blob: 78b29714549fcaa076a62d44bf733e68a4ecec8e [file] [log] [blame]
Charles Davis54c9eb62010-11-29 19:44:50 +00001//===- llvm/Support/Unix/Program.cpp -----------------------------*- C++ -*-===//
Mikhail Glushenkov28309ac2009-07-17 20:38:17 +00002//
Reid Spencer76b83a12004-08-29 19:20:41 +00003// The LLVM Compiler Infrastructure
4//
Chris Lattnerf3ebc3f2007-12-29 20:36:04 +00005// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
Mikhail Glushenkov28309ac2009-07-17 20:38:17 +00007//
Reid Spencer76b83a12004-08-29 19:20:41 +00008//===----------------------------------------------------------------------===//
9//
10// This file implements the Unix specific portion of the Program class.
11//
12//===----------------------------------------------------------------------===//
13
14//===----------------------------------------------------------------------===//
15//=== WARNING: Implementation here must contain only generic UNIX code that
16//=== is guaranteed to work on *all* UNIX variants.
17//===----------------------------------------------------------------------===//
18
19#include "Unix.h"
Evgeniy Stepanov1f5a7142013-02-04 07:03:24 +000020#include "llvm/Support/Compiler.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000021#include "llvm/Support/FileSystem.h"
22#include <llvm/Config/config.h>
Reid Spencerd554bbc2004-12-27 06:16:52 +000023#if HAVE_SYS_STAT_H
24#include <sys/stat.h>
25#endif
Anton Korobeynikovd01defe2007-02-16 19:11:07 +000026#if HAVE_SYS_RESOURCE_H
27#include <sys/resource.h>
28#endif
Reid Spencerd554bbc2004-12-27 06:16:52 +000029#if HAVE_SIGNAL_H
30#include <signal.h>
31#endif
32#if HAVE_FCNTL_H
33#include <fcntl.h>
34#endif
Rafael Espindolacd848c02013-04-11 14:06:34 +000035#if HAVE_UNISTD_H
36#include <unistd.h>
37#endif
Chris Lattnera50738a2010-04-18 04:14:37 +000038#ifdef HAVE_POSIX_SPAWN
Rafael Espindola9ab9fe92013-10-08 16:12:58 +000039#ifdef __sun__
40#define _RESTRICT_KYWD
41#endif
Chris Lattnera50738a2010-04-18 04:14:37 +000042#include <spawn.h>
Nick Lewycky554a3982010-04-18 07:07:48 +000043#if !defined(__APPLE__)
44 extern char **environ;
Benjamin Kramer1360e9e2010-04-18 09:16:04 +000045#else
46#include <crt_externs.h> // _NSGetEnviron
Nick Lewycky554a3982010-04-18 07:07:48 +000047#endif
Chris Lattnera50738a2010-04-18 04:14:37 +000048#endif
Reid Spencer76b83a12004-08-29 19:20:41 +000049
Reid Spencer76b83a12004-08-29 19:20:41 +000050namespace llvm {
51using namespace sys;
52
Tareq A. Sirajd88b9832013-10-01 14:28:18 +000053ProcessInfo::ProcessInfo() : Pid(0), ReturnCode(0) {}
54
Reid Spencer76b83a12004-08-29 19:20:41 +000055// This function just uses the PATH environment variable to find the program.
Rafael Espindola4c7ad8f2013-06-13 19:25:37 +000056std::string
Rafael Espindolacb2eca02013-06-12 20:58:35 +000057sys::FindProgramByName(const std::string& progName) {
Reid Spencer76b83a12004-08-29 19:20:41 +000058
59 // Check some degenerate cases
60 if (progName.length() == 0) // no program
Rafael Espindola4c7ad8f2013-06-13 19:25:37 +000061 return "";
Rafael Espindolab0a5c962013-06-14 19:38:45 +000062 std::string temp = progName;
Benjamin Kramer6adb6e02009-07-28 22:08:15 +000063 // Use the given path verbatim if it contains any slashes; this matches
64 // the behavior of sh(1) and friends.
Dan Gohman47215f42010-10-28 20:34:33 +000065 if (progName.find('/') != std::string::npos)
Rafael Espindolab0a5c962013-06-14 19:38:45 +000066 return temp;
Reid Spencer76b83a12004-08-29 19:20:41 +000067
Mikhail Glushenkova581d8a2010-11-02 20:32:39 +000068 // At this point, the file name is valid and does not contain slashes. Search
69 // for it through the directories specified in the PATH environment variable.
