915da6c28aaSamw #if defined(O_XATTR) 2916da6c28aaSamw if (xattrp != NULL) { 29177c478bd9Sstevel@tonic-gate free(xattrhead); 29187c478bd9Sstevel@tonic-gate xattrp = NULL; 29197c478bd9Sstevel@tonic-gate xattr_linkp = NULL; 29207c478bd9Sstevel@tonic-gate xattrhead = NULL; 29217c478bd9Sstevel@tonic-gate } 29227c478bd9Sstevel@tonic-gate #endif 29237c478bd9Sstevel@tonic-gate continue; 29247c478bd9Sstevel@tonic-gate } 29257c478bd9Sstevel@tonic-gate if (want == -1) 29267c478bd9Sstevel@tonic-gate break; 29277c478bd9Sstevel@tonic-gate 292845916cd2Sjpk /* Trusted Extensions */ 292945916cd2Sjpk /* 293045916cd2Sjpk * During tar extract (x): 293145916cd2Sjpk * If the pathname of the restored file has been 293245916cd2Sjpk * reconstructed from the ancillary file, 293345916cd2Sjpk * use it to process the normal file. 293445916cd2Sjpk */ 293545916cd2Sjpk if (mld_flag) { /* Skip over .MLD. directory */ 293645916cd2Sjpk mld_flag = 0; 293745916cd2Sjpk passtape(); 293845916cd2Sjpk continue; 293945916cd2Sjpk } 294045916cd2Sjpk orig_namep = namep; /* save original */ 294145916cd2Sjpk if (rpath_flag) { 294245916cd2Sjpk namep = real_path; /* use zone path */ 294345916cd2Sjpk comp = real_path; /* use zone path */ 294445916cd2Sjpk dirp = dot; /* work from the top */ 294545916cd2Sjpk rpath_flag = 0; /* reset */ 294645916cd2Sjpk } 294745916cd2Sjpk 29487c478bd9Sstevel@tonic-gate if (dirfd != -1) 29497c478bd9Sstevel@tonic-gate (void) close(dirfd); 29507c478bd9Sstevel@tonic-gate 29517c478bd9Sstevel@tonic-gate (void) strcpy(&dirname[0], namep); 29527c478bd9Sstevel@tonic-gate dircreate = checkdir(&dirname[0]); 29537c478bd9Sstevel@tonic-gate 29547c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 2955da6c28aaSamw if (xattrp != NULL) { 2956da6c28aaSamw int rc; 29577c478bd9Sstevel@tonic-gate 2958da6c28aaSamw if (((cwd = save_cwd()) == -1) || 2959da6c28aaSamw ((rc = open_attr_dir(comp, dirp, cwd, 2960da6c28aaSamw attrinfo)) != ATTR_OK)) { 2961da6c28aaSamw if (cwd == -1) { 2962da6c28aaSamw vperror(0, gettext( 2963da6c28aaSamw "unable to save current working " 2964da6c28aaSamw "directory while processing " 2965da6c28aaSamw "attribute %s of %s"), 2966da6c28aaSamw dirp, attrinfo->attr_path); 2967da6c28aaSamw } else if (rc != ATTR_SKIP) { 2968d2443e76Smarks (void) fprintf(vfile, 2969d2443e76Smarks gettext("tar: cannot open " 2970da6c28aaSamw "%sattribute %s of file %s: %s\n"), 2971da6c28aaSamw attrinfo->attr_rw_sysattr ? gettext( 2972da6c28aaSamw "system ") : "", 2973da6c28aaSamw comp, dirp, strerror(errno)); 2974da6c28aaSamw } 2975d2443e76Smarks free(xattrhead); 2976d2443e76Smarks xattrp = NULL; 2977d2443e76Smarks xattr_linkp = NULL; 2978d2443e76Smarks xattrhead = NULL; 2979da6c28aaSamw 29807c478bd9Sstevel@tonic-gate passtape(); 29817c478bd9Sstevel@tonic-gate continue; 2982da6c28aaSamw } else { 2983da6c28aaSamw dirfd = attrinfo->attr_parentfd; 2984da6c28aaSamw rw_sysattr = attrinfo->attr_rw_sysattr; 29857c478bd9Sstevel@tonic-gate } 2986da6c28aaSamw } else { 2987da6c28aaSamw dirfd = open(dirp, O_RDONLY); 2988da6c28aaSamw } 2989da6c28aaSamw #else 2990da6c28aaSamw dirfd = open(dirp, O_RDONLY); 2991da6c28aaSamw #endif 2992da6c28aaSamw if (dirfd == -1) { 2993da6c28aaSamw (void) fprintf(vfile, gettext( 2994da6c28aaSamw "tar: cannot open %s: %s\n"), 2995da6c28aaSamw dirp, strerror(errno)); 2996da6c28aaSamw passtape(); 2997da6c28aaSamw continue; 29987c478bd9Sstevel@tonic-gate } 29997c478bd9Sstevel@tonic-gate 30007c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) 30017c478bd9Sstevel@tonic-gate (void) strcpy(templink, Xtarhdr.x_linkpath); 30027c478bd9Sstevel@tonic-gate else { 30037c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 30047c478bd9Sstevel@tonic-gate if (xattrp && dblock.dbuf.typeflag == '1') { 30057c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 30067c478bd9Sstevel@tonic-gate xattrp->h_names); 30077c478bd9Sstevel@tonic-gate } else { 30087c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 30097c478bd9Sstevel@tonic-gate dblock.dbuf.linkname); 30107c478bd9Sstevel@tonic-gate } 30117c478bd9Sstevel@tonic-gate #else 30127c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 30137c478bd9Sstevel@tonic-gate dblock.dbuf.linkname); 30147c478bd9Sstevel@tonic-gate #endif 30157c478bd9Sstevel@tonic-gate } 30167c478bd9Sstevel@tonic-gate 30177c478bd9Sstevel@tonic-gate if (Fflag) { 30183a1dab68SRich Burridge if (checkf(namep, is_directory(namep), Fflag) == 0) { 30197c478bd9Sstevel@tonic-gate passtape(); 30207c478bd9Sstevel@tonic-gate continue; 30217c478bd9Sstevel@tonic-gate } 30227c478bd9Sstevel@tonic-gate } 30237c478bd9Sstevel@tonic-gate 30247c478bd9Sstevel@tonic-gate if (checkw('x', namep) == 0) { 30257c478bd9Sstevel@tonic-gate passtape(); 30267c478bd9Sstevel@tonic-gate continue; 30277c478bd9Sstevel@tonic-gate } 30287c478bd9Sstevel@tonic-gate if (once) { 30297c478bd9Sstevel@tonic-gate if (strcmp(dblock.dbuf.magic, magic_type) == 0) { 30307c478bd9Sstevel@tonic-gate if (geteuid() == (uid_t)0) { 30317c478bd9Sstevel@tonic-gate checkflag = 1; 30327c478bd9Sstevel@tonic-gate pflag = 1; 30337c478bd9Sstevel@tonic-gate } else { 30347c478bd9Sstevel@tonic-gate /* get file creation mask */ 30357c478bd9Sstevel@tonic-gate Oumask = umask(0); 30367c478bd9Sstevel@tonic-gate (void) umask(Oumask); 30377c478bd9Sstevel@tonic-gate } 30387c478bd9Sstevel@tonic-gate once = 0; 30397c478bd9Sstevel@tonic-gate } else { 30407c478bd9Sstevel@tonic-gate if (geteuid() == (uid_t)0) { 30417c478bd9Sstevel@tonic-gate pflag = 1; 30427c478bd9Sstevel@tonic-gate checkflag = 2; 30437c478bd9Sstevel@tonic-gate } 30447c478bd9Sstevel@tonic-gate if (!pflag) { 30457c478bd9Sstevel@tonic-gate /* get file creation mask */ 30467c478bd9Sstevel@tonic-gate Oumask = umask(0); 30477c478bd9Sstevel@tonic-gate (void) umask(Oumask); 30487c478bd9Sstevel@tonic-gate } 30497c478bd9Sstevel@tonic-gate once = 0; 30507c478bd9Sstevel@tonic-gate } 30517c478bd9Sstevel@tonic-gate } 30527c478bd9Sstevel@tonic-gate 30537c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 30547c478bd9Sstevel@tonic-gate /* 30557c478bd9Sstevel@tonic-gate * Handle extraction of hidden attr dir. 30567c478bd9Sstevel@tonic-gate * Dir is automatically created, we only 30577c478bd9Sstevel@tonic-gate * need to update mode and perm's. 30587c478bd9Sstevel@tonic-gate */ 3059da6c28aaSamw if ((xattrp != NULL) && Hiddendir == 1) { 3060da6c28aaSamw bytes = stbuf.st_size; 3061da6c28aaSamw blocks = TBLOCKS(bytes); 3062da6c28aaSamw if (vflag) { 3063da6c28aaSamw (void) fprintf(vfile, 30648e4a71aeSRich Burridge "x %s%s%s, %" FMT_off_t " %s, ", namep, 3065da6c28aaSamw gettext(" attribute "), 30668e4a71aeSRich Burridge xattrapath, bytes, 30678e4a71aeSRich Burridge gettext("bytes")); 3068da6c28aaSamw if (NotTape) 3069da6c28aaSamw (void) fprintf(vfile, 3070da6c28aaSamw "%" FMT_blkcnt_t "K\n", K(blocks)); 3071da6c28aaSamw else 3072da6c28aaSamw (void) fprintf(vfile, gettext("%" 3073da6c28aaSamw FMT_blkcnt_t " tape blocks\n"), 3074da6c28aaSamw blocks); 3075da6c28aaSamw } 3076da6c28aaSamw 3077da6c28aaSamw /* 3078da6c28aaSamw * Set the permissions and mode of the attribute 3079da6c28aaSamw * unless the attribute is a system attribute (can't 3080da6c28aaSamw * successfully do this) or the hidden attribute 3081da6c28aaSamw * directory (".") of an attribute (when the attribute 3082da6c28aaSamw * is restored, the hidden attribute directory of an 3083da6c28aaSamw * attribute is transient). Note: when the permissions 3084da6c28aaSamw * and mode are set for the hidden attribute directory 3085da6c28aaSamw * of a file on a system supporting extended system 3086da6c28aaSamw * attributes, even though it returns successfully, it 3087da6c28aaSamw * will not have any affect since the attribute 3088da6c28aaSamw * directory is transient. 3089da6c28aaSamw */ 3090da6c28aaSamw if (attrinfo->attr_parent == NULL) { 30917c478bd9Sstevel@tonic-gate if (fchownat(dirfd, ".", stbuf.st_uid, 30927c478bd9Sstevel@tonic-gate stbuf.st_gid, 0) != 0) { 30937c478bd9Sstevel@tonic-gate vperror(0, gettext( 3094da6c28aaSamw "%s%s%s: failed to set ownership " 3095da6c28aaSamw "of attribute directory"), namep, 3096da6c28aaSamw gettext(" attribute "), xattrapath); 30977c478bd9Sstevel@tonic-gate } 30987c478bd9Sstevel@tonic-gate 30997c478bd9Sstevel@tonic-gate if (fchmod(dirfd, stbuf.st_mode) != 0) { 31007c478bd9Sstevel@tonic-gate vperror(0, gettext( 3101da6c28aaSamw "%s%s%s: failed to set permissions " 3102da6c28aaSamw "of attribute directory"), namep, 3103da6c28aaSamw gettext(" attribute "), xattrapath); 3104da6c28aaSamw } 31057c478bd9Sstevel@tonic-gate } 31067c478bd9Sstevel@tonic-gate goto filedone; 31077c478bd9Sstevel@tonic-gate } 31087c478bd9Sstevel@tonic-gate #endif 31097c478bd9Sstevel@tonic-gate 31107c478bd9Sstevel@tonic-gate if (dircreate && (!is_posix || dblock.dbuf.typeflag == '5')) { 31117c478bd9Sstevel@tonic-gate dir = 1; 31127c478bd9Sstevel@tonic-gate if (vflag) { 31138e4a71aeSRich Burridge (void) fprintf(vfile, "x %s, 0 %s, ", 31148e4a71aeSRich Burridge &dirname[0], gettext("bytes")); 31157c478bd9Sstevel@tonic-gate if (NotTape) 31167c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "0K\n"); 31177c478bd9Sstevel@tonic-gate else 31187c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 31197c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), 31207c478bd9Sstevel@tonic-gate (blkcnt_t)0); 31217c478bd9Sstevel@tonic-gate } 31227c478bd9Sstevel@tonic-gate goto filedone; 31237c478bd9Sstevel@tonic-gate } 31247c478bd9Sstevel@tonic-gate 31257c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '6') { /* FIFO */ 31267c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) { 31277c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 31287c478bd9Sstevel@tonic-gate (void) unlink(namep); 31297c478bd9Sstevel@tonic-gate } 31307c478bd9Sstevel@tonic-gate linkp = templink; 31317c478bd9Sstevel@tonic-gate if (*linkp != NULL) { 31327c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 31337c478bd9Sstevel@tonic-gate linkp++; 31347c478bd9Sstevel@tonic-gate if (link(linkp, namep) < 0) { 31357c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 31367c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep); 31377c478bd9Sstevel@tonic-gate continue; 31387c478bd9Sstevel@tonic-gate } 31397c478bd9Sstevel@tonic-gate if (vflag) 31407c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3141da6c28aaSamw "x %s linked to %s\n"), namep, 3142da6c28aaSamw linkp); 31437c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 31447c478bd9Sstevel@tonic-gate continue; 31457c478bd9Sstevel@tonic-gate } 31467c478bd9Sstevel@tonic-gate if (mknod(namep, (int)(Gen.g_mode|S_IFIFO), 31477c478bd9Sstevel@tonic-gate (int)Gen.g_devmajor) < 0) { 31487c478bd9Sstevel@tonic-gate vperror(0, gettext("%s: mknod failed"), namep); 31497c478bd9Sstevel@tonic-gate continue; 31507c478bd9Sstevel@tonic-gate } 31517c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 31527c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 31537c478bd9Sstevel@tonic-gate if (vflag) { 31547c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "x %s, %" FMT_off_t 31558e4a71aeSRich Burridge " %s, ", namep, bytes, gettext("bytes")); 31567c478bd9Sstevel@tonic-gate if (NotTape) 31577c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t 31587c478bd9Sstevel@tonic-gate "K\n", K(blocks)); 31597c478bd9Sstevel@tonic-gate else 31607c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 31617c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), 31627c478bd9Sstevel@tonic-gate blocks); 31637c478bd9Sstevel@tonic-gate } 31647c478bd9Sstevel@tonic-gate goto filedone; 31657c478bd9Sstevel@tonic-gate } 31667c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '3' && !Uid) { /* CHAR SPECIAL */ 31677c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) { 31687c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 31697c478bd9Sstevel@tonic-gate (void) unlink(namep); 31707c478bd9Sstevel@tonic-gate } 31717c478bd9Sstevel@tonic-gate linkp = templink; 31727c478bd9Sstevel@tonic-gate if (*linkp != NULL) { 31737c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 31747c478bd9Sstevel@tonic-gate linkp++; 31757c478bd9Sstevel@tonic-gate if (link(linkp, namep) < 0) { 31767c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 31777c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep); 31787c478bd9Sstevel@tonic-gate continue; 31797c478bd9Sstevel@tonic-gate } 31807c478bd9Sstevel@tonic-gate if (vflag) 31817c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3182da6c28aaSamw "x %s linked to %s\n"), namep, 3183da6c28aaSamw linkp); 31847c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 31857c478bd9Sstevel@tonic-gate continue; 31867c478bd9Sstevel@tonic-gate } 31877c478bd9Sstevel@tonic-gate if (mknod(namep, (int)(Gen.g_mode|S_IFCHR), 31887c478bd9Sstevel@tonic-gate (int)makedev(Gen.g_devmajor, Gen.g_devminor)) < 0) { 31897c478bd9Sstevel@tonic-gate vperror(0, gettext( 31907c478bd9Sstevel@tonic-gate "%s: mknod failed"), namep); 31917c478bd9Sstevel@tonic-gate continue; 31927c478bd9Sstevel@tonic-gate } 31937c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 31947c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 31957c478bd9Sstevel@tonic-gate if (vflag) { 31967c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "x %s, %" FMT_off_t 31978e4a71aeSRich Burridge " %s, ", namep, bytes, gettext("bytes")); 31987c478bd9Sstevel@tonic-gate if (NotTape) 31997c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t 32007c478bd9Sstevel@tonic-gate "K\n", K(blocks)); 32017c478bd9Sstevel@tonic-gate else 32027c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 32037c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), 32047c478bd9Sstevel@tonic-gate blocks); 32057c478bd9Sstevel@tonic-gate } 32067c478bd9Sstevel@tonic-gate goto filedone; 32077c478bd9Sstevel@tonic-gate } else if (dblock.dbuf.typeflag == '3' && Uid) { 32087c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 32097c478bd9Sstevel@tonic-gate "Can't create special %s\n"), namep); 32107c478bd9Sstevel@tonic-gate continue; 32117c478bd9Sstevel@tonic-gate } 32127c478bd9Sstevel@tonic-gate 32137c478bd9Sstevel@tonic-gate /* BLOCK SPECIAL */ 32147c478bd9Sstevel@tonic-gate 32157c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '4' && !Uid) { 32167c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) { 32177c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 32187c478bd9Sstevel@tonic-gate (void) unlink(namep); 32197c478bd9Sstevel@tonic-gate } 32207c478bd9Sstevel@tonic-gate linkp = templink; 32217c478bd9Sstevel@tonic-gate if (*linkp != NULL) { 32227c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 32237c478bd9Sstevel@tonic-gate linkp++; 32247c478bd9Sstevel@tonic-gate if (link(linkp, namep) < 0) { 32257c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 32267c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep); 32277c478bd9Sstevel@tonic-gate continue; 32287c478bd9Sstevel@tonic-gate } 32297c478bd9Sstevel@tonic-gate if (vflag) 32307c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3231da6c28aaSamw "x %s linked to %s\n"), namep, 3232da6c28aaSamw linkp); 32337c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 32347c478bd9Sstevel@tonic-gate continue; 32357c478bd9Sstevel@tonic-gate } 32367c478bd9Sstevel@tonic-gate if (mknod(namep, (int)(Gen.g_mode|S_IFBLK), 32377c478bd9Sstevel@tonic-gate (int)makedev(Gen.g_devmajor, Gen.g_devminor)) < 0) { 32387c478bd9Sstevel@tonic-gate vperror(0, gettext("%s: mknod failed"), namep); 32397c478bd9Sstevel@tonic-gate continue; 32407c478bd9Sstevel@tonic-gate } 32417c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 32427c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 32437c478bd9Sstevel@tonic-gate if (vflag) { 32447c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("x %s, %" 32457c478bd9Sstevel@tonic-gate FMT_off_t " bytes, "), namep, bytes); 32467c478bd9Sstevel@tonic-gate if (NotTape) 32477c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t 32487c478bd9Sstevel@tonic-gate "K\n", K(blocks)); 32497c478bd9Sstevel@tonic-gate else 32507c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 32517c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), 32527c478bd9Sstevel@tonic-gate blocks); 32537c478bd9Sstevel@tonic-gate } 32547c478bd9Sstevel@tonic-gate goto filedone; 32557c478bd9Sstevel@tonic-gate } else if (dblock.dbuf.typeflag == '4' && Uid) { 32567c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 32577c478bd9Sstevel@tonic-gate gettext("Can't create special %s\n"), namep); 32587c478bd9Sstevel@tonic-gate continue; 32597c478bd9Sstevel@tonic-gate } 32607c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '2') { /* symlink */ 326145916cd2Sjpk if ((Tflag) && (lk_rpath_flag == 1)) 326245916cd2Sjpk linkp = lk_real_path; 326345916cd2Sjpk else 32647c478bd9Sstevel@tonic-gate linkp = templink; 32657c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 32667c478bd9Sstevel@tonic-gate linkp++; 32677c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) { 32687c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 32697c478bd9Sstevel@tonic-gate (void) unlink(namep); 32707c478bd9Sstevel@tonic-gate } 32717c478bd9Sstevel@tonic-gate if (symlink(linkp, namep) < 0) { 32727c478bd9Sstevel@tonic-gate vperror(0, gettext("%s: symbolic link failed"), 32737c478bd9Sstevel@tonic-gate namep); 32747c478bd9Sstevel@tonic-gate continue; 32757c478bd9Sstevel@tonic-gate } 32767c478bd9Sstevel@tonic-gate if (vflag) 32777c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 32787c478bd9Sstevel@tonic-gate "x %s symbolic link to %s\n"), 32797c478bd9Sstevel@tonic-gate namep, linkp); 32807c478bd9Sstevel@tonic-gate 32817c478bd9Sstevel@tonic-gate symflag = AT_SYMLINK_NOFOLLOW; 32827c478bd9Sstevel@tonic-gate goto filedone; 32837c478bd9Sstevel@tonic-gate } 32847c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '1') { 32857c478bd9Sstevel@tonic-gate linkp = templink; 32867c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 32877c478bd9Sstevel@tonic-gate linkp++; 32887c478bd9Sstevel@tonic-gate if (unlinkat(dirfd, comp, AT_REMOVEDIR) < 0) { 32897c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 32907c478bd9Sstevel@tonic-gate (void) unlinkat(dirfd, comp, 0); 32917c478bd9Sstevel@tonic-gate } 32927c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 32937c478bd9Sstevel@tonic-gate if (xattrp && xattr_linkp) { 32947c478bd9Sstevel@tonic-gate if (fchdir(dirfd) < 0) { 32957c478bd9Sstevel@tonic-gate vperror(0, gettext( 32967c478bd9Sstevel@tonic-gate "Cannot fchdir to attribute " 3297da6c28aaSamw "directory %s"), 3298da6c28aaSamw (attrinfo->attr_parent == NULL) ? 3299da6c28aaSamw dirp : attrinfo->attr_parent); 33007c478bd9Sstevel@tonic-gate exit(1); 33017c478bd9Sstevel@tonic-gate } 33027c478bd9Sstevel@tonic-gate 3303da6c28aaSamw error = link(xattr_linkaname, xattrapath); 33047c478bd9Sstevel@tonic-gate } else { 33057c478bd9Sstevel@tonic-gate error = link(linkp, namep); 33067c478bd9Sstevel@tonic-gate } 33077c478bd9Sstevel@tonic-gate #else 33087c478bd9Sstevel@tonic-gate error = link(linkp, namep); 33097c478bd9Sstevel@tonic-gate #endif 33107c478bd9Sstevel@tonic-gate 33117c478bd9Sstevel@tonic-gate if (error < 0) { 33127c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 33137c478bd9Sstevel@tonic-gate "tar: %s%s%s: cannot link\n"), 33147c478bd9Sstevel@tonic-gate namep, (xattr_linkp != NULL) ? 33157c478bd9Sstevel@tonic-gate gettext(" attribute ") : "", 33167c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ? 3317da6c28aaSamw xattrapath : ""); 33187c478bd9Sstevel@tonic-gate continue; 33197c478bd9Sstevel@tonic-gate } 33207c478bd9Sstevel@tonic-gate if (vflag) 33217c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3322da6c28aaSamw "x %s%s%s linked to %s%s%s\n"), namep, 33237c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ? 33247c478bd9Sstevel@tonic-gate gettext(" attribute ") : "", 33257c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ? 33267c478bd9Sstevel@tonic-gate xattr_linkaname : "", 3327da6c28aaSamw linkp, 33287c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ? 3329da6c28aaSamw gettext(" attribute ") : "", 3330da6c28aaSamw (xattr_linkp != NULL) ? xattrapath : ""); 33317c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 33327c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 3333da6c28aaSamw if (xattrp != NULL) { 33347c478bd9Sstevel@tonic-gate free(xattrhead); 33357c478bd9Sstevel@tonic-gate xattrp = NULL; 33367c478bd9Sstevel@tonic-gate xattr_linkp = NULL; 33377c478bd9Sstevel@tonic-gate xattrhead = NULL; 33387c478bd9Sstevel@tonic-gate } 33397c478bd9Sstevel@tonic-gate #endif 33407c478bd9Sstevel@tonic-gate continue; 33417c478bd9Sstevel@tonic-gate } 33427c478bd9Sstevel@tonic-gate 33437c478bd9Sstevel@tonic-gate /* REGULAR FILES */ 33447c478bd9Sstevel@tonic-gate 33457c478bd9Sstevel@tonic-gate if (convtoreg(stbuf.st_size)) { 33467c478bd9Sstevel@tonic-gate convflag = 1; 33477c478bd9Sstevel@tonic-gate if (errflag) { 33487c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 33497c478bd9Sstevel@tonic-gate "tar: %s: typeflag '%c' not recognized\n"), 33507c478bd9Sstevel@tonic-gate namep, dblock.dbuf.typeflag); 33517c478bd9Sstevel@tonic-gate done(1); 33527c478bd9Sstevel@tonic-gate } else { 33537c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 33547c478bd9Sstevel@tonic-gate "tar: %s: typeflag '%c' not recognized, " 33557c478bd9Sstevel@tonic-gate "converting to regular file\n"), namep, 33567c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag); 33577c478bd9Sstevel@tonic-gate Errflg = 1; 33587c478bd9Sstevel@tonic-gate } 33597c478bd9Sstevel@tonic-gate } 33607c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '0' || 33617c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == NULL || convflag) { 33622c0f0499Slovely delete_target(dirfd, comp, namep); 33637c478bd9Sstevel@tonic-gate linkp = templink; 33647c478bd9Sstevel@tonic-gate if (*linkp != NULL) { 33657c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 33667c478bd9Sstevel@tonic-gate linkp++; 33677c478bd9Sstevel@tonic-gate if (link(linkp, comp) < 0) { 33687c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 33697c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep); 33707c478bd9Sstevel@tonic-gate continue; 33717c478bd9Sstevel@tonic-gate } 33727c478bd9Sstevel@tonic-gate if (vflag) 33737c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3374da6c28aaSamw "x %s linked to %s\n"), comp, 3375da6c28aaSamw linkp); 33767c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 3377da6c28aaSamw #if defined(O_XATTR) 3378da6c28aaSamw if (xattrp != NULL) { 3379da6c28aaSamw free(xattrhead); 3380da6c28aaSamw xattrp = NULL; 3381da6c28aaSamw xattr_linkp = NULL; 3382da6c28aaSamw xattrhead = NULL; 3383da6c28aaSamw } 3384da6c28aaSamw #endif 33857c478bd9Sstevel@tonic-gate continue; 33867c478bd9Sstevel@tonic-gate } 33877c478bd9Sstevel@tonic-gate newfile = ((fstatat(dirfd, comp, 33887c478bd9Sstevel@tonic-gate &xtractbuf, 0) == -1) ? TRUE : FALSE); 3389da6c28aaSamw ofile = openat(dirfd, comp, O_RDWR|O_CREAT|O_TRUNC, 3390da6c28aaSamw stbuf.st_mode & MODEMASK); 3391da6c28aaSamw saveerrno = errno; 3392da6c28aaSamw 3393da6c28aaSamw #if defined(O_XATTR) 3394da6c28aaSamw if (xattrp != NULL) { 3395da6c28aaSamw if (ofile < 0) { 3396da6c28aaSamw ofile = retry_open_attr(dirfd, cwd, 3397da6c28aaSamw dirp, attrinfo->attr_parent, comp, 3398da6c28aaSamw O_RDWR|O_CREAT|O_TRUNC, 3399da6c28aaSamw stbuf.st_mode & MODEMASK); 3400da6c28aaSamw } 3401da6c28aaSamw } 3402da6c28aaSamw #endif 3403da6c28aaSamw if (ofile < 0) { 3404da6c28aaSamw errno = saveerrno; 34057c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3406da6c28aaSamw "tar: %s%s%s%s - cannot create\n"), 3407da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 34088e4a71aeSRich Burridge gettext("system attribute ") : 3409da6c28aaSamw gettext("attribute ")), 3410da6c28aaSamw (xattrp == NULL) ? "" : xattrapath, 3411da6c28aaSamw (xattrp == NULL) ? "" : gettext(" of "), 3412da6c28aaSamw (xattrp == NULL) ? comp : namep); 34137c478bd9Sstevel@tonic-gate if (errflag) 34147c478bd9Sstevel@tonic-gate done(1); 34157c478bd9Sstevel@tonic-gate else 34167c478bd9Sstevel@tonic-gate Errflg = 1; 3417da6c28aaSamw #if defined(O_XATTR) 3418da6c28aaSamw if (xattrp != NULL) { 3419da6c28aaSamw dblock.dbuf.typeflag = _XATTR_HDRTYPE; 3420da6c28aaSamw free(xattrhead); 3421da6c28aaSamw xattrp = NULL; 3422da6c28aaSamw xattr_linkp = NULL; 3423da6c28aaSamw xattrhead = NULL; 3424da6c28aaSamw } 3425da6c28aaSamw #endif 34267c478bd9Sstevel@tonic-gate passtape(); 34277c478bd9Sstevel@tonic-gate continue; 34287c478bd9Sstevel@tonic-gate } 34297c478bd9Sstevel@tonic-gate 343045916cd2Sjpk if (Tflag && (check_ext_attr(namep) == 0)) { 343145916cd2Sjpk if (errflag) 343245916cd2Sjpk done(1); 343345916cd2Sjpk else 343445916cd2Sjpk Errflg = 1; 343545916cd2Sjpk passtape(); 343645916cd2Sjpk continue; 343745916cd2Sjpk } 343845916cd2Sjpk 34397c478bd9Sstevel@tonic-gate if (extno != 0) { /* file is in pieces */ 34407c478bd9Sstevel@tonic-gate if (extotal < 1 || extotal > MAXEXT) 34417c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3442da6c28aaSamw "tar: ignoring bad extent info for " 3443da6c28aaSamw "%s%s%s%s\n"), 3444da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 3445da6c28aaSamw gettext("system attribute ") : 3446da6c28aaSamw gettext("attribute ")), 3447da6c28aaSamw (xattrp == NULL) ? "" : xattrapath, 3448da6c28aaSamw (xattrp == NULL) ? "" : gettext(" of "), 3449da6c28aaSamw (xattrp == NULL) ? comp : namep); 34507c478bd9Sstevel@tonic-gate else { 3451da6c28aaSamw /* extract it */ 3452da6c28aaSamw (void) xsfile(rw_sysattr, ofile); 34537c478bd9Sstevel@tonic-gate } 34547c478bd9Sstevel@tonic-gate } 34557c478bd9Sstevel@tonic-gate extno = 0; /* let everyone know file is not split */ 34567c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 34577c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 34587c478bd9Sstevel@tonic-gate if (vflag) { 34597c478bd9Sstevel@tonic-gate (void) fprintf(vfile, 34608e4a71aeSRich Burridge "x %s%s%s, %" FMT_off_t " %s, ", 34617c478bd9Sstevel@tonic-gate (xattrp == NULL) ? "" : dirp, 3462da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 3463da6c28aaSamw gettext(" system attribute ") : 3464da6c28aaSamw gettext(" attribute ")), 34658e4a71aeSRich Burridge (xattrp == NULL) ? namep : xattrapath, bytes, 34668e4a71aeSRich Burridge gettext("bytes")); 34677c478bd9Sstevel@tonic-gate if (NotTape) 34687c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n", 34697c478bd9Sstevel@tonic-gate K(blocks)); 34707c478bd9Sstevel@tonic-gate else 34717c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 34727c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), blocks); 34737c478bd9Sstevel@tonic-gate } 34747c478bd9Sstevel@tonic-gate 3475da6c28aaSamw if (xblocks(rw_sysattr, bytes, ofile) != 0) { 3476da6c28aaSamw #if defined(O_XATTR) 3477da6c28aaSamw if (xattrp != NULL) { 3478da6c28aaSamw free(xattrhead); 3479da6c28aaSamw xattrp = NULL; 3480da6c28aaSamw xattr_linkp = NULL; 3481da6c28aaSamw xattrhead = NULL; 3482da6c28aaSamw } 3483da6c28aaSamw #endif 3484da6c28aaSamw continue; 3485da6c28aaSamw } 34867c478bd9Sstevel@tonic-gate filedone: 34877c478bd9Sstevel@tonic-gate if (mflag == 0 && !symflag) { 34887c478bd9Sstevel@tonic-gate if (dir) 34897c478bd9Sstevel@tonic-gate doDirTimes(namep, stbuf.st_mtim); 3490da6c28aaSamw 34917c478bd9Sstevel@tonic-gate else 3492da6c28aaSamw #if defined(O_XATTR) 3493da6c28aaSamw if (xattrp != NULL) { 3494da6c28aaSamw /* 3495da6c28aaSamw * Set the time on the attribute unless 3496da6c28aaSamw * the attribute is a system attribute 3497da6c28aaSamw * (can't successfully do this) or the 3498da6c28aaSamw * hidden attribute directory, "." (the 3499da6c28aaSamw * time on the hidden attribute 3500da6c28aaSamw * directory will be updated when 3501da6c28aaSamw * attributes are restored, otherwise 3502da6c28aaSamw * it's transient). 3503da6c28aaSamw */ 3504da6c28aaSamw if (!rw_sysattr && (Hiddendir == 0)) { 3505da6c28aaSamw setPathTimes(dirfd, comp, 3506da6c28aaSamw stbuf.st_mtim); 3507da6c28aaSamw } 3508da6c28aaSamw } else 3509da6c28aaSamw setPathTimes(dirfd, comp, 3510da6c28aaSamw stbuf.st_mtim); 3511da6c28aaSamw #else 35127c478bd9Sstevel@tonic-gate setPathTimes(dirfd, comp, stbuf.st_mtim); 3513da6c28aaSamw #endif 35147c478bd9Sstevel@tonic-gate } 35157c478bd9Sstevel@tonic-gate 35167c478bd9Sstevel@tonic-gate /* moved this code from above */ 35177c478bd9Sstevel@tonic-gate if (pflag && !symflag && Hiddendir == 0) { 3518da6c28aaSamw if (xattrp != NULL) 35197c478bd9Sstevel@tonic-gate (void) fchmod(ofile, stbuf.st_mode & MODEMASK); 35207c478bd9Sstevel@tonic-gate else 35217c478bd9Sstevel@tonic-gate (void) chmod(namep, stbuf.st_mode & MODEMASK); 35227c478bd9Sstevel@tonic-gate } 35237c478bd9Sstevel@tonic-gate 35247c478bd9Sstevel@tonic-gate 35257c478bd9Sstevel@tonic-gate /* 35267c478bd9Sstevel@tonic-gate * Because ancillary file preceeds the normal file, 35277c478bd9Sstevel@tonic-gate * acl info may have been retrieved (in aclp). 35287c478bd9Sstevel@tonic-gate * All file types are directed here (go filedone). 35297c478bd9Sstevel@tonic-gate * Always restore ACLs if there are ACLs. 35307c478bd9Sstevel@tonic-gate */ 35317c478bd9Sstevel@tonic-gate if (aclp != NULL) { 35327c478bd9Sstevel@tonic-gate int ret; 35337c478bd9Sstevel@tonic-gate 35347c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 3535da6c28aaSamw if (xattrp != NULL) { 35367c478bd9Sstevel@tonic-gate if (Hiddendir) 3537fa9e4066Sahrens ret = facl_set(dirfd, aclp); 35387c478bd9Sstevel@tonic-gate else 3539fa9e4066Sahrens ret = facl_set(ofile, aclp); 35407c478bd9Sstevel@tonic-gate } else { 3541fa9e4066Sahrens ret = acl_set(namep, aclp); 35427c478bd9Sstevel@tonic-gate } 35437c478bd9Sstevel@tonic-gate #else 354445916cd2Sjpk ret = acl_set(namep, aclp); 35457c478bd9Sstevel@tonic-gate #endif 35467c478bd9Sstevel@tonic-gate if (ret < 0) { 35477c478bd9Sstevel@tonic-gate if (pflag) { 35487c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3549da6c28aaSamw "%s%s%s%s: failed to set acl " 3550da6c28aaSamw "entries\n"), namep, 3551da6c28aaSamw (xattrp == NULL) ? "" : 3552da6c28aaSamw (rw_sysattr ? gettext( 3553da6c28aaSamw " system attribute ") : 3554da6c28aaSamw gettext(" attribute ")), 3555da6c28aaSamw (xattrp == NULL) ? "" : 3556da6c28aaSamw xattrapath); 35577c478bd9Sstevel@tonic-gate } 35587c478bd9Sstevel@tonic-gate /* else: silent and continue */ 35597c478bd9Sstevel@tonic-gate } 3560fa9e4066Sahrens acl_free(aclp); 35617c478bd9Sstevel@tonic-gate aclp = NULL; 35627c478bd9Sstevel@tonic-gate } 35637c478bd9Sstevel@tonic-gate 35647c478bd9Sstevel@tonic-gate if (!oflag) 3565cc22b130SRich Burridge /* set file ownership */ 3566cc22b130SRich Burridge resugname(dirfd, comp, symflag); 35677c478bd9Sstevel@tonic-gate 35687c478bd9Sstevel@tonic-gate if (pflag && newfile == TRUE && !dir && 35697c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag == '0' || 35707c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == NULL || 35717c478bd9Sstevel@tonic-gate convflag || dblock.dbuf.typeflag == '1')) { 35727c478bd9Sstevel@tonic-gate if (fstat(ofile, &xtractbuf) == -1) 35737c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3574da6c28aaSamw "tar: cannot stat extracted file " 3575da6c28aaSamw "%s%s%s%s\n"), 3576da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 3577da6c28aaSamw gettext("system attribute ") : 3578da6c28aaSamw gettext("attribute ")), 3579da6c28aaSamw (xattrp == NULL) ? "" : xattrapath, 3580da6c28aaSamw (xattrp == NULL) ? "" : 3581da6c28aaSamw gettext(" of "), namep); 3582da6c28aaSamw 35837c478bd9Sstevel@tonic-gate else if ((xtractbuf.st_mode & (MODEMASK & ~S_IFMT)) 35847c478bd9Sstevel@tonic-gate != (stbuf.st_mode & (MODEMASK & ~S_IFMT))) { 35857c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 35867c478bd9Sstevel@tonic-gate "tar: warning - file permissions have " 3587da6c28aaSamw "changed for %s%s%s%s (are 0%o, should be " 35887c478bd9Sstevel@tonic-gate "0%o)\n"), 3589da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 3590da6c28aaSamw gettext("system attribute ") : 3591da6c28aaSamw gettext("attribute ")), 3592da6c28aaSamw (xattrp == NULL) ? "" : xattrapath, 3593da6c28aaSamw (xattrp == NULL) ? "" : 3594da6c28aaSamw gettext(" of "), namep, 3595da6c28aaSamw xtractbuf.st_mode, stbuf.st_mode); 3596da6c28aaSamw 35977c478bd9Sstevel@tonic-gate } 35987c478bd9Sstevel@tonic-gate } 3599ced83f9bSceastha #if defined(O_XATTR) 3600ced83f9bSceastha if (xattrp != NULL) { 3601ced83f9bSceastha free(xattrhead); 3602ced83f9bSceastha xattrp = NULL; 3603ced83f9bSceastha xattr_linkp = NULL; 3604ced83f9bSceastha xattrhead = NULL; 3605ced83f9bSceastha } 3606ced83f9bSceastha #endif 3607ced83f9bSceastha 36087c478bd9Sstevel@tonic-gate if (ofile != -1) { 36097c478bd9Sstevel@tonic-gate (void) close(dirfd); 36107c478bd9Sstevel@tonic-gate dirfd = -1; 36117c478bd9Sstevel@tonic-gate if (close(ofile) != 0) 36127c478bd9Sstevel@tonic-gate vperror(2, gettext("close error")); 3613da6c28aaSamw ofile = -1; 36147c478bd9Sstevel@tonic-gate } 36157c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 36167c478bd9Sstevel@tonic-gate } 361745916cd2Sjpk 361845916cd2Sjpk /* 361945916cd2Sjpk * Process ancillary file. 362045916cd2Sjpk * 362145916cd2Sjpk */ 362245916cd2Sjpk 36237c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == 'A') { /* acl info */ 36247c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 36257c478bd9Sstevel@tonic-gate char *secp; 36267c478bd9Sstevel@tonic-gate char *tp; 36277c478bd9Sstevel@tonic-gate int attrsize; 36287c478bd9Sstevel@tonic-gate int cnt; 36297c478bd9Sstevel@tonic-gate 363045916cd2Sjpk /* reset Trusted Extensions flags */ 363145916cd2Sjpk dir_flag = 0; 363245916cd2Sjpk mld_flag = 0; 363345916cd2Sjpk lk_rpath_flag = 0; 363445916cd2Sjpk rpath_flag = 0; 36357c478bd9Sstevel@tonic-gate 36367c478bd9Sstevel@tonic-gate if (pflag) { 36377c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 36387c478bd9Sstevel@tonic-gate if ((secp = malloc((int)bytes)) == NULL) { 36397c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 36407c478bd9Sstevel@tonic-gate "Insufficient memory for acl\n")); 36417c478bd9Sstevel@tonic-gate passtape(); 36427c478bd9Sstevel@tonic-gate continue; 36437c478bd9Sstevel@tonic-gate } 36447c478bd9Sstevel@tonic-gate tp = secp; 36457c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 364645916cd2Sjpk 364745916cd2Sjpk /* 364845916cd2Sjpk * Display a line for each ancillary file. 364945916cd2Sjpk */ 365045916cd2Sjpk if (vflag && Tflag) 365145916cd2Sjpk (void) fprintf(vfile, "x %s(A), %" 36528e4a71aeSRich Burridge FMT_blkcnt_t " %s, %" 36538e4a71aeSRich Burridge FMT_blkcnt_t " %s\n", 36548e4a71aeSRich Burridge namep, bytes, gettext("bytes"), 36558e4a71aeSRich Burridge blocks, gettext("tape blocks")); 365645916cd2Sjpk 36577c478bd9Sstevel@tonic-gate while (blocks-- > 0) { 36587c478bd9Sstevel@tonic-gate readtape(buf); 36597c478bd9Sstevel@tonic-gate if (bytes <= TBLOCK) { 36607c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, 36617c478bd9Sstevel@tonic-gate (size_t)bytes); 36627c478bd9Sstevel@tonic-gate break; 36637c478bd9Sstevel@tonic-gate } else { 36647c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, 36657c478bd9Sstevel@tonic-gate TBLOCK); 36667c478bd9Sstevel@tonic-gate tp += TBLOCK; 36677c478bd9Sstevel@tonic-gate } 36687c478bd9Sstevel@tonic-gate bytes -= TBLOCK; 36697c478bd9Sstevel@tonic-gate } 3670fa9e4066Sahrens bytes = stbuf.st_size; 36717c478bd9Sstevel@tonic-gate /* got all attributes in secp */ 36727c478bd9Sstevel@tonic-gate tp = secp; 36737c478bd9Sstevel@tonic-gate do { 36747c478bd9Sstevel@tonic-gate attr = (struct sec_attr *)tp; 36757c478bd9Sstevel@tonic-gate switch (attr->attr_type) { 36767c478bd9Sstevel@tonic-gate case UFSD_ACL: 3677fa9e4066Sahrens case ACE_ACL: 36787c478bd9Sstevel@tonic-gate (void) sscanf(attr->attr_len, 3679fa9e4066Sahrens "%7o", 3680fa9e4066Sahrens (uint_t *) 3681fa9e4066Sahrens &cnt); 36827c478bd9Sstevel@tonic-gate /* header is 8 */ 36837c478bd9Sstevel@tonic-gate attrsize = 8 + (int)strlen( 36847c478bd9Sstevel@tonic-gate &attr->attr_info[0]) + 1; 3685fa9e4066Sahrens error = 3686fa9e4066Sahrens acl_fromtext( 3687fa9e4066Sahrens &attr->attr_info[0], &aclp); 3688fa9e4066Sahrens 3689fa9e4066Sahrens if (error != 0) { 36907c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 36917c478bd9Sstevel@tonic-gate gettext( 36927c478bd9Sstevel@tonic-gate "aclfromtext " 3693fa9e4066Sahrens "failed: %s\n"), 3694fa9e4066Sahrens acl_strerror( 3695fa9e4066Sahrens error)); 3696fa9e4066Sahrens bytes -= attrsize; 36977c478bd9Sstevel@tonic-gate break; 36987c478bd9Sstevel@tonic-gate } 3699fa9e4066Sahrens if (acl_cnt(aclp) != cnt) { 37007c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 37017c478bd9Sstevel@tonic-gate gettext( 37027c478bd9Sstevel@tonic-gate "aclcnt error\n")); 3703fa9e4066Sahrens bytes -= attrsize; 37047c478bd9Sstevel@tonic-gate break; 37057c478bd9Sstevel@tonic-gate } 37067c478bd9Sstevel@tonic-gate bytes -= attrsize; 37077c478bd9Sstevel@tonic-gate break; 37087c478bd9Sstevel@tonic-gate 370945916cd2Sjpk /* Trusted Extensions */ 371045916cd2Sjpk 371145916cd2Sjpk case DIR_TYPE: 371245916cd2Sjpk case LBL_TYPE: 371345916cd2Sjpk case APRIV_TYPE: 371445916cd2Sjpk case FPRIV_TYPE: 371545916cd2Sjpk case COMP_TYPE: 371645916cd2Sjpk case LK_COMP_TYPE: 371745916cd2Sjpk case ATTR_FLAG_TYPE: 371845916cd2Sjpk attrsize = 371945916cd2Sjpk sizeof (struct sec_attr) + 372045916cd2Sjpk strlen(&attr->attr_info[0]); 372145916cd2Sjpk bytes -= attrsize; 372245916cd2Sjpk if (Tflag) 372345916cd2Sjpk extract_attr(&namep, 372445916cd2Sjpk attr); 372545916cd2Sjpk break; 37267c478bd9Sstevel@tonic-gate 37277c478bd9Sstevel@tonic-gate default: 37287c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 37297c478bd9Sstevel@tonic-gate "unrecognized attr" 37307c478bd9Sstevel@tonic-gate " type\n")); 37317c478bd9Sstevel@tonic-gate bytes = (off_t)0; 37327c478bd9Sstevel@tonic-gate break; 37337c478bd9Sstevel@tonic-gate } 37347c478bd9Sstevel@tonic-gate 37357c478bd9Sstevel@tonic-gate /* next attributes */ 37367c478bd9Sstevel@tonic-gate tp += attrsize; 37377c478bd9Sstevel@tonic-gate } while (bytes != 0); 37387c478bd9Sstevel@tonic-gate free(secp); 3739da6c28aaSamw } else { 37407c478bd9Sstevel@tonic-gate passtape(); 3741da6c28aaSamw } 37427c478bd9Sstevel@tonic-gate } /* acl */ 37437c478bd9Sstevel@tonic-gate 37447c478bd9Sstevel@tonic-gate } /* for */ 37457c478bd9Sstevel@tonic-gate 37467c478bd9Sstevel@tonic-gate /* 37477c478bd9Sstevel@tonic-gate * Ensure that all the directories still on the directory stack 37487c478bd9Sstevel@tonic-gate * get their modification times set correctly by flushing the 37497c478bd9Sstevel@tonic-gate * stack. 