1 //===- Win32/Process.cpp - Win32 Process Implementation ------- -*- C++ -*-===//
3 // The LLVM Compiler Infrastructure
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
8 //===----------------------------------------------------------------------===//
10 // This file provides the Win32 specific implementation of the Process class.
12 //===----------------------------------------------------------------------===//
14 #include "llvm/Support/Allocator.h"
15 #include "llvm/Support/ErrorHandling.h"
18 // The Windows.h header must be after LLVM and standard headers.
19 #include "WindowsSupport.h"
27 #if (HAVE_LIBPSAPI != 1)
28 #error "libpsapi.a should be present"
30 #if (HAVE_LIBSHELL32 != 1)
31 #error "libshell32.a should be present"
34 #pragma comment(lib, "psapi.lib")
35 #pragma comment(lib, "shell32.lib")
38 //===----------------------------------------------------------------------===//
39 //=== WARNING: Implementation here must contain only Win32 specific code
40 //=== and must not be UNIX code
41 //===----------------------------------------------------------------------===//
44 // This ban should be lifted when MinGW 1.0+ has defined this value.
52 process::id_type self_process::get_id() {
53 return GetCurrentProcessId();
56 static TimeValue getTimeValueFromFILETIME(FILETIME Time) {
57 ULARGE_INTEGER TimeInteger;
58 TimeInteger.LowPart = Time.dwLowDateTime;
59 TimeInteger.HighPart = Time.dwHighDateTime;
61 // FILETIME's are # of 100 nanosecond ticks (1/10th of a microsecond)
63 static_cast<TimeValue::SecondsType>(TimeInteger.QuadPart / 10000000),
64 static_cast<TimeValue::NanoSecondsType>(
65 (TimeInteger.QuadPart % 10000000) * 100));
68 TimeValue self_process::get_user_time() const {
69 FILETIME ProcCreate, ProcExit, KernelTime, UserTime;
70 if (GetProcessTimes(GetCurrentProcess(), &ProcCreate, &ProcExit, &KernelTime,
74 return getTimeValueFromFILETIME(UserTime);
77 TimeValue self_process::get_system_time() const {
78 FILETIME ProcCreate, ProcExit, KernelTime, UserTime;
79 if (GetProcessTimes(GetCurrentProcess(), &ProcCreate, &ProcExit, &KernelTime,
83 return getTimeValueFromFILETIME(KernelTime);
86 // This function retrieves the page size using GetNativeSystemInfo() and is
87 // present solely so it can be called once to initialize the self_process member
89 static unsigned getPageSize() {
90 // GetNativeSystemInfo() provides the physical page size which may differ
91 // from GetSystemInfo() in 32-bit applications running under WOW64.
93 GetNativeSystemInfo(&info);
94 // FIXME: FileOffset in MapViewOfFile() should be aligned to not dwPageSize,
95 // but dwAllocationGranularity.
96 return static_cast<unsigned>(info.dwPageSize);
99 // This constructor guaranteed to be run exactly once on a single thread, and
100 // sets up various process invariants that can be queried cheaply from then on.
101 self_process::self_process() : PageSize(getPageSize()) {
106 Process::GetMallocUsage()
109 hinfo._pentry = NULL;
113 while (_heapwalk(&hinfo) == _HEAPOK)
119 void Process::GetTimeUsage(TimeValue &elapsed, TimeValue &user_time,
120 TimeValue &sys_time) {
121 elapsed = TimeValue::now();
123 FILETIME ProcCreate, ProcExit, KernelTime, UserTime;
124 if (GetProcessTimes(GetCurrentProcess(), &ProcCreate, &ProcExit, &KernelTime,
128 user_time = getTimeValueFromFILETIME(UserTime);
129 sys_time = getTimeValueFromFILETIME(KernelTime);
132 // Some LLVM programs such as bugpoint produce core files as a normal part of
133 // their operation. To prevent the disk from filling up, this configuration
134 // item does what's necessary to prevent their generation.
135 void Process::PreventCoreFiles() {
136 // Windows does have the concept of core files, called minidumps. However,
137 // disabling minidumps for a particular application extends past the lifetime
138 // of that application, which is the incorrect behavior for this API.
