2001-09-11 22:01:02 +02:00
|
|
|
/* init.cc
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2005-02-20 05:25:33 +01:00
|
|
|
Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005
|
|
|
|
Red Hat, Inc.
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
|
|
|
|
#include "winsup.h"
|
2000-08-02 18:28:18 +02:00
|
|
|
#include <stdlib.h>
|
2000-08-22 07:10:20 +02:00
|
|
|
#include "thread.h"
|
2000-09-08 04:56:55 +02:00
|
|
|
#include "perprocess.h"
|
2003-11-28 21:55:59 +01:00
|
|
|
#include "cygtls.h"
|
2004-12-27 03:13:30 +01:00
|
|
|
#include "pinfo.h"
|
2005-08-14 21:48:07 +02:00
|
|
|
#include <ntdef.h>
|
|
|
|
#include "ntdll.h"
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
int NO_COPY dynamically_loaded;
|
2004-01-14 16:45:37 +01:00
|
|
|
static char *search_for = (char *) cygthread::stub;
|
2005-06-09 21:29:27 +02:00
|
|
|
unsigned threadfunc_ix[8] __attribute__((section (".cygwin_dll_common"), shared));
|
2004-01-14 16:45:37 +01:00
|
|
|
DWORD tls_func;
|
|
|
|
|
|
|
|
HANDLE sync_startup;
|
|
|
|
|
|
|
|
#define OLDFUNC_OFFSET -1
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2003-12-14 08:09:22 +01:00
|
|
|
static void WINAPI
|
|
|
|
threadfunc_fe (VOID *arg)
|
|
|
|
{
|
2004-04-30 15:27:27 +02:00
|
|
|
(void)__builtin_return_address(1);
|
|
|
|
asm volatile ("andl $-16,%%esp" ::: "%esp");
|
2004-02-12 04:01:58 +01:00
|
|
|
_cygtls::call ((DWORD (*) (void *, void *)) (((char **) _tlsbase)[OLDFUNC_OFFSET]), arg);
|
2004-01-14 16:45:37 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static DWORD WINAPI
|
|
|
|
calibration_thread (VOID *arg)
|
|
|
|
{
|
|
|
|
ExitThread (0);
|
2003-12-14 08:09:22 +01:00
|
|
|
}
|
|
|
|
|
2004-01-20 00:03:43 +01:00
|
|
|
/* We need to know where the OS stores the address of the thread function
|
|
|
|
on the stack so that we can intercept the call and insert some tls
|
|
|
|
stuff on the stack. This function starts a known calibration thread.
|
|
|
|
When it starts, a call will be made to dll_entry which will call munge_threadfunc
|
|
|
|
looking for the calibration thread offset on the stack. This offset will
|
|
|
|
be stored and used by all executing cygwin processes. */
|
|
|
|
void
|
|
|
|
prime_threads ()
|
|
|
|
{
|
2004-03-22 19:30:38 +01:00
|
|
|
if (!threadfunc_ix[0])
|
2004-01-20 00:03:43 +01:00
|
|
|
{
|
|
|
|
DWORD id;
|
|
|
|
search_for = (char *) calibration_thread;
|
|
|
|
sync_startup = CreateThread (NULL, 0, calibration_thread, 0, 0, &id);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If possible, redirect the thread entry point to a cygwin routine which
|
|
|
|
adds tls stuff to the stack. */
|
2003-12-14 08:09:22 +01:00
|
|
|
static void
|
2004-02-13 20:34:32 +01:00
|
|
|
munge_threadfunc ()
|
2003-12-14 08:09:22 +01:00
|
|
|
{
|
2004-03-22 19:30:38 +01:00
|
|
|
int i;
|
2004-01-14 16:45:37 +01:00
|
|
|
char **ebp = (char **) __builtin_frame_address (0);
|
2004-03-22 19:30:38 +01:00
|
|
|
if (!threadfunc_ix[0])
|
2003-12-14 08:09:22 +01:00
|
|
|
{
|
2004-03-22 19:30:38 +01:00
|
|
|
char **peb;
|
|
|
|
char **top = (char **) _tlsbase;
|
|
|
|
for (peb = ebp, i = 0; peb < top && i < 7; peb++)
|
2004-01-14 16:45:37 +01:00
|
|
|
if (*peb == search_for)
|
2004-03-22 19:30:38 +01:00
|
|
|
threadfunc_ix[i++] = peb - ebp;
|
|
|
|
if (!threadfunc_ix[0])
|
|
|
|
{
|
|
|
|
try_to_debug ();
|
|
|
|
return;
|
|
|
|
}
|
2003-12-14 08:09:22 +01:00
|
|
|
}
|
|
|
|
|
2004-03-22 19:30:38 +01:00
|
|
|
char *threadfunc = ebp[threadfunc_ix[0]];
|
2004-01-14 16:45:37 +01:00
|
|
|
if (threadfunc == (char *) calibration_thread)
|
|
|
|
/* no need for the overhead */;
|
|
|
|
else
|
|
|
|
{
|
2004-05-28 21:50:07 +02:00
|
|
|
for (i = 0; threadfunc_ix[i]; i++)
|
