1 ///////////////////////////////////////////////////////////////////////////////
4 /// \brief File opening, unlinking, and closing
6 // Author: Lasse Collin
8 // This file has been put into the public domain.
9 // You can do whatever you want with this file.
11 ///////////////////////////////////////////////////////////////////////////////
21 static bool warn_fchown
;
24 #if defined(HAVE_FUTIMES) || defined(HAVE_FUTIMESAT) || defined(HAVE_UTIMES)
25 # include <sys/time.h>
26 #elif defined(HAVE__FUTIME)
27 # include <sys/utime.h>
28 #elif defined(HAVE_UTIME)
33 # ifdef HAVE_SYS_CAPSICUM_H
34 # include <sys/capsicum.h>
36 # include <sys/capability.h>
40 #include "tuklib_open_stdxxx.h"
50 // Using this macro to silence a warning from gcc -Wlogical-op.
51 #if EAGAIN == EWOULDBLOCK
52 # define IS_EAGAIN_OR_EWOULDBLOCK(e) ((e) == EAGAIN)
54 # define IS_EAGAIN_OR_EWOULDBLOCK(e) \
55 ((e) == EAGAIN || (e) == EWOULDBLOCK)
60 IO_WAIT_MORE
, // Reading or writing is possible.
61 IO_WAIT_ERROR
, // Error or user_abort
62 IO_WAIT_TIMEOUT
, // poll() timed out
66 /// If true, try to create sparse files when decompressing.
67 static bool try_sparse
= true;
70 /// True if the conditions for sandboxing (described in main()) have been met.
71 static bool sandbox_allowed
= false;
74 #ifndef TUKLIB_DOSLIKE
75 /// File status flags of standard input. This is used by io_open_src()
76 /// and io_close_src().
77 static int stdin_flags
;
78 static bool restore_stdin_flags
= false;
80 /// Original file status flags of standard output. This is used by
81 /// io_open_dest() and io_close_dest() to save and restore the flags.
82 static int stdout_flags
;
83 static bool restore_stdout_flags
= false;
85 /// Self-pipe used together with the user_abort variable to avoid
86 /// race conditions with signal handling.
87 static int user_abort_pipe
[2];
91 static bool io_write_buf(file_pair
*pair
, const uint8_t *buf
, size_t size
);
97 // Make sure that stdin, stdout, and stderr are connected to
98 // a valid file descriptor. Exit immediately with exit code ERROR
99 // if we cannot make the file descriptors valid. Maybe we should
100 // print an error message, but our stderr could be screwed anyway.
101 tuklib_open_stdxxx(E_ERROR
);
103 #ifndef TUKLIB_DOSLIKE
104 // If fchown() fails setting the owner, we warn about it only if
106 warn_fchown
= geteuid() == 0;
108 // Create a pipe for the self-pipe trick.
109 if (pipe(user_abort_pipe
))
110 message_fatal(_("Error creating a pipe: %s"),
113 // Make both ends of the pipe non-blocking.
114 for (unsigned i
= 0; i
< 2; ++i
) {
115 int flags
= fcntl(user_abort_pipe
[i
], F_GETFL
);
116 if (flags
== -1 || fcntl(user_abort_pipe
[i
], F_SETFL
,
117 flags
| O_NONBLOCK
) == -1)
118 message_fatal(_("Error creating a pipe: %s"),
124 // Avoid doing useless things when statting files.
125 // This isn't important but doesn't hurt.
126 _djstat_flags
= _STAT_EXEC_EXT
| _STAT_EXEC_MAGIC
| _STAT_DIRSIZE
;
133 #ifndef TUKLIB_DOSLIKE
135 io_write_to_user_abort_pipe(void)
137 // If the write() fails, it's probably due to the pipe being full.
138 // Failing in that case is fine. If the reason is something else,
139 // there's not much we can do since this is called in a signal
140 // handler. So ignore the errors and try to avoid warnings with
141 // GCC and glibc when _FORTIFY_SOURCE=2 is used.
143 const ssize_t ret
= write(user_abort_pipe
[1], &b
, 1);
158 #ifdef ENABLE_SANDBOX
160 io_allow_sandbox(void)
162 sandbox_allowed
= true;
167 /// Enables operating-system-specific sandbox if it is possible.
168 /// src_fd is the file descriptor of the input file.
170 io_sandbox_enter(int src_fd
)
172 if (!sandbox_allowed
) {
173 // This message is more often annoying than useful so
174 // it's commented out. It can be useful when developing
175 // the sandboxing code.
176 //message(V_DEBUG, _("Sandbox is disabled due "
177 // "to incompatible command line arguments"));
181 const char dummy_str
[] = "x";
183 // Try to ensure that both libc and xz locale files have been
184 // loaded when NLS is enabled.
185 snprintf(NULL
, 0, "%s%s", _(dummy_str
), strerror(EINVAL
));
187 // Try to ensure that iconv data files needed for handling multibyte
188 // characters have been loaded. This is needed at least with glibc.
189 tuklib_mbstr_width(dummy_str
, NULL
);
192 // Capsicum needs FreeBSD 10.0 or later.