139 // Additionally, the APIs require elevated privileges to disable and re-
140 // enable minidumps, which makes this untenable. For more information, see
141 // WerAddExcludedApplication and WerRemoveExcludedApplication (Vista and
144 // Windows also has modal pop-up message boxes. As this method is used by
145 // bugpoint, preventing these pop-ups is additionally important.
146 SetErrorMode(SEM_FAILCRITICALERRORS |
147 SEM_NOGPFAULTERRORBOX |
148 SEM_NOOPENFILEERRORBOX);
151 /// Returns the environment variable \arg Name's value as a string encoded in
152 /// UTF-8. \arg Name is assumed to be in UTF-8 encoding.
153 Optional<std::string> Process::GetEnv(StringRef Name) {
154 // Convert the argument to UTF-16 to pass it to _wgetenv().
155 SmallVector<wchar_t, 128> NameUTF16;
156 if (windows::UTF8ToUTF16(Name, NameUTF16))
159 // Environment variable can be encoded in non-UTF8 encoding, and there's no
160 // way to know what the encoding is. The only reliable way to look up
161 // multibyte environment variable is to use GetEnvironmentVariableW().
162 SmallVector<wchar_t, MAX_PATH> Buf;
163 size_t Size = MAX_PATH;
167 GetEnvironmentVariableW(NameUTF16.data(), Buf.data(), Buf.capacity());
171 // Try again with larger buffer.
172 } while (Size > Buf.capacity());
175 // Convert the result from UTF-16 to UTF-8.
176 SmallVector<char, MAX_PATH> Res;
177 if (windows::UTF16ToUTF8(Buf.data(), Size, Res))
179 return std::string(Res.data());
182 static error_code windows_error(DWORD E) {
183 return error_code(E, system_category());
187 Process::GetArgumentVector(SmallVectorImpl<const char *> &Args,
188 ArrayRef<const char *>,
189 SpecificBumpPtrAllocator<char> &ArgAllocator) {
193 wchar_t **UnicodeCommandLine = CommandLineToArgvW(GetCommandLineW(),
195 if (!UnicodeCommandLine)
196 return windows_error(::GetLastError());
198 Args.reserve(NewArgCount);
200 for (int i = 0; i < NewArgCount; ++i) {
201 SmallVector<char, MAX_PATH> NewArgString;
202 ec = windows::UTF16ToUTF8(UnicodeCommandLine[i],
203 wcslen(UnicodeCommandLine[i]),
208 char *Buffer = ArgAllocator.Allocate(NewArgString.size() + 1);
209 ::memcpy(Buffer, NewArgString.data(), NewArgString.size() + 1);
210 Args.push_back(Buffer);
212 LocalFree(UnicodeCommandLine);
219 bool Process::StandardInIsUserInput() {
220 return FileDescriptorIsDisplayed(0);
223 bool Process::StandardOutIsDisplayed() {
224 return FileDescriptorIsDisplayed(1);
227 bool Process::StandardErrIsDisplayed() {
228 return FileDescriptorIsDisplayed(2);
231 bool Process::FileDescriptorIsDisplayed(int fd) {
232 DWORD Mode; // Unused
233 return (GetConsoleMode((HANDLE)_get_osfhandle(fd), &Mode) != 0);
236 unsigned Process::StandardOutColumns() {
237 unsigned Columns = 0;
238 CONSOLE_SCREEN_BUFFER_INFO csbi;
239 if (GetConsoleScreenBufferInfo(GetStdHandle(STD_OUTPUT_HANDLE), &csbi))
240 Columns = csbi.dwSize.X;
244 unsigned Process::StandardErrColumns() {
245 unsigned Columns = 0;
246 CONSOLE_SCREEN_BUFFER_INFO csbi;
247 if (GetConsoleScreenBufferInfo(GetStdHandle(STD_ERROR_HANDLE), &csbi))
248 Columns = csbi.dwSize.X;
252 // The terminal always has colors.
