Fix mingw32 build warnings
[qemu/hppa.git] / slirp / misc.c
blob1391d491d7d425bf59d50175aabe5e138d04f77e
1 /*
2 * Copyright (c) 1995 Danny Gasparovski.
4 * Please read the file COPYRIGHT for the
5 * terms and conditions of the copyright.
6 */
8 #include <slirp.h>
10 u_int curtime, time_fasttimo, last_slowtimo;
12 #if 0
13 int x_port = -1;
14 int x_display = 0;
15 int x_screen = 0;
17 int
18 show_x(buff, inso)
19 char *buff;
20 struct socket *inso;
22 if (x_port < 0) {
23 lprint("X Redir: X not being redirected.\r\n");
24 } else {
25 lprint("X Redir: In sh/bash/zsh/etc. type: DISPLAY=%s:%d.%d; export DISPLAY\r\n",
26 inet_ntoa(our_addr), x_port, x_screen);
27 lprint("X Redir: In csh/tcsh/etc. type: setenv DISPLAY %s:%d.%d\r\n",
28 inet_ntoa(our_addr), x_port, x_screen);
29 if (x_display)
30 lprint("X Redir: Redirecting to display %d\r\n", x_display);
33 return CFG_OK;
38 * XXX Allow more than one X redirection?
40 void
41 redir_x(inaddr, start_port, display, screen)
42 u_int32_t inaddr;
43 int start_port;
44 int display;
45 int screen;
47 int i;
49 if (x_port >= 0) {
50 lprint("X Redir: X already being redirected.\r\n");
51 show_x(0, 0);
52 } else {
53 for (i = 6001 + (start_port-1); i <= 6100; i++) {
54 if (solisten(htons(i), inaddr, htons(6000 + display), 0)) {
55 /* Success */
56 x_port = i - 6000;
57 x_display = display;
58 x_screen = screen;
59 show_x(0, 0);
60 return;
63 lprint("X Redir: Error: Couldn't redirect a port for X. Weird.\r\n");
66 #endif
69 * Get our IP address and put it in our_addr
71 void
72 getouraddr(void)
74 char buff[256];
75 struct hostent *he = NULL;
77 if (gethostname(buff,256) == 0)
78 he = gethostbyname(buff);
79 if (he)
80 our_addr = *(struct in_addr *)he->h_addr;
81 if (our_addr.s_addr == 0)
82 our_addr.s_addr = loopback_addr.s_addr;
85 struct quehead {
86 struct quehead *qh_link;
87 struct quehead *qh_rlink;
90 inline void
91 insque(void *a, void *b)
93 register struct quehead *element = (struct quehead *) a;
94 register struct quehead *head = (struct quehead *) b;
95 element->qh_link = head->qh_link;
96 head->qh_link = (struct quehead *)element;
97 element->qh_rlink = (struct quehead *)head;
98 ((struct quehead *)(element->qh_link))->qh_rlink
99 = (struct quehead *)element;
102 inline void
103 remque(void *a)
105 register struct quehead *element = (struct quehead *) a;
106 ((struct quehead *)(element->qh_link))->qh_rlink = element->qh_rlink;
107 ((struct quehead *)(element->qh_rlink))->qh_link = element->qh_link;
108 element->qh_rlink = NULL;
109 /* element->qh_link = NULL; TCP FIN1 crashes if you do this. Why ? */
112 /* #endif */
116 add_exec(struct ex_list **ex_ptr, int do_pty, char *exec, int addr, int port)
118 struct ex_list *tmp_ptr;
120 /* First, check if the port is "bound" */
121 for (tmp_ptr = *ex_ptr; tmp_ptr; tmp_ptr = tmp_ptr->ex_next) {
122 if (port == tmp_ptr->ex_fport && addr == tmp_ptr->ex_addr)
123 return -1;
126 tmp_ptr = *ex_ptr;
127 *ex_ptr = (struct ex_list *)malloc(sizeof(struct ex_list));
128 (*ex_ptr)->ex_fport = port;
129 (*ex_ptr)->ex_addr = addr;
130 (*ex_ptr)->ex_pty = do_pty;
131 (*ex_ptr)->ex_exec = (do_pty == 3) ? exec : strdup(exec);
132 (*ex_ptr)->ex_next = tmp_ptr;
133 return 0;
136 #ifndef HAVE_STRERROR
139 * For systems with no strerror
142 extern int sys_nerr;
143 extern char *sys_errlist[];
145 char *
146 strerror(error)
147 int error;
149 if (error < sys_nerr)
150 return sys_errlist[error];
151 else
