]> git.ipfire.org Git - thirdparty/git.git/blob - compat/mingw.c
Sync with 2.17.6
[thirdparty/git.git] / compat / mingw.c
1 #include "../git-compat-util.h"
2 #include "win32.h"
3 #include <conio.h>
4 #include <wchar.h>
5 #include "../strbuf.h"
6 #include "../run-command.h"
7 #include "../cache.h"
8
9 #define HCAST(type, handle) ((type)(intptr_t)handle)
10
11 static const int delay[] = { 0, 1, 10, 20, 40 };
12
13 int err_win_to_posix(DWORD winerr)
14 {
15 int error = ENOSYS;
16 switch(winerr) {
17 case ERROR_ACCESS_DENIED: error = EACCES; break;
18 case ERROR_ACCOUNT_DISABLED: error = EACCES; break;
19 case ERROR_ACCOUNT_RESTRICTION: error = EACCES; break;
20 case ERROR_ALREADY_ASSIGNED: error = EBUSY; break;
21 case ERROR_ALREADY_EXISTS: error = EEXIST; break;
22 case ERROR_ARITHMETIC_OVERFLOW: error = ERANGE; break;
23 case ERROR_BAD_COMMAND: error = EIO; break;
24 case ERROR_BAD_DEVICE: error = ENODEV; break;
25 case ERROR_BAD_DRIVER_LEVEL: error = ENXIO; break;
26 case ERROR_BAD_EXE_FORMAT: error = ENOEXEC; break;
27 case ERROR_BAD_FORMAT: error = ENOEXEC; break;
28 case ERROR_BAD_LENGTH: error = EINVAL; break;
29 case ERROR_BAD_PATHNAME: error = ENOENT; break;
30 case ERROR_BAD_PIPE: error = EPIPE; break;
31 case ERROR_BAD_UNIT: error = ENODEV; break;
32 case ERROR_BAD_USERNAME: error = EINVAL; break;
33 case ERROR_BROKEN_PIPE: error = EPIPE; break;
34 case ERROR_BUFFER_OVERFLOW: error = ENAMETOOLONG; break;
35 case ERROR_BUSY: error = EBUSY; break;
36 case ERROR_BUSY_DRIVE: error = EBUSY; break;
37 case ERROR_CALL_NOT_IMPLEMENTED: error = ENOSYS; break;
38 case ERROR_CANNOT_MAKE: error = EACCES; break;
39 case ERROR_CANTOPEN: error = EIO; break;
40 case ERROR_CANTREAD: error = EIO; break;
41 case ERROR_CANTWRITE: error = EIO; break;
42 case ERROR_CRC: error = EIO; break;
43 case ERROR_CURRENT_DIRECTORY: error = EACCES; break;
44 case ERROR_DEVICE_IN_USE: error = EBUSY; break;
45 case ERROR_DEV_NOT_EXIST: error = ENODEV; break;
46 case ERROR_DIRECTORY: error = EINVAL; break;
47 case ERROR_DIR_NOT_EMPTY: error = ENOTEMPTY; break;
48 case ERROR_DISK_CHANGE: error = EIO; break;
49 case ERROR_DISK_FULL: error = ENOSPC; break;
50 case ERROR_DRIVE_LOCKED: error = EBUSY; break;
51 case ERROR_ENVVAR_NOT_FOUND: error = EINVAL; break;
52 case ERROR_EXE_MARKED_INVALID: error = ENOEXEC; break;
53 case ERROR_FILENAME_EXCED_RANGE: error = ENAMETOOLONG; break;
54 case ERROR_FILE_EXISTS: error = EEXIST; break;
55 case ERROR_FILE_INVALID: error = ENODEV; break;
56 case ERROR_FILE_NOT_FOUND: error = ENOENT; break;
57 case ERROR_GEN_FAILURE: error = EIO; break;
58 case ERROR_HANDLE_DISK_FULL: error = ENOSPC; break;
59 case ERROR_INSUFFICIENT_BUFFER: error = ENOMEM; break;
60 case ERROR_INVALID_ACCESS: error = EACCES; break;
61 case ERROR_INVALID_ADDRESS: error = EFAULT; break;
62 case ERROR_INVALID_BLOCK: error = EFAULT; break;
63 case ERROR_INVALID_DATA: error = EINVAL; break;
64 case ERROR_INVALID_DRIVE: error = ENODEV; break;
65 case ERROR_INVALID_EXE_SIGNATURE: error = ENOEXEC; break;
66 case ERROR_INVALID_FLAGS: error = EINVAL; break;
67 case ERROR_INVALID_FUNCTION: error = ENOSYS; break;
68 case ERROR_INVALID_HANDLE: error = EBADF; break;
69 case ERROR_INVALID_LOGON_HOURS: error = EACCES; break;
70 case ERROR_INVALID_NAME: error = EINVAL; break;
71 case ERROR_INVALID_OWNER: error = EINVAL; break;
72 case ERROR_INVALID_PARAMETER: error = EINVAL; break;
73 case ERROR_INVALID_PASSWORD: error = EPERM; break;
74 case ERROR_INVALID_PRIMARY_GROUP: error = EINVAL; break;
75 case ERROR_INVALID_SIGNAL_NUMBER: error = EINVAL; break;
76 case ERROR_INVALID_TARGET_HANDLE: error = EIO; break;
77 case ERROR_INVALID_WORKSTATION: error = EACCES; break;
78 case ERROR_IO_DEVICE: error = EIO; break;
79 case ERROR_IO_INCOMPLETE: error = EINTR; break;
80 case ERROR_LOCKED: error = EBUSY; break;
81 case ERROR_LOCK_VIOLATION: error = EACCES; break;
82 case ERROR_LOGON_FAILURE: error = EACCES; break;
83 case ERROR_MAPPED_ALIGNMENT: error = EINVAL; break;
84 case ERROR_META_EXPANSION_TOO_LONG: error = E2BIG; break;
85 case ERROR_MORE_DATA: error = EPIPE; break;
86 case ERROR_NEGATIVE_SEEK: error = ESPIPE; break;
87 case ERROR_NOACCESS: error = EFAULT; break;
88 case ERROR_NONE_MAPPED: error = EINVAL; break;
89 case ERROR_NOT_ENOUGH_MEMORY: error = ENOMEM; break;
90 case ERROR_NOT_READY: error = EAGAIN; break;
91 case ERROR_NOT_SAME_DEVICE: error = EXDEV; break;
92 case ERROR_NO_DATA: error = EPIPE; break;
93 case ERROR_NO_MORE_SEARCH_HANDLES: error = EIO; break;
94 case ERROR_NO_PROC_SLOTS: error = EAGAIN; break;
95 case ERROR_NO_SUCH_PRIVILEGE: error = EACCES; break;
96 case ERROR_OPEN_FAILED: error = EIO; break;
97 case ERROR_OPEN_FILES: error = EBUSY; break;
98 case ERROR_OPERATION_ABORTED: error = EINTR; break;
99 case ERROR_OUTOFMEMORY: error = ENOMEM; break;
100 case ERROR_PASSWORD_EXPIRED: error = EACCES; break;
101 case ERROR_PATH_BUSY: error = EBUSY; break;
102 case ERROR_PATH_NOT_FOUND: error = ENOENT; break;
103 case ERROR_PIPE_BUSY: error = EBUSY; break;
104 case ERROR_PIPE_CONNECTED: error = EPIPE; break;
105 case ERROR_PIPE_LISTENING: error = EPIPE; break;
106 case ERROR_PIPE_NOT_CONNECTED: error = EPIPE; break;
107 case ERROR_PRIVILEGE_NOT_HELD: error = EACCES; break;
108 case ERROR_READ_FAULT: error = EIO; break;
109 case ERROR_SEEK: error = EIO; break;
110 case ERROR_SEEK_ON_DEVICE: error = ESPIPE; break;
111 case ERROR_SHARING_BUFFER_EXCEEDED: error = ENFILE; break;
112 case ERROR_SHARING_VIOLATION: error = EACCES; break;
113 case ERROR_STACK_OVERFLOW: error = ENOMEM; break;
114 case ERROR_SWAPERROR: error = ENOENT; break;
115 case ERROR_TOO_MANY_MODULES: error = EMFILE; break;
116 case ERROR_TOO_MANY_OPEN_FILES: error = EMFILE; break;
117 case ERROR_UNRECOGNIZED_MEDIA: error = ENXIO; break;
118 case ERROR_UNRECOGNIZED_VOLUME: error = ENODEV; break;
119 case ERROR_WAIT_NO_CHILDREN: error = ECHILD; break;
120 case ERROR_WRITE_FAULT: error = EIO; break;
121 case ERROR_WRITE_PROTECT: error = EROFS; break;
122 }
123 return error;
124 }
125
126 static inline int is_file_in_use_error(DWORD errcode)
127 {
128 switch (errcode) {
129 case ERROR_SHARING_VIOLATION:
130 case ERROR_ACCESS_DENIED:
131 return 1;
132 }
133
134 return 0;
135 }
136
137 static int read_yes_no_answer(void)
138 {
139 char answer[1024];
140
141 if (fgets(answer, sizeof(answer), stdin)) {
142 size_t answer_len = strlen(answer);
143 int got_full_line = 0, c;
144
145 /* remove the newline */
146 if (answer_len >= 2 && answer[answer_len-2] == '\r') {
147 answer[answer_len-2] = '\0';
148 got_full_line = 1;
149 } else if (answer_len >= 1 && answer[answer_len-1] == '\n') {
150 answer[answer_len-1] = '\0';
151 got_full_line = 1;
152 }
153 /* flush the buffer in case we did not get the full line */
154 if (!got_full_line)
155 while ((c = getchar()) != EOF && c != '\n')
156 ;
157 } else
158 /* we could not read, return the
159 * default answer which is no */
160 return 0;
161
162 if (tolower(answer[0]) == 'y' && !answer[1])
163 return 1;
164 if (!strncasecmp(answer, "yes", sizeof(answer)))
165 return 1;
166 if (tolower(answer[0]) == 'n' && !answer[1])
167 return 0;
168 if (!strncasecmp(answer, "no", sizeof(answer)))
169 return 0;
170
171 /* did not find an answer we understand */
172 return -1;
173 }
174
175 static int ask_yes_no_if_possible(const char *format, ...)
176 {
177 char question[4096];
178 const char *retry_hook[] = { NULL, NULL, NULL };
179 va_list args;
180
181 va_start(args, format);
182 vsnprintf(question, sizeof(question), format, args);
183 va_end(args);
184
185 if ((retry_hook[0] = mingw_getenv("GIT_ASK_YESNO"))) {
186 retry_hook[1] = question;
187 return !run_command_v_opt(retry_hook, 0);
188 }
189
190 if (!isatty(_fileno(stdin)) || !isatty(_fileno(stderr)))
191 return 0;
192
193 while (1) {
194 int answer;
195 fprintf(stderr, "%s (y/n) ", question);
196
197 if ((answer = read_yes_no_answer()) >= 0)
198 return answer;
199
200 fprintf(stderr, "Sorry, I did not understand your answer. "
201 "Please type 'y' or 'n'\n");
202 }
203 }
204
205 int mingw_unlink(const char *pathname)
206 {
207 int ret, tries = 0;
208 wchar_t wpathname[MAX_PATH];
209 if (xutftowcs_path(wpathname, pathname) < 0)
210 return -1;
211
212 /* read-only files cannot be removed */
213 _wchmod(wpathname, 0666);
214 while ((ret = _wunlink(wpathname)) == -1 && tries < ARRAY_SIZE(delay)) {
215 if (!is_file_in_use_error(GetLastError()))
216 break;
217 /*
218 * We assume that some other process had the source or
219 * destination file open at the wrong moment and retry.
