UPDATE_COPYRIGHT_USE_INTERVALS=1 \
$HOME/src/gnu/gnulib/build-aux/update-copyright \
$(git ls-files | sed -e '/^gnulib$/d
/^paxutils$/d
/^COPYING$/d
/\/fdl.texi$/d')
sed -i '2000,${
/^Copyright @copyright/d
s/^[0-9]*--\(2025 Free Software Foundation, Inc.\)/Copyright (C) \1/
}' doc/tar.texi
834 lines
20 KiB
C
834 lines
20 KiB
C
/* Support for extended attributes.
|
||
|
||
Copyright (C) 2006-2025 Free Software Foundation, Inc.
|
||
|
||
This file is part of GNU tar.
|
||
|
||
GNU tar is free software; you can redistribute it and/or modify
|
||
it under the terms of the GNU General Public License as published by
|
||
the Free Software Foundation; either version 3 of the License, or
|
||
(at your option) any later version.
|
||
|
||
GNU tar is distributed in the hope that it will be useful,
|
||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
GNU General Public License for more details.
|
||
|
||
You should have received a copy of the GNU General Public License
|
||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||
|
||
Written by James Antill, on 2006-07-27. */
|
||
|
||
#include <config.h>
|
||
#include <system.h>
|
||
|
||
#include <fnmatch.h>
|
||
#include <quotearg.h>
|
||
|
||
#include "common.h"
|
||
|
||
#include "xattr-at.h"
|
||
#include "selinux-at.h"
|
||
|
||
static char const XATTRS_PREFIX[] = "SCHILY.xattr.";
|
||
enum { XATTRS_PREFIX_LEN = sizeof XATTRS_PREFIX - 1 };
|
||
|
||
void
|
||
xheader_xattr_init (struct tar_stat_info *st)
|
||
{
|
||
xattr_map_init (&st->xattr_map);
|
||
|
||
st->acls_a_ptr = NULL;
|
||
st->acls_a_len = 0;
|
||
st->acls_d_ptr = NULL;
|
||
st->acls_d_len = 0;
|
||
st->cntx_name = NULL;
|
||
}
|
||
|
||
void
|
||
xattr_map_init (struct xattr_map *map)
|
||
{
|
||
memset (map, 0, sizeof *map);
|
||
}
|
||
|
||
void
|
||
xattr_map_free (struct xattr_map *xattr_map)
|
||
{
|
||
for (idx_t i = 0; i < xattr_map->xm_size; i++)
|
||
{
|
||
free (xattr_map->xm_map[i].xkey);
|
||
free (xattr_map->xm_map[i].xval_ptr);
|
||
}
|
||
free (xattr_map->xm_map);
|
||
}
|
||
|
||
void
|
||
xattr_map_add (struct xattr_map *map,
|
||
const char *key, const char *val, idx_t len)
|
||
{
|
||
if (map->xm_size == map->xm_max)
|
||
map->xm_map = xpalloc (map->xm_map, &map->xm_max, 1, -1,
|
||
sizeof *map->xm_map);
|
||
struct xattr_array *p = &map->xm_map[map->xm_size];
|
||
p->xkey = xstrdup (key);
|
||
p->xval_ptr = ximemdup (val, len + 1);
|
||
p->xval_len = len;
|
||
map->xm_size++;
|
||
}
|
||
|
||
static void
|
||
xheader_xattr_add (struct tar_stat_info *st,
|
||
const char *key, const char *val, idx_t len)
|
||
{
|
||
idx_t klen = strlen (key);
|
||
char *xkey = xmalloc (XATTRS_PREFIX_LEN + klen + 1);
|
||
char *tmp = xkey;
|
||
|
||
tmp = stpcpy (tmp, XATTRS_PREFIX);
|
||
stpcpy (tmp, key);
|
||
|
||
xattr_map_add (&st->xattr_map, xkey, val, len);
|
||
|
||
free (xkey);
|
||
}
|
||
