diff options
Diffstat (limited to 'src/coreclr/hosts/corerun')
-rw-r--r-- | src/coreclr/hosts/corerun/.gitmirror | 1 | ||||
-rw-r--r-- | src/coreclr/hosts/corerun/CMakeLists.txt | 38 | ||||
-rw-r--r-- | src/coreclr/hosts/corerun/coreRun.nativeproj | 45 | ||||
-rw-r--r-- | src/coreclr/hosts/corerun/corerun.cpp | 691 | ||||
-rw-r--r-- | src/coreclr/hosts/corerun/logger.cpp | 269 | ||||
-rw-r--r-- | src/coreclr/hosts/corerun/logger.h | 56 | ||||
-rw-r--r-- | src/coreclr/hosts/corerun/native.rc | 8 | ||||
-rw-r--r-- | src/coreclr/hosts/corerun/test.txt | 1 |
8 files changed, 1109 insertions, 0 deletions
diff --git a/src/coreclr/hosts/corerun/.gitmirror b/src/coreclr/hosts/corerun/.gitmirror new file mode 100644 index 0000000000..f507630f94 --- /dev/null +++ b/src/coreclr/hosts/corerun/.gitmirror @@ -0,0 +1 @@ +Only contents of this folder, excluding subfolders, will be mirrored by the Git-TFS Mirror.
\ No newline at end of file diff --git a/src/coreclr/hosts/corerun/CMakeLists.txt b/src/coreclr/hosts/corerun/CMakeLists.txt new file mode 100644 index 0000000000..6868bb12c3 --- /dev/null +++ b/src/coreclr/hosts/corerun/CMakeLists.txt @@ -0,0 +1,38 @@ +project(CoreRun) + +set(CMAKE_INCLUDE_CURRENT_DIR ON) + +set(CoreRun_SOURCES corerun.cpp logger.cpp) +set(CoreRun_RESOURCES native.rc) + +add_definitions(-DFX_VER_INTERNALNAME_STR=CoreRun.exe) + +if(CLR_CMAKE_PLATFORM_UNIX) + # This does not compile on Linux yet + if(CAN_BE_COMPILED_ON_LINUX) + _add_executable(CoreRun + ${CoreRun_SOURCES} + ${CoreRun_RESOURCES} + ) + endif(CAN_BE_COMPILED_ON_LINUX) + +else() + _add_executable(CoreRun + ${CoreRun_SOURCES} + ${CoreRun_RESOURCES} + ) + + target_link_libraries(CoreRun + utilcodestaticnohost + advapi32.lib + oleaut32.lib + uuid.lib + user32.lib + ${STATIC_MT_CRT_LIB} + ${STATIC_MT_VCRT_LIB} + ) + + # Can't compile on linux yet so only add for windows + install_clr(CoreRun) + +endif(CLR_CMAKE_PLATFORM_UNIX)
\ No newline at end of file diff --git a/src/coreclr/hosts/corerun/coreRun.nativeproj b/src/coreclr/hosts/corerun/coreRun.nativeproj new file mode 100644 index 0000000000..87b64a5408 --- /dev/null +++ b/src/coreclr/hosts/corerun/coreRun.nativeproj @@ -0,0 +1,45 @@ +<Project DefaultTargets="Build" xmlns="http://schemas.microsoft.com/developer/msbuild/2003" ToolsVersion="dogfood"> + <!--*****************************************************--> + <!--This MSBuild project file was automatically generated--> + <!--from the original SOURCES/DIRS file by the KBC tool.--> + <!--*****************************************************--> + <!--Import the settings--> + <Import Project="$(_NTDRIVE)$(_NTROOT)\ndp\clr\clr.props" /> + + <!--Leaf project Properties--> + <PropertyGroup> + <BuildCoreBinaries>true</BuildCoreBinaries> + <BuildSysBinaries>true</BuildSysBinaries> + <OutputName>CoreRun</OutputName> + <TargetType>PROGRAM</TargetType> + <LinkSubsystem>console</LinkSubsystem> + <EntryPoint>wmain</EntryPoint> + <ClAdditionalOptions>$(ClAdditionalOptions) -DUNICODE -D_UNICODE</ClAdditionalOptions> + <IsTestNetHost>true</IsTestNetHost> + </PropertyGroup> + + <ItemGroup> + <LinkPreCrtLibs Include="$(ClrLibPath)\utilcodestaticnohost.lib" /> + <ProjectReference Include="$(ClrSrcDirectory)utilcode\staticnohost\staticnohost.nativeproj" /> + </ItemGroup> + <ItemGroup> + <TargetLib Include="$(CoreSystemCrt)" /> + <TargetLib Condition="'$(BuildForWindows7)'=='true'" Include="$(SdkLibPath)\mincore_fw.lib" /> + <TargetLib Condition="'$(BuildForWindows7)'=='true'" Include="$(SdkLibPath)\oleaut32.lib" /> + <TargetLib Condition="'$(BuildForWindows7)'!='true'" Include="$(SdkLibPath)\mincore.lib" /> + <TargetLib Condition="'$(BuildForWindows7)'!='true'" Include="$(SdkLibPath)\mincore_legacy.lib" /> + <TargetLib Condition="'$(BuildForWindows7)'!='true'" Include="$(SdkLibPath)\mincore_private.lib" /> + <TargetLib Condition="'$(BuildForWindows7)'!='true'" Include="$(SdkLibPath)\mincore_obsolete.lib" /> + <TargetLib Include="$(SdkLibPath)\uuid.lib" /> + </ItemGroup> + + <ItemGroup> + <RCResourceFile Include="native.rc" /> + </ItemGroup> + <ItemGroup> + <CppCompile Include="coreRun.cpp" /> + <CppCompile Include="logger.cpp" /> + </ItemGroup> + <!