]> Dogcows Code - chaz/tar/blob - src/rtapelib.c
(encode_oflag): New function.
[chaz/tar] / src / rtapelib.c
1 /* Functions for communicating with a remote tape drive.
2 Copyright 1988, 1992, 1994, 1996, 1997, 1999 Free Software Foundation, Inc.
3
4 This program is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation; either version 2, or (at your option)
7 any later version.
8
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
13
14 You should have received a copy of the GNU General Public License
15 along with this program; if not, write to the Free Software Foundation,
16 Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
17
18 /* The man page rmt(8) for /etc/rmt documents the remote mag tape protocol
19 which rdump and rrestore use. Unfortunately, the man page is *WRONG*.
20 The author of the routines I'm including originally wrote his code just
21 based on the man page, and it didn't work, so he went to the rdump source
22 to figure out why. The only thing he had to change was to check for the
23 'F' return code in addition to the 'E', and to separate the various
24 arguments with \n instead of a space. I personally don't think that this
25 is much of a problem, but I wanted to point it out. -- Arnold Robbins
26
27 Originally written by Jeff Lee, modified some by Arnold Robbins. Redone
28 as a library that can replace open, read, write, etc., by Fred Fish, with
29 some additional work by Arnold Robbins. Modified to make all rmt* calls
30 into macros for speed by Jay Fenlason. Use -DWITH_REXEC for rexec
31 code, courtesy of Dan Kegel. */
32
33 #include "system.h"
34
35 #include "basename.h"
36 #include "safe-read.h"
37
38 /* Try hard to get EOPNOTSUPP defined. 486/ISC has it in net/errno.h,
39 3B2/SVR3 has it in sys/inet.h. Otherwise, like on MSDOS, use EINVAL. */
40
41 #ifndef EOPNOTSUPP
42 # if HAVE_NET_ERRNO_H
43 # include <net/errno.h>
44 # endif
45 # if HAVE_SYS_INET_H
46 # include <sys/inet.h>
47 # endif
48 # ifndef EOPNOTSUPP
49 # define EOPNOTSUPP EINVAL
50 # endif
51 #endif
52
53 #include <signal.h>
54
55 #if HAVE_NETDB_H
56 # include <netdb.h>
57 #endif
58
59 #include "rmt.h"
60
61 /* FIXME: Just to shut up -Wall. */
62 int rexec ();
63
64 /* Exit status if exec errors. */
65 #define EXIT_ON_EXEC_ERROR 128
66
67 /* FIXME: Size of buffers for reading and writing commands to rmt. */
68 #define COMMAND_BUFFER_SIZE 64
69
70 #ifndef RETSIGTYPE
71 # define RETSIGTYPE void
72 #endif
73
74 /* FIXME: Maximum number of simultaneous remote tape connections. */
75 #define MAXUNIT 4
76
77 #define PREAD 0 /* read file descriptor from pipe() */
78 #define PWRITE 1 /* write file descriptor from pipe() */
79
80 /* Return the parent's read side of remote tape connection Fd. */
81 #define READ_SIDE(Fd) (from_remote[Fd][PREAD])
82
83 /* Return the parent's write side of remote tape connection Fd. */
84 #define WRITE_SIDE(Fd) (to_remote[Fd][PWRITE])
85
86 /* The pipes for receiving data from remote tape drives. */
87 static int from_remote[MAXUNIT][2] = {{-1, -1}, {-1, -1}, {-1, -1}, {-1, -1}};
88
89 /* The pipes for sending data to remote tape drives. */
90 static int to_remote[MAXUNIT][2] = {{-1, -1}, {-1, -1}, {-1, -1}, {-1, -1}};
91
92 /* Temporary variable used by macros in rmt.h. */
93 char *rmt_path__;
94 \f
95
96 /*----------------------------------------------------------------------.
97 | Close remote tape connection HANDLE, and reset errno to ERRNO_VALUE. |
98 `----------------------------------------------------------------------*/
99
100 static void
101 _rmt_shutdown (int handle, int errno_value)
102 {
103 close (READ_SIDE (handle));
104 close (WRITE_SIDE (handle));
105 READ_SIDE (handle) = -1;
106 WRITE_SIDE (handle) = -1;
107 errno = errno_value; /* FIXME: errno should be read-only */
108 }
109
110 /*-------------------------------------------------------------------------.
