]> git.ipfire.org Git - thirdparty/git.git/blame - wrapper.c
Merge branch 'en/ort-finalize-after-0-merges-fix'
[thirdparty/git.git] / wrapper.c
CommitLineData
112db553
LT
1/*
2 * Various trivial helper wrappers around standard functions
3 */
4#include "cache.h"
0b027f6c 5#include "abspath.h"
b2141fc1 6#include "config.h"
f394e093 7#include "gettext.h"
74ea5c95 8#include "trace2.h"
d5ebb50d 9#include "wrapper.h"
112db553 10
9a498767
NS
11static intmax_t count_fsync_writeout_only;
12static intmax_t count_fsync_hardware_flush;
13
19d3f228
NS
14#ifdef HAVE_RTLGENRANDOM
15/* This is required to get access to RtlGenRandom. */
16#define SystemFunction036 NTAPI SystemFunction036
17#include <NTSecAPI.h>
18#undef SystemFunction036
19#endif
20
f8bb1d94 21static int memory_limit_check(size_t size, int gentle)
d41489a6 22{
9927d962
SP
23 static size_t limit = 0;
24 if (!limit) {
25 limit = git_env_ulong("GIT_ALLOC_LIMIT", 0);
26 if (!limit)
27 limit = SIZE_MAX;
d41489a6 28 }
f0d89001 29 if (size > limit) {
f8bb1d94 30 if (gentle) {
f0d89001
JH
31 error("attempting to allocate %"PRIuMAX" over limit %"PRIuMAX,
32 (uintmax_t)size, (uintmax_t)limit);
f8bb1d94
NTND
33 return -1;
34 } else
f0d89001
JH
35 die("attempting to allocate %"PRIuMAX" over limit %"PRIuMAX,
36 (uintmax_t)size, (uintmax_t)limit);
f8bb1d94
NTND
37 }
38 return 0;
d41489a6
NTND
39}
40
112db553
LT
41char *xstrdup(const char *str)
42{
43 char *ret = strdup(str);
9827d4c1
JK
44 if (!ret)
45 die("Out of memory, strdup failed");
112db553
LT
46 return ret;
47}
48
f8bb1d94 49static void *do_xmalloc(size_t size, int gentle)
112db553 50{
d41489a6
NTND
51 void *ret;
52
f8bb1d94
NTND
53 if (memory_limit_check(size, gentle))
54 return NULL;
d41489a6 55 ret = malloc(size);
112db553
LT
56 if (!ret && !size)
57 ret = malloc(1);
58 if (!ret) {
9827d4c1
JK
59 if (!gentle)
60 die("Out of memory, malloc failed (tried to allocate %lu bytes)",
61 (unsigned long)size);
62 else {
63 error("Out of memory, malloc failed (tried to allocate %lu bytes)",
64 (unsigned long)size);
65 return NULL;
f8bb1d94 66 }
112db553
LT
67 }
68#ifdef XMALLOC_POISON
69 memset(ret, 0xA5, size);
70#endif
71 return ret;
72}
73
f8bb1d94
NTND
74void *xmalloc(size_t size)
75{
76 return do_xmalloc(size, 0);
77}
78
79static void *do_xmallocz(size_t size, int gentle)
5bf9219d
IL
80{
81 void *ret;
f8bb1d94
NTND
82 if (unsigned_add_overflows(size, 1)) {
83 if (gentle) {
84 error("Data too large to fit into virtual memory space.");
85 return NULL;
86 } else
87 die("Data too large to fit into virtual memory space.");
88 }
89 ret = do_xmalloc(size + 1, gentle);
90 if (ret)
91 ((char*)ret)[size] = 0;
5bf9219d
IL
92 return ret;
93}
94
f8bb1d94
NTND
95void *xmallocz(size_t size)
96{
97 return do_xmallocz(size, 0);
98}
99
100void *xmallocz_gently(size_t size)
101{
102 return do_xmallocz(size, 1);
103}
104
112db553
LT
105/*
106 * xmemdupz() allocates (len + 1) bytes of memory, duplicates "len" bytes of
107 * "data" to the allocated memory, zero terminates the allocated memory,
108 * and returns a pointer to the allocated memory. If the allocation fails,
109 * the program dies.
