janwas
8667ea74c8
- directoryPosix: replace most methods with boost filesystem (but not all: the latter cannot efficiently enumerate files AND query their size/mtime) - AllocatorChecker: better name for member functions - file: move the File class here - trace: bugfix - io: move UnalignedWriter to write_buffer.cpp (basically the same thing) - vfs: remove unnecessary "vfs" warts from variable names - vfs_tree: VfsFile now stores single Name/Size/MTime fields instead of the FileInfo record (less clunky) - vfs_path: use boost filesystem's version of the basename/extension functions - lf_alloc: remove (no longer necessary, won't be finished - not worth the trouble) - path_util: remove path_foreach_component (replaced by better path traversal logic) and PathPackage (obsoleted by fs::path) ! resource loading code now receives VfsPath as its filename. there is also OsPath (native absolute path) and Path (relative to binaries/data) - tex is now independent of file loading code; it just en/decodes in-memory buffers - wdll_ver: clean up, use smart pointer to simplify bailout code - wsdl: remove nonexistent failure path from calc_gamma (cruised by here because SDL_SetGamme is failing once after a cold boot at work) - wsnd: simplify OpenAL DLL search, use boost::filesystem - wutil: Wow64 redirection is now packaged in a (RAII) class This was SVN commit r5525.
518 lines
12 KiB
C++
518 lines
12 KiB
C++
/**
|
|
* =========================================================================
|
|
* File : wutil.cpp
|
|
* Project : 0 A.D.
|
|
* Description : various Windows-specific utilities
|
|
* =========================================================================
|
|
*/
|
|
|
|
// license: GPL; see lib/license.txt
|
|
|
|
#include "precompiled.h"
|
|
#include "wutil.h"
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h> // __argc
|
|
|
|
#include "lib/path_util.h"
|
|
#include "lib/posix/posix.h"
|
|
#include "win.h"
|
|
#include "winit.h"
|
|
|
|
WINIT_REGISTER_EARLY_INIT(wutil_Init);
|
|
WINIT_REGISTER_LATE_SHUTDOWN(wutil_Shutdown);
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// safe allocator
|
|
|
|
//
|
|
// safe allocator that may be used independently of libc malloc
|
|
// (in particular, before _cinit and while calling static dtors).
|
|
// used by wpthread critical section code.
|
|
//
|
|
|
|
void* win_alloc(size_t size)
|
|
{
|
|
const DWORD flags = HEAP_ZERO_MEMORY;
|
|
return HeapAlloc(GetProcessHeap(), flags, size);
|
|
}
|
|
|
|
void win_free(void* p)
|
|
{
|
|
const DWORD flags = 0;
|
|
HeapFree(GetProcessHeap(), flags, p);
|
|
}
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// locks
|
|
|
|
// several init functions are before called before _cinit.
|
|
// POSIX static mutex init may not have been done by then,
|
|
// so we need our own lightweight functions.
|
|
|
|
static CRITICAL_SECTION cs[NUM_CS];
|
|
static bool cs_valid;
|
|
|
|
void win_lock(uint idx)
|
|
{
|
|
debug_assert(idx < NUM_CS && "win_lock: invalid critical section index");
|
|
if(cs_valid)
|
|
EnterCriticalSection(&cs[idx]);
|
|
}
|
|
|
|
void win_unlock(uint idx)
|
|
{
|
|
debug_assert(idx < NUM_CS && "win_unlock: invalid critical section index");
|
|
if(cs_valid)
|
|
LeaveCriticalSection(&cs[idx]);
|
|
}
|
|
|
|
int win_is_locked(uint idx)
|
|
{
|
|
debug_assert(idx < NUM_CS && "win_is_locked: invalid critical section index");
|
|
if(!cs_valid)
|
|
return -1;
|
|
BOOL got_it = TryEnterCriticalSection(&cs[idx]);
|
|
if(got_it)
|
|
LeaveCriticalSection(&cs[idx]);
|
|
return !got_it;
|
|
}
|
|
|
|
|
|
static void InitLocks()
|
|
{
|
|
for(int i = 0; i < NUM_CS; i++)
|
|
InitializeCriticalSection(&cs[i]);
|
|
|
|
cs_valid = true;
|
|
}
|
|
|
|
static void ShutdownLocks()
|
|
{
|
|
cs_valid = false;
|
|
|
|
for(int i = 0; i < NUM_CS; i++)
|
|
DeleteCriticalSection(&cs[i]);
|
|
memset(cs, 0, sizeof(cs));
|
|
}
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// error codes
|
|
|
|
// only call after a Win32 function indicates failure.
