mirror of
https://github.com/jart/cosmopolitan.git
synced 2025-02-07 15:03:34 +00:00
791f79fcb3
- We now serialize the file descriptor table when spawning / executing processes on Windows. This means you can now inherit more stuff than just standard i/o. It's needed by bash, which duplicates the console to file descriptor #255. We also now do a better job serializing the environment variables, so you're less likely to encounter E2BIG when using your bash shell. We also no longer coerce environ to uppercase - execve() on Windows now remotely controls its parent process to make them spawn a replacement for itself. Then it'll be able to terminate immediately once the spawn succeeds, without having to linger around for the lifetime as a shell process for proxying the exit code. When process worker thread running in the parent sees the child die, it's given a handle to the new child, to replace it in the process table. - execve() and posix_spawn() on Windows will now provide CreateProcess an explicit handle list. This allows us to remove handle locks which enables better fork/spawn concurrency, with seriously correct thread safety. Other codebases like Go use the same technique. On the other hand fork() still favors the conventional WIN32 inheritence approach which can be a little bit messy, but is *controlled* by guaranteeing perfectly clean slates at both the spawning and execution boundaries - sigset_t is now 64 bits. Having it be 128 bits was a mistake because there's no reason to use that and it's only supported by FreeBSD. By using the system word size, signal mask manipulation on Windows goes very fast. Furthermore @asyncsignalsafe funcs have been rewritten on Windows to take advantage of signal masking, now that it's much more pleasant to use. - All the overlapped i/o code on Windows has been rewritten for pretty good signal and cancelation safety. We're now able to ensure overlap data structures are cleaned up so long as you don't longjmp() out of out of a signal handler that interrupted an i/o operation. Latencies are also improved thanks to the removal of lots of "busy wait" code. Waits should be optimal for everything except poll(), which shall be the last and final demon we slay in the win32 i/o horror show. - getrusage() on Windows is now able to report RUSAGE_CHILDREN as well as RUSAGE_SELF, thanks to aggregation in the process manager thread.
423 lines
15 KiB
C
423 lines
15 KiB
C
/*-*- mode:c;indent-tabs-mode:nil;c-basic-offset:2;tab-width:8;coding:utf-8 -*-│
|
|
│vi: set net ft=c ts=2 sts=2 sw=2 fenc=utf-8 :vi│
|
|
╞══════════════════════════════════════════════════════════════════════════════╡
|
|
│ Copyright 2020 Justine Alexandra Roberts Tunney │
|
|
│ │
|
|
│ Permission to use, copy, modify, and/or distribute this software for │
|
|
│ any purpose with or without fee is hereby granted, provided that the │
|
|
│ above copyright notice and this permission notice appear in all copies. │
|
|
│ │
|
|
│ THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL │
|
|
│ WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED │
|
|
│ WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE │
|
|
│ AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL │
|
|
│ DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR │
|
|
│ PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER │
|
|
│ TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR │
|
|
│ PERFORMANCE OF THIS SOFTWARE. │
|
|
╚─────────────────────────────────────────────────────────────────────────────*/
|
|
#include "libc/assert.h"
|
|
#include "libc/calls/internal.h"
|
|
#include "libc/calls/sig.internal.h"
|
|
#include "libc/calls/state.internal.h"
|
|
#include "libc/calls/struct/fd.internal.h"
|
|
#include "libc/calls/syscall_support-nt.internal.h"
|
|
#include "libc/calls/wincrash.internal.h"
|
|
#include "libc/errno.h"
|
|
#include "libc/fmt/itoa.h"
|
|
#include "libc/intrin/atomic.h"
|
|
#include "libc/intrin/directmap.internal.h"
|
|
#include "libc/intrin/dll.h"
|
|
#include "libc/intrin/kprintf.h"
|
|
#include "libc/intrin/strace.internal.h"
|
|
#include "libc/intrin/weaken.h"
|
|
#include "libc/macros.internal.h"
|
|
#include "libc/mem/mem.h"
|
|
#include "libc/nt/console.h"
|
|
#include "libc/nt/createfile.h"
|
|
#include "libc/nt/enum/accessmask.h"
|
|
#include "libc/nt/enum/creationdisposition.h"
|
|
#include "libc/nt/enum/filemapflags.h"
|
|
#include "libc/nt/enum/pageflags.h"
|
|
#include "libc/nt/enum/startf.h"
|
|
#include "libc/nt/errors.h"
|
|
#include "libc/nt/files.h"
|
|
#include "libc/nt/ipc.h"
|
|
#include "libc/nt/memory.h"
|
|
#include "libc/nt/process.h"
|
|
#include "libc/nt/runtime.h"
|
|
#include "libc/nt/signals.h"
|
|
#include "libc/nt/struct/ntexceptionpointers.h"
|
|
#include "libc/nt/synchronization.h"
|
|
#include "libc/nt/thread.h"
|
|
#include "libc/nt/thunk/msabi.h"
|
|
#include "libc/proc/describefds.internal.h"
|
|
#include "libc/proc/ntspawn.h"
|
|
#include "libc/proc/proc.internal.h"
|
|
#include "libc/runtime/internal.h"
|
|
#include "libc/runtime/memtrack.internal.h"
|
|
#include "libc/runtime/symbols.internal.h"
|
|
#include "libc/str/str.h"
|
|
#include "libc/sysv/consts/limits.h"
|
|
#include "libc/sysv/consts/map.h"
|
|
#include "libc/sysv/consts/prot.h"
|
|
#include "libc/sysv/consts/sig.h"
|
|
#include "libc/sysv/errfuns.h"
|
|
#include "libc/thread/itimer.internal.h"
|
|
#include "libc/thread/posixthread.internal.h"
|
|
#include "libc/thread/tls.h"
|
|
|
|
#ifdef __x86_64__
|
|
|
|
extern int64_t __wincrashearly;
|
|
void __keystroke_wipe(void);
|
|
|
|
static textwindows wontreturn void AbortFork(const char *func) {
|
|
#ifdef SYSDEBUG
|
|
kprintf("fork() %s() failed with win32 error %d\n", func, GetLastError());
|
|
#endif
|
|
TerminateThisProcess(SIGSTKFLT);
|
|
}
|
|
|
|
static textwindows char16_t *ParseInt(char16_t *p, int64_t *x) {
|
|
*x = 0;
|
|
while (*p == ' ') p++;
|
|
while ('0' <= *p && *p <= '9') {
|
|
*x *= 10;
|
|
*x += *p++ - '0';
|
|
}
|
|
return p;
|
|
}
|
|
|
|
static inline textwindows ssize_t ForkIo(int64_t h, char *p, size_t n,
|
|
bool32 (*f)()) {
|
|
size_t i;
|
|
uint32_t x;
|
|
for (i = 0; i < n; i += x) {
|
|
if (!f(h, p + i, n - i, &x, NULL)) {
|
|
return __winerr();
|
|
}
|
|
}
|
|
return i;
|
|
}
|
|
|
|
static dontinline textwindows bool ForkIo2(int64_t h, void *buf, size_t n,
|
|
bool32 (*fn)(), const char *sf,
|
|
bool ischild) {
|
|
ssize_t rc = ForkIo(h, buf, n, fn);
|
|
if (ischild) __tls_enabled_set(false); // prevent tls crash in kprintf
|
|
NTTRACE("%s(%ld, %p, %'zu) → %'zd% m", sf, h, buf, n, rc);
|
|
return rc != -1;
|
|
}
|
|
|
|
static dontinline textwindows bool WriteAll(int64_t h, void *buf, size_t n) {
