compare.c revision 1.60 1 /* $NetBSD: compare.c,v 1.60 2021/04/03 13:37:18 simonb Exp $ */
2
3 /*-
4 * Copyright (c) 1989, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #if HAVE_NBTOOL_CONFIG_H
33 #include "nbtool_config.h"
34 #endif
35
36 #include <sys/cdefs.h>
37 #if defined(__RCSID) && !defined(lint)
38 #if 0
39 static char sccsid[] = "@(#)compare.c 8.1 (Berkeley) 6/6/93";
40 #else
41 __RCSID("$NetBSD: compare.c,v 1.60 2021/04/03 13:37:18 simonb Exp $");
42 #endif
43 #endif /* not lint */
44
45 #include <sys/param.h>
46 #include <sys/stat.h>
47
48 #include <errno.h>
49 #include <fcntl.h>
50 #include <stdio.h>
51 #include <stdint.h>
52 #include <stdlib.h>
53 #include <string.h>
54 #include <time.h>
55 #include <unistd.h>
56
57 #ifndef NO_MD5
58 #include <md5.h>
59 #endif
60 #ifndef NO_RMD160
61 #include <rmd160.h>
62 #endif
63 #ifndef NO_SHA1
64 #include <sha1.h>
65 #endif
66 #ifndef NO_SHA2
67 #include <sha2.h>
68 #endif
69
70 #include "extern.h"
71
72 #define INDENTNAMELEN 8
73 #define MARK \
74 do { \
75 if (flavor == F_FREEBSD9) { \
76 len = printf("%s changed\n", RP(p)); \
77 tab = "\t"; \
78 } else { \
79 len = printf("%s: ", RP(p)); \
80 if (len > INDENTNAMELEN) { \
81 tab = "\t"; \
82 printf("\n"); \
83 } else { \
84 tab = ""; \
85 printf("%*s", INDENTNAMELEN - (int)len, ""); \
86 } \
87 } \
88 } while (0)
89 #define LABEL if (!label++) MARK
90
91 #if HAVE_STRUCT_STAT_ST_FLAGS
92
93
94 #define CHANGEFLAGS \
95 if (flags != p->fts_statp->st_flags) { \
96 char *sf; \
97 if (!label) { \
98 MARK; \
99 sf = flags_to_string(p->fts_statp->st_flags, "none"); \
100 printf("%sflags (\"%s\"", tab, sf); \
101 free(sf); \
102 } \
103 if (lchflags(p->fts_accpath, flags)) { \
104 label++; \
105 printf(", not modified: %s)\n", \
106 strerror(errno)); \
107 } else { \
108 sf = flags_to_string(flags, "none"); \
109 printf(", modified to \"%s\")\n", sf); \
110 free(sf); \
111 } \
112 }
113
114 /* SETFLAGS:
115 * given pflags, additionally set those flags specified in s->st_flags and
116 * selected by mask (the other flags are left unchanged).
117 */
118 #define SETFLAGS(pflags, mask) \
119 do { \
120 flags = (s->st_flags & (mask)) | (pflags); \
121 CHANGEFLAGS; \
122 } while (0)
123
124 /* CLEARFLAGS:
125 * given pflags, reset the flags specified in s->st_flags and selected by mask
126 * (the other flags are left unchanged).
127 */
128 #define CLEARFLAGS(pflags, mask) \
129 do { \
130 flags = (~(s->st_flags & (mask)) & CH_MASK) & (pflags); \
131 CHANGEFLAGS; \
132 } while (0)
133 #endif /* HAVE_STRUCT_STAT_ST_FLAGS */
134
135 int
136 compare(NODE *s, FTSENT *p)
137 {
138 uint32_t len, val, flags;
139 int fd, label;
140 bool was_unlinked;
141 const char *cp, *tab;
142 #if !defined(NO_MD5) || !defined(NO_RMD160) || !defined(NO_SHA1) || !defined(NO_SHA2)
143 char *digestbuf;
144 #endif
145
146 tab = NULL;
147 label = 0;
148 was_unlinked = false;
149 switch(s->type) {
150 case F_BLOCK:
151 if (!S_ISBLK(p->fts_statp->st_mode))
152 goto typeerr;
153 break;
154 case F_CHAR:
155 if (!S_ISCHR(p->fts_statp->st_mode))
156 goto typeerr;
157 break;
158 case F_DIR:
159 if (!S_ISDIR(p->fts_statp->st_mode))
160 goto typeerr;
161 break;
162 case F_FIFO:
163 if (!S_ISFIFO(p->fts_statp->st_mode))
164 goto typeerr;
165 break;
166 case F_FILE:
167 if (!S_ISREG(p->fts_statp->st_mode))
168 goto typeerr;
169 break;
170 case F_LINK:
171 if (!S_ISLNK(p->fts_statp->st_mode))
172 goto typeerr;
173 break;
174 #ifdef S_ISSOCK
175 case F_SOCK:
176 if (!S_ISSOCK(p->fts_statp->st_mode))
177 goto typeerr;
178 break;
179 #endif
180 typeerr: LABEL;
181 printf(flavor == F_FREEBSD9 ?
