blob: 4bb05f248b60d148215790fb730d8aa13f2f984d [file] [log] [blame]
Eric Andersenaad1a882001-03-16 22:47:14 +00001/* vi: set sw=4 ts=4: */
2/*
3 * Utility routines.
4 *
Eric Andersenc7bda1c2004-03-15 08:29:22 +00005 * Copyright (C) 1999-2004 by Erik Andersen <andersen@codepoet.org>
Rob Landleyd921b2e2006-08-03 15:41:12 +00006 * Copyright (C) 2006 Rob Landley
7 * Copyright (C) 2006 Denis Vlasenko
Eric Andersenaad1a882001-03-16 22:47:14 +00008 *
Rob Landley4e9deec2006-02-20 02:44:30 +00009 * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
Eric Andersenaad1a882001-03-16 22:47:14 +000010 */
11
Rob Landley552b56d2006-05-04 21:22:27 +000012#include "busybox.h"
Eric Andersenaad1a882001-03-16 22:47:14 +000013
Rob Landley23b61be2006-08-04 20:20:03 +000014/* All the functions starting with "x" call bb_error_msg_and_die() if they
15 * fail, so callers never need to check for errors. If it returned, it
16 * succeeded. */
17
Eric Andersenaad1a882001-03-16 22:47:14 +000018#ifndef DMALLOC
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +000019/* dmalloc provides variants of these that do abort() on failure.
20 * Since dmalloc's prototypes overwrite the impls here as they are
21 * included after these prototypes in libbb.h, all is well.
22 */
Manuel Novoa III cad53642003-03-19 09:13:01 +000023#ifdef L_xmalloc
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +000024/* Die if we can't allocate size bytes of memory. */
Rob Landleydfba7412006-03-06 20:47:33 +000025void *xmalloc(size_t size)
Eric Andersenaad1a882001-03-16 22:47:14 +000026{
27 void *ptr = malloc(size);
Matt Kraaia99b1942002-02-26 15:28:22 +000028 if (ptr == NULL && size != 0)
Manuel Novoa III cad53642003-03-19 09:13:01 +000029 bb_error_msg_and_die(bb_msg_memory_exhausted);
Eric Andersenaad1a882001-03-16 22:47:14 +000030 return ptr;
31}
Manuel Novoa III cad53642003-03-19 09:13:01 +000032#endif
Eric Andersenaad1a882001-03-16 22:47:14 +000033
Manuel Novoa III cad53642003-03-19 09:13:01 +000034#ifdef L_xrealloc
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +000035/* Die if we can't resize previously allocated memory. (This returns a pointer
36 * to the new memory, which may or may not be the same as the old memory.
37 * It'll copy the contents to a new chunk and free the old one if necessary.) */
Rob Landleydfba7412006-03-06 20:47:33 +000038void *xrealloc(void *ptr, size_t size)
Eric Andersenaad1a882001-03-16 22:47:14 +000039{
Matt Kraaia99b1942002-02-26 15:28:22 +000040 ptr = realloc(ptr, size);
41 if (ptr == NULL && size != 0)
Manuel Novoa III cad53642003-03-19 09:13:01 +000042 bb_error_msg_and_die(bb_msg_memory_exhausted);
Eric Andersenaad1a882001-03-16 22:47:14 +000043 return ptr;
44}
Manuel Novoa III cad53642003-03-19 09:13:01 +000045#endif
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +000046#endif /* DMALLOC */
47
Eric Andersenaad1a882001-03-16 22:47:14 +000048
Rob Landley80b8ff02006-05-19 20:36:49 +000049#ifdef L_xzalloc
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +000050/* Die if we can't allocate and zero size bytes of memory. */
Rob Landley80b8ff02006-05-19 20:36:49 +000051void *xzalloc(size_t size)
52{
53 void *ptr = xmalloc(size);
54 memset(ptr, 0, size);
55 return ptr;
56}
57#endif
58
Manuel Novoa III cad53642003-03-19 09:13:01 +000059#ifdef L_xstrdup
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +000060/* Die if we can't copy a string to freshly allocated memory. */
Rob Landley23b61be2006-08-04 20:20:03 +000061char * xstrdup(const char *s)
Rob Landley31642d72006-03-14 21:45:38 +000062{
Eric Andersenaad1a882001-03-16 22:47:14 +000063 char *t;
64
65 if (s == NULL)
66 return NULL;
67
68 t = strdup (s);
69
70 if (t == NULL)
Manuel Novoa III cad53642003-03-19 09:13:01 +000071 bb_error_msg_and_die(bb_msg_memory_exhausted);
Eric Andersenaad1a882001-03-16 22:47:14 +000072
73 return t;
74}
75#endif
76
Manuel Novoa III cad53642003-03-19 09:13:01 +000077#ifdef L_xstrndup
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +000078/* Die if we can't allocate n+1 bytes (space for the null terminator) and copy
79 * the (possibly truncated to length n) string into it.