--Import the targets--> + <Import Project="$(_NTDRIVE)$(_NTROOT)\ndp\clr\clr.targets" /> +</Project> diff --git a/src/coreclr/hosts/corerun/corerun.cpp b/src/coreclr/hosts/corerun/corerun.cpp new file mode 100644 index 0000000000..e7ddab21e9 --- /dev/null +++ b/src/coreclr/hosts/corerun/corerun.cpp @@ -0,0 +1,691 @@ +// Licensed to the .NET Foundation under one or more agreements. +// The .NET Foundation licenses this file to you under the MIT license. +// See the LICENSE file in the project root for more information. + + +// +// .A simple CoreCLR host that runs on CoreSystem. +// + +#include "windows.h" +#include <stdio.h> +#include "mscoree.h" +#include <Logger.h> +#include "palclr.h" +#include "sstring.h" + +// Utility macro for testing whether or not a flag is set. +#define HAS_FLAG(value, flag) (((value) & (flag)) == (flag)) + +// Environment variable for setting whether or not to use Server GC. +// Off by default. +static const wchar_t *serverGcVar = W("CORECLR_SERVER_GC"); + +// Environment variable for setting whether or not to use Concurrent GC. +// On by default. +static const wchar_t *concurrentGcVar = W("CORECLR_CONCURRENT_GC"); + +// The name of the CoreCLR native runtime DLL. +static const wchar_t *coreCLRDll = W("CoreCLR.dll"); + +// The location where CoreCLR is expected to be installed. If CoreCLR.dll isn't +// found in the same directory as the host, it will be looked for here. +static const wchar_t *coreCLRInstallDirectory = W("%windir%\\system32\\"); + +// Encapsulates the environment that CoreCLR will run in, including the TPALIST +class HostEnvironment +{ + // The path to this module + PathString m_hostPath; + + // The path to the directory containing this module + PathString m_hostDirectoryPath; + + // The name of this module, without the path + const wchar_t *m_hostExeName; + + // The list of paths to the assemblies that will be trusted by CoreCLR + SString m_tpaList; + + ICLRRuntimeHost2* m_CLRRuntimeHost; + + HMODULE m_coreCLRModule; + + Logger *m_log; + + + // Attempts to load CoreCLR.dll from the given directory. + // On success pins the dll, sets m_coreCLRDirectoryPath and returns the HMODULE. + // On failure returns nullptr. + HMODULE TryLoadCoreCLR(const wchar_t* directoryPath) { + + StackSString coreCLRPath(directoryPath); + coreCLRPath.Append(coreCLRDll); + + *m_log << W("Attempting to load: ") << coreCLRPath.GetUnicode() << Logger::endl; + + HMODULE result = WszLoadLibraryEx(coreCLRPath, NULL, 0); + if (!result) { + *m_log << W("Failed to load: ") << coreCLRPath.GetUnicode() << Logger::endl; + *m_log << W("Error code: ") << GetLastError() << Logger::endl; + return nullptr; + } + + // Pin the module - CoreCLR.dll does not support being unloaded. + HMODULE dummy_coreCLRModule; + if (!::GetModuleHandleExW(GET_MODULE_HANDLE_EX_FLAG_PIN, coreCLRPath, &dummy_coreCLRModule)) { + *m_log << W("Failed to pin: ") << coreCLRPath.GetUnicode() << Logger::endl; + return nullptr; + } + + StackSString coreCLRLoadedPath; + WszGetModuleFileName(result, coreCLRLoadedPath); + + *m_log << W("Loaded: ") << coreCLRLoadedPath.GetUnicode() << Logger::endl; + + return result; + } + +public: + // The path to the directory that CoreCLR is in + PathString m_coreCLRDirectoryPath; + + HostEnvironment(Logger *logger) + : m_log(logger), m_CLRRuntimeHost(nullptr) { + + // Discover the path to this exe's module. All other files are expected to be in the same directory. + WszGetModuleFileName(::GetModuleHandleW(nullptr), m_hostPath); + + // Search for the last backslash in the host path. + SString::CIterator lastBackslash = m_hostPath.End(); + m_hostPath.FindBack(lastBackslash, W('\\')); + + // Copy the directory path + m_hostDirectoryPath.Set(m_hostPath, m_hostPath.Begin(), lastBackslash + 1); + + // Save the exe name + m_hostExeName = m_hostPath.GetUnicode(lastBackslash + 1); + + *m_log << W("Host directory: ") << m_hostDirectoryPath.GetUnicode() << Logger::endl; + + // Check for %CORE_ROOT% and try to load CoreCLR.dll from it if it is set + StackSString coreRoot; + m_coreCLRModule = NULL; // Initialize this here since we don't call TryLoadCoreCLR if CORE_ROOT is unset. + if (WszGetEnvironmentVariable(W("CORE_ROOT"), coreRoot) > 0 && coreRoot.GetCount() > 0) + { + coreRoot.Append(W('\\')); + m_coreCLRModule = TryLoadCoreCLR(coreRoot); + } + else + { + *m_log << W("CORE_ROOT not set; skipping") << Logger::endl; + *m_log << W("You can set the environment variable CORE_ROOT to point to the path") << Logger::endl; + *m_log << W("where CoreCLR.dll lives to help CoreRun.exe find it.") << Logger::endl; + } + + // Try to load CoreCLR from the directory that coreRun is in + if (!m_coreCLRModule) { + m_coreCLRModule = TryLoadCoreCLR(m_hostDirectoryPath); + } + + if (!m_coreCLRModule) { + + // Failed to load. Try to load from the well-known location. + wchar_t coreCLRInstallPath[MAX_LONGPATH]; + ::ExpandEnvironmentStringsW(coreCLRInstallDirectory, coreCLRInstallPath, MAX_LONGPATH); + m_coreCLRModule = TryLoadCoreCLR(coreCLRInstallPath); + + } + + if (m_coreCLRModule) { + + // Save the directory that CoreCLR was found in + DWORD modulePathLength = WszGetModuleFileName(m_coreCLRModule, m_coreCLRDirectoryPath); + + // Search for the last