/* * Copyright 1993, 1995 Christopher Seiwald. * * This file is part of Jam - see jam.c for Copyright information. */ /* This file is ALSO: * Copyright 2001-2004 David Abrahams. * Copyright 2007 Rene Rivera. * Distributed under the Boost Software License, Version 1.0. * (See accompanying file LICENSE_1_0.txt or copy at * http://www.boost.org/LICENSE_1_0.txt) */ /* * execnt.c - execute a shell command on Windows NT * * If $(JAMSHELL) is defined, uses that to formulate the actual command. The * default is: cmd.exe /Q/C * * In $(JAMSHELL), % expands to the command string and ! expands to the slot * number (starting at 1) for multiprocess (-j) invocations. If $(JAMSHELL) does * not include a %, it is tacked on as the last argument. * * Each $(JAMSHELL) placeholder must be specified as a separate individual * element in a jam variable value. * * Do not just set JAMSHELL to cmd.exe - it will not work! * * External routines: * exec_check() - preprocess and validate the command * exec_cmd() - launch an async command execution * exec_wait() - wait for any of the async command processes to terminate * * Internal routines: * filetime_to_seconds() - Windows FILETIME --> number of seconds conversion */ #include "jam.h" #ifdef USE_EXECNT #include "execcmd.h" #include "lists.h" #include "output.h" #include "pathsys.h" #include "string.h" #include #include #include #include #define WIN32_LEAN_AND_MEAN #include #include #include /* get the maximum shell command line length according to the OS */ static int maxline(); /* valid raw command string length */ static long raw_command_length( char const * command ); /* add two 64-bit unsigned numbers, h1l1 and h2l2 */ static FILETIME add_64( unsigned long h1, unsigned long l1, unsigned long h2, unsigned long l2 ); /* */ static FILETIME add_FILETIME( FILETIME t1, FILETIME t2 ); /* */ static FILETIME negate_FILETIME( FILETIME t ); /* record the timing info for the process */ static void record_times( HANDLE const, timing_info * const ); /* calc the current running time of an *active* process */ static double running_time( HANDLE const ); /* terminate the given process, after terminating all its children first */ static void kill_process_tree( DWORD const procesdId, HANDLE const ); /* waits for a command to complete or time out */ static int try_wait( int const timeoutMillis ); /* reads any pending output for running commands */ static void read_output(); /* checks if a command ran out of time, and kills it */ static int try_kill_one(); /* is the first process a parent (direct or indirect) to the second one */ static int is_parent_child( DWORD const parent, DWORD const child ); /* */ static void close_alert( PROCESS_INFORMATION const * const ); /* close any alerts hanging around */ static void close_alerts(); /* prepare a command file to be executed using an external shell */ static char const * prepare_command_file( string const * command, int slot ); /* invoke the actual external process using the given command line */ static void invoke_cmd( char const * const command, int const slot ); /* find a free slot in the running commands table */ static int get_free_cmdtab_slot(); /* put together the final command string we are to run */ static void string_new_from_argv( string * result, char const * const * argv ); /* frees and renews the given string */ static void string_renew( string * const ); /* reports the last failed Windows API related error message */ static void reportWindowsError( char const * const apiName ); /* closes a Windows HANDLE and resets its variable to 0. */ static void closeWinHandle( HANDLE * const handle ); /* ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ */ /* CreateProcessA() Windows API places a limit of 32768 characters (bytes) on * the allowed command-line length, including a trailing Unicode (2-byte) * nul-terminator character. */ #define MAX_RAW_COMMAND_LENGTH 32766 /* We hold handles for pipes used to communicate with child processes in two * element arrays indexed as follows. */ #define