What is perror
in C?
You may see calls to perror
in C code. What is it?
#include <stdio.h>
void perror(char const * s);
A call to perror("foo")
will print "foo: "
to stderr, then will print a human-readable description of the err in errno
(the global error number written to by syscalls and library functions). For example:
#include <stdio.h>
int main() {
FILE* fp = fopen("nonexistent", "r");
if (fp == NULL) {
perror("Could not open file");
return 1;
}
return 0;
}
This prints:
% ./a.out
Could not open file: No such file or directory
The perror
function gets the string "No such file or directory"
from a global error table:
#include <errno.h>
const char * const sys_errlist[];
int sys_nerr;
We can print these out:
#include <stdio.h>
int main() {
for (size_t i = 0; i < sys_nerr; i++) {
printf("%*zu = %s\n", 3, i, sys_errlist[i]);
}
}
We get all the errors!:
% ./a.out
0 = Undefined error: 0
1 = Operation not permitted
2 = No such file or directory
3 = No such process
4 = Interrupted system call
5 = Input/output error
6 = Device not configured
7 = Argument list too long
8 = Exec format error
9 = Bad file descriptor
10 = No child processes
11 = Resource deadlock avoided
12 = Cannot allocate memory
13 = Permission denied
14 = Bad address
15 = Block device required
16 = Resource busy
17 = File exists
18 = Cross-device link
19 = Operation not supported by device
20 = Not a directory
21 = Is a directory
22 = Invalid argument
23 = Too many open files in system
24 = Too many open files
25 = Inappropriate ioctl for device
26 = Text file busy
27 = File too large
28 = No space left on device
29 = Illegal seek
30 = Read-only file system
31 = Too many links
32 = Broken pipe
33 = Numerical argument out of domain
34 = Result too large
35 = Resource temporarily unavailable
36 = Operation now in progress
37 = Operation already in progress
38 = Socket operation on non-socket
39 = Destination address required
40 = Message too long
41 = Protocol wrong type for socket
42 = Protocol not available
43 = Protocol not supported
44 = Socket type not supported
45 = Operation not supported
46 = Protocol family not supported
47 = Address family not supported by protocol family
48 = Address already in use
49 = Can't assign requested address
50 = Network is down
51 = Network is unreachable
52 = Network dropped connection on reset
53 = Software caused connection abort
54 = Connection reset by peer
55 = No buffer space available
56 = Socket is already connected
57 = Socket is not connected
58 = Can't send after socket shutdown
59 = Too many references: can't splice
60 = Operation timed out
61 = Connection refused
62 = Too many levels of symbolic links
63 = File name too long
64 = Host is down
65 = No route to host
66 = Directory not empty
67 = Too many processes
68 = Too many users
69 = Disc quota exceeded
70 = Stale NFS file handle
71 = Too many levels of remote in path
72 = RPC struct is bad
73 = RPC version wrong
74 = RPC prog. not avail
75 = Program version wrong
76 = Bad procedure for program
77 = No locks available
78 = Function not implemented
79 = Inappropriate file type or format
80 = Authentication error
81 = Need authenticator
82 = Device power is off
83 = Device error
84 = Value too large to be stored in data type
85 = Bad executable (or shared library)
86 = Bad CPU type in executable
87 = Shared library version mismatch
88 = Malformed Mach-o file
89 = Operation canceled
90 = Identifier removed
91 = No message of desired type
92 = Illegal byte sequence
93 = Attribute not found
94 = Bad message
95 = EMULTIHOP (Reserved)
96 = No message available on STREAM
97 = ENOLINK (Reserved)
98 = No STREAM resources
99 = Not a STREAM
100 = Protocol error
101 = STREAM ioctl timeout
102 = Operation not supported on socket
103 = Policy not found
104 = State not recoverable
105 = Previous owner died
106 = Interface output queue is full
However, don’t use this array; it’s deprecated. You should instead use the strerror
function:
#include <string.h>
char *strerror(int errnum);
So the modern way to print all errors is:
#include <stdio.h>
#include <string.h>
int main() {
for (size_t i = 0; i < sys_nerr; i++) {
printf("%*zu = %s\n", 3, i, strerror(i));
}
}
Similar posts
How do I call a program from C?
