1 /* vi: set sw=4 ts=4: */
3 * Mini tar implementation for busybox
5 * Note, that as of BusyBox-0.43, tar has been completely rewritten from the
6 * ground up. It still has remnents of the old code lying about, but it is
7 * very different now (i.e. cleaner, less global variables, etc)
9 * Copyright (C) 1999,2000,2001 by Lineo, inc.
10 * Written by Erik Andersen <andersen@lineo.com>, <andersee@debian.org>
12 * Based in part in the tar implementation in sash
13 * Copyright (c) 1999 by David I. Bell
14 * Permission is granted to use, distribute, or modify this source,
15 * provided that this copyright notice remains intact.
16 * Permission to distribute sash derived code under the GPL has been granted.
18 * Based in part on the tar implementation from busybox-0.28
19 * Copyright (C) 1995 Bruce Perens
20 * This is free software under the GNU General Public License.
22 * This program is free software; you can redistribute it and/or modify
23 * it under the terms of the GNU General Public License as published by
24 * the Free Software Foundation; either version 2 of the License, or
25 * (at your option) any later version.
27 * This program is distributed in the hope that it will be useful,
28 * but WITHOUT ANY WARRANTY; without even the implied warranty of
29 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
30 * General Public License for more details.
32 * You should have received a copy of the GNU General Public License
33 * along with this program; if not, write to the Free Software
34 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
40 #define BB_DECLARE_EXTERN
41 #define bb_need_io_error
42 #define bb_need_name_longer_than_foo
51 #include <sys/types.h>
52 #include <sys/sysmacros.h>
59 #ifdef BB_FEATURE_TAR_GZIP
60 extern int unzip(int in, int out);
61 extern int gunzip_init();
64 /* Tar file constants */
66 #define MAJOR(dev) (((dev)>>8)&0xff)
67 #define MINOR(dev) ((dev)&0xff)
70 enum { NAME_SIZE = 100 }; /* because gcc won't let me use 'static const int' */
72 /* POSIX tar Header Block, from POSIX 1003.1-1990 */
76 char name[NAME_SIZE]; /* 0-99 */
77 char mode[8]; /* 100-107 */
78 char uid[8]; /* 108-115 */
79 char gid[8]; /* 116-123 */
80 char size[12]; /* 124-135 */
81 char mtime[12]; /* 136-147 */
82 char chksum[8]; /* 148-155 */
83 char typeflag; /* 156-156 */
84 char linkname[NAME_SIZE]; /* 157-256 */
85 char magic[6]; /* 257-262 */
86 char version[2]; /* 263-264 */
87 char uname[32]; /* 265-296 */
88 char gname[32]; /* 297-328 */
89 char devmajor[8]; /* 329-336 */
90 char devminor[8]; /* 337-344 */
91 char prefix[155]; /* 345-499 */
92 char padding[12]; /* 500-512 (pad to exactly the TAR_BLOCK_SIZE) */
94 typedef struct TarHeader TarHeader;
97 /* A few useful constants */
98 #define TAR_MAGIC "ustar" /* ustar and a null */
99 #define TAR_VERSION " " /* Be compatable with GNU tar format */
100 static const int TAR_MAGIC_LEN = 6;
101 static const int TAR_VERSION_LEN = 2;
102 static const int TAR_BLOCK_SIZE = 512;
104 /* A nice enum with all the possible tar file content types */
107 REGTYPE = '0', /* regular file */
108 REGTYPE0 = '\0', /* regular file (ancient bug compat)*/
109 LNKTYPE = '1', /* hard link */
110 SYMTYPE = '2', /* symbolic link */
111 CHRTYPE = '3', /* character special */
112 BLKTYPE = '4', /* block special */
113 DIRTYPE = '5', /* directory */
114 FIFOTYPE = '6', /* FIFO special */
115 CONTTYPE = '7', /* reserved */
116 GNULONGLINK = 'K', /* GNU long (>100 chars) link name */
