1//===- llvm/Support/Unix/Path.inc - Unix Path Implementation ----*- C++ -*-===// 2// 3// The LLVM Compiler Infrastructure 4// 5// This file is distributed under the University of Illinois Open Source 6// License. See LICENSE.TXT for details. 7// 8//===----------------------------------------------------------------------===// 9// 10// This file implements the Unix specific implementation of the Path API. 11// 12//===----------------------------------------------------------------------===// 13 14//===----------------------------------------------------------------------===// 15//=== WARNING: Implementation here must contain only generic UNIX code that 16//=== is guaranteed to work on *all* UNIX variants. 17//===----------------------------------------------------------------------===// 18 19#include "Unix.h" 20#include <limits.h> 21#include <stdio.h> 22#if HAVE_SYS_STAT_H 23#include <sys/stat.h> 24#endif 25#if HAVE_FCNTL_H 26#include <fcntl.h> 27#endif 28#ifdef HAVE_UNISTD_H 29#include <unistd.h> 30#endif 31#ifdef HAVE_SYS_MMAN_H 32#include <sys/mman.h> 33#endif 34#if HAVE_DIRENT_H 35# include <dirent.h> 36# define NAMLEN(dirent) strlen((dirent)->d_name) 37#else 38# define dirent direct 39# define NAMLEN(dirent) (dirent)->d_namlen 40# if HAVE_SYS_NDIR_H 41# include <sys/ndir.h> 42# endif 43# if HAVE_SYS_DIR_H 44# include <sys/dir.h> 45# endif 46# if HAVE_NDIR_H 47# include <ndir.h> 48# endif 49#endif 50 51#include <pwd.h> 52 53#ifdef __APPLE__ 54#include <mach-o/dyld.h> 55#include <sys/attr.h> 56#endif 57 58// Both stdio.h and cstdio are included via different paths and 59// stdcxx's cstdio doesn't include stdio.h, so it doesn't #undef the macros 60// either. 61#undef ferror 62#undef feof 63 64// For GNU Hurd 65#if defined(__GNU__) && !defined(PATH_MAX) 66# define PATH_MAX 4096 67#endif 68 69#include <sys/types.h> 70#if !defined(__APPLE__) && !defined(__OpenBSD__) && !defined(__FreeBSD__) && \ 71 !defined(__linux__) 72#include <sys/statvfs.h> 73#define STATVFS statvfs 74#define FSTATVFS fstatvfs 75#define STATVFS_F_FRSIZE(vfs) vfs.f_frsize 76#else 77#if defined(__OpenBSD__) || defined(__FreeBSD__) 78#include <sys/mount.h> 79#include <sys/param.h> 80#elif defined(__linux__) 81#if defined(HAVE_LINUX_MAGIC_H) 82#include <linux/magic.h> 83#else 84#if defined(HAVE_LINUX_NFS_FS_H) 85#include <linux/nfs_fs.h> 86#endif 87#if defined(HAVE_LINUX_SMB_H) 88#include <linux/smb.h> 89#endif 90#endif 91#include <sys/vfs.h> 92#else 93#include <sys/mount.h> 94#endif 95#define STATVFS statfs 96#define FSTATVFS fstatfs 97#define STATVFS_F_FRSIZE(vfs) static_cast<uint64_t>(vfs.f_bsize) 98#endif 99 100#if defined(__NetBSD__) 101#define STATVFS_F_FLAG(vfs) (vfs).f_flag 102#else 103#define STATVFS_F_FLAG(vfs) (vfs).f_flags 104#endif 105 106using namespace llvm; 107 108namespace llvm { 109namespace sys { 110namespace fs { 111#if defined(__FreeBSD__) || defined (__NetBSD__) || defined(__Bitrig__) || \ 112 defined(__OpenBSD__) || defined(__minix) || defined(__FreeBSD_kernel__) || \ 113 defined(__linux__) || defined(__CYGWIN__) || defined(__DragonFly__) || \ 114 defined(_AIX) 115static int 116test_dir(char ret[PATH_MAX], const char *dir, const char *bin) 117{ 118 struct stat sb; 119 char fullpath[PATH_MAX]; 120 121 snprintf(fullpath, PATH_MAX, "%s/%s", dir, bin); 122 if (!realpath(fullpath, ret)) 123 return 1; 124 if (stat(fullpath, &sb) != 0) 125 return 1; 126 127 return 0; 128} 129 130static char * 131getprogpath(char ret[PATH_MAX], const char *bin) 132{ 133 char *pv, *s, *t; 134 135 /* First approach: absolute path. */ 136 if (bin[0] == '/') { 137 if (test_dir(ret, "/", bin) == 0) 138 return ret; 139 return nullptr; 140 } 141 142 /* Second approach: relative path. */ 143 if (strchr(bin, '/')) { 144 char cwd[PATH_MAX]; 145 if (!getcwd(cwd, PATH_MAX)) 146 return nullptr; 147 if (test_dir(ret, cwd, bin) == 0) 148 return ret; 149 return nullptr; 150 } 151 152 /* Third approach: $PATH */ 153 if ((pv = getenv("PATH")) == nullptr) 154 return nullptr; 155 s = pv = strdup(pv); 156 if (!pv) 157 return nullptr; 158 while ((t = strsep(&s, ":")) != nullptr) { 159 if (test_dir(ret, t, bin) == 0) { 160 free(pv); 161 return ret; 162 } 163 } 164 free(pv); 165 return nullptr; 166} 167#endif // __FreeBSD__ || __NetBSD__ || __FreeBSD_kernel__ 168 169/// GetMainExecutable - Return the path to the main executable, given the 170/// value of argv[0] from program startup. 