2000-04-10 Fernando Nasser <fnasser@cygnus.com>
[deliverable/binutils-gdb.git] / gdb / windows-nat.c
CommitLineData
24e60978 1/* Target-vector operations for controlling win32 child processes, for GDB.
e6433c28
CF
2 Copyright 1995, 1996, 1997, 1998, 1999, 2000 Free Software Foundation, Inc.
3 Contributed by Cygnus Solutions, A Red Hat Company.
e88c49c3 4
24e60978
SC
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without eve nthe implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
3a4b77d8
JM
19 Foundation, Inc., 59 Temple Place - Suite 330,
20 Boston, MA 02111-1307, USA.
21 */
24e60978
SC
22
23/* by Steve Chamberlain, sac@cygnus.com */
24
3cee93ac 25/* We assume we're being built with and will be used for cygwin. */
e88c49c3 26
24e60978
SC
27#include "defs.h"
28#include "frame.h" /* required by inferior.h */
29#include "inferior.h"
30#include "target.h"
24e60978
SC
31#include "gdbcore.h"
32#include "command.h"
33#include <signal.h>
34#include <sys/types.h>
35#include <fcntl.h>
cad9cd60
GN
36#include <stdlib.h>
37
38#ifdef _MSC_VER
28444bf3 39#include "windefs.h"
cad9cd60
GN
40#else /* other WIN32 compiler */
41#include <windows.h>
1e37c281 42#include <imagehlp.h>
cad9cd60
GN
43#endif
44
24e60978 45#include "buildsym.h"
1ef980b9
SC
46#include "symfile.h"
47#include "objfiles.h"
24e60978 48#include "gdb_string.h"
fdfa3315 49#include "gdbthread.h"
24e60978 50#include "gdbcmd.h"
1750a5ef 51#include <sys/param.h>
1e37c281 52#include <unistd.h>
24e60978 53
0714f9bf
SS
54/* The ui's event loop. */
55extern int (*ui_loop_hook) PARAMS ((int signo));
56
57/* If we're not using the old Cygwin header file set, define the
58 following which never should have been in the generic Win32 API
59 headers in the first place since they were our own invention... */
60#ifndef _GNU_H_WINDOWS_H
61#define FLAG_TRACE_BIT 0x100
62#define CONTEXT_DEBUGGER (CONTEXT_FULL | CONTEXT_FLOATING_POINT)
63#endif
64
3cee93ac
CF
65/* The string sent by cygwin when it processes a signal.
66 FIXME: This should be in a cygwin include file. */
67#define CYGWIN_SIGNAL_STRING "cygwin: signal"
68
1ef980b9
SC
69#define CHECK(x) check (x, __FILE__,__LINE__)
70#define DEBUG_EXEC(x) if (debug_exec) printf x
71#define DEBUG_EVENTS(x) if (debug_events) printf x
72#define DEBUG_MEM(x) if (debug_memory) printf x
73#define DEBUG_EXCEPT(x) if (debug_exceptions) printf x
24e60978
SC
74
75/* Forward declaration */
76extern struct target_ops child_ops;
77
b607efe7 78static void child_stop PARAMS ((void));
bc8bd256 79static int win32_child_thread_alive PARAMS ((int));
0714f9bf 80void child_kill_inferior PARAMS ((void));
3cee93ac 81
3cee93ac
CF
82/* Thread information structure used to track information that is
83 not available in gdb's thread structure. */
84typedef struct thread_info_struct
3a4b77d8
JM
85 {
86 struct thread_info_struct *next;
87 DWORD id;
88 HANDLE h;
89 char *name;
90 int suspend_count;
91 CONTEXT context;
1e37c281
JM
92 STACKFRAME sf;
93 } thread_info;
94
95static thread_info thread_head = {NULL};
24e60978 96
1e37c281
JM
97/* The saved state for a continue after breaking back to gdb. */
98static DWORD continue_status;
24e60978
SC
99
100/* The process and thread handles for the above context. */
101
3cee93ac
CF
102static DEBUG_EVENT current_event; /* The current debug event from
103 WaitForDebugEvent */
104static HANDLE current_process_handle; /* Currently executing process */
105static thread_info *current_thread; /* Info on currently selected thread */
3a4b77d8 106static DWORD main_thread_id; /* Thread ID of the main thread */
24e60978
SC
107
108/* Counts of things. */
109static int exception_count = 0;
110static int event_count = 0;
111
112/* User options. */
113static int new_console = 0;
1e37c281 114static int new_group = 1;
3a4b77d8
JM
115static int debug_exec = 0; /* show execution */
116static int debug_events = 0; /* show events from kernel */
117static int debug_memory = 0; /* show target memory accesses */
1ef980b9 118static int debug_exceptions = 0; /* show target exceptions */
24e60978
SC
119
120/* This vector maps GDB's idea of a register's number into an address
3cee93ac 121 in the win32 exception context vector.
24e60978 122
3cee93ac 123 It also contains the bit mask needed to load the register in question.
