17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 545916cd2Sjpk * Common Development and Distribution License (the "License"). 645916cd2Sjpk * You may not use this file except in compliance with the License. 77c478bd9Sstevel@tonic-gate * 87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 117c478bd9Sstevel@tonic-gate * and limitations under the License. 127c478bd9Sstevel@tonic-gate * 137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 187c478bd9Sstevel@tonic-gate * 197c478bd9Sstevel@tonic-gate * CDDL HEADER END 207c478bd9Sstevel@tonic-gate */ 217c478bd9Sstevel@tonic-gate /* 22257ece65SRalph Turner - Sun UK - Contractor * Copyright (c) 1988, 2010, Oracle and/or its affiliates. All rights reserved. 23506ea5b8SMilan Jurik * Copyright 2012 Milan Jurik. All rights reserved. 247c478bd9Sstevel@tonic-gate */ 257c478bd9Sstevel@tonic-gate 267c478bd9Sstevel@tonic-gate /* Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T */ 277c478bd9Sstevel@tonic-gate /* All Rights Reserved */ 287c478bd9Sstevel@tonic-gate 297c478bd9Sstevel@tonic-gate /* Copyright (c) 1987, 1988 Microsoft Corporation */ 307c478bd9Sstevel@tonic-gate /* All Rights Reserved */ 317c478bd9Sstevel@tonic-gate 327c478bd9Sstevel@tonic-gate /* 337c478bd9Sstevel@tonic-gate * Portions of this source code were derived from Berkeley 4.3 BSD 347c478bd9Sstevel@tonic-gate * under license from the Regents of the University of California. 357c478bd9Sstevel@tonic-gate */ 367c478bd9Sstevel@tonic-gate 377c478bd9Sstevel@tonic-gate #include <unistd.h> 387c478bd9Sstevel@tonic-gate #include <sys/types.h> 397c478bd9Sstevel@tonic-gate #include <sys/param.h> 407c478bd9Sstevel@tonic-gate #include <sys/stat.h> 417c478bd9Sstevel@tonic-gate #include <sys/mkdev.h> 427c478bd9Sstevel@tonic-gate #include <sys/wait.h> 437c478bd9Sstevel@tonic-gate #include <dirent.h> 447c478bd9Sstevel@tonic-gate #include <errno.h> 457c478bd9Sstevel@tonic-gate #include <stdio.h> 467c478bd9Sstevel@tonic-gate #include <signal.h> 477c478bd9Sstevel@tonic-gate #include <ctype.h> 487c478bd9Sstevel@tonic-gate #include <locale.h> 497c478bd9Sstevel@tonic-gate #include <nl_types.h> 507c478bd9Sstevel@tonic-gate #include <langinfo.h> 517c478bd9Sstevel@tonic-gate #include <pwd.h> 527c478bd9Sstevel@tonic-gate #include <grp.h> 537c478bd9Sstevel@tonic-gate #include <fcntl.h> 547c478bd9Sstevel@tonic-gate #include <string.h> 557c478bd9Sstevel@tonic-gate #include <malloc.h> 567c478bd9Sstevel@tonic-gate #include <time.h> 577c478bd9Sstevel@tonic-gate #include <utime.h> 587c478bd9Sstevel@tonic-gate #include <stdlib.h> 597c478bd9Sstevel@tonic-gate #include <stdarg.h> 607c478bd9Sstevel@tonic-gate #include <widec.h> 617c478bd9Sstevel@tonic-gate #include <sys/mtio.h> 627c478bd9Sstevel@tonic-gate #include <sys/acl.h> 637c478bd9Sstevel@tonic-gate #include <strings.h> 647c478bd9Sstevel@tonic-gate #include <deflt.h> 657c478bd9Sstevel@tonic-gate #include <limits.h> 667c478bd9Sstevel@tonic-gate #include <iconv.h> 677c478bd9Sstevel@tonic-gate #include <assert.h> 68da6c28aaSamw #include <libgen.h> 69da6c28aaSamw #include <libintl.h> 70fa9e4066Sahrens #include <aclutils.h> 71da6c28aaSamw #include <libnvpair.h> 72da6c28aaSamw #include <archives.h> 733d63ea05Sas145665 747c478bd9Sstevel@tonic-gate #if defined(__SunOS_5_6) || defined(__SunOS_5_7) 757c478bd9Sstevel@tonic-gate extern int defcntl(); 767c478bd9Sstevel@tonic-gate #endif 77da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 78da6c28aaSamw #include <attr.h> 79da6c28aaSamw #include <libcmdutils.h> 80da6c28aaSamw #endif 817c478bd9Sstevel@tonic-gate 8245916cd2Sjpk /* Trusted Extensions */ 8345916cd2Sjpk #include <zone.h> 8445916cd2Sjpk #include <tsol/label.h> 8545916cd2Sjpk #include <sys/tsol/label_macro.h> 8645916cd2Sjpk 87da6c28aaSamw #include "getresponse.h" 887c478bd9Sstevel@tonic-gate /* 897c478bd9Sstevel@tonic-gate * Source compatibility 907c478bd9Sstevel@tonic-gate */ 917c478bd9Sstevel@tonic-gate 927c478bd9Sstevel@tonic-gate /* 937c478bd9Sstevel@tonic-gate * These constants come from archives.h and sys/fcntl.h 947c478bd9Sstevel@tonic-gate * and were introduced by the extended attributes project 957c478bd9Sstevel@tonic-gate * in Solaris 9. 967c478bd9Sstevel@tonic-gate */ 977c478bd9Sstevel@tonic-gate #if !defined(O_XATTR) 987c478bd9Sstevel@tonic-gate #define AT_SYMLINK_NOFOLLOW 0x1000 997c478bd9Sstevel@tonic-gate #define AT_REMOVEDIR 0x1 1007c478bd9Sstevel@tonic-gate #define AT_FDCWD 0xffd19553 1017c478bd9Sstevel@tonic-gate #define _XATTR_HDRTYPE 'E' 1027c478bd9Sstevel@tonic-gate static int attropen(); 1037c478bd9Sstevel@tonic-gate static int fstatat(); 1047c478bd9Sstevel@tonic-gate static int renameat(); 1057c478bd9Sstevel@tonic-gate static int unlinkat(); 1067c478bd9Sstevel@tonic-gate static int openat(); 1077c478bd9Sstevel@tonic-gate static int fchownat(); 1087c478bd9Sstevel@tonic-gate static int futimesat(); 1097c478bd9Sstevel@tonic-gate #endif 1107c478bd9Sstevel@tonic-gate 1117c478bd9Sstevel@tonic-gate /* 1127c478bd9Sstevel@tonic-gate * Compiling with -D_XPG4_2 gets this but produces other problems, so 1137c478bd9Sstevel@tonic-gate * instead of including sys/time.h and compiling with -D_XPG4_2, I'm 1147c478bd9Sstevel@tonic-gate * explicitly doing the declaration here. 1157c478bd9Sstevel@tonic-gate */ 1167c478bd9Sstevel@tonic-gate int utimes(const char *path, const struct timeval timeval_ptr[]); 1177c478bd9Sstevel@tonic-gate 1187c478bd9Sstevel@tonic-gate #ifndef MINSIZE 1197c478bd9Sstevel@tonic-gate #define MINSIZE 250 1207c478bd9Sstevel@tonic-gate #endif 1217c478bd9Sstevel@tonic-gate #define DEF_FILE "/etc/default/tar" 1227c478bd9Sstevel@tonic-gate 1237c478bd9Sstevel@tonic-gate #define min(a, b) ((a) < (b) ? (a) : (b)) 1247c478bd9Sstevel@tonic-gate #define max(a, b) ((a) > (b) ? (a) : (b)) 1257c478bd9Sstevel@tonic-gate 1267c478bd9Sstevel@tonic-gate /* -DDEBUG ONLY for debugging */ 1277c478bd9Sstevel@tonic-gate #ifdef DEBUG 1287c478bd9Sstevel@tonic-gate #undef DEBUG 1297c478bd9Sstevel@tonic-gate #define DEBUG(a, b, c)\ 1307c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "DEBUG - "), (void) fprintf(stderr, a, b, c) 1317c478bd9Sstevel@tonic-gate #endif 1327c478bd9Sstevel@tonic-gate 1337c478bd9Sstevel@tonic-gate #define TBLOCK 512 /* tape block size--should be universal */ 1347c478bd9Sstevel@tonic-gate 1357c478bd9Sstevel@tonic-gate #ifdef BSIZE 1367c478bd9Sstevel@tonic-gate #define SYS_BLOCK BSIZE /* from sys/param.h: secondary block size */ 1377c478bd9Sstevel@tonic-gate #else /* BSIZE */ 1387c478bd9Sstevel@tonic-gate #define SYS_BLOCK 512 /* default if no BSIZE in param.h */ 1397c478bd9Sstevel@tonic-gate #endif /* BSIZE */ 1407c478bd9Sstevel@tonic-gate 1417c478bd9Sstevel@tonic-gate #define NBLOCK 20 1427c478bd9Sstevel@tonic-gate #define NAMSIZ 100 1437c478bd9Sstevel@tonic-gate #define PRESIZ 155 1447c478bd9Sstevel@tonic-gate #define MAXNAM 256 1457c478bd9Sstevel@tonic-gate #define MODEMASK 0777777 /* file creation mode mask */ 1467c478bd9Sstevel@tonic-gate #define POSIXMODES 07777 /* mask for POSIX mode bits */ 1477c478bd9Sstevel@tonic-gate #define MAXEXT 9 /* reasonable max # extents for a file */ 1487c478bd9Sstevel@tonic-gate #define EXTMIN 50 /* min blks left on floppy to split a file */ 1497c478bd9Sstevel@tonic-gate 1507c478bd9Sstevel@tonic-gate /* max value dblock.dbuf.efsize can store */ 1517c478bd9Sstevel@tonic-gate #define TAR_EFSIZE_MAX 0777777777 1527c478bd9Sstevel@tonic-gate 1537c478bd9Sstevel@tonic-gate /* 1547c478bd9Sstevel@tonic-gate * Symbols which specify the values at which the use of the 'E' function 1557c478bd9Sstevel@tonic-gate * modifier is required to properly store a file. 1567c478bd9Sstevel@tonic-gate * 1577c478bd9Sstevel@tonic-gate * TAR_OFFSET_MAX - the largest file size we can archive 1587c478bd9Sstevel@tonic-gate * OCTAL7CHAR - the limit for ustar gid, uid, dev 1597c478bd9Sstevel@tonic-gate */ 1607c478bd9Sstevel@tonic-gate 1617c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG 1627c478bd9Sstevel@tonic-gate /* tiny values which force the creation of extended header entries */ 1637c478bd9Sstevel@tonic-gate #define TAR_OFFSET_MAX 9 1647c478bd9Sstevel@tonic-gate #define OCTAL7CHAR 2 1657c478bd9Sstevel@tonic-gate #else 1667c478bd9Sstevel@tonic-gate /* normal values */ 167b7d62af5Sceastha #define TAR_OFFSET_MAX 077777777777ULL 1687c478bd9Sstevel@tonic-gate #define OCTAL7CHAR 07777777 1697c478bd9Sstevel@tonic-gate #endif 1707c478bd9Sstevel@tonic-gate 1717c478bd9Sstevel@tonic-gate #define TBLOCKS(bytes) (((bytes) + TBLOCK - 1) / TBLOCK) 1727c478bd9Sstevel@tonic-gate #define K(tblocks) ((tblocks+1)/2) /* tblocks to Kbytes for printing */ 1737c478bd9Sstevel@tonic-gate 1747c478bd9Sstevel@tonic-gate #define MAXLEV (PATH_MAX / 2) 1757c478bd9Sstevel@tonic-gate #define LEV0 1 1767c478bd9Sstevel@tonic-gate #define SYMLINK_LEV0 0 1777c478bd9Sstevel@tonic-gate 1787c478bd9Sstevel@tonic-gate #define TRUE 1 1797c478bd9Sstevel@tonic-gate #define FALSE 0 1807c478bd9Sstevel@tonic-gate 1817c478bd9Sstevel@tonic-gate #define XATTR_FILE 1 1827c478bd9Sstevel@tonic-gate #define NORMAL_FILE 0 1837c478bd9Sstevel@tonic-gate 1847c478bd9Sstevel@tonic-gate #define PUT_AS_LINK 1 1857c478bd9Sstevel@tonic-gate #define PUT_NOTAS_LINK 0 1867c478bd9Sstevel@tonic-gate 187da6c28aaSamw #ifndef VIEW_READONLY 188da6c28aaSamw #define VIEW_READONLY "SUNWattr_ro" 189da6c28aaSamw #endif 190da6c28aaSamw 191da6c28aaSamw #ifndef VIEW_READWRITE 192da6c28aaSamw #define VIEW_READWRITE "SUNWattr_rw" 193da6c28aaSamw #endif 194da6c28aaSamw 1957c478bd9Sstevel@tonic-gate #if _FILE_OFFSET_BITS == 64 1967c478bd9Sstevel@tonic-gate #define FMT_off_t "lld" 1977c478bd9Sstevel@tonic-gate #define FMT_off_t_o "llo" 1987c478bd9Sstevel@tonic-gate #define FMT_blkcnt_t "lld" 1997c478bd9Sstevel@tonic-gate #else 2007c478bd9Sstevel@tonic-gate #define FMT_off_t "ld" 2017c478bd9Sstevel@tonic-gate #define FMT_off_t_o "lo" 2027c478bd9Sstevel@tonic-gate #define FMT_blkcnt_t "ld" 2037c478bd9Sstevel@tonic-gate #endif 2047c478bd9Sstevel@tonic-gate 2057c478bd9Sstevel@tonic-gate /* ACL support */ 2067c478bd9Sstevel@tonic-gate 2077c478bd9Sstevel@tonic-gate static 2087c478bd9Sstevel@tonic-gate struct sec_attr { 2097c478bd9Sstevel@tonic-gate char attr_type; 2107c478bd9Sstevel@tonic-gate char attr_len[7]; 2117c478bd9Sstevel@tonic-gate char attr_info[1]; 2127c478bd9Sstevel@tonic-gate } *attr; 2137c478bd9Sstevel@tonic-gate 214da6c28aaSamw #if defined(O_XATTR) 215da6c28aaSamw typedef enum { 216da6c28aaSamw ATTR_OK, 217da6c28aaSamw ATTR_SKIP, 218da6c28aaSamw ATTR_CHDIR_ERR, 219da6c28aaSamw ATTR_OPEN_ERR, 220da6c28aaSamw ATTR_XATTR_ERR, 221da6c28aaSamw ATTR_SATTR_ERR 222da6c28aaSamw } attr_status_t; 223da6c28aaSamw #endif 224da6c28aaSamw 225da6c28aaSamw #if defined(O_XATTR) 226da6c28aaSamw typedef enum { 227da6c28aaSamw ARC_CREATE, 228da6c28aaSamw ARC_RESTORE 229da6c28aaSamw } arc_action_t; 230da6c28aaSamw #endif 231da6c28aaSamw 232da6c28aaSamw typedef struct attr_data { 233da6c28aaSamw char *attr_parent; 234da6c28aaSamw char *attr_path; 235da6c28aaSamw int attr_parentfd; 236da6c28aaSamw int attr_rw_sysattr; 237da6c28aaSamw } attr_data_t; 238da6c28aaSamw 2397c478bd9Sstevel@tonic-gate /* 2407c478bd9Sstevel@tonic-gate * 2417c478bd9Sstevel@tonic-gate * Tar has been changed to support extended attributes. 2427c478bd9Sstevel@tonic-gate * 2437c478bd9Sstevel@tonic-gate * As part of this change tar now uses the new *at() syscalls 2447c478bd9Sstevel@tonic-gate * such as openat, fchownat(), unlinkat()... 2457c478bd9Sstevel@tonic-gate * 2467c478bd9Sstevel@tonic-gate * This was done so that attributes can be handled with as few code changes 2477c478bd9Sstevel@tonic-gate * as possible. 2487c478bd9Sstevel@tonic-gate * 2497c478bd9Sstevel@tonic-gate * What this means is that tar now opens the directory that a file or directory 2507c478bd9Sstevel@tonic-gate * resides in and then performs *at() functions to manipulate the entry. 2517c478bd9Sstevel@tonic-gate * 2527c478bd9Sstevel@tonic-gate * For example a new file is now created like this: 2537c478bd9Sstevel@tonic-gate * 2547c478bd9Sstevel@tonic-gate * dfd = open(<some dir path>) 2557c478bd9Sstevel@tonic-gate * fd = openat(dfd, <name>,....); 2567c478bd9Sstevel@tonic-gate * 2577c478bd9Sstevel@tonic-gate * or in the case of an extended attribute 2587c478bd9Sstevel@tonic-gate * 2597c478bd9Sstevel@tonic-gate * dfd = attropen(<pathname>, ".", ....) 2607c478bd9Sstevel@tonic-gate * 2617c478bd9Sstevel@tonic-gate * Once we have a directory file descriptor all of the *at() functions can 2627c478bd9Sstevel@tonic-gate * be applied to it. 2637c478bd9Sstevel@tonic-gate * 2647c478bd9Sstevel@tonic-gate * unlinkat(dfd, <component name>,...) 2657c478bd9Sstevel@tonic-gate * fchownat(dfd, <component name>,..) 2667c478bd9Sstevel@tonic-gate * 2677c478bd9Sstevel@tonic-gate * This works for both normal namespace files and extended attribute file 2687c478bd9Sstevel@tonic-gate * 2697c478bd9Sstevel@tonic-gate */ 2707c478bd9Sstevel@tonic-gate 2717c478bd9Sstevel@tonic-gate /* 2727c478bd9Sstevel@tonic-gate * 2737c478bd9Sstevel@tonic-gate * Extended attribute Format 2747c478bd9Sstevel@tonic-gate * 2757c478bd9Sstevel@tonic-gate * Extended attributes are stored in two pieces. 2767c478bd9Sstevel@tonic-gate * 1. An attribute header which has information about 2777c478bd9Sstevel@tonic-gate * what file the attribute is for and what the attribute 2787c478bd9Sstevel@tonic-gate * is named. 2797c478bd9Sstevel@tonic-gate * 2. The attribute record itself. Stored as a normal file type 2807c478bd9Sstevel@tonic-gate * of entry. 2817c478bd9Sstevel@tonic-gate * Both the header and attribute record have special modes/typeflags 2827c478bd9Sstevel@tonic-gate * associated with them. 2837c478bd9Sstevel@tonic-gate * 2847c478bd9Sstevel@tonic-gate * The names of the header in the archive look like: 2857c478bd9Sstevel@tonic-gate * /dev/null/attr.hdr 2867c478bd9Sstevel@tonic-gate * 2877c478bd9Sstevel@tonic-gate * The name of the attribute looks like: 2887c478bd9Sstevel@tonic-gate * /dev/null/attr 2897c478bd9Sstevel@tonic-gate * 2907c478bd9Sstevel@tonic-gate * This is done so that an archiver that doesn't understand these formats 2917c478bd9Sstevel@tonic-gate * can just dispose of the attribute records. 2927c478bd9Sstevel@tonic-gate * 2937c478bd9Sstevel@tonic-gate * The format is composed of a fixed size header followed 2947c478bd9Sstevel@tonic-gate * by a variable sized xattr_buf. If the attribute is a hard link 2957c478bd9Sstevel@tonic-gate * to another attribute then another xattr_buf section is included 2967c478bd9Sstevel@tonic-gate * for the link. 2977c478bd9Sstevel@tonic-gate * 2987c478bd9Sstevel@tonic-gate * The xattr_buf is used to define the necessary "pathing" steps 2997c478bd9Sstevel@tonic-gate * to get to the extended attribute. This is necessary to support 3007c478bd9Sstevel@tonic-gate * a fully recursive attribute model where an attribute may itself 3017c478bd9Sstevel@tonic-gate * have an attribute. 3027c478bd9Sstevel@tonic-gate * 3037c478bd9Sstevel@tonic-gate * The basic layout looks like this. 3047c478bd9Sstevel@tonic-gate * 3057c478bd9Sstevel@tonic-gate * -------------------------------- 3067c478bd9Sstevel@tonic-gate * | | 3077c478bd9Sstevel@tonic-gate * | xattr_hdr | 3087c478bd9Sstevel@tonic-gate * | | 3097c478bd9Sstevel@tonic-gate * -------------------------------- 3107c478bd9Sstevel@tonic-gate * -------------------------------- 3117c478bd9Sstevel@tonic-gate * | | 3127c478bd9Sstevel@tonic-gate * | xattr_buf | 3137c478bd9Sstevel@tonic-gate * | | 3147c478bd9Sstevel@tonic-gate * -------------------------------- 3157c478bd9Sstevel@tonic-gate * -------------------------------- 3167c478bd9Sstevel@tonic-gate * | | 3177c478bd9Sstevel@tonic-gate * | (optional link info) | 3187c478bd9Sstevel@tonic-gate * | | 3197c478bd9Sstevel@tonic-gate * -------------------------------- 3207c478bd9Sstevel@tonic-gate * -------------------------------- 3217c478bd9Sstevel@tonic-gate * | | 3227c478bd9Sstevel@tonic-gate * | attribute itself | 3237c478bd9Sstevel@tonic-gate * | stored as normal tar | 3247c478bd9Sstevel@tonic-gate * | or cpio data with | 3257c478bd9Sstevel@tonic-gate * | special mode or | 3267c478bd9Sstevel@tonic-gate * | typeflag | 3277c478bd9Sstevel@tonic-gate * | | 3287c478bd9Sstevel@tonic-gate * -------------------------------- 3297c478bd9Sstevel@tonic-gate * 3307c478bd9Sstevel@tonic-gate */ 3317c478bd9Sstevel@tonic-gate 3327c478bd9Sstevel@tonic-gate /* 3337c478bd9Sstevel@tonic-gate * xattrhead is a pointer to the xattr_hdr 3347c478bd9Sstevel@tonic-gate * 3357c478bd9Sstevel@tonic-gate * xattrp is a pointer to the xattr_buf structure 3367c478bd9Sstevel@tonic-gate * which contains the "pathing" steps to get to attributes 3377c478bd9Sstevel@tonic-gate * 3387c478bd9Sstevel@tonic-gate * xattr_linkp is a pointer to another xattr_buf structure that is 3397c478bd9Sstevel@tonic-gate * only used when an attribute is actually linked to another attribute 3407c478bd9Sstevel@tonic-gate * 3417c478bd9Sstevel@tonic-gate */ 3427c478bd9Sstevel@tonic-gate 3437c478bd9Sstevel@tonic-gate static struct xattr_hdr *xattrhead; 3447c478bd9Sstevel@tonic-gate static struct xattr_buf *xattrp; 3457c478bd9Sstevel@tonic-gate static struct xattr_buf *xattr_linkp; /* pointer to link info, if any */ 346da6c28aaSamw static char *xattrapath; /* attribute name */ 3477c478bd9Sstevel@tonic-gate static char *xattr_linkaname; /* attribute attribute is linked to */ 3487c478bd9Sstevel@tonic-gate static char Hiddendir; /* are we processing hidden xattr dir */ 3497c478bd9Sstevel@tonic-gate static char xattrbadhead; 3507c478bd9Sstevel@tonic-gate 3517c478bd9Sstevel@tonic-gate /* Was statically allocated tbuf[NBLOCK] */ 3527c478bd9Sstevel@tonic-gate static 3537c478bd9Sstevel@tonic-gate union hblock { 3547c478bd9Sstevel@tonic-gate char dummy[TBLOCK]; 3557c478bd9Sstevel@tonic-gate struct header { 3567c478bd9Sstevel@tonic-gate char name[NAMSIZ]; /* If non-null prefix, path is */ 3577c478bd9Sstevel@tonic-gate /* <prefix>/<name>; otherwise */ 3587c478bd9Sstevel@tonic-gate /* <name> */ 3597c478bd9Sstevel@tonic-gate char mode[8]; 3607c478bd9Sstevel@tonic-gate char uid[8]; 3617c478bd9Sstevel@tonic-gate char gid[8]; 3627c478bd9Sstevel@tonic-gate char size[12]; /* size of this extent if file split */ 3637c478bd9Sstevel@tonic-gate char mtime[12]; 3647c478bd9Sstevel@tonic-gate char chksum[8]; 3657c478bd9Sstevel@tonic-gate char typeflag; 3667c478bd9Sstevel@tonic-gate char linkname[NAMSIZ]; 3677c478bd9Sstevel@tonic-gate char magic[6]; 3687c478bd9Sstevel@tonic-gate char version[2]; 3697c478bd9Sstevel@tonic-gate char uname[32]; 3707c478bd9Sstevel@tonic-gate char gname[32]; 3717c478bd9Sstevel@tonic-gate char devmajor[8]; 3727c478bd9Sstevel@tonic-gate char devminor[8]; 3737c478bd9Sstevel@tonic-gate char prefix[PRESIZ]; /* Together with "name", the path of */ 3747c478bd9Sstevel@tonic-gate /* the file: <prefix>/<name> */ 3757c478bd9Sstevel@tonic-gate char extno; /* extent #, null if not split */ 3767c478bd9Sstevel@tonic-gate char extotal; /* total extents */ 3777c478bd9Sstevel@tonic-gate char efsize[10]; /* size of entire file */ 3787c478bd9Sstevel@tonic-gate } dbuf; 3797c478bd9Sstevel@tonic-gate } dblock, *tbuf, xhdr_buf; 3807c478bd9Sstevel@tonic-gate 3817c478bd9Sstevel@tonic-gate static 3827c478bd9Sstevel@tonic-gate struct xtar_hdr { 3837c478bd9Sstevel@tonic-gate uid_t x_uid, /* Uid of file */ 3847c478bd9Sstevel@tonic-gate x_gid; /* Gid of file */ 3857c478bd9Sstevel@tonic-gate major_t x_devmajor; /* Device major node */ 3867c478bd9Sstevel@tonic-gate minor_t x_devminor; /* Device minor node */ 3877c478bd9Sstevel@tonic-gate off_t x_filesz; /* Length of file */ 3887c478bd9Sstevel@tonic-gate char *x_uname, /* Pointer to name of user */ 3897c478bd9Sstevel@tonic-gate *x_gname, /* Pointer to gid of user */ 3907c478bd9Sstevel@tonic-gate *x_linkpath, /* Path for a hard/symbolic link */ 3917c478bd9Sstevel@tonic-gate *x_path; /* Path of file */ 3927c478bd9Sstevel@tonic-gate timestruc_t x_mtime; /* Seconds and nanoseconds */ 3937c478bd9Sstevel@tonic-gate } Xtarhdr; 3947c478bd9Sstevel@tonic-gate 3957c478bd9Sstevel@tonic-gate static 3967c478bd9Sstevel@tonic-gate struct gen_hdr { 3977c478bd9Sstevel@tonic-gate ulong_t g_mode; /* Mode of file */ 3987c478bd9Sstevel@tonic-gate uid_t g_uid, /* Uid of file */ 3997c478bd9Sstevel@tonic-gate g_gid; /* Gid of file */ 4007c478bd9Sstevel@tonic-gate off_t g_filesz; /* Length of file */ 4017c478bd9Sstevel@tonic-gate time_t g_mtime; /* Modification time */ 4027c478bd9Sstevel@tonic-gate uint_t g_cksum; /* Checksum of file */ 4037c478bd9Sstevel@tonic-gate ulong_t g_devmajor, /* File system of file */ 4047c478bd9Sstevel@tonic-gate g_devminor; /* Major/minor of special files */ 4057c478bd9Sstevel@tonic-gate } Gen; 4067c478bd9Sstevel@tonic-gate 4077c478bd9Sstevel@tonic-gate static 4087c478bd9Sstevel@tonic-gate struct linkbuf { 4097c478bd9Sstevel@tonic-gate ino_t inum; 4107c478bd9Sstevel@tonic-gate dev_t devnum; 4117c478bd9Sstevel@tonic-gate int count; 4127c478bd9Sstevel@tonic-gate char pathname[MAXNAM+1]; /* added 1 for last NULL */ 4137c478bd9Sstevel@tonic-gate char attrname[MAXNAM+1]; 4147c478bd9Sstevel@tonic-gate struct linkbuf *nextp; 4157c478bd9Sstevel@tonic-gate } *ihead; 4167c478bd9Sstevel@tonic-gate 4177c478bd9Sstevel@tonic-gate /* see comments before build_table() */ 4187c478bd9Sstevel@tonic-gate #define TABLE_SIZE 512 4195e2174acSceastha typedef struct file_list { 4207c478bd9Sstevel@tonic-gate char *name; /* Name of file to {in,ex}clude */ 4217c478bd9Sstevel@tonic-gate struct file_list *next; /* Linked list */ 4225e2174acSceastha } file_list_t; 4235e2174acSceastha static file_list_t *exclude_tbl[TABLE_SIZE], 4247c478bd9Sstevel@tonic-gate *include_tbl[TABLE_SIZE]; 4257c478bd9Sstevel@tonic-gate 42645916cd2Sjpk static int append_secattr(char **, int *, int, char *, char); 4277c478bd9Sstevel@tonic-gate static void write_ancillary(union hblock *, char *, int, char); 4287c478bd9Sstevel@tonic-gate 4295e2174acSceastha static void add_file_to_table(file_list_t *table[], char *str); 4307c478bd9Sstevel@tonic-gate static void assert_string(char *s, char *msg); 4317c478bd9Sstevel@tonic-gate static int istape(int fd, int type); 4327c478bd9Sstevel@tonic-gate static void backtape(void); 4335e2174acSceastha static void build_table(file_list_t *table[], char *file); 434da6c28aaSamw static int check_prefix(char **namep, char **dirp, char **compp); 4357c478bd9Sstevel@tonic-gate static void closevol(void); 4367c478bd9Sstevel@tonic-gate static void copy(void *dst, void *src); 4377c478bd9Sstevel@tonic-gate static int convtoreg(off_t); 4382c0f0499Slovely static void delete_target(int fd, char *comp, char *namep); 4397c478bd9Sstevel@tonic-gate static void doDirTimes(char *name, timestruc_t modTime); 4407c478bd9Sstevel@tonic-gate static void done(int n); 4417c478bd9Sstevel@tonic-gate static void dorep(char *argv[]); 4427c478bd9Sstevel@tonic-gate static void dotable(char *argv[]); 4437c478bd9Sstevel@tonic-gate static void doxtract(char *argv[]); 444b25dbf38SRich Burridge static int tar_chdir(const char *path); 4453a1dab68SRich Burridge static int is_directory(char *name); 4461a431409SRich Burridge static int has_dot_dot(char *name); 4471a431409SRich Burridge static int is_absolute(char *name); 4481a431409SRich Burridge static char *make_relative_name(char *name, char **stripped_prefix); 4497c478bd9Sstevel@tonic-gate static void fatal(char *format, ...); 4507c478bd9Sstevel@tonic-gate static void vperror(int exit_status, char *fmt, ...); 4517c478bd9Sstevel@tonic-gate static void flushtape(void); 4527c478bd9Sstevel@tonic-gate static void getdir(void); 4537c478bd9Sstevel@tonic-gate static void *getmem(size_t); 4547c478bd9Sstevel@tonic-gate static void longt(struct stat *st, char aclchar); 455123523f8Sas158974 static void load_info_from_xtarhdr(u_longlong_t flag, struct xtar_hdr *xhdrp); 4567c478bd9Sstevel@tonic-gate static int makeDir(char *name); 4577c478bd9Sstevel@tonic-gate static void mterr(char *operation, int i, int exitcode); 4587c478bd9Sstevel@tonic-gate static void newvol(void); 4597c478bd9Sstevel@tonic-gate static void passtape(void); 4607c478bd9Sstevel@tonic-gate static void putempty(blkcnt_t n); 4617c478bd9Sstevel@tonic-gate static int putfile(char *longname, char *shortname, char *parent, 462da6c28aaSamw attr_data_t *attrinfo, int filetype, int lev, int symlink_lev); 4637c478bd9Sstevel@tonic-gate static void readtape(char *buffer); 4647c478bd9Sstevel@tonic-gate static void seekdisk(blkcnt_t blocks); 4657c478bd9Sstevel@tonic-gate static void setPathTimes(int dirfd, char *path, timestruc_t modTime); 466123523f8Sas158974 static void setbytes_to_skip(struct stat *st, int err); 4677c478bd9Sstevel@tonic-gate static void splitfile(char *longname, int ifd, char *name, 4687c478bd9Sstevel@tonic-gate char *prefix, int filetype); 4697c478bd9Sstevel@tonic-gate static void tomodes(struct stat *sp); 4707c478bd9Sstevel@tonic-gate static void usage(void); 471da6c28aaSamw static int xblocks(int issysattr, off_t bytes, int ofile); 472da6c28aaSamw static int xsfile(int issysattr, int ofd); 4737c478bd9Sstevel@tonic-gate static void resugname(int dirfd, char *name, int symflag); 4747c478bd9Sstevel@tonic-gate static int bcheck(char *bstr); 4757c478bd9Sstevel@tonic-gate static int checkdir(char *name); 4767c478bd9Sstevel@tonic-gate static int checksum(union hblock *dblockp); 4777c478bd9Sstevel@tonic-gate #ifdef EUC 4787c478bd9Sstevel@tonic-gate static int checksum_signed(union hblock *dblockp); 4797c478bd9Sstevel@tonic-gate #endif /* EUC */ 4807c478bd9Sstevel@tonic-gate static int checkupdate(char *arg); 4817c478bd9Sstevel@tonic-gate static int checkw(char c, char *name); 4827c478bd9Sstevel@tonic-gate static int cmp(char *b, char *s, int n); 4837c478bd9Sstevel@tonic-gate static int defset(char *arch); 4847c478bd9Sstevel@tonic-gate static int endtape(void); 4855e2174acSceastha static int is_in_table(file_list_t *table[], char *str); 4867c478bd9Sstevel@tonic-gate static int notsame(void); 4877c478bd9Sstevel@tonic-gate static int is_prefix(char *s1, char *s2); 4887c478bd9Sstevel@tonic-gate static int response(void); 4897c478bd9Sstevel@tonic-gate static int build_dblock(const char *, const char *, const char, 4907c478bd9Sstevel@tonic-gate const int filetype, const struct stat *, const dev_t, const char *); 4917c478bd9Sstevel@tonic-gate static unsigned int hash(char *str); 4927c478bd9Sstevel@tonic-gate 4937c478bd9Sstevel@tonic-gate static blkcnt_t kcheck(char *kstr); 4947c478bd9Sstevel@tonic-gate static off_t bsrch(char *s, int n, off_t l, off_t h); 4957c478bd9Sstevel@tonic-gate static void onintr(int sig); 4967c478bd9Sstevel@tonic-gate static void onquit(int sig); 4977c478bd9Sstevel@tonic-gate static void onhup(int sig); 4987c478bd9Sstevel@tonic-gate static uid_t getuidbyname(char *); 4997c478bd9Sstevel@tonic-gate static gid_t getgidbyname(char *); 5007c478bd9Sstevel@tonic-gate static char *getname(gid_t); 5017c478bd9Sstevel@tonic-gate static char *getgroup(gid_t); 5027c478bd9Sstevel@tonic-gate static int checkf(char *name, int mode, int howmuch); 5037c478bd9Sstevel@tonic-gate static int writetbuf(char *buffer, int n); 504da6c28aaSamw static int wantit(char *argv[], char **namep, char **dirp, char **comp, 505da6c28aaSamw attr_data_t **attrinfo); 50645916cd2Sjpk static void append_ext_attr(char *shortname, char **secinfo, int *len); 5077c478bd9Sstevel@tonic-gate static int get_xdata(void); 5087c478bd9Sstevel@tonic-gate static void gen_num(const char *keyword, const u_longlong_t number); 5097c478bd9Sstevel@tonic-gate static void gen_date(const char *keyword, const timestruc_t time_value); 5107c478bd9Sstevel@tonic-gate static void gen_string(const char *keyword, const char *value); 5117c478bd9Sstevel@tonic-gate static void get_xtime(char *value, timestruc_t *xtime); 5127c478bd9Sstevel@tonic-gate static int chk_path_build(char *name, char *longname, char *linkname, 5137c478bd9Sstevel@tonic-gate char *prefix, char type, int filetype); 5147c478bd9Sstevel@tonic-gate static int gen_utf8_names(const char *filename); 5157c478bd9Sstevel@tonic-gate static int utf8_local(char *option, char **Xhdr_ptrptr, char *target, 5167c478bd9Sstevel@tonic-gate const char *src, int max_val); 5177c478bd9Sstevel@tonic-gate static int local_utf8(char **Xhdr_ptrptr, char *target, const char *src, 5187c478bd9Sstevel@tonic-gate iconv_t iconv_cd, int xhdrflg, int max_val); 5197c478bd9Sstevel@tonic-gate static int c_utf8(char *target, const char *source); 520da6c28aaSamw static int getstat(int dirfd, char *longname, char *shortname, 521da6c28aaSamw char *attrparent); 522da6c28aaSamw static void xattrs_put(char *, char *, char *, char *); 5237c478bd9Sstevel@tonic-gate static void prepare_xattr(char **, char *, char *, 5247c478bd9Sstevel@tonic-gate char, struct linkbuf *, int *); 525da6c28aaSamw static int put_link(char *name, char *longname, char *component, 526da6c28aaSamw char *longattrname, char *prefix, int filetype, char typeflag); 5277c478bd9Sstevel@tonic-gate static int put_extra_attributes(char *longname, char *shortname, 528da6c28aaSamw char *longattrname, char *prefix, int filetype, char typeflag); 529da6c28aaSamw static int put_xattr_hdr(char *longname, char *shortname, char *longattrname, 530da6c28aaSamw char *prefix, int typeflag, int filetype, struct linkbuf *lp); 531da6c28aaSamw static int read_xattr_hdr(attr_data_t **attrinfo); 53245916cd2Sjpk 53345916cd2Sjpk /* Trusted Extensions */ 53445916cd2Sjpk #define AUTO_ZONE "/zone" 53545916cd2Sjpk 53645916cd2Sjpk static void extract_attr(char **file_ptr, struct sec_attr *); 53745916cd2Sjpk static int check_ext_attr(char *filename); 53845916cd2Sjpk static void rebuild_comp_path(char *str, char **namep); 53945916cd2Sjpk static int rebuild_lk_comp_path(char *str, char **namep); 54045916cd2Sjpk 5417c478bd9Sstevel@tonic-gate static void get_parent(char *path, char *dir); 5427c478bd9Sstevel@tonic-gate static char *get_component(char *path); 543da6c28aaSamw static int retry_open_attr(int pdirfd, int cwd, char *dirp, char *pattr, 544da6c28aaSamw char *name, int oflag, mode_t mode); 5457c478bd9Sstevel@tonic-gate static char *skipslashes(char *string, char *start); 5467c478bd9Sstevel@tonic-gate static void chop_endslashes(char *path); 54736802407SRich Burridge static pid_t compress_file(void); 54836802407SRich Burridge static void compress_back(void); 54936802407SRich Burridge static void decompress_file(void); 55036802407SRich Burridge static pid_t uncompress_file(void); 55136802407SRich Burridge static void *compress_malloc(size_t); 552506ea5b8SMilan Jurik static void check_compression(void); 553506ea5b8SMilan Jurik static char *bz_suffix(void); 554506ea5b8SMilan Jurik static char *gz_suffix(void); 555506ea5b8SMilan Jurik static char *xz_suffix(void); 55636802407SRich Burridge static char *add_suffix(); 55736802407SRich Burridge static void wait_pid(pid_t); 558*aa7166bdSMilan Jurik static void verify_compress_opt(const char *t); 559*aa7166bdSMilan Jurik static void detect_compress(void); 560fa9e4066Sahrens 5617c478bd9Sstevel@tonic-gate static struct stat stbuf; 5627c478bd9Sstevel@tonic-gate 563da6c28aaSamw static char *myname; 5647c478bd9Sstevel@tonic-gate static int checkflag = 0; 5657c478bd9Sstevel@tonic-gate static int Xflag, Fflag, iflag, hflag, Bflag, Iflag; 56636802407SRich Burridge static int rflag, xflag, vflag, tflag, mt, svmt, cflag, mflag, pflag; 5677c478bd9Sstevel@tonic-gate static int uflag; 568cc22b130SRich Burridge static int errflag; 5697c478bd9Sstevel@tonic-gate static int oflag; 570cc22b130SRich Burridge static int bflag, Aflag; 5717c478bd9Sstevel@tonic-gate static int Pflag; /* POSIX conformant archive */ 5727c478bd9Sstevel@tonic-gate static int Eflag; /* Allow files greater than 8GB */ 5737c478bd9Sstevel@tonic-gate static int atflag; /* traverse extended attributes */ 574da6c28aaSamw static int saflag; /* traverse extended sys attributes */ 5757c478bd9Sstevel@tonic-gate static int Dflag; /* Data change flag */ 57636802407SRich Burridge static int jflag; /* flag to use 'bzip2' */ 57736802407SRich Burridge static int zflag; /* flag to use 'gzip' */ 57836802407SRich Burridge static int Zflag; /* flag to use 'compress' */ 579506ea5b8SMilan Jurik static int Jflag; /* flag to use 'xz' */ 580*aa7166bdSMilan Jurik static int aflag; /* flag to use autocompression */ 58136802407SRich Burridge 58245916cd2Sjpk /* Trusted Extensions */ 58345916cd2Sjpk static int Tflag; /* Trusted Extensions attr flags */ 58445916cd2Sjpk static int dir_flag; /* for attribute extract */ 58545916cd2Sjpk static int mld_flag; /* for attribute extract */ 58645916cd2Sjpk static char *orig_namep; /* original namep - unadorned */ 58745916cd2Sjpk static int rpath_flag; /* MLD real path is rebuilt */ 58845916cd2Sjpk static char real_path[MAXPATHLEN]; /* MLD real path */ 58945916cd2Sjpk static int lk_rpath_flag; /* linked to real path is rebuilt */ 59045916cd2Sjpk static char lk_real_path[MAXPATHLEN]; /* linked real path */ 59145916cd2Sjpk static bslabel_t bs_label; /* for attribute extract */ 59245916cd2Sjpk static bslabel_t admin_low; 59345916cd2Sjpk static bslabel_t admin_high; 59445916cd2Sjpk static int ignored_aprivs = 0; 59545916cd2Sjpk static int ignored_fprivs = 0; 59645916cd2Sjpk static int ignored_fattrs = 0; 59745916cd2Sjpk 5987c478bd9Sstevel@tonic-gate static int term, chksum, wflag, 5997c478bd9Sstevel@tonic-gate first = TRUE, defaults_used = FALSE, linkerrok; 6007c478bd9Sstevel@tonic-gate static blkcnt_t recno; 6017c478bd9Sstevel@tonic-gate static int freemem = 1; 6027c478bd9Sstevel@tonic-gate static int nblock = NBLOCK; 6037c478bd9Sstevel@tonic-gate static int Errflg = 0; 6047c478bd9Sstevel@tonic-gate static int exitflag = 0; 6057c478bd9Sstevel@tonic-gate 6067c478bd9Sstevel@tonic-gate static dev_t mt_dev; /* device containing output file */ 6077c478bd9Sstevel@tonic-gate static ino_t mt_ino; /* inode number of output file */ 6087c478bd9Sstevel@tonic-gate static int mt_devtype; /* dev type of archive, from stat structure */ 6097c478bd9Sstevel@tonic-gate 6107c478bd9Sstevel@tonic-gate static int update = 1; /* for `open' call */ 6117c478bd9Sstevel@tonic-gate 6127c478bd9Sstevel@tonic-gate static off_t low; 6137c478bd9Sstevel@tonic-gate static off_t high; 6147c478bd9Sstevel@tonic-gate 6157c478bd9Sstevel@tonic-gate static FILE *tfile; 6167c478bd9Sstevel@tonic-gate static FILE *vfile = stdout; 61731a2de35SRich Burridge static char *tmpdir; 61831a2de35SRich Burridge static char *tmp_suffix = "/tarXXXXXX"; 61931a2de35SRich Burridge static char *tname; 6207c478bd9Sstevel@tonic-gate static char archive[] = "archive0="; 6217c478bd9Sstevel@tonic-gate static char *Xfile; 6227c478bd9Sstevel@tonic-gate static char *usefile; 62336802407SRich Burridge static char tfname[1024]; 6247c478bd9Sstevel@tonic-gate 6257c478bd9Sstevel@tonic-gate static int mulvol; /* multi-volume option selected */ 6267c478bd9Sstevel@tonic-gate static blkcnt_t blocklim; /* number of blocks to accept per volume */ 6277c478bd9Sstevel@tonic-gate static blkcnt_t tapepos; /* current block number to be written */ 6287c478bd9Sstevel@tonic-gate static int NotTape; /* true if tape is a disk */ 6297c478bd9Sstevel@tonic-gate static int dumping; /* true if writing a tape or other archive */ 6307c478bd9Sstevel@tonic-gate static int extno; /* number of extent: starts at 1 */ 6317c478bd9Sstevel@tonic-gate static int extotal; /* total extents in this file */ 6327c478bd9Sstevel@tonic-gate static off_t extsize; /* size of current extent during extraction */ 6337c478bd9Sstevel@tonic-gate static ushort_t Oumask = 0; /* old umask value */ 6347c478bd9Sstevel@tonic-gate static int is_posix; /* true if archive we're reading is POSIX-conformant */ 6357c478bd9Sstevel@tonic-gate static const char *magic_type = "ustar"; 6367c478bd9Sstevel@tonic-gate static size_t xrec_size = 8 * PATH_MAX; /* extended rec initial size */ 6377c478bd9Sstevel@tonic-gate static char *xrec_ptr; 6387c478bd9Sstevel@tonic-gate static off_t xrec_offset = 0; 6397c478bd9Sstevel@tonic-gate static int Xhdrflag; 6407c478bd9Sstevel@tonic-gate static int charset_type = 0; 6417c478bd9Sstevel@tonic-gate 6427c478bd9Sstevel@tonic-gate static u_longlong_t xhdr_flgs; /* Bits set determine which items */ 6437c478bd9Sstevel@tonic-gate /* need to be in extended header. */ 6447c478bd9Sstevel@tonic-gate #define _X_DEVMAJOR 0x1 6457c478bd9Sstevel@tonic-gate #define _X_DEVMINOR 0x2 6467c478bd9Sstevel@tonic-gate #define _X_GID 0x4 6477c478bd9Sstevel@tonic-gate #define _X_GNAME 0x8 6487c478bd9Sstevel@tonic-gate #define _X_LINKPATH 0x10 6497c478bd9Sstevel@tonic-gate #define _X_PATH 0x20 6507c478bd9Sstevel@tonic-gate #define _X_SIZE 0x40 6517c478bd9Sstevel@tonic-gate #define _X_UID 0x80 6527c478bd9Sstevel@tonic-gate #define _X_UNAME 0x100 6537c478bd9Sstevel@tonic-gate #define _X_ATIME 0x200 6547c478bd9Sstevel@tonic-gate #define _X_CTIME 0x400 6557c478bd9Sstevel@tonic-gate #define _X_MTIME 0x800 656123523f8Sas158974 #define _X_XHDR 0x1000 /* Bit flag that determines whether 'X' */ 657123523f8Sas158974 /* typeflag was followed by 'A' or non 'A' */ 658123523f8Sas158974 /* typeflag. */ 6597c478bd9Sstevel@tonic-gate #define _X_LAST 0x40000000 6607c478bd9Sstevel@tonic-gate 6617c478bd9Sstevel@tonic-gate #define PID_MAX_DIGITS (10 * sizeof (pid_t) / 4) 6627c478bd9Sstevel@tonic-gate #define TIME_MAX_DIGITS (10 * sizeof (time_t) / 4) 6637c478bd9Sstevel@tonic-gate #define LONG_MAX_DIGITS (10 * sizeof (long) / 4) 6647c478bd9Sstevel@tonic-gate #define ULONGLONG_MAX_DIGITS (10 * sizeof (u_longlong_t) / 4) 6657c478bd9Sstevel@tonic-gate /* 6667c478bd9Sstevel@tonic-gate * UTF_8 encoding requires more space than the current codeset equivalent. 6677c478bd9Sstevel@tonic-gate * Currently a factor of 2-3 would suffice, but it is possible for a factor 6687c478bd9Sstevel@tonic-gate * of 6 to be needed in the future, so for saftey, we use that here. 6697c478bd9Sstevel@tonic-gate */ 6707c478bd9Sstevel@tonic-gate #define UTF_8_FACTOR 6 6717c478bd9Sstevel@tonic-gate 6727c478bd9Sstevel@tonic-gate static u_longlong_t xhdr_count = 0; 6737c478bd9Sstevel@tonic-gate static char xhdr_dirname[PRESIZ + 1]; 6747c478bd9Sstevel@tonic-gate static char pidchars[PID_MAX_DIGITS + 1]; 6757c478bd9Sstevel@tonic-gate static char *tchar = ""; /* null linkpath */ 6767c478bd9Sstevel@tonic-gate 6777c478bd9Sstevel@tonic-gate static char local_path[UTF_8_FACTOR * PATH_MAX + 1]; 6787c478bd9Sstevel@tonic-gate static char local_linkpath[UTF_8_FACTOR * PATH_MAX + 1]; 6797c478bd9Sstevel@tonic-gate static char local_gname[UTF_8_FACTOR * _POSIX_NAME_MAX + 1]; 6807c478bd9Sstevel@tonic-gate static char local_uname[UTF_8_FACTOR * _POSIX_NAME_MAX + 1]; 6817c478bd9Sstevel@tonic-gate 6827c478bd9Sstevel@tonic-gate /* 6837c478bd9Sstevel@tonic-gate * The following mechanism is provided to allow us to debug tar in complicated 6847c478bd9Sstevel@tonic-gate * situations, like when it is part of a pipe. The idea is that you compile 68536802407SRich Burridge * with -DWAITAROUND defined, and then add the 'D' function modifier to the 68636802407SRich Burridge * target tar invocation, eg. "tar cDf tarfile file". If stderr is available, 6877c478bd9Sstevel@tonic-gate * it will tell you to which pid to attach the debugger; otherwise, use ps to 6887c478bd9Sstevel@tonic-gate * find it. Attach to the process from the debugger, and, *PRESTO*, you are 6897c478bd9Sstevel@tonic-gate * there! 6907c478bd9Sstevel@tonic-gate * 6917c478bd9Sstevel@tonic-gate * Simply assign "waitaround = 0" once you attach to the process, and then 6927c478bd9Sstevel@tonic-gate * proceed from there as usual. 6937c478bd9Sstevel@tonic-gate */ 6947c478bd9Sstevel@tonic-gate 6957c478bd9Sstevel@tonic-gate #ifdef WAITAROUND 6967c478bd9Sstevel@tonic-gate int waitaround = 0; /* wait for rendezvous with the debugger */ 6977c478bd9Sstevel@tonic-gate #endif 6987c478bd9Sstevel@tonic-gate 69936802407SRich Burridge #define BZIP "/usr/bin/bzip2" 70036802407SRich Burridge #define GZIP "/usr/bin/gzip" 70136802407SRich Burridge #define COMPRESS "/usr/bin/compress" 702506ea5b8SMilan Jurik #define XZ "/usr/bin/xz" 70336802407SRich Burridge #define BZCAT "/usr/bin/bzcat" 70436802407SRich Burridge #define GZCAT "/usr/bin/gzcat" 70536802407SRich Burridge #define ZCAT "/usr/bin/zcat" 706506ea5b8SMilan Jurik #define XZCAT "/usr/bin/xzcat" 707506ea5b8SMilan Jurik #define GSUF 8 /* number of valid 'gzip' sufixes */ 708506ea5b8SMilan Jurik #define BSUF 4 /* number of valid 'bzip2' sufixes */ 709506ea5b8SMilan Jurik #define XSUF 1 /* number of valid 'xz' suffixes */ 71036802407SRich Burridge 71136802407SRich Burridge static char *compress_opt; /* compression type */ 71236802407SRich Burridge 71336802407SRich Burridge static char *gsuffix[] = {".gz", "-gz", ".z", "-z", "_z", ".Z", 71436802407SRich Burridge ".tgz", ".taz"}; 71536802407SRich Burridge static char *bsuffix[] = {".bz2", ".bz", ".tbz2", ".tbz"}; 716506ea5b8SMilan Jurik static char *xsuffix[] = {".xz"}; 71736802407SRich Burridge static char *suffix; 71836802407SRich Burridge 7197c478bd9Sstevel@tonic-gate 7207c478bd9Sstevel@tonic-gate int 7217c478bd9Sstevel@tonic-gate main(int argc, char *argv[]) 7227c478bd9Sstevel@tonic-gate { 7237c478bd9Sstevel@tonic-gate char *cp; 7247c478bd9Sstevel@tonic-gate char *tmpdirp; 7257c478bd9Sstevel@tonic-gate pid_t thispid; 72636802407SRich Burridge pid_t pid; 72736802407SRich Burridge int wstat; 7287c478bd9Sstevel@tonic-gate 7297c478bd9Sstevel@tonic-gate (void) setlocale(LC_ALL, ""); 7307c478bd9Sstevel@tonic-gate #if !defined(TEXT_DOMAIN) /* Should be defined by cc -D */ 7317c478bd9Sstevel@tonic-gate #define TEXT_DOMAIN "SYS_TEST" /* Use this only if it weren't */ 7327c478bd9Sstevel@tonic-gate #endif 7337c478bd9Sstevel@tonic-gate (void) textdomain(TEXT_DOMAIN); 7347c478bd9Sstevel@tonic-gate if (argc < 2) 7357c478bd9Sstevel@tonic-gate usage(); 7367c478bd9Sstevel@tonic-gate 7377c478bd9Sstevel@tonic-gate tfile = NULL; 738da6c28aaSamw if ((myname = strdup(argv[0])) == NULL) { 739da6c28aaSamw (void) fprintf(stderr, gettext( 740da6c28aaSamw "tar: cannot allocate program name\n")); 741da6c28aaSamw exit(1); 742da6c28aaSamw } 7437c478bd9Sstevel@tonic-gate 7443d63ea05Sas145665 if (init_yes() < 0) { 7453d63ea05Sas145665 (void) fprintf(stderr, gettext(ERR_MSG_INIT_YES), 7463d63ea05Sas145665 strerror(errno)); 7473d63ea05Sas145665 exit(2); 7483d63ea05Sas145665 } 7493d63ea05Sas145665 7507c478bd9Sstevel@tonic-gate /* 7517c478bd9Sstevel@tonic-gate * For XPG4 compatibility, we must be able to accept the "--" 7527c478bd9Sstevel@tonic-gate * argument normally recognized by getopt; it is used to delimit 7537c478bd9Sstevel@tonic-gate * the end opt the options section, and so can only appear in 7547c478bd9Sstevel@tonic-gate * the position of the first argument. We simply skip it. 7557c478bd9Sstevel@tonic-gate */ 7567c478bd9Sstevel@tonic-gate 7577c478bd9Sstevel@tonic-gate if (strcmp(argv[1], "--") == 0) { 7587c478bd9Sstevel@tonic-gate argv++; 7597c478bd9Sstevel@tonic-gate argc--; 7607c478bd9Sstevel@tonic-gate if (argc < 3) 7617c478bd9Sstevel@tonic-gate usage(); 7627c478bd9Sstevel@tonic-gate } 7637c478bd9Sstevel@tonic-gate 7647c478bd9Sstevel@tonic-gate argv[argc] = NULL; 7657c478bd9Sstevel@tonic-gate argv++; 7667c478bd9Sstevel@tonic-gate 7677c478bd9Sstevel@tonic-gate /* 7687c478bd9Sstevel@tonic-gate * Set up default values. 7697c478bd9Sstevel@tonic-gate * Search the operand string looking for the first digit or an 'f'. 7707c478bd9Sstevel@tonic-gate * If you find a digit, use the 'archive#' entry in DEF_FILE. 7717c478bd9Sstevel@tonic-gate * If 'f' is given, bypass looking in DEF_FILE altogether. 7727c478bd9Sstevel@tonic-gate * If no digit or 'f' is given, still look in DEF_FILE but use '0'. 7737c478bd9Sstevel@tonic-gate */ 7747c478bd9Sstevel@tonic-gate if ((usefile = getenv("TAPE")) == (char *)NULL) { 7757c478bd9Sstevel@tonic-gate for (cp = *argv; *cp; ++cp) 7767c478bd9Sstevel@tonic-gate if (isdigit(*cp) || *cp == 'f') 7777c478bd9Sstevel@tonic-gate break; 7787c478bd9Sstevel@tonic-gate if (*cp != 'f') { 7797c478bd9Sstevel@tonic-gate archive[7] = (*cp)? *cp: '0'; 7807c478bd9Sstevel@tonic-gate if (!(defaults_used = defset(archive))) { 7817c478bd9Sstevel@tonic-gate usefile = NULL; 7827c478bd9Sstevel@tonic-gate nblock = 1; 7837c478bd9Sstevel@tonic-gate blocklim = 0; 7847c478bd9Sstevel@tonic-gate NotTape = 0; 7857c478bd9Sstevel@tonic-gate } 7867c478bd9Sstevel@tonic-gate } 7877c478bd9Sstevel@tonic-gate } 7887c478bd9Sstevel@tonic-gate 7897c478bd9Sstevel@tonic-gate for (cp = *argv++; *cp; cp++) 7907c478bd9Sstevel@tonic-gate switch (*cp) { 7917c478bd9Sstevel@tonic-gate #ifdef WAITAROUND 79236802407SRich Burridge case 'D': 7937c478bd9Sstevel@tonic-gate /* rendezvous with the debugger */ 7947c478bd9Sstevel@tonic-gate waitaround = 1; 7957c478bd9Sstevel@tonic-gate break; 7967c478bd9Sstevel@tonic-gate #endif 7977c478bd9Sstevel@tonic-gate case 'f': 7987c478bd9Sstevel@tonic-gate assert_string(*argv, gettext( 7997c478bd9Sstevel@tonic-gate "tar: tarfile must be specified with 'f' " 8007c478bd9Sstevel@tonic-gate "function modifier\n")); 8017c478bd9Sstevel@tonic-gate usefile = *argv++; 8027c478bd9Sstevel@tonic-gate break; 8037c478bd9Sstevel@tonic-gate case 'F': 8047c478bd9Sstevel@tonic-gate Fflag++; 8057c478bd9Sstevel@tonic-gate break; 8067c478bd9Sstevel@tonic-gate case 'c': 8077c478bd9Sstevel@tonic-gate cflag++; 8087c478bd9Sstevel@tonic-gate rflag++; 8097c478bd9Sstevel@tonic-gate update = 1; 8107c478bd9Sstevel@tonic-gate break; 8117c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 8127c478bd9Sstevel@tonic-gate case '@': 8137c478bd9Sstevel@tonic-gate atflag++; 8147c478bd9Sstevel@tonic-gate break; 815da6c28aaSamw #endif /* O_XATTR */ 816da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 817da6c28aaSamw case '/': 818da6c28aaSamw saflag++; 819da6c28aaSamw break; 820da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 8217c478bd9Sstevel@tonic-gate case 'u': 8227c478bd9Sstevel@tonic-gate uflag++; /* moved code after signals caught */ 8237c478bd9Sstevel@tonic-gate rflag++; 8247c478bd9Sstevel@tonic-gate update = 2; 8257c478bd9Sstevel@tonic-gate break; 8267c478bd9Sstevel@tonic-gate case 'r': 8277c478bd9Sstevel@tonic-gate rflag++; 8287c478bd9Sstevel@tonic-gate update = 2; 8297c478bd9Sstevel@tonic-gate break; 8307c478bd9Sstevel@tonic-gate case 'v': 8317c478bd9Sstevel@tonic-gate vflag++; 8327c478bd9Sstevel@tonic-gate break; 8337c478bd9Sstevel@tonic-gate case 'w': 8347c478bd9Sstevel@tonic-gate wflag++; 8357c478bd9Sstevel@tonic-gate break; 8367c478bd9Sstevel@tonic-gate case 'x': 8377c478bd9Sstevel@tonic-gate xflag++; 8387c478bd9Sstevel@tonic-gate break; 8397c478bd9Sstevel@tonic-gate case 'X': 8407c478bd9Sstevel@tonic-gate assert_string(*argv, gettext( 8417c478bd9Sstevel@tonic-gate "tar: exclude file must be specified with 'X' " 8427c478bd9Sstevel@tonic-gate "function modifier\n")); 8437c478bd9Sstevel@tonic-gate Xflag = 1; 8447c478bd9Sstevel@tonic-gate Xfile = *argv++; 8457c478bd9Sstevel@tonic-gate build_table(exclude_tbl, Xfile); 8467c478bd9Sstevel@tonic-gate break; 8477c478bd9Sstevel@tonic-gate case 't': 8487c478bd9Sstevel@tonic-gate tflag++; 8497c478bd9Sstevel@tonic-gate break; 8507c478bd9Sstevel@tonic-gate case 'm': 8517c478bd9Sstevel@tonic-gate mflag++; 8527c478bd9Sstevel@tonic-gate break; 8537c478bd9Sstevel@tonic-gate case 'p': 8547c478bd9Sstevel@tonic-gate pflag++; 8557c478bd9Sstevel@tonic-gate break; 8567c478bd9Sstevel@tonic-gate case 'D': 8577c478bd9Sstevel@tonic-gate Dflag++; 8587c478bd9Sstevel@tonic-gate break; 8597c478bd9Sstevel@tonic-gate case '-': 8607c478bd9Sstevel@tonic-gate /* ignore this silently */ 8617c478bd9Sstevel@tonic-gate break; 8627c478bd9Sstevel@tonic-gate case '0': /* numeric entries used only for defaults */ 8637c478bd9Sstevel@tonic-gate case '1': 8647c478bd9Sstevel@tonic-gate case '2': 8657c478bd9Sstevel@tonic-gate case '3': 8667c478bd9Sstevel@tonic-gate case '4': 8677c478bd9Sstevel@tonic-gate case '5': 8687c478bd9Sstevel@tonic-gate case '6': 8697c478bd9Sstevel@tonic-gate case '7': 8707c478bd9Sstevel@tonic-gate break; 8717c478bd9Sstevel@tonic-gate case 'b': 8727c478bd9Sstevel@tonic-gate assert_string(*argv, gettext( 8737c478bd9Sstevel@tonic-gate "tar: blocking factor must be specified " 8747c478bd9Sstevel@tonic-gate "with 'b' function modifier\n")); 8757c478bd9Sstevel@tonic-gate bflag++; 8767c478bd9Sstevel@tonic-gate nblock = bcheck(*argv++); 8777c478bd9Sstevel@tonic-gate break; 8787c478bd9Sstevel@tonic-gate case 'n': /* not a magtape (instead of 'k') */ 8797c478bd9Sstevel@tonic-gate NotTape++; /* assume non-magtape */ 8807c478bd9Sstevel@tonic-gate break; 8817c478bd9Sstevel@tonic-gate case 'l': 8827c478bd9Sstevel@tonic-gate linkerrok++; 8837c478bd9Sstevel@tonic-gate break; 8847c478bd9Sstevel@tonic-gate case 'e': 8857c478bd9Sstevel@tonic-gate errflag++; 8867c478bd9Sstevel@tonic-gate case 'o': 8877c478bd9Sstevel@tonic-gate oflag++; 8887c478bd9Sstevel@tonic-gate break; 8897c478bd9Sstevel@tonic-gate case 'h': 8907c478bd9Sstevel@tonic-gate hflag++; 8917c478bd9Sstevel@tonic-gate break; 8927c478bd9Sstevel@tonic-gate case 'i': 8937c478bd9Sstevel@tonic-gate iflag++; 8947c478bd9Sstevel@tonic-gate break; 8957c478bd9Sstevel@tonic-gate case 'B': 8967c478bd9Sstevel@tonic-gate Bflag++; 8977c478bd9Sstevel@tonic-gate break; 8987c478bd9Sstevel@tonic-gate case 'P': 8997c478bd9Sstevel@tonic-gate Pflag++; 9007c478bd9Sstevel@tonic-gate break; 9017c478bd9Sstevel@tonic-gate case 'E': 9027c478bd9Sstevel@tonic-gate Eflag++; 9037c478bd9Sstevel@tonic-gate Pflag++; /* Only POSIX archive made */ 9047c478bd9Sstevel@tonic-gate break; 90545916cd2Sjpk case 'T': 90645916cd2Sjpk Tflag++; /* Handle Trusted Extensions attrs */ 90745916cd2Sjpk pflag++; /* also set flag for ACL */ 90845916cd2Sjpk break; 90936802407SRich Burridge case 'j': /* compession "bzip2" */ 910506ea5b8SMilan Jurik jflag = 1; 91136802407SRich Burridge break; 91236802407SRich Burridge case 'z': /* compression "gzip" */ 913506ea5b8SMilan Jurik zflag = 1; 91436802407SRich Burridge break; 91536802407SRich Burridge case 'Z': /* compression "compress" */ 916506ea5b8SMilan Jurik Zflag = 1; 917506ea5b8SMilan Jurik break; 918506ea5b8SMilan Jurik case 'J': /* compression "xz" */ 919506ea5b8SMilan Jurik Jflag = 1; 92036802407SRich Burridge break; 921*aa7166bdSMilan Jurik case 'a': 922*aa7166bdSMilan Jurik aflag = 1; /* autocompression */ 923*aa7166bdSMilan Jurik break; 9247c478bd9Sstevel@tonic-gate default: 9257c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 9267c478bd9Sstevel@tonic-gate "tar: %c: unknown function modifier\n"), *cp); 9277c478bd9Sstevel@tonic-gate usage(); 9287c478bd9Sstevel@tonic-gate } 9297c478bd9Sstevel@tonic-gate 9307c478bd9Sstevel@tonic-gate if (!rflag && !xflag && !tflag) 9317c478bd9Sstevel@tonic-gate usage(); 9327c478bd9Sstevel@tonic-gate if ((rflag && xflag) || (xflag && tflag) || (rflag && tflag)) { 9337c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 9347c478bd9Sstevel@tonic-gate "tar: specify only one of [ctxru].\n")); 9357c478bd9Sstevel@tonic-gate usage(); 9367c478bd9Sstevel@tonic-gate } 93736802407SRich Burridge if (cflag) { 938*aa7166bdSMilan Jurik if ((jflag + zflag + Zflag + Jflag + aflag) > 1) { 93936802407SRich Burridge (void) fprintf(stderr, gettext( 940*aa7166bdSMilan Jurik "tar: specify only one of [ajJzZ] to " 94136802407SRich Burridge "create a compressed file.\n")); 94236802407SRich Burridge usage(); 94336802407SRich Burridge } 94436802407SRich Burridge } 94545916cd2Sjpk /* Trusted Extensions attribute handling */ 94645916cd2Sjpk if (Tflag && ((getzoneid() != GLOBAL_ZONEID) || 94745916cd2Sjpk !is_system_labeled())) { 94845916cd2Sjpk (void) fprintf(stderr, gettext( 94945916cd2Sjpk "tar: the 'T' option is only available with " 95045916cd2Sjpk "Trusted Extensions\nand must be run from " 95145916cd2Sjpk "the global zone.\n")); 95245916cd2Sjpk usage(); 95345916cd2Sjpk } 954cc22b130SRich Burridge if (cflag && *argv == NULL) 9557c478bd9Sstevel@tonic-gate fatal(gettext("Missing filenames")); 9567c478bd9Sstevel@tonic-gate if (usefile == NULL) 9577c478bd9Sstevel@tonic-gate fatal(gettext("device argument required")); 9587c478bd9Sstevel@tonic-gate 9597c478bd9Sstevel@tonic-gate /* alloc a buffer of the right size */ 9607c478bd9Sstevel@tonic-gate if ((tbuf = (union hblock *) 9617c478bd9Sstevel@tonic-gate calloc(sizeof (union hblock) * nblock, sizeof (char))) == 9627c478bd9Sstevel@tonic-gate (union hblock *)NULL) { 9637c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 9647c478bd9Sstevel@tonic-gate "tar: cannot allocate physio buffer\n")); 9657c478bd9Sstevel@tonic-gate exit(1); 9667c478bd9Sstevel@tonic-gate } 9677c478bd9Sstevel@tonic-gate 9687c478bd9Sstevel@tonic-gate if ((xrec_ptr = malloc(xrec_size)) == NULL) { 9697c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 9707c478bd9Sstevel@tonic-gate "tar: cannot allocate extended header buffer\n")); 9717c478bd9Sstevel@tonic-gate exit(1); 9727c478bd9Sstevel@tonic-gate } 9737c478bd9Sstevel@tonic-gate 9747c478bd9Sstevel@tonic-gate #ifdef WAITAROUND 9757c478bd9Sstevel@tonic-gate if (waitaround) { 9767c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("Rendezvous with tar on pid" 9777c478bd9Sstevel@tonic-gate " %d\n"), getpid()); 9787c478bd9Sstevel@tonic-gate 9797c478bd9Sstevel@tonic-gate while (waitaround) { 9807c478bd9Sstevel@tonic-gate (void) sleep(10); 9817c478bd9Sstevel@tonic-gate } 9827c478bd9Sstevel@tonic-gate } 9837c478bd9Sstevel@tonic-gate #endif 9847c478bd9Sstevel@tonic-gate 9857c478bd9Sstevel@tonic-gate thispid = getpid(); 9867c478bd9Sstevel@tonic-gate (void) sprintf(pidchars, "%ld", thispid); 9877c478bd9Sstevel@tonic-gate thispid = strlen(pidchars); 9887c478bd9Sstevel@tonic-gate 9897c478bd9Sstevel@tonic-gate if ((tmpdirp = getenv("TMPDIR")) == (char *)NULL) 9907c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_dirname, "/tmp"); 9917c478bd9Sstevel@tonic-gate else { 9927c478bd9Sstevel@tonic-gate /* 9937c478bd9Sstevel@tonic-gate * Make sure that dir is no longer than what can 9947c478bd9Sstevel@tonic-gate * fit in the prefix part of the header. 9957c478bd9Sstevel@tonic-gate */ 9967c478bd9Sstevel@tonic-gate if (strlen(tmpdirp) > (size_t)(PRESIZ - thispid - 12)) { 9977c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_dirname, "/tmp"); 9987c478bd9Sstevel@tonic-gate if ((vflag > 0) && (Eflag > 0)) 9997c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 10007c478bd9Sstevel@tonic-gate "Ignoring TMPDIR\n")); 10017c478bd9Sstevel@tonic-gate } else 10027c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_dirname, tmpdirp); 10037c478bd9Sstevel@tonic-gate } 10047c478bd9Sstevel@tonic-gate (void) strcat(xhdr_dirname, "/PaxHeaders."); 10057c478bd9Sstevel@tonic-gate (void) strcat(xhdr_dirname, pidchars); 10067c478bd9Sstevel@tonic-gate 10077c478bd9Sstevel@tonic-gate if (rflag) { 100836802407SRich Burridge if (cflag && usefile != NULL) { 100936802407SRich Burridge /* Set the compression type */ 1010*aa7166bdSMilan Jurik if (aflag) 1011*aa7166bdSMilan Jurik detect_compress(); 1012*aa7166bdSMilan Jurik 101336802407SRich Burridge if (jflag) { 101436802407SRich Burridge compress_opt = compress_malloc(strlen(BZIP) 101536802407SRich Burridge + 1); 101636802407SRich Burridge (void) strcpy(compress_opt, BZIP); 101736802407SRich Burridge } else if (zflag) { 101836802407SRich Burridge compress_opt = compress_malloc(strlen(GZIP) 101936802407SRich Burridge + 1); 102036802407SRich Burridge (void) strcpy(compress_opt, GZIP); 102136802407SRich Burridge } else if (Zflag) { 102236802407SRich Burridge compress_opt = 102336802407SRich Burridge compress_malloc(strlen(COMPRESS) + 1); 102436802407SRich Burridge (void) strcpy(compress_opt, COMPRESS); 1025506ea5b8SMilan Jurik } else if (Jflag) { 1026506ea5b8SMilan Jurik compress_opt = compress_malloc(strlen(XZ) + 1); 1027506ea5b8SMilan Jurik (void) strcpy(compress_opt, XZ); 102836802407SRich Burridge } 102936802407SRich Burridge } else { 103036802407SRich Burridge /* 103136802407SRich Burridge * Decompress if the file is compressed for 103236802407SRich Burridge * an update or replace. 103336802407SRich Burridge */ 103436802407SRich Burridge if (strcmp(usefile, "-") != 0) { 103536802407SRich Burridge check_compression(); 103636802407SRich Burridge if (compress_opt != NULL) { 103736802407SRich Burridge decompress_file(); 103836802407SRich Burridge } 103936802407SRich Burridge } 104036802407SRich Burridge } 104136802407SRich Burridge 10427c478bd9Sstevel@tonic-gate if (cflag && tfile != NULL) 10437c478bd9Sstevel@tonic-gate usage(); 10447c478bd9Sstevel@tonic-gate if (signal(SIGINT, SIG_IGN) != SIG_IGN) 10457c478bd9Sstevel@tonic-gate (void) signal(SIGINT, onintr); 10467c478bd9Sstevel@tonic-gate if (signal(SIGHUP, SIG_IGN) != SIG_IGN) 10477c478bd9Sstevel@tonic-gate (void) signal(SIGHUP, onhup); 10487c478bd9Sstevel@tonic-gate if (signal(SIGQUIT, SIG_IGN) != SIG_IGN) 10497c478bd9Sstevel@tonic-gate (void) signal(SIGQUIT, onquit); 10507c478bd9Sstevel@tonic-gate if (uflag) { 10517c478bd9Sstevel@tonic-gate int tnum; 105231a2de35SRich Burridge struct stat sbuf; 105331a2de35SRich Burridge 105431a2de35SRich Burridge tmpdir = getenv("TMPDIR"); 105531a2de35SRich Burridge /* 105631a2de35SRich Burridge * If the name is invalid or this isn't a directory, 105731a2de35SRich Burridge * or the directory is not writable, then reset to 105831a2de35SRich Burridge * a default temporary directory. 