182 "\ttype expected %s found %s\n" : "\ttype (%s, %s)\n",
183 nodetype(s->type), inotype(p->fts_statp->st_mode));
184 return (label);
185 }
186 if (mtree_Wflag)
187 goto afterpermwhack;
188 #if HAVE_STRUCT_STAT_ST_FLAGS
189 if (iflag && !uflag) {
190 if (s->flags & F_FLAGS)
191 SETFLAGS(p->fts_statp->st_flags, SP_FLGS);
192 return (label);
193 }
194 if (mflag && !uflag) {
195 if (s->flags & F_FLAGS)
196 CLEARFLAGS(p->fts_statp->st_flags, SP_FLGS);
197 return (label);
198 }
199 #endif
200 if (s->flags & F_DEV &&
201 (s->type == F_BLOCK || s->type == F_CHAR) &&
202 s->st_rdev != p->fts_statp->st_rdev) {
203 LABEL;
204 printf(flavor == F_FREEBSD9 ?
205 "%sdevice expected %#jx found %#jx" :
206 "%sdevice (%#jx, %#jx",
207 tab, (uintmax_t)s->st_rdev,
208 (uintmax_t)p->fts_statp->st_rdev);
209 if (uflag) {
210 if ((unlink(p->fts_accpath) == -1) ||
211 (mknod(p->fts_accpath,
212 s->st_mode | nodetoino(s->type),
213 s->st_rdev) == -1) ||
214 (lchown(p->fts_accpath, p->fts_statp->st_uid,
215 p->fts_statp->st_gid) == -1) ) {
216 printf(", not modified: %s%s\n",
217 strerror(errno),
218 flavor == F_FREEBSD9 ? "" : ")");
219 } else {
220 printf(", modified%s\n",
221 flavor == F_FREEBSD9 ? "" : ")");
222 was_unlinked = true;
223 }
224 } else
225 printf(")\n");
226 tab = "\t";
227 }
228 /* Set the uid/gid first, then set the mode. */
229 if (s->flags & (F_UID | F_UNAME) &&
230 (was_unlinked || s->st_uid != p->fts_statp->st_uid)) {
231 LABEL;
232 printf(flavor == F_FREEBSD9 ?
233 "%suser expected %lu found %lu" : "%suser (%lu, %lu",
234 tab, (u_long)s->st_uid, (u_long)p->fts_statp->st_uid);
235 if (uflag) {
236 if (lchown(p->fts_accpath, s->st_uid, -1))
237 printf(", not modified: %s%s\n",
238 strerror(errno),
239 flavor == F_FREEBSD9 ? "" : ")");
240 else
241 printf(", modified%s%s\n",
242 was_unlinked ? " by unlink" : "",
243 flavor == F_FREEBSD9 ? "" : ")");
244 } else
245 printf(")\n");
246 tab = "\t";
247 }
248 if (s->flags & (F_GID | F_GNAME) &&
249 (was_unlinked || s->st_gid != p->fts_statp->st_gid)) {
250 LABEL;
251 printf(flavor == F_FREEBSD9 ?
