]> git.ipfire.org Git - thirdparty/git.git/blame - wrapper.c
ref-filter: add multiple-option parsing functions
[thirdparty/git.git] / wrapper.c
CommitLineData
112db553
LT
1/*
2 * Various trivial helper wrappers around standard functions
3 */
5e3f94df 4#include "git-compat-util.h"
0b027f6c 5#include "abspath.h"
b2141fc1 6#include "config.h"
f394e093 7#include "gettext.h"
5e3f94df 8#include "object.h"
d1cbe1e6 9#include "repository.h"
69a63fe6 10#include "strbuf.h"
74ea5c95 11#include "trace2.h"
112db553 12
9a498767
NS
13static intmax_t count_fsync_writeout_only;
14static intmax_t count_fsync_hardware_flush;
15
19d3f228
NS
16#ifdef HAVE_RTLGENRANDOM
17/* This is required to get access to RtlGenRandom. */
18#define SystemFunction036 NTAPI SystemFunction036
19#include <NTSecAPI.h>
20#undef SystemFunction036
21#endif
22
f8bb1d94 23static int memory_limit_check(size_t size, int gentle)
d41489a6 24{
9927d962
SP
25 static size_t limit = 0;
26 if (!limit) {
27 limit = git_env_ulong("GIT_ALLOC_LIMIT", 0);
28 if (!limit)
29 limit = SIZE_MAX;
d41489a6 30 }
f0d89001 31 if (size > limit) {
f8bb1d94 32 if (gentle) {
f0d89001
JH
33 error("attempting to allocate %"PRIuMAX" over limit %"PRIuMAX,
34 (uintmax_t)size, (uintmax_t)limit);
f8bb1d94
NTND
35 return -1;
36 } else
f0d89001
JH
37 die("attempting to allocate %"PRIuMAX" over limit %"PRIuMAX,
38 (uintmax_t)size, (uintmax_t)limit);
f8bb1d94
NTND
39 }
40 return 0;
d41489a6
NTND
41}
42
112db553
LT
43char *xstrdup(const char *str)
44{
45 char *ret = strdup(str);
9827d4c1
JK
46 if (!ret)
47 die("Out of memory, strdup failed");
112db553
LT
48 return ret;
49}
50
f8bb1d94 51static void *do_xmalloc(size_t size, int gentle)
112db553 52{
d41489a6
NTND
53 void *ret;
54
f8bb1d94
NTND
55 if (memory_limit_check(size, gentle))
56 return NULL;
d41489a6 57 ret = malloc(size);
112db553
LT
58 if (!ret && !size)
59 ret = malloc(1);
60 if (!ret) {
9827d4c1
JK
61 if (!gentle)
62 die("Out of memory, malloc failed (tried to allocate %lu bytes)",
63 (unsigned long)size);
64 else {
65 error("Out of memory, malloc failed (tried to allocate %lu bytes)",
66 (unsigned long)size);
67 return NULL;
f8bb1d94 68 }
112db553
LT
69 }
70#ifdef XMALLOC_POISON
71 memset(ret, 0xA5, size);
72#endif
73 return ret;
74}
75
f8bb1d94
NTND
76void *xmalloc(size_t size)
77{
78 return do_xmalloc(size, 0);
79}
80
81static void *do_xmallocz(size_t size, int gentle)
5bf9219d
IL
82{
83 void *ret;
f8bb1d94
NTND
84 if (unsigned_add_overflows(size, 1)) {
85 if (gentle) {
86 error("Data too large to fit into virtual memory space.");
87 return NULL;
88 } else
89 die("Data too large to fit into virtual memory space.");
90 }
91 ret = do_xmalloc(size + 1, gentle);
92 if (ret)
93 ((char*)ret)[size] = 0;
5bf9219d
IL
94 return ret;
95}
96
f8bb1d94
NTND
97void *xmallocz(size_t size)
98{
99 return do_xmallocz(size, 0);
100}
101
102void *xmallocz_gently(size_t size)
103{
104 return do_xmallocz(size, 1);
105}
106
112db553
LT
107/*
108 * xmemdupz() allocates (len + 1) bytes of memory, duplicates "len" bytes of
109 * "data" to the allocated memory, zero terminates the allocated memory,
110 * and returns a pointer to the allocated memory. If the allocation fails,
111 * the program dies.