198 if (cap_rights_limit(src_fd
, cap_rights_init(&rights
,
199 CAP_EVENT
, CAP_FCNTL
, CAP_LOOKUP
, CAP_READ
, CAP_SEEK
)))
202 if (src_fd
!= STDIN_FILENO
&& cap_rights_limit(
203 STDIN_FILENO
, cap_rights_clear(&rights
)))
206 if (cap_rights_limit(STDOUT_FILENO
, cap_rights_init(&rights
,
207 CAP_EVENT
, CAP_FCNTL
, CAP_FSTAT
, CAP_LOOKUP
,
208 CAP_WRITE
, CAP_SEEK
)))
211 if (cap_rights_limit(STDERR_FILENO
, cap_rights_init(&rights
,
215 if (cap_rights_limit(user_abort_pipe
[0], cap_rights_init(&rights
,
219 if (cap_rights_limit(user_abort_pipe
[1], cap_rights_init(&rights
,
223 #elif defined(HAVE_PLEDGE)
224 // pledge() was introduced in OpenBSD 5.9.
226 // main() unconditionally calls pledge() with fairly relaxed
227 // promises which work in all situations. Here we make the
228 // sandbox more strict.
229 if (pledge("stdio", ""))
235 # error ENABLE_SANDBOX is defined but no sandboxing method was found.
238 // This message is annoying in xz -lvv.
239 //message(V_DEBUG, _("Sandbox was successfully enabled"));
244 // If a kernel is configured without capability mode support or
245 // used in an emulator that does not implement the capability
246 // system calls, then the Capsicum system calls will fail and set
247 // errno to ENOSYS. In that case xz will silently run without
252 message_fatal(_("Failed to enable the sandbox"));
254 #endif // ENABLE_SANDBOX
257 #ifndef TUKLIB_DOSLIKE
258 /// \brief Waits for input or output to become available or for a signal
260 /// This uses the self-pipe trick to avoid a race condition that can occur
261 /// if a signal is caught after user_abort has been checked but before e.g.
262 /// read() has been called. In that situation read() could block unless
263 /// non-blocking I/O is used. With non-blocking I/O something like select()
264 /// or poll() is needed to avoid a busy-wait loop, and the same race condition
265 /// pops up again. There are pselect() (POSIX-1.2001) and ppoll() (not in
266 /// POSIX) but neither is portable enough in 2013. The self-pipe trick is
267 /// old and very portable.
269 io_wait(file_pair
*pair
, int timeout
, bool is_reading
)
271 struct pollfd pfd
[2];
274 pfd
[0].fd
= pair
->src_fd
;
275 pfd
[0].events
= POLLIN
;
277 pfd
[0].fd
= pair
->dest_fd
;
278 pfd
[0].events
= POLLOUT
;
281 pfd
[1].fd
= user_abort_pipe
[0];
282 pfd
[1].events
= POLLIN
;
285 const int ret
= poll(pfd
, 2, timeout
);
288 return IO_WAIT_ERROR
;
291 if (errno
== EINTR
|| errno
== EAGAIN
)
294 message_error(_("%s: poll() failed: %s"),
295 is_reading
? pair
->src_name
298 return IO_WAIT_ERROR
;
302 return IO_WAIT_TIMEOUT
;
304 if (pfd
[0].revents
!= 0)
311 /// \brief Unlink a file
313 /// This tries to verify that the file being unlinked really is the file that
314 /// we want to unlink by verifying device and inode numbers. There's still
315 /// a small unavoidable race, but this is much better than nothing (the file
316 /// could have been moved/replaced even hours earlier).
318 io_unlink(const char *name
, const struct stat
*known_st
)
320 #if defined(TUKLIB_DOSLIKE)
321 // On DOS-like systems, st_ino is meaningless, so don't bother
322 // testing it. Just silence a compiler warning.
327 // If --force was used, use stat() instead of lstat(). This way
328 // (de)compressing symlinks works correctly. However, it also means
329 // that xz cannot detect if a regular file foo is renamed to bar
330 // and then a symlink foo -> bar is created. Because of stat()
331 // instead of lstat(), xz will think that foo hasn't been replaced
332 // with another file. Thus, xz will remove foo even though it no
333 // longer is the same file that xz used when it started compressing.
334 // Probably it's not too bad though, so this doesn't need a more
336 const int stat_ret
= opt_force
337 ? stat(name
, &new_st
) : lstat(name
, &new_st
);
341 // st_ino is an array, and we don't want to
342 // compare st_dev at all.
343 || memcmp(&new_st
.st_ino
, &known_st
->st_ino
,
344 sizeof(new_st
.st_ino
)) != 0
346 // Typical POSIX-like system
347 || new_st
.st_dev
!= known_st
->st_dev
348 || new_st
.st_ino
!= known_st
->st_ino
351 // TRANSLATORS: When compression or decompression finishes,
352 // and xz is going to remove the source file, xz first checks
353 // if the source file still exists, and if it does, does its
354 // device and inode numbers match what xz saw when it opened
355 // the source file. If these checks fail, this message is
356 // shown, %s being the filename, and the file is not deleted.
357 // The check for device and inode numbers is there, because
358 // it is possible that the user has put a new file in place
359 // of the original file, and in that case it obviously
360 // shouldn't be removed.
