2008-11-08 01:28:53 +03:00
|
|
|
#!/usr/bin/env python
|
|
|
|
|
2016-04-16 05:29:29 +03:00
|
|
|
from __future__ import absolute_import
|
|
|
|
import errno
|
|
|
|
import os
|
|
|
|
import signal
|
|
|
|
import sys
|
|
|
|
import time
|
2008-11-08 01:28:53 +03:00
|
|
|
|
2012-08-19 20:06:15 +04:00
|
|
|
if os.name =='nt':
|
|
|
|
import ctypes
|
2014-01-18 00:13:08 +04:00
|
|
|
|
2017-06-07 03:18:06 +03:00
|
|
|
_BOOL = ctypes.c_long
|
|
|
|
_DWORD = ctypes.c_ulong
|
|
|
|
_UINT = ctypes.c_uint
|
|
|
|
_HANDLE = ctypes.c_void_p
|
|
|
|
|
|
|
|
ctypes.windll.kernel32.CloseHandle.argtypes = [_HANDLE]
|
|
|
|
ctypes.windll.kernel32.CloseHandle.restype = _BOOL
|
|
|
|
|
|
|
|
ctypes.windll.kernel32.GetLastError.argtypes = []
|
|
|
|
ctypes.windll.kernel32.GetLastError.restype = _DWORD
|
|
|
|
|
|
|
|
ctypes.windll.kernel32.OpenProcess.argtypes = [_DWORD, _BOOL, _DWORD]
|
|
|
|
ctypes.windll.kernel32.OpenProcess.restype = _HANDLE
|
|
|
|
|
|
|
|
ctypes.windll.kernel32.TerminateProcess.argtypes = [_HANDLE, _UINT]
|
|
|
|
ctypes.windll.kernel32.TerminateProcess.restype = _BOOL
|
|
|
|
|
|
|
|
ctypes.windll.kernel32.WaitForSingleObject.argtypes = [_HANDLE, _DWORD]
|
|
|
|
ctypes.windll.kernel32.WaitForSingleObject.restype = _DWORD
|
|
|
|
|
2014-01-18 00:13:08 +04:00
|
|
|
def _check(ret, expectederr=None):
|
|
|
|
if ret == 0:
|
|
|
|
winerrno = ctypes.GetLastError()
|
|
|
|
if winerrno == expectederr:
|
|
|
|
return True
|
|
|
|
raise ctypes.WinError(winerrno)
|
|
|
|
|
2012-08-19 20:06:15 +04:00
|
|
|
def kill(pid, logfn, tryhard=True):
|
|
|
|
logfn('# Killing daemon process %d' % pid)
|
|
|
|
PROCESS_TERMINATE = 1
|
2014-02-12 19:09:18 +04:00
|
|
|
PROCESS_QUERY_INFORMATION = 0x400
|
2014-03-11 01:52:42 +04:00
|
|
|
SYNCHRONIZE = 0x00100000
|
2014-01-18 00:13:20 +04:00
|
|
|
WAIT_OBJECT_0 = 0
|
|
|
|
WAIT_TIMEOUT = 258
|
2017-06-16 04:59:42 +03:00
|
|
|
WAIT_FAILED = _DWORD(0xFFFFFFFF).value
|
2012-08-19 20:06:15 +04:00
|
|
|
handle = ctypes.windll.kernel32.OpenProcess(
|
2014-02-12 19:09:18 +04:00
|
|
|
PROCESS_TERMINATE|SYNCHRONIZE|PROCESS_QUERY_INFORMATION,
|
|
|
|
False, pid)
|
2017-06-07 03:18:06 +03:00
|
|
|
if handle is None:
|
2014-02-12 18:38:59 +04:00
|
|
|
_check(0, 87) # err 87 when process not found
|
2014-01-18 00:13:08 +04:00
|
|
|
return # process not found, already finished
|
|
|
|
try:
|
2014-02-12 19:09:18 +04:00
|
|
|
r = ctypes.windll.kernel32.WaitForSingleObject(handle, 100)
|
|
|
|
if r == WAIT_OBJECT_0:
|
|
|
|
pass # terminated, but process handle still available
|
|
|
|
elif r == WAIT_TIMEOUT:
|
|
|
|
_check(ctypes.windll.kernel32.TerminateProcess(handle, -1))
|
2017-06-16 04:59:42 +03:00
|
|
|
elif r == WAIT_FAILED:
|
|
|
|
_check(0) # err stored in GetLastError()
|
2014-01-18 00:13:20 +04:00
|
|
|
|
|
|
|
# TODO?: forcefully kill when timeout
|
|
|
|
# and ?shorter waiting time? when tryhard==True
|
|
|
|
r = ctypes.windll.kernel32.WaitForSingleObject(handle, 100)
|
|
|
|
# timeout = 100 ms
|
|
|
|
if r == WAIT_OBJECT_0:
|
|
|
|
pass # process is terminated
|
|
|
|
elif r == WAIT_TIMEOUT:
|
|
|
|
logfn('# Daemon process %d is stuck')
|
2017-06-16 04:59:42 +03:00
|
|
|
elif r == WAIT_FAILED:
|
|
|
|
_check(0) # err stored in GetLastError()
|
2014-01-18 00:13:08 +04:00