112 */
113void *xmemdupz(const void *data, size_t len)
114{
5bf9219d 115 return memcpy(xmallocz(len), data, len);
112db553
LT
116}
117
118char *xstrndup(const char *str, size_t len)
119{
120 char *p = memchr(str, '\0', len);
121 return xmemdupz(str, p ? p - str : len);
122}
123
14570dc6 124int xstrncmpz(const char *s, const char *t, size_t len)
125{
126 int res = strncmp(s, t, len);
127 if (res)
128 return res;
129 return s[len] == '\0' ? 0 : 1;
130}
131
112db553
LT
132void *xrealloc(void *ptr, size_t size)
133{
d41489a6
NTND
134 void *ret;
135
6479ea4a
JK
136 if (!size) {
137 free(ptr);
138 return xmalloc(0);
139 }
140
f8bb1d94 141 memory_limit_check(size, 0);
d41489a6 142 ret = realloc(ptr, size);
9827d4c1
JK
143 if (!ret)
144 die("Out of memory, realloc failed");
112db553
LT
145 return ret;
146}
147
148void *xcalloc(size_t nmemb, size_t size)
149{
d41489a6
NTND
150 void *ret;
151
e7792a74
JK
152 if (unsigned_mult_overflows(nmemb, size))
153 die("data too large to fit into virtual memory space");
154
f8bb1d94 155 memory_limit_check(size * nmemb, 0);
d41489a6 156 ret = calloc(nmemb, size);
112db553
LT
157 if (!ret && (!nmemb || !size))
158 ret = calloc(1, 1);
9827d4c1
JK
159 if (!ret)
160 die("Out of memory, calloc failed");
112db553
LT
161 return ret;
162}
163
3540c71e
ÆAB
164void xsetenv(const char *name, const char *value, int overwrite)
165{
166 if (setenv(name, value, overwrite))
167 die_errno(_("could not setenv '%s'"), name ? name : "(null)");
168}
169
3ff53df7
PT
170/**
171 * xopen() is the same as open(), but it die()s if the open() fails.
172 */
173int xopen(const char *path, int oflag, ...)
174{
175 mode_t mode = 0;
176 va_list ap;
177
178 /*
179 * va_arg() will have undefined behavior if the specified type is not
180 * compatible with the argument type. Since integers are promoted to
181 * ints, we fetch the next argument as an int, and then cast it to a
182 * mode_t to avoid undefined behavior.
183 */
184 va_start(ap, oflag);
185 if (oflag & O_CREAT)
186 mode = va_arg(ap, int);
187 va_end(ap);
188
189 for (;;) {
190 int fd = open(path, oflag, mode);
191 if (fd >= 0)
192 return fd;
193 if (errno == EINTR)
194 continue;
195
a7439d0f
RS
196 if ((oflag & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
197 die_errno(_("unable to create '%s'"), path);
198 else if ((oflag & O_RDWR) == O_RDWR)
3ff53df7
PT
199 die_errno(_("could not open '%s' for reading and writing"), path);
200 else if ((oflag & O_WRONLY) == O_WRONLY)
201 die_errno(_("could not open '%s' for writing"), path);
202 else
203 die_errno(_("could not open '%s' for reading"), path);
204 }
205}
206
d751dd11
EW
207static int handle_nonblock(int fd, short poll_events, int err)
208{
209 struct pollfd pfd;
210
211 if (err != EAGAIN && err != EWOULDBLOCK)
212 return 0;
213
214 pfd.fd = fd;
215 pfd.events = poll_events;
216
217 /*
218 * no need to check for errors, here;
219 * a subsequent read/write will detect unrecoverable errors
220 */
221 poll(&pfd, 1, -1);
222 return 1;
223}
224
112db553
LT
225/*
226 * xread() is the same a read(), but it automatically restarts read()
227 * operations with a recoverable error (EAGAIN and EINTR). xread()
228 * DOES NOT GUARANTEE that "len" bytes is read even if the data is available.