111 | Attempt to perform the remote tape command specified in BUFFER on remote |
112 | tape connection HANDLE. Return 0 if successful, -1 on error. |
113 `-------------------------------------------------------------------------*/
114
115 static int
116 do_command (int handle, const char *buffer)
117 {
118 size_t length;
119 RETSIGTYPE (*pipe_handler) ();
120
121 /* Save the current pipe handler and try to make the request. */
122
123 pipe_handler = signal (SIGPIPE, SIG_IGN);
124 length = strlen (buffer);
125 if (full_write (WRITE_SIDE (handle), buffer, length) == length)
126 {
127 signal (SIGPIPE, pipe_handler);
128 return 0;
129 }
130
131 /* Something went wrong. Close down and go home. */
132
133 signal (SIGPIPE, pipe_handler);
134 _rmt_shutdown (handle, EIO);
135 return -1;
136 }
137
138 static char *
139 get_status_string (int handle, char *command_buffer)
140 {
141 char *cursor;
142 int counter;
143
144 /* Read the reply command line. */
145
146 for (counter = 0, cursor = command_buffer;
147 counter < COMMAND_BUFFER_SIZE;
148 counter++, cursor++)
149 {
150 if (safe_read (READ_SIDE (handle), cursor, 1) != 1)
151 {
152 _rmt_shutdown (handle, EIO);
153 return 0;
154 }
155 if (*cursor == '\n')
156 {
157 *cursor = '\0';
158 break;
159 }
160 }
161
162 if (counter == COMMAND_BUFFER_SIZE)
163 {
164 _rmt_shutdown (handle, EIO);
165 return 0;
166 }
167
168 /* Check the return status. */
169
170 for (cursor = command_buffer; *cursor; cursor++)
171 if (*cursor != ' ')
172 break;
173
174 if (*cursor == 'E' || *cursor == 'F')
175 {
176 errno = atoi (cursor + 1); /* FIXME: errno should be read-only */
177
178 /* Skip the error message line. */
179
180 /* FIXME: there is better to do than merely ignoring error messages
181 coming from the remote end. Translate them, too... */
182
183 {
184 char character;
185
186 while (safe_read (READ_SIDE (handle), &character, 1) == 1)
187 if (character == '\n')
188 break;
189 }
190
191 if (*cursor == 'F')
192 _rmt_shutdown (handle, errno);
193
194 return 0;
195 }
196
197 /* Check for mis-synced pipes. */
198
199 if (*cursor != 'A')
200 {
201 _rmt_shutdown (handle, EIO);
202 return 0;
203 }
204
205 /* Got an `A' (success) response. */
206
207 return cursor + 1;
208 }
209
210 /*----------------------------------------------------------------------.
211 | Read and return the status from remote tape connection HANDLE. If an |
212 | error occurred, return -1 and set errno. |
213 `----------------------------------------------------------------------*/
214
215 static long
216 get_status (int handle)
217 {
218 char command_buffer[COMMAND_BUFFER_SIZE];
219 const char *status = get_status_string (handle, command_buffer);
220 return status ? atol (status) : -1L;
221 }
222
223 static off_t
224 get_status_off (int handle)
225 {
226 char command_buffer[COMMAND_BUFFER_SIZE];
227 const char *status = get_status_string (handle, command_buffer);
228
229 if (! status)
230 return -1;
231 else
232 {
233 /* Parse status, taking care to check for overflow.
234 We can't use standard functions,
235 since off_t might be longer than long. */
236
237 off_t count = 0;
238 int negative;
239
240 for (; *status == ' ' || *status == '\t'; status++)
241 continue;
242
243 negative = *status == '-';
244 status += negative || *status == '+';
245
246 for (;;)
247 {
248 int digit = *status++ - '0';
249 if (9 < (unsigned) digit)
250 break;
251 else
252 {
253 off_t c10 = 10 * count;
254 off_t nc = negative ? c10 - digit : c10 + digit;
255 if (c10 / 10 != count || (negative ? c10 < nc : nc < c10))
256 return -1;
257 count = nc;
258 }
259 }
260
261 return count;
262 }
263 }
264
265 #if WITH_REXEC
266
267 /*-------------------------------------------------------------------------.
