pub const windows = @import("windows.zig"); pub const darwin = @import("darwin.zig"); pub const linux = @import("linux.zig"); pub const posix = switch(@compileVar("os")) { Os.linux => linux, Os.darwin, Os.macosx, Os.ios => darwin, Os.windows => windows, else => @compileError("Unsupported OS"), }; const debug = @import("../debug.zig"); const assert = debug.assert; const errno = @import("errno.zig"); const linking_libc = @import("../target.zig").linking_libc; const c = @import("../c/index.zig"); const mem = @import("../mem.zig"); const Allocator = mem.Allocator; const io = @import("../io.zig"); error Unexpected; error SysResources; error AccessDenied; error InvalidExe; error FileSystem; error IsDir; error FileNotFound; error FileBusy; /// Fills `buf` with random bytes. If linking against libc, this calls the /// appropriate OS-specific library call. Otherwise it uses the zig standard /// library implementation. pub fn getRandomBytes(buf: []u8) -> %void { while (true) { const err = switch (@compileVar("os")) { Os.linux => { if (linking_libc) { if (c.getrandom(buf.ptr, buf.len, 0) == -1) *c._errno() else 0 } else { posix.getErrno(posix.getrandom(buf.ptr, buf.len, 0)) } }, Os.darwin, Os.macosx, Os.ios => { if (linking_libc) { if (posix.getrandom(buf.ptr, buf.len) == -1) *c._errno() else 0 } else { posix.getErrno(posix.getrandom(buf.ptr, buf.len)) } }, Os.windows => { var hCryptProv: windows.HCRYPTPROV = undefined; if (!windows.CryptAcquireContext(&hCryptProv, null, null, windows.PROV_RSA_FULL, 0)) { return error.Unexpected; } defer _ = windows.CryptReleaseContext(hCryptProv, 0); if (!windows.CryptGenRandom(hCryptProv, windows.DWORD(buf.len), buf.ptr)) { return error.Unexpected; } return; }, else => @compileError("Unsupported OS"), }; if (err > 0) { return switch (err) { errno.EINVAL => unreachable, errno.EFAULT => unreachable, errno.EINTR => continue, else => error.Unexpected, } } return; } } /// Raises a signal in the current kernel thread, ending its execution. /// If linking against libc, this calls the abort() libc function. Otherwise /// it uses the zig standard library implementation. pub coldcc fn abort() -> noreturn { if (linking_libc) { c.abort(); } switch (@compileVar("os")) { Os.linux => { _ = posix.raise(posix.SIGABRT); _ = posix.raise(posix.SIGKILL); while (true) {} }, else => @compileError("Unsupported OS"), } } fn makePipe() -> %[2]i32 { var fds: [2]i32 = undefined; const err = posix.getErrno(posix.pipe(&fds)); if (err > 0) { return switch (err) { errno.EMFILE, errno.ENFILE => error.SysResources, else => error.Unexpected, } } return fds; } fn destroyPipe(pipe: &const [2]i32) { closeNoIntr((*pipe)[0]); closeNoIntr((*pipe)[1]); } fn closeNoIntr(fd: i32) { while (true) { const err = posix.getErrno(posix.close(fd)); if (err == errno.EINTR) { continue; } else { return; } } } fn openNoIntr(path: []const u8, flags: usize, perm: usize) -> %i32 { while (true) { const result = posix.open(path, flags, perm); const err = posix.getErrno(result); if (err > 0) { return switch (err) { errno.EINTR => continue, errno.EFAULT => unreachable, errno.EINVAL => unreachable, errno.EACCES => error.BadPerm, errno.EFBIG, errno.EOVERFLOW => error.FileTooBig, errno.EISDIR => error.IsDir, errno.ELOOP => error.SymLinkLoop, errno.EMFILE => error.ProcessFdQuotaExceeded, errno.ENAMETOOLONG => error.NameTooLong, errno.ENFILE => error.SystemFdQuotaExceeded, errno.ENODEV => error.NoDevice, errno.ENOENT => error.PathNotFound, errno.ENOMEM => error.NoMem, errno.ENOSPC => error.NoSpaceLeft, errno.ENOTDIR => error.NotDir, errno.EPERM => error.BadPerm, else => error.Unexpected, } } return i32(result); } } const ErrInt = @intType(false, @sizeOf(error) * 