]> git.ipfire.org Git - thirdparty/git.git/blame - wrapper.c
Merge branch 'gc/recursive-fetch-with-unused-submodules'
[thirdparty/git.git] / wrapper.c
CommitLineData
112db553
LT
1/*
2 * Various trivial helper wrappers around standard functions
3 */
4#include "cache.h"
b2141fc1 5#include "config.h"
112db553 6
19d3f228
NS
7#ifdef HAVE_RTLGENRANDOM
8/* This is required to get access to RtlGenRandom. */
9#define SystemFunction036 NTAPI SystemFunction036
10#include <NTSecAPI.h>
11#undef SystemFunction036
12#endif
13
f8bb1d94 14static int memory_limit_check(size_t size, int gentle)
d41489a6 15{
9927d962
SP
16 static size_t limit = 0;
17 if (!limit) {
18 limit = git_env_ulong("GIT_ALLOC_LIMIT", 0);
19 if (!limit)
20 limit = SIZE_MAX;
d41489a6 21 }
f0d89001 22 if (size > limit) {
f8bb1d94 23 if (gentle) {
f0d89001
JH
24 error("attempting to allocate %"PRIuMAX" over limit %"PRIuMAX,
25 (uintmax_t)size, (uintmax_t)limit);
f8bb1d94
NTND
26 return -1;
27 } else
f0d89001
JH
28 die("attempting to allocate %"PRIuMAX" over limit %"PRIuMAX,
29 (uintmax_t)size, (uintmax_t)limit);
f8bb1d94
NTND
30 }
31 return 0;
d41489a6
NTND
32}
33
112db553
LT
34char *xstrdup(const char *str)
35{
36 char *ret = strdup(str);
9827d4c1
JK
37 if (!ret)
38 die("Out of memory, strdup failed");
112db553
LT
39 return ret;
40}
41
f8bb1d94 42static void *do_xmalloc(size_t size, int gentle)
112db553 43{
d41489a6
NTND
44 void *ret;
45
f8bb1d94
NTND
46 if (memory_limit_check(size, gentle))
47 return NULL;
d41489a6 48 ret = malloc(size);
112db553
LT
49 if (!ret && !size)
50 ret = malloc(1);
51 if (!ret) {
9827d4c1
JK
52 if (!gentle)
53 die("Out of memory, malloc failed (tried to allocate %lu bytes)",
54 (unsigned long)size);
55 else {
56 error("Out of memory, malloc failed (tried to allocate %lu bytes)",
57 (unsigned long)size);
58 return NULL;
f8bb1d94 59 }
112db553
LT
60 }
61#ifdef XMALLOC_POISON
62 memset(ret, 0xA5, size);
63#endif
64 return ret;
65}
66
f8bb1d94
NTND
67void *xmalloc(size_t size)
68{
69 return do_xmalloc(size, 0);
70}
71
72static void *do_xmallocz(size_t size, int gentle)
5bf9219d
IL
73{
74 void *ret;
f8bb1d94
NTND
75 if (unsigned_add_overflows(size, 1)) {
76 if (gentle) {
77 error("Data too large to fit into virtual memory space.");
78 return NULL;
79 } else
80 die("Data too large to fit into virtual memory space.");
81 }
82 ret = do_xmalloc(size + 1, gentle);
83 if (ret)
84 ((char*)ret)[size] = 0;
5bf9219d
IL
85 return ret;
86}
87
f8bb1d94
NTND
88void *xmallocz(size_t size)
89{
90 return do_xmallocz(size, 0);
91}
92
93void *xmallocz_gently(size_t size)
94{
95 return do_xmallocz(size, 1);
96}
97
112db553
LT
98/*
99 * xmemdupz() allocates (len + 1) bytes of memory, duplicates "len" bytes of
100 * "data" to the allocated memory, zero terminates the allocated memory,
101 * and returns a pointer to the allocated memory. If the allocation fails,
102 * the program dies.
