Merge branch 'js/mingw-getcwd'
[git/git.git] / compat / mingw.c
1 #include "../git-compat-util.h"
2 #include "win32.h"
3 #include <conio.h>
4 #include <wchar.h>
5 #include "../strbuf.h"
6 #include "../run-command.h"
7 #include "../cache.h"
8 #include "win32/lazyload.h"
9
10 #define HCAST(type, handle) ((type)(intptr_t)handle)
11
12 static const int delay[] = { 0, 1, 10, 20, 40 };
13
14 int err_win_to_posix(DWORD winerr)
15 {
16 int error = ENOSYS;
17 switch(winerr) {
18 case ERROR_ACCESS_DENIED: error = EACCES; break;
19 case ERROR_ACCOUNT_DISABLED: error = EACCES; break;
20 case ERROR_ACCOUNT_RESTRICTION: error = EACCES; break;
21 case ERROR_ALREADY_ASSIGNED: error = EBUSY; break;
22 case ERROR_ALREADY_EXISTS: error = EEXIST; break;
23 case ERROR_ARITHMETIC_OVERFLOW: error = ERANGE; break;
24 case ERROR_BAD_COMMAND: error = EIO; break;
25 case ERROR_BAD_DEVICE: error = ENODEV; break;
26 case ERROR_BAD_DRIVER_LEVEL: error = ENXIO; break;
27 case ERROR_BAD_EXE_FORMAT: error = ENOEXEC; break;
28 case ERROR_BAD_FORMAT: error = ENOEXEC; break;
29 case ERROR_BAD_LENGTH: error = EINVAL; break;
30 case ERROR_BAD_PATHNAME: error = ENOENT; break;
31 case ERROR_BAD_PIPE: error = EPIPE; break;
32 case ERROR_BAD_UNIT: error = ENODEV; break;
33 case ERROR_BAD_USERNAME: error = EINVAL; break;
34 case ERROR_BROKEN_PIPE: error = EPIPE; break;
35 case ERROR_BUFFER_OVERFLOW: error = ENAMETOOLONG; break;
36 case ERROR_BUSY: error = EBUSY; break;
37 case ERROR_BUSY_DRIVE: error = EBUSY; break;
38 case ERROR_CALL_NOT_IMPLEMENTED: error = ENOSYS; break;
39 case ERROR_CANNOT_MAKE: error = EACCES; break;
40 case ERROR_CANTOPEN: error = EIO; break;
41 case ERROR_CANTREAD: error = EIO; break;
42 case ERROR_CANTWRITE: error = EIO; break;
43 case ERROR_CRC: error = EIO; break;
44 case ERROR_CURRENT_DIRECTORY: error = EACCES; break;
45 case ERROR_DEVICE_IN_USE: error = EBUSY; break;
46 case ERROR_DEV_NOT_EXIST: error = ENODEV; break;
47 case ERROR_DIRECTORY: error = EINVAL; break;
48 case ERROR_DIR_NOT_EMPTY: error = ENOTEMPTY; break;
49 case ERROR_DISK_CHANGE: error = EIO; break;
50 case ERROR_DISK_FULL: error = ENOSPC; break;
51 case ERROR_DRIVE_LOCKED: error = EBUSY; break;
52 case ERROR_ENVVAR_NOT_FOUND: error = EINVAL; break;
53 case ERROR_EXE_MARKED_INVALID: error = ENOEXEC; break;
54 case ERROR_FILENAME_EXCED_RANGE: error = ENAMETOOLONG; break;
55 case ERROR_FILE_EXISTS: error = EEXIST; break;
56 case ERROR_FILE_INVALID: error = ENODEV; break;
57 case ERROR_FILE_NOT_FOUND: error = ENOENT; break;
58 case ERROR_GEN_FAILURE: error = EIO; break;
59 case ERROR_HANDLE_DISK_FULL: error = ENOSPC; break;
60 case ERROR_INSUFFICIENT_BUFFER: error = ENOMEM; break;
61 case ERROR_INVALID_ACCESS: error = EACCES; break;
62 case ERROR_INVALID_ADDRESS: error = EFAULT; break;
63 case ERROR_INVALID_BLOCK: error = EFAULT; break;
64 case ERROR_INVALID_DATA: error = EINVAL; break;
65 case ERROR_INVALID_DRIVE: error = ENODEV; break;
66 case ERROR_INVALID_EXE_SIGNATURE: error = ENOEXEC; break;
67 case ERROR_INVALID_FLAGS: error = EINVAL; break;
68 case ERROR_INVALID_FUNCTION: error = ENOSYS; break;
69 case ERROR_INVALID_HANDLE: error = EBADF; break;
70 case ERROR_INVALID_LOGON_HOURS: error = EACCES; break;
71 case ERROR_INVALID_NAME: error = EINVAL; break;
72 case ERROR_INVALID_OWNER: error = EINVAL; break;
73 case ERROR_INVALID_PARAMETER: error = EINVAL; break;
74 case ERROR_INVALID_PASSWORD: error = EPERM; break;
75 case ERROR_INVALID_PRIMARY_GROUP: error = EINVAL; break;
76 case ERROR_INVALID_SIGNAL_NUMBER: error = EINVAL; break;
77 case ERROR_INVALID_TARGET_HANDLE: error = EIO; break;
78 case ERROR_INVALID_WORKSTATION: error = EACCES; break;
79 case ERROR_IO_DEVICE: error = EIO; break;
80 case ERROR_IO_INCOMPLETE: error = EINTR; break;
81 case ERROR_LOCKED: error = EBUSY; break;
82 case ERROR_LOCK_VIOLATION: error = EACCES; break;
83 case ERROR_LOGON_FAILURE: error = EACCES; break;
84 case ERROR_MAPPED_ALIGNMENT: error = EINVAL; break;
85 case ERROR_META_EXPANSION_TOO_LONG: error = E2BIG; break;
86 case ERROR_MORE_DATA: error = EPIPE; break;
87 case ERROR_NEGATIVE_SEEK: error = ESPIPE; break;
88 case ERROR_NOACCESS: error = EFAULT; break;
89 case ERROR_NONE_MAPPED: error = EINVAL; break;
90 case ERROR_NOT_ENOUGH_MEMORY: error = ENOMEM; break;
91 case ERROR_NOT_READY: error = EAGAIN; break;
92 case ERROR_NOT_SAME_DEVICE: error = EXDEV; break;
93 case ERROR_NO_DATA: error = EPIPE; break;
94 case ERROR_NO_MORE_SEARCH_HANDLES: error = EIO; break;
95 case ERROR_NO_PROC_SLOTS: error = EAGAIN; break;
96 case ERROR_NO_SUCH_PRIVILEGE: error = EACCES; break;
97 case ERROR_OPEN_FAILED: error = EIO; break;
98 case ERROR_OPEN_FILES: error = EBUSY; break;
99 case ERROR_OPERATION_ABORTED: error = EINTR; break;
100 case ERROR_OUTOFMEMORY: error = ENOMEM; break;
101 case ERROR_PASSWORD_EXPIRED: error = EACCES; break;
102 case ERROR_PATH_BUSY: error = EBUSY; break;
103 case ERROR_PATH_NOT_FOUND: error = ENOENT; break;
104 case ERROR_PIPE_BUSY: error = EBUSY; break;
105 case ERROR_PIPE_CONNECTED: error = EPIPE; break;
106 case ERROR_PIPE_LISTENING: error = EPIPE; break;
107 case ERROR_PIPE_NOT_CONNECTED: error = EPIPE; break;
108 case ERROR_PRIVILEGE_NOT_HELD: error = EACCES; break;
109 case ERROR_READ_FAULT: error = EIO; break;
110 case ERROR_SEEK: error = EIO; break;
111 case ERROR_SEEK_ON_DEVICE: error = ESPIPE; break;
112 case ERROR_SHARING_BUFFER_EXCEEDED: error = ENFILE; break;
113 case ERROR_SHARING_VIOLATION: error = EACCES; break;
114 case ERROR_STACK_OVERFLOW: error = ENOMEM; break;
115 case ERROR_SWAPERROR: error = ENOENT; break;
116 case ERROR_TOO_MANY_MODULES: error = EMFILE; break;
117 case ERROR_TOO_MANY_OPEN_FILES: error = EMFILE; break;
118 case ERROR_UNRECOGNIZED_MEDIA: error = ENXIO; break;
119 case ERROR_UNRECOGNIZED_VOLUME: error = ENODEV; break;
120 case ERROR_WAIT_NO_CHILDREN: error = ECHILD; break;
121 case ERROR_WRITE_FAULT: error = EIO; break;
122 case ERROR_WRITE_PROTECT: error = EROFS; break;
123 }
124 return error;
125 }
126
127 static inline int is_file_in_use_error(DWORD errcode)
128 {
129 switch (errcode) {
130 case ERROR_SHARING_VIOLATION:
131 case ERROR_ACCESS_DENIED:
132 return 1;
133 }
134
135 return 0;
136 }
137
138 static int read_yes_no_answer(void)
139 {
140 char answer[1024];
141
142 if (fgets(answer, sizeof(answer), stdin)) {
143 size_t answer_len = strlen(answer);
144 int got_full_line = 0, c;
145
146 /* remove the newline */
147 if (answer_len >= 2 && answer[answer_len-2] == '\r') {
148 answer[answer_len-2] = '\0';
149 got_full_line = 1;
150 } else if (answer_len >= 1 && answer[answer_len-1] == '\n') {
151 answer[answer_len-1] = '\0';
152 got_full_line = 1;
153 }
154 /* flush the buffer in case we did not get the full line */
155 if (!got_full_line)
156 while ((c = getchar()) != EOF && c != '\n')
157 ;
158 } else
159 /* we could not read, return the
160 * default answer which is no */
161 return 0;
162
163 if (tolower(answer[0]) == 'y' && !answer[1])
164 return 1;
165 if (!strncasecmp(answer, "yes", sizeof(answer)))
166 return 1;
167 if (tolower(answer[0]) == 'n' && !answer[1])
168 return 0;
169 if (!strncasecmp(answer, "no", sizeof(answer)))
170 return 0;
171
172 /* did not find an answer we understand */
173 return -1;
174 }
175
176 static int ask_yes_no_if_possible(const char *format, ...)
177 {
178 char question[4096];
179 const char *retry_hook[] = { NULL, NULL, NULL };
180 va_list args;
181
182 va_start(args, format);
183 vsnprintf(question, sizeof(question), format, args);
184 va_end(args);
185
186 if ((retry_hook[0] = mingw_getenv("GIT_ASK_YESNO"))) {
187 retry_hook[1] = question;
188 return !run_command_v_opt(retry_hook, 0);
189 }
190
191 if (!isatty(_fileno(stdin)) || !isatty(_fileno(stderr)))
192 return 0;
193
194 while (1) {
195 int answer;
196 fprintf(stderr, "%s (y/n) ", question);
197
198 if ((answer = read_yes_no_answer()) >= 0)
199 return answer;
200
201 fprintf(stderr, "Sorry, I did not understand your answer. "
202 "Please type 'y' or 'n'\n");
203 }
204 }
205
206 /* Normalizes NT paths as returned by some low-level APIs. */
207 static wchar_t *normalize_ntpath(wchar_t *wbuf)
208 {
209 int i;
210 /* fix absolute path prefixes */
211 if (wbuf[0] == '\\') {
212 /* strip NT namespace prefixes */
213 if (!wcsncmp(wbuf, L"\\??\\", 4) ||
214 !wcsncmp(wbuf, L"\\\\?\\", 4))
215 wbuf += 4;
216 else if (!wcsnicmp(wbuf, L"\\DosDevices\\", 12))
217 wbuf += 12;
218 /* replace remaining '...UNC\' with '\\' */
219 if (!wcsnicmp(wbuf, L"UNC\\", 4)) {
220 wbuf += 2;
221 *wbuf = '\\';
222 }
223 }
224 /* convert backslashes to slashes */
225 for (i = 0; wbuf[i]; i++)
226 if (wbuf[i] == '\\')
227 wbuf[i] = '/';
228 return wbuf;
229 }
230
231 int mingw_unlink(const char *pathname)
232 {
233 int ret, tries = 0;
234 wchar_t wpathname[MAX_PATH];
235 if (xutftowcs_path(wpathname, pathname) < 0)
236 return -1;
237
238 /* read-only files cannot be removed */
239 _wchmod(wpathname, 0666);
240 while ((ret = _wunlink(wpathname)) == -1 && tries < ARRAY_SIZE(delay)) {
241 if (!is_file_in_use_error(GetLastError()))
242 break;
243 /*
244 * We assume that some other process had the source or
245 * destination file open at the wrong moment and retry.