171std::string getMainExecutable(const char *argv0, void *MainAddr) { 172#if defined(__APPLE__) 173 // On OS X the executable path is saved to the stack by dyld. Reading it 174 // from there is much faster than calling dladdr, especially for large 175 // binaries with symbols. 176 char exe_path[MAXPATHLEN]; 177 uint32_t size = sizeof(exe_path); 178 if (_NSGetExecutablePath(exe_path, &size) == 0) { 179 char link_path[MAXPATHLEN]; 180 if (realpath(exe_path, link_path)) 181 return link_path; 182 } 183#elif defined(__FreeBSD__) || defined (__NetBSD__) || defined(__Bitrig__) || \ 184 defined(__OpenBSD__) || defined(__minix) || defined(__DragonFly__) || \ 185 defined(__FreeBSD_kernel__) || defined(_AIX) 186 char exe_path[PATH_MAX]; 187 188 if (getprogpath(exe_path, argv0) != NULL) 189 return exe_path; 190#elif defined(__linux__) || defined(__CYGWIN__) 191 char exe_path[MAXPATHLEN]; 192 StringRef aPath("/proc/self/exe"); 193 if (sys::fs::exists(aPath)) { 194 // /proc is not always mounted under Linux (chroot for example). 195 ssize_t len = readlink(aPath.str().c_str(), exe_path, sizeof(exe_path)); 196 if (len >= 0) 197 return std::string(exe_path, len); 198 } else { 199 // Fall back to the classical detection. 200 if (getprogpath(exe_path, argv0)) 201 return exe_path; 202 } 203#elif defined(HAVE_DLFCN_H) && defined(HAVE_DLADDR) 204 // Use dladdr to get executable path if available. 205 Dl_info DLInfo; 206 int err = dladdr(MainAddr, &DLInfo); 207 if (err == 0) 208 return ""; 209 210 // If the filename is a symlink, we need to resolve and return the location of 211 // the actual executable. 212 char link_path[MAXPATHLEN]; 213 if (realpath(DLInfo.dli_fname, link_path)) 214 return link_path; 215#else 216#error GetMainExecutable is not implemented on this host yet. 217#endif 218 return ""; 219} 220 221TimePoint<> file_status::getLastAccessedTime() const { 222 return toTimePoint(fs_st_atime); 223} 224 225TimePoint<> file_status::getLastModificationTime() const { 226 return toTimePoint(fs_st_mtime); 227} 228 229UniqueID file_status::getUniqueID() const { 230 return UniqueID(fs_st_dev, fs_st_ino); 231} 232 233uint32_t file_status::getLinkCount() const { 234 return fs_st_nlinks; 235} 236 237ErrorOr<space_info> disk_space(const Twine &Path) { 238 struct STATVFS Vfs; 239 if (::STATVFS(Path.str().c_str(), &Vfs)) 240 return std::error_code(errno, std::generic_category()); 241 auto FrSize = STATVFS_F_FRSIZE(Vfs); 242 space_info SpaceInfo; 243 SpaceInfo.capacity = static_cast<uint64_t>(Vfs.f_blocks) * FrSize; 244 SpaceInfo.free = static_cast<uint64_t>(Vfs.f_bfree) * FrSize; 245 SpaceInfo.available = static_cast<uint64_t>(Vfs.f_bavail) * FrSize; 246 return SpaceInfo; 247} 248 249std::error_code current_path(SmallVectorImpl<char> &result) { 250 result.clear(); 251 252 const char *pwd = ::getenv("PWD"); 253 llvm::sys::fs::file_status PWDStatus, DotStatus; 254 if (pwd && llvm::sys::path::is_absolute(pwd) && 255 !llvm::sys::fs::status(pwd, PWDStatus) && 256 !llvm::sys::fs::status(".", DotStatus) && 257 PWDStatus.getUniqueID() == DotStatus.getUniqueID()) { 258 result.append(pwd, pwd + strlen(pwd)); 259 return std::error_code(); 260 } 261 262#ifdef MAXPATHLEN 263 result.reserve(MAXPATHLEN); 264#else 265// For GNU Hurd 266 result.reserve(1024); 267#endif 268 269 while (true) { 270 if (::getcwd(result.data(), result.capacity()) == nullptr) { 271 // See if there was a real error. 272 if (errno != ENOMEM) 273 return std::error_code(errno, std::generic_category()); 274 // Otherwise there just wasn't enough space. 