17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 545916cd2Sjpk * Common Development and Distribution License (the "License"). 645916cd2Sjpk * You may not use this file except in compliance with the License. 77c478bd9Sstevel@tonic-gate * 87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 117c478bd9Sstevel@tonic-gate * and limitations under the License. 127c478bd9Sstevel@tonic-gate * 137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 187c478bd9Sstevel@tonic-gate * 197c478bd9Sstevel@tonic-gate * CDDL HEADER END 207c478bd9Sstevel@tonic-gate */ 217c478bd9Sstevel@tonic-gate /* 22257ece65SRalph Turner - Sun UK - Contractor * Copyright (c) 1988, 2010, Oracle and/or its affiliates. All rights reserved. 23506ea5b8SMilan Jurik * Copyright 2012 Milan Jurik. All rights reserved. 24*28c4d110SJoshua M. Clulow * Copyright 2015 Joyent, Inc. 257c478bd9Sstevel@tonic-gate */ 267c478bd9Sstevel@tonic-gate 277c478bd9Sstevel@tonic-gate /* Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T */ 287c478bd9Sstevel@tonic-gate /* All Rights Reserved */ 297c478bd9Sstevel@tonic-gate 307c478bd9Sstevel@tonic-gate /* Copyright (c) 1987, 1988 Microsoft Corporation */ 317c478bd9Sstevel@tonic-gate /* All Rights Reserved */ 327c478bd9Sstevel@tonic-gate 337c478bd9Sstevel@tonic-gate /* 347c478bd9Sstevel@tonic-gate * Portions of this source code were derived from Berkeley 4.3 BSD 357c478bd9Sstevel@tonic-gate * under license from the Regents of the University of California. 367c478bd9Sstevel@tonic-gate */ 377c478bd9Sstevel@tonic-gate 387c478bd9Sstevel@tonic-gate #include <unistd.h> 397c478bd9Sstevel@tonic-gate #include <sys/types.h> 407c478bd9Sstevel@tonic-gate #include <sys/param.h> 417c478bd9Sstevel@tonic-gate #include <sys/stat.h> 427c478bd9Sstevel@tonic-gate #include <sys/mkdev.h> 437c478bd9Sstevel@tonic-gate #include <sys/wait.h> 447c478bd9Sstevel@tonic-gate #include <dirent.h> 457c478bd9Sstevel@tonic-gate #include <errno.h> 467c478bd9Sstevel@tonic-gate #include <stdio.h> 477c478bd9Sstevel@tonic-gate #include <signal.h> 487c478bd9Sstevel@tonic-gate #include <ctype.h> 497c478bd9Sstevel@tonic-gate #include <locale.h> 507c478bd9Sstevel@tonic-gate #include <nl_types.h> 517c478bd9Sstevel@tonic-gate #include <langinfo.h> 527c478bd9Sstevel@tonic-gate #include <pwd.h> 537c478bd9Sstevel@tonic-gate #include <grp.h> 547c478bd9Sstevel@tonic-gate #include <fcntl.h> 557c478bd9Sstevel@tonic-gate #include <string.h> 567c478bd9Sstevel@tonic-gate #include <malloc.h> 577c478bd9Sstevel@tonic-gate #include <time.h> 587c478bd9Sstevel@tonic-gate #include <utime.h> 597c478bd9Sstevel@tonic-gate #include <stdlib.h> 607c478bd9Sstevel@tonic-gate #include <stdarg.h> 617c478bd9Sstevel@tonic-gate #include <widec.h> 627c478bd9Sstevel@tonic-gate #include <sys/mtio.h> 637c478bd9Sstevel@tonic-gate #include <sys/acl.h> 647c478bd9Sstevel@tonic-gate #include <strings.h> 657c478bd9Sstevel@tonic-gate #include <deflt.h> 667c478bd9Sstevel@tonic-gate #include <limits.h> 677c478bd9Sstevel@tonic-gate #include <iconv.h> 687c478bd9Sstevel@tonic-gate #include <assert.h> 69da6c28aaSamw #include <libgen.h> 70da6c28aaSamw #include <libintl.h> 71fa9e4066Sahrens #include <aclutils.h> 72da6c28aaSamw #include <libnvpair.h> 73da6c28aaSamw #include <archives.h> 743d63ea05Sas145665 757c478bd9Sstevel@tonic-gate #if defined(__SunOS_5_6) || defined(__SunOS_5_7) 767c478bd9Sstevel@tonic-gate extern int defcntl(); 777c478bd9Sstevel@tonic-gate #endif 78da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 79da6c28aaSamw #include <attr.h> 80da6c28aaSamw #include <libcmdutils.h> 81da6c28aaSamw #endif 827c478bd9Sstevel@tonic-gate 8345916cd2Sjpk /* Trusted Extensions */ 8445916cd2Sjpk #include <zone.h> 8545916cd2Sjpk #include <tsol/label.h> 8645916cd2Sjpk #include <sys/tsol/label_macro.h> 8745916cd2Sjpk 88da6c28aaSamw #include "getresponse.h" 897c478bd9Sstevel@tonic-gate /* 907c478bd9Sstevel@tonic-gate * Source compatibility 917c478bd9Sstevel@tonic-gate */ 927c478bd9Sstevel@tonic-gate 937c478bd9Sstevel@tonic-gate /* 947c478bd9Sstevel@tonic-gate * These constants come from archives.h and sys/fcntl.h 957c478bd9Sstevel@tonic-gate * and were introduced by the extended attributes project 967c478bd9Sstevel@tonic-gate * in Solaris 9. 977c478bd9Sstevel@tonic-gate */ 987c478bd9Sstevel@tonic-gate #if !defined(O_XATTR) 997c478bd9Sstevel@tonic-gate #define AT_SYMLINK_NOFOLLOW 0x1000 1007c478bd9Sstevel@tonic-gate #define AT_REMOVEDIR 0x1 1017c478bd9Sstevel@tonic-gate #define AT_FDCWD 0xffd19553 1027c478bd9Sstevel@tonic-gate #define _XATTR_HDRTYPE 'E' 1037c478bd9Sstevel@tonic-gate static int attropen(); 1047c478bd9Sstevel@tonic-gate static int fstatat(); 1057c478bd9Sstevel@tonic-gate static int renameat(); 1067c478bd9Sstevel@tonic-gate static int unlinkat(); 1077c478bd9Sstevel@tonic-gate static int openat(); 1087c478bd9Sstevel@tonic-gate static int fchownat(); 1097c478bd9Sstevel@tonic-gate static int futimesat(); 1107c478bd9Sstevel@tonic-gate #endif 1117c478bd9Sstevel@tonic-gate 1127c478bd9Sstevel@tonic-gate /* 1137c478bd9Sstevel@tonic-gate * Compiling with -D_XPG4_2 gets this but produces other problems, so 1147c478bd9Sstevel@tonic-gate * instead of including sys/time.h and compiling with -D_XPG4_2, I'm 1157c478bd9Sstevel@tonic-gate * explicitly doing the declaration here. 1167c478bd9Sstevel@tonic-gate */ 1177c478bd9Sstevel@tonic-gate int utimes(const char *path, const struct timeval timeval_ptr[]); 1187c478bd9Sstevel@tonic-gate 1197c478bd9Sstevel@tonic-gate #ifndef MINSIZE 1207c478bd9Sstevel@tonic-gate #define MINSIZE 250 1217c478bd9Sstevel@tonic-gate #endif 1227c478bd9Sstevel@tonic-gate #define DEF_FILE "/etc/default/tar" 1237c478bd9Sstevel@tonic-gate 1247c478bd9Sstevel@tonic-gate #define min(a, b) ((a) < (b) ? (a) : (b)) 1257c478bd9Sstevel@tonic-gate #define max(a, b) ((a) > (b) ? (a) : (b)) 1267c478bd9Sstevel@tonic-gate 1277c478bd9Sstevel@tonic-gate #define TBLOCK 512 /* tape block size--should be universal */ 1287c478bd9Sstevel@tonic-gate 1297c478bd9Sstevel@tonic-gate #ifdef BSIZE 1307c478bd9Sstevel@tonic-gate #define SYS_BLOCK BSIZE /* from sys/param.h: secondary block size */ 1317c478bd9Sstevel@tonic-gate #else /* BSIZE */ 1327c478bd9Sstevel@tonic-gate #define SYS_BLOCK 512 /* default if no BSIZE in param.h */ 1337c478bd9Sstevel@tonic-gate #endif /* BSIZE */ 1347c478bd9Sstevel@tonic-gate 1357c478bd9Sstevel@tonic-gate #define NBLOCK 20 1367c478bd9Sstevel@tonic-gate #define NAMSIZ 100 1377c478bd9Sstevel@tonic-gate #define PRESIZ 155 1387c478bd9Sstevel@tonic-gate #define MAXNAM 256 1397c478bd9Sstevel@tonic-gate #define MODEMASK 0777777 /* file creation mode mask */ 1407c478bd9Sstevel@tonic-gate #define POSIXMODES 07777 /* mask for POSIX mode bits */ 1417c478bd9Sstevel@tonic-gate #define MAXEXT 9 /* reasonable max # extents for a file */ 1427c478bd9Sstevel@tonic-gate #define EXTMIN 50 /* min blks left on floppy to split a file */ 1437c478bd9Sstevel@tonic-gate 1447c478bd9Sstevel@tonic-gate /* max value dblock.dbuf.efsize can store */ 1457c478bd9Sstevel@tonic-gate #define TAR_EFSIZE_MAX 0777777777 1467c478bd9Sstevel@tonic-gate 1477c478bd9Sstevel@tonic-gate /* 1487c478bd9Sstevel@tonic-gate * Symbols which specify the values at which the use of the 'E' function 1497c478bd9Sstevel@tonic-gate * modifier is required to properly store a file. 1507c478bd9Sstevel@tonic-gate * 1517c478bd9Sstevel@tonic-gate * TAR_OFFSET_MAX - the largest file size we can archive 1527c478bd9Sstevel@tonic-gate * OCTAL7CHAR - the limit for ustar gid, uid, dev 1537c478bd9Sstevel@tonic-gate */ 1547c478bd9Sstevel@tonic-gate 1557c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG 1567c478bd9Sstevel@tonic-gate /* tiny values which force the creation of extended header entries */ 1577c478bd9Sstevel@tonic-gate #define TAR_OFFSET_MAX 9 1587c478bd9Sstevel@tonic-gate #define OCTAL7CHAR 2 1597c478bd9Sstevel@tonic-gate #else 1607c478bd9Sstevel@tonic-gate /* normal values */ 161b7d62af5Sceastha #define TAR_OFFSET_MAX 077777777777ULL 1627c478bd9Sstevel@tonic-gate #define OCTAL7CHAR 07777777 1637c478bd9Sstevel@tonic-gate #endif 1647c478bd9Sstevel@tonic-gate 1657c478bd9Sstevel@tonic-gate #define TBLOCKS(bytes) (((bytes) + TBLOCK - 1) / TBLOCK) 1667c478bd9Sstevel@tonic-gate #define K(tblocks) ((tblocks+1)/2) /* tblocks to Kbytes for printing */ 1677c478bd9Sstevel@tonic-gate 1687c478bd9Sstevel@tonic-gate #define MAXLEV (PATH_MAX / 2) 1697c478bd9Sstevel@tonic-gate #define LEV0 1 1707c478bd9Sstevel@tonic-gate #define SYMLINK_LEV0 0 1717c478bd9Sstevel@tonic-gate 1727c478bd9Sstevel@tonic-gate #define TRUE 1 1737c478bd9Sstevel@tonic-gate #define FALSE 0 1747c478bd9Sstevel@tonic-gate 1757c478bd9Sstevel@tonic-gate #define XATTR_FILE 1 1767c478bd9Sstevel@tonic-gate #define NORMAL_FILE 0 1777c478bd9Sstevel@tonic-gate 1787c478bd9Sstevel@tonic-gate #define PUT_AS_LINK 1 1797c478bd9Sstevel@tonic-gate #define PUT_NOTAS_LINK 0 1807c478bd9Sstevel@tonic-gate 181da6c28aaSamw #ifndef VIEW_READONLY 182da6c28aaSamw #define VIEW_READONLY "SUNWattr_ro" 183da6c28aaSamw #endif 184da6c28aaSamw 185da6c28aaSamw #ifndef VIEW_READWRITE 186da6c28aaSamw #define VIEW_READWRITE "SUNWattr_rw" 187da6c28aaSamw #endif 188da6c28aaSamw 1897c478bd9Sstevel@tonic-gate #if _FILE_OFFSET_BITS == 64 1907c478bd9Sstevel@tonic-gate #define FMT_off_t "lld" 1917c478bd9Sstevel@tonic-gate #define FMT_off_t_o "llo" 1927c478bd9Sstevel@tonic-gate #define FMT_blkcnt_t "lld" 1937c478bd9Sstevel@tonic-gate #else 1947c478bd9Sstevel@tonic-gate #define FMT_off_t "ld" 1957c478bd9Sstevel@tonic-gate #define FMT_off_t_o "lo" 1967c478bd9Sstevel@tonic-gate #define FMT_blkcnt_t "ld" 1977c478bd9Sstevel@tonic-gate #endif 1987c478bd9Sstevel@tonic-gate 1997c478bd9Sstevel@tonic-gate /* ACL support */ 2007c478bd9Sstevel@tonic-gate 2017c478bd9Sstevel@tonic-gate static 2027c478bd9Sstevel@tonic-gate struct sec_attr { 2037c478bd9Sstevel@tonic-gate char attr_type; 2047c478bd9Sstevel@tonic-gate char attr_len[7]; 2057c478bd9Sstevel@tonic-gate char attr_info[1]; 2067c478bd9Sstevel@tonic-gate } *attr; 2077c478bd9Sstevel@tonic-gate 208da6c28aaSamw #if defined(O_XATTR) 209da6c28aaSamw typedef enum { 210da6c28aaSamw ATTR_OK, 211da6c28aaSamw ATTR_SKIP, 212da6c28aaSamw ATTR_CHDIR_ERR, 213da6c28aaSamw ATTR_OPEN_ERR, 214da6c28aaSamw ATTR_XATTR_ERR, 215da6c28aaSamw ATTR_SATTR_ERR 216da6c28aaSamw } attr_status_t; 217da6c28aaSamw #endif 218da6c28aaSamw 219da6c28aaSamw #if defined(O_XATTR) 220da6c28aaSamw typedef enum { 221da6c28aaSamw ARC_CREATE, 222da6c28aaSamw ARC_RESTORE 223da6c28aaSamw } arc_action_t; 224da6c28aaSamw #endif 225da6c28aaSamw 226da6c28aaSamw typedef struct attr_data { 227da6c28aaSamw char *attr_parent; 228da6c28aaSamw char *attr_path; 229da6c28aaSamw int attr_parentfd; 230da6c28aaSamw int attr_rw_sysattr; 231da6c28aaSamw } attr_data_t; 232da6c28aaSamw 2337c478bd9Sstevel@tonic-gate /* 2347c478bd9Sstevel@tonic-gate * 2357c478bd9Sstevel@tonic-gate * Tar has been changed to support extended attributes. 2367c478bd9Sstevel@tonic-gate * 2377c478bd9Sstevel@tonic-gate * As part of this change tar now uses the new *at() syscalls 2387c478bd9Sstevel@tonic-gate * such as openat, fchownat(), unlinkat()... 2397c478bd9Sstevel@tonic-gate * 2407c478bd9Sstevel@tonic-gate * This was done so that attributes can be handled with as few code changes 2417c478bd9Sstevel@tonic-gate * as possible. 2427c478bd9Sstevel@tonic-gate * 2437c478bd9Sstevel@tonic-gate * What this means is that tar now opens the directory that a file or directory 2447c478bd9Sstevel@tonic-gate * resides in and then performs *at() functions to manipulate the entry. 2457c478bd9Sstevel@tonic-gate * 2467c478bd9Sstevel@tonic-gate * For example a new file is now created like this: 2477c478bd9Sstevel@tonic-gate * 2487c478bd9Sstevel@tonic-gate * dfd = open(<some dir path>) 2497c478bd9Sstevel@tonic-gate * fd = openat(dfd, <name>,....); 2507c478bd9Sstevel@tonic-gate * 2517c478bd9Sstevel@tonic-gate * or in the case of an extended attribute 2527c478bd9Sstevel@tonic-gate * 2537c478bd9Sstevel@tonic-gate * dfd = attropen(<pathname>, ".", ....) 2547c478bd9Sstevel@tonic-gate * 2557c478bd9Sstevel@tonic-gate * Once we have a directory file descriptor all of the *at() functions can 2567c478bd9Sstevel@tonic-gate * be applied to it. 2577c478bd9Sstevel@tonic-gate * 2587c478bd9Sstevel@tonic-gate * unlinkat(dfd, <component name>,...) 2597c478bd9Sstevel@tonic-gate * fchownat(dfd, <component name>,..) 2607c478bd9Sstevel@tonic-gate * 2617c478bd9Sstevel@tonic-gate * This works for both normal namespace files and extended attribute file 2627c478bd9Sstevel@tonic-gate * 2637c478bd9Sstevel@tonic-gate */ 2647c478bd9Sstevel@tonic-gate 2657c478bd9Sstevel@tonic-gate /* 2667c478bd9Sstevel@tonic-gate * 2677c478bd9Sstevel@tonic-gate * Extended attribute Format 2687c478bd9Sstevel@tonic-gate * 2697c478bd9Sstevel@tonic-gate * Extended attributes are stored in two pieces. 2707c478bd9Sstevel@tonic-gate * 1. An attribute header which has information about 2717c478bd9Sstevel@tonic-gate * what file the attribute is for and what the attribute 2727c478bd9Sstevel@tonic-gate * is named. 2737c478bd9Sstevel@tonic-gate * 2. The attribute record itself. Stored as a normal file type 2747c478bd9Sstevel@tonic-gate * of entry. 2757c478bd9Sstevel@tonic-gate * Both the header and attribute record have special modes/typeflags 2767c478bd9Sstevel@tonic-gate * associated with them. 2777c478bd9Sstevel@tonic-gate * 2787c478bd9Sstevel@tonic-gate * The names of the header in the archive look like: 2797c478bd9Sstevel@tonic-gate * /dev/null/attr.hdr 2807c478bd9Sstevel@tonic-gate * 2817c478bd9Sstevel@tonic-gate * The name of the attribute looks like: 2827c478bd9Sstevel@tonic-gate * /dev/null/attr 2837c478bd9Sstevel@tonic-gate * 2847c478bd9Sstevel@tonic-gate * This is done so that an archiver that doesn't understand these formats 2857c478bd9Sstevel@tonic-gate * can just dispose of the attribute records. 2867c478bd9Sstevel@tonic-gate * 2877c478bd9Sstevel@tonic-gate * The format is composed of a fixed size header followed 2887c478bd9Sstevel@tonic-gate * by a variable sized xattr_buf. If the attribute is a hard link 2897c478bd9Sstevel@tonic-gate * to another attribute then another xattr_buf section is included 2907c478bd9Sstevel@tonic-gate * for the link. 2917c478bd9Sstevel@tonic-gate * 2927c478bd9Sstevel@tonic-gate * The xattr_buf is used to define the necessary "pathing" steps 2937c478bd9Sstevel@tonic-gate * to get to the extended attribute. This is necessary to support 2947c478bd9Sstevel@tonic-gate * a fully recursive attribute model where an attribute may itself 2957c478bd9Sstevel@tonic-gate * have an attribute. 2967c478bd9Sstevel@tonic-gate * 2977c478bd9Sstevel@tonic-gate * The basic layout looks like this. 2987c478bd9Sstevel@tonic-gate * 2997c478bd9Sstevel@tonic-gate * -------------------------------- 3007c478bd9Sstevel@tonic-gate * | | 3017c478bd9Sstevel@tonic-gate * | xattr_hdr | 3027c478bd9Sstevel@tonic-gate * | | 3037c478bd9Sstevel@tonic-gate * -------------------------------- 3047c478bd9Sstevel@tonic-gate * -------------------------------- 3057c478bd9Sstevel@tonic-gate * | | 3067c478bd9Sstevel@tonic-gate * | xattr_buf | 3077c478bd9Sstevel@tonic-gate * | | 3087c478bd9Sstevel@tonic-gate * -------------------------------- 3097c478bd9Sstevel@tonic-gate * -------------------------------- 3107c478bd9Sstevel@tonic-gate * | | 3117c478bd9Sstevel@tonic-gate * | (optional link info) | 3127c478bd9Sstevel@tonic-gate * | | 3137c478bd9Sstevel@tonic-gate * -------------------------------- 3147c478bd9Sstevel@tonic-gate * -------------------------------- 3157c478bd9Sstevel@tonic-gate * | | 3167c478bd9Sstevel@tonic-gate * | attribute itself | 3177c478bd9Sstevel@tonic-gate * | stored as normal tar | 3187c478bd9Sstevel@tonic-gate * | or cpio data with | 3197c478bd9Sstevel@tonic-gate * | special mode or | 3207c478bd9Sstevel@tonic-gate * | typeflag | 3217c478bd9Sstevel@tonic-gate * | | 3227c478bd9Sstevel@tonic-gate * -------------------------------- 3237c478bd9Sstevel@tonic-gate * 3247c478bd9Sstevel@tonic-gate */ 3257c478bd9Sstevel@tonic-gate 3267c478bd9Sstevel@tonic-gate /* 3277c478bd9Sstevel@tonic-gate * xattrhead is a pointer to the xattr_hdr 3287c478bd9Sstevel@tonic-gate * 3297c478bd9Sstevel@tonic-gate * xattrp is a pointer to the xattr_buf structure 3307c478bd9Sstevel@tonic-gate * which contains the "pathing" steps to get to attributes 3317c478bd9Sstevel@tonic-gate * 3327c478bd9Sstevel@tonic-gate * xattr_linkp is a pointer to another xattr_buf structure that is 3337c478bd9Sstevel@tonic-gate * only used when an attribute is actually linked to another attribute 3347c478bd9Sstevel@tonic-gate * 3357c478bd9Sstevel@tonic-gate */ 3367c478bd9Sstevel@tonic-gate 3377c478bd9Sstevel@tonic-gate static struct xattr_hdr *xattrhead; 3387c478bd9Sstevel@tonic-gate static struct xattr_buf *xattrp; 3397c478bd9Sstevel@tonic-gate static struct xattr_buf *xattr_linkp; /* pointer to link info, if any */ 340da6c28aaSamw static char *xattrapath; /* attribute name */ 3417c478bd9Sstevel@tonic-gate static char *xattr_linkaname; /* attribute attribute is linked to */ 3427c478bd9Sstevel@tonic-gate static char Hiddendir; /* are we processing hidden xattr dir */ 3437c478bd9Sstevel@tonic-gate static char xattrbadhead; 3447c478bd9Sstevel@tonic-gate 3457c478bd9Sstevel@tonic-gate /* Was statically allocated tbuf[NBLOCK] */ 3467c478bd9Sstevel@tonic-gate static 3477c478bd9Sstevel@tonic-gate union hblock { 3487c478bd9Sstevel@tonic-gate char dummy[TBLOCK]; 3497c478bd9Sstevel@tonic-gate struct header { 3507c478bd9Sstevel@tonic-gate char name[NAMSIZ]; /* If non-null prefix, path is */ 3517c478bd9Sstevel@tonic-gate /* <prefix>/<name>; otherwise */ 3527c478bd9Sstevel@tonic-gate /* <name> */ 3537c478bd9Sstevel@tonic-gate char mode[8]; 3547c478bd9Sstevel@tonic-gate char uid[8]; 3557c478bd9Sstevel@tonic-gate char gid[8]; 3567c478bd9Sstevel@tonic-gate char size[12]; /* size of this extent if file split */ 3577c478bd9Sstevel@tonic-gate char mtime[12]; 3587c478bd9Sstevel@tonic-gate char chksum[8]; 3597c478bd9Sstevel@tonic-gate char typeflag; 3607c478bd9Sstevel@tonic-gate char linkname[NAMSIZ]; 3617c478bd9Sstevel@tonic-gate char magic[6]; 3627c478bd9Sstevel@tonic-gate char version[2]; 3637c478bd9Sstevel@tonic-gate char uname[32]; 3647c478bd9Sstevel@tonic-gate char gname[32]; 3657c478bd9Sstevel@tonic-gate char devmajor[8]; 3667c478bd9Sstevel@tonic-gate char devminor[8]; 3677c478bd9Sstevel@tonic-gate char prefix[PRESIZ]; /* Together with "name", the path of */ 3687c478bd9Sstevel@tonic-gate /* the file: <prefix>/<name> */ 3697c478bd9Sstevel@tonic-gate char extno; /* extent #, null if not split */ 3707c478bd9Sstevel@tonic-gate char extotal; /* total extents */ 3717c478bd9Sstevel@tonic-gate char efsize[10]; /* size of entire file */ 3727c478bd9Sstevel@tonic-gate } dbuf; 3737c478bd9Sstevel@tonic-gate } dblock, *tbuf, xhdr_buf; 3747c478bd9Sstevel@tonic-gate 3757c478bd9Sstevel@tonic-gate static 3767c478bd9Sstevel@tonic-gate struct xtar_hdr { 3777c478bd9Sstevel@tonic-gate uid_t x_uid, /* Uid of file */ 3787c478bd9Sstevel@tonic-gate x_gid; /* Gid of file */ 3797c478bd9Sstevel@tonic-gate major_t x_devmajor; /* Device major node */ 3807c478bd9Sstevel@tonic-gate minor_t x_devminor; /* Device minor node */ 3817c478bd9Sstevel@tonic-gate off_t x_filesz; /* Length of file */ 3827c478bd9Sstevel@tonic-gate char *x_uname, /* Pointer to name of user */ 3837c478bd9Sstevel@tonic-gate *x_gname, /* Pointer to gid of user */ 3847c478bd9Sstevel@tonic-gate *x_linkpath, /* Path for a hard/symbolic link */ 3857c478bd9Sstevel@tonic-gate *x_path; /* Path of file */ 3867c478bd9Sstevel@tonic-gate timestruc_t x_mtime; /* Seconds and nanoseconds */ 3877c478bd9Sstevel@tonic-gate } Xtarhdr; 3887c478bd9Sstevel@tonic-gate 3897c478bd9Sstevel@tonic-gate static 3907c478bd9Sstevel@tonic-gate struct gen_hdr { 3917c478bd9Sstevel@tonic-gate ulong_t g_mode; /* Mode of file */ 3927c478bd9Sstevel@tonic-gate uid_t g_uid, /* Uid of file */ 3937c478bd9Sstevel@tonic-gate g_gid; /* Gid of file */ 3947c478bd9Sstevel@tonic-gate off_t g_filesz; /* Length of file */ 3957c478bd9Sstevel@tonic-gate time_t g_mtime; /* Modification time */ 3967c478bd9Sstevel@tonic-gate uint_t g_cksum; /* Checksum of file */ 3977c478bd9Sstevel@tonic-gate ulong_t g_devmajor, /* File system of file */ 3987c478bd9Sstevel@tonic-gate g_devminor; /* Major/minor of special files */ 3997c478bd9Sstevel@tonic-gate } Gen; 4007c478bd9Sstevel@tonic-gate 4017c478bd9Sstevel@tonic-gate static 4027c478bd9Sstevel@tonic-gate struct linkbuf { 4037c478bd9Sstevel@tonic-gate ino_t inum; 4047c478bd9Sstevel@tonic-gate dev_t devnum; 4057c478bd9Sstevel@tonic-gate int count; 4067c478bd9Sstevel@tonic-gate char pathname[MAXNAM+1]; /* added 1 for last NULL */ 4077c478bd9Sstevel@tonic-gate char attrname[MAXNAM+1]; 4087c478bd9Sstevel@tonic-gate struct linkbuf *nextp; 4097c478bd9Sstevel@tonic-gate } *ihead; 4107c478bd9Sstevel@tonic-gate 4117c478bd9Sstevel@tonic-gate /* see comments before build_table() */ 4127c478bd9Sstevel@tonic-gate #define TABLE_SIZE 512 4135e2174acSceastha typedef struct file_list { 4147c478bd9Sstevel@tonic-gate char *name; /* Name of file to {in,ex}clude */ 4157c478bd9Sstevel@tonic-gate struct file_list *next; /* Linked list */ 4165e2174acSceastha } file_list_t; 4175e2174acSceastha static file_list_t *exclude_tbl[TABLE_SIZE], 4187c478bd9Sstevel@tonic-gate *include_tbl[TABLE_SIZE]; 4197c478bd9Sstevel@tonic-gate 42045916cd2Sjpk static int append_secattr(char **, int *, int, char *, char); 4217c478bd9Sstevel@tonic-gate static void write_ancillary(union hblock *, char *, int, char); 4227c478bd9Sstevel@tonic-gate 4235e2174acSceastha static void add_file_to_table(file_list_t *table[], char *str); 4247c478bd9Sstevel@tonic-gate static void assert_string(char *s, char *msg); 4257c478bd9Sstevel@tonic-gate static int istape(int fd, int type); 4267c478bd9Sstevel@tonic-gate static void backtape(void); 4275e2174acSceastha static void build_table(file_list_t *table[], char *file); 428da6c28aaSamw static int check_prefix(char **namep, char **dirp, char **compp); 4297c478bd9Sstevel@tonic-gate static void closevol(void); 4307c478bd9Sstevel@tonic-gate static void copy(void *dst, void *src); 4317c478bd9Sstevel@tonic-gate static int convtoreg(off_t); 4322c0f0499Slovely static void delete_target(int fd, char *comp, char *namep); 4337c478bd9Sstevel@tonic-gate static void doDirTimes(char *name, timestruc_t modTime); 4347c478bd9Sstevel@tonic-gate static void done(int n); 4357c478bd9Sstevel@tonic-gate static void dorep(char *argv[]); 4367c478bd9Sstevel@tonic-gate static void dotable(char *argv[]); 4377c478bd9Sstevel@tonic-gate static void doxtract(char *argv[]); 438b25dbf38SRich Burridge static int tar_chdir(const char *path); 4393a1dab68SRich Burridge static int is_directory(char *name); 4401a431409SRich Burridge static int has_dot_dot(char *name); 4411a431409SRich Burridge static int is_absolute(char *name); 4421a431409SRich Burridge static char *make_relative_name(char *name, char **stripped_prefix); 4437c478bd9Sstevel@tonic-gate static void fatal(char *format, ...); 4447c478bd9Sstevel@tonic-gate static void vperror(int exit_status, char *fmt, ...); 4457c478bd9Sstevel@tonic-gate static void flushtape(void); 4467c478bd9Sstevel@tonic-gate static void getdir(void); 4477c478bd9Sstevel@tonic-gate static void *getmem(size_t); 4487c478bd9Sstevel@tonic-gate static void longt(struct stat *st, char aclchar); 449123523f8Sas158974 static void load_info_from_xtarhdr(u_longlong_t flag, struct xtar_hdr *xhdrp); 4507c478bd9Sstevel@tonic-gate static int makeDir(char *name); 4517c478bd9Sstevel@tonic-gate static void mterr(char *operation, int i, int exitcode); 4527c478bd9Sstevel@tonic-gate static void newvol(void); 4537c478bd9Sstevel@tonic-gate static void passtape(void); 4547c478bd9Sstevel@tonic-gate static void putempty(blkcnt_t n); 4557c478bd9Sstevel@tonic-gate static int putfile(char *longname, char *shortname, char *parent, 456da6c28aaSamw attr_data_t *attrinfo, int filetype, int lev, int symlink_lev); 4577c478bd9Sstevel@tonic-gate static void readtape(char *buffer); 4587c478bd9Sstevel@tonic-gate static void seekdisk(blkcnt_t blocks); 4597c478bd9Sstevel@tonic-gate static void setPathTimes(int dirfd, char *path, timestruc_t modTime); 460123523f8Sas158974 static void setbytes_to_skip(struct stat *st, int err); 4617c478bd9Sstevel@tonic-gate static void splitfile(char *longname, int ifd, char *name, 4627c478bd9Sstevel@tonic-gate char *prefix, int filetype); 4637c478bd9Sstevel@tonic-gate static void tomodes(struct stat *sp); 4647c478bd9Sstevel@tonic-gate static void usage(void); 465da6c28aaSamw static int xblocks(int issysattr, off_t bytes, int ofile); 466da6c28aaSamw static int xsfile(int issysattr, int ofd); 4677c478bd9Sstevel@tonic-gate static void resugname(int dirfd, char *name, int symflag); 4687c478bd9Sstevel@tonic-gate static int bcheck(char *bstr); 4697c478bd9Sstevel@tonic-gate static int checkdir(char *name); 4707c478bd9Sstevel@tonic-gate static int checksum(union hblock *dblockp); 4717c478bd9Sstevel@tonic-gate #ifdef EUC 4727c478bd9Sstevel@tonic-gate static int checksum_signed(union hblock *dblockp); 4737c478bd9Sstevel@tonic-gate #endif /* EUC */ 4747c478bd9Sstevel@tonic-gate static int checkupdate(char *arg); 4757c478bd9Sstevel@tonic-gate static int checkw(char c, char *name); 4767c478bd9Sstevel@tonic-gate static int cmp(char *b, char *s, int n); 4777c478bd9Sstevel@tonic-gate static int defset(char *arch); 478*28c4d110SJoshua M. Clulow static boolean_t endtape(void); 4795e2174acSceastha static int is_in_table(file_list_t *table[], char *str); 4807c478bd9Sstevel@tonic-gate static int notsame(void); 4817c478bd9Sstevel@tonic-gate static int is_prefix(char *s1, char *s2); 4827c478bd9Sstevel@tonic-gate static int response(void); 4837c478bd9Sstevel@tonic-gate static int build_dblock(const char *, const char *, const char, 4847c478bd9Sstevel@tonic-gate const int filetype, const struct stat *, const dev_t, const char *); 4857c478bd9Sstevel@tonic-gate static unsigned int hash(char *str); 4867c478bd9Sstevel@tonic-gate 4877c478bd9Sstevel@tonic-gate static blkcnt_t kcheck(char *kstr); 4887c478bd9Sstevel@tonic-gate static off_t bsrch(char *s, int n, off_t l, off_t h); 4897c478bd9Sstevel@tonic-gate static void onintr(int sig); 4907c478bd9Sstevel@tonic-gate static void onquit(int sig); 4917c478bd9Sstevel@tonic-gate static void onhup(int sig); 4927c478bd9Sstevel@tonic-gate static uid_t getuidbyname(char *); 4937c478bd9Sstevel@tonic-gate static gid_t getgidbyname(char *); 4947c478bd9Sstevel@tonic-gate static char *getname(gid_t); 4957c478bd9Sstevel@tonic-gate static char *getgroup(gid_t); 4967c478bd9Sstevel@tonic-gate static int checkf(char *name, int mode, int howmuch); 4977c478bd9Sstevel@tonic-gate static int writetbuf(char *buffer, int n); 498da6c28aaSamw static int wantit(char *argv[], char **namep, char **dirp, char **comp, 499da6c28aaSamw attr_data_t **attrinfo); 50045916cd2Sjpk static void append_ext_attr(char *shortname, char **secinfo, int *len); 5017c478bd9Sstevel@tonic-gate static int get_xdata(void); 5027c478bd9Sstevel@tonic-gate static void gen_num(const char *keyword, const u_longlong_t number); 5037c478bd9Sstevel@tonic-gate static void gen_date(const char *keyword, const timestruc_t time_value); 5047c478bd9Sstevel@tonic-gate static void gen_string(const char *keyword, const char *value); 5057c478bd9Sstevel@tonic-gate static void get_xtime(char *value, timestruc_t *xtime); 5067c478bd9Sstevel@tonic-gate static int chk_path_build(char *name, char *longname, char *linkname, 5077c478bd9Sstevel@tonic-gate char *prefix, char type, int filetype); 5087c478bd9Sstevel@tonic-gate static int gen_utf8_names(const char *filename); 5097c478bd9Sstevel@tonic-gate static int utf8_local(char *option, char **Xhdr_ptrptr, char *target, 5107c478bd9Sstevel@tonic-gate const char *src, int max_val); 5117c478bd9Sstevel@tonic-gate static int local_utf8(char **Xhdr_ptrptr, char *target, const char *src, 5127c478bd9Sstevel@tonic-gate iconv_t iconv_cd, int xhdrflg, int max_val); 5137c478bd9Sstevel@tonic-gate static int c_utf8(char *target, const char *source); 514da6c28aaSamw static int getstat(int dirfd, char *longname, char *shortname, 515da6c28aaSamw char *attrparent); 516da6c28aaSamw static void xattrs_put(char *, char *, char *, char *); 5177c478bd9Sstevel@tonic-gate static void prepare_xattr(char **, char *, char *, 5187c478bd9Sstevel@tonic-gate char, struct linkbuf *, int *); 519da6c28aaSamw static int put_link(char *name, char *longname, char *component, 520da6c28aaSamw char *longattrname, char *prefix, int filetype, char typeflag); 5217c478bd9Sstevel@tonic-gate static int put_extra_attributes(char *longname, char *shortname, 522da6c28aaSamw char *longattrname, char *prefix, int filetype, char typeflag); 523da6c28aaSamw static int put_xattr_hdr(char *longname, char *shortname, char *longattrname, 524da6c28aaSamw char *prefix, int typeflag, int filetype, struct linkbuf *lp); 525da6c28aaSamw static int read_xattr_hdr(attr_data_t **attrinfo); 52645916cd2Sjpk 52745916cd2Sjpk /* Trusted Extensions */ 52845916cd2Sjpk #define AUTO_ZONE "/zone" 52945916cd2Sjpk 53045916cd2Sjpk static void extract_attr(char **file_ptr, struct sec_attr *); 53145916cd2Sjpk static int check_ext_attr(char *filename); 53245916cd2Sjpk static void rebuild_comp_path(char *str, char **namep); 53345916cd2Sjpk static int rebuild_lk_comp_path(char *str, char **namep); 53445916cd2Sjpk 5357c478bd9Sstevel@tonic-gate static void get_parent(char *path, char *dir); 5367c478bd9Sstevel@tonic-gate static char *get_component(char *path); 537da6c28aaSamw static int retry_open_attr(int pdirfd, int cwd, char *dirp, char *pattr, 538da6c28aaSamw char *name, int oflag, mode_t mode); 5397c478bd9Sstevel@tonic-gate static char *skipslashes(char *string, char *start); 5407c478bd9Sstevel@tonic-gate static void chop_endslashes(char *path); 54136802407SRich Burridge static pid_t compress_file(void); 54236802407SRich Burridge static void compress_back(void); 54336802407SRich Burridge static void decompress_file(void); 54436802407SRich Burridge static pid_t uncompress_file(void); 54536802407SRich Burridge static void *compress_malloc(size_t); 546506ea5b8SMilan Jurik static void check_compression(void); 547506ea5b8SMilan Jurik static char *bz_suffix(void); 548506ea5b8SMilan Jurik static char *gz_suffix(void); 549506ea5b8SMilan Jurik static char *xz_suffix(void); 55036802407SRich Burridge static char *add_suffix(); 55136802407SRich Burridge static void wait_pid(pid_t); 552aa7166bdSMilan Jurik static void verify_compress_opt(const char *t); 553aa7166bdSMilan Jurik static void detect_compress(void); 554*28c4d110SJoshua M. Clulow static void dlog(const char *, ...); 555*28c4d110SJoshua M. Clulow static boolean_t should_enable_debug(void); 556fa9e4066Sahrens 5577c478bd9Sstevel@tonic-gate static struct stat stbuf; 5587c478bd9Sstevel@tonic-gate 559da6c28aaSamw static char *myname; 560c92bf99eSJoshua M. Clulow static char *xtract_chdir = NULL; 5617c478bd9Sstevel@tonic-gate static int checkflag = 0; 5627c478bd9Sstevel@tonic-gate static int Xflag, Fflag, iflag, hflag, Bflag, Iflag; 563c536b1f9SRobert Mustacchi static int rflag, xflag, vflag, tflag, mt, cflag, mflag, pflag; 5647c478bd9Sstevel@tonic-gate static int uflag; 565cc22b130SRich Burridge static int errflag; 5667c478bd9Sstevel@tonic-gate static int oflag; 567cc22b130SRich Burridge static int bflag, Aflag; 5687c478bd9Sstevel@tonic-gate static int Pflag; /* POSIX conformant archive */ 5697c478bd9Sstevel@tonic-gate static int Eflag; /* Allow files greater than 8GB */ 5707c478bd9Sstevel@tonic-gate static int atflag; /* traverse extended attributes */ 571da6c28aaSamw static int saflag; /* traverse extended sys attributes */ 5727c478bd9Sstevel@tonic-gate static int Dflag; /* Data change flag */ 57336802407SRich Burridge static int jflag; /* flag to use 'bzip2' */ 57436802407SRich Burridge static int zflag; /* flag to use 'gzip' */ 57536802407SRich Burridge static int Zflag; /* flag to use 'compress' */ 576506ea5b8SMilan Jurik static int Jflag; /* flag to use 'xz' */ 577aa7166bdSMilan Jurik static int aflag; /* flag to use autocompression */ 57836802407SRich Burridge 57945916cd2Sjpk /* Trusted Extensions */ 58045916cd2Sjpk static int Tflag; /* Trusted Extensions attr flags */ 58145916cd2Sjpk static int dir_flag; /* for attribute extract */ 58245916cd2Sjpk static int mld_flag; /* for attribute extract */ 58345916cd2Sjpk static char *orig_namep; /* original namep - unadorned */ 58445916cd2Sjpk static int rpath_flag; /* MLD real path is rebuilt */ 58545916cd2Sjpk static char real_path[MAXPATHLEN]; /* MLD real path */ 58645916cd2Sjpk static int lk_rpath_flag; /* linked to real path is rebuilt */ 58745916cd2Sjpk static char lk_real_path[MAXPATHLEN]; /* linked real path */ 58845916cd2Sjpk static bslabel_t bs_label; /* for attribute extract */ 58945916cd2Sjpk static bslabel_t admin_low; 59045916cd2Sjpk static bslabel_t admin_high; 59145916cd2Sjpk static int ignored_aprivs = 0; 59245916cd2Sjpk static int ignored_fprivs = 0; 59345916cd2Sjpk static int ignored_fattrs = 0; 59445916cd2Sjpk 5957c478bd9Sstevel@tonic-gate static int term, chksum, wflag, 5967c478bd9Sstevel@tonic-gate first = TRUE, defaults_used = FALSE, linkerrok; 5977c478bd9Sstevel@tonic-gate static blkcnt_t recno; 5987c478bd9Sstevel@tonic-gate static int freemem = 1; 5997c478bd9Sstevel@tonic-gate static int nblock = NBLOCK; 6007c478bd9Sstevel@tonic-gate static int Errflg = 0; 6017c478bd9Sstevel@tonic-gate static int exitflag = 0; 6027c478bd9Sstevel@tonic-gate 6037c478bd9Sstevel@tonic-gate static dev_t mt_dev; /* device containing output file */ 6047c478bd9Sstevel@tonic-gate static ino_t mt_ino; /* inode number of output file */ 6057c478bd9Sstevel@tonic-gate static int mt_devtype; /* dev type of archive, from stat structure */ 6067c478bd9Sstevel@tonic-gate 6077c478bd9Sstevel@tonic-gate static int update = 1; /* for `open' call */ 6087c478bd9Sstevel@tonic-gate 6097c478bd9Sstevel@tonic-gate static off_t low; 6107c478bd9Sstevel@tonic-gate static off_t high; 6117c478bd9Sstevel@tonic-gate 6127c478bd9Sstevel@tonic-gate static FILE *tfile; 6137c478bd9Sstevel@tonic-gate static FILE *vfile = stdout; 61431a2de35SRich Burridge static char *tmpdir; 61531a2de35SRich Burridge static char *tmp_suffix = "/tarXXXXXX"; 61631a2de35SRich Burridge static char *tname; 6177c478bd9Sstevel@tonic-gate static char archive[] = "archive0="; 6187c478bd9Sstevel@tonic-gate static char *Xfile; 6197c478bd9Sstevel@tonic-gate static char *usefile; 62036802407SRich Burridge static char tfname[1024]; 6217c478bd9Sstevel@tonic-gate 6227c478bd9Sstevel@tonic-gate static int mulvol; /* multi-volume option selected */ 6237c478bd9Sstevel@tonic-gate static blkcnt_t blocklim; /* number of blocks to accept per volume */ 6247c478bd9Sstevel@tonic-gate static blkcnt_t tapepos; /* current block number to be written */ 6257c478bd9Sstevel@tonic-gate static int NotTape; /* true if tape is a disk */ 6267c478bd9Sstevel@tonic-gate static int dumping; /* true if writing a tape or other archive */ 6277c478bd9Sstevel@tonic-gate static int extno; /* number of extent: starts at 1 */ 6287c478bd9Sstevel@tonic-gate static int extotal; /* total extents in this file */ 6297c478bd9Sstevel@tonic-gate static off_t extsize; /* size of current extent during extraction */ 6307c478bd9Sstevel@tonic-gate static ushort_t Oumask = 0; /* old umask value */ 631*28c4d110SJoshua M. Clulow static boolean_t is_posix; /* true if archive is POSIX-conformant */ 6327c478bd9Sstevel@tonic-gate static const char *magic_type = "ustar"; 6337c478bd9Sstevel@tonic-gate static size_t xrec_size = 8 * PATH_MAX; /* extended rec initial size */ 6347c478bd9Sstevel@tonic-gate static char *xrec_ptr; 6357c478bd9Sstevel@tonic-gate static off_t xrec_offset = 0; 6367c478bd9Sstevel@tonic-gate static int Xhdrflag; 6377c478bd9Sstevel@tonic-gate static int charset_type = 0; 6387c478bd9Sstevel@tonic-gate 6397c478bd9Sstevel@tonic-gate static u_longlong_t xhdr_flgs; /* Bits set determine which items */ 6407c478bd9Sstevel@tonic-gate /* need to be in extended header. */ 641c536b1f9SRobert Mustacchi static pid_t comp_pid = 0; 642c536b1f9SRobert Mustacchi 643*28c4d110SJoshua M. Clulow static boolean_t debug_output = B_FALSE; 644*28c4d110SJoshua M. Clulow 6457c478bd9Sstevel@tonic-gate #define _X_DEVMAJOR 0x1 6467c478bd9Sstevel@tonic-gate #define _X_DEVMINOR 0x2 6477c478bd9Sstevel@tonic-gate #define _X_GID 0x4 6487c478bd9Sstevel@tonic-gate #define _X_GNAME 0x8 6497c478bd9Sstevel@tonic-gate #define _X_LINKPATH 0x10 6507c478bd9Sstevel@tonic-gate #define _X_PATH 0x20 6517c478bd9Sstevel@tonic-gate #define _X_SIZE 0x40 6527c478bd9Sstevel@tonic-gate #define _X_UID 0x80 6537c478bd9Sstevel@tonic-gate #define _X_UNAME 0x100 6547c478bd9Sstevel@tonic-gate #define _X_ATIME 0x200 6557c478bd9Sstevel@tonic-gate #define _X_CTIME 0x400 6567c478bd9Sstevel@tonic-gate #define _X_MTIME 0x800 657123523f8Sas158974 #define _X_XHDR 0x1000 /* Bit flag that determines whether 'X' */ 658123523f8Sas158974 /* typeflag was followed by 'A' or non 'A' */ 659123523f8Sas158974 /* typeflag. */ 6607c478bd9Sstevel@tonic-gate #define _X_LAST 0x40000000 6617c478bd9Sstevel@tonic-gate 6627c478bd9Sstevel@tonic-gate #define PID_MAX_DIGITS (10 * sizeof (pid_t) / 4) 6637c478bd9Sstevel@tonic-gate #define TIME_MAX_DIGITS (10 * sizeof (time_t) / 4) 6647c478bd9Sstevel@tonic-gate #define LONG_MAX_DIGITS (10 * sizeof (long) / 4) 6657c478bd9Sstevel@tonic-gate #define ULONGLONG_MAX_DIGITS (10 * sizeof (u_longlong_t) / 4) 6667c478bd9Sstevel@tonic-gate /* 6677c478bd9Sstevel@tonic-gate * UTF_8 encoding requires more space than the current codeset equivalent. 6687c478bd9Sstevel@tonic-gate * Currently a factor of 2-3 would suffice, but it is possible for a factor 6697c478bd9Sstevel@tonic-gate * of 6 to be needed in the future, so for saftey, we use that here. 6707c478bd9Sstevel@tonic-gate */ 6717c478bd9Sstevel@tonic-gate #define UTF_8_FACTOR 6 6727c478bd9Sstevel@tonic-gate 6737c478bd9Sstevel@tonic-gate static u_longlong_t xhdr_count = 0; 6747c478bd9Sstevel@tonic-gate static char xhdr_dirname[PRESIZ + 1]; 6757c478bd9Sstevel@tonic-gate static char pidchars[PID_MAX_DIGITS + 1]; 6767c478bd9Sstevel@tonic-gate static char *tchar = ""; /* null linkpath */ 6777c478bd9Sstevel@tonic-gate 6787c478bd9Sstevel@tonic-gate static char local_path[UTF_8_FACTOR * PATH_MAX + 1]; 6797c478bd9Sstevel@tonic-gate static char local_linkpath[UTF_8_FACTOR * PATH_MAX + 1]; 6807c478bd9Sstevel@tonic-gate static char local_gname[UTF_8_FACTOR * _POSIX_NAME_MAX + 1]; 6817c478bd9Sstevel@tonic-gate static char local_uname[UTF_8_FACTOR * _POSIX_NAME_MAX + 1]; 6827c478bd9Sstevel@tonic-gate 6837c478bd9Sstevel@tonic-gate /* 6847c478bd9Sstevel@tonic-gate * The following mechanism is provided to allow us to debug tar in complicated 6857c478bd9Sstevel@tonic-gate * situations, like when it is part of a pipe. The idea is that you compile 68636802407SRich Burridge * with -DWAITAROUND defined, and then add the 'D' function modifier to the 68736802407SRich Burridge * target tar invocation, eg. "tar cDf tarfile file". If stderr is available, 6887c478bd9Sstevel@tonic-gate * it will tell you to which pid to attach the debugger; otherwise, use ps to 6897c478bd9Sstevel@tonic-gate * find it. Attach to the process from the debugger, and, *PRESTO*, you are 6907c478bd9Sstevel@tonic-gate * there! 6917c478bd9Sstevel@tonic-gate * 6927c478bd9Sstevel@tonic-gate * Simply assign "waitaround = 0" once you attach to the process, and then 6937c478bd9Sstevel@tonic-gate * proceed from there as usual. 6947c478bd9Sstevel@tonic-gate */ 6957c478bd9Sstevel@tonic-gate 6967c478bd9Sstevel@tonic-gate #ifdef WAITAROUND 6977c478bd9Sstevel@tonic-gate int waitaround = 0; /* wait for rendezvous with the debugger */ 6987c478bd9Sstevel@tonic-gate #endif 6997c478bd9Sstevel@tonic-gate 70036802407SRich Burridge #define BZIP "/usr/bin/bzip2" 70136802407SRich Burridge #define GZIP "/usr/bin/gzip" 70236802407SRich Burridge #define COMPRESS "/usr/bin/compress" 703506ea5b8SMilan Jurik #define XZ "/usr/bin/xz" 70436802407SRich Burridge #define BZCAT "/usr/bin/bzcat" 70536802407SRich Burridge #define GZCAT "/usr/bin/gzcat" 70636802407SRich Burridge #define ZCAT "/usr/bin/zcat" 707506ea5b8SMilan Jurik #define XZCAT "/usr/bin/xzcat" 708506ea5b8SMilan Jurik #define GSUF 8 /* number of valid 'gzip' sufixes */ 709506ea5b8SMilan Jurik #define BSUF 4 /* number of valid 'bzip2' sufixes */ 710506ea5b8SMilan Jurik #define XSUF 1 /* number of valid 'xz' suffixes */ 71136802407SRich Burridge 71236802407SRich Burridge static char *compress_opt; /* compression type */ 71336802407SRich Burridge 71436802407SRich Burridge static char *gsuffix[] = {".gz", "-gz", ".z", "-z", "_z", ".Z", 71536802407SRich Burridge ".tgz", ".taz"}; 71636802407SRich Burridge static char *bsuffix[] = {".bz2", ".bz", ".tbz2", ".tbz"}; 717506ea5b8SMilan Jurik static char *xsuffix[] = {".xz"}; 71836802407SRich Burridge static char *suffix; 71936802407SRich Burridge 7207c478bd9Sstevel@tonic-gate 7217c478bd9Sstevel@tonic-gate int 7227c478bd9Sstevel@tonic-gate main(int argc, char *argv[]) 7237c478bd9Sstevel@tonic-gate { 7247c478bd9Sstevel@tonic-gate char *cp; 7257c478bd9Sstevel@tonic-gate char *tmpdirp; 7267c478bd9Sstevel@tonic-gate pid_t thispid; 7277c478bd9Sstevel@tonic-gate 7287c478bd9Sstevel@tonic-gate (void) setlocale(LC_ALL, ""); 7297c478bd9Sstevel@tonic-gate #if !defined(TEXT_DOMAIN) /* Should be defined by cc -D */ 7307c478bd9Sstevel@tonic-gate #define TEXT_DOMAIN "SYS_TEST" /* Use this only if it weren't */ 7317c478bd9Sstevel@tonic-gate #endif 7327c478bd9Sstevel@tonic-gate (void) textdomain(TEXT_DOMAIN); 7337c478bd9Sstevel@tonic-gate if (argc < 2) 7347c478bd9Sstevel@tonic-gate usage(); 7357c478bd9Sstevel@tonic-gate 736*28c4d110SJoshua M. Clulow debug_output = should_enable_debug(); 737*28c4d110SJoshua M. Clulow 7387c478bd9Sstevel@tonic-gate tfile = NULL; 739da6c28aaSamw if ((myname = strdup(argv[0])) == NULL) { 740da6c28aaSamw (void) fprintf(stderr, gettext( 741da6c28aaSamw "tar: cannot allocate program name\n")); 742da6c28aaSamw exit(1); 743da6c28aaSamw } 7447c478bd9Sstevel@tonic-gate 7453d63ea05Sas145665 if (init_yes() < 0) { 7463d63ea05Sas145665 (void) fprintf(stderr, gettext(ERR_MSG_INIT_YES), 7473d63ea05Sas145665 strerror(errno)); 7483d63ea05Sas145665 exit(2); 7493d63ea05Sas145665 } 7503d63ea05Sas145665 7517c478bd9Sstevel@tonic-gate /* 7527c478bd9Sstevel@tonic-gate * For XPG4 compatibility, we must be able to accept the "--" 7537c478bd9Sstevel@tonic-gate * argument normally recognized by getopt; it is used to delimit 7547c478bd9Sstevel@tonic-gate * the end opt the options section, and so can only appear in 7557c478bd9Sstevel@tonic-gate * the position of the first argument. We simply skip it. 7567c478bd9Sstevel@tonic-gate */ 7577c478bd9Sstevel@tonic-gate 7587c478bd9Sstevel@tonic-gate if (strcmp(argv[1], "--") == 0) { 7597c478bd9Sstevel@tonic-gate argv++; 7607c478bd9Sstevel@tonic-gate argc--; 7617c478bd9Sstevel@tonic-gate if (argc < 3) 7627c478bd9Sstevel@tonic-gate usage(); 7637c478bd9Sstevel@tonic-gate } 7647c478bd9Sstevel@tonic-gate 7657c478bd9Sstevel@tonic-gate argv[argc] = NULL; 7667c478bd9Sstevel@tonic-gate argv++; 7677c478bd9Sstevel@tonic-gate 7687c478bd9Sstevel@tonic-gate /* 7697c478bd9Sstevel@tonic-gate * Set up default values. 7707c478bd9Sstevel@tonic-gate * Search the operand string looking for the first digit or an 'f'. 7717c478bd9Sstevel@tonic-gate * If you find a digit, use the 'archive#' entry in DEF_FILE. 7727c478bd9Sstevel@tonic-gate * If 'f' is given, bypass looking in DEF_FILE altogether. 7737c478bd9Sstevel@tonic-gate * If no digit or 'f' is given, still look in DEF_FILE but use '0'. 7747c478bd9Sstevel@tonic-gate */ 7757c478bd9Sstevel@tonic-gate if ((usefile = getenv("TAPE")) == (char *)NULL) { 7767c478bd9Sstevel@tonic-gate for (cp = *argv; *cp; ++cp) 7777c478bd9Sstevel@tonic-gate if (isdigit(*cp) || *cp == 'f') 7787c478bd9Sstevel@tonic-gate break; 7797c478bd9Sstevel@tonic-gate if (*cp != 'f') { 7807c478bd9Sstevel@tonic-gate archive[7] = (*cp)? *cp: '0'; 7817c478bd9Sstevel@tonic-gate if (!(defaults_used = defset(archive))) { 7827c478bd9Sstevel@tonic-gate usefile = NULL; 7837c478bd9Sstevel@tonic-gate nblock = 1; 7847c478bd9Sstevel@tonic-gate blocklim = 0; 7857c478bd9Sstevel@tonic-gate NotTape = 0; 7867c478bd9Sstevel@tonic-gate } 7877c478bd9Sstevel@tonic-gate } 7887c478bd9Sstevel@tonic-gate } 7897c478bd9Sstevel@tonic-gate 7907c478bd9Sstevel@tonic-gate for (cp = *argv++; *cp; cp++) 7917c478bd9Sstevel@tonic-gate switch (*cp) { 7927c478bd9Sstevel@tonic-gate #ifdef WAITAROUND 79336802407SRich Burridge case 'D': 7947c478bd9Sstevel@tonic-gate /* rendezvous with the debugger */ 7957c478bd9Sstevel@tonic-gate waitaround = 1; 7967c478bd9Sstevel@tonic-gate break; 7977c478bd9Sstevel@tonic-gate #endif 7987c478bd9Sstevel@tonic-gate case 'f': 7997c478bd9Sstevel@tonic-gate assert_string(*argv, gettext( 8007c478bd9Sstevel@tonic-gate "tar: tarfile must be specified with 'f' " 8017c478bd9Sstevel@tonic-gate "function modifier\n")); 8027c478bd9Sstevel@tonic-gate usefile = *argv++; 8037c478bd9Sstevel@tonic-gate break; 8047c478bd9Sstevel@tonic-gate case 'F': 8057c478bd9Sstevel@tonic-gate Fflag++; 8067c478bd9Sstevel@tonic-gate break; 8077c478bd9Sstevel@tonic-gate case 'c': 8087c478bd9Sstevel@tonic-gate cflag++; 8097c478bd9Sstevel@tonic-gate rflag++; 8107c478bd9Sstevel@tonic-gate update = 1; 8117c478bd9Sstevel@tonic-gate break; 8127c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 8137c478bd9Sstevel@tonic-gate case '@': 8147c478bd9Sstevel@tonic-gate atflag++; 8157c478bd9Sstevel@tonic-gate break; 816da6c28aaSamw #endif /* O_XATTR */ 817da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 818da6c28aaSamw case '/': 819da6c28aaSamw saflag++; 820da6c28aaSamw break; 821da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 8227c478bd9Sstevel@tonic-gate case 'u': 8237c478bd9Sstevel@tonic-gate uflag++; /* moved code after signals caught */ 8247c478bd9Sstevel@tonic-gate rflag++; 8257c478bd9Sstevel@tonic-gate update = 2; 8267c478bd9Sstevel@tonic-gate break; 8277c478bd9Sstevel@tonic-gate case 'r': 8287c478bd9Sstevel@tonic-gate rflag++; 8297c478bd9Sstevel@tonic-gate update = 2; 8307c478bd9Sstevel@tonic-gate break; 8317c478bd9Sstevel@tonic-gate case 'v': 8327c478bd9Sstevel@tonic-gate vflag++; 8337c478bd9Sstevel@tonic-gate break; 8347c478bd9Sstevel@tonic-gate case 'w': 8357c478bd9Sstevel@tonic-gate wflag++; 8367c478bd9Sstevel@tonic-gate break; 8377c478bd9Sstevel@tonic-gate case 'x': 8387c478bd9Sstevel@tonic-gate xflag++; 8397c478bd9Sstevel@tonic-gate break; 8407c478bd9Sstevel@tonic-gate case 'X': 8417c478bd9Sstevel@tonic-gate assert_string(*argv, gettext( 8427c478bd9Sstevel@tonic-gate "tar: exclude file must be specified with 'X' " 8437c478bd9Sstevel@tonic-gate "function modifier\n")); 8447c478bd9Sstevel@tonic-gate Xflag = 1; 8457c478bd9Sstevel@tonic-gate Xfile = *argv++; 8467c478bd9Sstevel@tonic-gate build_table(exclude_tbl, Xfile); 8477c478bd9Sstevel@tonic-gate break; 8487c478bd9Sstevel@tonic-gate case 't': 8497c478bd9Sstevel@tonic-gate tflag++; 8507c478bd9Sstevel@tonic-gate break; 8517c478bd9Sstevel@tonic-gate case 'm': 8527c478bd9Sstevel@tonic-gate mflag++; 8537c478bd9Sstevel@tonic-gate break; 8547c478bd9Sstevel@tonic-gate case 'p': 8557c478bd9Sstevel@tonic-gate pflag++; 8567c478bd9Sstevel@tonic-gate break; 8577c478bd9Sstevel@tonic-gate case 'D': 8587c478bd9Sstevel@tonic-gate Dflag++; 8597c478bd9Sstevel@tonic-gate break; 8607c478bd9Sstevel@tonic-gate case '-': 8617c478bd9Sstevel@tonic-gate /* ignore this silently */ 8627c478bd9Sstevel@tonic-gate break; 8637c478bd9Sstevel@tonic-gate case '0': /* numeric entries used only for defaults */ 8647c478bd9Sstevel@tonic-gate case '1': 8657c478bd9Sstevel@tonic-gate case '2': 8667c478bd9Sstevel@tonic-gate case '3': 8677c478bd9Sstevel@tonic-gate case '4': 8687c478bd9Sstevel@tonic-gate case '5': 8697c478bd9Sstevel@tonic-gate case '6': 8707c478bd9Sstevel@tonic-gate case '7': 8717c478bd9Sstevel@tonic-gate break; 8727c478bd9Sstevel@tonic-gate case 'b': 8737c478bd9Sstevel@tonic-gate assert_string(*argv, gettext( 8747c478bd9Sstevel@tonic-gate "tar: blocking factor must be specified " 8757c478bd9Sstevel@tonic-gate "with 'b' function modifier\n")); 8767c478bd9Sstevel@tonic-gate bflag++; 8777c478bd9Sstevel@tonic-gate nblock = bcheck(*argv++); 8787c478bd9Sstevel@tonic-gate break; 8797c478bd9Sstevel@tonic-gate case 'n': /* not a magtape (instead of 'k') */ 8807c478bd9Sstevel@tonic-gate NotTape++; /* assume non-magtape */ 8817c478bd9Sstevel@tonic-gate break; 8827c478bd9Sstevel@tonic-gate case 'l': 8837c478bd9Sstevel@tonic-gate linkerrok++; 8847c478bd9Sstevel@tonic-gate break; 8857c478bd9Sstevel@tonic-gate case 'e': 8867c478bd9Sstevel@tonic-gate errflag++; 8877c478bd9Sstevel@tonic-gate case 'o': 8887c478bd9Sstevel@tonic-gate oflag++; 8897c478bd9Sstevel@tonic-gate break; 8907c478bd9Sstevel@tonic-gate case 'h': 8917c478bd9Sstevel@tonic-gate hflag++; 8927c478bd9Sstevel@tonic-gate break; 8937c478bd9Sstevel@tonic-gate case 'i': 8947c478bd9Sstevel@tonic-gate iflag++; 8957c478bd9Sstevel@tonic-gate break; 8967c478bd9Sstevel@tonic-gate case 'B': 8977c478bd9Sstevel@tonic-gate Bflag++; 8987c478bd9Sstevel@tonic-gate break; 8997c478bd9Sstevel@tonic-gate case 'P': 9007c478bd9Sstevel@tonic-gate Pflag++; 9017c478bd9Sstevel@tonic-gate break; 9027c478bd9Sstevel@tonic-gate case 'E': 9037c478bd9Sstevel@tonic-gate Eflag++; 9047c478bd9Sstevel@tonic-gate Pflag++; /* Only POSIX archive made */ 9057c478bd9Sstevel@tonic-gate break; 90645916cd2Sjpk case 'T': 90745916cd2Sjpk Tflag++; /* Handle Trusted Extensions attrs */ 90845916cd2Sjpk pflag++; /* also set flag for ACL */ 90945916cd2Sjpk break; 91036802407SRich Burridge case 'j': /* compession "bzip2" */ 911506ea5b8SMilan Jurik jflag = 1; 91236802407SRich Burridge break; 91336802407SRich Burridge case 'z': /* compression "gzip" */ 914506ea5b8SMilan Jurik zflag = 1; 91536802407SRich Burridge break; 91636802407SRich Burridge case 'Z': /* compression "compress" */ 917506ea5b8SMilan Jurik Zflag = 1; 918506ea5b8SMilan Jurik break; 919506ea5b8SMilan Jurik case 'J': /* compression "xz" */ 920506ea5b8SMilan Jurik Jflag = 1; 92136802407SRich Burridge break; 922aa7166bdSMilan Jurik case 'a': 923aa7166bdSMilan Jurik aflag = 1; /* autocompression */ 924aa7166bdSMilan Jurik break; 9257c478bd9Sstevel@tonic-gate default: 9267c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 9277c478bd9Sstevel@tonic-gate "tar: %c: unknown function modifier\n"), *cp); 9287c478bd9Sstevel@tonic-gate usage(); 9297c478bd9Sstevel@tonic-gate } 9307c478bd9Sstevel@tonic-gate 9317c478bd9Sstevel@tonic-gate if (!rflag && !xflag && !tflag) 9327c478bd9Sstevel@tonic-gate usage(); 9337c478bd9Sstevel@tonic-gate if ((rflag && xflag) || (xflag && tflag) || (rflag && tflag)) { 9347c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 9357c478bd9Sstevel@tonic-gate "tar: specify only one of [ctxru].\n")); 9367c478bd9Sstevel@tonic-gate usage(); 9377c478bd9Sstevel@tonic-gate } 93836802407SRich Burridge if (cflag) { 939aa7166bdSMilan Jurik if ((jflag + zflag + Zflag + Jflag + aflag) > 1) { 94036802407SRich Burridge (void) fprintf(stderr, gettext( 941aa7166bdSMilan Jurik "tar: specify only one of [ajJzZ] to " 94236802407SRich Burridge "create a compressed file.\n")); 94336802407SRich Burridge usage(); 94436802407SRich Burridge } 94536802407SRich Burridge } 94645916cd2Sjpk /* Trusted Extensions attribute handling */ 94745916cd2Sjpk if (Tflag && ((getzoneid() != GLOBAL_ZONEID) || 94845916cd2Sjpk !is_system_labeled())) { 94945916cd2Sjpk (void) fprintf(stderr, gettext( 95045916cd2Sjpk "tar: the 'T' option is only available with " 95145916cd2Sjpk "Trusted Extensions\nand must be run from " 95245916cd2Sjpk "the global zone.\n")); 95345916cd2Sjpk usage(); 95445916cd2Sjpk } 955cc22b130SRich Burridge if (cflag && *argv == NULL) 9567c478bd9Sstevel@tonic-gate fatal(gettext("Missing filenames")); 9577c478bd9Sstevel@tonic-gate if (usefile == NULL) 9587c478bd9Sstevel@tonic-gate fatal(gettext("device argument required")); 9597c478bd9Sstevel@tonic-gate 9607c478bd9Sstevel@tonic-gate /* alloc a buffer of the right size */ 9617c478bd9Sstevel@tonic-gate if ((tbuf = (union hblock *) 9627c478bd9Sstevel@tonic-gate calloc(sizeof (union hblock) * nblock, sizeof (char))) == 9637c478bd9Sstevel@tonic-gate (union hblock *)NULL) { 9647c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 9657c478bd9Sstevel@tonic-gate "tar: cannot allocate physio buffer\n")); 9667c478bd9Sstevel@tonic-gate exit(1); 9677c478bd9Sstevel@tonic-gate } 9687c478bd9Sstevel@tonic-gate 9697c478bd9Sstevel@tonic-gate if ((xrec_ptr = malloc(xrec_size)) == NULL) { 9707c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 9717c478bd9Sstevel@tonic-gate "tar: cannot allocate extended header buffer\n")); 9727c478bd9Sstevel@tonic-gate exit(1); 9737c478bd9Sstevel@tonic-gate } 9747c478bd9Sstevel@tonic-gate 9757c478bd9Sstevel@tonic-gate #ifdef WAITAROUND 9767c478bd9Sstevel@tonic-gate if (waitaround) { 9777c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("Rendezvous with tar on pid" 9787c478bd9Sstevel@tonic-gate " %d\n"), getpid()); 9797c478bd9Sstevel@tonic-gate 9807c478bd9Sstevel@tonic-gate while (waitaround) { 9817c478bd9Sstevel@tonic-gate (void) sleep(10); 9827c478bd9Sstevel@tonic-gate } 9837c478bd9Sstevel@tonic-gate } 9847c478bd9Sstevel@tonic-gate #endif 9857c478bd9Sstevel@tonic-gate 9867c478bd9Sstevel@tonic-gate thispid = getpid(); 9877c478bd9Sstevel@tonic-gate (void) sprintf(pidchars, "%ld", thispid); 9887c478bd9Sstevel@tonic-gate thispid = strlen(pidchars); 9897c478bd9Sstevel@tonic-gate 9907c478bd9Sstevel@tonic-gate if ((tmpdirp = getenv("TMPDIR")) == (char *)NULL) 9917c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_dirname, "/tmp"); 9927c478bd9Sstevel@tonic-gate else { 9937c478bd9Sstevel@tonic-gate /* 9947c478bd9Sstevel@tonic-gate * Make sure that dir is no longer than what can 9957c478bd9Sstevel@tonic-gate * fit in the prefix part of the header. 9967c478bd9Sstevel@tonic-gate */ 9977c478bd9Sstevel@tonic-gate if (strlen(tmpdirp) > (size_t)(PRESIZ - thispid - 12)) { 9987c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_dirname, "/tmp"); 9997c478bd9Sstevel@tonic-gate if ((vflag > 0) && (Eflag > 0)) 10007c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 10017c478bd9Sstevel@tonic-gate "Ignoring TMPDIR\n")); 10027c478bd9Sstevel@tonic-gate } else 10037c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_dirname, tmpdirp); 10047c478bd9Sstevel@tonic-gate } 10057c478bd9Sstevel@tonic-gate (void) strcat(xhdr_dirname, "/PaxHeaders."); 10067c478bd9Sstevel@tonic-gate (void) strcat(xhdr_dirname, pidchars); 10077c478bd9Sstevel@tonic-gate 10087c478bd9Sstevel@tonic-gate if (rflag) { 100936802407SRich Burridge if (cflag && usefile != NULL) { 101036802407SRich Burridge /* Set the compression type */ 1011aa7166bdSMilan Jurik if (aflag) 1012aa7166bdSMilan Jurik detect_compress(); 1013aa7166bdSMilan Jurik 101436802407SRich Burridge if (jflag) { 101536802407SRich Burridge compress_opt = compress_malloc(strlen(BZIP) 101636802407SRich Burridge + 1); 101736802407SRich Burridge (void) strcpy(compress_opt, BZIP); 101836802407SRich Burridge } else if (zflag) { 101936802407SRich Burridge compress_opt = compress_malloc(strlen(GZIP) 102036802407SRich Burridge + 1); 102136802407SRich Burridge (void) strcpy(compress_opt, GZIP); 102236802407SRich Burridge } else if (Zflag) { 102336802407SRich Burridge compress_opt = 102436802407SRich Burridge compress_malloc(strlen(COMPRESS) + 1); 102536802407SRich Burridge (void) strcpy(compress_opt, COMPRESS); 1026506ea5b8SMilan Jurik } else if (Jflag) { 1027506ea5b8SMilan Jurik compress_opt = compress_malloc(strlen(XZ) + 1); 1028506ea5b8SMilan Jurik (void) strcpy(compress_opt, XZ); 102936802407SRich Burridge } 103036802407SRich Burridge } else { 103136802407SRich Burridge /* 103236802407SRich Burridge * Decompress if the file is compressed for 103336802407SRich Burridge * an update or replace. 103436802407SRich Burridge */ 103536802407SRich Burridge if (strcmp(usefile, "-") != 0) { 103636802407SRich Burridge check_compression(); 103736802407SRich Burridge if (compress_opt != NULL) { 103836802407SRich Burridge decompress_file(); 103936802407SRich Burridge } 104036802407SRich Burridge } 104136802407SRich Burridge } 104236802407SRich Burridge 10437c478bd9Sstevel@tonic-gate if (cflag && tfile != NULL) 10447c478bd9Sstevel@tonic-gate usage(); 10457c478bd9Sstevel@tonic-gate if (signal(SIGINT, SIG_IGN) != SIG_IGN) 10467c478bd9Sstevel@tonic-gate (void) signal(SIGINT, onintr); 10477c478bd9Sstevel@tonic-gate if (signal(SIGHUP, SIG_IGN) != SIG_IGN) 10487c478bd9Sstevel@tonic-gate (void) signal(SIGHUP, onhup); 10497c478bd9Sstevel@tonic-gate if (signal(SIGQUIT, SIG_IGN) != SIG_IGN) 10507c478bd9Sstevel@tonic-gate (void) signal(SIGQUIT, onquit); 10517c478bd9Sstevel@tonic-gate if (uflag) { 10527c478bd9Sstevel@tonic-gate int tnum; 105331a2de35SRich Burridge struct stat sbuf; 105431a2de35SRich Burridge 105531a2de35SRich Burridge tmpdir = getenv("TMPDIR"); 105631a2de35SRich Burridge /* 105731a2de35SRich Burridge * If the name is invalid or this isn't a directory, 105831a2de35SRich Burridge * or the directory is not writable, then reset to 105931a2de35SRich Burridge * a default temporary directory. 106031a2de35SRich Burridge */ 106131a2de35SRich Burridge if (tmpdir == NULL || *tmpdir == '\0' || 106231a2de35SRich Burridge (strlen(tmpdir) + strlen(tmp_suffix)) > PATH_MAX) { 106331a2de35SRich Burridge tmpdir = "/tmp"; 106431a2de35SRich Burridge } else if (stat(tmpdir, &sbuf) < 0 || 106531a2de35SRich Burridge (sbuf.st_mode & S_IFMT) != S_IFDIR || 106631a2de35SRich Burridge (sbuf.st_mode & S_IWRITE) == 0) { 106731a2de35SRich Burridge tmpdir = "/tmp"; 106831a2de35SRich Burridge } 106931a2de35SRich Burridge 107031a2de35SRich Burridge if ((tname = calloc(1, strlen(tmpdir) + 107131a2de35SRich Burridge strlen(tmp_suffix) + 1)) == NULL) { 107231a2de35SRich Burridge vperror(1, gettext("tar: out of memory, " 107331a2de35SRich Burridge "cannot create temporary file\n")); 107431a2de35SRich Burridge } 107531a2de35SRich Burridge (void) strcpy(tname, tmpdir); 107631a2de35SRich Burridge (void) strcat(tname, tmp_suffix); 107731a2de35SRich Burridge 10787c478bd9Sstevel@tonic-gate if ((tnum = mkstemp(tname)) == -1) 10797c478bd9Sstevel@tonic-gate vperror(1, "%s", tname); 10807c478bd9Sstevel@tonic-gate if ((tfile = fdopen(tnum, "w")) == NULL) 10817c478bd9Sstevel@tonic-gate vperror(1, "%s", tname); 10827c478bd9Sstevel@tonic-gate } 10837c478bd9Sstevel@tonic-gate if (strcmp(usefile, "-") == 0) { 10847c478bd9Sstevel@tonic-gate if (cflag == 0) 10857c478bd9Sstevel@tonic-gate fatal(gettext( 10867c478bd9Sstevel@tonic-gate "can only create standard output archives.")); 10877c478bd9Sstevel@tonic-gate vfile = stderr; 10887c478bd9Sstevel@tonic-gate mt = dup(1); 10897c478bd9Sstevel@tonic-gate ++bflag; 10907c478bd9Sstevel@tonic-gate } else { 10917c478bd9Sstevel@tonic-gate if (cflag) 10927c478bd9Sstevel@tonic-gate mt = open(usefile, 10937c478bd9Sstevel@tonic-gate O_RDWR|O_CREAT|O_TRUNC, 0666); 10947c478bd9Sstevel@tonic-gate else 10957c478bd9Sstevel@tonic-gate mt = open(usefile, O_RDWR); 10967c478bd9Sstevel@tonic-gate 10977c478bd9Sstevel@tonic-gate if (mt < 0) { 10987c478bd9Sstevel@tonic-gate if (cflag == 0 || (mt = creat(usefile, 0666)) 10997c478bd9Sstevel@tonic-gate < 0) 11007c478bd9Sstevel@tonic-gate vperror(1, "%s", usefile); 11017c478bd9Sstevel@tonic-gate } 11027c478bd9Sstevel@tonic-gate } 11037c478bd9Sstevel@tonic-gate /* Get inode and device number of output file */ 11047c478bd9Sstevel@tonic-gate (void) fstat(mt, &stbuf); 11057c478bd9Sstevel@tonic-gate mt_ino = stbuf.st_ino; 11067c478bd9Sstevel@tonic-gate mt_dev = stbuf.st_dev; 11077c478bd9Sstevel@tonic-gate mt_devtype = stbuf.st_mode & S_IFMT; 11087c478bd9Sstevel@tonic-gate NotTape = !istape(mt, mt_devtype); 11097c478bd9Sstevel@tonic-gate 11107c478bd9Sstevel@tonic-gate if (rflag && !cflag && (mt_devtype == S_IFIFO)) 11117c478bd9Sstevel@tonic-gate fatal(gettext("cannot append to pipe or FIFO.")); 11127c478bd9Sstevel@tonic-gate 11137c478bd9Sstevel@tonic-gate if (Aflag && vflag) 11147c478bd9Sstevel@tonic-gate (void) printf( 11157c478bd9Sstevel@tonic-gate gettext("Suppressing absolute pathnames\n")); 1116c536b1f9SRobert Mustacchi if (cflag && compress_opt != NULL) 1117c536b1f9SRobert Mustacchi comp_pid = compress_file(); 11187c478bd9Sstevel@tonic-gate dorep(argv); 111936802407SRich Burridge if (rflag && !cflag && (compress_opt != NULL)) 112036802407SRich Burridge compress_back(); 11217c478bd9Sstevel@tonic-gate } else if (xflag || tflag) { 11227c478bd9Sstevel@tonic-gate /* 11237c478bd9Sstevel@tonic-gate * for each argument, check to see if there is a "-I file" pair. 11247c478bd9Sstevel@tonic-gate * if so, move the 3rd argument into "-I"'s place, build_table() 11257c478bd9Sstevel@tonic-gate * using "file"'s name and increment argc one (the second 11267c478bd9Sstevel@tonic-gate * increment appears in the for loop) which removes the two 11277c478bd9Sstevel@tonic-gate * args "-I" and "file" from the argument vector. 