361 message_warning(_("%s: File seems to have been moved, "
362 "not removing"), name
);
365 // There's a race condition between lstat() and unlink()
366 // but at least we have tried to avoid removing wrong file.
368 message_warning(_("%s: Cannot remove: %s"),
369 name
, strerror(errno
));
375 /// \brief Copies owner/group and permissions
377 /// \todo ACL and EA support
380 io_copy_attrs(const file_pair
*pair
)
382 // Skip chown and chmod on Windows.
383 #ifndef TUKLIB_DOSLIKE
384 // This function is more tricky than you may think at first.
385 // Blindly copying permissions may permit users to access the
386 // destination file who didn't have permission to access the
389 // Try changing the owner of the file. If we aren't root or the owner
390 // isn't already us, fchown() probably doesn't succeed. We warn
391 // about failing fchown() only if we are root.
392 if (fchown(pair
->dest_fd
, pair
->src_st
.st_uid
, (gid_t
)(-1))
394 message_warning(_("%s: Cannot set the file owner: %s"),
395 pair
->dest_name
, strerror(errno
));
399 // With BSD semantics the new dest file may have a group that
400 // does not belong to the user. If the src file has the same gid
401 // nothing has to be done. Nevertheless OpenBSD fchown(2) fails
402 // in this case which seems to be POSIX compliant. As there is
403 // nothing to do, skip the system call.
404 if (pair
->dest_st
.st_gid
!= pair
->src_st
.st_gid
405 && fchown(pair
->dest_fd
, (uid_t
)(-1),
406 pair
->src_st
.st_gid
)) {
407 message_warning(_("%s: Cannot set the file group: %s"),
408 pair
->dest_name
, strerror(errno
));
409 // We can still safely copy some additional permissions:
410 // `group' must be at least as strict as `other' and
413 // NOTE: After this, the owner of the source file may
414 // get additional permissions. This shouldn't be too bad,
415 // because the owner would have had permission to chmod
416 // the original file anyway.
417 mode
= ((pair
->src_st
.st_mode
& 0070) >> 3)
418 & (pair
->src_st
.st_mode
& 0007);
419 mode
= (pair
->src_st
.st_mode
& 0700) | (mode
<< 3) | mode
;
421 // Drop the setuid, setgid, and sticky bits.
422 mode
= pair
->src_st
.st_mode
& 0777;
425 if (fchmod(pair
->dest_fd
, mode
))
426 message_warning(_("%s: Cannot set the file permissions: %s"),
427 pair
->dest_name
, strerror(errno
));
430 // Copy the timestamps. We have several possible ways to do this, of
431 // which some are better in both security and precision.
433 // First, get the nanosecond part of the timestamps. As of writing,
434 // it's not standardized by POSIX, and there are several names for
435 // the same thing in struct stat.
439 # if defined(HAVE_STRUCT_STAT_ST_ATIM_TV_NSEC)
441 atime_nsec
= pair
->src_st
.st_atim
.tv_nsec
;
442 mtime_nsec
= pair
->src_st
.st_mtim
.tv_nsec
;
444 # elif defined(HAVE_STRUCT_STAT_ST_ATIMESPEC_TV_NSEC)
446 atime_nsec
= pair
->src_st
.st_atimespec
.tv_nsec
;
447 mtime_nsec
= pair
->src_st
.st_mtimespec
.tv_nsec
;
449 # elif defined(HAVE_STRUCT_STAT_ST_ATIMENSEC)
450 // GNU and BSD without extensions
451 atime_nsec
= pair
->src_st
.st_atimensec
;
452 mtime_nsec
= pair
->src_st
.st_mtimensec
;
454 # elif defined(HAVE_STRUCT_STAT_ST_UATIME)
456 atime_nsec
= pair
->src_st
.st_uatime
* 1000;
457 mtime_nsec
= pair
->src_st
.st_umtime
* 1000;
459 # elif defined(HAVE_STRUCT_STAT_ST_ATIM_ST__TIM_TV_NSEC)
461 atime_nsec
= pair
->src_st
.st_atim
.st__tim
.tv_nsec
;
462 mtime_nsec
= pair
->src_st
.st_mtim
.st__tim
.tv_nsec
;
470 // Construct a structure to hold the timestamps and call appropriate
471 // function to set the timestamps.
472 #if defined(HAVE_FUTIMENS)
473 // Use nanosecond precision.
474 struct timespec tv
[2];
475 tv
[0].tv_sec
= pair
->src_st
.st_atime
;
476 tv
[0].tv_nsec
= atime_nsec
;
477 tv
[1].tv_sec
= pair
->src_st
.st_mtime
;
478 tv
[1].tv_nsec
= mtime_nsec
;
480 (void)futimens(pair
->dest_fd
, tv
);
482 #elif defined(HAVE_FUTIMES) || defined(HAVE_FUTIMESAT) || defined(HAVE_UTIMES)
483 // Use microsecond precision.