105931a2de35SRich Burridge */ 106031a2de35SRich Burridge if (tmpdir == NULL || *tmpdir == '\0' || 106131a2de35SRich Burridge (strlen(tmpdir) + strlen(tmp_suffix)) > PATH_MAX) { 106231a2de35SRich Burridge tmpdir = "/tmp"; 106331a2de35SRich Burridge } else if (stat(tmpdir, &sbuf) < 0 || 106431a2de35SRich Burridge (sbuf.st_mode & S_IFMT) != S_IFDIR || 106531a2de35SRich Burridge (sbuf.st_mode & S_IWRITE) == 0) { 106631a2de35SRich Burridge tmpdir = "/tmp"; 106731a2de35SRich Burridge } 106831a2de35SRich Burridge 106931a2de35SRich Burridge if ((tname = calloc(1, strlen(tmpdir) + 107031a2de35SRich Burridge strlen(tmp_suffix) + 1)) == NULL) { 107131a2de35SRich Burridge vperror(1, gettext("tar: out of memory, " 107231a2de35SRich Burridge "cannot create temporary file\n")); 107331a2de35SRich Burridge } 107431a2de35SRich Burridge (void) strcpy(tname, tmpdir); 107531a2de35SRich Burridge (void) strcat(tname, tmp_suffix); 107631a2de35SRich Burridge 10777c478bd9Sstevel@tonic-gate if ((tnum = mkstemp(tname)) == -1) 10787c478bd9Sstevel@tonic-gate vperror(1, "%s", tname); 10797c478bd9Sstevel@tonic-gate if ((tfile = fdopen(tnum, "w")) == NULL) 10807c478bd9Sstevel@tonic-gate vperror(1, "%s", tname); 10817c478bd9Sstevel@tonic-gate } 10827c478bd9Sstevel@tonic-gate if (strcmp(usefile, "-") == 0) { 10837c478bd9Sstevel@tonic-gate if (cflag == 0) 10847c478bd9Sstevel@tonic-gate fatal(gettext( 10857c478bd9Sstevel@tonic-gate "can only create standard output archives.")); 10867c478bd9Sstevel@tonic-gate vfile = stderr; 10877c478bd9Sstevel@tonic-gate mt = dup(1); 10887c478bd9Sstevel@tonic-gate ++bflag; 10897c478bd9Sstevel@tonic-gate } else { 10907c478bd9Sstevel@tonic-gate if (cflag) 10917c478bd9Sstevel@tonic-gate mt = open(usefile, 10927c478bd9Sstevel@tonic-gate O_RDWR|O_CREAT|O_TRUNC, 0666); 10937c478bd9Sstevel@tonic-gate else 10947c478bd9Sstevel@tonic-gate mt = open(usefile, O_RDWR); 10957c478bd9Sstevel@tonic-gate 10967c478bd9Sstevel@tonic-gate if (mt < 0) { 10977c478bd9Sstevel@tonic-gate if (cflag == 0 || (mt = creat(usefile, 0666)) 10987c478bd9Sstevel@tonic-gate < 0) 10997c478bd9Sstevel@tonic-gate vperror(1, "%s", usefile); 11007c478bd9Sstevel@tonic-gate } 11017c478bd9Sstevel@tonic-gate } 11027c478bd9Sstevel@tonic-gate /* Get inode and device number of output file */ 11037c478bd9Sstevel@tonic-gate (void) fstat(mt, &stbuf); 11047c478bd9Sstevel@tonic-gate mt_ino = stbuf.st_ino; 11057c478bd9Sstevel@tonic-gate mt_dev = stbuf.st_dev; 11067c478bd9Sstevel@tonic-gate mt_devtype = stbuf.st_mode & S_IFMT; 11077c478bd9Sstevel@tonic-gate NotTape = !istape(mt, mt_devtype); 11087c478bd9Sstevel@tonic-gate 11097c478bd9Sstevel@tonic-gate if (rflag && !cflag && (mt_devtype == S_IFIFO)) 11107c478bd9Sstevel@tonic-gate fatal(gettext("cannot append to pipe or FIFO.")); 11117c478bd9Sstevel@tonic-gate 11127c478bd9Sstevel@tonic-gate if (Aflag && vflag) 11137c478bd9Sstevel@tonic-gate (void) printf( 11147c478bd9Sstevel@tonic-gate gettext("Suppressing absolute pathnames\n")); 111536802407SRich Burridge if (cflag && compress_opt != NULL) { 111636802407SRich Burridge pid = compress_file(); 111736802407SRich Burridge wait_pid(pid); 111836802407SRich Burridge } 11197c478bd9Sstevel@tonic-gate dorep(argv); 112036802407SRich Burridge if (rflag && !cflag && (compress_opt != NULL)) 112136802407SRich Burridge compress_back(); 11227c478bd9Sstevel@tonic-gate } else if (xflag || tflag) { 11237c478bd9Sstevel@tonic-gate /* 11247c478bd9Sstevel@tonic-gate * for each argument, check to see if there is a "-I file" pair. 11257c478bd9Sstevel@tonic-gate * if so, move the 3rd argument into "-I"'s place, build_table() 11267c478bd9Sstevel@tonic-gate * using "file"'s name and increment argc one (the second 11277c478bd9Sstevel@tonic-gate * increment appears in the for loop) which removes the two 11287c478bd9Sstevel@tonic-gate * args "-I" and "file" from the argument vector. 11297c478bd9Sstevel@tonic-gate */ 11307c478bd9Sstevel@tonic-gate for (argc = 0; argv[argc]; argc++) { 11317c478bd9Sstevel@tonic-gate if (strcmp(argv[argc], "-I") == 0) { 11327c478bd9Sstevel@tonic-gate if (!argv[argc+1]) { 11337c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 11347c478bd9Sstevel@tonic-gate "tar: missing argument for -I flag\n")); 11357c478bd9Sstevel@tonic-gate done(2); 11367c478bd9Sstevel@tonic-gate } else { 11377c478bd9Sstevel@tonic-gate Iflag = 1; 11387c478bd9Sstevel@tonic-gate argv[argc] = argv[argc+2]; 11397c478bd9Sstevel@tonic-gate build_table(include_tbl, argv[++argc]); 11407c478bd9Sstevel@tonic-gate } 11417c478bd9Sstevel@tonic-gate } 11427c478bd9Sstevel@tonic-gate } 11437c478bd9Sstevel@tonic-gate if (strcmp(usefile, "-") == 0) { 11447c478bd9Sstevel@tonic-gate mt = dup(0); 11457c478bd9Sstevel@tonic-gate ++bflag; 11467c478bd9Sstevel@tonic-gate /* try to recover from short reads when reading stdin */ 11477c478bd9Sstevel@tonic-gate ++Bflag; 11487c478bd9Sstevel@tonic-gate } else if ((mt = open(usefile, 0)) < 0) 11497c478bd9Sstevel@tonic-gate vperror(1, "%s", usefile); 11507c478bd9Sstevel@tonic-gate 115136802407SRich Burridge /* Decompress if the file is compressed */ 115236802407SRich Burridge 115336802407SRich Burridge if (strcmp(usefile, "-") != 0) { 115436802407SRich Burridge check_compression(); 115536802407SRich Burridge if (compress_opt != NULL) { 115636802407SRich Burridge pid = uncompress_file(); 115736802407SRich Burridge wait_pid(pid); 115836802407SRich Burridge } 115936802407SRich Burridge } 11607c478bd9Sstevel@tonic-gate if (xflag) { 11617c478bd9Sstevel@tonic-gate if (Aflag && vflag) 1162eace40a5Sceastha (void) printf(gettext( 1163eace40a5Sceastha "Suppressing absolute pathnames.\n")); 11647c478bd9Sstevel@tonic-gate 11657c478bd9Sstevel@tonic-gate doxtract(argv); 11667c478bd9Sstevel@tonic-gate } else if (tflag) 11677c478bd9Sstevel@tonic-gate dotable(argv); 11687c478bd9Sstevel@tonic-gate } 11697c478bd9Sstevel@tonic-gate else 11707c478bd9Sstevel@tonic-gate usage(); 11717c478bd9Sstevel@tonic-gate 11727c478bd9Sstevel@tonic-gate done(Errflg); 11737c478bd9Sstevel@tonic-gate 11747c478bd9Sstevel@tonic-gate /* Not reached: keep compiler quiet */ 11757c478bd9Sstevel@tonic-gate return (1); 11767c478bd9Sstevel@tonic-gate } 11777c478bd9Sstevel@tonic-gate 11787c478bd9Sstevel@tonic-gate static void 11797c478bd9Sstevel@tonic-gate usage(void) 11807c478bd9Sstevel@tonic-gate { 11817c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 11827c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 1183da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 1184cc22b130SRich Burridge "Usage: tar {c|r|t|u|x}[BDeEFhilmnopPTvw@/[0-7]][bf][X...] " 1185da6c28aaSamw #else 1186cc22b130SRich Burridge "Usage: tar {c|r|t|u|x}[BDeEFhilmnopPTvw@[0-7]][bf][X...] " 1187da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 11887c478bd9Sstevel@tonic-gate #else 1189cc22b130SRich Burridge "Usage: tar {c|r|t|u|x}[BDeEFhilmnopPTvw[0-7]][bf][X...] " 1190da6c28aaSamw #endif /* O_XATTR */ 1191506ea5b8SMilan Jurik "[j|J|z|Z] " 11927c478bd9Sstevel@tonic-gate "[blocksize] [tarfile] [size] [exclude-file...] " 11937c478bd9Sstevel@tonic-gate "{file | -I include-file | -C directory file}...\n")); 11947c478bd9Sstevel@tonic-gate done(1); 11957c478bd9Sstevel@tonic-gate } 11967c478bd9Sstevel@tonic-gate 11977c478bd9Sstevel@tonic-gate /* 11987c478bd9Sstevel@tonic-gate * dorep - do "replacements" 11997c478bd9Sstevel@tonic-gate * 12007c478bd9Sstevel@tonic-gate * Dorep is responsible for creating ('c'), appending ('r') 12017c478bd9Sstevel@tonic-gate * and updating ('u'); 12027c478bd9Sstevel@tonic-gate */ 12037c478bd9Sstevel@tonic-gate 12047c478bd9Sstevel@tonic-gate static void 12057c478bd9Sstevel@tonic-gate dorep(char *argv[]) 12067c478bd9Sstevel@tonic-gate { 12077c478bd9Sstevel@tonic-gate char *cp, *cp2, *p; 12087c478bd9Sstevel@tonic-gate char wdir[PATH_MAX+2], tempdir[PATH_MAX+2], *parent; 12097c478bd9Sstevel@tonic-gate char file[PATH_MAX*2], origdir[PATH_MAX+1]; 12107c478bd9Sstevel@tonic-gate FILE *fp = (FILE *)NULL; 12117c478bd9Sstevel@tonic-gate int archtype; 1212123523f8Sas158974 int ret; 12137c478bd9Sstevel@tonic-gate 12147c478bd9Sstevel@tonic-gate 12157c478bd9Sstevel@tonic-gate if (!cflag) { 12167c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 12177c478bd9Sstevel@tonic-gate getdir(); /* read header for next file */ 12187c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) { 12197c478bd9Sstevel@tonic-gate if (!Eflag) 12207c478bd9Sstevel@tonic-gate fatal(gettext("Archive contains extended" 12217c478bd9Sstevel@tonic-gate " header. -E flag required.\n")); 1222123523f8Sas158974 ret = get_xdata(); /* Get extended header items */ 12237c478bd9Sstevel@tonic-gate /* and regular header */ 12247c478bd9Sstevel@tonic-gate } else { 12257c478bd9Sstevel@tonic-gate if (Eflag) 12267c478bd9Sstevel@tonic-gate fatal(gettext("Archive contains no extended" 12277c478bd9Sstevel@tonic-gate " header. -E flag not allowed.\n")); 12287c478bd9Sstevel@tonic-gate } 12297c478bd9Sstevel@tonic-gate while (!endtape()) { /* changed from a do while */ 1230123523f8Sas158974 setbytes_to_skip(&stbuf, ret); 12317c478bd9Sstevel@tonic-gate passtape(); /* skip the file data */ 12327c478bd9Sstevel@tonic-gate if (term) 12337c478bd9Sstevel@tonic-gate done(Errflg); /* received signal to stop */ 12347c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 12357c478bd9Sstevel@tonic-gate getdir(); 12367c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) 1237123523f8Sas158974 ret = get_xdata(); 1238123523f8Sas158974 } 1239123523f8Sas158974 if (ret == 0) { 1240123523f8Sas158974 if ((dblock.dbuf.typeflag != 'A') && 1241123523f8Sas158974 (xhdr_flgs != 0)) { 1242123523f8Sas158974 load_info_from_xtarhdr(xhdr_flgs, 1243123523f8Sas158974 &Xtarhdr); 1244123523f8Sas158974 xhdr_flgs |= _X_XHDR; 1245123523f8Sas158974 } 12467c478bd9Sstevel@tonic-gate } 12477c478bd9Sstevel@tonic-gate backtape(); /* was called by endtape */ 12487c478bd9Sstevel@tonic-gate if (tfile != NULL) { 124931a2de35SRich Burridge /* 125031a2de35SRich Burridge * Buffer size is calculated to be the size of the 125131a2de35SRich Burridge * tmpdir string, plus 6 times the size of the tname 125231a2de35SRich Burridge * string, plus a value that is known to be greater 125331a2de35SRich Burridge * than the command pipeline string. 125431a2de35SRich Burridge */ 125531a2de35SRich Burridge int buflen = strlen(tmpdir) + (6 * strlen(tname)) + 100; 125631a2de35SRich Burridge char *buf; 12577c478bd9Sstevel@tonic-gate 125831a2de35SRich Burridge if ((buf = (char *)calloc(1, buflen)) == NULL) { 125931a2de35SRich Burridge vperror(1, gettext("tar: out of memory, " 126031a2de35SRich Burridge "cannot create sort command file\n")); 126131a2de35SRich Burridge } 126231a2de35SRich Burridge 126331a2de35SRich Burridge (void) snprintf(buf, buflen, "env 'TMPDIR=%s' " 126431a2de35SRich Burridge "sort +0 -1 +1nr %s -o %s; awk '$1 " 12657c478bd9Sstevel@tonic-gate "!= prev {print; prev=$1}' %s >%sX;mv %sX %s", 126631a2de35SRich Burridge tmpdir, tname, tname, tname, tname, tname, tname); 12677c478bd9Sstevel@tonic-gate (void) fflush(tfile); 12687c478bd9Sstevel@tonic-gate (void) system(buf); 126931a2de35SRich Burridge free(buf); 12707c478bd9Sstevel@tonic-gate (void) freopen(tname, "r", tfile); 12717c478bd9Sstevel@tonic-gate (void) fstat(fileno(tfile), &stbuf); 12727c478bd9Sstevel@tonic-gate high = stbuf.st_size; 12737c478bd9Sstevel@tonic-gate } 12747c478bd9Sstevel@tonic-gate } 12757c478bd9Sstevel@tonic-gate 12767c478bd9Sstevel@tonic-gate dumping = 1; 12777c478bd9Sstevel@tonic-gate if (mulvol) { /* SP-1 */ 12787c478bd9Sstevel@tonic-gate if (nblock && (blocklim%nblock) != 0) 12797c478bd9Sstevel@tonic-gate fatal(gettext( 12807c478bd9Sstevel@tonic-gate "Volume size not a multiple of block size.")); 12817c478bd9Sstevel@tonic-gate blocklim -= 2; /* for trailer records */ 12827c478bd9Sstevel@tonic-gate if (vflag) 12837c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("Volume ends at %" 12847c478bd9Sstevel@tonic-gate FMT_blkcnt_t "K, blocking factor = %dK\n"), 12857c478bd9Sstevel@tonic-gate K((blocklim - 1)), K(nblock)); 12867c478bd9Sstevel@tonic-gate } 12877c478bd9Sstevel@tonic-gate 12887c478bd9Sstevel@tonic-gate /* 12897c478bd9Sstevel@tonic-gate * Save the original directory before it gets 12907c478bd9Sstevel@tonic-gate * changed. 12917c478bd9Sstevel@tonic-gate */ 12927c478bd9Sstevel@tonic-gate if (getcwd(origdir, (PATH_MAX+1)) == NULL) { 12937c478bd9Sstevel@tonic-gate vperror(0, gettext("A parent directory cannot be read")); 12947c478bd9Sstevel@tonic-gate exit(1); 12957c478bd9Sstevel@tonic-gate } 12967c478bd9Sstevel@tonic-gate 12977c478bd9Sstevel@tonic-gate (void) strcpy(wdir, origdir); 12987c478bd9Sstevel@tonic-gate 1299cc22b130SRich Burridge while ((*argv || fp) && !term) { 13007c478bd9Sstevel@tonic-gate if (fp || (strcmp(*argv, "-I") == 0)) { 13017c478bd9Sstevel@tonic-gate if (fp == NULL) { 13027c478bd9Sstevel@tonic-gate if (*++argv == NULL) 13037c478bd9Sstevel@tonic-gate fatal(gettext( 13047c478bd9Sstevel@tonic-gate "missing file name for -I flag.")); 13057c478bd9Sstevel@tonic-gate else if ((fp = fopen(*argv++, "r")) == NULL) 13067c478bd9Sstevel@tonic-gate vperror(0, "%s", argv[-1]); 13077c478bd9Sstevel@tonic-gate continue; 13087c478bd9Sstevel@tonic-gate } else if ((fgets(file, PATH_MAX-1, fp)) == NULL) { 13097c478bd9Sstevel@tonic-gate (void) fclose(fp); 13107c478bd9Sstevel@tonic-gate fp = NULL; 13117c478bd9Sstevel@tonic-gate continue; 13127c478bd9Sstevel@tonic-gate } else { 13137c478bd9Sstevel@tonic-gate cp = cp2 = file; 13147c478bd9Sstevel@tonic-gate if ((p = strchr(cp2, '\n'))) 13157c478bd9Sstevel@tonic-gate *p = 0; 13167c478bd9Sstevel@tonic-gate } 13177c478bd9Sstevel@tonic-gate } else if ((strcmp(*argv, "-C") == 0) && argv[1]) { 1318b25dbf38SRich Burridge if (tar_chdir(*++argv) < 0) 13197c478bd9Sstevel@tonic-gate vperror(0, gettext( 13207c478bd9Sstevel@tonic-gate "can't change directories to %s"), *argv); 13217c478bd9Sstevel@tonic-gate else 13227c478bd9Sstevel@tonic-gate (void) getcwd(wdir, (sizeof (wdir))); 13237c478bd9Sstevel@tonic-gate argv++; 13247c478bd9Sstevel@tonic-gate continue; 13257c478bd9Sstevel@tonic-gate } else 13267c478bd9Sstevel@tonic-gate cp = cp2 = strcpy(file, *argv++); 13277c478bd9Sstevel@tonic-gate 13287c478bd9Sstevel@tonic-gate /* 13297c478bd9Sstevel@tonic-gate * point cp2 to the last '/' in file, but not 13307c478bd9Sstevel@tonic-gate * to a trailing '/' 13317c478bd9Sstevel@tonic-gate */ 13327c478bd9Sstevel@tonic-gate for (; *cp; cp++) { 13337c478bd9Sstevel@tonic-gate if (*cp == '/') { 13347c478bd9Sstevel@tonic-gate while (*(cp+1) == '/') { 13357c478bd9Sstevel@tonic-gate ++cp; 13367c478bd9Sstevel@tonic-gate } 13377c478bd9Sstevel@tonic-gate if (*(cp+1) != '\0') { 13387c478bd9Sstevel@tonic-gate /* not trailing slash */ 13397c478bd9Sstevel@tonic-gate cp2 = cp; 13407c478bd9Sstevel@tonic-gate } 13417c478bd9Sstevel@tonic-gate } 13427c478bd9Sstevel@tonic-gate } 13437c478bd9Sstevel@tonic-gate if (cp2 != file) { 13447c478bd9Sstevel@tonic-gate *cp2 = '\0'; 1345b25dbf38SRich Burridge if (tar_chdir(file) < 0) { 13467c478bd9Sstevel@tonic-gate vperror(0, gettext( 13477c478bd9Sstevel@tonic-gate "can't change directories to %s"), file); 13487c478bd9Sstevel@tonic-gate continue; 13497c478bd9Sstevel@tonic-gate } 13507c478bd9Sstevel@tonic-gate *cp2 = '/'; 13517c478bd9Sstevel@tonic-gate cp2++; 13527c478bd9Sstevel@tonic-gate } 13537c478bd9Sstevel@tonic-gate 13547c478bd9Sstevel@tonic-gate parent = getcwd(tempdir, (sizeof (tempdir))); 1355da6c28aaSamw 1356da6c28aaSamw archtype = putfile(file, cp2, parent, NULL, NORMAL_FILE, 13577c478bd9Sstevel@tonic-gate LEV0, SYMLINK_LEV0); 13587c478bd9Sstevel@tonic-gate 13597c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 13607c478bd9Sstevel@tonic-gate if (!exitflag) { 1361da6c28aaSamw if ((atflag || saflag) && 1362da6c28aaSamw (archtype == PUT_NOTAS_LINK)) { 1363da6c28aaSamw xattrs_put(file, cp2, parent, NULL); 13647c478bd9Sstevel@tonic-gate } 13657c478bd9Sstevel@tonic-gate } 13667c478bd9Sstevel@tonic-gate #endif 13677c478bd9Sstevel@tonic-gate 1368b25dbf38SRich Burridge if (tar_chdir(origdir) < 0) 13697c478bd9Sstevel@tonic-gate vperror(0, gettext("cannot change back?: %s"), origdir); 13707c478bd9Sstevel@tonic-gate 13717c478bd9Sstevel@tonic-gate if (exitflag) { 13727c478bd9Sstevel@tonic-gate /* 13737c478bd9Sstevel@tonic-gate * If e function modifier has been specified 13747c478bd9Sstevel@tonic-gate * write the files (that are listed before the 13757c478bd9Sstevel@tonic-gate * file causing the error) to tape. exitflag is 13767c478bd9Sstevel@tonic-gate * used because only some of the error conditions 13777c478bd9Sstevel@tonic-gate * in putfile() recognize the e function modifier. 13787c478bd9Sstevel@tonic-gate */ 13797c478bd9Sstevel@tonic-gate break; 13807c478bd9Sstevel@tonic-gate } 13817c478bd9Sstevel@tonic-gate } 13827c478bd9Sstevel@tonic-gate 13837c478bd9Sstevel@tonic-gate putempty((blkcnt_t)2); 13847c478bd9Sstevel@tonic-gate flushtape(); 13857c478bd9Sstevel@tonic-gate closevol(); /* SP-1 */ 13867c478bd9Sstevel@tonic-gate if (linkerrok == 1) 13877c478bd9Sstevel@tonic-gate for (; ihead != NULL; ihead = ihead->nextp) { 13887c478bd9Sstevel@tonic-gate if (ihead->count == 0) 13897c478bd9Sstevel@tonic-gate continue; 13907c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 13917c478bd9Sstevel@tonic-gate "tar: missing links to %s\n"), ihead->pathname); 13927c478bd9Sstevel@tonic-gate if (errflag) 13937c478bd9Sstevel@tonic-gate done(1); 13947c478bd9Sstevel@tonic-gate else 13957c478bd9Sstevel@tonic-gate Errflg = 1; 13967c478bd9Sstevel@tonic-gate } 13977c478bd9Sstevel@tonic-gate } 13987c478bd9Sstevel@tonic-gate 13997c478bd9Sstevel@tonic-gate 14007c478bd9Sstevel@tonic-gate /* 14017c478bd9Sstevel@tonic-gate * endtape - check for tape at end 14027c478bd9Sstevel@tonic-gate * 14037c478bd9Sstevel@tonic-gate * endtape checks the entry in dblock.dbuf to see if its the 14047c478bd9Sstevel@tonic-gate * special EOT entry. Endtape is usually called after getdir(). 14057c478bd9Sstevel@tonic-gate * 14067c478bd9Sstevel@tonic-gate * endtape used to call backtape; it no longer does, he who 14077c478bd9Sstevel@tonic-gate * wants it backed up must call backtape himself 14087c478bd9Sstevel@tonic-gate * RETURNS: 0 if not EOT, tape position unaffected 14097c478bd9Sstevel@tonic-gate * 1 if EOT, tape position unaffected 14107c478bd9Sstevel@tonic-gate */ 14117c478bd9Sstevel@tonic-gate 14127c478bd9Sstevel@tonic-gate static int 14137c478bd9Sstevel@tonic-gate endtape(void) 14147c478bd9Sstevel@tonic-gate { 14157c478bd9Sstevel@tonic-gate if (dblock.dbuf.name[0] == '\0') { /* null header = EOT */ 14167c478bd9Sstevel@tonic-gate return (1); 14177c478bd9Sstevel@tonic-gate } else 14187c478bd9Sstevel@tonic-gate return (0); 14197c478bd9Sstevel@tonic-gate } 14207c478bd9Sstevel@tonic-gate 14217c478bd9Sstevel@tonic-gate /* 14227c478bd9Sstevel@tonic-gate * getdir - get directory entry from tar tape 14237c478bd9Sstevel@tonic-gate * 14247c478bd9Sstevel@tonic-gate * getdir reads the next tarblock off the tape and cracks 14257c478bd9Sstevel@tonic-gate * it as a directory. The checksum must match properly. 14267c478bd9Sstevel@tonic-gate * 14277c478bd9Sstevel@tonic-gate * If tfile is non-null getdir writes the file name and mod date 14287c478bd9Sstevel@tonic-gate * to tfile. 14297c478bd9Sstevel@tonic-gate */ 14307c478bd9Sstevel@tonic-gate 14317c478bd9Sstevel@tonic-gate static void 14327c478bd9Sstevel@tonic-gate getdir(void) 14337c478bd9Sstevel@tonic-gate { 14347c478bd9Sstevel@tonic-gate struct stat *sp; 14357c478bd9Sstevel@tonic-gate #ifdef EUC 14367c478bd9Sstevel@tonic-gate static int warn_chksum_sign = 0; 14377c478bd9Sstevel@tonic-gate #endif /* EUC */ 14387c478bd9Sstevel@tonic-gate 14397c478bd9Sstevel@tonic-gate top: 14407c478bd9Sstevel@tonic-gate readtape((char *)&dblock); 14417c478bd9Sstevel@tonic-gate if (dblock.dbuf.name[0] == '\0') 14427c478bd9Sstevel@tonic-gate return; 14437c478bd9Sstevel@tonic-gate sp = &stbuf; 14447c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.mode, "%8lo", &Gen.g_mode); 14457c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.uid, "%8lo", (ulong_t *)&Gen.g_uid); 14467c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.gid, "%8lo", (ulong_t *)&Gen.g_gid); 14477c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.size, "%12" FMT_off_t_o, &Gen.g_filesz); 14487c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.mtime, "%12lo", (ulong_t *)&Gen.g_mtime); 14497c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.chksum, "%8o", &Gen.g_cksum); 14507c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.devmajor, "%8lo", &Gen.g_devmajor); 14517c478bd9Sstevel@tonic-gate (void) sscanf(dblock.dbuf.devminor, "%8lo", &Gen.g_devminor); 14527c478bd9Sstevel@tonic-gate 14537c478bd9Sstevel@tonic-gate is_posix = (strcmp(dblock.dbuf.magic, magic_type) == 0); 14547c478bd9Sstevel@tonic-gate 14557c478bd9Sstevel@tonic-gate sp->st_mode = Gen.g_mode; 14567c478bd9Sstevel@tonic-gate if (is_posix && (sp->st_mode & S_IFMT) == 0) 14577c478bd9Sstevel@tonic-gate switch (dblock.dbuf.typeflag) { 14587c478bd9Sstevel@tonic-gate case '0': case 0: case _XATTR_HDRTYPE: 14597c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFREG; 14607c478bd9Sstevel@tonic-gate break; 14617c478bd9Sstevel@tonic-gate case '1': /* hard link */ 14627c478bd9Sstevel@tonic-gate break; 14637c478bd9Sstevel@tonic-gate case '2': 14647c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFLNK; 14657c478bd9Sstevel@tonic-gate break; 14667c478bd9Sstevel@tonic-gate case '3': 14677c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFCHR; 14687c478bd9Sstevel@tonic-gate break; 14697c478bd9Sstevel@tonic-gate case '4': 14707c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFBLK; 14717c478bd9Sstevel@tonic-gate break; 14727c478bd9Sstevel@tonic-gate case '5': 14737c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFDIR; 14747c478bd9Sstevel@tonic-gate break; 14757c478bd9Sstevel@tonic-gate case '6': 14767c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFIFO; 14777c478bd9Sstevel@tonic-gate break; 14787c478bd9Sstevel@tonic-gate default: 14797c478bd9Sstevel@tonic-gate if (convtoreg(Gen.g_filesz)) 14807c478bd9Sstevel@tonic-gate sp->st_mode |= S_IFREG; 14817c478bd9Sstevel@tonic-gate break; 14827c478bd9Sstevel@tonic-gate } 14837c478bd9Sstevel@tonic-gate 1484e765faefSRich Burridge if ((dblock.dbuf.typeflag == 'X') || (dblock.dbuf.typeflag == 'L')) { 14857c478bd9Sstevel@tonic-gate Xhdrflag = 1; /* Currently processing extended header */ 1486e765faefSRich Burridge } else { 14877c478bd9Sstevel@tonic-gate Xhdrflag = 0; 1488e765faefSRich Burridge } 14897c478bd9Sstevel@tonic-gate 14907c478bd9Sstevel@tonic-gate sp->st_uid = Gen.g_uid; 14917c478bd9Sstevel@tonic-gate sp->st_gid = Gen.g_gid; 14927c478bd9Sstevel@tonic-gate sp->st_size = Gen.g_filesz; 14937c478bd9Sstevel@tonic-gate sp->st_mtime = Gen.g_mtime; 14947c478bd9Sstevel@tonic-gate chksum = Gen.g_cksum; 14957c478bd9Sstevel@tonic-gate 14967c478bd9Sstevel@tonic-gate if (dblock.dbuf.extno != '\0') { /* split file? */ 14977c478bd9Sstevel@tonic-gate extno = dblock.dbuf.extno; 14987c478bd9Sstevel@tonic-gate extsize = Gen.g_filesz; 14997c478bd9Sstevel@tonic-gate extotal = dblock.dbuf.extotal; 15007c478bd9Sstevel@tonic-gate } else { 15017c478bd9Sstevel@tonic-gate extno = 0; /* tell others file not split */ 15027c478bd9Sstevel@tonic-gate extsize = 0; 15037c478bd9Sstevel@tonic-gate extotal = 0; 15047c478bd9Sstevel@tonic-gate } 15057c478bd9Sstevel@tonic-gate 15067c478bd9Sstevel@tonic-gate #ifdef EUC 15077c478bd9Sstevel@tonic-gate if (chksum != checksum(&dblock)) { 15087c478bd9Sstevel@tonic-gate if (chksum != checksum_signed(&dblock)) { 15097c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 15107c478bd9Sstevel@tonic-gate "tar: directory checksum error\n")); 151103d7b3c0SRich Burridge if (iflag) { 151203d7b3c0SRich Burridge Errflg = 2; 15137c478bd9Sstevel@tonic-gate goto top; 151403d7b3c0SRich Burridge } 15157c478bd9Sstevel@tonic-gate done(2); 15167c478bd9Sstevel@tonic-gate } else { 15177c478bd9Sstevel@tonic-gate if (! warn_chksum_sign) { 15187c478bd9Sstevel@tonic-gate warn_chksum_sign = 1; 15197c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 15207c478bd9Sstevel@tonic-gate "tar: warning: tar file made with signed checksum\n")); 15217c478bd9Sstevel@tonic-gate } 15227c478bd9Sstevel@tonic-gate } 15237c478bd9Sstevel@tonic-gate } 15247c478bd9Sstevel@tonic-gate #else 15257c478bd9Sstevel@tonic-gate if (chksum != checksum(&dblock)) { 15267c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 15277c478bd9Sstevel@tonic-gate "tar: directory checksum error\n")); 152803d7b3c0SRich Burridge if (iflag) { 152903d7b3c0SRich Burridge Errflg = 2; 15307c478bd9Sstevel@tonic-gate goto top; 153103d7b3c0SRich Burridge } 15327c478bd9Sstevel@tonic-gate done(2); 15337c478bd9Sstevel@tonic-gate } 15347c478bd9Sstevel@tonic-gate #endif /* EUC */ 15357c478bd9Sstevel@tonic-gate if (tfile != NULL && Xhdrflag == 0) { 15367c478bd9Sstevel@tonic-gate /* 15377c478bd9Sstevel@tonic-gate * If an extended header is present, then time is available 15387c478bd9Sstevel@tonic-gate * in nanoseconds in the extended header data, so set it. 15397c478bd9Sstevel@tonic-gate * Otherwise, give an invalid value so that checkupdate will 15407c478bd9Sstevel@tonic-gate * not test beyond seconds. 15417c478bd9Sstevel@tonic-gate */ 15427c478bd9Sstevel@tonic-gate if ((xhdr_flgs & _X_MTIME)) 15437c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec = Xtarhdr.x_mtime.tv_nsec; 15447c478bd9Sstevel@tonic-gate else 15457c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec = -1; 15467c478bd9Sstevel@tonic-gate 15477c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 15487c478bd9Sstevel@tonic-gate (void) fprintf(tfile, "%s %10ld.%9.9ld\n", 15497c478bd9Sstevel@tonic-gate Xtarhdr.x_path, sp->st_mtim.tv_sec, 15507c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec); 15517c478bd9Sstevel@tonic-gate else 15527c478bd9Sstevel@tonic-gate (void) fprintf(tfile, "%.*s %10ld.%9.9ld\n", 15537c478bd9Sstevel@tonic-gate NAMSIZ, dblock.dbuf.name, sp->st_mtim.tv_sec, 15547c478bd9Sstevel@tonic-gate sp->st_mtim.tv_nsec); 15557c478bd9Sstevel@tonic-gate } 15567c478bd9Sstevel@tonic-gate 15577c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 15587c478bd9Sstevel@tonic-gate Hiddendir = 0; 15597c478bd9Sstevel@tonic-gate if (xattrp && dblock.dbuf.typeflag == _XATTR_HDRTYPE) { 15607c478bd9Sstevel@tonic-gate if (xattrbadhead) { 15617c478bd9Sstevel@tonic-gate free(xattrhead); 15627c478bd9Sstevel@tonic-gate xattrp = NULL; 15637c478bd9Sstevel@tonic-gate xattr_linkp = NULL; 15647c478bd9Sstevel@tonic-gate xattrhead = NULL; 15657c478bd9Sstevel@tonic-gate } else { 1566da6c28aaSamw char *aname = basename(xattrapath); 1567da6c28aaSamw size_t xindex = aname - xattrapath; 1568da6c28aaSamw 1569da6c28aaSamw if (xattrapath[xindex] == '.' && 1570da6c28aaSamw xattrapath[xindex + 1] == '\0' && 15717c478bd9Sstevel@tonic-gate xattrp->h_typeflag == '5') { 15727c478bd9Sstevel@tonic-gate Hiddendir = 1; 15737c478bd9Sstevel@tonic-gate sp->st_mode = 1574d2443e76Smarks (S_IFDIR | (sp->st_mode & POSIXMODES)); 15757c478bd9Sstevel@tonic-gate } 15767c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = xattrp->h_typeflag; 15777c478bd9Sstevel@tonic-gate } 15787c478bd9Sstevel@tonic-gate } 15797c478bd9Sstevel@tonic-gate #endif 15807c478bd9Sstevel@tonic-gate } 15817c478bd9Sstevel@tonic-gate 15827c478bd9Sstevel@tonic-gate 15837c478bd9Sstevel@tonic-gate /* 15847c478bd9Sstevel@tonic-gate * passtape - skip over a file on the tape 15857c478bd9Sstevel@tonic-gate * 15867c478bd9Sstevel@tonic-gate * passtape skips over the next data file on the tape. 15877c478bd9Sstevel@tonic-gate * The tape directory entry must be in dblock.dbuf. This 15887c478bd9Sstevel@tonic-gate * routine just eats the number of blocks computed from the 15897c478bd9Sstevel@tonic-gate * directory size entry; the tape must be (logically) positioned 15907c478bd9Sstevel@tonic-gate * right after thee directory info. 15917c478bd9Sstevel@tonic-gate */ 15927c478bd9Sstevel@tonic-gate 15937c478bd9Sstevel@tonic-gate static void 15947c478bd9Sstevel@tonic-gate passtape(void) 15957c478bd9Sstevel@tonic-gate { 15967c478bd9Sstevel@tonic-gate blkcnt_t blocks; 15977c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 15987c478bd9Sstevel@tonic-gate 15997c478bd9Sstevel@tonic-gate /* 16007c478bd9Sstevel@tonic-gate * Types link(1), sym-link(2), char special(3), blk special(4), 16017c478bd9Sstevel@tonic-gate * directory(5), and FIFO(6) do not have data blocks associated 16027c478bd9Sstevel@tonic-gate * with them so just skip reading the data block. 16037c478bd9Sstevel@tonic-gate */ 16047c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '1' || dblock.dbuf.typeflag == '2' || 16057c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == '3' || dblock.dbuf.typeflag == '4' || 16067c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == '5' || dblock.dbuf.typeflag == '6') 16077c478bd9Sstevel@tonic-gate return; 16087c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 16097c478bd9Sstevel@tonic-gate 16107c478bd9Sstevel@tonic-gate /* if operating on disk, seek instead of reading */ 16117c478bd9Sstevel@tonic-gate if (NotTape) 16127c478bd9Sstevel@tonic-gate seekdisk(blocks); 16137c478bd9Sstevel@tonic-gate else 16147c478bd9Sstevel@tonic-gate while (blocks-- > 0) 16157c478bd9Sstevel@tonic-gate readtape(buf); 16167c478bd9Sstevel@tonic-gate } 16177c478bd9Sstevel@tonic-gate 1618da6c28aaSamw #if defined(O_XATTR) 1619da6c28aaSamw static int 1620da6c28aaSamw is_sysattr(char *name) 1621da6c28aaSamw { 1622da6c28aaSamw return ((strcmp(name, VIEW_READONLY) == 0) || 1623da6c28aaSamw (strcmp(name, VIEW_READWRITE) == 0)); 1624da6c28aaSamw } 1625da6c28aaSamw #endif 1626da6c28aaSamw 1627da6c28aaSamw #if defined(O_XATTR) 1628da6c28aaSamw /* 1629da6c28aaSamw * Verify the attribute, attrname, is an attribute we want to restore. 1630da6c28aaSamw * Never restore read-only system attribute files. Only restore read-write 1631da6c28aaSamw * system attributes files when -/ was specified, and only traverse into 1632da6c28aaSamw * the 2nd level attribute directory containing only system attributes if 1633da6c28aaSamw * -@ was specified. This keeps us from archiving 1634da6c28aaSamw * <attribute name>/<read-write system attribute file> 1635da6c28aaSamw * when -/ was specified without -@. 1636da6c28aaSamw * 1637da6c28aaSamw * attrname - attribute file name 1638da6c28aaSamw * attrparent - attribute's parent name within the base file's attribute 1639da6c28aaSamw * directory hierarchy 1640da6c28aaSamw */ 1641da6c28aaSamw static attr_status_t 1642da6c28aaSamw verify_attr(char *attrname, char *attrparent, int arc_rwsysattr, 1643da6c28aaSamw int *rw_sysattr) 1644da6c28aaSamw { 1645da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 1646da6c28aaSamw int attr_supported; 1647da6c28aaSamw 1648da6c28aaSamw /* Never restore read-only system attribute files */ 1649da6c28aaSamw if ((attr_supported = sysattr_type(attrname)) == _RO_SATTR) { 1650da6c28aaSamw *rw_sysattr = 0; 1651da6c28aaSamw return (ATTR_SKIP); 1652da6c28aaSamw } else { 1653da6c28aaSamw *rw_sysattr = (attr_supported == _RW_SATTR); 1654da6c28aaSamw } 1655da6c28aaSamw #else 1656da6c28aaSamw /* 1657da6c28aaSamw * Only need to check if this attribute is an extended system 1658da6c28aaSamw * attribute. 1659da6c28aaSamw */ 1660da6c28aaSamw if (*rw_sysattr = is_sysattr(attrname)) { 1661da6c28aaSamw return (ATTR_SKIP); 1662da6c28aaSamw } else { 1663da6c28aaSamw return (ATTR_OK); 1664da6c28aaSamw } 1665da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 1666da6c28aaSamw 1667da6c28aaSamw /* 1668da6c28aaSamw * If the extended system attribute file is specified with the 1669da6c28aaSamw * arc_rwsysattr flag, as being transient (default extended 1670da6c28aaSamw * attributes), then don't archive it. 1671da6c28aaSamw */ 1672da6c28aaSamw if (*rw_sysattr && !arc_rwsysattr) { 1673da6c28aaSamw return (ATTR_SKIP); 1674da6c28aaSamw } 1675da6c28aaSamw 1676da6c28aaSamw /* 1677da6c28aaSamw * Only restore read-write system attribute files 1678da6c28aaSamw * when -/ was specified. Only restore extended 1679da6c28aaSamw * attributes when -@ was specified. 1680da6c28aaSamw */ 1681da6c28aaSamw if (atflag) { 1682da6c28aaSamw if (!saflag) { 1683da6c28aaSamw /* 1684da6c28aaSamw * Only archive/restore the hidden directory "." if 1685da6c28aaSamw * we're processing the top level hidden attribute 1686da6c28aaSamw * directory. We don't want to process the 1687da6c28aaSamw * hidden attribute directory of the attribute 1688da6c28aaSamw * directory that contains only extended system 1689da6c28aaSamw * attributes. 1690da6c28aaSamw */ 1691da6c28aaSamw if (*rw_sysattr || (Hiddendir && 1692da6c28aaSamw (attrparent != NULL))) { 1693da6c28aaSamw return (ATTR_SKIP); 1694da6c28aaSamw } 1695da6c28aaSamw } 1696da6c28aaSamw } else if (saflag) { 1697da6c28aaSamw /* 1698da6c28aaSamw * Only archive/restore read-write extended system attribute 1699da6c28aaSamw * files of the base file. 1700da6c28aaSamw */ 1701da6c28aaSamw if (!*rw_sysattr || (attrparent != NULL)) { 1702da6c28aaSamw return (ATTR_SKIP); 1703da6c28aaSamw } 1704da6c28aaSamw } else { 1705da6c28aaSamw return (ATTR_SKIP); 1706da6c28aaSamw } 1707da6c28aaSamw 1708da6c28aaSamw return (ATTR_OK); 1709da6c28aaSamw } 1710da6c28aaSamw #endif 17117c478bd9Sstevel@tonic-gate 17125e2174acSceastha static void 17135e2174acSceastha free_children(file_list_t *children) 17145e2174acSceastha { 17155e2174acSceastha file_list_t *child = children; 17165e2174acSceastha file_list_t *cptr; 17175e2174acSceastha 17185e2174acSceastha while (child != NULL) { 17195e2174acSceastha cptr = child->next; 17205e2174acSceastha if (child->name != NULL) { 17215e2174acSceastha free(child->name); 17225e2174acSceastha } 17235e2174acSceastha child = cptr; 17245e2174acSceastha } 17255e2174acSceastha } 17265e2174acSceastha 17277c478bd9Sstevel@tonic-gate static int 1728da6c28aaSamw putfile(char *longname, char *shortname, char *parent, attr_data_t *attrinfo, 17297c478bd9Sstevel@tonic-gate int filetype, int lev, int symlink_lev) 17307c478bd9Sstevel@tonic-gate { 17317c478bd9Sstevel@tonic-gate int infile = -1; /* deliberately invalid */ 17327c478bd9Sstevel@tonic-gate blkcnt_t blocks; 17337c478bd9Sstevel@tonic-gate char buf[PATH_MAX + 2]; /* Add trailing slash and null */ 17347c478bd9Sstevel@tonic-gate char *bigbuf; 17357c478bd9Sstevel@tonic-gate int maxread; 17367c478bd9Sstevel@tonic-gate int hint; /* amount to write to get "in sync" */ 17377c478bd9Sstevel@tonic-gate char filetmp[PATH_MAX + 1]; 17387c478bd9Sstevel@tonic-gate char *cp; 17397c478bd9Sstevel@tonic-gate char *name; 1740da6c28aaSamw char *attrparent = NULL; 1741da6c28aaSamw char *longattrname = NULL; 17425e2174acSceastha file_list_t *child = NULL; 17435e2174acSceastha file_list_t *child_end = NULL; 17445e2174acSceastha file_list_t *cptr; 17457c478bd9Sstevel@tonic-gate struct dirent *dp; 17467c478bd9Sstevel@tonic-gate DIR *dirp; 17477c478bd9Sstevel@tonic-gate int i; 17487c478bd9Sstevel@tonic-gate int split; 17497c478bd9Sstevel@tonic-gate int dirfd = -1; 17507c478bd9Sstevel@tonic-gate int rc = PUT_NOTAS_LINK; 17517c478bd9Sstevel@tonic-gate int archtype = 0; 1752da6c28aaSamw int rw_sysattr = 0; 17537c478bd9Sstevel@tonic-gate char newparent[PATH_MAX + MAXNAMLEN + 1]; 17547c478bd9Sstevel@tonic-gate char *prefix = ""; 17557c478bd9Sstevel@tonic-gate char *tmpbuf; 17567c478bd9Sstevel@tonic-gate char goodbuf[PRESIZ + 2]; 17577c478bd9Sstevel@tonic-gate char junkbuf[MAXNAM+1]; 17587c478bd9Sstevel@tonic-gate char *lastslash; 17597c478bd9Sstevel@tonic-gate int j; 17607c478bd9Sstevel@tonic-gate struct stat sbuf; 17617c478bd9Sstevel@tonic-gate int readlink_max; 17627c478bd9Sstevel@tonic-gate 17637c478bd9Sstevel@tonic-gate (void) memset(goodbuf, '\0', sizeof (goodbuf)); 17647c478bd9Sstevel@tonic-gate (void) memset(junkbuf, '\0', sizeof (junkbuf)); 17657c478bd9Sstevel@tonic-gate 17667c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 17677c478bd9Sstevel@tonic-gate 17687c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) { 1769da6c28aaSamw attrparent = attrinfo->attr_parent; 1770da6c28aaSamw longattrname = attrinfo->attr_path; 1771da6c28aaSamw dirfd = attrinfo->attr_parentfd; 1772ced83f9bSceastha rw_sysattr = attrinfo->attr_rw_sysattr; 17737c478bd9Sstevel@tonic-gate } else { 17747c478bd9Sstevel@tonic-gate dirfd = open(".", O_RDONLY); 17757c478bd9Sstevel@tonic-gate } 17767c478bd9Sstevel@tonic-gate 17777c478bd9Sstevel@tonic-gate if (dirfd == -1) { 17787c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 1779da6c28aaSamw "tar: unable to open%sdirectory %s%s%s%s\n"), 17807c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? gettext(" attribute ") : " ", 1781da6c28aaSamw (attrparent == NULL) ? "" : gettext("of attribute "), 1782da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 1783da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 17847c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? longname : parent); 17857c478bd9Sstevel@tonic-gate goto out; 17867c478bd9Sstevel@tonic-gate } 17877c478bd9Sstevel@tonic-gate 17887c478bd9Sstevel@tonic-gate if (lev > MAXLEV) { 17897c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 17907c478bd9Sstevel@tonic-gate gettext("tar: directory nesting too deep, %s not dumped\n"), 17917c478bd9Sstevel@tonic-gate longname); 17927c478bd9Sstevel@tonic-gate goto out; 17937c478bd9Sstevel@tonic-gate } 17947c478bd9Sstevel@tonic-gate 1795da6c28aaSamw if (getstat(dirfd, longname, shortname, attrparent)) 17967c478bd9Sstevel@tonic-gate goto out; 17977c478bd9Sstevel@tonic-gate 17987c478bd9Sstevel@tonic-gate if (hflag) { 17997c478bd9Sstevel@tonic-gate /* 18007c478bd9Sstevel@tonic-gate * Catch nesting where a file is a symlink to its directory. 18017c478bd9Sstevel@tonic-gate */ 18027c478bd9Sstevel@tonic-gate j = fstatat(dirfd, shortname, &sbuf, AT_SYMLINK_NOFOLLOW); 18037c478bd9Sstevel@tonic-gate if (S_ISLNK(sbuf.st_mode)) { 18047c478bd9Sstevel@tonic-gate if (symlink_lev++ >= MAXSYMLINKS) { 18057c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 18067c478bd9Sstevel@tonic-gate "tar: %s: Number of symbolic links " 18077c478bd9Sstevel@tonic-gate "encountered during path name traversal " 18087c478bd9Sstevel@tonic-gate "exceeds MAXSYMLINKS\n"), longname); 18097c478bd9Sstevel@tonic-gate Errflg = 1; 18107c478bd9Sstevel@tonic-gate goto out; 18117c478bd9Sstevel@tonic-gate } 18127c478bd9Sstevel@tonic-gate } 18137c478bd9Sstevel@tonic-gate } 18147c478bd9Sstevel@tonic-gate 18157c478bd9Sstevel@tonic-gate /* 18167c478bd9Sstevel@tonic-gate * Check if the input file is the same as the tar file we 18177c478bd9Sstevel@tonic-gate * are creating 18187c478bd9Sstevel@tonic-gate */ 18197c478bd9Sstevel@tonic-gate if ((mt_ino == stbuf.st_ino) && (mt_dev == stbuf.st_dev)) { 18207c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 1821da6c28aaSamw "tar: %s%s%s%s%s same as archive file\n"), 1822da6c28aaSamw rw_sysattr ? gettext("system ") : "", 1823da6c28aaSamw (longattrname == NULL) ? "" : gettext("attribute "), 1824da6c28aaSamw (longattrname == NULL) ? "" : longattrname, 1825da6c28aaSamw (longattrname == NULL) ? "" : gettext(" of "), 1826da6c28aaSamw longname); 18277c478bd9Sstevel@tonic-gate Errflg = 1; 18287c478bd9Sstevel@tonic-gate goto out; 18297c478bd9Sstevel@tonic-gate } 18307c478bd9Sstevel@tonic-gate /* 18317c478bd9Sstevel@tonic-gate * Check size limit - we can't archive files that 18327c478bd9Sstevel@tonic-gate * exceed TAR_OFFSET_MAX bytes because of header 18337c478bd9Sstevel@tonic-gate * limitations. Exclude file types that set 18347c478bd9Sstevel@tonic-gate * st_size to zero below because they take no 18357c478bd9Sstevel@tonic-gate * archive space to represent contents. 18367c478bd9Sstevel@tonic-gate */ 18377c478bd9Sstevel@tonic-gate if ((stbuf.st_size > (off_t)TAR_OFFSET_MAX) && 18387c478bd9Sstevel@tonic-gate !S_ISDIR(stbuf.st_mode) && 18397c478bd9Sstevel@tonic-gate !S_ISCHR(stbuf.st_mode) && 18407c478bd9Sstevel@tonic-gate !S_ISBLK(stbuf.st_mode) && 18417c478bd9Sstevel@tonic-gate (Eflag == 0)) { 18427c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 1843da6c28aaSamw "tar: %s%s%s%s%s too large to archive. " 1844da6c28aaSamw "Use E function modifier.\n"), 1845da6c28aaSamw rw_sysattr ? gettext("system ") : "", 1846da6c28aaSamw (longattrname == NULL) ? "" : gettext("attribute "), 1847da6c28aaSamw (longattrname == NULL) ? "" : longattrname, 1848da6c28aaSamw (longattrname == NULL) ? "" : gettext(" of "), 1849da6c28aaSamw longname); 18507c478bd9Sstevel@tonic-gate if (errflag) 18517c478bd9Sstevel@tonic-gate exitflag = 1; 18527c478bd9Sstevel@tonic-gate Errflg = 1; 18537c478bd9Sstevel@tonic-gate goto out; 18547c478bd9Sstevel@tonic-gate } 18557c478bd9Sstevel@tonic-gate 18567c478bd9Sstevel@tonic-gate if (tfile != NULL && checkupdate(longname) == 0) { 18577c478bd9Sstevel@tonic-gate goto out; 18587c478bd9Sstevel@tonic-gate } 18597c478bd9Sstevel@tonic-gate if (checkw('r', longname) == 0) { 18607c478bd9Sstevel@tonic-gate goto out; 18617c478bd9Sstevel@tonic-gate } 18627c478bd9Sstevel@tonic-gate 18633a1dab68SRich Burridge if (Fflag && 18643a1dab68SRich Burridge checkf(longname, (stbuf.st_mode & S_IFMT) == S_IFDIR, Fflag) == 0) 18657c478bd9Sstevel@tonic-gate goto out; 18667c478bd9Sstevel@tonic-gate 18677c478bd9Sstevel@tonic-gate if (Xflag) { 18687c478bd9Sstevel@tonic-gate if (is_in_table(exclude_tbl, longname)) { 18697c478bd9Sstevel@tonic-gate if (vflag) { 18707c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 18717c478bd9Sstevel@tonic-gate "a %s excluded\n"), longname); 18727c478bd9Sstevel@tonic-gate } 18737c478bd9Sstevel@tonic-gate goto out; 18747c478bd9Sstevel@tonic-gate } 18757c478bd9Sstevel@tonic-gate } 18767c478bd9Sstevel@tonic-gate 18777c478bd9Sstevel@tonic-gate /* 18787c478bd9Sstevel@tonic-gate * If the length of the fullname is greater than MAXNAM, 18797c478bd9Sstevel@tonic-gate * print out a message and return (unless extended headers are used, 18807c478bd9Sstevel@tonic-gate * in which case fullname is limited to PATH_MAX). 18817c478bd9Sstevel@tonic-gate */ 18827c478bd9Sstevel@tonic-gate 18837c478bd9Sstevel@tonic-gate if ((((split = (int)strlen(longname)) > MAXNAM) && (Eflag == 0)) || 18847c478bd9Sstevel@tonic-gate (split > PATH_MAX)) { 18857c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 18867c478bd9Sstevel@tonic-gate "tar: %s: file name too long\n"), longname); 18877c478bd9Sstevel@tonic-gate if (errflag) 18887c478bd9Sstevel@tonic-gate exitflag = 1; 18897c478bd9Sstevel@tonic-gate Errflg = 1; 18907c478bd9Sstevel@tonic-gate goto out; 18917c478bd9Sstevel@tonic-gate } 18927c478bd9Sstevel@tonic-gate 18937c478bd9Sstevel@tonic-gate /* 18947c478bd9Sstevel@tonic-gate * We split the fullname into prefix and name components if any one 18957c478bd9Sstevel@tonic-gate * of three conditions holds: 18967c478bd9Sstevel@tonic-gate * -- the length of the fullname exceeds NAMSIZ, 18977c478bd9Sstevel@tonic-gate * -- the length of the fullname equals NAMSIZ, and the shortname 18987c478bd9Sstevel@tonic-gate * is less than NAMSIZ, (splitting in this case preserves 18997c478bd9Sstevel@tonic-gate * compatibility with 5.6 and 5.5.1 tar), or 19007c478bd9Sstevel@tonic-gate * -- the length of the fullname equals NAMSIZ, the file is a 19017c478bd9Sstevel@tonic-gate * directory and we are not in POSIX-conformant mode (where 19027c478bd9Sstevel@tonic-gate * trailing slashes are removed from directories). 19037c478bd9Sstevel@tonic-gate */ 19047c478bd9Sstevel@tonic-gate if ((split > NAMSIZ) || 19057c478bd9Sstevel@tonic-gate (split == NAMSIZ && strlen(shortname) < NAMSIZ) || 19064bc0a2efScasper (split == NAMSIZ && S_ISDIR(stbuf.st_mode) && !Pflag)) { 19077c478bd9Sstevel@tonic-gate /* 19087c478bd9Sstevel@tonic-gate * Since path is limited to PRESIZ characters, look for the 19097c478bd9Sstevel@tonic-gate * last slash within PRESIZ + 1 characters only. 19107c478bd9Sstevel@tonic-gate */ 19117c478bd9Sstevel@tonic-gate (void) strncpy(&goodbuf[0], longname, min(split, PRESIZ + 1)); 19127c478bd9Sstevel@tonic-gate tmpbuf = goodbuf; 19137c478bd9Sstevel@tonic-gate lastslash = strrchr(tmpbuf, '/'); 19147c478bd9Sstevel@tonic-gate if (lastslash == NULL) { 19157c478bd9Sstevel@tonic-gate i = split; /* Length of name */ 19167c478bd9Sstevel@tonic-gate j = 0; /* Length of prefix */ 19177c478bd9Sstevel@tonic-gate goodbuf[0] = '\0'; 19187c478bd9Sstevel@tonic-gate } else { 19197c478bd9Sstevel@tonic-gate *lastslash = '\0'; /* Terminate the prefix */ 19207c478bd9Sstevel@tonic-gate j = strlen(tmpbuf); 19217c478bd9Sstevel@tonic-gate i = split - j - 1; 19227c478bd9Sstevel@tonic-gate } 19237c478bd9Sstevel@tonic-gate /* 19247c478bd9Sstevel@tonic-gate * If the filename is greater than NAMSIZ we can't 19257c478bd9Sstevel@tonic-gate * archive the file unless we are using extended headers. 19267c478bd9Sstevel@tonic-gate */ 19274bc0a2efScasper if ((i > NAMSIZ) || (i == NAMSIZ && S_ISDIR(stbuf.st_mode) && 19287c478bd9Sstevel@tonic-gate !Pflag)) { 19297c478bd9Sstevel@tonic-gate /* Determine which (filename or path) is too long. */ 19307c478bd9Sstevel@tonic-gate lastslash = strrchr(longname, '/'); 19317c478bd9Sstevel@tonic-gate if (lastslash != NULL) 19327c478bd9Sstevel@tonic-gate i = strlen(lastslash + 1); 19337c478bd9Sstevel@tonic-gate if (Eflag > 0) { 19347c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_PATH; 19357c478bd9Sstevel@tonic-gate Xtarhdr.x_path = longname; 19367c478bd9Sstevel@tonic-gate if (i <= NAMSIZ) 19377c478bd9Sstevel@tonic-gate (void) strcpy(junkbuf, lastslash + 1); 19387c478bd9Sstevel@tonic-gate else 19397c478bd9Sstevel@tonic-gate (void) sprintf(junkbuf, "%llu", 19407c478bd9Sstevel@tonic-gate xhdr_count + 1); 19417c478bd9Sstevel@tonic-gate if (split - i - 1 > PRESIZ) 19427c478bd9Sstevel@tonic-gate (void) strcpy(goodbuf, xhdr_dirname); 19437c478bd9Sstevel@tonic-gate } else { 19447c478bd9Sstevel@tonic-gate if ((i > NAMSIZ) || (i == NAMSIZ && 19454bc0a2efScasper S_ISDIR(stbuf.st_mode) && !Pflag)) 19467c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 19477c478bd9Sstevel@tonic-gate "tar: %s: filename is greater than " 19487c478bd9Sstevel@tonic-gate "%d\n"), lastslash == NULL ? 19497c478bd9Sstevel@tonic-gate longname : lastslash + 1, NAMSIZ); 19507c478bd9Sstevel@tonic-gate else 19517c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 19527c478bd9Sstevel@tonic-gate "tar: %s: prefix is greater than %d" 19537c478bd9Sstevel@tonic-gate "\n"), longname, PRESIZ); 19547c478bd9Sstevel@tonic-gate if (errflag) 19557c478bd9Sstevel@tonic-gate exitflag = 1; 19567c478bd9Sstevel@tonic-gate Errflg = 1; 19577c478bd9Sstevel@tonic-gate goto out; 19587c478bd9Sstevel@tonic-gate } 19597c478bd9Sstevel@tonic-gate } else 19607c478bd9Sstevel@tonic-gate (void) strncpy(&junkbuf[0], longname + j + 1, 19617c478bd9Sstevel@tonic-gate strlen(longname + j + 1)); 19627c478bd9Sstevel@tonic-gate name = junkbuf; 19637c478bd9Sstevel@tonic-gate prefix = goodbuf; 19647c478bd9Sstevel@tonic-gate } else { 19657c478bd9Sstevel@tonic-gate name = longname; 19667c478bd9Sstevel@tonic-gate } 19677c478bd9Sstevel@tonic-gate if (Aflag) { 19687c478bd9Sstevel@tonic-gate if ((prefix != NULL) && (*prefix != '\0')) 19697c478bd9Sstevel@tonic-gate while (*prefix == '/') 19707c478bd9Sstevel@tonic-gate ++prefix; 19717c478bd9Sstevel@tonic-gate else 19727c478bd9Sstevel@tonic-gate while (*name == '/') 19737c478bd9Sstevel@tonic-gate ++name; 19747c478bd9Sstevel@tonic-gate } 19757c478bd9Sstevel@tonic-gate 19767c478bd9Sstevel@tonic-gate switch (stbuf.st_mode & S_IFMT) { 19777c478bd9Sstevel@tonic-gate case S_IFDIR: 19787c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 19797c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 19807c478bd9Sstevel@tonic-gate 19817c478bd9Sstevel@tonic-gate if (filetype != XATTR_FILE && Hiddendir == 0) { 19827c478bd9Sstevel@tonic-gate i = 0; 19837c478bd9Sstevel@tonic-gate cp = buf; 19847c478bd9Sstevel@tonic-gate while ((*cp++ = longname[i++])) 19857c478bd9Sstevel@tonic-gate ; 19867c478bd9Sstevel@tonic-gate *--cp = '/'; 19877c478bd9Sstevel@tonic-gate *++cp = 0; 19887c478bd9Sstevel@tonic-gate } 19897c478bd9Sstevel@tonic-gate if (!oflag) { 19907c478bd9Sstevel@tonic-gate tomodes(&stbuf); 19917c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '5', filetype, 19927c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) { 19937c478bd9Sstevel@tonic-gate goto out; 19947c478bd9Sstevel@tonic-gate } 19957c478bd9Sstevel@tonic-gate if (!Pflag) { 19967c478bd9Sstevel@tonic-gate /* 19977c478bd9Sstevel@tonic-gate * Old archives require a slash at the end 19987c478bd9Sstevel@tonic-gate * of a directory name. 19997c478bd9Sstevel@tonic-gate * 20007c478bd9Sstevel@tonic-gate * XXX 20017c478bd9Sstevel@tonic-gate * If directory name is too long, will 20027c478bd9Sstevel@tonic-gate * slash overfill field? 20037c478bd9Sstevel@tonic-gate */ 20047c478bd9Sstevel@tonic-gate if (strlen(name) > (unsigned)NAMSIZ-1) { 20057c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 20067c478bd9Sstevel@tonic-gate "tar: %s: filename is greater " 20077c478bd9Sstevel@tonic-gate "than %d\n"), name, NAMSIZ); 20087c478bd9Sstevel@tonic-gate if (errflag) 20097c478bd9Sstevel@tonic-gate exitflag = 1; 20107c478bd9Sstevel@tonic-gate Errflg = 1; 20117c478bd9Sstevel@tonic-gate goto out; 20127c478bd9Sstevel@tonic-gate } else { 20137c478bd9Sstevel@tonic-gate if (strlen(name) == (NAMSIZ - 1)) { 20147c478bd9Sstevel@tonic-gate (void) memcpy(dblock.dbuf.name, 20157c478bd9Sstevel@tonic-gate name, NAMSIZ); 20167c478bd9Sstevel@tonic-gate dblock.dbuf.name[NAMSIZ-1] 20177c478bd9Sstevel@tonic-gate = '/'; 20187c478bd9Sstevel@tonic-gate } else 20197c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.name, 20207c478bd9Sstevel@tonic-gate "%s/", name); 20217c478bd9Sstevel@tonic-gate 20227c478bd9Sstevel@tonic-gate /* 20237c478bd9Sstevel@tonic-gate * need to recalculate checksum 20247c478bd9Sstevel@tonic-gate * because the name changed. 20257c478bd9Sstevel@tonic-gate */ 20267c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, 20277c478bd9Sstevel@tonic-gate "%07o", checksum(&dblock)); 20287c478bd9Sstevel@tonic-gate } 20297c478bd9Sstevel@tonic-gate } 20307c478bd9Sstevel@tonic-gate 2031da6c28aaSamw if (put_extra_attributes(longname, shortname, 2032da6c28aaSamw longattrname, prefix, filetype, '5') != 0) 20337c478bd9Sstevel@tonic-gate goto out; 20347c478bd9Sstevel@tonic-gate 20357c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 20367c478bd9Sstevel@tonic-gate /* 20377c478bd9Sstevel@tonic-gate * Reset header typeflag when archiving directory, since 20387c478bd9Sstevel@tonic-gate * build_dblock changed it on us. 20397c478bd9Sstevel@tonic-gate */ 20407c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) { 20417c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = _XATTR_HDRTYPE; 20427c478bd9Sstevel@tonic-gate } else { 20437c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '5'; 20447c478bd9Sstevel@tonic-gate } 20457c478bd9Sstevel@tonic-gate #else 20467c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '5'; 20477c478bd9Sstevel@tonic-gate #endif 20487c478bd9Sstevel@tonic-gate 20497c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", 20507c478bd9Sstevel@tonic-gate checksum(&dblock)); 20517c478bd9Sstevel@tonic-gate 20527c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 20537c478bd9Sstevel@tonic-gate } 20547c478bd9Sstevel@tonic-gate if (vflag) { 20557c478bd9Sstevel@tonic-gate #ifdef DEBUG 20567c478bd9Sstevel@tonic-gate if (NotTape) 20577c478bd9Sstevel@tonic-gate DEBUG("seek = %" FMT_blkcnt_t "K\t", K(tapepos), 20587c478bd9Sstevel@tonic-gate 0); 20597c478bd9Sstevel@tonic-gate #endif 20607c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE && Hiddendir) { 20618e4a71aeSRich Burridge (void) fprintf(vfile, 20628e4a71aeSRich Burridge gettext("a %s attribute %s "), 2063da6c28aaSamw longname, longattrname); 20647c478bd9Sstevel@tonic-gate 20657c478bd9Sstevel@tonic-gate } else { 20667c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "a %s/ ", longname); 20677c478bd9Sstevel@tonic-gate } 20687c478bd9Sstevel@tonic-gate if (NotTape) 20697c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n", 20707c478bd9Sstevel@tonic-gate K(blocks)); 20717c478bd9Sstevel@tonic-gate else 20727c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" FMT_blkcnt_t 20737c478bd9Sstevel@tonic-gate " tape blocks\n"), blocks); 20747c478bd9Sstevel@tonic-gate } 20757c478bd9Sstevel@tonic-gate 20767c478bd9Sstevel@tonic-gate /* 20777c478bd9Sstevel@tonic-gate * If hidden dir then break now since xattrs_put() will do 20787c478bd9Sstevel@tonic-gate * the iterating of the directory. 20797c478bd9Sstevel@tonic-gate * 2080da6c28aaSamw * At the moment, there can only be system attributes on 2081da6c28aaSamw * attributes. There can be no attributes on attributes or 2082da6c28aaSamw * directories within the attributes hidden directory hierarchy. 20837c478bd9Sstevel@tonic-gate */ 20847c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) 20857c478bd9Sstevel@tonic-gate break; 20867c478bd9Sstevel@tonic-gate 20877c478bd9Sstevel@tonic-gate if (*shortname != '/') 20887c478bd9Sstevel@tonic-gate (void) sprintf(newparent, "%s/%s", parent, shortname); 20897c478bd9Sstevel@tonic-gate else 20907c478bd9Sstevel@tonic-gate (void) sprintf(newparent, "%s", shortname); 20917c478bd9Sstevel@tonic-gate 2092b25dbf38SRich Burridge if (tar_chdir(shortname) < 0) { 20937c478bd9Sstevel@tonic-gate vperror(0, "%s", newparent); 20947c478bd9Sstevel@tonic-gate goto out; 20957c478bd9Sstevel@tonic-gate } 20967c478bd9Sstevel@tonic-gate 20977c478bd9Sstevel@tonic-gate if ((dirp = opendir(".")) == NULL) { 20987c478bd9Sstevel@tonic-gate vperror(0, gettext( 20997c478bd9Sstevel@tonic-gate "can't open directory %s"), longname); 2100b25dbf38SRich Burridge if (tar_chdir(parent) < 0) 21017c478bd9Sstevel@tonic-gate vperror(0, gettext("cannot change back?: %s"), 21027c478bd9Sstevel@tonic-gate parent); 21037c478bd9Sstevel@tonic-gate goto out; 21047c478bd9Sstevel@tonic-gate } 21057c478bd9Sstevel@tonic-gate 21065e2174acSceastha /* 21075e2174acSceastha * Create a list of files (children) in this directory to avoid 21085e2174acSceastha * having to perform telldir()/seekdir(). 21095e2174acSceastha */ 21107c478bd9Sstevel@tonic-gate while ((dp = readdir(dirp)) != NULL && !term) { 21117c478bd9Sstevel@tonic-gate if ((strcmp(".", dp->d_name) == 0) || 21127c478bd9Sstevel@tonic-gate (strcmp("..", dp->d_name) == 0)) 21137c478bd9Sstevel@tonic-gate continue; 21145e2174acSceastha if (((cptr = (file_list_t *)calloc(sizeof (char), 21155e2174acSceastha sizeof (file_list_t))) == NULL) || 21165e2174acSceastha ((cptr->name = strdup(dp->d_name)) == NULL)) { 21175e2174acSceastha vperror(1, gettext( 21185e2174acSceastha "Insufficient memory for directory " 21195e2174acSceastha "list entry %s/%s\n"), 21205e2174acSceastha newparent, dp->d_name); 21215e2174acSceastha } 21227c478bd9Sstevel@tonic-gate 21235e2174acSceastha /* Add the file to the list */ 21245e2174acSceastha if (child == NULL) { 21255e2174acSceastha child = cptr; 21265e2174acSceastha } else { 21275e2174acSceastha child_end->next = cptr; 21285e2174acSceastha } 21295e2174acSceastha child_end = cptr; 21305e2174acSceastha } 21315e2174acSceastha (void) closedir(dirp); 21325e2174acSceastha 21335e2174acSceastha /* 21345e2174acSceastha * Archive each of the files in the current directory. 21355e2174acSceastha * If a file is a directory, putfile() is called 21365e2174acSceastha * recursively to archive the file hierarchy of the 21375e2174acSceastha * directory before archiving the next file in the 21385e2174acSceastha * current directory. 21395e2174acSceastha */ 21405e2174acSceastha while ((child != NULL) && !term) { 21415e2174acSceastha (void) strcpy(cp, child->name); 2142da6c28aaSamw archtype = putfile(buf, cp, newparent, NULL, 21437c478bd9Sstevel@tonic-gate NORMAL_FILE, lev + 1, symlink_lev); 21447c478bd9Sstevel@tonic-gate 21457c478bd9Sstevel@tonic-gate if (!exitflag) { 2146da6c28aaSamw if ((atflag || saflag) && 2147da6c28aaSamw (archtype == PUT_NOTAS_LINK)) { 2148da6c28aaSamw xattrs_put(buf, cp, newparent, NULL); 21497c478bd9Sstevel@tonic-gate } 21507c478bd9Sstevel@tonic-gate } 21517c478bd9Sstevel@tonic-gate if (exitflag) 21527c478bd9Sstevel@tonic-gate break; 21537c478bd9Sstevel@tonic-gate 21545e2174acSceastha /* Free each child as we are done processing it. */ 21555e2174acSceastha cptr = child; 21565e2174acSceastha child = child->next; 21575e2174acSceastha free(cptr->name); 21585e2174acSceastha free(cptr); 21597c478bd9Sstevel@tonic-gate } 21605e2174acSceastha if ((child != NULL) && !term) { 21615e2174acSceastha free_children(child); 21627c478bd9Sstevel@tonic-gate } 21637c478bd9Sstevel@tonic-gate 2164b25dbf38SRich Burridge if (tar_chdir(parent) < 0) { 21657c478bd9Sstevel@tonic-gate vperror(0, gettext("cannot change back?: %s"), parent); 21667c478bd9Sstevel@tonic-gate } 21677c478bd9Sstevel@tonic-gate 21687c478bd9Sstevel@tonic-gate break; 21697c478bd9Sstevel@tonic-gate 21707c478bd9Sstevel@tonic-gate case S_IFLNK: 21717c478bd9Sstevel@tonic-gate readlink_max = NAMSIZ; 21727c478bd9Sstevel@tonic-gate if (stbuf.st_size > NAMSIZ) { 21737c478bd9Sstevel@tonic-gate if (Eflag > 0) { 21747c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_LINKPATH; 21757c478bd9Sstevel@tonic-gate readlink_max = PATH_MAX; 21767c478bd9Sstevel@tonic-gate } else { 21777c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 21787c478bd9Sstevel@tonic-gate "tar: %s: symbolic link too long\n"), 21797c478bd9Sstevel@tonic-gate longname); 21807c478bd9Sstevel@tonic-gate if (errflag) 21817c478bd9Sstevel@tonic-gate exitflag = 1; 21827c478bd9Sstevel@tonic-gate Errflg = 1; 21837c478bd9Sstevel@tonic-gate goto out; 21847c478bd9Sstevel@tonic-gate } 21857c478bd9Sstevel@tonic-gate } 21867c478bd9Sstevel@tonic-gate /* 21877c478bd9Sstevel@tonic-gate * Sym-links need header size of zero since you 21887c478bd9Sstevel@tonic-gate * don't store any data for this type. 21897c478bd9Sstevel@tonic-gate */ 21907c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 21917c478bd9Sstevel@tonic-gate tomodes(&stbuf); 21927c478bd9Sstevel@tonic-gate i = readlink(shortname, filetmp, readlink_max); 21937c478bd9Sstevel@tonic-gate if (i < 0) { 21947c478bd9Sstevel@tonic-gate vperror(0, gettext( 21957c478bd9Sstevel@tonic-gate "can't read symbolic link %s"), longname); 21967c478bd9Sstevel@tonic-gate goto out; 21977c478bd9Sstevel@tonic-gate } else { 21987c478bd9Sstevel@tonic-gate filetmp[i] = 0; 21997c478bd9Sstevel@tonic-gate } 22007c478bd9Sstevel@tonic-gate if (vflag) 22017c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 22027c478bd9Sstevel@tonic-gate "a %s symbolic link to %s\n"), 22037c478bd9Sstevel@tonic-gate longname, filetmp); 22047c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) { 22057c478bd9Sstevel@tonic-gate Xtarhdr.x_linkpath = filetmp; 22067c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '2', filetype, &stbuf, 22077c478bd9Sstevel@tonic-gate stbuf.st_dev, prefix) != 0) 22087c478bd9Sstevel@tonic-gate goto out; 22097c478bd9Sstevel@tonic-gate } else 22107c478bd9Sstevel@tonic-gate if (build_dblock(name, filetmp, '2', filetype, &stbuf, 22117c478bd9Sstevel@tonic-gate stbuf.st_dev, prefix) != 0) 22127c478bd9Sstevel@tonic-gate goto out; 22137c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 22147c478bd9Sstevel@tonic-gate /* 22157c478bd9Sstevel@tonic-gate * No acls for symlinks: mode is always 777 22167c478bd9Sstevel@tonic-gate * dont call write ancillary 22177c478bd9Sstevel@tonic-gate */ 22187c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 22197c478bd9Sstevel@tonic-gate break; 22207c478bd9Sstevel@tonic-gate case S_IFREG: 22217c478bd9Sstevel@tonic-gate if ((infile = openat(dirfd, shortname, 0)) < 0) { 22228e4a71aeSRich Burridge vperror(0, gettext("unable to open %s%s%s%s"), longname, 2223da6c28aaSamw rw_sysattr ? gettext(" system") : "", 22247c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? 22257c478bd9Sstevel@tonic-gate gettext(" attribute ") : "", 2226da6c28aaSamw (filetype == XATTR_FILE) ? (longattrname == NULL) ? 