blob: 4d81fdc28873d714fb94b191859fb451094ab5d3 [file] [log] [blame]
Eric Andersenaad1a882001-03-16 22:47:14 +00001/* vi: set sw=4 ts=4: */
2/*
3 * Utility routines.
4 *
Eric Andersenc7bda1c2004-03-15 08:29:22 +00005 * Copyright (C) 1999-2004 by Erik Andersen <andersen@codepoet.org>
Rob Landleyd921b2e2006-08-03 15:41:12 +00006 * Copyright (C) 2006 Rob Landley
7 * Copyright (C) 2006 Denis Vlasenko
Eric Andersenaad1a882001-03-16 22:47:14 +00008 *
Rob Landley4e9deec2006-02-20 02:44:30 +00009 * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
Eric Andersenaad1a882001-03-16 22:47:14 +000010 */
11
Rob Landley552b56d2006-05-04 21:22:27 +000012#include "busybox.h"
Eric Andersenaad1a882001-03-16 22:47:14 +000013
Rob Landley23b61be2006-08-04 20:20:03 +000014/* All the functions starting with "x" call bb_error_msg_and_die() if they
15 * fail, so callers never need to check for errors. If it returned, it
16 * succeeded. */
17
Eric Andersenaad1a882001-03-16 22:47:14 +000018#ifndef DMALLOC
Manuel Novoa III cad53642003-03-19 09:13:01 +000019#ifdef L_xmalloc
Rob Landley23b61be2006-08-04 20:20:03 +000020// Die if we can't allocate size bytes of memory.
Rob Landleydfba7412006-03-06 20:47:33 +000021void *xmalloc(size_t size)
Eric Andersenaad1a882001-03-16 22:47:14 +000022{
23 void *ptr = malloc(size);
Matt Kraaia99b1942002-02-26 15:28:22 +000024 if (ptr == NULL && size != 0)
Manuel Novoa III cad53642003-03-19 09:13:01 +000025 bb_error_msg_and_die(bb_msg_memory_exhausted);
Eric Andersenaad1a882001-03-16 22:47:14 +000026 return ptr;
27}
Manuel Novoa III cad53642003-03-19 09:13:01 +000028#endif
Eric Andersenaad1a882001-03-16 22:47:14 +000029
Manuel Novoa III cad53642003-03-19 09:13:01 +000030#ifdef L_xrealloc
Rob Landley23b61be2006-08-04 20:20:03 +000031// Die if we can't resize previously allocated memory. (This returns a pointer
32// to the new memory, which may or may not be the same as the old memory.
33// It'll copy the contents to a new chunk and free the old one if necessary.)
Rob Landleydfba7412006-03-06 20:47:33 +000034void *xrealloc(void *ptr, size_t size)
Eric Andersenaad1a882001-03-16 22:47:14 +000035{
Matt Kraaia99b1942002-02-26 15:28:22 +000036 ptr = realloc(ptr, size);
37 if (ptr == NULL && size != 0)
Manuel Novoa III cad53642003-03-19 09:13:01 +000038 bb_error_msg_and_die(bb_msg_memory_exhausted);
Eric Andersenaad1a882001-03-16 22:47:14 +000039 return ptr;
40}
Manuel Novoa III cad53642003-03-19 09:13:01 +000041#endif
Eric Andersenaad1a882001-03-16 22:47:14 +000042
Rob Landley80b8ff02006-05-19 20:36:49 +000043#ifdef L_xzalloc
Rob Landley23b61be2006-08-04 20:20:03 +000044// Die if we can't allocate and zero size bytes of memory.
Rob Landley80b8ff02006-05-19 20:36:49 +000045void *xzalloc(size_t size)
46{
47 void *ptr = xmalloc(size);
48 memset(ptr, 0, size);
49 return ptr;
50}
51#endif
52
Eric Andersen9f894f42003-07-05 22:15:43 +000053#endif /* DMALLOC */
Eric Andersenaad1a882001-03-16 22:47:14 +000054
Manuel Novoa III cad53642003-03-19 09:13:01 +000055#ifdef L_xstrdup
Rob Landley23b61be2006-08-04 20:20:03 +000056// Die if we can't copy a string to freshly allocated memory.
