(fix_submap_inheritance, get_keyelt, store_in_keymap,
[bpt/emacs.git] / src / unexw32.c
CommitLineData
3b7ad313 1/* unexec for GNU Emacs on Windows NT.
2147fb50
KH
2 Copyright (C) 1994 Free Software Foundation, Inc.
3
3b7ad313 4This file is part of GNU Emacs.
2147fb50 5
3b7ad313
EN
6GNU Emacs is free software; you can redistribute it and/or modify
7it under the terms of the GNU General Public License as published by
8the Free Software Foundation; either version 2, or (at your option)
9any later version.
2147fb50 10
3b7ad313
EN
11GNU Emacs is distributed in the hope that it will be useful,
12but WITHOUT ANY WARRANTY; without even the implied warranty of
13MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14GNU General Public License for more details.
2147fb50 15
3b7ad313
EN
16You should have received a copy of the GNU General Public License
17along with GNU Emacs; see the file COPYING. If not, write to
18the Free Software Foundation, Inc., 59 Temple Place - Suite 330,
19Boston, MA 02111-1307, USA.
2147fb50
KH
20
21 Geoff Voelker (voelker@cs.washington.edu) 8-12-94
22*/
23
43640c4d
GV
24#include <config.h>
25
2147fb50
KH
26#include <stdlib.h> /* _fmode */
27#include <stdio.h>
28#include <fcntl.h>
43640c4d 29#include <time.h>
2147fb50
KH
30#include <windows.h>
31
43640c4d
GV
32/* Include relevant definitions from IMAGEHLP.H, which can be found
33 in \\win32sdk\mstools\samples\image\include\imagehlp.h. */
2147fb50 34
43640c4d
GV
35PIMAGE_NT_HEADERS
36(__stdcall * pfnCheckSumMappedFile) (LPVOID BaseAddress,
37 DWORD FileLength,
38 LPDWORD HeaderSum,
39 LPDWORD CheckSum);
2147fb50 40
43640c4d
GV
41extern BOOL ctrl_c_handler (unsigned long type);
42
43extern char my_begdata[];
44extern char my_edata[];
45extern char my_begbss[];
46extern char my_endbss[];
2147fb50 47
43640c4d 48#include "w32heap.h"
e54c8cd1 49
2147fb50
KH
50/* Basically, our "initialized" flag. */
51BOOL need_to_recreate_heap = FALSE;
52
53/* So we can find our heap in the file to recreate it. */
54unsigned long heap_index_in_executable = 0;
55
43640c4d
GV
56int open_input_file (file_data *p_file, char *name);
57int open_output_file (file_data *p_file, char *name, unsigned long size);
2147fb50
KH
58void close_file_data (file_data *p_file);
59
60void get_section_info (file_data *p_file);
61void copy_executable_and_dump_data_section (file_data *, file_data *);
62void dump_bss_and_heap (file_data *p_infile, file_data *p_outfile);
63
64/* Cached info about the .data section in the executable. */
65PUCHAR data_start_va = 0;
66DWORD data_start_file = 0;
67DWORD data_size = 0;
68
69/* Cached info about the .bss section in the executable. */
70PUCHAR bss_start = 0;
71DWORD bss_size = 0;
72
cd6885f3
GV
73#ifdef HAVE_NTGUI
74HINSTANCE hinst = NULL;
75HINSTANCE hprevinst = NULL;
76LPSTR lpCmdLine = "";
77int nCmdShow = 0;
cd6885f3
GV
78#endif /* HAVE_NTGUI */
79
2147fb50
KH
80/* Startup code for running on NT. When we are running as the dumped
81 version, we need to bootstrap our heap and .bss section into our
82 address space before we can actually hand off control to the startup
83 code supplied by NT (primarily because that code relies upon malloc ()). */
84void
85_start (void)
86{
87 extern void mainCRTStartup (void);
88
43640c4d
GV
89#if 0
90 /* Give us a way to debug problems with crashes on startup when
91 running under the MSVC profiler. */
92 if (GetEnvironmentVariable ("EMACS_DEBUG", NULL, 0) > 0)
93 DebugBreak ();
94#endif
95
2147fb50
KH
96 /* Cache system info, e.g., the NT page size. */
97 cache_system_info ();
98
99 /* If we're a dumped version of emacs then we need to recreate
100 our heap and play tricks with our .bss section. Do this before