|
|
LibError LibError_from_GLE(bool warn_if_failed)
|
|
{
|
|
LibError err = ERR::FAIL;
|
|
switch(GetLastError())
|
|
{
|
|
case ERROR_OUTOFMEMORY:
|
|
err = ERR::NO_MEM; break;
|
|
|
|
case ERROR_INVALID_PARAMETER:
|
|
err = ERR::INVALID_PARAM; break;
|
|
case ERROR_INSUFFICIENT_BUFFER:
|
|
err = ERR::BUF_SIZE; break;
|
|
|
|
/*
|
|
case ERROR_ACCESS_DENIED:
|
|
err = ERR::FILE_ACCESS; break;
|
|
case ERROR_FILE_NOT_FOUND:
|
|
case ERROR_PATH_NOT_FOUND:
|
|
err = ERR::TNODE_NOT_FOUND; break;
|
|
*/
|
|
}
|
|
|
|
if(warn_if_failed)
|
|
DEBUG_WARN_ERR(err);
|
|
return err;
|
|
}
|
|
|
|
|
|
// return the LibError equivalent of GetLastError(), or ERR::FAIL if
|
|
// there's no equal.
|
|
// you should SetLastError(0) before calling whatever will set ret
|
|
// to make sure we do not return any stale errors.
|
|
LibError LibError_from_win32(DWORD ret, bool warn_if_failed)
|
|
{
|
|
if(ret != FALSE)
|
|
return INFO::OK;
|
|
return LibError_from_GLE(warn_if_failed);
|
|
}
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// command line
|
|
|
|
// copy of GetCommandLine string. will be tokenized and then referenced by
|
|
// the argv pointers.
|
|
static char* argvContents;
|
|
|
|
int wutil_argc = 0;
|
|
char** wutil_argv = 0;
|
|
|
|
static void ReadCommandLine()
|
|
{
|
|
const char* commandLine = GetCommandLine();
|
|
// (this changes as quotation marks are removed)
|
|
size_t numChars = strlen(commandLine);
|
|
argvContents = (char*)HeapAlloc(GetProcessHeap(), HEAP_GENERATE_EXCEPTIONS, numChars+1);
|
|
strcpy_s(argvContents, numChars+1, commandLine);
|
|
|
|
// first pass: tokenize string and count number of arguments
|
|
bool ignoreSpace = false;
|
|
for(size_t i = 0; i < numChars; i++)
|
|
{
|
|
switch(argvContents[i])
|
|
{
|
|
case '"':
|
|
ignoreSpace = !ignoreSpace;
|
|
// strip the " character
|
|
memmove(argvContents+i, argvContents+i+1, numChars-i);
|
|
numChars--;
|
|
i--;
|
|
break;
|
|
|
|
case ' ':
|
|
if(!ignoreSpace)
|
|
{
|
|
argvContents[i] = '\0';
|
|
wutil_argc++;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
wutil_argc++;
|
|
|
|
// have argv entries point into the tokenized string
|
|
wutil_argv = (char**)HeapAlloc(GetProcessHeap(), HEAP_GENERATE_EXCEPTIONS, wutil_argc*sizeof(char*));
|
|
char* nextArg = argvContents;
|
|
for(int i = 0; i < wutil_argc; i++)
|
|
{
|
|
wutil_argv[i] = nextArg;
|
|
nextArg += strlen(nextArg)+1;
|
|
}
|
|
}
|
|
|
|
|
|
static void FreeCommandLine()
|
|
{
|
|
HeapFree(GetProcessHeap(), 0, wutil_argv);
|
|
HeapFree(GetProcessHeap(), 0, argvContents);
|
|
}
|
|
|
|
|
|
bool wutil_HasCommandLineArgument(const char* arg)
|
|
{
|
|
for(int i = 0; i < wutil_argc; i++)
|
|
{
|
|
if(!strcmp(wutil_argv[i], arg))
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// directories
|
|
|
|
char win_sys_dir[MAX_PATH+1];
|
