summaryrefslogtreecommitdiff
path: root/libs
diff options
context:
space:
mode:
authorRobin Gareus <robin@gareus.org>2014-03-13 16:50:44 +0100
committerRobin Gareus <robin@gareus.org>2014-03-13 16:58:07 +0100
commit543099afbafe83a0bb334f2a016c0d849fe2ca47 (patch)
tree21798ed902efe449dd329c556280fb5247a9be91 /libs
parentf48b5568883468e70a751ec1aa934e5a55bb7705 (diff)
rework SystemExec - use vfork wrapper (and lots of related stuff)
Diffstat (limited to 'libs')
-rw-r--r--libs/ardour/ardour/system_exec.h50
-rw-r--r--libs/ardour/system_exec.cc60
-rw-r--r--libs/ardour/vst_info_file.cc40
-rw-r--r--libs/ardour/wscript1
-rw-r--r--libs/pbd/pbd/system_exec.h2
-rw-r--r--libs/pbd/system_exec.cc20
-rw-r--r--libs/vfork/README44
-rw-r--r--libs/vfork/exec_wrapper.c101
-rw-r--r--libs/vfork/wscript28
9 files changed, 319 insertions, 27 deletions
diff --git a/libs/ardour/ardour/system_exec.h b/libs/ardour/ardour/system_exec.h
new file mode 100644
index 0000000000..40e429720e
--- /dev/null
+++ b/libs/ardour/ardour/system_exec.h
@@ -0,0 +1,50 @@
+/*
+ Copyright (C) 2010 Paul Davis
+ Copyright (C) 2010-2014 Robin Gareus <robin@gareus.org>
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+
+*/
+#ifndef _ardour_system_exec_h_
+#define _ardour_system_exec_h_
+
+#include "ardour/libardour_visibility.h"
+#include "pbd/system_exec.h"
+
+namespace ARDOUR {
+
+class LIBARDOUR_API SystemExec
+ : public PBD::SystemExec
+{
+
+public:
+ SystemExec (std::string c, std::string a = "");
+ SystemExec (std::string c, char ** a);
+ ~SystemExec ();
+
+ int start (int stderr_mode = 1) {
+ return PBD::SystemExec::start(stderr_mode, _vfork_exec_wrapper);
+ }
+
+private:
+ static char * _vfork_exec_wrapper;
+
+}; /* end class */
+
+}; /* end namespace */
+
+#endif /* _libpbd_system_exec_h_ */
+
+
diff --git a/libs/ardour/system_exec.cc b/libs/ardour/system_exec.cc
new file mode 100644
index 0000000000..c99863f2e5
--- /dev/null
+++ b/libs/ardour/system_exec.cc
@@ -0,0 +1,60 @@
+/*
+ Copyright (C) 2010 Paul Davis
+ Copyright (C) 2010-2014 Robin Gareus <robin@gareus.org>
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+
+*/
+
+#include <glibmm/miscutils.h>
+#include "pbd/pathscanner.h"
+#include "pbd/file_utils.h"
+#include "pbd/error.h"
+
+#include "ardour/filesystem_paths.h"
+#include "ardour/system_exec.h"
+
+using namespace ARDOUR;
+
+char * SystemExec::_vfork_exec_wrapper = NULL;
+
+static char *vfork_exec_wrapper_path() {
+ std::string vfork_exec_wrapper;
+ if (!PBD::find_file_in_search_path (
+ PBD::Searchpath(Glib::build_filename(ARDOUR::ardour_dll_directory(), "vfork")),
+ "ardour-exec-wrapper", vfork_exec_wrapper)) {
+ PBD::warning << "vfork exec wrapper not found..'" << endmsg;
+ return NULL;
+ }
+ return strdup(vfork_exec_wrapper.c_str());
+}
+
+SystemExec::SystemExec (std::string c, char ** a)
+ : PBD::SystemExec(c, a)
+{
+ if (!_vfork_exec_wrapper) {
+ _vfork_exec_wrapper = vfork_exec_wrapper_path();
+ }
+}
+
+SystemExec::SystemExec (std::string c, std::string a)
+ : PBD::SystemExec(c, a)
+{
+ if (!_vfork_exec_wrapper) {
+ _vfork_exec_wrapper = vfork_exec_wrapper_path();
+ }
+}
+
+SystemExec::~SystemExec() { }
diff --git a/libs/ardour/vst_info_file.cc b/libs/ardour/vst_info_file.cc
index fe434909f3..a0426edad1 100644
--- a/libs/ardour/vst_info_file.cc
+++ b/libs/ardour/vst_info_file.cc
@@ -40,12 +40,18 @@
#include <glib/gstdio.h>
#include <glibmm.h>
-#include "pbd/error.h"
-#ifndef VST_SCANNER_APP
-#include "pbd/system_exec.h"
+#ifdef VST_SCANNER_APP
+#define errormsg cerr
+#define warningmsg cerr
+#define endmsg endl
+#else
#include "ardour/plugin_manager.h" // scanner_bin_path
#include "ardour/rc_configuration.h"
+#include "ardour/system_exec.h"
+#include "pbd/error.h"
+#define errormsg PBD::error
+#define warningmsg PBD::warning
#endif
#include "ardour/filesystem_paths.h"
@@ -324,7 +330,7 @@ vstfx_write_info_file (FILE* fp, vector<VSTInfo *> *infos)
} else if (infos->size() == 1) {
vstfx_write_info_block(fp, infos->front());
} else {
- PBD::error << "Zero plugins in VST." << endmsg; // XXX here? rather make this impossible before if it ain't already.