EXECCMD_PIPE_READ 0 #define EXECCMD_PIPE_WRITE 1 static int intr_installed; /* The list of commands we run. */ static struct { /* Temporary command file used to execute the action when needed. */ string command_file[ 1 ]; /* Pipes for communicating with the child process. Parent reads from (0), * child writes to (1). */ HANDLE pipe_out[ 2 ]; HANDLE pipe_err[ 2 ]; string buffer_out[ 1 ]; /* buffer to hold stdout, if any */ string buffer_err[ 1 ]; /* buffer to hold stderr, if any */ PROCESS_INFORMATION pi; /* running process information */ /* Function called when the command completes. */ ExecCmdCallback func; /* Opaque data passed back to the 'func' callback. */ void * closure; } cmdtab[ MAXJOBS ] = { { 0 } }; /* * Execution unit tests. */ void execnt_unit_test() { #if !defined( NDEBUG ) /* vc6 preprocessor is broken, so assert with these strings gets confused. * Use a table instead. */ { typedef struct test { char * command; int result; } test; test tests[] = { { "", 0 }, { " ", 0 }, { "x", 1 }, { "\nx", 1 }, { "x\n", 1 }, { "\nx\n", 1 }, { "\nx \n", 2 }, { "\nx \n ", 2 }, { " \n\t\t\v\r\r\n \t x \v \t\t\r\n\n\n \n\n\v\t", 8 }, { "x\ny", -1 }, { "x\n\n y", -1 }, { "echo x > foo.bar", -1 }, { "echo x < foo.bar", -1 }, { "echo x | foo.bar", -1 }, { "echo x \">\" foo.bar", 18 }, { "echo x '<' foo.bar", 18 }, { "echo x \"|\" foo.bar", 18 }, { "echo x \\\">\\\" foo.bar", -1 }, { "echo x \\\"<\\\" foo.bar", -1 }, { "echo x \\\"|\\\" foo.bar", -1 }, { "\"echo x > foo.bar\"", 18 }, { "echo x \"'\"<' foo.bar", -1 }, { "echo x \\\\\"<\\\\\" foo.bar", 22 }, { "echo x \\x\\\"<\\\\\" foo.bar", -1 }, { 0 } }; test const * t; for ( t = tests; t->command; ++t ) assert( raw_command_length( t->command ) == t->result ); } { int const length = maxline() + 9; char * const cmd = (char *)BJAM_MALLOC_ATOMIC( length + 1 ); memset( cmd, 'x', length ); cmd[ length ] = 0; assert( raw_command_length( cmd ) == length ); BJAM_FREE( cmd ); } #endif } /* * exec_check() - preprocess and validate the command */ int exec_check ( string const * command, LIST * * pShell, int * error_length, int * error_max_length ) { /* Default shell does nothing when triggered with an empty or a * whitespace-only command so we simply skip running it in that case. We * still pass them on to non-default shells as we do not really know what * they are going to do with such commands. */ if ( list_empty( *pShell ) ) { char const * s = command->value; while ( isspace( *s ) ) ++s; if ( !*s ) return EXEC_CHECK_NOOP; } /* Check prerequisites for executing raw commands. */ if ( is_raw_command_request( *pShell ) ) { int const raw_cmd_length = raw_command_length( command->value ); if ( raw_cmd_length < 0 ) { /* Invalid characters detected - fallback to default shell. */ list_free( *pShell ); *pShell = L0; } else if ( raw_cmd_length > MAX_RAW_COMMAND_LENGTH ) { *error_length = raw_cmd_length; *error_max_length = MAX_RAW_COMMAND_LENGTH; return EXEC_CHECK_TOO_LONG; } else return raw_cmd_length ? EXEC_CHECK_OK : EXEC_CHECK_NOOP; } /* Now we know we are using an external shell. Note that there is no need to * check for too long command strings when using an external shell since we * use a command file and assume no one is going to set up a JAMSHELL format * string longer than a few hundred bytes at most which should be well under * the total command string limit. Should someone actually construct such a * JAMSHELL value it will get reported as an 'invalid parameter' * CreateProcessA() Windows API failure which seems like a good enough * result for such intentional mischief. */ /* Check for too long command lines. */ return check_cmd_for_too_long_lines( command->value, maxline(), error_length, error_max_length ); } /* * exec_cmd() - launch an async command execution * * We assume exec_check() already verified that the given command can have its * command string constructed as requested. */ void exec_cmd ( string const * cmd_orig, ExecCmdCallback func, void * closure, LIST * shell ) { int const slot = get_free_cmdtab_slot(); int