|
char win_exe_dir[MAX_PATH+1];
|
|
|
|
static void GetDirectories()
|
|
{
|
|
GetSystemDirectory(win_sys_dir, sizeof(win_sys_dir));
|
|
|
|
const DWORD len = GetModuleFileName(GetModuleHandle(0), win_exe_dir, MAX_PATH);
|
|
debug_assert(len != 0);
|
|
// strip EXE filename and trailing slash
|
|
char* slash = strrchr(win_exe_dir, '\\');
|
|
if(slash)
|
|
*slash = '\0';
|
|
else
|
|
debug_assert(0); // directory name invalid?!
|
|
}
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// user32 fix
|
|
|
|
// HACK: make sure a reference to user32 is held, even if someone
|
|
// decides to delay-load it. this fixes bug #66, which was the
|
|
// Win32 mouse cursor (set via user32!SetCursor) appearing as a
|
|
// black 32x32(?) rectangle. underlying cause was as follows:
|
|
// powrprof.dll was the first client of user32, causing it to be
|
|
// loaded. after we were finished with powrprof, we freed it, in turn
|
|
// causing user32 to unload. later code would then reload user32,
|
|
// which apparently terminally confused the cursor implementation.
|
|
//
|
|
// since we hold a reference here, user32 will never unload.
|
|
// of course, the benefits of delay-loading are lost for this DLL,
|
|
// but that is unavoidable. it is safer to force loading it, rather
|
|
// than documenting the problem and asking it not be delay-loaded.
|
|
static HMODULE hUser32Dll;
|
|
|
|
static void ForciblyLoadUser32Dll()
|
|
{
|
|
hUser32Dll = LoadLibrary("user32.dll");
|
|
}
|
|
|
|
// avoids Boundschecker warning
|
|
static void FreeUser32Dll()
|
|
{
|
|
FreeLibrary(hUser32Dll);
|
|
}
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// memory
|
|
|
|
// note: has no effect if config.h's HAVE_VC_DEBUG_ALLOC is 0.
|
|
static void EnableMemoryTracking()
|
|
{
|
|
#if CONFIG_PARANOIA
|
|
debug_heap_enable(DEBUG_HEAP_ALL);
|
|
#elif !defined(NDEBUG)
|
|
debug_heap_enable(DEBUG_HEAP_NORMAL);
|
|
#endif
|
|
}
|
|
|
|
static void EnableLowFragmentationHeap()
|
|
{
|
|
#if WINVER >= 0x0501
|
|
const HMODULE hKernel32Dll = GetModuleHandle("kernel32.dll");
|
|
BOOL (WINAPI* pHeapSetInformation)(HANDLE, HEAP_INFORMATION_CLASS, void*, size_t);
|
|
*(void**)&pHeapSetInformation = GetProcAddress(hKernel32Dll, "HeapSetInformation");
|
|
if(!pHeapSetInformation)
|
|
return;
|
|
|
|
ULONG flags = 2; // enable LFH
|
|
pHeapSetInformation(GetProcessHeap(), HeapCompatibilityInformation, &flags, sizeof(flags));
|
|
#endif // #if WINVER >= 0x0501
|
|
}
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// version
|
|
|
|
static char windowsVersionString[20];
|
|
static uint windowsVersion; // see WUTIL_VERSION_*
|
|
|
|
static void DetectWindowsVersion()
|
|
{
|
|
// note: don't use GetVersion[Ex] because it gives the version of the
|
|
// emulated OS when running an app with compatibility shims enabled.