24e60978
SC
124
125 One day we could read a reg, we could inspect the context we
126 already have loaded, if it doesn't have the bit set that we need,
127 we read that set of registers in using GetThreadContext. If the
128 context already contains what we need, we just unpack it. Then to
129 write a register, first we have to ensure that the context contains
130 the other regs of the group, and then we copy the info in and set
131 out bit. */
132
3cee93ac
CF
133#define context_offset(x) ((int)&(((CONTEXT *)NULL)->x))
134static const int mappings[] =
24e60978 135{
3a4b77d8
JM
136 context_offset (Eax),
137 context_offset (Ecx),
138 context_offset (Edx),
139 context_offset (Ebx),
140 context_offset (Esp),
141 context_offset (Ebp),
142 context_offset (Esi),
143 context_offset (Edi),
144 context_offset (Eip),
145 context_offset (EFlags),
146 context_offset (SegCs),
147 context_offset (SegSs),
148 context_offset (SegDs),
149 context_offset (SegEs),
150 context_offset (SegFs),
151 context_offset (SegGs),
152 context_offset (FloatSave.RegisterArea[0 * 10]),
153 context_offset (FloatSave.RegisterArea[1 * 10]),
154 context_offset (FloatSave.RegisterArea[2 * 10]),
155 context_offset (FloatSave.RegisterArea[3 * 10]),
156 context_offset (FloatSave.RegisterArea[4 * 10]),
157 context_offset (FloatSave.RegisterArea[5 * 10]),
158 context_offset (FloatSave.RegisterArea[6 * 10]),
159 context_offset (FloatSave.RegisterArea[7 * 10]),
1e37c281
JM
160 context_offset (FloatSave.ControlWord),
161 context_offset (FloatSave.StatusWord),
162 context_offset (FloatSave.TagWord),
163 context_offset (FloatSave.ErrorSelector),
164 context_offset (FloatSave.ErrorOffset),
165 context_offset (FloatSave.DataSelector),
166 context_offset (FloatSave.DataOffset),
d3a09475 167 context_offset (FloatSave.ErrorSelector)
24e60978
SC
168};
169
d3a09475
JM
170#undef context_offset
171
24e60978
SC
172/* This vector maps the target's idea of an exception (extracted
173 from the DEBUG_EVENT structure) to GDB's idea. */
174
175struct xlate_exception
176 {
177 int them;
178 enum target_signal us;
179 };
180
24e60978
SC
181static const struct xlate_exception
182 xlate[] =
183{
184 {EXCEPTION_ACCESS_VIOLATION, TARGET_SIGNAL_SEGV},
9cbf6c0e 185 {STATUS_STACK_OVERFLOW, TARGET_SIGNAL_SEGV},
24e60978
SC
186 {EXCEPTION_BREAKPOINT, TARGET_SIGNAL_TRAP},
187 {DBG_CONTROL_C, TARGET_SIGNAL_INT},
188 {EXCEPTION_SINGLE_STEP, TARGET_SIGNAL_TRAP},
189 {-1, -1}};
190
3cee93ac
CF
191/* Find a thread record given a thread id.
192 If get_context then also retrieve the context for this
193 thread. */
194static thread_info *
195thread_rec (DWORD id, int get_context)
24e60978 196{
3cee93ac
CF
197 thread_info *th;
198
3a4b77d8 199 for (th = &thread_head; (th = th->next) != NULL;)
3cee93ac
CF
200 if (th->id == id)
201 {
202 if (!th->suspend_count && get_context)
203 {
204 if (get_context > 0)
205 th->suspend_count = SuspendThread (th->h) + 1;
206 else if (get_context < 0)
207 th->suspend_count = -1;
208
209 th->context.ContextFlags = CONTEXT_DEBUGGER;
210 GetThreadContext (th->h, &th->context);
211 }
212 return th;
213 }
214
215 return NULL;
216}
217
218/* Add a thread to the thread list */
219static thread_info *
3a4b77d8 220child_add_thread (DWORD id, HANDLE h)
3cee93ac
CF
221{
222 thread_info *th;
223
224 if ((th = thread_rec (id, FALSE)))
225 return th;
226
227 th = (thread_info *) xmalloc (sizeof (*th));
3a4b77d8 228 memset (th, 0, sizeof (*th));
3cee93ac
CF
229 th->id = id;
230 th->h = h;
231 th->next = thread_head.next;
232 thread_head.next = th;
233 add_thread (id);
234 return th;
24e60978
SC
235}
236
3cee93ac
CF
237/* Clear out any old thread list and reintialize it to a
238 pristine state. */
24e60978 239static void
3cee93ac 240child_init_thread_list ()
24e60978 241{
3cee93ac
CF
242 thread_info *th = &thread_head;
243
244 DEBUG_EVENTS (("gdb: child_init_thread_list\n"));
245 init_thread_list ();
246 while (th->next != NULL)
24e60978 247 {
3cee93ac
CF
248 thread_info *here = th->next;
249 th->next = here->next;
250 (void) CloseHandle (here->h);
251 free (here);
24e60978 252 }
3cee93ac
CF
253}
254
255/* Delete a thread from the list of threads */
256static void
257child_delete_thread (DWORD id)
258{
259 thread_info *th;
260
261 if (info_verbose)
262 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (id));
263 delete_thread (id);
264
265 for (th = &thread_head;
266 th->next != NULL && th->next->id != id;
267 th = th->next)
268 continue;
269
270 if (th->next != NULL)
24e60978 271 {
3cee93ac
CF
272 thread_info *here = th->next;
273 th->next = here->next;
274 CloseHandle (here->h);
275 free (here);
24e60978
SC
276 }
277}
278
279static void
3cee93ac
CF
280check (BOOL ok, const char *file, int line)
281{
282 if (!ok)
283 printf_filtered ("error return %s:%d was %d\n", file, line, GetLastError ());
284}
285
286static void
287do_child_fetch_inferior_registers (int r)
24e60978 288{
1e37c281
JM
289 char *context_offset = ((char *) &current_thread->context) + mappings[r];
290 long l;
291 if (r == FCS_REGNUM)
292 {
293 l = *((long *)context_offset) & 0xffff;
294 supply_register (r, (char *) &l);
295 }
296 else if (r == FOP_REGNUM)
297 {
298 l = (*((long *)context_offset) >> 16) & ((1 << 11) - 1);
299 supply_register (r, (char *) &l);
300 }
301 else if (r >= 0)
d3a09475 302 supply_register (r, context_offset);
3cee93ac 303 else
24e60978
SC
304 {
305 for (r = 0; r < NUM_REGS; r++)
3cee93ac 306 do_child_fetch_inferior_registers (r);
24e60978 307 }
3cee93ac
CF
308}
309
310static void
311child_fetch_inferior_registers (int r)
312{
313 current_thread = thread_rec (inferior_pid, TRUE);
314 do_child_fetch_inferior_registers (r);
315}
316
317static void
318do_child_store_inferior_registers (int r)
