blob: 2bf92f6afd6575908c8b37d788352fec119e7f5e [file] [log] [blame]
Damien Martin-Guillerezf88f4d82015-09-25 13:56:55 +00001// Copyright 2014 The Bazel Authors. All rights reserved.
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +01002//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
Mostyn Bramley-Moore44e8d102015-11-10 11:27:39 +000015#include <errno.h> // errno, ENAMETOOLONG
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010016#include <limits.h>
17#include <string.h> // strerror
Laszlo Csomorf926f3e2016-11-09 09:05:48 +000018
19#ifndef COMPILER_MSVC
Mostyn Bramley-Moore44e8d102015-11-10 11:27:39 +000020#include <sys/cygwin.h>
Googler11565c12015-07-23 12:03:53 +000021#include <sys/socket.h>
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010022#include <sys/statfs.h>
23#include <unistd.h>
Laszlo Csomorf926f3e2016-11-09 09:05:48 +000024#endif // COMPILER_MSVC
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010025
Dmitry Lomov78c0cc72015-08-11 16:44:21 +000026#include <windows.h>
27
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010028#include <cstdlib>
29#include <cstdio>
Lukacs Berki68cb41a2016-07-06 11:43:37 +000030#include <thread> // NOLINT (to slience Google-internal linter)
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010031
Han-Wen Nienhuys36fbe632015-04-21 13:58:08 +000032#include "src/main/cpp/blaze_util.h"
Thiago Farina7f9357f2015-04-23 13:57:43 +000033#include "src/main/cpp/blaze_util_platform.h"
Han-Wen Nienhuys36fbe632015-04-21 13:58:08 +000034#include "src/main/cpp/util/errors.h"
Thiago Farina7f9357f2015-04-23 13:57:43 +000035#include "src/main/cpp/util/exit_code.h"
Han-Wen Nienhuys36fbe632015-04-21 13:58:08 +000036#include "src/main/cpp/util/file.h"
37#include "src/main/cpp/util/strings.h"
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010038
39namespace blaze {
40
Thiago Farina241f46c2015-04-13 14:33:30 +000041using blaze_util::die;
42using blaze_util::pdie;
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010043using std::string;
Dmitry Lomovf7d3eb72015-08-13 20:45:09 +000044using std::vector;
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010045
Laszlo Csomora85f52d2016-11-08 13:43:23 +000046class WindowsClock {
47 public:
48 uint64_t GetMilliseconds() const;
49 uint64_t GetProcessMilliseconds() const;
50
51 static const WindowsClock INSTANCE;
52
53 private:
54 // Clock frequency per seconds.
55 // It's safe to cache this because (from QueryPerformanceFrequency on MSDN):
56 // "The frequency of the performance counter is fixed at system boot and is
57 // consistent across all processors. Therefore, the frequency need only be
58 // queried upon application initialization, and the result can be cached."
59 const LARGE_INTEGER kFrequency;
60
61 // Time (in milliseconds) at process start.
62 const LARGE_INTEGER kStart;
63
64 WindowsClock();
65
66 static LARGE_INTEGER GetFrequency();
67 static LARGE_INTEGER GetMillisecondsAsLargeInt(const LARGE_INTEGER& freq);
68};
69
Lukacs Berki497d8242016-04-28 07:21:26 +000070static void PrintError(const string& op) {
71 DWORD last_error = ::GetLastError();
72 if (last_error == 0) {
73 return;
74 }
75
76 char* message_buffer;
77 size_t size = FormatMessageA(
78 FORMAT_MESSAGE_ALLOCATE_BUFFER
79 | FORMAT_MESSAGE_FROM_SYSTEM
80 | FORMAT_MESSAGE_IGNORE_INSERTS,
81 NULL,
82 last_error,
83 MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
84 (LPSTR) &message_buffer,
85 0,
86 NULL);
87
88 fprintf(stderr, "ERROR: %s: %s (%d)\n",
89 op.c_str(), message_buffer, last_error);
90 LocalFree(message_buffer);
91}
92
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +010093void WarnFilesystemType(const string& output_base) {
94}
95
96string GetSelfPath() {
97 char buffer[PATH_MAX] = {};
Dmitry Lomov31574122016-02-17 16:07:31 +000098 if (!GetModuleFileName(0, buffer, sizeof(buffer))) {
99 pdie(255, "Error %u getting executable file name\n", GetLastError());
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +0100100 }
Laszlo Csomorf926f3e2016-11-09 09:05:48 +0000101
102 // TODO(bazel-team): Implement proper handling for UNC paths
103 // (e.g. "\\?\C:\foo\bar") instead of erroring out when we see them.
104 if (strlen(buffer) == 0 || buffer[0] == '\\') {
105 PrintError("GetModuleFileName");
106 buffer[PATH_MAX - 1] = '\0';
107 pdie(255, "Error in GetSelfPath, buffer=(%s)", buffer);
108 }
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +0100109 return string(buffer);
110}
111
Kristina Chodorow93963352015-03-20 19:11:19 +0000112string GetOutputRoot() {
Laszlo Csomorf926f3e2016-11-09 09:05:48 +0000113#ifdef COMPILER_MSVC
114 // GetTempPathA and GetEnvironmentVariableA only work properly when Bazel
115 // runs under cmd.exe, not when it's run from msys.