|
||
void
|
||
xattr_map_copy (struct xattr_map *dst, const struct xattr_map *src)
|
||
{
|
||
for (idx_t i = 0; i < src->xm_size; i++)
|
||
xattr_map_add (dst, src->xm_map[i].xkey,
|
||
src->xm_map[i].xval_ptr,
|
||
src->xm_map[i].xval_len);
|
||
}
|
||
|
||
struct xattrs_mask_map
|
||
{
|
||
const char **masks;
|
||
idx_t size;
|
||
idx_t used;
|
||
};
|
||
|
||
/* list of fnmatch patterns */
|
||
static struct
|
||
{
|
||
/* lists of fnmatch patterns */
|
||
struct xattrs_mask_map incl;
|
||
struct xattrs_mask_map excl;
|
||
} xattrs_setup;
|
||
|
||
/* disable posix acls when problem found in gnulib script m4/acl.m4 */
|
||
#if ! USE_ACL
|
||
# undef HAVE_POSIX_ACLS
|
||
#endif
|
||
|
||
#ifdef HAVE_POSIX_ACLS
|
||
# include "acl.h"
|
||
# include <sys/acl.h>
|
||
# ifdef HAVE_ACL_LIBACL_H
|
||
# /* needed for numeric-owner support */
|
||
# include <acl/libacl.h>
|
||
# endif
|
||
#endif
|
||
|
||
#ifdef HAVE_POSIX_ACLS
|
||
|
||
/* acl-at wrappers, TODO: move to gnulib in future? */
|
||
static acl_t acl_get_file_at (int, const char *, acl_type_t);
|
||
static int acl_set_file_at (int, const char *, acl_type_t, acl_t);
|
||
static int file_has_acl_at (int, char const *, struct stat const *);
|
||
static int acl_delete_def_file_at (int, char const *);
|
||
|
||
/* acl_get_file_at */
|
||
#define AT_FUNC_NAME acl_get_file_at
|
||
#define AT_FUNC_RESULT acl_t
|
||
#define AT_FUNC_FAIL (acl_t)NULL
|
||
#define AT_FUNC_F1 acl_get_file
|
||
#define AT_FUNC_POST_FILE_PARAM_DECLS , acl_type_t type
|
||
#define AT_FUNC_POST_FILE_ARGS , type
|
||
#include "at-func.c"
|
||
#undef AT_FUNC_NAME
|
||
#undef AT_FUNC_F1
|
||
#undef AT_FUNC_RESULT
|
||
#undef AT_FUNC_FAIL
|
||
#undef AT_FUNC_POST_FILE_PARAM_DECLS
|
||
#undef AT_FUNC_POST_FILE_ARGS
|
||
|
||
/* acl_set_file_at */
|
||
#define AT_FUNC_NAME acl_set_file_at
|
||
#define AT_FUNC_F1 acl_set_file
|
||
#define AT_FUNC_POST_FILE_PARAM_DECLS , acl_type_t type, acl_t acl
|
||
#define AT_FUNC_POST_FILE_ARGS , type, acl
|
||
#include "at-func.c"
|
||
#undef AT_FUNC_NAME
|
||
#undef AT_FUNC_F1
|
||
#undef AT_FUNC_POST_FILE_PARAM_DECLS
|
||
#undef AT_FUNC_POST_FILE_ARGS
|
||
|
||
/* acl_delete_def_file_at */
|
||
#define AT_FUNC_NAME acl_delete_def_file_at
|
||
#define AT_FUNC_F1 acl_delete_def_file
|
||
#define AT_FUNC_POST_FILE_PARAM_DECLS
|
||
#define AT_FUNC_POST_FILE_ARGS
|
||
#include "at-func.c"
|
||
#undef AT_FUNC_NAME
|
||
#undef AT_FUNC_F1
|
||
#undef AT_FUNC_POST_FILE_PARAM_DECLS
|
||
#undef AT_FUNC_POST_FILE_ARGS
|
||
|
||
/* gnulib file_has_acl_at */
|
||
#define AT_FUNC_NAME file_has_acl_at
|
||
#define AT_FUNC_F1 file_has_acl
|
||
#define AT_FUNC_POST_FILE_PARAM_DECLS , struct stat const *st
|
||
#define AT_FUNC_POST_FILE_ARGS , st
|
||
#include "at-func.c"
|
||
#undef AT_FUNC_NAME
|
||
#undef AT_FUNC_F1
|
||
#undef AT_FUNC_POST_FILE_PARAM_DECLS
|
||
