blob: f3af144f0636533e5be82ea9296f7994abfaa2d2 [file] [log] [blame]
Denis Vlasenkoea620772006-10-14 02:23:43 +00001/* vi: set sw=4 ts=4: */
2/*
3 * Utility routines.
4 *
5 * Copyright (C) 1999-2004 by Erik Andersen <andersen@codepoet.org>
6 *
7 * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
8 */
Denis Vlasenkoea620772006-10-14 02:23:43 +00009#include "libbb.h"
Denis Vlasenkoe9ad84d2008-08-05 13:10:34 +000010
11#define ZIPPED (ENABLE_FEATURE_SEAMLESS_LZMA \
12 || ENABLE_FEATURE_SEAMLESS_BZ2 \
13 || ENABLE_FEATURE_SEAMLESS_GZ \
14 /* || ENABLE_FEATURE_SEAMLESS_Z */ \
15)
16
17#if ZIPPED
Denys Vlasenko27653ad2010-05-06 14:19:19 +000018# include "unarchive.h"
Denis Vlasenkob6052722008-07-10 17:43:01 +000019#endif
Denis Vlasenkoea620772006-10-14 02:23:43 +000020
Denis Vlasenkodefc1ea2008-06-27 02:52:20 +000021ssize_t FAST_FUNC safe_read(int fd, void *buf, size_t count)
Denis Vlasenkoea620772006-10-14 02:23:43 +000022{
23 ssize_t n;
24
25 do {
26 n = read(fd, buf, count);
27 } while (n < 0 && errno == EINTR);
28
29 return n;
30}
31
Denis Vlasenkoe376d452008-02-20 22:23:24 +000032/* Suppose that you are a shell. You start child processes.
33 * They work and eventually exit. You want to get user input.
34 * You read stdin. But what happens if last child switched
35 * its stdin into O_NONBLOCK mode?
36 *
37 * *** SURPRISE! It will affect the parent too! ***
38 * *** BIG SURPRISE! It stays even after child exits! ***
39 *
40 * This is a design bug in UNIX API.
Denys Vlasenkoab19ede2009-11-11 21:05:42 +010041 * fcntl(0, F_SETFL, fcntl(0, F_GETFL) | O_NONBLOCK);
Denis Vlasenkoe376d452008-02-20 22:23:24 +000042 * will set nonblocking mode not only on _your_ stdin, but
43 * also on stdin of your parent, etc.
44 *
45 * In general,
46 * fd2 = dup(fd1);
Denys Vlasenkoab19ede2009-11-11 21:05:42 +010047 * fcntl(fd2, F_SETFL, fcntl(fd2, F_GETFL) | O_NONBLOCK);
Denis Vlasenkoe376d452008-02-20 22:23:24 +000048 * sets both fd1 and fd2 to O_NONBLOCK. This includes cases
49 * where duping is done implicitly by fork() etc.
50 *
51 * We need
Denys Vlasenkoab19ede2009-11-11 21:05:42 +010052 * fcntl(fd2, F_SETFD, fcntl(fd2, F_GETFD) | O_NONBLOCK);
Denis Vlasenkoe376d452008-02-20 22:23:24 +000053 * (note SETFD, not SETFL!) but such thing doesn't exist.
54 *
55 * Alternatively, we need nonblocking_read(fd, ...) which doesn't
56 * require O_NONBLOCK dance at all. Actually, it exists:
57 * n = recv(fd, buf, len, MSG_DONTWAIT);
58 * "MSG_DONTWAIT:
59 * Enables non-blocking operation; if the operation
60 * would block, EAGAIN is returned."
61 * but recv() works only for sockets!
62 *
63 * So far I don't see any good solution, I can only propose
64 * that affected readers should be careful and use this routine,
65 * which detects EAGAIN and uses poll() to wait on the fd.
Denis Vlasenko081efd12008-02-20 22:57:24 +000066 * Thankfully, poll() doesn't care about O_NONBLOCK flag.
