1//===- Unix/Process.cpp - Unix Process Implementation --------- -*- C++ -*-===// 2// 3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4// See https://llvm.org/LICENSE.txt for license information. 5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6// 7//===----------------------------------------------------------------------===// 8// 9// This file provides the generic Unix implementation of the Process class. 10// 11//===----------------------------------------------------------------------===// 12 13#include "Unix.h" 14#include "llvm/ADT/Hashing.h" 15#include "llvm/ADT/StringRef.h" 16#include "llvm/Config/config.h" 17#include <mutex> 18#include <optional> 19#if HAVE_FCNTL_H 20#include <fcntl.h> 21#endif 22#ifdef HAVE_SYS_TIME_H 23#include <sys/time.h> 24#endif 25#ifdef HAVE_SYS_RESOURCE_H 26#include <sys/resource.h> 27#endif 28#ifdef HAVE_SYS_STAT_H 29#include <sys/stat.h> 30#endif 31#if HAVE_SIGNAL_H 32#include <signal.h> 33#endif 34#if defined(HAVE_MALLINFO) || defined(HAVE_MALLINFO2) 35#include <malloc.h> 36#endif 37#if defined(HAVE_MALLCTL) 38#include <malloc_np.h> 39#endif 40#ifdef HAVE_MALLOC_MALLOC_H 41#include <malloc/malloc.h> 42#endif 43#ifdef HAVE_SYS_IOCTL_H 44#include <sys/ioctl.h> 45#endif 46#ifdef HAVE_TERMIOS_H 47#include <termios.h> 48#endif 49 50//===----------------------------------------------------------------------===// 51//=== WARNING: Implementation here must contain only generic UNIX code that 52//=== is guaranteed to work on *all* UNIX variants. 53//===----------------------------------------------------------------------===// 54 55using namespace llvm; 56using namespace sys; 57 58static std::pair<std::chrono::microseconds, std::chrono::microseconds> 59getRUsageTimes() { 60#if defined(HAVE_GETRUSAGE) 61 struct rusage RU; 62 ::getrusage(RUSAGE_SELF, &RU); 63 return {toDuration(RU.ru_utime), toDuration(RU.ru_stime)}; 64#else 65#warning Cannot get usage times on this platform 66 return {std::chrono::microseconds::zero(), std::chrono::microseconds::zero()}; 67#endif 68} 69 70Process::Pid Process::getProcessId() { 71 static_assert(sizeof(Pid) >= sizeof(pid_t), 72 "Process::Pid should be big enough to store pid_t"); 73 return Pid(::getpid()); 74} 75 76// On Cygwin, getpagesize() returns 64k(AllocationGranularity) and 77// offset in mmap(3) should be aligned to the AllocationGranularity. 78Expected<unsigned> Process::getPageSize() { 79#if defined(HAVE_GETPAGESIZE) 80 static const int page_size = ::getpagesize(); 81#elif defined(HAVE_SYSCONF) 82 static long page_size = ::sysconf(_SC_PAGE_SIZE); 83#else 84#error Cannot get the page size on this machine 85#endif 86 if (page_size == -1) 87 return errorCodeToError(std::error_code(errno, std::generic_category())); 88 89 return static_cast<unsigned>(page_size); 90} 91 92size_t Process::GetMallocUsage() { 93#if defined(HAVE_MALLINFO2) 94 struct mallinfo2 mi; 95 mi = ::mallinfo2(); 96 return mi.uordblks; 97#elif defined(HAVE_MALLINFO) 98 struct mallinfo mi; 99 mi = ::mallinfo(); 100 return mi.uordblks; 101#elif defined(HAVE_MALLOC_ZONE_STATISTICS) && defined(HAVE_MALLOC_MALLOC_H) 102 malloc_statistics_t Stats; 103 malloc_zone_statistics(malloc_default_zone(), &Stats); 104 return Stats.size_in_use; // darwin 105#elif defined(HAVE_MALLCTL) 106 size_t alloc, sz; 107 sz = sizeof(size_t); 108 if (mallctl("stats.allocated", &alloc, &sz, NULL, 0) == 0) 109 return alloc; 110 return 0; 111#elif defined(HAVE_SBRK) 112 // Note this is only an approximation and more closely resembles 113 // the value returned by mallinfo in the arena field. 