On Unix the limits can be gargantuan anyway so we're pretty unlikely to hit them, but might still exceed it. We consult ARG_MAX here to get an estimate.
214 lines
6.8 KiB
Rust
214 lines
6.8 KiB
Rust
//! A thin wrapper around `Command` in the standard library which allows us to
|
|
//! read the arguments that are built up.
|
|
|
|
use std::ffi::{OsStr, OsString};
|
|
use std::process::{self, Output};
|
|
use std::{fmt, io, mem};
|
|
|
|
use rustc_target::spec::LldFlavor;
|
|
|
|
#[derive(Clone)]
|
|
pub(crate) struct Command {
|
|
program: Program,
|
|
args: Vec<OsString>,
|
|
env: Vec<(OsString, OsString)>,
|
|
env_remove: Vec<OsString>,
|
|
env_clear: bool,
|
|
}
|
|
|
|
#[derive(Clone)]
|
|
enum Program {
|
|
Normal(OsString),
|
|
CmdBatScript(OsString),
|
|
Lld(OsString, LldFlavor),
|
|
}
|
|
|
|
impl Command {
|
|
pub(crate) fn new<P: AsRef<OsStr>>(program: P) -> Command {
|
|
Command::_new(Program::Normal(program.as_ref().to_owned()))
|
|
}
|
|
|
|
pub(crate) fn bat_script<P: AsRef<OsStr>>(program: P) -> Command {
|
|
Command::_new(Program::CmdBatScript(program.as_ref().to_owned()))
|
|
}
|
|
|
|
pub(crate) fn lld<P: AsRef<OsStr>>(program: P, flavor: LldFlavor) -> Command {
|
|
Command::_new(Program::Lld(program.as_ref().to_owned(), flavor))
|
|
}
|
|
|
|
fn _new(program: Program) -> Command {
|
|
Command {
|
|
program,
|
|
args: Vec::new(),
|
|
env: Vec::new(),
|
|
env_remove: Vec::new(),
|
|
env_clear: false,
|
|
}
|
|
}
|
|
|
|
pub(crate) fn arg<P: AsRef<OsStr>>(&mut self, arg: P) -> &mut Command {
|
|
self._arg(arg.as_ref());
|
|
self
|
|
}
|
|
|
|
pub(crate) fn args<I>(&mut self, args: I) -> &mut Command
|
|
where
|
|
I: IntoIterator<Item: AsRef<OsStr>>,
|
|
{
|
|
for arg in args {
|
|
self._arg(arg.as_ref());
|
|
}
|
|
self
|
|
}
|
|
|
|
fn _arg(&mut self, arg: &OsStr) {
|
|
self.args.push(arg.to_owned());
|
|
}
|
|
|
|
pub(crate) fn env<K, V>(&mut self, key: K, value: V) -> &mut Command
|
|
where
|
|
K: AsRef<OsStr>,
|
|
V: AsRef<OsStr>,
|
|
{
|
|
self._env(key.as_ref(), value.as_ref());
|
|
self
|
|
}
|
|
|
|
fn _env(&mut self, key: &OsStr, value: &OsStr) {
|
|
self.env.push((key.to_owned(), value.to_owned()));
|
|
}
|
|
|
|
pub(crate) fn env_remove<K>(&mut self, key: K) -> &mut Command
|
|
where
|
|
K: AsRef<OsStr>,
|
|
{
|
|
self._env_remove(key.as_ref());
|
|
self
|
|
}
|
|
|
|
pub(crate) fn env_clear(&mut self) -> &mut Command {
|
|
self.env_clear = true;
|
|
self
|
|
}
|
|
|
|
fn _env_remove(&mut self, key: &OsStr) {
|
|
self.env_remove.push(key.to_owned());
|
|
}
|
|
|
|
pub(crate) fn output(&mut self) -> io::Result<Output> {
|
|
self.command().output()
|
|
}
|
|
|
|
pub(crate) fn command(&self) -> process::Command {
|
|
let mut ret = match self.program {
|
|
Program::Normal(ref p) => process::Command::new(p),
|
|
Program::CmdBatScript(ref p) => {
|
|
let mut c = process::Command::new("cmd");
|
|
c.arg("/c").arg(p);
|
|
c
|
|
}
|
|
Program::Lld(ref p, flavor) => {
|
|
let mut c = process::Command::new(p);
|
|
c.arg("-flavor").arg(flavor.as_str());
|
|
c
|
|
}
|
|
};
|
|
ret.args(&self.args);
|
|
ret.envs(self.env.clone());
|
|
for k in &self.env_remove {
|
|
ret.env_remove(k);
|
|
}
|
|
if self.env_clear {
|
|
ret.env_clear();
|
|
}
|
|
ret
|
|
}
|
|
|
|
// extensions
|
|
|
|
pub(crate) fn get_args(&self) -> &[OsString] {
|
|
&self.args
|
|
}
|
|
|
|
pub(crate) fn take_args(&mut self) -> Vec<OsString> {
|
|
mem::take(&mut self.args)
|
|
}
|
|
|
|
/// Returns a `true` if we're pretty sure that this'll blow OS spawn limits,
|
|
/// or `false` if we should attempt to spawn and see what the OS says.