37507c478bd9Sstevel@tonic-gate */ 37517c478bd9Sstevel@tonic-gate 37527c478bd9Sstevel@tonic-gate doDirTimes(NULL, time_zero); 37537c478bd9Sstevel@tonic-gate 3754da6c28aaSamw #if defined(O_XATTR) 3755da6c28aaSamw if (xattrp != NULL) { 3756da6c28aaSamw free(xattrhead); 3757da6c28aaSamw xattrp = NULL; 3758da6c28aaSamw xattr_linkp = NULL; 3759da6c28aaSamw xattrhead = NULL; 3760da6c28aaSamw } 3761da6c28aaSamw #endif 3762da6c28aaSamw 37637c478bd9Sstevel@tonic-gate /* 37647c478bd9Sstevel@tonic-gate * Check if the number of files extracted is different from the 37657c478bd9Sstevel@tonic-gate * number of files listed on the command line 37667c478bd9Sstevel@tonic-gate */ 37677c478bd9Sstevel@tonic-gate if (fcnt > xcnt) { 37687c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 37697c478bd9Sstevel@tonic-gate gettext("tar: %d file(s) not extracted\n"), 37707c478bd9Sstevel@tonic-gate fcnt-xcnt); 37717c478bd9Sstevel@tonic-gate Errflg = 1; 37727c478bd9Sstevel@tonic-gate } 37737c478bd9Sstevel@tonic-gate } 37747c478bd9Sstevel@tonic-gate 37757c478bd9Sstevel@tonic-gate /* 37767c478bd9Sstevel@tonic-gate * xblocks extract file/extent from tape to output file 37777c478bd9Sstevel@tonic-gate * 3778ced83f9bSceastha * xblocks(issysattr, bytes, ofile); 3779ced83f9bSceastha * 3780ced83f9bSceastha * issysattr flag set if the files being extracted 3781ced83f9bSceastha * is an extended system attribute file. 3782ced83f9bSceastha * unsigned long long bytes size of extent or file to be extracted 3783ced83f9bSceastha * ofile output file 37847c478bd9Sstevel@tonic-gate * 37857c478bd9Sstevel@tonic-gate * called by doxtract() and xsfile() 37867c478bd9Sstevel@tonic-gate */ 37877c478bd9Sstevel@tonic-gate 3788da6c28aaSamw static int 3789da6c28aaSamw xblocks(int issysattr, off_t bytes, int ofile) 37907c478bd9Sstevel@tonic-gate { 3791ced83f9bSceastha char *buf; 37927c478bd9Sstevel@tonic-gate char tempname[NAMSIZ+1]; 3793ced83f9bSceastha size_t maxwrite; 3794ced83f9bSceastha size_t bytesread; 3795ced83f9bSceastha size_t piosize; /* preferred I/O size */ 3796ced83f9bSceastha struct stat tsbuf; 37977c478bd9Sstevel@tonic-gate 3798ced83f9bSceastha /* Don't need to do anything if this is a zero size file */ 3799ced83f9bSceastha if (bytes <= 0) { 3800ced83f9bSceastha return (0); 3801ced83f9bSceastha } 3802ced83f9bSceastha 3803ced83f9bSceastha /* 3804ced83f9bSceastha * To figure out the size of the buffer used to accumulate data 3805ced83f9bSceastha * from readtape() and to write to the file, we need to determine 3806ced83f9bSceastha * the largest chunk of data to be written to the file at one time. 3807ced83f9bSceastha * This is determined based on the smallest of the following two 3808ced83f9bSceastha * things: 3809ced83f9bSceastha * 1) The size of the archived file. 3810ced83f9bSceastha * 2) The preferred I/O size of the file. 3811ced83f9bSceastha */ 3812ced83f9bSceastha if (issysattr || (bytes <= TBLOCK)) { 3813ced83f9bSceastha /* 3814ced83f9bSceastha * Writes to system attribute files must be 3815ced83f9bSceastha * performed in one operation. 3816ced83f9bSceastha */ 3817ced83f9bSceastha maxwrite = bytes; 3818ced83f9bSceastha } else { 3819ced83f9bSceastha /* 3820ced83f9bSceastha * fstat() the file to get the preferred I/O size. 3821ced83f9bSceastha * If it fails, then resort back to just writing 3822ced83f9bSceastha * one block at a time. 3823ced83f9bSceastha */ 3824ced83f9bSceastha if (fstat(ofile, &tsbuf) == 0) { 3825ced83f9bSceastha piosize = tsbuf.st_blksize; 3826ced83f9bSceastha } else { 3827ced83f9bSceastha piosize = TBLOCK; 3828ced83f9bSceastha } 3829ced83f9bSceastha maxwrite = min(bytes, piosize); 3830ced83f9bSceastha } 3831ced83f9bSceastha 3832ced83f9bSceastha /* 3833ced83f9bSceastha * The buffer used to accumulate the data for the write operation 3834ced83f9bSceastha * needs to be the maximum number of bytes to be written rounded up 3835ced83f9bSceastha * to the nearest TBLOCK since readtape reads one block at a time. 3836ced83f9bSceastha */ 3837ced83f9bSceastha if ((buf = malloc(TBLOCKS(maxwrite) * TBLOCK)) == NULL) { 3838ced83f9bSceastha fatal(gettext("cannot allocate buffer")); 3839ced83f9bSceastha } 3840ced83f9bSceastha 3841ced83f9bSceastha while (bytes > 0) { 3842ced83f9bSceastha 3843ced83f9bSceastha /* 3844ced83f9bSceastha * readtape() obtains one block (TBLOCK) of data at a time. 3845ced83f9bSceastha * Accumulate as many blocks of data in buf as we can write 3846ced83f9bSceastha * in one operation. 3847ced83f9bSceastha */ 3848ced83f9bSceastha for (bytesread = 0; bytesread < maxwrite; bytesread += TBLOCK) { 3849ced83f9bSceastha readtape(buf + bytesread); 3850ced83f9bSceastha } 3851ced83f9bSceastha 3852ced83f9bSceastha if (write(ofile, buf, maxwrite) < 0) { 3853da6c28aaSamw int saveerrno = errno; 3854da6c28aaSamw 38557c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 3856ced83f9bSceastha (void) strlcpy(tempname, Xtarhdr.x_path, 3857ced83f9bSceastha sizeof (tempname)); 38587c478bd9Sstevel@tonic-gate else 38597c478bd9Sstevel@tonic-gate (void) sprintf(tempname, "%.*s", NAMSIZ, 38607c478bd9Sstevel@tonic-gate dblock.dbuf.name); 3861da6c28aaSamw /* 3862da6c28aaSamw * If the extended system attribute being extracted 3863da6c28aaSamw * contains attributes that the user needs privileges 3864da6c28aaSamw * for, then just display a warning message, skip 3865da6c28aaSamw * the extraction of this file, and return. 3866da6c28aaSamw */ 3867da6c28aaSamw if ((saveerrno == EPERM) && issysattr) { 38687c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3869da6c28aaSamw "tar: unable to extract system attribute " 3870da6c28aaSamw "%s: insufficient privileges\n"), tempname); 3871da6c28aaSamw Errflg = 1; 3872ced83f9bSceastha (void) free(buf); 3873da6c28aaSamw return (1); 3874da6c28aaSamw } else { 3875da6c28aaSamw (void) fprintf(stderr, gettext( 3876da6c28aaSamw "tar: %s: HELP - extract write error\n"), 3877da6c28aaSamw tempname); 38787c478bd9Sstevel@tonic-gate done(2); 38797c478bd9Sstevel@tonic-gate } 3880da6c28aaSamw } 3881ced83f9bSceastha bytes -= maxwrite; 3882ced83f9bSceastha 3883ced83f9bSceastha /* 3884ced83f9bSceastha * If we've reached this point and there is still data 3885ced83f9bSceastha * to be written, maxwrite had to have been determined 3886ced83f9bSceastha * by the preferred I/O size. If the number of bytes 3887ced83f9bSceastha * left to write is smaller than the preferred I/O size, 3888ced83f9bSceastha * then we're about to do our final write to the file, so 3889ced83f9bSceastha * just set maxwrite to the number of bytes left to write. 3890ced83f9bSceastha */ 3891ced83f9bSceastha if ((bytes > 0) && (bytes < maxwrite)) { 3892ced83f9bSceastha maxwrite = bytes; 38937c478bd9Sstevel@tonic-gate } 3894ced83f9bSceastha } 3895ced83f9bSceastha free(buf); 3896da6c28aaSamw 3897da6c28aaSamw return (0); 38987c478bd9Sstevel@tonic-gate } 38997c478bd9Sstevel@tonic-gate 39007c478bd9Sstevel@tonic-gate /* 39017c478bd9Sstevel@tonic-gate * xsfile extract split file 39027c478bd9Sstevel@tonic-gate * 39037c478bd9Sstevel@tonic-gate * xsfile(ofd); ofd = output file descriptor 39047c478bd9Sstevel@tonic-gate * 39057c478bd9Sstevel@tonic-gate * file extracted and put in ofd via xblocks() 39067c478bd9Sstevel@tonic-gate * 39077c478bd9Sstevel@tonic-gate * NOTE: only called by doxtract() to extract one large file 39087c478bd9Sstevel@tonic-gate */ 39097c478bd9Sstevel@tonic-gate 39107c478bd9Sstevel@tonic-gate static union hblock savedblock; /* to ensure same file across volumes */ 39117c478bd9Sstevel@tonic-gate 3912da6c28aaSamw static int 3913da6c28aaSamw xsfile(int issysattr, int ofd) 39147c478bd9Sstevel@tonic-gate { 39157c478bd9Sstevel@tonic-gate int i, c; 3916da6c28aaSamw int sysattrerr = 0; 39177c478bd9Sstevel@tonic-gate char name[PATH_MAX+1]; /* holds name for diagnostics */ 39187c478bd9Sstevel@tonic-gate int extents, totalext; 39197c478bd9Sstevel@tonic-gate off_t bytes, totalbytes; 39207c478bd9Sstevel@tonic-gate 39217c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 39227c478bd9Sstevel@tonic-gate (void) strcpy(name, Xtarhdr.x_path); 39237c478bd9Sstevel@tonic-gate else 39247c478bd9Sstevel@tonic-gate (void) sprintf(name, "%.*s", NAMSIZ, dblock.dbuf.name); 39257c478bd9Sstevel@tonic-gate 39267c478bd9Sstevel@tonic-gate totalbytes = (off_t)0; /* in case we read in half the file */ 39277c478bd9Sstevel@tonic-gate totalext = 0; /* these keep count */ 39287c478bd9Sstevel@tonic-gate 39297c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 39307c478bd9Sstevel@tonic-gate "tar: %s split across %d volumes\n"), name, extotal); 39317c478bd9Sstevel@tonic-gate 39327c478bd9Sstevel@tonic-gate /* make sure we do extractions in order */ 39337c478bd9Sstevel@tonic-gate if (extno != 1) { /* starting in middle of file? */ 39347c478bd9Sstevel@tonic-gate (void) printf(gettext( 39357c478bd9Sstevel@tonic-gate "tar: first extent read is not #1\n" 39363d63ea05Sas145665 "OK to read file beginning with extent #%d (%s/%s) ? "), 39373d63ea05Sas145665 extno, yesstr, nostr); 39383d63ea05Sas145665 if (yes() == 0) { 39397c478bd9Sstevel@tonic-gate canit: 39407c478bd9Sstevel@tonic-gate passtape(); 39417c478bd9Sstevel@tonic-gate if (close(ofd) != 0) 39427c478bd9Sstevel@tonic-gate vperror(2, gettext("close error")); 3943da6c28aaSamw if (sysattrerr) { 3944da6c28aaSamw return (1); 3945da6c28aaSamw } else { 3946da6c28aaSamw return (0); 3947da6c28aaSamw } 39487c478bd9Sstevel@tonic-gate } 39497c478bd9Sstevel@tonic-gate } 39507c478bd9Sstevel@tonic-gate extents = extotal; 39517c478bd9Sstevel@tonic-gate i = extno; 39527c478bd9Sstevel@tonic-gate /*CONSTCOND*/ 39537c478bd9Sstevel@tonic-gate while (1) { 39547c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_SIZE) { 39557c478bd9Sstevel@tonic-gate bytes = extsize; 39567c478bd9Sstevel@tonic-gate } else { 39577c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 39587c478bd9Sstevel@tonic-gate } 39597c478bd9Sstevel@tonic-gate 39607c478bd9Sstevel@tonic-gate if (vflag) 39618e4a71aeSRich Burridge (void) fprintf(vfile, "+++ x %s [%s #%d], %" 39628e4a71aeSRich Burridge FMT_off_t " %s, %ldK\n", 39638e4a71aeSRich Burridge name, gettext("extent"), extno, 39648e4a71aeSRich Burridge bytes, gettext("bytes"), 39657c478bd9Sstevel@tonic-gate (long)K(TBLOCKS(bytes))); 3966da6c28aaSamw if (xblocks(issysattr, bytes, ofd) != 0) { 3967da6c28aaSamw sysattrerr = 1; 3968da6c28aaSamw goto canit; 3969da6c28aaSamw } 39707c478bd9Sstevel@tonic-gate 39717c478bd9Sstevel@tonic-gate totalbytes += bytes; 39727c478bd9Sstevel@tonic-gate totalext++; 39737c478bd9Sstevel@tonic-gate if (++i > extents) 39747c478bd9Sstevel@tonic-gate break; 39757c478bd9Sstevel@tonic-gate 39767c478bd9Sstevel@tonic-gate /* get next volume and verify it's the right one */ 39777c478bd9Sstevel@tonic-gate copy(&savedblock, &dblock); 39787c478bd9Sstevel@tonic-gate tryagain: 39797c478bd9Sstevel@tonic-gate newvol(); 39807c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 39817c478bd9Sstevel@tonic-gate getdir(); 39827c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) 39837c478bd9Sstevel@tonic-gate (void) get_xdata(); /* Get x-header & regular hdr */ 3984123523f8Sas158974 if ((dblock.dbuf.typeflag != 'A') && (xhdr_flgs != 0)) { 3985123523f8Sas158974 load_info_from_xtarhdr(xhdr_flgs, &Xtarhdr); 3986123523f8Sas158974 xhdr_flgs |= _X_XHDR; 3987123523f8Sas158974 } 39887c478bd9Sstevel@tonic-gate if (endtape()) { /* seemingly empty volume */ 39897c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 39907c478bd9Sstevel@tonic-gate "tar: first record is null\n")); 39917c478bd9Sstevel@tonic-gate asknicely: 39927c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 39937c478bd9Sstevel@tonic-gate "tar: need volume with extent #%d of %s\n"), 39947c478bd9Sstevel@tonic-gate i, name); 39957c478bd9Sstevel@tonic-gate goto tryagain; 39967c478bd9Sstevel@tonic-gate } 39977c478bd9Sstevel@tonic-gate if (notsame()) { 39987c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 39997c478bd9Sstevel@tonic-gate "tar: first file on that volume is not " 40007c478bd9Sstevel@tonic-gate "the same file\n")); 40017c478bd9Sstevel@tonic-gate goto asknicely; 40027c478bd9Sstevel@tonic-gate } 40037c478bd9Sstevel@tonic-gate if (i != extno) { 40047c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 4005eace40a5Sceastha "tar: extent #%d received out of order\ntar: " 4006eace40a5Sceastha "should be #%d\n"), extno, i); 40077c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 40087c478bd9Sstevel@tonic-gate "Ignore error, Abort this file, or " 40097c478bd9Sstevel@tonic-gate "load New volume (i/a/n) ? ")); 40107c478bd9Sstevel@tonic-gate c = response(); 40117c478bd9Sstevel@tonic-gate if (c == 'a') 40127c478bd9Sstevel@tonic-gate goto canit; 40137c478bd9Sstevel@tonic-gate if (c != 'i') /* default to new volume */ 40147c478bd9Sstevel@tonic-gate goto asknicely; 40157c478bd9Sstevel@tonic-gate i = extno; /* okay, start from there */ 40167c478bd9Sstevel@tonic-gate } 40177c478bd9Sstevel@tonic-gate } 40187c478bd9Sstevel@tonic-gate if (vflag) 40197c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 40207c478bd9Sstevel@tonic-gate "x %s (in %d extents), %" FMT_off_t " bytes, %ldK\n"), 40217c478bd9Sstevel@tonic-gate name, totalext, totalbytes, (long)K(TBLOCKS(totalbytes))); 4022da6c28aaSamw 4023da6c28aaSamw return (0); 40247c478bd9Sstevel@tonic-gate } 40257c478bd9Sstevel@tonic-gate 40267c478bd9Sstevel@tonic-gate 40277c478bd9Sstevel@tonic-gate /* 40287c478bd9Sstevel@tonic-gate * notsame() check if extract file extent is invalid 40297c478bd9Sstevel@tonic-gate * 40307c478bd9Sstevel@tonic-gate * returns true if anything differs between savedblock and dblock 40317c478bd9Sstevel@tonic-gate * except extno (extent number), checksum, or size (extent size). 40327c478bd9Sstevel@tonic-gate * Determines if this header belongs to the same file as the one we're 40337c478bd9Sstevel@tonic-gate * extracting. 40347c478bd9Sstevel@tonic-gate * 40357c478bd9Sstevel@tonic-gate * NOTE: though rather bulky, it is only called once per file 40367c478bd9Sstevel@tonic-gate * extension, and it can withstand changes in the definition 40377c478bd9Sstevel@tonic-gate * of the header structure. 40387c478bd9Sstevel@tonic-gate * 40397c478bd9Sstevel@tonic-gate * WARNING: this routine is local to xsfile() above 40407c478bd9Sstevel@tonic-gate */ 40417c478bd9Sstevel@tonic-gate 40427c478bd9Sstevel@tonic-gate static int 40437c478bd9Sstevel@tonic-gate notsame(void) 40447c478bd9Sstevel@tonic-gate { 40457c478bd9Sstevel@tonic-gate return ( 40467c478bd9Sstevel@tonic-gate (strncmp(savedblock.dbuf.name, dblock.dbuf.name, NAMSIZ)) || 40477c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.mode, dblock.dbuf.mode)) || 40487c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.uid, dblock.dbuf.uid)) || 40497c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.gid, dblock.dbuf.gid)) || 40507c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.mtime, dblock.dbuf.mtime)) || 40517c478bd9Sstevel@tonic-gate (savedblock.dbuf.typeflag != dblock.dbuf.typeflag) || 40527c478bd9Sstevel@tonic-gate (strncmp(savedblock.dbuf.linkname, dblock.dbuf.linkname, NAMSIZ)) || 40537c478bd9Sstevel@tonic-gate (savedblock.dbuf.extotal != dblock.dbuf.extotal) || 40547c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.efsize, dblock.dbuf.efsize))); 40557c478bd9Sstevel@tonic-gate } 40567c478bd9Sstevel@tonic-gate 40577c478bd9Sstevel@tonic-gate static void 40587c478bd9Sstevel@tonic-gate dotable(char *argv[]) 40597c478bd9Sstevel@tonic-gate { 4060cc22b130SRich Burridge int tcnt = 0; /* count # files tabled */ 4061cc22b130SRich Burridge int fcnt = 0; /* count # files in argv list */ 40627c478bd9Sstevel@tonic-gate char *namep, *dirp, *comp; 40637c478bd9Sstevel@tonic-gate int want; 40647c478bd9Sstevel@tonic-gate char aclchar = ' '; /* either blank or '+' */ 40657c478bd9Sstevel@tonic-gate char templink[PATH_MAX+1]; 4066da6c28aaSamw attr_data_t *attrinfo = NULL; 40677c478bd9Sstevel@tonic-gate 40687c478bd9Sstevel@tonic-gate dumping = 0; 40697c478bd9Sstevel@tonic-gate 40707c478bd9Sstevel@tonic-gate /* if not on magtape, maximize seek speed */ 40717c478bd9Sstevel@tonic-gate if (NotTape && !bflag) { 40727c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 40737c478bd9Sstevel@tonic-gate nblock = SYS_BLOCK / TBLOCK; 40747c478bd9Sstevel@tonic-gate #else 40757c478bd9Sstevel@tonic-gate nblock = 1; 40767c478bd9Sstevel@tonic-gate #endif 40777c478bd9Sstevel@tonic-gate } 40787c478bd9Sstevel@tonic-gate 40797c478bd9Sstevel@tonic-gate for (;;) { 40807c478bd9Sstevel@tonic-gate 40817c478bd9Sstevel@tonic-gate /* namep is set by wantit to point to the full name */ 4082da6c28aaSamw if ((want = wantit(argv, &namep, &dirp, &comp, &attrinfo)) == 0) 40837c478bd9Sstevel@tonic-gate continue; 40847c478bd9Sstevel@tonic-gate if (want == -1) 40857c478bd9Sstevel@tonic-gate break; 40867c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag != 'A') 40877c478bd9Sstevel@tonic-gate ++tcnt; 40887c478bd9Sstevel@tonic-gate 40893a1dab68SRich Burridge if (Fflag) { 40903a1dab68SRich Burridge if (checkf(namep, is_directory(namep), Fflag) == 0) { 40913a1dab68SRich Burridge passtape(); 40923a1dab68SRich Burridge continue; 40933a1dab68SRich Burridge } 40943a1dab68SRich Burridge } 40957c478bd9Sstevel@tonic-gate /* 40967c478bd9Sstevel@tonic-gate * ACL support: 40977c478bd9Sstevel@tonic-gate * aclchar is introduced to indicate if there are 40987c478bd9Sstevel@tonic-gate * acl entries. longt() now takes one extra argument. 40997c478bd9Sstevel@tonic-gate */ 41007c478bd9Sstevel@tonic-gate if (vflag) { 41017c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == 'A') { 41027c478bd9Sstevel@tonic-gate aclchar = '+'; 41037c478bd9Sstevel@tonic-gate passtape(); 41047c478bd9Sstevel@tonic-gate continue; 41057c478bd9Sstevel@tonic-gate } 41067c478bd9Sstevel@tonic-gate longt(&stbuf, aclchar); 41077c478bd9Sstevel@tonic-gate aclchar = ' '; 41087c478bd9Sstevel@tonic-gate } 41097c478bd9Sstevel@tonic-gate 41107c478bd9Sstevel@tonic-gate 41117c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 4112da6c28aaSamw if (xattrp != NULL) { 4113da6c28aaSamw int issysattr; 4114da6c28aaSamw char *bn = basename(attrinfo->attr_path); 41157c478bd9Sstevel@tonic-gate 4116da6c28aaSamw /* 4117da6c28aaSamw * We could use sysattr_type() to test whether or not 4118da6c28aaSamw * the attribute we are processing is really an 4119da6c28aaSamw * extended system attribute, which as of this writing 4120da6c28aaSamw * just does a strcmp(), however, sysattr_type() may 4121da6c28aaSamw * be changed to issue a pathconf() call instead, which 4122da6c28aaSamw * would require being changed into the parent attribute 4123da6c28aaSamw * directory. So instead, just do simple string 4124da6c28aaSamw * comparisons to see if we are processing an extended 4125da6c28aaSamw * system attribute. 4126da6c28aaSamw */ 4127da6c28aaSamw issysattr = is_sysattr(bn); 4128da6c28aaSamw 4129da6c28aaSamw (void) printf(gettext("%s %sattribute %s"), 4130da6c28aaSamw xattrp->h_names, 4131da6c28aaSamw issysattr ? gettext("system ") : "", 4132da6c28aaSamw attrinfo->attr_path); 41337c478bd9Sstevel@tonic-gate } else { 41347c478bd9Sstevel@tonic-gate (void) printf("%s", namep); 41357c478bd9Sstevel@tonic-gate } 41367c478bd9Sstevel@tonic-gate #else 41377c478bd9Sstevel@tonic-gate (void) printf("%s", namep); 41387c478bd9Sstevel@tonic-gate #endif 41397c478bd9Sstevel@tonic-gate 41407c478bd9Sstevel@tonic-gate if (extno != 0) { 41417c478bd9Sstevel@tonic-gate if (vflag) { 41427c478bd9Sstevel@tonic-gate /* keep the '\n' for backwards compatibility */ 41437c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 41447c478bd9Sstevel@tonic-gate "\n [extent #%d of %d]"), extno, extotal); 41457c478bd9Sstevel@tonic-gate } else { 41467c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 41477c478bd9Sstevel@tonic-gate " [extent #%d of %d]"), extno, extotal); 41487c478bd9Sstevel@tonic-gate } 41497c478bd9Sstevel@tonic-gate } 41507c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) { 41517c478bd9Sstevel@tonic-gate (void) strcpy(templink, Xtarhdr.x_linkpath); 41527c478bd9Sstevel@tonic-gate } else { 41537c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 4154da6c28aaSamw if (xattrp != NULL) { 41557c478bd9Sstevel@tonic-gate (void) sprintf(templink, 41567c478bd9Sstevel@tonic-gate "file %.*s", NAMSIZ, xattrp->h_names); 41577c478bd9Sstevel@tonic-gate } else { 41587c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 41597c478bd9Sstevel@tonic-gate dblock.dbuf.linkname); 41607c478bd9Sstevel@tonic-gate } 41617c478bd9Sstevel@tonic-gate #else 41627c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 41637c478bd9Sstevel@tonic-gate dblock.dbuf.linkname); 41647c478bd9Sstevel@tonic-gate #endif 41657c478bd9Sstevel@tonic-gate templink[NAMSIZ] = '\0'; 41667c478bd9Sstevel@tonic-gate } 41677c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '1') { 41687c478bd9Sstevel@tonic-gate /* 41697c478bd9Sstevel@tonic-gate * TRANSLATION_NOTE 41707c478bd9Sstevel@tonic-gate * Subject is omitted here. 41717c478bd9Sstevel@tonic-gate * Translate this as if 41727c478bd9Sstevel@tonic-gate * <subject> linked to %s 41737c478bd9Sstevel@tonic-gate */ 41747c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 4175da6c28aaSamw if (xattrp != NULL) { 41767c478bd9Sstevel@tonic-gate (void) printf( 41777c478bd9Sstevel@tonic-gate gettext(" linked to attribute %s"), 41787c478bd9Sstevel@tonic-gate xattr_linkp->h_names + 41797c478bd9Sstevel@tonic-gate strlen(xattr_linkp->h_names) + 1); 41807c478bd9Sstevel@tonic-gate } else { 41817c478bd9Sstevel@tonic-gate (void) printf( 41827c478bd9Sstevel@tonic-gate gettext(" linked to %s"), templink); 41837c478bd9Sstevel@tonic-gate } 41847c478bd9Sstevel@tonic-gate #else 41857c478bd9Sstevel@tonic-gate (void) printf( 41867c478bd9Sstevel@tonic-gate gettext(" linked to %s"), templink); 41877c478bd9Sstevel@tonic-gate 41887c478bd9Sstevel@tonic-gate #endif 41897c478bd9Sstevel@tonic-gate } 41907c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '2') 41917c478bd9Sstevel@tonic-gate (void) printf(gettext( 41927c478bd9Sstevel@tonic-gate /* 41937c478bd9Sstevel@tonic-gate * TRANSLATION_NOTE 41947c478bd9Sstevel@tonic-gate * Subject is omitted here. 41957c478bd9Sstevel@tonic-gate * Translate this as if 41967c478bd9Sstevel@tonic-gate * <subject> symbolic link to %s 41977c478bd9Sstevel@tonic-gate */ 41987c478bd9Sstevel@tonic-gate " symbolic link to %s"), templink); 41997c478bd9Sstevel@tonic-gate (void) printf("\n"); 42007c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 4201da6c28aaSamw if (xattrp != NULL) { 42027c478bd9Sstevel@tonic-gate free(xattrhead); 42037c478bd9Sstevel@tonic-gate xattrp = NULL; 42047c478bd9Sstevel@tonic-gate xattrhead = NULL; 42057c478bd9Sstevel@tonic-gate } 42067c478bd9Sstevel@tonic-gate #endif 42077c478bd9Sstevel@tonic-gate passtape(); 42087c478bd9Sstevel@tonic-gate } 42097c478bd9Sstevel@tonic-gate /* 42107c478bd9Sstevel@tonic-gate * Check if the number of files tabled is different from the 42117c478bd9Sstevel@tonic-gate * number of files listed on the command line 42127c478bd9Sstevel@tonic-gate */ 42137c478bd9Sstevel@tonic-gate if (fcnt > tcnt) { 42147c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 42157c478bd9Sstevel@tonic-gate "tar: %d file(s) not found\n"), fcnt-tcnt); 42167c478bd9Sstevel@tonic-gate Errflg = 1; 42177c478bd9Sstevel@tonic-gate } 42187c478bd9Sstevel@tonic-gate } 42197c478bd9Sstevel@tonic-gate 42207c478bd9Sstevel@tonic-gate static void 42217c478bd9Sstevel@tonic-gate putempty(blkcnt_t n) 42227c478bd9Sstevel@tonic-gate { 42237c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 42247c478bd9Sstevel@tonic-gate char *cp; 42257c478bd9Sstevel@tonic-gate 42267c478bd9Sstevel@tonic-gate for (cp = buf; cp < &buf[TBLOCK]; ) 42277c478bd9Sstevel@tonic-gate *cp++ = '\0'; 42287c478bd9Sstevel@tonic-gate while (n-- > 0) 42297c478bd9Sstevel@tonic-gate (void) writetbuf(buf, 1); 42307c478bd9Sstevel@tonic-gate } 42317c478bd9Sstevel@tonic-gate 42327c478bd9Sstevel@tonic-gate static ushort_t Ftype = S_IFMT; 42337c478bd9Sstevel@tonic-gate 42347c478bd9Sstevel@tonic-gate static void 42357c478bd9Sstevel@tonic-gate verbose(struct stat *st, char aclchar) 42367c478bd9Sstevel@tonic-gate { 42377c478bd9Sstevel@tonic-gate int i, j, temp; 42387c478bd9Sstevel@tonic-gate mode_t mode; 42397c478bd9Sstevel@tonic-gate char modestr[12]; 42407c478bd9Sstevel@tonic-gate 42417c478bd9Sstevel@tonic-gate for (i = 0; i < 11; i++) 42427c478bd9Sstevel@tonic-gate modestr[i] = '-'; 42437c478bd9Sstevel@tonic-gate modestr[i] = '\0'; 42447c478bd9Sstevel@tonic-gate 42457c478bd9Sstevel@tonic-gate /* a '+' sign is printed if there is ACL */ 42467c478bd9Sstevel@tonic-gate modestr[i-1] = aclchar; 42477c478bd9Sstevel@tonic-gate 42487c478bd9Sstevel@tonic-gate mode = st->st_mode; 42497c478bd9Sstevel@tonic-gate for (i = 0; i < 3; i++) { 42507c478bd9Sstevel@tonic-gate temp = (mode >> (6 - (i * 3))); 42517c478bd9Sstevel@tonic-gate j = (i * 3) + 1; 42527c478bd9Sstevel@tonic-gate if (S_IROTH & temp) 42537c478bd9Sstevel@tonic-gate modestr[j] = 'r'; 42547c478bd9Sstevel@tonic-gate if (S_IWOTH & temp) 42557c478bd9Sstevel@tonic-gate modestr[j + 1] = 'w'; 42567c478bd9Sstevel@tonic-gate if (S_IXOTH & temp) 42577c478bd9Sstevel@tonic-gate modestr[j + 2] = 'x'; 42587c478bd9Sstevel@tonic-gate } 42597c478bd9Sstevel@tonic-gate temp = st->st_mode & Ftype; 42607c478bd9Sstevel@tonic-gate switch (temp) { 42617c478bd9Sstevel@tonic-gate case (S_IFIFO): 42627c478bd9Sstevel@tonic-gate modestr[0] = 'p'; 42637c478bd9Sstevel@tonic-gate break; 42647c478bd9Sstevel@tonic-gate case (S_IFCHR): 42657c478bd9Sstevel@tonic-gate modestr[0] = 'c'; 42667c478bd9Sstevel@tonic-gate break; 42677c478bd9Sstevel@tonic-gate case (S_IFDIR): 42687c478bd9Sstevel@tonic-gate modestr[0] = 'd'; 42697c478bd9Sstevel@tonic-gate break; 42707c478bd9Sstevel@tonic-gate case (S_IFBLK): 42717c478bd9Sstevel@tonic-gate modestr[0] = 'b'; 42727c478bd9Sstevel@tonic-gate break; 42737c478bd9Sstevel@tonic-gate case (S_IFREG): /* was initialized to '-' */ 42747c478bd9Sstevel@tonic-gate break; 42757c478bd9Sstevel@tonic-gate case (S_IFLNK): 42767c478bd9Sstevel@tonic-gate modestr[0] = 'l'; 42777c478bd9Sstevel@tonic-gate break; 42787c478bd9Sstevel@tonic-gate default: 42797c478bd9Sstevel@tonic-gate /* This field may be zero in old archives. */ 42807c478bd9Sstevel@tonic-gate if (is_posix && dblock.dbuf.typeflag != '1') { 42817c478bd9Sstevel@tonic-gate /* 42827c478bd9Sstevel@tonic-gate * For POSIX compliant archives, the mode field 42837c478bd9Sstevel@tonic-gate * consists of 12 bits, ie: the file type bits 42847c478bd9Sstevel@tonic-gate * are not stored in dblock.dbuf.mode. 42857c478bd9Sstevel@tonic-gate * For files other than hard links, getdir() sets 42867c478bd9Sstevel@tonic-gate * the file type bits in the st_mode field of the 42877c478bd9Sstevel@tonic-gate * stat structure based upon dblock.dbuf.typeflag. 42887c478bd9Sstevel@tonic-gate */ 42897c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 42907c478bd9Sstevel@tonic-gate "tar: impossible file type")); 42917c478bd9Sstevel@tonic-gate } 42927c478bd9Sstevel@tonic-gate } 42937c478bd9Sstevel@tonic-gate 42947c478bd9Sstevel@tonic-gate if ((S_ISUID & Gen.g_mode) == S_ISUID) 42957c478bd9Sstevel@tonic-gate modestr[3] = 's'; 42967c478bd9Sstevel@tonic-gate if ((S_ISVTX & Gen.g_mode) == S_ISVTX) 42977c478bd9Sstevel@tonic-gate modestr[9] = 't'; 42987c478bd9Sstevel@tonic-gate if ((S_ISGID & Gen.g_mode) == S_ISGID && modestr[6] == 'x') 42997c478bd9Sstevel@tonic-gate modestr[6] = 's'; 43007c478bd9Sstevel@tonic-gate else if ((S_ENFMT & Gen.g_mode) == S_ENFMT && modestr[6] != 'x') 43017c478bd9Sstevel@tonic-gate modestr[6] = 'l'; 43027c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%s", modestr); 43037c478bd9Sstevel@tonic-gate } 43047c478bd9Sstevel@tonic-gate 43057c478bd9Sstevel@tonic-gate static void 43067c478bd9Sstevel@tonic-gate longt(struct stat *st, char aclchar) 43077c478bd9Sstevel@tonic-gate { 43087c478bd9Sstevel@tonic-gate char fileDate[30]; 43097c478bd9Sstevel@tonic-gate struct tm *tm; 43107c478bd9Sstevel@tonic-gate 43117c478bd9Sstevel@tonic-gate verbose(st, aclchar); 43127c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%3ld/%-3ld", st->st_uid, st->st_gid); 43137c478bd9Sstevel@tonic-gate 43147c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '2') { 43157c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) 43167c478bd9Sstevel@tonic-gate st->st_size = (off_t)strlen(Xtarhdr.x_linkpath); 43177c478bd9Sstevel@tonic-gate else 43187c478bd9Sstevel@tonic-gate st->st_size = (off_t)(memchr(dblock.dbuf.linkname, 43197c478bd9Sstevel@tonic-gate '\0', NAMSIZ) ? 43207c478bd9Sstevel@tonic-gate (strlen(dblock.dbuf.linkname)) : (NAMSIZ)); 43217c478bd9Sstevel@tonic-gate } 43227c478bd9Sstevel@tonic-gate (void) fprintf(vfile, " %6" FMT_off_t, st->st_size); 43237c478bd9Sstevel@tonic-gate 43247c478bd9Sstevel@tonic-gate tm = localtime(&(st->st_mtime)); 43257c478bd9Sstevel@tonic-gate (void) strftime(fileDate, sizeof (fileDate), 43267c478bd9Sstevel@tonic-gate dcgettext((const char *)0, "%b %e %R %Y", LC_TIME), tm); 43277c478bd9Sstevel@tonic-gate (void) fprintf(vfile, " %s ", fileDate); 43287c478bd9Sstevel@tonic-gate } 43297c478bd9Sstevel@tonic-gate 43307c478bd9Sstevel@tonic-gate 43317c478bd9Sstevel@tonic-gate /* 43327c478bd9Sstevel@tonic-gate * checkdir - Attempt to ensure that the path represented in name 43337c478bd9Sstevel@tonic-gate * exists, and return 1 if this is true and name itself is a 43347c478bd9Sstevel@tonic-gate * directory. 43357c478bd9Sstevel@tonic-gate * Return 0 if this path cannot be created or if name is not 43367c478bd9Sstevel@tonic-gate * a directory. 43377c478bd9Sstevel@tonic-gate */ 43387c478bd9Sstevel@tonic-gate 43397c478bd9Sstevel@tonic-gate static int 43407c478bd9Sstevel@tonic-gate checkdir(char *name) 43417c478bd9Sstevel@tonic-gate { 43427c478bd9Sstevel@tonic-gate char lastChar; /* the last character in name */ 43437c478bd9Sstevel@tonic-gate char *cp; /* scratch pointer into name */ 43447c478bd9Sstevel@tonic-gate char *firstSlash = NULL; /* first slash in name */ 43457c478bd9Sstevel@tonic-gate char *lastSlash = NULL; /* last slash in name */ 43467c478bd9Sstevel@tonic-gate int nameLen; /* length of name */ 43477c478bd9Sstevel@tonic-gate int trailingSlash; /* true if name ends in slash */ 43487c478bd9Sstevel@tonic-gate int leadingSlash; /* true if name begins with slash */ 43497c478bd9Sstevel@tonic-gate int markedDir; /* true if name denotes a directory */ 43507c478bd9Sstevel@tonic-gate int success; /* status of makeDir call */ 43517c478bd9Sstevel@tonic-gate 43527c478bd9Sstevel@tonic-gate 43537c478bd9Sstevel@tonic-gate /* 43547c478bd9Sstevel@tonic-gate * Scan through the name, and locate first and last slashes. 43557c478bd9Sstevel@tonic-gate */ 43567c478bd9Sstevel@tonic-gate 43577c478bd9Sstevel@tonic-gate for (cp = name; *cp; cp++) { 43587c478bd9Sstevel@tonic-gate if (*cp == '/') { 43597c478bd9Sstevel@tonic-gate if (! firstSlash) { 43607c478bd9Sstevel@tonic-gate firstSlash = cp; 43617c478bd9Sstevel@tonic-gate } 43627c478bd9Sstevel@tonic-gate lastSlash = cp; 43637c478bd9Sstevel@tonic-gate } 43647c478bd9Sstevel@tonic-gate } 43657c478bd9Sstevel@tonic-gate 43667c478bd9Sstevel@tonic-gate /* 43677c478bd9Sstevel@tonic-gate * Determine what you can from the proceeds of the scan. 43687c478bd9Sstevel@tonic-gate */ 43697c478bd9Sstevel@tonic-gate 43707c478bd9Sstevel@tonic-gate lastChar = *(cp - 1); 43717c478bd9Sstevel@tonic-gate nameLen = (int)(cp - name); 43727c478bd9Sstevel@tonic-gate trailingSlash = (lastChar == '/'); 43737c478bd9Sstevel@tonic-gate leadingSlash = (*name == '/'); 43747c478bd9Sstevel@tonic-gate markedDir = (dblock.dbuf.typeflag == '5' || trailingSlash); 43757c478bd9Sstevel@tonic-gate 43767c478bd9Sstevel@tonic-gate if (! lastSlash && ! markedDir) { 43777c478bd9Sstevel@tonic-gate /* 43787c478bd9Sstevel@tonic-gate * The named file does not have any subdrectory 43797c478bd9Sstevel@tonic-gate * structure; just bail out. 43807c478bd9Sstevel@tonic-gate */ 43817c478bd9Sstevel@tonic-gate 43827c478bd9Sstevel@tonic-gate return (0); 43837c478bd9Sstevel@tonic-gate } 43847c478bd9Sstevel@tonic-gate 43857c478bd9Sstevel@tonic-gate /* 43867c478bd9Sstevel@tonic-gate * Make sure that name doesn`t end with slash for the loop. 43877c478bd9Sstevel@tonic-gate * This ensures that the makeDir attempt after the loop is 43887c478bd9Sstevel@tonic-gate * meaningful. 43897c478bd9Sstevel@tonic-gate */ 43907c478bd9Sstevel@tonic-gate 43917c478bd9Sstevel@tonic-gate if (trailingSlash) { 43927c478bd9Sstevel@tonic-gate name[nameLen-1] = '\0'; 43937c478bd9Sstevel@tonic-gate } 43947c478bd9Sstevel@tonic-gate 43957c478bd9Sstevel@tonic-gate /* 43967c478bd9Sstevel@tonic-gate * Make the path one component at a time. 43977c478bd9Sstevel@tonic-gate */ 43987c478bd9Sstevel@tonic-gate 43997c478bd9Sstevel@tonic-gate for (cp = strchr(leadingSlash ? name+1 : name, '/'); 44007c478bd9Sstevel@tonic-gate cp; 44017c478bd9Sstevel@tonic-gate cp = strchr(cp+1, '/')) { 44027c478bd9Sstevel@tonic-gate *cp = '\0'; 44037c478bd9Sstevel@tonic-gate success = makeDir(name); 44047c478bd9Sstevel@tonic-gate *cp = '/'; 44057c478bd9Sstevel@tonic-gate 44067c478bd9Sstevel@tonic-gate if (!success) { 44077c478bd9Sstevel@tonic-gate name[nameLen-1] = lastChar; 44087c478bd9Sstevel@tonic-gate return (0); 44097c478bd9Sstevel@tonic-gate } 44107c478bd9Sstevel@tonic-gate } 44117c478bd9Sstevel@tonic-gate 44127c478bd9Sstevel@tonic-gate /* 44137c478bd9Sstevel@tonic-gate * This makes the last component of the name, if it is a 44147c478bd9Sstevel@tonic-gate * directory. 44157c478bd9Sstevel@tonic-gate */ 44167c478bd9Sstevel@tonic-gate 44177c478bd9Sstevel@tonic-gate if (markedDir) { 44187c478bd9Sstevel@tonic-gate if (! makeDir(name)) { 44197c478bd9Sstevel@tonic-gate name[nameLen-1] = lastChar; 44207c478bd9Sstevel@tonic-gate return (0); 44217c478bd9Sstevel@tonic-gate } 44227c478bd9Sstevel@tonic-gate } 44237c478bd9Sstevel@tonic-gate 44247c478bd9Sstevel@tonic-gate name[nameLen-1] = (lastChar == '/') ? '\0' : lastChar; 44257c478bd9Sstevel@tonic-gate return (markedDir); 44267c478bd9Sstevel@tonic-gate } 44277c478bd9Sstevel@tonic-gate 44287c478bd9Sstevel@tonic-gate /* 44297c478bd9Sstevel@tonic-gate * resugname - Restore the user name and group name. Search the NIS 44307c478bd9Sstevel@tonic-gate * before using the uid and gid. 44317c478bd9Sstevel@tonic-gate * (It is presumed that an archive entry cannot be 44327c478bd9Sstevel@tonic-gate * simultaneously a symlink and some other type.) 44337c478bd9Sstevel@tonic-gate */ 44347c478bd9Sstevel@tonic-gate 44357c478bd9Sstevel@tonic-gate static void 44367c478bd9Sstevel@tonic-gate resugname(int dirfd, /* dir fd file resides in */ 44377c478bd9Sstevel@tonic-gate char *name, /* name of the file to be modified */ 44387c478bd9Sstevel@tonic-gate int symflag) /* true if file is a symbolic link */ 44397c478bd9Sstevel@tonic-gate { 44407c478bd9Sstevel@tonic-gate uid_t duid; 44417c478bd9Sstevel@tonic-gate gid_t dgid; 44427c478bd9Sstevel@tonic-gate struct stat *sp = &stbuf; 44437c478bd9Sstevel@tonic-gate char *u_g_name; 44447c478bd9Sstevel@tonic-gate 44457c478bd9Sstevel@tonic-gate if (checkflag == 1) { /* Extended tar format and euid == 0 */ 44467c478bd9Sstevel@tonic-gate 44477c478bd9Sstevel@tonic-gate /* 44487c478bd9Sstevel@tonic-gate * Try and extract the intended uid and gid from the name 44497c478bd9Sstevel@tonic-gate * service before believing the uid and gid in the header. 44507c478bd9Sstevel@tonic-gate * 44517c478bd9Sstevel@tonic-gate * In the case where we archived a setuid or setgid file 44527c478bd9Sstevel@tonic-gate * owned by someone with a large uid, then it will 44537c478bd9Sstevel@tonic-gate * have made it into the archive with a uid of nobody. If 44547c478bd9Sstevel@tonic-gate * the corresponding username doesn't appear to exist, then we 44557c478bd9Sstevel@tonic-gate * want to make sure it *doesn't* end up as setuid nobody! 44567c478bd9Sstevel@tonic-gate * 44577c478bd9Sstevel@tonic-gate * Our caller will print an error message about the fact 44587c478bd9Sstevel@tonic-gate * that the restore didn't work out quite right .. 44597c478bd9Sstevel@tonic-gate */ 44607c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_UNAME) 44617c478bd9Sstevel@tonic-gate u_g_name = Xtarhdr.x_uname; 44627c478bd9Sstevel@tonic-gate else 44637c478bd9Sstevel@tonic-gate u_g_name = dblock.dbuf.uname; 44647c478bd9Sstevel@tonic-gate if ((duid = getuidbyname(u_g_name)) == -1) { 44657c478bd9Sstevel@tonic-gate if (S_ISREG(sp->st_mode) && sp->st_uid == UID_NOBODY && 44667c478bd9Sstevel@tonic-gate (sp->st_mode & S_ISUID) == S_ISUID) 44677c478bd9Sstevel@tonic-gate (void) chmod(name, 44687c478bd9Sstevel@tonic-gate MODEMASK & sp->st_mode & ~S_ISUID); 44697c478bd9Sstevel@tonic-gate duid = sp->st_uid; 44707c478bd9Sstevel@tonic-gate } 44717c478bd9Sstevel@tonic-gate 44727c478bd9Sstevel@tonic-gate /* (Ditto for gids) */ 44737c478bd9Sstevel@tonic-gate 44747c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_GNAME) 44757c478bd9Sstevel@tonic-gate u_g_name = Xtarhdr.x_gname; 44767c478bd9Sstevel@tonic-gate else 44777c478bd9Sstevel@tonic-gate u_g_name = dblock.dbuf.gname; 44787c478bd9Sstevel@tonic-gate if ((dgid = getgidbyname(u_g_name)) == -1) { 44797c478bd9Sstevel@tonic-gate if (S_ISREG(sp->st_mode) && sp->st_gid == GID_NOBODY && 44807c478bd9Sstevel@tonic-gate (sp->st_mode & S_ISGID) == S_ISGID) 44817c478bd9Sstevel@tonic-gate (void) chmod(name, 44827c478bd9Sstevel@tonic-gate MODEMASK & sp->st_mode & ~S_ISGID); 44837c478bd9Sstevel@tonic-gate dgid = sp->st_gid; 44847c478bd9Sstevel@tonic-gate } 44857c478bd9Sstevel@tonic-gate } else if (checkflag == 2) { /* tar format and euid == 0 */ 44867c478bd9Sstevel@tonic-gate duid = sp->st_uid; 44877c478bd9Sstevel@tonic-gate dgid = sp->st_gid; 44887c478bd9Sstevel@tonic-gate } 44897c478bd9Sstevel@tonic-gate if ((checkflag == 1) || (checkflag == 2)) 44907c478bd9Sstevel@tonic-gate (void) fchownat(dirfd, name, duid, dgid, symflag); 44917c478bd9Sstevel@tonic-gate } 44927c478bd9Sstevel@tonic-gate 44937c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 44947c478bd9Sstevel@tonic-gate static void 44957c478bd9Sstevel@tonic-gate onintr(int sig) 44967c478bd9Sstevel@tonic-gate { 44977c478bd9Sstevel@tonic-gate (void) signal(SIGINT, SIG_IGN); 44987c478bd9Sstevel@tonic-gate term++; 44997c478bd9Sstevel@tonic-gate } 45007c478bd9Sstevel@tonic-gate 45017c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 45027c478bd9Sstevel@tonic-gate static void 45037c478bd9Sstevel@tonic-gate onquit(int sig) 45047c478bd9Sstevel@tonic-gate { 45057c478bd9Sstevel@tonic-gate (void) signal(SIGQUIT, SIG_IGN); 45067c478bd9Sstevel@tonic-gate term++; 45077c478bd9Sstevel@tonic-gate } 45087c478bd9Sstevel@tonic-gate 45097c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 45107c478bd9Sstevel@tonic-gate static void 45117c478bd9Sstevel@tonic-gate onhup(int sig) 45127c478bd9Sstevel@tonic-gate { 45137c478bd9Sstevel@tonic-gate (void) signal(SIGHUP, SIG_IGN); 45147c478bd9Sstevel@tonic-gate term++; 45157c478bd9Sstevel@tonic-gate } 45167c478bd9Sstevel@tonic-gate 45177c478bd9Sstevel@tonic-gate static void 45187c478bd9Sstevel@tonic-gate tomodes(struct stat *sp) 45197c478bd9Sstevel@tonic-gate { 45207c478bd9Sstevel@tonic-gate uid_t uid; 45217c478bd9Sstevel@tonic-gate gid_t gid; 45227c478bd9Sstevel@tonic-gate 45237c478bd9Sstevel@tonic-gate bzero(dblock.dummy, TBLOCK); 45247c478bd9Sstevel@tonic-gate 45257c478bd9Sstevel@tonic-gate /* 45267c478bd9Sstevel@tonic-gate * If the uid or gid is too large, we can't put it into 45277c478bd9Sstevel@tonic-gate * the archive. We could fail to put anything in the 45287c478bd9Sstevel@tonic-gate * archive at all .. but most of the time the name service 45297c478bd9Sstevel@tonic-gate * will save the day when we do a lookup at restore time. 45307c478bd9Sstevel@tonic-gate * 45317c478bd9Sstevel@tonic-gate * Instead we choose a "safe" uid and gid, and fix up whether 45327c478bd9Sstevel@tonic-gate * or not the setuid and setgid bits are left set to extraction 45337c478bd9Sstevel@tonic-gate * time. 45347c478bd9Sstevel@tonic-gate */ 45357c478bd9Sstevel@tonic-gate if (Eflag) { 45367c478bd9Sstevel@tonic-gate if ((ulong_t)(uid = sp->st_uid) > (ulong_t)OCTAL7CHAR) { 45377c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_UID; 45387c478bd9Sstevel@tonic-gate Xtarhdr.x_uid = uid; 45397c478bd9Sstevel@tonic-gate } 45407c478bd9Sstevel@tonic-gate if ((ulong_t)(gid = sp->st_gid) > (ulong_t)OCTAL7CHAR) { 45417c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_GID; 45427c478bd9Sstevel@tonic-gate Xtarhdr.x_gid = gid; 45437c478bd9Sstevel@tonic-gate } 45447c478bd9Sstevel@tonic-gate if (sp->st_size > TAR_OFFSET_MAX) { 45457c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_SIZE; 45467c478bd9Sstevel@tonic-gate Xtarhdr.x_filesz = sp->st_size; 45477c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o, 45487c478bd9Sstevel@tonic-gate (off_t)0); 45497c478bd9Sstevel@tonic-gate } else 45507c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o, 45517c478bd9Sstevel@tonic-gate sp->st_size); 45527c478bd9Sstevel@tonic-gate } else { 45537c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o, 45547c478bd9Sstevel@tonic-gate sp->st_size); 45557c478bd9Sstevel@tonic-gate } 45567c478bd9Sstevel@tonic-gate if ((ulong_t)(uid = sp->st_uid) > (ulong_t)OCTAL7CHAR) 45577c478bd9Sstevel@tonic-gate uid = UID_NOBODY; 45587c478bd9Sstevel@tonic-gate if ((ulong_t)(gid = sp->st_gid) > (ulong_t)OCTAL7CHAR) 45597c478bd9Sstevel@tonic-gate gid = GID_NOBODY; 45607c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.gid, "%07lo", gid); 45617c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.uid, "%07lo", uid); 45627c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mode, "%07lo", sp->st_mode & POSIXMODES); 45637c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mtime, "%011lo", sp->st_mtime); 45647c478bd9Sstevel@tonic-gate } 45657c478bd9Sstevel@tonic-gate 45667c478bd9Sstevel@tonic-gate static int 45677c478bd9Sstevel@tonic-gate #ifdef EUC 45687c478bd9Sstevel@tonic-gate /* 45697c478bd9Sstevel@tonic-gate * Warning: the result of this function depends whether 'char' is a 45707c478bd9Sstevel@tonic-gate * signed or unsigned data type. This a source of potential 45717c478bd9Sstevel@tonic-gate * non-portability among heterogeneous systems. It is retained here 45727c478bd9Sstevel@tonic-gate * for backward compatibility. 