114 static char *StartOfMemory = reinterpret_cast<char *>(::sbrk(0)); 115 char *EndOfMemory = (char *)sbrk(0); 116 if (EndOfMemory != ((char *)-1) && StartOfMemory != ((char *)-1)) 117 return EndOfMemory - StartOfMemory; 118 return 0; 119#else 120#warning Cannot get malloc info on this platform 121 return 0; 122#endif 123} 124 125void Process::GetTimeUsage(TimePoint<> &elapsed, 126 std::chrono::nanoseconds &user_time, 127 std::chrono::nanoseconds &sys_time) { 128 elapsed = std::chrono::system_clock::now(); 129 std::tie(user_time, sys_time) = getRUsageTimes(); 130} 131 132#if defined(HAVE_MACH_MACH_H) && !defined(__GNU__) 133#include <mach/mach.h> 134#endif 135 136// Some LLVM programs such as bugpoint produce core files as a normal part of 137// their operation. To prevent the disk from filling up, this function 138// does what's necessary to prevent their generation. 139void Process::PreventCoreFiles() { 140#if HAVE_SETRLIMIT 141 struct rlimit rlim; 142 rlim.rlim_cur = rlim.rlim_max = 0; 143 setrlimit(RLIMIT_CORE, &rlim); 144#endif 145 146#if defined(HAVE_MACH_MACH_H) && !defined(__GNU__) 147 // Disable crash reporting on Mac OS X 10.0-10.4 148 149 // get information about the original set of exception ports for the task 150 mach_msg_type_number_t Count = 0; 151 exception_mask_t OriginalMasks[EXC_TYPES_COUNT]; 152 exception_port_t OriginalPorts[EXC_TYPES_COUNT]; 153 exception_behavior_t OriginalBehaviors[EXC_TYPES_COUNT]; 154 thread_state_flavor_t OriginalFlavors[EXC_TYPES_COUNT]; 155 kern_return_t err = task_get_exception_ports( 156 mach_task_self(), EXC_MASK_ALL, OriginalMasks, &Count, OriginalPorts, 157 OriginalBehaviors, OriginalFlavors); 158 if (err == KERN_SUCCESS) { 159 // replace each with MACH_PORT_NULL. 160 for (unsigned i = 0; i != Count; ++i) 161 task_set_exception_ports(mach_task_self(), OriginalMasks[i], 162 MACH_PORT_NULL, OriginalBehaviors[i], 163 OriginalFlavors[i]); 164 } 165 166 // Disable crash reporting on Mac OS X 10.5 167 signal(SIGABRT, _exit); 168 signal(SIGILL, _exit); 169 signal(SIGFPE, _exit); 170 signal(SIGSEGV, _exit); 171 signal(SIGBUS, _exit); 172#endif 173 174 coreFilesPrevented = true; 175} 176 177std::optional<std::string> Process::GetEnv(StringRef Name) { 178 std::string NameStr = Name.str(); 179 const char *Val = ::getenv(NameStr.c_str()); 180 if (!Val) 181 return std::nullopt; 182 return std::string(Val); 183} 184 185namespace { 186class FDCloser { 187public: 188 FDCloser(int &FD) : FD(FD), KeepOpen(false) {} 189 void keepOpen() { KeepOpen = true; } 190 ~FDCloser() { 191 if (!KeepOpen && FD >= 0) 192 ::close(FD); 193 } 194 195private: 196 FDCloser(const FDCloser &) = delete; 197 void operator=(const FDCloser &) = delete; 198 199 int &FD; 200 bool KeepOpen; 201}; 202} // namespace 203 204std::error_code Process::FixupStandardFileDescriptors() { 205 int NullFD = -1; 206 FDCloser FDC(NullFD); 207 const int StandardFDs[] = {STDIN_FILENO, STDOUT_FILENO, STDERR_FILENO}; 208 for (int StandardFD : StandardFDs) { 209 struct stat st; 210 errno = 0; 211 if (RetryAfterSignal(-1, ::fstat, StandardFD, &st) < 0) { 212 assert(errno && "expected errno to be set if fstat failed!"); 213 // fstat should return EBADF if the file descriptor is closed. 214 if (errno != EBADF) 215 return std::error_code(errno, std::generic_category()); 216 } 217 // if fstat succeeds, move on to the next FD. 218 if (!errno) 219 continue; 220 assert(errno == EBADF && "expected errno to have EBADF at this point!"); 221 222 if (NullFD < 0) { 223 // Call ::open in a lambda to avoid overload resolution in 224 // RetryAfterSignal when open is overloaded, such as in Bionic. 225 auto Open = [&]() { return ::open("/dev/null", O_RDWR); }; 226 if ((NullFD = RetryAfterSignal(-1, Open)) < 0) 227 return std::error_code(errno, std::generic_category()); 228 } 229 230 if (NullFD == StandardFD) 231 FDC.keepOpen(); 232 else if (dup2(NullFD, StandardFD) < 0) 233 return std::error_code(errno, std::generic_category()); 234 } 235 return std::error_code(); 236} 237 238// Close a file descriptor while being mindful of EINTR. 239// 240// On Unix systems closing a file descriptor usually starts with removing it 241// from the fd table (or an equivalent structure). This means any error 242// generated past that point will still result in the entry being cleared. 243// 244// Make sure to not bubble up EINTR as there is nothing to do in that case. 245// XXX what about other errors? 