220 * In order to give the other process a higher chance to
221 * complete its operation, we give up our time slice now.
222 * If we have to retry again, we do sleep a bit.
223 */
224 Sleep(delay[tries]);
225 tries++;
226 }
227 while (ret == -1 && is_file_in_use_error(GetLastError()) &&
228 ask_yes_no_if_possible("Unlink of file '%s' failed. "
229 "Should I try again?", pathname))
230 ret = _wunlink(wpathname);
231 return ret;
232 }
233
234 static int is_dir_empty(const wchar_t *wpath)
235 {
236 WIN32_FIND_DATAW findbuf;
237 HANDLE handle;
238 wchar_t wbuf[MAX_PATH + 2];
239 wcscpy(wbuf, wpath);
240 wcscat(wbuf, L"\\*");
241 handle = FindFirstFileW(wbuf, &findbuf);
242 if (handle == INVALID_HANDLE_VALUE)
243 return GetLastError() == ERROR_NO_MORE_FILES;
244
245 while (!wcscmp(findbuf.cFileName, L".") ||
246 !wcscmp(findbuf.cFileName, L".."))
247 if (!FindNextFileW(handle, &findbuf)) {
248 DWORD err = GetLastError();
249 FindClose(handle);
250 return err == ERROR_NO_MORE_FILES;
251 }
252 FindClose(handle);
253 return 0;
254 }
255
256 int mingw_rmdir(const char *pathname)
257 {
258 int ret, tries = 0;
259 wchar_t wpathname[MAX_PATH];
260 if (xutftowcs_path(wpathname, pathname) < 0)
261 return -1;
262
263 while ((ret = _wrmdir(wpathname)) == -1 && tries < ARRAY_SIZE(delay)) {
264 if (!is_file_in_use_error(GetLastError()))
265 errno = err_win_to_posix(GetLastError());
266 if (errno != EACCES)
267 break;
268 if (!is_dir_empty(wpathname)) {
269 errno = ENOTEMPTY;
270 break;
271 }
272 /*
273 * We assume that some other process had the source or
274 * destination file open at the wrong moment and retry.
275 * In order to give the other process a higher chance to
276 * complete its operation, we give up our time slice now.
277 * If we have to retry again, we do sleep a bit.
278 */
279 Sleep(delay[tries]);
280 tries++;
281 }
282 while (ret == -1 && errno == EACCES && is_file_in_use_error(GetLastError()) &&
283 ask_yes_no_if_possible("Deletion of directory '%s' failed. "
284 "Should I try again?", pathname))
285 ret = _wrmdir(wpathname);
286 if (!ret)
287 invalidate_lstat_cache();
288 return ret;
289 }
290
291 static inline int needs_hiding(const char *path)
292 {
293 const char *basename;
294
295 if (hide_dotfiles == HIDE_DOTFILES_FALSE)
296 return 0;
297
298 /* We cannot use basename(), as it would remove trailing slashes */
299 mingw_skip_dos_drive_prefix((char **)&path);
300 if (!*path)
301 return 0;
302
303 for (basename = path; *path; path++)
304 if (is_dir_sep(*path)) {
305 do {
306 path++;
307 } while (is_dir_sep(*path));
308 /* ignore trailing slashes */
309 if (*path)
310 basename = path;
311 }
312
313 if (hide_dotfiles == HIDE_DOTFILES_TRUE)
314 return *basename == '.';
315
316 assert(hide_dotfiles == HIDE_DOTFILES_DOTGITONLY);
317 return !strncasecmp(".git", basename, 4) &&
318 (!basename[4] || is_dir_sep(basename[4]));
319 }
320
321 static int set_hidden_flag(const wchar_t *path, int set)
322 {
323 DWORD original = GetFileAttributesW(path), modified;
324 if (set)
325 modified = original | FILE_ATTRIBUTE_HIDDEN;
326 else
327 modified = original & ~FILE_ATTRIBUTE_HIDDEN;
328 if (original == modified || SetFileAttributesW(path, modified))
329 return 0;
330 errno = err_win_to_posix(GetLastError());
331 return -1;
332 }
333
334 int mingw_mkdir(const char *path, int mode)
335 {
336 int ret;
337 wchar_t wpath[MAX_PATH];
338
339 if (!is_valid_win32_path(path)) {
340 errno = EINVAL;
341 return -1;
342 }
343
344 if (xutftowcs_path(wpath, path) < 0)
345 return -1;
346 ret = _wmkdir(wpath);
347 if (!ret && needs_hiding(path))
348 return set_hidden_flag(wpath, 1);
349 return ret;
350 }
351
352 int mingw_open (const char *filename, int oflags, ...)
353 {
354 va_list args;
355 unsigned mode;
356 int fd, create = (oflags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL);
357 wchar_t wfilename[MAX_PATH];
358
359 va_start(args, oflags);
360 mode = va_arg(args, int);
361 va_end(args);
362
363 if (!is_valid_win32_path(filename)) {
364 errno = create ? EINVAL : ENOENT;
365 return -1;
366 }
367
368 if (filename && !strcmp(filename, "/dev/null"))
369 filename = "nul";
370
371 if (xutftowcs_path(wfilename, filename) < 0)
372 return -1;
373 fd = _wopen(wfilename, oflags, mode);
374
375 if (fd < 0 && (oflags & O_ACCMODE) != O_RDONLY && errno == EACCES) {
376 DWORD attrs = GetFileAttributesW(wfilename);
377 if (attrs != INVALID_FILE_ATTRIBUTES && (attrs & FILE_ATTRIBUTE_DIRECTORY))
378 errno = EISDIR;
379 }
380 if ((oflags & O_CREAT) && needs_hiding(filename)) {
381 /*
382 * Internally, _wopen() uses the CreateFile() API which errors
383 * out with an ERROR_ACCESS_DENIED if CREATE_ALWAYS was
384 * specified and an already existing file's attributes do not
385 * match *exactly*. As there is no mode or flag we can set that
386 * would correspond to FILE_ATTRIBUTE_HIDDEN, let's just try
387 * again *without* the O_CREAT flag (that corresponds to the
388 * CREATE_ALWAYS flag of CreateFile()).
389 */
390 if (fd < 0 && errno == EACCES)
391 fd = _wopen(wfilename, oflags & ~O_CREAT, mode);
392 if (fd >= 0 && set_hidden_flag(wfilename, 1))
393 warning("could not mark '%s' as hidden.", filename);
394 }
395 return fd;
396 }
397
398 static BOOL WINAPI ctrl_ignore(DWORD type)
399 {
400 return TRUE;
401 }
402
403 #undef fgetc
404 int mingw_fgetc(FILE *stream)
405 {
406 int ch;
407 if (!isatty(_fileno(stream)))
408 return fgetc(stream);
409
410 SetConsoleCtrlHandler(ctrl_ignore, TRUE);
411 while (1) {
412 ch = fgetc(stream);
413 if (ch != EOF || GetLastError() != ERROR_OPERATION_ABORTED)
414 break;
415
416 /* Ctrl+C was pressed, simulate SIGINT and retry */
417 mingw_raise(SIGINT);
418 }
419 SetConsoleCtrlHandler(ctrl_ignore, FALSE);
420 return ch;
421 }
422
423 #undef fopen
424 FILE *mingw_fopen (const char *filename, const char *otype)
425 {
426 int hide = needs_hiding(filename);
427 FILE *file;
428 wchar_t wfilename[MAX_PATH], wotype[4];
429 if (!is_valid_win32_path(filename)) {
430 int create = otype && strchr(otype, 'w');
431 errno = create ? EINVAL : ENOENT;
432 return NULL;
433 }
434 if (filename && !strcmp(filename, "/dev/null"))
435 filename = "nul";
436 if (xutftowcs_path(wfilename, filename) < 0 ||
437 xutftowcs(wotype, otype, ARRAY_SIZE(wotype)) < 0)
438 return NULL;
439 if (hide && !access(filename, F_OK) && set_hidden_flag(wfilename, 0)) {
440 error("could not unhide %s", filename);
441 return NULL;
442 }
443 file = _wfopen(wfilename, wotype);
444 if (!file && GetLastError() == ERROR_INVALID_NAME)
445 errno = ENOENT;
446 if (file && hide && set_hidden_flag(wfilename, 1))
447 warning("could not mark '%s' as hidden.", filename);
448 return file;
449 }
450
451 FILE *mingw_freopen (const char *filename, const char *otype, FILE *stream)
452 {
453 int hide = needs_hiding(filename);
454 FILE *file;
455 wchar_t wfilename[MAX_PATH], wotype[4];
456 if (!is_valid_win32_path(filename)) {
457 int create = otype && strchr(otype, 'w');
458 errno = create ? EINVAL : ENOENT;
459 return NULL;
460 }
461 if (filename && !strcmp(filename, "/dev/null"))
462 filename = "nul";
463 if (xutftowcs_path(wfilename, filename) < 0 ||
464 xutftowcs(wotype, otype, ARRAY_SIZE(wotype)) < 0)
465 return NULL;
466 if (hide && !access(filename, F_OK) && set_hidden_flag(wfilename, 0)) {
467 error("could not unhide %s", filename);
468 return NULL;
469 }
470 file = _wfreopen(wfilename, wotype, stream);
471 if (file && hide && set_hidden_flag(wfilename, 1))
472 warning("could not mark '%s' as hidden.", filename);
473 return file;
474 }
475
476 #undef fflush
477 int mingw_fflush(FILE *stream)
478 {
479 int ret = fflush(stream);
480
481 /*
482 * write() is used behind the scenes of stdio output functions.
483 * Since git code does not check for errors after each stdio write
484 * operation, it can happen that write() is called by a later
485 * stdio function even if an earlier write() call failed. In the
486 * case of a pipe whose readable end was closed, only the first
487 * call to write() reports EPIPE on Windows. Subsequent write()
488 * calls report EINVAL. It is impossible to notice whether this
489 * fflush invocation triggered such a case, therefore, we have to
490 * catch all EINVAL errors whole-sale.
491 */
492 if (ret && errno == EINVAL)
493 errno = EPIPE;
494
495 return ret;
496 }
497
498 #undef write
499 ssize_t mingw_write(int fd, const void *buf, size_t len)
500 {
501 ssize_t result = write(fd, buf, len);
502
503 if (result < 0 && errno == EINVAL && buf) {
504 /* check if fd is a pipe */
505 HANDLE h = (HANDLE) _get_osfhandle(fd);
506 if (GetFileType(h) == FILE_TYPE_PIPE)
507 errno = EPIPE;
508 else
509 errno = EINVAL;
510 }
511
512 return result;
513 }
514
515 int mingw_access(const char *filename, int mode)
516 {
517 wchar_t wfilename[MAX_PATH];
518 if (xutftowcs_path(wfilename, filename) < 0)
519 return -1;
520 /* X_OK is not supported by the MSVCRT version */
521 return _waccess(wfilename, mode & ~X_OK);
522 }
523
524 int mingw_chdir(const char *dirname)
525 {
526 wchar_t wdirname[MAX_PATH];
527 if (xutftowcs_path(wdirname, dirname) < 0)
528 return -1;
529 return _wchdir(wdirname);
530 }
531
532 int mingw_chmod(const char *filename, int mode)
533 {
534 wchar_t wfilename[MAX_PATH];
535 if (xutftowcs_path(wfilename, filename) < 0)
536 return -1;
537 return _wchmod(wfilename, mode);
538 }
539
540 /*
541 * The unit of FILETIME is 100-nanoseconds since January 1, 1601, UTC.