45737c478bd9Sstevel@tonic-gate */ 45747c478bd9Sstevel@tonic-gate checksum_signed(union hblock *dblockp) 45757c478bd9Sstevel@tonic-gate #else 45767c478bd9Sstevel@tonic-gate checksum(union hblock *dblockp) 45777c478bd9Sstevel@tonic-gate #endif /* EUC */ 45787c478bd9Sstevel@tonic-gate { 45797c478bd9Sstevel@tonic-gate int i; 45807c478bd9Sstevel@tonic-gate char *cp; 45817c478bd9Sstevel@tonic-gate 45827c478bd9Sstevel@tonic-gate for (cp = dblockp->dbuf.chksum; 45837c478bd9Sstevel@tonic-gate cp < &dblockp->dbuf.chksum[sizeof (dblockp->dbuf.chksum)]; cp++) 45847c478bd9Sstevel@tonic-gate *cp = ' '; 45857c478bd9Sstevel@tonic-gate i = 0; 45867c478bd9Sstevel@tonic-gate for (cp = dblockp->dummy; cp < &(dblockp->dummy[TBLOCK]); cp++) 45877c478bd9Sstevel@tonic-gate i += *cp; 45887c478bd9Sstevel@tonic-gate return (i); 45897c478bd9Sstevel@tonic-gate } 45907c478bd9Sstevel@tonic-gate 45917c478bd9Sstevel@tonic-gate #ifdef EUC 45927c478bd9Sstevel@tonic-gate /* 45937c478bd9Sstevel@tonic-gate * Generate unsigned checksum, regardless of what C compiler is 45947c478bd9Sstevel@tonic-gate * used. Survives in the face of arbitrary 8-bit clean filenames, 45957c478bd9Sstevel@tonic-gate * e.g., internationalized filenames. 45967c478bd9Sstevel@tonic-gate */ 45977c478bd9Sstevel@tonic-gate static int 45987c478bd9Sstevel@tonic-gate checksum(union hblock *dblockp) 45997c478bd9Sstevel@tonic-gate { 46007c478bd9Sstevel@tonic-gate unsigned i; 46017c478bd9Sstevel@tonic-gate unsigned char *cp; 46027c478bd9Sstevel@tonic-gate 46037c478bd9Sstevel@tonic-gate for (cp = (unsigned char *) dblockp->dbuf.chksum; 46047c478bd9Sstevel@tonic-gate cp < (unsigned char *) 46057c478bd9Sstevel@tonic-gate &(dblockp->dbuf.chksum[sizeof (dblockp->dbuf.chksum)]); cp++) 46067c478bd9Sstevel@tonic-gate *cp = ' '; 46077c478bd9Sstevel@tonic-gate i = 0; 46087c478bd9Sstevel@tonic-gate for (cp = (unsigned char *) dblockp->dummy; 46097c478bd9Sstevel@tonic-gate cp < (unsigned char *) &(dblockp->dummy[TBLOCK]); cp++) 46107c478bd9Sstevel@tonic-gate i += *cp; 46117c478bd9Sstevel@tonic-gate 46127c478bd9Sstevel@tonic-gate return (i); 46137c478bd9Sstevel@tonic-gate } 46147c478bd9Sstevel@tonic-gate #endif /* EUC */ 46157c478bd9Sstevel@tonic-gate 46167c478bd9Sstevel@tonic-gate /* 46177c478bd9Sstevel@tonic-gate * If the w flag is set, output the action to be taken and the name of the 46187c478bd9Sstevel@tonic-gate * file. Perform the action if the user response is affirmative. 46197c478bd9Sstevel@tonic-gate */ 46207c478bd9Sstevel@tonic-gate 46217c478bd9Sstevel@tonic-gate static int 46227c478bd9Sstevel@tonic-gate checkw(char c, char *name) 46237c478bd9Sstevel@tonic-gate { 46247c478bd9Sstevel@tonic-gate if (wflag) { 46257c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%c ", c); 46267c478bd9Sstevel@tonic-gate if (vflag) 46277c478bd9Sstevel@tonic-gate longt(&stbuf, ' '); /* do we have acl info here */ 46287c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%s: ", name); 46293d63ea05Sas145665 if (yes() == 1) { 46307c478bd9Sstevel@tonic-gate return (1); 46317c478bd9Sstevel@tonic-gate } 46327c478bd9Sstevel@tonic-gate return (0); 46337c478bd9Sstevel@tonic-gate } 46347c478bd9Sstevel@tonic-gate return (1); 46357c478bd9Sstevel@tonic-gate } 46367c478bd9Sstevel@tonic-gate 46377c478bd9Sstevel@tonic-gate /* 46383a1dab68SRich Burridge * When the F flag is set, exclude RCS and SCCS directories (and any files 46393a1dab68SRich Burridge * or directories under them). If F is set twice, also exclude .o files, 46403a1dab68SRich Burridge * and files names errs, core, and a.out. 46413a1dab68SRich Burridge * 46423a1dab68SRich Burridge * Return 0 if file should be excluded, 1 otherwise. 46437c478bd9Sstevel@tonic-gate */ 46447c478bd9Sstevel@tonic-gate 46457c478bd9Sstevel@tonic-gate static int 46463a1dab68SRich Burridge checkf(char *longname, int is_dir, int howmuch) 46477c478bd9Sstevel@tonic-gate { 46483a1dab68SRich Burridge static char fullname[PATH_MAX + 1]; 46493a1dab68SRich Burridge char *dir, *name; 46507c478bd9Sstevel@tonic-gate 46513a1dab68SRich Burridge #if defined(O_XATTR) 46523a1dab68SRich Burridge /* 46533a1dab68SRich Burridge * If there is an xattr_buf structure associated with this file, 46543a1dab68SRich Burridge * always return 1. 46553a1dab68SRich Burridge */ 46563a1dab68SRich Burridge if (xattrp) { 46577c478bd9Sstevel@tonic-gate return (1); 46587c478bd9Sstevel@tonic-gate } 46593a1dab68SRich Burridge #endif 46603a1dab68SRich Burridge 46613a1dab68SRich Burridge /* 46623a1dab68SRich Burridge * First check to see if the base name is an RCS or SCCS directory. 46633a1dab68SRich Burridge */ 46643a1dab68SRich Burridge if (strlcpy(fullname, longname, sizeof (fullname)) >= sizeof (fullname)) 46657c478bd9Sstevel@tonic-gate return (1); 46663a1dab68SRich Burridge 46673a1dab68SRich Burridge name = basename(fullname); 46683a1dab68SRich Burridge if (is_dir) { 46693a1dab68SRich Burridge if ((strcmp(name, "SCCS") == 0) || (strcmp(name, "RCS") == 0)) 46707c478bd9Sstevel@tonic-gate return (0); 46713a1dab68SRich Burridge } 46723a1dab68SRich Burridge 46733a1dab68SRich Burridge /* 46743a1dab68SRich Burridge * If two -F command line options were given then exclude .o files, 46753a1dab68SRich Burridge * and files named errs, core, and a.out. 46763a1dab68SRich Burridge */ 46773a1dab68SRich Burridge if (howmuch > 1 && !is_dir) { 46783a1dab68SRich Burridge size_t l = strlen(name); 46793a1dab68SRich Burridge 46803a1dab68SRich Burridge if (l >= 3 && name[l - 2] == '.' && name[l - 1] == 'o') 46813a1dab68SRich Burridge return (0); 46827c478bd9Sstevel@tonic-gate if (strcmp(name, "core") == 0 || strcmp(name, "errs") == 0 || 46837c478bd9Sstevel@tonic-gate strcmp(name, "a.out") == 0) 46847c478bd9Sstevel@tonic-gate return (0); 46857c478bd9Sstevel@tonic-gate } 46867c478bd9Sstevel@tonic-gate 46873a1dab68SRich Burridge /* 46883a1dab68SRich Burridge * At this point, check to see if this file has a parent directory 46893a1dab68SRich Burridge * named RCS or SCCS. If so, then this file should be excluded too. 46903a1dab68SRich Burridge * The strcpy() operation is done again, because basename(3C) may 46913a1dab68SRich Burridge * modify the path string passed to it. 46923a1dab68SRich Burridge */ 46933a1dab68SRich Burridge if (strlcpy(fullname, longname, sizeof (fullname)) >= sizeof (fullname)) 46943a1dab68SRich Burridge return (1); 46953a1dab68SRich Burridge 46963a1dab68SRich Burridge dir = dirname(fullname); 46973a1dab68SRich Burridge while (strcmp(dir, ".") != 0) { 46983a1dab68SRich Burridge name = basename(dir); 46993a1dab68SRich Burridge if ((strcmp(name, "SCCS") == 0) || (strcmp(name, "RCS") == 0)) 47003a1dab68SRich Burridge return (0); 47013a1dab68SRich Burridge dir = dirname(dir); 47023a1dab68SRich Burridge } 47033a1dab68SRich Burridge 47047c478bd9Sstevel@tonic-gate return (1); 47057c478bd9Sstevel@tonic-gate } 47067c478bd9Sstevel@tonic-gate 47077c478bd9Sstevel@tonic-gate static int 47087c478bd9Sstevel@tonic-gate response(void) 47097c478bd9Sstevel@tonic-gate { 47107c478bd9Sstevel@tonic-gate int c; 47117c478bd9Sstevel@tonic-gate 47127c478bd9Sstevel@tonic-gate c = getchar(); 47137c478bd9Sstevel@tonic-gate if (c != '\n') 4714eace40a5Sceastha while (getchar() != '\n') 4715eace40a5Sceastha ; 47167c478bd9Sstevel@tonic-gate else c = 'n'; 47177c478bd9Sstevel@tonic-gate return ((c >= 'A' && c <= 'Z') ? c + ('a'-'A') : c); 47187c478bd9Sstevel@tonic-gate } 47197c478bd9Sstevel@tonic-gate 47207c478bd9Sstevel@tonic-gate /* Has file been modified since being put into archive? If so, return > 0. */ 47217c478bd9Sstevel@tonic-gate 4722d67944fbSScott Rotondo static off_t lookup(char *); 4723d67944fbSScott Rotondo 47247c478bd9Sstevel@tonic-gate static int 47257c478bd9Sstevel@tonic-gate checkupdate(char *arg) 47267c478bd9Sstevel@tonic-gate { 47277c478bd9Sstevel@tonic-gate char name[PATH_MAX+1]; 47287c478bd9Sstevel@tonic-gate time_t mtime; 47297c478bd9Sstevel@tonic-gate long nsecs; 47307c478bd9Sstevel@tonic-gate off_t seekp; 47317c478bd9Sstevel@tonic-gate 47327c478bd9Sstevel@tonic-gate rewind(tfile); 47337c478bd9Sstevel@tonic-gate if ((seekp = lookup(arg)) < 0) 47347c478bd9Sstevel@tonic-gate return (1); 47357c478bd9Sstevel@tonic-gate (void) fseek(tfile, seekp, 0); 47367c478bd9Sstevel@tonic-gate (void) fscanf(tfile, "%s %ld.%ld", name, &mtime, &nsecs); 47377c478bd9Sstevel@tonic-gate 47387c478bd9Sstevel@tonic-gate /* 47397c478bd9Sstevel@tonic-gate * Unless nanoseconds were stored in the file, only use seconds for 47407c478bd9Sstevel@tonic-gate * comparison of time. Nanoseconds are stored when -E is specified. 47417c478bd9Sstevel@tonic-gate */ 47427c478bd9Sstevel@tonic-gate if (Eflag == 0) 47437c478bd9Sstevel@tonic-gate return (stbuf.st_mtime > mtime); 47447c478bd9Sstevel@tonic-gate 47457c478bd9Sstevel@tonic-gate if ((stbuf.st_mtime < mtime) || 47467c478bd9Sstevel@tonic-gate ((stbuf.st_mtime == mtime) && (stbuf.st_mtim.tv_nsec <= nsecs))) 47477c478bd9Sstevel@tonic-gate return (0); 47487c478bd9Sstevel@tonic-gate return (1); 47497c478bd9Sstevel@tonic-gate } 47507c478bd9Sstevel@tonic-gate 47517c478bd9Sstevel@tonic-gate 47527c478bd9Sstevel@tonic-gate /* 47537c478bd9Sstevel@tonic-gate * newvol get new floppy (or tape) volume 47547c478bd9Sstevel@tonic-gate * 47557c478bd9Sstevel@tonic-gate * newvol(); resets tapepos and first to TRUE, prompts for 47567c478bd9Sstevel@tonic-gate * for new volume, and waits. 47577c478bd9Sstevel@tonic-gate * if dumping, end-of-file is written onto the tape. 47587c478bd9Sstevel@tonic-gate */ 47597c478bd9Sstevel@tonic-gate 47607c478bd9Sstevel@tonic-gate static void 47617c478bd9Sstevel@tonic-gate newvol(void) 47627c478bd9Sstevel@tonic-gate { 47637c478bd9Sstevel@tonic-gate int c; 47647c478bd9Sstevel@tonic-gate 47657c478bd9Sstevel@tonic-gate if (dumping) { 47667c478bd9Sstevel@tonic-gate #ifdef DEBUG 47677c478bd9Sstevel@tonic-gate DEBUG("newvol called with 'dumping' set\n", 0, 0); 47687c478bd9Sstevel@tonic-gate #endif 47697c478bd9Sstevel@tonic-gate putempty((blkcnt_t)2); /* 2 EOT marks */ 47707c478bd9Sstevel@tonic-gate closevol(); 47717c478bd9Sstevel@tonic-gate flushtape(); 47727c478bd9Sstevel@tonic-gate sync(); 47737c478bd9Sstevel@tonic-gate tapepos = 0; 47747c478bd9Sstevel@tonic-gate } else 47757c478bd9Sstevel@tonic-gate first = TRUE; 47767c478bd9Sstevel@tonic-gate if (close(mt) != 0) 47777c478bd9Sstevel@tonic-gate vperror(2, gettext("close error")); 47787c478bd9Sstevel@tonic-gate mt = 0; 47797c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 47807c478bd9Sstevel@tonic-gate "tar: \007please insert new volume, then press RETURN.")); 47817c478bd9Sstevel@tonic-gate (void) fseek(stdin, (off_t)0, 2); /* scan over read-ahead */ 47827c478bd9Sstevel@tonic-gate while ((c = getchar()) != '\n' && ! term) 47837c478bd9Sstevel@tonic-gate if (c == EOF) 47847c478bd9Sstevel@tonic-gate done(Errflg); 47857c478bd9Sstevel@tonic-gate if (term) 47867c478bd9Sstevel@tonic-gate done(Errflg); 47877c478bd9Sstevel@tonic-gate 47887c478bd9Sstevel@tonic-gate errno = 0; 47897c478bd9Sstevel@tonic-gate 47907c478bd9Sstevel@tonic-gate if (strcmp(usefile, "-") == 0) { 47917c478bd9Sstevel@tonic-gate mt = dup(1); 47927c478bd9Sstevel@tonic-gate } else { 47937c478bd9Sstevel@tonic-gate mt = open(usefile, dumping ? update : 0); 47947c478bd9Sstevel@tonic-gate } 47957c478bd9Sstevel@tonic-gate 47967c478bd9Sstevel@tonic-gate if (mt < 0) { 47977c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 47987c478bd9Sstevel@tonic-gate "tar: cannot reopen %s (%s)\n"), 47997c478bd9Sstevel@tonic-gate dumping ? gettext("output") : gettext("input"), usefile); 48007c478bd9Sstevel@tonic-gate 48018e4a71aeSRich Burridge #ifdef DEBUG 48028e4a71aeSRich Burridge DEBUG("update=%d, usefile=%s ", update, usefile); 48038e4a71aeSRich Burridge DEBUG("mt=%d, [%s]\n", mt, strerror(errno)); 48048e4a71aeSRich Burridge #endif 48057c478bd9Sstevel@tonic-gate 48067c478bd9Sstevel@tonic-gate done(2); 48077c478bd9Sstevel@tonic-gate } 48087c478bd9Sstevel@tonic-gate } 48097c478bd9Sstevel@tonic-gate 48107c478bd9Sstevel@tonic-gate /* 48117c478bd9Sstevel@tonic-gate * Write a trailer portion to close out the current output volume. 48127c478bd9Sstevel@tonic-gate */ 48137c478bd9Sstevel@tonic-gate 48147c478bd9Sstevel@tonic-gate static void 48157c478bd9Sstevel@tonic-gate closevol(void) 48167c478bd9Sstevel@tonic-gate { 48177c478bd9Sstevel@tonic-gate if (mulvol) { 48187c478bd9Sstevel@tonic-gate /* 48197c478bd9Sstevel@tonic-gate * blocklim does not count the 2 EOT marks; 48207c478bd9Sstevel@tonic-gate * tapepos does count the 2 EOT marks; 48217c478bd9Sstevel@tonic-gate * therefore we need the +2 below. 48227c478bd9Sstevel@tonic-gate */ 48237c478bd9Sstevel@tonic-gate putempty(blocklim + (blkcnt_t)2 - tapepos); 48247c478bd9Sstevel@tonic-gate } 48257c478bd9Sstevel@tonic-gate } 48267c478bd9Sstevel@tonic-gate 48277c478bd9Sstevel@tonic-gate static void 48287c478bd9Sstevel@tonic-gate done(int n) 48297c478bd9Sstevel@tonic-gate { 483031732068SRich Burridge /* 483131732068SRich Burridge * If we were terminated in some way, and we would otherwise have 483231732068SRich Burridge * exited with a value of 0, adjust to 1, so that external callers 483331732068SRich Burridge * can determine this by looking at the exit status. 483431732068SRich Burridge */ 483531732068SRich Burridge if (term && n == 0) 483631732068SRich Burridge n = 1; 483731732068SRich Burridge 48388f1d104bSRich Burridge if (tfile != NULL) 48397c478bd9Sstevel@tonic-gate (void) unlink(tname); 484036802407SRich Burridge if (compress_opt != NULL) 484136802407SRich Burridge (void) free(compress_opt); 48427c478bd9Sstevel@tonic-gate if (mt > 0) { 48437c478bd9Sstevel@tonic-gate if ((close(mt) != 0) || (fclose(stdout) != 0)) { 48447c478bd9Sstevel@tonic-gate perror(gettext("tar: close error")); 48457c478bd9Sstevel@tonic-gate exit(2); 48467c478bd9Sstevel@tonic-gate } 48477c478bd9Sstevel@tonic-gate } 48487c478bd9Sstevel@tonic-gate exit(n); 48497c478bd9Sstevel@tonic-gate } 48507c478bd9Sstevel@tonic-gate 48517c478bd9Sstevel@tonic-gate /* 48527c478bd9Sstevel@tonic-gate * Determine if s1 is a prefix portion of s2 (or the same as s2). 48537c478bd9Sstevel@tonic-gate */ 48547c478bd9Sstevel@tonic-gate 48557c478bd9Sstevel@tonic-gate static int 48567c478bd9Sstevel@tonic-gate is_prefix(char *s1, char *s2) 48577c478bd9Sstevel@tonic-gate { 48587c478bd9Sstevel@tonic-gate while (*s1) 48597c478bd9Sstevel@tonic-gate if (*s1++ != *s2++) 48607c478bd9Sstevel@tonic-gate return (0); 48617c478bd9Sstevel@tonic-gate if (*s2) 48627c478bd9Sstevel@tonic-gate return (*s2 == '/'); 48637c478bd9Sstevel@tonic-gate return (1); 48647c478bd9Sstevel@tonic-gate } 48657c478bd9Sstevel@tonic-gate 48667c478bd9Sstevel@tonic-gate /* 48677c478bd9Sstevel@tonic-gate * lookup and bsrch look through tfile entries to find a match for a name. 48687c478bd9Sstevel@tonic-gate * The name can be up to PATH_MAX bytes. bsrch compares what it sees between 48697c478bd9Sstevel@tonic-gate * a pair of newline chars, so the buffer it uses must be long enough for 48707c478bd9Sstevel@tonic-gate * two lines: name and modification time as well as period, newline and space. 48717c478bd9Sstevel@tonic-gate * 48727c478bd9Sstevel@tonic-gate * A kludge was added to bsrch to take care of matching on the first entry 48737c478bd9Sstevel@tonic-gate * in the file--there is no leading newline. So, if we are reading from the 48747c478bd9Sstevel@tonic-gate * start of the file, read into byte two and set the first byte to a newline. 48757c478bd9Sstevel@tonic-gate * Otherwise, the first entry cannot be matched. 48767c478bd9Sstevel@tonic-gate * 48777c478bd9Sstevel@tonic-gate */ 48787c478bd9Sstevel@tonic-gate 48797c478bd9Sstevel@tonic-gate #define N (2 * (PATH_MAX + TIME_MAX_DIGITS + LONG_MAX_DIGITS + 3)) 48807c478bd9Sstevel@tonic-gate static off_t 48817c478bd9Sstevel@tonic-gate lookup(char *s) 48827c478bd9Sstevel@tonic-gate { 48837c478bd9Sstevel@tonic-gate int i; 48847c478bd9Sstevel@tonic-gate off_t a; 48857c478bd9Sstevel@tonic-gate 48867c478bd9Sstevel@tonic-gate for (i = 0; s[i]; i++) 48877c478bd9Sstevel@tonic-gate if (s[i] == ' ') 48887c478bd9Sstevel@tonic-gate break; 48897c478bd9Sstevel@tonic-gate a = bsrch(s, i, low, high); 48907c478bd9Sstevel@tonic-gate return (a); 48917c478bd9Sstevel@tonic-gate } 48927c478bd9Sstevel@tonic-gate 48937c478bd9Sstevel@tonic-gate static off_t 48947c478bd9Sstevel@tonic-gate bsrch(char *s, int n, off_t l, off_t h) 48957c478bd9Sstevel@tonic-gate { 48967c478bd9Sstevel@tonic-gate int i, j; 48977c478bd9Sstevel@tonic-gate char b[N]; 48987c478bd9Sstevel@tonic-gate off_t m, m1; 48997c478bd9Sstevel@tonic-gate 49007c478bd9Sstevel@tonic-gate 49017c478bd9Sstevel@tonic-gate loop: 49027c478bd9Sstevel@tonic-gate if (l >= h) 49037c478bd9Sstevel@tonic-gate return ((off_t)-1); 49047c478bd9Sstevel@tonic-gate m = l + (h-l)/2 - N/2; 49057c478bd9Sstevel@tonic-gate if (m < l) 49067c478bd9Sstevel@tonic-gate m = l; 49077c478bd9Sstevel@tonic-gate (void) fseek(tfile, m, 0); 49087c478bd9Sstevel@tonic-gate if (m == 0) { 49097c478bd9Sstevel@tonic-gate (void) fread(b+1, 1, N-1, tfile); 49107c478bd9Sstevel@tonic-gate b[0] = '\n'; 49117c478bd9Sstevel@tonic-gate m--; 49127c478bd9Sstevel@tonic-gate } else 49137c478bd9Sstevel@tonic-gate (void) fread(b, 1, N, tfile); 49147c478bd9Sstevel@tonic-gate for (i = 0; i < N; i++) { 49157c478bd9Sstevel@tonic-gate if (b[i] == '\n') 49167c478bd9Sstevel@tonic-gate break; 49177c478bd9Sstevel@tonic-gate m++; 49187c478bd9Sstevel@tonic-gate } 49197c478bd9Sstevel@tonic-gate if (m >= h) 49207c478bd9Sstevel@tonic-gate return ((off_t)-1); 49217c478bd9Sstevel@tonic-gate m1 = m; 49227c478bd9Sstevel@tonic-gate j = i; 49237c478bd9Sstevel@tonic-gate for (i++; i < N; i++) { 49247c478bd9Sstevel@tonic-gate m1++; 49257c478bd9Sstevel@tonic-gate if (b[i] == '\n') 49267c478bd9Sstevel@tonic-gate break; 49277c478bd9Sstevel@tonic-gate } 49287c478bd9Sstevel@tonic-gate i = cmp(b+j, s, n); 49297c478bd9Sstevel@tonic-gate if (i < 0) { 49307c478bd9Sstevel@tonic-gate h = m; 49317c478bd9Sstevel@tonic-gate goto loop; 49327c478bd9Sstevel@tonic-gate } 49337c478bd9Sstevel@tonic-gate if (i > 0) { 49347c478bd9Sstevel@tonic-gate l = m1; 49357c478bd9Sstevel@tonic-gate goto loop; 49367c478bd9Sstevel@tonic-gate } 49377c478bd9Sstevel@tonic-gate if (m < 0) 49387c478bd9Sstevel@tonic-gate m = 0; 49397c478bd9Sstevel@tonic-gate return (m); 49407c478bd9Sstevel@tonic-gate } 49417c478bd9Sstevel@tonic-gate 49427c478bd9Sstevel@tonic-gate static int 49437c478bd9Sstevel@tonic-gate cmp(char *b, char *s, int n) 49447c478bd9Sstevel@tonic-gate { 49457c478bd9Sstevel@tonic-gate int i; 49467c478bd9Sstevel@tonic-gate 49477c478bd9Sstevel@tonic-gate assert(b[0] == '\n'); 49487c478bd9Sstevel@tonic-gate 49497c478bd9Sstevel@tonic-gate for (i = 0; i < n; i++) { 49507c478bd9Sstevel@tonic-gate if (b[i+1] > s[i]) 49517c478bd9Sstevel@tonic-gate return (-1); 49527c478bd9Sstevel@tonic-gate if (b[i+1] < s[i]) 49537c478bd9Sstevel@tonic-gate return (1); 49547c478bd9Sstevel@tonic-gate } 49557c478bd9Sstevel@tonic-gate return (b[i+1] == ' '? 0 : -1); 49567c478bd9Sstevel@tonic-gate } 49577c478bd9Sstevel@tonic-gate 49587c478bd9Sstevel@tonic-gate 49597c478bd9Sstevel@tonic-gate /* 49607c478bd9Sstevel@tonic-gate * seekdisk seek to next file on archive 49617c478bd9Sstevel@tonic-gate * 49627c478bd9Sstevel@tonic-gate * called by passtape() only 49637c478bd9Sstevel@tonic-gate * 49647c478bd9Sstevel@tonic-gate * WARNING: expects "nblock" to be set, that is, readtape() to have 49657c478bd9Sstevel@tonic-gate * already been called. Since passtape() is only called 49667c478bd9Sstevel@tonic-gate * after a file header block has been read (why else would 49677c478bd9Sstevel@tonic-gate * we skip to next file?), this is currently safe. 49687c478bd9Sstevel@tonic-gate * 49697c478bd9Sstevel@tonic-gate * changed to guarantee SYS_BLOCK boundary 49707c478bd9Sstevel@tonic-gate */ 49717c478bd9Sstevel@tonic-gate 49727c478bd9Sstevel@tonic-gate static void 49737c478bd9Sstevel@tonic-gate seekdisk(blkcnt_t blocks) 49747c478bd9Sstevel@tonic-gate { 49757c478bd9Sstevel@tonic-gate off_t seekval; 49767c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 49777c478bd9Sstevel@tonic-gate /* handle non-multiple of SYS_BLOCK */ 49787c478bd9Sstevel@tonic-gate blkcnt_t nxb; /* # extra blocks */ 49797c478bd9Sstevel@tonic-gate #endif 49807c478bd9Sstevel@tonic-gate 49817c478bd9Sstevel@tonic-gate tapepos += blocks; 49827c478bd9Sstevel@tonic-gate #ifdef DEBUG 49837c478bd9Sstevel@tonic-gate DEBUG("seekdisk(%" FMT_blkcnt_t ") called\n", blocks, 0); 49847c478bd9Sstevel@tonic-gate #endif 49857c478bd9Sstevel@tonic-gate if (recno + blocks <= nblock) { 49867c478bd9Sstevel@tonic-gate recno += blocks; 49877c478bd9Sstevel@tonic-gate return; 49887c478bd9Sstevel@tonic-gate } 49897c478bd9Sstevel@tonic-gate if (recno > nblock) 49907c478bd9Sstevel@tonic-gate recno = nblock; 49917c478bd9Sstevel@tonic-gate seekval = (off_t)blocks - (nblock - recno); 49927c478bd9Sstevel@tonic-gate recno = nblock; /* so readtape() reads next time through */ 49937c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 49947c478bd9Sstevel@tonic-gate nxb = (blkcnt_t)(seekval % (off_t)(SYS_BLOCK / TBLOCK)); 49957c478bd9Sstevel@tonic-gate #ifdef DEBUG 49967c478bd9Sstevel@tonic-gate DEBUG("xtrablks=%" FMT_blkcnt_t " seekval=%" FMT_blkcnt_t " blks\n", 49977c478bd9Sstevel@tonic-gate nxb, seekval); 49987c478bd9Sstevel@tonic-gate #endif 49997c478bd9Sstevel@tonic-gate if (nxb && nxb > seekval) /* don't seek--we'll read */ 50007c478bd9Sstevel@tonic-gate goto noseek; 50017c478bd9Sstevel@tonic-gate seekval -= nxb; /* don't seek quite so far */ 50027c478bd9Sstevel@tonic-gate #endif 50037c478bd9Sstevel@tonic-gate if (lseek(mt, (off_t)(TBLOCK * seekval), 1) == (off_t)-1) { 50047c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 50057c478bd9Sstevel@tonic-gate "tar: device seek error\n")); 50067c478bd9Sstevel@tonic-gate done(3); 50077c478bd9Sstevel@tonic-gate } 50087c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 50097c478bd9Sstevel@tonic-gate /* read those extra blocks */ 50107c478bd9Sstevel@tonic-gate noseek: 50117c478bd9Sstevel@tonic-gate if (nxb) { 50127c478bd9Sstevel@tonic-gate #ifdef DEBUG 50137c478bd9Sstevel@tonic-gate DEBUG("reading extra blocks\n", 0, 0); 50147c478bd9Sstevel@tonic-gate #endif 50157c478bd9Sstevel@tonic-gate if (read(mt, tbuf, TBLOCK*nblock) < 0) { 50167c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 50177c478bd9Sstevel@tonic-gate "tar: read error while skipping file\n")); 50187c478bd9Sstevel@tonic-gate done(8); 50197c478bd9Sstevel@tonic-gate } 50207c478bd9Sstevel@tonic-gate recno = nxb; /* so we don't read in next readtape() */ 50217c478bd9Sstevel@tonic-gate } 50227c478bd9Sstevel@tonic-gate #endif 50237c478bd9Sstevel@tonic-gate } 50247c478bd9Sstevel@tonic-gate 50257c478bd9Sstevel@tonic-gate static void 50267c478bd9Sstevel@tonic-gate readtape(char *buffer) 50277c478bd9Sstevel@tonic-gate { 50287c478bd9Sstevel@tonic-gate int i, j; 50297c478bd9Sstevel@tonic-gate 50307c478bd9Sstevel@tonic-gate ++tapepos; 50317c478bd9Sstevel@tonic-gate if (recno >= nblock || first) { 50327c478bd9Sstevel@tonic-gate if (first) { 50337c478bd9Sstevel@tonic-gate /* 50347c478bd9Sstevel@tonic-gate * set the number of blocks to read initially, based on 50357c478bd9Sstevel@tonic-gate * the defined defaults for the device, or on the 50367c478bd9Sstevel@tonic-gate * explicit block factor given. 50377c478bd9Sstevel@tonic-gate */ 503853329f75SRich Burridge if (bflag || defaults_used || NotTape) 50397c478bd9Sstevel@tonic-gate j = nblock; 50407c478bd9Sstevel@tonic-gate else 50417c478bd9Sstevel@tonic-gate j = NBLOCK; 50427c478bd9Sstevel@tonic-gate } else 50437c478bd9Sstevel@tonic-gate j = nblock; 50447c478bd9Sstevel@tonic-gate 50457c478bd9Sstevel@tonic-gate if ((i = read(mt, tbuf, TBLOCK*j)) < 0) { 50467c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 50477c478bd9Sstevel@tonic-gate "tar: tape read error\n")); 50487c478bd9Sstevel@tonic-gate done(3); 50497c478bd9Sstevel@tonic-gate /* 5050b35e803cSss161016 * i == 0 and !rflag means that EOF is reached and we are 5051b35e803cSss161016 * trying to update or replace an empty tar file, so exit 5052b35e803cSss161016 * with an error. 5053b35e803cSss161016 * 5054b35e803cSss161016 * If i == 0 and !first and NotTape, it means the pointer 5055b35e803cSss161016 * has gone past the EOF. It could happen if two processes 5056b35e803cSss161016 * try to update the same tar file simultaneously. So exit 5057b35e803cSss161016 * with an error. 50587c478bd9Sstevel@tonic-gate */ 5059b35e803cSss161016 5060b35e803cSss161016 } else if (i == 0) { 5061b35e803cSss161016 if (first && !rflag) { 50627c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 50637c478bd9Sstevel@tonic-gate "tar: blocksize = %d\n"), i); 50647c478bd9Sstevel@tonic-gate done(Errflg); 5065b35e803cSss161016 } else if (!first && (!rflag || NotTape)) { 50667c478bd9Sstevel@tonic-gate mterr("read", 0, 2); 5067b35e803cSss161016 } 50687c478bd9Sstevel@tonic-gate } else if ((!first || Bflag) && i != TBLOCK*j) { 50697c478bd9Sstevel@tonic-gate /* 50707c478bd9Sstevel@tonic-gate * Short read - try to get the remaining bytes. 50717c478bd9Sstevel@tonic-gate */ 50727c478bd9Sstevel@tonic-gate 50737c478bd9Sstevel@tonic-gate int remaining = (TBLOCK * j) - i; 50747c478bd9Sstevel@tonic-gate char *b = (char *)tbuf + i; 50757c478bd9Sstevel@tonic-gate int r; 50767c478bd9Sstevel@tonic-gate 50777c478bd9Sstevel@tonic-gate do { 50787c478bd9Sstevel@tonic-gate if ((r = read(mt, b, remaining)) < 0) { 50797c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 50807c478bd9Sstevel@tonic-gate gettext("tar: tape read error\n")); 50817c478bd9Sstevel@tonic-gate done(3); 50827c478bd9Sstevel@tonic-gate } 50837c478bd9Sstevel@tonic-gate b += r; 50847c478bd9Sstevel@tonic-gate remaining -= r; 50857c478bd9Sstevel@tonic-gate i += r; 50867c478bd9Sstevel@tonic-gate } while (remaining > 0 && r != 0); 50877c478bd9Sstevel@tonic-gate } 50887c478bd9Sstevel@tonic-gate if (first) { 50897c478bd9Sstevel@tonic-gate if ((i % TBLOCK) != 0) { 50907c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 50917c478bd9Sstevel@tonic-gate "tar: tape blocksize error\n")); 50927c478bd9Sstevel@tonic-gate done(3); 50937c478bd9Sstevel@tonic-gate } 50947c478bd9Sstevel@tonic-gate i /= TBLOCK; 50957c478bd9Sstevel@tonic-gate if (vflag && i != nblock && i != 1) { 50967c478bd9Sstevel@tonic-gate if (!NotTape) 50977c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 50987c478bd9Sstevel@tonic-gate "tar: blocksize = %d\n"), i); 50997c478bd9Sstevel@tonic-gate } 51007c478bd9Sstevel@tonic-gate 51017c478bd9Sstevel@tonic-gate /* 51027c478bd9Sstevel@tonic-gate * If we are reading a tape, then a short read is 51037c478bd9Sstevel@tonic-gate * understood to signify that the amount read is 51047c478bd9Sstevel@tonic-gate * the tape's actual blocking factor. We adapt 51057c478bd9Sstevel@tonic-gate * nblock accordingly. There is no reason to do 51067c478bd9Sstevel@tonic-gate * this when the device is not blocked. 51077c478bd9Sstevel@tonic-gate */ 51087c478bd9Sstevel@tonic-gate 51097c478bd9Sstevel@tonic-gate if (!NotTape) 51107c478bd9Sstevel@tonic-gate nblock = i; 51117c478bd9Sstevel@tonic-gate } 51127c478bd9Sstevel@tonic-gate recno = 0; 51137c478bd9Sstevel@tonic-gate } 51147c478bd9Sstevel@tonic-gate 51157c478bd9Sstevel@tonic-gate first = FALSE; 51167c478bd9Sstevel@tonic-gate copy(buffer, &tbuf[recno++]); 51177c478bd9Sstevel@tonic-gate } 51187c478bd9Sstevel@tonic-gate 51197c478bd9Sstevel@tonic-gate 51207c478bd9Sstevel@tonic-gate /* 51217c478bd9Sstevel@tonic-gate * replacement for writetape. 51227c478bd9Sstevel@tonic-gate */ 51237c478bd9Sstevel@tonic-gate 51247c478bd9Sstevel@tonic-gate static int 51257c478bd9Sstevel@tonic-gate writetbuf(char *buffer, int n) 51267c478bd9Sstevel@tonic-gate { 51277c478bd9Sstevel@tonic-gate int i; 51287c478bd9Sstevel@tonic-gate 51297c478bd9Sstevel@tonic-gate tapepos += n; /* output block count */ 51307c478bd9Sstevel@tonic-gate 51317c478bd9Sstevel@tonic-gate if (recno >= nblock) { 51327c478bd9Sstevel@tonic-gate i = write(mt, (char *)tbuf, TBLOCK*nblock); 51337c478bd9Sstevel@tonic-gate if (i != TBLOCK*nblock) 51347c478bd9Sstevel@tonic-gate mterr("write", i, 2); 51357c478bd9Sstevel@tonic-gate recno = 0; 51367c478bd9Sstevel@tonic-gate } 51377c478bd9Sstevel@tonic-gate 51387c478bd9Sstevel@tonic-gate /* 51397c478bd9Sstevel@tonic-gate * Special case: We have an empty tape buffer, and the 51407c478bd9Sstevel@tonic-gate * users data size is >= the tape block size: Avoid 51417c478bd9Sstevel@tonic-gate * the bcopy and dma direct to tape. BIG WIN. Add the 51427c478bd9Sstevel@tonic-gate * residual to the tape buffer. 51437c478bd9Sstevel@tonic-gate */ 51447c478bd9Sstevel@tonic-gate while (recno == 0 && n >= nblock) { 51457c478bd9Sstevel@tonic-gate i = (int)write(mt, buffer, TBLOCK*nblock); 51467c478bd9Sstevel@tonic-gate if (i != TBLOCK*nblock) 51477c478bd9Sstevel@tonic-gate mterr("write", i, 2); 51487c478bd9Sstevel@tonic-gate n -= nblock; 51497c478bd9Sstevel@tonic-gate buffer += (nblock * TBLOCK); 51507c478bd9Sstevel@tonic-gate } 51517c478bd9Sstevel@tonic-gate 51527c478bd9Sstevel@tonic-gate while (n-- > 0) { 51537c478bd9Sstevel@tonic-gate (void) memcpy((char *)&tbuf[recno++], buffer, TBLOCK); 51547c478bd9Sstevel@tonic-gate buffer += TBLOCK; 51557c478bd9Sstevel@tonic-gate if (recno >= nblock) { 51567c478bd9Sstevel@tonic-gate i = (int)write(mt, (char *)tbuf, TBLOCK*nblock); 51577c478bd9Sstevel@tonic-gate if (i != TBLOCK*nblock) 51587c478bd9Sstevel@tonic-gate mterr("write", i, 2); 51597c478bd9Sstevel@tonic-gate recno = 0; 51607c478bd9Sstevel@tonic-gate } 51617c478bd9Sstevel@tonic-gate } 51627c478bd9Sstevel@tonic-gate 51637c478bd9Sstevel@tonic-gate /* Tell the user how much to write to get in sync */ 51647c478bd9Sstevel@tonic-gate return (nblock - recno); 51657c478bd9Sstevel@tonic-gate } 51667c478bd9Sstevel@tonic-gate 51677c478bd9Sstevel@tonic-gate /* 51687c478bd9Sstevel@tonic-gate * backtape - reposition tape after reading soft "EOF" record 51697c478bd9Sstevel@tonic-gate * 51707c478bd9Sstevel@tonic-gate * Backtape tries to reposition the tape back over the EOF 51717c478bd9Sstevel@tonic-gate * record. This is for the 'u' and 'r' function letters so that the 51727c478bd9Sstevel@tonic-gate * tape can be extended. This code is not well designed, but 51737c478bd9Sstevel@tonic-gate * I'm confident that the only callers who care about the 51747c478bd9Sstevel@tonic-gate * backspace-over-EOF feature are those involved in 'u' and 'r'. 51757c478bd9Sstevel@tonic-gate * 51767c478bd9Sstevel@tonic-gate * The proper way to backup the tape is through the use of mtio. 51777c478bd9Sstevel@tonic-gate * Earlier spins used lseek combined with reads in a confusing 51787c478bd9Sstevel@tonic-gate * maneuver that only worked on 4.x, but shouldn't have, even 51797c478bd9Sstevel@tonic-gate * there. Lseeks are explicitly not supported for tape devices. 51807c478bd9Sstevel@tonic-gate */ 51817c478bd9Sstevel@tonic-gate 51827c478bd9Sstevel@tonic-gate static void 51837c478bd9Sstevel@tonic-gate backtape(void) 51847c478bd9Sstevel@tonic-gate { 51857c478bd9Sstevel@tonic-gate struct mtop mtcmd; 51867c478bd9Sstevel@tonic-gate #ifdef DEBUG 51877c478bd9Sstevel@tonic-gate DEBUG("backtape() called, recno=%" FMT_blkcnt_t " nblock=%d\n", recno, 51887c478bd9Sstevel@tonic-gate nblock); 51897c478bd9Sstevel@tonic-gate #endif 51907c478bd9Sstevel@tonic-gate /* 51917c478bd9Sstevel@tonic-gate * Backup to the position in the archive where the record 51927c478bd9Sstevel@tonic-gate * currently sitting in the tbuf buffer is situated. 51937c478bd9Sstevel@tonic-gate */ 51947c478bd9Sstevel@tonic-gate 51957c478bd9Sstevel@tonic-gate if (NotTape) { 51967c478bd9Sstevel@tonic-gate /* 51977c478bd9Sstevel@tonic-gate * For non-tape devices, this means lseeking to the 51987c478bd9Sstevel@tonic-gate * correct position. The absolute location tapepos-recno 51997c478bd9Sstevel@tonic-gate * should be the beginning of the current record. 52007c478bd9Sstevel@tonic-gate */ 52017c478bd9Sstevel@tonic-gate 52027c478bd9Sstevel@tonic-gate if (lseek(mt, (off_t)(TBLOCK*(tapepos-recno)), SEEK_SET) == 52037c478bd9Sstevel@tonic-gate (off_t)-1) { 52047c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 52057c478bd9Sstevel@tonic-gate gettext("tar: lseek to end of archive failed\n")); 52067c478bd9Sstevel@tonic-gate done(4); 52077c478bd9Sstevel@tonic-gate } 52087c478bd9Sstevel@tonic-gate } else { 52097c478bd9Sstevel@tonic-gate /* 52107c478bd9Sstevel@tonic-gate * For tape devices, we backup over the most recently 52117c478bd9Sstevel@tonic-gate * read record. 52127c478bd9Sstevel@tonic-gate */ 52137c478bd9Sstevel@tonic-gate 52147c478bd9Sstevel@tonic-gate mtcmd.mt_op = MTBSR; 52157c478bd9Sstevel@tonic-gate mtcmd.mt_count = 1; 52167c478bd9Sstevel@tonic-gate 52177c478bd9Sstevel@tonic-gate if (ioctl(mt, MTIOCTOP, &mtcmd) < 0) { 52187c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 52197c478bd9Sstevel@tonic-gate gettext("tar: backspace over record failed\n")); 52207c478bd9Sstevel@tonic-gate done(4); 52217c478bd9Sstevel@tonic-gate } 52227c478bd9Sstevel@tonic-gate } 52237c478bd9Sstevel@tonic-gate 52247c478bd9Sstevel@tonic-gate /* 52257c478bd9Sstevel@tonic-gate * Decrement the tape and tbuf buffer indices to prepare for the 52267c478bd9Sstevel@tonic-gate * coming write to overwrite the soft EOF record. 52277c478bd9Sstevel@tonic-gate */ 52287c478bd9Sstevel@tonic-gate 52297c478bd9Sstevel@tonic-gate recno--; 52307c478bd9Sstevel@tonic-gate tapepos--; 52317c478bd9Sstevel@tonic-gate } 52327c478bd9Sstevel@tonic-gate 52337c478bd9Sstevel@tonic-gate 52347c478bd9Sstevel@tonic-gate /* 52357c478bd9Sstevel@tonic-gate * flushtape write buffered block(s) onto tape 52367c478bd9Sstevel@tonic-gate * 52377c478bd9Sstevel@tonic-gate * recno points to next free block in tbuf. If nonzero, a write is done. 52387c478bd9Sstevel@tonic-gate * Care is taken to write in multiples of SYS_BLOCK when device is 52397c478bd9Sstevel@tonic-gate * non-magtape in case raw i/o is used. 52407c478bd9Sstevel@tonic-gate * 52417c478bd9Sstevel@tonic-gate * NOTE: this is called by writetape() to do the actual writing 52427c478bd9Sstevel@tonic-gate */ 52437c478bd9Sstevel@tonic-gate 52447c478bd9Sstevel@tonic-gate static void 52457c478bd9Sstevel@tonic-gate flushtape(void) 52467c478bd9Sstevel@tonic-gate { 52477c478bd9Sstevel@tonic-gate #ifdef DEBUG 52487c478bd9Sstevel@tonic-gate DEBUG("flushtape() called, recno=%" FMT_blkcnt_t "\n", recno, 0); 52497c478bd9Sstevel@tonic-gate #endif 52507c478bd9Sstevel@tonic-gate if (recno > 0) { /* anything buffered? */ 52517c478bd9Sstevel@tonic-gate if (NotTape) { 52527c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 52537c478bd9Sstevel@tonic-gate int i; 52547c478bd9Sstevel@tonic-gate 52557c478bd9Sstevel@tonic-gate /* 52567c478bd9Sstevel@tonic-gate * an odd-block write can only happen when 52577c478bd9Sstevel@tonic-gate * we are at the end of a volume that is not a tape. 52587c478bd9Sstevel@tonic-gate * Here we round recno up to an even SYS_BLOCK 52597c478bd9Sstevel@tonic-gate * boundary. 52607c478bd9Sstevel@tonic-gate */ 52617c478bd9Sstevel@tonic-gate if ((i = recno % (SYS_BLOCK / TBLOCK)) != 0) { 52627c478bd9Sstevel@tonic-gate #ifdef DEBUG 52637c478bd9Sstevel@tonic-gate DEBUG("flushtape() %d rounding blocks\n", i, 0); 52647c478bd9Sstevel@tonic-gate #endif 52657c478bd9Sstevel@tonic-gate recno += i; /* round up to even SYS_BLOCK */ 52667c478bd9Sstevel@tonic-gate } 52677c478bd9Sstevel@tonic-gate #endif 52687c478bd9Sstevel@tonic-gate if (recno > nblock) 52697c478bd9Sstevel@tonic-gate recno = nblock; 52707c478bd9Sstevel@tonic-gate } 52717c478bd9Sstevel@tonic-gate #ifdef DEBUG 52727c478bd9Sstevel@tonic-gate DEBUG("writing out %" FMT_blkcnt_t " blocks of %" FMT_blkcnt_t 52737c478bd9Sstevel@tonic-gate " bytes\n", (blkcnt_t)(NotTape ? recno : nblock), 52747c478bd9Sstevel@tonic-gate (blkcnt_t)(NotTape ? recno : nblock) * TBLOCK); 52757c478bd9Sstevel@tonic-gate #endif 52767c478bd9Sstevel@tonic-gate if (write(mt, tbuf, 52777c478bd9Sstevel@tonic-gate (size_t)(NotTape ? recno : nblock) * TBLOCK) < 0) { 52787c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 52797c478bd9Sstevel@tonic-gate "tar: tape write error\n")); 52807c478bd9Sstevel@tonic-gate done(2); 52817c478bd9Sstevel@tonic-gate } 52827c478bd9Sstevel@tonic-gate recno = 0; 52837c478bd9Sstevel@tonic-gate } 52847c478bd9Sstevel@tonic-gate } 52857c478bd9Sstevel@tonic-gate 52867c478bd9Sstevel@tonic-gate static void 52877c478bd9Sstevel@tonic-gate copy(void *dst, void *src) 52887c478bd9Sstevel@tonic-gate { 52897c478bd9Sstevel@tonic-gate (void) memcpy(dst, src, TBLOCK); 52907c478bd9Sstevel@tonic-gate } 52917c478bd9Sstevel@tonic-gate 52927c478bd9Sstevel@tonic-gate /* 52937c478bd9Sstevel@tonic-gate * kcheck() 52947c478bd9Sstevel@tonic-gate * - checks the validity of size values for non-tape devices 52957c478bd9Sstevel@tonic-gate * - if size is zero, mulvol tar is disabled and size is 52967c478bd9Sstevel@tonic-gate * assumed to be infinite. 52977c478bd9Sstevel@tonic-gate * - returns volume size in TBLOCKS 52987c478bd9Sstevel@tonic-gate */ 52997c478bd9Sstevel@tonic-gate 53007c478bd9Sstevel@tonic-gate static blkcnt_t 53017c478bd9Sstevel@tonic-gate kcheck(char *kstr) 53027c478bd9Sstevel@tonic-gate { 53037c478bd9Sstevel@tonic-gate blkcnt_t kval; 53047c478bd9Sstevel@tonic-gate 53057c478bd9Sstevel@tonic-gate kval = strtoll(kstr, NULL, 0); 53067c478bd9Sstevel@tonic-gate if (kval == (blkcnt_t)0) { /* no multi-volume; size is infinity. */ 53077c478bd9Sstevel@tonic-gate mulvol = 0; /* definitely not mulvol, but we must */ 53087c478bd9Sstevel@tonic-gate return (0); /* took out setting of NotTape */ 53097c478bd9Sstevel@tonic-gate } 53107c478bd9Sstevel@tonic-gate if (kval < (blkcnt_t)MINSIZE) { 53117c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53127c478bd9Sstevel@tonic-gate "tar: sizes below %luK not supported (%" FMT_blkcnt_t 53137c478bd9Sstevel@tonic-gate ").\n"), (ulong_t)MINSIZE, kval); 53147c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53157c478bd9Sstevel@tonic-gate "bad size entry for %s in %s.\n"), 53167c478bd9Sstevel@tonic-gate archive, DEF_FILE); 53177c478bd9Sstevel@tonic-gate done(1); 53187c478bd9Sstevel@tonic-gate } 53197c478bd9Sstevel@tonic-gate mulvol++; 53207c478bd9Sstevel@tonic-gate NotTape++; /* implies non-tape */ 53217c478bd9Sstevel@tonic-gate return (kval * 1024 / TBLOCK); /* convert to TBLOCKS */ 53227c478bd9Sstevel@tonic-gate } 53237c478bd9Sstevel@tonic-gate 53247c478bd9Sstevel@tonic-gate 53257c478bd9Sstevel@tonic-gate /* 53267c478bd9Sstevel@tonic-gate * bcheck() 53277c478bd9Sstevel@tonic-gate * - checks the validity of blocking factors 53287c478bd9Sstevel@tonic-gate * - returns blocking factor 53297c478bd9Sstevel@tonic-gate */ 53307c478bd9Sstevel@tonic-gate 53317c478bd9Sstevel@tonic-gate static int 53327c478bd9Sstevel@tonic-gate bcheck(char *bstr) 53337c478bd9Sstevel@tonic-gate { 53347c478bd9Sstevel@tonic-gate blkcnt_t bval; 53357c478bd9Sstevel@tonic-gate 53367c478bd9Sstevel@tonic-gate bval = strtoll(bstr, NULL, 0); 53377c478bd9Sstevel@tonic-gate if ((bval <= 0) || (bval > INT_MAX / TBLOCK)) { 53387c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53397c478bd9Sstevel@tonic-gate "tar: invalid blocksize \"%s\".