backslash and terminate it there to keep just the directory path with trailing slash + SString::Iterator lastBackslash = m_coreCLRDirectoryPath.End(); + m_coreCLRDirectoryPath.FindBack(lastBackslash, W('\\')); + m_coreCLRDirectoryPath.Truncate(lastBackslash + 1); + + } else { + *m_log << W("Unable to load ") << coreCLRDll << Logger::endl; + } + } + + ~HostEnvironment() { + if(m_coreCLRModule) { + // Free the module. This is done for completeness, but in fact CoreCLR.dll + // was pinned earlier so this call won't actually free it. The pinning is + // done because CoreCLR does not support unloading. + ::FreeLibrary(m_coreCLRModule); + } + } + + bool TPAListContainsFile(_In_z_ wchar_t* fileNameWithoutExtension, _In_reads_(countExtensions) wchar_t** rgTPAExtensions, int countExtensions) + { + if (m_tpaList.IsEmpty()) return false; + + for (int iExtension = 0; iExtension < countExtensions; iExtension++) + { + StackSString fileName; + fileName.Append(W("\\")); // So that we don't match other files that end with the current file name + fileName.Append(fileNameWithoutExtension); + fileName.Append(rgTPAExtensions[iExtension] + 1); + fileName.Append(W(";")); // So that we don't match other files that begin with the current file name + + if (m_tpaList.Find(m_tpaList.Begin(), fileName)) + { + return true; + } + } + return false; + } + + void RemoveExtensionAndNi(_In_z_ wchar_t* fileName) + { + // Remove extension, if it exists + wchar_t* extension = wcsrchr(fileName, W('.')); + if (extension != NULL) + { + extension[0] = W('\0'); + + // Check for .ni + size_t len = wcslen(fileName); + if (len > 3 && + fileName[len - 1] == W('i') && + fileName[len - 2] == W('n') && + fileName[len - 3] == W('.') ) + { + fileName[len - 3] = W('\0'); + } + } + } + + void AddFilesFromDirectoryToTPAList(_In_z_ const wchar_t* targetPath, _In_reads_(countExtensions) wchar_t** rgTPAExtensions, int countExtensions) + { + *m_log << W("Adding assemblies from ") << targetPath << W(" to the TPA list") << Logger::endl; + StackSString assemblyPath; + const size_t dirLength = wcslen(targetPath); + + for (int iExtension = 0; iExtension < countExtensions; iExtension++) + { + assemblyPath.Set(targetPath, (DWORD)dirLength); + assemblyPath.Append(rgTPAExtensions[iExtension]); + WIN32_FIND_DATA data; + HANDLE findHandle = WszFindFirstFile(assemblyPath, &data); + + if (findHandle != INVALID_HANDLE_VALUE) { + do { + if (!(data.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY)) { + // It seems that CoreCLR doesn't always use the first instance of an assembly on the TPA list (ni's may be preferred + // over il, even if they appear later). So, only include the first instance of a simple assembly name to allow + // users the opportunity to override Framework assemblies by placing dlls in %CORE_LIBRARIES% + + // ToLower for case-insensitive comparisons + wchar_t* fileNameChar = data.cFileName; + while (*fileNameChar) + { + *fileNameChar = towlower(*fileNameChar); + fileNameChar++; + } + + // Remove extension + wchar_t fileNameWithoutExtension[MAX_PATH_FNAME]; + wcscpy_s(fileNameWithoutExtension, MAX_PATH_FNAME, data.cFileName); + + RemoveExtensionAndNi(fileNameWithoutExtension); + + // Add to the list if not already on it + if (!TPAListContainsFile(fileNameWithoutExtension, rgTPAExtensions, countExtensions)) + { + assemblyPath.Truncate(assemblyPath.Begin() + (DWORD)dirLength); + assemblyPath.Append(data.cFileName); + m_tpaList.Append(assemblyPath); + m_tpaList.Append(W(';')); + } + else + { + *m_log << W("Not adding ") << targetPath << data.cFileName << W(" to the TPA list because another file with the same name is already present on the list") << Logger::endl; + } + } + } while (0 != WszFindNextFile(findHandle, &data)); + + FindClose(findHandle); + } + } + } + + // Returns the semicolon-separated list of paths to runtime dlls that are considered trusted. + // On first call, scans the coreclr directory for dlls and adds them all to the list. + const wchar_t * GetTpaList() { + if (m_tpaList.IsEmpty()) { + wchar_t *rgTPAExtensions[] = { + W("*.ni.dll"), // Probe for .ni.dll first so that it's preferred if ni and il coexist in the same dir + W("*.dll"), + W("*.ni.exe"), + W("*.exe"), + W("*.ni.winmd") + W("*.winmd") + }; + + // Add files from %CORE_LIBRARIES% if specified + StackSString coreLibraries; + if (WszGetEnvironmentVariable(W("CORE_LIBRARIES"), coreLibraries) > 0 && coreLibraries.GetCount() > 0) + { + coreLibraries.Append(W('\\')); + AddFilesFromDirectoryToTPAList(coreLibraries, rgTPAExtensions, _countof(rgTPAExtensions)); + } + else + { + *m_log << W("CORE_LIBRARIES not set; skipping") << Logger::endl; + *m_log << W("You can set the environment variable