268 | Execute /etc/rmt as user USER on remote system HOST using rexec. Return |
269 | a file descriptor of a bidirectional socket for stdin and stdout. If |
270 | USER is NULL, use the current username. |
271 | |
272 | By default, this code is not used, since it requires that the user have |
273 | a .netrc file in his/her home directory, or that the application |
274 | designer be willing to have rexec prompt for login and password info. |
275 | This may be unacceptable, and .rhosts files for use with rsh are much |
276 | more common on BSD systems. |
277 `-------------------------------------------------------------------------*/
278
279 static int
280 _rmt_rexec (char *host, char *user)
281 {
282 int saved_stdin = dup (STDIN_FILENO);
283 int saved_stdout = dup (STDOUT_FILENO);
284 struct servent *rexecserv;
285 int result;
286
287 /* When using cpio -o < filename, stdin is no longer the tty. But the
288 rexec subroutine reads the login and the passwd on stdin, to allow
289 remote execution of the command. So, reopen stdin and stdout on
290 /dev/tty before the rexec and give them back their original value
291 after. */
292
293 if (freopen ("/dev/tty", "r", stdin) == NULL)
294 freopen ("/dev/null", "r", stdin);
295 if (freopen ("/dev/tty", "w", stdout) == NULL)
296 freopen ("/dev/null", "w", stdout);
297
298 if (rexecserv = getservbyname ("exec", "tcp"), !rexecserv)
299 error (EXIT_ON_EXEC_ERROR, 0, _("exec/tcp: Service not available"));
300
301 result = rexec (&host, rexecserv->s_port, user, NULL,
302 "/etc/rmt", (int *) NULL);
303 if (fclose (stdin) == EOF)
304 error (0, errno, _("stdin"));
305 fdopen (saved_stdin, "r");
306 if (fclose (stdout) == EOF)
307 error (0, errno, _("stdout"));
308 fdopen (saved_stdout, "w");
309
310 return result;
311 }
312
313 #endif /* WITH_REXEC */
314
315 /* Place into BUF a string representing OFLAG, which must be suitable
316 as argument 2 of `open'. BUF must be large enough to hold the
317 result. This function should generate a string that decode_oflag
318 can parse. */
319 static void
320 encode_oflag (char *buf, int oflag)
321 {
322 sprintf (buf, "%d ", oflag);
323
324 switch (oflag & O_ACCMODE)
325 {
326 case O_RDONLY: strcat (buf, "O_RDONLY"); break;
327 case O_RDWR: strcat (buf, "O_RDWR"); break;
328 case O_WRONLY: strcat (buf, "O_WRONLY"); break;
329 default: abort ();
330 }
331
332 if (oflag & O_APPEND) strcat (buf, "|O_APPEND");
333 if (oflag & O_CREAT) strcat (buf, "|O_CREAT");
334 #ifdef O_DSYNC
335 if (oflag & O_DSYNC) strcat (buf, "|O_DSYNC");
336 #endif
337 if (oflag & O_EXCL) strcat (buf, "|O_EXCL");
338 #ifdef O_LARGEFILE
339 if (oflag & O_LARGEFILE) strcat (buf, "|O_LARGEFILE");
340 #endif
341 #ifdef O_NOCTTY
342 if (oflag & O_NOCTTY) strcat (buf, "|O_NOCTTY");
343 #endif
344 #ifdef O_NONBLOCK
345 if (oflag & O_NONBLOCK) strcat (buf, "|O_NONBLOCK");
346 #endif
347 #ifdef O_RSYNC
348 if (oflag & O_RSYNC) strcat (buf, "|O_RSYNC");
349 #endif
350 #ifdef O_SYNC
351 if (oflag & O_SYNC) strcat (buf, "|O_SYNC");
352 #endif
353 if (oflag & O_TRUNC) strcat (buf, "|O_TRUNC");
354 }
355
356 /*------------------------------------------------------------------------.
