blob: 4807df4f8c7890e752abc405c5e9d811629b1b02 [file] [log] [blame]
Damien Martin-Guillerezf88f4d82015-09-25 13:56:55 +00001// Copyright 2014 The Bazel Authors. All rights reserved.
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +01002//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
Mostyn Bramley-Moore44e8d102015-11-10 11:27:39 +000015#include <errno.h> // errno, ENAMETOOLONG
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010016#include <limits.h>
17#include <string.h> // strerror
Mostyn Bramley-Moore44e8d102015-11-10 11:27:39 +000018#include <sys/cygwin.h>
Googler11565c12015-07-23 12:03:53 +000019#include <sys/socket.h>
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010020#include <sys/statfs.h>
21#include <unistd.h>
22
Dmitry Lomov78c0cc72015-08-11 16:44:21 +000023#include <windows.h>
24
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010025#include <cstdlib>
26#include <cstdio>
Lukacs Berki68cb41a2016-07-06 11:43:37 +000027#include <thread> // NOLINT (to slience Google-internal linter)
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010028
Han-Wen Nienhuys36fbe632015-04-21 13:58:08 +000029#include "src/main/cpp/blaze_util.h"
Thiago Farina7f9357f2015-04-23 13:57:43 +000030#include "src/main/cpp/blaze_util_platform.h"
Han-Wen Nienhuys36fbe632015-04-21 13:58:08 +000031#include "src/main/cpp/util/errors.h"
Thiago Farina7f9357f2015-04-23 13:57:43 +000032#include "src/main/cpp/util/exit_code.h"
Han-Wen Nienhuys36fbe632015-04-21 13:58:08 +000033#include "src/main/cpp/util/file.h"
34#include "src/main/cpp/util/strings.h"
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010035
36namespace blaze {
37
Thiago Farina241f46c2015-04-13 14:33:30 +000038using blaze_util::die;
39using blaze_util::pdie;
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010040using std::string;
Dmitry Lomovf7d3eb72015-08-13 20:45:09 +000041using std::vector;
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010042
Lukacs Berki497d8242016-04-28 07:21:26 +000043static void PrintError(const string& op) {
44 DWORD last_error = ::GetLastError();
45 if (last_error == 0) {
46 return;
47 }
48
49 char* message_buffer;
50 size_t size = FormatMessageA(
51 FORMAT_MESSAGE_ALLOCATE_BUFFER
52 | FORMAT_MESSAGE_FROM_SYSTEM
53 | FORMAT_MESSAGE_IGNORE_INSERTS,
54 NULL,
55 last_error,
56 MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
57 (LPSTR) &message_buffer,
58 0,
59 NULL);
60
61 fprintf(stderr, "ERROR: %s: %s (%d)\n",
62 op.c_str(), message_buffer, last_error);
63 LocalFree(message_buffer);
64}
65
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010066void WarnFilesystemType(const string& output_base) {
67}
68
69string GetSelfPath() {
70 char buffer[PATH_MAX] = {};
Dmitry Lomov31574122016-02-17 16:07:31 +000071 if (!GetModuleFileName(0, buffer, sizeof(buffer))) {
72 pdie(255, "Error %u getting executable file name\n", GetLastError());
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010073 }
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010074 return string(buffer);
75}
76
Kristina Chodorow93963352015-03-20 19:11:19 +000077string GetOutputRoot() {
Dmitry Lomovbc84cc82016-04-15 14:05:24 +000078 char* tmpdir = getenv("TMPDIR");
79 if (tmpdir == 0 || strlen(tmpdir) == 0) {
80 return "/var/tmp";
81 } else {
82 return string(tmpdir);
83 }
Kristina Chodorow93963352015-03-20 19:11:19 +000084}
85
Thiago Farina8a67da42015-05-05 18:04:50 +000086uint64_t MonotonicClock() {
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010087 struct timespec ts = {};
88 clock_gettime(CLOCK_MONOTONIC, &ts);
89 return ts.tv_sec * 1000000000LL + ts.tv_nsec;
90}
91
Thiago Farina8a67da42015-05-05 18:04:50 +000092uint64_t ProcessClock() {
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010093 struct timespec ts = {};
94 clock_gettime(CLOCK_PROCESS_CPUTIME_ID, &ts);
95 return ts.tv_sec * 1000000000LL + ts.tv_nsec;
96}
97
98void SetScheduling(bool batch_cpu_scheduling, int io_nice_level) {
99 // TODO(bazel-team): There should be a similar function on Windows.
