diff options
author | amw <none@none> | 2007-10-25 16:34:29 -0700 |
---|---|---|
committer | amw <none@none> | 2007-10-25 16:34:29 -0700 |
commit | da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0 (patch) | |
tree | 65be91fb78a6a66183197595333f2e8aafb4640a /usr/src/lib/libcmdutils/common/process_xattrs.c | |
parent | e845e33dd0d1aea22db7edaa8c7d43955d24609b (diff) | |
download | illumos-gate-da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0.tar.gz |
PSARC/2007/218 caller_context_t in all VOPs
PSARC/2007/227 VFS Feature Registration and ACL on Create
PSARC/2007/244 ZFS Case-insensitive support
PSARC/2007/315 Extensible Attribute Interfaces
PSARC/2007/394 ls(1) new command line options '-/' and '-%': CIFS system attributes support
PSARC/2007/403 Modified Access Checks for CIFS
PSARC/2007/410 Add system attribute support to chmod(1)
PSARC/2007/432 CIFS system attributes support for cp(1), pack(1), unpack(1), compress(1) and uncompress(1)
PSARC/2007/444 Rescind SETTABLE Attribute
PSARC/2007/459 CIFS system attributes support for cpio(1), pax(1), tar(1)
PSARC/2007/546 Update utilities to match CIFS system attributes changes.
PSARC/2007/560 ZFS sharesmb property
4890717 want append-only files
6417428 Case-insensitive file system name lookup to support CIFS
6417435 DOS attributes and additional timestamps to support for CIFS
6417442 File system quarantined and modified attributes to support an integrated Anti-Virus service
6417453 FS boolean property for rejecting/allowing invalid UTF-8 sequences in file names
6473733 RFE: Need support for open-deny modes
6473755 RFE: Need ability to reconcile oplock and delegation conflicts
6494624 sharemgr needs to support CIFS shares better
6546705 All vnode operations need to pass caller_context_t
6546706 Need VOP_SETATTR/VOP_GETATTR to support new, optional attributes
6546893 Solaris system attribute support
6550962 ZFS ACL inheritance needs to be enhanced to support Automatic Inheritance
6553589 RFE: VFS Feature Registration facility
6553770 RFE: ZFS support for ACL-on-CREATE (PSARC 2007/227)
6565581 ls(1) should support file system attributes proposed in PSARC/2007/315
6566784 NTFS streams are not copied along with the files.
6576205 cp(1), pack(1) and compress(1) should support file system attributes proposed in PSARC/2007/315
6578875 RFE: kernel interfaces for nbmand need improvement
6578883 RFE: VOP_SHRLOCK needs additional access types
6578885 chmod(1) should support file system attributes proposed in PSARC/2007/315
6578886 RFE: disallow nbmand state to change on remount
6583349 ACL parser needs to support audit/alarm ACE types
6590347 tar(1) should support filesystem attributes proposed in PSARC/2007/315
6597357 *tar* xv@ doesn't show the hidden directory even though it is restored
6597360 *tar* should re-init xattr info if openat() fails during extraction of and extended attribute
6597368 *tar* cannot restore hard linked extended attributes
6597374 *tar* doesn't display "x " when hard linked attributes are restored
6597375 *tar* extended attribute header off by one
6614861 *cpio* incorrectly archives extended system attributes with -@
6614896 *pax* incorrectly archives extended system attributes with -@
6615225 *tar* incorrectly archives extended system attributes with -@
6617183 CIFS Service - PSARC 2006/715
Diffstat (limited to 'usr/src/lib/libcmdutils/common/process_xattrs.c')
-rw-r--r-- | usr/src/lib/libcmdutils/common/process_xattrs.c | 334 |
1 files changed, 334 insertions, 0 deletions