80 */
Rob Landley23b61be2006-08-04 20:20:03 +000081char * xstrndup(const char *s, int n)
Rob Landley31642d72006-03-14 21:45:38 +000082{
Eric Andersenaad1a882001-03-16 22:47:14 +000083 char *t;
84
Rob Landley8bbdb872006-06-30 16:36:56 +000085 if (ENABLE_DEBUG && s == NULL)
Rob Landleyd921b2e2006-08-03 15:41:12 +000086 bb_error_msg_and_die("xstrndup bug");
Eric Andersenaad1a882001-03-16 22:47:14 +000087
88 t = xmalloc(++n);
Eric Andersenc7bda1c2004-03-15 08:29:22 +000089
Eric Andersenaad1a882001-03-16 22:47:14 +000090 return safe_strncpy(t,s,n);
91}
Manuel Novoa III cad53642003-03-19 09:13:01 +000092#endif
Eric Andersenaad1a882001-03-16 22:47:14 +000093
Manuel Novoa III cad53642003-03-19 09:13:01 +000094#ifdef L_xfopen
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +000095/* Die if we can't open a file and return a FILE * to it.
96 * Notice we haven't got xfread(), This is for use with fscanf() and friends.
97 */
Rob Landleyd921b2e2006-08-03 15:41:12 +000098FILE *xfopen(const char *path, const char *mode)
Eric Andersenaad1a882001-03-16 22:47:14 +000099{
100 FILE *fp;
101 if ((fp = fopen(path, mode)) == NULL)
Manuel Novoa III cad53642003-03-19 09:13:01 +0000102 bb_perror_msg_and_die("%s", path);
Eric Andersenaad1a882001-03-16 22:47:14 +0000103 return fp;
104}
Manuel Novoa III cad53642003-03-19 09:13:01 +0000105#endif
Eric Andersenaad1a882001-03-16 22:47:14 +0000106
Manuel Novoa III cad53642003-03-19 09:13:01 +0000107#ifdef L_xopen
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000108/* Die if we can't open an existing file and return an fd. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000109int xopen(const char *pathname, int flags)
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000110{
Denis Vlasenkod25a2642006-09-05 09:36:19 +0000111 if (ENABLE_DEBUG && (flags & O_CREAT))
Denis Vlasenko6d655be2006-09-06 19:02:46 +0000112 bb_error_msg_and_die("xopen() with O_CREAT");
Rob Landley23b61be2006-08-04 20:20:03 +0000113
Rob Landleyd921b2e2006-08-03 15:41:12 +0000114 return xopen3(pathname, flags, 0777);
Bernhard Reutner-Fischerc2cb0f32006-04-13 12:45:04 +0000115}
116#endif
117
118#ifdef L_xopen3
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000119/* Die if we can't open a new file and return an fd. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000120int xopen3(const char *pathname, int flags, int mode)
Bernhard Reutner-Fischerc2cb0f32006-04-13 12:45:04 +0000121{
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000122 int ret;
Eric Andersenc7bda1c2004-03-15 08:29:22 +0000123
Bernhard Reutner-Fischerc2cb0f32006-04-13 12:45:04 +0000124 ret = open(pathname, flags, mode);
125 if (ret < 0) {
Manuel Novoa III cad53642003-03-19 09:13:01 +0000126 bb_perror_msg_and_die("%s", pathname);
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000127 }
128 return ret;
129}
Manuel Novoa III cad53642003-03-19 09:13:01 +0000130#endif
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000131
Manuel Novoa III cad53642003-03-19 09:13:01 +0000132#ifdef L_xread
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000133/* Die with an error message if we can't read the entire buffer. */
Rob Landley53437472006-07-16 08:14:35 +0000134void xread(int fd, void *buf, size_t count)
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000135{
Manuel Novoa III cad53642003-03-19 09:13:01 +0000136 while (count) {
Rob Landley53437472006-07-16 08:14:35 +0000137 ssize_t size;
138
139 if ((size = safe_read(fd, buf, count)) < 1)
Manuel Novoa III cad53642003-03-19 09:13:01 +0000140 bb_error_msg_and_die("Short read");
