xref: /aosp_15_r20/external/toybox/toys/posix/file.c (revision cf5a6c84e2b8763fc1a7db14496fd4742913b199)
1*cf5a6c84SAndroid Build Coastguard Worker /* file.c - describe file type
2*cf5a6c84SAndroid Build Coastguard Worker  *
3*cf5a6c84SAndroid Build Coastguard Worker  * Copyright 2016 The Android Open Source Project
4*cf5a6c84SAndroid Build Coastguard Worker  *
5*cf5a6c84SAndroid Build Coastguard Worker  * See http://pubs.opengroup.org/onlinepubs/9699919799/utilities/file.html
6*cf5a6c84SAndroid Build Coastguard Worker 
7*cf5a6c84SAndroid Build Coastguard Worker USE_FILE(NEWTOY(file, "<1b(brief)hLs[!hL]", TOYFLAG_USR|TOYFLAG_BIN))
8*cf5a6c84SAndroid Build Coastguard Worker 
9*cf5a6c84SAndroid Build Coastguard Worker config FILE
10*cf5a6c84SAndroid Build Coastguard Worker   bool "file"
11*cf5a6c84SAndroid Build Coastguard Worker   default y
12*cf5a6c84SAndroid Build Coastguard Worker   help
13*cf5a6c84SAndroid Build Coastguard Worker     usage: file [-bhLs] [FILE...]
14*cf5a6c84SAndroid Build Coastguard Worker 
15*cf5a6c84SAndroid Build Coastguard Worker     Examine the given files and describe their content types.
16*cf5a6c84SAndroid Build Coastguard Worker 
17*cf5a6c84SAndroid Build Coastguard Worker     -b	Brief (no filename)
18*cf5a6c84SAndroid Build Coastguard Worker     -h	Don't follow symlinks (default)
19*cf5a6c84SAndroid Build Coastguard Worker     -L	Follow symlinks
20*cf5a6c84SAndroid Build Coastguard Worker     -s	Show block/char device contents
21*cf5a6c84SAndroid Build Coastguard Worker */
22*cf5a6c84SAndroid Build Coastguard Worker 
23*cf5a6c84SAndroid Build Coastguard Worker #define FOR_file
24*cf5a6c84SAndroid Build Coastguard Worker #include "toys.h"
25*cf5a6c84SAndroid Build Coastguard Worker 
GLOBALS(int max_name_len;off_t len;)26*cf5a6c84SAndroid Build Coastguard Worker GLOBALS(
27*cf5a6c84SAndroid Build Coastguard Worker   int max_name_len;
28*cf5a6c84SAndroid Build Coastguard Worker   off_t len;
29*cf5a6c84SAndroid Build Coastguard Worker )
30*cf5a6c84SAndroid Build Coastguard Worker 
31*cf5a6c84SAndroid Build Coastguard Worker // We don't trust elf.h to be there, and two codepaths for 32/64 is awkward
32*cf5a6c84SAndroid Build Coastguard Worker // anyway, so calculate struct offsets manually. (It's a fixed ABI.)
33*cf5a6c84SAndroid Build Coastguard Worker static void do_elf_file(int fd)
34*cf5a6c84SAndroid Build Coastguard Worker {
35*cf5a6c84SAndroid Build Coastguard Worker   unsigned endian = toybuf[5], bits = toybuf[4]-1, i, j, dynamic = 0,
36*cf5a6c84SAndroid Build Coastguard Worker            stripped = 1, phentsize, phnum, shsize, shnum, bail = 0, arch;
37*cf5a6c84SAndroid Build Coastguard Worker   long long (*elf_int)(void *ptr, unsigned size) = (endian==2)?peek_be:peek_le;
38*cf5a6c84SAndroid Build Coastguard Worker   char *map = MAP_FAILED;
39*cf5a6c84SAndroid Build Coastguard Worker   unsigned long phoff, shoff;
40*cf5a6c84SAndroid Build Coastguard Worker 
41*cf5a6c84SAndroid Build Coastguard Worker   printf("ELF ");
42*cf5a6c84SAndroid Build Coastguard Worker 
43*cf5a6c84SAndroid Build Coastguard Worker   // executable type
44*cf5a6c84SAndroid Build Coastguard Worker   i = elf_int(toybuf+16, 2);
45*cf5a6c84SAndroid Build Coastguard Worker   if (i == 1) printf("relocatable");
46*cf5a6c84SAndroid Build Coastguard Worker   else if (i == 2) printf("executable");
47*cf5a6c84SAndroid Build Coastguard Worker   else if (i == 3) printf("shared object");
48*cf5a6c84SAndroid Build Coastguard Worker   else if (i == 4) printf("core dump");
49*cf5a6c84SAndroid Build Coastguard Worker   else {
50*cf5a6c84SAndroid Build Coastguard Worker     printf("(bad type %d)", i);
51*cf5a6c84SAndroid Build Coastguard Worker     bail++;
52*cf5a6c84SAndroid Build Coastguard Worker   }
53*cf5a6c84SAndroid Build Coastguard Worker   if (elf_int(toybuf+36+12*!!bits, 4) & 0x8000) printf(" (fdpic)");
54*cf5a6c84SAndroid Build Coastguard Worker   printf(", ");
55*cf5a6c84SAndroid Build Coastguard Worker 
56*cf5a6c84SAndroid Build Coastguard Worker   // "64-bit"
57*cf5a6c84SAndroid Build Coastguard Worker   if (bits&~1) {
58*cf5a6c84SAndroid Build Coastguard Worker     printf("(bad class %d) ", bits);
59*cf5a6c84SAndroid Build Coastguard Worker     bail++;
60*cf5a6c84SAndroid Build Coastguard Worker   } else printf("%d-bit ", 32<<bits);
61*cf5a6c84SAndroid Build Coastguard Worker 
62*cf5a6c84SAndroid Build Coastguard Worker   // "LSB"
63*cf5a6c84SAndroid Build Coastguard Worker   if (endian == 1) printf("LSB ");
64*cf5a6c84SAndroid Build Coastguard Worker   else if (endian == 2) printf("MSB ");
65*cf5a6c84SAndroid Build Coastguard Worker   else {
66*cf5a6c84SAndroid Build Coastguard Worker     printf("(bad endian %d) ", endian);
67*cf5a6c84SAndroid Build Coastguard Worker     bail++;
68*cf5a6c84SAndroid Build Coastguard Worker   }
69*cf5a6c84SAndroid Build Coastguard Worker 
70*cf5a6c84SAndroid Build Coastguard Worker   // "x86".
71*cf5a6c84SAndroid Build Coastguard Worker   printf("%s", elf_arch_name(arch = elf_int(toybuf+18, 2)));
72*cf5a6c84SAndroid Build Coastguard Worker 
73*cf5a6c84SAndroid Build Coastguard Worker   // If what we've seen so far doesn't seem consistent, bail.
74*cf5a6c84SAndroid Build Coastguard Worker   if (bail) goto bad;
75*cf5a6c84SAndroid Build Coastguard Worker 
76*cf5a6c84SAndroid Build Coastguard Worker   elf_print_flags(arch, elf_int(toybuf+36+12*bits, 4));
77*cf5a6c84SAndroid Build Coastguard Worker 
78*cf5a6c84SAndroid Build Coastguard Worker   // Stash what we need from the header; it's okay to reuse toybuf after this.