103 */
104void *xmemdupz(const void *data, size_t len)
105{
5bf9219d 106 return memcpy(xmallocz(len), data, len);
112db553
LT
107}
108
109char *xstrndup(const char *str, size_t len)
110{
111 char *p = memchr(str, '\0', len);
112 return xmemdupz(str, p ? p - str : len);
113}
114
14570dc6 115int xstrncmpz(const char *s, const char *t, size_t len)
116{
117 int res = strncmp(s, t, len);
118 if (res)
119 return res;
120 return s[len] == '\0' ? 0 : 1;
121}
122
112db553
LT
123void *xrealloc(void *ptr, size_t size)
124{
d41489a6
NTND
125 void *ret;
126
6479ea4a
JK
127 if (!size) {
128 free(ptr);
129 return xmalloc(0);
130 }
131
f8bb1d94 132 memory_limit_check(size, 0);
d41489a6 133 ret = realloc(ptr, size);
9827d4c1
JK
134 if (!ret)
135 die("Out of memory, realloc failed");
112db553
LT
136 return ret;
137}
138
139void *xcalloc(size_t nmemb, size_t size)
140{
d41489a6
NTND
141 void *ret;
142
e7792a74
JK
143 if (unsigned_mult_overflows(nmemb, size))
144 die("data too large to fit into virtual memory space");
145
f8bb1d94 146 memory_limit_check(size * nmemb, 0);
d41489a6 147 ret = calloc(nmemb, size);
112db553
LT
148 if (!ret && (!nmemb || !size))
149 ret = calloc(1, 1);
9827d4c1
JK
150 if (!ret)
151 die("Out of memory, calloc failed");
112db553
LT
152 return ret;
153}
154
3540c71e
ÆAB
155void xsetenv(const char *name, const char *value, int overwrite)
156{
157 if (setenv(name, value, overwrite))
158 die_errno(_("could not setenv '%s'"), name ? name : "(null)");
159}
160
0b6806b9
SP
161/*
162 * Limit size of IO chunks, because huge chunks only cause pain. OS X
163 * 64-bit is buggy, returning EINVAL if len >= INT_MAX; and even in
382d20e3 164 * the absence of bugs, large chunks can result in bad latencies when
0b6806b9 165 * you decide to kill the process.
a983e6ac
JH
166 *
167 * We pick 8 MiB as our default, but if the platform defines SSIZE_MAX
168 * that is smaller than that, clip it to SSIZE_MAX, as a call to
169 * read(2) or write(2) larger than that is allowed to fail. As the last
170 * resort, we allow a port to pass via CFLAGS e.g. "-DMAX_IO_SIZE=value"
171 * to override this, if the definition of SSIZE_MAX given by the platform
172 * is broken.
0b6806b9 173 */
a983e6ac
JH
174#ifndef MAX_IO_SIZE
175# define MAX_IO_SIZE_DEFAULT (8*1024*1024)
176# if defined(SSIZE_MAX) && (SSIZE_MAX < MAX_IO_SIZE_DEFAULT)
177# define MAX_IO_SIZE SSIZE_MAX
178# else
179# define MAX_IO_SIZE MAX_IO_SIZE_DEFAULT
180# endif
181#endif
0b6806b9 182
3ff53df7
PT
183/**
184 * xopen() is the same as open(), but it die()s if the open() fails.
185 */
186int xopen(const char *path, int oflag, ...)
187{
188 mode_t mode = 0;
189 va_list ap;
190
191 /*
192 * va_arg() will have undefined behavior if the specified type is not
193 * compatible with the argument type. Since integers are promoted to
194 * ints, we fetch the next argument as an int, and then cast it to a
195 * mode_t to avoid undefined behavior.