57char * xstrdup(const char *s)
Rob Landley31642d72006-03-14 21:45:38 +000058{
Eric Andersenaad1a882001-03-16 22:47:14 +000059 char *t;
60
61 if (s == NULL)
62 return NULL;
63
64 t = strdup (s);
65
66 if (t == NULL)
Manuel Novoa III cad53642003-03-19 09:13:01 +000067 bb_error_msg_and_die(bb_msg_memory_exhausted);
Eric Andersenaad1a882001-03-16 22:47:14 +000068
69 return t;
70}
71#endif
72
Manuel Novoa III cad53642003-03-19 09:13:01 +000073#ifdef L_xstrndup
Rob Landley23b61be2006-08-04 20:20:03 +000074// Die if we can't allocate n+1 bytes (space for the null terminator) and copy
75// the (possibly truncated to length n) string into it.
76char * xstrndup(const char *s, int n)
Rob Landley31642d72006-03-14 21:45:38 +000077{
Eric Andersenaad1a882001-03-16 22:47:14 +000078 char *t;
79
Rob Landley8bbdb872006-06-30 16:36:56 +000080 if (ENABLE_DEBUG && s == NULL)
Rob Landleyd921b2e2006-08-03 15:41:12 +000081 bb_error_msg_and_die("xstrndup bug");
Eric Andersenaad1a882001-03-16 22:47:14 +000082
83 t = xmalloc(++n);
Eric Andersenc7bda1c2004-03-15 08:29:22 +000084
Eric Andersenaad1a882001-03-16 22:47:14 +000085 return safe_strncpy(t,s,n);
86}
Manuel Novoa III cad53642003-03-19 09:13:01 +000087#endif
Eric Andersenaad1a882001-03-16 22:47:14 +000088
Manuel Novoa III cad53642003-03-19 09:13:01 +000089#ifdef L_xfopen
Rob Landley23b61be2006-08-04 20:20:03 +000090// Die if we can't open a file and return a FILE * to it.
91// Notice we haven't got xfread(), This is for use with fscanf() and friends.
Rob Landleyd921b2e2006-08-03 15:41:12 +000092FILE *xfopen(const char *path, const char *mode)
Eric Andersenaad1a882001-03-16 22:47:14 +000093{
94 FILE *fp;
95 if ((fp = fopen(path, mode)) == NULL)
Manuel Novoa III cad53642003-03-19 09:13:01 +000096 bb_perror_msg_and_die("%s", path);
Eric Andersenaad1a882001-03-16 22:47:14 +000097 return fp;
98}
Manuel Novoa III cad53642003-03-19 09:13:01 +000099#endif
Eric Andersenaad1a882001-03-16 22:47:14 +0000100
Manuel Novoa III cad53642003-03-19 09:13:01 +0000101#ifdef L_xopen
Rob Landley23b61be2006-08-04 20:20:03 +0000102// Die if we can't open an existing file and return an fd.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000103int xopen(const char *pathname, int flags)
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000104{
Rob Landley23b61be2006-08-04 20:20:03 +0000105 if (ENABLE_DEBUG && (flags && O_CREAT))
106 bb_error_msg_and_die("xopen() with O_CREAT\n");
107
Rob Landleyd921b2e2006-08-03 15:41:12 +0000108 return xopen3(pathname, flags, 0777);
Bernhard Reutner-Fischerc2cb0f32006-04-13 12:45:04 +0000109}
110#endif
111
112#ifdef L_xopen3
Rob Landley23b61be2006-08-04 20:20:03 +0000113// Die if we can't open a new file and return an fd.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000114int xopen3(const char *pathname, int flags, int mode)
Bernhard Reutner-Fischerc2cb0f32006-04-13 12:45:04 +0000115{
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000116 int ret;
Eric Andersenc7bda1c2004-03-15 08:29:22 +0000117
Bernhard Reutner-Fischerc2cb0f32006-04-13 12:45:04 +0000118 ret = open(pathname, flags, mode);
119 if (ret < 0) {
Manuel Novoa III cad53642003-03-19 09:13:01 +0000120 bb_perror_msg_and_die("%s", pathname);
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000121 }
122 return ret;
123}
Manuel Novoa III cad53642003-03-19 09:13:01 +0000124#endif
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000125
Manuel Novoa III cad53642003-03-19 09:13:01 +0000126#ifdef L_xread
Rob Landley53437472006-07-16 08:14:35 +0000127// Die with an error message if we can't read the entire buffer.
