blob: ee7df0a86b888b6d4274fe20da71469594035f99 [file] [log] [blame]
Eugene Zelenko1760dc22016-04-05 20:19:49 +00001//===- llvm/Support/Unix/Program.cpp ----------------------------*- C++ -*-===//
Mikhail Glushenkov28309ac2009-07-17 20:38:17 +00002//
Reid Spencer76b83a12004-08-29 19:20:41 +00003// The LLVM Compiler Infrastructure
4//
Chris Lattnerf3ebc3f2007-12-29 20:36:04 +00005// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
Mikhail Glushenkov28309ac2009-07-17 20:38:17 +00007//
Reid Spencer76b83a12004-08-29 19:20:41 +00008//===----------------------------------------------------------------------===//
9//
10// This file implements the Unix specific portion of the Program class.
11//
12//===----------------------------------------------------------------------===//
13
14//===----------------------------------------------------------------------===//
15//=== WARNING: Implementation here must contain only generic UNIX code that
16//=== is guaranteed to work on *all* UNIX variants.
17//===----------------------------------------------------------------------===//
18
19#include "Unix.h"
Michael J. Spencer65ffd922014-11-04 01:29:29 +000020#include "llvm/ADT/StringExtras.h"
Benjamin Kramer16132e62015-03-23 18:07:13 +000021#include "llvm/Config/config.h"
Evgeniy Stepanov1f5a7142013-02-04 07:03:24 +000022#include "llvm/Support/Compiler.h"
Rafael Espindola74f29322015-06-13 17:23:04 +000023#include "llvm/Support/Errc.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000024#include "llvm/Support/FileSystem.h"
Benjamin Kramer16132e62015-03-23 18:07:13 +000025#include "llvm/Support/Path.h"
Rafael Espindola9c359662014-09-03 20:02:00 +000026#include "llvm/Support/raw_ostream.h"
Reid Spencerd554bbc2004-12-27 06:16:52 +000027#if HAVE_SYS_STAT_H
28#include <sys/stat.h>
29#endif
Anton Korobeynikovd01defe2007-02-16 19:11:07 +000030#if HAVE_SYS_RESOURCE_H
31#include <sys/resource.h>
32#endif
Eugene Zelenko1760dc22016-04-05 20:19:49 +000033#include <csignal>
Reid Spencerd554bbc2004-12-27 06:16:52 +000034#if HAVE_FCNTL_H
35#include <fcntl.h>
36#endif
Rafael Espindolacd848c02013-04-11 14:06:34 +000037#if HAVE_UNISTD_H
38#include <unistd.h>
39#endif
Chris Lattnera50738a2010-04-18 04:14:37 +000040#ifdef HAVE_POSIX_SPAWN
Rafael Espindola9ab9fe92013-10-08 16:12:58 +000041#ifdef __sun__
42#define _RESTRICT_KYWD
43#endif
Chris Lattnera50738a2010-04-18 04:14:37 +000044#include <spawn.h>
Chris Bienemana747e592015-02-19 19:50:52 +000045
Chris Bieneman7b7d2772015-01-30 00:10:39 +000046#if defined(__APPLE__)
47#include <TargetConditionals.h>
48#endif
Chris Bienemana747e592015-02-19 19:50:52 +000049
50#if defined(__APPLE__) && !(defined(TARGET_OS_IPHONE) && TARGET_OS_IPHONE)
51#define USE_NSGETENVIRON 1
52#else
53#define USE_NSGETENVIRON 0
54#endif
55
56#if !USE_NSGETENVIRON
Nick Lewycky554a3982010-04-18 07:07:48 +000057 extern char **environ;
Benjamin Kramer1360e9e2010-04-18 09:16:04 +000058#else
59#include <crt_externs.h> // _NSGetEnviron
Nick Lewycky554a3982010-04-18 07:07:48 +000060#endif
Chris Lattnera50738a2010-04-18 04:14:37 +000061#endif
Reid Spencer76b83a12004-08-29 19:20:41 +000062
Reid Spencer76b83a12004-08-29 19:20:41 +000063namespace llvm {
Rafael Espindola3acea392014-06-12 21:46:39 +000064
Reid Spencer76b83a12004-08-29 19:20:41 +000065using namespace sys;
66
Tareq A. Sirajd88b9832013-10-01 14:28:18 +000067ProcessInfo::ProcessInfo() : Pid(0), ReturnCode(0) {}
68
Michael J. Spencer65ffd922014-11-04 01:29:29 +000069ErrorOr<std::string> sys::findProgramByName(StringRef Name,
70 ArrayRef<StringRef> Paths) {
71 assert(!Name.empty() && "Must have a name!");
72 // Use the given path verbatim if it contains any slashes; this matches
73 // the behavior of sh(1) and friends.