484 struct timeval tv
[2];
485 tv
[0].tv_sec
= pair
->src_st
.st_atime
;
486 tv
[0].tv_usec
= atime_nsec
/ 1000;
487 tv
[1].tv_sec
= pair
->src_st
.st_mtime
;
488 tv
[1].tv_usec
= mtime_nsec
/ 1000;
490 # if defined(HAVE_FUTIMES)
491 (void)futimes(pair
->dest_fd
, tv
);
492 # elif defined(HAVE_FUTIMESAT)
493 (void)futimesat(pair
->dest_fd
, NULL
, tv
);
495 // Argh, no function to use a file descriptor to set the timestamp.
496 (void)utimes(pair
->dest_name
, tv
);
499 #elif defined(HAVE__FUTIME)
500 // Use one-second precision with Windows-specific _futime().
501 // We could use utime() too except that for some reason the
502 // timestamp will get reset at close(). With _futime() it works.
503 // This struct cannot be const as _futime() takes a non-const pointer.
504 struct _utimbuf buf
= {
505 .actime
= pair
->src_st
.st_atime
,
506 .modtime
= pair
->src_st
.st_mtime
,
513 (void)_futime(pair
->dest_fd
, &buf
);
515 #elif defined(HAVE_UTIME)
516 // Use one-second precision. utime() doesn't support using file
517 // descriptor either. Some systems have broken utime() prototype
518 // so don't make this const.
519 struct utimbuf buf
= {
520 .actime
= pair
->src_st
.st_atime
,
521 .modtime
= pair
->src_st
.st_mtime
,
528 (void)utime(pair
->dest_name
, &buf
);
535 /// Opens the source file. Returns false on success, true on error.
537 io_open_src_real(file_pair
*pair
)
539 // There's nothing to open when reading from stdin.
540 if (pair
->src_name
== stdin_filename
) {
541 pair
->src_fd
= STDIN_FILENO
;
542 #ifdef TUKLIB_DOSLIKE
543 setmode(STDIN_FILENO
, O_BINARY
);
545 // Try to set stdin to non-blocking mode. It won't work
546 // e.g. on OpenBSD if stdout is e.g. /dev/null. In such
547 // case we proceed as if stdin were non-blocking anyway
548 // (in case of /dev/null it will be in practice). The
549 // same applies to stdout in io_open_dest_real().
550 stdin_flags
= fcntl(STDIN_FILENO
, F_GETFL
);
551 if (stdin_flags
== -1) {
552 message_error(_("Error getting the file status flags "
553 "from standard input: %s"),
558 if ((stdin_flags
& O_NONBLOCK
) == 0
559 && fcntl(STDIN_FILENO
, F_SETFL
,
560 stdin_flags
| O_NONBLOCK
) != -1)
561 restore_stdin_flags
= true;
563 #ifdef HAVE_POSIX_FADVISE
564 // It will fail if stdin is a pipe and that's fine.
565 (void)posix_fadvise(STDIN_FILENO
, 0, 0,
566 opt_mode
== MODE_LIST
568 : POSIX_FADV_SEQUENTIAL
);
573 // Symlinks are not followed unless writing to stdout or --force
574 // or --keep was used.
575 const bool follow_symlinks
576 = opt_stdout
|| opt_force
|| opt_keep_original
;
578 // We accept only regular files if we are writing the output
579 // to disk too. bzip2 allows overriding this with --force but
580 // gzip and xz don't.
581 const bool reg_files_only
= !opt_stdout
;
584 int flags
= O_RDONLY
| O_BINARY
| O_NOCTTY
;
586 #ifndef TUKLIB_DOSLIKE
587 // Use non-blocking I/O:
588 // - It prevents blocking when opening FIFOs and some other
589 // special files, which is good if we want to accept only
591 // - It can help avoiding some race conditions with signal handling.
595 #if defined(O_NOFOLLOW)
596 if (!follow_symlinks
)
598 #elif !defined(TUKLIB_DOSLIKE)
599 // Some POSIX-like systems lack O_NOFOLLOW (it's not required
600 // by POSIX). Check for symlinks with a separate lstat() on
602 if (!follow_symlinks
) {
604 if (lstat(pair
->src_name
, &st
)) {
605 message_error(_("%s: %s"), pair
->src_name
,
609 } else if (S_ISLNK(st
.st_mode
)) {
610 message_warning(_("%s: Is a symbolic link, "
611 "skipping"), pair
->src_name
);
617 (void)follow_symlinks
;
620 // Try to open the file. Signals have been blocked so EINTR shouldn't
622 pair
->src_fd
= open(pair
->src_name
, flags
);
624 if (pair
->src_fd
== -1) {
625 // Signals (that have a signal handler) have been blocked.
626 assert(errno
!= EINTR
);
629 // Give an understandable error message if the reason
630 // for failing was that the file was a symbolic link.
632 // Note that at least Linux, OpenBSD, Solaris, and Darwin
633 // use ELOOP to indicate that O_NOFOLLOW was the reason
634 // that open() failed. Because there may be
635 // directories in the pathname, ELOOP may occur also
636 // because of a symlink loop in the directory part.
637 // So ELOOP doesn't tell us what actually went wrong,
638 // and this stupidity went into POSIX-1.2008 too.
640 // FreeBSD associates EMLINK with O_NOFOLLOW and
641 // Tru64 uses ENOTSUP. We use these directly here
642 // and skip the lstat() call and the associated race.