79*cf5a6c84SAndroid Build Coastguard Worker   phentsize = elf_int(toybuf+42+12*bits, 2);
80*cf5a6c84SAndroid Build Coastguard Worker   phnum = elf_int(toybuf+44+12*bits, 2);
81*cf5a6c84SAndroid Build Coastguard Worker   phoff = elf_int(toybuf+28+4*bits, 4+4*bits);
82*cf5a6c84SAndroid Build Coastguard Worker   shsize = elf_int(toybuf+46+12*bits, 2);
83*cf5a6c84SAndroid Build Coastguard Worker   shnum = elf_int(toybuf+48+12*bits, 2);
84*cf5a6c84SAndroid Build Coastguard Worker   shoff = elf_int(toybuf+32+8*bits, 4+4*bits);
85*cf5a6c84SAndroid Build Coastguard Worker 
86*cf5a6c84SAndroid Build Coastguard Worker   // With binutils, phentsize seems to only be non-zero if phnum is non-zero.
87*cf5a6c84SAndroid Build Coastguard Worker   // Such ELF files are rare, but do exist. (Android's crtbegin files, say.)
88*cf5a6c84SAndroid Build Coastguard Worker   if (phnum && (phentsize != 32+24*bits)) {
89*cf5a6c84SAndroid Build Coastguard Worker     printf(", bad phentsize %d?", phentsize);
90*cf5a6c84SAndroid Build Coastguard Worker     goto bad;
91*cf5a6c84SAndroid Build Coastguard Worker   }
92*cf5a6c84SAndroid Build Coastguard Worker   if (phoff>TT.len || phnum*phentsize>TT.len-phoff) {
93*cf5a6c84SAndroid Build Coastguard Worker     printf(", bad phoff %lu?", phoff);
94*cf5a6c84SAndroid Build Coastguard Worker     goto bad;
95*cf5a6c84SAndroid Build Coastguard Worker   }
96*cf5a6c84SAndroid Build Coastguard Worker   if (shoff>TT.len || shnum*shsize>TT.len-shoff) {
97*cf5a6c84SAndroid Build Coastguard Worker     printf(", bad shoff %lu?", phoff);
98*cf5a6c84SAndroid Build Coastguard Worker     goto bad;
99*cf5a6c84SAndroid Build Coastguard Worker   }
100*cf5a6c84SAndroid Build Coastguard Worker 
101*cf5a6c84SAndroid Build Coastguard Worker   // Parsing ELF means following tables that may point to data earlier in
102*cf5a6c84SAndroid Build Coastguard Worker   // the file, so sequential reading involves buffering unknown amounts of
103*cf5a6c84SAndroid Build Coastguard Worker   // data. Just skip it if we can't mmap.
104*cf5a6c84SAndroid Build Coastguard Worker   if (MAP_FAILED == (map = mmap(0, TT.len, PROT_READ, MAP_SHARED, fd, 0))) {
105*cf5a6c84SAndroid Build Coastguard Worker     perror_msg("mmap");
106*cf5a6c84SAndroid Build Coastguard Worker     goto bad;
107*cf5a6c84SAndroid Build Coastguard Worker   }
108*cf5a6c84SAndroid Build Coastguard Worker 
109*cf5a6c84SAndroid Build Coastguard Worker   // Read the phdrs for dynamic vs static. (Note: fields reordered on 64 bit)
110*cf5a6c84SAndroid Build Coastguard Worker   for (i = 0; i<phnum; i++) {
111*cf5a6c84SAndroid Build Coastguard Worker     char *phdr = map+phoff+i*phentsize;
112*cf5a6c84SAndroid Build Coastguard Worker     unsigned p_type = elf_int(phdr, 4);
113*cf5a6c84SAndroid Build Coastguard Worker     unsigned long long p_offset, p_filesz;
114*cf5a6c84SAndroid Build Coastguard Worker 
115*cf5a6c84SAndroid Build Coastguard Worker     // TODO: what does PT_DYNAMIC without PT_INTERP mean?
116*cf5a6c84SAndroid Build Coastguard Worker     if (p_type-2>2) continue; // 2 = PT_DYNAMIC, 3 = PT_INTERP, 4 = PT_NOTE
117*cf5a6c84SAndroid Build Coastguard Worker     dynamic |= p_type==2;
118*cf5a6c84SAndroid Build Coastguard Worker     p_offset = elf_int(phdr+(4<<bits), 4<<bits);
119*cf5a6c84SAndroid Build Coastguard Worker     p_filesz = elf_int(phdr+(16<<bits), 4<<bits);
120*cf5a6c84SAndroid Build Coastguard Worker     if (p_type==3) {
121*cf5a6c84SAndroid Build Coastguard Worker       if (p_filesz>TT.len || p_offset>TT.len-p_filesz) {
122*cf5a6c84SAndroid Build Coastguard Worker         printf(", bad phdr %d?", i);
123*cf5a6c84SAndroid Build Coastguard Worker         goto bad;
124*cf5a6c84SAndroid Build Coastguard Worker       }
125*cf5a6c84SAndroid Build Coastguard Worker       // TODO: if (int)<0 prints endlessly, could go off end of map?
126*cf5a6c84SAndroid Build Coastguard Worker       printf(", dynamic (%.*s)", (int)p_filesz, map+p_offset);
127*cf5a6c84SAndroid Build Coastguard Worker     }
128*cf5a6c84SAndroid Build Coastguard Worker   }
129*cf5a6c84SAndroid Build Coastguard Worker   if (!dynamic) printf(", static");
130*cf5a6c84SAndroid Build Coastguard Worker 
131*cf5a6c84SAndroid Build Coastguard Worker   // We need to read the shdrs for stripped/unstripped and any notes.