74 if (Name.find('/') != StringRef::npos)
75 return std::string(Name);
76
Chandler Carruthec8406d2014-12-02 00:52:01 +000077 SmallVector<StringRef, 16> EnvironmentPaths;
78 if (Paths.empty())
79 if (const char *PathEnv = std::getenv("PATH")) {
80 SplitString(PathEnv, EnvironmentPaths, ":");
81 Paths = EnvironmentPaths;
82 }
Michael J. Spencer65ffd922014-11-04 01:29:29 +000083
84 for (auto Path : Paths) {
85 if (Path.empty())
86 continue;
87
88 // Check to see if this first directory contains the executable...
89 SmallString<128> FilePath(Path);
90 sys::path::append(FilePath, Name);
91 if (sys::fs::can_execute(FilePath.c_str()))
92 return std::string(FilePath.str()); // Found the executable!
93 }
Rafael Espindola74f29322015-06-13 17:23:04 +000094 return errc::no_such_file_or_directory;
Michael J. Spencer65ffd922014-11-04 01:29:29 +000095}
96
Eugene Zelenko1760dc22016-04-05 20:19:49 +000097namespace {
98
99bool RedirectIO(const StringRef *Path, int FD, std::string* ErrMsg) {
Craig Toppere73658d2014-04-28 04:05:08 +0000100 if (!Path) // Noop
Matthijs Kooijman616e4842008-06-12 10:47:18 +0000101 return false;
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000102 std::string File;
103 if (Path->empty())
Matthijs Kooijman616e4842008-06-12 10:47:18 +0000104 // Redirect empty paths to /dev/null
105 File = "/dev/null";
106 else
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000107 File = *Path;
Reid Spencer6cb551b2004-12-19 18:00:44 +0000108
109 // Open the file
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000110 int InFD = open(File.c_str(), FD == 0 ? O_RDONLY : O_WRONLY|O_CREAT, 0666);
Reid Spencer6cb551b2004-12-19 18:00:44 +0000111 if (InFD == -1) {
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000112 MakeErrMsg(ErrMsg, "Cannot open file '" + File + "' for "
Daniel Dunbar3222b9b2009-04-20 20:50:13 +0000113 + (FD == 0 ? "input" : "output"));
Reid Spencer42bcf6e2006-08-21 06:02:44 +0000114 return true;
Reid Spencer6cb551b2004-12-19 18:00:44 +0000115 }
116
Reid Spencer42bcf6e2006-08-21 06:02:44 +0000117 // Install it as the requested FD
Chris Lattner65a437f2010-03-14 23:16:45 +0000118 if (dup2(InFD, FD) == -1) {
Reid Spencer42bcf6e2006-08-21 06:02:44 +0000119 MakeErrMsg(ErrMsg, "Cannot dup2");
Chris Lattner65a437f2010-03-14 23:16:45 +0000120 close(InFD);
Reid Spencer42bcf6e2006-08-21 06:02:44 +0000121 return true;
122 }
Reid Spencer6cb551b2004-12-19 18:00:44 +0000123 close(InFD); // Close the original FD
Reid Spencer42bcf6e2006-08-21 06:02:44 +0000124 return false;
Reid Spencer6cb551b2004-12-19 18:00:44 +0000125}