2227da6c28aaSamw shortname : longattrname : ""); 22287c478bd9Sstevel@tonic-gate goto out; 22297c478bd9Sstevel@tonic-gate } 22307c478bd9Sstevel@tonic-gate 22317c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 22327c478bd9Sstevel@tonic-gate 2233da6c28aaSamw if (put_link(name, longname, shortname, longattrname, 22347c478bd9Sstevel@tonic-gate prefix, filetype, '1') == 0) { 22357c478bd9Sstevel@tonic-gate (void) close(infile); 22367c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 22377c478bd9Sstevel@tonic-gate goto out; 22387c478bd9Sstevel@tonic-gate } 22397c478bd9Sstevel@tonic-gate 22407c478bd9Sstevel@tonic-gate tomodes(&stbuf); 22417c478bd9Sstevel@tonic-gate 22427c478bd9Sstevel@tonic-gate /* correctly handle end of volume */ 22437c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) { 22447c478bd9Sstevel@tonic-gate /* split if floppy has some room and file is large */ 22457c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) && 22467c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) { 22477c478bd9Sstevel@tonic-gate splitfile(longname, infile, 22487c478bd9Sstevel@tonic-gate name, prefix, filetype); 22497c478bd9Sstevel@tonic-gate (void) close(dirfd); 22507c478bd9Sstevel@tonic-gate (void) close(infile); 22517c478bd9Sstevel@tonic-gate goto out; 22527c478bd9Sstevel@tonic-gate } 22537c478bd9Sstevel@tonic-gate newvol(); /* not worth it--just get new volume */ 22547c478bd9Sstevel@tonic-gate } 22557c478bd9Sstevel@tonic-gate #ifdef DEBUG 22567c478bd9Sstevel@tonic-gate DEBUG("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname, 22577c478bd9Sstevel@tonic-gate blocks); 22587c478bd9Sstevel@tonic-gate #endif 22597c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '0', filetype, 22607c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) { 22617c478bd9Sstevel@tonic-gate goto out; 22627c478bd9Sstevel@tonic-gate } 22637c478bd9Sstevel@tonic-gate if (vflag) { 22647c478bd9Sstevel@tonic-gate #ifdef DEBUG 22657c478bd9Sstevel@tonic-gate if (NotTape) 22667c478bd9Sstevel@tonic-gate DEBUG("seek = %" FMT_blkcnt_t "K\t", K(tapepos), 22677c478bd9Sstevel@tonic-gate 0); 22687c478bd9Sstevel@tonic-gate #endif 2269da6c28aaSamw (void) fprintf(vfile, "a %s%s%s%s ", longname, 2270da6c28aaSamw rw_sysattr ? gettext(" system") : "", 2271da6c28aaSamw (filetype == XATTR_FILE) ? gettext( 2272da6c28aaSamw " attribute ") : "", 22737c478bd9Sstevel@tonic-gate (filetype == XATTR_FILE) ? 2274da6c28aaSamw longattrname : ""); 22757c478bd9Sstevel@tonic-gate if (NotTape) 22767c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n", 22777c478bd9Sstevel@tonic-gate K(blocks)); 22787c478bd9Sstevel@tonic-gate else 22797c478bd9Sstevel@tonic-gate (void) fprintf(vfile, 22807c478bd9Sstevel@tonic-gate gettext("%" FMT_blkcnt_t " tape blocks\n"), 22817c478bd9Sstevel@tonic-gate blocks); 22827c478bd9Sstevel@tonic-gate } 22837c478bd9Sstevel@tonic-gate 2284da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname, 2285da6c28aaSamw prefix, filetype, '0') != 0) 22867c478bd9Sstevel@tonic-gate goto out; 22877c478bd9Sstevel@tonic-gate 22887c478bd9Sstevel@tonic-gate /* 22897c478bd9Sstevel@tonic-gate * No need to reset typeflag for extended attribute here, since 22907c478bd9Sstevel@tonic-gate * put_extra_attributes already set it and we haven't called 22917c478bd9Sstevel@tonic-gate * build_dblock(). 22927c478bd9Sstevel@tonic-gate */ 22937c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 22947c478bd9Sstevel@tonic-gate hint = writetbuf((char *)&dblock, 1); 2295eace40a5Sceastha maxread = max(min(stbuf.st_blksize, stbuf.st_size), 2296eace40a5Sceastha (nblock * TBLOCK)); 22977c478bd9Sstevel@tonic-gate if ((bigbuf = calloc((unsigned)maxread, sizeof (char))) == 0) { 22987c478bd9Sstevel@tonic-gate maxread = TBLOCK; 22997c478bd9Sstevel@tonic-gate bigbuf = buf; 23007c478bd9Sstevel@tonic-gate } 23017c478bd9Sstevel@tonic-gate 23027c478bd9Sstevel@tonic-gate while (((i = (int) 23037c478bd9Sstevel@tonic-gate read(infile, bigbuf, min((hint*TBLOCK), maxread))) > 0) && 23047c478bd9Sstevel@tonic-gate blocks) { 23057c478bd9Sstevel@tonic-gate blkcnt_t nblks; 23067c478bd9Sstevel@tonic-gate 23077c478bd9Sstevel@tonic-gate nblks = ((i-1)/TBLOCK)+1; 23087c478bd9Sstevel@tonic-gate if (nblks > blocks) 23097c478bd9Sstevel@tonic-gate nblks = blocks; 23107c478bd9Sstevel@tonic-gate hint = writetbuf(bigbuf, nblks); 23117c478bd9Sstevel@tonic-gate blocks -= nblks; 23127c478bd9Sstevel@tonic-gate } 23137c478bd9Sstevel@tonic-gate (void) close(infile); 23147c478bd9Sstevel@tonic-gate if (bigbuf != buf) 23157c478bd9Sstevel@tonic-gate free(bigbuf); 23167c478bd9Sstevel@tonic-gate if (i < 0) 23177c478bd9Sstevel@tonic-gate vperror(0, gettext("Read error on %s"), longname); 23187c478bd9Sstevel@tonic-gate else if (blocks != 0 || i != 0) { 23197c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 23207c478bd9Sstevel@tonic-gate "tar: %s: file changed size\n"), longname); 23217c478bd9Sstevel@tonic-gate if (errflag) { 23227c478bd9Sstevel@tonic-gate exitflag = 1; 23237c478bd9Sstevel@tonic-gate Errflg = 1; 23247c478bd9Sstevel@tonic-gate } else if (!Dflag) { 23257c478bd9Sstevel@tonic-gate Errflg = 1; 23267c478bd9Sstevel@tonic-gate } 23277c478bd9Sstevel@tonic-gate } 23287c478bd9Sstevel@tonic-gate putempty(blocks); 23297c478bd9Sstevel@tonic-gate break; 23307c478bd9Sstevel@tonic-gate case S_IFIFO: 23317c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 23327c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 23337c478bd9Sstevel@tonic-gate 2334da6c28aaSamw if (put_link(name, longname, shortname, longattrname, 23357c478bd9Sstevel@tonic-gate prefix, filetype, '6') == 0) { 23367c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 23377c478bd9Sstevel@tonic-gate goto out; 23387c478bd9Sstevel@tonic-gate } 23397c478bd9Sstevel@tonic-gate tomodes(&stbuf); 23407c478bd9Sstevel@tonic-gate 23417c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) { 23427c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) && 23437c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) { 23447c478bd9Sstevel@tonic-gate splitfile(longname, infile, name, 23457c478bd9Sstevel@tonic-gate prefix, filetype); 23467c478bd9Sstevel@tonic-gate (void) close(dirfd); 23477c478bd9Sstevel@tonic-gate (void) close(infile); 23487c478bd9Sstevel@tonic-gate goto out; 23497c478bd9Sstevel@tonic-gate } 23507c478bd9Sstevel@tonic-gate newvol(); 23517c478bd9Sstevel@tonic-gate } 23527c478bd9Sstevel@tonic-gate #ifdef DEBUG 23537c478bd9Sstevel@tonic-gate DEBUG("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname, 23547c478bd9Sstevel@tonic-gate blocks); 23557c478bd9Sstevel@tonic-gate #endif 23567c478bd9Sstevel@tonic-gate if (vflag) { 23577c478bd9Sstevel@tonic-gate #ifdef DEBUG 23587c478bd9Sstevel@tonic-gate if (NotTape) 23597c478bd9Sstevel@tonic-gate DEBUG("seek = %" FMT_blkcnt_t "K\t", K(tapepos), 23607c478bd9Sstevel@tonic-gate 0); 23617c478bd9Sstevel@tonic-gate #endif 23627c478bd9Sstevel@tonic-gate if (NotTape) 23637c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %" 23647c478bd9Sstevel@tonic-gate FMT_blkcnt_t "K\n "), longname, K(blocks)); 23657c478bd9Sstevel@tonic-gate else 23667c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 23677c478bd9Sstevel@tonic-gate "a %s %" FMT_blkcnt_t " tape blocks\n"), 23687c478bd9Sstevel@tonic-gate longname, blocks); 23697c478bd9Sstevel@tonic-gate } 23707c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '6', filetype, 23717c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) 23727c478bd9Sstevel@tonic-gate goto out; 23737c478bd9Sstevel@tonic-gate 2374da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname, 2375da6c28aaSamw prefix, filetype, '6') != 0) 23767c478bd9Sstevel@tonic-gate goto out; 23777c478bd9Sstevel@tonic-gate 23787c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 23797c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '6'; 23807c478bd9Sstevel@tonic-gate 23817c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 23827c478bd9Sstevel@tonic-gate break; 23837c478bd9Sstevel@tonic-gate case S_IFCHR: 23847c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 23857c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 2386da6c28aaSamw if (put_link(name, longname, shortname, longattrname, 2387da6c28aaSamw prefix, filetype, '3') == 0) { 23887c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 23897c478bd9Sstevel@tonic-gate goto out; 23907c478bd9Sstevel@tonic-gate } 23917c478bd9Sstevel@tonic-gate tomodes(&stbuf); 23927c478bd9Sstevel@tonic-gate 23937c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) { 23947c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) && 23957c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) { 23967c478bd9Sstevel@tonic-gate splitfile(longname, infile, name, 23977c478bd9Sstevel@tonic-gate prefix, filetype); 23987c478bd9Sstevel@tonic-gate (void) close(dirfd); 23997c478bd9Sstevel@tonic-gate goto out; 24007c478bd9Sstevel@tonic-gate } 24017c478bd9Sstevel@tonic-gate newvol(); 24027c478bd9Sstevel@tonic-gate } 24037c478bd9Sstevel@tonic-gate #ifdef DEBUG 24047c478bd9Sstevel@tonic-gate DEBUG("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname, 24057c478bd9Sstevel@tonic-gate blocks); 24067c478bd9Sstevel@tonic-gate #endif 24077c478bd9Sstevel@tonic-gate if (vflag) { 24087c478bd9Sstevel@tonic-gate #ifdef DEBUG 24097c478bd9Sstevel@tonic-gate if (NotTape) 24107c478bd9Sstevel@tonic-gate DEBUG("seek = %" FMT_blkcnt_t "K\t", K(tapepos), 24117c478bd9Sstevel@tonic-gate 0); 24127c478bd9Sstevel@tonic-gate #endif 24137c478bd9Sstevel@tonic-gate if (NotTape) 24147c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %" 24157c478bd9Sstevel@tonic-gate FMT_blkcnt_t "K\n"), longname, K(blocks)); 24167c478bd9Sstevel@tonic-gate else 24177c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %" 24187c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), longname, 24197c478bd9Sstevel@tonic-gate blocks); 24207c478bd9Sstevel@tonic-gate } 24217c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '3', 24227c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_rdev, prefix) != 0) 24237c478bd9Sstevel@tonic-gate goto out; 24247c478bd9Sstevel@tonic-gate 2425da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname, 24267c478bd9Sstevel@tonic-gate prefix, filetype, '3') != 0) 24277c478bd9Sstevel@tonic-gate goto out; 24287c478bd9Sstevel@tonic-gate 24297c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 24307c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '3'; 24317c478bd9Sstevel@tonic-gate 24327c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 24337c478bd9Sstevel@tonic-gate break; 24347c478bd9Sstevel@tonic-gate case S_IFBLK: 24357c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 24367c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); 2437da6c28aaSamw if (put_link(name, longname, shortname, longattrname, 2438da6c28aaSamw prefix, filetype, '4') == 0) { 24397c478bd9Sstevel@tonic-gate rc = PUT_AS_LINK; 24407c478bd9Sstevel@tonic-gate goto out; 24417c478bd9Sstevel@tonic-gate } 24427c478bd9Sstevel@tonic-gate tomodes(&stbuf); 24437c478bd9Sstevel@tonic-gate 24447c478bd9Sstevel@tonic-gate while (mulvol && tapepos + blocks + 1 > blocklim) { 24457c478bd9Sstevel@tonic-gate if (((blocklim - tapepos) >= EXTMIN) && 24467c478bd9Sstevel@tonic-gate ((blocks + 1) >= blocklim/10)) { 24477c478bd9Sstevel@tonic-gate splitfile(longname, infile, 24487c478bd9Sstevel@tonic-gate name, prefix, filetype); 24497c478bd9Sstevel@tonic-gate (void) close(dirfd); 24507c478bd9Sstevel@tonic-gate goto out; 24517c478bd9Sstevel@tonic-gate } 24527c478bd9Sstevel@tonic-gate newvol(); 24537c478bd9Sstevel@tonic-gate } 24547c478bd9Sstevel@tonic-gate #ifdef DEBUG 24557c478bd9Sstevel@tonic-gate DEBUG("putfile: %s wants %" FMT_blkcnt_t " blocks\n", longname, 24567c478bd9Sstevel@tonic-gate blocks); 24577c478bd9Sstevel@tonic-gate #endif 24587c478bd9Sstevel@tonic-gate if (vflag) { 24597c478bd9Sstevel@tonic-gate #ifdef DEBUG 24607c478bd9Sstevel@tonic-gate if (NotTape) 24617c478bd9Sstevel@tonic-gate DEBUG("seek = %" FMT_blkcnt_t "K\t", K(tapepos), 24627c478bd9Sstevel@tonic-gate 0); 24637c478bd9Sstevel@tonic-gate #endif 24647c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "a %s ", longname); 24657c478bd9Sstevel@tonic-gate if (NotTape) 24667c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n", 24677c478bd9Sstevel@tonic-gate K(blocks)); 24687c478bd9Sstevel@tonic-gate else 24697c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 24707c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), blocks); 24717c478bd9Sstevel@tonic-gate } 24727c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '4', 24737c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_rdev, prefix) != 0) 24747c478bd9Sstevel@tonic-gate goto out; 24757c478bd9Sstevel@tonic-gate 2476da6c28aaSamw if (put_extra_attributes(longname, shortname, longattrname, 24777c478bd9Sstevel@tonic-gate prefix, filetype, '4') != 0) 24787c478bd9Sstevel@tonic-gate goto out; 24797c478bd9Sstevel@tonic-gate 24807c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 24817c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = '4'; 24827c478bd9Sstevel@tonic-gate 24837c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 24847c478bd9Sstevel@tonic-gate break; 24857c478bd9Sstevel@tonic-gate default: 24867c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 24877c478bd9Sstevel@tonic-gate "tar: %s is not a file. Not dumped\n"), longname); 24887c478bd9Sstevel@tonic-gate if (errflag) 24897c478bd9Sstevel@tonic-gate exitflag = 1; 24907c478bd9Sstevel@tonic-gate Errflg = 1; 24917c478bd9Sstevel@tonic-gate goto out; 24927c478bd9Sstevel@tonic-gate } 24937c478bd9Sstevel@tonic-gate 24947c478bd9Sstevel@tonic-gate out: 2495da6c28aaSamw if ((dirfd != -1) && (filetype != XATTR_FILE)) { 24967c478bd9Sstevel@tonic-gate (void) close(dirfd); 24977c478bd9Sstevel@tonic-gate } 24987c478bd9Sstevel@tonic-gate return (rc); 24997c478bd9Sstevel@tonic-gate } 25007c478bd9Sstevel@tonic-gate 25017c478bd9Sstevel@tonic-gate 25027c478bd9Sstevel@tonic-gate /* 25037c478bd9Sstevel@tonic-gate * splitfile dump a large file across volumes 25047c478bd9Sstevel@tonic-gate * 25057c478bd9Sstevel@tonic-gate * splitfile(longname, fd); 25067c478bd9Sstevel@tonic-gate * char *longname; full name of file 25077c478bd9Sstevel@tonic-gate * int ifd; input file descriptor 25087c478bd9Sstevel@tonic-gate * 25097c478bd9Sstevel@tonic-gate * NOTE: only called by putfile() to dump a large file. 25107c478bd9Sstevel@tonic-gate */ 25117c478bd9Sstevel@tonic-gate 25127c478bd9Sstevel@tonic-gate static void 25137c478bd9Sstevel@tonic-gate splitfile(char *longname, int ifd, char *name, char *prefix, int filetype) 25147c478bd9Sstevel@tonic-gate { 25157c478bd9Sstevel@tonic-gate blkcnt_t blocks; 25167c478bd9Sstevel@tonic-gate off_t bytes, s; 25177c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 25187c478bd9Sstevel@tonic-gate int i, extents; 25197c478bd9Sstevel@tonic-gate 25207c478bd9Sstevel@tonic-gate blocks = TBLOCKS(stbuf.st_size); /* blocks file needs */ 25217c478bd9Sstevel@tonic-gate 25227c478bd9Sstevel@tonic-gate /* 25237c478bd9Sstevel@tonic-gate * # extents = 25247c478bd9Sstevel@tonic-gate * size of file after using up rest of this floppy 25257c478bd9Sstevel@tonic-gate * blocks - (blocklim - tapepos) + 1 (for header) 25267c478bd9Sstevel@tonic-gate * plus roundup value before divide by blocklim-1 25277c478bd9Sstevel@tonic-gate * + (blocklim - 1) - 1 25287c478bd9Sstevel@tonic-gate * all divided by blocklim-1 (one block for each header). 25297c478bd9Sstevel@tonic-gate * this gives 25307c478bd9Sstevel@tonic-gate * (blocks - blocklim + tapepos + 1 + blocklim - 2)/(blocklim-1) 25317c478bd9Sstevel@tonic-gate * which reduces to the expression used. 25327c478bd9Sstevel@tonic-gate * one is added to account for this first extent. 25337c478bd9Sstevel@tonic-gate * 25347c478bd9Sstevel@tonic-gate * When one is dealing with extremely large archives, one may want 25357c478bd9Sstevel@tonic-gate * to allow for a large number of extents. This code should be 25367c478bd9Sstevel@tonic-gate * revisited to determine if extents should be changed to something 25377c478bd9Sstevel@tonic-gate * larger than an int. 25387c478bd9Sstevel@tonic-gate */ 25397c478bd9Sstevel@tonic-gate extents = (int)((blocks + tapepos - 1ULL)/(blocklim - 1ULL) + 1); 25407c478bd9Sstevel@tonic-gate 25417c478bd9Sstevel@tonic-gate if (extents < 2 || extents > MAXEXT) { /* let's be reasonable */ 25427c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 25437c478bd9Sstevel@tonic-gate "tar: %s needs unusual number of volumes to split\n" 25447c478bd9Sstevel@tonic-gate "tar: %s not dumped\n"), longname, longname); 25457c478bd9Sstevel@tonic-gate return; 25467c478bd9Sstevel@tonic-gate } 25477c478bd9Sstevel@tonic-gate if (build_dblock(name, tchar, '0', filetype, 25487c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix) != 0) 25497c478bd9Sstevel@tonic-gate return; 25507c478bd9Sstevel@tonic-gate 25517c478bd9Sstevel@tonic-gate dblock.dbuf.extotal = extents; 25527c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 25537c478bd9Sstevel@tonic-gate 25547c478bd9Sstevel@tonic-gate /* 25557c478bd9Sstevel@tonic-gate * The value contained in dblock.dbuf.efsize was formerly used when the 25567c478bd9Sstevel@tonic-gate * v flag was specified in conjunction with the t flag. Although it is 25577c478bd9Sstevel@tonic-gate * no longer used, older versions of tar will expect the former 25587c478bd9Sstevel@tonic-gate * behaviour, so we must continue to write it to the archive. 25597c478bd9Sstevel@tonic-gate * 25607c478bd9Sstevel@tonic-gate * Since dblock.dbuf.efsize is 10 chars in size, the maximum value it 25617c478bd9Sstevel@tonic-gate * can store is TAR_EFSIZE_MAX. If bytes exceeds that value, simply 25627c478bd9Sstevel@tonic-gate * store 0. 25637c478bd9Sstevel@tonic-gate */ 25647c478bd9Sstevel@tonic-gate if (bytes <= TAR_EFSIZE_MAX) 25657c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.efsize, "%9" FMT_off_t_o, bytes); 25667c478bd9Sstevel@tonic-gate else 25677c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.efsize, "%9" FMT_off_t_o, (off_t)0); 25687c478bd9Sstevel@tonic-gate 25697c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 25707c478bd9Sstevel@tonic-gate "tar: large file %s needs %d extents.\n" 25717c478bd9Sstevel@tonic-gate "tar: current device seek position = %" FMT_blkcnt_t "K\n"), 25727c478bd9Sstevel@tonic-gate longname, extents, K(tapepos)); 25737c478bd9Sstevel@tonic-gate 25747c478bd9Sstevel@tonic-gate s = (off_t)(blocklim - tapepos - 1) * TBLOCK; 25757c478bd9Sstevel@tonic-gate for (i = 1; i <= extents; i++) { 25767c478bd9Sstevel@tonic-gate if (i > 1) { 25777c478bd9Sstevel@tonic-gate newvol(); 25787c478bd9Sstevel@tonic-gate if (i == extents) 25797c478bd9Sstevel@tonic-gate s = bytes; /* last ext. gets true bytes */ 25807c478bd9Sstevel@tonic-gate else 25817c478bd9Sstevel@tonic-gate s = (off_t)(blocklim - 1)*TBLOCK; /* all */ 25827c478bd9Sstevel@tonic-gate } 25837c478bd9Sstevel@tonic-gate bytes -= s; 25847c478bd9Sstevel@tonic-gate blocks = TBLOCKS(s); 25857c478bd9Sstevel@tonic-gate 25867c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o, s); 25877c478bd9Sstevel@tonic-gate dblock.dbuf.extno = i; 25887c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 25897c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 25907c478bd9Sstevel@tonic-gate 25917c478bd9Sstevel@tonic-gate if (vflag) 25927c478bd9Sstevel@tonic-gate (void) fprintf(vfile, 25938e4a71aeSRich Burridge gettext("+++ a %s %" FMT_blkcnt_t 25948e4a71aeSRich Burridge "K [extent #%d of %d]\n"), 25957c478bd9Sstevel@tonic-gate longname, K(blocks), i, extents); 25967c478bd9Sstevel@tonic-gate while (blocks && read(ifd, buf, TBLOCK) > 0) { 25977c478bd9Sstevel@tonic-gate blocks--; 25987c478bd9Sstevel@tonic-gate (void) writetbuf(buf, 1); 25997c478bd9Sstevel@tonic-gate } 26007c478bd9Sstevel@tonic-gate if (blocks != 0) { 26017c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 26027c478bd9Sstevel@tonic-gate "tar: %s: file changed size\n"), longname); 26037c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 26047c478bd9Sstevel@tonic-gate "tar: aborting split file %s\n"), longname); 26057c478bd9Sstevel@tonic-gate (void) close(ifd); 26067c478bd9Sstevel@tonic-gate return; 26077c478bd9Sstevel@tonic-gate } 26087c478bd9Sstevel@tonic-gate } 26097c478bd9Sstevel@tonic-gate (void) close(ifd); 26107c478bd9Sstevel@tonic-gate if (vflag) 26117c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("a %s %" FMT_off_t "K (in %d " 26127c478bd9Sstevel@tonic-gate "extents)\n"), longname, K(TBLOCKS(stbuf.st_size)), 26137c478bd9Sstevel@tonic-gate extents); 26147c478bd9Sstevel@tonic-gate } 26157c478bd9Sstevel@tonic-gate 26167c478bd9Sstevel@tonic-gate /* 26177c478bd9Sstevel@tonic-gate * convtoreg - determines whether the file should be converted to a 26187c478bd9Sstevel@tonic-gate * regular file when extracted 26197c478bd9Sstevel@tonic-gate * 26207c478bd9Sstevel@tonic-gate * Returns 1 when file size > 0 and typeflag is not recognized 26217c478bd9Sstevel@tonic-gate * Otherwise returns 0 26227c478bd9Sstevel@tonic-gate */ 26237c478bd9Sstevel@tonic-gate static int 26247c478bd9Sstevel@tonic-gate convtoreg(off_t size) 26257c478bd9Sstevel@tonic-gate { 26267c478bd9Sstevel@tonic-gate if ((size > 0) && (dblock.dbuf.typeflag != '0') && 26277c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != NULL) && (dblock.dbuf.typeflag != '1') && 26287c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != '2') && (dblock.dbuf.typeflag != '3') && 26297c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != '4') && (dblock.dbuf.typeflag != '5') && 26307c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != '6') && (dblock.dbuf.typeflag != 'A') && 2631e765faefSRich Burridge (dblock.dbuf.typeflag != 'L') && 26327c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != _XATTR_HDRTYPE) && 26337c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag != 'X')) { 26347c478bd9Sstevel@tonic-gate return (1); 26357c478bd9Sstevel@tonic-gate } 26367c478bd9Sstevel@tonic-gate return (0); 26377c478bd9Sstevel@tonic-gate } 26387c478bd9Sstevel@tonic-gate 2639da6c28aaSamw #if defined(O_XATTR) 2640da6c28aaSamw static int 2641da6c28aaSamw save_cwd(void) 2642da6c28aaSamw { 2643da6c28aaSamw return (open(".", O_RDONLY)); 2644da6c28aaSamw } 2645da6c28aaSamw #endif 2646da6c28aaSamw 2647da6c28aaSamw #if defined(O_XATTR) 2648da6c28aaSamw static void 2649da6c28aaSamw rest_cwd(int *cwd) 2650da6c28aaSamw { 2651da6c28aaSamw if (*cwd != -1) { 2652da6c28aaSamw if (fchdir(*cwd) < 0) { 2653da6c28aaSamw vperror(0, gettext( 2654da6c28aaSamw "Cannot fchdir to attribute directory")); 2655da6c28aaSamw exit(1); 2656da6c28aaSamw } 2657da6c28aaSamw (void) close(*cwd); 2658da6c28aaSamw *cwd = -1; 2659da6c28aaSamw } 2660da6c28aaSamw } 2661da6c28aaSamw #endif 2662da6c28aaSamw 2663da6c28aaSamw /* 2664da6c28aaSamw * Verify the underlying file system supports the attribute type. 2665da6c28aaSamw * Only archive extended attribute files when '-@' was specified. 2666da6c28aaSamw * Only archive system extended attribute files if '-/' was specified. 2667da6c28aaSamw */ 2668da6c28aaSamw #if defined(O_XATTR) 2669da6c28aaSamw static attr_status_t 2670ced83f9bSceastha verify_attr_support(char *filename, int attrflg, arc_action_t actflag, 2671ced83f9bSceastha int *ext_attrflg) 2672da6c28aaSamw { 2673da6c28aaSamw /* 2674ced83f9bSceastha * Verify extended attributes are supported/exist. We only 2675ced83f9bSceastha * need to check if we are processing a base file, not an 2676ced83f9bSceastha * extended attribute. 2677da6c28aaSamw */ 2678ced83f9bSceastha if (attrflg) { 2679ced83f9bSceastha *ext_attrflg = (pathconf(filename, (actflag == ARC_CREATE) ? 2680ced83f9bSceastha _PC_XATTR_EXISTS : _PC_XATTR_ENABLED) == 1); 2681ced83f9bSceastha } 2682ced83f9bSceastha 2683da6c28aaSamw if (atflag) { 2684ced83f9bSceastha if (!*ext_attrflg) { 2685da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 2686da6c28aaSamw if (saflag) { 2687da6c28aaSamw /* Verify system attributes are supported */ 2688da6c28aaSamw if (sysattr_support(filename, 2689da6c28aaSamw (actflag == ARC_CREATE) ? _PC_SATTR_EXISTS : 2690da6c28aaSamw _PC_SATTR_ENABLED) != 1) { 2691da6c28aaSamw return (ATTR_SATTR_ERR); 2692da6c28aaSamw } 2693da6c28aaSamw } else 2694da6c28aaSamw return (ATTR_XATTR_ERR); 2695da6c28aaSamw #else 2696da6c28aaSamw return (ATTR_XATTR_ERR); 2697da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 2698da6c28aaSamw } 2699da6c28aaSamw 2700da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 2701da6c28aaSamw } else if (saflag) { 2702da6c28aaSamw /* Verify system attributes are supported */ 2703da6c28aaSamw if (sysattr_support(filename, (actflag == ARC_CREATE) ? 2704da6c28aaSamw _PC_SATTR_EXISTS : _PC_SATTR_ENABLED) != 1) { 2705da6c28aaSamw return (ATTR_SATTR_ERR); 2706da6c28aaSamw } 2707da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 2708da6c28aaSamw } else { 2709da6c28aaSamw return (ATTR_SKIP); 2710da6c28aaSamw } 2711da6c28aaSamw 2712da6c28aaSamw return (ATTR_OK); 2713da6c28aaSamw } 2714da6c28aaSamw #endif 2715da6c28aaSamw 2716da6c28aaSamw #if defined(O_XATTR) 2717da6c28aaSamw /* 2718da6c28aaSamw * Recursively open attribute directories until the attribute directory 2719da6c28aaSamw * containing the specified attribute, attrname, is opened. 2720da6c28aaSamw * 2721da6c28aaSamw * Currently, only 2 directory levels of attributes are supported, (i.e., 2722da6c28aaSamw * extended system attributes on extended attributes). The following are 2723da6c28aaSamw * the possible input combinations: 2724da6c28aaSamw * 1. Open the attribute directory of the base file (don't change 2725da6c28aaSamw * into it). 2726da6c28aaSamw * attrinfo->parent = NULL 2727da6c28aaSamw * attrname = '.' 2728da6c28aaSamw * 2. Open the attribute directory of the base file and change into it. 2729da6c28aaSamw * attrinfo->parent = NULL 2730da6c28aaSamw * attrname = <attr> | <sys_attr> 2731da6c28aaSamw * 3. Open the attribute directory of the base file, change into it, 2732da6c28aaSamw * then recursively call open_attr_dir() to open the attribute's 2733da6c28aaSamw * parent directory (don't change into it). 2734da6c28aaSamw * attrinfo->parent = <attr> 2735da6c28aaSamw * attrname = '.' 2736da6c28aaSamw * 4. Open the attribute directory of the base file, change into it, 2737da6c28aaSamw * then recursively call open_attr_dir() to open the attribute's 2738da6c28aaSamw * parent directory and change into it. 2739da6c28aaSamw * attrinfo->parent = <attr> 2740da6c28aaSamw * attrname = <attr> | <sys_attr> 2741da6c28aaSamw * 2742da6c28aaSamw * An attribute directory will be opened only if the underlying file system 2743da6c28aaSamw * supports the attribute type, and if the command line specifications (atflag 2744da6c28aaSamw * and saflag) enable the processing of the attribute type. 2745da6c28aaSamw * 2746da6c28aaSamw * On succesful return, attrinfo->parentfd will be the file descriptor of the 2747da6c28aaSamw * opened attribute directory. In addition, if the attribute is a read-write 2748da6c28aaSamw * extended system attribute, attrinfo->rw_sysattr will be set to 1, otherwise 2749da6c28aaSamw * it will be set to 0. 2750da6c28aaSamw * 2751da6c28aaSamw * Possible return values: 2752da6c28aaSamw * ATTR_OK Successfully opened and, if needed, changed into the 2753da6c28aaSamw * attribute directory containing attrname. 2754da6c28aaSamw * ATTR_SKIP The command line specifications don't enable the 2755da6c28aaSamw * processing of the attribute type. 2756da6c28aaSamw * ATTR_CHDIR_ERR An error occurred while trying to change into an 2757da6c28aaSamw * attribute directory. 2758da6c28aaSamw * ATTR_OPEN_ERR An error occurred while trying to open an 2759da6c28aaSamw * attribute directory. 2760da6c28aaSamw * ATTR_XATTR_ERR The underlying file system doesn't support extended 2761da6c28aaSamw * attributes. 2762da6c28aaSamw * ATTR_SATTR_ERR The underlying file system doesn't support extended 2763da6c28aaSamw * system attributes. 2764da6c28aaSamw */ 2765da6c28aaSamw static int 2766da6c28aaSamw open_attr_dir(char *attrname, char *dirp, int cwd, attr_data_t *attrinfo) 2767da6c28aaSamw { 2768da6c28aaSamw attr_status_t rc; 2769da6c28aaSamw int firsttime = (attrinfo->attr_parentfd == -1); 2770da6c28aaSamw int saveerrno; 2771ced83f9bSceastha int ext_attr; 2772da6c28aaSamw 2773da6c28aaSamw /* 2774da6c28aaSamw * open_attr_dir() was recursively called (input combination number 4), 2775da6c28aaSamw * close the previously opened file descriptor as we've already changed 2776da6c28aaSamw * into it. 2777da6c28aaSamw */ 2778da6c28aaSamw if (!firsttime) { 2779da6c28aaSamw (void) close(attrinfo->attr_parentfd); 2780da6c28aaSamw attrinfo->attr_parentfd = -1; 2781da6c28aaSamw } 2782da6c28aaSamw 2783da6c28aaSamw /* 2784da6c28aaSamw * Verify that the underlying file system supports the restoration 2785da6c28aaSamw * of the attribute. 2786da6c28aaSamw */ 2787ced83f9bSceastha if ((rc = verify_attr_support(dirp, firsttime, ARC_RESTORE, 2788ced83f9bSceastha &ext_attr)) != ATTR_OK) { 2789da6c28aaSamw return (rc); 2790da6c28aaSamw } 2791da6c28aaSamw 2792da6c28aaSamw /* Open the base file's attribute directory */ 2793da6c28aaSamw if ((attrinfo->attr_parentfd = attropen(dirp, ".", O_RDONLY)) == -1) { 2794da6c28aaSamw /* 2795da6c28aaSamw * Save the errno from the attropen so it can be reported 2796da6c28aaSamw * if the retry of the attropen fails. 2797da6c28aaSamw */ 2798da6c28aaSamw saveerrno = errno; 2799da6c28aaSamw if ((attrinfo->attr_parentfd = retry_open_attr(-1, cwd, dirp, 2800da6c28aaSamw NULL, ".", O_RDONLY, 0)) == -1) { 2801da6c28aaSamw /* 2802da6c28aaSamw * Reset typeflag back to real value so passtape 2803da6c28aaSamw * will skip ahead correctly. 2804da6c28aaSamw */ 2805da6c28aaSamw dblock.dbuf.typeflag = _XATTR_HDRTYPE; 2806da6c28aaSamw (void) close(attrinfo->attr_parentfd); 2807da6c28aaSamw attrinfo->attr_parentfd = -1; 2808da6c28aaSamw errno = saveerrno; 2809da6c28aaSamw return (ATTR_OPEN_ERR); 2810da6c28aaSamw } 2811da6c28aaSamw } 2812da6c28aaSamw 2813da6c28aaSamw /* 2814da6c28aaSamw * Change into the parent attribute's directory unless we are 2815da6c28aaSamw * processing the hidden attribute directory of the base file itself. 2816da6c28aaSamw */ 2817da6c28aaSamw if ((Hiddendir == 0) || (firsttime && attrinfo->attr_parent != NULL)) { 2818da6c28aaSamw if (fchdir(attrinfo->attr_parentfd) != 0) { 2819da6c28aaSamw saveerrno = errno; 2820da6c28aaSamw (void) close(attrinfo->attr_parentfd); 2821da6c28aaSamw attrinfo->attr_parentfd = -1; 2822da6c28aaSamw errno = saveerrno; 2823da6c28aaSamw return (ATTR_CHDIR_ERR); 2824da6c28aaSamw } 2825da6c28aaSamw } 2826da6c28aaSamw 2827da6c28aaSamw /* Determine if the attribute should be processed */ 2828da6c28aaSamw if ((rc = verify_attr(attrname, attrinfo->attr_parent, 1, 2829da6c28aaSamw &attrinfo->attr_rw_sysattr)) != ATTR_OK) { 2830da6c28aaSamw saveerrno = errno; 2831da6c28aaSamw (void) close(attrinfo->attr_parentfd); 2832da6c28aaSamw attrinfo->attr_parentfd = -1; 2833da6c28aaSamw errno = saveerrno; 2834da6c28aaSamw return (rc); 2835da6c28aaSamw } 2836da6c28aaSamw 2837da6c28aaSamw /* 2838da6c28aaSamw * If the attribute is an extended attribute, or extended system 2839da6c28aaSamw * attribute, of an attribute (i.e., <attr>/<sys_attr>), then 2840da6c28aaSamw * recursively call open_attr_dir() to open the attribute directory 2841da6c28aaSamw * of the parent attribute. 2842da6c28aaSamw */ 2843da6c28aaSamw if (firsttime && (attrinfo->attr_parent != NULL)) { 2844da6c28aaSamw return (open_attr_dir(attrname, attrinfo->attr_parent, 2845da6c28aaSamw attrinfo->attr_parentfd, attrinfo)); 2846da6c28aaSamw } 2847da6c28aaSamw 2848da6c28aaSamw return (ATTR_OK); 2849da6c28aaSamw } 2850da6c28aaSamw #endif 2851da6c28aaSamw 28527c478bd9Sstevel@tonic-gate static void 28537c478bd9Sstevel@tonic-gate doxtract(char *argv[]) 28547c478bd9Sstevel@tonic-gate { 28557c478bd9Sstevel@tonic-gate struct stat xtractbuf; /* stat on file after extracting */ 28567c478bd9Sstevel@tonic-gate blkcnt_t blocks; 28577c478bd9Sstevel@tonic-gate off_t bytes; 28587c478bd9Sstevel@tonic-gate int ofile; 28597c478bd9Sstevel@tonic-gate int newfile; /* Does the file already exist */ 28607c478bd9Sstevel@tonic-gate int xcnt = 0; /* count # files extracted */ 28617c478bd9Sstevel@tonic-gate int fcnt = 0; /* count # files in argv list */ 28627c478bd9Sstevel@tonic-gate int dir; 28637c478bd9Sstevel@tonic-gate int dirfd = -1; 2864da6c28aaSamw int cwd = -1; 2865ced83f9bSceastha int rw_sysattr; 2866da6c28aaSamw int saveerrno; 28677c478bd9Sstevel@tonic-gate uid_t Uid; 28687c478bd9Sstevel@tonic-gate char *namep, *dirp, *comp, *linkp; /* for removing absolute paths */ 28697c478bd9Sstevel@tonic-gate char dirname[PATH_MAX+1]; 28707c478bd9Sstevel@tonic-gate char templink[PATH_MAX+1]; /* temp link with terminating NULL */ 28717c478bd9Sstevel@tonic-gate int once = 1; 28727c478bd9Sstevel@tonic-gate int error; 28737c478bd9Sstevel@tonic-gate int symflag; 28747c478bd9Sstevel@tonic-gate int want; 2875da6c28aaSamw attr_data_t *attrinfo = NULL; /* attribute info */ 2876fa9e4066Sahrens acl_t *aclp = NULL; /* acl info */ 287745916cd2Sjpk char dot[] = "."; /* dirp for using realpath */ 28787c478bd9Sstevel@tonic-gate timestruc_t time_zero; /* used for call to doDirTimes */ 28797c478bd9Sstevel@tonic-gate int dircreate; 28807c478bd9Sstevel@tonic-gate int convflag; 28817c478bd9Sstevel@tonic-gate time_zero.tv_sec = 0; 28827c478bd9Sstevel@tonic-gate time_zero.tv_nsec = 0; 28837c478bd9Sstevel@tonic-gate 288445916cd2Sjpk /* reset Trusted Extensions variables */ 288545916cd2Sjpk rpath_flag = 0; 288645916cd2Sjpk lk_rpath_flag = 0; 288745916cd2Sjpk dir_flag = 0; 288845916cd2Sjpk mld_flag = 0; 288945916cd2Sjpk bslundef(&bs_label); 289045916cd2Sjpk bsllow(&admin_low); 289145916cd2Sjpk bslhigh(&admin_high); 289245916cd2Sjpk orig_namep = 0; 289345916cd2Sjpk 28947c478bd9Sstevel@tonic-gate dumping = 0; /* for newvol(), et al: we are not writing */ 28957c478bd9Sstevel@tonic-gate 28967c478bd9Sstevel@tonic-gate Uid = getuid(); 28977c478bd9Sstevel@tonic-gate 28987c478bd9Sstevel@tonic-gate for (;;) { 28997c478bd9Sstevel@tonic-gate convflag = 0; 29007c478bd9Sstevel@tonic-gate symflag = 0; 29017c478bd9Sstevel@tonic-gate dir = 0; 2902ced83f9bSceastha Hiddendir = 0; 2903ced83f9bSceastha rw_sysattr = 0; 29047c478bd9Sstevel@tonic-gate ofile = -1; 29057c478bd9Sstevel@tonic-gate 2906da6c28aaSamw if (dirfd != -1) { 2907da6c28aaSamw (void) close(dirfd); 2908da6c28aaSamw dirfd = -1; 2909da6c28aaSamw } 2910da6c28aaSamw if (ofile != -1) { 2911da6c28aaSamw if (close(ofile) != 0) 2912da6c28aaSamw vperror(2, gettext("close error")); 2913da6c28aaSamw } 2914da6c28aaSamw 29157c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 2916da6c28aaSamw if (cwd != -1) { 2917da6c28aaSamw rest_cwd(&cwd); 2918da6c28aaSamw } 2919da6c28aaSamw #endif 2920da6c28aaSamw 2921da6c28aaSamw /* namep is set by wantit to point to the full name */ 2922da6c28aaSamw if ((want = wantit(argv, &namep, &dirp, &comp, 2923da6c28aaSamw &attrinfo)) == 0) { 2924da6c28aaSamw #if defined(O_XATTR) 2925da6c28aaSamw if (xattrp != NULL) { 29267c478bd9Sstevel@tonic-gate free(xattrhead); 29277c478bd9Sstevel@tonic-gate xattrp = NULL; 29287c478bd9Sstevel@tonic-gate xattr_linkp = NULL; 29297c478bd9Sstevel@tonic-gate xattrhead = NULL; 29307c478bd9Sstevel@tonic-gate } 29317c478bd9Sstevel@tonic-gate #endif 29327c478bd9Sstevel@tonic-gate continue; 29337c478bd9Sstevel@tonic-gate } 29347c478bd9Sstevel@tonic-gate if (want == -1) 29357c478bd9Sstevel@tonic-gate break; 29367c478bd9Sstevel@tonic-gate 293745916cd2Sjpk /* Trusted Extensions */ 293845916cd2Sjpk /* 293945916cd2Sjpk * During tar extract (x): 294045916cd2Sjpk * If the pathname of the restored file has been 294145916cd2Sjpk * reconstructed from the ancillary file, 294245916cd2Sjpk * use it to process the normal file. 294345916cd2Sjpk */ 294445916cd2Sjpk if (mld_flag) { /* Skip over .MLD. directory */ 294545916cd2Sjpk mld_flag = 0; 294645916cd2Sjpk passtape(); 294745916cd2Sjpk continue; 294845916cd2Sjpk } 294945916cd2Sjpk orig_namep = namep; /* save original */ 295045916cd2Sjpk if (rpath_flag) { 295145916cd2Sjpk namep = real_path; /* use zone path */ 295245916cd2Sjpk comp = real_path; /* use zone path */ 295345916cd2Sjpk dirp = dot; /* work from the top */ 295445916cd2Sjpk rpath_flag = 0; /* reset */ 295545916cd2Sjpk } 295645916cd2Sjpk 29577c478bd9Sstevel@tonic-gate if (dirfd != -1) 29587c478bd9Sstevel@tonic-gate (void) close(dirfd); 29597c478bd9Sstevel@tonic-gate 29607c478bd9Sstevel@tonic-gate (void) strcpy(&dirname[0], namep); 29617c478bd9Sstevel@tonic-gate dircreate = checkdir(&dirname[0]); 29627c478bd9Sstevel@tonic-gate 29637c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 2964da6c28aaSamw if (xattrp != NULL) { 2965da6c28aaSamw int rc; 29667c478bd9Sstevel@tonic-gate 2967da6c28aaSamw if (((cwd = save_cwd()) == -1) || 2968da6c28aaSamw ((rc = open_attr_dir(comp, dirp, cwd, 2969da6c28aaSamw attrinfo)) != ATTR_OK)) { 2970da6c28aaSamw if (cwd == -1) { 2971da6c28aaSamw vperror(0, gettext( 2972da6c28aaSamw "unable to save current working " 2973da6c28aaSamw "directory while processing " 2974da6c28aaSamw "attribute %s of %s"), 2975da6c28aaSamw dirp, attrinfo->attr_path); 2976da6c28aaSamw } else if (rc != ATTR_SKIP) { 2977d2443e76Smarks (void) fprintf(vfile, 2978d2443e76Smarks gettext("tar: cannot open " 2979da6c28aaSamw "%sattribute %s of file %s: %s\n"), 2980da6c28aaSamw attrinfo->attr_rw_sysattr ? gettext( 2981da6c28aaSamw "system ") : "", 2982da6c28aaSamw comp, dirp, strerror(errno)); 2983da6c28aaSamw } 2984d2443e76Smarks free(xattrhead); 2985d2443e76Smarks xattrp = NULL; 2986d2443e76Smarks xattr_linkp = NULL; 2987d2443e76Smarks xattrhead = NULL; 2988da6c28aaSamw 29897c478bd9Sstevel@tonic-gate passtape(); 29907c478bd9Sstevel@tonic-gate continue; 2991da6c28aaSamw } else { 2992da6c28aaSamw dirfd = attrinfo->attr_parentfd; 2993da6c28aaSamw rw_sysattr = attrinfo->attr_rw_sysattr; 29947c478bd9Sstevel@tonic-gate } 2995da6c28aaSamw } else { 2996da6c28aaSamw dirfd = open(dirp, O_RDONLY); 2997da6c28aaSamw } 2998da6c28aaSamw #else 2999da6c28aaSamw dirfd = open(dirp, O_RDONLY); 3000da6c28aaSamw #endif 3001da6c28aaSamw if (dirfd == -1) { 3002da6c28aaSamw (void) fprintf(vfile, gettext( 3003da6c28aaSamw "tar: cannot open %s: %s\n"), 3004da6c28aaSamw dirp, strerror(errno)); 3005da6c28aaSamw passtape(); 3006da6c28aaSamw continue; 30077c478bd9Sstevel@tonic-gate } 30087c478bd9Sstevel@tonic-gate 30097c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) 30107c478bd9Sstevel@tonic-gate (void) strcpy(templink, Xtarhdr.x_linkpath); 30117c478bd9Sstevel@tonic-gate else { 30127c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 30137c478bd9Sstevel@tonic-gate if (xattrp && dblock.dbuf.typeflag == '1') { 30147c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 30157c478bd9Sstevel@tonic-gate xattrp->h_names); 30167c478bd9Sstevel@tonic-gate } else { 30177c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 30187c478bd9Sstevel@tonic-gate dblock.dbuf.linkname); 30197c478bd9Sstevel@tonic-gate } 30207c478bd9Sstevel@tonic-gate #else 30217c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 30227c478bd9Sstevel@tonic-gate dblock.dbuf.linkname); 30237c478bd9Sstevel@tonic-gate #endif 30247c478bd9Sstevel@tonic-gate } 30257c478bd9Sstevel@tonic-gate 30267c478bd9Sstevel@tonic-gate if (Fflag) { 30273a1dab68SRich Burridge if (checkf(namep, is_directory(namep), Fflag) == 0) { 30287c478bd9Sstevel@tonic-gate passtape(); 30297c478bd9Sstevel@tonic-gate continue; 30307c478bd9Sstevel@tonic-gate } 30317c478bd9Sstevel@tonic-gate } 30327c478bd9Sstevel@tonic-gate 30337c478bd9Sstevel@tonic-gate if (checkw('x', namep) == 0) { 30347c478bd9Sstevel@tonic-gate passtape(); 30357c478bd9Sstevel@tonic-gate continue; 30367c478bd9Sstevel@tonic-gate } 30377c478bd9Sstevel@tonic-gate if (once) { 30387c478bd9Sstevel@tonic-gate if (strcmp(dblock.dbuf.magic, magic_type) == 0) { 30397c478bd9Sstevel@tonic-gate if (geteuid() == (uid_t)0) { 30407c478bd9Sstevel@tonic-gate checkflag = 1; 30417c478bd9Sstevel@tonic-gate pflag = 1; 30427c478bd9Sstevel@tonic-gate } else { 30437c478bd9Sstevel@tonic-gate /* get file creation mask */ 30447c478bd9Sstevel@tonic-gate Oumask = umask(0); 30457c478bd9Sstevel@tonic-gate (void) umask(Oumask); 30467c478bd9Sstevel@tonic-gate } 30477c478bd9Sstevel@tonic-gate once = 0; 30487c478bd9Sstevel@tonic-gate } else { 30497c478bd9Sstevel@tonic-gate if (geteuid() == (uid_t)0) { 30507c478bd9Sstevel@tonic-gate pflag = 1; 30517c478bd9Sstevel@tonic-gate checkflag = 2; 30527c478bd9Sstevel@tonic-gate } 30537c478bd9Sstevel@tonic-gate if (!pflag) { 30547c478bd9Sstevel@tonic-gate /* get file creation mask */ 30557c478bd9Sstevel@tonic-gate Oumask = umask(0); 30567c478bd9Sstevel@tonic-gate (void) umask(Oumask); 30577c478bd9Sstevel@tonic-gate } 30587c478bd9Sstevel@tonic-gate once = 0; 30597c478bd9Sstevel@tonic-gate } 30607c478bd9Sstevel@tonic-gate } 30617c478bd9Sstevel@tonic-gate 30627c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 30637c478bd9Sstevel@tonic-gate /* 30647c478bd9Sstevel@tonic-gate * Handle extraction of hidden attr dir. 30657c478bd9Sstevel@tonic-gate * Dir is automatically created, we only 30667c478bd9Sstevel@tonic-gate * need to update mode and perm's. 30677c478bd9Sstevel@tonic-gate */ 3068da6c28aaSamw if ((xattrp != NULL) && Hiddendir == 1) { 3069da6c28aaSamw bytes = stbuf.st_size; 3070da6c28aaSamw blocks = TBLOCKS(bytes); 3071da6c28aaSamw if (vflag) { 3072da6c28aaSamw (void) fprintf(vfile, 30738e4a71aeSRich Burridge "x %s%s%s, %" FMT_off_t " %s, ", namep, 3074da6c28aaSamw gettext(" attribute "), 30758e4a71aeSRich Burridge xattrapath, bytes, 30768e4a71aeSRich Burridge gettext("bytes")); 3077da6c28aaSamw if (NotTape) 3078da6c28aaSamw (void) fprintf(vfile, 3079da6c28aaSamw "%" FMT_blkcnt_t "K\n", K(blocks)); 3080da6c28aaSamw else 3081da6c28aaSamw (void) fprintf(vfile, gettext("%" 3082da6c28aaSamw FMT_blkcnt_t " tape blocks\n"), 3083da6c28aaSamw blocks); 3084da6c28aaSamw } 3085da6c28aaSamw 3086da6c28aaSamw /* 3087da6c28aaSamw * Set the permissions and mode of the attribute 3088da6c28aaSamw * unless the attribute is a system attribute (can't 3089da6c28aaSamw * successfully do this) or the hidden attribute 3090da6c28aaSamw * directory (".") of an attribute (when the attribute 3091da6c28aaSamw * is restored, the hidden attribute directory of an 3092da6c28aaSamw * attribute is transient). Note: when the permissions 3093da6c28aaSamw * and mode are set for the hidden attribute directory 3094da6c28aaSamw * of a file on a system supporting extended system 3095da6c28aaSamw * attributes, even though it returns successfully, it 3096da6c28aaSamw * will not have any affect since the attribute 3097da6c28aaSamw * directory is transient. 3098da6c28aaSamw */ 3099da6c28aaSamw if (attrinfo->attr_parent == NULL) { 31007c478bd9Sstevel@tonic-gate if (fchownat(dirfd, ".", stbuf.st_uid, 31017c478bd9Sstevel@tonic-gate stbuf.st_gid, 0) != 0) { 31027c478bd9Sstevel@tonic-gate vperror(0, gettext( 3103da6c28aaSamw "%s%s%s: failed to set ownership " 3104da6c28aaSamw "of attribute directory"), namep, 3105da6c28aaSamw gettext(" attribute "), xattrapath); 31067c478bd9Sstevel@tonic-gate } 31077c478bd9Sstevel@tonic-gate 31087c478bd9Sstevel@tonic-gate if (fchmod(dirfd, stbuf.st_mode) != 0) { 31097c478bd9Sstevel@tonic-gate vperror(0, gettext( 3110da6c28aaSamw "%s%s%s: failed to set permissions " 3111da6c28aaSamw "of attribute directory"), namep, 3112da6c28aaSamw gettext(" attribute "), xattrapath); 3113da6c28aaSamw } 31147c478bd9Sstevel@tonic-gate } 31157c478bd9Sstevel@tonic-gate goto filedone; 31167c478bd9Sstevel@tonic-gate } 31177c478bd9Sstevel@tonic-gate #endif 31187c478bd9Sstevel@tonic-gate 31197c478bd9Sstevel@tonic-gate if (dircreate && (!is_posix || dblock.dbuf.typeflag == '5')) { 31207c478bd9Sstevel@tonic-gate dir = 1; 31217c478bd9Sstevel@tonic-gate if (vflag) { 31228e4a71aeSRich Burridge (void) fprintf(vfile, "x %s, 0 %s, ", 31238e4a71aeSRich Burridge &dirname[0], gettext("bytes")); 31247c478bd9Sstevel@tonic-gate if (NotTape) 31257c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "0K\n"); 31267c478bd9Sstevel@tonic-gate else 31277c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 31287c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), 31297c478bd9Sstevel@tonic-gate (blkcnt_t)0); 31307c478bd9Sstevel@tonic-gate } 31317c478bd9Sstevel@tonic-gate goto filedone; 31327c478bd9Sstevel@tonic-gate } 31337c478bd9Sstevel@tonic-gate 31347c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '6') { /* FIFO */ 31357c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) { 31367c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 31377c478bd9Sstevel@tonic-gate (void) unlink(namep); 31387c478bd9Sstevel@tonic-gate } 31397c478bd9Sstevel@tonic-gate linkp = templink; 31407c478bd9Sstevel@tonic-gate if (*linkp != NULL) { 31417c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 31427c478bd9Sstevel@tonic-gate linkp++; 31437c478bd9Sstevel@tonic-gate if (link(linkp, namep) < 0) { 31447c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 31457c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep); 31467c478bd9Sstevel@tonic-gate continue; 31477c478bd9Sstevel@tonic-gate } 31487c478bd9Sstevel@tonic-gate if (vflag) 31497c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3150da6c28aaSamw "x %s linked to %s\n"), namep, 3151da6c28aaSamw linkp); 31527c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 31537c478bd9Sstevel@tonic-gate continue; 31547c478bd9Sstevel@tonic-gate } 31557c478bd9Sstevel@tonic-gate if (mknod(namep, (int)(Gen.g_mode|S_IFIFO), 31567c478bd9Sstevel@tonic-gate (int)Gen.g_devmajor) < 0) { 31577c478bd9Sstevel@tonic-gate vperror(0, gettext("%s: mknod failed"), namep); 31587c478bd9Sstevel@tonic-gate continue; 31597c478bd9Sstevel@tonic-gate } 31607c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 31617c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 31627c478bd9Sstevel@tonic-gate if (vflag) { 31637c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "x %s, %" FMT_off_t 31648e4a71aeSRich Burridge " %s, ", namep, bytes, gettext("bytes")); 31657c478bd9Sstevel@tonic-gate if (NotTape) 31667c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t 31677c478bd9Sstevel@tonic-gate "K\n", K(blocks)); 31687c478bd9Sstevel@tonic-gate else 31697c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 31707c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), 31717c478bd9Sstevel@tonic-gate blocks); 31727c478bd9Sstevel@tonic-gate } 31737c478bd9Sstevel@tonic-gate goto filedone; 31747c478bd9Sstevel@tonic-gate } 31757c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '3' && !Uid) { /* CHAR SPECIAL */ 31767c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) { 31777c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 31787c478bd9Sstevel@tonic-gate (void) unlink(namep); 31797c478bd9Sstevel@tonic-gate } 31807c478bd9Sstevel@tonic-gate linkp = templink; 31817c478bd9Sstevel@tonic-gate if (*linkp != NULL) { 31827c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 31837c478bd9Sstevel@tonic-gate linkp++; 31847c478bd9Sstevel@tonic-gate if (link(linkp, namep) < 0) { 31857c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 31867c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep); 31877c478bd9Sstevel@tonic-gate continue; 31887c478bd9Sstevel@tonic-gate } 31897c478bd9Sstevel@tonic-gate if (vflag) 31907c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3191da6c28aaSamw "x %s linked to %s\n"), namep, 3192da6c28aaSamw linkp); 31937c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 31947c478bd9Sstevel@tonic-gate continue; 31957c478bd9Sstevel@tonic-gate } 31967c478bd9Sstevel@tonic-gate if (mknod(namep, (int)(Gen.g_mode|S_IFCHR), 31977c478bd9Sstevel@tonic-gate (int)makedev(Gen.g_devmajor, Gen.g_devminor)) < 0) { 31987c478bd9Sstevel@tonic-gate vperror(0, gettext( 31997c478bd9Sstevel@tonic-gate "%s: mknod failed"), namep); 32007c478bd9Sstevel@tonic-gate continue; 32017c478bd9Sstevel@tonic-gate } 32027c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 32037c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 32047c478bd9Sstevel@tonic-gate if (vflag) { 32057c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "x %s, %" FMT_off_t 32068e4a71aeSRich Burridge " %s, ", namep, bytes, gettext("bytes")); 32077c478bd9Sstevel@tonic-gate if (NotTape) 32087c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t 32097c478bd9Sstevel@tonic-gate "K\n", K(blocks)); 32107c478bd9Sstevel@tonic-gate else 32117c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 32127c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), 32137c478bd9Sstevel@tonic-gate blocks); 32147c478bd9Sstevel@tonic-gate } 32157c478bd9Sstevel@tonic-gate goto filedone; 32167c478bd9Sstevel@tonic-gate } else if (dblock.dbuf.typeflag == '3' && Uid) { 32177c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 32187c478bd9Sstevel@tonic-gate "Can't create special %s\n"), namep); 32197c478bd9Sstevel@tonic-gate continue; 32207c478bd9Sstevel@tonic-gate } 32217c478bd9Sstevel@tonic-gate 32227c478bd9Sstevel@tonic-gate /* BLOCK SPECIAL */ 32237c478bd9Sstevel@tonic-gate 32247c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '4' && !Uid) { 32257c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) { 32267c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 32277c478bd9Sstevel@tonic-gate (void) unlink(namep); 32287c478bd9Sstevel@tonic-gate } 32297c478bd9Sstevel@tonic-gate linkp = templink; 32307c478bd9Sstevel@tonic-gate if (*linkp != NULL) { 32317c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 32327c478bd9Sstevel@tonic-gate linkp++; 32337c478bd9Sstevel@tonic-gate if (link(linkp, namep) < 0) { 32347c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 32357c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep); 32367c478bd9Sstevel@tonic-gate continue; 32377c478bd9Sstevel@tonic-gate } 32387c478bd9Sstevel@tonic-gate if (vflag) 32397c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3240da6c28aaSamw "x %s linked to %s\n"), namep, 3241da6c28aaSamw linkp); 32427c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 32437c478bd9Sstevel@tonic-gate continue; 32447c478bd9Sstevel@tonic-gate } 32457c478bd9Sstevel@tonic-gate if (mknod(namep, (int)(Gen.g_mode|S_IFBLK), 32467c478bd9Sstevel@tonic-gate (int)makedev(Gen.g_devmajor, Gen.g_devminor)) < 0) { 32477c478bd9Sstevel@tonic-gate vperror(0, gettext("%s: mknod failed"), namep); 32487c478bd9Sstevel@tonic-gate continue; 32497c478bd9Sstevel@tonic-gate } 32507c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 32517c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 32527c478bd9Sstevel@tonic-gate if (vflag) { 32537c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("x %s, %" 32547c478bd9Sstevel@tonic-gate FMT_off_t " bytes, "), namep, bytes); 32557c478bd9Sstevel@tonic-gate if (NotTape) 32567c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t 32577c478bd9Sstevel@tonic-gate "K\n", K(blocks)); 32587c478bd9Sstevel@tonic-gate else 32597c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 32607c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), 32617c478bd9Sstevel@tonic-gate blocks); 32627c478bd9Sstevel@tonic-gate } 32637c478bd9Sstevel@tonic-gate goto filedone; 32647c478bd9Sstevel@tonic-gate } else if (dblock.dbuf.typeflag == '4' && Uid) { 32657c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 32667c478bd9Sstevel@tonic-gate gettext("Can't create special %s\n"), namep); 32677c478bd9Sstevel@tonic-gate continue; 32687c478bd9Sstevel@tonic-gate } 32697c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '2') { /* symlink */ 327045916cd2Sjpk if ((Tflag) && (lk_rpath_flag == 1)) 327145916cd2Sjpk linkp = lk_real_path; 327245916cd2Sjpk else 32737c478bd9Sstevel@tonic-gate linkp = templink; 32747c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 32757c478bd9Sstevel@tonic-gate linkp++; 32767c478bd9Sstevel@tonic-gate if (rmdir(namep) < 0) { 32777c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 32787c478bd9Sstevel@tonic-gate (void) unlink(namep); 32797c478bd9Sstevel@tonic-gate } 32807c478bd9Sstevel@tonic-gate if (symlink(linkp, namep) < 0) { 32817c478bd9Sstevel@tonic-gate vperror(0, gettext("%s: symbolic link failed"), 32827c478bd9Sstevel@tonic-gate namep); 32837c478bd9Sstevel@tonic-gate continue; 32847c478bd9Sstevel@tonic-gate } 32857c478bd9Sstevel@tonic-gate if (vflag) 32867c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 32877c478bd9Sstevel@tonic-gate "x %s symbolic link to %s\n"), 32887c478bd9Sstevel@tonic-gate namep, linkp); 32897c478bd9Sstevel@tonic-gate 32907c478bd9Sstevel@tonic-gate symflag = AT_SYMLINK_NOFOLLOW; 32917c478bd9Sstevel@tonic-gate goto filedone; 32927c478bd9Sstevel@tonic-gate } 32937c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '1') { 32947c478bd9Sstevel@tonic-gate linkp = templink; 32957c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 32967c478bd9Sstevel@tonic-gate linkp++; 32977c478bd9Sstevel@tonic-gate if (unlinkat(dirfd, comp, AT_REMOVEDIR) < 0) { 32987c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 32997c478bd9Sstevel@tonic-gate (void) unlinkat(dirfd, comp, 0); 33007c478bd9Sstevel@tonic-gate } 33017c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 33027c478bd9Sstevel@tonic-gate if (xattrp && xattr_linkp) { 33037c478bd9Sstevel@tonic-gate if (fchdir(dirfd) < 0) { 33047c478bd9Sstevel@tonic-gate vperror(0, gettext( 33057c478bd9Sstevel@tonic-gate "Cannot fchdir to attribute " 3306da6c28aaSamw "directory %s"), 3307da6c28aaSamw (attrinfo->attr_parent == NULL) ? 3308da6c28aaSamw dirp : attrinfo->attr_parent); 33097c478bd9Sstevel@tonic-gate exit(1); 33107c478bd9Sstevel@tonic-gate } 33117c478bd9Sstevel@tonic-gate 3312da6c28aaSamw error = link(xattr_linkaname, xattrapath); 33137c478bd9Sstevel@tonic-gate } else { 33147c478bd9Sstevel@tonic-gate error = link(linkp, namep); 33157c478bd9Sstevel@tonic-gate } 33167c478bd9Sstevel@tonic-gate #else 33177c478bd9Sstevel@tonic-gate error = link(linkp, namep); 33187c478bd9Sstevel@tonic-gate #endif 33197c478bd9Sstevel@tonic-gate 33207c478bd9Sstevel@tonic-gate if (error < 0) { 33217c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 33227c478bd9Sstevel@tonic-gate "tar: %s%s%s: cannot link\n"), 33237c478bd9Sstevel@tonic-gate namep, (xattr_linkp != NULL) ? 33247c478bd9Sstevel@tonic-gate gettext(" attribute ") : "", 33257c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ? 3326da6c28aaSamw xattrapath : ""); 33277c478bd9Sstevel@tonic-gate continue; 33287c478bd9Sstevel@tonic-gate } 33297c478bd9Sstevel@tonic-gate if (vflag) 33307c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3331da6c28aaSamw "x %s%s%s linked to %s%s%s\n"), namep, 33327c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ? 33337c478bd9Sstevel@tonic-gate gettext(" attribute ") : "", 33347c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ? 33357c478bd9Sstevel@tonic-gate xattr_linkaname : "", 3336da6c28aaSamw linkp, 33377c478bd9Sstevel@tonic-gate (xattr_linkp != NULL) ? 3338da6c28aaSamw gettext(" attribute ") : "", 3339da6c28aaSamw (xattr_linkp != NULL) ? xattrapath : ""); 33407c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 33417c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 3342da6c28aaSamw if (xattrp != NULL) { 33437c478bd9Sstevel@tonic-gate free(xattrhead); 33447c478bd9Sstevel@tonic-gate xattrp = NULL; 33457c478bd9Sstevel@tonic-gate xattr_linkp = NULL; 33467c478bd9Sstevel@tonic-gate xattrhead = NULL; 33477c478bd9Sstevel@tonic-gate } 33487c478bd9Sstevel@tonic-gate #endif 33497c478bd9Sstevel@tonic-gate continue; 33507c478bd9Sstevel@tonic-gate } 33517c478bd9Sstevel@tonic-gate 33527c478bd9Sstevel@tonic-gate /* REGULAR FILES */ 33537c478bd9Sstevel@tonic-gate 33547c478bd9Sstevel@tonic-gate if (convtoreg(stbuf.st_size)) { 33557c478bd9Sstevel@tonic-gate convflag = 1; 33567c478bd9Sstevel@tonic-gate if (errflag) { 33577c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 33587c478bd9Sstevel@tonic-gate "tar: %s: typeflag '%c' not recognized\n"), 33597c478bd9Sstevel@tonic-gate namep, dblock.dbuf.typeflag); 33607c478bd9Sstevel@tonic-gate done(1); 33617c478bd9Sstevel@tonic-gate } else { 33627c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 33637c478bd9Sstevel@tonic-gate "tar: %s: typeflag '%c' not recognized, " 33647c478bd9Sstevel@tonic-gate "converting to regular file\n"), namep, 33657c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag); 33667c478bd9Sstevel@tonic-gate Errflg = 1; 33677c478bd9Sstevel@tonic-gate } 33687c478bd9Sstevel@tonic-gate } 33697c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '0' || 33707c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == NULL || convflag) { 33712c0f0499Slovely delete_target(dirfd, comp, namep); 33727c478bd9Sstevel@tonic-gate linkp = templink; 33737c478bd9Sstevel@tonic-gate if (*linkp != NULL) { 33747c478bd9Sstevel@tonic-gate if (Aflag && *linkp == '/') 33757c478bd9Sstevel@tonic-gate linkp++; 33767c478bd9Sstevel@tonic-gate if (link(linkp, comp) < 0) { 33777c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 33787c478bd9Sstevel@tonic-gate "tar: %s: cannot link\n"), namep); 33797c478bd9Sstevel@tonic-gate continue; 33807c478bd9Sstevel@tonic-gate } 33817c478bd9Sstevel@tonic-gate if (vflag) 33827c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 3383da6c28aaSamw "x %s linked to %s\n"), comp, 3384da6c28aaSamw linkp); 33857c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 3386da6c28aaSamw #if defined(O_XATTR) 3387da6c28aaSamw if (xattrp != NULL) { 3388da6c28aaSamw free(xattrhead); 3389da6c28aaSamw xattrp = NULL; 3390da6c28aaSamw xattr_linkp = NULL; 3391da6c28aaSamw xattrhead = NULL; 3392da6c28aaSamw } 3393da6c28aaSamw #endif 33947c478bd9Sstevel@tonic-gate continue; 33957c478bd9Sstevel@tonic-gate } 33967c478bd9Sstevel@tonic-gate newfile = ((fstatat(dirfd, comp, 33977c478bd9Sstevel@tonic-gate &xtractbuf, 0) == -1) ? TRUE : FALSE); 3398da6c28aaSamw ofile = openat(dirfd, comp, O_RDWR|O_CREAT|O_TRUNC, 3399da6c28aaSamw stbuf.st_mode & MODEMASK); 3400da6c28aaSamw saveerrno = errno; 3401da6c28aaSamw 3402da6c28aaSamw #if defined(O_XATTR) 3403da6c28aaSamw if (xattrp != NULL) { 3404da6c28aaSamw if (ofile < 0) { 3405da6c28aaSamw ofile = retry_open_attr(dirfd, cwd, 3406da6c28aaSamw dirp, attrinfo->attr_parent, comp, 3407da6c28aaSamw O_RDWR|O_CREAT|O_TRUNC, 3408da6c28aaSamw stbuf.st_mode & MODEMASK); 3409da6c28aaSamw } 3410da6c28aaSamw } 3411da6c28aaSamw #endif 3412da6c28aaSamw if (ofile < 0) { 3413da6c28aaSamw errno = saveerrno; 34147c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3415da6c28aaSamw "tar: %s%s%s%s - cannot create\n"), 3416da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 34178e4a71aeSRich Burridge gettext("system attribute ") : 3418da6c28aaSamw gettext("attribute ")), 3419da6c28aaSamw (xattrp == NULL) ? "" : xattrapath, 3420da6c28aaSamw (xattrp == NULL) ? "" : gettext(" of "), 3421da6c28aaSamw (xattrp == NULL) ? comp : namep); 34227c478bd9Sstevel@tonic-gate if (errflag) 34237c478bd9Sstevel@tonic-gate done(1); 34247c478bd9Sstevel@tonic-gate else 34257c478bd9Sstevel@tonic-gate Errflg = 1; 3426da6c28aaSamw #if defined(O_XATTR) 3427da6c28aaSamw if (xattrp != NULL) { 3428da6c28aaSamw dblock.dbuf.typeflag = _XATTR_HDRTYPE; 3429da6c28aaSamw free(xattrhead); 3430da6c28aaSamw xattrp = NULL; 3431da6c28aaSamw xattr_linkp = NULL; 3432da6c28aaSamw xattrhead = NULL; 3433da6c28aaSamw } 3434da6c28aaSamw #endif 34357c478bd9Sstevel@tonic-gate passtape(); 34367c478bd9Sstevel@tonic-gate continue; 34377c478bd9Sstevel@tonic-gate } 34387c478bd9Sstevel@tonic-gate 343945916cd2Sjpk if (Tflag && (check_ext_attr(namep) == 0)) { 344045916cd2Sjpk if (errflag) 344145916cd2Sjpk done(1); 344245916cd2Sjpk else 344345916cd2Sjpk Errflg = 1; 344445916cd2Sjpk passtape(); 344545916cd2Sjpk continue; 344645916cd2Sjpk } 344745916cd2Sjpk 34487c478bd9Sstevel@tonic-gate if (extno != 0) { /* file is in pieces */ 34497c478bd9Sstevel@tonic-gate if (extotal < 1 || extotal > MAXEXT) 34507c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3451da6c28aaSamw "tar: ignoring bad extent info for " 3452da6c28aaSamw "%s%s%s%s\n"), 3453da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 3454da6c28aaSamw gettext("system attribute ") : 3455da6c28aaSamw gettext("attribute ")), 3456da6c28aaSamw (xattrp == NULL) ? "" : xattrapath, 3457da6c28aaSamw (xattrp == NULL) ? "" : gettext(" of "), 3458da6c28aaSamw (xattrp == NULL) ? comp : namep); 34597c478bd9Sstevel@tonic-gate else { 3460da6c28aaSamw /* extract it */ 3461da6c28aaSamw (void) xsfile(rw_sysattr, ofile); 34627c478bd9Sstevel@tonic-gate } 34637c478bd9Sstevel@tonic-gate } 34647c478bd9Sstevel@tonic-gate extno = 0; /* let everyone know file is not split */ 34657c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 34667c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 34677c478bd9Sstevel@tonic-gate if (vflag) { 34687c478bd9Sstevel@tonic-gate (void) fprintf(vfile, 34698e4a71aeSRich Burridge "x %s%s%s, %" FMT_off_t " %s, ", 34707c478bd9Sstevel@tonic-gate (xattrp == NULL) ? "" : dirp, 3471da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 3472da6c28aaSamw gettext(" system attribute ") : 3473da6c28aaSamw gettext(" attribute ")), 34748e4a71aeSRich Burridge (xattrp == NULL) ? namep : xattrapath, bytes, 34758e4a71aeSRich Burridge gettext("bytes")); 34767c478bd9Sstevel@tonic-gate if (NotTape) 34777c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%" FMT_blkcnt_t "K\n", 34787c478bd9Sstevel@tonic-gate K(blocks)); 34797c478bd9Sstevel@tonic-gate else 34807c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext("%" 34817c478bd9Sstevel@tonic-gate FMT_blkcnt_t " tape blocks\n"), blocks); 34827c478bd9Sstevel@tonic-gate } 34837c478bd9Sstevel@tonic-gate 3484da6c28aaSamw if (xblocks(rw_sysattr, bytes, ofile) != 0) { 3485da6c28aaSamw #if defined(O_XATTR) 3486da6c28aaSamw if (xattrp != NULL) { 3487da6c28aaSamw free(xattrhead); 3488da6c28aaSamw xattrp = NULL; 3489da6c28aaSamw xattr_linkp = NULL; 3490da6c28aaSamw xattrhead = NULL; 3491da6c28aaSamw } 3492da6c28aaSamw #endif 3493da6c28aaSamw continue; 3494da6c28aaSamw } 34957c478bd9Sstevel@tonic-gate filedone: 34967c478bd9Sstevel@tonic-gate if (mflag == 0 && !symflag) { 34977c478bd9Sstevel@tonic-gate if (dir) 34987c478bd9Sstevel@tonic-gate doDirTimes(namep, stbuf.st_mtim); 3499da6c28aaSamw 35007c478bd9Sstevel@tonic-gate else 3501da6c28aaSamw #if defined(O_XATTR) 3502da6c28aaSamw if (xattrp != NULL) { 3503da6c28aaSamw /* 3504da6c28aaSamw * Set the time on the attribute unless 3505da6c28aaSamw * the attribute is a system attribute 3506da6c28aaSamw * (can't successfully do this) or the 3507da6c28aaSamw * hidden attribute directory, "." (the 3508da6c28aaSamw * time on the hidden attribute 3509da6c28aaSamw * directory will be updated when 3510da6c28aaSamw * attributes are restored, otherwise 3511da6c28aaSamw * it's transient). 