101 start up. (WARNING: Do not put any code before this section
102 that relies upon malloc () and runs in the dumped version. It
103 won't work.) */
104 if (need_to_recreate_heap)
105 {
106 char executable_path[MAX_PATH];
107
108 if (GetModuleFileName (NULL, executable_path, MAX_PATH) == 0)
109 {
110 printf ("Failed to find path for executable.\n");
111 exit (1);
112 }
43640c4d
GV
113
114#if 1
115 /* To allow profiling, make sure executable_path names the .exe
116 file, not the ._xe file created by the profiler which contains
117 extra code that makes the stored exe offsets incorrect. (This
118 will not be necessary when unexec properly extends the .bss (or
119 .data as appropriate) section to include the dumped bss data,
120 and dumps the heap into a proper section of its own.) */
121 {
122 char * p = strrchr (executable_path, '.');
123 if (p && p[1] == '_')
124 p[1] = 'e';
125 }
126
127 /* Using HiProf profiler, exe name is different still. */
128 {
129 char * p = strrchr (executable_path, '\\');
130 strcpy (p, "\\emacs.exe");
131 }
132#endif
133
2147fb50
KH
134 recreate_heap (executable_path);
135 need_to_recreate_heap = FALSE;
136 }
43640c4d
GV
137 else
138 {
139 /* Grab our malloc arena space now, before CRT starts up. */
140 sbrk (0);
141 }
2147fb50
KH
142
143 /* The default behavior is to treat files as binary and patch up
144 text files appropriately, in accordance with the MSDOS code. */
145 _fmode = O_BINARY;
146
147 /* This prevents ctrl-c's in shells running while we're suspended from
148 having us exit. */
149 SetConsoleCtrlHandler ((PHANDLER_ROUTINE) ctrl_c_handler, TRUE);
150
151 /* Invoke the NT CRT startup routine now that our housecleaning
152 is finished. */
cd6885f3 153#ifdef HAVE_NTGUI
c2ccbd43
GV
154 /* determine WinMain args like crt0.c does */
155 hinst = GetModuleHandle(NULL);
156 lpCmdLine = GetCommandLine();
157 nCmdShow = SW_SHOWDEFAULT;
158#endif
2147fb50
KH
159 mainCRTStartup ();
160}
161
8e6208c5 162/* Dump out .data and .bss sections into a new executable. */
2147fb50
KH
163void
164unexec (char *new_name, char *old_name, void *start_data, void *start_bss,
165 void *entry_address)
166{
167 file_data in_file, out_file;
168 char out_filename[MAX_PATH], in_filename[MAX_PATH];
169 unsigned long size;
170 char *ptr;
171
172 /* Make sure that the input and output filenames have the
173 ".exe" extension...patch them up if they don't. */
174 strcpy (in_filename, old_name);
175 ptr = in_filename + strlen (in_filename) - 4;
176 if (strcmp (ptr, ".exe"))
177 strcat (in_filename, ".exe");
178
179 strcpy (out_filename, new_name);
180 ptr = out_filename + strlen (out_filename) - 4;
181 if (strcmp (ptr, ".exe"))
182 strcat (out_filename, ".exe");
183
184 printf ("Dumping from %s\n", in_filename);
185 printf (" to %s\n", out_filename);
186
187 /* We need to round off our heap to NT's allocation unit (64KB). */
188 round_heap (get_allocation_unit ());
189
190 /* Open the undumped executable file. */
43640c4d
GV
191 if (!open_input_file (&in_file, in_filename))
192 {
193 printf ("Failed to open %s (%d)...bailing.\n",
194 in_filename, GetLastError ());
195 exit (1);
196 }
2147fb50
KH
197
198 /* Get the interesting section info, like start and size of .bss... */
199 get_section_info (&in_file);
200
201 /* The size of the dumped executable is the size of the original
202 executable plus the size of the heap and the size of the .bss section. */
198fdd15
GV
203 heap_index_in_executable = (unsigned long)
204 round_to_next ((unsigned char *) in_file.size, get_allocation_unit ());
2147fb50 205 size = heap_index_in_executable + get_committed_heap_size () + bss_size;
43640c4d
GV
206 if (!open_output_file (&out_file, out_filename, size))
207 {