Denis Vlasenkoe376d452008-02-20 22:23:24 +000067 */
Denis Vlasenkodefc1ea2008-06-27 02:52:20 +000068ssize_t FAST_FUNC nonblock_safe_read(int fd, void *buf, size_t count)
Denis Vlasenkoe376d452008-02-20 22:23:24 +000069{
70 struct pollfd pfd[1];
71 ssize_t n;
72
73 while (1) {
74 n = safe_read(fd, buf, count);
75 if (n >= 0 || errno != EAGAIN)
76 return n;
77 /* fd is in O_NONBLOCK mode. Wait using poll and repeat */
78 pfd[0].fd = fd;
79 pfd[0].events = POLLIN;
80 safe_poll(pfd, 1, -1);
81 }
82}
83
Denis Vlasenkoea620772006-10-14 02:23:43 +000084/*
85 * Read all of the supplied buffer from a file.
86 * This does multiple reads as necessary.
87 * Returns the amount read, or -1 on an error.
88 * A short read is returned on an end of file.
89 */
Denis Vlasenkodefc1ea2008-06-27 02:52:20 +000090ssize_t FAST_FUNC full_read(int fd, void *buf, size_t len)
Denis Vlasenkoea620772006-10-14 02:23:43 +000091{
92 ssize_t cc;
93 ssize_t total;
94
95 total = 0;
96
97 while (len) {
98 cc = safe_read(fd, buf, len);
99
Denis Vlasenko394eebe2008-02-25 20:30:24 +0000100 if (cc < 0) {
101 if (total) {
102 /* we already have some! */
103 /* user can do another read to know the error code */
104 return total;
105 }
106 return cc; /* read() returns -1 on failure. */
107 }
Denis Vlasenkoea620772006-10-14 02:23:43 +0000108 if (cc == 0)
109 break;
Denis Vlasenkoea620772006-10-14 02:23:43 +0000110 buf = ((char *)buf) + cc;
111 total += cc;
112 len -= cc;
113 }
114
115 return total;
116}
117
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000118/* Die with an error message if we can't read the entire buffer. */
Denis Vlasenkodefc1ea2008-06-27 02:52:20 +0000119void FAST_FUNC xread(int fd, void *buf, size_t count)
Denis Vlasenkoea620772006-10-14 02:23:43 +0000120{
121 if (count) {
122 ssize_t size = full_read(fd, buf, count);
Denis Vlasenko77ad97f2008-05-13 02:27:31 +0000123 if ((size_t)size != count)
Denis Vlasenkoea620772006-10-14 02:23:43 +0000124 bb_error_msg_and_die("short read");
125 }
126}
127
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000128/* Die with an error message if we can't read one character. */
Denis Vlasenkodefc1ea2008-06-27 02:52:20 +0000129unsigned char FAST_FUNC xread_char(int fd)
Denis Vlasenkoea620772006-10-14 02:23:43 +0000130{
131 char tmp;
Denis Vlasenkoea620772006-10-14 02:23:43 +0000132 xread(fd, &tmp, 1);
Denis Vlasenkoea620772006-10-14 02:23:43 +0000133 return tmp;
134}
135
Denis Vlasenko8ee649a2008-03-26 20:04:27 +0000136// Reads one line a-la fgets (but doesn't save terminating '\n').
137// Reads byte-by-byte. Useful when it is important to not read ahead.
Denis Vlasenkoe376d452008-02-20 22:23:24 +0000138// Bytes are appended to pfx (which must be malloced, or NULL).