11287c478bd9Sstevel@tonic-gate */ 11297c478bd9Sstevel@tonic-gate for (argc = 0; argv[argc]; argc++) { 11307c478bd9Sstevel@tonic-gate if (strcmp(argv[argc], "-I") == 0) { 11317c478bd9Sstevel@tonic-gate if (!argv[argc+1]) { 11327c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 11337c478bd9Sstevel@tonic-gate "tar: missing argument for -I flag\n")); 11347c478bd9Sstevel@tonic-gate done(2); 11357c478bd9Sstevel@tonic-gate } else { 11367c478bd9Sstevel@tonic-gate Iflag = 1; 11377c478bd9Sstevel@tonic-gate argv[argc] = argv[argc+2]; 11387c478bd9Sstevel@tonic-gate build_table(include_tbl, argv[++argc]); 11397c478bd9Sstevel@tonic-gate } 1140c92bf99eSJoshua M. Clulow } else if (strcmp(argv[argc], "-C") == 0) { 1141c92bf99eSJoshua M. Clulow if (!argv[argc+1]) { 1142c92bf99eSJoshua M. Clulow (void) fprintf(stderr, gettext("tar: " 1143c92bf99eSJoshua M. Clulow "missing argument for -C flag\n")); 1144c92bf99eSJoshua M. Clulow done(2); 1145c92bf99eSJoshua M. Clulow } else if (xtract_chdir != NULL) { 1146c92bf99eSJoshua M. Clulow (void) fprintf(stderr, gettext("tar: " 1147c92bf99eSJoshua M. Clulow "extract should have only one -C " 1148c92bf99eSJoshua M. Clulow "flag\n")); 1149c92bf99eSJoshua M. Clulow done(2); 1150c92bf99eSJoshua M. Clulow } else { 1151c92bf99eSJoshua M. Clulow argv[argc] = argv[argc+2]; 1152c92bf99eSJoshua M. Clulow xtract_chdir = argv[++argc]; 1153c92bf99eSJoshua M. Clulow } 11547c478bd9Sstevel@tonic-gate } 11557c478bd9Sstevel@tonic-gate } 11567c478bd9Sstevel@tonic-gate if (strcmp(usefile, "-") == 0) { 11577c478bd9Sstevel@tonic-gate mt = dup(0); 11587c478bd9Sstevel@tonic-gate ++bflag; 11597c478bd9Sstevel@tonic-gate /* try to recover from short reads when reading stdin */ 11607c478bd9Sstevel@tonic-gate ++Bflag; 11617c478bd9Sstevel@tonic-gate } else if ((mt = open(usefile, 0)) < 0) 11627c478bd9Sstevel@tonic-gate vperror(1, "%s", usefile); 11637c478bd9Sstevel@tonic-gate 116436802407SRich Burridge /* Decompress if the file is compressed */ 116536802407SRich Burridge 116636802407SRich Burridge if (strcmp(usefile, "-") != 0) { 116736802407SRich Burridge check_compression(); 1168c536b1f9SRobert Mustacchi if (compress_opt != NULL) 1169c536b1f9SRobert Mustacchi comp_pid = uncompress_file(); 117036802407SRich Burridge } 11717c478bd9Sstevel@tonic-gate if (xflag) { 1172c92bf99eSJoshua M. Clulow if (xtract_chdir != NULL) { 1173c92bf99eSJoshua M. Clulow if (tar_chdir(xtract_chdir) < 0) { 1174c92bf99eSJoshua M. Clulow vperror(1, gettext("can't change " 1175c92bf99eSJoshua M. Clulow "directories to %s"), xtract_chdir); 1176c92bf99eSJoshua M. Clulow } 1177c92bf99eSJoshua M. Clulow } 11787c478bd9Sstevel@tonic-gate if (Aflag && vflag) 1179eace40a5Sceastha (void) printf(gettext( 1180eace40a5Sceastha "Suppressing absolute pathnames.\n")); 11817c478bd9Sstevel@tonic-gate 11827c478bd9Sstevel@tonic-gate doxtract(argv); 11837c478bd9Sstevel@tonic-gate } else if (tflag) 11847c478bd9Sstevel@tonic-gate dotable(argv); 11857c478bd9Sstevel@tonic-gate } 11867c478bd9Sstevel@tonic-gate else 11877c478bd9Sstevel@tonic-gate usage(); 11887c478bd9Sstevel@tonic-gate 11897c478bd9Sstevel@tonic-gate done(Errflg); 11907c478bd9Sstevel@tonic-gate 11917c478bd9Sstevel@tonic-gate /* Not reached: keep compiler quiet */ 11927c478bd9Sstevel@tonic-gate return (1); 11937c478bd9Sstevel@tonic-gate } 11947c478bd9Sstevel@tonic-gate 1195*28c4d110SJoshua M. Clulow static boolean_t 1196*28c4d110SJoshua M. Clulow should_enable_debug(void) 1197*28c4d110SJoshua M. Clulow { 1198*28c4d110SJoshua M. Clulow const char *val; 1199*28c4d110SJoshua M. Clulow const char *truth[] = { 1200*28c4d110SJoshua M. Clulow "true", 1201*28c4d110SJoshua M. Clulow "1", 1202*28c4d110SJoshua M. Clulow "yes", 1203*28c4d110SJoshua M. Clulow "y", 1204*28c4d110SJoshua M. Clulow "please", 1205*28c4d110SJoshua M. Clulow NULL 1206*28c4d110SJoshua M. Clulow }; 1207*28c4d110SJoshua M. Clulow unsigned int i; 1208*28c4d110SJoshua M. Clulow 1209*28c4d110SJoshua M. Clulow if ((val = getenv("DEBUG_TAR")) == NULL) { 1210*28c4d110SJoshua M. Clulow return (B_FALSE); 1211*28c4d110SJoshua M. Clulow } 1212*28c4d110SJoshua M. Clulow 1213*28c4d110SJoshua M. Clulow for (i = 0; truth[i] != NULL; i++) { 1214*28c4d110SJoshua M. Clulow if (strcmp(val, truth[i]) == 0) { 1215*28c4d110SJoshua M. Clulow return (B_TRUE); 1216*28c4d110SJoshua M. Clulow } 1217*28c4d110SJoshua M. Clulow } 1218*28c4d110SJoshua M. Clulow 1219*28c4d110SJoshua M. Clulow return (B_FALSE); 1220*28c4d110SJoshua M. Clulow } 1221*28c4d110SJoshua M. Clulow 1222*28c4d110SJoshua M. Clulow /*PRINTFLIKE1*/ 1223*28c4d110SJoshua M. Clulow static void 1224*28c4d110SJoshua M. Clulow dlog(const char *format, ...) 1225*28c4d110SJoshua M. Clulow { 1226*28c4d110SJoshua M. Clulow va_list ap; 1227*28c4d110SJoshua M. Clulow 1228*28c4d110SJoshua M. Clulow if (!debug_output) { 1229*28c4d110SJoshua M. Clulow return; 1230*28c4d110SJoshua M. Clulow } 1231*28c4d110SJoshua M. Clulow 1232*28c4d110SJoshua M. Clulow va_start(ap, format); 1233*28c4d110SJoshua M. Clulow (void) fprintf(stderr, "tar: DEBUG: "); 1234*28c4d110SJoshua M. Clulow (void) vfprintf(stderr, format, ap); 1235*28c4d110SJoshua M. Clulow va_end(ap); 1236*28c4d110SJoshua M. Clulow } 1237*28c4d110SJoshua M. Clulow 12387c478bd9Sstevel@tonic-gate static void 12397c478bd9Sstevel@tonic-gate usage(void) 12407c478bd9Sstevel@tonic-gate { 12417c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 12427c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 1243da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 1244cc22b130SRich Burridge "Usage: tar {c|r|t|u|x}[BDeEFhilmnopPTvw@/[0-7]][bf][X...] " 1245da6c28aaSamw #else 1246cc22b130SRich Burridge "Usage: tar {c|r|t|u|x}[BDeEFhilmnopPTvw@[0-7]][bf][X...] " 1247da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 12487c478bd9Sstevel@tonic-gate #else 1249cc22b130SRich Burridge "Usage: tar {c|r|t|u|x}[BDeEFhilmnopPTvw[0-7]][bf][X...] " 1250da6c28aaSamw #endif /* O_XATTR */ 1251506ea5b8SMilan Jurik "[j|J|z|Z] " 12527c478bd9Sstevel@tonic-gate "[blocksize] [tarfile] [size] [exclude-file...] " 12537c478bd9Sstevel@tonic-gate "{file | -I include-file | -C directory file}...\n")); 12547c478bd9Sstevel@tonic-gate done(1); 12557c478bd9Sstevel@tonic-gate } 12567c478bd9Sstevel@tonic-gate 12577c478bd9Sstevel@tonic-gate /* 12587c478bd9Sstevel@tonic-gate * dorep - do "replacements" 12597c478bd9Sstevel@tonic-gate * 12607c478bd9Sstevel@tonic-gate * Dorep is responsible for creating ('c'), appending ('r') 12617c478bd9Sstevel@tonic-gate * and updating ('u'); 12627c478bd9Sstevel@tonic-gate */ 12637c478bd9Sstevel@tonic-gate 12647c478bd9Sstevel@tonic-gate static void 12657c478bd9Sstevel@tonic-gate dorep(char *argv[]) 12667c478bd9Sstevel@tonic-gate { 12677c478bd9Sstevel@tonic-gate char *cp, *cp2, *p; 12687c478bd9Sstevel@tonic-gate char wdir[PATH_MAX+2], tempdir[PATH_MAX+2], *parent; 12697c478bd9Sstevel@tonic-gate char file[PATH_MAX*2], origdir[PATH_MAX+1]; 12707c478bd9Sstevel@tonic-gate FILE *fp = (FILE *)NULL; 12717c478bd9Sstevel@tonic-gate int archtype; 1272123523f8Sas158974 int ret; 12737c478bd9Sstevel@tonic-gate 12747c478bd9Sstevel@tonic-gate 12757c478bd9Sstevel@tonic-gate if (!cflag) { 12767c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 12777c478bd9Sstevel@tonic-gate getdir(); /* read header for next file */ 12787c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) { 12797c478bd9Sstevel@tonic-gate if (!Eflag) 12807c478bd9Sstevel@tonic-gate fatal(gettext("Archive contains extended" 12817c478bd9Sstevel@tonic-gate " header. -E flag required.\n")); 1282123523f8Sas158974 ret = get_xdata(); /* Get extended header items */ 12837c478bd9Sstevel@tonic-gate /* and regular header */ 12847c478bd9Sstevel@tonic-gate } else { 12857c478bd9Sstevel@tonic-gate if (Eflag) 12867c478bd9Sstevel@tonic-gate fatal(gettext("Archive contains no extended" 12877c478bd9Sstevel@tonic-gate " header. -E flag not allowed.\n")); 12887c478bd9Sstevel@tonic-gate } 12897c478bd9Sstevel@tonic-gate while (!endtape()) { /* changed from a do while */ 1290123523f8Sas158974 setbytes_to_skip(&stbuf, ret); 12917c478bd9Sstevel@tonic-gate passtape(); /* skip the file data */ 12927c478bd9Sstevel@tonic-gate if (term) 12937c478bd9Sstevel@tonic-gate done(Errflg); /* received signal to stop */ 12947c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 12957c478bd9Sstevel@tonic-gate getdir(); 12967c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) 1297123523f8Sas158974 ret = get_xdata(); 1298123523f8Sas158974 } 1299123523f8Sas158974 if (ret == 0) { 1300123523f8Sas158974 if ((dblock.dbuf.typeflag != 'A') && 1301123523f8Sas158974 (xhdr_flgs != 0)) { 1302123523f8Sas158974 load_info_from_xtarhdr(xhdr_flgs, 1303123523f8Sas158974 &Xtarhdr); 1304123523f8Sas158974 xhdr_flgs |= _X_XHDR; 1305123523f8Sas158974 } 13067c478bd9Sstevel@tonic-gate } 13077c478bd9Sstevel@tonic-gate backtape(); /* was called by endtape */ 13087c478bd9Sstevel@tonic-gate if (tfile != NULL) { 130931a2de35SRich Burridge /* 131031a2de35SRich Burridge * Buffer size is calculated to be the size of the 131131a2de35SRich Burridge * tmpdir string, plus 6 times the size of the tname 131231a2de35SRich Burridge * string, plus a value that is known to be greater 131331a2de35SRich Burridge * than the command pipeline string. 131431a2de35SRich Burridge */ 131531a2de35SRich Burridge int buflen = strlen(tmpdir) + (6 * strlen(tname)) + 100; 131631a2de35SRich Burridge char *buf; 13177c478bd9Sstevel@tonic-gate 131831a2de35SRich Burridge if ((buf = (char *)calloc(1, buflen)) == NULL) { 131931a2de35SRich Burridge vperror(1, gettext("tar: out of memory, " 132031a2de35SRich Burridge "cannot create sort command file\n")); 132131a2de35SRich Burridge } 132231a2de35SRich Burridge 132331a2de35SRich Burridge (void) snprintf(buf, buflen, "env 'TMPDIR=%s' " 132431a2de35SRich Burridge "sort +0 -1 +1nr %s -o %s; awk '$1 " 13257c478bd9Sstevel@tonic-gate "!= prev {print; prev=$1}' %s >%sX;mv %sX %s", 132631a2de35SRich Burridge tmpdir, tname, tname, tname, tname, tname, tname); 13277c478bd9Sstevel@tonic-gate (void) fflush(tfile); 13287c478bd9Sstevel@tonic-gate (void) system(buf); 132931a2de35SRich Burridge free(buf); 13307c478bd9Sstevel@tonic-gate (void) freopen(tname, "r", tfile); 13317c478bd9Sstevel@tonic-gate (void) fstat(fileno(tfile), &stbuf); 13327c478bd9Sstevel@tonic-gate high = stbuf.st_size; 13337c478bd9Sstevel@tonic-gate } 13347c478bd9Sstevel@tonic-gate } 13357c478bd9Sstevel@tonic-gate 13367c478bd9Sstevel@tonic-gate dumping = 1; 13377c478bd9Sstevel@tonic-gate if (mulvol) { /* SP-1 */ 13387c478bd9Sstevel@tonic-gate if (nblock && (blocklim%nblock) != 0) 13397c478bd9Sstevel@tonic-gate fatal(gettext( 13407c478bd9Sstevel@tonic-gate "Volume size not a multiple of block size.")); 13417c478bd9Sstevel@tonic-gate blocklim -= 2; /* for trailer records */ 13427c478bd9Sstevel@tonic-gate if (vflag) 13437c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("Volume ends at %" 13447c478bd9Sstevel@tonic-gate FMT_blkcnt_t "K, blocking factor = %dK\n"), 13457c478bd9Sstevel@tonic-gate K((blocklim - 1)), K(nblock)); 13467c478bd9Sstevel@tonic-gate } 13477c478bd9Sstevel@tonic-gate 13487c478bd9Sstevel@tonic-gate /* 13497c478bd9Sstevel@tonic-gate * Save the original directory before it gets 13507c478bd9Sstevel@tonic-gate * changed. 13517c478bd9Sstevel@tonic-gate */ 13527c478bd9Sstevel@tonic-gate if (getcwd(origdir, (PATH_MAX+1)) == NULL) { 13537c478bd9Sstevel@tonic-gate vperror(0, gettext("A parent directory cannot be read")); 13547c478bd9Sstevel@tonic-gate exit(1); 13557c478bd9Sstevel@tonic-gate } 13567c478bd9Sstevel@tonic-gate 13577c478bd9Sstevel@tonic-gate (void) strcpy(wdir, origdir); 13587c478bd9Sstevel@tonic-gate 1359cc22b130SRich Burridge while ((*argv || fp) && !term) { 13607c478bd9Sstevel@tonic-gate if (fp || (strcmp(*argv, "-I") == 0)) { 13617c478bd9Sstevel@tonic-gate if (fp == NULL) { 13627c478bd9Sstevel@tonic-gate if (*++argv == NULL) 13637c478bd9Sstevel@tonic-gate fatal(gettext( 13647c478bd9Sstevel@tonic-gate "missing file name for -I flag.")); 13657c478bd9Sstevel@tonic-gate else if ((fp = fopen(*argv++, "r")) == NULL) 13667c478bd9Sstevel@tonic-gate vperror(0, "%s", argv[-1]); 13677c478bd9Sstevel@tonic-gate continue; 13687c478bd9Sstevel@tonic-gate } else if ((fgets(file, PATH_MAX-1, fp)) == NULL) { 13697c478bd9Sstevel@tonic-gate (void) fclose(fp); 13707c478bd9Sstevel@tonic-gate fp = NULL; 13717c478bd9Sstevel@tonic-gate continue; 13727c478bd9Sstevel@tonic-gate } else { 13737c478bd9Sstevel@tonic-gate cp = cp2 = file; 13747c478bd9Sstevel@tonic-gate if ((p = strchr(cp2, '\n'))) 13757c478bd9Sstevel@tonic-gate *p = 0; 13767c478bd9Sstevel@tonic-gate } 13777c478bd9Sstevel@tonic-gate } else if ((strcmp(*argv, "-C") == 0) && argv[1]) { 1378b25dbf38SRich Burridge if (tar_chdir(*++argv) < 0) 13797c478bd9Sstevel@tonic-gate vperror(0, gettext( 13807c478bd9Sstevel@tonic-gate "can't change directories to %s"), *argv); 13817c478bd9Sstevel@tonic-gate else 13827c478bd9Sstevel@tonic-gate (void) getcwd(wdir, (sizeof (wdir))); 13837c478bd9Sstevel@tonic-gate argv++; 13847c478bd9Sstevel@tonic-gate continue; 13857c478bd9Sstevel@tonic-gate } else 13867c478bd9Sstevel@tonic-gate cp = cp2 = strcpy(file, *argv++); 13877c478bd9Sstevel@tonic-gate 13887c478bd9Sstevel@tonic-gate /* 13897c478bd9Sstevel@tonic-gate * point cp2 to the last '/' in file, but not 13907c478bd9Sstevel@tonic-gate * to a trailing '/' 13917c478bd9Sstevel@tonic-gate */ 13927c478bd9Sstevel@tonic-gate for (; *cp; cp++) { 13937c478bd9Sstevel@tonic-gate if (*cp == '/') { 13947c478bd9Sstevel@tonic-gate while (*(cp+1) == '/') { 13957c478bd9Sstevel@tonic-gate ++cp; 13967c478bd9Sstevel@tonic-gate } 13977c478bd9Sstevel@tonic-gate if (*(cp+1) != '\0') { 13987c478bd9Sstevel@tonic-gate /* not trailing slash */ 13997c478bd9Sstevel@tonic-gate cp2 = cp; 14007c478bd9Sstevel@tonic-gate } 14017c478bd9Sstevel@tonic-gate } 14027c478bd9Sstevel@tonic-gate } 14037c478bd9Sstevel@tonic-gate if (cp2 != file) { 14047c478bd9Sstevel@tonic-gate *cp2 = '\0'; 1405b25dbf38SRich Burridge if (tar_chdir(file) < 0) { 14067c478bd9Sstevel@tonic-gate vperror(0, gettext( 14077c478bd9Sstevel@tonic-gate "can't change directories to %s"), file); 14087c478bd9Sstevel@tonic-gate continue; 14097c478bd9Sstevel@tonic-gate } 14107c478bd9Sstevel@tonic-gate *cp2 = '/'; 14117c478bd9Sstevel@tonic-gate cp2++; 14127c478bd9Sstevel@tonic-gate } 14137c478bd9Sstevel@tonic-gate 14147c478bd9Sstevel@tonic-gate parent = getcwd(tempdir, (sizeof (tempdir))); 1415da6c28aaSamw 1416da6c28aaSamw archtype = putfile(file, cp2, parent, NULL, NORMAL_FILE, 14177c478bd9Sstevel@tonic-gate LEV0, SYMLINK_LEV0); 14187c478bd9Sstevel@tonic-gate 14197c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 14207c478bd9Sstevel@tonic-gate if (!exitflag) { 1421da6c28aaSamw if ((atflag || saflag) && 1422da6c28aaSamw (archtype == PUT_NOTAS_LINK)) { 1423da6c28aaSamw xattrs_put(file, cp2, parent, NULL); 14247c478bd9Sstevel@tonic-gate } 14257c478bd9Sstevel@tonic-gate } 14267c478bd9Sstevel@tonic-gate #endif 14277c478bd9Sstevel@tonic-gate 1428b25dbf38SRich Burridge if (tar_chdir(origdir) < 0) 14297c478bd9Sstevel@tonic-gate vperror(0, gettext("cannot change back?: %s"), origdir); 14307c478bd9Sstevel@tonic-gate 14317c478bd9Sstevel@tonic-gate if (exitflag) { 14327c478bd9Sstevel@tonic-gate /* 14337c478bd9Sstevel@tonic-gate * If e function modifier has been specified 14347c478bd9Sstevel@tonic-gate * write the files (that are listed before the 14357c478bd9Sstevel@tonic-gate * file causing the error) to tape. exitflag is 14367c478bd9Sstevel@tonic-gate * used because only some of the error conditions 14377c478bd9Sstevel@tonic-gate * in putfile() recognize the e function modifier. 14387c478bd9Sstevel@tonic-gate */ 14397c478bd9Sstevel@tonic-gate break; 14407c478bd9Sstevel@tonic-gate } 14417c478bd9Sstevel@tonic-gate } 14427c478bd9Sstevel@tonic-gate 14437c478bd9Sstevel@tonic-gate putempty((blkcnt_t)2); 14447c478bd9Sstevel@tonic-gate flushtape(); 14457c478bd9Sstevel@tonic-gate closevol(); /* SP-1 */ 14467c478bd9Sstevel@tonic-gate if (linkerrok == 1) 14477c478bd9Sstevel@tonic-gate for (; ihead != NULL; ihead = ihead->nextp) { 14487c478bd9Sstevel@tonic-gate if (ihead->count == 0) 14497c478bd9Sstevel@tonic-gate continue; 14507c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 14517c478bd9Sstevel@tonic-gate "tar: missing links to %s\n"), ihead->pathname); 14527c478bd9Sstevel@tonic-gate if (errflag) 14537c478bd9Sstevel@tonic-gate done(1); 14547c478bd9Sstevel@tonic-gate else 14557c478bd9Sstevel@tonic-gate Errflg = 1; 14567c478bd9Sstevel@tonic-gate } 14577c478bd9Sstevel@tonic-gate } 14587c478bd9Sstevel@tonic-gate 14597c478bd9Sstevel@tonic-gate 14607c478bd9Sstevel@tonic-gate /* 14617c478bd9Sstevel@tonic-gate * endtape - check for tape at end 14627c478bd9Sstevel@tonic-gate * 14637c478bd9Sstevel@tonic-gate * endtape checks the entry in dblock.dbuf to see if its the 14647c478bd9Sstevel@tonic-gate * special EOT entry. Endtape is usually called after getdir(). 14657c478bd9Sstevel@tonic-gate * 14667c478bd9Sstevel@tonic-gate * endtape used to call backtape; it no longer does, he who 14677c478bd9Sstevel@tonic-gate * wants it backed up must call backtape himself 14687c478bd9Sstevel@tonic-gate * RETURNS: 0 if not EOT, tape position unaffected 14697c478bd9Sstevel@tonic-gate * 1 if EOT, tape position unaffected 14707c478bd9Sstevel@tonic-gate */ 14717c478bd9Sstevel@tonic-gate 1472*28c4d110SJoshua M. Clulow static boolean_t 14737c478bd9Sstevel@tonic-gate endtape(void) 14747c478bd9Sstevel@tonic-gate { 1475*28c4d110SJoshua M. Clulow if (dblock.dbuf.name[0] != '\0') { 1476*28c4d110SJoshua M. Clulow /* 1477*28c4d110SJoshua M. Clulow * The name field is populated. 1478*28c4d110SJoshua M. Clulow */ 1479*28c4d110SJoshua M. Clulow return (B_FALSE); 1480*28c4d110SJoshua M. Clulow } 1481*28c4d110SJoshua M. Clulow 1482*28c4d110SJoshua M. Clulow if (is_posix && dblock.dbuf.prefix[0] != '\0') { 1483*28c4d110SJoshua M. Clulow /* 1484*28c4d110SJoshua M. Clulow * This is a ustar/POSIX archive, and although the name 1485*28c4d110SJoshua M. Clulow * field is empty the prefix field is not. 1486*28c4d110SJoshua M. Clulow */ 1487*28c4d110SJoshua M. Clulow return (B_FALSE); 1488*28c4d110SJoshua M. Clulow } 1489*28c4d110SJoshua M. Clulow 1490*28c4d110SJoshua M. Clulow dlog("endtape(): found null header; EOT\n"); 1491*28c4d110SJoshua M. Clulow return (B_TRUE); 14927c478bd9Sstevel@tonic-gate } 14937c478bd9Sstevel@tonic-gate 14947c478bd9Sstevel@tonic-gate /* 14957c478bd9Sstevel@tonic-gate * getdir - get directory entry from tar tape 14967c478bd9Sstevel@tonic-gate * 14977c478bd9Sstevel@tonic-gate * getdir reads the next tarblock off the tape and cracks 14987c478bd9Sstevel@tonic-gate * it as a directory. The checksum must match properly. 14997c478bd9Sstevel@tonic-gate * 15007c478bd9Sstevel@tonic-gate * If tfile is non-null getdir writes the file name and mod date 15017c478bd9Sstevel@tonic-gate * to tfile. 15027c478bd9Sstevel@tonic-gate */ 15037c478bd9Sstevel@tonic-gate 15047c478bd9Sstevel@tonic-gate static void 15057c478bd9Sstevel@tonic-gate getdir(void) 15067c478bd9Sstevel@tonic-gate { 15077c478bd9Sstevel@tonic-gate struct stat *sp; 15087c478bd9Sstevel@tonic-gate #ifdef EUC 15097c478bd9Sstevel@tonic-gate static int warn_chksum_sign = 0; 15107c478bd9Sstevel@tonic-gate #endif /* EUC */ 15117c478bd9Sstevel@tonic-gate 15127c478bd9Sstevel@tonic-gate top: 15137c478bd9Sstevel@tonic-gate readtape((char *)&dblock); 15147c478bd9Sstevel@tonic-gate if (dblock.dbuf.name[0] == '\0') 15157c478bd9Sstevel@tonic-gate return; 15167c478bd9Sstevel@tonic-gate sp = &stbuf; 15177c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.mode, "%8lo", &Gen.g_mode); 15187c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.uid, "%8lo", (ulong_t *)&Gen.g_uid); 15197c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.gid, "%8lo", (ulong_t *)&Gen.g_gid); 15207c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.size, "%12" FMT_off_t_o, &Gen.g_filesz); 15217c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.mtime, "%12lo", (ulong_t *)&Gen.g_mtime); 15227c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.chksum, "%8o", &Gen.g_cksum); 15237c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.devmajor, "%8lo", &Gen.g_devmajor); 15247c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.devminor, "%8lo", &Gen.g_devminor); 15257c478bd9Sstevel@tonic-gate 15267c478bd9Sstevel@tonic-gate is_posix = (strcmp(dblock.dbuf.magic, magic_type) == 0); 15277c478bd9Sstevel@tonic-gate 15287c478bd9Sstevel@tonic-gate sp->st_mode = Gen.g_mode; 1529*28c4d110SJoshua M. Clulow if (is_posix && (sp->st_mode & S_IFMT) == 0) { 15307c478bd9Sstevel@tonic-gate switch (dblock.dbuf.typeflag) { 1531*28c4d110SJoshua M. Clulow case '0': 1532*28c4d110SJoshua M. Clulow case 0: 1533*28c4d110SJoshua M. Clulow case _XATTR_HDRTYPE: 15347c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFREG; 15357c478bd9Sstevel@tonic-gate break; 15367c478bd9Sstevel@tonic-gate case '1': /* hard link */ 15377c478bd9Sstevel@tonic-gate break; 15387c478bd9Sstevel@tonic-gate case '2': 15397c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFLNK; 15407c478bd9Sstevel@tonic-gate break; 15417c478bd9Sstevel@tonic-gate case '3': 15427c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFCHR; 15437c478bd9Sstevel@tonic-gate break; 15447c478bd9Sstevel@tonic-gate case '4': 15457c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFBLK; 15467c478bd9Sstevel@tonic-gate break; 15477c478bd9Sstevel@tonic-gate case '5': 15487c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFDIR; 15497c478bd9Sstevel@tonic-gate break; 15507c478bd9Sstevel@tonic-gate case '6': 15517c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFIFO; 15527c478bd9Sstevel@tonic-gate break; 15537c478bd9Sstevel@tonic-gate default: 15547c478bd9Sstevel@tonic-gate if (convtoreg(Gen.g_filesz)) 15557c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFREG; 15567c478bd9Sstevel@tonic-gate break; 15577c478bd9Sstevel@tonic-gate } 1558*28c4d110SJoshua M. Clulow } 15597c478bd9Sstevel@tonic-gate 1560e765faefSRich Burridge if ((dblock.dbuf.typeflag == 'X') || (dblock.dbuf.typeflag == 'L')) { 15617c478bd9Sstevel@tonic-gate Xhdrflag = 1; /* Currently processing extended header */ 1562e765faefSRich Burridge } else { 15637c478bd9Sstevel@tonic-gate Xhdrflag = 0; 1564e765faefSRich Burridge } 15657c478bd9Sstevel@tonic-gate 15667c478bd9Sstevel@tonic-gate sp->st_uid = Gen.g_uid; 15677c478bd9Sstevel@tonic-gate sp->st_gid = Gen.g_gid; 15687c478bd9Sstevel@tonic-gate sp->st_size = Gen.g_filesz; 15697c478bd9Sstevel@tonic-gate sp->st_mtime = Gen.g_mtime; 15707c478bd9Sstevel@tonic-gate chksum = Gen.g_cksum; 15717c478bd9Sstevel@tonic-gate 15727c478bd9Sstevel@tonic-gate if (dblock.dbuf.extno != '\0') { /* split file? */ 15737c478bd9Sstevel@tonic-gate extno = dblock.dbuf.extno; 15747c478bd9Sstevel@tonic-gate extsize = Gen.g_filesz; 15757c478bd9Sstevel@tonic-gate extotal = dblock.dbuf.extotal; 15767c478bd9Sstevel@tonic-gate } else { 15777c478bd9Sstevel@tonic-gate extno = 0; /* tell others file not split */ 15787c478bd9Sstevel@tonic-gate extsize = 0; 15797c478bd9Sstevel@tonic-gate extotal = 0; 15807c478bd9Sstevel@tonic-gate } 15817c478bd9Sstevel@tonic-gate 15827c478bd9Sstevel@tonic-gate #ifdef EUC 15837c478bd9Sstevel@tonic-gate if (chksum != checksum(&dblock)) { 15847c478bd9Sstevel@tonic-gate if (chksum != checksum_signed(&dblock)) { 15857c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 15867c478bd9Sstevel@tonic-gate "tar: directory checksum error\n")); 158703d7b3c0SRich Burridge if (iflag) { 158803d7b3c0SRich Burridge Errflg = 2; 15897c478bd9Sstevel@tonic-gate goto top; 159003d7b3c0SRich Burridge } 15917c478bd9Sstevel@tonic-gate done(2); 15927c478bd9Sstevel@tonic-gate } else { 15937c478bd9Sstevel@tonic-gate if (! warn_chksum_sign) { 15947c478bd9Sstevel@tonic-gate warn_chksum_sign = 1; 15957c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 15967c478bd9Sstevel@tonic-gate "tar: warning: tar file made with signed checksum\n")); 15977c478bd9Sstevel@tonic-gate } 15987c478bd9Sstevel@tonic-gate } 15997c478bd9Sstevel@tonic-gate } 16007c478bd9Sstevel@tonic-gate #else 16017c478bd9Sstevel@tonic-gate if (chksum != checksum(&dblock)) { 16027c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 16037c478bd9Sstevel@tonic-gate "tar: directory checksum error\n")); 160403d7b3c0SRich Burridge if (iflag) { 160503d7b3c0SRich Burridge Errflg = 2; 16067c478bd9Sstevel@tonic-gate goto top; 160703d7b3c0SRich Burridge } 16087c478bd9Sstevel@tonic-gate done(2); 16097c478bd9Sstevel@tonic-gate } 16107c478bd9Sstevel@tonic-gate #endif /* EUC */ 16117c478bd9Sstevel@tonic-gate if (tfile != NULL && Xhdrflag == 0) { 16127c478bd9Sstevel@tonic-gate /* 16137c478bd9Sstevel@tonic-gate * If an extended header is present, then time is available 16147c478bd9Sstevel@tonic-gate * in nanoseconds in the extended header data, so set it. 16157c478bd9Sstevel@tonic-gate * Otherwise, give an invalid value so that checkupdate will 16167c478bd9Sstevel@tonic-gate * not test beyond seconds. 16177c478bd9Sstevel@tonic-gate */ 16187c478bd9Sstevel@tonic-gate if ((xhdr_flgs & _X_MTIME)) 16197c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec = Xtarhdr.x_mtime.tv_nsec; 16207c478bd9Sstevel@tonic-gate else 16217c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec = -1; 16227c478bd9Sstevel@tonic-gate 16237c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 16247c478bd9Sstevel@tonic-gate (void) fprintf(tfile, "%s %10ld.%9.9ld\n", 16257c478bd9Sstevel@tonic-gate Xtarhdr.x_path, sp->st_mtim.tv_sec, 16267c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec); 16277c478bd9Sstevel@tonic-gate else 16287c478bd9Sstevel@tonic-gate (void) fprintf(tfile, "%.*s %10ld.%9.9ld\n", 16297c478bd9Sstevel@tonic-gate NAMSIZ, dblock.dbuf.name, sp->st_mtim.tv_sec, 16307c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec); 16317c478bd9Sstevel@tonic-gate } 16327c478bd9Sstevel@tonic-gate 16337c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 16347c478bd9Sstevel@tonic-gate Hiddendir = 0; 16357c478bd9Sstevel@tonic-gate if (xattrp && dblock.dbuf.typeflag == _XATTR_HDRTYPE) { 16367c478bd9Sstevel@tonic-gate if (xattrbadhead) { 16377c478bd9Sstevel@tonic-gate free(xattrhead); 16387c478bd9Sstevel@tonic-gate xattrp = NULL; 16397c478bd9Sstevel@tonic-gate xattr_linkp = NULL; 16407c478bd9Sstevel@tonic-gate xattrhead = NULL; 16417c478bd9Sstevel@tonic-gate } else { 1642da6c28aaSamw char *aname = basename(xattrapath); 1643da6c28aaSamw size_t xindex = aname - xattrapath; 1644da6c28aaSamw 1645da6c28aaSamw if (xattrapath[xindex] == '.' && 1646da6c28aaSamw xattrapath[xindex + 1] == '\0' && 16477c478bd9Sstevel@tonic-gate xattrp->h_typeflag == '5') { 16487c478bd9Sstevel@tonic-gate Hiddendir = 1; 16497c478bd9Sstevel@tonic-gate sp->st_mode = 1650d2443e76Smarks (S_IFDIR | (sp->st_mode & POSIXMODES)); 16517c478bd9Sstevel@tonic-gate } 16527c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = xattrp->h_typeflag; 16537c478bd9Sstevel@tonic-gate } 16547c478bd9Sstevel@tonic-gate } 16557c478bd9Sstevel@tonic-gate #endif 16567c478bd9Sstevel@tonic-gate } 16577c478bd9Sstevel@tonic-gate 16587c478bd9Sstevel@tonic-gate 16597c478bd9Sstevel@tonic-gate /* 16607c478bd9Sstevel@tonic-gate * passtape - skip over a file on the tape 16617c478bd9Sstevel@tonic-gate * 16627c478bd9Sstevel@tonic-gate * passtape skips over the next data file on the tape. 16637c478bd9Sstevel@tonic-gate * The tape directory entry must be in dblock.dbuf. This 16647c478bd9Sstevel@tonic-gate * routine just eats the number of blocks computed from the 16657c478bd9Sstevel@tonic-gate * directory size entry; the tape must be (logically) positioned 1666*28c4d110SJoshua M. Clulow * right after the directory info. 16677c478bd9Sstevel@tonic-gate */ 16687c478bd9Sstevel@tonic-gate 16697c478bd9Sstevel@tonic-gate static void 16707c478bd9Sstevel@tonic-gate passtape(void) 16717c478bd9Sstevel@tonic-gate { 16727c478bd9Sstevel@tonic-gate blkcnt_t blocks; 16737c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 16747c478bd9Sstevel@tonic-gate 16757c478bd9Sstevel@tonic-gate /* 1676*28c4d110SJoshua M. Clulow * Print some debugging information about the directory entry 1677*28c4d110SJoshua M. Clulow * we are skipping over: 1678*28c4d110SJoshua M. Clulow */ 1679*28c4d110SJoshua M. Clulow dlog("passtape: typeflag \"%c\"\n", dblock.dbuf.typeflag); 1680*28c4d110SJoshua M. Clulow if (dblock.dbuf.name[0] != '\0') { 1681*28c4d110SJoshua M. Clulow dlog("passtape: name \"%s\"\n", dblock.dbuf.name); 1682*28c4d110SJoshua M. Clulow } 1683*28c4d110SJoshua M. Clulow if (is_posix && dblock.dbuf.prefix[0] != '\0') { 1684*28c4d110SJoshua M. Clulow dlog("passtape: prefix \"%s\"\n", dblock.dbuf.prefix); 1685*28c4d110SJoshua M. Clulow } 1686*28c4d110SJoshua M. Clulow 1687*28c4d110SJoshua M. Clulow /* 16887c478bd9Sstevel@tonic-gate * Types link(1), sym-link(2), char special(3), blk special(4), 16897c478bd9Sstevel@tonic-gate * directory(5), and FIFO(6) do not have data blocks associated 16907c478bd9Sstevel@tonic-gate * with them so just skip reading the data block. 16917c478bd9Sstevel@tonic-gate */ 16927c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '1' || dblock.dbuf.typeflag == '2' || 16937c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == '3' || dblock.dbuf.typeflag == '4' || 16947c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == '5' || dblock.dbuf.typeflag == '6') 16957c478bd9Sstevel@tonic-gate return; 16967c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 16977c478bd9Sstevel@tonic-gate 1698*28c4d110SJoshua M. Clulow dlog("passtape: block count %" FMT_blkcnt_t "\n", blocks); 1699*28c4d110SJoshua M. Clulow 17007c478bd9Sstevel@tonic-gate /* if operating on disk, seek instead of reading */ 17017c478bd9Sstevel@tonic-gate if (NotTape) 17027c478bd9Sstevel@tonic-gate seekdisk(blocks); 17037c478bd9Sstevel@tonic-gate else 17047c478bd9Sstevel@tonic-gate while (blocks-- > 0) 17057c478bd9Sstevel@tonic-gate readtape(buf); 17067c478bd9Sstevel@tonic-gate } 17077c478bd9Sstevel@tonic-gate 1708da6c28aaSamw #if defined(O_XATTR) 1709da6c28aaSamw static int 1710da6c28aaSamw is_sysattr(char *name) 1711da6c28aaSamw { 1712da6c28aaSamw return ((strcmp(name, VIEW_READONLY) == 0) || 1713da6c28aaSamw (strcmp(name, VIEW_READWRITE) == 0)); 1714da6c28aaSamw } 1715da6c28aaSamw #endif 1716da6c28aaSamw 1717da6c28aaSamw #if defined(O_XATTR) 1718da6c28aaSamw /* 1719da6c28aaSamw * Verify the attribute, attrname, is an attribute we want to restore. 1720da6c28aaSamw * Never restore read-only system attribute files. Only restore read-write 1721da6c28aaSamw * system attributes files when -/ was specified, and only traverse into 1722da6c28aaSamw * the 2nd level attribute directory containing only system attributes if 1723da6c28aaSamw * -@ was specified. This keeps us from archiving 1724da6c28aaSamw * <attribute name>/<read-write system attribute file> 1725da6c28aaSamw * when -/ was specified without -@. 1726da6c28aaSamw * 1727da6c28aaSamw * attrname - attribute file name 1728da6c28aaSamw * attrparent - attribute's parent name within the base file's attribute 1729da6c28aaSamw * directory hierarchy 1730da6c28aaSamw */ 1731da6c28aaSamw static attr_status_t 1732da6c28aaSamw verify_attr(char *attrname, char *attrparent, int arc_rwsysattr, 1733da6c28aaSamw int *rw_sysattr) 1734da6c28aaSamw { 1735da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 1736da6c28aaSamw int attr_supported; 1737da6c28aaSamw 1738da6c28aaSamw /* Never restore read-only system attribute files */ 1739da6c28aaSamw if ((attr_supported = sysattr_type(attrname)) == _RO_SATTR) { 1740da6c28aaSamw *rw_sysattr = 0; 1741da6c28aaSamw return (ATTR_SKIP); 1742da6c28aaSamw } else { 1743da6c28aaSamw *rw_sysattr = (attr_supported == _RW_SATTR); 1744da6c28aaSamw } 1745da6c28aaSamw #else 1746da6c28aaSamw /* 1747da6c28aaSamw * Only need to check if this attribute is an extended system 1748da6c28aaSamw * attribute. 1749da6c28aaSamw */ 1750da6c28aaSamw if (*rw_sysattr = is_sysattr(attrname)) { 1751da6c28aaSamw return (ATTR_SKIP); 1752da6c28aaSamw } else { 1753da6c28aaSamw return (ATTR_OK); 1754da6c28aaSamw } 1755da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 1756da6c28aaSamw 1757da6c28aaSamw /* 1758da6c28aaSamw * If the extended system attribute file is specified with the 1759da6c28aaSamw * arc_rwsysattr flag, as being transient (default extended 1760da6c28aaSamw * attributes), then don't archive it. 1761da6c28aaSamw */ 1762da6c28aaSamw if (*rw_sysattr && !arc_rwsysattr) { 1763da6c28aaSamw return (ATTR_SKIP); 1764da6c28aaSamw } 1765da6c28aaSamw 1766da6c28aaSamw /* 1767da6c28aaSamw * Only restore read-write system attribute files 1768da6c28aaSamw * when -/ was specified. Only restore extended 1769da6c28aaSamw * attributes when -@ was specified. 1770da6c28aaSamw */ 1771da6c28aaSamw if (atflag) { 1772da6c28aaSamw if (!saflag) { 1773da6c28aaSamw /* 1774da6c28aaSamw * Only archive/restore the hidden directory "." if 1775da6c28aaSamw * we're processing the top level hidden attribute 1776da6c28aaSamw * directory. We don't want to process the 1777da6c28aaSamw * hidden attribute directory of the attribute 1778da6c28aaSamw * directory that contains only extended system 1779da6c28aaSamw * attributes. 1780da6c28aaSamw */ 1781da6c28aaSamw if (*rw_sysattr || (Hiddendir && 1782da6c28aaSamw (attrparent != NULL))) { 1783da6c28aaSamw return (ATTR_SKIP); 1784da6c28aaSamw } 1785da6c28aaSamw } 1786da6c28aaSamw } else if (saflag) { 1787da6c28aaSamw /* 1788da6c28aaSamw * Only archive/restore read-write extended system attribute 1789da6c28aaSamw * files of the base file. 1790da6c28aaSamw */ 1791da6c28aaSamw if (!*rw_sysattr || (attrparent != NULL)) { 1792da6c28aaSamw return (ATTR_SKIP); 1793da6c28aaSamw } 1794da6c28aaSamw } else { 1795da6c28aaSamw return (ATTR_SKIP); 1796da6c28aaSamw } 1797da6c28aaSamw 1798da6c28aaSamw return (ATTR_OK); 1799da6c28aaSamw } 1800da6c28aaSamw #endif 18017c478bd9Sstevel@tonic-gate 18025e2174acSceastha static void 18035e2174acSceastha free_children(file_list_t *children) 18045e2174acSceastha { 18055e2174acSceastha file_list_t *child = children; 18065e2174acSceastha file_list_t *cptr; 18075e2174acSceastha 18085e2174acSceastha while (child != NULL) { 18095e2174acSceastha cptr = child->next; 18105e2174acSceastha if (child->name != NULL) { 18115e2174acSceastha free(child->name); 18125e2174acSceastha } 18135e2174acSceastha child = cptr; 18145e2174acSceastha } 18155e2174acSceastha } 18165e2174acSceastha 18177c478bd9Sstevel@tonic-gate static int 1818da6c28aaSamw putfile(char *longname, char *shortname, char *parent, attr_data_t *attrinfo, 18197c478bd9Sstevel@tonic-gate int filetype, int lev, int symlink_lev) 18207c478bd9Sstevel@tonic-gate { 18217c478bd9Sstevel@tonic-gate int infile = -1; /* deliberately invalid */ 18227c478bd9Sstevel@tonic-gate blkcnt_t blocks; 18237c478bd9Sstevel@tonic-gate char buf[PATH_MAX + 2]; /* Add trailing slash and null */ 18247c478bd9Sstevel@tonic-gate char *bigbuf; 18257c478bd9Sstevel@tonic-gate int maxread; 18267c478bd9Sstevel@tonic-gate int hint; /* amount to write to get "in sync" */ 18277c478bd9Sstevel@tonic-gate char filetmp[PATH_MAX + 1]; 18287c478bd9Sstevel@tonic-gate char *cp; 18297c478bd9Sstevel@tonic-gate char *name; 1830da6c28aaSamw char *attrparent = NULL; 1831da6c28aaSamw char *longattrname = NULL; 18325e2174acSceastha file_list_t *child = NULL; 18335e2174acSceastha file_list_t *child_end = NULL; 18345e2174acSceastha file_list_t *cptr; 18357c478bd9Sstevel@tonic-gate struct dirent *dp; 18367c478bd9Sstevel@tonic-gate DIR *dirp; 18377c478bd9Sstevel@tonic-gate int i; 18387c478bd9Sstevel@tonic-gate int split; 18397c478bd9Sstevel@tonic-gate int dirfd = -1; 18407c478bd9Sstevel@tonic-gate int rc = PUT_NOTAS_LINK; 18417c478bd9Sstevel@tonic-gate int archtype = 0; 1842da6c28aaSamw int rw_sysattr = 0; 18437c478bd9Sstevel@tonic-gate char newparent[PATH_MAX + MAXNAMLEN + 1]; 18447c478bd9Sstevel@tonic-gate char *prefix = ""; 18457c478bd9Sstevel@tonic-gate char *tmpbuf; 18467c478bd9Sstevel@tonic-gate char goodbuf[PRESIZ + 2]; 18477c478bd9Sstevel@tonic-gate char junkbuf[MAXNAM+1]; 18487c478bd9Sstevel@tonic-gate char *lastslash; 18497c478bd9Sstevel@tonic-gate int j; 18507c478bd9Sstevel@tonic-gate struct stat sbuf; 18517c478bd9Sstevel@tonic-gate int readlink_max; 18527c478bd9Sstevel@tonic-gate 18537c478bd9Sstevel@tonic-gate (void) memset(goodbuf, '\0', sizeof (goodbuf)); 18547c478bd9Sstevel@tonic-gate (void) memset(junkbuf, '\0', sizeof (junkbuf)); 18557c478bd9Sstevel@tonic-gate 18567c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 18577c478bd9Sstevel@tonic-gate 18587c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) { 1859da6c28aaSamw attrparent = attrinfo->attr_parent; 1860da6c28aaSamw longattrname = attrinfo->attr_path; 1861da6c28aaSamw dirfd = attrinfo->attr_parentfd; 1862ced83f9bSceastha rw_sysattr = attrinfo->attr_rw_sysattr; 18637c478bd9Sstevel@tonic-gate } else { 18647c478bd9Sstevel@tonic-gate dirfd = open(".", O_RDONLY); 18657c478bd9Sstevel@tonic-gate } 18667c478bd9Sstevel@tonic-gate 18677c478bd9Sstevel@tonic-gate if (dirfd == -1) { 18687c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 1869da6c28aaSamw "tar: unable to open%sdirectory %s%s%s%s\n"), 18707c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? gettext(" attribute ") : " ", 1871da6c28aaSamw (attrparent == NULL) ? "" : gettext("of attribute "), 1872da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 1873da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 18747c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? longname : parent); 18757c478bd9Sstevel@tonic-gate goto out; 18767c478bd9Sstevel@tonic-gate } 18777c478bd9Sstevel@tonic-gate 18787c478bd9Sstevel@tonic-gate if (lev > MAXLEV) { 18797c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 18807c478bd9Sstevel@tonic-gate gettext("tar: directory nesting too deep, %s not dumped\n"), 18817c478bd9Sstevel@tonic-gate longname); 18827c478bd9Sstevel@tonic-gate goto out; 18837c478bd9Sstevel@tonic-gate } 18847c478bd9Sstevel@tonic-gate 1885da6c28aaSamw if (getstat(dirfd, longname, shortname, attrparent)) 18867c478bd9Sstevel@tonic-gate goto out; 18877c478bd9Sstevel@tonic-gate 18887c478bd9Sstevel@tonic-gate if (hflag) { 18897c478bd9Sstevel@tonic-gate /* 18907c478bd9Sstevel@tonic-gate * Catch nesting where a file is a symlink to its directory. 18917c478bd9Sstevel@tonic-gate */ 18927c478bd9Sstevel@tonic-gate j = fstatat(dirfd, shortname, &sbuf, AT_SYMLINK_NOFOLLOW); 18937c478bd9Sstevel@tonic-gate if (S_ISLNK(sbuf.st_mode)) { 18947c478bd9Sstevel@tonic-gate if (symlink_lev++ >= MAXSYMLINKS) { 18957c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 18967c478bd9Sstevel@tonic-gate "tar: %s: Number of symbolic links " 18977c478bd9Sstevel@tonic-gate "encountered during path name traversal " 18987c478bd9Sstevel@tonic-gate "exceeds MAXSYMLINKS\n"), longname); 18997c478bd9Sstevel@tonic-gate Errflg = 1; 19007c478bd9Sstevel@tonic-gate goto out; 19017c478bd9Sstevel@tonic-gate } 19027c478bd9Sstevel@tonic-gate } 19037c478bd9Sstevel@tonic-gate } 19047c478bd9Sstevel@tonic-gate 19057c478bd9Sstevel@tonic-gate /* 19067c478bd9Sstevel@tonic-gate * Check if the input file is the same as the tar file we 19077c478bd9Sstevel@tonic-gate * are creating 19087c478bd9Sstevel@tonic-gate */ 19097c478bd9Sstevel@tonic-gate if ((mt_ino == stbuf.st_ino) && (mt_dev == stbuf.st_dev)) { 19107c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 1911da6c28aaSamw "tar: %s%s%s%s%s same as archive file\n"), 1912da6c28aaSamw rw_sysattr ? gettext("system ") : "", 1913da6c28aaSamw (longattrname == NULL) ? "" : gettext("attribute "), 1914da6c28aaSamw (longattrname == NULL) ? "" : longattrname, 1915da6c28aaSamw (longattrname == NULL) ? "" : gettext(" of "), 1916da6c28aaSamw longname); 19177c478bd9Sstevel@tonic-gate Errflg = 1; 19187c478bd9Sstevel@tonic-gate goto out; 19197c478bd9Sstevel@tonic-gate } 19207c478bd9Sstevel@tonic-gate /* 19217c478bd9Sstevel@tonic-gate * Check size limit - we can't archive files that 19227c478bd9Sstevel@tonic-gate * exceed TAR_OFFSET_MAX bytes because of header 19237c478bd9Sstevel@tonic-gate * limitations. Exclude file types that set 19247c478bd9Sstevel@tonic-gate * st_size to zero below because they take no 19257c478bd9Sstevel@tonic-gate * archive space to represent contents. 19267c478bd9Sstevel@tonic-gate */ 19277c478bd9Sstevel@tonic-gate if ((stbuf.st_size > (off_t)TAR_OFFSET_MAX) && 19287c478bd9Sstevel@tonic-gate !S_ISDIR(stbuf.st_mode) && 19297c478bd9Sstevel@tonic-gate !S_ISCHR(stbuf.st_mode) && 19307c478bd9Sstevel@tonic-gate !S_ISBLK(stbuf.st_mode) && 19317c478bd9Sstevel@tonic-gate (Eflag == 0)) { 19327c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 1933da6c28aaSamw "tar: %s%s%s%s%s too large to archive. " 1934da6c28aaSamw "Use E function modifier.\n"), 1935da6c28aaSamw rw_sysattr ? gettext("system ") : "", 1936da6c28aaSamw (longattrname == NULL) ? "" : gettext("attribute "), 1937da6c28aaSamw (longattrname == NULL) ? "" : longattrname, 1938da6c28aaSamw (longattrname == NULL) ? "" : gettext(" of "), 1939da6c28aaSamw longname); 19407c478bd9Sstevel@tonic-gate if (errflag) 19417c478bd9Sstevel@tonic-gate exitflag = 1; 19427c478bd9Sstevel@tonic-gate Errflg = 1; 19437c478bd9Sstevel@tonic-gate goto out; 19447c478bd9Sstevel@tonic-gate } 19457c478bd9Sstevel@tonic-gate 19467c478bd9Sstevel@tonic-gate if (tfile != NULL && checkupdate(longname) == 0) { 19477c478bd9Sstevel@tonic-gate goto out; 19487c478bd9Sstevel@tonic-gate } 19497c478bd9Sstevel@tonic-gate if (checkw('r', longname) == 0) { 19507c478bd9Sstevel@tonic-gate goto out; 19517c478bd9Sstevel@tonic-gate } 19527c478bd9Sstevel@tonic-gate 19533a1dab68SRich Burridge if (Fflag && 19543a1dab68SRich Burridge checkf(longname, (stbuf.st_mode & S_IFMT) == S_IFDIR, Fflag) == 0) 19557c478bd9Sstevel@tonic-gate goto out; 19567c478bd9Sstevel@tonic-gate 19577c478bd9Sstevel@tonic-gate if (Xflag) { 19587c478bd9Sstevel@tonic-gate if (is_in_table(exclude_tbl, longname)) { 19597c478bd9Sstevel@tonic-gate if (vflag) { 19607c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 19617c478bd9Sstevel@tonic-gate "a %s excluded\n"), longname); 19627c478bd9Sstevel@tonic-gate } 19637c478bd9Sstevel@tonic-gate goto out; 19647c478bd9Sstevel@tonic-gate } 19657c478bd9Sstevel@tonic-gate } 19667c478bd9Sstevel@tonic-gate 19677c478bd9Sstevel@tonic-gate /* 19687c478bd9Sstevel@tonic-gate * If the length of the fullname is greater than MAXNAM, 19697c478bd9Sstevel@tonic-gate * print out a message and return (unless extended headers are used, 19707c478bd9Sstevel@tonic-gate * in which case fullname is limited to PATH_MAX). 19717c478bd9Sstevel@tonic-gate */ 19727c478bd9Sstevel@tonic-gate 19737c478bd9Sstevel@tonic-gate if ((((split = (int)strlen(longname)) > MAXNAM) && (Eflag == 0)) || 19747c478bd9Sstevel@tonic-gate (split > PATH_MAX)) { 19757c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 19767c478bd9Sstevel@tonic-gate "tar: %s: file name too long\n"), longname); 19777c478bd9Sstevel@tonic-gate if (errflag) 19787c478bd9Sstevel@tonic-gate exitflag = 1; 19797c478bd9Sstevel@tonic-gate Errflg = 1; 19807c478bd9Sstevel@tonic-gate goto out; 19817c478bd9Sstevel@tonic-gate } 19827c478bd9Sstevel@tonic-gate 19837c478bd9Sstevel@tonic-gate /* 19847c478bd9Sstevel@tonic-gate * We split the fullname into prefix and name components if any one 19857c478bd9Sstevel@tonic-gate * of three conditions holds: 19867c478bd9Sstevel@tonic-gate * -- the length of the fullname exceeds NAMSIZ, 19877c478bd9Sstevel@tonic-gate * -- the length of the fullname equals NAMSIZ, and the shortname 19887c478bd9Sstevel@tonic-gate * is less than NAMSIZ, (splitting in this case preserves 19897c478bd9Sstevel@tonic-gate * compatibility with 5.6 and 5.5.1 tar), or 19907c478bd9Sstevel@tonic-gate * -- the length of the fullname equals NAMSIZ, the file is a 19917c478bd9Sstevel@tonic-gate * directory and we are not in POSIX-conformant mode (where 19927c478bd9Sstevel@tonic-gate * trailing slashes are removed from directories). 19937c478bd9Sstevel@tonic-gate */ 19947c478bd9Sstevel@tonic-gate if ((split > NAMSIZ) || 19957c478bd9Sstevel@tonic-gate (split == NAMSIZ && strlen(shortname) < NAMSIZ) || 19964bc0a2efScasper (split == NAMSIZ && S_ISDIR(stbuf.st_mode) && !Pflag)) { 19977c478bd9Sstevel@tonic-gate /* 19987c478bd9Sstevel@tonic-gate * Since path is limited to PRESIZ characters, look for the 19997c478bd9Sstevel@tonic-gate * last slash within PRESIZ + 1 characters only. 20007c478bd9Sstevel@tonic-gate */ 20017c478bd9Sstevel@tonic-gate (void) strncpy(&goodbuf[0], longname, min(split, PRESIZ + 1)); 20027c478bd9Sstevel@tonic-gate tmpbuf = goodbuf; 20037c478bd9Sstevel@tonic-gate lastslash = strrchr(tmpbuf, '/'); 20047c478bd9Sstevel@tonic-gate if (lastslash == NULL) { 20057c478bd9Sstevel@tonic-gate i = split; /* Length of name */ 20067c478bd9Sstevel@tonic-gate j = 0; /* Length of prefix */ 20077c478bd9Sstevel@tonic-gate goodbuf[0] = '\0'; 20087c478bd9Sstevel@tonic-gate } else { 20097c478bd9Sstevel@tonic-gate *lastslash = '\0'; /* Terminate the prefix */ 20107c478bd9Sstevel@tonic-gate j = strlen(tmpbuf); 20117c478bd9Sstevel@tonic-gate i = split - j - 1; 20127c478bd9Sstevel@tonic-gate } 20137c478bd9Sstevel@tonic-gate /* 20147c478bd9Sstevel@tonic-gate * If the filename is greater than NAMSIZ we can't 20157c478bd9Sstevel@tonic-gate * archive the file unless we are using extended headers. 20167c478bd9Sstevel@tonic-gate */ 20174bc0a2efScasper if ((i > NAMSIZ) || (i == NAMSIZ && S_ISDIR(stbuf.st_mode) && 20187c478bd9Sstevel@tonic-gate !Pflag)) { 20197c478bd9Sstevel@tonic-gate /* Determine which (filename or path) is too long. */ 20207c478bd9Sstevel@tonic-gate lastslash = strrchr(longname, '/'); 20217c478bd9Sstevel@tonic-gate if (lastslash != NULL) 20227c478bd9Sstevel@tonic-gate i = strlen(lastslash + 1); 20237c478bd9Sstevel@tonic-gate if (Eflag > 0) { 20247c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_PATH; 20257c478bd9Sstevel@tonic-gate Xtarhdr.x_path = longname; 20267c478bd9Sstevel@tonic-gate if (i <= NAMSIZ) 20277c478bd9Sstevel@tonic-gate (void) strcpy(junkbuf, lastslash + 1); 20287c478bd9Sstevel@tonic-gate else 20297c478bd9Sstevel@tonic-gate (void) sprintf(junkbuf, "%llu", 20307c478bd9Sstevel@tonic-gate xhdr_count + 1); 20317c478bd9Sstevel@tonic-gate if (split - i - 1 > PRESIZ) 20327c478bd9Sstevel@tonic-gate (void) strcpy(goodbuf, xhdr_dirname); 20337c478bd9Sstevel@tonic-gate } else { 20347c478bd9Sstevel@tonic-gate if ((i > NAMSIZ) || (i == NAMSIZ && 20354bc0a2efScasper S_ISDIR(stbuf.st_mode) && !Pflag)) 20367c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 20377c478bd9Sstevel@tonic-gate "tar: %s: filename is greater than " 20387c478bd9Sstevel@tonic-gate "%d\n"), lastslash == NULL ? 20397c478bd9Sstevel@tonic-gate longname : lastslash + 1, NAMSIZ); 20407c478bd9Sstevel@tonic-gate else 20417c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 20427c478bd9Sstevel@tonic-gate "tar: %s: prefix is greater than %d" 20437c478bd9Sstevel@tonic-gate "\n"), longname, PRESIZ); 20447c478bd9Sstevel@tonic-gate if (errflag) 20457c478bd9Sstevel@tonic-gate exitflag = 1; 20467c478bd9Sstevel@tonic-gate Errflg = 1; 20477c478bd9Sstevel@tonic-gate goto out; 20487c478bd9Sstevel@tonic-gate } 20497c478bd9Sstevel@tonic-gate } else 20507c478bd9Sstevel@tonic-gate (void) strncpy(&junkbuf[0], longname + j + 1, 20517c478bd9Sstevel@tonic-gate strlen(longname + j + 1)); 20527c478bd9Sstevel@tonic-gate name = junkbuf; 20537c478bd9Sstevel@tonic-gate prefix = goodbuf; 20547c478bd9Sstevel@tonic-gate } else { 20557c478bd9Sstevel@tonic-gate name = longname; 20567c478bd9Sstevel@tonic-gate } 20577c478bd9Sstevel@tonic-gate if (Aflag) { 20587c478bd9Sstevel@tonic-gate if ((prefix != NULL) && (*prefix != '\0')) 20597c478bd9Sstevel@tonic-gate while (*prefix == '/') 20607c478bd9Sstevel@tonic-gate ++prefix; 20617c478bd9Sstevel@tonic-gate else 20627c478bd9Sstevel@tonic-gate while (*name == '/') 20637c478bd9Sstevel@tonic-gate ++name; 20647c478bd9Sstevel@tonic-gate } 20657c478bd9Sstevel@tonic-gate 20667c478bd9Sstevel@tonic-gate switch (stbuf.st_mode & S_IFMT) { 20677c478bd9Sstevel@tonic-gate case S_IFDIR: 20687c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 20697c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 20707c478bd9Sstevel@tonic-gate 20717c478bd9Sstevel@tonic-gate if (filetype != XATTR_FILE && Hiddendir == 0) { 20727c478bd9Sstevel@tonic-gate i = 0; 20737c478bd9Sstevel@tonic-gate cp = buf; 20747c478bd9Sstevel@tonic-gate while ((*cp++ = longname[i++])) 20757c478bd9Sstevel@tonic-gate ; 20767c478bd9Sstevel@tonic-gate *--cp = '/'; 20777c478bd9Sstevel@tonic-gate *++cp = 0; 20787c478bd9Sstevel@tonic-gate } 20797c478bd9Sstevel@tonic-gate if (!oflag) { 20807c478bd9Sstevel@tonic-gate tomodes(&stbuf); 20817c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '5', filetype, 20827c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) { 20837c478bd9Sstevel@tonic-gate goto out; 20847c478bd9Sstevel@tonic-gate } 20857c478bd9Sstevel@tonic-gate if (!Pflag) { 20867c478bd9Sstevel@tonic-gate /* 20877c478bd9Sstevel@tonic-gate * Old archives require a slash at the end 20887c478bd9Sstevel@tonic-gate * of a directory name. 20897c478bd9Sstevel@tonic-gate * 20907c478bd9Sstevel@tonic-gate * XXX 20917c478bd9Sstevel@tonic-gate * If directory name is too long, will 20927c478bd9Sstevel@tonic-gate * slash overfill field? 20937c478bd9Sstevel@tonic-gate */ 20947c478bd9Sstevel@tonic-gate if (strlen(name) > (unsigned)NAMSIZ-1) { 20957c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 20967c478bd9Sstevel@tonic-gate "tar: %s: filename is greater " 20977c478bd9Sstevel@tonic-gate "than %d\n"), name, NAMSIZ); 20987c478bd9Sstevel@tonic-gate if (errflag) 20997c478bd9Sstevel@tonic-gate exitflag = 1; 21007c478bd9Sstevel@tonic-gate Errflg = 1; 21017c478bd9Sstevel@tonic-gate goto out; 21027c478bd9Sstevel@tonic-gate } else { 21037c478bd9Sstevel@tonic-gate if (strlen(name) == (NAMSIZ - 1)) { 21047c478bd9Sstevel@tonic-gate (void) memcpy(dblock.dbuf.name, 21057c478bd9Sstevel@tonic-gate name, NAMSIZ); 21067c478bd9Sstevel@tonic-gate dblock.dbuf.name[NAMSIZ-1] 21077c478bd9Sstevel@tonic-gate = '/'; 21087c478bd9Sstevel@tonic-gate } else 21097c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.name, 21107c478bd9Sstevel@tonic-gate "%s/", name); 21117c478bd9Sstevel@tonic-gate 21127c478bd9Sstevel@tonic-gate /* 21137c478bd9Sstevel@tonic-gate * need to recalculate checksum 21147c478bd9Sstevel@tonic-gate * because the name changed. 21157c478bd9Sstevel@tonic-gate */ 21167c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, 21177c478bd9Sstevel@tonic-gate "%07o", checksum(&dblock)); 21187c478bd9Sstevel@tonic-gate } 21197c478bd9Sstevel@tonic-gate } 21207c478bd9Sstevel@tonic-gate 2121da6c28aaSamw if (put_extra_attributes(longname, shortname, 2122da6c28aaSamw longattrname, prefix, filetype, '5') != 0) 21237c478bd9Sstevel@tonic-gate goto out; 21247c478bd9Sstevel@tonic-gate 21257c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 21267c478bd9Sstevel@tonic-gate /* 21277c478bd9Sstevel@tonic-gate * Reset header typeflag when archiving directory, since 21287c478bd9Sstevel@tonic-gate * build_dblock changed it on us. 21297c478bd9Sstevel@tonic-gate */ 21307c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) { 21317c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = _XATTR_HDRTYPE; 21327c478bd9Sstevel@tonic-gate } else { 21337c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '5'; 21347c478bd9Sstevel@tonic-gate } 21357c478bd9Sstevel@tonic-gate #else 21367c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '5'; 21377c478bd9Sstevel@tonic-gate #endif 21387c478bd9Sstevel@tonic-gate 21397c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", 21407c478bd9Sstevel@tonic-gate checksum(&dblock)); 21417c478bd9Sstevel@tonic-gate 21427c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 21437c478bd9Sstevel@tonic-gate } 21447c478bd9Sstevel@tonic-gate if (vflag) { 2145*28c4d110SJoshua M. Clulow if (NotTape) { 2146*28c4d110SJoshua M. Clulow dlog("seek = %" FMT_blkcnt_t "K\n", K(tapepos)); 2147*28c4d110SJoshua M. Clulow } 21487c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE && Hiddendir) { 21498e4a71aeSRich Burridge (void) fprintf(vfile, 21508e4a71aeSRich Burridge gettext("a %s attribute %s "), 2151da6c28aaSamw longname, longattrname); 21527c478bd9Sstevel@tonic-gate 21537c478bd9Sstevel@tonic-gate } else { 21547c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "a %s/ ", longname); 21557c478bd9Sstevel@tonic-gate } 2156*28c4d110SJoshua M. Clulow if (NotTape) { 21577c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n", 21587c478bd9Sstevel@tonic-gate K(blocks)); 2159*28c4d110SJoshua M. Clulow } else { 21607c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" FMT_blkcnt_t 21617c478bd9Sstevel@tonic-gate " tape blocks\n"), blocks); 21627c478bd9Sstevel@tonic-gate } 2163*28c4d110SJoshua M. Clulow } 21647c478bd9Sstevel@tonic-gate 21657c478bd9Sstevel@tonic-gate /* 21667c478bd9Sstevel@tonic-gate * If hidden dir then break now since xattrs_put() will do 21677c478bd9Sstevel@tonic-gate * the iterating of the directory. 21687c478bd9Sstevel@tonic-gate * 2169da6c28aaSamw * At the moment, there can only be system attributes on 2170da6c28aaSamw * attributes. There can be no attributes on attributes or 2171da6c28aaSamw * directories within the attributes hidden directory hierarchy. 21727c478bd9Sstevel@tonic-gate */ 21737c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) 21747c478bd9Sstevel@tonic-gate break; 21757c478bd9Sstevel@tonic-gate 21767c478bd9Sstevel@tonic-gate if (*shortname != '/') 21777c478bd9Sstevel@tonic-gate (void) sprintf(newparent, "%s/%s", parent, shortname); 21787c478bd9Sstevel@tonic-gate else 21797c478bd9Sstevel@tonic-gate (void) sprintf(newparent, "%s", shortname); 21807c478bd9Sstevel@tonic-gate 2181b25dbf38SRich Burridge if (tar_chdir(shortname) < 0) { 21827c478bd9Sstevel@tonic-gate vperror(0, "%s", newparent); 21837c478bd9Sstevel@tonic-gate goto out; 21847c478bd9Sstevel@tonic-gate } 21857c478bd9Sstevel@tonic-gate 21867c478bd9Sstevel@tonic-gate if ((dirp = opendir(".")) == NULL) { 21877c478bd9Sstevel@tonic-gate vperror(0, gettext( 21887c478bd9Sstevel@tonic-gate "can't open directory %s"), longname); 2189b25dbf38SRich Burridge if (tar_chdir(parent) < 0) 21907c478bd9Sstevel@tonic-gate vperror(0, gettext("cannot change back?: %s"), 21917c478bd9Sstevel@tonic-gate parent); 21927c478bd9Sstevel@tonic-gate goto out; 21937c478bd9Sstevel@tonic-gate } 21947c478bd9Sstevel@tonic-gate 21955e2174acSceastha /* 21965e2174acSceastha * Create a list of files (children) in this directory to avoid 21975e2174acSceastha * having to perform telldir()/seekdir(). 21985e2174acSceastha */ 21997c478bd9Sstevel@tonic-gate while ((dp = readdir(dirp)) != NULL && !term) { 22007c478bd9Sstevel@tonic-gate if ((strcmp(".", dp->d_name) == 0) || 22017c478bd9Sstevel@tonic-gate (strcmp("..", dp->d_name) == 0)) 22027c478bd9Sstevel@tonic-gate continue; 22035e2174acSceastha if (((cptr = (file_list_t *)calloc(sizeof (char), 22045e2174acSceastha sizeof (file_list_t))) == NULL) || 22055e2174acSceastha ((cptr->name = strdup(dp->d_name)) == NULL)) { 22065e2174acSceastha vperror(1, gettext( 22075e2174acSceastha "Insufficient memory for directory " 22085e2174acSceastha "list entry %s/%s\n"), 22095e2174acSceastha newparent, dp->d_name); 22105e2174acSceastha } 22117c478bd9Sstevel@tonic-gate 22125e2174acSceastha /* Add the file to the list */ 22135e2174acSceastha if (child == NULL) { 22145e2174acSceastha child = cptr; 22155e2174acSceastha } else { 22165e2174acSceastha child_end->next = cptr; 22175e2174acSceastha } 22185e2174acSceastha child_end = cptr; 22195e2174acSceastha } 22205e2174acSceastha (void) closedir(dirp); 22215e2174acSceastha 22225e2174acSceastha /* 22235e2174acSceastha * Archive each of the files in the current directory. 22245e2174acSceastha * If a file is a directory, putfile() is called 22255e2174acSceastha * recursively to archive the file hierarchy of the 22265e2174acSceastha * directory before archiving the next file in the 22275e2174acSceastha * current directory. 