8); fn writeIntFd(fd: i32, value: ErrInt) -> %void { var bytes: [@sizeOf(ErrInt)]u8 = undefined; mem.writeInt(bytes[0...], value, true); var index: usize = 0; while (index < bytes.len) { const amt_written = posix.write(fd, &bytes[index], bytes.len - index); const err = posix.getErrno(amt_written); if (err > 0) { switch (err) { errno.EINTR => continue, errno.EINVAL => unreachable, else => return error.SysResources, } } index += amt_written; } } fn readIntFd(fd: i32) -> %ErrInt { var bytes: [@sizeOf(ErrInt)]u8 = undefined; var index: usize = 0; while (index < bytes.len) { const amt_written = posix.read(fd, &bytes[index], bytes.len - index); const err = posix.getErrno(amt_written); if (err > 0) { switch (err) { errno.EINTR => continue, errno.EINVAL => unreachable, else => return error.SysResources, } } index += amt_written; } return mem.readInt(bytes[0...], ErrInt, true); } // Child of fork calls this to report an error to the fork parent. // Then the child exits. fn forkChildErrReport(fd: i32, err: error) -> noreturn { _ = writeIntFd(fd, ErrInt(err)); posix.exit(1); } fn dup2NoIntr(old_fd: i32, new_fd: i32) -> %void { while (true) { const err = posix.getErrno(posix.dup2(old_fd, new_fd)); if (err > 0) { return switch (err) { errno.EBUSY, errno.EINTR => continue, errno.EMFILE => error.SysResources, errno.EINVAL => unreachable, else => error.Unexpected, }; } return; } } pub const ChildProcess = struct { pid: i32, err_pipe: [2]i32, stdin: ?io.OutStream, stdout: ?io.InStream, stderr: ?io.InStream, pub const Term = enum { Clean: i32, Signal: i32, Stopped: i32, Unknown: i32, }; pub const StdIo = enum { Inherit, Ignore, Pipe, Close, }; pub fn spawn(exe_path: []const u8, args: []const []const u8, env: []const []const u8, stdin: StdIo, stdout: StdIo, stderr: StdIo) -> %ChildProcess { switch (@compileVar("os")) { Os.linux, Os.macosx, Os.ios, Os.darwin => { return spawnPosix(exe_path, args, env, stdin, stdout, stderr); }, else => @compileError("Unsupported OS"), } } pub fn wait(self: &ChildProcess) -> %Term { defer { closeNoIntr(self.err_pipe[0]); closeNoIntr(self.err_pipe[1]); }; var status: i32 = undefined; while (true) { const err = posix.getErrno(posix.waitpid(self.pid, &status, 0)); if (err > 0) { switch (err) { errno.EINVAL, errno.ECHILD => unreachable, errno.EINTR => continue, else => { if (const *stdin ?= self.stdin) { stdin.close(); } if (const *stdout ?= self.stdin) { stdout.close(); } if (const *stderr ?= self.stdin) { stderr.close(); } return error.Unexpected; }, } } break; } if (const *stdin ?= self.stdin) { stdin.close(); } if (const *stdout ?= self.stdin) { stdout.close(); } if (const *stderr ?= self.stdin) { stderr.close(); } // Write @maxValue(ErrInt) to the write end of the err_pipe. This is after // waitpid, so this write is guaranteed to be after the child // pid potentially wrote an error. This way we can do a blocking // read on the error pipe and either get @maxValue(ErrInt) (no error) or // an error code. %return writeIntFd(self.err_pipe[1], @maxValue(ErrInt)); const err_int = %return readIntFd(self.err_pipe[0]); // Here we potentially return the fork child's error // from the parent pid. if (err_int != @maxValue(ErrInt)) { return error(err_int); } return statusToTerm(status); } fn statusToTerm(status: i32) -> Term { return if (posix.WIFEXITED(status)) { Term.Clean { posix.WEXITSTATUS(status) } } else if (posix.WIFSIGNALED(status)) { Term.Signal { posix.WTERMSIG(status) } } else if (posix.WIFSTOPPED(status)) { Term.Stopped { posix.WSTOPSIG(status) } } else { Term.Unknown { status } }; } fn spawnPosix(exe_path: []const u8, args: []const []const u8, env: []const []const u8, stdin: StdIo, stdout: StdIo, stderr: StdIo) -> %ChildProcess { // TODO issue #295 //const stdin_pipe = if (stdin == StdIo.Pipe) %return makePipe() else undefined; var stdin_pipe: [2]i32 = undefined; if (stdin == StdIo.Pipe) stdin_pipe = %return makePipe(); %defer if (stdin == StdIo.Pipe) { destroyPipe(stdin_pipe); }; // TODO issue #295 //const stdout_pipe = if (stdout == StdIo.Pipe) %return makePipe() else undefined; var stdout_pipe: [2]i32 = undefined; if (stdout == StdIo.Pipe) stdout_pipe = %return makePipe(); %defer if (stdout == StdIo.Pipe) { destroyPipe(stdout_pipe); }; // TODO issue #295 //const stderr_pipe = if (stderr == StdIo.Pipe) %return makePipe() else undefined; var stderr_pipe: [2]i32 = undefined; if (stderr == StdIo.Pipe) stderr_pipe = %return makePipe(); %defer if (stderr == StdIo.Pipe) { destroyPipe(stderr_pipe); }; const any_ignore = (stdin == StdIo.Ignore or stdout == StdIo.Ignore or stderr == StdIo.Ignore); // TODO issue #295 //const dev_null_fd = if (any_ignore) { // %return openNoIntr("/dev/null", posix.O_RDWR, 0) //} else { // undefined //}; var dev_null_fd: i32 = undefined; if (any_ignore) dev_null_fd = %return openNoIntr("/dev/null", posix.O_RDWR, 0); // This pipe is used to communicate errors between the time of fork // and execve from the child process to the parent process. const err_pipe = %return makePipe(); %defer destroyPipe(err_pipe); const pid = posix.fork(); const pid_err = linux.getErrno(pid); if (pid_err > 0) { return switch (pid_err) { errno.EAGAIN, errno.ENOMEM, errno.ENOSYS => error.SysResources, else => error.Unexpected, }; } if (pid == 0) { // we are the child setUpChildIo(stdin, stdin_pipe[0], posix.STDIN_FILENO, dev_null_fd) %% |err| forkChildErrReport(err_pipe[1], err); setUpChildIo(stdout, stdout_pipe[1], posix.STDOUT_FILENO, dev_null_fd) %% |err| forkChildErrReport(err_pipe[1], err); setUpChildIo(stderr, stderr_pipe[1], posix.STDERR_FILENO, dev_null_fd) %% |err| forkChildErrReport(err_pipe[1], err); const err = posix.getErrno(posix.execve(exe_path, args, env)); assert(err > 0); forkChildErrReport(err_pipe[1], switch (err) { errno.EFAULT => unreachable, errno.E2BIG, errno.EMFILE, errno.ENAMETOOLONG, errno.ENFILE, errno.ENOMEM => error.SysResources, errno.EACCES, errno.EPERM => error.AccessDenied, errno.EINVAL, errno.ENOEXEC => error.InvalidExe, errno.EIO, errno.ELOOP => error.FileSystem, errno.EISDIR => error.IsDir, errno.ENOENT, errno.ENOTDIR => error.FileNotFound, errno.ETXTBSY => error.FileBusy, else => error.Unexpected, }); } // we are the parent if (stdin == StdIo.Pipe) { closeNoIntr(stdin_pipe[0]); } if (stdout == StdIo.Pipe) { closeNoIntr(stdout_pipe[1]); } if (stderr == StdIo.Pipe) { closeNoIntr(stderr_pipe[1]); } if (any_ignore) { closeNoIntr(dev_null_fd); } return ChildProcess { .pid = i32(pid), .err_pipe = err_pipe, .stdin = if (stdin == StdIo.Pipe) { io.OutStream { .fd = stdin_pipe[1], .buffer = undefined, .index = 0, } } else { null }, .stdout = if (stdout == StdIo.Pipe) { io.InStream { .fd = stdout_pipe[0], } } else { null }, .stderr = if (stderr == StdIo.Pipe) { io.InStream { .fd = stderr_pipe[0], } } else { null }, }; } fn setUpChildIo(stdio: StdIo, pipe_fd: i32, std_fileno: i32, dev_null_fd: i32) -> %void { switch (stdio) { StdIo.Pipe => %return dup2NoIntr(pipe_fd, std_fileno), StdIo.Close => closeNoIntr(std_fileno), StdIo.Inherit => {}, StdIo.Ignore => %return dup2NoIntr(dev_null_fd, std_fileno), } } }; pub const EnvPair = struct { key: []const u8, value: []const u8, }; pub var environ: []const EnvPair = undefined; pub fn getEnv(key: []const u8) -> ?[]const u8 { for (environ) |pair| { if (mem.eql(u8, pair.key, key)) return pair.value; } return null; }