blob: de765a32d949445c84958858dd02f57c418f758d [file] [log] [blame]
Eric Andersenaad1a882001-03-16 22:47:14 +00001/* vi: set sw=4 ts=4: */
2/*
3 * Utility routines.
4 *
Eric Andersenc7bda1c2004-03-15 08:29:22 +00005 * Copyright (C) 1999-2004 by Erik Andersen <andersen@codepoet.org>
Rob Landleyd921b2e2006-08-03 15:41:12 +00006 * Copyright (C) 2006 Rob Landley
7 * Copyright (C) 2006 Denis Vlasenko
Eric Andersenaad1a882001-03-16 22:47:14 +00008 *
Rob Landleyfbdf1212006-09-20 22:06:01 +00009 * Licensed under GPL version 2, see file LICENSE in this tarball for details.
Eric Andersenaad1a882001-03-16 22:47:14 +000010 */
11
Rob Landley552b56d2006-05-04 21:22:27 +000012#include "busybox.h"
Eric Andersenaad1a882001-03-16 22:47:14 +000013
Rob Landley23b61be2006-08-04 20:20:03 +000014/* All the functions starting with "x" call bb_error_msg_and_die() if they
15 * fail, so callers never need to check for errors. If it returned, it
16 * succeeded. */
17
Eric Andersenaad1a882001-03-16 22:47:14 +000018#ifndef DMALLOC
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +000019/* dmalloc provides variants of these that do abort() on failure.
20 * Since dmalloc's prototypes overwrite the impls here as they are
21 * included after these prototypes in libbb.h, all is well.
22 */
Rob Landleyda9d1d02006-09-14 19:52:07 +000023// Die if we can't allocate size bytes of memory.
Rob Landleydfba7412006-03-06 20:47:33 +000024void *xmalloc(size_t size)
Eric Andersenaad1a882001-03-16 22:47:14 +000025{
26 void *ptr = malloc(size);
Matt Kraaia99b1942002-02-26 15:28:22 +000027 if (ptr == NULL && size != 0)
Manuel Novoa III cad53642003-03-19 09:13:01 +000028 bb_error_msg_and_die(bb_msg_memory_exhausted);
Eric Andersenaad1a882001-03-16 22:47:14 +000029 return ptr;
30}
31
Rob Landleyda9d1d02006-09-14 19:52:07 +000032// Die if we can't resize previously allocated memory. (This returns a pointer
33// to the new memory, which may or may not be the same as the old memory.
34// It'll copy the contents to a new chunk and free the old one if necessary.)
Rob Landleydfba7412006-03-06 20:47:33 +000035void *xrealloc(void *ptr, size_t size)
Eric Andersenaad1a882001-03-16 22:47:14 +000036{
Matt Kraaia99b1942002-02-26 15:28:22 +000037 ptr = realloc(ptr, size);
38 if (ptr == NULL && size != 0)
Manuel Novoa III cad53642003-03-19 09:13:01 +000039 bb_error_msg_and_die(bb_msg_memory_exhausted);
Eric Andersenaad1a882001-03-16 22:47:14 +000040 return ptr;
41}
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +000042#endif /* DMALLOC */
43
Rob Landleyda9d1d02006-09-14 19:52:07 +000044// Die if we can't allocate and zero size bytes of memory.
Rob Landley80b8ff02006-05-19 20:36:49 +000045void *xzalloc(size_t size)
46{
47 void *ptr = xmalloc(size);
48 memset(ptr, 0, size);
49 return ptr;
50}
Rob Landley80b8ff02006-05-19 20:36:49 +000051
Rob Landleyda9d1d02006-09-14 19:52:07 +000052// Die if we can't copy a string to freshly allocated memory.