100}
101
102string GetProcessCWD(int pid) {
103 char server_cwd[PATH_MAX] = {};
104 if (readlink(
Googler9588b812015-07-23 11:49:37 +0000105 ("/proc/" + ToString(pid) + "/cwd").c_str(),
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +0100106 server_cwd, sizeof(server_cwd)) < 0) {
107 return "";
108 }
109
110 return string(server_cwd);
111}
112
Thiago Farina01f36002015-04-08 15:59:08 +0000113bool IsSharedLibrary(const string &filename) {
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +0100114 return blaze_util::ends_with(filename, ".dll");
115}
116
117string GetDefaultHostJavabase() {
118 const char *javahome = getenv("JAVA_HOME");
119 if (javahome == NULL) {
120 die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR,
121 "Error: JAVA_HOME not set.");
122 }
123 return javahome;
124}
125
Dmitry Lomovb5ff50b2016-02-03 19:35:42 +0000126namespace {
127void ReplaceAll(
128 std::string* s, const std::string& pattern, const std::string with) {
129 size_t pos = 0;
130 while (true) {
131 size_t pos = s->find(pattern, pos);
132 if (pos == std::string::npos) return;
133 *s = s->replace(pos, pattern.length(), with);
134 pos += with.length();
135 }
136}
Dmitry Lomovb5ff50b2016-02-03 19:35:42 +0000137
Lukacs Berki7494c922016-04-27 11:17:51 +0000138// Max command line length is per CreateProcess documentation
139// (https://msdn.microsoft.com/en-us/library/ms682425(VS.85).aspx)
Lukacs Berki83c78b12016-06-24 12:35:08 +0000140//
141// Quoting rules are described here:
142// https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/
143
Lukacs Berki7494c922016-04-27 11:17:51 +0000144static const int MAX_CMDLINE_LENGTH = 32768;
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000145
Lukacs Berki7494c922016-04-27 11:17:51 +0000146struct CmdLine {
147 char cmdline[MAX_CMDLINE_LENGTH];
148};
149static void CreateCommandLine(CmdLine* result, const string& exe,
150 const vector<string>& args_vector) {
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000151 string cmdline;
152 bool first = true;
153 for (const auto& s : args_vector) {
154 if (first) {
155 first = false;
156 // Skip first argument, instead use quoted executable name with ".exe"
157 // suffix.
158 cmdline.append("\"");
159 cmdline.append(exe);
160 cmdline.append(".exe");
161 cmdline.append("\"");
162 continue;
163 } else {
164 cmdline.append(" ");
165 }
Dmitry Lomovb5ff50b2016-02-03 19:35:42 +0000166
Lukacs Berki83c78b12016-06-24 12:35:08 +0000167 bool has_space = s.find(" ") != string::npos;
168
169 if (has_space) {
170 cmdline.append("\"");
Dmitry Lomovb5ff50b2016-02-03 19:35:42 +0000171 }
172
Lukacs Berki83c78b12016-06-24 12:35:08 +0000173 std::string::const_iterator it = s.begin();
174 while (it != s.end()) {
175 char ch = *it++;
176 switch (ch) {
177 case '"':
178 // Escape double quotes
179 cmdline.append("\\\"");
180 break;
181
182 case '\\':
183 if (it == s.end()) {
184 // Backslashes at the end of the string are quoted if we add quotes
185 cmdline.append(has_space ? "\\\\" : "\\");
186 } else {
187 // Backslashes everywhere else are quoted if they are followed by a
188 // quote or a backslash
189 cmdline.append(*it == '"' || *it == '\\' ? "\\\\" : "\\");
190 }
191 break;
192
193 default:
194 cmdline.append(1, ch);
195 }
196 }
197
198 if (has_space) {
Dmitry Lomovb5ff50b2016-02-03 19:35:42 +0000199 cmdline.append("\"");
Dmitry Lomovb5ff50b2016-02-03 19:35:42 +0000200 }
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000201 }
202
Lukacs Berki2236f7d2016-04-28 08:49:43 +0000203 if (cmdline.size() >= MAX_CMDLINE_LENGTH) {
Lukacs Berki7494c922016-04-27 11:17:51 +0000204 pdie(blaze_exit_code::INTERNAL_ERROR,
205 "Command line too long: %s", cmdline.c_str());
206 }
207
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000208 // Copy command line into a mutable buffer.
209 // CreateProcess is allowed to mutate its command line argument.