246 * In order to give the other process a higher chance to
247 * complete its operation, we give up our time slice now.
248 * If we have to retry again, we do sleep a bit.
249 */
250 Sleep(delay[tries]);
251 tries++;
252 }
253 while (ret == -1 && is_file_in_use_error(GetLastError()) &&
254 ask_yes_no_if_possible("Unlink of file '%s' failed. "
255 "Should I try again?", pathname))
256 ret = _wunlink(wpathname);
257 return ret;
258 }
259
260 static int is_dir_empty(const wchar_t *wpath)
261 {
262 WIN32_FIND_DATAW findbuf;
263 HANDLE handle;
264 wchar_t wbuf[MAX_PATH + 2];
265 wcscpy(wbuf, wpath);
266 wcscat(wbuf, L"\\*");
267 handle = FindFirstFileW(wbuf, &findbuf);
268 if (handle == INVALID_HANDLE_VALUE)
269 return GetLastError() == ERROR_NO_MORE_FILES;
270
271 while (!wcscmp(findbuf.cFileName, L".") ||
272 !wcscmp(findbuf.cFileName, L".."))
273 if (!FindNextFileW(handle, &findbuf)) {
274 DWORD err = GetLastError();
275 FindClose(handle);
276 return err == ERROR_NO_MORE_FILES;
277 }
278 FindClose(handle);
279 return 0;
280 }
281
282 int mingw_rmdir(const char *pathname)
283 {
284 int ret, tries = 0;
285 wchar_t wpathname[MAX_PATH];
286 if (xutftowcs_path(wpathname, pathname) < 0)
287 return -1;
288
289 while ((ret = _wrmdir(wpathname)) == -1 && tries < ARRAY_SIZE(delay)) {
290 if (!is_file_in_use_error(GetLastError()))
291 errno = err_win_to_posix(GetLastError());
292 if (errno != EACCES)
293 break;
294 if (!is_dir_empty(wpathname)) {
295 errno = ENOTEMPTY;
296 break;
297 }
298 /*
299 * We assume that some other process had the source or
300 * destination file open at the wrong moment and retry.
301 * In order to give the other process a higher chance to
302 * complete its operation, we give up our time slice now.
303 * If we have to retry again, we do sleep a bit.
304 */
305 Sleep(delay[tries]);
306 tries++;
307 }
308 while (ret == -1 && errno == EACCES && is_file_in_use_error(GetLastError()) &&
309 ask_yes_no_if_possible("Deletion of directory '%s' failed. "
310 "Should I try again?", pathname))
311 ret = _wrmdir(wpathname);
312 return ret;
313 }
314
315 static inline int needs_hiding(const char *path)
316 {
317 const char *basename;
318
319 if (hide_dotfiles == HIDE_DOTFILES_FALSE)
320 return 0;
321
322 /* We cannot use basename(), as it would remove trailing slashes */
323 mingw_skip_dos_drive_prefix((char **)&path);
324 if (!*path)
325 return 0;
326
327 for (basename = path; *path; path++)
328 if (is_dir_sep(*path)) {
329 do {
330 path++;
331 } while (is_dir_sep(*path));
332 /* ignore trailing slashes */
333 if (*path)
334 basename = path;
335 }
336
337 if (hide_dotfiles == HIDE_DOTFILES_TRUE)
338 return *basename == '.';
339
340 assert(hide_dotfiles == HIDE_DOTFILES_DOTGITONLY);
341 return !strncasecmp(".git", basename, 4) &&
342 (!basename[4] || is_dir_sep(basename[4]));
343 }
344
345 static int set_hidden_flag(const wchar_t *path, int set)
346 {
347 DWORD original = GetFileAttributesW(path), modified;
348 if (set)
349 modified = original | FILE_ATTRIBUTE_HIDDEN;
350 else
351 modified = original & ~FILE_ATTRIBUTE_HIDDEN;
352 if (original == modified || SetFileAttributesW(path, modified))
353 return 0;
354 errno = err_win_to_posix(GetLastError());
355 return -1;
356 }
357
358 int mingw_mkdir(const char *path, int mode)
359 {
360 int ret;
361 wchar_t wpath[MAX_PATH];
362 if (xutftowcs_path(wpath, path) < 0)
363 return -1;
364 ret = _wmkdir(wpath);
365 if (!ret && needs_hiding(path))
366 return set_hidden_flag(wpath, 1);
367 return ret;
368 }
369
370 /*
371 * Calling CreateFile() using FILE_APPEND_DATA and without FILE_WRITE_DATA
372 * is documented in [1] as opening a writable file handle in append mode.
373 * (It is believed that) this is atomic since it is maintained by the
374 * kernel unlike the O_APPEND flag which is racily maintained by the CRT.
375 *
376 * [1] https://docs.microsoft.com/en-us/windows/desktop/fileio/file-access-rights-constants
377 *
378 * This trick does not appear to work for named pipes. Instead it creates
379 * a named pipe client handle that cannot be written to. Callers should
380 * just use the regular _wopen() for them. (And since client handle gets
381 * bound to a unique server handle, it isn't really an issue.)
382 */
383 static int mingw_open_append(wchar_t const *wfilename, int oflags, ...)
384 {
385 HANDLE handle;
386 int fd;
387 DWORD create = (oflags & O_CREAT) ? OPEN_ALWAYS : OPEN_EXISTING;
388
389 /* only these flags are supported */
390 if ((oflags & ~O_CREAT) != (O_WRONLY | O_APPEND))
391 return errno = ENOSYS, -1;
392
393 /*
394 * FILE_SHARE_WRITE is required to permit child processes
395 * to append to the file.
396 */
397 handle = CreateFileW(wfilename, FILE_APPEND_DATA,
398 FILE_SHARE_WRITE | FILE_SHARE_READ,
399 NULL, create, FILE_ATTRIBUTE_NORMAL, NULL);
400 if (handle == INVALID_HANDLE_VALUE)
401 return errno = err_win_to_posix(GetLastError()), -1;
402
403 /*
404 * No O_APPEND here, because the CRT uses it only to reset the
405 * file pointer to EOF before each write(); but that is not
406 * necessary (and may lead to races) for a file created with
407 * FILE_APPEND_DATA.
408 */
409 fd = _open_osfhandle((intptr_t)handle, O_BINARY);
410 if (fd < 0)
411 CloseHandle(handle);
412 return fd;
413 }
414
415 /*
416 * Does the pathname map to the local named pipe filesystem?
417 * That is, does it have a "//./pipe/" prefix?
418 */
419 static int is_local_named_pipe_path(const char *filename)
420 {
421 return (is_dir_sep(filename[0]) &&
422 is_dir_sep(filename[1]) &&
423 filename[2] == '.' &&
424 is_dir_sep(filename[3]) &&
425 !strncasecmp(filename+4, "pipe", 4) &&
426 is_dir_sep(filename[8]) &&
427 filename[9]);
428 }
429
430 int mingw_open (const char *filename, int oflags, ...)
431 {
432 typedef int (*open_fn_t)(wchar_t const *wfilename, int oflags, ...);
433 va_list args;
434 unsigned mode;
435 int fd;
436 wchar_t wfilename[MAX_PATH];
437 open_fn_t open_fn;
438
439 va_start(args, oflags);
440 mode = va_arg(args, int);
441 va_end(args);
442
443 if (filename && !strcmp(filename, "/dev/null"))
444 filename = "nul";
445
446 if ((oflags & O_APPEND) && !is_local_named_pipe_path(filename))
447 open_fn = mingw_open_append;
448 else
449 open_fn = _wopen;
450
451 if (xutftowcs_path(wfilename, filename) < 0)
452 return -1;
453 fd = open_fn(wfilename, oflags, mode);
454
455 if (fd < 0 && (oflags & O_ACCMODE) != O_RDONLY && errno == EACCES) {
456 DWORD attrs = GetFileAttributesW(wfilename);
457 if (attrs != INVALID_FILE_ATTRIBUTES && (attrs & FILE_ATTRIBUTE_DIRECTORY))
458 errno = EISDIR;
459 }
460 if ((oflags & O_CREAT) && needs_hiding(filename)) {
461 /*
462 * Internally, _wopen() uses the CreateFile() API which errors
463 * out with an ERROR_ACCESS_DENIED if CREATE_ALWAYS was
464 * specified and an already existing file's attributes do not
465 * match *exactly*. As there is no mode or flag we can set that
466 * would correspond to FILE_ATTRIBUTE_HIDDEN, let's just try
467 * again *without* the O_CREAT flag (that corresponds to the
468 * CREATE_ALWAYS flag of CreateFile()).
469 */
470 if (fd < 0 && errno == EACCES)
471 fd = open_fn(wfilename, oflags & ~O_CREAT, mode);
472 if (fd >= 0 && set_hidden_flag(wfilename, 1))
473 warning("could not mark '%s' as hidden.", filename);
474 }
475 return fd;
476 }
477
478 static BOOL WINAPI ctrl_ignore(DWORD type)
479 {
480 return TRUE;
481 }
482
483 #undef fgetc
484 int mingw_fgetc(FILE *stream)
485 {
486 int ch;
487 if (!isatty(_fileno(stream)))
488 return fgetc(stream);
489
490 SetConsoleCtrlHandler(ctrl_ignore, TRUE);
491 while (1) {
492 ch = fgetc(stream);
493 if (ch != EOF || GetLastError() != ERROR_OPERATION_ABORTED)
494 break;
495
496 /* Ctrl+C was pressed, simulate SIGINT and retry */
497 mingw_raise(SIGINT);
498 }
499 SetConsoleCtrlHandler(ctrl_ignore, FALSE);
500 return ch;
501 }
502
503 #undef fopen
504 FILE *mingw_fopen (const char *filename, const char *otype)
505 {
506 int hide = needs_hiding(filename);
507 FILE *file;
508 wchar_t wfilename[MAX_PATH], wotype[4];
509 if (filename && !strcmp(filename, "/dev/null"))
510 filename = "nul";
511 if (xutftowcs_path(wfilename, filename) < 0 ||
512 xutftowcs(wotype, otype, ARRAY_SIZE(wotype)) < 0)
513 return NULL;
514 if (hide && !access(filename, F_OK) && set_hidden_flag(wfilename, 0)) {
515 error("could not unhide %s", filename);
516 return NULL;
517 }
518 file = _wfopen(wfilename, wotype);
519 if (!file && GetLastError() == ERROR_INVALID_NAME)
520 errno = ENOENT;
521 if (file && hide && set_hidden_flag(wfilename, 1))
522 warning("could not mark '%s' as hidden.", filename);
523 return file;
524 }
525
526 FILE *mingw_freopen (const char *filename, const char *otype, FILE *stream)
527 {
528 int hide = needs_hiding(filename);
529 FILE *file;
530 wchar_t wfilename[MAX_PATH], wotype[4];
531 if (filename && !strcmp(filename, "/dev/null"))
532 filename = "nul";
533 if (xutftowcs_path(wfilename, filename) < 0 ||
534 xutftowcs(wotype, otype, ARRAY_SIZE(wotype)) < 0)
535 return NULL;
536 if (hide && !access(filename, F_OK) && set_hidden_flag(wfilename, 0)) {
537 error("could not unhide %s", filename);
538 return NULL;
539 }
540 file = _wfreopen(wfilename, wotype, stream);
541 if (file && hide && set_hidden_flag(wfilename, 1))
542 warning("could not mark '%s' as hidden.", filename);
543 return file;
544 }
545
546 #undef fflush
547 int mingw_fflush(FILE *stream)
548 {
549 int ret = fflush(stream);
550
551 /*
552 * write() is used behind the scenes of stdio output functions.