152 return "Unknown error.";
155 #endif
158 #ifdef _WIN32
161 fork_exec(struct socket *so, const char *ex, int do_pty)
163 /* not implemented */
164 return 0;
167 #else
169 #ifndef CONFIG_QEMU
171 slirp_openpty(amaster, aslave)
172 int *amaster, *aslave;
174 register int master, slave;
176 #ifdef HAVE_GRANTPT
177 char *ptr;
179 if ((master = open("/dev/ptmx", O_RDWR)) < 0 ||
180 grantpt(master) < 0 ||
181 unlockpt(master) < 0 ||
182 (ptr = ptsname(master)) == NULL) {
183 close(master);
184 return -1;
187 if ((slave = open(ptr, O_RDWR)) < 0 ||
188 ioctl(slave, I_PUSH, "ptem") < 0 ||
189 ioctl(slave, I_PUSH, "ldterm") < 0 ||
190 ioctl(slave, I_PUSH, "ttcompat") < 0) {
191 close(master);
192 close(slave);
193 return -1;
196 *amaster = master;
197 *aslave = slave;
198 return 0;
200 #else
202 static char line[] = "/dev/ptyXX";
203 register const char *cp1, *cp2;
205 for (cp1 = "pqrsPQRS"; *cp1; cp1++) {
206 line[8] = *cp1;
207 for (cp2 = "0123456789abcdefghijklmnopqrstuv"; *cp2; cp2++) {
208 line[9] = *cp2;
209 if ((master = open(line, O_RDWR, 0)) == -1) {
210 if (errno == ENOENT)
211 return (-1); /* out of ptys */
212 } else {
213 line[5] = 't';
214 /* These will fail */
215 (void) chown(line, getuid(), 0);
216 (void) chmod(line, S_IRUSR|S_IWUSR|S_IWGRP);
217 #ifdef HAVE_REVOKE
218 (void) revoke(line);
219 #endif
220 if ((slave = open(line, O_RDWR, 0)) != -1) {
221 *amaster = master;
222 *aslave = slave;
223 return 0;
225 (void) close(master);
226 line[5] = 'p';
230 errno = ENOENT; /* out of ptys */
231 return (-1);
232 #endif
234 #endif
237 * XXX This is ugly
238 * We create and bind a socket, then fork off to another
239 * process, which connects to this socket, after which we
240 * exec the wanted program. If something (strange) happens,
241 * the accept() call could block us forever.
243 * do_pty = 0 Fork/exec inetd style
244 * do_pty = 1 Fork/exec using slirp.telnetd
245 * do_ptr = 2 Fork/exec using pty
248 fork_exec(struct socket *so, const char *ex, int do_pty)
250 int s;
251 struct sockaddr_in addr;
252 socklen_t addrlen = sizeof(addr);
253 int opt;
254 int master = -1;
255 const char *argv[256];
256 #if 0
257 char buff[256];
258 #endif
259 /* don't want to clobber the original */
260 char *bptr;
261 const char *curarg;
262 int c, i, ret;
264 DEBUG_CALL("fork_exec");
265 DEBUG_ARG("so = %lx", (long)so);
266 DEBUG_ARG("ex = %lx", (long)ex);
267 DEBUG_ARG("do_pty = %lx", (long)do_pty);
269 if (do_pty == 2) {
270 #if 0
271 if (slirp_openpty(&master, &s) == -1) {
272 lprint("Error: openpty failed: %s\n", strerror(errno));
273 return 0;
275 #else
276 return 0;
277 #endif
278 } else {
279 addr.sin_family = AF_INET;
280 addr.sin_port = 0;
281 addr.sin_addr.s_addr = INADDR_ANY;
283 if ((s = socket(AF_INET, SOCK_STREAM, 0)) < 0 ||
284 bind(s, (struct sockaddr *)&addr, addrlen) < 0 ||
285 listen(s, 1) < 0) {
286 lprint("Error: inet socket: %s\n", strerror(errno));
287 closesocket(s);
289 return 0;
293 switch(fork()) {
294 case -1:
295 lprint("Error: fork failed: %s\n", strerror(errno));
296 close(s);
297 if (do_pty == 2)
298 close(master);
299 return 0;
301 case 0:
302 /* Set the DISPLAY */
303 if (do_pty == 2) {
304 (void) close(master);
305 #ifdef TIOCSCTTY /* XXXXX */
306 (void) setsid();
307 ioctl(s, TIOCSCTTY, (char *)NULL);
308 #endif
309 } else {
310 getsockname(s, (struct sockaddr *)&addr, &addrlen);
311 close(s);
313 * Connect to the socket
314 * XXX If any of these fail, we're in trouble!