117 GNULONGNAME = 'L', /* GNU long (>100 chars) file name */
119 typedef enum TarFileType TarFileType;
121 /* This struct ignores magic, non-numeric user name,
122 * non-numeric group name, and the checksum, since
123 * these are all ignored by BusyBox tar. */
126 int tarFd; /* An open file descriptor for reading from the tarball */
127 char * name; /* File name */
128 mode_t mode; /* Unix mode, including device bits. */
129 uid_t uid; /* Numeric UID */
130 gid_t gid; /* Numeric GID */
131 size_t size; /* Size of file */
132 time_t mtime; /* Last-modified time */
133 enum TarFileType type; /* Regular, directory, link, etc */
134 char * linkname; /* Name for symbolic and hard links */
135 long devmajor; /* Major number for special device */
136 long devminor; /* Minor number for special device */
138 typedef struct TarInfo TarInfo;
140 /* Local procedures to restore files from a tar file. */
141 extern int readTarFile(int tarFd, int extractFlag, int listFlag,
142 int tostdoutFlag, int verboseFlag, char** extractList,
145 #ifdef BB_FEATURE_TAR_CREATE
146 /* Local procedures to save files into a tar file. */
147 static int writeTarFile(const char* tarName, int verboseFlag, char **argv,
151 #ifdef BB_FEATURE_TAR_GZIP
152 /* Signal handler for when child gzip process dies... */
160 extern int tar_unzip_init(int tarFd)
163 static int unzip_pipe[2];
164 /* Cope if child dies... Otherwise we block forever in read()... */
165 signal(SIGCHLD, child_died);
167 if (pipe(unzip_pipe)!=0)
168 error_msg_and_die("pipe error");
170 if ( (child_pid = fork()) == -1)
171 error_msg_and_die("fork failure");
175 close(unzip_pipe[0]);
177 unzip(tarFd, unzip_pipe[1]);
181 /* return fd of uncompressed data to parent process */
182 close(unzip_pipe[1]);
183 return(unzip_pipe[0]);
188 #if defined BB_FEATURE_TAR_EXCLUDE
189 struct option longopts[] = {
190 { "exclude", 1, NULL, 'e' },
195 extern int tar_main(int argc, char **argv)
197 char** excludeList=NULL;
198 char** extractList=NULL;
199 const char *tarName="-";
200 #if defined BB_FEATURE_TAR_EXCLUDE
201 int excludeListSize=0;
205 #if defined BB_FEATURE_TAR_GZIP
206 int unzipFlag = FALSE;
208 int listFlag = FALSE;
209 int extractFlag = FALSE;
210 int createFlag = FALSE;
211 int verboseFlag = FALSE;
212 int tostdoutFlag = FALSE;
219 if (argv[1][0] != '-') {
220 char *tmp = xmalloc(strlen(argv[1]) + 2);
222 strcpy(tmp + 1, argv[1]);
227 #ifndef BB_FEATURE_TAR_EXCLUDE
228 (opt = getopt(argc, argv, "cxtzvOf:"))
230 (opt = getopt_long(argc, argv, "cxtzvOf:X:", longopts, NULL))
235 if (extractFlag == TRUE || listFlag == TRUE)
240 if (listFlag == TRUE || createFlag == TRUE)
245 if (extractFlag == TRUE || createFlag == TRUE)
249 #ifdef BB_FEATURE_TAR_GZIP
262 error_msg_and_die( "Only one 'f' option allowed");
265 #if defined BB_FEATURE_TAR_EXCLUDE
267 excludeList=xrealloc( excludeList,
268 sizeof(char *) * (excludeListSize+2));
269 excludeList[excludeListSize] = optarg;
270 /* Tack a NULL onto the end of the list */
271 excludeList[++excludeListSize] = NULL;
273 fileList = xfopen(optarg, "r");
274 while (fgets(file, sizeof(file), fileList) != NULL) {
275 excludeList = xrealloc(excludeList,
276 sizeof(char *) * (excludeListSize+2));
278 excludeList[excludeListSize] = xstrdup(file);
279 /* Tack a NULL onto the end of the list */
280 excludeList[++excludeListSize] = NULL;
291 * Do the correct type of action supplying the rest of the
292 * command line arguments as the list of files to process.