Lukacs Berki7494c922016-04-27 11:17:51 +0000210 strncpy(result->cmdline, cmdline.c_str(), MAX_CMDLINE_LENGTH - 1);
Lukacs Berki2236f7d2016-04-28 08:49:43 +0000211 result->cmdline[MAX_CMDLINE_LENGTH - 1] = 0;
Lukacs Berki7494c922016-04-27 11:17:51 +0000212}
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000213
Lukacs Berki7494c922016-04-27 11:17:51 +0000214} // namespace
215
216string RunProgram(
217 const string& exe, const vector<string>& args_vector) {
218 SECURITY_ATTRIBUTES sa = {0};
219
220 sa.nLength = sizeof(SECURITY_ATTRIBUTES);
221 sa.bInheritHandle = TRUE;
222 sa.lpSecurityDescriptor = NULL;
223
224 HANDLE pipe_read, pipe_write;
225 if (!CreatePipe(&pipe_read, &pipe_write, &sa, 0)) {
226 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "CreatePipe");
227 }
228
229 if (!SetHandleInformation(pipe_read, HANDLE_FLAG_INHERIT, 0)) {
230 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "SetHandleInformation");
231 }
232
233 PROCESS_INFORMATION processInfo = {0};
234 STARTUPINFO startupInfo = {0};
235
236 startupInfo.hStdError = pipe_write;
237 startupInfo.hStdOutput = pipe_write;
238 startupInfo.dwFlags |= STARTF_USESTDHANDLES;
239 CmdLine cmdline;
240 CreateCommandLine(&cmdline, exe, args_vector);
241
242 bool ok = CreateProcess(
243 NULL, // _In_opt_ LPCTSTR lpApplicationName,
244 // _Inout_opt_ LPTSTR lpCommandLine,
245 cmdline.cmdline,
246 NULL, // _In_opt_ LPSECURITY_ATTRIBUTES lpProcessAttributes,
247 NULL, // _In_opt_ LPSECURITY_ATTRIBUTES lpThreadAttributes,
248 true, // _In_ BOOL bInheritHandles,
249 0, // _In_ DWORD dwCreationFlags,
250 NULL, // _In_opt_ LPVOID lpEnvironment,
251 NULL, // _In_opt_ LPCTSTR lpCurrentDirectory,
252 &startupInfo, // _In_ LPSTARTUPINFO lpStartupInfo,
253 &processInfo); // _Out_ LPPROCESS_INFORMATION lpProcessInformation
254
255 if (!ok) {
Dmitry Lomov42d82902016-07-15 13:26:57 +0000256 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR,
257 "RunProgram/CreateProcess: Error %d while executing %s",
258 GetLastError(), cmdline.cmdline);
Lukacs Berki7494c922016-04-27 11:17:51 +0000259 }
260
261 CloseHandle(pipe_write);
262 std::string result = "";
263 DWORD bytes_read;
264 CHAR buf[1024];
265
266 for (;;) {
267 ok = ::ReadFile(pipe_read, buf, 1023, &bytes_read, NULL);
268 if (!ok || bytes_read == 0) {
269 break;
270 }
271 buf[bytes_read] = 0;
272 result = result + buf;
273 }
274
275 CloseHandle(pipe_read);
276 CloseHandle(processInfo.hProcess);
277 CloseHandle(processInfo.hThread);
278
279 return result;
280}
281
282// If we pass DETACHED_PROCESS to CreateProcess(), cmd.exe appropriately
283// returns the command prompt when the client terminates. msys2, however, in
284// its infinite wisdom, waits until the *server* terminates and cannot be
285// convinced otherwise.
286//
287// So, we first pretend to be a POSIX daemon so that msys2 knows about our
288// intentions and *then* we call CreateProcess(). Life ain't easy.
289static bool DaemonizeOnWindows() {
290 if (fork() > 0) {
291 // We are the original client process.
292 return true;
293 }
294
295 if (fork() > 0) {
296 // We are the child of the original client process. Terminate so that the
297 // actual server is not a child process of the client.
298 exit(0);
299 }
300
301 setsid();
302 // Contrary to the POSIX version, we are not closing the three standard file
303 // descriptors here. CreateProcess() will take care of that and it's useful
304 // to see the error messages in ExecuteDaemon() on the console of the client.
305 return false;
306}
307
Lukacs Berki1977d922016-05-02 09:31:37 +0000308// Keeping an eye on the server process on Windows is not implemented yet.
309// TODO(lberki): Implement this, because otherwise if we can't start up a server
310// process, the client will hang until it times out.
