xattrs.c 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864
  1. /* Support for extended attributes.
  2. Copyright (C) 2006-2023 Free Software Foundation, Inc.
  3. This file is part of GNU tar.
  4. GNU tar is free software; you can redistribute it and/or modify
  5. it under the terms of the GNU General Public License as published by
  6. the Free Software Foundation; either version 3 of the License, or
  7. (at your option) any later version.
  8. GNU tar is distributed in the hope that it will be useful,
  9. but WITHOUT ANY WARRANTY; without even the implied warranty of
  10. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  11. GNU General Public License for more details.
  12. You should have received a copy of the GNU General Public License
  13. along with this program. If not, see <http://www.gnu.org/licenses/>.
  14. Written by James Antill, on 2006-07-27. */
  15. #include <config.h>
  16. #include <system.h>
  17. #include <fnmatch.h>
  18. #include <quotearg.h>
  19. #include "common.h"
  20. #include "xattr-at.h"
  21. #include "selinux-at.h"
  22. #define XATTRS_PREFIX "SCHILY.xattr."
  23. #define XATTRS_PREFIX_LEN (sizeof XATTRS_PREFIX - 1)
  24. void
  25. xheader_xattr_init (struct tar_stat_info *st)
  26. {
  27. xattr_map_init (&st->xattr_map);
  28. st->acls_a_ptr = NULL;
  29. st->acls_a_len = 0;
  30. st->acls_d_ptr = NULL;
  31. st->acls_d_len = 0;
  32. st->cntx_name = NULL;
  33. }
  34. void
  35. xattr_map_init (struct xattr_map *map)
  36. {
  37. memset (map, 0, sizeof *map);
  38. }
  39. void
  40. xattr_map_free (struct xattr_map *xattr_map)
  41. {
  42. size_t i;
  43. for (i = 0; i < xattr_map->xm_size; i++)
  44. {
  45. free (xattr_map->xm_map[i].xkey);
  46. free (xattr_map->xm_map[i].xval_ptr);
  47. }
  48. free (xattr_map->xm_map);
  49. }
  50. void
  51. xattr_map_add (struct xattr_map *map,
  52. const char *key, const char *val, size_t len)
  53. {
  54. struct xattr_array *p;
  55. if (map->xm_size == map->xm_max)
  56. map->xm_map = x2nrealloc (map->xm_map, &map->xm_max,
  57. sizeof (map->xm_map[0]));
  58. p = &map->xm_map[map->xm_size];
  59. p->xkey = xstrdup (key);
  60. p->xval_ptr = xmemdup (val, len + 1);
  61. p->xval_len = len;
  62. map->xm_size++;
  63. }
  64. void
  65. xheader_xattr_add (struct tar_stat_info *st,
  66. const char *key, const char *val, size_t len)
  67. {
  68. size_t klen = strlen (key);
  69. char *xkey = xmalloc (XATTRS_PREFIX_LEN + klen + 1);
  70. char *tmp = xkey;
  71. tmp = stpcpy (tmp, XATTRS_PREFIX);
  72. stpcpy (tmp, key);
  73. xattr_map_add (&st->xattr_map, xkey, val, len);
  74. free (xkey);
  75. }
  76. void
  77. xattr_map_copy (struct xattr_map *dst, const struct xattr_map *src)
  78. {
  79. size_t i;
  80. for (i = 0; i < src->xm_size; i++)
  81. xattr_map_add (dst, src->xm_map[i].xkey,
  82. src->xm_map[i].xval_ptr,
  83. src->xm_map[i].xval_len);
  84. }
  85. struct xattrs_mask_map
  86. {
  87. const char **masks;
  88. size_t size;
  89. size_t used;
  90. };
  91. /* list of fnmatch patterns */
  92. static struct
  93. {
  94. /* lists of fnmatch patterns */
  95. struct xattrs_mask_map incl;
  96. struct xattrs_mask_map excl;
  97. } xattrs_setup;
  98. /* disable posix acls when problem found in gnulib script m4/acl.m4 */
  99. #if ! USE_ACL
  100. # undef HAVE_POSIX_ACLS
  101. #endif
  102. #ifdef HAVE_POSIX_ACLS
  103. # include "acl.h"
  104. # include <sys/acl.h>
  105. # ifdef HAVE_ACL_LIBACL_H