132*cf5a6c84SAndroid Build Coastguard Worker   // Notes are in program headers *and* section headers, but some files don't
133*cf5a6c84SAndroid Build Coastguard Worker   // contain program headers, so check here. (Note: fields reordered on 64 bit)
134*cf5a6c84SAndroid Build Coastguard Worker   for (i = 0; i<shnum; i++) {
135*cf5a6c84SAndroid Build Coastguard Worker     char *shdr = map+shoff+i*shsize;
136*cf5a6c84SAndroid Build Coastguard Worker     unsigned long sh_offset;
137*cf5a6c84SAndroid Build Coastguard Worker     int sh_type, sh_size;
138*cf5a6c84SAndroid Build Coastguard Worker 
139*cf5a6c84SAndroid Build Coastguard Worker     if (shdr>map+TT.len-(8+(4<<bits))) {
140*cf5a6c84SAndroid Build Coastguard Worker       printf(", bad shdr %d?", i);
141*cf5a6c84SAndroid Build Coastguard Worker       goto bad;
142*cf5a6c84SAndroid Build Coastguard Worker     }
143*cf5a6c84SAndroid Build Coastguard Worker     sh_type = elf_int(shdr+4, 4);
144*cf5a6c84SAndroid Build Coastguard Worker     sh_offset = elf_int(shdr+8+(8<<bits), 4<<bits);
145*cf5a6c84SAndroid Build Coastguard Worker     sh_size = elf_int(shdr+8+(12<<bits), 4);
146*cf5a6c84SAndroid Build Coastguard Worker     if (sh_type == 8 /*SHT_NOBITS*/) sh_size = 0;
147*cf5a6c84SAndroid Build Coastguard Worker     if (sh_offset>TT.len || sh_size>TT.len-sh_offset) {
148*cf5a6c84SAndroid Build Coastguard Worker       printf(", bad shdr %d?", i);
149*cf5a6c84SAndroid Build Coastguard Worker       goto bad;
150*cf5a6c84SAndroid Build Coastguard Worker     }
151*cf5a6c84SAndroid Build Coastguard Worker 
152*cf5a6c84SAndroid Build Coastguard Worker     if (sh_type == 2 /*SHT_SYMTAB*/) {
153*cf5a6c84SAndroid Build Coastguard Worker       stripped = 0;
154*cf5a6c84SAndroid Build Coastguard Worker       break;
155*cf5a6c84SAndroid Build Coastguard Worker     } else if (sh_type == 7 /*SHT_NOTE*/) {
156*cf5a6c84SAndroid Build Coastguard Worker       char *note = map+sh_offset;
157*cf5a6c84SAndroid Build Coastguard Worker 
158*cf5a6c84SAndroid Build Coastguard Worker       // An ELF note is a sequence of entries, each consisting of an
159*cf5a6c84SAndroid Build Coastguard Worker       // ndhr followed by n_namesz+n_descsz bytes of data (each of those
160*cf5a6c84SAndroid Build Coastguard Worker       // rounded up to the next 4 bytes, without this being reflected in
161*cf5a6c84SAndroid Build Coastguard Worker       // the header byte counts themselves).
162*cf5a6c84SAndroid Build Coastguard Worker       while (sh_size >= 3*4) { // Don't try to read a truncated entry.
163*cf5a6c84SAndroid Build Coastguard Worker         unsigned n_namesz, n_descsz, n_type, notesz;
164*cf5a6c84SAndroid Build Coastguard Worker 
165*cf5a6c84SAndroid Build Coastguard Worker         if (note>map+TT.len-3*4) {
166*cf5a6c84SAndroid Build Coastguard Worker           printf(", bad note %d?", i);
167*cf5a6c84SAndroid Build Coastguard Worker           goto bad;
168*cf5a6c84SAndroid Build Coastguard Worker         }
169*cf5a6c84SAndroid Build Coastguard Worker 
170*cf5a6c84SAndroid Build Coastguard Worker         n_namesz = elf_int(note, 4);
171*cf5a6c84SAndroid Build Coastguard Worker         n_descsz = elf_int(note+4, 4);
172*cf5a6c84SAndroid Build Coastguard Worker         n_type = elf_int(note+8, 4);
173*cf5a6c84SAndroid Build Coastguard Worker         notesz = 3*4 + ((n_namesz+3)&~3) + ((n_descsz+3)&~3);
174*cf5a6c84SAndroid Build Coastguard Worker 
175*cf5a6c84SAndroid Build Coastguard Worker         // Are the name/desc sizes consistent, and does the claimed size of
176*cf5a6c84SAndroid Build Coastguard Worker         // the note actually fit in the section?
177*cf5a6c84SAndroid Build Coastguard Worker         if (notesz<n_namesz || notesz<n_descsz || notesz>sh_size) {
178*cf5a6c84SAndroid Build Coastguard Worker           printf(", bad note %d size?", i);
179*cf5a6c84SAndroid Build Coastguard Worker           goto bad;
180*cf5a6c84SAndroid Build Coastguard Worker         }
181*cf5a6c84SAndroid Build Coastguard Worker 
182*cf5a6c84SAndroid Build Coastguard Worker         if (n_namesz==4 && !smemcmp(note+12, "GNU", 4) && n_type==3) {
183*cf5a6c84SAndroid Build Coastguard Worker           printf(", BuildID=");
184*cf5a6c84SAndroid Build Coastguard Worker           for (j = 0; j<n_descsz; j++) printf("%02x", note[16+j]);
185*cf5a6c84SAndroid Build Coastguard Worker         } else if (n_namesz==8 && !smemcmp(note+12, "Android", 8)) {
186*cf5a6c84SAndroid Build Coastguard Worker           if (n_type==1 /*.android.note.ident*/ && n_descsz >= 4) {
187*cf5a6c84SAndroid Build Coastguard Worker             printf(", for Android %d", (int)elf_int(note+20, 4));
188*cf5a6c84SAndroid Build Coastguard Worker             // NDK r14 and later also include NDK version info. OS binaries
189*cf5a6c84SAndroid Build Coastguard Worker             // and binaries built by older NDKs don't have this.
190*cf5a6c84SAndroid Build Coastguard Worker             if (n_descsz >= 4+64+64)
191*cf5a6c84SAndroid Build Coastguard Worker               printf(", built by NDK %.64s (%.64s)", note+24, note+24+64);
192*cf5a6c84SAndroid Build Coastguard Worker           }
193*cf5a6c84SAndroid Build Coastguard Worker         }
194*cf5a6c84SAndroid Build Coastguard Worker 
195*cf5a6c84SAndroid Build Coastguard Worker         note += notesz;
196*cf5a6c84SAndroid Build Coastguard Worker         sh_size -= notesz;
197*cf5a6c84SAndroid Build Coastguard Worker       }
198*cf5a6c84SAndroid Build Coastguard Worker     }
199*cf5a6c84SAndroid Build Coastguard Worker   }
200*cf5a6c84SAndroid Build Coastguard Worker   printf(", %sstripped", stripped ? "" : "not ");
201*cf5a6c84SAndroid Build Coastguard Worker bad:
202*cf5a6c84SAndroid Build Coastguard Worker   xputc('\n');