Denis Vlasenkodefc1ea2008-06-27 02:52:20 +0000139char* FAST_FUNC xmalloc_reads(int fd, char *buf, size_t *maxsz_p)
Denis Vlasenkod67cef22007-06-13 06:47:47 +0000140{
141 char *p;
Denis Vlasenko0b6c6a92008-03-24 00:04:42 +0000142 size_t sz = buf ? strlen(buf) : 0;
Denis Vlasenko9f57cf62009-03-18 17:32:44 +0000143 size_t maxsz = maxsz_p ? *maxsz_p : (INT_MAX - 4095);
Denis Vlasenkod67cef22007-06-13 06:47:47 +0000144
145 goto jump_in;
Denis Vlasenko0b6c6a92008-03-24 00:04:42 +0000146 while (sz < maxsz) {
Denis Vlasenko77ad97f2008-05-13 02:27:31 +0000147 if ((size_t)(p - buf) == sz) {
Denis Vlasenkod67cef22007-06-13 06:47:47 +0000148 jump_in:
149 buf = xrealloc(buf, sz + 128);
150 p = buf + sz;
151 sz += 128;
152 }
Denis Vlasenkoe376d452008-02-20 22:23:24 +0000153 /* nonblock_safe_read() because we are used by e.g. shells */
154 if (nonblock_safe_read(fd, p, 1) != 1) { /* EOF/error */
Denis Vlasenkof99afb52008-02-24 23:32:36 +0000155 if (p == buf) { /* we read nothing */
Denis Vlasenkod67cef22007-06-13 06:47:47 +0000156 free(buf);
157 return NULL;
158 }
159 break;
160 }
161 if (*p == '\n')
162 break;
163 p++;
164 }
Denis Vlasenko8ee649a2008-03-26 20:04:27 +0000165 *p = '\0';
Denis Vlasenko0b6c6a92008-03-24 00:04:42 +0000166 if (maxsz_p)
Denis Vlasenko8ee649a2008-03-26 20:04:27 +0000167 *maxsz_p = p - buf;
168 p++;
Denis Vlasenkod67cef22007-06-13 06:47:47 +0000169 return xrealloc(buf, p - buf);
170}
171
Denis Vlasenkodefc1ea2008-06-27 02:52:20 +0000172ssize_t FAST_FUNC read_close(int fd, void *buf, size_t size)
Denis Vlasenkoea620772006-10-14 02:23:43 +0000173{
Denis Vlasenko98ebab82007-06-30 14:47:41 +0000174 /*int e;*/
Denis Vlasenkoea620772006-10-14 02:23:43 +0000175 size = full_read(fd, buf, size);
Denis Vlasenko98ebab82007-06-30 14:47:41 +0000176 /*e = errno;*/
Denis Vlasenkoea620772006-10-14 02:23:43 +0000177 close(fd);
Denis Vlasenko98ebab82007-06-30 14:47:41 +0000178 /*errno = e;*/
Denis Vlasenkoea620772006-10-14 02:23:43 +0000179 return size;
180}
181
Denis Vlasenkodefc1ea2008-06-27 02:52:20 +0000182ssize_t FAST_FUNC open_read_close(const char *filename, void *buf, size_t size)
Denis Vlasenkoea620772006-10-14 02:23:43 +0000183{
184 int fd = open(filename, O_RDONLY);
185 if (fd < 0)
186 return fd;
187 return read_close(fd, buf, size);
188}
189
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000190
Denis Vlasenkofe733a92008-06-24 16:08:22 +0000191// Read (potentially big) files in one go. File size is estimated
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000192// by stat. Extra '\0' byte is appended.
