2023-04-09 20:03:20 +08:00
|
|
|
use crate::common::wcs2zstring;
|
2023-12-10 05:47:24 +08:00
|
|
|
use crate::flog::FLOG;
|
2024-01-04 03:57:28 +08:00
|
|
|
#[cfg(test)]
|
|
|
|
use crate::tests::prelude::*;
|
2023-08-09 06:16:04 +08:00
|
|
|
use crate::wchar::prelude::*;
|
2023-04-09 20:03:20 +08:00
|
|
|
use crate::wutil::perror;
|
2023-12-10 05:47:24 +08:00
|
|
|
use libc::{
|
|
|
|
c_int, EINTR, FD_CLOEXEC, F_DUPFD_CLOEXEC, F_GETFD, F_GETFL, F_SETFD, F_SETFL, O_CLOEXEC,
|
|
|
|
O_NONBLOCK,
|
|
|
|
};
|
2023-01-15 06:56:24 +08:00
|
|
|
use nix::unistd;
|
2023-04-09 20:03:20 +08:00
|
|
|
use std::ffi::CStr;
|
2023-07-20 23:38:54 +08:00
|
|
|
use std::io::{self, Read, Write};
|
2023-08-06 20:56:30 +08:00
|
|
|
use std::os::unix::prelude::*;
|
2023-01-15 06:56:24 +08:00
|
|
|
|
2023-10-09 05:22:27 +08:00
|
|
|
pub const PIPE_ERROR: &str = "An error occurred while setting up pipe";
|
2023-04-09 20:03:20 +08:00
|
|
|
|
|
|
|
/// The first "high fd", which is considered outside the range of valid user-specified redirections
|
|
|
|
/// (like >&5).
|
|
|
|
pub const FIRST_HIGH_FD: RawFd = 10;
|
|
|
|
|
|
|
|
/// A sentinel value indicating no timeout.
|
|
|
|
pub const NO_TIMEOUT: u64 = u64::MAX;
|
|
|
|
|
2023-01-15 06:56:24 +08:00
|
|
|
/// A helper type for managing and automatically closing a file descriptor
|
2023-02-18 09:21:44 +08:00
|
|
|
///
|
|
|
|
/// This was implemented in rust as a port of the existing C++ code but it didn't take its place
|
|
|
|
/// (yet) and there's still the original cpp implementation in `src/fds.h`, so its name is
|
|
|
|
/// disambiguated because some code uses a mix of both for interop purposes.
|
|
|
|
pub struct AutoCloseFd {
|
2023-01-15 06:56:24 +08:00
|
|
|
fd_: RawFd,
|
|
|
|
}
|
|
|
|
|
2023-03-05 14:20:18 +08:00
|
|
|
impl Read for AutoCloseFd {
|
|
|
|
fn read(&mut self, buf: &mut [u8]) -> std::io::Result<usize> {
|
|
|
|
unsafe {
|
|
|
|
match libc::read(self.as_raw_fd(), buf.as_mut_ptr() as *mut _, buf.len()) {
|
|
|
|
-1 => Err(std::io::Error::from_raw_os_error(errno::errno().0)),
|
|
|
|
bytes => Ok(bytes as usize),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Write for AutoCloseFd {
|
|
|
|
fn write(&mut self, buf: &[u8]) -> std::io::Result<usize> {
|
|
|
|
unsafe {
|
|
|
|
match libc::write(self.as_raw_fd(), buf.as_ptr() as *const _, buf.len()) {
|
|
|
|
-1 => Err(std::io::Error::from_raw_os_error(errno::errno().0)),
|
|
|
|
bytes => Ok(bytes as usize),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn flush(&mut self) -> std::io::Result<()> {
|
|
|
|
// We don't buffer anything so this is a no-op.