22285e2174acSceastha */ 22295e2174acSceastha while ((child != NULL) && !term) { 22305e2174acSceastha (void) strcpy(cp, child->name); 2231da6c28aaSamw archtype = putfile(buf, cp, newparent, NULL, 22327c478bd9Sstevel@tonic-gate NORMAL_FILE, lev + 1, symlink_lev); 22337c478bd9Sstevel@tonic-gate 22347c478bd9Sstevel@tonic-gate if (!exitflag) { 2235da6c28aaSamw if ((atflag || saflag) && 2236da6c28aaSamw (archtype == PUT_NOTAS_LINK)) { 2237da6c28aaSamw xattrs_put(buf, cp, newparent, NULL); 22387c478bd9Sstevel@tonic-gate } 22397c478bd9Sstevel@tonic-gate } 22407c478bd9Sstevel@tonic-gate if (exitflag) 22417c478bd9Sstevel@tonic-gate break; 22427c478bd9Sstevel@tonic-gate 22435e2174acSceastha /* Free each child as we are done processing it. */ 22445e2174acSceastha cptr = child; 22455e2174acSceastha child = child->next; 22465e2174acSceastha free(cptr->name); 22475e2174acSceastha free(cptr); 22487c478bd9Sstevel@tonic-gate } 22495e2174acSceastha if ((child != NULL) && !term) { 22505e2174acSceastha free_children(child); 22517c478bd9Sstevel@tonic-gate } 22527c478bd9Sstevel@tonic-gate 2253b25dbf38SRich Burridge if (tar_chdir(parent) < 0) { 22547c478bd9Sstevel@tonic-gate vperror(0, gettext("cannot change back?: %s"), parent); 22557c478bd9Sstevel@tonic-gate } 22567c478bd9Sstevel@tonic-gate 22577c478bd9Sstevel@tonic-gate break; 22587c478bd9Sstevel@tonic-gate 22597c478bd9Sstevel@tonic-gate case S_IFLNK: 22607c478bd9Sstevel@tonic-gate readlink_max = NAMSIZ; 22617c478bd9Sstevel@tonic-gate if (stbuf.st_size > NAMSIZ) { 22627c478bd9Sstevel@tonic-gate if (Eflag > 0) { 22637c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_LINKPATH; 22647c478bd9Sstevel@tonic-gate readlink_max = PATH_MAX; 22657c478bd9Sstevel@tonic-gate } else { 22667c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 22677c478bd9Sstevel@tonic-gate "tar: %s: symbolic link too long\n"), 22687c478bd9Sstevel@tonic-gate longname); 22697c478bd9Sstevel@tonic-gate if (errflag) 22707c478bd9Sstevel@tonic-gate exitflag = 1; 22717c478bd9Sstevel@tonic-gate Errflg = 1; 22727c478bd9Sstevel@tonic-gate goto out; 22737c478bd9Sstevel@tonic-gate } 22747c478bd9Sstevel@tonic-gate } 22757c478bd9Sstevel@tonic-gate /* 22767c478bd9Sstevel@tonic-gate * Sym-links need header size of zero since you 22777c478bd9Sstevel@tonic-gate * don't store any data for this type. 22787c478bd9Sstevel@tonic-gate */ 22797c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 22807c478bd9Sstevel@tonic-gate tomodes(&stbuf); 22817c478bd9Sstevel@tonic-gate i = readlink(shortname, filetmp, readlink_max); 22827c478bd9Sstevel@tonic-gate if (i < 0) { 22837c478bd9Sstevel@tonic-gate vperror(0, gettext( 22847c478bd9Sstevel@tonic-gate "can't read symbolic link %s"), longname); 22857c478bd9Sstevel@tonic-gate goto out; 22867c478bd9Sstevel@tonic-gate } else { 22877c478bd9Sstevel@tonic-gate filetmp[i] = 0; 22887c478bd9Sstevel@tonic-gate } 22897c478bd9Sstevel@tonic-gate if (vflag) 22907c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 22917c478bd9Sstevel@tonic-gate "a %s symbolic link to %s\n"), 22927c478bd9Sstevel@tonic-gate longname, filetmp); 22937c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) { 22947c478bd9Sstevel@tonic-gate Xtarhdr.x_linkpath = filetmp; 22957c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '2', filetype, &stbuf, 22967c478bd9Sstevel@tonic-gate stbuf.st_dev, prefix) != 0) 22977c478bd9Sstevel@tonic-gate goto out; 22987c478bd9Sstevel@tonic-gate } else 22997c478bd9Sstevel@tonic-gate if (build_dblock(name, filetmp, '2', filetype, &stbuf, 23007c478bd9Sstevel@tonic-gate stbuf.st_dev, prefix) != 0) 23017c478bd9Sstevel@tonic-gate goto out; 23027c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 23037c478bd9Sstevel@tonic-gate /* 23047c478bd9Sstevel@tonic-gate * No acls for symlinks: mode is always 777 23057c478bd9Sstevel@tonic-gate * dont call write ancillary 23067c478bd9Sstevel@tonic-gate */ 23077c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 23087c478bd9Sstevel@tonic-gate break; 23097c478bd9Sstevel@tonic-gate case S_IFREG: 23107c478bd9Sstevel@tonic-gate if ((infile = openat(dirfd, shortname, 0)) < 0) { 23118e4a71aeSRich Burridge vperror(0, gettext("unable to open %s%s%s%s"), longname, 2312da6c28aaSamw rw_sysattr ? gettext(" system") : "", 23137c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? 23147c478bd9Sstevel@tonic-gate gettext(" attribute ") : "", 2315da6c28aaSamw (filetype == XATTR_FILE) ? (longattrname == NULL) ? 2316da6c28aaSamw shortname : longattrname : ""); 23177c478bd9Sstevel@tonic-gate goto out; 23187c478bd9Sstevel@tonic-gate } 23197c478bd9Sstevel@tonic-gate 23207c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 23217c478bd9Sstevel@tonic-gate 2322da6c28aaSamw if (put_link(name, longname, shortname, longattrname, 23237c478bd9Sstevel@tonic-gate prefix, filetype, '1') == 0) { 23247c478bd9Sstevel@tonic-gate (void) close(infile); 23257c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 23267c478bd9Sstevel@tonic-gate goto out; 23277c478bd9Sstevel@tonic-gate } 23287c478bd9Sstevel@tonic-gate 23297c478bd9Sstevel@tonic-gate tomodes(&stbuf); 23307c478bd9Sstevel@tonic-gate 23317c478bd9Sstevel@tonic-gate /* correctly handle end of volume */ 23327c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) { 23337c478bd9Sstevel@tonic-gate /* split if floppy has some room and file is large */ 23347c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) && 23357c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) { 23367c478bd9Sstevel@tonic-gate splitfile(longname, infile, 23377c478bd9Sstevel@tonic-gate name, prefix, filetype); 23387c478bd9Sstevel@tonic-gate (void) close(dirfd); 23397c478bd9Sstevel@tonic-gate (void) close(infile); 23407c478bd9Sstevel@tonic-gate goto out; 23417c478bd9Sstevel@tonic-gate } 23427c478bd9Sstevel@tonic-gate newvol(); /* not worth it--just get new volume */ 23437c478bd9Sstevel@tonic-gate } 2344*28c4d110SJoshua M. Clulow dlog("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname, 23457c478bd9Sstevel@tonic-gate blocks); 23467c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '0', filetype, 23477c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) { 23487c478bd9Sstevel@tonic-gate goto out; 23497c478bd9Sstevel@tonic-gate } 23507c478bd9Sstevel@tonic-gate if (vflag) { 2351*28c4d110SJoshua M. Clulow if (NotTape) { 2352*28c4d110SJoshua M. Clulow dlog("seek = %" FMT_blkcnt_t "K\n", K(tapepos)); 2353*28c4d110SJoshua M. Clulow } 2354da6c28aaSamw (void) fprintf(vfile, "a %s%s%s%s ", longname, 2355da6c28aaSamw rw_sysattr ? gettext(" system") : "", 2356da6c28aaSamw (filetype == XATTR_FILE) ? gettext( 2357da6c28aaSamw " attribute ") : "", 23587c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? 2359da6c28aaSamw longattrname : ""); 23607c478bd9Sstevel@tonic-gate if (NotTape) 23617c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n", 23627c478bd9Sstevel@tonic-gate K(blocks)); 23637c478bd9Sstevel@tonic-gate else 23647c478bd9Sstevel@tonic-gate (void) fprintf(vfile, 23657c478bd9Sstevel@tonic-gate gettext("%" FMT_blkcnt_t " tape blocks\n"), 23667c478bd9Sstevel@tonic-gate blocks); 23677c478bd9Sstevel@tonic-gate } 23687c478bd9Sstevel@tonic-gate 2369da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname, 2370da6c28aaSamw prefix, filetype, '0') != 0) 23717c478bd9Sstevel@tonic-gate goto out; 23727c478bd9Sstevel@tonic-gate 23737c478bd9Sstevel@tonic-gate /* 23747c478bd9Sstevel@tonic-gate * No need to reset typeflag for extended attribute here, since 23757c478bd9Sstevel@tonic-gate * put_extra_attributes already set it and we haven't called 23767c478bd9Sstevel@tonic-gate * build_dblock(). 23777c478bd9Sstevel@tonic-gate */ 23787c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 23797c478bd9Sstevel@tonic-gate hint = writetbuf((char *)&dblock, 1); 2380eace40a5Sceastha maxread = max(min(stbuf.st_blksize, stbuf.st_size), 2381eace40a5Sceastha (nblock * TBLOCK)); 23827c478bd9Sstevel@tonic-gate if ((bigbuf = calloc((unsigned)maxread, sizeof (char))) == 0) { 23837c478bd9Sstevel@tonic-gate maxread = TBLOCK; 23847c478bd9Sstevel@tonic-gate bigbuf = buf; 23857c478bd9Sstevel@tonic-gate } 23867c478bd9Sstevel@tonic-gate 23877c478bd9Sstevel@tonic-gate while (((i = (int) 23887c478bd9Sstevel@tonic-gate read(infile, bigbuf, min((hint*TBLOCK), maxread))) > 0) && 23897c478bd9Sstevel@tonic-gate blocks) { 23907c478bd9Sstevel@tonic-gate blkcnt_t nblks; 23917c478bd9Sstevel@tonic-gate 23927c478bd9Sstevel@tonic-gate nblks = ((i-1)/TBLOCK)+1; 23937c478bd9Sstevel@tonic-gate if (nblks > blocks) 23947c478bd9Sstevel@tonic-gate nblks = blocks; 23957c478bd9Sstevel@tonic-gate hint = writetbuf(bigbuf, nblks); 23967c478bd9Sstevel@tonic-gate blocks -= nblks; 23977c478bd9Sstevel@tonic-gate } 23987c478bd9Sstevel@tonic-gate (void) close(infile); 23997c478bd9Sstevel@tonic-gate if (bigbuf != buf) 24007c478bd9Sstevel@tonic-gate free(bigbuf); 24017c478bd9Sstevel@tonic-gate if (i < 0) 24027c478bd9Sstevel@tonic-gate vperror(0, gettext("Read error on %s"), longname); 24037c478bd9Sstevel@tonic-gate else if (blocks != 0 || i != 0) { 24047c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 24057c478bd9Sstevel@tonic-gate "tar: %s: file changed size\n"), longname); 24067c478bd9Sstevel@tonic-gate if (errflag) { 24077c478bd9Sstevel@tonic-gate exitflag = 1; 24087c478bd9Sstevel@tonic-gate Errflg = 1; 24097c478bd9Sstevel@tonic-gate } else if (!Dflag) { 24107c478bd9Sstevel@tonic-gate Errflg = 1; 24117c478bd9Sstevel@tonic-gate } 24127c478bd9Sstevel@tonic-gate } 24137c478bd9Sstevel@tonic-gate putempty(blocks); 24147c478bd9Sstevel@tonic-gate break; 24157c478bd9Sstevel@tonic-gate case S_IFIFO: 24167c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 24177c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 24187c478bd9Sstevel@tonic-gate 2419da6c28aaSamw if (put_link(name, longname, shortname, longattrname, 24207c478bd9Sstevel@tonic-gate prefix, filetype, '6') == 0) { 24217c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 24227c478bd9Sstevel@tonic-gate goto out; 24237c478bd9Sstevel@tonic-gate } 24247c478bd9Sstevel@tonic-gate tomodes(&stbuf); 24257c478bd9Sstevel@tonic-gate 24267c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) { 24277c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) && 24287c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) { 24297c478bd9Sstevel@tonic-gate splitfile(longname, infile, name, 24307c478bd9Sstevel@tonic-gate prefix, filetype); 24317c478bd9Sstevel@tonic-gate (void) close(dirfd); 24327c478bd9Sstevel@tonic-gate (void) close(infile); 24337c478bd9Sstevel@tonic-gate goto out; 24347c478bd9Sstevel@tonic-gate } 24357c478bd9Sstevel@tonic-gate newvol(); 24367c478bd9Sstevel@tonic-gate } 2437*28c4d110SJoshua M. Clulow dlog("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname, 24387c478bd9Sstevel@tonic-gate blocks); 24397c478bd9Sstevel@tonic-gate if (vflag) { 2440*28c4d110SJoshua M. Clulow if (NotTape) { 2441*28c4d110SJoshua M. Clulow dlog("seek = %" FMT_blkcnt_t "K\n", K(tapepos)); 2442*28c4d110SJoshua M. Clulow 24437c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %" 24447c478bd9Sstevel@tonic-gate FMT_blkcnt_t "K\n "), longname, K(blocks)); 2445*28c4d110SJoshua M. Clulow } else { 24467c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 24477c478bd9Sstevel@tonic-gate "a %s %" FMT_blkcnt_t " tape blocks\n"), 24487c478bd9Sstevel@tonic-gate longname, blocks); 24497c478bd9Sstevel@tonic-gate } 2450*28c4d110SJoshua M. Clulow } 24517c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '6', filetype, 24527c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) 24537c478bd9Sstevel@tonic-gate goto out; 24547c478bd9Sstevel@tonic-gate 2455da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname, 2456da6c28aaSamw prefix, filetype, '6') != 0) 24577c478bd9Sstevel@tonic-gate goto out; 24587c478bd9Sstevel@tonic-gate 24597c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 24607c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '6'; 24617c478bd9Sstevel@tonic-gate 24627c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 24637c478bd9Sstevel@tonic-gate break; 24647c478bd9Sstevel@tonic-gate case S_IFCHR: 24657c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 24667c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 2467da6c28aaSamw if (put_link(name, longname, shortname, longattrname, 2468da6c28aaSamw prefix, filetype, '3') == 0) { 24697c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 24707c478bd9Sstevel@tonic-gate goto out; 24717c478bd9Sstevel@tonic-gate } 24727c478bd9Sstevel@tonic-gate tomodes(&stbuf); 24737c478bd9Sstevel@tonic-gate 24747c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) { 24757c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) && 24767c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) { 24777c478bd9Sstevel@tonic-gate splitfile(longname, infile, name, 24787c478bd9Sstevel@tonic-gate prefix, filetype); 24797c478bd9Sstevel@tonic-gate (void) close(dirfd); 24807c478bd9Sstevel@tonic-gate goto out; 24817c478bd9Sstevel@tonic-gate } 24827c478bd9Sstevel@tonic-gate newvol(); 24837c478bd9Sstevel@tonic-gate } 2484*28c4d110SJoshua M. Clulow dlog("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname, 24857c478bd9Sstevel@tonic-gate blocks); 24867c478bd9Sstevel@tonic-gate if (vflag) { 2487*28c4d110SJoshua M. Clulow if (NotTape) { 2488*28c4d110SJoshua M. Clulow dlog("seek = %" FMT_blkcnt_t "K\t", K(tapepos)); 2489*28c4d110SJoshua M. Clulow 24907c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %" 24917c478bd9Sstevel@tonic-gate FMT_blkcnt_t "K\n"), longname, K(blocks)); 2492*28c4d110SJoshua M. Clulow } else { 24937c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %" 24947c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), longname, 24957c478bd9Sstevel@tonic-gate blocks); 24967c478bd9Sstevel@tonic-gate } 2497*28c4d110SJoshua M. Clulow } 24987c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '3', 24997c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_rdev, prefix) != 0) 25007c478bd9Sstevel@tonic-gate goto out; 25017c478bd9Sstevel@tonic-gate 2502da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname, 25037c478bd9Sstevel@tonic-gate prefix, filetype, '3') != 0) 25047c478bd9Sstevel@tonic-gate goto out; 25057c478bd9Sstevel@tonic-gate 25067c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 25077c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '3'; 25087c478bd9Sstevel@tonic-gate 25097c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 25107c478bd9Sstevel@tonic-gate break; 25117c478bd9Sstevel@tonic-gate case S_IFBLK: 25127c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 25137c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 2514da6c28aaSamw if (put_link(name, longname, shortname, longattrname, 2515da6c28aaSamw prefix, filetype, '4') == 0) { 25167c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 25177c478bd9Sstevel@tonic-gate goto out; 25187c478bd9Sstevel@tonic-gate } 25197c478bd9Sstevel@tonic-gate tomodes(&stbuf); 25207c478bd9Sstevel@tonic-gate 25217c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) { 25227c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) && 25237c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) { 25247c478bd9Sstevel@tonic-gate splitfile(longname, infile, 25257c478bd9Sstevel@tonic-gate name, prefix, filetype); 25267c478bd9Sstevel@tonic-gate (void) close(dirfd); 25277c478bd9Sstevel@tonic-gate goto out; 25287c478bd9Sstevel@tonic-gate } 25297c478bd9Sstevel@tonic-gate newvol(); 25307c478bd9Sstevel@tonic-gate } 2531*28c4d110SJoshua M. Clulow dlog("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname, 25327c478bd9Sstevel@tonic-gate blocks); 25337c478bd9Sstevel@tonic-gate if (vflag) { 2534*28c4d110SJoshua M. Clulow if (NotTape) { 2535*28c4d110SJoshua M. Clulow dlog("seek = %" FMT_blkcnt_t "K\n", K(tapepos)); 2536*28c4d110SJoshua M. Clulow } 2537*28c4d110SJoshua M. Clulow 25387c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "a %s ", longname); 25397c478bd9Sstevel@tonic-gate if (NotTape) 25407c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n", 25417c478bd9Sstevel@tonic-gate K(blocks)); 25427c478bd9Sstevel@tonic-gate else 25437c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 25447c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), blocks); 25457c478bd9Sstevel@tonic-gate } 25467c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '4', 25477c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_rdev, prefix) != 0) 25487c478bd9Sstevel@tonic-gate goto out; 25497c478bd9Sstevel@tonic-gate 2550da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname, 25517c478bd9Sstevel@tonic-gate prefix, filetype, '4') != 0) 25527c478bd9Sstevel@tonic-gate goto out; 25537c478bd9Sstevel@tonic-gate 25547c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 25557c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '4'; 25567c478bd9Sstevel@tonic-gate 25577c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 25587c478bd9Sstevel@tonic-gate break; 25597c478bd9Sstevel@tonic-gate default: 25607c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 25617c478bd9Sstevel@tonic-gate "tar: %s is not a file. Not dumped\n"), longname); 25627c478bd9Sstevel@tonic-gate if (errflag) 25637c478bd9Sstevel@tonic-gate exitflag = 1; 25647c478bd9Sstevel@tonic-gate Errflg = 1; 25657c478bd9Sstevel@tonic-gate goto out; 25667c478bd9Sstevel@tonic-gate } 25677c478bd9Sstevel@tonic-gate 25687c478bd9Sstevel@tonic-gate out: 2569da6c28aaSamw if ((dirfd != -1) && (filetype != XATTR_FILE)) { 25707c478bd9Sstevel@tonic-gate (void) close(dirfd); 25717c478bd9Sstevel@tonic-gate } 25727c478bd9Sstevel@tonic-gate return (rc); 25737c478bd9Sstevel@tonic-gate } 25747c478bd9Sstevel@tonic-gate 25757c478bd9Sstevel@tonic-gate 25767c478bd9Sstevel@tonic-gate /* 25777c478bd9Sstevel@tonic-gate * splitfile dump a large file across volumes 25787c478bd9Sstevel@tonic-gate * 25797c478bd9Sstevel@tonic-gate * splitfile(longname, fd); 25807c478bd9Sstevel@tonic-gate * char *longname; full name of file 25817c478bd9Sstevel@tonic-gate * int ifd; input file descriptor 25827c478bd9Sstevel@tonic-gate * 25837c478bd9Sstevel@tonic-gate * NOTE: only called by putfile() to dump a large file. 25847c478bd9Sstevel@tonic-gate */ 25857c478bd9Sstevel@tonic-gate 25867c478bd9Sstevel@tonic-gate static void 25877c478bd9Sstevel@tonic-gate splitfile(char *longname, int ifd, char *name, char *prefix, int filetype) 25887c478bd9Sstevel@tonic-gate { 25897c478bd9Sstevel@tonic-gate blkcnt_t blocks; 25907c478bd9Sstevel@tonic-gate off_t bytes, s; 25917c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 25927c478bd9Sstevel@tonic-gate int i, extents; 25937c478bd9Sstevel@tonic-gate 25947c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); /* blocks file needs */ 25957c478bd9Sstevel@tonic-gate 25967c478bd9Sstevel@tonic-gate /* 25977c478bd9Sstevel@tonic-gate * # extents = 25987c478bd9Sstevel@tonic-gate * size of file after using up rest of this floppy 25997c478bd9Sstevel@tonic-gate * blocks - (blocklim - tapepos) + 1 (for header) 26007c478bd9Sstevel@tonic-gate * plus roundup value before divide by blocklim-1 26017c478bd9Sstevel@tonic-gate * + (blocklim - 1) - 1 26027c478bd9Sstevel@tonic-gate * all divided by blocklim-1 (one block for each header). 26037c478bd9Sstevel@tonic-gate * this gives 26047c478bd9Sstevel@tonic-gate * (blocks - blocklim + tapepos + 1 + blocklim - 2)/(blocklim-1) 26057c478bd9Sstevel@tonic-gate * which reduces to the expression used. 26067c478bd9Sstevel@tonic-gate * one is added to account for this first extent. 26077c478bd9Sstevel@tonic-gate * 26087c478bd9Sstevel@tonic-gate * When one is dealing with extremely large archives, one may want 26097c478bd9Sstevel@tonic-gate * to allow for a large number of extents. This code should be 26107c478bd9Sstevel@tonic-gate * revisited to determine if extents should be changed to something 26117c478bd9Sstevel@tonic-gate * larger than an int. 26127c478bd9Sstevel@tonic-gate */ 26137c478bd9Sstevel@tonic-gate extents = (int)((blocks + tapepos - 1ULL)/(blocklim - 1ULL) + 1); 26147c478bd9Sstevel@tonic-gate 26157c478bd9Sstevel@tonic-gate if (extents < 2 || extents > MAXEXT) { /* let's be reasonable */ 26167c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 26177c478bd9Sstevel@tonic-gate "tar: %s needs unusual number of volumes to split\n" 26187c478bd9Sstevel@tonic-gate "tar: %s not dumped\n"), longname, longname); 26197c478bd9Sstevel@tonic-gate return; 26207c478bd9Sstevel@tonic-gate } 26217c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '0', filetype, 26227c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) 26237c478bd9Sstevel@tonic-gate return; 26247c478bd9Sstevel@tonic-gate 26257c478bd9Sstevel@tonic-gate dblock.dbuf.extotal = extents; 26267c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 26277c478bd9Sstevel@tonic-gate 26287c478bd9Sstevel@tonic-gate /* 26297c478bd9Sstevel@tonic-gate * The value contained in dblock.dbuf.efsize was formerly used when the 26307c478bd9Sstevel@tonic-gate * v flag was specified in conjunction with the t flag. Although it is 26317c478bd9Sstevel@tonic-gate * no longer used, older versions of tar will expect the former 26327c478bd9Sstevel@tonic-gate * behaviour, so we must continue to write it to the archive. 26337c478bd9Sstevel@tonic-gate * 26347c478bd9Sstevel@tonic-gate * Since dblock.dbuf.efsize is 10 chars in size, the maximum value it 26357c478bd9Sstevel@tonic-gate * can store is TAR_EFSIZE_MAX. If bytes exceeds that value, simply 26367c478bd9Sstevel@tonic-gate * store 0. 26377c478bd9Sstevel@tonic-gate */ 26387c478bd9Sstevel@tonic-gate if (bytes <= TAR_EFSIZE_MAX) 26397c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.efsize, "%9" FMT_off_t_o, bytes); 26407c478bd9Sstevel@tonic-gate else 26417c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.efsize, "%9" FMT_off_t_o, (off_t)0); 26427c478bd9Sstevel@tonic-gate 26437c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 26447c478bd9Sstevel@tonic-gate "tar: large file %s needs %d extents.\n" 26457c478bd9Sstevel@tonic-gate "tar: current device seek position = %" FMT_blkcnt_t "K\n"), 26467c478bd9Sstevel@tonic-gate longname, extents, K(tapepos)); 26477c478bd9Sstevel@tonic-gate 26487c478bd9Sstevel@tonic-gate s = (off_t)(blocklim - tapepos - 1) * TBLOCK; 26497c478bd9Sstevel@tonic-gate for (i = 1; i <= extents; i++) { 26507c478bd9Sstevel@tonic-gate if (i > 1) { 26517c478bd9Sstevel@tonic-gate newvol(); 26527c478bd9Sstevel@tonic-gate if (i == extents) 26537c478bd9Sstevel@tonic-gate s = bytes; /* last ext. gets true bytes */ 26547c478bd9Sstevel@tonic-gate else 26557c478bd9Sstevel@tonic-gate s = (off_t)(blocklim - 1)*TBLOCK; /* all */ 26567c478bd9Sstevel@tonic-gate } 26577c478bd9Sstevel@tonic-gate bytes -= s; 26587c478bd9Sstevel@tonic-gate blocks = TBLOCKS(s); 26597c478bd9Sstevel@tonic-gate 26607c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o, s); 26617c478bd9Sstevel@tonic-gate dblock.dbuf.extno = i; 26627c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 26637c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 26647c478bd9Sstevel@tonic-gate 26657c478bd9Sstevel@tonic-gate if (vflag) 26667c478bd9Sstevel@tonic-gate (void) fprintf(vfile, 26678e4a71aeSRich Burridge gettext("+++ a %s %" FMT_blkcnt_t 26688e4a71aeSRich Burridge "K [extent #%d of %d]\n"), 26697c478bd9Sstevel@tonic-gate longname, K(blocks), i, extents); 26707c478bd9Sstevel@tonic-gate while (blocks && read(ifd, buf, TBLOCK) > 0) { 26717c478bd9Sstevel@tonic-gate blocks--; 26727c478bd9Sstevel@tonic-gate (void) writetbuf(buf, 1); 26737c478bd9Sstevel@tonic-gate } 26747c478bd9Sstevel@tonic-gate if (blocks != 0) { 26757c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 26767c478bd9Sstevel@tonic-gate "tar: %s: file changed size\n"), longname); 26777c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 26787c478bd9Sstevel@tonic-gate "tar: aborting split file %s\n"), longname); 26797c478bd9Sstevel@tonic-gate (void) close(ifd); 26807c478bd9Sstevel@tonic-gate return; 26817c478bd9Sstevel@tonic-gate } 26827c478bd9Sstevel@tonic-gate } 26837c478bd9Sstevel@tonic-gate (void) close(ifd); 26847c478bd9Sstevel@tonic-gate if (vflag) 26857c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %" FMT_off_t "K (in %d " 26867c478bd9Sstevel@tonic-gate "extents)\n"), longname, K(TBLOCKS(stbuf.st_size)), 26877c478bd9Sstevel@tonic-gate extents); 26887c478bd9Sstevel@tonic-gate } 26897c478bd9Sstevel@tonic-gate 26907c478bd9Sstevel@tonic-gate /* 26917c478bd9Sstevel@tonic-gate * convtoreg - determines whether the file should be converted to a 26927c478bd9Sstevel@tonic-gate * regular file when extracted 26937c478bd9Sstevel@tonic-gate * 26947c478bd9Sstevel@tonic-gate * Returns 1 when file size > 0 and typeflag is not recognized 26957c478bd9Sstevel@tonic-gate * Otherwise returns 0 26967c478bd9Sstevel@tonic-gate */ 26977c478bd9Sstevel@tonic-gate static int 26987c478bd9Sstevel@tonic-gate convtoreg(off_t size) 26997c478bd9Sstevel@tonic-gate { 27007c478bd9Sstevel@tonic-gate if ((size > 0) && (dblock.dbuf.typeflag != '0') && 27017c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != NULL) && (dblock.dbuf.typeflag != '1') && 27027c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != '2') && (dblock.dbuf.typeflag != '3') && 27037c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != '4') && (dblock.dbuf.typeflag != '5') && 27047c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != '6') && (dblock.dbuf.typeflag != 'A') && 2705e765faefSRich Burridge (dblock.dbuf.typeflag != 'L') && 27067c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != _XATTR_HDRTYPE) && 27077c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != 'X')) { 27087c478bd9Sstevel@tonic-gate return (1); 27097c478bd9Sstevel@tonic-gate } 27107c478bd9Sstevel@tonic-gate return (0); 27117c478bd9Sstevel@tonic-gate } 27127c478bd9Sstevel@tonic-gate 2713da6c28aaSamw #if defined(O_XATTR) 2714da6c28aaSamw static int 2715da6c28aaSamw save_cwd(void) 2716da6c28aaSamw { 2717da6c28aaSamw return (open(".", O_RDONLY)); 2718da6c28aaSamw } 2719da6c28aaSamw #endif 2720da6c28aaSamw 2721da6c28aaSamw #if defined(O_XATTR) 2722da6c28aaSamw static void 2723da6c28aaSamw rest_cwd(int *cwd) 2724da6c28aaSamw { 2725da6c28aaSamw if (*cwd != -1) { 2726da6c28aaSamw if (fchdir(*cwd) < 0) { 2727da6c28aaSamw vperror(0, gettext( 2728da6c28aaSamw "Cannot fchdir to attribute directory")); 2729da6c28aaSamw exit(1); 2730da6c28aaSamw } 2731da6c28aaSamw (void) close(*cwd); 2732da6c28aaSamw *cwd = -1; 2733da6c28aaSamw } 2734da6c28aaSamw } 2735da6c28aaSamw #endif 2736da6c28aaSamw 2737da6c28aaSamw /* 2738da6c28aaSamw * Verify the underlying file system supports the attribute type. 2739da6c28aaSamw * Only archive extended attribute files when '-@' was specified. 2740da6c28aaSamw * Only archive system extended attribute files if '-/' was specified. 2741da6c28aaSamw */ 2742da6c28aaSamw #if defined(O_XATTR) 2743da6c28aaSamw static attr_status_t 2744ced83f9bSceastha verify_attr_support(char *filename, int attrflg, arc_action_t actflag, 2745ced83f9bSceastha int *ext_attrflg) 2746da6c28aaSamw { 2747da6c28aaSamw /* 2748ced83f9bSceastha * Verify extended attributes are supported/exist. We only 2749ced83f9bSceastha * need to check if we are processing a base file, not an 2750ced83f9bSceastha * extended attribute. 2751da6c28aaSamw */ 2752ced83f9bSceastha if (attrflg) { 2753ced83f9bSceastha *ext_attrflg = (pathconf(filename, (actflag == ARC_CREATE) ? 2754ced83f9bSceastha _PC_XATTR_EXISTS : _PC_XATTR_ENABLED) == 1); 2755ced83f9bSceastha } 2756ced83f9bSceastha 2757da6c28aaSamw if (atflag) { 2758ced83f9bSceastha if (!*ext_attrflg) { 2759da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 2760da6c28aaSamw if (saflag) { 2761da6c28aaSamw /* Verify system attributes are supported */ 2762da6c28aaSamw if (sysattr_support(filename, 2763da6c28aaSamw (actflag == ARC_CREATE) ? _PC_SATTR_EXISTS : 2764da6c28aaSamw _PC_SATTR_ENABLED) != 1) { 2765da6c28aaSamw return (ATTR_SATTR_ERR); 2766da6c28aaSamw } 2767da6c28aaSamw } else 2768da6c28aaSamw return (ATTR_XATTR_ERR); 2769da6c28aaSamw #else 2770da6c28aaSamw return (ATTR_XATTR_ERR); 2771da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 2772da6c28aaSamw } 2773da6c28aaSamw 2774da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 2775da6c28aaSamw } else if (saflag) { 2776da6c28aaSamw /* Verify system attributes are supported */ 2777da6c28aaSamw if (sysattr_support(filename, (actflag == ARC_CREATE) ? 2778da6c28aaSamw _PC_SATTR_EXISTS : _PC_SATTR_ENABLED) != 1) { 2779da6c28aaSamw return (ATTR_SATTR_ERR); 2780da6c28aaSamw } 2781da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 2782da6c28aaSamw } else { 2783da6c28aaSamw return (ATTR_SKIP); 2784da6c28aaSamw } 2785da6c28aaSamw 2786da6c28aaSamw return (ATTR_OK); 2787da6c28aaSamw } 2788da6c28aaSamw #endif 2789da6c28aaSamw 2790da6c28aaSamw #if defined(O_XATTR) 2791da6c28aaSamw /* 2792da6c28aaSamw * Recursively open attribute directories until the attribute directory 2793da6c28aaSamw * containing the specified attribute, attrname, is opened. 2794da6c28aaSamw * 2795da6c28aaSamw * Currently, only 2 directory levels of attributes are supported, (i.e., 2796da6c28aaSamw * extended system attributes on extended attributes). The following are 2797da6c28aaSamw * the possible input combinations: 2798da6c28aaSamw * 1. Open the attribute directory of the base file (don't change 2799da6c28aaSamw * into it). 2800da6c28aaSamw * attrinfo->parent = NULL 2801da6c28aaSamw * attrname = '.' 2802da6c28aaSamw * 2. Open the attribute directory of the base file and change into it. 2803da6c28aaSamw * attrinfo->parent = NULL 2804da6c28aaSamw * attrname = <attr> | <sys_attr> 2805da6c28aaSamw * 3. Open the attribute directory of the base file, change into it, 2806da6c28aaSamw * then recursively call open_attr_dir() to open the attribute's 2807da6c28aaSamw * parent directory (don't change into it). 2808da6c28aaSamw * attrinfo->parent = <attr> 2809da6c28aaSamw * attrname = '.' 2810da6c28aaSamw * 4. Open the attribute directory of the base file, change into it, 2811da6c28aaSamw * then recursively call open_attr_dir() to open the attribute's 2812da6c28aaSamw * parent directory and change into it. 2813da6c28aaSamw * attrinfo->parent = <attr> 2814da6c28aaSamw * attrname = <attr> | <sys_attr> 2815da6c28aaSamw * 2816da6c28aaSamw * An attribute directory will be opened only if the underlying file system 2817da6c28aaSamw * supports the attribute type, and if the command line specifications (atflag 2818da6c28aaSamw * and saflag) enable the processing of the attribute type. 2819da6c28aaSamw * 2820da6c28aaSamw * On succesful return, attrinfo->parentfd will be the file descriptor of the 2821da6c28aaSamw * opened attribute directory. In addition, if the attribute is a read-write 2822da6c28aaSamw * extended system attribute, attrinfo->rw_sysattr will be set to 1, otherwise 2823da6c28aaSamw * it will be set to 0. 2824da6c28aaSamw * 2825da6c28aaSamw * Possible return values: 2826da6c28aaSamw * ATTR_OK Successfully opened and, if needed, changed into the 2827da6c28aaSamw * attribute directory containing attrname. 2828da6c28aaSamw * ATTR_SKIP The command line specifications don't enable the 2829da6c28aaSamw * processing of the attribute type. 2830da6c28aaSamw * ATTR_CHDIR_ERR An error occurred while trying to change into an 2831da6c28aaSamw * attribute directory. 2832da6c28aaSamw * ATTR_OPEN_ERR An error occurred while trying to open an 2833da6c28aaSamw * attribute directory. 2834da6c28aaSamw * ATTR_XATTR_ERR The underlying file system doesn't support extended 2835da6c28aaSamw * attributes. 2836da6c28aaSamw * ATTR_SATTR_ERR The underlying file system doesn't support extended 2837da6c28aaSamw * system attributes. 2838da6c28aaSamw */ 2839da6c28aaSamw static int 2840da6c28aaSamw open_attr_dir(char *attrname, char *dirp, int cwd, attr_data_t *attrinfo) 2841da6c28aaSamw { 2842da6c28aaSamw attr_status_t rc; 2843da6c28aaSamw int firsttime = (attrinfo->attr_parentfd == -1); 2844da6c28aaSamw int saveerrno; 2845ced83f9bSceastha int ext_attr; 2846da6c28aaSamw 2847da6c28aaSamw /* 2848da6c28aaSamw * open_attr_dir() was recursively called (input combination number 4), 2849da6c28aaSamw * close the previously opened file descriptor as we've already changed 2850da6c28aaSamw * into it. 2851da6c28aaSamw */ 2852da6c28aaSamw if (!firsttime) { 2853da6c28aaSamw (void) close(attrinfo->attr_parentfd); 2854da6c28aaSamw attrinfo->attr_parentfd = -1; 2855da6c28aaSamw } 2856da6c28aaSamw 2857da6c28aaSamw /* 2858da6c28aaSamw * Verify that the underlying file system supports the restoration 2859da6c28aaSamw * of the attribute. 2860da6c28aaSamw */ 2861ced83f9bSceastha if ((rc = verify_attr_support(dirp, firsttime, ARC_RESTORE, 2862ced83f9bSceastha &ext_attr)) != ATTR_OK) { 2863da6c28aaSamw return (rc); 2864da6c28aaSamw } 2865da6c28aaSamw 2866da6c28aaSamw /* Open the base file's attribute directory */ 2867da6c28aaSamw if ((attrinfo->attr_parentfd = attropen(dirp, ".", O_RDONLY)) == -1) { 2868da6c28aaSamw /* 2869da6c28aaSamw * Save the errno from the attropen so it can be reported 2870da6c28aaSamw * if the retry of the attropen fails. 2871da6c28aaSamw */ 2872da6c28aaSamw saveerrno = errno; 2873da6c28aaSamw if ((attrinfo->attr_parentfd = retry_open_attr(-1, cwd, dirp, 2874da6c28aaSamw NULL, ".", O_RDONLY, 0)) == -1) { 2875da6c28aaSamw /* 2876da6c28aaSamw * Reset typeflag back to real value so passtape 2877da6c28aaSamw * will skip ahead correctly. 2878da6c28aaSamw */ 2879da6c28aaSamw dblock.dbuf.typeflag = _XATTR_HDRTYPE; 2880da6c28aaSamw (void) close(attrinfo->attr_parentfd); 2881da6c28aaSamw attrinfo->attr_parentfd = -1; 2882da6c28aaSamw errno = saveerrno; 2883da6c28aaSamw return (ATTR_OPEN_ERR); 2884da6c28aaSamw } 2885da6c28aaSamw } 2886da6c28aaSamw 2887da6c28aaSamw /* 2888da6c28aaSamw * Change into the parent attribute's directory unless we are 2889da6c28aaSamw * processing the hidden attribute directory of the base file itself. 2890da6c28aaSamw */ 2891da6c28aaSamw if ((Hiddendir == 0) || (firsttime && attrinfo->attr_parent != NULL)) { 2892da6c28aaSamw if (fchdir(attrinfo->attr_parentfd) != 0) { 2893da6c28aaSamw saveerrno = errno; 2894da6c28aaSamw (void) close(attrinfo->attr_parentfd); 2895da6c28aaSamw attrinfo->attr_parentfd = -1; 2896da6c28aaSamw errno = saveerrno; 2897da6c28aaSamw return (ATTR_CHDIR_ERR); 2898da6c28aaSamw } 2899da6c28aaSamw } 2900da6c28aaSamw 2901da6c28aaSamw /* Determine if the attribute should be processed */ 2902da6c28aaSamw if ((rc = verify_attr(attrname, attrinfo->attr_parent, 1, 2903da6c28aaSamw &attrinfo->attr_rw_sysattr)) != ATTR_OK) { 2904da6c28aaSamw saveerrno = errno; 2905da6c28aaSamw (void) close(attrinfo->attr_parentfd); 2906da6c28aaSamw attrinfo->attr_parentfd = -1; 2907da6c28aaSamw errno = saveerrno; 2908da6c28aaSamw return (rc); 2909da6c28aaSamw } 2910da6c28aaSamw 2911da6c28aaSamw /* 2912da6c28aaSamw * If the attribute is an extended attribute, or extended system 2913da6c28aaSamw * attribute, of an attribute (i.e., <attr>/<sys_attr>), then 2914da6c28aaSamw * recursively call open_attr_dir() to open the attribute directory 2915da6c28aaSamw * of the parent attribute. 2916da6c28aaSamw */ 2917da6c28aaSamw if (firsttime && (attrinfo->attr_parent != NULL)) { 2918da6c28aaSamw return (open_attr_dir(attrname, attrinfo->attr_parent, 2919da6c28aaSamw attrinfo->attr_parentfd, attrinfo)); 2920da6c28aaSamw } 2921da6c28aaSamw 2922da6c28aaSamw return (ATTR_OK); 2923da6c28aaSamw } 2924da6c28aaSamw #endif 2925da6c28aaSamw 29267c478bd9Sstevel@tonic-gate static void 29277c478bd9Sstevel@tonic-gate doxtract(char *argv[]) 29287c478bd9Sstevel@tonic-gate { 29297c478bd9Sstevel@tonic-gate struct stat xtractbuf; /* stat on file after extracting */ 29307c478bd9Sstevel@tonic-gate blkcnt_t blocks; 29317c478bd9Sstevel@tonic-gate off_t bytes; 29327c478bd9Sstevel@tonic-gate int ofile; 29337c478bd9Sstevel@tonic-gate int newfile; /* Does the file already exist */ 29347c478bd9Sstevel@tonic-gate int xcnt = 0; /* count # files extracted */ 29357c478bd9Sstevel@tonic-gate int fcnt = 0; /* count # files in argv list */ 29367c478bd9Sstevel@tonic-gate int dir; 29377c478bd9Sstevel@tonic-gate int dirfd = -1; 2938da6c28aaSamw int cwd = -1; 2939ced83f9bSceastha int rw_sysattr; 2940da6c28aaSamw int saveerrno; 29417c478bd9Sstevel@tonic-gate uid_t Uid; 29427c478bd9Sstevel@tonic-gate char *namep, *dirp, *comp, *linkp; /* for removing absolute paths */ 29437c478bd9Sstevel@tonic-gate char dirname[PATH_MAX+1]; 29447c478bd9Sstevel@tonic-gate char templink[PATH_MAX+1]; /* temp link with terminating NULL */ 29457c478bd9Sstevel@tonic-gate int once = 1; 29467c478bd9Sstevel@tonic-gate int error; 29477c478bd9Sstevel@tonic-gate int symflag; 29487c478bd9Sstevel@tonic-gate int want; 2949da6c28aaSamw attr_data_t *attrinfo = NULL; /* attribute info */ 2950fa9e4066Sahrens acl_t *aclp = NULL; /* acl info */ 295145916cd2Sjpk char dot[] = "."; /* dirp for using realpath */ 29527c478bd9Sstevel@tonic-gate timestruc_t time_zero; /* used for call to doDirTimes */ 29537c478bd9Sstevel@tonic-gate int dircreate; 29547c478bd9Sstevel@tonic-gate int convflag; 29557c478bd9Sstevel@tonic-gate time_zero.tv_sec = 0; 29567c478bd9Sstevel@tonic-gate time_zero.tv_nsec = 0; 29577c478bd9Sstevel@tonic-gate 295845916cd2Sjpk /* reset Trusted Extensions variables */ 295945916cd2Sjpk rpath_flag = 0; 296045916cd2Sjpk lk_rpath_flag = 0; 296145916cd2Sjpk dir_flag = 0; 296245916cd2Sjpk mld_flag = 0; 296345916cd2Sjpk bslundef(&bs_label); 296445916cd2Sjpk bsllow(&admin_low); 296545916cd2Sjpk bslhigh(&admin_high); 296645916cd2Sjpk orig_namep = 0; 296745916cd2Sjpk 29687c478bd9Sstevel@tonic-gate dumping = 0; /* for newvol(), et al: we are not writing */ 29697c478bd9Sstevel@tonic-gate 29707c478bd9Sstevel@tonic-gate Uid = getuid(); 29717c478bd9Sstevel@tonic-gate 29727c478bd9Sstevel@tonic-gate for (;;) { 29737c478bd9Sstevel@tonic-gate convflag = 0; 29747c478bd9Sstevel@tonic-gate symflag = 0; 29757c478bd9Sstevel@tonic-gate dir = 0; 2976ced83f9bSceastha Hiddendir = 0; 2977ced83f9bSceastha rw_sysattr = 0; 29787c478bd9Sstevel@tonic-gate ofile = -1; 29797c478bd9Sstevel@tonic-gate 2980da6c28aaSamw if (dirfd != -1) { 2981da6c28aaSamw (void) close(dirfd); 2982da6c28aaSamw dirfd = -1; 2983da6c28aaSamw } 2984da6c28aaSamw if (ofile != -1) { 2985da6c28aaSamw if (close(ofile) != 0) 2986da6c28aaSamw vperror(2, gettext("close error")); 2987da6c28aaSamw } 2988da6c28aaSamw 29897c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 2990da6c28aaSamw if (cwd != -1) { 2991da6c28aaSamw rest_cwd(&cwd); 2992da6c28aaSamw } 2993da6c28aaSamw #endif 2994da6c28aaSamw 2995da6c28aaSamw /* namep is set by wantit to point to the full name */ 2996da6c28aaSamw if ((want = wantit(argv, &namep, &dirp, &comp, 2997da6c28aaSamw &attrinfo)) == 0) { 2998da6c28aaSamw #if defined(O_XATTR) 2999da6c28aaSamw if (xattrp != NULL) { 30007c478bd9Sstevel@tonic-gate free(xattrhead); 30017c478bd9Sstevel@tonic-gate xattrp = NULL; 30027c478bd9Sstevel@tonic-gate xattr_linkp = NULL; 30037c478bd9Sstevel@tonic-gate xattrhead = NULL; 30047c478bd9Sstevel@tonic-gate } 30057c478bd9Sstevel@tonic-gate #endif 30067c478bd9Sstevel@tonic-gate continue; 30077c478bd9Sstevel@tonic-gate } 30087c478bd9Sstevel@tonic-gate if (want == -1) 30097c478bd9Sstevel@tonic-gate break; 30107c478bd9Sstevel@tonic-gate 301145916cd2Sjpk /* Trusted Extensions */ 301245916cd2Sjpk /* 301345916cd2Sjpk * During tar extract (x): 301445916cd2Sjpk * If the pathname of the restored file has been 301545916cd2Sjpk * reconstructed from the ancillary file, 301645916cd2Sjpk * use it to process the normal file. 301745916cd2Sjpk */ 301845916cd2Sjpk if (mld_flag) { /* Skip over .MLD. directory */ 301945916cd2Sjpk mld_flag = 0; 302045916cd2Sjpk passtape(); 302145916cd2Sjpk continue; 302245916cd2Sjpk } 302345916cd2Sjpk orig_namep = namep; /* save original */ 302445916cd2Sjpk if (rpath_flag) { 302545916cd2Sjpk namep = real_path; /* use zone path */ 302645916cd2Sjpk comp = real_path; /* use zone path */ 302745916cd2Sjpk dirp = dot; /* work from the top */ 302845916cd2Sjpk rpath_flag = 0; /* reset */ 302945916cd2Sjpk } 303045916cd2Sjpk 30317c478bd9Sstevel@tonic-gate if (dirfd != -1) 30327c478bd9Sstevel@tonic-gate (void) close(dirfd); 30337c478bd9Sstevel@tonic-gate 30347c478bd9Sstevel@tonic-gate (void) strcpy(&dirname[0], namep); 30357c478bd9Sstevel@tonic-gate dircreate = checkdir(&dirname[0]); 30367c478bd9Sstevel@tonic-gate 30377c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 3038da6c28aaSamw if (xattrp != NULL) { 3039da6c28aaSamw int rc; 30407c478bd9Sstevel@tonic-gate 3041da6c28aaSamw if (((cwd = save_cwd()) == -1) || 3042da6c28aaSamw ((rc = open_attr_dir(comp, dirp, cwd, 3043da6c28aaSamw attrinfo)) != ATTR_OK)) { 3044da6c28aaSamw if (cwd == -1) { 3045da6c28aaSamw vperror(0, gettext( 3046da6c28aaSamw "unable to save current working " 3047da6c28aaSamw "directory while processing " 3048da6c28aaSamw "attribute %s of %s"), 3049da6c28aaSamw dirp, attrinfo->attr_path); 3050da6c28aaSamw } else if (rc != ATTR_SKIP) { 3051d2443e76Smarks (void) fprintf(vfile, 3052d2443e76Smarks gettext("tar: cannot open " 3053da6c28aaSamw "%sattribute %s of file %s: %s\n"), 3054da6c28aaSamw attrinfo->attr_rw_sysattr ? gettext( 3055da6c28aaSamw "system ") : "", 3056da6c28aaSamw comp, dirp, strerror(errno)); 3057da6c28aaSamw } 3058d2443e76Smarks free(xattrhead); 3059d2443e76Smarks xattrp = NULL; 3060d2443e76Smarks xattr_linkp = NULL; 3061d2443e76Smarks xattrhead = NULL; 3062da6c28aaSamw 30637c478bd9Sstevel@tonic-gate passtape(); 30647c478bd9Sstevel@tonic-gate continue; 3065da6c28aaSamw } else { 3066da6c28aaSamw dirfd = attrinfo->attr_parentfd; 3067da6c28aaSamw rw_sysattr = attrinfo->attr_rw_sysattr; 30687c478bd9Sstevel@tonic-gate } 3069da6c28aaSamw } else { 3070da6c28aaSamw dirfd = open(dirp, O_RDONLY); 3071da6c28aaSamw } 3072da6c28aaSamw #else 3073da6c28aaSamw dirfd = open(dirp, O_RDONLY); 3074da6c28aaSamw #endif 3075da6c28aaSamw if (dirfd == -1) { 3076da6c28aaSamw (void) fprintf(vfile, gettext( 3077da6c28aaSamw "tar: cannot open %s: %s\n"), 3078da6c28aaSamw dirp, strerror(errno)); 3079da6c28aaSamw passtape(); 3080da6c28aaSamw continue; 30817c478bd9Sstevel@tonic-gate } 30827c478bd9Sstevel@tonic-gate 30837c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) 30847c478bd9Sstevel@tonic-gate (void) strcpy(templink, Xtarhdr.x_linkpath); 30857c478bd9Sstevel@tonic-gate else { 30867c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 30877c478bd9Sstevel@tonic-gate if (xattrp && dblock.dbuf.typeflag == '1') { 30887c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 30897c478bd9Sstevel@tonic-gate xattrp->h_names); 30907c478bd9Sstevel@tonic-gate } else { 30917c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 30927c478bd9Sstevel@tonic-gate dblock.dbuf.linkname); 30937c478bd9Sstevel@tonic-gate } 30947c478bd9Sstevel@tonic-gate #else 30957c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 30967c478bd9Sstevel@tonic-gate dblock.dbuf.linkname); 30977c478bd9Sstevel@tonic-gate #endif 30987c478bd9Sstevel@tonic-gate } 30997c478bd9Sstevel@tonic-gate 31007c478bd9Sstevel@tonic-gate if (Fflag) { 31013a1dab68SRich Burridge if (checkf(namep, is_directory(namep), Fflag) == 0) { 31027c478bd9Sstevel@tonic-gate passtape(); 31037c478bd9Sstevel@tonic-gate continue; 31047c478bd9Sstevel@tonic-gate } 31057c478bd9Sstevel@tonic-gate } 31067c478bd9Sstevel@tonic-gate 31077c478bd9Sstevel@tonic-gate if (checkw('x', namep) == 0) { 31087c478bd9Sstevel@tonic-gate passtape(); 31097c478bd9Sstevel@tonic-gate continue; 31107c478bd9Sstevel@tonic-gate } 31117c478bd9Sstevel@tonic-gate if (once) { 31127c478bd9Sstevel@tonic-gate if (strcmp(dblock.dbuf.magic, magic_type) == 0) { 31137c478bd9Sstevel@tonic-gate if (geteuid() == (uid_t)0) { 31147c478bd9Sstevel@tonic-gate checkflag = 1; 31157c478bd9Sstevel@tonic-gate pflag = 1; 31167c478bd9Sstevel@tonic-gate } else { 31177c478bd9Sstevel@tonic-gate /* get file creation mask */ 31187c478bd9Sstevel@tonic-gate Oumask = umask(0); 31197c478bd9Sstevel@tonic-gate (void) umask(Oumask); 31207c478bd9Sstevel@tonic-gate } 31217c478bd9Sstevel@tonic-gate once = 0; 31227c478bd9Sstevel@tonic-gate } else { 31237c478bd9Sstevel@tonic-gate if (geteuid() == (uid_t)0) { 31247c478bd9Sstevel@tonic-gate pflag = 1; 31257c478bd9Sstevel@tonic-gate checkflag = 2; 31267c478bd9Sstevel@tonic-gate } 31277c478bd9Sstevel@tonic-gate if (!pflag) { 31287c478bd9Sstevel@tonic-gate /* get file creation mask */ 31297c478bd9Sstevel@tonic-gate Oumask = umask(0); 31307c478bd9Sstevel@tonic-gate (void) umask(Oumask); 31317c478bd9Sstevel@tonic-gate } 31327c478bd9Sstevel@tonic-gate once = 0; 31337c478bd9Sstevel@tonic-gate } 31347c478bd9Sstevel@tonic-gate } 31357c478bd9Sstevel@tonic-gate 31367c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 31377c478bd9Sstevel@tonic-gate /* 31387c478bd9Sstevel@tonic-gate * Handle extraction of hidden attr dir. 31397c478bd9Sstevel@tonic-gate * Dir is automatically created, we only 31407c478bd9Sstevel@tonic-gate * need to update mode and perm's. 31417c478bd9Sstevel@tonic-gate */ 3142da6c28aaSamw if ((xattrp != NULL) && Hiddendir == 1) { 3143da6c28aaSamw bytes = stbuf.st_size; 3144da6c28aaSamw blocks = TBLOCKS(bytes); 3145da6c28aaSamw if (vflag) { 3146da6c28aaSamw (void) fprintf(vfile, 31478e4a71aeSRich Burridge "x %s%s%s, %" FMT_off_t " %s, ", namep, 3148da6c28aaSamw gettext(" attribute "), 31498e4a71aeSRich Burridge xattrapath, bytes, 31508e4a71aeSRich Burridge gettext("bytes")); 3151da6c28aaSamw if (NotTape) 3152da6c28aaSamw (void) fprintf(vfile, 3153da6c28aaSamw "%" FMT_blkcnt_t "K\n", K(blocks)); 3154da6c28aaSamw else 3155da6c28aaSamw (void) fprintf(vfile, gettext("%" 3156da6c28aaSamw FMT_blkcnt_t " tape blocks\n"), 3157da6c28aaSamw blocks); 3158da6c28aaSamw } 3159da6c28aaSamw 3160da6c28aaSamw /* 3161da6c28aaSamw * Set the permissions and mode of the attribute 3162da6c28aaSamw * unless the attribute is a system attribute (can't 3163da6c28aaSamw * successfully do this) or the hidden attribute 3164da6c28aaSamw * directory (".") of an attribute (when the attribute 3165da6c28aaSamw * is restored, the hidden attribute directory of an 3166da6c28aaSamw * attribute is transient). Note: when the permissions 3167da6c28aaSamw * and mode are set for the hidden attribute directory 3168da6c28aaSamw * of a file on a system supporting extended system 3169da6c28aaSamw * attributes, even though it returns successfully, it 3170da6c28aaSamw * will not have any affect since the attribute 3171da6c28aaSamw * directory is transient. 3172da6c28aaSamw */ 3173da6c28aaSamw if (attrinfo->attr_parent == NULL) { 31747c478bd9Sstevel@tonic-gate if (fchownat(dirfd, ".", stbuf.st_uid, 31757c478bd9Sstevel@tonic-gate stbuf.st_gid, 0) != 0) { 31767c478bd9Sstevel@tonic-gate vperror(0, gettext( 3177da6c28aaSamw "%s%s%s: failed to set ownership " 3178da6c28aaSamw "of attribute directory"), namep, 3179da6c28aaSamw gettext(" attribute "), xattrapath); 31807c478bd9Sstevel@tonic-gate } 31817c478bd9Sstevel@tonic-gate 31827c478bd9Sstevel@tonic-gate if (fchmod(dirfd, stbuf.st_mode) != 0) { 31837c478bd9Sstevel@tonic-gate vperror(0, gettext( 3184da6c28aaSamw "%s%s%s: failed to set permissions " 3185da6c28aaSamw "of attribute directory"), namep, 3186da6c28aaSamw gettext(" attribute "), xattrapath); 3187da6c28aaSamw } 31887c478bd9Sstevel@tonic-gate } 31897c478bd9Sstevel@tonic-gate goto filedone; 31907c478bd9Sstevel@tonic-gate } 31917c478bd9Sstevel@tonic-gate #endif 31927c478bd9Sstevel@tonic-gate 31937c478bd9Sstevel@tonic-gate if (dircreate && (!is_posix || dblock.dbuf.typeflag == '5')) { 31947c478bd9Sstevel@tonic-gate dir = 1; 31957c478bd9Sstevel@tonic-gate if (vflag) { 31968e4a71aeSRich Burridge (void) fprintf(vfile, "x %s, 0 %s, ", 31978e4a71aeSRich Burridge &dirname[0], gettext("bytes")); 31987c478bd9Sstevel@tonic-gate if (NotTape) 31997c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "0K\n"); 32007c478bd9Sstevel@tonic-gate else 32017c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 32027c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), 32037c478bd9Sstevel@tonic-gate (blkcnt_t)0); 32047c478bd9Sstevel@tonic-gate } 32057c478bd9Sstevel@tonic-gate goto filedone; 32067c478bd9Sstevel@tonic-gate } 32077c478bd9Sstevel@tonic-gate 32087c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '6') { /* FIFO */ 32097c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) { 32107c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 32117c478bd9Sstevel@tonic-gate (void) unlink(namep); 32127c478bd9Sstevel@tonic-gate } 32137c478bd9Sstevel@tonic-gate linkp = templink; 32147c478bd9Sstevel@tonic-gate if (*linkp != NULL) { 32157c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 32167c478bd9Sstevel@tonic-gate linkp++; 32177c478bd9Sstevel@tonic-gate if (link(linkp, namep) < 0) { 32187c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 32197c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep); 32207c478bd9Sstevel@tonic-gate continue; 32217c478bd9Sstevel@tonic-gate } 32227c478bd9Sstevel@tonic-gate if (vflag) 32237c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3224da6c28aaSamw "x %s linked to %s\n"), namep, 3225da6c28aaSamw linkp); 32267c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 32277c478bd9Sstevel@tonic-gate continue; 32287c478bd9Sstevel@tonic-gate } 32297c478bd9Sstevel@tonic-gate if (mknod(namep, (int)(Gen.g_mode|S_IFIFO), 32307c478bd9Sstevel@tonic-gate (int)Gen.g_devmajor) < 0) { 32317c478bd9Sstevel@tonic-gate vperror(0, gettext("%s: mknod failed"), namep); 32327c478bd9Sstevel@tonic-gate continue; 32337c478bd9Sstevel@tonic-gate } 32347c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 32357c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 32367c478bd9Sstevel@tonic-gate if (vflag) { 32377c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "x %s, %" FMT_off_t 32388e4a71aeSRich Burridge " %s, ", namep, bytes, gettext("bytes")); 32397c478bd9Sstevel@tonic-gate if (NotTape) 32407c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t 32417c478bd9Sstevel@tonic-gate "K\n", K(blocks)); 32427c478bd9Sstevel@tonic-gate else 32437c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 32447c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), 32457c478bd9Sstevel@tonic-gate blocks); 32467c478bd9Sstevel@tonic-gate } 32477c478bd9Sstevel@tonic-gate goto filedone; 32487c478bd9Sstevel@tonic-gate } 32497c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '3' && !Uid) { /* CHAR SPECIAL */ 32507c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) { 32517c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 32527c478bd9Sstevel@tonic-gate (void) unlink(namep); 32537c478bd9Sstevel@tonic-gate } 32547c478bd9Sstevel@tonic-gate linkp = templink; 32557c478bd9Sstevel@tonic-gate if (*linkp != NULL) { 32567c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 32577c478bd9Sstevel@tonic-gate linkp++; 32587c478bd9Sstevel@tonic-gate if (link(linkp, namep) < 0) { 32597c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 32607c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep); 32617c478bd9Sstevel@tonic-gate continue; 32627c478bd9Sstevel@tonic-gate } 32637c478bd9Sstevel@tonic-gate if (vflag) 32647c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3265da6c28aaSamw "x %s linked to %s\n"), namep, 3266da6c28aaSamw linkp); 32677c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 32687c478bd9Sstevel@tonic-gate continue; 32697c478bd9Sstevel@tonic-gate } 32707c478bd9Sstevel@tonic-gate if (mknod(namep, (int)(Gen.g_mode|S_IFCHR), 32717c478bd9Sstevel@tonic-gate (int)makedev(Gen.g_devmajor, Gen.g_devminor)) < 0) { 32727c478bd9Sstevel@tonic-gate vperror(0, gettext( 32737c478bd9Sstevel@tonic-gate "%s: mknod failed"), namep); 32747c478bd9Sstevel@tonic-gate continue; 32757c478bd9Sstevel@tonic-gate } 32767c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 32777c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 32787c478bd9Sstevel@tonic-gate if (vflag) { 32797c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "x %s, %" FMT_off_t 32808e4a71aeSRich Burridge " %s, ", namep, bytes, gettext("bytes")); 32817c478bd9Sstevel@tonic-gate if (NotTape) 32827c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t 32837c478bd9Sstevel@tonic-gate "K\n", K(blocks)); 32847c478bd9Sstevel@tonic-gate else 32857c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 32867c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), 32877c478bd9Sstevel@tonic-gate blocks); 32887c478bd9Sstevel@tonic-gate } 32897c478bd9Sstevel@tonic-gate goto filedone; 32907c478bd9Sstevel@tonic-gate } else if (dblock.dbuf.typeflag == '3' && Uid) { 32917c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 32927c478bd9Sstevel@tonic-gate "Can't create special %s\n"), namep); 32937c478bd9Sstevel@tonic-gate continue; 32947c478bd9Sstevel@tonic-gate } 32957c478bd9Sstevel@tonic-gate 32967c478bd9Sstevel@tonic-gate /* BLOCK SPECIAL */ 32977c478bd9Sstevel@tonic-gate 32987c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '4' && !Uid) { 32997c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) { 33007c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 33017c478bd9Sstevel@tonic-gate (void) unlink(namep); 33027c478bd9Sstevel@tonic-gate } 33037c478bd9Sstevel@tonic-gate linkp = templink; 33047c478bd9Sstevel@tonic-gate if (*linkp != NULL) { 33057c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 33067c478bd9Sstevel@tonic-gate linkp++; 33077c478bd9Sstevel@tonic-gate if (link(linkp, namep) < 0) { 33087c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 33097c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep); 33107c478bd9Sstevel@tonic-gate continue; 33117c478bd9Sstevel@tonic-gate } 33127c478bd9Sstevel@tonic-gate if (vflag) 33137c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3314da6c28aaSamw "x %s linked to %s\n"), namep, 3315da6c28aaSamw linkp); 33167c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 33177c478bd9Sstevel@tonic-gate continue; 33187c478bd9Sstevel@tonic-gate } 33197c478bd9Sstevel@tonic-gate if (mknod(namep, (int)(Gen.g_mode|S_IFBLK), 33207c478bd9Sstevel@tonic-gate (int)makedev(Gen.g_devmajor, Gen.g_devminor)) < 0) { 33217c478bd9Sstevel@tonic-gate vperror(0, gettext("%s: mknod failed"), namep); 33227c478bd9Sstevel@tonic-gate continue; 33237c478bd9Sstevel@tonic-gate } 33247c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 33257c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 33267c478bd9Sstevel@tonic-gate if (vflag) { 33277c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("x %s, %" 33287c478bd9Sstevel@tonic-gate FMT_off_t " bytes, "), namep, bytes); 33297c478bd9Sstevel@tonic-gate if (NotTape) 33307c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t 33317c478bd9Sstevel@tonic-gate "K\n", K(blocks)); 33327c478bd9Sstevel@tonic-gate else 33337c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 33347c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), 33357c478bd9Sstevel@tonic-gate blocks); 33367c478bd9Sstevel@tonic-gate } 33377c478bd9Sstevel@tonic-gate goto filedone; 33387c478bd9Sstevel@tonic-gate } else if (dblock.dbuf.typeflag == '4' && Uid) { 33397c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 33407c478bd9Sstevel@tonic-gate gettext("Can't create special %s\n"), namep); 33417c478bd9Sstevel@tonic-gate continue; 33427c478bd9Sstevel@tonic-gate } 33437c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '2') { /* symlink */ 334445916cd2Sjpk if ((Tflag) && (lk_rpath_flag == 1)) 334545916cd2Sjpk linkp = lk_real_path; 334645916cd2Sjpk else 33477c478bd9Sstevel@tonic-gate linkp = templink; 33487c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 33497c478bd9Sstevel@tonic-gate linkp++; 33507c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) { 33517c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 33527c478bd9Sstevel@tonic-gate (void) unlink(namep); 33537c478bd9Sstevel@tonic-gate } 33547c478bd9Sstevel@tonic-gate if (symlink(linkp, namep) < 0) { 33557c478bd9Sstevel@tonic-gate vperror(0, gettext("%s: symbolic link failed"), 33567c478bd9Sstevel@tonic-gate namep); 33577c478bd9Sstevel@tonic-gate continue; 33587c478bd9Sstevel@tonic-gate } 33597c478bd9Sstevel@tonic-gate if (vflag) 33607c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 33617c478bd9Sstevel@tonic-gate "x %s symbolic link to %s\n"), 33627c478bd9Sstevel@tonic-gate namep, linkp); 33637c478bd9Sstevel@tonic-gate 33647c478bd9Sstevel@tonic-gate symflag = AT_SYMLINK_NOFOLLOW; 33657c478bd9Sstevel@tonic-gate goto filedone; 33667c478bd9Sstevel@tonic-gate } 33677c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '1') { 33687c478bd9Sstevel@tonic-gate linkp = templink; 33697c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 33707c478bd9Sstevel@tonic-gate linkp++; 33717c478bd9Sstevel@tonic-gate if (unlinkat(dirfd, comp, AT_REMOVEDIR) < 0) { 33727c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 33737c478bd9Sstevel@tonic-gate (void) unlinkat(dirfd, comp, 0); 33747c478bd9Sstevel@tonic-gate } 33757c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 33767c478bd9Sstevel@tonic-gate if (xattrp && xattr_linkp) { 33777c478bd9Sstevel@tonic-gate if (fchdir(dirfd) < 0) { 33787c478bd9Sstevel@tonic-gate vperror(0, gettext( 33797c478bd9Sstevel@tonic-gate "Cannot fchdir to attribute " 3380da6c28aaSamw "directory %s"), 3381da6c28aaSamw (attrinfo->attr_parent == NULL) ? 3382da6c28aaSamw dirp : attrinfo->attr_parent); 33837c478bd9Sstevel@tonic-gate exit(1); 33847c478bd9Sstevel@tonic-gate } 33857c478bd9Sstevel@tonic-gate 3386da6c28aaSamw error = link(xattr_linkaname, xattrapath); 33877c478bd9Sstevel@tonic-gate } else { 33887c478bd9Sstevel@tonic-gate error = link(linkp, namep); 33897c478bd9Sstevel@tonic-gate } 33907c478bd9Sstevel@tonic-gate #else 33917c478bd9Sstevel@tonic-gate error = link(linkp, namep); 33927c478bd9Sstevel@tonic-gate #endif 33937c478bd9Sstevel@tonic-gate 33947c478bd9Sstevel@tonic-gate if (error < 0) { 33957c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 33967c478bd9Sstevel@tonic-gate "tar: %s%s%s: cannot link\n"), 33977c478bd9Sstevel@tonic-gate namep, (xattr_linkp != NULL) ? 33987c478bd9Sstevel@tonic-gate gettext(" attribute ") : "", 33997c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ? 3400da6c28aaSamw xattrapath : ""); 34017c478bd9Sstevel@tonic-gate continue; 34027c478bd9Sstevel@tonic-gate } 34037c478bd9Sstevel@tonic-gate if (vflag) 34047c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3405da6c28aaSamw "x %s%s%s linked to %s%s%s\n"), namep, 34067c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ? 34077c478bd9Sstevel@tonic-gate gettext(" attribute ") : "", 34087c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ? 34097c478bd9Sstevel@tonic-gate xattr_linkaname : "", 3410da6c28aaSamw linkp, 34117c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ? 