196 */
197 va_start(ap, oflag);
198 if (oflag & O_CREAT)
199 mode = va_arg(ap, int);
200 va_end(ap);
201
202 for (;;) {
203 int fd = open(path, oflag, mode);
204 if (fd >= 0)
205 return fd;
206 if (errno == EINTR)
207 continue;
208
a7439d0f
RS
209 if ((oflag & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
210 die_errno(_("unable to create '%s'"), path);
211 else if ((oflag & O_RDWR) == O_RDWR)
3ff53df7
PT
212 die_errno(_("could not open '%s' for reading and writing"), path);
213 else if ((oflag & O_WRONLY) == O_WRONLY)
214 die_errno(_("could not open '%s' for writing"), path);
215 else
216 die_errno(_("could not open '%s' for reading"), path);
217 }
218}
219
d751dd11
EW
220static int handle_nonblock(int fd, short poll_events, int err)
221{
222 struct pollfd pfd;
223
224 if (err != EAGAIN && err != EWOULDBLOCK)
225 return 0;
226
227 pfd.fd = fd;
228 pfd.events = poll_events;
229
230 /*
231 * no need to check for errors, here;
232 * a subsequent read/write will detect unrecoverable errors
233 */
234 poll(&pfd, 1, -1);
235 return 1;
236}
237
112db553
LT
238/*
239 * xread() is the same a read(), but it automatically restarts read()
240 * operations with a recoverable error (EAGAIN and EINTR). xread()
241 * DOES NOT GUARANTEE that "len" bytes is read even if the data is available.
242 */
243ssize_t xread(int fd, void *buf, size_t len)
244{
245 ssize_t nr;
0b6806b9 246 if (len > MAX_IO_SIZE)
7cd54d37 247 len = MAX_IO_SIZE;
112db553
LT
248 while (1) {
249 nr = read(fd, buf, len);
1079c4be
SB
250 if (nr < 0) {
251 if (errno == EINTR)
252 continue;
d751dd11 253 if (handle_nonblock(fd, POLLIN, errno))
c22f6202 254 continue;
1079c4be 255 }
112db553
LT
256 return nr;
257 }
258}
259
260/*
261 * xwrite() is the same a write(), but it automatically restarts write()
262 * operations with a recoverable error (EAGAIN and EINTR). xwrite() DOES NOT
263 * GUARANTEE that "len" bytes is written even if the operation is successful.
264 */
265ssize_t xwrite(int fd, const void *buf, size_t len)
266{
267 ssize_t nr;
0b6806b9 268 if (len > MAX_IO_SIZE)
7cd54d37 269 len = MAX_IO_SIZE;
112db553
LT
270 while (1) {
271 nr = write(fd, buf, len);
ef1cf016
EW
272 if (nr < 0) {
273 if (errno == EINTR)
274 continue;
d751dd11 275 if (handle_nonblock(fd, POLLOUT, errno))
ef1cf016 276 continue;
ef1cf016
EW
277 }
278
9aa91af0
YM
279 return nr;
280 }
281}
282
283/*
284 * xpread() is the same as pread(), but it automatically restarts pread()
285 * operations with a recoverable error (EAGAIN and EINTR). xpread() DOES
286 * NOT GUARANTEE that "len" bytes is read even if the data is available.
287 */
288ssize_t xpread(int fd, void *buf, size_t len, off_t offset)
289{
290 ssize_t nr;
291 if (len > MAX_IO_SIZE)
292 len = MAX_IO_SIZE;
293 while (1) {
294 nr = pread(fd, buf, len, offset);
295 if ((nr < 0) && (errno == EAGAIN || errno == EINTR))
112db553
LT
296 continue;
297 return nr;
298 }
299}
300
559e840b
JH
301ssize_t read_in_full(int fd, void *buf, size_t count)
302{
303 char *p = buf;
304 ssize_t total = 0;
305
306 while (count > 0) {
307 ssize_t loaded = xread(fd, p, count);
56d7c27a
JK
308 if (loaded < 0)
309 return -1;
310 if (loaded == 0)
311 return total;
559e840b
JH
312 count -= loaded;
313 p += loaded;
314 total += loaded;
315 }
316
317 return total;
318}
319
320ssize_t write_in_full(int fd, const void *buf, size_t count)
321{
322 const char *p = buf;
323 ssize_t total = 0;
324
325 while (count > 0) {
326 ssize_t written = xwrite(fd, p, count);
327 if (written < 0)
328 return -1;
329 if (!written) {
330 errno = ENOSPC;
331 return -1;
332 }
333 count -= written;
334 p += written;
335 total += written;
336 }
337
338 return total;
339}
340
426ddeea
YM
341ssize_t pread_in_full(int fd, void *buf, size_t count, off_t offset)
342{
343 char *p = buf;
344 ssize_t total = 0;
345
346 while (count > 0) {
347 ssize_t loaded = xpread(fd, p, count, offset);
348 if (loaded < 0)
349 return -1;
350 if (loaded == 0)
351 return total;
352 count -= loaded;
353 p += loaded;
354 total += loaded;
355 offset += loaded;
356 }
357
358 return total;
359}
360
112db553
LT
361int xdup(int fd)
362{
363 int ret = dup(fd);
364 if (ret < 0)
d824cbba 365 die_errno("dup failed");
112db553
LT
366 return ret;
367}
368
260eec29
PT
369/**
370 * xfopen() is the same as fopen(), but it die()s if the fopen() fails.
