From: Marc Hoersken Date: Sat, 6 Apr 2013 08:03:43 +0000 (+0200) Subject: util.c: Follow up cleanup on eeefcdf X-Git-Tag: curl-7_30_0~43 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=e3787e8;p=curl util.c: Follow up cleanup on eeefcdf --- diff --git a/tests/server/util.c b/tests/server/util.c index bd6542826..22e42bb65 100644 --- a/tests/server/util.c +++ b/tests/server/util.c @@ -257,14 +257,14 @@ int wait_ms(int timeout_ms) * * These functions make it possible to get the Msys PID instead of the * Windows PID assigned to the current process. This is done by walking up - * to the Msys sh.exe process that launched the shadow Windows processes. + * to the Msys sh.exe process that launched the actual Windows processes. * - * Usually an Msys process would result in following process tree: - * sh.exe <-- waiting Windows process, but running Msys process + * Usually an Msys process would result in the following process tree: + * sh.exe <-- waiting Windows process, but visible Msys process * \ - * .exe <-- waiting Windows process + * .exe <-- waiting Windows process, but not visible to Msys * \ - * .exe <-- running Windows process + * .exe <-- running Windows process, but not visible to Msys * * Attention: This may not be true for all Msys processes. */ @@ -282,7 +282,7 @@ static pid_t getpid_msys(void) if(snapshot != INVALID_HANDLE_VALUE) { walk = TRUE; - while(walk) { + do { if(Process32First(snapshot, &entry)) { do { if(pid == entry.th32ProcessID) { @@ -295,7 +295,7 @@ static pid_t getpid_msys(void) } } while (Process32Next(snapshot, &entry)); } - } + } while(walk); CloseHandle(snapshot); }