|
|
|
except: #re-raises
|
|
|
|
ctypes.windll.kernel32.CloseHandle(handle) # no _check, keep error
|
|
|
|
raise
|
|
|
|
_check(ctypes.windll.kernel32.CloseHandle(handle))
|
|
|
|
|
2012-08-19 20:06:15 +04:00
|
|
|
else:
|
|
|
|
def kill(pid, logfn, tryhard=True):
|
|
|
|
try:
|
|
|
|
os.kill(pid, 0)
|
|
|
|
logfn('# Killing daemon process %d' % pid)
|
|
|
|
os.kill(pid, signal.SIGTERM)
|
|
|
|
if tryhard:
|
|
|
|
for i in range(10):
|
|
|
|
time.sleep(0.05)
|
|
|
|
os.kill(pid, 0)
|
|
|
|
else:
|
|
|
|
time.sleep(0.1)
|
|
|
|
os.kill(pid, 0)
|
|
|
|
logfn('# Daemon process %d is stuck - really killing it' % pid)
|
|
|
|
os.kill(pid, signal.SIGKILL)
|
2015-04-12 01:20:44 +03:00
|
|
|
except OSError as err:
|
2012-08-19 20:06:15 +04:00
|
|
|
if err.errno != errno.ESRCH:
|
|
|
|
raise
|
|
|
|
|
2012-08-19 18:41:09 +04:00
|
|
|
def killdaemons(pidfile, tryhard=True, remove=False, logfn=None):
|
|
|
|
if not logfn:
|
|
|
|
logfn = lambda s: s
|
|
|
|
# Kill off any leftover daemon processes
|
|
|
|
try:
|
killdaemons: close pid file before killing processes
With #serve enabled on Windows, I was getting occasional stacktraces like this:
Errored test-hgweb-json.t: Traceback (most recent call last):
File "./run-tests.py", line 724, in run
self.tearDown()
File "./run-tests.py", line 805, in tearDown
killdaemons(entry)
File "./run-tests.py", line 540, in killdaemons
logfn=vlog)
File "...\tests\killdaemons.py", line 94, in killdaemons
os.unlink(pidfile)
WindowsError: [Error 32] The process cannot access the file because it is
being used by another process: '...\\hgtests.zmpqj3\\child80\\daemon.pids'
Adrian suggested using util.posixfile, which works. However, the 'mercurial'
package isn't in sys.path when invoking run-tests.py, and it isn't clear that
hacking[1] it in is a good thing (especially for test-run-tests.t, which uses an
installation in a temp folder).
I tried using ProcessMonitor to figure out what the other process is, but that
monitoring slows things down to such a degree that the issue doesn't occur. I
was ready to blame the virus scanner, but it happens without that too.
Looking at the code, I don't see anything that would have the pid file open.
But I was able to get through about 20 full test runs without an issue with this
minor change, whereas before it was pretty certain to hit this at least once in
two or three runs.
[1] https://www.mercurial-scm.org/pipermail/mercurial-devel/2017-May/097907.html
2017-05-23 04:45:02 +03:00
|
|
|
pids = []
|
|
|
|
with open(pidfile) as fp:
|
|
|
|
for line in fp:
|
|
|
|
try:
|
|
|
|
pid = int(line)
|
|
|
|
if pid <= 0:
|
|
|
|
raise ValueError
|
|
|
|
except ValueError:
|
|
|
|
logfn('# Not killing daemon process %s - invalid pid'
|
|
|
|
% line.rstrip())
|
|
|
|
continue
|
|
|
|
pids.append(pid)
|
|
|
|
for pid in pids:
|
2012-08-19 20:06:15 +04:00
|
|
|
kill(pid, logfn, tryhard)
|
2012-08-19 18:41:09 +04:00
|
|
|
if remove:
|
|
|
|
os.unlink(pidfile)
|
|
|
|
except IOError:
|
|
|
|
pass
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
2015-06-08 22:21:45 +03:00
|
|
|
if len(sys.argv) > 1:
|
|
|
|
path, = sys.argv[1:]
|
|
|
|
else:
|
|
|
|
path = os.environ["DAEMON_PIDS"]
|
|
|
|
|
2012-08-21 00:36:51 +04:00
|
|
|
killdaemons(path)
|