110 */
111void *xmemdupz(const void *data, size_t len)
112{
5bf9219d 113 return memcpy(xmallocz(len), data, len);
112db553
LT
114}
115
116char *xstrndup(const char *str, size_t len)
117{
118 char *p = memchr(str, '\0', len);
119 return xmemdupz(str, p ? p - str : len);
120}
121
14570dc6 122int xstrncmpz(const char *s, const char *t, size_t len)
123{
124 int res = strncmp(s, t, len);
125 if (res)
126 return res;
127 return s[len] == '\0' ? 0 : 1;
128}
129
112db553
LT
130void *xrealloc(void *ptr, size_t size)
131{
d41489a6
NTND
132 void *ret;
133
6479ea4a
JK
134 if (!size) {
135 free(ptr);
136 return xmalloc(0);
137 }
138
f8bb1d94 139 memory_limit_check(size, 0);
d41489a6 140 ret = realloc(ptr, size);
9827d4c1
JK
141 if (!ret)
142 die("Out of memory, realloc failed");
112db553
LT
143 return ret;
144}
145
146void *xcalloc(size_t nmemb, size_t size)
147{
d41489a6
NTND
148 void *ret;
149
e7792a74
JK
150 if (unsigned_mult_overflows(nmemb, size))
151 die("data too large to fit into virtual memory space");
152
f8bb1d94 153 memory_limit_check(size * nmemb, 0);
d41489a6 154 ret = calloc(nmemb, size);
112db553
LT
155 if (!ret && (!nmemb || !size))
156 ret = calloc(1, 1);
9827d4c1
JK
157 if (!ret)
158 die("Out of memory, calloc failed");
112db553
LT
159 return ret;
160}
161
3540c71e
ÆAB
162void xsetenv(const char *name, const char *value, int overwrite)
163{
164 if (setenv(name, value, overwrite))
165 die_errno(_("could not setenv '%s'"), name ? name : "(null)");
166}
167
3ff53df7
PT
168/**
169 * xopen() is the same as open(), but it die()s if the open() fails.
170 */
171int xopen(const char *path, int oflag, ...)
172{
173 mode_t mode = 0;
174 va_list ap;
175
176 /*
177 * va_arg() will have undefined behavior if the specified type is not
178 * compatible with the argument type. Since integers are promoted to
179 * ints, we fetch the next argument as an int, and then cast it to a
180 * mode_t to avoid undefined behavior.
181 */
182 va_start(ap, oflag);
183 if (oflag & O_CREAT)
184 mode = va_arg(ap, int);
185 va_end(ap);
186
187 for (;;) {
188 int fd = open(path, oflag, mode);
189 if (fd >= 0)
190 return fd;
191 if (errno == EINTR)
192 continue;
193
a7439d0f
RS
194 if ((oflag & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
195 die_errno(_("unable to create '%s'"), path);
196 else if ((oflag & O_RDWR) == O_RDWR)
3ff53df7
PT
197 die_errno(_("could not open '%s' for reading and writing"), path);
198 else if ((oflag & O_WRONLY) == O_WRONLY)
199 die_errno(_("could not open '%s' for writing"), path);
200 else
201 die_errno(_("could not open '%s' for reading"), path);
202 }
203}
204
d751dd11
EW
205static int handle_nonblock(int fd, short poll_events, int err)
206{
207 struct pollfd pfd;
208
209 if (err != EAGAIN && err != EWOULDBLOCK)
210 return 0;
211
212 pfd.fd = fd;
213 pfd.events = poll_events;
214
215 /*
216 * no need to check for errors, here;
217 * a subsequent read/write will detect unrecoverable errors
218 */
219 poll(&pfd, 1, -1);
220 return 1;
221}
222
112db553
LT
223/*
224 * xread() is the same a read(), but it automatically restarts read()
225 * operations with a recoverable error (EAGAIN and EINTR). xread()
226 * DOES NOT GUARANTEE that "len" bytes is read even if the data is available.