311class DummyBlazeServerStartup : public BlazeServerStartup {
312 public:
313 DummyBlazeServerStartup() {}
314 virtual ~DummyBlazeServerStartup() {}
Lukacs Berki9d52bc52016-06-07 11:11:04 +0000315 virtual bool IsStillAlive() { return true; }
Lukacs Berki1977d922016-05-02 09:31:37 +0000316};
317
318void ExecuteDaemon(const string& exe, const std::vector<string>& args_vector,
319 const string& daemon_output, const string& server_dir,
320 BlazeServerStartup** server_startup) {
Lukacs Berki7494c922016-04-27 11:17:51 +0000321 if (DaemonizeOnWindows()) {
322 // We are the client process
Lukacs Berki1977d922016-05-02 09:31:37 +0000323 *server_startup = new DummyBlazeServerStartup();
324 return;
Lukacs Berki7494c922016-04-27 11:17:51 +0000325 }
326
327 SECURITY_ATTRIBUTES sa;
Lukacs Berki7494c922016-04-27 11:17:51 +0000328 sa.nLength = sizeof(SECURITY_ATTRIBUTES);
Lukacs Berki33d7bdb2016-06-24 07:21:19 +0000329 // We redirect stdout and stderr by telling CreateProcess to use a file handle
330 // we open below and these handles must be inheriatable
Lukacs Berki7494c922016-04-27 11:17:51 +0000331 sa.bInheritHandle = TRUE;
332 sa.lpSecurityDescriptor = NULL;
333
Lukacs Berki33d7bdb2016-06-24 07:21:19 +0000334 HANDLE output_file = CreateFile(
335 ConvertPath(daemon_output).c_str(), // lpFileName
336 GENERIC_READ | GENERIC_WRITE, // dwDesiredAccess
337 // So that the file can be read while the server is running
338 FILE_SHARE_READ, // dwShareMode
339 &sa, // lpSecurityAttributes
340 CREATE_ALWAYS, // dwCreationDisposition
341 FILE_ATTRIBUTE_NORMAL, // dwFlagsAndAttributes
342 NULL); // hTemplateFile
Lukacs Berki7494c922016-04-27 11:17:51 +0000343
Lukacs Berki33d7bdb2016-06-24 07:21:19 +0000344 if (output_file == INVALID_HANDLE_VALUE) {
Lukacs Berki7494c922016-04-27 11:17:51 +0000345 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "CreateFile");
346 }
347
348 HANDLE pipe_read, pipe_write;
349 if (!CreatePipe(&pipe_read, &pipe_write, &sa, 0)) {
350 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "CreatePipe");
351 }
352
353 if (!SetHandleInformation(pipe_write, HANDLE_FLAG_INHERIT, 0)) {
354 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "SetHandleInformation");
355 }
356
357 PROCESS_INFORMATION processInfo = {0};
358 STARTUPINFO startupInfo = {0};
359
360 startupInfo.hStdInput = pipe_read;
361 startupInfo.hStdError = output_file;
362 startupInfo.hStdOutput = output_file;
363 startupInfo.dwFlags |= STARTF_USESTDHANDLES;
364 CmdLine cmdline;
365 CreateCommandLine(&cmdline, exe, args_vector);
366
367 // Propagate BAZEL_SH environment variable to a sub-process.
368 // todo(dslomov): More principled approach to propagating
369 // environment variables.
370 SetEnvironmentVariable("BAZEL_SH", getenv("BAZEL_SH"));
371
372 bool ok = CreateProcess(
Dmitry Lomov42d82902016-07-15 13:26:57 +0000373 NULL, // _In_opt_ LPCTSTR lpApplicationName,
Lukacs Berki7494c922016-04-27 11:17:51 +0000374 // _Inout_opt_ LPTSTR lpCommandLine,
375 cmdline.cmdline,
Dmitry Lomov42d82902016-07-15 13:26:57 +0000376 NULL, // _In_opt_ LPSECURITY_ATTRIBUTES lpProcessAttributes,
377 NULL, // _In_opt_ LPSECURITY_ATTRIBUTES lpThreadAttributes,
378 TRUE, // _In_ BOOL bInheritHandles,
Lukacs Berki7494c922016-04-27 11:17:51 +0000379 // _In_ DWORD dwCreationFlags,
Dmitry Lomov42d82902016-07-15 13:26:57 +0000380 DETACHED_PROCESS | CREATE_NEW_PROCESS_GROUP,
Lukacs Berki7494c922016-04-27 11:17:51 +0000381 NULL, // _In_opt_ LPVOID lpEnvironment,
382 NULL, // _In_opt_ LPCTSTR lpCurrentDirectory,
383 &startupInfo, // _In_ LPSTARTUPINFO lpStartupInfo,
384 &processInfo); // _Out_ LPPROCESS_INFORMATION lpProcessInformation
385
386 if (!ok) {
Dmitry Lomov42d82902016-07-15 13:26:57 +0000387 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR,
388 "ExecuteDaemon/CreateProcess: error %u executing: %s\n",
389 GetLastError(), cmdline.cmdline);
Lukacs Berki7494c922016-04-27 11:17:51 +0000390 }
391
392 CloseHandle(output_file);
393 CloseHandle(pipe_write);
394 CloseHandle(pipe_read);
395
Lukacs Berkid825a3d2016-06-23 11:10:02 +0000396 string pid_string = ToString(processInfo.dwProcessId);
Lukacs Berkie33cf0f2016-04-28 11:04:59 +0000397 string pid_file = blaze_util::JoinPath(server_dir, ServerPidFile());
398 if (!WriteFile(pid_string, pid_file)) {
399 // Not a lot we can do if this fails
400 fprintf(stderr, "Cannot write PID file %s\n", pid_file.c_str());
401 }
402
Lukacs Berki7494c922016-04-27 11:17:51 +0000403 CloseHandle(processInfo.hProcess);
404 CloseHandle(processInfo.hThread);
405
406 exit(0);
407}
408
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000409void BatchWaiterThread(HANDLE java_handle) {
410 WaitForSingleObject(java_handle, INFINITE);
411}
412
413static void MingwSignalHandler(int signum) {
414 // Java process will be terminated because we set the job to terminate if its
415 // handle is closed.
