]> git.ipfire.org Git - thirdparty/git.git/blame - wrapper.c
wrapper.h: move declarations for wrapper.c functions from cache.h
[thirdparty/git.git] / wrapper.c
CommitLineData
112db553
LT
1/*
2 * Various trivial helper wrappers around standard functions
3 */
4#include "cache.h"
0b027f6c 5#include "abspath.h"
b2141fc1 6#include "config.h"
f394e093 7#include "gettext.h"
d5ebb50d 8#include "wrapper.h"
112db553 9
9a498767
NS
10static intmax_t count_fsync_writeout_only;
11static intmax_t count_fsync_hardware_flush;
12
19d3f228
NS
13#ifdef HAVE_RTLGENRANDOM
14/* This is required to get access to RtlGenRandom. */
15#define SystemFunction036 NTAPI SystemFunction036
16#include <NTSecAPI.h>
17#undef SystemFunction036
18#endif
19
f8bb1d94 20static int memory_limit_check(size_t size, int gentle)
d41489a6 21{
9927d962
SP
22 static size_t limit = 0;
23 if (!limit) {
24 limit = git_env_ulong("GIT_ALLOC_LIMIT", 0);
25 if (!limit)
26 limit = SIZE_MAX;
d41489a6 27 }
f0d89001 28 if (size > limit) {
f8bb1d94 29 if (gentle) {
f0d89001
JH
30 error("attempting to allocate %"PRIuMAX" over limit %"PRIuMAX,
31 (uintmax_t)size, (uintmax_t)limit);
f8bb1d94
NTND
32 return -1;
33 } else
f0d89001
JH
34 die("attempting to allocate %"PRIuMAX" over limit %"PRIuMAX,
35 (uintmax_t)size, (uintmax_t)limit);
f8bb1d94
NTND
36 }
37 return 0;
d41489a6
NTND
38}
39
112db553
LT
40char *xstrdup(const char *str)
41{
42 char *ret = strdup(str);
9827d4c1
JK
43 if (!ret)
44 die("Out of memory, strdup failed");
112db553
LT
45 return ret;
46}
47
f8bb1d94 48static void *do_xmalloc(size_t size, int gentle)
112db553 49{
d41489a6
NTND
50 void *ret;
51
f8bb1d94
NTND
52 if (memory_limit_check(size, gentle))
53 return NULL;
d41489a6 54 ret = malloc(size);
112db553
LT
55 if (!ret && !size)
56 ret = malloc(1);
57 if (!ret) {
9827d4c1
JK
58 if (!gentle)
59 die("Out of memory, malloc failed (tried to allocate %lu bytes)",
60 (unsigned long)size);
61 else {
62 error("Out of memory, malloc failed (tried to allocate %lu bytes)",
63 (unsigned long)size);
64 return NULL;
f8bb1d94 65 }
112db553
LT
66 }
67#ifdef XMALLOC_POISON
68 memset(ret, 0xA5, size);
69#endif
70 return ret;
71}
72
f8bb1d94
NTND
73void *xmalloc(size_t size)
74{
75 return do_xmalloc(size, 0);
76}
77
78static void *do_xmallocz(size_t size, int gentle)
5bf9219d
IL
79{
80 void *ret;
f8bb1d94
NTND
81 if (unsigned_add_overflows(size, 1)) {
82 if (gentle) {
83 error("Data too large to fit into virtual memory space.");
84 return NULL;
85 } else
86 die("Data too large to fit into virtual memory space.");
87 }
88 ret = do_xmalloc(size + 1, gentle);
89 if (ret)
90 ((char*)ret)[size] = 0;
5bf9219d
IL
91 return ret;
92}
93
f8bb1d94
NTND
94void *xmallocz(size_t size)
95{
96 return do_xmallocz(size, 0);
97}
98
99void *xmallocz_gently(size_t size)
100{
101 return do_xmallocz(size, 1);
102}
103
112db553
LT
104/*
105 * xmemdupz() allocates (len + 1) bytes of memory, duplicates "len" bytes of
106 * "data" to the allocated memory, zero terminates the allocated memory,
107 * and returns a pointer to the allocated memory. If the allocation fails,
108 * the program dies.