229 */
230ssize_t xread(int fd, void *buf, size_t len)
231{
232 ssize_t nr;
0b6806b9 233 if (len > MAX_IO_SIZE)
7cd54d37 234 len = MAX_IO_SIZE;
112db553
LT
235 while (1) {
236 nr = read(fd, buf, len);
1079c4be
SB
237 if (nr < 0) {
238 if (errno == EINTR)
239 continue;
d751dd11 240 if (handle_nonblock(fd, POLLIN, errno))
c22f6202 241 continue;
1079c4be 242 }
112db553
LT
243 return nr;
244 }
245}
246
247/*
248 * xwrite() is the same a write(), but it automatically restarts write()
249 * operations with a recoverable error (EAGAIN and EINTR). xwrite() DOES NOT
250 * GUARANTEE that "len" bytes is written even if the operation is successful.
251 */
252ssize_t xwrite(int fd, const void *buf, size_t len)
253{
254 ssize_t nr;
0b6806b9 255 if (len > MAX_IO_SIZE)
7cd54d37 256 len = MAX_IO_SIZE;
112db553
LT
257 while (1) {
258 nr = write(fd, buf, len);
ef1cf016
EW
259 if (nr < 0) {
260 if (errno == EINTR)
261 continue;
d751dd11 262 if (handle_nonblock(fd, POLLOUT, errno))
ef1cf016 263 continue;
ef1cf016
EW
264 }
265
9aa91af0
YM
266 return nr;
267 }
268}
269
270/*
271 * xpread() is the same as pread(), but it automatically restarts pread()
272 * operations with a recoverable error (EAGAIN and EINTR). xpread() DOES
273 * NOT GUARANTEE that "len" bytes is read even if the data is available.
274 */
275ssize_t xpread(int fd, void *buf, size_t len, off_t offset)
276{
277 ssize_t nr;
278 if (len > MAX_IO_SIZE)
279 len = MAX_IO_SIZE;
280 while (1) {
281 nr = pread(fd, buf, len, offset);
282 if ((nr < 0) && (errno == EAGAIN || errno == EINTR))
112db553
LT
283 continue;
284 return nr;
285 }
286}
287
559e840b
JH
288ssize_t read_in_full(int fd, void *buf, size_t count)
289{
290 char *p = buf;
291 ssize_t total = 0;
292
293 while (count > 0) {
294 ssize_t loaded = xread(fd, p, count);
56d7c27a
JK
295 if (loaded < 0)
296 return -1;
297 if (loaded == 0)
298 return total;
559e840b
JH
299 count -= loaded;
300 p += loaded;
301 total += loaded;
302 }
303
304 return total;
305}
306
307ssize_t write_in_full(int fd, const void *buf, size_t count)
308{
309 const char *p = buf;
310 ssize_t total = 0;
311
312 while (count > 0) {
313 ssize_t written = xwrite(fd, p, count);
314 if (written < 0)
315 return -1;
316 if (!written) {
317 errno = ENOSPC;
318 return -1;
319 }
320 count -= written;
321 p += written;
322 total += written;
323 }
324
325 return total;
326}
327
426ddeea
YM
328ssize_t pread_in_full(int fd, void *buf, size_t count, off_t offset)
329{
330 char *p = buf;
331 ssize_t total = 0;
332
333 while (count > 0) {
334 ssize_t loaded = xpread(fd, p, count, offset);
335 if (loaded < 0)
336 return -1;
337 if (loaded == 0)
338 return total;
339 count -= loaded;
340 p += loaded;
341 total += loaded;
342 offset += loaded;
343 }
344
345 return total;
346}
347
112db553
LT
348int xdup(int fd)
349{
350 int ret = dup(fd);
351 if (ret < 0)
d824cbba 352 die_errno("dup failed");
112db553
LT
353 return ret;
354}
355
260eec29
PT
356/**
357 * xfopen() is the same as fopen(), but it die()s if the fopen() fails.