3412da6c28aaSamw gettext(" attribute ") : "", 3413da6c28aaSamw (xattr_linkp != NULL) ? xattrapath : ""); 34147c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 34157c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 3416da6c28aaSamw if (xattrp != NULL) { 34177c478bd9Sstevel@tonic-gate free(xattrhead); 34187c478bd9Sstevel@tonic-gate xattrp = NULL; 34197c478bd9Sstevel@tonic-gate xattr_linkp = NULL; 34207c478bd9Sstevel@tonic-gate xattrhead = NULL; 34217c478bd9Sstevel@tonic-gate } 34227c478bd9Sstevel@tonic-gate #endif 34237c478bd9Sstevel@tonic-gate continue; 34247c478bd9Sstevel@tonic-gate } 34257c478bd9Sstevel@tonic-gate 34267c478bd9Sstevel@tonic-gate /* REGULAR FILES */ 34277c478bd9Sstevel@tonic-gate 34287c478bd9Sstevel@tonic-gate if (convtoreg(stbuf.st_size)) { 34297c478bd9Sstevel@tonic-gate convflag = 1; 34307c478bd9Sstevel@tonic-gate if (errflag) { 34317c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 34327c478bd9Sstevel@tonic-gate "tar: %s: typeflag '%c' not recognized\n"), 34337c478bd9Sstevel@tonic-gate namep, dblock.dbuf.typeflag); 34347c478bd9Sstevel@tonic-gate done(1); 34357c478bd9Sstevel@tonic-gate } else { 34367c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 34377c478bd9Sstevel@tonic-gate "tar: %s: typeflag '%c' not recognized, " 34387c478bd9Sstevel@tonic-gate "converting to regular file\n"), namep, 34397c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag); 34407c478bd9Sstevel@tonic-gate Errflg = 1; 34417c478bd9Sstevel@tonic-gate } 34427c478bd9Sstevel@tonic-gate } 34437c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '0' || 34447c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == NULL || convflag) { 34452c0f0499Slovely delete_target(dirfd, comp, namep); 34467c478bd9Sstevel@tonic-gate linkp = templink; 34477c478bd9Sstevel@tonic-gate if (*linkp != NULL) { 34487c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 34497c478bd9Sstevel@tonic-gate linkp++; 34507c478bd9Sstevel@tonic-gate if (link(linkp, comp) < 0) { 34517c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 34527c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep); 34537c478bd9Sstevel@tonic-gate continue; 34547c478bd9Sstevel@tonic-gate } 34557c478bd9Sstevel@tonic-gate if (vflag) 34567c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3457da6c28aaSamw "x %s linked to %s\n"), comp, 3458da6c28aaSamw linkp); 34597c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 3460da6c28aaSamw #if defined(O_XATTR) 3461da6c28aaSamw if (xattrp != NULL) { 3462da6c28aaSamw free(xattrhead); 3463da6c28aaSamw xattrp = NULL; 3464da6c28aaSamw xattr_linkp = NULL; 3465da6c28aaSamw xattrhead = NULL; 3466da6c28aaSamw } 3467da6c28aaSamw #endif 34687c478bd9Sstevel@tonic-gate continue; 34697c478bd9Sstevel@tonic-gate } 34707c478bd9Sstevel@tonic-gate newfile = ((fstatat(dirfd, comp, 34717c478bd9Sstevel@tonic-gate &xtractbuf, 0) == -1) ? TRUE : FALSE); 3472da6c28aaSamw ofile = openat(dirfd, comp, O_RDWR|O_CREAT|O_TRUNC, 3473da6c28aaSamw stbuf.st_mode & MODEMASK); 3474da6c28aaSamw saveerrno = errno; 3475da6c28aaSamw 3476da6c28aaSamw #if defined(O_XATTR) 3477da6c28aaSamw if (xattrp != NULL) { 3478da6c28aaSamw if (ofile < 0) { 3479da6c28aaSamw ofile = retry_open_attr(dirfd, cwd, 3480da6c28aaSamw dirp, attrinfo->attr_parent, comp, 3481da6c28aaSamw O_RDWR|O_CREAT|O_TRUNC, 3482da6c28aaSamw stbuf.st_mode & MODEMASK); 3483da6c28aaSamw } 3484da6c28aaSamw } 3485da6c28aaSamw #endif 3486da6c28aaSamw if (ofile < 0) { 3487da6c28aaSamw errno = saveerrno; 34887c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3489da6c28aaSamw "tar: %s%s%s%s - cannot create\n"), 3490da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 34918e4a71aeSRich Burridge gettext("system attribute ") : 3492da6c28aaSamw gettext("attribute ")), 3493da6c28aaSamw (xattrp == NULL) ? "" : xattrapath, 3494da6c28aaSamw (xattrp == NULL) ? "" : gettext(" of "), 3495da6c28aaSamw (xattrp == NULL) ? comp : namep); 34967c478bd9Sstevel@tonic-gate if (errflag) 34977c478bd9Sstevel@tonic-gate done(1); 34987c478bd9Sstevel@tonic-gate else 34997c478bd9Sstevel@tonic-gate Errflg = 1; 3500da6c28aaSamw #if defined(O_XATTR) 3501da6c28aaSamw if (xattrp != NULL) { 3502da6c28aaSamw dblock.dbuf.typeflag = _XATTR_HDRTYPE; 3503da6c28aaSamw free(xattrhead); 3504da6c28aaSamw xattrp = NULL; 3505da6c28aaSamw xattr_linkp = NULL; 3506da6c28aaSamw xattrhead = NULL; 3507da6c28aaSamw } 3508da6c28aaSamw #endif 35097c478bd9Sstevel@tonic-gate passtape(); 35107c478bd9Sstevel@tonic-gate continue; 35117c478bd9Sstevel@tonic-gate } 35127c478bd9Sstevel@tonic-gate 351345916cd2Sjpk if (Tflag && (check_ext_attr(namep) == 0)) { 351445916cd2Sjpk if (errflag) 351545916cd2Sjpk done(1); 351645916cd2Sjpk else 351745916cd2Sjpk Errflg = 1; 351845916cd2Sjpk passtape(); 351945916cd2Sjpk continue; 352045916cd2Sjpk } 352145916cd2Sjpk 35227c478bd9Sstevel@tonic-gate if (extno != 0) { /* file is in pieces */ 35237c478bd9Sstevel@tonic-gate if (extotal < 1 || extotal > MAXEXT) 35247c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3525da6c28aaSamw "tar: ignoring bad extent info for " 3526da6c28aaSamw "%s%s%s%s\n"), 3527da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 3528da6c28aaSamw gettext("system attribute ") : 3529da6c28aaSamw gettext("attribute ")), 3530da6c28aaSamw (xattrp == NULL) ? "" : xattrapath, 3531da6c28aaSamw (xattrp == NULL) ? "" : gettext(" of "), 3532da6c28aaSamw (xattrp == NULL) ? comp : namep); 35337c478bd9Sstevel@tonic-gate else { 3534da6c28aaSamw /* extract it */ 3535da6c28aaSamw (void) xsfile(rw_sysattr, ofile); 35367c478bd9Sstevel@tonic-gate } 35377c478bd9Sstevel@tonic-gate } 35387c478bd9Sstevel@tonic-gate extno = 0; /* let everyone know file is not split */ 35397c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 35407c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 35417c478bd9Sstevel@tonic-gate if (vflag) { 35427c478bd9Sstevel@tonic-gate (void) fprintf(vfile, 35438e4a71aeSRich Burridge "x %s%s%s, %" FMT_off_t " %s, ", 35447c478bd9Sstevel@tonic-gate (xattrp == NULL) ? "" : dirp, 3545da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 3546da6c28aaSamw gettext(" system attribute ") : 3547da6c28aaSamw gettext(" attribute ")), 35488e4a71aeSRich Burridge (xattrp == NULL) ? namep : xattrapath, bytes, 35498e4a71aeSRich Burridge gettext("bytes")); 35507c478bd9Sstevel@tonic-gate if (NotTape) 35517c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n", 35527c478bd9Sstevel@tonic-gate K(blocks)); 35537c478bd9Sstevel@tonic-gate else 35547c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 35557c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), blocks); 35567c478bd9Sstevel@tonic-gate } 35577c478bd9Sstevel@tonic-gate 3558da6c28aaSamw if (xblocks(rw_sysattr, bytes, ofile) != 0) { 3559da6c28aaSamw #if defined(O_XATTR) 3560da6c28aaSamw if (xattrp != NULL) { 3561da6c28aaSamw free(xattrhead); 3562da6c28aaSamw xattrp = NULL; 3563da6c28aaSamw xattr_linkp = NULL; 3564da6c28aaSamw xattrhead = NULL; 3565da6c28aaSamw } 3566da6c28aaSamw #endif 3567da6c28aaSamw continue; 3568da6c28aaSamw } 35697c478bd9Sstevel@tonic-gate filedone: 35707c478bd9Sstevel@tonic-gate if (mflag == 0 && !symflag) { 35717c478bd9Sstevel@tonic-gate if (dir) 35727c478bd9Sstevel@tonic-gate doDirTimes(namep, stbuf.st_mtim); 3573da6c28aaSamw 35747c478bd9Sstevel@tonic-gate else 3575da6c28aaSamw #if defined(O_XATTR) 3576da6c28aaSamw if (xattrp != NULL) { 3577da6c28aaSamw /* 3578da6c28aaSamw * Set the time on the attribute unless 3579da6c28aaSamw * the attribute is a system attribute 3580da6c28aaSamw * (can't successfully do this) or the 3581da6c28aaSamw * hidden attribute directory, "." (the 3582da6c28aaSamw * time on the hidden attribute 3583da6c28aaSamw * directory will be updated when 3584da6c28aaSamw * attributes are restored, otherwise 3585da6c28aaSamw * it's transient). 3586da6c28aaSamw */ 3587da6c28aaSamw if (!rw_sysattr && (Hiddendir == 0)) { 3588da6c28aaSamw setPathTimes(dirfd, comp, 3589da6c28aaSamw stbuf.st_mtim); 3590da6c28aaSamw } 3591da6c28aaSamw } else 3592da6c28aaSamw setPathTimes(dirfd, comp, 3593da6c28aaSamw stbuf.st_mtim); 3594da6c28aaSamw #else 35957c478bd9Sstevel@tonic-gate setPathTimes(dirfd, comp, stbuf.st_mtim); 3596da6c28aaSamw #endif 35977c478bd9Sstevel@tonic-gate } 35987c478bd9Sstevel@tonic-gate 35997c478bd9Sstevel@tonic-gate /* moved this code from above */ 36007c478bd9Sstevel@tonic-gate if (pflag && !symflag && Hiddendir == 0) { 3601da6c28aaSamw if (xattrp != NULL) 36027c478bd9Sstevel@tonic-gate (void) fchmod(ofile, stbuf.st_mode & MODEMASK); 36037c478bd9Sstevel@tonic-gate else 36047c478bd9Sstevel@tonic-gate (void) chmod(namep, stbuf.st_mode & MODEMASK); 36057c478bd9Sstevel@tonic-gate } 36067c478bd9Sstevel@tonic-gate 36077c478bd9Sstevel@tonic-gate 36087c478bd9Sstevel@tonic-gate /* 36097c478bd9Sstevel@tonic-gate * Because ancillary file preceeds the normal file, 36107c478bd9Sstevel@tonic-gate * acl info may have been retrieved (in aclp). 36117c478bd9Sstevel@tonic-gate * All file types are directed here (go filedone). 36127c478bd9Sstevel@tonic-gate * Always restore ACLs if there are ACLs. 36137c478bd9Sstevel@tonic-gate */ 36147c478bd9Sstevel@tonic-gate if (aclp != NULL) { 36157c478bd9Sstevel@tonic-gate int ret; 36167c478bd9Sstevel@tonic-gate 36177c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 3618da6c28aaSamw if (xattrp != NULL) { 36197c478bd9Sstevel@tonic-gate if (Hiddendir) 3620fa9e4066Sahrens ret = facl_set(dirfd, aclp); 36217c478bd9Sstevel@tonic-gate else 3622fa9e4066Sahrens ret = facl_set(ofile, aclp); 36237c478bd9Sstevel@tonic-gate } else { 3624fa9e4066Sahrens ret = acl_set(namep, aclp); 36257c478bd9Sstevel@tonic-gate } 36267c478bd9Sstevel@tonic-gate #else 362745916cd2Sjpk ret = acl_set(namep, aclp); 36287c478bd9Sstevel@tonic-gate #endif 36297c478bd9Sstevel@tonic-gate if (ret < 0) { 36307c478bd9Sstevel@tonic-gate if (pflag) { 36317c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3632da6c28aaSamw "%s%s%s%s: failed to set acl " 3633da6c28aaSamw "entries\n"), namep, 3634da6c28aaSamw (xattrp == NULL) ? "" : 3635da6c28aaSamw (rw_sysattr ? gettext( 3636da6c28aaSamw " system attribute ") : 3637da6c28aaSamw gettext(" attribute ")), 3638da6c28aaSamw (xattrp == NULL) ? "" : 3639da6c28aaSamw xattrapath); 36407c478bd9Sstevel@tonic-gate } 36417c478bd9Sstevel@tonic-gate /* else: silent and continue */ 36427c478bd9Sstevel@tonic-gate } 3643fa9e4066Sahrens acl_free(aclp); 36447c478bd9Sstevel@tonic-gate aclp = NULL; 36457c478bd9Sstevel@tonic-gate } 36467c478bd9Sstevel@tonic-gate 36477c478bd9Sstevel@tonic-gate if (!oflag) 3648cc22b130SRich Burridge /* set file ownership */ 3649cc22b130SRich Burridge resugname(dirfd, comp, symflag); 36507c478bd9Sstevel@tonic-gate 36517c478bd9Sstevel@tonic-gate if (pflag && newfile == TRUE && !dir && 36527c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag == '0' || 36537c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == NULL || 36547c478bd9Sstevel@tonic-gate convflag || dblock.dbuf.typeflag == '1')) { 36557c478bd9Sstevel@tonic-gate if (fstat(ofile, &xtractbuf) == -1) 36567c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3657da6c28aaSamw "tar: cannot stat extracted file " 3658da6c28aaSamw "%s%s%s%s\n"), 3659da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 3660da6c28aaSamw gettext("system attribute ") : 3661da6c28aaSamw gettext("attribute ")), 3662da6c28aaSamw (xattrp == NULL) ? "" : xattrapath, 3663da6c28aaSamw (xattrp == NULL) ? "" : 3664da6c28aaSamw gettext(" of "), namep); 3665da6c28aaSamw 36667c478bd9Sstevel@tonic-gate else if ((xtractbuf.st_mode & (MODEMASK & ~S_IFMT)) 36677c478bd9Sstevel@tonic-gate != (stbuf.st_mode & (MODEMASK & ~S_IFMT))) { 36687c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 36697c478bd9Sstevel@tonic-gate "tar: warning - file permissions have " 3670da6c28aaSamw "changed for %s%s%s%s (are 0%o, should be " 36717c478bd9Sstevel@tonic-gate "0%o)\n"), 3672da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 3673da6c28aaSamw gettext("system attribute ") : 3674da6c28aaSamw gettext("attribute ")), 3675da6c28aaSamw (xattrp == NULL) ? "" : xattrapath, 3676da6c28aaSamw (xattrp == NULL) ? "" : 3677da6c28aaSamw gettext(" of "), namep, 3678da6c28aaSamw xtractbuf.st_mode, stbuf.st_mode); 3679da6c28aaSamw 36807c478bd9Sstevel@tonic-gate } 36817c478bd9Sstevel@tonic-gate } 3682ced83f9bSceastha #if defined(O_XATTR) 3683ced83f9bSceastha if (xattrp != NULL) { 3684ced83f9bSceastha free(xattrhead); 3685ced83f9bSceastha xattrp = NULL; 3686ced83f9bSceastha xattr_linkp = NULL; 3687ced83f9bSceastha xattrhead = NULL; 3688ced83f9bSceastha } 3689ced83f9bSceastha #endif 3690ced83f9bSceastha 36917c478bd9Sstevel@tonic-gate if (ofile != -1) { 36927c478bd9Sstevel@tonic-gate (void) close(dirfd); 36937c478bd9Sstevel@tonic-gate dirfd = -1; 36947c478bd9Sstevel@tonic-gate if (close(ofile) != 0) 36957c478bd9Sstevel@tonic-gate vperror(2, gettext("close error")); 3696da6c28aaSamw ofile = -1; 36977c478bd9Sstevel@tonic-gate } 36987c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 36997c478bd9Sstevel@tonic-gate } 370045916cd2Sjpk 370145916cd2Sjpk /* 370245916cd2Sjpk * Process ancillary file. 370345916cd2Sjpk * 370445916cd2Sjpk */ 370545916cd2Sjpk 37067c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == 'A') { /* acl info */ 37077c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 37087c478bd9Sstevel@tonic-gate char *secp; 37097c478bd9Sstevel@tonic-gate char *tp; 37107c478bd9Sstevel@tonic-gate int attrsize; 37117c478bd9Sstevel@tonic-gate int cnt; 37127c478bd9Sstevel@tonic-gate 371345916cd2Sjpk /* reset Trusted Extensions flags */ 371445916cd2Sjpk dir_flag = 0; 371545916cd2Sjpk mld_flag = 0; 371645916cd2Sjpk lk_rpath_flag = 0; 371745916cd2Sjpk rpath_flag = 0; 37187c478bd9Sstevel@tonic-gate 37197c478bd9Sstevel@tonic-gate if (pflag) { 37207c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 37217c478bd9Sstevel@tonic-gate if ((secp = malloc((int)bytes)) == NULL) { 37227c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 37237c478bd9Sstevel@tonic-gate "Insufficient memory for acl\n")); 37247c478bd9Sstevel@tonic-gate passtape(); 37257c478bd9Sstevel@tonic-gate continue; 37267c478bd9Sstevel@tonic-gate } 37277c478bd9Sstevel@tonic-gate tp = secp; 37287c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 372945916cd2Sjpk 373045916cd2Sjpk /* 373145916cd2Sjpk * Display a line for each ancillary file. 373245916cd2Sjpk */ 373345916cd2Sjpk if (vflag && Tflag) 373445916cd2Sjpk (void) fprintf(vfile, "x %s(A), %" 37358e4a71aeSRich Burridge FMT_blkcnt_t " %s, %" 37368e4a71aeSRich Burridge FMT_blkcnt_t " %s\n", 37378e4a71aeSRich Burridge namep, bytes, gettext("bytes"), 37388e4a71aeSRich Burridge blocks, gettext("tape blocks")); 373945916cd2Sjpk 37407c478bd9Sstevel@tonic-gate while (blocks-- > 0) { 37417c478bd9Sstevel@tonic-gate readtape(buf); 37427c478bd9Sstevel@tonic-gate if (bytes <= TBLOCK) { 37437c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, 37447c478bd9Sstevel@tonic-gate (size_t)bytes); 37457c478bd9Sstevel@tonic-gate break; 37467c478bd9Sstevel@tonic-gate } else { 37477c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, 37487c478bd9Sstevel@tonic-gate TBLOCK); 37497c478bd9Sstevel@tonic-gate tp += TBLOCK; 37507c478bd9Sstevel@tonic-gate } 37517c478bd9Sstevel@tonic-gate bytes -= TBLOCK; 37527c478bd9Sstevel@tonic-gate } 3753fa9e4066Sahrens bytes = stbuf.st_size; 37547c478bd9Sstevel@tonic-gate /* got all attributes in secp */ 37557c478bd9Sstevel@tonic-gate tp = secp; 37567c478bd9Sstevel@tonic-gate do { 37577c478bd9Sstevel@tonic-gate attr = (struct sec_attr *)tp; 37587c478bd9Sstevel@tonic-gate switch (attr->attr_type) { 37597c478bd9Sstevel@tonic-gate case UFSD_ACL: 3760fa9e4066Sahrens case ACE_ACL: 37617c478bd9Sstevel@tonic-gate (void) sscanf(attr->attr_len, 3762fa9e4066Sahrens "%7o", 3763fa9e4066Sahrens (uint_t *) 3764fa9e4066Sahrens &cnt); 37657c478bd9Sstevel@tonic-gate /* header is 8 */ 37667c478bd9Sstevel@tonic-gate attrsize = 8 + (int)strlen( 37677c478bd9Sstevel@tonic-gate &attr->attr_info[0]) + 1; 3768fa9e4066Sahrens error = 3769fa9e4066Sahrens acl_fromtext( 3770fa9e4066Sahrens &attr->attr_info[0], &aclp); 3771fa9e4066Sahrens 3772fa9e4066Sahrens if (error != 0) { 37737c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 37747c478bd9Sstevel@tonic-gate gettext( 37757c478bd9Sstevel@tonic-gate "aclfromtext " 3776fa9e4066Sahrens "failed: %s\n"), 3777fa9e4066Sahrens acl_strerror( 3778fa9e4066Sahrens error)); 3779fa9e4066Sahrens bytes -= attrsize; 37807c478bd9Sstevel@tonic-gate break; 37817c478bd9Sstevel@tonic-gate } 3782fa9e4066Sahrens if (acl_cnt(aclp) != cnt) { 37837c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 37847c478bd9Sstevel@tonic-gate gettext( 37857c478bd9Sstevel@tonic-gate "aclcnt error\n")); 3786fa9e4066Sahrens bytes -= attrsize; 37877c478bd9Sstevel@tonic-gate break; 37887c478bd9Sstevel@tonic-gate } 37897c478bd9Sstevel@tonic-gate bytes -= attrsize; 37907c478bd9Sstevel@tonic-gate break; 37917c478bd9Sstevel@tonic-gate 379245916cd2Sjpk /* Trusted Extensions */ 379345916cd2Sjpk 379445916cd2Sjpk case DIR_TYPE: 379545916cd2Sjpk case LBL_TYPE: 379645916cd2Sjpk case APRIV_TYPE: 379745916cd2Sjpk case FPRIV_TYPE: 379845916cd2Sjpk case COMP_TYPE: 379945916cd2Sjpk case LK_COMP_TYPE: 380045916cd2Sjpk case ATTR_FLAG_TYPE: 380145916cd2Sjpk attrsize = 380245916cd2Sjpk sizeof (struct sec_attr) + 380345916cd2Sjpk strlen(&attr->attr_info[0]); 380445916cd2Sjpk bytes -= attrsize; 380545916cd2Sjpk if (Tflag) 380645916cd2Sjpk extract_attr(&namep, 380745916cd2Sjpk attr); 380845916cd2Sjpk break; 38097c478bd9Sstevel@tonic-gate 38107c478bd9Sstevel@tonic-gate default: 38117c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 38127c478bd9Sstevel@tonic-gate "unrecognized attr" 38137c478bd9Sstevel@tonic-gate " type\n")); 38147c478bd9Sstevel@tonic-gate bytes = (off_t)0; 38157c478bd9Sstevel@tonic-gate break; 38167c478bd9Sstevel@tonic-gate } 38177c478bd9Sstevel@tonic-gate 38187c478bd9Sstevel@tonic-gate /* next attributes */ 38197c478bd9Sstevel@tonic-gate tp += attrsize; 38207c478bd9Sstevel@tonic-gate } while (bytes != 0); 38217c478bd9Sstevel@tonic-gate free(secp); 3822da6c28aaSamw } else { 38237c478bd9Sstevel@tonic-gate passtape(); 3824da6c28aaSamw } 38257c478bd9Sstevel@tonic-gate } /* acl */ 38267c478bd9Sstevel@tonic-gate 38277c478bd9Sstevel@tonic-gate } /* for */ 38287c478bd9Sstevel@tonic-gate 38297c478bd9Sstevel@tonic-gate /* 38307c478bd9Sstevel@tonic-gate * Ensure that all the directories still on the directory stack 38317c478bd9Sstevel@tonic-gate * get their modification times set correctly by flushing the 38327c478bd9Sstevel@tonic-gate * stack. 38337c478bd9Sstevel@tonic-gate */ 38347c478bd9Sstevel@tonic-gate 38357c478bd9Sstevel@tonic-gate doDirTimes(NULL, time_zero); 38367c478bd9Sstevel@tonic-gate 3837da6c28aaSamw #if defined(O_XATTR) 3838da6c28aaSamw if (xattrp != NULL) { 3839da6c28aaSamw free(xattrhead); 3840da6c28aaSamw xattrp = NULL; 3841da6c28aaSamw xattr_linkp = NULL; 3842da6c28aaSamw xattrhead = NULL; 3843da6c28aaSamw } 3844da6c28aaSamw #endif 3845da6c28aaSamw 38467c478bd9Sstevel@tonic-gate /* 38477c478bd9Sstevel@tonic-gate * Check if the number of files extracted is different from the 38487c478bd9Sstevel@tonic-gate * number of files listed on the command line 38497c478bd9Sstevel@tonic-gate */ 38507c478bd9Sstevel@tonic-gate if (fcnt > xcnt) { 38517c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 38527c478bd9Sstevel@tonic-gate gettext("tar: %d file(s) not extracted\n"), 38537c478bd9Sstevel@tonic-gate fcnt-xcnt); 38547c478bd9Sstevel@tonic-gate Errflg = 1; 38557c478bd9Sstevel@tonic-gate } 38567c478bd9Sstevel@tonic-gate } 38577c478bd9Sstevel@tonic-gate 38587c478bd9Sstevel@tonic-gate /* 38597c478bd9Sstevel@tonic-gate * xblocks extract file/extent from tape to output file 38607c478bd9Sstevel@tonic-gate * 3861ced83f9bSceastha * xblocks(issysattr, bytes, ofile); 3862ced83f9bSceastha * 3863ced83f9bSceastha * issysattr flag set if the files being extracted 3864ced83f9bSceastha * is an extended system attribute file. 3865ced83f9bSceastha * unsigned long long bytes size of extent or file to be extracted 3866ced83f9bSceastha * ofile output file 38677c478bd9Sstevel@tonic-gate * 38687c478bd9Sstevel@tonic-gate * called by doxtract() and xsfile() 38697c478bd9Sstevel@tonic-gate */ 38707c478bd9Sstevel@tonic-gate 3871da6c28aaSamw static int 3872da6c28aaSamw xblocks(int issysattr, off_t bytes, int ofile) 38737c478bd9Sstevel@tonic-gate { 3874ced83f9bSceastha char *buf; 38757c478bd9Sstevel@tonic-gate char tempname[NAMSIZ+1]; 3876ced83f9bSceastha size_t maxwrite; 3877ced83f9bSceastha size_t bytesread; 3878ced83f9bSceastha size_t piosize; /* preferred I/O size */ 3879ced83f9bSceastha struct stat tsbuf; 38807c478bd9Sstevel@tonic-gate 3881ced83f9bSceastha /* Don't need to do anything if this is a zero size file */ 3882ced83f9bSceastha if (bytes <= 0) { 3883ced83f9bSceastha return (0); 3884ced83f9bSceastha } 3885ced83f9bSceastha 3886ced83f9bSceastha /* 3887ced83f9bSceastha * To figure out the size of the buffer used to accumulate data 3888ced83f9bSceastha * from readtape() and to write to the file, we need to determine 3889ced83f9bSceastha * the largest chunk of data to be written to the file at one time. 3890ced83f9bSceastha * This is determined based on the smallest of the following two 3891ced83f9bSceastha * things: 3892ced83f9bSceastha * 1) The size of the archived file. 3893ced83f9bSceastha * 2) The preferred I/O size of the file. 3894ced83f9bSceastha */ 3895ced83f9bSceastha if (issysattr || (bytes <= TBLOCK)) { 3896ced83f9bSceastha /* 3897ced83f9bSceastha * Writes to system attribute files must be 3898ced83f9bSceastha * performed in one operation. 3899ced83f9bSceastha */ 3900ced83f9bSceastha maxwrite = bytes; 3901ced83f9bSceastha } else { 3902ced83f9bSceastha /* 3903ced83f9bSceastha * fstat() the file to get the preferred I/O size. 3904ced83f9bSceastha * If it fails, then resort back to just writing 3905ced83f9bSceastha * one block at a time. 3906ced83f9bSceastha */ 3907ced83f9bSceastha if (fstat(ofile, &tsbuf) == 0) { 3908ced83f9bSceastha piosize = tsbuf.st_blksize; 3909ced83f9bSceastha } else { 3910ced83f9bSceastha piosize = TBLOCK; 3911ced83f9bSceastha } 3912ced83f9bSceastha maxwrite = min(bytes, piosize); 3913ced83f9bSceastha } 3914ced83f9bSceastha 3915ced83f9bSceastha /* 3916ced83f9bSceastha * The buffer used to accumulate the data for the write operation 3917ced83f9bSceastha * needs to be the maximum number of bytes to be written rounded up 3918ced83f9bSceastha * to the nearest TBLOCK since readtape reads one block at a time. 3919ced83f9bSceastha */ 3920ced83f9bSceastha if ((buf = malloc(TBLOCKS(maxwrite) * TBLOCK)) == NULL) { 3921ced83f9bSceastha fatal(gettext("cannot allocate buffer")); 3922ced83f9bSceastha } 3923ced83f9bSceastha 3924ced83f9bSceastha while (bytes > 0) { 3925ced83f9bSceastha 3926ced83f9bSceastha /* 3927ced83f9bSceastha * readtape() obtains one block (TBLOCK) of data at a time. 3928ced83f9bSceastha * Accumulate as many blocks of data in buf as we can write 3929ced83f9bSceastha * in one operation. 3930ced83f9bSceastha */ 3931ced83f9bSceastha for (bytesread = 0; bytesread < maxwrite; bytesread += TBLOCK) { 3932ced83f9bSceastha readtape(buf + bytesread); 3933ced83f9bSceastha } 3934ced83f9bSceastha 3935ced83f9bSceastha if (write(ofile, buf, maxwrite) < 0) { 3936da6c28aaSamw int saveerrno = errno; 3937da6c28aaSamw 39387c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 3939ced83f9bSceastha (void) strlcpy(tempname, Xtarhdr.x_path, 3940ced83f9bSceastha sizeof (tempname)); 39417c478bd9Sstevel@tonic-gate else 39427c478bd9Sstevel@tonic-gate (void) sprintf(tempname, "%.*s", NAMSIZ, 39437c478bd9Sstevel@tonic-gate dblock.dbuf.name); 3944da6c28aaSamw /* 3945da6c28aaSamw * If the extended system attribute being extracted 3946da6c28aaSamw * contains attributes that the user needs privileges 3947da6c28aaSamw * for, then just display a warning message, skip 3948da6c28aaSamw * the extraction of this file, and return. 3949da6c28aaSamw */ 3950da6c28aaSamw if ((saveerrno == EPERM) && issysattr) { 39517c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3952da6c28aaSamw "tar: unable to extract system attribute " 3953da6c28aaSamw "%s: insufficient privileges\n"), tempname); 3954da6c28aaSamw Errflg = 1; 3955ced83f9bSceastha (void) free(buf); 3956da6c28aaSamw return (1); 3957da6c28aaSamw } else { 3958da6c28aaSamw (void) fprintf(stderr, gettext( 3959da6c28aaSamw "tar: %s: HELP - extract write error\n"), 3960da6c28aaSamw tempname); 39617c478bd9Sstevel@tonic-gate done(2); 39627c478bd9Sstevel@tonic-gate } 3963da6c28aaSamw } 3964ced83f9bSceastha bytes -= maxwrite; 3965ced83f9bSceastha 3966ced83f9bSceastha /* 3967ced83f9bSceastha * If we've reached this point and there is still data 3968ced83f9bSceastha * to be written, maxwrite had to have been determined 3969ced83f9bSceastha * by the preferred I/O size. If the number of bytes 3970ced83f9bSceastha * left to write is smaller than the preferred I/O size, 3971ced83f9bSceastha * then we're about to do our final write to the file, so 3972ced83f9bSceastha * just set maxwrite to the number of bytes left to write. 3973ced83f9bSceastha */ 3974ced83f9bSceastha if ((bytes > 0) && (bytes < maxwrite)) { 3975ced83f9bSceastha maxwrite = bytes; 39767c478bd9Sstevel@tonic-gate } 3977ced83f9bSceastha } 3978ced83f9bSceastha free(buf); 3979da6c28aaSamw 3980da6c28aaSamw return (0); 39817c478bd9Sstevel@tonic-gate } 39827c478bd9Sstevel@tonic-gate 39837c478bd9Sstevel@tonic-gate /* 39847c478bd9Sstevel@tonic-gate * xsfile extract split file 39857c478bd9Sstevel@tonic-gate * 39867c478bd9Sstevel@tonic-gate * xsfile(ofd); ofd = output file descriptor 39877c478bd9Sstevel@tonic-gate * 39887c478bd9Sstevel@tonic-gate * file extracted and put in ofd via xblocks() 39897c478bd9Sstevel@tonic-gate * 39907c478bd9Sstevel@tonic-gate * NOTE: only called by doxtract() to extract one large file 39917c478bd9Sstevel@tonic-gate */ 39927c478bd9Sstevel@tonic-gate 39937c478bd9Sstevel@tonic-gate static union hblock savedblock; /* to ensure same file across volumes */ 39947c478bd9Sstevel@tonic-gate 3995da6c28aaSamw static int 3996da6c28aaSamw xsfile(int issysattr, int ofd) 39977c478bd9Sstevel@tonic-gate { 39987c478bd9Sstevel@tonic-gate int i, c; 3999da6c28aaSamw int sysattrerr = 0; 40007c478bd9Sstevel@tonic-gate char name[PATH_MAX+1]; /* holds name for diagnostics */ 40017c478bd9Sstevel@tonic-gate int extents, totalext; 40027c478bd9Sstevel@tonic-gate off_t bytes, totalbytes; 40037c478bd9Sstevel@tonic-gate 40047c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 40057c478bd9Sstevel@tonic-gate (void) strcpy(name, Xtarhdr.x_path); 40067c478bd9Sstevel@tonic-gate else 40077c478bd9Sstevel@tonic-gate (void) sprintf(name, "%.*s", NAMSIZ, dblock.dbuf.name); 40087c478bd9Sstevel@tonic-gate 40097c478bd9Sstevel@tonic-gate totalbytes = (off_t)0; /* in case we read in half the file */ 40107c478bd9Sstevel@tonic-gate totalext = 0; /* these keep count */ 40117c478bd9Sstevel@tonic-gate 40127c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 40137c478bd9Sstevel@tonic-gate "tar: %s split across %d volumes\n"), name, extotal); 40147c478bd9Sstevel@tonic-gate 40157c478bd9Sstevel@tonic-gate /* make sure we do extractions in order */ 40167c478bd9Sstevel@tonic-gate if (extno != 1) { /* starting in middle of file? */ 40177c478bd9Sstevel@tonic-gate (void) printf(gettext( 40187c478bd9Sstevel@tonic-gate "tar: first extent read is not #1\n" 40193d63ea05Sas145665 "OK to read file beginning with extent #%d (%s/%s) ? "), 40203d63ea05Sas145665 extno, yesstr, nostr); 40213d63ea05Sas145665 if (yes() == 0) { 40227c478bd9Sstevel@tonic-gate canit: 40237c478bd9Sstevel@tonic-gate passtape(); 40247c478bd9Sstevel@tonic-gate if (close(ofd) != 0) 40257c478bd9Sstevel@tonic-gate vperror(2, gettext("close error")); 4026da6c28aaSamw if (sysattrerr) { 4027da6c28aaSamw return (1); 4028da6c28aaSamw } else { 4029da6c28aaSamw return (0); 4030da6c28aaSamw } 40317c478bd9Sstevel@tonic-gate } 40327c478bd9Sstevel@tonic-gate } 40337c478bd9Sstevel@tonic-gate extents = extotal; 40347c478bd9Sstevel@tonic-gate i = extno; 40357c478bd9Sstevel@tonic-gate /*CONSTCOND*/ 40367c478bd9Sstevel@tonic-gate while (1) { 40377c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_SIZE) { 40387c478bd9Sstevel@tonic-gate bytes = extsize; 40397c478bd9Sstevel@tonic-gate } else { 40407c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 40417c478bd9Sstevel@tonic-gate } 40427c478bd9Sstevel@tonic-gate 40437c478bd9Sstevel@tonic-gate if (vflag) 40448e4a71aeSRich Burridge (void) fprintf(vfile, "+++ x %s [%s #%d], %" 40458e4a71aeSRich Burridge FMT_off_t " %s, %ldK\n", 40468e4a71aeSRich Burridge name, gettext("extent"), extno, 40478e4a71aeSRich Burridge bytes, gettext("bytes"), 40487c478bd9Sstevel@tonic-gate (long)K(TBLOCKS(bytes))); 4049da6c28aaSamw if (xblocks(issysattr, bytes, ofd) != 0) { 4050da6c28aaSamw sysattrerr = 1; 4051da6c28aaSamw goto canit; 4052da6c28aaSamw } 40537c478bd9Sstevel@tonic-gate 40547c478bd9Sstevel@tonic-gate totalbytes += bytes; 40557c478bd9Sstevel@tonic-gate totalext++; 40567c478bd9Sstevel@tonic-gate if (++i > extents) 40577c478bd9Sstevel@tonic-gate break; 40587c478bd9Sstevel@tonic-gate 40597c478bd9Sstevel@tonic-gate /* get next volume and verify it's the right one */ 40607c478bd9Sstevel@tonic-gate copy(&savedblock, &dblock); 40617c478bd9Sstevel@tonic-gate tryagain: 40627c478bd9Sstevel@tonic-gate newvol(); 40637c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 40647c478bd9Sstevel@tonic-gate getdir(); 40657c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) 40667c478bd9Sstevel@tonic-gate (void) get_xdata(); /* Get x-header & regular hdr */ 4067123523f8Sas158974 if ((dblock.dbuf.typeflag != 'A') && (xhdr_flgs != 0)) { 4068123523f8Sas158974 load_info_from_xtarhdr(xhdr_flgs, &Xtarhdr); 4069123523f8Sas158974 xhdr_flgs |= _X_XHDR; 4070123523f8Sas158974 } 40717c478bd9Sstevel@tonic-gate if (endtape()) { /* seemingly empty volume */ 40727c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 40737c478bd9Sstevel@tonic-gate "tar: first record is null\n")); 40747c478bd9Sstevel@tonic-gate asknicely: 40757c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 40767c478bd9Sstevel@tonic-gate "tar: need volume with extent #%d of %s\n"), 40777c478bd9Sstevel@tonic-gate i, name); 40787c478bd9Sstevel@tonic-gate goto tryagain; 40797c478bd9Sstevel@tonic-gate } 40807c478bd9Sstevel@tonic-gate if (notsame()) { 40817c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 40827c478bd9Sstevel@tonic-gate "tar: first file on that volume is not " 40837c478bd9Sstevel@tonic-gate "the same file\n")); 40847c478bd9Sstevel@tonic-gate goto asknicely; 40857c478bd9Sstevel@tonic-gate } 40867c478bd9Sstevel@tonic-gate if (i != extno) { 40877c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 4088eace40a5Sceastha "tar: extent #%d received out of order\ntar: " 4089eace40a5Sceastha "should be #%d\n"), extno, i); 40907c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 40917c478bd9Sstevel@tonic-gate "Ignore error, Abort this file, or " 40927c478bd9Sstevel@tonic-gate "load New volume (i/a/n) ? ")); 40937c478bd9Sstevel@tonic-gate c = response(); 40947c478bd9Sstevel@tonic-gate if (c == 'a') 40957c478bd9Sstevel@tonic-gate goto canit; 40967c478bd9Sstevel@tonic-gate if (c != 'i') /* default to new volume */ 40977c478bd9Sstevel@tonic-gate goto asknicely; 40987c478bd9Sstevel@tonic-gate i = extno; /* okay, start from there */ 40997c478bd9Sstevel@tonic-gate } 41007c478bd9Sstevel@tonic-gate } 41017c478bd9Sstevel@tonic-gate if (vflag) 41027c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 41037c478bd9Sstevel@tonic-gate "x %s (in %d extents), %" FMT_off_t " bytes, %ldK\n"), 41047c478bd9Sstevel@tonic-gate name, totalext, totalbytes, (long)K(TBLOCKS(totalbytes))); 4105da6c28aaSamw 4106da6c28aaSamw return (0); 41077c478bd9Sstevel@tonic-gate } 41087c478bd9Sstevel@tonic-gate 41097c478bd9Sstevel@tonic-gate 41107c478bd9Sstevel@tonic-gate /* 41117c478bd9Sstevel@tonic-gate * notsame() check if extract file extent is invalid 41127c478bd9Sstevel@tonic-gate * 41137c478bd9Sstevel@tonic-gate * returns true if anything differs between savedblock and dblock 41147c478bd9Sstevel@tonic-gate * except extno (extent number), checksum, or size (extent size). 41157c478bd9Sstevel@tonic-gate * Determines if this header belongs to the same file as the one we're 41167c478bd9Sstevel@tonic-gate * extracting. 41177c478bd9Sstevel@tonic-gate * 41187c478bd9Sstevel@tonic-gate * NOTE: though rather bulky, it is only called once per file 41197c478bd9Sstevel@tonic-gate * extension, and it can withstand changes in the definition 41207c478bd9Sstevel@tonic-gate * of the header structure. 41217c478bd9Sstevel@tonic-gate * 41227c478bd9Sstevel@tonic-gate * WARNING: this routine is local to xsfile() above 41237c478bd9Sstevel@tonic-gate */ 41247c478bd9Sstevel@tonic-gate 41257c478bd9Sstevel@tonic-gate static int 41267c478bd9Sstevel@tonic-gate notsame(void) 41277c478bd9Sstevel@tonic-gate { 41287c478bd9Sstevel@tonic-gate return ( 41297c478bd9Sstevel@tonic-gate (strncmp(savedblock.dbuf.name, dblock.dbuf.name, NAMSIZ)) || 41307c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.mode, dblock.dbuf.mode)) || 41317c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.uid, dblock.dbuf.uid)) || 41327c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.gid, dblock.dbuf.gid)) || 41337c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.mtime, dblock.dbuf.mtime)) || 41347c478bd9Sstevel@tonic-gate (savedblock.dbuf.typeflag != dblock.dbuf.typeflag) || 41357c478bd9Sstevel@tonic-gate (strncmp(savedblock.dbuf.linkname, dblock.dbuf.linkname, NAMSIZ)) || 41367c478bd9Sstevel@tonic-gate (savedblock.dbuf.extotal != dblock.dbuf.extotal) || 41377c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.efsize, dblock.dbuf.efsize))); 41387c478bd9Sstevel@tonic-gate } 41397c478bd9Sstevel@tonic-gate 41407c478bd9Sstevel@tonic-gate static void 41417c478bd9Sstevel@tonic-gate dotable(char *argv[]) 41427c478bd9Sstevel@tonic-gate { 4143cc22b130SRich Burridge int tcnt = 0; /* count # files tabled */ 4144cc22b130SRich Burridge int fcnt = 0; /* count # files in argv list */ 41457c478bd9Sstevel@tonic-gate char *namep, *dirp, *comp; 41467c478bd9Sstevel@tonic-gate int want; 41477c478bd9Sstevel@tonic-gate char aclchar = ' '; /* either blank or '+' */ 41487c478bd9Sstevel@tonic-gate char templink[PATH_MAX+1]; 4149da6c28aaSamw attr_data_t *attrinfo = NULL; 41507c478bd9Sstevel@tonic-gate 41517c478bd9Sstevel@tonic-gate dumping = 0; 41527c478bd9Sstevel@tonic-gate 41537c478bd9Sstevel@tonic-gate /* if not on magtape, maximize seek speed */ 41547c478bd9Sstevel@tonic-gate if (NotTape && !bflag) { 41557c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 41567c478bd9Sstevel@tonic-gate nblock = SYS_BLOCK / TBLOCK; 41577c478bd9Sstevel@tonic-gate #else 41587c478bd9Sstevel@tonic-gate nblock = 1; 41597c478bd9Sstevel@tonic-gate #endif 41607c478bd9Sstevel@tonic-gate } 41617c478bd9Sstevel@tonic-gate 41627c478bd9Sstevel@tonic-gate for (;;) { 41637c478bd9Sstevel@tonic-gate 41647c478bd9Sstevel@tonic-gate /* namep is set by wantit to point to the full name */ 4165da6c28aaSamw if ((want = wantit(argv, &namep, &dirp, &comp, &attrinfo)) == 0) 41667c478bd9Sstevel@tonic-gate continue; 41677c478bd9Sstevel@tonic-gate if (want == -1) 41687c478bd9Sstevel@tonic-gate break; 41697c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag != 'A') 41707c478bd9Sstevel@tonic-gate ++tcnt; 41717c478bd9Sstevel@tonic-gate 41723a1dab68SRich Burridge if (Fflag) { 41733a1dab68SRich Burridge if (checkf(namep, is_directory(namep), Fflag) == 0) { 41743a1dab68SRich Burridge passtape(); 41753a1dab68SRich Burridge continue; 41763a1dab68SRich Burridge } 41773a1dab68SRich Burridge } 41787c478bd9Sstevel@tonic-gate /* 41797c478bd9Sstevel@tonic-gate * ACL support: 41807c478bd9Sstevel@tonic-gate * aclchar is introduced to indicate if there are 41817c478bd9Sstevel@tonic-gate * acl entries. longt() now takes one extra argument. 41827c478bd9Sstevel@tonic-gate */ 41837c478bd9Sstevel@tonic-gate if (vflag) { 41847c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == 'A') { 41857c478bd9Sstevel@tonic-gate aclchar = '+'; 41867c478bd9Sstevel@tonic-gate passtape(); 41877c478bd9Sstevel@tonic-gate continue; 41887c478bd9Sstevel@tonic-gate } 41897c478bd9Sstevel@tonic-gate longt(&stbuf, aclchar); 41907c478bd9Sstevel@tonic-gate aclchar = ' '; 41917c478bd9Sstevel@tonic-gate } 41927c478bd9Sstevel@tonic-gate 41937c478bd9Sstevel@tonic-gate 41947c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 4195da6c28aaSamw if (xattrp != NULL) { 4196da6c28aaSamw int issysattr; 4197da6c28aaSamw char *bn = basename(attrinfo->attr_path); 41987c478bd9Sstevel@tonic-gate 4199da6c28aaSamw /* 4200da6c28aaSamw * We could use sysattr_type() to test whether or not 4201da6c28aaSamw * the attribute we are processing is really an 4202da6c28aaSamw * extended system attribute, which as of this writing 4203da6c28aaSamw * just does a strcmp(), however, sysattr_type() may 4204da6c28aaSamw * be changed to issue a pathconf() call instead, which 4205da6c28aaSamw * would require being changed into the parent attribute 4206da6c28aaSamw * directory. So instead, just do simple string 4207da6c28aaSamw * comparisons to see if we are processing an extended 4208da6c28aaSamw * system attribute. 4209da6c28aaSamw */ 4210da6c28aaSamw issysattr = is_sysattr(bn); 4211da6c28aaSamw 4212da6c28aaSamw (void) printf(gettext("%s %sattribute %s"), 4213da6c28aaSamw xattrp->h_names, 4214da6c28aaSamw issysattr ? gettext("system ") : "", 4215da6c28aaSamw attrinfo->attr_path); 42167c478bd9Sstevel@tonic-gate } else { 42177c478bd9Sstevel@tonic-gate (void) printf("%s", namep); 42187c478bd9Sstevel@tonic-gate } 42197c478bd9Sstevel@tonic-gate #else 42207c478bd9Sstevel@tonic-gate (void) printf("%s", namep); 42217c478bd9Sstevel@tonic-gate #endif 42227c478bd9Sstevel@tonic-gate 42237c478bd9Sstevel@tonic-gate if (extno != 0) { 42247c478bd9Sstevel@tonic-gate if (vflag) { 42257c478bd9Sstevel@tonic-gate /* keep the '\n' for backwards compatibility */ 42267c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 42277c478bd9Sstevel@tonic-gate "\n [extent #%d of %d]"), extno, extotal); 42287c478bd9Sstevel@tonic-gate } else { 42297c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 42307c478bd9Sstevel@tonic-gate " [extent #%d of %d]"), extno, extotal); 42317c478bd9Sstevel@tonic-gate } 42327c478bd9Sstevel@tonic-gate } 42337c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) { 42347c478bd9Sstevel@tonic-gate (void) strcpy(templink, Xtarhdr.x_linkpath); 42357c478bd9Sstevel@tonic-gate } else { 42367c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 4237da6c28aaSamw if (xattrp != NULL) { 42387c478bd9Sstevel@tonic-gate (void) sprintf(templink, 42397c478bd9Sstevel@tonic-gate "file %.*s", NAMSIZ, xattrp->h_names); 42407c478bd9Sstevel@tonic-gate } else { 42417c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 42427c478bd9Sstevel@tonic-gate dblock.dbuf.linkname); 42437c478bd9Sstevel@tonic-gate } 42447c478bd9Sstevel@tonic-gate #else 42457c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 42467c478bd9Sstevel@tonic-gate dblock.dbuf.linkname); 42477c478bd9Sstevel@tonic-gate #endif 42487c478bd9Sstevel@tonic-gate templink[NAMSIZ] = '\0'; 42497c478bd9Sstevel@tonic-gate } 42507c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '1') { 42517c478bd9Sstevel@tonic-gate /* 42527c478bd9Sstevel@tonic-gate * TRANSLATION_NOTE 42537c478bd9Sstevel@tonic-gate * Subject is omitted here. 42547c478bd9Sstevel@tonic-gate * Translate this as if 42557c478bd9Sstevel@tonic-gate * <subject> linked to %s 42567c478bd9Sstevel@tonic-gate */ 42577c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 4258da6c28aaSamw if (xattrp != NULL) { 42597c478bd9Sstevel@tonic-gate (void) printf( 42607c478bd9Sstevel@tonic-gate gettext(" linked to attribute %s"), 42617c478bd9Sstevel@tonic-gate xattr_linkp->h_names + 42627c478bd9Sstevel@tonic-gate strlen(xattr_linkp->h_names) + 1); 42637c478bd9Sstevel@tonic-gate } else { 42647c478bd9Sstevel@tonic-gate (void) printf( 42657c478bd9Sstevel@tonic-gate gettext(" linked to %s"), templink); 42667c478bd9Sstevel@tonic-gate } 42677c478bd9Sstevel@tonic-gate #else 42687c478bd9Sstevel@tonic-gate (void) printf( 42697c478bd9Sstevel@tonic-gate gettext(" linked to %s"), templink); 42707c478bd9Sstevel@tonic-gate 42717c478bd9Sstevel@tonic-gate #endif 42727c478bd9Sstevel@tonic-gate } 42737c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '2') 42747c478bd9Sstevel@tonic-gate (void) printf(gettext( 42757c478bd9Sstevel@tonic-gate /* 42767c478bd9Sstevel@tonic-gate * TRANSLATION_NOTE 42777c478bd9Sstevel@tonic-gate * Subject is omitted here. 42787c478bd9Sstevel@tonic-gate * Translate this as if 42797c478bd9Sstevel@tonic-gate * <subject> symbolic link to %s 42807c478bd9Sstevel@tonic-gate */ 42817c478bd9Sstevel@tonic-gate " symbolic link to %s"), templink); 42827c478bd9Sstevel@tonic-gate (void) printf("\n"); 42837c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 4284da6c28aaSamw if (xattrp != NULL) { 42857c478bd9Sstevel@tonic-gate free(xattrhead); 42867c478bd9Sstevel@tonic-gate xattrp = NULL; 42877c478bd9Sstevel@tonic-gate xattrhead = NULL; 42887c478bd9Sstevel@tonic-gate } 42897c478bd9Sstevel@tonic-gate #endif 42907c478bd9Sstevel@tonic-gate passtape(); 42917c478bd9Sstevel@tonic-gate } 42927c478bd9Sstevel@tonic-gate /* 42937c478bd9Sstevel@tonic-gate * Check if the number of files tabled is different from the 42947c478bd9Sstevel@tonic-gate * number of files listed on the command line 42957c478bd9Sstevel@tonic-gate */ 42967c478bd9Sstevel@tonic-gate if (fcnt > tcnt) { 42977c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 42987c478bd9Sstevel@tonic-gate "tar: %d file(s) not found\n"), fcnt-tcnt); 42997c478bd9Sstevel@tonic-gate Errflg = 1; 43007c478bd9Sstevel@tonic-gate } 43017c478bd9Sstevel@tonic-gate } 43027c478bd9Sstevel@tonic-gate 43037c478bd9Sstevel@tonic-gate static void 43047c478bd9Sstevel@tonic-gate putempty(blkcnt_t n) 43057c478bd9Sstevel@tonic-gate { 43067c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 43077c478bd9Sstevel@tonic-gate char *cp; 43087c478bd9Sstevel@tonic-gate 43097c478bd9Sstevel@tonic-gate for (cp = buf; cp < &buf[TBLOCK]; ) 43107c478bd9Sstevel@tonic-gate *cp++ = '\0'; 43117c478bd9Sstevel@tonic-gate while (n-- > 0) 43127c478bd9Sstevel@tonic-gate (void) writetbuf(buf, 1); 43137c478bd9Sstevel@tonic-gate } 43147c478bd9Sstevel@tonic-gate 43157c478bd9Sstevel@tonic-gate static ushort_t Ftype = S_IFMT; 43167c478bd9Sstevel@tonic-gate 43177c478bd9Sstevel@tonic-gate static void 43187c478bd9Sstevel@tonic-gate verbose(struct stat *st, char aclchar) 43197c478bd9Sstevel@tonic-gate { 43207c478bd9Sstevel@tonic-gate int i, j, temp; 43217c478bd9Sstevel@tonic-gate mode_t mode; 43227c478bd9Sstevel@tonic-gate char modestr[12]; 43237c478bd9Sstevel@tonic-gate 43247c478bd9Sstevel@tonic-gate for (i = 0; i < 11; i++) 43257c478bd9Sstevel@tonic-gate modestr[i] = '-'; 43267c478bd9Sstevel@tonic-gate modestr[i] = '\0'; 43277c478bd9Sstevel@tonic-gate 43287c478bd9Sstevel@tonic-gate /* a '+' sign is printed if there is ACL */ 43297c478bd9Sstevel@tonic-gate modestr[i-1] = aclchar; 43307c478bd9Sstevel@tonic-gate 43317c478bd9Sstevel@tonic-gate mode = st->st_mode; 43327c478bd9Sstevel@tonic-gate for (i = 0; i < 3; i++) { 43337c478bd9Sstevel@tonic-gate temp = (mode >> (6 - (i * 3))); 43347c478bd9Sstevel@tonic-gate j = (i * 3) + 1; 43357c478bd9Sstevel@tonic-gate if (S_IROTH & temp) 43367c478bd9Sstevel@tonic-gate modestr[j] = 'r'; 43377c478bd9Sstevel@tonic-gate if (S_IWOTH & temp) 43387c478bd9Sstevel@tonic-gate modestr[j + 1] = 'w'; 43397c478bd9Sstevel@tonic-gate if (S_IXOTH & temp) 43407c478bd9Sstevel@tonic-gate modestr[j + 2] = 'x'; 43417c478bd9Sstevel@tonic-gate } 43427c478bd9Sstevel@tonic-gate temp = st->st_mode & Ftype; 43437c478bd9Sstevel@tonic-gate switch (temp) { 43447c478bd9Sstevel@tonic-gate case (S_IFIFO): 43457c478bd9Sstevel@tonic-gate modestr[0] = 'p'; 43467c478bd9Sstevel@tonic-gate break; 43477c478bd9Sstevel@tonic-gate case (S_IFCHR): 43487c478bd9Sstevel@tonic-gate modestr[0] = 'c'; 43497c478bd9Sstevel@tonic-gate break; 43507c478bd9Sstevel@tonic-gate case (S_IFDIR): 43517c478bd9Sstevel@tonic-gate modestr[0] = 'd'; 43527c478bd9Sstevel@tonic-gate break; 43537c478bd9Sstevel@tonic-gate case (S_IFBLK): 43547c478bd9Sstevel@tonic-gate modestr[0] = 'b'; 43557c478bd9Sstevel@tonic-gate break; 43567c478bd9Sstevel@tonic-gate case (S_IFREG): /* was initialized to '-' */ 43577c478bd9Sstevel@tonic-gate break; 43587c478bd9Sstevel@tonic-gate case (S_IFLNK): 43597c478bd9Sstevel@tonic-gate modestr[0] = 'l'; 43607c478bd9Sstevel@tonic-gate break; 43617c478bd9Sstevel@tonic-gate default: 43627c478bd9Sstevel@tonic-gate /* This field may be zero in old archives. */ 43637c478bd9Sstevel@tonic-gate if (is_posix && dblock.dbuf.typeflag != '1') { 43647c478bd9Sstevel@tonic-gate /* 43657c478bd9Sstevel@tonic-gate * For POSIX compliant archives, the mode field 43667c478bd9Sstevel@tonic-gate * consists of 12 bits, ie: the file type bits 43677c478bd9Sstevel@tonic-gate * are not stored in dblock.dbuf.mode. 43687c478bd9Sstevel@tonic-gate * For files other than hard links, getdir() sets 43697c478bd9Sstevel@tonic-gate * the file type bits in the st_mode field of the 43707c478bd9Sstevel@tonic-gate * stat structure based upon dblock.dbuf.typeflag. 43717c478bd9Sstevel@tonic-gate */ 43727c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 43737c478bd9Sstevel@tonic-gate "tar: impossible file type")); 43747c478bd9Sstevel@tonic-gate } 43757c478bd9Sstevel@tonic-gate } 43767c478bd9Sstevel@tonic-gate 43777c478bd9Sstevel@tonic-gate if ((S_ISUID & Gen.g_mode) == S_ISUID) 43787c478bd9Sstevel@tonic-gate modestr[3] = 's'; 43797c478bd9Sstevel@tonic-gate if ((S_ISVTX & Gen.g_mode) == S_ISVTX) 43807c478bd9Sstevel@tonic-gate modestr[9] = 't'; 43817c478bd9Sstevel@tonic-gate if ((S_ISGID & Gen.g_mode) == S_ISGID && modestr[6] == 'x') 43827c478bd9Sstevel@tonic-gate modestr[6] = 's'; 43837c478bd9Sstevel@tonic-gate else if ((S_ENFMT & Gen.g_mode) == S_ENFMT && modestr[6] != 'x') 43847c478bd9Sstevel@tonic-gate modestr[6] = 'l'; 43857c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%s", modestr); 43867c478bd9Sstevel@tonic-gate } 43877c478bd9Sstevel@tonic-gate 43887c478bd9Sstevel@tonic-gate static void 43897c478bd9Sstevel@tonic-gate longt(struct stat *st, char aclchar) 43907c478bd9Sstevel@tonic-gate { 43917c478bd9Sstevel@tonic-gate char fileDate[30]; 43927c478bd9Sstevel@tonic-gate struct tm *tm; 43937c478bd9Sstevel@tonic-gate 43947c478bd9Sstevel@tonic-gate verbose(st, aclchar); 43957c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%3ld/%-3ld", st->st_uid, st->st_gid); 43967c478bd9Sstevel@tonic-gate 43977c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '2') { 43987c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) 43997c478bd9Sstevel@tonic-gate st->st_size = (off_t)strlen(Xtarhdr.x_linkpath); 44007c478bd9Sstevel@tonic-gate else 44017c478bd9Sstevel@tonic-gate st->st_size = (off_t)(memchr(dblock.dbuf.linkname, 44027c478bd9Sstevel@tonic-gate '\0', NAMSIZ) ? 44037c478bd9Sstevel@tonic-gate (strlen(dblock.dbuf.linkname)) : (NAMSIZ)); 44047c478bd9Sstevel@tonic-gate } 44057c478bd9Sstevel@tonic-gate (void) fprintf(vfile, " %6" FMT_off_t, st->st_size); 44067c478bd9Sstevel@tonic-gate 44077c478bd9Sstevel@tonic-gate tm = localtime(&(st->st_mtime)); 44087c478bd9Sstevel@tonic-gate (void) strftime(fileDate, sizeof (fileDate), 44097c478bd9Sstevel@tonic-gate dcgettext((const char *)0, "%b %e %R %Y", LC_TIME), tm); 44107c478bd9Sstevel@tonic-gate (void) fprintf(vfile, " %s ", fileDate); 44117c478bd9Sstevel@tonic-gate } 44127c478bd9Sstevel@tonic-gate 44137c478bd9Sstevel@tonic-gate 44147c478bd9Sstevel@tonic-gate /* 44157c478bd9Sstevel@tonic-gate * checkdir - Attempt to ensure that the path represented in name 44167c478bd9Sstevel@tonic-gate * exists, and return 1 if this is true and name itself is a 44177c478bd9Sstevel@tonic-gate * directory. 44187c478bd9Sstevel@tonic-gate * Return 0 if this path cannot be created or if name is not 44197c478bd9Sstevel@tonic-gate * a directory. 44207c478bd9Sstevel@tonic-gate */ 44217c478bd9Sstevel@tonic-gate 44227c478bd9Sstevel@tonic-gate static int 44237c478bd9Sstevel@tonic-gate checkdir(char *name) 44247c478bd9Sstevel@tonic-gate { 44257c478bd9Sstevel@tonic-gate char lastChar; /* the last character in name */ 44267c478bd9Sstevel@tonic-gate char *cp; /* scratch pointer into name */ 44277c478bd9Sstevel@tonic-gate char *firstSlash = NULL; /* first slash in name */ 44287c478bd9Sstevel@tonic-gate char *lastSlash = NULL; /* last slash in name */ 44297c478bd9Sstevel@tonic-gate int nameLen; /* length of name */ 44307c478bd9Sstevel@tonic-gate int trailingSlash; /* true if name ends in slash */ 44317c478bd9Sstevel@tonic-gate int leadingSlash; /* true if name begins with slash */ 44327c478bd9Sstevel@tonic-gate int markedDir; /* true if name denotes a directory */ 44337c478bd9Sstevel@tonic-gate int success; /* status of makeDir call */ 44347c478bd9Sstevel@tonic-gate 44357c478bd9Sstevel@tonic-gate 44367c478bd9Sstevel@tonic-gate /* 44377c478bd9Sstevel@tonic-gate * Scan through the name, and locate first and last slashes. 44387c478bd9Sstevel@tonic-gate */ 44397c478bd9Sstevel@tonic-gate 44407c478bd9Sstevel@tonic-gate for (cp = name; *cp; cp++) { 44417c478bd9Sstevel@tonic-gate if (*cp == '/') { 44427c478bd9Sstevel@tonic-gate if (! firstSlash) { 44437c478bd9Sstevel@tonic-gate firstSlash = cp; 44447c478bd9Sstevel@tonic-gate } 44457c478bd9Sstevel@tonic-gate lastSlash = cp; 44467c478bd9Sstevel@tonic-gate } 44477c478bd9Sstevel@tonic-gate } 44487c478bd9Sstevel@tonic-gate 44497c478bd9Sstevel@tonic-gate /* 44507c478bd9Sstevel@tonic-gate * Determine what you can from the proceeds of the scan. 44517c478bd9Sstevel@tonic-gate */ 44527c478bd9Sstevel@tonic-gate 44537c478bd9Sstevel@tonic-gate lastChar = *(cp - 1); 44547c478bd9Sstevel@tonic-gate nameLen = (int)(cp - name); 44557c478bd9Sstevel@tonic-gate trailingSlash = (lastChar == '/'); 44567c478bd9Sstevel@tonic-gate leadingSlash = (*name == '/'); 44577c478bd9Sstevel@tonic-gate markedDir = (dblock.dbuf.typeflag == '5' || trailingSlash); 44587c478bd9Sstevel@tonic-gate 44597c478bd9Sstevel@tonic-gate if (! lastSlash && ! markedDir) { 44607c478bd9Sstevel@tonic-gate /* 44617c478bd9Sstevel@tonic-gate * The named file does not have any subdrectory 44627c478bd9Sstevel@tonic-gate * structure; just bail out. 44637c478bd9Sstevel@tonic-gate */ 44647c478bd9Sstevel@tonic-gate 44657c478bd9Sstevel@tonic-gate return (0); 44667c478bd9Sstevel@tonic-gate } 44677c478bd9Sstevel@tonic-gate 44687c478bd9Sstevel@tonic-gate /* 44697c478bd9Sstevel@tonic-gate * Make sure that name doesn`t end with slash for the loop. 44707c478bd9Sstevel@tonic-gate * This ensures that the makeDir attempt after the loop is 44717c478bd9Sstevel@tonic-gate * meaningful. 44727c478bd9Sstevel@tonic-gate */ 44737c478bd9Sstevel@tonic-gate 44747c478bd9Sstevel@tonic-gate if (trailingSlash) { 44757c478bd9Sstevel@tonic-gate name[nameLen-1] = '\0'; 44767c478bd9Sstevel@tonic-gate } 44777c478bd9Sstevel@tonic-gate 44787c478bd9Sstevel@tonic-gate /* 44797c478bd9Sstevel@tonic-gate * Make the path one component at a time. 44807c478bd9Sstevel@tonic-gate */ 44817c478bd9Sstevel@tonic-gate 44827c478bd9Sstevel@tonic-gate for (cp = strchr(leadingSlash ? name+1 : name, '/'); 44837c478bd9Sstevel@tonic-gate cp; 44847c478bd9Sstevel@tonic-gate cp = strchr(cp+1, '/')) { 44857c478bd9Sstevel@tonic-gate *cp = '\0'; 44867c478bd9Sstevel@tonic-gate success = makeDir(name); 44877c478bd9Sstevel@tonic-gate *cp = '/'; 44887c478bd9Sstevel@tonic-gate 44897c478bd9Sstevel@tonic-gate if (!success) { 44907c478bd9Sstevel@tonic-gate name[nameLen-1] = lastChar; 44917c478bd9Sstevel@tonic-gate return (0); 44927c478bd9Sstevel@tonic-gate } 44937c478bd9Sstevel@tonic-gate } 44947c478bd9Sstevel@tonic-gate 44957c478bd9Sstevel@tonic-gate /* 44967c478bd9Sstevel@tonic-gate * This makes the last component of the name, if it is a 44977c478bd9Sstevel@tonic-gate * directory. 44987c478bd9Sstevel@tonic-gate */ 44997c478bd9Sstevel@tonic-gate 45007c478bd9Sstevel@tonic-gate if (markedDir) { 45017c478bd9Sstevel@tonic-gate if (! makeDir(name)) { 45027c478bd9Sstevel@tonic-gate name[nameLen-1] = lastChar; 45037c478bd9Sstevel@tonic-gate return (0); 45047c478bd9Sstevel@tonic-gate } 45057c478bd9Sstevel@tonic-gate } 45067c478bd9Sstevel@tonic-gate 45077c478bd9Sstevel@tonic-gate name[nameLen-1] = (lastChar == '/') ? '\0' : lastChar; 45087c478bd9Sstevel@tonic-gate return (markedDir); 45097c478bd9Sstevel@tonic-gate } 45107c478bd9Sstevel@tonic-gate 45117c478bd9Sstevel@tonic-gate /* 45127c478bd9Sstevel@tonic-gate * resugname - Restore the user name and group name. Search the NIS 45137c478bd9Sstevel@tonic-gate * before using the uid and gid. 45147c478bd9Sstevel@tonic-gate * (It is presumed that an archive entry cannot be 45157c478bd9Sstevel@tonic-gate * simultaneously a symlink and some other type.) 45167c478bd9Sstevel@tonic-gate */ 45177c478bd9Sstevel@tonic-gate 45187c478bd9Sstevel@tonic-gate static void 45197c478bd9Sstevel@tonic-gate resugname(int dirfd, /* dir fd file resides in */ 45207c478bd9Sstevel@tonic-gate char *name, /* name of the file to be modified */ 45217c478bd9Sstevel@tonic-gate int symflag) /* true if file is a symbolic link */ 45227c478bd9Sstevel@tonic-gate { 45237c478bd9Sstevel@tonic-gate uid_t duid; 45247c478bd9Sstevel@tonic-gate gid_t dgid; 45257c478bd9Sstevel@tonic-gate struct stat *sp = &stbuf; 45267c478bd9Sstevel@tonic-gate char *u_g_name; 45277c478bd9Sstevel@tonic-gate 45287c478bd9Sstevel@tonic-gate if (checkflag == 1) { /* Extended tar format and euid == 0 */ 45297c478bd9Sstevel@tonic-gate 45307c478bd9Sstevel@tonic-gate /* 45317c478bd9Sstevel@tonic-gate * Try and extract the intended uid and gid from the name 45327c478bd9Sstevel@tonic-gate * service before believing the uid and gid in the header. 45337c478bd9Sstevel@tonic-gate * 45347c478bd9Sstevel@tonic-gate * In the case where we archived a setuid or setgid file 45357c478bd9Sstevel@tonic-gate * owned by someone with a large uid, then it will 45367c478bd9Sstevel@tonic-gate * have made it into the archive with a uid of nobody. If 45377c478bd9Sstevel@tonic-gate * the corresponding username doesn't appear to exist, then we 45387c478bd9Sstevel@tonic-gate * want to make sure it *doesn't* end up as setuid nobody! 45397c478bd9Sstevel@tonic-gate * 45407c478bd9Sstevel@tonic-gate * Our caller will print an error message about the fact 45417c478bd9Sstevel@tonic-gate * that the restore didn't work out quite right .. 45427c478bd9Sstevel@tonic-gate */ 45437c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_UNAME) 45447c478bd9Sstevel@tonic-gate u_g_name = Xtarhdr.x_uname; 45457c478bd9Sstevel@tonic-gate else 45467c478bd9Sstevel@tonic-gate u_g_name = dblock.dbuf.uname; 45477c478bd9Sstevel@tonic-gate if ((duid = getuidbyname(u_g_name)) == -1) { 45487c478bd9Sstevel@tonic-gate if (S_ISREG(sp->st_mode) && sp->st_uid == UID_NOBODY && 45497c478bd9Sstevel@tonic-gate (sp->st_mode & S_ISUID) == S_ISUID) 45507c478bd9Sstevel@tonic-gate (void) chmod(name, 45517c478bd9Sstevel@tonic-gate MODEMASK & sp->st_mode & ~S_ISUID); 45527c478bd9Sstevel@tonic-gate duid = sp->st_uid; 45537c478bd9Sstevel@tonic-gate } 45547c478bd9Sstevel@tonic-gate 45557c478bd9Sstevel@tonic-gate /* (Ditto for gids) */ 45567c478bd9Sstevel@tonic-gate 45577c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_GNAME) 45587c478bd9Sstevel@tonic-gate u_g_name = Xtarhdr.x_gname; 45597c478bd9Sstevel@tonic-gate else 45607c478bd9Sstevel@tonic-gate u_g_name = dblock.dbuf.gname; 45617c478bd9Sstevel@tonic-gate if ((dgid = getgidbyname(u_g_name)) == -1) { 45627c478bd9Sstevel@tonic-gate if (S_ISREG(sp->st_mode) && sp->st_gid == GID_NOBODY && 45637c478bd9Sstevel@tonic-gate (sp->st_mode & S_ISGID) == S_ISGID) 45647c478bd9Sstevel@tonic-gate (void) chmod(name, 45657c478bd9Sstevel@tonic-gate MODEMASK & sp->st_mode & ~S_ISGID); 45667c478bd9Sstevel@tonic-gate dgid = sp->st_gid; 45677c478bd9Sstevel@tonic-gate } 45687c478bd9Sstevel@tonic-gate } else if (checkflag == 2) { /* tar format and euid == 0 */ 45697c478bd9Sstevel@tonic-gate duid = sp->st_uid; 45707c478bd9Sstevel@tonic-gate dgid = sp->st_gid; 45717c478bd9Sstevel@tonic-gate } 45727c478bd9Sstevel@tonic-gate if ((checkflag == 1) || (checkflag == 2)) 45737c478bd9Sstevel@tonic-gate (void) fchownat(dirfd, name, duid, dgid, symflag); 45747c478bd9Sstevel@tonic-gate } 45757c478bd9Sstevel@tonic-gate 45767c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 45777c478bd9Sstevel@tonic-gate static void 45787c478bd9Sstevel@tonic-gate onintr(int sig) 45797c478bd9Sstevel@tonic-gate { 45807c478bd9Sstevel@tonic-gate (void) signal(SIGINT, SIG_IGN); 45817c478bd9Sstevel@tonic-gate term++; 45827c478bd9Sstevel@tonic-gate } 45837c478bd9Sstevel@tonic-gate 45847c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 45857c478bd9Sstevel@tonic-gate static void 45867c478bd9Sstevel@tonic-gate onquit(int sig) 45877c478bd9Sstevel@tonic-gate { 45887c478bd9Sstevel@tonic-gate (void) signal(SIGQUIT, SIG_IGN); 45897c478bd9Sstevel@tonic-gate term++; 45907c478bd9Sstevel@tonic-gate } 45917c478bd9Sstevel@tonic-gate 45927c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 45937c478bd9Sstevel@tonic-gate static void 45947c478bd9Sstevel@tonic-gate onhup(int sig) 45957c478bd9Sstevel@tonic-gate { 45967c478bd9Sstevel@tonic-gate (void) signal(SIGHUP, SIG_IGN); 45977c478bd9Sstevel@tonic-gate term++; 45987c478bd9Sstevel@tonic-gate } 45997c478bd9Sstevel@tonic-gate 46007c478bd9Sstevel@tonic-gate static void 46017c478bd9Sstevel@tonic-gate tomodes(struct stat *sp) 46027c478bd9Sstevel@tonic-gate { 46037c478bd9Sstevel@tonic-gate uid_t uid; 46047c478bd9Sstevel@tonic-gate gid_t gid; 46057c478bd9Sstevel@tonic-gate 46067c478bd9Sstevel@tonic-gate bzero(dblock.dummy, TBLOCK); 46077c478bd9Sstevel@tonic-gate 46087c478bd9Sstevel@tonic-gate /* 46097c478bd9Sstevel@tonic-gate * If the uid or gid is too large, we can't put it into 46107c478bd9Sstevel@tonic-gate * the archive. We could fail to put anything in the 46117c478bd9Sstevel@tonic-gate * archive at all .. but most of the time the name service 46127c478bd9Sstevel@tonic-gate * will save the day when we do a lookup at restore time. 46137c478bd9Sstevel@tonic-gate * 46147c478bd9Sstevel@tonic-gate * Instead we choose a "safe" uid and gid, and fix up whether 46157c478bd9Sstevel@tonic-gate * or not the setuid and setgid bits are left set to extraction 46167c478bd9Sstevel@tonic-gate * time. 46177c478bd9Sstevel@tonic-gate */ 46187c478bd9Sstevel@tonic-gate if (Eflag) { 46197c478bd9Sstevel@tonic-gate if ((ulong_t)(uid = sp->st_uid) > (ulong_t)OCTAL7CHAR) { 46207c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_UID; 46217c478bd9Sstevel@tonic-gate Xtarhdr.x_uid = uid; 46227c478bd9Sstevel@tonic-gate } 46237c478bd9Sstevel@tonic-gate if ((ulong_t)(gid = sp->st_gid) > (ulong_t)OCTAL7CHAR) { 46247c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_GID; 46257c478bd9Sstevel@tonic-gate Xtarhdr.x_gid = gid; 46267c478bd9Sstevel@tonic-gate } 46277c478bd9Sstevel@tonic-gate if (sp->st_size > TAR_OFFSET_MAX) { 46287c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_SIZE; 46297c478bd9Sstevel@tonic-gate Xtarhdr.x_filesz = sp->st_size; 46307c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o, 46317c478bd9Sstevel@tonic-gate (off_t)0); 46327c478bd9Sstevel@tonic-gate } else 46337c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o, 46347c478bd9Sstevel@tonic-gate sp->st_size); 46357c478bd9Sstevel@tonic-gate } else { 46367c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o, 46377c478bd9Sstevel@tonic-gate sp->st_size); 46387c478bd9Sstevel@tonic-gate } 46397c478bd9Sstevel@tonic-gate if ((ulong_t)(uid = sp->st_uid) > (ulong_t)OCTAL7CHAR) 46407c478bd9Sstevel@tonic-gate uid = UID_NOBODY; 46417c478bd9Sstevel@tonic-gate if ((ulong_t)(gid = sp->st_gid) > (ulong_t)OCTAL7CHAR) 46427c478bd9Sstevel@tonic-gate gid = GID_NOBODY; 46437c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.gid, "%07lo", gid); 46447c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.uid, "%07lo", uid); 46457c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mode, "%07lo", sp->st_mode & POSIXMODES); 46467c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mtime, "%011lo", sp->st_mtime); 46477c478bd9Sstevel@tonic-gate } 46487c478bd9Sstevel@tonic-gate 46497c478bd9Sstevel@tonic-gate static int 46507c478bd9Sstevel@tonic-gate #ifdef EUC 46517c478bd9Sstevel@tonic-gate /* 46527c478bd9Sstevel@tonic-gate * Warning: the result of this function depends whether 'char' is a 46537c478bd9Sstevel@tonic-gate * signed or unsigned data type. This a source of potential 46547c478bd9Sstevel@tonic-gate * non-portability among heterogeneous systems. It is retained here 46557c478bd9Sstevel@tonic-gate * for backward compatibility. 46567c478bd9Sstevel@tonic-gate */ 46577c478bd9Sstevel@tonic-gate checksum_signed(union hblock *dblockp) 46587c478bd9Sstevel@tonic-gate #else 46597c478bd9Sstevel@tonic-gate checksum(union hblock *dblockp) 46607c478bd9Sstevel@tonic-gate #endif /* EUC */ 46617c478bd9Sstevel@tonic-gate { 46627c478bd9Sstevel@tonic-gate int i; 46637c478bd9Sstevel@tonic-gate char *cp; 46647c478bd9Sstevel@tonic-gate 46657c478bd9Sstevel@tonic-gate for (cp = dblockp->dbuf.chksum; 46667c478bd9Sstevel@tonic-gate cp < &dblockp->dbuf.chksum[sizeof (dblockp->dbuf.chksum)]; cp++) 46677c478bd9Sstevel@tonic-gate *cp = ' '; 46687c478bd9Sstevel@tonic-gate i = 0; 46697c478bd9Sstevel@tonic-gate for (cp = dblockp->dummy; cp < &(dblockp->dummy[TBLOCK]); cp++) 46707c478bd9Sstevel@tonic-gate i += *cp; 46717c478bd9Sstevel@tonic-gate return (i); 46727c478bd9Sstevel@tonic-gate } 46737c478bd9Sstevel@tonic-gate 46747c478bd9Sstevel@tonic-gate #ifdef EUC 46757c478bd9Sstevel@tonic-gate /* 46767c478bd9Sstevel@tonic-gate * Generate unsigned checksum, regardless of what C compiler is 46777c478bd9Sstevel@tonic-gate * used. Survives in the face of arbitrary 8-bit clean filenames, 46787c478bd9Sstevel@tonic-gate * e.g., internationalized filenames. 