316 s = socket(AF_INET, SOCK_STREAM, 0);
317 addr.sin_addr = loopback_addr;
318 do {
319 ret = connect(s, (struct sockaddr *)&addr, addrlen);
320 } while (ret < 0 && errno == EINTR);
323 #if 0
324 if (x_port >= 0) {
325 #ifdef HAVE_SETENV
326 sprintf(buff, "%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
327 setenv("DISPLAY", buff, 1);
328 #else
329 sprintf(buff, "DISPLAY=%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
330 putenv(buff);
331 #endif
333 #endif
334 dup2(s, 0);
335 dup2(s, 1);
336 dup2(s, 2);
337 for (s = getdtablesize() - 1; s >= 3; s--)
338 close(s);
340 i = 0;
341 bptr = strdup(ex); /* No need to free() this */
342 if (do_pty == 1) {
343 /* Setup "slirp.telnetd -x" */
344 argv[i++] = "slirp.telnetd";
345 argv[i++] = "-x";
346 argv[i++] = bptr;
347 } else
348 do {
349 /* Change the string into argv[] */
350 curarg = bptr;
351 while (*bptr != ' ' && *bptr != (char)0)
352 bptr++;
353 c = *bptr;
354 *bptr++ = (char)0;
355 argv[i++] = strdup(curarg);
356 } while (c);
358 argv[i] = NULL;
359 execvp(argv[0], (char **)argv);
361 /* Ooops, failed, let's tell the user why */
363 char buff[256];
365 snprintf(buff, sizeof(buff),
366 "Error: execvp of %s failed: %s\n",
367 argv[0], strerror(errno));
368 write(2, buff, strlen(buff)+1);
370 close(0); close(1); close(2); /* XXX */
371 exit(1);
373 default:
374 if (do_pty == 2) {
375 close(s);
376 so->s = master;
377 } else {
379 * XXX this could block us...
380 * XXX Should set a timer here, and if accept() doesn't
381 * return after X seconds, declare it a failure
382 * The only reason this will block forever is if socket()
383 * of connect() fail in the child process
385 do {
386 so->s = accept(s, (struct sockaddr *)&addr, &addrlen);
387 } while (so->s < 0 && errno == EINTR);
388 closesocket(s);
389 opt = 1;
390 setsockopt(so->s,SOL_SOCKET,SO_REUSEADDR,(char *)&opt,sizeof(int));
391 opt = 1;
392 setsockopt(so->s,SOL_SOCKET,SO_OOBINLINE,(char *)&opt,sizeof(int));
394 fd_nonblock(so->s);
396 /* Append the telnet options now */
397 if (so->so_m != NULL && do_pty == 1) {
398 sbappend(so, so->so_m);
399 so->so_m = NULL;
402 return 1;
405 #endif
407 #ifndef HAVE_STRDUP
408 char *
409 strdup(str)
410 const char *str;
412 char *bptr;
414 bptr = (char *)malloc(strlen(str)+1);
415 strcpy(bptr, str);
417 return bptr;
419 #endif
421 #if 0
422 void
423 snooze_hup(num)
424 int num;
426 int s, ret;
427 #ifndef NO_UNIX_SOCKETS
428 struct sockaddr_un sock_un;
429 #endif
430 struct sockaddr_in sock_in;
431 char buff[256];
433 ret = -1;
434 if (slirp_socket_passwd) {
435 s = socket(AF_INET, SOCK_STREAM, 0);
436 if (s < 0)
437 slirp_exit(1);
438 sock_in.sin_family = AF_INET;