109 */
110void *xmemdupz(const void *data, size_t len)
111{
5bf9219d 112 return memcpy(xmallocz(len), data, len);
112db553
LT
113}
114
115char *xstrndup(const char *str, size_t len)
116{
117 char *p = memchr(str, '\0', len);
118 return xmemdupz(str, p ? p - str : len);
119}
120
14570dc6 121int xstrncmpz(const char *s, const char *t, size_t len)
122{
123 int res = strncmp(s, t, len);
124 if (res)
125 return res;
126 return s[len] == '\0' ? 0 : 1;
127}
128
112db553
LT
129void *xrealloc(void *ptr, size_t size)
130{
d41489a6
NTND
131 void *ret;
132
6479ea4a
JK
133 if (!size) {
134 free(ptr);
135 return xmalloc(0);
136 }
137
f8bb1d94 138 memory_limit_check(size, 0);
d41489a6 139 ret = realloc(ptr, size);
9827d4c1
JK
140 if (!ret)
141 die("Out of memory, realloc failed");
112db553
LT
142 return ret;
143}
144
145void *xcalloc(size_t nmemb, size_t size)
146{
d41489a6
NTND
147 void *ret;
148
e7792a74
JK
149 if (unsigned_mult_overflows(nmemb, size))
150 die("data too large to fit into virtual memory space");
151
f8bb1d94 152 memory_limit_check(size * nmemb, 0);
d41489a6 153 ret = calloc(nmemb, size);
112db553
LT
154 if (!ret && (!nmemb || !size))
155 ret = calloc(1, 1);
9827d4c1
JK
156 if (!ret)
157 die("Out of memory, calloc failed");
112db553
LT
158 return ret;
159}
160
3540c71e
ÆAB
161void xsetenv(const char *name, const char *value, int overwrite)
162{
163 if (setenv(name, value, overwrite))
164 die_errno(_("could not setenv '%s'"), name ? name : "(null)");
165}
166
3ff53df7
PT
167/**
168 * xopen() is the same as open(), but it die()s if the open() fails.
169 */
170int xopen(const char *path, int oflag, ...)
171{
172 mode_t mode = 0;
173 va_list ap;
174
175 /*
176 * va_arg() will have undefined behavior if the specified type is not
177 * compatible with the argument type. Since integers are promoted to
178 * ints, we fetch the next argument as an int, and then cast it to a
179 * mode_t to avoid undefined behavior.
180 */
181 va_start(ap, oflag);
182 if (oflag & O_CREAT)
183 mode = va_arg(ap, int);
184 va_end(ap);
185
186 for (;;) {
187 int fd = open(path, oflag, mode);
188 if (fd >= 0)
189 return fd;
190 if (errno == EINTR)
191 continue;
192
a7439d0f
RS
193 if ((oflag & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
194 die_errno(_("unable to create '%s'"), path);
195 else if ((oflag & O_RDWR) == O_RDWR)
3ff53df7
PT
196 die_errno(_("could not open '%s' for reading and writing"), path);
197 else if ((oflag & O_WRONLY) == O_WRONLY)
198 die_errno(_("could not open '%s' for writing"), path);
199 else
200 die_errno(_("could not open '%s' for reading"), path);
201 }
202}
203
d751dd11
EW
204static int handle_nonblock(int fd, short poll_events, int err)
205{
206 struct pollfd pfd;
207
208 if (err != EAGAIN && err != EWOULDBLOCK)
209 return 0;
210
211 pfd.fd = fd;
212 pfd.events = poll_events;
213
214 /*
215 * no need to check for errors, here;
216 * a subsequent read/write will detect unrecoverable errors
217 */
218 poll(&pfd, 1, -1);
219 return 1;
220}
221
112db553
LT
222/*
223 * xread() is the same a read(), but it automatically restarts read()
224 * operations with a recoverable error (EAGAIN and EINTR). xread()
225 * DOES NOT GUARANTEE that "len" bytes is read even if the data is available.