227 */
228ssize_t xread(int fd, void *buf, size_t len)
229{
230 ssize_t nr;
0b6806b9 231 if (len > MAX_IO_SIZE)
7cd54d37 232 len = MAX_IO_SIZE;
112db553
LT
233 while (1) {
234 nr = read(fd, buf, len);
1079c4be
SB
235 if (nr < 0) {
236 if (errno == EINTR)
237 continue;
d751dd11 238 if (handle_nonblock(fd, POLLIN, errno))
c22f6202 239 continue;
1079c4be 240 }
112db553
LT
241 return nr;
242 }
243}
244
245/*
246 * xwrite() is the same a write(), but it automatically restarts write()
247 * operations with a recoverable error (EAGAIN and EINTR). xwrite() DOES NOT
248 * GUARANTEE that "len" bytes is written even if the operation is successful.
249 */
250ssize_t xwrite(int fd, const void *buf, size_t len)
251{
252 ssize_t nr;
0b6806b9 253 if (len > MAX_IO_SIZE)
7cd54d37 254 len = MAX_IO_SIZE;
112db553
LT
255 while (1) {
256 nr = write(fd, buf, len);
ef1cf016
EW
257 if (nr < 0) {
258 if (errno == EINTR)
259 continue;
d751dd11 260 if (handle_nonblock(fd, POLLOUT, errno))
ef1cf016 261 continue;
ef1cf016
EW
262 }
263
9aa91af0
YM
264 return nr;
265 }
266}
267
268/*
269 * xpread() is the same as pread(), but it automatically restarts pread()
270 * operations with a recoverable error (EAGAIN and EINTR). xpread() DOES
271 * NOT GUARANTEE that "len" bytes is read even if the data is available.
272 */
273ssize_t xpread(int fd, void *buf, size_t len, off_t offset)
274{
275 ssize_t nr;
276 if (len > MAX_IO_SIZE)
277 len = MAX_IO_SIZE;
278 while (1) {
279 nr = pread(fd, buf, len, offset);
280 if ((nr < 0) && (errno == EAGAIN || errno == EINTR))
112db553
LT
281 continue;
282 return nr;
283 }
284}
285
559e840b
JH
286ssize_t read_in_full(int fd, void *buf, size_t count)
287{
288 char *p = buf;
289 ssize_t total = 0;
290
291 while (count > 0) {
292 ssize_t loaded = xread(fd, p, count);
56d7c27a
JK
293 if (loaded < 0)
294 return -1;
295 if (loaded == 0)
296 return total;
559e840b
JH
297 count -= loaded;
298 p += loaded;
299 total += loaded;
300 }
301
302 return total;
303}
304
305ssize_t write_in_full(int fd, const void *buf, size_t count)
306{
307 const char *p = buf;
308 ssize_t total = 0;
309
310 while (count > 0) {
311 ssize_t written = xwrite(fd, p, count);
312 if (written < 0)
313 return -1;
314 if (!written) {
315 errno = ENOSPC;
316 return -1;
317 }
318 count -= written;
319 p += written;
320 total += written;
321 }
322
323 return total;
324}
325
426ddeea
YM
326ssize_t pread_in_full(int fd, void *buf, size_t count, off_t offset)
327{
328 char *p = buf;
329 ssize_t total = 0;
330
331 while (count > 0) {
332 ssize_t loaded = xpread(fd, p, count, offset);
333 if (loaded < 0)
334 return -1;
335 if (loaded == 0)
336 return total;
337 count -= loaded;
338 p += loaded;
339 total += loaded;
340 offset += loaded;
341 }
342
343 return total;
344}
345
112db553
LT
346int xdup(int fd)
347{
348 int ret = dup(fd);
349 if (ret < 0)
d824cbba 350 die_errno("dup failed");
112db553
LT
351 return ret;
352}
353
260eec29
PT
354/**
355 * xfopen() is the same as fopen(), but it die()s if the fopen() fails.