|
|
bool ok;
|
|
ok = ForkIo2(h, buf, n, WriteFile, "WriteFile", false);
|
|
#ifndef NDEBUG
|
|
if (ok) ok = ForkIo2(h, &n, sizeof(n), WriteFile, "WriteFile", false);
|
|
#endif
|
|
#ifdef SYSDEBUG
|
|
if (!ok) {
|
|
kprintf("failed to write %zu bytes to forked child: %d\n", n,
|
|
GetLastError());
|
|
}
|
|
#endif
|
|
// Sleep(10);
|
|
return ok;
|
|
}
|
|
|
|
static textwindows dontinline void ReadOrDie(int64_t h, void *buf, size_t n) {
|
|
if (!ForkIo2(h, buf, n, ReadFile, "ReadFile", true)) {
|
|
AbortFork("ReadFile1");
|
|
}
|
|
#ifndef NDEBUG
|
|
size_t got;
|
|
if (!ForkIo2(h, &got, sizeof(got), ReadFile, "ReadFile", true)) {
|
|
AbortFork("ReadFile2");
|
|
}
|
|
if (got != n) {
|
|
AbortFork("ReadFile_SIZE_CHECK");
|
|
}
|
|
#endif
|
|
}
|
|
|
|
static textwindows int64_t MapOrDie(uint32_t prot, uint64_t size) {
|
|
int64_t h;
|
|
for (;;) {
|
|
if ((h = CreateFileMapping(-1, 0, prot, size >> 32, size, 0))) {
|
|
return h;
|
|
}
|
|
if (GetLastError() == kNtErrorAccessDenied) {
|
|
switch (prot) {
|
|
case kNtPageExecuteWritecopy:
|
|
prot = kNtPageWritecopy;
|
|
continue;
|
|
case kNtPageExecuteReadwrite:
|
|
prot = kNtPageReadwrite;
|
|
continue;
|
|
case kNtPageExecuteRead:
|
|
prot = kNtPageReadonly;
|
|
continue;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
AbortFork("MapOrDie");
|
|
}
|
|
}
|
|
|
|
static textwindows void ViewOrDie(int64_t h, uint32_t access, size_t pos,
|
|
size_t size, void *base) {
|
|
TryAgain:
|
|
if (!MapViewOfFileEx(h, access, pos >> 32, pos, size, base)) {
|
|
if ((access & kNtFileMapExecute) &&
|
|
GetLastError() == kNtErrorAccessDenied) {
|
|
access &= ~kNtFileMapExecute;
|
|
goto TryAgain;
|
|
}
|
|
AbortFork("ViewOrDie");
|
|
}
|
|
}
|
|
|
|
static __msabi textwindows int OnForkCrash(struct NtExceptionPointers *ep) {
|
|
kprintf("error: fork() child crashed!%n"
|
|
"\tExceptionCode = %#x%n"
|
|
"\tRip = %x%n",
|
|
ep->ExceptionRecord->ExceptionCode,
|
|
ep->ContextRecord ? ep->ContextRecord->Rip : -1);
|
|
TerminateThisProcess(SIGSTKFLT);
|
|
}
|
|
|
|
textwindows void WinMainForked(void) {
|
|
jmp_buf jb;
|
|
int64_t reader;
|
|
int64_t savetsc;
|
|
char *addr, *shad;
|
|
uint64_t size, upsize;
|
|
struct MemoryInterval *maps;
|
|
char16_t fvar[21 + 1 + 21 + 1];
|
|
uint32_t i, varlen, oldprot, savepid;
|
|
long mapcount, mapcapacity, specialz;
|
|
struct Fds *fds = __veil("r", &g_fds);
|
|
|
|
// check to see if the process was actually forked
|
|
// this variable should have the pipe handle numba
|
|
varlen = GetEnvironmentVariable(u"_FORK", fvar, ARRAYLEN(fvar));
|
|
if (!varlen || varlen >= ARRAYLEN(fvar)) return;
|
|
NTTRACE("WinMainForked()");
|
|
SetEnvironmentVariable(u"_FORK", NULL);
|
|
#ifdef SYSDEBUG
|
|
int64_t oncrash = AddVectoredExceptionHandler(1, (void *)OnForkCrash);
|
|
#endif
|
|
ParseInt(fvar, &reader);
|
|
|
|
// read the cpu state from the parent process & plus
|
|
// read the list of mappings from the parent process
|
|
// this is stored in a special secretive memory map!
|
|
// read ExtendMemoryIntervals for further details :|
|
|
maps = (void *)kMemtrackStart;
|
|
ReadOrDie(reader, jb, sizeof(jb));
|
|
ReadOrDie(reader, &mapcount, sizeof(_mmi.i));
|
|
ReadOrDie(reader, &mapcapacity, sizeof(_mmi.n));
|
|
specialz = ROUNDUP(mapcapacity * sizeof(_mmi.p[0]), kMemtrackGran);