319{
320 if (r >= 0)
321 read_register_gen (r, ((char *) &current_thread->context) + mappings[r]);
24e60978
SC
322 else
323 {
3cee93ac
CF
324 for (r = 0; r < NUM_REGS; r++)
325 do_child_store_inferior_registers (r);
24e60978
SC
326 }
327}
328
3cee93ac
CF
329/* Store a new register value into the current thread context */
330static void
331child_store_inferior_registers (int r)
332{
333 current_thread = thread_rec (inferior_pid, TRUE);
334 do_child_store_inferior_registers (r);
335}
24e60978 336
1e37c281
JM
337#include <psapi.h>
338static int psapi_loaded = 0;
339static HMODULE psapi_module_handle = NULL;
340static BOOL WINAPI (*psapi_EnumProcessModules)(HANDLE, HMODULE*, DWORD, LPDWORD)= NULL;
341static BOOL WINAPI (*psapi_GetModuleInformation) (HANDLE, HMODULE, LPMODULEINFO, DWORD)= NULL;
342static DWORD WINAPI (*psapi_GetModuleFileNameExA) (HANDLE, HMODULE, LPSTR, DWORD)= NULL;
343
344int psapi_get_dll_name (DWORD BaseAddress, char *dll_name_ret)
345{
346 DWORD len;
347 MODULEINFO mi;
348 int i;
349 HMODULE dh_buf [ 1 ];
350 HMODULE* DllHandle = dh_buf;
351 DWORD cbNeeded;
352 BOOL ok;
353
354 if (!psapi_loaded ||
355 psapi_EnumProcessModules == NULL ||
356 psapi_GetModuleInformation == NULL ||
357 psapi_GetModuleFileNameExA == NULL)
358 {
359 if (psapi_loaded)goto failed;
360 psapi_loaded = 1;
361 psapi_module_handle = LoadLibrary ("psapi.dll");
362 if (!psapi_module_handle)
363 {
364 /* printf_unfiltered ("error loading psapi.dll: %u", GetLastError ());*/
365 goto failed;
366 }
367 psapi_EnumProcessModules = GetProcAddress (psapi_module_handle, "EnumProcessModules" );
368 psapi_GetModuleInformation = GetProcAddress (psapi_module_handle, "GetModuleInformation");
369 psapi_GetModuleFileNameExA = (void *) GetProcAddress (psapi_module_handle,
370 "GetModuleFileNameExA");
371 if (psapi_EnumProcessModules == NULL ||
372 psapi_GetModuleInformation == NULL ||
373 psapi_GetModuleFileNameExA == NULL)
374 goto failed;
375 }
376
377 cbNeeded = 0;
378 ok = (*psapi_EnumProcessModules) (current_process_handle,
379 DllHandle,
380 sizeof (HMODULE),
381 &cbNeeded);
382
383 if (!ok || !cbNeeded)
384 goto failed;
385
386 DllHandle = (HMODULE*) alloca (cbNeeded);
387 if (!DllHandle)
388 goto failed;
389
390 ok = (*psapi_EnumProcessModules) (current_process_handle,
391 DllHandle,
392 cbNeeded,
393 &cbNeeded);
394 if (!ok)
395 goto failed;
396
397 for (i = 0; i < cbNeeded / sizeof (HMODULE); i++)
398 {
399 if (!(*psapi_GetModuleInformation) (current_process_handle,
400 DllHandle [i],
401 &mi,
402 sizeof (mi)))
403 error ("Can't get module info");
404
405 len = (*psapi_GetModuleFileNameExA) (current_process_handle,
406 DllHandle [i],
407 dll_name_ret,
408 MAX_PATH);
409 if (len == 0)
410 error ("Error getting dll name: %u\n", GetLastError ());
411
412 if ((DWORD) (mi.lpBaseOfDll) == BaseAddress)
413 return 1;
414 }
415
416failed:
417 dll_name_ret[0] = '\0';
418 return 0;
419}
420
24e60978
SC
421/* Wait for child to do something. Return pid of child, or -1 in case
422 of error; store status through argument pointer OURSTATUS. */
423
1750a5ef 424static int
bc8bd256 425handle_load_dll (PTR dummy)
24e60978 426{
3a4b77d8 427 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
24e60978
SC
428 DWORD dll_name_ptr;
429 DWORD done;
3cee93ac 430 char dll_buf[MAX_PATH + 1];
041d852c 431 char *p, *dll_name = NULL;
3cee93ac
CF
432 struct objfile *objfile;
433 MEMORY_BASIC_INFORMATION minfo;
3e9c4287 434 struct section_addr_info section_addrs;
3cee93ac 435
3e9c4287 436 memset (&section_addrs, 0, sizeof (section_addrs));
3a4b77d8 437 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 438
1e37c281
JM
439 if (!psapi_get_dll_name ((DWORD) (event->lpBaseOfDll), dll_buf))
440 dll_buf[0] = dll_buf[sizeof(dll_buf) - 1] = '\0';
3cee93ac 441
1e37c281 442 dll_name = dll_buf;
24e60978 443
3cee93ac
CF
444 /* Attempt to read the name of the dll that was detected.
445 This is documented to work only when actively debugging
446 a program. It will not work for attached processes. */
447 if (dll_name == NULL || *dll_name == '\0')
24e60978 448 {
3cee93ac 449 int size = event->fUnicode ? sizeof (WCHAR) : sizeof (char);
24e60978
SC
450 int len = 0;
451 char b[2];
3cee93ac
CF
452
453 ReadProcessMemory (current_process_handle,
454 (LPCVOID) event->lpImageName,
455 (char *) &dll_name_ptr,
456 sizeof (dll_name_ptr), &done);
457
458 /* See if we could read the address of a string, and that the
3a4b77d8 459 address isn't null. */
3cee93ac
CF
460
461 if (done != sizeof (dll_name_ptr) || !dll_name_ptr)
462 return 1;
463
24e60978
SC
464 do
465 {
3cee93ac
CF
466 ReadProcessMemory (current_process_handle,
467 (LPCVOID) (dll_name_ptr + len * size),
24e60978
SC
468 &b,
469 size,
470 &done);
471 len++;
472 }
473 while ((b[0] != 0 || b[size - 1] != 0) && done == size);
474
24e60978
SC
475 dll_name = alloca (len);
476
3cee93ac 477 if (event->fUnicode)
24e60978
SC
478 {
479 WCHAR *unicode_dll_name = (WCHAR *) alloca (len * sizeof (WCHAR));
3cee93ac
CF
480 ReadProcessMemory (current_process_handle,
481 (LPCVOID) dll_name_ptr,
24e60978
SC
482 unicode_dll_name,
483 len * sizeof (WCHAR),
484 &done);
485
486 WideCharToMultiByte (CP_ACP, 0,
487 unicode_dll_name, len,
488 dll_name, len, 0, 0);
489 }
490 else
491 {
3cee93ac
CF
492 ReadProcessMemory (current_process_handle,
493 (LPCVOID) dll_name_ptr,
24e60978
SC
494 dll_name,
495 len,
496 &done);
497 }
24e60978 498 }
3cee93ac
CF
499
500 if (!dll_name)
501 return 1;
502
503 while ((p = strchr (dll_name, '\\')))
504 *p = '/';
505
3cee93ac
CF
506 /* The symbols in a dll are offset by 0x1000, which is the
507 the offset from 0 of the first byte in an image - because
508 of the file header and the section alignment.
