mirror of
				https://github.com/python/cpython.git
				synced 2025-10-28 12:15:13 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			178 lines
		
	
	
	
		
			5.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			178 lines
		
	
	
	
		
			5.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Helper program for killing lingering python[_d].exe processes before
 | |
|  * building, thus attempting to avoid build failures due to files being
 | |
|  * locked.
 | |
|  */
 | |
| 
 | |
| #include <windows.h>
 | |
| #include <wchar.h>
 | |
| #include <tlhelp32.h>
 | |
| #include <stdio.h>
 | |
| 
 | |
| #pragma comment(lib, "psapi")
 | |
| 
 | |
| #ifdef _DEBUG
 | |
| #define PYTHON_EXE          (L"python_d.exe")
 | |
| #define PYTHON_EXE_LEN      (12)
 | |
| #define KILL_PYTHON_EXE     (L"kill_python_d.exe")
 | |
| #define KILL_PYTHON_EXE_LEN (17)
 | |
| #else
 | |
| #define PYTHON_EXE          (L"python.exe")
 | |
| #define PYTHON_EXE_LEN      (10)
 | |
| #define KILL_PYTHON_EXE     (L"kill_python.exe")
 | |
| #define KILL_PYTHON_EXE_LEN (15)
 | |
| #endif
 | |
| 
 | |
| int
 | |
| main(int argc, char **argv)
 | |
| {
 | |
|     HANDLE   hp, hsp, hsm; /* process, snapshot processes, snapshot modules */
 | |
|     DWORD    dac, our_pid;
 | |
|     size_t   len;
 | |
|     wchar_t  path[MAX_PATH+1];
 | |
| 
 | |
|     MODULEENTRY32W  me;
 | |
|     PROCESSENTRY32W pe;
 | |
| 
 | |
|     me.dwSize = sizeof(MODULEENTRY32W);
 | |
|     pe.dwSize = sizeof(PROCESSENTRY32W);
 | |
| 
 | |
|     memset(path, 0, MAX_PATH+1);
 | |
| 
 | |
|     our_pid = GetCurrentProcessId();
 | |
| 
 | |
|     hsm = CreateToolhelp32Snapshot(TH32CS_SNAPMODULE, our_pid);
 | |
|     if (hsm == INVALID_HANDLE_VALUE) {
 | |
|         printf("CreateToolhelp32Snapshot[1] failed: %d\n", GetLastError());
 | |
|         return 1;
 | |
|     }
 | |
| 
 | |
|     if (!Module32FirstW(hsm, &me)) {
 | |
|         printf("Module32FirstW[1] failed: %d\n", GetLastError());
 | |
|         CloseHandle(hsm);
 | |
|         return 1;
 | |
|     }
 | |
| 
 | |
|     /*
 | |
|      * Enumerate over the modules for the current process in order to find
 | |
|      * kill_process[_d].exe, then take a note of the directory it lives in.
 | |
|      */
 | |
|     do {
 | |
|         if (_wcsnicmp(me.szModule, KILL_PYTHON_EXE, KILL_PYTHON_EXE_LEN))
 | |
|             continue;
 | |
| 
 | |
|         len = wcsnlen_s(me.szExePath, MAX_PATH) - KILL_PYTHON_EXE_LEN;
 | |
|         wcsncpy_s(path, MAX_PATH+1, me.szExePath, len); 
 | |
| 
 | |
|         break;
 | |
| 
 | |
|     } while (Module32NextW(hsm, &me));
 | |
| 
 | |
|     CloseHandle(hsm);
 | |
| 
 | |
|     if (path == NULL) {
 | |
|         printf("failed to discern directory of running process\n");
 | |
|         return 1;
 | |
|     }
 | |
| 
 | |
|     /*
 | |
|      * Take a snapshot of system processes.  Enumerate over the snapshot,
 | |
|      * looking for python processes.  When we find one, verify it lives
 | |
|      * in the same directory we live in.  If it does, kill it.  If we're
 | |
|      * unable to kill it, treat this as a fatal error and return 1.
 | |
|      * 
 | |
|      * The rationale behind this is that we're called at the start of the 
 | |
|      * build process on the basis that we'll take care of killing any
 | |
|      * running instances, such that the build won't encounter permission
 | |
|      * denied errors during linking. If we can't kill one of the processes,
 | |
|      * we can't provide this assurance, and the build shouldn't start.
 | |
|      */
 | |
| 
 | |
|     hsp = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0);