116 // We don't know the reason for this; what's sure is GetEnvironmentVariableA
117 // returns nothing for TEMP under msys, though it can retrieve WINDIR.
118
119 char buf[MAX_PATH + 1];
120 if (!GetTempPathA(sizeof(buf), buf)) {
121 PrintError("GetTempPath");
122 pdie(255, "Could not retrieve the temp directory path");
Dmitry Lomovbc84cc82016-04-15 14:05:24 +0000123 }
Laszlo Csomorf926f3e2016-11-09 09:05:48 +0000124 return buf;
125#else // not COMPILER_MSVC
126 for (const char* i : {"TMPDIR", "TEMPDIR", "TMP", "TEMP"}) {
127 char* tmpdir = getenv(i);
128 if (tmpdir != NULL && strlen(tmpdir) > 0) {
129 return tmpdir;
130 }
131 }
132
133 return "/var/tmp";
134#endif // COMPILER_MSVC
Kristina Chodorow93963352015-03-20 19:11:19 +0000135}
136
Laszlo Csomor943d3cf2016-11-07 14:27:21 +0000137uint64_t GetMillisecondsMonotonic() {
Laszlo Csomora85f52d2016-11-08 13:43:23 +0000138 return WindowsClock::INSTANCE.GetMilliseconds();
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +0100139}
140
Laszlo Csomor943d3cf2016-11-07 14:27:21 +0000141uint64_t GetMillisecondsSinceProcessStart() {
Laszlo Csomora85f52d2016-11-08 13:43:23 +0000142 return WindowsClock::INSTANCE.GetProcessMilliseconds();
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +0100143}
144
145void SetScheduling(bool batch_cpu_scheduling, int io_nice_level) {
146 // TODO(bazel-team): There should be a similar function on Windows.
147}
148
149string GetProcessCWD(int pid) {
150 char server_cwd[PATH_MAX] = {};
151 if (readlink(
Googler9588b812015-07-23 11:49:37 +0000152 ("/proc/" + ToString(pid) + "/cwd").c_str(),
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +0100153 server_cwd, sizeof(server_cwd)) < 0) {
154 return "";
155 }
156
157 return string(server_cwd);
158}
159
Thiago Farina01f36002015-04-08 15:59:08 +0000160bool IsSharedLibrary(const string &filename) {
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +0100161 return blaze_util::ends_with(filename, ".dll");
162}
163
164string GetDefaultHostJavabase() {
165 const char *javahome = getenv("JAVA_HOME");
166 if (javahome == NULL) {
167 die(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR,
168 "Error: JAVA_HOME not set.");
169 }
170 return javahome;
171}
172
Dmitry Lomovb5ff50b2016-02-03 19:35:42 +0000173namespace {
174void ReplaceAll(
175 std::string* s, const std::string& pattern, const std::string with) {
176 size_t pos = 0;
177 while (true) {
178 size_t pos = s->find(pattern, pos);
179 if (pos == std::string::npos) return;
180 *s = s->replace(pos, pattern.length(), with);
181 pos += with.length();
182 }
183}
Dmitry Lomovb5ff50b2016-02-03 19:35:42 +0000184
Lukacs Berki7494c922016-04-27 11:17:51 +0000185// Max command line length is per CreateProcess documentation
186// (https://msdn.microsoft.com/en-us/library/ms682425(VS.85).aspx)
Lukacs Berki83c78b12016-06-24 12:35:08 +0000187//
188// Quoting rules are described here:
189// https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/
190
Lukacs Berki7494c922016-04-27 11:17:51 +0000191static const int MAX_CMDLINE_LENGTH = 32768;
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000192
Lukacs Berki7494c922016-04-27 11:17:51 +0000193struct CmdLine {
194 char cmdline[MAX_CMDLINE_LENGTH];
195};
196static void CreateCommandLine(CmdLine* result, const string& exe,
197 const vector<string>& args_vector) {
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000198 string cmdline;
199 bool first = true;
200 for (const auto& s : args_vector) {
201 if (first) {
202 first = false;
203 // Skip first argument, instead use quoted executable name with ".exe"
204 // suffix.
205 cmdline.append("\"");
206 cmdline.append(exe);
207 cmdline.append(".exe");
208 cmdline.append("\"");
209 continue;
210 } else {
211 cmdline.append(" ");
212 }
Dmitry Lomovb5ff50b2016-02-03 19:35:42 +0000213
Lukacs Berki83c78b12016-06-24 12:35:08 +0000214 bool has_space = s.find(" ") != string::npos;
215
216 if (has_space) {
217 cmdline.append("\"");
Dmitry Lomovb5ff50b2016-02-03 19:35:42 +0000218 }
219
Lukacs Berki83c78b12016-06-24 12:35:08 +0000220 std::string::const_iterator it = s.begin();
221 while (it != s.end()) {
222 char ch = *it++;
223 switch (ch) {
224 case '"':
225 // Escape double quotes
226 cmdline.append("\\\"");
227 break;
228
229 case '\\':
230 if (it == s.end()) {
231 // Backslashes at the end of the string are quoted if we add quotes
232 cmdline.append(has_space ? "\\\\" : "\\");
233 } else {
234 // Backslashes everywhere else are quoted if they are followed by a
235 // quote or a backslash
236 cmdline.append(*it == '"' || *it == '\\' ? "\\\\" : "\\");
237 }
238 break;
239
240 default:
241 cmdline.append(1, ch);
242 }
243 }
244
245 if (has_space) {
Dmitry Lomovb5ff50b2016-02-03 19:35:42 +0000246 cmdline.append("\"");
Dmitry Lomovb5ff50b2016-02-03 19:35:42 +0000247 }
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000248 }
249
Lukacs Berki2236f7d2016-04-28 08:49:43 +0000250 if (cmdline.size() >= MAX_CMDLINE_LENGTH) {
Lukacs Berki7494c922016-04-27 11:17:51 +0000251 pdie(blaze_exit_code::INTERNAL_ERROR,
252 "Command line too long: %s", cmdline.c_str());
253 }
254
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000255 // Copy command line into a mutable buffer.