Mikhail Glushenkov28309ac2009-07-17 20:38:17 +000070
Reid Spencer76b83a12004-08-29 19:20:41 +000071 // Get the path. If its empty, we can't do anything to find it.
72 const char *PathStr = getenv("PATH");
Mikhail Glushenkov28309ac2009-07-17 20:38:17 +000073 if (PathStr == 0)
Rafael Espindola4c7ad8f2013-06-13 19:25:37 +000074 return "";
Reid Spencer76b83a12004-08-29 19:20:41 +000075
76 // Now we have a colon separated list of directories to search; try them.
Evan Cheng86cb3182008-05-05 18:30:58 +000077 size_t PathLen = strlen(PathStr);
Reid Spencer76b83a12004-08-29 19:20:41 +000078 while (PathLen) {
79 // Find the first colon...
80 const char *Colon = std::find(PathStr, PathStr+PathLen, ':');
81
82 // Check to see if this first directory contains the executable...
Rafael Espindolab0a5c962013-06-14 19:38:45 +000083 SmallString<128> FilePath(PathStr,Colon);
84 sys::path::append(FilePath, progName);
85 if (sys::fs::can_execute(Twine(FilePath)))
86 return FilePath.str(); // Found the executable!
Reid Spencer76b83a12004-08-29 19:20:41 +000087
88 // Nope it wasn't in this directory, check the next path in the list!
89 PathLen -= Colon-PathStr;
90 PathStr = Colon;
91
92 // Advance past duplicate colons
93 while (*PathStr == ':') {
94 PathStr++;
95 PathLen--;
96 }
97 }
Rafael Espindola4c7ad8f2013-06-13 19:25:37 +000098 return "";
Reid Spencer76b83a12004-08-29 19:20:41 +000099}
100
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000101static bool RedirectIO(const StringRef *Path, int FD, std::string* ErrMsg) {
Chris Lattnera50738a2010-04-18 04:14:37 +0000102 if (Path == 0) // Noop
Matthijs Kooijman616e4842008-06-12 10:47:18 +0000103 return false;
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000104 std::string File;
105 if (Path->empty())
Matthijs Kooijman616e4842008-06-12 10:47:18 +0000106 // Redirect empty paths to /dev/null
107 File = "/dev/null";
108 else
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000109 File = *Path;
Reid Spencer6cb551b2004-12-19 18:00:44 +0000110
111 // Open the file
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000112 int InFD = open(File.c_str(), FD == 0 ? O_RDONLY : O_WRONLY|O_CREAT, 0666);
Reid Spencer6cb551b2004-12-19 18:00:44 +0000113 if (InFD == -1) {
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000114 MakeErrMsg(ErrMsg, "Cannot open file '" + File + "' for "
Daniel Dunbar3222b9b2009-04-20 20:50:13 +0000115 + (FD == 0 ? "input" : "output"));
Reid Spencer42bcf6e2006-08-21 06:02:44 +0000116 return true;
Reid Spencer6cb551b2004-12-19 18:00:44 +0000117 }
118
Reid Spencer42bcf6e2006-08-21 06:02:44 +0000119 // Install it as the requested FD
Chris Lattner65a437f2010-03-14 23:16:45 +0000120 if (dup2(InFD, FD) == -1) {
Reid Spencer42bcf6e2006-08-21 06:02:44 +0000121 MakeErrMsg(ErrMsg, "Cannot dup2");
Chris Lattner65a437f2010-03-14 23:16:45 +0000122 close(InFD);
Reid Spencer42bcf6e2006-08-21 06:02:44 +0000123 return true;
124 }
Reid Spencer6cb551b2004-12-19 18:00:44 +0000125 close(InFD); // Close the original FD
Reid Spencer42bcf6e2006-08-21 06:02:44 +0000126 return false;
Reid Spencer6cb551b2004-12-19 18:00:44 +0000127}
128
Chris Lattnera50738a2010-04-18 04:14:37 +0000129#ifdef HAVE_POSIX_SPAWN
Rafael Espindola70d98f42013-07-26 16:21:31 +0000130static bool RedirectIO_PS(const std::string *Path, int FD, std::string *ErrMsg,