542 * Returns the 100-nanoseconds ("hekto nanoseconds") since the epoch.
543 */
544 static inline long long filetime_to_hnsec(const FILETIME *ft)
545 {
546 long long winTime = ((long long)ft->dwHighDateTime << 32) + ft->dwLowDateTime;
547 /* Windows to Unix Epoch conversion */
548 return winTime - 116444736000000000LL;
549 }
550
551 static inline time_t filetime_to_time_t(const FILETIME *ft)
552 {
553 return (time_t)(filetime_to_hnsec(ft) / 10000000);
554 }
555
556 /**
557 * Verifies that safe_create_leading_directories() would succeed.
558 */
559 static int has_valid_directory_prefix(wchar_t *wfilename)
560 {
561 int n = wcslen(wfilename);
562
563 while (n > 0) {
564 wchar_t c = wfilename[--n];
565 DWORD attributes;
566
567 if (!is_dir_sep(c))
568 continue;
569
570 wfilename[n] = L'\0';
571 attributes = GetFileAttributesW(wfilename);
572 wfilename[n] = c;
573 if (attributes == FILE_ATTRIBUTE_DIRECTORY ||
574 attributes == FILE_ATTRIBUTE_DEVICE)
575 return 1;
576 if (attributes == INVALID_FILE_ATTRIBUTES)
577 switch (GetLastError()) {
578 case ERROR_PATH_NOT_FOUND:
579 continue;
580 case ERROR_FILE_NOT_FOUND:
581 /* This implies parent directory exists. */
582 return 1;
583 }
584 return 0;
585 }
586 return 1;
587 }
588
589 /* We keep the do_lstat code in a separate function to avoid recursion.
590 * When a path ends with a slash, the stat will fail with ENOENT. In
591 * this case, we strip the trailing slashes and stat again.
592 *
593 * If follow is true then act like stat() and report on the link
594 * target. Otherwise report on the link itself.
595 */
596 static int do_lstat(int follow, const char *file_name, struct stat *buf)
597 {
598 WIN32_FILE_ATTRIBUTE_DATA fdata;
599 wchar_t wfilename[MAX_PATH];
600 if (xutftowcs_path(wfilename, file_name) < 0)
601 return -1;
602
603 if (GetFileAttributesExW(wfilename, GetFileExInfoStandard, &fdata)) {
604 buf->st_ino = 0;
605 buf->st_gid = 0;
606 buf->st_uid = 0;
607 buf->st_nlink = 1;
608 buf->st_mode = file_attr_to_st_mode(fdata.dwFileAttributes);
609 buf->st_size = fdata.nFileSizeLow |
610 (((off_t)fdata.nFileSizeHigh)<<32);
611 buf->st_dev = buf->st_rdev = 0; /* not used by Git */
612 buf->st_atime = filetime_to_time_t(&(fdata.ftLastAccessTime));
613 buf->st_mtime = filetime_to_time_t(&(fdata.ftLastWriteTime));
614 buf->st_ctime = filetime_to_time_t(&(fdata.ftCreationTime));
615 if (fdata.dwFileAttributes & FILE_ATTRIBUTE_REPARSE_POINT) {
616 WIN32_FIND_DATAW findbuf;
617 HANDLE handle = FindFirstFileW(wfilename, &findbuf);
618 if (handle != INVALID_HANDLE_VALUE) {
619 if ((findbuf.dwFileAttributes & FILE_ATTRIBUTE_REPARSE_POINT) &&
620 (findbuf.dwReserved0 == IO_REPARSE_TAG_SYMLINK)) {
621 if (follow) {
622 char buffer[MAXIMUM_REPARSE_DATA_BUFFER_SIZE];
623 buf->st_size = readlink(file_name, buffer, MAXIMUM_REPARSE_DATA_BUFFER_SIZE);
624 } else {
625 buf->st_mode = S_IFLNK;
626 }
627 buf->st_mode |= S_IREAD;
628 if (!(findbuf.dwFileAttributes & FILE_ATTRIBUTE_READONLY))
629 buf->st_mode |= S_IWRITE;
630 }
631 FindClose(handle);
632 }
633 }
634 return 0;
635 }
636 switch (GetLastError()) {
637 case ERROR_ACCESS_DENIED:
638 case ERROR_SHARING_VIOLATION:
639 case ERROR_LOCK_VIOLATION:
640 case ERROR_SHARING_BUFFER_EXCEEDED:
641 errno = EACCES;
642 break;
643 case ERROR_BUFFER_OVERFLOW:
644 errno = ENAMETOOLONG;
645 break;
646 case ERROR_NOT_ENOUGH_MEMORY:
647 errno = ENOMEM;
648 break;
649 case ERROR_PATH_NOT_FOUND:
650 if (!has_valid_directory_prefix(wfilename)) {
651 errno = ENOTDIR;
652 break;
653 }
654 /* fallthru */
655 default:
656 errno = ENOENT;
657 break;
658 }
659 return -1;
660 }
661
662 /* We provide our own lstat/fstat functions, since the provided
663 * lstat/fstat functions are so slow. These stat functions are
664 * tailored for Git's usage (read: fast), and are not meant to be
665 * complete. Note that Git stat()s are redirected to mingw_lstat()
666 * too, since Windows doesn't really handle symlinks that well.
667 */
668 static int do_stat_internal(int follow, const char *file_name, struct stat *buf)
669 {
670 int namelen;
671 char alt_name[PATH_MAX];
672
673 if (!do_lstat(follow, file_name, buf))
674 return 0;
675
676 /* if file_name ended in a '/', Windows returned ENOENT;
677 * try again without trailing slashes
678 */
679 if (errno != ENOENT)
680 return -1;
681
682 namelen = strlen(file_name);
683 if (namelen && file_name[namelen-1] != '/')
684 return -1;
685 while (namelen && file_name[namelen-1] == '/')
686 --namelen;
687 if (!namelen || namelen >= PATH_MAX)
688 return -1;
689
690 memcpy(alt_name, file_name, namelen);
691 alt_name[namelen] = 0;
692 return do_lstat(follow, alt_name, buf);
693 }
694
695 int mingw_lstat(const char *file_name, struct stat *buf)
696 {
697 return do_stat_internal(0, file_name, buf);
698 }
699 int mingw_stat(const char *file_name, struct stat *buf)
700 {
701 return do_stat_internal(1, file_name, buf);
702 }
703
704 int mingw_fstat(int fd, struct stat *buf)
705 {
706 HANDLE fh = (HANDLE)_get_osfhandle(fd);
707 BY_HANDLE_FILE_INFORMATION fdata;
708
709 if (fh == INVALID_HANDLE_VALUE) {
710 errno = EBADF;
711 return -1;
712 }
713 /* direct non-file handles to MS's fstat() */
714 if (GetFileType(fh) != FILE_TYPE_DISK)
715 return _fstati64(fd, buf);
716
717 if (GetFileInformationByHandle(fh, &fdata)) {
718 buf->st_ino = 0;
719 buf->st_gid = 0;
720 buf->st_uid = 0;
721 buf->st_nlink = 1;
722 buf->st_mode = file_attr_to_st_mode(fdata.dwFileAttributes);
723 buf->st_size = fdata.nFileSizeLow |
724 (((off_t)fdata.nFileSizeHigh)<<32);
725 buf->st_dev = buf->st_rdev = 0; /* not used by Git */
726 buf->st_atime = filetime_to_time_t(&(fdata.ftLastAccessTime));
727 buf->st_mtime = filetime_to_time_t(&(fdata.ftLastWriteTime));
728 buf->st_ctime = filetime_to_time_t(&(fdata.ftCreationTime));
729 return 0;
730 }
731 errno = EBADF;
732 return -1;
733 }
734
735 static inline void time_t_to_filetime(time_t t, FILETIME *ft)
736 {
737 long long winTime = t * 10000000LL + 116444736000000000LL;
738 ft->dwLowDateTime = winTime;
739 ft->dwHighDateTime = winTime >> 32;
740 }
741
742 int mingw_utime (const char *file_name, const struct utimbuf *times)
743 {
744 FILETIME mft, aft;
745 int fh, rc;
746 DWORD attrs;
747 wchar_t wfilename[MAX_PATH];
748 if (xutftowcs_path(wfilename, file_name) < 0)
749 return -1;
750
751 /* must have write permission */
752 attrs = GetFileAttributesW(wfilename);
753 if (attrs != INVALID_FILE_ATTRIBUTES &&
754 (attrs & FILE_ATTRIBUTE_READONLY)) {
755 /* ignore errors here; open() will report them */
756 SetFileAttributesW(wfilename, attrs & ~FILE_ATTRIBUTE_READONLY);
757 }
758
759 if ((fh = _wopen(wfilename, O_RDWR | O_BINARY)) < 0) {
760 rc = -1;
761 goto revert_attrs;
762 }
763
764 if (times) {
765 time_t_to_filetime(times->modtime, &mft);
766 time_t_to_filetime(times->actime, &aft);
767 } else {
768 GetSystemTimeAsFileTime(&mft);
769 aft = mft;
770 }
771 if (!SetFileTime((HANDLE)_get_osfhandle(fh), NULL, &aft, &mft)) {
772 errno = EINVAL;
773 rc = -1;
774 } else
775 rc = 0;
776 close(fh);
777
778 revert_attrs:
779 if (attrs != INVALID_FILE_ATTRIBUTES &&
780 (attrs & FILE_ATTRIBUTE_READONLY)) {
781 /* ignore errors again */
782 SetFileAttributesW(wfilename, attrs);
783 }
784 return rc;
785 }
786
787 #undef strftime
788 size_t mingw_strftime(char *s, size_t max,
789 const char *format, const struct tm *tm)
790 {
791 size_t ret = strftime(s, max, format, tm);
792
793 if (!ret && errno == EINVAL)
794 die("invalid strftime format: '%s'", format);
795 return ret;
796 }
797
798 unsigned int sleep (unsigned int seconds)
799 {
800 Sleep(seconds*1000);
801 return 0;
802 }
803
804 char *mingw_mktemp(char *template)
805 {
806 wchar_t wtemplate[MAX_PATH];
807 if (xutftowcs_path(wtemplate, template) < 0)
808 return NULL;
809 if (!_wmktemp(wtemplate))
810 return NULL;
811 if (xwcstoutf(template, wtemplate, strlen(template) + 1) < 0)
812 return NULL;
813 return template;
814 }
815
816 int mkstemp(char *template)
817 {
818 char *filename = mktemp(template);
819 if (filename == NULL)
820 return -1;
821 return open(filename, O_RDWR | O_CREAT, 0600);
822 }
823
824 int gettimeofday(struct timeval *tv, void *tz)
825 {
826 FILETIME ft;
827 long long hnsec;
828
829 GetSystemTimeAsFileTime(&ft);
830 hnsec = filetime_to_hnsec(&ft);
831 tv->tv_sec = hnsec / 10000000;
832 tv->tv_usec = (hnsec % 10000000) / 10;
833 return 0;
834 }
835
836 int pipe(int filedes[2])
837 {
838 HANDLE h[2];
839
840 /* this creates non-inheritable handles */
841 if (!CreatePipe(&h[0], &h[1], NULL, 8192)) {
842 errno = err_win_to_posix(GetLastError());
843 return -1;
844 }
845 filedes[0] = _open_osfhandle(HCAST(int, h[0]), O_NOINHERIT);
846 if (filedes[0] < 0) {
847 CloseHandle(h[0]);
848 CloseHandle(h[1]);
849 return -1;
850 }
851 filedes[1] = _open_osfhandle(HCAST(int, h[1]), O_NOINHERIT);
852 if (filedes[1] < 0) {