CORE_LIBRARIES to point to a") << Logger::endl; + *m_log << W("path containing additional platform assemblies,") << Logger::endl; + } + + AddFilesFromDirectoryToTPAList(m_coreCLRDirectoryPath, rgTPAExtensions, _countof(rgTPAExtensions)); + } + + return m_tpaList; + } + + // Returns the path to the host module + const wchar_t * GetHostPath() { + return m_hostPath; + } + + // Returns the path to the host module + const wchar_t * GetHostExeName() { + return m_hostExeName; + } + + // Returns the ICLRRuntimeHost2 instance, loading it from CoreCLR.dll if necessary, or nullptr on failure. + ICLRRuntimeHost2* GetCLRRuntimeHost() { + if (!m_CLRRuntimeHost) { + + if (!m_coreCLRModule) { + *m_log << W("Unable to load ") << coreCLRDll << Logger::endl; + return nullptr; + } + + *m_log << W("Finding GetCLRRuntimeHost(...)") << Logger::endl; + + FnGetCLRRuntimeHost pfnGetCLRRuntimeHost = + (FnGetCLRRuntimeHost)::GetProcAddress(m_coreCLRModule, "GetCLRRuntimeHost"); + + if (!pfnGetCLRRuntimeHost) { + *m_log << W("Failed to find function GetCLRRuntimeHost in ") << coreCLRDll << Logger::endl; + return nullptr; + } + + *m_log << W("Calling GetCLRRuntimeHost(...)") << Logger::endl; + + HRESULT hr = pfnGetCLRRuntimeHost(IID_ICLRRuntimeHost2, (IUnknown**)&m_CLRRuntimeHost); + if (FAILED(hr)) { + *m_log << W("Failed to get ICLRRuntimeHost2 interface. ERRORCODE: ") << Logger::hresult << hr << Logger::endl; + return nullptr; + } + } + + return m_CLRRuntimeHost; + } + + +}; + +// Creates the startup flags for the runtime, starting with the default startup +// flags and adding or removing from them based on environment variables. Only +// two environment variables are respected right now: serverGcVar, controlling +// Server GC, and concurrentGcVar, controlling Concurrent GC. +STARTUP_FLAGS CreateStartupFlags() { + auto initialFlags = + static_cast<STARTUP_FLAGS>( + STARTUP_FLAGS::STARTUP_LOADER_OPTIMIZATION_SINGLE_DOMAIN | + STARTUP_FLAGS::STARTUP_SINGLE_APPDOMAIN | + STARTUP_FLAGS::STARTUP_CONCURRENT_GC); + + // server GC is off by default, concurrent GC is on by default. + auto checkVariable = [&](STARTUP_FLAGS flag, const wchar_t *var) { + wchar_t result[25]; + size_t outsize; + if (_wgetenv_s(&outsize, result, 25, var) == 0 && outsize > 0) { + // set the flag if the var is present and set to 1, + // clear the flag if the var isp resent and set to 0. + // Otherwise, ignore it. + if (_wcsicmp(result, W("1")) == 0) { + initialFlags = static_cast<STARTUP_FLAGS>(initialFlags | flag); + } else if (_wcsicmp(result, W("0")) == 0) { + initialFlags = static_cast<STARTUP_FLAGS>(initialFlags & ~flag); + } + } + }; + + checkVariable(STARTUP_FLAGS::STARTUP_SERVER_GC, serverGcVar); + checkVariable(STARTUP_FLAGS::STARTUP_CONCURRENT_GC, concurrentGcVar); + + return initialFlags; +} + +bool TryRun(const int argc, const wchar_t* argv[], Logger &log, const bool verbose, const bool waitForDebugger, DWORD &exitCode) +{ + + // Assume failure + exitCode = -1; + + HostEnvironment hostEnvironment(&log); + + //------------------------------------------------------------- + + // Find the specified exe. This is done using LoadLibrary so that + // the OS library search semantics are used to find it. + + const wchar_t* exeName = argc > 0 ? argv[0] : nullptr; + if(exeName == nullptr) + { + log << W("No exename specified.") << Logger::endl; + return false; + } + + StackSString appPath; + StackSString appNiPath; + StackSString managedAssemblyFullName; + StackSString appLocalWinmetadata; + + wchar_t* filePart = NULL; + + COUNT_T size = MAX_LONGPATH; + wchar_t* appPathPtr = appPath.OpenUnicodeBuffer(size - 1); + DWORD length = WszGetFullPathName(exeName, size, appPathPtr, &filePart); + if (length >= size) + { + appPath.CloseBuffer(); + size = length; + appPathPtr = appPath.OpenUnicodeBuffer(size - 1); + length = WszGetFullPathName(exeName, size, appPathPtr, &filePart); + } + if (length == 0 || length >= size) { + log << W("Failed to get full path: ") << exeName << Logger::endl; + log << W("Error code: ") << GetLastError() << Logger::endl; + return false; + } + + managedAssemblyFullName.Set(appPathPtr); + + *(filePart) = W('\0'); + appPath.CloseBuffer(DWORD(filePart - appPathPtr)); + + log << W("Loading: ") << managedAssemblyFullName.GetUnicode() << Logger::endl; + + appLocalWinmetadata.Set(appPath); + appLocalWinmetadata.Append(W("\\WinMetadata")); + + DWORD dwAttrib = WszGetFileAttributes(appLocalWinmetadata); + bool appLocalWinMDexists = dwAttrib != INVALID_FILE_ATTRIBUTES && (dwAttrib & FILE_ATTRIBUTE_DIRECTORY); + + if (!appLocalWinMDexists) { + appLocalWinmetadata.Clear(); + } + appNiPath.Set(appPath); + appNiPath.Append(W("NI")); + appNiPath.Append(W(";")); + appNiPath.Append(appPath); + + // Construct