Denis Vlasenkob6052722008-07-10 17:43:01 +0000193void* FAST_FUNC xmalloc_read(int fd, size_t *maxsz_p)
Denis Vlasenkoea620772006-10-14 02:23:43 +0000194{
195 char *buf;
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000196 size_t size, rd_size, total;
Denis Vlasenkob6052722008-07-10 17:43:01 +0000197 size_t to_read;
Denis Vlasenko0a144622008-04-20 14:45:43 +0000198 struct stat st;
199
Denis Vlasenko9f57cf62009-03-18 17:32:44 +0000200 to_read = maxsz_p ? *maxsz_p : (INT_MAX - 4095); /* max to read */
Denis Vlasenko0a144622008-04-20 14:45:43 +0000201
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000202 /* Estimate file size */
203 st.st_size = 0; /* in case fstat fails, assume 0 */
Denis Vlasenko0a144622008-04-20 14:45:43 +0000204 fstat(fd, &st);
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000205 /* /proc/N/stat files report st_size 0 */
Denis Vlasenko0a144622008-04-20 14:45:43 +0000206 /* In order to make such files readable, we add small const */
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000207 size = (st.st_size | 0x3ff) + 1;
208
209 total = 0;
210 buf = NULL;
211 while (1) {
212 if (to_read < size)
213 size = to_read;
214 buf = xrealloc(buf, total + size + 1);
215 rd_size = full_read(fd, buf + total, size);
Denis Vlasenkob6052722008-07-10 17:43:01 +0000216 if ((ssize_t)rd_size == (ssize_t)(-1)) { /* error */
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000217 free(buf);
218 return NULL;
219 }
220 total += rd_size;
221 if (rd_size < size) /* EOF */
222 break;
Denis Vlasenkob6052722008-07-10 17:43:01 +0000223 if (to_read <= rd_size)
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000224 break;
Denis Vlasenkob6052722008-07-10 17:43:01 +0000225 to_read -= rd_size;
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000226 /* grow by 1/8, but in [1k..64k] bounds */
227 size = ((total / 8) | 0x3ff) + 1;
228 if (size > 64*1024)
229 size = 64*1024;
Denis Vlasenko0a144622008-04-20 14:45:43 +0000230 }
Denys Vlasenko071ede12009-05-15 23:23:23 +0200231 buf = xrealloc(buf, total + 1);
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000232 buf[total] = '\0';
Denis Vlasenko0a144622008-04-20 14:45:43 +0000233
Denis Vlasenkob6052722008-07-10 17:43:01 +0000234 if (maxsz_p)
235 *maxsz_p = total;
Denis Vlasenko0a144622008-04-20 14:45:43 +0000236 return buf;
237}
238
239#ifdef USING_LSEEK_TO_GET_SIZE
240/* Alternatively, file size can be obtained by lseek to the end.
241 * The code is slightly bigger. Retained in case fstat approach
242 * will not work for some weird cases (/proc, block devices, etc).
243 * (NB: lseek also can fail to work for some weird files) */
244
245// Read (potentially big) files in one go. File size is estimated by
246// lseek to end.
Denis Vlasenkob6052722008-07-10 17:43:01 +0000247void* FAST_FUNC xmalloc_open_read_close(const char *filename, size_t *maxsz_p)
Denis Vlasenko0a144622008-04-20 14:45:43 +0000248{
249 char *buf;
250 size_t size;
251 int fd;
252 off_t len;
Denis Vlasenkod67cef22007-06-13 06:47:47 +0000253
Denis Vlasenkof3745ea2008-04-19 19:32:08 +0000254 fd = open(filename, O_RDONLY);
255 if (fd < 0)
256 return NULL;
Denis Vlasenko25cfe492008-04-20 01:27:59 +0000257
Denis Vlasenkob131b272006-12-17 17:30:01 +0000258 /* /proc/N/stat files report len 0 here */
259 /* In order to make such files readable, we add small const */
Denis Vlasenko25cfe492008-04-20 01:27:59 +0000260 size = 0x3ff; /* read only 1k on unseekable files */
261 len = lseek(fd, 0, SEEK_END) | 0x3ff; /* + up to 1k */
262 if (len != (off_t)-1) {
263 xlseek(fd, 0, SEEK_SET);
Denis Vlasenko9f57cf62009-03-18 17:32:44 +0000264 size = maxsz_p ? *maxsz_p : (INT_MAX - 4095);
Denis Vlasenko25cfe492008-04-20 01:27:59 +0000265 if (len < size)
266 size = len;
267 }
268
Denis Vlasenkob131b272006-12-17 17:30:01 +0000269 buf = xmalloc(size + 1);
Denis Vlasenkoea620772006-10-14 02:23:43 +0000270 size = read_close(fd, buf, size);
Denis Vlasenko25cfe492008-04-20 01:27:59 +0000271 if ((ssize_t)size < 0) {
272 free(buf);
273 return NULL;
274 }
Denys Vlasenko071ede12009-05-15 23:23:23 +0200275 buf = xrealloc(buf, size + 1);
Denis Vlasenkoea620772006-10-14 02:23:43 +0000276 buf[size] = '\0';
Denis Vlasenko25cfe492008-04-20 01:27:59 +0000277
Denis Vlasenkob6052722008-07-10 17:43:01 +0000278 if (maxsz_p)
279 *maxsz_p = size;
Denis Vlasenkoea620772006-10-14 02:23:43 +0000280 return buf;
281}
Denis Vlasenko0a144622008-04-20 14:45:43 +0000282#endif
Denis Vlasenkof3745ea2008-04-19 19:32:08 +0000283
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000284// Read (potentially big) files in one go. File size is estimated
285// by stat.