Benjamin Kramerdce83c52011-03-20 15:52:24 +0000131 posix_spawn_file_actions_t *FileActions) {
Chris Lattnera50738a2010-04-18 04:14:37 +0000132 if (Path == 0) // Noop
133 return false;
Rafael Espindola70d98f42013-07-26 16:21:31 +0000134 const char *File;
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000135 if (Path->empty())
Chris Lattnera50738a2010-04-18 04:14:37 +0000136 // Redirect empty paths to /dev/null
137 File = "/dev/null";
138 else
Rafael Espindola70d98f42013-07-26 16:21:31 +0000139 File = Path->c_str();
Benjamin Kramer5b4be742010-04-18 09:19:41 +0000140
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000141 if (int Err = posix_spawn_file_actions_addopen(
Rafael Espindola70d98f42013-07-26 16:21:31 +0000142 FileActions, FD, File,
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000143 FD == 0 ? O_RDONLY : O_WRONLY | O_CREAT, 0666))
Chris Lattnera50738a2010-04-18 04:14:37 +0000144 return MakeErrMsg(ErrMsg, "Cannot dup2", Err);
145 return false;
146}
147#endif
148
Duncan Sandsfec62f02009-11-08 20:55:48 +0000149static void TimeOutHandler(int Sig) {
150}
151
Anton Korobeynikovd01defe2007-02-16 19:11:07 +0000152static void SetMemoryLimits (unsigned size)
153{
Chris Lattner62f50da2010-02-12 00:37:46 +0000154#if HAVE_SYS_RESOURCE_H && HAVE_GETRLIMIT && HAVE_SETRLIMIT
Anton Korobeynikovd01defe2007-02-16 19:11:07 +0000155 struct rlimit r;
156 __typeof__ (r.rlim_cur) limit = (__typeof__ (r.rlim_cur)) (size) * 1048576;
157
158 // Heap size
159 getrlimit (RLIMIT_DATA, &r);
160 r.rlim_cur = limit;
161 setrlimit (RLIMIT_DATA, &r);
Gabor Greif0e219802007-07-06 10:31:27 +0000162#ifdef RLIMIT_RSS
Anton Korobeynikovd01defe2007-02-16 19:11:07 +0000163 // Resident set size.
164 getrlimit (RLIMIT_RSS, &r);
165 r.rlim_cur = limit;
166 setrlimit (RLIMIT_RSS, &r);
Reid Spencere2e9b372007-04-23 07:22:51 +0000167#endif
Devang Pateld609374a2007-06-04 15:28:57 +0000168#ifdef RLIMIT_AS // e.g. NetBSD doesn't have it.
Evgeniy Stepanov1f5a7142013-02-04 07:03:24 +0000169 // Don't set virtual memory limit if built with any Sanitizer. They need 80Tb
170 // of virtual memory for shadow memory mapping.
171#if !LLVM_MEMORY_SANITIZER_BUILD && !LLVM_ADDRESS_SANITIZER_BUILD
Anton Korobeynikovd01defe2007-02-16 19:11:07 +0000172 // Virtual memory.
173 getrlimit (RLIMIT_AS, &r);
174 r.rlim_cur = limit;
175 setrlimit (RLIMIT_AS, &r);
176#endif
Devang Pateld609374a2007-06-04 15:28:57 +0000177#endif
Evgeniy Stepanov1f5a7142013-02-04 07:03:24 +0000178#endif
Anton Korobeynikovd01defe2007-02-16 19:11:07 +0000179}
180
Rafael Espindolacb2eca02013-06-12 20:58:35 +0000181}
182
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000183static bool Execute(ProcessInfo &PI, StringRef Program, const char **args,
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000184 const char **envp, const StringRef **redirects,
Rafael Espindolacb2eca02013-06-12 20:58:35 +0000185 unsigned memoryLimit, std::string *ErrMsg) {
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000186 if (!llvm::sys::fs::exists(Program)) {
187 if (ErrMsg)
188 *ErrMsg = std::string("Executable \"") + Program.str() +
189 std::string("\" doesn't exist!");
190 return false;
191 }
192
Chris Lattnera50738a2010-04-18 04:14:37 +0000193 // If this OS has posix_spawn and there is no memory limit being implied, use
194 // posix_spawn. It is more efficient than fork/exec.