#undef AT_FUNC_POST_FILE_ARGS
|
||
|
||
/* convert unix permissions into an ACL ... needed due to "default" ACLs */
|
||
static acl_t
|
||
perms2acl (int perms)
|
||
{
|
||
char val[] = "user::---,group::---,other::---";
|
||
/* 0123456789 123456789 123456789 123456789 */
|
||
|
||
/* user */
|
||
if (perms & 0400)
|
||
val[6] = 'r';
|
||
if (perms & 0200)
|
||
val[7] = 'w';
|
||
if (perms & 0100)
|
||
val[8] = 'x';
|
||
|
||
/* group */
|
||
if (perms & 0040)
|
||
val[17] = 'r';
|
||
if (perms & 0020)
|
||
val[18] = 'w';
|
||
if (perms & 0010)
|
||
val[19] = 'x';
|
||
|
||
/* other */
|
||
if (perms & 0004)
|
||
val[28] = 'r';
|
||
if (perms & 0002)
|
||
val[29] = 'w';
|
||
if (perms & 0001)
|
||
val[30] = 'x';
|
||
|
||
return acl_from_text (val);
|
||
}
|
||
|
||
static char *
|
||
skip_to_ext_fields (char *ptr)
|
||
{
|
||
/* skip tag name (user/group/default/mask) */
|
||
ptr += strcspn (ptr, ":,\n");
|
||
|
||
if (*ptr != ':')
|
||
return ptr;
|
||
++ptr;
|
||
|
||
ptr += strcspn (ptr, ":,\n"); /* skip user/group name */
|
||
|
||
if (*ptr != ':')
|
||
return ptr;
|
||
++ptr;
|
||
|
||
ptr += strcspn (ptr, ":,\n"); /* skip perms */
|
||
|
||
return ptr;
|
||
}
|
||
|
||
/* The POSIX draft allows extra fields after the three main ones. Star
|
||
uses this to add a fourth field for user/group which is the numeric ID.
|
||
This function removes such extra fields by overwriting them with the
|
||
characters that follow. */
|
||
static char *
|
||
fixup_extra_acl_fields (char *ptr)
|
||
{
|
||
char *src = ptr;
|
||
char *dst = ptr;
|
||
|
||
while (*src)
|
||
{
|
||
const char *old = src;
|
||
idx_t len = 0;
|
||
|
||
src = skip_to_ext_fields (src);
|
||
len = src - old;
|
||
if (old != dst)
|
||
memmove (dst, old, len);
|
||
dst += len;
|
||
|
||
if (*src == ':') /* We have extra fields, skip them all */
|
||
src += strcspn (src, "\n,");
|
||
|
||
if ((*src == '\n') || (*src == ','))
|
||
*dst++ = *src++; /* also done when dst == src, but that's ok */
|
||
}
|
||
if (src != dst)
|
||
*dst = 0;
|
||
|
||
return ptr;
|
||
}
|
||
|
||
/* Set the "system.posix_acl_access/system.posix_acl_default" extended
|
||
attribute. Called only when acls_option > 0. */
|
||
static void
|
||
xattrs__acls_set (struct tar_stat_info const *st,
|
||
char const *file_name, acl_type_t type,
|
||
char *ptr, bool def)
|
||
{
|
||
acl_t acl;
|
||
|
||
if (ptr)
|
||
{
|
||
ptr = fixup_extra_acl_fields (ptr);
|
||
acl = acl_from_text (ptr);
|
||
}
|
||
else if (def)
|
||
{
|
||
/* No "default" IEEE 1003.1e ACL set for directory. At this moment,
|
||
FILE_NAME may already have inherited default acls from parent
|
||
directory; clean them up. */
|
||
if (acl_delete_def_file_at (chdir_fd, file_name) < 0)
|
||
warnopt (WARN_XATTR_WRITE, errno,
|
||
_("acl_delete_def_file_at: Cannot drop default POSIX ACLs "
|
||
"for file '%s'"),
|
||
file_name);
|