643 // I want to hear if there are other kernels that
644 // fail with something else than ELOOP with O_NOFOLLOW.
645 bool was_symlink
= false;
647 # if defined(__FreeBSD__) || defined(__DragonFly__)
651 # elif defined(__digital__) && defined(__unix__)
652 if (errno
== ENOTSUP
)
655 # elif defined(__NetBSD__)
660 if (errno
== ELOOP
&& !follow_symlinks
) {
661 const int saved_errno
= errno
;
663 if (lstat(pair
->src_name
, &st
) == 0
664 && S_ISLNK(st
.st_mode
))
672 message_warning(_("%s: Is a symbolic link, "
673 "skipping"), pair
->src_name
);
676 // Something else than O_NOFOLLOW failing
677 // (assuming that the race conditions didn't
679 message_error(_("%s: %s"), pair
->src_name
,
685 // Stat the source file. We need the result also when we copy
686 // the permissions, and when unlinking.
688 // NOTE: Use stat() instead of fstat() with DJGPP, because
689 // then we have a better chance to get st_ino value that can
690 // be used in io_open_dest_real() to prevent overwriting the
693 if (stat(pair
->src_name
, &pair
->src_st
))
696 if (fstat(pair
->src_fd
, &pair
->src_st
))
700 if (S_ISDIR(pair
->src_st
.st_mode
)) {
701 message_warning(_("%s: Is a directory, skipping"),
706 if (reg_files_only
&& !S_ISREG(pair
->src_st
.st_mode
)) {
707 message_warning(_("%s: Not a regular file, skipping"),
712 #ifndef TUKLIB_DOSLIKE
713 if (reg_files_only
&& !opt_force
&& !opt_keep_original
) {
714 if (pair
->src_st
.st_mode
& (S_ISUID
| S_ISGID
)) {
715 // gzip rejects setuid and setgid files even
716 // when --force was used. bzip2 doesn't check
717 // for them, but calls fchown() after fchmod(),
718 // and many systems automatically drop setuid
719 // and setgid bits there.
721 // We accept setuid and setgid files if
722 // --force or --keep was used. We drop these bits
723 // explicitly in io_copy_attr().
724 message_warning(_("%s: File has setuid or "
725 "setgid bit set, skipping"),
730 if (pair
->src_st
.st_mode
& S_ISVTX
) {
731 message_warning(_("%s: File has sticky bit "
737 if (pair
->src_st
.st_nlink
> 1) {
738 message_warning(_("%s: Input file has more "
739 "than one hard link, "
740 "skipping"), pair
->src_name
);
745 // If it is something else than a regular file, wait until
746 // there is input available. This way reading from FIFOs
747 // will work when open() is used with O_NONBLOCK.
748 if (!S_ISREG(pair
->src_st
.st_mode
)) {
750 const io_wait_ret ret
= io_wait(pair
, -1, true);
753 if (ret
!= IO_WAIT_MORE
)
758 #ifdef HAVE_POSIX_FADVISE
759 // It will fail with some special files like FIFOs but that is fine.
760 (void)posix_fadvise(pair
->src_fd
, 0, 0,
761 opt_mode
== MODE_LIST
763 : POSIX_FADV_SEQUENTIAL
);
769 message_error(_("%s: %s"), pair
->src_name
, strerror(errno
));
771 (void)close(pair
->src_fd
);
777 io_open_src(const char *src_name
)
779 if (src_name
[0] == '\0') {
780 message_error(_("Empty filename, skipping"));
784 // Since we have only one file open at a time, we can use
785 // a statically allocated structure.
786 static file_pair pair
;
788 // This implicitly also initializes src_st.st_size to zero
789 // which is expected to be <= 0 by default. fstat() isn't
790 // called when reading from standard input but src_st.st_size
793 .src_name
= src_name
,
798 .src_has_seen_input
= false,
799 .flush_needed
= false,
800 .dest_try_sparse
= false,
801 .dest_pending_sparse
= 0,
804 // Block the signals, for which we have a custom signal handler, so
805 // that we don't need to worry about EINTR.
807 const bool error
= io_open_src_real(&pair
);
810 #ifdef ENABLE_SANDBOX
812 io_sandbox_enter(pair
.src_fd
);
815 return error
? NULL
: &pair
;
819 /// \brief Closes source file of the file_pair structure
821 /// \param pair File whose src_fd should be closed
822 /// \param success If true, the file will be removed from the disk if
823 /// closing succeeds and --keep hasn't been used.
825 io_close_src(file_pair
*pair
, bool success
)
827 #ifndef TUKLIB_DOSLIKE
828 if (restore_stdin_flags
) {
829 assert(pair
->src_fd
== STDIN_FILENO
);
831 restore_stdin_flags
= false;
833 if (fcntl(STDIN_FILENO
, F_SETFL
, stdin_flags
) == -1)
834 message_error(_("Error restoring the status flags "
835 "to standard input: %s"),
840 if (pair
->src_fd
!= STDIN_FILENO
&& pair
->src_fd
!= -1) {
841 // Close the file before possibly unlinking it. On DOS-like
842 // systems this is always required since unlinking will fail
843 // if the file is open. On POSIX systems it usually works
844 // to unlink open files, but in some cases it doesn't and
845 // one gets EBUSY in errno.