226 */
227ssize_t xread(int fd, void *buf, size_t len)
228{
229 ssize_t nr;
0b6806b9 230 if (len > MAX_IO_SIZE)
7cd54d37 231 len = MAX_IO_SIZE;
112db553
LT
232 while (1) {
233 nr = read(fd, buf, len);
1079c4be
SB
234 if (nr < 0) {
235 if (errno == EINTR)
236 continue;
d751dd11 237 if (handle_nonblock(fd, POLLIN, errno))
c22f6202 238 continue;
1079c4be 239 }
112db553
LT
240 return nr;
241 }
242}
243
244/*
245 * xwrite() is the same a write(), but it automatically restarts write()
246 * operations with a recoverable error (EAGAIN and EINTR). xwrite() DOES NOT
247 * GUARANTEE that "len" bytes is written even if the operation is successful.
248 */
249ssize_t xwrite(int fd, const void *buf, size_t len)
250{
251 ssize_t nr;
0b6806b9 252 if (len > MAX_IO_SIZE)
7cd54d37 253 len = MAX_IO_SIZE;
112db553
LT
254 while (1) {
255 nr = write(fd, buf, len);
ef1cf016
EW
256 if (nr < 0) {
257 if (errno == EINTR)
258 continue;
d751dd11 259 if (handle_nonblock(fd, POLLOUT, errno))
ef1cf016 260 continue;
ef1cf016
EW
261 }
262
9aa91af0
YM
263 return nr;
264 }
265}
266
267/*
268 * xpread() is the same as pread(), but it automatically restarts pread()
269 * operations with a recoverable error (EAGAIN and EINTR). xpread() DOES
270 * NOT GUARANTEE that "len" bytes is read even if the data is available.
271 */
272ssize_t xpread(int fd, void *buf, size_t len, off_t offset)
273{
274 ssize_t nr;
275 if (len > MAX_IO_SIZE)
276 len = MAX_IO_SIZE;
277 while (1) {
278 nr = pread(fd, buf, len, offset);
279 if ((nr < 0) && (errno == EAGAIN || errno == EINTR))
112db553
LT
280 continue;
281 return nr;
282 }
283}
284
559e840b
JH
285ssize_t read_in_full(int fd, void *buf, size_t count)
286{
287 char *p = buf;
288 ssize_t total = 0;
289
290 while (count > 0) {
291 ssize_t loaded = xread(fd, p, count);
56d7c27a
JK
292 if (loaded < 0)
293 return -1;
294 if (loaded == 0)
295 return total;
559e840b
JH
296 count -= loaded;
297 p += loaded;
298 total += loaded;
299 }
300
301 return total;
302}
303
304ssize_t write_in_full(int fd, const void *buf, size_t count)
305{
306 const char *p = buf;
307 ssize_t total = 0;
308
309 while (count > 0) {
310 ssize_t written = xwrite(fd, p, count);
311 if (written < 0)
312 return -1;
313 if (!written) {
314 errno = ENOSPC;
315 return -1;
316 }
317 count -= written;
318 p += written;
319 total += written;
320 }
321
322 return total;
323}
324
426ddeea
YM
325ssize_t pread_in_full(int fd, void *buf, size_t count, off_t offset)
326{
327 char *p = buf;
328 ssize_t total = 0;
329
330 while (count > 0) {
331 ssize_t loaded = xpread(fd, p, count, offset);
332 if (loaded < 0)
333 return -1;
334 if (loaded == 0)
335 return total;
336 count -= loaded;
337 p += loaded;
338 total += loaded;
339 offset += loaded;
340 }
341
342 return total;
343}
344
112db553
LT
345int xdup(int fd)
346{
347 int ret = dup(fd);
348 if (ret < 0)
d824cbba 349 die_errno("dup failed");
112db553
LT
350 return ret;
351}
352
260eec29
PT
353/**
354 * xfopen() is the same as fopen(), but it die()s if the fopen() fails.
