/* | |
* Helper program for killing lingering python[_d].exe processes before | |
* building, thus attempting to avoid build failures due to files being | |
* locked. | |
*/ | |
#include <windows.h> | |
#include <wchar.h> | |
#include <tlhelp32.h> | |
#include <stdio.h> | |
#pragma comment(lib, "psapi") | |
#ifdef _DEBUG | |
#define PYTHON_EXE (L"python_d.exe") | |
#define PYTHON_EXE_LEN (12) | |
#define KILL_PYTHON_EXE (L"kill_python_d.exe") | |
#define KILL_PYTHON_EXE_LEN (17) | |
#else | |
#define PYTHON_EXE (L"python.exe") | |
#define PYTHON_EXE_LEN (10) | |
#define KILL_PYTHON_EXE (L"kill_python.exe") | |
#define KILL_PYTHON_EXE_LEN (15) | |
#endif | |
int | |
main(int argc, char **argv) | |
{ | |
HANDLE hp, hsp, hsm; /* process, snapshot processes, snapshot modules */ | |
DWORD dac, our_pid; | |
size_t len; | |
wchar_t path[MAX_PATH+1]; | |
MODULEENTRY32W me; | |
PROCESSENTRY32W pe; | |
me.dwSize = sizeof(MODULEENTRY32W); | |
pe.dwSize = sizeof(PROCESSENTRY32W); | |
memset(path, 0, MAX_PATH+1); | |
our_pid = GetCurrentProcessId(); | |
hsm = CreateToolhelp32Snapshot(TH32CS_SNAPMODULE, our_pid); | |
if (hsm == INVALID_HANDLE_VALUE) { | |
printf("CreateToolhelp32Snapshot[1] failed: %d\n", GetLastError()); | |
return 1; | |
} | |
if (!Module32FirstW(hsm, &me)) { | |
printf("Module32FirstW[1] failed: %d\n", GetLastError()); | |
CloseHandle(hsm); | |
return 1; | |
} | |
/* | |
* Enumerate over the modules for the current process in order to find | |
* kill_process[_d].exe, then take a note of the directory it lives in. | |
*/ | |
do { | |
if (_wcsnicmp(me.szModule, KILL_PYTHON_EXE, KILL_PYTHON_EXE_LEN)) | |
continue; | |
len = wcsnlen_s(me.szExePath, MAX_PATH) - KILL_PYTHON_EXE_LEN; | |
wcsncpy_s(path, MAX_PATH+1, me.szExePath, len); | |
break; | |
} while (Module32NextW(hsm, &me)); | |
CloseHandle(hsm); | |
if (path == NULL) { | |
printf("failed to discern directory of running process\n"); | |
return 1; | |
} | |
/* | |
* Take a snapshot of system processes. Enumerate over the snapshot, | |
* looking for python processes. When we find one, verify it lives | |
* in the same directory we live in. If it does, kill it. If we're | |
* unable to kill it, treat this as a fatal error and return 1. | |
* | |
* The rationale behind this is that we're called at the start of the | |
* build process on the basis that we'll take care of killing any | |
* running instances, such that the build won't encounter permission | |
* denied errors during linking. If we can't kill one of the processes, | |
* we can't provide this assurance, and the build shouldn't start. | |
*/ | |
hsp = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0); | |
if (hsp == INVALID_HANDLE_VALUE) { | |
printf("CreateToolhelp32Snapshot[2] failed: %d\n", GetLastError()); | |
return 1; | |
} | |
if (!Process32FirstW(hsp, &pe)) { | |
printf("Process32FirstW failed: %d\n", GetLastError()); | |
CloseHandle(hsp); | |
return 1; | |
} | |
dac = PROCESS_QUERY_INFORMATION | PROCESS_VM_READ | PROCESS_TERMINATE; | |
do { | |
/* | |
* XXX TODO: if we really wanted to be fancy, we could check the | |
* modules for all processes (not just the python[_d].exe ones) | |
* and see if any of our DLLs are loaded (i.e. python30[_d].dll), | |
* as that would also inhibit our ability to rebuild the solution. | |
* Not worth loosing sleep over though; for now, a simple check | |
* for just the python executable should be sufficient. | |
*/ | |
if (_wcsnicmp(pe.szExeFile, PYTHON_EXE, PYTHON_EXE_LEN)) | |
/* This isn't a python process. */ | |
continue; | |
/* It's a python process, so figure out which directory it's in... */ | |
hsm = CreateToolhelp32Snapshot(TH32CS_SNAPMODULE, pe.th32ProcessID); | |
if (hsm == INVALID_HANDLE_VALUE) | |
/* | |
* If our module snapshot fails (which will happen if we don't own | |
* the process), just ignore it and continue. (It seems different | |
* versions of Windows return different values for GetLastError() | |
* in this situation; it's easier to just ignore it and move on vs. | |
* stopping the build for what could be a false positive.) | |
*/ | |
continue; | |
if (!Module32FirstW(hsm, &me)) { | |
printf("Module32FirstW[2] failed: %d\n", GetLastError()); | |
CloseHandle(hsp); | |
CloseHandle(hsm); | |
return 1; | |
} | |
do { | |
if (_wcsnicmp(me.szModule, PYTHON_EXE, PYTHON_EXE_LEN)) | |
/* Wrong module, we're looking for python[_d].exe... */ | |
continue; | |
if (_wcsnicmp(path, me.szExePath, len)) | |
/* Process doesn't live in our directory. */ | |
break; | |
/* Python process residing in the right directory, kill it! */ | |
hp = OpenProcess(dac, FALSE, pe.th32ProcessID); | |
if (!hp) { | |
printf("OpenProcess failed: %d\n", GetLastError()); | |
CloseHandle(hsp); | |
CloseHandle(hsm); | |
return 1; | |
} | |
if (!TerminateProcess(hp, 1)) { | |
printf("TerminateProcess failed: %d\n", GetLastError()); | |
CloseHandle(hsp); | |
CloseHandle(hsm); | |
CloseHandle(hp); | |
return 1; | |
} | |
CloseHandle(hp); | |
break; | |
} while (Module32NextW(hsm, &me)); | |
CloseHandle(hsm); | |
} while (Process32NextW(hsp, &pe)); | |
CloseHandle(hsp); | |
return 0; | |
} | |
/* vi: set ts=8 sw=4 sts=4 expandtab */ |