416 //
417 // Note that this is different how interruption is handled on Unix, where the
418 // Java process sets up a signal handler for SIGINT itself. That cannot be
419 // done on Windows without using native code, and it's better to have as
420 // little JNI as possible. The most important part of the cleanup after
421 // termination (killing all child processes) happens automatically on Windows
422 // anyway, since we put the batch Java process in its own job which does not
423 // allow breakaway processes.
424 exit(blaze_exit_code::ExitCode::INTERRUPTED);
425}
426
Lukacs Berki23cf3962016-07-19 09:28:23 +0000427// Returns whether assigning the given process to a job failed because nested
428// jobs are not available on the current system.
429static bool IsFailureDueToNestedJobsNotSupported(HANDLE process) {
430 BOOL is_in_job;
431 if (!IsProcessInJob(process, NULL, &is_in_job)) {
432 PrintError("IsProcessInJob()");
433 return false;
434 }
435
436 if (!is_in_job) {
437 // Not in a job.
438 return false;
439 }
440
441 OSVERSIONINFOEX version_info;
442 version_info.dwOSVersionInfoSize = sizeof(version_info);
443 if (!GetVersionEx(reinterpret_cast<OSVERSIONINFO*>(&version_info))) {
444 PrintError("GetVersionEx()");
445 return false;
446 }
447
448 return version_info.dwMajorVersion < 6
449 || version_info.dwMajorVersion == 6 && version_info.dwMinorVersion <= 1;
450}
451
Lukacs Berki7494c922016-04-27 11:17:51 +0000452// Run the given program in the current working directory,
453// using the given argument vector.
454void ExecuteProgram(
455 const string& exe, const vector<string>& args_vector) {
456 CmdLine cmdline;
457 CreateCommandLine(&cmdline, exe, args_vector);
458
459 STARTUPINFO startupInfo = {0};
460 PROCESS_INFORMATION processInfo = {0};
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000461
Dmitry Lomov45d07a12016-02-03 21:43:47 +0000462 // Propagate BAZEL_SH environment variable to a sub-process.
463 // todo(dslomov): More principled approach to propagating
464 // environment variables.
465 SetEnvironmentVariable("BAZEL_SH", getenv("BAZEL_SH"));
466
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000467 HANDLE job = CreateJobObject(NULL, NULL);
468 if (job == NULL) {
469 pdie(255, "Error %u while creating job\n", GetLastError());
470 }
471
472 JOBOBJECT_EXTENDED_LIMIT_INFORMATION job_info = { 0 };
473 job_info.BasicLimitInformation.LimitFlags =
474 JOB_OBJECT_LIMIT_KILL_ON_JOB_CLOSE;
475 if (!SetInformationJobObject(
476 job,
477 JobObjectExtendedLimitInformation,
478 &job_info,
479 sizeof(job_info))) {
480 pdie(255, "Error %u while setting up job\n", GetLastError());
481 }
482
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000483 bool success = CreateProcess(
Lukacs Berki7494c922016-04-27 11:17:51 +0000484 NULL, // _In_opt_ LPCTSTR lpApplicationName,
485 // _Inout_opt_ LPTSTR lpCommandLine,
486 cmdline.cmdline,
487 NULL, // _In_opt_ LPSECURITY_ATTRIBUTES lpProcessAttributes,
488 NULL, // _In_opt_ LPSECURITY_ATTRIBUTES lpThreadAttributes,
489 true, // _In_ BOOL bInheritHandles,
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000490 // _In_ DWORD dwCreationFlags,
Lukacs Berkia83ac072016-07-15 12:45:56 +0000491 CREATE_NEW_PROCESS_GROUP // So that Ctrl-Break does not affect it
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000492 | CREATE_BREAKAWAY_FROM_JOB // We'll put it in a new job
493 | CREATE_SUSPENDED, // So that it doesn't start a new job itself
Lukacs Berki7494c922016-04-27 11:17:51 +0000494 NULL, // _In_opt_ LPVOID lpEnvironment,
495 NULL, // _In_opt_ LPCTSTR lpCurrentDirectory,
496 &startupInfo, // _In_ LPSTARTUPINFO lpStartupInfo,
497 &processInfo); // _Out_ LPPROCESS_INFORMATION lpProcessInformation
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000498
499 if (!success) {
Dmitry Lomov42d82902016-07-15 13:26:57 +0000500 pdie(255, "ExecuteProgram/CreateProcess: error %u executing: %s\n",
501 GetLastError(), cmdline.cmdline);
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000502 }
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000503
504 if (!AssignProcessToJobObject(job, processInfo.hProcess)) {
Lukacs Berki23cf3962016-07-19 09:28:23 +0000505 if (!IsFailureDueToNestedJobsNotSupported(processInfo.hProcess)) {
506 pdie(255, "Error %u while assigning process to job\n", GetLastError());
507 }
508
509 // Otherwise, the OS doesn't support nested jobs so we'll just have to
510 // make do without.