246#if defined(__linux__) || defined(__DragonFly__) || defined(__FreeBSD__) || \ 247 defined(__NetBSD__) || defined(__OpenBSD__) 248std::error_code Process::SafelyCloseFileDescriptor(int FD) { 249 int EC = 0; 250 if (::close(FD) < 0) { 251 if (errno != EINTR) 252 EC = errno; 253 } 254 return std::error_code(EC, std::generic_category()); 255} 256#else 257std::error_code Process::SafelyCloseFileDescriptor(int FD) { 258 // Create a signal set filled with *all* signals. 259 sigset_t FullSet, SavedSet; 260 if (sigfillset(&FullSet) < 0 || sigfillset(&SavedSet) < 0) 261 return std::error_code(errno, std::generic_category()); 262 263 // Atomically swap our current signal mask with a full mask. 264#if LLVM_ENABLE_THREADS 265 if (int EC = pthread_sigmask(SIG_SETMASK, &FullSet, &SavedSet)) 266 return std::error_code(EC, std::generic_category()); 267#else 268 if (sigprocmask(SIG_SETMASK, &FullSet, &SavedSet) < 0) 269 return std::error_code(errno, std::generic_category()); 270#endif 271 // Attempt to close the file descriptor. 272 // We need to save the error, if one occurs, because our subsequent call to 273 // pthread_sigmask might tamper with errno. 274 int ErrnoFromClose = 0; 275 if (::close(FD) < 0) 276 ErrnoFromClose = errno; 277 // Restore the signal mask back to what we saved earlier. 278 int EC = 0; 279#if LLVM_ENABLE_THREADS 280 EC = pthread_sigmask(SIG_SETMASK, &SavedSet, nullptr); 281#else 282 if (sigprocmask(SIG_SETMASK, &SavedSet, nullptr) < 0) 283 EC = errno; 284#endif 285 // The error code from close takes precedence over the one from 286 // pthread_sigmask. 287 if (ErrnoFromClose) 288 return std::error_code(ErrnoFromClose, std::generic_category()); 289 return std::error_code(EC, std::generic_category()); 290} 291#endif 292 293bool Process::StandardInIsUserInput() { 294 return FileDescriptorIsDisplayed(STDIN_FILENO); 295} 296 297bool Process::StandardOutIsDisplayed() { 298 return FileDescriptorIsDisplayed(STDOUT_FILENO); 299} 300 301bool Process::StandardErrIsDisplayed() { 302 return FileDescriptorIsDisplayed(STDERR_FILENO); 303} 304 305bool Process::FileDescriptorIsDisplayed(int fd) { 306#if HAVE_ISATTY 307 return isatty(fd); 308#else 309 // If we don't have isatty, just return false. 310 return false; 311#endif 312} 313 314static unsigned getColumns() { 315 // If COLUMNS is defined in the environment, wrap to that many columns. 316 if (const char *ColumnsStr = std::getenv("COLUMNS")) { 317 int Columns = std::atoi(ColumnsStr); 318 if (Columns > 0) 319 return Columns; 320 } 321 322 // We used to call ioctl TIOCGWINSZ to determine the width. It is considered 323 // unuseful. 324 return 0; 325} 326 327unsigned Process::StandardOutColumns() { 328 if (!StandardOutIsDisplayed()) 329 return 0; 330 331 return getColumns(); 332} 333 334unsigned Process::StandardErrColumns() { 335 if (!StandardErrIsDisplayed()) 336 return 0; 337 338 return getColumns(); 339} 340 341#ifdef LLVM_ENABLE_TERMINFO 342// We manually declare these extern functions because finding the correct 343// headers from various terminfo, curses, or other sources is harder than 344// writing their specs down. 345extern "C" int setupterm(char *term, int filedes, int *errret); 346extern "C" struct term *set_curterm(struct term *termp); 347extern "C" int del_curterm(struct term *termp); 348extern "C" int tigetnum(char *capname); 349#endif 350 351bool checkTerminalEnvironmentForColors() { 352 if (const char *TermStr = std::getenv("TERM")) { 353 return StringSwitch<bool>(TermStr) 354 .Case("ansi", true) 355 .Case("cygwin", true) 356 .Case("linux", true) 357 .StartsWith("screen", true) 358 .StartsWith("xterm", true) 359 .StartsWith("vt100", true) 360 .StartsWith("rxvt", true) 361 .EndsWith("color", true) 362 .Default(false); 363 } 364 365 return false; 366} 367 368static bool terminalHasColors(int fd) { 369#ifdef LLVM_ENABLE_TERMINFO 370 // First, acquire a global lock because these C routines are thread hostile. 