853 close(filedes[0]);
854 CloseHandle(h[1]);
855 return -1;
856 }
857 return 0;
858 }
859
860 struct tm *gmtime_r(const time_t *timep, struct tm *result)
861 {
862 /* gmtime() in MSVCRT.DLL is thread-safe, but not reentrant */
863 memcpy(result, gmtime(timep), sizeof(struct tm));
864 return result;
865 }
866
867 struct tm *localtime_r(const time_t *timep, struct tm *result)
868 {
869 /* localtime() in MSVCRT.DLL is thread-safe, but not reentrant */
870 memcpy(result, localtime(timep), sizeof(struct tm));
871 return result;
872 }
873
874 char *mingw_getcwd(char *pointer, int len)
875 {
876 wchar_t wpointer[MAX_PATH];
877 if (!_wgetcwd(wpointer, ARRAY_SIZE(wpointer)))
878 return NULL;
879 if (xwcstoutf(pointer, wpointer, len) < 0)
880 return NULL;
881 convert_slashes(pointer);
882 return pointer;
883 }
884
885 /*
886 * See http://msdn2.microsoft.com/en-us/library/17w5ykft(vs.71).aspx
887 * (Parsing C++ Command-Line Arguments)
888 */
889 static const char *quote_arg(const char *arg)
890 {
891 /* count chars to quote */
892 int len = 0, n = 0;
893 int force_quotes = 0;
894 char *q, *d;
895 const char *p = arg;
896 if (!*p) force_quotes = 1;
897 while (*p) {
898 if (isspace(*p) || *p == '*' || *p == '?' || *p == '{' || *p == '\'')
899 force_quotes = 1;
900 else if (*p == '"')
901 n++;
902 else if (*p == '\\') {
903 int count = 0;
904 while (*p == '\\') {
905 count++;
906 p++;
907 len++;
908 }
909 if (*p == '"' || !*p)
910 n += count*2 + 1;
911 continue;
912 }
913 len++;
914 p++;
915 }
916 if (!force_quotes && n == 0)
917 return arg;
918
919 /* insert \ where necessary */
920 d = q = xmalloc(st_add3(len, n, 3));
921 *d++ = '"';
922 while (*arg) {
923 if (*arg == '"')
924 *d++ = '\\';
925 else if (*arg == '\\') {
926 int count = 0;
927 while (*arg == '\\') {
928 count++;
929 *d++ = *arg++;
930 }
931 if (*arg == '"' || !*arg) {
932 while (count-- > 0)
933 *d++ = '\\';
934 /* don't escape the surrounding end quote */
935 if (!*arg)
936 break;
937 *d++ = '\\';
938 }
939 }
940 *d++ = *arg++;
941 }
942 *d++ = '"';
943 *d++ = '\0';
944 return q;
945 }
946
947 static const char *parse_interpreter(const char *cmd)
948 {
949 static char buf[100];
950 char *p, *opt;
951 int n, fd;
952
953 /* don't even try a .exe */
954 n = strlen(cmd);
955 if (n >= 4 && !strcasecmp(cmd+n-4, ".exe"))
956 return NULL;
957
958 fd = open(cmd, O_RDONLY);
959 if (fd < 0)
960 return NULL;
961 n = read(fd, buf, sizeof(buf)-1);
962 close(fd);
963 if (n < 4) /* at least '#!/x' and not error */
964 return NULL;
965
966 if (buf[0] != '#' || buf[1] != '!')
967 return NULL;
968 buf[n] = '\0';
969 p = buf + strcspn(buf, "\r\n");
970 if (!*p)
971 return NULL;
972
973 *p = '\0';
974 if (!(p = strrchr(buf+2, '/')) && !(p = strrchr(buf+2, '\\')))
975 return NULL;
976 /* strip options */
977 if ((opt = strchr(p+1, ' ')))
978 *opt = '\0';
979 return p+1;
980 }
981
982 /*
983 * exe_only means that we only want to detect .exe files, but not scripts
984 * (which do not have an extension)
985 */
986 static char *lookup_prog(const char *dir, int dirlen, const char *cmd,
987 int isexe, int exe_only)
988 {
989 char path[MAX_PATH];
990 snprintf(path, sizeof(path), "%.*s\\%s.exe", dirlen, dir, cmd);
991
992 if (!isexe && access(path, F_OK) == 0)
993 return xstrdup(path);
994 path[strlen(path)-4] = '\0';
995 if ((!exe_only || isexe) && access(path, F_OK) == 0)
996 if (!(GetFileAttributes(path) & FILE_ATTRIBUTE_DIRECTORY))
997 return xstrdup(path);
998 return NULL;
999 }
1000
1001 /*
1002 * Determines the absolute path of cmd using the split path in path.
1003 * If cmd contains a slash or backslash, no lookup is performed.
1004 */
1005 static char *path_lookup(const char *cmd, int exe_only)
1006 {
1007 const char *path;
1008 char *prog = NULL;
1009 int len = strlen(cmd);
1010 int isexe = len >= 4 && !strcasecmp(cmd+len-4, ".exe");
1011
1012 if (strchr(cmd, '/') || strchr(cmd, '\\'))
1013 return xstrdup(cmd);
1014
1015 path = mingw_getenv("PATH");
1016 if (!path)
1017 return NULL;
1018
1019 while (!prog) {
1020 const char *sep = strchrnul(path, ';');
1021 int dirlen = sep - path;
1022 if (dirlen)
1023 prog = lookup_prog(path, dirlen, cmd, isexe, exe_only);
1024 if (!*sep)
1025 break;
1026 path = sep + 1;
1027 }
1028
1029 return prog;
1030 }
1031
1032 static int do_putenv(char **env, const char *name, int size, int free_old);
1033
1034 /* used number of elements of environ array, including terminating NULL */
1035 static int environ_size = 0;
1036 /* allocated size of environ array, in bytes */
1037 static int environ_alloc = 0;
1038
1039 /*
1040 * Create environment block suitable for CreateProcess. Merges current
1041 * process environment and the supplied environment changes.
1042 */
1043 static wchar_t *make_environment_block(char **deltaenv)
1044 {
1045 wchar_t *wenvblk = NULL;
1046 char **tmpenv;
1047 int i = 0, size = environ_size, wenvsz = 0, wenvpos = 0;
1048
1049 while (deltaenv && deltaenv[i])
1050 i++;
1051
1052 /* copy the environment, leaving space for changes */
1053 ALLOC_ARRAY(tmpenv, size + i);
1054 memcpy(tmpenv, environ, size * sizeof(char*));
1055
1056 /* merge supplied environment changes into the temporary environment */
1057 for (i = 0; deltaenv && deltaenv[i]; i++)
1058 size = do_putenv(tmpenv, deltaenv[i], size, 0);
1059
1060 /* create environment block from temporary environment */
1061 for (i = 0; tmpenv[i]; i++) {
1062 size = 2 * strlen(tmpenv[i]) + 2; /* +2 for final \0 */
1063 ALLOC_GROW(wenvblk, (wenvpos + size) * sizeof(wchar_t), wenvsz);
1064 wenvpos += xutftowcs(&wenvblk[wenvpos], tmpenv[i], size) + 1;
1065 }
1066 /* add final \0 terminator */
1067 wenvblk[wenvpos] = 0;
1068 free(tmpenv);
1069 return wenvblk;
1070 }
1071
1072 struct pinfo_t {
1073 struct pinfo_t *next;
1074 pid_t pid;
1075 HANDLE proc;
1076 };
1077 static struct pinfo_t *pinfo = NULL;
1078 CRITICAL_SECTION pinfo_cs;
1079
1080 static pid_t mingw_spawnve_fd(const char *cmd, const char **argv, char **deltaenv,
1081 const char *dir,
1082 int prepend_cmd, int fhin, int fhout, int fherr)
1083 {
1084 STARTUPINFOW si;
1085 PROCESS_INFORMATION pi;
1086 struct strbuf args;
1087 wchar_t wcmd[MAX_PATH], wdir[MAX_PATH], *wargs, *wenvblk = NULL;
1088 unsigned flags = CREATE_UNICODE_ENVIRONMENT;
1089 BOOL ret;
1090
1091 /* Determine whether or not we are associated to a console */
1092 HANDLE cons = CreateFile("CONOUT$", GENERIC_WRITE,
1093 FILE_SHARE_WRITE, NULL, OPEN_EXISTING,
1094 FILE_ATTRIBUTE_NORMAL, NULL);
1095 if (cons == INVALID_HANDLE_VALUE) {
1096 /* There is no console associated with this process.
1097 * Since the child is a console process, Windows
1098 * would normally create a console window. But
1099 * since we'll be redirecting std streams, we do
1100 * not need the console.
1101 * It is necessary to use DETACHED_PROCESS
1102 * instead of CREATE_NO_WINDOW to make ssh
1103 * recognize that it has no console.
1104 */
1105 flags |= DETACHED_PROCESS;
1106 } else {
1107 /* There is already a console. If we specified
1108 * DETACHED_PROCESS here, too, Windows would
1109 * disassociate the child from the console.
1110 * The same is true for CREATE_NO_WINDOW.
1111 * Go figure!
1112 */
1113 CloseHandle(cons);
1114 }
1115 memset(&si, 0, sizeof(si));
1116 si.cb = sizeof(si);
1117 si.dwFlags = STARTF_USESTDHANDLES;
1118 si.hStdInput = winansi_get_osfhandle(fhin);
1119 si.hStdOutput = winansi_get_osfhandle(fhout);
1120 si.hStdError = winansi_get_osfhandle(fherr);
1121
1122 if (xutftowcs_path(wcmd, cmd) < 0)
1123 return -1;
1124 if (dir && xutftowcs_path(wdir, dir) < 0)
1125 return -1;
1126
1127 /* concatenate argv, quoting args as we go */
1128 strbuf_init(&args, 0);
1129 if (prepend_cmd) {
1130 char *quoted = (char *)quote_arg(cmd);
1131 strbuf_addstr(&args, quoted);
1132 if (quoted != cmd)
1133 free(quoted);
1134 }
1135 for (; *argv; argv++) {
1136 char *quoted = (char *)quote_arg(*argv);
1137 if (*args.buf)
1138 strbuf_addch(&args, ' ');
1139 strbuf_addstr(&args, quoted);
1140 if (quoted != *argv)
1141 free(quoted);
1142 }
1143
1144 ALLOC_ARRAY(wargs, st_add(st_mult(2, args.len), 1));
1145 xutftowcs(wargs, args.buf, 2 * args.len + 1);
1146 strbuf_release(&args);
1147
1148 wenvblk = make_environment_block(deltaenv);
1149
1150 memset(&pi, 0, sizeof(pi));
1151 ret = CreateProcessW(wcmd, wargs, NULL, NULL, TRUE, flags,
1152 wenvblk, dir ? wdir : NULL, &si, &pi);
1153
1154 free(wenvblk);
1155 free(wargs);
1156
1157 if (!ret) {
1158 errno = ENOENT;
1159 return -1;
1160 }
1161 CloseHandle(pi.hThread);
1162
1163 /*
1164 * The process ID is the human-readable identifier of the process
1165 * that we want to present in log and error messages. The handle
1166 * is not useful for this purpose. But we cannot close it, either,
1167 * because it is not possible to turn a process ID into a process
1168 * handle after the process terminated.