358 */
359FILE *xfopen(const char *path, const char *mode)
360{
361 for (;;) {
362 FILE *fp = fopen(path, mode);
363 if (fp)
364 return fp;
365 if (errno == EINTR)
366 continue;
367
368 if (*mode && mode[1] == '+')
369 die_errno(_("could not open '%s' for reading and writing"), path);
370 else if (*mode == 'w' || *mode == 'a')
371 die_errno(_("could not open '%s' for writing"), path);
372 else
373 die_errno(_("could not open '%s' for reading"), path);
374 }
375}
376
112db553
LT
377FILE *xfdopen(int fd, const char *mode)
378{
379 FILE *stream = fdopen(fd, mode);
afe8a907 380 if (!stream)
d824cbba 381 die_errno("Out of memory? fdopen failed");
112db553
LT
382 return stream;
383}
384
79d7582e
JS
385FILE *fopen_for_writing(const char *path)
386{
387 FILE *ret = fopen(path, "w");
388
389 if (!ret && errno == EPERM) {
390 if (!unlink(path))
391 ret = fopen(path, "w");
392 else
393 errno = EPERM;
394 }
395 return ret;
396}
397
382fb07f
NTND
398static void warn_on_inaccessible(const char *path)
399{
400 warning_errno(_("unable to access '%s'"), path);
401}
402
11dc1fcb
NTND
403int warn_on_fopen_errors(const char *path)
404{
405 if (errno != ENOENT && errno != ENOTDIR) {
406 warn_on_inaccessible(path);
407 return -1;
408 }
409
410 return 0;
411}
412
e9d983f1
NTND
413FILE *fopen_or_warn(const char *path, const char *mode)
414{
415 FILE *fp = fopen(path, mode);
416
417 if (fp)
418 return fp;
419
420 warn_on_fopen_errors(path);
421 return NULL;
422}
423
eb78e23f 424int xmkstemp(char *filename_template)
112db553
LT
425{
426 int fd;
6cf6bb3e 427 char origtemplate[PATH_MAX];
eb78e23f 428 strlcpy(origtemplate, filename_template, sizeof(origtemplate));
112db553 429
eb78e23f 430 fd = mkstemp(filename_template);
6cf6bb3e
AE
431 if (fd < 0) {
432 int saved_errno = errno;
433 const char *nonrelative_template;
434
eb78e23f
BW
435 if (strlen(filename_template) != strlen(origtemplate))
436 filename_template = origtemplate;
6cf6bb3e 437
eb78e23f 438 nonrelative_template = absolute_path(filename_template);
6cf6bb3e
AE
439 errno = saved_errno;
440 die_errno("Unable to create temporary file '%s'",
441 nonrelative_template);
442 }
112db553
LT
443 return fd;
444}
39c68542 445
33f23936
JN
446/* Adapted from libiberty's mkstemp.c. */
447
448#undef TMP_MAX
449#define TMP_MAX 16384
450
451int git_mkstemps_mode(char *pattern, int suffix_len, int mode)
452{
453 static const char letters[] =
454 "abcdefghijklmnopqrstuvwxyz"
455 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
456 "0123456789";
53d687bf
JK
457 static const int num_letters = ARRAY_SIZE(letters) - 1;
458 static const char x_pattern[] = "XXXXXX";
459 static const int num_x = ARRAY_SIZE(x_pattern) - 1;
eb78e23f 460 char *filename_template;
33f23936
JN
461 size_t len;
462 int fd, count;
463
464 len = strlen(pattern);
465
53d687bf 466 if (len < num_x + suffix_len) {
33f23936
JN
467 errno = EINVAL;
468 return -1;
469 }
470
53d687bf 471 if (strncmp(&pattern[len - num_x - suffix_len], x_pattern, num_x)) {
33f23936
JN
472 errno = EINVAL;
473 return -1;
474 }
475
476 /*
477 * Replace pattern's XXXXXX characters with randomness.
478 * Try TMP_MAX different filenames.