3512da6c28aaSamw */ 3513da6c28aaSamw if (!rw_sysattr && (Hiddendir == 0)) { 3514da6c28aaSamw setPathTimes(dirfd, comp, 3515da6c28aaSamw stbuf.st_mtim); 3516da6c28aaSamw } 3517da6c28aaSamw } else 3518da6c28aaSamw setPathTimes(dirfd, comp, 3519da6c28aaSamw stbuf.st_mtim); 3520da6c28aaSamw #else 35217c478bd9Sstevel@tonic-gate setPathTimes(dirfd, comp, stbuf.st_mtim); 3522da6c28aaSamw #endif 35237c478bd9Sstevel@tonic-gate } 35247c478bd9Sstevel@tonic-gate 35257c478bd9Sstevel@tonic-gate /* moved this code from above */ 35267c478bd9Sstevel@tonic-gate if (pflag && !symflag && Hiddendir == 0) { 3527da6c28aaSamw if (xattrp != NULL) 35287c478bd9Sstevel@tonic-gate (void) fchmod(ofile, stbuf.st_mode & MODEMASK); 35297c478bd9Sstevel@tonic-gate else 35307c478bd9Sstevel@tonic-gate (void) chmod(namep, stbuf.st_mode & MODEMASK); 35317c478bd9Sstevel@tonic-gate } 35327c478bd9Sstevel@tonic-gate 35337c478bd9Sstevel@tonic-gate 35347c478bd9Sstevel@tonic-gate /* 35357c478bd9Sstevel@tonic-gate * Because ancillary file preceeds the normal file, 35367c478bd9Sstevel@tonic-gate * acl info may have been retrieved (in aclp). 35377c478bd9Sstevel@tonic-gate * All file types are directed here (go filedone). 35387c478bd9Sstevel@tonic-gate * Always restore ACLs if there are ACLs. 35397c478bd9Sstevel@tonic-gate */ 35407c478bd9Sstevel@tonic-gate if (aclp != NULL) { 35417c478bd9Sstevel@tonic-gate int ret; 35427c478bd9Sstevel@tonic-gate 35437c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 3544da6c28aaSamw if (xattrp != NULL) { 35457c478bd9Sstevel@tonic-gate if (Hiddendir) 3546fa9e4066Sahrens ret = facl_set(dirfd, aclp); 35477c478bd9Sstevel@tonic-gate else 3548fa9e4066Sahrens ret = facl_set(ofile, aclp); 35497c478bd9Sstevel@tonic-gate } else { 3550fa9e4066Sahrens ret = acl_set(namep, aclp); 35517c478bd9Sstevel@tonic-gate } 35527c478bd9Sstevel@tonic-gate #else 355345916cd2Sjpk ret = acl_set(namep, aclp); 35547c478bd9Sstevel@tonic-gate #endif 35557c478bd9Sstevel@tonic-gate if (ret < 0) { 35567c478bd9Sstevel@tonic-gate if (pflag) { 35577c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3558da6c28aaSamw "%s%s%s%s: failed to set acl " 3559da6c28aaSamw "entries\n"), namep, 3560da6c28aaSamw (xattrp == NULL) ? "" : 3561da6c28aaSamw (rw_sysattr ? gettext( 3562da6c28aaSamw " system attribute ") : 3563da6c28aaSamw gettext(" attribute ")), 3564da6c28aaSamw (xattrp == NULL) ? "" : 3565da6c28aaSamw xattrapath); 35667c478bd9Sstevel@tonic-gate } 35677c478bd9Sstevel@tonic-gate /* else: silent and continue */ 35687c478bd9Sstevel@tonic-gate } 3569fa9e4066Sahrens acl_free(aclp); 35707c478bd9Sstevel@tonic-gate aclp = NULL; 35717c478bd9Sstevel@tonic-gate } 35727c478bd9Sstevel@tonic-gate 35737c478bd9Sstevel@tonic-gate if (!oflag) 3574cc22b130SRich Burridge /* set file ownership */ 3575cc22b130SRich Burridge resugname(dirfd, comp, symflag); 35767c478bd9Sstevel@tonic-gate 35777c478bd9Sstevel@tonic-gate if (pflag && newfile == TRUE && !dir && 35787c478bd9Sstevel@tonic-gate (dblock.dbuf.typeflag == '0' || 35797c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag == NULL || 35807c478bd9Sstevel@tonic-gate convflag || dblock.dbuf.typeflag == '1')) { 35817c478bd9Sstevel@tonic-gate if (fstat(ofile, &xtractbuf) == -1) 35827c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3583da6c28aaSamw "tar: cannot stat extracted file " 3584da6c28aaSamw "%s%s%s%s\n"), 3585da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 3586da6c28aaSamw gettext("system attribute ") : 3587da6c28aaSamw gettext("attribute ")), 3588da6c28aaSamw (xattrp == NULL) ? "" : xattrapath, 3589da6c28aaSamw (xattrp == NULL) ? "" : 3590da6c28aaSamw gettext(" of "), namep); 3591da6c28aaSamw 35927c478bd9Sstevel@tonic-gate else if ((xtractbuf.st_mode & (MODEMASK & ~S_IFMT)) 35937c478bd9Sstevel@tonic-gate != (stbuf.st_mode & (MODEMASK & ~S_IFMT))) { 35947c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 35957c478bd9Sstevel@tonic-gate "tar: warning - file permissions have " 3596da6c28aaSamw "changed for %s%s%s%s (are 0%o, should be " 35977c478bd9Sstevel@tonic-gate "0%o)\n"), 3598da6c28aaSamw (xattrp == NULL) ? "" : (rw_sysattr ? 3599da6c28aaSamw gettext("system attribute ") : 3600da6c28aaSamw gettext("attribute ")), 3601da6c28aaSamw (xattrp == NULL) ? "" : xattrapath, 3602da6c28aaSamw (xattrp == NULL) ? "" : 3603da6c28aaSamw gettext(" of "), namep, 3604da6c28aaSamw xtractbuf.st_mode, stbuf.st_mode); 3605da6c28aaSamw 36067c478bd9Sstevel@tonic-gate } 36077c478bd9Sstevel@tonic-gate } 3608ced83f9bSceastha #if defined(O_XATTR) 3609ced83f9bSceastha if (xattrp != NULL) { 3610ced83f9bSceastha free(xattrhead); 3611ced83f9bSceastha xattrp = NULL; 3612ced83f9bSceastha xattr_linkp = NULL; 3613ced83f9bSceastha xattrhead = NULL; 3614ced83f9bSceastha } 3615ced83f9bSceastha #endif 3616ced83f9bSceastha 36177c478bd9Sstevel@tonic-gate if (ofile != -1) { 36187c478bd9Sstevel@tonic-gate (void) close(dirfd); 36197c478bd9Sstevel@tonic-gate dirfd = -1; 36207c478bd9Sstevel@tonic-gate if (close(ofile) != 0) 36217c478bd9Sstevel@tonic-gate vperror(2, gettext("close error")); 3622da6c28aaSamw ofile = -1; 36237c478bd9Sstevel@tonic-gate } 36247c478bd9Sstevel@tonic-gate xcnt++; /* increment # files extracted */ 36257c478bd9Sstevel@tonic-gate } 362645916cd2Sjpk 362745916cd2Sjpk /* 362845916cd2Sjpk * Process ancillary file. 362945916cd2Sjpk * 363045916cd2Sjpk */ 363145916cd2Sjpk 36327c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == 'A') { /* acl info */ 36337c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 36347c478bd9Sstevel@tonic-gate char *secp; 36357c478bd9Sstevel@tonic-gate char *tp; 36367c478bd9Sstevel@tonic-gate int attrsize; 36377c478bd9Sstevel@tonic-gate int cnt; 36387c478bd9Sstevel@tonic-gate 363945916cd2Sjpk /* reset Trusted Extensions flags */ 364045916cd2Sjpk dir_flag = 0; 364145916cd2Sjpk mld_flag = 0; 364245916cd2Sjpk lk_rpath_flag = 0; 364345916cd2Sjpk rpath_flag = 0; 36447c478bd9Sstevel@tonic-gate 36457c478bd9Sstevel@tonic-gate if (pflag) { 36467c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 36477c478bd9Sstevel@tonic-gate if ((secp = malloc((int)bytes)) == NULL) { 36487c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 36497c478bd9Sstevel@tonic-gate "Insufficient memory for acl\n")); 36507c478bd9Sstevel@tonic-gate passtape(); 36517c478bd9Sstevel@tonic-gate continue; 36527c478bd9Sstevel@tonic-gate } 36537c478bd9Sstevel@tonic-gate tp = secp; 36547c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 365545916cd2Sjpk 365645916cd2Sjpk /* 365745916cd2Sjpk * Display a line for each ancillary file. 365845916cd2Sjpk */ 365945916cd2Sjpk if (vflag && Tflag) 366045916cd2Sjpk (void) fprintf(vfile, "x %s(A), %" 36618e4a71aeSRich Burridge FMT_blkcnt_t " %s, %" 36628e4a71aeSRich Burridge FMT_blkcnt_t " %s\n", 36638e4a71aeSRich Burridge namep, bytes, gettext("bytes"), 36648e4a71aeSRich Burridge blocks, gettext("tape blocks")); 366545916cd2Sjpk 36667c478bd9Sstevel@tonic-gate while (blocks-- > 0) { 36677c478bd9Sstevel@tonic-gate readtape(buf); 36687c478bd9Sstevel@tonic-gate if (bytes <= TBLOCK) { 36697c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, 36707c478bd9Sstevel@tonic-gate (size_t)bytes); 36717c478bd9Sstevel@tonic-gate break; 36727c478bd9Sstevel@tonic-gate } else { 36737c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, 36747c478bd9Sstevel@tonic-gate TBLOCK); 36757c478bd9Sstevel@tonic-gate tp += TBLOCK; 36767c478bd9Sstevel@tonic-gate } 36777c478bd9Sstevel@tonic-gate bytes -= TBLOCK; 36787c478bd9Sstevel@tonic-gate } 3679fa9e4066Sahrens bytes = stbuf.st_size; 36807c478bd9Sstevel@tonic-gate /* got all attributes in secp */ 36817c478bd9Sstevel@tonic-gate tp = secp; 36827c478bd9Sstevel@tonic-gate do { 36837c478bd9Sstevel@tonic-gate attr = (struct sec_attr *)tp; 36847c478bd9Sstevel@tonic-gate switch (attr->attr_type) { 36857c478bd9Sstevel@tonic-gate case UFSD_ACL: 3686fa9e4066Sahrens case ACE_ACL: 36877c478bd9Sstevel@tonic-gate (void) sscanf(attr->attr_len, 3688fa9e4066Sahrens "%7o", 3689fa9e4066Sahrens (uint_t *) 3690fa9e4066Sahrens &cnt); 36917c478bd9Sstevel@tonic-gate /* header is 8 */ 36927c478bd9Sstevel@tonic-gate attrsize = 8 + (int)strlen( 36937c478bd9Sstevel@tonic-gate &attr->attr_info[0]) + 1; 3694fa9e4066Sahrens error = 3695fa9e4066Sahrens acl_fromtext( 3696fa9e4066Sahrens &attr->attr_info[0], &aclp); 3697fa9e4066Sahrens 3698fa9e4066Sahrens if (error != 0) { 36997c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 37007c478bd9Sstevel@tonic-gate gettext( 37017c478bd9Sstevel@tonic-gate "aclfromtext " 3702fa9e4066Sahrens "failed: %s\n"), 3703fa9e4066Sahrens acl_strerror( 3704fa9e4066Sahrens error)); 3705fa9e4066Sahrens bytes -= attrsize; 37067c478bd9Sstevel@tonic-gate break; 37077c478bd9Sstevel@tonic-gate } 3708fa9e4066Sahrens if (acl_cnt(aclp) != cnt) { 37097c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 37107c478bd9Sstevel@tonic-gate gettext( 37117c478bd9Sstevel@tonic-gate "aclcnt error\n")); 3712fa9e4066Sahrens bytes -= attrsize; 37137c478bd9Sstevel@tonic-gate break; 37147c478bd9Sstevel@tonic-gate } 37157c478bd9Sstevel@tonic-gate bytes -= attrsize; 37167c478bd9Sstevel@tonic-gate break; 37177c478bd9Sstevel@tonic-gate 371845916cd2Sjpk /* Trusted Extensions */ 371945916cd2Sjpk 372045916cd2Sjpk case DIR_TYPE: 372145916cd2Sjpk case LBL_TYPE: 372245916cd2Sjpk case APRIV_TYPE: 372345916cd2Sjpk case FPRIV_TYPE: 372445916cd2Sjpk case COMP_TYPE: 372545916cd2Sjpk case LK_COMP_TYPE: 372645916cd2Sjpk case ATTR_FLAG_TYPE: 372745916cd2Sjpk attrsize = 372845916cd2Sjpk sizeof (struct sec_attr) + 372945916cd2Sjpk strlen(&attr->attr_info[0]); 373045916cd2Sjpk bytes -= attrsize; 373145916cd2Sjpk if (Tflag) 373245916cd2Sjpk extract_attr(&namep, 373345916cd2Sjpk attr); 373445916cd2Sjpk break; 37357c478bd9Sstevel@tonic-gate 37367c478bd9Sstevel@tonic-gate default: 37377c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 37387c478bd9Sstevel@tonic-gate "unrecognized attr" 37397c478bd9Sstevel@tonic-gate " type\n")); 37407c478bd9Sstevel@tonic-gate bytes = (off_t)0; 37417c478bd9Sstevel@tonic-gate break; 37427c478bd9Sstevel@tonic-gate } 37437c478bd9Sstevel@tonic-gate 37447c478bd9Sstevel@tonic-gate /* next attributes */ 37457c478bd9Sstevel@tonic-gate tp += attrsize; 37467c478bd9Sstevel@tonic-gate } while (bytes != 0); 37477c478bd9Sstevel@tonic-gate free(secp); 3748da6c28aaSamw } else { 37497c478bd9Sstevel@tonic-gate passtape(); 3750da6c28aaSamw } 37517c478bd9Sstevel@tonic-gate } /* acl */ 37527c478bd9Sstevel@tonic-gate 37537c478bd9Sstevel@tonic-gate } /* for */ 37547c478bd9Sstevel@tonic-gate 37557c478bd9Sstevel@tonic-gate /* 37567c478bd9Sstevel@tonic-gate * Ensure that all the directories still on the directory stack 37577c478bd9Sstevel@tonic-gate * get their modification times set correctly by flushing the 37587c478bd9Sstevel@tonic-gate * stack. 37597c478bd9Sstevel@tonic-gate */ 37607c478bd9Sstevel@tonic-gate 37617c478bd9Sstevel@tonic-gate doDirTimes(NULL, time_zero); 37627c478bd9Sstevel@tonic-gate 3763da6c28aaSamw #if defined(O_XATTR) 3764da6c28aaSamw if (xattrp != NULL) { 3765da6c28aaSamw free(xattrhead); 3766da6c28aaSamw xattrp = NULL; 3767da6c28aaSamw xattr_linkp = NULL; 3768da6c28aaSamw xattrhead = NULL; 3769da6c28aaSamw } 3770da6c28aaSamw #endif 3771da6c28aaSamw 37727c478bd9Sstevel@tonic-gate /* 37737c478bd9Sstevel@tonic-gate * Check if the number of files extracted is different from the 37747c478bd9Sstevel@tonic-gate * number of files listed on the command line 37757c478bd9Sstevel@tonic-gate */ 37767c478bd9Sstevel@tonic-gate if (fcnt > xcnt) { 37777c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 37787c478bd9Sstevel@tonic-gate gettext("tar: %d file(s) not extracted\n"), 37797c478bd9Sstevel@tonic-gate fcnt-xcnt); 37807c478bd9Sstevel@tonic-gate Errflg = 1; 37817c478bd9Sstevel@tonic-gate } 37827c478bd9Sstevel@tonic-gate } 37837c478bd9Sstevel@tonic-gate 37847c478bd9Sstevel@tonic-gate /* 37857c478bd9Sstevel@tonic-gate * xblocks extract file/extent from tape to output file 37867c478bd9Sstevel@tonic-gate * 3787ced83f9bSceastha * xblocks(issysattr, bytes, ofile); 3788ced83f9bSceastha * 3789ced83f9bSceastha * issysattr flag set if the files being extracted 3790ced83f9bSceastha * is an extended system attribute file. 3791ced83f9bSceastha * unsigned long long bytes size of extent or file to be extracted 3792ced83f9bSceastha * ofile output file 37937c478bd9Sstevel@tonic-gate * 37947c478bd9Sstevel@tonic-gate * called by doxtract() and xsfile() 37957c478bd9Sstevel@tonic-gate */ 37967c478bd9Sstevel@tonic-gate 3797da6c28aaSamw static int 3798da6c28aaSamw xblocks(int issysattr, off_t bytes, int ofile) 37997c478bd9Sstevel@tonic-gate { 3800ced83f9bSceastha char *buf; 38017c478bd9Sstevel@tonic-gate char tempname[NAMSIZ+1]; 3802ced83f9bSceastha size_t maxwrite; 3803ced83f9bSceastha size_t bytesread; 3804ced83f9bSceastha size_t piosize; /* preferred I/O size */ 3805ced83f9bSceastha struct stat tsbuf; 38067c478bd9Sstevel@tonic-gate 3807ced83f9bSceastha /* Don't need to do anything if this is a zero size file */ 3808ced83f9bSceastha if (bytes <= 0) { 3809ced83f9bSceastha return (0); 3810ced83f9bSceastha } 3811ced83f9bSceastha 3812ced83f9bSceastha /* 3813ced83f9bSceastha * To figure out the size of the buffer used to accumulate data 3814ced83f9bSceastha * from readtape() and to write to the file, we need to determine 3815ced83f9bSceastha * the largest chunk of data to be written to the file at one time. 3816ced83f9bSceastha * This is determined based on the smallest of the following two 3817ced83f9bSceastha * things: 3818ced83f9bSceastha * 1) The size of the archived file. 3819ced83f9bSceastha * 2) The preferred I/O size of the file. 3820ced83f9bSceastha */ 3821ced83f9bSceastha if (issysattr || (bytes <= TBLOCK)) { 3822ced83f9bSceastha /* 3823ced83f9bSceastha * Writes to system attribute files must be 3824ced83f9bSceastha * performed in one operation. 3825ced83f9bSceastha */ 3826ced83f9bSceastha maxwrite = bytes; 3827ced83f9bSceastha } else { 3828ced83f9bSceastha /* 3829ced83f9bSceastha * fstat() the file to get the preferred I/O size. 3830ced83f9bSceastha * If it fails, then resort back to just writing 3831ced83f9bSceastha * one block at a time. 3832ced83f9bSceastha */ 3833ced83f9bSceastha if (fstat(ofile, &tsbuf) == 0) { 3834ced83f9bSceastha piosize = tsbuf.st_blksize; 3835ced83f9bSceastha } else { 3836ced83f9bSceastha piosize = TBLOCK; 3837ced83f9bSceastha } 3838ced83f9bSceastha maxwrite = min(bytes, piosize); 3839ced83f9bSceastha } 3840ced83f9bSceastha 3841ced83f9bSceastha /* 3842ced83f9bSceastha * The buffer used to accumulate the data for the write operation 3843ced83f9bSceastha * needs to be the maximum number of bytes to be written rounded up 3844ced83f9bSceastha * to the nearest TBLOCK since readtape reads one block at a time. 3845ced83f9bSceastha */ 3846ced83f9bSceastha if ((buf = malloc(TBLOCKS(maxwrite) * TBLOCK)) == NULL) { 3847ced83f9bSceastha fatal(gettext("cannot allocate buffer")); 3848ced83f9bSceastha } 3849ced83f9bSceastha 3850ced83f9bSceastha while (bytes > 0) { 3851ced83f9bSceastha 3852ced83f9bSceastha /* 3853ced83f9bSceastha * readtape() obtains one block (TBLOCK) of data at a time. 3854ced83f9bSceastha * Accumulate as many blocks of data in buf as we can write 3855ced83f9bSceastha * in one operation. 3856ced83f9bSceastha */ 3857ced83f9bSceastha for (bytesread = 0; bytesread < maxwrite; bytesread += TBLOCK) { 3858ced83f9bSceastha readtape(buf + bytesread); 3859ced83f9bSceastha } 3860ced83f9bSceastha 3861ced83f9bSceastha if (write(ofile, buf, maxwrite) < 0) { 3862da6c28aaSamw int saveerrno = errno; 3863da6c28aaSamw 38647c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 3865ced83f9bSceastha (void) strlcpy(tempname, Xtarhdr.x_path, 3866ced83f9bSceastha sizeof (tempname)); 38677c478bd9Sstevel@tonic-gate else 38687c478bd9Sstevel@tonic-gate (void) sprintf(tempname, "%.*s", NAMSIZ, 38697c478bd9Sstevel@tonic-gate dblock.dbuf.name); 3870da6c28aaSamw /* 3871da6c28aaSamw * If the extended system attribute being extracted 3872da6c28aaSamw * contains attributes that the user needs privileges 3873da6c28aaSamw * for, then just display a warning message, skip 3874da6c28aaSamw * the extraction of this file, and return. 3875da6c28aaSamw */ 3876da6c28aaSamw if ((saveerrno == EPERM) && issysattr) { 38777c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 3878da6c28aaSamw "tar: unable to extract system attribute " 3879da6c28aaSamw "%s: insufficient privileges\n"), tempname); 3880da6c28aaSamw Errflg = 1; 3881ced83f9bSceastha (void) free(buf); 3882da6c28aaSamw return (1); 3883da6c28aaSamw } else { 3884da6c28aaSamw (void) fprintf(stderr, gettext( 3885da6c28aaSamw "tar: %s: HELP - extract write error\n"), 3886da6c28aaSamw tempname); 38877c478bd9Sstevel@tonic-gate done(2); 38887c478bd9Sstevel@tonic-gate } 3889da6c28aaSamw } 3890ced83f9bSceastha bytes -= maxwrite; 3891ced83f9bSceastha 3892ced83f9bSceastha /* 3893ced83f9bSceastha * If we've reached this point and there is still data 3894ced83f9bSceastha * to be written, maxwrite had to have been determined 3895ced83f9bSceastha * by the preferred I/O size. If the number of bytes 3896ced83f9bSceastha * left to write is smaller than the preferred I/O size, 3897ced83f9bSceastha * then we're about to do our final write to the file, so 3898ced83f9bSceastha * just set maxwrite to the number of bytes left to write. 3899ced83f9bSceastha */ 3900ced83f9bSceastha if ((bytes > 0) && (bytes < maxwrite)) { 3901ced83f9bSceastha maxwrite = bytes; 39027c478bd9Sstevel@tonic-gate } 3903ced83f9bSceastha } 3904ced83f9bSceastha free(buf); 3905da6c28aaSamw 3906da6c28aaSamw return (0); 39077c478bd9Sstevel@tonic-gate } 39087c478bd9Sstevel@tonic-gate 39097c478bd9Sstevel@tonic-gate /* 39107c478bd9Sstevel@tonic-gate * xsfile extract split file 39117c478bd9Sstevel@tonic-gate * 39127c478bd9Sstevel@tonic-gate * xsfile(ofd); ofd = output file descriptor 39137c478bd9Sstevel@tonic-gate * 39147c478bd9Sstevel@tonic-gate * file extracted and put in ofd via xblocks() 39157c478bd9Sstevel@tonic-gate * 39167c478bd9Sstevel@tonic-gate * NOTE: only called by doxtract() to extract one large file 39177c478bd9Sstevel@tonic-gate */ 39187c478bd9Sstevel@tonic-gate 39197c478bd9Sstevel@tonic-gate static union hblock savedblock; /* to ensure same file across volumes */ 39207c478bd9Sstevel@tonic-gate 3921da6c28aaSamw static int 3922da6c28aaSamw xsfile(int issysattr, int ofd) 39237c478bd9Sstevel@tonic-gate { 39247c478bd9Sstevel@tonic-gate int i, c; 3925da6c28aaSamw int sysattrerr = 0; 39267c478bd9Sstevel@tonic-gate char name[PATH_MAX+1]; /* holds name for diagnostics */ 39277c478bd9Sstevel@tonic-gate int extents, totalext; 39287c478bd9Sstevel@tonic-gate off_t bytes, totalbytes; 39297c478bd9Sstevel@tonic-gate 39307c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 39317c478bd9Sstevel@tonic-gate (void) strcpy(name, Xtarhdr.x_path); 39327c478bd9Sstevel@tonic-gate else 39337c478bd9Sstevel@tonic-gate (void) sprintf(name, "%.*s", NAMSIZ, dblock.dbuf.name); 39347c478bd9Sstevel@tonic-gate 39357c478bd9Sstevel@tonic-gate totalbytes = (off_t)0; /* in case we read in half the file */ 39367c478bd9Sstevel@tonic-gate totalext = 0; /* these keep count */ 39377c478bd9Sstevel@tonic-gate 39387c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 39397c478bd9Sstevel@tonic-gate "tar: %s split across %d volumes\n"), name, extotal); 39407c478bd9Sstevel@tonic-gate 39417c478bd9Sstevel@tonic-gate /* make sure we do extractions in order */ 39427c478bd9Sstevel@tonic-gate if (extno != 1) { /* starting in middle of file? */ 39437c478bd9Sstevel@tonic-gate (void) printf(gettext( 39447c478bd9Sstevel@tonic-gate "tar: first extent read is not #1\n" 39453d63ea05Sas145665 "OK to read file beginning with extent #%d (%s/%s) ? "), 39463d63ea05Sas145665 extno, yesstr, nostr); 39473d63ea05Sas145665 if (yes() == 0) { 39487c478bd9Sstevel@tonic-gate canit: 39497c478bd9Sstevel@tonic-gate passtape(); 39507c478bd9Sstevel@tonic-gate if (close(ofd) != 0) 39517c478bd9Sstevel@tonic-gate vperror(2, gettext("close error")); 3952da6c28aaSamw if (sysattrerr) { 3953da6c28aaSamw return (1); 3954da6c28aaSamw } else { 3955da6c28aaSamw return (0); 3956da6c28aaSamw } 39577c478bd9Sstevel@tonic-gate } 39587c478bd9Sstevel@tonic-gate } 39597c478bd9Sstevel@tonic-gate extents = extotal; 39607c478bd9Sstevel@tonic-gate i = extno; 39617c478bd9Sstevel@tonic-gate /*CONSTCOND*/ 39627c478bd9Sstevel@tonic-gate while (1) { 39637c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_SIZE) { 39647c478bd9Sstevel@tonic-gate bytes = extsize; 39657c478bd9Sstevel@tonic-gate } else { 39667c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 39677c478bd9Sstevel@tonic-gate } 39687c478bd9Sstevel@tonic-gate 39697c478bd9Sstevel@tonic-gate if (vflag) 39708e4a71aeSRich Burridge (void) fprintf(vfile, "+++ x %s [%s #%d], %" 39718e4a71aeSRich Burridge FMT_off_t " %s, %ldK\n", 39728e4a71aeSRich Burridge name, gettext("extent"), extno, 39738e4a71aeSRich Burridge bytes, gettext("bytes"), 39747c478bd9Sstevel@tonic-gate (long)K(TBLOCKS(bytes))); 3975da6c28aaSamw if (xblocks(issysattr, bytes, ofd) != 0) { 3976da6c28aaSamw sysattrerr = 1; 3977da6c28aaSamw goto canit; 3978da6c28aaSamw } 39797c478bd9Sstevel@tonic-gate 39807c478bd9Sstevel@tonic-gate totalbytes += bytes; 39817c478bd9Sstevel@tonic-gate totalext++; 39827c478bd9Sstevel@tonic-gate if (++i > extents) 39837c478bd9Sstevel@tonic-gate break; 39847c478bd9Sstevel@tonic-gate 39857c478bd9Sstevel@tonic-gate /* get next volume and verify it's the right one */ 39867c478bd9Sstevel@tonic-gate copy(&savedblock, &dblock); 39877c478bd9Sstevel@tonic-gate tryagain: 39887c478bd9Sstevel@tonic-gate newvol(); 39897c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 39907c478bd9Sstevel@tonic-gate getdir(); 39917c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) 39927c478bd9Sstevel@tonic-gate (void) get_xdata(); /* Get x-header & regular hdr */ 3993123523f8Sas158974 if ((dblock.dbuf.typeflag != 'A') && (xhdr_flgs != 0)) { 3994123523f8Sas158974 load_info_from_xtarhdr(xhdr_flgs, &Xtarhdr); 3995123523f8Sas158974 xhdr_flgs |= _X_XHDR; 3996123523f8Sas158974 } 39977c478bd9Sstevel@tonic-gate if (endtape()) { /* seemingly empty volume */ 39987c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 39997c478bd9Sstevel@tonic-gate "tar: first record is null\n")); 40007c478bd9Sstevel@tonic-gate asknicely: 40017c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 40027c478bd9Sstevel@tonic-gate "tar: need volume with extent #%d of %s\n"), 40037c478bd9Sstevel@tonic-gate i, name); 40047c478bd9Sstevel@tonic-gate goto tryagain; 40057c478bd9Sstevel@tonic-gate } 40067c478bd9Sstevel@tonic-gate if (notsame()) { 40077c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 40087c478bd9Sstevel@tonic-gate "tar: first file on that volume is not " 40097c478bd9Sstevel@tonic-gate "the same file\n")); 40107c478bd9Sstevel@tonic-gate goto asknicely; 40117c478bd9Sstevel@tonic-gate } 40127c478bd9Sstevel@tonic-gate if (i != extno) { 40137c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 4014eace40a5Sceastha "tar: extent #%d received out of order\ntar: " 4015eace40a5Sceastha "should be #%d\n"), extno, i); 40167c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 40177c478bd9Sstevel@tonic-gate "Ignore error, Abort this file, or " 40187c478bd9Sstevel@tonic-gate "load New volume (i/a/n) ? ")); 40197c478bd9Sstevel@tonic-gate c = response(); 40207c478bd9Sstevel@tonic-gate if (c == 'a') 40217c478bd9Sstevel@tonic-gate goto canit; 40227c478bd9Sstevel@tonic-gate if (c != 'i') /* default to new volume */ 40237c478bd9Sstevel@tonic-gate goto asknicely; 40247c478bd9Sstevel@tonic-gate i = extno; /* okay, start from there */ 40257c478bd9Sstevel@tonic-gate } 40267c478bd9Sstevel@tonic-gate } 40277c478bd9Sstevel@tonic-gate if (vflag) 40287c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 40297c478bd9Sstevel@tonic-gate "x %s (in %d extents), %" FMT_off_t " bytes, %ldK\n"), 40307c478bd9Sstevel@tonic-gate name, totalext, totalbytes, (long)K(TBLOCKS(totalbytes))); 4031da6c28aaSamw 4032da6c28aaSamw return (0); 40337c478bd9Sstevel@tonic-gate } 40347c478bd9Sstevel@tonic-gate 40357c478bd9Sstevel@tonic-gate 40367c478bd9Sstevel@tonic-gate /* 40377c478bd9Sstevel@tonic-gate * notsame() check if extract file extent is invalid 40387c478bd9Sstevel@tonic-gate * 40397c478bd9Sstevel@tonic-gate * returns true if anything differs between savedblock and dblock 40407c478bd9Sstevel@tonic-gate * except extno (extent number), checksum, or size (extent size). 40417c478bd9Sstevel@tonic-gate * Determines if this header belongs to the same file as the one we're 40427c478bd9Sstevel@tonic-gate * extracting. 40437c478bd9Sstevel@tonic-gate * 40447c478bd9Sstevel@tonic-gate * NOTE: though rather bulky, it is only called once per file 40457c478bd9Sstevel@tonic-gate * extension, and it can withstand changes in the definition 40467c478bd9Sstevel@tonic-gate * of the header structure. 40477c478bd9Sstevel@tonic-gate * 40487c478bd9Sstevel@tonic-gate * WARNING: this routine is local to xsfile() above 40497c478bd9Sstevel@tonic-gate */ 40507c478bd9Sstevel@tonic-gate 40517c478bd9Sstevel@tonic-gate static int 40527c478bd9Sstevel@tonic-gate notsame(void) 40537c478bd9Sstevel@tonic-gate { 40547c478bd9Sstevel@tonic-gate return ( 40557c478bd9Sstevel@tonic-gate (strncmp(savedblock.dbuf.name, dblock.dbuf.name, NAMSIZ)) || 40567c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.mode, dblock.dbuf.mode)) || 40577c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.uid, dblock.dbuf.uid)) || 40587c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.gid, dblock.dbuf.gid)) || 40597c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.mtime, dblock.dbuf.mtime)) || 40607c478bd9Sstevel@tonic-gate (savedblock.dbuf.typeflag != dblock.dbuf.typeflag) || 40617c478bd9Sstevel@tonic-gate (strncmp(savedblock.dbuf.linkname, dblock.dbuf.linkname, NAMSIZ)) || 40627c478bd9Sstevel@tonic-gate (savedblock.dbuf.extotal != dblock.dbuf.extotal) || 40637c478bd9Sstevel@tonic-gate (strcmp(savedblock.dbuf.efsize, dblock.dbuf.efsize))); 40647c478bd9Sstevel@tonic-gate } 40657c478bd9Sstevel@tonic-gate 40667c478bd9Sstevel@tonic-gate static void 40677c478bd9Sstevel@tonic-gate dotable(char *argv[]) 40687c478bd9Sstevel@tonic-gate { 4069cc22b130SRich Burridge int tcnt = 0; /* count # files tabled */ 4070cc22b130SRich Burridge int fcnt = 0; /* count # files in argv list */ 40717c478bd9Sstevel@tonic-gate char *namep, *dirp, *comp; 40727c478bd9Sstevel@tonic-gate int want; 40737c478bd9Sstevel@tonic-gate char aclchar = ' '; /* either blank or '+' */ 40747c478bd9Sstevel@tonic-gate char templink[PATH_MAX+1]; 4075da6c28aaSamw attr_data_t *attrinfo = NULL; 40767c478bd9Sstevel@tonic-gate 40777c478bd9Sstevel@tonic-gate dumping = 0; 40787c478bd9Sstevel@tonic-gate 40797c478bd9Sstevel@tonic-gate /* if not on magtape, maximize seek speed */ 40807c478bd9Sstevel@tonic-gate if (NotTape && !bflag) { 40817c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 40827c478bd9Sstevel@tonic-gate nblock = SYS_BLOCK / TBLOCK; 40837c478bd9Sstevel@tonic-gate #else 40847c478bd9Sstevel@tonic-gate nblock = 1; 40857c478bd9Sstevel@tonic-gate #endif 40867c478bd9Sstevel@tonic-gate } 40877c478bd9Sstevel@tonic-gate 40887c478bd9Sstevel@tonic-gate for (;;) { 40897c478bd9Sstevel@tonic-gate 40907c478bd9Sstevel@tonic-gate /* namep is set by wantit to point to the full name */ 4091da6c28aaSamw if ((want = wantit(argv, &namep, &dirp, &comp, &attrinfo)) == 0) 40927c478bd9Sstevel@tonic-gate continue; 40937c478bd9Sstevel@tonic-gate if (want == -1) 40947c478bd9Sstevel@tonic-gate break; 40957c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag != 'A') 40967c478bd9Sstevel@tonic-gate ++tcnt; 40977c478bd9Sstevel@tonic-gate 40983a1dab68SRich Burridge if (Fflag) { 40993a1dab68SRich Burridge if (checkf(namep, is_directory(namep), Fflag) == 0) { 41003a1dab68SRich Burridge passtape(); 41013a1dab68SRich Burridge continue; 41023a1dab68SRich Burridge } 41033a1dab68SRich Burridge } 41047c478bd9Sstevel@tonic-gate /* 41057c478bd9Sstevel@tonic-gate * ACL support: 41067c478bd9Sstevel@tonic-gate * aclchar is introduced to indicate if there are 41077c478bd9Sstevel@tonic-gate * acl entries. longt() now takes one extra argument. 41087c478bd9Sstevel@tonic-gate */ 41097c478bd9Sstevel@tonic-gate if (vflag) { 41107c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == 'A') { 41117c478bd9Sstevel@tonic-gate aclchar = '+'; 41127c478bd9Sstevel@tonic-gate passtape(); 41137c478bd9Sstevel@tonic-gate continue; 41147c478bd9Sstevel@tonic-gate } 41157c478bd9Sstevel@tonic-gate longt(&stbuf, aclchar); 41167c478bd9Sstevel@tonic-gate aclchar = ' '; 41177c478bd9Sstevel@tonic-gate } 41187c478bd9Sstevel@tonic-gate 41197c478bd9Sstevel@tonic-gate 41207c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 4121da6c28aaSamw if (xattrp != NULL) { 4122da6c28aaSamw int issysattr; 4123da6c28aaSamw char *bn = basename(attrinfo->attr_path); 41247c478bd9Sstevel@tonic-gate 4125da6c28aaSamw /* 4126da6c28aaSamw * We could use sysattr_type() to test whether or not 4127da6c28aaSamw * the attribute we are processing is really an 4128da6c28aaSamw * extended system attribute, which as of this writing 4129da6c28aaSamw * just does a strcmp(), however, sysattr_type() may 4130da6c28aaSamw * be changed to issue a pathconf() call instead, which 4131da6c28aaSamw * would require being changed into the parent attribute 4132da6c28aaSamw * directory. So instead, just do simple string 4133da6c28aaSamw * comparisons to see if we are processing an extended 4134da6c28aaSamw * system attribute. 4135da6c28aaSamw */ 4136da6c28aaSamw issysattr = is_sysattr(bn); 4137da6c28aaSamw 4138da6c28aaSamw (void) printf(gettext("%s %sattribute %s"), 4139da6c28aaSamw xattrp->h_names, 4140da6c28aaSamw issysattr ? gettext("system ") : "", 4141da6c28aaSamw attrinfo->attr_path); 41427c478bd9Sstevel@tonic-gate } else { 41437c478bd9Sstevel@tonic-gate (void) printf("%s", namep); 41447c478bd9Sstevel@tonic-gate } 41457c478bd9Sstevel@tonic-gate #else 41467c478bd9Sstevel@tonic-gate (void) printf("%s", namep); 41477c478bd9Sstevel@tonic-gate #endif 41487c478bd9Sstevel@tonic-gate 41497c478bd9Sstevel@tonic-gate if (extno != 0) { 41507c478bd9Sstevel@tonic-gate if (vflag) { 41517c478bd9Sstevel@tonic-gate /* keep the '\n' for backwards compatibility */ 41527c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 41537c478bd9Sstevel@tonic-gate "\n [extent #%d of %d]"), extno, extotal); 41547c478bd9Sstevel@tonic-gate } else { 41557c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 41567c478bd9Sstevel@tonic-gate " [extent #%d of %d]"), extno, extotal); 41577c478bd9Sstevel@tonic-gate } 41587c478bd9Sstevel@tonic-gate } 41597c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) { 41607c478bd9Sstevel@tonic-gate (void) strcpy(templink, Xtarhdr.x_linkpath); 41617c478bd9Sstevel@tonic-gate } else { 41627c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 4163da6c28aaSamw if (xattrp != NULL) { 41647c478bd9Sstevel@tonic-gate (void) sprintf(templink, 41657c478bd9Sstevel@tonic-gate "file %.*s", NAMSIZ, xattrp->h_names); 41667c478bd9Sstevel@tonic-gate } else { 41677c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 41687c478bd9Sstevel@tonic-gate dblock.dbuf.linkname); 41697c478bd9Sstevel@tonic-gate } 41707c478bd9Sstevel@tonic-gate #else 41717c478bd9Sstevel@tonic-gate (void) sprintf(templink, "%.*s", NAMSIZ, 41727c478bd9Sstevel@tonic-gate dblock.dbuf.linkname); 41737c478bd9Sstevel@tonic-gate #endif 41747c478bd9Sstevel@tonic-gate templink[NAMSIZ] = '\0'; 41757c478bd9Sstevel@tonic-gate } 41767c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '1') { 41777c478bd9Sstevel@tonic-gate /* 41787c478bd9Sstevel@tonic-gate * TRANSLATION_NOTE 41797c478bd9Sstevel@tonic-gate * Subject is omitted here. 41807c478bd9Sstevel@tonic-gate * Translate this as if 41817c478bd9Sstevel@tonic-gate * <subject> linked to %s 41827c478bd9Sstevel@tonic-gate */ 41837c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 4184da6c28aaSamw if (xattrp != NULL) { 41857c478bd9Sstevel@tonic-gate (void) printf( 41867c478bd9Sstevel@tonic-gate gettext(" linked to attribute %s"), 41877c478bd9Sstevel@tonic-gate xattr_linkp->h_names + 41887c478bd9Sstevel@tonic-gate strlen(xattr_linkp->h_names) + 1); 41897c478bd9Sstevel@tonic-gate } else { 41907c478bd9Sstevel@tonic-gate (void) printf( 41917c478bd9Sstevel@tonic-gate gettext(" linked to %s"), templink); 41927c478bd9Sstevel@tonic-gate } 41937c478bd9Sstevel@tonic-gate #else 41947c478bd9Sstevel@tonic-gate (void) printf( 41957c478bd9Sstevel@tonic-gate gettext(" linked to %s"), templink); 41967c478bd9Sstevel@tonic-gate 41977c478bd9Sstevel@tonic-gate #endif 41987c478bd9Sstevel@tonic-gate } 41997c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '2') 42007c478bd9Sstevel@tonic-gate (void) printf(gettext( 42017c478bd9Sstevel@tonic-gate /* 42027c478bd9Sstevel@tonic-gate * TRANSLATION_NOTE 42037c478bd9Sstevel@tonic-gate * Subject is omitted here. 42047c478bd9Sstevel@tonic-gate * Translate this as if 42057c478bd9Sstevel@tonic-gate * <subject> symbolic link to %s 42067c478bd9Sstevel@tonic-gate */ 42077c478bd9Sstevel@tonic-gate " symbolic link to %s"), templink); 42087c478bd9Sstevel@tonic-gate (void) printf("\n"); 42097c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 4210da6c28aaSamw if (xattrp != NULL) { 42117c478bd9Sstevel@tonic-gate free(xattrhead); 42127c478bd9Sstevel@tonic-gate xattrp = NULL; 42137c478bd9Sstevel@tonic-gate xattrhead = NULL; 42147c478bd9Sstevel@tonic-gate } 42157c478bd9Sstevel@tonic-gate #endif 42167c478bd9Sstevel@tonic-gate passtape(); 42177c478bd9Sstevel@tonic-gate } 42187c478bd9Sstevel@tonic-gate /* 42197c478bd9Sstevel@tonic-gate * Check if the number of files tabled is different from the 42207c478bd9Sstevel@tonic-gate * number of files listed on the command line 42217c478bd9Sstevel@tonic-gate */ 42227c478bd9Sstevel@tonic-gate if (fcnt > tcnt) { 42237c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 42247c478bd9Sstevel@tonic-gate "tar: %d file(s) not found\n"), fcnt-tcnt); 42257c478bd9Sstevel@tonic-gate Errflg = 1; 42267c478bd9Sstevel@tonic-gate } 42277c478bd9Sstevel@tonic-gate } 42287c478bd9Sstevel@tonic-gate 42297c478bd9Sstevel@tonic-gate static void 42307c478bd9Sstevel@tonic-gate putempty(blkcnt_t n) 42317c478bd9Sstevel@tonic-gate { 42327c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 42337c478bd9Sstevel@tonic-gate char *cp; 42347c478bd9Sstevel@tonic-gate 42357c478bd9Sstevel@tonic-gate for (cp = buf; cp < &buf[TBLOCK]; ) 42367c478bd9Sstevel@tonic-gate *cp++ = '\0'; 42377c478bd9Sstevel@tonic-gate while (n-- > 0) 42387c478bd9Sstevel@tonic-gate (void) writetbuf(buf, 1); 42397c478bd9Sstevel@tonic-gate } 42407c478bd9Sstevel@tonic-gate 42417c478bd9Sstevel@tonic-gate static ushort_t Ftype = S_IFMT; 42427c478bd9Sstevel@tonic-gate 42437c478bd9Sstevel@tonic-gate static void 42447c478bd9Sstevel@tonic-gate verbose(struct stat *st, char aclchar) 42457c478bd9Sstevel@tonic-gate { 42467c478bd9Sstevel@tonic-gate int i, j, temp; 42477c478bd9Sstevel@tonic-gate mode_t mode; 42487c478bd9Sstevel@tonic-gate char modestr[12]; 42497c478bd9Sstevel@tonic-gate 42507c478bd9Sstevel@tonic-gate for (i = 0; i < 11; i++) 42517c478bd9Sstevel@tonic-gate modestr[i] = '-'; 42527c478bd9Sstevel@tonic-gate modestr[i] = '\0'; 42537c478bd9Sstevel@tonic-gate 42547c478bd9Sstevel@tonic-gate /* a '+' sign is printed if there is ACL */ 42557c478bd9Sstevel@tonic-gate modestr[i-1] = aclchar; 42567c478bd9Sstevel@tonic-gate 42577c478bd9Sstevel@tonic-gate mode = st->st_mode; 42587c478bd9Sstevel@tonic-gate for (i = 0; i < 3; i++) { 42597c478bd9Sstevel@tonic-gate temp = (mode >> (6 - (i * 3))); 42607c478bd9Sstevel@tonic-gate j = (i * 3) + 1; 42617c478bd9Sstevel@tonic-gate if (S_IROTH & temp) 42627c478bd9Sstevel@tonic-gate modestr[j] = 'r'; 42637c478bd9Sstevel@tonic-gate if (S_IWOTH & temp) 42647c478bd9Sstevel@tonic-gate modestr[j + 1] = 'w'; 42657c478bd9Sstevel@tonic-gate if (S_IXOTH & temp) 42667c478bd9Sstevel@tonic-gate modestr[j + 2] = 'x'; 42677c478bd9Sstevel@tonic-gate } 42687c478bd9Sstevel@tonic-gate temp = st->st_mode & Ftype; 42697c478bd9Sstevel@tonic-gate switch (temp) { 42707c478bd9Sstevel@tonic-gate case (S_IFIFO): 42717c478bd9Sstevel@tonic-gate modestr[0] = 'p'; 42727c478bd9Sstevel@tonic-gate break; 42737c478bd9Sstevel@tonic-gate case (S_IFCHR): 42747c478bd9Sstevel@tonic-gate modestr[0] = 'c'; 42757c478bd9Sstevel@tonic-gate break; 42767c478bd9Sstevel@tonic-gate case (S_IFDIR): 42777c478bd9Sstevel@tonic-gate modestr[0] = 'd'; 42787c478bd9Sstevel@tonic-gate break; 42797c478bd9Sstevel@tonic-gate case (S_IFBLK): 42807c478bd9Sstevel@tonic-gate modestr[0] = 'b'; 42817c478bd9Sstevel@tonic-gate break; 42827c478bd9Sstevel@tonic-gate case (S_IFREG): /* was initialized to '-' */ 42837c478bd9Sstevel@tonic-gate break; 42847c478bd9Sstevel@tonic-gate case (S_IFLNK): 42857c478bd9Sstevel@tonic-gate modestr[0] = 'l'; 42867c478bd9Sstevel@tonic-gate break; 42877c478bd9Sstevel@tonic-gate default: 42887c478bd9Sstevel@tonic-gate /* This field may be zero in old archives. */ 42897c478bd9Sstevel@tonic-gate if (is_posix && dblock.dbuf.typeflag != '1') { 42907c478bd9Sstevel@tonic-gate /* 42917c478bd9Sstevel@tonic-gate * For POSIX compliant archives, the mode field 42927c478bd9Sstevel@tonic-gate * consists of 12 bits, ie: the file type bits 42937c478bd9Sstevel@tonic-gate * are not stored in dblock.dbuf.mode. 42947c478bd9Sstevel@tonic-gate * For files other than hard links, getdir() sets 42957c478bd9Sstevel@tonic-gate * the file type bits in the st_mode field of the 42967c478bd9Sstevel@tonic-gate * stat structure based upon dblock.dbuf.typeflag. 42977c478bd9Sstevel@tonic-gate */ 42987c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 42997c478bd9Sstevel@tonic-gate "tar: impossible file type")); 43007c478bd9Sstevel@tonic-gate } 43017c478bd9Sstevel@tonic-gate } 43027c478bd9Sstevel@tonic-gate 43037c478bd9Sstevel@tonic-gate if ((S_ISUID & Gen.g_mode) == S_ISUID) 43047c478bd9Sstevel@tonic-gate modestr[3] = 's'; 43057c478bd9Sstevel@tonic-gate if ((S_ISVTX & Gen.g_mode) == S_ISVTX) 43067c478bd9Sstevel@tonic-gate modestr[9] = 't'; 43077c478bd9Sstevel@tonic-gate if ((S_ISGID & Gen.g_mode) == S_ISGID && modestr[6] == 'x') 43087c478bd9Sstevel@tonic-gate modestr[6] = 's'; 43097c478bd9Sstevel@tonic-gate else if ((S_ENFMT & Gen.g_mode) == S_ENFMT && modestr[6] != 'x') 43107c478bd9Sstevel@tonic-gate modestr[6] = 'l'; 43117c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%s", modestr); 43127c478bd9Sstevel@tonic-gate } 43137c478bd9Sstevel@tonic-gate 43147c478bd9Sstevel@tonic-gate static void 43157c478bd9Sstevel@tonic-gate longt(struct stat *st, char aclchar) 43167c478bd9Sstevel@tonic-gate { 43177c478bd9Sstevel@tonic-gate char fileDate[30]; 43187c478bd9Sstevel@tonic-gate struct tm *tm; 43197c478bd9Sstevel@tonic-gate 43207c478bd9Sstevel@tonic-gate verbose(st, aclchar); 43217c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%3ld/%-3ld", st->st_uid, st->st_gid); 43227c478bd9Sstevel@tonic-gate 43237c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == '2') { 43247c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) 43257c478bd9Sstevel@tonic-gate st->st_size = (off_t)strlen(Xtarhdr.x_linkpath); 43267c478bd9Sstevel@tonic-gate else 43277c478bd9Sstevel@tonic-gate st->st_size = (off_t)(memchr(dblock.dbuf.linkname, 43287c478bd9Sstevel@tonic-gate '\0', NAMSIZ) ? 43297c478bd9Sstevel@tonic-gate (strlen(dblock.dbuf.linkname)) : (NAMSIZ)); 43307c478bd9Sstevel@tonic-gate } 43317c478bd9Sstevel@tonic-gate (void) fprintf(vfile, " %6" FMT_off_t, st->st_size); 43327c478bd9Sstevel@tonic-gate 43337c478bd9Sstevel@tonic-gate tm = localtime(&(st->st_mtime)); 43347c478bd9Sstevel@tonic-gate (void) strftime(fileDate, sizeof (fileDate), 43357c478bd9Sstevel@tonic-gate dcgettext((const char *)0, "%b %e %R %Y", LC_TIME), tm); 43367c478bd9Sstevel@tonic-gate (void) fprintf(vfile, " %s ", fileDate); 43377c478bd9Sstevel@tonic-gate } 43387c478bd9Sstevel@tonic-gate 43397c478bd9Sstevel@tonic-gate 43407c478bd9Sstevel@tonic-gate /* 43417c478bd9Sstevel@tonic-gate * checkdir - Attempt to ensure that the path represented in name 43427c478bd9Sstevel@tonic-gate * exists, and return 1 if this is true and name itself is a 43437c478bd9Sstevel@tonic-gate * directory. 43447c478bd9Sstevel@tonic-gate * Return 0 if this path cannot be created or if name is not 43457c478bd9Sstevel@tonic-gate * a directory. 43467c478bd9Sstevel@tonic-gate */ 43477c478bd9Sstevel@tonic-gate 43487c478bd9Sstevel@tonic-gate static int 43497c478bd9Sstevel@tonic-gate checkdir(char *name) 43507c478bd9Sstevel@tonic-gate { 43517c478bd9Sstevel@tonic-gate char lastChar; /* the last character in name */ 43527c478bd9Sstevel@tonic-gate char *cp; /* scratch pointer into name */ 43537c478bd9Sstevel@tonic-gate char *firstSlash = NULL; /* first slash in name */ 43547c478bd9Sstevel@tonic-gate char *lastSlash = NULL; /* last slash in name */ 43557c478bd9Sstevel@tonic-gate int nameLen; /* length of name */ 43567c478bd9Sstevel@tonic-gate int trailingSlash; /* true if name ends in slash */ 43577c478bd9Sstevel@tonic-gate int leadingSlash; /* true if name begins with slash */ 43587c478bd9Sstevel@tonic-gate int markedDir; /* true if name denotes a directory */ 43597c478bd9Sstevel@tonic-gate int success; /* status of makeDir call */ 43607c478bd9Sstevel@tonic-gate 43617c478bd9Sstevel@tonic-gate 43627c478bd9Sstevel@tonic-gate /* 43637c478bd9Sstevel@tonic-gate * Scan through the name, and locate first and last slashes. 43647c478bd9Sstevel@tonic-gate */ 43657c478bd9Sstevel@tonic-gate 43667c478bd9Sstevel@tonic-gate for (cp = name; *cp; cp++) { 43677c478bd9Sstevel@tonic-gate if (*cp == '/') { 43687c478bd9Sstevel@tonic-gate if (! firstSlash) { 43697c478bd9Sstevel@tonic-gate firstSlash = cp; 43707c478bd9Sstevel@tonic-gate } 43717c478bd9Sstevel@tonic-gate lastSlash = cp; 43727c478bd9Sstevel@tonic-gate } 43737c478bd9Sstevel@tonic-gate } 43747c478bd9Sstevel@tonic-gate 43757c478bd9Sstevel@tonic-gate /* 43767c478bd9Sstevel@tonic-gate * Determine what you can from the proceeds of the scan. 43777c478bd9Sstevel@tonic-gate */ 43787c478bd9Sstevel@tonic-gate 43797c478bd9Sstevel@tonic-gate lastChar = *(cp - 1); 43807c478bd9Sstevel@tonic-gate nameLen = (int)(cp - name); 43817c478bd9Sstevel@tonic-gate trailingSlash = (lastChar == '/'); 43827c478bd9Sstevel@tonic-gate leadingSlash = (*name == '/'); 43837c478bd9Sstevel@tonic-gate markedDir = (dblock.dbuf.typeflag == '5' || trailingSlash); 43847c478bd9Sstevel@tonic-gate 43857c478bd9Sstevel@tonic-gate if (! lastSlash && ! markedDir) { 43867c478bd9Sstevel@tonic-gate /* 43877c478bd9Sstevel@tonic-gate * The named file does not have any subdrectory 43887c478bd9Sstevel@tonic-gate * structure; just bail out. 43897c478bd9Sstevel@tonic-gate */ 43907c478bd9Sstevel@tonic-gate 43917c478bd9Sstevel@tonic-gate return (0); 43927c478bd9Sstevel@tonic-gate } 43937c478bd9Sstevel@tonic-gate 43947c478bd9Sstevel@tonic-gate /* 43957c478bd9Sstevel@tonic-gate * Make sure that name doesn`t end with slash for the loop. 43967c478bd9Sstevel@tonic-gate * This ensures that the makeDir attempt after the loop is 43977c478bd9Sstevel@tonic-gate * meaningful. 43987c478bd9Sstevel@tonic-gate */ 43997c478bd9Sstevel@tonic-gate 44007c478bd9Sstevel@tonic-gate if (trailingSlash) { 44017c478bd9Sstevel@tonic-gate name[nameLen-1] = '\0'; 44027c478bd9Sstevel@tonic-gate } 44037c478bd9Sstevel@tonic-gate 44047c478bd9Sstevel@tonic-gate /* 44057c478bd9Sstevel@tonic-gate * Make the path one component at a time. 44067c478bd9Sstevel@tonic-gate */ 44077c478bd9Sstevel@tonic-gate 44087c478bd9Sstevel@tonic-gate for (cp = strchr(leadingSlash ? name+1 : name, '/'); 44097c478bd9Sstevel@tonic-gate cp; 44107c478bd9Sstevel@tonic-gate cp = strchr(cp+1, '/')) { 44117c478bd9Sstevel@tonic-gate *cp = '\0'; 44127c478bd9Sstevel@tonic-gate success = makeDir(name); 44137c478bd9Sstevel@tonic-gate *cp = '/'; 44147c478bd9Sstevel@tonic-gate 44157c478bd9Sstevel@tonic-gate if (!success) { 44167c478bd9Sstevel@tonic-gate name[nameLen-1] = lastChar; 44177c478bd9Sstevel@tonic-gate return (0); 44187c478bd9Sstevel@tonic-gate } 44197c478bd9Sstevel@tonic-gate } 44207c478bd9Sstevel@tonic-gate 44217c478bd9Sstevel@tonic-gate /* 44227c478bd9Sstevel@tonic-gate * This makes the last component of the name, if it is a 44237c478bd9Sstevel@tonic-gate * directory. 44247c478bd9Sstevel@tonic-gate */ 44257c478bd9Sstevel@tonic-gate 44267c478bd9Sstevel@tonic-gate if (markedDir) { 44277c478bd9Sstevel@tonic-gate if (! makeDir(name)) { 44287c478bd9Sstevel@tonic-gate name[nameLen-1] = lastChar; 44297c478bd9Sstevel@tonic-gate return (0); 44307c478bd9Sstevel@tonic-gate } 44317c478bd9Sstevel@tonic-gate } 44327c478bd9Sstevel@tonic-gate 44337c478bd9Sstevel@tonic-gate name[nameLen-1] = (lastChar == '/') ? '\0' : lastChar; 44347c478bd9Sstevel@tonic-gate return (markedDir); 44357c478bd9Sstevel@tonic-gate } 44367c478bd9Sstevel@tonic-gate 44377c478bd9Sstevel@tonic-gate /* 44387c478bd9Sstevel@tonic-gate * resugname - Restore the user name and group name. Search the NIS 44397c478bd9Sstevel@tonic-gate * before using the uid and gid. 44407c478bd9Sstevel@tonic-gate * (It is presumed that an archive entry cannot be 44417c478bd9Sstevel@tonic-gate * simultaneously a symlink and some other type.) 44427c478bd9Sstevel@tonic-gate */ 44437c478bd9Sstevel@tonic-gate 44447c478bd9Sstevel@tonic-gate static void 44457c478bd9Sstevel@tonic-gate resugname(int dirfd, /* dir fd file resides in */ 44467c478bd9Sstevel@tonic-gate char *name, /* name of the file to be modified */ 44477c478bd9Sstevel@tonic-gate int symflag) /* true if file is a symbolic link */ 44487c478bd9Sstevel@tonic-gate { 44497c478bd9Sstevel@tonic-gate uid_t duid; 44507c478bd9Sstevel@tonic-gate gid_t dgid; 44517c478bd9Sstevel@tonic-gate struct stat *sp = &stbuf; 44527c478bd9Sstevel@tonic-gate char *u_g_name; 44537c478bd9Sstevel@tonic-gate 44547c478bd9Sstevel@tonic-gate if (checkflag == 1) { /* Extended tar format and euid == 0 */ 44557c478bd9Sstevel@tonic-gate 44567c478bd9Sstevel@tonic-gate /* 44577c478bd9Sstevel@tonic-gate * Try and extract the intended uid and gid from the name 44587c478bd9Sstevel@tonic-gate * service before believing the uid and gid in the header. 44597c478bd9Sstevel@tonic-gate * 44607c478bd9Sstevel@tonic-gate * In the case where we archived a setuid or setgid file 44617c478bd9Sstevel@tonic-gate * owned by someone with a large uid, then it will 44627c478bd9Sstevel@tonic-gate * have made it into the archive with a uid of nobody. If 44637c478bd9Sstevel@tonic-gate * the corresponding username doesn't appear to exist, then we 44647c478bd9Sstevel@tonic-gate * want to make sure it *doesn't* end up as setuid nobody! 44657c478bd9Sstevel@tonic-gate * 44667c478bd9Sstevel@tonic-gate * Our caller will print an error message about the fact 44677c478bd9Sstevel@tonic-gate * that the restore didn't work out quite right .. 44687c478bd9Sstevel@tonic-gate */ 44697c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_UNAME) 44707c478bd9Sstevel@tonic-gate u_g_name = Xtarhdr.x_uname; 44717c478bd9Sstevel@tonic-gate else 44727c478bd9Sstevel@tonic-gate u_g_name = dblock.dbuf.uname; 44737c478bd9Sstevel@tonic-gate if ((duid = getuidbyname(u_g_name)) == -1) { 44747c478bd9Sstevel@tonic-gate if (S_ISREG(sp->st_mode) && sp->st_uid == UID_NOBODY && 44757c478bd9Sstevel@tonic-gate (sp->st_mode & S_ISUID) == S_ISUID) 44767c478bd9Sstevel@tonic-gate (void) chmod(name, 44777c478bd9Sstevel@tonic-gate MODEMASK & sp->st_mode & ~S_ISUID); 44787c478bd9Sstevel@tonic-gate duid = sp->st_uid; 44797c478bd9Sstevel@tonic-gate } 44807c478bd9Sstevel@tonic-gate 44817c478bd9Sstevel@tonic-gate /* (Ditto for gids) */ 44827c478bd9Sstevel@tonic-gate 44837c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_GNAME) 44847c478bd9Sstevel@tonic-gate u_g_name = Xtarhdr.x_gname; 44857c478bd9Sstevel@tonic-gate else 44867c478bd9Sstevel@tonic-gate u_g_name = dblock.dbuf.gname; 44877c478bd9Sstevel@tonic-gate if ((dgid = getgidbyname(u_g_name)) == -1) { 44887c478bd9Sstevel@tonic-gate if (S_ISREG(sp->st_mode) && sp->st_gid == GID_NOBODY && 44897c478bd9Sstevel@tonic-gate (sp->st_mode & S_ISGID) == S_ISGID) 44907c478bd9Sstevel@tonic-gate (void) chmod(name, 44917c478bd9Sstevel@tonic-gate MODEMASK & sp->st_mode & ~S_ISGID); 44927c478bd9Sstevel@tonic-gate dgid = sp->st_gid; 44937c478bd9Sstevel@tonic-gate } 44947c478bd9Sstevel@tonic-gate } else if (checkflag == 2) { /* tar format and euid == 0 */ 44957c478bd9Sstevel@tonic-gate duid = sp->st_uid; 44967c478bd9Sstevel@tonic-gate dgid = sp->st_gid; 44977c478bd9Sstevel@tonic-gate } 44987c478bd9Sstevel@tonic-gate if ((checkflag == 1) || (checkflag == 2)) 44997c478bd9Sstevel@tonic-gate (void) fchownat(dirfd, name, duid, dgid, symflag); 45007c478bd9Sstevel@tonic-gate } 45017c478bd9Sstevel@tonic-gate 45027c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 45037c478bd9Sstevel@tonic-gate static void 45047c478bd9Sstevel@tonic-gate onintr(int sig) 45057c478bd9Sstevel@tonic-gate { 45067c478bd9Sstevel@tonic-gate (void) signal(SIGINT, SIG_IGN); 45077c478bd9Sstevel@tonic-gate term++; 45087c478bd9Sstevel@tonic-gate } 45097c478bd9Sstevel@tonic-gate 45107c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 45117c478bd9Sstevel@tonic-gate static void 45127c478bd9Sstevel@tonic-gate onquit(int sig) 45137c478bd9Sstevel@tonic-gate { 45147c478bd9Sstevel@tonic-gate (void) signal(SIGQUIT, SIG_IGN); 45157c478bd9Sstevel@tonic-gate term++; 45167c478bd9Sstevel@tonic-gate } 45177c478bd9Sstevel@tonic-gate 45187c478bd9Sstevel@tonic-gate /*ARGSUSED*/ 45197c478bd9Sstevel@tonic-gate static void 45207c478bd9Sstevel@tonic-gate onhup(int sig) 45217c478bd9Sstevel@tonic-gate { 45227c478bd9Sstevel@tonic-gate (void) signal(SIGHUP, SIG_IGN); 45237c478bd9Sstevel@tonic-gate term++; 45247c478bd9Sstevel@tonic-gate } 45257c478bd9Sstevel@tonic-gate 45267c478bd9Sstevel@tonic-gate static void 45277c478bd9Sstevel@tonic-gate tomodes(struct stat *sp) 45287c478bd9Sstevel@tonic-gate { 45297c478bd9Sstevel@tonic-gate uid_t uid; 45307c478bd9Sstevel@tonic-gate gid_t gid; 45317c478bd9Sstevel@tonic-gate 45327c478bd9Sstevel@tonic-gate bzero(dblock.dummy, TBLOCK); 45337c478bd9Sstevel@tonic-gate 45347c478bd9Sstevel@tonic-gate /* 45357c478bd9Sstevel@tonic-gate * If the uid or gid is too large, we can't put it into 45367c478bd9Sstevel@tonic-gate * the archive. We could fail to put anything in the 45377c478bd9Sstevel@tonic-gate * archive at all .. but most of the time the name service 45387c478bd9Sstevel@tonic-gate * will save the day when we do a lookup at restore time. 45397c478bd9Sstevel@tonic-gate * 45407c478bd9Sstevel@tonic-gate * Instead we choose a "safe" uid and gid, and fix up whether 45417c478bd9Sstevel@tonic-gate * or not the setuid and setgid bits are left set to extraction 45427c478bd9Sstevel@tonic-gate * time. 45437c478bd9Sstevel@tonic-gate */ 45447c478bd9Sstevel@tonic-gate if (Eflag) { 45457c478bd9Sstevel@tonic-gate if ((ulong_t)(uid = sp->st_uid) > (ulong_t)OCTAL7CHAR) { 45467c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_UID; 45477c478bd9Sstevel@tonic-gate Xtarhdr.x_uid = uid; 45487c478bd9Sstevel@tonic-gate } 45497c478bd9Sstevel@tonic-gate if ((ulong_t)(gid = sp->st_gid) > (ulong_t)OCTAL7CHAR) { 45507c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_GID; 45517c478bd9Sstevel@tonic-gate Xtarhdr.x_gid = gid; 45527c478bd9Sstevel@tonic-gate } 45537c478bd9Sstevel@tonic-gate if (sp->st_size > TAR_OFFSET_MAX) { 45547c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_SIZE; 45557c478bd9Sstevel@tonic-gate Xtarhdr.x_filesz = sp->st_size; 45567c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o, 45577c478bd9Sstevel@tonic-gate (off_t)0); 45587c478bd9Sstevel@tonic-gate } else 45597c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o, 45607c478bd9Sstevel@tonic-gate sp->st_size); 45617c478bd9Sstevel@tonic-gate } else { 45627c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.size, "%011" FMT_off_t_o, 45637c478bd9Sstevel@tonic-gate sp->st_size); 45647c478bd9Sstevel@tonic-gate } 45657c478bd9Sstevel@tonic-gate if ((ulong_t)(uid = sp->st_uid) > (ulong_t)OCTAL7CHAR) 45667c478bd9Sstevel@tonic-gate uid = UID_NOBODY; 45677c478bd9Sstevel@tonic-gate if ((ulong_t)(gid = sp->st_gid) > (ulong_t)OCTAL7CHAR) 45687c478bd9Sstevel@tonic-gate gid = GID_NOBODY; 45697c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.gid, "%07lo", gid); 45707c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.uid, "%07lo", uid); 45717c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mode, "%07lo", sp->st_mode & POSIXMODES); 45727c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mtime, "%011lo", sp->st_mtime); 45737c478bd9Sstevel@tonic-gate } 45747c478bd9Sstevel@tonic-gate 45757c478bd9Sstevel@tonic-gate static int 45767c478bd9Sstevel@tonic-gate #ifdef EUC 45777c478bd9Sstevel@tonic-gate /* 45787c478bd9Sstevel@tonic-gate * Warning: the result of this function depends whether 'char' is a 45797c478bd9Sstevel@tonic-gate * signed or unsigned data type. This a source of potential 45807c478bd9Sstevel@tonic-gate * non-portability among heterogeneous systems. It is retained here 45817c478bd9Sstevel@tonic-gate * for backward compatibility. 45827c478bd9Sstevel@tonic-gate */ 45837c478bd9Sstevel@tonic-gate checksum_signed(union hblock *dblockp) 45847c478bd9Sstevel@tonic-gate #else 45857c478bd9Sstevel@tonic-gate checksum(union hblock *dblockp) 45867c478bd9Sstevel@tonic-gate #endif /* EUC */ 45877c478bd9Sstevel@tonic-gate { 45887c478bd9Sstevel@tonic-gate int i; 45897c478bd9Sstevel@tonic-gate char *cp; 45907c478bd9Sstevel@tonic-gate 45917c478bd9Sstevel@tonic-gate for (cp = dblockp->dbuf.chksum; 45927c478bd9Sstevel@tonic-gate cp < &dblockp->dbuf.chksum[sizeof (dblockp->dbuf.chksum)]; cp++) 45937c478bd9Sstevel@tonic-gate *cp = ' '; 45947c478bd9Sstevel@tonic-gate i = 0; 45957c478bd9Sstevel@tonic-gate for (cp = dblockp->dummy; cp < &(dblockp->dummy[TBLOCK]); cp++) 45967c478bd9Sstevel@tonic-gate i += *cp; 45977c478bd9Sstevel@tonic-gate return (i); 45987c478bd9Sstevel@tonic-gate } 45997c478bd9Sstevel@tonic-gate 46007c478bd9Sstevel@tonic-gate #ifdef EUC 46017c478bd9Sstevel@tonic-gate /* 46027c478bd9Sstevel@tonic-gate * Generate unsigned checksum, regardless of what C compiler is 46037c478bd9Sstevel@tonic-gate * used. Survives in the face of arbitrary 8-bit clean filenames, 46047c478bd9Sstevel@tonic-gate * e.g., internationalized filenames. 46057c478bd9Sstevel@tonic-gate */ 46067c478bd9Sstevel@tonic-gate static int 46077c478bd9Sstevel@tonic-gate checksum(union hblock *dblockp) 46087c478bd9Sstevel@tonic-gate { 46097c478bd9Sstevel@tonic-gate unsigned i; 46107c478bd9Sstevel@tonic-gate unsigned char *cp; 46117c478bd9Sstevel@tonic-gate 46127c478bd9Sstevel@tonic-gate for (cp = (unsigned char *) dblockp->dbuf.chksum; 46137c478bd9Sstevel@tonic-gate cp < (unsigned char *) 46147c478bd9Sstevel@tonic-gate &(dblockp->dbuf.chksum[sizeof (dblockp->dbuf.chksum)]); cp++) 46157c478bd9Sstevel@tonic-gate *cp = ' '; 46167c478bd9Sstevel@tonic-gate i = 0; 46177c478bd9Sstevel@tonic-gate for (cp = (unsigned char *) dblockp->dummy; 46187c478bd9Sstevel@tonic-gate cp < (unsigned char *) &(dblockp->dummy[TBLOCK]); cp++) 46197c478bd9Sstevel@tonic-gate i += *cp; 46207c478bd9Sstevel@tonic-gate 46217c478bd9Sstevel@tonic-gate return (i); 46227c478bd9Sstevel@tonic-gate } 46237c478bd9Sstevel@tonic-gate #endif /* EUC */ 46247c478bd9Sstevel@tonic-gate 46257c478bd9Sstevel@tonic-gate /* 46267c478bd9Sstevel@tonic-gate * If the w flag is set, output the action to be taken and the name of the 46277c478bd9Sstevel@tonic-gate * file. Perform the action if the user response is affirmative. 46287c478bd9Sstevel@tonic-gate */ 46297c478bd9Sstevel@tonic-gate 46307c478bd9Sstevel@tonic-gate static int 46317c478bd9Sstevel@tonic-gate checkw(char c, char *name) 46327c478bd9Sstevel@tonic-gate { 46337c478bd9Sstevel@tonic-gate if (wflag) { 46347c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%c ", c); 46357c478bd9Sstevel@tonic-gate if (vflag) 46367c478bd9Sstevel@tonic-gate longt(&stbuf, ' '); /* do we have acl info here */ 46377c478bd9Sstevel@tonic-gate (void) fprintf(vfile, "%s: ", name); 46383d63ea05Sas145665 if (yes() == 1) { 46397c478bd9Sstevel@tonic-gate return (1); 46407c478bd9Sstevel@tonic-gate } 46417c478bd9Sstevel@tonic-gate return (0); 46427c478bd9Sstevel@tonic-gate } 46437c478bd9Sstevel@tonic-gate return (1); 46447c478bd9Sstevel@tonic-gate } 46457c478bd9Sstevel@tonic-gate 46467c478bd9Sstevel@tonic-gate /* 46473a1dab68SRich Burridge * When the F flag is set, exclude RCS and SCCS directories (and any files 46483a1dab68SRich Burridge * or directories under them). If F is set twice, also exclude .o files, 46493a1dab68SRich Burridge * and files names errs, core, and a.out. 46503a1dab68SRich Burridge * 46513a1dab68SRich Burridge * Return 0 if file should be excluded, 1 otherwise. 