256 // CreateProcess is allowed to mutate its command line argument.
Lukacs Berki7494c922016-04-27 11:17:51 +0000257 strncpy(result->cmdline, cmdline.c_str(), MAX_CMDLINE_LENGTH - 1);
Lukacs Berki2236f7d2016-04-28 08:49:43 +0000258 result->cmdline[MAX_CMDLINE_LENGTH - 1] = 0;
Lukacs Berki7494c922016-04-27 11:17:51 +0000259}
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000260
Lukacs Berki7494c922016-04-27 11:17:51 +0000261} // namespace
262
263string RunProgram(
264 const string& exe, const vector<string>& args_vector) {
265 SECURITY_ATTRIBUTES sa = {0};
266
267 sa.nLength = sizeof(SECURITY_ATTRIBUTES);
268 sa.bInheritHandle = TRUE;
269 sa.lpSecurityDescriptor = NULL;
270
271 HANDLE pipe_read, pipe_write;
272 if (!CreatePipe(&pipe_read, &pipe_write, &sa, 0)) {
273 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "CreatePipe");
274 }
275
276 if (!SetHandleInformation(pipe_read, HANDLE_FLAG_INHERIT, 0)) {
277 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "SetHandleInformation");
278 }
279
280 PROCESS_INFORMATION processInfo = {0};
281 STARTUPINFO startupInfo = {0};
282
283 startupInfo.hStdError = pipe_write;
284 startupInfo.hStdOutput = pipe_write;
285 startupInfo.dwFlags |= STARTF_USESTDHANDLES;
286 CmdLine cmdline;
287 CreateCommandLine(&cmdline, exe, args_vector);
288
289 bool ok = CreateProcess(
290 NULL, // _In_opt_ LPCTSTR lpApplicationName,
291 // _Inout_opt_ LPTSTR lpCommandLine,
292 cmdline.cmdline,
293 NULL, // _In_opt_ LPSECURITY_ATTRIBUTES lpProcessAttributes,
294 NULL, // _In_opt_ LPSECURITY_ATTRIBUTES lpThreadAttributes,
295 true, // _In_ BOOL bInheritHandles,
296 0, // _In_ DWORD dwCreationFlags,
297 NULL, // _In_opt_ LPVOID lpEnvironment,
298 NULL, // _In_opt_ LPCTSTR lpCurrentDirectory,
299 &startupInfo, // _In_ LPSTARTUPINFO lpStartupInfo,
300 &processInfo); // _Out_ LPPROCESS_INFORMATION lpProcessInformation
301
302 if (!ok) {
Dmitry Lomov42d82902016-07-15 13:26:57 +0000303 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR,
304 "RunProgram/CreateProcess: Error %d while executing %s",
305 GetLastError(), cmdline.cmdline);
Lukacs Berki7494c922016-04-27 11:17:51 +0000306 }
307
308 CloseHandle(pipe_write);
309 std::string result = "";
310 DWORD bytes_read;
311 CHAR buf[1024];
312
313 for (;;) {
314 ok = ::ReadFile(pipe_read, buf, 1023, &bytes_read, NULL);
315 if (!ok || bytes_read == 0) {
316 break;
317 }
318 buf[bytes_read] = 0;
319 result = result + buf;
320 }
321
322 CloseHandle(pipe_read);
323 CloseHandle(processInfo.hProcess);
324 CloseHandle(processInfo.hThread);
325
326 return result;
327}
328
329// If we pass DETACHED_PROCESS to CreateProcess(), cmd.exe appropriately
330// returns the command prompt when the client terminates. msys2, however, in
331// its infinite wisdom, waits until the *server* terminates and cannot be
332// convinced otherwise.
333//
334// So, we first pretend to be a POSIX daemon so that msys2 knows about our
335// intentions and *then* we call CreateProcess(). Life ain't easy.
336static bool DaemonizeOnWindows() {
337 if (fork() > 0) {
338 // We are the original client process.
339 return true;
340 }
341
342 if (fork() > 0) {
343 // We are the child of the original client process. Terminate so that the
344 // actual server is not a child process of the client.
345 exit(0);
346 }
347
348 setsid();
349 // Contrary to the POSIX version, we are not closing the three standard file
350 // descriptors here. CreateProcess() will take care of that and it's useful
351 // to see the error messages in ExecuteDaemon() on the console of the client.