\n"), bstr); 53407c478bd9Sstevel@tonic-gate if (!bflag) 53417c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53427c478bd9Sstevel@tonic-gate "bad blocksize entry for '%s' in %s.\n"), 53437c478bd9Sstevel@tonic-gate archive, DEF_FILE); 53447c478bd9Sstevel@tonic-gate done(1); 53457c478bd9Sstevel@tonic-gate } 53467c478bd9Sstevel@tonic-gate 53477c478bd9Sstevel@tonic-gate return ((int)bval); 53487c478bd9Sstevel@tonic-gate } 53497c478bd9Sstevel@tonic-gate 53507c478bd9Sstevel@tonic-gate 53517c478bd9Sstevel@tonic-gate /* 53527c478bd9Sstevel@tonic-gate * defset() 53537c478bd9Sstevel@tonic-gate * - reads DEF_FILE for the set of default values specified. 53547c478bd9Sstevel@tonic-gate * - initializes 'usefile', 'nblock', and 'blocklim', and 'NotTape'. 53557c478bd9Sstevel@tonic-gate * - 'usefile' points to static data, so will be overwritten 53567c478bd9Sstevel@tonic-gate * if this routine is called a second time. 53577c478bd9Sstevel@tonic-gate * - the pattern specified by 'arch' must be followed by four 53587c478bd9Sstevel@tonic-gate * blank-separated fields (1) device (2) blocking, 53597c478bd9Sstevel@tonic-gate * (3) size(K), and (4) tape 53607c478bd9Sstevel@tonic-gate * for example: archive0=/dev/fd 1 400 n 53617c478bd9Sstevel@tonic-gate */ 53627c478bd9Sstevel@tonic-gate 53637c478bd9Sstevel@tonic-gate static int 53647c478bd9Sstevel@tonic-gate defset(char *arch) 53657c478bd9Sstevel@tonic-gate { 53667c478bd9Sstevel@tonic-gate char *bp; 53677c478bd9Sstevel@tonic-gate 53687c478bd9Sstevel@tonic-gate if (defopen(DEF_FILE) != 0) 53697c478bd9Sstevel@tonic-gate return (FALSE); 53707c478bd9Sstevel@tonic-gate if (defcntl(DC_SETFLAGS, (DC_STD & ~(DC_CASE))) == -1) { 53717c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53727c478bd9Sstevel@tonic-gate "tar: error setting parameters for %s.\n"), DEF_FILE); 53737c478bd9Sstevel@tonic-gate return (FALSE); /* & following ones too */ 53747c478bd9Sstevel@tonic-gate } 53757c478bd9Sstevel@tonic-gate if ((bp = defread(arch)) == NULL) { 53767c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53777c478bd9Sstevel@tonic-gate "tar: missing or invalid '%s' entry in %s.\n"), 53787c478bd9Sstevel@tonic-gate arch, DEF_FILE); 53797c478bd9Sstevel@tonic-gate return (FALSE); 53807c478bd9Sstevel@tonic-gate } 53817c478bd9Sstevel@tonic-gate if ((usefile = strtok(bp, " \t")) == NULL) { 53827c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53837c478bd9Sstevel@tonic-gate "tar: '%s' entry in %s is empty!\n"), arch, DEF_FILE); 53847c478bd9Sstevel@tonic-gate return (FALSE); 53857c478bd9Sstevel@tonic-gate } 53867c478bd9Sstevel@tonic-gate if ((bp = strtok(NULL, " \t")) == NULL) { 53877c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53887c478bd9Sstevel@tonic-gate "tar: block component missing in '%s' entry in %s.\n"), 53897c478bd9Sstevel@tonic-gate arch, DEF_FILE); 53907c478bd9Sstevel@tonic-gate return (FALSE); 53917c478bd9Sstevel@tonic-gate } 53927c478bd9Sstevel@tonic-gate nblock = bcheck(bp); 53937c478bd9Sstevel@tonic-gate if ((bp = strtok(NULL, " \t")) == NULL) { 53947c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53957c478bd9Sstevel@tonic-gate "tar: size component missing in '%s' entry in %s.\n"), 53967c478bd9Sstevel@tonic-gate arch, DEF_FILE); 53977c478bd9Sstevel@tonic-gate return (FALSE); 53987c478bd9Sstevel@tonic-gate } 53997c478bd9Sstevel@tonic-gate blocklim = kcheck(bp); 54007c478bd9Sstevel@tonic-gate if ((bp = strtok(NULL, " \t")) != NULL) 54017c478bd9Sstevel@tonic-gate NotTape = (*bp == 'n' || *bp == 'N'); 54027c478bd9Sstevel@tonic-gate else 54037c478bd9Sstevel@tonic-gate NotTape = (blocklim != 0); 54047c478bd9Sstevel@tonic-gate (void) defopen(NULL); 54057c478bd9Sstevel@tonic-gate #ifdef DEBUG 54067c478bd9Sstevel@tonic-gate DEBUG("defset: archive='%s'; usefile='%s'\n", arch, usefile); 54077c478bd9Sstevel@tonic-gate DEBUG("defset: nblock='%d'; blocklim='%" FMT_blkcnt_t "'\n", 54087c478bd9Sstevel@tonic-gate nblock, blocklim); 54097c478bd9Sstevel@tonic-gate DEBUG("defset: not tape = %d\n", NotTape, 0); 54107c478bd9Sstevel@tonic-gate #endif 54117c478bd9Sstevel@tonic-gate return (TRUE); 54127c478bd9Sstevel@tonic-gate } 54137c478bd9Sstevel@tonic-gate 54147c478bd9Sstevel@tonic-gate 54157c478bd9Sstevel@tonic-gate /* 54167c478bd9Sstevel@tonic-gate * Following code handles excluded and included files. 54177c478bd9Sstevel@tonic-gate * A hash table of file names to be {in,ex}cluded is built. 54187c478bd9Sstevel@tonic-gate * For excluded files, before writing or extracting a file 54197c478bd9Sstevel@tonic-gate * check to see if it is in the exclude_tbl. 54207c478bd9Sstevel@tonic-gate * For included files, the wantit() procedure will check to 54217c478bd9Sstevel@tonic-gate * see if the named file is in the include_tbl. 54227c478bd9Sstevel@tonic-gate */ 54237c478bd9Sstevel@tonic-gate 54247c478bd9Sstevel@tonic-gate static void 54255e2174acSceastha build_table(file_list_t *table[], char *file) 54267c478bd9Sstevel@tonic-gate { 54277c478bd9Sstevel@tonic-gate FILE *fp; 54287c478bd9Sstevel@tonic-gate char buf[PATH_MAX + 1]; 54297c478bd9Sstevel@tonic-gate 54307c478bd9Sstevel@tonic-gate if ((fp = fopen(file, "r")) == (FILE *)NULL) 54317c478bd9Sstevel@tonic-gate vperror(1, gettext("could not open %s"), file); 54327c478bd9Sstevel@tonic-gate while (fgets(buf, sizeof (buf), fp) != NULL) { 54337c478bd9Sstevel@tonic-gate if (buf[strlen(buf) - 1] == '\n') 54347c478bd9Sstevel@tonic-gate buf[strlen(buf) - 1] = '\0'; 54357c478bd9Sstevel@tonic-gate /* Only add to table if line has something in it */ 54367c478bd9Sstevel@tonic-gate if (strspn(buf, " \t") != strlen(buf)) 54377c478bd9Sstevel@tonic-gate add_file_to_table(table, buf); 54387c478bd9Sstevel@tonic-gate } 54397c478bd9Sstevel@tonic-gate (void) fclose(fp); 54407c478bd9Sstevel@tonic-gate } 54417c478bd9Sstevel@tonic-gate 54427c478bd9Sstevel@tonic-gate 54437c478bd9Sstevel@tonic-gate /* 54447c478bd9Sstevel@tonic-gate * Add a file name to the the specified table, if the file name has any 54457c478bd9Sstevel@tonic-gate * trailing '/'s then delete them before inserting into the table 54467c478bd9Sstevel@tonic-gate */ 54477c478bd9Sstevel@tonic-gate 54487c478bd9Sstevel@tonic-gate static void 54495e2174acSceastha add_file_to_table(file_list_t *table[], char *str) 54507c478bd9Sstevel@tonic-gate { 54517c478bd9Sstevel@tonic-gate char name[PATH_MAX + 1]; 54527c478bd9Sstevel@tonic-gate unsigned int h; 54535e2174acSceastha file_list_t *exp; 54547c478bd9Sstevel@tonic-gate 54557c478bd9Sstevel@tonic-gate (void) strcpy(name, str); 54567c478bd9Sstevel@tonic-gate while (name[strlen(name) - 1] == '/') { 54577c478bd9Sstevel@tonic-gate name[strlen(name) - 1] = NULL; 54587c478bd9Sstevel@tonic-gate } 54597c478bd9Sstevel@tonic-gate 54607c478bd9Sstevel@tonic-gate h = hash(name); 54615e2174acSceastha if ((exp = (file_list_t *)calloc(sizeof (file_list_t), 54627c478bd9Sstevel@tonic-gate sizeof (char))) == NULL) { 54637c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 54647c478bd9Sstevel@tonic-gate "tar: out of memory, exclude/include table(entry)\n")); 54657c478bd9Sstevel@tonic-gate exit(1); 54667c478bd9Sstevel@tonic-gate } 54677c478bd9Sstevel@tonic-gate 54687c478bd9Sstevel@tonic-gate if ((exp->name = strdup(name)) == NULL) { 54697c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 54707c478bd9Sstevel@tonic-gate "tar: out of memory, exclude/include table(file name)\n")); 54717c478bd9Sstevel@tonic-gate exit(1); 54727c478bd9Sstevel@tonic-gate } 54737c478bd9Sstevel@tonic-gate 54747c478bd9Sstevel@tonic-gate exp->next = table[h]; 54757c478bd9Sstevel@tonic-gate table[h] = exp; 54767c478bd9Sstevel@tonic-gate } 54777c478bd9Sstevel@tonic-gate 54787c478bd9Sstevel@tonic-gate 54797c478bd9Sstevel@tonic-gate /* 54807c478bd9Sstevel@tonic-gate * See if a file name or any of the file's parent directories is in the 54817c478bd9Sstevel@tonic-gate * specified table, if the file name has any trailing '/'s then delete 54827c478bd9Sstevel@tonic-gate * them before searching the table 54837c478bd9Sstevel@tonic-gate */ 54847c478bd9Sstevel@tonic-gate 54857c478bd9Sstevel@tonic-gate static int 54865e2174acSceastha is_in_table(file_list_t *table[], char *str) 54877c478bd9Sstevel@tonic-gate { 54887c478bd9Sstevel@tonic-gate char name[PATH_MAX + 1]; 54897c478bd9Sstevel@tonic-gate unsigned int h; 54905e2174acSceastha file_list_t *exp; 54917c478bd9Sstevel@tonic-gate char *ptr; 54927c478bd9Sstevel@tonic-gate 54937c478bd9Sstevel@tonic-gate (void) strcpy(name, str); 54947c478bd9Sstevel@tonic-gate while (name[strlen(name) - 1] == '/') { 54957c478bd9Sstevel@tonic-gate name[strlen(name) - 1] = NULL; 54967c478bd9Sstevel@tonic-gate } 54977c478bd9Sstevel@tonic-gate 54987c478bd9Sstevel@tonic-gate /* 54997c478bd9Sstevel@tonic-gate * check for the file name in the passed list 55007c478bd9Sstevel@tonic-gate */ 55017c478bd9Sstevel@tonic-gate h = hash(name); 55027c478bd9Sstevel@tonic-gate exp = table[h]; 55037c478bd9Sstevel@tonic-gate while (exp != NULL) { 55047c478bd9Sstevel@tonic-gate if (strcmp(name, exp->name) == 0) { 55057c478bd9Sstevel@tonic-gate return (1); 55067c478bd9Sstevel@tonic-gate } 55077c478bd9Sstevel@tonic-gate exp = exp->next; 55087c478bd9Sstevel@tonic-gate } 55097c478bd9Sstevel@tonic-gate 55107c478bd9Sstevel@tonic-gate /* 55117c478bd9Sstevel@tonic-gate * check for any parent directories in the file list 55127c478bd9Sstevel@tonic-gate */ 55137c478bd9Sstevel@tonic-gate while ((ptr = strrchr(name, '/'))) { 55147c478bd9Sstevel@tonic-gate *ptr = NULL; 55157c478bd9Sstevel@tonic-gate h = hash(name); 55167c478bd9Sstevel@tonic-gate exp = table[h]; 55177c478bd9Sstevel@tonic-gate while (exp != NULL) { 55187c478bd9Sstevel@tonic-gate if (strcmp(name, exp->name) == 0) { 55197c478bd9Sstevel@tonic-gate return (1); 55207c478bd9Sstevel@tonic-gate } 55217c478bd9Sstevel@tonic-gate exp = exp->next; 55227c478bd9Sstevel@tonic-gate } 55237c478bd9Sstevel@tonic-gate } 55247c478bd9Sstevel@tonic-gate 55257c478bd9Sstevel@tonic-gate return (0); 55267c478bd9Sstevel@tonic-gate } 55277c478bd9Sstevel@tonic-gate 55287c478bd9Sstevel@tonic-gate 55297c478bd9Sstevel@tonic-gate /* 55307c478bd9Sstevel@tonic-gate * Compute a hash from a string. 55317c478bd9Sstevel@tonic-gate */ 55327c478bd9Sstevel@tonic-gate 55337c478bd9Sstevel@tonic-gate static unsigned int 55347c478bd9Sstevel@tonic-gate hash(char *str) 55357c478bd9Sstevel@tonic-gate { 55367c478bd9Sstevel@tonic-gate char *cp; 55377c478bd9Sstevel@tonic-gate unsigned int h; 55387c478bd9Sstevel@tonic-gate 55397c478bd9Sstevel@tonic-gate h = 0; 55407c478bd9Sstevel@tonic-gate for (cp = str; *cp; cp++) { 55417c478bd9Sstevel@tonic-gate h += *cp; 55427c478bd9Sstevel@tonic-gate } 55437c478bd9Sstevel@tonic-gate return (h % TABLE_SIZE); 55447c478bd9Sstevel@tonic-gate } 55457c478bd9Sstevel@tonic-gate 55467c478bd9Sstevel@tonic-gate static void * 55477c478bd9Sstevel@tonic-gate getmem(size_t size) 55487c478bd9Sstevel@tonic-gate { 55497c478bd9Sstevel@tonic-gate void *p = calloc((unsigned)size, sizeof (char)); 55507c478bd9Sstevel@tonic-gate 55517c478bd9Sstevel@tonic-gate if (p == NULL && freemem) { 55527c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 55537c478bd9Sstevel@tonic-gate "tar: out of memory, link and directory modtime " 55547c478bd9Sstevel@tonic-gate "info lost\n")); 55557c478bd9Sstevel@tonic-gate freemem = 0; 55567c478bd9Sstevel@tonic-gate if (errflag) 55577c478bd9Sstevel@tonic-gate done(1); 55587c478bd9Sstevel@tonic-gate else 55597c478bd9Sstevel@tonic-gate Errflg = 1; 55607c478bd9Sstevel@tonic-gate } 55617c478bd9Sstevel@tonic-gate return (p); 55627c478bd9Sstevel@tonic-gate } 55637c478bd9Sstevel@tonic-gate 55647c478bd9Sstevel@tonic-gate /* 55657c478bd9Sstevel@tonic-gate * vperror() --variable argument perror. 55667c478bd9Sstevel@tonic-gate * Takes 3 args: exit_status, formats, args. If exit_status is 0, then 55677c478bd9Sstevel@tonic-gate * the errflag (exit on error) is checked -- if it is non-zero, tar exits 55687c478bd9Sstevel@tonic-gate * with the value of whatever "errno" is set to. If exit_status is not 55697c478bd9Sstevel@tonic-gate * zero, then tar exits with that error status. If errflag and exit_status 55707c478bd9Sstevel@tonic-gate * are both zero, the routine returns to where it was called and sets Errflg 55717c478bd9Sstevel@tonic-gate * to errno. 55727c478bd9Sstevel@tonic-gate */ 55737c478bd9Sstevel@tonic-gate 55747c478bd9Sstevel@tonic-gate static void 55757c478bd9Sstevel@tonic-gate vperror(int exit_status, char *fmt, ...) 55767c478bd9Sstevel@tonic-gate { 55777c478bd9Sstevel@tonic-gate va_list ap; 55787c478bd9Sstevel@tonic-gate 55797c478bd9Sstevel@tonic-gate va_start(ap, fmt); 55807c478bd9Sstevel@tonic-gate (void) fputs("tar: ", stderr); 55817c478bd9Sstevel@tonic-gate (void) vfprintf(stderr, fmt, ap); 55827c478bd9Sstevel@tonic-gate (void) fprintf(stderr, ": %s\n", strerror(errno)); 55837c478bd9Sstevel@tonic-gate va_end(ap); 55847c478bd9Sstevel@tonic-gate if (exit_status) 55857c478bd9Sstevel@tonic-gate done(exit_status); 55867c478bd9Sstevel@tonic-gate else 55877c478bd9Sstevel@tonic-gate if (errflag) 55887c478bd9Sstevel@tonic-gate done(errno); 55897c478bd9Sstevel@tonic-gate else 55907c478bd9Sstevel@tonic-gate Errflg = errno; 55917c478bd9Sstevel@tonic-gate } 55927c478bd9Sstevel@tonic-gate 55937c478bd9Sstevel@tonic-gate 55947c478bd9Sstevel@tonic-gate static void 55957c478bd9Sstevel@tonic-gate fatal(char *format, ...) 55967c478bd9Sstevel@tonic-gate { 55977c478bd9Sstevel@tonic-gate va_list ap; 55987c478bd9Sstevel@tonic-gate 55997c478bd9Sstevel@tonic-gate va_start(ap, format); 56007c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "tar: "); 56017c478bd9Sstevel@tonic-gate (void) vfprintf(stderr, format, ap); 56027c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n"); 56037c478bd9Sstevel@tonic-gate va_end(ap); 56047c478bd9Sstevel@tonic-gate done(1); 56057c478bd9Sstevel@tonic-gate } 56067c478bd9Sstevel@tonic-gate 56077c478bd9Sstevel@tonic-gate 56087c478bd9Sstevel@tonic-gate /* 56097c478bd9Sstevel@tonic-gate * Check to make sure that argument is a char * ptr. 56107c478bd9Sstevel@tonic-gate * Actually, we just check to see that it is non-null. 56117c478bd9Sstevel@tonic-gate * If it is null, print out the message and call usage(), bailing out. 56127c478bd9Sstevel@tonic-gate */ 56137c478bd9Sstevel@tonic-gate 56147c478bd9Sstevel@tonic-gate static void 56157c478bd9Sstevel@tonic-gate assert_string(char *s, char *msg) 56167c478bd9Sstevel@tonic-gate { 56177c478bd9Sstevel@tonic-gate if (s == NULL) { 56187c478bd9Sstevel@tonic-gate (void) fprintf(stderr, msg); 56197c478bd9Sstevel@tonic-gate usage(); 56207c478bd9Sstevel@tonic-gate } 56217c478bd9Sstevel@tonic-gate } 56227c478bd9Sstevel@tonic-gate 56237c478bd9Sstevel@tonic-gate 56247c478bd9Sstevel@tonic-gate static void 56257c478bd9Sstevel@tonic-gate mterr(char *operation, int i, int exitcode) 56267c478bd9Sstevel@tonic-gate { 56277c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 56287c478bd9Sstevel@tonic-gate "tar: %s error: "), operation); 56297c478bd9Sstevel@tonic-gate if (i < 0) 56307c478bd9Sstevel@tonic-gate perror(""); 56317c478bd9Sstevel@tonic-gate else 56327c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("unexpected EOF\n")); 56337c478bd9Sstevel@tonic-gate done(exitcode); 56347c478bd9Sstevel@tonic-gate } 56357c478bd9Sstevel@tonic-gate 56367c478bd9Sstevel@tonic-gate static int 5637da6c28aaSamw wantit(char *argv[], char **namep, char **dirp, char **component, 5638da6c28aaSamw attr_data_t **attrinfo) 56397c478bd9Sstevel@tonic-gate { 56407c478bd9Sstevel@tonic-gate char **cp; 56417c478bd9Sstevel@tonic-gate int gotit; /* true if we've found a match */ 5642123523f8Sas158974 int ret; 56437c478bd9Sstevel@tonic-gate 56447c478bd9Sstevel@tonic-gate top: 5645123523f8Sas158974 if (xhdr_flgs & _X_XHDR) { 56467c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 5647123523f8Sas158974 } 56487c478bd9Sstevel@tonic-gate getdir(); 56497c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) { 5650123523f8Sas158974 ret = get_xdata(); 5651123523f8Sas158974 if (ret != 0) { /* Xhdr items and regular header */ 5652123523f8Sas158974 setbytes_to_skip(&stbuf, ret); 56537c478bd9Sstevel@tonic-gate passtape(); 56547c478bd9Sstevel@tonic-gate return (0); /* Error--don't want to extract */ 56557c478bd9Sstevel@tonic-gate } 56567c478bd9Sstevel@tonic-gate } 56577c478bd9Sstevel@tonic-gate 5658123523f8Sas158974 /* 5659123523f8Sas158974 * If typeflag is not 'A' and xhdr_flgs is set, then processing 5660123523f8Sas158974 * of ancillary file is either over or ancillary file 5661123523f8Sas158974 * processing is not required, load info from Xtarhdr and set 5662123523f8Sas158974 * _X_XHDR bit in xhdr_flgs. 5663123523f8Sas158974 */ 5664123523f8Sas158974 if ((dblock.dbuf.typeflag != 'A') && (xhdr_flgs != 0)) { 5665123523f8Sas158974 load_info_from_xtarhdr(xhdr_flgs, &Xtarhdr); 5666123523f8Sas158974 xhdr_flgs |= _X_XHDR; 5667123523f8Sas158974 } 5668123523f8Sas158974 56697c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 56707c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == _XATTR_HDRTYPE && xattrbadhead == 0) { 5671da6c28aaSamw /* 5672da6c28aaSamw * Always needs to read the extended header. If atflag, saflag, 5673da6c28aaSamw * or tflag isn't set, then we'll have the correct info for 5674da6c28aaSamw * passtape() later. 5675da6c28aaSamw */ 5676da6c28aaSamw (void) read_xattr_hdr(attrinfo); 56777c478bd9Sstevel@tonic-gate goto top; 56787c478bd9Sstevel@tonic-gate } 5679da6c28aaSamw /* 5680ced83f9bSceastha * Now that we've read the extended header, call passtape() 5681ced83f9bSceastha * if we don't want to restore attributes or system attributes. 5682ced83f9bSceastha * Don't restore the attribute if we are extracting 5683ced83f9bSceastha * a file from an archive (as opposed to doing a table of 5684ced83f9bSceastha * contents) and any of the following are true: 5685ced83f9bSceastha * 1. neither -@ or -/ was specified. 5686ced83f9bSceastha * 2. -@ was specified, -/ wasn't specified, and we're 5687ced83f9bSceastha * processing a hidden attribute directory of an attribute 5688ced83f9bSceastha * or we're processing a read-write system attribute file. 5689ced83f9bSceastha * 3. -@ wasn't specified, -/ was specified, and the file 5690ced83f9bSceastha * we're processing is not a read-write system attribute file, 5691ced83f9bSceastha * or we're processing the hidden attribute directory of an 5692ced83f9bSceastha * attribute. 5693ced83f9bSceastha * 5694ced83f9bSceastha * We always process the attributes if we're just generating 5695ced83f9bSceastha * generating a table of contents, or if both -@ and -/ were 5696ced83f9bSceastha * specified. 5697da6c28aaSamw */ 5698ced83f9bSceastha if (xattrp != NULL) { 5699ced83f9bSceastha attr_data_t *ainfo = *attrinfo; 5700ced83f9bSceastha 5701ced83f9bSceastha if (!tflag && 5702ced83f9bSceastha ((!atflag && !saflag) || 5703ced83f9bSceastha (atflag && !saflag && ((ainfo->attr_parent != NULL) || 5704ced83f9bSceastha ainfo->attr_rw_sysattr)) || 5705ced83f9bSceastha (!atflag && saflag && ((ainfo->attr_parent != NULL) || 5706ced83f9bSceastha !ainfo->attr_rw_sysattr)))) { 5707da6c28aaSamw passtape(); 5708da6c28aaSamw return (0); 5709da6c28aaSamw } 5710ced83f9bSceastha } 57117c478bd9Sstevel@tonic-gate #endif 57127c478bd9Sstevel@tonic-gate 57137c478bd9Sstevel@tonic-gate /* sets *namep to point at the proper name */ 5714da6c28aaSamw if (check_prefix(namep, dirp, component) != 0) { 5715da6c28aaSamw passtape(); 5716da6c28aaSamw return (0); 5717da6c28aaSamw } 57187c478bd9Sstevel@tonic-gate 57197c478bd9Sstevel@tonic-gate if (endtape()) { 57207c478bd9Sstevel@tonic-gate if (Bflag) { 57217c478bd9Sstevel@tonic-gate /* 57227c478bd9Sstevel@tonic-gate * Logically at EOT - consume any extra blocks 57237c478bd9Sstevel@tonic-gate * so that write to our stdin won't fail and 57247c478bd9Sstevel@tonic-gate * emit an error message; otherwise something 57257c478bd9Sstevel@tonic-gate * like "dd if=foo.tar | (cd bar; tar xvf -)" 57267c478bd9Sstevel@tonic-gate * will produce a bogus error message from "dd". 57277c478bd9Sstevel@tonic-gate */ 57287c478bd9Sstevel@tonic-gate 57297c478bd9Sstevel@tonic-gate while (read(mt, tbuf, TBLOCK*nblock) > 0) { 57307c478bd9Sstevel@tonic-gate /* empty body */ 57317c478bd9Sstevel@tonic-gate } 57327c478bd9Sstevel@tonic-gate } 57337c478bd9Sstevel@tonic-gate return (-1); 57347c478bd9Sstevel@tonic-gate } 57357c478bd9Sstevel@tonic-gate 57367c478bd9Sstevel@tonic-gate gotit = 0; 57377c478bd9Sstevel@tonic-gate 57387c478bd9Sstevel@tonic-gate if ((Iflag && is_in_table(include_tbl, *namep)) || 57397c478bd9Sstevel@tonic-gate (! Iflag && *argv == NULL)) { 57407c478bd9Sstevel@tonic-gate gotit = 1; 57417c478bd9Sstevel@tonic-gate } else { 57427c478bd9Sstevel@tonic-gate for (cp = argv; *cp; cp++) { 57437c478bd9Sstevel@tonic-gate if (is_prefix(*cp, *namep)) { 57447c478bd9Sstevel@tonic-gate gotit = 1; 57457c478bd9Sstevel@tonic-gate break; 57467c478bd9Sstevel@tonic-gate } 57477c478bd9Sstevel@tonic-gate } 57487c478bd9Sstevel@tonic-gate } 57497c478bd9Sstevel@tonic-gate 57507c478bd9Sstevel@tonic-gate if (! gotit) { 57517c478bd9Sstevel@tonic-gate passtape(); 57527c478bd9Sstevel@tonic-gate return (0); 57537c478bd9Sstevel@tonic-gate } 57547c478bd9Sstevel@tonic-gate 57557c478bd9Sstevel@tonic-gate if (Xflag && is_in_table(exclude_tbl, *namep)) { 57567c478bd9Sstevel@tonic-gate if (vflag) { 57577c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("%s excluded\n"), 57587c478bd9Sstevel@tonic-gate *namep); 57597c478bd9Sstevel@tonic-gate } 57607c478bd9Sstevel@tonic-gate passtape(); 57617c478bd9Sstevel@tonic-gate return (0); 57627c478bd9Sstevel@tonic-gate } 57637c478bd9Sstevel@tonic-gate 57647c478bd9Sstevel@tonic-gate return (1); 57657c478bd9Sstevel@tonic-gate } 57667c478bd9Sstevel@tonic-gate 5767123523f8Sas158974 5768123523f8Sas158974 static void 5769123523f8Sas158974 setbytes_to_skip(struct stat *st, int err) 5770123523f8Sas158974 { 5771123523f8Sas158974 /* 5772123523f8Sas158974 * In a scenario where a typeflag 'X' was followed by 5773123523f8Sas158974 * a typeflag 'A' and typeflag 'O', then the number of 5774123523f8Sas158974 * bytes to skip should be the size of ancillary file, 5775123523f8Sas158974 * plus the dblock for regular file, and the size 5776123523f8Sas158974 * from Xtarhdr. However, if the typeflag was just 'X' 5777123523f8Sas158974 * followed by typeflag 'O', then the number of bytes 5778123523f8Sas158974 * to skip should be the size from Xtarhdr. 5779123523f8Sas158974 */ 5780123523f8Sas158974 if ((err != 0) && (dblock.dbuf.typeflag == 'A') && 5781257ece65SRalph Turner - Sun UK - Contractor (xhdr_flgs & _X_SIZE)) { 5782ced83f9bSceastha st->st_size += TBLOCK + Xtarhdr.x_filesz; 5783123523f8Sas158974 xhdr_flgs |= _X_XHDR; 5784123523f8Sas158974 } else if ((dblock.dbuf.typeflag != 'A') && 5785257ece65SRalph Turner - Sun UK - Contractor (xhdr_flgs & _X_SIZE)) { 5786257ece65SRalph Turner - Sun UK - Contractor st->st_size += Xtarhdr.x_filesz; 5787123523f8Sas158974 xhdr_flgs |= _X_XHDR; 5788123523f8Sas158974 } 5789123523f8Sas158974 } 5790123523f8Sas158974 5791da6c28aaSamw static int 5792da6c28aaSamw fill_in_attr_info(char *attr, char *longname, char *attrparent, int atparentfd, 5793da6c28aaSamw int rw_sysattr, attr_data_t **attrinfo) 5794da6c28aaSamw { 5795da6c28aaSamw size_t pathlen; 5796da6c28aaSamw char *tpath; 5797da6c28aaSamw char *tparent; 5798da6c28aaSamw 5799da6c28aaSamw /* parent info */ 5800da6c28aaSamw if (attrparent != NULL) { 5801da6c28aaSamw if ((tparent = strdup(attrparent)) == NULL) { 5802da6c28aaSamw vperror(0, gettext( 5803da6c28aaSamw "unable to allocate memory for attribute parent " 5804da6c28aaSamw "name for %sattribute %s/%s of %s"), 5805da6c28aaSamw rw_sysattr ? gettext("system ") : "", 5806da6c28aaSamw attrparent, attr, longname); 5807da6c28aaSamw return (1); 5808da6c28aaSamw } 5809da6c28aaSamw } else { 5810da6c28aaSamw tparent = NULL; 5811da6c28aaSamw } 5812da6c28aaSamw 5813da6c28aaSamw /* path info */ 5814da6c28aaSamw pathlen = strlen(attr) + 1; 5815da6c28aaSamw if (attrparent != NULL) { 5816da6c28aaSamw pathlen += strlen(attrparent) + 1; /* add 1 for '/' */ 5817da6c28aaSamw } 5818da6c28aaSamw if ((tpath = calloc(1, pathlen)) == NULL) { 5819da6c28aaSamw vperror(0, gettext( 5820da6c28aaSamw "unable to allocate memory for full " 5821da6c28aaSamw "attribute path name for %sattribute %s%s%s of %s"), 5822da6c28aaSamw rw_sysattr ? gettext("system ") : "", 5823da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 5824da6c28aaSamw (attrparent == NULL) ? "" : "/", 5825da6c28aaSamw attr, longname); 5826da6c28aaSamw if (tparent != NULL) { 5827da6c28aaSamw free(tparent); 5828da6c28aaSamw } 5829da6c28aaSamw return (1); 5830da6c28aaSamw } 5831da6c28aaSamw (void) snprintf(tpath, pathlen, "%s%s%s", 5832da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 5833da6c28aaSamw (attrparent == NULL) ? "" : "/", 5834da6c28aaSamw attr); 5835da6c28aaSamw 5836da6c28aaSamw /* fill in the attribute info */ 5837da6c28aaSamw if (*attrinfo == NULL) { 5838da6c28aaSamw if ((*attrinfo = malloc(sizeof (attr_data_t))) == NULL) { 5839da6c28aaSamw vperror(0, gettext( 5840da6c28aaSamw "unable to allocate memory for attribute " 5841da6c28aaSamw "information for %sattribute %s%s%s of %s"), 5842da6c28aaSamw rw_sysattr ? gettext("system ") : "", 5843da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 5844da6c28aaSamw (attrparent == NULL) ? "" : gettext("/"), 5845da6c28aaSamw attr, longname); 5846da6c28aaSamw if (tparent != NULL) { 5847da6c28aaSamw free(tparent); 5848da6c28aaSamw } 5849da6c28aaSamw free(tpath); 5850da6c28aaSamw return (1); 5851da6c28aaSamw } 5852da6c28aaSamw } else { 5853da6c28aaSamw if ((*attrinfo)->attr_parent != NULL) { 5854da6c28aaSamw free((*attrinfo)->attr_parent); 5855da6c28aaSamw } 5856da6c28aaSamw if ((*attrinfo)->attr_path != NULL) { 5857da6c28aaSamw free((*attrinfo)->attr_path); 5858da6c28aaSamw } 5859da6c28aaSamw /* 5860da6c28aaSamw * The parent file descriptor is passed in, so don't 5861da6c28aaSamw * close it here as it should be closed by the function 5862da6c28aaSamw * that opened it. 5863da6c28aaSamw */ 5864da6c28aaSamw } 5865da6c28aaSamw (*attrinfo)->attr_parent = tparent; 5866da6c28aaSamw (*attrinfo)->attr_path = tpath; 5867da6c28aaSamw (*attrinfo)->attr_rw_sysattr = rw_sysattr; 5868da6c28aaSamw (*attrinfo)->attr_parentfd = atparentfd; 5869da6c28aaSamw 5870da6c28aaSamw return (0); 5871da6c28aaSamw } 58727c478bd9Sstevel@tonic-gate 58737c478bd9Sstevel@tonic-gate /* 58743a1dab68SRich Burridge * Test to see if name is a directory. 58753a1dab68SRich Burridge * 58763a1dab68SRich Burridge * Return 1 if true, 0 otherwise. 58773a1dab68SRich Burridge */ 58783a1dab68SRich Burridge 58793a1dab68SRich Burridge static int 58803a1dab68SRich Burridge is_directory(char *name) 58813a1dab68SRich Burridge { 58823a1dab68SRich Burridge #if defined(O_XATTR) 58833a1dab68SRich Burridge /* 58843a1dab68SRich Burridge * If there is an xattr_buf structure associated with this file, 58853a1dab68SRich Burridge * then the directory test is based on whether the name has a 58863a1dab68SRich Burridge * trailing slash. 58873a1dab68SRich Burridge */ 58883a1dab68SRich Burridge if (xattrp) 58893a1dab68SRich Burridge return (name[strlen(name) - 1] == '/'); 58903a1dab68SRich Burridge #endif 58913a1dab68SRich Burridge if (is_posix) 58923a1dab68SRich Burridge return (dblock.dbuf.typeflag == '5'); 58933a1dab68SRich Burridge else 58943a1dab68SRich Burridge return (name[strlen(name) - 1] == '/'); 58953a1dab68SRich Burridge } 58963a1dab68SRich Burridge 58973a1dab68SRich Burridge /* 5898b25dbf38SRich Burridge * Version of chdir that handles directory pathnames of greater than PATH_MAX 5899b25dbf38SRich Burridge * length, by changing the working directory to manageable portions of the 5900b25dbf38SRich Burridge * complete directory pathname. If any of these attempts fail, then it exits 5901b25dbf38SRich Burridge * non-zero. 5902b25dbf38SRich Burridge * 5903b25dbf38SRich Burridge * If a segment (i.e. a portion of "path" between two "/"'s) of the overall 5904b25dbf38SRich Burridge * pathname is greater than PATH_MAX, then this still won't work, and this 5905b25dbf38SRich Burridge * routine will return -1 with errno set to ENAMETOOLONG. 5906b25dbf38SRich Burridge * 5907b25dbf38SRich Burridge * NOTE: this routine is semantically different to the system chdir in 5908b25dbf38SRich Burridge * that it is remotely possible for the currently working directory to be 5909b25dbf38SRich Burridge * changed to a different directory, if a chdir call fails when processing 5910b25dbf38SRich Burridge * one of the segments of a path that is greater than PATH_MAX. This isn't 5911b25dbf38SRich Burridge * a problem as this is tar's own specific version of chdir. 5912b25dbf38SRich Burridge */ 5913b25dbf38SRich Burridge 5914b25dbf38SRich Burridge static int 5915b25dbf38SRich Burridge tar_chdir(const char *path) { 5916b25dbf38SRich Burridge const char *sep = "/"; 5917b25dbf38SRich Burridge char *path_copy = NULL; 5918b25dbf38SRich Burridge char *ptr = NULL; 5919b25dbf38SRich Burridge 5920b25dbf38SRich Burridge /* The trivial case. */ 5921b25dbf38SRich Burridge if (chdir(path) == 0) { 5922b25dbf38SRich Burridge return (0); 5923b25dbf38SRich Burridge } 5924b25dbf38SRich Burridge if (errno == ENAMETOOLONG) { 5925b25dbf38SRich Burridge if (path[0] == '/' && chdir(sep) != 0) 5926b25dbf38SRich Burridge return (-1); 5927b25dbf38SRich Burridge 5928b25dbf38SRich Burridge /* strtok(3C) modifies the string, so make a copy. */ 5929b25dbf38SRich Burridge if ((path_copy = strdup(path)) == NULL) { 5930b25dbf38SRich Burridge return (-1); 5931b25dbf38SRich Burridge } 5932b25dbf38SRich Burridge 5933b25dbf38SRich Burridge /* chdir(2) for every path element. */ 5934b25dbf38SRich Burridge for (ptr = strtok(path_copy, sep); 5935b25dbf38SRich Burridge ptr != NULL; 5936b25dbf38SRich Burridge ptr = strtok(NULL, sep)) { 5937b25dbf38SRich Burridge if (chdir(ptr) != 0) { 5938b25dbf38SRich Burridge free(path_copy); 5939b25dbf38SRich Burridge return (-1); 5940b25dbf38SRich Burridge } 5941b25dbf38SRich Burridge } 5942b25dbf38SRich Burridge free(path_copy); 5943b25dbf38SRich Burridge return (0); 5944b25dbf38SRich Burridge } 5945b25dbf38SRich Burridge 5946b25dbf38SRich Burridge /* If chdir fails for any reason except ENAMETOOLONG. */ 5947b25dbf38SRich Burridge return (-1); 5948b25dbf38SRich Burridge } 5949b25dbf38SRich Burridge 5950b25dbf38SRich Burridge /* 59511a431409SRich Burridge * Test if name has a '..' sequence in it. 59521a431409SRich Burridge * 59531a431409SRich Burridge * Return 1 if found, 0 otherwise. 59541a431409SRich Burridge */ 59551a431409SRich Burridge 59561a431409SRich Burridge static int 59571a431409SRich Burridge has_dot_dot(char *name) 59581a431409SRich Burridge { 59591a431409SRich Burridge char *s; 59601a431409SRich Burridge size_t name_len = strlen(name); 59611a431409SRich Burridge 59621a431409SRich Burridge for (s = name; s < (name + name_len - 2); s++) { 59631a431409SRich Burridge if (s[0] == '.' && s[1] == '.' && ((s[2] == '/') || !s[2])) 59641a431409SRich Burridge return (1); 59651a431409SRich Burridge 59661a431409SRich Burridge while (! (*s == '/')) { 59671a431409SRich Burridge if (! *s++) 59681a431409SRich Burridge return (0); 59691a431409SRich Burridge } 59701a431409SRich Burridge } 59711a431409SRich Burridge 59721a431409SRich Burridge return (0); 59731a431409SRich Burridge } 59741a431409SRich Burridge 59751a431409SRich Burridge /* 59761a431409SRich Burridge * Test if name is an absolute path name. 59771a431409SRich Burridge * 59781a431409SRich Burridge * Return 1 if true, 0 otherwise. 59791a431409SRich Burridge */ 59801a431409SRich Burridge 59811a431409SRich Burridge static int 59821a431409SRich Burridge is_absolute(char *name) 59831a431409SRich Burridge { 5984fe5a79a9SRich Burridge #if defined(O_XATTR) 5985fe5a79a9SRich Burridge /* 5986fe5a79a9SRich Burridge * If this is an extended attribute (whose name will begin with 5987fe5a79a9SRich Burridge * "/dev/null/", always return 0 as they should be extracted with 5988fe5a79a9SRich Burridge * the name intact, to allow other tar archiving programs that 5989fe5a79a9SRich Burridge * don't understand extended attributes, to correctly throw them away. 5990fe5a79a9SRich Burridge */ 5991fe5a79a9SRich Burridge if (xattrp) 5992fe5a79a9SRich Burridge return (0); 5993fe5a79a9SRich Burridge #endif 5994fe5a79a9SRich Burridge 59951a431409SRich Burridge return (name[0] == '/'); 59961a431409SRich Burridge } 59971a431409SRich Burridge 59981a431409SRich Burridge /* 59991a431409SRich Burridge * Adjust the pathname to make it a relative one. Strip off any leading 60001a431409SRich Burridge * '/' characters and if the pathname contains any '..' sequences, strip 60011a431409SRich Burridge * upto and including the last occurance of '../' (or '..' if found at 60021a431409SRich Burridge * the very end of the pathname). 60031a431409SRich Burridge * 60041a431409SRich Burridge * Return the relative pathname. stripped_prefix will also return the 60051a431409SRich Burridge * portion of name that was stripped off and should be freed by the 60061a431409SRich Burridge * calling routine when no longer needed. 60071a431409SRich Burridge */ 60081a431409SRich Burridge 60091a431409SRich Burridge static char * 60101a431409SRich Burridge make_relative_name(char *name, char **stripped_prefix) 60111a431409SRich Burridge { 60121a431409SRich Burridge char *s; 60131a431409SRich Burridge size_t prefix_len = 0; 60141a431409SRich Burridge size_t name_len = strlen(name); 60151a431409SRich Burridge 60161a431409SRich Burridge for (s = name + prefix_len; s < (name + name_len - 2); ) { 60171a431409SRich Burridge if (s[0] == '.' && s[1] == '.' && ((s[2] == '/') || !s[2])) 60181a431409SRich Burridge prefix_len = s + 2 - name; 60191a431409SRich Burridge 60201a431409SRich Burridge do { 60211a431409SRich Burridge char c = *s++; 60221a431409SRich Burridge 60231a431409SRich Burridge if (c == '/') 60241a431409SRich Burridge break; 60251a431409SRich Burridge } while (*s); 60261a431409SRich Burridge } 60271a431409SRich Burridge 60281a431409SRich Burridge for (s = name + prefix_len; *s == '/'; s++) 60291a431409SRich Burridge continue; 60301a431409SRich Burridge prefix_len = s - name; 60311a431409SRich Burridge 60321a431409SRich Burridge /* Create the portion of the name that was stripped off. */ 60331a431409SRich Burridge s = malloc(prefix_len + 1); 60341a431409SRich Burridge memcpy(s, name, prefix_len); 60351a431409SRich Burridge s[prefix_len] = 0; 60361a431409SRich Burridge *stripped_prefix = s; 60371a431409SRich Burridge s = &name[prefix_len]; 60381a431409SRich Burridge 60391a431409SRich Burridge return (s); 60401a431409SRich Burridge } 60411a431409SRich Burridge 60421a431409SRich Burridge /* 60437c478bd9Sstevel@tonic-gate * Return through *namep a pointer to the proper fullname (i.e "<name> | 60447c478bd9Sstevel@tonic-gate * <prefix>/<name>"), as represented in the header entry dblock.dbuf. 6045da6c28aaSamw * 6046da6c28aaSamw * Returns 0 if successful, otherwise returns 1. 60477c478bd9Sstevel@tonic-gate */ 60487c478bd9Sstevel@tonic-gate 6049da6c28aaSamw static int 60507c478bd9Sstevel@tonic-gate check_prefix(char **namep, char **dirp, char **compp) 60517c478bd9Sstevel@tonic-gate { 60527c478bd9Sstevel@tonic-gate static char fullname[PATH_MAX + 1]; 60537c478bd9Sstevel@tonic-gate static char dir[PATH_MAX + 1]; 60547c478bd9Sstevel@tonic-gate static char component[PATH_MAX + 1]; 60557c478bd9Sstevel@tonic-gate static char savename[PATH_MAX + 1]; 60567c478bd9Sstevel@tonic-gate char *s; 60577c478bd9Sstevel@tonic-gate 60587c478bd9Sstevel@tonic-gate (void) memset(dir, 0, sizeof (dir)); 60597c478bd9Sstevel@tonic-gate (void) memset(component, 0, sizeof (component)); 60607c478bd9Sstevel@tonic-gate 60617c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) { 60627c478bd9Sstevel@tonic-gate (void) strcpy(fullname, Xtarhdr.x_path); 60637c478bd9Sstevel@tonic-gate } else { 60647c478bd9Sstevel@tonic-gate if (dblock.dbuf.prefix[0] != '\0') 60657c478bd9Sstevel@tonic-gate (void) sprintf(fullname, "%.*s/%.*s", PRESIZ, 60667c478bd9Sstevel@tonic-gate dblock.dbuf.prefix, NAMSIZ, dblock.dbuf.name); 60677c478bd9Sstevel@tonic-gate else 60687c478bd9Sstevel@tonic-gate (void) sprintf(fullname, "%.*s", NAMSIZ, 60697c478bd9Sstevel@tonic-gate dblock.dbuf.name); 60707c478bd9Sstevel@tonic-gate } 60717c478bd9Sstevel@tonic-gate 60727c478bd9Sstevel@tonic-gate /* 60731a431409SRich Burridge * If we are printing a table of contents or extracting an archive, 60741a431409SRich Burridge * make absolute pathnames relative and prohibit the unpacking of 60751a431409SRich Burridge * files contain ".." in their name (unless the user has supplied 60761a431409SRich Burridge * the -P option). 60771a431409SRich Burridge */ 60781a431409SRich Burridge if ((tflag || xflag) && !Pflag) { 60791a431409SRich Burridge if (is_absolute(fullname) || has_dot_dot(fullname)) { 60801a431409SRich Burridge char *stripped_prefix; 60811a431409SRich Burridge size_t prefix_len = 0; 60821a431409SRich Burridge 60831a431409SRich Burridge (void) strcpy(savename, fullname); 60841a431409SRich Burridge strcpy(fullname, 60851a431409SRich Burridge make_relative_name(savename, &stripped_prefix)); 60861a431409SRich Burridge (void) fprintf(stderr, 60871a431409SRich Burridge gettext("tar: Removing leading '%s' from '%s'\n"), 60881a431409SRich Burridge stripped_prefix, savename); 60891a431409SRich Burridge free(stripped_prefix); 60901a431409SRich Burridge } 60911a431409SRich Burridge } 60921a431409SRich Burridge 60931a431409SRich Burridge /* 60947c478bd9Sstevel@tonic-gate * Set dir and component names 60957c478bd9Sstevel@tonic-gate */ 60967c478bd9Sstevel@tonic-gate 60977c478bd9Sstevel@tonic-gate get_parent(fullname, dir); 60987c478bd9Sstevel@tonic-gate 60997c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 6100da6c28aaSamw if (xattrp == NULL) { 61017c478bd9Sstevel@tonic-gate #endif 61027c478bd9Sstevel@tonic-gate /* 61037c478bd9Sstevel@tonic-gate * Save of real name since were going to chop off the 61047c478bd9Sstevel@tonic-gate * trailing slashes. 61057c478bd9Sstevel@tonic-gate */ 61067c478bd9Sstevel@tonic-gate (void) strcpy(savename, fullname); 61077c478bd9Sstevel@tonic-gate /* 61087c478bd9Sstevel@tonic-gate * first strip of trailing slashes. 