1//===- llvm/Support/Unix/Path.inc - Unix Path Implementation ----*- C++ -*-===// 2// 3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4// See https://llvm.org/LICENSE.txt for license information. 5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6// 7//===----------------------------------------------------------------------===// 8// 9// This file implements the Unix specific implementation of the Path API. 10// 11//===----------------------------------------------------------------------===// 12 13//===----------------------------------------------------------------------===// 14//=== WARNING: Implementation here must contain only generic UNIX code that 15//=== is guaranteed to work on *all* UNIX variants. 16//===----------------------------------------------------------------------===// 17 18#include "Unix.h" 19#include <limits.h> 20#include <stdio.h> 21#if HAVE_SYS_STAT_H 22#include <sys/stat.h> 23#endif 24#if HAVE_FCNTL_H 25#include <fcntl.h> 26#endif 27#ifdef HAVE_UNISTD_H 28#include <unistd.h> 29#endif 30#ifdef HAVE_SYS_MMAN_H 31#include <sys/mman.h> 32#endif 33 34#include <dirent.h> 35#include <pwd.h> 36 37#ifdef __APPLE__ 38#include <mach-o/dyld.h> 39#include <sys/attr.h> 40#include <copyfile.h> 41#elif defined(__DragonFly__) 42#include <sys/mount.h> 43#endif 44 45// Both stdio.h and cstdio are included via different paths and 46// stdcxx's cstdio doesn't include stdio.h, so it doesn't #undef the macros 47// either. 48#undef ferror 49#undef feof 50 51// For GNU Hurd 52#if defined(__GNU__) && !defined(PATH_MAX) 53# define PATH_MAX 4096 54# define MAXPATHLEN 4096 55#endif 56 57#include <sys/types.h> 58#if !defined(__APPLE__) && !defined(__OpenBSD__) && !defined(__FreeBSD__) && \ 59 !defined(__linux__) && !defined(__FreeBSD_kernel__) && !defined(_AIX) 60#include <sys/statvfs.h> 61#define STATVFS statvfs 62#define FSTATVFS fstatvfs 63#define STATVFS_F_FRSIZE(vfs) vfs.f_frsize 64#else 65#if defined(__OpenBSD__) || defined(__FreeBSD__) 66#include <sys/mount.h> 67#include <sys/param.h> 68#elif defined(__linux__) 69#if defined(HAVE_LINUX_MAGIC_H) 70#include <linux/magic.h> 71#else 72#if defined(HAVE_LINUX_NFS_FS_H) 73#include <linux/nfs_fs.h> 74#endif 75#if defined(HAVE_LINUX_SMB_H) 76#include <linux/smb.h> 77#endif 78#endif 79#include <sys/vfs.h> 80#elif defined(_AIX) 81#include <sys/statfs.h> 82 83// <sys/vmount.h> depends on `uint` to be a typedef from <sys/types.h> to 84// `uint_t`; however, <sys/types.h> does not always declare `uint`. We provide 85// the typedef prior to including <sys/vmount.h> to work around this issue. 86typedef uint_t uint; 87#include <sys/vmount.h> 88#else 89#include <sys/mount.h> 90#endif 91#define STATVFS statfs 92#define FSTATVFS fstatfs 93#define STATVFS_F_FRSIZE(vfs) static_cast<uint64_t>(vfs.f_bsize) 94#endif 95 96#if defined(__NetBSD__) || defined(__DragonFly__) || defined(__GNU__) 97#define STATVFS_F_FLAG(vfs) (vfs).f_flag 98#else 99#define STATVFS_F_FLAG(vfs) (vfs).f_flags 100#endif 101 102using namespace llvm; 103 104namespace llvm { 105namespace sys { 106namespace fs { 107 108const file_t kInvalidFile = -1; 109 110#if defined(__FreeBSD__) || defined(__NetBSD__) || defined(__OpenBSD__) || \ 111 defined(__minix) || defined(__FreeBSD_kernel__) || defined(__linux__) || \ 112 defined(__CYGWIN__) || defined(__DragonFly__) || defined(_AIX) || defined(__GNU__) 113static int 114test_dir(char ret[PATH_MAX], const char *dir, const char *bin) 115{ 116 struct stat sb; 117 char fullpath[PATH_MAX]; 118 119 int chars = snprintf(fullpath, PATH_MAX, "%s/%s", dir, bin); 120 // We cannot write PATH_MAX characters because the string will be terminated 121 // with a null character. Fail if truncation happened. 122 if (chars >= PATH_MAX) 123 return 1; 124 if (!realpath(fullpath, ret)) 125 return 1; 126 if (stat(fullpath, &sb) != 0) 127 return 1; 128 129 return 0; 130} 131 132static char * 133getprogpath(char ret[PATH_MAX], const char *bin) 134{ 135 /* First approach: absolute path. */ 136 if (bin[0] == '/') { 137 if (test_dir(ret, "/", bin) == 0) 138 return ret; 139 return nullptr; 140 } 141 142 /* Second approach: relative path. */ 143 if (strchr(bin, '/')) { 144 char cwd[PATH_MAX]; 145 if (!getcwd(cwd, PATH_MAX)) 146 return nullptr; 147 if (test_dir(ret, cwd, bin) == 0) 148 return ret; 149 return nullptr; 150 } 151 152 /* Third approach: $PATH */ 153 char *pv; 154 if ((pv = getenv("PATH")) == nullptr) 155 return nullptr; 156 char *s = strdup(pv); 157 if (!s) 158 return nullptr; 159 char *state; 160 for (char *t = strtok_r(s, ":", &state); t != nullptr; 161 t = strtok_r(nullptr, ":", &state)) { 162 if (test_dir(ret, t, bin) == 0) { 163 free(s); 164 return ret; 165 } 166 } 167 free(s); 168 return nullptr; 169} 170#endif // __FreeBSD__ || __NetBSD__ || __FreeBSD_kernel__ 171 172/// GetMainExecutable - Return the path to the main executable, given the 173/// value of argv[0] from program startup. 