371 */
372FILE *xfopen(const char *path, const char *mode)
373{
374 for (;;) {
375 FILE *fp = fopen(path, mode);
376 if (fp)
377 return fp;
378 if (errno == EINTR)
379 continue;
380
381 if (*mode && mode[1] == '+')
382 die_errno(_("could not open '%s' for reading and writing"), path);
383 else if (*mode == 'w' || *mode == 'a')
384 die_errno(_("could not open '%s' for writing"), path);
385 else
386 die_errno(_("could not open '%s' for reading"), path);
387 }
388}
389
112db553
LT
390FILE *xfdopen(int fd, const char *mode)
391{
392 FILE *stream = fdopen(fd, mode);
393 if (stream == NULL)
d824cbba 394 die_errno("Out of memory? fdopen failed");
112db553
LT
395 return stream;
396}
397
79d7582e
JS
398FILE *fopen_for_writing(const char *path)
399{
400 FILE *ret = fopen(path, "w");
401
402 if (!ret && errno == EPERM) {
403 if (!unlink(path))
404 ret = fopen(path, "w");
405 else
406 errno = EPERM;
407 }
408 return ret;
409}
410
382fb07f
NTND
411static void warn_on_inaccessible(const char *path)
412{
413 warning_errno(_("unable to access '%s'"), path);
414}
415
11dc1fcb
NTND
416int warn_on_fopen_errors(const char *path)
417{
418 if (errno != ENOENT && errno != ENOTDIR) {
419 warn_on_inaccessible(path);
420 return -1;
421 }
422
423 return 0;
424}
425
e9d983f1
NTND
426FILE *fopen_or_warn(const char *path, const char *mode)
427{
428 FILE *fp = fopen(path, mode);
429
430 if (fp)
431 return fp;
432
433 warn_on_fopen_errors(path);
434 return NULL;
435}
436
eb78e23f 437int xmkstemp(char *filename_template)
112db553
LT
438{
439 int fd;
6cf6bb3e 440 char origtemplate[PATH_MAX];
eb78e23f 441 strlcpy(origtemplate, filename_template, sizeof(origtemplate));
112db553 442
eb78e23f 443 fd = mkstemp(filename_template);
6cf6bb3e
AE
444 if (fd < 0) {
445 int saved_errno = errno;
446 const char *nonrelative_template;
447
eb78e23f
BW
448 if (strlen(filename_template) != strlen(origtemplate))
449 filename_template = origtemplate;
6cf6bb3e 450
eb78e23f 451 nonrelative_template = absolute_path(filename_template);
6cf6bb3e
AE
452 errno = saved_errno;
453 die_errno("Unable to create temporary file '%s'",
454 nonrelative_template);
455 }
112db553
LT
456 return fd;
457}
39c68542 458
33f23936
JN
459/* Adapted from libiberty's mkstemp.c. */
460
461#undef TMP_MAX
462#define TMP_MAX 16384
463
464int git_mkstemps_mode(char *pattern, int suffix_len, int mode)
465{
466 static const char letters[] =
467 "abcdefghijklmnopqrstuvwxyz"
468 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
469 "0123456789";
53d687bf
JK
470 static const int num_letters = ARRAY_SIZE(letters) - 1;
471 static const char x_pattern[] = "XXXXXX";
472 static const int num_x = ARRAY_SIZE(x_pattern) - 1;
eb78e23f 473 char *filename_template;
33f23936
JN
474 size_t len;
475 int fd, count;
476
477 len = strlen(pattern);
478
53d687bf 479 if (len < num_x + suffix_len) {
33f23936
JN
480 errno = EINVAL;
481 return -1;
482 }
483
53d687bf 484 if (strncmp(&pattern[len - num_x - suffix_len], x_pattern, num_x)) {
33f23936
JN
485 errno = EINVAL;
486 return -1;
487 }
488
489 /*
490 * Replace pattern's XXXXXX characters with randomness.