  106. # /* needed for numeric-owner support */
  107. # include <acl/libacl.h>
  108. # endif
  109. #endif
  110. #ifdef HAVE_POSIX_ACLS
  111. /* acl-at wrappers, TODO: move to gnulib in future? */
  112. static acl_t acl_get_file_at (int, const char *, acl_type_t);
  113. static int acl_set_file_at (int, const char *, acl_type_t, acl_t);
  114. static int file_has_acl_at (int, char const *, struct stat const *);
  115. static int acl_delete_def_file_at (int, char const *);
  116. /* acl_get_file_at */
  117. #define AT_FUNC_NAME acl_get_file_at
  118. #define AT_FUNC_RESULT acl_t
  119. #define AT_FUNC_FAIL (acl_t)NULL
  120. #define AT_FUNC_F1 acl_get_file
  121. #define AT_FUNC_POST_FILE_PARAM_DECLS , acl_type_t type
  122. #define AT_FUNC_POST_FILE_ARGS , type
  123. #include "at-func.c"
  124. #undef AT_FUNC_NAME
  125. #undef AT_FUNC_F1
  126. #undef AT_FUNC_RESULT
  127. #undef AT_FUNC_FAIL
  128. #undef AT_FUNC_POST_FILE_PARAM_DECLS
  129. #undef AT_FUNC_POST_FILE_ARGS
  130. /* acl_set_file_at */
  131. #define AT_FUNC_NAME acl_set_file_at
  132. #define AT_FUNC_F1 acl_set_file
  133. #define AT_FUNC_POST_FILE_PARAM_DECLS , acl_type_t type, acl_t acl
  134. #define AT_FUNC_POST_FILE_ARGS , type, acl
  135. #include "at-func.c"
  136. #undef AT_FUNC_NAME
  137. #undef AT_FUNC_F1
  138. #undef AT_FUNC_POST_FILE_PARAM_DECLS
  139. #undef AT_FUNC_POST_FILE_ARGS
  140. /* acl_delete_def_file_at */
  141. #define AT_FUNC_NAME acl_delete_def_file_at
  142. #define AT_FUNC_F1 acl_delete_def_file
  143. #define AT_FUNC_POST_FILE_PARAM_DECLS
  144. #define AT_FUNC_POST_FILE_ARGS
  145. #include "at-func.c"
  146. #undef AT_FUNC_NAME
  147. #undef AT_FUNC_F1
  148. #undef AT_FUNC_POST_FILE_PARAM_DECLS
  149. #undef AT_FUNC_POST_FILE_ARGS
  150. /* gnulib file_has_acl_at */
  151. #define AT_FUNC_NAME file_has_acl_at
  152. #define AT_FUNC_F1 file_has_acl
  153. #define AT_FUNC_POST_FILE_PARAM_DECLS , struct stat const *st
  154. #define AT_FUNC_POST_FILE_ARGS , st
  155. #include "at-func.c"
  156. #undef AT_FUNC_NAME
  157. #undef AT_FUNC_F1
  158. #undef AT_FUNC_POST_FILE_PARAM_DECLS
  159. #undef AT_FUNC_POST_FILE_ARGS
  160. /* convert unix permissions into an ACL ... needed due to "default" ACLs */
  161. static acl_t
  162. perms2acl (int perms)
  163. {
  164. char val[] = "user::---,group::---,other::---";
  165. /* 0123456789 123456789 123456789 123456789 */
  166. /* user */
  167. if (perms & 0400)
  168. val[6] = 'r';
  169. if (perms & 0200)
  170. val[7] = 'w';
  171. if (perms & 0100)
  172. val[8] = 'x';
  173. /* group */
  174. if (perms & 0040)
  175. val[17] = 'r';
  176. if (perms & 0020)
  177. val[18] = 'w';
  178. if (perms & 0010)
  179. val[19] = 'x';
  180. /* other */
  181. if (perms & 0004)
  182. val[28] = 'r';
  183. if (perms & 0002)
  184. val[29] = 'w';
  185. if (perms & 0001)
  186. val[30] = 'x';
  187. return acl_from_text (val);
  188. }
  189. static char *
  190. skip_to_ext_fields (char *ptr)
  191. {
  192. /* skip tag name (user/group/default/mask) */
  193. ptr += strcspn (ptr, ":,\n");
  194. if (*ptr != ':')
  195. return ptr;
  196. ++ptr;
  197. ptr += strcspn (ptr, ":,\n"); /* skip user/group name */
  198. if (*ptr != ':')
  199. return ptr;
  200. ++ptr;
  201. ptr += strcspn (ptr, ":,\n"); /* skip perms */
  202. return ptr;
  203. }
  204. /* The POSIX draft allows extra fields after the three main ones. Star
  205. uses this to add a fourth field for user/group which is the numeric ID.