355 */
356FILE *xfopen(const char *path, const char *mode)
357{
358 for (;;) {
359 FILE *fp = fopen(path, mode);
360 if (fp)
361 return fp;
362 if (errno == EINTR)
363 continue;
364
365 if (*mode && mode[1] == '+')
366 die_errno(_("could not open '%s' for reading and writing"), path);
367 else if (*mode == 'w' || *mode == 'a')
368 die_errno(_("could not open '%s' for writing"), path);
369 else
370 die_errno(_("could not open '%s' for reading"), path);
371 }
372}
373
112db553
LT
374FILE *xfdopen(int fd, const char *mode)
375{
376 FILE *stream = fdopen(fd, mode);
afe8a907 377 if (!stream)
d824cbba 378 die_errno("Out of memory? fdopen failed");
112db553
LT
379 return stream;
380}
381
79d7582e
JS
382FILE *fopen_for_writing(const char *path)
383{
384 FILE *ret = fopen(path, "w");
385
386 if (!ret && errno == EPERM) {
387 if (!unlink(path))
388 ret = fopen(path, "w");
389 else
390 errno = EPERM;
391 }
392 return ret;
393}
394
382fb07f
NTND
395static void warn_on_inaccessible(const char *path)
396{
397 warning_errno(_("unable to access '%s'"), path);
398}
399
11dc1fcb
NTND
400int warn_on_fopen_errors(const char *path)
401{
402 if (errno != ENOENT && errno != ENOTDIR) {
403 warn_on_inaccessible(path);
404 return -1;
405 }
406
407 return 0;
408}
409
e9d983f1
NTND
410FILE *fopen_or_warn(const char *path, const char *mode)
411{
412 FILE *fp = fopen(path, mode);
413
414 if (fp)
415 return fp;
416
417 warn_on_fopen_errors(path);
418 return NULL;
419}
420
eb78e23f 421int xmkstemp(char *filename_template)
112db553
LT
422{
423 int fd;
6cf6bb3e 424 char origtemplate[PATH_MAX];
eb78e23f 425 strlcpy(origtemplate, filename_template, sizeof(origtemplate));
112db553 426
eb78e23f 427 fd = mkstemp(filename_template);
6cf6bb3e
AE
428 if (fd < 0) {
429 int saved_errno = errno;
430 const char *nonrelative_template;
431
eb78e23f
BW
432 if (strlen(filename_template) != strlen(origtemplate))
433 filename_template = origtemplate;
6cf6bb3e 434
eb78e23f 435 nonrelative_template = absolute_path(filename_template);
6cf6bb3e
AE
436 errno = saved_errno;
437 die_errno("Unable to create temporary file '%s'",
438 nonrelative_template);
439 }
112db553
LT
440 return fd;
441}
39c68542 442
33f23936
JN
443/* Adapted from libiberty's mkstemp.c. */
444
445#undef TMP_MAX
446#define TMP_MAX 16384
447
448int git_mkstemps_mode(char *pattern, int suffix_len, int mode)
449{
450 static const char letters[] =
451 "abcdefghijklmnopqrstuvwxyz"
452 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
453 "0123456789";
53d687bf
JK
454 static const int num_letters = ARRAY_SIZE(letters) - 1;
455 static const char x_pattern[] = "XXXXXX";
456 static const int num_x = ARRAY_SIZE(x_pattern) - 1;
eb78e23f 457 char *filename_template;
33f23936
JN
458 size_t len;
459 int fd, count;
460
461 len = strlen(pattern);
462
53d687bf 463 if (len < num_x + suffix_len) {
33f23936
JN
464 errno = EINVAL;
465 return -1;
466 }
467
53d687bf 468 if (strncmp(&pattern[len - num_x - suffix_len], x_pattern, num_x)) {
33f23936
JN
469 errno = EINVAL;
470 return -1;
471 }
472
473 /*
474 * Replace pattern's XXXXXX characters with randomness.
475 * Try TMP_MAX different filenames.