Rob Landley23b61be2006-08-04 20:20:03 +000053char * xstrdup(const char *s)
Rob Landley31642d72006-03-14 21:45:38 +000054{
Eric Andersenaad1a882001-03-16 22:47:14 +000055 char *t;
56
57 if (s == NULL)
58 return NULL;
59
60 t = strdup (s);
61
62 if (t == NULL)
Manuel Novoa III cad53642003-03-19 09:13:01 +000063 bb_error_msg_and_die(bb_msg_memory_exhausted);
Eric Andersenaad1a882001-03-16 22:47:14 +000064
65 return t;
66}
Eric Andersenaad1a882001-03-16 22:47:14 +000067
Rob Landleyda9d1d02006-09-14 19:52:07 +000068// Die if we can't allocate n+1 bytes (space for the null terminator) and copy
69// the (possibly truncated to length n) string into it.
Rob Landley23b61be2006-08-04 20:20:03 +000070char * xstrndup(const char *s, int n)
Rob Landley31642d72006-03-14 21:45:38 +000071{
Eric Andersenaad1a882001-03-16 22:47:14 +000072 char *t;
73
Rob Landley8bbdb872006-06-30 16:36:56 +000074 if (ENABLE_DEBUG && s == NULL)
Rob Landleyd921b2e2006-08-03 15:41:12 +000075 bb_error_msg_and_die("xstrndup bug");
Eric Andersenaad1a882001-03-16 22:47:14 +000076
77 t = xmalloc(++n);
Eric Andersenc7bda1c2004-03-15 08:29:22 +000078
Eric Andersenaad1a882001-03-16 22:47:14 +000079 return safe_strncpy(t,s,n);
80}
81
Rob Landleyda9d1d02006-09-14 19:52:07 +000082// Die if we can't open a file and return a FILE * to it.
83// Notice we haven't got xfread(), This is for use with fscanf() and friends.
Rob Landleyd921b2e2006-08-03 15:41:12 +000084FILE *xfopen(const char *path, const char *mode)
Eric Andersenaad1a882001-03-16 22:47:14 +000085{
86 FILE *fp;
87 if ((fp = fopen(path, mode)) == NULL)
Manuel Novoa III cad53642003-03-19 09:13:01 +000088 bb_perror_msg_and_die("%s", path);
Eric Andersenaad1a882001-03-16 22:47:14 +000089 return fp;
90}
91
Rob Landleyda9d1d02006-09-14 19:52:07 +000092// Die if we can't open an existing file and return an fd.
Rob Landleyd921b2e2006-08-03 15:41:12 +000093int xopen(const char *pathname, int flags)
Glenn L McGrath7ca04f32002-09-25 02:47:48 +000094{
Denis Vlasenkod25a2642006-09-05 09:36:19 +000095 if (ENABLE_DEBUG && (flags & O_CREAT))
Denis Vlasenko6d655be2006-09-06 19:02:46 +000096 bb_error_msg_and_die("xopen() with O_CREAT");
Rob Landley23b61be2006-08-04 20:20:03 +000097
Rob Landleyd921b2e2006-08-03 15:41:12 +000098 return xopen3(pathname, flags, 0777);
Bernhard Reutner-Fischerc2cb0f32006-04-13 12:45:04 +000099}
Bernhard Reutner-Fischerc2cb0f32006-04-13 12:45:04 +0000100
Rob Landleyda9d1d02006-09-14 19:52:07 +0000101// Die if we can't open a new file and return an fd.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000102int xopen3(const char *pathname, int flags, int mode)
Bernhard Reutner-Fischerc2cb0f32006-04-13 12:45:04 +0000103{
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000104 int ret;
Eric Andersenc7bda1c2004-03-15 08:29:22 +0000105
Bernhard Reutner-Fischerc2cb0f32006-04-13 12:45:04 +0000106 ret = open(pathname, flags, mode);
107 if (ret < 0) {
Manuel Novoa III cad53642003-03-19 09:13:01 +0000108 bb_perror_msg_and_die("%s", pathname);
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000109 }
110 return ret;
111}
112
Rob Landleyda9d1d02006-09-14 19:52:07 +0000113// Die with an error message if we can't read the entire buffer.