294 if (createFlag == TRUE) {
295 #ifndef BB_FEATURE_TAR_CREATE
296 error_msg_and_die( "This version of tar was not compiled with tar creation support.");
298 #ifdef BB_FEATURE_TAR_GZIP
300 error_msg_and_die("Creation of compressed not internally support by tar, pipe to busybox gunzip");
302 status = writeTarFile(tarName, verboseFlag, argv + optind, excludeList);
305 if (listFlag == TRUE || extractFlag == TRUE) {
308 extractList = argv + optind;
309 /* Open the tar file for reading. */
310 if (!strcmp(tarName, "-"))
311 tarFd = fileno(stdin);
313 tarFd = open(tarName, O_RDONLY);
315 perror_msg_and_die("Error opening '%s'", tarName);
317 #ifdef BB_FEATURE_TAR_GZIP
318 /* unzip tarFd in a seperate process */
319 if (unzipFlag == TRUE)
320 tarFd = tar_unzip_init(tarFd);
322 status = readTarFile(tarFd, extractFlag, listFlag, tostdoutFlag,
323 verboseFlag, extractList, excludeList);
332 error_msg_and_die( "Exactly one of 'c', 'x' or 't' must be specified");
336 fixUpPermissions(TarInfo *header)
339 /* Now set permissions etc for the new file */
340 chown(header->name, header->uid, header->gid);
341 chmod(header->name, header->mode);
344 t.modtime = header->mtime;
345 utime(header->name, &t);
349 tarExtractRegularFile(TarInfo *header, int extractFlag, int tostdoutFlag)
353 size_t actualWriteSz;
355 size_t size = header->size;
356 int outFd=fileno(stdout);
358 /* Open the file to be written, if a file is supposed to be written */
359 if (extractFlag==TRUE && tostdoutFlag==FALSE) {
360 /* Create the path to the file, just in case it isn't there...
361 * This should not screw up path permissions or anything. */
362 create_path(header->name, 0777);
363 if ((outFd=open(header->name, O_CREAT|O_TRUNC|O_WRONLY,
364 header->mode & ~S_IFMT)) < 0) {
365 error_msg(io_error, header->name, strerror(errno));
370 /* Write out the file, if we are supposed to be doing that */
373 if ( size > sizeof(buffer) )
374 writeSize = readSize = sizeof(buffer);
376 int mod = size % 512;
378 readSize = size + (512 - mod);
383 if ( (readSize = full_read(header->tarFd, buffer, readSize)) <= 0 ) {
384 /* Tarball seems to have a problem */
385 error_msg("Unexpected EOF in archive");
388 if ( readSize < writeSize )
389 writeSize = readSize;
391 /* Write out the file, if we are supposed to be doing that */
392 if (extractFlag==TRUE) {
394 if ((actualWriteSz=full_write(outFd, buffer, writeSize)) != writeSize ) {
395 /* Output file seems to have a problem */
396 error_msg(io_error, header->name, strerror(errno));
400 actualWriteSz=writeSize;
403 size -= actualWriteSz;
406 /* Now we are done writing the file out, so try
407 * and fix up the permissions and whatnot */
408 if (extractFlag==TRUE && tostdoutFlag==FALSE) {
410 fixUpPermissions(header);
416 tarExtractDirectory(TarInfo *header, int extractFlag, int tostdoutFlag)
419 if (extractFlag==FALSE || tostdoutFlag==TRUE)
422 if (create_path(header->name, header->mode) != TRUE) {
423 perror_msg("%s: Cannot mkdir", header->name);
426 /* make the final component, just in case it was
427 * omitted by create_path() (which will skip the
428 * directory if it doesn't have a terminating '/') */
429 if (mkdir(header->name, header->mode) < 0 && errno != EEXIST) {
430 perror_msg("%s", header->name);
434 fixUpPermissions(header);
439 tarExtractHardLink(TarInfo *header, int extractFlag, int tostdoutFlag)
441 if (extractFlag==FALSE || tostdoutFlag==TRUE)
444 if (link(header->linkname, header->name) < 0) {
445 perror_msg("%s: Cannot create hard link to '%s'", header->name,
450 /* Now set permissions etc for the new directory */
451 fixUpPermissions(header);
456 tarExtractSymLink(TarInfo *header, int extractFlag, int tostdoutFlag)
458 if (extractFlag==FALSE || tostdoutFlag==TRUE)
462 if (symlink(header->linkname, header->name) < 0) {
463 perror_msg("%s: Cannot create symlink to '%s'", header->name,
467 /* Try to change ownership of the symlink.
468 * If libs doesn't support that, don't bother.
469 * Changing the pointed-to-file is the Wrong Thing(tm).