const is_raw_cmd = is_raw_command_request( shell ); string cmd_local[ 1 ]; /* Initialize default shell - anything more than /Q/C is non-portable. */ static LIST * default_shell; if ( !default_shell ) default_shell = list_new( object_new( "cmd.exe /Q/C" ) ); /* Specifying no shell means requesting the default shell. */ if ( list_empty( shell ) ) shell = default_shell; if ( DEBUG_EXECCMD ) if ( is_raw_cmd ) printf( "Executing raw command directly\n" ); else { printf( "Executing using a command file and the shell: " ); list_print( shell ); printf( "\n" ); } /* If we are running a raw command directly - trim its leading whitespaces * as well as any trailing all-whitespace lines but keep any trailing * whitespace in the final/only line containing something other than * whitespace). */ if ( is_raw_cmd ) { char const * start = cmd_orig->value; char const * p = cmd_orig->value + cmd_orig->size; char const * end = p; while ( isspace( *start ) ) ++start; while ( p > start && isspace( p[ -1 ] ) ) if ( *--p == '\n' ) end = p; string_new( cmd_local ); string_append_range( cmd_local, start, end ); assert( cmd_local->size == raw_command_length( cmd_orig->value ) ); } /* If we are not running a raw command directly, prepare a command file to * be executed using an external shell and the actual command string using * that command file. */ else { char const * const cmd_file = prepare_command_file( cmd_orig, slot ); char const * argv[ MAXARGC + 1 ]; /* +1 for NULL */ argv_from_shell( argv, shell, cmd_file, slot ); string_new_from_argv( cmd_local, argv ); } /* Catch interrupts whenever commands are running. */ if ( !intr_installed ) { intr_installed = 1; signal( SIGINT, onintr ); } /* Save input data into the selected running commands table slot. */ cmdtab[ slot ].func = func; cmdtab[ slot ].closure = closure; /* Invoke the actual external process using the constructed command line. */ invoke_cmd( cmd_local->value, slot ); /* Free our local command string copy. */ string_free( cmd_local ); } /* * exec_wait() - wait for any of the async command processes to terminate * * Wait and drive at most one execution completion, while processing the I/O for * all ongoing commands. */ void exec_wait() { int i = -1; int exit_reason; /* reason why a command completed */ /* Wait for a command to complete, while snarfing up any output. */ while ( 1 ) { /* Check for a complete command, briefly. */ i = try_wait( 500 ); /* Read in the output of all running commands. */ read_output(); /* Close out pending debug style dialogs. */ close_alerts(); /* Process the completed command we found. */ if ( i >= 0 ) { exit_reason = EXIT_OK; break; } /* Check if a command ran out of time. */ i = try_kill_one(); if ( i >= 0 ) { exit_reason = EXIT_TIMEOUT; break; } } /* We have a command... process it. */ { DWORD exit_code; timing_info time; int rstat; /* The time data for the command. */ record_times( cmdtab[ i ].pi.hProcess, &time ); /* Removed the used temporary command file. */ if ( cmdtab[ i ].command_file->size ) unlink( cmdtab[ i ].command_file->value ); /* Find out the process exit code. */ GetExitCodeProcess( cmdtab[ i ].pi.hProcess, &exit_code ); /* The dispossition of the command. */ if ( interrupted() ) rstat = EXEC_CMD_INTR; else if ( exit_code ) rstat = EXEC_CMD_FAIL; else rstat = EXEC_CMD_OK; /* Call the callback, may call back to jam rule land. */ (*cmdtab[ i ].func)( cmdtab[ i ].closure, rstat, &time, cmdtab[ i ].buffer_out->value, cmdtab[ i ].buffer_err->value, exit_reason ); /* Clean up our child process tracking data. No need to clear the * temporary command file name as it gets reused. */ closeWinHandle( &cmdtab[ i ].pi.hProcess ); closeWinHandle( &cmdtab[ i ].pi.hThread ); closeWinHandle( &cmdtab[ i ].pipe_out[ EXECCMD_PIPE_READ ] ); closeWinHandle( &cmdtab[ i ].pipe_out[ EXECCMD_PIPE_WRITE ] ); closeWinHandle( &cmdtab[ i ].pipe_err[ EXECCMD_PIPE_READ ] ); closeWinHandle( &cmdtab[ i ].pipe_err[ EXECCMD_PIPE_WRITE ] ); string_renew( cmdtab[ i ].buffer_out ); string_renew( cmdtab[ i ].buffer_err ); } } /* ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ */ /* * Invoke the actual external process using the given command line. Track the * process in our running commands table. */ static void invoke_cmd( char const * const command, int const slot ) { SECURITY_ATTRIBUTES sa = { sizeof( SECURITY_ATTRIBUTES ), 0, 0 }; SECURITY_DESCRIPTOR sd; STARTUPINFO si = { sizeof( STARTUPINFO ), 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; /* Init the security data. */ InitializeSecurityDescriptor( &sd, SECURITY_DESCRIPTOR_REVISION ); SetSecurityDescriptorDacl( &sd, TRUE, NULL, FALSE ); sa.lpSecurityDescriptor = &sd; sa.bInheritHandle = TRUE; /* Create pipes for communicating with the child process. */ if ( !CreatePipe( &cmdtab[ slot ].pipe_out[ EXECCMD_PIPE_READ ], &cmdtab[ slot ].pipe_out[ EXECCMD_PIPE_WRITE ], &sa, 0 ) ) { reportWindowsError( "CreatePipe" ); exit( EXITBAD ); } if ( globs.pipe_action && !CreatePipe( &cmdtab[ slot ].pipe_err[ EXECCMD_PIPE_READ ], &cmdtab[ slot ].pipe_err[ EXECCMD_PIPE_WRITE ], &sa, 0 ) ) { reportWindowsError( "CreatePipe" ); exit( EXITBAD ); } /* Set handle inheritance off for the pipe ends the parent reads from. */ SetHandleInformation( cmdtab[ slot ].pipe_out[ EXECCMD_PIPE_READ ], HANDLE_FLAG_INHERIT, 0 ); if ( globs.pipe_action ) SetHandleInformation( cmdtab[ slot ].pipe_err[ EXECCMD_PIPE_READ ], HANDLE_FLAG_INHERIT, 0 ); /* Hide the child window, if any. */ si.dwFlags |= STARTF_USESHOWWINDOW; si.wShowWindow = SW_HIDE; /* Redirect the child's output streams to our pipes. */ si.dwFlags |= STARTF_USESTDHANDLES; si.hStdOutput = cmdtab[ slot ].pipe_out[ EXECCMD_PIPE_WRITE ]; si.hStdError = globs.pipe_action ? cmdtab[ slot ].pipe_err[ EXECCMD_PIPE_WRITE ] : cmdtab[ slot ].pipe_out[ EXECCMD_PIPE_WRITE ]; /* Let the child inherit stdin, as some commands assume it is available. */ si.hStdInput = GetStdHandle( STD_INPUT_HANDLE ); /* Create output buffers. */ string_new( cmdtab[ slot ].buffer_out ); string_new( cmdtab[ slot ].buffer_err ); if ( DEBUG_EXECCMD ) printf( "Command string for CreateProcessA(): '%s'\n", command ); /* Run the command by creating a sub-process for it. */ if ( !CreateProcessA( NULL , /* application name */ (char *)command , /* command line */ NULL , /* process attributes */ NULL , /* thread attributes */ TRUE , /* inherit handles */ CREATE_NEW_PROCESS_GROUP, /* create flags */ NULL , /* env vars, null inherits env */ NULL , /* current dir, null is our current dir */ &si , /* startup info */ &cmdtab[ slot ].pi ) ) /* child process info, if created */ { reportWindowsError( "CreateProcessA" ); exit( EXITBAD ); } } /* * For more details on Windows cmd.exe shell command-line length limitations see * the following MSDN article: * http://support.microsoft.com/default.aspx?scid=kb;en-us;830473 */ static int raw_maxline() { OSVERSIONINFO os_info; os_info.dwOSVersionInfoSize = sizeof( os_info ); GetVersionEx( &os_info ); if ( os_info.dwMajorVersion >= 5 ) return 8191; /* XP */ if ( os_info.dwMajorVersion == 4 ) return 2047; /* NT 4.x */ return 996; /* NT 3.5.1 */ } static int maxline() { static result; if ( !result ) result = raw_maxline(); return result; } /* * Closes a Windows HANDLE and resets its variable to 0. */ static void closeWinHandle( HANDLE * const handle ) { if ( *handle ) { CloseHandle( *handle ); *handle = 0; } } /* * Frees and renews the given string. */ static void string_renew( string * const s ) { string_free( s ); string_new( s ); } /* * raw_command_length() - valid raw command string length * * Checks whether the given command may be executed as a raw command. If yes, * returns the corresponding command string length. If not, returns -1. * * Rules for constructing raw command strings: * - Command may not contain unquoted shell I/O redirection characters. * - May have at most one command line with non-whitespace content. * - Leading whitespace trimmed. * - Trailing all-whitespace lines trimmed. * - Trailing whitespace on the sole command line kept (may theoretically * affect the executed command). */ static long raw_command_length( char const * command ) { char const * p; char const * escape = 0; char inquote = 0; char const * newline = 0; /* Skip leading whitespace. */ while ( isspace( *command ) ) ++command; p = command; /* Look for newlines and unquoted I/O redirection. */ do { p += strcspn( p, "\n\"'<>|\\" ); switch ( *p ) { case '\n': /* If our command contains non-whitespace content split over * multiple lines we can not execute it directly. */ newline = p; while ( isspace( *++p ) ); if ( *p ) return -1; break; case '\\': escape = escape && escape == p - 1 ? 0 : p; ++p; break; case '"': case '\'': if ( escape && escape == p - 1 ) escape = 0; else if ( inquote == *p ) inquote = 0; else if ( !inquote ) inquote = *p; ++p; break; case '<': case '>': case '|': if ( !inquote ) return -1; ++p; break; } } while ( *p ); /* Return the number of characters the command will occupy. */ return ( newline ? newline : p ) - command; } /* 64-bit arithmetic helpers. */ /* Compute the carry bit from the addition of two 32-bit unsigned numbers. */ #define add_carry_bit( a, b ) ((((a) | (b)) >> 31) & (~((a) + (b)) >> 31) & 0x1) /* Compute the high 32 bits of the addition of two 64-bit unsigned numbers, h1l1 * and h2l2. */ #define add_64_hi( h1, l1, h2, l2 ) ((h1) + (h2) + add_carry_bit(l1, l2)) /* * Add two 64-bit unsigned numbers, h1l1 and h2l2. */ static FILETIME add_64 ( unsigned long h1, unsigned long l1, unsigned long h2, unsigned long l2 ) { FILETIME result; result.dwLowDateTime = l1 + l2; result.dwHighDateTime = add_64_hi( h1, l1, h2, l2 ); return result; } static FILETIME add_FILETIME( FILETIME t1, FILETIME t2 ) { return add_64( t1.dwHighDateTime, t1.dwLowDateTime, t2.dwHighDateTime, t2.dwLowDateTime ); } static FILETIME negate_FILETIME( FILETIME t ) { /* 2s complement negation */ return add_64( ~t.dwHighDateTime, ~t.dwLowDateTime, 0, 1 ); } /* * filetime_to_seconds() - Windows FILETIME --> number of seconds conversion */ static double filetime_to_seconds( FILETIME const ft ) { return ft.dwHighDateTime * ( (double)( 1UL << 31 ) * 2.0 * 1.0e-7 ) + ft.dwLowDateTime * 1.0e-7; } static void record_times( HANDLE const process, timing_info * const time ) { FILETIME creation; FILETIME exit; FILETIME kernel; FILETIME user; if ( GetProcessTimes( process, &creation, &exit, &kernel, &user ) ) { time->system = filetime_to_seconds( kernel ); time->user = filetime_to_seconds( user ); timestamp_from_filetime( &time->start, &creation ); timestamp_from_filetime( &time->end, &exit ); } } #define IO_BUFFER_SIZE ( 16 * 1024 ) static char ioBuffer[ IO_BUFFER_SIZE + 1 ]; static void read_pipe ( HANDLE in, /* the pipe to read from */ string * out ) { DWORD bytesInBuffer = 0; DWORD bytesAvailable = 0; do { /* check if we have any data to read */ if ( !PeekNamedPipe( in, ioBuffer, IO_BUFFER_SIZE, &bytesInBuffer, &bytesAvailable, NULL ) ) bytesAvailable = 0; /* read in the available data */ if ( bytesAvailable > 0 ) { /* we only read in the available bytes, to avoid blocking */ if ( ReadFile( in, ioBuffer, bytesAvailable <= IO_BUFFER_SIZE ? bytesAvailable : IO_BUFFER_SIZE, &bytesInBuffer, NULL ) ) { if ( bytesInBuffer > 0 ) { /* Clean up some illegal chars. */ int i; for ( i = 0; i < bytesInBuffer; ++i ) { if ( ( (unsigned char)ioBuffer[ i ] < 1 ) ) ioBuffer[ i ] = '?'; } /* Null, terminate. */ ioBuffer[ bytesInBuffer ] = '\0'; /* Append to the output. */ string_append( out, ioBuffer ); /* Subtract what we read in. */ bytesAvailable -= bytesInBuffer; } else { /* Likely read a error, bail out. */ bytesAvailable = 0; } } else { /* Definitely read a error, bail out. */ bytesAvailable = 0; } } } while ( bytesAvailable > 0 ); } static void read_output() { int i; for ( i = 0; i < globs.jobs; ++i ) if ( cmdtab[ i ].pi.hProcess ) { /* Read stdout data. */ if ( cmdtab[ i ].pipe_out[ EXECCMD_PIPE_READ ] ) read_pipe( cmdtab[ i ].pipe_out[ EXECCMD_PIPE_READ ], cmdtab[ i ].buffer_out ); /* Read stderr data. */ if ( cmdtab[ i ].pipe_err[ EXECCMD_PIPE_READ ] ) read_pipe( cmdtab[ i ].pipe_err[ EXECCMD_PIPE_READ ], cmdtab[ i ].buffer_err ); } } /* * Waits for a single child process command to complete, or the timeout, * whichever comes first. Returns the index of the completed command in the * cmdtab array, or -1. */ static int try_wait( int const timeoutMillis ) { int i; int num_active; int wait_api_result; HANDLE active_handles[ MAXJOBS ]; int active_procs[ MAXJOBS ]; /* Prepare a list of all active processes to wait for. */ for ( num_active = 0, i = 0; i < globs.jobs; ++i ) if ( cmdtab[ i ].pi.hProcess ) { active_handles[ num_active ] = cmdtab[ i ].pi.hProcess; active_procs[ num_active ] = i; ++num_active; } /* Wait for a child to complete, or for our timeout window to expire. */ wait_api_result = WaitForMultipleObjects( num_active, active_handles, FALSE, timeoutMillis ); if ( ( WAIT_OBJECT_0 <= wait_api_result ) && ( wait_api_result < WAIT_OBJECT_0 + num_active ) ) { /* Terminated process detected - return its index. */ return active_procs[ wait_api_result - WAIT_OBJECT_0 ]; } /* Timeout. */ return -1; } static int try_kill_one() { /* Only need to check if a timeout was specified with the -l option. */ if ( globs.timeout > 0 ) { int i; for ( i = 0; i < globs.jobs; ++i ) if ( cmdtab[ i ].pi.hProcess ) { double const t = running_time( cmdtab[ i ].pi.hProcess ); if ( t > (double)globs.timeout ) { /* The job may have left an alert dialog around, try and get * rid of it before killing the job itself. */ close_alert( &cmdtab[ i ].pi ); /* We have a "runaway" job, kill it. */ kill_process_tree( cmdtab[ i ].pi.dwProcessId, cmdtab[ i ].pi.hProcess ); /* And return its running commands table slot. */ return i; } } } return -1; } static void close_alerts() { /* We only attempt this every 5 seconds or so, because it is not a cheap * operation, and we will catch the alerts eventually. This check uses * floats as some compilers define CLOCKS_PER_SEC as a float or double. */ if ( ( (float)clock() / (float)( CLOCKS_PER_SEC * 5 ) ) < ( 1.0 / 5.0 ) ) { int i; for ( i = 0; i < globs.jobs; ++i ) if ( cmdtab[ i ].pi.hProcess ) close_alert( &cmdtab[ i ].pi ); } } /* * Calc the current running time of an *active* process. */ static double running_time( HANDLE const process ) { FILETIME creation; FILETIME exit; FILETIME kernel; FILETIME user; if ( GetProcessTimes( process, &creation, &exit, &kernel, &user ) ) { /* Compute the elapsed time. */ FILETIME current; GetSystemTimeAsFileTime( ¤t ); return filetime_to_seconds( add_FILETIME( current, negate_FILETIME( creation ) ) ); } return 0.0; } /* * Not really optimal, or efficient, but it is easier this way, and it is not * like we are going to be killing thousands, or even tens of processes. */ static void kill_process_tree( DWORD const pid, HANDLE const process ) { HANDLE const process_snapshot_h = CreateToolhelp32Snapshot( TH32CS_SNAPPROCESS, 0 ); if ( INVALID_HANDLE_VALUE != process_snapshot_h ) { BOOL ok = TRUE; PROCESSENTRY32 pinfo; pinfo.dwSize = sizeof( PROCESSENTRY32 ); for ( ok = Process32First( process_snapshot_h, &pinfo ); ok == TRUE; ok = Process32Next( process_snapshot_h, &pinfo ) ) { if ( pinfo.th32ParentProcessID == pid ) { /* Found a child, recurse to kill it and anything else below it. */ HANDLE const ph = OpenProcess( PROCESS_ALL_ACCESS, FALSE, pinfo.th32ProcessID ); if ( ph ) { kill_process_tree( pinfo.th32ProcessID, ph ); CloseHandle( ph ); } } } CloseHandle( process_snapshot_h ); } /* Now that the children are all dead, kill the root. */ TerminateProcess( process, -2 ); } static double creation_time( HANDLE const process ) { FILETIME creation; FILETIME exit; FILETIME kernel; FILETIME user; return GetProcessTimes( process, &creation, &exit, &kernel, &user ) ? filetime_to_seconds( creation ) : 0.0; } /* * Recursive check if first process is parent (directly or indirectly) of the * second one. Both processes are passed as process ids, not handles. Special * return value 2 means that the second process is smss.exe and its parent * process is System (first argument is