352 return false;
353}
354
Lukacs Berki1977d922016-05-02 09:31:37 +0000355// Keeping an eye on the server process on Windows is not implemented yet.
356// TODO(lberki): Implement this, because otherwise if we can't start up a server
357// process, the client will hang until it times out.
358class DummyBlazeServerStartup : public BlazeServerStartup {
359 public:
360 DummyBlazeServerStartup() {}
361 virtual ~DummyBlazeServerStartup() {}
Lukacs Berki9d52bc52016-06-07 11:11:04 +0000362 virtual bool IsStillAlive() { return true; }
Lukacs Berki1977d922016-05-02 09:31:37 +0000363};
364
365void ExecuteDaemon(const string& exe, const std::vector<string>& args_vector,
366 const string& daemon_output, const string& server_dir,
367 BlazeServerStartup** server_startup) {
Lukacs Berki7494c922016-04-27 11:17:51 +0000368 if (DaemonizeOnWindows()) {
369 // We are the client process
Lukacs Berki1977d922016-05-02 09:31:37 +0000370 *server_startup = new DummyBlazeServerStartup();
371 return;
Lukacs Berki7494c922016-04-27 11:17:51 +0000372 }
373
374 SECURITY_ATTRIBUTES sa;
Lukacs Berki7494c922016-04-27 11:17:51 +0000375 sa.nLength = sizeof(SECURITY_ATTRIBUTES);
Lukacs Berki33d7bdb2016-06-24 07:21:19 +0000376 // We redirect stdout and stderr by telling CreateProcess to use a file handle
377 // we open below and these handles must be inheriatable
Lukacs Berki7494c922016-04-27 11:17:51 +0000378 sa.bInheritHandle = TRUE;
379 sa.lpSecurityDescriptor = NULL;
380
Lukacs Berki33d7bdb2016-06-24 07:21:19 +0000381 HANDLE output_file = CreateFile(
382 ConvertPath(daemon_output).c_str(), // lpFileName
383 GENERIC_READ | GENERIC_WRITE, // dwDesiredAccess
384 // So that the file can be read while the server is running
385 FILE_SHARE_READ, // dwShareMode
386 &sa, // lpSecurityAttributes
387 CREATE_ALWAYS, // dwCreationDisposition
388 FILE_ATTRIBUTE_NORMAL, // dwFlagsAndAttributes
389 NULL); // hTemplateFile
Lukacs Berki7494c922016-04-27 11:17:51 +0000390
Lukacs Berki33d7bdb2016-06-24 07:21:19 +0000391 if (output_file == INVALID_HANDLE_VALUE) {
Lukacs Berki7494c922016-04-27 11:17:51 +0000392 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "CreateFile");
393 }
394
395 HANDLE pipe_read, pipe_write;
396 if (!CreatePipe(&pipe_read, &pipe_write, &sa, 0)) {
397 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "CreatePipe");
398 }
399
400 if (!SetHandleInformation(pipe_write, HANDLE_FLAG_INHERIT, 0)) {
401 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR, "SetHandleInformation");
402 }
403
404 PROCESS_INFORMATION processInfo = {0};
405 STARTUPINFO startupInfo = {0};
406
407 startupInfo.hStdInput = pipe_read;
408 startupInfo.hStdError = output_file;
409 startupInfo.hStdOutput = output_file;
410 startupInfo.dwFlags |= STARTF_USESTDHANDLES;
411 CmdLine cmdline;
412 CreateCommandLine(&cmdline, exe, args_vector);
413
414 // Propagate BAZEL_SH environment variable to a sub-process.
415 // todo(dslomov): More principled approach to propagating
416 // environment variables.
417 SetEnvironmentVariable("BAZEL_SH", getenv("BAZEL_SH"));
418
419 bool ok = CreateProcess(
Dmitry Lomov42d82902016-07-15 13:26:57 +0000420 NULL, // _In_opt_ LPCTSTR lpApplicationName,
Lukacs Berki7494c922016-04-27 11:17:51 +0000421 // _Inout_opt_ LPTSTR lpCommandLine,
422 cmdline.cmdline,
Dmitry Lomov42d82902016-07-15 13:26:57 +0000423 NULL, // _In_opt_ LPSECURITY_ATTRIBUTES lpProcessAttributes,
424 NULL, // _In_opt_ LPSECURITY_ATTRIBUTES lpThreadAttributes,
425 TRUE, // _In_ BOOL bInheritHandles,
Lukacs Berki7494c922016-04-27 11:17:51 +0000426 // _In_ DWORD dwCreationFlags,
Dmitry Lomov42d82902016-07-15 13:26:57 +0000427 DETACHED_PROCESS | CREATE_NEW_PROCESS_GROUP,
Lukacs Berki7494c922016-04-27 11:17:51 +0000428 NULL, // _In_opt_ LPVOID lpEnvironment,
429 NULL, // _In_opt_ LPCTSTR lpCurrentDirectory,
430 &startupInfo, // _In_ LPSTARTUPINFO lpStartupInfo,
431 &processInfo); // _Out_ LPPROCESS_INFORMATION lpProcessInformation
432
433 if (!ok) {
Dmitry Lomov42d82902016-07-15 13:26:57 +0000434 pdie(blaze_exit_code::LOCAL_ENVIRONMENTAL_ERROR,
435 "ExecuteDaemon/CreateProcess: error %u executing: %s\n",
436 GetLastError(), cmdline.cmdline);
Lukacs Berki7494c922016-04-27 11:17:51 +0000437 }
438
439 CloseHandle(output_file);
440 CloseHandle(pipe_write);
441 CloseHandle(pipe_read);
442
Lukacs Berkid825a3d2016-06-23 11:10:02 +0000443 string pid_string = ToString(processInfo.dwProcessId);
Thiago Farina048bbfc2016-09-21 08:20:41 +0000444 string pid_file = blaze_util::JoinPath(server_dir, kServerPidFile);
Lukacs Berkie33cf0f2016-04-28 11:04:59 +0000445 if (!WriteFile(pid_string, pid_file)) {
446 // Not a lot we can do if this fails
447 fprintf(stderr, "Cannot write PID file %s\n", pid_file.c_str());
448 }
449
Lukacs Berki7494c922016-04-27 11:17:51 +0000450 CloseHandle(processInfo.hProcess);
451 CloseHandle(processInfo.hThread);
452
453 exit(0);
454}
455
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000456void BatchWaiterThread(HANDLE java_handle) {
457 WaitForSingleObject(java_handle, INFINITE);
458}
459
460static void MingwSignalHandler(int signum) {
461 // Java process will be terminated because we set the job to terminate if its
462 // handle is closed.