1169 * Keep the handle in a list for waitpid.
1170 */
1171 EnterCriticalSection(&pinfo_cs);
1172 {
1173 struct pinfo_t *info = xmalloc(sizeof(struct pinfo_t));
1174 info->pid = pi.dwProcessId;
1175 info->proc = pi.hProcess;
1176 info->next = pinfo;
1177 pinfo = info;
1178 }
1179 LeaveCriticalSection(&pinfo_cs);
1180
1181 return (pid_t)pi.dwProcessId;
1182 }
1183
1184 static pid_t mingw_spawnv(const char *cmd, const char **argv, int prepend_cmd)
1185 {
1186 return mingw_spawnve_fd(cmd, argv, NULL, NULL, prepend_cmd, 0, 1, 2);
1187 }
1188
1189 pid_t mingw_spawnvpe(const char *cmd, const char **argv, char **deltaenv,
1190 const char *dir,
1191 int fhin, int fhout, int fherr)
1192 {
1193 pid_t pid;
1194 char *prog = path_lookup(cmd, 0);
1195
1196 if (!prog) {
1197 errno = ENOENT;
1198 pid = -1;
1199 }
1200 else {
1201 const char *interpr = parse_interpreter(prog);
1202
1203 if (interpr) {
1204 const char *argv0 = argv[0];
1205 char *iprog = path_lookup(interpr, 1);
1206 argv[0] = prog;
1207 if (!iprog) {
1208 errno = ENOENT;
1209 pid = -1;
1210 }
1211 else {
1212 pid = mingw_spawnve_fd(iprog, argv, deltaenv, dir, 1,
1213 fhin, fhout, fherr);
1214 free(iprog);
1215 }
1216 argv[0] = argv0;
1217 }
1218 else
1219 pid = mingw_spawnve_fd(prog, argv, deltaenv, dir, 0,
1220 fhin, fhout, fherr);
1221 free(prog);
1222 }
1223 return pid;
1224 }
1225
1226 static int try_shell_exec(const char *cmd, char *const *argv)
1227 {
1228 const char *interpr = parse_interpreter(cmd);
1229 char *prog;
1230 int pid = 0;
1231
1232 if (!interpr)
1233 return 0;
1234 prog = path_lookup(interpr, 1);
1235 if (prog) {
1236 int argc = 0;
1237 const char **argv2;
1238 while (argv[argc]) argc++;
1239 ALLOC_ARRAY(argv2, argc + 1);
1240 argv2[0] = (char *)cmd; /* full path to the script file */
1241 memcpy(&argv2[1], &argv[1], sizeof(*argv) * argc);
1242 pid = mingw_spawnv(prog, argv2, 1);
1243 if (pid >= 0) {
1244 int status;
1245 if (waitpid(pid, &status, 0) < 0)
1246 status = 255;
1247 exit(status);
1248 }
1249 pid = 1; /* indicate that we tried but failed */
1250 free(prog);
1251 free(argv2);
1252 }
1253 return pid;
1254 }
1255
1256 int mingw_execv(const char *cmd, char *const *argv)
1257 {
1258 /* check if git_command is a shell script */
1259 if (!try_shell_exec(cmd, argv)) {
1260 int pid, status;
1261
1262 pid = mingw_spawnv(cmd, (const char **)argv, 0);
1263 if (pid < 0)
1264 return -1;
1265 if (waitpid(pid, &status, 0) < 0)
1266 status = 255;
1267 exit(status);
1268 }
1269 return -1;
1270 }
1271
1272 int mingw_execvp(const char *cmd, char *const *argv)
1273 {
1274 char *prog = path_lookup(cmd, 0);
1275
1276 if (prog) {
1277 mingw_execv(prog, argv);
1278 free(prog);
1279 } else
1280 errno = ENOENT;
1281
1282 return -1;
1283 }
1284
1285 int mingw_kill(pid_t pid, int sig)
1286 {
1287 if (pid > 0 && sig == SIGTERM) {
1288 HANDLE h = OpenProcess(PROCESS_TERMINATE, FALSE, pid);
1289
1290 if (TerminateProcess(h, -1)) {
1291 CloseHandle(h);
1292 return 0;
1293 }
1294
1295 errno = err_win_to_posix(GetLastError());
1296 CloseHandle(h);
1297 return -1;
1298 } else if (pid > 0 && sig == 0) {
1299 HANDLE h = OpenProcess(PROCESS_QUERY_INFORMATION, FALSE, pid);
1300 if (h) {
1301 CloseHandle(h);
1302 return 0;
1303 }
1304 }
1305
1306 errno = EINVAL;
1307 return -1;
1308 }
1309
1310 /*
1311 * Compare environment entries by key (i.e. stopping at '=' or '\0').
1312 */
1313 static int compareenv(const void *v1, const void *v2)
1314 {
1315 const char *e1 = *(const char**)v1;
1316 const char *e2 = *(const char**)v2;
1317
1318 for (;;) {
1319 int c1 = *e1++;
1320 int c2 = *e2++;
1321 c1 = (c1 == '=') ? 0 : tolower(c1);
1322 c2 = (c2 == '=') ? 0 : tolower(c2);
1323 if (c1 > c2)
1324 return 1;
1325 if (c1 < c2)
1326 return -1;
1327 if (c1 == 0)
1328 return 0;
1329 }
1330 }
1331
1332 static int bsearchenv(char **env, const char *name, size_t size)
1333 {
1334 unsigned low = 0, high = size;
1335 while (low < high) {
1336 unsigned mid = low + ((high - low) >> 1);
1337 int cmp = compareenv(&env[mid], &name);
1338 if (cmp < 0)
1339 low = mid + 1;
1340 else if (cmp > 0)
1341 high = mid;
1342 else
1343 return mid;
1344 }
1345 return ~low; /* not found, return 1's complement of insert position */
1346 }
1347
1348 /*
1349 * If name contains '=', then sets the variable, otherwise it unsets it
1350 * Size includes the terminating NULL. Env must have room for size + 1 entries
1351 * (in case of insert). Returns the new size. Optionally frees removed entries.
1352 */
1353 static int do_putenv(char **env, const char *name, int size, int free_old)
1354 {
1355 int i = bsearchenv(env, name, size - 1);
1356
1357 /* optionally free removed / replaced entry */
1358 if (i >= 0 && free_old)
1359 free(env[i]);
1360
1361 if (strchr(name, '=')) {
1362 /* if new value ('key=value') is specified, insert or replace entry */
1363 if (i < 0) {
1364 i = ~i;
1365 memmove(&env[i + 1], &env[i], (size - i) * sizeof(char*));
1366 size++;
1367 }
1368 env[i] = (char*) name;
1369 } else if (i >= 0) {
1370 /* otherwise ('key') remove existing entry */
1371 size--;
1372 memmove(&env[i], &env[i + 1], (size - i) * sizeof(char*));
1373 }
1374 return size;
1375 }
1376
1377 char *mingw_getenv(const char *name)
1378 {
1379 char *value;
1380 int pos = bsearchenv(environ, name, environ_size - 1);
1381 if (pos < 0)
1382 return NULL;
1383 value = strchr(environ[pos], '=');
1384 return value ? &value[1] : NULL;
1385 }
1386
1387 int mingw_putenv(const char *namevalue)
1388 {
1389 ALLOC_GROW(environ, (environ_size + 1) * sizeof(char*), environ_alloc);
1390 environ_size = do_putenv(environ, namevalue, environ_size, 1);
1391 return 0;
1392 }
1393
1394 /*
1395 * Note, this isn't a complete replacement for getaddrinfo. It assumes
1396 * that service contains a numerical port, or that it is null. It
1397 * does a simple search using gethostbyname, and returns one IPv4 host
1398 * if one was found.
1399 */
1400 static int WSAAPI getaddrinfo_stub(const char *node, const char *service,
1401 const struct addrinfo *hints,
1402 struct addrinfo **res)
1403 {
1404 struct hostent *h = NULL;
1405 struct addrinfo *ai;
1406 struct sockaddr_in *sin;
1407
1408 if (node) {
1409 h = gethostbyname(node);
1410 if (!h)
1411 return WSAGetLastError();
1412 }
1413
1414 ai = xmalloc(sizeof(struct addrinfo));
1415 *res = ai;
1416 ai->ai_flags = 0;
1417 ai->ai_family = AF_INET;
1418 ai->ai_socktype = hints ? hints->ai_socktype : 0;
1419 switch (ai->ai_socktype) {
1420 case SOCK_STREAM:
1421 ai->ai_protocol = IPPROTO_TCP;
1422 break;
1423 case SOCK_DGRAM:
1424 ai->ai_protocol = IPPROTO_UDP;
1425 break;
1426 default:
1427 ai->ai_protocol = 0;
1428 break;
1429 }
1430 ai->ai_addrlen = sizeof(struct sockaddr_in);
1431 if (hints && (hints->ai_flags & AI_CANONNAME))
1432 ai->ai_canonname = h ? xstrdup(h->h_name) : NULL;
1433 else
1434 ai->ai_canonname = NULL;
1435
1436 sin = xcalloc(1, ai->ai_addrlen);
1437 sin->sin_family = AF_INET;
1438 /* Note: getaddrinfo is supposed to allow service to be a string,
1439 * which should be looked up using getservbyname. This is
1440 * currently not implemented */
1441 if (service)
1442 sin->sin_port = htons(atoi(service));
1443 if (h)
1444 sin->sin_addr = *(struct in_addr *)h->h_addr;
1445 else if (hints && (hints->ai_flags & AI_PASSIVE))
1446 sin->sin_addr.s_addr = INADDR_ANY;
1447 else
1448 sin->sin_addr.s_addr = INADDR_LOOPBACK;
1449 ai->ai_addr = (struct sockaddr *)sin;
1450 ai->ai_next = NULL;
1451 return 0;
1452 }
1453
1454 static void WSAAPI freeaddrinfo_stub(struct addrinfo *res)
1455 {
1456 free(res->ai_canonname);
1457 free(res->ai_addr);
1458 free(res);
1459 }
1460
1461 static int WSAAPI getnameinfo_stub(const struct sockaddr *sa, socklen_t salen,
1462 char *host, DWORD hostlen,
1463 char *serv, DWORD servlen, int flags)
1464 {
1465 const struct sockaddr_in *sin = (const struct sockaddr_in *)sa;
1466 if (sa->sa_family != AF_INET)
1467 return EAI_FAMILY;
1468 if (!host && !serv)
1469 return EAI_NONAME;
1470
1471 if (host && hostlen > 0) {
1472 struct hostent *ent = NULL;
1473 if (!(flags & NI_NUMERICHOST))
1474 ent = gethostbyaddr((const char *)&sin->sin_addr,
1475 sizeof(sin->sin_addr), AF_INET);
1476
1477 if (ent)
1478 snprintf(host, hostlen, "%s", ent->h_name);
1479 else if (flags & NI_NAMEREQD)
1480 return EAI_NONAME;
1481 else
1482 snprintf(host, hostlen, "%s", inet_ntoa(sin->sin_addr));
1483 }
1484
1485 if (serv && servlen > 0) {
1486 struct servent *ent = NULL;
1487 if (!(flags & NI_NUMERICSERV))
1488 ent = getservbyport(sin->sin_port,
1489 flags & NI_DGRAM ? "udp" : "tcp");
1490
1491 if (ent)
1492 snprintf(serv, servlen, "%s", ent->s_name);
1493 else
1494 snprintf(serv, servlen, "%d", ntohs(sin->sin_port));
1495 }
1496
1497 return 0;
1498 }
1499
1500 static HMODULE ipv6_dll = NULL;
1501 static void (WSAAPI *ipv6_freeaddrinfo)(struct addrinfo *res);
1502 static int (WSAAPI *ipv6_getaddrinfo)(const char *node, const char *service,
1503 const struct addrinfo *hints,
1504 struct addrinfo **res);
1505 static int (WSAAPI *ipv6_getnameinfo)(const struct sockaddr *sa, socklen_t salen,
1506 char *host, DWORD hostlen,
1507 char *serv, DWORD servlen, int flags);
1508 /*
1509 * gai_strerror is an inline function in the ws2tcpip.h header, so we
1510 * don't need to try to load that one dynamically.