553 * Since git code does not check for errors after each stdio write
554 * operation, it can happen that write() is called by a later
555 * stdio function even if an earlier write() call failed. In the
556 * case of a pipe whose readable end was closed, only the first
557 * call to write() reports EPIPE on Windows. Subsequent write()
558 * calls report EINVAL. It is impossible to notice whether this
559 * fflush invocation triggered such a case, therefore, we have to
560 * catch all EINVAL errors whole-sale.
561 */
562 if (ret && errno == EINVAL)
563 errno = EPIPE;
564
565 return ret;
566 }
567
568 #undef write
569 ssize_t mingw_write(int fd, const void *buf, size_t len)
570 {
571 ssize_t result = write(fd, buf, len);
572
573 if (result < 0 && errno == EINVAL && buf) {
574 /* check if fd is a pipe */
575 HANDLE h = (HANDLE) _get_osfhandle(fd);
576 if (GetFileType(h) == FILE_TYPE_PIPE)
577 errno = EPIPE;
578 else
579 errno = EINVAL;
580 }
581
582 return result;
583 }
584
585 int mingw_access(const char *filename, int mode)
586 {
587 wchar_t wfilename[MAX_PATH];
588 if (xutftowcs_path(wfilename, filename) < 0)
589 return -1;
590 /* X_OK is not supported by the MSVCRT version */
591 return _waccess(wfilename, mode & ~X_OK);
592 }
593
594 int mingw_chdir(const char *dirname)
595 {
596 wchar_t wdirname[MAX_PATH];
597 if (xutftowcs_path(wdirname, dirname) < 0)
598 return -1;
599 return _wchdir(wdirname);
600 }
601
602 int mingw_chmod(const char *filename, int mode)
603 {
604 wchar_t wfilename[MAX_PATH];
605 if (xutftowcs_path(wfilename, filename) < 0)
606 return -1;
607 return _wchmod(wfilename, mode);
608 }
609
610 /*
611 * The unit of FILETIME is 100-nanoseconds since January 1, 1601, UTC.
612 * Returns the 100-nanoseconds ("hekto nanoseconds") since the epoch.
613 */
614 static inline long long filetime_to_hnsec(const FILETIME *ft)
615 {
616 long long winTime = ((long long)ft->dwHighDateTime << 32) + ft->dwLowDateTime;
617 /* Windows to Unix Epoch conversion */
618 return winTime - 116444736000000000LL;
619 }
620
621 static inline time_t filetime_to_time_t(const FILETIME *ft)
622 {
623 return (time_t)(filetime_to_hnsec(ft) / 10000000);
624 }
625
626 /**
627 * Verifies that safe_create_leading_directories() would succeed.
628 */
629 static int has_valid_directory_prefix(wchar_t *wfilename)
630 {
631 int n = wcslen(wfilename);
632
633 while (n > 0) {
634 wchar_t c = wfilename[--n];
635 DWORD attributes;
636
637 if (!is_dir_sep(c))
638 continue;
639
640 wfilename[n] = L'\0';
641 attributes = GetFileAttributesW(wfilename);
642 wfilename[n] = c;
643 if (attributes == FILE_ATTRIBUTE_DIRECTORY ||
644 attributes == FILE_ATTRIBUTE_DEVICE)
645 return 1;
646 if (attributes == INVALID_FILE_ATTRIBUTES)
647 switch (GetLastError()) {
648 case ERROR_PATH_NOT_FOUND:
649 continue;
650 case ERROR_FILE_NOT_FOUND:
651 /* This implies parent directory exists. */
652 return 1;
653 }
654 return 0;
655 }
656 return 1;
657 }
658
659 /* We keep the do_lstat code in a separate function to avoid recursion.
660 * When a path ends with a slash, the stat will fail with ENOENT. In
661 * this case, we strip the trailing slashes and stat again.
662 *
663 * If follow is true then act like stat() and report on the link
664 * target. Otherwise report on the link itself.
665 */
666 static int do_lstat(int follow, const char *file_name, struct stat *buf)
667 {
668 WIN32_FILE_ATTRIBUTE_DATA fdata;
669 wchar_t wfilename[MAX_PATH];
670 if (xutftowcs_path(wfilename, file_name) < 0)
671 return -1;
672
673 if (GetFileAttributesExW(wfilename, GetFileExInfoStandard, &fdata)) {
674 buf->st_ino = 0;
675 buf->st_gid = 0;
676 buf->st_uid = 0;
677 buf->st_nlink = 1;
678 buf->st_mode = file_attr_to_st_mode(fdata.dwFileAttributes);
679 buf->st_size = fdata.nFileSizeLow |
680 (((off_t)fdata.nFileSizeHigh)<<32);
681 buf->st_dev = buf->st_rdev = 0; /* not used by Git */
682 buf->st_atime = filetime_to_time_t(&(fdata.ftLastAccessTime));
683 buf->st_mtime = filetime_to_time_t(&(fdata.ftLastWriteTime));
684 buf->st_ctime = filetime_to_time_t(&(fdata.ftCreationTime));
685 if (fdata.dwFileAttributes & FILE_ATTRIBUTE_REPARSE_POINT) {
686 WIN32_FIND_DATAW findbuf;
687 HANDLE handle = FindFirstFileW(wfilename, &findbuf);
688 if (handle != INVALID_HANDLE_VALUE) {
689 if ((findbuf.dwFileAttributes & FILE_ATTRIBUTE_REPARSE_POINT) &&
690 (findbuf.dwReserved0 == IO_REPARSE_TAG_SYMLINK)) {
691 if (follow) {
692 char buffer[MAXIMUM_REPARSE_DATA_BUFFER_SIZE];
693 buf->st_size = readlink(file_name, buffer, MAXIMUM_REPARSE_DATA_BUFFER_SIZE);
694 } else {
695 buf->st_mode = S_IFLNK;
696 }
697 buf->st_mode |= S_IREAD;
698 if (!(findbuf.dwFileAttributes & FILE_ATTRIBUTE_READONLY))
699 buf->st_mode |= S_IWRITE;
700 }
701 FindClose(handle);
702 }
703 }
704 return 0;
705 }
706 switch (GetLastError()) {
707 case ERROR_ACCESS_DENIED:
708 case ERROR_SHARING_VIOLATION:
709 case ERROR_LOCK_VIOLATION:
710 case ERROR_SHARING_BUFFER_EXCEEDED:
711 errno = EACCES;
712 break;
713 case ERROR_BUFFER_OVERFLOW:
714 errno = ENAMETOOLONG;
715 break;
716 case ERROR_NOT_ENOUGH_MEMORY:
717 errno = ENOMEM;
718 break;
719 case ERROR_PATH_NOT_FOUND:
720 if (!has_valid_directory_prefix(wfilename)) {
721 errno = ENOTDIR;
722 break;
723 }
724 /* fallthru */
725 default:
726 errno = ENOENT;
727 break;
728 }
729 return -1;
730 }
731
732 /* We provide our own lstat/fstat functions, since the provided
733 * lstat/fstat functions are so slow. These stat functions are
734 * tailored for Git's usage (read: fast), and are not meant to be
735 * complete. Note that Git stat()s are redirected to mingw_lstat()
736 * too, since Windows doesn't really handle symlinks that well.
737 */
738 static int do_stat_internal(int follow, const char *file_name, struct stat *buf)
739 {
740 int namelen;
741 char alt_name[PATH_MAX];
742
743 if (!do_lstat(follow, file_name, buf))
744 return 0;
745
746 /* if file_name ended in a '/', Windows returned ENOENT;
747 * try again without trailing slashes
748 */
749 if (errno != ENOENT)
750 return -1;
751
752 namelen = strlen(file_name);
753 if (namelen && file_name[namelen-1] != '/')
754 return -1;
755 while (namelen && file_name[namelen-1] == '/')
756 --namelen;
757 if (!namelen || namelen >= PATH_MAX)
758 return -1;
759
760 memcpy(alt_name, file_name, namelen);
761 alt_name[namelen] = 0;
762 return do_lstat(follow, alt_name, buf);
763 }
764
765 int mingw_lstat(const char *file_name, struct stat *buf)
766 {
767 return do_stat_internal(0, file_name, buf);
768 }
769 int mingw_stat(const char *file_name, struct stat *buf)
770 {
771 return do_stat_internal(1, file_name, buf);
772 }
773
774 int mingw_fstat(int fd, struct stat *buf)
775 {
776 HANDLE fh = (HANDLE)_get_osfhandle(fd);
777 BY_HANDLE_FILE_INFORMATION fdata;
778
779 if (fh == INVALID_HANDLE_VALUE) {
780 errno = EBADF;
781 return -1;
782 }
783 /* direct non-file handles to MS's fstat() */
784 if (GetFileType(fh) != FILE_TYPE_DISK)
785 return _fstati64(fd, buf);
786
787 if (GetFileInformationByHandle(fh, &fdata)) {
788 buf->st_ino = 0;
789 buf->st_gid = 0;
790 buf->st_uid = 0;
791 buf->st_nlink = 1;
792 buf->st_mode = file_attr_to_st_mode(fdata.dwFileAttributes);
793 buf->st_size = fdata.nFileSizeLow |
794 (((off_t)fdata.nFileSizeHigh)<<32);
795 buf->st_dev = buf->st_rdev = 0; /* not used by Git */
796 buf->st_atime = filetime_to_time_t(&(fdata.ftLastAccessTime));
797 buf->st_mtime = filetime_to_time_t(&(fdata.ftLastWriteTime));
798 buf->st_ctime = filetime_to_time_t(&(fdata.ftCreationTime));
799 return 0;
800 }
801 errno = EBADF;
802 return -1;
803 }
804
805 static inline void time_t_to_filetime(time_t t, FILETIME *ft)
806 {
807 long long winTime = t * 10000000LL + 116444736000000000LL;
808 ft->dwLowDateTime = winTime;
809 ft->dwHighDateTime = winTime >> 32;
810 }
811
812 int mingw_utime (const char *file_name, const struct utimbuf *times)
813 {
814 FILETIME mft, aft;
815 int fh, rc;
816 DWORD attrs;
817 wchar_t wfilename[MAX_PATH];
818 if (xutftowcs_path(wfilename, file_name) < 0)
819 return -1;
820
821 /* must have write permission */
822 attrs = GetFileAttributesW(wfilename);
823 if (attrs != INVALID_FILE_ATTRIBUTES &&
824 (attrs & FILE_ATTRIBUTE_READONLY)) {
825 /* ignore errors here; open() will report them */
826 SetFileAttributesW(wfilename, attrs & ~FILE_ATTRIBUTE_READONLY);
827 }
828
829 if ((fh = _wopen(wfilename, O_RDWR | O_BINARY)) < 0) {
830 rc = -1;
831 goto revert_attrs;
832 }
833
834 if (times) {
835 time_t_to_filetime(times->modtime, &mft);
836 time_t_to_filetime(times->actime, &aft);
837 } else {
838 GetSystemTimeAsFileTime(&mft);
839 aft = mft;
840 }
841 if (!SetFileTime((HANDLE)_get_osfhandle(fh), NULL, &aft, &mft)) {
842 errno = EINVAL;
843 rc = -1;
844 } else
845 rc = 0;
846 close(fh);
847
848 revert_attrs:
849 if (attrs != INVALID_FILE_ATTRIBUTES &&
850 (attrs & FILE_ATTRIBUTE_READONLY)) {
851 /* ignore errors again */
852 SetFileAttributesW(wfilename, attrs);
853 }
854 return rc;
855 }
856
857 #undef strftime