476 */
53d687bf 477 filename_template = &pattern[len - num_x - suffix_len];
33f23936 478 for (count = 0; count < TMP_MAX; ++count) {
54a80a9a 479 int i;
47efda96 480 uint64_t v;
481 if (csprng_bytes(&v, sizeof(v)) < 0)
482 return error_errno("unable to get random bytes for temporary file");
483
33f23936 484 /* Fill in the random bits. */
53d687bf 485 for (i = 0; i < num_x; i++) {
54a80a9a
AH
486 filename_template[i] = letters[v % num_letters];
487 v /= num_letters;
488 }
33f23936
JN
489
490 fd = open(pattern, O_CREAT | O_EXCL | O_RDWR, mode);
a2cb86c1 491 if (fd >= 0)
33f23936
JN
492 return fd;
493 /*
494 * Fatal error (EPERM, ENOSPC etc).
495 * It doesn't make sense to loop.
496 */
497 if (errno != EEXIST)
498 break;
33f23936
JN
499 }
500 /* We return the null string if we can't find a unique file name. */
501 pattern[0] = '\0';
502 return -1;
503}
504
505int git_mkstemp_mode(char *pattern, int mode)
506{
507 /* mkstemp is just mkstemps with no suffix */
508 return git_mkstemps_mode(pattern, 0, mode);
509}
510
eb78e23f 511int xmkstemp_mode(char *filename_template, int mode)
b862b61c
MM
512{
513 int fd;
6cf6bb3e 514 char origtemplate[PATH_MAX];
eb78e23f 515 strlcpy(origtemplate, filename_template, sizeof(origtemplate));
b862b61c 516
eb78e23f 517 fd = git_mkstemp_mode(filename_template, mode);
6cf6bb3e
AE
518 if (fd < 0) {
519 int saved_errno = errno;
520 const char *nonrelative_template;
521
eb78e23f
BW
522 if (!filename_template[0])
523 filename_template = origtemplate;
6cf6bb3e 524
eb78e23f 525 nonrelative_template = absolute_path(filename_template);
6cf6bb3e
AE
526 errno = saved_errno;
527 die_errno("Unable to create temporary file '%s'",
528 nonrelative_template);
529 }
b862b61c
MM
530 return fd;
531}
532
abf38abe
NS
533/*
534 * Some platforms return EINTR from fsync. Since fsync is invoked in some
535 * cases by a wrapper that dies on failure, do not expose EINTR to callers.
536 */
537static int fsync_loop(int fd)
538{
539 int err;
540
541 do {
542 err = fsync(fd);
543 } while (err < 0 && errno == EINTR);
544 return err;
545}
546
547int git_fsync(int fd, enum fsync_action action)
548{
549 switch (action) {
550 case FSYNC_WRITEOUT_ONLY:
9a498767 551 count_fsync_writeout_only += 1;
abf38abe
NS
552
553#ifdef __APPLE__
554 /*
555 * On macOS, fsync just causes filesystem cache writeback but
556 * does not flush hardware caches.
557 */
558 return fsync_loop(fd);
559#endif
560
561#ifdef HAVE_SYNC_FILE_RANGE
562 /*
563 * On linux 2.6.17 and above, sync_file_range is the way to
564 * issue a writeback without a hardware flush. An offset of
565 * 0 and size of 0 indicates writeout of the entire file and the
566 * wait flags ensure that all dirty data is written to the disk
567 * (potentially in a disk-side cache) before we continue.
568 */
569
570 return sync_file_range(fd, 0, 0, SYNC_FILE_RANGE_WAIT_BEFORE |
571 SYNC_FILE_RANGE_WRITE |
572 SYNC_FILE_RANGE_WAIT_AFTER);
573#endif
574
575#ifdef fsync_no_flush
576 return fsync_no_flush(fd);
577#endif
578
579 errno = ENOSYS;
580 return -1;
581
582 case FSYNC_HARDWARE_FLUSH:
9a498767
NS
583 count_fsync_hardware_flush += 1;
584
abf38abe
NS
585 /*
586 * On macOS, a special fcntl is required to really flush the
587 * caches within the storage controller. As of this writing,
588 * this is a very expensive operation on Apple SSDs.