509
510 FIXME: Is this the real reason that we need the 0x1000 ? */
511
512 printf_unfiltered ("%x:%s", event->lpBaseOfDll, dll_name);
3e9c4287 513 section_addrs.text_addr = (int) event->lpBaseOfDll + 0x1000;
50a6e31f 514 symbol_file_add (dll_name, 0, &section_addrs, 0, OBJF_SHARED);
3cee93ac
CF
515 printf_unfiltered ("\n");
516
1750a5ef 517 return 1;
24e60978
SC
518}
519
3cee93ac
CF
520/* Handle DEBUG_STRING output from child process.
521 Cygwin prepends its messages with a "cygwin:". Interpret this as
522 a Cygwin signal. Otherwise just print the string as a warning. */
523static int
524handle_output_debug_string (struct target_waitstatus *ourstatus)
525{
526 char *s;
527 int gotasig = FALSE;
528
529 if (!target_read_string
3a4b77d8 530 ((CORE_ADDR) current_event.u.DebugString.lpDebugStringData, &s, 1024, 0)
3cee93ac
CF
531 || !s || !*s)
532 return gotasig;
533
d3a09475 534 if (strncmp (s, CYGWIN_SIGNAL_STRING, sizeof (CYGWIN_SIGNAL_STRING) - 1) != 0)
3cee93ac 535 {
d3a09475 536 if (strncmp (s, "cYg", 3) != 0)
1e37c281 537 warning (s);
3cee93ac 538 }
d3a09475 539 else
3cee93ac
CF
540 {
541 char *p;
1e37c281
JM
542 int sig = strtol (s + sizeof (CYGWIN_SIGNAL_STRING) - 1, &p, 0);
543 gotasig = target_signal_from_host (sig);
0714f9bf
SS
544 ourstatus->value.sig = gotasig;
545 if (gotasig)
3cee93ac
CF
546 ourstatus->kind = TARGET_WAITKIND_STOPPED;
547 }
548
549 free (s);
550 return gotasig;
551}
24e60978 552
36339ecd 553static int
3cee93ac 554handle_exception (struct target_waitstatus *ourstatus)
24e60978
SC
555{
556 int i;
557 int done = 0;
3cee93ac
CF
558 thread_info *th;
559
24e60978
SC
560 ourstatus->kind = TARGET_WAITKIND_STOPPED;
561
3cee93ac
CF
562 /* Record the context of the current thread */
563 th = thread_rec (current_event.dwThreadId, -1);
24e60978 564
3cee93ac 565 switch (current_event.u.Exception.ExceptionRecord.ExceptionCode)
24e60978 566 {
1ef980b9
SC
567 case EXCEPTION_ACCESS_VIOLATION:
568 DEBUG_EXCEPT (("gdb: Target exception ACCESS_VIOLATION at 0x%08x\n",
3a4b77d8 569 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
1ef980b9 570 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
1e37c281 571 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1ef980b9 572 break;
3b7c8b74
JM
573 case STATUS_FLOAT_UNDERFLOW:
574 case STATUS_FLOAT_DIVIDE_BY_ZERO:
575 case STATUS_FLOAT_OVERFLOW:
576 case STATUS_INTEGER_DIVIDE_BY_ZERO:
577 DEBUG_EXCEPT (("gdb: Target exception STACK_OVERFLOW at 0x%08x\n",
578 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
579 ourstatus->value.sig = TARGET_SIGNAL_FPE;
580 continue_status = DBG_EXCEPTION_NOT_HANDLED;
581 break;
1ef980b9
SC
582 case STATUS_STACK_OVERFLOW:
583 DEBUG_EXCEPT (("gdb: Target exception STACK_OVERFLOW at 0x%08x\n",
3a4b77d8 584 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
1ef980b9 585 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
1e37c281 586 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1ef980b9
SC
587 break;
588 case EXCEPTION_BREAKPOINT:
589 DEBUG_EXCEPT (("gdb: Target exception BREAKPOINT at 0x%08x\n",
3a4b77d8 590 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
1ef980b9
SC
591 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
592 break;
593 case DBG_CONTROL_C:
594 DEBUG_EXCEPT (("gdb: Target exception CONTROL_C at 0x%08x\n",
3a4b77d8 595 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
1ef980b9 596 ourstatus->value.sig = TARGET_SIGNAL_INT;
1e37c281 597 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1ef980b9
SC
598 break;
599 case EXCEPTION_SINGLE_STEP:
600 DEBUG_EXCEPT (("gdb: Target exception SINGLE_STEP at 0x%08x\n",
3a4b77d8 601 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
1ef980b9
SC
602 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
603 break;
8227c82d
CF
604 case EXCEPTION_ILLEGAL_INSTRUCTION:
605 DEBUG_EXCEPT (("gdb: Target exception SINGLE_ILL at 0x%08x\n",
606 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
607 ourstatus->value.sig = TARGET_SIGNAL_ILL;
608 break;
1ef980b9 609 default:
36339ecd 610 /* This may be a structured exception handling exception. In
3a4b77d8 611 that case, we want to let the program try to handle it, and
d3a09475 612 only break if we see the exception a second time.