463 //
464 // Note that this is different how interruption is handled on Unix, where the
465 // Java process sets up a signal handler for SIGINT itself. That cannot be
466 // done on Windows without using native code, and it's better to have as
467 // little JNI as possible. The most important part of the cleanup after
468 // termination (killing all child processes) happens automatically on Windows
469 // anyway, since we put the batch Java process in its own job which does not
470 // allow breakaway processes.
471 exit(blaze_exit_code::ExitCode::INTERRUPTED);
472}
473
Lukacs Berki23cf3962016-07-19 09:28:23 +0000474// Returns whether assigning the given process to a job failed because nested
475// jobs are not available on the current system.
476static bool IsFailureDueToNestedJobsNotSupported(HANDLE process) {
477 BOOL is_in_job;
478 if (!IsProcessInJob(process, NULL, &is_in_job)) {
479 PrintError("IsProcessInJob()");
480 return false;
481 }
482
483 if (!is_in_job) {
484 // Not in a job.
485 return false;
486 }
487
488 OSVERSIONINFOEX version_info;
489 version_info.dwOSVersionInfoSize = sizeof(version_info);
490 if (!GetVersionEx(reinterpret_cast<OSVERSIONINFO*>(&version_info))) {
491 PrintError("GetVersionEx()");
492 return false;
493 }
494
495 return version_info.dwMajorVersion < 6
496 || version_info.dwMajorVersion == 6 && version_info.dwMinorVersion <= 1;
497}
498
Lukacs Berki7494c922016-04-27 11:17:51 +0000499// Run the given program in the current working directory,
500// using the given argument vector.
501void ExecuteProgram(
502 const string& exe, const vector<string>& args_vector) {
503 CmdLine cmdline;
504 CreateCommandLine(&cmdline, exe, args_vector);
505
506 STARTUPINFO startupInfo = {0};
507 PROCESS_INFORMATION processInfo = {0};
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000508
Dmitry Lomov45d07a12016-02-03 21:43:47 +0000509 // Propagate BAZEL_SH environment variable to a sub-process.
510 // todo(dslomov): More principled approach to propagating
511 // environment variables.
512 SetEnvironmentVariable("BAZEL_SH", getenv("BAZEL_SH"));
513
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000514 HANDLE job = CreateJobObject(NULL, NULL);
515 if (job == NULL) {
516 pdie(255, "Error %u while creating job\n", GetLastError());
517 }
518
519 JOBOBJECT_EXTENDED_LIMIT_INFORMATION job_info = { 0 };
520 job_info.BasicLimitInformation.LimitFlags =
521 JOB_OBJECT_LIMIT_KILL_ON_JOB_CLOSE;
522 if (!SetInformationJobObject(
523 job,
524 JobObjectExtendedLimitInformation,
525 &job_info,
526 sizeof(job_info))) {
527 pdie(255, "Error %u while setting up job\n", GetLastError());
528 }
529
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000530 bool success = CreateProcess(
Lukacs Berki7494c922016-04-27 11:17:51 +0000531 NULL, // _In_opt_ LPCTSTR lpApplicationName,
532 // _Inout_opt_ LPTSTR lpCommandLine,
533 cmdline.cmdline,
534 NULL, // _In_opt_ LPSECURITY_ATTRIBUTES lpProcessAttributes,
535 NULL, // _In_opt_ LPSECURITY_ATTRIBUTES lpThreadAttributes,
536 true, // _In_ BOOL bInheritHandles,
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000537 // _In_ DWORD dwCreationFlags,
Lukacs Berkia83ac072016-07-15 12:45:56 +0000538 CREATE_NEW_PROCESS_GROUP // So that Ctrl-Break does not affect it
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000539 | CREATE_BREAKAWAY_FROM_JOB // We'll put it in a new job
540 | CREATE_SUSPENDED, // So that it doesn't start a new job itself
Lukacs Berki7494c922016-04-27 11:17:51 +0000541 NULL, // _In_opt_ LPVOID lpEnvironment,
542 NULL, // _In_opt_ LPCTSTR lpCurrentDirectory,
543 &startupInfo, // _In_ LPSTARTUPINFO lpStartupInfo,
544 &processInfo); // _Out_ LPPROCESS_INFORMATION lpProcessInformation
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000545
546 if (!success) {
Dmitry Lomov42d82902016-07-15 13:26:57 +0000547 pdie(255, "ExecuteProgram/CreateProcess: error %u executing: %s\n",
548 GetLastError(), cmdline.cmdline);
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000549 }
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000550
551 if (!AssignProcessToJobObject(job, processInfo.hProcess)) {
Lukacs Berki23cf3962016-07-19 09:28:23 +0000552 if (!IsFailureDueToNestedJobsNotSupported(processInfo.hProcess)) {
553 pdie(255, "Error %u while assigning process to job\n", GetLastError());
554 }
555
556 // Otherwise, the OS doesn't support nested jobs so we'll just have to
557 // make do without.