357 | Open a file (a magnetic tape device?) on the system specified in PATH, |
358 | as the given user. PATH has the form `[USER@]HOST:FILE'. OPEN_MODE is |
359 | O_RDONLY, O_WRONLY, etc. If successful, return the remote pipe number |
360 | plus BIAS. REMOTE_SHELL may be overriden. On error, return -1. |
361 `------------------------------------------------------------------------*/
362
363 int
364 rmt_open__ (const char *path, int open_mode, int bias, const char *remote_shell)
365 {
366 int remote_pipe_number; /* pseudo, biased file descriptor */
367 char *path_copy ; /* copy of path string */
368 char *remote_host; /* remote host name */
369 char *remote_file; /* remote file name (often a device) */
370 char *remote_user; /* remote user name */
371
372 /* Find an unused pair of file descriptors. */
373
374 for (remote_pipe_number = 0;
375 remote_pipe_number < MAXUNIT;
376 remote_pipe_number++)
377 if (READ_SIDE (remote_pipe_number) == -1
378 && WRITE_SIDE (remote_pipe_number) == -1)
379 break;
380
381 if (remote_pipe_number == MAXUNIT)
382 {
383 errno = EMFILE; /* FIXME: errno should be read-only */
384 return -1;
385 }
386
387 /* Pull apart the system and device, and optional user. */
388
389 {
390 char *cursor;
391
392 path_copy = xstrdup (path);
393 remote_host = path_copy;
394 remote_user = NULL;
395 remote_file = NULL;
396
397 for (cursor = path_copy; *cursor; cursor++)
398 switch (*cursor)
399 {
400 default:
401 break;
402
403 case '\n':
404 /* Do not allow newlines in the path, since the protocol
405 uses newline delimiters. */
406 free (path_copy);
407 errno = ENOENT;
408 return -1;
409
410 case '@':
411 if (!remote_user)
412 {
413 remote_user = remote_host;
414 *cursor = '\0';
415 remote_host = cursor + 1;
416 }
417 break;
418
419 case ':':
420 if (!remote_file)
421 {
422 *cursor = '\0';
423 remote_file = cursor + 1;
424 }
425 break;
426 }
427 }
428
429 /* FIXME: Should somewhat validate the decoding, here. */
430
431 if (remote_user && *remote_user == '\0')
432 remote_user = NULL;
433
434 #if WITH_REXEC
435
436 /* Execute the remote command using rexec. */
437
438 READ_SIDE (remote_pipe_number) = _rmt_rexec (remote_host, remote_user);
439 if (READ_SIDE (remote_pipe_number) < 0)
440 {
441 int e = errno;
442 free (path_copy);
443 errno = e;
444 return -1;
445 }
446
447 WRITE_SIDE (remote_pipe_number) = READ_SIDE (remote_pipe_number);
448
449 #else /* not WITH_REXEC */
450 {
451 const char *remote_shell_basename;
452 pid_t status;
453
454 /* Identify the remote command to be executed. */
455
456 if (!remote_shell)
457 {
458 #ifdef REMOTE_SHELL
459 remote_shell = REMOTE_SHELL;
460 #else
461 free (path_copy);
462 errno = EIO;
463 return -1;
464 #endif
465 }
466 remote_shell_basename = base_name (remote_shell);
467
468 /* Set up the pipes for the `rsh' command, and fork. */
469
470 if (pipe (to_remote[remote_pipe_number]) == -1
471 || pipe (from_remote[remote_pipe_number]) == -1)
472 {
473 int e = errno;
474 free (path_copy);
475 errno = e;
476 return -1;
477 }
478
479 status = fork ();
480 if (status == -1)
481 {
482 int e = errno;
483 free (path_copy);
484 errno = e;
485 return -1;
486 }
487
488 if (status == 0)
489 {
490 /* Child. */
491
492 close (STDIN_FILENO);
493 dup (to_remote[remote_pipe_number][PREAD]);
494 close (to_remote[remote_pipe_number][PREAD]);
495 close (to_remote[remote_pipe_number][PWRITE]);
496
497 close (STDOUT_FILENO);
498 dup (from_remote[remote_pipe_number][PWRITE]);
499 close (from_remote[remote_pipe_number][PREAD]);
500 close (from_remote[remote_pipe_number][PWRITE]);
501
502 #if !MSDOS
503 setuid (getuid ());
504 setgid (getgid ());
505 #endif
506