Rob Landley53437472006-07-16 08:14:35 +0000114void xread(int fd, void *buf, size_t count)
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000115{
Manuel Novoa III cad53642003-03-19 09:13:01 +0000116 while (count) {
Rob Landley53437472006-07-16 08:14:35 +0000117 ssize_t size;
118
119 if ((size = safe_read(fd, buf, count)) < 1)
Manuel Novoa III cad53642003-03-19 09:13:01 +0000120 bb_error_msg_and_die("Short read");
Manuel Novoa III cad53642003-03-19 09:13:01 +0000121 count -= size;
Manuel Novoa III 948d4902004-03-08 05:44:30 +0000122 buf = ((char *) buf) + size;
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000123 }
Rob Landley53437472006-07-16 08:14:35 +0000124}
Rob Landley53437472006-07-16 08:14:35 +0000125
Rob Landleyda9d1d02006-09-14 19:52:07 +0000126// Die with an error message if we can't write the entire buffer.
Rob Landley53437472006-07-16 08:14:35 +0000127void xwrite(int fd, void *buf, size_t count)
128{
129 while (count) {
130 ssize_t size;
131
132 if ((size = safe_write(fd, buf, count)) < 1)
133 bb_error_msg_and_die("Short write");
134 count -= size;
135 buf = ((char *) buf) + size;
136 }
137}
Rob Landley53437472006-07-16 08:14:35 +0000138
Rob Landleyda9d1d02006-09-14 19:52:07 +0000139// Die with an error message if we can't lseek to the right spot.
Rob Landley53437472006-07-16 08:14:35 +0000140void xlseek(int fd, off_t offset, int whence)
141{
Rob Landley2c55fca2006-08-04 05:24:58 +0000142 if (offset != lseek(fd, offset, whence)) bb_error_msg_and_die("lseek");
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000143}
144
Rob Landleyda9d1d02006-09-14 19:52:07 +0000145// Die with an error message if we can't read one character.
Rob Landley53437472006-07-16 08:14:35 +0000146unsigned char xread_char(int fd)
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000147{
148 char tmp;
Eric Andersenc7bda1c2004-03-15 08:29:22 +0000149
Rob Landley53437472006-07-16 08:14:35 +0000150 xread(fd, &tmp, 1);
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000151
Eric Andersenc7bda1c2004-03-15 08:29:22 +0000152 return(tmp);
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000153}
154
Rob Landleyda9d1d02006-09-14 19:52:07 +0000155// Die with supplied error message if this FILE * has ferror set.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000156void xferror(FILE *fp, const char *fn)
Manuel Novoa III cad53642003-03-19 09:13:01 +0000157{
158 if (ferror(fp)) {
159 bb_error_msg_and_die("%s", fn);
160 }
161}
Manuel Novoa III cad53642003-03-19 09:13:01 +0000162
Rob Landleyda9d1d02006-09-14 19:52:07 +0000163// Die with an error message if stdout has ferror set.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000164void xferror_stdout(void)
Manuel Novoa III cad53642003-03-19 09:13:01 +0000165{
Rob Landleyd921b2e2006-08-03 15:41:12 +0000166 xferror(stdout, bb_msg_standard_output);
Manuel Novoa III cad53642003-03-19 09:13:01 +0000167}
Manuel Novoa III cad53642003-03-19 09:13:01 +0000168
Rob Landleyda9d1d02006-09-14 19:52:07 +0000169// Die with an error message if we have trouble flushing stdout.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000170void xfflush_stdout(void)
Manuel Novoa III cad53642003-03-19 09:13:01 +0000171{
172 if (fflush(stdout)) {
173 bb_perror_msg_and_die(bb_msg_standard_output);
174 }
175}
Rob Landley399d2b52006-05-25 23:02:40 +0000176
Rob Landleyda9d1d02006-09-14 19:52:07 +0000177// This does a fork/exec in one call, using vfork(). Return PID of new child,
178// -1 for failure. Runs argv[0], searching path if that has no / in it.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000179pid_t spawn(char **argv)
Rob Landley399d2b52006-05-25 23:02:40 +0000180{
181 static int failed;
182 pid_t pid;
Rob Landley519d7df2006-08-09 20:56:23 +0000183 void *app = ENABLE_FEATURE_SH_STANDALONE_SHELL ? find_applet_by_name(argv[0]) : 0;
Rob Landley399d2b52006-05-25 23:02:40 +0000184
Rob Landleyda9d1d02006-09-14 19:52:07 +0000185 // Be nice to nommu machines.