native search directory paths + StackSString nativeDllSearchDirs(appPath); + StackSString coreLibraries; + if (WszGetEnvironmentVariable(W("CORE_LIBRARIES"), coreLibraries) > 0 && coreLibraries.GetCount() > 0) + { + nativeDllSearchDirs.Append(W(";")); + nativeDllSearchDirs.Append(coreLibraries); + } + nativeDllSearchDirs.Append(W(";")); + nativeDllSearchDirs.Append(hostEnvironment.m_coreCLRDirectoryPath); + + // Start the CoreCLR + + ICLRRuntimeHost2 *host = hostEnvironment.GetCLRRuntimeHost(); + if (!host) { + return false; + } + + HRESULT hr; + + + STARTUP_FLAGS flags = CreateStartupFlags(); + log << W("Setting ICLRRuntimeHost2 startup flags") << Logger::endl; + log << W("Server GC enabled: ") << HAS_FLAG(flags, STARTUP_FLAGS::STARTUP_SERVER_GC) << Logger::endl; + log << W("Concurrent GC enabled: ") << HAS_FLAG(flags, STARTUP_FLAGS::STARTUP_CONCURRENT_GC) << Logger::endl; + + // Default startup flags + hr = host->SetStartupFlags(flags); + if (FAILED(hr)) { + log << W("Failed to set startup flags. ERRORCODE: ") << Logger::hresult << hr << Logger::endl; + return false; + } + + log << W("Starting ICLRRuntimeHost2") << Logger::endl; + + hr = host->Start(); + if (FAILED(hr)) { + log << W("Failed to start CoreCLR. ERRORCODE: ") << Logger::hresult << hr << Logger:: endl; + return false; + } + + //------------------------------------------------------------- + + // Create an AppDomain + + // Allowed property names: + // APPBASE + // - The base path of the application from which the exe and other assemblies will be loaded + // + // TRUSTED_PLATFORM_ASSEMBLIES + // - The list of complete paths to each of the fully trusted assemblies + // + // APP_PATHS + // - The list of paths which will be probed by the assembly loader + // + // APP_NI_PATHS + // - The list of additional paths that the assembly loader will probe for ngen images + // + // NATIVE_DLL_SEARCH_DIRECTORIES + // - The list of paths that will be probed for native DLLs called by PInvoke + // + const wchar_t *property_keys[] = { + W("TRUSTED_PLATFORM_ASSEMBLIES"), + W("APP_PATHS"), + W("APP_NI_PATHS"), + W("NATIVE_DLL_SEARCH_DIRECTORIES"), + W("AppDomainCompatSwitch"), + W("APP_LOCAL_WINMETADATA") + }; + const wchar_t *property_values[] = { + // TRUSTED_PLATFORM_ASSEMBLIES + hostEnvironment.GetTpaList(), + // APP_PATHS + appPath, + // APP_NI_PATHS + appNiPath, + // NATIVE_DLL_SEARCH_DIRECTORIES + nativeDllSearchDirs, + // AppDomainCompatSwitch + W("UseLatestBehaviorWhenTFMNotSpecified"), + // APP_LOCAL_WINMETADATA + appLocalWinmetadata + }; + + log << W("Creating an AppDomain") << Logger::endl; + for (int idx = 0; idx < sizeof(property_keys) / sizeof(wchar_t*); idx++) + { + log << property_keys[idx] << W("=") << property_values[idx] << Logger::endl; + } + + DWORD domainId; + + hr = host->CreateAppDomainWithManager( + hostEnvironment.GetHostExeName(), // The friendly name of the AppDomain + // Flags: + // APPDOMAIN_ENABLE_PLATFORM_SPECIFIC_APPS + // - By default CoreCLR only allows platform neutral assembly to be run. To allow + // assemblies marked as platform specific, include this flag + // + // APPDOMAIN_ENABLE_PINVOKE_AND_CLASSIC_COMINTEROP + // - Allows sandboxed applications to make P/Invoke calls and use COM interop + // + // APPDOMAIN_SECURITY_SANDBOXED + // - Enables sandboxing. If not set, the app is considered full trust + // + // APPDOMAIN_IGNORE_UNHANDLED_EXCEPTION + // - Prevents the application from being torn down if a managed exception is unhandled + // + APPDOMAIN_ENABLE_PLATFORM_SPECIFIC_APPS | + APPDOMAIN_ENABLE_PINVOKE_AND_CLASSIC_COMINTEROP | + APPDOMAIN_DISABLE_TRANSPARENCY_ENFORCEMENT, + NULL, // Name of the assembly that contains the AppDomainManager implementation + NULL, // The AppDomainManager implementation type name + sizeof(property_keys)/sizeof(wchar_t*), // The number of properties + property_keys, + property_values, + &domainId); + + if (FAILED(hr)) { + log << W("Failed call to CreateAppDomainWithManager. ERRORCODE: ") << Logger::hresult << hr << Logger::endl; + return false; + } + + if(waitForDebugger) + { + if(!IsDebuggerPresent()) + { + log << W("Waiting for the debugger to attach. Press any key to continue ...") << Logger::endl; + getchar(); + if (IsDebuggerPresent()) + { + log << "Debugger is attached." << Logger::endl; + } + else + { + log << "Debugger failed to attach." << Logger::endl; + } + } + } + + hr = host->ExecuteAssembly(domainId, managedAssemblyFullName, argc-1, (argc-1)?