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-02-18 09:21:44 +08:00
|
|
|
impl AutoCloseFd {
|
2023-01-15 06:56:24 +08:00
|
|
|
// Closes the fd if not already closed.
|
|
|
|
pub fn close(&mut self) {
|
|
|
|
if self.fd_ != -1 {
|
|
|
|
_ = unistd::close(self.fd_);
|
|
|
|
self.fd_ = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Returns the fd.
|
|
|
|
pub fn fd(&self) -> RawFd {
|
|
|
|
self.fd_
|
|
|
|
}
|
|
|
|
|
|
|
|
// Returns the fd, transferring ownership to the caller.
|
|
|
|
pub fn acquire(&mut self) -> RawFd {
|
|
|
|
let temp = self.fd_;
|
|
|
|
self.fd_ = -1;
|
|
|
|
temp
|
|
|
|
}
|
|
|
|
|
|
|
|
// Resets to a new fd, taking ownership.
|
|
|
|
pub fn reset(&mut self, fd: RawFd) {
|
|
|
|
if fd == self.fd_ {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
self.close();
|
|
|
|
self.fd_ = fd;
|
|
|
|
}
|
|
|
|
|
2023-02-18 09:21:44 +08:00
|
|
|
// Returns if this has a valid fd.
|
|
|
|
pub fn is_valid(&self) -> bool {
|
2023-01-15 06:56:24 +08:00
|
|
|
self.fd_ >= 0
|
|
|
|
}
|
|
|
|
|
2023-02-18 09:21:44 +08:00
|
|
|
// Create a new AutoCloseFd instance taking ownership of the passed fd
|
|
|
|
pub fn new(fd: RawFd) -> Self {
|
|
|
|
AutoCloseFd { fd_: fd }
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a new AutoCloseFd without an open fd
|
|
|
|
pub fn empty() -> Self {
|
|
|
|
AutoCloseFd { fd_: -1 }
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl FromRawFd for AutoCloseFd {
|
|
|
|
unsafe fn from_raw_fd(fd: RawFd) -> Self {
|
|
|
|
AutoCloseFd { fd_: fd }
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl AsRawFd for AutoCloseFd {
|
|
|
|
fn as_raw_fd(&self) -> RawFd {
|
|
|
|
self.fd()
|
2023-01-15 06:56:24 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-02-18 09:21:44 +08:00
|
|
|
impl Default for AutoCloseFd {
|
|
|
|
fn default() -> AutoCloseFd {
|
|
|
|
AutoCloseFd { fd_: -1 }
|
2023-01-15 06:56:24 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-02-18 09:21:44 +08:00
|
|
|
impl Drop for AutoCloseFd {
|
2023-01-15 06:56:24 +08:00
|
|
|
fn drop(&mut self) {
|
|
|
|
self.close()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Helper type returned from make_autoclose_pipes.
|
|
|
|
#[derive(Default)]
|
2023-04-23 01:15:17 +08:00
|
|
|
pub struct AutoClosePipes {
|
2023-01-15 06:56:24 +08:00
|
|
|
/// Read end of the pipe.
|
2023-02-18 09:21:44 +08:00
|
|
|
pub read: AutoCloseFd,
|
2023-01-15 06:56:24 +08:00
|
|
|
|
|
|
|
/// Write end of the pipe.
|
2023-02-18 09:21:44 +08:00
|
|
|
pub write: AutoCloseFd,
|
2023-01-15 06:56:24 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Construct a pair of connected pipes, set to close-on-exec.
|
|
|
|
/// \return None on fd exhaustion.
|
2023-04-23 01:15:17 +08:00
|
|
|
pub fn make_autoclose_pipes() -> Option<AutoClosePipes> {
|
2023-12-10 05:47:24 +08:00
|
|
|
let mut pipes: [c_int; 2] = [-1, -1];
|
|
|
|
|
2024-01-14 05:41:47 +08:00
|
|
|
#[allow(unused_mut, unused_assignments)]
|
|
|
|
let mut already_cloexec = false;
|
2023-12-10 05:47:24 +08:00
|
|
|
#[cfg(HAVE_PIPE2)]
|
|
|
|
{
|
|
|
|
if unsafe { libc::pipe2(&mut pipes[0], O_CLOEXEC) } < 0 {
|
|
|
|
FLOG!(warning, PIPE_ERROR);
|
|
|
|
perror("pipe2");
|
|
|
|
return None;
|
|
|
|
}
|
|
|
|
already_cloexec = true;
|
|
|
|
}
|
|
|
|
#[cfg(not(HAVE_PIPE2))]
|
|
|
|
if unsafe { libc::pipe(&mut pipes[0]) } < 0 {
|
|
|
|
FLOG!(warning, PIPE_ERROR);
|
|
|
|
perror("pipe2");
|
|
|
|
return None;
|
|
|
|
}
|
2023-01-15 06:56:24 +08:00
|
|
|
|
2023-12-10 05:47:24 +08:00
|
|
|
let readp = AutoCloseFd::new(pipes[0]);
|
|
|
|
let writep = AutoCloseFd::new(pipes[1]);
|
|
|
|
|
|
|
|
// Ensure our fds are out of the user range.