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000511 }
512
513 // Now that we put the process in a new job object, we can start executing it
514 if (ResumeThread(processInfo.hThread) == -1) {
515 pdie(255, "Error %u while starting Java process\n", GetLastError());
516 }
517
518 // msys doesn't deliver signals while a Win32 call is pending so we need to
519 // do the blocking call in another thread
520 signal(SIGINT, MingwSignalHandler);
521 std::thread batch_waiter_thread([=]() {
522 BatchWaiterThread(processInfo.hProcess);
523 });
524
Lukacs Berki1977d922016-05-02 09:31:37 +0000525 // The output base lock is held while waiting
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000526 batch_waiter_thread.join();
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000527 DWORD exit_code;
Lukacs Berki7494c922016-04-27 11:17:51 +0000528 GetExitCodeProcess(processInfo.hProcess, &exit_code);
529 CloseHandle(processInfo.hProcess);
530 CloseHandle(processInfo.hThread);
531 exit(exit_code);
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000532}
533
534string ListSeparator() { return ";"; }
535
536string ConvertPath(const string& path) {
Yun Peng44fa4c72016-07-15 08:38:38 +0000537 // If the path looks like %USERPROFILE%/foo/bar, don't convert.
538 if (path.empty() || path[0] == '%') {
539 return path;
540 }
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000541 char* wpath = static_cast<char*>(cygwin_create_path(
542 CCP_POSIX_TO_WIN_A, static_cast<const void*>(path.c_str())));
543 string result(wpath);
544 free(wpath);
545 return result;
546}
547
Yun Peng44fa4c72016-07-15 08:38:38 +0000548// Convert a Unix path list to Windows path list
549string ConvertPathList(const string& path_list) {
550 string w_list = "";
551 int start = 0;
552 int pos;
553 while ((pos = path_list.find(":", start)) != string::npos) {
554 w_list += ConvertPath(path_list.substr(start, pos - start)) + ";";
555 start = pos + 1;
556 }
557 if (start < path_list.size()) {
558 w_list += ConvertPath(path_list.substr(start));
559 }
560 return w_list;
561}
562
Lukacs Berki497d8242016-04-28 07:21:26 +0000563string ConvertPathToPosix(const string& win_path) {
564 char* posix_path = static_cast<char*>(cygwin_create_path(
565 CCP_WIN_A_TO_POSIX, static_cast<const void*>(win_path.c_str())));
566 string result(posix_path);
567 free(posix_path);
568 return result;
569}
Lukacs Berki7494c922016-04-27 11:17:51 +0000570
Lukacs Berki497d8242016-04-28 07:21:26 +0000571// Cribbed from ntifs.h, not present in windows.h
Lukacs Berki7494c922016-04-27 11:17:51 +0000572
Lukacs Berki497d8242016-04-28 07:21:26 +0000573#define REPARSE_MOUNTPOINT_HEADER_SIZE 8
Lukacs Berki7494c922016-04-27 11:17:51 +0000574
Lukacs Berki497d8242016-04-28 07:21:26 +0000575typedef struct {
576 DWORD ReparseTag;
577 WORD ReparseDataLength;
578 WORD Reserved;
579 WORD SubstituteNameOffset;
580 WORD SubstituteNameLength;
581 WORD PrintNameOffset;
582 WORD PrintNameLength;
583 WCHAR PathBuffer[ANYSIZE_ARRAY];
584} REPARSE_MOUNTPOINT_DATA_BUFFER, *PREPARSE_MOUNTPOINT_DATA_BUFFER;
Lukacs Berki7494c922016-04-27 11:17:51 +0000585
Lukacs Berki497d8242016-04-28 07:21:26 +0000586HANDLE OpenDirectory(const string& path, bool readWrite) {
587 HANDLE result = ::CreateFile(
588 path.c_str(),