126
Chris Lattnera50738a2010-04-18 04:14:37 +0000127#ifdef HAVE_POSIX_SPAWN
Eugene Zelenko1760dc22016-04-05 20:19:49 +0000128bool RedirectIO_PS(const std::string *Path, int FD, std::string *ErrMsg,
129 posix_spawn_file_actions_t *FileActions) {
Craig Toppere73658d2014-04-28 04:05:08 +0000130 if (!Path) // Noop
Chris Lattnera50738a2010-04-18 04:14:37 +0000131 return false;
Rafael Espindola70d98f42013-07-26 16:21:31 +0000132 const char *File;
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000133 if (Path->empty())
Chris Lattnera50738a2010-04-18 04:14:37 +0000134 // Redirect empty paths to /dev/null
135 File = "/dev/null";
136 else
Rafael Espindola70d98f42013-07-26 16:21:31 +0000137 File = Path->c_str();
Benjamin Kramer5b4be742010-04-18 09:19:41 +0000138
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000139 if (int Err = posix_spawn_file_actions_addopen(
Rafael Espindola70d98f42013-07-26 16:21:31 +0000140 FileActions, FD, File,
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000141 FD == 0 ? O_RDONLY : O_WRONLY | O_CREAT, 0666))
Chris Lattnera50738a2010-04-18 04:14:37 +0000142 return MakeErrMsg(ErrMsg, "Cannot dup2", Err);
143 return false;
144}
145#endif
146
Eugene Zelenko1760dc22016-04-05 20:19:49 +0000147void TimeOutHandler(int Sig) {
Duncan Sandsfec62f02009-11-08 20:55:48 +0000148}
149
Eugene Zelenko1760dc22016-04-05 20:19:49 +0000150void SetMemoryLimits (unsigned size)
Anton Korobeynikovd01defe2007-02-16 19:11:07 +0000151{
Chris Lattner62f50da2010-02-12 00:37:46 +0000152#if HAVE_SYS_RESOURCE_H && HAVE_GETRLIMIT && HAVE_SETRLIMIT
Anton Korobeynikovd01defe2007-02-16 19:11:07 +0000153 struct rlimit r;
154 __typeof__ (r.rlim_cur) limit = (__typeof__ (r.rlim_cur)) (size) * 1048576;
155
156 // Heap size
157 getrlimit (RLIMIT_DATA, &r);
158 r.rlim_cur = limit;
159 setrlimit (RLIMIT_DATA, &r);
Gabor Greif0e219802007-07-06 10:31:27 +0000160#ifdef RLIMIT_RSS
Anton Korobeynikovd01defe2007-02-16 19:11:07 +0000161 // Resident set size.
162 getrlimit (RLIMIT_RSS, &r);
163 r.rlim_cur = limit;
164 setrlimit (RLIMIT_RSS, &r);
Reid Spencere2e9b372007-04-23 07:22:51 +0000165#endif
Devang Pateld609374a2007-06-04 15:28:57 +0000166#ifdef RLIMIT_AS // e.g. NetBSD doesn't have it.
Evgeniy Stepanov1f5a7142013-02-04 07:03:24 +0000167 // Don't set virtual memory limit if built with any Sanitizer. They need 80Tb
168 // of virtual memory for shadow memory mapping.
169#if !LLVM_MEMORY_SANITIZER_BUILD && !LLVM_ADDRESS_SANITIZER_BUILD
Anton Korobeynikovd01defe2007-02-16 19:11:07 +0000170 // Virtual memory.