  206. This function removes such extra fields by overwriting them with the
  207. characters that follow. */
  208. static char *
  209. fixup_extra_acl_fields (char *ptr)
  210. {
  211. char *src = ptr;
  212. char *dst = ptr;
  213. while (*src)
  214. {
  215. const char *old = src;
  216. size_t len = 0;
  217. src = skip_to_ext_fields (src);
  218. len = src - old;
  219. if (old != dst)
  220. memmove (dst, old, len);
  221. dst += len;
  222. if (*src == ':') /* We have extra fields, skip them all */
  223. src += strcspn (src, "\n,");
  224. if ((*src == '\n') || (*src == ','))
  225. *dst++ = *src++; /* also done when dst == src, but that's ok */
  226. }
  227. if (src != dst)
  228. *dst = 0;
  229. return ptr;
  230. }
  231. /* Set the "system.posix_acl_access/system.posix_acl_default" extended
  232. attribute. Called only when acls_option > 0. */
  233. static void
  234. xattrs__acls_set (struct tar_stat_info const *st,
  235. char const *file_name, int type,
  236. char *ptr, size_t len, bool def)
  237. {
  238. acl_t acl;
  239. if (ptr)
  240. {
  241. /* assert (strlen (ptr) == len); */
  242. ptr = fixup_extra_acl_fields (ptr);
  243. acl = acl_from_text (ptr);
  244. }
  245. else if (def)
  246. {
  247. /* No "default" IEEE 1003.1e ACL set for directory. At this moment,
  248. FILE_NAME may already have inherited default acls from parent
  249. directory; clean them up. */
  250. if (acl_delete_def_file_at (chdir_fd, file_name))
  251. WARNOPT (WARN_XATTR_WRITE,
  252. (0, errno,
  253. _("acl_delete_def_file_at: Cannot drop default POSIX ACLs "
  254. "for file '%s'"),
  255. file_name));
  256. return;
  257. }
  258. else
  259. acl = perms2acl (st->stat.st_mode);
  260. if (!acl)
  261. {
  262. call_arg_warn ("acl_from_text", file_name);
  263. return;
  264. }
  265. if (acl_set_file_at (chdir_fd, file_name, type, acl) == -1)
  266. /* warn even if filesystem does not support acls */
  267. WARNOPT (WARN_XATTR_WRITE,
  268. (0, errno,
  269. _ ("acl_set_file_at: Cannot set POSIX ACLs for file '%s'"),
  270. file_name));
  271. acl_free (acl);
  272. }
  273. /* Cleanup textual representation of the ACL in VAL by eliminating tab
  274. characters and comments */
  275. static void
  276. xattrs_acls_cleanup (char *val, size_t *plen)
  277. {
  278. char *p, *q;
  279. p = q = val + strcspn (val, "#\t");
  280. while (*q)
  281. {
  282. if (*q == '\t')
  283. q++;
  284. else if (*q == '#')
  285. {
  286. while (*q != '\n')
  287. q++;
  288. }
  289. else
  290. *p++ = *q++;
  291. }
  292. *plen = p - val;
  293. *p++ = 0;
  294. }
  295. static void
  296. acls_get_text (int parentfd, const char *file_name, acl_type_t type,
  297. char **ret_ptr, size_t * ret_len)
  298. {
  299. char *val = NULL;
  300. acl_t acl;
  301. if (!(acl = acl_get_file_at (parentfd, file_name, type)))
  302. {
  303. if (errno != ENOTSUP)
  304. call_arg_warn ("acl_get_file_at", file_name);
  305. return;
  306. }
  307. if (numeric_owner_option)
  308. {
  309. #ifdef HAVE_ACL_LIBACL_H
  310. val = acl_to_any_text (acl, NULL, '\n',
  311. TEXT_SOME_EFFECTIVE | TEXT_NUMERIC_IDS);
  312. #else
  313. static int warned;
  314. if (!warned)
  315. {
  316. WARN ((0, 0, _("--numeric-owner is ignored for ACLs: libacl is not available")));