491 * Try TMP_MAX different filenames.
492 */
53d687bf 493 filename_template = &pattern[len - num_x - suffix_len];
33f23936 494 for (count = 0; count < TMP_MAX; ++count) {
54a80a9a 495 int i;
47efda96 496 uint64_t v;
497 if (csprng_bytes(&v, sizeof(v)) < 0)
498 return error_errno("unable to get random bytes for temporary file");
499
33f23936 500 /* Fill in the random bits. */
53d687bf 501 for (i = 0; i < num_x; i++) {
54a80a9a
AH
502 filename_template[i] = letters[v % num_letters];
503 v /= num_letters;
504 }
33f23936
JN
505
506 fd = open(pattern, O_CREAT | O_EXCL | O_RDWR, mode);
a2cb86c1 507 if (fd >= 0)
33f23936
JN
508 return fd;
509 /*
510 * Fatal error (EPERM, ENOSPC etc).
511 * It doesn't make sense to loop.
512 */
513 if (errno != EEXIST)
514 break;
33f23936
JN
515 }
516 /* We return the null string if we can't find a unique file name. */
517 pattern[0] = '\0';
518 return -1;
519}
520
521int git_mkstemp_mode(char *pattern, int mode)
522{
523 /* mkstemp is just mkstemps with no suffix */
524 return git_mkstemps_mode(pattern, 0, mode);
525}
526
eb78e23f 527int xmkstemp_mode(char *filename_template, int mode)
b862b61c
MM
528{
529 int fd;
6cf6bb3e 530 char origtemplate[PATH_MAX];
eb78e23f 531 strlcpy(origtemplate, filename_template, sizeof(origtemplate));
b862b61c 532
eb78e23f 533 fd = git_mkstemp_mode(filename_template, mode);
6cf6bb3e
AE
534 if (fd < 0) {
535 int saved_errno = errno;
536 const char *nonrelative_template;
537
eb78e23f
BW
538 if (!filename_template[0])
539 filename_template = origtemplate;
6cf6bb3e 540
eb78e23f 541 nonrelative_template = absolute_path(filename_template);
6cf6bb3e
AE
542 errno = saved_errno;
543 die_errno("Unable to create temporary file '%s'",
544 nonrelative_template);
545 }
b862b61c
MM
546 return fd;
547}
548
abf38abe
NS
549/*
550 * Some platforms return EINTR from fsync. Since fsync is invoked in some
551 * cases by a wrapper that dies on failure, do not expose EINTR to callers.
552 */
553static int fsync_loop(int fd)
554{
555 int err;
556
557 do {
558 err = fsync(fd);
559 } while (err < 0 && errno == EINTR);
560 return err;
561}
562
563int git_fsync(int fd, enum fsync_action action)
564{
565 switch (action) {
566 case FSYNC_WRITEOUT_ONLY:
567
568#ifdef __APPLE__
569 /*
570 * On macOS, fsync just causes filesystem cache writeback but
571 * does not flush hardware caches.
572 */
573 return fsync_loop(fd);
574#endif
575
576#ifdef HAVE_SYNC_FILE_RANGE
577 /*
578 * On linux 2.6.17 and above, sync_file_range is the way to
579 * issue a writeback without a hardware flush. An offset of
580 * 0 and size of 0 indicates writeout of the entire file and the
581 * wait flags ensure that all dirty data is written to the disk
582 * (potentially in a disk-side cache) before we continue.