&(argv[1]):NULL, &exitCode); + if (FAILED(hr)) { + log << W("Failed call to ExecuteAssembly. ERRORCODE: ") << Logger::hresult << hr << Logger::endl; + return false; + } + + log << W("App exit value = ") << exitCode << Logger::endl; + + + //------------------------------------------------------------- + + // Unload the AppDomain + + log << W("Unloading the AppDomain") << Logger::endl; + + hr = host->UnloadAppDomain( + domainId, + true); // Wait until done + + if (FAILED(hr)) { + log << W("Failed to unload the AppDomain. ERRORCODE: ") << Logger::hresult << hr << Logger::endl; + return false; + } + + + //------------------------------------------------------------- + + // Stop the host + + log << W("Stopping the host") << Logger::endl; + + hr = host->Stop(); + + if (FAILED(hr)) { + log << W("Failed to stop the host. ERRORCODE: ") << Logger::hresult << hr << Logger::endl; + return false; + } + + //------------------------------------------------------------- + + // Release the reference to the host + + log << W("Releasing ICLRRuntimeHost2") << Logger::endl; + + host->Release(); + + return true; + +} + +void showHelp() { + ::wprintf( + W("Runs executables on CoreCLR\r\n") + W("\r\n") + W("USAGE: coreRun [/d] [/v] Managed.exe\r\n") + W("\r\n") + W(" where Managed.exe is a managed executable built for CoreCLR\r\n") + W(" /v causes verbose output to be written to the console\r\n") + W(" /d causes coreRun to wait for a debugger to attach before\r\n") + W(" launching Managed.exe\r\n") + W("\r\n") + W(" CoreCLR is searched for in %%core_root%%, then in the directory\r\n") + W(" that coreRun.exe is in, then finally in %s.\r\n"), + coreCLRInstallDirectory + ); +} + +int __cdecl wmain(const int argc, const wchar_t* argv[]) +{ + // Parse the options from the command line + + bool verbose = false; + bool waitForDebugger = false; + bool helpRequested = false; + int newArgc = argc - 1; + const wchar_t **newArgv = argv + 1; + + auto stringsEqual = [](const wchar_t * const a, const wchar_t * const b) -> bool { + return ::_wcsicmp(a, b) == 0; + }; + + auto tryParseOption = [&](const wchar_t* arg) -> bool { + if ( stringsEqual(arg, W("/v")) || stringsEqual(arg, W("-v")) ) { + verbose = true; + return true; + } else if ( stringsEqual(arg, W("/d")) || stringsEqual(arg, W("-d")) ) { + waitForDebugger = true; + return true; + } else if ( stringsEqual(arg, W("/?")) || stringsEqual(arg, W("-?")) || stringsEqual(arg, W("-h")) || stringsEqual(arg, W("--help")) ) { + helpRequested = true; + return true; + } else { + return false; + } + }; + + while (newArgc > 0 && tryParseOption(newArgv[0])) { + newArgc--; + newArgv++; + } + + if (argc < 2 || helpRequested || newArgc==0) { + showHelp(); + return -1; + } else { + Logger log; + if (verbose) { + log.Enable(); + } else { + log.Disable(); + } + + DWORD exitCode; + auto success = TryRun(newArgc, newArgv, log, verbose, waitForDebugger, exitCode); + + log << W("Execution ") << (success ? W("succeeded") : W("failed")) << Logger::endl; + + return exitCode; + } +} diff --git a/src/coreclr/hosts/corerun/logger.cpp b/src/coreclr/hosts/corerun/logger.cpp new file mode 100644 index 0000000000..95eb7c9561 --- /dev/null +++ b/src/coreclr/hosts/corerun/logger.cpp @@ -0,0 +1,269 @@ +// Licensed to the .NET Foundation under one or more agreements. +// The .NET Foundation licenses this file to you under the MIT license. +// See the LICENSE file in the project root for more information. + + + +#include <stdio.h> +#include <windows.h> +#include <Logger.h> +#include "palclr.h" + +void Logger::Enable() { + m_isEnabled = true; +} + +void Logger::Disable() { + m_isEnabled = false; +} + +void print(const wchar_t *val) { + // If val is longer than 2048 characters, wprintf will refuse to print it. + // So write it in chunks. + + const size_t chunkSize = 1024; + + wchar_t chunk[chunkSize]; + + auto valLength = ::wcslen(val); + + for (size_t i = 0 ; i < valLength ; i += chunkSize) { + + ::wcsncpy_s(chunk, chunkSize, val + i, _TRUNCATE); + + ::wprintf(W("%s"), chunk); + } +} + +Logger& Logger::operator<< (bool val) { + if (m_isEnabled) { + if (val) { + EnsurePrefixIsPrinted(); + print(W("true")); + } else { + EnsurePrefixIsPrinted(); + print(W("false")); + } + } + return *this; +} +void PrintAsHResult(int val) { + const wchar_t * str = nullptr; + + switch (val) { + case 0x00000000: str = W("S_OK"); break; + case 0x00000001: str = W("S_FALSE"); break; + case 0x8000000B: str = W("E_BOUNDS"); break; + case 0x8000000C: str = W("E_CHANGED_STATE"); break; + case 0x80000013: str = W("RO_E_CLOSED"); break; + case 0x8000211D: str = W("COR_E_AMBIGUOUSMATCH"); break; + case 0x80004001: str = W("E_NOTIMPL"); break; + case 0x80004002: str = W("COR_E_INVALIDCAST"); break; + //case 0x80004002: str = W("E_NOINTERFACE"); break; + case 0x80004003: str = W("COR_E_NULLREFERENCE"); break; + //case 0x80004003: str = W("E_POINTER"); break; + case 