Rob Landley399d2b52006-05-25 23:02:40 +0000186 failed = 0;
187 pid = vfork();
188 if (pid < 0) return pid;
189 if (!pid) {
Rob Landleyc7ddefc2006-06-14 01:24:33 +0000190 execvp(app ? CONFIG_BUSYBOX_EXEC_PATH : *argv, argv);
Rob Landley399d2b52006-05-25 23:02:40 +0000191
Rob Landleyda9d1d02006-09-14 19:52:07 +0000192 // We're sharing a stack with blocked parent, let parent know we failed
193 // and then exit to unblock parent (but don't run atexit() stuff, which
194 // would screw up parent.)
Rob Landley399d2b52006-05-25 23:02:40 +0000195
196 failed = -1;
197 _exit(0);
198 }
199 return failed ? failed : pid;
200}
Rob Landley399d2b52006-05-25 23:02:40 +0000201
Rob Landleyda9d1d02006-09-14 19:52:07 +0000202// Die with an error message if we can't spawn a child process.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000203pid_t xspawn(char **argv)
Rob Landley399d2b52006-05-25 23:02:40 +0000204{
Rob Landleyd921b2e2006-08-03 15:41:12 +0000205 pid_t pid = spawn(argv);
Rob Landley399d2b52006-05-25 23:02:40 +0000206 if (pid < 0) bb_perror_msg_and_die("%s", *argv);
207 return pid;
208}
Rob Landleyc7ddefc2006-06-14 01:24:33 +0000209
Rob Landleyda9d1d02006-09-14 19:52:07 +0000210// Wait for the specified child PID to exit, returning child's error return.
Rob Landleyc7ddefc2006-06-14 01:24:33 +0000211int wait4pid(int pid)
212{
213 int status;
214
215 if (pid == -1 || waitpid(pid, &status, 0) == -1) return -1;
216 if (WIFEXITED(status)) return WEXITSTATUS(status);
217 if (WIFSIGNALED(status)) return WTERMSIG(status);
218 return 0;
219}
Rob Landley5b88a382006-07-10 07:41:34 +0000220
Denis Vlasenkofe544582006-10-03 15:57:40 +0000221void xsetenv(const char *key, const char *value)
222{
223 if(setenv(key, value, 1))
224 bb_error_msg_and_die(bb_msg_memory_exhausted);
225}
Denis Vlasenkofe544582006-10-03 15:57:40 +0000226
Rob Landleyda9d1d02006-09-14 19:52:07 +0000227// Convert unsigned integer to ascii, writing into supplied buffer. A
228// truncated result is always null terminated (unless buflen is 0), and
229// contains the first few digits of the result ala strncpy.