195#ifdef HAVE_POSIX_SPAWN
196 if (memoryLimit == 0) {
Benjamin Kramerdce83c52011-03-20 15:52:24 +0000197 posix_spawn_file_actions_t FileActionsStore;
198 posix_spawn_file_actions_t *FileActions = 0;
Chris Lattnera50738a2010-04-18 04:14:37 +0000199
Rafael Espindola70d98f42013-07-26 16:21:31 +0000200 // If we call posix_spawn_file_actions_addopen we have to make sure the
Rafael Espindola1cfc5dd2013-07-26 20:44:45 +0000201 // c strings we pass to it stay alive until the call to posix_spawn,
Rafael Espindola70d98f42013-07-26 16:21:31 +0000202 // so we copy any StringRefs into this variable.
203 std::string RedirectsStorage[3];
204
Chris Lattnera50738a2010-04-18 04:14:37 +0000205 if (redirects) {
Rafael Espindola70d98f42013-07-26 16:21:31 +0000206 std::string *RedirectsStr[3] = {0, 0, 0};
207 for (int I = 0; I < 3; ++I) {
208 if (redirects[I]) {
209 RedirectsStorage[I] = *redirects[I];
210 RedirectsStr[I] = &RedirectsStorage[I];
211 }
212 }
213
Benjamin Kramerdce83c52011-03-20 15:52:24 +0000214 FileActions = &FileActionsStore;
215 posix_spawn_file_actions_init(FileActions);
216
Chris Lattnera50738a2010-04-18 04:14:37 +0000217 // Redirect stdin/stdout.
Rafael Espindola70d98f42013-07-26 16:21:31 +0000218 if (RedirectIO_PS(RedirectsStr[0], 0, ErrMsg, FileActions) ||
219 RedirectIO_PS(RedirectsStr[1], 1, ErrMsg, FileActions))
Chris Lattnera50738a2010-04-18 04:14:37 +0000220 return false;
221 if (redirects[1] == 0 || redirects[2] == 0 ||
222 *redirects[1] != *redirects[2]) {
223 // Just redirect stderr
Rafael Espindola70d98f42013-07-26 16:21:31 +0000224 if (RedirectIO_PS(RedirectsStr[2], 2, ErrMsg, FileActions))
225 return false;
Mikhail Glushenkov0e9d9b52010-10-28 19:32:53 +0000226 } else {
Chris Lattnera50738a2010-04-18 04:14:37 +0000227 // If stdout and stderr should go to the same place, redirect stderr
228 // to the FD already open for stdout.
Benjamin Kramerdce83c52011-03-20 15:52:24 +0000229 if (int Err = posix_spawn_file_actions_adddup2(FileActions, 1, 2))
Chris Lattnera50738a2010-04-18 04:14:37 +0000230 return !MakeErrMsg(ErrMsg, "Can't redirect stderr to stdout", Err);
231 }
232 }
233
Benjamin Kramer1360e9e2010-04-18 09:16:04 +0000234 if (!envp)
Nick Lewycky554a3982010-04-18 07:07:48 +0000235#if !defined(__APPLE__)
Dan Gohmanf6563972010-04-19 15:55:10 +0000236 envp = const_cast<const char **>(environ);
Benjamin Kramer1360e9e2010-04-18 09:16:04 +0000237#else
Dan Gohmanf6563972010-04-19 15:55:10 +0000238 // environ is missing in dylibs.
239 envp = const_cast<const char **>(*_NSGetEnviron());
Nick Lewycky554a3982010-04-18 07:07:48 +0000240#endif
241
Daniel Dunbar31158b52010-09-30 23:56:49 +0000242 // Explicitly initialized to prevent what appears to be a valgrind false
243 // positive.
244 pid_t PID = 0;
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000245 int Err = posix_spawn(&PID, Program.str().c_str(), FileActions, /*attrp*/0,
Dan Gohmanf6563972010-04-19 15:55:10 +0000246 const_cast<char **>(args), const_cast<char **>(envp));
Mikhail Glushenkov0e9d9b52010-10-28 19:32:53 +0000247
Benjamin Kramerdce83c52011-03-20 15:52:24 +0000248 if (FileActions)
249 posix_spawn_file_actions_destroy(FileActions);
Chris Lattnera50738a2010-04-18 04:14:37 +0000250
251 if (Err)
252 return !MakeErrMsg(ErrMsg, "posix_spawn failed", Err);
Mikhail Glushenkov0e9d9b52010-10-28 19:32:53 +0000253
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000254 PI.Pid = PID;
255
Chris Lattnera50738a2010-04-18 04:14:37 +0000256 return true;
257 }
258#endif
Mikhail Glushenkov0e9d9b52010-10-28 19:32:53 +0000259
Reid Spencer76b83a12004-08-29 19:20:41 +0000260 // Create a child process.