174std::string getMainExecutable(const char *argv0, void *MainAddr) { 175#if defined(__APPLE__) 176 // On OS X the executable path is saved to the stack by dyld. Reading it 177 // from there is much faster than calling dladdr, especially for large 178 // binaries with symbols. 179 char exe_path[MAXPATHLEN]; 180 uint32_t size = sizeof(exe_path); 181 if (_NSGetExecutablePath(exe_path, &size) == 0) { 182 char link_path[MAXPATHLEN]; 183 if (realpath(exe_path, link_path)) 184 return link_path; 185 } 186#elif defined(__FreeBSD__) || defined(__NetBSD__) || defined(__OpenBSD__) || \ 187 defined(__minix) || defined(__DragonFly__) || \ 188 defined(__FreeBSD_kernel__) || defined(_AIX) 189 StringRef curproc("/proc/curproc/file"); 190 char exe_path[PATH_MAX]; 191 // /proc is not mounted by default under FreeBSD, but gives more accurate 192 // information than argv[0] when it is. 193 if (sys::fs::exists(curproc)) { 194 ssize_t len = readlink(curproc.str().c_str(), exe_path, sizeof(exe_path)); 195 if (len > 0) { 196 // Null terminate the string for realpath. readlink never null 197 // terminates its output. 198 len = std::min(len, ssize_t(sizeof(exe_path) - 1)); 199 exe_path[len] = '\0'; 200 return exe_path; 201 } 202 } 203 // If we don't have procfs mounted, fall back to argv[0] 204 if (getprogpath(exe_path, argv0) != NULL) 205 return exe_path; 206#elif defined(__linux__) || defined(__CYGWIN__) 207 char exe_path[MAXPATHLEN]; 208 StringRef aPath("/proc/self/exe"); 209 if (sys::fs::exists(aPath)) { 210 // /proc is not always mounted under Linux (chroot for example). 211 ssize_t len = readlink(aPath.str().c_str(), exe_path, sizeof(exe_path)); 212 if (len < 0) 213 return ""; 214 215 // Null terminate the string for realpath. readlink never null 216 // terminates its output. 217 len = std::min(len, ssize_t(sizeof(exe_path) - 1)); 218 exe_path[len] = '\0'; 219 220 // On Linux, /proc/self/exe always looks through symlinks. However, on 221 // GNU/Hurd, /proc/self/exe is a symlink to the path that was used to start 222 // the program, and not the eventual binary file. Therefore, call realpath 223 // so this behaves the same on all platforms. 224#if _POSIX_VERSION >= 200112 || defined(__GLIBC__) 225 if (char *real_path = realpath(exe_path, NULL)) { 226 std::string ret = std::string(real_path); 227 free(real_path); 228 return ret; 229 } 230#else 231 char real_path[MAXPATHLEN]; 232 if (realpath(exe_path, real_path)) 233 return std::string(real_path); 234#endif 235 } 236 // Fall back to the classical detection. 237 if (getprogpath(exe_path, argv0)) 238 return exe_path; 239#elif defined(HAVE_DLFCN_H) && defined(HAVE_DLADDR) 240 // Use dladdr to get executable path if available. 241 Dl_info DLInfo; 242 int err = dladdr(MainAddr, &DLInfo); 243 if (err == 0) 244 return ""; 245 246 // If the filename is a symlink, we need to resolve and return the location of 247 // the actual executable. 248 char link_path[MAXPATHLEN]; 249 if (realpath(DLInfo.dli_fname, link_path)) 250 return link_path; 251#else 252#error GetMainExecutable is not implemented on this host yet. 253#endif 254 return ""; 255} 256 257TimePoint<> basic_file_status::getLastAccessedTime() const { 258 return toTimePoint(fs_st_atime, fs_st_atime_nsec); 259} 260 261TimePoint<> basic_file_status::getLastModificationTime() const { 262 return toTimePoint(fs_st_mtime, fs_st_mtime_nsec); 263} 264 265UniqueID file_status::getUniqueID() const { 266 return UniqueID(fs_st_dev, fs_st_ino); 267} 268 269uint32_t file_status::getLinkCount() const { 270 return fs_st_nlinks; 271} 272 273ErrorOr<space_info> disk_space(const Twine &Path) { 274 struct STATVFS Vfs; 275 if (::STATVFS(const_cast<char *>(Path.str().c_str()), &Vfs)) 276 return std::error_code(errno, std::generic_category()); 277 auto FrSize = STATVFS_F_FRSIZE(Vfs); 278 space_info SpaceInfo; 279 SpaceInfo.capacity = static_cast<uint64_t>(Vfs.f_blocks) * FrSize; 280 SpaceInfo.free = static_cast<uint64_t>(Vfs.f_bfree) * FrSize; 281 SpaceInfo.available = static_cast<uint64_t>(Vfs.f_bavail) * FrSize; 282 return SpaceInfo; 283} 284 285std::error_code current_path(SmallVectorImpl<char> &result) { 286 result.clear(); 287 288 const char *pwd = ::getenv("PWD"); 289 llvm::sys::fs::file_status PWDStatus, DotStatus; 290 if (pwd && llvm::sys::path::is_absolute(pwd) && 291 !llvm::sys::fs::status(pwd, PWDStatus) && 292 !llvm::sys::fs::status(".", DotStatus) && 293 PWDStatus.getUniqueID() == DotStatus.getUniqueID()) { 294 result.append(pwd, pwd + strlen(pwd)); 295 return std::error_code(); 296 } 297 298#ifdef MAXPATHLEN 299 result.reserve(MAXPATHLEN); 300#else 301// For GNU Hurd 302 result.reserve(1024); 303#endif 304 305 while (true) { 306 if (::getcwd(result.data(), result.capacity()) == nullptr) { 307 // See if there was a real error. 