Denis Vlasenkob6052722008-07-10 17:43:01 +0000286void* FAST_FUNC xmalloc_open_read_close(const char *filename, size_t *maxsz_p)
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000287{
288 char *buf;
289 int fd;
290
291 fd = open(filename, O_RDONLY);
292 if (fd < 0)
293 return NULL;
294
Denis Vlasenkob6052722008-07-10 17:43:01 +0000295 buf = xmalloc_read(fd, maxsz_p);
Denis Vlasenkof62ab2d2008-07-09 09:50:33 +0000296 close(fd);
297 return buf;
298}
299
Denis Vlasenkob6052722008-07-10 17:43:01 +0000300void* FAST_FUNC xmalloc_xopen_read_close(const char *filename, size_t *maxsz_p)
Denis Vlasenkof3745ea2008-04-19 19:32:08 +0000301{
Denis Vlasenkob6052722008-07-10 17:43:01 +0000302 void *buf = xmalloc_open_read_close(filename, maxsz_p);
Denis Vlasenkof3745ea2008-04-19 19:32:08 +0000303 if (!buf)
304 bb_perror_msg_and_die("can't read '%s'", filename);
305 return buf;
306}
Denis Vlasenkob6052722008-07-10 17:43:01 +0000307
Denys Vlasenko27653ad2010-05-06 14:19:19 +0000308#if ZIPPED
309int FAST_FUNC setup_unzip_on_fd(int fd /*, int fail_if_not_detected*/)
Denis Vlasenkoe9ad84d2008-08-05 13:10:34 +0000310{
Denys Vlasenko27653ad2010-05-06 14:19:19 +0000311 const int fail_if_not_detected = 1;
Denis Vlasenkoe9ad84d2008-08-05 13:10:34 +0000312 unsigned char magic[2];
Denis Vlasenkoe9ad84d2008-08-05 13:10:34 +0000313#if BB_MMU
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000314 IF_DESKTOP(long long) int FAST_FUNC (*xformer)(int src_fd, int dst_fd);
Denis Vlasenkoe9ad84d2008-08-05 13:10:34 +0000315 enum { xformer_prog = 0 };
316#else
317 enum { xformer = 0 };
318 const char *xformer_prog;
319#endif
320
Denys Vlasenko27653ad2010-05-06 14:19:19 +0000321 /* .gz and .bz2 both have 2-byte signature, and their
322 * unpack_XXX_stream wants this header skipped. */
323 xread(fd, &magic, 2);
Denys Vlasenkobfa1b2e2010-05-11 03:53:57 +0200324 if (ENABLE_FEATURE_SEAMLESS_GZ
325 && magic[0] == 0x1f && magic[1] == 0x8b
Denys Vlasenko27653ad2010-05-06 14:19:19 +0000326 ) {
Denys Vlasenkobfa1b2e2010-05-11 03:53:57 +0200327# if BB_MMU
328 xformer = unpack_gz_stream;
329# else
330 xformer_prog = "gunzip";
331# endif
332 goto found_magic;
333 }
334 if (ENABLE_FEATURE_SEAMLESS_BZ2
335 && magic[0] == 'B' && magic[1] == 'Z'
336 ) {
337# if BB_MMU
338 xformer = unpack_bz2_stream;
339# else
340 xformer_prog = "bunzip2";
341# endif
342 goto found_magic;
343 }
Denys Vlasenkoc2345fa2010-05-06 17:05:22 +0200344// TODO: xz format support. rpm adopted it, "rpm -i FILE.rpm" badly needs this.