171 getrlimit (RLIMIT_AS, &r);
172 r.rlim_cur = limit;
173 setrlimit (RLIMIT_AS, &r);
174#endif
Devang Pateld609374a2007-06-04 15:28:57 +0000175#endif
Evgeniy Stepanov1f5a7142013-02-04 07:03:24 +0000176#endif
Anton Korobeynikovd01defe2007-02-16 19:11:07 +0000177}
178
Eugene Zelenko1760dc22016-04-05 20:19:49 +0000179} // end anonymous namespace
180
181} // end namespace llvm
Rafael Espindolacb2eca02013-06-12 20:58:35 +0000182
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000183static bool Execute(ProcessInfo &PI, StringRef Program, const char **args,
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000184 const char **envp, const StringRef **redirects,
Rafael Espindolacb2eca02013-06-12 20:58:35 +0000185 unsigned memoryLimit, std::string *ErrMsg) {
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000186 if (!llvm::sys::fs::exists(Program)) {
187 if (ErrMsg)
188 *ErrMsg = std::string("Executable \"") + Program.str() +
189 std::string("\" doesn't exist!");
190 return false;
191 }
192
Chris Lattnera50738a2010-04-18 04:14:37 +0000193 // If this OS has posix_spawn and there is no memory limit being implied, use
194 // posix_spawn. It is more efficient than fork/exec.
195#ifdef HAVE_POSIX_SPAWN
196 if (memoryLimit == 0) {
Benjamin Kramerdce83c52011-03-20 15:52:24 +0000197 posix_spawn_file_actions_t FileActionsStore;
Craig Toppere73658d2014-04-28 04:05:08 +0000198 posix_spawn_file_actions_t *FileActions = nullptr;
Chris Lattnera50738a2010-04-18 04:14:37 +0000199
Rafael Espindola70d98f42013-07-26 16:21:31 +0000200 // If we call posix_spawn_file_actions_addopen we have to make sure the
Rafael Espindola1cfc5dd2013-07-26 20:44:45 +0000201 // c strings we pass to it stay alive until the call to posix_spawn,
Rafael Espindola70d98f42013-07-26 16:21:31 +0000202 // so we copy any StringRefs into this variable.
203 std::string RedirectsStorage[3];
204
Chris Lattnera50738a2010-04-18 04:14:37 +0000205 if (redirects) {
Craig Toppere73658d2014-04-28 04:05:08 +0000206 std::string *RedirectsStr[3] = {nullptr, nullptr, nullptr};
Rafael Espindola70d98f42013-07-26 16:21:31 +0000207 for (int I = 0; I < 3; ++I) {
208 if (redirects[I]) {
209 RedirectsStorage[I] = *redirects[I];
210 RedirectsStr[I] = &RedirectsStorage[I];
211 }
212 }
213
Benjamin Kramerdce83c52011-03-20 15:52:24 +0000214 FileActions = &FileActionsStore;
215 posix_spawn_file_actions_init(FileActions);
216
Chris Lattnera50738a2010-04-18 04:14:37 +0000217 // Redirect stdin/stdout.
Rafael Espindola70d98f42013-07-26 16:21:31 +0000218 if (RedirectIO_PS(RedirectsStr[0], 0, ErrMsg, FileActions) ||
219 RedirectIO_PS(RedirectsStr[1], 1, ErrMsg, FileActions))
Chris Lattnera50738a2010-04-18 04:14:37 +0000220 return false;
Craig Toppere73658d2014-04-28 04:05:08 +0000221 if (redirects[1] == nullptr || redirects[2] == nullptr ||
Chris Lattnera50738a2010-04-18 04:14:37 +0000222 *redirects[1] != *redirects[2]) {
223 // Just redirect stderr
Rafael Espindola70d98f42013-07-26 16:21:31 +0000224 if (RedirectIO_PS(RedirectsStr[2], 2, ErrMsg, FileActions))
225 return false;
Mikhail Glushenkov0e9d9b52010-10-28 19:32:53 +0000226 } else {
Chris Lattnera50738a2010-04-18 04:14:37 +0000227 // If stdout and stderr should go to the same place, redirect stderr
228 // to the FD already open for stdout.