589 readWrite ? (GENERIC_READ | GENERIC_WRITE) : GENERIC_READ,
590 0,
591 NULL,
592 OPEN_EXISTING,
593 FILE_FLAG_OPEN_REPARSE_POINT | FILE_FLAG_BACKUP_SEMANTICS,
594 NULL);
595 if (result == INVALID_HANDLE_VALUE) {
596 PrintError("CreateFile(" + path + ")");
Lukacs Berki7494c922016-04-27 11:17:51 +0000597 }
598
Lukacs Berki497d8242016-04-28 07:21:26 +0000599 return result;
600}
601
602bool SymlinkDirectories(const string &posix_target, const string &posix_name) {
603 string target = ConvertPath(posix_target);
604 string name = ConvertPath(posix_name);
605
606 // Junctions are directories, so create one
607 if (!::CreateDirectory(name.c_str(), NULL)) {
608 PrintError("CreateDirectory(" + name + ")");
609 return false;
610 }
611
612 HANDLE directory = OpenDirectory(name, true);
613 if (directory == INVALID_HANDLE_VALUE) {
614 return false;
615 }
616
617 char reparse_buffer_bytes[MAXIMUM_REPARSE_DATA_BUFFER_SIZE];
618 REPARSE_MOUNTPOINT_DATA_BUFFER* reparse_buffer =
619 reinterpret_cast<REPARSE_MOUNTPOINT_DATA_BUFFER *>(reparse_buffer_bytes);
620 memset(reparse_buffer_bytes, 0, MAXIMUM_REPARSE_DATA_BUFFER_SIZE);
621
622 // non-parsed path prefix. Required for junction targets.
623 string prefixed_target = "\\??\\" + target;
624 int prefixed_target_length = ::MultiByteToWideChar(
625 CP_ACP,
626 0,
627 prefixed_target.c_str(),
628 -1,
629 reparse_buffer->PathBuffer,
630 MAX_PATH);
631 if (prefixed_target_length == 0) {
632 PrintError("MultiByteToWideChar(" + prefixed_target + ")");
633 CloseHandle(directory);
634 return false;
635 }
636
637 // In addition to their target, junctions also have another string which
638 // tells which target to show to the user. mklink cuts of the \??\ part, so
639 // that's what we do, too.
640 int target_length = ::MultiByteToWideChar(
641 CP_UTF8,
642 0,
643 target.c_str(),
644 -1,
645 reparse_buffer->PathBuffer + prefixed_target_length,
646 MAX_PATH);
647 if (target_length == 0) {
648 PrintError("MultiByteToWideChar(" + target + ")");
649 CloseHandle(directory);
650 return false;
651 }
652
653 reparse_buffer->ReparseTag = IO_REPARSE_TAG_MOUNT_POINT;
654 reparse_buffer->PrintNameOffset = prefixed_target_length * sizeof(WCHAR);
655 reparse_buffer->PrintNameLength = (target_length - 1) * sizeof(WCHAR);
656 reparse_buffer->SubstituteNameLength =
657 (prefixed_target_length - 1) * sizeof(WCHAR);
658 reparse_buffer->SubstituteNameOffset = 0;
659 reparse_buffer->Reserved = 0;
660 reparse_buffer->ReparseDataLength =
661 reparse_buffer->SubstituteNameLength +
662 reparse_buffer->PrintNameLength + 12;
663
664 DWORD bytes_returned;
665 bool result = ::DeviceIoControl(
666 directory,
667 FSCTL_SET_REPARSE_POINT,
668 reparse_buffer,
669 reparse_buffer->ReparseDataLength + REPARSE_MOUNTPOINT_HEADER_SIZE,
670 NULL,
671 0,
672 &bytes_returned,
673 NULL);
674 if (!result) {
675 PrintError("DeviceIoControl(FSCTL_SET_REPARSE_POINT, " + name + ")");
676 }
677 CloseHandle(directory);
678 return result;
679}
680
681bool ReadDirectorySymlink(const string &posix_name, string* result) {
682 string name = ConvertPath(posix_name);
683 HANDLE directory = OpenDirectory(name, false);
684 if (directory == INVALID_HANDLE_VALUE) {
685 return false;
686 }
687
688 char reparse_buffer_bytes[MAXIMUM_REPARSE_DATA_BUFFER_SIZE];
689 REPARSE_MOUNTPOINT_DATA_BUFFER* reparse_buffer =