479 */
53d687bf 480 filename_template = &pattern[len - num_x - suffix_len];
33f23936 481 for (count = 0; count < TMP_MAX; ++count) {
54a80a9a 482 int i;
47efda96 483 uint64_t v;
484 if (csprng_bytes(&v, sizeof(v)) < 0)
485 return error_errno("unable to get random bytes for temporary file");
486
33f23936 487 /* Fill in the random bits. */
53d687bf 488 for (i = 0; i < num_x; i++) {
54a80a9a
AH
489 filename_template[i] = letters[v % num_letters];
490 v /= num_letters;
491 }
33f23936
JN
492
493 fd = open(pattern, O_CREAT | O_EXCL | O_RDWR, mode);
a2cb86c1 494 if (fd >= 0)
33f23936
JN
495 return fd;
496 /*
497 * Fatal error (EPERM, ENOSPC etc).
498 * It doesn't make sense to loop.
499 */
500 if (errno != EEXIST)
501 break;
33f23936
JN
502 }
503 /* We return the null string if we can't find a unique file name. */
504 pattern[0] = '\0';
505 return -1;
506}
507
508int git_mkstemp_mode(char *pattern, int mode)
509{
510 /* mkstemp is just mkstemps with no suffix */
511 return git_mkstemps_mode(pattern, 0, mode);
512}
513
eb78e23f 514int xmkstemp_mode(char *filename_template, int mode)
b862b61c
MM
515{
516 int fd;
6cf6bb3e 517 char origtemplate[PATH_MAX];
eb78e23f 518 strlcpy(origtemplate, filename_template, sizeof(origtemplate));
b862b61c 519
eb78e23f 520 fd = git_mkstemp_mode(filename_template, mode);
6cf6bb3e
AE
521 if (fd < 0) {
522 int saved_errno = errno;
523 const char *nonrelative_template;
524
eb78e23f
BW
525 if (!filename_template[0])
526 filename_template = origtemplate;
6cf6bb3e 527
eb78e23f 528 nonrelative_template = absolute_path(filename_template);
6cf6bb3e
AE
529 errno = saved_errno;
530 die_errno("Unable to create temporary file '%s'",
531 nonrelative_template);
532 }
b862b61c
MM
533 return fd;
534}
535
abf38abe
NS
536/*
537 * Some platforms return EINTR from fsync. Since fsync is invoked in some
538 * cases by a wrapper that dies on failure, do not expose EINTR to callers.
539 */
540static int fsync_loop(int fd)
541{
542 int err;
543
544 do {
545 err = fsync(fd);
546 } while (err < 0 && errno == EINTR);
547 return err;
548}
549
550int git_fsync(int fd, enum fsync_action action)
551{
552 switch (action) {
553 case FSYNC_WRITEOUT_ONLY:
9a498767 554 count_fsync_writeout_only += 1;
abf38abe
NS
555
556#ifdef __APPLE__
557 /*
558 * On macOS, fsync just causes filesystem cache writeback but
559 * does not flush hardware caches.
560 */
561 return fsync_loop(fd);
562#endif
563
564#ifdef HAVE_SYNC_FILE_RANGE
565 /*
566 * On linux 2.6.17 and above, sync_file_range is the way to
567 * issue a writeback without a hardware flush. An offset of
568 * 0 and size of 0 indicates writeout of the entire file and the
569 * wait flags ensure that all dirty data is written to the disk
570 * (potentially in a disk-side cache) before we continue.
571 */
572
573 return sync_file_range(fd, 0, 0, SYNC_FILE_RANGE_WAIT_BEFORE |
574 SYNC_FILE_RANGE_WRITE |
575 SYNC_FILE_RANGE_WAIT_AFTER);
576#endif
577
578#ifdef fsync_no_flush
579 return fsync_no_flush(fd);
580#endif
581
582 errno = ENOSYS;
583 return -1;
584
585 case FSYNC_HARDWARE_FLUSH:
9a498767
NS
586 count_fsync_hardware_flush += 1;
587
abf38abe
NS
588 /*
589 * On macOS, a special fcntl is required to really flush the
590 * caches within the storage controller. As of this writing,
591 * this is a very expensive operation on Apple SSDs.