1511 */
1512
1513 static void socket_cleanup(void)
1514 {
1515 WSACleanup();
1516 if (ipv6_dll)
1517 FreeLibrary(ipv6_dll);
1518 ipv6_dll = NULL;
1519 ipv6_freeaddrinfo = freeaddrinfo_stub;
1520 ipv6_getaddrinfo = getaddrinfo_stub;
1521 ipv6_getnameinfo = getnameinfo_stub;
1522 }
1523
1524 static void ensure_socket_initialization(void)
1525 {
1526 WSADATA wsa;
1527 static int initialized = 0;
1528 const char *libraries[] = { "ws2_32.dll", "wship6.dll", NULL };
1529 const char **name;
1530
1531 if (initialized)
1532 return;
1533
1534 if (WSAStartup(MAKEWORD(2,2), &wsa))
1535 die("unable to initialize winsock subsystem, error %d",
1536 WSAGetLastError());
1537
1538 for (name = libraries; *name; name++) {
1539 ipv6_dll = LoadLibrary(*name);
1540 if (!ipv6_dll)
1541 continue;
1542
1543 ipv6_freeaddrinfo = (void (WSAAPI *)(struct addrinfo *))
1544 GetProcAddress(ipv6_dll, "freeaddrinfo");
1545 ipv6_getaddrinfo = (int (WSAAPI *)(const char *, const char *,
1546 const struct addrinfo *,
1547 struct addrinfo **))
1548 GetProcAddress(ipv6_dll, "getaddrinfo");
1549 ipv6_getnameinfo = (int (WSAAPI *)(const struct sockaddr *,
1550 socklen_t, char *, DWORD,
1551 char *, DWORD, int))
1552 GetProcAddress(ipv6_dll, "getnameinfo");
1553 if (!ipv6_freeaddrinfo || !ipv6_getaddrinfo || !ipv6_getnameinfo) {
1554 FreeLibrary(ipv6_dll);
1555 ipv6_dll = NULL;
1556 } else
1557 break;
1558 }
1559 if (!ipv6_freeaddrinfo || !ipv6_getaddrinfo || !ipv6_getnameinfo) {
1560 ipv6_freeaddrinfo = freeaddrinfo_stub;
1561 ipv6_getaddrinfo = getaddrinfo_stub;
1562 ipv6_getnameinfo = getnameinfo_stub;
1563 }
1564
1565 atexit(socket_cleanup);
1566 initialized = 1;
1567 }
1568
1569 #undef gethostname
1570 int mingw_gethostname(char *name, int namelen)
1571 {
1572 ensure_socket_initialization();
1573 return gethostname(name, namelen);
1574 }
1575
1576 #undef gethostbyname
1577 struct hostent *mingw_gethostbyname(const char *host)
1578 {
1579 ensure_socket_initialization();
1580 return gethostbyname(host);
1581 }
1582
1583 void mingw_freeaddrinfo(struct addrinfo *res)
1584 {
1585 ipv6_freeaddrinfo(res);
1586 }
1587
1588 int mingw_getaddrinfo(const char *node, const char *service,
1589 const struct addrinfo *hints, struct addrinfo **res)
1590 {
1591 ensure_socket_initialization();
1592 return ipv6_getaddrinfo(node, service, hints, res);
1593 }
1594
1595 int mingw_getnameinfo(const struct sockaddr *sa, socklen_t salen,
1596 char *host, DWORD hostlen, char *serv, DWORD servlen,
1597 int flags)
1598 {
1599 ensure_socket_initialization();
1600 return ipv6_getnameinfo(sa, salen, host, hostlen, serv, servlen, flags);
1601 }
1602
1603 int mingw_socket(int domain, int type, int protocol)
1604 {
1605 int sockfd;
1606 SOCKET s;
1607
1608 ensure_socket_initialization();
1609 s = WSASocket(domain, type, protocol, NULL, 0, 0);
1610 if (s == INVALID_SOCKET) {
1611 /*
1612 * WSAGetLastError() values are regular BSD error codes
1613 * biased by WSABASEERR.
1614 * However, strerror() does not know about networking
1615 * specific errors, which are values beginning at 38 or so.
1616 * Therefore, we choose to leave the biased error code
1617 * in errno so that _if_ someone looks up the code somewhere,
1618 * then it is at least the number that are usually listed.
1619 */
1620 errno = WSAGetLastError();
1621 return -1;
1622 }
1623 /* convert into a file descriptor */
1624 if ((sockfd = _open_osfhandle(s, O_RDWR|O_BINARY)) < 0) {
1625 closesocket(s);
1626 return error("unable to make a socket file descriptor: %s",
1627 strerror(errno));
1628 }
1629 return sockfd;
1630 }
1631
1632 #undef connect
1633 int mingw_connect(int sockfd, struct sockaddr *sa, size_t sz)
1634 {
1635 SOCKET s = (SOCKET)_get_osfhandle(sockfd);
1636 return connect(s, sa, sz);
1637 }
1638
1639 #undef bind
1640 int mingw_bind(int sockfd, struct sockaddr *sa, size_t sz)
1641 {
1642 SOCKET s = (SOCKET)_get_osfhandle(sockfd);
1643 return bind(s, sa, sz);
1644 }
1645
1646 #undef setsockopt
1647 int mingw_setsockopt(int sockfd, int lvl, int optname, void *optval, int optlen)
1648 {
1649 SOCKET s = (SOCKET)_get_osfhandle(sockfd);
1650 return setsockopt(s, lvl, optname, (const char*)optval, optlen);
1651 }
1652
1653 #undef shutdown
1654 int mingw_shutdown(int sockfd, int how)
1655 {
1656 SOCKET s = (SOCKET)_get_osfhandle(sockfd);
1657 return shutdown(s, how);
1658 }
1659
1660 #undef listen
1661 int mingw_listen(int sockfd, int backlog)
1662 {
1663 SOCKET s = (SOCKET)_get_osfhandle(sockfd);
1664 return listen(s, backlog);
1665 }
1666
1667 #undef accept
1668 int mingw_accept(int sockfd1, struct sockaddr *sa, socklen_t *sz)
1669 {
1670 int sockfd2;
1671
1672 SOCKET s1 = (SOCKET)_get_osfhandle(sockfd1);
1673 SOCKET s2 = accept(s1, sa, sz);
1674
1675 /* convert into a file descriptor */
1676 if ((sockfd2 = _open_osfhandle(s2, O_RDWR|O_BINARY)) < 0) {
1677 int err = errno;
1678 closesocket(s2);
1679 return error("unable to make a socket file descriptor: %s",
1680 strerror(err));
1681 }
1682 return sockfd2;
1683 }
1684
1685 #undef rename
1686 int mingw_rename(const char *pold, const char *pnew)
1687 {
1688 DWORD attrs, gle;
1689 int tries = 0;
1690 wchar_t wpold[MAX_PATH], wpnew[MAX_PATH];
1691 if (xutftowcs_path(wpold, pold) < 0 || xutftowcs_path(wpnew, pnew) < 0)
1692 return -1;
1693
1694 /*
1695 * Try native rename() first to get errno right.
1696 * It is based on MoveFile(), which cannot overwrite existing files.
1697 */
1698 if (!_wrename(wpold, wpnew))
1699 return 0;
1700 if (errno != EEXIST)
1701 return -1;
1702 repeat:
1703 if (MoveFileExW(wpold, wpnew, MOVEFILE_REPLACE_EXISTING))
1704 return 0;
1705 /* TODO: translate more errors */
1706 gle = GetLastError();
1707 if (gle == ERROR_ACCESS_DENIED &&
1708 (attrs = GetFileAttributesW(wpnew)) != INVALID_FILE_ATTRIBUTES) {
1709 if (attrs & FILE_ATTRIBUTE_DIRECTORY) {
1710 DWORD attrsold = GetFileAttributesW(wpold);
1711 if (attrsold == INVALID_FILE_ATTRIBUTES ||
1712 !(attrsold & FILE_ATTRIBUTE_DIRECTORY))
1713 errno = EISDIR;
1714 else if (!_wrmdir(wpnew))
1715 goto repeat;
1716 return -1;
1717 }
1718 if ((attrs & FILE_ATTRIBUTE_READONLY) &&
1719 SetFileAttributesW(wpnew, attrs & ~FILE_ATTRIBUTE_READONLY)) {
1720 if (MoveFileExW(wpold, wpnew, MOVEFILE_REPLACE_EXISTING))
1721 return 0;
1722 gle = GetLastError();
1723 /* revert file attributes on failure */
1724 SetFileAttributesW(wpnew, attrs);
1725 }
1726 }
1727 if (tries < ARRAY_SIZE(delay) && gle == ERROR_ACCESS_DENIED) {
1728 /*
1729 * We assume that some other process had the source or
1730 * destination file open at the wrong moment and retry.
1731 * In order to give the other process a higher chance to
1732 * complete its operation, we give up our time slice now.
1733 * If we have to retry again, we do sleep a bit.
1734 */
1735 Sleep(delay[tries]);
1736 tries++;
1737 goto repeat;
1738 }
1739 if (gle == ERROR_ACCESS_DENIED &&
1740 ask_yes_no_if_possible("Rename from '%s' to '%s' failed. "
1741 "Should I try again?", pold, pnew))
1742 goto repeat;
1743
1744 errno = EACCES;
1745 return -1;
1746 }
1747
1748 /*
1749 * Note that this doesn't return the actual pagesize, but
1750 * the allocation granularity. If future Windows specific git code
1751 * needs the real getpagesize function, we need to find another solution.