847 // xz 5.2.2 and older unlinked the file before closing it
848 // (except on DOS-like systems). The old code didn't handle
849 // EBUSY and could fail e.g. on some CIFS shares. The
850 // advantage of unlinking before closing is negligible
851 // (avoids a race between close() and stat()/lstat() and
852 // unlink()), so let's keep this simple.
853 (void)close(pair
->src_fd
);
855 if (success
&& !opt_keep_original
)
856 io_unlink(pair
->src_name
, &pair
->src_st
);
864 io_open_dest_real(file_pair
*pair
)
866 if (opt_stdout
|| pair
->src_fd
== STDIN_FILENO
) {
867 // We don't modify or free() this.
868 pair
->dest_name
= (char *)"(stdout)";
869 pair
->dest_fd
= STDOUT_FILENO
;
870 #ifdef TUKLIB_DOSLIKE
871 setmode(STDOUT_FILENO
, O_BINARY
);
873 // Try to set O_NONBLOCK if it isn't already set.
874 // If it fails, we assume that stdout is non-blocking
875 // in practice. See the comments in io_open_src_real()
876 // for similar situation with stdin.
878 // NOTE: O_APPEND may be unset later in this function
879 // and it relies on stdout_flags being set here.
880 stdout_flags
= fcntl(STDOUT_FILENO
, F_GETFL
);
881 if (stdout_flags
== -1) {
882 message_error(_("Error getting the file status flags "
883 "from standard output: %s"),
888 if ((stdout_flags
& O_NONBLOCK
) == 0
889 && fcntl(STDOUT_FILENO
, F_SETFL
,
890 stdout_flags
| O_NONBLOCK
) != -1)
891 restore_stdout_flags
= true;
894 pair
->dest_name
= suffix_get_dest_name(pair
->src_name
);
895 if (pair
->dest_name
== NULL
)
900 if (stat(pair
->dest_name
, &st
) == 0) {
901 // Check that it isn't a special file like "prn".
902 if (st
.st_dev
== -1) {
903 message_error("%s: Refusing to write to "
904 "a DOS special file",
906 free(pair
->dest_name
);
910 // Check that we aren't overwriting the source file.
911 if (st
.st_dev
== pair
->src_st
.st_dev
912 && st
.st_ino
== pair
->src_st
.st_ino
) {
913 message_error("%s: Output file is the same "
916 free(pair
->dest_name
);
922 // If --force was used, unlink the target file first.
923 if (opt_force
&& unlink(pair
->dest_name
) && errno
!= ENOENT
) {
924 message_error(_("%s: Cannot remove: %s"),
925 pair
->dest_name
, strerror(errno
));
926 free(pair
->dest_name
);
931 int flags
= O_WRONLY
| O_BINARY
| O_NOCTTY
933 #ifndef TUKLIB_DOSLIKE
936 const mode_t mode
= S_IRUSR
| S_IWUSR
;
937 pair
->dest_fd
= open(pair
->dest_name
, flags
, mode
);
939 if (pair
->dest_fd
== -1) {
940 message_error(_("%s: %s"), pair
->dest_name
,
942 free(pair
->dest_name
);
947 #ifndef TUKLIB_DOSLIKE
948 // dest_st isn't used on DOS-like systems except as a dummy
949 // argument to io_unlink(), so don't fstat() on such systems.
950 if (fstat(pair
->dest_fd
, &pair
->dest_st
)) {
951 // If fstat() really fails, we have a safe fallback here.
953 pair
->dest_st
.st_ino
[0] = 0;
954 pair
->dest_st
.st_ino
[1] = 0;
955 pair
->dest_st
.st_ino
[2] = 0;
957 pair
->dest_st
.st_dev
= 0;
958 pair
->dest_st
.st_ino
= 0;
960 } else if (try_sparse
&& opt_mode
== MODE_DECOMPRESS
) {
961 // When writing to standard output, we need to be extra
963 // - It may be connected to something else than
965 // - We aren't necessarily writing to a new empty file
966 // or to the end of an existing file.
967 // - O_APPEND may be active.
969 // TODO: I'm keeping this disabled for DOS-like systems
970 // for now. FAT doesn't support sparse files, but NTFS
971 // does, so maybe this should be enabled on Windows after
973 if (pair
->dest_fd
== STDOUT_FILENO
) {
974 if (!S_ISREG(pair
->dest_st
.st_mode
))
977 if (stdout_flags
& O_APPEND
) {
978 // Creating a sparse file is not possible
979 // when O_APPEND is active (it's used by
980 // shell's >> redirection). As I understand
981 // it, it is safe to temporarily disable
982 // O_APPEND in xz, because if someone
983 // happened to write to the same file at the
984 // same time, results would be bad anyway
985 // (users shouldn't assume that xz uses any
986 // specific block size when writing data).
988 // The write position may be something else
989 // than the end of the file, so we must fix
990 // it to start writing at the end of the file
991 // to imitate O_APPEND.
992 if (lseek(STDOUT_FILENO
, 0, SEEK_END
) == -1)
995 // Construct the new file status flags.