308 if (errno != ENOMEM) 309 return std::error_code(errno, std::generic_category()); 310 // Otherwise there just wasn't enough space. 311 result.reserve(result.capacity() * 2); 312 } else 313 break; 314 } 315 316 result.set_size(strlen(result.data())); 317 return std::error_code(); 318} 319 320std::error_code set_current_path(const Twine &path) { 321 SmallString<128> path_storage; 322 StringRef p = path.toNullTerminatedStringRef(path_storage); 323 324 if (::chdir(p.begin()) == -1) 325 return std::error_code(errno, std::generic_category()); 326 327 return std::error_code(); 328} 329 330std::error_code create_directory(const Twine &path, bool IgnoreExisting, 331 perms Perms) { 332 SmallString<128> path_storage; 333 StringRef p = path.toNullTerminatedStringRef(path_storage); 334 335 if (::mkdir(p.begin(), Perms) == -1) { 336 if (errno != EEXIST || !IgnoreExisting) 337 return std::error_code(errno, std::generic_category()); 338 } 339 340 return std::error_code(); 341} 342 343// Note that we are using symbolic link because hard links are not supported by 344// all filesystems (SMB doesn't). 345std::error_code create_link(const Twine &to, const Twine &from) { 346 // Get arguments. 347 SmallString<128> from_storage; 348 SmallString<128> to_storage; 349 StringRef f = from.toNullTerminatedStringRef(from_storage); 350 StringRef t = to.toNullTerminatedStringRef(to_storage); 351 352 if (::symlink(t.begin(), f.begin()) == -1) 353 return std::error_code(errno, std::generic_category()); 354 355 return std::error_code(); 356} 357 358std::error_code create_hard_link(const Twine &to, const Twine &from) { 359 // Get arguments. 360 SmallString<128> from_storage; 361 SmallString<128> to_storage; 362 StringRef f = from.toNullTerminatedStringRef(from_storage); 363 StringRef t = to.toNullTerminatedStringRef(to_storage); 364 365 if (::link(t.begin(), f.begin()) == -1) 366 return std::error_code(errno, std::generic_category()); 367 368 return std::error_code(); 369} 370 371std::error_code remove(const Twine &path, bool IgnoreNonExisting) { 372 SmallString<128> path_storage; 373 StringRef p = path.toNullTerminatedStringRef(path_storage); 374 375 struct stat buf; 376 if (lstat(p.begin(), &buf) != 0) { 377 if (errno != ENOENT || !IgnoreNonExisting) 378 return std::error_code(errno, std::generic_category()); 379 return std::error_code(); 380 } 381 382 // Note: this check catches strange situations. In all cases, LLVM should 383 // only be involved in the creation and deletion of regular files. This 384 // check ensures that what we're trying to erase is a regular file. It 385 // effectively prevents LLVM from erasing things like /dev/null, any block 386 // special file, or other things that aren't "regular" files. 387 if (!S_ISREG(buf.st_mode) && !S_ISDIR(buf.st_mode) && !S_ISLNK(buf.st_mode)) 388 return make_error_code(errc::operation_not_permitted); 389 390 if (::remove(p.begin()) == -1) { 391 if (errno != ENOENT || !IgnoreNonExisting) 392 return std::error_code(errno, std::generic_category()); 393 } 394 395 return std::error_code(); 396} 397 398static bool is_local_impl(struct STATVFS &Vfs) { 399#if defined(__linux__) || defined(__GNU__) 400#ifndef NFS_SUPER_MAGIC 401#define NFS_SUPER_MAGIC 0x6969 402#endif 403#ifndef SMB_SUPER_MAGIC 404#define SMB_SUPER_MAGIC 0x517B 405#endif 406#ifndef CIFS_MAGIC_NUMBER 407#define CIFS_MAGIC_NUMBER 0xFF534D42 408#endif 409#ifdef __GNU__ 410 switch ((uint32_t)Vfs.__f_type) { 411#else 412 switch ((uint32_t)Vfs.f_type) { 413#endif 414 case NFS_SUPER_MAGIC: 415 case SMB_SUPER_MAGIC: 416 case CIFS_MAGIC_NUMBER: 417 return false; 418 default: 419 return true; 420 } 421#elif defined(__CYGWIN__) 422 // Cygwin doesn't expose this information; would need to use Win32 API. 423 return false; 424#elif defined(__Fuchsia__) 425 // Fuchsia doesn't yet support remote filesystem mounts. 426 return true; 427#elif defined(__EMSCRIPTEN__) 428 // Emscripten doesn't currently support remote filesystem mounts. 429 return true; 430#elif defined(__HAIKU__) 431 // Haiku doesn't expose this information. 432 return false; 433#elif defined(__sun) 434 // statvfs::f_basetype contains a null-terminated FSType name of the mounted target 435 StringRef fstype(Vfs.f_basetype); 436 // NFS is the only non-local fstype?? 437 return !fstype.equals("nfs"); 438#elif defined(_AIX) 439 // Call mntctl; try more than twice in case of timing issues with a concurrent 440 // mount. 