Rob Landley53437472006-07-16 08:14:35 +0000128void xread(int fd, void *buf, size_t count)
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000129{
Manuel Novoa III cad53642003-03-19 09:13:01 +0000130 while (count) {
Rob Landley53437472006-07-16 08:14:35 +0000131 ssize_t size;
132
133 if ((size = safe_read(fd, buf, count)) < 1)
Manuel Novoa III cad53642003-03-19 09:13:01 +0000134 bb_error_msg_and_die("Short read");
Manuel Novoa III cad53642003-03-19 09:13:01 +0000135 count -= size;
Manuel Novoa III 948d4902004-03-08 05:44:30 +0000136 buf = ((char *) buf) + size;
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000137 }
Rob Landley53437472006-07-16 08:14:35 +0000138}
139#endif
140
141#ifdef L_xwrite
Rob Landley53437472006-07-16 08:14:35 +0000142// Die with an error message if we can't write the entire buffer.
Rob Landley53437472006-07-16 08:14:35 +0000143void xwrite(int fd, void *buf, size_t count)
144{
145 while (count) {
146 ssize_t size;
147
148 if ((size = safe_write(fd, buf, count)) < 1)
149 bb_error_msg_and_die("Short write");
150 count -= size;
151 buf = ((char *) buf) + size;
152 }
153}
154#endif
155
156#ifdef L_xlseek
Rob Landley23b61be2006-08-04 20:20:03 +0000157// Die with an error message if we can't lseek to the right spot.
Rob Landley53437472006-07-16 08:14:35 +0000158void xlseek(int fd, off_t offset, int whence)
159{
Rob Landley2c55fca2006-08-04 05:24:58 +0000160 if (offset != lseek(fd, offset, whence)) bb_error_msg_and_die("lseek");
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000161}
Manuel Novoa III cad53642003-03-19 09:13:01 +0000162#endif
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000163
Manuel Novoa III cad53642003-03-19 09:13:01 +0000164#ifdef L_xread_char
Rob Landley23b61be2006-08-04 20:20:03 +0000165// Die with an error message if we can't read one character.
Rob Landley53437472006-07-16 08:14:35 +0000166unsigned char xread_char(int fd)
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000167{
168 char tmp;
Eric Andersenc7bda1c2004-03-15 08:29:22 +0000169
Rob Landley53437472006-07-16 08:14:35 +0000170 xread(fd, &tmp, 1);
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000171
Eric Andersenc7bda1c2004-03-15 08:29:22 +0000172 return(tmp);
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000173}
Manuel Novoa III cad53642003-03-19 09:13:01 +0000174#endif
Glenn L McGrath7ca04f32002-09-25 02:47:48 +0000175
Manuel Novoa III cad53642003-03-19 09:13:01 +0000176#ifdef L_xferror
Rob Landley23b61be2006-08-04 20:20:03 +0000177// Die with supplied error message if this FILE * has ferror set.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000178void xferror(FILE *fp, const char *fn)
Manuel Novoa III cad53642003-03-19 09:13:01 +0000179{
180 if (ferror(fp)) {
181 bb_error_msg_and_die("%s", fn);
182 }
183}
184#endif
185
186#ifdef L_xferror_stdout
Rob Landley23b61be2006-08-04 20:20:03 +0000187// Die with an error message if stdout has ferror set.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000188void xferror_stdout(void)
Manuel Novoa III cad53642003-03-19 09:13:01 +0000189{
Rob Landleyd921b2e2006-08-03 15:41:12 +0000190 xferror(stdout, bb_msg_standard_output);
Manuel Novoa III cad53642003-03-19 09:13:01 +0000191}
192#endif
193
194#ifdef L_xfflush_stdout
Rob Landley23b61be2006-08-04 20:20:03 +0000195// Die with an error message if we have trouble flushing stdout.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000196void xfflush_stdout(void)
Manuel Novoa III cad53642003-03-19 09:13:01 +0000197{
198 if (fflush(stdout)) {
199 bb_perror_msg_and_die(bb_msg_standard_output);
200 }
201}
202#endif
Rob Landley399d2b52006-05-25 23:02:40 +0000203
204#ifdef L_spawn
Rob Landley23b61be2006-08-04 20:20:03 +0000205// This does a fork/exec in one call, using vfork(). Return PID of new child,
206// -1 for failure. Runs argv[0], searching path if that has no / in it.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000207pid_t spawn(char **argv)
Rob Landley399d2b52006-05-25 23:02:40 +0000208{
209 static int failed;
210 pid_t pid;
Rob Landley519d7df2006-08-09 20:56:23 +0000211 void *app = ENABLE_FEATURE_SH_STANDALONE_SHELL ? find_applet_by_name(argv[0]) : 0;
Rob Landley399d2b52006-05-25 23:02:40 +0000212
213 // Be nice to nommu machines.