46527c478bd9Sstevel@tonic-gate */ 46537c478bd9Sstevel@tonic-gate 46547c478bd9Sstevel@tonic-gate static int 46553a1dab68SRich Burridge checkf(char *longname, int is_dir, int howmuch) 46567c478bd9Sstevel@tonic-gate { 46573a1dab68SRich Burridge static char fullname[PATH_MAX + 1]; 46583a1dab68SRich Burridge char *dir, *name; 46597c478bd9Sstevel@tonic-gate 46603a1dab68SRich Burridge #if defined(O_XATTR) 46613a1dab68SRich Burridge /* 46623a1dab68SRich Burridge * If there is an xattr_buf structure associated with this file, 46633a1dab68SRich Burridge * always return 1. 46643a1dab68SRich Burridge */ 46653a1dab68SRich Burridge if (xattrp) { 46667c478bd9Sstevel@tonic-gate return (1); 46677c478bd9Sstevel@tonic-gate } 46683a1dab68SRich Burridge #endif 46693a1dab68SRich Burridge 46703a1dab68SRich Burridge /* 46713a1dab68SRich Burridge * First check to see if the base name is an RCS or SCCS directory. 46723a1dab68SRich Burridge */ 46733a1dab68SRich Burridge if (strlcpy(fullname, longname, sizeof (fullname)) >= sizeof (fullname)) 46747c478bd9Sstevel@tonic-gate return (1); 46753a1dab68SRich Burridge 46763a1dab68SRich Burridge name = basename(fullname); 46773a1dab68SRich Burridge if (is_dir) { 46783a1dab68SRich Burridge if ((strcmp(name, "SCCS") == 0) || (strcmp(name, "RCS") == 0)) 46797c478bd9Sstevel@tonic-gate return (0); 46803a1dab68SRich Burridge } 46813a1dab68SRich Burridge 46823a1dab68SRich Burridge /* 46833a1dab68SRich Burridge * If two -F command line options were given then exclude .o files, 46843a1dab68SRich Burridge * and files named errs, core, and a.out. 46853a1dab68SRich Burridge */ 46863a1dab68SRich Burridge if (howmuch > 1 && !is_dir) { 46873a1dab68SRich Burridge size_t l = strlen(name); 46883a1dab68SRich Burridge 46893a1dab68SRich Burridge if (l >= 3 && name[l - 2] == '.' && name[l - 1] == 'o') 46903a1dab68SRich Burridge return (0); 46917c478bd9Sstevel@tonic-gate if (strcmp(name, "core") == 0 || strcmp(name, "errs") == 0 || 46927c478bd9Sstevel@tonic-gate strcmp(name, "a.out") == 0) 46937c478bd9Sstevel@tonic-gate return (0); 46947c478bd9Sstevel@tonic-gate } 46957c478bd9Sstevel@tonic-gate 46963a1dab68SRich Burridge /* 46973a1dab68SRich Burridge * At this point, check to see if this file has a parent directory 46983a1dab68SRich Burridge * named RCS or SCCS. If so, then this file should be excluded too. 46993a1dab68SRich Burridge * The strcpy() operation is done again, because basename(3C) may 47003a1dab68SRich Burridge * modify the path string passed to it. 47013a1dab68SRich Burridge */ 47023a1dab68SRich Burridge if (strlcpy(fullname, longname, sizeof (fullname)) >= sizeof (fullname)) 47033a1dab68SRich Burridge return (1); 47043a1dab68SRich Burridge 47053a1dab68SRich Burridge dir = dirname(fullname); 47063a1dab68SRich Burridge while (strcmp(dir, ".") != 0) { 47073a1dab68SRich Burridge name = basename(dir); 47083a1dab68SRich Burridge if ((strcmp(name, "SCCS") == 0) || (strcmp(name, "RCS") == 0)) 47093a1dab68SRich Burridge return (0); 47103a1dab68SRich Burridge dir = dirname(dir); 47113a1dab68SRich Burridge } 47123a1dab68SRich Burridge 47137c478bd9Sstevel@tonic-gate return (1); 47147c478bd9Sstevel@tonic-gate } 47157c478bd9Sstevel@tonic-gate 47167c478bd9Sstevel@tonic-gate static int 47177c478bd9Sstevel@tonic-gate response(void) 47187c478bd9Sstevel@tonic-gate { 47197c478bd9Sstevel@tonic-gate int c; 47207c478bd9Sstevel@tonic-gate 47217c478bd9Sstevel@tonic-gate c = getchar(); 47227c478bd9Sstevel@tonic-gate if (c != '\n') 4723eace40a5Sceastha while (getchar() != '\n') 4724eace40a5Sceastha ; 47257c478bd9Sstevel@tonic-gate else c = 'n'; 47267c478bd9Sstevel@tonic-gate return ((c >= 'A' && c <= 'Z') ? c + ('a'-'A') : c); 47277c478bd9Sstevel@tonic-gate } 47287c478bd9Sstevel@tonic-gate 47297c478bd9Sstevel@tonic-gate /* Has file been modified since being put into archive? If so, return > 0. */ 47307c478bd9Sstevel@tonic-gate 4731d67944fbSScott Rotondo static off_t lookup(char *); 4732d67944fbSScott Rotondo 47337c478bd9Sstevel@tonic-gate static int 47347c478bd9Sstevel@tonic-gate checkupdate(char *arg) 47357c478bd9Sstevel@tonic-gate { 47367c478bd9Sstevel@tonic-gate char name[PATH_MAX+1]; 47377c478bd9Sstevel@tonic-gate time_t mtime; 47387c478bd9Sstevel@tonic-gate long nsecs; 47397c478bd9Sstevel@tonic-gate off_t seekp; 47407c478bd9Sstevel@tonic-gate 47417c478bd9Sstevel@tonic-gate rewind(tfile); 47427c478bd9Sstevel@tonic-gate if ((seekp = lookup(arg)) < 0) 47437c478bd9Sstevel@tonic-gate return (1); 47447c478bd9Sstevel@tonic-gate (void) fseek(tfile, seekp, 0); 47457c478bd9Sstevel@tonic-gate (void) fscanf(tfile, "%s %ld.%ld", name, &mtime, &nsecs); 47467c478bd9Sstevel@tonic-gate 47477c478bd9Sstevel@tonic-gate /* 47487c478bd9Sstevel@tonic-gate * Unless nanoseconds were stored in the file, only use seconds for 47497c478bd9Sstevel@tonic-gate * comparison of time. Nanoseconds are stored when -E is specified. 47507c478bd9Sstevel@tonic-gate */ 47517c478bd9Sstevel@tonic-gate if (Eflag == 0) 47527c478bd9Sstevel@tonic-gate return (stbuf.st_mtime > mtime); 47537c478bd9Sstevel@tonic-gate 47547c478bd9Sstevel@tonic-gate if ((stbuf.st_mtime < mtime) || 47557c478bd9Sstevel@tonic-gate ((stbuf.st_mtime == mtime) && (stbuf.st_mtim.tv_nsec <= nsecs))) 47567c478bd9Sstevel@tonic-gate return (0); 47577c478bd9Sstevel@tonic-gate return (1); 47587c478bd9Sstevel@tonic-gate } 47597c478bd9Sstevel@tonic-gate 47607c478bd9Sstevel@tonic-gate 47617c478bd9Sstevel@tonic-gate /* 47627c478bd9Sstevel@tonic-gate * newvol get new floppy (or tape) volume 47637c478bd9Sstevel@tonic-gate * 47647c478bd9Sstevel@tonic-gate * newvol(); resets tapepos and first to TRUE, prompts for 47657c478bd9Sstevel@tonic-gate * for new volume, and waits. 47667c478bd9Sstevel@tonic-gate * if dumping, end-of-file is written onto the tape. 47677c478bd9Sstevel@tonic-gate */ 47687c478bd9Sstevel@tonic-gate 47697c478bd9Sstevel@tonic-gate static void 47707c478bd9Sstevel@tonic-gate newvol(void) 47717c478bd9Sstevel@tonic-gate { 47727c478bd9Sstevel@tonic-gate int c; 47737c478bd9Sstevel@tonic-gate 47747c478bd9Sstevel@tonic-gate if (dumping) { 47757c478bd9Sstevel@tonic-gate #ifdef DEBUG 47767c478bd9Sstevel@tonic-gate DEBUG("newvol called with 'dumping' set\n", 0, 0); 47777c478bd9Sstevel@tonic-gate #endif 47787c478bd9Sstevel@tonic-gate putempty((blkcnt_t)2); /* 2 EOT marks */ 47797c478bd9Sstevel@tonic-gate closevol(); 47807c478bd9Sstevel@tonic-gate flushtape(); 47817c478bd9Sstevel@tonic-gate sync(); 47827c478bd9Sstevel@tonic-gate tapepos = 0; 47837c478bd9Sstevel@tonic-gate } else 47847c478bd9Sstevel@tonic-gate first = TRUE; 47857c478bd9Sstevel@tonic-gate if (close(mt) != 0) 47867c478bd9Sstevel@tonic-gate vperror(2, gettext("close error")); 47877c478bd9Sstevel@tonic-gate mt = 0; 47887c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 47897c478bd9Sstevel@tonic-gate "tar: \007please insert new volume, then press RETURN.")); 47907c478bd9Sstevel@tonic-gate (void) fseek(stdin, (off_t)0, 2); /* scan over read-ahead */ 47917c478bd9Sstevel@tonic-gate while ((c = getchar()) != '\n' && ! term) 47927c478bd9Sstevel@tonic-gate if (c == EOF) 47937c478bd9Sstevel@tonic-gate done(Errflg); 47947c478bd9Sstevel@tonic-gate if (term) 47957c478bd9Sstevel@tonic-gate done(Errflg); 47967c478bd9Sstevel@tonic-gate 47977c478bd9Sstevel@tonic-gate errno = 0; 47987c478bd9Sstevel@tonic-gate 47997c478bd9Sstevel@tonic-gate if (strcmp(usefile, "-") == 0) { 48007c478bd9Sstevel@tonic-gate mt = dup(1); 48017c478bd9Sstevel@tonic-gate } else { 48027c478bd9Sstevel@tonic-gate mt = open(usefile, dumping ? update : 0); 48037c478bd9Sstevel@tonic-gate } 48047c478bd9Sstevel@tonic-gate 48057c478bd9Sstevel@tonic-gate if (mt < 0) { 48067c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 48077c478bd9Sstevel@tonic-gate "tar: cannot reopen %s (%s)\n"), 48087c478bd9Sstevel@tonic-gate dumping ? gettext("output") : gettext("input"), usefile); 48097c478bd9Sstevel@tonic-gate 48108e4a71aeSRich Burridge #ifdef DEBUG 48118e4a71aeSRich Burridge DEBUG("update=%d, usefile=%s ", update, usefile); 48128e4a71aeSRich Burridge DEBUG("mt=%d, [%s]\n", mt, strerror(errno)); 48138e4a71aeSRich Burridge #endif 48147c478bd9Sstevel@tonic-gate 48157c478bd9Sstevel@tonic-gate done(2); 48167c478bd9Sstevel@tonic-gate } 48177c478bd9Sstevel@tonic-gate } 48187c478bd9Sstevel@tonic-gate 48197c478bd9Sstevel@tonic-gate /* 48207c478bd9Sstevel@tonic-gate * Write a trailer portion to close out the current output volume. 48217c478bd9Sstevel@tonic-gate */ 48227c478bd9Sstevel@tonic-gate 48237c478bd9Sstevel@tonic-gate static void 48247c478bd9Sstevel@tonic-gate closevol(void) 48257c478bd9Sstevel@tonic-gate { 48267c478bd9Sstevel@tonic-gate if (mulvol) { 48277c478bd9Sstevel@tonic-gate /* 48287c478bd9Sstevel@tonic-gate * blocklim does not count the 2 EOT marks; 48297c478bd9Sstevel@tonic-gate * tapepos does count the 2 EOT marks; 48307c478bd9Sstevel@tonic-gate * therefore we need the +2 below. 48317c478bd9Sstevel@tonic-gate */ 48327c478bd9Sstevel@tonic-gate putempty(blocklim + (blkcnt_t)2 - tapepos); 48337c478bd9Sstevel@tonic-gate } 48347c478bd9Sstevel@tonic-gate } 48357c478bd9Sstevel@tonic-gate 48367c478bd9Sstevel@tonic-gate static void 48377c478bd9Sstevel@tonic-gate done(int n) 48387c478bd9Sstevel@tonic-gate { 483931732068SRich Burridge /* 484031732068SRich Burridge * If we were terminated in some way, and we would otherwise have 484131732068SRich Burridge * exited with a value of 0, adjust to 1, so that external callers 484231732068SRich Burridge * can determine this by looking at the exit status. 484331732068SRich Burridge */ 484431732068SRich Burridge if (term && n == 0) 484531732068SRich Burridge n = 1; 484631732068SRich Burridge 48478f1d104bSRich Burridge if (tfile != NULL) 48487c478bd9Sstevel@tonic-gate (void) unlink(tname); 484936802407SRich Burridge if (compress_opt != NULL) 485036802407SRich Burridge (void) free(compress_opt); 48517c478bd9Sstevel@tonic-gate if (mt > 0) { 48527c478bd9Sstevel@tonic-gate if ((close(mt) != 0) || (fclose(stdout) != 0)) { 48537c478bd9Sstevel@tonic-gate perror(gettext("tar: close error")); 48547c478bd9Sstevel@tonic-gate exit(2); 48557c478bd9Sstevel@tonic-gate } 48567c478bd9Sstevel@tonic-gate } 48577c478bd9Sstevel@tonic-gate exit(n); 48587c478bd9Sstevel@tonic-gate } 48597c478bd9Sstevel@tonic-gate 48607c478bd9Sstevel@tonic-gate /* 48617c478bd9Sstevel@tonic-gate * Determine if s1 is a prefix portion of s2 (or the same as s2). 48627c478bd9Sstevel@tonic-gate */ 48637c478bd9Sstevel@tonic-gate 48647c478bd9Sstevel@tonic-gate static int 48657c478bd9Sstevel@tonic-gate is_prefix(char *s1, char *s2) 48667c478bd9Sstevel@tonic-gate { 48677c478bd9Sstevel@tonic-gate while (*s1) 48687c478bd9Sstevel@tonic-gate if (*s1++ != *s2++) 48697c478bd9Sstevel@tonic-gate return (0); 48707c478bd9Sstevel@tonic-gate if (*s2) 48717c478bd9Sstevel@tonic-gate return (*s2 == '/'); 48727c478bd9Sstevel@tonic-gate return (1); 48737c478bd9Sstevel@tonic-gate } 48747c478bd9Sstevel@tonic-gate 48757c478bd9Sstevel@tonic-gate /* 48767c478bd9Sstevel@tonic-gate * lookup and bsrch look through tfile entries to find a match for a name. 48777c478bd9Sstevel@tonic-gate * The name can be up to PATH_MAX bytes. bsrch compares what it sees between 48787c478bd9Sstevel@tonic-gate * a pair of newline chars, so the buffer it uses must be long enough for 48797c478bd9Sstevel@tonic-gate * two lines: name and modification time as well as period, newline and space. 48807c478bd9Sstevel@tonic-gate * 48817c478bd9Sstevel@tonic-gate * A kludge was added to bsrch to take care of matching on the first entry 48827c478bd9Sstevel@tonic-gate * in the file--there is no leading newline. So, if we are reading from the 48837c478bd9Sstevel@tonic-gate * start of the file, read into byte two and set the first byte to a newline. 48847c478bd9Sstevel@tonic-gate * Otherwise, the first entry cannot be matched. 48857c478bd9Sstevel@tonic-gate * 48867c478bd9Sstevel@tonic-gate */ 48877c478bd9Sstevel@tonic-gate 48887c478bd9Sstevel@tonic-gate #define N (2 * (PATH_MAX + TIME_MAX_DIGITS + LONG_MAX_DIGITS + 3)) 48897c478bd9Sstevel@tonic-gate static off_t 48907c478bd9Sstevel@tonic-gate lookup(char *s) 48917c478bd9Sstevel@tonic-gate { 48927c478bd9Sstevel@tonic-gate int i; 48937c478bd9Sstevel@tonic-gate off_t a; 48947c478bd9Sstevel@tonic-gate 48957c478bd9Sstevel@tonic-gate for (i = 0; s[i]; i++) 48967c478bd9Sstevel@tonic-gate if (s[i] == ' ') 48977c478bd9Sstevel@tonic-gate break; 48987c478bd9Sstevel@tonic-gate a = bsrch(s, i, low, high); 48997c478bd9Sstevel@tonic-gate return (a); 49007c478bd9Sstevel@tonic-gate } 49017c478bd9Sstevel@tonic-gate 49027c478bd9Sstevel@tonic-gate static off_t 49037c478bd9Sstevel@tonic-gate bsrch(char *s, int n, off_t l, off_t h) 49047c478bd9Sstevel@tonic-gate { 49057c478bd9Sstevel@tonic-gate int i, j; 49067c478bd9Sstevel@tonic-gate char b[N]; 49077c478bd9Sstevel@tonic-gate off_t m, m1; 49087c478bd9Sstevel@tonic-gate 49097c478bd9Sstevel@tonic-gate 49107c478bd9Sstevel@tonic-gate loop: 49117c478bd9Sstevel@tonic-gate if (l >= h) 49127c478bd9Sstevel@tonic-gate return ((off_t)-1); 49137c478bd9Sstevel@tonic-gate m = l + (h-l)/2 - N/2; 49147c478bd9Sstevel@tonic-gate if (m < l) 49157c478bd9Sstevel@tonic-gate m = l; 49167c478bd9Sstevel@tonic-gate (void) fseek(tfile, m, 0); 49177c478bd9Sstevel@tonic-gate if (m == 0) { 49187c478bd9Sstevel@tonic-gate (void) fread(b+1, 1, N-1, tfile); 49197c478bd9Sstevel@tonic-gate b[0] = '\n'; 49207c478bd9Sstevel@tonic-gate m--; 49217c478bd9Sstevel@tonic-gate } else 49227c478bd9Sstevel@tonic-gate (void) fread(b, 1, N, tfile); 49237c478bd9Sstevel@tonic-gate for (i = 0; i < N; i++) { 49247c478bd9Sstevel@tonic-gate if (b[i] == '\n') 49257c478bd9Sstevel@tonic-gate break; 49267c478bd9Sstevel@tonic-gate m++; 49277c478bd9Sstevel@tonic-gate } 49287c478bd9Sstevel@tonic-gate if (m >= h) 49297c478bd9Sstevel@tonic-gate return ((off_t)-1); 49307c478bd9Sstevel@tonic-gate m1 = m; 49317c478bd9Sstevel@tonic-gate j = i; 49327c478bd9Sstevel@tonic-gate for (i++; i < N; i++) { 49337c478bd9Sstevel@tonic-gate m1++; 49347c478bd9Sstevel@tonic-gate if (b[i] == '\n') 49357c478bd9Sstevel@tonic-gate break; 49367c478bd9Sstevel@tonic-gate } 49377c478bd9Sstevel@tonic-gate i = cmp(b+j, s, n); 49387c478bd9Sstevel@tonic-gate if (i < 0) { 49397c478bd9Sstevel@tonic-gate h = m; 49407c478bd9Sstevel@tonic-gate goto loop; 49417c478bd9Sstevel@tonic-gate } 49427c478bd9Sstevel@tonic-gate if (i > 0) { 49437c478bd9Sstevel@tonic-gate l = m1; 49447c478bd9Sstevel@tonic-gate goto loop; 49457c478bd9Sstevel@tonic-gate } 49467c478bd9Sstevel@tonic-gate if (m < 0) 49477c478bd9Sstevel@tonic-gate m = 0; 49487c478bd9Sstevel@tonic-gate return (m); 49497c478bd9Sstevel@tonic-gate } 49507c478bd9Sstevel@tonic-gate 49517c478bd9Sstevel@tonic-gate static int 49527c478bd9Sstevel@tonic-gate cmp(char *b, char *s, int n) 49537c478bd9Sstevel@tonic-gate { 49547c478bd9Sstevel@tonic-gate int i; 49557c478bd9Sstevel@tonic-gate 49567c478bd9Sstevel@tonic-gate assert(b[0] == '\n'); 49577c478bd9Sstevel@tonic-gate 49587c478bd9Sstevel@tonic-gate for (i = 0; i < n; i++) { 49597c478bd9Sstevel@tonic-gate if (b[i+1] > s[i]) 49607c478bd9Sstevel@tonic-gate return (-1); 49617c478bd9Sstevel@tonic-gate if (b[i+1] < s[i]) 49627c478bd9Sstevel@tonic-gate return (1); 49637c478bd9Sstevel@tonic-gate } 49647c478bd9Sstevel@tonic-gate return (b[i+1] == ' '? 0 : -1); 49657c478bd9Sstevel@tonic-gate } 49667c478bd9Sstevel@tonic-gate 49677c478bd9Sstevel@tonic-gate 49687c478bd9Sstevel@tonic-gate /* 49697c478bd9Sstevel@tonic-gate * seekdisk seek to next file on archive 49707c478bd9Sstevel@tonic-gate * 49717c478bd9Sstevel@tonic-gate * called by passtape() only 49727c478bd9Sstevel@tonic-gate * 49737c478bd9Sstevel@tonic-gate * WARNING: expects "nblock" to be set, that is, readtape() to have 49747c478bd9Sstevel@tonic-gate * already been called. Since passtape() is only called 49757c478bd9Sstevel@tonic-gate * after a file header block has been read (why else would 49767c478bd9Sstevel@tonic-gate * we skip to next file?), this is currently safe. 49777c478bd9Sstevel@tonic-gate * 49787c478bd9Sstevel@tonic-gate * changed to guarantee SYS_BLOCK boundary 49797c478bd9Sstevel@tonic-gate */ 49807c478bd9Sstevel@tonic-gate 49817c478bd9Sstevel@tonic-gate static void 49827c478bd9Sstevel@tonic-gate seekdisk(blkcnt_t blocks) 49837c478bd9Sstevel@tonic-gate { 49847c478bd9Sstevel@tonic-gate off_t seekval; 49857c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 49867c478bd9Sstevel@tonic-gate /* handle non-multiple of SYS_BLOCK */ 49877c478bd9Sstevel@tonic-gate blkcnt_t nxb; /* # extra blocks */ 49887c478bd9Sstevel@tonic-gate #endif 49897c478bd9Sstevel@tonic-gate 49907c478bd9Sstevel@tonic-gate tapepos += blocks; 49917c478bd9Sstevel@tonic-gate #ifdef DEBUG 49927c478bd9Sstevel@tonic-gate DEBUG("seekdisk(%" FMT_blkcnt_t ") called\n", blocks, 0); 49937c478bd9Sstevel@tonic-gate #endif 49947c478bd9Sstevel@tonic-gate if (recno + blocks <= nblock) { 49957c478bd9Sstevel@tonic-gate recno += blocks; 49967c478bd9Sstevel@tonic-gate return; 49977c478bd9Sstevel@tonic-gate } 49987c478bd9Sstevel@tonic-gate if (recno > nblock) 49997c478bd9Sstevel@tonic-gate recno = nblock; 50007c478bd9Sstevel@tonic-gate seekval = (off_t)blocks - (nblock - recno); 50017c478bd9Sstevel@tonic-gate recno = nblock; /* so readtape() reads next time through */ 50027c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 50037c478bd9Sstevel@tonic-gate nxb = (blkcnt_t)(seekval % (off_t)(SYS_BLOCK / TBLOCK)); 50047c478bd9Sstevel@tonic-gate #ifdef DEBUG 50057c478bd9Sstevel@tonic-gate DEBUG("xtrablks=%" FMT_blkcnt_t " seekval=%" FMT_blkcnt_t " blks\n", 50067c478bd9Sstevel@tonic-gate nxb, seekval); 50077c478bd9Sstevel@tonic-gate #endif 50087c478bd9Sstevel@tonic-gate if (nxb && nxb > seekval) /* don't seek--we'll read */ 50097c478bd9Sstevel@tonic-gate goto noseek; 50107c478bd9Sstevel@tonic-gate seekval -= nxb; /* don't seek quite so far */ 50117c478bd9Sstevel@tonic-gate #endif 50127c478bd9Sstevel@tonic-gate if (lseek(mt, (off_t)(TBLOCK * seekval), 1) == (off_t)-1) { 50137c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 50147c478bd9Sstevel@tonic-gate "tar: device seek error\n")); 50157c478bd9Sstevel@tonic-gate done(3); 50167c478bd9Sstevel@tonic-gate } 50177c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 50187c478bd9Sstevel@tonic-gate /* read those extra blocks */ 50197c478bd9Sstevel@tonic-gate noseek: 50207c478bd9Sstevel@tonic-gate if (nxb) { 50217c478bd9Sstevel@tonic-gate #ifdef DEBUG 50227c478bd9Sstevel@tonic-gate DEBUG("reading extra blocks\n", 0, 0); 50237c478bd9Sstevel@tonic-gate #endif 50247c478bd9Sstevel@tonic-gate if (read(mt, tbuf, TBLOCK*nblock) < 0) { 50257c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 50267c478bd9Sstevel@tonic-gate "tar: read error while skipping file\n")); 50277c478bd9Sstevel@tonic-gate done(8); 50287c478bd9Sstevel@tonic-gate } 50297c478bd9Sstevel@tonic-gate recno = nxb; /* so we don't read in next readtape() */ 50307c478bd9Sstevel@tonic-gate } 50317c478bd9Sstevel@tonic-gate #endif 50327c478bd9Sstevel@tonic-gate } 50337c478bd9Sstevel@tonic-gate 50347c478bd9Sstevel@tonic-gate static void 50357c478bd9Sstevel@tonic-gate readtape(char *buffer) 50367c478bd9Sstevel@tonic-gate { 50377c478bd9Sstevel@tonic-gate int i, j; 50387c478bd9Sstevel@tonic-gate 50397c478bd9Sstevel@tonic-gate ++tapepos; 50407c478bd9Sstevel@tonic-gate if (recno >= nblock || first) { 50417c478bd9Sstevel@tonic-gate if (first) { 50427c478bd9Sstevel@tonic-gate /* 50437c478bd9Sstevel@tonic-gate * set the number of blocks to read initially, based on 50447c478bd9Sstevel@tonic-gate * the defined defaults for the device, or on the 50457c478bd9Sstevel@tonic-gate * explicit block factor given. 50467c478bd9Sstevel@tonic-gate */ 504753329f75SRich Burridge if (bflag || defaults_used || NotTape) 50487c478bd9Sstevel@tonic-gate j = nblock; 50497c478bd9Sstevel@tonic-gate else 50507c478bd9Sstevel@tonic-gate j = NBLOCK; 50517c478bd9Sstevel@tonic-gate } else 50527c478bd9Sstevel@tonic-gate j = nblock; 50537c478bd9Sstevel@tonic-gate 50547c478bd9Sstevel@tonic-gate if ((i = read(mt, tbuf, TBLOCK*j)) < 0) { 50557c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 50567c478bd9Sstevel@tonic-gate "tar: tape read error\n")); 50577c478bd9Sstevel@tonic-gate done(3); 50587c478bd9Sstevel@tonic-gate /* 5059b35e803cSss161016 * i == 0 and !rflag means that EOF is reached and we are 5060b35e803cSss161016 * trying to update or replace an empty tar file, so exit 5061b35e803cSss161016 * with an error. 5062b35e803cSss161016 * 5063b35e803cSss161016 * If i == 0 and !first and NotTape, it means the pointer 5064b35e803cSss161016 * has gone past the EOF. It could happen if two processes 5065b35e803cSss161016 * try to update the same tar file simultaneously. So exit 5066b35e803cSss161016 * with an error. 50677c478bd9Sstevel@tonic-gate */ 5068b35e803cSss161016 5069b35e803cSss161016 } else if (i == 0) { 5070b35e803cSss161016 if (first && !rflag) { 50717c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 50727c478bd9Sstevel@tonic-gate "tar: blocksize = %d\n"), i); 50737c478bd9Sstevel@tonic-gate done(Errflg); 5074b35e803cSss161016 } else if (!first && (!rflag || NotTape)) { 50757c478bd9Sstevel@tonic-gate mterr("read", 0, 2); 5076b35e803cSss161016 } 50777c478bd9Sstevel@tonic-gate } else if ((!first || Bflag) && i != TBLOCK*j) { 50787c478bd9Sstevel@tonic-gate /* 50797c478bd9Sstevel@tonic-gate * Short read - try to get the remaining bytes. 50807c478bd9Sstevel@tonic-gate */ 50817c478bd9Sstevel@tonic-gate 50827c478bd9Sstevel@tonic-gate int remaining = (TBLOCK * j) - i; 50837c478bd9Sstevel@tonic-gate char *b = (char *)tbuf + i; 50847c478bd9Sstevel@tonic-gate int r; 50857c478bd9Sstevel@tonic-gate 50867c478bd9Sstevel@tonic-gate do { 50877c478bd9Sstevel@tonic-gate if ((r = read(mt, b, remaining)) < 0) { 50887c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 50897c478bd9Sstevel@tonic-gate gettext("tar: tape read error\n")); 50907c478bd9Sstevel@tonic-gate done(3); 50917c478bd9Sstevel@tonic-gate } 50927c478bd9Sstevel@tonic-gate b += r; 50937c478bd9Sstevel@tonic-gate remaining -= r; 50947c478bd9Sstevel@tonic-gate i += r; 50957c478bd9Sstevel@tonic-gate } while (remaining > 0 && r != 0); 50967c478bd9Sstevel@tonic-gate } 50977c478bd9Sstevel@tonic-gate if (first) { 50987c478bd9Sstevel@tonic-gate if ((i % TBLOCK) != 0) { 50997c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 51007c478bd9Sstevel@tonic-gate "tar: tape blocksize error\n")); 51017c478bd9Sstevel@tonic-gate done(3); 51027c478bd9Sstevel@tonic-gate } 51037c478bd9Sstevel@tonic-gate i /= TBLOCK; 51047c478bd9Sstevel@tonic-gate if (vflag && i != nblock && i != 1) { 51057c478bd9Sstevel@tonic-gate if (!NotTape) 51067c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 51077c478bd9Sstevel@tonic-gate "tar: blocksize = %d\n"), i); 51087c478bd9Sstevel@tonic-gate } 51097c478bd9Sstevel@tonic-gate 51107c478bd9Sstevel@tonic-gate /* 51117c478bd9Sstevel@tonic-gate * If we are reading a tape, then a short read is 51127c478bd9Sstevel@tonic-gate * understood to signify that the amount read is 51137c478bd9Sstevel@tonic-gate * the tape's actual blocking factor. We adapt 51147c478bd9Sstevel@tonic-gate * nblock accordingly. There is no reason to do 51157c478bd9Sstevel@tonic-gate * this when the device is not blocked. 51167c478bd9Sstevel@tonic-gate */ 51177c478bd9Sstevel@tonic-gate 51187c478bd9Sstevel@tonic-gate if (!NotTape) 51197c478bd9Sstevel@tonic-gate nblock = i; 51207c478bd9Sstevel@tonic-gate } 51217c478bd9Sstevel@tonic-gate recno = 0; 51227c478bd9Sstevel@tonic-gate } 51237c478bd9Sstevel@tonic-gate 51247c478bd9Sstevel@tonic-gate first = FALSE; 51257c478bd9Sstevel@tonic-gate copy(buffer, &tbuf[recno++]); 51267c478bd9Sstevel@tonic-gate } 51277c478bd9Sstevel@tonic-gate 51287c478bd9Sstevel@tonic-gate 51297c478bd9Sstevel@tonic-gate /* 51307c478bd9Sstevel@tonic-gate * replacement for writetape. 51317c478bd9Sstevel@tonic-gate */ 51327c478bd9Sstevel@tonic-gate 51337c478bd9Sstevel@tonic-gate static int 51347c478bd9Sstevel@tonic-gate writetbuf(char *buffer, int n) 51357c478bd9Sstevel@tonic-gate { 51367c478bd9Sstevel@tonic-gate int i; 51377c478bd9Sstevel@tonic-gate 51387c478bd9Sstevel@tonic-gate tapepos += n; /* output block count */ 51397c478bd9Sstevel@tonic-gate 51407c478bd9Sstevel@tonic-gate if (recno >= nblock) { 51417c478bd9Sstevel@tonic-gate i = write(mt, (char *)tbuf, TBLOCK*nblock); 51427c478bd9Sstevel@tonic-gate if (i != TBLOCK*nblock) 51437c478bd9Sstevel@tonic-gate mterr("write", i, 2); 51447c478bd9Sstevel@tonic-gate recno = 0; 51457c478bd9Sstevel@tonic-gate } 51467c478bd9Sstevel@tonic-gate 51477c478bd9Sstevel@tonic-gate /* 51487c478bd9Sstevel@tonic-gate * Special case: We have an empty tape buffer, and the 51497c478bd9Sstevel@tonic-gate * users data size is >= the tape block size: Avoid 51507c478bd9Sstevel@tonic-gate * the bcopy and dma direct to tape. BIG WIN. Add the 51517c478bd9Sstevel@tonic-gate * residual to the tape buffer. 51527c478bd9Sstevel@tonic-gate */ 51537c478bd9Sstevel@tonic-gate while (recno == 0 && n >= nblock) { 51547c478bd9Sstevel@tonic-gate i = (int)write(mt, buffer, TBLOCK*nblock); 51557c478bd9Sstevel@tonic-gate if (i != TBLOCK*nblock) 51567c478bd9Sstevel@tonic-gate mterr("write", i, 2); 51577c478bd9Sstevel@tonic-gate n -= nblock; 51587c478bd9Sstevel@tonic-gate buffer += (nblock * TBLOCK); 51597c478bd9Sstevel@tonic-gate } 51607c478bd9Sstevel@tonic-gate 51617c478bd9Sstevel@tonic-gate while (n-- > 0) { 51627c478bd9Sstevel@tonic-gate (void) memcpy((char *)&tbuf[recno++], buffer, TBLOCK); 51637c478bd9Sstevel@tonic-gate buffer += TBLOCK; 51647c478bd9Sstevel@tonic-gate if (recno >= nblock) { 51657c478bd9Sstevel@tonic-gate i = (int)write(mt, (char *)tbuf, TBLOCK*nblock); 51667c478bd9Sstevel@tonic-gate if (i != TBLOCK*nblock) 51677c478bd9Sstevel@tonic-gate mterr("write", i, 2); 51687c478bd9Sstevel@tonic-gate recno = 0; 51697c478bd9Sstevel@tonic-gate } 51707c478bd9Sstevel@tonic-gate } 51717c478bd9Sstevel@tonic-gate 51727c478bd9Sstevel@tonic-gate /* Tell the user how much to write to get in sync */ 51737c478bd9Sstevel@tonic-gate return (nblock - recno); 51747c478bd9Sstevel@tonic-gate } 51757c478bd9Sstevel@tonic-gate 51767c478bd9Sstevel@tonic-gate /* 51777c478bd9Sstevel@tonic-gate * backtape - reposition tape after reading soft "EOF" record 51787c478bd9Sstevel@tonic-gate * 51797c478bd9Sstevel@tonic-gate * Backtape tries to reposition the tape back over the EOF 51807c478bd9Sstevel@tonic-gate * record. This is for the 'u' and 'r' function letters so that the 51817c478bd9Sstevel@tonic-gate * tape can be extended. This code is not well designed, but 51827c478bd9Sstevel@tonic-gate * I'm confident that the only callers who care about the 51837c478bd9Sstevel@tonic-gate * backspace-over-EOF feature are those involved in 'u' and 'r'. 51847c478bd9Sstevel@tonic-gate * 51857c478bd9Sstevel@tonic-gate * The proper way to backup the tape is through the use of mtio. 51867c478bd9Sstevel@tonic-gate * Earlier spins used lseek combined with reads in a confusing 51877c478bd9Sstevel@tonic-gate * maneuver that only worked on 4.x, but shouldn't have, even 51887c478bd9Sstevel@tonic-gate * there. Lseeks are explicitly not supported for tape devices. 51897c478bd9Sstevel@tonic-gate */ 51907c478bd9Sstevel@tonic-gate 51917c478bd9Sstevel@tonic-gate static void 51927c478bd9Sstevel@tonic-gate backtape(void) 51937c478bd9Sstevel@tonic-gate { 51947c478bd9Sstevel@tonic-gate struct mtop mtcmd; 51957c478bd9Sstevel@tonic-gate #ifdef DEBUG 51967c478bd9Sstevel@tonic-gate DEBUG("backtape() called, recno=%" FMT_blkcnt_t " nblock=%d\n", recno, 51977c478bd9Sstevel@tonic-gate nblock); 51987c478bd9Sstevel@tonic-gate #endif 51997c478bd9Sstevel@tonic-gate /* 52007c478bd9Sstevel@tonic-gate * Backup to the position in the archive where the record 52017c478bd9Sstevel@tonic-gate * currently sitting in the tbuf buffer is situated. 52027c478bd9Sstevel@tonic-gate */ 52037c478bd9Sstevel@tonic-gate 52047c478bd9Sstevel@tonic-gate if (NotTape) { 52057c478bd9Sstevel@tonic-gate /* 52067c478bd9Sstevel@tonic-gate * For non-tape devices, this means lseeking to the 52077c478bd9Sstevel@tonic-gate * correct position. The absolute location tapepos-recno 52087c478bd9Sstevel@tonic-gate * should be the beginning of the current record. 52097c478bd9Sstevel@tonic-gate */ 52107c478bd9Sstevel@tonic-gate 52117c478bd9Sstevel@tonic-gate if (lseek(mt, (off_t)(TBLOCK*(tapepos-recno)), SEEK_SET) == 52127c478bd9Sstevel@tonic-gate (off_t)-1) { 52137c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 52147c478bd9Sstevel@tonic-gate gettext("tar: lseek to end of archive failed\n")); 52157c478bd9Sstevel@tonic-gate done(4); 52167c478bd9Sstevel@tonic-gate } 52177c478bd9Sstevel@tonic-gate } else { 52187c478bd9Sstevel@tonic-gate /* 52197c478bd9Sstevel@tonic-gate * For tape devices, we backup over the most recently 52207c478bd9Sstevel@tonic-gate * read record. 52217c478bd9Sstevel@tonic-gate */ 52227c478bd9Sstevel@tonic-gate 52237c478bd9Sstevel@tonic-gate mtcmd.mt_op = MTBSR; 52247c478bd9Sstevel@tonic-gate mtcmd.mt_count = 1; 52257c478bd9Sstevel@tonic-gate 52267c478bd9Sstevel@tonic-gate if (ioctl(mt, MTIOCTOP, &mtcmd) < 0) { 52277c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 52287c478bd9Sstevel@tonic-gate gettext("tar: backspace over record failed\n")); 52297c478bd9Sstevel@tonic-gate done(4); 52307c478bd9Sstevel@tonic-gate } 52317c478bd9Sstevel@tonic-gate } 52327c478bd9Sstevel@tonic-gate 52337c478bd9Sstevel@tonic-gate /* 52347c478bd9Sstevel@tonic-gate * Decrement the tape and tbuf buffer indices to prepare for the 52357c478bd9Sstevel@tonic-gate * coming write to overwrite the soft EOF record. 52367c478bd9Sstevel@tonic-gate */ 52377c478bd9Sstevel@tonic-gate 52387c478bd9Sstevel@tonic-gate recno--; 52397c478bd9Sstevel@tonic-gate tapepos--; 52407c478bd9Sstevel@tonic-gate } 52417c478bd9Sstevel@tonic-gate 52427c478bd9Sstevel@tonic-gate 52437c478bd9Sstevel@tonic-gate /* 52447c478bd9Sstevel@tonic-gate * flushtape write buffered block(s) onto tape 52457c478bd9Sstevel@tonic-gate * 52467c478bd9Sstevel@tonic-gate * recno points to next free block in tbuf. If nonzero, a write is done. 52477c478bd9Sstevel@tonic-gate * Care is taken to write in multiples of SYS_BLOCK when device is 52487c478bd9Sstevel@tonic-gate * non-magtape in case raw i/o is used. 52497c478bd9Sstevel@tonic-gate * 52507c478bd9Sstevel@tonic-gate * NOTE: this is called by writetape() to do the actual writing 52517c478bd9Sstevel@tonic-gate */ 52527c478bd9Sstevel@tonic-gate 52537c478bd9Sstevel@tonic-gate static void 52547c478bd9Sstevel@tonic-gate flushtape(void) 52557c478bd9Sstevel@tonic-gate { 52567c478bd9Sstevel@tonic-gate #ifdef DEBUG 52577c478bd9Sstevel@tonic-gate DEBUG("flushtape() called, recno=%" FMT_blkcnt_t "\n", recno, 0); 52587c478bd9Sstevel@tonic-gate #endif 52597c478bd9Sstevel@tonic-gate if (recno > 0) { /* anything buffered? */ 52607c478bd9Sstevel@tonic-gate if (NotTape) { 52617c478bd9Sstevel@tonic-gate #if SYS_BLOCK > TBLOCK 52627c478bd9Sstevel@tonic-gate int i; 52637c478bd9Sstevel@tonic-gate 52647c478bd9Sstevel@tonic-gate /* 52657c478bd9Sstevel@tonic-gate * an odd-block write can only happen when 52667c478bd9Sstevel@tonic-gate * we are at the end of a volume that is not a tape. 52677c478bd9Sstevel@tonic-gate * Here we round recno up to an even SYS_BLOCK 52687c478bd9Sstevel@tonic-gate * boundary. 52697c478bd9Sstevel@tonic-gate */ 52707c478bd9Sstevel@tonic-gate if ((i = recno % (SYS_BLOCK / TBLOCK)) != 0) { 52717c478bd9Sstevel@tonic-gate #ifdef DEBUG 52727c478bd9Sstevel@tonic-gate DEBUG("flushtape() %d rounding blocks\n", i, 0); 52737c478bd9Sstevel@tonic-gate #endif 52747c478bd9Sstevel@tonic-gate recno += i; /* round up to even SYS_BLOCK */ 52757c478bd9Sstevel@tonic-gate } 52767c478bd9Sstevel@tonic-gate #endif 52777c478bd9Sstevel@tonic-gate if (recno > nblock) 52787c478bd9Sstevel@tonic-gate recno = nblock; 52797c478bd9Sstevel@tonic-gate } 52807c478bd9Sstevel@tonic-gate #ifdef DEBUG 52817c478bd9Sstevel@tonic-gate DEBUG("writing out %" FMT_blkcnt_t " blocks of %" FMT_blkcnt_t 52827c478bd9Sstevel@tonic-gate " bytes\n", (blkcnt_t)(NotTape ? recno : nblock), 52837c478bd9Sstevel@tonic-gate (blkcnt_t)(NotTape ? recno : nblock) * TBLOCK); 52847c478bd9Sstevel@tonic-gate #endif 52857c478bd9Sstevel@tonic-gate if (write(mt, tbuf, 52867c478bd9Sstevel@tonic-gate (size_t)(NotTape ? recno : nblock) * TBLOCK) < 0) { 52877c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 52887c478bd9Sstevel@tonic-gate "tar: tape write error\n")); 52897c478bd9Sstevel@tonic-gate done(2); 52907c478bd9Sstevel@tonic-gate } 52917c478bd9Sstevel@tonic-gate recno = 0; 52927c478bd9Sstevel@tonic-gate } 52937c478bd9Sstevel@tonic-gate } 52947c478bd9Sstevel@tonic-gate 52957c478bd9Sstevel@tonic-gate static void 52967c478bd9Sstevel@tonic-gate copy(void *dst, void *src) 52977c478bd9Sstevel@tonic-gate { 52987c478bd9Sstevel@tonic-gate (void) memcpy(dst, src, TBLOCK); 52997c478bd9Sstevel@tonic-gate } 53007c478bd9Sstevel@tonic-gate 53017c478bd9Sstevel@tonic-gate /* 53027c478bd9Sstevel@tonic-gate * kcheck() 53037c478bd9Sstevel@tonic-gate * - checks the validity of size values for non-tape devices 53047c478bd9Sstevel@tonic-gate * - if size is zero, mulvol tar is disabled and size is 53057c478bd9Sstevel@tonic-gate * assumed to be infinite. 53067c478bd9Sstevel@tonic-gate * - returns volume size in TBLOCKS 53077c478bd9Sstevel@tonic-gate */ 53087c478bd9Sstevel@tonic-gate 53097c478bd9Sstevel@tonic-gate static blkcnt_t 53107c478bd9Sstevel@tonic-gate kcheck(char *kstr) 53117c478bd9Sstevel@tonic-gate { 53127c478bd9Sstevel@tonic-gate blkcnt_t kval; 53137c478bd9Sstevel@tonic-gate 53147c478bd9Sstevel@tonic-gate kval = strtoll(kstr, NULL, 0); 53157c478bd9Sstevel@tonic-gate if (kval == (blkcnt_t)0) { /* no multi-volume; size is infinity. */ 53167c478bd9Sstevel@tonic-gate mulvol = 0; /* definitely not mulvol, but we must */ 53177c478bd9Sstevel@tonic-gate return (0); /* took out setting of NotTape */ 53187c478bd9Sstevel@tonic-gate } 53197c478bd9Sstevel@tonic-gate if (kval < (blkcnt_t)MINSIZE) { 53207c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53217c478bd9Sstevel@tonic-gate "tar: sizes below %luK not supported (%" FMT_blkcnt_t 53227c478bd9Sstevel@tonic-gate ").\n"), (ulong_t)MINSIZE, kval); 53237c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53247c478bd9Sstevel@tonic-gate "bad size entry for %s in %s.\n"), 53257c478bd9Sstevel@tonic-gate archive, DEF_FILE); 53267c478bd9Sstevel@tonic-gate done(1); 53277c478bd9Sstevel@tonic-gate } 53287c478bd9Sstevel@tonic-gate mulvol++; 53297c478bd9Sstevel@tonic-gate NotTape++; /* implies non-tape */ 53307c478bd9Sstevel@tonic-gate return (kval * 1024 / TBLOCK); /* convert to TBLOCKS */ 53317c478bd9Sstevel@tonic-gate } 53327c478bd9Sstevel@tonic-gate 53337c478bd9Sstevel@tonic-gate 53347c478bd9Sstevel@tonic-gate /* 53357c478bd9Sstevel@tonic-gate * bcheck() 53367c478bd9Sstevel@tonic-gate * - checks the validity of blocking factors 53377c478bd9Sstevel@tonic-gate * - returns blocking factor 53387c478bd9Sstevel@tonic-gate */ 53397c478bd9Sstevel@tonic-gate 53407c478bd9Sstevel@tonic-gate static int 53417c478bd9Sstevel@tonic-gate bcheck(char *bstr) 53427c478bd9Sstevel@tonic-gate { 53437c478bd9Sstevel@tonic-gate blkcnt_t bval; 53447c478bd9Sstevel@tonic-gate 53457c478bd9Sstevel@tonic-gate bval = strtoll(bstr, NULL, 0); 53467c478bd9Sstevel@tonic-gate if ((bval <= 0) || (bval > INT_MAX / TBLOCK)) { 53477c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53487c478bd9Sstevel@tonic-gate "tar: invalid blocksize \"%s\".\n"), bstr); 53497c478bd9Sstevel@tonic-gate if (!bflag) 53507c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53517c478bd9Sstevel@tonic-gate "bad blocksize entry for '%s' in %s.\n"), 53527c478bd9Sstevel@tonic-gate archive, DEF_FILE); 53537c478bd9Sstevel@tonic-gate done(1); 53547c478bd9Sstevel@tonic-gate } 53557c478bd9Sstevel@tonic-gate 53567c478bd9Sstevel@tonic-gate return ((int)bval); 53577c478bd9Sstevel@tonic-gate } 53587c478bd9Sstevel@tonic-gate 53597c478bd9Sstevel@tonic-gate 53607c478bd9Sstevel@tonic-gate /* 53617c478bd9Sstevel@tonic-gate * defset() 53627c478bd9Sstevel@tonic-gate * - reads DEF_FILE for the set of default values specified. 53637c478bd9Sstevel@tonic-gate * - initializes 'usefile', 'nblock', and 'blocklim', and 'NotTape'. 53647c478bd9Sstevel@tonic-gate * - 'usefile' points to static data, so will be overwritten 53657c478bd9Sstevel@tonic-gate * if this routine is called a second time. 53667c478bd9Sstevel@tonic-gate * - the pattern specified by 'arch' must be followed by four 53677c478bd9Sstevel@tonic-gate * blank-separated fields (1) device (2) blocking, 53687c478bd9Sstevel@tonic-gate * (3) size(K), and (4) tape 53697c478bd9Sstevel@tonic-gate * for example: archive0=/dev/fd 1 400 n 53707c478bd9Sstevel@tonic-gate */ 53717c478bd9Sstevel@tonic-gate 53727c478bd9Sstevel@tonic-gate static int 53737c478bd9Sstevel@tonic-gate defset(char *arch) 53747c478bd9Sstevel@tonic-gate { 53757c478bd9Sstevel@tonic-gate char *bp; 53767c478bd9Sstevel@tonic-gate 53777c478bd9Sstevel@tonic-gate if (defopen(DEF_FILE) != 0) 53787c478bd9Sstevel@tonic-gate return (FALSE); 53797c478bd9Sstevel@tonic-gate if (defcntl(DC_SETFLAGS, (DC_STD & ~(DC_CASE))) == -1) { 53807c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53817c478bd9Sstevel@tonic-gate "tar: error setting parameters for %s.\n"), DEF_FILE); 53827c478bd9Sstevel@tonic-gate return (FALSE); /* & following ones too */ 53837c478bd9Sstevel@tonic-gate } 53847c478bd9Sstevel@tonic-gate if ((bp = defread(arch)) == NULL) { 53857c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53867c478bd9Sstevel@tonic-gate "tar: missing or invalid '%s' entry in %s.\n"), 53877c478bd9Sstevel@tonic-gate arch, DEF_FILE); 53887c478bd9Sstevel@tonic-gate return (FALSE); 53897c478bd9Sstevel@tonic-gate } 53907c478bd9Sstevel@tonic-gate if ((usefile = strtok(bp, " \t")) == NULL) { 53917c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53927c478bd9Sstevel@tonic-gate "tar: '%s' entry in %s is empty!\n"), arch, DEF_FILE); 53937c478bd9Sstevel@tonic-gate return (FALSE); 53947c478bd9Sstevel@tonic-gate } 53957c478bd9Sstevel@tonic-gate if ((bp = strtok(NULL, " \t")) == NULL) { 53967c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 53977c478bd9Sstevel@tonic-gate "tar: block component missing in '%s' entry in %s.\n"), 53987c478bd9Sstevel@tonic-gate arch, DEF_FILE); 53997c478bd9Sstevel@tonic-gate return (FALSE); 54007c478bd9Sstevel@tonic-gate } 54017c478bd9Sstevel@tonic-gate nblock = bcheck(bp); 54027c478bd9Sstevel@tonic-gate if ((bp = strtok(NULL, " \t")) == NULL) { 54037c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 54047c478bd9Sstevel@tonic-gate "tar: size component missing in '%s' entry in %s.\n"), 54057c478bd9Sstevel@tonic-gate arch, DEF_FILE); 54067c478bd9Sstevel@tonic-gate return (FALSE); 54077c478bd9Sstevel@tonic-gate } 54087c478bd9Sstevel@tonic-gate blocklim = kcheck(bp); 54097c478bd9Sstevel@tonic-gate if ((bp = strtok(NULL, " \t")) != NULL) 54107c478bd9Sstevel@tonic-gate NotTape = (*bp == 'n' || *bp == 'N'); 54117c478bd9Sstevel@tonic-gate else 54127c478bd9Sstevel@tonic-gate NotTape = (blocklim != 0); 54137c478bd9Sstevel@tonic-gate (void) defopen(NULL); 54147c478bd9Sstevel@tonic-gate #ifdef DEBUG 54157c478bd9Sstevel@tonic-gate DEBUG("defset: archive='%s'; usefile='%s'\n", arch, usefile); 54167c478bd9Sstevel@tonic-gate DEBUG("defset: nblock='%d'; blocklim='%" FMT_blkcnt_t "'\n", 54177c478bd9Sstevel@tonic-gate nblock, blocklim); 54187c478bd9Sstevel@tonic-gate DEBUG("defset: not tape = %d\n", NotTape, 0); 54197c478bd9Sstevel@tonic-gate #endif 54207c478bd9Sstevel@tonic-gate return (TRUE); 54217c478bd9Sstevel@tonic-gate } 54227c478bd9Sstevel@tonic-gate 54237c478bd9Sstevel@tonic-gate 54247c478bd9Sstevel@tonic-gate /* 54257c478bd9Sstevel@tonic-gate * Following code handles excluded and included files. 54267c478bd9Sstevel@tonic-gate * A hash table of file names to be {in,ex}cluded is built. 54277c478bd9Sstevel@tonic-gate * For excluded files, before writing or extracting a file 54287c478bd9Sstevel@tonic-gate * check to see if it is in the exclude_tbl. 54297c478bd9Sstevel@tonic-gate * For included files, the wantit() procedure will check to 54307c478bd9Sstevel@tonic-gate * see if the named file is in the include_tbl. 54317c478bd9Sstevel@tonic-gate */ 54327c478bd9Sstevel@tonic-gate 54337c478bd9Sstevel@tonic-gate static void 54345e2174acSceastha build_table(file_list_t *table[], char *file) 54357c478bd9Sstevel@tonic-gate { 54367c478bd9Sstevel@tonic-gate FILE *fp; 54377c478bd9Sstevel@tonic-gate char buf[PATH_MAX + 1]; 54387c478bd9Sstevel@tonic-gate 54397c478bd9Sstevel@tonic-gate if ((fp = fopen(file, "r")) == (FILE *)NULL) 54407c478bd9Sstevel@tonic-gate vperror(1, gettext("could not open %s"), file); 54417c478bd9Sstevel@tonic-gate while (fgets(buf, sizeof (buf), fp) != NULL) { 54427c478bd9Sstevel@tonic-gate if (buf[strlen(buf) - 1] == '\n') 54437c478bd9Sstevel@tonic-gate buf[strlen(buf) - 1] = '\0'; 54447c478bd9Sstevel@tonic-gate /* Only add to table if line has something in it */ 54457c478bd9Sstevel@tonic-gate if (strspn(buf, " \t") != strlen(buf)) 54467c478bd9Sstevel@tonic-gate add_file_to_table(table, buf); 54477c478bd9Sstevel@tonic-gate } 54487c478bd9Sstevel@tonic-gate (void) fclose(fp); 54497c478bd9Sstevel@tonic-gate } 54507c478bd9Sstevel@tonic-gate 54517c478bd9Sstevel@tonic-gate 54527c478bd9Sstevel@tonic-gate /* 54537c478bd9Sstevel@tonic-gate * Add a file name to the the specified table, if the file name has any 54547c478bd9Sstevel@tonic-gate * trailing '/'s then delete them before inserting into the table 54557c478bd9Sstevel@tonic-gate */ 54567c478bd9Sstevel@tonic-gate 54577c478bd9Sstevel@tonic-gate static void 54585e2174acSceastha add_file_to_table(file_list_t *table[], char *str) 54597c478bd9Sstevel@tonic-gate { 54607c478bd9Sstevel@tonic-gate char name[PATH_MAX + 1]; 54617c478bd9Sstevel@tonic-gate unsigned int h; 54625e2174acSceastha file_list_t *exp; 54637c478bd9Sstevel@tonic-gate 54647c478bd9Sstevel@tonic-gate (void) strcpy(name, str); 54657c478bd9Sstevel@tonic-gate while (name[strlen(name) - 1] == '/') { 54667c478bd9Sstevel@tonic-gate name[strlen(name) - 1] = NULL; 54677c478bd9Sstevel@tonic-gate } 54687c478bd9Sstevel@tonic-gate 54697c478bd9Sstevel@tonic-gate h = hash(name); 54705e2174acSceastha if ((exp = (file_list_t *)calloc(sizeof (file_list_t), 54717c478bd9Sstevel@tonic-gate sizeof (char))) == NULL) { 54727c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 54737c478bd9Sstevel@tonic-gate "tar: out of memory, exclude/include table(entry)\n")); 54747c478bd9Sstevel@tonic-gate exit(1); 54757c478bd9Sstevel@tonic-gate } 54767c478bd9Sstevel@tonic-gate 54777c478bd9Sstevel@tonic-gate if ((exp->name = strdup(name)) == NULL) { 54787c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 54797c478bd9Sstevel@tonic-gate "tar: out of memory, exclude/include table(file name)\n")); 54807c478bd9Sstevel@tonic-gate exit(1); 54817c478bd9Sstevel@tonic-gate } 54827c478bd9Sstevel@tonic-gate 54837c478bd9Sstevel@tonic-gate exp->next = table[h]; 54847c478bd9Sstevel@tonic-gate table[h] = exp; 54857c478bd9Sstevel@tonic-gate } 54867c478bd9Sstevel@tonic-gate 54877c478bd9Sstevel@tonic-gate 54887c478bd9Sstevel@tonic-gate /* 54897c478bd9Sstevel@tonic-gate * See if a file name or any of the file's parent directories is in the 54907c478bd9Sstevel@tonic-gate * specified table, if the file name has any trailing '/'s then delete 54917c478bd9Sstevel@tonic-gate * them before searching the table 54927c478bd9Sstevel@tonic-gate */ 54937c478bd9Sstevel@tonic-gate 54947c478bd9Sstevel@tonic-gate static int 54955e2174acSceastha is_in_table(file_list_t *table[], char *str) 54967c478bd9Sstevel@tonic-gate { 54977c478bd9Sstevel@tonic-gate char name[PATH_MAX + 1]; 54987c478bd9Sstevel@tonic-gate unsigned int h; 54995e2174acSceastha file_list_t *exp; 55007c478bd9Sstevel@tonic-gate char *ptr; 55017c478bd9Sstevel@tonic-gate 55027c478bd9Sstevel@tonic-gate (void) strcpy(name, str); 55037c478bd9Sstevel@tonic-gate while (name[strlen(name) - 1] == '/') { 55047c478bd9Sstevel@tonic-gate name[strlen(name) - 1] = NULL; 55057c478bd9Sstevel@tonic-gate } 55067c478bd9Sstevel@tonic-gate 55077c478bd9Sstevel@tonic-gate /* 55087c478bd9Sstevel@tonic-gate * check for the file name in the passed list 55097c478bd9Sstevel@tonic-gate */ 55107c478bd9Sstevel@tonic-gate h = hash(name); 55117c478bd9Sstevel@tonic-gate exp = table[h]; 55127c478bd9Sstevel@tonic-gate while (exp != NULL) { 55137c478bd9Sstevel@tonic-gate if (strcmp(name, exp->name) == 0) { 55147c478bd9Sstevel@tonic-gate return (1); 55157c478bd9Sstevel@tonic-gate } 55167c478bd9Sstevel@tonic-gate exp = exp->next; 55177c478bd9Sstevel@tonic-gate } 55187c478bd9Sstevel@tonic-gate 55197c478bd9Sstevel@tonic-gate /* 55207c478bd9Sstevel@tonic-gate * check for any parent directories in the file list 55217c478bd9Sstevel@tonic-gate */ 55227c478bd9Sstevel@tonic-gate while ((ptr = strrchr(name, '/'))) { 55237c478bd9Sstevel@tonic-gate *ptr = NULL; 55247c478bd9Sstevel@tonic-gate h = hash(name); 55257c478bd9Sstevel@tonic-gate exp = table[h]; 55267c478bd9Sstevel@tonic-gate while (exp != NULL) { 55277c478bd9Sstevel@tonic-gate if (strcmp(name, exp->name) == 0) { 55287c478bd9Sstevel@tonic-gate return (1); 55297c478bd9Sstevel@tonic-gate } 55307c478bd9Sstevel@tonic-gate exp = exp->next; 55317c478bd9Sstevel@tonic-gate } 55327c478bd9Sstevel@tonic-gate } 55337c478bd9Sstevel@tonic-gate 55347c478bd9Sstevel@tonic-gate return (0); 55357c478bd9Sstevel@tonic-gate } 55367c478bd9Sstevel@tonic-gate 55377c478bd9Sstevel@tonic-gate 55387c478bd9Sstevel@tonic-gate /* 55397c478bd9Sstevel@tonic-gate * Compute a hash from a string. 55407c478bd9Sstevel@tonic-gate */ 55417c478bd9Sstevel@tonic-gate 55427c478bd9Sstevel@tonic-gate static unsigned int 55437c478bd9Sstevel@tonic-gate hash(char *str) 55447c478bd9Sstevel@tonic-gate { 55457c478bd9Sstevel@tonic-gate char *cp; 55467c478bd9Sstevel@tonic-gate unsigned int h; 55477c478bd9Sstevel@tonic-gate 55487c478bd9Sstevel@tonic-gate h = 0; 55497c478bd9Sstevel@tonic-gate for (cp = str; *cp; cp++) { 55507c478bd9Sstevel@tonic-gate h += *cp; 55517c478bd9Sstevel@tonic-gate } 55527c478bd9Sstevel@tonic-gate return (h % TABLE_SIZE); 55537c478bd9Sstevel@tonic-gate } 55547c478bd9Sstevel@tonic-gate 55557c478bd9Sstevel@tonic-gate static void * 55567c478bd9Sstevel@tonic-gate getmem(size_t size) 55577c478bd9Sstevel@tonic-gate { 55587c478bd9Sstevel@tonic-gate void *p = calloc((unsigned)size, sizeof (char)); 55597c478bd9Sstevel@tonic-gate 55607c478bd9Sstevel@tonic-gate if (p == NULL && freemem) { 55617c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 55627c478bd9Sstevel@tonic-gate "tar: out of memory, link and directory modtime " 55637c478bd9Sstevel@tonic-gate "info lost\n")); 55647c478bd9Sstevel@tonic-gate freemem = 0; 55657c478bd9Sstevel@tonic-gate if (errflag) 55667c478bd9Sstevel@tonic-gate done(1); 55677c478bd9Sstevel@tonic-gate else 55687c478bd9Sstevel@tonic-gate Errflg = 1; 55697c478bd9Sstevel@tonic-gate } 55707c478bd9Sstevel@tonic-gate return (p); 55717c478bd9Sstevel@tonic-gate } 55727c478bd9Sstevel@tonic-gate 55737c478bd9Sstevel@tonic-gate /* 55747c478bd9Sstevel@tonic-gate * vperror() --variable argument perror. 55757c478bd9Sstevel@tonic-gate * Takes 3 args: exit_status, formats, args. If exit_status is 0, then 55767c478bd9Sstevel@tonic-gate * the errflag (exit on error) is checked -- if it is non-zero, tar exits 55777c478bd9Sstevel@tonic-gate * with the value of whatever "errno" is set to. If exit_status is not 55787c478bd9Sstevel@tonic-gate * zero, then tar exits with that error status. If errflag and exit_status 55797c478bd9Sstevel@tonic-gate * are both zero, the routine returns to where it was called and sets Errflg 55807c478bd9Sstevel@tonic-gate * to errno. 55817c478bd9Sstevel@tonic-gate */ 55827c478bd9Sstevel@tonic-gate 55837c478bd9Sstevel@tonic-gate static void 55847c478bd9Sstevel@tonic-gate vperror(int exit_status, char *fmt, ...) 55857c478bd9Sstevel@tonic-gate { 55867c478bd9Sstevel@tonic-gate va_list ap; 55877c478bd9Sstevel@tonic-gate 55887c478bd9Sstevel@tonic-gate va_start(ap, fmt); 55897c478bd9Sstevel@tonic-gate (void) fputs("tar: ", stderr); 55907c478bd9Sstevel@tonic-gate (void) vfprintf(stderr, fmt, ap); 55917c478bd9Sstevel@tonic-gate (void) fprintf(stderr, ": %s\n", strerror(errno)); 55927c478bd9Sstevel@tonic-gate va_end(ap); 55937c478bd9Sstevel@tonic-gate if (exit_status) 55947c478bd9Sstevel@tonic-gate done(exit_status); 55957c478bd9Sstevel@tonic-gate else 55967c478bd9Sstevel@tonic-gate if (errflag) 55977c478bd9Sstevel@tonic-gate done(errno); 55987c478bd9Sstevel@tonic-gate else 55997c478bd9Sstevel@tonic-gate Errflg = errno; 56007c478bd9Sstevel@tonic-gate } 56017c478bd9Sstevel@tonic-gate 56027c478bd9Sstevel@tonic-gate 56037c478bd9Sstevel@tonic-gate static void 56047c478bd9Sstevel@tonic-gate fatal(char *format, ...) 56057c478bd9Sstevel@tonic-gate { 56067c478bd9Sstevel@tonic-gate va_list ap; 56077c478bd9Sstevel@tonic-gate 56087c478bd9Sstevel@tonic-gate va_start(ap, format); 56097c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "tar: "); 56107c478bd9Sstevel@tonic-gate (void) vfprintf(stderr, format, ap); 56117c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n"); 56127c478bd9Sstevel@tonic-gate va_end(ap); 56137c478bd9Sstevel@tonic-gate done(1); 56147c478bd9Sstevel@tonic-gate } 56157c478bd9Sstevel@tonic-gate 56167c478bd9Sstevel@tonic-gate 56177c478bd9Sstevel@tonic-gate /* 56187c478bd9Sstevel@tonic-gate * Check to make sure that argument is a char * ptr. 56197c478bd9Sstevel@tonic-gate * Actually, we just check to see that it is non-null. 56207c478bd9Sstevel@tonic-gate * If it is null, print out the message and call usage(), bailing out. 56217c478bd9Sstevel@tonic-gate */ 56227c478bd9Sstevel@tonic-gate 56237c478bd9Sstevel@tonic-gate static void 56247c478bd9Sstevel@tonic-gate assert_string(char *s, char *msg) 56257c478bd9Sstevel@tonic-gate { 56267c478bd9Sstevel@tonic-gate if (s == NULL) { 56277c478bd9Sstevel@tonic-gate (void) fprintf(stderr, msg); 56287c478bd9Sstevel@tonic-gate usage(); 56297c478bd9Sstevel@tonic-gate } 56307c478bd9Sstevel@tonic-gate } 56317c478bd9Sstevel@tonic-gate 56327c478bd9Sstevel@tonic-gate 56337c478bd9Sstevel@tonic-gate static void 56347c478bd9Sstevel@tonic-gate mterr(char *operation, int i, int exitcode) 56357c478bd9Sstevel@tonic-gate { 56367c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 56377c478bd9Sstevel@tonic-gate "tar: %s error: "), operation); 56387c478bd9Sstevel@tonic-gate if (i < 0) 56397c478bd9Sstevel@tonic-gate perror(""); 56407c478bd9Sstevel@tonic-gate else 56417c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("unexpected EOF\n")); 56427c478bd9Sstevel@tonic-gate done(exitcode); 56437c478bd9Sstevel@tonic-gate } 56447c478bd9Sstevel@tonic-gate 56457c478bd9Sstevel@tonic-gate static int 5646da6c28aaSamw wantit(char *argv[], char **namep, char **dirp, char **component, 5647da6c28aaSamw attr_data_t **attrinfo) 56487c478bd9Sstevel@tonic-gate { 56497c478bd9Sstevel@tonic-gate char **cp; 56507c478bd9Sstevel@tonic-gate int gotit; /* true if we've found a match */ 5651123523f8Sas158974 int ret; 56527c478bd9Sstevel@tonic-gate 56537c478bd9Sstevel@tonic-gate top: 5654123523f8Sas158974 if (xhdr_flgs & _X_XHDR) { 56557c478bd9Sstevel@tonic-gate xhdr_flgs = 0; 5656123523f8Sas158974 } 56577c478bd9Sstevel@tonic-gate getdir(); 56587c478bd9Sstevel@tonic-gate if (Xhdrflag > 0) { 5659123523f8Sas158974 ret = get_xdata(); 5660123523f8Sas158974 if (ret != 0) { /* Xhdr items and regular header */ 5661123523f8Sas158974 setbytes_to_skip(&stbuf, ret); 56627c478bd9Sstevel@tonic-gate passtape(); 56637c478bd9Sstevel@tonic-gate return (0); /* Error--don't want to extract */ 56647c478bd9Sstevel@tonic-gate } 56657c478bd9Sstevel@tonic-gate } 56667c478bd9Sstevel@tonic-gate 5667123523f8Sas158974 /* 5668123523f8Sas158974 * If typeflag is not 'A' and xhdr_flgs is set, then processing 5669123523f8Sas158974 * of ancillary file is either over or ancillary file 5670123523f8Sas158974 * processing is not required, load info from Xtarhdr and set 5671123523f8Sas158974 * _X_XHDR bit in xhdr_flgs. 5672123523f8Sas158974 */ 5673123523f8Sas158974 if ((dblock.dbuf.typeflag != 'A') && (xhdr_flgs != 0)) { 5674123523f8Sas158974 load_info_from_xtarhdr(xhdr_flgs, &Xtarhdr); 5675123523f8Sas158974 xhdr_flgs |= _X_XHDR; 5676123523f8Sas158974 } 5677123523f8Sas158974 56787c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 56797c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag == _XATTR_HDRTYPE && xattrbadhead == 0) { 5680da6c28aaSamw /* 5681da6c28aaSamw * Always needs to read the extended header. If atflag, saflag, 5682da6c28aaSamw * or tflag isn't set, then we'll have the correct info for 5683da6c28aaSamw * passtape() later. 5684da6c28aaSamw */ 5685da6c28aaSamw (void) read_xattr_hdr(attrinfo); 56867c478bd9Sstevel@tonic-gate goto top; 56877c478bd9Sstevel@tonic-gate } 5688da6c28aaSamw /* 5689ced83f9bSceastha * Now that we've read the extended header, call passtape() 5690ced83f9bSceastha * if we don't want to restore attributes or system attributes. 5691ced83f9bSceastha * Don't restore the attribute if we are extracting 5692ced83f9bSceastha * a file from an archive (as opposed to doing a table of 5693ced83f9bSceastha * contents) and any of the following are true: 5694ced83f9bSceastha * 1. neither -@ or -/ was specified. 5695ced83f9bSceastha * 2. -@ was specified, -/ wasn't specified, and we're 5696ced83f9bSceastha * processing a hidden attribute directory of an attribute 5697ced83f9bSceastha * or we're processing a read-write system attribute file. 5698ced83f9bSceastha * 3. -@ wasn't specified, -/ was specified, and the file 5699ced83f9bSceastha * we're processing is not a read-write system attribute file, 5700ced83f9bSceastha * or we're processing the hidden attribute directory of an 5701ced83f9bSceastha * attribute. 5702ced83f9bSceastha * 5703ced83f9bSceastha * We always process the attributes if we're just generating 5704ced83f9bSceastha * generating a table of contents, or if both -@ and -/ were 5705ced83f9bSceastha * specified. 5706da6c28aaSamw */ 5707ced83f9bSceastha if (xattrp != NULL) { 5708ced83f9bSceastha attr_data_t *ainfo = *attrinfo; 5709ced83f9bSceastha 5710ced83f9bSceastha if (!tflag && 5711ced83f9bSceastha ((!atflag && !saflag) || 5712ced83f9bSceastha (atflag && !saflag && ((ainfo->attr_parent != NULL) || 5713ced83f9bSceastha ainfo->attr_rw_sysattr)) || 5714ced83f9bSceastha (!atflag && saflag && ((ainfo->attr_parent != NULL) || 5715ced83f9bSceastha !ainfo->attr_rw_sysattr)))) { 5716da6c28aaSamw passtape(); 5717da6c28aaSamw return (0); 5718da6c28aaSamw } 5719ced83f9bSceastha } 57207c478bd9Sstevel@tonic-gate #endif 57217c478bd9Sstevel@tonic-gate 57227c478bd9Sstevel@tonic-gate /* sets *namep to point at the proper name */ 5723da6c28aaSamw if (check_prefix(namep, dirp, component) != 0) { 5724da6c28aaSamw passtape(); 5725da6c28aaSamw return (0); 5726da6c28aaSamw } 57277c478bd9Sstevel@tonic-gate 57287c478bd9Sstevel@tonic-gate if (endtape()) { 57297c478bd9Sstevel@tonic-gate if (Bflag) { 57307c478bd9Sstevel@tonic-gate /* 57317c478bd9Sstevel@tonic-gate * Logically at EOT - consume any extra blocks 57327c478bd9Sstevel@tonic-gate * so that write to our stdin won't fail and 57337c478bd9Sstevel@tonic-gate * emit an error message; otherwise something 57347c478bd9Sstevel@tonic-gate * like "dd if=foo.tar | (cd bar; tar xvf -)" 57357c478bd9Sstevel@tonic-gate * will produce a bogus error message from "dd". 57367c478bd9Sstevel@tonic-gate */ 57377c478bd9Sstevel@tonic-gate 57387c478bd9Sstevel@tonic-gate while (read(mt, tbuf, TBLOCK*nblock) > 0) { 57397c478bd9Sstevel@tonic-gate /* empty body */ 57407c478bd9Sstevel@tonic-gate } 57417c478bd9Sstevel@tonic-gate } 57427c478bd9Sstevel@tonic-gate return (-1); 57437c478bd9Sstevel@tonic-gate } 57447c478bd9Sstevel@tonic-gate 57457c478bd9Sstevel@tonic-gate gotit = 0; 57467c478bd9Sstevel@tonic-gate 57477c478bd9Sstevel@tonic-gate if ((Iflag && is_in_table(include_tbl, *namep)) || 57487c478bd9Sstevel@tonic-gate (! Iflag && *argv == NULL)) { 57497c478bd9Sstevel@tonic-gate gotit = 1; 57507c478bd9Sstevel@tonic-gate } else { 57517c478bd9Sstevel@tonic-gate for (cp = argv; *cp; cp++) { 57527c478bd9Sstevel@tonic-gate if (is_prefix(*cp, *namep)) { 57537c478bd9Sstevel@tonic-gate gotit = 1; 57547c478bd9Sstevel@tonic-gate break; 57557c478bd9Sstevel@tonic-gate } 57567c478bd9Sstevel@tonic-gate } 57577c478bd9Sstevel@tonic-gate } 57587c478bd9Sstevel@tonic-gate 57597c478bd9Sstevel@tonic-gate if (! gotit) { 57607c478bd9Sstevel@tonic-gate passtape(); 57617c478bd9Sstevel@tonic-gate return (0); 57627c478bd9Sstevel@tonic-gate } 57637c478bd9Sstevel@tonic-gate 57647c478bd9Sstevel@tonic-gate if (Xflag && is_in_table(exclude_tbl, *namep)) { 57657c478bd9Sstevel@tonic-gate if (vflag) { 57667c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext("%s excluded\n"), 57677c478bd9Sstevel@tonic-gate *namep); 57687c478bd9Sstevel@tonic-gate } 57697c478bd9Sstevel@tonic-gate passtape(); 57707c478bd9Sstevel@tonic-gate return (0); 57717c478bd9Sstevel@tonic-gate } 57727c478bd9Sstevel@tonic-gate 57737c478bd9Sstevel@tonic-gate return (1); 57747c478bd9Sstevel@tonic-gate } 57757c478bd9Sstevel@tonic-gate 5776123523f8Sas158974 5777123523f8Sas158974 static void 5778123523f8Sas158974 setbytes_to_skip(struct stat *st, int err) 5779123523f8Sas158974 { 5780123523f8Sas158974 /* 5781123523f8Sas158974 * In a scenario where a typeflag 'X' was followed by 5782123523f8Sas158974 * a typeflag 'A' and typeflag 'O', then the number of 5783123523f8Sas158974 * bytes to skip should be the size of ancillary file, 5784123523f8Sas158974 * plus the dblock for regular file, and the size 5785123523f8Sas158974 * from Xtarhdr. However, if the typeflag was just 'X' 5786123523f8Sas158974 * followed by typeflag 'O', then the number of bytes 5787123523f8Sas158974 * to skip should be the size from Xtarhdr. 