|
|
ViewOrDie(MapOrDie(kNtPageReadwrite, specialz), kNtFileMapWrite, 0, specialz,
|
|
maps);
|
|
ReadOrDie(reader, maps, mapcount * sizeof(_mmi.p[0]));
|
|
if (IsAsan()) {
|
|
shad = (char *)(((intptr_t)maps >> 3) + 0x7fff8000);
|
|
size = ROUNDUP(specialz >> 3, FRAMESIZE);
|
|
ViewOrDie(MapOrDie(kNtPageReadwrite, size), kNtFileMapWrite, 0, size, shad);
|
|
ReadOrDie(reader, shad, (mapcount * sizeof(_mmi.p[0])) >> 3);
|
|
}
|
|
|
|
// read the heap mappings from the parent process
|
|
for (i = 0; i < mapcount; ++i) {
|
|
addr = (char *)((uint64_t)maps[i].x << 16);
|
|
size = maps[i].size;
|
|
if ((maps[i].flags & MAP_TYPE) != MAP_SHARED) {
|
|
upsize = ROUNDUP(size, FRAMESIZE);
|
|
// we don't need to close the map handle because sys_mmap_nt
|
|
// doesn't mark it inheritable across fork() for MAP_PRIVATE
|
|
ViewOrDie((maps[i].h = MapOrDie(kNtPageExecuteReadwrite, upsize)),
|
|
kNtFileMapWrite | kNtFileMapExecute, 0, upsize, addr);
|
|
ReadOrDie(reader, addr, size);
|
|
} else {
|
|
// we can however safely inherit MAP_SHARED with zero copy
|
|
ViewOrDie(maps[i].h,
|
|
maps[i].readonlyfile ? kNtFileMapRead | kNtFileMapExecute
|
|
: kNtFileMapWrite | kNtFileMapExecute,
|
|
maps[i].offset, size, addr);
|
|
}
|
|
}
|
|
|
|
// read the .data and .bss program image sections
|
|
savepid = __pid;
|
|
savetsc = kStartTsc;
|
|
ReadOrDie(reader, __data_start, __data_end - __data_start);
|
|
ReadOrDie(reader, __bss_start, __bss_end - __bss_start);
|
|
__pid = savepid;
|
|
kStartTsc = savetsc;
|
|
__threaded = false;
|
|
__tls_index = 0;
|
|
__tls_enabled_set(false);
|
|
|
|
// apply fixups and reapply memory protections
|
|
_mmi.p = maps;
|
|
_mmi.n = specialz / sizeof(_mmi.p[0]);
|
|
for (i = 0; i < mapcount; ++i) {
|
|
if (!VirtualProtect((void *)((uint64_t)maps[i].x << 16), maps[i].size,
|
|
__prot2nt(maps[i].prot, maps[i].iscow), &oldprot)) {
|
|
AbortFork("VirtualProtect");
|
|
}
|
|
}
|
|
|
|
// mitosis complete
|
|
if (!CloseHandle(reader)) {
|
|
AbortFork("CloseHandle");
|
|
}
|
|
|
|
// rewrap the stdin named pipe hack
|
|
// since the handles closed on fork
|
|
fds->p[0].handle = GetStdHandle(kNtStdInputHandle);
|
|
fds->p[1].handle = GetStdHandle(kNtStdOutputHandle);
|
|
fds->p[2].handle = GetStdHandle(kNtStdErrorHandle);
|
|
|
|
// restore the crash reporting stuff
|
|
#ifdef SYSDEBUG
|
|
RemoveVectoredExceptionHandler(oncrash);
|
|
#endif
|
|
if (_weaken(__sig_init)) {
|
|
_weaken(__sig_init)();
|
|
}
|
|
|
|
// jump back into function below
|
|
longjmp(jb, 1);
|
|
}
|
|
|
|
textwindows int sys_fork_nt(uint32_t dwCreationFlags) {
|
|
char ok;
|
|
jmp_buf jb;
|
|
uint32_t op;
|
|
char **args;
|
|
int i, rc = -1;
|
|
struct Proc *proc;
|
|
struct CosmoTib *tib;
|
|
char16_t pipename[64];
|
|
int64_t reader, writer;
|
|
struct NtStartupInfo startinfo;
|
|
struct NtProcessInformation procinfo;
|
|
char *p, forkvar[6 + 21 + 1 + 21 + 1];
|
|
tib = __get_tls();
|
|
ftrace_enabled(-1);
|
|
strace_enabled(-1);
|
|
if (!(proc = __proc_new())) return -1;
|
|
if (!setjmp(jb)) {
|
|
reader = CreateNamedPipe(__create_pipe_name(pipename), kNtPipeAccessInbound,
|
|
kNtPipeTypeByte | kNtPipeReadmodeByte, 1, PIPE_BUF,
|
|
PIPE_BUF, 0, &kNtIsInheritable);
|
|
writer = CreateFile(pipename, kNtGenericWrite, 0, 0, kNtOpenExisting, 0, 0);
|
|
if (reader != -1 && writer != -1) {
|
|