441 int Ret; 442 size_t BufSize = 2048u; 443 std::unique_ptr<char[]> Buf; 444 int Tries = 3; 445 while (Tries--) { 446 Buf = llvm::make_unique<char[]>(BufSize); 447 Ret = mntctl(MCTL_QUERY, BufSize, Buf.get()); 448 if (Ret != 0) 449 break; 450 BufSize = *reinterpret_cast<unsigned int *>(Buf.get()); 451 Buf.reset(); 452 } 453 454 if (Ret == -1) 455 // There was an error; "remote" is the conservative answer. 456 return false; 457 458 // Look for the correct vmount entry. 459 char *CurObjPtr = Buf.get(); 460 while (Ret--) { 461 struct vmount *Vp = reinterpret_cast<struct vmount *>(CurObjPtr); 462 static_assert(sizeof(Vfs.f_fsid) == sizeof(Vp->vmt_fsid), 463 "fsid length mismatch"); 464 if (memcmp(&Vfs.f_fsid, &Vp->vmt_fsid, sizeof Vfs.f_fsid) == 0) 465 return (Vp->vmt_flags & MNT_REMOTE) == 0; 466 467 CurObjPtr += Vp->vmt_length; 468 } 469 470 // vmount entry not found; "remote" is the conservative answer. 471 return false; 472#else 473 return !!(STATVFS_F_FLAG(Vfs) & MNT_LOCAL); 474#endif 475} 476 477std::error_code is_local(const Twine &Path, bool &Result) { 478 struct STATVFS Vfs; 479 if (::STATVFS(const_cast<char *>(Path.str().c_str()), &Vfs)) 480 return std::error_code(errno, std::generic_category()); 481 482 Result = is_local_impl(Vfs); 483 return std::error_code(); 484} 485 486std::error_code is_local(int FD, bool &Result) { 487 struct STATVFS Vfs; 488 if (::FSTATVFS(FD, &Vfs)) 489 return std::error_code(errno, std::generic_category()); 490 491 Result = is_local_impl(Vfs); 492 return std::error_code(); 493} 494 495std::error_code rename(const Twine &from, const Twine &to) { 496 // Get arguments. 497 SmallString<128> from_storage; 498 SmallString<128> to_storage; 499 StringRef f = from.toNullTerminatedStringRef(from_storage); 500 StringRef t = to.toNullTerminatedStringRef(to_storage); 501 502 if (::rename(f.begin(), t.begin()) == -1) 503 return std::error_code(errno, std::generic_category()); 504 505 return std::error_code(); 506} 507 508std::error_code resize_file(int FD, uint64_t Size) { 509#if defined(HAVE_POSIX_FALLOCATE) 510 // If we have posix_fallocate use it. Unlike ftruncate it always allocates 511 // space, so we get an error if the disk is full. 512 if (int Err = ::posix_fallocate(FD, 0, Size)) { 513#ifdef _AIX 514 constexpr int NotSupportedError = ENOTSUP; 515#else 516 constexpr int NotSupportedError = EOPNOTSUPP; 517#endif 518 if (Err != EINVAL && Err != NotSupportedError) 519 return std::error_code(Err, std::generic_category()); 520 } 521#endif 522 // Use ftruncate as a fallback. It may or may not allocate space. At least on 523 // OS X with HFS+ it does. 524 if (::ftruncate(FD, Size) == -1) 525 return std::error_code(errno, std::generic_category()); 526 527 return std::error_code(); 528} 529 530static int convertAccessMode(AccessMode Mode) { 531 switch (Mode) { 532 case AccessMode::Exist: 533 return F_OK; 534 case AccessMode::Write: 535 return W_OK; 536 case AccessMode::Execute: 537 return R_OK | X_OK; // scripts also need R_OK. 538 } 539 llvm_unreachable("invalid enum"); 540} 541 542std::error_code access(const Twine &Path, AccessMode Mode) { 543 SmallString<128> PathStorage; 544 StringRef P = Path.toNullTerminatedStringRef(PathStorage); 545 546 if (::access(P.begin(), convertAccessMode(Mode)) == -1) 547 return std::error_code(errno, std::generic_category()); 548 549 if (Mode == AccessMode::Execute) { 550 // Don't say that directories are executable. 551 struct stat buf; 552 if (0 != stat(P.begin(), &buf)) 553 return errc::permission_denied; 554 if (!S_ISREG(buf.st_mode)) 555 return errc::permission_denied; 556 } 557 558 return std::error_code(); 559} 560 561bool can_execute(const Twine &Path) { 562 return !access(Path, AccessMode::Execute); 563} 564 565bool equivalent(file_status A, file_status B) { 566 assert(status_known(A) && status_known(B)); 567 return A.fs_st_dev == B.fs_st_dev && 568 A.fs_st_ino == B.fs_st_ino; 569} 570 571std::error_code equivalent(const Twine &A, const Twine &B, bool &result) { 572 file_status fsA, fsB; 573 if (std::error_code ec = status(A, fsA)) 574 return ec; 575 if (std::error_code ec = status(B, fsB)) 576 return ec; 577 result = equivalent(fsA, fsB); 578 return std::error_code(); 579} 580 581static void expandTildeExpr(SmallVectorImpl<char> &Path) { 582 StringRef PathStr(Path.begin(), Path.size()); 583 if (PathStr.empty() || !PathStr.startswith("~")) 584 return; 585 586 PathStr = PathStr.drop_front(); 587 StringRef Expr = 588 PathStr.take_until([](char c) { return path::is_separator(c); }); 589 StringRef Remainder = PathStr.substr(Expr.size() + 1); 590 SmallString<128> Storage; 591 if (Expr.empty()) { 592 // This is just ~/..., resolve it to the current user's home dir. 593 if (!path::home_directory(Storage)) { 594 // For some reason we couldn't get the home directory. Just exit. 595 return; 596 } 597 598 // Overwrite the first character and insert the rest. 599 Path[0] = Storage[0]; 600 Path.insert(Path.begin() + 1, Storage.begin() + 1, Storage.end()); 601 return; 602 } 603 604 // This is a string of the form ~username/, look up this user's entry in the 605 // password database. 