592 */
593#ifdef __APPLE__
594 return fcntl(fd, F_FULLFSYNC);
595#else
596 return fsync_loop(fd);
597#endif
598 default:
599 BUG("unexpected git_fsync(%d) call", action);
600 }
601}
602
3a251bac
ÆAB
603static void log_trace_fsync_if(const char *key, intmax_t value)
604{
605 if (value)
606 trace2_data_intmax("fsync", the_repository, key, value);
607}
608
9a498767
NS
609void trace_git_fsync_stats(void)
610{
3a251bac
ÆAB
611 log_trace_fsync_if("fsync/writeout-only", count_fsync_writeout_only);
612 log_trace_fsync_if("fsync/hardware-flush", count_fsync_hardware_flush);
9a498767
NS
613}
614
10e13ec8 615static int warn_if_unremovable(const char *op, const char *file, int rc)
fc71db39 616{
1054af7d
RS
617 int err;
618 if (!rc || errno == ENOENT)
619 return 0;
620 err = errno;
0a288d1e 621 warning_errno("unable to %s '%s'", op, file);
1054af7d 622 errno = err;
fc71db39
AR
623 return rc;
624}
625
9ccc0c08
RS
626int unlink_or_msg(const char *file, struct strbuf *err)
627{
628 int rc = unlink(file);
629
630 assert(err);
631
632 if (!rc || errno == ENOENT)
633 return 0;
634
0a288d1e 635 strbuf_addf(err, "unable to unlink '%s': %s",
9ccc0c08
RS
636 file, strerror(errno));
637 return -1;
638}
639
10e13ec8
PC
640int unlink_or_warn(const char *file)
641{
642 return warn_if_unremovable("unlink", file, unlink(file));
643}
d1723296
PC
644
645int rmdir_or_warn(const char *file)
646{
647 return warn_if_unremovable("rmdir", file, rmdir(file));
648}
80d706af
PC
649
650int remove_or_warn(unsigned int mode, const char *file)
651{
652 return S_ISGITLINK(mode) ? rmdir_or_warn(file) : unlink_or_warn(file);
653}
2f705875 654
4698c8fe
JN
655static int access_error_is_ok(int err, unsigned flag)
656{
c7054209
JH
657 return (is_missing_file_error(err) ||
658 ((flag & ACCESS_EACCES_OK) && err == EACCES));
4698c8fe
JN
659}
660
661int access_or_warn(const char *path, int mode, unsigned flag)
ba8bd830
JK
662{
663 int ret = access(path, mode);
4698c8fe 664 if (ret && !access_error_is_ok(errno, flag))
55b38a48 665 warn_on_inaccessible(path);
ba8bd830
JK
666 return ret;
667}
668
4698c8fe 669int access_or_die(const char *path, int mode, unsigned flag)
96b9e0e3
JN
670{
671 int ret = access(path, mode);
4698c8fe 672 if (ret && !access_error_is_ok(errno, flag))
96b9e0e3
JN
673 die_errno(_("unable to access '%s'"), path);
674 return ret;
675}
676
aa14e980
RS
677char *xgetcwd(void)
678{
679 struct strbuf sb = STRBUF_INIT;
680 if (strbuf_getcwd(&sb))
681 die_errno(_("unable to get current working directory"));
682 return strbuf_detach(&sb, NULL);
683}
316e53e6 684
7b03c89e
JK
685int xsnprintf(char *dst, size_t max, const char *fmt, ...)
686{
687 va_list ap;
688 int len;
689
690 va_start(ap, fmt);
691 len = vsnprintf(dst, max, fmt, ap);
692 va_end(ap);
693
694 if (len < 0)
033abf97 695 BUG("your snprintf is broken");
7b03c89e 696 if (len >= max)
033abf97 697 BUG("attempt to snprintf into too-small buffer");
7b03c89e
JK
698 return len;
699}
700
52563d7e 701void write_file_buf(const char *path, const char *buf, size_t len)
316e53e6 702{
52563d7e 703 int fd = xopen(path, O_WRONLY | O_CREAT | O_TRUNC, 0666);
06f46f23 704 if (write_in_full(fd, buf, len) < 0)
0a288d1e 705 die_errno(_("could not write to '%s'"), path);
52563d7e 706 if (close(fd))
0a288d1e 707 die_errno(_("could not close '%s'"), path);
316e53e6 708}
2024d317 709
ef22318c 710void write_file(const char *path, const char *fmt, ...)