253 bool Process::FileDescriptorHasColors(int fd) {
254 return FileDescriptorIsDisplayed(fd);
257 bool Process::StandardOutHasColors() {
258 return FileDescriptorHasColors(1);
261 bool Process::StandardErrHasColors() {
262 return FileDescriptorHasColors(2);
265 static bool UseANSI = false;
266 void Process::UseANSIEscapeCodes(bool enable) {
277 :defaultColor(GetCurrentColor()) {}
278 static unsigned GetCurrentColor() {
279 CONSOLE_SCREEN_BUFFER_INFO csbi;
280 if (GetConsoleScreenBufferInfo(GetStdHandle(STD_OUTPUT_HANDLE), &csbi))
281 return csbi.wAttributes;
284 WORD operator()() const { return defaultColor; }
287 DefaultColors defaultColors;
290 bool Process::ColorNeedsFlush() {
294 const char *Process::OutputBold(bool bg) {
295 if (UseANSI) return "\033[1m";
297 WORD colors = DefaultColors::GetCurrentColor();
299 colors |= BACKGROUND_INTENSITY;
301 colors |= FOREGROUND_INTENSITY;
302 SetConsoleTextAttribute(GetStdHandle(STD_OUTPUT_HANDLE), colors);
306 const char *Process::OutputColor(char code, bool bold, bool bg) {
307 if (UseANSI) return colorcodes[bg?1:0][bold?1:0][code&7];
311 colors = ((code&1) ? BACKGROUND_RED : 0) |
312 ((code&2) ? BACKGROUND_GREEN : 0 ) |
313 ((code&4) ? BACKGROUND_BLUE : 0);
315 colors |= BACKGROUND_INTENSITY;
317 colors = ((code&1) ? FOREGROUND_RED : 0) |
318 ((code&2) ? FOREGROUND_GREEN : 0 ) |
319 ((code&4) ? FOREGROUND_BLUE : 0);
321 colors |= FOREGROUND_INTENSITY;
323 SetConsoleTextAttribute(GetStdHandle(STD_OUTPUT_HANDLE), colors);
327 static WORD GetConsoleTextAttribute(HANDLE hConsoleOutput) {
328 CONSOLE_SCREEN_BUFFER_INFO info;
329 GetConsoleScreenBufferInfo(GetStdHandle(STD_OUTPUT_HANDLE), &info);
330 return info.wAttributes;
333 const char *Process::OutputReverse() {
334 if (UseANSI) return "\033[7m";
336 const WORD attributes
337 = GetConsoleTextAttribute(GetStdHandle(STD_OUTPUT_HANDLE));
339 const WORD foreground_mask = FOREGROUND_BLUE | FOREGROUND_GREEN |
340 FOREGROUND_RED | FOREGROUND_INTENSITY;
341 const WORD background_mask = BACKGROUND_BLUE | BACKGROUND_GREEN |
342 BACKGROUND_RED | BACKGROUND_INTENSITY;
343 const WORD color_mask = foreground_mask | background_mask;
345 WORD new_attributes =
346 ((attributes & FOREGROUND_BLUE )?BACKGROUND_BLUE :0) |
347 ((attributes & FOREGROUND_GREEN )?BACKGROUND_GREEN :0) |
348 ((attributes & FOREGROUND_RED )?BACKGROUND_RED :0) |
349 ((attributes & FOREGROUND_INTENSITY)?BACKGROUND_INTENSITY:0) |
350 ((attributes & BACKGROUND_BLUE )?FOREGROUND_BLUE :0) |
351 ((attributes & BACKGROUND_GREEN )?FOREGROUND_GREEN :0) |
352 ((attributes & BACKGROUND_RED )?FOREGROUND_RED :0) |
353 ((attributes & BACKGROUND_INTENSITY)?FOREGROUND_INTENSITY:0) |
355 new_attributes = (attributes & ~color_mask) | (new_attributes & color_mask);
357 SetConsoleTextAttribute(GetStdHandle(STD_OUTPUT_HANDLE), new_attributes);
361 const char *Process::ResetColor() {
362 if (UseANSI) return "\033[0m";
363 SetConsoleTextAttribute(GetStdHandle(STD_OUTPUT_HANDLE), defaultColors());
367 unsigned Process::GetRandomNumber() {
369 if (!::CryptAcquireContextW(&HCPC, NULL, NULL, PROV_RSA_FULL,
370 CRYPT_VERIFYCONTEXT))
371 report_fatal_error("Could not acquire a cryptographic context");
373 ScopedCryptContext CryptoProvider(HCPC);
375 if (!::CryptGenRandom(CryptoProvider, sizeof(Ret),
376 reinterpret_cast<BYTE *>(&Ret)))
377 report_fatal_error("Could not generate a random number");