203*cf5a6c84SAndroid Build Coastguard Worker 
204*cf5a6c84SAndroid Build Coastguard Worker   if (map != MAP_FAILED) munmap(map, TT.len);
205*cf5a6c84SAndroid Build Coastguard Worker }
206*cf5a6c84SAndroid Build Coastguard Worker 
do_regular_file(int fd,char * name)207*cf5a6c84SAndroid Build Coastguard Worker static void do_regular_file(int fd, char *name)
208*cf5a6c84SAndroid Build Coastguard Worker {
209*cf5a6c84SAndroid Build Coastguard Worker   char *s = toybuf;
210*cf5a6c84SAndroid Build Coastguard Worker   unsigned len, magic;
211*cf5a6c84SAndroid Build Coastguard Worker   int ii;
212*cf5a6c84SAndroid Build Coastguard Worker 
213*cf5a6c84SAndroid Build Coastguard Worker   // zero through elf shnum, just in case
214*cf5a6c84SAndroid Build Coastguard Worker   memset(s, 0, 80);
215*cf5a6c84SAndroid Build Coastguard Worker   if ((len = readall(fd, s, sizeof(toybuf)-8))<0) perror_msg_raw(name);
216*cf5a6c84SAndroid Build Coastguard Worker 
217*cf5a6c84SAndroid Build Coastguard Worker   if (!len) xputs("empty");
218*cf5a6c84SAndroid Build Coastguard Worker   // 45 bytes: https://www.muppetlabs.com/~breadbox/software/tiny/teensy.html
219*cf5a6c84SAndroid Build Coastguard Worker   else if (len>=45 && strstart(&s, "\177ELF")) do_elf_file(fd);
220*cf5a6c84SAndroid Build Coastguard Worker   else if (strstart(&s, "!<arch>\n")) xputs("ar archive");
221*cf5a6c84SAndroid Build Coastguard Worker   else if (*s=='%' && 2==sscanf(s, "%%PDF%d.%u", &ii, &magic))
222*cf5a6c84SAndroid Build Coastguard Worker     xprintf("PDF document, version %d.%u\n", -ii, magic);
223*cf5a6c84SAndroid Build Coastguard Worker   else if (len>28 && strstart(&s, "\x89PNG\x0d\x0a\x1a\x0a")) {
224*cf5a6c84SAndroid Build Coastguard Worker     // PNG is big-endian: https://www.w3.org/TR/PNG/#7Integers-and-byte-order
225*cf5a6c84SAndroid Build Coastguard Worker     int chunk_length = peek_be(s, 4);
226*cf5a6c84SAndroid Build Coastguard Worker 
227*cf5a6c84SAndroid Build Coastguard Worker     xprintf("PNG image data");
228*cf5a6c84SAndroid Build Coastguard Worker 
229*cf5a6c84SAndroid Build Coastguard Worker     // The IHDR chunk comes first: https://www.w3.org/TR/PNG/#11IHDR
230*cf5a6c84SAndroid Build Coastguard Worker     s += 4;
231*cf5a6c84SAndroid Build Coastguard Worker     if (chunk_length == 13 && strstart(&s, "IHDR")) {
232*cf5a6c84SAndroid Build Coastguard Worker       // https://www.w3.org/TR/PNG/#6Colour-values
233*cf5a6c84SAndroid Build Coastguard Worker       char *c = 0, *colors[] = {"grayscale", 0, "color RGB", "indexed color",
234*cf5a6c84SAndroid Build Coastguard Worker                                 "grayscale with alpha", 0, "color RGBA"};
235*cf5a6c84SAndroid Build Coastguard Worker 
236*cf5a6c84SAndroid Build Coastguard Worker       if (s[9]<ARRAY_LEN(colors)) c = colors[s[9]];
237*cf5a6c84SAndroid Build Coastguard Worker       xprintf(", %d x %d, %d-bit/%s, %sinterlaced", (int)peek_be(s, 4),
238*cf5a6c84SAndroid Build Coastguard Worker         (int)peek_be(s+4, 4), s[8], c ? : "unknown", s[12] ? "" : "non-");
239*cf5a6c84SAndroid Build Coastguard Worker     }
240*cf5a6c84SAndroid Build Coastguard Worker 
241*cf5a6c84SAndroid Build Coastguard Worker     xputc('\n');
242*cf5a6c84SAndroid Build Coastguard Worker 
243*cf5a6c84SAndroid Build Coastguard Worker   // https://www.w3.org/Graphics/GIF/spec-gif89a.txt
244*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>16 && (strstart(&s, "GIF87a") || strstart(&s, "GIF89a")))
245*cf5a6c84SAndroid Build Coastguard Worker     xprintf("GIF image data, version %3.3s, %d x %d\n",
246*cf5a6c84SAndroid Build Coastguard Worker       s-3, (int)peek_le(s, 2), (int)peek_le(s+2, 2));
247*cf5a6c84SAndroid Build Coastguard Worker 
248*cf5a6c84SAndroid Build Coastguard Worker   // https://en.wikipedia.org/wiki/JPEG#Syntax_and_structure
249*cf5a6c84SAndroid Build Coastguard Worker   else if (len>32 && !smemcmp(s, "\xff\xd8", 2)) {
250*cf5a6c84SAndroid Build Coastguard Worker     char *types[] = {"baseline", "extended sequential", "progressive"};
251*cf5a6c84SAndroid Build Coastguard Worker     int marker;
252*cf5a6c84SAndroid Build Coastguard Worker 
253*cf5a6c84SAndroid Build Coastguard Worker     printf("JPEG image data");
254*cf5a6c84SAndroid Build Coastguard Worker     while (s < toybuf+len-8) { // TODO: refill for files with lots of EXIF data?
255*cf5a6c84SAndroid Build Coastguard Worker       marker = peek_be(s, 2);
256*cf5a6c84SAndroid Build Coastguard Worker       if (marker >= 0xffd0 && marker <= 0xffd9) s += 2; // No data.
257*cf5a6c84SAndroid Build Coastguard Worker       else if (marker >= 0xffc0 && marker <= 0xffc2) {
258*cf5a6c84SAndroid Build Coastguard Worker         xprintf(", %s, %dx%d", types[marker-0xffc0], (int) peek_be(s+7, 2),
259*cf5a6c84SAndroid Build Coastguard Worker                 (int) peek_be(s+5, 2));
260*cf5a6c84SAndroid Build Coastguard Worker         break;
261*cf5a6c84SAndroid Build Coastguard Worker       } else s += peek_be(s + 2, 2) + 2;
262*cf5a6c84SAndroid Build Coastguard Worker     }
263*cf5a6c84SAndroid Build Coastguard Worker     xputc('\n');
264*cf5a6c84SAndroid Build Coastguard Worker 
265*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>8 && strstart(&s, "\xca\xfe\xba\xbe")) {
266*cf5a6c84SAndroid Build Coastguard Worker     unsigned count = peek_be(s, 4), i, arch;
267*cf5a6c84SAndroid Build Coastguard Worker 
268*cf5a6c84SAndroid Build Coastguard Worker     // 0xcafebabe can be a Java class file or a Mach-O universal binary.
269*cf5a6c84SAndroid Build Coastguard Worker     // Java major version numbers start with 0x2d for JDK 1.1, and realistically
270*cf5a6c84SAndroid Build Coastguard Worker     // you're never going to see more than 2 architectures in a binary anyway...