+ errormsg << "Zero plugins in VST." << endmsg; // XXX here? rather make this impossible before if it ain't already.
}
}
@@ -508,7 +514,7 @@ vstfx_get_info_from_file(const char* dllpath, vector<VSTInfo*> *infos)
rv = vstfx_load_info_file(infofile, infos);
fclose (infofile);
if (!rv) {
- PBD::warning << "Cannot get VST information form " << dllpath << ": info file load failed." << endmsg;
+ warningmsg << "Cannot get VST information form " << dllpath << ": info file load failed." << endmsg;
}
}
return rv;
@@ -774,7 +780,7 @@ vstfx_instantiate_and_get_info_lx (
VSTHandle* h;
VSTState* vstfx;
if (!(h = vstfx_load(dllpath))) {
- PBD::warning << "Cannot get LinuxVST information from " << dllpath << ": load failed." << endmsg;
+ warningmsg << "Cannot get LinuxVST information from " << dllpath << ": load failed." << endmsg;
return false;
}
@@ -782,7 +788,7 @@ vstfx_instantiate_and_get_info_lx (
if (!(vstfx = vstfx_instantiate(h, simple_master_callback, 0))) {
vstfx_unload(h);
- PBD::warning << "Cannot get LinuxVST information from " << dllpath << ": instantiation failed." << endmsg;
+ warningmsg << "Cannot get LinuxVST information from " << dllpath << ": instantiation failed." << endmsg;
return false;
}
@@ -803,7 +809,7 @@ vstfx_instantiate_and_get_info_fst (
VSTHandle* h;
VSTState* vstfx;
if(!(h = fst_load(dllpath))) {
- PBD::warning << "Cannot get Windows VST information from " << dllpath << ": load failed." << endmsg;
+ warningmsg << "Cannot get Windows VST information from " << dllpath << ": load failed." << endmsg;
return false;
}
@@ -812,7 +818,7 @@ vstfx_instantiate_and_get_info_fst (
if(!(vstfx = fst_instantiate(h, simple_master_callback, 0))) {
fst_unload(&h);
vstfx_current_loading_id = 0;
- PBD::warning << "Cannot get Windows VST information from " << dllpath << ": instantiation failed." << endmsg;
+ warningmsg << "Cannot get Windows VST information from " << dllpath << ": instantiation failed." << endmsg;
return false;
}
vstfx_current_loading_id = 0;
@@ -834,14 +840,14 @@ static char * _errorlog_dll = 0;
static void parse_scanner_output (std::string msg, size_t /*len*/)
{
if (!_errorlog_fd && !_errorlog_dll) {
- PBD::error << "VST scanner: " << msg;
+ errormsg << "VST scanner: " << msg;
return;
}
if (!_errorlog_fd) {
if (!(_errorlog_fd = fopen(vstfx_errorfile_path(_errorlog_dll, 0).c_str(), "w"))) {
if (!(_errorlog_fd = fopen(vstfx_errorfile_path(_errorlog_dll, 1).c_str(), "w"))) {
- PBD::error << "Cannot create plugin error-log for plugin " << _errorlog_dll;
+ errormsg << "Cannot create plugin error-log for plugin " << _errorlog_dll;
free(_errorlog_dll);
_errorlog_dll = NULL;
}
@@ -851,7 +857,7 @@ static void parse_scanner_output (std::string msg, size_t /*len*/)
if (_errorlog_fd) {
fprintf (_errorlog_fd, "%s\n", msg.c_str());
} else {
- PBD::error << "VST scanner: " << msg;
+ errormsg << "VST scanner: " << msg;
}
}
@@ -907,11 +913,11 @@ vstfx_get_info (const char* dllpath, enum ARDOUR::PluginType type, enum VSTScanM
argp[2] = 0;
set_error_log(dllpath);
- PBD::SystemExec scanner (scanner_bin_path, argp);
+ ARDOUR::SystemExec scanner (scanner_bin_path, argp);