diff --git a/usr/src/lib/libcmdutils/common/process_xattrs.c b/usr/src/lib/libcmdutils/common/process_xattrs.c new file mode 100644 index 0000000000..5c8df946a1 --- /dev/null +++ b/usr/src/lib/libcmdutils/common/process_xattrs.c @@ -0,0 +1,334 @@ +/* + * CDDL HEADER START + * + * The contents of this file are subject to the terms of the + * Common Development and Distribution License (the "License"). + * You may not use this file except in compliance with the License. + * + * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE + * or http://www.opensolaris.org/os/licensing. + * See the License for the specific language governing permissions + * and limitations under the License. + * + * When distributing Covered Code, include this CDDL HEADER in each + * file and include the License file at usr/src/OPENSOLARIS.LICENSE. + * If applicable, add the following below this CDDL HEADER, with the + * fields enclosed by brackets "[]" replaced with your own identifying + * information: Portions Copyright [yyyy] [name of copyright owner] + * + * CDDL HEADER END + */ +/* + * Copyright 2007 Sun Microsystems, Inc. All rights reserved. + * Use is subject to license terms. + */ + +#pragma ident "%Z%%M% %I% %E% SMI" + +#include <c_synonyms.h> +#include "libcmdutils.h" + + +/* + * Gets file descriptors of attribute directories for source and target + * attribute files + */ +int +get_attrdirs(int indfd, int outdfd, char *attrfile, int *sfd, int *tfd) +{ + int pwdfd; + int fd1; + int fd2; + + pwdfd = open(".", O_RDONLY); + if ((pwdfd != -1) && (fchdir(indfd) == 0)) { + if ((fd1 = attropen(attrfile, ".", O_RDONLY)) == -1) { + (void) fchdir(pwdfd); + (void) close(pwdfd); + return (1); + } + *sfd = fd1; + } else { + (void) fchdir(pwdfd); + (void) close(pwdfd); + return (1); + } + if (fchdir(outdfd) == 0) { + if ((fd2 = attropen(attrfile, ".", O_RDONLY)) == -1) { + (void) fchdir(pwdfd); + (void) close(pwdfd); + return (1); + } + *tfd = fd2; + } else { + (void) fchdir(pwdfd); + (void) close(pwdfd); + return (1); + } + (void) fchdir(pwdfd); + return (0); +} + +/* + * mv_xattrs - Copies the content of the extended attribute files. Then + * moves the extended system attributes from the input attribute files + * to the target attribute files. Moves the extended system attributes + * from source to the target file. This function returns 0 on success + * and nonzero on error. + */ +int +mv_xattrs(char *cmd, char *infile, char *outfile, int sattr, int silent) +{ + int srcfd = -1; + int indfd = -1; + int outdfd = -1; + int tmpfd = -1; + int sattrfd = -1; + int tattrfd = -1; + int asfd = -1; + int atfd = -1; + DIR *dirp = NULL; + struct dirent *dp = NULL; + char *etext = NULL; + struct stat st1; + struct stat st2; + nvlist_t *response = NULL; + nvlist_t *res = NULL; + + if ((srcfd = open(infile, O_RDONLY)) == -1) { + etext = dgettext(TEXT_DOMAIN, "cannot open source"); + goto error; + } + if (sattr) + response = sysattr_list(cmd, srcfd, infile); + + if ((indfd = openat(srcfd, ".", O_RDONLY|O_XATTR)) == -1) { + etext = dgettext(TEXT_DOMAIN, "cannot openat source"); + goto error; + } + if ((outdfd = attropen(outfile, ".", O_RDONLY)) == -1) { + etext = dgettext(TEXT_DOMAIN, "cannot attropen target"); + goto error; + } + if ((tmpfd = dup(indfd)) == -1) { + etext = dgettext(TEXT_DOMAIN, "cannot dup descriptor"); + goto error; + + } + if ((dirp = fdopendir(tmpfd)) == NULL) { + etext = dgettext(TEXT_DOMAIN, "cannot access source"); + goto error; + } + while ((dp = readdir(dirp)) != NULL) { + if ((dp->d_name[0] == '.' && dp->d_name[1] == '\0') || + (dp->d_name[0] == '.' && dp->d_name[1] == '.' && + dp->d_name[2] == '\0') || + (sysattr_type(dp->d_name) == _RO_SATTR) || + (sysattr_type(dp->d_name) == _RW_SATTR)) + continue; + + if ((sattrfd = openat(indfd, dp->d_name, + O_RDONLY)) == -1) { + etext = dgettext(TEXT_DOMAIN, + "cannot open src attribute file"); + goto error; + } + if (fstat(sattrfd, &st1) < 0) { + etext = dgettext(TEXT_DOMAIN, + "could not stat attribute file"); + goto error; + } + if ((tattrfd = openat(outdfd, dp->d_name, + O_RDWR|O_CREAT|O_TRUNC, st1.st_mode)) == -1) { + etext = dgettext(TEXT_DOMAIN, + "cannot open target attribute file"); + goto error; + } + if (fstat(tattrfd, &st2) < 0) { + etext = dgettext(TEXT_DOMAIN, + "could not stat attribute file"); + goto error; + } + if (writefile(sattrfd, tattrfd, infile, outfile, dp->d_name, + dp->d_name, &st1, &st2) != 0) { + etext = dgettext(TEXT_DOMAIN, + "failed to copy extended attribute " + "from source to target"); + goto