589 */
590#ifdef __APPLE__
591 return fcntl(fd, F_FULLFSYNC);
592#else
593 return fsync_loop(fd);
594#endif
595 default:
596 BUG("unexpected git_fsync(%d) call", action);
597 }
598}
599
3a251bac
ÆAB
600static void log_trace_fsync_if(const char *key, intmax_t value)
601{
602 if (value)
603 trace2_data_intmax("fsync", the_repository, key, value);
604}
605
9a498767
NS
606void trace_git_fsync_stats(void)
607{
3a251bac
ÆAB
608 log_trace_fsync_if("fsync/writeout-only", count_fsync_writeout_only);
609 log_trace_fsync_if("fsync/hardware-flush", count_fsync_hardware_flush);
9a498767
NS
610}
611
10e13ec8 612static int warn_if_unremovable(const char *op, const char *file, int rc)
fc71db39 613{
1054af7d
RS
614 int err;
615 if (!rc || errno == ENOENT)
616 return 0;
617 err = errno;
0a288d1e 618 warning_errno("unable to %s '%s'", op, file);
1054af7d 619 errno = err;
fc71db39
AR
620 return rc;
621}
622
9ccc0c08
RS
623int unlink_or_msg(const char *file, struct strbuf *err)
624{
625 int rc = unlink(file);
626
627 assert(err);
628
629 if (!rc || errno == ENOENT)
630 return 0;
631
0a288d1e 632 strbuf_addf(err, "unable to unlink '%s': %s",
9ccc0c08
RS
633 file, strerror(errno));
634 return -1;
635}
636
10e13ec8
PC
637int unlink_or_warn(const char *file)
638{
639 return warn_if_unremovable("unlink", file, unlink(file));
640}
d1723296
PC
641
642int rmdir_or_warn(const char *file)
643{
644 return warn_if_unremovable("rmdir", file, rmdir(file));
645}
80d706af
PC
646
647int remove_or_warn(unsigned int mode, const char *file)
648{
649 return S_ISGITLINK(mode) ? rmdir_or_warn(file) : unlink_or_warn(file);
650}
2f705875 651
4698c8fe
JN
652static int access_error_is_ok(int err, unsigned flag)
653{
c7054209
JH
654 return (is_missing_file_error(err) ||
655 ((flag & ACCESS_EACCES_OK) && err == EACCES));
4698c8fe
JN
656}
657
658int access_or_warn(const char *path, int mode, unsigned flag)
ba8bd830
JK
659{
660 int ret = access(path, mode);
4698c8fe 661 if (ret && !access_error_is_ok(errno, flag))
55b38a48 662 warn_on_inaccessible(path);
ba8bd830
JK
663 return ret;
664}
665
4698c8fe 666int access_or_die(const char *path, int mode, unsigned flag)
96b9e0e3
JN
667{
668 int ret = access(path, mode);
4698c8fe 669 if (ret && !access_error_is_ok(errno, flag))
96b9e0e3
JN
670 die_errno(_("unable to access '%s'"), path);
671 return ret;
672}
673
aa14e980
RS
674char *xgetcwd(void)
675{
676 struct strbuf sb = STRBUF_INIT;
677 if (strbuf_getcwd(&sb))
678 die_errno(_("unable to get current working directory"));
679 return strbuf_detach(&sb, NULL);
680}
316e53e6 681
7b03c89e
JK
682int xsnprintf(char *dst, size_t max, const char *fmt, ...)
683{
684 va_list ap;
685 int len;
686
687 va_start(ap, fmt);
688 len = vsnprintf(dst, max, fmt, ap);
689 va_end(ap);
690
691 if (len < 0)
033abf97 692 BUG("your snprintf is broken");
7b03c89e 693 if (len >= max)
033abf97 694 BUG("attempt to snprintf into too-small buffer");
7b03c89e
JK
695 return len;
696}
697
52563d7e 698void write_file_buf(const char *path, const char *buf, size_t len)
316e53e6 699{
52563d7e 700 int fd = xopen(path, O_WRONLY | O_CREAT | O_TRUNC, 0666);
06f46f23 701 if (write_in_full(fd, buf, len) < 0)
0a288d1e 702 die_errno(_("could not write to '%s'"), path);
52563d7e 703 if (close(fd))
0a288d1e 704 die_errno(_("could not close '%s'"), path);
316e53e6 705}
2024d317 706
ef22318c 707void write_file(const char *path, const char *fmt, ...)