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000558 }
559
560 // Now that we put the process in a new job object, we can start executing it
561 if (ResumeThread(processInfo.hThread) == -1) {
562 pdie(255, "Error %u while starting Java process\n", GetLastError());
563 }
564
565 // msys doesn't deliver signals while a Win32 call is pending so we need to
566 // do the blocking call in another thread
567 signal(SIGINT, MingwSignalHandler);
568 std::thread batch_waiter_thread([=]() {
569 BatchWaiterThread(processInfo.hProcess);
570 });
571
Lukacs Berki1977d922016-05-02 09:31:37 +0000572 // The output base lock is held while waiting
Lukacs Berki68cb41a2016-07-06 11:43:37 +0000573 batch_waiter_thread.join();
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000574 DWORD exit_code;
Lukacs Berki7494c922016-04-27 11:17:51 +0000575 GetExitCodeProcess(processInfo.hProcess, &exit_code);
576 CloseHandle(processInfo.hProcess);
577 CloseHandle(processInfo.hThread);
578 exit(exit_code);
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000579}
580
581string ListSeparator() { return ";"; }
582
583string ConvertPath(const string& path) {
Yun Peng44fa4c72016-07-15 08:38:38 +0000584 // If the path looks like %USERPROFILE%/foo/bar, don't convert.
585 if (path.empty() || path[0] == '%') {
586 return path;
587 }
Dmitry Lomov78c0cc72015-08-11 16:44:21 +0000588 char* wpath = static_cast<char*>(cygwin_create_path(
589 CCP_POSIX_TO_WIN_A, static_cast<const void*>(path.c_str())));
590 string result(wpath);
591 free(wpath);
592 return result;
593}
594
Yun Peng44fa4c72016-07-15 08:38:38 +0000595// Convert a Unix path list to Windows path list
596string ConvertPathList(const string& path_list) {
597 string w_list = "";
598 int start = 0;
599 int pos;
600 while ((pos = path_list.find(":", start)) != string::npos) {
601 w_list += ConvertPath(path_list.substr(start, pos - start)) + ";";
602 start = pos + 1;
603 }
604 if (start < path_list.size()) {
605 w_list += ConvertPath(path_list.substr(start));
606 }
607 return w_list;
608}
609
Lukacs Berki497d8242016-04-28 07:21:26 +0000610string ConvertPathToPosix(const string& win_path) {
611 char* posix_path = static_cast<char*>(cygwin_create_path(
612 CCP_WIN_A_TO_POSIX, static_cast<const void*>(win_path.c_str())));
613 string result(posix_path);
614 free(posix_path);
615 return result;
616}
Lukacs Berki7494c922016-04-27 11:17:51 +0000617
Lukacs Berki497d8242016-04-28 07:21:26 +0000618// Cribbed from ntifs.h, not present in windows.h
Lukacs Berki7494c922016-04-27 11:17:51 +0000619
Lukacs Berki497d8242016-04-28 07:21:26 +0000620#define REPARSE_MOUNTPOINT_HEADER_SIZE 8
Lukacs Berki7494c922016-04-27 11:17:51 +0000621
Lukacs Berki497d8242016-04-28 07:21:26 +0000622typedef struct {
623 DWORD ReparseTag;
624 WORD ReparseDataLength;
625 WORD Reserved;
626 WORD SubstituteNameOffset;
627 WORD SubstituteNameLength;
628 WORD PrintNameOffset;
629 WORD PrintNameLength;
630 WCHAR PathBuffer[ANYSIZE_ARRAY];
631} REPARSE_MOUNTPOINT_DATA_BUFFER, *PREPARSE_MOUNTPOINT_DATA_BUFFER;
Lukacs Berki7494c922016-04-27 11:17:51 +0000632
Lukacs Berki497d8242016-04-28 07:21:26 +0000633HANDLE OpenDirectory(const string& path, bool readWrite) {
634 HANDLE result = ::CreateFile(
635 path.c_str(),
636 readWrite ? (GENERIC_READ | GENERIC_WRITE) : GENERIC_READ,
637 0,
638 NULL,
639 OPEN_EXISTING,
640 FILE_FLAG_OPEN_REPARSE_POINT | FILE_FLAG_BACKUP_SEMANTICS,
641 NULL);
642 if (result == INVALID_HANDLE_VALUE) {
643 PrintError("CreateFile(" + path + ")");
Lukacs Berki7494c922016-04-27 11:17:51 +0000644 }
645
Lukacs Berki497d8242016-04-28 07:21:26 +0000646 return result;
647}
648
649bool SymlinkDirectories(const string &posix_target, const string &posix_name) {
650 string target = ConvertPath(posix_target);
651 string name = ConvertPath(posix_name);
652
653 // Junctions are directories, so create one
654 if (!::CreateDirectory(name.c_str(), NULL)) {
655 PrintError("CreateDirectory(" + name + ")");
656 return false;
657 }
658
659 HANDLE directory = OpenDirectory(name, true);
660 if (directory == INVALID_HANDLE_VALUE) {
661 return false;
662 }
663
664 char reparse_buffer_bytes[MAXIMUM_REPARSE_DATA_BUFFER_SIZE];
665 REPARSE_MOUNTPOINT_DATA_BUFFER* reparse_buffer =
666 reinterpret_cast<REPARSE_MOUNTPOINT_DATA_BUFFER *>(reparse_buffer_bytes);
667 memset(reparse_buffer_bytes, 0, MAXIMUM_REPARSE_DATA_BUFFER_SIZE);
668
669 // non-parsed path prefix. Required for junction targets.