208 printf ("Failed to open %s (%d)...bailing.\n",
209 out_filename, GetLastError ());
210 exit (1);
211 }
2147fb50
KH
212
213 /* Set the flag (before dumping). */
214 need_to_recreate_heap = TRUE;
215
216 copy_executable_and_dump_data_section (&in_file, &out_file);
217 dump_bss_and_heap (&in_file, &out_file);
218
43640c4d
GV
219 /* Patch up header fields; profiler is picky about this. */
220 {
221 PIMAGE_DOS_HEADER dos_header;
222 PIMAGE_NT_HEADERS nt_header;
223 HANDLE hImagehelp = LoadLibrary ("imagehlp.dll");
224 DWORD headersum;
225 DWORD checksum;
226
227 dos_header = (PIMAGE_DOS_HEADER) out_file.file_base;
228 nt_header = (PIMAGE_NT_HEADERS) ((char *) dos_header + dos_header->e_lfanew);
229
230 nt_header->OptionalHeader.CheckSum = 0;
231// nt_header->FileHeader.TimeDateStamp = time (NULL);
232// dos_header->e_cp = size / 512;
233// nt_header->OptionalHeader.SizeOfImage = size;
234
235 pfnCheckSumMappedFile = (void *) GetProcAddress (hImagehelp, "CheckSumMappedFile");
236 if (pfnCheckSumMappedFile)
237 {
238// nt_header->FileHeader.TimeDateStamp = time (NULL);
239 pfnCheckSumMappedFile (out_file.file_base,
240 out_file.size,
241 &headersum,
242 &checksum);
243 nt_header->OptionalHeader.CheckSum = checksum;
244 }
245 FreeLibrary (hImagehelp);
246 }
247
2147fb50
KH
248 close_file_data (&in_file);
249 close_file_data (&out_file);
250}
251
252
253/* File handling. */
254
255
43640c4d 256int
2147fb50
KH
257open_input_file (file_data *p_file, char *filename)
258{
259 HANDLE file;
260 HANDLE file_mapping;
261 void *file_base;
262 unsigned long size, upper_size;
263
264 file = CreateFile (filename, GENERIC_READ, FILE_SHARE_READ, NULL,
265 OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
266 if (file == INVALID_HANDLE_VALUE)
43640c4d 267 return FALSE;
2147fb50
KH
268
269 size = GetFileSize (file, &upper_size);
270 file_mapping = CreateFileMapping (file, NULL, PAGE_READONLY,
271 0, size, NULL);
272 if (!file_mapping)
43640c4d 273 return FALSE;
2147fb50
KH
274
275 file_base = MapViewOfFile (file_mapping, FILE_MAP_READ, 0, 0, size);
276 if (file_base == 0)
43640c4d 277 return FALSE;
2147fb50
KH
278
279 p_file->name = filename;
280 p_file->size = size;
281 p_file->file = file;
282 p_file->file_mapping = file_mapping;
283 p_file->file_base = file_base;
43640c4d
GV
284
285 return TRUE;
2147fb50
KH
286}
287
43640c4d 288int
2147fb50
KH
289open_output_file (file_data *p_file, char *filename, unsigned long size)
290{
291 HANDLE file;
292 HANDLE file_mapping;
293 void *file_base;
cd6885f3 294
2147fb50
KH
295 file = CreateFile (filename, GENERIC_READ | GENERIC_WRITE, 0, NULL,
296 CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, 0);
297 if (file == INVALID_HANDLE_VALUE)
43640c4d
GV
298 return FALSE;
299
2147fb50
KH
300 file_mapping = CreateFileMapping (file, NULL, PAGE_READWRITE,
301 0, size, NULL);
302 if (!file_mapping)
43640c4d 303 return FALSE;
2147fb50
KH
304
305 file_base = MapViewOfFile (file_mapping, FILE_MAP_WRITE, 0, 0, size);
306 if (file_base == 0)
43640c4d 307 return FALSE;
2147fb50
KH
308
309 p_file->name = filename;
310 p_file->size = size;
311 p_file->file = file;
312 p_file->file_mapping = file_mapping;
313 p_file->file_base = file_base;
43640c4d
GV
314
315 return TRUE;
2147fb50
KH
316}
317
318/* Close the system structures associated with the given file. */
43640c4d 319void
2147fb50
KH
320close_file_data (file_data *p_file)
321{
322 UnmapViewOfFile (p_file->file_base);
323 CloseHandle (p_file->file_mapping);
324 CloseHandle (p_file->file);
325}
326
327
328/* Routines to manipulate NT executable file sections. */
329
a610993d
GV
330static void
331get_bss_info_from_map_file (file_data *p_infile, PUCHAR *p_bss_start,