61097c478bd9Sstevel@tonic-gate */ 61107c478bd9Sstevel@tonic-gate chop_endslashes(savename); 61117c478bd9Sstevel@tonic-gate s = get_component(savename); 61127c478bd9Sstevel@tonic-gate (void) strcpy(component, s); 61137c478bd9Sstevel@tonic-gate 61147c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 61157c478bd9Sstevel@tonic-gate } else { 61167c478bd9Sstevel@tonic-gate (void) strcpy(fullname, xattrp->h_names); 61177c478bd9Sstevel@tonic-gate (void) strcpy(dir, fullname); 6118da6c28aaSamw (void) strcpy(component, basename(xattrp->h_names + 6119da6c28aaSamw strlen(xattrp->h_names) + 1)); 61207c478bd9Sstevel@tonic-gate } 61217c478bd9Sstevel@tonic-gate #endif 61227c478bd9Sstevel@tonic-gate *namep = fullname; 61237c478bd9Sstevel@tonic-gate *dirp = dir; 61247c478bd9Sstevel@tonic-gate *compp = component; 6125da6c28aaSamw 6126da6c28aaSamw return (0); 61277c478bd9Sstevel@tonic-gate } 61287c478bd9Sstevel@tonic-gate 61297c478bd9Sstevel@tonic-gate /* 61307c478bd9Sstevel@tonic-gate * Return true if the object indicated by the file descriptor and type 61317c478bd9Sstevel@tonic-gate * is a tape device, false otherwise 61327c478bd9Sstevel@tonic-gate */ 61337c478bd9Sstevel@tonic-gate 61347c478bd9Sstevel@tonic-gate static int 61357c478bd9Sstevel@tonic-gate istape(int fd, int type) 61367c478bd9Sstevel@tonic-gate { 61377c478bd9Sstevel@tonic-gate int result = 0; 61387c478bd9Sstevel@tonic-gate 61394bc0a2efScasper if (S_ISCHR(type)) { 61407c478bd9Sstevel@tonic-gate struct mtget mtg; 61417c478bd9Sstevel@tonic-gate 61427c478bd9Sstevel@tonic-gate if (ioctl(fd, MTIOCGET, &mtg) != -1) { 61437c478bd9Sstevel@tonic-gate result = 1; 61447c478bd9Sstevel@tonic-gate } 61457c478bd9Sstevel@tonic-gate } 61467c478bd9Sstevel@tonic-gate 61477c478bd9Sstevel@tonic-gate return (result); 61487c478bd9Sstevel@tonic-gate } 61497c478bd9Sstevel@tonic-gate 61507c478bd9Sstevel@tonic-gate #include <utmpx.h> 61517c478bd9Sstevel@tonic-gate 61527c478bd9Sstevel@tonic-gate struct utmpx utmpx; 61537c478bd9Sstevel@tonic-gate 61547c478bd9Sstevel@tonic-gate #define NMAX (sizeof (utmpx.ut_name)) 61557c478bd9Sstevel@tonic-gate 61567c478bd9Sstevel@tonic-gate typedef struct cachenode { /* this struct must be zeroed before using */ 61577c478bd9Sstevel@tonic-gate struct cachenode *next; /* next in hash chain */ 61587c478bd9Sstevel@tonic-gate int val; /* the uid or gid of this entry */ 61597c478bd9Sstevel@tonic-gate int namehash; /* name's hash signature */ 61607c478bd9Sstevel@tonic-gate char name[NMAX+1]; /* the string that val maps to */ 61617c478bd9Sstevel@tonic-gate } cachenode_t; 61627c478bd9Sstevel@tonic-gate 61637c478bd9Sstevel@tonic-gate #define HASHSIZE 256 61647c478bd9Sstevel@tonic-gate 61657c478bd9Sstevel@tonic-gate static cachenode_t *names[HASHSIZE]; 61667c478bd9Sstevel@tonic-gate static cachenode_t *groups[HASHSIZE]; 61677c478bd9Sstevel@tonic-gate static cachenode_t *uids[HASHSIZE]; 61687c478bd9Sstevel@tonic-gate static cachenode_t *gids[HASHSIZE]; 61697c478bd9Sstevel@tonic-gate 61707c478bd9Sstevel@tonic-gate static int 61717c478bd9Sstevel@tonic-gate hash_byname(char *name) 61727c478bd9Sstevel@tonic-gate { 61737c478bd9Sstevel@tonic-gate int i, c, h = 0; 61747c478bd9Sstevel@tonic-gate 61757c478bd9Sstevel@tonic-gate for (i = 0; i < NMAX; i++) { 61767c478bd9Sstevel@tonic-gate c = name[i]; 61777c478bd9Sstevel@tonic-gate if (c == '\0') 61787c478bd9Sstevel@tonic-gate break; 61797c478bd9Sstevel@tonic-gate h = (h << 4) + h + c; 61807c478bd9Sstevel@tonic-gate } 61817c478bd9Sstevel@tonic-gate return (h); 61827c478bd9Sstevel@tonic-gate } 61837c478bd9Sstevel@tonic-gate 61847c478bd9Sstevel@tonic-gate static cachenode_t * 61857c478bd9Sstevel@tonic-gate hash_lookup_byval(cachenode_t *table[], int val) 61867c478bd9Sstevel@tonic-gate { 61877c478bd9Sstevel@tonic-gate int h = val; 61887c478bd9Sstevel@tonic-gate cachenode_t *c; 61897c478bd9Sstevel@tonic-gate 61907c478bd9Sstevel@tonic-gate for (c = table[h & (HASHSIZE - 1)]; c != NULL; c = c->next) { 61917c478bd9Sstevel@tonic-gate if (c->val == val) 61927c478bd9Sstevel@tonic-gate return (c); 61937c478bd9Sstevel@tonic-gate } 61947c478bd9Sstevel@tonic-gate return (NULL); 61957c478bd9Sstevel@tonic-gate } 61967c478bd9Sstevel@tonic-gate 61977c478bd9Sstevel@tonic-gate static cachenode_t * 61987c478bd9Sstevel@tonic-gate hash_lookup_byname(cachenode_t *table[], char *name) 61997c478bd9Sstevel@tonic-gate { 62007c478bd9Sstevel@tonic-gate int h = hash_byname(name); 62017c478bd9Sstevel@tonic-gate cachenode_t *c; 62027c478bd9Sstevel@tonic-gate 62037c478bd9Sstevel@tonic-gate for (c = table[h & (HASHSIZE - 1)]; c != NULL; c = c->next) { 62047c478bd9Sstevel@tonic-gate if (c->namehash == h && strcmp(c->name, name) == 0) 62057c478bd9Sstevel@tonic-gate return (c); 62067c478bd9Sstevel@tonic-gate } 62077c478bd9Sstevel@tonic-gate return (NULL); 62087c478bd9Sstevel@tonic-gate } 62097c478bd9Sstevel@tonic-gate 62107c478bd9Sstevel@tonic-gate static cachenode_t * 62117c478bd9Sstevel@tonic-gate hash_insert(cachenode_t *table[], char *name, int value) 62127c478bd9Sstevel@tonic-gate { 62137c478bd9Sstevel@tonic-gate cachenode_t *c; 62147c478bd9Sstevel@tonic-gate int signature; 62157c478bd9Sstevel@tonic-gate 62167c478bd9Sstevel@tonic-gate c = calloc(1, sizeof (cachenode_t)); 62177c478bd9Sstevel@tonic-gate if (c == NULL) { 62187c478bd9Sstevel@tonic-gate perror("malloc"); 62197c478bd9Sstevel@tonic-gate exit(1); 62207c478bd9Sstevel@tonic-gate } 62217c478bd9Sstevel@tonic-gate if (name != NULL) { 62227c478bd9Sstevel@tonic-gate (void) strncpy(c->name, name, NMAX); 62237c478bd9Sstevel@tonic-gate c->namehash = hash_byname(name); 62247c478bd9Sstevel@tonic-gate } 62257c478bd9Sstevel@tonic-gate c->val = value; 62267c478bd9Sstevel@tonic-gate if (table == uids || table == gids) 62277c478bd9Sstevel@tonic-gate signature = c->val; 62287c478bd9Sstevel@tonic-gate else 62297c478bd9Sstevel@tonic-gate signature = c->namehash; 62307c478bd9Sstevel@tonic-gate c->next = table[signature & (HASHSIZE - 1)]; 62317c478bd9Sstevel@tonic-gate table[signature & (HASHSIZE - 1)] = c; 62327c478bd9Sstevel@tonic-gate return (c); 62337c478bd9Sstevel@tonic-gate } 62347c478bd9Sstevel@tonic-gate 62357c478bd9Sstevel@tonic-gate static char * 62367c478bd9Sstevel@tonic-gate getname(uid_t uid) 62377c478bd9Sstevel@tonic-gate { 62387c478bd9Sstevel@tonic-gate cachenode_t *c; 62397c478bd9Sstevel@tonic-gate 62407c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byval(uids, uid)) == NULL) { 62417c478bd9Sstevel@tonic-gate struct passwd *pwent = getpwuid(uid); 62427c478bd9Sstevel@tonic-gate c = hash_insert(uids, pwent ? pwent->pw_name : NULL, uid); 62437c478bd9Sstevel@tonic-gate } 62447c478bd9Sstevel@tonic-gate return (c->name); 62457c478bd9Sstevel@tonic-gate } 62467c478bd9Sstevel@tonic-gate 62477c478bd9Sstevel@tonic-gate static char * 62487c478bd9Sstevel@tonic-gate getgroup(gid_t gid) 62497c478bd9Sstevel@tonic-gate { 62507c478bd9Sstevel@tonic-gate cachenode_t *c; 62517c478bd9Sstevel@tonic-gate 62527c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byval(gids, gid)) == NULL) { 62537c478bd9Sstevel@tonic-gate struct group *grent = getgrgid(gid); 62547c478bd9Sstevel@tonic-gate c = hash_insert(gids, grent ? grent->gr_name : NULL, gid); 62557c478bd9Sstevel@tonic-gate } 62567c478bd9Sstevel@tonic-gate return (c->name); 62577c478bd9Sstevel@tonic-gate } 62587c478bd9Sstevel@tonic-gate 62597c478bd9Sstevel@tonic-gate static uid_t 62607c478bd9Sstevel@tonic-gate getuidbyname(char *name) 62617c478bd9Sstevel@tonic-gate { 62627c478bd9Sstevel@tonic-gate cachenode_t *c; 62637c478bd9Sstevel@tonic-gate 62647c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byname(names, name)) == NULL) { 62657c478bd9Sstevel@tonic-gate struct passwd *pwent = getpwnam(name); 62667c478bd9Sstevel@tonic-gate c = hash_insert(names, name, pwent ? (int)pwent->pw_uid : -1); 62677c478bd9Sstevel@tonic-gate } 62687c478bd9Sstevel@tonic-gate return ((uid_t)c->val); 62697c478bd9Sstevel@tonic-gate } 62707c478bd9Sstevel@tonic-gate 62717c478bd9Sstevel@tonic-gate static gid_t 62727c478bd9Sstevel@tonic-gate getgidbyname(char *group) 62737c478bd9Sstevel@tonic-gate { 62747c478bd9Sstevel@tonic-gate cachenode_t *c; 62757c478bd9Sstevel@tonic-gate 62767c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byname(groups, group)) == NULL) { 62777c478bd9Sstevel@tonic-gate struct group *grent = getgrnam(group); 62787c478bd9Sstevel@tonic-gate c = hash_insert(groups, group, grent ? (int)grent->gr_gid : -1); 62797c478bd9Sstevel@tonic-gate } 62807c478bd9Sstevel@tonic-gate return ((gid_t)c->val); 62817c478bd9Sstevel@tonic-gate } 62827c478bd9Sstevel@tonic-gate 62837c478bd9Sstevel@tonic-gate /* 62847c478bd9Sstevel@tonic-gate * Build the header. 62857c478bd9Sstevel@tonic-gate * Determine whether or not an extended header is also needed. If needed, 62867c478bd9Sstevel@tonic-gate * create and write the extended header and its data. 62877c478bd9Sstevel@tonic-gate * Writing of the extended header assumes that "tomodes" has been called and 62887c478bd9Sstevel@tonic-gate * the relevant information has been placed in the header block. 62897c478bd9Sstevel@tonic-gate */ 62907c478bd9Sstevel@tonic-gate 62917c478bd9Sstevel@tonic-gate static int 62927c478bd9Sstevel@tonic-gate build_dblock( 62937c478bd9Sstevel@tonic-gate const char *name, 62947c478bd9Sstevel@tonic-gate const char *linkname, 62957c478bd9Sstevel@tonic-gate const char typeflag, 62967c478bd9Sstevel@tonic-gate const int filetype, 62977c478bd9Sstevel@tonic-gate const struct stat *sp, 62987c478bd9Sstevel@tonic-gate const dev_t device, 62997c478bd9Sstevel@tonic-gate const char *prefix) 63007c478bd9Sstevel@tonic-gate { 63017c478bd9Sstevel@tonic-gate int nblks; 63027c478bd9Sstevel@tonic-gate major_t dev; 63037c478bd9Sstevel@tonic-gate const char *filename; 63047c478bd9Sstevel@tonic-gate const char *lastslash; 63057c478bd9Sstevel@tonic-gate 63067c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) 63077c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = _XATTR_HDRTYPE; 63087c478bd9Sstevel@tonic-gate else 63097c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = typeflag; 63107c478bd9Sstevel@tonic-gate (void) memset(dblock.dbuf.name, '\0', NAMSIZ); 63117c478bd9Sstevel@tonic-gate (void) memset(dblock.dbuf.linkname, '\0', NAMSIZ); 63127c478bd9Sstevel@tonic-gate (void) memset(dblock.dbuf.prefix, '\0', PRESIZ); 63137c478bd9Sstevel@tonic-gate 63147c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 63157c478bd9Sstevel@tonic-gate filename = Xtarhdr.x_path; 63167c478bd9Sstevel@tonic-gate else 63177c478bd9Sstevel@tonic-gate filename = name; 63187c478bd9Sstevel@tonic-gate 63197c478bd9Sstevel@tonic-gate if ((dev = major(device)) > OCTAL7CHAR) { 63207c478bd9Sstevel@tonic-gate if (Eflag) { 63217c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMAJOR; 63227c478bd9Sstevel@tonic-gate Xtarhdr.x_devmajor = dev; 63237c478bd9Sstevel@tonic-gate } else { 63247c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 63257c478bd9Sstevel@tonic-gate "Device major too large for %s. Use -E flag."), 63267c478bd9Sstevel@tonic-gate filename); 63277c478bd9Sstevel@tonic-gate if (errflag) 63287c478bd9Sstevel@tonic-gate done(1); 63297c478bd9Sstevel@tonic-gate else 63307c478bd9Sstevel@tonic-gate Errflg = 1; 63317c478bd9Sstevel@tonic-gate } 63327c478bd9Sstevel@tonic-gate dev = 0; 63337c478bd9Sstevel@tonic-gate } 63347c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.devmajor, "%07lo", dev); 63357c478bd9Sstevel@tonic-gate if ((dev = minor(device)) > OCTAL7CHAR) { 63367c478bd9Sstevel@tonic-gate if (Eflag) { 63377c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMINOR; 63387c478bd9Sstevel@tonic-gate Xtarhdr.x_devminor = dev; 63397c478bd9Sstevel@tonic-gate } else { 63407c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 63417c478bd9Sstevel@tonic-gate "Device minor too large for %s. Use -E flag."), 63427c478bd9Sstevel@tonic-gate filename); 63437c478bd9Sstevel@tonic-gate if (errflag) 63447c478bd9Sstevel@tonic-gate done(1); 63457c478bd9Sstevel@tonic-gate else 63467c478bd9Sstevel@tonic-gate Errflg = 1; 63477c478bd9Sstevel@tonic-gate } 63487c478bd9Sstevel@tonic-gate dev = 0; 63497c478bd9Sstevel@tonic-gate } 63507c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.devminor, "%07lo", dev); 63517c478bd9Sstevel@tonic-gate 63527c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.name, name, NAMSIZ); 63537c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.linkname, linkname, NAMSIZ); 63547c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.magic, "%.5s", magic_type); 63557c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.version, "00"); 63567c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.uname, "%.31s", getname(sp->st_uid)); 63577c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.gname, "%.31s", getgroup(sp->st_gid)); 63587c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.prefix, prefix, PRESIZ); 63597c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 63607c478bd9Sstevel@tonic-gate 63617c478bd9Sstevel@tonic-gate if (Eflag) { 63627c478bd9Sstevel@tonic-gate (void) bcopy(dblock.dummy, xhdr_buf.dummy, TBLOCK); 63637c478bd9Sstevel@tonic-gate (void) memset(xhdr_buf.dbuf.name, '\0', NAMSIZ); 63647c478bd9Sstevel@tonic-gate lastslash = strrchr(name, '/'); 63657c478bd9Sstevel@tonic-gate if (lastslash == NULL) 63667c478bd9Sstevel@tonic-gate lastslash = name; 63677c478bd9Sstevel@tonic-gate else 63687c478bd9Sstevel@tonic-gate lastslash++; 63697c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_buf.dbuf.name, lastslash); 63707c478bd9Sstevel@tonic-gate (void) memset(xhdr_buf.dbuf.linkname, '\0', NAMSIZ); 63717c478bd9Sstevel@tonic-gate (void) memset(xhdr_buf.dbuf.prefix, '\0', PRESIZ); 63727c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_buf.dbuf.prefix, xhdr_dirname); 63737c478bd9Sstevel@tonic-gate xhdr_count++; 63747c478bd9Sstevel@tonic-gate xrec_offset = 0; 63757c478bd9Sstevel@tonic-gate gen_date("mtime", sp->st_mtim); 63767c478bd9Sstevel@tonic-gate xhdr_buf.dbuf.typeflag = 'X'; 63777c478bd9Sstevel@tonic-gate if (gen_utf8_names(filename) != 0) 63787c478bd9Sstevel@tonic-gate return (1); 63797c478bd9Sstevel@tonic-gate 63807c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG 63817c478bd9Sstevel@tonic-gate Xtarhdr.x_uname = dblock.dbuf.uname; 63827c478bd9Sstevel@tonic-gate Xtarhdr.x_gname = dblock.dbuf.gname; 63837c478bd9Sstevel@tonic-gate xhdr_flgs |= (_X_UNAME | _X_GNAME); 63847c478bd9Sstevel@tonic-gate #endif 63857c478bd9Sstevel@tonic-gate if (xhdr_flgs) { 63867c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_DEVMAJOR) 63877c478bd9Sstevel@tonic-gate gen_num("SUN.devmajor", Xtarhdr.x_devmajor); 63887c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_DEVMINOR) 63897c478bd9Sstevel@tonic-gate gen_num("SUN.devminor", Xtarhdr.x_devminor); 63907c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_GID) 63917c478bd9Sstevel@tonic-gate gen_num("gid", Xtarhdr.x_gid); 63927c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_UID) 63937c478bd9Sstevel@tonic-gate gen_num("uid", Xtarhdr.x_uid); 63947c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_SIZE) 63957c478bd9Sstevel@tonic-gate gen_num("size", Xtarhdr.x_filesz); 63967c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 63977c478bd9Sstevel@tonic-gate gen_string("path", Xtarhdr.x_path); 63987c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) 63997c478bd9Sstevel@tonic-gate gen_string("linkpath", Xtarhdr.x_linkpath); 64007c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_GNAME) 64017c478bd9Sstevel@tonic-gate gen_string("gname", Xtarhdr.x_gname); 64027c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_UNAME) 64037c478bd9Sstevel@tonic-gate gen_string("uname", Xtarhdr.x_uname); 64047c478bd9Sstevel@tonic-gate } 64057c478bd9Sstevel@tonic-gate (void) sprintf(xhdr_buf.dbuf.size, 64067c478bd9Sstevel@tonic-gate "%011" FMT_off_t_o, xrec_offset); 64077c478bd9Sstevel@tonic-gate (void) sprintf(xhdr_buf.dbuf.chksum, "%07o", 64087c478bd9Sstevel@tonic-gate checksum(&xhdr_buf)); 64097c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&xhdr_buf, 1); 64107c478bd9Sstevel@tonic-gate nblks = TBLOCKS(xrec_offset); 64117c478bd9Sstevel@tonic-gate (void) writetbuf(xrec_ptr, nblks); 64127c478bd9Sstevel@tonic-gate } 64137c478bd9Sstevel@tonic-gate return (0); 64147c478bd9Sstevel@tonic-gate } 64157c478bd9Sstevel@tonic-gate 64167c478bd9Sstevel@tonic-gate 64177c478bd9Sstevel@tonic-gate /* 64187c478bd9Sstevel@tonic-gate * makeDir - ensure that a directory with the pathname denoted by name 64197c478bd9Sstevel@tonic-gate * exists, and return 1 on success, and 0 on failure (e.g., 64207c478bd9Sstevel@tonic-gate * read-only file system, exists but not-a-directory). 64217c478bd9Sstevel@tonic-gate */ 64227c478bd9Sstevel@tonic-gate 64237c478bd9Sstevel@tonic-gate static int 64247c478bd9Sstevel@tonic-gate makeDir(char *name) 64257c478bd9Sstevel@tonic-gate { 64267c478bd9Sstevel@tonic-gate struct stat buf; 64277c478bd9Sstevel@tonic-gate 64287c478bd9Sstevel@tonic-gate if (access(name, 0) < 0) { /* name doesn't exist */ 64297c478bd9Sstevel@tonic-gate if (mkdir(name, 0777) < 0) { 64307c478bd9Sstevel@tonic-gate vperror(0, "%s", name); 64317c478bd9Sstevel@tonic-gate return (0); 64327c478bd9Sstevel@tonic-gate } 64337c478bd9Sstevel@tonic-gate } else { /* name exists */ 64347c478bd9Sstevel@tonic-gate if (stat(name, &buf) < 0) { 64357c478bd9Sstevel@tonic-gate vperror(0, "%s", name); 64367c478bd9Sstevel@tonic-gate return (0); 64377c478bd9Sstevel@tonic-gate } 64387c478bd9Sstevel@tonic-gate 64397c478bd9Sstevel@tonic-gate return ((buf.st_mode & S_IFMT) == S_IFDIR); 64407c478bd9Sstevel@tonic-gate } 64417c478bd9Sstevel@tonic-gate 64427c478bd9Sstevel@tonic-gate return (1); 64437c478bd9Sstevel@tonic-gate } 64447c478bd9Sstevel@tonic-gate 64457c478bd9Sstevel@tonic-gate 64467c478bd9Sstevel@tonic-gate /* 64477c478bd9Sstevel@tonic-gate * Save this directory and its mtime on the stack, popping and setting 64487c478bd9Sstevel@tonic-gate * the mtimes of any stacked dirs which aren't parents of this one. 64497c478bd9Sstevel@tonic-gate * A null name causes the entire stack to be unwound and set. 64507c478bd9Sstevel@tonic-gate * 64517c478bd9Sstevel@tonic-gate * Since all the elements of the directory "stack" share a common 64527c478bd9Sstevel@tonic-gate * prefix, we can make do with one string. We keep only the current 64537c478bd9Sstevel@tonic-gate * directory path, with an associated array of mtime's. A negative 64547c478bd9Sstevel@tonic-gate * mtime means no mtime. 64557c478bd9Sstevel@tonic-gate * 64567c478bd9Sstevel@tonic-gate * This stack algorithm is not guaranteed to work for tapes created 64577c478bd9Sstevel@tonic-gate * with the 'r' function letter, but the vast majority of tapes with 64587c478bd9Sstevel@tonic-gate * directories are not. This avoids saving every directory record on 64597c478bd9Sstevel@tonic-gate * the tape and setting all the times at the end. 64607c478bd9Sstevel@tonic-gate * 64617c478bd9Sstevel@tonic-gate * (This was borrowed from the 4.1.3 source, and adapted to the 5.x 64627c478bd9Sstevel@tonic-gate * environment) 64637c478bd9Sstevel@tonic-gate */ 64647c478bd9Sstevel@tonic-gate 64657c478bd9Sstevel@tonic-gate static void 64667c478bd9Sstevel@tonic-gate doDirTimes(char *name, timestruc_t modTime) 64677c478bd9Sstevel@tonic-gate { 64687c478bd9Sstevel@tonic-gate static char dirstack[PATH_MAX+2]; 64697c478bd9Sstevel@tonic-gate /* Add spaces for the last slash and last NULL */ 64707c478bd9Sstevel@tonic-gate static timestruc_t modtimes[PATH_MAX+1]; /* hash table */ 64717c478bd9Sstevel@tonic-gate char *p = dirstack; 64727c478bd9Sstevel@tonic-gate char *q = name; 64737c478bd9Sstevel@tonic-gate char *savp; 64747c478bd9Sstevel@tonic-gate 64757c478bd9Sstevel@tonic-gate if (q) { 64767c478bd9Sstevel@tonic-gate /* 64777c478bd9Sstevel@tonic-gate * Find common prefix 64787c478bd9Sstevel@tonic-gate */ 64797c478bd9Sstevel@tonic-gate 64807c478bd9Sstevel@tonic-gate while (*p == *q && *p) { 64817c478bd9Sstevel@tonic-gate p++; q++; 64827c478bd9Sstevel@tonic-gate } 64837c478bd9Sstevel@tonic-gate } 64847c478bd9Sstevel@tonic-gate 64857c478bd9Sstevel@tonic-gate savp = p; 64867c478bd9Sstevel@tonic-gate while (*p) { 64877c478bd9Sstevel@tonic-gate /* 64887c478bd9Sstevel@tonic-gate * Not a child: unwind the stack, setting the times. 64897c478bd9Sstevel@tonic-gate * The order we do this doesn't matter, so we go "forward." 64907c478bd9Sstevel@tonic-gate */ 64917c478bd9Sstevel@tonic-gate 64927c478bd9Sstevel@tonic-gate if (*p == '/') 64937c478bd9Sstevel@tonic-gate if (modtimes[p - dirstack].tv_sec >= 0) { 64947c478bd9Sstevel@tonic-gate *p = '\0'; /* zap the slash */ 64957c478bd9Sstevel@tonic-gate setPathTimes(AT_FDCWD, dirstack, 64967c478bd9Sstevel@tonic-gate modtimes[p - dirstack]); 64977c478bd9Sstevel@tonic-gate *p = '/'; 64987c478bd9Sstevel@tonic-gate } 64997c478bd9Sstevel@tonic-gate ++p; 65007c478bd9Sstevel@tonic-gate } 65017c478bd9Sstevel@tonic-gate 65027c478bd9Sstevel@tonic-gate p = savp; 65037c478bd9Sstevel@tonic-gate 65047c478bd9Sstevel@tonic-gate /* 65057c478bd9Sstevel@tonic-gate * Push this one on the "stack" 65067c478bd9Sstevel@tonic-gate */ 65077c478bd9Sstevel@tonic-gate 65087c478bd9Sstevel@tonic-gate if (q) { 65097c478bd9Sstevel@tonic-gate 65107c478bd9Sstevel@tonic-gate /* 65117c478bd9Sstevel@tonic-gate * Since the name parameter points the dir pathname 65127c478bd9Sstevel@tonic-gate * which is limited only to contain PATH_MAX chars 65137c478bd9Sstevel@tonic-gate * at maximum, we can ignore the overflow case of p. 65147c478bd9Sstevel@tonic-gate */ 65157c478bd9Sstevel@tonic-gate 65167c478bd9Sstevel@tonic-gate while ((*p = *q++)) { /* append the rest of the new dir */ 65177c478bd9Sstevel@tonic-gate modtimes[p - dirstack].tv_sec = -1; 65187c478bd9Sstevel@tonic-gate p++; 65197c478bd9Sstevel@tonic-gate } 65207c478bd9Sstevel@tonic-gate 65217c478bd9Sstevel@tonic-gate /* 65227c478bd9Sstevel@tonic-gate * If the tar file had used 'P' or 'E' function modifier, 65237c478bd9Sstevel@tonic-gate * append the last slash. 65247c478bd9Sstevel@tonic-gate */ 65257c478bd9Sstevel@tonic-gate if (*(p - 1) != '/') { 65267c478bd9Sstevel@tonic-gate *p++ = '/'; 65277c478bd9Sstevel@tonic-gate *p = '\0'; 65287c478bd9Sstevel@tonic-gate } 65297c478bd9Sstevel@tonic-gate /* overwrite the last one */ 65307c478bd9Sstevel@tonic-gate modtimes[p - dirstack - 1] = modTime; 65317c478bd9Sstevel@tonic-gate } 65327c478bd9Sstevel@tonic-gate } 65337c478bd9Sstevel@tonic-gate 65347c478bd9Sstevel@tonic-gate 65357c478bd9Sstevel@tonic-gate /* 65367c478bd9Sstevel@tonic-gate * setPathTimes - set the modification time for given path. Return 1 if 65377c478bd9Sstevel@tonic-gate * successful and 0 if not successful. 65387c478bd9Sstevel@tonic-gate */ 65397c478bd9Sstevel@tonic-gate 65407c478bd9Sstevel@tonic-gate static void 65417c478bd9Sstevel@tonic-gate setPathTimes(int dirfd, char *path, timestruc_t modTime) 65427c478bd9Sstevel@tonic-gate 65437c478bd9Sstevel@tonic-gate { 65447c478bd9Sstevel@tonic-gate struct timeval timebuf[2]; 65457c478bd9Sstevel@tonic-gate 65467c478bd9Sstevel@tonic-gate /* 65477c478bd9Sstevel@tonic-gate * futimesat takes an array of two timeval structs. 65487c478bd9Sstevel@tonic-gate * The first entry contains access time. 65497c478bd9Sstevel@tonic-gate * The second entry contains modification time. 65507c478bd9Sstevel@tonic-gate * Unlike a timestruc_t, which uses nanoseconds, timeval uses 65517c478bd9Sstevel@tonic-gate * microseconds. 65527c478bd9Sstevel@tonic-gate */ 65537c478bd9Sstevel@tonic-gate timebuf[0].tv_sec = time((time_t *)0); 65547c478bd9Sstevel@tonic-gate timebuf[0].tv_usec = 0; 65557c478bd9Sstevel@tonic-gate timebuf[1].tv_sec = modTime.tv_sec; 65567c478bd9Sstevel@tonic-gate 65577c478bd9Sstevel@tonic-gate /* Extended header: use microseconds */ 65587c478bd9Sstevel@tonic-gate timebuf[1].tv_usec = (xhdr_flgs & _X_MTIME) ? modTime.tv_nsec/1000 : 0; 65597c478bd9Sstevel@tonic-gate 65607c478bd9Sstevel@tonic-gate if (futimesat(dirfd, path, timebuf) < 0) 65618e4a71aeSRich Burridge vperror(0, gettext("can't set time on %s"), path); 65627c478bd9Sstevel@tonic-gate } 65637c478bd9Sstevel@tonic-gate 65647c478bd9Sstevel@tonic-gate 65657c478bd9Sstevel@tonic-gate /* 65667c478bd9Sstevel@tonic-gate * If hflag is set then delete the symbolic link's target. 65677c478bd9Sstevel@tonic-gate * If !hflag then delete the target. 65687c478bd9Sstevel@tonic-gate */ 65697c478bd9Sstevel@tonic-gate 65707c478bd9Sstevel@tonic-gate static void 65712c0f0499Slovely delete_target(int fd, char *comp, char *namep) 65727c478bd9Sstevel@tonic-gate { 65737c478bd9Sstevel@tonic-gate struct stat xtractbuf; 65747c478bd9Sstevel@tonic-gate char buf[PATH_MAX + 1]; 65757c478bd9Sstevel@tonic-gate int n; 65767c478bd9Sstevel@tonic-gate 65777c478bd9Sstevel@tonic-gate 65782c0f0499Slovely if (unlinkat(fd, comp, AT_REMOVEDIR) < 0) { 65797c478bd9Sstevel@tonic-gate if (errno == ENOTDIR && !hflag) { 65802c0f0499Slovely (void) unlinkat(fd, comp, 0); 65817c478bd9Sstevel@tonic-gate } else if (errno == ENOTDIR && hflag) { 65827c478bd9Sstevel@tonic-gate if (!lstat(namep, &xtractbuf)) { 65837c478bd9Sstevel@tonic-gate if ((xtractbuf.st_mode & S_IFMT) != S_IFLNK) { 65842c0f0499Slovely (void) unlinkat(fd, comp, 0); 65857c478bd9Sstevel@tonic-gate } else if ((n = readlink(namep, buf, 65867c478bd9Sstevel@tonic-gate PATH_MAX)) != -1) { 65877c478bd9Sstevel@tonic-gate buf[n] = (char)NULL; 65887c478bd9Sstevel@tonic-gate (void) unlinkat(fd, buf, 65897c478bd9Sstevel@tonic-gate AT_REMOVEDIR); 65907c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 65917c478bd9Sstevel@tonic-gate (void) unlinkat(fd, buf, 0); 65927c478bd9Sstevel@tonic-gate } else { 65932c0f0499Slovely (void) unlinkat(fd, comp, 0); 65947c478bd9Sstevel@tonic-gate } 65957c478bd9Sstevel@tonic-gate } else { 65962c0f0499Slovely (void) unlinkat(fd, comp, 0); 65977c478bd9Sstevel@tonic-gate } 65987c478bd9Sstevel@tonic-gate } 65997c478bd9Sstevel@tonic-gate } 66007c478bd9Sstevel@tonic-gate } 66017c478bd9Sstevel@tonic-gate 66027c478bd9Sstevel@tonic-gate 66037c478bd9Sstevel@tonic-gate /* 66047c478bd9Sstevel@tonic-gate * ACL changes: 66057c478bd9Sstevel@tonic-gate * putfile(): 66067c478bd9Sstevel@tonic-gate * Get acl info after stat. Write out ancillary file 66077c478bd9Sstevel@tonic-gate * before the normal file, i.e. directory, regular, FIFO, 66087c478bd9Sstevel@tonic-gate * link, special. If acl count is less than 4, no need to 66097c478bd9Sstevel@tonic-gate * create ancillary file. (i.e. standard permission is in 66107c478bd9Sstevel@tonic-gate * use. 66117c478bd9Sstevel@tonic-gate * doxtract(): 66127c478bd9Sstevel@tonic-gate * Process ancillary file. Read it in and set acl info. 66137c478bd9Sstevel@tonic-gate * watch out for 'o' function modifier. 66147c478bd9Sstevel@tonic-gate * 't' function letter to display table 66157c478bd9Sstevel@tonic-gate */ 66167c478bd9Sstevel@tonic-gate 66177c478bd9Sstevel@tonic-gate /* 66187c478bd9Sstevel@tonic-gate * New functions for ACLs and other security attributes 66197c478bd9Sstevel@tonic-gate */ 66207c478bd9Sstevel@tonic-gate 66217c478bd9Sstevel@tonic-gate /* 66227c478bd9Sstevel@tonic-gate * The function appends the new security attribute info to the end of 66237c478bd9Sstevel@tonic-gate * existing secinfo. 66247c478bd9Sstevel@tonic-gate */ 66257c478bd9Sstevel@tonic-gate int 66267c478bd9Sstevel@tonic-gate append_secattr( 66277c478bd9Sstevel@tonic-gate char **secinfo, /* existing security info */ 66287c478bd9Sstevel@tonic-gate int *secinfo_len, /* length of existing security info */ 662945916cd2Sjpk int size, /* new attribute size: unit depends on type */ 663045916cd2Sjpk char *attrtext, /* new attribute text */ 663145916cd2Sjpk char attr_type) /* new attribute type */ 66327c478bd9Sstevel@tonic-gate { 66337c478bd9Sstevel@tonic-gate char *new_secinfo; 66347c478bd9Sstevel@tonic-gate int newattrsize; 66357c478bd9Sstevel@tonic-gate int oldsize; 663645916cd2Sjpk struct sec_attr *attr; 66377c478bd9Sstevel@tonic-gate 66387c478bd9Sstevel@tonic-gate /* no need to add */ 663945916cd2Sjpk if (attr_type != DIR_TYPE) { 664045916cd2Sjpk if (attrtext == NULL) 66417c478bd9Sstevel@tonic-gate return (0); 664245916cd2Sjpk } 66437c478bd9Sstevel@tonic-gate 664445916cd2Sjpk switch (attr_type) { 664545916cd2Sjpk case UFSD_ACL: 664645916cd2Sjpk case ACE_ACL: 66477c478bd9Sstevel@tonic-gate if (attrtext == NULL) { 66488e4a71aeSRich Burridge (void) fprintf(stderr, gettext("acltotext failed\n")); 66497c478bd9Sstevel@tonic-gate return (-1); 66507c478bd9Sstevel@tonic-gate } 66517c478bd9Sstevel@tonic-gate /* header: type + size = 8 */ 66527c478bd9Sstevel@tonic-gate newattrsize = 8 + (int)strlen(attrtext) + 1; 66537c478bd9Sstevel@tonic-gate attr = (struct sec_attr *)malloc(newattrsize); 66547c478bd9Sstevel@tonic-gate if (attr == NULL) { 66558e4a71aeSRich Burridge (void) fprintf(stderr, 66568e4a71aeSRich Burridge gettext("can't allocate memory\n")); 66577c478bd9Sstevel@tonic-gate return (-1); 66587c478bd9Sstevel@tonic-gate } 665945916cd2Sjpk attr->attr_type = attr_type; 66607c478bd9Sstevel@tonic-gate (void) sprintf(attr->attr_len, 666145916cd2Sjpk "%06o", size); /* acl entry count */ 66627c478bd9Sstevel@tonic-gate (void) strcpy((char *)&attr->attr_info[0], attrtext); 66637c478bd9Sstevel@tonic-gate free(attrtext); 66647c478bd9Sstevel@tonic-gate break; 66657c478bd9Sstevel@tonic-gate 666645916cd2Sjpk /* Trusted Extensions */ 666745916cd2Sjpk case DIR_TYPE: 666845916cd2Sjpk case LBL_TYPE: 666945916cd2Sjpk newattrsize = sizeof (struct sec_attr) + strlen(attrtext); 667045916cd2Sjpk attr = (struct sec_attr *)malloc(newattrsize); 667145916cd2Sjpk if (attr == NULL) { 667245916cd2Sjpk (void) fprintf(stderr, 667345916cd2Sjpk gettext("can't allocate memory\n")); 667445916cd2Sjpk return (-1); 667545916cd2Sjpk } 667645916cd2Sjpk attr->attr_type = attr_type; 667745916cd2Sjpk (void) sprintf(attr->attr_len, 667845916cd2Sjpk "%06d", size); /* len of attr data */ 667945916cd2Sjpk (void) strcpy((char *)&attr->attr_info[0], attrtext); 668045916cd2Sjpk break; 66817c478bd9Sstevel@tonic-gate 66827c478bd9Sstevel@tonic-gate default: 66838e4a71aeSRich Burridge (void) fprintf(stderr, 66848e4a71aeSRich Burridge gettext("unrecognized attribute type\n")); 66857c478bd9Sstevel@tonic-gate return (-1); 66867c478bd9Sstevel@tonic-gate } 66877c478bd9Sstevel@tonic-gate 66887c478bd9Sstevel@tonic-gate /* old security info + new attr header(8) + new attr */ 66897c478bd9Sstevel@tonic-gate oldsize = *secinfo_len; 66907c478bd9Sstevel@tonic-gate *secinfo_len += newattrsize; 66917c478bd9Sstevel@tonic-gate new_secinfo = (char *)malloc(*secinfo_len); 66927c478bd9Sstevel@tonic-gate if (new_secinfo == NULL) { 66938e4a71aeSRich Burridge (void) fprintf(stderr, gettext("can't allocate memory\n")); 66947c478bd9Sstevel@tonic-gate *secinfo_len -= newattrsize; 669545916cd2Sjpk free(attr); 66967c478bd9Sstevel@tonic-gate return (-1); 66977c478bd9Sstevel@tonic-gate } 66987c478bd9Sstevel@tonic-gate 66997c478bd9Sstevel@tonic-gate (void) memcpy(new_secinfo, *secinfo, oldsize); 67007c478bd9Sstevel@tonic-gate (void) memcpy(new_secinfo + oldsize, attr, newattrsize); 67017c478bd9Sstevel@tonic-gate 67027c478bd9Sstevel@tonic-gate free(*secinfo); 670345916cd2Sjpk free(attr); 67047c478bd9Sstevel@tonic-gate *secinfo = new_secinfo; 67057c478bd9Sstevel@tonic-gate return (0); 67067c478bd9Sstevel@tonic-gate } 67077c478bd9Sstevel@tonic-gate 67087c478bd9Sstevel@tonic-gate /* 67097c478bd9Sstevel@tonic-gate * write_ancillary(): write out an ancillary file. 67107c478bd9Sstevel@tonic-gate * The file has the same header as normal file except the type and size 67117c478bd9Sstevel@tonic-gate * fields. The type is 'A' and size is the sum of all attributes 67127c478bd9Sstevel@tonic-gate * in bytes. 67137c478bd9Sstevel@tonic-gate * The body contains a list of attribute type, size and info. Currently, 67147c478bd9Sstevel@tonic-gate * there is only ACL info. This file is put before the normal file. 67157c478bd9Sstevel@tonic-gate */ 67167c478bd9Sstevel@tonic-gate void 67177c478bd9Sstevel@tonic-gate write_ancillary(union hblock *dblockp, char *secinfo, int len, char hdrtype) 67187c478bd9Sstevel@tonic-gate { 67197c478bd9Sstevel@tonic-gate long blocks; 67207c478bd9Sstevel@tonic-gate int savflag; 67217c478bd9Sstevel@tonic-gate int savsize; 67227c478bd9Sstevel@tonic-gate 67237c478bd9Sstevel@tonic-gate /* Just tranditional permissions or no security attribute info */ 67247c478bd9Sstevel@tonic-gate if (len == 0 || secinfo == NULL) 67257c478bd9Sstevel@tonic-gate return; 67267c478bd9Sstevel@tonic-gate 67277c478bd9Sstevel@tonic-gate /* save flag and size */ 67287c478bd9Sstevel@tonic-gate savflag = (dblockp->dbuf).typeflag; 67297c478bd9Sstevel@tonic-gate (void) sscanf(dblockp->dbuf.size, "%12o", (uint_t *)&savsize); 67307c478bd9Sstevel@tonic-gate 67317c478bd9Sstevel@tonic-gate /* special flag for ancillary file */ 67327c478bd9Sstevel@tonic-gate if (hdrtype == _XATTR_HDRTYPE) 67337c478bd9Sstevel@tonic-gate dblockp->dbuf.typeflag = _XATTR_HDRTYPE; 67347c478bd9Sstevel@tonic-gate else 67357c478bd9Sstevel@tonic-gate dblockp->dbuf.typeflag = 'A'; 67367c478bd9Sstevel@tonic-gate 67377c478bd9Sstevel@tonic-gate /* for pre-2.5 versions of tar, need to make sure */ 67387c478bd9Sstevel@tonic-gate /* the ACL file is readable */ 67397c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mode, "%07lo", 67407c478bd9Sstevel@tonic-gate (stbuf.st_mode & POSIXMODES) | 0000200); 67417c478bd9Sstevel@tonic-gate (void) sprintf(dblockp->dbuf.size, "%011o", len); 67427c478bd9Sstevel@tonic-gate (void) sprintf(dblockp->dbuf.chksum, "%07o", checksum(dblockp)); 67437c478bd9Sstevel@tonic-gate 67447c478bd9Sstevel@tonic-gate /* write out the header */ 67457c478bd9Sstevel@tonic-gate (void) writetbuf((char *)dblockp, 1); 67467c478bd9Sstevel@tonic-gate 67477c478bd9Sstevel@tonic-gate /* write out security info */ 67487c478bd9Sstevel@tonic-gate blocks = TBLOCKS(len); 67497c478bd9Sstevel@tonic-gate (void) writetbuf((char *)secinfo, (int)blocks); 67507c478bd9Sstevel@tonic-gate 67517c478bd9Sstevel@tonic-gate /* restore mode, flag and size */ 67527c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mode, "%07lo", stbuf.st_mode & POSIXMODES); 67537c478bd9Sstevel@tonic-gate dblockp->dbuf.typeflag = savflag; 67547c478bd9Sstevel@tonic-gate (void) sprintf(dblockp->dbuf.size, "%011o", savsize); 67557c478bd9Sstevel@tonic-gate } 67567c478bd9Sstevel@tonic-gate 67577c478bd9Sstevel@tonic-gate /* 67587c478bd9Sstevel@tonic-gate * Read the data record for extended headers and then the regular header. 67597c478bd9Sstevel@tonic-gate * The data are read into the buffer and then null-terminated. Entries 6760e765faefSRich Burridge * for typeflag 'X' extended headers are of the format: 67617c478bd9Sstevel@tonic-gate * "%d %s=%s\n" 67627c478bd9Sstevel@tonic-gate * 67637c478bd9Sstevel@tonic-gate * When an extended header record is found, the extended header must 67647c478bd9Sstevel@tonic-gate * be processed and its values used to override the values in the 67657c478bd9Sstevel@tonic-gate * normal header. The way this is done is to process the extended 67667c478bd9Sstevel@tonic-gate * header data record and set the data values, then call getdir 67677c478bd9Sstevel@tonic-gate * to process the regular header, then then to reconcile the two 67687c478bd9Sstevel@tonic-gate * sets of data. 67697c478bd9Sstevel@tonic-gate */ 67707c478bd9Sstevel@tonic-gate 67717c478bd9Sstevel@tonic-gate static int 67727c478bd9Sstevel@tonic-gate get_xdata(void) 67737c478bd9Sstevel@tonic-gate { 67747c478bd9Sstevel@tonic-gate struct keylist_pair { 67757c478bd9Sstevel@tonic-gate int keynum; 67767c478bd9Sstevel@tonic-gate char *keylist; 67777c478bd9Sstevel@tonic-gate } keylist_pair[] = { _X_DEVMAJOR, "SUN.devmajor", 67787c478bd9Sstevel@tonic-gate _X_DEVMINOR, "SUN.devminor", 67797c478bd9Sstevel@tonic-gate _X_GID, "gid", 67807c478bd9Sstevel@tonic-gate _X_GNAME, "gname", 67817c478bd9Sstevel@tonic-gate _X_LINKPATH, "linkpath", 67827c478bd9Sstevel@tonic-gate _X_PATH, "path", 67837c478bd9Sstevel@tonic-gate _X_SIZE, "size", 67847c478bd9Sstevel@tonic-gate _X_UID, "uid", 67857c478bd9Sstevel@tonic-gate _X_UNAME, "uname", 67867c478bd9Sstevel@tonic-gate _X_MTIME, "mtime", 67877c478bd9Sstevel@tonic-gate _X_LAST, "NULL" }; 67887c478bd9Sstevel@tonic-gate char *lineloc; 67897c478bd9Sstevel@tonic-gate int length, i; 67907c478bd9Sstevel@tonic-gate char *keyword, *value; 67917c478bd9Sstevel@tonic-gate blkcnt_t nblocks; 67927c478bd9Sstevel@tonic-gate int bufneeded; 67937c478bd9Sstevel@tonic-gate int errors; 67947c478bd9Sstevel@tonic-gate 6795123523f8Sas158974 (void) memset(&Xtarhdr, 0, sizeof (Xtarhdr)); 67967c478bd9Sstevel@tonic-gate xhdr_count++; 67977c478bd9Sstevel@tonic-gate errors = 0; 67987c478bd9Sstevel@tonic-gate 67997c478bd9Sstevel@tonic-gate nblocks = TBLOCKS(stbuf.st_size); 68007c478bd9Sstevel@tonic-gate bufneeded = nblocks * TBLOCK; 68017c478bd9Sstevel@tonic-gate if (bufneeded >= xrec_size) { 68027c478bd9Sstevel@tonic-gate free(xrec_ptr); 68037c478bd9Sstevel@tonic-gate xrec_size = bufneeded + 1; 68047c478bd9Sstevel@tonic-gate if ((xrec_ptr = malloc(xrec_size)) == NULL) 68057c478bd9Sstevel@tonic-gate fatal(gettext("cannot allocate buffer")); 68067c478bd9Sstevel@tonic-gate } 68077c478bd9Sstevel@tonic-gate 68087c478bd9Sstevel@tonic-gate lineloc = xrec_ptr; 68097c478bd9Sstevel@tonic-gate 68107c478bd9Sstevel@tonic-gate while (nblocks-- > 0) { 68117c478bd9Sstevel@tonic-gate readtape(lineloc); 68127c478bd9Sstevel@tonic-gate lineloc += TBLOCK; 68137c478bd9Sstevel@tonic-gate } 68147c478bd9Sstevel@tonic-gate lineloc = xrec_ptr; 68157c478bd9Sstevel@tonic-gate xrec_ptr[stbuf.st_size] = '\0'; 68167c478bd9Sstevel@tonic-gate while (lineloc < xrec_ptr + stbuf.st_size) { 6817e765faefSRich Burridge if (dblock.dbuf.typeflag == 'L') { 6818e765faefSRich Burridge length = xrec_size; 6819e765faefSRich Burridge keyword = "path"; 6820e765faefSRich Burridge value = lineloc; 6821e765faefSRich Burridge } else { 68227c478bd9Sstevel@tonic-gate length = atoi(lineloc); 68237c478bd9Sstevel@tonic-gate *(lineloc + length - 1) = '\0'; 68247c478bd9Sstevel@tonic-gate keyword = strchr(lineloc, ' ') + 1; 68257c478bd9Sstevel@tonic-gate value = strchr(keyword, '=') + 1; 68267c478bd9Sstevel@tonic-gate *(value - 1) = '\0'; 6827e765faefSRich Burridge } 68287c478bd9Sstevel@tonic-gate i = 0; 68297c478bd9Sstevel@tonic-gate lineloc += length; 68307c478bd9Sstevel@tonic-gate while (keylist_pair[i].keynum != (int)_X_LAST) { 68317c478bd9Sstevel@tonic-gate if (strcmp(keyword, keylist_pair[i].keylist) == 0) 68327c478bd9Sstevel@tonic-gate break; 68337c478bd9Sstevel@tonic-gate i++; 68347c478bd9Sstevel@tonic-gate } 68357c478bd9Sstevel@tonic-gate errno = 0; 68367c478bd9Sstevel@tonic-gate switch (keylist_pair[i].keynum) { 68377c478bd9Sstevel@tonic-gate case _X_DEVMAJOR: 68387c478bd9Sstevel@tonic-gate Xtarhdr.x_devmajor = (major_t)strtoul(value, NULL, 0); 68397c478bd9Sstevel@tonic-gate if (errno) { 68407c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 68417c478bd9Sstevel@tonic-gate "tar: Extended header major value error " 68427c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 68437c478bd9Sstevel@tonic-gate errors++; 68447c478bd9Sstevel@tonic-gate } else 68457c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMAJOR; 68467c478bd9Sstevel@tonic-gate break; 68477c478bd9Sstevel@tonic-gate case _X_DEVMINOR: 68487c478bd9Sstevel@tonic-gate Xtarhdr.x_devminor = (minor_t)strtoul(value, NULL, 0); 68497c478bd9Sstevel@tonic-gate if (errno) { 68507c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 68517c478bd9Sstevel@tonic-gate "tar: Extended header minor value error " 68527c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 68537c478bd9Sstevel@tonic-gate errors++; 68547c478bd9Sstevel@tonic-gate } else 68557c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMINOR; 68567c478bd9Sstevel@tonic-gate break; 68577c478bd9Sstevel@tonic-gate case _X_GID: 68587c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_GID; 68597c478bd9Sstevel@tonic-gate Xtarhdr.x_gid = strtol(value, NULL, 0); 68607c478bd9Sstevel@tonic-gate if ((errno) || (Xtarhdr.x_gid > UID_MAX)) { 68617c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 68627c478bd9Sstevel@tonic-gate "tar: Extended header gid value error " 68637c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 68647c478bd9Sstevel@tonic-gate Xtarhdr.x_gid = GID_NOBODY; 68657c478bd9Sstevel@tonic-gate } 68667c478bd9Sstevel@tonic-gate break; 68677c478bd9Sstevel@tonic-gate case _X_GNAME: 68687c478bd9Sstevel@tonic-gate if (utf8_local("gname", &Xtarhdr.x_gname, 68697c478bd9Sstevel@tonic-gate local_gname, value, _POSIX_NAME_MAX) == 0) 68707c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_GNAME; 68717c478bd9Sstevel@tonic-gate break; 68727c478bd9Sstevel@tonic-gate case _X_LINKPATH: 68737c478bd9Sstevel@tonic-gate if (utf8_local("linkpath", &Xtarhdr.x_linkpath, 68747c478bd9Sstevel@tonic-gate local_linkpath, value, PATH_MAX) == 0) 68757c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_LINKPATH; 68767c478bd9Sstevel@tonic-gate else 68777c478bd9Sstevel@tonic-gate errors++; 68787c478bd9Sstevel@tonic-gate break; 68797c478bd9Sstevel@tonic-gate case _X_PATH: 68807c478bd9Sstevel@tonic-gate if (utf8_local("path", &Xtarhdr.x_path, 68817c478bd9Sstevel@tonic-gate local_path, value, PATH_MAX) == 0) 68827c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_PATH; 68837c478bd9Sstevel@tonic-gate else 68847c478bd9Sstevel@tonic-gate errors++; 68857c478bd9Sstevel@tonic-gate break; 68867c478bd9Sstevel@tonic-gate case _X_SIZE: 68877c478bd9Sstevel@tonic-gate Xtarhdr.x_filesz = strtoull(value, NULL, 0); 68887c478bd9Sstevel@tonic-gate if (errno) { 68897c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 68907c478bd9Sstevel@tonic-gate "tar: Extended header invalid filesize " 68917c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 68927c478bd9Sstevel@tonic-gate errors++; 68937c478bd9Sstevel@tonic-gate } else 68947c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_SIZE; 68957c478bd9Sstevel@tonic-gate break; 68967c478bd9Sstevel@tonic-gate case _X_UID: 68977c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_UID; 68987c478bd9Sstevel@tonic-gate Xtarhdr.x_uid = strtol(value, NULL, 0); 68997c478bd9Sstevel@tonic-gate if ((errno) || (Xtarhdr.x_uid > UID_MAX)) { 69007c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 69017c478bd9Sstevel@tonic-gate "tar: Extended header uid value error " 69027c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 69037c478bd9Sstevel@tonic-gate Xtarhdr.x_uid = UID_NOBODY; 69047c478bd9Sstevel@tonic-gate } 69057c478bd9Sstevel@tonic-gate break; 69067c478bd9Sstevel@tonic-gate case _X_UNAME: 69077c478bd9Sstevel@tonic-gate if (utf8_local("uname", &Xtarhdr.x_uname, 69087c478bd9Sstevel@tonic-gate local_uname, value, _POSIX_NAME_MAX) == 0) 69097c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_UNAME; 69107c478bd9Sstevel@tonic-gate break; 69117c478bd9Sstevel@tonic-gate case _X_MTIME: 69127c478bd9Sstevel@tonic-gate get_xtime(value, &(Xtarhdr.x_mtime)); 69137c478bd9Sstevel@tonic-gate if (errno) 69147c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 69157c478bd9Sstevel@tonic-gate "tar: Extended header modification time " 69167c478bd9Sstevel@tonic-gate "value error for file # %llu.