Skip to content

Commit 4b7f9df

Browse files
committed
Auto merge of #2370 - alexcrichton:windows-jobs, r=brson
Currently it's somewhat surprising if you're using cargo and it's then ctrl-c'd. The child processes that Cargo spawned are likely to still be running around in the background as they're not killed as well, and this could cause output spew or future build failures. This situation is handled by default on Unix because ctrl-c will end up sending a signal to the entire *process group*, which kills everything, but on Windows we're not as lucky (just Cargo itself is killed). By using job objects on Windows we can ensure that the entire tree dies instead of just the top Cargo process. cc #2343
2 parents 3e285ce + 5ccc842 commit 4b7f9df

File tree

6 files changed

+203
-3
lines changed

6 files changed

+203
-3
lines changed

appveyor.yml

+1-3
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ environment:
55
BITS: 32
66
TARGET: i686-pc-windows-msvc
77
ARCH: x86
8-
NEEDS_LIBGCC: 1
98
- MSVC: 1
109
BITS: 64
1110
TARGET: x86_64-pc-windows-msvc
@@ -17,14 +16,13 @@ install:
1716
- call "C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\vcvarsall.bat" %ARCH%
1817
- SET PATH=%PATH%;%cd%/rustc/bin
1918
- SET PATH=%PATH%;%cd%/target/snapshot/bin
20-
- if defined NEEDS_LIBGCC set PATH=%PATH%;C:\MinGW\bin
2119
- rustc -V
2220
- cargo -V
2321

2422
build: false
2523

2624
test_script:
27-
- cargo test -- --nocapture
25+
- cargo test
2826

2927
branches:
3028
only:

src/bin/cargo.rs

+1
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,7 @@ fn execute(flags: Flags, config: &Config) -> CliResult<Option<()>> {
104104
try!(config.shell().set_color_config(flags.flag_color.as_ref().map(|s| &s[..])));
105105

106106
init_git_transports(config);
107+
cargo::util::job::setup();
107108

108109
if flags.flag_version {
109110
println!("{}", cargo::version());

src/cargo/util/job.rs

+91
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
//! Job management (mostly for windows)
2+
//!
3+
//! Most of the time when you're running cargo you expect Ctrl-C to actually
4+
//! terminate the entire tree of processes in play, not just the one at the top
5+
//! (cago). This currently works "by default" on Unix platforms because Ctrl-C
6+
//! actually sends a signal to the *process group* rather than the parent
7+
//! process, so everything will get torn down. On Windows, however, this does
8+
//! not happen and Ctrl-C just kills cargo.
9+
//!
10+
//! To achieve the same semantics on Windows we use Job Objects to ensure that
11+
//! all processes die at the same time. Job objects have a mode of operation
12+
//! where when all handles to the object are closed it causes all child
13+
//! processes associated with the object to be terminated immediately.
14+
//! Conveniently whenever a process in the job object spawns a new process the
15+
//! child will be associated with the job object as well. This means if we add
16+
//! ourselves to the job object we create then everything will get torn down!
17+
18+
pub fn setup() {
19+
unsafe { imp::setup() }
20+
}
21+
22+
#[cfg(unix)]
23+
mod imp {
24+
use std::env;
25+
use libc;
26+
27+
pub unsafe fn setup() {
28+
// There's a test case for the behavior of
29+
// when-cargo-is-killed-subprocesses-are-also-killed, but that requires
30+
// one cargo spawned to become its own session leader, so we do that
31+
// here.
32+
if env::var("__CARGO_TEST_SETSID_PLEASE_DONT_USE_ELSEWHERE").is_ok() {
33+
libc::setsid();
34+
}
35+
}
36+
}
37+
38+
#[cfg(windows)]
39+
mod imp {
40+
extern crate kernel32;
41+
extern crate winapi;
42+
43+
use std::mem;
44+
45+
pub unsafe fn setup() {
46+
// Creates a new job object for us to use and then adds ourselves to it.
47+
// Note that all errors are basically ignored in this function,
48+
// intentionally. Job objects are "relatively new" in Windows,
49+
// particularly the ability to support nested job objects. Older
50+
// Windows installs don't support this ability. We probably don't want
51+
// to force Cargo to abort in this situation or force others to *not*
52+
// use job objects, so we instead just ignore errors and assume that
53+
// we're otherwise part of someone else's job object in this case.
54+
55+
let job = kernel32::CreateJobObjectW(0 as *mut _, 0 as *const _);
56+
if job.is_null() {
57+
return
58+
}
59+
60+
// Indicate that when all handles to the job object are gone that all
61+
// process in the object should be killed. Note that this includes our
62+
// entire process tree by default because we've added ourselves and and
63+
// our children will reside in the job once we spawn a process.
64+
let mut info: winapi::JOBOBJECT_EXTENDED_LIMIT_INFORMATION;
65+
info = mem::zeroed();
66+
info.BasicLimitInformation.LimitFlags =
67+
winapi::JOB_OBJECT_LIMIT_KILL_ON_JOB_CLOSE;
68+
let r = kernel32::SetInformationJobObject(job,
69+
winapi::JobObjectExtendedLimitInformation,
70+
&mut info as *mut _ as winapi::LPVOID,
71+
mem::size_of_val(&info) as winapi::DWORD);
72+
if r == 0 {
73+
kernel32::CloseHandle(job);
74+
return
75+
}
76+
77+
// Assign our process to this job object, meaning that our children will
78+
// now live or die based on our existence.
79+
let me = kernel32::GetCurrentProcess();
80+
let r = kernel32::AssignProcessToJobObject(job, me);
81+
if r == 0 {
82+
kernel32::CloseHandle(job);
83+
return
84+
}
85+
86+
// Intentionally leak the `job` handle here. We've got the only
87+
// reference to this job, so once it's gone we and all our children will
88+
// be killed. This typically won't happen unless Cargo itself is
89+
// ctrl-c'd.
90+
}
91+
}