Rob Landley22d39582006-07-11 00:44:36 +0000230void utoa_to_buf(unsigned n, char *buf, unsigned buflen)
Rob Landley5b88a382006-07-10 07:41:34 +0000231{
232 int i, out = 0;
Rob Landley22d39582006-07-11 00:44:36 +0000233 if (buflen) {
234 for (i=1000000000; i; i/=10) {
235 int res = n/i;
Rob Landley5b88a382006-07-10 07:41:34 +0000236
Rob Landley22d39582006-07-11 00:44:36 +0000237 if ((res || out || i == 1) && --buflen>0) {
238 out++;
239 n -= res*i;
240 *buf++ = '0' + res;
241 }
Rob Landley5b88a382006-07-10 07:41:34 +0000242 }
Rob Landley22d39582006-07-11 00:44:36 +0000243 *buf = 0;
Rob Landley5b88a382006-07-10 07:41:34 +0000244 }
Rob Landley5b88a382006-07-10 07:41:34 +0000245}
246
Rob Landleyda9d1d02006-09-14 19:52:07 +0000247// Convert signed integer to ascii, like utoa_to_buf()
Rob Landley22d39582006-07-11 00:44:36 +0000248void itoa_to_buf(int n, char *buf, unsigned buflen)
Rob Landley5b88a382006-07-10 07:41:34 +0000249{
Rob Landley22d39582006-07-11 00:44:36 +0000250 if (buflen && n<0) {
Rob Landley5b88a382006-07-10 07:41:34 +0000251 n = -n;
252 *buf++ = '-';
Rob Landley22d39582006-07-11 00:44:36 +0000253 buflen--;
Rob Landley5b88a382006-07-10 07:41:34 +0000254 }
255 utoa_to_buf((unsigned)n, buf, buflen);
256}
257
Rob Landleyda9d1d02006-09-14 19:52:07 +0000258// The following two functions use a static buffer, so calling either one a
259// second time will overwrite previous results.
260//
261// The largest 32 bit integer is -2 billion plus null terminator, or 12 bytes.
262// Int should always be 32 bits on any remotely Unix-like system, see
263// http://www.unix.org/whitepapers/64bit.html for the reasons why.
264
Rob Landley23b61be2006-08-04 20:20:03 +0000265static char local_buf[12];
266
Rob Landleyda9d1d02006-09-14 19:52:07 +0000267// Convert unsigned integer to ascii using a static buffer (returned).
Rob Landley23b61be2006-08-04 20:20:03 +0000268char *utoa(unsigned n)
269{
270 utoa_to_buf(n, local_buf, sizeof(local_buf));
271
272 return local_buf;
273}
274
Rob Landleyda9d1d02006-09-14 19:52:07 +0000275// Convert signed integer to ascii using a static buffer (returned).
Rob Landley5b88a382006-07-10 07:41:34 +0000276char *itoa(int n)
277{
278 itoa_to_buf(n, local_buf, sizeof(local_buf));
279
280 return local_buf;
281}
Rob Landleydf822f22006-07-15 23:00:46 +0000282
Rob Landleyda9d1d02006-09-14 19:52:07 +0000283// Die with an error message if we can't set gid. (Because resource limits may
284// limit this user to a given number of processes, and if that fills up the
285// setgid() will fail and we'll _still_be_root_, which is bad.)
Rob Landleydf822f22006-07-15 23:00:46 +0000286void xsetgid(gid_t gid)
287{
288 if (setgid(gid)) bb_error_msg_and_die("setgid");
289}
290
Rob Landleyda9d1d02006-09-14 19:52:07 +0000291// Die with an error message if we cant' set uid. (See xsetgid() for why.)
Rob Landleydf822f22006-07-15 23:00:46 +0000292void xsetuid(uid_t uid)
293{
294 if (setuid(uid)) bb_error_msg_and_die("setuid");
295}
Rob Landley53437472006-07-16 08:14:35 +0000296
Rob Landleyda9d1d02006-09-14 19:52:07 +0000297// Return how long the file at fd is, if there's any way to determine it.
Rob Landley53437472006-07-16 08:14:35 +0000298off_t fdlength(int fd)
299{
300 off_t bottom = 0, top = 0, pos;
301 long size;
302
Rob Landleyda9d1d02006-09-14 19:52:07 +0000303 // If the ioctl works for this, return it.
Rob Landley53437472006-07-16 08:14:35 +0000304
305 if (ioctl(fd, BLKGETSIZE, &size) >= 0) return size*512;
306
Rob Landleyda9d1d02006-09-14 19:52:07 +0000307 // If not, do a binary search for the last location we can read. (Some
308 // block devices don't do BLKGETSIZE right.)