252 "%sgid expected %lu found %lu" : "%sgid (%lu, %lu",
253 tab, (u_long)s->st_gid, (u_long)p->fts_statp->st_gid);
254 if (uflag) {
255 if (lchown(p->fts_accpath, -1, s->st_gid))
256 printf(", not modified: %s%s\n",
257 strerror(errno),
258 flavor == F_FREEBSD9 ? "" : ")");
259 else
260 printf(", modified%s%s\n",
261 was_unlinked ? " by unlink" : "",
262 flavor == F_FREEBSD9 ? "" : ")");
263 }
264 else
265 printf(")\n");
266 tab = "\t";
267 }
268 if (s->flags & F_MODE &&
269 (was_unlinked || s->st_mode != (p->fts_statp->st_mode & MBITS))) {
270 if (lflag && !was_unlinked) {
271 mode_t tmode, mode;
272
273 tmode = s->st_mode;
274 mode = p->fts_statp->st_mode & MBITS;
275 /*
276 * if none of the suid/sgid/etc bits are set,
277 * then if the mode is a subset of the target,
278 * skip.
279 */
280 if (!((tmode & ~(S_IRWXU|S_IRWXG|S_IRWXO)) ||
281 (mode & ~(S_IRWXU|S_IRWXG|S_IRWXO))))
282 if ((mode | tmode) == tmode)
283 goto skip;
284 }
285
286 LABEL;
287 printf(flavor == F_FREEBSD9 ?
288 "%spermissions expcted %#lo found %#lo" :
289 "%spermissions (%#lo, %#lo",
290 tab, (u_long)s->st_mode,
291 (u_long)p->fts_statp->st_mode & MBITS);
292 if (uflag) {
293 if (lchmod(p->fts_accpath, s->st_mode))
294 printf(", not modified: %s%s\n",
295 strerror(errno),
296 flavor == F_FREEBSD9 ? "" : ")");
297 else
298 printf(", modified%s%s\n",
299 was_unlinked ? " by unlink" : "",
300 flavor == F_FREEBSD9 ? "" : ")");
301 }
302 else
303 printf(")\n");
304 tab = "\t";
305 skip: ;
306 }
307 if (s->flags & F_NLINK && s->type != F_DIR &&
308 s->st_nlink != p->fts_statp->st_nlink) {
309 LABEL;
310 printf(flavor == F_FREEBSD9 ?
311 "%slink count expected %lu found %lu\n" :
312 "%slink count (%lu, %lu)\n",
313 tab, (u_long)s->st_nlink, (u_long)p->fts_statp->st_nlink);
314 tab = "\t";
315 }
316 if (s->flags & F_SIZE && s->st_size != p->fts_statp->st_size) {
317 LABEL;
318 printf(flavor == F_FREEBSD9 ?
319 "%ssize expected %ju found %ju\n" : "%ssize (%ju, %ju)\n",
320 tab, (uintmax_t)s->st_size,
321 (uintmax_t)p->fts_statp->st_size);
322 tab = "\t";
323 }
324 /*
325 * XXX
326 * Since utimes(2) only takes a timeval, there's no point in
327 * comparing the low bits of the timespec nanosecond field. This
328 * will only result in mismatches that we can never fix.
329 *
330 * Doesn't display microsecond differences.
331 */
332 if (s->flags & F_TIME) {
333 struct timeval tv[2];
334 struct stat *ps = p->fts_statp;
335 time_t smtime = s->st_mtimespec.tv_sec;
336
337 #if defined(BSD4_4) && !defined(HAVE_NBTOOL_CONFIG_H)
338 time_t pmtime = ps->st_mtimespec.tv_sec;
339
340 TIMESPEC_TO_TIMEVAL(&tv[0], &s->st_mtimespec);
341 TIMESPEC_TO_TIMEVAL(&tv[1], &ps->st_mtimespec);
342 #else
343 time_t pmtime = (time_t)ps->st_mtime;
344
345 tv[0].tv_sec = smtime;
346 tv[0].tv_usec = 0;
347 tv[1].tv_sec = pmtime;
348 tv[1].tv_usec = 0;
349 #endif
350
351 if (tv[0].tv_sec != tv[1].tv_sec ||
352 tv[0].tv_usec != tv[1].tv_usec) {
353 LABEL;
354 printf(flavor == F_FREEBSD9 ?