356 */
357FILE *xfopen(const char *path, const char *mode)
358{
359 for (;;) {
360 FILE *fp = fopen(path, mode);
361 if (fp)
362 return fp;
363 if (errno == EINTR)
364 continue;
365
366 if (*mode && mode[1] == '+')
367 die_errno(_("could not open '%s' for reading and writing"), path);
368 else if (*mode == 'w' || *mode == 'a')
369 die_errno(_("could not open '%s' for writing"), path);
370 else
371 die_errno(_("could not open '%s' for reading"), path);
372 }
373}
374
112db553
LT
375FILE *xfdopen(int fd, const char *mode)
376{
377 FILE *stream = fdopen(fd, mode);
afe8a907 378 if (!stream)
d824cbba 379 die_errno("Out of memory? fdopen failed");
112db553
LT
380 return stream;
381}
382
79d7582e
JS
383FILE *fopen_for_writing(const char *path)
384{
385 FILE *ret = fopen(path, "w");
386
387 if (!ret && errno == EPERM) {
388 if (!unlink(path))
389 ret = fopen(path, "w");
390 else
391 errno = EPERM;
392 }
393 return ret;
394}
395
382fb07f
NTND
396static void warn_on_inaccessible(const char *path)
397{
398 warning_errno(_("unable to access '%s'"), path);
399}
400
11dc1fcb
NTND
401int warn_on_fopen_errors(const char *path)
402{
403 if (errno != ENOENT && errno != ENOTDIR) {
404 warn_on_inaccessible(path);
405 return -1;
406 }
407
408 return 0;
409}
410
e9d983f1
NTND
411FILE *fopen_or_warn(const char *path, const char *mode)
412{
413 FILE *fp = fopen(path, mode);
414
415 if (fp)
416 return fp;
417
418 warn_on_fopen_errors(path);
419 return NULL;
420}
421
eb78e23f 422int xmkstemp(char *filename_template)
112db553
LT
423{
424 int fd;
6cf6bb3e 425 char origtemplate[PATH_MAX];
eb78e23f 426 strlcpy(origtemplate, filename_template, sizeof(origtemplate));
112db553 427
eb78e23f 428 fd = mkstemp(filename_template);
6cf6bb3e
AE
429 if (fd < 0) {
430 int saved_errno = errno;
431 const char *nonrelative_template;
432
eb78e23f
BW
433 if (strlen(filename_template) != strlen(origtemplate))
434 filename_template = origtemplate;
6cf6bb3e 435
eb78e23f 436 nonrelative_template = absolute_path(filename_template);
6cf6bb3e
AE
437 errno = saved_errno;
438 die_errno("Unable to create temporary file '%s'",
439 nonrelative_template);
440 }
112db553
LT
441 return fd;
442}
39c68542 443
33f23936
JN
444/* Adapted from libiberty's mkstemp.c. */
445
446#undef TMP_MAX
447#define TMP_MAX 16384
448
449int git_mkstemps_mode(char *pattern, int suffix_len, int mode)
450{
451 static const char letters[] =
452 "abcdefghijklmnopqrstuvwxyz"
453 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
454 "0123456789";
53d687bf
JK
455 static const int num_letters = ARRAY_SIZE(letters) - 1;
456 static const char x_pattern[] = "XXXXXX";
457 static const int num_x = ARRAY_SIZE(x_pattern) - 1;
eb78e23f 458 char *filename_template;
33f23936
JN
459 size_t len;
460 int fd, count;
461
462 len = strlen(pattern);
463
53d687bf 464 if (len < num_x + suffix_len) {
33f23936
JN
465 errno = EINVAL;
466 return -1;
467 }
468
53d687bf 469 if (strncmp(&pattern[len - num_x - suffix_len], x_pattern, num_x)) {
33f23936
JN
470 errno = EINVAL;
471 return -1;
472 }
473
474 /*
475 * Replace pattern's XXXXXX characters with randomness.
476 * Try TMP_MAX different filenames.