||
return;
|
||
}
|
||
else
|
||
acl = perms2acl (st->stat.st_mode);
|
||
|
||
if (!acl)
|
||
{
|
||
call_arg_warn ("acl_from_text", file_name);
|
||
return;
|
||
}
|
||
|
||
if (acl_set_file_at (chdir_fd, file_name, type, acl) < 0)
|
||
/* warn even if filesystem does not support acls */
|
||
warnopt (WARN_XATTR_WRITE, errno,
|
||
_ ("acl_set_file_at: Cannot set POSIX ACLs for file '%s'"),
|
||
file_name);
|
||
|
||
acl_free (acl);
|
||
}
|
||
|
||
/* Cleanup textual representation of the ACL in VAL by eliminating tab
|
||
characters and comments */
|
||
static void
|
||
xattrs_acls_cleanup (char *val, idx_t *plen)
|
||
{
|
||
char *p, *q;
|
||
|
||
p = q = val + strcspn (val, "#\t");
|
||
while (*q)
|
||
{
|
||
if (*q == '\t')
|
||
q++;
|
||
else if (*q == '#')
|
||
{
|
||
while (*q != '\n')
|
||
q++;
|
||
}
|
||
else
|
||
*p++ = *q++;
|
||
}
|
||
*plen = p - val;
|
||
*p++ = 0;
|
||
}
|
||
|
||
static void
|
||
acls_get_text (int parentfd, const char *file_name, acl_type_t type,
|
||
char **ret_ptr, idx_t *ret_len)
|
||
{
|
||
char *val = NULL;
|
||
acl_t acl;
|
||
|
||
if (!(acl = acl_get_file_at (parentfd, file_name, type)))
|
||
{
|
||
if (errno != ENOTSUP)
|
||
call_arg_warn ("acl_get_file_at", file_name);
|
||
return;
|
||
}
|
||
|
||
if (numeric_owner_option)
|
||
{
|
||
#ifdef HAVE_ACL_LIBACL_H
|
||
val = acl_to_any_text (acl, NULL, '\n',
|
||
TEXT_SOME_EFFECTIVE | TEXT_NUMERIC_IDS);
|
||
#else
|
||
static bool warned;
|
||
if (!warned)
|
||
{
|
||
warned = true;
|
||
paxwarn (0, _("--numeric-owner is ignored for ACLs:"
|
||
" libacl is not available"));
|
||
}
|
||
#endif
|
||
}
|
||
else
|
||
val = acl_to_text (acl, NULL);
|
||
acl_free (acl);
|
||
|
||
if (!val)
|
||
{
|
||
call_arg_warn ("acl_to_text", file_name);
|
||
return;
|
||
}
|
||
|
||
*ret_ptr = xstrdup (val);
|
||
xattrs_acls_cleanup (*ret_ptr, ret_len);
|
||
acl_free (val);
|
||
}
|
||
|
||
static void
|
||
xattrs__acls_get_a (int parentfd, const char *file_name,
|
||
char **ret_ptr, idx_t *ret_len)
|
||
{
|
||
acls_get_text (parentfd, file_name, ACL_TYPE_ACCESS, ret_ptr, ret_len);
|
||
}
|
||
|
||
/* "system.posix_acl_default" */
|
||
static void
|
||
xattrs__acls_get_d (int parentfd, char const *file_name,
|
||
char **ret_ptr, idx_t *ret_len)
|
||
{
|
||
acls_get_text (parentfd, file_name, ACL_TYPE_DEFAULT, ret_ptr, ret_len);
|
||
}
|
||
#endif /* HAVE_POSIX_ACLS */
|
||
|
||
static void
|
||
acls_one_line (const char *prefix, char delim,
|
||
const char *aclstring, idx_t len)
|
||
{
|
||
/* support both long and short text representation of posix acls */
|
||
struct obstack stk;
|
||
idx_t pref_len = strlen (prefix);
|
||
const char *oldstring = aclstring;
|
||
idx_t pos = 0;
|
||
|
||
if (!aclstring || !len)
|
||
return;
|
||
|
||
obstack_init (&stk);
|
||
while (pos <= len)
|
||
{
|
||
idx_t move = strcspn (aclstring, ",\n");
|
||