275 result.reserve(result.capacity() * 2); 276 } else 277 break; 278 } 279 280 result.set_size(strlen(result.data())); 281 return std::error_code(); 282} 283 284std::error_code set_current_path(const Twine &path) { 285 SmallString<128> path_storage; 286 StringRef p = path.toNullTerminatedStringRef(path_storage); 287 288 if (::chdir(p.begin()) == -1) 289 return std::error_code(errno, std::generic_category()); 290 291 return std::error_code(); 292} 293 294std::error_code create_directory(const Twine &path, bool IgnoreExisting, 295 perms Perms) { 296 SmallString<128> path_storage; 297 StringRef p = path.toNullTerminatedStringRef(path_storage); 298 299 if (::mkdir(p.begin(), Perms) == -1) { 300 if (errno != EEXIST || !IgnoreExisting) 301 return std::error_code(errno, std::generic_category()); 302 } 303 304 return std::error_code(); 305} 306 307// Note that we are using symbolic link because hard links are not supported by 308// all filesystems (SMB doesn't). 309std::error_code create_link(const Twine &to, const Twine &from) { 310 // Get arguments. 311 SmallString<128> from_storage; 312 SmallString<128> to_storage; 313 StringRef f = from.toNullTerminatedStringRef(from_storage); 314 StringRef t = to.toNullTerminatedStringRef(to_storage); 315 316 if (::symlink(t.begin(), f.begin()) == -1) 317 return std::error_code(errno, std::generic_category()); 318 319 return std::error_code(); 320} 321 322std::error_code create_hard_link(const Twine &to, const Twine &from) { 323 // Get arguments. 324 SmallString<128> from_storage; 325 SmallString<128> to_storage; 326 StringRef f = from.toNullTerminatedStringRef(from_storage); 327 StringRef t = to.toNullTerminatedStringRef(to_storage); 328 329 if (::link(t.begin(), f.begin()) == -1) 330 return std::error_code(errno, std::generic_category()); 331 332 return std::error_code(); 333} 334 335std::error_code remove(const Twine &path, bool IgnoreNonExisting) { 336 SmallString<128> path_storage; 337 StringRef p = path.toNullTerminatedStringRef(path_storage); 338 339 struct stat buf; 340 if (lstat(p.begin(), &buf) != 0) { 341 if (errno != ENOENT || !IgnoreNonExisting) 342 return std::error_code(errno, std::generic_category()); 343 return std::error_code(); 344 } 345 346 // Note: this check catches strange situations. In all cases, LLVM should 347 // only be involved in the creation and deletion of regular files. This 348 // check ensures that what we're trying to erase is a regular file. It 349 // effectively prevents LLVM from erasing things like /dev/null, any block 350 // special file, or other things that aren't "regular" files. 351 if (!S_ISREG(buf.st_mode) && !S_ISDIR(buf.st_mode) && !S_ISLNK(buf.st_mode)) 352 return make_error_code(errc::operation_not_permitted); 353 354 if (::remove(p.begin()) == -1) { 355 if (errno != ENOENT || !IgnoreNonExisting) 356 return std::error_code(errno, std::generic_category()); 357 } 358 359 return std::error_code(); 360} 361 362static bool is_local_impl(struct STATVFS &Vfs) { 363#if defined(__linux__) 364#ifndef NFS_SUPER_MAGIC 365#define NFS_SUPER_MAGIC 0x6969 366#endif 367#ifndef SMB_SUPER_MAGIC 368#define SMB_SUPER_MAGIC 0x517B 369#endif 370#ifndef CIFS_MAGIC_NUMBER 371#define CIFS_MAGIC_NUMBER 0xFF534D42 372#endif 373 switch ((uint32_t)Vfs.f_type) { 374 case NFS_SUPER_MAGIC: 375 case SMB_SUPER_MAGIC: 376 case CIFS_MAGIC_NUMBER: 377 return false; 378 default: 379 return true; 380 } 381#elif defined(__CYGWIN__) 382 // Cygwin doesn't expose this information; would need to use Win32 API. 383 return false; 384#elif defined(__sun) 385 // statvfs::f_basetype contains a null-terminated FSType name of the mounted target 386 StringRef fstype(Vfs.f_basetype); 387 // NFS is the only non-local fstype?? 388 return !fstype.equals("nfs"); 389#else 390 return !!(STATVFS_F_FLAG(Vfs) & MNT_LOCAL); 391#endif 392} 393 394std::error_code is_local(const Twine &Path, bool &Result) { 395 struct STATVFS Vfs; 396 if (::STATVFS(Path.str().c_str(), &Vfs)) 397 return std::error_code(errno, std::generic_category()); 398 399 Result = is_local_impl(Vfs); 400 return std::error_code(); 401} 402 403std::error_code is_local(int FD, bool &Result) { 404 struct STATVFS Vfs; 405 if (::FSTATVFS(FD, &Vfs)) 406 return std::error_code(errno, std::generic_category()); 407 408 Result = is_local_impl(Vfs); 409 return std::error_code(); 410} 411 412std::error_code rename(const Twine &from, const Twine &to) { 413 // Get arguments. 