477 */
53d687bf 478 filename_template = &pattern[len - num_x - suffix_len];
33f23936 479 for (count = 0; count < TMP_MAX; ++count) {
54a80a9a 480 int i;
47efda96 481 uint64_t v;
482 if (csprng_bytes(&v, sizeof(v)) < 0)
483 return error_errno("unable to get random bytes for temporary file");
484
33f23936 485 /* Fill in the random bits. */
53d687bf 486 for (i = 0; i < num_x; i++) {
54a80a9a
AH
487 filename_template[i] = letters[v % num_letters];
488 v /= num_letters;
489 }
33f23936
JN
490
491 fd = open(pattern, O_CREAT | O_EXCL | O_RDWR, mode);
a2cb86c1 492 if (fd >= 0)
33f23936
JN
493 return fd;
494 /*
495 * Fatal error (EPERM, ENOSPC etc).
496 * It doesn't make sense to loop.
497 */
498 if (errno != EEXIST)
499 break;
33f23936
JN
500 }
501 /* We return the null string if we can't find a unique file name. */
502 pattern[0] = '\0';
503 return -1;
504}
505
506int git_mkstemp_mode(char *pattern, int mode)
507{
508 /* mkstemp is just mkstemps with no suffix */
509 return git_mkstemps_mode(pattern, 0, mode);
510}
511
eb78e23f 512int xmkstemp_mode(char *filename_template, int mode)
b862b61c
MM
513{
514 int fd;
6cf6bb3e 515 char origtemplate[PATH_MAX];
eb78e23f 516 strlcpy(origtemplate, filename_template, sizeof(origtemplate));
b862b61c 517
eb78e23f 518 fd = git_mkstemp_mode(filename_template, mode);
6cf6bb3e
AE
519 if (fd < 0) {
520 int saved_errno = errno;
521 const char *nonrelative_template;
522
eb78e23f
BW
523 if (!filename_template[0])
524 filename_template = origtemplate;
6cf6bb3e 525
eb78e23f 526 nonrelative_template = absolute_path(filename_template);
6cf6bb3e
AE
527 errno = saved_errno;
528 die_errno("Unable to create temporary file '%s'",
529 nonrelative_template);
530 }
b862b61c
MM
531 return fd;
532}
533
abf38abe
NS
534/*
535 * Some platforms return EINTR from fsync. Since fsync is invoked in some
536 * cases by a wrapper that dies on failure, do not expose EINTR to callers.
537 */
538static int fsync_loop(int fd)
539{
540 int err;
541
542 do {
543 err = fsync(fd);
544 } while (err < 0 && errno == EINTR);
545 return err;
546}
547
548int git_fsync(int fd, enum fsync_action action)
549{
550 switch (action) {
551 case FSYNC_WRITEOUT_ONLY:
9a498767 552 count_fsync_writeout_only += 1;
abf38abe
NS
553
554#ifdef __APPLE__
555 /*
556 * On macOS, fsync just causes filesystem cache writeback but
557 * does not flush hardware caches.
558 */
559 return fsync_loop(fd);
560#endif
561
562#ifdef HAVE_SYNC_FILE_RANGE
563 /*
564 * On linux 2.6.17 and above, sync_file_range is the way to
565 * issue a writeback without a hardware flush. An offset of
566 * 0 and size of 0 indicates writeout of the entire file and the
567 * wait flags ensure that all dirty data is written to the disk
568 * (potentially in a disk-side cache) before we continue.
569 */
570
571 return sync_file_range(fd, 0, 0, SYNC_FILE_RANGE_WAIT_BEFORE |
572 SYNC_FILE_RANGE_WRITE |
573 SYNC_FILE_RANGE_WAIT_AFTER);
574#endif
575
576#ifdef fsync_no_flush
577 return fsync_no_flush(fd);
578#endif
579
580 errno = ENOSYS;
581 return -1;
582
583 case FSYNC_HARDWARE_FLUSH:
9a498767
NS
584 count_fsync_hardware_flush += 1;
585
abf38abe
NS
586 /*
587 * On macOS, a special fcntl is required to really flush the
588 * caches within the storage controller. As of this writing,
589 * this is a very expensive operation on Apple SSDs.