if (!move)
|
||
break;
|
||
|
||
if (oldstring != aclstring)
|
||
obstack_1grow (&stk, delim);
|
||
|
||
obstack_grow (&stk, prefix, pref_len);
|
||
obstack_grow (&stk, aclstring, move);
|
||
|
||
pos += move + 1;
|
||
aclstring += move + 1;
|
||
}
|
||
|
||
obstack_1grow (&stk, '\0');
|
||
|
||
fputs (obstack_finish (&stk), stdlis);
|
||
|
||
obstack_free (&stk, NULL);
|
||
}
|
||
|
||
void
|
||
xattrs_acls_get (MAYBE_UNUSED int parentfd, MAYBE_UNUSED char const *file_name,
|
||
MAYBE_UNUSED struct tar_stat_info *st,
|
||
MAYBE_UNUSED bool xisfile)
|
||
{
|
||
if (acls_option > 0)
|
||
{
|
||
#ifndef HAVE_POSIX_ACLS
|
||
static bool done;
|
||
if (!done)
|
||
{
|
||
done = true;
|
||
paxwarn (0, _("POSIX ACL support is not available"));
|
||
}
|
||
#else
|
||
int err = file_has_acl_at (parentfd, file_name, &st->stat);
|
||
if (err == 0)
|
||
return;
|
||
if (err < 0)
|
||
{
|
||
call_arg_warn ("file_has_acl_at", file_name);
|
||
return;
|
||
}
|
||
|
||
xattrs__acls_get_a (parentfd, file_name,
|
||
&st->acls_a_ptr, &st->acls_a_len);
|
||
if (!xisfile)
|
||
xattrs__acls_get_d (parentfd, file_name,
|
||
&st->acls_d_ptr, &st->acls_d_len);
|
||
#endif
|
||
}
|
||
}
|
||
|
||
void
|
||
xattrs_acls_set (MAYBE_UNUSED struct tar_stat_info const *st,
|
||
MAYBE_UNUSED char const *file_name, char typeflag)
|
||
{
|
||
if (acls_option > 0 && typeflag != SYMTYPE)
|
||
{
|
||
#ifndef HAVE_POSIX_ACLS
|
||
static bool done;
|
||
if (!done)
|
||
{
|
||
done = true;
|
||
paxwarn (0, _("POSIX ACL support is not available"));
|
||
}
|
||
#else
|
||
xattrs__acls_set (st, file_name, ACL_TYPE_ACCESS,
|
||
st->acls_a_ptr, false);
|
||
if (typeflag == DIRTYPE || typeflag == GNUTYPE_DUMPDIR)
|
||
xattrs__acls_set (st, file_name, ACL_TYPE_DEFAULT,
|
||
st->acls_d_ptr, true);
|
||
#endif
|
||
}
|
||
}
|
||
|
||
static void
|
||
mask_map_realloc (struct xattrs_mask_map *map)
|
||
{
|
||
if (map->used == map->size)
|
||
map->masks = xpalloc (map->masks, &map->size, 1, -1, sizeof *map->masks);
|
||
}
|
||
|
||
void
|
||
xattrs_mask_add (const char *mask, bool incl)
|
||
{
|
||
struct xattrs_mask_map *mask_map =
|
||
incl ? &xattrs_setup.incl : &xattrs_setup.excl;
|
||
/* ensure there is enough space */
|
||
mask_map_realloc (mask_map);
|
||
/* just assign pointers -- we silently expect that pointer "mask" is valid
|
||
through the whole program (pointer to argv array) */
|
||
mask_map->masks[mask_map->used++] = mask;
|
||
}
|
||
|
||
static bool xattrs_masked_out (const char *kw, bool archiving);
|
||
|
||
/* get xattrs from file given by FILE_NAME or FD (when non-zero)
|
||
xattrs are checked against the user supplied include/exclude mask
|
||
if no mask is given this includes all the user.*, security.*, system.*,
|
||
etc. available domains */
|
||
void
|
||
xattrs_xattrs_get (int parentfd, char const *file_name,
|
||
struct tar_stat_info *st, int fd)