332 DWORD *p_bss_size)
333{
334 int n, start, len;
335 char map_filename[MAX_PATH];
336 char buffer[256];
337 FILE *map;
338
339 /* Overwrite the .exe extension on the executable file name with
340 the .map extension. */
341 strcpy (map_filename, p_infile->name);
342 n = strlen (map_filename) - 3;
343 strcpy (&map_filename[n], "map");
344
345 map = fopen (map_filename, "r");
346 if (!map)
347 {
348 printf ("Failed to open map file %s, error %d...bailing out.\n",
349 map_filename, GetLastError ());
350 exit (-1);
351 }
352
353 while (fgets (buffer, sizeof (buffer), map))
354 {
355 if (!(strstr (buffer, ".bss") && strstr (buffer, "DATA")))
356 continue;
357 n = sscanf (buffer, " %*d:%x %x", &start, &len);
358 if (n != 2)
359 {
360 printf ("Failed to scan the .bss section line:\n%s", buffer);
361 exit (-1);
362 }
363 break;
364 }
365 *p_bss_start = (PUCHAR) start;
366 *p_bss_size = (DWORD) len;
367}
2147fb50 368
43640c4d 369unsigned long
2147fb50
KH
370get_section_size (PIMAGE_SECTION_HEADER p_section)
371{
43640c4d
GV
372 /* The true section size, before rounding. Some linkers swap the
373 meaning of these two values. */
374 return min (p_section->SizeOfRawData,
375 p_section->Misc.VirtualSize);
376}
377
378/* Return pointer to section header for named section. */
379IMAGE_SECTION_HEADER *
380find_section (char * name, IMAGE_NT_HEADERS * nt_header)
381{
382 PIMAGE_SECTION_HEADER section;
383 int i;
384
385 section = IMAGE_FIRST_SECTION (nt_header);
386
387 for (i = 0; i < nt_header->FileHeader.NumberOfSections; i++)
388 {
389 if (strcmp (section->Name, name) == 0)
390 return section;
391 section++;
392 }
393 return NULL;
394}
395
396/* Return pointer to section header for section containing the given
397 relative virtual address. */
398IMAGE_SECTION_HEADER *
399rva_to_section (DWORD rva, IMAGE_NT_HEADERS * nt_header)
400{
401 PIMAGE_SECTION_HEADER section;
402 int i;
403
404 section = IMAGE_FIRST_SECTION (nt_header);
405
406 for (i = 0; i < nt_header->FileHeader.NumberOfSections; i++)
2147fb50 407 {
43640c4d
GV
408 if (rva >= section->VirtualAddress
409 && rva < section->VirtualAddress + section->SizeOfRawData)
410 return section;
411 section++;
2147fb50 412 }
43640c4d 413 return NULL;
2147fb50
KH
414}
415
43640c4d 416
2147fb50
KH
417/* Flip through the executable and cache the info necessary for dumping. */
418static void
419get_section_info (file_data *p_infile)
420{
421 PIMAGE_DOS_HEADER dos_header;
422 PIMAGE_NT_HEADERS nt_header;
a610993d 423 PIMAGE_SECTION_HEADER section, data_section;
2147fb50
KH
424 unsigned char *ptr;
425 int i;
426
427 dos_header = (PIMAGE_DOS_HEADER) p_infile->file_base;
428 if (dos_header->e_magic != IMAGE_DOS_SIGNATURE)
429 {
430 printf ("Unknown EXE header in %s...bailing.\n", p_infile->name);
431 exit (1);
432 }
433 nt_header = (PIMAGE_NT_HEADERS) (((unsigned long) dos_header) +
434 dos_header->e_lfanew);
435 if (nt_header == NULL)
436 {
437 printf ("Failed to find IMAGE_NT_HEADER in %s...bailing.\n",
438 p_infile->name);
439 exit (1);
440 }
441
442 /* Check the NT header signature ... */
443 if (nt_header->Signature != IMAGE_NT_SIGNATURE)
444 {
445 printf ("Invalid IMAGE_NT_SIGNATURE 0x%x in %s...bailing.\n",
446 nt_header->Signature, p_infile->name);
447 }
448
449 /* Flip through the sections for .data and .bss ... */
450 section = (PIMAGE_SECTION_HEADER) IMAGE_FIRST_SECTION (nt_header);
451 for (i = 0; i < nt_header->FileHeader.NumberOfSections; i++)
452 {
43640c4d 453#ifdef SEPARATE_BSS_SECTION
2147fb50
KH
454 if (!strcmp (section->Name, ".bss"))
455 {
456 /* The .bss section. */
457 ptr = (char *) nt_header->OptionalHeader.ImageBase +
458 section->VirtualAddress;
459 bss_start = ptr;