439 sock_in.sin_addr.s_addr = slirp_socket_addr;
440 sock_in.sin_port = htons(slirp_socket_port);
441 if (connect(s, (struct sockaddr *)&sock_in, sizeof(sock_in)) != 0)
442 slirp_exit(1); /* just exit...*/
443 sprintf(buff, "kill %s:%d", slirp_socket_passwd, slirp_socket_unit);
444 write(s, buff, strlen(buff)+1);
446 #ifndef NO_UNIX_SOCKETS
447 else {
448 s = socket(AF_UNIX, SOCK_STREAM, 0);
449 if (s < 0)
450 slirp_exit(1);
451 sock_un.sun_family = AF_UNIX;
452 strcpy(sock_un.sun_path, socket_path);
453 if (connect(s, (struct sockaddr *)&sock_un,
454 sizeof(sock_un.sun_family) + sizeof(sock_un.sun_path)) != 0)
455 slirp_exit(1);
456 sprintf(buff, "kill none:%d", slirp_socket_unit);
457 write(s, buff, strlen(buff)+1);
459 #endif
460 slirp_exit(0);
464 void
465 snooze()
467 sigset_t s;
468 int i;
470 /* Don't need our data anymore */
471 /* XXX This makes SunOS barf */
472 /* brk(0); */
474 /* Close all fd's */
475 for (i = 255; i >= 0; i--)
476 close(i);
478 signal(SIGQUIT, slirp_exit);
479 signal(SIGHUP, snooze_hup);
480 sigemptyset(&s);
482 /* Wait for any signal */
483 sigsuspend(&s);
485 /* Just in case ... */
486 exit(255);
489 void
490 relay(s)
491 int s;
493 char buf[8192];
494 int n;
495 fd_set readfds;
496 struct ttys *ttyp;
498 /* Don't need our data anymore */
499 /* XXX This makes SunOS barf */
500 /* brk(0); */
502 signal(SIGQUIT, slirp_exit);
503 signal(SIGHUP, slirp_exit);
504 signal(SIGINT, slirp_exit);
505 signal(SIGTERM, slirp_exit);
507 /* Fudge to get term_raw and term_restore to work */
508 if (NULL == (ttyp = tty_attach (0, slirp_tty))) {
509 lprint ("Error: tty_attach failed in misc.c:relay()\r\n");
510 slirp_exit (1);
512 ttyp->fd = 0;
513 ttyp->flags |= TTY_CTTY;
514 term_raw(ttyp);
516 while (1) {
517 FD_ZERO(&readfds);
519 FD_SET(0, &readfds);
520 FD_SET(s, &readfds);
522 n = select(s+1, &readfds, (fd_set *)0, (fd_set *)0, (struct timeval *)0);
524 if (n <= 0)
525 slirp_exit(0);
527 if (FD_ISSET(0, &readfds)) {
528 n = read(0, buf, 8192);
529 if (n <= 0)
530 slirp_exit(0);
531 n = writen(s, buf, n);
532 if (n <= 0)
533 slirp_exit(0);
536 if (FD_ISSET(s, &readfds)) {
537 n = read(s, buf, 8192);
538 if (n <= 0)
539 slirp_exit(0);
540 n = writen(0, buf, n);
541 if (n <= 0)
542 slirp_exit(0);
546 /* Just in case.... */
547 exit(1);
549 #endif
551 #ifdef CONFIG_QEMU
552 #include "monitor.h"
554 void lprint(const char *format, ...)
556 va_list args;
558 va_start(args, format);
559 monitor_vprintf(cur_mon, format, args);
560 va_end(args);
562 #else
563 int (*lprint_print) _P((void *, const char *, va_list));
564 char *lprint_ptr, *lprint_ptr2, **lprint_arg;
566 void
567 #ifdef __STDC__
568 lprint(const char *format, ...)