0x80004004: str = W("E_ABORT"); break; + case 0x80004005: str = W("E_FAIL"); break; + case 0x8000FFFF: str = W("E_UNEXPECTED"); break; + case 0x8002000a: str = W("DISP_E_OVERFLOW"); break; + case 0x8002000e: str = W("COR_E_TARGETPARAMCOUNT"); break; + case 0x80020012: str = W("COR_E_DIVIDEBYZERO"); break; + case 0x80028ca0: str = W("TYPE_E_TYPEMISMATCH"); break; + case 0x80070005: str = W("COR_E_UNAUTHORIZEDACCESS"); break; + //case 0x80070005: str = W("E_ACCESSDENIED"); break; + case 0x80070006: str = W("E_HANDLE"); break; + case 0x8007000B: str = W("COR_E_BADIMAGEFORMAT"); break; + case 0x8007000E: str = W("COR_E_OUTOFMEMORY"); break; + //case 0x8007000E: str = W("E_OUTOFMEMORY"); break; + case 0x80070057: str = W("COR_E_ARGUMENT"); break; + //case 0x80070057: str = W("E_INVALIDARG"); break; + case 0x80070216: str = W("COR_E_ARITHMETIC"); break; + case 0x800703E9: str = W("COR_E_STACKOVERFLOW"); break; + case 0x80090020: str = W("NTE_FAIL"); break; + case 0x80131013: str = W("COR_E_TYPEUNLOADED"); break; + case 0x80131014: str = W("COR_E_APPDOMAINUNLOADED"); break; + case 0x80131015: str = W("COR_E_CANNOTUNLOADAPPDOMAIN"); break; + case 0x80131040: str = W("FUSION_E_REF_DEF_MISMATCH"); break; + case 0x80131047: str = W("FUSION_E_INVALID_NAME"); break; + case 0x80131416: str = W("CORSEC_E_POLICY_EXCEPTION"); break; + case 0x80131417: str = W("CORSEC_E_MIN_GRANT_FAIL"); break; + case 0x80131418: str = W("CORSEC_E_NO_EXEC_PERM"); break; + //case 0x80131418: str = W("CORSEC_E_XMLSYNTAX"); break; + case 0x80131430: str = W("CORSEC_E_CRYPTO"); break; + case 0x80131431: str = W("CORSEC_E_CRYPTO_UNEX_OPER"); break; + case 0x80131500: str = W("COR_E_EXCEPTION"); break; + case 0x80131501: str = W("COR_E_SYSTEM"); break; + case 0x80131502: str = W("COR_E_ARGUMENTOUTOFRANGE"); break; + case 0x80131503: str = W("COR_E_ARRAYTYPEMISMATCH"); break; + case 0x80131504: str = W("COR_E_CONTEXTMARSHAL"); break; + case 0x80131505: str = W("COR_E_TIMEOUT"); break; + case 0x80131506: str = W("COR_E_EXECUTIONENGINE"); break; + case 0x80131507: str = W("COR_E_FIELDACCESS"); break; + case 0x80131508: str = W("COR_E_INDEXOUTOFRANGE"); break; + case 0x80131509: str = W("COR_E_INVALIDOPERATION"); break; + case 0x8013150A: str = W("COR_E_SECURITY"); break; + case 0x8013150C: str = W("COR_E_SERIALIZATION"); break; + case 0x8013150D: str = W("COR_E_VERIFICATION"); break; + case 0x80131510: str = W("COR_E_METHODACCESS"); break; + case 0x80131511: str = W("COR_E_MISSINGFIELD"); break; + case 0x80131512: str = W("COR_E_MISSINGMEMBER"); break; + case 0x80131513: str = W("COR_E_MISSINGMETHOD"); break; + case 0x80131514: str = W("COR_E_MULTICASTNOTSUPPORTED"); break; + case 0x80131515: str = W("COR_E_NOTSUPPORTED"); break; + case 0x80131516: str = W("COR_E_OVERFLOW"); break; + case 0x80131517: str = W("COR_E_RANK"); break; + case 0x80131518: str = W("COR_E_SYNCHRONIZATIONLOCK"); break; + case 0x80131519: str = W("COR_E_THREADINTERRUPTED"); break; + case 0x8013151A: str = W("COR_E_MEMBERACCESS"); break; + case 0x80131520: str = W("COR_E_THREADSTATE"); break; + case 0x80131521: str = W("COR_E_THREADSTOP"); break; + case 0x80131522: str = W("COR_E_TYPELOAD"); break; + case 0x80131523: str = W("COR_E_ENTRYPOINTNOTFOUND"); break; + //case 0x80131523: str = W("COR_E_UNSUPPORTEDFORMAT"); break; + case 0x80131524: str = W("COR_E_DLLNOTFOUND"); break; + case 0x80131525: str = W("COR_E_THREADSTART"); break; + case 0x80131527: str = W("COR_E_INVALIDCOMOBJECT"); break; + case 0x80131528: str = W("COR_E_NOTFINITENUMBER"); break; + case 0x80131529: str = W("COR_E_DUPLICATEWAITOBJECT"); break; + case 0x8013152B: str = W("COR_E_SEMAPHOREFULL"); break; + case 0x8013152C: str = W("COR_E_WAITHANDLECANNOTBEOPENED"); break; + case 0x8013152D: str = W("COR_E_ABANDONEDMUTEX"); break; + case 0x80131530: str = W("COR_E_THREADABORTED"); break; + case 0x80131531: str = W("COR_E_INVALIDOLEVARIANTTYPE"); break; + case 0x80131532: str = W("COR_E_MISSINGMANIFESTRESOURCE"); break; + case 0x80131533: str = W("COR_E_SAFEARRAYTYPEMISMATCH"); break; + case 0x80131534: str = W("COR_E_TYPEINITIALIZATION"); break; + case 0x80131535: str = W("COR_E_COMEMULATE"); break; + //case 0x80131535: str = W("COR_E_MARSHALDIRECTIVE"); break; + case 0x80131536: str = W("COR_E_MISSINGSATELLITEASSEMBLY"); break; + case 0x80131537: str = W("COR_E_FORMAT"); break; + case 0x80131538: str = W("COR_E_SAFEARRAYRANKMISMATCH"); break; + case 0x80131539: str = W("COR_E_PLATFORMNOTSUPPORTED"); break; + case 0x8013153A: str = W("COR_E_INVALIDPROGRAM"); break; + case 0x8013153B: str = W("COR_E_OPERATIONCANCELED"); break; + case 0x8013153D: str = W("COR_E_INSUFFICIENTMEMORY"); break; + case 0x8013153E: str = W("COR_E_RUNTIMEWRAPPED"); break; + case 0x80131541: str = W("COR_E_DATAMISALIGNED"); break; + case 0x80131543: str = W("COR_E_TYPEACCESS"); break; + case 0x80131577: str = W("COR_E_KEYNOTFOUND"); break; + case 0x80131578: str = W("COR_E_INSUFFICIENTEXECUTIONSTACK"); break; + case 0x80131600: str = W("COR_E_APPLICATION"); break; + case 0x80131601: str = W("COR_E_INVALIDFILTERCRITERIA"); break; + case 0x80131602: str = W("COR_E_REFLECTIONTYPELOAD "); break; + case 0x80131603: str = W("COR_E_TARGET"); break; + case 0x80131604: str = W("COR_E_TARGETINVOCATION"); break; + case 0x80131605: str = W("COR_E_CUSTOMATTRIBUTEFORMAT"); break; + case 0x80131622: str = W("COR_E_OBJECTDISPOSED"); break; + case 0x80131623: str = W("COR_E_SAFEHANDLEMISSINGATTRIBUTE"); break; + case 0x80131640: str = W("COR_E_HOSTPROTECTION"); break; + } + + ::wprintf(W("0x%x"), val); + + if (str != nullptr) { + ::wprintf(W("/%0s"), str); + } + +} + +Logger& Logger::operator<< (int val) { + + if (m_isEnabled) { + + EnsurePrefixIsPrinted(); + + if (m_formatHRESULT) { + + PrintAsHResult(val); + m_formatHRESULT = false; + + } else { + + ::wprintf(W("%d"), val); + + } + } + + return *this; +} + +#ifdef _MSC_VER +Logger& Logger::operator<< (long val) { + if (m_isEnabled) { + EnsurePrefixIsPrinted(); + + if (m_formatHRESULT) { + + PrintAsHResult(val); + m_formatHRESULT = false; + + } else { + + ::wprintf(W("%d"), val); + + } + } + return *this; +} + +Logger& Logger::operator<< (unsigned long val) { + if (m_isEnabled) { + EnsurePrefixIsPrinted(); + + if (m_formatHRESULT) { + + PrintAsHResult(val); + m_formatHRESULT = false; + + } else { + + ::wprintf(W("%d"), val); + + } + } + return *this; +} +#endif + +Logger& Logger::operator<< (const wchar_t *val) { + if (m_isEnabled) { + EnsurePrefixIsPrinted(); + print(val); + } + return *this; +} + +Logger& Logger::operator<< (Logger& ( *pf )(Logger&)) { + if (m_isEnabled) { + return pf(*this); + } else { + return *this; + } +} + +void Logger::EnsurePrefixIsPrinted() { + if (this->m_isEnabled && this->m_prefixRequired) { + print(W(" HOSTLOG: ")); + m_prefixRequired = false; + } +} + +// Manipulators + +// Newline +Logger& Logger::endl (Logger& log) { + if (log.m_isEnabled) { + log.EnsurePrefixIsPrinted(); + print(W("\r\n")); + log.m_prefixRequired = true; + log.m_formatHRESULT = false; + } + return log; +} + +// Format the next integer value as an HResult +Logger& Logger::hresult (Logger& log) { + log.m_formatHRESULT = true; + return log; +} + diff --git a/src/coreclr/hosts/corerun/logger.h b/src/coreclr/hosts/corerun/logger.h new file mode 100644 index 0000000000..510f3bc97b --- /dev/null +++ b/src/coreclr/hosts/corerun/logger.h @@ -0,0 +1,56 @@ +// Licensed to the .NET Foundation under one or more agreements. +// The .NET Foundation licenses this file to you under the MIT license. +// See the LICENSE file in the project root for more information. + + +// +// Logger for the CoreCLR host ccrun. +// Relies on the SYSCRT and therefore cannot use C++ libraries. +// + + +class Logger { + bool m_isEnabled; + bool m_prefixRequired; + bool m_formatHRESULT; + +public: + Logger() : + m_isEnabled(true), + m_prefixRequired(true), + m_formatHRESULT(false) { } + + ~Logger() { } + + // Enables output from the logger + void Enable(); + + // Disables output from the logger + void Disable(); + + + Logger& operator<< (bool val); + Logger& operator<< (short val); + Logger& operator<< (unsigned short val); + Logger& operator<< (int val); + Logger& operator<< (unsigned int val); +#ifdef _MSC_VER + Logger& operator<< (long val); + Logger& operator<< (unsigned long val); +#endif + Logger& operator<< (float val); + Logger& operator<< (double val); + Logger& operator<< (long double val); + Logger& operator<< (const wchar_t* val); + Logger& operator<< (Logger& ( *pf )(Logger&)); + static Logger& endl ( Logger& log ); + static Logger& hresult ( Logger& log); + +private: + void EnsurePrefixIsPrinted(); +}; + + + + + diff --git a/src/coreclr/hosts/corerun/native.rc b/src/coreclr/hosts/corerun/native.rc new file mode 100644 index 0000000000..5ad4f9893a --- /dev/null +++ b/src/coreclr/hosts/corerun/native.rc @@ -0,0 +1,8 @@ +// Licensed to the .NET Foundation under one or more agreements. +// The .NET Foundation licenses this file to you under the MIT license. +// See the LICENSE file in the project root for more information. + +#define FX_VER_FILEDESCRIPTION_STR "Microsoft CoreCLR EXE launcher\0" + +#include <fxver.h> +#include <fxver.rc> diff --git a/src/coreclr/hosts/corerun/test.txt b/src/coreclr/hosts/corerun/test.txt new file mode 100644 index 0000000000..037873ba55 --- /dev/null +++ b/src/coreclr/hosts/corerun/test.txt @@ -0,0 +1 @@ +time 2 |