858 size_t mingw_strftime(char *s, size_t max,
859 const char *format, const struct tm *tm)
860 {
861 size_t ret = strftime(s, max, format, tm);
862
863 if (!ret && errno == EINVAL)
864 die("invalid strftime format: '%s'", format);
865 return ret;
866 }
867
868 unsigned int sleep (unsigned int seconds)
869 {
870 Sleep(seconds*1000);
871 return 0;
872 }
873
874 char *mingw_mktemp(char *template)
875 {
876 wchar_t wtemplate[MAX_PATH];
877 if (xutftowcs_path(wtemplate, template) < 0)
878 return NULL;
879 if (!_wmktemp(wtemplate))
880 return NULL;
881 if (xwcstoutf(template, wtemplate, strlen(template) + 1) < 0)
882 return NULL;
883 return template;
884 }
885
886 int mkstemp(char *template)
887 {
888 char *filename = mktemp(template);
889 if (filename == NULL)
890 return -1;
891 return open(filename, O_RDWR | O_CREAT, 0600);
892 }
893
894 int gettimeofday(struct timeval *tv, void *tz)
895 {
896 FILETIME ft;
897 long long hnsec;
898
899 GetSystemTimeAsFileTime(&ft);
900 hnsec = filetime_to_hnsec(&ft);
901 tv->tv_sec = hnsec / 10000000;
902 tv->tv_usec = (hnsec % 10000000) / 10;
903 return 0;
904 }
905
906 int pipe(int filedes[2])
907 {
908 HANDLE h[2];
909
910 /* this creates non-inheritable handles */
911 if (!CreatePipe(&h[0], &h[1], NULL, 8192)) {
912 errno = err_win_to_posix(GetLastError());
913 return -1;
914 }
915 filedes[0] = _open_osfhandle(HCAST(int, h[0]), O_NOINHERIT);
916 if (filedes[0] < 0) {
917 CloseHandle(h[0]);
918 CloseHandle(h[1]);
919 return -1;
920 }
921 filedes[1] = _open_osfhandle(HCAST(int, h[1]), O_NOINHERIT);
922 if (filedes[1] < 0) {
923 close(filedes[0]);
924 CloseHandle(h[1]);
925 return -1;
926 }
927 return 0;
928 }
929
930 struct tm *gmtime_r(const time_t *timep, struct tm *result)
931 {
932 /* gmtime() in MSVCRT.DLL is thread-safe, but not reentrant */
933 memcpy(result, gmtime(timep), sizeof(struct tm));
934 return result;
935 }
936
937 struct tm *localtime_r(const time_t *timep, struct tm *result)
938 {
939 /* localtime() in MSVCRT.DLL is thread-safe, but not reentrant */
940 memcpy(result, localtime(timep), sizeof(struct tm));
941 return result;
942 }
943
944 char *mingw_getcwd(char *pointer, int len)
945 {
946 wchar_t cwd[MAX_PATH], wpointer[MAX_PATH];
947 DWORD ret = GetCurrentDirectoryW(ARRAY_SIZE(cwd), cwd);
948
949 if (!ret || ret >= ARRAY_SIZE(cwd)) {
950 errno = ret ? ENAMETOOLONG : err_win_to_posix(GetLastError());
951 return NULL;
952 }
953 ret = GetLongPathNameW(cwd, wpointer, ARRAY_SIZE(wpointer));
954 if (!ret && GetLastError() == ERROR_ACCESS_DENIED) {
955 HANDLE hnd = CreateFileW(cwd, 0,
956 FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE, NULL,
957 OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, NULL);
958 if (hnd == INVALID_HANDLE_VALUE)
959 return NULL;
960 ret = GetFinalPathNameByHandleW(hnd, wpointer, ARRAY_SIZE(wpointer), 0);
961 CloseHandle(hnd);
962 if (!ret || ret >= ARRAY_SIZE(wpointer))
963 return NULL;
964 if (xwcstoutf(pointer, normalize_ntpath(wpointer), len) < 0)
965 return NULL;
966 return pointer;
967 }
968 if (!ret || ret >= ARRAY_SIZE(wpointer))
969 return NULL;
970 if (xwcstoutf(pointer, wpointer, len) < 0)
971 return NULL;
972 convert_slashes(pointer);
973 return pointer;
974 }
975
976 /*
977 * See http://msdn2.microsoft.com/en-us/library/17w5ykft(vs.71).aspx
978 * (Parsing C++ Command-Line Arguments)
979 */
980 static const char *quote_arg(const char *arg)
981 {
982 /* count chars to quote */
983 int len = 0, n = 0;
984 int force_quotes = 0;
985 char *q, *d;
986 const char *p = arg;
987 if (!*p) force_quotes = 1;
988 while (*p) {
989 if (isspace(*p) || *p == '*' || *p == '?' || *p == '{' || *p == '\'')
990 force_quotes = 1;
991 else if (*p == '"')
992 n++;
993 else if (*p == '\\') {
994 int count = 0;
995 while (*p == '\\') {
996 count++;
997 p++;
998 len++;
999 }
1000 if (*p == '"')
1001 n += count*2 + 1;
1002 continue;
1003 }
1004 len++;
1005 p++;
1006 }
1007 if (!force_quotes && n == 0)
1008 return arg;
1009
1010 /* insert \ where necessary */
1011 d = q = xmalloc(st_add3(len, n, 3));
1012 *d++ = '"';
1013 while (*arg) {
1014 if (*arg == '"')
1015 *d++ = '\\';
1016 else if (*arg == '\\') {
1017 int count = 0;
1018 while (*arg == '\\') {
1019 count++;
1020 *d++ = *arg++;
1021 }
1022 if (*arg == '"') {
1023 while (count-- > 0)
1024 *d++ = '\\';
1025 *d++ = '\\';
1026 }
1027 }
1028 *d++ = *arg++;
1029 }
1030 *d++ = '"';
1031 *d++ = 0;
1032 return q;
1033 }
1034
1035 static const char *parse_interpreter(const char *cmd)
1036 {
1037 static char buf[100];
1038 char *p, *opt;
1039 int n, fd;
1040
1041 /* don't even try a .exe */
1042 n = strlen(cmd);
1043 if (n >= 4 && !strcasecmp(cmd+n-4, ".exe"))
1044 return NULL;
1045
1046 fd = open(cmd, O_RDONLY);
1047 if (fd < 0)
1048 return NULL;
1049 n = read(fd, buf, sizeof(buf)-1);
1050 close(fd);
1051 if (n < 4) /* at least '#!/x' and not error */
1052 return NULL;
1053
1054 if (buf[0] != '#' || buf[1] != '!')
1055 return NULL;
1056 buf[n] = '\0';
1057 p = buf + strcspn(buf, "\r\n");
1058 if (!*p)
1059 return NULL;
1060
1061 *p = '\0';
1062 if (!(p = strrchr(buf+2, '/')) && !(p = strrchr(buf+2, '\\')))
1063 return NULL;
1064 /* strip options */
1065 if ((opt = strchr(p+1, ' ')))
1066 *opt = '\0';
1067 return p+1;
1068 }
1069
1070 /*
1071 * exe_only means that we only want to detect .exe files, but not scripts
1072 * (which do not have an extension)
1073 */
1074 static char *lookup_prog(const char *dir, int dirlen, const char *cmd,
1075 int isexe, int exe_only)
1076 {
1077 char path[MAX_PATH];
1078 snprintf(path, sizeof(path), "%.*s\\%s.exe", dirlen, dir, cmd);
1079
1080 if (!isexe && access(path, F_OK) == 0)
1081 return xstrdup(path);
1082 path[strlen(path)-4] = '\0';
1083 if ((!exe_only || isexe) && access(path, F_OK) == 0)
1084 if (!(GetFileAttributes(path) & FILE_ATTRIBUTE_DIRECTORY))
1085 return xstrdup(path);
1086 return NULL;
1087 }
1088
1089 /*
1090 * Determines the absolute path of cmd using the split path in path.
1091 * If cmd contains a slash or backslash, no lookup is performed.
1092 */
1093 static char *path_lookup(const char *cmd, int exe_only)
1094 {
1095 const char *path;
1096 char *prog = NULL;
1097 int len = strlen(cmd);
1098 int isexe = len >= 4 && !strcasecmp(cmd+len-4, ".exe");
1099
1100 if (strchr(cmd, '/') || strchr(cmd, '\\'))
1101 return xstrdup(cmd);
1102
1103 path = mingw_getenv("PATH");
1104 if (!path)
1105 return NULL;
1106
1107 while (!prog) {
1108 const char *sep = strchrnul(path, ';');
1109 int dirlen = sep - path;
1110 if (dirlen)
1111 prog = lookup_prog(path, dirlen, cmd, isexe, exe_only);
1112 if (!*sep)
1113 break;
1114 path = sep + 1;
1115 }
1116
1117 return prog;
1118 }
1119
1120 static int do_putenv(char **env, const char *name, int size, int free_old);
1121
1122 /* used number of elements of environ array, including terminating NULL */
1123 static int environ_size = 0;
1124 /* allocated size of environ array, in bytes */
1125 static int environ_alloc = 0;
1126
1127 /*
1128 * Create environment block suitable for CreateProcess. Merges current
1129 * process environment and the supplied environment changes.
1130 */
1131 static wchar_t *make_environment_block(char **deltaenv)
1132 {
1133 wchar_t *wenvblk = NULL;
1134 char **tmpenv;
1135 int i = 0, size = environ_size, wenvsz = 0, wenvpos = 0;
1136
1137 while (deltaenv && deltaenv[i])
1138 i++;
1139
1140 /* copy the environment, leaving space for changes */
1141 ALLOC_ARRAY(tmpenv, size + i);
1142 memcpy(tmpenv, environ, size * sizeof(char*));
1143
1144 /* merge supplied environment changes into the temporary environment */
1145 for (i = 0; deltaenv && deltaenv[i]; i++)
1146 size = do_putenv(tmpenv, deltaenv[i], size, 0);
1147
1148 /* create environment block from temporary environment */
1149 for (i = 0; tmpenv[i]; i++) {
1150 size = 2 * strlen(tmpenv[i]) + 2; /* +2 for final \0 */
1151 ALLOC_GROW(wenvblk, (wenvpos + size) * sizeof(wchar_t), wenvsz);
1152 wenvpos += xutftowcs(&wenvblk[wenvpos], tmpenv[i], size) + 1;
1153 }
1154 /* add final \0 terminator */
1155 wenvblk[wenvpos] = 0;
1156 free(tmpenv);
1157 return wenvblk;
1158 }
1159
1160 struct pinfo_t {
1161 struct pinfo_t *next;
1162 pid_t pid;
1163 HANDLE proc;
1164 };
1165 static struct pinfo_t *pinfo = NULL;
1166 CRITICAL_SECTION pinfo_cs;
1167
1168 static pid_t mingw_spawnve_fd(const char *cmd, const char **argv, char **deltaenv,
1169 const char *dir,
1170 int prepend_cmd, int fhin, int fhout, int fherr)
1171 {
1172 STARTUPINFOW si;
1173 PROCESS_INFORMATION pi;
1174 struct strbuf args;
1175 wchar_t wcmd[MAX_PATH], wdir[MAX_PATH], *wargs, *wenvblk = NULL;
1176 unsigned flags = CREATE_UNICODE_ENVIRONMENT;
1177 BOOL ret;
1178
1179 /* Determine whether or not we are associated to a console */
1180 HANDLE cons = CreateFile("CONOUT$", GENERIC_WRITE,
1181 FILE_SHARE_WRITE, NULL, OPEN_EXISTING,
1182 FILE_ATTRIBUTE_NORMAL, NULL);
1183 if (cons == INVALID_HANDLE_VALUE) {
1184 /* There is no console associated with this process.