569 #else
570 lprint(va_alist) va_dcl
571 #endif
573 va_list args;
575 #ifdef __STDC__
576 va_start(args, format);
577 #else
578 char *format;
579 va_start(args);
580 format = va_arg(args, char *);
581 #endif
582 #if 0
583 /* If we're printing to an sbuf, make sure there's enough room */
584 /* XXX +100? */
585 if (lprint_sb) {
586 if ((lprint_ptr - lprint_sb->sb_wptr) >=
587 (lprint_sb->sb_datalen - (strlen(format) + 100))) {
588 int deltaw = lprint_sb->sb_wptr - lprint_sb->sb_data;
589 int deltar = lprint_sb->sb_rptr - lprint_sb->sb_data;
590 int deltap = lprint_ptr - lprint_sb->sb_data;
592 lprint_sb->sb_data = (char *)realloc(lprint_sb->sb_data,
593 lprint_sb->sb_datalen + TCP_SNDSPACE);
595 /* Adjust all values */
596 lprint_sb->sb_wptr = lprint_sb->sb_data + deltaw;
597 lprint_sb->sb_rptr = lprint_sb->sb_data + deltar;
598 lprint_ptr = lprint_sb->sb_data + deltap;
600 lprint_sb->sb_datalen += TCP_SNDSPACE;
603 #endif
604 if (lprint_print)
605 lprint_ptr += (*lprint_print)(*lprint_arg, format, args);
607 /* Check if they want output to be logged to file as well */
608 if (lfd) {
610 * Remove \r's
611 * otherwise you'll get ^M all over the file
613 int len = strlen(format);
614 char *bptr1, *bptr2;
616 bptr1 = bptr2 = strdup(format);
618 while (len--) {
619 if (*bptr1 == '\r')
620 memcpy(bptr1, bptr1+1, len+1);
621 else
622 bptr1++;
624 vfprintf(lfd, bptr2, args);
625 free(bptr2);
627 va_end(args);
630 void
631 add_emu(buff)
632 char *buff;
634 u_int lport, fport;
635 u_int8_t tos = 0, emu = 0;
636 char buff1[256], buff2[256], buff4[128];
637 char *buff3 = buff4;
638 struct emu_t *emup;
639 struct socket *so;
641 if (sscanf(buff, "%256s %256s", buff2, buff1) != 2) {
642 lprint("Error: Bad arguments\r\n");
643 return;
646 if (sscanf(buff1, "%d:%d", &lport, &fport) != 2) {
647 lport = 0;
648 if (sscanf(buff1, "%d", &fport) != 1) {
649 lprint("Error: Bad first argument\r\n");
650 return;
654 if (sscanf(buff2, "%128[^:]:%128s", buff1, buff3) != 2) {
655 buff3 = 0;
656 if (sscanf(buff2, "%256s", buff1) != 1) {
657 lprint("Error: Bad second argument\r\n");
658 return;
662 if (buff3) {
663 if (strcmp(buff3, "lowdelay") == 0)
664 tos = IPTOS_LOWDELAY;
665 else if (strcmp(buff3, "throughput") == 0)
666 tos = IPTOS_THROUGHPUT;
667 else {
668 lprint("Error: Expecting \"lowdelay\"/\"throughput\"\r\n");
669 return;
673 if (strcmp(buff1, "ftp") == 0)
674 emu = EMU_FTP;
675 else if (strcmp(buff1, "irc") == 0)
676 emu = EMU_IRC;
677 else if (strcmp(buff1, "none") == 0)
678 emu = EMU_NONE; /* ie: no emulation */
679 else {
680 lprint("Error: Unknown service\r\n");
681 return;
684 /* First, check that it isn't already emulated */
685 for (emup = tcpemu; emup; emup = emup->next) {
686 if (emup->lport == lport && emup->fport == fport) {
687 lprint("Error: port already emulated\r\n");
688 return;
692 /* link it */
693 emup = (struct emu_t *)malloc(sizeof (struct emu_t));
694 emup->lport = (u_int16_t)lport;
695 emup->fport = (u_int16_t)fport;
696 emup->tos = tos;
697 emup->emu = emu;
698 emup->next = tcpemu;
699 tcpemu = emup;
701 /* And finally, mark all current sessions, if any, as being emulated */
702 for (so = tcb.so_next; so != &tcb; so = so->so_next) {
703 if ((lport && lport == ntohs(so->so_lport)) ||
704 (fport && fport == ntohs(so->so_fport))) {
705 if (emu)
706 so->so_emu = emu;
707 if (tos)
708 so->so_iptos = tos;
712 lprint("Adding emulation for %s to port %d/%d\r\n", buff1, emup->lport, emup->fport);
714 #endif
716 #ifdef BAD_SPRINTF
718 #undef vsprintf
719 #undef sprintf
722 * Some BSD-derived systems have a sprintf which returns char *
726 vsprintf_len(string, format, args)
727 char *string;
728 const char *format;
729 va_list args;
731 vsprintf(string, format, args);
732 return strlen(string);
736 #ifdef __STDC__
737 sprintf_len(char *string, const char *format, ...)