|
|
pub(crate) fn very_likely_to_exceed_some_spawn_limit(&self) -> bool {
|
|
#[cfg(not(any(windows, unix)))]
|
|
{
|
|
return false;
|
|
}
|
|
|
|
// On Unix the limits can be gargantuan anyway so we're pretty
|
|
// unlikely to hit them, but might still exceed it.
|
|
// We consult ARG_MAX here to get an estimate.
|
|
#[cfg(unix)]
|
|
{
|
|
let ptr_size = mem::size_of::<usize>();
|
|
// arg + \0 + pointer
|
|
let args_size = self.args.iter().fold(0usize, |acc, a| {
|
|
let arg = a.as_encoded_bytes().len();
|
|
let nul = 1;
|
|
acc.saturating_add(arg).saturating_add(nul).saturating_add(ptr_size)
|
|
});
|
|
// key + `=` + value + \0 + pointer
|
|
let envs_size = self.env.iter().fold(0usize, |acc, (k, v)| {
|
|
let k = k.as_encoded_bytes().len();
|
|
let eq = 1;
|
|
let v = v.as_encoded_bytes().len();
|
|
let nul = 1;
|
|
acc.saturating_add(k)
|
|
.saturating_add(eq)
|
|
.saturating_add(v)
|
|
.saturating_add(nul)
|
|
.saturating_add(ptr_size)
|
|
});
|
|
let arg_max = match unsafe { libc::sysconf(libc::_SC_ARG_MAX) } {
|
|
-1 => return false, // Go to OS anyway.
|
|
max => max as usize,
|
|
};
|
|
return args_size.saturating_add(envs_size) > arg_max;
|
|
}
|
|
|
|
// Ok so on Windows to spawn a process is 32,768 characters in its
|
|
// command line [1]. Unfortunately we don't actually have access to that
|
|
// as it's calculated just before spawning. Instead we perform a
|
|
// poor-man's guess as to how long our command line will be. We're
|
|
// assuming here that we don't have to escape every character...
|
|
//
|
|
// Turns out though that `cmd.exe` has even smaller limits, 8192
|
|
// characters [2]. Linkers can often be batch scripts (for example
|
|
// Emscripten, Gecko's current build system) which means that we're
|
|
// running through batch scripts. These linkers often just forward
|
|
// arguments elsewhere (and maybe tack on more), so if we blow 8192
|
|
// bytes we'll typically cause them to blow as well.
|
|
//
|
|
// Basically as a result just perform an inflated estimate of what our
|
|
// command line will look like and test if it's > 8192 (we actually
|
|
// test against 6k to artificially inflate our estimate). If all else
|
|
// fails we'll fall back to the normal unix logic of testing the OS
|
|
// error code if we fail to spawn and automatically re-spawning the
|
|
// linker with smaller arguments.
|
|
//
|
|
// [1]: https://docs.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-createprocessa
|
|
// [2]: https://devblogs.microsoft.com/oldnewthing/?p=41553
|
|
#[cfg(windows)]
|
|
{
|
|
let estimated_command_line_len = self
|
|
.args
|
|
.iter()
|
|
.fold(0usize, |acc, a| acc.saturating_add(a.as_encoded_bytes().len()));
|
|
return estimated_command_line_len > 1024 * 6;
|
|
}
|
|
}
|
|
}
|
|
|
|
impl fmt::Debug for Command {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
self.command().fmt(f)
|
|
}
|
|
}
|