ignored). */ static int is_parent_child( DWORD const parent, DWORD const child ) { HANDLE process_snapshot_h = INVALID_HANDLE_VALUE; if ( !child ) return 0; if ( parent == child ) return 1; process_snapshot_h = CreateToolhelp32Snapshot( TH32CS_SNAPPROCESS, 0 ); if ( INVALID_HANDLE_VALUE != process_snapshot_h ) { BOOL ok = TRUE; PROCESSENTRY32 pinfo; pinfo.dwSize = sizeof( PROCESSENTRY32 ); for ( ok = Process32First( process_snapshot_h, &pinfo ); ok == TRUE; ok = Process32Next( process_snapshot_h, &pinfo ) ) { if ( pinfo.th32ProcessID == child ) { /* Unfortunately, process ids are not really unique. There might * be spurious "parent and child" relationship match between two * non-related processes if real parent process of a given * process has exited (while child process kept running as an * "orphan") and the process id of such parent process has been * reused by internals of the operating system when creating * another process. * * Thus an additional check is needed - process creation time. * This check may fail (i.e. return 0) for system processes due * to insufficient privileges, and that is OK. */ double tchild = 0.0; double tparent = 0.0; HANDLE const hchild = OpenProcess( PROCESS_QUERY_INFORMATION, FALSE, pinfo.th32ProcessID ); CloseHandle( process_snapshot_h ); /* csrss.exe may display message box like following: * xyz.exe - Unable To Locate Component * This application has failed to start because * boost_foo-bar.dll was not found. Re-installing the * application may fix the problem * This actually happens when starting a test process that * depends on a dynamic library which failed to build. We want * to automatically close these message boxes even though * csrss.exe is not our child process. We may depend on the fact * that (in all current versions of Windows) csrss.exe is a * direct child of the smss.exe process, which in turn is a * direct child of the System process, which always has process * id == 4. This check must be performed before comparing * process creation times. */ if ( !stricmp( pinfo.szExeFile, "csrss.exe" ) && is_parent_child( parent, pinfo.th32ParentProcessID ) == 2 ) return 1; if ( !stricmp( pinfo.szExeFile, "smss.exe" ) && ( pinfo.th32ParentProcessID == 4 ) ) return 2; if ( hchild ) { HANDLE hparent = OpenProcess( PROCESS_QUERY_INFORMATION, FALSE, pinfo.th32ParentProcessID ); if ( hparent ) { tchild = creation_time( hchild ); tparent = creation_time( hparent ); CloseHandle( hparent ); } CloseHandle( hchild ); } /* Return 0 if one of the following is true: * 1. we failed to read process creation time * 2. child was created before alleged parent */ if ( ( tchild == 0.0 ) || ( tparent == 0.0 ) || ( tchild < tparent ) ) return 0; return is_parent_child( parent, pinfo.th32ParentProcessID ) & 1; } } CloseHandle( process_snapshot_h ); } return 0; } /* * Called by the OS for each topmost window. */ BOOL CALLBACK close_alert_window_enum( HWND hwnd, LPARAM lParam ) { char buf[ 7 ] = { 0 }; PROCESS_INFORMATION const * const pi = (PROCESS_INFORMATION *)lParam; DWORD pid; DWORD tid; /* We want to find and close any window that: * 1. is visible and * 2. is a dialog and * 3. is displayed by any of our child processes */ if ( /* We assume hidden windows do not require user interaction. */ !IsWindowVisible( hwnd ) /* Failed to read class name; presume it is not a dialog. */ || !GetClassNameA( hwnd, buf, sizeof( buf ) ) /* All Windows system dialogs use the same Window class name. */ || strcmp( buf, "#32770" ) ) return TRUE; /* GetWindowThreadProcessId() returns 0 on error, otherwise thread id of * the window's message pump thread. */ tid = GetWindowThreadProcessId( hwnd, &pid ); if ( !tid || !is_parent_child( pi->dwProcessId, pid ) ) return TRUE; /* Ask real nice. */ PostMessageA( hwnd, WM_CLOSE, 0, 0 ); /* Wait and see if it worked. If not, insist. */ if ( WaitForSingleObject( pi->hProcess, 200 ) == WAIT_TIMEOUT ) { PostThreadMessageA( tid, WM_QUIT, 0, 0 ); WaitForSingleObject( pi->hProcess, 300 ); } /* Done, we do not want to check any