  317. warned = 1;
  318. }
  319. #endif
  320. }
  321. else
  322. val = acl_to_text (acl, NULL);
  323. acl_free (acl);
  324. if (!val)
  325. {
  326. call_arg_warn ("acl_to_text", file_name);
  327. return;
  328. }
  329. *ret_ptr = xstrdup (val);
  330. xattrs_acls_cleanup (*ret_ptr, ret_len);
  331. acl_free (val);
  332. }
  333. static void
  334. xattrs__acls_get_a (int parentfd, const char *file_name,
  335. struct tar_stat_info *st,
  336. char **ret_ptr, size_t *ret_len)
  337. {
  338. acls_get_text (parentfd, file_name, ACL_TYPE_ACCESS, ret_ptr, ret_len);
  339. }
  340. /* "system.posix_acl_default" */
  341. static void
  342. xattrs__acls_get_d (int parentfd, char const *file_name,
  343. struct tar_stat_info *st,
  344. char **ret_ptr, size_t * ret_len)
  345. {
  346. acls_get_text (parentfd, file_name, ACL_TYPE_DEFAULT, ret_ptr, ret_len);
  347. }
  348. #endif /* HAVE_POSIX_ACLS */
  349. static void
  350. acls_one_line (const char *prefix, char delim,
  351. const char *aclstring, size_t len)
  352. {
  353. /* support both long and short text representation of posix acls */
  354. struct obstack stk;
  355. int pref_len = strlen (prefix);
  356. const char *oldstring = aclstring;
  357. int pos = 0;
  358. if (!aclstring || !len)
  359. return;
  360. obstack_init (&stk);
  361. while (pos <= len)
  362. {
  363. int move = strcspn (aclstring, ",\n");
  364. if (!move)
  365. break;
  366. if (oldstring != aclstring)
  367. obstack_1grow (&stk, delim);
  368. obstack_grow (&stk, prefix, pref_len);
  369. obstack_grow (&stk, aclstring, move);
  370. pos += move + 1;
  371. aclstring += move + 1;
  372. }
  373. obstack_1grow (&stk, '\0');
  374. fprintf (stdlis, "%s", (char *) obstack_finish (&stk));
  375. obstack_free (&stk, NULL);
  376. }
  377. void
  378. xattrs_acls_get (int parentfd, char const *file_name,
  379. struct tar_stat_info *st, int fd, int xisfile)
  380. {
  381. if (acls_option > 0)
  382. {
  383. #ifndef HAVE_POSIX_ACLS
  384. static int done = 0;
  385. if (!done)
  386. WARN ((0, 0, _("POSIX ACL support is not available")));
  387. done = 1;
  388. #else
  389. int err = file_has_acl_at (parentfd, file_name, &st->stat);
  390. if (err == 0)
  391. return;
  392. if (err == -1)
  393. {
  394. call_arg_warn ("file_has_acl_at", file_name);
  395. return;
  396. }
  397. xattrs__acls_get_a (parentfd, file_name, st,
  398. &st->acls_a_ptr, &st->acls_a_len);
  399. if (!xisfile)
  400. xattrs__acls_get_d (parentfd, file_name, st,
  401. &st->acls_d_ptr, &st->acls_d_len);
  402. #endif
  403. }
  404. }
  405. void
  406. xattrs_acls_set (struct tar_stat_info const *st,
  407. char const *file_name, char typeflag)
  408. {
  409. if (acls_option > 0 && typeflag != SYMTYPE)
  410. {
  411. #ifndef HAVE_POSIX_ACLS
  412. static int done = 0;
  413. if (!done)
  414. WARN ((0, 0, _("POSIX ACL support is not available")));
  415. done = 1;
  416. #else
  417. xattrs__acls_set (st, file_name, ACL_TYPE_ACCESS,
  418. st->acls_a_ptr, st->acls_a_len, false);
  419. if (typeflag == DIRTYPE || typeflag == GNUTYPE_DUMPDIR)
  420. xattrs__acls_set (st, file_name, ACL_TYPE_DEFAULT,
  421. st->acls_d_ptr, st->acls_d_len, true);
  422. #endif
  423. }
  424. }
  425. static void
  426. mask_map_realloc (struct xattrs_mask_map *map)