12d6ce1d 708{
12d6ce1d 709 va_list params;
316e53e6 710 struct strbuf sb = STRBUF_INIT;
12d6ce1d
JH
711
712 va_start(params, fmt);
ef22318c 713 strbuf_vaddf(&sb, fmt, params);
12d6ce1d 714 va_end(params);
12d6ce1d 715
ef22318c 716 strbuf_complete_line(&sb);
12d6ce1d 717
52563d7e 718 write_file_buf(path, sb.buf, sb.len);
ef22318c 719 strbuf_release(&sb);
12d6ce1d
JH
720}
721
2024d317
JS
722void sleep_millisec(int millisec)
723{
724 poll(NULL, 0, millisec);
725}
5781a9a2
DT
726
727int xgethostname(char *buf, size_t len)
728{
729 /*
730 * If the full hostname doesn't fit in buf, POSIX does not
731 * specify whether the buffer will be null-terminated, so to
732 * be safe, do it ourselves.
733 */
734 int ret = gethostname(buf, len);
735 if (!ret)
736 buf[len - 1] = 0;
737 return ret;
738}
e3b1e3bd
PB
739
740int is_empty_or_missing_file(const char *filename)
741{
742 struct stat st;
743
744 if (stat(filename, &st) < 0) {
745 if (errno == ENOENT)
746 return 1;
747 die_errno(_("could not stat %s"), filename);
748 }
749
750 return !st.st_size;
751}
00611d84
JK
752
753int open_nofollow(const char *path, int flags)
754{
755#ifdef O_NOFOLLOW
756 return open(path, flags | O_NOFOLLOW);
757#else
758 struct stat st;
759 if (lstat(path, &st) < 0)
760 return -1;
761 if (S_ISLNK(st.st_mode)) {
762 errno = ELOOP;
763 return -1;
764 }
765 return open(path, flags);
766#endif
767}
05cd988d 768
769int csprng_bytes(void *buf, size_t len)
770{
771#if defined(HAVE_ARC4RANDOM) || defined(HAVE_ARC4RANDOM_LIBBSD)
772 /* This function never returns an error. */
773 arc4random_buf(buf, len);
774 return 0;
775#elif defined(HAVE_GETRANDOM)
776 ssize_t res;
777 char *p = buf;
778 while (len) {
779 res = getrandom(p, len, 0);
780 if (res < 0)
781 return -1;
782 len -= res;
783 p += res;
784 }
785 return 0;
786#elif defined(HAVE_GETENTROPY)
787 int res;
788 char *p = buf;
789 while (len) {
790 /* getentropy has a maximum size of 256 bytes. */
791 size_t chunk = len < 256 ? len : 256;
792 res = getentropy(p, chunk);
793 if (res < 0)
794 return -1;
795 len -= chunk;
796 p += chunk;
797 }
798 return 0;
799#elif defined(HAVE_RTLGENRANDOM)
800 if (!RtlGenRandom(buf, len))
801 return -1;
802 return 0;
803#elif defined(HAVE_OPENSSL_CSPRNG)
804 int res = RAND_bytes(buf, len);
805 if (res == 1)
806 return 0;
807 if (res == -1)
808 errno = ENOTSUP;
809 else
810 errno = EIO;
811 return -1;
812#else
813 ssize_t res;
814 char *p = buf;
815 int fd, err;
816 fd = open("/dev/urandom", O_RDONLY);
817 if (fd < 0)
818 return -1;
819 while (len) {
820 res = xread(fd, p, len);
821 if (res < 0) {
822 err = errno;
823 close(fd);
824 errno = err;
825 return -1;
826 }
827 len -= res;
828 p += res;
829 }
830 close(fd);
831 return 0;
832#endif
833}