1752 */
1753 int mingw_getpagesize(void)
1754 {
1755 SYSTEM_INFO si;
1756 GetSystemInfo(&si);
1757 return si.dwAllocationGranularity;
1758 }
1759
1760 struct passwd *getpwuid(int uid)
1761 {
1762 static char user_name[100];
1763 static struct passwd p;
1764
1765 DWORD len = sizeof(user_name);
1766 if (!GetUserName(user_name, &len))
1767 return NULL;
1768 p.pw_name = user_name;
1769 p.pw_gecos = "unknown";
1770 p.pw_dir = NULL;
1771 return &p;
1772 }
1773
1774 static HANDLE timer_event;
1775 static HANDLE timer_thread;
1776 static int timer_interval;
1777 static int one_shot;
1778 static sig_handler_t timer_fn = SIG_DFL, sigint_fn = SIG_DFL;
1779
1780 /* The timer works like this:
1781 * The thread, ticktack(), is a trivial routine that most of the time
1782 * only waits to receive the signal to terminate. The main thread tells
1783 * the thread to terminate by setting the timer_event to the signalled
1784 * state.
1785 * But ticktack() interrupts the wait state after the timer's interval
1786 * length to call the signal handler.
1787 */
1788
1789 static unsigned __stdcall ticktack(void *dummy)
1790 {
1791 while (WaitForSingleObject(timer_event, timer_interval) == WAIT_TIMEOUT) {
1792 mingw_raise(SIGALRM);
1793 if (one_shot)
1794 break;
1795 }
1796 return 0;
1797 }
1798
1799 static int start_timer_thread(void)
1800 {
1801 timer_event = CreateEvent(NULL, FALSE, FALSE, NULL);
1802 if (timer_event) {
1803 timer_thread = (HANDLE) _beginthreadex(NULL, 0, ticktack, NULL, 0, NULL);
1804 if (!timer_thread )
1805 return errno = ENOMEM,
1806 error("cannot start timer thread");
1807 } else
1808 return errno = ENOMEM,
1809 error("cannot allocate resources for timer");
1810 return 0;
1811 }
1812
1813 static void stop_timer_thread(void)
1814 {
1815 if (timer_event)
1816 SetEvent(timer_event); /* tell thread to terminate */
1817 if (timer_thread) {
1818 int rc = WaitForSingleObject(timer_thread, 1000);
1819 if (rc == WAIT_TIMEOUT)
1820 error("timer thread did not terminate timely");
1821 else if (rc != WAIT_OBJECT_0)
1822 error("waiting for timer thread failed: %lu",
1823 GetLastError());
1824 CloseHandle(timer_thread);
1825 }
1826 if (timer_event)
1827 CloseHandle(timer_event);
1828 timer_event = NULL;
1829 timer_thread = NULL;
1830 }
1831
1832 static inline int is_timeval_eq(const struct timeval *i1, const struct timeval *i2)
1833 {
1834 return i1->tv_sec == i2->tv_sec && i1->tv_usec == i2->tv_usec;
1835 }
1836
1837 int setitimer(int type, struct itimerval *in, struct itimerval *out)
1838 {
1839 static const struct timeval zero;
1840 static int atexit_done;
1841
1842 if (out != NULL)
1843 return errno = EINVAL,
1844 error("setitimer param 3 != NULL not implemented");
1845 if (!is_timeval_eq(&in->it_interval, &zero) &&
1846 !is_timeval_eq(&in->it_interval, &in->it_value))
1847 return errno = EINVAL,
1848 error("setitimer: it_interval must be zero or eq it_value");
1849
1850 if (timer_thread)
1851 stop_timer_thread();
1852
1853 if (is_timeval_eq(&in->it_value, &zero) &&
1854 is_timeval_eq(&in->it_interval, &zero))
1855 return 0;
1856
1857 timer_interval = in->it_value.tv_sec * 1000 + in->it_value.tv_usec / 1000;
1858 one_shot = is_timeval_eq(&in->it_interval, &zero);
1859 if (!atexit_done) {
1860 atexit(stop_timer_thread);
1861 atexit_done = 1;
1862 }
1863 return start_timer_thread();
1864 }
1865
1866 int sigaction(int sig, struct sigaction *in, struct sigaction *out)
1867 {
1868 if (sig != SIGALRM)
1869 return errno = EINVAL,
1870 error("sigaction only implemented for SIGALRM");
1871 if (out != NULL)
1872 return errno = EINVAL,
1873 error("sigaction: param 3 != NULL not implemented");
1874
1875 timer_fn = in->sa_handler;
1876 return 0;
1877 }
1878
1879 #undef signal
1880 sig_handler_t mingw_signal(int sig, sig_handler_t handler)
1881 {
1882 sig_handler_t old;
1883
1884 switch (sig) {
1885 case SIGALRM:
1886 old = timer_fn;
1887 timer_fn = handler;
1888 break;
1889
1890 case SIGINT:
1891 old = sigint_fn;
1892 sigint_fn = handler;
1893 break;
1894
1895 default:
1896 return signal(sig, handler);
1897 }
1898
1899 return old;
1900 }
1901
1902 #undef raise
1903 int mingw_raise(int sig)
1904 {
1905 switch (sig) {
1906 case SIGALRM:
1907 if (timer_fn == SIG_DFL) {
1908 if (isatty(STDERR_FILENO))
1909 fputs("Alarm clock\n", stderr);
1910 exit(128 + SIGALRM);
1911 } else if (timer_fn != SIG_IGN)
1912 timer_fn(SIGALRM);
1913 return 0;
1914
1915 case SIGINT:
1916 if (sigint_fn == SIG_DFL)
1917 exit(128 + SIGINT);
1918 else if (sigint_fn != SIG_IGN)
1919 sigint_fn(SIGINT);
1920 return 0;
1921
1922 default:
1923 return raise(sig);
1924 }
1925 }
1926
1927 int link(const char *oldpath, const char *newpath)
1928 {
1929 typedef BOOL (WINAPI *T)(LPCWSTR, LPCWSTR, LPSECURITY_ATTRIBUTES);
1930 static T create_hard_link = NULL;
1931 wchar_t woldpath[MAX_PATH], wnewpath[MAX_PATH];
1932 if (xutftowcs_path(woldpath, oldpath) < 0 ||
1933 xutftowcs_path(wnewpath, newpath) < 0)
1934 return -1;
1935
1936 if (!create_hard_link) {
1937 create_hard_link = (T) GetProcAddress(
1938 GetModuleHandle("kernel32.dll"), "CreateHardLinkW");
1939 if (!create_hard_link)
1940 create_hard_link = (T)-1;
1941 }
1942 if (create_hard_link == (T)-1) {
1943 errno = ENOSYS;
1944 return -1;
1945 }
1946 if (!create_hard_link(wnewpath, woldpath, NULL)) {
1947 errno = err_win_to_posix(GetLastError());
1948 return -1;
1949 }
1950 return 0;
1951 }
1952
1953 pid_t waitpid(pid_t pid, int *status, int options)
1954 {
1955 HANDLE h = OpenProcess(SYNCHRONIZE | PROCESS_QUERY_INFORMATION,
1956 FALSE, pid);
1957 if (!h) {
1958 errno = ECHILD;
1959 return -1;
1960 }
1961
1962 if (pid > 0 && options & WNOHANG) {
1963 if (WAIT_OBJECT_0 != WaitForSingleObject(h, 0)) {
1964 CloseHandle(h);
1965 return 0;
1966 }
1967 options &= ~WNOHANG;
1968 }
1969
1970 if (options == 0) {
1971 struct pinfo_t **ppinfo;
1972 if (WaitForSingleObject(h, INFINITE) != WAIT_OBJECT_0) {
1973 CloseHandle(h);
1974 return 0;
1975 }
1976
1977 if (status)
1978 GetExitCodeProcess(h, (LPDWORD)status);
1979
1980 EnterCriticalSection(&pinfo_cs);
1981
1982 ppinfo = &pinfo;
1983 while (*ppinfo) {
1984 struct pinfo_t *info = *ppinfo;
1985 if (info->pid == pid) {
1986 CloseHandle(info->proc);
1987 *ppinfo = info->next;
1988 free(info);
1989 break;
1990 }
1991 ppinfo = &info->next;
1992 }
1993
1994 LeaveCriticalSection(&pinfo_cs);
1995
1996 CloseHandle(h);
1997 return pid;
1998 }
1999 CloseHandle(h);
2000
2001 errno = EINVAL;
2002 return -1;
2003 }
2004
2005 int mingw_has_dos_drive_prefix(const char *path)
2006 {
2007 int i;
2008
2009 /*
2010 * Does it start with an ASCII letter (i.e. highest bit not set),
2011 * followed by a colon?
2012 */
2013 if (!(0x80 & (unsigned char)*path))
2014 return *path && path[1] == ':' ? 2 : 0;
2015
2016 /*
2017 * While drive letters must be letters of the English alphabet, it is
2018 * possible to assign virtually _any_ Unicode character via `subst` as
2019 * a drive letter to "virtual drives". Even `1`, or `ä`. Or fun stuff
2020 * like this:
2021 *
2022 * subst ֍: %USERPROFILE%\Desktop
2023 */
2024 for (i = 1; i < 4 && (0x80 & (unsigned char)path[i]); i++)
2025 ; /* skip first UTF-8 character */
2026 return path[i] == ':' ? i + 1 : 0;
2027 }
2028
2029 int mingw_skip_dos_drive_prefix(char **path)
2030 {
2031 int ret = has_dos_drive_prefix(*path);
2032 *path += ret;
2033 return ret;
2034 }
2035
2036 int mingw_offset_1st_component(const char *path)
2037 {
2038 char *pos = (char *)path;
2039
2040 /* unc paths */
2041 if (!skip_dos_drive_prefix(&pos) &&
2042 is_dir_sep(pos[0]) && is_dir_sep(pos[1])) {
2043 /* skip server name */
2044 pos = strpbrk(pos + 2, "\\/");
2045 if (!pos)
2046 return 0; /* Error: malformed unc path */
2047
2048 do {
2049 pos++;
2050 } while (*pos && !is_dir_sep(*pos));
2051 }
2052
2053 return pos + is_dir_sep(*pos) - path;
2054 }
2055
2056 int xutftowcsn(wchar_t *wcs, const char *utfs, size_t wcslen, int utflen)
2057 {
2058 int upos = 0, wpos = 0;
2059 const unsigned char *utf = (const unsigned char*) utfs;
2060 if (!utf || !wcs || wcslen < 1) {
2061 errno = EINVAL;
2062 return -1;
2063 }
2064 /* reserve space for \0 */
2065 wcslen--;
2066 if (utflen < 0)
2067 utflen = INT_MAX;
2068
2069 while (upos < utflen) {
2070 int c = utf[upos++] & 0xff;
2071 if (utflen == INT_MAX && c == 0)
2072 break;
2073
2074 if (wpos >= wcslen) {
2075 wcs[wpos] = 0;
2076 errno = ERANGE;
2077 return -1;
2078 }
2079
2080 if (c < 0x80) {
2081 /* ASCII */
2082 wcs[wpos++] = c;
2083 } else if (c >= 0xc2 && c < 0xe0 && upos < utflen &&
2084 (utf[upos] & 0xc0) == 0x80) {
2085 /* 2-byte utf-8 */
2086 c = ((c & 0x1f) << 6);
2087 c |= (utf[upos++] & 0x3f);
2088 wcs[wpos++] = c;
2089 } else if (c >= 0xe0 && c < 0xf0 && upos + 1 < utflen &&
2090 !(c == 0xe0 && utf[upos] < 0xa0) && /* over-long encoding */
2091 (utf[upos] & 0xc0) == 0x80 &&
2092 (utf[upos + 1] & 0xc0) == 0x80) {
2093 /* 3-byte utf-8 */
2094 c = ((c & 0x0f) << 12);
2095 c |= ((utf[upos++] & 0x3f) << 6);
2096 c |= (utf[upos++] & 0x3f);
2097 wcs[wpos++] = c;
2098 } else if (c >= 0xf0 && c < 0xf5 && upos + 2 < utflen &&
2099 wpos + 1 < wcslen &&
2100 !(c == 0xf0 && utf[upos] < 0x90) && /* over-long encoding */
2101 !(c == 0xf4 && utf[upos] >= 0x90) && /* > \u10ffff */
2102 (utf[upos] & 0xc0) == 0x80 &&
2103 (utf[upos + 1] & 0xc0) == 0x80 &&
2104 (utf[upos + 2] & 0xc0) == 0x80) {
2105 /* 4-byte utf-8: convert to \ud8xx \udcxx surrogate pair */
2106 c = ((c & 0x07) << 18);
2107 c |= ((utf[upos++] & 0x3f) << 12);
2108 c |= ((utf[upos++] & 0x3f) << 6);
2109 c |= (utf[upos++] & 0x3f);
2110 c -= 0x10000;
2111 wcs[wpos++] = 0xd800 | (c >> 10);
2112 wcs[wpos++] = 0xdc00 | (c & 0x3ff);
2113 } else if (c >= 0xa0) {
2114 /* invalid utf-8 byte, printable unicode char: convert 1:1 */
2115 wcs[wpos++] = c;
2116 } else {
2117 /* invalid utf-8 byte, non-printable unicode: convert to hex */
2118 static const char *hex = "0123456789abcdef";
2119 wcs[wpos++] = hex[c >> 4];
2120 if (wpos < wcslen)
2121 wcs[wpos++] = hex[c & 0x0f];
2122 }
2123 }
2124 wcs[wpos] = 0;
2125 return wpos;
2126 }
2127
2128 int xwcstoutf(char *utf, const wchar_t *wcs, size_t utflen)
2129 {
2130 if (!wcs || !utf || utflen < 1) {
2131 errno = EINVAL;
2132 return -1;
2133 }
2134 utflen = WideCharToMultiByte(CP_UTF8, 0, wcs, -1, utf, utflen, NULL, NULL);
2135 if (utflen)
2136 return utflen - 1;
2137 errno = ERANGE;
2138 return -1;
2139 }
2140
2141 static void setup_windows_environment(void)
2142 {
2143 char *tmp = getenv("TMPDIR");
2144
2145 /* on Windows it is TMP and TEMP */
2146 if (!tmp) {
2147 if (!(tmp = getenv("TMP")))
2148 tmp = getenv("TEMP");
2149 if (tmp) {
2150 setenv("TMPDIR", tmp, 1);
2151 tmp = getenv("TMPDIR");
2152 }
2153 }
2154
2155 if (tmp) {
2156 /*
2157 * Convert all dir separators to forward slashes,
2158 * to help shell commands called from the Git
2159 * executable (by not mistaking the dir separators
2160 * for escape characters).