  427. {
  428. if (map->used == map->size)
  429. {
  430. if (map->size == 0)
  431. map->size = 4;
  432. map->masks = x2nrealloc (map->masks, &map->size, sizeof (map->masks[0]));
  433. }
  434. }
  435. void
  436. xattrs_mask_add (const char *mask, bool incl)
  437. {
  438. struct xattrs_mask_map *mask_map =
  439. incl ? &xattrs_setup.incl : &xattrs_setup.excl;
  440. /* ensure there is enough space */
  441. mask_map_realloc (mask_map);
  442. /* just assign pointers -- we silently expect that pointer "mask" is valid
  443. through the whole program (pointer to argv array) */
  444. mask_map->masks[mask_map->used++] = mask;
  445. }
  446. static void
  447. clear_mask_map (struct xattrs_mask_map *mask_map)
  448. {
  449. if (mask_map->size)
  450. free (mask_map->masks);
  451. }
  452. void
  453. xattrs_clear_setup (void)
  454. {
  455. clear_mask_map (&xattrs_setup.incl);
  456. clear_mask_map (&xattrs_setup.excl);
  457. }
  458. static bool xattrs_masked_out (const char *kw, bool archiving);
  459. /* get xattrs from file given by FILE_NAME or FD (when non-zero)
  460. xattrs are checked against the user supplied include/exclude mask
  461. if no mask is given this includes all the user.*, security.*, system.*,
  462. etc. available domains */
  463. void
  464. xattrs_xattrs_get (int parentfd, char const *file_name,
  465. struct tar_stat_info *st, int fd)
  466. {
  467. if (xattrs_option > 0)
  468. {
  469. #ifndef HAVE_XATTRS
  470. static int done = 0;
  471. if (!done)
  472. WARN ((0, 0, _("XATTR support is not available")));
  473. done = 1;
  474. #else
  475. static size_t xsz = 1024;
  476. static char *xatrs = NULL;
  477. ssize_t xret = -1;
  478. if (!xatrs)
  479. xatrs = x2nrealloc (xatrs, &xsz, 1);
  480. while (((fd == 0) ?
  481. ((xret =
  482. llistxattrat (parentfd, file_name, xatrs, xsz)) == -1) :
  483. ((xret = flistxattr (fd, xatrs, xsz)) == -1))
  484. && (errno == ERANGE))
  485. {
  486. xatrs = x2nrealloc (xatrs, &xsz, 1);
  487. }
  488. if (xret == -1)
  489. call_arg_warn ((fd == 0) ? "llistxattrat" : "flistxattr", file_name);
  490. else
  491. {
  492. const char *attr = xatrs;
  493. static size_t asz = 1024;
  494. static char *val = NULL;
  495. if (!val)
  496. val = x2nrealloc (val, &asz, 1);
  497. while (xret > 0)
  498. {
  499. size_t len = strlen (attr);
  500. ssize_t aret = 0;
  501. while (((fd == 0)
  502. ? ((aret = lgetxattrat (parentfd, file_name, attr,
  503. val, asz)) == -1)
  504. : ((aret = fgetxattr (fd, attr, val, asz)) == -1))
  505. && (errno == ERANGE))
  506. {
  507. val = x2nrealloc (val, &asz, 1);
  508. }
  509. if (aret != -1)
  510. {
  511. if (!xattrs_masked_out (attr, true))
  512. xheader_xattr_add (st, attr, val, aret);
  513. }
  514. else if (errno != ENOATTR)
  515. call_arg_warn ((fd == 0) ? "lgetxattrat"
  516. : "fgetxattr", file_name);
  517. attr += len + 1;
  518. xret -= len + 1;
  519. }
  520. }
  521. #endif
  522. }
  523. }
  524. #ifdef HAVE_XATTRS
  525. static void
  526. xattrs__fd_set (struct tar_stat_info const *st,
  527. char const *file_name, char typeflag,
  528. const char *attr, const char *ptr, size_t len)
  529. {
  530. if (ptr)
  531. {
  532. const char *sysname = "setxattrat";
  533. int ret = -1;
  534. if (typeflag != SYMTYPE)