other windows now. */ return FALSE; } static void close_alert( PROCESS_INFORMATION const * const pi ) { EnumWindows( &close_alert_window_enum, (LPARAM)pi ); } /* * Open a command file to store the command into for executing using an external * shell. Returns a pointer to a FILE open for writing or 0 in case such a file * could not be opened. The file name used is stored back in the corresponding * running commands table slot. * * Expects the running commands table slot's command_file attribute to contain * either a zeroed out string object or one prepared previously by this same * function. */ static FILE * open_command_file( int const slot ) { string * const command_file = cmdtab[ slot ].command_file; /* If the temporary command file name has not already been prepared for this * slot number, prepare a new one containing a '##' place holder that will * be changed later and needs to be located at a fixed distance from the * end. */ if ( !command_file->value ) { DWORD const procID = GetCurrentProcessId(); string const * const tmpdir = path_tmpdir(); string_new( command_file ); string_reserve( command_file, tmpdir->size + 64 ); command_file->size = sprintf( command_file->value, "%s\\jam%d-%02d-##.bat", tmpdir->value, procID, slot ); } /* For some reason opening a command file can fail intermittently. But doing * some retries works. Most likely this is due to a previously existing file * of the same name that happens to still be opened by an active virus * scanner. Originally pointed out and fixed by Bronek Kozicki. * * We first try to open several differently named files to avoid having to * wait idly if not absolutely necessary. Our temporary command file names * contain a fixed position place holder we use for generating different * file names. */ { char * const index1 = command_file->value + command_file->size - 6; char * const index2 = index1 + 1; int waits_remaining; assert( command_file->value < index1 ); assert( index2 + 1 < command_file->value + command_file->size ); assert( index2[ 1 ] == '.' ); for ( waits_remaining = 3; ; --waits_remaining ) { int index; for ( index = 0; index != 20; ++index ) { FILE * f; *index1 = '0' + index / 10; *index2 = '0' + index % 10; f = fopen( command_file->value, "w" ); if ( f ) return f; } if ( !waits_remaining ) break; Sleep( 250 ); } } return 0; } /* * Prepare a command file to be executed using an external shell. */ static char const * prepare_command_file( string const * command, int slot ) { FILE * const f = open_command_file( slot ); if ( !f ) { printf( "failed to write command file!\n" ); exit( EXITBAD ); } fputs( command->value, f ); fclose( f ); return cmdtab[ slot ].command_file->value; } /* * Find a free slot in the running commands table. */ static int get_free_cmdtab_slot() { int slot; for ( slot = 0; slot < MAXJOBS; ++slot ) if ( !cmdtab[ slot ].pi.hProcess ) return slot; printf( "no slots for child!\n" ); exit( EXITBAD ); } /* * Put together the final command string we are to run. */ static void string_new_from_argv( string * result, char const * const * argv ) { assert( argv ); assert( argv[ 0 ] ); string_copy( result, *(argv++) ); while ( *argv ) { string_push_back( result, ' ' ); string_append( result, *(argv++) ); } } /* * Reports the last failed Windows API related error message. */ static void reportWindowsError( char const * const apiName ) { char * errorMessage; DWORD const errorCode = GetLastError(); DWORD apiResult = FormatMessageA( FORMAT_MESSAGE_ALLOCATE_BUFFER | /* __in DWORD dwFlags */ FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS, NULL, /* __in_opt LPCVOID lpSource */ errorCode, /* __in DWORD dwMessageId */ 0, /* __in DWORD dwLanguageId */ (LPSTR)&errorMessage, /* __out LPTSTR lpBuffer */ 0, /* __in DWORD nSize */ 0 ); /* __in_opt va_list * Arguments */ if ( !apiResult ) printf( "%s() Windows API failed: %d.\n", apiName, errorCode ); else { printf( "%s() Windows API failed: %d - %s\n", apiName, errorCode, errorMessage ); LocalFree( errorMessage ); } } #endif /* USE_EXECNT */