Manuel Novoa III cad53642003-03-19 09:13:01 +0000141 count -= size;
Manuel Novoa III 948d4902004-03-08 05:44:30 +0000142 buf = ((char *) buf) + size;
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000143 }
Rob Landley53437472006-07-16 08:14:35 +0000144}
145#endif
146
147#ifdef L_xwrite
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000148/* Die with an error message if we can't write the entire buffer. */
Rob Landley53437472006-07-16 08:14:35 +0000149void xwrite(int fd, void *buf, size_t count)
150{
151 while (count) {
152 ssize_t size;
153
154 if ((size = safe_write(fd, buf, count)) < 1)
155 bb_error_msg_and_die("Short write");
156 count -= size;
157 buf = ((char *) buf) + size;
158 }
159}
160#endif
161
162#ifdef L_xlseek
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000163/* Die with an error message if we can't lseek to the right spot. */
Rob Landley53437472006-07-16 08:14:35 +0000164void xlseek(int fd, off_t offset, int whence)
165{
Rob Landley2c55fca2006-08-04 05:24:58 +0000166 if (offset != lseek(fd, offset, whence)) bb_error_msg_and_die("lseek");
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000167}
Manuel Novoa III cad53642003-03-19 09:13:01 +0000168#endif
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000169
Manuel Novoa III cad53642003-03-19 09:13:01 +0000170#ifdef L_xread_char
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000171/* Die with an error message if we can't read one character. */
Rob Landley53437472006-07-16 08:14:35 +0000172unsigned char xread_char(int fd)
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000173{
174 char tmp;
Eric Andersenc7bda1c2004-03-15 08:29:22 +0000175
Rob Landley53437472006-07-16 08:14:35 +0000176 xread(fd, &tmp, 1);
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000177
Eric Andersenc7bda1c2004-03-15 08:29:22 +0000178 return(tmp);
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000179}
Manuel Novoa III cad53642003-03-19 09:13:01 +0000180#endif
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000181
Manuel Novoa III cad53642003-03-19 09:13:01 +0000182#ifdef L_xferror
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000183/* Die with supplied error message if this FILE * has ferror set. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000184void xferror(FILE *fp, const char *fn)
Manuel Novoa III cad53642003-03-19 09:13:01 +0000185{
186 if (ferror(fp)) {
187 bb_error_msg_and_die("%s", fn);
188 }
189}
190#endif
191
192#ifdef L_xferror_stdout
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000193/* Die with an error message if stdout has ferror set. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000194void xferror_stdout(void)
Manuel Novoa III cad53642003-03-19 09:13:01 +0000195{
Rob Landleyd921b2e2006-08-03 15:41:12 +0000196 xferror(stdout, bb_msg_standard_output);
Manuel Novoa III cad53642003-03-19 09:13:01 +0000197}
198#endif
199
200#ifdef L_xfflush_stdout
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000201/* Die with an error message if we have trouble flushing stdout. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000202void xfflush_stdout(void)
Manuel Novoa III cad53642003-03-19 09:13:01 +0000203{
204 if (fflush(stdout)) {
205 bb_perror_msg_and_die(bb_msg_standard_output);
206 }
207}
208#endif
Rob Landley399d2b52006-05-25 23:02:40 +0000209
210#ifdef L_spawn
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000211/* This does a fork/exec in one call, using vfork(). Return PID of new child,
212 * -1 for failure. Runs argv[0], searching path if that has no / in it.