|
||
{
|
||
if (xattrs_option)
|
||
{
|
||
#ifndef HAVE_XATTRS
|
||
static bool done;
|
||
if (!done)
|
||
{
|
||
done = true;
|
||
paxwarn (0, _("XATTR support is not available"));
|
||
}
|
||
#else
|
||
static idx_t xsz = 1024 / 2 * 3;
|
||
static char *xatrs = NULL;
|
||
ssize_t xret;
|
||
|
||
while (!xatrs
|
||
|| (((xret = (fd == 0
|
||
? listxattrat (parentfd, file_name, xatrs, xsz)
|
||
: flistxattr (fd, xatrs, xsz)))
|
||
< 0)
|
||
&& errno == ERANGE))
|
||
{
|
||
xatrs = xpalloc (xatrs, &xsz, 1, -1, sizeof *xatrs);
|
||
}
|
||
|
||
if (xret < 0)
|
||
call_arg_warn ((fd == 0) ? "llistxattrat" : "flistxattr", file_name);
|
||
else
|
||
{
|
||
const char *attr = xatrs;
|
||
static idx_t asz = 1024 / 2 * 3;
|
||
static char *val = NULL;
|
||
|
||
while (xret > 0)
|
||
{
|
||
idx_t len = strlen (attr);
|
||
ssize_t aret = 0;
|
||
|
||
while (!val
|
||
|| (((aret = (fd == 0
|
||
? lgetxattrat (parentfd, file_name, attr,
|
||
val, asz)
|
||
: fgetxattr (fd, attr, val, asz)))
|
||
< 0)
|
||
&& errno == ERANGE))
|
||
{
|
||
val = xpalloc (val, &asz, 1, -1, sizeof *val);
|
||
}
|
||
|
||
if (0 <= aret)
|
||
{
|
||
if (!xattrs_masked_out (attr, true))
|
||
xheader_xattr_add (st, attr, val, aret);
|
||
}
|
||
else if (errno != ENOATTR)
|
||
call_arg_warn ((fd == 0) ? "lgetxattrat"
|
||
: "fgetxattr", file_name);
|
||
|
||
attr += len + 1;
|
||
xret -= len + 1;
|
||
}
|
||
}
|
||
#endif
|
||
}
|
||
}
|
||
|
||
#ifdef HAVE_XATTRS
|
||
static void
|
||
xattrs__fd_set (char const *file_name, char typeflag,
|
||
const char *attr, const char *ptr, idx_t len)
|
||
{
|
||
if (ptr)
|
||
{
|
||
const char *sysname = "setxattrat";
|
||
int ret;
|
||
|
||
if (typeflag != SYMTYPE)
|
||
ret = setxattrat (chdir_fd, file_name, attr, ptr, len, 0);
|
||
else
|
||
{
|
||
sysname = "lsetxattr";
|
||
ret = lsetxattrat (chdir_fd, file_name, attr, ptr, len, 0);
|
||
}
|
||
|
||
if (ret < 0)
|
||
warnopt (WARN_XATTR_WRITE, errno,
|
||
_("%s: Cannot set '%s' extended attribute for file '%s'"),
|
||
sysname, attr, file_name);
|
||
}
|
||
}
|
||
#endif
|
||
|
||
/* lgetfileconat is called against FILE_NAME iff the FD parameter is set to
|
||
zero, otherwise the fgetfileconat is used against correct file descriptor */
|
||
void
|
||
xattrs_selinux_get (MAYBE_UNUSED int parentfd, MAYBE_UNUSED char const *file_name,
|
||
MAYBE_UNUSED struct tar_stat_info *st, MAYBE_UNUSED int fd)
|
||
{
|
||
if (selinux_context_option > 0)
|
||
{
|
||
#if HAVE_SELINUX_SELINUX_H != 1
|
||
static bool done;
|
||
if (!done)
|
||
{
|
||
done = true;
|
||
paxwarn (0, _("SELinux support is not available"));
|
||
}
|
||
#else
|
||
int result = (fd
|
||
? fgetfilecon (fd, &st->cntx_name)
|
||
: lgetfileconat (parentfd, file_name, &st->cntx_name));
|
||
|
||
if (result < 0 && errno != ENODATA && errno != ENOTSUP)
|
||
call_arg_warn (fd ? "fgetfilecon" : "lgetfileconat", file_name);