355 "%smodification time expected %.24s found " :
356 "%smodification time (%.24s, ",
357 tab, ctime(&smtime));
358 printf("%.24s", ctime(&pmtime));
359 if (tflag) {
360 tv[1] = tv[0];
361 if (utimes(p->fts_accpath, tv))
362 printf(", not modified: %s%s\n",
363 strerror(errno),
364 flavor == F_FREEBSD9 ? "" : ")");
365 else
366 printf(", modified%s\n",
367 flavor == F_FREEBSD9 ? "" : ")");
368 } else
369 printf("%s\n", flavor == F_FREEBSD9 ? "" : ")");
370 tab = "\t";
371 }
372 }
373 #if HAVE_STRUCT_STAT_ST_FLAGS
374 /*
375 * XXX
376 * since lchflags(2) will reset file times, the utimes() above
377 * may have been useless! oh well, we'd rather have correct
378 * flags, rather than times?
379 */
380 if ((s->flags & F_FLAGS) && ((s->st_flags != p->fts_statp->st_flags)
381 || mflag || iflag)) {
382 if (s->st_flags != p->fts_statp->st_flags) {
383 char *f_s;
384 LABEL;
385 f_s = flags_to_string(s->st_flags, "none");
386 printf(flavor == F_FREEBSD9 ?
387 "%sflags expected \"%s\" found " :
388 "%sflags (\"%s\" is not ", tab, f_s);
389 free(f_s);
390 f_s = flags_to_string(p->fts_statp->st_flags, "none");
391 printf("\"%s\"", f_s);
392 free(f_s);
393 }
394 if (uflag) {
395 if (iflag)
396 SETFLAGS(0, CH_MASK);
397 else if (mflag)
398 CLEARFLAGS(0, SP_FLGS);
399 else
400 SETFLAGS(0, (~SP_FLGS & CH_MASK));
401 } else
402 printf("%s\n", flavor == F_FREEBSD9 ? "" : ")");
403 tab = "\t";
404 }
405 #endif /* HAVE_STRUCT_STAT_ST_FLAGS */
406
407 /*
408 * from this point, no more permission checking or whacking
409 * occurs, only checking of stuff like checksums and symlinks.
410 */
411 afterpermwhack:
412 if (s->flags & F_CKSUM) {
413 if ((fd = open(p->fts_accpath, O_RDONLY, 0)) < 0) {
414 LABEL;
415 printf("%scksum: %s: %s\n",
416 tab, p->fts_accpath, strerror(errno));
417 tab = "\t";
418 } else if (crc(fd, &val, &len)) {
419 close(fd);
420 LABEL;
421 printf("%scksum: %s: %s\n",
422 tab, p->fts_accpath, strerror(errno));
423 tab = "\t";
424 } else {
425 close(fd);
426 if (s->cksum != val) {
427 LABEL;
428 printf(flavor == F_FREEBSD9 ?
429 "%scksum expected %lu found %lu\n" :
430 "%scksum (%lu, %lu)\n",
431 tab, s->cksum, (unsigned long)val);
432 }
433 tab = "\t";
434 }
435 }
436 #ifndef NO_MD5
437 if (s->flags & F_MD5) {
438 if ((digestbuf = MD5File(p->fts_accpath, NULL)) == NULL) {
439 LABEL;
440 printf("%s%s: %s: %s\n",
441 tab, MD5KEY, p->fts_accpath, strerror(errno));
442 tab = "\t";
443 } else {
444 if (strcmp(s->md5digest, digestbuf)) {
445 LABEL;
446 printf(flavor == F_FREEBSD9 ?
447 "%s%s expected %s found %s\n" :
448 "%s%s (0x%s, 0x%s)\n",
449 tab, MD5KEY, s->md5digest, digestbuf);
450 }
451 tab = "\t";
452 free(digestbuf);
453 }
454 }
455 #endif /* ! NO_MD5 */
456 #ifndef NO_RMD160
457 if (s->flags & F_RMD160) {
458 if ((digestbuf = RMD160File(p->fts_accpath, NULL)) == NULL) {
459 LABEL;
460 printf("%s%s: %s: %s\n",
461 tab, RMD160KEY, p->fts_accpath, strerror(errno));
462 tab = "\t";
463 } else {
464 if (strcmp(s->rmd160digest, digestbuf)) {
465 LABEL;
466 printf(flavor == F_FREEBSD9 ?