5788123523f8Sas158974 */ 5789123523f8Sas158974 if ((err != 0) && (dblock.dbuf.typeflag == 'A') && 5790257ece65SRalph Turner - Sun UK - Contractor (xhdr_flgs & _X_SIZE)) { 5791ced83f9bSceastha st->st_size += TBLOCK + Xtarhdr.x_filesz; 5792123523f8Sas158974 xhdr_flgs |= _X_XHDR; 5793123523f8Sas158974 } else if ((dblock.dbuf.typeflag != 'A') && 5794257ece65SRalph Turner - Sun UK - Contractor (xhdr_flgs & _X_SIZE)) { 5795257ece65SRalph Turner - Sun UK - Contractor st->st_size += Xtarhdr.x_filesz; 5796123523f8Sas158974 xhdr_flgs |= _X_XHDR; 5797123523f8Sas158974 } 5798123523f8Sas158974 } 5799123523f8Sas158974 5800da6c28aaSamw static int 5801da6c28aaSamw fill_in_attr_info(char *attr, char *longname, char *attrparent, int atparentfd, 5802da6c28aaSamw int rw_sysattr, attr_data_t **attrinfo) 5803da6c28aaSamw { 5804da6c28aaSamw size_t pathlen; 5805da6c28aaSamw char *tpath; 5806da6c28aaSamw char *tparent; 5807da6c28aaSamw 5808da6c28aaSamw /* parent info */ 5809da6c28aaSamw if (attrparent != NULL) { 5810da6c28aaSamw if ((tparent = strdup(attrparent)) == NULL) { 5811da6c28aaSamw vperror(0, gettext( 5812da6c28aaSamw "unable to allocate memory for attribute parent " 5813da6c28aaSamw "name for %sattribute %s/%s of %s"), 5814da6c28aaSamw rw_sysattr ? gettext("system ") : "", 5815da6c28aaSamw attrparent, attr, longname); 5816da6c28aaSamw return (1); 5817da6c28aaSamw } 5818da6c28aaSamw } else { 5819da6c28aaSamw tparent = NULL; 5820da6c28aaSamw } 5821da6c28aaSamw 5822da6c28aaSamw /* path info */ 5823da6c28aaSamw pathlen = strlen(attr) + 1; 5824da6c28aaSamw if (attrparent != NULL) { 5825da6c28aaSamw pathlen += strlen(attrparent) + 1; /* add 1 for '/' */ 5826da6c28aaSamw } 5827da6c28aaSamw if ((tpath = calloc(1, pathlen)) == NULL) { 5828da6c28aaSamw vperror(0, gettext( 5829da6c28aaSamw "unable to allocate memory for full " 5830da6c28aaSamw "attribute path name for %sattribute %s%s%s of %s"), 5831da6c28aaSamw rw_sysattr ? gettext("system ") : "", 5832da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 5833da6c28aaSamw (attrparent == NULL) ? "" : "/", 5834da6c28aaSamw attr, longname); 5835da6c28aaSamw if (tparent != NULL) { 5836da6c28aaSamw free(tparent); 5837da6c28aaSamw } 5838da6c28aaSamw return (1); 5839da6c28aaSamw } 5840da6c28aaSamw (void) snprintf(tpath, pathlen, "%s%s%s", 5841da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 5842da6c28aaSamw (attrparent == NULL) ? "" : "/", 5843da6c28aaSamw attr); 5844da6c28aaSamw 5845da6c28aaSamw /* fill in the attribute info */ 5846da6c28aaSamw if (*attrinfo == NULL) { 5847da6c28aaSamw if ((*attrinfo = malloc(sizeof (attr_data_t))) == NULL) { 5848da6c28aaSamw vperror(0, gettext( 5849da6c28aaSamw "unable to allocate memory for attribute " 5850da6c28aaSamw "information for %sattribute %s%s%s of %s"), 5851da6c28aaSamw rw_sysattr ? gettext("system ") : "", 5852da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 5853da6c28aaSamw (attrparent == NULL) ? "" : gettext("/"), 5854da6c28aaSamw attr, longname); 5855da6c28aaSamw if (tparent != NULL) { 5856da6c28aaSamw free(tparent); 5857da6c28aaSamw } 5858da6c28aaSamw free(tpath); 5859da6c28aaSamw return (1); 5860da6c28aaSamw } 5861da6c28aaSamw } else { 5862da6c28aaSamw if ((*attrinfo)->attr_parent != NULL) { 5863da6c28aaSamw free((*attrinfo)->attr_parent); 5864da6c28aaSamw } 5865da6c28aaSamw if ((*attrinfo)->attr_path != NULL) { 5866da6c28aaSamw free((*attrinfo)->attr_path); 5867da6c28aaSamw } 5868da6c28aaSamw /* 5869da6c28aaSamw * The parent file descriptor is passed in, so don't 5870da6c28aaSamw * close it here as it should be closed by the function 5871da6c28aaSamw * that opened it. 5872da6c28aaSamw */ 5873da6c28aaSamw } 5874da6c28aaSamw (*attrinfo)->attr_parent = tparent; 5875da6c28aaSamw (*attrinfo)->attr_path = tpath; 5876da6c28aaSamw (*attrinfo)->attr_rw_sysattr = rw_sysattr; 5877da6c28aaSamw (*attrinfo)->attr_parentfd = atparentfd; 5878da6c28aaSamw 5879da6c28aaSamw return (0); 5880da6c28aaSamw } 58817c478bd9Sstevel@tonic-gate 58827c478bd9Sstevel@tonic-gate /* 58833a1dab68SRich Burridge * Test to see if name is a directory. 58843a1dab68SRich Burridge * 58853a1dab68SRich Burridge * Return 1 if true, 0 otherwise. 58863a1dab68SRich Burridge */ 58873a1dab68SRich Burridge 58883a1dab68SRich Burridge static int 58893a1dab68SRich Burridge is_directory(char *name) 58903a1dab68SRich Burridge { 58913a1dab68SRich Burridge #if defined(O_XATTR) 58923a1dab68SRich Burridge /* 58933a1dab68SRich Burridge * If there is an xattr_buf structure associated with this file, 58943a1dab68SRich Burridge * then the directory test is based on whether the name has a 58953a1dab68SRich Burridge * trailing slash. 58963a1dab68SRich Burridge */ 58973a1dab68SRich Burridge if (xattrp) 58983a1dab68SRich Burridge return (name[strlen(name) - 1] == '/'); 58993a1dab68SRich Burridge #endif 59003a1dab68SRich Burridge if (is_posix) 59013a1dab68SRich Burridge return (dblock.dbuf.typeflag == '5'); 59023a1dab68SRich Burridge else 59033a1dab68SRich Burridge return (name[strlen(name) - 1] == '/'); 59043a1dab68SRich Burridge } 59053a1dab68SRich Burridge 59063a1dab68SRich Burridge /* 5907b25dbf38SRich Burridge * Version of chdir that handles directory pathnames of greater than PATH_MAX 5908b25dbf38SRich Burridge * length, by changing the working directory to manageable portions of the 5909b25dbf38SRich Burridge * complete directory pathname. If any of these attempts fail, then it exits 5910b25dbf38SRich Burridge * non-zero. 5911b25dbf38SRich Burridge * 5912b25dbf38SRich Burridge * If a segment (i.e. a portion of "path" between two "/"'s) of the overall 5913b25dbf38SRich Burridge * pathname is greater than PATH_MAX, then this still won't work, and this 5914b25dbf38SRich Burridge * routine will return -1 with errno set to ENAMETOOLONG. 5915b25dbf38SRich Burridge * 5916b25dbf38SRich Burridge * NOTE: this routine is semantically different to the system chdir in 5917b25dbf38SRich Burridge * that it is remotely possible for the currently working directory to be 5918b25dbf38SRich Burridge * changed to a different directory, if a chdir call fails when processing 5919b25dbf38SRich Burridge * one of the segments of a path that is greater than PATH_MAX. This isn't 5920b25dbf38SRich Burridge * a problem as this is tar's own specific version of chdir. 5921b25dbf38SRich Burridge */ 5922b25dbf38SRich Burridge 5923b25dbf38SRich Burridge static int 5924b25dbf38SRich Burridge tar_chdir(const char *path) { 5925b25dbf38SRich Burridge const char *sep = "/"; 5926b25dbf38SRich Burridge char *path_copy = NULL; 5927b25dbf38SRich Burridge char *ptr = NULL; 5928b25dbf38SRich Burridge 5929b25dbf38SRich Burridge /* The trivial case. */ 5930b25dbf38SRich Burridge if (chdir(path) == 0) { 5931b25dbf38SRich Burridge return (0); 5932b25dbf38SRich Burridge } 5933b25dbf38SRich Burridge if (errno == ENAMETOOLONG) { 5934b25dbf38SRich Burridge if (path[0] == '/' && chdir(sep) != 0) 5935b25dbf38SRich Burridge return (-1); 5936b25dbf38SRich Burridge 5937b25dbf38SRich Burridge /* strtok(3C) modifies the string, so make a copy. */ 5938b25dbf38SRich Burridge if ((path_copy = strdup(path)) == NULL) { 5939b25dbf38SRich Burridge return (-1); 5940b25dbf38SRich Burridge } 5941b25dbf38SRich Burridge 5942b25dbf38SRich Burridge /* chdir(2) for every path element. */ 5943b25dbf38SRich Burridge for (ptr = strtok(path_copy, sep); 5944b25dbf38SRich Burridge ptr != NULL; 5945b25dbf38SRich Burridge ptr = strtok(NULL, sep)) { 5946b25dbf38SRich Burridge if (chdir(ptr) != 0) { 5947b25dbf38SRich Burridge free(path_copy); 5948b25dbf38SRich Burridge return (-1); 5949b25dbf38SRich Burridge } 5950b25dbf38SRich Burridge } 5951b25dbf38SRich Burridge free(path_copy); 5952b25dbf38SRich Burridge return (0); 5953b25dbf38SRich Burridge } 5954b25dbf38SRich Burridge 5955b25dbf38SRich Burridge /* If chdir fails for any reason except ENAMETOOLONG. */ 5956b25dbf38SRich Burridge return (-1); 5957b25dbf38SRich Burridge } 5958b25dbf38SRich Burridge 5959b25dbf38SRich Burridge /* 59601a431409SRich Burridge * Test if name has a '..' sequence in it. 59611a431409SRich Burridge * 59621a431409SRich Burridge * Return 1 if found, 0 otherwise. 59631a431409SRich Burridge */ 59641a431409SRich Burridge 59651a431409SRich Burridge static int 59661a431409SRich Burridge has_dot_dot(char *name) 59671a431409SRich Burridge { 59681a431409SRich Burridge char *s; 59691a431409SRich Burridge size_t name_len = strlen(name); 59701a431409SRich Burridge 59711a431409SRich Burridge for (s = name; s < (name + name_len - 2); s++) { 59721a431409SRich Burridge if (s[0] == '.' && s[1] == '.' && ((s[2] == '/') || !s[2])) 59731a431409SRich Burridge return (1); 59741a431409SRich Burridge 59751a431409SRich Burridge while (! (*s == '/')) { 59761a431409SRich Burridge if (! *s++) 59771a431409SRich Burridge return (0); 59781a431409SRich Burridge } 59791a431409SRich Burridge } 59801a431409SRich Burridge 59811a431409SRich Burridge return (0); 59821a431409SRich Burridge } 59831a431409SRich Burridge 59841a431409SRich Burridge /* 59851a431409SRich Burridge * Test if name is an absolute path name. 59861a431409SRich Burridge * 59871a431409SRich Burridge * Return 1 if true, 0 otherwise. 59881a431409SRich Burridge */ 59891a431409SRich Burridge 59901a431409SRich Burridge static int 59911a431409SRich Burridge is_absolute(char *name) 59921a431409SRich Burridge { 5993fe5a79a9SRich Burridge #if defined(O_XATTR) 5994fe5a79a9SRich Burridge /* 5995fe5a79a9SRich Burridge * If this is an extended attribute (whose name will begin with 5996fe5a79a9SRich Burridge * "/dev/null/", always return 0 as they should be extracted with 5997fe5a79a9SRich Burridge * the name intact, to allow other tar archiving programs that 5998fe5a79a9SRich Burridge * don't understand extended attributes, to correctly throw them away. 5999fe5a79a9SRich Burridge */ 6000fe5a79a9SRich Burridge if (xattrp) 6001fe5a79a9SRich Burridge return (0); 6002fe5a79a9SRich Burridge #endif 6003fe5a79a9SRich Burridge 60041a431409SRich Burridge return (name[0] == '/'); 60051a431409SRich Burridge } 60061a431409SRich Burridge 60071a431409SRich Burridge /* 60081a431409SRich Burridge * Adjust the pathname to make it a relative one. Strip off any leading 60091a431409SRich Burridge * '/' characters and if the pathname contains any '..' sequences, strip 60101a431409SRich Burridge * upto and including the last occurance of '../' (or '..' if found at 60111a431409SRich Burridge * the very end of the pathname). 60121a431409SRich Burridge * 60131a431409SRich Burridge * Return the relative pathname. stripped_prefix will also return the 60141a431409SRich Burridge * portion of name that was stripped off and should be freed by the 60151a431409SRich Burridge * calling routine when no longer needed. 60161a431409SRich Burridge */ 60171a431409SRich Burridge 60181a431409SRich Burridge static char * 60191a431409SRich Burridge make_relative_name(char *name, char **stripped_prefix) 60201a431409SRich Burridge { 60211a431409SRich Burridge char *s; 60221a431409SRich Burridge size_t prefix_len = 0; 60231a431409SRich Burridge size_t name_len = strlen(name); 60241a431409SRich Burridge 60251a431409SRich Burridge for (s = name + prefix_len; s < (name + name_len - 2); ) { 60261a431409SRich Burridge if (s[0] == '.' && s[1] == '.' && ((s[2] == '/') || !s[2])) 60271a431409SRich Burridge prefix_len = s + 2 - name; 60281a431409SRich Burridge 60291a431409SRich Burridge do { 60301a431409SRich Burridge char c = *s++; 60311a431409SRich Burridge 60321a431409SRich Burridge if (c == '/') 60331a431409SRich Burridge break; 60341a431409SRich Burridge } while (*s); 60351a431409SRich Burridge } 60361a431409SRich Burridge 60371a431409SRich Burridge for (s = name + prefix_len; *s == '/'; s++) 60381a431409SRich Burridge continue; 60391a431409SRich Burridge prefix_len = s - name; 60401a431409SRich Burridge 60411a431409SRich Burridge /* Create the portion of the name that was stripped off. */ 60421a431409SRich Burridge s = malloc(prefix_len + 1); 60431a431409SRich Burridge memcpy(s, name, prefix_len); 60441a431409SRich Burridge s[prefix_len] = 0; 60451a431409SRich Burridge *stripped_prefix = s; 60461a431409SRich Burridge s = &name[prefix_len]; 60471a431409SRich Burridge 60481a431409SRich Burridge return (s); 60491a431409SRich Burridge } 60501a431409SRich Burridge 60511a431409SRich Burridge /* 60527c478bd9Sstevel@tonic-gate * Return through *namep a pointer to the proper fullname (i.e "<name> | 60537c478bd9Sstevel@tonic-gate * <prefix>/<name>"), as represented in the header entry dblock.dbuf. 6054da6c28aaSamw * 6055da6c28aaSamw * Returns 0 if successful, otherwise returns 1. 60567c478bd9Sstevel@tonic-gate */ 60577c478bd9Sstevel@tonic-gate 6058da6c28aaSamw static int 60597c478bd9Sstevel@tonic-gate check_prefix(char **namep, char **dirp, char **compp) 60607c478bd9Sstevel@tonic-gate { 60617c478bd9Sstevel@tonic-gate static char fullname[PATH_MAX + 1]; 60627c478bd9Sstevel@tonic-gate static char dir[PATH_MAX + 1]; 60637c478bd9Sstevel@tonic-gate static char component[PATH_MAX + 1]; 60647c478bd9Sstevel@tonic-gate static char savename[PATH_MAX + 1]; 60657c478bd9Sstevel@tonic-gate char *s; 60667c478bd9Sstevel@tonic-gate 60677c478bd9Sstevel@tonic-gate (void) memset(dir, 0, sizeof (dir)); 60687c478bd9Sstevel@tonic-gate (void) memset(component, 0, sizeof (component)); 60697c478bd9Sstevel@tonic-gate 60707c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) { 60717c478bd9Sstevel@tonic-gate (void) strcpy(fullname, Xtarhdr.x_path); 60727c478bd9Sstevel@tonic-gate } else { 60737c478bd9Sstevel@tonic-gate if (dblock.dbuf.prefix[0] != '\0') 60747c478bd9Sstevel@tonic-gate (void) sprintf(fullname, "%.*s/%.*s", PRESIZ, 60757c478bd9Sstevel@tonic-gate dblock.dbuf.prefix, NAMSIZ, dblock.dbuf.name); 60767c478bd9Sstevel@tonic-gate else 60777c478bd9Sstevel@tonic-gate (void) sprintf(fullname, "%.*s", NAMSIZ, 60787c478bd9Sstevel@tonic-gate dblock.dbuf.name); 60797c478bd9Sstevel@tonic-gate } 60807c478bd9Sstevel@tonic-gate 60817c478bd9Sstevel@tonic-gate /* 60821a431409SRich Burridge * If we are printing a table of contents or extracting an archive, 60831a431409SRich Burridge * make absolute pathnames relative and prohibit the unpacking of 60841a431409SRich Burridge * files contain ".." in their name (unless the user has supplied 60851a431409SRich Burridge * the -P option). 60861a431409SRich Burridge */ 60871a431409SRich Burridge if ((tflag || xflag) && !Pflag) { 60881a431409SRich Burridge if (is_absolute(fullname) || has_dot_dot(fullname)) { 60891a431409SRich Burridge char *stripped_prefix; 60901a431409SRich Burridge size_t prefix_len = 0; 60911a431409SRich Burridge 60921a431409SRich Burridge (void) strcpy(savename, fullname); 60931a431409SRich Burridge strcpy(fullname, 60941a431409SRich Burridge make_relative_name(savename, &stripped_prefix)); 60951a431409SRich Burridge (void) fprintf(stderr, 60961a431409SRich Burridge gettext("tar: Removing leading '%s' from '%s'\n"), 60971a431409SRich Burridge stripped_prefix, savename); 60981a431409SRich Burridge free(stripped_prefix); 60991a431409SRich Burridge } 61001a431409SRich Burridge } 61011a431409SRich Burridge 61021a431409SRich Burridge /* 61037c478bd9Sstevel@tonic-gate * Set dir and component names 61047c478bd9Sstevel@tonic-gate */ 61057c478bd9Sstevel@tonic-gate 61067c478bd9Sstevel@tonic-gate get_parent(fullname, dir); 61077c478bd9Sstevel@tonic-gate 61087c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 6109da6c28aaSamw if (xattrp == NULL) { 61107c478bd9Sstevel@tonic-gate #endif 61117c478bd9Sstevel@tonic-gate /* 61127c478bd9Sstevel@tonic-gate * Save of real name since were going to chop off the 61137c478bd9Sstevel@tonic-gate * trailing slashes. 61147c478bd9Sstevel@tonic-gate */ 61157c478bd9Sstevel@tonic-gate (void) strcpy(savename, fullname); 61167c478bd9Sstevel@tonic-gate /* 61177c478bd9Sstevel@tonic-gate * first strip of trailing slashes. 61187c478bd9Sstevel@tonic-gate */ 61197c478bd9Sstevel@tonic-gate chop_endslashes(savename); 61207c478bd9Sstevel@tonic-gate s = get_component(savename); 61217c478bd9Sstevel@tonic-gate (void) strcpy(component, s); 61227c478bd9Sstevel@tonic-gate 61237c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 61247c478bd9Sstevel@tonic-gate } else { 61257c478bd9Sstevel@tonic-gate (void) strcpy(fullname, xattrp->h_names); 61267c478bd9Sstevel@tonic-gate (void) strcpy(dir, fullname); 6127da6c28aaSamw (void) strcpy(component, basename(xattrp->h_names + 6128da6c28aaSamw strlen(xattrp->h_names) + 1)); 61297c478bd9Sstevel@tonic-gate } 61307c478bd9Sstevel@tonic-gate #endif 61317c478bd9Sstevel@tonic-gate *namep = fullname; 61327c478bd9Sstevel@tonic-gate *dirp = dir; 61337c478bd9Sstevel@tonic-gate *compp = component; 6134da6c28aaSamw 6135da6c28aaSamw return (0); 61367c478bd9Sstevel@tonic-gate } 61377c478bd9Sstevel@tonic-gate 61387c478bd9Sstevel@tonic-gate /* 61397c478bd9Sstevel@tonic-gate * Return true if the object indicated by the file descriptor and type 61407c478bd9Sstevel@tonic-gate * is a tape device, false otherwise 61417c478bd9Sstevel@tonic-gate */ 61427c478bd9Sstevel@tonic-gate 61437c478bd9Sstevel@tonic-gate static int 61447c478bd9Sstevel@tonic-gate istape(int fd, int type) 61457c478bd9Sstevel@tonic-gate { 61467c478bd9Sstevel@tonic-gate int result = 0; 61477c478bd9Sstevel@tonic-gate 61484bc0a2efScasper if (S_ISCHR(type)) { 61497c478bd9Sstevel@tonic-gate struct mtget mtg; 61507c478bd9Sstevel@tonic-gate 61517c478bd9Sstevel@tonic-gate if (ioctl(fd, MTIOCGET, &mtg) != -1) { 61527c478bd9Sstevel@tonic-gate result = 1; 61537c478bd9Sstevel@tonic-gate } 61547c478bd9Sstevel@tonic-gate } 61557c478bd9Sstevel@tonic-gate 61567c478bd9Sstevel@tonic-gate return (result); 61577c478bd9Sstevel@tonic-gate } 61587c478bd9Sstevel@tonic-gate 61597c478bd9Sstevel@tonic-gate #include <utmpx.h> 61607c478bd9Sstevel@tonic-gate 61617c478bd9Sstevel@tonic-gate struct utmpx utmpx; 61627c478bd9Sstevel@tonic-gate 61637c478bd9Sstevel@tonic-gate #define NMAX (sizeof (utmpx.ut_name)) 61647c478bd9Sstevel@tonic-gate 61657c478bd9Sstevel@tonic-gate typedef struct cachenode { /* this struct must be zeroed before using */ 61667c478bd9Sstevel@tonic-gate struct cachenode *next; /* next in hash chain */ 61677c478bd9Sstevel@tonic-gate int val; /* the uid or gid of this entry */ 61687c478bd9Sstevel@tonic-gate int namehash; /* name's hash signature */ 61697c478bd9Sstevel@tonic-gate char name[NMAX+1]; /* the string that val maps to */ 61707c478bd9Sstevel@tonic-gate } cachenode_t; 61717c478bd9Sstevel@tonic-gate 61727c478bd9Sstevel@tonic-gate #define HASHSIZE 256 61737c478bd9Sstevel@tonic-gate 61747c478bd9Sstevel@tonic-gate static cachenode_t *names[HASHSIZE]; 61757c478bd9Sstevel@tonic-gate static cachenode_t *groups[HASHSIZE]; 61767c478bd9Sstevel@tonic-gate static cachenode_t *uids[HASHSIZE]; 61777c478bd9Sstevel@tonic-gate static cachenode_t *gids[HASHSIZE]; 61787c478bd9Sstevel@tonic-gate 61797c478bd9Sstevel@tonic-gate static int 61807c478bd9Sstevel@tonic-gate hash_byname(char *name) 61817c478bd9Sstevel@tonic-gate { 61827c478bd9Sstevel@tonic-gate int i, c, h = 0; 61837c478bd9Sstevel@tonic-gate 61847c478bd9Sstevel@tonic-gate for (i = 0; i < NMAX; i++) { 61857c478bd9Sstevel@tonic-gate c = name[i]; 61867c478bd9Sstevel@tonic-gate if (c == '\0') 61877c478bd9Sstevel@tonic-gate break; 61887c478bd9Sstevel@tonic-gate h = (h << 4) + h + c; 61897c478bd9Sstevel@tonic-gate } 61907c478bd9Sstevel@tonic-gate return (h); 61917c478bd9Sstevel@tonic-gate } 61927c478bd9Sstevel@tonic-gate 61937c478bd9Sstevel@tonic-gate static cachenode_t * 61947c478bd9Sstevel@tonic-gate hash_lookup_byval(cachenode_t *table[], int val) 61957c478bd9Sstevel@tonic-gate { 61967c478bd9Sstevel@tonic-gate int h = val; 61977c478bd9Sstevel@tonic-gate cachenode_t *c; 61987c478bd9Sstevel@tonic-gate 61997c478bd9Sstevel@tonic-gate for (c = table[h & (HASHSIZE - 1)]; c != NULL; c = c->next) { 62007c478bd9Sstevel@tonic-gate if (c->val == val) 62017c478bd9Sstevel@tonic-gate return (c); 62027c478bd9Sstevel@tonic-gate } 62037c478bd9Sstevel@tonic-gate return (NULL); 62047c478bd9Sstevel@tonic-gate } 62057c478bd9Sstevel@tonic-gate 62067c478bd9Sstevel@tonic-gate static cachenode_t * 62077c478bd9Sstevel@tonic-gate hash_lookup_byname(cachenode_t *table[], char *name) 62087c478bd9Sstevel@tonic-gate { 62097c478bd9Sstevel@tonic-gate int h = hash_byname(name); 62107c478bd9Sstevel@tonic-gate cachenode_t *c; 62117c478bd9Sstevel@tonic-gate 62127c478bd9Sstevel@tonic-gate for (c = table[h & (HASHSIZE - 1)]; c != NULL; c = c->next) { 62137c478bd9Sstevel@tonic-gate if (c->namehash == h && strcmp(c->name, name) == 0) 62147c478bd9Sstevel@tonic-gate return (c); 62157c478bd9Sstevel@tonic-gate } 62167c478bd9Sstevel@tonic-gate return (NULL); 62177c478bd9Sstevel@tonic-gate } 62187c478bd9Sstevel@tonic-gate 62197c478bd9Sstevel@tonic-gate static cachenode_t * 62207c478bd9Sstevel@tonic-gate hash_insert(cachenode_t *table[], char *name, int value) 62217c478bd9Sstevel@tonic-gate { 62227c478bd9Sstevel@tonic-gate cachenode_t *c; 62237c478bd9Sstevel@tonic-gate int signature; 62247c478bd9Sstevel@tonic-gate 62257c478bd9Sstevel@tonic-gate c = calloc(1, sizeof (cachenode_t)); 62267c478bd9Sstevel@tonic-gate if (c == NULL) { 62277c478bd9Sstevel@tonic-gate perror("malloc"); 62287c478bd9Sstevel@tonic-gate exit(1); 62297c478bd9Sstevel@tonic-gate } 62307c478bd9Sstevel@tonic-gate if (name != NULL) { 62317c478bd9Sstevel@tonic-gate (void) strncpy(c->name, name, NMAX); 62327c478bd9Sstevel@tonic-gate c->namehash = hash_byname(name); 62337c478bd9Sstevel@tonic-gate } 62347c478bd9Sstevel@tonic-gate c->val = value; 62357c478bd9Sstevel@tonic-gate if (table == uids || table == gids) 62367c478bd9Sstevel@tonic-gate signature = c->val; 62377c478bd9Sstevel@tonic-gate else 62387c478bd9Sstevel@tonic-gate signature = c->namehash; 62397c478bd9Sstevel@tonic-gate c->next = table[signature & (HASHSIZE - 1)]; 62407c478bd9Sstevel@tonic-gate table[signature & (HASHSIZE - 1)] = c; 62417c478bd9Sstevel@tonic-gate return (c); 62427c478bd9Sstevel@tonic-gate } 62437c478bd9Sstevel@tonic-gate 62447c478bd9Sstevel@tonic-gate static char * 62457c478bd9Sstevel@tonic-gate getname(uid_t uid) 62467c478bd9Sstevel@tonic-gate { 62477c478bd9Sstevel@tonic-gate cachenode_t *c; 62487c478bd9Sstevel@tonic-gate 62497c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byval(uids, uid)) == NULL) { 62507c478bd9Sstevel@tonic-gate struct passwd *pwent = getpwuid(uid); 62517c478bd9Sstevel@tonic-gate c = hash_insert(uids, pwent ? pwent->pw_name : NULL, uid); 62527c478bd9Sstevel@tonic-gate } 62537c478bd9Sstevel@tonic-gate return (c->name); 62547c478bd9Sstevel@tonic-gate } 62557c478bd9Sstevel@tonic-gate 62567c478bd9Sstevel@tonic-gate static char * 62577c478bd9Sstevel@tonic-gate getgroup(gid_t gid) 62587c478bd9Sstevel@tonic-gate { 62597c478bd9Sstevel@tonic-gate cachenode_t *c; 62607c478bd9Sstevel@tonic-gate 62617c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byval(gids, gid)) == NULL) { 62627c478bd9Sstevel@tonic-gate struct group *grent = getgrgid(gid); 62637c478bd9Sstevel@tonic-gate c = hash_insert(gids, grent ? grent->gr_name : NULL, gid); 62647c478bd9Sstevel@tonic-gate } 62657c478bd9Sstevel@tonic-gate return (c->name); 62667c478bd9Sstevel@tonic-gate } 62677c478bd9Sstevel@tonic-gate 62687c478bd9Sstevel@tonic-gate static uid_t 62697c478bd9Sstevel@tonic-gate getuidbyname(char *name) 62707c478bd9Sstevel@tonic-gate { 62717c478bd9Sstevel@tonic-gate cachenode_t *c; 62727c478bd9Sstevel@tonic-gate 62737c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byname(names, name)) == NULL) { 62747c478bd9Sstevel@tonic-gate struct passwd *pwent = getpwnam(name); 62757c478bd9Sstevel@tonic-gate c = hash_insert(names, name, pwent ? (int)pwent->pw_uid : -1); 62767c478bd9Sstevel@tonic-gate } 62777c478bd9Sstevel@tonic-gate return ((uid_t)c->val); 62787c478bd9Sstevel@tonic-gate } 62797c478bd9Sstevel@tonic-gate 62807c478bd9Sstevel@tonic-gate static gid_t 62817c478bd9Sstevel@tonic-gate getgidbyname(char *group) 62827c478bd9Sstevel@tonic-gate { 62837c478bd9Sstevel@tonic-gate cachenode_t *c; 62847c478bd9Sstevel@tonic-gate 62857c478bd9Sstevel@tonic-gate if ((c = hash_lookup_byname(groups, group)) == NULL) { 62867c478bd9Sstevel@tonic-gate struct group *grent = getgrnam(group); 62877c478bd9Sstevel@tonic-gate c = hash_insert(groups, group, grent ? (int)grent->gr_gid : -1); 62887c478bd9Sstevel@tonic-gate } 62897c478bd9Sstevel@tonic-gate return ((gid_t)c->val); 62907c478bd9Sstevel@tonic-gate } 62917c478bd9Sstevel@tonic-gate 62927c478bd9Sstevel@tonic-gate /* 62937c478bd9Sstevel@tonic-gate * Build the header. 62947c478bd9Sstevel@tonic-gate * Determine whether or not an extended header is also needed. If needed, 62957c478bd9Sstevel@tonic-gate * create and write the extended header and its data. 62967c478bd9Sstevel@tonic-gate * Writing of the extended header assumes that "tomodes" has been called and 62977c478bd9Sstevel@tonic-gate * the relevant information has been placed in the header block. 62987c478bd9Sstevel@tonic-gate */ 62997c478bd9Sstevel@tonic-gate 63007c478bd9Sstevel@tonic-gate static int 63017c478bd9Sstevel@tonic-gate build_dblock( 63027c478bd9Sstevel@tonic-gate const char *name, 63037c478bd9Sstevel@tonic-gate const char *linkname, 63047c478bd9Sstevel@tonic-gate const char typeflag, 63057c478bd9Sstevel@tonic-gate const int filetype, 63067c478bd9Sstevel@tonic-gate const struct stat *sp, 63077c478bd9Sstevel@tonic-gate const dev_t device, 63087c478bd9Sstevel@tonic-gate const char *prefix) 63097c478bd9Sstevel@tonic-gate { 63107c478bd9Sstevel@tonic-gate int nblks; 63117c478bd9Sstevel@tonic-gate major_t dev; 63127c478bd9Sstevel@tonic-gate const char *filename; 63137c478bd9Sstevel@tonic-gate const char *lastslash; 63147c478bd9Sstevel@tonic-gate 63157c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) 63167c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = _XATTR_HDRTYPE; 63177c478bd9Sstevel@tonic-gate else 63187c478bd9Sstevel@tonic-gate dblock.dbuf.typeflag = typeflag; 63197c478bd9Sstevel@tonic-gate (void) memset(dblock.dbuf.name, '\0', NAMSIZ); 63207c478bd9Sstevel@tonic-gate (void) memset(dblock.dbuf.linkname, '\0', NAMSIZ); 63217c478bd9Sstevel@tonic-gate (void) memset(dblock.dbuf.prefix, '\0', PRESIZ); 63227c478bd9Sstevel@tonic-gate 63237c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 63247c478bd9Sstevel@tonic-gate filename = Xtarhdr.x_path; 63257c478bd9Sstevel@tonic-gate else 63267c478bd9Sstevel@tonic-gate filename = name; 63277c478bd9Sstevel@tonic-gate 63287c478bd9Sstevel@tonic-gate if ((dev = major(device)) > OCTAL7CHAR) { 63297c478bd9Sstevel@tonic-gate if (Eflag) { 63307c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMAJOR; 63317c478bd9Sstevel@tonic-gate Xtarhdr.x_devmajor = dev; 63327c478bd9Sstevel@tonic-gate } else { 63337c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 63347c478bd9Sstevel@tonic-gate "Device major too large for %s. Use -E flag."), 63357c478bd9Sstevel@tonic-gate filename); 63367c478bd9Sstevel@tonic-gate if (errflag) 63377c478bd9Sstevel@tonic-gate done(1); 63387c478bd9Sstevel@tonic-gate else 63397c478bd9Sstevel@tonic-gate Errflg = 1; 63407c478bd9Sstevel@tonic-gate } 63417c478bd9Sstevel@tonic-gate dev = 0; 63427c478bd9Sstevel@tonic-gate } 63437c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.devmajor, "%07lo", dev); 63447c478bd9Sstevel@tonic-gate if ((dev = minor(device)) > OCTAL7CHAR) { 63457c478bd9Sstevel@tonic-gate if (Eflag) { 63467c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMINOR; 63477c478bd9Sstevel@tonic-gate Xtarhdr.x_devminor = dev; 63487c478bd9Sstevel@tonic-gate } else { 63497c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 63507c478bd9Sstevel@tonic-gate "Device minor too large for %s. Use -E flag."), 63517c478bd9Sstevel@tonic-gate filename); 63527c478bd9Sstevel@tonic-gate if (errflag) 63537c478bd9Sstevel@tonic-gate done(1); 63547c478bd9Sstevel@tonic-gate else 63557c478bd9Sstevel@tonic-gate Errflg = 1; 63567c478bd9Sstevel@tonic-gate } 63577c478bd9Sstevel@tonic-gate dev = 0; 63587c478bd9Sstevel@tonic-gate } 63597c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.devminor, "%07lo", dev); 63607c478bd9Sstevel@tonic-gate 63617c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.name, name, NAMSIZ); 63627c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.linkname, linkname, NAMSIZ); 63637c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.magic, "%.5s", magic_type); 63647c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.version, "00"); 63657c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.uname, "%.31s", getname(sp->st_uid)); 63667c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.gname, "%.31s", getgroup(sp->st_gid)); 63677c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.prefix, prefix, PRESIZ); 63687c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.chksum, "%07o", checksum(&dblock)); 63697c478bd9Sstevel@tonic-gate 63707c478bd9Sstevel@tonic-gate if (Eflag) { 63717c478bd9Sstevel@tonic-gate (void) bcopy(dblock.dummy, xhdr_buf.dummy, TBLOCK); 63727c478bd9Sstevel@tonic-gate (void) memset(xhdr_buf.dbuf.name, '\0', NAMSIZ); 63737c478bd9Sstevel@tonic-gate lastslash = strrchr(name, '/'); 63747c478bd9Sstevel@tonic-gate if (lastslash == NULL) 63757c478bd9Sstevel@tonic-gate lastslash = name; 63767c478bd9Sstevel@tonic-gate else 63777c478bd9Sstevel@tonic-gate lastslash++; 63787c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_buf.dbuf.name, lastslash); 63797c478bd9Sstevel@tonic-gate (void) memset(xhdr_buf.dbuf.linkname, '\0', NAMSIZ); 63807c478bd9Sstevel@tonic-gate (void) memset(xhdr_buf.dbuf.prefix, '\0', PRESIZ); 63817c478bd9Sstevel@tonic-gate (void) strcpy(xhdr_buf.dbuf.prefix, xhdr_dirname); 63827c478bd9Sstevel@tonic-gate xhdr_count++; 63837c478bd9Sstevel@tonic-gate xrec_offset = 0; 63847c478bd9Sstevel@tonic-gate gen_date("mtime", sp->st_mtim); 63857c478bd9Sstevel@tonic-gate xhdr_buf.dbuf.typeflag = 'X'; 63867c478bd9Sstevel@tonic-gate if (gen_utf8_names(filename) != 0) 63877c478bd9Sstevel@tonic-gate return (1); 63887c478bd9Sstevel@tonic-gate 63897c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG 63907c478bd9Sstevel@tonic-gate Xtarhdr.x_uname = dblock.dbuf.uname; 63917c478bd9Sstevel@tonic-gate Xtarhdr.x_gname = dblock.dbuf.gname; 63927c478bd9Sstevel@tonic-gate xhdr_flgs |= (_X_UNAME | _X_GNAME); 63937c478bd9Sstevel@tonic-gate #endif 63947c478bd9Sstevel@tonic-gate if (xhdr_flgs) { 63957c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_DEVMAJOR) 63967c478bd9Sstevel@tonic-gate gen_num("SUN.devmajor", Xtarhdr.x_devmajor); 63977c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_DEVMINOR) 63987c478bd9Sstevel@tonic-gate gen_num("SUN.devminor", Xtarhdr.x_devminor); 63997c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_GID) 64007c478bd9Sstevel@tonic-gate gen_num("gid", Xtarhdr.x_gid); 64017c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_UID) 64027c478bd9Sstevel@tonic-gate gen_num("uid", Xtarhdr.x_uid); 64037c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_SIZE) 64047c478bd9Sstevel@tonic-gate gen_num("size", Xtarhdr.x_filesz); 64057c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_PATH) 64067c478bd9Sstevel@tonic-gate gen_string("path", Xtarhdr.x_path); 64077c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) 64087c478bd9Sstevel@tonic-gate gen_string("linkpath", Xtarhdr.x_linkpath); 64097c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_GNAME) 64107c478bd9Sstevel@tonic-gate gen_string("gname", Xtarhdr.x_gname); 64117c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_UNAME) 64127c478bd9Sstevel@tonic-gate gen_string("uname", Xtarhdr.x_uname); 64137c478bd9Sstevel@tonic-gate } 64147c478bd9Sstevel@tonic-gate (void) sprintf(xhdr_buf.dbuf.size, 64157c478bd9Sstevel@tonic-gate "%011" FMT_off_t_o, xrec_offset); 64167c478bd9Sstevel@tonic-gate (void) sprintf(xhdr_buf.dbuf.chksum, "%07o", 64177c478bd9Sstevel@tonic-gate checksum(&xhdr_buf)); 64187c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&xhdr_buf, 1); 64197c478bd9Sstevel@tonic-gate nblks = TBLOCKS(xrec_offset); 64207c478bd9Sstevel@tonic-gate (void) writetbuf(xrec_ptr, nblks); 64217c478bd9Sstevel@tonic-gate } 64227c478bd9Sstevel@tonic-gate return (0); 64237c478bd9Sstevel@tonic-gate } 64247c478bd9Sstevel@tonic-gate 64257c478bd9Sstevel@tonic-gate 64267c478bd9Sstevel@tonic-gate /* 64277c478bd9Sstevel@tonic-gate * makeDir - ensure that a directory with the pathname denoted by name 64287c478bd9Sstevel@tonic-gate * exists, and return 1 on success, and 0 on failure (e.g., 64297c478bd9Sstevel@tonic-gate * read-only file system, exists but not-a-directory). 64307c478bd9Sstevel@tonic-gate */ 64317c478bd9Sstevel@tonic-gate 64327c478bd9Sstevel@tonic-gate static int 64337c478bd9Sstevel@tonic-gate makeDir(char *name) 64347c478bd9Sstevel@tonic-gate { 64357c478bd9Sstevel@tonic-gate struct stat buf; 64367c478bd9Sstevel@tonic-gate 64377c478bd9Sstevel@tonic-gate if (access(name, 0) < 0) { /* name doesn't exist */ 64387c478bd9Sstevel@tonic-gate if (mkdir(name, 0777) < 0) { 64397c478bd9Sstevel@tonic-gate vperror(0, "%s", name); 64407c478bd9Sstevel@tonic-gate return (0); 64417c478bd9Sstevel@tonic-gate } 64427c478bd9Sstevel@tonic-gate } else { /* name exists */ 64437c478bd9Sstevel@tonic-gate if (stat(name, &buf) < 0) { 64447c478bd9Sstevel@tonic-gate vperror(0, "%s", name); 64457c478bd9Sstevel@tonic-gate return (0); 64467c478bd9Sstevel@tonic-gate } 64477c478bd9Sstevel@tonic-gate 64487c478bd9Sstevel@tonic-gate return ((buf.st_mode & S_IFMT) == S_IFDIR); 64497c478bd9Sstevel@tonic-gate } 64507c478bd9Sstevel@tonic-gate 64517c478bd9Sstevel@tonic-gate return (1); 64527c478bd9Sstevel@tonic-gate } 64537c478bd9Sstevel@tonic-gate 64547c478bd9Sstevel@tonic-gate 64557c478bd9Sstevel@tonic-gate /* 64567c478bd9Sstevel@tonic-gate * Save this directory and its mtime on the stack, popping and setting 64577c478bd9Sstevel@tonic-gate * the mtimes of any stacked dirs which aren't parents of this one. 64587c478bd9Sstevel@tonic-gate * A null name causes the entire stack to be unwound and set. 64597c478bd9Sstevel@tonic-gate * 64607c478bd9Sstevel@tonic-gate * Since all the elements of the directory "stack" share a common 64617c478bd9Sstevel@tonic-gate * prefix, we can make do with one string. We keep only the current 64627c478bd9Sstevel@tonic-gate * directory path, with an associated array of mtime's. A negative 64637c478bd9Sstevel@tonic-gate * mtime means no mtime. 64647c478bd9Sstevel@tonic-gate * 64657c478bd9Sstevel@tonic-gate * This stack algorithm is not guaranteed to work for tapes created 64667c478bd9Sstevel@tonic-gate * with the 'r' function letter, but the vast majority of tapes with 64677c478bd9Sstevel@tonic-gate * directories are not. This avoids saving every directory record on 64687c478bd9Sstevel@tonic-gate * the tape and setting all the times at the end. 64697c478bd9Sstevel@tonic-gate * 64707c478bd9Sstevel@tonic-gate * (This was borrowed from the 4.1.3 source, and adapted to the 5.x 64717c478bd9Sstevel@tonic-gate * environment) 64727c478bd9Sstevel@tonic-gate */ 64737c478bd9Sstevel@tonic-gate 64747c478bd9Sstevel@tonic-gate static void 64757c478bd9Sstevel@tonic-gate doDirTimes(char *name, timestruc_t modTime) 64767c478bd9Sstevel@tonic-gate { 64777c478bd9Sstevel@tonic-gate static char dirstack[PATH_MAX+2]; 64787c478bd9Sstevel@tonic-gate /* Add spaces for the last slash and last NULL */ 64797c478bd9Sstevel@tonic-gate static timestruc_t modtimes[PATH_MAX+1]; /* hash table */ 64807c478bd9Sstevel@tonic-gate char *p = dirstack; 64817c478bd9Sstevel@tonic-gate char *q = name; 64827c478bd9Sstevel@tonic-gate char *savp; 64837c478bd9Sstevel@tonic-gate 64847c478bd9Sstevel@tonic-gate if (q) { 64857c478bd9Sstevel@tonic-gate /* 64867c478bd9Sstevel@tonic-gate * Find common prefix 64877c478bd9Sstevel@tonic-gate */ 64887c478bd9Sstevel@tonic-gate 64897c478bd9Sstevel@tonic-gate while (*p == *q && *p) { 64907c478bd9Sstevel@tonic-gate p++; q++; 64917c478bd9Sstevel@tonic-gate } 64927c478bd9Sstevel@tonic-gate } 64937c478bd9Sstevel@tonic-gate 64947c478bd9Sstevel@tonic-gate savp = p; 64957c478bd9Sstevel@tonic-gate while (*p) { 64967c478bd9Sstevel@tonic-gate /* 64977c478bd9Sstevel@tonic-gate * Not a child: unwind the stack, setting the times. 64987c478bd9Sstevel@tonic-gate * The order we do this doesn't matter, so we go "forward." 64997c478bd9Sstevel@tonic-gate */ 65007c478bd9Sstevel@tonic-gate 65017c478bd9Sstevel@tonic-gate if (*p == '/') 65027c478bd9Sstevel@tonic-gate if (modtimes[p - dirstack].tv_sec >= 0) { 65037c478bd9Sstevel@tonic-gate *p = '\0'; /* zap the slash */ 65047c478bd9Sstevel@tonic-gate setPathTimes(AT_FDCWD, dirstack, 65057c478bd9Sstevel@tonic-gate modtimes[p - dirstack]); 65067c478bd9Sstevel@tonic-gate *p = '/'; 65077c478bd9Sstevel@tonic-gate } 65087c478bd9Sstevel@tonic-gate ++p; 65097c478bd9Sstevel@tonic-gate } 65107c478bd9Sstevel@tonic-gate 65117c478bd9Sstevel@tonic-gate p = savp; 65127c478bd9Sstevel@tonic-gate 65137c478bd9Sstevel@tonic-gate /* 65147c478bd9Sstevel@tonic-gate * Push this one on the "stack" 65157c478bd9Sstevel@tonic-gate */ 65167c478bd9Sstevel@tonic-gate 65177c478bd9Sstevel@tonic-gate if (q) { 65187c478bd9Sstevel@tonic-gate 65197c478bd9Sstevel@tonic-gate /* 65207c478bd9Sstevel@tonic-gate * Since the name parameter points the dir pathname 65217c478bd9Sstevel@tonic-gate * which is limited only to contain PATH_MAX chars 65227c478bd9Sstevel@tonic-gate * at maximum, we can ignore the overflow case of p. 65237c478bd9Sstevel@tonic-gate */ 65247c478bd9Sstevel@tonic-gate 65257c478bd9Sstevel@tonic-gate while ((*p = *q++)) { /* append the rest of the new dir */ 65267c478bd9Sstevel@tonic-gate modtimes[p - dirstack].tv_sec = -1; 65277c478bd9Sstevel@tonic-gate p++; 65287c478bd9Sstevel@tonic-gate } 65297c478bd9Sstevel@tonic-gate 65307c478bd9Sstevel@tonic-gate /* 65317c478bd9Sstevel@tonic-gate * If the tar file had used 'P' or 'E' function modifier, 65327c478bd9Sstevel@tonic-gate * append the last slash. 65337c478bd9Sstevel@tonic-gate */ 65347c478bd9Sstevel@tonic-gate if (*(p - 1) != '/') { 65357c478bd9Sstevel@tonic-gate *p++ = '/'; 65367c478bd9Sstevel@tonic-gate *p = '\0'; 65377c478bd9Sstevel@tonic-gate } 65387c478bd9Sstevel@tonic-gate /* overwrite the last one */ 65397c478bd9Sstevel@tonic-gate modtimes[p - dirstack - 1] = modTime; 65407c478bd9Sstevel@tonic-gate } 65417c478bd9Sstevel@tonic-gate } 65427c478bd9Sstevel@tonic-gate 65437c478bd9Sstevel@tonic-gate 65447c478bd9Sstevel@tonic-gate /* 65457c478bd9Sstevel@tonic-gate * setPathTimes - set the modification time for given path. Return 1 if 65467c478bd9Sstevel@tonic-gate * successful and 0 if not successful. 65477c478bd9Sstevel@tonic-gate */ 65487c478bd9Sstevel@tonic-gate 65497c478bd9Sstevel@tonic-gate static void 65507c478bd9Sstevel@tonic-gate setPathTimes(int dirfd, char *path, timestruc_t modTime) 65517c478bd9Sstevel@tonic-gate 65527c478bd9Sstevel@tonic-gate { 65537c478bd9Sstevel@tonic-gate struct timeval timebuf[2]; 65547c478bd9Sstevel@tonic-gate 65557c478bd9Sstevel@tonic-gate /* 65567c478bd9Sstevel@tonic-gate * futimesat takes an array of two timeval structs. 65577c478bd9Sstevel@tonic-gate * The first entry contains access time. 65587c478bd9Sstevel@tonic-gate * The second entry contains modification time. 65597c478bd9Sstevel@tonic-gate * Unlike a timestruc_t, which uses nanoseconds, timeval uses 65607c478bd9Sstevel@tonic-gate * microseconds. 65617c478bd9Sstevel@tonic-gate */ 65627c478bd9Sstevel@tonic-gate timebuf[0].tv_sec = time((time_t *)0); 65637c478bd9Sstevel@tonic-gate timebuf[0].tv_usec = 0; 65647c478bd9Sstevel@tonic-gate timebuf[1].tv_sec = modTime.tv_sec; 65657c478bd9Sstevel@tonic-gate 65667c478bd9Sstevel@tonic-gate /* Extended header: use microseconds */ 65677c478bd9Sstevel@tonic-gate timebuf[1].tv_usec = (xhdr_flgs & _X_MTIME) ? modTime.tv_nsec/1000 : 0; 65687c478bd9Sstevel@tonic-gate 65697c478bd9Sstevel@tonic-gate if (futimesat(dirfd, path, timebuf) < 0) 65708e4a71aeSRich Burridge vperror(0, gettext("can't set time on %s"), path); 65717c478bd9Sstevel@tonic-gate } 65727c478bd9Sstevel@tonic-gate 65737c478bd9Sstevel@tonic-gate 65747c478bd9Sstevel@tonic-gate /* 65757c478bd9Sstevel@tonic-gate * If hflag is set then delete the symbolic link's target. 65767c478bd9Sstevel@tonic-gate * If !hflag then delete the target. 65777c478bd9Sstevel@tonic-gate */ 65787c478bd9Sstevel@tonic-gate 65797c478bd9Sstevel@tonic-gate static void 65802c0f0499Slovely delete_target(int fd, char *comp, char *namep) 65817c478bd9Sstevel@tonic-gate { 65827c478bd9Sstevel@tonic-gate struct stat xtractbuf; 65837c478bd9Sstevel@tonic-gate char buf[PATH_MAX + 1]; 65847c478bd9Sstevel@tonic-gate int n; 65857c478bd9Sstevel@tonic-gate 65867c478bd9Sstevel@tonic-gate 65872c0f0499Slovely if (unlinkat(fd, comp, AT_REMOVEDIR) < 0) { 65887c478bd9Sstevel@tonic-gate if (errno == ENOTDIR && !hflag) { 65892c0f0499Slovely (void) unlinkat(fd, comp, 0); 65907c478bd9Sstevel@tonic-gate } else if (errno == ENOTDIR && hflag) { 65917c478bd9Sstevel@tonic-gate if (!lstat(namep, &xtractbuf)) { 65927c478bd9Sstevel@tonic-gate if ((xtractbuf.st_mode & S_IFMT) != S_IFLNK) { 65932c0f0499Slovely (void) unlinkat(fd, comp, 0); 65947c478bd9Sstevel@tonic-gate } else if ((n = readlink(namep, buf, 65957c478bd9Sstevel@tonic-gate PATH_MAX)) != -1) { 65967c478bd9Sstevel@tonic-gate buf[n] = (char)NULL; 65977c478bd9Sstevel@tonic-gate (void) unlinkat(fd, buf, 65987c478bd9Sstevel@tonic-gate AT_REMOVEDIR); 65997c478bd9Sstevel@tonic-gate if (errno == ENOTDIR) 66007c478bd9Sstevel@tonic-gate (void) unlinkat(fd, buf, 0); 66017c478bd9Sstevel@tonic-gate } else { 66022c0f0499Slovely (void) unlinkat(fd, comp, 0); 66037c478bd9Sstevel@tonic-gate } 66047c478bd9Sstevel@tonic-gate } else { 66052c0f0499Slovely (void) unlinkat(fd, comp, 0); 66067c478bd9Sstevel@tonic-gate } 66077c478bd9Sstevel@tonic-gate } 66087c478bd9Sstevel@tonic-gate } 66097c478bd9Sstevel@tonic-gate } 66107c478bd9Sstevel@tonic-gate 66117c478bd9Sstevel@tonic-gate 66127c478bd9Sstevel@tonic-gate /* 66137c478bd9Sstevel@tonic-gate * ACL changes: 66147c478bd9Sstevel@tonic-gate * putfile(): 66157c478bd9Sstevel@tonic-gate * Get acl info after stat. Write out ancillary file 66167c478bd9Sstevel@tonic-gate * before the normal file, i.e. directory, regular, FIFO, 66177c478bd9Sstevel@tonic-gate * link, special. If acl count is less than 4, no need to 66187c478bd9Sstevel@tonic-gate * create ancillary file. (i.e. standard permission is in 66197c478bd9Sstevel@tonic-gate * use. 66207c478bd9Sstevel@tonic-gate * doxtract(): 66217c478bd9Sstevel@tonic-gate * Process ancillary file. Read it in and set acl info. 66227c478bd9Sstevel@tonic-gate * watch out for 'o' function modifier. 66237c478bd9Sstevel@tonic-gate * 't' function letter to display table 66247c478bd9Sstevel@tonic-gate */ 66257c478bd9Sstevel@tonic-gate 66267c478bd9Sstevel@tonic-gate /* 66277c478bd9Sstevel@tonic-gate * New functions for ACLs and other security attributes 66287c478bd9Sstevel@tonic-gate */ 66297c478bd9Sstevel@tonic-gate 66307c478bd9Sstevel@tonic-gate /* 66317c478bd9Sstevel@tonic-gate * The function appends the new security attribute info to the end of 66327c478bd9Sstevel@tonic-gate * existing secinfo. 66337c478bd9Sstevel@tonic-gate */ 66347c478bd9Sstevel@tonic-gate int 66357c478bd9Sstevel@tonic-gate append_secattr( 66367c478bd9Sstevel@tonic-gate char **secinfo, /* existing security info */ 66377c478bd9Sstevel@tonic-gate int *secinfo_len, /* length of existing security info */ 663845916cd2Sjpk int size, /* new attribute size: unit depends on type */ 663945916cd2Sjpk char *attrtext, /* new attribute text */ 664045916cd2Sjpk char attr_type) /* new attribute type */ 66417c478bd9Sstevel@tonic-gate { 66427c478bd9Sstevel@tonic-gate char *new_secinfo; 66437c478bd9Sstevel@tonic-gate int newattrsize; 66447c478bd9Sstevel@tonic-gate int oldsize; 664545916cd2Sjpk struct sec_attr *attr; 66467c478bd9Sstevel@tonic-gate 66477c478bd9Sstevel@tonic-gate /* no need to add */ 664845916cd2Sjpk if (attr_type != DIR_TYPE) { 664945916cd2Sjpk if (attrtext == NULL) 66507c478bd9Sstevel@tonic-gate return (0); 665145916cd2Sjpk } 66527c478bd9Sstevel@tonic-gate 665345916cd2Sjpk switch (attr_type) { 665445916cd2Sjpk case UFSD_ACL: 665545916cd2Sjpk case ACE_ACL: 66567c478bd9Sstevel@tonic-gate if (attrtext == NULL) { 66578e4a71aeSRich Burridge (void) fprintf(stderr, gettext("acltotext failed\n")); 66587c478bd9Sstevel@tonic-gate return (-1); 66597c478bd9Sstevel@tonic-gate } 66607c478bd9Sstevel@tonic-gate /* header: type + size = 8 */ 66617c478bd9Sstevel@tonic-gate newattrsize = 8 + (int)strlen(attrtext) + 1; 66627c478bd9Sstevel@tonic-gate attr = (struct sec_attr *)malloc(newattrsize); 66637c478bd9Sstevel@tonic-gate if (attr == NULL) { 66648e4a71aeSRich Burridge (void) fprintf(stderr, 66658e4a71aeSRich Burridge gettext("can't allocate memory\n")); 66667c478bd9Sstevel@tonic-gate return (-1); 66677c478bd9Sstevel@tonic-gate } 666845916cd2Sjpk attr->attr_type = attr_type; 66697c478bd9Sstevel@tonic-gate (void) sprintf(attr->attr_len, 667045916cd2Sjpk "%06o", size); /* acl entry count */ 66717c478bd9Sstevel@tonic-gate (void) strcpy((char *)&attr->attr_info[0], attrtext); 66727c478bd9Sstevel@tonic-gate free(attrtext); 66737c478bd9Sstevel@tonic-gate break; 66747c478bd9Sstevel@tonic-gate 667545916cd2Sjpk /* Trusted Extensions */ 667645916cd2Sjpk case DIR_TYPE: 667745916cd2Sjpk case LBL_TYPE: 667845916cd2Sjpk newattrsize = sizeof (struct sec_attr) + strlen(attrtext); 667945916cd2Sjpk attr = (struct sec_attr *)malloc(newattrsize); 668045916cd2Sjpk if (attr == NULL) { 668145916cd2Sjpk (void) fprintf(stderr, 668245916cd2Sjpk gettext("can't allocate memory\n")); 668345916cd2Sjpk return (-1); 668445916cd2Sjpk } 668545916cd2Sjpk attr->attr_type = attr_type; 668645916cd2Sjpk (void) sprintf(attr->attr_len, 668745916cd2Sjpk "%06d", size); /* len of attr data */ 668845916cd2Sjpk (void) strcpy((char *)&attr->attr_info[0], attrtext); 668945916cd2Sjpk break; 66907c478bd9Sstevel@tonic-gate 66917c478bd9Sstevel@tonic-gate default: 66928e4a71aeSRich Burridge (void) fprintf(stderr, 66938e4a71aeSRich Burridge gettext("unrecognized attribute type\n")); 66947c478bd9Sstevel@tonic-gate return (-1); 66957c478bd9Sstevel@tonic-gate } 66967c478bd9Sstevel@tonic-gate 66977c478bd9Sstevel@tonic-gate /* old security info + new attr header(8) + new attr */ 66987c478bd9Sstevel@tonic-gate oldsize = *secinfo_len; 66997c478bd9Sstevel@tonic-gate *secinfo_len += newattrsize; 67007c478bd9Sstevel@tonic-gate new_secinfo = (char *)malloc(*secinfo_len); 67017c478bd9Sstevel@tonic-gate if (new_secinfo == NULL) { 67028e4a71aeSRich Burridge (void) fprintf(stderr, gettext("can't allocate memory\n")); 67037c478bd9Sstevel@tonic-gate *secinfo_len -= newattrsize; 670445916cd2Sjpk free(attr); 67057c478bd9Sstevel@tonic-gate return (-1); 67067c478bd9Sstevel@tonic-gate } 67077c478bd9Sstevel@tonic-gate 67087c478bd9Sstevel@tonic-gate (void) memcpy(new_secinfo, *secinfo, oldsize); 67097c478bd9Sstevel@tonic-gate (void) memcpy(new_secinfo + oldsize, attr, newattrsize); 67107c478bd9Sstevel@tonic-gate 67117c478bd9Sstevel@tonic-gate free(*secinfo); 671245916cd2Sjpk free(attr); 67137c478bd9Sstevel@tonic-gate *secinfo = new_secinfo; 67147c478bd9Sstevel@tonic-gate return (0); 67157c478bd9Sstevel@tonic-gate } 67167c478bd9Sstevel@tonic-gate 67177c478bd9Sstevel@tonic-gate /* 67187c478bd9Sstevel@tonic-gate * write_ancillary(): write out an ancillary file. 67197c478bd9Sstevel@tonic-gate * The file has the same header as normal file except the type and size 67207c478bd9Sstevel@tonic-gate * fields. The type is 'A' and size is the sum of all attributes 67217c478bd9Sstevel@tonic-gate * in bytes. 67227c478bd9Sstevel@tonic-gate * The body contains a list of attribute type, size and info. Currently, 67237c478bd9Sstevel@tonic-gate * there is only ACL info. This file is put before the normal file. 67247c478bd9Sstevel@tonic-gate */ 67257c478bd9Sstevel@tonic-gate void 67267c478bd9Sstevel@tonic-gate write_ancillary(union hblock *dblockp, char *secinfo, int len, char hdrtype) 67277c478bd9Sstevel@tonic-gate { 67287c478bd9Sstevel@tonic-gate long blocks; 67297c478bd9Sstevel@tonic-gate int savflag; 67307c478bd9Sstevel@tonic-gate int savsize; 67317c478bd9Sstevel@tonic-gate 67327c478bd9Sstevel@tonic-gate /* Just tranditional permissions or no security attribute info */ 67337c478bd9Sstevel@tonic-gate if (len == 0 || secinfo == NULL) 67347c478bd9Sstevel@tonic-gate return; 67357c478bd9Sstevel@tonic-gate 67367c478bd9Sstevel@tonic-gate /* save flag and size */ 67377c478bd9Sstevel@tonic-gate savflag = (dblockp->dbuf).typeflag; 67387c478bd9Sstevel@tonic-gate (void) sscanf(dblockp->dbuf.size, "%12o", (uint_t *)&savsize); 67397c478bd9Sstevel@tonic-gate 67407c478bd9Sstevel@tonic-gate /* special flag for ancillary file */ 67417c478bd9Sstevel@tonic-gate if (hdrtype == _XATTR_HDRTYPE) 67427c478bd9Sstevel@tonic-gate dblockp->dbuf.typeflag = _XATTR_HDRTYPE; 67437c478bd9Sstevel@tonic-gate else 67447c478bd9Sstevel@tonic-gate dblockp->dbuf.typeflag = 'A'; 67457c478bd9Sstevel@tonic-gate 67467c478bd9Sstevel@tonic-gate /* for pre-2.5 versions of tar, need to make sure */ 67477c478bd9Sstevel@tonic-gate /* the ACL file is readable */ 67487c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mode, "%07lo", 67497c478bd9Sstevel@tonic-gate (stbuf.st_mode & POSIXMODES) | 0000200); 67507c478bd9Sstevel@tonic-gate (void) sprintf(dblockp->dbuf.size, "%011o", len); 67517c478bd9Sstevel@tonic-gate (void) sprintf(dblockp->dbuf.chksum, "%07o", checksum(dblockp)); 67527c478bd9Sstevel@tonic-gate 67537c478bd9Sstevel@tonic-gate /* write out the header */ 67547c478bd9Sstevel@tonic-gate (void) writetbuf((char *)dblockp, 1); 67557c478bd9Sstevel@tonic-gate 67567c478bd9Sstevel@tonic-gate /* write out security info */ 67577c478bd9Sstevel@tonic-gate blocks = TBLOCKS(len); 67587c478bd9Sstevel@tonic-gate (void) writetbuf((char *)secinfo, (int)blocks); 67597c478bd9Sstevel@tonic-gate 67607c478bd9Sstevel@tonic-gate /* restore mode, flag and size */ 67617c478bd9Sstevel@tonic-gate (void) sprintf(dblock.dbuf.mode, "%07lo", stbuf.st_mode & POSIXMODES); 67627c478bd9Sstevel@tonic-gate dblockp->dbuf.typeflag = savflag; 67637c478bd9Sstevel@tonic-gate (void) sprintf(dblockp->dbuf.size, "%011o", savsize); 67647c478bd9Sstevel@tonic-gate } 67657c478bd9Sstevel@tonic-gate 67667c478bd9Sstevel@tonic-gate /* 67677c478bd9Sstevel@tonic-gate * Read the data record for extended headers and then the regular header. 67687c478bd9Sstevel@tonic-gate * The data are read into the buffer and then null-terminated. Entries 6769e765faefSRich Burridge * for typeflag 'X' extended headers are of the format: 67707c478bd9Sstevel@tonic-gate * "%d %s=%s\n" 67717c478bd9Sstevel@tonic-gate * 67727c478bd9Sstevel@tonic-gate * When an extended header record is found, the extended header must 67737c478bd9Sstevel@tonic-gate * be processed and its values used to override the values in the 67747c478bd9Sstevel@tonic-gate * normal header. The way this is done is to process the extended 67757c478bd9Sstevel@tonic-gate * header data record and set the data values, then call getdir 67767c478bd9Sstevel@tonic-gate * to process the regular header, then then to reconcile the two 67777c478bd9Sstevel@tonic-gate * sets of data. 67787c478bd9Sstevel@tonic-gate */ 67797c478bd9Sstevel@tonic-gate 67807c478bd9Sstevel@tonic-gate static int 67817c478bd9Sstevel@tonic-gate get_xdata(void) 67827c478bd9Sstevel@tonic-gate { 67837c478bd9Sstevel@tonic-gate struct keylist_pair { 67847c478bd9Sstevel@tonic-gate int keynum; 67857c478bd9Sstevel@tonic-gate char *keylist; 67867c478bd9Sstevel@tonic-gate } keylist_pair[] = { _X_DEVMAJOR, "SUN.devmajor", 67877c478bd9Sstevel@tonic-gate _X_DEVMINOR, "SUN.devminor", 67887c478bd9Sstevel@tonic-gate _X_GID, "gid", 67897c478bd9Sstevel@tonic-gate _X_GNAME, "gname", 67907c478bd9Sstevel@tonic-gate _X_LINKPATH, "linkpath", 67917c478bd9Sstevel@tonic-gate _X_PATH, "path", 67927c478bd9Sstevel@tonic-gate _X_SIZE, "size", 67937c478bd9Sstevel@tonic-gate _X_UID, "uid", 67947c478bd9Sstevel@tonic-gate _X_UNAME, "uname", 67957c478bd9Sstevel@tonic-gate _X_MTIME, "mtime", 67967c478bd9Sstevel@tonic-gate _X_LAST, "NULL" }; 67977c478bd9Sstevel@tonic-gate char *lineloc; 67987c478bd9Sstevel@tonic-gate int length, i; 67997c478bd9Sstevel@tonic-gate char *keyword, *value; 68007c478bd9Sstevel@tonic-gate blkcnt_t nblocks; 68017c478bd9Sstevel@tonic-gate int bufneeded; 68027c478bd9Sstevel@tonic-gate int errors; 68037c478bd9Sstevel@tonic-gate 6804123523f8Sas158974 (void) memset(&Xtarhdr, 0, sizeof (Xtarhdr)); 68057c478bd9Sstevel@tonic-gate xhdr_count++; 68067c478bd9Sstevel@tonic-gate errors = 0; 68077c478bd9Sstevel@tonic-gate 68087c478bd9Sstevel@tonic-gate nblocks = TBLOCKS(stbuf.st_size); 68097c478bd9Sstevel@tonic-gate bufneeded = nblocks * TBLOCK; 68107c478bd9Sstevel@tonic-gate if (bufneeded >= xrec_size) { 68117c478bd9Sstevel@tonic-gate free(xrec_ptr); 68127c478bd9Sstevel@tonic-gate xrec_size = bufneeded + 1; 68137c478bd9Sstevel@tonic-gate if ((xrec_ptr = malloc(xrec_size)) == NULL) 68147c478bd9Sstevel@tonic-gate fatal(gettext("cannot allocate buffer")); 68157c478bd9Sstevel@tonic-gate } 68167c478bd9Sstevel@tonic-gate 68177c478bd9Sstevel@tonic-gate lineloc = xrec_ptr; 68187c478bd9Sstevel@tonic-gate 68197c478bd9Sstevel@tonic-gate while (nblocks-- > 0) { 68207c478bd9Sstevel@tonic-gate readtape(lineloc); 68217c478bd9Sstevel@tonic-gate lineloc += TBLOCK; 68227c478bd9Sstevel@tonic-gate } 68237c478bd9Sstevel@tonic-gate lineloc = xrec_ptr; 68247c478bd9Sstevel@tonic-gate xrec_ptr[stbuf.st_size] = '\0'; 68257c478bd9Sstevel@tonic-gate while (lineloc < xrec_ptr + stbuf.st_size) { 6826e765faefSRich Burridge if (dblock.dbuf.typeflag == 'L') { 6827e765faefSRich Burridge length = xrec_size; 6828e765faefSRich Burridge keyword = "path"; 6829e765faefSRich Burridge value = lineloc; 6830e765faefSRich Burridge } else { 68317c478bd9Sstevel@tonic-gate length = atoi(lineloc); 68327c478bd9Sstevel@tonic-gate *(lineloc + length - 1) = '\0'; 68337c478bd9Sstevel@tonic-gate keyword = strchr(lineloc, ' ') + 1; 68347c478bd9Sstevel@tonic-gate value = strchr(keyword, '=') + 1; 68357c478bd9Sstevel@tonic-gate *(value - 1) = '\0'; 6836e765faefSRich Burridge } 68377c478bd9Sstevel@tonic-gate i = 0; 68387c478bd9Sstevel@tonic-gate lineloc += length; 68397c478bd9Sstevel@tonic-gate while (keylist_pair[i].keynum != (int)_X_LAST) { 68407c478bd9Sstevel@tonic-gate if (strcmp(keyword, keylist_pair[i].keylist) == 0) 68417c478bd9Sstevel@tonic-gate break; 68427c478bd9Sstevel@tonic-gate i++; 68437c478bd9Sstevel@tonic-gate } 68447c478bd9Sstevel@tonic-gate errno = 0; 68457c478bd9Sstevel@tonic-gate switch (keylist_pair[i].keynum) { 68467c478bd9Sstevel@tonic-gate case _X_DEVMAJOR: 68477c478bd9Sstevel@tonic-gate Xtarhdr.x_devmajor = (major_t)strtoul(value, NULL, 0); 68487c478bd9Sstevel@tonic-gate if (errno) { 68497c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 68507c478bd9Sstevel@tonic-gate "tar: Extended header major value error " 68517c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 68527c478bd9Sstevel@tonic-gate errors++; 68537c478bd9Sstevel@tonic-gate } else 68547c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMAJOR; 68557c478bd9Sstevel@tonic-gate break; 68567c478bd9Sstevel@tonic-gate case _X_DEVMINOR: 68577c478bd9Sstevel@tonic-gate Xtarhdr.x_devminor = (minor_t)strtoul(value, NULL, 0); 68587c478bd9Sstevel@tonic-gate if (errno) { 68597c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 68607c478bd9Sstevel@tonic-gate "tar: Extended header minor value error " 68617c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 68627c478bd9Sstevel@tonic-gate errors++; 68637c478bd9Sstevel@tonic-gate } else 68647c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_DEVMINOR; 68657c478bd9Sstevel@tonic-gate break; 68667c478bd9Sstevel@tonic-gate case _X_GID: 68677c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_GID; 68687c478bd9Sstevel@tonic-gate Xtarhdr.x_gid = strtol(value, NULL, 0); 68697c478bd9Sstevel@tonic-gate if ((errno) || (Xtarhdr.x_gid > UID_MAX)) { 68707c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 68717c478bd9Sstevel@tonic-gate "tar: Extended header gid value error " 68727c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 68737c478bd9Sstevel@tonic-gate Xtarhdr.x_gid = GID_NOBODY; 68747c478bd9Sstevel@tonic-gate } 68757c478bd9Sstevel@tonic-gate break; 68767c478bd9Sstevel@tonic-gate case _X_GNAME: 68777c478bd9Sstevel@tonic-gate if (utf8_local("gname", &Xtarhdr.x_gname, 68787c478bd9Sstevel@tonic-gate local_gname, value, _POSIX_NAME_MAX) == 0) 68797c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_GNAME; 68807c478bd9Sstevel@tonic-gate break; 68817c478bd9Sstevel@tonic-gate case _X_LINKPATH: 68827c478bd9Sstevel@tonic-gate if (utf8_local("linkpath", &Xtarhdr.x_linkpath, 68837c478bd9Sstevel@tonic-gate local_linkpath, value, PATH_MAX) == 0) 68847c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_LINKPATH; 68857c478bd9Sstevel@tonic-gate else 68867c478bd9Sstevel@tonic-gate errors++; 68877c478bd9Sstevel@tonic-gate break; 68887c478bd9Sstevel@tonic-gate case _X_PATH: 68897c478bd9Sstevel@tonic-gate if (utf8_local("path", &Xtarhdr.x_path, 68907c478bd9Sstevel@tonic-gate local_path, value, PATH_MAX) == 0) 68917c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_PATH; 68927c478bd9Sstevel@tonic-gate else 68937c478bd9Sstevel@tonic-gate errors++; 68947c478bd9Sstevel@tonic-gate break; 68957c478bd9Sstevel@tonic-gate case _X_SIZE: 68967c478bd9Sstevel@tonic-gate Xtarhdr.x_filesz = strtoull(value, NULL, 0); 68977c478bd9Sstevel@tonic-gate if (errno) { 68987c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 68997c478bd9Sstevel@tonic-gate "tar: Extended header invalid filesize " 69007c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 69017c478bd9Sstevel@tonic-gate errors++; 69027c478bd9Sstevel@tonic-gate } else 69037c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_SIZE; 69047c478bd9Sstevel@tonic-gate break; 69057c478bd9Sstevel@tonic-gate case _X_UID: 69067c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_UID; 69077c478bd9Sstevel@tonic-gate Xtarhdr.x_uid = strtol(value, NULL, 0); 69087c478bd9Sstevel@tonic-gate if ((errno) || (Xtarhdr.x_uid > UID_MAX)) { 69097c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 69107c478bd9Sstevel@tonic-gate "tar: Extended header uid value error " 69117c478bd9Sstevel@tonic-gate "for file # %llu.\n"), xhdr_count); 69127c478bd9Sstevel@tonic-gate Xtarhdr.x_uid = UID_NOBODY; 69137c478bd9Sstevel@tonic-gate } 69147c478bd9Sstevel@tonic-gate break; 69157c478bd9Sstevel@tonic-gate case _X_UNAME: 69167c478bd9Sstevel@tonic-gate if (utf8_local("uname", &Xtarhdr.x_uname, 69177c478bd9Sstevel@tonic-gate local_uname, value, _POSIX_NAME_MAX) == 0) 69187c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_UNAME; 69197c478bd9Sstevel@tonic-gate break; 69207c478bd9Sstevel@tonic-gate case _X_MTIME: 69217c478bd9Sstevel@tonic-gate get_xtime(value, &(Xtarhdr.x_mtime)); 69227c478bd9Sstevel@tonic-gate if (errno) 69237c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 69247c478bd9Sstevel@tonic-gate "tar: Extended header modification time " 69257c478bd9Sstevel@tonic-gate "value error for file # %llu.\n"), 69267c478bd9Sstevel@tonic-gate xhdr_count); 69277c478bd9Sstevel@tonic-gate else 69287c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_MTIME; 69297c478bd9Sstevel@tonic-gate break; 69307c478bd9Sstevel@tonic-gate default: 69317c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 69327c478bd9Sstevel@tonic-gate gettext("tar: unrecognized extended" 69337c478bd9Sstevel@tonic-gate " header keyword '%s'. Ignored.