To call a program from C, use `fork` then `execve`. There is no more direct way! 2017-02-07
How do I use fork
in C?
fork
duplicates the current process. It returns 0
in the child process. In the parent process, it returns the child’s new process id. 2017-02-06
How do I use execve
in C?
execve
replaces the current process with a new one. It takes a path, an argument array, and an environment array. The process never returns unless execve
fails. 2017-02-05
How do I measure program execution time in C? How do I use the times
function?
Use the times()
system call in C to measure the CPU time used by a process, distinguishing between time charged to the process itself and time charged to the kernel on its behalf. 2016-12-26
What is mmap
in C?
mmap
is a system call in C that allows programs to manipulate underlying hardware resources, such as physical memory or files, using ordinary memory manipulation. 2017-01-26
How can I write a file with mmap
in C?
To write to a file, open the file, mmap
the file descriptor, then write to memory. 2017-01-28
More by Jim
What does the dot do in JavaScript?
foo.bar
, foo.bar()
, or foo.bar = baz
- what do they mean? A deep dive into prototypical inheritance and getters/setters. 2020-11-01
Smear phishing: a new Android vulnerability
Trick Android to display an SMS as coming from any contact. Convincing phishing vuln, but still unpatched. 2020-08-06
A probabilistic pub quiz for nerds
A “true or false” quiz where you respond with your confidence level, and the optimal strategy is to report your true belief. 2020-04-26
Time is running out to catch COVID-19
Simulation shows it’s rational to deliberately infect yourself with COVID-19 early on to get treatment, but after healthcare capacity is exceeded, it’s better to avoid infection. Includes interactive parameters and visualizations. 2020-03-14
The inception bar: a new phishing method
A new phishing technique that displays a fake URL bar in Chrome for mobile. A key innovation is the “scroll jail” that traps the user in a fake browser. 2019-04-27
The hacker hype cycle
I got started with simple web development, but because enamored with increasingly esoteric programming concepts, leading to a “trough of hipster technologies” before returning to more productive work. 2019-03-23
Project C-43: the lost origins of asymmetric crypto
Bob invents asymmetric cryptography by playing loud white noise to obscure Alice’s message, which he can cancel out but an eavesdropper cannot. This idea, published in 1944 by Walter Koenig Jr., is the forgotten origin of asymmetric crypto. 2019-02-16
How Hacker News stays interesting
Hacker News buried my post on conspiracy theories in my family due to overheated discussion, not censorship. Moderation keeps the site focused on interesting technical content. 2019-01-26
My parents are Flat-Earthers
For decades, my parents have been working up to Flat-Earther beliefs. From Egyptology to Jehovah’s Witnesses to theories that human built the Moon billions of years in the future. Surprisingly, it doesn’t affect their successful lives very much. For me, it’s a fun family pastime. 2019-01-20
The dots do matter: how to scam a Gmail user
Gmail’s “dots don’t matter” feature lets scammers create an account on, say, Netflix, with your email address but different dots. Results in convincing phishing emails. 2018-04-07
The sorry state of OpenSSL usability
OpenSSL’s inadequate documentation, confusing key formats, and deprecated interfaces make it difficult to use, despite its importance. 2017-12-02
I hate telephones
I hate telephones. Some rational reasons: lack of authentication, no spam filtering, forced synchronous communication. But also just a visceral fear. 2017-11-08
The Three Ts of Time, Thought and Typing: measuring cost on the web
Businesses often tout “free” services, but the real costs come in terms of time, thought, and typing required from users. Reducing these “Three Ts” is key to improving sign-up flows and increasing conversions. 2017-10-26
Granddad died today
Granddad died. The unspoken practice of death-by-dehydration in the NHS. The Liverpool Care Pathway. Assisted dying in the UK. The importance of planning in end-of-life care. 2017-05-19
How do I call a program in C, setting up standard pipes?
A C function to create a new process, set up its standard input/output/error pipes, and return a struct containing the process ID and pipe file descriptors. 2017-02-17
Your syntax highlighter is wrong
Syntax highlighters make value judgments about code. Most highlighters judge that comments are cruft, and try to hide them. Most diff viewers judge that code deletions are bad. 2014-05-11
Want to build a fantastic product using LLMs? I work at
Granola where we're building the future IDE for knowledge work. Come and work with us!
Read more or
get in touch! This page copyright James Fisher 2016. Content is not associated with my employer. Found an error? Edit this page.