3cee93ac 613 if (current_event.u.Exception.dwFirstChance)
d3a09475 614
36339ecd 615 return 0;
d3a09475 616*/
36339ecd 617
1ef980b9 618 printf_unfiltered ("gdb: unknown target exception 0x%08x at 0x%08x\n",
3a4b77d8
JM
619 current_event.u.Exception.ExceptionRecord.ExceptionCode,
620 current_event.u.Exception.ExceptionRecord.ExceptionAddress);
24e60978 621 ourstatus->value.sig = TARGET_SIGNAL_UNKNOWN;
1e37c281 622 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1ef980b9 623 break;
24e60978 624 }
24e60978 625 exception_count++;
36339ecd 626 return 1;
24e60978
SC
627}
628
3cee93ac
CF
629/* Resume all artificially suspended threads if we are continuing
630 execution */
631static BOOL
1e37c281 632child_continue (int id)
3cee93ac
CF
633{
634 int i;
635 thread_info *th;
636 BOOL res;
637
638 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%d, ctid=%d, DBG_CONTINUE);\n",
639 current_event.dwProcessId, current_event.dwThreadId));
0714f9bf
SS
640 res = ContinueDebugEvent (current_event.dwProcessId,
641 current_event.dwThreadId,
642 continue_status);
1e37c281 643 continue_status = 0;
0714f9bf 644 if (res)
3a4b77d8 645 for (th = &thread_head; (th = th->next) != NULL;)
3cee93ac
CF
646 if (((id == -1) || (id == th->id)) && th->suspend_count)
647 {
648 for (i = 0; i < th->suspend_count; i++)
649 (void) ResumeThread (th->h);
650 th->suspend_count = 0;
651 }
652
653 return res;
654}
655
1e37c281
JM
656static int
657get_child_debug_event (int pid, struct target_waitstatus *ourstatus,
658 DWORD *event_code, int *retval)
659{
660 BOOL debug_event;
661 int breakout = 1;
662
663 if (!(debug_event = WaitForDebugEvent (&current_event, 20)))
664 {
665 breakout = *retval = *event_code = 0;
666 goto out;
667 }
668
669 event_count++;
670 continue_status = DBG_CONTINUE;
671 *retval = 0;
672
673 switch (*event_code = current_event.dwDebugEventCode)
674 {
675 case CREATE_THREAD_DEBUG_EVENT:
676 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
677 (unsigned) current_event.dwProcessId,
678 (unsigned) current_event.dwThreadId,
679 "CREATE_THREAD_DEBUG_EVENT"));
680 /* Record the existence of this thread */
681 child_add_thread (current_event.dwThreadId,
682 current_event.u.CreateThread.hThread);
683 if (info_verbose)
684 printf_unfiltered ("[New %s]\n",
685 target_pid_to_str (current_event.dwThreadId));
686 break;
687
688 case EXIT_THREAD_DEBUG_EVENT:
689 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
690 (unsigned) current_event.dwProcessId,
691 (unsigned) current_event.dwThreadId,
692 "EXIT_THREAD_DEBUG_EVENT"));
693 child_delete_thread (current_event.dwThreadId);
694 break;
695
696 case CREATE_PROCESS_DEBUG_EVENT:
697 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
698 (unsigned) current_event.dwProcessId,
699 (unsigned) current_event.dwThreadId,
700 "CREATE_PROCESS_DEBUG_EVENT"));
701 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
702
703 main_thread_id = inferior_pid = current_event.dwThreadId;
704 /* Add the main thread */
705 current_thread = child_add_thread (inferior_pid,
706 current_event.u.CreateProcessInfo.hThread);
707 break;
708
709 case EXIT_PROCESS_DEBUG_EVENT:
710 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
711 (unsigned) current_event.dwProcessId,
712 (unsigned) current_event.dwThreadId,
713 "EXIT_PROCESS_DEBUG_EVENT"));
714 ourstatus->kind = TARGET_WAITKIND_EXITED;
715 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
716 CloseHandle (current_process_handle);
717 *retval = current_event.dwProcessId;
718 goto out;
719
720 case LOAD_DLL_DEBUG_EVENT:
721 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
722 (unsigned) current_event.dwProcessId,
723 (unsigned) current_event.dwThreadId,
724 "LOAD_DLL_DEBUG_EVENT"));
725 catch_errors (handle_load_dll, NULL, "", RETURN_MASK_ALL);
726 registers_changed (); /* mark all regs invalid */
727 break;
728
729 case UNLOAD_DLL_DEBUG_EVENT:
730 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
731 (unsigned) current_event.dwProcessId,
732 (unsigned) current_event.dwThreadId,
733 "UNLOAD_DLL_DEBUG_EVENT"));
734 break; /* FIXME: don't know what to do here */
735
736 case EXCEPTION_DEBUG_EVENT:
737 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
738 (unsigned) current_event.dwProcessId,
739 (unsigned) current_event.dwThreadId,
740 "EXCEPTION_DEBUG_EVENT"));
741 if (handle_exception (ourstatus)) /* sets continue_status */
742 {
743 *retval = current_event.dwThreadId;
744 goto out;
745 }
746 break;
747
748 case OUTPUT_DEBUG_STRING_EVENT:
749 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
750 (unsigned) current_event.dwProcessId,
751 (unsigned) current_event.dwThreadId,
752 "OUTPUT_DEBUG_STRING_EVENT"));
753 if (handle_output_debug_string (ourstatus))
754 {
755 *retval = main_thread_id;
756 goto out;
757 }
758 break;
759 default:
760 printf_unfiltered ("gdb: kernel event for pid=%d tid=%d\n",
761 current_event.dwProcessId,
762 current_event.dwThreadId);
763 printf_unfiltered (" unknown event code %d\n",
764 current_event.dwDebugEventCode);
765 break;
766 }
767
768 breakout = 0;
769 CHECK (child_continue (-1));
770 continue_status = 0;
771
772out:
773 return breakout;
774}
775
776
777/* Wait for interesting events to occur in the target process. */
24e60978
SC
778static int
779child_wait (int pid, struct target_waitstatus *ourstatus)
780{
1e37c281
JM
781 DWORD event_code;
782 int retval;
783
24e60978
SC
784 /* We loop when we get a non-standard exception rather than return
785 with a SPURIOUS because resume can try and step or modify things,
3cee93ac 786 which needs a current_thread->h. But some of these exceptions mark
24e60978
SC
787 the birth or death of threads, which mean that the current thread
788 isn't necessarily what you think it is. */
789
790 while (1)
791 {
1e37c281
JM
792 if (continue_status != 0)
793 CHECK (child_continue (-1));
794 if (get_child_debug_event (pid, ourstatus, &event_code, &retval))
795 return retval;
0714f9bf
SS
796 else
797 {
798 int detach = 0;
3cee93ac 799
0714f9bf
SS
800 if (ui_loop_hook != NULL)
801 detach = ui_loop_hook (0);
802
803 if (detach)
804 child_kill_inferior ();
805 }
24e60978
SC
806 }
807}
808
24e60978
SC
809/* Attach to process PID, then initialize for debugging it. */
810
811static void
812child_attach (args, from_tty)
813 char *args;
814 int from_tty;
815{
816 BOOL ok;
817
818 if (!args)
819 error_no_arg ("process-id to attach");
820
3cee93ac 821 current_event.dwProcessId = strtoul (args, 0, 0);
24e60978 822
3cee93ac 823 ok = DebugActiveProcess (current_event.dwProcessId);
24e60978
SC
824
825 if (!ok)
826 error ("Can't attach to process.");
827
24e60978
SC
828 exception_count = 0;
829 event_count = 0;
830
831 if (from_tty)
832 {
833 char *exec_file = (char *) get_exec_file (0);
834
835 if (exec_file)
836 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
3cee93ac 837 target_pid_to_str (current_event.dwProcessId));
24e60978
SC
838 else
839 printf_unfiltered ("Attaching to %s\n",
3cee93ac 840 target_pid_to_str (current_event.dwProcessId));
24e60978
SC
841
842 gdb_flush (gdb_stdout);
843 }
844
24e60978
SC
845 push_target (&child_ops);
846}
847
24e60978
SC
848static void
849child_detach (args, from_tty)
850 char *args;
851 int from_tty;
852{
853 if (from_tty)
854 {
855 char *exec_file = get_exec_file (0);
856 if (exec_file == 0)
857 exec_file = "";
858 printf_unfiltered ("Detaching from program: %s %s\n", exec_file,
859 target_pid_to_str (inferior_pid));
860 gdb_flush (gdb_stdout);
861 }
862 inferior_pid = 0;
863 unpush_target (&child_ops);
864}
865
24e60978
SC
866/* Print status information about what we're accessing. */
867
868static void
869child_files_info (ignore)
870 struct target_ops *ignore;
871{
872 printf_unfiltered ("\tUsing the running image of %s %s.\n",
873 attach_flag ? "attached" : "child", target_pid_to_str (inferior_pid));
874}
875
876/* ARGSUSED */
877static void
878child_open (arg, from_tty)
879 char *arg;
880 int from_tty;
881{
882 error ("Use the \"run\" command to start a Unix child process.");
883}
884
eb708f2e 885/* Start an inferior win32 child process and sets inferior_pid to its pid.
24e60978
SC
886 EXEC_FILE is the file to run.
887 ALLARGS is a string containing the arguments to the program.
888 ENV is the environment vector to pass. Errors reported with error(). */
889
24e60978
SC
890static void
891child_create_inferior (exec_file, allargs, env)
892 char *exec_file;
893 char *allargs;
894 char **env;
895{
1750a5ef
SC
896 char real_path[MAXPATHLEN];
897 char *winenv;
898 char *temp;
3a4b77d8 899 int envlen;
1750a5ef 900 int i;
24e60978
SC
901 STARTUPINFO si;
902 PROCESS_INFORMATION pi;
903 struct target_waitstatus dummy;
904 BOOL ret;
905 DWORD flags;
eb708f2e 906 char *args;
1e37c281 907 DWORD event_code;
24e60978
SC
908
909 if (!exec_file)
910 {
911 error ("No executable specified, use `target exec'.\n");
912 }
913
914 memset (&si, 0, sizeof (si));
915 si.cb = sizeof (si);
916
1a443730 917 cygwin32_conv_to_win32_path (exec_file, real_path);
24e60978 918
3cee93ac 919 flags = DEBUG_ONLY_THIS_PROCESS;
24e60978
SC
920
921 if (new_group)
922 flags |= CREATE_NEW_PROCESS_GROUP;
923
924 if (new_console)
925 flags |= CREATE_NEW_CONSOLE;
926
3d78f532
SC
927 args = alloca (strlen (real_path) + strlen (allargs) + 2);
928
929 strcpy (args, real_path);
eb708f2e 930
eb708f2e
SC
931 strcat (args, " ");
932 strcat (args, allargs);
933
e88c49c3
DE
934 /* Prepare the environment vars for CreateProcess. */
935 {
936 /* This code use to assume all env vars were file names and would
937 translate them all to win32 style. That obviously doesn't work in the
2dcfc9c7
DE
938 general case. The current rule is that we only translate PATH.