414 SmallString<128> from_storage; 415 SmallString<128> to_storage; 416 StringRef f = from.toNullTerminatedStringRef(from_storage); 417 StringRef t = to.toNullTerminatedStringRef(to_storage); 418 419 if (::rename(f.begin(), t.begin()) == -1) 420 return std::error_code(errno, std::generic_category()); 421 422 return std::error_code(); 423} 424 425std::error_code resize_file(int FD, uint64_t Size) { 426#if defined(HAVE_POSIX_FALLOCATE) 427 // If we have posix_fallocate use it. Unlike ftruncate it always allocates 428 // space, so we get an error if the disk is full. 429 if (int Err = ::posix_fallocate(FD, 0, Size)) { 430 if (Err != EOPNOTSUPP) 431 return std::error_code(Err, std::generic_category()); 432 } 433#endif 434 // Use ftruncate as a fallback. It may or may not allocate space. At least on 435 // OS X with HFS+ it does. 436 if (::ftruncate(FD, Size) == -1) 437 return std::error_code(errno, std::generic_category()); 438 439 return std::error_code(); 440} 441 442static int convertAccessMode(AccessMode Mode) { 443 switch (Mode) { 444 case AccessMode::Exist: 445 return F_OK; 446 case AccessMode::Write: 447 return W_OK; 448 case AccessMode::Execute: 449 return R_OK | X_OK; // scripts also need R_OK. 450 } 451 llvm_unreachable("invalid enum"); 452} 453 454std::error_code access(const Twine &Path, AccessMode Mode) { 455 SmallString<128> PathStorage; 456 StringRef P = Path.toNullTerminatedStringRef(PathStorage); 457 458 if (::access(P.begin(), convertAccessMode(Mode)) == -1) 459 return std::error_code(errno, std::generic_category()); 460 461 if (Mode == AccessMode::Execute) { 462 // Don't say that directories are executable. 463 struct stat buf; 464 if (0 != stat(P.begin(), &buf)) 465 return errc::permission_denied; 466 if (!S_ISREG(buf.st_mode)) 467 return errc::permission_denied; 468 } 469 470 return std::error_code(); 471} 472 473bool can_execute(const Twine &Path) { 474 return !access(Path, AccessMode::Execute); 475} 476 477bool equivalent(file_status A, file_status B) { 478 assert(status_known(A) && status_known(B)); 479 return A.fs_st_dev == B.fs_st_dev && 480 A.fs_st_ino == B.fs_st_ino; 481} 482 483std::error_code equivalent(const Twine &A, const Twine &B, bool &result) { 484 file_status fsA, fsB; 485 if (std::error_code ec = status(A, fsA)) 486 return ec; 487 if (std::error_code ec = status(B, fsB)) 488 return ec; 489 result = equivalent(fsA, fsB); 490 return std::error_code(); 491} 492 493static void expandTildeExpr(SmallVectorImpl<char> &Path) { 494 StringRef PathStr(Path.begin(), Path.size()); 495 if (PathStr.empty() || !PathStr.startswith("~")) 496 return; 497 498 PathStr = PathStr.drop_front(); 499 StringRef Expr = 500 PathStr.take_until([](char c) { return path::is_separator(c); }); 501 StringRef Remainder = PathStr.substr(Expr.size() + 1); 502 SmallString<128> Storage; 503 if (Expr.empty()) { 504 // This is just ~/..., resolve it to the current user's home dir. 505 if (!path::home_directory(Storage)) { 506 // For some reason we couldn't get the home directory. Just exit. 507 return; 508 } 509 510 // Overwrite the first character and insert the rest. 511 Path[0] = Storage[0]; 512 Path.insert(Path.begin() + 1, Storage.begin() + 1, Storage.end()); 513 return; 514 } 515 516 // This is a string of the form ~username/, look up this user's entry in the 517 // password database. 