271*cf5a6c84SAndroid Build Coastguard Worker     if (count<0x2d && len>=(count*20)) {
272*cf5a6c84SAndroid Build Coastguard Worker       // https://eclecticlight.co/2020/07/28/universal-binaries-inside-fat-headers/
273*cf5a6c84SAndroid Build Coastguard Worker       xprintf("Mach-O universal binary with %u architecture%s:",
274*cf5a6c84SAndroid Build Coastguard Worker         count, count == 1 ? "" : "s");
275*cf5a6c84SAndroid Build Coastguard Worker       for (i = 0, s += 4; i < count; i++, s += 20) {
276*cf5a6c84SAndroid Build Coastguard Worker         arch = peek_be(s, 4);
277*cf5a6c84SAndroid Build Coastguard Worker         if (arch == 0x00000007) name = "i386";
278*cf5a6c84SAndroid Build Coastguard Worker         else if (arch == 0x01000007) name = "x86_64";
279*cf5a6c84SAndroid Build Coastguard Worker         else if (arch == 0x0000000c) name = "arm";
280*cf5a6c84SAndroid Build Coastguard Worker         else if (arch == 0x0100000c) name = "arm64";
281*cf5a6c84SAndroid Build Coastguard Worker         else name = "unknown";
282*cf5a6c84SAndroid Build Coastguard Worker         xprintf(" [%s]", name);
283*cf5a6c84SAndroid Build Coastguard Worker       }
284*cf5a6c84SAndroid Build Coastguard Worker       xprintf("\n");
285*cf5a6c84SAndroid Build Coastguard Worker     } else {
286*cf5a6c84SAndroid Build Coastguard Worker       // https://en.wikipedia.org/wiki/Java_class_file#General_layout
287*cf5a6c84SAndroid Build Coastguard Worker       xprintf("Java class file, version %d.%d (Java 1.%d)\n",
288*cf5a6c84SAndroid Build Coastguard Worker         (int)peek_be(s+2, 2), (int)peek_be(s, 2), (int)peek_be(s+2, 2)-44);
289*cf5a6c84SAndroid Build Coastguard Worker     }
290*cf5a6c84SAndroid Build Coastguard Worker 
291*cf5a6c84SAndroid Build Coastguard Worker   // https://source.android.com/devices/tech/dalvik/dex-format#dex-file-magic
292*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>8 && strstart(&s, "dex\n") && !s[3])
293*cf5a6c84SAndroid Build Coastguard Worker     xprintf("Android dex file, version %s\n", s);
294*cf5a6c84SAndroid Build Coastguard Worker 
295*cf5a6c84SAndroid Build Coastguard Worker   // https://people.freebsd.org/~kientzle/libarchive/man/cpio.5.txt
296*cf5a6c84SAndroid Build Coastguard Worker   // the lengths for cpio are size of header + 9 bytes, since any valid
297*cf5a6c84SAndroid Build Coastguard Worker   // cpio archive ends with a record for "TARGET!!!"
298*cf5a6c84SAndroid Build Coastguard Worker   else if (len>6 && strstart(&s, "07070")) {
299*cf5a6c84SAndroid Build Coastguard Worker     char *cpioformat = "unknown type";
300*cf5a6c84SAndroid Build Coastguard Worker 
301*cf5a6c84SAndroid Build Coastguard Worker     if (*s == '7') cpioformat = "pre-SVR4 or odc";
302*cf5a6c84SAndroid Build Coastguard Worker     else if (*s == '1') cpioformat = "SVR4 with no CRC";
303*cf5a6c84SAndroid Build Coastguard Worker     else if (*s == '2') cpioformat = "SVR4 with CRC";
304*cf5a6c84SAndroid Build Coastguard Worker     xprintf("ASCII cpio archive (%s)\n", cpioformat);
305*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>33 && ((magic=peek(&s,2))==0143561 || magic==070707)) {
306*cf5a6c84SAndroid Build Coastguard Worker     if (magic == 0143561) printf("byte-swapped ");
307*cf5a6c84SAndroid Build Coastguard Worker     xputs("cpio archive");
308*cf5a6c84SAndroid Build Coastguard Worker   // tar archive (old, ustar/pax, or gnu)
309*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>500 && is_tar_header(s))
310*cf5a6c84SAndroid Build Coastguard Worker     xprintf("%s tar archive%s\n", s[257] ? "POSIX" : "old",
311*cf5a6c84SAndroid Build Coastguard Worker       (s[262]!=' ' || s[263]!=' ')?"":" (GNU)");
312*cf5a6c84SAndroid Build Coastguard Worker   // zip/jar/apk archive, ODF/OOXML document, or such
313*cf5a6c84SAndroid Build Coastguard Worker   else if (len>5 && strstart(&s, "PK\03\04")) {
314*cf5a6c84SAndroid Build Coastguard Worker     xprintf("Zip archive data");
315*cf5a6c84SAndroid Build Coastguard Worker     if (*s) xprintf(", requires at least v%d.%d to extract", *s/10, *s%10);
316*cf5a6c84SAndroid Build Coastguard Worker     xputc('\n');
317*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>9 && strstart(&s, "7z\xbc\xaf\x27\x1c")) {
318*cf5a6c84SAndroid Build Coastguard Worker     xprintf("7-zip archive data");
319*cf5a6c84SAndroid Build Coastguard Worker     if (*s || s[1]) xprintf(", version %d.%d", *s, s[1]);
320*cf5a6c84SAndroid Build Coastguard Worker     xputc('\n');
321*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>4 && strstart(&s, "BZh") && isdigit(*s))
322*cf5a6c84SAndroid Build Coastguard Worker     xprintf("bzip2 compressed data, block size = %c00k\n", *s);
323*cf5a6c84SAndroid Build Coastguard Worker   else if (len>31 && peek_be(s, 7) == 0xfd377a585a0000ULL)
324*cf5a6c84SAndroid Build Coastguard Worker     xputs("xz compressed data");
325*cf5a6c84SAndroid Build Coastguard Worker   else if (len>10 && strstart(&s, "\x1f\x8b")) xputs("gzip compressed data");
326*cf5a6c84SAndroid Build Coastguard Worker   else if (len>32 && !smemcmp(s+1, "\xfa\xed\xfe", 3)) {
327*cf5a6c84SAndroid Build Coastguard Worker     int bit = (*s==0xce) ? 32 : 64;
328*cf5a6c84SAndroid Build Coastguard Worker     char *what = 0;
329*cf5a6c84SAndroid Build Coastguard Worker 
330*cf5a6c84SAndroid Build Coastguard Worker     xprintf("Mach-O %d-bit ", bit);
331*cf5a6c84SAndroid Build Coastguard Worker 
332*cf5a6c84SAndroid Build Coastguard Worker     if (s[4] == 7) what = (bit==32)?"x86":"x86-";
333*cf5a6c84SAndroid Build Coastguard Worker     else if (s[4] == 12) what = "arm";
334*cf5a6c84SAndroid Build Coastguard Worker     else if (s[4] == 18) what = "ppc";
335*cf5a6c84SAndroid Build Coastguard Worker     if (what) xprintf("%s%s ", what, (bit==32)?"":"64");
336*cf5a6c84SAndroid Build Coastguard Worker     else xprintf("(bad arch %d) ", s[4]);
337*cf5a6c84SAndroid Build Coastguard Worker 
338*cf5a6c84SAndroid Build Coastguard Worker     if (s[12] == 1) what = "object";
339*cf5a6c84SAndroid Build Coastguard Worker     else if (s[12] == 2) what = "executable";
340*cf5a6c84SAndroid Build Coastguard Worker     else if (s[12] == 6) what = "shared library";
341*cf5a6c84SAndroid Build Coastguard Worker     else what = NULL;