939 We need to handle PATH because we're about to call CreateProcess and
940 it uses PATH to find DLL's. Fortunately PATH has a well-defined value
941 in both posix and win32 environments. cygwin.dll will change it back
942 to posix style if necessary. */
e88c49c3
DE
943
944 static const char *conv_path_names[] =
3a4b77d8
JM
945 {
946 "PATH=",
947 0
948 };
e88c49c3
DE
949
950 /* CreateProcess takes the environment list as a null terminated set of
951 strings (i.e. two nulls terminate the list). */
952
953 /* Get total size for env strings. */
954 for (envlen = 0, i = 0; env[i] && *env[i]; i++)
955 {
2dcfc9c7 956 int j, len;
e88c49c3 957
2dcfc9c7
DE
958 for (j = 0; conv_path_names[j]; j++)
959 {
960 len = strlen (conv_path_names[j]);
961 if (strncmp (conv_path_names[j], env[i], len) == 0)
e88c49c3 962 {
1a443730 963 if (cygwin32_posix_path_list_p (env[i] + len))
2dcfc9c7 964 envlen += len
1a443730 965 + cygwin32_posix_to_win32_path_list_buf_size (env[i] + len);
2dcfc9c7
DE
966 else
967 envlen += strlen (env[i]) + 1;
968 break;
e88c49c3 969 }
e88c49c3 970 }
2dcfc9c7 971 if (conv_path_names[j] == NULL)
e88c49c3
DE
972 envlen += strlen (env[i]) + 1;
973 }
974
975 winenv = alloca (envlen + 1);
976
977 /* Copy env strings into new buffer. */
3cee93ac 978 for (temp = winenv, i = 0; env[i] && *env[i]; i++)
e88c49c3 979 {
2dcfc9c7 980 int j, len;
e88c49c3 981
2dcfc9c7
DE
982 for (j = 0; conv_path_names[j]; j++)
983 {
984 len = strlen (conv_path_names[j]);
985 if (strncmp (conv_path_names[j], env[i], len) == 0)
e88c49c3 986 {
1a443730 987 if (cygwin32_posix_path_list_p (env[i] + len))
e88c49c3
DE
988 {
989 memcpy (temp, env[i], len);
1a443730 990 cygwin32_posix_to_win32_path_list (env[i] + len, temp + len);
e88c49c3 991 }
2dcfc9c7
DE
992 else
993 strcpy (temp, env[i]);
994 break;
e88c49c3 995 }
e88c49c3 996 }
2dcfc9c7 997 if (conv_path_names[j] == NULL)
e88c49c3 998 strcpy (temp, env[i]);
2dcfc9c7 999
e88c49c3
DE
1000 temp += strlen (temp) + 1;
1001 }
1002
1003 /* Final nil string to terminate new env. */
1004 *temp = 0;
1005 }
1750a5ef 1006
1750a5ef 1007 ret = CreateProcess (0,
3a4b77d8 1008 args, /* command line */
24e60978
SC
1009 NULL, /* Security */
1010 NULL, /* thread */
1011 TRUE, /* inherit handles */
1012 flags, /* start flags */
1750a5ef 1013 winenv,
24e60978
SC
1014 NULL, /* current directory */
1015 &si,
1016 &pi);
1017 if (!ret)
3a4b77d8 1018 error ("Error creating process %s, (error %d)\n", exec_file, GetLastError ());
24e60978
SC
1019
1020 exception_count = 0;
1021 event_count = 0;
1022
3cee93ac
CF
1023 current_process_handle = pi.hProcess;
1024 current_event.dwProcessId = pi.dwProcessId;
1025 memset (&current_event, 0, sizeof (current_event));
1026 inferior_pid = current_event.dwThreadId = pi.dwThreadId;
24e60978 1027 push_target (&child_ops);
3cee93ac 1028 child_init_thread_list ();
24e60978
SC
1029 init_wait_for_inferior ();
1030 clear_proceed_status ();
1031 target_terminal_init ();
1032 target_terminal_inferior ();
1033
1e37c281
JM
1034 /* Run until process and threads are loaded */
1035 do
1036 get_child_debug_event (inferior_pid, &dummy, &event_code, &ret);
1037 while (event_code != EXCEPTION_DEBUG_EVENT);
24e60978 1038
d3a09475
JM
1039 SymSetOptions (SYMOPT_DEFERRED_LOADS);
1040 SymInitialize (current_process_handle, NULL, TRUE);
1041
1e37c281 1042 proceed ((CORE_ADDR) - 1, TARGET_SIGNAL_0, 0);
24e60978
SC
1043}
1044
1045static void
1046child_mourn_inferior ()
1047{
1e37c281
JM
1048 continue_status = DBG_CONTINUE;
1049 (void) child_continue (-1);
24e60978
SC
1050 unpush_target (&child_ops);
1051 generic_mourn_inferior ();
1052}
1053
24e60978
SC
1054/* Send a SIGINT to the process group. This acts just like the user typed a
1055 ^C on the controlling terminal. */
1056
b607efe7 1057static void
24e60978
SC
1058child_stop ()
1059{
1ef980b9 1060 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
1e37c281 1061 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
3a4b77d8 1062 registers_changed (); /* refresh register state */
24e60978
SC
1063}
1064
1065int
eb708f2e
SC
1066child_xfer_memory (CORE_ADDR memaddr, char *our, int len,
1067 int write, struct target_ops *target)
24e60978
SC
1068{
1069 DWORD done;
1070 if (write)
1071 {
1ef980b9
SC
1072 DEBUG_MEM (("gdb: write target memory, %d bytes at 0x%08x\n",
1073 len, memaddr));
3cee93ac
CF
1074 WriteProcessMemory (current_process_handle, (LPVOID) memaddr, our,
1075 len, &done);
1076 FlushInstructionCache (current_process_handle, (LPCVOID) memaddr, len);
24e60978
SC
1077 }
1078 else
1079 {
1ef980b9
SC
1080 DEBUG_MEM (("gdb: read target memory, %d bytes at 0x%08x\n",
1081 len, memaddr));
3cee93ac
CF
1082 ReadProcessMemory (current_process_handle, (LPCVOID) memaddr, our, len,
1083 &done);
24e60978
SC
1084 }
1085 return done;
1086}
1087
1088void
1089child_kill_inferior (void)
1090{
3cee93ac
CF
1091 CHECK (TerminateProcess (current_process_handle, 0));
1092
b5edcb45
ILT
1093 for (;;)
1094 {
1e37c281
JM
1095 continue_status = DBG_CONTINUE;
1096 if (!child_continue (-1))
b5edcb45 1097 break;
3cee93ac 1098 if (!WaitForDebugEvent (&current_event, INFINITE))
b5edcb45 1099 break;
3cee93ac 1100 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
b5edcb45
ILT
1101 break;
1102 }
1103
3cee93ac
CF
1104 CHECK (CloseHandle (current_process_handle));
1105
1106 /* this may fail in an attached process so don't check. */
1107 (void) CloseHandle (current_thread->h);
3a4b77d8 1108 target_mourn_inferior (); /* or just child_mourn_inferior? */
24e60978
SC
1109}
1110
1111void
3cee93ac 1112child_resume (int pid, int step, enum target_signal sig)
24e60978 1113{
3cee93ac
CF
1114 int i;
1115 thread_info *th;
24e60978 1116
3cee93ac
CF
1117 DEBUG_EXEC (("gdb: child_resume (pid=%d, step=%d, sig=%d);\n",
1118 pid, step, sig));
1119
1120 /* Get context for currently selected thread */
1121 th = thread_rec (current_event.dwThreadId, FALSE);
24e60978
SC
1122 if (step)
1123 {
1ef980b9 1124#ifdef i386
24e60978
SC
1125 /* Single step by setting t bit */
1126 child_fetch_inferior_registers (PS_REGNUM);
3cee93ac 1127 th->context.EFlags |= FLAG_TRACE_BIT;
454ffae5 1128#endif
24e60978
SC
1129 }
1130
3cee93ac 1131 if (th->context.ContextFlags)
24e60978 1132 {
3cee93ac
CF
1133 CHECK (SetThreadContext (th->h, &th->context));
1134 th->context.ContextFlags = 0;
24e60978
SC
1135 }
1136
3cee93ac
CF
1137 /* Allow continuing with the same signal that interrupted us.