507 if (remote_user)
508 execl (remote_shell, remote_shell_basename, remote_host,
509 "-l", remote_user, "/etc/rmt", (char *) 0);
510 else
511 execl (remote_shell, remote_shell_basename, remote_host,
512 "/etc/rmt", (char *) 0);
513
514 /* Bad problems if we get here. */
515
516 /* In a previous version, _exit was used here instead of exit. */
517 error (EXIT_ON_EXEC_ERROR, errno, _("Cannot execute remote shell"));
518 }
519
520 /* Parent. */
521
522 close (from_remote[remote_pipe_number][PWRITE]);
523 close (to_remote[remote_pipe_number][PREAD]);
524 }
525 #endif /* not WITH_REXEC */
526
527 /* Attempt to open the tape device. */
528
529 {
530 size_t remote_file_len = strlen (remote_file);
531 char *command_buffer = xmalloc (remote_file_len + 1000);
532 sprintf (command_buffer, "O%s\n", remote_file);
533 encode_oflag (command_buffer + remote_file_len + 2, open_mode);
534 strcat (command_buffer, "\n");
535 if (do_command (remote_pipe_number, command_buffer) == -1
536 || get_status (remote_pipe_number) == -1)
537 {
538 int e = errno;
539 free (command_buffer);
540 free (path_copy);
541 _rmt_shutdown (remote_pipe_number, e);
542 return -1;
543 }
544 free (command_buffer);
545 }
546
547 free (path_copy);
548 return remote_pipe_number + bias;
549 }
550
551 /*----------------------------------------------------------------.
552 | Close remote tape connection HANDLE and shut down. Return 0 if |
553 | successful, -1 on error. |
554 `----------------------------------------------------------------*/
555
556 int
557 rmt_close__ (int handle)
558 {
559 int status;
560
561 if (do_command (handle, "C\n") == -1)
562 return -1;
563
564 status = get_status (handle);
565 _rmt_shutdown (handle, errno);
566 return status;
567 }
568
569 /*-------------------------------------------------------------------------.
570 | Read up to LENGTH bytes into BUFFER from remote tape connection HANDLE. |
571 | Return the number of bytes read on success, -1 on error. |
572 `-------------------------------------------------------------------------*/
573
574 ssize_t
575 rmt_read__ (int handle, char *buffer, size_t length)
576 {
577 char command_buffer[COMMAND_BUFFER_SIZE];
578 ssize_t status, rlen;
579 size_t counter;
580
581 sprintf (command_buffer, "R%lu\n", (unsigned long) length);
582 if (do_command (handle, command_buffer) == -1
583 || (status = get_status (handle)) == -1)
584 return -1;
585
586 for (counter = 0; counter < status; counter += rlen, buffer += rlen)
587 {
588 rlen = safe_read (READ_SIDE (handle), buffer, status - counter);
589 if (rlen <= 0)
590 {
591 _rmt_shutdown (handle, EIO);
592 return -1;
593 }
594 }
595
596 return status;
597 }
598
599 /*-------------------------------------------------------------------------.
600 | Write LENGTH bytes from BUFFER to remote tape connection HANDLE. Return |
601 | the number of bytes written on success, -1 on error. |
602 `-------------------------------------------------------------------------*/
603
604 ssize_t
605 rmt_write__ (int handle, char *buffer, size_t length)
606 {
607 char command_buffer[COMMAND_BUFFER_SIZE];
608 RETSIGTYPE (*pipe_handler) ();
609
610 sprintf (command_buffer, "W%lu\n", (unsigned long) length);
611 if (do_command (handle, command_buffer) == -1)
612 return -1;
613
614 pipe_handler = signal (SIGPIPE, SIG_IGN);
615 if (full_write (WRITE_SIDE (handle), buffer, length) == length)
616 {
617 signal (SIGPIPE, pipe_handler);
618 return get_status (handle);
619 }
620
621 /* Write error. */
622
623 signal (SIGPIPE, pipe_handler);
624 _rmt_shutdown (handle, EIO);
625 return -1;
626 }
627
628 /*------------------------------------------------------------------------.