46797c478bd9Sstevel@tonic-gate */ 46807c478bd9Sstevel@tonic-gate static int 46817c478bd9Sstevel@tonic-gate checksum(union hblock *dblockp) 46827c478bd9Sstevel@tonic-gate { 46837c478bd9Sstevel@tonic-gate unsigned i; 46847c478bd9Sstevel@tonic-gate unsigned char *cp; 46857c478bd9Sstevel@tonic-gate 46867c478bd9Sstevel@tonic-gate for (cp = (unsigned char *) dblockp->dbuf.chksum; 46877c478bd9Sstevel@tonic-gate cp < (unsigned char *) 46887c478bd9Sstevel@tonic-gate &(dblockp->dbuf.chksum[sizeof (dblockp->dbuf.chksum)]); cp++) 46897c478bd9Sstevel@tonic-gate *cp = ' '; 46907c478bd9Sstevel@tonic-gate i = 0; 46917c478bd9Sstevel@tonic-gate for (cp = (unsigned char *) dblockp->dummy; 46927c478bd9Sstevel@tonic-gate cp < (unsigned char *) &(dblockp->dummy[TBLOCK]); cp++) 46937c478bd9Sstevel@tonic-gate i += *cp; 46947c478bd9Sstevel@tonic-gate 46957c478bd9Sstevel@tonic-gate return (i); 46967c478bd9Sstevel@tonic-gate } 46977c478bd9Sstevel@tonic-gate #endif /* EUC */ 46987c478bd9Sstevel@tonic-gate 46997c478bd9Sstevel@tonic-gate /* 47007c478bd9Sstevel@tonic-gate * If the w flag is set, output the action to be taken and the name of the 47017c478bd9Sstevel@tonic-gate * file. Perform the action if the user response is affirmative. 47027c478bd9Sstevel@tonic-gate */ 47037c478bd9Sstevel@tonic-gate 47047c478bd9Sstevel@tonic-gate static int 47057c478bd9Sstevel@tonic-gate checkw(char c, char *name) 47067c478bd9Sstevel@tonic-gate { 47077c478bd9Sstevel@tonic-gate if (wflag) { 47087c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%c ", c); 47097c478bd9Sstevel@tonic-gate if (vflag) 47107c478bd9Sstevel@tonic-gate longt(&stbuf, ' '); /* do we have acl info here */ 47117c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%s: ", name); 47123d63ea05Sas145665 if (yes() == 1) { 47137c478bd9Sstevel@tonic-gate return (1); 47147c478bd9Sstevel@tonic-gate } 47157c478bd9Sstevel@tonic-gate return (0); 47167c478bd9Sstevel@tonic-gate } 47177c478bd9Sstevel@tonic-gate return (1); 47187c478bd9Sstevel@tonic-gate } 47197c478bd9Sstevel@tonic-gate 47207c478bd9Sstevel@tonic-gate /* 47213a1dab68SRich Burridge * When the F flag is set, exclude RCS and SCCS directories (and any files 47223a1dab68SRich Burridge * or directories under them). If F is set twice, also exclude .o files, 47233a1dab68SRich Burridge * and files names errs, core, and a.out. 47243a1dab68SRich Burridge * 47253a1dab68SRich Burridge * Return 0 if file should be excluded, 1 otherwise. 47267c478bd9Sstevel@tonic-gate */ 47277c478bd9Sstevel@tonic-gate 47287c478bd9Sstevel@tonic-gate static int 47293a1dab68SRich Burridge checkf(char *longname, int is_dir, int howmuch) 47307c478bd9Sstevel@tonic-gate { 47313a1dab68SRich Burridge static char fullname[PATH_MAX + 1]; 47323a1dab68SRich Burridge char *dir, *name; 47337c478bd9Sstevel@tonic-gate 47343a1dab68SRich Burridge #if defined(O_XATTR) 47353a1dab68SRich Burridge /* 47363a1dab68SRich Burridge * If there is an xattr_buf structure associated with this file, 47373a1dab68SRich Burridge * always return 1. 47383a1dab68SRich Burridge */ 47393a1dab68SRich Burridge if (xattrp) { 47407c478bd9Sstevel@tonic-gate return (1); 47417c478bd9Sstevel@tonic-gate } 47423a1dab68SRich Burridge #endif 47433a1dab68SRich Burridge 47443a1dab68SRich Burridge /* 47453a1dab68SRich Burridge * First check to see if the base name is an RCS or SCCS directory. 47463a1dab68SRich Burridge */ 47473a1dab68SRich Burridge if (strlcpy(fullname, longname, sizeof (fullname)) >= sizeof (fullname)) 47487c478bd9Sstevel@tonic-gate return (1); 47493a1dab68SRich Burridge 47503a1dab68SRich Burridge name = basename(fullname); 47513a1dab68SRich Burridge if (is_dir) { 47523a1dab68SRich Burridge if ((strcmp(name, "SCCS") == 0) || (strcmp(name, "RCS") == 0)) 47537c478bd9Sstevel@tonic-gate return (0); 47543a1dab68SRich Burridge } 47553a1dab68SRich Burridge 47563a1dab68SRich Burridge /* 47573a1dab68SRich Burridge * If two -F command line options were given then exclude .o files, 47583a1dab68SRich Burridge * and files named errs, core, and a.out. 47593a1dab68SRich Burridge */ 47603a1dab68SRich Burridge if (howmuch > 1 && !is_dir) { 47613a1dab68SRich Burridge size_t l = strlen(name); 47623a1dab68SRich Burridge 47633a1dab68SRich Burridge if (l >= 3 && name[l - 2] == '.' && name[l - 1] == 'o') 47643a1dab68SRich Burridge return (0); 47657c478bd9Sstevel@tonic-gate if (strcmp(name, "core") == 0 || strcmp(name, "errs") == 0 || 47667c478bd9Sstevel@tonic-gate strcmp(name, "a.out") == 0) 47677c478bd9Sstevel@tonic-gate return (0); 47687c478bd9Sstevel@tonic-gate } 47697c478bd9Sstevel@tonic-gate 47703a1dab68SRich Burridge /* 47713a1dab68SRich Burridge * At this point, check to see if this file has a parent directory 47723a1dab68SRich Burridge * named RCS or SCCS. If so, then this file should be excluded too. 47733a1dab68SRich Burridge * The strcpy() operation is done again, because basename(3C) may 47743a1dab68SRich Burridge * modify the path string passed to it. 47753a1dab68SRich Burridge */ 47763a1dab68SRich Burridge if (strlcpy(fullname, longname, sizeof (fullname)) >= sizeof (fullname)) 47773a1dab68SRich Burridge return (1); 47783a1dab68SRich Burridge 47793a1dab68SRich Burridge dir = dirname(fullname); 47803a1dab68SRich Burridge while (strcmp(dir, ".") != 0) { 47813a1dab68SRich Burridge name = basename(dir); 47823a1dab68SRich Burridge if ((strcmp(name, "SCCS") == 0) || (strcmp(name, "RCS") == 0)) 47833a1dab68SRich Burridge return (0); 47843a1dab68SRich Burridge dir = dirname(dir); 47853a1dab68SRich Burridge } 47863a1dab68SRich Burridge 47877c478bd9Sstevel@tonic-gate return (1); 47887c478bd9Sstevel@tonic-gate } 47897c478bd9Sstevel@tonic-gate 47907c478bd9Sstevel@tonic-gate static int 47917c478bd9Sstevel@tonic-gate response(void) 47927c478bd9Sstevel@tonic-gate { 47937c478bd9Sstevel@tonic-gate int c; 47947c478bd9Sstevel@tonic-gate 47957c478bd9Sstevel@tonic-gate c = getchar(); 47967c478bd9Sstevel@tonic-gate if (c != '\n') 4797eace40a5Sceastha while (getchar() != '\n') 4798eace40a5Sceastha ; 47997c478bd9Sstevel@tonic-gate else c = 'n'; 48007c478bd9Sstevel@tonic-gate return ((c >= 'A' && c <= 'Z') ? c + ('a'-'A') : c); 48017c478bd9Sstevel@tonic-gate } 48027c478bd9Sstevel@tonic-gate 48037c478bd9Sstevel@tonic-gate /* Has file been modified since being put into archive? If so, return > 0. */ 48047c478bd9Sstevel@tonic-gate 4805d67944fbSScott Rotondo static off_t lookup(char *); 4806d67944fbSScott Rotondo 48077c478bd9Sstevel@tonic-gate static int 48087c478bd9Sstevel@tonic-gate checkupdate(char *arg) 48097c478bd9Sstevel@tonic-gate { 48107c478bd9Sstevel@tonic-gate char name[PATH_MAX+1]; 48117c478bd9Sstevel@tonic-gate time_t mtime; 48127c478bd9Sstevel@tonic-gate long nsecs; 48137c478bd9Sstevel@tonic-gate off_t seekp; 48147c478bd9Sstevel@tonic-gate 48157c478bd9Sstevel@tonic-gate rewind(tfile); 48167c478bd9Sstevel@tonic-gate if ((seekp = lookup(arg)) < 0) 48177c478bd9Sstevel@tonic-gate return (1); 48187c478bd9Sstevel@tonic-gate (void) fseek(tfile, seekp, 0); 48197c478bd9Sstevel@tonic-gate (void) fscanf(tfile, "%s %ld.%ld", name, &mtime, &nsecs); 48207c478bd9Sstevel@tonic-gate 48217c478bd9Sstevel@tonic-gate /* 48227c478bd9Sstevel@tonic-gate * Unless nanoseconds were stored in the file, only use seconds for 48237c478bd9Sstevel@tonic-gate * comparison of time. Nanoseconds are stored when -E is specified. 48247c478bd9Sstevel@tonic-gate */ 48257c478bd9Sstevel@tonic-gate if (Eflag == 0) 48267c478bd9Sstevel@tonic-gate return (stbuf.st_mtime > mtime); 48277c478bd9Sstevel@tonic-gate 48287c478bd9Sstevel@tonic-gate if ((stbuf.st_mtime < mtime) || 48297c478bd9Sstevel@tonic-gate ((stbuf.st_mtime == mtime) && (stbuf.st_mtim.tv_nsec <= nsecs))) 48307c478bd9Sstevel@tonic-gate return (0); 48317c478bd9Sstevel@tonic-gate return (1); 48327c478bd9Sstevel@tonic-gate } 48337c478bd9Sstevel@tonic-gate 48347c478bd9Sstevel@tonic-gate 48357c478bd9Sstevel@tonic-gate /* 48367c478bd9Sstevel@tonic-gate * newvol get new floppy (or tape) volume 48377c478bd9Sstevel@tonic-gate * 48387c478bd9Sstevel@tonic-gate * newvol(); resets tapepos and first to TRUE, prompts for 48397c478bd9Sstevel@tonic-gate * for new volume, and waits. 48407c478bd9Sstevel@tonic-gate * if dumping, end-of-file is written onto the tape. 48417c478bd9Sstevel@tonic-gate */ 48427c478bd9Sstevel@tonic-gate 48437c478bd9Sstevel@tonic-gate static void 48447c478bd9Sstevel@tonic-gate newvol(void) 48457c478bd9Sstevel@tonic-gate { 48467c478bd9Sstevel@tonic-gate int c; 48477c478bd9Sstevel@tonic-gate 48487c478bd9Sstevel@tonic-gate if (dumping) { 4849*28c4d110SJoshua M. Clulow dlog("newvol called with 'dumping' set\n"); 48507c478bd9Sstevel@tonic-gate putempty((blkcnt_t)2); /* 2 EOT marks */ 48517c478bd9Sstevel@tonic-gate closevol(); 48527c478bd9Sstevel@tonic-gate flushtape(); 48537c478bd9Sstevel@tonic-gate sync(); 48547c478bd9Sstevel@tonic-gate tapepos = 0; 48557c478bd9Sstevel@tonic-gate } else 48567c478bd9Sstevel@tonic-gate first = TRUE; 48577c478bd9Sstevel@tonic-gate if (close(mt) != 0) 48587c478bd9Sstevel@tonic-gate vperror(2, gettext("close error")); 48597c478bd9Sstevel@tonic-gate mt = 0; 48607c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 48617c478bd9Sstevel@tonic-gate "tar: \007please insert new volume, then press RETURN.")); 48627c478bd9Sstevel@tonic-gate (void) fseek(stdin, (off_t)0, 2); /* scan over read-ahead */ 48637c478bd9Sstevel@tonic-gate while ((c = getchar()) != '\n' && ! term) 48647c478bd9Sstevel@tonic-gate if (c == EOF) 48657c478bd9Sstevel@tonic-gate done(Errflg); 48667c478bd9Sstevel@tonic-gate if (term) 48677c478bd9Sstevel@tonic-gate done(Errflg); 48687c478bd9Sstevel@tonic-gate 48697c478bd9Sstevel@tonic-gate errno = 0; 48707c478bd9Sstevel@tonic-gate 48717c478bd9Sstevel@tonic-gate if (strcmp(usefile, "-") == 0) { 48727c478bd9Sstevel@tonic-gate mt = dup(1); 48737c478bd9Sstevel@tonic-gate } else { 48747c478bd9Sstevel@tonic-gate mt = open(usefile, dumping ? update : 0); 48757c478bd9Sstevel@tonic-gate } 48767c478bd9Sstevel@tonic-gate 48777c478bd9Sstevel@tonic-gate if (mt < 0) { 48787c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 48797c478bd9Sstevel@tonic-gate "tar: cannot reopen %s (%s)\n"), 48807c478bd9Sstevel@tonic-gate dumping ? gettext("output") : gettext("input"), usefile); 48817c478bd9Sstevel@tonic-gate 4882*28c4d110SJoshua M. Clulow dlog("update=%d, usefile=%s ", update, usefile); 4883*28c4d110SJoshua M. Clulow dlog("mt=%d, [%s]\n", mt, strerror(errno)); 48847c478bd9Sstevel@tonic-gate 48857c478bd9Sstevel@tonic-gate done(2); 48867c478bd9Sstevel@tonic-gate } 48877c478bd9Sstevel@tonic-gate } 48887c478bd9Sstevel@tonic-gate 48897c478bd9Sstevel@tonic-gate /* 48907c478bd9Sstevel@tonic-gate * Write a trailer portion to close out the current output volume. 48917c478bd9Sstevel@tonic-gate */ 48927c478bd9Sstevel@tonic-gate 48937c478bd9Sstevel@tonic-gate static void 48947c478bd9Sstevel@tonic-gate closevol(void) 48957c478bd9Sstevel@tonic-gate { 48967c478bd9Sstevel@tonic-gate if (mulvol) { 48977c478bd9Sstevel@tonic-gate /* 48987c478bd9Sstevel@tonic-gate * blocklim does not count the 2 EOT marks; 48997c478bd9Sstevel@tonic-gate * tapepos does count the 2 EOT marks; 49007c478bd9Sstevel@tonic-gate * therefore we need the +2 below. 49017c478bd9Sstevel@tonic-gate */ 49027c478bd9Sstevel@tonic-gate putempty(blocklim + (blkcnt_t)2 - tapepos); 49037c478bd9Sstevel@tonic-gate } 49047c478bd9Sstevel@tonic-gate } 49057c478bd9Sstevel@tonic-gate 49067c478bd9Sstevel@tonic-gate static void 49077c478bd9Sstevel@tonic-gate done(int n) 49087c478bd9Sstevel@tonic-gate { 490931732068SRich Burridge /* 491031732068SRich Burridge * If we were terminated in some way, and we would otherwise have 491131732068SRich Burridge * exited with a value of 0, adjust to 1, so that external callers 491231732068SRich Burridge * can determine this by looking at the exit status. 491331732068SRich Burridge */ 491431732068SRich Burridge if (term && n == 0) 491531732068SRich Burridge n = 1; 491631732068SRich Burridge 49178f1d104bSRich Burridge if (tfile != NULL) 49187c478bd9Sstevel@tonic-gate (void) unlink(tname); 491936802407SRich Burridge if (compress_opt != NULL) 492036802407SRich Burridge (void) free(compress_opt); 49217c478bd9Sstevel@tonic-gate if (mt > 0) { 49227c478bd9Sstevel@tonic-gate if ((close(mt) != 0) || (fclose(stdout) != 0)) { 49237c478bd9Sstevel@tonic-gate perror(gettext("tar: close error")); 49247c478bd9Sstevel@tonic-gate exit(2); 49257c478bd9Sstevel@tonic-gate } 49267c478bd9Sstevel@tonic-gate } 4927c536b1f9SRobert Mustacchi /* 4928c536b1f9SRobert Mustacchi * If we have a compression child, we should have a child process that 4929c536b1f9SRobert Mustacchi * we're waiting for to finish compressing or uncompressing the tar 4930c536b1f9SRobert Mustacchi * stream. 4931c536b1f9SRobert Mustacchi */ 4932c536b1f9SRobert Mustacchi if (comp_pid != 0) 4933c536b1f9SRobert Mustacchi wait_pid(comp_pid); 49347c478bd9Sstevel@tonic-gate exit(n); 49357c478bd9Sstevel@tonic-gate } 49367c478bd9Sstevel@tonic-gate 49377c478bd9Sstevel@tonic-gate /* 49387c478bd9Sstevel@tonic-gate * Determine if s1 is a prefix portion of s2 (or the same as s2). 49397c478bd9Sstevel@tonic-gate */ 49407c478bd9Sstevel@tonic-gate 49417c478bd9Sstevel@tonic-gate static int 49427c478bd9Sstevel@tonic-gate is_prefix(char *s1, char *s2) 49437c478bd9Sstevel@tonic-gate { 49447c478bd9Sstevel@tonic-gate while (*s1) 49457c478bd9Sstevel@tonic-gate if (*s1++ != *s2++) 49467c478bd9Sstevel@tonic-gate return (0); 49477c478bd9Sstevel@tonic-gate if (*s2) 49487c478bd9Sstevel@tonic-gate return (*s2 == '/'); 49497c478bd9Sstevel@tonic-gate return (1); 49507c478bd9Sstevel@tonic-gate } 49517c478bd9Sstevel@tonic-gate 49527c478bd9Sstevel@tonic-gate /* 49537c478bd9Sstevel@tonic-gate * lookup and bsrch look through tfile entries to find a match for a name. 49547c478bd9Sstevel@tonic-gate * The name can be up to PATH_MAX bytes. bsrch compares what it sees between 49557c478bd9Sstevel@tonic-gate * a pair of newline chars, so the buffer it uses must be long enough for 49567c478bd9Sstevel@tonic-gate * two lines: name and modification time as well as period, newline and space. 49577c478bd9Sstevel@tonic-gate * 49587c478bd9Sstevel@tonic-gate * A kludge was added to bsrch to take care of matching on the first entry 49597c478bd9Sstevel@tonic-gate * in the file--there is no leading newline. So, if we are reading from the 49607c478bd9Sstevel@tonic-gate * start of the file, read into byte two and set the first byte to a newline. 49617c478bd9Sstevel@tonic-gate * Otherwise, the first entry cannot be matched. 49627c478bd9Sstevel@tonic-gate * 49637c478bd9Sstevel@tonic-gate */ 49647c478bd9Sstevel@tonic-gate 49657c478bd9Sstevel@tonic-gate #define N (2 * (PATH_MAX + TIME_MAX_DIGITS + LONG_MAX_DIGITS + 3)) 49667c478bd9Sstevel@tonic-gate static off_t 49677c478bd9Sstevel@tonic-gate lookup(char *s) 49687c478bd9Sstevel@tonic-gate { 49697c478bd9Sstevel@tonic-gate int i; 49707c478bd9Sstevel@tonic-gate off_t a; 49717c478bd9Sstevel@tonic-gate 49727c478bd9Sstevel@tonic-gate for (i = 0; s[i]; i++) 49737c478bd9Sstevel@tonic-gate if (s[i] == ' ') 49747c478bd9Sstevel@tonic-gate break; 49757c478bd9Sstevel@tonic-gate a = bsrch(s, i, low, high); 49767c478bd9Sstevel@tonic-gate return (a); 49777c478bd9Sstevel@tonic-gate } 49787c478bd9Sstevel@tonic-gate 49797c478bd9Sstevel@tonic-gate static off_t 49807c478bd9Sstevel@tonic-gate bsrch(char *s, int n, off_t l, off_t h) 49817c478bd9Sstevel@tonic-gate { 49827c478bd9Sstevel@tonic-gate int i, j; 49837c478bd9Sstevel@tonic-gate char b[N]; 49847c478bd9Sstevel@tonic-gate off_t m, m1; 49857c478bd9Sstevel@tonic-gate 49867c478bd9Sstevel@tonic-gate 49877c478bd9Sstevel@tonic-gate loop: 49887c478bd9Sstevel@tonic-gate if (l >= h) 49897c478bd9Sstevel@tonic-gate return ((off_t)-1); 49907c478bd9Sstevel@tonic-gate m = l + (h-l)/2 - N/2; 49917c478bd9Sstevel@tonic-gate if (m < l) 49927c478bd9Sstevel@tonic-gate m = l; 49937c478bd9Sstevel@tonic-gate (void) fseek(tfile, m, 0); 49947c478bd9Sstevel@tonic-gate if (m == 0) { 49957c478bd9Sstevel@tonic-gate (void) fread(b+1, 1, N-1, tfile); 49967c478bd9Sstevel@tonic-gate b[0] = '\n'; 49977c478bd9Sstevel@tonic-gate m--; 49987c478bd9Sstevel@tonic-gate } else 49997c478bd9Sstevel@tonic-gate (void) fread(b, 1, N, tfile); 50007c478bd9Sstevel@tonic-gate for (i = 0; i < N; i++) { 50017c478bd9Sstevel@tonic-gate if (b[i] == '\n') 50027c478bd9Sstevel@tonic-gate break; 50037c478bd9Sstevel@tonic-gate m++; 50047c478bd9Sstevel@tonic-gate } 50057c478bd9Sstevel@tonic-gate if (m >= h) 50067c478bd9Sstevel@tonic-gate return ((off_t)-1); 50077c478bd9Sstevel@tonic-gate m1 = m; 50087c478bd9Sstevel@tonic-gate j = i; 50097c478bd9Sstevel@tonic-gate for (i++; i < N; i++) { 50107c478bd9Sstevel@tonic-gate m1++; 50117c478bd9Sstevel@tonic-gate if (b[i] == '\n') 50127c478bd9Sstevel@tonic-gate break; 50137c478bd9Sstevel@tonic-gate } 50147c478bd9Sstevel@tonic-gate i = cmp(b+j, s, n); 50157c478bd9Sstevel@tonic-gate if (i < 0) { 50167c478bd9Sstevel@tonic-gate h = m; 50177c478bd9Sstevel@tonic-gate goto loop; 50187c478bd9Sstevel@tonic-gate } 50197c478bd9Sstevel@tonic-gate if (i > 0) { 50207c478bd9Sstevel@tonic-gate l = m1; 50217c478bd9Sstevel@tonic-gate goto loop; 50227c478bd9Sstevel@tonic-gate } 50237c478bd9Sstevel@tonic-gate if (m < 0) 50247c478bd9Sstevel@tonic-gate m = 0; 50257c478bd9Sstevel@tonic-gate return (m); 50267c478bd9Sstevel@tonic-gate } 50277c478bd9Sstevel@tonic-gate 50287c478bd9Sstevel@tonic-gate static int 50297c478bd9Sstevel@tonic-gate cmp(char *b, char *s, int n) 50307c478bd9Sstevel@tonic-gate { 50317c478bd9Sstevel@tonic-gate int i; 50327c478bd9Sstevel@tonic-gate 50337c478bd9Sstevel@tonic-gate assert(b[0] == '\n'); 50347c478bd9Sstevel@tonic-gate 50357c478bd9Sstevel@tonic-gate for (i = 0; i < n; i++) { 50367c478bd9Sstevel@tonic-gate if (b[i+1] > s[i]) 50377c478bd9Sstevel@tonic-gate return (-1); 50387c478bd9Sstevel@tonic-gate if (b[i+1] < s[i]) 50397c478bd9Sstevel@tonic-gate return (1); 50407c478bd9Sstevel@tonic-gate } 50417c478bd9Sstevel@tonic-gate return (b[i+1] == ' '? 0 : -1); 50427c478bd9Sstevel@tonic-gate } 50437c478bd9Sstevel@tonic-gate 50447c478bd9Sstevel@tonic-gate 50457c478bd9Sstevel@tonic-gate /* 50467c478bd9Sstevel@tonic-gate * seekdisk seek to next file on archive 50477c478bd9Sstevel@tonic-gate * 50487c478bd9Sstevel@tonic-gate * called by passtape() only 50497c478bd9Sstevel@tonic-gate * 50507c478bd9Sstevel@tonic-gate * WARNING: expects "nblock" to be set, that is, readtape() to have 50517c478bd9Sstevel@tonic-gate * already been called. Since passtape() is only called 50527c478bd9Sstevel@tonic-gate * after a file header block has been read (why else would 50537c478bd9Sstevel@tonic-gate * we skip to next file?), this is currently safe. 50547c478bd9Sstevel@tonic-gate * 50557c478bd9Sstevel@tonic-gate * changed to guarantee SYS_BLOCK boundary 50567c478bd9Sstevel@tonic-gate */ 50577c478bd9Sstevel@tonic-gate 50587c478bd9Sstevel@tonic-gate static void 50597c478bd9Sstevel@tonic-gate seekdisk(blkcnt_t blocks) 50607c478bd9Sstevel@tonic-gate { 50617c478bd9Sstevel@tonic-gate off_t seekval; 50627c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 50637c478bd9Sstevel@tonic-gate /* handle non-multiple of SYS_BLOCK */ 50647c478bd9Sstevel@tonic-gate blkcnt_t nxb; /* # extra blocks */ 50657c478bd9Sstevel@tonic-gate #endif 50667c478bd9Sstevel@tonic-gate 50677c478bd9Sstevel@tonic-gate tapepos += blocks; 5068*28c4d110SJoshua M. Clulow dlog("seekdisk(%" FMT_blkcnt_t ") called\n", blocks); 50697c478bd9Sstevel@tonic-gate if (recno + blocks <= nblock) { 50707c478bd9Sstevel@tonic-gate recno += blocks; 50717c478bd9Sstevel@tonic-gate return; 50727c478bd9Sstevel@tonic-gate } 50737c478bd9Sstevel@tonic-gate if (recno > nblock) 50747c478bd9Sstevel@tonic-gate recno = nblock; 50757c478bd9Sstevel@tonic-gate seekval = (off_t)blocks - (nblock - recno); 50767c478bd9Sstevel@tonic-gate recno = nblock; /* so readtape() reads next time through */ 50777c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 50787c478bd9Sstevel@tonic-gate nxb = (blkcnt_t)(seekval % (off_t)(SYS_BLOCK / TBLOCK)); 5079*28c4d110SJoshua M. Clulow dlog("xtrablks=%" FMT_blkcnt_t " seekval=%" FMT_blkcnt_t " blks\n", 50807c478bd9Sstevel@tonic-gate nxb, seekval); 50817c478bd9Sstevel@tonic-gate if (nxb && nxb > seekval) /* don't seek--we'll read */ 50827c478bd9Sstevel@tonic-gate goto noseek; 50837c478bd9Sstevel@tonic-gate seekval -= nxb; /* don't seek quite so far */ 50847c478bd9Sstevel@tonic-gate #endif 50857c478bd9Sstevel@tonic-gate if (lseek(mt, (off_t)(TBLOCK * seekval), 1) == (off_t)-1) { 50867c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 50877c478bd9Sstevel@tonic-gate "tar: device seek error\n")); 50887c478bd9Sstevel@tonic-gate done(3); 50897c478bd9Sstevel@tonic-gate } 50907c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 50917c478bd9Sstevel@tonic-gate /* read those extra blocks */ 50927c478bd9Sstevel@tonic-gate noseek: 50937c478bd9Sstevel@tonic-gate if (nxb) { 5094*28c4d110SJoshua M. Clulow dlog("reading extra blocks\n"); 50957c478bd9Sstevel@tonic-gate if (read(mt, tbuf, TBLOCK*nblock) < 0) { 50967c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 50977c478bd9Sstevel@tonic-gate "tar: read error while skipping file\n")); 50987c478bd9Sstevel@tonic-gate done(8); 50997c478bd9Sstevel@tonic-gate } 51007c478bd9Sstevel@tonic-gate recno = nxb; /* so we don't read in next readtape() */ 51017c478bd9Sstevel@tonic-gate } 51027c478bd9Sstevel@tonic-gate #endif 51037c478bd9Sstevel@tonic-gate } 51047c478bd9Sstevel@tonic-gate 51057c478bd9Sstevel@tonic-gate static void 51067c478bd9Sstevel@tonic-gate readtape(char *buffer) 51077c478bd9Sstevel@tonic-gate { 51087c478bd9Sstevel@tonic-gate int i, j; 51097c478bd9Sstevel@tonic-gate 51107c478bd9Sstevel@tonic-gate ++tapepos; 51117c478bd9Sstevel@tonic-gate if (recno >= nblock || first) { 51127c478bd9Sstevel@tonic-gate if (first) { 51137c478bd9Sstevel@tonic-gate /* 51147c478bd9Sstevel@tonic-gate * set the number of blocks to read initially, based on 51157c478bd9Sstevel@tonic-gate * the defined defaults for the device, or on the 51167c478bd9Sstevel@tonic-gate * explicit block factor given. 51177c478bd9Sstevel@tonic-gate */ 511853329f75SRich Burridge if (bflag || defaults_used || NotTape) 51197c478bd9Sstevel@tonic-gate j = nblock; 51207c478bd9Sstevel@tonic-gate else 51217c478bd9Sstevel@tonic-gate j = NBLOCK; 51227c478bd9Sstevel@tonic-gate } else 51237c478bd9Sstevel@tonic-gate j = nblock; 51247c478bd9Sstevel@tonic-gate 51257c478bd9Sstevel@tonic-gate if ((i = read(mt, tbuf, TBLOCK*j)) < 0) { 51267c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 51277c478bd9Sstevel@tonic-gate "tar: tape read error\n")); 51287c478bd9Sstevel@tonic-gate done(3); 51297c478bd9Sstevel@tonic-gate /* 5130b35e803cSss161016 * i == 0 and !rflag means that EOF is reached and we are 5131b35e803cSss161016 * trying to update or replace an empty tar file, so exit 5132b35e803cSss161016 * with an error. 5133b35e803cSss161016 * 5134b35e803cSss161016 * If i == 0 and !first and NotTape, it means the pointer 5135b35e803cSss161016 * has gone past the EOF. It could happen if two processes 5136b35e803cSss161016 * try to update the same tar file simultaneously. So exit 5137b35e803cSss161016 * with an error. 51387c478bd9Sstevel@tonic-gate */ 5139b35e803cSss161016 5140b35e803cSss161016 } else if (i == 0) { 5141b35e803cSss161016 if (first && !rflag) { 51427c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 51437c478bd9Sstevel@tonic-gate "tar: blocksize = %d\n"), i); 51447c478bd9Sstevel@tonic-gate done(Errflg); 5145b35e803cSss161016 } else if (!first && (!rflag || NotTape)) { 51467c478bd9Sstevel@tonic-gate mterr("read", 0, 2); 5147b35e803cSss161016 } 51487c478bd9Sstevel@tonic-gate } else if ((!first || Bflag) && i != TBLOCK*j) { 51497c478bd9Sstevel@tonic-gate /* 51507c478bd9Sstevel@tonic-gate * Short read - try to get the remaining bytes. 51517c478bd9Sstevel@tonic-gate */ 51527c478bd9Sstevel@tonic-gate 51537c478bd9Sstevel@tonic-gate int remaining = (TBLOCK * j) - i; 51547c478bd9Sstevel@tonic-gate char *b = (char *)tbuf + i; 51557c478bd9Sstevel@tonic-gate int r; 51567c478bd9Sstevel@tonic-gate 51577c478bd9Sstevel@tonic-gate do { 51587c478bd9Sstevel@tonic-gate if ((r = read(mt, b, remaining)) < 0) { 51597c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 51607c478bd9Sstevel@tonic-gate gettext("tar: tape read error\n")); 51617c478bd9Sstevel@tonic-gate done(3); 51627c478bd9Sstevel@tonic-gate } 51637c478bd9Sstevel@tonic-gate b += r; 51647c478bd9Sstevel@tonic-gate remaining -= r; 51657c478bd9Sstevel@tonic-gate i += r; 51667c478bd9Sstevel@tonic-gate } while (remaining > 0 && r != 0); 51677c478bd9Sstevel@tonic-gate } 51687c478bd9Sstevel@tonic-gate if (first) { 51697c478bd9Sstevel@tonic-gate if ((i % TBLOCK) != 0) { 51707c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 51717c478bd9Sstevel@tonic-gate "tar: tape blocksize error\n")); 51727c478bd9Sstevel@tonic-gate done(3); 51737c478bd9Sstevel@tonic-gate } 51747c478bd9Sstevel@tonic-gate i /= TBLOCK; 51757c478bd9Sstevel@tonic-gate if (vflag && i != nblock && i != 1) { 51767c478bd9Sstevel@tonic-gate if (!NotTape) 51777c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 51787c478bd9Sstevel@tonic-gate "tar: blocksize = %d\n"), i); 51797c478bd9Sstevel@tonic-gate } 51807c478bd9Sstevel@tonic-gate 51817c478bd9Sstevel@tonic-gate /* 51827c478bd9Sstevel@tonic-gate * If we are reading a tape, then a short read is 51837c478bd9Sstevel@tonic-gate * understood to signify that the amount read is 51847c478bd9Sstevel@tonic-gate * the tape's actual blocking factor. We adapt 51857c478bd9Sstevel@tonic-gate * nblock accordingly. There is no reason to do 51867c478bd9Sstevel@tonic-gate * this when the device is not blocked. 51877c478bd9Sstevel@tonic-gate */ 51887c478bd9Sstevel@tonic-gate 51897c478bd9Sstevel@tonic-gate if (!NotTape) 51907c478bd9Sstevel@tonic-gate nblock = i; 51917c478bd9Sstevel@tonic-gate } 51927c478bd9Sstevel@tonic-gate recno = 0; 51937c478bd9Sstevel@tonic-gate } 51947c478bd9Sstevel@tonic-gate 51957c478bd9Sstevel@tonic-gate first = FALSE; 51967c478bd9Sstevel@tonic-gate copy(buffer, &tbuf[recno++]); 51977c478bd9Sstevel@tonic-gate } 51987c478bd9Sstevel@tonic-gate 51997c478bd9Sstevel@tonic-gate 52007c478bd9Sstevel@tonic-gate /* 52017c478bd9Sstevel@tonic-gate * replacement for writetape. 52027c478bd9Sstevel@tonic-gate */ 52037c478bd9Sstevel@tonic-gate 52047c478bd9Sstevel@tonic-gate static int 52057c478bd9Sstevel@tonic-gate writetbuf(char *buffer, int n) 52067c478bd9Sstevel@tonic-gate { 52077c478bd9Sstevel@tonic-gate int i; 52087c478bd9Sstevel@tonic-gate 52097c478bd9Sstevel@tonic-gate tapepos += n; /* output block count */ 52107c478bd9Sstevel@tonic-gate 52117c478bd9Sstevel@tonic-gate if (recno >= nblock) { 52127c478bd9Sstevel@tonic-gate i = write(mt, (char *)tbuf, TBLOCK*nblock); 52137c478bd9Sstevel@tonic-gate if (i != TBLOCK*nblock) 52147c478bd9Sstevel@tonic-gate mterr("write", i, 2); 52157c478bd9Sstevel@tonic-gate recno = 0; 52167c478bd9Sstevel@tonic-gate } 52177c478bd9Sstevel@tonic-gate 52187c478bd9Sstevel@tonic-gate /* 52197c478bd9Sstevel@tonic-gate * Special case: We have an empty tape buffer, and the 52207c478bd9Sstevel@tonic-gate * users data size is >= the tape block size: Avoid 52217c478bd9Sstevel@tonic-gate * the bcopy and dma direct to tape. BIG WIN. Add the 52227c478bd9Sstevel@tonic-gate * residual to the tape buffer. 52237c478bd9Sstevel@tonic-gate */ 52247c478bd9Sstevel@tonic-gate while (recno == 0 && n >= nblock) { 52257c478bd9Sstevel@tonic-gate i = (int)write(mt, buffer, TBLOCK*nblock); 52267c478bd9Sstevel@tonic-gate if (i != TBLOCK*nblock) 52277c478bd9Sstevel@tonic-gate mterr("write", i, 2); 52287c478bd9Sstevel@tonic-gate n -= nblock; 52297c478bd9Sstevel@tonic-gate buffer += (nblock * TBLOCK); 52307c478bd9Sstevel@tonic-gate } 52317c478bd9Sstevel@tonic-gate 52327c478bd9Sstevel@tonic-gate while (n-- > 0) { 52337c478bd9Sstevel@tonic-gate (void) memcpy((char *)&tbuf[recno++], buffer, TBLOCK); 52347c478bd9Sstevel@tonic-gate buffer += TBLOCK; 52357c478bd9Sstevel@tonic-gate if (recno >= nblock) { 52367c478bd9Sstevel@tonic-gate i = (int)write(mt, (char *)tbuf, TBLOCK*nblock); 52377c478bd9Sstevel@tonic-gate if (i != TBLOCK*nblock) 52387c478bd9Sstevel@tonic-gate mterr("write", i, 2); 52397c478bd9Sstevel@tonic-gate recno = 0; 52407c478bd9Sstevel@tonic-gate } 52417c478bd9Sstevel@tonic-gate } 52427c478bd9Sstevel@tonic-gate 52437c478bd9Sstevel@tonic-gate /* Tell the user how much to write to get in sync */ 52447c478bd9Sstevel@tonic-gate return (nblock - recno); 52457c478bd9Sstevel@tonic-gate } 52467c478bd9Sstevel@tonic-gate 52477c478bd9Sstevel@tonic-gate /* 52487c478bd9Sstevel@tonic-gate * backtape - reposition tape after reading soft "EOF" record 52497c478bd9Sstevel@tonic-gate * 52507c478bd9Sstevel@tonic-gate * Backtape tries to reposition the tape back over the EOF 52517c478bd9Sstevel@tonic-gate * record. This is for the 'u' and 'r' function letters so that the 52527c478bd9Sstevel@tonic-gate * tape can be extended. This code is not well designed, but 52537c478bd9Sstevel@tonic-gate * I'm confident that the only callers who care about the 52547c478bd9Sstevel@tonic-gate * backspace-over-EOF feature are those involved in 'u' and 'r'. 52557c478bd9Sstevel@tonic-gate * 52567c478bd9Sstevel@tonic-gate * The proper way to backup the tape is through the use of mtio. 52577c478bd9Sstevel@tonic-gate * Earlier spins used lseek combined with reads in a confusing 52587c478bd9Sstevel@tonic-gate * maneuver that only worked on 4.x, but shouldn't have, even 52597c478bd9Sstevel@tonic-gate * there. Lseeks are explicitly not supported for tape devices. 52607c478bd9Sstevel@tonic-gate */ 52617c478bd9Sstevel@tonic-gate 52627c478bd9Sstevel@tonic-gate static void 52637c478bd9Sstevel@tonic-gate backtape(void) 52647c478bd9Sstevel@tonic-gate { 52657c478bd9Sstevel@tonic-gate struct mtop mtcmd; 5266*28c4d110SJoshua M. Clulow dlog("backtape() called, recno=%" FMT_blkcnt_t " nblock=%d\n", recno, 52677c478bd9Sstevel@tonic-gate nblock); 52687c478bd9Sstevel@tonic-gate /* 52697c478bd9Sstevel@tonic-gate * Backup to the position in the archive where the record 52707c478bd9Sstevel@tonic-gate * currently sitting in the tbuf buffer is situated. 52717c478bd9Sstevel@tonic-gate */ 52727c478bd9Sstevel@tonic-gate 52737c478bd9Sstevel@tonic-gate if (NotTape) { 52747c478bd9Sstevel@tonic-gate /* 52757c478bd9Sstevel@tonic-gate * For non-tape devices, this means lseeking to the 52767c478bd9Sstevel@tonic-gate * correct position. The absolute location tapepos-recno 52777c478bd9Sstevel@tonic-gate * should be the beginning of the current record. 52787c478bd9Sstevel@tonic-gate */ 52797c478bd9Sstevel@tonic-gate 52807c478bd9Sstevel@tonic-gate if (lseek(mt, (off_t)(TBLOCK*(tapepos-recno)), SEEK_SET) == 52817c478bd9Sstevel@tonic-gate (off_t)-1) { 52827c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 52837c478bd9Sstevel@tonic-gate gettext("tar: lseek to end of archive failed\n")); 52847c478bd9Sstevel@tonic-gate done(4); 52857c478bd9Sstevel@tonic-gate } 52867c478bd9Sstevel@tonic-gate } else { 52877c478bd9Sstevel@tonic-gate /* 52887c478bd9Sstevel@tonic-gate * For tape devices, we backup over the most recently 52897c478bd9Sstevel@tonic-gate * read record. 52907c478bd9Sstevel@tonic-gate */ 52917c478bd9Sstevel@tonic-gate 52927c478bd9Sstevel@tonic-gate mtcmd.mt_op = MTBSR; 52937c478bd9Sstevel@tonic-gate mtcmd.mt_count = 1; 52947c478bd9Sstevel@tonic-gate 52957c478bd9Sstevel@tonic-gate if (ioctl(mt, MTIOCTOP, &mtcmd) < 0) { 52967c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 52977c478bd9Sstevel@tonic-gate gettext("tar: backspace over record failed\n")); 52987c478bd9Sstevel@tonic-gate done(4); 52997c478bd9Sstevel@tonic-gate } 53007c478bd9Sstevel@tonic-gate } 53017c478bd9Sstevel@tonic-gate 53027c478bd9Sstevel@tonic-gate /* 53037c478bd9Sstevel@tonic-gate * Decrement the tape and tbuf buffer indices to prepare for the 53047c478bd9Sstevel@tonic-gate * coming write to overwrite the soft EOF record. 53057c478bd9Sstevel@tonic-gate */ 53067c478bd9Sstevel@tonic-gate 53077c478bd9Sstevel@tonic-gate recno--; 53087c478bd9Sstevel@tonic-gate tapepos--; 53097c478bd9Sstevel@tonic-gate } 53107c478bd9Sstevel@tonic-gate 53117c478bd9Sstevel@tonic-gate 53127c478bd9Sstevel@tonic-gate /* 53137c478bd9Sstevel@tonic-gate * flushtape write buffered block(s) onto tape 53147c478bd9Sstevel@tonic-gate * 53157c478bd9Sstevel@tonic-gate * recno points to next free block in tbuf. If nonzero, a write is done. 53167c478bd9Sstevel@tonic-gate * Care is taken to write in multiples of SYS_BLOCK when device is 53177c478bd9Sstevel@tonic-gate * non-magtape in case raw i/o is used. 53187c478bd9Sstevel@tonic-gate * 53197c478bd9Sstevel@tonic-gate * NOTE: this is called by writetape() to do the actual writing 53207c478bd9Sstevel@tonic-gate */ 53217c478bd9Sstevel@tonic-gate 53227c478bd9Sstevel@tonic-gate static void 53237c478bd9Sstevel@tonic-gate flushtape(void) 53247c478bd9Sstevel@tonic-gate { 5325*28c4d110SJoshua M. Clulow dlog("flushtape() called, recno=%" FMT_blkcnt_t "\n", recno); 53267c478bd9Sstevel@tonic-gate if (recno > 0) { /* anything buffered? */ 53277c478bd9Sstevel@tonic-gate if (NotTape) { 53287c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 53297c478bd9Sstevel@tonic-gate int i; 53307c478bd9Sstevel@tonic-gate 53317c478bd9Sstevel@tonic-gate /* 53327c478bd9Sstevel@tonic-gate * an odd-block write can only happen when 53337c478bd9Sstevel@tonic-gate * we are at the end of a volume that is not a tape. 53347c478bd9Sstevel@tonic-gate * Here we round recno up to an even SYS_BLOCK 53357c478bd9Sstevel@tonic-gate * boundary. 53367c478bd9Sstevel@tonic-gate */ 53377c478bd9Sstevel@tonic-gate if ((i = recno % (SYS_BLOCK / TBLOCK)) != 0) { 5338*28c4d110SJoshua M. Clulow dlog("flushtape() %d rounding blocks\n", i); 53397c478bd9Sstevel@tonic-gate recno += i; /* round up to even SYS_BLOCK */ 53407c478bd9Sstevel@tonic-gate } 53417c478bd9Sstevel@tonic-gate #endif 53427c478bd9Sstevel@tonic-gate if (recno > nblock) 53437c478bd9Sstevel@tonic-gate recno = nblock; 53447c478bd9Sstevel@tonic-gate } 5345*28c4d110SJoshua M. Clulow dlog("writing out %" FMT_blkcnt_t " blocks of %" FMT_blkcnt_t 53467c478bd9Sstevel@tonic-gate " bytes\n", (blkcnt_t)(NotTape ? recno : nblock), 53477c478bd9Sstevel@tonic-gate (blkcnt_t)(NotTape ? recno : nblock) * TBLOCK); 53487c478bd9Sstevel@tonic-gate if (write(mt, tbuf, 53497c478bd9Sstevel@tonic-gate (size_t)(NotTape ? recno : nblock) * TBLOCK) < 0) { 53507c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53517c478bd9Sstevel@tonic-gate "tar: tape write error\n")); 53527c478bd9Sstevel@tonic-gate done(2); 53537c478bd9Sstevel@tonic-gate } 53547c478bd9Sstevel@tonic-gate recno = 0; 53557c478bd9Sstevel@tonic-gate } 53567c478bd9Sstevel@tonic-gate } 53577c478bd9Sstevel@tonic-gate 53587c478bd9Sstevel@tonic-gate static void 53597c478bd9Sstevel@tonic-gate copy(void *dst, void *src) 53607c478bd9Sstevel@tonic-gate { 53617c478bd9Sstevel@tonic-gate (void) memcpy(dst, src, TBLOCK); 53627c478bd9Sstevel@tonic-gate } 53637c478bd9Sstevel@tonic-gate 53647c478bd9Sstevel@tonic-gate /* 53657c478bd9Sstevel@tonic-gate * kcheck() 53667c478bd9Sstevel@tonic-gate * - checks the validity of size values for non-tape devices 53677c478bd9Sstevel@tonic-gate * - if size is zero, mulvol tar is disabled and size is 53687c478bd9Sstevel@tonic-gate * assumed to be infinite. 53697c478bd9Sstevel@tonic-gate * - returns volume size in TBLOCKS 53707c478bd9Sstevel@tonic-gate */ 53717c478bd9Sstevel@tonic-gate 53727c478bd9Sstevel@tonic-gate static blkcnt_t 53737c478bd9Sstevel@tonic-gate kcheck(char *kstr) 53747c478bd9Sstevel@tonic-gate { 53757c478bd9Sstevel@tonic-gate blkcnt_t kval; 53767c478bd9Sstevel@tonic-gate 53777c478bd9Sstevel@tonic-gate kval = strtoll(kstr, NULL, 0); 53787c478bd9Sstevel@tonic-gate if (kval == (blkcnt_t)0) { /* no multi-volume; size is infinity. */ 53797c478bd9Sstevel@tonic-gate mulvol = 0; /* definitely not mulvol, but we must */ 53807c478bd9Sstevel@tonic-gate return (0); /* took out setting of NotTape */ 53817c478bd9Sstevel@tonic-gate } 53827c478bd9Sstevel@tonic-gate if (kval < (blkcnt_t)MINSIZE) { 53837c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53847c478bd9Sstevel@tonic-gate "tar: sizes below %luK not supported (%" FMT_blkcnt_t 53857c478bd9Sstevel@tonic-gate ").\n"), (ulong_t)MINSIZE, kval); 53867c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53877c478bd9Sstevel@tonic-gate "bad size entry for %s in %s.\n"), 53887c478bd9Sstevel@tonic-gate archive, DEF_FILE); 53897c478bd9Sstevel@tonic-gate done(1); 53907c478bd9Sstevel@tonic-gate } 53917c478bd9Sstevel@tonic-gate mulvol++; 53927c478bd9Sstevel@tonic-gate NotTape++; /* implies non-tape */ 53937c478bd9Sstevel@tonic-gate return (kval * 1024 / TBLOCK); /* convert to TBLOCKS */ 53947c478bd9Sstevel@tonic-gate } 53957c478bd9Sstevel@tonic-gate 53967c478bd9Sstevel@tonic-gate 53977c478bd9Sstevel@tonic-gate /* 53987c478bd9Sstevel@tonic-gate * bcheck() 53997c478bd9Sstevel@tonic-gate * - checks the validity of blocking factors 54007c478bd9Sstevel@tonic-gate * - returns blocking factor 54017c478bd9Sstevel@tonic-gate */ 54027c478bd9Sstevel@tonic-gate 54037c478bd9Sstevel@tonic-gate static int 54047c478bd9Sstevel@tonic-gate bcheck(char *bstr) 54057c478bd9Sstevel@tonic-gate { 54067c478bd9Sstevel@tonic-gate blkcnt_t bval; 54077c478bd9Sstevel@tonic-gate 54087c478bd9Sstevel@tonic-gate bval = strtoll(bstr, NULL, 0); 54097c478bd9Sstevel@tonic-gate if ((bval <= 0) || (bval > INT_MAX / TBLOCK)) { 54107c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 54117c478bd9Sstevel@tonic-gate "tar: invalid blocksize \"%s\".\n"), bstr); 54127c478bd9Sstevel@tonic-gate if (!bflag) 54137c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 54147c478bd9Sstevel@tonic-gate "bad blocksize entry for '%s' in %s.\n"), 54157c478bd9Sstevel@tonic-gate archive, DEF_FILE); 54167c478bd9Sstevel@tonic-gate done(1); 54177c478bd9Sstevel@tonic-gate } 54187c478bd9Sstevel@tonic-gate 54197c478bd9Sstevel@tonic-gate return ((int)bval); 54207c478bd9Sstevel@tonic-gate } 54217c478bd9Sstevel@tonic-gate 54227c478bd9Sstevel@tonic-gate 54237c478bd9Sstevel@tonic-gate /* 54247c478bd9Sstevel@tonic-gate * defset() 54257c478bd9Sstevel@tonic-gate * - reads DEF_FILE for the set of default values specified. 54267c478bd9Sstevel@tonic-gate * - initializes 'usefile', 'nblock', and 'blocklim', and 'NotTape'. 54277c478bd9Sstevel@tonic-gate * - 'usefile' points to static data, so will be overwritten 54287c478bd9Sstevel@tonic-gate * if this routine is called a second time. 54297c478bd9Sstevel@tonic-gate * - the pattern specified by 'arch' must be followed by four 54307c478bd9Sstevel@tonic-gate * blank-separated fields (1) device (2) blocking, 54317c478bd9Sstevel@tonic-gate * (3) size(K), and (4) tape 54327c478bd9Sstevel@tonic-gate * for example: archive0=/dev/fd 1 400 n 54337c478bd9Sstevel@tonic-gate */ 54347c478bd9Sstevel@tonic-gate 54357c478bd9Sstevel@tonic-gate static int 54367c478bd9Sstevel@tonic-gate defset(char *arch) 54377c478bd9Sstevel@tonic-gate { 54387c478bd9Sstevel@tonic-gate char *bp; 54397c478bd9Sstevel@tonic-gate 54407c478bd9Sstevel@tonic-gate if (defopen(DEF_FILE) != 0) 54417c478bd9Sstevel@tonic-gate return (FALSE); 54427c478bd9Sstevel@tonic-gate if (defcntl(DC_SETFLAGS, (DC_STD & ~(DC_CASE))) == -1) { 54437c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 54447c478bd9Sstevel@tonic-gate "tar: error setting parameters for %s.\n"), DEF_FILE); 54457c478bd9Sstevel@tonic-gate return (FALSE); /* & following ones too */ 54467c478bd9Sstevel@tonic-gate } 54477c478bd9Sstevel@tonic-gate if ((bp = defread(arch)) == NULL) { 54487c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 54497c478bd9Sstevel@tonic-gate "tar: missing or invalid '%s' entry in %s.\n"), 54507c478bd9Sstevel@tonic-gate arch, DEF_FILE); 54517c478bd9Sstevel@tonic-gate return (FALSE); 54527c478bd9Sstevel@tonic-gate } 54537c478bd9Sstevel@tonic-gate if ((usefile = strtok(bp, " \t")) == NULL) { 54547c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 54557c478bd9Sstevel@tonic-gate "tar: '%s' entry in %s is empty!\n"), arch, DEF_FILE); 54567c478bd9Sstevel@tonic-gate return (FALSE); 54577c478bd9Sstevel@tonic-gate } 54587c478bd9Sstevel@tonic-gate if ((bp = strtok(NULL, " \t")) == NULL) { 54597c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 54607c478bd9Sstevel@tonic-gate "tar: block component missing in '%s' entry in %s.\n"), 54617c478bd9Sstevel@tonic-gate arch, DEF_FILE); 54627c478bd9Sstevel@tonic-gate return (FALSE); 54637c478bd9Sstevel@tonic-gate } 54647c478bd9Sstevel@tonic-gate nblock = bcheck(bp); 54657c478bd9Sstevel@tonic-gate if ((bp = strtok(NULL, " \t")) == NULL) { 54667c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 54677c478bd9Sstevel@tonic-gate "tar: size component missing in '%s' entry in %s.\n"), 54687c478bd9Sstevel@tonic-gate arch, DEF_FILE); 54697c478bd9Sstevel@tonic-gate return (FALSE); 54707c478bd9Sstevel@tonic-gate } 54717c478bd9Sstevel@tonic-gate blocklim = kcheck(bp); 54727c478bd9Sstevel@tonic-gate if ((bp = strtok(NULL, " \t")) != NULL) 54737c478bd9Sstevel@tonic-gate NotTape = (*bp == 'n' || *bp == 'N'); 54747c478bd9Sstevel@tonic-gate else 54757c478bd9Sstevel@tonic-gate NotTape = (blocklim != 0); 54767c478bd9Sstevel@tonic-gate (void) defopen(NULL); 5477*28c4d110SJoshua M. Clulow dlog("defset: archive='%s'; usefile='%s'\n", arch, usefile); 5478*28c4d110SJoshua M. Clulow dlog("defset: nblock='%d'; blocklim='%" FMT_blkcnt_t "'\n", 54797c478bd9Sstevel@tonic-gate nblock, blocklim); 5480*28c4d110SJoshua M. Clulow dlog("defset: not tape = %d\n", NotTape); 54817c478bd9Sstevel@tonic-gate return (TRUE); 54827c478bd9Sstevel@tonic-gate } 54837c478bd9Sstevel@tonic-gate 54847c478bd9Sstevel@tonic-gate 54857c478bd9Sstevel@tonic-gate /* 54867c478bd9Sstevel@tonic-gate * Following code handles excluded and included files. 54877c478bd9Sstevel@tonic-gate * A hash table of file names to be {in,ex}cluded is built. 54887c478bd9Sstevel@tonic-gate * For excluded files, before writing or extracting a file 54897c478bd9Sstevel@tonic-gate * check to see if it is in the exclude_tbl. 54907c478bd9Sstevel@tonic-gate * For included files, the wantit() procedure will check to 54917c478bd9Sstevel@tonic-gate * see if the named file is in the include_tbl. 54927c478bd9Sstevel@tonic-gate */ 54937c478bd9Sstevel@tonic-gate 54947c478bd9Sstevel@tonic-gate static void 54955e2174acSceastha build_table(file_list_t *table[], char *file) 54967c478bd9Sstevel@tonic-gate { 54977c478bd9Sstevel@tonic-gate FILE *fp; 54987c478bd9Sstevel@tonic-gate char buf[PATH_MAX + 1]; 54997c478bd9Sstevel@tonic-gate 55007c478bd9Sstevel@tonic-gate if ((fp = fopen(file, "r")) == (FILE *)NULL) 55017c478bd9Sstevel@tonic-gate vperror(1, gettext("could not open %s"), file); 55027c478bd9Sstevel@tonic-gate while (fgets(buf, sizeof (buf), fp) != NULL) { 55037c478bd9Sstevel@tonic-gate if (buf[strlen(buf) - 1] == '\n') 55047c478bd9Sstevel@tonic-gate buf[strlen(buf) - 1] = '\0'; 55057c478bd9Sstevel@tonic-gate /* Only add to table if line has something in it */ 55067c478bd9Sstevel@tonic-gate if (strspn(buf, " \t") != strlen(buf)) 55077c478bd9Sstevel@tonic-gate add_file_to_table(table, buf); 55087c478bd9Sstevel@tonic-gate } 55097c478bd9Sstevel@tonic-gate (void) fclose(fp); 55107c478bd9Sstevel@tonic-gate } 55117c478bd9Sstevel@tonic-gate 55127c478bd9Sstevel@tonic-gate 55137c478bd9Sstevel@tonic-gate /* 55147c478bd9Sstevel@tonic-gate * Add a file name to the the specified table, if the file name has any 55157c478bd9Sstevel@tonic-gate * trailing '/'s then delete them before inserting into the table 55167c478bd9Sstevel@tonic-gate */ 55177c478bd9Sstevel@tonic-gate 55187c478bd9Sstevel@tonic-gate static void 55195e2174acSceastha add_file_to_table(file_list_t *table[], char *str) 55207c478bd9Sstevel@tonic-gate { 55217c478bd9Sstevel@tonic-gate char name[PATH_MAX + 1]; 55227c478bd9Sstevel@tonic-gate unsigned int h; 55235e2174acSceastha file_list_t *exp; 55247c478bd9Sstevel@tonic-gate 55257c478bd9Sstevel@tonic-gate (void) strcpy(name, str); 55267c478bd9Sstevel@tonic-gate while (name[strlen(name) - 1] == '/') { 55277c478bd9Sstevel@tonic-gate name[strlen(name) - 1] = NULL; 55287c478bd9Sstevel@tonic-gate } 55297c478bd9Sstevel@tonic-gate 55307c478bd9Sstevel@tonic-gate h = hash(name); 55315e2174acSceastha if ((exp = (file_list_t *)calloc(sizeof (file_list_t), 55327c478bd9Sstevel@tonic-gate sizeof (char))) == NULL) { 55337c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 55347c478bd9Sstevel@tonic-gate "tar: out of memory, exclude/include table(entry)\n")); 55357c478bd9Sstevel@tonic-gate exit(1); 55367c478bd9Sstevel@tonic-gate } 55377c478bd9Sstevel@tonic-gate 55387c478bd9Sstevel@tonic-gate if ((exp->name = strdup(name)) == NULL) { 55397c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 55407c478bd9Sstevel@tonic-gate "tar: out of memory, exclude/include table(file name)\n")); 55417c478bd9Sstevel@tonic-gate exit(1); 55427c478bd9Sstevel@tonic-gate } 55437c478bd9Sstevel@tonic-gate 55447c478bd9Sstevel@tonic-gate exp->next = table[h]; 55457c478bd9Sstevel@tonic-gate table[h] = exp; 55467c478bd9Sstevel@tonic-gate } 55477c478bd9Sstevel@tonic-gate 55487c478bd9Sstevel@tonic-gate 55497c478bd9Sstevel@tonic-gate /* 55507c478bd9Sstevel@tonic-gate * See if a file name or any of the file's parent directories is in the 55517c478bd9Sstevel@tonic-gate * specified table, if the file name has any trailing '/'s then delete 55527c478bd9Sstevel@tonic-gate * them before searching the table 55537c478bd9Sstevel@tonic-gate */ 55547c478bd9Sstevel@tonic-gate 55557c478bd9Sstevel@tonic-gate static int 55565e2174acSceastha is_in_table(file_list_t *table[], char *str) 55577c478bd9Sstevel@tonic-gate { 55587c478bd9Sstevel@tonic-gate char name[PATH_MAX + 1]; 55597c478bd9Sstevel@tonic-gate unsigned int h; 55605e2174acSceastha file_list_t *exp; 55617c478bd9Sstevel@tonic-gate char *ptr; 55627c478bd9Sstevel@tonic-gate 55637c478bd9Sstevel@tonic-gate (void) strcpy(name, str); 55647c478bd9Sstevel@tonic-gate while (name[strlen(name) - 1] == '/') { 55657c478bd9Sstevel@tonic-gate name[strlen(name) - 1] = NULL; 55667c478bd9Sstevel@tonic-gate } 55677c478bd9Sstevel@tonic-gate 55687c478bd9Sstevel@tonic-gate /* 55697c478bd9Sstevel@tonic-gate * check for the file name in the passed list 55707c478bd9Sstevel@tonic-gate */ 55717c478bd9Sstevel@tonic-gate h = hash(name); 55727c478bd9Sstevel@tonic-gate exp = table[h]; 55737c478bd9Sstevel@tonic-gate while (exp != NULL) { 55747c478bd9Sstevel@tonic-gate if (strcmp(name, exp->name) == 0) { 55757c478bd9Sstevel@tonic-gate return (1); 55767c478bd9Sstevel@tonic-gate } 55777c478bd9Sstevel@tonic-gate exp = exp->next; 55787c478bd9Sstevel@tonic-gate } 55797c478bd9Sstevel@tonic-gate 55807c478bd9Sstevel@tonic-gate /* 55817c478bd9Sstevel@tonic-gate * check for any parent directories in the file list 55827c478bd9Sstevel@tonic-gate */ 55837c478bd9Sstevel@tonic-gate while ((ptr = strrchr(name, '/'))) { 55847c478bd9Sstevel@tonic-gate *ptr = NULL; 55857c478bd9Sstevel@tonic-gate h = hash(name); 55867c478bd9Sstevel@tonic-gate exp = table[h]; 55877c478bd9Sstevel@tonic-gate while (exp != NULL) { 55887c478bd9Sstevel@tonic-gate if (strcmp(name, exp->name) == 0) { 55897c478bd9Sstevel@tonic-gate return (1); 55907c478bd9Sstevel@tonic-gate } 55917c478bd9Sstevel@tonic-gate exp = exp->next; 55927c478bd9Sstevel@tonic-gate } 55937c478bd9Sstevel@tonic-gate } 55947c478bd9Sstevel@tonic-gate 55957c478bd9Sstevel@tonic-gate return (0); 55967c478bd9Sstevel@tonic-gate } 55977c478bd9Sstevel@tonic-gate 55987c478bd9Sstevel@tonic-gate 55997c478bd9Sstevel@tonic-gate /* 56007c478bd9Sstevel@tonic-gate * Compute a hash from a string. 56017c478bd9Sstevel@tonic-gate */ 56027c478bd9Sstevel@tonic-gate 56037c478bd9Sstevel@tonic-gate static unsigned int 56047c478bd9Sstevel@tonic-gate hash(char *str) 56057c478bd9Sstevel@tonic-gate { 56067c478bd9Sstevel@tonic-gate char *cp; 56077c478bd9Sstevel@tonic-gate unsigned int h; 56087c478bd9Sstevel@tonic-gate 56097c478bd9Sstevel@tonic-gate h = 0; 56107c478bd9Sstevel@tonic-gate for (cp = str; *cp; cp++) { 56117c478bd9Sstevel@tonic-gate h += *cp; 56127c478bd9Sstevel@tonic-gate } 56137c478bd9Sstevel@tonic-gate return (h % TABLE_SIZE); 56147c478bd9Sstevel@tonic-gate } 56157c478bd9Sstevel@tonic-gate 56167c478bd9Sstevel@tonic-gate static void * 56177c478bd9Sstevel@tonic-gate getmem(size_t size) 56187c478bd9Sstevel@tonic-gate { 56197c478bd9Sstevel@tonic-gate void *p = calloc((unsigned)size, sizeof (char)); 56207c478bd9Sstevel@tonic-gate 56217c478bd9Sstevel@tonic-gate if (p == NULL && freemem) { 56227c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 56237c478bd9Sstevel@tonic-gate "tar: out of memory, link and directory modtime " 56247c478bd9Sstevel@tonic-gate "info lost\n")); 56257c478bd9Sstevel@tonic-gate freemem = 0; 56267c478bd9Sstevel@tonic-gate if (errflag) 56277c478bd9Sstevel@tonic-gate done(1); 56287c478bd9Sstevel@tonic-gate else 56297c478bd9Sstevel@tonic-gate Errflg = 1; 56307c478bd9Sstevel@tonic-gate } 56317c478bd9Sstevel@tonic-gate return (p); 56327c478bd9Sstevel@tonic-gate } 56337c478bd9Sstevel@tonic-gate 56347c478bd9Sstevel@tonic-gate /* 56357c478bd9Sstevel@tonic-gate * vperror() --variable argument perror. 56367c478bd9Sstevel@tonic-gate * Takes 3 args: exit_status, formats, args. If exit_status is 0, then 56377c478bd9Sstevel@tonic-gate * the errflag (exit on error) is checked -- if it is non-zero, tar exits 56387c478bd9Sstevel@tonic-gate * with the value of whatever "errno" is set to. If exit_status is not 56397c478bd9Sstevel@tonic-gate * zero, then tar exits with that error status. If errflag and exit_status 56407c478bd9Sstevel@tonic-gate * are both zero, the routine returns to where it was called and sets Errflg 56417c478bd9Sstevel@tonic-gate * to errno. 56427c478bd9Sstevel@tonic-gate */ 56437c478bd9Sstevel@tonic-gate 56447c478bd9Sstevel@tonic-gate static void 56457c478bd9Sstevel@tonic-gate vperror(int exit_status, char *fmt, ...) 56467c478bd9Sstevel@tonic-gate { 56477c478bd9Sstevel@tonic-gate va_list ap; 56487c478bd9Sstevel@tonic-gate 56497c478bd9Sstevel@tonic-gate va_start(ap, fmt); 56507c478bd9Sstevel@tonic-gate (void) fputs("tar: ", stderr); 56517c478bd9Sstevel@tonic-gate (void) vfprintf(stderr, fmt, ap); 56527c478bd9Sstevel@tonic-gate (void) fprintf(stderr, ": %s\n", strerror(errno)); 56537c478bd9Sstevel@tonic-gate va_end(ap); 56547c478bd9Sstevel@tonic-gate if (exit_status) 56557c478bd9Sstevel@tonic-gate done(exit_status); 56567c478bd9Sstevel@tonic-gate else 56577c478bd9Sstevel@tonic-gate if (errflag) 56587c478bd9Sstevel@tonic-gate done(errno); 56597c478bd9Sstevel@tonic-gate else 56607c478bd9Sstevel@tonic-gate Errflg = errno; 56617c478bd9Sstevel@tonic-gate } 56627c478bd9Sstevel@tonic-gate 56637c478bd9Sstevel@tonic-gate 56647c478bd9Sstevel@tonic-gate static void 56657c478bd9Sstevel@tonic-gate fatal(char *format, ...) 56667c478bd9Sstevel@tonic-gate { 56677c478bd9Sstevel@tonic-gate va_list ap; 56687c478bd9Sstevel@tonic-gate 56697c478bd9Sstevel@tonic-gate va_start(ap, format); 56707c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "tar: "); 56717c478bd9Sstevel@tonic-gate (void) vfprintf(stderr, format, ap); 56727c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n"); 56737c478bd9Sstevel@tonic-gate va_end(ap); 56747c478bd9Sstevel@tonic-gate done(1); 56757c478bd9Sstevel@tonic-gate } 56767c478bd9Sstevel@tonic-gate 56777c478bd9Sstevel@tonic-gate 56787c478bd9Sstevel@tonic-gate /* 56797c478bd9Sstevel@tonic-gate * Check to make sure that argument is a char * ptr. 56807c478bd9Sstevel@tonic-gate * Actually, we just check to see that it is non-null. 56817c478bd9Sstevel@tonic-gate * If it is null, print out the message and call usage(), bailing out. 56827c478bd9Sstevel@tonic-gate */ 56837c478bd9Sstevel@tonic-gate 56847c478bd9Sstevel@tonic-gate static void 56857c478bd9Sstevel@tonic-gate assert_string(char *s, char *msg) 56867c478bd9Sstevel@tonic-gate { 56877c478bd9Sstevel@tonic-gate if (s == NULL) { 56887c478bd9Sstevel@tonic-gate (void) fprintf(stderr, msg); 56897c478bd9Sstevel@tonic-gate usage(); 56907c478bd9Sstevel@tonic-gate } 56917c478bd9Sstevel@tonic-gate } 56927c478bd9Sstevel@tonic-gate 56937c478bd9Sstevel@tonic-gate 56947c478bd9Sstevel@tonic-gate static void 56957c478bd9Sstevel@tonic-gate mterr(char *operation, int i, int exitcode) 56967c478bd9Sstevel@tonic-gate { 56977c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 56987c478bd9Sstevel@tonic-gate "tar: %s error: "), operation); 56997c478bd9Sstevel@tonic-gate if (i < 0) 57007c478bd9Sstevel@tonic-gate perror(""); 57017c478bd9Sstevel@tonic-gate else 57027c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("unexpected EOF\n")); 57037c478bd9Sstevel@tonic-gate done(exitcode); 57047c478bd9Sstevel@tonic-gate } 57057c478bd9Sstevel@tonic-gate 57067c478bd9Sstevel@tonic-gate static int 5707da6c28aaSamw wantit(char *argv[], char **namep, char **dirp, char **component, 5708da6c28aaSamw attr_data_t **attrinfo) 57097c478bd9Sstevel@tonic-gate { 57107c478bd9Sstevel@tonic-gate char **cp; 57117c478bd9Sstevel@tonic-gate int gotit; /* true if we've found a match */ 5712123523f8Sas158974 int ret; 57137c478bd9Sstevel@tonic-gate 57147c478bd9Sstevel@tonic-gate top: 5715123523f8Sas158974 if (xhdr_flgs & _X_XHDR) { 57167c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 5717123523f8Sas158974 } 57187c478bd9Sstevel@tonic-gate getdir(); 57197c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) { 5720123523f8Sas158974 ret = get_xdata(); 5721123523f8Sas158974 if (ret != 0) { /* Xhdr items and regular header */ 5722123523f8Sas158974 setbytes_to_skip(&stbuf, ret); 57237c478bd9Sstevel@tonic-gate passtape(); 57247c478bd9Sstevel@tonic-gate return (0); /* Error--don't want to extract */ 57257c478bd9Sstevel@tonic-gate } 57267c478bd9Sstevel@tonic-gate } 57277c478bd9Sstevel@tonic-gate 5728123523f8Sas158974 /* 5729123523f8Sas158974 * If typeflag is not 'A' and xhdr_flgs is set, then processing 5730123523f8Sas158974 * of ancillary file is either over or ancillary file 5731123523f8Sas158974 * processing is not required, load info from Xtarhdr and set 5732123523f8Sas158974 * _X_XHDR bit in xhdr_flgs. 5733123523f8Sas158974 */ 5734123523f8Sas158974 if ((dblock.dbuf.typeflag != 'A') && (xhdr_flgs != 0)) { 5735123523f8Sas158974 load_info_from_xtarhdr(xhdr_flgs, &Xtarhdr); 5736123523f8Sas158974 xhdr_flgs |= _X_XHDR; 5737123523f8Sas158974 } 5738123523f8Sas158974 57397c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 57407c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == _XATTR_HDRTYPE && xattrbadhead == 0) { 5741da6c28aaSamw /* 5742da6c28aaSamw * Always needs to read the extended header. If atflag, saflag, 5743da6c28aaSamw * or tflag isn't set, then we'll have the correct info for 5744da6c28aaSamw * passtape() later. 5745da6c28aaSamw */ 5746da6c28aaSamw (void) read_xattr_hdr(attrinfo); 57477c478bd9Sstevel@tonic-gate goto top; 57487c478bd9Sstevel@tonic-gate } 5749da6c28aaSamw /* 5750ced83f9bSceastha * Now that we've read the extended header, call passtape() 5751ced83f9bSceastha * if we don't want to restore attributes or system attributes. 5752ced83f9bSceastha * Don't restore the attribute if we are extracting 5753ced83f9bSceastha * a file from an archive (as opposed to doing a table of 5754ced83f9bSceastha * contents) and any of the following are true: 5755ced83f9bSceastha * 1. neither -@ or -/ was specified. 5756ced83f9bSceastha * 2. -@ was specified, -/ wasn't specified, and we're 5757ced83f9bSceastha * processing a hidden attribute directory of an attribute 5758ced83f9bSceastha * or we're processing a read-write system attribute file. 5759ced83f9bSceastha * 3. -@ wasn't specified, -/ was specified, and the file 5760ced83f9bSceastha * we're processing is not a read-write system attribute file, 5761ced83f9bSceastha * or we're processing the hidden attribute directory of an 5762ced83f9bSceastha * attribute. 5763ced83f9bSceastha * 5764ced83f9bSceastha * We always process the attributes if we're just generating 5765ced83f9bSceastha * generating a table of contents, or if both -@ and -/ were 5766ced83f9bSceastha * specified. 5767da6c28aaSamw */ 5768ced83f9bSceastha if (xattrp != NULL) { 5769ced83f9bSceastha attr_data_t *ainfo = *attrinfo; 5770ced83f9bSceastha 5771ced83f9bSceastha if (!tflag && 5772ced83f9bSceastha ((!atflag && !saflag) || 5773ced83f9bSceastha (atflag && !saflag && ((ainfo->attr_parent != NULL) || 5774ced83f9bSceastha ainfo->attr_rw_sysattr)) || 5775ced83f9bSceastha (!atflag && saflag && ((ainfo->attr_parent != NULL) || 5776ced83f9bSceastha !ainfo->attr_rw_sysattr)))) { 5777da6c28aaSamw passtape(); 5778da6c28aaSamw return (0); 5779da6c28aaSamw } 5780ced83f9bSceastha } 57817c478bd9Sstevel@tonic-gate #endif 57827c478bd9Sstevel@tonic-gate 57837c478bd9Sstevel@tonic-gate /* sets *namep to point at the proper name */ 5784da6c28aaSamw if (check_prefix(namep, dirp, component) != 0) { 5785da6c28aaSamw passtape(); 5786da6c28aaSamw return (0); 5787da6c28aaSamw } 57887c478bd9Sstevel@tonic-gate 57897c478bd9Sstevel@tonic-gate if (endtape()) { 57907c478bd9Sstevel@tonic-gate if (Bflag) { 5791*28c4d110SJoshua M. Clulow ssize_t sz; 5792*28c4d110SJoshua M. Clulow size_t extra_blocks = 0; 5793*28c4d110SJoshua M. Clulow 57947c478bd9Sstevel@tonic-gate /* 57957c478bd9Sstevel@tonic-gate * Logically at EOT - consume any extra blocks 57967c478bd9Sstevel@tonic-gate * so that write to our stdin won't fail and 57977c478bd9Sstevel@tonic-gate * emit an error message; otherwise something 57987c478bd9Sstevel@tonic-gate * like "dd if=foo.tar | (cd bar; tar xvf -)" 57997c478bd9Sstevel@tonic-gate * will produce a bogus error message from "dd". 58007c478bd9Sstevel@tonic-gate */ 58017c478bd9Sstevel@tonic-gate 5802*28c4d110SJoshua M. Clulow while ((sz = read(mt, tbuf, TBLOCK*nblock)) > 0) { 5803*28c4d110SJoshua M. Clulow extra_blocks += sz; 58047c478bd9Sstevel@tonic-gate } 5805*28c4d110SJoshua M. Clulow dlog("wantit(): %d bytes of extra blocks\n", 5806*28c4d110SJoshua M. Clulow extra_blocks); 58077c478bd9Sstevel@tonic-gate } 5808*28c4d110SJoshua M. Clulow dlog("wantit(): at end of tape.\n"); 58097c478bd9Sstevel@tonic-gate return (-1); 58107c478bd9Sstevel@tonic-gate } 58117c478bd9Sstevel@tonic-gate 58127c478bd9Sstevel@tonic-gate gotit = 0; 58137c478bd9Sstevel@tonic-gate 58147c478bd9Sstevel@tonic-gate if ((Iflag && is_in_table(include_tbl, *namep)) || 58157c478bd9Sstevel@tonic-gate (! Iflag && *argv == NULL)) { 58167c478bd9Sstevel@tonic-gate gotit = 1; 58177c478bd9Sstevel@tonic-gate } else { 58187c478bd9Sstevel@tonic-gate for (cp = argv; *cp; cp++) { 58197c478bd9Sstevel@tonic-gate if (is_prefix(*cp, *namep)) { 58207c478bd9Sstevel@tonic-gate gotit = 1; 58217c478bd9Sstevel@tonic-gate break; 58227c478bd9Sstevel@tonic-gate } 58237c478bd9Sstevel@tonic-gate } 58247c478bd9Sstevel@tonic-gate } 58257c478bd9Sstevel@tonic-gate 58267c478bd9Sstevel@tonic-gate if (! gotit) { 58277c478bd9Sstevel@tonic-gate passtape(); 58287c478bd9Sstevel@tonic-gate return (0); 58297c478bd9Sstevel@tonic-gate } 58307c478bd9Sstevel@tonic-gate 58317c478bd9Sstevel@tonic-gate if (Xflag && is_in_table(exclude_tbl, *namep)) { 58327c478bd9Sstevel@tonic-gate if (vflag) { 58337c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("%s excluded\n"), 58347c478bd9Sstevel@tonic-gate *namep); 58357c478bd9Sstevel@tonic-gate } 58367c478bd9Sstevel@tonic-gate passtape(); 58377c478bd9Sstevel@tonic-gate return (0); 58387c478bd9Sstevel@tonic-gate } 58397c478bd9Sstevel@tonic-gate 58407c478bd9Sstevel@tonic-gate return (1); 58417c478bd9Sstevel@tonic-gate } 58427c478bd9Sstevel@tonic-gate 5843123523f8Sas158974 5844123523f8Sas158974 static void 5845123523f8Sas158974 setbytes_to_skip(struct stat *st, int err) 5846123523f8Sas158974 { 5847123523f8Sas158974 /* 5848123523f8Sas158974 * In a scenario where a typeflag 'X' was followed by 5849123523f8Sas158974 * a typeflag 'A' and typeflag 'O', then the number of 5850123523f8Sas158974 * bytes to skip should be the size of ancillary file, 5851123523f8Sas158974 * plus the dblock for regular file, and the size 5852123523f8Sas158974 * from Xtarhdr. However, if the typeflag was just 'X' 5853123523f8Sas158974 * followed by typeflag 'O', then the number of bytes 5854123523f8Sas158974 * to skip should be the size from Xtarhdr. 