214 failed = 0;
215 pid = vfork();
216 if (pid < 0) return pid;
217 if (!pid) {
Rob Landleyc7ddefc2006-06-14 01:24:33 +0000218 execvp(app ? CONFIG_BUSYBOX_EXEC_PATH : *argv, argv);
Rob Landley399d2b52006-05-25 23:02:40 +0000219
220 // We're sharing a stack with blocked parent, let parent know we failed
221 // and then exit to unblock parent (but don't run atexit() stuff, which
222 // would screw up parent.)
223
224 failed = -1;
225 _exit(0);
226 }
227 return failed ? failed : pid;
228}
229#endif
230
231#ifdef L_xspawn
Rob Landley23b61be2006-08-04 20:20:03 +0000232// Die with an error message if we can't spawn a child process.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000233pid_t xspawn(char **argv)
Rob Landley399d2b52006-05-25 23:02:40 +0000234{
Rob Landleyd921b2e2006-08-03 15:41:12 +0000235 pid_t pid = spawn(argv);
Rob Landley399d2b52006-05-25 23:02:40 +0000236 if (pid < 0) bb_perror_msg_and_die("%s", *argv);
237 return pid;
238}
239#endif
Rob Landleyc7ddefc2006-06-14 01:24:33 +0000240
241#ifdef L_wait4
Rob Landley23b61be2006-08-04 20:20:03 +0000242// Wait for the specified child PID to exit, returning child's error return.
Rob Landleyc7ddefc2006-06-14 01:24:33 +0000243int wait4pid(int pid)
244{
245 int status;
246
247 if (pid == -1 || waitpid(pid, &status, 0) == -1) return -1;
248 if (WIFEXITED(status)) return WEXITSTATUS(status);
249 if (WIFSIGNALED(status)) return WTERMSIG(status);
250 return 0;
251}
Rob Landley5b88a382006-07-10 07:41:34 +0000252#endif
253
254#ifdef L_itoa
Rob Landley23b61be2006-08-04 20:20:03 +0000255// Convert unsigned integer to ascii, writing into supplied buffer. A
256// truncated result is always null terminated (unless buflen is 0), and
257// contains the first few digits of the result ala strncpy.
Rob Landley22d39582006-07-11 00:44:36 +0000258void utoa_to_buf(unsigned n, char *buf, unsigned buflen)
Rob Landley5b88a382006-07-10 07:41:34 +0000259{
260 int i, out = 0;
Rob Landley22d39582006-07-11 00:44:36 +0000261 if (buflen) {
262 for (i=1000000000; i; i/=10) {
263 int res = n/i;
Rob Landley5b88a382006-07-10 07:41:34 +0000264
Rob Landley22d39582006-07-11 00:44:36 +0000265 if ((res || out || i == 1) && --buflen>0) {
266 out++;
267 n -= res*i;
268 *buf++ = '0' + res;
269 }
Rob Landley5b88a382006-07-10 07:41:34 +0000270 }
Rob Landley22d39582006-07-11 00:44:36 +0000271 *buf = 0;
Rob Landley5b88a382006-07-10 07:41:34 +0000272 }
Rob Landley5b88a382006-07-10 07:41:34 +0000273}
274
Rob Landley23b61be2006-08-04 20:20:03 +0000275// Convert signed integer to ascii, like utoa_to_buf()
Rob Landley22d39582006-07-11 00:44:36 +0000276void itoa_to_buf(int n, char *buf, unsigned buflen)
Rob Landley5b88a382006-07-10 07:41:34 +0000277{
Rob Landley22d39582006-07-11 00:44:36 +0000278 if (buflen && n<0) {
Rob Landley5b88a382006-07-10 07:41:34 +0000279 n = -n;
280 *buf++ = '-';
Rob Landley22d39582006-07-11 00:44:36 +0000281 buflen--;
Rob Landley5b88a382006-07-10 07:41:34 +0000282 }
283 utoa_to_buf((unsigned)n, buf, buflen);
284}
285
Rob Landley23b61be2006-08-04 20:20:03 +0000286// The following two functions use a static buffer, so calling either one a
287// second time will overwrite previous results.