Rob Landley53437472006-07-16 08:14:35 +0000309
310 do {
311 char temp;
312
Denis Vlasenkod25a2642006-09-05 09:36:19 +0000313 pos = bottom + (top - bottom) / 2;
Rob Landley53437472006-07-16 08:14:35 +0000314
Rob Landleyda9d1d02006-09-14 19:52:07 +0000315 // If we can read from the current location, it's bigger.
Rob Landley53437472006-07-16 08:14:35 +0000316
317 if (lseek(fd, pos, 0)>=0 && safe_read(fd, &temp, 1)==1) {
318 if (bottom == top) bottom = top = (top+1) * 2;
319 else bottom = pos;
320
Rob Landleyda9d1d02006-09-14 19:52:07 +0000321 // If we can't, it's smaller.
Rob Landley53437472006-07-16 08:14:35 +0000322
323 } else {
324 if (bottom == top) {
325 if (!top) return 0;
326 bottom = top/2;
327 }
328 else top = pos;
329 }
330 } while (bottom + 1 != top);
331
332 return pos + 1;
333}
Rob Landleyd921b2e2006-08-03 15:41:12 +0000334
Rob Landleyda9d1d02006-09-14 19:52:07 +0000335// Die with an error message if we can't malloc() enough space and do an
336// sprintf() into that space.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000337char *xasprintf(const char *format, ...)
338{
339 va_list p;
340 int r;
341 char *string_ptr;
342
343#if 1
344 // GNU extension
345 va_start(p, format);
346 r = vasprintf(&string_ptr, format, p);
347 va_end(p);
348#else
349 // Bloat for systems that haven't got the GNU extension.
350 va_start(p, format);
351 r = vsnprintf(NULL, 0, format, p);
352 va_end(p);
353 string_ptr = xmalloc(r+1);
354 va_start(p, format);
355 r = vsnprintf(string_ptr, r+1, format, p);
356 va_end(p);
357#endif
358
Denis Vlasenko3538b9a2006-09-06 18:36:50 +0000359 if (r < 0) bb_error_msg_and_die(bb_msg_memory_exhausted);
Rob Landleyd921b2e2006-08-03 15:41:12 +0000360 return string_ptr;
361}
Rob Landleyd921b2e2006-08-03 15:41:12 +0000362
Rob Landleyda9d1d02006-09-14 19:52:07 +0000363// Die with an error message if we can't copy an entire FILE * to stdout, then
364// close that file.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000365void xprint_and_close_file(FILE *file)
366{
367 // copyfd outputs error messages for us.
Denis Vlasenkoa9801652006-09-07 16:20:03 +0000368 if (bb_copyfd_eof(fileno(file), 1) == -1)
Denis Vlasenko40920822006-10-03 20:28:06 +0000369 exit(xfunc_error_retval);
Rob Landleyd921b2e2006-08-03 15:41:12 +0000370
371 fclose(file);
372}
Rob Landleyd921b2e2006-08-03 15:41:12 +0000373
Rob Landleyda9d1d02006-09-14 19:52:07 +0000374// Die if we can't chdir to a new path.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000375void xchdir(const char *path)
376{
377 if (chdir(path))
378 bb_perror_msg_and_die("chdir(%s)", path);
379}
Rob Landleyd921b2e2006-08-03 15:41:12 +0000380
Rob Landleyda9d1d02006-09-14 19:52:07 +0000381// Print a warning message if opendir() fails, but don't die.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000382DIR *warn_opendir(const char *path)
383{
384 DIR *dp;
385
386 if ((dp = opendir(path)) == NULL) {
387 bb_perror_msg("unable to open `%s'", path);
388 return NULL;
389 }
390 return dp;
391}
Rob Landleyd921b2e2006-08-03 15:41:12 +0000392