PBD::ScopedConnectionList cons;
scanner.ReadStdout.connect_same_thread (cons, boost::bind (&parse_scanner_output, _1 ,_2));
if (scanner.start (2 /* send stderr&stdout via signal */)) {
- PBD::error << "Cannot launch VST scanner app '" << scanner_bin_path << "': "<< strerror(errno) << endmsg;
+ errormsg << "Cannot launch VST scanner app '" << scanner_bin_path << "': "<< strerror(errno) << endmsg;
close_error_log();
return infos;
} else {
@@ -977,7 +983,7 @@ vstfx_get_info (const char* dllpath, enum ARDOUR::PluginType type, enum VSTScanM
/* crate cache/whitelist */
infofile = vstfx_infofile_for_write (dllpath);
if (!infofile) {
- PBD::warning << "Cannot cache VST information for " << dllpath << ": cannot create new FST info file." << endmsg;
+ warningmsg << "Cannot cache VST information for " << dllpath << ": cannot create new FST info file." << endmsg;
return infos;
} else {
vstfx_write_info_file (infofile, infos);
@@ -1005,7 +1011,7 @@ get_personal_vst_blacklist_dir() {
/* if the directory doesn't exist, try to create it */
if (!Glib::file_test (dir, Glib::FILE_TEST_IS_DIR)) {
if (g_mkdir (dir.c_str (), 0700)) {
- PBD::error << "Cannot create VST blacklist folder '" << dir << "'" << endmsg;
+ errormsg << "Cannot create VST blacklist folder '" << dir << "'" << endmsg;
//exit(1);
}
}
@@ -1018,7 +1024,7 @@ get_personal_vst_info_cache_dir() {
/* if the directory doesn't exist, try to create it */
if (!Glib::file_test (dir, Glib::FILE_TEST_IS_DIR)) {
if (g_mkdir (dir.c_str (), 0700)) {
- PBD::error << "Cannot create VST info folder '" << dir << "'" << endmsg;
+ errormsg << "Cannot create VST info folder '" << dir << "'" << endmsg;
//exit(1);
}
}
diff --git a/libs/ardour/wscript b/libs/ardour/wscript
index bbe7f56aa1..260c334a30 100644
--- a/libs/ardour/wscript
+++ b/libs/ardour/wscript
@@ -197,6 +197,7 @@ libardour_sources = [
'speakers.cc',
'srcfilesource.cc',
'strip_silence.cc',
+ 'system_exec.cc',
'revision.cc',
'tape_file_matcher.cc',
'template_utils.cc',
diff --git a/libs/pbd/pbd/system_exec.h b/libs/pbd/pbd/system_exec.h
index 0ca523085a..1232175fec 100644
--- a/libs/pbd/pbd/system_exec.h
+++ b/libs/pbd/pbd/system_exec.h
@@ -107,7 +107,7 @@ class LIBPBD_API SystemExec
* @return If the process is already running or was launched successfully
* the function returns zero (0). A negative number indicates an error.
*/
- int start (int stderr_mode = 1);
+ int start (int stderr_mode, const char *_vfork_exec_wrapper);
/** kill running child-process
*
* if a child process exists trt to shut it down by closing its STDIN.
diff --git a/libs/pbd/system_exec.cc b/libs/pbd/system_exec.cc
index ac0d37f0d0..7814cce96b 100644
--- a/libs/pbd/system_exec.cc
+++ b/libs/pbd/system_exec.cc
@@ -43,6 +43,8 @@
#endif
+#define USE_VFORK
+
#include "pbd/system_exec.h"
using namespace std;
@@ -51,7 +53,7 @@ using namespace PBD;
static void * interposer_thread (void *arg);
static void close_fd (int& fd) { if (fd >= 0) ::close (fd); fd = -1; }
-#ifndef PLATFORM_WINDOWS
+#if (!defined PLATFORM_WINDOWS && defined NO_VFORK)
/*
* This function was part of libasyncns.