518 struct passwd *Entry = nullptr; 519 std::string User = Expr.str(); 520 Entry = ::getpwnam(User.c_str()); 521 522 if (!Entry) { 523 // Unable to look up the entry, just return back the original path. 524 return; 525 } 526 527 Storage = Remainder; 528 Path.clear(); 529 Path.append(Entry->pw_dir, Entry->pw_dir + strlen(Entry->pw_dir)); 530 llvm::sys::path::append(Path, Storage); 531} 532 533static std::error_code fillStatus(int StatRet, const struct stat &Status, 534 file_status &Result) { 535 if (StatRet != 0) { 536 std::error_code ec(errno, std::generic_category()); 537 if (ec == errc::no_such_file_or_directory) 538 Result = file_status(file_type::file_not_found); 539 else 540 Result = file_status(file_type::status_error); 541 return ec; 542 } 543 544 file_type Type = file_type::type_unknown; 545 546 if (S_ISDIR(Status.st_mode)) 547 Type = file_type::directory_file; 548 else if (S_ISREG(Status.st_mode)) 549 Type = file_type::regular_file; 550 else if (S_ISBLK(Status.st_mode)) 551 Type = file_type::block_file; 552 else if (S_ISCHR(Status.st_mode)) 553 Type = file_type::character_file; 554 else if (S_ISFIFO(Status.st_mode)) 555 Type = file_type::fifo_file; 556 else if (S_ISSOCK(Status.st_mode)) 557 Type = file_type::socket_file; 558 else if (S_ISLNK(Status.st_mode)) 559 Type = file_type::symlink_file; 560 561 perms Perms = static_cast<perms>(Status.st_mode) & all_perms; 562 Result = file_status(Type, Perms, Status.st_dev, Status.st_nlink, 563 Status.st_ino, Status.st_atime, Status.st_mtime, 564 Status.st_uid, Status.st_gid, Status.st_size); 565 566 return std::error_code(); 567} 568 569std::error_code status(const Twine &Path, file_status &Result, bool Follow) { 570 SmallString<128> PathStorage; 571 StringRef P = Path.toNullTerminatedStringRef(PathStorage); 572 573 struct stat Status; 574 int StatRet = (Follow ? ::stat : ::lstat)(P.begin(), &Status); 575 return fillStatus(StatRet, Status, Result); 576} 577 578std::error_code status(int FD, file_status &Result) { 579 struct stat Status; 580 int StatRet = ::fstat(FD, &Status); 581 return fillStatus(StatRet, Status, Result); 582} 583 584std::error_code setPermissions(const Twine &Path, perms Permissions) { 585 SmallString<128> PathStorage; 586 StringRef P = Path.toNullTerminatedStringRef(PathStorage); 587 588 if (::chmod(P.begin(), Permissions)) 589 return std::error_code(errno, std::generic_category()); 590 return std::error_code(); 591} 592 593std::error_code setLastModificationAndAccessTime(int FD, TimePoint<> Time) { 594#if defined(HAVE_FUTIMENS) 595 timespec Times[2]; 596 Times[0] = Times[1] = sys::toTimeSpec(Time); 597 if (::futimens(FD, Times)) 598 return std::error_code(errno, std::generic_category()); 599 return std::error_code(); 600#elif defined(HAVE_FUTIMES) 601 timeval Times[2]; 602 Times[0] = Times[1] = sys::toTimeVal( 603 std::chrono::time_point_cast<std::chrono::microseconds>(Time)); 604 if (::futimes(FD, Times)) 605 return std::error_code(errno, std::generic_category()); 606 return std::error_code(); 607#else 608#warning Missing futimes() and futimens() 609 return make_error_code(errc::function_not_supported); 610#endif 611} 612 613std::error_code mapped_file_region::init(int FD, uint64_t Offset, 614 mapmode Mode) { 615 assert(Size != 0); 616 617 int flags = (Mode == readwrite) ? MAP_SHARED : MAP_PRIVATE; 618 int prot = (Mode == readonly) ? PROT_READ : (PROT_READ | PROT_WRITE); 619#if defined(__APPLE__) 620 //---------------------------------------------------------------------- 621 // Newer versions of MacOSX have a flag that will allow us to read from 622 // binaries whose code signature is invalid without crashing by using 623 // the MAP_RESILIENT_CODESIGN flag. Also if a file from removable media 624 // is mapped we can avoid crashing and return zeroes to any pages we try 625 // to read if the media becomes unavailable by using the 626 // MAP_RESILIENT_MEDIA flag. These flags are only usable when mapping 627 // with PROT_READ, so take care not to specify them otherwise. 