\n"), keyword); 69347c478bd9Sstevel@tonic-gate break; 69357c478bd9Sstevel@tonic-gate } 69367c478bd9Sstevel@tonic-gate } 69377c478bd9Sstevel@tonic-gate 69387c478bd9Sstevel@tonic-gate getdir(); /* get regular header */ 69397c478bd9Sstevel@tonic-gate if (errors && errflag) 69407c478bd9Sstevel@tonic-gate done(1); 69417c478bd9Sstevel@tonic-gate else 69427c478bd9Sstevel@tonic-gate if (errors) 69437c478bd9Sstevel@tonic-gate Errflg = 1; 69447c478bd9Sstevel@tonic-gate return (errors); 69457c478bd9Sstevel@tonic-gate } 69467c478bd9Sstevel@tonic-gate 69477c478bd9Sstevel@tonic-gate /* 6948123523f8Sas158974 * load_info_from_xtarhdr - sets Gen and stbuf variables from 6949123523f8Sas158974 * extended header 6950123523f8Sas158974 * load_info_from_xtarhdr(flag, xhdrp); 6951123523f8Sas158974 * u_longlong_t flag; xhdr_flgs 6952123523f8Sas158974 * struct xtar_hdr *xhdrp; pointer to extended header 6953123523f8Sas158974 * NOTE: called when typeflag is not 'A' and xhdr_flgs 6954123523f8Sas158974 * is set. 6955123523f8Sas158974 */ 6956123523f8Sas158974 static void 6957123523f8Sas158974 load_info_from_xtarhdr(u_longlong_t flag, struct xtar_hdr *xhdrp) 6958123523f8Sas158974 { 6959123523f8Sas158974 if (flag & _X_DEVMAJOR) { 6960123523f8Sas158974 Gen.g_devmajor = xhdrp->x_devmajor; 6961123523f8Sas158974 } 6962123523f8Sas158974 if (flag & _X_DEVMINOR) { 6963123523f8Sas158974 Gen.g_devminor = xhdrp->x_devminor; 6964123523f8Sas158974 } 6965123523f8Sas158974 if (flag & _X_GID) { 6966123523f8Sas158974 Gen.g_gid = xhdrp->x_gid; 6967123523f8Sas158974 stbuf.st_gid = xhdrp->x_gid; 6968123523f8Sas158974 } 6969123523f8Sas158974 if (flag & _X_UID) { 6970123523f8Sas158974 Gen.g_uid = xhdrp->x_uid; 6971123523f8Sas158974 stbuf.st_uid = xhdrp->x_uid; 6972123523f8Sas158974 } 6973123523f8Sas158974 if (flag & _X_SIZE) { 6974123523f8Sas158974 Gen.g_filesz = xhdrp->x_filesz; 6975123523f8Sas158974 stbuf.st_size = xhdrp->x_filesz; 6976123523f8Sas158974 } 6977123523f8Sas158974 if (flag & _X_MTIME) { 6978123523f8Sas158974 Gen.g_mtime = xhdrp->x_mtime.tv_sec; 6979123523f8Sas158974 stbuf.st_mtim.tv_sec = xhdrp->x_mtime.tv_sec; 6980123523f8Sas158974 stbuf.st_mtim.tv_nsec = xhdrp->x_mtime.tv_nsec; 6981123523f8Sas158974 } 6982123523f8Sas158974 } 6983123523f8Sas158974 6984123523f8Sas158974 /* 69857c478bd9Sstevel@tonic-gate * gen_num creates a string from a keyword and an usigned long long in the 69867c478bd9Sstevel@tonic-gate * format: %d %s=%s\n 69877c478bd9Sstevel@tonic-gate * This is part of the extended header data record. 69887c478bd9Sstevel@tonic-gate */ 69897c478bd9Sstevel@tonic-gate 69907c478bd9Sstevel@tonic-gate void 69917c478bd9Sstevel@tonic-gate gen_num(const char *keyword, const u_longlong_t number) 69927c478bd9Sstevel@tonic-gate { 69937c478bd9Sstevel@tonic-gate char save_val[ULONGLONG_MAX_DIGITS + 1]; 69947c478bd9Sstevel@tonic-gate int len; 69957c478bd9Sstevel@tonic-gate char *curr_ptr; 69967c478bd9Sstevel@tonic-gate 69977c478bd9Sstevel@tonic-gate (void) sprintf(save_val, "%llu", number); 69987c478bd9Sstevel@tonic-gate /* 69997c478bd9Sstevel@tonic-gate * len = length of entire line, including itself. len will be 70007c478bd9Sstevel@tonic-gate * two digits. So, add the string lengths plus the length of len, 70017c478bd9Sstevel@tonic-gate * plus a blank, an equal sign, and a newline. 70027c478bd9Sstevel@tonic-gate */ 70037c478bd9Sstevel@tonic-gate len = strlen(save_val) + strlen(keyword) + 5; 70047c478bd9Sstevel@tonic-gate if (xrec_offset + len > xrec_size) { 70057c478bd9Sstevel@tonic-gate if (((curr_ptr = realloc(xrec_ptr, 2 * xrec_size)) == NULL)) 70067c478bd9Sstevel@tonic-gate fatal(gettext( 70077c478bd9Sstevel@tonic-gate "cannot allocate extended header buffer")); 70087c478bd9Sstevel@tonic-gate xrec_ptr = curr_ptr; 70097c478bd9Sstevel@tonic-gate xrec_size *= 2; 70107c478bd9Sstevel@tonic-gate } 70117c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset], 70127c478bd9Sstevel@tonic-gate "%d %s=%s\n", len, keyword, save_val); 70137c478bd9Sstevel@tonic-gate xrec_offset += len; 70147c478bd9Sstevel@tonic-gate } 70157c478bd9Sstevel@tonic-gate 70167c478bd9Sstevel@tonic-gate /* 70177c478bd9Sstevel@tonic-gate * gen_date creates a string from a keyword and a timestruc_t in the 70187c478bd9Sstevel@tonic-gate * format: %d %s=%s\n 70197c478bd9Sstevel@tonic-gate * This is part of the extended header data record. 70207c478bd9Sstevel@tonic-gate * Currently, granularity is only microseconds, so the low-order three digits 70217c478bd9Sstevel@tonic-gate * will be truncated. 70227c478bd9Sstevel@tonic-gate */ 70237c478bd9Sstevel@tonic-gate 70247c478bd9Sstevel@tonic-gate void 70257c478bd9Sstevel@tonic-gate gen_date(const char *keyword, const timestruc_t time_value) 70267c478bd9Sstevel@tonic-gate { 70277c478bd9Sstevel@tonic-gate /* Allow for <seconds>.<nanoseconds>\n */ 70287c478bd9Sstevel@tonic-gate char save_val[TIME_MAX_DIGITS + LONG_MAX_DIGITS + 2]; 70297c478bd9Sstevel@tonic-gate int len; 70307c478bd9Sstevel@tonic-gate char *curr_ptr; 70317c478bd9Sstevel@tonic-gate 70327c478bd9Sstevel@tonic-gate (void) sprintf(save_val, "%ld", time_value.tv_sec); 70337c478bd9Sstevel@tonic-gate len = strlen(save_val); 70347c478bd9Sstevel@tonic-gate save_val[len] = '.'; 70357c478bd9Sstevel@tonic-gate (void) sprintf(&save_val[len + 1], "%9.9ld", time_value.tv_nsec); 70367c478bd9Sstevel@tonic-gate 70377c478bd9Sstevel@tonic-gate /* 70387c478bd9Sstevel@tonic-gate * len = length of entire line, including itself. len will be 70397c478bd9Sstevel@tonic-gate * two digits. So, add the string lengths plus the length of len, 70407c478bd9Sstevel@tonic-gate * plus a blank, an equal sign, and a newline. 70417c478bd9Sstevel@tonic-gate */ 70427c478bd9Sstevel@tonic-gate len = strlen(save_val) + strlen(keyword) + 5; 70437c478bd9Sstevel@tonic-gate if (xrec_offset + len > xrec_size) { 70447c478bd9Sstevel@tonic-gate if (((curr_ptr = realloc(xrec_ptr, 2 * xrec_size)) == NULL)) 70457c478bd9Sstevel@tonic-gate fatal(gettext( 70467c478bd9Sstevel@tonic-gate "cannot allocate extended header buffer")); 70477c478bd9Sstevel@tonic-gate xrec_ptr = curr_ptr; 70487c478bd9Sstevel@tonic-gate xrec_size *= 2; 70497c478bd9Sstevel@tonic-gate } 70507c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset], 70517c478bd9Sstevel@tonic-gate "%d %s=%s\n", len, keyword, save_val); 70527c478bd9Sstevel@tonic-gate xrec_offset += len; 70537c478bd9Sstevel@tonic-gate } 70547c478bd9Sstevel@tonic-gate 70557c478bd9Sstevel@tonic-gate /* 70567c478bd9Sstevel@tonic-gate * gen_string creates a string from a keyword and a char * in the 70577c478bd9Sstevel@tonic-gate * format: %d %s=%s\n 70587c478bd9Sstevel@tonic-gate * This is part of the extended header data record. 70597c478bd9Sstevel@tonic-gate */ 70607c478bd9Sstevel@tonic-gate 70617c478bd9Sstevel@tonic-gate void 70627c478bd9Sstevel@tonic-gate gen_string(const char *keyword, const char *value) 70637c478bd9Sstevel@tonic-gate { 70647c478bd9Sstevel@tonic-gate int len; 70657c478bd9Sstevel@tonic-gate char *curr_ptr; 70667c478bd9Sstevel@tonic-gate 70677c478bd9Sstevel@tonic-gate /* 70687c478bd9Sstevel@tonic-gate * len = length of entire line, including itself. The character length 70697c478bd9Sstevel@tonic-gate * of len must be 1-4 characters, because the maximum size of the path 70707c478bd9Sstevel@tonic-gate * or the name is PATH_MAX, which is 1024. So, assume 1 character 70717c478bd9Sstevel@tonic-gate * for len, one for the space, one for the "=", and one for the newline. 70727c478bd9Sstevel@tonic-gate * Then adjust as needed. 70737c478bd9Sstevel@tonic-gate */ 70747c478bd9Sstevel@tonic-gate /* LINTED constant expression */ 70757c478bd9Sstevel@tonic-gate assert(PATH_MAX <= 9996); 70767c478bd9Sstevel@tonic-gate len = strlen(value) + strlen(keyword) + 4; 70777c478bd9Sstevel@tonic-gate if (len > 997) 70787c478bd9Sstevel@tonic-gate len += 3; 70797c478bd9Sstevel@tonic-gate else if (len > 98) 70807c478bd9Sstevel@tonic-gate len += 2; 70817c478bd9Sstevel@tonic-gate else if (len > 9) 70827c478bd9Sstevel@tonic-gate len += 1; 70837c478bd9Sstevel@tonic-gate if (xrec_offset + len > xrec_size) { 70847c478bd9Sstevel@tonic-gate if (((curr_ptr = realloc(xrec_ptr, 2 * xrec_size)) == NULL)) 70857c478bd9Sstevel@tonic-gate fatal(gettext( 70867c478bd9Sstevel@tonic-gate "cannot allocate extended header buffer")); 70877c478bd9Sstevel@tonic-gate xrec_ptr = curr_ptr; 70887c478bd9Sstevel@tonic-gate xrec_size *= 2; 70897c478bd9Sstevel@tonic-gate } 70907c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG 70917c478bd9Sstevel@tonic-gate if (strcmp(keyword+1, "name") != 0) 70927c478bd9Sstevel@tonic-gate #endif 70937c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset], 70947c478bd9Sstevel@tonic-gate "%d %s=%s\n", len, keyword, value); 70957c478bd9Sstevel@tonic-gate #ifdef XHDR_DEBUG 70967c478bd9Sstevel@tonic-gate else { 70977c478bd9Sstevel@tonic-gate len += 11; 70987c478bd9Sstevel@tonic-gate (void) sprintf(&xrec_ptr[xrec_offset], 70997c478bd9Sstevel@tonic-gate "%d %s=%snametoolong\n", len, keyword, value); 71007c478bd9Sstevel@tonic-gate } 71017c478bd9Sstevel@tonic-gate #endif 71027c478bd9Sstevel@tonic-gate xrec_offset += len; 71037c478bd9Sstevel@tonic-gate } 71047c478bd9Sstevel@tonic-gate 71057c478bd9Sstevel@tonic-gate /* 71067c478bd9Sstevel@tonic-gate * Convert time found in the extended header data to seconds and nanoseconds. 71077c478bd9Sstevel@tonic-gate */ 71087c478bd9Sstevel@tonic-gate 71097c478bd9Sstevel@tonic-gate void 71107c478bd9Sstevel@tonic-gate get_xtime(char *value, timestruc_t *xtime) 71117c478bd9Sstevel@tonic-gate { 71127c478bd9Sstevel@tonic-gate char nanosec[10]; 71137c478bd9Sstevel@tonic-gate char *period; 71147c478bd9Sstevel@tonic-gate int i; 71157c478bd9Sstevel@tonic-gate 71167c478bd9Sstevel@tonic-gate (void) memset(nanosec, '0', 9); 71177c478bd9Sstevel@tonic-gate nanosec[9] = '\0'; 71187c478bd9Sstevel@tonic-gate 71197c478bd9Sstevel@tonic-gate period = strchr(value, '.'); 71207c478bd9Sstevel@tonic-gate if (period != NULL) 71217c478bd9Sstevel@tonic-gate period[0] = '\0'; 71227c478bd9Sstevel@tonic-gate xtime->tv_sec = strtol(value, NULL, 10); 71237c478bd9Sstevel@tonic-gate if (period == NULL) 71247c478bd9Sstevel@tonic-gate xtime->tv_nsec = 0; 71257c478bd9Sstevel@tonic-gate else { 71267c478bd9Sstevel@tonic-gate i = strlen(period +1); 71277c478bd9Sstevel@tonic-gate (void) strncpy(nanosec, period + 1, min(i, 9)); 71287c478bd9Sstevel@tonic-gate xtime->tv_nsec = strtol(nanosec, NULL, 10); 71297c478bd9Sstevel@tonic-gate } 71307c478bd9Sstevel@tonic-gate } 71317c478bd9Sstevel@tonic-gate 71327c478bd9Sstevel@tonic-gate /* 71337c478bd9Sstevel@tonic-gate * Check linkpath for length. 71347c478bd9Sstevel@tonic-gate * Emit an error message and return 1 if too long. 71357c478bd9Sstevel@tonic-gate */ 71367c478bd9Sstevel@tonic-gate 71377c478bd9Sstevel@tonic-gate int 71387c478bd9Sstevel@tonic-gate chk_path_build( 71397c478bd9Sstevel@tonic-gate char *name, 71407c478bd9Sstevel@tonic-gate char *longname, 71417c478bd9Sstevel@tonic-gate char *linkname, 71427c478bd9Sstevel@tonic-gate char *prefix, 71437c478bd9Sstevel@tonic-gate char type, 71447c478bd9Sstevel@tonic-gate int filetype) 71457c478bd9Sstevel@tonic-gate { 71467c478bd9Sstevel@tonic-gate 71477c478bd9Sstevel@tonic-gate if (strlen(linkname) > (size_t)NAMSIZ) { 71487c478bd9Sstevel@tonic-gate if (Eflag > 0) { 71497c478bd9Sstevel@tonic-gate xhdr_flgs |= _X_LINKPATH; 71507c478bd9Sstevel@tonic-gate Xtarhdr.x_linkpath = linkname; 71517c478bd9Sstevel@tonic-gate } else { 71527c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 71537c478bd9Sstevel@tonic-gate "tar: %s: linked to %s\n"), longname, linkname); 71547c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 71557c478bd9Sstevel@tonic-gate "tar: %s: linked name too long\n"), linkname); 71567c478bd9Sstevel@tonic-gate if (errflag) 71577c478bd9Sstevel@tonic-gate done(1); 71587c478bd9Sstevel@tonic-gate else 71597c478bd9Sstevel@tonic-gate Errflg = 1; 71607c478bd9Sstevel@tonic-gate return (1); 71617c478bd9Sstevel@tonic-gate } 71627c478bd9Sstevel@tonic-gate } 71637c478bd9Sstevel@tonic-gate if (xhdr_flgs & _X_LINKPATH) 71647c478bd9Sstevel@tonic-gate return (build_dblock(name, tchar, type, 71657c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_dev, 71667c478bd9Sstevel@tonic-gate prefix)); 71677c478bd9Sstevel@tonic-gate else 71687c478bd9Sstevel@tonic-gate return (build_dblock(name, linkname, type, 71697c478bd9Sstevel@tonic-gate filetype, &stbuf, stbuf.st_dev, prefix)); 71707c478bd9Sstevel@tonic-gate } 71717c478bd9Sstevel@tonic-gate 71727c478bd9Sstevel@tonic-gate /* 71737c478bd9Sstevel@tonic-gate * Convert from UTF-8 to local character set. 71747c478bd9Sstevel@tonic-gate */ 71757c478bd9Sstevel@tonic-gate 71767c478bd9Sstevel@tonic-gate static int 71777c478bd9Sstevel@tonic-gate utf8_local( 71787c478bd9Sstevel@tonic-gate char *option, 71797c478bd9Sstevel@tonic-gate char **Xhdr_ptrptr, 71807c478bd9Sstevel@tonic-gate char *target, 71817c478bd9Sstevel@tonic-gate const char *source, 71827c478bd9Sstevel@tonic-gate int max_val) 71837c478bd9Sstevel@tonic-gate { 71847c478bd9Sstevel@tonic-gate static iconv_t iconv_cd; 71857c478bd9Sstevel@tonic-gate char *nl_target; 71867c478bd9Sstevel@tonic-gate const char *iconv_src; 71877c478bd9Sstevel@tonic-gate char *iconv_trg; 7188eace40a5Sceastha size_t inlen; 7189eace40a5Sceastha size_t outlen; 71907c478bd9Sstevel@tonic-gate 71917c478bd9Sstevel@tonic-gate if (charset_type == -1) { /* iconv_open failed in earlier try */ 71927c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 71937c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion failed.\n"), 71947c478bd9Sstevel@tonic-gate xhdr_count, source); 71957c478bd9Sstevel@tonic-gate return (1); 71967c478bd9Sstevel@tonic-gate } else if (charset_type == 0) { /* iconv_open has not yet been done */ 71977c478bd9Sstevel@tonic-gate nl_target = nl_langinfo(CODESET); 71987c478bd9Sstevel@tonic-gate if (strlen(nl_target) == 0) /* locale using 7-bit codeset */ 71997c478bd9Sstevel@tonic-gate nl_target = "646"; 72007c478bd9Sstevel@tonic-gate if (strcmp(nl_target, "646") == 0) 72017c478bd9Sstevel@tonic-gate charset_type = 1; 72027c478bd9Sstevel@tonic-gate else if (strcmp(nl_target, "UTF-8") == 0) 72037c478bd9Sstevel@tonic-gate charset_type = 3; 72047c478bd9Sstevel@tonic-gate else { 72057c478bd9Sstevel@tonic-gate if (strncmp(nl_target, "ISO", 3) == 0) 72067c478bd9Sstevel@tonic-gate nl_target += 3; 72077c478bd9Sstevel@tonic-gate charset_type = 2; 72087c478bd9Sstevel@tonic-gate errno = 0; 72097c478bd9Sstevel@tonic-gate if ((iconv_cd = iconv_open(nl_target, "UTF-8")) == 72107c478bd9Sstevel@tonic-gate (iconv_t)-1) { 72117c478bd9Sstevel@tonic-gate if (errno == EINVAL) 72127c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72137c478bd9Sstevel@tonic-gate "tar: conversion routines not " 72147c478bd9Sstevel@tonic-gate "available for current locale. ")); 72157c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72167c478bd9Sstevel@tonic-gate "file # %llu: (%s) UTF-8 conversion" 72177c478bd9Sstevel@tonic-gate " failed.\n"), xhdr_count, source); 72187c478bd9Sstevel@tonic-gate charset_type = -1; 72197c478bd9Sstevel@tonic-gate return (1); 72207c478bd9Sstevel@tonic-gate } 72217c478bd9Sstevel@tonic-gate } 72227c478bd9Sstevel@tonic-gate } 72237c478bd9Sstevel@tonic-gate 72247c478bd9Sstevel@tonic-gate /* locale using 7-bit codeset or UTF-8 locale */ 72257c478bd9Sstevel@tonic-gate if (charset_type == 1 || charset_type == 3) { 72267c478bd9Sstevel@tonic-gate if (strlen(source) > max_val) { 72277c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72287c478bd9Sstevel@tonic-gate "tar: file # %llu: Extended header %s too long.\n"), 72297c478bd9Sstevel@tonic-gate xhdr_count, option); 72307c478bd9Sstevel@tonic-gate return (1); 72317c478bd9Sstevel@tonic-gate } 72327c478bd9Sstevel@tonic-gate if (charset_type == 3) 72337c478bd9Sstevel@tonic-gate (void) strcpy(target, source); 72347c478bd9Sstevel@tonic-gate else if (c_utf8(target, source) != 0) { 72357c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72367c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion" 72377c478bd9Sstevel@tonic-gate " failed.\n"), xhdr_count, source); 72387c478bd9Sstevel@tonic-gate return (1); 72397c478bd9Sstevel@tonic-gate } 72407c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target; 72417c478bd9Sstevel@tonic-gate return (0); 72427c478bd9Sstevel@tonic-gate } 72437c478bd9Sstevel@tonic-gate 72447c478bd9Sstevel@tonic-gate iconv_src = source; 72457c478bd9Sstevel@tonic-gate iconv_trg = target; 72467c478bd9Sstevel@tonic-gate inlen = strlen(source); 72477c478bd9Sstevel@tonic-gate outlen = max_val * UTF_8_FACTOR; 72487c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) == 72497c478bd9Sstevel@tonic-gate (size_t)-1) { /* Error occurred: didn't convert */ 72507c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72517c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion failed.\n"), 72527c478bd9Sstevel@tonic-gate xhdr_count, source); 72537c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */ 72547c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL; 72557c478bd9Sstevel@tonic-gate inlen = 0; 72567c478bd9Sstevel@tonic-gate (void) iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen); 72577c478bd9Sstevel@tonic-gate return (1); 72587c478bd9Sstevel@tonic-gate } 72597c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */ 72607c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL; 72617c478bd9Sstevel@tonic-gate inlen = 0; 72627c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) == 72637c478bd9Sstevel@tonic-gate (size_t)-1) { /* Error occurred: didn't convert */ 72647c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72657c478bd9Sstevel@tonic-gate "tar: file # %llu: (%s) UTF-8 conversion failed.\n"), 72667c478bd9Sstevel@tonic-gate xhdr_count, source); 72677c478bd9Sstevel@tonic-gate return (1); 72687c478bd9Sstevel@tonic-gate } 72697c478bd9Sstevel@tonic-gate 72707c478bd9Sstevel@tonic-gate *iconv_trg = '\0'; /* Null-terminate iconv output string */ 72717c478bd9Sstevel@tonic-gate if (strlen(target) > max_val) { 72727c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72737c478bd9Sstevel@tonic-gate "tar: file # %llu: Extended header %s too long.\n"), 72747c478bd9Sstevel@tonic-gate xhdr_count, option); 72757c478bd9Sstevel@tonic-gate return (1); 72767c478bd9Sstevel@tonic-gate } 72777c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target; 72787c478bd9Sstevel@tonic-gate return (0); 72797c478bd9Sstevel@tonic-gate } 72807c478bd9Sstevel@tonic-gate 72817c478bd9Sstevel@tonic-gate /* 72827c478bd9Sstevel@tonic-gate * Check gname, uname, path, and linkpath to see if they need to go in an 72837c478bd9Sstevel@tonic-gate * extended header. If they are already slated to be in an extended header, 72847c478bd9Sstevel@tonic-gate * or if they are not ascii, then they need to be in the extended header. 72857c478bd9Sstevel@tonic-gate * Then, convert all extended names to UTF-8. 72867c478bd9Sstevel@tonic-gate */ 72877c478bd9Sstevel@tonic-gate 72887c478bd9Sstevel@tonic-gate int 72897c478bd9Sstevel@tonic-gate gen_utf8_names(const char *filename) 72907c478bd9Sstevel@tonic-gate { 72917c478bd9Sstevel@tonic-gate static iconv_t iconv_cd; 72927c478bd9Sstevel@tonic-gate char *nl_target; 72937c478bd9Sstevel@tonic-gate char tempbuf[MAXNAM + 1]; 7294eace40a5Sceastha int nbytes; 7295eace40a5Sceastha int errors; 72967c478bd9Sstevel@tonic-gate 72977c478bd9Sstevel@tonic-gate if (charset_type == -1) { /* Previous failure to open. */ 72987c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 72997c478bd9Sstevel@tonic-gate "tar: file # %llu: UTF-8 conversion failed.\n"), 73007c478bd9Sstevel@tonic-gate xhdr_count); 73017c478bd9Sstevel@tonic-gate return (1); 73027c478bd9Sstevel@tonic-gate } 73037c478bd9Sstevel@tonic-gate 73047c478bd9Sstevel@tonic-gate if (charset_type == 0) { /* Need to get conversion descriptor */ 73057c478bd9Sstevel@tonic-gate nl_target = nl_langinfo(CODESET); 73067c478bd9Sstevel@tonic-gate if (strlen(nl_target) == 0) /* locale using 7-bit codeset */ 73077c478bd9Sstevel@tonic-gate nl_target = "646"; 73087c478bd9Sstevel@tonic-gate if (strcmp(nl_target, "646") == 0) 73097c478bd9Sstevel@tonic-gate charset_type = 1; 73107c478bd9Sstevel@tonic-gate else if (strcmp(nl_target, "UTF-8") == 0) 73117c478bd9Sstevel@tonic-gate charset_type = 3; 73127c478bd9Sstevel@tonic-gate else { 73137c478bd9Sstevel@tonic-gate if (strncmp(nl_target, "ISO", 3) == 0) 73147c478bd9Sstevel@tonic-gate nl_target += 3; 73157c478bd9Sstevel@tonic-gate charset_type = 2; 73167c478bd9Sstevel@tonic-gate errno = 0; 73177c478bd9Sstevel@tonic-gate #ifdef ICONV_DEBUG 73187c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 73198e4a71aeSRich Burridge gettext("Opening iconv_cd with target %s\n"), 73207c478bd9Sstevel@tonic-gate nl_target); 73217c478bd9Sstevel@tonic-gate #endif 73227c478bd9Sstevel@tonic-gate if ((iconv_cd = iconv_open("UTF-8", nl_target)) == 73237c478bd9Sstevel@tonic-gate (iconv_t)-1) { 73247c478bd9Sstevel@tonic-gate if (errno == EINVAL) 73257c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 73267c478bd9Sstevel@tonic-gate "tar: conversion routines not " 73277c478bd9Sstevel@tonic-gate "available for current locale. ")); 73287c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 73297c478bd9Sstevel@tonic-gate "file (%s): UTF-8 conversion failed.\n"), 73307c478bd9Sstevel@tonic-gate filename); 73317c478bd9Sstevel@tonic-gate charset_type = -1; 73327c478bd9Sstevel@tonic-gate return (1); 73337c478bd9Sstevel@tonic-gate } 73347c478bd9Sstevel@tonic-gate } 73357c478bd9Sstevel@tonic-gate } 73367c478bd9Sstevel@tonic-gate 73377c478bd9Sstevel@tonic-gate errors = 0; 73387c478bd9Sstevel@tonic-gate 73397c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_gname, local_gname, 73407c478bd9Sstevel@tonic-gate dblock.dbuf.gname, iconv_cd, _X_GNAME, _POSIX_NAME_MAX); 73417c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_uname, local_uname, 73427c478bd9Sstevel@tonic-gate dblock.dbuf.uname, iconv_cd, _X_UNAME, _POSIX_NAME_MAX); 73437c478bd9Sstevel@tonic-gate if ((xhdr_flgs & _X_LINKPATH) == 0) { /* Need null-terminated str. */ 73447c478bd9Sstevel@tonic-gate (void) strncpy(tempbuf, dblock.dbuf.linkname, NAMSIZ); 73457c478bd9Sstevel@tonic-gate tempbuf[NAMSIZ] = '\0'; 73467c478bd9Sstevel@tonic-gate } 73477c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_linkpath, local_linkpath, 73487c478bd9Sstevel@tonic-gate tempbuf, iconv_cd, _X_LINKPATH, PATH_MAX); 73497c478bd9Sstevel@tonic-gate if ((xhdr_flgs & _X_PATH) == 0) { /* Concatenate prefix & name */ 73507c478bd9Sstevel@tonic-gate (void) strncpy(tempbuf, dblock.dbuf.prefix, PRESIZ); 73510578ac30Ssr161167 tempbuf[PRESIZ] = '\0'; 73527c478bd9Sstevel@tonic-gate nbytes = strlen(tempbuf); 73537c478bd9Sstevel@tonic-gate if (nbytes > 0) { 73547c478bd9Sstevel@tonic-gate tempbuf[nbytes++] = '/'; 73557c478bd9Sstevel@tonic-gate tempbuf[nbytes] = '\0'; 73567c478bd9Sstevel@tonic-gate } 73570578ac30Ssr161167 (void) strncat(tempbuf + nbytes, dblock.dbuf.name, 73580578ac30Ssr161167 (MAXNAM - nbytes)); 73590578ac30Ssr161167 tempbuf[MAXNAM] = '\0'; 73607c478bd9Sstevel@tonic-gate } 73617c478bd9Sstevel@tonic-gate errors += local_utf8(&Xtarhdr.x_path, local_path, 73627c478bd9Sstevel@tonic-gate tempbuf, iconv_cd, _X_PATH, PATH_MAX); 73637c478bd9Sstevel@tonic-gate 73647c478bd9Sstevel@tonic-gate if (errors > 0) 73657c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 73667c478bd9Sstevel@tonic-gate "tar: file (%s): UTF-8 conversion failed.\n"), filename); 73677c478bd9Sstevel@tonic-gate 73687c478bd9Sstevel@tonic-gate if (errors && errflag) 73697c478bd9Sstevel@tonic-gate done(1); 73707c478bd9Sstevel@tonic-gate else 73717c478bd9Sstevel@tonic-gate if (errors) 73727c478bd9Sstevel@tonic-gate Errflg = 1; 73737c478bd9Sstevel@tonic-gate return (errors); 73747c478bd9Sstevel@tonic-gate } 73757c478bd9Sstevel@tonic-gate 73767c478bd9Sstevel@tonic-gate static int 73777c478bd9Sstevel@tonic-gate local_utf8( 73787c478bd9Sstevel@tonic-gate char **Xhdr_ptrptr, 73797c478bd9Sstevel@tonic-gate char *target, 73807c478bd9Sstevel@tonic-gate const char *source, 73817c478bd9Sstevel@tonic-gate iconv_t iconv_cd, 73827c478bd9Sstevel@tonic-gate int xhdrflg, 73837c478bd9Sstevel@tonic-gate int max_val) 73847c478bd9Sstevel@tonic-gate { 73857c478bd9Sstevel@tonic-gate const char *iconv_src; 73867c478bd9Sstevel@tonic-gate const char *starting_src; 73877c478bd9Sstevel@tonic-gate char *iconv_trg; 7388eace40a5Sceastha size_t inlen; 7389eace40a5Sceastha size_t outlen; 73907c478bd9Sstevel@tonic-gate #ifdef ICONV_DEBUG 73917c478bd9Sstevel@tonic-gate unsigned char c_to_hex; 73927c478bd9Sstevel@tonic-gate #endif 73937c478bd9Sstevel@tonic-gate 73947c478bd9Sstevel@tonic-gate /* 73957c478bd9Sstevel@tonic-gate * If the item is already slated for extended format, get the string 73967c478bd9Sstevel@tonic-gate * to convert from the extended header record. Otherwise, get it from 73977c478bd9Sstevel@tonic-gate * the regular (dblock) area. 73987c478bd9Sstevel@tonic-gate */ 73997c478bd9Sstevel@tonic-gate if (xhdr_flgs & xhdrflg) { 74007c478bd9Sstevel@tonic-gate if (charset_type == 3) { /* Already UTF-8, just copy */ 74017c478bd9Sstevel@tonic-gate (void) strcpy(target, *Xhdr_ptrptr); 74027c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target; 74037c478bd9Sstevel@tonic-gate return (0); 74047c478bd9Sstevel@tonic-gate } else 74057c478bd9Sstevel@tonic-gate iconv_src = (const char *) *Xhdr_ptrptr; 74067c478bd9Sstevel@tonic-gate } else { 74077c478bd9Sstevel@tonic-gate if (charset_type == 3) /* Already in UTF-8 format */ 74087c478bd9Sstevel@tonic-gate return (0); /* Don't create xhdr record */ 74097c478bd9Sstevel@tonic-gate iconv_src = source; 74107c478bd9Sstevel@tonic-gate } 74117c478bd9Sstevel@tonic-gate starting_src = iconv_src; 74127c478bd9Sstevel@tonic-gate iconv_trg = target; 74137c478bd9Sstevel@tonic-gate if ((inlen = strlen(iconv_src)) == 0) 74147c478bd9Sstevel@tonic-gate return (0); 74157c478bd9Sstevel@tonic-gate 74167c478bd9Sstevel@tonic-gate if (charset_type == 1) { /* locale using 7-bit codeset */ 74177c478bd9Sstevel@tonic-gate if (c_utf8(target, starting_src) != 0) { 74187c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 74197c478bd9Sstevel@tonic-gate gettext("tar: invalid character in" 74207c478bd9Sstevel@tonic-gate " UTF-8 conversion of '%s'\n"), starting_src); 74217c478bd9Sstevel@tonic-gate return (1); 74227c478bd9Sstevel@tonic-gate } 74237c478bd9Sstevel@tonic-gate return (0); 74247c478bd9Sstevel@tonic-gate } 74257c478bd9Sstevel@tonic-gate 74267c478bd9Sstevel@tonic-gate outlen = max_val * UTF_8_FACTOR; 74277c478bd9Sstevel@tonic-gate errno = 0; 74287c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) == 74297c478bd9Sstevel@tonic-gate (size_t)-1) { 74307c478bd9Sstevel@tonic-gate /* An error occurred, or not all characters were converted */ 74317c478bd9Sstevel@tonic-gate if (errno == EILSEQ) 74327c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 74337c478bd9Sstevel@tonic-gate gettext("tar: invalid character in" 74347c478bd9Sstevel@tonic-gate " UTF-8 conversion of '%s'\n"), starting_src); 74357c478bd9Sstevel@tonic-gate else 74367c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 74377c478bd9Sstevel@tonic-gate "tar: conversion to UTF-8 aborted for '%s'.\n"), 74387c478bd9Sstevel@tonic-gate starting_src); 74397c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */ 74407c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL; 74417c478bd9Sstevel@tonic-gate inlen = 0; 74427c478bd9Sstevel@tonic-gate (void) iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen); 74437c478bd9Sstevel@tonic-gate return (1); 74447c478bd9Sstevel@tonic-gate } 74457c478bd9Sstevel@tonic-gate /* Get remaining output; reinitialize conversion descriptor */ 74467c478bd9Sstevel@tonic-gate iconv_src = (const char *)NULL; 74477c478bd9Sstevel@tonic-gate inlen = 0; 74487c478bd9Sstevel@tonic-gate if (iconv(iconv_cd, &iconv_src, &inlen, &iconv_trg, &outlen) == 74497c478bd9Sstevel@tonic-gate (size_t)-1) { /* Error occurred: didn't convert */ 74507c478bd9Sstevel@tonic-gate if (errno == EILSEQ) 74517c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 74527c478bd9Sstevel@tonic-gate gettext("tar: invalid character in" 74537c478bd9Sstevel@tonic-gate " UTF-8 conversion of '%s'\n"), starting_src); 74547c478bd9Sstevel@tonic-gate else 74557c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 74567c478bd9Sstevel@tonic-gate "tar: conversion to UTF-8 aborted for '%s'.\n"), 74577c478bd9Sstevel@tonic-gate starting_src); 74587c478bd9Sstevel@tonic-gate return (1); 74597c478bd9Sstevel@tonic-gate } 74607c478bd9Sstevel@tonic-gate 74617c478bd9Sstevel@tonic-gate *iconv_trg = '\0'; /* Null-terminate iconv output string */ 74627c478bd9Sstevel@tonic-gate if (strcmp(starting_src, target) != 0) { 74637c478bd9Sstevel@tonic-gate *Xhdr_ptrptr = target; 74647c478bd9Sstevel@tonic-gate xhdr_flgs |= xhdrflg; 74657c478bd9Sstevel@tonic-gate #ifdef ICONV_DEBUG 74667c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "*** inlen: %d %d; outlen: %d %d\n", 74677c478bd9Sstevel@tonic-gate strlen(starting_src), inlen, max_val, outlen); 74687c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "Input string:\n "); 74697c478bd9Sstevel@tonic-gate for (inlen = 0; inlen < strlen(starting_src); inlen++) { 74707c478bd9Sstevel@tonic-gate c_to_hex = (unsigned char)starting_src[inlen]; 74717c478bd9Sstevel@tonic-gate (void) fprintf(stderr, " %2.2x", c_to_hex); 74727c478bd9Sstevel@tonic-gate if (inlen % 20 == 19) 74737c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n "); 74747c478bd9Sstevel@tonic-gate } 74757c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\nOutput string:\n "); 74767c478bd9Sstevel@tonic-gate for (inlen = 0; inlen < strlen(target); inlen++) { 74777c478bd9Sstevel@tonic-gate c_to_hex = (unsigned char)target[inlen]; 74787c478bd9Sstevel@tonic-gate (void) fprintf(stderr, " %2.2x", c_to_hex); 74797c478bd9Sstevel@tonic-gate if (inlen % 20 == 19) 74807c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n "); 74817c478bd9Sstevel@tonic-gate } 74827c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "\n"); 74837c478bd9Sstevel@tonic-gate #endif 74847c478bd9Sstevel@tonic-gate } 74857c478bd9Sstevel@tonic-gate 74867c478bd9Sstevel@tonic-gate return (0); 74877c478bd9Sstevel@tonic-gate } 74887c478bd9Sstevel@tonic-gate 74897c478bd9Sstevel@tonic-gate /* 74907c478bd9Sstevel@tonic-gate * Function to test each byte of the source string to make sure it is 74917c478bd9Sstevel@tonic-gate * in within bounds (value between 0 and 127). 74927c478bd9Sstevel@tonic-gate * If valid, copy source to target. 74937c478bd9Sstevel@tonic-gate */ 74947c478bd9Sstevel@tonic-gate 74957c478bd9Sstevel@tonic-gate int 74967c478bd9Sstevel@tonic-gate c_utf8(char *target, const char *source) 74977c478bd9Sstevel@tonic-gate { 74987c478bd9Sstevel@tonic-gate size_t len; 74997c478bd9Sstevel@tonic-gate const char *thischar; 75007c478bd9Sstevel@tonic-gate 75017c478bd9Sstevel@tonic-gate len = strlen(source); 75027c478bd9Sstevel@tonic-gate thischar = source; 75037c478bd9Sstevel@tonic-gate while (len-- > 0) { 75047c478bd9Sstevel@tonic-gate if (!isascii((int)(*thischar++))) 75057c478bd9Sstevel@tonic-gate return (1); 75067c478bd9Sstevel@tonic-gate } 75077c478bd9Sstevel@tonic-gate 75087c478bd9Sstevel@tonic-gate (void) strcpy(target, source); 75097c478bd9Sstevel@tonic-gate return (0); 75107c478bd9Sstevel@tonic-gate } 75117c478bd9Sstevel@tonic-gate 75127c478bd9Sstevel@tonic-gate 75137c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 75147c478bd9Sstevel@tonic-gate #define ROUNDTOTBLOCK(a) ((a + (TBLOCK -1)) & ~(TBLOCK -1)) 75157c478bd9Sstevel@tonic-gate 75167c478bd9Sstevel@tonic-gate static void 75177c478bd9Sstevel@tonic-gate prepare_xattr( 75187c478bd9Sstevel@tonic-gate char **attrbuf, 75197c478bd9Sstevel@tonic-gate char *filename, 7520da6c28aaSamw char *attrpath, 75217c478bd9Sstevel@tonic-gate char typeflag, 75227c478bd9Sstevel@tonic-gate struct linkbuf *linkinfo, 75237c478bd9Sstevel@tonic-gate int *rlen) 75247c478bd9Sstevel@tonic-gate { 75257c478bd9Sstevel@tonic-gate char *bufhead; /* ptr to full buffer */ 7526da6c28aaSamw char *aptr; 75277c478bd9Sstevel@tonic-gate struct xattr_hdr *hptr; /* ptr to header in bufhead */ 75287c478bd9Sstevel@tonic-gate struct xattr_buf *tptr; /* ptr to pathing pieces */ 75297c478bd9Sstevel@tonic-gate int totalen; /* total buffer length */ 75307c478bd9Sstevel@tonic-gate int len; /* length returned to user */ 75317c478bd9Sstevel@tonic-gate int stringlen; /* length of filename + attr */ 75327c478bd9Sstevel@tonic-gate /* 75337c478bd9Sstevel@tonic-gate * length of filename + attr 75347c478bd9Sstevel@tonic-gate * in link section 75357c478bd9Sstevel@tonic-gate */ 75367c478bd9Sstevel@tonic-gate int linkstringlen; 75377c478bd9Sstevel@tonic-gate int complen; /* length of pathing section */ 75387c478bd9Sstevel@tonic-gate int linklen; /* length of link section */ 7539da6c28aaSamw int attrnames_index; /* attrnames starting index */ 75407c478bd9Sstevel@tonic-gate 75417c478bd9Sstevel@tonic-gate /* 75427c478bd9Sstevel@tonic-gate * Release previous buffer 75437c478bd9Sstevel@tonic-gate */ 75447c478bd9Sstevel@tonic-gate 75457c478bd9Sstevel@tonic-gate if (*attrbuf != (char *)NULL) { 75467c478bd9Sstevel@tonic-gate free(*attrbuf); 75477c478bd9Sstevel@tonic-gate *attrbuf = NULL; 75487c478bd9Sstevel@tonic-gate } 75497c478bd9Sstevel@tonic-gate 75507c478bd9Sstevel@tonic-gate /* 75517c478bd9Sstevel@tonic-gate * First add in fixed size stuff 75527c478bd9Sstevel@tonic-gate */ 75537c478bd9Sstevel@tonic-gate len = sizeof (struct xattr_hdr) + sizeof (struct xattr_buf); 75547c478bd9Sstevel@tonic-gate 75557c478bd9Sstevel@tonic-gate /* 75567c478bd9Sstevel@tonic-gate * Add space for two nulls 75577c478bd9Sstevel@tonic-gate */ 7558da6c28aaSamw stringlen = strlen(attrpath) + strlen(filename) + 2; 75597c478bd9Sstevel@tonic-gate complen = stringlen + sizeof (struct xattr_buf); 75607c478bd9Sstevel@tonic-gate 75617c478bd9Sstevel@tonic-gate len += stringlen; 75627c478bd9Sstevel@tonic-gate 75637c478bd9Sstevel@tonic-gate /* 75647c478bd9Sstevel@tonic-gate * Now add on space for link info if any 75657c478bd9Sstevel@tonic-gate */ 75667c478bd9Sstevel@tonic-gate 75677c478bd9Sstevel@tonic-gate if (linkinfo != NULL) { 75687c478bd9Sstevel@tonic-gate /* 75697c478bd9Sstevel@tonic-gate * Again add space for two nulls 75707c478bd9Sstevel@tonic-gate */ 75717c478bd9Sstevel@tonic-gate linkstringlen = strlen(linkinfo->pathname) + 75727c478bd9Sstevel@tonic-gate strlen(linkinfo->attrname) + 2; 7573da6c28aaSamw linklen = linkstringlen + sizeof (struct xattr_buf); 7574da6c28aaSamw len += linklen; 7575da6c28aaSamw } else { 7576da6c28aaSamw linklen = 0; 75777c478bd9Sstevel@tonic-gate } 75787c478bd9Sstevel@tonic-gate 75797c478bd9Sstevel@tonic-gate /* 75807c478bd9Sstevel@tonic-gate * Now add padding to end to fill out TBLOCK 75817c478bd9Sstevel@tonic-gate * 75827c478bd9Sstevel@tonic-gate * Function returns size of real data and not size + padding. 75837c478bd9Sstevel@tonic-gate */ 75847c478bd9Sstevel@tonic-gate 75857c478bd9Sstevel@tonic-gate totalen = ROUNDTOTBLOCK(len); 75867c478bd9Sstevel@tonic-gate 75877c478bd9Sstevel@tonic-gate if ((bufhead = calloc(1, totalen)) == NULL) { 75887c478bd9Sstevel@tonic-gate fatal(gettext("Out of memory.")); 75897c478bd9Sstevel@tonic-gate } 75907c478bd9Sstevel@tonic-gate 75917c478bd9Sstevel@tonic-gate 75927c478bd9Sstevel@tonic-gate /* 75937c478bd9Sstevel@tonic-gate * Now we can fill in the necessary pieces 75947c478bd9Sstevel@tonic-gate */ 75957c478bd9Sstevel@tonic-gate 75967c478bd9Sstevel@tonic-gate /* 75977c478bd9Sstevel@tonic-gate * first fill in the fixed header 75987c478bd9Sstevel@tonic-gate */ 75997c478bd9Sstevel@tonic-gate hptr = (struct xattr_hdr *)bufhead; 76007c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_version, "%s", XATTR_ARCH_VERS); 76017c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_component_len, "%0*d", 76027c478bd9Sstevel@tonic-gate sizeof (hptr->h_component_len) - 1, complen); 76037c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_link_component_len, "%0*d", 76047c478bd9Sstevel@tonic-gate sizeof (hptr->h_link_component_len) - 1, linklen); 76057c478bd9Sstevel@tonic-gate (void) sprintf(hptr->h_size, "%0*d", sizeof (hptr->h_size) - 1, len); 76067c478bd9Sstevel@tonic-gate 76077c478bd9Sstevel@tonic-gate /* 76087c478bd9Sstevel@tonic-gate * Now fill in the filename + attrnames section 7609da6c28aaSamw * The filename and attrnames section can be composed of two or more 7610da6c28aaSamw * path segments separated by a null character. The first segment 7611da6c28aaSamw * is the path to the parent file that roots the entire sequence in 7612da6c28aaSamw * the normal name space. The remaining segments describes a path 7613da6c28aaSamw * rooted at the hidden extended attribute directory of the leaf file of 7614da6c28aaSamw * the previous segment, making it possible to name attributes on 7615da6c28aaSamw * attributes. Thus, if we are just archiving an extended attribute, 7616da6c28aaSamw * the second segment will contain the attribute name. If we are 7617da6c28aaSamw * archiving a system attribute of an extended attribute, then the 7618da6c28aaSamw * second segment will contain the attribute name, and a third segment 7619da6c28aaSamw * will contain the system attribute name. The attribute pathing 7620da6c28aaSamw * information is obtained from 'attrpath'. 76217c478bd9Sstevel@tonic-gate */ 76227c478bd9Sstevel@tonic-gate 76237c478bd9Sstevel@tonic-gate tptr = (struct xattr_buf *)(bufhead + sizeof (struct xattr_hdr)); 76247c478bd9Sstevel@tonic-gate (void) sprintf(tptr->h_namesz, "%0*d", sizeof (tptr->h_namesz) - 1, 76257c478bd9Sstevel@tonic-gate stringlen); 76267c478bd9Sstevel@tonic-gate (void) strcpy(tptr->h_names, filename); 7627da6c28aaSamw attrnames_index = strlen(filename) + 1; 7628da6c28aaSamw (void) strcpy(&tptr->h_names[attrnames_index], attrpath); 76297c478bd9Sstevel@tonic-gate tptr->h_typeflag = typeflag; 76307c478bd9Sstevel@tonic-gate 76317c478bd9Sstevel@tonic-gate /* 7632da6c28aaSamw * Split the attrnames section into two segments if 'attrpath' 7633da6c28aaSamw * contains pathing information for a system attribute of an 7634da6c28aaSamw * extended attribute. We split them by replacing the '/' with 7635da6c28aaSamw * a '\0'. 7636da6c28aaSamw */ 7637da6c28aaSamw if ((aptr = strpbrk(&tptr->h_names[attrnames_index], "/")) != NULL) { 7638da6c28aaSamw *aptr = '\0'; 7639da6c28aaSamw } 7640da6c28aaSamw 7641da6c28aaSamw /* 76427c478bd9Sstevel@tonic-gate * Now fill in the optional link section if we have one 76437c478bd9Sstevel@tonic-gate */ 76447c478bd9Sstevel@tonic-gate 76457c478bd9Sstevel@tonic-gate if (linkinfo != (struct linkbuf *)NULL) { 76467c478bd9Sstevel@tonic-gate tptr = (struct xattr_buf *)(bufhead + 76477c478bd9Sstevel@tonic-gate sizeof (struct xattr_hdr) + complen); 76487c478bd9Sstevel@tonic-gate 76497c478bd9Sstevel@tonic-gate (void) sprintf(tptr->h_namesz, "%0*d", 76507c478bd9Sstevel@tonic-gate sizeof (tptr->h_namesz) - 1, linkstringlen); 76517c478bd9Sstevel@tonic-gate (void) strcpy(tptr->h_names, linkinfo->pathname); 76527c478bd9Sstevel@tonic-gate (void) strcpy( 76537c478bd9Sstevel@tonic-gate &tptr->h_names[strlen(linkinfo->pathname) + 1], 76547c478bd9Sstevel@tonic-gate linkinfo->attrname); 76557c478bd9Sstevel@tonic-gate tptr->h_typeflag = typeflag; 76567c478bd9Sstevel@tonic-gate } 76577c478bd9Sstevel@tonic-gate *attrbuf = (char *)bufhead; 76587c478bd9Sstevel@tonic-gate *rlen = len; 76597c478bd9Sstevel@tonic-gate } 76607c478bd9Sstevel@tonic-gate 76617c478bd9Sstevel@tonic-gate #else 76627c478bd9Sstevel@tonic-gate static void 76637c478bd9Sstevel@tonic-gate prepare_xattr( 76647c478bd9Sstevel@tonic-gate char **attrbuf, 76657c478bd9Sstevel@tonic-gate char *filename, 76667c478bd9Sstevel@tonic-gate char *attrname, 76677c478bd9Sstevel@tonic-gate char typeflag, 76687c478bd9Sstevel@tonic-gate struct linkbuf *linkinfo, 76697c478bd9Sstevel@tonic-gate int *rlen) 76707c478bd9Sstevel@tonic-gate { 76717c478bd9Sstevel@tonic-gate *attrbuf = NULL; 76727c478bd9Sstevel@tonic-gate *rlen = 0; 76737c478bd9Sstevel@tonic-gate } 76747c478bd9Sstevel@tonic-gate #endif 76757c478bd9Sstevel@tonic-gate 76767c478bd9Sstevel@tonic-gate int 7677da6c28aaSamw getstat(int dirfd, char *longname, char *shortname, char *attrparent) 76787c478bd9Sstevel@tonic-gate { 76797c478bd9Sstevel@tonic-gate 76807c478bd9Sstevel@tonic-gate int i, j; 76817c478bd9Sstevel@tonic-gate int printerr; 76827c478bd9Sstevel@tonic-gate int slnkerr; 76837c478bd9Sstevel@tonic-gate struct stat symlnbuf; 76847c478bd9Sstevel@tonic-gate 76857c478bd9Sstevel@tonic-gate if (!hflag) 76867c478bd9Sstevel@tonic-gate i = fstatat(dirfd, shortname, &stbuf, AT_SYMLINK_NOFOLLOW); 76877c478bd9Sstevel@tonic-gate else 76887c478bd9Sstevel@tonic-gate i = fstatat(dirfd, shortname, &stbuf, 0); 76897c478bd9Sstevel@tonic-gate 76907c478bd9Sstevel@tonic-gate if (i < 0) { 76917c478bd9Sstevel@tonic-gate /* Initialize flag to print error mesg. */ 76927c478bd9Sstevel@tonic-gate printerr = 1; 76937c478bd9Sstevel@tonic-gate /* 76947c478bd9Sstevel@tonic-gate * If stat is done, then need to do lstat 76957c478bd9Sstevel@tonic-gate * to determine whether it's a sym link 76967c478bd9Sstevel@tonic-gate */ 76977c478bd9Sstevel@tonic-gate if (hflag) { 76987c478bd9Sstevel@tonic-gate /* Save returned error */ 76997c478bd9Sstevel@tonic-gate slnkerr = errno; 77007c478bd9Sstevel@tonic-gate 77017c478bd9Sstevel@tonic-gate j = fstatat(dirfd, shortname, 77027c478bd9Sstevel@tonic-gate &symlnbuf, AT_SYMLINK_NOFOLLOW); 77037c478bd9Sstevel@tonic-gate /* 77047c478bd9Sstevel@tonic-gate * Suppress error message when file is a symbolic link 77057c478bd9Sstevel@tonic-gate * and function modifier 'l' is off. Exception: when 77067c478bd9Sstevel@tonic-gate * a symlink points to a symlink points to a 77077c478bd9Sstevel@tonic-gate * symlink ... and we get past MAXSYMLINKS. That 77087c478bd9Sstevel@tonic-gate * error will cause a file not to be archived, and 77097c478bd9Sstevel@tonic-gate * needs to be printed. 77107c478bd9Sstevel@tonic-gate */ 77117c478bd9Sstevel@tonic-gate if ((j == 0) && (!linkerrok) && (slnkerr != ELOOP) && 77127c478bd9Sstevel@tonic-gate (S_ISLNK(symlnbuf.st_mode))) 77137c478bd9Sstevel@tonic-gate printerr = 0; 77147c478bd9Sstevel@tonic-gate 77157c478bd9Sstevel@tonic-gate /* 77167c478bd9Sstevel@tonic-gate * Restore errno in case the lstat 77177c478bd9Sstevel@tonic-gate * on symbolic link change 77187c478bd9Sstevel@tonic-gate */ 77197c478bd9Sstevel@tonic-gate errno = slnkerr; 77207c478bd9Sstevel@tonic-gate } 77217c478bd9Sstevel@tonic-gate 77227c478bd9Sstevel@tonic-gate if (printerr) { 77237c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 7724da6c28aaSamw "tar: %s%s%s%s: %s\n"), 7725da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "), 7726da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 7727da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 7728da6c28aaSamw longname, strerror(errno)); 77297c478bd9Sstevel@tonic-gate Errflg = 1; 77307c478bd9Sstevel@tonic-gate } 77317c478bd9Sstevel@tonic-gate return (1); 77327c478bd9Sstevel@tonic-gate } 77337c478bd9Sstevel@tonic-gate return (0); 77347c478bd9Sstevel@tonic-gate } 77357c478bd9Sstevel@tonic-gate 7736da6c28aaSamw /* 7737da6c28aaSamw * Recursively archive the extended attributes and/or extended system attributes 7738da6c28aaSamw * of the base file, longname. Note: extended system attribute files will be 7739da6c28aaSamw * archived only if the extended system attributes are not transient (i.e. the 7740da6c28aaSamw * extended system attributes are other than the default values). 7741da6c28aaSamw * 7742da6c28aaSamw * If -@ was specified and the underlying file system supports it, archive the 7743da6c28aaSamw * extended attributes, and if there is a system attribute associated with the 7744da6c28aaSamw * extended attribute, then recursively call xattrs_put() to archive the 7745da6c28aaSamw * hidden attribute directory and the extended system attribute. If -/ was 7746da6c28aaSamw * specified and the underlying file system supports it, archive the extended 7747da6c28aaSamw * system attributes. Read-only extended system attributes are never archived. 7748da6c28aaSamw * 7749da6c28aaSamw * Currently, there cannot be attributes on attributes; only system 7750da6c28aaSamw * attributes on attributes. In addition, there cannot be attributes on 7751da6c28aaSamw * system attributes. A file and it's attribute directory hierarchy looks as 7752da6c28aaSamw * follows: 7753da6c28aaSamw * longname ----> . ("." is the hidden attribute directory) 7754da6c28aaSamw * | 7755da6c28aaSamw * ---------------------------- 7756da6c28aaSamw * | | 7757da6c28aaSamw * <sys_attr_name> <attr_name> ----> . 7758da6c28aaSamw * | 7759da6c28aaSamw * <sys_attr_name> 7760da6c28aaSamw * 7761da6c28aaSamw */ 77627c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 77637c478bd9Sstevel@tonic-gate static void 7764da6c28aaSamw xattrs_put(char *longname, char *shortname, char *parent, char *attrparent) 77657c478bd9Sstevel@tonic-gate { 7766da6c28aaSamw char *filename = (attrparent == NULL) ? shortname : attrparent; 7767da6c28aaSamw int arc_rwsysattr = 0; 77687c478bd9Sstevel@tonic-gate int dirfd; 7769da6c28aaSamw int fd = -1; 7770da6c28aaSamw int rw_sysattr = 0; 7771ced83f9bSceastha int ext_attr = 0; 7772da6c28aaSamw int rc; 77737c478bd9Sstevel@tonic-gate DIR *dirp; 77747c478bd9Sstevel@tonic-gate struct dirent *dp; 7775da6c28aaSamw attr_data_t *attrinfo = NULL; 77767c478bd9Sstevel@tonic-gate 7777da6c28aaSamw /* 7778da6c28aaSamw * If the underlying file system supports it, then archive the extended 7779da6c28aaSamw * attributes if -@ was specified, and the extended system attributes 7780da6c28aaSamw * if -/ was specified. 7781da6c28aaSamw */ 7782ced83f9bSceastha if (verify_attr_support(filename, (attrparent == NULL), ARC_CREATE, 7783ced83f9bSceastha &ext_attr) != ATTR_OK) { 77847c478bd9Sstevel@tonic-gate return; 77857c478bd9Sstevel@tonic-gate } 77867c478bd9Sstevel@tonic-gate 7787da6c28aaSamw /* 7788da6c28aaSamw * Only want to archive a read-write extended system attribute file 7789da6c28aaSamw * if it contains extended system attribute settings that are not the 7790da6c28aaSamw * default values. 7791da6c28aaSamw */ 7792da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 7793da6c28aaSamw if (saflag) { 7794da6c28aaSamw int filefd; 7795da6c28aaSamw nvlist_t *slist = NULL; 7796da6c28aaSamw 7797da6c28aaSamw /* Determine if there are non-transient system attributes */ 7798da6c28aaSamw errno = 0; 7799da6c28aaSamw if ((filefd = open(filename, O_RDONLY)) == -1) { 7800da6c28aaSamw if (attrparent == NULL) { 7801da6c28aaSamw vperror(0, gettext( 7802da6c28aaSamw "unable to open file %s"), longname); 7803da6c28aaSamw } 7804da6c28aaSamw return; 7805da6c28aaSamw } 7806da6c28aaSamw if (((slist = sysattr_list(basename(myname), filefd, 7807da6c28aaSamw filename)) != NULL) || (errno != 0)) { 7808da6c28aaSamw arc_rwsysattr = 1; 7809da6c28aaSamw } 7810da6c28aaSamw if (slist != NULL) { 7811da6c28aaSamw (void) nvlist_free(slist); 7812da6c28aaSamw slist = NULL; 7813da6c28aaSamw } 7814da6c28aaSamw (void) close(filefd); 7815da6c28aaSamw } 7816ced83f9bSceastha 7817ced83f9bSceastha /* 7818ced83f9bSceastha * If we aren't archiving extended system attributes, and we are 7819ced83f9bSceastha * processing an attribute, or if we are archiving extended system 7820ced83f9bSceastha * attributes, and there are are no extended attributes, then there's 7821ced83f9bSceastha * no need to open up the attribute directory of the file unless the 7822ced83f9bSceastha * extended system attributes are not transient (i.e, the system 7823ced83f9bSceastha * attributes are not the default values). 7824ced83f9bSceastha */ 7825ced83f9bSceastha if ((arc_rwsysattr == 0) && ((attrparent != NULL) || 7826ced83f9bSceastha (saflag && !ext_attr))) { 7827ced83f9bSceastha return; 7828ced83f9bSceastha } 7829da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 7830da6c28aaSamw 7831da6c28aaSamw /* open the parent attribute directory */ 7832da6c28aaSamw fd = attropen(filename, ".", O_RDONLY); 7833da6c28aaSamw if (fd < 0) { 7834da6c28aaSamw vperror(0, gettext( 7835da6c28aaSamw "unable to open attribute directory for %s%s%sfile %s"), 7836da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "), 7837da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 7838da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 78397c478bd9Sstevel@tonic-gate longname); 78407c478bd9Sstevel@tonic-gate return; 78417c478bd9Sstevel@tonic-gate } 78427c478bd9Sstevel@tonic-gate 7843da6c28aaSamw /* 7844da6c28aaSamw * We need to change into the parent's attribute directory to determine 7845da6c28aaSamw * if each of the attributes should be archived. 7846da6c28aaSamw */ 7847da6c28aaSamw if (fchdir(fd) < 0) { 7848da6c28aaSamw vperror(0, gettext( 7849da6c28aaSamw "cannot change to attribute directory of %s%s%sfile %s"), 7850da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "), 7851da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 7852da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 7853da6c28aaSamw longname); 7854da6c28aaSamw (void) close(fd); 7855da6c28aaSamw return; 7856da6c28aaSamw } 7857da6c28aaSamw 7858da6c28aaSamw if (((dirfd = dup(fd)) == -1) || 7859da6c28aaSamw ((dirp = fdopendir(dirfd)) == NULL)) { 78607c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 7861da6c28aaSamw "tar: unable to open dir pointer for %s%s%sfile %s\n"), 7862da6c28aaSamw (attrparent == NULL) ? "" : gettext("attribute "), 7863da6c28aaSamw (attrparent == NULL) ? "" : attrparent, 7864da6c28aaSamw (attrparent == NULL) ? "" : gettext(" of "), 7865da6c28aaSamw longname); 7866da6c28aaSamw if (fd > 0) { 7867da6c28aaSamw (void) close(fd); 7868da6c28aaSamw } 78697c478bd9Sstevel@tonic-gate return; 78707c478bd9Sstevel@tonic-gate } 78717c478bd9Sstevel@tonic-gate 78727c478bd9Sstevel@tonic-gate while (dp = readdir(dirp)) { 7873da6c28aaSamw if (strcmp(dp->d_name, "..") == 0) { 78747c478bd9Sstevel@tonic-gate continue; 7875da6c28aaSamw } else if (strcmp(dp->d_name, ".") == 0) { 78767c478bd9Sstevel@tonic-gate Hiddendir = 1; 7877da6c28aaSamw } else { 78787c478bd9Sstevel@tonic-gate Hiddendir = 0; 7879da6c28aaSamw } 78807c478bd9Sstevel@tonic-gate 7881da6c28aaSamw /* Determine if this attribute should be archived */ 7882da6c28aaSamw if (verify_attr(dp->d_name, attrparent, arc_rwsysattr, 7883da6c28aaSamw &rw_sysattr) != ATTR_OK) { 7884da6c28aaSamw continue; 7885da6c28aaSamw } 7886da6c28aaSamw 7887da6c28aaSamw /* gather the attribute's information to pass to putfile() */ 7888da6c28aaSamw if ((fill_in_attr_info(dp->d_name, longname, attrparent, 7889da6c28aaSamw fd, rw_sysattr, &attrinfo)) == 1) { 7890da6c28aaSamw continue; 7891da6c28aaSamw } 7892da6c28aaSamw 7893da6c28aaSamw /* add the attribute to the archive */ 7894da6c28aaSamw rc = putfile(longname, dp->d_name, parent, attrinfo, 78957c478bd9Sstevel@tonic-gate XATTR_FILE, LEV0, SYMLINK_LEV0); 78967c478bd9Sstevel@tonic-gate 7897da6c28aaSamw if (exitflag) { 78987c478bd9Sstevel@tonic-gate break; 78997c478bd9Sstevel@tonic-gate } 79007c478bd9Sstevel@tonic-gate 7901da6c28aaSamw #if defined(_PC_SATTR_ENABLED) 7902da6c28aaSamw /* 7903da6c28aaSamw * If both -/ and -@ were specified, then archive the 7904da6c28aaSamw * attribute's extended system attributes and hidden directory 7905da6c28aaSamw * by making a recursive call to xattrs_put(). 7906da6c28aaSamw */ 7907da6c28aaSamw if (!rw_sysattr && saflag && atflag && (rc != PUT_AS_LINK) && 7908da6c28aaSamw (Hiddendir == 0)) { 7909da6c28aaSamw 7910da6c28aaSamw xattrs_put(longname, shortname, parent, dp->d_name); 7911da6c28aaSamw 7912da6c28aaSamw /* 7913da6c28aaSamw * Change back to the parent's attribute directory 7914da6c28aaSamw * to process any further attributes. 7915da6c28aaSamw */ 7916da6c28aaSamw if (fchdir(fd) < 0) { 7917da6c28aaSamw vperror(0, gettext( 7918da6c28aaSamw "cannot change back to attribute directory " 7919da6c28aaSamw "of file %s"), longname); 7920da6c28aaSamw break; 7921da6c28aaSamw } 7922da6c28aaSamw } 7923da6c28aaSamw #endif /* _PC_SATTR_ENABLED */ 7924da6c28aaSamw } 7925da6c28aaSamw 7926da6c28aaSamw if (attrinfo != NULL) { 7927da6c28aaSamw if (attrinfo->attr_parent != NULL) { 7928da6c28aaSamw free(attrinfo->attr_parent); 7929da6c28aaSamw } 7930da6c28aaSamw free(attrinfo->attr_path); 7931da6c28aaSamw free(attrinfo); 7932da6c28aaSamw } 79337c478bd9Sstevel@tonic-gate (void) closedir(dirp); 7934da6c28aaSamw if (fd != -1) { 7935da6c28aaSamw (void) close(fd); 7936da6c28aaSamw } 7937da6c28aaSamw 7938da6c28aaSamw /* Change back to the parent directory of the base file */ 7939da6c28aaSamw if (attrparent == NULL) { 7940b25dbf38SRich Burridge (void) tar_chdir(parent); 7941da6c28aaSamw } 7942ced83f9bSceastha Hiddendir = 0; 79437c478bd9Sstevel@tonic-gate } 79447c478bd9Sstevel@tonic-gate #else 79457c478bd9Sstevel@tonic-gate static void 7946da6c28aaSamw xattrs_put(char *longname, char *shortname, char *parent, char *attrppath) 79477c478bd9Sstevel@tonic-gate { 79487c478bd9Sstevel@tonic-gate } 79497c478bd9Sstevel@tonic-gate #endif /* O_XATTR */ 79507c478bd9Sstevel@tonic-gate 79517c478bd9Sstevel@tonic-gate static int 7952da6c28aaSamw put_link(char *name, char *longname, char *component, char *longattrname, 79537c478bd9Sstevel@tonic-gate char *prefix, int filetype, char type) 79547c478bd9Sstevel@tonic-gate { 79557c478bd9Sstevel@tonic-gate 79567c478bd9Sstevel@tonic-gate if (stbuf.st_nlink > 1) { 79577c478bd9Sstevel@tonic-gate struct linkbuf *lp; 79587c478bd9Sstevel@tonic-gate int found = 0; 79597c478bd9Sstevel@tonic-gate 79607c478bd9Sstevel@tonic-gate for (lp = ihead; lp != NULL; lp = lp->nextp) 79617c478bd9Sstevel@tonic-gate if (lp->inum == stbuf.st_ino && 79627c478bd9Sstevel@tonic-gate lp->devnum == stbuf.st_dev) { 79637c478bd9Sstevel@tonic-gate found++; 79647c478bd9Sstevel@tonic-gate break; 79657c478bd9Sstevel@tonic-gate } 79667c478bd9Sstevel@tonic-gate if (found) { 79677c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 79687c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) 7969da6c28aaSamw if (put_xattr_hdr(longname, component, 7970da6c28aaSamw longattrname, prefix, type, filetype, lp)) { 79717c478bd9Sstevel@tonic-gate goto out; 79727c478bd9Sstevel@tonic-gate } 79737c478bd9Sstevel@tonic-gate #endif 79747c478bd9Sstevel@tonic-gate stbuf.st_size = (off_t)0; 79757c478bd9Sstevel@tonic-gate if (filetype != XATTR_FILE) { 79767c478bd9Sstevel@tonic-gate tomodes(&stbuf); 79777c478bd9Sstevel@tonic-gate if (chk_path_build(name, longname, lp->pathname, 79787c478bd9Sstevel@tonic-gate prefix, type, filetype) > 0) { 79797c478bd9Sstevel@tonic-gate goto out; 79807c478bd9Sstevel@tonic-gate } 79817c478bd9Sstevel@tonic-gate } 79827c478bd9Sstevel@tonic-gate 79837c478bd9Sstevel@tonic-gate if (mulvol && tapepos + 1 >= blocklim) 79847c478bd9Sstevel@tonic-gate newvol(); 79857c478bd9Sstevel@tonic-gate (void) writetbuf((char *)&dblock, 1); 79867c478bd9Sstevel@tonic-gate /* 79877c478bd9Sstevel@tonic-gate * write_ancillary() is not needed here. 79887c478bd9Sstevel@tonic-gate * The first link is handled in the following 79897c478bd9Sstevel@tonic-gate * else statement. No need to process ACLs 79907c478bd9Sstevel@tonic-gate * for other hard links since they are the 79917c478bd9Sstevel@tonic-gate * same file. 79927c478bd9Sstevel@tonic-gate */ 79937c478bd9Sstevel@tonic-gate 79947c478bd9Sstevel@tonic-gate if (vflag) { 79957c478bd9Sstevel@tonic-gate #ifdef DEBUG 79967c478bd9Sstevel@tonic-gate if (NotTape) 79977c478bd9Sstevel@tonic-gate DEBUG("seek = %" FMT_blkcnt_t 79987c478bd9Sstevel@tonic-gate "K\t", K(tapepos), 0); 79997c478bd9Sstevel@tonic-gate #endif 80007c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) { 80017c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 80027c478bd9Sstevel@tonic-gate "a %s attribute %s link to " 8003da6c28aaSamw "%s attribute %s\n"), 8004da6c28aaSamw name, component, name, 8005da6c28aaSamw lp->attrname); 80067c478bd9Sstevel@tonic-gate } else { 80077c478bd9Sstevel@tonic-gate (void) fprintf(vfile, gettext( 80087c478bd9Sstevel@tonic-gate "a %s link to %s\n"), 80097c478bd9Sstevel@tonic-gate longname, lp->pathname); 80107c478bd9Sstevel@tonic-gate } 80117c478bd9Sstevel@tonic-gate } 80127c478bd9Sstevel@tonic-gate lp->count--; 80137c478bd9Sstevel@tonic-gate return (0); 80147c478bd9Sstevel@tonic-gate } else { 80157c478bd9Sstevel@tonic-gate lp = (struct linkbuf *)getmem(sizeof (*lp)); 80167c478bd9Sstevel@tonic-gate if (lp != (struct linkbuf *)NULL) { 80177c478bd9Sstevel@tonic-gate lp->nextp = ihead; 80187c478bd9Sstevel@tonic-gate ihead = lp; 80197c478bd9Sstevel@tonic-gate lp->inum = stbuf.st_ino; 80207c478bd9Sstevel@tonic-gate lp->devnum = stbuf.st_dev; 80217c478bd9Sstevel@tonic-gate lp->count = stbuf.st_nlink - 1; 80227c478bd9Sstevel@tonic-gate if (filetype == XATTR_FILE) { 80237c478bd9Sstevel@tonic-gate (void) strcpy(lp->pathname, longname); 8024da6c28aaSamw (void) strcpy(lp->attrname, 8025da6c28aaSamw component); 80267c478bd9Sstevel@tonic-gate } else { 80277c478bd9Sstevel@tonic-gate (void) strcpy(lp->pathname, longname); 80287c478bd9Sstevel@tonic-gate (void) strcpy(lp->attrname, ""); 80297c478bd9Sstevel@tonic-gate } 80307c478bd9Sstevel@tonic-gate } 80317c478bd9Sstevel@tonic-gate } 80327c478bd9Sstevel@tonic-gate } 80337c478bd9Sstevel@tonic-gate 80347c478bd9Sstevel@tonic-gate out: 80357c478bd9Sstevel@tonic-gate return (1); 80367c478bd9Sstevel@tonic-gate } 80377c478bd9Sstevel@tonic-gate 80387c478bd9Sstevel@tonic-gate static int 8039da6c28aaSamw put_extra_attributes(char *longname, char *shortname, char *longattrname, 8040da6c28aaSamw char *prefix, int filetype, char typeflag) 80417c478bd9Sstevel@tonic-gate { 8042fa9e4066Sahrens static acl_t *aclp = NULL; 8043fa9e4066Sahrens int error; 80447c478bd9Sstevel@tonic-gate 8045fa9e4066Sahrens if (aclp != NULL) { 8046fa9e4066Sahrens acl_free(aclp); 80477c478bd9Sstevel@tonic-gate aclp = NULL; 80487c478bd9Sstevel@tonic-gate } 80497c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 8050da6c28aaSamw if ((atflag || saflag) && (filetype == XATTR_FILE)) { 8051da6c28aaSamw if (put_xattr_hdr(longname, shortname, longattrname, prefix, 80527c478bd9Sstevel@tonic-gate typeflag, filetype, NULL)) { 80537c478bd9Sstevel@tonic-gate return (1); 80547c478bd9Sstevel@tonic-gate } 80557c478bd9Sstevel@tonic-gate } 80567c478bd9Sstevel@tonic-gate #endif 80577c478bd9Sstevel@tonic-gate 80587c478bd9Sstevel@tonic-gate /* ACL support */ 80597c478bd9Sstevel@tonic-gate if (pflag) { 80607c478bd9Sstevel@tonic-gate char *secinfo = NULL; 80617c478bd9Sstevel@tonic-gate int len = 0; 80627c478bd9Sstevel@tonic-gate 80637c478bd9Sstevel@tonic-gate /* ACL support */ 80647c478bd9Sstevel@tonic-gate if (((stbuf.st_mode & S_IFMT) != S_IFLNK)) { 80657c478bd9Sstevel@tonic-gate /* 80667c478bd9Sstevel@tonic-gate * Get ACL info: dont bother allocating space if 8067fa9e4066Sahrens * there is only a trivial ACL. 80687c478bd9Sstevel@tonic-gate */ 8069fa9e4066Sahrens if ((error = acl_get(shortname, ACL_NO_TRIVIAL, 8070fa9e4066Sahrens &aclp)) != 0) { 80717c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 8072fa9e4066Sahrens "%s: failed to retrieve acl : %s\n"), 8073fa9e4066Sahrens longname, acl_strerror(error)); 80747c478bd9Sstevel@tonic-gate return (1); 80757c478bd9Sstevel@tonic-gate } 80767c478bd9Sstevel@tonic-gate } 80777c478bd9Sstevel@tonic-gate 80787c478bd9Sstevel@tonic-gate /* append security attributes if any */ 8079fa9e4066Sahrens if (aclp != NULL) { 808045916cd2Sjpk (void) append_secattr(&secinfo, &len, acl_cnt(aclp), 8081b249c65cSmarks acl_totext(aclp, ACL_APPEND_ID | ACL_COMPACT_FMT | 8082b249c65cSmarks ACL_SID_FMT), (acl_type(aclp) == ACLENT_T) ? 