* LGPL v2.1
@@ -146,7 +148,7 @@ static int close_allv(const int except_fds[]) {
return 0;
}
-#endif /* not on windows */
+#endif /* not on windows, nor vfork */
SystemExec::SystemExec (std::string c, std::string a)
@@ -324,7 +326,7 @@ SystemExec::is_running ()
}
int
-SystemExec::start (int stderr_mode)
+SystemExec::start (int stderr_mode, const char * /*vfork_exec_wrapper*/)
{
char* working_dir = 0;
@@ -596,7 +598,7 @@ SystemExec::is_running ()
}
int
-SystemExec::start (int stderr_mode)
+SystemExec::start (int stderr_mode, const char *vfork_exec_wrapper)
{
if (is_running()) {
return 0; // mmh what to return here?
@@ -608,7 +610,7 @@ SystemExec::start (int stderr_mode)
return -1;
}
-#ifdef USE_VFORK
+#ifndef NO_VFORK
r = ::vfork();
#else
r = ::fork();
@@ -631,11 +633,11 @@ SystemExec::start (int stderr_mode)
/* child process returned from execve */
pid=0;
close_fd(pok[0]);
+ close_fd(pok[1]);
close_fd(pin[1]);
close_fd(pin[0]);
close_fd(pout[1]);
close_fd(pout[0]);
- pin[1] = -1;
return -3;
} else if ( n==-1 ) {
if ( errno==EAGAIN || errno==EINTR )
@@ -659,7 +661,7 @@ SystemExec::start (int stderr_mode)
return 0; /* all systems go - return to main */
}
-#ifndef USE_VFORK
+#ifdef NO_VFORK
/* child process - exec external process */
close_fd(pok[0]);
::fcntl(pok[1], F_SETFD, FD_CLOEXEC);
@@ -713,12 +715,12 @@ SystemExec::start (int stderr_mode)
#else
/* XXX this should be done before vfork()
- * calling malloc here only increases the time we vfork() blocks
+ * calling malloc here only increases the time vfork() blocks
*/
int argn = 0;
for (int i=0;argp[i];++i) { argn++; }
char **argx = (char **) malloc((argn + 10) * sizeof(char *));
- argx[0] = strdup("/home/rgareus/src/git/ardourCairoCanvas/tools/exec_wrapper"); // XXX TODO
+ argx[0] = strdup(vfork_exec_wrapper); // XXX
#define FDARG(NUM, FDN) \
argx[NUM] = (char*) calloc(6, sizeof(char)); snprintf(argx[NUM], 6, "%d", FDN);
diff --git a/libs/vfork/README b/libs/vfork/README
new file mode 100644
index 0000000000..fb591a6984
--- /dev/null
+++ b/libs/vfork/README
@@ -0,0 +1,44 @@
+vfork-exec-wrapper
+==================
+
+A tiny tool that redirects stdio file-descriptors and executes a program.
+
+Motivation
+----------
+
+Ardour can start external helper applications for various purposes
+(e.g. video-server, video-monitor, plugin-scanner, post-export scripts,...)
+and has the need to bidirectionally communicate with the external app.
+
+On POSIX platforms (OSX, GNU/Linux, BSD,..) launching an external app is a
+combination of fork() and execve(2). The problem with that is that fork(2)
+duplicates the complete page-table (incl. allocated locked memory, and
+file-descriptors) which - even if fork(2) is done from a non-realtime
+thread - may cause audio I/O glitches or worse out-of-memory errors if
+the mlock(2) limit is reached.
+
+vfork(2) on the other hand "is a special case of clone(2). It is used to
+create new processes without copying the page tables of the parent process.
+It may be useful in performance-sensitive applications where a child is
+created which then immediately issues an execve(2)." [vfork man page].
+
+The problem with vfork(2) is that file-descriptors are not cloned, which
+makes bi-directional communication impossible without additional work.
+This is exactly what this vfork-exec-wrapper does: It takes a list of
+file-descriptors, re-directs them to stdio and calls execve(2) again.
+
+This code was previously in pbd/system_exec.cc (done after fork(2),
+which become a NOOP with vfork(2)).
+
+Usage
+-----
+
+ardour-exec-wrapper <file-des> <mode> <nice> <command> [args]
+
+ardour-exec-wrapper takes three pairs of file-descriptors, stderr mode,
+nice-level followed by the command to execute and optional arguments.
+
+The first set FDs is used to communicate failure back to the parent process.