471 #if (__GLIBC__ >= 2) && (__GLIBC_MINOR__ >= 1)
472 lchown(header->name, header->uid, header->gid);
475 /* Do not change permissions or date on symlink,
476 * since it changes the pointed to file instead. duh. */
478 error_msg("%s: Cannot create symlink to '%s': %s",
479 header->name, header->linkname,
480 "symlinks not supported");
486 tarExtractSpecial(TarInfo *header, int extractFlag, int tostdoutFlag)
488 if (extractFlag==FALSE || tostdoutFlag==TRUE)
491 if (S_ISCHR(header->mode) || S_ISBLK(header->mode) || S_ISSOCK(header->mode)) {
492 if (mknod(header->name, header->mode, makedev(header->devmajor, header->devminor)) < 0) {
493 perror_msg("%s: Cannot mknod", header->name);
496 } else if (S_ISFIFO(header->mode)) {
497 if (mkfifo(header->name, header->mode) < 0) {
498 perror_msg("%s: Cannot mkfifo", header->name);
503 /* Now set permissions etc for the new directory */
504 fixUpPermissions(header);
508 /* Read an octal value in a field of the specified width, with optional
509 * spaces on both sides of the number and with an optional null character
510 * at the end. Returns -1 on an illegal format. */
511 static long getOctal(const char *cp, int size)
515 for(;(size > 0) && (*cp == ' '); cp++, size--);
516 if ((size == 0) || !is_octal(*cp))
518 for(; (size > 0) && is_octal(*cp); size--) {
519 val = val * 8 + *cp++ - '0';
521 for (;(size > 0) && (*cp == ' '); cp++, size--);
522 if ((size > 0) && *cp)
528 /* Parse the tar header and fill in the nice struct with the details */
530 readTarHeader(struct TarHeader *rawHeader, struct TarInfo *header)
534 unsigned char *s = (unsigned char *)rawHeader;
536 header->name = rawHeader->name;
537 /* Check for and relativify any absolute paths */
538 if ( *(header->name) == '/' ) {
539 static int alreadyWarned=FALSE;
541 while (*(header->name) == '/')
544 if (alreadyWarned == FALSE) {
545 error_msg("Removing leading '/' from member names");
546 alreadyWarned = TRUE;
550 header->mode = getOctal(rawHeader->mode, sizeof(rawHeader->mode));
551 header->uid = getOctal(rawHeader->uid, sizeof(rawHeader->uid));
552 header->gid = getOctal(rawHeader->gid, sizeof(rawHeader->gid));
553 header->size = getOctal(rawHeader->size, sizeof(rawHeader->size));
554 header->mtime = getOctal(rawHeader->mtime, sizeof(rawHeader->mtime));
555 chksum = getOctal(rawHeader->chksum, sizeof(rawHeader->chksum));
556 header->type = rawHeader->typeflag;
557 header->linkname = rawHeader->linkname;
558 header->devmajor = getOctal(rawHeader->devmajor, sizeof(rawHeader->devmajor));
559 header->devminor = getOctal(rawHeader->devminor, sizeof(rawHeader->devminor));
561 /* Check the checksum */
562 for (i = sizeof(*rawHeader); i-- != 0;) {
565 /* Remove the effects of the checksum field (replace
566 * with blanks for the purposes of the checksum) */
567 s = rawHeader->chksum;
568 for (i = sizeof(rawHeader->chksum) ; i-- != 0;) {
571 sum += ' ' * sizeof(rawHeader->chksum);
577 int exclude_file(char **excluded_files, const char *file)
581 if (excluded_files == NULL)
584 for (i = 0; excluded_files[i] != NULL; i++) {
585 if (excluded_files[i][0] == '/') {
586 if (fnmatch(excluded_files[i], file,
587 FNM_PATHNAME | FNM_LEADING_DIR) == 0)
592 for (p = file; p[0] != '\0'; p++) {
593 if ((p == file || p[-1] == '/') && p[0] != '/' &&
594 fnmatch(excluded_files[i], p,
595 FNM_PATHNAME | FNM_LEADING_DIR) == 0)
604 int extract_file(char **extract_files, const char *file)
608 if (extract_files == NULL)
611 for (i = 0; extract_files[i] != NULL; i++) {
612 if (fnmatch(extract_files[i], file, FNM_LEADING_DIR) == 0)
620 * Read a tar file and extract or list the specified files within it.
621 * If the list is empty than all files are extracted or listed.