213 */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000214pid_t spawn(char **argv)
Rob Landley399d2b52006-05-25 23:02:40 +0000215{
216 static int failed;
217 pid_t pid;
Rob Landley519d7df2006-08-09 20:56:23 +0000218 void *app = ENABLE_FEATURE_SH_STANDALONE_SHELL ? find_applet_by_name(argv[0]) : 0;
Rob Landley399d2b52006-05-25 23:02:40 +0000219
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000220 /* Be nice to nommu machines. */
Rob Landley399d2b52006-05-25 23:02:40 +0000221 failed = 0;
222 pid = vfork();
223 if (pid < 0) return pid;
224 if (!pid) {
Rob Landleyc7ddefc2006-06-14 01:24:33 +0000225 execvp(app ? CONFIG_BUSYBOX_EXEC_PATH : *argv, argv);
Rob Landley399d2b52006-05-25 23:02:40 +0000226
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000227 /* We're sharing a stack with blocked parent, let parent know we failed
228 * and then exit to unblock parent (but don't run atexit() stuff, which
229 would screw up parent.) */
Rob Landley399d2b52006-05-25 23:02:40 +0000230
231 failed = -1;
232 _exit(0);
233 }
234 return failed ? failed : pid;
235}
236#endif
237
238#ifdef L_xspawn
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000239/* Die with an error message if we can't spawn a child process. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000240pid_t xspawn(char **argv)
Rob Landley399d2b52006-05-25 23:02:40 +0000241{
Rob Landleyd921b2e2006-08-03 15:41:12 +0000242 pid_t pid = spawn(argv);
Rob Landley399d2b52006-05-25 23:02:40 +0000243 if (pid < 0) bb_perror_msg_and_die("%s", *argv);
244 return pid;
245}
246#endif
Rob Landleyc7ddefc2006-06-14 01:24:33 +0000247
248#ifdef L_wait4
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000249/* Wait for the specified child PID to exit, returning child's error return. */
Rob Landleyc7ddefc2006-06-14 01:24:33 +0000250int wait4pid(int pid)
251{
252 int status;
253
254 if (pid == -1 || waitpid(pid, &status, 0) == -1) return -1;
255 if (WIFEXITED(status)) return WEXITSTATUS(status);
256 if (WIFSIGNALED(status)) return WTERMSIG(status);
257 return 0;
258}
Rob Landley5b88a382006-07-10 07:41:34 +0000259#endif
260
261#ifdef L_itoa
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000262/* Convert unsigned integer to ascii, writing into supplied buffer. A
263 * truncated result is always null terminated (unless buflen is 0), and
264 * contains the first few digits of the result ala strncpy. */
Rob Landley22d39582006-07-11 00:44:36 +0000265void utoa_to_buf(unsigned n, char *buf, unsigned buflen)
Rob Landley5b88a382006-07-10 07:41:34 +0000266{
267 int i, out = 0;
Rob Landley22d39582006-07-11 00:44:36 +0000268 if (buflen) {
269 for (i=1000000000; i; i/=10) {
270 int res = n/i;
Rob Landley5b88a382006-07-10 07:41:34 +0000271
Rob Landley22d39582006-07-11 00:44:36 +0000272 if ((res || out || i == 1) && --buflen>0) {
273 out++;
274 n -= res*i;
275 *buf++ = '0' + res;
276 }
Rob Landley5b88a382006-07-10 07:41:34 +0000277 }
Rob Landley22d39582006-07-11 00:44:36 +0000278 *buf = 0;
Rob Landley5b88a382006-07-10 07:41:34 +0000279 }
Rob Landley5b88a382006-07-10 07:41:34 +0000280}
281
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000282/* Convert signed integer to ascii, like utoa_to_buf() */
Rob Landley22d39582006-07-11 00:44:36 +0000283void itoa_to_buf(int n, char *buf, unsigned buflen)
Rob Landley5b88a382006-07-10 07:41:34 +0000284{
Rob Landley22d39582006-07-11 00:44:36 +0000285 if (buflen && n<0) {
Rob Landley5b88a382006-07-10 07:41:34 +0000286 n = -n;
287 *buf++ = '-';
Rob Landley22d39582006-07-11 00:44:36 +0000288 buflen--;
Rob Landley5b88a382006-07-10 07:41:34 +0000289 }
290 utoa_to_buf((unsigned)n, buf, buflen);
291}
292
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000293/* The following two functions use a static buffer, so calling either one a
294 * second time will overwrite previous results.