|
||
#endif
|
||
}
|
||
}
|
||
|
||
void
|
||
xattrs_selinux_set (MAYBE_UNUSED struct tar_stat_info const *st,
|
||
MAYBE_UNUSED char const *file_name, MAYBE_UNUSED char typeflag)
|
||
{
|
||
if (selinux_context_option > 0)
|
||
{
|
||
#if HAVE_SELINUX_SELINUX_H != 1
|
||
static bool done;
|
||
if (!done)
|
||
{
|
||
done = true;
|
||
paxwarn (0, _("SELinux support is not available"));
|
||
}
|
||
#else
|
||
const char *sysname = "setfilecon";
|
||
int ret;
|
||
|
||
if (!st->cntx_name)
|
||
return;
|
||
|
||
if (typeflag != SYMTYPE)
|
||
{
|
||
ret = setfileconat (chdir_fd, file_name, st->cntx_name);
|
||
sysname = "setfileconat";
|
||
}
|
||
else
|
||
{
|
||
ret = lsetfileconat (chdir_fd, file_name, st->cntx_name);
|
||
sysname = "lsetfileconat";
|
||
}
|
||
|
||
if (ret < 0)
|
||
warnopt (WARN_XATTR_WRITE, errno,
|
||
_("%s: Cannot set SELinux context for file '%s'"),
|
||
sysname, file_name);
|
||
#endif
|
||
}
|
||
}
|
||
|
||
static bool
|
||
xattrs_matches_mask (const char *kw, struct xattrs_mask_map *mm)
|
||
{
|
||
if (!mm->size)
|
||
return false;
|
||
|
||
for (idx_t i = 0; i < mm->used; i++)
|
||
if (fnmatch (mm->masks[i], kw, 0) == 0)
|
||
return true;
|
||
|
||
return false;
|
||
}
|
||
|
||
static bool
|
||
xattrs_kw_included (const char *kw, bool archiving)
|
||
{
|
||
static char const USER_DOT_PFX[] = "user.";
|
||
if (xattrs_setup.incl.size)
|
||
return xattrs_matches_mask (kw, &xattrs_setup.incl);
|
||
else if (archiving)
|
||
return true;
|
||
else
|
||
return strncmp (kw, USER_DOT_PFX, sizeof (USER_DOT_PFX) - 1) == 0;
|
||
}
|
||
|
||
static bool
|
||
xattrs_kw_excluded (const char *kw)
|
||
{
|
||
return xattrs_setup.excl.size ?
|
||
xattrs_matches_mask (kw, &xattrs_setup.excl) : false;
|
||
}
|
||
|
||
/* Check whether the xattr with keyword KW should be discarded from list of
|
||
attributes that are going to be archived/excluded (set ARCHIVING=true for
|
||
archiving, false for excluding) */
|
||
static bool
|
||
xattrs_masked_out (const char *kw, bool archiving)
|
||
{
|
||
return xattrs_kw_included (kw, archiving) ? xattrs_kw_excluded (kw) : true;
|
||
}
|
||
|
||
void
|
||
xattrs_xattrs_set (struct tar_stat_info const *st,
|
||
char const *file_name, char typeflag, bool later_run)
|
||
{
|
||
if (xattrs_option)
|
||
{
|
||
#ifndef HAVE_XATTRS
|
||
static bool done;
|
||
if (!done)
|
||
{
|
||
done = true;
|
||
paxwarn (0, _("XATTR support is not available"));
|
||
}
|
||
#else
|
||
if (!st->xattr_map.xm_size)
|
||
return;
|
||
|
||
for (idx_t i = 0; i < st->xattr_map.xm_size; i++)
|
||
{
|
||
char *keyword = st->xattr_map.xm_map[i].xkey + XATTRS_PREFIX_LEN;
|
||
|
||
/* TODO: this 'later_run' workaround is temporary solution -> once
|
||
capabilities should become fully supported by it's API and there
|
||
should exist something like xattrs_capabilities_set() call.