996 // If O_NONBLOCK was set earlier in this
997 // function, it must be kept here too.
998 int flags
= stdout_flags
& ~O_APPEND
;
999 if (restore_stdout_flags
)
1000 flags
|= O_NONBLOCK
;
1002 // If this fcntl() fails, we continue but won't
1003 // try to create sparse output. The original
1004 // flags will still be restored if needed (to
1005 // unset O_NONBLOCK) when the file is finished.
1006 if (fcntl(STDOUT_FILENO
, F_SETFL
, flags
) == -1)
1009 // Disabling O_APPEND succeeded. Mark
1010 // that the flags should be restored
1011 // in io_close_dest(). (This may have already
1012 // been set when enabling O_NONBLOCK.)
1013 restore_stdout_flags
= true;
1015 } else if (lseek(STDOUT_FILENO
, 0, SEEK_CUR
)
1016 != pair
->dest_st
.st_size
) {
1017 // Writing won't start exactly at the end
1018 // of the file. We cannot use sparse output,
1019 // because it would probably corrupt the file.
1024 pair
->dest_try_sparse
= true;
1033 io_open_dest(file_pair
*pair
)
1036 const bool ret
= io_open_dest_real(pair
);
1042 /// \brief Closes destination file of the file_pair structure
1044 /// \param pair File whose dest_fd should be closed
1045 /// \param success If false, the file will be removed from the disk.
1047 /// \return Zero if closing succeeds. On error, -1 is returned and
1048 /// error message printed.
1050 io_close_dest(file_pair
*pair
, bool success
)
1052 #ifndef TUKLIB_DOSLIKE
1053 // If io_open_dest() has disabled O_APPEND, restore it here.
1054 if (restore_stdout_flags
) {
1055 assert(pair
->dest_fd
== STDOUT_FILENO
);
1057 restore_stdout_flags
= false;
1059 if (fcntl(STDOUT_FILENO
, F_SETFL
, stdout_flags
) == -1) {
1060 message_error(_("Error restoring the O_APPEND flag "
1061 "to standard output: %s"),
1068 if (pair
->dest_fd
== -1 || pair
->dest_fd
== STDOUT_FILENO
)
1071 if (close(pair
->dest_fd
)) {
1072 message_error(_("%s: Closing the file failed: %s"),
1073 pair
->dest_name
, strerror(errno
));
1075 // Closing destination file failed, so we cannot trust its
1076 // contents. Get rid of junk:
1077 io_unlink(pair
->dest_name
, &pair
->dest_st
);
1078 free(pair
->dest_name
);
1082 // If the operation using this file wasn't successful, we git rid
1083 // of the junk file.
1085 io_unlink(pair
->dest_name
, &pair
->dest_st
);
1087 free(pair
->dest_name
);
1094 io_close(file_pair
*pair
, bool success
)
1096 // Take care of sparseness at the end of the output file.
1097 if (success
&& pair
->dest_try_sparse
1098 && pair
->dest_pending_sparse
> 0) {
1099 // Seek forward one byte less than the size of the pending
1100 // hole, then write one zero-byte. This way the file grows
1101 // to its correct size. An alternative would be to use
1102 // ftruncate() but that isn't portable enough (e.g. it
1103 // doesn't work with FAT on Linux; FAT isn't that important
1104 // since it doesn't support sparse files anyway, but we don't
1105 // want to create corrupt files on it).
1106 if (lseek(pair
->dest_fd
, pair
->dest_pending_sparse
- 1,
1108 message_error(_("%s: Seeking failed when trying "
1109 "to create a sparse file: %s"),
1110 pair
->dest_name
, strerror(errno
));
1113 const uint8_t zero
[1] = { '\0' };
1114 if (io_write_buf(pair
, zero
, 1))
1121 // Copy the file attributes. We need to skip this if destination
1122 // file isn't open or it is standard output.
1123 if (success
&& pair
->dest_fd
!= -1 && pair
->dest_fd
!= STDOUT_FILENO
)
1124 io_copy_attrs(pair
);
1126 // Close the destination first. If it fails, we must not remove
1128 if (io_close_dest(pair
, success
))
1131 // Close the source file, and unlink it if the operation using this
1132 // file pair was successful and we haven't requested to keep the
1134 io_close_src(pair
, success
);
1143 io_fix_src_pos(file_pair
*pair
, size_t rewind_size
)
1145 assert(rewind_size
<= IO_BUFFER_SIZE
);
1147 if (rewind_size
> 0) {
1148 // This doesn't need to work on unseekable file descriptors,
1149 // so just ignore possible errors.
1150 (void)lseek(pair
->src_fd
, -(off_t
)(rewind_size
), SEEK_CUR
);
1158 io_read(file_pair
*pair
, io_buf
*buf
, size_t size
)
1160 // We use small buffers here.
1161 assert(size
< SSIZE_MAX
);
1165 while (pos
< size
) {
1166 const ssize_t amount
= read(
1167 pair
->src_fd
, buf
->u8
+ pos
, size
- pos
);
1170 pair
->src_eof
= true;
1175 if (errno
== EINTR
) {
1182 #ifndef TUKLIB_DOSLIKE
1183 if (IS_EAGAIN_OR_EWOULDBLOCK(errno
)) {
1184 // Disable the flush-timeout if no input has
1185 // been seen since the previous flush and thus
1186 // there would be nothing to flush after the
1187 // timeout expires (avoids busy waiting).