12d6ce1d 711{
12d6ce1d 712 va_list params;
316e53e6 713 struct strbuf sb = STRBUF_INIT;
12d6ce1d
JH
714
715 va_start(params, fmt);
ef22318c 716 strbuf_vaddf(&sb, fmt, params);
12d6ce1d 717 va_end(params);
12d6ce1d 718
ef22318c 719 strbuf_complete_line(&sb);
12d6ce1d 720
52563d7e 721 write_file_buf(path, sb.buf, sb.len);
ef22318c 722 strbuf_release(&sb);
12d6ce1d
JH
723}
724
2024d317
JS
725void sleep_millisec(int millisec)
726{
727 poll(NULL, 0, millisec);
728}
5781a9a2
DT
729
730int xgethostname(char *buf, size_t len)
731{
732 /*
733 * If the full hostname doesn't fit in buf, POSIX does not
734 * specify whether the buffer will be null-terminated, so to
735 * be safe, do it ourselves.
736 */
737 int ret = gethostname(buf, len);
738 if (!ret)
739 buf[len - 1] = 0;
740 return ret;
741}
e3b1e3bd
PB
742
743int is_empty_or_missing_file(const char *filename)
744{
745 struct stat st;
746
747 if (stat(filename, &st) < 0) {
748 if (errno == ENOENT)
749 return 1;
750 die_errno(_("could not stat %s"), filename);
751 }
752
753 return !st.st_size;
754}
00611d84
JK
755
756int open_nofollow(const char *path, int flags)
757{
758#ifdef O_NOFOLLOW
759 return open(path, flags | O_NOFOLLOW);
760#else
761 struct stat st;
762 if (lstat(path, &st) < 0)
763 return -1;
764 if (S_ISLNK(st.st_mode)) {
765 errno = ELOOP;
766 return -1;
767 }
768 return open(path, flags);
769#endif
770}
05cd988d 771
772int csprng_bytes(void *buf, size_t len)
773{
774#if defined(HAVE_ARC4RANDOM) || defined(HAVE_ARC4RANDOM_LIBBSD)
775 /* This function never returns an error. */
776 arc4random_buf(buf, len);
777 return 0;
778#elif defined(HAVE_GETRANDOM)
779 ssize_t res;
780 char *p = buf;
781 while (len) {
782 res = getrandom(p, len, 0);
783 if (res < 0)
784 return -1;
785 len -= res;
786 p += res;
787 }
788 return 0;
789#elif defined(HAVE_GETENTROPY)
790 int res;
791 char *p = buf;
792 while (len) {
793 /* getentropy has a maximum size of 256 bytes. */
794 size_t chunk = len < 256 ? len : 256;
795 res = getentropy(p, chunk);
796 if (res < 0)
797 return -1;
798 len -= chunk;
799 p += chunk;
800 }
801 return 0;
802#elif defined(HAVE_RTLGENRANDOM)
803 if (!RtlGenRandom(buf, len))
804 return -1;
805 return 0;
806#elif defined(HAVE_OPENSSL_CSPRNG)
807 int res = RAND_bytes(buf, len);
808 if (res == 1)
809 return 0;
810 if (res == -1)
811 errno = ENOTSUP;
812 else
813 errno = EIO;
814 return -1;
815#else
816 ssize_t res;
817 char *p = buf;
818 int fd, err;
819 fd = open("/dev/urandom", O_RDONLY);
820 if (fd < 0)
821 return -1;
822 while (len) {
823 res = xread(fd, p, len);
824 if (res < 0) {
825 err = errno;
826 close(fd);
827 errno = err;
828 return -1;
829 }
830 len -= res;
831 p += res;
832 }
833 close(fd);
834 return 0;
835#endif
836}