295 *
296 * The largest 32 bit integer is -2 billion plus null terminator, or 12 bytes.
297 * Int should always be 32 bits on any remotely Unix-like system, see
298 * http://www.unix.org/whitepapers/64bit.html for the reasons why.
299*/
Rob Landley23b61be2006-08-04 20:20:03 +0000300static char local_buf[12];
301
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000302/* Convert unsigned integer to ascii using a static buffer (returned). */
Rob Landley23b61be2006-08-04 20:20:03 +0000303char *utoa(unsigned n)
304{
305 utoa_to_buf(n, local_buf, sizeof(local_buf));
306
307 return local_buf;
308}
309
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000310/* Convert signed integer to ascii using a static buffer (returned). */
Rob Landley5b88a382006-07-10 07:41:34 +0000311char *itoa(int n)
312{
313 itoa_to_buf(n, local_buf, sizeof(local_buf));
314
315 return local_buf;
316}
317#endif
Rob Landleydf822f22006-07-15 23:00:46 +0000318
319#ifdef L_setuid
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000320/* Die with an error message if we can't set gid. (Because resource limits may
321 * limit this user to a given number of processes, and if that fills up the
322 * setgid() will fail and we'll _still_be_root_, which is bad.) */
Rob Landleydf822f22006-07-15 23:00:46 +0000323void xsetgid(gid_t gid)
324{
325 if (setgid(gid)) bb_error_msg_and_die("setgid");
326}
327
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000328/* Die with an error message if we cant' set uid. (See xsetgid() for why.) */
Rob Landleydf822f22006-07-15 23:00:46 +0000329void xsetuid(uid_t uid)
330{
331 if (setuid(uid)) bb_error_msg_and_die("setuid");
332}
333#endif
Rob Landley53437472006-07-16 08:14:35 +0000334
335#ifdef L_fdlength
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000336/* Return how long the file at fd is, if there's any way to determine it. */
Rob Landley53437472006-07-16 08:14:35 +0000337off_t fdlength(int fd)
338{
339 off_t bottom = 0, top = 0, pos;
340 long size;
341
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000342 /* If the ioctl works for this, return it. */
Rob Landley53437472006-07-16 08:14:35 +0000343
344 if (ioctl(fd, BLKGETSIZE, &size) >= 0) return size*512;
345
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000346 /* If not, do a binary search for the last location we can read. (Some
347 * block devices don't do BLKGETSIZE right.) */
Rob Landley53437472006-07-16 08:14:35 +0000348
349 do {
350 char temp;
351
Denis Vlasenkod25a2642006-09-05 09:36:19 +0000352 pos = bottom + (top - bottom) / 2;
Rob Landley53437472006-07-16 08:14:35 +0000353
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000354 /* If we can read from the current location, it's bigger. */
Rob Landley53437472006-07-16 08:14:35 +0000355
356 if (lseek(fd, pos, 0)>=0 && safe_read(fd, &temp, 1)==1) {
357 if (bottom == top) bottom = top = (top+1) * 2;
358 else bottom = pos;
359
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000360 /* If we can't, it's smaller. */
Rob Landley53437472006-07-16 08:14:35 +0000361
362 } else {
363 if (bottom == top) {
364 if (!top) return 0;
365 bottom = top/2;
366 }
367 else top = pos;
368 }
369 } while (bottom + 1 != top);
370
371 return pos + 1;
372}
373#endif
Rob Landleyd921b2e2006-08-03 15:41:12 +0000374
375#ifdef L_xasprintf
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000376/* Die with an error message if we can't malloc() enough space and do an
377 * sprintf() into that space. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000378char *xasprintf(const char *format, ...)