288//
289// The largest 32 bit integer is -2 billion plus null terminator, or 12 bytes.
290// Int should always be 32 bits on any remotely Unix-like system, see
291// http://www.unix.org/whitepapers/64bit.html for the reasons why.
Rob Landley5b88a382006-07-10 07:41:34 +0000292
Rob Landley23b61be2006-08-04 20:20:03 +0000293static char local_buf[12];
294
295// Convert unsigned integer to ascii using a static buffer (returned).
296char *utoa(unsigned n)
297{
298 utoa_to_buf(n, local_buf, sizeof(local_buf));
299
300 return local_buf;
301}
302
303// Convert signed integer to ascii using a static buffer (returned).
Rob Landley5b88a382006-07-10 07:41:34 +0000304char *itoa(int n)
305{
306 itoa_to_buf(n, local_buf, sizeof(local_buf));
307
308 return local_buf;
309}
310#endif
Rob Landleydf822f22006-07-15 23:00:46 +0000311
312#ifdef L_setuid
Rob Landley23b61be2006-08-04 20:20:03 +0000313// Die with an error message if we can't set gid. (Because resource limits may
314// limit this user to a given number of processes, and if that fills up the
315// setgid() will fail and we'll _still_be_root_, which is bad.)
Rob Landleydf822f22006-07-15 23:00:46 +0000316void xsetgid(gid_t gid)
317{
318 if (setgid(gid)) bb_error_msg_and_die("setgid");
319}
320
Rob Landley23b61be2006-08-04 20:20:03 +0000321// Die with an error message if we cant' set uid. (See xsetgid() for why.)
Rob Landleydf822f22006-07-15 23:00:46 +0000322void xsetuid(uid_t uid)
323{
324 if (setuid(uid)) bb_error_msg_and_die("setuid");
325}
326#endif
Rob Landley53437472006-07-16 08:14:35 +0000327
328#ifdef L_fdlength
Rob Landley23b61be2006-08-04 20:20:03 +0000329// Return how long the file at fd is, if there's any way to determine it.
Rob Landley53437472006-07-16 08:14:35 +0000330off_t fdlength(int fd)
331{
332 off_t bottom = 0, top = 0, pos;
333 long size;
334
335 // If the ioctl works for this, return it.
336
337 if (ioctl(fd, BLKGETSIZE, &size) >= 0) return size*512;
338
Rob Landley23b61be2006-08-04 20:20:03 +0000339 // If not, do a binary search for the last location we can read. (Some
340 // block devices don't do BLKGETSIZE right.)
Rob Landley53437472006-07-16 08:14:35 +0000341
342 do {
343 char temp;
344
345 pos = bottom + (top - bottom) / 2;;
346
347 // If we can read from the current location, it's bigger.
348
349 if (lseek(fd, pos, 0)>=0 && safe_read(fd, &temp, 1)==1) {
350 if (bottom == top) bottom = top = (top+1) * 2;
351 else bottom = pos;
352
353 // If we can't, it's smaller.