  535. ret = setxattrat (chdir_fd, file_name, attr, ptr, len, 0);
  536. else
  537. {
  538. sysname = "lsetxattr";
  539. ret = lsetxattrat (chdir_fd, file_name, attr, ptr, len, 0);
  540. }
  541. if (ret == -1)
  542. WARNOPT (WARN_XATTR_WRITE,
  543. (0, errno,
  544. _("%s: Cannot set '%s' extended attribute for file '%s'"),
  545. sysname, attr, file_name));
  546. }
  547. }
  548. #endif
  549. /* lgetfileconat is called against FILE_NAME iff the FD parameter is set to
  550. zero, otherwise the fgetfileconat is used against correct file descriptor */
  551. void
  552. xattrs_selinux_get (int parentfd, char const *file_name,
  553. struct tar_stat_info *st, int fd)
  554. {
  555. if (selinux_context_option > 0)
  556. {
  557. #if HAVE_SELINUX_SELINUX_H != 1
  558. static int done = 0;
  559. if (!done)
  560. WARN ((0, 0, _("SELinux support is not available")));
  561. done = 1;
  562. #else
  563. int result = fd ?
  564. fgetfilecon (fd, &st->cntx_name)
  565. : lgetfileconat (parentfd, file_name, &st->cntx_name);
  566. if (result == -1 && errno != ENODATA && errno != ENOTSUP)
  567. call_arg_warn (fd ? "fgetfilecon" : "lgetfileconat", file_name);
  568. #endif
  569. }
  570. }
  571. void
  572. xattrs_selinux_set (struct tar_stat_info const *st,
  573. char const *file_name, char typeflag)
  574. {
  575. if (selinux_context_option > 0)
  576. {
  577. #if HAVE_SELINUX_SELINUX_H != 1
  578. static int done = 0;
  579. if (!done)
  580. WARN ((0, 0, _("SELinux support is not available")));
  581. done = 1;
  582. #else
  583. const char *sysname = "setfilecon";
  584. int ret;
  585. if (!st->cntx_name)
  586. return;
  587. if (typeflag != SYMTYPE)
  588. {
  589. ret = setfileconat (chdir_fd, file_name, st->cntx_name);
  590. sysname = "setfileconat";
  591. }
  592. else
  593. {
  594. ret = lsetfileconat (chdir_fd, file_name, st->cntx_name);
  595. sysname = "lsetfileconat";
  596. }
  597. if (ret == -1)
  598. WARNOPT (WARN_XATTR_WRITE,
  599. (0, errno,
  600. _("%s: Cannot set SELinux context for file '%s'"),
  601. sysname, file_name));
  602. #endif
  603. }
  604. }
  605. static bool
  606. xattrs_matches_mask (const char *kw, struct xattrs_mask_map *mm)
  607. {
  608. int i;
  609. if (!mm->size)
  610. return false;
  611. for (i = 0; i < mm->used; i++)
  612. if (fnmatch (mm->masks[i], kw, 0) == 0)
  613. return true;
  614. return false;
  615. }
  616. #define USER_DOT_PFX "user."
  617. static bool
  618. xattrs_kw_included (const char *kw, bool archiving)
  619. {
  620. if (xattrs_setup.incl.size)
  621. return xattrs_matches_mask (kw, &xattrs_setup.incl);
  622. else if (archiving)
  623. return true;
  624. else
  625. return strncmp (kw, USER_DOT_PFX, sizeof (USER_DOT_PFX) - 1) == 0;
  626. }
  627. static bool
  628. xattrs_kw_excluded (const char *kw, bool archiving)
  629. {
  630. return xattrs_setup.excl.size ?
  631. xattrs_matches_mask (kw, &xattrs_setup.excl) : false;
  632. }
  633. /* Check whether the xattr with keyword KW should be discarded from list of
  634. attributes that are going to be archived/excluded (set ARCHIVING=true for
  635. archiving, false for excluding) */
  636. static bool
  637. xattrs_masked_out (const char *kw, bool archiving)
  638. {
  639. return xattrs_kw_included (kw, archiving) ?