Reid Spencer6cb551b2004-12-19 18:00:44 +0000261 int child = fork();
262 switch (child) {
Chris Lattner0ab5e2c2011-04-15 05:18:47 +0000263 // An error occurred: Return to the caller.
Reid Spencer76b83a12004-08-29 19:20:41 +0000264 case -1:
Reid Spencer42bcf6e2006-08-21 06:02:44 +0000265 MakeErrMsg(ErrMsg, "Couldn't fork");
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000266 return false;
Reid Spencer76b83a12004-08-29 19:20:41 +0000267
268 // Child process: Execute the program.
Reid Spencercdefe0a2004-12-14 04:18:51 +0000269 case 0: {
Reid Spencer6cb551b2004-12-19 18:00:44 +0000270 // Redirect file descriptors...
271 if (redirects) {
Matthijs Kooijman1cc695e2008-06-12 12:53:35 +0000272 // Redirect stdin
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000273 if (RedirectIO(redirects[0], 0, ErrMsg)) { return false; }
Matthijs Kooijman1cc695e2008-06-12 12:53:35 +0000274 // Redirect stdout
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000275 if (RedirectIO(redirects[1], 1, ErrMsg)) { return false; }
Mikhail Glushenkov28309ac2009-07-17 20:38:17 +0000276 if (redirects[1] && redirects[2] &&
Matthijs Kooijman1cc695e2008-06-12 12:53:35 +0000277 *(redirects[1]) == *(redirects[2])) {
278 // If stdout and stderr should go to the same place, redirect stderr
279 // to the FD already open for stdout.
280 if (-1 == dup2(1,2)) {
281 MakeErrMsg(ErrMsg, "Can't redirect stderr to stdout");
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000282 return false;
Matthijs Kooijman1cc695e2008-06-12 12:53:35 +0000283 }
284 } else {
285 // Just redirect stderr
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000286 if (RedirectIO(redirects[2], 2, ErrMsg)) { return false; }
Reid Spencer6cb551b2004-12-19 18:00:44 +0000287 }
288 }
289
Anton Korobeynikovd01defe2007-02-16 19:11:07 +0000290 // Set memory limits
291 if (memoryLimit!=0) {
292 SetMemoryLimits(memoryLimit);
293 }
Mikhail Glushenkov28309ac2009-07-17 20:38:17 +0000294
Reid Spencer6cb551b2004-12-19 18:00:44 +0000295 // Execute!
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000296 std::string PathStr = Program;
Evan Cheng09cf8292006-06-09 20:43:11 +0000297 if (envp != 0)
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000298 execve(PathStr.c_str(),
Dan Gohmanf6563972010-04-19 15:55:10 +0000299 const_cast<char **>(args),
300 const_cast<char **>(envp));
Evan Cheng09cf8292006-06-09 20:43:11 +0000301 else
Rafael Espindolab0a5c962013-06-14 19:38:45 +0000302 execv(PathStr.c_str(),
Dan Gohmanf6563972010-04-19 15:55:10 +0000303 const_cast<char **>(args));
Dan Gohman23a419f2009-08-05 00:09:12 +0000304 // If the execve() failed, we should exit. Follow Unix protocol and
305 // return 127 if the executable was not found, and 126 otherwise.
306 // Use _exit rather than exit so that atexit functions and static
307 // object destructors cloned from the parent process aren't
308 // redundantly run, and so that any data buffered in stdio buffers
309 // cloned from the parent aren't redundantly written out.
310 _exit(errno == ENOENT ? 127 : 126);
Reid Spencercdefe0a2004-12-14 04:18:51 +0000311 }
Reid Spencer76b83a12004-08-29 19:20:41 +0000312
313 // Parent process: Break out of the switch to do our processing.