|
|
|
|
let readp = heightenize_fd(readp, already_cloexec);
|
|
|
|
if !readp.is_valid() {
|
|
|
|
return None;
|
|
|
|
}
|
|
|
|
|
|
|
|
let writep = heightenize_fd(writep, already_cloexec);
|
|
|
|
if !writep.is_valid() {
|
|
|
|
return None;
|
|
|
|
}
|
|
|
|
|
|
|
|
Some(AutoClosePipes {
|
|
|
|
read: readp,
|
|
|
|
write: writep,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
/// If the given fd is in the "user range", move it to a new fd in the "high range".
|
|
|
|
/// zsh calls this movefd().
|
|
|
|
/// \p input_has_cloexec describes whether the input has CLOEXEC already set, so we can avoid
|
|
|
|
/// setting it again.
|
|
|
|
/// \return the fd, which always has CLOEXEC set; or an invalid fd on failure, in
|
|
|
|
/// which case an error will have been printed, and the input fd closed.
|
|
|
|
fn heightenize_fd(fd: AutoCloseFd, input_has_cloexec: bool) -> AutoCloseFd {
|
|
|
|
// Check if the fd is invalid or already in our high range.
|
|
|
|
if !fd.is_valid() {
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
if fd.fd() >= FIRST_HIGH_FD {
|
|
|
|
if !input_has_cloexec {
|
|
|
|
set_cloexec(fd.fd(), true);
|
|
|
|
}
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
// Here we are asking the kernel to give us a cloexec fd.
|
|
|
|
let newfd = unsafe { libc::fcntl(fd.fd(), F_DUPFD_CLOEXEC, FIRST_HIGH_FD) };
|
|
|
|
if newfd < 0 {
|
|
|
|
perror("fcntl");
|
|
|
|
return AutoCloseFd::default();
|
2023-01-15 06:56:24 +08:00
|
|
|
}
|
2023-12-10 05:47:24 +08:00
|
|
|
return AutoCloseFd::new(newfd);
|
2023-01-15 06:56:24 +08:00
|
|
|
}
|
2023-04-09 20:03:20 +08:00
|
|
|
|
2023-10-09 05:22:27 +08:00
|
|
|
/// Sets CLO_EXEC on a given fd according to the value of \p should_set.
|
2023-12-03 23:54:52 +08:00
|
|
|
pub fn set_cloexec(fd: RawFd, should_set: bool /* = true */) -> c_int {
|
2023-10-09 05:22:27 +08:00
|
|
|
// Note we don't want to overwrite existing flags like O_NONBLOCK which may be set. So fetch the
|
|
|
|
// existing flags and modify them.
|
|
|
|
let flags = unsafe { libc::fcntl(fd, F_GETFD, 0) };
|
|
|
|
if flags < 0 {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
let mut new_flags = flags;
|
|
|
|
if should_set {
|
|
|
|
new_flags |= FD_CLOEXEC;
|
|
|
|
} else {
|
|
|
|
new_flags &= !FD_CLOEXEC;
|
|
|
|
}
|
|
|
|
if flags == new_flags {
|
|
|
|
0
|
|
|
|
} else {
|
|
|
|
unsafe { libc::fcntl(fd, F_SETFD, new_flags) }
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-04-09 20:03:20 +08:00
|
|
|
/// Wide character version of open() that also sets the close-on-exec flag (atomically when
|
|
|
|
/// possible).