5855123523f8Sas158974 */ 5856123523f8Sas158974 if ((err != 0) && (dblock.dbuf.typeflag == 'A') && 5857257ece65SRalph Turner - Sun UK - Contractor (xhdr_flgs & _X_SIZE)) { 5858ced83f9bSceastha st->st_size += TBLOCK + Xtarhdr.x_filesz; 5859123523f8Sas158974 xhdr_flgs |= _X_XHDR; 5860123523f8Sas158974 } else if ((dblock.dbuf.typeflag != 'A') && 5861257ece65SRalph Turner - Sun UK - Contractor (xhdr_flgs & _X_SIZE)) { 5862257ece65SRalph Turner - Sun UK - Contractor st->st_size += Xtarhdr.x_filesz; 5863123523f8Sas158974 xhdr_flgs |= _X_XHDR; 5864123523f8Sas158974 } 5865123523f8Sas158974 } 5866123523f8Sas158974 5867da6c28aaSamw static int 5868da6c28aaSamw fill_in_attr_info(char *attr, char *longname, char *attrparent, int atparentfd, 5869da6c28aaSamw int rw_sysattr, attr_data_t **attrinfo) 5870da6c28aaSamw { 5871da6c28aaSamw size_t pathlen; 5872da6c28aaSamw char *tpath; 5873da6c28aaSamw char *tparent; 5874da6c28aaSamw 5875da6c28aaSamw /* parent info */ 5876da6c28aaSamw if (attrparent != NULL) { 5877da6c28aaSamw if ((tparent = strdup(attrparent)) == NULL) { 5878da6c28aaSamw vperror(0, gettext( 5879da6c28aaSamw "unable to allocate memory for attribute parent " 5880da6c28aaSamw "name for %sattribute %s/%s of %s"), 5881da6c28aaSamw rw_sysattr ? gettext("system ") : "", 5882da6c28aaSamw attrparent, attr, longname); 5883da6c28aaSamw return (1); 5884da6c28aaSamw } 5885da6c28aaSamw } else { 5886da6c28aaSamw tparent = NULL; 5887da6c28aaSamw } 5888da6c28aaSamw 5889da6c28aaSamw /* path info */ 5890da6c28aaSamw pathlen = strlen(attr) + 1; 5891da6c28aaSamw if (attrparent != NULL) { 5892da6c28aaSamw pathlen += strlen(attrparent) + 1; /* add 1 for '/' */ 5893da6c28aaSamw } 5894da6c28aaSamw if ((tpath = calloc(1, pathlen)) == NULL) { 5895da6c28aaSamw vperror(0, gettext( 5896da6c28aaSamw "unable to allocate memory for full " 5897da6c28aaSamw "attribute path name for %sattribute %s%s%s of %s"), 5898da6c28aaSamw rw_sysattr ? gettext("system ") : "", 5899da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 5900da6c28aaSamw (attrparent == NULL) ? "" : "/", 5901da6c28aaSamw attr, longname); 5902da6c28aaSamw if (tparent != NULL) { 5903da6c28aaSamw free(tparent); 5904da6c28aaSamw } 5905da6c28aaSamw return (1); 5906da6c28aaSamw } 5907da6c28aaSamw (void) snprintf(tpath, pathlen, "%s%s%s", 5908da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 5909da6c28aaSamw (attrparent == NULL) ? "" : "/", 5910da6c28aaSamw attr); 5911da6c28aaSamw 5912da6c28aaSamw /* fill in the attribute info */ 5913da6c28aaSamw if (*attrinfo == NULL) { 5914da6c28aaSamw if ((*attrinfo = malloc(sizeof (attr_data_t))) == NULL) { 5915da6c28aaSamw vperror(0, gettext( 5916da6c28aaSamw "unable to allocate memory for attribute " 5917da6c28aaSamw "information for %sattribute %s%s%s of %s"), 5918da6c28aaSamw rw_sysattr ? gettext("system ") : "", 5919da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 5920da6c28aaSamw (attrparent == NULL) ? "" : gettext("/"), 5921da6c28aaSamw attr, longname); 5922da6c28aaSamw if (tparent != NULL) { 5923da6c28aaSamw free(tparent); 5924da6c28aaSamw } 5925da6c28aaSamw free(tpath); 5926da6c28aaSamw return (1); 5927da6c28aaSamw } 5928da6c28aaSamw } else { 5929da6c28aaSamw if ((*attrinfo)->attr_parent != NULL) { 5930da6c28aaSamw free((*attrinfo)->attr_parent); 5931da6c28aaSamw } 5932da6c28aaSamw if ((*attrinfo)->attr_path != NULL) { 5933da6c28aaSamw free((*attrinfo)->attr_path); 5934da6c28aaSamw } 5935da6c28aaSamw /* 5936da6c28aaSamw * The parent file descriptor is passed in, so don't 5937da6c28aaSamw * close it here as it should be closed by the function 5938da6c28aaSamw * that opened it. 5939da6c28aaSamw */ 5940da6c28aaSamw } 5941da6c28aaSamw (*attrinfo)->attr_parent = tparent; 5942da6c28aaSamw (*attrinfo)->attr_path = tpath; 5943da6c28aaSamw (*attrinfo)->attr_rw_sysattr = rw_sysattr; 5944da6c28aaSamw (*attrinfo)->attr_parentfd = atparentfd; 5945da6c28aaSamw 5946da6c28aaSamw return (0); 5947da6c28aaSamw } 59487c478bd9Sstevel@tonic-gate 59497c478bd9Sstevel@tonic-gate /* 59503a1dab68SRich Burridge * Test to see if name is a directory. 59513a1dab68SRich Burridge * 59523a1dab68SRich Burridge * Return 1 if true, 0 otherwise. 59533a1dab68SRich Burridge */ 59543a1dab68SRich Burridge 59553a1dab68SRich Burridge static int 59563a1dab68SRich Burridge is_directory(char *name) 59573a1dab68SRich Burridge { 59583a1dab68SRich Burridge #if defined(O_XATTR) 59593a1dab68SRich Burridge /* 59603a1dab68SRich Burridge * If there is an xattr_buf structure associated with this file, 59613a1dab68SRich Burridge * then the directory test is based on whether the name has a 59623a1dab68SRich Burridge * trailing slash. 59633a1dab68SRich Burridge */ 59643a1dab68SRich Burridge if (xattrp) 59653a1dab68SRich Burridge return (name[strlen(name) - 1] == '/'); 59663a1dab68SRich Burridge #endif 59673a1dab68SRich Burridge if (is_posix) 59683a1dab68SRich Burridge return (dblock.dbuf.typeflag == '5'); 59693a1dab68SRich Burridge else 59703a1dab68SRich Burridge return (name[strlen(name) - 1] == '/'); 59713a1dab68SRich Burridge } 59723a1dab68SRich Burridge 59733a1dab68SRich Burridge /* 5974b25dbf38SRich Burridge * Version of chdir that handles directory pathnames of greater than PATH_MAX 5975b25dbf38SRich Burridge * length, by changing the working directory to manageable portions of the 5976b25dbf38SRich Burridge * complete directory pathname. If any of these attempts fail, then it exits 5977b25dbf38SRich Burridge * non-zero. 5978b25dbf38SRich Burridge * 5979b25dbf38SRich Burridge * If a segment (i.e. a portion of "path" between two "/"'s) of the overall 5980b25dbf38SRich Burridge * pathname is greater than PATH_MAX, then this still won't work, and this 5981b25dbf38SRich Burridge * routine will return -1 with errno set to ENAMETOOLONG. 5982b25dbf38SRich Burridge * 5983b25dbf38SRich Burridge * NOTE: this routine is semantically different to the system chdir in 5984b25dbf38SRich Burridge * that it is remotely possible for the currently working directory to be 5985b25dbf38SRich Burridge * changed to a different directory, if a chdir call fails when processing 5986b25dbf38SRich Burridge * one of the segments of a path that is greater than PATH_MAX. This isn't 5987b25dbf38SRich Burridge * a problem as this is tar's own specific version of chdir. 5988b25dbf38SRich Burridge */ 5989b25dbf38SRich Burridge 5990b25dbf38SRich Burridge static int 5991b25dbf38SRich Burridge tar_chdir(const char *path) { 5992b25dbf38SRich Burridge const char *sep = "/"; 5993b25dbf38SRich Burridge char *path_copy = NULL; 5994b25dbf38SRich Burridge char *ptr = NULL; 5995b25dbf38SRich Burridge 5996b25dbf38SRich Burridge /* The trivial case. */ 5997b25dbf38SRich Burridge if (chdir(path) == 0) { 5998b25dbf38SRich Burridge return (0); 5999b25dbf38SRich Burridge } 6000b25dbf38SRich Burridge if (errno == ENAMETOOLONG) { 6001b25dbf38SRich Burridge if (path[0] == '/' && chdir(sep) != 0) 6002b25dbf38SRich Burridge return (-1); 6003b25dbf38SRich Burridge 6004b25dbf38SRich Burridge /* strtok(3C) modifies the string, so make a copy. */ 6005b25dbf38SRich Burridge if ((path_copy = strdup(path)) == NULL) { 6006b25dbf38SRich Burridge return (-1); 6007b25dbf38SRich Burridge } 6008b25dbf38SRich Burridge 6009b25dbf38SRich Burridge /* chdir(2) for every path element. */ 6010b25dbf38SRich Burridge for (ptr = strtok(path_copy, sep); 6011b25dbf38SRich Burridge ptr != NULL; 6012b25dbf38SRich Burridge ptr = strtok(NULL, sep)) { 6013b25dbf38SRich Burridge if (chdir(ptr) != 0) { 6014b25dbf38SRich Burridge free(path_copy); 6015b25dbf38SRich Burridge return (-1); 6016b25dbf38SRich Burridge } 6017b25dbf38SRich Burridge } 6018b25dbf38SRich Burridge free(path_copy); 6019b25dbf38SRich Burridge return (0); 6020b25dbf38SRich Burridge } 6021b25dbf38SRich Burridge 6022b25dbf38SRich Burridge /* If chdir fails for any reason except ENAMETOOLONG. */ 6023b25dbf38SRich Burridge return (-1); 6024b25dbf38SRich Burridge } 6025b25dbf38SRich Burridge 6026b25dbf38SRich Burridge /* 60271a431409SRich Burridge * Test if name has a '..' sequence in it. 60281a431409SRich Burridge * 60291a431409SRich Burridge * Return 1 if found, 0 otherwise. 60301a431409SRich Burridge */ 60311a431409SRich Burridge 60321a431409SRich Burridge static int 60331a431409SRich Burridge has_dot_dot(char *name) 60341a431409SRich Burridge { 60351a431409SRich Burridge char *s; 60361a431409SRich Burridge size_t name_len = strlen(name); 60371a431409SRich Burridge 60381a431409SRich Burridge for (s = name; s < (name + name_len - 2); s++) { 60391a431409SRich Burridge if (s[0] == '.' && s[1] == '.' && ((s[2] == '/') || !s[2])) 60401a431409SRich Burridge return (1); 60411a431409SRich Burridge 60421a431409SRich Burridge while (! (*s == '/')) { 60431a431409SRich Burridge if (! *s++) 60441a431409SRich Burridge return (0); 60451a431409SRich Burridge } 60461a431409SRich Burridge } 60471a431409SRich Burridge 60481a431409SRich Burridge return (0); 60491a431409SRich Burridge } 60501a431409SRich Burridge 60511a431409SRich Burridge /* 60521a431409SRich Burridge * Test if name is an absolute path name. 60531a431409SRich Burridge * 60541a431409SRich Burridge * Return 1 if true, 0 otherwise. 60551a431409SRich Burridge */ 60561a431409SRich Burridge 60571a431409SRich Burridge static int 60581a431409SRich Burridge is_absolute(char *name) 60591a431409SRich Burridge { 6060fe5a79a9SRich Burridge #if defined(O_XATTR) 6061fe5a79a9SRich Burridge /* 6062fe5a79a9SRich Burridge * If this is an extended attribute (whose name will begin with 6063fe5a79a9SRich Burridge * "/dev/null/", always return 0 as they should be extracted with 6064fe5a79a9SRich Burridge * the name intact, to allow other tar archiving programs that 6065fe5a79a9SRich Burridge * don't understand extended attributes, to correctly throw them away. 6066fe5a79a9SRich Burridge */ 6067fe5a79a9SRich Burridge if (xattrp) 6068fe5a79a9SRich Burridge return (0); 6069fe5a79a9SRich Burridge #endif 6070fe5a79a9SRich Burridge 60711a431409SRich Burridge return (name[0] == '/'); 60721a431409SRich Burridge } 60731a431409SRich Burridge 60741a431409SRich Burridge /* 60751a431409SRich Burridge * Adjust the pathname to make it a relative one. Strip off any leading 60761a431409SRich Burridge * '/' characters and if the pathname contains any '..' sequences, strip 60771a431409SRich Burridge * upto and including the last occurance of '../' (or '..' if found at 60781a431409SRich Burridge * the very end of the pathname). 60791a431409SRich Burridge * 60801a431409SRich Burridge * Return the relative pathname. stripped_prefix will also return the 60811a431409SRich Burridge * portion of name that was stripped off and should be freed by the 60821a431409SRich Burridge * calling routine when no longer needed. 60831a431409SRich Burridge */ 60841a431409SRich Burridge 60851a431409SRich Burridge static char * 60861a431409SRich Burridge make_relative_name(char *name, char **stripped_prefix) 60871a431409SRich Burridge { 60881a431409SRich Burridge char *s; 60891a431409SRich Burridge size_t prefix_len = 0; 60901a431409SRich Burridge size_t name_len = strlen(name); 60911a431409SRich Burridge 60921a431409SRich Burridge for (s = name + prefix_len; s < (name + name_len - 2); ) { 60931a431409SRich Burridge if (s[0] == '.' && s[1] == '.' && ((s[2] == '/') || !s[2])) 60941a431409SRich Burridge prefix_len = s + 2 - name; 60951a431409SRich Burridge 60961a431409SRich Burridge do { 60971a431409SRich Burridge char c = *s++; 60981a431409SRich Burridge 60991a431409SRich Burridge if (c == '/') 61001a431409SRich Burridge break; 61011a431409SRich Burridge } while (*s); 61021a431409SRich Burridge } 61031a431409SRich Burridge 61041a431409SRich Burridge for (s = name + prefix_len; *s == '/'; s++) 61051a431409SRich Burridge continue; 61061a431409SRich Burridge prefix_len = s - name; 61071a431409SRich Burridge 61081a431409SRich Burridge /* Create the portion of the name that was stripped off. */ 61091a431409SRich Burridge s = malloc(prefix_len + 1); 61101a431409SRich Burridge memcpy(s, name, prefix_len); 61111a431409SRich Burridge s[prefix_len] = 0; 61121a431409SRich Burridge *stripped_prefix = s; 61131a431409SRich Burridge s = &name[prefix_len]; 61141a431409SRich Burridge 61151a431409SRich Burridge return (s); 61161a431409SRich Burridge } 61171a431409SRich Burridge 61181a431409SRich Burridge /* 61197c478bd9Sstevel@tonic-gate * Return through *namep a pointer to the proper fullname (i.e "<name> | 61207c478bd9Sstevel@tonic-gate * <prefix>/<name>"), as represented in the header entry dblock.dbuf. 6121da6c28aaSamw * 6122da6c28aaSamw * Returns 0 if successful, otherwise returns 1. 61237c478bd9Sstevel@tonic-gate */ 61247c478bd9Sstevel@tonic-gate 6125da6c28aaSamw static int 61267c478bd9Sstevel@tonic-gate check_prefix(char **namep, char **dirp, char **compp) 61277c478bd9Sstevel@tonic-gate { 61287c478bd9Sstevel@tonic-gate static char fullname[PATH_MAX + 1]; 61297c478bd9Sstevel@tonic-gate static char dir[PATH_MAX + 1]; 61307c478bd9Sstevel@tonic-gate static char component[PATH_MAX + 1]; 61317c478bd9Sstevel@tonic-gate static char savename[PATH_MAX + 1]; 61327c478bd9Sstevel@tonic-gate char *s; 61337c478bd9Sstevel@tonic-gate 61347c478bd9Sstevel@tonic-gate (void) memset(dir, 0, sizeof (dir)); 61357c478bd9Sstevel@tonic-gate (void) memset(component, 0, sizeof (component)); 61367c478bd9Sstevel@tonic-gate 61377c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) { 61387c478bd9Sstevel@tonic-gate (void) strcpy(fullname, Xtarhdr.x_path); 61397c478bd9Sstevel@tonic-gate } else { 61407c478bd9Sstevel@tonic-gate if (dblock.dbuf.prefix[0] != '\0') 61417c478bd9Sstevel@tonic-gate (void) sprintf(fullname, "%.*s/%.*s", PRESIZ, 61427c478bd9Sstevel@tonic-gate dblock.dbuf.prefix, NAMSIZ, dblock.dbuf.name); 61437c478bd9Sstevel@tonic-gate else 61447c478bd9Sstevel@tonic-gate (void) sprintf(fullname, "%.*s", NAMSIZ, 61457c478bd9Sstevel@tonic-gate dblock.dbuf.name); 61467c478bd9Sstevel@tonic-gate } 61477c478bd9Sstevel@tonic-gate 61487c478bd9Sstevel@tonic-gate /* 61491a431409SRich Burridge * If we are printing a table of contents or extracting an archive, 61501a431409SRich Burridge * make absolute pathnames relative and prohibit the unpacking of 61511a431409SRich Burridge * files contain ".." in their name (unless the user has supplied 61521a431409SRich Burridge * the -P option). 61531a431409SRich Burridge */ 61541a431409SRich Burridge if ((tflag || xflag) && !Pflag) { 61551a431409SRich Burridge if (is_absolute(fullname) || has_dot_dot(fullname)) { 61561a431409SRich Burridge char *stripped_prefix; 61571a431409SRich Burridge 61581a431409SRich Burridge (void) strcpy(savename, fullname); 61591a431409SRich Burridge strcpy(fullname, 61601a431409SRich Burridge make_relative_name(savename, &stripped_prefix)); 61611a431409SRich Burridge (void) fprintf(stderr, 61621a431409SRich Burridge gettext("tar: Removing leading '%s' from '%s'\n"), 61631a431409SRich Burridge stripped_prefix, savename); 61641a431409SRich Burridge free(stripped_prefix); 61651a431409SRich Burridge } 61661a431409SRich Burridge } 61671a431409SRich Burridge 61681a431409SRich Burridge /* 61697c478bd9Sstevel@tonic-gate * Set dir and component names 61707c478bd9Sstevel@tonic-gate */ 61717c478bd9Sstevel@tonic-gate 61727c478bd9Sstevel@tonic-gate get_parent(fullname, dir); 61737c478bd9Sstevel@tonic-gate 61747c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 6175da6c28aaSamw if (xattrp == NULL) { 61767c478bd9Sstevel@tonic-gate #endif 61777c478bd9Sstevel@tonic-gate /* 61787c478bd9Sstevel@tonic-gate * Save of real name since were going to chop off the 61797c478bd9Sstevel@tonic-gate * trailing slashes. 61807c478bd9Sstevel@tonic-gate */ 61817c478bd9Sstevel@tonic-gate (void) strcpy(savename, fullname); 61827c478bd9Sstevel@tonic-gate /* 61837c478bd9Sstevel@tonic-gate * first strip of trailing slashes. 61847c478bd9Sstevel@tonic-gate */ 61857c478bd9Sstevel@tonic-gate chop_endslashes(savename); 61867c478bd9Sstevel@tonic-gate s = get_component(savename); 61877c478bd9Sstevel@tonic-gate (void) strcpy(component, s); 61887c478bd9Sstevel@tonic-gate 61897c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 61907c478bd9Sstevel@tonic-gate } else { 61917c478bd9Sstevel@tonic-gate (void) strcpy(fullname, xattrp->h_names); 61927c478bd9Sstevel@tonic-gate (void) strcpy(dir, fullname); 6193da6c28aaSamw (void) strcpy(component, basename(xattrp->h_names + 6194da6c28aaSamw strlen(xattrp->h_names) + 1)); 61957c478bd9Sstevel@tonic-gate } 61967c478bd9Sstevel@tonic-gate #endif 61977c478bd9Sstevel@tonic-gate *namep = fullname; 61987c478bd9Sstevel@tonic-gate *dirp = dir; 61997c478bd9Sstevel@tonic-gate *compp = component; 6200da6c28aaSamw 6201da6c28aaSamw return (0); 62027c478bd9Sstevel@tonic-gate } 62037c478bd9Sstevel@tonic-gate 62047c478bd9Sstevel@tonic-gate /* 62057c478bd9Sstevel@tonic-gate * Return true if the object indicated by the file descriptor and type 62067c478bd9Sstevel@tonic-gate * is a tape device, false otherwise 62077c478bd9Sstevel@tonic-gate */ 62087c478bd9Sstevel@tonic-gate 62097c478bd9Sstevel@tonic-gate static int 62107c478bd9Sstevel@tonic-gate istape(int fd, int type) 62117c478bd9Sstevel@tonic-gate { 62127c478bd9Sstevel@tonic-gate int result = 0; 62137c478bd9Sstevel@tonic-gate 62144bc0a2efScasper if (S_ISCHR(type)) { 62157c478bd9Sstevel@tonic-gate struct mtget mtg; 62167c478bd9Sstevel@tonic-gate 62177c478bd9Sstevel@tonic-gate if (ioctl(fd, MTIOCGET, &mtg) != -1) { 62187c478bd9Sstevel@tonic-gate result = 1; 62197c478bd9Sstevel@tonic-gate } 62207c478bd9Sstevel@tonic-gate } 62217c478bd9Sstevel@tonic-gate 62227c478bd9Sstevel@tonic-gate return (result); 62237c478bd9Sstevel@tonic-gate } 62247c478bd9Sstevel@tonic-gate 62257c478bd9Sstevel@tonic-gate #include <utmpx.h> 62267c478bd9Sstevel@tonic-gate 62277c478bd9Sstevel@tonic-gate struct utmpx utmpx; 62287c478bd9Sstevel@tonic-gate 62297c478bd9Sstevel@tonic-gate #define NMAX (sizeof (utmpx.ut_name)) 62307c478bd9Sstevel@tonic-gate 62317c478bd9Sstevel@tonic-gate typedef struct cachenode { /* this struct must be zeroed before using */ 62327c478bd9Sstevel@tonic-gate struct cachenode *next; /* next in hash chain */ 62337c478bd9Sstevel@tonic-gate int val; /* the uid or gid of this entry */ 62347c478bd9Sstevel@tonic-gate int namehash; /* name's hash signature */ 62357c478bd9Sstevel@tonic-gate char name[NMAX+1]; /* the string that val maps to */ 62367c478bd9Sstevel@tonic-gate } cachenode_t; 62377c478bd9Sstevel@tonic-gate 62387c478bd9Sstevel@tonic-gate #define HASHSIZE 256 62397c478bd9Sstevel@tonic-gate 62407c478bd9Sstevel@tonic-gate static cachenode_t *names[HASHSIZE]; 62417c478bd9Sstevel@tonic-gate static cachenode_t *groups[HASHSIZE]; 62427c478bd9Sstevel@tonic-gate static cachenode_t *uids[HASHSIZE]; 62437c478bd9Sstevel@tonic-gate static cachenode_t *gids[HASHSIZE]; 62447c478bd9Sstevel@tonic-gate 62457c478bd9Sstevel@tonic-gate static int 62467c478bd9Sstevel@tonic-gate hash_byname(char *name) 62477c478bd9Sstevel@tonic-gate { 62487c478bd9Sstevel@tonic-gate int i, c, h = 0; 62497c478bd9Sstevel@tonic-gate 62507c478bd9Sstevel@tonic-gate for (i = 0; i < NMAX; i++) { 62517c478bd9Sstevel@tonic-gate c = name[i]; 62527c478bd9Sstevel@tonic-gate if (c == '\0') 62537c478bd9Sstevel@tonic-gate break; 62547c478bd9Sstevel@tonic-gate h = (h << 4) + h + c; 62557c478bd9Sstevel@tonic-gate } 62567c478bd9Sstevel@tonic-gate return (h); 62577c478bd9Sstevel@tonic-gate } 62587c478bd9Sstevel@tonic-gate 62597c478bd9Sstevel@tonic-gate static cachenode_t * 62607c478bd9Sstevel@tonic-gate hash_lookup_byval(cachenode_t *table[], int val) 62617c478bd9Sstevel@tonic-gate { 62627c478bd9Sstevel@tonic-gate int h = val; 62637c478bd9Sstevel@tonic-gate cachenode_t *c; 62647c478bd9Sstevel@tonic-gate 62657c478bd9Sstevel@tonic-gate for (c = table[h & (HASHSIZE - 1)]; c != NULL; c = c->next) { 62667c478bd9Sstevel@tonic-gate if (c->val == val) 62677c478bd9Sstevel@tonic-gate return (c); 62687c478bd9Sstevel@tonic-gate } 62697c478bd9Sstevel@tonic-gate return (NULL); 62707c478bd9Sstevel@tonic-gate } 62717c478bd9Sstevel@tonic-gate 62727c478bd9Sstevel@tonic-gate static cachenode_t * 62737c478bd9Sstevel@tonic-gate hash_lookup_byname(cachenode_t *table[], char *name) 62747c478bd9Sstevel@tonic-gate { 62757c478bd9Sstevel@tonic-gate int h = hash_byname(name); 62767c478bd9Sstevel@tonic-gate cachenode_t *c; 62777c478bd9Sstevel@tonic-gate 62787c478bd9Sstevel@tonic-gate for (c = table[h & (HASHSIZE - 1)]; c != NULL; c = c->next) { 62797c478bd9Sstevel@tonic-gate if (c->namehash == h && strcmp(c->name, name) == 0) 62807c478bd9Sstevel@tonic-gate return (c); 62817c478bd9Sstevel@tonic-gate } 62827c478bd9Sstevel@tonic-gate return (NULL); 62837c478bd9Sstevel@tonic-gate } 62847c478bd9Sstevel@tonic-gate 62857c478bd9Sstevel@tonic-gate static cachenode_t * 62867c478bd9Sstevel@tonic-gate hash_insert(cachenode_t *table[], char *name, int value) 62877c478bd9Sstevel@tonic-gate { 62887c478bd9Sstevel@tonic-gate cachenode_t *c; 62897c478bd9Sstevel@tonic-gate int signature; 62907c478bd9Sstevel@tonic-gate 62917c478bd9Sstevel@tonic-gate c = calloc(1, sizeof (cachenode_t)); 62927c478bd9Sstevel@tonic-gate if (c == NULL) { 62937c478bd9Sstevel@tonic-gate perror("malloc"); 62947c478bd9Sstevel@tonic-gate exit(1); 62957c478bd9Sstevel@tonic-gate } 62967c478bd9Sstevel@tonic-gate if (name != NULL) { 62977c478bd9Sstevel@tonic-gate (void) strncpy(c->name, name, NMAX); 62987c478bd9Sstevel@tonic-gate c->namehash = hash_byname(name); 62997c478bd9Sstevel@tonic-gate } 63007c478bd9Sstevel@tonic-gate c->val = value; 63017c478bd9Sstevel@tonic-gate if (table == uids || table == gids) 63027c478bd9Sstevel@tonic-gate signature = c->val; 63037c478bd9Sstevel@tonic-gate else 63047c478bd9Sstevel@tonic-gate signature = c->namehash; 63057c478bd9Sstevel@tonic-gate c->next = table[signature & (HASHSIZE - 1)]; 63067c478bd9Sstevel@tonic-gate table[signature & (HASHSIZE - 1)] = c; 63077c478bd9Sstevel@tonic-gate return (c); 63087c478bd9Sstevel@tonic-gate } 63097c478bd9Sstevel@tonic-gate 63107c478bd9Sstevel@tonic-gate static char * 63117c478bd9Sstevel@tonic-gate getname(uid_t uid) 63127c478bd9Sstevel@tonic-gate { 63137c478bd9Sstevel@tonic-gate cachenode_t *c; 63147c478bd9Sstevel@tonic-gate 63157c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byval(uids, uid)) == NULL) { 63167c478bd9Sstevel@tonic-gate struct passwd *pwent = getpwuid(uid); 63177c478bd9Sstevel@tonic-gate c = hash_insert(uids, pwent ? pwent->pw_name : NULL, uid); 63187c478bd9Sstevel@tonic-gate } 63197c478bd9Sstevel@tonic-gate return (c->name); 63207c478bd9Sstevel@tonic-gate } 63217c478bd9Sstevel@tonic-gate 63227c478bd9Sstevel@tonic-gate static char * 63237c478bd9Sstevel@tonic-gate getgroup(gid_t gid) 63247c478bd9Sstevel@tonic-gate { 63257c478bd9Sstevel@tonic-gate cachenode_t *c; 63267c478bd9Sstevel@tonic-gate 63277c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byval(gids, gid)) == NULL) { 63287c478bd9Sstevel@tonic-gate struct group *grent = getgrgid(gid); 63297c478bd9Sstevel@tonic-gate c = hash_insert(gids, grent ? grent->gr_name : NULL, gid); 63307c478bd9Sstevel@tonic-gate } 63317c478bd9Sstevel@tonic-gate return (c->name); 63327c478bd9Sstevel@tonic-gate } 63337c478bd9Sstevel@tonic-gate 63347c478bd9Sstevel@tonic-gate static uid_t 63357c478bd9Sstevel@tonic-gate getuidbyname(char *name) 63367c478bd9Sstevel@tonic-gate { 63377c478bd9Sstevel@tonic-gate cachenode_t *c; 63387c478bd9Sstevel@tonic-gate 63397c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byname(names, name)) == NULL) { 63407c478bd9Sstevel@tonic-gate struct passwd *pwent = getpwnam(name); 63417c478bd9Sstevel@tonic-gate c = hash_insert(names, name, pwent ? (int)pwent->pw_uid : -1); 63427c478bd9Sstevel@tonic-gate } 63437c478bd9Sstevel@tonic-gate return ((uid_t)c->val); 63447c478bd9Sstevel@tonic-gate } 63457c478bd9Sstevel@tonic-gate 63467c478bd9Sstevel@tonic-gate static gid_t 63477c478bd9Sstevel@tonic-gate getgidbyname(char *group) 63487c478bd9Sstevel@tonic-gate { 63497c478bd9Sstevel@tonic-gate cachenode_t *c; 63507c478bd9Sstevel@tonic-gate 63517c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byname(groups, group)) == NULL) { 63527c478bd9Sstevel@tonic-gate struct group *grent = getgrnam(group); 63537c478bd9Sstevel@tonic-gate c = hash_insert(groups, group, grent ? (int)grent->gr_gid : -1); 63547c478bd9Sstevel@tonic-gate } 63557c478bd9Sstevel@tonic-gate return ((gid_t)c->val); 63567c478bd9Sstevel@tonic-gate } 63577c478bd9Sstevel@tonic-gate 63587c478bd9Sstevel@tonic-gate /* 63597c478bd9Sstevel@tonic-gate * Build the header. 63607c478bd9Sstevel@tonic-gate * Determine whether or not an extended header is also needed. If needed, 63617c478bd9Sstevel@tonic-gate * create and write the extended header and its data. 63627c478bd9Sstevel@tonic-gate * Writing of the extended header assumes that "tomodes" has been called and 63637c478bd9Sstevel@tonic-gate * the relevant information has been placed in the header block. 63647c478bd9Sstevel@tonic-gate */ 63657c478bd9Sstevel@tonic-gate 63667c478bd9Sstevel@tonic-gate static int 63677c478bd9Sstevel@tonic-gate build_dblock( 63687c478bd9Sstevel@tonic-gate const char *name, 63697c478bd9Sstevel@tonic-gate const char *linkname, 63707c478bd9Sstevel@tonic-gate const char typeflag, 63717c478bd9Sstevel@tonic-gate const int filetype, 63727c478bd9Sstevel@tonic-gate const struct stat *sp, 63737c478bd9Sstevel@tonic-gate const dev_t device, 63747c478bd9Sstevel@tonic-gate const char *prefix) 63757c478bd9Sstevel@tonic-gate { 63767c478bd9Sstevel@tonic-gate int nblks; 63777c478bd9Sstevel@tonic-gate major_t dev; 63787c478bd9Sstevel@tonic-gate const char *filename; 63797c478bd9Sstevel@tonic-gate const char *lastslash; 63807c478bd9Sstevel@tonic-gate 63817c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) 63827c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = _XATTR_HDRTYPE; 63837c478bd9Sstevel@tonic-gate else 63847c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = typeflag; 63857c478bd9Sstevel@tonic-gate (void) memset(dblock.dbuf.name, '\0', NAMSIZ); 63867c478bd9Sstevel@tonic-gate (void) memset(dblock.dbuf.linkname, '\0', NAMSIZ); 63877c478bd9Sstevel@tonic-gate (void) memset(dblock.dbuf.prefix, '\0', PRESIZ); 63887c478bd9Sstevel@tonic-gate 63897c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 63907c478bd9Sstevel@tonic-gate filename = Xtarhdr.x_path; 63917c478bd9Sstevel@tonic-gate else 63927c478bd9Sstevel@tonic-gate filename = name; 63937c478bd9Sstevel@tonic-gate 63947c478bd9Sstevel@tonic-gate if ((dev = major(device)) > OCTAL7CHAR) { 63957c478bd9Sstevel@tonic-gate if (Eflag) { 63967c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMAJOR; 63977c478bd9Sstevel@tonic-gate Xtarhdr.x_devmajor = dev; 63987c478bd9Sstevel@tonic-gate } else { 63997c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 64007c478bd9Sstevel@tonic-gate "Device major too large for %s. Use -E flag."), 64017c478bd9Sstevel@tonic-gate filename); 64027c478bd9Sstevel@tonic-gate if (errflag) 64037c478bd9Sstevel@tonic-gate done(1); 64047c478bd9Sstevel@tonic-gate else 64057c478bd9Sstevel@tonic-gate Errflg = 1; 64067c478bd9Sstevel@tonic-gate } 64077c478bd9Sstevel@tonic-gate dev = 0; 64087c478bd9Sstevel@tonic-gate } 64097c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.devmajor, "%07lo", dev); 64107c478bd9Sstevel@tonic-gate if ((dev = minor(device)) > OCTAL7CHAR) { 64117c478bd9Sstevel@tonic-gate if (Eflag) { 64127c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMINOR; 64137c478bd9Sstevel@tonic-gate Xtarhdr.x_devminor = dev; 64147c478bd9Sstevel@tonic-gate } else { 64157c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 64167c478bd9Sstevel@tonic-gate "Device minor too large for %s. Use -E flag."), 64177c478bd9Sstevel@tonic-gate filename); 64187c478bd9Sstevel@tonic-gate if (errflag) 64197c478bd9Sstevel@tonic-gate done(1); 64207c478bd9Sstevel@tonic-gate else 64217c478bd9Sstevel@tonic-gate Errflg = 1; 64227c478bd9Sstevel@tonic-gate } 64237c478bd9Sstevel@tonic-gate dev = 0; 64247c478bd9Sstevel@tonic-gate } 64257c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.devminor, "%07lo", dev); 64267c478bd9Sstevel@tonic-gate 64277c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.name, name, NAMSIZ); 64287c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.linkname, linkname, NAMSIZ); 64297c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.magic, "%.5s", magic_type); 64307c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.version, "00"); 64317c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.uname, "%.31s", getname(sp->st_uid)); 64327c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.gname, "%.31s", getgroup(sp->st_gid)); 64337c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.prefix, prefix, PRESIZ); 64347c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 64357c478bd9Sstevel@tonic-gate 64367c478bd9Sstevel@tonic-gate if (Eflag) { 64377c478bd9Sstevel@tonic-gate (void) bcopy(dblock.dummy, xhdr_buf.dummy, TBLOCK); 64387c478bd9Sstevel@tonic-gate (void) memset(xhdr_buf.dbuf.name, '\0', NAMSIZ); 64397c478bd9Sstevel@tonic-gate lastslash = strrchr(name, '/'); 64407c478bd9Sstevel@tonic-gate if (lastslash == NULL) 64417c478bd9Sstevel@tonic-gate lastslash = name; 64427c478bd9Sstevel@tonic-gate else 64437c478bd9Sstevel@tonic-gate lastslash++; 64447c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_buf.dbuf.name, lastslash); 64457c478bd9Sstevel@tonic-gate (void) memset(xhdr_buf.dbuf.linkname, '\0', NAMSIZ); 64467c478bd9Sstevel@tonic-gate (void) memset(xhdr_buf.dbuf.prefix, '\0', PRESIZ); 64477c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_buf.dbuf.prefix, xhdr_dirname); 64487c478bd9Sstevel@tonic-gate xhdr_count++; 64497c478bd9Sstevel@tonic-gate xrec_offset = 0; 64507c478bd9Sstevel@tonic-gate gen_date("mtime", sp->st_mtim); 64517c478bd9Sstevel@tonic-gate xhdr_buf.dbuf.typeflag = 'X'; 64527c478bd9Sstevel@tonic-gate if (gen_utf8_names(filename) != 0) 64537c478bd9Sstevel@tonic-gate return (1); 64547c478bd9Sstevel@tonic-gate 64557c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG 64567c478bd9Sstevel@tonic-gate Xtarhdr.x_uname = dblock.dbuf.uname; 64577c478bd9Sstevel@tonic-gate Xtarhdr.x_gname = dblock.dbuf.gname; 64587c478bd9Sstevel@tonic-gate xhdr_flgs |= (_X_UNAME | _X_GNAME); 64597c478bd9Sstevel@tonic-gate #endif 64607c478bd9Sstevel@tonic-gate if (xhdr_flgs) { 64617c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_DEVMAJOR) 64627c478bd9Sstevel@tonic-gate gen_num("SUN.devmajor", Xtarhdr.x_devmajor); 64637c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_DEVMINOR) 64647c478bd9Sstevel@tonic-gate gen_num("SUN.devminor", Xtarhdr.x_devminor); 64657c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_GID) 64667c478bd9Sstevel@tonic-gate gen_num("gid", Xtarhdr.x_gid); 64677c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_UID) 64687c478bd9Sstevel@tonic-gate gen_num("uid", Xtarhdr.x_uid); 64697c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_SIZE) 64707c478bd9Sstevel@tonic-gate gen_num("size", Xtarhdr.x_filesz); 64717c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 64727c478bd9Sstevel@tonic-gate gen_string("path", Xtarhdr.x_path); 64737c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) 64747c478bd9Sstevel@tonic-gate gen_string("linkpath", Xtarhdr.x_linkpath); 64757c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_GNAME) 64767c478bd9Sstevel@tonic-gate gen_string("gname", Xtarhdr.x_gname); 64777c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_UNAME) 64787c478bd9Sstevel@tonic-gate gen_string("uname", Xtarhdr.x_uname); 64797c478bd9Sstevel@tonic-gate } 64807c478bd9Sstevel@tonic-gate (void) sprintf(xhdr_buf.dbuf.size, 64817c478bd9Sstevel@tonic-gate "%011" FMT_off_t_o, xrec_offset); 64827c478bd9Sstevel@tonic-gate (void) sprintf(xhdr_buf.dbuf.chksum, "%07o", 64837c478bd9Sstevel@tonic-gate checksum(&xhdr_buf)); 64847c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&xhdr_buf, 1); 64857c478bd9Sstevel@tonic-gate nblks = TBLOCKS(xrec_offset); 64867c478bd9Sstevel@tonic-gate (void) writetbuf(xrec_ptr, nblks); 64877c478bd9Sstevel@tonic-gate } 64887c478bd9Sstevel@tonic-gate return (0); 64897c478bd9Sstevel@tonic-gate } 64907c478bd9Sstevel@tonic-gate 64917c478bd9Sstevel@tonic-gate 64927c478bd9Sstevel@tonic-gate /* 64937c478bd9Sstevel@tonic-gate * makeDir - ensure that a directory with the pathname denoted by name 64947c478bd9Sstevel@tonic-gate * exists, and return 1 on success, and 0 on failure (e.g., 64957c478bd9Sstevel@tonic-gate * read-only file system, exists but not-a-directory). 64967c478bd9Sstevel@tonic-gate */ 64977c478bd9Sstevel@tonic-gate 64987c478bd9Sstevel@tonic-gate static int 64997c478bd9Sstevel@tonic-gate makeDir(char *name) 65007c478bd9Sstevel@tonic-gate { 65017c478bd9Sstevel@tonic-gate struct stat buf; 65027c478bd9Sstevel@tonic-gate 65037c478bd9Sstevel@tonic-gate if (access(name, 0) < 0) { /* name doesn't exist */ 65047c478bd9Sstevel@tonic-gate if (mkdir(name, 0777) < 0) { 65057c478bd9Sstevel@tonic-gate vperror(0, "%s", name); 65067c478bd9Sstevel@tonic-gate return (0); 65077c478bd9Sstevel@tonic-gate } 65087c478bd9Sstevel@tonic-gate } else { /* name exists */ 65097c478bd9Sstevel@tonic-gate if (stat(name, &buf) < 0) { 65107c478bd9Sstevel@tonic-gate vperror(0, "%s", name); 65117c478bd9Sstevel@tonic-gate return (0); 65127c478bd9Sstevel@tonic-gate } 65137c478bd9Sstevel@tonic-gate 65147c478bd9Sstevel@tonic-gate return ((buf.st_mode & S_IFMT) == S_IFDIR); 65157c478bd9Sstevel@tonic-gate } 65167c478bd9Sstevel@tonic-gate 65177c478bd9Sstevel@tonic-gate return (1); 65187c478bd9Sstevel@tonic-gate } 65197c478bd9Sstevel@tonic-gate 65207c478bd9Sstevel@tonic-gate 65217c478bd9Sstevel@tonic-gate /* 65227c478bd9Sstevel@tonic-gate * Save this directory and its mtime on the stack, popping and setting 65237c478bd9Sstevel@tonic-gate * the mtimes of any stacked dirs which aren't parents of this one. 65247c478bd9Sstevel@tonic-gate * A null name causes the entire stack to be unwound and set. 65257c478bd9Sstevel@tonic-gate * 65267c478bd9Sstevel@tonic-gate * Since all the elements of the directory "stack" share a common 65277c478bd9Sstevel@tonic-gate * prefix, we can make do with one string. We keep only the current 65287c478bd9Sstevel@tonic-gate * directory path, with an associated array of mtime's. A negative 65297c478bd9Sstevel@tonic-gate * mtime means no mtime. 65307c478bd9Sstevel@tonic-gate * 65317c478bd9Sstevel@tonic-gate * This stack algorithm is not guaranteed to work for tapes created 65327c478bd9Sstevel@tonic-gate * with the 'r' function letter, but the vast majority of tapes with 65337c478bd9Sstevel@tonic-gate * directories are not. This avoids saving every directory record on 65347c478bd9Sstevel@tonic-gate * the tape and setting all the times at the end. 65357c478bd9Sstevel@tonic-gate * 65367c478bd9Sstevel@tonic-gate * (This was borrowed from the 4.1.3 source, and adapted to the 5.x 65377c478bd9Sstevel@tonic-gate * environment) 65387c478bd9Sstevel@tonic-gate */ 65397c478bd9Sstevel@tonic-gate 65407c478bd9Sstevel@tonic-gate static void 65417c478bd9Sstevel@tonic-gate doDirTimes(char *name, timestruc_t modTime) 65427c478bd9Sstevel@tonic-gate { 65437c478bd9Sstevel@tonic-gate static char dirstack[PATH_MAX+2]; 65447c478bd9Sstevel@tonic-gate /* Add spaces for the last slash and last NULL */ 65457c478bd9Sstevel@tonic-gate static timestruc_t modtimes[PATH_MAX+1]; /* hash table */ 65467c478bd9Sstevel@tonic-gate char *p = dirstack; 65477c478bd9Sstevel@tonic-gate char *q = name; 65487c478bd9Sstevel@tonic-gate char *savp; 65497c478bd9Sstevel@tonic-gate 65507c478bd9Sstevel@tonic-gate if (q) { 65517c478bd9Sstevel@tonic-gate /* 65527c478bd9Sstevel@tonic-gate * Find common prefix 65537c478bd9Sstevel@tonic-gate */ 65547c478bd9Sstevel@tonic-gate 65557c478bd9Sstevel@tonic-gate while (*p == *q && *p) { 65567c478bd9Sstevel@tonic-gate p++; q++; 65577c478bd9Sstevel@tonic-gate } 65587c478bd9Sstevel@tonic-gate } 65597c478bd9Sstevel@tonic-gate 65607c478bd9Sstevel@tonic-gate savp = p; 65617c478bd9Sstevel@tonic-gate while (*p) { 65627c478bd9Sstevel@tonic-gate /* 65637c478bd9Sstevel@tonic-gate * Not a child: unwind the stack, setting the times. 65647c478bd9Sstevel@tonic-gate * The order we do this doesn't matter, so we go "forward." 65657c478bd9Sstevel@tonic-gate */ 65667c478bd9Sstevel@tonic-gate 65677c478bd9Sstevel@tonic-gate if (*p == '/') 65687c478bd9Sstevel@tonic-gate if (modtimes[p - dirstack].tv_sec >= 0) { 65697c478bd9Sstevel@tonic-gate *p = '\0'; /* zap the slash */ 65707c478bd9Sstevel@tonic-gate setPathTimes(AT_FDCWD, dirstack, 65717c478bd9Sstevel@tonic-gate modtimes[p - dirstack]); 65727c478bd9Sstevel@tonic-gate *p = '/'; 65737c478bd9Sstevel@tonic-gate } 65747c478bd9Sstevel@tonic-gate ++p; 65757c478bd9Sstevel@tonic-gate } 65767c478bd9Sstevel@tonic-gate 65777c478bd9Sstevel@tonic-gate p = savp; 65787c478bd9Sstevel@tonic-gate 65797c478bd9Sstevel@tonic-gate /* 65807c478bd9Sstevel@tonic-gate * Push this one on the "stack" 65817c478bd9Sstevel@tonic-gate */ 65827c478bd9Sstevel@tonic-gate 65837c478bd9Sstevel@tonic-gate if (q) { 65847c478bd9Sstevel@tonic-gate 65857c478bd9Sstevel@tonic-gate /* 65867c478bd9Sstevel@tonic-gate * Since the name parameter points the dir pathname 65877c478bd9Sstevel@tonic-gate * which is limited only to contain PATH_MAX chars 65887c478bd9Sstevel@tonic-gate * at maximum, we can ignore the overflow case of p. 65897c478bd9Sstevel@tonic-gate */ 65907c478bd9Sstevel@tonic-gate 65917c478bd9Sstevel@tonic-gate while ((*p = *q++)) { /* append the rest of the new dir */ 65927c478bd9Sstevel@tonic-gate modtimes[p - dirstack].tv_sec = -1; 65937c478bd9Sstevel@tonic-gate p++; 65947c478bd9Sstevel@tonic-gate } 65957c478bd9Sstevel@tonic-gate 65967c478bd9Sstevel@tonic-gate /* 65977c478bd9Sstevel@tonic-gate * If the tar file had used 'P' or 'E' function modifier, 65987c478bd9Sstevel@tonic-gate * append the last slash. 65997c478bd9Sstevel@tonic-gate */ 66007c478bd9Sstevel@tonic-gate if (*(p - 1) != '/') { 66017c478bd9Sstevel@tonic-gate *p++ = '/'; 66027c478bd9Sstevel@tonic-gate *p = '\0'; 66037c478bd9Sstevel@tonic-gate } 66047c478bd9Sstevel@tonic-gate /* overwrite the last one */ 66057c478bd9Sstevel@tonic-gate modtimes[p - dirstack - 1] = modTime; 66067c478bd9Sstevel@tonic-gate } 66077c478bd9Sstevel@tonic-gate } 66087c478bd9Sstevel@tonic-gate 66097c478bd9Sstevel@tonic-gate 66107c478bd9Sstevel@tonic-gate /* 66117c478bd9Sstevel@tonic-gate * setPathTimes - set the modification time for given path. Return 1 if 66127c478bd9Sstevel@tonic-gate * successful and 0 if not successful. 66137c478bd9Sstevel@tonic-gate */ 66147c478bd9Sstevel@tonic-gate 66157c478bd9Sstevel@tonic-gate static void 66167c478bd9Sstevel@tonic-gate setPathTimes(int dirfd, char *path, timestruc_t modTime) 66177c478bd9Sstevel@tonic-gate 66187c478bd9Sstevel@tonic-gate { 66197c478bd9Sstevel@tonic-gate struct timeval timebuf[2]; 66207c478bd9Sstevel@tonic-gate 66217c478bd9Sstevel@tonic-gate /* 66227c478bd9Sstevel@tonic-gate * futimesat takes an array of two timeval structs. 66237c478bd9Sstevel@tonic-gate * The first entry contains access time. 66247c478bd9Sstevel@tonic-gate * The second entry contains modification time. 66257c478bd9Sstevel@tonic-gate * Unlike a timestruc_t, which uses nanoseconds, timeval uses 66267c478bd9Sstevel@tonic-gate * microseconds. 66277c478bd9Sstevel@tonic-gate */ 66287c478bd9Sstevel@tonic-gate timebuf[0].tv_sec = time((time_t *)0); 66297c478bd9Sstevel@tonic-gate timebuf[0].tv_usec = 0; 66307c478bd9Sstevel@tonic-gate timebuf[1].tv_sec = modTime.tv_sec; 66317c478bd9Sstevel@tonic-gate 66327c478bd9Sstevel@tonic-gate /* Extended header: use microseconds */ 66337c478bd9Sstevel@tonic-gate timebuf[1].tv_usec = (xhdr_flgs & _X_MTIME) ? modTime.tv_nsec/1000 : 0; 66347c478bd9Sstevel@tonic-gate 66357c478bd9Sstevel@tonic-gate if (futimesat(dirfd, path, timebuf) < 0) 66368e4a71aeSRich Burridge vperror(0, gettext("can't set time on %s"), path); 66377c478bd9Sstevel@tonic-gate } 66387c478bd9Sstevel@tonic-gate 66397c478bd9Sstevel@tonic-gate 66407c478bd9Sstevel@tonic-gate /* 66417c478bd9Sstevel@tonic-gate * If hflag is set then delete the symbolic link's target. 66427c478bd9Sstevel@tonic-gate * If !hflag then delete the target. 66437c478bd9Sstevel@tonic-gate */ 66447c478bd9Sstevel@tonic-gate 66457c478bd9Sstevel@tonic-gate static void 66462c0f0499Slovely delete_target(int fd, char *comp, char *namep) 66477c478bd9Sstevel@tonic-gate { 66487c478bd9Sstevel@tonic-gate struct stat xtractbuf; 66497c478bd9Sstevel@tonic-gate char buf[PATH_MAX + 1]; 66507c478bd9Sstevel@tonic-gate int n; 66517c478bd9Sstevel@tonic-gate 66527c478bd9Sstevel@tonic-gate 66532c0f0499Slovely if (unlinkat(fd, comp, AT_REMOVEDIR) < 0) { 66547c478bd9Sstevel@tonic-gate if (errno == ENOTDIR && !hflag) { 66552c0f0499Slovely (void) unlinkat(fd, comp, 0); 66567c478bd9Sstevel@tonic-gate } else if (errno == ENOTDIR && hflag) { 66577c478bd9Sstevel@tonic-gate if (!lstat(namep, &xtractbuf)) { 66587c478bd9Sstevel@tonic-gate if ((xtractbuf.st_mode & S_IFMT) != S_IFLNK) { 66592c0f0499Slovely (void) unlinkat(fd, comp, 0); 66607c478bd9Sstevel@tonic-gate } else if ((n = readlink(namep, buf, 66617c478bd9Sstevel@tonic-gate PATH_MAX)) != -1) { 66627c478bd9Sstevel@tonic-gate buf[n] = (char)NULL; 66637c478bd9Sstevel@tonic-gate (void) unlinkat(fd, buf, 66647c478bd9Sstevel@tonic-gate AT_REMOVEDIR); 66657c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 66667c478bd9Sstevel@tonic-gate (void) unlinkat(fd, buf, 0); 66677c478bd9Sstevel@tonic-gate } else { 66682c0f0499Slovely (void) unlinkat(fd, comp, 0); 66697c478bd9Sstevel@tonic-gate } 66707c478bd9Sstevel@tonic-gate } else { 66712c0f0499Slovely (void) unlinkat(fd, comp, 0); 66727c478bd9Sstevel@tonic-gate } 66737c478bd9Sstevel@tonic-gate } 66747c478bd9Sstevel@tonic-gate } 66757c478bd9Sstevel@tonic-gate } 66767c478bd9Sstevel@tonic-gate 66777c478bd9Sstevel@tonic-gate 66787c478bd9Sstevel@tonic-gate /* 66797c478bd9Sstevel@tonic-gate * ACL changes: 66807c478bd9Sstevel@tonic-gate * putfile(): 66817c478bd9Sstevel@tonic-gate * Get acl info after stat. Write out ancillary file 66827c478bd9Sstevel@tonic-gate * before the normal file, i.e. directory, regular, FIFO, 66837c478bd9Sstevel@tonic-gate * link, special. If acl count is less than 4, no need to 66847c478bd9Sstevel@tonic-gate * create ancillary file. (i.e. standard permission is in 66857c478bd9Sstevel@tonic-gate * use. 66867c478bd9Sstevel@tonic-gate * doxtract(): 66877c478bd9Sstevel@tonic-gate * Process ancillary file. Read it in and set acl info. 66887c478bd9Sstevel@tonic-gate * watch out for 'o' function modifier. 66897c478bd9Sstevel@tonic-gate * 't' function letter to display table 66907c478bd9Sstevel@tonic-gate */ 66917c478bd9Sstevel@tonic-gate 66927c478bd9Sstevel@tonic-gate /* 66937c478bd9Sstevel@tonic-gate * New functions for ACLs and other security attributes 66947c478bd9Sstevel@tonic-gate */ 66957c478bd9Sstevel@tonic-gate 66967c478bd9Sstevel@tonic-gate /* 66977c478bd9Sstevel@tonic-gate * The function appends the new security attribute info to the end of 66987c478bd9Sstevel@tonic-gate * existing secinfo. 66997c478bd9Sstevel@tonic-gate */ 67007c478bd9Sstevel@tonic-gate int 67017c478bd9Sstevel@tonic-gate append_secattr( 67027c478bd9Sstevel@tonic-gate char **secinfo, /* existing security info */ 67037c478bd9Sstevel@tonic-gate int *secinfo_len, /* length of existing security info */ 670445916cd2Sjpk int size, /* new attribute size: unit depends on type */ 670545916cd2Sjpk char *attrtext, /* new attribute text */ 670645916cd2Sjpk char attr_type) /* new attribute type */ 67077c478bd9Sstevel@tonic-gate { 67087c478bd9Sstevel@tonic-gate char *new_secinfo; 67097c478bd9Sstevel@tonic-gate int newattrsize; 67107c478bd9Sstevel@tonic-gate int oldsize; 671145916cd2Sjpk struct sec_attr *attr; 67127c478bd9Sstevel@tonic-gate 67137c478bd9Sstevel@tonic-gate /* no need to add */ 671445916cd2Sjpk if (attr_type != DIR_TYPE) { 671545916cd2Sjpk if (attrtext == NULL) 67167c478bd9Sstevel@tonic-gate return (0); 671745916cd2Sjpk } 67187c478bd9Sstevel@tonic-gate 671945916cd2Sjpk switch (attr_type) { 672045916cd2Sjpk case UFSD_ACL: 672145916cd2Sjpk case ACE_ACL: 67227c478bd9Sstevel@tonic-gate if (attrtext == NULL) { 67238e4a71aeSRich Burridge (void) fprintf(stderr, gettext("acltotext failed\n")); 67247c478bd9Sstevel@tonic-gate return (-1); 67257c478bd9Sstevel@tonic-gate } 67267c478bd9Sstevel@tonic-gate /* header: type + size = 8 */ 67277c478bd9Sstevel@tonic-gate newattrsize = 8 + (int)strlen(attrtext) + 1; 67287c478bd9Sstevel@tonic-gate attr = (struct sec_attr *)malloc(newattrsize); 67297c478bd9Sstevel@tonic-gate if (attr == NULL) { 67308e4a71aeSRich Burridge (void) fprintf(stderr, 67318e4a71aeSRich Burridge gettext("can't allocate memory\n")); 67327c478bd9Sstevel@tonic-gate return (-1); 67337c478bd9Sstevel@tonic-gate } 673445916cd2Sjpk attr->attr_type = attr_type; 67357c478bd9Sstevel@tonic-gate (void) sprintf(attr->attr_len, 673645916cd2Sjpk "%06o", size); /* acl entry count */ 67377c478bd9Sstevel@tonic-gate (void) strcpy((char *)&attr->attr_info[0], attrtext); 67387c478bd9Sstevel@tonic-gate free(attrtext); 67397c478bd9Sstevel@tonic-gate break; 67407c478bd9Sstevel@tonic-gate 674145916cd2Sjpk /* Trusted Extensions */ 674245916cd2Sjpk case DIR_TYPE: 674345916cd2Sjpk case LBL_TYPE: 674445916cd2Sjpk newattrsize = sizeof (struct sec_attr) + strlen(attrtext); 674545916cd2Sjpk attr = (struct sec_attr *)malloc(newattrsize); 674645916cd2Sjpk if (attr == NULL) { 674745916cd2Sjpk (void) fprintf(stderr, 674845916cd2Sjpk gettext("can't allocate memory\n")); 674945916cd2Sjpk return (-1); 675045916cd2Sjpk } 675145916cd2Sjpk attr->attr_type = attr_type; 675245916cd2Sjpk (void) sprintf(attr->attr_len, 675345916cd2Sjpk "%06d", size); /* len of attr data */ 675445916cd2Sjpk (void) strcpy((char *)&attr->attr_info[0], attrtext); 675545916cd2Sjpk break; 67567c478bd9Sstevel@tonic-gate 67577c478bd9Sstevel@tonic-gate default: 67588e4a71aeSRich Burridge (void) fprintf(stderr, 67598e4a71aeSRich Burridge gettext("unrecognized attribute type\n")); 67607c478bd9Sstevel@tonic-gate return (-1); 67617c478bd9Sstevel@tonic-gate } 67627c478bd9Sstevel@tonic-gate 67637c478bd9Sstevel@tonic-gate /* old security info + new attr header(8) + new attr */ 67647c478bd9Sstevel@tonic-gate oldsize = *secinfo_len; 67657c478bd9Sstevel@tonic-gate *secinfo_len += newattrsize; 67667c478bd9Sstevel@tonic-gate new_secinfo = (char *)malloc(*secinfo_len); 67677c478bd9Sstevel@tonic-gate if (new_secinfo == NULL) { 67688e4a71aeSRich Burridge (void) fprintf(stderr, gettext("can't allocate memory\n")); 67697c478bd9Sstevel@tonic-gate *secinfo_len -= newattrsize; 677045916cd2Sjpk free(attr); 67717c478bd9Sstevel@tonic-gate return (-1); 67727c478bd9Sstevel@tonic-gate } 67737c478bd9Sstevel@tonic-gate 67747c478bd9Sstevel@tonic-gate (void) memcpy(new_secinfo, *secinfo, oldsize); 67757c478bd9Sstevel@tonic-gate (void) memcpy(new_secinfo + oldsize, attr, newattrsize); 67767c478bd9Sstevel@tonic-gate 67777c478bd9Sstevel@tonic-gate free(*secinfo); 677845916cd2Sjpk free(attr); 67797c478bd9Sstevel@tonic-gate *secinfo = new_secinfo; 67807c478bd9Sstevel@tonic-gate return (0); 67817c478bd9Sstevel@tonic-gate } 67827c478bd9Sstevel@tonic-gate 67837c478bd9Sstevel@tonic-gate /* 67847c478bd9Sstevel@tonic-gate * write_ancillary(): write out an ancillary file. 67857c478bd9Sstevel@tonic-gate * The file has the same header as normal file except the type and size 67867c478bd9Sstevel@tonic-gate * fields. The type is 'A' and size is the sum of all attributes 67877c478bd9Sstevel@tonic-gate * in bytes. 67887c478bd9Sstevel@tonic-gate * The body contains a list of attribute type, size and info. Currently, 67897c478bd9Sstevel@tonic-gate * there is only ACL info. This file is put before the normal file. 67907c478bd9Sstevel@tonic-gate */ 67917c478bd9Sstevel@tonic-gate void 67927c478bd9Sstevel@tonic-gate write_ancillary(union hblock *dblockp, char *secinfo, int len, char hdrtype) 67937c478bd9Sstevel@tonic-gate { 67947c478bd9Sstevel@tonic-gate long blocks; 67957c478bd9Sstevel@tonic-gate int savflag; 67967c478bd9Sstevel@tonic-gate int savsize; 67977c478bd9Sstevel@tonic-gate 67987c478bd9Sstevel@tonic-gate /* Just tranditional permissions or no security attribute info */ 67997c478bd9Sstevel@tonic-gate if (len == 0 || secinfo == NULL) 68007c478bd9Sstevel@tonic-gate return; 68017c478bd9Sstevel@tonic-gate 68027c478bd9Sstevel@tonic-gate /* save flag and size */ 68037c478bd9Sstevel@tonic-gate savflag = (dblockp->dbuf).typeflag; 68047c478bd9Sstevel@tonic-gate (void) sscanf(dblockp->dbuf.size, "%12o", (uint_t *)&savsize); 68057c478bd9Sstevel@tonic-gate 68067c478bd9Sstevel@tonic-gate /* special flag for ancillary file */ 68077c478bd9Sstevel@tonic-gate if (hdrtype == _XATTR_HDRTYPE) 68087c478bd9Sstevel@tonic-gate dblockp->dbuf.typeflag = _XATTR_HDRTYPE; 68097c478bd9Sstevel@tonic-gate else 68107c478bd9Sstevel@tonic-gate dblockp->dbuf.typeflag = 'A'; 68117c478bd9Sstevel@tonic-gate 68127c478bd9Sstevel@tonic-gate /* for pre-2.5 versions of tar, need to make sure */ 68137c478bd9Sstevel@tonic-gate /* the ACL file is readable */ 68147c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mode, "%07lo", 68157c478bd9Sstevel@tonic-gate (stbuf.st_mode & POSIXMODES) | 0000200); 68167c478bd9Sstevel@tonic-gate (void) sprintf(dblockp->dbuf.size, "%011o", len); 68177c478bd9Sstevel@tonic-gate (void) sprintf(dblockp->dbuf.chksum, "%07o", checksum(dblockp)); 68187c478bd9Sstevel@tonic-gate 68197c478bd9Sstevel@tonic-gate /* write out the header */ 68207c478bd9Sstevel@tonic-gate (void) writetbuf((char *)dblockp, 1); 68217c478bd9Sstevel@tonic-gate 68227c478bd9Sstevel@tonic-gate /* write out security info */ 68237c478bd9Sstevel@tonic-gate blocks = TBLOCKS(len); 68247c478bd9Sstevel@tonic-gate (void) writetbuf((char *)secinfo, (int)blocks); 68257c478bd9Sstevel@tonic-gate 68267c478bd9Sstevel@tonic-gate /* restore mode, flag and size */ 68277c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mode, "%07lo", stbuf.st_mode & POSIXMODES); 68287c478bd9Sstevel@tonic-gate dblockp->dbuf.typeflag = savflag; 68297c478bd9Sstevel@tonic-gate (void) sprintf(dblockp->dbuf.size, "%011o", savsize); 68307c478bd9Sstevel@tonic-gate } 68317c478bd9Sstevel@tonic-gate 68327c478bd9Sstevel@tonic-gate /* 68337c478bd9Sstevel@tonic-gate * Read the data record for extended headers and then the regular header. 68347c478bd9Sstevel@tonic-gate * The data are read into the buffer and then null-terminated. Entries 6835e765faefSRich Burridge * for typeflag 'X' extended headers are of the format: 68367c478bd9Sstevel@tonic-gate * "%d %s=%s\n" 68377c478bd9Sstevel@tonic-gate * 68387c478bd9Sstevel@tonic-gate * When an extended header record is found, the extended header must 68397c478bd9Sstevel@tonic-gate * be processed and its values used to override the values in the 68407c478bd9Sstevel@tonic-gate * normal header. The way this is done is to process the extended 68417c478bd9Sstevel@tonic-gate * header data record and set the data values, then call getdir 68427c478bd9Sstevel@tonic-gate * to process the regular header, then then to reconcile the two 68437c478bd9Sstevel@tonic-gate * sets of data. 68447c478bd9Sstevel@tonic-gate */ 68457c478bd9Sstevel@tonic-gate 68467c478bd9Sstevel@tonic-gate static int 68477c478bd9Sstevel@tonic-gate get_xdata(void) 68487c478bd9Sstevel@tonic-gate { 68497c478bd9Sstevel@tonic-gate struct keylist_pair { 68507c478bd9Sstevel@tonic-gate int keynum; 68517c478bd9Sstevel@tonic-gate char *keylist; 68527c478bd9Sstevel@tonic-gate } keylist_pair[] = { _X_DEVMAJOR, "SUN.devmajor", 68537c478bd9Sstevel@tonic-gate _X_DEVMINOR, "SUN.devminor", 68547c478bd9Sstevel@tonic-gate _X_GID, "gid", 68557c478bd9Sstevel@tonic-gate _X_GNAME, "gname", 68567c478bd9Sstevel@tonic-gate _X_LINKPATH, "linkpath", 68577c478bd9Sstevel@tonic-gate _X_PATH, "path", 68587c478bd9Sstevel@tonic-gate _X_SIZE, "size", 68597c478bd9Sstevel@tonic-gate _X_UID, "uid", 68607c478bd9Sstevel@tonic-gate _X_UNAME, "uname", 68617c478bd9Sstevel@tonic-gate _X_MTIME, "mtime", 68627c478bd9Sstevel@tonic-gate _X_LAST, "NULL" }; 68637c478bd9Sstevel@tonic-gate char *lineloc; 68647c478bd9Sstevel@tonic-gate int length, i; 68657c478bd9Sstevel@tonic-gate char *keyword, *value; 68667c478bd9Sstevel@tonic-gate blkcnt_t nblocks; 68677c478bd9Sstevel@tonic-gate int bufneeded; 68687c478bd9Sstevel@tonic-gate int errors; 68697c478bd9Sstevel@tonic-gate 6870123523f8Sas158974 (void) memset(&Xtarhdr, 0, sizeof (Xtarhdr)); 68717c478bd9Sstevel@tonic-gate xhdr_count++; 68727c478bd9Sstevel@tonic-gate errors = 0; 68737c478bd9Sstevel@tonic-gate 68747c478bd9Sstevel@tonic-gate nblocks = TBLOCKS(stbuf.st_size); 68757c478bd9Sstevel@tonic-gate bufneeded = nblocks * TBLOCK; 68767c478bd9Sstevel@tonic-gate if (bufneeded >= xrec_size) { 68777c478bd9Sstevel@tonic-gate free(xrec_ptr); 68787c478bd9Sstevel@tonic-gate xrec_size = bufneeded + 1; 68797c478bd9Sstevel@tonic-gate if ((xrec_ptr = malloc(xrec_size)) == NULL) 68807c478bd9Sstevel@tonic-gate fatal(gettext("cannot allocate buffer")); 68817c478bd9Sstevel@tonic-gate } 68827c478bd9Sstevel@tonic-gate 68837c478bd9Sstevel@tonic-gate lineloc = xrec_ptr; 68847c478bd9Sstevel@tonic-gate 68857c478bd9Sstevel@tonic-gate while (nblocks-- > 0) { 68867c478bd9Sstevel@tonic-gate readtape(lineloc); 68877c478bd9Sstevel@tonic-gate lineloc += TBLOCK; 68887c478bd9Sstevel@tonic-gate } 68897c478bd9Sstevel@tonic-gate lineloc = xrec_ptr; 68907c478bd9Sstevel@tonic-gate xrec_ptr[stbuf.st_size] = '\0'; 68917c478bd9Sstevel@tonic-gate while (lineloc < xrec_ptr + stbuf.st_size) { 6892e765faefSRich Burridge if (dblock.dbuf.typeflag == 'L') { 6893e765faefSRich Burridge length = xrec_size; 6894e765faefSRich Burridge keyword = "path"; 6895e765faefSRich Burridge value = lineloc; 6896e765faefSRich Burridge } else { 68977c478bd9Sstevel@tonic-gate length = atoi(lineloc); 68987c478bd9Sstevel@tonic-gate *(lineloc + length - 1) = '\0'; 68997c478bd9Sstevel@tonic-gate keyword = strchr(lineloc, ' ') + 1; 69007c478bd9Sstevel@tonic-gate value = strchr(keyword, '=') + 1; 69017c478bd9Sstevel@tonic-gate *(value - 1) = '\0'; 6902e765faefSRich Burridge } 69037c478bd9Sstevel@tonic-gate i = 0; 69047c478bd9Sstevel@tonic-gate lineloc += length; 69057c478bd9Sstevel@tonic-gate while (keylist_pair[i].keynum != (int)_X_LAST) { 69067c478bd9Sstevel@tonic-gate if (strcmp(keyword, keylist_pair[i].keylist) == 0) 69077c478bd9Sstevel@tonic-gate break; 69087c478bd9Sstevel@tonic-gate i++; 69097c478bd9Sstevel@tonic-gate } 69107c478bd9Sstevel@tonic-gate errno = 0; 69117c478bd9Sstevel@tonic-gate switch (keylist_pair[i].keynum) { 69127c478bd9Sstevel@tonic-gate case _X_DEVMAJOR: 69137c478bd9Sstevel@tonic-gate Xtarhdr.x_devmajor = (major_t)strtoul(value, NULL, 0); 69147c478bd9Sstevel@tonic-gate if (errno) { 69157c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 69167c478bd9Sstevel@tonic-gate "tar: Extended header major value error " 69177c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 69187c478bd9Sstevel@tonic-gate errors++; 69197c478bd9Sstevel@tonic-gate } else 69207c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMAJOR; 69217c478bd9Sstevel@tonic-gate break; 69227c478bd9Sstevel@tonic-gate case _X_DEVMINOR: 69237c478bd9Sstevel@tonic-gate Xtarhdr.x_devminor = (minor_t)strtoul(value, NULL, 0); 69247c478bd9Sstevel@tonic-gate if (errno) { 69257c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 69267c478bd9Sstevel@tonic-gate "tar: Extended header minor value error " 69277c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 69287c478bd9Sstevel@tonic-gate errors++; 69297c478bd9Sstevel@tonic-gate } else 69307c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMINOR; 69317c478bd9Sstevel@tonic-gate break; 69327c478bd9Sstevel@tonic-gate case _X_GID: 69337c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_GID; 69347c478bd9Sstevel@tonic-gate Xtarhdr.x_gid = strtol(value, NULL, 0); 69357c478bd9Sstevel@tonic-gate if ((errno) || (Xtarhdr.x_gid > UID_MAX)) { 69367c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 69377c478bd9Sstevel@tonic-gate "tar: Extended header gid value error " 69387c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 69397c478bd9Sstevel@tonic-gate Xtarhdr.x_gid = GID_NOBODY; 69407c478bd9Sstevel@tonic-gate } 69417c478bd9Sstevel@tonic-gate break; 69427c478bd9Sstevel@tonic-gate case _X_GNAME: 69437c478bd9Sstevel@tonic-gate if (utf8_local("gname", &Xtarhdr.x_gname, 69447c478bd9Sstevel@tonic-gate local_gname, value, _POSIX_NAME_MAX) == 0) 69457c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_GNAME; 69467c478bd9Sstevel@tonic-gate break; 69477c478bd9Sstevel@tonic-gate case _X_LINKPATH: 69487c478bd9Sstevel@tonic-gate if (utf8_local("linkpath", &Xtarhdr.x_linkpath, 69497c478bd9Sstevel@tonic-gate local_linkpath, value, PATH_MAX) == 0) 69507c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_LINKPATH; 69517c478bd9Sstevel@tonic-gate else 69527c478bd9Sstevel@tonic-gate errors++; 69537c478bd9Sstevel@tonic-gate break; 69547c478bd9Sstevel@tonic-gate case _X_PATH: 69557c478bd9Sstevel@tonic-gate if (utf8_local("path", &Xtarhdr.x_path, 69567c478bd9Sstevel@tonic-gate local_path, value, PATH_MAX) == 0) 69577c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_PATH; 69587c478bd9Sstevel@tonic-gate else 69597c478bd9Sstevel@tonic-gate errors++; 69607c478bd9Sstevel@tonic-gate break; 69617c478bd9Sstevel@tonic-gate case _X_SIZE: 69627c478bd9Sstevel@tonic-gate Xtarhdr.x_filesz = strtoull(value, NULL, 0); 69637c478bd9Sstevel@tonic-gate if (errno) { 69647c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 69657c478bd9Sstevel@tonic-gate "tar: Extended header invalid filesize " 69667c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 69677c478bd9Sstevel@tonic-gate errors++; 69687c478bd9Sstevel@tonic-gate } else 69697c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_SIZE; 69707c478bd9Sstevel@tonic-gate break; 69717c478bd9Sstevel@tonic-gate case _X_UID: 69727c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_UID; 69737c478bd9Sstevel@tonic-gate Xtarhdr.x_uid = strtol(value, NULL, 0); 69747c478bd9Sstevel@tonic-gate if ((errno) || (Xtarhdr.x_uid > UID_MAX)) { 69757c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 69767c478bd9Sstevel@tonic-gate "tar: Extended header uid value error " 69777c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 69787c478bd9Sstevel@tonic-gate Xtarhdr.x_uid = UID_NOBODY; 69797c478bd9Sstevel@tonic-gate } 69807c478bd9Sstevel@tonic-gate break; 69817c478bd9Sstevel@tonic-gate case _X_UNAME: 69827c478bd9Sstevel@tonic-gate if (utf8_local("uname", &Xtarhdr.x_uname, 69837c478bd9Sstevel@tonic-gate local_uname, value, _POSIX_NAME_MAX) == 0) 69847c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_UNAME; 69857c478bd9Sstevel@tonic-gate break; 69867c478bd9Sstevel@tonic-gate case _X_MTIME: 69877c478bd9Sstevel@tonic-gate get_xtime(value, &(Xtarhdr.x_mtime)); 69887c478bd9Sstevel@tonic-gate if (errno) 69897c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 69907c478bd9Sstevel@tonic-gate "tar: Extended header modification time " 69917c478bd9Sstevel@tonic-gate "value error for file # %llu.