467 "%s%s expected %s found %s\n" :
468 "%s%s (0x%s, 0x%s)\n",
469 tab, RMD160KEY, s->rmd160digest, digestbuf);
470 }
471 tab = "\t";
472 free(digestbuf);
473 }
474 }
475 #endif /* ! NO_RMD160 */
476 #ifndef NO_SHA1
477 if (s->flags & F_SHA1) {
478 if ((digestbuf = SHA1File(p->fts_accpath, NULL)) == NULL) {
479 LABEL;
480 printf("%s%s: %s: %s\n",
481 tab, SHA1KEY, p->fts_accpath, strerror(errno));
482 tab = "\t";
483 } else {
484 if (strcmp(s->sha1digest, digestbuf)) {
485 LABEL;
486 printf(flavor == F_FREEBSD9 ?
487 "%s%s expected %s found %s\n" :
488 "%s%s (0x%s, 0x%s)\n",
489 tab, SHA1KEY, s->sha1digest, digestbuf);
490 }
491 tab = "\t";
492 free(digestbuf);
493 }
494 }
495 #endif /* ! NO_SHA1 */
496 #ifndef NO_SHA2
497 if (s->flags & F_SHA256) {
498 if ((digestbuf = SHA256_File(p->fts_accpath, NULL)) == NULL) {
499 LABEL;
500 printf("%s%s: %s: %s\n",
501 tab, SHA256KEY, p->fts_accpath, strerror(errno));
502 tab = "\t";
503 } else {
504 if (strcmp(s->sha256digest, digestbuf)) {
505 LABEL;
506 printf(flavor == F_FREEBSD9 ?
507 "%s%s expected %s found %s\n" :
508 "%s%s (0x%s, 0x%s)\n",
509 tab, SHA256KEY, s->sha256digest, digestbuf);
510 }
511 tab = "\t";
512 free(digestbuf);
513 }
514 }
515 #ifdef SHA384_BLOCK_LENGTH
516 if (s->flags & F_SHA384) {
517 if ((digestbuf = SHA384_File(p->fts_accpath, NULL)) == NULL) {
518 LABEL;
519 printf("%s%s: %s: %s\n",
520 tab, SHA384KEY, p->fts_accpath, strerror(errno));
521 tab = "\t";
522 } else {
523 if (strcmp(s->sha384digest, digestbuf)) {
524 LABEL;
525 printf(flavor == F_FREEBSD9 ?
526 "%s%s expected %s found %s\n" :
527 "%s%s (0x%s, 0x%s)\n",
528 tab, SHA384KEY, s->sha384digest, digestbuf);
529 }
530 tab = "\t";
531 free(digestbuf);
532 }
533 }
534 #endif
535 if (s->flags & F_SHA512) {
536 if ((digestbuf = SHA512_File(p->fts_accpath, NULL)) == NULL) {
537 LABEL;
538 printf("%s%s: %s: %s\n",
539 tab, SHA512KEY, p->fts_accpath, strerror(errno));
540 tab = "\t";
541 } else {
542 if (strcmp(s->sha512digest, digestbuf)) {
543 LABEL;
544 printf(flavor == F_FREEBSD9 ?
545 "%s%s expected %s found %s\n" :
546 "%s%s (0x%s, 0x%s)\n",
547 tab, SHA512KEY, s->sha512digest, digestbuf);
548 }
549 tab = "\t";
550 free(digestbuf);
551 }
552 }
553 #endif /* ! NO_SHA2 */
554 if (s->flags & F_SLINK &&
555 strcmp(cp = rlink(p->fts_accpath), s->slink)) {
556 LABEL;
557 printf(flavor == F_FREEBSD9 ?
558 "%slink ref expected %s found %s" :
559 "%slink ref (%s, %s", tab, cp, s->slink);
560 if (uflag) {
561 if ((unlink(p->fts_accpath) == -1) ||
562 (symlink(s->slink, p->fts_accpath) == -1) )
563 printf(", not modified: %s%s\n",
564 strerror(errno),
565 flavor == F_FREEBSD9 ? "" : ")");
566 else
567 printf(", modified%s\n",
568 flavor == F_FREEBSD9 ? "" : ")");
569 } else
570 printf("%s\n", flavor == F_FREEBSD9 ? "" : ")");
571 }
572 return (label);
573 }
574
575 const char *
576 rlink(const char *name)
577 {
578 static char lbuf[MAXPATHLEN];
579 int len;
580
581 if ((len = readlink(name, lbuf, sizeof(lbuf) - 1)) == -1)
582 mtree_err("%s: %s", name, strerror(errno));
583 lbuf[len] = '\0';
584 return (lbuf);
585 }
586