606 struct passwd *Entry = nullptr; 607 std::string User = Expr.str(); 608 Entry = ::getpwnam(User.c_str()); 609 610 if (!Entry) { 611 // Unable to look up the entry, just return back the original path. 612 return; 613 } 614 615 Storage = Remainder; 616 Path.clear(); 617 Path.append(Entry->pw_dir, Entry->pw_dir + strlen(Entry->pw_dir)); 618 llvm::sys::path::append(Path, Storage); 619} 620 621 622void expand_tilde(const Twine &path, SmallVectorImpl<char> &dest) { 623 dest.clear(); 624 if (path.isTriviallyEmpty()) 625 return; 626 627 path.toVector(dest); 628 expandTildeExpr(dest); 629 630 return; 631} 632 633static file_type typeForMode(mode_t Mode) { 634 if (S_ISDIR(Mode)) 635 return file_type::directory_file; 636 else if (S_ISREG(Mode)) 637 return file_type::regular_file; 638 else if (S_ISBLK(Mode)) 639 return file_type::block_file; 640 else if (S_ISCHR(Mode)) 641 return file_type::character_file; 642 else if (S_ISFIFO(Mode)) 643 return file_type::fifo_file; 644 else if (S_ISSOCK(Mode)) 645 return file_type::socket_file; 646 else if (S_ISLNK(Mode)) 647 return file_type::symlink_file; 648 return file_type::type_unknown; 649} 650 651static std::error_code fillStatus(int StatRet, const struct stat &Status, 652 file_status &Result) { 653 if (StatRet != 0) { 654 std::error_code EC(errno, std::generic_category()); 655 if (EC == errc::no_such_file_or_directory) 656 Result = file_status(file_type::file_not_found); 657 else 658 Result = file_status(file_type::status_error); 659 return EC; 660 } 661 662 uint32_t atime_nsec, mtime_nsec; 663#if defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC) 664 atime_nsec = Status.st_atimespec.tv_nsec; 665 mtime_nsec = Status.st_mtimespec.tv_nsec; 666#elif defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC) 667 atime_nsec = Status.st_atim.tv_nsec; 668 mtime_nsec = Status.st_mtim.tv_nsec; 669#else 670 atime_nsec = mtime_nsec = 0; 671#endif 672 673 perms Perms = static_cast<perms>(Status.st_mode) & all_perms; 674 Result = file_status(typeForMode(Status.st_mode), Perms, Status.st_dev, 675 Status.st_nlink, Status.st_ino, 676 Status.st_atime, atime_nsec, Status.st_mtime, mtime_nsec, 677 Status.st_uid, Status.st_gid, Status.st_size); 678 679 return std::error_code(); 680} 681 682std::error_code status(const Twine &Path, file_status &Result, bool Follow) { 683 SmallString<128> PathStorage; 684 StringRef P = Path.toNullTerminatedStringRef(PathStorage); 685 686 struct stat Status; 687 int StatRet = (Follow ? ::stat : ::lstat)(P.begin(), &Status); 688 return fillStatus(StatRet, Status, Result); 689} 690 691std::error_code status(int FD, file_status &Result) { 692 struct stat Status; 693 int StatRet = ::fstat(FD, &Status); 694 return fillStatus(StatRet, Status, Result); 695} 696 697unsigned getUmask() { 698 // Chose arbitary new mask and reset the umask to the old mask. 699 // umask(2) never fails so ignore the return of the second call. 700 unsigned Mask = ::umask(0); 701 (void) ::umask(Mask); 702 return Mask; 703} 704 705std::error_code setPermissions(const Twine &Path, perms Permissions, 706 bool RespectUmask) { 707 SmallString<128> PathStorage; 708 StringRef P = Path.toNullTerminatedStringRef(PathStorage); 709 710 if (RespectUmask) 711 Permissions = static_cast<perms>(Permissions & ~getUmask()); 712 713 if (::chmod(P.begin(), Permissions)) 714 return std::error_code(errno, std::generic_category()); 715 return std::error_code(); 716} 717 718std::error_code setLastAccessAndModificationTime(int FD, TimePoint<> AccessTime, 719 TimePoint<> ModificationTime) { 720#if defined(HAVE_FUTIMENS) 721 timespec Times[2]; 722 Times[0] = sys::toTimeSpec(AccessTime); 723 Times[1] = sys::toTimeSpec(ModificationTime); 724 if (::futimens(FD, Times)) 725 return std::error_code(errno, std::generic_category()); 726 return std::error_code(); 727#elif defined(HAVE_FUTIMES) 728 timeval Times[2]; 729 Times[0] = sys::toTimeVal( 730 std::chrono::time_point_cast<std::chrono::microseconds>(AccessTime)); 731 Times[1] = 732 sys::toTimeVal(std::chrono::time_point_cast<std::chrono::microseconds>( 733 ModificationTime)); 734 if (::futimes(FD, Times)) 735 return std::error_code(errno, std::generic_category()); 736 return std::error_code(); 737#else 738#warning Missing futimes() and futimens() 739 return