Rob Landleyda9d1d02006-09-14 19:52:07 +0000393// Die with an error message if opendir() fails.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000394DIR *xopendir(const char *path)
395{
396 DIR *dp;
397
398 if ((dp = opendir(path)) == NULL)
399 bb_perror_msg_and_die("unable to open `%s'", path);
400 return dp;
401}
Rob Landleyd921b2e2006-08-03 15:41:12 +0000402
Rob Landleyd921b2e2006-08-03 15:41:12 +0000403#ifndef BB_NOMMU
Rob Landleyda9d1d02006-09-14 19:52:07 +0000404// Die with an error message if we can't daemonize.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000405void xdaemon(int nochdir, int noclose)
406{
Denis Vlasenko27af5a02006-09-03 12:21:59 +0000407 if (daemon(nochdir, noclose)) bb_perror_msg_and_die("daemon");
Rob Landleyd921b2e2006-08-03 15:41:12 +0000408}
409#endif
Rob Landleyd921b2e2006-08-03 15:41:12 +0000410
Rob Landleyda9d1d02006-09-14 19:52:07 +0000411// Die with an error message if we can't open a new socket.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000412int xsocket(int domain, int type, int protocol)
413{
414 int r = socket(domain, type, protocol);
415
416 if (r < 0) bb_perror_msg_and_die("socket");
417
418 return r;
419}
Rob Landleyd921b2e2006-08-03 15:41:12 +0000420
Rob Landleyda9d1d02006-09-14 19:52:07 +0000421// Die with an error message if we can't bind a socket to an address.
Rob Landley23b61be2006-08-04 20:20:03 +0000422void xbind(int sockfd, struct sockaddr *my_addr, socklen_t addrlen)
423{
424 if (bind(sockfd, my_addr, addrlen)) bb_perror_msg_and_die("bind");
425}
Rob Landley23b61be2006-08-04 20:20:03 +0000426
Rob Landleyda9d1d02006-09-14 19:52:07 +0000427// Die with an error message if we can't listen for connections on a socket.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000428void xlisten(int s, int backlog)
429{
430 if (listen(s, backlog)) bb_perror_msg_and_die("listen");
431}
Bernhard Reutner-Fischer57b56672006-09-11 09:18:09 +0000432
Rob Landleyda9d1d02006-09-14 19:52:07 +0000433// xstat() - a stat() which dies on failure with meaningful error message
Rob Landley20cc6d52006-09-12 21:42:17 +0000434void xstat(char *name, struct stat *stat_buf)
Bernhard Reutner-Fischer57b56672006-09-11 09:18:09 +0000435{
Denis Vlasenko9213a9e2006-09-17 16:28:10 +0000436 if (stat(name, stat_buf))
Denis Vlasenkob6332242006-10-03 19:57:50 +0000437 bb_perror_msg_and_die("can't stat '%s'", name);
Bernhard Reutner-Fischer57b56672006-09-11 09:18:09 +0000438}
Bernhard Reutner-Fischer57b56672006-09-11 09:18:09 +0000439
Rob Landleyfbdf1212006-09-20 22:06:01 +0000440/* It is perfectly ok to pass in a NULL for either width or for
441 * * height, in which case that value will not be set. */
442int get_terminal_width_height(int fd, int *width, int *height)
443{
444 struct winsize win = { 0, 0, 0, 0 };
445 int ret = ioctl(fd, TIOCGWINSZ, &win);
446 if (!win.ws_row) {
447 char *s = getenv("LINES");
448 if (s) win.ws_row = atoi(s);
449 }
450 if (win.ws_row <= 1) win.ws_row = 24;
451 if (!win.ws_col) {
452 char *s = getenv("COLUMNS");
453 if (s) win.ws_col = atoi(s);
454 }
455 if (win.ws_col <= 1) win.ws_col = 80;
456 if (height) *height = (int) win.ws_row;
457 if (width) *width = (int) win.ws_col;
458
459 return ret;
460}