error; + } + + errno = 0; + if (sattr) { + /* + * Gets non default extended system attributes from + * source to copy to target. + */ + if (dp->d_name != NULL) + res = sysattr_list(cmd, sattrfd, dp->d_name); + + if (res != NULL && + get_attrdirs(indfd, outdfd, dp->d_name, &asfd, + &atfd) != 0) { + etext = dgettext(TEXT_DOMAIN, + "Failed to open attribute files"); + goto error; + } + /* + * Copy extended system attribute from source + * attribute file to target attribute file + */ + if (res != NULL && + (renameat(asfd, VIEW_READWRITE, atfd, + VIEW_READWRITE) != 0)) { + if (errno == EPERM) + etext = dgettext(TEXT_DOMAIN, + "Permission denied -" + "failed to move system attribute"); + else + etext = dgettext(TEXT_DOMAIN, + "failed to move extended " + "system attribute"); + goto error; + } + } + if (sattrfd != -1) + (void) close(sattrfd); + if (tattrfd != -1) + (void) close(tattrfd); + if (asfd != -1) + (void) close(asfd); + if (atfd != -1) + (void) close(atfd); + if (res != NULL) { + nvlist_free(res); + res = NULL; + } + } + errno = 0; + /* Copy extended system attribute from source to target */ + + if (response != NULL) { + if (renameat(indfd, VIEW_READWRITE, outdfd, + VIEW_READWRITE) == 0) + goto done; + + if (errno == EPERM) + etext = dgettext(TEXT_DOMAIN, "Permission denied"); + else + etext = dgettext(TEXT_DOMAIN, + "failed to move system attribute"); + } +error: + if (res != NULL) + nvlist_free(res); + if (silent == 0 && etext != NULL) { + if (!sattr) + (void) fprintf(stderr, dgettext(TEXT_DOMAIN, + "%s: %s: cannot move extended attributes, "), + cmd, infile); + else + (void) fprintf(stderr, dgettext(TEXT_DOMAIN, + "%s: %s: cannot move extended system " + "attributes, "), cmd, infile); + perror(etext); + } +done: + if (dirp) + (void) closedir(dirp); + if (sattrfd != -1) + (void) close(sattrfd); + if (tattrfd != -1) + (void) close(tattrfd); + if (asfd != -1) + (void) close(asfd); + if (atfd != -1) + (void) close(atfd); + if (indfd != -1) + (void) close(indfd); + if (outdfd != -1) + (void) close(outdfd); + if (response != NULL) + nvlist_free(response); + if (etext != NULL) + return (1); + else + return (0); +} + +/* + * The function returns non default extended system attribute list + * associated with 'fname' and returns NULL when an error has occured + * or when only extended system attributes other than archive, + * av_modified or crtime are set. + * + * The function returns system attribute list for the following cases: + * + * - any extended system attribute other than the default attributes + * ('archive', 'av_modified' and 'crtime') is set + * - nvlist has NULL name string + * - nvpair has data type of 'nvlist' + * - default data type. + */ + +nvlist_t * +sysattr_list(char *cmd, int fd, char *fname) +{ + boolean_t value; + data_type_t type; + nvlist_t *response; + nvpair_t *pair; + f_attr_t fattr; + char *name; + + if (nvlist_alloc(&response, NV_UNIQUE_NAME, 0) != 0) { + (void) fprintf(stderr, dgettext(TEXT_DOMAIN, + "%s: %s: nvlist_alloc failed\n"), + cmd, fname); + return (NULL); + } + if (fgetattr(fd, XATTR_VIEW_READWRITE, &response) != 0) { + (void) fprintf(stderr, dgettext(TEXT_DOMAIN, + "%s: %s: fgetattr failed\n"), + cmd, fname); + nvlist_free(response); + return (NULL); + } + pair = NULL; + while ((pair = nvlist_next_nvpair(response, pair)) != NULL) { + + name = nvpair_name(pair); + + if (name != NULL) + fattr = name_to_attr(name); + else + return (response); + + type = nvpair_type(pair); + switch (type) { + case DATA_TYPE_BOOLEAN_VALUE: + if (nvpair_value_boolean_value(pair, + &value) != 0) { + (void) fprintf(stderr, + dgettext(TEXT_DOMAIN, "%s " + "nvpair_value_boolean_value " + "failed\n"), cmd); + continue; + } + if (value && fattr != F_ARCHIVE && + fattr != F_AV_MODIFIED) + return (response); + break; + case DATA_TYPE_UINT64_ARRAY: + if (fattr != F_CRTIME) + return (response); + break; + case DATA_TYPE_NVLIST: + default: + return (response); + break; + } + } + if (response != NULL) + nvlist_free(response); + return (NULL); +} |