Benjamin Kramerdce83c52011-03-20 15:52:24 +0000229 if (int Err = posix_spawn_file_actions_adddup2(FileActions, 1, 2))
Chris Lattnera50738a2010-04-18 04:14:37 +0000230 return !MakeErrMsg(ErrMsg, "Can't redirect stderr to stdout", Err);
231 }
232 }
233
Benjamin Kramer1360e9e2010-04-18 09:16:04 +0000234 if (!envp)
Chris Bienemana747e592015-02-19 19:50:52 +0000235#if !USE_NSGETENVIRON
Dan Gohmanf6563972010-04-19 15:55:10 +0000236 envp = const_cast<const char **>(environ);
Benjamin Kramer1360e9e2010-04-18 09:16:04 +0000237#else
Dan Gohmanf6563972010-04-19 15:55:10 +0000238 // environ is missing in dylibs.
239 envp = const_cast<const char **>(*_NSGetEnviron());
Nick Lewycky554a3982010-04-18 07:07:48 +0000240#endif
241
Daniel Dunbar31158b52010-09-30 23:56:49 +0000242 // Explicitly initialized to prevent what appears to be a valgrind false
243 // positive.
244 pid_t PID = 0;
Craig Toppere73658d2014-04-28 04:05:08 +0000245 int Err = posix_spawn(&PID, Program.str().c_str(), FileActions,
246 /*attrp*/nullptr, const_cast<char **>(args),
247 const_cast<char **>(envp));
Mikhail Glushenkov0e9d9b52010-10-28 19:32:53 +0000248
Benjamin Kramerdce83c52011-03-20 15:52:24 +0000249 if (FileActions)
250 posix_spawn_file_actions_destroy(FileActions);
Chris Lattnera50738a2010-04-18 04:14:37 +0000251
252 if (Err)
253 return !MakeErrMsg(ErrMsg, "posix_spawn failed", Err);
Mikhail Glushenkov0e9d9b52010-10-28 19:32:53 +0000254
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000255 PI.Pid = PID;
256
Chris Lattnera50738a2010-04-18 04:14:37 +0000257 return true;
258 }
259#endif
Mikhail Glushenkov0e9d9b52010-10-28 19:32:53 +0000260
Reid Spencer76b83a12004-08-29 19:20:41 +0000261 // Create a child process.
Reid Spencer6cb551b2004-12-19 18:00:44 +0000262 int child = fork();
263 switch (child) {
Chris Lattner0ab5e2c2011-04-15 05:18:47 +0000264 // An error occurred: Return to the caller.
Reid Spencer76b83a12004-08-29 19:20:41 +0000265 case -1:
Reid Spencer42bcf6e2006-08-21 06:02:44 +0000266 MakeErrMsg(ErrMsg, "Couldn't fork");
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000267 return false;
Reid Spencer76b83a12004-08-29 19:20:41 +0000268
269 // Child process: Execute the program.
Reid Spencercdefe0a2004-12-14 04:18:51 +0000270 case 0: {
Reid Spencer6cb551b2004-12-19 18:00:44 +0000271 // Redirect file descriptors...
272 if (redirects) {
Matthijs Kooijman1cc695e2008-06-12 12:53:35 +0000273 // Redirect stdin
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000274 if (RedirectIO(redirects[0], 0, ErrMsg)) { return false; }
Matthijs Kooijman1cc695e2008-06-12 12:53:35 +0000275 // Redirect stdout
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000276 if (RedirectIO(redirects[1], 1, ErrMsg)) { return false; }
Mikhail Glushenkov28309ac2009-07-17 20:38:17 +0000277 if (redirects[1] && redirects[2] &&
Matthijs Kooijman1cc695e2008-06-12 12:53:35 +0000278 *(redirects[1]) == *(redirects[2])) {
279 // If stdout and stderr should go to the same place, redirect stderr
280 // to the FD already open for stdout.