|
||
For a regular files: all extended attributes are restored during
|
||
the first run except 'security.capability' which is restored in
|
||
'later_run == 1'. */
|
||
if (typeflag == REGTYPE
|
||
&& later_run == (strcmp (keyword, "security.capability") != 0))
|
||
continue;
|
||
|
||
if (xattrs_masked_out (keyword, false /* extracting */ ))
|
||
/* we don't want to restore this keyword */
|
||
continue;
|
||
|
||
xattrs__fd_set (file_name, typeflag, keyword,
|
||
st->xattr_map.xm_map[i].xval_ptr,
|
||
st->xattr_map.xm_map[i].xval_len);
|
||
}
|
||
#endif
|
||
}
|
||
}
|
||
|
||
void
|
||
xattrs_print_char (struct tar_stat_info const *st, char *output)
|
||
{
|
||
if (verbose_option < 2)
|
||
{
|
||
*output = 0;
|
||
return;
|
||
}
|
||
|
||
if (xattrs_option || selinux_context_option > 0 || acls_option > 0)
|
||
{
|
||
/* placeholders */
|
||
*output = ' ';
|
||
output[1] = 0;
|
||
}
|
||
|
||
if (xattrs_option && st->xattr_map.xm_size)
|
||
for (idx_t i = 0; i < st->xattr_map.xm_size; i++)
|
||
{
|
||
char *keyword = st->xattr_map.xm_map[i].xkey + XATTRS_PREFIX_LEN;
|
||
if (!xattrs_masked_out (keyword, false /* like extracting */ ))
|
||
{
|
||
*output = '*';
|
||
break;
|
||
}
|
||
}
|
||
|
||
if (selinux_context_option > 0 && st->cntx_name)
|
||
*output = '.';
|
||
|
||
if (acls_option > 0 && (st->acls_a_len || st->acls_d_len))
|
||
*output = '+';
|
||
}
|
||
|
||
void
|
||
xattrs_print (struct tar_stat_info const *st)
|
||
{
|
||
if (verbose_option < 3)
|
||
return;
|
||
|
||
/* selinux */
|
||
if (selinux_context_option > 0 && st->cntx_name)
|
||
fprintf (stdlis, " s: %s\n", st->cntx_name);
|
||
|
||
/* acls */
|
||
if (acls_option > 0 && (st->acls_a_len || st->acls_d_len))
|
||
{
|
||
fprintf (stdlis, " a: ");
|
||
acls_one_line ("", ',', st->acls_a_ptr, st->acls_a_len);
|
||
if (st->acls_a_len && st->acls_d_len)
|
||
fprintf (stdlis, ",");
|
||
acls_one_line ("default:", ',', st->acls_d_ptr, st->acls_d_len);
|
||
fprintf (stdlis, "\n");
|
||
}
|
||
|
||
/* xattrs */
|
||
if (xattrs_option && st->xattr_map.xm_size)
|
||
{
|
||
for (idx_t i = 0; i < st->xattr_map.xm_size; i++)
|
||
{
|
||
char *keyword = st->xattr_map.xm_map[i].xkey + XATTRS_PREFIX_LEN;
|
||
if (!xattrs_masked_out (keyword, false /* like extracting */ ))
|
||
fprintf (stdlis, " x: %td %s\n",
|
||
st->xattr_map.xm_map[i].xval_len, keyword);
|
||
}
|
||
}
|
||
}
|