1185 * Since the child is a console process, Windows
1186 * would normally create a console window. But
1187 * since we'll be redirecting std streams, we do
1188 * not need the console.
1189 * It is necessary to use DETACHED_PROCESS
1190 * instead of CREATE_NO_WINDOW to make ssh
1191 * recognize that it has no console.
1192 */
1193 flags |= DETACHED_PROCESS;
1194 } else {
1195 /* There is already a console. If we specified
1196 * DETACHED_PROCESS here, too, Windows would
1197 * disassociate the child from the console.
1198 * The same is true for CREATE_NO_WINDOW.
1199 * Go figure!
1200 */
1201 CloseHandle(cons);
1202 }
1203 memset(&si, 0, sizeof(si));
1204 si.cb = sizeof(si);
1205 si.dwFlags = STARTF_USESTDHANDLES;
1206 si.hStdInput = winansi_get_osfhandle(fhin);
1207 si.hStdOutput = winansi_get_osfhandle(fhout);
1208 si.hStdError = winansi_get_osfhandle(fherr);
1209
1210 if (xutftowcs_path(wcmd, cmd) < 0)
1211 return -1;
1212 if (dir && xutftowcs_path(wdir, dir) < 0)
1213 return -1;
1214
1215 /* concatenate argv, quoting args as we go */
1216 strbuf_init(&args, 0);
1217 if (prepend_cmd) {
1218 char *quoted = (char *)quote_arg(cmd);
1219 strbuf_addstr(&args, quoted);
1220 if (quoted != cmd)
1221 free(quoted);
1222 }
1223 for (; *argv; argv++) {
1224 char *quoted = (char *)quote_arg(*argv);
1225 if (*args.buf)
1226 strbuf_addch(&args, ' ');
1227 strbuf_addstr(&args, quoted);
1228 if (quoted != *argv)
1229 free(quoted);
1230 }
1231
1232 ALLOC_ARRAY(wargs, st_add(st_mult(2, args.len), 1));
1233 xutftowcs(wargs, args.buf, 2 * args.len + 1);
1234 strbuf_release(&args);
1235
1236 wenvblk = make_environment_block(deltaenv);
1237
1238 memset(&pi, 0, sizeof(pi));
1239 ret = CreateProcessW(wcmd, wargs, NULL, NULL, TRUE, flags,
1240 wenvblk, dir ? wdir : NULL, &si, &pi);
1241
1242 free(wenvblk);
1243 free(wargs);
1244
1245 if (!ret) {
1246 errno = ENOENT;
1247 return -1;
1248 }
1249 CloseHandle(pi.hThread);
1250
1251 /*
1252 * The process ID is the human-readable identifier of the process
1253 * that we want to present in log and error messages. The handle
1254 * is not useful for this purpose. But we cannot close it, either,
1255 * because it is not possible to turn a process ID into a process
1256 * handle after the process terminated.
1257 * Keep the handle in a list for waitpid.
1258 */
1259 EnterCriticalSection(&pinfo_cs);
1260 {
1261 struct pinfo_t *info = xmalloc(sizeof(struct pinfo_t));
1262 info->pid = pi.dwProcessId;
1263 info->proc = pi.hProcess;
1264 info->next = pinfo;
1265 pinfo = info;
1266 }
1267 LeaveCriticalSection(&pinfo_cs);
1268
1269 return (pid_t)pi.dwProcessId;
1270 }
1271
1272 static pid_t mingw_spawnv(const char *cmd, const char **argv, int prepend_cmd)
1273 {
1274 return mingw_spawnve_fd(cmd, argv, NULL, NULL, prepend_cmd, 0, 1, 2);
1275 }
1276
1277 pid_t mingw_spawnvpe(const char *cmd, const char **argv, char **deltaenv,
1278 const char *dir,
1279 int fhin, int fhout, int fherr)
1280 {
1281 pid_t pid;
1282 char *prog = path_lookup(cmd, 0);
1283
1284 if (!prog) {
1285 errno = ENOENT;
1286 pid = -1;
1287 }
1288 else {
1289 const char *interpr = parse_interpreter(prog);
1290
1291 if (interpr) {
1292 const char *argv0 = argv[0];
1293 char *iprog = path_lookup(interpr, 1);
1294 argv[0] = prog;
1295 if (!iprog) {
1296 errno = ENOENT;
1297 pid = -1;
1298 }
1299 else {
1300 pid = mingw_spawnve_fd(iprog, argv, deltaenv, dir, 1,
1301 fhin, fhout, fherr);
1302 free(iprog);
1303 }
1304 argv[0] = argv0;
1305 }
1306 else
1307 pid = mingw_spawnve_fd(prog, argv, deltaenv, dir, 0,
1308 fhin, fhout, fherr);
1309 free(prog);
1310 }
1311 return pid;
1312 }
1313
1314 static int try_shell_exec(const char *cmd, char *const *argv)
1315 {
1316 const char *interpr = parse_interpreter(cmd);
1317 char *prog;
1318 int pid = 0;
1319
1320 if (!interpr)
1321 return 0;
1322 prog = path_lookup(interpr, 1);
1323 if (prog) {
1324 int argc = 0;
1325 const char **argv2;
1326 while (argv[argc]) argc++;
1327 ALLOC_ARRAY(argv2, argc + 1);
1328 argv2[0] = (char *)cmd; /* full path to the script file */
1329 memcpy(&argv2[1], &argv[1], sizeof(*argv) * argc);
1330 pid = mingw_spawnv(prog, argv2, 1);
1331 if (pid >= 0) {
1332 int status;
1333 if (waitpid(pid, &status, 0) < 0)
1334 status = 255;
1335 exit(status);
1336 }
1337 pid = 1; /* indicate that we tried but failed */
1338 free(prog);
1339 free(argv2);
1340 }
1341 return pid;
1342 }
1343
1344 int mingw_execv(const char *cmd, char *const *argv)
1345 {
1346 /* check if git_command is a shell script */
1347 if (!try_shell_exec(cmd, argv)) {
1348 int pid, status;
1349
1350 pid = mingw_spawnv(cmd, (const char **)argv, 0);
1351 if (pid < 0)
1352 return -1;
1353 if (waitpid(pid, &status, 0) < 0)
1354 status = 255;
1355 exit(status);
1356 }
1357 return -1;
1358 }
1359
1360 int mingw_execvp(const char *cmd, char *const *argv)
1361 {
1362 char *prog = path_lookup(cmd, 0);
1363
1364 if (prog) {
1365 mingw_execv(prog, argv);
1366 free(prog);
1367 } else
1368 errno = ENOENT;
1369
1370 return -1;
1371 }
1372
1373 int mingw_kill(pid_t pid, int sig)
1374 {
1375 if (pid > 0 && sig == SIGTERM) {
1376 HANDLE h = OpenProcess(PROCESS_TERMINATE, FALSE, pid);
1377
1378 if (TerminateProcess(h, -1)) {
1379 CloseHandle(h);
1380 return 0;
1381 }
1382
1383 errno = err_win_to_posix(GetLastError());
1384 CloseHandle(h);
1385 return -1;
1386 } else if (pid > 0 && sig == 0) {
1387 HANDLE h = OpenProcess(PROCESS_QUERY_INFORMATION, FALSE, pid);
1388 if (h) {
1389 CloseHandle(h);
1390 return 0;
1391 }
1392 }
1393
1394 errno = EINVAL;
1395 return -1;
1396 }
1397
1398 /*
1399 * Compare environment entries by key (i.e. stopping at '=' or '\0').
1400 */
1401 static int compareenv(const void *v1, const void *v2)
1402 {
1403 const char *e1 = *(const char**)v1;
1404 const char *e2 = *(const char**)v2;
1405
1406 for (;;) {
1407 int c1 = *e1++;
1408 int c2 = *e2++;
1409 c1 = (c1 == '=') ? 0 : tolower(c1);
1410 c2 = (c2 == '=') ? 0 : tolower(c2);
1411 if (c1 > c2)
1412 return 1;
1413 if (c1 < c2)
1414 return -1;
1415 if (c1 == 0)
1416 return 0;
1417 }
1418 }
1419
1420 static int bsearchenv(char **env, const char *name, size_t size)
1421 {
1422 unsigned low = 0, high = size;
1423 while (low < high) {
1424 unsigned mid = low + ((high - low) >> 1);
1425 int cmp = compareenv(&env[mid], &name);
1426 if (cmp < 0)
1427 low = mid + 1;
1428 else if (cmp > 0)
1429 high = mid;
1430 else
1431 return mid;
1432 }
1433 return ~low; /* not found, return 1's complement of insert position */
1434 }
1435
1436 /*
1437 * If name contains '=', then sets the variable, otherwise it unsets it
1438 * Size includes the terminating NULL. Env must have room for size + 1 entries
1439 * (in case of insert). Returns the new size. Optionally frees removed entries.
1440 */
1441 static int do_putenv(char **env, const char *name, int size, int free_old)
1442 {
1443 int i = bsearchenv(env, name, size - 1);
1444
1445 /* optionally free removed / replaced entry */
1446 if (i >= 0 && free_old)
1447 free(env[i]);
1448
1449 if (strchr(name, '=')) {
1450 /* if new value ('key=value') is specified, insert or replace entry */
1451 if (i < 0) {
1452 i = ~i;
1453 memmove(&env[i + 1], &env[i], (size - i) * sizeof(char*));
1454 size++;
1455 }
1456 env[i] = (char*) name;
1457 } else if (i >= 0) {
1458 /* otherwise ('key') remove existing entry */
1459 size--;
1460 memmove(&env[i], &env[i + 1], (size - i) * sizeof(char*));
1461 }
1462 return size;
1463 }
1464
1465 char *mingw_getenv(const char *name)
1466 {
1467 char *value;
1468 int pos = bsearchenv(environ, name, environ_size - 1);
1469 if (pos < 0)
1470 return NULL;
1471 value = strchr(environ[pos], '=');
1472 return value ? &value[1] : NULL;
1473 }
1474
1475 int mingw_putenv(const char *namevalue)
1476 {
1477 ALLOC_GROW(environ, (environ_size + 1) * sizeof(char*), environ_alloc);
1478 environ_size = do_putenv(environ, namevalue, environ_size, 1);
1479 return 0;
1480 }
1481
1482 /*
1483 * Note, this isn't a complete replacement for getaddrinfo. It assumes
1484 * that service contains a numerical port, or that it is null. It
1485 * does a simple search using gethostbyname, and returns one IPv4 host
1486 * if one was found.