345// Signature: 0xFD, '7', 'z', 'X', 'Z', 0x00
346// More info at: http://tukaani.org/xz/xz-file-format.txt
347
Denys Vlasenkobfa1b2e2010-05-11 03:53:57 +0200348 /* No known magic seen */
349 if (fail_if_not_detected)
350 bb_error_msg_and_die("no gzip"
351 IF_FEATURE_SEAMLESS_BZ2("/bzip2")
352 " magic");
353 xlseek(fd, -2, SEEK_CUR);
354 return fd;
355
356 found_magic:
357# if !BB_MMU
358 /* NOMMU version of open_transformer execs
359 * an external unzipper that wants
360 * file position at the start of the file */
361 xlseek(fd, -2, SEEK_CUR);
362# endif
Denys Vlasenko27653ad2010-05-06 14:19:19 +0000363 open_transformer(fd, xformer, xformer_prog);
364
365 return fd;
366}
367#endif /* ZIPPED */
368
369int FAST_FUNC open_zipped(const char *fname)
370{
371#if !ZIPPED
372 return open(fname, O_RDONLY);
373#else
374 char *sfx;
375 int fd;
376
Denis Vlasenkoe9ad84d2008-08-05 13:10:34 +0000377 fd = open(fname, O_RDONLY);
378 if (fd < 0)
379 return fd;
380
381 sfx = strrchr(fname, '.');
382 if (sfx) {
383 if (ENABLE_FEATURE_SEAMLESS_LZMA && strcmp(sfx, ".lzma") == 0)
384 /* .lzma has no header/signature, just trust it */
385 open_transformer(fd, unpack_lzma_stream, "unlzma");
386 else
387 if ((ENABLE_FEATURE_SEAMLESS_GZ && strcmp(sfx, ".gz") == 0)
388 || (ENABLE_FEATURE_SEAMLESS_BZ2 && strcmp(sfx, ".bz2") == 0)
389 ) {
Denys Vlasenko27653ad2010-05-06 14:19:19 +0000390 setup_unzip_on_fd(fd /*, fail_if_not_detected: 1*/);
Denis Vlasenkoe9ad84d2008-08-05 13:10:34 +0000391 }
392 }
393
394 return fd;
395#endif
396}
397
Denis Vlasenkob6052722008-07-10 17:43:01 +0000398void* FAST_FUNC xmalloc_open_zipped_read_close(const char *fname, size_t *maxsz_p)
399{
Denis Vlasenkoe9ad84d2008-08-05 13:10:34 +0000400 int fd;
Denis Vlasenkob6052722008-07-10 17:43:01 +0000401 char *image;
Denis Vlasenkob6052722008-07-10 17:43:01 +0000402
Denis Vlasenkoe9ad84d2008-08-05 13:10:34 +0000403 fd = open_zipped(fname);
Denis Vlasenkob6052722008-07-10 17:43:01 +0000404 if (fd < 0)
405 return NULL;
406
Denis Vlasenkob6052722008-07-10 17:43:01 +0000407 image = xmalloc_read(fd, maxsz_p);
408 if (!image)
409 bb_perror_msg("read error from '%s'", fname);
410 close(fd);
411
412 return image;
413}