738 #else
739 sprintf_len(va_alist) va_dcl
740 #endif
742 va_list args;
743 #ifdef __STDC__
744 va_start(args, format);
745 #else
746 char *string;
747 char *format;
748 va_start(args);
749 string = va_arg(args, char *);
750 format = va_arg(args, char *);
751 #endif
752 vsprintf(string, format, args);
753 return strlen(string);
756 #endif
758 void
759 u_sleep(int usec)
761 struct timeval t;
762 fd_set fdset;
764 FD_ZERO(&fdset);
766 t.tv_sec = 0;
767 t.tv_usec = usec * 1000;
769 select(0, &fdset, &fdset, &fdset, &t);
773 * Set fd blocking and non-blocking
776 void
777 fd_nonblock(int fd)
779 #ifdef FIONBIO
780 #ifdef _WIN32
781 unsigned long opt = 1;
782 #else
783 int opt = 1;
784 #endif
786 ioctlsocket(fd, FIONBIO, &opt);
787 #else
788 int opt;
790 opt = fcntl(fd, F_GETFL, 0);
791 opt |= O_NONBLOCK;
792 fcntl(fd, F_SETFL, opt);
793 #endif
796 void
797 fd_block(int fd)
799 #ifdef FIONBIO
800 #ifdef _WIN32
801 unsigned long opt = 0;
802 #else
803 int opt = 0;
804 #endif
806 ioctlsocket(fd, FIONBIO, &opt);
807 #else
808 int opt;
810 opt = fcntl(fd, F_GETFL, 0);
811 opt &= ~O_NONBLOCK;
812 fcntl(fd, F_SETFL, opt);
813 #endif
817 #if 0
819 * invoke RSH
822 rsh_exec(so,ns, user, host, args)
823 struct socket *so;
824 struct socket *ns;
825 char *user;
826 char *host;
827 char *args;
829 int fd[2];
830 int fd0[2];
831 int s;
832 char buff[256];
834 DEBUG_CALL("rsh_exec");
835 DEBUG_ARG("so = %lx", (long)so);
837 if (pipe(fd)<0) {
838 lprint("Error: pipe failed: %s\n", strerror(errno));
839 return 0;
841 /* #ifdef HAVE_SOCKETPAIR */
842 #if 1
843 if (socketpair(PF_UNIX,SOCK_STREAM,0, fd0) == -1) {
844 close(fd[0]);
845 close(fd[1]);
846 lprint("Error: openpty failed: %s\n", strerror(errno));
847 return 0;
849 #else
850 if (slirp_openpty(&fd0[0], &fd0[1]) == -1) {
851 close(fd[0]);
852 close(fd[1]);
853 lprint("Error: openpty failed: %s\n", strerror(errno));
854 return 0;
856 #endif
858 switch(fork()) {
859 case -1:
860 lprint("Error: fork failed: %s\n", strerror(errno));
861 close(fd[0]);
862 close(fd[1]);
863 close(fd0[0]);
864 close(fd0[1]);
865 return 0;
867 case 0:
868 close(fd[0]);
869 close(fd0[0]);
871 /* Set the DISPLAY */
872 if (x_port >= 0) {
873 #ifdef HAVE_SETENV
874 sprintf(buff, "%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
875 setenv("DISPLAY", buff, 1);
876 #else
877 sprintf(buff, "DISPLAY=%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
878 putenv(buff);
879 #endif
882 dup2(fd0[1], 0);
883 dup2(fd0[1], 1);
884 dup2(fd[1], 2);
885 for (s = 3; s <= 255; s++)
886 close(s);
888 execlp("rsh","rsh","-l", user, host, args, NULL);
890 /* Ooops, failed, let's tell the user why */
892 sprintf(buff, "Error: execlp of %s failed: %s\n",
893 "rsh", strerror(errno));
894 write(2, buff, strlen(buff)+1);
895 close(0); close(1); close(2); /* XXX */
896 exit(1);
898 default:
899 close(fd[1]);
900 close(fd0[1]);
901 ns->s=fd[0];
902 so->s=fd0[0];
904 return 1;
907 #endif