628 //---------------------------------------------------------------------- 629 if (Mode == readonly) { 630#if defined(MAP_RESILIENT_CODESIGN) 631 flags |= MAP_RESILIENT_CODESIGN; 632#endif 633#if defined(MAP_RESILIENT_MEDIA) 634 flags |= MAP_RESILIENT_MEDIA; 635#endif 636 } 637#endif // #if defined (__APPLE__) 638 639 Mapping = ::mmap(nullptr, Size, prot, flags, FD, Offset); 640 if (Mapping == MAP_FAILED) 641 return std::error_code(errno, std::generic_category()); 642 return std::error_code(); 643} 644 645mapped_file_region::mapped_file_region(int fd, mapmode mode, uint64_t length, 646 uint64_t offset, std::error_code &ec) 647 : Size(length), Mapping() { 648 // Make sure that the requested size fits within SIZE_T. 649 if (length > std::numeric_limits<size_t>::max()) { 650 ec = make_error_code(errc::invalid_argument); 651 return; 652 } 653 654 ec = init(fd, offset, mode); 655 if (ec) 656 Mapping = nullptr; 657} 658 659mapped_file_region::~mapped_file_region() { 660 if (Mapping) 661 ::munmap(Mapping, Size); 662} 663 664uint64_t mapped_file_region::size() const { 665 assert(Mapping && "Mapping failed but used anyway!"); 666 return Size; 667} 668 669char *mapped_file_region::data() const { 670 assert(Mapping && "Mapping failed but used anyway!"); 671 return reinterpret_cast<char*>(Mapping); 672} 673 674const char *mapped_file_region::const_data() const { 675 assert(Mapping && "Mapping failed but used anyway!"); 676 return reinterpret_cast<const char*>(Mapping); 677} 678 679int mapped_file_region::alignment() { 680 return Process::getPageSize(); 681} 682 683std::error_code detail::directory_iterator_construct(detail::DirIterState &it, 684 StringRef path, 685 bool follow_symlinks) { 686 SmallString<128> path_null(path); 687 DIR *directory = ::opendir(path_null.c_str()); 688 if (!directory) 689 return std::error_code(errno, std::generic_category()); 690 691 it.IterationHandle = reinterpret_cast<intptr_t>(directory); 692 // Add something for replace_filename to replace. 693 path::append(path_null, "."); 694 it.CurrentEntry = directory_entry(path_null.str(), follow_symlinks); 695 return directory_iterator_increment(it); 696} 697 698std::error_code detail::directory_iterator_destruct(detail::DirIterState &it) { 699 if (it.IterationHandle) 700 ::closedir(reinterpret_cast<DIR *>(it.IterationHandle)); 701 it.IterationHandle = 0; 702 it.CurrentEntry = directory_entry(); 703 return std::error_code(); 704} 705 706std::error_code detail::directory_iterator_increment(detail::DirIterState &it) { 707 errno = 0; 708 dirent *cur_dir = ::readdir(reinterpret_cast<DIR *>(it.IterationHandle)); 709 if (cur_dir == nullptr && errno != 0) { 710 return std::error_code(errno, std::generic_category()); 711 } else if (cur_dir != nullptr) { 712 StringRef name(cur_dir->d_name, NAMLEN(cur_dir)); 713 if ((name.size() == 1 && name[0] == '.') || 714 (name.size() == 2 && name[0] == '.' && name[1] == '.')) 715 return directory_iterator_increment(it); 716 it.CurrentEntry.replace_filename(name); 717 } else 718 return directory_iterator_destruct(it); 719 720 return std::error_code(); 721} 722 723#if !defined(F_GETPATH) 724static bool hasProcSelfFD() { 725 // If we have a /proc filesystem mounted, we can quickly establish the 726 // real name of the file with readlink 727 static const bool Result = (::access("/proc/self/fd", R_OK) == 0); 728 return Result; 729} 730#endif 731 732std::error_code openFileForRead(const Twine &Name, int &ResultFD, 733 SmallVectorImpl<char> *RealPath) { 734 SmallString<128> Storage; 735 StringRef P = Name.toNullTerminatedStringRef(Storage); 736 int OpenFlags = O_RDONLY; 737#ifdef O_CLOEXEC 738 OpenFlags |= O_CLOEXEC; 739#endif 740 while ((ResultFD = open(P.begin(), OpenFlags)) < 0) { 741 if (errno != EINTR) 742 return std::error_code(errno, std::generic_category()); 743 } 744#ifndef O_CLOEXEC 745 int r = fcntl(ResultFD, F_SETFD, FD_CLOEXEC); 746 (void)r; 747 assert(r == 0 && "fcntl(F_SETFD, FD_CLOEXEC) failed"); 748#endif 749 // Attempt to get the real name of the file, if the user asked 750 if(!RealPath) 751 return std::error_code(); 752 RealPath->clear(); 753#if defined(F_GETPATH) 754 // When F_GETPATH is availble, it is the quickest way to get 755 // the real path name. 756 char Buffer[MAXPATHLEN]; 757 if (::fcntl(ResultFD, F_GETPATH, Buffer) != -1) 758 RealPath->append(Buffer, Buffer + strlen(Buffer)); 759#else 760 char Buffer[PATH_MAX]; 761 if (hasProcSelfFD()) { 762 char