|
|
|
|
pub fn wopen_cloexec(pathname: &wstr, flags: i32, mode: libc::c_int) -> RawFd {
|
|
|
|
open_cloexec(wcs2zstring(pathname).as_c_str(), flags, mode)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Narrow versions of wopen_cloexec.
|
|
|
|
pub fn open_cloexec(path: &CStr, flags: i32, mode: libc::c_int) -> RawFd {
|
2023-07-05 10:30:26 +08:00
|
|
|
// Port note: the C++ version of this function had a fallback for platforms where
|
|
|
|
// O_CLOEXEC is not supported, using fcntl. In 2023, this is no longer needed.
|
2023-04-09 20:03:20 +08:00
|
|
|
unsafe { libc::open(path.as_ptr(), flags | O_CLOEXEC, mode) }
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Close a file descriptor \p fd, retrying on EINTR.
|
|
|
|
pub fn exec_close(fd: RawFd) {
|
|
|
|
assert!(fd >= 0, "Invalid fd");
|
|
|
|
while unsafe { libc::close(fd) } == -1 {
|
|
|
|
if errno::errno().0 != EINTR {
|
|
|
|
perror("close");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-07-20 23:38:54 +08:00
|
|
|
|
|
|
|
/// Mark an fd as nonblocking
|
|
|
|
pub fn make_fd_nonblocking(fd: RawFd) -> Result<(), io::Error> {
|
2023-10-09 05:22:27 +08:00
|
|
|
let flags = unsafe { libc::fcntl(fd, F_GETFL, 0) };
|
2023-07-20 23:38:54 +08:00
|
|
|
let nonblocking = (flags & O_NONBLOCK) == O_NONBLOCK;
|
|
|
|
if !nonblocking {
|
2023-10-09 05:22:27 +08:00
|
|
|
match unsafe { libc::fcntl(fd, F_SETFL, flags | O_NONBLOCK) } {
|
|
|
|
-1 => return Err(io::Error::last_os_error()),
|
|
|
|
_ => return Ok(()),
|
2023-07-20 23:38:54 +08:00
|
|
|
};
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Mark an fd as blocking
|
|
|
|
pub fn make_fd_blocking(fd: RawFd) -> Result<(), io::Error> {
|
2023-10-09 05:22:27 +08:00
|
|
|
let flags = unsafe { libc::fcntl(fd, F_GETFL, 0) };
|
2023-07-20 23:38:54 +08:00
|
|
|
let nonblocking = (flags & O_NONBLOCK) == O_NONBLOCK;
|
|
|
|
if nonblocking {
|
2023-10-09 05:22:27 +08:00
|
|
|
match unsafe { libc::fcntl(fd, F_SETFL, flags & !O_NONBLOCK) } {
|
|
|
|
-1 => return Err(io::Error::last_os_error()),
|
|
|
|
_ => return Ok(()),
|
2023-07-20 23:38:54 +08:00
|
|
|
};
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
2023-12-10 00:18:51 +08:00
|
|
|
|
2024-01-04 03:57:28 +08:00
|
|
|
#[test]
|
|
|
|
#[serial]
|
|
|
|
fn test_pipes() {
|
|
|
|
test_init();
|
2023-12-10 00:18:51 +08:00
|
|
|
// Here we just test that each pipe has CLOEXEC set and is in the high range.
|
|
|
|
// Note pipe creation may fail due to fd exhaustion; don't fail in that case.
|
|
|
|
let mut pipes = vec![];
|
|
|
|
for _i in 0..10 {
|
|
|
|
if let Some(pipe) = make_autoclose_pipes() {
|
|
|
|
pipes.push(pipe);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for pipe in pipes {
|
|
|
|
for fd in [pipe.read.fd(), pipe.write.fd()] {
|
|
|
|
assert!(fd >= FIRST_HIGH_FD);
|
|
|
|
let flags = unsafe { libc::fcntl(fd, F_GETFD, 0) };
|
|
|
|
assert!(flags >= 0);
|
|
|
|
assert!(flags & FD_CLOEXEC != 0);
|
|
|
|
}
|
|
|
|
}
|
2024-01-04 03:57:28 +08:00
|
|
|
}
|