2004-03-22 19:30:38 +01:00
|
|
|
ebp[threadfunc_ix[i]] = (char *) threadfunc_fe;
|
2004-01-14 16:45:37 +01:00
|
|
|
((char **) _tlsbase)[OLDFUNC_OFFSET] = threadfunc;
|
|
|
|
}
|
2003-12-14 08:09:22 +01:00
|
|
|
}
|
|
|
|
|
2005-08-14 21:48:07 +02:00
|
|
|
inline static void
|
2004-07-24 11:41:34 +02:00
|
|
|
respawn_wow64_process ()
|
|
|
|
{
|
2005-08-14 21:48:07 +02:00
|
|
|
NTSTATUS ret;
|
|
|
|
PROCESS_BASIC_INFORMATION pbi;
|
|
|
|
HANDLE parent;
|
|
|
|
|
|
|
|
BOOL is_wow64_proc = TRUE; /* Opt on the safe side. */
|
|
|
|
|
|
|
|
/* Unfortunately there's no simpler way to retrieve the
|
|
|
|
parent process in NT, as far as I know. Hints welcome. */
|
|
|
|
ret = NtQueryInformationProcess (GetCurrentProcess (),
|
|
|
|
ProcessBasicInformation,
|
|
|
|
(PVOID) &pbi,
|
|
|
|
sizeof pbi, NULL);
|
|
|
|
if (ret == STATUS_SUCCESS
|
|
|
|
&& (parent = OpenProcess (PROCESS_QUERY_INFORMATION,
|
|
|
|
FALSE,
|
|
|
|
pbi.InheritedFromUniqueProcessId)))
|
|
|
|
{
|
|
|
|
IsWow64Process (parent, &is_wow64_proc);
|
|
|
|
CloseHandle (parent);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The parent is a real 64 bit process? Respawn! */
|
|
|
|
if (!is_wow64_proc)
|
|
|
|
{
|
|
|
|
PROCESS_INFORMATION pi;
|
|
|
|
STARTUPINFO si;
|
|
|
|
GetStartupInfo (&si);
|
|
|
|
if (!CreateProcessA (NULL, GetCommandLineA (), NULL, NULL, TRUE,
|
|
|
|
CREATE_DEFAULT_ERROR_MODE
|
|
|
|
| GetPriorityClass (GetCurrentProcess ()),
|
|
|
|
NULL, NULL, &si, &pi))
|
|
|
|
api_fatal ("Failed to create process <%s>, %E", GetCommandLineA ());
|
|
|
|
CloseHandle (pi.hThread);
|
|
|
|
if (WaitForSingleObject (pi.hProcess, INFINITE) == WAIT_FAILED)
|
|
|
|
api_fatal ("Waiting for process %d failed, %E", pi.dwProcessId);
|
|
|
|
CloseHandle (pi.hProcess);
|
|
|
|
ExitProcess (0);
|
|
|
|
}
|
2004-07-24 11:41:34 +02:00
|
|
|
}
|
|
|
|
|
2004-01-14 16:45:37 +01:00
|
|
|
extern void __stdcall dll_crt0_0 ();
|
|
|
|
|
2005-03-22 20:00:31 +01:00
|
|
|
HMODULE NO_COPY cygwin_hmodule;
|
|
|
|
|
2003-12-14 08:09:22 +01:00
|
|
|
extern "C" int WINAPI
|
|
|
|
dll_entry (HANDLE h, DWORD reason, void *static_load)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2005-08-14 21:48:07 +02:00
|
|
|
BOOL is_wow64_proc = FALSE;
|
2004-07-24 11:41:34 +02:00
|
|
|
|
2000-02-17 20:38:33 +01:00
|
|
|
switch (reason)
|
|
|
|
{
|
|
|
|
case DLL_PROCESS_ATTACH:
|
2005-03-22 20:00:31 +01:00
|
|
|
cygwin_hmodule = (HMODULE) h;
|
2005-05-17 03:21:06 +02:00
|
|
|
dynamically_loaded = (static_load == NULL);
|
2005-09-07 05:10:17 +02:00
|
|
|
init_console_handler (TRUE);
|
2005-08-14 21:48:07 +02:00
|
|
|
|
|
|
|
/* Is the stack at an unusual address? This is, an address which
|
|
|
|
is in the usual space occupied by the process image, but below
|
|
|
|
the auto load address of DLLs?
|
|
|
|
Check if we're running in WOW64 on a 64 bit machine *and* are
|
|
|
|
spawned by a genuine 64 bit process. If so, respawn. */
|
|
|
|
if (&is_wow64_proc >= (PBOOL) 0x400000
|
|
|
|
&& &is_wow64_proc <= (PBOOL) 0x10000000
|
|
|
|
&& IsWow64Process (hMainProc, &is_wow64_proc)
|
|
|
|
&& is_wow64_proc)
|
2004-07-24 11:41:34 +02:00
|
|
|
respawn_wow64_process ();
|
|
|
|
|
2004-01-14 16:45:37 +01:00
|
|
|
prime_threads ();
|
|
|
|
dll_crt0_0 ();
|
2000-02-17 20:38:33 +01:00
|
|
|
break;
|
2002-10-07 06:12:54 +02:00
|
|
|
case DLL_PROCESS_DETACH:
|
|
|
|
break;
|
2000-02-17 20:38:33 +01:00
|
|
|
case DLL_THREAD_ATTACH:
|
2004-02-13 20:34:32 +01:00
|
|
|
munge_threadfunc ();
|
2000-02-17 20:38:33 +01:00
|
|
|
break;
|
2003-12-26 05:40:52 +01:00
|
|
|
case DLL_THREAD_DETACH:
|
2004-01-14 16:45:37 +01:00
|
|
|
_my_tls.remove (0);
|
2003-12-26 05:40:52 +01:00
|
|
|
break;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|