\n"), 69177c478bd9Sstevel@tonic-gate xhdr_count); 69187c478bd9Sstevel@tonic-gate else 69197c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_MTIME; 69207c478bd9Sstevel@tonic-gate break; 69217c478bd9Sstevel@tonic-gate default: 69227c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 69237c478bd9Sstevel@tonic-gate gettext("tar: unrecognized extended" 69247c478bd9Sstevel@tonic-gate " header keyword '%s'. Ignored.\n"), keyword); 69257c478bd9Sstevel@tonic-gate break; 69267c478bd9Sstevel@tonic-gate } 69277c478bd9Sstevel@tonic-gate } 69287c478bd9Sstevel@tonic-gate 69297c478bd9Sstevel@tonic-gate getdir(); /* get regular header */ 69307c478bd9Sstevel@tonic-gate if (errors && errflag) 69317c478bd9Sstevel@tonic-gate done(1); 69327c478bd9Sstevel@tonic-gate else 69337c478bd9Sstevel@tonic-gate if (errors) 69347c478bd9Sstevel@tonic-gate Errflg = 1; 69357c478bd9Sstevel@tonic-gate return (errors); 69367c478bd9Sstevel@tonic-gate } 69377c478bd9Sstevel@tonic-gate 69387c478bd9Sstevel@tonic-gate /* 6939123523f8Sas158974 * load_info_from_xtarhdr - sets Gen and stbuf variables from 6940123523f8Sas158974 * extended header 6941123523f8Sas158974 * load_info_from_xtarhdr(flag, xhdrp); 6942123523f8Sas158974 * u_longlong_t flag; xhdr_flgs 6943123523f8Sas158974 * struct xtar_hdr *xhdrp; pointer to extended header 6944123523f8Sas158974 * NOTE: called when typeflag is not 'A' and xhdr_flgs 6945123523f8Sas158974 * is set. 6946123523f8Sas158974 */ 6947123523f8Sas158974 static void 6948123523f8Sas158974 load_info_from_xtarhdr(u_longlong_t flag, struct xtar_hdr *xhdrp) 6949123523f8Sas158974 { 6950123523f8Sas158974 if (flag & _X_DEVMAJOR) { 6951123523f8Sas158974 Gen.g_devmajor = xhdrp->x_devmajor; 6952123523f8Sas158974 } 6953123523f8Sas158974 if (flag & _X_DEVMINOR) { 6954123523f8Sas158974 Gen.g_devminor = xhdrp->x_devminor; 6955123523f8Sas158974 } 6956123523f8Sas158974 if (flag & _X_GID) { 6957123523f8Sas158974 Gen.g_gid = xhdrp->x_gid; 6958123523f8Sas158974 stbuf.st_gid = xhdrp->x_gid; 6959123523f8Sas158974 } 6960123523f8Sas158974 if (flag & _X_UID) { 6961123523f8Sas158974 Gen.g_uid = xhdrp->x_uid; 6962123523f8Sas158974 stbuf.st_uid = xhdrp->x_uid; 6963123523f8Sas158974 } 6964123523f8Sas158974 if (flag & _X_SIZE) { 6965123523f8Sas158974 Gen.g_filesz = xhdrp->x_filesz; 6966123523f8Sas158974 stbuf.st_size = xhdrp->x_filesz; 6967123523f8Sas158974 } 6968123523f8Sas158974 if (flag & _X_MTIME) { 6969123523f8Sas158974 Gen.g_mtime = xhdrp->x_mtime.tv_sec; 6970123523f8Sas158974 stbuf.st_mtim.tv_sec = xhdrp->x_mtime.tv_sec; 6971123523f8Sas158974 stbuf.st_mtim.tv_nsec = xhdrp->x_mtime.tv_nsec; 6972123523f8Sas158974 } 6973123523f8Sas158974 } 6974123523f8Sas158974 6975123523f8Sas158974 /* 69767c478bd9Sstevel@tonic-gate * gen_num creates a string from a keyword and an usigned long long in the 69777c478bd9Sstevel@tonic-gate * format: %d %s=%s\n 69787c478bd9Sstevel@tonic-gate * This is part of the extended header data record. 69797c478bd9Sstevel@tonic-gate */ 69807c478bd9Sstevel@tonic-gate 69817c478bd9Sstevel@tonic-gate void 69827c478bd9Sstevel@tonic-gate gen_num(const char *keyword, const u_longlong_t number) 69837c478bd9Sstevel@tonic-gate { 69847c478bd9Sstevel@tonic-gate char save_val[ULONGLONG_MAX_DIGITS + 1]; 69857c478bd9Sstevel@tonic-gate int len; 69867c478bd9Sstevel@tonic-gate char *curr_ptr; 69877c478bd9Sstevel@tonic-gate 69887c478bd9Sstevel@tonic-gate (void) sprintf(save_val, "%llu", number); 69897c478bd9Sstevel@tonic-gate /* 69907c478bd9Sstevel@tonic-gate * len = length of entire line, including itself. len will be 69917c478bd9Sstevel@tonic-gate * two digits. So, add the string lengths plus the length of len, 69927c478bd9Sstevel@tonic-gate * plus a blank, an equal sign, and a newline. 69937c478bd9Sstevel@tonic-gate */ 69947c478bd9Sstevel@tonic-gate len = strlen(save_val) + strlen(keyword) + 5; 69957c478bd9Sstevel@tonic-gate if (xrec_offset + len > xrec_size) { 69967c478bd9Sstevel@tonic-gate if (((curr_ptr = realloc(xrec_ptr, 2 * xrec_size)) == NULL)) 69977c478bd9Sstevel@tonic-gate fatal(gettext( 69987c478bd9Sstevel@tonic-gate "cannot allocate extended header buffer")); 69997c478bd9Sstevel@tonic-gate xrec_ptr = curr_ptr; 70007c478bd9Sstevel@tonic-gate xrec_size *= 2; 70017c478bd9Sstevel@tonic-gate } 70027c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset], 70037c478bd9Sstevel@tonic-gate "%d %s=%s\n", len, keyword, save_val); 70047c478bd9Sstevel@tonic-gate xrec_offset += len; 70057c478bd9Sstevel@tonic-gate } 70067c478bd9Sstevel@tonic-gate 70077c478bd9Sstevel@tonic-gate /* 70087c478bd9Sstevel@tonic-gate * gen_date creates a string from a keyword and a timestruc_t in the 70097c478bd9Sstevel@tonic-gate * format: %d %s=%s\n 70107c478bd9Sstevel@tonic-gate * This is part of the extended header data record. 70117c478bd9Sstevel@tonic-gate * Currently, granularity is only microseconds, so the low-order three digits 70127c478bd9Sstevel@tonic-gate * will be truncated. 70137c478bd9Sstevel@tonic-gate */ 70147c478bd9Sstevel@tonic-gate 70157c478bd9Sstevel@tonic-gate void 70167c478bd9Sstevel@tonic-gate gen_date(const char *keyword, const timestruc_t time_value) 70177c478bd9Sstevel@tonic-gate { 70187c478bd9Sstevel@tonic-gate /* Allow for <seconds>.<nanoseconds>\n */ 70197c478bd9Sstevel@tonic-gate char save_val[TIME_MAX_DIGITS + LONG_MAX_DIGITS + 2]; 70207c478bd9Sstevel@tonic-gate int len; 70217c478bd9Sstevel@tonic-gate char *curr_ptr; 70227c478bd9Sstevel@tonic-gate 70237c478bd9Sstevel@tonic-gate (void) sprintf(save_val, "%ld", time_value.tv_sec); 70247c478bd9Sstevel@tonic-gate len = strlen(save_val); 70257c478bd9Sstevel@tonic-gate save_val[len] = '.'; 70267c478bd9Sstevel@tonic-gate (void) sprintf(&save_val[len + 1], "%9.9ld", time_value.tv_nsec); 70277c478bd9Sstevel@tonic-gate 70287c478bd9Sstevel@tonic-gate /* 70297c478bd9Sstevel@tonic-gate * len = length of entire line, including itself. len will be 70307c478bd9Sstevel@tonic-gate * two digits. So, add the string lengths plus the length of len, 70317c478bd9Sstevel@tonic-gate * plus a blank, an equal sign, and a newline. 70327c478bd9Sstevel@tonic-gate */ 70337c478bd9Sstevel@tonic-gate len = strlen(save_val) + strlen(keyword) + 5; 70347c478bd9Sstevel@tonic-gate if (xrec_offset + len > xrec_size) { 70357c478bd9Sstevel@tonic-gate if (((curr_ptr = realloc(xrec_ptr, 2 * xrec_size)) == NULL)) 70367c478bd9Sstevel@tonic-gate fatal(gettext( 70377c478bd9Sstevel@tonic-gate "cannot allocate extended header buffer")); 70387c478bd9Sstevel@tonic-gate xrec_ptr = curr_ptr; 70397c478bd9Sstevel@tonic-gate xrec_size *= 2; 70407c478bd9Sstevel@tonic-gate } 70417c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset], 70427c478bd9Sstevel@tonic-gate "%d %s=%s\n", len, keyword, save_val); 70437c478bd9Sstevel@tonic-gate xrec_offset += len; 70447c478bd9Sstevel@tonic-gate } 70457c478bd9Sstevel@tonic-gate 70467c478bd9Sstevel@tonic-gate /* 70477c478bd9Sstevel@tonic-gate * gen_string creates a string from a keyword and a char * in the 70487c478bd9Sstevel@tonic-gate * format: %d %s=%s\n 70497c478bd9Sstevel@tonic-gate * This is part of the extended header data record. 70507c478bd9Sstevel@tonic-gate */ 70517c478bd9Sstevel@tonic-gate 70527c478bd9Sstevel@tonic-gate void 70537c478bd9Sstevel@tonic-gate gen_string(const char *keyword, const char *value) 70547c478bd9Sstevel@tonic-gate { 70557c478bd9Sstevel@tonic-gate int len; 70567c478bd9Sstevel@tonic-gate char *curr_ptr; 70577c478bd9Sstevel@tonic-gate 70587c478bd9Sstevel@tonic-gate /* 70597c478bd9Sstevel@tonic-gate * len = length of entire line, including itself. The character length 70607c478bd9Sstevel@tonic-gate * of len must be 1-4 characters, because the maximum size of the path 70617c478bd9Sstevel@tonic-gate * or the name is PATH_MAX, which is 1024. So, assume 1 character 70627c478bd9Sstevel@tonic-gate * for len, one for the space, one for the "=", and one for the newline. 70637c478bd9Sstevel@tonic-gate * Then adjust as needed. 70647c478bd9Sstevel@tonic-gate */ 70657c478bd9Sstevel@tonic-gate /* LINTED constant expression */ 70667c478bd9Sstevel@tonic-gate assert(PATH_MAX <= 9996); 70677c478bd9Sstevel@tonic-gate len = strlen(value) + strlen(keyword) + 4; 70687c478bd9Sstevel@tonic-gate if (len > 997) 70697c478bd9Sstevel@tonic-gate len += 3; 70707c478bd9Sstevel@tonic-gate else if (len > 98) 70717c478bd9Sstevel@tonic-gate len += 2; 70727c478bd9Sstevel@tonic-gate else if (len > 9) 70737c478bd9Sstevel@tonic-gate len += 1; 70747c478bd9Sstevel@tonic-gate if (xrec_offset + len > xrec_size) { 70757c478bd9Sstevel@tonic-gate if (((curr_ptr = realloc(xrec_ptr, 2 * xrec_size)) == NULL)) 70767c478bd9Sstevel@tonic-gate fatal(gettext( 70777c478bd9Sstevel@tonic-gate "cannot allocate extended header buffer")); 70787c478bd9Sstevel@tonic-gate xrec_ptr = curr_ptr; 70797c478bd9Sstevel@tonic-gate xrec_size *= 2; 70807c478bd9Sstevel@tonic-gate } 70817c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG 70827c478bd9Sstevel@tonic-gate if (strcmp(keyword+1, "name") != 0) 70837c478bd9Sstevel@tonic-gate #endif 70847c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset], 70857c478bd9Sstevel@tonic-gate "%d %s=%s\n", len, keyword, value); 70867c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG 70877c478bd9Sstevel@tonic-gate else { 70887c478bd9Sstevel@tonic-gate len += 11; 70897c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset], 70907c478bd9Sstevel@tonic-gate "%d %s=%snametoolong\n", len, keyword, value); 70917c478bd9Sstevel@tonic-gate } 70927c478bd9Sstevel@tonic-gate #endif 70937c478bd9Sstevel@tonic-gate xrec_offset += len; 70947c478bd9Sstevel@tonic-gate } 70957c478bd9Sstevel@tonic-gate 70967c478bd9Sstevel@tonic-gate /* 70977c478bd9Sstevel@tonic-gate * Convert time found in the extended header data to seconds and nanoseconds. 70987c478bd9Sstevel@tonic-gate */ 70997c478bd9Sstevel@tonic-gate 71007c478bd9Sstevel@tonic-gate void 71017c478bd9Sstevel@tonic-gate get_xtime(char *value, timestruc_t *xtime) 71027c478bd9Sstevel@tonic-gate { 71037c478bd9Sstevel@tonic-gate char nanosec[10]; 71047c478bd9Sstevel@tonic-gate char *period; 71057c478bd9Sstevel@tonic-gate int i; 71067c478bd9Sstevel@tonic-gate 71077c478bd9Sstevel@tonic-gate (void) memset(nanosec, '0', 9); 71087c478bd9Sstevel@tonic-gate nanosec[9] = '\0'; 71097c478bd9Sstevel@tonic-gate 71107c478bd9Sstevel@tonic-gate period = strchr(value, '.'); 71117c478bd9Sstevel@tonic-gate if (period != NULL) 71127c478bd9Sstevel@tonic-gate period[0] = '\0'; 71137c478bd9Sstevel@tonic-gate xtime->tv_sec = strtol(value, NULL, 10); 71147c478bd9Sstevel@tonic-gate if (period == NULL) 71157c478bd9Sstevel@tonic-gate xtime->tv_nsec = 0; 71167c478bd9Sstevel@tonic-gate else { 71177c478bd9Sstevel@tonic-gate i = strlen(period +1); 71187c478bd9Sstevel@tonic-gate (void) strncpy(nanosec, period + 1, min(i, 9)); 71197c478bd9Sstevel@tonic-gate xtime->tv_nsec = strtol(nanosec, NULL, 10); 71207c478bd9Sstevel@tonic-gate } 71217c478bd9Sstevel@tonic-gate } 71227c478bd9Sstevel@tonic-gate 71237c478bd9Sstevel@tonic-gate /* 71247c478bd9Sstevel@tonic-gate * Check linkpath for length. 71257c478bd9Sstevel@tonic-gate * Emit an error message and return 1 if too long. 71267c478bd9Sstevel@tonic-gate */ 71277c478bd9Sstevel@tonic-gate 71287c478bd9Sstevel@tonic-gate int 71297c478bd9Sstevel@tonic-gate chk_path_build( 71307c478bd9Sstevel@tonic-gate char *name, 71317c478bd9Sstevel@tonic-gate char *longname, 71327c478bd9Sstevel@tonic-gate char *linkname, 71337c478bd9Sstevel@tonic-gate char *prefix, 71347c478bd9Sstevel@tonic-gate char type, 71357c478bd9Sstevel@tonic-gate int filetype) 71367c478bd9Sstevel@tonic-gate { 71377c478bd9Sstevel@tonic-gate 71387c478bd9Sstevel@tonic-gate if (strlen(linkname) > (size_t)NAMSIZ) { 71397c478bd9Sstevel@tonic-gate if (Eflag > 0) { 71407c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_LINKPATH; 71417c478bd9Sstevel@tonic-gate Xtarhdr.x_linkpath = linkname; 71427c478bd9Sstevel@tonic-gate } else { 71437c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 71447c478bd9Sstevel@tonic-gate "tar: %s: linked to %s\n"), longname, linkname); 71457c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 71467c478bd9Sstevel@tonic-gate "tar: %s: linked name too long\n"), linkname); 71477c478bd9Sstevel@tonic-gate if (errflag) 71487c478bd9Sstevel@tonic-gate done(1); 71497c478bd9Sstevel@tonic-gate else 71507c478bd9Sstevel@tonic-gate Errflg = 1; 71517c478bd9Sstevel@tonic-gate return (1); 71527c478bd9Sstevel@tonic-gate } 71537c478bd9Sstevel@tonic-gate } 71547c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) 71557c478bd9Sstevel@tonic-gate return (build_dblock(name, tchar, type, 71567c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_dev, 71577c478bd9Sstevel@tonic-gate prefix)); 71587c478bd9Sstevel@tonic-gate else 71597c478bd9Sstevel@tonic-gate return (build_dblock(name, linkname, type, 71607c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_dev, prefix)); 71617c478bd9Sstevel@tonic-gate } 71627c478bd9Sstevel@tonic-gate 71637c478bd9Sstevel@tonic-gate /* 71647c478bd9Sstevel@tonic-gate * Convert from UTF-8 to local character set. 71657c478bd9Sstevel@tonic-gate */ 71667c478bd9Sstevel@tonic-gate 71677c478bd9Sstevel@tonic-gate static int 71687c478bd9Sstevel@tonic-gate utf8_local( 71697c478bd9Sstevel@tonic-gate char *option, 71707c478bd9Sstevel@tonic-gate char **Xhdr_ptrptr, 71717c478bd9Sstevel@tonic-gate char *target, 71727c478bd9Sstevel@tonic-gate const char *source, 71737c478bd9Sstevel@tonic-gate int max_val) 71747c478bd9Sstevel@tonic-gate { 71757c478bd9Sstevel@tonic-gate static iconv_t iconv_cd; 71767c478bd9Sstevel@tonic-gate char *nl_target; 71777c478bd9Sstevel@tonic-gate const char *iconv_src; 71787c478bd9Sstevel@tonic-gate char *iconv_trg; 7179eace40a5Sceastha size_t inlen; 7180eace40a5Sceastha size_t outlen; 71817c478bd9Sstevel@tonic-gate 71827c478bd9Sstevel@tonic-gate if (charset_type == -1) { /* iconv_open failed in earlier try */ 71837c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 71847c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion failed.\n"), 71857c478bd9Sstevel@tonic-gate xhdr_count, source); 71867c478bd9Sstevel@tonic-gate return (1); 71877c478bd9Sstevel@tonic-gate } else if (charset_type == 0) { /* iconv_open has not yet been done */ 71887c478bd9Sstevel@tonic-gate nl_target = nl_langinfo(CODESET); 71897c478bd9Sstevel@tonic-gate if (strlen(nl_target) == 0) /* locale using 7-bit codeset */ 71907c478bd9Sstevel@tonic-gate nl_target = "646"; 71917c478bd9Sstevel@tonic-gate if (strcmp(nl_target, "646") == 0) 71927c478bd9Sstevel@tonic-gate charset_type = 1; 71937c478bd9Sstevel@tonic-gate else if (strcmp(nl_target, "UTF-8") == 0) 71947c478bd9Sstevel@tonic-gate charset_type = 3; 71957c478bd9Sstevel@tonic-gate else { 71967c478bd9Sstevel@tonic-gate if (strncmp(nl_target, "ISO", 3) == 0) 71977c478bd9Sstevel@tonic-gate nl_target += 3; 71987c478bd9Sstevel@tonic-gate charset_type = 2; 71997c478bd9Sstevel@tonic-gate errno = 0; 72007c478bd9Sstevel@tonic-gate if ((iconv_cd = iconv_open(nl_target, "UTF-8")) == 72017c478bd9Sstevel@tonic-gate (iconv_t)-1) { 72027c478bd9Sstevel@tonic-gate if (errno == EINVAL) 72037c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72047c478bd9Sstevel@tonic-gate "tar: conversion routines not " 72057c478bd9Sstevel@tonic-gate "available for current locale. ")); 72067c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72077c478bd9Sstevel@tonic-gate "file # %llu: (%s) UTF-8 conversion" 72087c478bd9Sstevel@tonic-gate " failed.\n"), xhdr_count, source); 72097c478bd9Sstevel@tonic-gate charset_type = -1; 72107c478bd9Sstevel@tonic-gate return (1); 72117c478bd9Sstevel@tonic-gate } 72127c478bd9Sstevel@tonic-gate } 72137c478bd9Sstevel@tonic-gate } 72147c478bd9Sstevel@tonic-gate 72157c478bd9Sstevel@tonic-gate /* locale using 7-bit codeset or UTF-8 locale */ 72167c478bd9Sstevel@tonic-gate if (charset_type == 1 || charset_type == 3) { 72177c478bd9Sstevel@tonic-gate if (strlen(source) > max_val) { 72187c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72197c478bd9Sstevel@tonic-gate "tar: file # %llu: Extended header %s too long.\n"), 72207c478bd9Sstevel@tonic-gate xhdr_count, option); 72217c478bd9Sstevel@tonic-gate return (1); 72227c478bd9Sstevel@tonic-gate } 72237c478bd9Sstevel@tonic-gate if (charset_type == 3) 72247c478bd9Sstevel@tonic-gate (void) strcpy(target, source); 72257c478bd9Sstevel@tonic-gate else if (c_utf8(target, source) != 0) { 72267c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72277c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion" 72287c478bd9Sstevel@tonic-gate " failed.\n"), xhdr_count, source); 72297c478bd9Sstevel@tonic-gate return (1); 72307c478bd9Sstevel@tonic-gate } 72317c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target; 72327c478bd9Sstevel@tonic-gate return (0); 72337c478bd9Sstevel@tonic-gate } 72347c478bd9Sstevel@tonic-gate 72357c478bd9Sstevel@tonic-gate iconv_src = source; 72367c478bd9Sstevel@tonic-gate iconv_trg = target; 72377c478bd9Sstevel@tonic-gate inlen = strlen(source); 72387c478bd9Sstevel@tonic-gate outlen = max_val * UTF_8_FACTOR; 72397c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) == 72407c478bd9Sstevel@tonic-gate (size_t)-1) { /* Error occurred: didn't convert */ 72417c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72427c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion failed.\n"), 72437c478bd9Sstevel@tonic-gate xhdr_count, source); 72447c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */ 72457c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL; 72467c478bd9Sstevel@tonic-gate inlen = 0; 72477c478bd9Sstevel@tonic-gate (void) iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen); 72487c478bd9Sstevel@tonic-gate return (1); 72497c478bd9Sstevel@tonic-gate } 72507c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */ 72517c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL; 72527c478bd9Sstevel@tonic-gate inlen = 0; 72537c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) == 72547c478bd9Sstevel@tonic-gate (size_t)-1) { /* Error occurred: didn't convert */ 72557c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72567c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion failed.\n"), 72577c478bd9Sstevel@tonic-gate xhdr_count, source); 72587c478bd9Sstevel@tonic-gate return (1); 72597c478bd9Sstevel@tonic-gate } 72607c478bd9Sstevel@tonic-gate 72617c478bd9Sstevel@tonic-gate *iconv_trg = '\0'; /* Null-terminate iconv output string */ 72627c478bd9Sstevel@tonic-gate if (strlen(target) > max_val) { 72637c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72647c478bd9Sstevel@tonic-gate "tar: file # %llu: Extended header %s too long.\n"), 72657c478bd9Sstevel@tonic-gate xhdr_count, option); 72667c478bd9Sstevel@tonic-gate return (1); 72677c478bd9Sstevel@tonic-gate } 72687c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target; 72697c478bd9Sstevel@tonic-gate return (0); 72707c478bd9Sstevel@tonic-gate } 72717c478bd9Sstevel@tonic-gate 72727c478bd9Sstevel@tonic-gate /* 72737c478bd9Sstevel@tonic-gate * Check gname, uname, path, and linkpath to see if they need to go in an 72747c478bd9Sstevel@tonic-gate * extended header. If they are already slated to be in an extended header, 72757c478bd9Sstevel@tonic-gate * or if they are not ascii, then they need to be in the extended header. 72767c478bd9Sstevel@tonic-gate * Then, convert all extended names to UTF-8. 72777c478bd9Sstevel@tonic-gate */ 72787c478bd9Sstevel@tonic-gate 72797c478bd9Sstevel@tonic-gate int 72807c478bd9Sstevel@tonic-gate gen_utf8_names(const char *filename) 72817c478bd9Sstevel@tonic-gate { 72827c478bd9Sstevel@tonic-gate static iconv_t iconv_cd; 72837c478bd9Sstevel@tonic-gate char *nl_target; 72847c478bd9Sstevel@tonic-gate char tempbuf[MAXNAM + 1]; 7285eace40a5Sceastha int nbytes; 7286eace40a5Sceastha int errors; 72877c478bd9Sstevel@tonic-gate 72887c478bd9Sstevel@tonic-gate if (charset_type == -1) { /* Previous failure to open. */ 72897c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72907c478bd9Sstevel@tonic-gate "tar: file # %llu: UTF-8 conversion failed.\n"), 72917c478bd9Sstevel@tonic-gate xhdr_count); 72927c478bd9Sstevel@tonic-gate return (1); 72937c478bd9Sstevel@tonic-gate } 72947c478bd9Sstevel@tonic-gate 72957c478bd9Sstevel@tonic-gate if (charset_type == 0) { /* Need to get conversion descriptor */ 72967c478bd9Sstevel@tonic-gate nl_target = nl_langinfo(CODESET); 72977c478bd9Sstevel@tonic-gate if (strlen(nl_target) == 0) /* locale using 7-bit codeset */ 72987c478bd9Sstevel@tonic-gate nl_target = "646"; 72997c478bd9Sstevel@tonic-gate if (strcmp(nl_target, "646") == 0) 73007c478bd9Sstevel@tonic-gate charset_type = 1; 73017c478bd9Sstevel@tonic-gate else if (strcmp(nl_target, "UTF-8") == 0) 73027c478bd9Sstevel@tonic-gate charset_type = 3; 73037c478bd9Sstevel@tonic-gate else { 73047c478bd9Sstevel@tonic-gate if (strncmp(nl_target, "ISO", 3) == 0) 73057c478bd9Sstevel@tonic-gate nl_target += 3; 73067c478bd9Sstevel@tonic-gate charset_type = 2; 73077c478bd9Sstevel@tonic-gate errno = 0; 73087c478bd9Sstevel@tonic-gate #ifdef ICONV_DEBUG 73097c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 73108e4a71aeSRich Burridge gettext("Opening iconv_cd with target %s\n"), 73117c478bd9Sstevel@tonic-gate nl_target); 73127c478bd9Sstevel@tonic-gate #endif 73137c478bd9Sstevel@tonic-gate if ((iconv_cd = iconv_open("UTF-8", nl_target)) == 73147c478bd9Sstevel@tonic-gate (iconv_t)-1) { 73157c478bd9Sstevel@tonic-gate if (errno == EINVAL) 73167c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 73177c478bd9Sstevel@tonic-gate "tar: conversion routines not " 73187c478bd9Sstevel@tonic-gate "available for current locale. ")); 73197c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 73207c478bd9Sstevel@tonic-gate "file (%s): UTF-8 conversion failed.\n"), 73217c478bd9Sstevel@tonic-gate filename); 73227c478bd9Sstevel@tonic-gate charset_type = -1; 73237c478bd9Sstevel@tonic-gate return (1); 73247c478bd9Sstevel@tonic-gate } 73257c478bd9Sstevel@tonic-gate } 73267c478bd9Sstevel@tonic-gate } 73277c478bd9Sstevel@tonic-gate 73287c478bd9Sstevel@tonic-gate errors = 0; 73297c478bd9Sstevel@tonic-gate 73307c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_gname, local_gname, 73317c478bd9Sstevel@tonic-gate dblock.dbuf.gname, iconv_cd, _X_GNAME, _POSIX_NAME_MAX); 73327c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_uname, local_uname, 73337c478bd9Sstevel@tonic-gate dblock.dbuf.uname, iconv_cd, _X_UNAME, _POSIX_NAME_MAX); 73347c478bd9Sstevel@tonic-gate if ((xhdr_flgs & _X_LINKPATH) == 0) { /* Need null-terminated str. */ 73357c478bd9Sstevel@tonic-gate (void) strncpy(tempbuf, dblock.dbuf.linkname, NAMSIZ); 73367c478bd9Sstevel@tonic-gate tempbuf[NAMSIZ] = '\0'; 73377c478bd9Sstevel@tonic-gate } 73387c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_linkpath, local_linkpath, 73397c478bd9Sstevel@tonic-gate tempbuf, iconv_cd, _X_LINKPATH, PATH_MAX); 73407c478bd9Sstevel@tonic-gate if ((xhdr_flgs & _X_PATH) == 0) { /* Concatenate prefix & name */ 73417c478bd9Sstevel@tonic-gate (void) strncpy(tempbuf, dblock.dbuf.prefix, PRESIZ); 73420578ac30Ssr161167 tempbuf[PRESIZ] = '\0'; 73437c478bd9Sstevel@tonic-gate nbytes = strlen(tempbuf); 73447c478bd9Sstevel@tonic-gate if (nbytes > 0) { 73457c478bd9Sstevel@tonic-gate tempbuf[nbytes++] = '/'; 73467c478bd9Sstevel@tonic-gate tempbuf[nbytes] = '\0'; 73477c478bd9Sstevel@tonic-gate } 73480578ac30Ssr161167 (void) strncat(tempbuf + nbytes, dblock.dbuf.name, 73490578ac30Ssr161167 (MAXNAM - nbytes)); 73500578ac30Ssr161167 tempbuf[MAXNAM] = '\0'; 73517c478bd9Sstevel@tonic-gate } 73527c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_path, local_path, 73537c478bd9Sstevel@tonic-gate tempbuf, iconv_cd, _X_PATH, PATH_MAX); 73547c478bd9Sstevel@tonic-gate 73557c478bd9Sstevel@tonic-gate if (errors > 0) 73567c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 73577c478bd9Sstevel@tonic-gate "tar: file (%s): UTF-8 conversion failed.\n"), filename); 73587c478bd9Sstevel@tonic-gate 73597c478bd9Sstevel@tonic-gate if (errors && errflag) 73607c478bd9Sstevel@tonic-gate done(1); 73617c478bd9Sstevel@tonic-gate else 73627c478bd9Sstevel@tonic-gate if (errors) 73637c478bd9Sstevel@tonic-gate Errflg = 1; 73647c478bd9Sstevel@tonic-gate return (errors); 73657c478bd9Sstevel@tonic-gate } 73667c478bd9Sstevel@tonic-gate 73677c478bd9Sstevel@tonic-gate static int 73687c478bd9Sstevel@tonic-gate local_utf8( 73697c478bd9Sstevel@tonic-gate char **Xhdr_ptrptr, 73707c478bd9Sstevel@tonic-gate char *target, 73717c478bd9Sstevel@tonic-gate const char *source, 73727c478bd9Sstevel@tonic-gate iconv_t iconv_cd, 73737c478bd9Sstevel@tonic-gate int xhdrflg, 73747c478bd9Sstevel@tonic-gate int max_val) 73757c478bd9Sstevel@tonic-gate { 73767c478bd9Sstevel@tonic-gate const char *iconv_src; 73777c478bd9Sstevel@tonic-gate const char *starting_src; 73787c478bd9Sstevel@tonic-gate char *iconv_trg; 7379eace40a5Sceastha size_t inlen; 7380eace40a5Sceastha size_t outlen; 73817c478bd9Sstevel@tonic-gate #ifdef ICONV_DEBUG 73827c478bd9Sstevel@tonic-gate unsigned char c_to_hex; 73837c478bd9Sstevel@tonic-gate #endif 73847c478bd9Sstevel@tonic-gate 73857c478bd9Sstevel@tonic-gate /* 73867c478bd9Sstevel@tonic-gate * If the item is already slated for extended format, get the string 73877c478bd9Sstevel@tonic-gate * to convert from the extended header record. Otherwise, get it from 73887c478bd9Sstevel@tonic-gate * the regular (dblock) area. 73897c478bd9Sstevel@tonic-gate */ 73907c478bd9Sstevel@tonic-gate if (xhdr_flgs & xhdrflg) { 73917c478bd9Sstevel@tonic-gate if (charset_type == 3) { /* Already UTF-8, just copy */ 73927c478bd9Sstevel@tonic-gate (void) strcpy(target, *Xhdr_ptrptr); 73937c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target; 73947c478bd9Sstevel@tonic-gate return (0); 73957c478bd9Sstevel@tonic-gate } else 73967c478bd9Sstevel@tonic-gate iconv_src = (const char *) *Xhdr_ptrptr; 73977c478bd9Sstevel@tonic-gate } else { 73987c478bd9Sstevel@tonic-gate if (charset_type == 3) /* Already in UTF-8 format */ 73997c478bd9Sstevel@tonic-gate return (0); /* Don't create xhdr record */ 74007c478bd9Sstevel@tonic-gate iconv_src = source; 74017c478bd9Sstevel@tonic-gate } 74027c478bd9Sstevel@tonic-gate starting_src = iconv_src; 74037c478bd9Sstevel@tonic-gate iconv_trg = target; 74047c478bd9Sstevel@tonic-gate if ((inlen = strlen(iconv_src)) == 0) 74057c478bd9Sstevel@tonic-gate return (0); 74067c478bd9Sstevel@tonic-gate 74077c478bd9Sstevel@tonic-gate if (charset_type == 1) { /* locale using 7-bit codeset */ 74087c478bd9Sstevel@tonic-gate if (c_utf8(target, starting_src) != 0) { 74097c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 74107c478bd9Sstevel@tonic-gate gettext("tar: invalid character in" 74117c478bd9Sstevel@tonic-gate " UTF-8 conversion of '%s'\n"), starting_src); 74127c478bd9Sstevel@tonic-gate return (1); 74137c478bd9Sstevel@tonic-gate } 74147c478bd9Sstevel@tonic-gate return (0); 74157c478bd9Sstevel@tonic-gate } 74167c478bd9Sstevel@tonic-gate 74177c478bd9Sstevel@tonic-gate outlen = max_val * UTF_8_FACTOR; 74187c478bd9Sstevel@tonic-gate errno = 0; 74197c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) == 74207c478bd9Sstevel@tonic-gate (size_t)-1) { 74217c478bd9Sstevel@tonic-gate /* An error occurred, or not all characters were converted */ 74227c478bd9Sstevel@tonic-gate if (errno == EILSEQ) 74237c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 74247c478bd9Sstevel@tonic-gate gettext("tar: invalid character in" 74257c478bd9Sstevel@tonic-gate " UTF-8 conversion of '%s'\n"), starting_src); 74267c478bd9Sstevel@tonic-gate else 74277c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 74287c478bd9Sstevel@tonic-gate "tar: conversion to UTF-8 aborted for '%s'.\n"), 74297c478bd9Sstevel@tonic-gate starting_src); 74307c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */ 74317c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL; 74327c478bd9Sstevel@tonic-gate inlen = 0; 74337c478bd9Sstevel@tonic-gate (void) iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen); 74347c478bd9Sstevel@tonic-gate return (1); 74357c478bd9Sstevel@tonic-gate } 74367c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */ 74377c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL; 74387c478bd9Sstevel@tonic-gate inlen = 0; 74397c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) == 74407c478bd9Sstevel@tonic-gate (size_t)-1) { /* Error occurred: didn't convert */ 74417c478bd9Sstevel@tonic-gate if (errno == EILSEQ) 74427c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 74437c478bd9Sstevel@tonic-gate gettext("tar: invalid character in" 74447c478bd9Sstevel@tonic-gate " UTF-8 conversion of '%s'\n"), starting_src); 74457c478bd9Sstevel@tonic-gate else 74467c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 74477c478bd9Sstevel@tonic-gate "tar: conversion to UTF-8 aborted for '%s'.\n"), 74487c478bd9Sstevel@tonic-gate starting_src); 74497c478bd9Sstevel@tonic-gate return (1); 74507c478bd9Sstevel@tonic-gate } 74517c478bd9Sstevel@tonic-gate 74527c478bd9Sstevel@tonic-gate *iconv_trg = '\0'; /* Null-terminate iconv output string */ 74537c478bd9Sstevel@tonic-gate if (strcmp(starting_src, target) != 0) { 74547c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target; 74557c478bd9Sstevel@tonic-gate xhdr_flgs |= xhdrflg; 74567c478bd9Sstevel@tonic-gate #ifdef ICONV_DEBUG 74577c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "*** inlen: %d %d; outlen: %d %d\n", 74587c478bd9Sstevel@tonic-gate strlen(starting_src), inlen, max_val, outlen); 74597c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "Input string:\n "); 74607c478bd9Sstevel@tonic-gate for (inlen = 0; inlen < strlen(starting_src); inlen++) { 74617c478bd9Sstevel@tonic-gate c_to_hex = (unsigned char)starting_src[inlen]; 74627c478bd9Sstevel@tonic-gate (void) fprintf(stderr, " %2.2x", c_to_hex); 74637c478bd9Sstevel@tonic-gate if (inlen % 20 == 19) 74647c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n "); 74657c478bd9Sstevel@tonic-gate } 74667c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\nOutput string:\n "); 74677c478bd9Sstevel@tonic-gate for (inlen = 0; inlen < strlen(target); inlen++) { 74687c478bd9Sstevel@tonic-gate c_to_hex = (unsigned char)target[inlen]; 74697c478bd9Sstevel@tonic-gate (void) fprintf(stderr, " %2.2x", c_to_hex); 74707c478bd9Sstevel@tonic-gate if (inlen % 20 == 19) 74717c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n "); 74727c478bd9Sstevel@tonic-gate } 74737c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n"); 74747c478bd9Sstevel@tonic-gate #endif 74757c478bd9Sstevel@tonic-gate } 74767c478bd9Sstevel@tonic-gate 74777c478bd9Sstevel@tonic-gate return (0); 74787c478bd9Sstevel@tonic-gate } 74797c478bd9Sstevel@tonic-gate 74807c478bd9Sstevel@tonic-gate /* 74817c478bd9Sstevel@tonic-gate * Function to test each byte of the source string to make sure it is 74827c478bd9Sstevel@tonic-gate * in within bounds (value between 0 and 127). 74837c478bd9Sstevel@tonic-gate * If valid, copy source to target. 74847c478bd9Sstevel@tonic-gate */ 74857c478bd9Sstevel@tonic-gate 74867c478bd9Sstevel@tonic-gate int 74877c478bd9Sstevel@tonic-gate c_utf8(char *target, const char *source) 74887c478bd9Sstevel@tonic-gate { 74897c478bd9Sstevel@tonic-gate size_t len; 74907c478bd9Sstevel@tonic-gate const char *thischar; 74917c478bd9Sstevel@tonic-gate 74927c478bd9Sstevel@tonic-gate len = strlen(source); 74937c478bd9Sstevel@tonic-gate thischar = source; 74947c478bd9Sstevel@tonic-gate while (len-- > 0) { 74957c478bd9Sstevel@tonic-gate if (!isascii((int)(*thischar++))) 74967c478bd9Sstevel@tonic-gate return (1); 74977c478bd9Sstevel@tonic-gate } 74987c478bd9Sstevel@tonic-gate 74997c478bd9Sstevel@tonic-gate (void) strcpy(target, source); 75007c478bd9Sstevel@tonic-gate return (0); 75017c478bd9Sstevel@tonic-gate } 75027c478bd9Sstevel@tonic-gate 75037c478bd9Sstevel@tonic-gate 75047c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 75057c478bd9Sstevel@tonic-gate #define ROUNDTOTBLOCK(a) ((a + (TBLOCK -1)) & ~(TBLOCK -1)) 75067c478bd9Sstevel@tonic-gate 75077c478bd9Sstevel@tonic-gate static void 75087c478bd9Sstevel@tonic-gate prepare_xattr( 75097c478bd9Sstevel@tonic-gate char **attrbuf, 75107c478bd9Sstevel@tonic-gate char *filename, 7511da6c28aaSamw char *attrpath, 75127c478bd9Sstevel@tonic-gate char typeflag, 75137c478bd9Sstevel@tonic-gate struct linkbuf *linkinfo, 75147c478bd9Sstevel@tonic-gate int *rlen) 75157c478bd9Sstevel@tonic-gate { 75167c478bd9Sstevel@tonic-gate char *bufhead; /* ptr to full buffer */ 7517da6c28aaSamw char *aptr; 75187c478bd9Sstevel@tonic-gate struct xattr_hdr *hptr; /* ptr to header in bufhead */ 75197c478bd9Sstevel@tonic-gate struct xattr_buf *tptr; /* ptr to pathing pieces */ 75207c478bd9Sstevel@tonic-gate int totalen; /* total buffer length */ 75217c478bd9Sstevel@tonic-gate int len; /* length returned to user */ 75227c478bd9Sstevel@tonic-gate int stringlen; /* length of filename + attr */ 75237c478bd9Sstevel@tonic-gate /* 75247c478bd9Sstevel@tonic-gate * length of filename + attr 75257c478bd9Sstevel@tonic-gate * in link section 75267c478bd9Sstevel@tonic-gate */ 75277c478bd9Sstevel@tonic-gate int linkstringlen; 75287c478bd9Sstevel@tonic-gate int complen; /* length of pathing section */ 75297c478bd9Sstevel@tonic-gate int linklen; /* length of link section */ 7530da6c28aaSamw int attrnames_index; /* attrnames starting index */ 75317c478bd9Sstevel@tonic-gate 75327c478bd9Sstevel@tonic-gate /* 75337c478bd9Sstevel@tonic-gate * Release previous buffer 75347c478bd9Sstevel@tonic-gate */ 75357c478bd9Sstevel@tonic-gate 75367c478bd9Sstevel@tonic-gate if (*attrbuf != (char *)NULL) { 75377c478bd9Sstevel@tonic-gate free(*attrbuf); 75387c478bd9Sstevel@tonic-gate *attrbuf = NULL; 75397c478bd9Sstevel@tonic-gate } 75407c478bd9Sstevel@tonic-gate 75417c478bd9Sstevel@tonic-gate /* 75427c478bd9Sstevel@tonic-gate * First add in fixed size stuff 75437c478bd9Sstevel@tonic-gate */ 75447c478bd9Sstevel@tonic-gate len = sizeof (struct xattr_hdr) + sizeof (struct xattr_buf); 75457c478bd9Sstevel@tonic-gate 75467c478bd9Sstevel@tonic-gate /* 75477c478bd9Sstevel@tonic-gate * Add space for two nulls 75487c478bd9Sstevel@tonic-gate */ 7549da6c28aaSamw stringlen = strlen(attrpath) + strlen(filename) + 2; 75507c478bd9Sstevel@tonic-gate complen = stringlen + sizeof (struct xattr_buf); 75517c478bd9Sstevel@tonic-gate 75527c478bd9Sstevel@tonic-gate len += stringlen; 75537c478bd9Sstevel@tonic-gate 75547c478bd9Sstevel@tonic-gate /* 75557c478bd9Sstevel@tonic-gate * Now add on space for link info if any 75567c478bd9Sstevel@tonic-gate */ 75577c478bd9Sstevel@tonic-gate 75587c478bd9Sstevel@tonic-gate if (linkinfo != NULL) { 75597c478bd9Sstevel@tonic-gate /* 75607c478bd9Sstevel@tonic-gate * Again add space for two nulls 75617c478bd9Sstevel@tonic-gate */ 75627c478bd9Sstevel@tonic-gate linkstringlen = strlen(linkinfo->pathname) + 75637c478bd9Sstevel@tonic-gate strlen(linkinfo->attrname) + 2; 7564da6c28aaSamw linklen = linkstringlen + sizeof (struct xattr_buf); 7565da6c28aaSamw len += linklen; 7566da6c28aaSamw } else { 7567da6c28aaSamw linklen = 0; 75687c478bd9Sstevel@tonic-gate } 75697c478bd9Sstevel@tonic-gate 75707c478bd9Sstevel@tonic-gate /* 75717c478bd9Sstevel@tonic-gate * Now add padding to end to fill out TBLOCK 75727c478bd9Sstevel@tonic-gate * 75737c478bd9Sstevel@tonic-gate * Function returns size of real data and not size + padding. 75747c478bd9Sstevel@tonic-gate */ 75757c478bd9Sstevel@tonic-gate 75767c478bd9Sstevel@tonic-gate totalen = ROUNDTOTBLOCK(len); 75777c478bd9Sstevel@tonic-gate 75787c478bd9Sstevel@tonic-gate if ((bufhead = calloc(1, totalen)) == NULL) { 75797c478bd9Sstevel@tonic-gate fatal(gettext("Out of memory.")); 75807c478bd9Sstevel@tonic-gate } 75817c478bd9Sstevel@tonic-gate 75827c478bd9Sstevel@tonic-gate 75837c478bd9Sstevel@tonic-gate /* 75847c478bd9Sstevel@tonic-gate * Now we can fill in the necessary pieces 75857c478bd9Sstevel@tonic-gate */ 75867c478bd9Sstevel@tonic-gate 75877c478bd9Sstevel@tonic-gate /* 75887c478bd9Sstevel@tonic-gate * first fill in the fixed header 75897c478bd9Sstevel@tonic-gate */ 75907c478bd9Sstevel@tonic-gate hptr = (struct xattr_hdr *)bufhead; 75917c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_version, "%s", XATTR_ARCH_VERS); 75927c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_component_len, "%0*d", 75937c478bd9Sstevel@tonic-gate sizeof (hptr->h_component_len) - 1, complen); 75947c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_link_component_len, "%0*d", 75957c478bd9Sstevel@tonic-gate sizeof (hptr->h_link_component_len) - 1, linklen); 75967c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_size, "%0*d", sizeof (hptr->h_size) - 1, len); 75977c478bd9Sstevel@tonic-gate 75987c478bd9Sstevel@tonic-gate /* 75997c478bd9Sstevel@tonic-gate * Now fill in the filename + attrnames section 7600da6c28aaSamw * The filename and attrnames section can be composed of two or more 7601da6c28aaSamw * path segments separated by a null character. The first segment 7602da6c28aaSamw * is the path to the parent file that roots the entire sequence in 7603da6c28aaSamw * the normal name space. The remaining segments describes a path 7604da6c28aaSamw * rooted at the hidden extended attribute directory of the leaf file of 7605da6c28aaSamw * the previous segment, making it possible to name attributes on 7606da6c28aaSamw * attributes. Thus, if we are just archiving an extended attribute, 7607da6c28aaSamw * the second segment will contain the attribute name. If we are 7608da6c28aaSamw * archiving a system attribute of an extended attribute, then the 7609da6c28aaSamw * second segment will contain the attribute name, and a third segment 7610da6c28aaSamw * will contain the system attribute name. The attribute pathing 7611da6c28aaSamw * information is obtained from 'attrpath'. 