583 */
584
585 return sync_file_range(fd, 0, 0, SYNC_FILE_RANGE_WAIT_BEFORE |
586 SYNC_FILE_RANGE_WRITE |
587 SYNC_FILE_RANGE_WAIT_AFTER);
588#endif
589
590#ifdef fsync_no_flush
591 return fsync_no_flush(fd);
592#endif
593
594 errno = ENOSYS;
595 return -1;
596
597 case FSYNC_HARDWARE_FLUSH:
598 /*
599 * On macOS, a special fcntl is required to really flush the
600 * caches within the storage controller. As of this writing,
601 * this is a very expensive operation on Apple SSDs.
602 */
603#ifdef __APPLE__
604 return fcntl(fd, F_FULLFSYNC);
605#else
606 return fsync_loop(fd);
607#endif
608 default:
609 BUG("unexpected git_fsync(%d) call", action);
610 }
611}
612
10e13ec8 613static int warn_if_unremovable(const char *op, const char *file, int rc)
fc71db39 614{
1054af7d
RS
615 int err;
616 if (!rc || errno == ENOENT)
617 return 0;
618 err = errno;
0a288d1e 619 warning_errno("unable to %s '%s'", op, file);
1054af7d 620 errno = err;
fc71db39
AR
621 return rc;
622}
623
9ccc0c08
RS
624int unlink_or_msg(const char *file, struct strbuf *err)
625{
626 int rc = unlink(file);
627
628 assert(err);
629
630 if (!rc || errno == ENOENT)
631 return 0;
632
0a288d1e 633 strbuf_addf(err, "unable to unlink '%s': %s",
9ccc0c08
RS
634 file, strerror(errno));
635 return -1;
636}
637
10e13ec8
PC
638int unlink_or_warn(const char *file)
639{
640 return warn_if_unremovable("unlink", file, unlink(file));
641}
d1723296
PC
642
643int rmdir_or_warn(const char *file)
644{
645 return warn_if_unremovable("rmdir", file, rmdir(file));
646}
80d706af
PC
647
648int remove_or_warn(unsigned int mode, const char *file)
649{
650 return S_ISGITLINK(mode) ? rmdir_or_warn(file) : unlink_or_warn(file);
651}
2f705875 652
4698c8fe
JN
653static int access_error_is_ok(int err, unsigned flag)
654{
c7054209
JH
655 return (is_missing_file_error(err) ||
656 ((flag & ACCESS_EACCES_OK) && err == EACCES));
4698c8fe
JN
657}
658
659int access_or_warn(const char *path, int mode, unsigned flag)
ba8bd830
JK
660{
661 int ret = access(path, mode);
4698c8fe 662 if (ret && !access_error_is_ok(errno, flag))
55b38a48 663 warn_on_inaccessible(path);
ba8bd830
JK
664 return ret;
665}
666
4698c8fe 667int access_or_die(const char *path, int mode, unsigned flag)
96b9e0e3
JN
668{
669 int ret = access(path, mode);
4698c8fe 670 if (ret && !access_error_is_ok(errno, flag))
96b9e0e3
JN
671 die_errno(_("unable to access '%s'"), path);
672 return ret;
673}
674
aa14e980
RS
675char *xgetcwd(void)
676{
677 struct strbuf sb = STRBUF_INIT;
678 if (strbuf_getcwd(&sb))
679 die_errno(_("unable to get current working directory"));
680 return strbuf_detach(&sb, NULL);
681}
316e53e6 682
7b03c89e
JK
683int xsnprintf(char *dst, size_t max, const char *fmt, ...)
684{
685 va_list ap;
686 int len;
687
688 va_start(ap, fmt);
689 len = vsnprintf(dst, max, fmt, ap);
690 va_end(ap);
691
692 if (len < 0)
033abf97 693 BUG("your snprintf is broken");
7b03c89e 694 if (len >= max)
033abf97 695 BUG("attempt to snprintf into too-small buffer");
7b03c89e
JK
696 return len;
697}
698
52563d7e 699void write_file_buf(const char *path, const char *buf, size_t len)
316e53e6 700{
52563d7e 701 int fd = xopen(path, O_WRONLY | O_CREAT | O_TRUNC, 0666);
06f46f23 702 if (write_in_full(fd, buf, len) < 0)
0a288d1e 703 die_errno(_("could not write to '%s'"), path);
52563d7e 704 if (close(fd))
0a288d1e 705 die_errno(_("could not close '%s'"), path);
316e53e6 706}
2024d317 707
ef22318c 708void write_file(const char *path, const char *fmt, ...)