590 */
591#ifdef __APPLE__
592 return fcntl(fd, F_FULLFSYNC);
593#else
594 return fsync_loop(fd);
595#endif
596 default:
597 BUG("unexpected git_fsync(%d) call", action);
598 }
599}
600
3a251bac
ÆAB
601static void log_trace_fsync_if(const char *key, intmax_t value)
602{
603 if (value)
604 trace2_data_intmax("fsync", the_repository, key, value);
605}
606
9a498767
NS
607void trace_git_fsync_stats(void)
608{
3a251bac
ÆAB
609 log_trace_fsync_if("fsync/writeout-only", count_fsync_writeout_only);
610 log_trace_fsync_if("fsync/hardware-flush", count_fsync_hardware_flush);
9a498767
NS
611}
612
10e13ec8 613static int warn_if_unremovable(const char *op, const char *file, int rc)
fc71db39 614{
1054af7d
RS
615 int err;
616 if (!rc || errno == ENOENT)
617 return 0;
618 err = errno;
0a288d1e 619 warning_errno("unable to %s '%s'", op, file);
1054af7d 620 errno = err;
fc71db39
AR
621 return rc;
622}
623
9ccc0c08
RS
624int unlink_or_msg(const char *file, struct strbuf *err)
625{
626 int rc = unlink(file);
627
628 assert(err);
629
630 if (!rc || errno == ENOENT)
631 return 0;
632
0a288d1e 633 strbuf_addf(err, "unable to unlink '%s': %s",
9ccc0c08
RS
634 file, strerror(errno));
635 return -1;
636}
637
10e13ec8
PC
638int unlink_or_warn(const char *file)
639{
640 return warn_if_unremovable("unlink", file, unlink(file));
641}
d1723296
PC
642
643int rmdir_or_warn(const char *file)
644{
645 return warn_if_unremovable("rmdir", file, rmdir(file));
646}
80d706af
PC
647
648int remove_or_warn(unsigned int mode, const char *file)
649{
650 return S_ISGITLINK(mode) ? rmdir_or_warn(file) : unlink_or_warn(file);
651}
2f705875 652
4698c8fe
JN
653static int access_error_is_ok(int err, unsigned flag)
654{
c7054209
JH
655 return (is_missing_file_error(err) ||
656 ((flag & ACCESS_EACCES_OK) && err == EACCES));
4698c8fe
JN
657}
658
659int access_or_warn(const char *path, int mode, unsigned flag)
ba8bd830
JK
660{
661 int ret = access(path, mode);
4698c8fe 662 if (ret && !access_error_is_ok(errno, flag))
55b38a48 663 warn_on_inaccessible(path);
ba8bd830
JK
664 return ret;
665}
666
4698c8fe 667int access_or_die(const char *path, int mode, unsigned flag)
96b9e0e3
JN
668{
669 int ret = access(path, mode);
4698c8fe 670 if (ret && !access_error_is_ok(errno, flag))
96b9e0e3
JN
671 die_errno(_("unable to access '%s'"), path);
672 return ret;
673}
674
aa14e980
RS
675char *xgetcwd(void)
676{
677 struct strbuf sb = STRBUF_INIT;
678 if (strbuf_getcwd(&sb))
679 die_errno(_("unable to get current working directory"));
680 return strbuf_detach(&sb, NULL);
681}
316e53e6 682
7b03c89e
JK
683int xsnprintf(char *dst, size_t max, const char *fmt, ...)
684{
685 va_list ap;
686 int len;
687
688 va_start(ap, fmt);
689 len = vsnprintf(dst, max, fmt, ap);
690 va_end(ap);
691
692 if (len < 0)
033abf97 693 BUG("your snprintf is broken");
7b03c89e 694 if (len >= max)
033abf97 695 BUG("attempt to snprintf into too-small buffer");
7b03c89e
JK
696 return len;
697}
698
52563d7e 699void write_file_buf(const char *path, const char *buf, size_t len)
316e53e6 700{
52563d7e 701 int fd = xopen(path, O_WRONLY | O_CREAT | O_TRUNC, 0666);
06f46f23 702 if (write_in_full(fd, buf, len) < 0)
0a288d1e 703 die_errno(_("could not write to '%s'"), path);
52563d7e 704 if (close(fd))
0a288d1e 705 die_errno(_("could not close '%s'"), path);
316e53e6 706}
2024d317 707
ef22318c 708void write_file(const char *path, const char *fmt, ...)