ProcPath[64]; 763 snprintf(ProcPath, sizeof(ProcPath), "/proc/self/fd/%d", ResultFD); 764 ssize_t CharCount = ::readlink(ProcPath, Buffer, sizeof(Buffer)); 765 if (CharCount > 0) 766 RealPath->append(Buffer, Buffer + CharCount); 767 } else { 768 // Use ::realpath to get the real path name 769 if (::realpath(P.begin(), Buffer) != nullptr) 770 RealPath->append(Buffer, Buffer + strlen(Buffer)); 771 } 772#endif 773 return std::error_code(); 774} 775 776std::error_code openFileForWrite(const Twine &Name, int &ResultFD, 777 sys::fs::OpenFlags Flags, unsigned Mode) { 778 // Verify that we don't have both "append" and "excl". 779 assert((!(Flags & sys::fs::F_Excl) || !(Flags & sys::fs::F_Append)) && 780 "Cannot specify both 'excl' and 'append' file creation flags!"); 781 782 int OpenFlags = O_CREAT; 783 784#ifdef O_CLOEXEC 785 OpenFlags |= O_CLOEXEC; 786#endif 787 788 if (Flags & F_RW) 789 OpenFlags |= O_RDWR; 790 else 791 OpenFlags |= O_WRONLY; 792 793 if (Flags & F_Append) 794 OpenFlags |= O_APPEND; 795 else 796 OpenFlags |= O_TRUNC; 797 798 if (Flags & F_Excl) 799 OpenFlags |= O_EXCL; 800 801 SmallString<128> Storage; 802 StringRef P = Name.toNullTerminatedStringRef(Storage); 803 while ((ResultFD = open(P.begin(), OpenFlags, Mode)) < 0) { 804 if (errno != EINTR) 805 return std::error_code(errno, std::generic_category()); 806 } 807#ifndef O_CLOEXEC 808 int r = fcntl(ResultFD, F_SETFD, FD_CLOEXEC); 809 (void)r; 810 assert(r == 0 && "fcntl(F_SETFD, FD_CLOEXEC) failed"); 811#endif 812 return std::error_code(); 813} 814 815std::error_code getPathFromOpenFD(int FD, SmallVectorImpl<char> &ResultPath) { 816 if (FD < 0) 817 return make_error_code(errc::bad_file_descriptor); 818 819#if defined(F_GETPATH) 820 // When F_GETPATH is availble, it is the quickest way to get 821 // the path from a file descriptor. 822 ResultPath.reserve(MAXPATHLEN); 823 if (::fcntl(FD, F_GETPATH, ResultPath.begin()) == -1) 824 return std::error_code(errno, std::generic_category()); 825 826 ResultPath.set_size(strlen(ResultPath.begin())); 827#else 828 // If we have a /proc filesystem mounted, we can quickly establish the 829 // real name of the file with readlink. Otherwise, we don't know how to 830 // get the filename from a file descriptor. Give up. 831 if (!fs::hasProcSelfFD()) 832 return make_error_code(errc::function_not_supported); 833 834 ResultPath.reserve(PATH_MAX); 835 char ProcPath[64]; 836 snprintf(ProcPath, sizeof(ProcPath), "/proc/self/fd/%d", FD); 837 ssize_t CharCount = ::readlink(ProcPath, ResultPath.begin(), ResultPath.capacity()); 838 if (CharCount < 0) 839 return std::error_code(errno, std::generic_category()); 840 841 // Was the filename truncated? 842 if (static_cast<size_t>(CharCount) == ResultPath.capacity()) { 843 // Use lstat to get the size of the filename 844 struct stat sb; 845 if (::lstat(ProcPath, &sb) < 0) 846 return std::error_code(errno, std::generic_category()); 847 848 ResultPath.reserve(sb.st_size + 1); 849 CharCount = ::readlink(ProcPath, ResultPath.begin(), ResultPath.capacity()); 850 if (CharCount < 0) 851 return std::error_code(errno, std::generic_category()); 852 853 // Test for race condition: did the link size change? 854 if (CharCount > sb.st_size) 855 return std::error_code(ENAMETOOLONG, std::generic_category()); 856 } 857 ResultPath.set_size(static_cast<size_t>(CharCount)); 858#endif 859 return std::error_code(); 860} 861 862template <typename T> 863static std::error_code remove_directories_impl(const T &Entry, 864 bool IgnoreErrors) { 865 std::error_code EC; 866 directory_iterator Begin(Entry, EC, false); 867 directory_iterator End; 868 while (Begin != End) { 869 auto &Item = *Begin; 870 file_status st; 871 EC = Item.status(st); 872 if (EC && !IgnoreErrors) 873 return EC; 874 875 if (is_directory(st)) { 876 EC = remove_directories_impl(Item, IgnoreErrors); 877 if (EC && !IgnoreErrors) 878 return EC; 879 } 880 881 EC = fs::remove(Item.path(), true); 882 if (EC && !IgnoreErrors) 883 return EC; 884 885 Begin.increment(EC); 886 if (EC && !IgnoreErrors) 887 