|
|
HKEY hKey;
|
|
if(RegOpenKeyEx(HKEY_LOCAL_MACHINE, "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion", 0, KEY_QUERY_VALUE, &hKey) == ERROR_SUCCESS)
|
|
{
|
|
DWORD size = ARRAY_SIZE(windowsVersionString);
|
|
(void)RegQueryValueEx(hKey, "CurrentVersion", 0, 0, (LPBYTE)windowsVersionString, &size);
|
|
|
|
uint major = 0, minor = 0;
|
|
int ret = sscanf(windowsVersionString, "%d.%d", &major, &minor);
|
|
debug_assert(ret == 2);
|
|
debug_assert(major <= 0xFF && minor <= 0xFF);
|
|
windowsVersion = (major << 8) | minor;
|
|
|
|
RegCloseKey(hKey);
|
|
}
|
|
else
|
|
debug_assert(0);
|
|
}
|
|
|
|
|
|
const char* wutil_WindowsFamily()
|
|
{
|
|
debug_assert(windowsVersion != 0);
|
|
switch(windowsVersion)
|
|
{
|
|
case WUTIL_VERSION_2K:
|
|
return "Win2k";
|
|
case WUTIL_VERSION_XP:
|
|
return "WinXP";
|
|
case WUTIL_VERSION_XP64:
|
|
return "WinXP64";
|
|
case WUTIL_VERSION_VISTA:
|
|
return "Vista";
|
|
default:
|
|
return "Windows";
|
|
}
|
|
}
|
|
|
|
|
|
const char* wutil_WindowsVersionString()
|
|
{
|
|
debug_assert(windowsVersionString[0] != '\0');
|
|
return windowsVersionString;
|
|
}
|
|
|
|
uint wutil_WindowsVersion()
|
|
{
|
|
debug_assert(windowsVersion != 0);
|
|
return windowsVersion;
|
|
}
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// Wow64
|
|
|
|
// Wow64 'helpfully' redirects all 32-bit apps' accesses of
|
|
// %windir%\\system32\\drivers to %windir%\\system32\\drivers\\SysWOW64.
|
|
// that's bad, because the actual drivers are not in the subdirectory. to
|
|
// work around this, provide for temporarily disabling redirection.
|
|
|
|
static BOOL (WINAPI *pIsWow64Process)(HANDLE, PBOOL);
|
|
static BOOL (WINAPI *pWow64DisableWow64FsRedirection)(PVOID*) = 0;
|
|
static BOOL (WINAPI *pWow64RevertWow64FsRedirection)(PVOID) = 0;
|
|
|
|
static bool isWow64;
|
|
|
|
static void ImportWow64Functions()
|
|
{
|
|
const HMODULE hKernel32Dll = GetModuleHandle("kernel32.dll");
|
|
*(void**)&pIsWow64Process = GetProcAddress(hKernel32Dll, "IsWow64Process");
|
|
*(void**)&pWow64DisableWow64FsRedirection = GetProcAddress(hKernel32Dll, "Wow64DisableWow64FsRedirection");
|
|
*(void**)&pWow64RevertWow64FsRedirection = GetProcAddress(hKernel32Dll, "Wow64RevertWow64FsRedirection");
|
|
}
|
|
|
|
static void DetectWow64()
|
|
{
|
|
// function not found => running on 32-bit Windows
|
|
if(!pIsWow64Process)
|
|
{
|
|
isWow64 = false;
|
|
return;
|
|
}
|
|
|
|
BOOL isWow64Process = FALSE;
|
|
const BOOL ok = pIsWow64Process(GetCurrentProcess(), &isWow64Process);
|
|
WARN_IF_FALSE(ok);
|
|
isWow64 = (isWow64Process == TRUE);
|
|
}
|
|
|
|
bool wutil_IsWow64()
|
|
{
|
|
return isWow64;
|
|
}
|
|
|
|
|
|
WinScopedDisableWow64Redirection::WinScopedDisableWow64Redirection()
|
|
{
|
|
// note: don't just check if the function pointers are valid. 32-bit
|
|
// Vista includes them but isn't running Wow64, so calling the functions
|
|
// would fail. since we have to check if actually on Wow64, there's no
|
|
// more need to verify the pointers (their existence is implied).