make_error_code(errc::function_not_supported); 740#endif 741} 742 743std::error_code mapped_file_region::init(int FD, uint64_t Offset, 744 mapmode Mode) { 745 assert(Size != 0); 746 747 int flags = (Mode == readwrite) ? MAP_SHARED : MAP_PRIVATE; 748 int prot = (Mode == readonly) ? PROT_READ : (PROT_READ | PROT_WRITE); 749#if defined(__APPLE__) 750 //---------------------------------------------------------------------- 751 // Newer versions of MacOSX have a flag that will allow us to read from 752 // binaries whose code signature is invalid without crashing by using 753 // the MAP_RESILIENT_CODESIGN flag. Also if a file from removable media 754 // is mapped we can avoid crashing and return zeroes to any pages we try 755 // to read if the media becomes unavailable by using the 756 // MAP_RESILIENT_MEDIA flag. These flags are only usable when mapping 757 // with PROT_READ, so take care not to specify them otherwise. 758 //---------------------------------------------------------------------- 759 if (Mode == readonly) { 760#if defined(MAP_RESILIENT_CODESIGN) 761 flags |= MAP_RESILIENT_CODESIGN; 762#endif 763#if defined(MAP_RESILIENT_MEDIA) 764 flags |= MAP_RESILIENT_MEDIA; 765#endif 766 } 767#endif // #if defined (__APPLE__) 768 769 Mapping = ::mmap(nullptr, Size, prot, flags, FD, Offset); 770 if (Mapping == MAP_FAILED) 771 return std::error_code(errno, std::generic_category()); 772 return std::error_code(); 773} 774 775mapped_file_region::mapped_file_region(int fd, mapmode mode, size_t length, 776 uint64_t offset, std::error_code &ec) 777 : Size(length), Mapping(), Mode(mode) { 778 (void)Mode; 779 ec = init(fd, offset, mode); 780 if (ec) 781 Mapping = nullptr; 782} 783 784mapped_file_region::~mapped_file_region() { 785 if (Mapping) 786 ::munmap(Mapping, Size); 787} 788 789size_t mapped_file_region::size() const { 790 assert(Mapping && "Mapping failed but used anyway!"); 791 return Size; 792} 793 794char *mapped_file_region::data() const { 795 assert(Mapping && "Mapping failed but used anyway!"); 796 return reinterpret_cast<char*>(Mapping); 797} 798 799const char *mapped_file_region::const_data() const { 800 assert(Mapping && "Mapping failed but used anyway!"); 801 return reinterpret_cast<const char*>(Mapping); 802} 803 804int mapped_file_region::alignment() { 805 return Process::getPageSizeEstimate(); 806} 807 808std::error_code detail::directory_iterator_construct(detail::DirIterState &it, 809 StringRef path, 810 bool follow_symlinks) { 811 SmallString<128> path_null(path); 812 DIR *directory = ::opendir(path_null.c_str()); 813 if (!directory) 814 return std::error_code(errno, std::generic_category()); 815 816 it.IterationHandle = reinterpret_cast<intptr_t>(directory); 817 // Add something for replace_filename to replace. 818 path::append(path_null, "."); 819 it.CurrentEntry = directory_entry(path_null.str(), follow_symlinks); 820 return directory_iterator_increment(it); 821} 822 823std::error_code detail::directory_iterator_destruct(detail::DirIterState &it) { 824 if (it.IterationHandle) 825 ::closedir(reinterpret_cast<DIR *>(it.IterationHandle)); 826 it.IterationHandle = 0; 827 it.CurrentEntry = directory_entry(); 828 return std::error_code(); 829} 830 831static file_type direntType(dirent* Entry) { 832 // Most platforms provide the file type in the dirent: Linux/BSD/Mac. 833 // The DTTOIF macro lets us reuse our status -> type conversion. 834#if defined(_DIRENT_HAVE_D_TYPE) && defined(DTTOIF) 835 return typeForMode(DTTOIF(Entry->d_type)); 836#else 837 // Other platforms such as Solaris require a stat() to get the type. 838 return file_type::type_unknown; 839#endif 840} 841 842std::error_code detail::directory_iterator_increment(detail::DirIterState &It) { 843 errno = 0; 844 dirent *CurDir = ::readdir(reinterpret_cast<DIR *>(It.IterationHandle)); 845 if (CurDir == nullptr && errno != 0) { 846 return std::error_code(errno, std::generic_category()); 847 } else if (CurDir != nullptr) { 848 StringRef Name(CurDir->d_name); 849 if ((Name.size() == 1 && Name[0] == '.') || 850 (Name.size() == 2 && Name[0] == '.' && Name[1] == '.')) 851 return directory_iterator_increment(It); 852 It.CurrentEntry.replace_filename(Name, direntType(CurDir)); 853 } else 854 return directory_iterator_destruct(It); 855 856 return std::error_code(); 857} 858 859ErrorOr<basic_file_status> directory_entry::status() const { 860 file_status s; 861 if (auto EC = fs::status(Path, s, FollowSymlinks)) 862 return EC; 863 return s; 864} 865 866#if !defined(F_GETPATH) 867static bool hasProcSelfFD() { 868 // If we have a /proc filesystem mounted, we can quickly establish the 869 // real name of the file with readlink 870 static const bool Result = (::access("/proc/self/fd", R_OK) == 0); 871 return Result; 872} 873#endif 874 875static int nativeOpenFlags(CreationDisposition Disp, OpenFlags Flags, 876 FileAccess Access) { 877 int Result = 0; 878 if (Access == FA_Read) 879 Result |= O_RDONLY; 880 else if (Access == FA_Write) 881 Result |= O_WRONLY; 882 else if (Access == (FA_Read | FA_Write)) 883 Result |= O_RDWR; 884 885 // This is for compatibility with old code that assumed F_Append implied 886 // would open an existing file. See Windows/Path.inc for a longer comment. 