342*cf5a6c84SAndroid Build Coastguard Worker     if (what) xprintf("%s\n", what);
343*cf5a6c84SAndroid Build Coastguard Worker     else xprintf("(bad type %d)\n", s[9]);
344*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>36 && !smemcmp(s, "OggS\x00\x02", 6)) {
345*cf5a6c84SAndroid Build Coastguard Worker     xprintf("Ogg data");
346*cf5a6c84SAndroid Build Coastguard Worker     // https://wiki.xiph.org/MIMETypesCodecs
347*cf5a6c84SAndroid Build Coastguard Worker     if (!smemcmp(s+28, "CELT    ", 8)) xprintf(", celt audio");
348*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "CMML    ", 8)) xprintf(", cmml text");
349*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "BBCD", 5)) xprintf(", dirac video");
350*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "\177FLAC", 5)) xprintf(", flac audio");
351*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "\x8bJNG\r\n\x1a\n", 8)) xprintf(", jng video");
352*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "\x80kate\0\0", 8)) xprintf(", kate text");
353*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "OggMIDI", 8)) xprintf(", midi text");
354*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "\x8aMNG\r\n\x1a\n", 8)) xprintf(", mng video");
355*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "OpusHead", 8)) xprintf(", opus audio");
356*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "PCM     ", 8)) xprintf(", pcm audio");
357*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "\x89PNG\r\n\x1a\n", 8)) xprintf(", png video");
358*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "Speex   ", 8)) xprintf(", speex audio");
359*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "\x80theora", 7)) xprintf(", theora video");
360*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "\x01vorbis", 7)) xprintf(", vorbis audio");
361*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+28, "YUV4MPEG", 8)) xprintf(", yuv4mpeg video");
362*cf5a6c84SAndroid Build Coastguard Worker     xputc('\n');
363*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>32 && !smemcmp(s, "RIF", 3) && !smemcmp(s+8, "WAVEfmt ", 8)) {
364*cf5a6c84SAndroid Build Coastguard Worker     // https://en.wikipedia.org/wiki/WAV
365*cf5a6c84SAndroid Build Coastguard Worker     int le = (s[3] == 'F');
366*cf5a6c84SAndroid Build Coastguard Worker     int format = le ? peek_le(s+20, 2) : peek_be(s+20, 2);
367*cf5a6c84SAndroid Build Coastguard Worker     int channels = le ? peek_le(s+22, 2) : peek_be(s+22, 2);
368*cf5a6c84SAndroid Build Coastguard Worker     int hz = le ? peek_le(s+24, 4) : peek_be(s+24, 4);
369*cf5a6c84SAndroid Build Coastguard Worker     int bits = le ? peek_le(s+34, 2) : peek_be(s+34, 2);
370*cf5a6c84SAndroid Build Coastguard Worker 
371*cf5a6c84SAndroid Build Coastguard Worker     xprintf("WAV audio, %s, ", le ? "LE" : "BE");
372*cf5a6c84SAndroid Build Coastguard Worker     if (bits) xprintf("%d-bit, ", bits);
373*cf5a6c84SAndroid Build Coastguard Worker     if (channels==1||channels==2) xprintf("%s, ",(channels==1)?"mono":"stereo");
374*cf5a6c84SAndroid Build Coastguard Worker     else xprintf("%d-channel, ", channels);
375*cf5a6c84SAndroid Build Coastguard Worker     xprintf("%d Hz, ", hz);
376*cf5a6c84SAndroid Build Coastguard Worker     // See https://tools.ietf.org/html/rfc2361, though there appear to be bugs
377*cf5a6c84SAndroid Build Coastguard Worker     // in the RFC. This assumes wikipedia's example files are more correct.
378*cf5a6c84SAndroid Build Coastguard Worker     if (format == 0x01) xprintf("PCM");
379*cf5a6c84SAndroid Build Coastguard Worker     else if (format == 0x03) xprintf("IEEE float");
380*cf5a6c84SAndroid Build Coastguard Worker     else if (format == 0x06) xprintf("A-law");
381*cf5a6c84SAndroid Build Coastguard Worker     else if (format == 0x07) xprintf("µ-law");
382*cf5a6c84SAndroid Build Coastguard Worker     else if (format == 0x11) xprintf("ADPCM");
383*cf5a6c84SAndroid Build Coastguard Worker     else if (format == 0x22) xprintf("Truespeech");
384*cf5a6c84SAndroid Build Coastguard Worker     else if (format == 0x31) xprintf("GSM");
385*cf5a6c84SAndroid Build Coastguard Worker     else if (format == 0x55) xprintf("MP3");
386*cf5a6c84SAndroid Build Coastguard Worker     else if (format == 0x70) xprintf("CELP");
387*cf5a6c84SAndroid Build Coastguard Worker     else if (format == 0xfffe) xprintf("extensible");
388*cf5a6c84SAndroid Build Coastguard Worker     else xprintf("unknown format %d", format);
389*cf5a6c84SAndroid Build Coastguard Worker     xputc('\n');
390*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>12 && peek_be(s, 4)==0x10000) xputs("TrueType font");
391*cf5a6c84SAndroid Build Coastguard Worker   else if (len>12 && !smemcmp(s, "ttcf", 5)) {
392*cf5a6c84SAndroid Build Coastguard Worker     xprintf("TrueType font collection, version %d, %d fonts\n",
393*cf5a6c84SAndroid Build Coastguard Worker             (int)peek_be(s+4, 2), (int)peek_be(s+8, 4));
394*cf5a6c84SAndroid Build Coastguard Worker 
395*cf5a6c84SAndroid Build Coastguard Worker   // https://docs.microsoft.com/en-us/typography/opentype/spec/otff
396*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>12 && strstart(&s, "OTTO")) xputs("OpenType font");
397*cf5a6c84SAndroid Build Coastguard Worker   else if (strstart(&s, "BC\xc0\xde")) xputs("LLVM IR bitcode");
398*cf5a6c84SAndroid Build Coastguard Worker   else if (strstart(&s,"-----BEGIN CERTIFICATE-----")) xputs("PEM certificate");
399*cf5a6c84SAndroid Build Coastguard Worker 
400*cf5a6c84SAndroid Build Coastguard Worker   // https://msdn.microsoft.com/en-us/library/windows/desktop/ms680547(v=vs.85).aspx
401*cf5a6c84SAndroid Build Coastguard Worker   else if (len>0x70 && !smemcmp(s, "MZ", 2) &&
402*cf5a6c84SAndroid Build Coastguard Worker       (magic=peek_le(s+0x3c,4))<len-4 && !smemcmp(s+magic, "\x50\x45\0", 4)) {
403*cf5a6c84SAndroid Build Coastguard Worker 
404*cf5a6c84SAndroid Build Coastguard Worker     // Linux kernel images look like PE files.
405*cf5a6c84SAndroid Build Coastguard Worker     // https://www.kernel.org/doc/Documentation/arm64/booting.txt
406*cf5a6c84SAndroid Build Coastguard Worker     // I've only ever seen LE, 4KiB pages, so ignore flags for now.