623 extern int readTarFile(int tarFd, int extractFlag, int listFlag,
624 int tostdoutFlag, int verboseFlag, char** extractList,
629 int skipNextHeaderFlag=FALSE;
633 /* Set the umask for this process so it doesn't
634 * screw up permission setting for us later. */
637 /* Read the tar file, and iterate over it one file at a time */
638 while ( (status = full_read(tarFd, (char*)&rawHeader, TAR_BLOCK_SIZE)) == TAR_BLOCK_SIZE ) {
640 /* Try to read the header */
641 if ( readTarHeader(&rawHeader, &header) == FALSE ) {
642 if ( *(header.name) == '\0' ) {
646 error_msg("Bad tar header, skipping");
650 if ( *(header.name) == '\0' )
652 header.tarFd = tarFd;
654 /* Skip funky extra GNU headers that precede long files */
655 if ( (header.type == GNULONGNAME) || (header.type == GNULONGLINK) ) {
656 skipNextHeaderFlag=TRUE;
657 if (tarExtractRegularFile(&header, FALSE, FALSE) == FALSE)
661 if ( skipNextHeaderFlag == TRUE ) {
662 skipNextHeaderFlag=FALSE;
663 error_msg(name_longer_than_foo, NAME_SIZE);
664 if (tarExtractRegularFile(&header, FALSE, FALSE) == FALSE)
669 #if defined BB_FEATURE_TAR_EXCLUDE
670 if (exclude_file(excludeList, header.name)) {
671 /* There are not the droids you're looking for, move along */
672 /* If it is a regular file, pretend to extract it with
673 * the extractFlag set to FALSE, so the junk in the tarball
674 * is properly skipped over */
675 if ( header.type==REGTYPE || header.type==REGTYPE0 ) {
676 if (tarExtractRegularFile(&header, FALSE, FALSE) == FALSE)
683 if (!extract_file(extractList, header.name)) {
684 /* There are not the droids you're looking for, move along */
685 /* If it is a regular file, pretend to extract it with
686 * the extractFlag set to FALSE, so the junk in the tarball
687 * is properly skipped over */
688 if ( header.type==REGTYPE || header.type==REGTYPE0 ) {
689 if (tarExtractRegularFile(&header, FALSE, FALSE) == FALSE)
695 if (listFlag == TRUE) {
696 /* Special treatment if the list (-t) flag is on */
697 if (verboseFlag == TRUE) {
700 struct tm *tm = localtime (&(header.mtime));
702 len=printf("%s ", mode_string(header.mode));
703 my_getpwuid(buf, header.uid);
705 len+=printf("%d", header.uid);
707 len+=printf("%s", buf);
708 my_getgrgid(buf, header.gid);
710 len+=printf("/%-d ", header.gid);
712 len+=printf("/%-s ", buf);
714 if (header.type==CHRTYPE || header.type==BLKTYPE) {
715 len1=snprintf(buf, sizeof(buf), "%ld,%-ld ",
716 header.devmajor, header.devminor);
718 len1=snprintf(buf, sizeof(buf), "%lu ", (long)header.size);
720 /* Jump through some hoops to make the columns match up */
721 for(;(len+len1)<31;len++)
725 /* Use ISO 8610 time format */
727 printf ("%04d-%02d-%02d %02d:%02d:%02d ",
728 tm->tm_year + 1900, tm->tm_mon + 1, tm->tm_mday,
729 tm->tm_hour, tm->tm_min, tm->tm_sec);
732 printf("%s", header.name);
733 if (verboseFlag == TRUE) {
734 if (header.type==LNKTYPE) /* If this is a link, say so */
735 printf(" link to %s", header.linkname);
736 else if (header.type==SYMTYPE)
737 printf(" -> %s", header.linkname);
742 /* List contents if we are supposed to do that */
743 if (verboseFlag == TRUE && extractFlag == TRUE) {
744 /* Now the normal listing */
746 if (tostdoutFlag == TRUE) // If the archive goes to stdout, verbose to stderr
748 fprintf(vbFd, "%s\n", header.name);
751 /* Remove files if we would overwrite them */
752 if (extractFlag == TRUE && tostdoutFlag == FALSE)
755 /* If we got here, we can be certain we have a legitimate
756 * header to work with. So work with it. */
757 switch ( header.type ) {
760 /* If the name ends in a '/' then assume it is
761 * supposed to be a directory, and fall through */
762 if (header.name[strlen(header.name)-1] != '/') {
763 if (tarExtractRegularFile(&header, extractFlag, tostdoutFlag)==FALSE)
768 if (tarExtractDirectory( &header, extractFlag, tostdoutFlag)==FALSE)
772 if (tarExtractHardLink( &header, extractFlag, tostdoutFlag)==FALSE)
776 if (tarExtractSymLink( &header, extractFlag, tostdoutFlag)==FALSE)
782 if (tarExtractSpecial( &header, extractFlag, tostdoutFlag)==FALSE)
786 /* Handled earlier */
789 skipNextHeaderFlag=TRUE;
793 error_msg("Unknown file type '%c' in tar file", header.type);
800 /* Bummer - we read a partial header */
801 perror_msg("Error reading tar file");
804 else if (errorFlag==TRUE) {
805 error_msg( "Error exit delayed from previous errors");
810 /* Stuff to do when we are done */
813 if ( *(header.name) == '\0' ) {
815 error_msg( "Error exit delayed from previous errors");
823 #ifdef BB_FEATURE_TAR_CREATE
826 ** writeTarFile(), writeFileToTarball(), and writeTarHeader() are
827 ** the only functions that deal with the HardLinkInfo structure.