1138 Otherwise complain. */
24e60978 1139
1e37c281 1140 child_continue (pid);
24e60978
SC
1141}
1142
1143static void
1144child_prepare_to_store ()
1145{
1146 /* Do nothing, since we can store individual regs */
1147}
1148
1149static int
1150child_can_run ()
1151{
1152 return 1;
1153}
1154
1155static void
1156child_close ()
1157{
1ef980b9 1158 DEBUG_EVENTS (("gdb: child_close, inferior_pid=%d\n", inferior_pid));
24e60978 1159}
1ef980b9 1160
3a4b77d8 1161struct target_ops child_ops;
c719b714 1162
3a4b77d8
JM
1163static void
1164init_child_ops (void)
24e60978 1165{
3a4b77d8
JM
1166 child_ops.to_shortname = "child";
1167 child_ops.to_longname = "Win32 child process";
1168 child_ops.to_doc = "Win32 child process (started by the \"run\" command).";
1169 child_ops.to_open = child_open;
1170 child_ops.to_close = child_close;
1171 child_ops.to_attach = child_attach;
1172 child_ops.to_detach = child_detach;
1173 child_ops.to_resume = child_resume;
1174 child_ops.to_wait = child_wait;
1175 child_ops.to_fetch_registers = child_fetch_inferior_registers;
1176 child_ops.to_store_registers = child_store_inferior_registers;
1177 child_ops.to_prepare_to_store = child_prepare_to_store;
1178 child_ops.to_xfer_memory = child_xfer_memory;
1179 child_ops.to_files_info = child_files_info;
1180 child_ops.to_insert_breakpoint = memory_insert_breakpoint;
1181 child_ops.to_remove_breakpoint = memory_remove_breakpoint;
1182 child_ops.to_terminal_init = terminal_init_inferior;
1183 child_ops.to_terminal_inferior = terminal_inferior;
1184 child_ops.to_terminal_ours_for_output = terminal_ours_for_output;
1185 child_ops.to_terminal_ours = terminal_ours;
1186 child_ops.to_terminal_info = child_terminal_info;
1187 child_ops.to_kill = child_kill_inferior;
1188 child_ops.to_load = 0;
1189 child_ops.to_lookup_symbol = 0;
1190 child_ops.to_create_inferior = child_create_inferior;
1191 child_ops.to_mourn_inferior = child_mourn_inferior;
1192 child_ops.to_can_run = child_can_run;
1193 child_ops.to_notice_signals = 0;
1194 child_ops.to_thread_alive = win32_child_thread_alive;
d3a09475 1195 child_ops.to_pid_to_str = cygwin_pid_to_str;
3a4b77d8
JM
1196 child_ops.to_stop = child_stop;
1197 child_ops.to_stratum = process_stratum;
1198 child_ops.DONT_USE = 0;
1199 child_ops.to_has_all_memory = 1;
1200 child_ops.to_has_memory = 1;
1201 child_ops.to_has_stack = 1;
1202 child_ops.to_has_registers = 1;
1203 child_ops.to_has_execution = 1;
1204 child_ops.to_sections = 0;
1205 child_ops.to_sections_end = 0;
1206 child_ops.to_magic = OPS_MAGIC;
c719b714 1207}
24e60978
SC
1208
1209void
1210_initialize_inftarg ()
1211{
1ef980b9 1212 struct cmd_list_element *c;
3a4b77d8 1213 init_child_ops ();
1ef980b9 1214
24e60978
SC
1215 add_show_from_set
1216 (add_set_cmd ("new-console", class_support, var_boolean,
1217 (char *) &new_console,
1218 "Set creation of new console when creating child process.",
1219 &setlist),
1220 &showlist);
1221
1222 add_show_from_set
1223 (add_set_cmd ("new-group", class_support, var_boolean,
1224 (char *) &new_group,
1225 "Set creation of new group when creating child process.",
1226 &setlist),
1227 &showlist);
1228
1ef980b9
SC
1229 add_show_from_set
1230 (add_set_cmd ("debugexec", class_support, var_boolean,
1231 (char *) &debug_exec,
1232 "Set whether to display execution in child process.",
1233 &setlist),
1234 &showlist);
1235
1236 add_show_from_set
1237 (add_set_cmd ("debugevents", class_support, var_boolean,
1238 (char *) &debug_events,
1239 "Set whether to display kernel events in child process.",
1240 &setlist),
1241 &showlist);
1242
1243 add_show_from_set
1244 (add_set_cmd ("debugmemory", class_support, var_boolean,
1245 (char *) &debug_memory,
1246 "Set whether to display memory accesses in child process.",
1247 &setlist),
1248 &showlist);
1249
1250 add_show_from_set
1251 (add_set_cmd ("debugexceptions", class_support, var_boolean,
1252 (char *) &debug_exceptions,
3a4b77d8 1253 "Set whether to display kernel exceptions in child process.",
1ef980b9
SC
1254 &setlist),
1255 &showlist);
1256
24e60978
SC
1257 add_target (&child_ops);
1258}
3cee93ac
CF
1259
1260/* Determine if the thread referenced by "pid" is alive
1261 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
1262 it means that the pid has died. Otherwise it is assumed to be alive. */
1263static int
bc8bd256 1264win32_child_thread_alive (int pid)
3cee93ac 1265{
3a4b77d8
JM
1266 return WaitForSingleObject (thread_rec (pid, FALSE)->h, 0) == WAIT_OBJECT_0 ?
1267 FALSE : TRUE;
3cee93ac
CF
1268}
1269
1270/* Convert pid to printable format. */
1271char *
1272cygwin_pid_to_str (int pid)
1273{
1274 static char buf[80];
1275 if (pid == current_event.dwProcessId)
1276 sprintf (buf, "process %d", pid);
1277 else
1278 sprintf (buf, "thread %d.0x%x", current_event.dwProcessId, pid);
1279 return buf;
1280}
This page took 0.288366 seconds and 4 git commands to generate.