|
|
if(!wutil_IsWow64())
|
|
return;
|
|
BOOL ok = pWow64DisableWow64FsRedirection(&m_wasRedirectionEnabled);
|
|
WARN_IF_FALSE(ok);
|
|
}
|
|
|
|
WinScopedDisableWow64Redirection::~WinScopedDisableWow64Redirection()
|
|
{
|
|
if(!wutil_IsWow64())
|
|
return;
|
|
BOOL ok = pWow64RevertWow64FsRedirection(m_wasRedirectionEnabled);
|
|
WARN_IF_FALSE(ok);
|
|
}
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// module handle
|
|
|
|
#ifdef LIB_DLL
|
|
|
|
HMODULE wutil_LibModuleHandle;
|
|
|
|
BOOL WINAPI DllMain(HINSTANCE hInstance, DWORD reason, LPVOID reserved)
|
|
{
|
|
DisableThreadLibraryCalls(hInstance);
|
|
wutil_LibModuleHandle = hInstance;
|
|
return TRUE; // success (ignored unless reason == DLL_PROCESS_ATTACH)
|
|
}
|
|
|
|
#else
|
|
|
|
HMODULE wutil_LibModuleHandle = GetModuleHandle(0);
|
|
|
|
#endif
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// find main window
|
|
|
|
// this is required by the error dialog and clipboard code.
|
|
// note that calling from wutil_Init won't work, because the app will not
|
|
// have created its window by then.
|
|
|
|
static HWND hAppWindow;
|
|
|
|
static BOOL CALLBACK FindAppWindowByPid(HWND hWnd, LPARAM UNUSED(lParam))
|
|
{
|
|
DWORD pid;
|
|
const DWORD tid = GetWindowThreadProcessId(hWnd, &pid);
|
|
UNUSED2(tid); // the function can't fail
|
|
|
|
if(pid == GetCurrentProcessId())
|
|
{
|
|
hAppWindow = hWnd;
|
|
return FALSE; // done
|
|
}
|
|
|
|
return TRUE; // keep calling
|
|
}
|
|
|
|
HWND wutil_AppWindow()
|
|
{
|
|
if(!hAppWindow)
|
|
{
|
|
const DWORD ret = EnumWindows(FindAppWindowByPid, 0);
|
|
// the callback returns FALSE when it has found the window
|
|
// (so as not to waste time); EnumWindows then returns 0.
|
|
// we therefore cannot check for errors.
|
|
UNUSED2(ret);
|
|
}
|
|
|
|
return hAppWindow;
|
|
}
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
static LibError wutil_Init()
|
|
{
|
|
InitLocks();
|
|
|
|
ForciblyLoadUser32Dll();
|
|
|
|
EnableMemoryTracking();
|
|
|
|
EnableLowFragmentationHeap();
|
|
|
|
ReadCommandLine();
|
|
|
|
GetDirectories();
|
|
|
|
DetectWindowsVersion();
|
|
|
|
ImportWow64Functions();
|
|
DetectWow64();
|
|
|
|
return INFO::OK;
|
|
}
|
|
|
|
|
|
static LibError wutil_Shutdown()
|
|
{
|
|
FreeCommandLine();
|
|
|
|
FreeUser32Dll();
|
|
|
|
ShutdownLocks();
|
|
|
|
return INFO::OK;
|
|
}
|