8083b249c65cSmarks UFSD_ACL : ACE_ACL); 808445916cd2Sjpk } 808545916cd2Sjpk 808645916cd2Sjpk if (Tflag) { 808745916cd2Sjpk /* append Trusted Extensions extended attributes */ 808845916cd2Sjpk append_ext_attr(shortname, &secinfo, &len); 808945916cd2Sjpk (void) write_ancillary(&dblock, secinfo, len, ACL_HDR); 809045916cd2Sjpk 809145916cd2Sjpk } else if (aclp != NULL) { 80927c478bd9Sstevel@tonic-gate (void) write_ancillary(&dblock, secinfo, len, ACL_HDR); 80937c478bd9Sstevel@tonic-gate } 80947c478bd9Sstevel@tonic-gate } 80957c478bd9Sstevel@tonic-gate return (0); 80967c478bd9Sstevel@tonic-gate } 80977c478bd9Sstevel@tonic-gate 80987c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 80997c478bd9Sstevel@tonic-gate static int 8100da6c28aaSamw put_xattr_hdr(char *longname, char *shortname, char *longattrname, char *prefix, 81017c478bd9Sstevel@tonic-gate int typeflag, int filetype, struct linkbuf *lp) 81027c478bd9Sstevel@tonic-gate { 81037c478bd9Sstevel@tonic-gate char *lname = NULL; 81047c478bd9Sstevel@tonic-gate char *sname = NULL; 81057c478bd9Sstevel@tonic-gate int error = 0; 81067c478bd9Sstevel@tonic-gate static char *attrbuf = NULL; 81077c478bd9Sstevel@tonic-gate int attrlen; 81087c478bd9Sstevel@tonic-gate 81097c478bd9Sstevel@tonic-gate lname = malloc(sizeof (char) * strlen("/dev/null") + 1 + 81107c478bd9Sstevel@tonic-gate strlen(shortname) + strlen(".hdr") + 1); 81117c478bd9Sstevel@tonic-gate 81127c478bd9Sstevel@tonic-gate if (lname == NULL) { 81137c478bd9Sstevel@tonic-gate fatal(gettext("Out of Memory.")); 81147c478bd9Sstevel@tonic-gate } 81157c478bd9Sstevel@tonic-gate sname = malloc(sizeof (char) * strlen(shortname) + 8116da6c28aaSamw strlen(".hdr") + 1); 81177c478bd9Sstevel@tonic-gate if (sname == NULL) { 81187c478bd9Sstevel@tonic-gate fatal(gettext("Out of Memory.")); 81197c478bd9Sstevel@tonic-gate } 81207c478bd9Sstevel@tonic-gate 81217c478bd9Sstevel@tonic-gate (void) sprintf(sname, "%s.hdr", shortname); 81227c478bd9Sstevel@tonic-gate (void) sprintf(lname, "/dev/null/%s", sname); 81237c478bd9Sstevel@tonic-gate 81247c478bd9Sstevel@tonic-gate if (strlcpy(dblock.dbuf.name, lname, sizeof (dblock.dbuf.name)) >= 81257c478bd9Sstevel@tonic-gate sizeof (dblock.dbuf.name)) { 81267c478bd9Sstevel@tonic-gate fatal(gettext( 81277c478bd9Sstevel@tonic-gate "Buffer overflow writing extended attribute file name")); 81287c478bd9Sstevel@tonic-gate } 81297c478bd9Sstevel@tonic-gate 81307c478bd9Sstevel@tonic-gate /* 81317c478bd9Sstevel@tonic-gate * dump extended attr lookup info 81327c478bd9Sstevel@tonic-gate */ 8133da6c28aaSamw prepare_xattr(&attrbuf, longname, longattrname, typeflag, lp, &attrlen); 81347c478bd9Sstevel@tonic-gate write_ancillary(&dblock, attrbuf, attrlen, _XATTR_HDRTYPE); 81357c478bd9Sstevel@tonic-gate 81367c478bd9Sstevel@tonic-gate (void) sprintf(lname, "/dev/null/%s", shortname); 81377c478bd9Sstevel@tonic-gate (void) strncpy(dblock.dbuf.name, sname, NAMSIZ); 81387c478bd9Sstevel@tonic-gate 81397c478bd9Sstevel@tonic-gate /* 81407c478bd9Sstevel@tonic-gate * Set up filename for attribute 81417c478bd9Sstevel@tonic-gate */ 81427c478bd9Sstevel@tonic-gate 81437c478bd9Sstevel@tonic-gate error = build_dblock(lname, tchar, '0', filetype, 81447c478bd9Sstevel@tonic-gate &stbuf, stbuf.st_dev, prefix); 81457c478bd9Sstevel@tonic-gate free(lname); 81467c478bd9Sstevel@tonic-gate free(sname); 81477c478bd9Sstevel@tonic-gate 81487c478bd9Sstevel@tonic-gate return (error); 81497c478bd9Sstevel@tonic-gate } 81507c478bd9Sstevel@tonic-gate #endif 81517c478bd9Sstevel@tonic-gate 81527c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 81537c478bd9Sstevel@tonic-gate static int 8154da6c28aaSamw read_xattr_hdr(attr_data_t **attrinfo) 81557c478bd9Sstevel@tonic-gate { 81567c478bd9Sstevel@tonic-gate char buf[TBLOCK]; 8157da6c28aaSamw char *attrparent = NULL; 81587c478bd9Sstevel@tonic-gate blkcnt_t blocks; 81597c478bd9Sstevel@tonic-gate char *tp; 81607c478bd9Sstevel@tonic-gate off_t bytes; 81617c478bd9Sstevel@tonic-gate int comp_len, link_len; 81627c478bd9Sstevel@tonic-gate int namelen; 8163da6c28aaSamw int attrparentlen; 8164da6c28aaSamw int parentfilelen; 81657c478bd9Sstevel@tonic-gate 81667c478bd9Sstevel@tonic-gate if (dblock.dbuf.typeflag != _XATTR_HDRTYPE) 81677c478bd9Sstevel@tonic-gate return (1); 81687c478bd9Sstevel@tonic-gate 81697c478bd9Sstevel@tonic-gate bytes = stbuf.st_size; 81707c478bd9Sstevel@tonic-gate if ((xattrhead = calloc(1, (int)bytes)) == NULL) { 81717c478bd9Sstevel@tonic-gate (void) fprintf(stderr, gettext( 81727c478bd9Sstevel@tonic-gate "Insufficient memory for extended attribute\n")); 81737c478bd9Sstevel@tonic-gate return (1); 81747c478bd9Sstevel@tonic-gate } 81757c478bd9Sstevel@tonic-gate 81767c478bd9Sstevel@tonic-gate tp = (char *)xattrhead; 81777c478bd9Sstevel@tonic-gate blocks = TBLOCKS(bytes); 81787c478bd9Sstevel@tonic-gate while (blocks-- > 0) { 81797c478bd9Sstevel@tonic-gate readtape(buf); 81807c478bd9Sstevel@tonic-gate if (bytes <= TBLOCK) { 81817c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, (size_t)bytes); 81827c478bd9Sstevel@tonic-gate break; 81837c478bd9Sstevel@tonic-gate } else { 81847c478bd9Sstevel@tonic-gate (void) memcpy(tp, buf, TBLOCK); 81857c478bd9Sstevel@tonic-gate tp += TBLOCK; 81867c478bd9Sstevel@tonic-gate } 81877c478bd9Sstevel@tonic-gate bytes -= TBLOCK; 81887c478bd9Sstevel@tonic-gate } 81897c478bd9Sstevel@tonic-gate 81907c478bd9Sstevel@tonic-gate /* 81917c478bd9Sstevel@tonic-gate * Validate that we can handle header format 81927c478bd9Sstevel@tonic-gate */ 81937c478bd9Sstevel@tonic-gate if (strcmp(xattrhead->h_version, XATTR_ARCH_VERS) != 0) { 81947c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 81957c478bd9Sstevel@tonic-gate gettext("Unknown extended attribute format encountered\n")); 81967c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 81977c478bd9Sstevel@tonic-gate gettext("Disabling extended attribute parsing\n")); 81987c478bd9Sstevel@tonic-gate xattrbadhead = 1; 81997c478bd9Sstevel@tonic-gate return (0); 82007c478bd9Sstevel@tonic-gate } 82017c478bd9Sstevel@tonic-gate (void) sscanf(xattrhead->h_component_len, "%10d", &comp_len); 82027c478bd9Sstevel@tonic-gate (void) sscanf(xattrhead->h_link_component_len, "%10d", &link_len); 82037c478bd9Sstevel@tonic-gate xattrp = (struct xattr_buf *)(((char *)xattrhead) + 82047c478bd9Sstevel@tonic-gate sizeof (struct xattr_hdr)); 82057c478bd9Sstevel@tonic-gate (void) sscanf(xattrp->h_namesz, "%7d", &namelen); 82067c478bd9Sstevel@tonic-gate if (link_len > 0) 82077c478bd9Sstevel@tonic-gate xattr_linkp = (struct xattr_buf *) 82087c478bd9Sstevel@tonic-gate ((int)xattrp + (int)comp_len); 82097c478bd9Sstevel@tonic-gate else 82107c478bd9Sstevel@tonic-gate xattr_linkp = NULL; 82117c478bd9Sstevel@tonic-gate 8212da6c28aaSamw /* 8213da6c28aaSamw * Gather the attribute path from the filename and attrnames section. 8214da6c28aaSamw * The filename and attrnames section can be composed of two or more 8215da6c28aaSamw * path segments separated by a null character. The first segment 8216da6c28aaSamw * is the path to the parent file that roots the entire sequence in 8217da6c28aaSamw * the normal name space. The remaining segments describes a path 8218da6c28aaSamw * rooted at the hidden extended attribute directory of the leaf file of 8219da6c28aaSamw * the previous segment, making it possible to name attributes on 8220da6c28aaSamw * attributes. 8221da6c28aaSamw */ 8222da6c28aaSamw parentfilelen = strlen(xattrp->h_names); 8223da6c28aaSamw xattrapath = xattrp->h_names + parentfilelen + 1; 8224da6c28aaSamw if ((strlen(xattrapath) + parentfilelen + 2) < namelen) { 8225da6c28aaSamw /* 8226da6c28aaSamw * The attrnames section contains a system attribute on an 8227da6c28aaSamw * attribute. Save the name of the attribute for use later, 8228da6c28aaSamw * and replace the null separating the attribute name from 8229da6c28aaSamw * the system attribute name with a '/' so that xattrapath can 8230da6c28aaSamw * be used to display messages with the full attribute path name 8231da6c28aaSamw * rooted at the hidden attribute directory of the base file 8232da6c28aaSamw * in normal name space. 8233da6c28aaSamw */ 8234da6c28aaSamw attrparent = strdup(xattrapath); 8235da6c28aaSamw attrparentlen = strlen(attrparent); 8236da6c28aaSamw xattrapath[attrparentlen] = '/'; 8237da6c28aaSamw } 8238da6c28aaSamw if ((fill_in_attr_info((attrparent == NULL) ? xattrapath : 8239da6c28aaSamw xattrapath + attrparentlen + 1, xattrapath, attrparent, 8240da6c28aaSamw -1, 0, attrinfo)) == 1) { 8241da6c28aaSamw free(attrparent); 8242da6c28aaSamw return (1); 8243da6c28aaSamw } 8244da6c28aaSamw 8245da6c28aaSamw /* Gather link info */ 82467c478bd9Sstevel@tonic-gate if (xattr_linkp) { 82477c478bd9Sstevel@tonic-gate xattr_linkaname = xattr_linkp->h_names + 82487c478bd9Sstevel@tonic-gate strlen(xattr_linkp->h_names) + 1; 82497c478bd9Sstevel@tonic-gate } else { 82507c478bd9Sstevel@tonic-gate xattr_linkaname = NULL; 82517c478bd9Sstevel@tonic-gate } 8252d2443e76Smarks 82537c478bd9Sstevel@tonic-gate return (0); 82547c478bd9Sstevel@tonic-gate } 82557c478bd9Sstevel@tonic-gate #else 82567c478bd9Sstevel@tonic-gate static int 8257da6c28aaSamw read_xattr_hdr(attr_data_t **attrinfo) 82587c478bd9Sstevel@tonic-gate { 82597c478bd9Sstevel@tonic-gate return (0); 82607c478bd9Sstevel@tonic-gate } 82617c478bd9Sstevel@tonic-gate #endif 82627c478bd9Sstevel@tonic-gate 82637c478bd9Sstevel@tonic-gate /* 82647c478bd9Sstevel@tonic-gate * skip over extra slashes in string. 82657c478bd9Sstevel@tonic-gate * 82667c478bd9Sstevel@tonic-gate * For example: 82677c478bd9Sstevel@tonic-gate * /usr/tmp///// 82687c478bd9Sstevel@tonic-gate * 82697c478bd9Sstevel@tonic-gate * would return pointer at 82707c478bd9Sstevel@tonic-gate * /usr/tmp///// 82717c478bd9Sstevel@tonic-gate * ^ 82727c478bd9Sstevel@tonic-gate */ 82737c478bd9Sstevel@tonic-gate static char * 82747c478bd9Sstevel@tonic-gate skipslashes(char *string, char *start) 82757c478bd9Sstevel@tonic-gate { 82767c478bd9Sstevel@tonic-gate while ((string > start) && *(string - 1) == '/') { 82777c478bd9Sstevel@tonic-gate string--; 82787c478bd9Sstevel@tonic-gate } 82797c478bd9Sstevel@tonic-gate 82807c478bd9Sstevel@tonic-gate return (string); 82817c478bd9Sstevel@tonic-gate } 82827c478bd9Sstevel@tonic-gate 82837c478bd9Sstevel@tonic-gate /* 82847c478bd9Sstevel@tonic-gate * Return the parent directory of a given path. 82857c478bd9Sstevel@tonic-gate * 82867c478bd9Sstevel@tonic-gate * Examples: 82877c478bd9Sstevel@tonic-gate * /usr/tmp return /usr 82887c478bd9Sstevel@tonic-gate * /usr/tmp/file return /usr/tmp 82897c478bd9Sstevel@tonic-gate * / returns . 82907c478bd9Sstevel@tonic-gate * /usr returns / 82917c478bd9Sstevel@tonic-gate * file returns . 82927c478bd9Sstevel@tonic-gate * 82937c478bd9Sstevel@tonic-gate * dir is assumed to be at least as big as path. 82947c478bd9Sstevel@tonic-gate */ 82957c478bd9Sstevel@tonic-gate static void 82967c478bd9Sstevel@tonic-gate get_parent(char *path, char *dir) 82977c478bd9Sstevel@tonic-gate { 82987c478bd9Sstevel@tonic-gate char *s; 82997c478bd9Sstevel@tonic-gate char tmpdir[PATH_MAX + 1]; 83007c478bd9Sstevel@tonic-gate 83017c478bd9Sstevel@tonic-gate if (strlen(path) > PATH_MAX) { 83027c478bd9Sstevel@tonic-gate fatal(gettext("pathname is too long")); 83037c478bd9Sstevel@tonic-gate } 83047c478bd9Sstevel@tonic-gate (void) strcpy(tmpdir, path); 83057c478bd9Sstevel@tonic-gate chop_endslashes(tmpdir); 83067c478bd9Sstevel@tonic-gate 83077c478bd9Sstevel@tonic-gate if ((s = strrchr(tmpdir, '/')) == NULL) { 83087c478bd9Sstevel@tonic-gate (void) strcpy(dir, "."); 83097c478bd9Sstevel@tonic-gate } else { 83107c478bd9Sstevel@tonic-gate s = skipslashes(s, tmpdir); 83117c478bd9Sstevel@tonic-gate *s = '\0'; 83127c478bd9Sstevel@tonic-gate if (s == tmpdir) 83137c478bd9Sstevel@tonic-gate (void) strcpy(dir, "/"); 83147c478bd9Sstevel@tonic-gate else 83157c478bd9Sstevel@tonic-gate (void) strcpy(dir, tmpdir); 83167c478bd9Sstevel@tonic-gate } 83177c478bd9Sstevel@tonic-gate } 83187c478bd9Sstevel@tonic-gate 83197c478bd9Sstevel@tonic-gate #if defined(O_XATTR) 83207c478bd9Sstevel@tonic-gate static char * 83217c478bd9Sstevel@tonic-gate get_component(char *path) 83227c478bd9Sstevel@tonic-gate { 83237c478bd9Sstevel@tonic-gate char *ptr; 83247c478bd9Sstevel@tonic-gate 83257c478bd9Sstevel@tonic-gate ptr = strrchr(path, '/'); 83267c478bd9Sstevel@tonic-gate if (ptr == NULL) { 83277c478bd9Sstevel@tonic-gate return (path); 83287c478bd9Sstevel@tonic-gate } else { 83297c478bd9Sstevel@tonic-gate /* 83307c478bd9Sstevel@tonic-gate * Handle trailing slash 83317c478bd9Sstevel@tonic-gate */ 83327c478bd9Sstevel@tonic-gate if (*(ptr + 1) == '\0') 83337c478bd9Sstevel@tonic-gate return (ptr); 83347c478bd9Sstevel@tonic-gate else 83357c478bd9Sstevel@tonic-gate return (ptr + 1); 83367c478bd9Sstevel@tonic-gate } 83377c478bd9Sstevel@tonic-gate } 83387c478bd9Sstevel@tonic-gate #else 83397c478bd9Sstevel@tonic-gate static char * 83407c478bd9Sstevel@tonic-gate get_component(char *path) 83417c478bd9Sstevel@tonic-gate { 83427c478bd9Sstevel@tonic-gate return (path); 83437c478bd9Sstevel@tonic-gate } 83447c478bd9Sstevel@tonic-gate #endif 83457c478bd9Sstevel@tonic-gate 8346da6c28aaSamw #if defined(O_XATTR) 83477c478bd9Sstevel@tonic-gate static int 8348da6c28aaSamw retry_open_attr(int pdirfd, int cwd, char *dirp, char *pattr, char *name, 8349da6c28aaSamw int oflag, mode_t mode) 83507c478bd9Sstevel@tonic-gate { 8351da6c28aaSamw int dirfd; 8352da6c28aaSamw int ofilefd = -1; 83537c478bd9Sstevel@tonic-gate struct timeval times[2]; 83547c478bd9Sstevel@tonic-gate mode_t newmode; 83557c478bd9Sstevel@tonic-gate struct stat parentstat; 8356d2443e76Smarks acl_t *aclp = NULL; 8357d2443e76Smarks int error; 83587c478bd9Sstevel@tonic-gate 83597c478bd9Sstevel@tonic-gate /* 83607c478bd9Sstevel@tonic-gate * We couldn't get to attrdir. See if its 83617c478bd9Sstevel@tonic-gate * just a mode problem on the parent file. 83627c478bd9Sstevel@tonic-gate * for example: a mode such as r-xr--r-- 8363da6c28aaSamw * on a ufs file system without extended 8364da6c28aaSamw * system attribute support won't let us 8365da6c28aaSamw * create an attribute dir if it doesn't 8366da6c28aaSamw * already exist, and on a ufs file system 8367da6c28aaSamw * with extended system attribute support 8368da6c28aaSamw * won't let us open the attribute for 8369da6c28aaSamw * write. 8370d2443e76Smarks * 8371d2443e76Smarks * If file has a non-trivial ACL, then save it 8372d2443e76Smarks * off so that we can place it back on after doing 8373d2443e76Smarks * chmod's. 83747c478bd9Sstevel@tonic-gate */ 8375da6c28aaSamw if ((dirfd = openat(cwd, (pattr == NULL) ? dirp : pattr, 8376da6c28aaSamw O_RDONLY)) == -1) { 8377d2443e76Smarks return (-1); 83787c478bd9Sstevel@tonic-gate } 8379da6c28aaSamw if (fstat(dirfd, &parentstat) == -1) { 8380da6c28aaSamw (void) fprintf(stderr, gettext( 8381da6c28aaSamw "tar: cannot stat %sfile %s: %s\n"), 8382da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8383da6c28aaSamw (pdirfd == -1) ? dirp : name, strerror(errno)); 8384da6c28aaSamw return (-1); 8385da6c28aaSamw } 8386da6c28aaSamw if ((error = facl_get(dirfd, ACL_NO_TRIVIAL, &aclp)) != 0) { 8387da6c28aaSamw (void) fprintf(stderr, gettext( 8388da6c28aaSamw "tar: failed to retrieve ACL on %sfile %s: %s\n"), 8389da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8390da6c28aaSamw (pdirfd == -1) ? dirp : name, strerror(errno)); 8391d2443e76Smarks return (-1); 8392d2443e76Smarks } 8393d2443e76Smarks 83947c478bd9Sstevel@tonic-gate newmode = S_IWUSR | parentstat.st_mode; 8395da6c28aaSamw if (fchmod(dirfd, newmode) == -1) { 83967c478bd9Sstevel@tonic-gate (void) fprintf(stderr, 8397da6c28aaSamw gettext( 8398da6c28aaSamw "tar: cannot fchmod %sfile %s to %o: %s\n"), 8399da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8400da6c28aaSamw (pdirfd == -1) ? dirp : name, newmode, strerror(errno)); 8401d2443e76Smarks if (aclp) 8402d2443e76Smarks acl_free(aclp); 8403d2443e76Smarks return (-1); 84047c478bd9Sstevel@tonic-gate } 84057c478bd9Sstevel@tonic-gate 8406d2443e76Smarks 8407da6c28aaSamw if (pdirfd == -1) { 8408d2443e76Smarks /* 8409da6c28aaSamw * We weren't able to create the attribute directory before. 8410da6c28aaSamw * Now try again. 8411d2443e76Smarks */ 8412da6c28aaSamw ofilefd = attropen(dirp, ".", oflag); 8413da6c28aaSamw } else { 8414da6c28aaSamw /* 8415da6c28aaSamw * We weren't able to create open the attribute before. 8416da6c28aaSamw * Now try again. 8417da6c28aaSamw */ 8418da6c28aaSamw ofilefd = openat(pdirfd, name, oflag, mode); 8419da6c28aaSamw } 84207c478bd9Sstevel@tonic-gate 84217c478bd9Sstevel@tonic-gate /* 84227c478bd9Sstevel@tonic-gate * Put mode back to original 84237c478bd9Sstevel@tonic-gate */ 8424da6c28aaSamw if (fchmod(dirfd, parentstat.st_mode) == -1) { 8425d2443e76Smarks (void) fprintf(stderr, 8426da6c28aaSamw gettext("tar: cannot chmod %sfile %s to %o: %s\n"), 8427da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8428da6c28aaSamw (pdirfd == -1) ? dirp : name, newmode, strerror(errno)); 8429d2443e76Smarks } 8430d2443e76Smarks 8431d2443e76Smarks if (aclp) { 8432da6c28aaSamw error = facl_set(dirfd, aclp); 8433d2443e76Smarks if (error) { 8434d2443e76Smarks (void) fprintf(stderr, 8435da6c28aaSamw gettext("tar: failed to set acl entries on " 8436da6c28aaSamw "%sfile %s\n"), 8437da6c28aaSamw (pdirfd == -1) ? "" : gettext("parent of "), 8438da6c28aaSamw (pdirfd == -1) ? dirp : name); 8439d2443e76Smarks } 8440d2443e76Smarks acl_free(aclp); 8441d2443e76Smarks } 84427c478bd9Sstevel@tonic-gate 84437c478bd9Sstevel@tonic-gate /* 84447c478bd9Sstevel@tonic-gate * Put back time stamps 84457c478bd9Sstevel@tonic-gate */ 84467c478bd9Sstevel@tonic-gate 84477c478bd9Sstevel@tonic-gate times[0].tv_sec = parentstat.st_atime; 84487c478bd9Sstevel@tonic-gate times[0].tv_usec = 0; 84497c478bd9Sstevel@tonic-gate times[1].tv_sec = parentstat.st_mtime; 84507c478bd9Sstevel@tonic-gate times[1].tv_usec = 0; 84517c478bd9Sstevel@tonic-gate 8452da6c28aaSamw (void) futimesat(cwd, (pattr == NULL) ? dirp : pattr, times); 8453da6c28aaSamw 8454da6c28aaSamw (void) close(dirfd); 8455da6c28aaSamw 8456da6c28aaSamw return (ofilefd); 84577c478bd9Sstevel@tonic-gate } 8458da6c28aaSamw #endif 84597c478bd9Sstevel@tonic-gate 84607c478bd9Sstevel@tonic-gate #if !defined(O_XATTR) 84617c478bd9Sstevel@tonic-gate static int 84627c478bd9Sstevel@tonic-gate openat64(int fd, const char *name, int oflag, mode_t cmode) 84637c478bd9Sstevel@tonic-gate { 84647c478bd9Sstevel@tonic-gate return (open64(name, oflag, cmode)); 84657c478bd9Sstevel@tonic-gate } 84667c478bd9Sstevel@tonic-gate 84677c478bd9Sstevel@tonic-gate static int 84687c478bd9Sstevel@tonic-gate openat(int fd, const char *name, int oflag, mode_t cmode) 84697c478bd9Sstevel@tonic-gate { 84707c478bd9Sstevel@tonic-gate return (open(name, oflag, cmode)); 84717c478bd9Sstevel@tonic-gate } 84727c478bd9Sstevel@tonic-gate 84737c478bd9Sstevel@tonic-gate static int 84747c478bd9Sstevel@tonic-gate fchownat(int fd, const char *name, uid_t owner, gid_t group, int flag) 84757c478bd9Sstevel@tonic-gate { 84767c478bd9Sstevel@tonic-gate if (flag == AT_SYMLINK_NOFOLLOW) 84777c478bd9Sstevel@tonic-gate return (lchown(name, owner, group)); 84787c478bd9Sstevel@tonic-gate else 84797c478bd9Sstevel@tonic-gate return (chown(name, owner, group)); 84807c478bd9Sstevel@tonic-gate } 84817c478bd9Sstevel@tonic-gate 84827c478bd9Sstevel@tonic-gate static int 84837c478bd9Sstevel@tonic-gate renameat(int fromfd, char *old, int tofd, char *new) 84847c478bd9Sstevel@tonic-gate { 84857c478bd9Sstevel@tonic-gate return (rename(old, new)); 84867c478bd9Sstevel@tonic-gate } 84877c478bd9Sstevel@tonic-gate 84887c478bd9Sstevel@tonic-gate static int 84897c478bd9Sstevel@tonic-gate futimesat(int fd, char *path, struct timeval times[2]) 84907c478bd9Sstevel@tonic-gate { 84917c478bd9Sstevel@tonic-gate return (utimes(path, times)); 84927c478bd9Sstevel@tonic-gate } 84937c478bd9Sstevel@tonic-gate 84947c478bd9Sstevel@tonic-gate static int 84957c478bd9Sstevel@tonic-gate unlinkat(int dirfd, char *path, int flag) 84967c478bd9Sstevel@tonic-gate { 84977c478bd9Sstevel@tonic-gate if (flag == AT_REMOVEDIR) 84987c478bd9Sstevel@tonic-gate return (rmdir(path)); 84997c478bd9Sstevel@tonic-gate else 85007c478bd9Sstevel@tonic-gate return (unlink(path)); 85017c478bd9Sstevel@tonic-gate } 85027c478bd9Sstevel@tonic-gate 85037c478bd9Sstevel@tonic-gate static int 85047c478bd9Sstevel@tonic-gate fstatat(int fd, char *path, struct stat *buf, int flag) 85057c478bd9Sstevel@tonic-gate { 85067c478bd9Sstevel@tonic-gate if (flag == AT_SYMLINK_NOFOLLOW) 85077c478bd9Sstevel@tonic-gate return (lstat(path, buf)); 85087c478bd9Sstevel@tonic-gate else 85097c478bd9Sstevel@tonic-gate return (stat(path, buf)); 85107c478bd9Sstevel@tonic-gate } 85117c478bd9Sstevel@tonic-gate 85127c478bd9Sstevel@tonic-gate static int 85137c478bd9Sstevel@tonic-gate attropen(char *file, char *attr, int omode, mode_t cmode) 85147c478bd9Sstevel@tonic-gate { 85157c478bd9Sstevel@tonic-gate errno = ENOTSUP; 85167c478bd9Sstevel@tonic-gate return (-1); 85177c478bd9Sstevel@tonic-gate } 85187c478bd9Sstevel@tonic-gate #endif 85197c478bd9Sstevel@tonic-gate 85207c478bd9Sstevel@tonic-gate static void 85217c478bd9Sstevel@tonic-gate chop_endslashes(char *path) 85227c478bd9Sstevel@tonic-gate { 85237c478bd9Sstevel@tonic-gate char *end, *ptr; 85247c478bd9Sstevel@tonic-gate 85257c478bd9Sstevel@tonic-gate /* 85267c478bd9Sstevel@tonic-gate * Chop of slashes, but not if all we have is slashes 85277c478bd9Sstevel@tonic-gate * for example: //// 85287c478bd9Sstevel@tonic-gate * should make no changes, otherwise it will screw up 85297c478bd9Sstevel@tonic-gate * checkdir 85307c478bd9Sstevel@tonic-gate */ 85317c478bd9Sstevel@tonic-gate end = &path[strlen(path) -1]; 85327c478bd9Sstevel@tonic-gate if (*end == '/' && end != path) { 85337c478bd9Sstevel@tonic-gate ptr = skipslashes(end, path); 85347c478bd9Sstevel@tonic-gate if (ptr != NULL && ptr != path) { 85357c478bd9Sstevel@tonic-gate *ptr = '\0'; 85367c478bd9Sstevel@tonic-gate } 85377c478bd9Sstevel@tonic-gate } 85387c478bd9Sstevel@tonic-gate } 853945916cd2Sjpk /* Trusted Extensions */ 854045916cd2Sjpk 854145916cd2Sjpk /* 854245916cd2Sjpk * append_ext_attr(): 854345916cd2Sjpk * 854445916cd2Sjpk * Append extended attributes and other information into the buffer 854545916cd2Sjpk * that gets written to the ancillary file. 854645916cd2Sjpk * 854745916cd2Sjpk * With option 'T', we create a tarfile which 854845916cd2Sjpk * has an ancillary file each corresponding archived file. 854945916cd2Sjpk * Each ancillary file contains 1 or more of the 855045916cd2Sjpk * following attributes: 855145916cd2Sjpk * 855245916cd2Sjpk * attribute type attribute process procedure 855345916cd2Sjpk * ---------------- ---------------- -------------------------- 855445916cd2Sjpk * DIR_TYPE = 'D' directory flag append if a directory 855545916cd2Sjpk * LBL_TYPE = 'L' SL[IL] or SL append ascii label 855645916cd2Sjpk * 855745916cd2Sjpk * 855845916cd2Sjpk */ 855945916cd2Sjpk static void 856045916cd2Sjpk append_ext_attr(char *shortname, char **secinfo, int *len) 856145916cd2Sjpk { 856245916cd2Sjpk bslabel_t b_slabel; /* binary sensitvity label */ 856345916cd2Sjpk char *ascii = NULL; /* ascii label */ 856445916cd2Sjpk 856545916cd2Sjpk /* 856645916cd2Sjpk * For each attribute type, append it if it is 856745916cd2Sjpk * relevant to the file type. 856845916cd2Sjpk */ 856945916cd2Sjpk 857045916cd2Sjpk /* 857145916cd2Sjpk * For attribute type DIR_TYPE, 857245916cd2Sjpk * append it to the following file type: 857345916cd2Sjpk * 857445916cd2Sjpk * S_IFDIR: directories 857545916cd2Sjpk */ 857645916cd2Sjpk 857745916cd2Sjpk /* 857845916cd2Sjpk * For attribute type LBL_TYPE, 857945916cd2Sjpk * append it to the following file type: 858045916cd2Sjpk * 858145916cd2Sjpk * S_IFDIR: directories (including mld, sld) 858245916cd2Sjpk * S_IFLNK: symbolic link 858345916cd2Sjpk * S_IFREG: regular file but not hard link 858445916cd2Sjpk * S_IFIFO: FIFO file but not hard link 858545916cd2Sjpk * S_IFCHR: char special file but not hard link 858645916cd2Sjpk * S_IFBLK: block special file but not hard link 858745916cd2Sjpk */ 858845916cd2Sjpk switch (stbuf.st_mode & S_IFMT) { 858945916cd2Sjpk 859045916cd2Sjpk case S_IFDIR: 859145916cd2Sjpk 859245916cd2Sjpk /* 859345916cd2Sjpk * append DIR_TYPE 859445916cd2Sjpk */ 859545916cd2Sjpk (void) append_secattr(secinfo, len, 1, 859645916cd2Sjpk "\0", DIR_TYPE); 859745916cd2Sjpk 859845916cd2Sjpk /* 859945916cd2Sjpk * Get and append attribute types LBL_TYPE. 860045916cd2Sjpk * For directories, LBL_TYPE contains SL. 860145916cd2Sjpk */ 860245916cd2Sjpk /* get binary sensitivity label */ 860345916cd2Sjpk if (getlabel(shortname, &b_slabel) != 0) { 860445916cd2Sjpk (void) fprintf(stderr, 860545916cd2Sjpk gettext("tar: can't get sensitvity label for " 860645916cd2Sjpk " %s, getlabel() error: %s\n"), 860745916cd2Sjpk shortname, strerror(errno)); 860845916cd2Sjpk } else { 860945916cd2Sjpk /* get ascii SL */ 861045916cd2Sjpk if (bsltos(&b_slabel, &ascii, 861145916cd2Sjpk 0, 0) <= 0) { 861245916cd2Sjpk (void) fprintf(stderr, 861345916cd2Sjpk gettext("tar: can't get ascii SL for" 861445916cd2Sjpk " %s\n"), shortname); 861545916cd2Sjpk } else { 861645916cd2Sjpk /* append LBL_TYPE */ 861745916cd2Sjpk (void) append_secattr(secinfo, len, 861845916cd2Sjpk strlen(ascii) + 1, ascii, 861945916cd2Sjpk LBL_TYPE); 862045916cd2Sjpk 862145916cd2Sjpk /* free storage */ 862245916cd2Sjpk if (ascii != NULL) { 862345916cd2Sjpk free(ascii); 862445916cd2Sjpk ascii = (char *)0; 862545916cd2Sjpk } 862645916cd2Sjpk } 862745916cd2Sjpk 862845916cd2Sjpk } 862945916cd2Sjpk break; 863045916cd2Sjpk 863145916cd2Sjpk case S_IFLNK: 863245916cd2Sjpk case S_IFREG: 863345916cd2Sjpk case S_IFIFO: 863445916cd2Sjpk case S_IFCHR: 863545916cd2Sjpk case S_IFBLK: 863645916cd2Sjpk 863745916cd2Sjpk /* get binary sensitivity label */ 863845916cd2Sjpk if (getlabel(shortname, &b_slabel) != 0) { 863945916cd2Sjpk (void) fprintf(stderr, 864045916cd2Sjpk gettext("tar: can't get sensitivty label for %s, " 864145916cd2Sjpk "getlabel() error: %s\n"), 864245916cd2Sjpk shortname, strerror(errno)); 864345916cd2Sjpk } else { 864445916cd2Sjpk /* get ascii IL[SL] */ 864545916cd2Sjpk if (bsltos(&b_slabel, &ascii, 0, 0) <= 0) { 864645916cd2Sjpk (void) fprintf(stderr, 864745916cd2Sjpk gettext("tar: can't translate sensitivity " 864845916cd2Sjpk " label for %s\n"), shortname); 864945916cd2Sjpk } else { 865045916cd2Sjpk char *cmw_label; 865145916cd2Sjpk size_t cmw_length; 865245916cd2Sjpk 865345916cd2Sjpk cmw_length = strlen("ADMIN_LOW [] ") + 865445916cd2Sjpk strlen(ascii); 865545916cd2Sjpk if ((cmw_label = malloc(cmw_length)) == NULL) { 865645916cd2Sjpk (void) fprintf(stderr, gettext( 865745916cd2Sjpk "Insufficient memory for label\n")); 865845916cd2Sjpk exit(1); 865945916cd2Sjpk } 866045916cd2Sjpk /* append LBL_TYPE */ 866145916cd2Sjpk (void) snprintf(cmw_label, cmw_length, 866245916cd2Sjpk "ADMIN_LOW [%s]", ascii); 866345916cd2Sjpk (void) append_secattr(secinfo, len, 866445916cd2Sjpk strlen(cmw_label) + 1, cmw_label, 866545916cd2Sjpk LBL_TYPE); 866645916cd2Sjpk 866745916cd2Sjpk /* free storage */ 866845916cd2Sjpk if (ascii != NULL) { 866945916cd2Sjpk free(cmw_label); 867045916cd2Sjpk free(ascii); 867145916cd2Sjpk ascii = (char *)0; 867245916cd2Sjpk } 867345916cd2Sjpk } 867445916cd2Sjpk } 867545916cd2Sjpk break; 867645916cd2Sjpk 867745916cd2Sjpk default: 867845916cd2Sjpk break; 867945916cd2Sjpk } /* end switch for LBL_TYPE */ 868045916cd2Sjpk 868145916cd2Sjpk 868245916cd2Sjpk /* DONE !! */ 868345916cd2Sjpk return; 868445916cd2Sjpk 868545916cd2Sjpk } /* end of append_ext_attr */ 868645916cd2Sjpk 868745916cd2Sjpk 868845916cd2Sjpk /* 868945916cd2Sjpk * Name: extract_attr() 869045916cd2Sjpk * 869145916cd2Sjpk * Description: 869245916cd2Sjpk * Process attributes from the ancillary file due to 869345916cd2Sjpk * the T option. 869445916cd2Sjpk * 869545916cd2Sjpk * Call by doxtract() as part of the switch case structure. 869645916cd2Sjpk * Making this a separate routine because the nesting are too 869745916cd2Sjpk * deep in doxtract, thus, leaving very little space 869845916cd2Sjpk * on each line for instructions. 869945916cd2Sjpk * 870045916cd2Sjpk * With option 'T', we extract from a TS 8 or TS 2.5 ancillary file 870145916cd2Sjpk * 870245916cd2Sjpk * For option 'T', following are possible attributes in 870345916cd2Sjpk * a TS 8 ancillary file: (NOTE: No IL support) 870445916cd2Sjpk * 870545916cd2Sjpk * attribute type attribute process procedure 870645916cd2Sjpk * ---------------- ---------------- ------------------------- 870745916cd2Sjpk * # LBL_TYPE = 'L' SL construct binary label 870845916cd2Sjpk * # APRIV_TYPE = 'P' allowed priv construct privileges 870945916cd2Sjpk * # FPRIV_TYPE = 'p' forced priv construct privileges 871045916cd2Sjpk * # COMP_TYPE = 'C' path component construct real path 871145916cd2Sjpk * # DIR_TYPE = 'D' directory flag note it is a directory 871245916cd2Sjpk * $ UFSD_ACL = '1' ACL data construct ACL entries 871345916cd2Sjpk * ATTR_FLAG_TYPE = 'F' file attr flags construct binary flags 871445916cd2Sjpk * LK_COMP_TYPE = 'K' linked path comp construct linked real path 871545916cd2Sjpk * 871645916cd2Sjpk * note: # = attribute names common between TS 8 & TS 2.5 ancillary 871745916cd2Sjpk * files. 871845916cd2Sjpk * $ = ACL attribute is processed for the option 'p', it doesn't 871945916cd2Sjpk * need option 'T'. 872045916cd2Sjpk * 872145916cd2Sjpk * Trusted Extensions ignores APRIV_TYPE, FPRIV_TYPE, and ATTR_FLAG_TYPE 872245916cd2Sjpk * 872345916cd2Sjpk */ 872445916cd2Sjpk static void 872545916cd2Sjpk extract_attr(char **file_ptr, struct sec_attr *attr) 872645916cd2Sjpk { 872745916cd2Sjpk int reterr, err; 872845916cd2Sjpk char *dummy_buf; /* for attribute extract */ 872945916cd2Sjpk 873045916cd2Sjpk dummy_buf = attr->attr_info; 873145916cd2Sjpk 873245916cd2Sjpk switch (attr->attr_type) { 873345916cd2Sjpk 873445916cd2Sjpk case DIR_TYPE: 873545916cd2Sjpk 873645916cd2Sjpk dir_flag++; 873745916cd2Sjpk break; 873845916cd2Sjpk 873945916cd2Sjpk case LBL_TYPE: 874045916cd2Sjpk 874145916cd2Sjpk /* 874245916cd2Sjpk * LBL_TYPE is used to indicate SL for directory, and 874345916cd2Sjpk * CMW label for other file types. 874445916cd2Sjpk */ 874545916cd2Sjpk 874645916cd2Sjpk if (!dir_flag) { /* not directory */ 874745916cd2Sjpk /* Skip over IL portion */ 874845916cd2Sjpk char *sl_ptr = strchr(dummy_buf, '['); 874945916cd2Sjpk 875045916cd2Sjpk if (sl_ptr == NULL) 875145916cd2Sjpk err = 0; 875245916cd2Sjpk else 875345916cd2Sjpk err = stobsl(sl_ptr, &bs_label, 875445916cd2Sjpk NEW_LABEL, &reterr); 875545916cd2Sjpk } else { /* directory */ 875645916cd2Sjpk err = stobsl(dummy_buf, &bs_label, 875745916cd2Sjpk NEW_LABEL, &reterr); 875845916cd2Sjpk } 875945916cd2Sjpk if (err == 0) { 876045916cd2Sjpk (void) fprintf(stderr, gettext("tar: " 876145916cd2Sjpk "can't convert %s to binary label\n"), 876245916cd2Sjpk dummy_buf); 876345916cd2Sjpk bslundef(&bs_label); 876445916cd2Sjpk } else if (!blequal(&bs_label, &admin_low) && 876545916cd2Sjpk !blequal(&bs_label, &admin_high)) { 876645916cd2Sjpk bslabel_t *from_label; 876745916cd2Sjpk char *buf; 876845916cd2Sjpk char tempbuf[MAXPATHLEN]; 876945916cd2Sjpk 877045916cd2Sjpk if (*orig_namep != '/') { 877145916cd2Sjpk /* got relative linked to path */ 877245916cd2Sjpk (void) getcwd(tempbuf, (sizeof (tempbuf))); 877345916cd2Sjpk (void) strncat(tempbuf, "/", MAXPATHLEN); 877445916cd2Sjpk } else 877545916cd2Sjpk *tempbuf = '\0'; 877645916cd2Sjpk 877745916cd2Sjpk buf = real_path; 877845916cd2Sjpk (void) strncat(tempbuf, orig_namep, MAXPATHLEN); 877945916cd2Sjpk from_label = getlabelbypath(tempbuf); 878045916cd2Sjpk if (from_label != NULL) { 878145916cd2Sjpk if (blequal(from_label, &admin_low)) { 878245916cd2Sjpk if ((getpathbylabel(tempbuf, buf, 878345916cd2Sjpk MAXPATHLEN, &bs_label) == NULL)) { 878445916cd2Sjpk (void) fprintf(stderr, 878545916cd2Sjpk gettext("tar: " 878645916cd2Sjpk "can't get zone root path for " 878745916cd2Sjpk "%s\n"), tempbuf); 878845916cd2Sjpk } else 878945916cd2Sjpk rpath_flag = 1; 879045916cd2Sjpk } 879145916cd2Sjpk free(from_label); 879245916cd2Sjpk } 879345916cd2Sjpk } 879445916cd2Sjpk break; 879545916cd2Sjpk 879645916cd2Sjpk case COMP_TYPE: 879745916cd2Sjpk 879845916cd2Sjpk rebuild_comp_path(dummy_buf, file_ptr); 879945916cd2Sjpk break; 880045916cd2Sjpk 880145916cd2Sjpk case LK_COMP_TYPE: 880245916cd2Sjpk 880345916cd2Sjpk if (rebuild_lk_comp_path(dummy_buf, file_ptr) 880445916cd2Sjpk == 0) { 880545916cd2Sjpk lk_rpath_flag = 1; 880645916cd2Sjpk } else { 880745916cd2Sjpk (void) fprintf(stderr, gettext("tar: warning: link's " 880845916cd2Sjpk "target pathname might be invalid.\n")); 880945916cd2Sjpk lk_rpath_flag = 0; 881045916cd2Sjpk } 881145916cd2Sjpk break; 881245916cd2Sjpk case APRIV_TYPE: 881345916cd2Sjpk ignored_aprivs++; 881445916cd2Sjpk break; 881545916cd2Sjpk case FPRIV_TYPE: 881645916cd2Sjpk ignored_fprivs++; 881745916cd2Sjpk break; 881845916cd2Sjpk case ATTR_FLAG_TYPE: 881945916cd2Sjpk ignored_fattrs++; 882045916cd2Sjpk break; 882145916cd2Sjpk 882245916cd2Sjpk default: 882345916cd2Sjpk 882445916cd2Sjpk break; 882545916cd2Sjpk } 882645916cd2Sjpk 882745916cd2Sjpk /* done */ 882845916cd2Sjpk return; 882945916cd2Sjpk 883045916cd2Sjpk } /* end extract_attr */ 883145916cd2Sjpk 883245916cd2Sjpk 883345916cd2Sjpk 883445916cd2Sjpk /* 883545916cd2Sjpk * Name: rebuild_comp_path() 883645916cd2Sjpk * 883745916cd2Sjpk * Description: 883845916cd2Sjpk * Take the string of components passed down by the calling 883945916cd2Sjpk * routine and parse the values and rebuild the path. 884045916cd2Sjpk * This routine no longer needs to produce a new real_path 884145916cd2Sjpk * string because it is produced when the 'L' LABEL_TYPE is 884245916cd2Sjpk * interpreted. So the only thing done here is to distinguish 884345916cd2Sjpk * between an SLD and an MLD entry. We only want one, so we 884445916cd2Sjpk * ignore the MLD entry by setting the mld_flag. 884545916cd2Sjpk * 884645916cd2Sjpk * return value: 884745916cd2Sjpk * none 884845916cd2Sjpk */ 884945916cd2Sjpk static void 885045916cd2Sjpk rebuild_comp_path(char *str, char **namep) 885145916cd2Sjpk { 885245916cd2Sjpk char *cp; 885345916cd2Sjpk 885445916cd2Sjpk while (*str != '\0') { 885545916cd2Sjpk 885645916cd2Sjpk switch (*str) { 885745916cd2Sjpk 885845916cd2Sjpk case MLD_TYPE: 885945916cd2Sjpk 886045916cd2Sjpk str++; 886145916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 886245916cd2Sjpk *cp = '\0'; 886345916cd2Sjpk str = cp + 2; 886445916cd2Sjpk *cp = ';'; 886545916cd2Sjpk } 886645916cd2Sjpk mld_flag = 1; 886745916cd2Sjpk break; 886845916cd2Sjpk 886945916cd2Sjpk case SLD_TYPE: 887045916cd2Sjpk 887145916cd2Sjpk str++; 887245916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 887345916cd2Sjpk *cp = '\0'; 887445916cd2Sjpk str = cp + 2; 887545916cd2Sjpk *cp = ';'; 887645916cd2Sjpk } 887745916cd2Sjpk mld_flag = 0; 887845916cd2Sjpk break; 887945916cd2Sjpk 888045916cd2Sjpk case PATH_TYPE: 888145916cd2Sjpk 888245916cd2Sjpk str++; 888345916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 888445916cd2Sjpk *cp = '\0'; 888545916cd2Sjpk str = cp + 2; 888645916cd2Sjpk *cp = ';'; 888745916cd2Sjpk } 888845916cd2Sjpk break; 888945916cd2Sjpk } 889045916cd2Sjpk } 889145916cd2Sjpk if (rpath_flag) 889245916cd2Sjpk *namep = real_path; 889345916cd2Sjpk return; 889445916cd2Sjpk 889545916cd2Sjpk } /* end rebuild_comp_path() */ 889645916cd2Sjpk 889745916cd2Sjpk /* 889845916cd2Sjpk * Name: rebuild_lk_comp_path() 889945916cd2Sjpk * 890045916cd2Sjpk * Description: 890145916cd2Sjpk * Take the string of components passed down by the calling 890245916cd2Sjpk * routine and parse the values and rebuild the path. 890345916cd2Sjpk * 890445916cd2Sjpk * return value: 890545916cd2Sjpk * 0 = succeeded 890645916cd2Sjpk * -1 = failed 890745916cd2Sjpk */ 890845916cd2Sjpk static int 890945916cd2Sjpk rebuild_lk_comp_path(char *str, char **namep) 891045916cd2Sjpk { 891145916cd2Sjpk char *cp; 891245916cd2Sjpk int reterr; 891345916cd2Sjpk bslabel_t bslabel; 891445916cd2Sjpk char *buf; 891545916cd2Sjpk char pbuf[MAXPATHLEN]; 891645916cd2Sjpk char *ptr1, *ptr2; 891745916cd2Sjpk int plen; 891845916cd2Sjpk int use_pbuf; 891945916cd2Sjpk char tempbuf[MAXPATHLEN]; 892045916cd2Sjpk int mismatch; 892145916cd2Sjpk bslabel_t *from_label; 892245916cd2Sjpk char zonename[ZONENAME_MAX]; 892345916cd2Sjpk zoneid_t zoneid; 892445916cd2Sjpk 892545916cd2Sjpk /* init stuff */ 892645916cd2Sjpk use_pbuf = 0; 892745916cd2Sjpk mismatch = 0; 892845916cd2Sjpk 892945916cd2Sjpk /* 893045916cd2Sjpk * For linked to pathname (LK_COMP_TYPE): 893145916cd2Sjpk * - If the linked to pathname is absolute (start with /), we 893245916cd2Sjpk * will use it as is. 893345916cd2Sjpk * - If it is a relative pathname then it is relative to 1 of 2 893445916cd2Sjpk * directories. For a hardlink, it is relative to the current 893545916cd2Sjpk * directory. For a symbolic link, it is relative to the 893645916cd2Sjpk * directory the symbolic link is in. For the symbolic link 893745916cd2Sjpk * case, set a flag to indicate we need to use the prefix of 893845916cd2Sjpk * the restored file's pathname with the linked to pathname. 893945916cd2Sjpk * 894045916cd2Sjpk * NOTE: At this point, we have no way to determine if we have 894145916cd2Sjpk * a hardlink or a symbolic link. We will compare the 1st 894245916cd2Sjpk * component in the prefix portion of the restore file's 894345916cd2Sjpk * pathname to the 1st component in the attribute data 894445916cd2Sjpk * (the linked pathname). If they are the same, we will assume 894545916cd2Sjpk * the link pathname to reconstruct is relative to the current 894645916cd2Sjpk * directory. Otherwise, we will set a flag indicate we need 894745916cd2Sjpk * to use a prefix with the reconstructed name. Need to compare 894845916cd2Sjpk * both the adorned and unadorned version before deciding a 894945916cd2Sjpk * mismatch. 895045916cd2Sjpk */ 895145916cd2Sjpk 895245916cd2Sjpk buf = lk_real_path; 895345916cd2Sjpk if (*(str + 1) != '/') { /* got relative linked to path */ 895445916cd2Sjpk ptr1 = orig_namep; 895545916cd2Sjpk ptr2 = strrchr(ptr1, '/'); 895645916cd2Sjpk plen = ptr2 - ptr1; 895745916cd2Sjpk if (plen > 0) { 895845916cd2Sjpk pbuf[0] = '\0'; 895945916cd2Sjpk plen++; /* include '/' */ 896045916cd2Sjpk (void) strncpy(pbuf, ptr1, plen); 896145916cd2Sjpk *(pbuf + plen) = '\0'; 896245916cd2Sjpk ptr2 = strchr(pbuf, '/'); 896345916cd2Sjpk if (strncmp(pbuf, str + 1, ptr2 - pbuf) != 0) 896445916cd2Sjpk mismatch = 1; 896545916cd2Sjpk } 896645916cd2Sjpk 896745916cd2Sjpk if (mismatch == 1) 896845916cd2Sjpk use_pbuf = 1; 896945916cd2Sjpk } 897045916cd2Sjpk 897145916cd2Sjpk buf[0] = '\0'; 897245916cd2Sjpk 897345916cd2Sjpk while (*str != '\0') { 897445916cd2Sjpk 897545916cd2Sjpk switch (*str) { 897645916cd2Sjpk 897745916cd2Sjpk case MLD_TYPE: 897845916cd2Sjpk 897945916cd2Sjpk str++; 898045916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 898145916cd2Sjpk *cp = '\0'; 898245916cd2Sjpk 898345916cd2Sjpk /* 898445916cd2Sjpk * Ignore attempts to backup over .MLD. 898545916cd2Sjpk */ 898645916cd2Sjpk if (strcmp(str, "../") != 0) 898745916cd2Sjpk (void) strncat(buf, str, MAXPATHLEN); 898845916cd2Sjpk str = cp + 2; 898945916cd2Sjpk *cp = ';'; 899045916cd2Sjpk } 899145916cd2Sjpk break; 899245916cd2Sjpk 899345916cd2Sjpk case SLD_TYPE: 899445916cd2Sjpk 899545916cd2Sjpk str++; 899645916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 899745916cd2Sjpk *cp = '\0'; 899845916cd2Sjpk 899945916cd2Sjpk /* 900045916cd2Sjpk * Use the path name in the header if 900145916cd2Sjpk * error occurs when processing the 900245916cd2Sjpk * SLD type. 900345916cd2Sjpk */ 900445916cd2Sjpk 900545916cd2Sjpk if (!stobsl(str, &bslabel, 900645916cd2Sjpk NO_CORRECTION, &reterr)) { 900745916cd2Sjpk (void) fprintf(stderr, gettext( 900845916cd2Sjpk "tar: can't translate to binary" 900945916cd2Sjpk "SL for SLD, stobsl() error:" 901045916cd2Sjpk " %s\n"), strerror(errno)); 901145916cd2Sjpk return (-1); 901245916cd2Sjpk } 901345916cd2Sjpk 901445916cd2Sjpk str = cp + 2; 901545916cd2Sjpk *cp = ';'; 901645916cd2Sjpk 901745916cd2Sjpk if (use_pbuf == 1) { 901845916cd2Sjpk if (*pbuf != '/') { 901945916cd2Sjpk /* relative linked to path */ 902045916cd2Sjpk 902145916cd2Sjpk (void) getcwd(tempbuf, 902245916cd2Sjpk (sizeof (tempbuf))); 902345916cd2Sjpk (void) strncat(tempbuf, "/", 902445916cd2Sjpk MAXPATHLEN); 902545916cd2Sjpk (void) strncat(tempbuf, pbuf, 902645916cd2Sjpk MAXPATHLEN); 902745916cd2Sjpk } 902845916cd2Sjpk else 902945916cd2Sjpk (void) strcpy(tempbuf, pbuf); 903045916cd2Sjpk 903145916cd2Sjpk } else if (*buf != '/') { 903245916cd2Sjpk /* got relative linked to path */ 903345916cd2Sjpk 903445916cd2Sjpk (void) getcwd(tempbuf, 903545916cd2Sjpk (sizeof (tempbuf))); 903645916cd2Sjpk (void) strncat(tempbuf, "/", 903745916cd2Sjpk MAXPATHLEN); 903845916cd2Sjpk } else 903945916cd2Sjpk *tempbuf = '\0'; 904045916cd2Sjpk 904145916cd2Sjpk (void) strncat(tempbuf, buf, MAXPATHLEN); 904245916cd2Sjpk *buf = '\0'; 904345916cd2Sjpk 904445916cd2Sjpk if (blequal(&bslabel, &admin_high)) { 904545916cd2Sjpk bslabel = admin_low; 904645916cd2Sjpk } 904745916cd2Sjpk 904845916cd2Sjpk 904945916cd2Sjpk /* 905045916cd2Sjpk * Check for cross-zone symbolic links 905145916cd2Sjpk */ 905245916cd2Sjpk from_label = getlabelbypath(real_path); 905345916cd2Sjpk if (rpath_flag && (from_label != NULL) && 905445916cd2Sjpk !blequal(&bslabel, from_label)) { 905545916cd2Sjpk if ((zoneid = 905645916cd2Sjpk getzoneidbylabel(&bslabel)) == -1) { 905745916cd2Sjpk (void) fprintf(stderr, 905845916cd2Sjpk gettext("tar: can't get " 905945916cd2Sjpk "zone ID for %s\n"), 906045916cd2Sjpk tempbuf); 906145916cd2Sjpk return (-1); 906245916cd2Sjpk } 906345916cd2Sjpk if (zone_getattr(zoneid, ZONE_ATTR_NAME, 906445916cd2Sjpk &zonename, ZONENAME_MAX) == -1) { 906545916cd2Sjpk /* Badly configured zone info */ 906645916cd2Sjpk (void) fprintf(stderr, 906745916cd2Sjpk gettext("tar: can't get " 906845916cd2Sjpk "zonename for %s\n"), 906945916cd2Sjpk tempbuf); 907045916cd2Sjpk return (-1); 907145916cd2Sjpk } 907245916cd2Sjpk (void) strncpy(buf, AUTO_ZONE, 907345916cd2Sjpk MAXPATHLEN); 907445916cd2Sjpk (void) strncat(buf, "/", 907545916cd2Sjpk MAXPATHLEN); 907645916cd2Sjpk (void) strncat(buf, zonename, 907745916cd2Sjpk MAXPATHLEN); 907845916cd2Sjpk } 907945916cd2Sjpk if (from_label != NULL) 908045916cd2Sjpk free(from_label); 908145916cd2Sjpk (void) strncat(buf, tempbuf, MAXPATHLEN); 908245916cd2Sjpk break; 908345916cd2Sjpk } 908445916cd2Sjpk mld_flag = 0; 908545916cd2Sjpk break; 908645916cd2Sjpk 908745916cd2Sjpk case PATH_TYPE: 908845916cd2Sjpk 908945916cd2Sjpk str++; 909045916cd2Sjpk if ((cp = strstr(str, ";;")) != NULL) { 909145916cd2Sjpk *cp = '\0'; 909245916cd2Sjpk (void) strncat(buf, str, MAXPATHLEN); 909345916cd2Sjpk str = cp + 2; 909445916cd2Sjpk *cp = ';'; 909545916cd2Sjpk } 909645916cd2Sjpk break; 909745916cd2Sjpk 909845916cd2Sjpk default: 909945916cd2Sjpk 910045916cd2Sjpk (void) fprintf(stderr, gettext( 910145916cd2Sjpk "tar: error rebuilding path %s\n"), 910245916cd2Sjpk *namep); 910345916cd2Sjpk *buf = '\0'; 910445916cd2Sjpk str++; 910545916cd2Sjpk return (-1); 910645916cd2Sjpk } 910745916cd2Sjpk } 910845916cd2Sjpk 910945916cd2Sjpk /* 911045916cd2Sjpk * Done for LK_COMP_TYPE 911145916cd2Sjpk */ 911245916cd2Sjpk 911345916cd2Sjpk return (0); /* component path is rebuilt successfully */ 911445916cd2Sjpk 911545916cd2Sjpk } /* end rebuild_lk_comp_path() */ 911645916cd2Sjpk 911745916cd2Sjpk /* 911845916cd2Sjpk * Name: check_ext_attr() 911945916cd2Sjpk * 912045916cd2Sjpk * Description: 912145916cd2Sjpk * Check the extended attributes for a file being extracted. 912245916cd2Sjpk * The attributes being checked here are CMW labels. 912345916cd2Sjpk * ACLs are not set here because they are set by the 912445916cd2Sjpk * pflag in doxtract(). 912545916cd2Sjpk * 912645916cd2Sjpk * If the label doesn't match, return 0 912745916cd2Sjpk * else return 1 912845916cd2Sjpk */ 912945916cd2Sjpk static int 913045916cd2Sjpk check_ext_attr(char *filename) 913145916cd2Sjpk { 913245916cd2Sjpk bslabel_t currentlabel; /* label from zone */ 913345916cd2Sjpk 913445916cd2Sjpk if (bltype(&bs_label, SUN_SL_UN)) { 913545916cd2Sjpk /* No label check possible */ 913645916cd2Sjpk return (0); 913745916cd2Sjpk } 913845916cd2Sjpk if (getlabel(filename, ¤tlabel) != 0) { 913945916cd2Sjpk (void) fprintf(stderr, 914045916cd2Sjpk gettext("tar: can't get label for " 914145916cd2Sjpk " %s, getlabel() error: %s\n"), 914245916cd2Sjpk filename, strerror(errno)); 914345916cd2Sjpk return (0); 914445916cd2Sjpk } else if ((blequal(¤tlabel, &bs_label)) == 0) { 914545916cd2Sjpk char *src_label = NULL; /* ascii label */ 914645916cd2Sjpk 914745916cd2Sjpk /* get current src SL */ 914845916cd2Sjpk if (bsltos(&bs_label, &src_label, 0, 0) <= 0) { 914945916cd2Sjpk (void) fprintf(stderr, 915045916cd2Sjpk gettext("tar: can't interpret requested label for" 915145916cd2Sjpk " %s\n"), filename); 915245916cd2Sjpk } else { 915345916cd2Sjpk (void) fprintf(stderr, 915445916cd2Sjpk gettext("tar: can't apply label %s to %s\n"), 915545916cd2Sjpk src_label, filename); 915645916cd2Sjpk free(src_label); 915745916cd2Sjpk } 915845916cd2Sjpk (void) fprintf(stderr, 915945916cd2Sjpk gettext("tar: %s not restored\n"), filename); 916045916cd2Sjpk return (0); 916145916cd2Sjpk } 916245916cd2Sjpk return (1); 916345916cd2Sjpk 916445916cd2Sjpk } /* end check_ext_attr */ 916536802407SRich Burridge 916636802407SRich Burridge /* Compressing a tar file using compression method provided in 'opt' */ 916736802407SRich Burridge 916836802407SRich Burridge static void 916936802407SRich Burridge compress_back() 917036802407SRich Burridge { 917136802407SRich Burridge pid_t pid; 917236802407SRich Burridge int status; 917336802407SRich Burridge int wret; 917436802407SRich Burridge struct stat statb; 917536802407SRich Burridge 917636802407SRich Burridge if (vflag) { 917736802407SRich Burridge (void) fprintf(vfile, 917836802407SRich Burridge gettext("Compressing '%s' with '%s'...\n"), 917936802407SRich Burridge usefile, compress_opt); 918036802407SRich Burridge } 918136802407SRich Burridge if ((pid = fork()) == 0) { 9182*aa7166bdSMilan Jurik verify_compress_opt(compress_opt); 918336802407SRich Burridge (void) execlp(compress_opt, compress_opt, 918436802407SRich Burridge usefile, NULL); 918536802407SRich Burridge } else if (pid == -1) { 918636802407SRich Burridge vperror(1, "%s", gettext("Could not fork")); 918736802407SRich Burridge } 918836802407SRich Burridge wait_pid(pid); 918936802407SRich Burridge if (suffix == 0) { 919036802407SRich Burridge (void) rename(tfname, usefile); 919136802407SRich Burridge } 919236802407SRich Burridge } 919336802407SRich Burridge 919436802407SRich Burridge /* The magic numbers from /etc/magic */ 919536802407SRich Burridge 919636802407SRich Burridge #define GZIP_MAGIC "\037\213" 919736802407SRich Burridge #define BZIP_MAGIC "BZh" 919836802407SRich Burridge #define COMP_MAGIC "\037\235" 9199506ea5b8SMilan Jurik #define XZ_MAGIC "\375\067\172\130\132\000" 920036802407SRich Burridge 920136802407SRich Burridge void 9202506ea5b8SMilan Jurik check_compression(void) 920336802407SRich Burridge { 9204506ea5b8SMilan Jurik char magic[16]; 920536802407SRich Burridge FILE *fp; 920636802407SRich Burridge 920736802407SRich Burridge if ((fp = fopen(usefile, "r")) != NULL) { 9208506ea5b8SMilan Jurik (void) fread(magic, sizeof (char), 6, fp); 920936802407SRich Burridge (void) fclose(fp); 921036802407SRich Burridge } 921136802407SRich Burridge 921236802407SRich Burridge if (memcmp(magic, GZIP_MAGIC, 2) == 0) { 921336802407SRich Burridge if (xflag || tflag) { 921436802407SRich Burridge compress_opt = compress_malloc(strlen(GZCAT) + 1); 921536802407SRich Burridge (void) strcpy(compress_opt, GZCAT); 921636802407SRich Burridge } else if (uflag || rflag) { 921736802407SRich Burridge compress_opt = compress_malloc(strlen(GZIP) + 1); 921836802407SRich Burridge (void) strcpy(compress_opt, GZIP); 921936802407SRich Burridge } 922036802407SRich Burridge } else if (memcmp(magic, BZIP_MAGIC, 2) == 0) { 922136802407SRich Burridge if (xflag || tflag) { 922236802407SRich Burridge compress_opt = compress_malloc(strlen(BZCAT) + 1); 922336802407SRich Burridge (void) strcpy(compress_opt, BZCAT); 922436802407SRich Burridge } else if (uflag || rflag) { 922536802407SRich Burridge compress_opt = compress_malloc(strlen(BZIP) + 1); 922636802407SRich Burridge (void) strcpy(compress_opt, BZIP); 922736802407SRich Burridge } 922836802407SRich Burridge } else if (memcmp(magic, COMP_MAGIC, 2) == 0) { 922936802407SRich Burridge if (xflag || tflag) { 923036802407SRich Burridge compress_opt = compress_malloc(strlen(ZCAT) + 1); 923136802407SRich Burridge (void) strcpy(compress_opt, ZCAT); 923236802407SRich Burridge } else if (uflag || rflag) { 923336802407SRich Burridge compress_opt = compress_malloc(strlen(COMPRESS) + 1); 923436802407SRich Burridge (void) strcpy(compress_opt, COMPRESS); 923536802407SRich Burridge } 9236506ea5b8SMilan Jurik } else if (memcmp(magic, XZ_MAGIC, 6) == 0) { 9237506ea5b8SMilan Jurik if (xflag || tflag) { 9238506ea5b8SMilan Jurik compress_opt = compress_malloc(strlen(XZCAT) + 1); 9239506ea5b8SMilan Jurik (void) strcpy(compress_opt, XZCAT); 9240506ea5b8SMilan Jurik } else if (uflag || rflag) { 9241506ea5b8SMilan Jurik compress_opt = compress_malloc(strlen(XZ) + 1); 9242506ea5b8SMilan Jurik (void) strcpy(compress_opt, XZ); 9243506ea5b8SMilan Jurik } 924436802407SRich Burridge } 924536802407SRich Burridge } 924636802407SRich Burridge 924736802407SRich Burridge char * 924836802407SRich Burridge add_suffix() 924936802407SRich Burridge { 925036802407SRich Burridge (void) strcpy(tfname, usefile); 925136802407SRich Burridge if (strcmp(compress_opt, GZIP) == 0) { 925236802407SRich Burridge if ((suffix = gz_suffix()) == NULL) { 925336802407SRich Burridge strlcat(tfname, gsuffix[0], sizeof (tfname)); 925436802407SRich Burridge return (gsuffix[0]); 925536802407SRich Burridge } 925636802407SRich Burridge } else if (strcmp(compress_opt, COMPRESS) == 0) { 925736802407SRich Burridge if ((suffix = gz_suffix()) == NULL) { 925836802407SRich Burridge strlcat(tfname, gsuffix[6], sizeof (tfname)); 925936802407SRich Burridge return (gsuffix[6]); 926036802407SRich Burridge } 926136802407SRich Burridge } else if (strcmp(compress_opt, BZIP) == 0) { 926236802407SRich Burridge if ((suffix = bz_suffix()) == NULL) { 926336802407SRich Burridge strlcat(tfname, bsuffix[0], sizeof (tfname)); 926436802407SRich Burridge return (bsuffix[0]); 926536802407SRich Burridge } 9266506ea5b8SMilan Jurik } else if (strcmp(compress_opt, XZ) == 0) { 9267506ea5b8SMilan Jurik if ((suffix = xz_suffix()) == NULL) { 9268506ea5b8SMilan Jurik strlcat(tfname, xsuffix[0], sizeof (tfname)); 9269506ea5b8SMilan Jurik return (xsuffix[0]); 9270506ea5b8SMilan Jurik } 927136802407SRich Burridge } 927236802407SRich Burridge return (NULL); 927336802407SRich Burridge } 927436802407SRich Burridge 927536802407SRich Burridge /* Decompressing a tar file using compression method from the file type */ 927636802407SRich Burridge void 927736802407SRich Burridge decompress_file(void) 927836802407SRich Burridge { 927936802407SRich Burridge pid_t pid; 928036802407SRich Burridge int status; 928136802407SRich Burridge char cmdstr[PATH_MAX]; 928236802407SRich Burridge char fname[PATH_MAX]; 928336802407SRich Burridge char *added_suffix; 928436802407SRich Burridge 928536802407SRich Burridge 928636802407SRich Burridge added_suffix = add_suffix(); 928736802407SRich Burridge if (added_suffix != NULL) { 928836802407SRich Burridge (void) rename(usefile, tfname); 928936802407SRich Burridge } 929036802407SRich Burridge if ((pid = fork()) == 0) { 929136802407SRich Burridge if (vflag) { 929236802407SRich Burridge (void) fprintf(vfile, 929336802407SRich Burridge gettext("Decompressing '%s' with " 929436802407SRich Burridge "'%s'...\n"), usefile, compress_opt); 929536802407SRich Burridge } 9296*aa7166bdSMilan Jurik verify_compress_opt(compress_opt); 929736802407SRich Burridge (void) execlp(compress_opt, compress_opt, "-df", 929836802407SRich Burridge tfname, NULL); 929953329f75SRich Burridge vperror(1, gettext("Could not exec %s"), compress_opt); 930036802407SRich Burridge } else if (pid == -1) { 93018e4a71aeSRich Burridge vperror(1, gettext("Could not fork")); 930236802407SRich Burridge } 930336802407SRich Burridge wait_pid(pid); 930436802407SRich Burridge if (suffix != NULL) { 930536802407SRich Burridge /* restore the file name - original file was without suffix */ 930636802407SRich Burridge *(usefile + strlen(usefile) - strlen(suffix)) = '\0'; 930736802407SRich Burridge } 930836802407SRich Burridge } 930936802407SRich Burridge 931036802407SRich Burridge /* Set the archive for writing and then compress the archive */ 931136802407SRich Burridge pid_t 931236802407SRich Burridge compress_file(void) 931336802407SRich Burridge { 931436802407SRich Burridge int fd[2]; 931536802407SRich Burridge pid_t pid; 931636802407SRich Burridge 931736802407SRich Burridge if (vflag) { 931836802407SRich Burridge (void) fprintf(vfile, gettext("Compressing '%s' with " 931936802407SRich Burridge "'%s'...\n"), usefile, compress_opt); 932036802407SRich Burridge } 932136802407SRich Burridge 932236802407SRich Burridge if (pipe(fd) < 0) { 932336802407SRich Burridge vperror(1, gettext("Could not create pipe")); 932436802407SRich Burridge } 932536802407SRich Burridge if (pid = fork() > 0) { 932636802407SRich Burridge mt = fd[1]; 932736802407SRich Burridge (void) close(fd[0]); 932836802407SRich Burridge return (pid); 932936802407SRich Burridge } 933036802407SRich Burridge /* child */ 933136802407SRich Burridge (void) dup2(fd[0], STDIN_FILENO); 933236802407SRich Burridge (void) close(fd[1]); 933336802407SRich Burridge (void) dup2(mt, STDOUT_FILENO); 9334*aa7166bdSMilan Jurik verify_compress_opt(compress_opt); 933536802407SRich Burridge (void) execlp(compress_opt, compress_opt, NULL); 933653329f75SRich Burridge vperror(1, gettext("Could not exec %s"), compress_opt); 933736802407SRich Burridge return (0); /*NOTREACHED*/ 933836802407SRich Burridge } 933936802407SRich Burridge 934036802407SRich Burridge pid_t 934136802407SRich Burridge uncompress_file(void) 934236802407SRich Burridge { 934336802407SRich Burridge int fd[2]; 934436802407SRich Burridge pid_t pid; 934536802407SRich Burridge 934636802407SRich Burridge if (vflag) { 934736802407SRich Burridge (void) fprintf(vfile, gettext("Decompressing '%s' with " 934836802407SRich Burridge "'%s'...\n"), usefile, compress_opt); 934936802407SRich Burridge } 935036802407SRich Burridge 935136802407SRich Burridge if (pipe(fd) < 0) { 935236802407SRich Burridge vperror(1, gettext("Could not create pipe")); 935336802407SRich Burridge } 935436802407SRich Burridge if (pid = fork() > 0) { 935536802407SRich Burridge mt = fd[0]; 935636802407SRich Burridge (void) close(fd[1]); 935736802407SRich Burridge return (pid); 935836802407SRich Burridge } 935936802407SRich Burridge /* child */ 936036802407SRich Burridge (void) dup2(fd[1], STDOUT_FILENO); 936136802407SRich Burridge (void) close(fd[0]); 936236802407SRich Burridge (void) dup2(mt, STDIN_FILENO); 9363*aa7166bdSMilan Jurik verify_compress_opt(compress_opt); 936436802407SRich Burridge (void) execlp(compress_opt, compress_opt, NULL); 936553329f75SRich Burridge vperror(1, gettext("Could not exec %s"), compress_opt); 936636802407SRich Burridge return (0); /*NOTREACHED*/ 936736802407SRich Burridge } 936836802407SRich Burridge 9369506ea5b8SMilan Jurik /* Checking suffix validity */ 937036802407SRich Burridge char * 9371506ea5b8SMilan Jurik check_suffix(char **suf, int size) 937236802407SRich Burridge { 937336802407SRich Burridge int i; 937436802407SRich Burridge int slen; 937536802407SRich Burridge int nlen = strlen(usefile); 937636802407SRich Burridge 9377506ea5b8SMilan Jurik for (i = 0; i < size; i++) { 9378506ea5b8SMilan Jurik slen = strlen(suf[i]); 937936802407SRich Burridge if (nlen < slen) 938036802407SRich Burridge return (NULL); 9381506ea5b8SMilan Jurik if (strcmp(usefile + nlen - slen, suf[i]) == 0) 9382506ea5b8SMilan Jurik return (suf[i]); 938336802407SRich Burridge } 938436802407SRich Burridge return (NULL); 9385506ea5b8SMilan Jurik } 9386506ea5b8SMilan Jurik 9387506ea5b8SMilan Jurik /* Checking valid 'bzip2' suffix */ 9388506ea5b8SMilan Jurik char * 9389506ea5b8SMilan Jurik bz_suffix(void) 9390506ea5b8SMilan Jurik { 9391506ea5b8SMilan Jurik return (check_suffix(bsuffix, BSUF)); 939236802407SRich Burridge } 939336802407SRich Burridge 939436802407SRich Burridge /* Checking valid 'gzip' suffix */ 939536802407SRich Burridge char * 9396506ea5b8SMilan Jurik gz_suffix(void) 939736802407SRich Burridge { 9398506ea5b8SMilan Jurik return (check_suffix(gsuffix, GSUF)); 939936802407SRich Burridge } 9400506ea5b8SMilan Jurik 9401506ea5b8SMilan Jurik /* Checking valid 'xz' suffix */ 9402506ea5b8SMilan Jurik char * 9403506ea5b8SMilan Jurik xz_suffix(void) 9404506ea5b8SMilan Jurik { 9405506ea5b8SMilan Jurik return (check_suffix(xsuffix, XSUF)); 940636802407SRich Burridge } 940736802407SRich Burridge 940836802407SRich Burridge void * 940936802407SRich Burridge compress_malloc(size_t size) 941036802407SRich Burridge { 941136802407SRich Burridge void *opt; 941236802407SRich Burridge 941336802407SRich Burridge if ((opt = malloc(size)) == NULL) { 941436802407SRich Burridge vperror(1, "%s", 941536802407SRich Burridge gettext("Could not allocate compress buffer\n")); 941636802407SRich Burridge } 941736802407SRich Burridge return (opt); 941836802407SRich Burridge } 941936802407SRich Burridge 942036802407SRich Burridge void 942136802407SRich Burridge wait_pid(pid_t pid) 942236802407SRich Burridge { 942336802407SRich Burridge int status; 942436802407SRich Burridge 942536802407SRich Burridge while (waitpid(pid, &status, 0) == -1 && errno == EINTR) 942636802407SRich Burridge ; 942736802407SRich Burridge } 9428*aa7166bdSMilan Jurik 9429*aa7166bdSMilan Jurik static void 9430*aa7166bdSMilan Jurik verify_compress_opt(const char *t) 9431*aa7166bdSMilan Jurik { 9432*aa7166bdSMilan Jurik struct stat statbuf; 9433*aa7166bdSMilan Jurik 9434*aa7166bdSMilan Jurik if (stat(t, &statbuf) == -1) 9435*aa7166bdSMilan Jurik vperror(1, "%s %s: %s\n", gettext("Could not stat"), 9436*aa7166bdSMilan Jurik t, strerror(errno)); 9437*aa7166bdSMilan Jurik } 9438*aa7166bdSMilan Jurik 9439*aa7166bdSMilan Jurik static void 9440*aa7166bdSMilan Jurik detect_compress(void) 9441*aa7166bdSMilan Jurik { 9442*aa7166bdSMilan Jurik char *zsuf[] = {".Z"}; 9443*aa7166bdSMilan Jurik if (check_suffix(zsuf, 1) != NULL) { 9444*aa7166bdSMilan Jurik Zflag = 1; 9445*aa7166bdSMilan Jurik } else if (check_suffix(bsuffix, BSUF) != NULL) { 9446*aa7166bdSMilan Jurik jflag = 1; 9447*aa7166bdSMilan Jurik } else if (check_suffix(gsuffix, GSUF) != NULL) { 9448*aa7166bdSMilan Jurik zflag = 1; 9449*aa7166bdSMilan Jurik } else if (check_suffix(xsuffix, XSUF) != NULL) { 9450*aa7166bdSMilan Jurik Jflag = 1; 9451*aa7166bdSMilan Jurik } else { 9452*aa7166bdSMilan Jurik vperror(1, "%s\n", gettext("No compression method detected")); 9453*aa7166bdSMilan Jurik } 9454*aa7166bdSMilan Jurik } 9455