354
355 } else {
356 if (bottom == top) {
357 if (!top) return 0;
358 bottom = top/2;
359 }
360 else top = pos;
361 }
362 } while (bottom + 1 != top);
363
364 return pos + 1;
365}
366#endif
Rob Landleyd921b2e2006-08-03 15:41:12 +0000367
368#ifdef L_xasprintf
Rob Landley23b61be2006-08-04 20:20:03 +0000369// Die with an error message if we can't malloc() enough space and do an
370// sprintf() into that space.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000371char *xasprintf(const char *format, ...)
372{
373 va_list p;
374 int r;
375 char *string_ptr;
376
377#if 1
378 // GNU extension
379 va_start(p, format);
380 r = vasprintf(&string_ptr, format, p);
381 va_end(p);
382#else
383 // Bloat for systems that haven't got the GNU extension.
384 va_start(p, format);
385 r = vsnprintf(NULL, 0, format, p);
386 va_end(p);
387 string_ptr = xmalloc(r+1);
388 va_start(p, format);
389 r = vsnprintf(string_ptr, r+1, format, p);
390 va_end(p);
391#endif
392
393 if (r < 0) bb_perror_msg_and_die("xasprintf");
394 return string_ptr;
395}
396#endif
397
398#ifdef L_xprint_and_close_file
Rob Landley23b61be2006-08-04 20:20:03 +0000399// Die with an error message if we can't copy an entire FILE * to stdout, then
400// close that file.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000401void xprint_and_close_file(FILE *file)
402{
403 // copyfd outputs error messages for us.
404 if (bb_copyfd_eof(fileno(file), 1) == -1) exit(bb_default_error_retval);
405
406 fclose(file);
407}
408#endif
409
410#ifdef L_xchdir
Rob Landley23b61be2006-08-04 20:20:03 +0000411// Die if we can't chdir to a new path.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000412void xchdir(const char *path)
413{
414 if (chdir(path))
415 bb_perror_msg_and_die("chdir(%s)", path);
416}
417#endif
418
419#ifdef L_warn_opendir
Rob Landley23b61be2006-08-04 20:20:03 +0000420// Print a warning message if opendir() fails, but don't die.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000421DIR *warn_opendir(const char *path)
422{
423 DIR *dp;
424
425 if ((dp = opendir(path)) == NULL) {
426 bb_perror_msg("unable to open `%s'", path);
427 return NULL;
428 }
429 return dp;
430}
431#endif
432
433#ifdef L_xopendir
Rob Landley23b61be2006-08-04 20:20:03 +0000434// Die with an error message if opendir() fails.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000435DIR *xopendir(const char *path)
436{
437 DIR *dp;
438
439 if ((dp = opendir(path)) == NULL)
440 bb_perror_msg_and_die("unable to open `%s'", path);
441 return dp;
442}
443#endif
444
445#ifdef L_xdaemon
446#ifndef BB_NOMMU
Rob Landley23b61be2006-08-04 20:20:03 +0000447// Die with an error message if we can't daemonize.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000448void xdaemon(int nochdir, int noclose)
449{
450 if (daemon(nochdir, noclose)) bb_perror_msg_and_die("daemon");
451}
452#endif
453#endif
454
Rob Landleyd921b2e2006-08-03 15:41:12 +0000455#ifdef L_xsocket
Rob Landley23b61be2006-08-04 20:20:03 +0000456// Die with an error message if we can't open a new socket.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000457int xsocket(int domain, int type, int protocol)
458{
459 int r = socket(domain, type, protocol);
460
461 if (r < 0) bb_perror_msg_and_die("socket");
462
463 return r;
464}
465#endif
466
Rob Landley23b61be2006-08-04 20:20:03 +0000467#ifdef L_xbind
468// Die with an error message if we can't bind a socket to an address.
469void xbind(int sockfd, struct sockaddr *my_addr, socklen_t addrlen)
470{
471 if (bind(sockfd, my_addr, addrlen)) bb_perror_msg_and_die("bind");
472}
473#endif
474
Rob Landleyd921b2e2006-08-03 15:41:12 +0000475#ifdef L_xlisten
Rob Landley23b61be2006-08-04 20:20:03 +0000476// Die with an error message if we can't listen for connections on a socket.
Rob Landleyd921b2e2006-08-03 15:41:12 +0000477void xlisten(int s, int backlog)
478{
479 if (listen(s, backlog)) bb_perror_msg_and_die("listen");
480}
481#endif