670 string prefixed_target = "\\??\\" + target;
671 int prefixed_target_length = ::MultiByteToWideChar(
672 CP_ACP,
673 0,
674 prefixed_target.c_str(),
675 -1,
676 reparse_buffer->PathBuffer,
677 MAX_PATH);
678 if (prefixed_target_length == 0) {
679 PrintError("MultiByteToWideChar(" + prefixed_target + ")");
680 CloseHandle(directory);
681 return false;
682 }
683
684 // In addition to their target, junctions also have another string which
685 // tells which target to show to the user. mklink cuts of the \??\ part, so
686 // that's what we do, too.
687 int target_length = ::MultiByteToWideChar(
688 CP_UTF8,
689 0,
690 target.c_str(),
691 -1,
692 reparse_buffer->PathBuffer + prefixed_target_length,
693 MAX_PATH);
694 if (target_length == 0) {
695 PrintError("MultiByteToWideChar(" + target + ")");
696 CloseHandle(directory);
697 return false;
698 }
699
700 reparse_buffer->ReparseTag = IO_REPARSE_TAG_MOUNT_POINT;
701 reparse_buffer->PrintNameOffset = prefixed_target_length * sizeof(WCHAR);
702 reparse_buffer->PrintNameLength = (target_length - 1) * sizeof(WCHAR);
703 reparse_buffer->SubstituteNameLength =
704 (prefixed_target_length - 1) * sizeof(WCHAR);
705 reparse_buffer->SubstituteNameOffset = 0;
706 reparse_buffer->Reserved = 0;
707 reparse_buffer->ReparseDataLength =
708 reparse_buffer->SubstituteNameLength +
709 reparse_buffer->PrintNameLength + 12;
710
711 DWORD bytes_returned;
712 bool result = ::DeviceIoControl(
713 directory,
714 FSCTL_SET_REPARSE_POINT,
715 reparse_buffer,
716 reparse_buffer->ReparseDataLength + REPARSE_MOUNTPOINT_HEADER_SIZE,
717 NULL,
718 0,
719 &bytes_returned,
720 NULL);
721 if (!result) {
722 PrintError("DeviceIoControl(FSCTL_SET_REPARSE_POINT, " + name + ")");
723 }
724 CloseHandle(directory);
725 return result;
726}
727
728bool ReadDirectorySymlink(const string &posix_name, string* result) {
729 string name = ConvertPath(posix_name);
730 HANDLE directory = OpenDirectory(name, false);
731 if (directory == INVALID_HANDLE_VALUE) {
732 return false;
733 }
734
735 char reparse_buffer_bytes[MAXIMUM_REPARSE_DATA_BUFFER_SIZE];
736 REPARSE_MOUNTPOINT_DATA_BUFFER* reparse_buffer =
737 reinterpret_cast<REPARSE_MOUNTPOINT_DATA_BUFFER *>(reparse_buffer_bytes);
738 memset(reparse_buffer_bytes, 0, MAXIMUM_REPARSE_DATA_BUFFER_SIZE);
739
740 reparse_buffer->ReparseTag = IO_REPARSE_TAG_MOUNT_POINT;
741 DWORD bytes_returned;
742 bool ok = ::DeviceIoControl(
743 directory,
744 FSCTL_GET_REPARSE_POINT,
745 NULL,
746 0,
747 reparse_buffer,
748 MAXIMUM_REPARSE_DATA_BUFFER_SIZE,
749 &bytes_returned,
750 NULL);
751 if (!ok) {
752 PrintError("DeviceIoControl(FSCTL_GET_REPARSE_POINT, " + name + ")");
753 }
754
755 CloseHandle(directory);
756 if (!ok) {
757 return false;
758 }
759
Lukacs Berki538fc3d2016-07-18 10:07:23 +0000760 vector<char> print_name(reparse_buffer->PrintNameLength * sizeof(WCHAR) + 1);
Lukacs Berki497d8242016-04-28 07:21:26 +0000761 int count = ::WideCharToMultiByte(
762 CP_UTF8,
763 0,
764 reparse_buffer->PathBuffer +
765 (reparse_buffer->PrintNameOffset / sizeof(WCHAR)),
766 reparse_buffer->PrintNameLength,
Lukacs Berki538fc3d2016-07-18 10:07:23 +0000767 &print_name[0],
768 print_name.size(),
Lukacs Berki497d8242016-04-28 07:21:26 +0000769 NULL,
770 NULL);
771 if (count == 0) {
772 PrintError("WideCharToMultiByte()");
773 *result = "";
774 return false;
775 } else {
Lukacs Berki538fc3d2016-07-18 10:07:23 +0000776 *result = ConvertPathToPosix(&print_name[0]);