p = stpcpy(forkvar, "_FORK=");
|
|
p = FormatUint64(p, reader);
|
|
bzero(&startinfo, sizeof(startinfo));
|
|
startinfo.cb = sizeof(struct NtStartupInfo);
|
|
startinfo.dwFlags = kNtStartfUsestdhandles;
|
|
startinfo.hStdInput = __getfdhandleactual(0);
|
|
startinfo.hStdOutput = __getfdhandleactual(1);
|
|
startinfo.hStdError = __getfdhandleactual(2);
|
|
args = __argv;
|
|
#ifdef SYSDEBUG
|
|
// If --strace was passed to this program, then propagate it the
|
|
// forked process since the flag was removed by __intercept_flag
|
|
if (strace_enabled(0) > 0) {
|
|
int n;
|
|
for (n = 0; args[n];) ++n;
|
|
#pragma GCC push_options
|
|
#pragma GCC diagnostic ignored "-Walloca-larger-than="
|
|
int nbytes = (n + 2) * sizeof(char *);
|
|
char **args2 = alloca(nbytes);
|
|
CheckLargeStackAllocation(args2, nbytes);
|
|
#pragma GCC pop_options
|
|
for (i = 0; i < n; ++i) args2[i] = args[i];
|
|
args2[i++] = "--strace";
|
|
args2[i] = 0;
|
|
args = args2;
|
|
}
|
|
#endif
|
|
NTTRACE("STARTING SPAWN");
|
|
int spawnrc = ntspawn(GetProgramExecutableName(), args, environ,
|
|
(char *[]){forkvar, 0}, dwCreationFlags, 0, 0, 0, 0,
|
|
&startinfo, &procinfo);
|
|
if (spawnrc != -1) {
|
|
CloseHandle(procinfo.hThread);
|
|
ok = WriteAll(writer, jb, sizeof(jb)) &&
|
|
WriteAll(writer, &_mmi.i, sizeof(_mmi.i)) &&
|
|
WriteAll(writer, &_mmi.n, sizeof(_mmi.n)) &&
|
|
WriteAll(writer, _mmi.p, _mmi.i * sizeof(_mmi.p[0]));
|
|
if (IsAsan() && ok) {
|
|
ok = WriteAll(writer, (char *)(((intptr_t)_mmi.p >> 3) + 0x7fff8000),
|
|
(_mmi.i * sizeof(_mmi.p[0])) >> 3);
|
|
}
|
|
for (i = 0; i < _mmi.i && ok; ++i) {
|
|
if ((_mmi.p[i].flags & MAP_TYPE) != MAP_SHARED) {
|
|
char *p = (char *)((uint64_t)_mmi.p[i].x << 16);
|
|
// XXX: forking destroys thread guard pages currently
|
|
VirtualProtect(
|
|
p, _mmi.p[i].size,
|
|
__prot2nt(_mmi.p[i].prot | PROT_READ, _mmi.p[i].iscow), &op);
|
|
ok = WriteAll(writer, p, _mmi.p[i].size);
|
|
}
|
|
}
|
|
if (ok) ok = WriteAll(writer, __data_start, __data_end - __data_start);
|
|
if (ok) ok = WriteAll(writer, __bss_start, __bss_end - __bss_start);
|
|
if (ok) {
|
|
if (!CloseHandle(writer)) ok = false;
|
|
writer = -1;
|
|
}
|
|
if (ok) {
|
|
proc->wasforked = true;
|
|
proc->handle = procinfo.hProcess;
|
|
rc = proc->pid = procinfo.dwProcessId;
|
|
__proc_add(proc);
|
|
} else {
|
|
TerminateProcess(procinfo.hProcess, SIGKILL);
|
|
CloseHandle(procinfo.hProcess);
|
|
}
|
|
}
|
|
}
|
|
if (reader != -1) CloseHandle(reader);
|
|
if (writer != -1) CloseHandle(writer);
|
|
if (rc == -1 && errno != ENOMEM) {
|
|
eagain(); // posix fork() only specifies two errors
|
|
}
|
|
} else {
|
|
rc = 0;
|
|
// re-apply code morphing for thread-local storage
|
|
__set_tls(tib);
|
|
__morph_tls();
|
|
__tls_enabled_set(true);
|
|
// clear pending signals
|
|
tib->tib_sigpending = 0;
|
|
__sig.pending = 0;
|
|
// re-enable threads
|
|
__enable_threads();
|
|
// re-apply code morphing for function tracing
|
|
if (ftrace_stackdigs) {
|
|
_weaken(__hook)(_weaken(ftrace_hook), _weaken(GetSymbolTable)());
|
|
}
|
|
// reset console
|
|
__keystroke_wipe();
|
|
// reset alarms
|
|
if (_weaken(__itimer_wipe)) {
|
|
_weaken(__itimer_wipe)();
|
|
}
|
|
}
|
|
if (rc == -1) {
|
|
__proc_free(proc);
|
|
}
|
|
ftrace_enabled(+1);
|
|
strace_enabled(+1);
|
|
return rc;
|
|
}
|
|
|
|
#endif /* __x86_64__ */
|