src/cargo/util/mod.rs

+1
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ pub mod to_semver;
2929
pub mod to_url;
3030
pub mod toml;
3131
pub mod lev_distance;
32+
pub mod job;
3233
mod dependency_queue;
3334
mod sha256;
3435
mod shell_escape;

tests/test_cargo_death.rs

+108
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,108 @@
1+
use std::net::TcpListener;
2+
use std::io::{self, Read};
3+
use std::process::{Stdio, Child};
4+
5+
use support::project;
6+
7+
fn setup() {}
8+
9+
#[cfg(unix)]
10+
fn enabled() -> bool {
11+
true
12+
}
13+
14+
// On Windows suport for these tests is only enabled through the usage of job
15+
// objects. Support for nested job objects, however, was added in recent-ish
16+
// versions of Windows, so this test may not always be able to succeed.
17+
//
18+
// As a result, we try to add ourselves to a job object here
19+
// can succeed or not.
20+
#[cfg(windows)]
21+
fn enabled() -> bool {
22+
use kernel32;
23+
use winapi;
24+
unsafe {
25+
// If we're not currently in a job, then we can definitely run these
26+
// tests.
27+
let me = kernel32::GetCurrentProcess();
28+
let mut ret = 0;
29+
let r = kernel32::IsProcessInJob(me, 0 as *mut _, &mut ret);
30+
assert!(r != 0);
31+
if ret == winapi::FALSE {
32+
return true
33+
}
34+
35+
// If we are in a job, then we can run these tests if we can be added to
36+
// a nested job (as we're going to create a nested job no matter what as
37+
// part of these tests.
38+
//
39+
// If we can't be added to a nested job, then these tests will
40+
// definitely fail, and there's not much we can do about that.
41+
let job = kernel32::CreateJobObjectW(0 as *mut _, 0 as *const _);
42+
assert!(!job.is_null());
43+
let r = kernel32::AssignProcessToJobObject(job, me);
44+
kernel32::CloseHandle(job);
45+
r != 0
46+
}
47+
}
48+
49+
test!(ctrl_c_kills_everyone {
50+
if !enabled() {
51+
return
52+
}
53+
54+
let listener = TcpListener::bind("127.0.0.1:0").unwrap();
55+
let addr = listener.local_addr().unwrap();
56+
57+
let p = project("foo")
58+
.file("Cargo.toml", r#"
59+
[package]
60+
name = "foo"
61+
version = "0.0.1"
62+
authors = []
63+
build = "build.rs"
64+
"#)
65+
.file("src/lib.rs", "")
66+
.file("build.rs", &format!(r#"
67+
use std::net::TcpStream;
68+
use std::io::Read;
69+
70+
fn main() {{
71+
let mut socket = TcpStream::connect("{}").unwrap();
72+
let _ = socket.read(&mut [0; 10]);
73+
panic!("that read should never return");
74+
}}
75+
"#, addr));
76+
p.build();
77+
78+
let mut cargo = p.cargo("build").build_command();
79+
cargo.stdin(Stdio::piped())
80+
.stdout(Stdio::piped())
81+
.stderr(Stdio::piped())
82+
.env("__CARGO_TEST_SETSID_PLEASE_DONT_USE_ELSEWHERE", "1");
83+
let mut child = cargo.spawn().unwrap();
84+
85+
let mut sock = listener.accept().unwrap().0;
86+
ctrl_c(&mut child);
87+
88+
assert!(!child.wait().unwrap().success());
89+
match sock.read(&mut [0; 10]) {
90+
Ok(n) => assert_eq!(n, 0),
91+
Err(e) => assert_eq!(e.kind(), io::ErrorKind::ConnectionReset),
92+
}
93+
});
94+
95+
#[cfg(unix)]
96+
fn ctrl_c(child: &mut Child) {
97+
use libc;
98+
99+
let r = unsafe { libc::kill(-(child.id() as i32), libc::SIGINT) };
100+
if r < 0 {
101+
panic!("failed to kill: {}", io::Error::last_os_error());
102+
}
103+
}
104+
105+
#[cfg(windows)]
106+
fn ctrl_c(child: &mut Child) {
107+
child.kill().unwrap();
108+
}

tests/tests.rs

+1
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,7 @@ mod test_cargo_tool_paths;
6969
mod test_cargo_verify_project;
7070
mod test_cargo_version;
7171
mod test_shell;
72+
mod test_cargo_death;
7273

7374
thread_local!(static RUSTC: Rustc = Rustc::new("rustc").unwrap());
7475

0 commit comments

Comments
 (0)