379{
380 va_list p;
381 int r;
382 char *string_ptr;
383
384#if 1
385 // GNU extension
386 va_start(p, format);
387 r = vasprintf(&string_ptr, format, p);
388 va_end(p);
389#else
390 // Bloat for systems that haven't got the GNU extension.
391 va_start(p, format);
392 r = vsnprintf(NULL, 0, format, p);
393 va_end(p);
394 string_ptr = xmalloc(r+1);
395 va_start(p, format);
396 r = vsnprintf(string_ptr, r+1, format, p);
397 va_end(p);
398#endif
399
Denis Vlasenko3538b9a2006-09-06 18:36:50 +0000400 if (r < 0) bb_error_msg_and_die(bb_msg_memory_exhausted);
Rob Landleyd921b2e2006-08-03 15:41:12 +0000401 return string_ptr;
402}
403#endif
404
405#ifdef L_xprint_and_close_file
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000406/* Die with an error message if we can't copy an entire FILE * to stdout, then
407 * close that file. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000408void xprint_and_close_file(FILE *file)
409{
410 // copyfd outputs error messages for us.
Denis Vlasenkoa9801652006-09-07 16:20:03 +0000411 if (bb_copyfd_eof(fileno(file), 1) == -1)
412 exit(bb_default_error_retval);
Rob Landleyd921b2e2006-08-03 15:41:12 +0000413
414 fclose(file);
415}
416#endif
417
418#ifdef L_xchdir
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000419/* Die if we can't chdir to a new path. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000420void xchdir(const char *path)
421{
422 if (chdir(path))
423 bb_perror_msg_and_die("chdir(%s)", path);
424}
425#endif
426
427#ifdef L_warn_opendir
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000428/* Print a warning message if opendir() fails, but don't die. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000429DIR *warn_opendir(const char *path)
430{
431 DIR *dp;
432
433 if ((dp = opendir(path)) == NULL) {
434 bb_perror_msg("unable to open `%s'", path);
435 return NULL;
436 }
437 return dp;
438}
439#endif
440
441#ifdef L_xopendir
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000442/* Die with an error message if opendir() fails. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000443DIR *xopendir(const char *path)
444{
445 DIR *dp;
446
447 if ((dp = opendir(path)) == NULL)
448 bb_perror_msg_and_die("unable to open `%s'", path);
449 return dp;
450}
451#endif
452
453#ifdef L_xdaemon
454#ifndef BB_NOMMU
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000455/* Die with an error message if we can't daemonize. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000456void xdaemon(int nochdir, int noclose)
457{
Denis Vlasenko27af5a02006-09-03 12:21:59 +0000458 if (daemon(nochdir, noclose)) bb_perror_msg_and_die("daemon");
Rob Landleyd921b2e2006-08-03 15:41:12 +0000459}
460#endif
461#endif
462
Rob Landleyd921b2e2006-08-03 15:41:12 +0000463#ifdef L_xsocket
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000464/* Die with an error message if we can't open a new socket. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000465int xsocket(int domain, int type, int protocol)
466{
467 int r = socket(domain, type, protocol);
468
469 if (r < 0) bb_perror_msg_and_die("socket");
470
471 return r;
472}
473#endif
474
Rob Landley23b61be2006-08-04 20:20:03 +0000475#ifdef L_xbind
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000476/* Die with an error message if we can't bind a socket to an address. */
Rob Landley23b61be2006-08-04 20:20:03 +0000477void xbind(int sockfd, struct sockaddr *my_addr, socklen_t addrlen)
478{
479 if (bind(sockfd, my_addr, addrlen)) bb_perror_msg_and_die("bind");
480}
481#endif
482
Rob Landleyd921b2e2006-08-03 15:41:12 +0000483#ifdef L_xlisten
Bernhard Reutner-Fischer73561cc2006-08-28 23:31:54 +0000484/* Die with an error message if we can't listen for connections on a socket. */
Rob Landleyd921b2e2006-08-03 15:41:12 +0000485void xlisten(int s, int backlog)
486{
487 if (listen(s, backlog)) bb_perror_msg_and_die("listen");
488}
489#endif