407*cf5a6c84SAndroid Build Coastguard Worker     if (!smemcmp(s+0x38, "ARMd", 4)) return xputs("Linux arm64 kernel image");
408*cf5a6c84SAndroid Build Coastguard Worker     else if (!smemcmp(s+0x202, "HdrS", 4)) {
409*cf5a6c84SAndroid Build Coastguard Worker       // https://www.kernel.org/doc/Documentation/x86/boot.txt
410*cf5a6c84SAndroid Build Coastguard Worker       unsigned ver_off = peek_le(s+0x20e, 2);
411*cf5a6c84SAndroid Build Coastguard Worker 
412*cf5a6c84SAndroid Build Coastguard Worker       xprintf("Linux x86-64 kernel image");
413*cf5a6c84SAndroid Build Coastguard Worker       if ((0x200 + ver_off) < len) {
414*cf5a6c84SAndroid Build Coastguard Worker         s += 0x200 + ver_off;
415*cf5a6c84SAndroid Build Coastguard Worker       } else {
416*cf5a6c84SAndroid Build Coastguard Worker         if (lseek(fd, ver_off - len + 0x200, SEEK_CUR)<0 ||
417*cf5a6c84SAndroid Build Coastguard Worker             (len = readall(fd, s, sizeof(toybuf)))<0)
418*cf5a6c84SAndroid Build Coastguard Worker           return perror_msg_raw(name);
419*cf5a6c84SAndroid Build Coastguard Worker       }
420*cf5a6c84SAndroid Build Coastguard Worker       xprintf(", version %s\n", s);
421*cf5a6c84SAndroid Build Coastguard Worker       return;
422*cf5a6c84SAndroid Build Coastguard Worker     }
423*cf5a6c84SAndroid Build Coastguard Worker 
424*cf5a6c84SAndroid Build Coastguard Worker     xprintf("MS PE32%s executable %s", (peek_le(s+magic+24, 2)==0x20b)?"+":"",
425*cf5a6c84SAndroid Build Coastguard Worker         (peek_le(s+magic+22, 2)&0x2000)?"(DLL) ":"");
426*cf5a6c84SAndroid Build Coastguard Worker     if (peek_le(s+magic+20, 2)>70) {
427*cf5a6c84SAndroid Build Coastguard Worker       char *types[] = {0, "native", "GUI", "console", "OS/2", "driver", "CE",
428*cf5a6c84SAndroid Build Coastguard Worker           "EFI", "EFI boot", "EFI runtime", "EFI ROM", "XBOX", 0, "boot"}, *nn;
429*cf5a6c84SAndroid Build Coastguard Worker       unsigned type = peek_le(s+magic+92, 2);
430*cf5a6c84SAndroid Build Coastguard Worker 
431*cf5a6c84SAndroid Build Coastguard Worker       nn = (type<ARRAY_LEN(types)) ? types[type] : 0;
432*cf5a6c84SAndroid Build Coastguard Worker       xprintf("(%s) ", nn ? : "unknown");
433*cf5a6c84SAndroid Build Coastguard Worker     }
434*cf5a6c84SAndroid Build Coastguard Worker     xprintf("x86%s\n", (peek_le(s+magic+4, 2)==0x14c) ? "" : "-64");
435*cf5a6c84SAndroid Build Coastguard Worker 
436*cf5a6c84SAndroid Build Coastguard Worker     // https://en.wikipedia.org/wiki/BMP_file_format
437*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>0x32 && !smemcmp(s, "BM", 2) && !peek_be(s+6, 4)) {
438*cf5a6c84SAndroid Build Coastguard Worker     xprintf("BMP image, %d x %d, %d bpp\n", (int)peek_le(s+18, 4),
439*cf5a6c84SAndroid Build Coastguard Worker             (int)peek_le(s+22,4), (int)peek_le(s+28, 2));
440*cf5a6c84SAndroid Build Coastguard Worker 
441*cf5a6c84SAndroid Build Coastguard Worker     // https://github.com/torvalds/linux/blob/master/tools/perf/Documentation/perf.data-file-format.txt
442*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>=104 && strstart(&s, "PERFILE2")) xputs("Linux perf data");
443*cf5a6c84SAndroid Build Coastguard Worker 
444*cf5a6c84SAndroid Build Coastguard Worker     // https://android.googlesource.com/platform/system/core/+/master/libsparse/sparse_format.h
445*cf5a6c84SAndroid Build Coastguard Worker   else if (len>28 && peek_le(s, 4) == 0xed26ff3a) {
446*cf5a6c84SAndroid Build Coastguard Worker     xprintf("Android sparse image v%d.%d, %d %d-byte blocks (%d chunks)\n",
447*cf5a6c84SAndroid Build Coastguard Worker         (int)peek_le(s+4, 2), (int)peek_le(s+6, 2), (int)peek_le(s+16, 4),
448*cf5a6c84SAndroid Build Coastguard Worker         (int)peek_le(s+12, 4), (int)peek_le(s+20, 4));
449*cf5a6c84SAndroid Build Coastguard Worker 
450*cf5a6c84SAndroid Build Coastguard Worker     // https://android.googlesource.com/platform/system/tools/mkbootimg/+/refs/heads/master/include/bootimg/bootimg.h
451*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>1632 && !smemcmp(s, "ANDROID!", 8)) {
452*cf5a6c84SAndroid Build Coastguard Worker     xprintf("Android boot image v%d\n", (int)peek_le(s+40, 4));
453*cf5a6c84SAndroid Build Coastguard Worker 
454*cf5a6c84SAndroid Build Coastguard Worker     // https://source.android.com/devices/architecture/dto/partitions
455*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>32 && peek_be(s, 4) == 0xd7b7ab1e) {
456*cf5a6c84SAndroid Build Coastguard Worker     xprintf("Android DTB/DTBO v%d, %d entries\n", (int)peek_be(s+28, 4),
457*cf5a6c84SAndroid Build Coastguard Worker             (int)peek_be(s+16, 4));
458*cf5a6c84SAndroid Build Coastguard Worker 
459*cf5a6c84SAndroid Build Coastguard Worker     // frameworks/base/core/java/com/android/internal/util/BinaryXmlSerializer.java
460*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>4 && !smemcmp(s, "ABX", 3)) {
461*cf5a6c84SAndroid Build Coastguard Worker     xprintf("Android Binary XML v%d\n", s[3]);
462*cf5a6c84SAndroid Build Coastguard Worker 
463*cf5a6c84SAndroid Build Coastguard Worker     // https://webassembly.github.io/spec/core/binary/modules.html#binary-module
464*cf5a6c84SAndroid Build Coastguard Worker   } else if (len>8 && !smemcmp(s, "\0asm", 4)) {
465*cf5a6c84SAndroid Build Coastguard Worker     xprintf("wasm binary module version %d\n", (int)peek_le(s+4, 4));
466*cf5a6c84SAndroid Build Coastguard Worker 
467*cf5a6c84SAndroid Build Coastguard Worker     // Text files, including shell scripts.