  640. xattrs_kw_excluded (kw, archiving) : true;
  641. }
  642. void
  643. xattrs_xattrs_set (struct tar_stat_info const *st,
  644. char const *file_name, char typeflag, int later_run)
  645. {
  646. if (xattrs_option > 0)
  647. {
  648. #ifndef HAVE_XATTRS
  649. static int done = 0;
  650. if (!done)
  651. WARN ((0, 0, _("XATTR support is not available")));
  652. done = 1;
  653. #else
  654. size_t i;
  655. if (!st->xattr_map.xm_size)
  656. return;
  657. for (i = 0; i < st->xattr_map.xm_size; i++)
  658. {
  659. char *keyword = st->xattr_map.xm_map[i].xkey + XATTRS_PREFIX_LEN;
  660. /* TODO: this 'later_run' workaround is temporary solution -> once
  661. capabilities should become fully supported by it's API and there
  662. should exist something like xattrs_capabilities_set() call.
  663. For a regular files: all extended attributes are restored during
  664. the first run except 'security.capability' which is restored in
  665. 'later_run == 1'. */
  666. if (typeflag == REGTYPE
  667. && later_run == !!strcmp (keyword, "security.capability"))
  668. continue;
  669. if (xattrs_masked_out (keyword, false /* extracting */ ))
  670. /* we don't want to restore this keyword */
  671. continue;
  672. xattrs__fd_set (st, file_name, typeflag, keyword,
  673. st->xattr_map.xm_map[i].xval_ptr,
  674. st->xattr_map.xm_map[i].xval_len);
  675. }
  676. #endif
  677. }
  678. }
  679. void
  680. xattrs_print_char (struct tar_stat_info const *st, char *output)
  681. {
  682. int i;
  683. if (verbose_option < 2)
  684. {
  685. *output = 0;
  686. return;
  687. }
  688. if (xattrs_option > 0 || selinux_context_option > 0 || acls_option > 0)
  689. {
  690. /* placeholders */
  691. *output = ' ';
  692. output[1] = 0;
  693. }
  694. if (xattrs_option > 0 && st->xattr_map.xm_size)
  695. for (i = 0; i < st->xattr_map.xm_size; ++i)
  696. {
  697. char *keyword = st->xattr_map.xm_map[i].xkey + XATTRS_PREFIX_LEN;
  698. if (!xattrs_masked_out (keyword, false /* like extracting */ ))
  699. {
  700. *output = '*';
  701. break;
  702. }
  703. }
  704. if (selinux_context_option > 0 && st->cntx_name)
  705. *output = '.';
  706. if (acls_option > 0 && (st->acls_a_len || st->acls_d_len))
  707. *output = '+';
  708. }
  709. void
  710. xattrs_print (struct tar_stat_info const *st)
  711. {
  712. if (verbose_option < 3)
  713. return;
  714. /* selinux */
  715. if (selinux_context_option > 0 && st->cntx_name)
  716. fprintf (stdlis, " s: %s\n", st->cntx_name);
  717. /* acls */
  718. if (acls_option > 0 && (st->acls_a_len || st->acls_d_len))
  719. {
  720. fprintf (stdlis, " a: ");
  721. acls_one_line ("", ',', st->acls_a_ptr, st->acls_a_len);
  722. if (st->acls_a_len && st->acls_d_len)
  723. fprintf (stdlis, ",");
  724. acls_one_line ("default:", ',', st->acls_d_ptr, st->acls_d_len);
  725. fprintf (stdlis, "\n");
  726. }
  727. /* xattrs */
  728. if (xattrs_option > 0 && st->xattr_map.xm_size)
  729. {
  730. int i;
  731. for (i = 0; i < st->xattr_map.xm_size; ++i)
  732. {
  733. char *keyword = st->xattr_map.xm_map[i].xkey + XATTRS_PREFIX_LEN;
  734. if (!xattrs_masked_out (keyword, false /* like extracting */ ))
  735. fprintf (stdlis, " x: %lu %s\n",
  736. (unsigned long) st->xattr_map.xm_map[i].xval_len, keyword);
  737. }
  738. }
  739. }