1188 const int timeout
= pair
->src_has_seen_input
1189 ? mytime_get_flush_timeout()
1192 switch (io_wait(pair
, timeout
, true)) {
1199 case IO_WAIT_TIMEOUT
:
1200 pair
->flush_needed
= true;
1209 message_error(_("%s: Read error: %s"),
1210 pair
->src_name
, strerror(errno
));
1215 pos
+= (size_t)(amount
);
1217 if (!pair
->src_has_seen_input
) {
1218 pair
->src_has_seen_input
= true;
1219 mytime_set_flush_time();
1228 io_seek_src(file_pair
*pair
, uint64_t pos
)
1230 // Caller must not attempt to seek past the end of the input file
1231 // (seeking to 100 in a 100-byte file is seeking to the end of
1232 // the file, not past the end of the file, and thus that is allowed).
1234 // This also validates that pos can be safely cast to off_t.
1235 if (pos
> (uint64_t)(pair
->src_st
.st_size
))
1238 if (lseek(pair
->src_fd
, (off_t
)(pos
), SEEK_SET
) == -1) {
1239 message_error(_("%s: Error seeking the file: %s"),
1240 pair
->src_name
, strerror(errno
));
1244 pair
->src_eof
= false;
1251 io_pread(file_pair
*pair
, io_buf
*buf
, size_t size
, uint64_t pos
)
1253 // Using lseek() and read() is more portable than pread() and
1254 // for us it is as good as real pread().
1255 if (io_seek_src(pair
, pos
))
1258 const size_t amount
= io_read(pair
, buf
, size
);
1259 if (amount
== SIZE_MAX
)
1262 if (amount
!= size
) {
1263 message_error(_("%s: Unexpected end of file"),
1273 is_sparse(const io_buf
*buf
)
1275 assert(IO_BUFFER_SIZE
% sizeof(uint64_t) == 0);
1277 for (size_t i
= 0; i
< ARRAY_SIZE(buf
->u64
); ++i
)
1278 if (buf
->u64
[i
] != 0)
1286 io_write_buf(file_pair
*pair
, const uint8_t *buf
, size_t size
)
1288 assert(size
< SSIZE_MAX
);
1291 const ssize_t amount
= write(pair
->dest_fd
, buf
, size
);
1293 if (errno
== EINTR
) {
1300 #ifndef TUKLIB_DOSLIKE
1301 if (IS_EAGAIN_OR_EWOULDBLOCK(errno
)) {
1302 if (io_wait(pair
, -1, false) == IO_WAIT_MORE
)
1309 // Handle broken pipe specially. gzip and bzip2
1310 // don't print anything on SIGPIPE. In addition,
1311 // gzip --quiet uses exit status 2 (warning) on
1312 // broken pipe instead of whatever raise(SIGPIPE)
1313 // would make it return. It is there to hide "Broken
1314 // pipe" message on some old shells (probably old
1317 // We don't do anything special with --quiet, which
1318 // is what bzip2 does too. If we get SIGPIPE, we
1319 // will handle it like other signals by setting
1320 // user_abort, and get EPIPE here.
1322 message_error(_("%s: Write error: %s"),
1323 pair
->dest_name
, strerror(errno
));
1328 buf
+= (size_t)(amount
);
1329 size
-= (size_t)(amount
);
1337 io_write(file_pair
*pair
, const io_buf
*buf
, size_t size
)
1339 assert(size
<= IO_BUFFER_SIZE
);
1341 if (pair
->dest_try_sparse
) {
1342 // Check if the block is sparse (contains only zeros). If it
1343 // sparse, we just store the amount and return. We will take
1344 // care of actually skipping over the hole when we hit the
1345 // next data block or close the file.
1347 // Since io_close() requires that dest_pending_sparse > 0
1348 // if the file ends with sparse block, we must also return
1349 // if size == 0 to avoid doing the lseek().
1350 if (size
== IO_BUFFER_SIZE
) {
1351 // Even if the block was sparse, treat it as non-sparse
1352 // if the pending sparse amount is large compared to
1353 // the size of off_t. In practice this only matters
1354 // on 32-bit systems where off_t isn't always 64 bits.
1355 const off_t pending_max
1356 = (off_t
)(1) << (sizeof(off_t
) * CHAR_BIT
- 2);
1357 if (is_sparse(buf
) && pair
->dest_pending_sparse
1359 pair
->dest_pending_sparse
+= (off_t
)(size
);
1362 } else if (size
== 0) {
1366 // This is not a sparse block. If we have a pending hole,
1368 if (pair
->dest_pending_sparse
> 0) {
1369 if (lseek(pair
->dest_fd
, pair
->dest_pending_sparse
,
1371 message_error(_("%s: Seeking failed when "
1372 "trying to create a sparse "
1373 "file: %s"), pair
->dest_name
,
1378 pair
->dest_pending_sparse
= 0;
1382 return io_write_buf(pair
, buf
->u8
, size
);