828 ** Even these functions use the xxxHardLinkInfo() functions.
830 typedef struct HardLinkInfo HardLinkInfo;
833 HardLinkInfo *next; /* Next entry in list */
834 dev_t dev; /* Device number */
835 ino_t ino; /* Inode number */
836 short linkCount; /* (Hard) Link Count */
837 char name[1]; /* Start of filename (must be last) */
840 /* Some info to be carried along when creating a new tarball */
843 char* fileName; /* File name of the tarball */
844 int tarFd; /* Open-for-write file descriptor
846 struct stat statBuf; /* Stat info for the tarball, letting
847 us know the inode and device that the
848 tarball lives, so we can avoid trying
849 to include the tarball into itself */
850 int verboseFlag; /* Whether to print extra stuff or not */
851 char** excludeList; /* List of files to not include */
852 HardLinkInfo *hlInfoHead; /* Hard Link Tracking Information */
853 HardLinkInfo *hlInfo; /* Hard Link Info for the current file */
855 typedef struct TarBallInfo TarBallInfo;
858 /* Might be faster (and bigger) if the dev/ino were stored in numeric order;) */
860 addHardLinkInfo (HardLinkInfo **hlInfoHeadPtr, dev_t dev, ino_t ino,
861 short linkCount, const char *name)
863 /* Note: hlInfoHeadPtr can never be NULL! */
864 HardLinkInfo *hlInfo;
866 hlInfo = (HardLinkInfo *)xmalloc(sizeof(HardLinkInfo)+strlen(name)+1);
868 hlInfo->next = *hlInfoHeadPtr;
869 *hlInfoHeadPtr = hlInfo;
872 hlInfo->linkCount = linkCount;
873 strcpy(hlInfo->name, name);
879 freeHardLinkInfo (HardLinkInfo **hlInfoHeadPtr)
881 HardLinkInfo *hlInfo = NULL;
882 HardLinkInfo *hlInfoNext = NULL;
885 hlInfo = *hlInfoHeadPtr;
887 hlInfoNext = hlInfo->next;
891 *hlInfoHeadPtr = NULL;
896 /* Might be faster (and bigger) if the dev/ino were stored in numeric order;) */
897 static HardLinkInfo *
898 findHardLinkInfo (HardLinkInfo *hlInfo, dev_t dev, ino_t ino)
901 if ((ino == hlInfo->ino) && (dev == hlInfo->dev))
903 hlInfo = hlInfo->next;
908 /* Put an octal string into the specified buffer.
909 * The number is zero and space padded and possibly null padded.
910 * Returns TRUE if successful. */
911 static int putOctal (char *cp, int len, long value)
915 char *tempString = tempBuffer;
917 /* Create a string of the specified length with an initial space,
918 * leading zeroes and the octal number, and a trailing null. */
919 sprintf (tempString, "%0*lo", len - 1, value);
921 /* If the string is too large, suppress the leading space. */
922 tempLength = strlen (tempString) + 1;
923 if (tempLength > len) {
928 /* If the string is still too large, suppress the trailing null. */
929 if (tempLength > len)
932 /* If the string is still too large, fail. */
933 if (tempLength > len)
936 /* Copy the string to the field. */
937 memcpy (cp, tempString, len);
942 /* Write out a tar header for the specified file/directory/whatever */
944 writeTarHeader(struct TarBallInfo *tbInfo, const char *header_name,
945 const char *real_name, struct stat *statbuf)
948 struct TarHeader header;
949 const unsigned char *cp = (const unsigned char *) &header;
950 ssize_t size = sizeof(struct TarHeader);
952 memset( &header, 0, size);
954 strncpy(header.name, header_name, sizeof(header.name));
956 putOctal(header.mode, sizeof(header.mode), statbuf->st_mode);
957 putOctal(header.uid, sizeof(header.uid), statbuf->st_uid);
958 putOctal(header.gid, sizeof(header.gid), statbuf->st_gid);