1487 */
1488 static int WSAAPI getaddrinfo_stub(const char *node, const char *service,
1489 const struct addrinfo *hints,
1490 struct addrinfo **res)
1491 {
1492 struct hostent *h = NULL;
1493 struct addrinfo *ai;
1494 struct sockaddr_in *sin;
1495
1496 if (node) {
1497 h = gethostbyname(node);
1498 if (!h)
1499 return WSAGetLastError();
1500 }
1501
1502 ai = xmalloc(sizeof(struct addrinfo));
1503 *res = ai;
1504 ai->ai_flags = 0;
1505 ai->ai_family = AF_INET;
1506 ai->ai_socktype = hints ? hints->ai_socktype : 0;
1507 switch (ai->ai_socktype) {
1508 case SOCK_STREAM:
1509 ai->ai_protocol = IPPROTO_TCP;
1510 break;
1511 case SOCK_DGRAM:
1512 ai->ai_protocol = IPPROTO_UDP;
1513 break;
1514 default:
1515 ai->ai_protocol = 0;
1516 break;
1517 }
1518 ai->ai_addrlen = sizeof(struct sockaddr_in);
1519 if (hints && (hints->ai_flags & AI_CANONNAME))
1520 ai->ai_canonname = h ? xstrdup(h->h_name) : NULL;
1521 else
1522 ai->ai_canonname = NULL;
1523
1524 sin = xcalloc(1, ai->ai_addrlen);
1525 sin->sin_family = AF_INET;
1526 /* Note: getaddrinfo is supposed to allow service to be a string,
1527 * which should be looked up using getservbyname. This is
1528 * currently not implemented */
1529 if (service)
1530 sin->sin_port = htons(atoi(service));
1531 if (h)
1532 sin->sin_addr = *(struct in_addr *)h->h_addr;
1533 else if (hints && (hints->ai_flags & AI_PASSIVE))
1534 sin->sin_addr.s_addr = INADDR_ANY;
1535 else
1536 sin->sin_addr.s_addr = INADDR_LOOPBACK;
1537 ai->ai_addr = (struct sockaddr *)sin;
1538 ai->ai_next = NULL;
1539 return 0;
1540 }
1541
1542 static void WSAAPI freeaddrinfo_stub(struct addrinfo *res)
1543 {
1544 free(res->ai_canonname);
1545 free(res->ai_addr);
1546 free(res);
1547 }
1548
1549 static int WSAAPI getnameinfo_stub(const struct sockaddr *sa, socklen_t salen,
1550 char *host, DWORD hostlen,
1551 char *serv, DWORD servlen, int flags)
1552 {
1553 const struct sockaddr_in *sin = (const struct sockaddr_in *)sa;
1554 if (sa->sa_family != AF_INET)
1555 return EAI_FAMILY;
1556 if (!host && !serv)
1557 return EAI_NONAME;
1558
1559 if (host && hostlen > 0) {
1560 struct hostent *ent = NULL;
1561 if (!(flags & NI_NUMERICHOST))
1562 ent = gethostbyaddr((const char *)&sin->sin_addr,
1563 sizeof(sin->sin_addr), AF_INET);
1564
1565 if (ent)
1566 snprintf(host, hostlen, "%s", ent->h_name);
1567 else if (flags & NI_NAMEREQD)
1568 return EAI_NONAME;
1569 else
1570 snprintf(host, hostlen, "%s", inet_ntoa(sin->sin_addr));
1571 }
1572
1573 if (serv && servlen > 0) {
1574 struct servent *ent = NULL;
1575 if (!(flags & NI_NUMERICSERV))
1576 ent = getservbyport(sin->sin_port,
1577 flags & NI_DGRAM ? "udp" : "tcp");
1578
1579 if (ent)
1580 snprintf(serv, servlen, "%s", ent->s_name);
1581 else
1582 snprintf(serv, servlen, "%d", ntohs(sin->sin_port));
1583 }
1584
1585 return 0;
1586 }
1587
1588 static HMODULE ipv6_dll = NULL;
1589 static void (WSAAPI *ipv6_freeaddrinfo)(struct addrinfo *res);
1590 static int (WSAAPI *ipv6_getaddrinfo)(const char *node, const char *service,
1591 const struct addrinfo *hints,
1592 struct addrinfo **res);
1593 static int (WSAAPI *ipv6_getnameinfo)(const struct sockaddr *sa, socklen_t salen,
1594 char *host, DWORD hostlen,
1595 char *serv, DWORD servlen, int flags);
1596 /*
1597 * gai_strerror is an inline function in the ws2tcpip.h header, so we
1598 * don't need to try to load that one dynamically.
1599 */
1600
1601 static void socket_cleanup(void)
1602 {
1603 WSACleanup();
1604 if (ipv6_dll)
1605 FreeLibrary(ipv6_dll);
1606 ipv6_dll = NULL;
1607 ipv6_freeaddrinfo = freeaddrinfo_stub;
1608 ipv6_getaddrinfo = getaddrinfo_stub;
1609 ipv6_getnameinfo = getnameinfo_stub;
1610 }
1611
1612 static void ensure_socket_initialization(void)
1613 {
1614 WSADATA wsa;
1615 static int initialized = 0;
1616 const char *libraries[] = { "ws2_32.dll", "wship6.dll", NULL };
1617 const char **name;
1618
1619 if (initialized)
1620 return;
1621
1622 if (WSAStartup(MAKEWORD(2,2), &wsa))
1623 die("unable to initialize winsock subsystem, error %d",
1624 WSAGetLastError());
1625
1626 for (name = libraries; *name; name++) {
1627 ipv6_dll = LoadLibrary(*name);
1628 if (!ipv6_dll)
1629 continue;
1630
1631 ipv6_freeaddrinfo = (void (WSAAPI *)(struct addrinfo *))
1632 GetProcAddress(ipv6_dll, "freeaddrinfo");
1633 ipv6_getaddrinfo = (int (WSAAPI *)(const char *, const char *,
1634 const struct addrinfo *,
1635 struct addrinfo **))
1636 GetProcAddress(ipv6_dll, "getaddrinfo");
1637 ipv6_getnameinfo = (int (WSAAPI *)(const struct sockaddr *,
1638 socklen_t, char *, DWORD,
1639 char *, DWORD, int))
1640 GetProcAddress(ipv6_dll, "getnameinfo");
1641 if (!ipv6_freeaddrinfo || !ipv6_getaddrinfo || !ipv6_getnameinfo) {
1642 FreeLibrary(ipv6_dll);
1643 ipv6_dll = NULL;
1644 } else
1645 break;
1646 }
1647 if (!ipv6_freeaddrinfo || !ipv6_getaddrinfo || !ipv6_getnameinfo) {
1648 ipv6_freeaddrinfo = freeaddrinfo_stub;
1649 ipv6_getaddrinfo = getaddrinfo_stub;
1650 ipv6_getnameinfo = getnameinfo_stub;
1651 }
1652
1653 atexit(socket_cleanup);
1654 initialized = 1;
1655 }
1656
1657 #undef gethostname
1658 int mingw_gethostname(char *name, int namelen)
1659 {
1660 ensure_socket_initialization();
1661 return gethostname(name, namelen);
1662 }
1663
1664 #undef gethostbyname
1665 struct hostent *mingw_gethostbyname(const char *host)
1666 {
1667 ensure_socket_initialization();
1668 return gethostbyname(host);
1669 }
1670
1671 void mingw_freeaddrinfo(struct addrinfo *res)
1672 {
1673 ipv6_freeaddrinfo(res);
1674 }
1675
1676 int mingw_getaddrinfo(const char *node, const char *service,
1677 const struct addrinfo *hints, struct addrinfo **res)
1678 {
1679 ensure_socket_initialization();
1680 return ipv6_getaddrinfo(node, service, hints, res);
1681 }
1682
1683 int mingw_getnameinfo(const struct sockaddr *sa, socklen_t salen,
1684 char *host, DWORD hostlen, char *serv, DWORD servlen,
1685 int flags)
1686 {
1687 ensure_socket_initialization();
1688 return ipv6_getnameinfo(sa, salen, host, hostlen, serv, servlen, flags);
1689 }
1690
1691 int mingw_socket(int domain, int type, int protocol)
1692 {
1693 int sockfd;
1694 SOCKET s;
1695
1696 ensure_socket_initialization();
1697 s = WSASocket(domain, type, protocol, NULL, 0, 0);
1698 if (s == INVALID_SOCKET) {
1699 /*
1700 * WSAGetLastError() values are regular BSD error codes
1701 * biased by WSABASEERR.
1702 * However, strerror() does not know about networking
1703 * specific errors, which are values beginning at 38 or so.
1704 * Therefore, we choose to leave the biased error code
1705 * in errno so that _if_ someone looks up the code somewhere,
1706 * then it is at least the number that are usually listed.
1707 */
1708 errno = WSAGetLastError();
1709 return -1;
1710 }
1711 /* convert into a file descriptor */
1712 if ((sockfd = _open_osfhandle(s, O_RDWR|O_BINARY)) < 0) {
1713 closesocket(s);
1714 return error("unable to make a socket file descriptor: %s",
1715 strerror(errno));
1716 }
1717 return sockfd;
1718 }
1719
1720 #undef connect
1721 int mingw_connect(int sockfd, struct sockaddr *sa, size_t sz)
1722 {
1723 SOCKET s = (SOCKET)_get_osfhandle(sockfd);
1724 return connect(s, sa, sz);
1725 }
1726
1727 #undef bind
1728 int mingw_bind(int sockfd, struct sockaddr *sa, size_t sz)
1729 {
1730 SOCKET s = (SOCKET)_get_osfhandle(sockfd);
1731 return bind(s, sa, sz);
1732 }
1733
1734 #undef setsockopt
1735 int mingw_setsockopt(int sockfd, int lvl, int optname, void *optval, int optlen)
1736 {
1737 SOCKET s = (SOCKET)_get_osfhandle(sockfd);
1738 return setsockopt(s, lvl, optname, (const char*)optval, optlen);
1739 }
1740
1741 #undef shutdown
1742 int mingw_shutdown(int sockfd, int how)
1743 {
1744 SOCKET s = (SOCKET)_get_osfhandle(sockfd);
1745 return shutdown(s, how);
1746 }
1747
1748 #undef listen
1749 int mingw_listen(int sockfd, int backlog)
1750 {
1751 SOCKET s = (SOCKET)_get_osfhandle(sockfd);
1752 return listen(s, backlog);
1753 }
1754
1755 #undef accept
1756 int mingw_accept(int sockfd1, struct sockaddr *sa, socklen_t *sz)
1757 {
1758 int sockfd2;
1759
1760 SOCKET s1 = (SOCKET)_get_osfhandle(sockfd1);
1761 SOCKET s2 = accept(s1, sa, sz);
1762
1763 /* convert into a file descriptor */
1764 if ((sockfd2 = _open_osfhandle(s2, O_RDWR|O_BINARY)) < 0) {
1765 int err = errno;
1766 closesocket(s2);
1767 return error("unable to make a socket file descriptor: %s",
1768 strerror(err));
1769 }
1770 return sockfd2;
1771 }
1772
1773 #undef rename
1774 int mingw_rename(const char *pold, const char *pnew)
1775 {
1776 DWORD attrs, gle;
1777 int tries = 0;
1778 wchar_t wpold[MAX_PATH], wpnew[MAX_PATH];
1779 if (xutftowcs_path(wpold, pold) < 0 || xutftowcs_path(wpnew, pnew) < 0)
1780 return -1;
1781
1782 /*
1783 * Try native rename() first to get errno right.
1784 * It is based on MoveFile(), which cannot overwrite existing files.
1785 */
1786 if (!_wrename(wpold, wpnew))
1787 return 0;
1788 if (errno != EEXIST)
1789 return -1;
1790 repeat:
1791 if (MoveFileExW(wpold, wpnew, MOVEFILE_REPLACE_EXISTING))
1792 return 0;
1793 /* TODO: translate more errors */
1794 gle = GetLastError();
1795 if (gle == ERROR_ACCESS_DENIED &&
1796 (attrs = GetFileAttributesW(wpnew)) != INVALID_FILE_ATTRIBUTES) {
1797 if (attrs & FILE_ATTRIBUTE_DIRECTORY) {
1798 DWORD attrsold = GetFileAttributesW(wpold);
1799 if (attrsold == INVALID_FILE_ATTRIBUTES ||
1800 !(attrsold & FILE_ATTRIBUTE_DIRECTORY))
1801 errno = EISDIR;
1802 else if (!_wrmdir(wpnew))
1803 goto repeat;
1804 return -1;
1805 }
1806 if ((attrs & FILE_ATTRIBUTE_READONLY) &&
1807 SetFileAttributesW(wpnew, attrs & ~FILE_ATTRIBUTE_READONLY)) {
1808 if (MoveFileExW(wpold, wpnew, MOVEFILE_REPLACE_EXISTING))
1809 return 0;
1810 gle = GetLastError();
1811 /* revert file attributes on failure */
1812 SetFileAttributesW(wpnew, attrs);
1813 }
1814 }
1815 if (tries < ARRAY_SIZE(delay) && gle == ERROR_ACCESS_DENIED) {
1816 /*
1817 * We assume that some other process had the source or
1818 * destination file open at the wrong moment and retry.