629 | Perform an imitation lseek operation on remote tape connection HANDLE. |
630 | Return the new file offset if successful, -1 if on error. |
631 `------------------------------------------------------------------------*/
632
633 off_t
634 rmt_lseek__ (int handle, off_t offset, int whence)
635 {
636 char command_buffer[COMMAND_BUFFER_SIZE];
637 char operand_buffer[UINTMAX_STRSIZE_BOUND];
638 uintmax_t u = offset < 0 ? - (uintmax_t) offset : (uintmax_t) offset;
639 char *p = operand_buffer + sizeof operand_buffer;
640
641 do
642 *--p = '0' + (int) (u % 10);
643 while ((u /= 10) != 0);
644 if (offset < 0)
645 *--p = '-';
646
647 switch (whence)
648 {
649 case SEEK_SET: whence = 0; break;
650 case SEEK_CUR: whence = 1; break;
651 case SEEK_END: whence = 2; break;
652 default: abort ();
653 }
654
655 sprintf (command_buffer, "L%s\n%d\n", p, whence);
656
657 if (do_command (handle, command_buffer) == -1)
658 return -1;
659
660 return get_status_off (handle);
661 }
662
663 /*-----------------------------------------------------------------------.
664 | Perform a raw tape operation on remote tape connection HANDLE. Return |
665 | the results of the ioctl, or -1 on error. |
666 `-----------------------------------------------------------------------*/
667
668 int
669 rmt_ioctl__ (int handle, int operation, char *argument)
670 {
671 switch (operation)
672 {
673 default:
674 errno = EOPNOTSUPP; /* FIXME: errno should be read-only */
675 return -1;
676
677 #ifdef MTIOCTOP
678 case MTIOCTOP:
679 {
680 char command_buffer[COMMAND_BUFFER_SIZE];
681 char operand_buffer[UINTMAX_STRSIZE_BOUND];
682 uintmax_t u = (((struct mtop *) argument)->mt_count < 0
683 ? - (uintmax_t) ((struct mtop *) argument)->mt_count
684 : (uintmax_t) ((struct mtop *) argument)->mt_count);
685 char *p = operand_buffer + sizeof operand_buffer;
686
687 do
688 *--p = '0' + (int) (u % 10);
689 while ((u /= 10) != 0);
690 if (((struct mtop *) argument)->mt_count < 0)
691 *--p = '-';
692
693 /* MTIOCTOP is the easy one. Nothing is transfered in binary. */
694
695 sprintf (command_buffer, "I%d\n%s\n",
696 ((struct mtop *) argument)->mt_op, p);
697 if (do_command (handle, command_buffer) == -1)
698 return -1;
699
700 return get_status (handle);
701 }
702 #endif /* MTIOCTOP */
703
704 #ifdef MTIOCGET
705 case MTIOCGET:
706 {
707 ssize_t status;
708 ssize_t counter;
709
710 /* Grab the status and read it directly into the structure. This
711 assumes that the status buffer is not padded and that 2 shorts
712 fit in a long without any word alignment problems; i.e., the
713 whole struct is contiguous. NOTE - this is probably NOT a good
714 assumption. */
715
716 if (do_command (handle, "S") == -1
717 || (status = get_status (handle), status == -1))
718 return -1;
719
720 for (; status > 0; status -= counter, argument += counter)
721 {
722 counter = safe_read (READ_SIDE (handle),
723 argument, (size_t) status);
724 if (counter <= 0)
725 {
726 _rmt_shutdown (handle, EIO);
727 return -1;
728 }
729 }
730
731 /* Check for byte position. mt_type (or mt_model) is a small integer
732 field (normally) so we will check its magnitude. If it is larger
733 than 256, we will assume that the bytes are swapped and go through
734 and reverse all the bytes. */
735
736 if (((struct mtget *) argument)->MTIO_CHECK_FIELD < 256)
737 return 0;
738
739 for (counter = 0; counter < status; counter += 2)
740 {
741 char copy = argument[counter];
742
743 argument[counter] = argument[counter + 1];
744 argument[counter + 1] = copy;
745 }
746
747 return 0;
748 }
749 #endif /* MTIOCGET */
750
751 }
752 }
This page took 0.067461 seconds and 5 git commands to generate.