281 if (-1 == dup2(1,2)) {
282 MakeErrMsg(ErrMsg, "Can't redirect stderr to stdout");
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000283 return false;
Matthijs Kooijman1cc695e2008-06-12 12:53:35 +0000284 }
285 } else {
286 // Just redirect stderr
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000287 if (RedirectIO(redirects[2], 2, ErrMsg)) { return false; }
Reid Spencer6cb551b2004-12-19 18:00:44 +0000288 }
289 }
290
Anton Korobeynikovd01defe2007-02-16 19:11:07 +0000291 // Set memory limits
292 if (memoryLimit!=0) {
293 SetMemoryLimits(memoryLimit);
294 }
Mikhail Glushenkov28309ac2009-07-17 20:38:17 +0000295
Reid Spencer6cb551b2004-12-19 18:00:44 +0000296 // Execute!
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000297 std::string PathStr = Program;
Craig Toppere73658d2014-04-28 04:05:08 +0000298 if (envp != nullptr)
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000299 execve(PathStr.c_str(),
Dan Gohmanf6563972010-04-19 15:55:10 +0000300 const_cast<char **>(args),
301 const_cast<char **>(envp));
Evan Cheng09cf8292006-06-09 20:43:11 +0000302 else
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000303 execv(PathStr.c_str(),
Dan Gohmanf6563972010-04-19 15:55:10 +0000304 const_cast<char **>(args));
Dan Gohman23a419f2009-08-05 00:09:12 +0000305 // If the execve() failed, we should exit. Follow Unix protocol and
306 // return 127 if the executable was not found, and 126 otherwise.
307 // Use _exit rather than exit so that atexit functions and static
308 // object destructors cloned from the parent process aren't
309 // redundantly run, and so that any data buffered in stdio buffers
310 // cloned from the parent aren't redundantly written out.
311 _exit(errno == ENOENT ? 127 : 126);
Reid Spencercdefe0a2004-12-14 04:18:51 +0000312 }
Reid Spencer76b83a12004-08-29 19:20:41 +0000313
314 // Parent process: Break out of the switch to do our processing.
315 default:
316 break;
317 }
318
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000319 PI.Pid = child;
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000320
321 return true;
322}
323
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000324namespace llvm {
325
326ProcessInfo sys::Wait(const ProcessInfo &PI, unsigned SecondsToWait,
327 bool WaitUntilTerminates, std::string *ErrMsg) {
Reid Spencer6cb551b2004-12-19 18:00:44 +0000328 struct sigaction Act, Old;
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000329 assert(PI.Pid && "invalid pid to wait on, process not started?");
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000330
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000331 int WaitPidOptions = 0;
332 pid_t ChildPid = PI.Pid;
333 if (WaitUntilTerminates) {
334 SecondsToWait = 0;
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000335 } else if (SecondsToWait) {
336 // Install a timeout handler. The handler itself does nothing, but the
337 // simple fact of having a handler at all causes the wait below to return
338 // with EINTR, unlike if we used SIG_IGN.
Duncan Sands7a68cd02010-07-14 14:32:33 +0000339 memset(&Act, 0, sizeof(Act));
Duncan Sandsfec62f02009-11-08 20:55:48 +0000340 Act.sa_handler = TimeOutHandler;
Reid Spencer6cb551b2004-12-19 18:00:44 +0000341 sigemptyset(&Act.sa_mask);
Reid Spencer6cb551b2004-12-19 18:00:44 +0000342 sigaction(SIGALRM, &Act, &Old);
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000343 alarm(SecondsToWait);
344 } else if (SecondsToWait == 0)
345 WaitPidOptions = WNOHANG;
Reid Spencer6cb551b2004-12-19 18:00:44 +0000346
Reid Spencer76b83a12004-08-29 19:20:41 +0000347 // Parent process: Wait for the child process to terminate.