460 bss_size = get_section_size (section);
461 }
43640c4d
GV
462#endif
463#if 0
2147fb50
KH
464 if (!strcmp (section->Name, ".data"))
465 {
198fdd15
GV
466 /* From lastfile.c */
467 extern char my_edata[];
468
2147fb50 469 /* The .data section. */
a610993d 470 data_section = section;
c2ccbd43 471 ptr = (char *) nt_header->OptionalHeader.ImageBase +
2147fb50
KH
472 section->VirtualAddress;
473 data_start_va = ptr;
474 data_start_file = section->PointerToRawData;
198fdd15
GV
475
476 /* We want to only write Emacs data back to the executable,
477 not any of the library data (if library data is included,
478 then a dumped Emacs won't run on system versions other
479 than the one Emacs was dumped on). */
480 data_size = my_edata - data_start_va;
2147fb50 481 }
43640c4d
GV
482#else
483 if (!strcmp (section->Name, "EMDATA"))
484 {
485 /* The Emacs initialized data section. */
486 data_section = section;
487 ptr = (char *) nt_header->OptionalHeader.ImageBase +
488 section->VirtualAddress;
489 data_start_va = ptr;
490 data_start_file = section->PointerToRawData;
491
492 /* Write back the full section. */
493 data_size = get_section_size (section);
494 }
495#endif
2147fb50
KH
496 section++;
497 }
a610993d 498
43640c4d
GV
499#ifdef SEPARATE_BSS_SECTION
500 if (bss_start == UNINIT_PTR && bss_size == UNINIT_LONG)
a610993d
GV
501 {
502 /* Starting with MSVC 4.0, the .bss section has been eliminated
503 and appended virtually to the end of the .data section. Our
504 only hint about where the .bss section starts in the address
505 comes from the SizeOfRawData field in the .data section
506 header. Unfortunately, this field is only approximate, as it
507 is a rounded number and is typically rounded just beyond the
508 start of the .bss section. To find the start and size of the
509 .bss section exactly, we have to peek into the map file. */
510 get_bss_info_from_map_file (p_infile, &ptr, &bss_size);
511 bss_start = ptr + nt_header->OptionalHeader.ImageBase
512 + data_section->VirtualAddress;
513 }
43640c4d
GV
514#else
515 bss_start = my_begbss;
516 bss_size = my_endbss - bss_start;
517#endif
2147fb50
KH
518}
519
520
521/* The dump routines. */
522
523static void
524copy_executable_and_dump_data_section (file_data *p_infile,
525 file_data *p_outfile)
526{
527 unsigned char *data_file, *data_va;
528 unsigned long size, index;
529
530 /* Get a pointer to where the raw data should go in the executable file. */
531 data_file = (char *) p_outfile->file_base + data_start_file;
532
533 /* Get a pointer to the raw data in our address space. */
534 data_va = data_start_va;
535
536 size = (DWORD) data_file - (DWORD) p_outfile->file_base;
537 printf ("Copying executable up to data section...\n");
538 printf ("\t0x%08x Offset in input file.\n", 0);
539 printf ("\t0x%08x Offset in output file.\n", 0);
540 printf ("\t0x%08x Size in bytes.\n", size);
541 memcpy (p_outfile->file_base, p_infile->file_base, size);
542
543 size = data_size;
544 printf ("Dumping .data section...\n");
545 printf ("\t0x%08x Address in process.\n", data_va);
546 printf ("\t0x%08x Offset in output file.\n",
547 data_file - p_outfile->file_base);
548 printf ("\t0x%08x Size in bytes.\n", size);
549 memcpy (data_file, data_va, size);
550
551 index = (DWORD) data_file + size - (DWORD) p_outfile->file_base;
552 size = p_infile->size - index;
553 printf ("Copying rest of executable...\n");
554 printf ("\t0x%08x Offset in input file.\n", index);
555 printf ("\t0x%08x Offset in output file.\n", index);
556 printf ("\t0x%08x Size in bytes.\n", size);
557 memcpy ((char *) p_outfile->file_base + index,
558 (char *) p_infile->file_base + index, size);
559}
560
561static void
562dump_bss_and_heap (file_data *p_infile, file_data *p_outfile)