76127c478bd9Sstevel@tonic-gate */ 76137c478bd9Sstevel@tonic-gate 76147c478bd9Sstevel@tonic-gate tptr = (struct xattr_buf *)(bufhead + sizeof (struct xattr_hdr)); 76157c478bd9Sstevel@tonic-gate (void) sprintf(tptr->h_namesz, "%0*d", sizeof (tptr->h_namesz) - 1, 76167c478bd9Sstevel@tonic-gate stringlen); 76177c478bd9Sstevel@tonic-gate (void) strcpy(tptr->h_names, filename); 7618da6c28aaSamw attrnames_index = strlen(filename) + 1; 7619da6c28aaSamw (void) strcpy(&tptr->h_names[attrnames_index], attrpath); 76207c478bd9Sstevel@tonic-gate tptr->h_typeflag = typeflag; 76217c478bd9Sstevel@tonic-gate 76227c478bd9Sstevel@tonic-gate /* 7623da6c28aaSamw * Split the attrnames section into two segments if 'attrpath' 7624da6c28aaSamw * contains pathing information for a system attribute of an 7625da6c28aaSamw * extended attribute. We split them by replacing the '/' with 7626da6c28aaSamw * a '\0'. 7627da6c28aaSamw */ 7628da6c28aaSamw if ((aptr = strpbrk(&tptr->h_names[attrnames_index], "/")) != NULL) { 7629da6c28aaSamw *aptr = '\0'; 7630da6c28aaSamw } 7631da6c28aaSamw 7632da6c28aaSamw /* 76337c478bd9Sstevel@tonic-gate * Now fill in the optional link section if we have one 76347c478bd9Sstevel@tonic-gate */ 76357c478bd9Sstevel@tonic-gate 76367c478bd9Sstevel@tonic-gate if (linkinfo != (struct linkbuf *)NULL) { 76377c478bd9Sstevel@tonic-gate tptr = (struct xattr_buf *)(bufhead + 76387c478bd9Sstevel@tonic-gate sizeof (struct xattr_hdr) + complen); 76397c478bd9Sstevel@tonic-gate 76407c478bd9Sstevel@tonic-gate (void) sprintf(tptr->h_namesz, "%0*d", 76417c478bd9Sstevel@tonic-gate sizeof (tptr->h_namesz) - 1, linkstringlen); 76427c478bd9Sstevel@tonic-gate (void) strcpy(tptr->h_names, linkinfo->pathname); 76437c478bd9Sstevel@tonic-gate (void) strcpy( 76447c478bd9Sstevel@tonic-gate &tptr->h_names[strlen(linkinfo->pathname) + 1], 76457c478bd9Sstevel@tonic-gate linkinfo->attrname); 76467c478bd9Sstevel@tonic-gate tptr->h_typeflag = typeflag; 76477c478bd9Sstevel@tonic-gate } 76487c478bd9Sstevel@tonic-gate *attrbuf = (char *)bufhead; 76497c478bd9Sstevel@tonic-gate *rlen = len; 76507c478bd9Sstevel@tonic-gate } 76517c478bd9Sstevel@tonic-gate 76527c478bd9Sstevel@tonic-gate #else 76537c478bd9Sstevel@tonic-gate static void 76547c478bd9Sstevel@tonic-gate prepare_xattr( 76557c478bd9Sstevel@tonic-gate char **attrbuf, 76567c478bd9Sstevel@tonic-gate char *filename, 76577c478bd9Sstevel@tonic-gate char *attrname, 76587c478bd9Sstevel@tonic-gate char typeflag, 76597c478bd9Sstevel@tonic-gate struct linkbuf *linkinfo, 76607c478bd9Sstevel@tonic-gate int *rlen) 76617c478bd9Sstevel@tonic-gate { 76627c478bd9Sstevel@tonic-gate *attrbuf = NULL; 76637c478bd9Sstevel@tonic-gate *rlen = 0; 76647c478bd9Sstevel@tonic-gate } 76657c478bd9Sstevel@tonic-gate #endif 76667c478bd9Sstevel@tonic-gate 76677c478bd9Sstevel@tonic-gate int 7668da6c28aaSamw getstat(int dirfd, char *longname, char *shortname, char *attrparent) 76697c478bd9Sstevel@tonic-gate { 76707c478bd9Sstevel@tonic-gate 76717c478bd9Sstevel@tonic-gate int i, j; 76727c478bd9Sstevel@tonic-gate int printerr; 76737c478bd9Sstevel@tonic-gate int slnkerr; 76747c478bd9Sstevel@tonic-gate struct stat symlnbuf; 76757c478bd9Sstevel@tonic-gate 76767c478bd9Sstevel@tonic-gate if (!hflag) 76777c478bd9Sstevel@tonic-gate i = fstatat(dirfd, shortname, &stbuf, AT_SYMLINK_NOFOLLOW); 76787c478bd9Sstevel@tonic-gate else 76797c478bd9Sstevel@tonic-gate i = fstatat(dirfd, shortname, &stbuf, 0); 76807c478bd9Sstevel@tonic-gate 76817c478bd9Sstevel@tonic-gate if (i < 0) { 76827c478bd9Sstevel@tonic-gate /* Initialize flag to print error mesg. */ 76837c478bd9Sstevel@tonic-gate printerr = 1; 76847c478bd9Sstevel@tonic-gate /* 76857c478bd9Sstevel@tonic-gate * If stat is done, then need to do lstat 76867c478bd9Sstevel@tonic-gate * to determine whether it's a sym link 76877c478bd9Sstevel@tonic-gate */ 76887c478bd9Sstevel@tonic-gate if (hflag) { 76897c478bd9Sstevel@tonic-gate /* Save returned error */ 76907c478bd9Sstevel@tonic-gate slnkerr = errno; 76917c478bd9Sstevel@tonic-gate 76927c478bd9Sstevel@tonic-gate j = fstatat(dirfd, shortname, 76937c478bd9Sstevel@tonic-gate &symlnbuf, AT_SYMLINK_NOFOLLOW); 76947c478bd9Sstevel@tonic-gate /* 76957c478bd9Sstevel@tonic-gate * Suppress error message when file is a symbolic link 76967c478bd9Sstevel@tonic-gate * and function modifier 'l' is off. Exception: when 76977c478bd9Sstevel@tonic-gate * a symlink points to a symlink points to a 76987c478bd9Sstevel@tonic-gate * symlink ... and we get past MAXSYMLINKS. That 76997c478bd9Sstevel@tonic-gate * error will cause a file not to be archived, and 77007c478bd9Sstevel@tonic-gate * needs to be printed. 77017c478bd9Sstevel@tonic-gate */ 77027c478bd9Sstevel@tonic-gate if ((j == 0) && (!linkerrok) && (slnkerr != ELOOP) && 77037c478bd9Sstevel@tonic-gate (S_ISLNK(symlnbuf.st_mode))) 77047c478bd9Sstevel@tonic-gate printerr = 0; 77057c478bd9Sstevel@tonic-gate 77067c478bd9Sstevel@tonic-gate /* 77077c478bd9Sstevel@tonic-gate * Restore errno in case the lstat 77087c478bd9Sstevel@tonic-gate * on symbolic link change 77097c478bd9Sstevel@tonic-gate */ 77107c478bd9Sstevel@tonic-gate errno = slnkerr; 77117c478bd9Sstevel@tonic-gate } 77127c478bd9Sstevel@tonic-gate 77137c478bd9Sstevel@tonic-gate if (printerr) { 77147c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 7715da6c28aaSamw "tar: %s%s%s%s: %s\n"), 7716da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "), 7717da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 7718da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 7719da6c28aaSamw longname, strerror(errno)); 77207c478bd9Sstevel@tonic-gate Errflg = 1; 77217c478bd9Sstevel@tonic-gate } 77227c478bd9Sstevel@tonic-gate return (1); 77237c478bd9Sstevel@tonic-gate } 77247c478bd9Sstevel@tonic-gate return (0); 77257c478bd9Sstevel@tonic-gate } 77267c478bd9Sstevel@tonic-gate 7727da6c28aaSamw /* 7728da6c28aaSamw * Recursively archive the extended attributes and/or extended system attributes 7729da6c28aaSamw * of the base file, longname. Note: extended system attribute files will be 7730da6c28aaSamw * archived only if the extended system attributes are not transient (i.e. the 7731da6c28aaSamw * extended system attributes are other than the default values). 7732da6c28aaSamw * 7733da6c28aaSamw * If -@ was specified and the underlying file system supports it, archive the 7734da6c28aaSamw * extended attributes, and if there is a system attribute associated with the 7735da6c28aaSamw * extended attribute, then recursively call xattrs_put() to archive the 7736da6c28aaSamw * hidden attribute directory and the extended system attribute. If -/ was 7737da6c28aaSamw * specified and the underlying file system supports it, archive the extended 7738da6c28aaSamw * system attributes. Read-only extended system attributes are never archived. 7739da6c28aaSamw * 7740da6c28aaSamw * Currently, there cannot be attributes on attributes; only system 7741da6c28aaSamw * attributes on attributes. In addition, there cannot be attributes on 7742da6c28aaSamw * system attributes. A file and it's attribute directory hierarchy looks as 7743da6c28aaSamw * follows: 7744da6c28aaSamw * longname ----> . ("." is the hidden attribute directory) 7745da6c28aaSamw * | 7746da6c28aaSamw * ---------------------------- 7747da6c28aaSamw * | | 7748da6c28aaSamw * <sys_attr_name> <attr_name> ----> . 7749da6c28aaSamw * | 7750da6c28aaSamw * <sys_attr_name> 7751da6c28aaSamw * 7752da6c28aaSamw */ 77537c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 77547c478bd9Sstevel@tonic-gate static void 7755da6c28aaSamw xattrs_put(char *longname, char *shortname, char *parent, char *attrparent) 77567c478bd9Sstevel@tonic-gate { 7757da6c28aaSamw char *filename = (attrparent == NULL) ? shortname : attrparent; 7758da6c28aaSamw int arc_rwsysattr = 0; 77597c478bd9Sstevel@tonic-gate int dirfd; 7760da6c28aaSamw int fd = -1; 7761da6c28aaSamw int rw_sysattr = 0; 7762ced83f9bSceastha int ext_attr = 0; 7763da6c28aaSamw int rc; 77647c478bd9Sstevel@tonic-gate DIR *dirp; 77657c478bd9Sstevel@tonic-gate struct dirent *dp; 7766da6c28aaSamw attr_data_t *attrinfo = NULL; 77677c478bd9Sstevel@tonic-gate 7768da6c28aaSamw /* 7769da6c28aaSamw * If the underlying file system supports it, then archive the extended 7770da6c28aaSamw * attributes if -@ was specified, and the extended system attributes 7771da6c28aaSamw * if -/ was specified. 7772da6c28aaSamw */ 7773ced83f9bSceastha if (verify_attr_support(filename, (attrparent == NULL), ARC_CREATE, 7774ced83f9bSceastha &ext_attr) != ATTR_OK) { 77757c478bd9Sstevel@tonic-gate return; 77767c478bd9Sstevel@tonic-gate } 77777c478bd9Sstevel@tonic-gate 7778da6c28aaSamw /* 7779da6c28aaSamw * Only want to archive a read-write extended system attribute file 7780da6c28aaSamw * if it contains extended system attribute settings that are not the 7781da6c28aaSamw * default values. 7782da6c28aaSamw */ 7783da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 7784da6c28aaSamw if (saflag) { 7785da6c28aaSamw int filefd; 7786da6c28aaSamw nvlist_t *slist = NULL; 7787da6c28aaSamw 7788da6c28aaSamw /* Determine if there are non-transient system attributes */ 7789da6c28aaSamw errno = 0; 7790da6c28aaSamw if ((filefd = open(filename, O_RDONLY)) == -1) { 7791da6c28aaSamw if (attrparent == NULL) { 7792da6c28aaSamw vperror(0, gettext( 7793da6c28aaSamw "unable to open file %s"), longname); 7794da6c28aaSamw } 7795da6c28aaSamw return; 7796da6c28aaSamw } 7797da6c28aaSamw if (((slist = sysattr_list(basename(myname), filefd, 7798da6c28aaSamw filename)) != NULL) || (errno != 0)) { 7799da6c28aaSamw arc_rwsysattr = 1; 7800da6c28aaSamw } 7801da6c28aaSamw if (slist != NULL) { 7802da6c28aaSamw (void) nvlist_free(slist); 7803da6c28aaSamw slist = NULL; 7804da6c28aaSamw } 7805da6c28aaSamw (void) close(filefd); 7806da6c28aaSamw } 7807ced83f9bSceastha 7808ced83f9bSceastha /* 7809ced83f9bSceastha * If we aren't archiving extended system attributes, and we are 7810ced83f9bSceastha * processing an attribute, or if we are archiving extended system 7811ced83f9bSceastha * attributes, and there are are no extended attributes, then there's 7812ced83f9bSceastha * no need to open up the attribute directory of the file unless the 7813ced83f9bSceastha * extended system attributes are not transient (i.e, the system 7814ced83f9bSceastha * attributes are not the default values). 7815ced83f9bSceastha */ 7816ced83f9bSceastha if ((arc_rwsysattr == 0) && ((attrparent != NULL) || 7817ced83f9bSceastha (saflag && !ext_attr))) { 7818ced83f9bSceastha return; 7819ced83f9bSceastha } 7820da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 7821da6c28aaSamw 7822da6c28aaSamw /* open the parent attribute directory */ 7823da6c28aaSamw fd = attropen(filename, ".", O_RDONLY); 7824da6c28aaSamw if (fd < 0) { 7825da6c28aaSamw vperror(0, gettext( 7826da6c28aaSamw "unable to open attribute directory for %s%s%sfile %s"), 7827da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "), 7828da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 7829da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 78307c478bd9Sstevel@tonic-gate longname); 78317c478bd9Sstevel@tonic-gate return; 78327c478bd9Sstevel@tonic-gate } 78337c478bd9Sstevel@tonic-gate 7834da6c28aaSamw /* 7835da6c28aaSamw * We need to change into the parent's attribute directory to determine 7836da6c28aaSamw * if each of the attributes should be archived. 7837da6c28aaSamw */ 7838da6c28aaSamw if (fchdir(fd) < 0) { 7839da6c28aaSamw vperror(0, gettext( 7840da6c28aaSamw "cannot change to attribute directory of %s%s%sfile %s"), 7841da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "), 7842da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 7843da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 7844da6c28aaSamw longname); 7845da6c28aaSamw (void) close(fd); 7846da6c28aaSamw return; 7847da6c28aaSamw } 7848da6c28aaSamw 7849da6c28aaSamw if (((dirfd = dup(fd)) == -1) || 7850da6c28aaSamw ((dirp = fdopendir(dirfd)) == NULL)) { 78517c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 7852da6c28aaSamw "tar: unable to open dir pointer for %s%s%sfile %s\n"), 7853da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "), 7854da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 7855da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 7856da6c28aaSamw longname); 7857da6c28aaSamw if (fd > 0) { 7858da6c28aaSamw (void) close(fd); 7859da6c28aaSamw } 78607c478bd9Sstevel@tonic-gate return; 78617c478bd9Sstevel@tonic-gate } 78627c478bd9Sstevel@tonic-gate 78637c478bd9Sstevel@tonic-gate while (dp = readdir(dirp)) { 7864da6c28aaSamw if (strcmp(dp->d_name, "..") == 0) { 78657c478bd9Sstevel@tonic-gate continue; 7866da6c28aaSamw } else if (strcmp(dp->d_name, ".") == 0) { 78677c478bd9Sstevel@tonic-gate Hiddendir = 1; 7868da6c28aaSamw } else { 78697c478bd9Sstevel@tonic-gate Hiddendir = 0; 7870da6c28aaSamw } 78717c478bd9Sstevel@tonic-gate 7872da6c28aaSamw /* Determine if this attribute should be archived */ 7873da6c28aaSamw if (verify_attr(dp->d_name, attrparent, arc_rwsysattr, 7874da6c28aaSamw &rw_sysattr) != ATTR_OK) { 7875da6c28aaSamw continue; 7876da6c28aaSamw } 7877da6c28aaSamw 7878da6c28aaSamw /* gather the attribute's information to pass to putfile() */ 7879da6c28aaSamw if ((fill_in_attr_info(dp->d_name, longname, attrparent, 7880da6c28aaSamw fd, rw_sysattr, &attrinfo)) == 1) { 7881da6c28aaSamw continue; 7882da6c28aaSamw } 7883da6c28aaSamw 7884da6c28aaSamw /* add the attribute to the archive */ 7885da6c28aaSamw rc = putfile(longname, dp->d_name, parent, attrinfo, 78867c478bd9Sstevel@tonic-gate XATTR_FILE, LEV0, SYMLINK_LEV0); 78877c478bd9Sstevel@tonic-gate 7888da6c28aaSamw if (exitflag) { 78897c478bd9Sstevel@tonic-gate break; 78907c478bd9Sstevel@tonic-gate } 78917c478bd9Sstevel@tonic-gate 7892da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 7893da6c28aaSamw /* 7894da6c28aaSamw * If both -/ and -@ were specified, then archive the 7895da6c28aaSamw * attribute's extended system attributes and hidden directory 7896da6c28aaSamw * by making a recursive call to xattrs_put(). 7897da6c28aaSamw */ 7898da6c28aaSamw if (!rw_sysattr && saflag && atflag && (rc != PUT_AS_LINK) && 7899da6c28aaSamw (Hiddendir == 0)) { 7900da6c28aaSamw 7901da6c28aaSamw xattrs_put(longname, shortname, parent, dp->d_name); 7902da6c28aaSamw 7903da6c28aaSamw /* 7904da6c28aaSamw * Change back to the parent's attribute directory 7905da6c28aaSamw * to process any further attributes. 7906da6c28aaSamw */ 7907da6c28aaSamw if (fchdir(fd) < 0) { 7908da6c28aaSamw vperror(0, gettext( 7909da6c28aaSamw "cannot change back to attribute directory " 7910da6c28aaSamw "of file %s"), longname); 7911da6c28aaSamw break; 7912da6c28aaSamw } 7913da6c28aaSamw } 7914da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 7915da6c28aaSamw } 7916da6c28aaSamw 7917da6c28aaSamw if (attrinfo != NULL) { 7918da6c28aaSamw if (attrinfo->attr_parent != NULL) { 7919da6c28aaSamw free(attrinfo->attr_parent); 7920da6c28aaSamw } 7921da6c28aaSamw free(attrinfo->attr_path); 7922da6c28aaSamw free(attrinfo); 7923da6c28aaSamw } 79247c478bd9Sstevel@tonic-gate (void) closedir(dirp); 7925da6c28aaSamw if (fd != -1) { 7926da6c28aaSamw (void) close(fd); 7927da6c28aaSamw } 7928da6c28aaSamw 7929da6c28aaSamw /* Change back to the parent directory of the base file */ 7930da6c28aaSamw if (attrparent == NULL) { 7931b25dbf38SRich Burridge (void) tar_chdir(parent); 7932da6c28aaSamw } 7933ced83f9bSceastha Hiddendir = 0; 79347c478bd9Sstevel@tonic-gate } 79357c478bd9Sstevel@tonic-gate #else 79367c478bd9Sstevel@tonic-gate static void 7937da6c28aaSamw xattrs_put(char *longname, char *shortname, char *parent, char *attrppath) 79387c478bd9Sstevel@tonic-gate { 79397c478bd9Sstevel@tonic-gate } 79407c478bd9Sstevel@tonic-gate #endif /* O_XATTR */ 79417c478bd9Sstevel@tonic-gate 79427c478bd9Sstevel@tonic-gate static int 7943da6c28aaSamw put_link(char *name, char *longname, char *component, char *longattrname, 79447c478bd9Sstevel@tonic-gate char *prefix, int filetype, char type) 79457c478bd9Sstevel@tonic-gate { 79467c478bd9Sstevel@tonic-gate 79477c478bd9Sstevel@tonic-gate if (stbuf.st_nlink > 1) { 79487c478bd9Sstevel@tonic-gate struct linkbuf *lp; 79497c478bd9Sstevel@tonic-gate int found = 0; 79507c478bd9Sstevel@tonic-gate 79517c478bd9Sstevel@tonic-gate for (lp = ihead; lp != NULL; lp = lp->nextp) 79527c478bd9Sstevel@tonic-gate if (lp->inum == stbuf.st_ino && 79537c478bd9Sstevel@tonic-gate lp->devnum == stbuf.st_dev) { 79547c478bd9Sstevel@tonic-gate found++; 79557c478bd9Sstevel@tonic-gate break; 79567c478bd9Sstevel@tonic-gate } 79577c478bd9Sstevel@tonic-gate if (found) { 79587c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 79597c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) 7960da6c28aaSamw if (put_xattr_hdr(longname, component, 7961da6c28aaSamw longattrname, prefix, type, filetype, lp)) { 79627c478bd9Sstevel@tonic-gate goto out; 79637c478bd9Sstevel@tonic-gate } 79647c478bd9Sstevel@tonic-gate #endif 79657c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 79667c478bd9Sstevel@tonic-gate if (filetype != XATTR_FILE) { 79677c478bd9Sstevel@tonic-gate tomodes(&stbuf); 79687c478bd9Sstevel@tonic-gate if (chk_path_build(name, longname, lp->pathname, 79697c478bd9Sstevel@tonic-gate prefix, type, filetype) > 0) { 79707c478bd9Sstevel@tonic-gate goto out; 79717c478bd9Sstevel@tonic-gate } 79727c478bd9Sstevel@tonic-gate } 79737c478bd9Sstevel@tonic-gate 79747c478bd9Sstevel@tonic-gate if (mulvol && tapepos + 1 >= blocklim) 79757c478bd9Sstevel@tonic-gate newvol(); 79767c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 79777c478bd9Sstevel@tonic-gate /* 79787c478bd9Sstevel@tonic-gate * write_ancillary() is not needed here. 79797c478bd9Sstevel@tonic-gate * The first link is handled in the following 79807c478bd9Sstevel@tonic-gate * else statement. No need to process ACLs 79817c478bd9Sstevel@tonic-gate * for other hard links since they are the 79827c478bd9Sstevel@tonic-gate * same file. 79837c478bd9Sstevel@tonic-gate */ 79847c478bd9Sstevel@tonic-gate 79857c478bd9Sstevel@tonic-gate if (vflag) { 79867c478bd9Sstevel@tonic-gate #ifdef DEBUG 79877c478bd9Sstevel@tonic-gate if (NotTape) 79887c478bd9Sstevel@tonic-gate DEBUG("seek = %" FMT_blkcnt_t 79897c478bd9Sstevel@tonic-gate "K\t", K(tapepos), 0); 79907c478bd9Sstevel@tonic-gate #endif 79917c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) { 79927c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 79937c478bd9Sstevel@tonic-gate "a %s attribute %s link to " 7994da6c28aaSamw "%s attribute %s\n"), 7995da6c28aaSamw name, component, name, 7996da6c28aaSamw lp->attrname); 79977c478bd9Sstevel@tonic-gate } else { 79987c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 79997c478bd9Sstevel@tonic-gate "a %s link to %s\n"), 80007c478bd9Sstevel@tonic-gate longname, lp->pathname); 80017c478bd9Sstevel@tonic-gate } 80027c478bd9Sstevel@tonic-gate } 80037c478bd9Sstevel@tonic-gate lp->count--; 80047c478bd9Sstevel@tonic-gate return (0); 80057c478bd9Sstevel@tonic-gate } else { 80067c478bd9Sstevel@tonic-gate lp = (struct linkbuf *)getmem(sizeof (*lp)); 80077c478bd9Sstevel@tonic-gate if (lp != (struct linkbuf *)NULL) { 80087c478bd9Sstevel@tonic-gate lp->nextp = ihead; 80097c478bd9Sstevel@tonic-gate ihead = lp; 80107c478bd9Sstevel@tonic-gate lp->inum = stbuf.st_ino; 80117c478bd9Sstevel@tonic-gate lp->devnum = stbuf.st_dev; 80127c478bd9Sstevel@tonic-gate lp->count = stbuf.st_nlink - 1; 80137c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) { 80147c478bd9Sstevel@tonic-gate (void) strcpy(lp->pathname, longname); 8015da6c28aaSamw (void) strcpy(lp->attrname, 8016da6c28aaSamw component); 80177c478bd9Sstevel@tonic-gate } else { 80187c478bd9Sstevel@tonic-gate (void) strcpy(lp->pathname, longname); 80197c478bd9Sstevel@tonic-gate (void) strcpy(lp->attrname, ""); 80207c478bd9Sstevel@tonic-gate } 80217c478bd9Sstevel@tonic-gate } 80227c478bd9Sstevel@tonic-gate } 80237c478bd9Sstevel@tonic-gate } 80247c478bd9Sstevel@tonic-gate 80257c478bd9Sstevel@tonic-gate out: 80267c478bd9Sstevel@tonic-gate return (1); 80277c478bd9Sstevel@tonic-gate } 80287c478bd9Sstevel@tonic-gate 80297c478bd9Sstevel@tonic-gate static int 8030da6c28aaSamw put_extra_attributes(char *longname, char *shortname, char *longattrname, 8031da6c28aaSamw char *prefix, int filetype, char typeflag) 80327c478bd9Sstevel@tonic-gate { 8033fa9e4066Sahrens static acl_t *aclp = NULL; 8034fa9e4066Sahrens int error; 80357c478bd9Sstevel@tonic-gate 8036fa9e4066Sahrens if (aclp != NULL) { 8037fa9e4066Sahrens acl_free(aclp); 80387c478bd9Sstevel@tonic-gate aclp = NULL; 80397c478bd9Sstevel@tonic-gate } 80407c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 8041da6c28aaSamw if ((atflag || saflag) && (filetype == XATTR_FILE)) { 8042da6c28aaSamw if (put_xattr_hdr(longname, shortname, longattrname, prefix, 80437c478bd9Sstevel@tonic-gate typeflag, filetype, NULL)) { 80447c478bd9Sstevel@tonic-gate return (1); 80457c478bd9Sstevel@tonic-gate } 80467c478bd9Sstevel@tonic-gate } 80477c478bd9Sstevel@tonic-gate #endif 80487c478bd9Sstevel@tonic-gate 80497c478bd9Sstevel@tonic-gate /* ACL support */ 80507c478bd9Sstevel@tonic-gate if (pflag) { 80517c478bd9Sstevel@tonic-gate char *secinfo = NULL; 80527c478bd9Sstevel@tonic-gate int len = 0; 80537c478bd9Sstevel@tonic-gate 80547c478bd9Sstevel@tonic-gate /* ACL support */ 80557c478bd9Sstevel@tonic-gate if (((stbuf.st_mode & S_IFMT) != S_IFLNK)) { 80567c478bd9Sstevel@tonic-gate /* 80577c478bd9Sstevel@tonic-gate * Get ACL info: dont bother allocating space if 8058fa9e4066Sahrens * there is only a trivial ACL. 80597c478bd9Sstevel@tonic-gate */ 8060fa9e4066Sahrens if ((error = acl_get(shortname, ACL_NO_TRIVIAL, 8061fa9e4066Sahrens &aclp)) != 0) { 80627c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 8063fa9e4066Sahrens "%s: failed to retrieve acl : %s\n"), 8064fa9e4066Sahrens longname, acl_strerror(error)); 80657c478bd9Sstevel@tonic-gate return (1); 80667c478bd9Sstevel@tonic-gate } 80677c478bd9Sstevel@tonic-gate } 80687c478bd9Sstevel@tonic-gate 80697c478bd9Sstevel@tonic-gate /* append security attributes if any */ 8070fa9e4066Sahrens if (aclp != NULL) { 807145916cd2Sjpk (void) append_secattr(&secinfo, &len, acl_cnt(aclp), 8072b249c65cSmarks acl_totext(aclp, ACL_APPEND_ID | ACL_COMPACT_FMT | 8073b249c65cSmarks ACL_SID_FMT), (acl_type(aclp) == ACLENT_T) ? 8074b249c65cSmarks UFSD_ACL : ACE_ACL); 807545916cd2Sjpk } 807645916cd2Sjpk 807745916cd2Sjpk if (Tflag) { 807845916cd2Sjpk /* append Trusted Extensions extended attributes */ 807945916cd2Sjpk append_ext_attr(shortname, &secinfo, &len); 808045916cd2Sjpk (void) write_ancillary(&dblock, secinfo, len, ACL_HDR); 808145916cd2Sjpk 808245916cd2Sjpk } else if (aclp != NULL) { 80837c478bd9Sstevel@tonic-gate (void) write_ancillary(&dblock, secinfo, len, ACL_HDR); 80847c478bd9Sstevel@tonic-gate } 80857c478bd9Sstevel@tonic-gate } 80867c478bd9Sstevel@tonic-gate return (0); 80877c478bd9Sstevel@tonic-gate } 80887c478bd9Sstevel@tonic-gate 80897c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 80907c478bd9Sstevel@tonic-gate static int 8091da6c28aaSamw put_xattr_hdr(char *longname, char *shortname, char *longattrname, char *prefix, 80927c478bd9Sstevel@tonic-gate int typeflag, int filetype, struct linkbuf *lp) 80937c478bd9Sstevel@tonic-gate { 80947c478bd9Sstevel@tonic-gate char *lname = NULL; 80957c478bd9Sstevel@tonic-gate char *sname = NULL; 80967c478bd9Sstevel@tonic-gate int error = 0; 80977c478bd9Sstevel@tonic-gate static char *attrbuf = NULL; 80987c478bd9Sstevel@tonic-gate int attrlen; 80997c478bd9Sstevel@tonic-gate 81007c478bd9Sstevel@tonic-gate lname = malloc(sizeof (char) * strlen("/dev/null") + 1 + 81017c478bd9Sstevel@tonic-gate strlen(shortname) + strlen(".hdr") + 1); 81027c478bd9Sstevel@tonic-gate 81037c478bd9Sstevel@tonic-gate if (lname == NULL) { 81047c478bd9Sstevel@tonic-gate fatal(gettext("Out of Memory.")); 81057c478bd9Sstevel@tonic-gate } 81067c478bd9Sstevel@tonic-gate sname = malloc(sizeof (char) * strlen(shortname) + 8107da6c28aaSamw strlen(".hdr") + 1); 81087c478bd9Sstevel@tonic-gate if (sname == NULL) { 81097c478bd9Sstevel@tonic-gate fatal(gettext("Out of Memory.")); 81107c478bd9Sstevel@tonic-gate } 81117c478bd9Sstevel@tonic-gate 81127c478bd9Sstevel@tonic-gate (void) sprintf(sname, "%s.hdr", shortname); 81137c478bd9Sstevel@tonic-gate (void) sprintf(lname, "/dev/null/%s", sname); 81147c478bd9Sstevel@tonic-gate 81157c478bd9Sstevel@tonic-gate if (strlcpy(dblock.dbuf.name, lname, sizeof (dblock.dbuf.name)) >= 81167c478bd9Sstevel@tonic-gate sizeof (dblock.dbuf.name)) { 81177c478bd9Sstevel@tonic-gate fatal(gettext( 81187c478bd9Sstevel@tonic-gate "Buffer overflow writing extended attribute file name")); 81197c478bd9Sstevel@tonic-gate } 81207c478bd9Sstevel@tonic-gate 81217c478bd9Sstevel@tonic-gate /* 81227c478bd9Sstevel@tonic-gate * dump extended attr lookup info 81237c478bd9Sstevel@tonic-gate */ 8124da6c28aaSamw prepare_xattr(&attrbuf, longname, longattrname, typeflag, lp, &attrlen); 81257c478bd9Sstevel@tonic-gate write_ancillary(&dblock, attrbuf, attrlen, _XATTR_HDRTYPE); 81267c478bd9Sstevel@tonic-gate 81277c478bd9Sstevel@tonic-gate (void) sprintf(lname, "/dev/null/%s", shortname); 81287c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.name, sname, NAMSIZ); 81297c478bd9Sstevel@tonic-gate 81307c478bd9Sstevel@tonic-gate /* 81317c478bd9Sstevel@tonic-gate * Set up filename for attribute 81327c478bd9Sstevel@tonic-gate */ 81337c478bd9Sstevel@tonic-gate 81347c478bd9Sstevel@tonic-gate error = build_dblock(lname, tchar, '0', filetype, 81357c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix); 81367c478bd9Sstevel@tonic-gate free(lname); 81377c478bd9Sstevel@tonic-gate free(sname); 81387c478bd9Sstevel@tonic-gate 81397c478bd9Sstevel@tonic-gate return (error); 81407c478bd9Sstevel@tonic-gate } 81417c478bd9Sstevel@tonic-gate #endif 81427c478bd9Sstevel@tonic-gate 81437c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 81447c478bd9Sstevel@tonic-gate static int 8145da6c28aaSamw read_xattr_hdr(attr_data_t **attrinfo) 81467c478bd9Sstevel@tonic-gate { 81477c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 8148da6c28aaSamw char *attrparent = NULL; 81497c478bd9Sstevel@tonic-gate blkcnt_t blocks; 81507c478bd9Sstevel@tonic-gate char *tp; 81517c478bd9Sstevel@tonic-gate off_t bytes; 81527c478bd9Sstevel@tonic-gate int comp_len, link_len; 81537c478bd9Sstevel@tonic-gate int namelen; 8154da6c28aaSamw int attrparentlen; 8155da6c28aaSamw int parentfilelen; 81567c478bd9Sstevel@tonic-gate 81577c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag != _XATTR_HDRTYPE) 81587c478bd9Sstevel@tonic-gate return (1); 81597c478bd9Sstevel@tonic-gate 81607c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 81617c478bd9Sstevel@tonic-gate if ((xattrhead = calloc(1, (int)bytes)) == NULL) { 81627c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 81637c478bd9Sstevel@tonic-gate "Insufficient memory for extended attribute\n")); 81647c478bd9Sstevel@tonic-gate return (1); 81657c478bd9Sstevel@tonic-gate } 81667c478bd9Sstevel@tonic-gate 81677c478bd9Sstevel@tonic-gate tp = (char *)xattrhead; 81687c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 81697c478bd9Sstevel@tonic-gate while (blocks-- > 0) { 81707c478bd9Sstevel@tonic-gate readtape(buf); 81717c478bd9Sstevel@tonic-gate if (bytes <= TBLOCK) { 81727c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, (size_t)bytes); 81737c478bd9Sstevel@tonic-gate break; 81747c478bd9Sstevel@tonic-gate } else { 81757c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, TBLOCK); 81767c478bd9Sstevel@tonic-gate tp += TBLOCK; 81777c478bd9Sstevel@tonic-gate } 81787c478bd9Sstevel@tonic-gate bytes -= TBLOCK; 81797c478bd9Sstevel@tonic-gate } 81807c478bd9Sstevel@tonic-gate 81817c478bd9Sstevel@tonic-gate /* 81827c478bd9Sstevel@tonic-gate * Validate that we can handle header format 81837c478bd9Sstevel@tonic-gate */ 81847c478bd9Sstevel@tonic-gate if (strcmp(xattrhead->h_version, XATTR_ARCH_VERS) != 0) { 81857c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 81867c478bd9Sstevel@tonic-gate gettext("Unknown extended attribute format encountered\n")); 81877c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 81887c478bd9Sstevel@tonic-gate gettext("Disabling extended attribute parsing\n")); 81897c478bd9Sstevel@tonic-gate xattrbadhead = 1; 81907c478bd9Sstevel@tonic-gate return (0); 81917c478bd9Sstevel@tonic-gate } 81927c478bd9Sstevel@tonic-gate (void) sscanf(xattrhead->h_component_len, "%10d", &comp_len); 81937c478bd9Sstevel@tonic-gate (void) sscanf(xattrhead->h_link_component_len, "%10d", &link_len); 81947c478bd9Sstevel@tonic-gate xattrp = (struct xattr_buf *)(((char *)xattrhead) + 81957c478bd9Sstevel@tonic-gate sizeof (struct xattr_hdr)); 81967c478bd9Sstevel@tonic-gate (void) sscanf(xattrp->h_namesz, "%7d", &namelen); 81977c478bd9Sstevel@tonic-gate if (link_len > 0) 81987c478bd9Sstevel@tonic-gate xattr_linkp = (struct xattr_buf *) 81997c478bd9Sstevel@tonic-gate ((int)xattrp + (int)comp_len); 82007c478bd9Sstevel@tonic-gate else 82017c478bd9Sstevel@tonic-gate xattr_linkp = NULL; 82027c478bd9Sstevel@tonic-gate 8203da6c28aaSamw /* 8204da6c28aaSamw * Gather the attribute path from the filename and attrnames section. 8205da6c28aaSamw * The filename and attrnames section can be composed of two or more 8206da6c28aaSamw * path segments separated by a null character. The first segment 8207da6c28aaSamw * is the path to the parent file that roots the entire sequence in 8208da6c28aaSamw * the normal name space. The remaining segments describes a path 8209da6c28aaSamw * rooted at the hidden extended attribute directory of the leaf file of 8210da6c28aaSamw * the previous segment, making it possible to name attributes on 8211da6c28aaSamw * attributes. 8212da6c28aaSamw */ 8213da6c28aaSamw parentfilelen = strlen(xattrp->h_names); 8214da6c28aaSamw xattrapath = xattrp->h_names + parentfilelen + 1; 8215da6c28aaSamw if ((strlen(xattrapath) + parentfilelen + 2) < namelen) { 8216da6c28aaSamw /* 8217da6c28aaSamw * The attrnames section contains a system attribute on an 8218da6c28aaSamw * attribute. Save the name of the attribute for use later, 8219da6c28aaSamw * and replace the null separating the attribute name from 8220da6c28aaSamw * the system attribute name with a '/' so that xattrapath can 8221da6c28aaSamw * be used to display messages with the full attribute path name 8222da6c28aaSamw * rooted at the hidden attribute directory of the base file 8223da6c28aaSamw * in normal name space. 8224da6c28aaSamw */ 8225da6c28aaSamw attrparent = strdup(xattrapath); 8226da6c28aaSamw attrparentlen = strlen(attrparent); 8227da6c28aaSamw xattrapath[attrparentlen] = '/'; 8228da6c28aaSamw } 8229da6c28aaSamw if ((fill_in_attr_info((attrparent == NULL) ? xattrapath : 8230da6c28aaSamw xattrapath + attrparentlen + 1, xattrapath, attrparent, 8231da6c28aaSamw -1, 0, attrinfo)) == 1) { 8232da6c28aaSamw free(attrparent); 8233da6c28aaSamw return (1); 8234da6c28aaSamw } 8235da6c28aaSamw 8236da6c28aaSamw /* Gather link info */ 82377c478bd9Sstevel@tonic-gate if (xattr_linkp) { 82387c478bd9Sstevel@tonic-gate xattr_linkaname = xattr_linkp->h_names + 82397c478bd9Sstevel@tonic-gate strlen(xattr_linkp->h_names) + 1; 82407c478bd9Sstevel@tonic-gate } else { 82417c478bd9Sstevel@tonic-gate xattr_linkaname = NULL; 82427c478bd9Sstevel@tonic-gate } 8243d2443e76Smarks 82447c478bd9Sstevel@tonic-gate return (0); 82457c478bd9Sstevel@tonic-gate } 82467c478bd9Sstevel@tonic-gate #else 82477c478bd9Sstevel@tonic-gate static int 8248da6c28aaSamw read_xattr_hdr(attr_data_t **attrinfo) 82497c478bd9Sstevel@tonic-gate { 82507c478bd9Sstevel@tonic-gate return (0); 82517c478bd9Sstevel@tonic-gate } 82527c478bd9Sstevel@tonic-gate #endif 82537c478bd9Sstevel@tonic-gate 82547c478bd9Sstevel@tonic-gate /* 82557c478bd9Sstevel@tonic-gate * skip over extra slashes in string. 82567c478bd9Sstevel@tonic-gate * 82577c478bd9Sstevel@tonic-gate * For example: 82587c478bd9Sstevel@tonic-gate * /usr/tmp///// 82597c478bd9Sstevel@tonic-gate * 82607c478bd9Sstevel@tonic-gate * would return pointer at 82617c478bd9Sstevel@tonic-gate * /usr/tmp///// 82627c478bd9Sstevel@tonic-gate * ^ 82637c478bd9Sstevel@tonic-gate */ 82647c478bd9Sstevel@tonic-gate static char * 82657c478bd9Sstevel@tonic-gate skipslashes(char *string, char *start) 82667c478bd9Sstevel@tonic-gate { 82677c478bd9Sstevel@tonic-gate while ((string > start) && *(string - 1) == '/') { 82687c478bd9Sstevel@tonic-gate string--; 82697c478bd9Sstevel@tonic-gate } 82707c478bd9Sstevel@tonic-gate 82717c478bd9Sstevel@tonic-gate return (string); 82727c478bd9Sstevel@tonic-gate } 82737c478bd9Sstevel@tonic-gate 82747c478bd9Sstevel@tonic-gate /* 82757c478bd9Sstevel@tonic-gate * Return the parent directory of a given path. 82767c478bd9Sstevel@tonic-gate * 82777c478bd9Sstevel@tonic-gate * Examples: 82787c478bd9Sstevel@tonic-gate * /usr/tmp return /usr 82797c478bd9Sstevel@tonic-gate * /usr/tmp/file return /usr/tmp 82807c478bd9Sstevel@tonic-gate * / returns . 82817c478bd9Sstevel@tonic-gate * /usr returns / 82827c478bd9Sstevel@tonic-gate * file returns . 82837c478bd9Sstevel@tonic-gate * 82847c478bd9Sstevel@tonic-gate * dir is assumed to be at least as big as path. 82857c478bd9Sstevel@tonic-gate */ 82867c478bd9Sstevel@tonic-gate static void 82877c478bd9Sstevel@tonic-gate get_parent(char *path, char *dir) 82887c478bd9Sstevel@tonic-gate { 82897c478bd9Sstevel@tonic-gate char *s; 82907c478bd9Sstevel@tonic-gate char tmpdir[PATH_MAX + 1]; 82917c478bd9Sstevel@tonic-gate 82927c478bd9Sstevel@tonic-gate if (strlen(path) > PATH_MAX) { 82937c478bd9Sstevel@tonic-gate fatal(gettext("pathname is too long")); 82947c478bd9Sstevel@tonic-gate } 82957c478bd9Sstevel@tonic-gate (void) strcpy(tmpdir, path); 82967c478bd9Sstevel@tonic-gate chop_endslashes(tmpdir); 82977c478bd9Sstevel@tonic-gate 82987c478bd9Sstevel@tonic-gate if ((s = strrchr(tmpdir, '/')) == NULL) { 82997c478bd9Sstevel@tonic-gate (void) strcpy(dir, "."); 83007c478bd9Sstevel@tonic-gate } else { 83017c478bd9Sstevel@tonic-gate s = skipslashes(s, tmpdir); 83027c478bd9Sstevel@tonic-gate *s = '\0'; 83037c478bd9Sstevel@tonic-gate if (s == tmpdir) 83047c478bd9Sstevel@tonic-gate (void) strcpy(dir, "/"); 83057c478bd9Sstevel@tonic-gate else 83067c478bd9Sstevel@tonic-gate (void) strcpy(dir, tmpdir); 83077c478bd9Sstevel@tonic-gate } 83087c478bd9Sstevel@tonic-gate } 83097c478bd9Sstevel@tonic-gate 83107c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 83117c478bd9Sstevel@tonic-gate static char * 83127c478bd9Sstevel@tonic-gate get_component(char *path) 83137c478bd9Sstevel@tonic-gate { 83147c478bd9Sstevel@tonic-gate char *ptr; 83157c478bd9Sstevel@tonic-gate 83167c478bd9Sstevel@tonic-gate ptr = strrchr(path, '/'); 83177c478bd9Sstevel@tonic-gate if (ptr == NULL) { 83187c478bd9Sstevel@tonic-gate return (path); 83197c478bd9Sstevel@tonic-gate } else { 83207c478bd9Sstevel@tonic-gate /* 83217c478bd9Sstevel@tonic-gate * Handle trailing slash 83227c478bd9Sstevel@tonic-gate */ 83237c478bd9Sstevel@tonic-gate if (*(ptr + 1) == '\0') 83247c478bd9Sstevel@tonic-gate return (ptr); 83257c478bd9Sstevel@tonic-gate else 83267c478bd9Sstevel@tonic-gate return (ptr + 1); 83277c478bd9Sstevel@tonic-gate } 83287c478bd9Sstevel@tonic-gate } 83297c478bd9Sstevel@tonic-gate #else 83307c478bd9Sstevel@tonic-gate static char * 83317c478bd9Sstevel@tonic-gate get_component(char *path) 83327c478bd9Sstevel@tonic-gate { 83337c478bd9Sstevel@tonic-gate return (path); 83347c478bd9Sstevel@tonic-gate } 83357c478bd9Sstevel@tonic-gate #endif 83367c478bd9Sstevel@tonic-gate 8337da6c28aaSamw #if defined(O_XATTR) 83387c478bd9Sstevel@tonic-gate static int 8339da6c28aaSamw retry_open_attr(int pdirfd, int cwd, char *dirp, char *pattr, char *name, 8340da6c28aaSamw int oflag, mode_t mode) 83417c478bd9Sstevel@tonic-gate { 8342da6c28aaSamw int dirfd; 8343da6c28aaSamw int ofilefd = -1; 83447c478bd9Sstevel@tonic-gate struct timeval times[2]; 83457c478bd9Sstevel@tonic-gate mode_t newmode; 83467c478bd9Sstevel@tonic-gate struct stat parentstat; 8347d2443e76Smarks acl_t *aclp = NULL; 8348d2443e76Smarks int error; 83497c478bd9Sstevel@tonic-gate 83507c478bd9Sstevel@tonic-gate /* 83517c478bd9Sstevel@tonic-gate * We couldn't get to attrdir. See if its 83527c478bd9Sstevel@tonic-gate * just a mode problem on the parent file. 83537c478bd9Sstevel@tonic-gate * for example: a mode such as r-xr--r-- 8354da6c28aaSamw * on a ufs file system without extended 8355da6c28aaSamw * system attribute support won't let us 8356da6c28aaSamw * create an attribute dir if it doesn't 8357da6c28aaSamw * already exist, and on a ufs file system 8358da6c28aaSamw * with extended system attribute support 8359da6c28aaSamw * won't let us open the attribute for 8360da6c28aaSamw * write. 8361d2443e76Smarks * 8362d2443e76Smarks * If file has a non-trivial ACL, then save it 8363d2443e76Smarks * off so that we can place it back on after doing 8364d2443e76Smarks * chmod's. 83657c478bd9Sstevel@tonic-gate */ 8366da6c28aaSamw if ((dirfd = openat(cwd, (pattr == NULL) ? dirp : pattr, 8367da6c28aaSamw O_RDONLY)) == -1) { 8368d2443e76Smarks return (-1); 83697c478bd9Sstevel@tonic-gate } 8370da6c28aaSamw if (fstat(dirfd, &parentstat) == -1) { 8371da6c28aaSamw (void) fprintf(stderr, gettext( 8372da6c28aaSamw "tar: cannot stat %sfile %s: %s\n"), 8373da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8374da6c28aaSamw (pdirfd == -1) ? dirp : name, strerror(errno)); 8375da6c28aaSamw return (-1); 8376da6c28aaSamw } 8377da6c28aaSamw if ((error = facl_get(dirfd, ACL_NO_TRIVIAL, &aclp)) != 0) { 8378da6c28aaSamw (void) fprintf(stderr, gettext( 8379da6c28aaSamw "tar: failed to retrieve ACL on %sfile %s: %s\n"), 8380da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8381da6c28aaSamw (pdirfd == -1) ? dirp : name, strerror(errno)); 8382d2443e76Smarks return (-1); 8383d2443e76Smarks } 8384d2443e76Smarks 83857c478bd9Sstevel@tonic-gate newmode = S_IWUSR | parentstat.st_mode; 8386da6c28aaSamw if (fchmod(dirfd, newmode) == -1) { 83877c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 8388da6c28aaSamw gettext( 8389da6c28aaSamw "tar: cannot fchmod %sfile %s to %o: %s\n"), 8390da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8391da6c28aaSamw (pdirfd == -1) ? dirp : name, newmode, strerror(errno)); 8392d2443e76Smarks if (aclp) 8393d2443e76Smarks acl_free(aclp); 8394d2443e76Smarks return (-1); 83957c478bd9Sstevel@tonic-gate } 83967c478bd9Sstevel@tonic-gate 8397d2443e76Smarks 8398da6c28aaSamw if (pdirfd == -1) { 8399d2443e76Smarks /* 8400da6c28aaSamw * We weren't able to create the attribute directory before. 8401da6c28aaSamw * Now try again. 8402d2443e76Smarks */ 8403da6c28aaSamw ofilefd = attropen(dirp, ".", oflag); 8404da6c28aaSamw } else { 8405da6c28aaSamw /* 8406da6c28aaSamw * We weren't able to create open the attribute before. 8407da6c28aaSamw * Now try again. 