348 int status;
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000349 ProcessInfo WaitResult;
Julien Lerougea67d14f2014-06-27 18:02:54 +0000350
351 do {
352 WaitResult.Pid = waitpid(ChildPid, &status, WaitPidOptions);
353 } while (WaitUntilTerminates && WaitResult.Pid == -1 && errno == EINTR);
354
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000355 if (WaitResult.Pid != PI.Pid) {
356 if (WaitResult.Pid == 0) {
357 // Non-blocking wait.
358 return WaitResult;
359 } else {
360 if (SecondsToWait && errno == EINTR) {
361 // Kill the child.
362 kill(PI.Pid, SIGKILL);
Mikhail Glushenkov28309ac2009-07-17 20:38:17 +0000363
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000364 // Turn off the alarm and restore the signal handler
365 alarm(0);
Craig Toppere73658d2014-04-28 04:05:08 +0000366 sigaction(SIGALRM, &Old, nullptr);
Reid Spencer6cb551b2004-12-19 18:00:44 +0000367
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000368 // Wait for child to die
369 if (wait(&status) != ChildPid)
370 MakeErrMsg(ErrMsg, "Child timed out but wouldn't die");
371 else
372 MakeErrMsg(ErrMsg, "Child timed out", 0);
Devang Patel3d4f1b32008-02-04 20:57:54 +0000373
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000374 WaitResult.ReturnCode = -2; // Timeout detected
375 return WaitResult;
376 } else if (errno != EINTR) {
377 MakeErrMsg(ErrMsg, "Error waiting for child process");
378 WaitResult.ReturnCode = -1;
379 return WaitResult;
380 }
Reid Spencer6cb551b2004-12-19 18:00:44 +0000381 }
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000382 }
Reid Spencer6cb551b2004-12-19 18:00:44 +0000383
384 // We exited normally without timeout, so turn off the timer.
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000385 if (SecondsToWait && !WaitUntilTerminates) {
Reid Spencer6cb551b2004-12-19 18:00:44 +0000386 alarm(0);
Craig Toppere73658d2014-04-28 04:05:08 +0000387 sigaction(SIGALRM, &Old, nullptr);
Reid Spencer6cb551b2004-12-19 18:00:44 +0000388 }
Reid Spencer76b83a12004-08-29 19:20:41 +0000389
Dan Gohmancae3c532010-10-29 16:39:01 +0000390 // Return the proper exit status. Detect error conditions
391 // so we can return -1 for them and set ErrMsg informatively.
Reid Spencerccd5b902005-12-22 20:00:16 +0000392 int result = 0;
Dan Gohmancae3c532010-10-29 16:39:01 +0000393 if (WIFEXITED(status)) {
Reid Spencerccd5b902005-12-22 20:00:16 +0000394 result = WEXITSTATUS(status);
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000395 WaitResult.ReturnCode = result;
396
Dan Gohmancae3c532010-10-29 16:39:01 +0000397 if (result == 127) {
Dan Gohman5bc07d22010-10-29 17:20:42 +0000398 if (ErrMsg)
399 *ErrMsg = llvm::sys::StrError(ENOENT);
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000400 WaitResult.ReturnCode = -1;
401 return WaitResult;
Dan Gohmancae3c532010-10-29 16:39:01 +0000402 }
403 if (result == 126) {
Dan Gohman5bc07d22010-10-29 17:20:42 +0000404 if (ErrMsg)
405 *ErrMsg = "Program could not be executed";
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000406 WaitResult.ReturnCode = -1;
407 return WaitResult;
Dan Gohmancae3c532010-10-29 16:39:01 +0000408 }
409 } else if (WIFSIGNALED(status)) {
Dan Gohman5bc07d22010-10-29 17:20:42 +0000410 if (ErrMsg) {
Andrew Trickd5d07642011-05-21 00:56:46 +0000411 *ErrMsg = strsignal(WTERMSIG(status));
Reid Spencerccd5b902005-12-22 20:00:16 +0000412#ifdef WCOREDUMP
Dan Gohman5bc07d22010-10-29 17:20:42 +0000413 if (WCOREDUMP(status))
414 *ErrMsg += " (core dumped)";
Reid Spencer76b83a12004-08-29 19:20:41 +0000415#endif
Dan Gohman5bc07d22010-10-29 17:20:42 +0000416 }
Andrew Trickd5d07642011-05-21 00:56:46 +0000417 // Return a special value to indicate that the process received an unhandled
418 // signal during execution as opposed to failing to execute.