1819 * In order to give the other process a higher chance to
1820 * complete its operation, we give up our time slice now.
1821 * If we have to retry again, we do sleep a bit.
1822 */
1823 Sleep(delay[tries]);
1824 tries++;
1825 goto repeat;
1826 }
1827 if (gle == ERROR_ACCESS_DENIED &&
1828 ask_yes_no_if_possible("Rename from '%s' to '%s' failed. "
1829 "Should I try again?", pold, pnew))
1830 goto repeat;
1831
1832 errno = EACCES;
1833 return -1;
1834 }
1835
1836 /*
1837 * Note that this doesn't return the actual pagesize, but
1838 * the allocation granularity. If future Windows specific git code
1839 * needs the real getpagesize function, we need to find another solution.
1840 */
1841 int mingw_getpagesize(void)
1842 {
1843 SYSTEM_INFO si;
1844 GetSystemInfo(&si);
1845 return si.dwAllocationGranularity;
1846 }
1847
1848 /* See https://msdn.microsoft.com/en-us/library/windows/desktop/ms724435.aspx */
1849 enum EXTENDED_NAME_FORMAT {
1850 NameDisplay = 3,
1851 NameUserPrincipal = 8
1852 };
1853
1854 static char *get_extended_user_info(enum EXTENDED_NAME_FORMAT type)
1855 {
1856 DECLARE_PROC_ADDR(secur32.dll, BOOL, GetUserNameExW,
1857 enum EXTENDED_NAME_FORMAT, LPCWSTR, PULONG);
1858 static wchar_t wbuffer[1024];
1859 DWORD len;
1860
1861 if (!INIT_PROC_ADDR(GetUserNameExW))
1862 return NULL;
1863
1864 len = ARRAY_SIZE(wbuffer);
1865 if (GetUserNameExW(type, wbuffer, &len)) {
1866 char *converted = xmalloc((len *= 3));
1867 if (xwcstoutf(converted, wbuffer, len) >= 0)
1868 return converted;
1869 free(converted);
1870 }
1871
1872 return NULL;
1873 }
1874
1875 char *mingw_query_user_email(void)
1876 {
1877 return get_extended_user_info(NameUserPrincipal);
1878 }
1879
1880 struct passwd *getpwuid(int uid)
1881 {
1882 static unsigned initialized;
1883 static char user_name[100];
1884 static struct passwd *p;
1885 DWORD len;
1886
1887 if (initialized)
1888 return p;
1889
1890 len = sizeof(user_name);
1891 if (!GetUserName(user_name, &len)) {
1892 initialized = 1;
1893 return NULL;
1894 }
1895
1896 p = xmalloc(sizeof(*p));
1897 p->pw_name = user_name;
1898 p->pw_gecos = get_extended_user_info(NameDisplay);
1899 if (!p->pw_gecos)
1900 p->pw_gecos = "unknown";
1901 p->pw_dir = NULL;
1902
1903 initialized = 1;
1904 return p;
1905 }
1906
1907 static HANDLE timer_event;
1908 static HANDLE timer_thread;
1909 static int timer_interval;
1910 static int one_shot;
1911 static sig_handler_t timer_fn = SIG_DFL, sigint_fn = SIG_DFL;
1912
1913 /* The timer works like this:
1914 * The thread, ticktack(), is a trivial routine that most of the time
1915 * only waits to receive the signal to terminate. The main thread tells
1916 * the thread to terminate by setting the timer_event to the signalled
1917 * state.
1918 * But ticktack() interrupts the wait state after the timer's interval
1919 * length to call the signal handler.
1920 */
1921
1922 static unsigned __stdcall ticktack(void *dummy)
1923 {
1924 while (WaitForSingleObject(timer_event, timer_interval) == WAIT_TIMEOUT) {
1925 mingw_raise(SIGALRM);
1926 if (one_shot)
1927 break;
1928 }
1929 return 0;
1930 }
1931
1932 static int start_timer_thread(void)
1933 {
1934 timer_event = CreateEvent(NULL, FALSE, FALSE, NULL);
1935 if (timer_event) {
1936 timer_thread = (HANDLE) _beginthreadex(NULL, 0, ticktack, NULL, 0, NULL);
1937 if (!timer_thread )
1938 return errno = ENOMEM,
1939 error("cannot start timer thread");
1940 } else
1941 return errno = ENOMEM,
1942 error("cannot allocate resources for timer");
1943 return 0;
1944 }
1945
1946 static void stop_timer_thread(void)
1947 {
1948 if (timer_event)
1949 SetEvent(timer_event); /* tell thread to terminate */
1950 if (timer_thread) {
1951 int rc = WaitForSingleObject(timer_thread, 1000);
1952 if (rc == WAIT_TIMEOUT)
1953 error("timer thread did not terminate timely");
1954 else if (rc != WAIT_OBJECT_0)
1955 error("waiting for timer thread failed: %lu",
1956 GetLastError());
1957 CloseHandle(timer_thread);
1958 }
1959 if (timer_event)
1960 CloseHandle(timer_event);
1961 timer_event = NULL;
1962 timer_thread = NULL;
1963 }
1964
1965 static inline int is_timeval_eq(const struct timeval *i1, const struct timeval *i2)
1966 {
1967 return i1->tv_sec == i2->tv_sec && i1->tv_usec == i2->tv_usec;
1968 }
1969
1970 int setitimer(int type, struct itimerval *in, struct itimerval *out)
1971 {
1972 static const struct timeval zero;
1973 static int atexit_done;
1974
1975 if (out != NULL)
1976 return errno = EINVAL,
1977 error("setitimer param 3 != NULL not implemented");
1978 if (!is_timeval_eq(&in->it_interval, &zero) &&
1979 !is_timeval_eq(&in->it_interval, &in->it_value))
1980 return errno = EINVAL,
1981 error("setitimer: it_interval must be zero or eq it_value");
1982
1983 if (timer_thread)
1984 stop_timer_thread();
1985
1986 if (is_timeval_eq(&in->it_value, &zero) &&
1987 is_timeval_eq(&in->it_interval, &zero))
1988 return 0;
1989
1990 timer_interval = in->it_value.tv_sec * 1000 + in->it_value.tv_usec / 1000;
1991 one_shot = is_timeval_eq(&in->it_interval, &zero);
1992 if (!atexit_done) {
1993 atexit(stop_timer_thread);
1994 atexit_done = 1;
1995 }
1996 return start_timer_thread();
1997 }
1998
1999 int sigaction(int sig, struct sigaction *in, struct sigaction *out)
2000 {
2001 if (sig != SIGALRM)
2002 return errno = EINVAL,
2003 error("sigaction only implemented for SIGALRM");
2004 if (out != NULL)
2005 return errno = EINVAL,
2006 error("sigaction: param 3 != NULL not implemented");
2007
2008 timer_fn = in->sa_handler;
2009 return 0;
2010 }
2011
2012 #undef signal
2013 sig_handler_t mingw_signal(int sig, sig_handler_t handler)
2014 {
2015 sig_handler_t old;
2016
2017 switch (sig) {
2018 case SIGALRM:
2019 old = timer_fn;
2020 timer_fn = handler;
2021 break;
2022
2023 case SIGINT:
2024 old = sigint_fn;
2025 sigint_fn = handler;
2026 break;
2027
2028 default:
2029 return signal(sig, handler);
2030 }
2031
2032 return old;
2033 }
2034
2035 #undef raise
2036 int mingw_raise(int sig)
2037 {
2038 switch (sig) {
2039 case SIGALRM:
2040 if (timer_fn == SIG_DFL) {
2041 if (isatty(STDERR_FILENO))
2042 fputs("Alarm clock\n", stderr);
2043 exit(128 + SIGALRM);
2044 } else if (timer_fn != SIG_IGN)
2045 timer_fn(SIGALRM);
2046 return 0;
2047
2048 case SIGINT:
2049 if (sigint_fn == SIG_DFL)
2050 exit(128 + SIGINT);
2051 else if (sigint_fn != SIG_IGN)
2052 sigint_fn(SIGINT);
2053 return 0;
2054
2055 default:
2056 return raise(sig);
2057 }
2058 }
2059
2060 int link(const char *oldpath, const char *newpath)
2061 {
2062 typedef BOOL (WINAPI *T)(LPCWSTR, LPCWSTR, LPSECURITY_ATTRIBUTES);
2063 static T create_hard_link = NULL;
2064 wchar_t woldpath[MAX_PATH], wnewpath[MAX_PATH];
2065 if (xutftowcs_path(woldpath, oldpath) < 0 ||
2066 xutftowcs_path(wnewpath, newpath) < 0)
2067 return -1;
2068
2069 if (!create_hard_link) {
2070 create_hard_link = (T) GetProcAddress(
2071 GetModuleHandle("kernel32.dll"), "CreateHardLinkW");
2072 if (!create_hard_link)
2073 create_hard_link = (T)-1;
2074 }
2075 if (create_hard_link == (T)-1) {
2076 errno = ENOSYS;
2077 return -1;
2078 }
2079 if (!create_hard_link(wnewpath, woldpath, NULL)) {
2080 errno = err_win_to_posix(GetLastError());
2081 return -1;
2082 }
2083 return 0;
2084 }
2085
2086 pid_t waitpid(pid_t pid, int *status, int options)
2087 {
2088 HANDLE h = OpenProcess(SYNCHRONIZE | PROCESS_QUERY_INFORMATION,
2089 FALSE, pid);
2090 if (!h) {
2091 errno = ECHILD;
2092 return -1;
2093 }
2094
2095 if (pid > 0 && options & WNOHANG) {
2096 if (WAIT_OBJECT_0 != WaitForSingleObject(h, 0)) {
2097 CloseHandle(h);
2098 return 0;
2099 }
2100 options &= ~WNOHANG;
2101 }
2102
2103 if (options == 0) {
2104 struct pinfo_t **ppinfo;
2105 if (WaitForSingleObject(h, INFINITE) != WAIT_OBJECT_0) {
2106 CloseHandle(h);
2107 return 0;
2108 }
2109
2110 if (status)
2111 GetExitCodeProcess(h, (LPDWORD)status);
2112
2113 EnterCriticalSection(&pinfo_cs);
2114
2115 ppinfo = &pinfo;
2116 while (*ppinfo) {
2117 struct pinfo_t *info = *ppinfo;
2118 if (info->pid == pid) {
2119 CloseHandle(info->proc);
2120 *ppinfo = info->next;
2121 free(info);
2122 break;
2123 }
2124 ppinfo = &info->next;
2125 }
2126
2127 LeaveCriticalSection(&pinfo_cs);
2128
2129 CloseHandle(h);
2130 return pid;
2131 }
2132 CloseHandle(h);
2133
2134 errno = EINVAL;
2135 return -1;
2136 }
2137
2138 int mingw_skip_dos_drive_prefix(char **path)
2139 {
2140 int ret = has_dos_drive_prefix(*path);
2141 *path += ret;
2142 return ret;
2143 }
2144
2145 int mingw_offset_1st_component(const char *path)
2146 {
2147 char *pos = (char *)path;
2148
2149 /* unc paths */
2150 if (!skip_dos_drive_prefix(&pos) &&
2151 is_dir_sep(pos[0]) && is_dir_sep(pos[1])) {
2152 /* skip server name */