12d6ce1d 709{
12d6ce1d 710 va_list params;
316e53e6 711 struct strbuf sb = STRBUF_INIT;
12d6ce1d
JH
712
713 va_start(params, fmt);
ef22318c 714 strbuf_vaddf(&sb, fmt, params);
12d6ce1d 715 va_end(params);
12d6ce1d 716
ef22318c 717 strbuf_complete_line(&sb);
12d6ce1d 718
52563d7e 719 write_file_buf(path, sb.buf, sb.len);
ef22318c 720 strbuf_release(&sb);
12d6ce1d
JH
721}
722
2024d317
JS
723void sleep_millisec(int millisec)
724{
725 poll(NULL, 0, millisec);
726}
5781a9a2
DT
727
728int xgethostname(char *buf, size_t len)
729{
730 /*
731 * If the full hostname doesn't fit in buf, POSIX does not
732 * specify whether the buffer will be null-terminated, so to
733 * be safe, do it ourselves.
734 */
735 int ret = gethostname(buf, len);
736 if (!ret)
737 buf[len - 1] = 0;
738 return ret;
739}
e3b1e3bd
PB
740
741int is_empty_or_missing_file(const char *filename)
742{
743 struct stat st;
744
745 if (stat(filename, &st) < 0) {
746 if (errno == ENOENT)
747 return 1;
748 die_errno(_("could not stat %s"), filename);
749 }
750
751 return !st.st_size;
752}
00611d84
JK
753
754int open_nofollow(const char *path, int flags)
755{
756#ifdef O_NOFOLLOW
757 return open(path, flags | O_NOFOLLOW);
758#else
759 struct stat st;
760 if (lstat(path, &st) < 0)
761 return -1;
762 if (S_ISLNK(st.st_mode)) {
763 errno = ELOOP;
764 return -1;
765 }
766 return open(path, flags);
767#endif
768}
05cd988d 769
770int csprng_bytes(void *buf, size_t len)
771{
772#if defined(HAVE_ARC4RANDOM) || defined(HAVE_ARC4RANDOM_LIBBSD)
773 /* This function never returns an error. */
774 arc4random_buf(buf, len);
775 return 0;
776#elif defined(HAVE_GETRANDOM)
777 ssize_t res;
778 char *p = buf;
779 while (len) {
780 res = getrandom(p, len, 0);
781 if (res < 0)
782 return -1;
783 len -= res;
784 p += res;
785 }
786 return 0;
787#elif defined(HAVE_GETENTROPY)
788 int res;
789 char *p = buf;
790 while (len) {
791 /* getentropy has a maximum size of 256 bytes. */
792 size_t chunk = len < 256 ? len : 256;
793 res = getentropy(p, chunk);
794 if (res < 0)
795 return -1;
796 len -= chunk;
797 p += chunk;
798 }
799 return 0;
800#elif defined(HAVE_RTLGENRANDOM)
801 if (!RtlGenRandom(buf, len))
802 return -1;
803 return 0;
804#elif defined(HAVE_OPENSSL_CSPRNG)
805 int res = RAND_bytes(buf, len);
806 if (res == 1)
807 return 0;
808 if (res == -1)
809 errno = ENOTSUP;
810 else
811 errno = EIO;
812 return -1;
813#else
814 ssize_t res;
815 char *p = buf;
816 int fd, err;
817 fd = open("/dev/urandom", O_RDONLY);
818 if (fd < 0)
819 return -1;
820 while (len) {
821 res = xread(fd, p, len);
822 if (res < 0) {
823 err = errno;
824 close(fd);
825 errno = err;
826 return -1;
827 }
828 len -= res;
829 p += res;
830 }
831 close(fd);
832 return 0;
833#endif
834}