468*cf5a6c84SAndroid Build Coastguard Worker   } else {
469*cf5a6c84SAndroid Build Coastguard Worker     char *what = 0;
470*cf5a6c84SAndroid Build Coastguard Worker     int i, bytes;
471*cf5a6c84SAndroid Build Coastguard Worker 
472*cf5a6c84SAndroid Build Coastguard Worker     // If shell script, report which interpreter
473*cf5a6c84SAndroid Build Coastguard Worker     if (len>3 && strstart(&s, "#!")) {
474*cf5a6c84SAndroid Build Coastguard Worker       // Whitespace is allowed between the #! and the interpreter
475*cf5a6c84SAndroid Build Coastguard Worker       while (isspace(*s)) s++;
476*cf5a6c84SAndroid Build Coastguard Worker       if (strstart(&s, "/usr/bin/env")) while (isspace(*s)) s++;
477*cf5a6c84SAndroid Build Coastguard Worker       for (what = s; *s && !isspace(*s); s++);
478*cf5a6c84SAndroid Build Coastguard Worker       strcpy(s, " script");
479*cf5a6c84SAndroid Build Coastguard Worker 
480*cf5a6c84SAndroid Build Coastguard Worker     // Distinguish ASCII text, UTF-8 text, or data
481*cf5a6c84SAndroid Build Coastguard Worker     } else for (i = 0; i<len; ++i) {
482*cf5a6c84SAndroid Build Coastguard Worker       if (!(isprint(s[i]) || isspace(s[i]))) {
483*cf5a6c84SAndroid Build Coastguard Worker         unsigned wc;
484*cf5a6c84SAndroid Build Coastguard Worker 
485*cf5a6c84SAndroid Build Coastguard Worker         if ((bytes = utf8towc(&wc, s+i, len-i))>0 && wcwidth(wc)>=0) {
486*cf5a6c84SAndroid Build Coastguard Worker           i += bytes-1;
487*cf5a6c84SAndroid Build Coastguard Worker           if (!what) what = "UTF-8 text";
488*cf5a6c84SAndroid Build Coastguard Worker         } else {
489*cf5a6c84SAndroid Build Coastguard Worker           what = "data";
490*cf5a6c84SAndroid Build Coastguard Worker           break;
491*cf5a6c84SAndroid Build Coastguard Worker         }
492*cf5a6c84SAndroid Build Coastguard Worker       }
493*cf5a6c84SAndroid Build Coastguard Worker     }
494*cf5a6c84SAndroid Build Coastguard Worker     xputs(what ? what : "ASCII text");
495*cf5a6c84SAndroid Build Coastguard Worker   }
496*cf5a6c84SAndroid Build Coastguard Worker }
497*cf5a6c84SAndroid Build Coastguard Worker 
file_main(void)498*cf5a6c84SAndroid Build Coastguard Worker void file_main(void)
499*cf5a6c84SAndroid Build Coastguard Worker {
500*cf5a6c84SAndroid Build Coastguard Worker   char **arg;
501*cf5a6c84SAndroid Build Coastguard Worker 
502*cf5a6c84SAndroid Build Coastguard Worker   for (arg = toys.optargs; *arg; ++arg)
503*cf5a6c84SAndroid Build Coastguard Worker     TT.max_name_len = maxof(strlen(*arg), TT.max_name_len);
504*cf5a6c84SAndroid Build Coastguard Worker 
505*cf5a6c84SAndroid Build Coastguard Worker   // Can't use loopfiles here because it doesn't call function when can't open
506*cf5a6c84SAndroid Build Coastguard Worker   for (arg = toys.optargs; *arg; arg++) {
507*cf5a6c84SAndroid Build Coastguard Worker     char *name = *arg, *what = "unknown";
508*cf5a6c84SAndroid Build Coastguard Worker     struct stat sb;
509*cf5a6c84SAndroid Build Coastguard Worker     int fd = !strcmp(name, "-");
510*cf5a6c84SAndroid Build Coastguard Worker 
511*cf5a6c84SAndroid Build Coastguard Worker     if (!FLAG(b))
512*cf5a6c84SAndroid Build Coastguard Worker       xprintf("%s: %*s", name, (int)(TT.max_name_len - strlen(name)), "");
513*cf5a6c84SAndroid Build Coastguard Worker 
514*cf5a6c84SAndroid Build Coastguard Worker     sb.st_size = 0;
515*cf5a6c84SAndroid Build Coastguard Worker     if (!fd && (FLAG(L) ? stat : lstat)(name, &sb)) {
516*cf5a6c84SAndroid Build Coastguard Worker       xprintf("cannot open: %s\n", strerror(errno));
517*cf5a6c84SAndroid Build Coastguard Worker 
518*cf5a6c84SAndroid Build Coastguard Worker       continue;
519*cf5a6c84SAndroid Build Coastguard Worker     }
520*cf5a6c84SAndroid Build Coastguard Worker 
521*cf5a6c84SAndroid Build Coastguard Worker     if (!fd && !FLAG(s) && (S_ISBLK(sb.st_mode) || S_ISCHR(sb.st_mode))) {
522*cf5a6c84SAndroid Build Coastguard Worker       sprintf(what = toybuf, "%s special (%u/%u)",
523*cf5a6c84SAndroid Build Coastguard Worker           S_ISBLK(sb.st_mode) ? "block" : "character",
524*cf5a6c84SAndroid Build Coastguard Worker           dev_major(sb.st_rdev), dev_minor(sb.st_rdev));
525*cf5a6c84SAndroid Build Coastguard Worker     } else if (fd || S_ISREG(sb.st_mode)) {
526*cf5a6c84SAndroid Build Coastguard Worker       TT.len = sb.st_size;
527*cf5a6c84SAndroid Build Coastguard Worker       // This test identifies an empty file we don't have permission to read
528*cf5a6c84SAndroid Build Coastguard Worker       if (!fd && !sb.st_size) what = "empty";
529*cf5a6c84SAndroid Build Coastguard Worker       else if ((fd = openro(name, O_RDONLY)) != -1) {
530*cf5a6c84SAndroid Build Coastguard Worker         do_regular_file(fd, name);
531*cf5a6c84SAndroid Build Coastguard Worker         if (fd) close(fd);
532*cf5a6c84SAndroid Build Coastguard Worker 
533*cf5a6c84SAndroid Build Coastguard Worker         continue;
534*cf5a6c84SAndroid Build Coastguard Worker       }
535*cf5a6c84SAndroid Build Coastguard Worker     } else if (S_ISFIFO(sb.st_mode)) what = "fifo";
536*cf5a6c84SAndroid Build Coastguard Worker     else if (S_ISDIR(sb.st_mode)) what = "directory";
537*cf5a6c84SAndroid Build Coastguard Worker     else if (S_ISSOCK(sb.st_mode)) what = "socket";
538*cf5a6c84SAndroid Build Coastguard Worker     else if (S_ISLNK(sb.st_mode)) {
539*cf5a6c84SAndroid Build Coastguard Worker       char *lnk = xreadlink(name);
540*cf5a6c84SAndroid Build Coastguard Worker 
541*cf5a6c84SAndroid Build Coastguard Worker       sprintf(what = toybuf, "%ssymbolic link to %s",
542*cf5a6c84SAndroid Build Coastguard Worker           stat(name, &sb) ? "broken " : "", lnk);
543*cf5a6c84SAndroid Build Coastguard Worker       free(lnk);
544*cf5a6c84SAndroid Build Coastguard Worker     }
545*cf5a6c84SAndroid Build Coastguard Worker     xputs(what);
546*cf5a6c84SAndroid Build Coastguard Worker   }
547*cf5a6c84SAndroid Build Coastguard Worker }
548