887 if (Flags & F_Append) 888 Disp = CD_OpenAlways; 889 890 if (Disp == CD_CreateNew) { 891 Result |= O_CREAT; // Create if it doesn't exist. 892 Result |= O_EXCL; // Fail if it does. 893 } else if (Disp == CD_CreateAlways) { 894 Result |= O_CREAT; // Create if it doesn't exist. 895 Result |= O_TRUNC; // Truncate if it does. 896 } else if (Disp == CD_OpenAlways) { 897 Result |= O_CREAT; // Create if it doesn't exist. 898 } else if (Disp == CD_OpenExisting) { 899 // Nothing special, just don't add O_CREAT and we get these semantics. 900 } 901 902 if (Flags & F_Append) 903 Result |= O_APPEND; 904 905#ifdef O_CLOEXEC 906 if (!(Flags & OF_ChildInherit)) 907 Result |= O_CLOEXEC; 908#endif 909 910 return Result; 911} 912 913std::error_code openFile(const Twine &Name, int &ResultFD, 914 CreationDisposition Disp, FileAccess Access, 915 OpenFlags Flags, unsigned Mode) { 916 int OpenFlags = nativeOpenFlags(Disp, Flags, Access); 917 918 SmallString<128> Storage; 919 StringRef P = Name.toNullTerminatedStringRef(Storage); 920 // Call ::open in a lambda to avoid overload resolution in RetryAfterSignal 921 // when open is overloaded, such as in Bionic. 922 auto Open = [&]() { return ::open(P.begin(), OpenFlags, Mode); }; 923 if ((ResultFD = sys::RetryAfterSignal(-1, Open)) < 0) 924 return std::error_code(errno, std::generic_category()); 925#ifndef O_CLOEXEC 926 if (!(Flags & OF_ChildInherit)) { 927 int r = fcntl(ResultFD, F_SETFD, FD_CLOEXEC); 928 (void)r; 929 assert(r == 0 && "fcntl(F_SETFD, FD_CLOEXEC) failed"); 930 } 931#endif 932 return std::error_code(); 933} 934 935Expected<int> openNativeFile(const Twine &Name, CreationDisposition Disp, 936 FileAccess Access, OpenFlags Flags, 937 unsigned Mode) { 938 939 int FD; 940 std::error_code EC = openFile(Name, FD, Disp, Access, Flags, Mode); 941 if (EC) 942 return errorCodeToError(EC); 943 return FD; 944} 945 946std::error_code openFileForRead(const Twine &Name, int &ResultFD, 947 OpenFlags Flags, 948 SmallVectorImpl<char> *RealPath) { 949 std::error_code EC = 950 openFile(Name, ResultFD, CD_OpenExisting, FA_Read, Flags, 0666); 951 if (EC) 952 return EC; 953 954 // Attempt to get the real name of the file, if the user asked 955 if(!RealPath) 956 return std::error_code(); 957 RealPath->clear(); 958#if defined(F_GETPATH) 959 // When F_GETPATH is availble, it is the quickest way to get 960 // the real path name. 961 char Buffer[MAXPATHLEN]; 962 if (::fcntl(ResultFD, F_GETPATH, Buffer) != -1) 963 RealPath->append(Buffer, Buffer + strlen(Buffer)); 964#else 965 char Buffer[PATH_MAX]; 966 if (hasProcSelfFD()) { 967 char ProcPath[64]; 968 snprintf(ProcPath, sizeof(ProcPath), "/proc/self/fd/%d", ResultFD); 969 ssize_t CharCount = ::readlink(ProcPath, Buffer, sizeof(Buffer)); 970 if (CharCount > 0) 971 RealPath->append(Buffer, Buffer + CharCount); 972 } else { 973 SmallString<128> Storage; 974 StringRef P = Name.toNullTerminatedStringRef(Storage); 975 976 // Use ::realpath to get the real path name 977 if (::realpath(P.begin(), Buffer) != nullptr) 978 RealPath->append(Buffer, Buffer + strlen(Buffer)); 979 } 980#endif 981 return std::error_code(); 982} 983 984Expected<file_t> openNativeFileForRead(const Twine &Name, OpenFlags Flags, 985 SmallVectorImpl<char> *RealPath) { 986 file_t ResultFD; 987 std::error_code EC = openFileForRead(Name, ResultFD, Flags, RealPath); 988 if (EC) 989 return errorCodeToError(EC); 990 return ResultFD; 991} 992 993void closeFile(file_t &F) { 994 ::close(F); 995 F = kInvalidFile; 996} 997 998template <typename T> 999static std::error_code remove_directories_impl(const T &Entry, 1000 bool IgnoreErrors) { 1001 std::error_code EC; 1002 directory_iterator Begin(Entry, EC, false); 1003 directory_iterator End; 1004 while (Begin != End) { 1005 auto &Item = *Begin; 1006 ErrorOr<basic_file_status> st = Item.status(); 1007 if (!st && !IgnoreErrors) 1008 return st.getError(); 1009 1010 if (is_directory(*st)) { 1011 EC = remove_directories_impl(Item, IgnoreErrors); 1012 if (EC && !IgnoreErrors) 1013 return EC; 1014 } 1015 1016 EC = fs::remove(Item.path(), true); 1017 if (EC && !IgnoreErrors) 1018 return EC; 1019 1020 Begin.increment(EC); 1021 if (EC && !IgnoreErrors) 1022 return EC; 