563{
564 unsigned char *heap_data, *bss_data;
565 unsigned long size, index;
566
567 printf ("Dumping heap into executable...\n");
568
569 index = heap_index_in_executable;
570 size = get_committed_heap_size ();
571 heap_data = get_heap_start ();
572
573 printf ("\t0x%08x Heap start in process.\n", heap_data);
574 printf ("\t0x%08x Heap offset in executable.\n", index);
575 printf ("\t0x%08x Heap size in bytes.\n", size);
576
577 memcpy ((PUCHAR) p_outfile->file_base + index, heap_data, size);
578
579 printf ("Dumping .bss into executable...\n");
580
581 index += size;
582 size = bss_size;
583 bss_data = bss_start;
584
585 printf ("\t0x%08x BSS start in process.\n", bss_data);
586 printf ("\t0x%08x BSS offset in executable.\n", index);
587 printf ("\t0x%08x BSS size in bytes.\n", size);
588 memcpy ((char *) p_outfile->file_base + index, bss_data, size);
589}
590
591
592/* Reload and remap routines. */
593
594
595/* Load the dumped .bss section into the .bss area of our address space. */
596void
597read_in_bss (char *filename)
598{
599 HANDLE file;
600 unsigned long size, index, n_read, total_read;
601 char buffer[512], *bss;
602 int i;
603
604 file = CreateFile (filename, GENERIC_READ, FILE_SHARE_READ, NULL,
605 OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
606 if (file == INVALID_HANDLE_VALUE)
607 {
608 i = GetLastError ();
609 exit (1);
610 }
611
612 /* Seek to where the .bss section is tucked away after the heap... */
613 index = heap_index_in_executable + get_committed_heap_size ();
614 if (SetFilePointer (file, index, NULL, FILE_BEGIN) == 0xFFFFFFFF)
615 {
616 i = GetLastError ();
617 exit (1);
618 }
619
620
621 /* Ok, read in the saved .bss section and initialize all
622 uninitialized variables. */
198fdd15 623 if (!ReadFile (file, bss_start, bss_size, &n_read, NULL))
2147fb50 624 {
198fdd15
GV
625 i = GetLastError ();
626 exit (1);
2147fb50 627 }
198fdd15 628
2147fb50
KH
629 CloseHandle (file);
630}
631
632/* Map the heap dumped into the executable file into our address space. */
633void
634map_in_heap (char *filename)
635{
636 HANDLE file;
637 HANDLE file_mapping;
638 void *file_base;
198fdd15 639 unsigned long size, upper_size, n_read;
2147fb50
KH
640 int i;
641
642 file = CreateFile (filename, GENERIC_READ, FILE_SHARE_READ, NULL,
643 OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
644 if (file == INVALID_HANDLE_VALUE)
645 {
646 i = GetLastError ();
647 exit (1);
648 }
649
650 size = GetFileSize (file, &upper_size);
651 file_mapping = CreateFileMapping (file, NULL, PAGE_WRITECOPY,
652 0, size, NULL);
653 if (!file_mapping)
654 {
198fdd15
GV
655 i = GetLastError ();
656 exit (1);
2147fb50
KH
657 }
658
659 size = get_committed_heap_size ();
660 file_base = MapViewOfFileEx (file_mapping, FILE_MAP_COPY, 0,
661 heap_index_in_executable, size,
662 get_heap_start ());
198fdd15
GV
663 if (file_base != 0)
664 {
665 return;
666 }
667
668 /* If we don't succeed with the mapping, then copy from the
669 data into the heap. */
670
671 CloseHandle (file_mapping);
672
673 if (VirtualAlloc (get_heap_start (), get_committed_heap_size (),
674 MEM_RESERVE | MEM_COMMIT, PAGE_READWRITE) == NULL)
675 {
676 i = GetLastError ();
677 exit (1);
678 }
679
680 /* Seek to the location of the heap data in the executable. */
681 i = heap_index_in_executable;
682 if (SetFilePointer (file, i, NULL, FILE_BEGIN) == 0xFFFFFFFF)
2147fb50
KH
683 {
684 i = GetLastError ();
685 exit (1);
686 }
198fdd15
GV
687
688 /* Read in the data. */
689 if (!ReadFile (file, get_heap_start (),
690 get_committed_heap_size (), &n_read, NULL))
691 {
692 i = GetLastError ();
693 exit (1);
694 }
695
696 CloseHandle (file);
2147fb50 697}