959 putOctal(header.size, sizeof(header.size), 0); /* Regular file size is handled later */
960 putOctal(header.mtime, sizeof(header.mtime), statbuf->st_mtime);
961 strncpy(header.magic, TAR_MAGIC TAR_VERSION,
962 TAR_MAGIC_LEN + TAR_VERSION_LEN );
964 /* Enter the user and group names (default to root if it fails) */
965 my_getpwuid(header.uname, statbuf->st_uid);
967 strcpy(header.uname, "root");
968 my_getgrgid(header.gname, statbuf->st_gid);
970 strcpy(header.uname, "root");
972 if (tbInfo->hlInfo) {
973 /* This is a hard link */
974 header.typeflag = LNKTYPE;
975 strncpy(header.linkname, tbInfo->hlInfo->name, sizeof(header.linkname));
976 } else if (S_ISLNK(statbuf->st_mode)) {
979 header.typeflag = SYMTYPE;
980 link_size = readlink(real_name, buffer, sizeof(buffer) - 1);
981 if ( link_size < 0) {
982 perror_msg("Error reading symlink '%s'", header.name);
985 buffer[link_size] = '\0';
986 strncpy(header.linkname, buffer, sizeof(header.linkname));
987 } else if (S_ISDIR(statbuf->st_mode)) {
988 header.typeflag = DIRTYPE;
989 strncat(header.name, "/", sizeof(header.name));
990 } else if (S_ISCHR(statbuf->st_mode)) {
991 header.typeflag = CHRTYPE;
992 putOctal(header.devmajor, sizeof(header.devmajor), MAJOR(statbuf->st_rdev));
993 putOctal(header.devminor, sizeof(header.devminor), MINOR(statbuf->st_rdev));
994 } else if (S_ISBLK(statbuf->st_mode)) {
995 header.typeflag = BLKTYPE;
996 putOctal(header.devmajor, sizeof(header.devmajor), MAJOR(statbuf->st_rdev));
997 putOctal(header.devminor, sizeof(header.devminor), MINOR(statbuf->st_rdev));
998 } else if (S_ISFIFO(statbuf->st_mode)) {
999 header.typeflag = FIFOTYPE;
1000 } else if (S_ISREG(statbuf->st_mode)) {
1001 header.typeflag = REGTYPE;
1002 putOctal(header.size, sizeof(header.size), statbuf->st_size);
1004 error_msg("%s: Unknown file type", real_name);
1008 /* Calculate and store the checksum (i.e. the sum of all of the bytes of
1009 * the header). The checksum field must be filled with blanks for the
1010 * calculation. The checksum field is formatted differently from the
1011 * other fields: it has [6] digits, a null, then a space -- rather than
1012 * digits, followed by a null like the other fields... */
1013 memset(header.chksum, ' ', sizeof(header.chksum));
1014 cp = (const unsigned char *) &header;
1017 putOctal(header.chksum, 7, chksum);
1019 /* Now write the header out to disk */
1020 if ((size=full_write(tbInfo->tarFd, (char*)&header, sizeof(struct TarHeader))) < 0) {
1021 error_msg(io_error, real_name, strerror(errno));
1024 /* Pad the header up to the tar block size */
1025 for (; size<TAR_BLOCK_SIZE; size++) {
1026 write(tbInfo->tarFd, "\0", 1);
1028 /* Now do the verbose thing (or not) */
1029 if (tbInfo->verboseFlag==TRUE) {
1030 FILE *vbFd = stdout;
1031 if (tbInfo->tarFd == fileno(stdout)) // If the archive goes to stdout, verbose to stderr
1033 fprintf(vbFd, "%s\n", header.name);
1040 static int writeFileToTarball(const char *fileName, struct stat *statbuf, void* userData)
1042 struct TarBallInfo *tbInfo = (struct TarBallInfo *)userData;
1043 const char *header_name;
1046 ** Check to see if we are dealing with a hard link.
1048 ** Treat the first occurance of a given dev/inode as a file while
1049 ** treating any additional occurances as hard links. This is done
1050 ** by adding the file information to the HardLinkInfo linked list.