371 static std::mutex TermColorMutex; 372 std::lock_guard<std::mutex> G(TermColorMutex); 373 374 struct term *previous_term = set_curterm(nullptr); 375 int errret = 0; 376 if (setupterm(nullptr, fd, &errret) != 0) 377 // Regardless of why, if we can't get terminfo, we shouldn't try to print 378 // colors. 379 return false; 380 381 // Test whether the terminal as set up supports color output. How to do this 382 // isn't entirely obvious. We can use the curses routine 'has_colors' but it 383 // would be nice to avoid a dependency on curses proper when we can make do 384 // with a minimal terminfo parsing library. Also, we don't really care whether 385 // the terminal supports the curses-specific color changing routines, merely 386 // if it will interpret ANSI color escape codes in a reasonable way. Thus, the 387 // strategy here is just to query the baseline colors capability and if it 388 // supports colors at all to assume it will translate the escape codes into 389 // whatever range of colors it does support. We can add more detailed tests 390 // here if users report them as necessary. 391 // 392 // The 'tigetnum' routine returns -2 or -1 on errors, and might return 0 if 393 // the terminfo says that no colors are supported. 394 int colors_ti = tigetnum(const_cast<char *>("colors")); 395 bool HasColors = 396 colors_ti >= 0 ? colors_ti : checkTerminalEnvironmentForColors(); 397 398 // Now extract the structure allocated by setupterm and free its memory 399 // through a really silly dance. 400 struct term *termp = set_curterm(previous_term); 401 (void)del_curterm(termp); // Drop any errors here. 402 403 // Return true if we found a color capabilities for the current terminal. 404 return HasColors; 405#else 406 // When the terminfo database is not available, check if the current terminal 407 // is one of terminals that are known to support ANSI color escape codes. 408 return checkTerminalEnvironmentForColors(); 409#endif 410} 411 412bool Process::FileDescriptorHasColors(int fd) { 413 // A file descriptor has colors if it is displayed and the terminal has 414 // colors. 415 return FileDescriptorIsDisplayed(fd) && terminalHasColors(fd); 416} 417 418bool Process::StandardOutHasColors() { 419 return FileDescriptorHasColors(STDOUT_FILENO); 420} 421 422bool Process::StandardErrHasColors() { 423 return FileDescriptorHasColors(STDERR_FILENO); 424} 425 426void Process::UseANSIEscapeCodes(bool /*enable*/) { 427 // No effect. 428} 429 430bool Process::ColorNeedsFlush() { 431 // No, we use ANSI escape sequences. 432 return false; 433} 434 435const char *Process::OutputColor(char code, bool bold, bool bg) { 436 return colorcodes[bg ? 1 : 0][bold ? 1 : 0][code & 7]; 437} 438 439const char *Process::OutputBold(bool bg) { return "\033[1m"; } 440 441const char *Process::OutputReverse() { return "\033[7m"; } 442 443const char *Process::ResetColor() { return "\033[0m"; } 444 445#if !HAVE_DECL_ARC4RANDOM 446static unsigned GetRandomNumberSeed() { 447 // Attempt to get the initial seed from /dev/urandom, if possible. 448 int urandomFD = open("/dev/urandom", O_RDONLY); 449 450 if (urandomFD != -1) { 451 unsigned seed; 452 // Don't use a buffered read to avoid reading more data 453 // from /dev/urandom than we need. 454 int count = read(urandomFD, (void *)&seed, sizeof(seed)); 455 456 close(urandomFD); 457 458 // Return the seed if the read was successful. 459 if (count == sizeof(seed)) 460 return seed; 461 } 462 463 // Otherwise, swizzle the current time and the process ID to form a reasonable 464 // seed. 465 const auto Now = std::chrono::high_resolution_clock::now(); 466 return hash_combine(Now.time_since_epoch().count(), ::getpid()); 467} 468#endif 469 470unsigned llvm::sys::Process::GetRandomNumber() { 471#if HAVE_DECL_ARC4RANDOM 472 return arc4random(); 473#else 474 static int x = (static_cast<void>(::srand(GetRandomNumberSeed())), 0); 475 (void)x; 476 return ::rand(); 477#endif 478} 479 480[[noreturn]] void Process::ExitNoCleanup(int RetCode) { _Exit(RetCode); } 481