2153 pos = strpbrk(pos + 2, "\\/");
2154 if (!pos)
2155 return 0; /* Error: malformed unc path */
2156
2157 do {
2158 pos++;
2159 } while (*pos && !is_dir_sep(*pos));
2160 }
2161
2162 return pos + is_dir_sep(*pos) - path;
2163 }
2164
2165 int xutftowcsn(wchar_t *wcs, const char *utfs, size_t wcslen, int utflen)
2166 {
2167 int upos = 0, wpos = 0;
2168 const unsigned char *utf = (const unsigned char*) utfs;
2169 if (!utf || !wcs || wcslen < 1) {
2170 errno = EINVAL;
2171 return -1;
2172 }
2173 /* reserve space for \0 */
2174 wcslen--;
2175 if (utflen < 0)
2176 utflen = INT_MAX;
2177
2178 while (upos < utflen) {
2179 int c = utf[upos++] & 0xff;
2180 if (utflen == INT_MAX && c == 0)
2181 break;
2182
2183 if (wpos >= wcslen) {
2184 wcs[wpos] = 0;
2185 errno = ERANGE;
2186 return -1;
2187 }
2188
2189 if (c < 0x80) {
2190 /* ASCII */
2191 wcs[wpos++] = c;
2192 } else if (c >= 0xc2 && c < 0xe0 && upos < utflen &&
2193 (utf[upos] & 0xc0) == 0x80) {
2194 /* 2-byte utf-8 */
2195 c = ((c & 0x1f) << 6);
2196 c |= (utf[upos++] & 0x3f);
2197 wcs[wpos++] = c;
2198 } else if (c >= 0xe0 && c < 0xf0 && upos + 1 < utflen &&
2199 !(c == 0xe0 && utf[upos] < 0xa0) && /* over-long encoding */
2200 (utf[upos] & 0xc0) == 0x80 &&
2201 (utf[upos + 1] & 0xc0) == 0x80) {
2202 /* 3-byte utf-8 */
2203 c = ((c & 0x0f) << 12);
2204 c |= ((utf[upos++] & 0x3f) << 6);
2205 c |= (utf[upos++] & 0x3f);
2206 wcs[wpos++] = c;
2207 } else if (c >= 0xf0 && c < 0xf5 && upos + 2 < utflen &&
2208 wpos + 1 < wcslen &&
2209 !(c == 0xf0 && utf[upos] < 0x90) && /* over-long encoding */
2210 !(c == 0xf4 && utf[upos] >= 0x90) && /* > \u10ffff */
2211 (utf[upos] & 0xc0) == 0x80 &&
2212 (utf[upos + 1] & 0xc0) == 0x80 &&
2213 (utf[upos + 2] & 0xc0) == 0x80) {
2214 /* 4-byte utf-8: convert to \ud8xx \udcxx surrogate pair */
2215 c = ((c & 0x07) << 18);
2216 c |= ((utf[upos++] & 0x3f) << 12);
2217 c |= ((utf[upos++] & 0x3f) << 6);
2218 c |= (utf[upos++] & 0x3f);
2219 c -= 0x10000;
2220 wcs[wpos++] = 0xd800 | (c >> 10);
2221 wcs[wpos++] = 0xdc00 | (c & 0x3ff);
2222 } else if (c >= 0xa0) {
2223 /* invalid utf-8 byte, printable unicode char: convert 1:1 */
2224 wcs[wpos++] = c;
2225 } else {
2226 /* invalid utf-8 byte, non-printable unicode: convert to hex */
2227 static const char *hex = "0123456789abcdef";
2228 wcs[wpos++] = hex[c >> 4];
2229 if (wpos < wcslen)
2230 wcs[wpos++] = hex[c & 0x0f];
2231 }
2232 }
2233 wcs[wpos] = 0;
2234 return wpos;
2235 }
2236
2237 int xwcstoutf(char *utf, const wchar_t *wcs, size_t utflen)
2238 {
2239 if (!wcs || !utf || utflen < 1) {
2240 errno = EINVAL;
2241 return -1;
2242 }
2243 utflen = WideCharToMultiByte(CP_UTF8, 0, wcs, -1, utf, utflen, NULL, NULL);
2244 if (utflen)
2245 return utflen - 1;
2246 errno = ERANGE;
2247 return -1;
2248 }
2249
2250 static void setup_windows_environment(void)
2251 {
2252 char *tmp = getenv("TMPDIR");
2253
2254 /* on Windows it is TMP and TEMP */
2255 if (!tmp) {
2256 if (!(tmp = getenv("TMP")))
2257 tmp = getenv("TEMP");
2258 if (tmp) {
2259 setenv("TMPDIR", tmp, 1);
2260 tmp = getenv("TMPDIR");
2261 }
2262 }
2263
2264 if (tmp) {
2265 /*
2266 * Convert all dir separators to forward slashes,
2267 * to help shell commands called from the Git
2268 * executable (by not mistaking the dir separators
2269 * for escape characters).
2270 */
2271 convert_slashes(tmp);
2272 }
2273
2274 /* simulate TERM to enable auto-color (see color.c) */
2275 if (!getenv("TERM"))
2276 setenv("TERM", "cygwin", 1);
2277 }
2278
2279 /*
2280 * Disable MSVCRT command line wildcard expansion (__getmainargs called from
2281 * mingw startup code, see init.c in mingw runtime).
2282 */
2283 int _CRT_glob = 0;
2284
2285 typedef struct {
2286 int newmode;
2287 } _startupinfo;
2288
2289 extern int __wgetmainargs(int *argc, wchar_t ***argv, wchar_t ***env, int glob,
2290 _startupinfo *si);
2291
2292 static NORETURN void die_startup(void)
2293 {
2294 fputs("fatal: not enough memory for initialization", stderr);
2295 exit(128);
2296 }
2297
2298 static void *malloc_startup(size_t size)
2299 {
2300 void *result = malloc(size);
2301 if (!result)
2302 die_startup();
2303 return result;
2304 }
2305
2306 static char *wcstoutfdup_startup(char *buffer, const wchar_t *wcs, size_t len)
2307 {
2308 len = xwcstoutf(buffer, wcs, len) + 1;
2309 return memcpy(malloc_startup(len), buffer, len);
2310 }
2311
2312 static void maybe_redirect_std_handle(const wchar_t *key, DWORD std_id, int fd,
2313 DWORD desired_access, DWORD flags)
2314 {
2315 DWORD create_flag = fd ? OPEN_ALWAYS : OPEN_EXISTING;
2316 wchar_t buf[MAX_PATH];
2317 DWORD max = ARRAY_SIZE(buf);
2318 HANDLE handle;
2319 DWORD ret = GetEnvironmentVariableW(key, buf, max);
2320
2321 if (!ret || ret >= max)
2322 return;
2323
2324 /* make sure this does not leak into child processes */
2325 SetEnvironmentVariableW(key, NULL);
2326 if (!wcscmp(buf, L"off")) {
2327 close(fd);
2328 handle = GetStdHandle(std_id);
2329 if (handle != INVALID_HANDLE_VALUE)
2330 CloseHandle(handle);
2331 return;
2332 }
2333 if (std_id == STD_ERROR_HANDLE && !wcscmp(buf, L"2>&1")) {
2334 handle = GetStdHandle(STD_OUTPUT_HANDLE);
2335 if (handle == INVALID_HANDLE_VALUE) {
2336 close(fd);
2337 handle = GetStdHandle(std_id);
2338 if (handle != INVALID_HANDLE_VALUE)
2339 CloseHandle(handle);
2340 } else {
2341 int new_fd = _open_osfhandle((intptr_t)handle, O_BINARY);
2342 SetStdHandle(std_id, handle);
2343 dup2(new_fd, fd);
2344 /* do *not* close the new_fd: that would close stdout */
2345 }
2346 return;
2347 }
2348 handle = CreateFileW(buf, desired_access, 0, NULL, create_flag,
2349 flags, NULL);
2350 if (handle != INVALID_HANDLE_VALUE) {
2351 int new_fd = _open_osfhandle((intptr_t)handle, O_BINARY);
2352 SetStdHandle(std_id, handle);
2353 dup2(new_fd, fd);
2354 close(new_fd);
2355 }
2356 }
2357
2358 static void maybe_redirect_std_handles(void)
2359 {
2360 maybe_redirect_std_handle(L"GIT_REDIRECT_STDIN", STD_INPUT_HANDLE, 0,
2361 GENERIC_READ, FILE_ATTRIBUTE_NORMAL);
2362 maybe_redirect_std_handle(L"GIT_REDIRECT_STDOUT", STD_OUTPUT_HANDLE, 1,
2363 GENERIC_WRITE, FILE_ATTRIBUTE_NORMAL);
2364 maybe_redirect_std_handle(L"GIT_REDIRECT_STDERR", STD_ERROR_HANDLE, 2,
2365 GENERIC_WRITE, FILE_FLAG_NO_BUFFERING);
2366 }
2367
2368 void mingw_startup(void)
2369 {
2370 int i, maxlen, argc;
2371 char *buffer;
2372 wchar_t **wenv, **wargv;
2373 _startupinfo si;
2374
2375 maybe_redirect_std_handles();
2376
2377 /* get wide char arguments and environment */
2378 si.newmode = 0;
2379 if (__wgetmainargs(&argc, &wargv, &wenv, _CRT_glob, &si) < 0)
2380 die_startup();
2381
2382 /* determine size of argv and environ conversion buffer */
2383 maxlen = wcslen(wargv[0]);
2384 for (i = 1; i < argc; i++)
2385 maxlen = max(maxlen, wcslen(wargv[i]));
2386 for (i = 0; wenv[i]; i++)
2387 maxlen = max(maxlen, wcslen(wenv[i]));
2388
2389 /*
2390 * nedmalloc can't free CRT memory, allocate resizable environment
2391 * list. Note that xmalloc / xmemdupz etc. call getenv, so we cannot
2392 * use it while initializing the environment itself.
2393 */
2394 environ_size = i + 1;
2395 environ_alloc = alloc_nr(environ_size * sizeof(char*));
2396 environ = malloc_startup(environ_alloc);
2397
2398 /* allocate buffer (wchar_t encodes to max 3 UTF-8 bytes) */
2399 maxlen = 3 * maxlen + 1;
2400 buffer = malloc_startup(maxlen);
2401
2402 /* convert command line arguments and environment to UTF-8 */
2403 for (i = 0; i < argc; i++)
2404 __argv[i] = wcstoutfdup_startup(buffer, wargv[i], maxlen);
2405 for (i = 0; wenv[i]; i++)
2406 environ[i] = wcstoutfdup_startup(buffer, wenv[i], maxlen);
2407 environ[i] = NULL;
2408 free(buffer);
2409
2410 /* sort environment for O(log n) getenv / putenv */
2411 qsort(environ, i, sizeof(char*), compareenv);
2412
2413 /* fix Windows specific environment settings */
2414 setup_windows_environment();
2415
2416 /* initialize critical section for waitpid pinfo_t list */
2417 InitializeCriticalSection(&pinfo_cs);
2418
2419 /* set up default file mode and file modes for stdin/out/err */
2420 _fmode = _O_BINARY;
2421 _setmode(_fileno(stdin), _O_BINARY);
2422 _setmode(_fileno(stdout), _O_BINARY);
2423 _setmode(_fileno(stderr), _O_BINARY);
2424
2425 /* initialize Unicode console */
2426 winansi_init();
2427 }
2428
2429 int uname(struct utsname *buf)
2430 {
2431 unsigned v = (unsigned)GetVersion();
2432 memset(buf, 0, sizeof(*buf));
2433 xsnprintf(buf->sysname, sizeof(buf->sysname), "Windows");
2434 xsnprintf(buf->release, sizeof(buf->release),
2435 "%u.%u", v & 0xff, (v >> 8) & 0xff);
2436 /* assuming NT variants only.. */
2437 xsnprintf(buf->version, sizeof(buf->version),
2438 "%u", (v >> 16) & 0x7fff);
2439 return 0;
2440 }