314 default:
315 break;
316 }
317
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000318 PI.Pid = child;
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000319
320 return true;
321}
322
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000323namespace llvm {
324
325ProcessInfo sys::Wait(const ProcessInfo &PI, unsigned SecondsToWait,
326 bool WaitUntilTerminates, std::string *ErrMsg) {
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000327#ifdef HAVE_SYS_WAIT_H
Reid Spencer6cb551b2004-12-19 18:00:44 +0000328 struct sigaction Act, Old;
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000329 assert(PI.Pid && "invalid pid to wait on, process not started?");
Mikhail Glushenkov36cb8322009-07-18 21:43:12 +0000330
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000331 int WaitPidOptions = 0;
332 pid_t ChildPid = PI.Pid;
333 if (WaitUntilTerminates) {
334 SecondsToWait = 0;
335 ChildPid = -1; // mimic a wait() using waitpid()
336 } else if (SecondsToWait) {
337 // Install a timeout handler. The handler itself does nothing, but the
338 // simple fact of having a handler at all causes the wait below to return
339 // with EINTR, unlike if we used SIG_IGN.
Duncan Sands7a68cd02010-07-14 14:32:33 +0000340 memset(&Act, 0, sizeof(Act));
Duncan Sandsfec62f02009-11-08 20:55:48 +0000341 Act.sa_handler = TimeOutHandler;
Reid Spencer6cb551b2004-12-19 18:00:44 +0000342 sigemptyset(&Act.sa_mask);
Reid Spencer6cb551b2004-12-19 18:00:44 +0000343 sigaction(SIGALRM, &Act, &Old);
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000344 alarm(SecondsToWait);
345 } else if (SecondsToWait == 0)
346 WaitPidOptions = WNOHANG;
Reid Spencer6cb551b2004-12-19 18:00:44 +0000347
Reid Spencer76b83a12004-08-29 19:20:41 +0000348 // Parent process: Wait for the child process to terminate.
349 int status;
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000350 ProcessInfo WaitResult;
351 WaitResult.Pid = waitpid(ChildPid, &status, WaitPidOptions);
352 if (WaitResult.Pid != PI.Pid) {
353 if (WaitResult.Pid == 0) {
354 // Non-blocking wait.
355 return WaitResult;
356 } else {
357 if (SecondsToWait && errno == EINTR) {
358 // Kill the child.
359 kill(PI.Pid, SIGKILL);
Mikhail Glushenkov28309ac2009-07-17 20:38:17 +0000360
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000361 // Turn off the alarm and restore the signal handler
362 alarm(0);
363 sigaction(SIGALRM, &Old, 0);
Reid Spencer6cb551b2004-12-19 18:00:44 +0000364
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000365 // Wait for child to die
366 if (wait(&status) != ChildPid)
367 MakeErrMsg(ErrMsg, "Child timed out but wouldn't die");
368 else
369 MakeErrMsg(ErrMsg, "Child timed out", 0);
Devang Patel3d4f1b32008-02-04 20:57:54 +0000370
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000371 WaitResult.ReturnCode = -2; // Timeout detected
372 return WaitResult;
373 } else if (errno != EINTR) {
374 MakeErrMsg(ErrMsg, "Error waiting for child process");
375 WaitResult.ReturnCode = -1;
376 return WaitResult;
377 }
Reid Spencer6cb551b2004-12-19 18:00:44 +0000378 }
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000379 }
Reid Spencer6cb551b2004-12-19 18:00:44 +0000380
381 // We exited normally without timeout, so turn off the timer.
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000382 if (SecondsToWait && !WaitUntilTerminates) {
Reid Spencer6cb551b2004-12-19 18:00:44 +0000383 alarm(0);
384 sigaction(SIGALRM, &Old, 0);
385 }
Reid Spencer76b83a12004-08-29 19:20:41 +0000386
Dan Gohmancae3c532010-10-29 16:39:01 +0000387 // Return the proper exit status. Detect error conditions
388 // so we can return -1 for them and set ErrMsg informatively.