1023 } 1024 return std::error_code(); 1025} 1026 1027std::error_code remove_directories(const Twine &path, bool IgnoreErrors) { 1028 auto EC = remove_directories_impl(path, IgnoreErrors); 1029 if (EC && !IgnoreErrors) 1030 return EC; 1031 EC = fs::remove(path, true); 1032 if (EC && !IgnoreErrors) 1033 return EC; 1034 return std::error_code(); 1035} 1036 1037std::error_code real_path(const Twine &path, SmallVectorImpl<char> &dest, 1038 bool expand_tilde) { 1039 dest.clear(); 1040 if (path.isTriviallyEmpty()) 1041 return std::error_code(); 1042 1043 if (expand_tilde) { 1044 SmallString<128> Storage; 1045 path.toVector(Storage); 1046 expandTildeExpr(Storage); 1047 return real_path(Storage, dest, false); 1048 } 1049 1050 SmallString<128> Storage; 1051 StringRef P = path.toNullTerminatedStringRef(Storage); 1052 char Buffer[PATH_MAX]; 1053 if (::realpath(P.begin(), Buffer) == nullptr) 1054 return std::error_code(errno, std::generic_category()); 1055 dest.append(Buffer, Buffer + strlen(Buffer)); 1056 return std::error_code(); 1057} 1058 1059} // end namespace fs 1060 1061namespace path { 1062 1063bool home_directory(SmallVectorImpl<char> &result) { 1064 char *RequestedDir = getenv("HOME"); 1065 if (!RequestedDir) { 1066 struct passwd *pw = getpwuid(getuid()); 1067 if (pw && pw->pw_dir) 1068 RequestedDir = pw->pw_dir; 1069 } 1070 if (!RequestedDir) 1071 return false; 1072 1073 result.clear(); 1074 result.append(RequestedDir, RequestedDir + strlen(RequestedDir)); 1075 return true; 1076} 1077 1078static bool getDarwinConfDir(bool TempDir, SmallVectorImpl<char> &Result) { 1079 #if defined(_CS_DARWIN_USER_TEMP_DIR) && defined(_CS_DARWIN_USER_CACHE_DIR) 1080 // On Darwin, use DARWIN_USER_TEMP_DIR or DARWIN_USER_CACHE_DIR. 1081 // macros defined in <unistd.h> on darwin >= 9 1082 int ConfName = TempDir ? _CS_DARWIN_USER_TEMP_DIR 1083 : _CS_DARWIN_USER_CACHE_DIR; 1084 size_t ConfLen = confstr(ConfName, nullptr, 0); 1085 if (ConfLen > 0) { 1086 do { 1087 Result.resize(ConfLen); 1088 ConfLen = confstr(ConfName, Result.data(), Result.size()); 1089 } while (ConfLen > 0 && ConfLen != Result.size()); 1090 1091 if (ConfLen > 0) { 1092 assert(Result.back() == 0); 1093 Result.pop_back(); 1094 return true; 1095 } 1096 1097 Result.clear(); 1098 } 1099 #endif 1100 return false; 1101} 1102 1103static const char *getEnvTempDir() { 1104 // Check whether the temporary directory is specified by an environment 1105 // variable. 1106 const char *EnvironmentVariables[] = {"TMPDIR", "TMP", "TEMP", "TEMPDIR"}; 1107 for (const char *Env : EnvironmentVariables) { 1108 if (const char *Dir = std::getenv(Env)) 1109 return Dir; 1110 } 1111 1112 return nullptr; 1113} 1114 1115static const char *getDefaultTempDir(bool ErasedOnReboot) { 1116#ifdef P_tmpdir 1117 if ((bool)P_tmpdir) 1118 return P_tmpdir; 1119#endif 1120 1121 if (ErasedOnReboot) 1122 return "/tmp"; 1123 return "/var/tmp"; 1124} 1125 1126void system_temp_directory(bool ErasedOnReboot, SmallVectorImpl<char> &Result) { 1127 Result.clear(); 1128 1129 if (ErasedOnReboot) { 1130 // There is no env variable for the cache directory. 1131 if (const char *RequestedDir = getEnvTempDir()) { 1132 Result.append(RequestedDir, RequestedDir + strlen(RequestedDir)); 1133 return; 1134 } 1135 } 1136 1137 if (getDarwinConfDir(ErasedOnReboot, Result)) 1138 return; 1139 1140 const char *RequestedDir = getDefaultTempDir(ErasedOnReboot); 1141 Result.append(RequestedDir, RequestedDir + strlen(RequestedDir)); 1142} 1143 1144} // end namespace path 1145 1146namespace fs { 1147 1148#ifdef __APPLE__ 1149/// This implementation tries to perform an APFS CoW clone of the file, 1150/// which can be much faster and uses less space. 1151/// Unfortunately fcopyfile(3) does not support COPYFILE_CLONE, so the 1152/// file descriptor variant of this function still uses the default 1153/// implementation. 1154std::error_code copy_file(const Twine &From, const Twine &To) { 1155 uint32_t Flag = COPYFILE_DATA; 1156#if __has_builtin(__builtin_available) 1157 if (__builtin_available(macos 10.12, *)) { 1158 bool IsSymlink; 1159 if (std::error_code Error = is_symlink_file(From, IsSymlink)) 1160 return Error; 1161 // COPYFILE_CLONE clones the symlink instead of following it 1162 // and returns EEXISTS if the target file already exists. 1163 if (!IsSymlink && !exists(To)) 1164 Flag = COPYFILE_CLONE; 1165 } 1166#endif 1167 int Status = 1168 copyfile(From.str().c_str(), To.str().c_str(), /* State */ NULL, Flag); 1169 1170 if (Status == 0) 1171 return std::error_code(); 1172 return std::error_code(errno, std::generic_category()); 1173} 1174#endif // __APPLE__ 1175 1176} // end namespace fs 1177 1178} // end namespace sys 1179} // end namespace llvm 1180