690 reinterpret_cast<REPARSE_MOUNTPOINT_DATA_BUFFER *>(reparse_buffer_bytes);
691 memset(reparse_buffer_bytes, 0, MAXIMUM_REPARSE_DATA_BUFFER_SIZE);
692
693 reparse_buffer->ReparseTag = IO_REPARSE_TAG_MOUNT_POINT;
694 DWORD bytes_returned;
695 bool ok = ::DeviceIoControl(
696 directory,
697 FSCTL_GET_REPARSE_POINT,
698 NULL,
699 0,
700 reparse_buffer,
701 MAXIMUM_REPARSE_DATA_BUFFER_SIZE,
702 &bytes_returned,
703 NULL);
704 if (!ok) {
705 PrintError("DeviceIoControl(FSCTL_GET_REPARSE_POINT, " + name + ")");
706 }
707
708 CloseHandle(directory);
709 if (!ok) {
710 return false;
711 }
712
Lukacs Berki538fc3d2016-07-18 10:07:23 +0000713 vector<char> print_name(reparse_buffer->PrintNameLength * sizeof(WCHAR) + 1);
Lukacs Berki497d8242016-04-28 07:21:26 +0000714 int count = ::WideCharToMultiByte(
715 CP_UTF8,
716 0,
717 reparse_buffer->PathBuffer +
718 (reparse_buffer->PrintNameOffset / sizeof(WCHAR)),
719 reparse_buffer->PrintNameLength,
Lukacs Berki538fc3d2016-07-18 10:07:23 +0000720 &print_name[0],
721 print_name.size(),
Lukacs Berki497d8242016-04-28 07:21:26 +0000722 NULL,
723 NULL);
724 if (count == 0) {
725 PrintError("WideCharToMultiByte()");
726 *result = "";
727 return false;
728 } else {
Lukacs Berki538fc3d2016-07-18 10:07:23 +0000729 *result = ConvertPathToPosix(&print_name[0]);
Lukacs Berki497d8242016-04-28 07:21:26 +0000730 return true;
731 }
732}
733
734static bool IsAbsoluteWindowsPath(const string& p) {
735 if (p.size() < 3) {
736 return false;
737 }
738
739 if (p.substr(1, 2) == ":/") {
740 return true;
741 }
742
743 if (p.substr(1, 2) == ":\\") {
744 return true;
745 }
746
747 return false;
748}
749
750bool CompareAbsolutePaths(const string& a, const string& b) {
751 string a_real = IsAbsoluteWindowsPath(a) ? ConvertPathToPosix(a) : a;
752 string b_real = IsAbsoluteWindowsPath(b) ? ConvertPathToPosix(b) : b;
753 return a_real == b_real;
Dmitry Lomov47afaab2016-02-19 08:21:13 +0000754}
755
Lukacs Berkiee44c382016-09-14 10:53:37 +0000756bool VerifyServerProcess(
Lukacs Berki43e620b2016-05-02 11:47:40 +0000757 int pid, const string& output_base, const string& install_base) {
Lukacs Berkiee44c382016-09-14 10:53:37 +0000758 // TODO(lberki): This might accidentally kill an unrelated process if the
759 // server died and the PID got reused.
760 return true;
761}
762
763bool KillServerProcess(int pid) {
Lukacs Berkid825a3d2016-06-23 11:10:02 +0000764 HANDLE process = OpenProcess(PROCESS_TERMINATE, FALSE, pid);
765 if (process == NULL) {
766 // Cannot find the server process. Can happen if the PID file is stale.
Lukacs Berki119dd4b2016-07-13 15:28:42 +0000767 return false;
Lukacs Berkid825a3d2016-06-23 11:10:02 +0000768 }
769
Lukacs Berki119dd4b2016-07-13 15:28:42 +0000770 bool result = TerminateProcess(process, /*uExitCode*/0);
771 if (!result) {
772 fprintf(stderr, "Cannot terminate server process with PID %d\n", pid);
Lukacs Berkid825a3d2016-06-23 11:10:02 +0000773 }
774
775 CloseHandle(process);
Lukacs Berki119dd4b2016-07-13 15:28:42 +0000776 return result;
Lukacs Berki1977d922016-05-02 09:31:37 +0000777}
778
Dave MacLachlan6b747ee2016-07-20 10:00:44 +0000779// Not supported.
780void ExcludePathFromBackup(const string &path) {
781}
782
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +0100783} // namespace blaze