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000419 WaitResult.ReturnCode = -2;
Dan Gohmancae3c532010-10-29 16:39:01 +0000420 }
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000421 return WaitResult;
Reid Spencer76b83a12004-08-29 19:20:41 +0000422}
423
Eugene Zelenko1760dc22016-04-05 20:19:49 +0000424std::error_code sys::ChangeStdinToBinary() {
Reid Spencerab97f222006-06-07 23:18:34 +0000425 // Do nothing, as Unix doesn't differentiate between text and binary.
Rafael Espindoladb4ed0b2014-06-13 02:24:39 +0000426 return std::error_code();
Reid Spencerab97f222006-06-07 23:18:34 +0000427}
428
Eugene Zelenko1760dc22016-04-05 20:19:49 +0000429std::error_code sys::ChangeStdoutToBinary() {
Reid Spencerab97f222006-06-07 23:18:34 +0000430 // Do nothing, as Unix doesn't differentiate between text and binary.
Rafael Espindoladb4ed0b2014-06-13 02:24:39 +0000431 return std::error_code();
Reid Spencerab97f222006-06-07 23:18:34 +0000432}
433
Rafael Espindola9c359662014-09-03 20:02:00 +0000434std::error_code
435llvm::sys::writeFileWithEncoding(StringRef FileName, StringRef Contents,
436 WindowsEncodingMethod Encoding /*unused*/) {
437 std::error_code EC;
438 llvm::raw_fd_ostream OS(FileName, EC, llvm::sys::fs::OpenFlags::F_Text);
439
440 if (EC)
441 return EC;
442
443 OS << Contents;
444
445 if (OS.has_error())
Rafael Espindola74f29322015-06-13 17:23:04 +0000446 return make_error_code(errc::io_error);
Rafael Espindola9c359662014-09-03 20:02:00 +0000447
448 return EC;
449}
450
Oleg Ranevskyy2e837902016-01-05 19:56:12 +0000451bool llvm::sys::commandLineFitsWithinSystemLimits(StringRef Program, ArrayRef<const char*> Args) {
Rafael Espindolacd848c02013-04-11 14:06:34 +0000452 static long ArgMax = sysconf(_SC_ARG_MAX);
453
454 // System says no practical limit.
455 if (ArgMax == -1)
456 return true;
457
458 // Conservatively account for space required by environment variables.
Rafael Espindola42036ae2014-08-25 22:53:21 +0000459 long HalfArgMax = ArgMax / 2;
Rafael Espindolacd848c02013-04-11 14:06:34 +0000460
Oleg Ranevskyy2e837902016-01-05 19:56:12 +0000461 size_t ArgLength = Program.size() + 1;
Rafael Espindolacd848c02013-04-11 14:06:34 +0000462 for (ArrayRef<const char*>::iterator I = Args.begin(), E = Args.end();
463 I != E; ++I) {
464 ArgLength += strlen(*I) + 1;
Rafael Espindola42036ae2014-08-25 22:53:21 +0000465 if (ArgLength > size_t(HalfArgMax)) {
Rafael Espindolacd848c02013-04-11 14:06:34 +0000466 return false;
467 }
468 }
469 return true;
470}
Eugene Zelenko1760dc22016-04-05 20:19:49 +0000471
472} // end namespace llvm