2161 */
2162 convert_slashes(tmp);
2163 }
2164
2165 /* simulate TERM to enable auto-color (see color.c) */
2166 if (!getenv("TERM"))
2167 setenv("TERM", "cygwin", 1);
2168 }
2169
2170 int is_valid_win32_path(const char *path)
2171 {
2172 int preceding_space_or_period = 0, i = 0, periods = 0;
2173
2174 if (!protect_ntfs)
2175 return 1;
2176
2177 skip_dos_drive_prefix((char **)&path);
2178
2179 for (;;) {
2180 char c = *(path++);
2181 switch (c) {
2182 case '\0':
2183 case '/': case '\\':
2184 /* cannot end in ` ` or `.`, except for `.` and `..` */
2185 if (preceding_space_or_period &&
2186 (i != periods || periods > 2))
2187 return 0;
2188 if (!c)
2189 return 1;
2190
2191 i = periods = preceding_space_or_period = 0;
2192 continue;
2193 case '.':
2194 periods++;
2195 /* fallthru */
2196 case ' ':
2197 preceding_space_or_period = 1;
2198 i++;
2199 continue;
2200 case ':': /* DOS drive prefix was already skipped */
2201 case '<': case '>': case '"': case '|': case '?': case '*':
2202 /* illegal character */
2203 return 0;
2204 default:
2205 if (c > '\0' && c < '\x20')
2206 /* illegal character */
2207 return 0;
2208 }
2209 preceding_space_or_period = 0;
2210 i++;
2211 }
2212 }
2213
2214 /*
2215 * Disable MSVCRT command line wildcard expansion (__getmainargs called from
2216 * mingw startup code, see init.c in mingw runtime).
2217 */
2218 int _CRT_glob = 0;
2219
2220 typedef struct {
2221 int newmode;
2222 } _startupinfo;
2223
2224 extern int __wgetmainargs(int *argc, wchar_t ***argv, wchar_t ***env, int glob,
2225 _startupinfo *si);
2226
2227 static NORETURN void die_startup(void)
2228 {
2229 fputs("fatal: not enough memory for initialization", stderr);
2230 exit(128);
2231 }
2232
2233 static void *malloc_startup(size_t size)
2234 {
2235 void *result = malloc(size);
2236 if (!result)
2237 die_startup();
2238 return result;
2239 }
2240
2241 static char *wcstoutfdup_startup(char *buffer, const wchar_t *wcs, size_t len)
2242 {
2243 len = xwcstoutf(buffer, wcs, len) + 1;
2244 return memcpy(malloc_startup(len), buffer, len);
2245 }
2246
2247 static void maybe_redirect_std_handle(const wchar_t *key, DWORD std_id, int fd,
2248 DWORD desired_access, DWORD flags)
2249 {
2250 DWORD create_flag = fd ? OPEN_ALWAYS : OPEN_EXISTING;
2251 wchar_t buf[MAX_PATH];
2252 DWORD max = ARRAY_SIZE(buf);
2253 HANDLE handle;
2254 DWORD ret = GetEnvironmentVariableW(key, buf, max);
2255
2256 if (!ret || ret >= max)
2257 return;
2258
2259 /* make sure this does not leak into child processes */
2260 SetEnvironmentVariableW(key, NULL);
2261 if (!wcscmp(buf, L"off")) {
2262 close(fd);
2263 handle = GetStdHandle(std_id);
2264 if (handle != INVALID_HANDLE_VALUE)
2265 CloseHandle(handle);
2266 return;
2267 }
2268 if (std_id == STD_ERROR_HANDLE && !wcscmp(buf, L"2>&1")) {
2269 handle = GetStdHandle(STD_OUTPUT_HANDLE);
2270 if (handle == INVALID_HANDLE_VALUE) {
2271 close(fd);
2272 handle = GetStdHandle(std_id);
2273 if (handle != INVALID_HANDLE_VALUE)
2274 CloseHandle(handle);
2275 } else {
2276 int new_fd = _open_osfhandle((intptr_t)handle, O_BINARY);
2277 SetStdHandle(std_id, handle);
2278 dup2(new_fd, fd);
2279 /* do *not* close the new_fd: that would close stdout */
2280 }
2281 return;
2282 }
2283 handle = CreateFileW(buf, desired_access, 0, NULL, create_flag,
2284 flags, NULL);
2285 if (handle != INVALID_HANDLE_VALUE) {
2286 int new_fd = _open_osfhandle((intptr_t)handle, O_BINARY);
2287 SetStdHandle(std_id, handle);
2288 dup2(new_fd, fd);
2289 close(new_fd);
2290 }
2291 }
2292
2293 static void maybe_redirect_std_handles(void)
2294 {
2295 maybe_redirect_std_handle(L"GIT_REDIRECT_STDIN", STD_INPUT_HANDLE, 0,
2296 GENERIC_READ, FILE_ATTRIBUTE_NORMAL);
2297 maybe_redirect_std_handle(L"GIT_REDIRECT_STDOUT", STD_OUTPUT_HANDLE, 1,
2298 GENERIC_WRITE, FILE_ATTRIBUTE_NORMAL);
2299 maybe_redirect_std_handle(L"GIT_REDIRECT_STDERR", STD_ERROR_HANDLE, 2,
2300 GENERIC_WRITE, FILE_FLAG_NO_BUFFERING);
2301 }
2302
2303 void mingw_startup(void)
2304 {
2305 int i, maxlen, argc;
2306 char *buffer;
2307 wchar_t **wenv, **wargv;
2308 _startupinfo si;
2309
2310 maybe_redirect_std_handles();
2311
2312 /* get wide char arguments and environment */
2313 si.newmode = 0;
2314 if (__wgetmainargs(&argc, &wargv, &wenv, _CRT_glob, &si) < 0)
2315 die_startup();
2316
2317 /* determine size of argv and environ conversion buffer */
2318 maxlen = wcslen(wargv[0]);
2319 for (i = 1; i < argc; i++)
2320 maxlen = max(maxlen, wcslen(wargv[i]));
2321 for (i = 0; wenv[i]; i++)
2322 maxlen = max(maxlen, wcslen(wenv[i]));
2323
2324 /*
2325 * nedmalloc can't free CRT memory, allocate resizable environment
2326 * list. Note that xmalloc / xmemdupz etc. call getenv, so we cannot
2327 * use it while initializing the environment itself.
2328 */
2329 environ_size = i + 1;
2330 environ_alloc = alloc_nr(environ_size * sizeof(char*));
2331 environ = malloc_startup(environ_alloc);
2332
2333 /* allocate buffer (wchar_t encodes to max 3 UTF-8 bytes) */
2334 maxlen = 3 * maxlen + 1;
2335 buffer = malloc_startup(maxlen);
2336
2337 /* convert command line arguments and environment to UTF-8 */
2338 for (i = 0; i < argc; i++)
2339 __argv[i] = wcstoutfdup_startup(buffer, wargv[i], maxlen);
2340 for (i = 0; wenv[i]; i++)
2341 environ[i] = wcstoutfdup_startup(buffer, wenv[i], maxlen);
2342 environ[i] = NULL;
2343 free(buffer);
2344
2345 /* sort environment for O(log n) getenv / putenv */
2346 qsort(environ, i, sizeof(char*), compareenv);
2347
2348 /* fix Windows specific environment settings */
2349 setup_windows_environment();
2350
2351 /* initialize critical section for waitpid pinfo_t list */
2352 InitializeCriticalSection(&pinfo_cs);
2353
2354 /* set up default file mode and file modes for stdin/out/err */
2355 _fmode = _O_BINARY;
2356 _setmode(_fileno(stdin), _O_BINARY);
2357 _setmode(_fileno(stdout), _O_BINARY);
2358 _setmode(_fileno(stderr), _O_BINARY);
2359
2360 /* initialize Unicode console */
2361 winansi_init();
2362 }
2363
2364 int uname(struct utsname *buf)
2365 {
2366 unsigned v = (unsigned)GetVersion();
2367 memset(buf, 0, sizeof(*buf));
2368 xsnprintf(buf->sysname, sizeof(buf->sysname), "Windows");
2369 xsnprintf(buf->release, sizeof(buf->release),
2370 "%u.%u", v & 0xff, (v >> 8) & 0xff);
2371 /* assuming NT variants only.. */
2372 xsnprintf(buf->version, sizeof(buf->version),
2373 "%u", (v >> 16) & 0x7fff);
2374 return 0;
2375 }