\n"), 69927c478bd9Sstevel@tonic-gate xhdr_count); 69937c478bd9Sstevel@tonic-gate else 69947c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_MTIME; 69957c478bd9Sstevel@tonic-gate break; 69967c478bd9Sstevel@tonic-gate default: 69977c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 69987c478bd9Sstevel@tonic-gate gettext("tar: unrecognized extended" 69997c478bd9Sstevel@tonic-gate " header keyword '%s'. Ignored.\n"), keyword); 70007c478bd9Sstevel@tonic-gate break; 70017c478bd9Sstevel@tonic-gate } 70027c478bd9Sstevel@tonic-gate } 70037c478bd9Sstevel@tonic-gate 70047c478bd9Sstevel@tonic-gate getdir(); /* get regular header */ 70057c478bd9Sstevel@tonic-gate if (errors && errflag) 70067c478bd9Sstevel@tonic-gate done(1); 70077c478bd9Sstevel@tonic-gate else 70087c478bd9Sstevel@tonic-gate if (errors) 70097c478bd9Sstevel@tonic-gate Errflg = 1; 70107c478bd9Sstevel@tonic-gate return (errors); 70117c478bd9Sstevel@tonic-gate } 70127c478bd9Sstevel@tonic-gate 70137c478bd9Sstevel@tonic-gate /* 7014123523f8Sas158974 * load_info_from_xtarhdr - sets Gen and stbuf variables from 7015123523f8Sas158974 * extended header 7016123523f8Sas158974 * load_info_from_xtarhdr(flag, xhdrp); 7017123523f8Sas158974 * u_longlong_t flag; xhdr_flgs 7018123523f8Sas158974 * struct xtar_hdr *xhdrp; pointer to extended header 7019123523f8Sas158974 * NOTE: called when typeflag is not 'A' and xhdr_flgs 7020123523f8Sas158974 * is set. 7021123523f8Sas158974 */ 7022123523f8Sas158974 static void 7023123523f8Sas158974 load_info_from_xtarhdr(u_longlong_t flag, struct xtar_hdr *xhdrp) 7024123523f8Sas158974 { 7025123523f8Sas158974 if (flag & _X_DEVMAJOR) { 7026123523f8Sas158974 Gen.g_devmajor = xhdrp->x_devmajor; 7027123523f8Sas158974 } 7028123523f8Sas158974 if (flag & _X_DEVMINOR) { 7029123523f8Sas158974 Gen.g_devminor = xhdrp->x_devminor; 7030123523f8Sas158974 } 7031123523f8Sas158974 if (flag & _X_GID) { 7032123523f8Sas158974 Gen.g_gid = xhdrp->x_gid; 7033123523f8Sas158974 stbuf.st_gid = xhdrp->x_gid; 7034123523f8Sas158974 } 7035123523f8Sas158974 if (flag & _X_UID) { 7036123523f8Sas158974 Gen.g_uid = xhdrp->x_uid; 7037123523f8Sas158974 stbuf.st_uid = xhdrp->x_uid; 7038123523f8Sas158974 } 7039123523f8Sas158974 if (flag & _X_SIZE) { 7040123523f8Sas158974 Gen.g_filesz = xhdrp->x_filesz; 7041123523f8Sas158974 stbuf.st_size = xhdrp->x_filesz; 7042123523f8Sas158974 } 7043123523f8Sas158974 if (flag & _X_MTIME) { 7044123523f8Sas158974 Gen.g_mtime = xhdrp->x_mtime.tv_sec; 7045123523f8Sas158974 stbuf.st_mtim.tv_sec = xhdrp->x_mtime.tv_sec; 7046123523f8Sas158974 stbuf.st_mtim.tv_nsec = xhdrp->x_mtime.tv_nsec; 7047123523f8Sas158974 } 7048123523f8Sas158974 } 7049123523f8Sas158974 7050123523f8Sas158974 /* 70517c478bd9Sstevel@tonic-gate * gen_num creates a string from a keyword and an usigned long long in the 70527c478bd9Sstevel@tonic-gate * format: %d %s=%s\n 70537c478bd9Sstevel@tonic-gate * This is part of the extended header data record. 70547c478bd9Sstevel@tonic-gate */ 70557c478bd9Sstevel@tonic-gate 70567c478bd9Sstevel@tonic-gate void 70577c478bd9Sstevel@tonic-gate gen_num(const char *keyword, const u_longlong_t number) 70587c478bd9Sstevel@tonic-gate { 70597c478bd9Sstevel@tonic-gate char save_val[ULONGLONG_MAX_DIGITS + 1]; 70607c478bd9Sstevel@tonic-gate int len; 70617c478bd9Sstevel@tonic-gate char *curr_ptr; 70627c478bd9Sstevel@tonic-gate 70637c478bd9Sstevel@tonic-gate (void) sprintf(save_val, "%llu", number); 70647c478bd9Sstevel@tonic-gate /* 70657c478bd9Sstevel@tonic-gate * len = length of entire line, including itself. len will be 70667c478bd9Sstevel@tonic-gate * two digits. So, add the string lengths plus the length of len, 70677c478bd9Sstevel@tonic-gate * plus a blank, an equal sign, and a newline. 70687c478bd9Sstevel@tonic-gate */ 70697c478bd9Sstevel@tonic-gate len = strlen(save_val) + strlen(keyword) + 5; 70707c478bd9Sstevel@tonic-gate if (xrec_offset + len > xrec_size) { 70717c478bd9Sstevel@tonic-gate if (((curr_ptr = realloc(xrec_ptr, 2 * xrec_size)) == NULL)) 70727c478bd9Sstevel@tonic-gate fatal(gettext( 70737c478bd9Sstevel@tonic-gate "cannot allocate extended header buffer")); 70747c478bd9Sstevel@tonic-gate xrec_ptr = curr_ptr; 70757c478bd9Sstevel@tonic-gate xrec_size *= 2; 70767c478bd9Sstevel@tonic-gate } 70777c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset], 70787c478bd9Sstevel@tonic-gate "%d %s=%s\n", len, keyword, save_val); 70797c478bd9Sstevel@tonic-gate xrec_offset += len; 70807c478bd9Sstevel@tonic-gate } 70817c478bd9Sstevel@tonic-gate 70827c478bd9Sstevel@tonic-gate /* 70837c478bd9Sstevel@tonic-gate * gen_date creates a string from a keyword and a timestruc_t in the 70847c478bd9Sstevel@tonic-gate * format: %d %s=%s\n 70857c478bd9Sstevel@tonic-gate * This is part of the extended header data record. 70867c478bd9Sstevel@tonic-gate * Currently, granularity is only microseconds, so the low-order three digits 70877c478bd9Sstevel@tonic-gate * will be truncated. 70887c478bd9Sstevel@tonic-gate */ 70897c478bd9Sstevel@tonic-gate 70907c478bd9Sstevel@tonic-gate void 70917c478bd9Sstevel@tonic-gate gen_date(const char *keyword, const timestruc_t time_value) 70927c478bd9Sstevel@tonic-gate { 70937c478bd9Sstevel@tonic-gate /* Allow for <seconds>.<nanoseconds>\n */ 70947c478bd9Sstevel@tonic-gate char save_val[TIME_MAX_DIGITS + LONG_MAX_DIGITS + 2]; 70957c478bd9Sstevel@tonic-gate int len; 70967c478bd9Sstevel@tonic-gate char *curr_ptr; 70977c478bd9Sstevel@tonic-gate 70987c478bd9Sstevel@tonic-gate (void) sprintf(save_val, "%ld", time_value.tv_sec); 70997c478bd9Sstevel@tonic-gate len = strlen(save_val); 71007c478bd9Sstevel@tonic-gate save_val[len] = '.'; 71017c478bd9Sstevel@tonic-gate (void) sprintf(&save_val[len + 1], "%9.9ld", time_value.tv_nsec); 71027c478bd9Sstevel@tonic-gate 71037c478bd9Sstevel@tonic-gate /* 71047c478bd9Sstevel@tonic-gate * len = length of entire line, including itself. len will be 71057c478bd9Sstevel@tonic-gate * two digits. So, add the string lengths plus the length of len, 71067c478bd9Sstevel@tonic-gate * plus a blank, an equal sign, and a newline. 71077c478bd9Sstevel@tonic-gate */ 71087c478bd9Sstevel@tonic-gate len = strlen(save_val) + strlen(keyword) + 5; 71097c478bd9Sstevel@tonic-gate if (xrec_offset + len > xrec_size) { 71107c478bd9Sstevel@tonic-gate if (((curr_ptr = realloc(xrec_ptr, 2 * xrec_size)) == NULL)) 71117c478bd9Sstevel@tonic-gate fatal(gettext( 71127c478bd9Sstevel@tonic-gate "cannot allocate extended header buffer")); 71137c478bd9Sstevel@tonic-gate xrec_ptr = curr_ptr; 71147c478bd9Sstevel@tonic-gate xrec_size *= 2; 71157c478bd9Sstevel@tonic-gate } 71167c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset], 71177c478bd9Sstevel@tonic-gate "%d %s=%s\n", len, keyword, save_val); 71187c478bd9Sstevel@tonic-gate xrec_offset += len; 71197c478bd9Sstevel@tonic-gate } 71207c478bd9Sstevel@tonic-gate 71217c478bd9Sstevel@tonic-gate /* 71227c478bd9Sstevel@tonic-gate * gen_string creates a string from a keyword and a char * in the 71237c478bd9Sstevel@tonic-gate * format: %d %s=%s\n 71247c478bd9Sstevel@tonic-gate * This is part of the extended header data record. 71257c478bd9Sstevel@tonic-gate */ 71267c478bd9Sstevel@tonic-gate 71277c478bd9Sstevel@tonic-gate void 71287c478bd9Sstevel@tonic-gate gen_string(const char *keyword, const char *value) 71297c478bd9Sstevel@tonic-gate { 71307c478bd9Sstevel@tonic-gate int len; 71317c478bd9Sstevel@tonic-gate char *curr_ptr; 71327c478bd9Sstevel@tonic-gate 71337c478bd9Sstevel@tonic-gate /* 71347c478bd9Sstevel@tonic-gate * len = length of entire line, including itself. The character length 71357c478bd9Sstevel@tonic-gate * of len must be 1-4 characters, because the maximum size of the path 71367c478bd9Sstevel@tonic-gate * or the name is PATH_MAX, which is 1024. So, assume 1 character 71377c478bd9Sstevel@tonic-gate * for len, one for the space, one for the "=", and one for the newline. 71387c478bd9Sstevel@tonic-gate * Then adjust as needed. 71397c478bd9Sstevel@tonic-gate */ 71407c478bd9Sstevel@tonic-gate /* LINTED constant expression */ 71417c478bd9Sstevel@tonic-gate assert(PATH_MAX <= 9996); 71427c478bd9Sstevel@tonic-gate len = strlen(value) + strlen(keyword) + 4; 71437c478bd9Sstevel@tonic-gate if (len > 997) 71447c478bd9Sstevel@tonic-gate len += 3; 71457c478bd9Sstevel@tonic-gate else if (len > 98) 71467c478bd9Sstevel@tonic-gate len += 2; 71477c478bd9Sstevel@tonic-gate else if (len > 9) 71487c478bd9Sstevel@tonic-gate len += 1; 71497c478bd9Sstevel@tonic-gate if (xrec_offset + len > xrec_size) { 71507c478bd9Sstevel@tonic-gate if (((curr_ptr = realloc(xrec_ptr, 2 * xrec_size)) == NULL)) 71517c478bd9Sstevel@tonic-gate fatal(gettext( 71527c478bd9Sstevel@tonic-gate "cannot allocate extended header buffer")); 71537c478bd9Sstevel@tonic-gate xrec_ptr = curr_ptr; 71547c478bd9Sstevel@tonic-gate xrec_size *= 2; 71557c478bd9Sstevel@tonic-gate } 71567c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG 71577c478bd9Sstevel@tonic-gate if (strcmp(keyword+1, "name") != 0) 71587c478bd9Sstevel@tonic-gate #endif 71597c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset], 71607c478bd9Sstevel@tonic-gate "%d %s=%s\n", len, keyword, value); 71617c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG 71627c478bd9Sstevel@tonic-gate else { 71637c478bd9Sstevel@tonic-gate len += 11; 71647c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset], 71657c478bd9Sstevel@tonic-gate "%d %s=%snametoolong\n", len, keyword, value); 71667c478bd9Sstevel@tonic-gate } 71677c478bd9Sstevel@tonic-gate #endif 71687c478bd9Sstevel@tonic-gate xrec_offset += len; 71697c478bd9Sstevel@tonic-gate } 71707c478bd9Sstevel@tonic-gate 71717c478bd9Sstevel@tonic-gate /* 71727c478bd9Sstevel@tonic-gate * Convert time found in the extended header data to seconds and nanoseconds. 71737c478bd9Sstevel@tonic-gate */ 71747c478bd9Sstevel@tonic-gate 71757c478bd9Sstevel@tonic-gate void 71767c478bd9Sstevel@tonic-gate get_xtime(char *value, timestruc_t *xtime) 71777c478bd9Sstevel@tonic-gate { 71787c478bd9Sstevel@tonic-gate char nanosec[10]; 71797c478bd9Sstevel@tonic-gate char *period; 71807c478bd9Sstevel@tonic-gate int i; 71817c478bd9Sstevel@tonic-gate 71827c478bd9Sstevel@tonic-gate (void) memset(nanosec, '0', 9); 71837c478bd9Sstevel@tonic-gate nanosec[9] = '\0'; 71847c478bd9Sstevel@tonic-gate 71857c478bd9Sstevel@tonic-gate period = strchr(value, '.'); 71867c478bd9Sstevel@tonic-gate if (period != NULL) 71877c478bd9Sstevel@tonic-gate period[0] = '\0'; 71887c478bd9Sstevel@tonic-gate xtime->tv_sec = strtol(value, NULL, 10); 71897c478bd9Sstevel@tonic-gate if (period == NULL) 71907c478bd9Sstevel@tonic-gate xtime->tv_nsec = 0; 71917c478bd9Sstevel@tonic-gate else { 71927c478bd9Sstevel@tonic-gate i = strlen(period +1); 71937c478bd9Sstevel@tonic-gate (void) strncpy(nanosec, period + 1, min(i, 9)); 71947c478bd9Sstevel@tonic-gate xtime->tv_nsec = strtol(nanosec, NULL, 10); 71957c478bd9Sstevel@tonic-gate } 71967c478bd9Sstevel@tonic-gate } 71977c478bd9Sstevel@tonic-gate 71987c478bd9Sstevel@tonic-gate /* 71997c478bd9Sstevel@tonic-gate * Check linkpath for length. 72007c478bd9Sstevel@tonic-gate * Emit an error message and return 1 if too long. 72017c478bd9Sstevel@tonic-gate */ 72027c478bd9Sstevel@tonic-gate 72037c478bd9Sstevel@tonic-gate int 72047c478bd9Sstevel@tonic-gate chk_path_build( 72057c478bd9Sstevel@tonic-gate char *name, 72067c478bd9Sstevel@tonic-gate char *longname, 72077c478bd9Sstevel@tonic-gate char *linkname, 72087c478bd9Sstevel@tonic-gate char *prefix, 72097c478bd9Sstevel@tonic-gate char type, 72107c478bd9Sstevel@tonic-gate int filetype) 72117c478bd9Sstevel@tonic-gate { 72127c478bd9Sstevel@tonic-gate 72137c478bd9Sstevel@tonic-gate if (strlen(linkname) > (size_t)NAMSIZ) { 72147c478bd9Sstevel@tonic-gate if (Eflag > 0) { 72157c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_LINKPATH; 72167c478bd9Sstevel@tonic-gate Xtarhdr.x_linkpath = linkname; 72177c478bd9Sstevel@tonic-gate } else { 72187c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72197c478bd9Sstevel@tonic-gate "tar: %s: linked to %s\n"), longname, linkname); 72207c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72217c478bd9Sstevel@tonic-gate "tar: %s: linked name too long\n"), linkname); 72227c478bd9Sstevel@tonic-gate if (errflag) 72237c478bd9Sstevel@tonic-gate done(1); 72247c478bd9Sstevel@tonic-gate else 72257c478bd9Sstevel@tonic-gate Errflg = 1; 72267c478bd9Sstevel@tonic-gate return (1); 72277c478bd9Sstevel@tonic-gate } 72287c478bd9Sstevel@tonic-gate } 72297c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) 72307c478bd9Sstevel@tonic-gate return (build_dblock(name, tchar, type, 72317c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_dev, 72327c478bd9Sstevel@tonic-gate prefix)); 72337c478bd9Sstevel@tonic-gate else 72347c478bd9Sstevel@tonic-gate return (build_dblock(name, linkname, type, 72357c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_dev, prefix)); 72367c478bd9Sstevel@tonic-gate } 72377c478bd9Sstevel@tonic-gate 72387c478bd9Sstevel@tonic-gate /* 72397c478bd9Sstevel@tonic-gate * Convert from UTF-8 to local character set. 72407c478bd9Sstevel@tonic-gate */ 72417c478bd9Sstevel@tonic-gate 72427c478bd9Sstevel@tonic-gate static int 72437c478bd9Sstevel@tonic-gate utf8_local( 72447c478bd9Sstevel@tonic-gate char *option, 72457c478bd9Sstevel@tonic-gate char **Xhdr_ptrptr, 72467c478bd9Sstevel@tonic-gate char *target, 72477c478bd9Sstevel@tonic-gate const char *source, 72487c478bd9Sstevel@tonic-gate int max_val) 72497c478bd9Sstevel@tonic-gate { 72507c478bd9Sstevel@tonic-gate static iconv_t iconv_cd; 72517c478bd9Sstevel@tonic-gate char *nl_target; 72527c478bd9Sstevel@tonic-gate const char *iconv_src; 72537c478bd9Sstevel@tonic-gate char *iconv_trg; 7254eace40a5Sceastha size_t inlen; 7255eace40a5Sceastha size_t outlen; 72567c478bd9Sstevel@tonic-gate 72577c478bd9Sstevel@tonic-gate if (charset_type == -1) { /* iconv_open failed in earlier try */ 72587c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72597c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion failed.\n"), 72607c478bd9Sstevel@tonic-gate xhdr_count, source); 72617c478bd9Sstevel@tonic-gate return (1); 72627c478bd9Sstevel@tonic-gate } else if (charset_type == 0) { /* iconv_open has not yet been done */ 72637c478bd9Sstevel@tonic-gate nl_target = nl_langinfo(CODESET); 72647c478bd9Sstevel@tonic-gate if (strlen(nl_target) == 0) /* locale using 7-bit codeset */ 72657c478bd9Sstevel@tonic-gate nl_target = "646"; 72667c478bd9Sstevel@tonic-gate if (strcmp(nl_target, "646") == 0) 72677c478bd9Sstevel@tonic-gate charset_type = 1; 72687c478bd9Sstevel@tonic-gate else if (strcmp(nl_target, "UTF-8") == 0) 72697c478bd9Sstevel@tonic-gate charset_type = 3; 72707c478bd9Sstevel@tonic-gate else { 72717c478bd9Sstevel@tonic-gate if (strncmp(nl_target, "ISO", 3) == 0) 72727c478bd9Sstevel@tonic-gate nl_target += 3; 72737c478bd9Sstevel@tonic-gate charset_type = 2; 72747c478bd9Sstevel@tonic-gate errno = 0; 72757c478bd9Sstevel@tonic-gate if ((iconv_cd = iconv_open(nl_target, "UTF-8")) == 72767c478bd9Sstevel@tonic-gate (iconv_t)-1) { 72777c478bd9Sstevel@tonic-gate if (errno == EINVAL) 72787c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72797c478bd9Sstevel@tonic-gate "tar: conversion routines not " 72807c478bd9Sstevel@tonic-gate "available for current locale. ")); 72817c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72827c478bd9Sstevel@tonic-gate "file # %llu: (%s) UTF-8 conversion" 72837c478bd9Sstevel@tonic-gate " failed.\n"), xhdr_count, source); 72847c478bd9Sstevel@tonic-gate charset_type = -1; 72857c478bd9Sstevel@tonic-gate return (1); 72867c478bd9Sstevel@tonic-gate } 72877c478bd9Sstevel@tonic-gate } 72887c478bd9Sstevel@tonic-gate } 72897c478bd9Sstevel@tonic-gate 72907c478bd9Sstevel@tonic-gate /* locale using 7-bit codeset or UTF-8 locale */ 72917c478bd9Sstevel@tonic-gate if (charset_type == 1 || charset_type == 3) { 72927c478bd9Sstevel@tonic-gate if (strlen(source) > max_val) { 72937c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72947c478bd9Sstevel@tonic-gate "tar: file # %llu: Extended header %s too long.\n"), 72957c478bd9Sstevel@tonic-gate xhdr_count, option); 72967c478bd9Sstevel@tonic-gate return (1); 72977c478bd9Sstevel@tonic-gate } 72987c478bd9Sstevel@tonic-gate if (charset_type == 3) 72997c478bd9Sstevel@tonic-gate (void) strcpy(target, source); 73007c478bd9Sstevel@tonic-gate else if (c_utf8(target, source) != 0) { 73017c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 73027c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion" 73037c478bd9Sstevel@tonic-gate " failed.\n"), xhdr_count, source); 73047c478bd9Sstevel@tonic-gate return (1); 73057c478bd9Sstevel@tonic-gate } 73067c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target; 73077c478bd9Sstevel@tonic-gate return (0); 73087c478bd9Sstevel@tonic-gate } 73097c478bd9Sstevel@tonic-gate 73107c478bd9Sstevel@tonic-gate iconv_src = source; 73117c478bd9Sstevel@tonic-gate iconv_trg = target; 73127c478bd9Sstevel@tonic-gate inlen = strlen(source); 73137c478bd9Sstevel@tonic-gate outlen = max_val * UTF_8_FACTOR; 73147c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) == 73157c478bd9Sstevel@tonic-gate (size_t)-1) { /* Error occurred: didn't convert */ 73167c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 73177c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion failed.\n"), 73187c478bd9Sstevel@tonic-gate xhdr_count, source); 73197c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */ 73207c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL; 73217c478bd9Sstevel@tonic-gate inlen = 0; 73227c478bd9Sstevel@tonic-gate (void) iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen); 73237c478bd9Sstevel@tonic-gate return (1); 73247c478bd9Sstevel@tonic-gate } 73257c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */ 73267c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL; 73277c478bd9Sstevel@tonic-gate inlen = 0; 73287c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) == 73297c478bd9Sstevel@tonic-gate (size_t)-1) { /* Error occurred: didn't convert */ 73307c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 73317c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion failed.\n"), 73327c478bd9Sstevel@tonic-gate xhdr_count, source); 73337c478bd9Sstevel@tonic-gate return (1); 73347c478bd9Sstevel@tonic-gate } 73357c478bd9Sstevel@tonic-gate 73367c478bd9Sstevel@tonic-gate *iconv_trg = '\0'; /* Null-terminate iconv output string */ 73377c478bd9Sstevel@tonic-gate if (strlen(target) > max_val) { 73387c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 73397c478bd9Sstevel@tonic-gate "tar: file # %llu: Extended header %s too long.\n"), 73407c478bd9Sstevel@tonic-gate xhdr_count, option); 73417c478bd9Sstevel@tonic-gate return (1); 73427c478bd9Sstevel@tonic-gate } 73437c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target; 73447c478bd9Sstevel@tonic-gate return (0); 73457c478bd9Sstevel@tonic-gate } 73467c478bd9Sstevel@tonic-gate 73477c478bd9Sstevel@tonic-gate /* 73487c478bd9Sstevel@tonic-gate * Check gname, uname, path, and linkpath to see if they need to go in an 73497c478bd9Sstevel@tonic-gate * extended header. If they are already slated to be in an extended header, 73507c478bd9Sstevel@tonic-gate * or if they are not ascii, then they need to be in the extended header. 73517c478bd9Sstevel@tonic-gate * Then, convert all extended names to UTF-8. 73527c478bd9Sstevel@tonic-gate */ 73537c478bd9Sstevel@tonic-gate 73547c478bd9Sstevel@tonic-gate int 73557c478bd9Sstevel@tonic-gate gen_utf8_names(const char *filename) 73567c478bd9Sstevel@tonic-gate { 73577c478bd9Sstevel@tonic-gate static iconv_t iconv_cd; 73587c478bd9Sstevel@tonic-gate char *nl_target; 73597c478bd9Sstevel@tonic-gate char tempbuf[MAXNAM + 1]; 7360eace40a5Sceastha int nbytes; 7361eace40a5Sceastha int errors; 73627c478bd9Sstevel@tonic-gate 73637c478bd9Sstevel@tonic-gate if (charset_type == -1) { /* Previous failure to open. */ 73647c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 73657c478bd9Sstevel@tonic-gate "tar: file # %llu: UTF-8 conversion failed.\n"), 73667c478bd9Sstevel@tonic-gate xhdr_count); 73677c478bd9Sstevel@tonic-gate return (1); 73687c478bd9Sstevel@tonic-gate } 73697c478bd9Sstevel@tonic-gate 73707c478bd9Sstevel@tonic-gate if (charset_type == 0) { /* Need to get conversion descriptor */ 73717c478bd9Sstevel@tonic-gate nl_target = nl_langinfo(CODESET); 73727c478bd9Sstevel@tonic-gate if (strlen(nl_target) == 0) /* locale using 7-bit codeset */ 73737c478bd9Sstevel@tonic-gate nl_target = "646"; 73747c478bd9Sstevel@tonic-gate if (strcmp(nl_target, "646") == 0) 73757c478bd9Sstevel@tonic-gate charset_type = 1; 73767c478bd9Sstevel@tonic-gate else if (strcmp(nl_target, "UTF-8") == 0) 73777c478bd9Sstevel@tonic-gate charset_type = 3; 73787c478bd9Sstevel@tonic-gate else { 73797c478bd9Sstevel@tonic-gate if (strncmp(nl_target, "ISO", 3) == 0) 73807c478bd9Sstevel@tonic-gate nl_target += 3; 73817c478bd9Sstevel@tonic-gate charset_type = 2; 73827c478bd9Sstevel@tonic-gate errno = 0; 73837c478bd9Sstevel@tonic-gate #ifdef ICONV_DEBUG 73847c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 73858e4a71aeSRich Burridge gettext("Opening iconv_cd with target %s\n"), 73867c478bd9Sstevel@tonic-gate nl_target); 73877c478bd9Sstevel@tonic-gate #endif 73887c478bd9Sstevel@tonic-gate if ((iconv_cd = iconv_open("UTF-8", nl_target)) == 73897c478bd9Sstevel@tonic-gate (iconv_t)-1) { 73907c478bd9Sstevel@tonic-gate if (errno == EINVAL) 73917c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 73927c478bd9Sstevel@tonic-gate "tar: conversion routines not " 73937c478bd9Sstevel@tonic-gate "available for current locale. ")); 73947c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 73957c478bd9Sstevel@tonic-gate "file (%s): UTF-8 conversion failed.\n"), 73967c478bd9Sstevel@tonic-gate filename); 73977c478bd9Sstevel@tonic-gate charset_type = -1; 73987c478bd9Sstevel@tonic-gate return (1); 73997c478bd9Sstevel@tonic-gate } 74007c478bd9Sstevel@tonic-gate } 74017c478bd9Sstevel@tonic-gate } 74027c478bd9Sstevel@tonic-gate 74037c478bd9Sstevel@tonic-gate errors = 0; 74047c478bd9Sstevel@tonic-gate 74057c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_gname, local_gname, 74067c478bd9Sstevel@tonic-gate dblock.dbuf.gname, iconv_cd, _X_GNAME, _POSIX_NAME_MAX); 74077c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_uname, local_uname, 74087c478bd9Sstevel@tonic-gate dblock.dbuf.uname, iconv_cd, _X_UNAME, _POSIX_NAME_MAX); 74097c478bd9Sstevel@tonic-gate if ((xhdr_flgs & _X_LINKPATH) == 0) { /* Need null-terminated str. */ 74107c478bd9Sstevel@tonic-gate (void) strncpy(tempbuf, dblock.dbuf.linkname, NAMSIZ); 74117c478bd9Sstevel@tonic-gate tempbuf[NAMSIZ] = '\0'; 74127c478bd9Sstevel@tonic-gate } 74137c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_linkpath, local_linkpath, 74147c478bd9Sstevel@tonic-gate tempbuf, iconv_cd, _X_LINKPATH, PATH_MAX); 74157c478bd9Sstevel@tonic-gate if ((xhdr_flgs & _X_PATH) == 0) { /* Concatenate prefix & name */ 74167c478bd9Sstevel@tonic-gate (void) strncpy(tempbuf, dblock.dbuf.prefix, PRESIZ); 74170578ac30Ssr161167 tempbuf[PRESIZ] = '\0'; 74187c478bd9Sstevel@tonic-gate nbytes = strlen(tempbuf); 74197c478bd9Sstevel@tonic-gate if (nbytes > 0) { 74207c478bd9Sstevel@tonic-gate tempbuf[nbytes++] = '/'; 74217c478bd9Sstevel@tonic-gate tempbuf[nbytes] = '\0'; 74227c478bd9Sstevel@tonic-gate } 74230578ac30Ssr161167 (void) strncat(tempbuf + nbytes, dblock.dbuf.name, 74240578ac30Ssr161167 (MAXNAM - nbytes)); 74250578ac30Ssr161167 tempbuf[MAXNAM] = '\0'; 74267c478bd9Sstevel@tonic-gate } 74277c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_path, local_path, 74287c478bd9Sstevel@tonic-gate tempbuf, iconv_cd, _X_PATH, PATH_MAX); 74297c478bd9Sstevel@tonic-gate 74307c478bd9Sstevel@tonic-gate if (errors > 0) 74317c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 74327c478bd9Sstevel@tonic-gate "tar: file (%s): UTF-8 conversion failed.\n"), filename); 74337c478bd9Sstevel@tonic-gate 74347c478bd9Sstevel@tonic-gate if (errors && errflag) 74357c478bd9Sstevel@tonic-gate done(1); 74367c478bd9Sstevel@tonic-gate else 74377c478bd9Sstevel@tonic-gate if (errors) 74387c478bd9Sstevel@tonic-gate Errflg = 1; 74397c478bd9Sstevel@tonic-gate return (errors); 74407c478bd9Sstevel@tonic-gate } 74417c478bd9Sstevel@tonic-gate 74427c478bd9Sstevel@tonic-gate static int 74437c478bd9Sstevel@tonic-gate local_utf8( 74447c478bd9Sstevel@tonic-gate char **Xhdr_ptrptr, 74457c478bd9Sstevel@tonic-gate char *target, 74467c478bd9Sstevel@tonic-gate const char *source, 74477c478bd9Sstevel@tonic-gate iconv_t iconv_cd, 74487c478bd9Sstevel@tonic-gate int xhdrflg, 74497c478bd9Sstevel@tonic-gate int max_val) 74507c478bd9Sstevel@tonic-gate { 74517c478bd9Sstevel@tonic-gate const char *iconv_src; 74527c478bd9Sstevel@tonic-gate const char *starting_src; 74537c478bd9Sstevel@tonic-gate char *iconv_trg; 7454eace40a5Sceastha size_t inlen; 7455eace40a5Sceastha size_t outlen; 74567c478bd9Sstevel@tonic-gate #ifdef ICONV_DEBUG 74577c478bd9Sstevel@tonic-gate unsigned char c_to_hex; 74587c478bd9Sstevel@tonic-gate #endif 74597c478bd9Sstevel@tonic-gate 74607c478bd9Sstevel@tonic-gate /* 74617c478bd9Sstevel@tonic-gate * If the item is already slated for extended format, get the string 74627c478bd9Sstevel@tonic-gate * to convert from the extended header record. Otherwise, get it from 74637c478bd9Sstevel@tonic-gate * the regular (dblock) area. 74647c478bd9Sstevel@tonic-gate */ 74657c478bd9Sstevel@tonic-gate if (xhdr_flgs & xhdrflg) { 74667c478bd9Sstevel@tonic-gate if (charset_type == 3) { /* Already UTF-8, just copy */ 74677c478bd9Sstevel@tonic-gate (void) strcpy(target, *Xhdr_ptrptr); 74687c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target; 74697c478bd9Sstevel@tonic-gate return (0); 74707c478bd9Sstevel@tonic-gate } else 74717c478bd9Sstevel@tonic-gate iconv_src = (const char *) *Xhdr_ptrptr; 74727c478bd9Sstevel@tonic-gate } else { 74737c478bd9Sstevel@tonic-gate if (charset_type == 3) /* Already in UTF-8 format */ 74747c478bd9Sstevel@tonic-gate return (0); /* Don't create xhdr record */ 74757c478bd9Sstevel@tonic-gate iconv_src = source; 74767c478bd9Sstevel@tonic-gate } 74777c478bd9Sstevel@tonic-gate starting_src = iconv_src; 74787c478bd9Sstevel@tonic-gate iconv_trg = target; 74797c478bd9Sstevel@tonic-gate if ((inlen = strlen(iconv_src)) == 0) 74807c478bd9Sstevel@tonic-gate return (0); 74817c478bd9Sstevel@tonic-gate 74827c478bd9Sstevel@tonic-gate if (charset_type == 1) { /* locale using 7-bit codeset */ 74837c478bd9Sstevel@tonic-gate if (c_utf8(target, starting_src) != 0) { 74847c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 74857c478bd9Sstevel@tonic-gate gettext("tar: invalid character in" 74867c478bd9Sstevel@tonic-gate " UTF-8 conversion of '%s'\n"), starting_src); 74877c478bd9Sstevel@tonic-gate return (1); 74887c478bd9Sstevel@tonic-gate } 74897c478bd9Sstevel@tonic-gate return (0); 74907c478bd9Sstevel@tonic-gate } 74917c478bd9Sstevel@tonic-gate 74927c478bd9Sstevel@tonic-gate outlen = max_val * UTF_8_FACTOR; 74937c478bd9Sstevel@tonic-gate errno = 0; 74947c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) == 74957c478bd9Sstevel@tonic-gate (size_t)-1) { 74967c478bd9Sstevel@tonic-gate /* An error occurred, or not all characters were converted */ 74977c478bd9Sstevel@tonic-gate if (errno == EILSEQ) 74987c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 74997c478bd9Sstevel@tonic-gate gettext("tar: invalid character in" 75007c478bd9Sstevel@tonic-gate " UTF-8 conversion of '%s'\n"), starting_src); 75017c478bd9Sstevel@tonic-gate else 75027c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 75037c478bd9Sstevel@tonic-gate "tar: conversion to UTF-8 aborted for '%s'.\n"), 75047c478bd9Sstevel@tonic-gate starting_src); 75057c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */ 75067c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL; 75077c478bd9Sstevel@tonic-gate inlen = 0; 75087c478bd9Sstevel@tonic-gate (void) iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen); 75097c478bd9Sstevel@tonic-gate return (1); 75107c478bd9Sstevel@tonic-gate } 75117c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */ 75127c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL; 75137c478bd9Sstevel@tonic-gate inlen = 0; 75147c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) == 75157c478bd9Sstevel@tonic-gate (size_t)-1) { /* Error occurred: didn't convert */ 75167c478bd9Sstevel@tonic-gate if (errno == EILSEQ) 75177c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 75187c478bd9Sstevel@tonic-gate gettext("tar: invalid character in" 75197c478bd9Sstevel@tonic-gate " UTF-8 conversion of '%s'\n"), starting_src); 75207c478bd9Sstevel@tonic-gate else 75217c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 75227c478bd9Sstevel@tonic-gate "tar: conversion to UTF-8 aborted for '%s'.\n"), 75237c478bd9Sstevel@tonic-gate starting_src); 75247c478bd9Sstevel@tonic-gate return (1); 75257c478bd9Sstevel@tonic-gate } 75267c478bd9Sstevel@tonic-gate 75277c478bd9Sstevel@tonic-gate *iconv_trg = '\0'; /* Null-terminate iconv output string */ 75287c478bd9Sstevel@tonic-gate if (strcmp(starting_src, target) != 0) { 75297c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target; 75307c478bd9Sstevel@tonic-gate xhdr_flgs |= xhdrflg; 75317c478bd9Sstevel@tonic-gate #ifdef ICONV_DEBUG 75327c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "*** inlen: %d %d; outlen: %d %d\n", 75337c478bd9Sstevel@tonic-gate strlen(starting_src), inlen, max_val, outlen); 75347c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "Input string:\n "); 75357c478bd9Sstevel@tonic-gate for (inlen = 0; inlen < strlen(starting_src); inlen++) { 75367c478bd9Sstevel@tonic-gate c_to_hex = (unsigned char)starting_src[inlen]; 75377c478bd9Sstevel@tonic-gate (void) fprintf(stderr, " %2.2x", c_to_hex); 75387c478bd9Sstevel@tonic-gate if (inlen % 20 == 19) 75397c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n "); 75407c478bd9Sstevel@tonic-gate } 75417c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\nOutput string:\n "); 75427c478bd9Sstevel@tonic-gate for (inlen = 0; inlen < strlen(target); inlen++) { 75437c478bd9Sstevel@tonic-gate c_to_hex = (unsigned char)target[inlen]; 75447c478bd9Sstevel@tonic-gate (void) fprintf(stderr, " %2.2x", c_to_hex); 75457c478bd9Sstevel@tonic-gate if (inlen % 20 == 19) 75467c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n "); 75477c478bd9Sstevel@tonic-gate } 75487c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n"); 75497c478bd9Sstevel@tonic-gate #endif 75507c478bd9Sstevel@tonic-gate } 75517c478bd9Sstevel@tonic-gate 75527c478bd9Sstevel@tonic-gate return (0); 75537c478bd9Sstevel@tonic-gate } 75547c478bd9Sstevel@tonic-gate 75557c478bd9Sstevel@tonic-gate /* 75567c478bd9Sstevel@tonic-gate * Function to test each byte of the source string to make sure it is 75577c478bd9Sstevel@tonic-gate * in within bounds (value between 0 and 127). 75587c478bd9Sstevel@tonic-gate * If valid, copy source to target. 75597c478bd9Sstevel@tonic-gate */ 75607c478bd9Sstevel@tonic-gate 75617c478bd9Sstevel@tonic-gate int 75627c478bd9Sstevel@tonic-gate c_utf8(char *target, const char *source) 75637c478bd9Sstevel@tonic-gate { 75647c478bd9Sstevel@tonic-gate size_t len; 75657c478bd9Sstevel@tonic-gate const char *thischar; 75667c478bd9Sstevel@tonic-gate 75677c478bd9Sstevel@tonic-gate len = strlen(source); 75687c478bd9Sstevel@tonic-gate thischar = source; 75697c478bd9Sstevel@tonic-gate while (len-- > 0) { 75707c478bd9Sstevel@tonic-gate if (!isascii((int)(*thischar++))) 75717c478bd9Sstevel@tonic-gate return (1); 75727c478bd9Sstevel@tonic-gate } 75737c478bd9Sstevel@tonic-gate 75747c478bd9Sstevel@tonic-gate (void) strcpy(target, source); 75757c478bd9Sstevel@tonic-gate return (0); 75767c478bd9Sstevel@tonic-gate } 75777c478bd9Sstevel@tonic-gate 75787c478bd9Sstevel@tonic-gate 75797c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 75807c478bd9Sstevel@tonic-gate #define ROUNDTOTBLOCK(a) ((a + (TBLOCK -1)) & ~(TBLOCK -1)) 75817c478bd9Sstevel@tonic-gate 75827c478bd9Sstevel@tonic-gate static void 75837c478bd9Sstevel@tonic-gate prepare_xattr( 75847c478bd9Sstevel@tonic-gate char **attrbuf, 75857c478bd9Sstevel@tonic-gate char *filename, 7586da6c28aaSamw char *attrpath, 75877c478bd9Sstevel@tonic-gate char typeflag, 75887c478bd9Sstevel@tonic-gate struct linkbuf *linkinfo, 75897c478bd9Sstevel@tonic-gate int *rlen) 75907c478bd9Sstevel@tonic-gate { 75917c478bd9Sstevel@tonic-gate char *bufhead; /* ptr to full buffer */ 7592da6c28aaSamw char *aptr; 75937c478bd9Sstevel@tonic-gate struct xattr_hdr *hptr; /* ptr to header in bufhead */ 75947c478bd9Sstevel@tonic-gate struct xattr_buf *tptr; /* ptr to pathing pieces */ 75957c478bd9Sstevel@tonic-gate int totalen; /* total buffer length */ 75967c478bd9Sstevel@tonic-gate int len; /* length returned to user */ 75977c478bd9Sstevel@tonic-gate int stringlen; /* length of filename + attr */ 75987c478bd9Sstevel@tonic-gate /* 75997c478bd9Sstevel@tonic-gate * length of filename + attr 76007c478bd9Sstevel@tonic-gate * in link section 76017c478bd9Sstevel@tonic-gate */ 76027c478bd9Sstevel@tonic-gate int linkstringlen; 76037c478bd9Sstevel@tonic-gate int complen; /* length of pathing section */ 76047c478bd9Sstevel@tonic-gate int linklen; /* length of link section */ 7605da6c28aaSamw int attrnames_index; /* attrnames starting index */ 76067c478bd9Sstevel@tonic-gate 76077c478bd9Sstevel@tonic-gate /* 76087c478bd9Sstevel@tonic-gate * Release previous buffer 76097c478bd9Sstevel@tonic-gate */ 76107c478bd9Sstevel@tonic-gate 76117c478bd9Sstevel@tonic-gate if (*attrbuf != (char *)NULL) { 76127c478bd9Sstevel@tonic-gate free(*attrbuf); 76137c478bd9Sstevel@tonic-gate *attrbuf = NULL; 76147c478bd9Sstevel@tonic-gate } 76157c478bd9Sstevel@tonic-gate 76167c478bd9Sstevel@tonic-gate /* 76177c478bd9Sstevel@tonic-gate * First add in fixed size stuff 76187c478bd9Sstevel@tonic-gate */ 76197c478bd9Sstevel@tonic-gate len = sizeof (struct xattr_hdr) + sizeof (struct xattr_buf); 76207c478bd9Sstevel@tonic-gate 76217c478bd9Sstevel@tonic-gate /* 76227c478bd9Sstevel@tonic-gate * Add space for two nulls 76237c478bd9Sstevel@tonic-gate */ 7624da6c28aaSamw stringlen = strlen(attrpath) + strlen(filename) + 2; 76257c478bd9Sstevel@tonic-gate complen = stringlen + sizeof (struct xattr_buf); 76267c478bd9Sstevel@tonic-gate 76277c478bd9Sstevel@tonic-gate len += stringlen; 76287c478bd9Sstevel@tonic-gate 76297c478bd9Sstevel@tonic-gate /* 76307c478bd9Sstevel@tonic-gate * Now add on space for link info if any 76317c478bd9Sstevel@tonic-gate */ 76327c478bd9Sstevel@tonic-gate 76337c478bd9Sstevel@tonic-gate if (linkinfo != NULL) { 76347c478bd9Sstevel@tonic-gate /* 76357c478bd9Sstevel@tonic-gate * Again add space for two nulls 76367c478bd9Sstevel@tonic-gate */ 76377c478bd9Sstevel@tonic-gate linkstringlen = strlen(linkinfo->pathname) + 76387c478bd9Sstevel@tonic-gate strlen(linkinfo->attrname) + 2; 7639da6c28aaSamw linklen = linkstringlen + sizeof (struct xattr_buf); 7640da6c28aaSamw len += linklen; 7641da6c28aaSamw } else { 7642da6c28aaSamw linklen = 0; 76437c478bd9Sstevel@tonic-gate } 76447c478bd9Sstevel@tonic-gate 76457c478bd9Sstevel@tonic-gate /* 76467c478bd9Sstevel@tonic-gate * Now add padding to end to fill out TBLOCK 76477c478bd9Sstevel@tonic-gate * 76487c478bd9Sstevel@tonic-gate * Function returns size of real data and not size + padding. 76497c478bd9Sstevel@tonic-gate */ 76507c478bd9Sstevel@tonic-gate 76517c478bd9Sstevel@tonic-gate totalen = ROUNDTOTBLOCK(len); 76527c478bd9Sstevel@tonic-gate 76537c478bd9Sstevel@tonic-gate if ((bufhead = calloc(1, totalen)) == NULL) { 76547c478bd9Sstevel@tonic-gate fatal(gettext("Out of memory.")); 76557c478bd9Sstevel@tonic-gate } 76567c478bd9Sstevel@tonic-gate 76577c478bd9Sstevel@tonic-gate 76587c478bd9Sstevel@tonic-gate /* 76597c478bd9Sstevel@tonic-gate * Now we can fill in the necessary pieces 76607c478bd9Sstevel@tonic-gate */ 76617c478bd9Sstevel@tonic-gate 76627c478bd9Sstevel@tonic-gate /* 76637c478bd9Sstevel@tonic-gate * first fill in the fixed header 76647c478bd9Sstevel@tonic-gate */ 76657c478bd9Sstevel@tonic-gate hptr = (struct xattr_hdr *)bufhead; 76667c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_version, "%s", XATTR_ARCH_VERS); 76677c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_component_len, "%0*d", 76687c478bd9Sstevel@tonic-gate sizeof (hptr->h_component_len) - 1, complen); 76697c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_link_component_len, "%0*d", 76707c478bd9Sstevel@tonic-gate sizeof (hptr->h_link_component_len) - 1, linklen); 76717c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_size, "%0*d", sizeof (hptr->h_size) - 1, len); 76727c478bd9Sstevel@tonic-gate 76737c478bd9Sstevel@tonic-gate /* 76747c478bd9Sstevel@tonic-gate * Now fill in the filename + attrnames section 7675da6c28aaSamw * The filename and attrnames section can be composed of two or more 7676da6c28aaSamw * path segments separated by a null character. The first segment 7677da6c28aaSamw * is the path to the parent file that roots the entire sequence in 7678da6c28aaSamw * the normal name space. The remaining segments describes a path 7679da6c28aaSamw * rooted at the hidden extended attribute directory of the leaf file of 7680da6c28aaSamw * the previous segment, making it possible to name attributes on 7681da6c28aaSamw * attributes. Thus, if we are just archiving an extended attribute, 7682da6c28aaSamw * the second segment will contain the attribute name. If we are 7683da6c28aaSamw * archiving a system attribute of an extended attribute, then the 7684da6c28aaSamw * second segment will contain the attribute name, and a third segment 7685da6c28aaSamw * will contain the system attribute name. The attribute pathing 7686da6c28aaSamw * information is obtained from 'attrpath'. 76877c478bd9Sstevel@tonic-gate */ 76887c478bd9Sstevel@tonic-gate 76897c478bd9Sstevel@tonic-gate tptr = (struct xattr_buf *)(bufhead + sizeof (struct xattr_hdr)); 76907c478bd9Sstevel@tonic-gate (void) sprintf(tptr->h_namesz, "%0*d", sizeof (tptr->h_namesz) - 1, 76917c478bd9Sstevel@tonic-gate stringlen); 76927c478bd9Sstevel@tonic-gate (void) strcpy(tptr->h_names, filename); 7693da6c28aaSamw attrnames_index = strlen(filename) + 1; 7694da6c28aaSamw (void) strcpy(&tptr->h_names[attrnames_index], attrpath); 76957c478bd9Sstevel@tonic-gate tptr->h_typeflag = typeflag; 76967c478bd9Sstevel@tonic-gate 76977c478bd9Sstevel@tonic-gate /* 7698da6c28aaSamw * Split the attrnames section into two segments if 'attrpath' 7699da6c28aaSamw * contains pathing information for a system attribute of an 7700da6c28aaSamw * extended attribute. We split them by replacing the '/' with 7701da6c28aaSamw * a '\0'. 7702da6c28aaSamw */ 7703da6c28aaSamw if ((aptr = strpbrk(&tptr->h_names[attrnames_index], "/")) != NULL) { 7704da6c28aaSamw *aptr = '\0'; 7705da6c28aaSamw } 7706da6c28aaSamw 7707da6c28aaSamw /* 77087c478bd9Sstevel@tonic-gate * Now fill in the optional link section if we have one 77097c478bd9Sstevel@tonic-gate */ 77107c478bd9Sstevel@tonic-gate 77117c478bd9Sstevel@tonic-gate if (linkinfo != (struct linkbuf *)NULL) { 77127c478bd9Sstevel@tonic-gate tptr = (struct xattr_buf *)(bufhead + 77137c478bd9Sstevel@tonic-gate sizeof (struct xattr_hdr) + complen); 77147c478bd9Sstevel@tonic-gate 77157c478bd9Sstevel@tonic-gate (void) sprintf(tptr->h_namesz, "%0*d", 77167c478bd9Sstevel@tonic-gate sizeof (tptr->h_namesz) - 1, linkstringlen); 77177c478bd9Sstevel@tonic-gate (void) strcpy(tptr->h_names, linkinfo->pathname); 77187c478bd9Sstevel@tonic-gate (void) strcpy( 77197c478bd9Sstevel@tonic-gate &tptr->h_names[strlen(linkinfo->pathname) + 1], 77207c478bd9Sstevel@tonic-gate linkinfo->attrname); 77217c478bd9Sstevel@tonic-gate tptr->h_typeflag = typeflag; 77227c478bd9Sstevel@tonic-gate } 77237c478bd9Sstevel@tonic-gate *attrbuf = (char *)bufhead; 77247c478bd9Sstevel@tonic-gate *rlen = len; 77257c478bd9Sstevel@tonic-gate } 77267c478bd9Sstevel@tonic-gate 77277c478bd9Sstevel@tonic-gate #else 77287c478bd9Sstevel@tonic-gate static void 77297c478bd9Sstevel@tonic-gate prepare_xattr( 77307c478bd9Sstevel@tonic-gate char **attrbuf, 77317c478bd9Sstevel@tonic-gate char *filename, 77327c478bd9Sstevel@tonic-gate char *attrname, 77337c478bd9Sstevel@tonic-gate char typeflag, 77347c478bd9Sstevel@tonic-gate struct linkbuf *linkinfo, 77357c478bd9Sstevel@tonic-gate int *rlen) 77367c478bd9Sstevel@tonic-gate { 77377c478bd9Sstevel@tonic-gate *attrbuf = NULL; 77387c478bd9Sstevel@tonic-gate *rlen = 0; 77397c478bd9Sstevel@tonic-gate } 77407c478bd9Sstevel@tonic-gate #endif 77417c478bd9Sstevel@tonic-gate 77427c478bd9Sstevel@tonic-gate int 7743da6c28aaSamw getstat(int dirfd, char *longname, char *shortname, char *attrparent) 77447c478bd9Sstevel@tonic-gate { 77457c478bd9Sstevel@tonic-gate 77467c478bd9Sstevel@tonic-gate int i, j; 77477c478bd9Sstevel@tonic-gate int printerr; 77487c478bd9Sstevel@tonic-gate int slnkerr; 77497c478bd9Sstevel@tonic-gate struct stat symlnbuf; 77507c478bd9Sstevel@tonic-gate 77517c478bd9Sstevel@tonic-gate if (!hflag) 77527c478bd9Sstevel@tonic-gate i = fstatat(dirfd, shortname, &stbuf, AT_SYMLINK_NOFOLLOW); 77537c478bd9Sstevel@tonic-gate else 77547c478bd9Sstevel@tonic-gate i = fstatat(dirfd, shortname, &stbuf, 0); 77557c478bd9Sstevel@tonic-gate 77567c478bd9Sstevel@tonic-gate if (i < 0) { 77577c478bd9Sstevel@tonic-gate /* Initialize flag to print error mesg. */ 77587c478bd9Sstevel@tonic-gate printerr = 1; 77597c478bd9Sstevel@tonic-gate /* 77607c478bd9Sstevel@tonic-gate * If stat is done, then need to do lstat 77617c478bd9Sstevel@tonic-gate * to determine whether it's a sym link 77627c478bd9Sstevel@tonic-gate */ 77637c478bd9Sstevel@tonic-gate if (hflag) { 77647c478bd9Sstevel@tonic-gate /* Save returned error */ 77657c478bd9Sstevel@tonic-gate slnkerr = errno; 77667c478bd9Sstevel@tonic-gate 77677c478bd9Sstevel@tonic-gate j = fstatat(dirfd, shortname, 77687c478bd9Sstevel@tonic-gate &symlnbuf, AT_SYMLINK_NOFOLLOW); 77697c478bd9Sstevel@tonic-gate /* 77707c478bd9Sstevel@tonic-gate * Suppress error message when file is a symbolic link 77717c478bd9Sstevel@tonic-gate * and function modifier 'l' is off. Exception: when 77727c478bd9Sstevel@tonic-gate * a symlink points to a symlink points to a 77737c478bd9Sstevel@tonic-gate * symlink ... and we get past MAXSYMLINKS. That 77747c478bd9Sstevel@tonic-gate * error will cause a file not to be archived, and 77757c478bd9Sstevel@tonic-gate * needs to be printed. 77767c478bd9Sstevel@tonic-gate */ 77777c478bd9Sstevel@tonic-gate if ((j == 0) && (!linkerrok) && (slnkerr != ELOOP) && 77787c478bd9Sstevel@tonic-gate (S_ISLNK(symlnbuf.st_mode))) 77797c478bd9Sstevel@tonic-gate printerr = 0; 77807c478bd9Sstevel@tonic-gate 77817c478bd9Sstevel@tonic-gate /* 77827c478bd9Sstevel@tonic-gate * Restore errno in case the lstat 77837c478bd9Sstevel@tonic-gate * on symbolic link change 77847c478bd9Sstevel@tonic-gate */ 77857c478bd9Sstevel@tonic-gate errno = slnkerr; 77867c478bd9Sstevel@tonic-gate } 77877c478bd9Sstevel@tonic-gate 77887c478bd9Sstevel@tonic-gate if (printerr) { 77897c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 7790da6c28aaSamw "tar: %s%s%s%s: %s\n"), 7791da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "), 7792da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 7793da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 7794da6c28aaSamw longname, strerror(errno)); 77957c478bd9Sstevel@tonic-gate Errflg = 1; 77967c478bd9Sstevel@tonic-gate } 77977c478bd9Sstevel@tonic-gate return (1); 77987c478bd9Sstevel@tonic-gate } 77997c478bd9Sstevel@tonic-gate return (0); 78007c478bd9Sstevel@tonic-gate } 78017c478bd9Sstevel@tonic-gate 7802da6c28aaSamw /* 7803da6c28aaSamw * Recursively archive the extended attributes and/or extended system attributes 7804da6c28aaSamw * of the base file, longname. Note: extended system attribute files will be 7805da6c28aaSamw * archived only if the extended system attributes are not transient (i.e. the 7806da6c28aaSamw * extended system attributes are other than the default values). 7807da6c28aaSamw * 7808da6c28aaSamw * If -@ was specified and the underlying file system supports it, archive the 7809da6c28aaSamw * extended attributes, and if there is a system attribute associated with the 7810da6c28aaSamw * extended attribute, then recursively call xattrs_put() to archive the 7811da6c28aaSamw * hidden attribute directory and the extended system attribute. If -/ was 7812da6c28aaSamw * specified and the underlying file system supports it, archive the extended 7813da6c28aaSamw * system attributes. Read-only extended system attributes are never archived. 7814da6c28aaSamw * 7815da6c28aaSamw * Currently, there cannot be attributes on attributes; only system 7816da6c28aaSamw * attributes on attributes. In addition, there cannot be attributes on 7817da6c28aaSamw * system attributes. A file and it's attribute directory hierarchy looks as 7818da6c28aaSamw * follows: 7819da6c28aaSamw * longname ----> . ("." is the hidden attribute directory) 7820da6c28aaSamw * | 7821da6c28aaSamw * ---------------------------- 7822da6c28aaSamw * | | 7823da6c28aaSamw * <sys_attr_name> <attr_name> ----> . 7824da6c28aaSamw * | 7825da6c28aaSamw * <sys_attr_name> 7826da6c28aaSamw * 7827da6c28aaSamw */ 78287c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 78297c478bd9Sstevel@tonic-gate static void 7830da6c28aaSamw xattrs_put(char *longname, char *shortname, char *parent, char *attrparent) 78317c478bd9Sstevel@tonic-gate { 7832da6c28aaSamw char *filename = (attrparent == NULL) ? shortname : attrparent; 7833da6c28aaSamw int arc_rwsysattr = 0; 78347c478bd9Sstevel@tonic-gate int dirfd; 7835da6c28aaSamw int fd = -1; 7836da6c28aaSamw int rw_sysattr = 0; 7837ced83f9bSceastha int ext_attr = 0; 7838da6c28aaSamw int rc; 78397c478bd9Sstevel@tonic-gate DIR *dirp; 78407c478bd9Sstevel@tonic-gate struct dirent *dp; 7841da6c28aaSamw attr_data_t *attrinfo = NULL; 78427c478bd9Sstevel@tonic-gate 7843da6c28aaSamw /* 7844da6c28aaSamw * If the underlying file system supports it, then archive the extended 7845da6c28aaSamw * attributes if -@ was specified, and the extended system attributes 7846da6c28aaSamw * if -/ was specified. 7847da6c28aaSamw */ 7848ced83f9bSceastha if (verify_attr_support(filename, (attrparent == NULL), ARC_CREATE, 7849ced83f9bSceastha &ext_attr) != ATTR_OK) { 78507c478bd9Sstevel@tonic-gate return; 78517c478bd9Sstevel@tonic-gate } 78527c478bd9Sstevel@tonic-gate 7853da6c28aaSamw /* 7854da6c28aaSamw * Only want to archive a read-write extended system attribute file 7855da6c28aaSamw * if it contains extended system attribute settings that are not the 7856da6c28aaSamw * default values. 7857da6c28aaSamw */ 7858da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 7859da6c28aaSamw if (saflag) { 7860da6c28aaSamw int filefd; 7861da6c28aaSamw nvlist_t *slist = NULL; 7862da6c28aaSamw 7863da6c28aaSamw /* Determine if there are non-transient system attributes */ 7864da6c28aaSamw errno = 0; 7865da6c28aaSamw if ((filefd = open(filename, O_RDONLY)) == -1) { 7866da6c28aaSamw if (attrparent == NULL) { 7867da6c28aaSamw vperror(0, gettext( 7868da6c28aaSamw "unable to open file %s"), longname); 7869da6c28aaSamw } 7870da6c28aaSamw return; 7871da6c28aaSamw } 7872da6c28aaSamw if (((slist = sysattr_list(basename(myname), filefd, 7873da6c28aaSamw filename)) != NULL) || (errno != 0)) { 7874da6c28aaSamw arc_rwsysattr = 1; 7875da6c28aaSamw } 7876da6c28aaSamw if (slist != NULL) { 7877da6c28aaSamw (void) nvlist_free(slist); 7878da6c28aaSamw slist = NULL; 7879da6c28aaSamw } 7880da6c28aaSamw (void) close(filefd); 7881da6c28aaSamw } 7882ced83f9bSceastha 7883ced83f9bSceastha /* 7884ced83f9bSceastha * If we aren't archiving extended system attributes, and we are 7885ced83f9bSceastha * processing an attribute, or if we are archiving extended system 7886ced83f9bSceastha * attributes, and there are are no extended attributes, then there's 7887ced83f9bSceastha * no need to open up the attribute directory of the file unless the 7888ced83f9bSceastha * extended system attributes are not transient (i.e, the system 7889ced83f9bSceastha * attributes are not the default values). 7890ced83f9bSceastha */ 7891ced83f9bSceastha if ((arc_rwsysattr == 0) && ((attrparent != NULL) || 7892ced83f9bSceastha (saflag && !ext_attr))) { 7893ced83f9bSceastha return; 7894ced83f9bSceastha } 7895da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 7896da6c28aaSamw 7897da6c28aaSamw /* open the parent attribute directory */ 7898da6c28aaSamw fd = attropen(filename, ".", O_RDONLY); 7899da6c28aaSamw if (fd < 0) { 7900da6c28aaSamw vperror(0, gettext( 7901da6c28aaSamw "unable to open attribute directory for %s%s%sfile %s"), 7902da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "), 7903da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 7904da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 79057c478bd9Sstevel@tonic-gate longname); 79067c478bd9Sstevel@tonic-gate return; 79077c478bd9Sstevel@tonic-gate } 79087c478bd9Sstevel@tonic-gate 7909da6c28aaSamw /* 7910da6c28aaSamw * We need to change into the parent's attribute directory to determine 7911da6c28aaSamw * if each of the attributes should be archived. 7912da6c28aaSamw */ 7913da6c28aaSamw if (fchdir(fd) < 0) { 7914da6c28aaSamw vperror(0, gettext( 7915da6c28aaSamw "cannot change to attribute directory of %s%s%sfile %s"), 7916da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "), 7917da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 7918da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 7919da6c28aaSamw longname); 7920da6c28aaSamw (void) close(fd); 7921da6c28aaSamw return; 7922da6c28aaSamw } 7923da6c28aaSamw 7924da6c28aaSamw if (((dirfd = dup(fd)) == -1) || 7925da6c28aaSamw ((dirp = fdopendir(dirfd)) == NULL)) { 79267c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 7927da6c28aaSamw "tar: unable to open dir pointer for %s%s%sfile %s\n"), 7928da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "), 7929da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 7930da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 7931da6c28aaSamw longname); 7932da6c28aaSamw if (fd > 0) { 7933da6c28aaSamw (void) close(fd); 7934da6c28aaSamw } 79357c478bd9Sstevel@tonic-gate return; 79367c478bd9Sstevel@tonic-gate } 79377c478bd9Sstevel@tonic-gate 7938c536b1f9SRobert Mustacchi while ((dp = readdir(dirp)) != NULL) { 7939da6c28aaSamw if (strcmp(dp->d_name, "..") == 0) { 79407c478bd9Sstevel@tonic-gate continue; 7941da6c28aaSamw } else if (strcmp(dp->d_name, ".") == 0) { 79427c478bd9Sstevel@tonic-gate Hiddendir = 1; 7943da6c28aaSamw } else { 79447c478bd9Sstevel@tonic-gate Hiddendir = 0; 7945da6c28aaSamw } 79467c478bd9Sstevel@tonic-gate 7947da6c28aaSamw /* Determine if this attribute should be archived */ 7948da6c28aaSamw if (verify_attr(dp->d_name, attrparent, arc_rwsysattr, 7949da6c28aaSamw &rw_sysattr) != ATTR_OK) { 7950da6c28aaSamw continue; 7951da6c28aaSamw } 7952da6c28aaSamw 7953da6c28aaSamw /* gather the attribute's information to pass to putfile() */ 7954da6c28aaSamw if ((fill_in_attr_info(dp->d_name, longname, attrparent, 7955da6c28aaSamw fd, rw_sysattr, &attrinfo)) == 1) { 7956da6c28aaSamw continue; 7957da6c28aaSamw } 7958da6c28aaSamw 7959da6c28aaSamw /* add the attribute to the archive */ 7960da6c28aaSamw rc = putfile(longname, dp->d_name, parent, attrinfo, 79617c478bd9Sstevel@tonic-gate XATTR_FILE, LEV0, SYMLINK_LEV0); 79627c478bd9Sstevel@tonic-gate 7963da6c28aaSamw if (exitflag) { 79647c478bd9Sstevel@tonic-gate break; 79657c478bd9Sstevel@tonic-gate } 79667c478bd9Sstevel@tonic-gate 7967da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 7968da6c28aaSamw /* 7969da6c28aaSamw * If both -/ and -@ were specified, then archive the 7970da6c28aaSamw * attribute's extended system attributes and hidden directory 7971da6c28aaSamw * by making a recursive call to xattrs_put(). 7972da6c28aaSamw */ 7973da6c28aaSamw if (!rw_sysattr && saflag && atflag && (rc != PUT_AS_LINK) && 7974da6c28aaSamw (Hiddendir == 0)) { 7975da6c28aaSamw 7976da6c28aaSamw xattrs_put(longname, shortname, parent, dp->d_name); 7977da6c28aaSamw 7978da6c28aaSamw /* 7979da6c28aaSamw * Change back to the parent's attribute directory 7980da6c28aaSamw * to process any further attributes. 7981da6c28aaSamw */ 7982da6c28aaSamw if (fchdir(fd) < 0) { 7983da6c28aaSamw vperror(0, gettext( 7984da6c28aaSamw "cannot change back to attribute directory " 7985da6c28aaSamw "of file %s"), longname); 7986da6c28aaSamw break; 7987da6c28aaSamw } 7988da6c28aaSamw } 7989da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 7990da6c28aaSamw } 7991da6c28aaSamw 7992da6c28aaSamw if (attrinfo != NULL) { 7993da6c28aaSamw if (attrinfo->attr_parent != NULL) { 7994da6c28aaSamw free(attrinfo->attr_parent); 7995da6c28aaSamw } 7996da6c28aaSamw free(attrinfo->attr_path); 7997da6c28aaSamw free(attrinfo); 7998da6c28aaSamw } 79997c478bd9Sstevel@tonic-gate (void) closedir(dirp); 8000da6c28aaSamw if (fd != -1) { 8001da6c28aaSamw (void) close(fd); 8002da6c28aaSamw } 8003da6c28aaSamw 8004da6c28aaSamw /* Change back to the parent directory of the base file */ 8005da6c28aaSamw if (attrparent == NULL) { 8006b25dbf38SRich Burridge (void) tar_chdir(parent); 8007da6c28aaSamw } 8008ced83f9bSceastha Hiddendir = 0; 80097c478bd9Sstevel@tonic-gate } 80107c478bd9Sstevel@tonic-gate #else 80117c478bd9Sstevel@tonic-gate static void 8012da6c28aaSamw xattrs_put(char *longname, char *shortname, char *parent, char *attrppath) 80137c478bd9Sstevel@tonic-gate { 80147c478bd9Sstevel@tonic-gate } 80157c478bd9Sstevel@tonic-gate #endif /* O_XATTR */ 80167c478bd9Sstevel@tonic-gate 80177c478bd9Sstevel@tonic-gate static int 8018da6c28aaSamw put_link(char *name, char *longname, char *component, char *longattrname, 80197c478bd9Sstevel@tonic-gate char *prefix, int filetype, char type) 80207c478bd9Sstevel@tonic-gate { 80217c478bd9Sstevel@tonic-gate 80227c478bd9Sstevel@tonic-gate if (stbuf.st_nlink > 1) { 80237c478bd9Sstevel@tonic-gate struct linkbuf *lp; 80247c478bd9Sstevel@tonic-gate int found = 0; 80257c478bd9Sstevel@tonic-gate 80267c478bd9Sstevel@tonic-gate for (lp = ihead; lp != NULL; lp = lp->nextp) 80277c478bd9Sstevel@tonic-gate if (lp->inum == stbuf.st_ino && 80287c478bd9Sstevel@tonic-gate lp->devnum == stbuf.st_dev) { 80297c478bd9Sstevel@tonic-gate found++; 80307c478bd9Sstevel@tonic-gate break; 80317c478bd9Sstevel@tonic-gate } 80327c478bd9Sstevel@tonic-gate if (found) { 80337c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 80347c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) 8035da6c28aaSamw if (put_xattr_hdr(longname, component, 8036da6c28aaSamw longattrname, prefix, type, filetype, lp)) { 80377c478bd9Sstevel@tonic-gate goto out; 80387c478bd9Sstevel@tonic-gate } 80397c478bd9Sstevel@tonic-gate #endif 80407c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 80417c478bd9Sstevel@tonic-gate if (filetype != XATTR_FILE) { 80427c478bd9Sstevel@tonic-gate tomodes(&stbuf); 80437c478bd9Sstevel@tonic-gate if (chk_path_build(name, longname, lp->pathname, 80447c478bd9Sstevel@tonic-gate prefix, type, filetype) > 0) { 80457c478bd9Sstevel@tonic-gate goto out; 80467c478bd9Sstevel@tonic-gate } 80477c478bd9Sstevel@tonic-gate } 80487c478bd9Sstevel@tonic-gate 80497c478bd9Sstevel@tonic-gate if (mulvol && tapepos + 1 >= blocklim) 80507c478bd9Sstevel@tonic-gate newvol(); 80517c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 80527c478bd9Sstevel@tonic-gate /* 80537c478bd9Sstevel@tonic-gate * write_ancillary() is not needed here. 80547c478bd9Sstevel@tonic-gate * The first link is handled in the following 80557c478bd9Sstevel@tonic-gate * else statement. No need to process ACLs 80567c478bd9Sstevel@tonic-gate * for other hard links since they are the 80577c478bd9Sstevel@tonic-gate * same file. 80587c478bd9Sstevel@tonic-gate */ 80597c478bd9Sstevel@tonic-gate 80607c478bd9Sstevel@tonic-gate if (vflag) { 80617c478bd9Sstevel@tonic-gate if (NotTape) 8062*28c4d110SJoshua M. Clulow dlog("seek = %" FMT_blkcnt_t 8063*28c4d110SJoshua M. Clulow "K\n", K(tapepos)); 80647c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) { 80657c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 80667c478bd9Sstevel@tonic-gate "a %s attribute %s link to " 8067da6c28aaSamw "%s attribute %s\n"), 8068da6c28aaSamw name, component, name, 8069da6c28aaSamw lp->attrname); 80707c478bd9Sstevel@tonic-gate } else { 80717c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 80727c478bd9Sstevel@tonic-gate "a %s link to %s\n"), 80737c478bd9Sstevel@tonic-gate longname, lp->pathname); 80747c478bd9Sstevel@tonic-gate } 80757c478bd9Sstevel@tonic-gate } 80767c478bd9Sstevel@tonic-gate lp->count--; 80777c478bd9Sstevel@tonic-gate return (0); 80787c478bd9Sstevel@tonic-gate } else { 80797c478bd9Sstevel@tonic-gate lp = (struct linkbuf *)getmem(sizeof (*lp)); 80807c478bd9Sstevel@tonic-gate if (lp != (struct linkbuf *)NULL) { 80817c478bd9Sstevel@tonic-gate lp->nextp = ihead; 80827c478bd9Sstevel@tonic-gate ihead = lp; 80837c478bd9Sstevel@tonic-gate lp->inum = stbuf.st_ino; 80847c478bd9Sstevel@tonic-gate lp->devnum = stbuf.st_dev; 80857c478bd9Sstevel@tonic-gate lp->count = stbuf.st_nlink - 1; 80867c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) { 80877c478bd9Sstevel@tonic-gate (void) strcpy(lp->pathname, longname); 8088da6c28aaSamw (void) strcpy(lp->attrname, 8089da6c28aaSamw component); 80907c478bd9Sstevel@tonic-gate } else { 80917c478bd9Sstevel@tonic-gate (void) strcpy(lp->pathname, longname); 80927c478bd9Sstevel@tonic-gate (void) strcpy(lp->attrname, ""); 80937c478bd9Sstevel@tonic-gate } 80947c478bd9Sstevel@tonic-gate } 80957c478bd9Sstevel@tonic-gate } 80967c478bd9Sstevel@tonic-gate } 80977c478bd9Sstevel@tonic-gate 80987c478bd9Sstevel@tonic-gate out: 80997c478bd9Sstevel@tonic-gate return (1); 81007c478bd9Sstevel@tonic-gate } 81017c478bd9Sstevel@tonic-gate 81027c478bd9Sstevel@tonic-gate static int 8103da6c28aaSamw put_extra_attributes(char *longname, char *shortname, char *longattrname, 8104da6c28aaSamw char *prefix, int filetype, char typeflag) 81057c478bd9Sstevel@tonic-gate { 8106fa9e4066Sahrens static acl_t *aclp = NULL; 8107fa9e4066Sahrens int error; 81087c478bd9Sstevel@tonic-gate 8109fa9e4066Sahrens if (aclp != NULL) { 8110fa9e4066Sahrens acl_free(aclp); 81117c478bd9Sstevel@tonic-gate aclp = NULL; 81127c478bd9Sstevel@tonic-gate } 81137c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 8114da6c28aaSamw if ((atflag || saflag) && (filetype == XATTR_FILE)) { 8115da6c28aaSamw if (put_xattr_hdr(longname, shortname, longattrname, prefix, 81167c478bd9Sstevel@tonic-gate typeflag, filetype, NULL)) { 81177c478bd9Sstevel@tonic-gate return (1); 81187c478bd9Sstevel@tonic-gate } 81197c478bd9Sstevel@tonic-gate } 81207c478bd9Sstevel@tonic-gate #endif 81217c478bd9Sstevel@tonic-gate 81227c478bd9Sstevel@tonic-gate /* ACL support */ 81237c478bd9Sstevel@tonic-gate if (pflag) { 81247c478bd9Sstevel@tonic-gate char *secinfo = NULL; 81257c478bd9Sstevel@tonic-gate int len = 0; 81267c478bd9Sstevel@tonic-gate 81277c478bd9Sstevel@tonic-gate /* ACL support */ 81287c478bd9Sstevel@tonic-gate if (((stbuf.st_mode & S_IFMT) != S_IFLNK)) { 81297c478bd9Sstevel@tonic-gate /* 81307c478bd9Sstevel@tonic-gate * Get ACL info: dont bother allocating space if 8131fa9e4066Sahrens * there is only a trivial ACL. 81327c478bd9Sstevel@tonic-gate */ 8133fa9e4066Sahrens if ((error = acl_get(shortname, ACL_NO_TRIVIAL, 8134fa9e4066Sahrens &aclp)) != 0) { 81357c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 8136fa9e4066Sahrens "%s: failed to retrieve acl : %s\n"), 8137fa9e4066Sahrens longname, acl_strerror(error)); 81387c478bd9Sstevel@tonic-gate return (1); 81397c478bd9Sstevel@tonic-gate } 81407c478bd9Sstevel@tonic-gate } 81417c478bd9Sstevel@tonic-gate 81427c478bd9Sstevel@tonic-gate /* append security attributes if any */ 8143fa9e4066Sahrens if (aclp != NULL) { 814445916cd2Sjpk (void) append_secattr(&secinfo, &len, acl_cnt(aclp), 8145b249c65cSmarks acl_totext(aclp, ACL_APPEND_ID | ACL_COMPACT_FMT | 8146b249c65cSmarks ACL_SID_FMT), (acl_type(aclp) == ACLENT_T) ? 