8408da6c28aaSamw */ 8409da6c28aaSamw ofilefd = openat(pdirfd, name, oflag, mode); 8410da6c28aaSamw } 84117c478bd9Sstevel@tonic-gate 84127c478bd9Sstevel@tonic-gate /* 84137c478bd9Sstevel@tonic-gate * Put mode back to original 84147c478bd9Sstevel@tonic-gate */ 8415da6c28aaSamw if (fchmod(dirfd, parentstat.st_mode) == -1) { 8416d2443e76Smarks (void) fprintf(stderr, 8417da6c28aaSamw gettext("tar: cannot chmod %sfile %s to %o: %s\n"), 8418da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8419da6c28aaSamw (pdirfd == -1) ? dirp : name, newmode, strerror(errno)); 8420d2443e76Smarks } 8421d2443e76Smarks 8422d2443e76Smarks if (aclp) { 8423da6c28aaSamw error = facl_set(dirfd, aclp); 8424d2443e76Smarks if (error) { 8425d2443e76Smarks (void) fprintf(stderr, 8426da6c28aaSamw gettext("tar: failed to set acl entries on " 8427da6c28aaSamw "%sfile %s\n"), 8428da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8429da6c28aaSamw (pdirfd == -1) ? dirp : name); 8430d2443e76Smarks } 8431d2443e76Smarks acl_free(aclp); 8432d2443e76Smarks } 84337c478bd9Sstevel@tonic-gate 84347c478bd9Sstevel@tonic-gate /* 84357c478bd9Sstevel@tonic-gate * Put back time stamps 84367c478bd9Sstevel@tonic-gate */ 84377c478bd9Sstevel@tonic-gate 84387c478bd9Sstevel@tonic-gate times[0].tv_sec = parentstat.st_atime; 84397c478bd9Sstevel@tonic-gate times[0].tv_usec = 0; 84407c478bd9Sstevel@tonic-gate times[1].tv_sec = parentstat.st_mtime; 84417c478bd9Sstevel@tonic-gate times[1].tv_usec = 0; 84427c478bd9Sstevel@tonic-gate 8443da6c28aaSamw (void) futimesat(cwd, (pattr == NULL) ? dirp : pattr, times); 8444da6c28aaSamw 8445da6c28aaSamw (void) close(dirfd); 8446da6c28aaSamw 8447da6c28aaSamw return (ofilefd); 84487c478bd9Sstevel@tonic-gate } 8449da6c28aaSamw #endif 84507c478bd9Sstevel@tonic-gate 84517c478bd9Sstevel@tonic-gate #if !defined(O_XATTR) 84527c478bd9Sstevel@tonic-gate static int 84537c478bd9Sstevel@tonic-gate openat64(int fd, const char *name, int oflag, mode_t cmode) 84547c478bd9Sstevel@tonic-gate { 84557c478bd9Sstevel@tonic-gate return (open64(name, oflag, cmode)); 84567c478bd9Sstevel@tonic-gate } 84577c478bd9Sstevel@tonic-gate 84587c478bd9Sstevel@tonic-gate static int 84597c478bd9Sstevel@tonic-gate openat(int fd, const char *name, int oflag, mode_t cmode) 84607c478bd9Sstevel@tonic-gate { 84617c478bd9Sstevel@tonic-gate return (open(name, oflag, cmode)); 84627c478bd9Sstevel@tonic-gate } 84637c478bd9Sstevel@tonic-gate 84647c478bd9Sstevel@tonic-gate static int 84657c478bd9Sstevel@tonic-gate fchownat(int fd, const char *name, uid_t owner, gid_t group, int flag) 84667c478bd9Sstevel@tonic-gate { 84677c478bd9Sstevel@tonic-gate if (flag == AT_SYMLINK_NOFOLLOW) 84687c478bd9Sstevel@tonic-gate return (lchown(name, owner, group)); 84697c478bd9Sstevel@tonic-gate else 84707c478bd9Sstevel@tonic-gate return (chown(name, owner, group)); 84717c478bd9Sstevel@tonic-gate } 84727c478bd9Sstevel@tonic-gate 84737c478bd9Sstevel@tonic-gate static int 84747c478bd9Sstevel@tonic-gate renameat(int fromfd, char *old, int tofd, char *new) 84757c478bd9Sstevel@tonic-gate { 84767c478bd9Sstevel@tonic-gate return (rename(old, new)); 84777c478bd9Sstevel@tonic-gate } 84787c478bd9Sstevel@tonic-gate 84797c478bd9Sstevel@tonic-gate static int 84807c478bd9Sstevel@tonic-gate futimesat(int fd, char *path, struct timeval times[2]) 84817c478bd9Sstevel@tonic-gate { 84827c478bd9Sstevel@tonic-gate return (utimes(path, times)); 84837c478bd9Sstevel@tonic-gate } 84847c478bd9Sstevel@tonic-gate 84857c478bd9Sstevel@tonic-gate static int 84867c478bd9Sstevel@tonic-gate unlinkat(int dirfd, char *path, int flag) 84877c478bd9Sstevel@tonic-gate { 84887c478bd9Sstevel@tonic-gate if (flag == AT_REMOVEDIR) 84897c478bd9Sstevel@tonic-gate return (rmdir(path)); 84907c478bd9Sstevel@tonic-gate else 84917c478bd9Sstevel@tonic-gate return (unlink(path)); 84927c478bd9Sstevel@tonic-gate } 84937c478bd9Sstevel@tonic-gate 84947c478bd9Sstevel@tonic-gate static int 84957c478bd9Sstevel@tonic-gate fstatat(int fd, char *path, struct stat *buf, int flag) 84967c478bd9Sstevel@tonic-gate { 84977c478bd9Sstevel@tonic-gate if (flag == AT_SYMLINK_NOFOLLOW) 84987c478bd9Sstevel@tonic-gate return (lstat(path, buf)); 84997c478bd9Sstevel@tonic-gate else 85007c478bd9Sstevel@tonic-gate return (stat(path, buf)); 85017c478bd9Sstevel@tonic-gate } 85027c478bd9Sstevel@tonic-gate 85037c478bd9Sstevel@tonic-gate static int 85047c478bd9Sstevel@tonic-gate attropen(char *file, char *attr, int omode, mode_t cmode) 85057c478bd9Sstevel@tonic-gate { 85067c478bd9Sstevel@tonic-gate errno = ENOTSUP; 85077c478bd9Sstevel@tonic-gate return (-1); 85087c478bd9Sstevel@tonic-gate } 85097c478bd9Sstevel@tonic-gate #endif 85107c478bd9Sstevel@tonic-gate 85117c478bd9Sstevel@tonic-gate static void 85127c478bd9Sstevel@tonic-gate chop_endslashes(char *path) 85137c478bd9Sstevel@tonic-gate { 85147c478bd9Sstevel@tonic-gate char *end, *ptr; 85157c478bd9Sstevel@tonic-gate 85167c478bd9Sstevel@tonic-gate /* 85177c478bd9Sstevel@tonic-gate * Chop of slashes, but not if all we have is slashes 85187c478bd9Sstevel@tonic-gate * for example: //// 85197c478bd9Sstevel@tonic-gate * should make no changes, otherwise it will screw up 85207c478bd9Sstevel@tonic-gate * checkdir 85217c478bd9Sstevel@tonic-gate */ 85227c478bd9Sstevel@tonic-gate end = &path[strlen(path) -1]; 85237c478bd9Sstevel@tonic-gate if (*end == '/' && end != path) { 85247c478bd9Sstevel@tonic-gate ptr = skipslashes(end, path); 85257c478bd9Sstevel@tonic-gate if (ptr != NULL && ptr != path) { 85267c478bd9Sstevel@tonic-gate *ptr = '\0'; 85277c478bd9Sstevel@tonic-gate } 85287c478bd9Sstevel@tonic-gate } 85297c478bd9Sstevel@tonic-gate } 853045916cd2Sjpk /* Trusted Extensions */ 853145916cd2Sjpk 853245916cd2Sjpk /* 853345916cd2Sjpk * append_ext_attr(): 853445916cd2Sjpk * 853545916cd2Sjpk * Append extended attributes and other information into the buffer 853645916cd2Sjpk * that gets written to the ancillary file. 853745916cd2Sjpk * 853845916cd2Sjpk * With option 'T', we create a tarfile which 853945916cd2Sjpk * has an ancillary file each corresponding archived file. 854045916cd2Sjpk * Each ancillary file contains 1 or more of the 854145916cd2Sjpk * following attributes: 854245916cd2Sjpk * 854345916cd2Sjpk * attribute type attribute process procedure 854445916cd2Sjpk * ---------------- ---------------- -------------------------- 854545916cd2Sjpk * DIR_TYPE = 'D' directory flag append if a directory 854645916cd2Sjpk * LBL_TYPE = 'L' SL[IL] or SL append ascii label 854745916cd2Sjpk * 854845916cd2Sjpk * 854945916cd2Sjpk */ 855045916cd2Sjpk static void 855145916cd2Sjpk append_ext_attr(char *shortname, char **secinfo, int *len) 855245916cd2Sjpk { 855345916cd2Sjpk bslabel_t b_slabel; /* binary sensitvity label */ 855445916cd2Sjpk char *ascii = NULL; /* ascii label */ 855545916cd2Sjpk 855645916cd2Sjpk /* 855745916cd2Sjpk * For each attribute type, append it if it is 855845916cd2Sjpk * relevant to the file type. 855945916cd2Sjpk */ 856045916cd2Sjpk 856145916cd2Sjpk /* 856245916cd2Sjpk * For attribute type DIR_TYPE, 856345916cd2Sjpk * append it to the following file type: 856445916cd2Sjpk * 856545916cd2Sjpk * S_IFDIR: directories 856645916cd2Sjpk */ 856745916cd2Sjpk 856845916cd2Sjpk /* 856945916cd2Sjpk * For attribute type LBL_TYPE, 857045916cd2Sjpk * append it to the following file type: 857145916cd2Sjpk * 857245916cd2Sjpk * S_IFDIR: directories (including mld, sld) 857345916cd2Sjpk * S_IFLNK: symbolic link 857445916cd2Sjpk * S_IFREG: regular file but not hard link 857545916cd2Sjpk * S_IFIFO: FIFO file but not hard link 857645916cd2Sjpk * S_IFCHR: char special file but not hard link 857745916cd2Sjpk * S_IFBLK: block special file but not hard link 857845916cd2Sjpk */ 857945916cd2Sjpk switch (stbuf.st_mode & S_IFMT) { 858045916cd2Sjpk 858145916cd2Sjpk case S_IFDIR: 858245916cd2Sjpk 858345916cd2Sjpk /* 858445916cd2Sjpk * append DIR_TYPE 858545916cd2Sjpk */ 858645916cd2Sjpk (void) append_secattr(secinfo, len, 1, 858745916cd2Sjpk "\0", DIR_TYPE); 858845916cd2Sjpk 858945916cd2Sjpk /* 859045916cd2Sjpk * Get and append attribute types LBL_TYPE. 859145916cd2Sjpk * For directories, LBL_TYPE contains SL. 859245916cd2Sjpk */ 859345916cd2Sjpk /* get binary sensitivity label */ 859445916cd2Sjpk if (getlabel(shortname, &b_slabel) != 0) { 859545916cd2Sjpk (void) fprintf(stderr, 859645916cd2Sjpk gettext("tar: can't get sensitvity label for " 859745916cd2Sjpk " %s, getlabel() error: %s\n"), 859845916cd2Sjpk shortname, strerror(errno)); 859945916cd2Sjpk } else { 860045916cd2Sjpk /* get ascii SL */ 860145916cd2Sjpk if (bsltos(&b_slabel, &ascii, 860245916cd2Sjpk 0, 0) <= 0) { 860345916cd2Sjpk (void) fprintf(stderr, 860445916cd2Sjpk gettext("tar: can't get ascii SL for" 860545916cd2Sjpk " %s\n"), shortname); 860645916cd2Sjpk } else { 860745916cd2Sjpk /* append LBL_TYPE */ 860845916cd2Sjpk (void) append_secattr(secinfo, len, 860945916cd2Sjpk strlen(ascii) + 1, ascii, 861045916cd2Sjpk LBL_TYPE); 861145916cd2Sjpk 861245916cd2Sjpk /* free storage */ 861345916cd2Sjpk if (ascii != NULL) { 861445916cd2Sjpk free(ascii); 861545916cd2Sjpk ascii = (char *)0; 861645916cd2Sjpk } 861745916cd2Sjpk } 861845916cd2Sjpk 861945916cd2Sjpk } 862045916cd2Sjpk break; 862145916cd2Sjpk 862245916cd2Sjpk case S_IFLNK: 862345916cd2Sjpk case S_IFREG: 862445916cd2Sjpk case S_IFIFO: 862545916cd2Sjpk case S_IFCHR: 862645916cd2Sjpk case S_IFBLK: 862745916cd2Sjpk 862845916cd2Sjpk /* get binary sensitivity label */ 862945916cd2Sjpk if (getlabel(shortname, &b_slabel) != 0) { 863045916cd2Sjpk (void) fprintf(stderr, 863145916cd2Sjpk gettext("tar: can't get sensitivty label for %s, " 863245916cd2Sjpk "getlabel() error: %s\n"), 863345916cd2Sjpk shortname, strerror(errno)); 863445916cd2Sjpk } else { 863545916cd2Sjpk /* get ascii IL[SL] */ 863645916cd2Sjpk if (bsltos(&b_slabel, &ascii, 0, 0) <= 0) { 863745916cd2Sjpk (void) fprintf(stderr, 863845916cd2Sjpk gettext("tar: can't translate sensitivity " 863945916cd2Sjpk " label for %s\n"), shortname); 864045916cd2Sjpk } else { 864145916cd2Sjpk char *cmw_label; 864245916cd2Sjpk size_t cmw_length; 864345916cd2Sjpk 864445916cd2Sjpk cmw_length = strlen("ADMIN_LOW [] ") + 864545916cd2Sjpk strlen(ascii); 864645916cd2Sjpk if ((cmw_label = malloc(cmw_length)) == NULL) { 864745916cd2Sjpk (void) fprintf(stderr, gettext( 864845916cd2Sjpk "Insufficient memory for label\n")); 864945916cd2Sjpk exit(1); 865045916cd2Sjpk } 865145916cd2Sjpk /* append LBL_TYPE */ 865245916cd2Sjpk (void) snprintf(cmw_label, cmw_length, 865345916cd2Sjpk "ADMIN_LOW [%s]", ascii); 865445916cd2Sjpk (void) append_secattr(secinfo, len, 865545916cd2Sjpk strlen(cmw_label) + 1, cmw_label, 865645916cd2Sjpk LBL_TYPE); 865745916cd2Sjpk 865845916cd2Sjpk /* free storage */ 865945916cd2Sjpk if (ascii != NULL) { 866045916cd2Sjpk free(cmw_label); 866145916cd2Sjpk free(ascii); 866245916cd2Sjpk ascii = (char *)0; 866345916cd2Sjpk } 866445916cd2Sjpk } 866545916cd2Sjpk } 866645916cd2Sjpk break; 866745916cd2Sjpk 866845916cd2Sjpk default: 866945916cd2Sjpk break; 867045916cd2Sjpk } /* end switch for LBL_TYPE */ 867145916cd2Sjpk 867245916cd2Sjpk 867345916cd2Sjpk /* DONE !! */ 867445916cd2Sjpk return; 867545916cd2Sjpk 867645916cd2Sjpk } /* end of append_ext_attr */ 867745916cd2Sjpk 867845916cd2Sjpk 867945916cd2Sjpk /* 868045916cd2Sjpk * Name: extract_attr() 868145916cd2Sjpk * 868245916cd2Sjpk * Description: 868345916cd2Sjpk * Process attributes from the ancillary file due to 868445916cd2Sjpk * the T option. 868545916cd2Sjpk * 868645916cd2Sjpk * Call by doxtract() as part of the switch case structure. 868745916cd2Sjpk * Making this a separate routine because the nesting are too 868845916cd2Sjpk * deep in doxtract, thus, leaving very little space 868945916cd2Sjpk * on each line for instructions. 869045916cd2Sjpk * 869145916cd2Sjpk * With option 'T', we extract from a TS 8 or TS 2.5 ancillary file 869245916cd2Sjpk * 869345916cd2Sjpk * For option 'T', following are possible attributes in 869445916cd2Sjpk * a TS 8 ancillary file: (NOTE: No IL support) 869545916cd2Sjpk * 869645916cd2Sjpk * attribute type attribute process procedure 869745916cd2Sjpk * ---------------- ---------------- ------------------------- 869845916cd2Sjpk * # LBL_TYPE = 'L' SL construct binary label 869945916cd2Sjpk * # APRIV_TYPE = 'P' allowed priv construct privileges 870045916cd2Sjpk * # FPRIV_TYPE = 'p' forced priv construct privileges 870145916cd2Sjpk * # COMP_TYPE = 'C' path component construct real path 870245916cd2Sjpk * # DIR_TYPE = 'D' directory flag note it is a directory 870345916cd2Sjpk * $ UFSD_ACL = '1' ACL data construct ACL entries 870445916cd2Sjpk * ATTR_FLAG_TYPE = 'F' file attr flags construct binary flags 870545916cd2Sjpk * LK_COMP_TYPE = 'K' linked path comp construct linked real path 870645916cd2Sjpk * 870745916cd2Sjpk * note: # = attribute names common between TS 8 & TS 2.5 ancillary 870845916cd2Sjpk * files. 870945916cd2Sjpk * $ = ACL attribute is processed for the option 'p', it doesn't 871045916cd2Sjpk * need option 'T'. 871145916cd2Sjpk * 871245916cd2Sjpk * Trusted Extensions ignores APRIV_TYPE, FPRIV_TYPE, and ATTR_FLAG_TYPE 871345916cd2Sjpk * 871445916cd2Sjpk */ 871545916cd2Sjpk static void 871645916cd2Sjpk extract_attr(char **file_ptr, struct sec_attr *attr) 871745916cd2Sjpk { 871845916cd2Sjpk int reterr, err; 871945916cd2Sjpk char *dummy_buf; /* for attribute extract */ 872045916cd2Sjpk 872145916cd2Sjpk dummy_buf = attr->attr_info; 872245916cd2Sjpk 872345916cd2Sjpk switch (attr->attr_type) { 872445916cd2Sjpk 872545916cd2Sjpk case DIR_TYPE: 872645916cd2Sjpk 872745916cd2Sjpk dir_flag++; 872845916cd2Sjpk break; 872945916cd2Sjpk 873045916cd2Sjpk case LBL_TYPE: 873145916cd2Sjpk 873245916cd2Sjpk /* 873345916cd2Sjpk * LBL_TYPE is used to indicate SL for directory, and 873445916cd2Sjpk * CMW label for other file types. 873545916cd2Sjpk */ 873645916cd2Sjpk 873745916cd2Sjpk if (!dir_flag) { /* not directory */ 873845916cd2Sjpk /* Skip over IL portion */ 873945916cd2Sjpk char *sl_ptr = strchr(dummy_buf, '['); 874045916cd2Sjpk 874145916cd2Sjpk if (sl_ptr == NULL) 874245916cd2Sjpk err = 0; 874345916cd2Sjpk else 874445916cd2Sjpk err = stobsl(sl_ptr, &bs_label, 874545916cd2Sjpk NEW_LABEL, &reterr); 874645916cd2Sjpk } else { /* directory */ 874745916cd2Sjpk err = stobsl(dummy_buf, &bs_label, 874845916cd2Sjpk NEW_LABEL, &reterr); 874945916cd2Sjpk } 875045916cd2Sjpk if (err == 0) { 875145916cd2Sjpk (void) fprintf(stderr, gettext("tar: " 875245916cd2Sjpk "can't convert %s to binary label\n"), 875345916cd2Sjpk dummy_buf); 875445916cd2Sjpk bslundef(&bs_label); 875545916cd2Sjpk } else if (!blequal(&bs_label, &admin_low) && 875645916cd2Sjpk !blequal(&bs_label, &admin_high)) { 875745916cd2Sjpk bslabel_t *from_label; 875845916cd2Sjpk char *buf; 875945916cd2Sjpk char tempbuf[MAXPATHLEN]; 876045916cd2Sjpk 876145916cd2Sjpk if (*orig_namep != '/') { 876245916cd2Sjpk /* got relative linked to path */ 876345916cd2Sjpk (void) getcwd(tempbuf, (sizeof (tempbuf))); 876445916cd2Sjpk (void) strncat(tempbuf, "/", MAXPATHLEN); 876545916cd2Sjpk } else 876645916cd2Sjpk *tempbuf = '\0'; 876745916cd2Sjpk 876845916cd2Sjpk buf = real_path; 876945916cd2Sjpk (void) strncat(tempbuf, orig_namep, MAXPATHLEN); 877045916cd2Sjpk from_label = getlabelbypath(tempbuf); 877145916cd2Sjpk if (from_label != NULL) { 877245916cd2Sjpk if (blequal(from_label, &admin_low)) { 877345916cd2Sjpk if ((getpathbylabel(tempbuf, buf, 877445916cd2Sjpk MAXPATHLEN, &bs_label) == NULL)) { 877545916cd2Sjpk (void) fprintf(stderr, 877645916cd2Sjpk gettext("tar: " 877745916cd2Sjpk "can't get zone root path for " 877845916cd2Sjpk "%s\n"), tempbuf); 877945916cd2Sjpk } else 878045916cd2Sjpk rpath_flag = 1; 878145916cd2Sjpk } 878245916cd2Sjpk free(from_label); 878345916cd2Sjpk } 878445916cd2Sjpk } 878545916cd2Sjpk break; 878645916cd2Sjpk 878745916cd2Sjpk case COMP_TYPE: 878845916cd2Sjpk 878945916cd2Sjpk rebuild_comp_path(dummy_buf, file_ptr); 879045916cd2Sjpk break; 879145916cd2Sjpk 879245916cd2Sjpk case LK_COMP_TYPE: 879345916cd2Sjpk 879445916cd2Sjpk if (rebuild_lk_comp_path(dummy_buf, file_ptr) 879545916cd2Sjpk == 0) { 879645916cd2Sjpk lk_rpath_flag = 1; 879745916cd2Sjpk } else { 879845916cd2Sjpk (void) fprintf(stderr, gettext("tar: warning: link's " 879945916cd2Sjpk "target pathname might be invalid.\n")); 880045916cd2Sjpk lk_rpath_flag = 0; 880145916cd2Sjpk } 880245916cd2Sjpk break; 880345916cd2Sjpk case APRIV_TYPE: 880445916cd2Sjpk ignored_aprivs++; 880545916cd2Sjpk break; 880645916cd2Sjpk case FPRIV_TYPE: 880745916cd2Sjpk ignored_fprivs++; 880845916cd2Sjpk break; 880945916cd2Sjpk case ATTR_FLAG_TYPE: 881045916cd2Sjpk ignored_fattrs++; 881145916cd2Sjpk break; 881245916cd2Sjpk 881345916cd2Sjpk default: 881445916cd2Sjpk 881545916cd2Sjpk break; 881645916cd2Sjpk } 881745916cd2Sjpk 881845916cd2Sjpk /* done */ 881945916cd2Sjpk return; 882045916cd2Sjpk 882145916cd2Sjpk } /* end extract_attr */ 882245916cd2Sjpk 882345916cd2Sjpk 882445916cd2Sjpk 882545916cd2Sjpk /* 882645916cd2Sjpk * Name: rebuild_comp_path() 882745916cd2Sjpk * 882845916cd2Sjpk * Description: 882945916cd2Sjpk * Take the string of components passed down by the calling 883045916cd2Sjpk * routine and parse the values and rebuild the path. 883145916cd2Sjpk * This routine no longer needs to produce a new real_path 883245916cd2Sjpk * string because it is produced when the 'L' LABEL_TYPE is 883345916cd2Sjpk * interpreted. So the only thing done here is to distinguish 883445916cd2Sjpk * between an SLD and an MLD entry. We only want one, so we 883545916cd2Sjpk * ignore the MLD entry by setting the mld_flag. 883645916cd2Sjpk * 883745916cd2Sjpk * return value: 883845916cd2Sjpk * none 883945916cd2Sjpk */ 884045916cd2Sjpk static void 884145916cd2Sjpk rebuild_comp_path(char *str, char **namep) 884245916cd2Sjpk { 884345916cd2Sjpk char *cp; 884445916cd2Sjpk 884545916cd2Sjpk while (*str != '\0') { 884645916cd2Sjpk 884745916cd2Sjpk switch (*str) { 884845916cd2Sjpk 884945916cd2Sjpk case MLD_TYPE: 885045916cd2Sjpk 885145916cd2Sjpk str++; 885245916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 885345916cd2Sjpk *cp = '\0'; 885445916cd2Sjpk str = cp + 2; 885545916cd2Sjpk *cp = ';'; 885645916cd2Sjpk } 885745916cd2Sjpk mld_flag = 1; 885845916cd2Sjpk break; 885945916cd2Sjpk 886045916cd2Sjpk case SLD_TYPE: 886145916cd2Sjpk 886245916cd2Sjpk str++; 886345916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 886445916cd2Sjpk *cp = '\0'; 886545916cd2Sjpk str = cp + 2; 886645916cd2Sjpk *cp = ';'; 886745916cd2Sjpk } 886845916cd2Sjpk mld_flag = 0; 886945916cd2Sjpk break; 887045916cd2Sjpk 887145916cd2Sjpk case PATH_TYPE: 887245916cd2Sjpk 887345916cd2Sjpk str++; 887445916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 887545916cd2Sjpk *cp = '\0'; 887645916cd2Sjpk str = cp + 2; 887745916cd2Sjpk *cp = ';'; 887845916cd2Sjpk } 887945916cd2Sjpk break; 888045916cd2Sjpk } 888145916cd2Sjpk } 888245916cd2Sjpk if (rpath_flag) 888345916cd2Sjpk *namep = real_path; 888445916cd2Sjpk return; 888545916cd2Sjpk 888645916cd2Sjpk } /* end rebuild_comp_path() */ 888745916cd2Sjpk 888845916cd2Sjpk /* 888945916cd2Sjpk * Name: rebuild_lk_comp_path() 889045916cd2Sjpk * 889145916cd2Sjpk * Description: 889245916cd2Sjpk * Take the string of components passed down by the calling 889345916cd2Sjpk * routine and parse the values and rebuild the path. 889445916cd2Sjpk * 889545916cd2Sjpk * return value: 889645916cd2Sjpk * 0 = succeeded 889745916cd2Sjpk * -1 = failed 889845916cd2Sjpk */ 889945916cd2Sjpk static int 890045916cd2Sjpk rebuild_lk_comp_path(char *str, char **namep) 890145916cd2Sjpk { 890245916cd2Sjpk char *cp; 890345916cd2Sjpk int reterr; 890445916cd2Sjpk bslabel_t bslabel; 890545916cd2Sjpk char *buf; 890645916cd2Sjpk char pbuf[MAXPATHLEN]; 890745916cd2Sjpk char *ptr1, *ptr2; 890845916cd2Sjpk int plen; 890945916cd2Sjpk int use_pbuf; 891045916cd2Sjpk char tempbuf[MAXPATHLEN]; 891145916cd2Sjpk int mismatch; 891245916cd2Sjpk bslabel_t *from_label; 891345916cd2Sjpk char zonename[ZONENAME_MAX]; 891445916cd2Sjpk zoneid_t zoneid; 891545916cd2Sjpk 891645916cd2Sjpk /* init stuff */ 891745916cd2Sjpk use_pbuf = 0; 891845916cd2Sjpk mismatch = 0; 891945916cd2Sjpk 892045916cd2Sjpk /* 892145916cd2Sjpk * For linked to pathname (LK_COMP_TYPE): 892245916cd2Sjpk * - If the linked to pathname is absolute (start with /), we 892345916cd2Sjpk * will use it as is. 892445916cd2Sjpk * - If it is a relative pathname then it is relative to 1 of 2 892545916cd2Sjpk * directories. For a hardlink, it is relative to the current 892645916cd2Sjpk * directory. For a symbolic link, it is relative to the 892745916cd2Sjpk * directory the symbolic link is in. For the symbolic link 892845916cd2Sjpk * case, set a flag to indicate we need to use the prefix of 892945916cd2Sjpk * the restored file's pathname with the linked to pathname. 893045916cd2Sjpk * 893145916cd2Sjpk * NOTE: At this point, we have no way to determine if we have 893245916cd2Sjpk * a hardlink or a symbolic link. We will compare the 1st 893345916cd2Sjpk * component in the prefix portion of the restore file's 893445916cd2Sjpk * pathname to the 1st component in the attribute data 893545916cd2Sjpk * (the linked pathname). If they are the same, we will assume 893645916cd2Sjpk * the link pathname to reconstruct is relative to the current 893745916cd2Sjpk * directory. Otherwise, we will set a flag indicate we need 893845916cd2Sjpk * to use a prefix with the reconstructed name. Need to compare 893945916cd2Sjpk * both the adorned and unadorned version before deciding a 894045916cd2Sjpk * mismatch. 894145916cd2Sjpk */ 894245916cd2Sjpk 894345916cd2Sjpk buf = lk_real_path; 894445916cd2Sjpk if (*(str + 1) != '/') { /* got relative linked to path */ 894545916cd2Sjpk ptr1 = orig_namep; 894645916cd2Sjpk ptr2 = strrchr(ptr1, '/'); 894745916cd2Sjpk plen = ptr2 - ptr1; 894845916cd2Sjpk if (plen > 0) { 894945916cd2Sjpk pbuf[0] = '\0'; 895045916cd2Sjpk plen++; /* include '/' */ 895145916cd2Sjpk (void) strncpy(pbuf, ptr1, plen); 895245916cd2Sjpk *(pbuf + plen) = '\0'; 895345916cd2Sjpk ptr2 = strchr(pbuf, '/'); 895445916cd2Sjpk if (strncmp(pbuf, str + 1, ptr2 - pbuf) != 0) 895545916cd2Sjpk mismatch = 1; 895645916cd2Sjpk } 895745916cd2Sjpk 895845916cd2Sjpk if (mismatch == 1) 895945916cd2Sjpk use_pbuf = 1; 896045916cd2Sjpk } 896145916cd2Sjpk 896245916cd2Sjpk buf[0] = '\0'; 896345916cd2Sjpk 896445916cd2Sjpk while (*str != '\0') { 896545916cd2Sjpk 896645916cd2Sjpk switch (*str) { 896745916cd2Sjpk 896845916cd2Sjpk case MLD_TYPE: 896945916cd2Sjpk 897045916cd2Sjpk str++; 897145916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 897245916cd2Sjpk *cp = '\0'; 897345916cd2Sjpk 897445916cd2Sjpk /* 897545916cd2Sjpk * Ignore attempts to backup over .MLD. 897645916cd2Sjpk */ 897745916cd2Sjpk if (strcmp(str, "../") != 0) 897845916cd2Sjpk (void) strncat(buf, str, MAXPATHLEN); 897945916cd2Sjpk str = cp + 2; 898045916cd2Sjpk *cp = ';'; 898145916cd2Sjpk } 898245916cd2Sjpk break; 898345916cd2Sjpk 898445916cd2Sjpk case SLD_TYPE: 898545916cd2Sjpk 898645916cd2Sjpk str++; 898745916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 898845916cd2Sjpk *cp = '\0'; 898945916cd2Sjpk 899045916cd2Sjpk /* 899145916cd2Sjpk * Use the path name in the header if 899245916cd2Sjpk * error occurs when processing the 899345916cd2Sjpk * SLD type. 899445916cd2Sjpk */ 899545916cd2Sjpk 899645916cd2Sjpk if (!stobsl(str, &bslabel, 899745916cd2Sjpk NO_CORRECTION, &reterr)) { 899845916cd2Sjpk (void) fprintf(stderr, gettext( 899945916cd2Sjpk "tar: can't translate to binary" 900045916cd2Sjpk "SL for SLD, stobsl() error:" 900145916cd2Sjpk " %s\n"), strerror(errno)); 900245916cd2Sjpk return (-1); 900345916cd2Sjpk } 900445916cd2Sjpk 900545916cd2Sjpk str = cp + 2; 900645916cd2Sjpk *cp = ';'; 900745916cd2Sjpk 900845916cd2Sjpk if (use_pbuf == 1) { 900945916cd2Sjpk if (*pbuf != '/') { 901045916cd2Sjpk /* relative linked to path */ 901145916cd2Sjpk 901245916cd2Sjpk (void) getcwd(tempbuf, 901345916cd2Sjpk (sizeof (tempbuf))); 901445916cd2Sjpk (void) strncat(tempbuf, "/", 901545916cd2Sjpk MAXPATHLEN); 901645916cd2Sjpk (void) strncat(tempbuf, pbuf, 901745916cd2Sjpk MAXPATHLEN); 901845916cd2Sjpk } 901945916cd2Sjpk else 902045916cd2Sjpk (void) strcpy(tempbuf, pbuf); 902145916cd2Sjpk 902245916cd2Sjpk } else if (*buf != '/') { 902345916cd2Sjpk /* got relative linked to path */ 902445916cd2Sjpk 902545916cd2Sjpk (void) getcwd(tempbuf, 902645916cd2Sjpk (sizeof (tempbuf))); 902745916cd2Sjpk (void) strncat(tempbuf, "/", 902845916cd2Sjpk MAXPATHLEN); 902945916cd2Sjpk } else 903045916cd2Sjpk *tempbuf = '\0'; 903145916cd2Sjpk 903245916cd2Sjpk (void) strncat(tempbuf, buf, MAXPATHLEN); 903345916cd2Sjpk *buf = '\0'; 903445916cd2Sjpk 903545916cd2Sjpk if (blequal(&bslabel, &admin_high)) { 903645916cd2Sjpk bslabel = admin_low; 903745916cd2Sjpk } 903845916cd2Sjpk 903945916cd2Sjpk 904045916cd2Sjpk /* 904145916cd2Sjpk * Check for cross-zone symbolic links 904245916cd2Sjpk */ 904345916cd2Sjpk from_label = getlabelbypath(real_path); 904445916cd2Sjpk if (rpath_flag && (from_label != NULL) && 904545916cd2Sjpk !blequal(&bslabel, from_label)) { 904645916cd2Sjpk if ((zoneid = 904745916cd2Sjpk getzoneidbylabel(&bslabel)) == -1) { 904845916cd2Sjpk (void) fprintf(stderr, 904945916cd2Sjpk gettext("tar: can't get " 905045916cd2Sjpk "zone ID for %s\n"), 905145916cd2Sjpk tempbuf); 905245916cd2Sjpk return (-1); 905345916cd2Sjpk } 905445916cd2Sjpk if (zone_getattr(zoneid, ZONE_ATTR_NAME, 905545916cd2Sjpk &zonename, ZONENAME_MAX) == -1) { 905645916cd2Sjpk /* Badly configured zone info */ 905745916cd2Sjpk (void) fprintf(stderr, 905845916cd2Sjpk gettext("tar: can't get " 905945916cd2Sjpk "zonename for %s\n"), 906045916cd2Sjpk tempbuf); 906145916cd2Sjpk return (-1); 906245916cd2Sjpk } 906345916cd2Sjpk (void) strncpy(buf, AUTO_ZONE, 906445916cd2Sjpk MAXPATHLEN); 906545916cd2Sjpk (void) strncat(buf, "/", 906645916cd2Sjpk MAXPATHLEN); 906745916cd2Sjpk (void) strncat(buf, zonename, 906845916cd2Sjpk MAXPATHLEN); 906945916cd2Sjpk } 907045916cd2Sjpk if (from_label != NULL) 907145916cd2Sjpk free(from_label); 907245916cd2Sjpk (void) strncat(buf, tempbuf, MAXPATHLEN); 907345916cd2Sjpk break; 907445916cd2Sjpk } 907545916cd2Sjpk mld_flag = 0; 907645916cd2Sjpk break; 907745916cd2Sjpk 907845916cd2Sjpk case PATH_TYPE: 907945916cd2Sjpk 908045916cd2Sjpk str++; 908145916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 908245916cd2Sjpk *cp = '\0'; 908345916cd2Sjpk (void) strncat(buf, str, MAXPATHLEN); 908445916cd2Sjpk str = cp + 2; 908545916cd2Sjpk *cp = ';'; 908645916cd2Sjpk } 908745916cd2Sjpk break; 908845916cd2Sjpk 908945916cd2Sjpk default: 909045916cd2Sjpk 909145916cd2Sjpk (void) fprintf(stderr, gettext( 909245916cd2Sjpk "tar: error rebuilding path %s\n"), 909345916cd2Sjpk *namep); 909445916cd2Sjpk *buf = '\0'; 909545916cd2Sjpk str++; 909645916cd2Sjpk return (-1); 909745916cd2Sjpk } 909845916cd2Sjpk } 909945916cd2Sjpk 910045916cd2Sjpk /* 910145916cd2Sjpk * Done for LK_COMP_TYPE 910245916cd2Sjpk */ 910345916cd2Sjpk 910445916cd2Sjpk return (0); /* component path is rebuilt successfully */ 910545916cd2Sjpk 910645916cd2Sjpk } /* end rebuild_lk_comp_path() */ 910745916cd2Sjpk 910845916cd2Sjpk /* 910945916cd2Sjpk * Name: check_ext_attr() 911045916cd2Sjpk * 911145916cd2Sjpk * Description: 911245916cd2Sjpk * Check the extended attributes for a file being extracted. 911345916cd2Sjpk * The attributes being checked here are CMW labels. 911445916cd2Sjpk * ACLs are not set here because they are set by the 911545916cd2Sjpk * pflag in doxtract(). 911645916cd2Sjpk * 911745916cd2Sjpk * If the label doesn't match, return 0 911845916cd2Sjpk * else return 1 911945916cd2Sjpk */ 912045916cd2Sjpk static int 912145916cd2Sjpk check_ext_attr(char *filename) 912245916cd2Sjpk { 912345916cd2Sjpk bslabel_t currentlabel; /* label from zone */ 912445916cd2Sjpk 912545916cd2Sjpk if (bltype(&bs_label, SUN_SL_UN)) { 912645916cd2Sjpk /* No label check possible */ 912745916cd2Sjpk return (0); 912845916cd2Sjpk } 912945916cd2Sjpk if (getlabel(filename, ¤tlabel) != 0) { 913045916cd2Sjpk (void) fprintf(stderr, 913145916cd2Sjpk gettext("tar: can't get label for " 913245916cd2Sjpk " %s, getlabel() error: %s\n"), 913345916cd2Sjpk filename, strerror(errno)); 913445916cd2Sjpk return (0); 913545916cd2Sjpk } else if ((blequal(¤tlabel, &bs_label)) == 0) { 913645916cd2Sjpk char *src_label = NULL; /* ascii label */ 913745916cd2Sjpk 913845916cd2Sjpk /* get current src SL */ 913945916cd2Sjpk if (bsltos(&bs_label, &src_label, 0, 0) <= 0) { 914045916cd2Sjpk (void) fprintf(stderr, 914145916cd2Sjpk gettext("tar: can't interpret requested label for" 914245916cd2Sjpk " %s\n"), filename); 914345916cd2Sjpk } else { 914445916cd2Sjpk (void) fprintf(stderr, 914545916cd2Sjpk gettext("tar: can't apply label %s to %s\n"), 914645916cd2Sjpk src_label, filename); 914745916cd2Sjpk free(src_label); 914845916cd2Sjpk } 914945916cd2Sjpk (void) fprintf(stderr, 915045916cd2Sjpk gettext("tar: %s not restored\n"), filename); 915145916cd2Sjpk return (0); 915245916cd2Sjpk } 915345916cd2Sjpk return (1); 915445916cd2Sjpk 915545916cd2Sjpk } /* end check_ext_attr */ 915636802407SRich Burridge 915736802407SRich Burridge /* Compressing a tar file using compression method provided in 'opt' */ 915836802407SRich Burridge 915936802407SRich Burridge static void 916036802407SRich Burridge compress_back() 916136802407SRich Burridge { 916236802407SRich Burridge pid_t pid; 916336802407SRich Burridge int status; 916436802407SRich Burridge int wret; 916536802407SRich Burridge struct stat statb; 916636802407SRich Burridge 916736802407SRich Burridge if (vflag) { 916836802407SRich Burridge (void) fprintf(vfile, 916936802407SRich Burridge gettext("Compressing '%s' with '%s'...\n"), 917036802407SRich Burridge usefile, compress_opt); 917136802407SRich Burridge } 917236802407SRich Burridge if ((pid = fork()) == 0) { 917336802407SRich Burridge (void) execlp(compress_opt, compress_opt, 917436802407SRich Burridge usefile, NULL); 917536802407SRich Burridge } else if (pid == -1) { 917636802407SRich Burridge vperror(1, "%s", gettext("Could not fork")); 917736802407SRich Burridge } 917836802407SRich Burridge wait_pid(pid); 917936802407SRich Burridge if (suffix == 0) { 918036802407SRich Burridge (void) rename(tfname, usefile); 918136802407SRich Burridge } 918236802407SRich Burridge } 918336802407SRich Burridge 918436802407SRich Burridge /* The magic numbers from /etc/magic */ 918536802407SRich Burridge 918636802407SRich Burridge #define GZIP_MAGIC "\037\213" 918736802407SRich Burridge #define BZIP_MAGIC "BZh" 918836802407SRich Burridge #define COMP_MAGIC "\037\235" 9189*506ea5b8SMilan Jurik #define XZ_MAGIC "\375\067\172\130\132\000" 919036802407SRich Burridge 919136802407SRich Burridge void 9192*506ea5b8SMilan Jurik check_compression(void) 919336802407SRich Burridge { 9194*506ea5b8SMilan Jurik char magic[16]; 919536802407SRich Burridge FILE *fp; 919636802407SRich Burridge 919736802407SRich Burridge if ((fp = fopen(usefile, "r")) != NULL) { 9198*506ea5b8SMilan Jurik (void) fread(magic, sizeof (char), 6, fp); 919936802407SRich Burridge (void) fclose(fp); 920036802407SRich Burridge } 920136802407SRich Burridge 920236802407SRich Burridge if (memcmp(magic, GZIP_MAGIC, 2) == 0) { 920336802407SRich Burridge if (xflag || tflag) { 920436802407SRich Burridge compress_opt = compress_malloc(strlen(GZCAT) + 1); 920536802407SRich Burridge (void) strcpy(compress_opt, GZCAT); 920636802407SRich Burridge } else if (uflag || rflag) { 920736802407SRich Burridge compress_opt = compress_malloc(strlen(GZIP) + 1); 920836802407SRich Burridge (void) strcpy(compress_opt, GZIP); 920936802407SRich Burridge } 921036802407SRich Burridge } else if (memcmp(magic, BZIP_MAGIC, 2) == 0) { 921136802407SRich Burridge if (xflag || tflag) { 921236802407SRich Burridge compress_opt = compress_malloc(strlen(BZCAT) + 1); 921336802407SRich Burridge (void) strcpy(compress_opt, BZCAT); 921436802407SRich Burridge } else if (uflag || rflag) { 921536802407SRich Burridge compress_opt = compress_malloc(strlen(BZIP) + 1); 921636802407SRich Burridge (void) strcpy(compress_opt, BZIP); 921736802407SRich Burridge } 921836802407SRich Burridge } else if (memcmp(magic, COMP_MAGIC, 2) == 0) { 921936802407SRich Burridge if (xflag || tflag) { 922036802407SRich Burridge compress_opt = compress_malloc(strlen(ZCAT) + 1); 922136802407SRich Burridge (void) strcpy(compress_opt, ZCAT); 922236802407SRich Burridge } else if (uflag || rflag) { 922336802407SRich Burridge compress_opt = compress_malloc(strlen(COMPRESS) + 1); 922436802407SRich Burridge (void) strcpy(compress_opt, COMPRESS); 922536802407SRich Burridge } 9226*506ea5b8SMilan Jurik } else if (memcmp(magic, XZ_MAGIC, 6) == 0) { 9227*506ea5b8SMilan Jurik if (xflag || tflag) { 9228*506ea5b8SMilan Jurik compress_opt = compress_malloc(strlen(XZCAT) + 1); 9229*506ea5b8SMilan Jurik (void) strcpy(compress_opt, XZCAT); 9230*506ea5b8SMilan Jurik } else if (uflag || rflag) { 9231*506ea5b8SMilan Jurik compress_opt = compress_malloc(strlen(XZ) + 1); 9232*506ea5b8SMilan Jurik (void) strcpy(compress_opt, XZ); 9233*506ea5b8SMilan Jurik } 923436802407SRich Burridge } 923536802407SRich Burridge } 923636802407SRich Burridge 923736802407SRich Burridge char * 923836802407SRich Burridge add_suffix() 923936802407SRich Burridge { 924036802407SRich Burridge (void) strcpy(tfname, usefile); 924136802407SRich Burridge if (strcmp(compress_opt, GZIP) == 0) { 924236802407SRich Burridge if ((suffix = gz_suffix()) == NULL) { 924336802407SRich Burridge strlcat(tfname, gsuffix[0], sizeof (tfname)); 924436802407SRich Burridge return (gsuffix[0]); 924536802407SRich Burridge } 924636802407SRich Burridge } else if (strcmp(compress_opt, COMPRESS) == 0) { 924736802407SRich Burridge if ((suffix = gz_suffix()) == NULL) { 924836802407SRich Burridge strlcat(tfname, gsuffix[6], sizeof (tfname)); 924936802407SRich Burridge return (gsuffix[6]); 925036802407SRich Burridge } 925136802407SRich Burridge } else if (strcmp(compress_opt, BZIP) == 0) { 925236802407SRich Burridge if ((suffix = bz_suffix()) == NULL) { 925336802407SRich Burridge strlcat(tfname, bsuffix[0], sizeof (tfname)); 925436802407SRich Burridge return (bsuffix[0]); 925536802407SRich Burridge } 9256*506ea5b8SMilan Jurik } else if (strcmp(compress_opt, XZ) == 0) { 9257*506ea5b8SMilan Jurik if ((suffix = xz_suffix()) == NULL) { 9258*506ea5b8SMilan Jurik strlcat(tfname, xsuffix[0], sizeof (tfname)); 9259*506ea5b8SMilan Jurik return (xsuffix[0]); 9260*506ea5b8SMilan Jurik } 926136802407SRich Burridge } 926236802407SRich Burridge return (NULL); 926336802407SRich Burridge } 926436802407SRich Burridge 926536802407SRich Burridge /* Decompressing a tar file using compression method from the file type */ 926636802407SRich Burridge void 926736802407SRich Burridge decompress_file(void) 926836802407SRich Burridge { 926936802407SRich Burridge pid_t pid; 927036802407SRich Burridge int status; 927136802407SRich Burridge char cmdstr[PATH_MAX]; 927236802407SRich Burridge char fname[PATH_MAX]; 927336802407SRich Burridge char *added_suffix; 927436802407SRich Burridge 927536802407SRich Burridge 927636802407SRich Burridge added_suffix = add_suffix(); 927736802407SRich Burridge if (added_suffix != NULL) { 927836802407SRich Burridge (void) rename(usefile, tfname); 927936802407SRich Burridge } 928036802407SRich Burridge if ((pid = fork()) == 0) { 928136802407SRich Burridge if (vflag) { 928236802407SRich Burridge (void) fprintf(vfile, 928336802407SRich Burridge gettext("Decompressing '%s' with " 928436802407SRich Burridge "'%s'...\n"), usefile, compress_opt); 928536802407SRich Burridge } 928636802407SRich Burridge (void) execlp(compress_opt, compress_opt, "-df", 928736802407SRich Burridge tfname, NULL); 928853329f75SRich Burridge vperror(1, gettext("Could not exec %s"), compress_opt); 928936802407SRich Burridge } else if (pid == -1) { 92908e4a71aeSRich Burridge vperror(1, gettext("Could not fork")); 929136802407SRich Burridge } 929236802407SRich Burridge wait_pid(pid); 929336802407SRich Burridge if (suffix != NULL) { 929436802407SRich Burridge /* restore the file name - original file was without suffix */ 929536802407SRich Burridge *(usefile + strlen(usefile) - strlen(suffix)) = '\0'; 929636802407SRich Burridge } 929736802407SRich Burridge } 929836802407SRich Burridge 929936802407SRich Burridge /* Set the archive for writing and then compress the archive */ 930036802407SRich Burridge pid_t 930136802407SRich Burridge compress_file(void) 930236802407SRich Burridge { 930336802407SRich Burridge int fd[2]; 930436802407SRich Burridge pid_t pid; 930536802407SRich Burridge 930636802407SRich Burridge if (vflag) { 930736802407SRich Burridge (void) fprintf(vfile, gettext("Compressing '%s' with " 930836802407SRich Burridge "'%s'...\n"), usefile, compress_opt); 930936802407SRich Burridge } 931036802407SRich Burridge 931136802407SRich Burridge if (pipe(fd) < 0) { 931236802407SRich Burridge vperror(1, gettext("Could not create pipe")); 931336802407SRich Burridge } 931436802407SRich Burridge if (pid = fork() > 0) { 931536802407SRich Burridge mt = fd[1]; 931636802407SRich Burridge (void) close(fd[0]); 931736802407SRich Burridge return (pid); 931836802407SRich Burridge } 931936802407SRich Burridge /* child */ 932036802407SRich Burridge (void) dup2(fd[0], STDIN_FILENO); 932136802407SRich Burridge (void) close(fd[1]); 932236802407SRich Burridge (void) dup2(mt, STDOUT_FILENO); 932336802407SRich Burridge (void) execlp(compress_opt, compress_opt, NULL); 932453329f75SRich Burridge vperror(1, gettext("Could not exec %s"), compress_opt); 932536802407SRich Burridge return (0); /*NOTREACHED*/ 932636802407SRich Burridge } 932736802407SRich Burridge 932836802407SRich Burridge pid_t 932936802407SRich Burridge uncompress_file(void) 933036802407SRich Burridge { 933136802407SRich Burridge int fd[2]; 933236802407SRich Burridge pid_t pid; 933336802407SRich Burridge 933436802407SRich Burridge if (vflag) { 933536802407SRich Burridge (void) fprintf(vfile, gettext("Decompressing '%s' with " 933636802407SRich Burridge "'%s'...\n"), usefile, compress_opt); 933736802407SRich Burridge } 933836802407SRich Burridge 933936802407SRich Burridge if (pipe(fd) < 0) { 934036802407SRich Burridge vperror(1, gettext("Could not create pipe")); 934136802407SRich Burridge } 934236802407SRich Burridge if (pid = fork() > 0) { 934336802407SRich Burridge mt = fd[0]; 934436802407SRich Burridge (void) close(fd[1]); 934536802407SRich Burridge return (pid); 934636802407SRich Burridge } 934736802407SRich Burridge /* child */ 934836802407SRich Burridge (void) dup2(fd[1], STDOUT_FILENO); 934936802407SRich Burridge (void) close(fd[0]); 935036802407SRich Burridge (void) dup2(mt, STDIN_FILENO); 935136802407SRich Burridge (void) execlp(compress_opt, compress_opt, NULL); 935253329f75SRich Burridge vperror(1, gettext("Could not exec %s"), compress_opt); 935336802407SRich Burridge return (0); /*NOTREACHED*/ 935436802407SRich Burridge } 935536802407SRich Burridge 9356*506ea5b8SMilan Jurik /* Checking suffix validity */ 935736802407SRich Burridge char * 9358*506ea5b8SMilan Jurik check_suffix(char **suf, int size) 935936802407SRich Burridge { 936036802407SRich Burridge int i; 936136802407SRich Burridge int slen; 936236802407SRich Burridge int nlen = strlen(usefile); 936336802407SRich Burridge 9364*506ea5b8SMilan Jurik for (i = 0; i < size; i++) { 9365*506ea5b8SMilan Jurik slen = strlen(suf[i]); 936636802407SRich Burridge if (nlen < slen) 936736802407SRich Burridge return (NULL); 9368*506ea5b8SMilan Jurik if (strcmp(usefile + nlen - slen, suf[i]) == 0) 9369*506ea5b8SMilan Jurik return (suf[i]); 937036802407SRich Burridge } 937136802407SRich Burridge return (NULL); 9372*506ea5b8SMilan Jurik 9373*506ea5b8SMilan Jurik } 9374*506ea5b8SMilan Jurik 9375*506ea5b8SMilan Jurik /* Checking valid 'bzip2' suffix */ 9376*506ea5b8SMilan Jurik char * 9377*506ea5b8SMilan Jurik bz_suffix(void) 9378*506ea5b8SMilan Jurik { 9379*506ea5b8SMilan Jurik return (check_suffix(bsuffix, BSUF)); 938036802407SRich Burridge } 938136802407SRich Burridge 938236802407SRich Burridge /* Checking valid 'gzip' suffix */ 938336802407SRich Burridge char * 9384*506ea5b8SMilan Jurik gz_suffix(void) 938536802407SRich Burridge { 9386*506ea5b8SMilan Jurik return (check_suffix(gsuffix, GSUF)); 938736802407SRich Burridge } 9388*506ea5b8SMilan Jurik 9389*506ea5b8SMilan Jurik /* Checking valid 'xz' suffix */ 9390*506ea5b8SMilan Jurik char * 9391*506ea5b8SMilan Jurik xz_suffix(void) 9392*506ea5b8SMilan Jurik { 9393*506ea5b8SMilan Jurik return (check_suffix(xsuffix, XSUF)); 939436802407SRich Burridge } 939536802407SRich Burridge 939636802407SRich Burridge void * 939736802407SRich Burridge compress_malloc(size_t size) 939836802407SRich Burridge { 939936802407SRich Burridge void *opt; 940036802407SRich Burridge 940136802407SRich Burridge if ((opt = malloc(size)) == NULL) { 940236802407SRich Burridge vperror(1, "%s", 940336802407SRich Burridge gettext("Could not allocate compress buffer\n")); 940436802407SRich Burridge } 940536802407SRich Burridge return (opt); 940636802407SRich Burridge } 940736802407SRich Burridge 940836802407SRich Burridge void 940936802407SRich Burridge wait_pid(pid_t pid) 941036802407SRich Burridge { 941136802407SRich Burridge int status; 941236802407SRich Burridge 941336802407SRich Burridge while (waitpid(pid, &status, 0) == -1 && errno == EINTR) 941436802407SRich Burridge ; 941536802407SRich Burridge } 9416