+They are closed if execve(2) succeeds. The following two FDs are stdin and
+stdout. The mode specifies handling of stderr: 0: keep stderr, 1: close and
+ignore, 2: merge stderr into stdout.
diff --git a/libs/vfork/exec_wrapper.c b/libs/vfork/exec_wrapper.c
new file mode 100644
index 0000000000..4beb7a3b87
--- /dev/null
+++ b/libs/vfork/exec_wrapper.c
@@ -0,0 +1,101 @@
+#include <stdio.h>
+#include <unistd.h>
+#include <stdlib.h>
+#include <string.h>
+#include <fcntl.h>
+#include <signal.h>
+
+#ifndef STDIN_FILENO
+#define STDIN_FILENO 0
+#endif
+#ifndef STDOUT_FILENO
+#define STDOUT_FILENO 1
+#endif
+#ifndef STDERR_FILENO
+#define STDERR_FILENO 2
+#endif
+
+extern char **environ;
+static void close_fd (int *fd) { if ((*fd) >= 0) close (*fd); *fd = -1; }
+
+int main(int argc, char *argv[]) {
+ if (argc < 10) {
+ // TODO: if argv > 3, assume pok[] is given, notifify parent.
+ // usage() and a man-page (help2man) would not be bad, either :)
+ return -1;
+ }
+
+ int pok[2];
+ int pin[2];
+ int pout[2];
+
+ pok[0] = atoi(argv[1]);
+ pok[1] = atoi(argv[2]);
+ pin[0] = atoi(argv[3]);
+ pin[1] = atoi(argv[4]);
+ pout[0] = atoi(argv[5]);
+ pout[1] = atoi(argv[6]);
+
+ int stderr_mode = atoi(argv[7]);
+ int nicelevel = atoi(argv[8]);
+
+ /* vfork()ed child process - exec external process */
+ close_fd(&pok[0]);
+ fcntl(pok[1], F_SETFD, FD_CLOEXEC);
+
+ close_fd(&pin[1]);
+ if (pin[0] != STDIN_FILENO) {
+ dup2(pin[0], STDIN_FILENO);
+ }
+ close_fd(&pin[0]);
+ close_fd(&pout[0]);
+ if (pout[1] != STDOUT_FILENO) {
+ dup2(pout[1], STDOUT_FILENO);
+ }
+
+ if (stderr_mode == 2) {
+ /* merge STDERR into output */
+ if (pout[1] != STDERR_FILENO) {
+ dup2(pout[1], STDERR_FILENO);
+ }
+ } else if (stderr_mode == 1) {
+ /* ignore STDERR */
+ close(STDERR_FILENO);
+ } else {
+ /* keep STDERR */
+ }
+
+ if (pout[1] != STDOUT_FILENO && pout[1] != STDERR_FILENO) {
+ close_fd(&pout[1]);
+ }
+
+ if (nicelevel !=0) {
+ nice(nicelevel);
+ }
+
+ /* copy current environment */
+ char **envp = NULL;
+ int i=0;
+ envp = (char **) calloc(1, sizeof(char*));
+ for (i=0;environ[i];++i) {
+ envp[i] = strdup(environ[i]);
+ envp = (char **) realloc(envp, (i+2) * sizeof(char*));
+ }
+ envp[i] = 0;
+
+#ifdef HAVE_SIGSET
+ sigset(SIGPIPE, SIG_DFL);
+#else
+ signal(SIGPIPE, SIG_DFL);
+#endif
+
+ /* all systems go */
+ execve(argv[9], &argv[9], envp);
+
+ /* if we reach here something went wrong.. */
+ char buf = 0;
+ (void) write(pok[1], &buf, 1 );
+ close_fd(&pok[1]);
+ exit(-1);
+ return -1;
+}
diff --git a/libs/vfork/wscript b/libs/vfork/wscript
new file mode 100644
index 0000000000..1301f215c2
--- /dev/null
+++ b/libs/vfork/wscript
@@ -0,0 +1,28 @@
+#!/usr/bin/env python
+from waflib.extras import autowaf as autowaf
+from waflib import TaskGen
+import os
+import sys
+
+# Mandatory variables
+top = '.'
+out = 'build'
+
+def options(opt):
+ autowaf.set_options(opt)
+
+def configure(conf):
+ conf.load('compiler_c')
+ autowaf.configure(conf)
+
+def build(bld):
+ if bld.env['build_target'] == 'mingw':
+ return
+ obj = bld (features = 'c cprogram')
+ obj.source = 'exec_wrapper.c'
+ obj.target = 'ardour-exec-wrapper'
+ obj.install_path = os.path.join(bld.env['LIBDIR'], 'ardour3/vfork')
+ obj.defines = [
+ '_POSIX_SOURCE',
+ '_XOPEN_SOURCE=700',
+ ]