1052 tbInfo->hlInfo = NULL;
1053 if (statbuf->st_nlink > 1) {
1054 tbInfo->hlInfo = findHardLinkInfo(tbInfo->hlInfoHead, statbuf->st_dev,
1056 if (tbInfo->hlInfo == NULL)
1057 addHardLinkInfo (&tbInfo->hlInfoHead, statbuf->st_dev,
1058 statbuf->st_ino, statbuf->st_nlink, fileName);
1061 /* It is against the rules to archive a socket */
1062 if (S_ISSOCK(statbuf->st_mode)) {
1063 error_msg("%s: socket ignored", fileName);
1067 /* It is a bad idea to store the archive we are in the process of creating,
1068 * so check the device and inode to be sure that this particular file isn't
1069 * the new tarball */
1070 if (tbInfo->statBuf.st_dev == statbuf->st_dev &&
1071 tbInfo->statBuf.st_ino == statbuf->st_ino) {
1072 error_msg("%s: file is the archive; skipping", fileName);
1076 header_name = fileName;
1077 while (header_name[0] == '/') {
1078 static int alreadyWarned=FALSE;
1079 if (alreadyWarned==FALSE) {
1080 error_msg("Removing leading '/' from member names");
1086 if (strlen(fileName) >= NAME_SIZE) {
1087 error_msg(name_longer_than_foo, NAME_SIZE);
1091 if (header_name[0] == '\0')
1094 #if defined BB_FEATURE_TAR_EXCLUDE
1095 if (exclude_file(tbInfo->excludeList, header_name)) {
1100 if (writeTarHeader(tbInfo, header_name, fileName, statbuf)==FALSE) {
1104 /* Now, if the file is a regular file, copy it out to the tarball */
1105 if ((tbInfo->hlInfo == NULL)
1106 && (S_ISREG(statbuf->st_mode))) {
1108 char buffer[BUFSIZ];
1109 ssize_t size=0, readSize=0;
1111 /* open the file we want to archive, and make sure all is well */
1112 if ((inputFileFd = open(fileName, O_RDONLY)) < 0) {
1113 error_msg("%s: Cannot open: %s", fileName, strerror(errno));
1117 /* write the file to the archive */
1118 while ( (size = full_read(inputFileFd, buffer, sizeof(buffer))) > 0 ) {
1119 if (full_write(tbInfo->tarFd, buffer, size) != size ) {
1120 /* Output file seems to have a problem */
1121 error_msg(io_error, fileName, strerror(errno));
1127 error_msg(io_error, fileName, strerror(errno));
1130 /* Pad the file up to the tar block size */
1131 for (; (readSize%TAR_BLOCK_SIZE) != 0; readSize++) {
1132 write(tbInfo->tarFd, "\0", 1);
1134 close( inputFileFd);
1140 static int writeTarFile(const char* tarName, int verboseFlag, char **argv,
1144 int errorFlag=FALSE;
1146 struct TarBallInfo tbInfo;
1147 tbInfo.verboseFlag = verboseFlag;
1148 tbInfo.hlInfoHead = NULL;
1150 /* Make sure there is at least one file to tar up. */
1152 error_msg_and_die("Cowardly refusing to create an empty archive");
1154 /* Open the tar file for writing. */
1155 if (!strcmp(tarName, "-"))
1156 tbInfo.tarFd = fileno(stdout);
1158 tbInfo.tarFd = open (tarName, O_WRONLY | O_CREAT | O_TRUNC, 0644);
1159 if (tbInfo.tarFd < 0) {
1160 perror_msg( "Error opening '%s'", tarName);
1161 freeHardLinkInfo(&tbInfo.hlInfoHead);
1164 tbInfo.excludeList=excludeList;
1165 /* Store the stat info for the tarball's file, so
1166 * can avoid including the tarball into itself.... */
1167 if (fstat(tbInfo.tarFd, &tbInfo.statBuf) < 0)
1168 error_msg_and_die(io_error, tarName, strerror(errno));
1170 /* Set the umask for this process so it doesn't
1171 * screw up permission setting for us later. */
1174 /* Read the directory/files and iterate over them one at a time */
1175 while (*argv != NULL) {
1176 if (recursive_action(*argv++, TRUE, FALSE, FALSE,
1177 writeFileToTarball, writeFileToTarball,
1178 (void*) &tbInfo) == FALSE) {
1182 /* Write two empty blocks to the end of the archive */
1183 for (size=0; size<(2*TAR_BLOCK_SIZE); size++) {
1184 write(tbInfo.tarFd, "\0", 1);
1187 /* To be pedantically correct, we would check if the tarball
1188 * is smaller than 20 tar blocks, and pad it if it was smaller,
1189 * but that isn't necessary for GNU tar interoperability, and
1190 * so is considered a waste of space */
1192 /* Hang up the tools, close up shop, head home */
1194 if (errorFlag == TRUE) {
1195 error_msg("Error exit delayed from previous errors");
1196 freeHardLinkInfo(&tbInfo.hlInfoHead);
1199 freeHardLinkInfo(&tbInfo.hlInfoHead);