8147b249c65cSmarks UFSD_ACL : ACE_ACL); 814845916cd2Sjpk } 814945916cd2Sjpk 815045916cd2Sjpk if (Tflag) { 815145916cd2Sjpk /* append Trusted Extensions extended attributes */ 815245916cd2Sjpk append_ext_attr(shortname, &secinfo, &len); 815345916cd2Sjpk (void) write_ancillary(&dblock, secinfo, len, ACL_HDR); 815445916cd2Sjpk 815545916cd2Sjpk } else if (aclp != NULL) { 81567c478bd9Sstevel@tonic-gate (void) write_ancillary(&dblock, secinfo, len, ACL_HDR); 81577c478bd9Sstevel@tonic-gate } 81587c478bd9Sstevel@tonic-gate } 81597c478bd9Sstevel@tonic-gate return (0); 81607c478bd9Sstevel@tonic-gate } 81617c478bd9Sstevel@tonic-gate 81627c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 81637c478bd9Sstevel@tonic-gate static int 8164da6c28aaSamw put_xattr_hdr(char *longname, char *shortname, char *longattrname, char *prefix, 81657c478bd9Sstevel@tonic-gate int typeflag, int filetype, struct linkbuf *lp) 81667c478bd9Sstevel@tonic-gate { 81677c478bd9Sstevel@tonic-gate char *lname = NULL; 81687c478bd9Sstevel@tonic-gate char *sname = NULL; 81697c478bd9Sstevel@tonic-gate int error = 0; 81707c478bd9Sstevel@tonic-gate static char *attrbuf = NULL; 81717c478bd9Sstevel@tonic-gate int attrlen; 81727c478bd9Sstevel@tonic-gate 81737c478bd9Sstevel@tonic-gate lname = malloc(sizeof (char) * strlen("/dev/null") + 1 + 81747c478bd9Sstevel@tonic-gate strlen(shortname) + strlen(".hdr") + 1); 81757c478bd9Sstevel@tonic-gate 81767c478bd9Sstevel@tonic-gate if (lname == NULL) { 81777c478bd9Sstevel@tonic-gate fatal(gettext("Out of Memory.")); 81787c478bd9Sstevel@tonic-gate } 81797c478bd9Sstevel@tonic-gate sname = malloc(sizeof (char) * strlen(shortname) + 8180da6c28aaSamw strlen(".hdr") + 1); 81817c478bd9Sstevel@tonic-gate if (sname == NULL) { 81827c478bd9Sstevel@tonic-gate fatal(gettext("Out of Memory.")); 81837c478bd9Sstevel@tonic-gate } 81847c478bd9Sstevel@tonic-gate 81857c478bd9Sstevel@tonic-gate (void) sprintf(sname, "%s.hdr", shortname); 81867c478bd9Sstevel@tonic-gate (void) sprintf(lname, "/dev/null/%s", sname); 81877c478bd9Sstevel@tonic-gate 81887c478bd9Sstevel@tonic-gate if (strlcpy(dblock.dbuf.name, lname, sizeof (dblock.dbuf.name)) >= 81897c478bd9Sstevel@tonic-gate sizeof (dblock.dbuf.name)) { 81907c478bd9Sstevel@tonic-gate fatal(gettext( 81917c478bd9Sstevel@tonic-gate "Buffer overflow writing extended attribute file name")); 81927c478bd9Sstevel@tonic-gate } 81937c478bd9Sstevel@tonic-gate 81947c478bd9Sstevel@tonic-gate /* 81957c478bd9Sstevel@tonic-gate * dump extended attr lookup info 81967c478bd9Sstevel@tonic-gate */ 8197da6c28aaSamw prepare_xattr(&attrbuf, longname, longattrname, typeflag, lp, &attrlen); 81987c478bd9Sstevel@tonic-gate write_ancillary(&dblock, attrbuf, attrlen, _XATTR_HDRTYPE); 81997c478bd9Sstevel@tonic-gate 82007c478bd9Sstevel@tonic-gate (void) sprintf(lname, "/dev/null/%s", shortname); 82017c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.name, sname, NAMSIZ); 82027c478bd9Sstevel@tonic-gate 82037c478bd9Sstevel@tonic-gate /* 82047c478bd9Sstevel@tonic-gate * Set up filename for attribute 82057c478bd9Sstevel@tonic-gate */ 82067c478bd9Sstevel@tonic-gate 82077c478bd9Sstevel@tonic-gate error = build_dblock(lname, tchar, '0', filetype, 82087c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix); 82097c478bd9Sstevel@tonic-gate free(lname); 82107c478bd9Sstevel@tonic-gate free(sname); 82117c478bd9Sstevel@tonic-gate 82127c478bd9Sstevel@tonic-gate return (error); 82137c478bd9Sstevel@tonic-gate } 82147c478bd9Sstevel@tonic-gate #endif 82157c478bd9Sstevel@tonic-gate 82167c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 82177c478bd9Sstevel@tonic-gate static int 8218da6c28aaSamw read_xattr_hdr(attr_data_t **attrinfo) 82197c478bd9Sstevel@tonic-gate { 82207c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 8221da6c28aaSamw char *attrparent = NULL; 82227c478bd9Sstevel@tonic-gate blkcnt_t blocks; 82237c478bd9Sstevel@tonic-gate char *tp; 82247c478bd9Sstevel@tonic-gate off_t bytes; 82257c478bd9Sstevel@tonic-gate int comp_len, link_len; 82267c478bd9Sstevel@tonic-gate int namelen; 8227da6c28aaSamw int attrparentlen; 8228da6c28aaSamw int parentfilelen; 82297c478bd9Sstevel@tonic-gate 82307c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag != _XATTR_HDRTYPE) 82317c478bd9Sstevel@tonic-gate return (1); 82327c478bd9Sstevel@tonic-gate 82337c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 82347c478bd9Sstevel@tonic-gate if ((xattrhead = calloc(1, (int)bytes)) == NULL) { 82357c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 82367c478bd9Sstevel@tonic-gate "Insufficient memory for extended attribute\n")); 82377c478bd9Sstevel@tonic-gate return (1); 82387c478bd9Sstevel@tonic-gate } 82397c478bd9Sstevel@tonic-gate 82407c478bd9Sstevel@tonic-gate tp = (char *)xattrhead; 82417c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 82427c478bd9Sstevel@tonic-gate while (blocks-- > 0) { 82437c478bd9Sstevel@tonic-gate readtape(buf); 82447c478bd9Sstevel@tonic-gate if (bytes <= TBLOCK) { 82457c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, (size_t)bytes); 82467c478bd9Sstevel@tonic-gate break; 82477c478bd9Sstevel@tonic-gate } else { 82487c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, TBLOCK); 82497c478bd9Sstevel@tonic-gate tp += TBLOCK; 82507c478bd9Sstevel@tonic-gate } 82517c478bd9Sstevel@tonic-gate bytes -= TBLOCK; 82527c478bd9Sstevel@tonic-gate } 82537c478bd9Sstevel@tonic-gate 82547c478bd9Sstevel@tonic-gate /* 82557c478bd9Sstevel@tonic-gate * Validate that we can handle header format 82567c478bd9Sstevel@tonic-gate */ 82577c478bd9Sstevel@tonic-gate if (strcmp(xattrhead->h_version, XATTR_ARCH_VERS) != 0) { 82587c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 82597c478bd9Sstevel@tonic-gate gettext("Unknown extended attribute format encountered\n")); 82607c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 82617c478bd9Sstevel@tonic-gate gettext("Disabling extended attribute parsing\n")); 82627c478bd9Sstevel@tonic-gate xattrbadhead = 1; 82637c478bd9Sstevel@tonic-gate return (0); 82647c478bd9Sstevel@tonic-gate } 82657c478bd9Sstevel@tonic-gate (void) sscanf(xattrhead->h_component_len, "%10d", &comp_len); 82667c478bd9Sstevel@tonic-gate (void) sscanf(xattrhead->h_link_component_len, "%10d", &link_len); 82677c478bd9Sstevel@tonic-gate xattrp = (struct xattr_buf *)(((char *)xattrhead) + 82687c478bd9Sstevel@tonic-gate sizeof (struct xattr_hdr)); 82697c478bd9Sstevel@tonic-gate (void) sscanf(xattrp->h_namesz, "%7d", &namelen); 82707c478bd9Sstevel@tonic-gate if (link_len > 0) 82717c478bd9Sstevel@tonic-gate xattr_linkp = (struct xattr_buf *) 82727c478bd9Sstevel@tonic-gate ((int)xattrp + (int)comp_len); 82737c478bd9Sstevel@tonic-gate else 82747c478bd9Sstevel@tonic-gate xattr_linkp = NULL; 82757c478bd9Sstevel@tonic-gate 8276da6c28aaSamw /* 8277da6c28aaSamw * Gather the attribute path from the filename and attrnames section. 8278da6c28aaSamw * The filename and attrnames section can be composed of two or more 8279da6c28aaSamw * path segments separated by a null character. The first segment 8280da6c28aaSamw * is the path to the parent file that roots the entire sequence in 8281da6c28aaSamw * the normal name space. The remaining segments describes a path 8282da6c28aaSamw * rooted at the hidden extended attribute directory of the leaf file of 8283da6c28aaSamw * the previous segment, making it possible to name attributes on 8284da6c28aaSamw * attributes. 8285da6c28aaSamw */ 8286da6c28aaSamw parentfilelen = strlen(xattrp->h_names); 8287da6c28aaSamw xattrapath = xattrp->h_names + parentfilelen + 1; 8288da6c28aaSamw if ((strlen(xattrapath) + parentfilelen + 2) < namelen) { 8289da6c28aaSamw /* 8290da6c28aaSamw * The attrnames section contains a system attribute on an 8291da6c28aaSamw * attribute. Save the name of the attribute for use later, 8292da6c28aaSamw * and replace the null separating the attribute name from 8293da6c28aaSamw * the system attribute name with a '/' so that xattrapath can 8294da6c28aaSamw * be used to display messages with the full attribute path name 8295da6c28aaSamw * rooted at the hidden attribute directory of the base file 8296da6c28aaSamw * in normal name space. 8297da6c28aaSamw */ 8298da6c28aaSamw attrparent = strdup(xattrapath); 8299da6c28aaSamw attrparentlen = strlen(attrparent); 8300da6c28aaSamw xattrapath[attrparentlen] = '/'; 8301da6c28aaSamw } 8302da6c28aaSamw if ((fill_in_attr_info((attrparent == NULL) ? xattrapath : 8303da6c28aaSamw xattrapath + attrparentlen + 1, xattrapath, attrparent, 8304da6c28aaSamw -1, 0, attrinfo)) == 1) { 8305da6c28aaSamw free(attrparent); 8306da6c28aaSamw return (1); 8307da6c28aaSamw } 8308da6c28aaSamw 8309da6c28aaSamw /* Gather link info */ 83107c478bd9Sstevel@tonic-gate if (xattr_linkp) { 83117c478bd9Sstevel@tonic-gate xattr_linkaname = xattr_linkp->h_names + 83127c478bd9Sstevel@tonic-gate strlen(xattr_linkp->h_names) + 1; 83137c478bd9Sstevel@tonic-gate } else { 83147c478bd9Sstevel@tonic-gate xattr_linkaname = NULL; 83157c478bd9Sstevel@tonic-gate } 8316d2443e76Smarks 83177c478bd9Sstevel@tonic-gate return (0); 83187c478bd9Sstevel@tonic-gate } 83197c478bd9Sstevel@tonic-gate #else 83207c478bd9Sstevel@tonic-gate static int 8321da6c28aaSamw read_xattr_hdr(attr_data_t **attrinfo) 83227c478bd9Sstevel@tonic-gate { 83237c478bd9Sstevel@tonic-gate return (0); 83247c478bd9Sstevel@tonic-gate } 83257c478bd9Sstevel@tonic-gate #endif 83267c478bd9Sstevel@tonic-gate 83277c478bd9Sstevel@tonic-gate /* 83287c478bd9Sstevel@tonic-gate * skip over extra slashes in string. 83297c478bd9Sstevel@tonic-gate * 83307c478bd9Sstevel@tonic-gate * For example: 83317c478bd9Sstevel@tonic-gate * /usr/tmp///// 83327c478bd9Sstevel@tonic-gate * 83337c478bd9Sstevel@tonic-gate * would return pointer at 83347c478bd9Sstevel@tonic-gate * /usr/tmp///// 83357c478bd9Sstevel@tonic-gate * ^ 83367c478bd9Sstevel@tonic-gate */ 83377c478bd9Sstevel@tonic-gate static char * 83387c478bd9Sstevel@tonic-gate skipslashes(char *string, char *start) 83397c478bd9Sstevel@tonic-gate { 83407c478bd9Sstevel@tonic-gate while ((string > start) && *(string - 1) == '/') { 83417c478bd9Sstevel@tonic-gate string--; 83427c478bd9Sstevel@tonic-gate } 83437c478bd9Sstevel@tonic-gate 83447c478bd9Sstevel@tonic-gate return (string); 83457c478bd9Sstevel@tonic-gate } 83467c478bd9Sstevel@tonic-gate 83477c478bd9Sstevel@tonic-gate /* 83487c478bd9Sstevel@tonic-gate * Return the parent directory of a given path. 83497c478bd9Sstevel@tonic-gate * 83507c478bd9Sstevel@tonic-gate * Examples: 83517c478bd9Sstevel@tonic-gate * /usr/tmp return /usr 83527c478bd9Sstevel@tonic-gate * /usr/tmp/file return /usr/tmp 83537c478bd9Sstevel@tonic-gate * / returns . 83547c478bd9Sstevel@tonic-gate * /usr returns / 83557c478bd9Sstevel@tonic-gate * file returns . 83567c478bd9Sstevel@tonic-gate * 83577c478bd9Sstevel@tonic-gate * dir is assumed to be at least as big as path. 83587c478bd9Sstevel@tonic-gate */ 83597c478bd9Sstevel@tonic-gate static void 83607c478bd9Sstevel@tonic-gate get_parent(char *path, char *dir) 83617c478bd9Sstevel@tonic-gate { 83627c478bd9Sstevel@tonic-gate char *s; 83637c478bd9Sstevel@tonic-gate char tmpdir[PATH_MAX + 1]; 83647c478bd9Sstevel@tonic-gate 83657c478bd9Sstevel@tonic-gate if (strlen(path) > PATH_MAX) { 83667c478bd9Sstevel@tonic-gate fatal(gettext("pathname is too long")); 83677c478bd9Sstevel@tonic-gate } 83687c478bd9Sstevel@tonic-gate (void) strcpy(tmpdir, path); 83697c478bd9Sstevel@tonic-gate chop_endslashes(tmpdir); 83707c478bd9Sstevel@tonic-gate 83717c478bd9Sstevel@tonic-gate if ((s = strrchr(tmpdir, '/')) == NULL) { 83727c478bd9Sstevel@tonic-gate (void) strcpy(dir, "."); 83737c478bd9Sstevel@tonic-gate } else { 83747c478bd9Sstevel@tonic-gate s = skipslashes(s, tmpdir); 83757c478bd9Sstevel@tonic-gate *s = '\0'; 83767c478bd9Sstevel@tonic-gate if (s == tmpdir) 83777c478bd9Sstevel@tonic-gate (void) strcpy(dir, "/"); 83787c478bd9Sstevel@tonic-gate else 83797c478bd9Sstevel@tonic-gate (void) strcpy(dir, tmpdir); 83807c478bd9Sstevel@tonic-gate } 83817c478bd9Sstevel@tonic-gate } 83827c478bd9Sstevel@tonic-gate 83837c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 83847c478bd9Sstevel@tonic-gate static char * 83857c478bd9Sstevel@tonic-gate get_component(char *path) 83867c478bd9Sstevel@tonic-gate { 83877c478bd9Sstevel@tonic-gate char *ptr; 83887c478bd9Sstevel@tonic-gate 83897c478bd9Sstevel@tonic-gate ptr = strrchr(path, '/'); 83907c478bd9Sstevel@tonic-gate if (ptr == NULL) { 83917c478bd9Sstevel@tonic-gate return (path); 83927c478bd9Sstevel@tonic-gate } else { 83937c478bd9Sstevel@tonic-gate /* 83947c478bd9Sstevel@tonic-gate * Handle trailing slash 83957c478bd9Sstevel@tonic-gate */ 83967c478bd9Sstevel@tonic-gate if (*(ptr + 1) == '\0') 83977c478bd9Sstevel@tonic-gate return (ptr); 83987c478bd9Sstevel@tonic-gate else 83997c478bd9Sstevel@tonic-gate return (ptr + 1); 84007c478bd9Sstevel@tonic-gate } 84017c478bd9Sstevel@tonic-gate } 84027c478bd9Sstevel@tonic-gate #else 84037c478bd9Sstevel@tonic-gate static char * 84047c478bd9Sstevel@tonic-gate get_component(char *path) 84057c478bd9Sstevel@tonic-gate { 84067c478bd9Sstevel@tonic-gate return (path); 84077c478bd9Sstevel@tonic-gate } 84087c478bd9Sstevel@tonic-gate #endif 84097c478bd9Sstevel@tonic-gate 8410da6c28aaSamw #if defined(O_XATTR) 84117c478bd9Sstevel@tonic-gate static int 8412da6c28aaSamw retry_open_attr(int pdirfd, int cwd, char *dirp, char *pattr, char *name, 8413da6c28aaSamw int oflag, mode_t mode) 84147c478bd9Sstevel@tonic-gate { 8415da6c28aaSamw int dirfd; 8416da6c28aaSamw int ofilefd = -1; 84177c478bd9Sstevel@tonic-gate struct timeval times[2]; 84187c478bd9Sstevel@tonic-gate mode_t newmode; 84197c478bd9Sstevel@tonic-gate struct stat parentstat; 8420d2443e76Smarks acl_t *aclp = NULL; 8421d2443e76Smarks int error; 84227c478bd9Sstevel@tonic-gate 84237c478bd9Sstevel@tonic-gate /* 84247c478bd9Sstevel@tonic-gate * We couldn't get to attrdir. See if its 84257c478bd9Sstevel@tonic-gate * just a mode problem on the parent file. 84267c478bd9Sstevel@tonic-gate * for example: a mode such as r-xr--r-- 8427da6c28aaSamw * on a ufs file system without extended 8428da6c28aaSamw * system attribute support won't let us 8429da6c28aaSamw * create an attribute dir if it doesn't 8430da6c28aaSamw * already exist, and on a ufs file system 8431da6c28aaSamw * with extended system attribute support 8432da6c28aaSamw * won't let us open the attribute for 8433da6c28aaSamw * write. 8434d2443e76Smarks * 8435d2443e76Smarks * If file has a non-trivial ACL, then save it 8436d2443e76Smarks * off so that we can place it back on after doing 8437d2443e76Smarks * chmod's. 84387c478bd9Sstevel@tonic-gate */ 8439da6c28aaSamw if ((dirfd = openat(cwd, (pattr == NULL) ? dirp : pattr, 8440da6c28aaSamw O_RDONLY)) == -1) { 8441d2443e76Smarks return (-1); 84427c478bd9Sstevel@tonic-gate } 8443da6c28aaSamw if (fstat(dirfd, &parentstat) == -1) { 8444da6c28aaSamw (void) fprintf(stderr, gettext( 8445da6c28aaSamw "tar: cannot stat %sfile %s: %s\n"), 8446da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8447da6c28aaSamw (pdirfd == -1) ? dirp : name, strerror(errno)); 8448da6c28aaSamw return (-1); 8449da6c28aaSamw } 8450da6c28aaSamw if ((error = facl_get(dirfd, ACL_NO_TRIVIAL, &aclp)) != 0) { 8451da6c28aaSamw (void) fprintf(stderr, gettext( 8452da6c28aaSamw "tar: failed to retrieve ACL on %sfile %s: %s\n"), 8453da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8454da6c28aaSamw (pdirfd == -1) ? dirp : name, strerror(errno)); 8455d2443e76Smarks return (-1); 8456d2443e76Smarks } 8457d2443e76Smarks 84587c478bd9Sstevel@tonic-gate newmode = S_IWUSR | parentstat.st_mode; 8459da6c28aaSamw if (fchmod(dirfd, newmode) == -1) { 84607c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 8461da6c28aaSamw gettext( 8462da6c28aaSamw "tar: cannot fchmod %sfile %s to %o: %s\n"), 8463da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8464da6c28aaSamw (pdirfd == -1) ? dirp : name, newmode, strerror(errno)); 8465d2443e76Smarks if (aclp) 8466d2443e76Smarks acl_free(aclp); 8467d2443e76Smarks return (-1); 84687c478bd9Sstevel@tonic-gate } 84697c478bd9Sstevel@tonic-gate 8470d2443e76Smarks 8471da6c28aaSamw if (pdirfd == -1) { 8472d2443e76Smarks /* 8473da6c28aaSamw * We weren't able to create the attribute directory before. 8474da6c28aaSamw * Now try again. 8475d2443e76Smarks */ 8476da6c28aaSamw ofilefd = attropen(dirp, ".", oflag); 8477da6c28aaSamw } else { 8478da6c28aaSamw /* 8479da6c28aaSamw * We weren't able to create open the attribute before. 8480da6c28aaSamw * Now try again. 8481da6c28aaSamw */ 8482da6c28aaSamw ofilefd = openat(pdirfd, name, oflag, mode); 8483da6c28aaSamw } 84847c478bd9Sstevel@tonic-gate 84857c478bd9Sstevel@tonic-gate /* 84867c478bd9Sstevel@tonic-gate * Put mode back to original 84877c478bd9Sstevel@tonic-gate */ 8488da6c28aaSamw if (fchmod(dirfd, parentstat.st_mode) == -1) { 8489d2443e76Smarks (void) fprintf(stderr, 8490da6c28aaSamw gettext("tar: cannot chmod %sfile %s to %o: %s\n"), 8491da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8492da6c28aaSamw (pdirfd == -1) ? dirp : name, newmode, strerror(errno)); 8493d2443e76Smarks } 8494d2443e76Smarks 8495d2443e76Smarks if (aclp) { 8496da6c28aaSamw error = facl_set(dirfd, aclp); 8497d2443e76Smarks if (error) { 8498d2443e76Smarks (void) fprintf(stderr, 8499da6c28aaSamw gettext("tar: failed to set acl entries on " 8500da6c28aaSamw "%sfile %s\n"), 8501da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8502da6c28aaSamw (pdirfd == -1) ? dirp : name); 8503d2443e76Smarks } 8504d2443e76Smarks acl_free(aclp); 8505d2443e76Smarks } 85067c478bd9Sstevel@tonic-gate 85077c478bd9Sstevel@tonic-gate /* 85087c478bd9Sstevel@tonic-gate * Put back time stamps 85097c478bd9Sstevel@tonic-gate */ 85107c478bd9Sstevel@tonic-gate 85117c478bd9Sstevel@tonic-gate times[0].tv_sec = parentstat.st_atime; 85127c478bd9Sstevel@tonic-gate times[0].tv_usec = 0; 85137c478bd9Sstevel@tonic-gate times[1].tv_sec = parentstat.st_mtime; 85147c478bd9Sstevel@tonic-gate times[1].tv_usec = 0; 85157c478bd9Sstevel@tonic-gate 8516da6c28aaSamw (void) futimesat(cwd, (pattr == NULL) ? dirp : pattr, times); 8517da6c28aaSamw 8518da6c28aaSamw (void) close(dirfd); 8519da6c28aaSamw 8520da6c28aaSamw return (ofilefd); 85217c478bd9Sstevel@tonic-gate } 8522da6c28aaSamw #endif 85237c478bd9Sstevel@tonic-gate 85247c478bd9Sstevel@tonic-gate #if !defined(O_XATTR) 85257c478bd9Sstevel@tonic-gate static int 85267c478bd9Sstevel@tonic-gate openat64(int fd, const char *name, int oflag, mode_t cmode) 85277c478bd9Sstevel@tonic-gate { 85287c478bd9Sstevel@tonic-gate return (open64(name, oflag, cmode)); 85297c478bd9Sstevel@tonic-gate } 85307c478bd9Sstevel@tonic-gate 85317c478bd9Sstevel@tonic-gate static int 85327c478bd9Sstevel@tonic-gate openat(int fd, const char *name, int oflag, mode_t cmode) 85337c478bd9Sstevel@tonic-gate { 85347c478bd9Sstevel@tonic-gate return (open(name, oflag, cmode)); 85357c478bd9Sstevel@tonic-gate } 85367c478bd9Sstevel@tonic-gate 85377c478bd9Sstevel@tonic-gate static int 85387c478bd9Sstevel@tonic-gate fchownat(int fd, const char *name, uid_t owner, gid_t group, int flag) 85397c478bd9Sstevel@tonic-gate { 85407c478bd9Sstevel@tonic-gate if (flag == AT_SYMLINK_NOFOLLOW) 85417c478bd9Sstevel@tonic-gate return (lchown(name, owner, group)); 85427c478bd9Sstevel@tonic-gate else 85437c478bd9Sstevel@tonic-gate return (chown(name, owner, group)); 85447c478bd9Sstevel@tonic-gate } 85457c478bd9Sstevel@tonic-gate 85467c478bd9Sstevel@tonic-gate static int 85477c478bd9Sstevel@tonic-gate renameat(int fromfd, char *old, int tofd, char *new) 85487c478bd9Sstevel@tonic-gate { 85497c478bd9Sstevel@tonic-gate return (rename(old, new)); 85507c478bd9Sstevel@tonic-gate } 85517c478bd9Sstevel@tonic-gate 85527c478bd9Sstevel@tonic-gate static int 85537c478bd9Sstevel@tonic-gate futimesat(int fd, char *path, struct timeval times[2]) 85547c478bd9Sstevel@tonic-gate { 85557c478bd9Sstevel@tonic-gate return (utimes(path, times)); 85567c478bd9Sstevel@tonic-gate } 85577c478bd9Sstevel@tonic-gate 85587c478bd9Sstevel@tonic-gate static int 85597c478bd9Sstevel@tonic-gate unlinkat(int dirfd, char *path, int flag) 85607c478bd9Sstevel@tonic-gate { 85617c478bd9Sstevel@tonic-gate if (flag == AT_REMOVEDIR) 85627c478bd9Sstevel@tonic-gate return (rmdir(path)); 85637c478bd9Sstevel@tonic-gate else 85647c478bd9Sstevel@tonic-gate return (unlink(path)); 85657c478bd9Sstevel@tonic-gate } 85667c478bd9Sstevel@tonic-gate 85677c478bd9Sstevel@tonic-gate static int 85687c478bd9Sstevel@tonic-gate fstatat(int fd, char *path, struct stat *buf, int flag) 85697c478bd9Sstevel@tonic-gate { 85707c478bd9Sstevel@tonic-gate if (flag == AT_SYMLINK_NOFOLLOW) 85717c478bd9Sstevel@tonic-gate return (lstat(path, buf)); 85727c478bd9Sstevel@tonic-gate else 85737c478bd9Sstevel@tonic-gate return (stat(path, buf)); 85747c478bd9Sstevel@tonic-gate } 85757c478bd9Sstevel@tonic-gate 85767c478bd9Sstevel@tonic-gate static int 85777c478bd9Sstevel@tonic-gate attropen(char *file, char *attr, int omode, mode_t cmode) 85787c478bd9Sstevel@tonic-gate { 85797c478bd9Sstevel@tonic-gate errno = ENOTSUP; 85807c478bd9Sstevel@tonic-gate return (-1); 85817c478bd9Sstevel@tonic-gate } 85827c478bd9Sstevel@tonic-gate #endif 85837c478bd9Sstevel@tonic-gate 85847c478bd9Sstevel@tonic-gate static void 85857c478bd9Sstevel@tonic-gate chop_endslashes(char *path) 85867c478bd9Sstevel@tonic-gate { 85877c478bd9Sstevel@tonic-gate char *end, *ptr; 85887c478bd9Sstevel@tonic-gate 85897c478bd9Sstevel@tonic-gate /* 85907c478bd9Sstevel@tonic-gate * Chop of slashes, but not if all we have is slashes 85917c478bd9Sstevel@tonic-gate * for example: //// 85927c478bd9Sstevel@tonic-gate * should make no changes, otherwise it will screw up 85937c478bd9Sstevel@tonic-gate * checkdir 85947c478bd9Sstevel@tonic-gate */ 85957c478bd9Sstevel@tonic-gate end = &path[strlen(path) -1]; 85967c478bd9Sstevel@tonic-gate if (*end == '/' && end != path) { 85977c478bd9Sstevel@tonic-gate ptr = skipslashes(end, path); 85987c478bd9Sstevel@tonic-gate if (ptr != NULL && ptr != path) { 85997c478bd9Sstevel@tonic-gate *ptr = '\0'; 86007c478bd9Sstevel@tonic-gate } 86017c478bd9Sstevel@tonic-gate } 86027c478bd9Sstevel@tonic-gate } 860345916cd2Sjpk /* Trusted Extensions */ 860445916cd2Sjpk 860545916cd2Sjpk /* 860645916cd2Sjpk * append_ext_attr(): 860745916cd2Sjpk * 860845916cd2Sjpk * Append extended attributes and other information into the buffer 860945916cd2Sjpk * that gets written to the ancillary file. 861045916cd2Sjpk * 861145916cd2Sjpk * With option 'T', we create a tarfile which 861245916cd2Sjpk * has an ancillary file each corresponding archived file. 861345916cd2Sjpk * Each ancillary file contains 1 or more of the 861445916cd2Sjpk * following attributes: 861545916cd2Sjpk * 861645916cd2Sjpk * attribute type attribute process procedure 861745916cd2Sjpk * ---------------- ---------------- -------------------------- 861845916cd2Sjpk * DIR_TYPE = 'D' directory flag append if a directory 861945916cd2Sjpk * LBL_TYPE = 'L' SL[IL] or SL append ascii label 862045916cd2Sjpk * 862145916cd2Sjpk * 862245916cd2Sjpk */ 862345916cd2Sjpk static void 862445916cd2Sjpk append_ext_attr(char *shortname, char **secinfo, int *len) 862545916cd2Sjpk { 862645916cd2Sjpk bslabel_t b_slabel; /* binary sensitvity label */ 862745916cd2Sjpk char *ascii = NULL; /* ascii label */ 862845916cd2Sjpk 862945916cd2Sjpk /* 863045916cd2Sjpk * For each attribute type, append it if it is 863145916cd2Sjpk * relevant to the file type. 863245916cd2Sjpk */ 863345916cd2Sjpk 863445916cd2Sjpk /* 863545916cd2Sjpk * For attribute type DIR_TYPE, 863645916cd2Sjpk * append it to the following file type: 863745916cd2Sjpk * 863845916cd2Sjpk * S_IFDIR: directories 863945916cd2Sjpk */ 864045916cd2Sjpk 864145916cd2Sjpk /* 864245916cd2Sjpk * For attribute type LBL_TYPE, 864345916cd2Sjpk * append it to the following file type: 864445916cd2Sjpk * 864545916cd2Sjpk * S_IFDIR: directories (including mld, sld) 864645916cd2Sjpk * S_IFLNK: symbolic link 864745916cd2Sjpk * S_IFREG: regular file but not hard link 864845916cd2Sjpk * S_IFIFO: FIFO file but not hard link 864945916cd2Sjpk * S_IFCHR: char special file but not hard link 865045916cd2Sjpk * S_IFBLK: block special file but not hard link 865145916cd2Sjpk */ 865245916cd2Sjpk switch (stbuf.st_mode & S_IFMT) { 865345916cd2Sjpk 865445916cd2Sjpk case S_IFDIR: 865545916cd2Sjpk 865645916cd2Sjpk /* 865745916cd2Sjpk * append DIR_TYPE 865845916cd2Sjpk */ 865945916cd2Sjpk (void) append_secattr(secinfo, len, 1, 866045916cd2Sjpk "\0", DIR_TYPE); 866145916cd2Sjpk 866245916cd2Sjpk /* 866345916cd2Sjpk * Get and append attribute types LBL_TYPE. 866445916cd2Sjpk * For directories, LBL_TYPE contains SL. 866545916cd2Sjpk */ 866645916cd2Sjpk /* get binary sensitivity label */ 866745916cd2Sjpk if (getlabel(shortname, &b_slabel) != 0) { 866845916cd2Sjpk (void) fprintf(stderr, 866945916cd2Sjpk gettext("tar: can't get sensitvity label for " 867045916cd2Sjpk " %s, getlabel() error: %s\n"), 867145916cd2Sjpk shortname, strerror(errno)); 867245916cd2Sjpk } else { 867345916cd2Sjpk /* get ascii SL */ 867445916cd2Sjpk if (bsltos(&b_slabel, &ascii, 867545916cd2Sjpk 0, 0) <= 0) { 867645916cd2Sjpk (void) fprintf(stderr, 867745916cd2Sjpk gettext("tar: can't get ascii SL for" 867845916cd2Sjpk " %s\n"), shortname); 867945916cd2Sjpk } else { 868045916cd2Sjpk /* append LBL_TYPE */ 868145916cd2Sjpk (void) append_secattr(secinfo, len, 868245916cd2Sjpk strlen(ascii) + 1, ascii, 868345916cd2Sjpk LBL_TYPE); 868445916cd2Sjpk 868545916cd2Sjpk /* free storage */ 868645916cd2Sjpk if (ascii != NULL) { 868745916cd2Sjpk free(ascii); 868845916cd2Sjpk ascii = (char *)0; 868945916cd2Sjpk } 869045916cd2Sjpk } 869145916cd2Sjpk 869245916cd2Sjpk } 869345916cd2Sjpk break; 869445916cd2Sjpk 869545916cd2Sjpk case S_IFLNK: 869645916cd2Sjpk case S_IFREG: 869745916cd2Sjpk case S_IFIFO: 869845916cd2Sjpk case S_IFCHR: 869945916cd2Sjpk case S_IFBLK: 870045916cd2Sjpk 870145916cd2Sjpk /* get binary sensitivity label */ 870245916cd2Sjpk if (getlabel(shortname, &b_slabel) != 0) { 870345916cd2Sjpk (void) fprintf(stderr, 870445916cd2Sjpk gettext("tar: can't get sensitivty label for %s, " 870545916cd2Sjpk "getlabel() error: %s\n"), 870645916cd2Sjpk shortname, strerror(errno)); 870745916cd2Sjpk } else { 870845916cd2Sjpk /* get ascii IL[SL] */ 870945916cd2Sjpk if (bsltos(&b_slabel, &ascii, 0, 0) <= 0) { 871045916cd2Sjpk (void) fprintf(stderr, 871145916cd2Sjpk gettext("tar: can't translate sensitivity " 871245916cd2Sjpk " label for %s\n"), shortname); 871345916cd2Sjpk } else { 871445916cd2Sjpk char *cmw_label; 871545916cd2Sjpk size_t cmw_length; 871645916cd2Sjpk 871745916cd2Sjpk cmw_length = strlen("ADMIN_LOW [] ") + 871845916cd2Sjpk strlen(ascii); 871945916cd2Sjpk if ((cmw_label = malloc(cmw_length)) == NULL) { 872045916cd2Sjpk (void) fprintf(stderr, gettext( 872145916cd2Sjpk "Insufficient memory for label\n")); 872245916cd2Sjpk exit(1); 872345916cd2Sjpk } 872445916cd2Sjpk /* append LBL_TYPE */ 872545916cd2Sjpk (void) snprintf(cmw_label, cmw_length, 872645916cd2Sjpk "ADMIN_LOW [%s]", ascii); 872745916cd2Sjpk (void) append_secattr(secinfo, len, 872845916cd2Sjpk strlen(cmw_label) + 1, cmw_label, 872945916cd2Sjpk LBL_TYPE); 873045916cd2Sjpk 873145916cd2Sjpk /* free storage */ 873245916cd2Sjpk if (ascii != NULL) { 873345916cd2Sjpk free(cmw_label); 873445916cd2Sjpk free(ascii); 873545916cd2Sjpk ascii = (char *)0; 873645916cd2Sjpk } 873745916cd2Sjpk } 873845916cd2Sjpk } 873945916cd2Sjpk break; 874045916cd2Sjpk 874145916cd2Sjpk default: 874245916cd2Sjpk break; 874345916cd2Sjpk } /* end switch for LBL_TYPE */ 874445916cd2Sjpk 874545916cd2Sjpk 874645916cd2Sjpk /* DONE !! */ 874745916cd2Sjpk return; 874845916cd2Sjpk 874945916cd2Sjpk } /* end of append_ext_attr */ 875045916cd2Sjpk 875145916cd2Sjpk 875245916cd2Sjpk /* 875345916cd2Sjpk * Name: extract_attr() 875445916cd2Sjpk * 875545916cd2Sjpk * Description: 875645916cd2Sjpk * Process attributes from the ancillary file due to 875745916cd2Sjpk * the T option. 875845916cd2Sjpk * 875945916cd2Sjpk * Call by doxtract() as part of the switch case structure. 876045916cd2Sjpk * Making this a separate routine because the nesting are too 876145916cd2Sjpk * deep in doxtract, thus, leaving very little space 876245916cd2Sjpk * on each line for instructions. 876345916cd2Sjpk * 876445916cd2Sjpk * With option 'T', we extract from a TS 8 or TS 2.5 ancillary file 876545916cd2Sjpk * 876645916cd2Sjpk * For option 'T', following are possible attributes in 876745916cd2Sjpk * a TS 8 ancillary file: (NOTE: No IL support) 876845916cd2Sjpk * 876945916cd2Sjpk * attribute type attribute process procedure 877045916cd2Sjpk * ---------------- ---------------- ------------------------- 877145916cd2Sjpk * # LBL_TYPE = 'L' SL construct binary label 877245916cd2Sjpk * # APRIV_TYPE = 'P' allowed priv construct privileges 877345916cd2Sjpk * # FPRIV_TYPE = 'p' forced priv construct privileges 877445916cd2Sjpk * # COMP_TYPE = 'C' path component construct real path 877545916cd2Sjpk * # DIR_TYPE = 'D' directory flag note it is a directory 877645916cd2Sjpk * $ UFSD_ACL = '1' ACL data construct ACL entries 877745916cd2Sjpk * ATTR_FLAG_TYPE = 'F' file attr flags construct binary flags 877845916cd2Sjpk * LK_COMP_TYPE = 'K' linked path comp construct linked real path 877945916cd2Sjpk * 878045916cd2Sjpk * note: # = attribute names common between TS 8 & TS 2.5 ancillary 878145916cd2Sjpk * files. 878245916cd2Sjpk * $ = ACL attribute is processed for the option 'p', it doesn't 878345916cd2Sjpk * need option 'T'. 878445916cd2Sjpk * 878545916cd2Sjpk * Trusted Extensions ignores APRIV_TYPE, FPRIV_TYPE, and ATTR_FLAG_TYPE 878645916cd2Sjpk * 878745916cd2Sjpk */ 878845916cd2Sjpk static void 878945916cd2Sjpk extract_attr(char **file_ptr, struct sec_attr *attr) 879045916cd2Sjpk { 879145916cd2Sjpk int reterr, err; 879245916cd2Sjpk char *dummy_buf; /* for attribute extract */ 879345916cd2Sjpk 879445916cd2Sjpk dummy_buf = attr->attr_info; 879545916cd2Sjpk 879645916cd2Sjpk switch (attr->attr_type) { 879745916cd2Sjpk 879845916cd2Sjpk case DIR_TYPE: 879945916cd2Sjpk 880045916cd2Sjpk dir_flag++; 880145916cd2Sjpk break; 880245916cd2Sjpk 880345916cd2Sjpk case LBL_TYPE: 880445916cd2Sjpk 880545916cd2Sjpk /* 880645916cd2Sjpk * LBL_TYPE is used to indicate SL for directory, and 880745916cd2Sjpk * CMW label for other file types. 880845916cd2Sjpk */ 880945916cd2Sjpk 881045916cd2Sjpk if (!dir_flag) { /* not directory */ 881145916cd2Sjpk /* Skip over IL portion */ 881245916cd2Sjpk char *sl_ptr = strchr(dummy_buf, '['); 881345916cd2Sjpk 881445916cd2Sjpk if (sl_ptr == NULL) 881545916cd2Sjpk err = 0; 881645916cd2Sjpk else 881745916cd2Sjpk err = stobsl(sl_ptr, &bs_label, 881845916cd2Sjpk NEW_LABEL, &reterr); 881945916cd2Sjpk } else { /* directory */ 882045916cd2Sjpk err = stobsl(dummy_buf, &bs_label, 882145916cd2Sjpk NEW_LABEL, &reterr); 882245916cd2Sjpk } 882345916cd2Sjpk if (err == 0) { 882445916cd2Sjpk (void) fprintf(stderr, gettext("tar: " 882545916cd2Sjpk "can't convert %s to binary label\n"), 882645916cd2Sjpk dummy_buf); 882745916cd2Sjpk bslundef(&bs_label); 882845916cd2Sjpk } else if (!blequal(&bs_label, &admin_low) && 882945916cd2Sjpk !blequal(&bs_label, &admin_high)) { 883045916cd2Sjpk bslabel_t *from_label; 883145916cd2Sjpk char *buf; 883245916cd2Sjpk char tempbuf[MAXPATHLEN]; 883345916cd2Sjpk 883445916cd2Sjpk if (*orig_namep != '/') { 883545916cd2Sjpk /* got relative linked to path */ 883645916cd2Sjpk (void) getcwd(tempbuf, (sizeof (tempbuf))); 883745916cd2Sjpk (void) strncat(tempbuf, "/", MAXPATHLEN); 883845916cd2Sjpk } else 883945916cd2Sjpk *tempbuf = '\0'; 884045916cd2Sjpk 884145916cd2Sjpk buf = real_path; 884245916cd2Sjpk (void) strncat(tempbuf, orig_namep, MAXPATHLEN); 884345916cd2Sjpk from_label = getlabelbypath(tempbuf); 884445916cd2Sjpk if (from_label != NULL) { 884545916cd2Sjpk if (blequal(from_label, &admin_low)) { 884645916cd2Sjpk if ((getpathbylabel(tempbuf, buf, 884745916cd2Sjpk MAXPATHLEN, &bs_label) == NULL)) { 884845916cd2Sjpk (void) fprintf(stderr, 884945916cd2Sjpk gettext("tar: " 885045916cd2Sjpk "can't get zone root path for " 885145916cd2Sjpk "%s\n"), tempbuf); 885245916cd2Sjpk } else 885345916cd2Sjpk rpath_flag = 1; 885445916cd2Sjpk } 885545916cd2Sjpk free(from_label); 885645916cd2Sjpk } 885745916cd2Sjpk } 885845916cd2Sjpk break; 885945916cd2Sjpk 886045916cd2Sjpk case COMP_TYPE: 886145916cd2Sjpk 886245916cd2Sjpk rebuild_comp_path(dummy_buf, file_ptr); 886345916cd2Sjpk break; 886445916cd2Sjpk 886545916cd2Sjpk case LK_COMP_TYPE: 886645916cd2Sjpk 886745916cd2Sjpk if (rebuild_lk_comp_path(dummy_buf, file_ptr) 886845916cd2Sjpk == 0) { 886945916cd2Sjpk lk_rpath_flag = 1; 887045916cd2Sjpk } else { 887145916cd2Sjpk (void) fprintf(stderr, gettext("tar: warning: link's " 887245916cd2Sjpk "target pathname might be invalid.\n")); 887345916cd2Sjpk lk_rpath_flag = 0; 887445916cd2Sjpk } 887545916cd2Sjpk break; 887645916cd2Sjpk case APRIV_TYPE: 887745916cd2Sjpk ignored_aprivs++; 887845916cd2Sjpk break; 887945916cd2Sjpk case FPRIV_TYPE: 888045916cd2Sjpk ignored_fprivs++; 888145916cd2Sjpk break; 888245916cd2Sjpk case ATTR_FLAG_TYPE: 888345916cd2Sjpk ignored_fattrs++; 888445916cd2Sjpk break; 888545916cd2Sjpk 888645916cd2Sjpk default: 888745916cd2Sjpk 888845916cd2Sjpk break; 888945916cd2Sjpk } 889045916cd2Sjpk 889145916cd2Sjpk /* done */ 889245916cd2Sjpk return; 889345916cd2Sjpk 889445916cd2Sjpk } /* end extract_attr */ 889545916cd2Sjpk 889645916cd2Sjpk 889745916cd2Sjpk 889845916cd2Sjpk /* 889945916cd2Sjpk * Name: rebuild_comp_path() 890045916cd2Sjpk * 890145916cd2Sjpk * Description: 890245916cd2Sjpk * Take the string of components passed down by the calling 890345916cd2Sjpk * routine and parse the values and rebuild the path. 890445916cd2Sjpk * This routine no longer needs to produce a new real_path 890545916cd2Sjpk * string because it is produced when the 'L' LABEL_TYPE is 890645916cd2Sjpk * interpreted. So the only thing done here is to distinguish 890745916cd2Sjpk * between an SLD and an MLD entry. We only want one, so we 890845916cd2Sjpk * ignore the MLD entry by setting the mld_flag. 890945916cd2Sjpk * 891045916cd2Sjpk * return value: 891145916cd2Sjpk * none 891245916cd2Sjpk */ 891345916cd2Sjpk static void 891445916cd2Sjpk rebuild_comp_path(char *str, char **namep) 891545916cd2Sjpk { 891645916cd2Sjpk char *cp; 891745916cd2Sjpk 891845916cd2Sjpk while (*str != '\0') { 891945916cd2Sjpk 892045916cd2Sjpk switch (*str) { 892145916cd2Sjpk 892245916cd2Sjpk case MLD_TYPE: 892345916cd2Sjpk 892445916cd2Sjpk str++; 892545916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 892645916cd2Sjpk *cp = '\0'; 892745916cd2Sjpk str = cp + 2; 892845916cd2Sjpk *cp = ';'; 892945916cd2Sjpk } 893045916cd2Sjpk mld_flag = 1; 893145916cd2Sjpk break; 893245916cd2Sjpk 893345916cd2Sjpk case SLD_TYPE: 893445916cd2Sjpk 893545916cd2Sjpk str++; 893645916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 893745916cd2Sjpk *cp = '\0'; 893845916cd2Sjpk str = cp + 2; 893945916cd2Sjpk *cp = ';'; 894045916cd2Sjpk } 894145916cd2Sjpk mld_flag = 0; 894245916cd2Sjpk break; 894345916cd2Sjpk 894445916cd2Sjpk case PATH_TYPE: 894545916cd2Sjpk 894645916cd2Sjpk str++; 894745916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 894845916cd2Sjpk *cp = '\0'; 894945916cd2Sjpk str = cp + 2; 895045916cd2Sjpk *cp = ';'; 895145916cd2Sjpk } 895245916cd2Sjpk break; 895345916cd2Sjpk } 895445916cd2Sjpk } 895545916cd2Sjpk if (rpath_flag) 895645916cd2Sjpk *namep = real_path; 895745916cd2Sjpk return; 895845916cd2Sjpk 895945916cd2Sjpk } /* end rebuild_comp_path() */ 896045916cd2Sjpk 896145916cd2Sjpk /* 896245916cd2Sjpk * Name: rebuild_lk_comp_path() 896345916cd2Sjpk * 896445916cd2Sjpk * Description: 896545916cd2Sjpk * Take the string of components passed down by the calling 896645916cd2Sjpk * routine and parse the values and rebuild the path. 896745916cd2Sjpk * 896845916cd2Sjpk * return value: 896945916cd2Sjpk * 0 = succeeded 897045916cd2Sjpk * -1 = failed 897145916cd2Sjpk */ 897245916cd2Sjpk static int 897345916cd2Sjpk rebuild_lk_comp_path(char *str, char **namep) 897445916cd2Sjpk { 897545916cd2Sjpk char *cp; 897645916cd2Sjpk int reterr; 897745916cd2Sjpk bslabel_t bslabel; 897845916cd2Sjpk char *buf; 897945916cd2Sjpk char pbuf[MAXPATHLEN]; 898045916cd2Sjpk char *ptr1, *ptr2; 898145916cd2Sjpk int plen; 898245916cd2Sjpk int use_pbuf; 898345916cd2Sjpk char tempbuf[MAXPATHLEN]; 898445916cd2Sjpk int mismatch; 898545916cd2Sjpk bslabel_t *from_label; 898645916cd2Sjpk char zonename[ZONENAME_MAX]; 898745916cd2Sjpk zoneid_t zoneid; 898845916cd2Sjpk 898945916cd2Sjpk /* init stuff */ 899045916cd2Sjpk use_pbuf = 0; 899145916cd2Sjpk mismatch = 0; 899245916cd2Sjpk 899345916cd2Sjpk /* 899445916cd2Sjpk * For linked to pathname (LK_COMP_TYPE): 899545916cd2Sjpk * - If the linked to pathname is absolute (start with /), we 899645916cd2Sjpk * will use it as is. 899745916cd2Sjpk * - If it is a relative pathname then it is relative to 1 of 2 899845916cd2Sjpk * directories. For a hardlink, it is relative to the current 899945916cd2Sjpk * directory. For a symbolic link, it is relative to the 900045916cd2Sjpk * directory the symbolic link is in. For the symbolic link 900145916cd2Sjpk * case, set a flag to indicate we need to use the prefix of 900245916cd2Sjpk * the restored file's pathname with the linked to pathname. 900345916cd2Sjpk * 900445916cd2Sjpk * NOTE: At this point, we have no way to determine if we have 900545916cd2Sjpk * a hardlink or a symbolic link. We will compare the 1st 900645916cd2Sjpk * component in the prefix portion of the restore file's 900745916cd2Sjpk * pathname to the 1st component in the attribute data 900845916cd2Sjpk * (the linked pathname). If they are the same, we will assume 900945916cd2Sjpk * the link pathname to reconstruct is relative to the current 901045916cd2Sjpk * directory. Otherwise, we will set a flag indicate we need 901145916cd2Sjpk * to use a prefix with the reconstructed name. Need to compare 901245916cd2Sjpk * both the adorned and unadorned version before deciding a 901345916cd2Sjpk * mismatch. 901445916cd2Sjpk */ 901545916cd2Sjpk 901645916cd2Sjpk buf = lk_real_path; 901745916cd2Sjpk if (*(str + 1) != '/') { /* got relative linked to path */ 901845916cd2Sjpk ptr1 = orig_namep; 901945916cd2Sjpk ptr2 = strrchr(ptr1, '/'); 902045916cd2Sjpk plen = ptr2 - ptr1; 902145916cd2Sjpk if (plen > 0) { 902245916cd2Sjpk pbuf[0] = '\0'; 902345916cd2Sjpk plen++; /* include '/' */ 902445916cd2Sjpk (void) strncpy(pbuf, ptr1, plen); 902545916cd2Sjpk *(pbuf + plen) = '\0'; 902645916cd2Sjpk ptr2 = strchr(pbuf, '/'); 902745916cd2Sjpk if (strncmp(pbuf, str + 1, ptr2 - pbuf) != 0) 902845916cd2Sjpk mismatch = 1; 902945916cd2Sjpk } 903045916cd2Sjpk 903145916cd2Sjpk if (mismatch == 1) 903245916cd2Sjpk use_pbuf = 1; 903345916cd2Sjpk } 903445916cd2Sjpk 903545916cd2Sjpk buf[0] = '\0'; 903645916cd2Sjpk 903745916cd2Sjpk while (*str != '\0') { 903845916cd2Sjpk 903945916cd2Sjpk switch (*str) { 904045916cd2Sjpk 904145916cd2Sjpk case MLD_TYPE: 904245916cd2Sjpk 904345916cd2Sjpk str++; 904445916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 904545916cd2Sjpk *cp = '\0'; 904645916cd2Sjpk 904745916cd2Sjpk /* 904845916cd2Sjpk * Ignore attempts to backup over .MLD. 904945916cd2Sjpk */ 905045916cd2Sjpk if (strcmp(str, "../") != 0) 905145916cd2Sjpk (void) strncat(buf, str, MAXPATHLEN); 905245916cd2Sjpk str = cp + 2; 905345916cd2Sjpk *cp = ';'; 905445916cd2Sjpk } 905545916cd2Sjpk break; 905645916cd2Sjpk 905745916cd2Sjpk case SLD_TYPE: 905845916cd2Sjpk 905945916cd2Sjpk str++; 906045916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 906145916cd2Sjpk *cp = '\0'; 906245916cd2Sjpk 906345916cd2Sjpk /* 906445916cd2Sjpk * Use the path name in the header if 906545916cd2Sjpk * error occurs when processing the 906645916cd2Sjpk * SLD type. 906745916cd2Sjpk */ 906845916cd2Sjpk 906945916cd2Sjpk if (!stobsl(str, &bslabel, 907045916cd2Sjpk NO_CORRECTION, &reterr)) { 907145916cd2Sjpk (void) fprintf(stderr, gettext( 907245916cd2Sjpk "tar: can't translate to binary" 907345916cd2Sjpk "SL for SLD, stobsl() error:" 907445916cd2Sjpk " %s\n"), strerror(errno)); 907545916cd2Sjpk return (-1); 907645916cd2Sjpk } 907745916cd2Sjpk 907845916cd2Sjpk str = cp + 2; 907945916cd2Sjpk *cp = ';'; 908045916cd2Sjpk 908145916cd2Sjpk if (use_pbuf == 1) { 908245916cd2Sjpk if (*pbuf != '/') { 908345916cd2Sjpk /* relative linked to path */ 908445916cd2Sjpk 908545916cd2Sjpk (void) getcwd(tempbuf, 908645916cd2Sjpk (sizeof (tempbuf))); 908745916cd2Sjpk (void) strncat(tempbuf, "/", 908845916cd2Sjpk MAXPATHLEN); 908945916cd2Sjpk (void) strncat(tempbuf, pbuf, 909045916cd2Sjpk MAXPATHLEN); 909145916cd2Sjpk } 909245916cd2Sjpk else 909345916cd2Sjpk (void) strcpy(tempbuf, pbuf); 909445916cd2Sjpk 909545916cd2Sjpk } else if (*buf != '/') { 909645916cd2Sjpk /* got relative linked to path */ 909745916cd2Sjpk 909845916cd2Sjpk (void) getcwd(tempbuf, 909945916cd2Sjpk (sizeof (tempbuf))); 910045916cd2Sjpk (void) strncat(tempbuf, "/", 910145916cd2Sjpk MAXPATHLEN); 910245916cd2Sjpk } else 910345916cd2Sjpk *tempbuf = '\0'; 910445916cd2Sjpk 910545916cd2Sjpk (void) strncat(tempbuf, buf, MAXPATHLEN); 910645916cd2Sjpk *buf = '\0'; 910745916cd2Sjpk 910845916cd2Sjpk if (blequal(&bslabel, &admin_high)) { 910945916cd2Sjpk bslabel = admin_low; 911045916cd2Sjpk } 911145916cd2Sjpk 911245916cd2Sjpk 911345916cd2Sjpk /* 911445916cd2Sjpk * Check for cross-zone symbolic links 911545916cd2Sjpk */ 911645916cd2Sjpk from_label = getlabelbypath(real_path); 911745916cd2Sjpk if (rpath_flag && (from_label != NULL) && 911845916cd2Sjpk !blequal(&bslabel, from_label)) { 911945916cd2Sjpk if ((zoneid = 912045916cd2Sjpk getzoneidbylabel(&bslabel)) == -1) { 912145916cd2Sjpk (void) fprintf(stderr, 912245916cd2Sjpk gettext("tar: can't get " 912345916cd2Sjpk "zone ID for %s\n"), 912445916cd2Sjpk tempbuf); 912545916cd2Sjpk return (-1); 912645916cd2Sjpk } 912745916cd2Sjpk if (zone_getattr(zoneid, ZONE_ATTR_NAME, 912845916cd2Sjpk &zonename, ZONENAME_MAX) == -1) { 912945916cd2Sjpk /* Badly configured zone info */ 913045916cd2Sjpk (void) fprintf(stderr, 913145916cd2Sjpk gettext("tar: can't get " 913245916cd2Sjpk "zonename for %s\n"), 913345916cd2Sjpk tempbuf); 913445916cd2Sjpk return (-1); 913545916cd2Sjpk } 913645916cd2Sjpk (void) strncpy(buf, AUTO_ZONE, 913745916cd2Sjpk MAXPATHLEN); 913845916cd2Sjpk (void) strncat(buf, "/", 913945916cd2Sjpk MAXPATHLEN); 914045916cd2Sjpk (void) strncat(buf, zonename, 914145916cd2Sjpk MAXPATHLEN); 914245916cd2Sjpk } 914345916cd2Sjpk if (from_label != NULL) 914445916cd2Sjpk free(from_label); 914545916cd2Sjpk (void) strncat(buf, tempbuf, MAXPATHLEN); 914645916cd2Sjpk break; 914745916cd2Sjpk } 914845916cd2Sjpk mld_flag = 0; 914945916cd2Sjpk break; 915045916cd2Sjpk 915145916cd2Sjpk case PATH_TYPE: 915245916cd2Sjpk 915345916cd2Sjpk str++; 915445916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 915545916cd2Sjpk *cp = '\0'; 915645916cd2Sjpk (void) strncat(buf, str, MAXPATHLEN); 915745916cd2Sjpk str = cp + 2; 915845916cd2Sjpk *cp = ';'; 915945916cd2Sjpk } 916045916cd2Sjpk break; 916145916cd2Sjpk 916245916cd2Sjpk default: 916345916cd2Sjpk 916445916cd2Sjpk (void) fprintf(stderr, gettext( 916545916cd2Sjpk "tar: error rebuilding path %s\n"), 916645916cd2Sjpk *namep); 916745916cd2Sjpk *buf = '\0'; 916845916cd2Sjpk str++; 916945916cd2Sjpk return (-1); 917045916cd2Sjpk } 917145916cd2Sjpk } 917245916cd2Sjpk 917345916cd2Sjpk /* 917445916cd2Sjpk * Done for LK_COMP_TYPE 917545916cd2Sjpk */ 917645916cd2Sjpk 917745916cd2Sjpk return (0); /* component path is rebuilt successfully */ 917845916cd2Sjpk 917945916cd2Sjpk } /* end rebuild_lk_comp_path() */ 918045916cd2Sjpk 918145916cd2Sjpk /* 918245916cd2Sjpk * Name: check_ext_attr() 918345916cd2Sjpk * 918445916cd2Sjpk * Description: 918545916cd2Sjpk * Check the extended attributes for a file being extracted. 918645916cd2Sjpk * The attributes being checked here are CMW labels. 918745916cd2Sjpk * ACLs are not set here because they are set by the 918845916cd2Sjpk * pflag in doxtract(). 918945916cd2Sjpk * 919045916cd2Sjpk * If the label doesn't match, return 0 919145916cd2Sjpk * else return 1 919245916cd2Sjpk */ 919345916cd2Sjpk static int 919445916cd2Sjpk check_ext_attr(char *filename) 919545916cd2Sjpk { 919645916cd2Sjpk bslabel_t currentlabel; /* label from zone */ 919745916cd2Sjpk 919845916cd2Sjpk if (bltype(&bs_label, SUN_SL_UN)) { 919945916cd2Sjpk /* No label check possible */ 920045916cd2Sjpk return (0); 920145916cd2Sjpk } 920245916cd2Sjpk if (getlabel(filename, ¤tlabel) != 0) { 920345916cd2Sjpk (void) fprintf(stderr, 920445916cd2Sjpk gettext("tar: can't get label for " 920545916cd2Sjpk " %s, getlabel() error: %s\n"), 920645916cd2Sjpk filename, strerror(errno)); 920745916cd2Sjpk return (0); 920845916cd2Sjpk } else if ((blequal(¤tlabel, &bs_label)) == 0) { 920945916cd2Sjpk char *src_label = NULL; /* ascii label */ 921045916cd2Sjpk 921145916cd2Sjpk /* get current src SL */ 921245916cd2Sjpk if (bsltos(&bs_label, &src_label, 0, 0) <= 0) { 921345916cd2Sjpk (void) fprintf(stderr, 921445916cd2Sjpk gettext("tar: can't interpret requested label for" 921545916cd2Sjpk " %s\n"), filename); 921645916cd2Sjpk } else { 921745916cd2Sjpk (void) fprintf(stderr, 921845916cd2Sjpk gettext("tar: can't apply label %s to %s\n"), 921945916cd2Sjpk src_label, filename); 922045916cd2Sjpk free(src_label); 922145916cd2Sjpk } 922245916cd2Sjpk (void) fprintf(stderr, 922345916cd2Sjpk gettext("tar: %s not restored\n"), filename); 922445916cd2Sjpk return (0); 922545916cd2Sjpk } 922645916cd2Sjpk return (1); 922745916cd2Sjpk 922845916cd2Sjpk } /* end check_ext_attr */ 922936802407SRich Burridge 923036802407SRich Burridge /* Compressing a tar file using compression method provided in 'opt' */ 923136802407SRich Burridge 923236802407SRich Burridge static void 923336802407SRich Burridge compress_back() 923436802407SRich Burridge { 923536802407SRich Burridge pid_t pid; 923636802407SRich Burridge 923736802407SRich Burridge if (vflag) { 923836802407SRich Burridge (void) fprintf(vfile, 923936802407SRich Burridge gettext("Compressing '%s' with '%s'...\n"), 924036802407SRich Burridge usefile, compress_opt); 924136802407SRich Burridge } 924236802407SRich Burridge if ((pid = fork()) == 0) { 9243aa7166bdSMilan Jurik verify_compress_opt(compress_opt); 924436802407SRich Burridge (void) execlp(compress_opt, compress_opt, 924536802407SRich Burridge usefile, NULL); 924636802407SRich Burridge } else if (pid == -1) { 924736802407SRich Burridge vperror(1, "%s", gettext("Could not fork")); 924836802407SRich Burridge } 924936802407SRich Burridge wait_pid(pid); 925036802407SRich Burridge if (suffix == 0) { 925136802407SRich Burridge (void) rename(tfname, usefile); 925236802407SRich Burridge } 925336802407SRich Burridge } 925436802407SRich Burridge 925536802407SRich Burridge /* The magic numbers from /etc/magic */ 925636802407SRich Burridge 925736802407SRich Burridge #define GZIP_MAGIC "\037\213" 925836802407SRich Burridge #define BZIP_MAGIC "BZh" 925936802407SRich Burridge #define COMP_MAGIC "\037\235" 9260506ea5b8SMilan Jurik #define XZ_MAGIC "\375\067\172\130\132\000" 926136802407SRich Burridge 926236802407SRich Burridge void 9263506ea5b8SMilan Jurik check_compression(void) 926436802407SRich Burridge { 9265506ea5b8SMilan Jurik char magic[16]; 926636802407SRich Burridge FILE *fp; 926736802407SRich Burridge 926836802407SRich Burridge if ((fp = fopen(usefile, "r")) != NULL) { 9269506ea5b8SMilan Jurik (void) fread(magic, sizeof (char), 6, fp); 927036802407SRich Burridge (void) fclose(fp); 927136802407SRich Burridge } 927236802407SRich Burridge 927336802407SRich Burridge if (memcmp(magic, GZIP_MAGIC, 2) == 0) { 927436802407SRich Burridge if (xflag || tflag) { 927536802407SRich Burridge compress_opt = compress_malloc(strlen(GZCAT) + 1); 927636802407SRich Burridge (void) strcpy(compress_opt, GZCAT); 927736802407SRich Burridge } else if (uflag || rflag) { 927836802407SRich Burridge compress_opt = compress_malloc(strlen(GZIP) + 1); 927936802407SRich Burridge (void) strcpy(compress_opt, GZIP); 928036802407SRich Burridge } 928136802407SRich Burridge } else if (memcmp(magic, BZIP_MAGIC, 2) == 0) { 928236802407SRich Burridge if (xflag || tflag) { 928336802407SRich Burridge compress_opt = compress_malloc(strlen(BZCAT) + 1); 928436802407SRich Burridge (void) strcpy(compress_opt, BZCAT); 928536802407SRich Burridge } else if (uflag || rflag) { 928636802407SRich Burridge compress_opt = compress_malloc(strlen(BZIP) + 1); 928736802407SRich Burridge (void) strcpy(compress_opt, BZIP); 928836802407SRich Burridge } 928936802407SRich Burridge } else if (memcmp(magic, COMP_MAGIC, 2) == 0) { 929036802407SRich Burridge if (xflag || tflag) { 929136802407SRich Burridge compress_opt = compress_malloc(strlen(ZCAT) + 1); 929236802407SRich Burridge (void) strcpy(compress_opt, ZCAT); 929336802407SRich Burridge } else if (uflag || rflag) { 929436802407SRich Burridge compress_opt = compress_malloc(strlen(COMPRESS) + 1); 929536802407SRich Burridge (void) strcpy(compress_opt, COMPRESS); 929636802407SRich Burridge } 9297506ea5b8SMilan Jurik } else if (memcmp(magic, XZ_MAGIC, 6) == 0) { 9298506ea5b8SMilan Jurik if (xflag || tflag) { 9299506ea5b8SMilan Jurik compress_opt = compress_malloc(strlen(XZCAT) + 1); 9300506ea5b8SMilan Jurik (void) strcpy(compress_opt, XZCAT); 9301506ea5b8SMilan Jurik } else if (uflag || rflag) { 9302506ea5b8SMilan Jurik compress_opt = compress_malloc(strlen(XZ) + 1); 9303506ea5b8SMilan Jurik (void) strcpy(compress_opt, XZ); 9304506ea5b8SMilan Jurik } 930536802407SRich Burridge } 930636802407SRich Burridge } 930736802407SRich Burridge 930836802407SRich Burridge char * 930936802407SRich Burridge add_suffix() 931036802407SRich Burridge { 931136802407SRich Burridge (void) strcpy(tfname, usefile); 931236802407SRich Burridge if (strcmp(compress_opt, GZIP) == 0) { 931336802407SRich Burridge if ((suffix = gz_suffix()) == NULL) { 931436802407SRich Burridge strlcat(tfname, gsuffix[0], sizeof (tfname)); 931536802407SRich Burridge return (gsuffix[0]); 931636802407SRich Burridge } 931736802407SRich Burridge } else if (strcmp(compress_opt, COMPRESS) == 0) { 931836802407SRich Burridge if ((suffix = gz_suffix()) == NULL) { 931936802407SRich Burridge strlcat(tfname, gsuffix[6], sizeof (tfname)); 932036802407SRich Burridge return (gsuffix[6]); 932136802407SRich Burridge } 932236802407SRich Burridge } else if (strcmp(compress_opt, BZIP) == 0) { 932336802407SRich Burridge if ((suffix = bz_suffix()) == NULL) { 932436802407SRich Burridge strlcat(tfname, bsuffix[0], sizeof (tfname)); 932536802407SRich Burridge return (bsuffix[0]); 932636802407SRich Burridge } 9327506ea5b8SMilan Jurik } else if (strcmp(compress_opt, XZ) == 0) { 9328506ea5b8SMilan Jurik if ((suffix = xz_suffix()) == NULL) { 9329506ea5b8SMilan Jurik strlcat(tfname, xsuffix[0], sizeof (tfname)); 9330506ea5b8SMilan Jurik return (xsuffix[0]); 9331506ea5b8SMilan Jurik } 933236802407SRich Burridge } 933336802407SRich Burridge return (NULL); 933436802407SRich Burridge } 933536802407SRich Burridge 933636802407SRich Burridge /* Decompressing a tar file using compression method from the file type */ 933736802407SRich Burridge void 933836802407SRich Burridge decompress_file(void) 933936802407SRich Burridge { 934036802407SRich Burridge pid_t pid; 934136802407SRich Burridge char *added_suffix; 934236802407SRich Burridge 934336802407SRich Burridge 934436802407SRich Burridge added_suffix = add_suffix(); 934536802407SRich Burridge if (added_suffix != NULL) { 934636802407SRich Burridge (void) rename(usefile, tfname); 934736802407SRich Burridge } 934836802407SRich Burridge if ((pid = fork()) == 0) { 934936802407SRich Burridge if (vflag) { 935036802407SRich Burridge (void) fprintf(vfile, 935136802407SRich Burridge gettext("Decompressing '%s' with " 935236802407SRich Burridge "'%s'...\n"), usefile, compress_opt); 935336802407SRich Burridge } 9354aa7166bdSMilan Jurik verify_compress_opt(compress_opt); 935536802407SRich Burridge (void) execlp(compress_opt, compress_opt, "-df", 935636802407SRich Burridge tfname, NULL); 935753329f75SRich Burridge vperror(1, gettext("Could not exec %s"), compress_opt); 935836802407SRich Burridge } else if (pid == -1) { 93598e4a71aeSRich Burridge vperror(1, gettext("Could not fork")); 936036802407SRich Burridge } 936136802407SRich Burridge wait_pid(pid); 936236802407SRich Burridge if (suffix != NULL) { 936336802407SRich Burridge /* restore the file name - original file was without suffix */ 936436802407SRich Burridge *(usefile + strlen(usefile) - strlen(suffix)) = '\0'; 936536802407SRich Burridge } 936636802407SRich Burridge } 936736802407SRich Burridge 936836802407SRich Burridge /* Set the archive for writing and then compress the archive */ 936936802407SRich Burridge pid_t 937036802407SRich Burridge compress_file(void) 937136802407SRich Burridge { 937236802407SRich Burridge int fd[2]; 937336802407SRich Burridge pid_t pid; 937436802407SRich Burridge 937536802407SRich Burridge if (vflag) { 937636802407SRich Burridge (void) fprintf(vfile, gettext("Compressing '%s' with " 937736802407SRich Burridge "'%s'...\n"), usefile, compress_opt); 937836802407SRich Burridge } 937936802407SRich Burridge 938036802407SRich Burridge if (pipe(fd) < 0) { 938136802407SRich Burridge vperror(1, gettext("Could not create pipe")); 938236802407SRich Burridge } 9383c536b1f9SRobert Mustacchi if ((pid = fork()) > 0) { 938436802407SRich Burridge mt = fd[1]; 938536802407SRich Burridge (void) close(fd[0]); 938636802407SRich Burridge return (pid); 938736802407SRich Burridge } 938836802407SRich Burridge /* child */ 938936802407SRich Burridge (void) dup2(fd[0], STDIN_FILENO); 939036802407SRich Burridge (void) close(fd[1]); 939136802407SRich Burridge (void) dup2(mt, STDOUT_FILENO); 9392aa7166bdSMilan Jurik verify_compress_opt(compress_opt); 939336802407SRich Burridge (void) execlp(compress_opt, compress_opt, NULL); 939453329f75SRich Burridge vperror(1, gettext("Could not exec %s"), compress_opt); 939536802407SRich Burridge return (0); /*NOTREACHED*/ 939636802407SRich Burridge } 939736802407SRich Burridge 939836802407SRich Burridge pid_t 939936802407SRich Burridge uncompress_file(void) 940036802407SRich Burridge { 940136802407SRich Burridge int fd[2]; 940236802407SRich Burridge pid_t pid; 940336802407SRich Burridge 940436802407SRich Burridge if (vflag) { 940536802407SRich Burridge (void) fprintf(vfile, gettext("Decompressing '%s' with " 940636802407SRich Burridge "'%s'...\n"), usefile, compress_opt); 940736802407SRich Burridge } 940836802407SRich Burridge 940936802407SRich Burridge if (pipe(fd) < 0) { 941036802407SRich Burridge vperror(1, gettext("Could not create pipe")); 941136802407SRich Burridge } 9412c536b1f9SRobert Mustacchi if ((pid = fork()) > 0) { 941336802407SRich Burridge mt = fd[0]; 941436802407SRich Burridge (void) close(fd[1]); 941536802407SRich Burridge return (pid); 941636802407SRich Burridge } 941736802407SRich Burridge /* child */ 941836802407SRich Burridge (void) dup2(fd[1], STDOUT_FILENO); 941936802407SRich Burridge (void) close(fd[0]); 942036802407SRich Burridge (void) dup2(mt, STDIN_FILENO); 9421aa7166bdSMilan Jurik verify_compress_opt(compress_opt); 942236802407SRich Burridge (void) execlp(compress_opt, compress_opt, NULL); 942353329f75SRich Burridge vperror(1, gettext("Could not exec %s"), compress_opt); 942436802407SRich Burridge return (0); /*NOTREACHED*/ 942536802407SRich Burridge } 942636802407SRich Burridge 9427506ea5b8SMilan Jurik /* Checking suffix validity */ 942836802407SRich Burridge char * 9429506ea5b8SMilan Jurik check_suffix(char **suf, int size) 943036802407SRich Burridge { 943136802407SRich Burridge int i; 943236802407SRich Burridge int slen; 943336802407SRich Burridge int nlen = strlen(usefile); 943436802407SRich Burridge 9435506ea5b8SMilan Jurik for (i = 0; i < size; i++) { 9436506ea5b8SMilan Jurik slen = strlen(suf[i]); 943736802407SRich Burridge if (nlen < slen) 943836802407SRich Burridge return (NULL); 9439506ea5b8SMilan Jurik if (strcmp(usefile + nlen - slen, suf[i]) == 0) 9440506ea5b8SMilan Jurik return (suf[i]); 944136802407SRich Burridge } 944236802407SRich Burridge return (NULL); 9443506ea5b8SMilan Jurik } 9444506ea5b8SMilan Jurik 9445506ea5b8SMilan Jurik /* Checking valid 'bzip2' suffix */ 9446506ea5b8SMilan Jurik char * 9447506ea5b8SMilan Jurik bz_suffix(void) 9448506ea5b8SMilan Jurik { 9449506ea5b8SMilan Jurik return (check_suffix(bsuffix, BSUF)); 945036802407SRich Burridge } 945136802407SRich Burridge 945236802407SRich Burridge /* Checking valid 'gzip' suffix */ 945336802407SRich Burridge char * 9454506ea5b8SMilan Jurik gz_suffix(void) 945536802407SRich Burridge { 9456506ea5b8SMilan Jurik return (check_suffix(gsuffix, GSUF)); 945736802407SRich Burridge } 9458506ea5b8SMilan Jurik 9459506ea5b8SMilan Jurik /* Checking valid 'xz' suffix */ 9460506ea5b8SMilan Jurik char * 9461506ea5b8SMilan Jurik xz_suffix(void) 9462506ea5b8SMilan Jurik { 9463506ea5b8SMilan Jurik return (check_suffix(xsuffix, XSUF)); 946436802407SRich Burridge } 946536802407SRich Burridge 946636802407SRich Burridge void * 946736802407SRich Burridge compress_malloc(size_t size) 946836802407SRich Burridge { 946936802407SRich Burridge void *opt; 947036802407SRich Burridge 947136802407SRich Burridge if ((opt = malloc(size)) == NULL) { 947236802407SRich Burridge vperror(1, "%s", 947336802407SRich Burridge gettext("Could not allocate compress buffer\n")); 947436802407SRich Burridge } 947536802407SRich Burridge return (opt); 947636802407SRich Burridge } 947736802407SRich Burridge 947836802407SRich Burridge void 947936802407SRich Burridge wait_pid(pid_t pid) 948036802407SRich Burridge { 948136802407SRich Burridge int status; 948236802407SRich Burridge 948336802407SRich Burridge while (waitpid(pid, &status, 0) == -1 && errno == EINTR) 948436802407SRich Burridge ; 948536802407SRich Burridge } 9486aa7166bdSMilan Jurik 9487aa7166bdSMilan Jurik static void 9488aa7166bdSMilan Jurik verify_compress_opt(const char *t) 9489aa7166bdSMilan Jurik { 9490aa7166bdSMilan Jurik struct stat statbuf; 9491aa7166bdSMilan Jurik 9492aa7166bdSMilan Jurik if (stat(t, &statbuf) == -1) 9493aa7166bdSMilan Jurik vperror(1, "%s %s: %s\n", gettext("Could not stat"), 9494aa7166bdSMilan Jurik t, strerror(errno)); 9495aa7166bdSMilan Jurik } 9496aa7166bdSMilan Jurik 9497aa7166bdSMilan Jurik static void 9498aa7166bdSMilan Jurik detect_compress(void) 9499aa7166bdSMilan Jurik { 9500aa7166bdSMilan Jurik char *zsuf[] = {".Z"}; 9501aa7166bdSMilan Jurik if (check_suffix(zsuf, 1) != NULL) { 9502aa7166bdSMilan Jurik Zflag = 1; 9503aa7166bdSMilan Jurik } else if (check_suffix(bsuffix, BSUF) != NULL) { 9504aa7166bdSMilan Jurik jflag = 1; 9505aa7166bdSMilan Jurik } else if (check_suffix(gsuffix, GSUF) != NULL) { 9506aa7166bdSMilan Jurik zflag = 1; 9507aa7166bdSMilan Jurik } else if (check_suffix(xsuffix, XSUF) != NULL) { 9508aa7166bdSMilan Jurik Jflag = 1; 9509aa7166bdSMilan Jurik } else { 9510aa7166bdSMilan Jurik vperror(1, "%s\n", gettext("No compression method detected")); 9511aa7166bdSMilan Jurik } 9512aa7166bdSMilan Jurik } 9513