 | |
|     if (hsp == INVALID_HANDLE_VALUE) {
 | |
|         printf("CreateToolhelp32Snapshot[2] failed: %d\n", GetLastError());
 | |
|         return 1;
 | |
|     }
 | |
| 
 | |
|     if (!Process32FirstW(hsp, &pe)) {
 | |
|         printf("Process32FirstW failed: %d\n", GetLastError());
 | |
|         CloseHandle(hsp);
 | |
|         return 1;
 | |
|     }
 | |
| 
 | |
|     dac = PROCESS_QUERY_INFORMATION | PROCESS_VM_READ | PROCESS_TERMINATE;
 | |
|     do {
 | |
| 
 | |
|         /*
 | |
|          * XXX TODO: if we really wanted to be fancy, we could check the 
 | |
|          * modules for all processes (not just the python[_d].exe ones)
 | |
|          * and see if any of our DLLs are loaded (i.e. python32[_d].dll),
 | |
|          * as that would also inhibit our ability to rebuild the solution.
 | |
|          * Not worth loosing sleep over though; for now, a simple check 
 | |
|          * for just the python executable should be sufficient.
 | |
|          */
 | |
| 
 | |
|         if (_wcsnicmp(pe.szExeFile, PYTHON_EXE, PYTHON_EXE_LEN))
 | |
|             /* This isn't a python process. */
 | |
|             continue;
 | |
| 
 | |
|         /* It's a python process, so figure out which directory it's in... */
 | |
|         hsm = CreateToolhelp32Snapshot(TH32CS_SNAPMODULE, pe.th32ProcessID);
 | |
|         if (hsm == INVALID_HANDLE_VALUE)
 | |
|             /* 
 | |
|              * If our module snapshot fails (which will happen if we don't own
 | |
|              * the process), just ignore it and continue.  (It seems different
 | |
|              * versions of Windows return different values for GetLastError()
 | |
|              * in this situation; it's easier to just ignore it and move on vs.
 | |
|              * stopping the build for what could be a false positive.)
 | |
|              */
 | |
|              continue;
 | |
| 
 | |
|         if (!Module32FirstW(hsm, &me)) {
 | |
|             printf("Module32FirstW[2] failed: %d\n", GetLastError());
 | |
|             CloseHandle(hsp);
 | |
|             CloseHandle(hsm);
 | |
|             return 1;
 | |
|         }
 | |
| 
 | |
|         do {
 | |
|             if (_wcsnicmp(me.szModule, PYTHON_EXE, PYTHON_EXE_LEN))
 | |
|                 /* Wrong module, we're looking for python[_d].exe... */
 | |
|                 continue;
 | |
| 
 | |
|             if (_wcsnicmp(path, me.szExePath, len))
 | |
|                 /* Process doesn't live in our directory. */
 | |
|                 break;
 | |
| 
 | |
|             /* Python process residing in the right directory, kill it!  */
 | |
|             hp = OpenProcess(dac, FALSE, pe.th32ProcessID);
 | |
|             if (!hp) {
 | |
|                 printf("OpenProcess failed: %d\n", GetLastError());
 | |
|                 CloseHandle(hsp);
 | |
|                 CloseHandle(hsm);
 | |
|                 return 1;
 | |
|             }
 | |
| 
 | |
|             if (!TerminateProcess(hp, 1)) {
 | |
|                 printf("TerminateProcess failed: %d\n", GetLastError());
 | |
|                 CloseHandle(hsp);
 | |
|                 CloseHandle(hsm);
 | |
|                 CloseHandle(hp);
 | |
|                 return 1;
 | |
|             }
 | |
| 
 | |
|             CloseHandle(hp);
 | |
|             break;
 | |
| 
 | |
|         } while (Module32NextW(hsm, &me));
 | |
| 
 | |
|         CloseHandle(hsm);
 | |
| 
 | |
|     } while (Process32NextW(hsp, &pe));
 | |
| 
 | |
|     CloseHandle(hsp);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| /* vi: set ts=8 sw=4 sts=4 expandtab */
 | 