Lukacs Berki497d8242016-04-28 07:21:26 +0000777 return true;
778 }
779}
780
781static bool IsAbsoluteWindowsPath(const string& p) {
782 if (p.size() < 3) {
783 return false;
784 }
785
786 if (p.substr(1, 2) == ":/") {
787 return true;
788 }
789
790 if (p.substr(1, 2) == ":\\") {
791 return true;
792 }
793
794 return false;
795}
796
797bool CompareAbsolutePaths(const string& a, const string& b) {
798 string a_real = IsAbsoluteWindowsPath(a) ? ConvertPathToPosix(a) : a;
799 string b_real = IsAbsoluteWindowsPath(b) ? ConvertPathToPosix(b) : b;
800 return a_real == b_real;
Dmitry Lomov47afaab2016-02-19 08:21:13 +0000801}
802
Lukacs Berkiee44c382016-09-14 10:53:37 +0000803bool VerifyServerProcess(
Lukacs Berki43e620b2016-05-02 11:47:40 +0000804 int pid, const string& output_base, const string& install_base) {
Lukacs Berkiee44c382016-09-14 10:53:37 +0000805 // TODO(lberki): This might accidentally kill an unrelated process if the
806 // server died and the PID got reused.
807 return true;
808}
809
810bool KillServerProcess(int pid) {
Lukacs Berkid825a3d2016-06-23 11:10:02 +0000811 HANDLE process = OpenProcess(PROCESS_TERMINATE, FALSE, pid);
812 if (process == NULL) {
813 // Cannot find the server process. Can happen if the PID file is stale.
Lukacs Berki119dd4b2016-07-13 15:28:42 +0000814 return false;
Lukacs Berkid825a3d2016-06-23 11:10:02 +0000815 }
816
Lukacs Berki119dd4b2016-07-13 15:28:42 +0000817 bool result = TerminateProcess(process, /*uExitCode*/0);
818 if (!result) {
819 fprintf(stderr, "Cannot terminate server process with PID %d\n", pid);
Lukacs Berkid825a3d2016-06-23 11:10:02 +0000820 }
821
822 CloseHandle(process);
Lukacs Berki119dd4b2016-07-13 15:28:42 +0000823 return result;
Lukacs Berki1977d922016-05-02 09:31:37 +0000824}
825
Dave MacLachlan6b747ee2016-07-20 10:00:44 +0000826// Not supported.
827void ExcludePathFromBackup(const string &path) {
828}
829
Laszlo Csomora85f52d2016-11-08 13:43:23 +0000830LARGE_INTEGER WindowsClock::GetFrequency() {
831 LARGE_INTEGER result;
832 if (!QueryPerformanceFrequency(&result)) {
833 PrintError("QueryPerformanceFrequency");
834 pdie(255, "Error getting time resolution\n");
835 }
836
837 // On ancient Windows versions (pre-XP) and specific hardware the result may
838 // be 0. Since this is pre-XP, we don't handle that, just error out.
839 if (result.QuadPart <= 0) {
840 pdie(255, "QueryPerformanceFrequency returned invalid result (%llu)\n",
841 result.QuadPart);
842 }
843
844 return result;
845}
846
847LARGE_INTEGER WindowsClock::GetMillisecondsAsLargeInt(
848 const LARGE_INTEGER& freq) {
849 LARGE_INTEGER counter;
850 if (!QueryPerformanceCounter(&counter)) {
851 PrintError("QueryPerformanceCounter");
852 pdie(255, "Error getting performance counter\n");
853 }
854
855 LARGE_INTEGER result;
856 result.QuadPart =
857 // seconds
858 (counter.QuadPart / freq.QuadPart) * 1000LL +
859 // milliseconds
860 (((counter.QuadPart % freq.QuadPart) * 1000LL) / freq.QuadPart);
861
862 return result;
863}
864
865const WindowsClock WindowsClock::INSTANCE;
866
867WindowsClock::WindowsClock()
868 : kFrequency(GetFrequency()),
869 kStart(GetMillisecondsAsLargeInt(kFrequency)) {}
870
871uint64_t WindowsClock::GetMilliseconds() const {
872 return GetMillisecondsAsLargeInt(kFrequency).QuadPart;
873}
874
875uint64_t WindowsClock::GetProcessMilliseconds() const {
876 return GetMilliseconds() - kStart.QuadPart;
877}
878
Han-Wen Nienhuysd08b27f2015-02-25 16:45:20 +0100879} // namespace blaze