Reid Spencerccd5b902005-12-22 20:00:16 +0000389 int result = 0;
Dan Gohmancae3c532010-10-29 16:39:01 +0000390 if (WIFEXITED(status)) {
Reid Spencerccd5b902005-12-22 20:00:16 +0000391 result = WEXITSTATUS(status);
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000392 WaitResult.ReturnCode = result;
393
Dan Gohmancae3c532010-10-29 16:39:01 +0000394 if (result == 127) {
Dan Gohman5bc07d22010-10-29 17:20:42 +0000395 if (ErrMsg)
396 *ErrMsg = llvm::sys::StrError(ENOENT);
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000397 WaitResult.ReturnCode = -1;
398 return WaitResult;
Dan Gohmancae3c532010-10-29 16:39:01 +0000399 }
400 if (result == 126) {
Dan Gohman5bc07d22010-10-29 17:20:42 +0000401 if (ErrMsg)
402 *ErrMsg = "Program could not be executed";
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000403 WaitResult.ReturnCode = -1;
404 return WaitResult;
Dan Gohmancae3c532010-10-29 16:39:01 +0000405 }
406 } else if (WIFSIGNALED(status)) {
Dan Gohman5bc07d22010-10-29 17:20:42 +0000407 if (ErrMsg) {
Andrew Trickd5d07642011-05-21 00:56:46 +0000408 *ErrMsg = strsignal(WTERMSIG(status));
Reid Spencerccd5b902005-12-22 20:00:16 +0000409#ifdef WCOREDUMP
Dan Gohman5bc07d22010-10-29 17:20:42 +0000410 if (WCOREDUMP(status))
411 *ErrMsg += " (core dumped)";
Reid Spencer76b83a12004-08-29 19:20:41 +0000412#endif
Dan Gohman5bc07d22010-10-29 17:20:42 +0000413 }
Andrew Trickd5d07642011-05-21 00:56:46 +0000414 // Return a special value to indicate that the process received an unhandled
415 // signal during execution as opposed to failing to execute.
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000416 WaitResult.ReturnCode = -2;
Dan Gohmancae3c532010-10-29 16:39:01 +0000417 }
Reid Spencerccd5b902005-12-22 20:00:16 +0000418#else
Dan Gohman5bc07d22010-10-29 17:20:42 +0000419 if (ErrMsg)
420 *ErrMsg = "Program::Wait is not implemented on this platform yet!";
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000421 WaitResult.ReturnCode = -2;
Reid Spencerccd5b902005-12-22 20:00:16 +0000422#endif
Tareq A. Sirajd88b9832013-10-01 14:28:18 +0000423 return WaitResult;
Reid Spencer76b83a12004-08-29 19:20:41 +0000424}
425
Rafael Espindolacb2eca02013-06-12 20:58:35 +0000426error_code sys::ChangeStdinToBinary(){
Reid Spencerab97f222006-06-07 23:18:34 +0000427 // Do nothing, as Unix doesn't differentiate between text and binary.
Michael J. Spencera2755f82011-12-13 23:16:49 +0000428 return make_error_code(errc::success);
Reid Spencerab97f222006-06-07 23:18:34 +0000429}
430
Rafael Espindolacb2eca02013-06-12 20:58:35 +0000431error_code sys::ChangeStdoutToBinary(){
Reid Spencerab97f222006-06-07 23:18:34 +0000432 // Do nothing, as Unix doesn't differentiate between text and binary.
Michael J. Spencera2755f82011-12-13 23:16:49 +0000433 return make_error_code(errc::success);
Reid Spencerab97f222006-06-07 23:18:34 +0000434}
435
Rafael Espindolacb2eca02013-06-12 20:58:35 +0000436error_code sys::ChangeStderrToBinary(){
Douglas Gregor10519372010-01-28 06:42:08 +0000437 // Do nothing, as Unix doesn't differentiate between text and binary.
Michael J. Spencera2755f82011-12-13 23:16:49 +0000438 return make_error_code(errc::success);
Douglas Gregor10519372010-01-28 06:42:08 +0000439}
440
Rafael Espindolacd848c02013-04-11 14:06:34 +0000441bool llvm::sys::argumentsFitWithinSystemLimits(ArrayRef<const char*> Args) {
442 static long ArgMax = sysconf(_SC_ARG_MAX);
443
444 // System says no practical limit.
445 if (ArgMax == -1)
446 return true;
447
448 // Conservatively account for space required by environment variables.
449 ArgMax /= 2;
450
451 size_t ArgLength = 0;
452 for (ArrayRef<const char*>::iterator I = Args.begin(), E = Args.end();
453 I != E; ++I) {
454 ArgLength += strlen(*I) + 1;
455 if (ArgLength > size_t(ArgMax)) {
456 return false;
457 }
458 }
459 return true;
460}
Reid Spencer76b83a12004-08-29 19:20:41 +0000461}