12d6ce1d 709{
12d6ce1d 710 va_list params;
316e53e6 711 struct strbuf sb = STRBUF_INIT;
12d6ce1d
JH
712
713 va_start(params, fmt);
ef22318c 714 strbuf_vaddf(&sb, fmt, params);
12d6ce1d 715 va_end(params);
12d6ce1d 716
ef22318c 717 strbuf_complete_line(&sb);
12d6ce1d 718
52563d7e 719 write_file_buf(path, sb.buf, sb.len);
ef22318c 720 strbuf_release(&sb);
12d6ce1d
JH
721}
722
2024d317
JS
723void sleep_millisec(int millisec)
724{
725 poll(NULL, 0, millisec);
726}
5781a9a2
DT
727
728int xgethostname(char *buf, size_t len)
729{
730 /*
731 * If the full hostname doesn't fit in buf, POSIX does not
732 * specify whether the buffer will be null-terminated, so to
733 * be safe, do it ourselves.
734 */
735 int ret = gethostname(buf, len);
736 if (!ret)
737 buf[len - 1] = 0;
738 return ret;
739}
e3b1e3bd
PB
740
741int is_empty_or_missing_file(const char *filename)
742{
743 struct stat st;
744
745 if (stat(filename, &st) < 0) {
746 if (errno == ENOENT)
747 return 1;
748 die_errno(_("could not stat %s"), filename);
749 }
750
751 return !st.st_size;
752}
00611d84
JK
753
754int open_nofollow(const char *path, int flags)
755{
756#ifdef O_NOFOLLOW
757 return open(path, flags | O_NOFOLLOW);
758#else
759 struct stat st;
760 if (lstat(path, &st) < 0)
761 return -1;
762 if (S_ISLNK(st.st_mode)) {
763 errno = ELOOP;
764 return -1;
765 }
766 return open(path, flags);
767#endif
768}
05cd988d 769
770int csprng_bytes(void *buf, size_t len)
771{
772#if defined(HAVE_ARC4RANDOM) || defined(HAVE_ARC4RANDOM_LIBBSD)
773 /* This function never returns an error. */
774 arc4random_buf(buf, len);
775 return 0;
776#elif defined(HAVE_GETRANDOM)
777 ssize_t res;
778 char *p = buf;
779 while (len) {
780 res = getrandom(p, len, 0);
781 if (res < 0)
782 return -1;
783 len -= res;
784 p += res;
785 }
786 return 0;
787#elif defined(HAVE_GETENTROPY)
788 int res;
789 char *p = buf;
790 while (len) {
791 /* getentropy has a maximum size of 256 bytes. */
792 size_t chunk = len < 256 ? len : 256;
793 res = getentropy(p, chunk);
794 if (res < 0)
795 return -1;
796 len -= chunk;
797 p += chunk;
798 }
799 return 0;
800#elif defined(HAVE_RTLGENRANDOM)
801 if (!RtlGenRandom(buf, len))
802 return -1;
803 return 0;
804#elif defined(HAVE_OPENSSL_CSPRNG)
805 int res = RAND_bytes(buf, len);
806 if (res == 1)
807 return 0;
808 if (res == -1)
809 errno = ENOTSUP;
810 else
811 errno = EIO;
812 return -1;
813#else
814 ssize_t res;
815 char *p = buf;
816 int fd, err;
817 fd = open("/dev/urandom", O_RDONLY);
818 if (fd < 0)
819 return -1;
820 while (len) {
821 res = xread(fd, p, len);
822 if (res < 0) {
823 err = errno;
824 close(fd);
825 errno = err;
826 return -1;
827 }
828 len -= res;
829 p += res;
830 }
831 close(fd);
832 return 0;
833#endif
834}