return EC; 888 } 889 return std::error_code(); 890} 891 892std::error_code remove_directories(const Twine &path, bool IgnoreErrors) { 893 auto EC = remove_directories_impl(path, IgnoreErrors); 894 if (EC && !IgnoreErrors) 895 return EC; 896 EC = fs::remove(path, true); 897 if (EC && !IgnoreErrors) 898 return EC; 899 return std::error_code(); 900} 901 902std::error_code real_path(const Twine &path, SmallVectorImpl<char> &dest, 903 bool expand_tilde) { 904 dest.clear(); 905 if (path.isTriviallyEmpty()) 906 return std::error_code(); 907 908 if (expand_tilde) { 909 SmallString<128> Storage; 910 path.toVector(Storage); 911 expandTildeExpr(Storage); 912 return real_path(Storage, dest, false); 913 } 914 915 int fd; 916 std::error_code EC = openFileForRead(path, fd, &dest); 917 918 if (EC) 919 return EC; 920 ::close(fd); 921 return std::error_code(); 922} 923 924} // end namespace fs 925 926namespace path { 927 928bool home_directory(SmallVectorImpl<char> &result) { 929 char *RequestedDir = getenv("HOME"); 930 if (!RequestedDir) { 931 struct passwd *pw = getpwuid(getuid()); 932 if (pw && pw->pw_dir) 933 RequestedDir = pw->pw_dir; 934 } 935 if (!RequestedDir) 936 return false; 937 938 result.clear(); 939 result.append(RequestedDir, RequestedDir + strlen(RequestedDir)); 940 return true; 941} 942 943static bool getDarwinConfDir(bool TempDir, SmallVectorImpl<char> &Result) { 944 #if defined(_CS_DARWIN_USER_TEMP_DIR) && defined(_CS_DARWIN_USER_CACHE_DIR) 945 // On Darwin, use DARWIN_USER_TEMP_DIR or DARWIN_USER_CACHE_DIR. 946 // macros defined in <unistd.h> on darwin >= 9 947 int ConfName = TempDir ? _CS_DARWIN_USER_TEMP_DIR 948 : _CS_DARWIN_USER_CACHE_DIR; 949 size_t ConfLen = confstr(ConfName, nullptr, 0); 950 if (ConfLen > 0) { 951 do { 952 Result.resize(ConfLen); 953 ConfLen = confstr(ConfName, Result.data(), Result.size()); 954 } while (ConfLen > 0 && ConfLen != Result.size()); 955 956 if (ConfLen > 0) { 957 assert(Result.back() == 0); 958 Result.pop_back(); 959 return true; 960 } 961 962 Result.clear(); 963 } 964 #endif 965 return false; 966} 967 968static bool getUserCacheDir(SmallVectorImpl<char> &Result) { 969 // First try using XDG_CACHE_HOME env variable, 970 // as specified in XDG Base Directory Specification at 971 // http://standards.freedesktop.org/basedir-spec/basedir-spec-latest.html 972 if (const char *XdgCacheDir = std::getenv("XDG_CACHE_HOME")) { 973 Result.clear(); 974 Result.append(XdgCacheDir, XdgCacheDir + strlen(XdgCacheDir)); 975 return true; 976 } 977 978 // Try Darwin configuration query 979 if (getDarwinConfDir(false, Result)) 980 return true; 981 982 // Use "$HOME/.cache" if $HOME is available 983 if (home_directory(Result)) { 984 append(Result, ".cache"); 985 return true; 986 } 987 988 return false; 989} 990 991static const char *getEnvTempDir() { 992 // Check whether the temporary directory is specified by an environment 993 // variable. 994 const char *EnvironmentVariables[] = {"TMPDIR", "TMP", "TEMP", "TEMPDIR"}; 995 for (const char *Env : EnvironmentVariables) { 996 if (const char *Dir = std::getenv(Env)) 997 return Dir; 998 } 999 1000 return nullptr; 1001} 1002 1003static const char *getDefaultTempDir(bool ErasedOnReboot) { 1004#ifdef P_tmpdir 1005 if ((bool)P_tmpdir) 1006 return P_tmpdir; 1007#endif 1008 1009 if (ErasedOnReboot) 1010 return "/tmp"; 1011 return "/var/tmp"; 1012} 1013 1014void system_temp_directory(bool ErasedOnReboot, SmallVectorImpl<char> &Result) { 1015 Result.clear(); 1016 1017 if (ErasedOnReboot) { 1018 // There is no env variable for the cache directory. 1019 if (const char *RequestedDir = getEnvTempDir()) { 1020 Result.append(RequestedDir, RequestedDir + strlen(RequestedDir)); 1021 return; 1022 } 1023 } 1024 1025 if (getDarwinConfDir(ErasedOnReboot, Result)) 1026 return; 1027 1028 const char *RequestedDir = getDefaultTempDir(ErasedOnReboot); 1029 Result.append(RequestedDir, RequestedDir + strlen(RequestedDir)); 1030} 1031 1032} // end namespace path 1033 1034} // end namespace sys 1035} // end namespace llvm 1036