hex2bin, bin2hex: move declarations to header.
[deliverable/binutils-gdb.git] / gdb / windows-nat.c
CommitLineData
dc05df57 1/* Target-vector operations for controlling windows child processes, for GDB.
0a65a603 2
8acc9f48 3 Copyright (C) 1995-2013 Free Software Foundation, Inc.
0a65a603 4
e6433c28 5 Contributed by Cygnus Solutions, A Red Hat Company.
e88c49c3 6
24e60978
SC
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
24e60978
SC
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
a9762ec7 15 but WITHOUT ANY WARRANTY; without even the implied warranty of
24e60978
SC
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
24e60978 21
dfe7f3ac 22/* Originally by Steve Chamberlain, sac@cygnus.com */
24e60978
SC
23
24#include "defs.h"
25#include "frame.h" /* required by inferior.h */
26#include "inferior.h"
27#include "target.h"
60250e8b 28#include "exceptions.h"
24e60978
SC
29#include "gdbcore.h"
30#include "command.h"
fa58ee11 31#include "completer.h"
4e052eda 32#include "regcache.h"
2a3d5645 33#include "top.h"
403d9909
CF
34#include <signal.h>
35#include <sys/types.h>
36#include <fcntl.h>
37#include <stdlib.h>
38#include <windows.h>
39#include <imagehlp.h>
2b008701 40#include <psapi.h>
10325bc5 41#ifdef __CYGWIN__
b7ff339d 42#include <wchar.h>
403d9909 43#include <sys/cygwin.h>
b7ff339d 44#include <cygwin/version.h>
10325bc5 45#endif
a244bdca 46#include <signal.h>
cad9cd60 47
24e60978 48#include "buildsym.h"
0ba1096a 49#include "filenames.h"
1ef980b9
SC
50#include "symfile.h"
51#include "objfiles.h"
92107356 52#include "gdb_bfd.h"
de1b3c3d 53#include "gdb_obstack.h"
24e60978 54#include "gdb_string.h"
fdfa3315 55#include "gdbthread.h"
24e60978 56#include "gdbcmd.h"
1750a5ef 57#include <sys/param.h>
1e37c281 58#include <unistd.h>
4646aa9d 59#include "exec.h"
3ee6f623 60#include "solist.h"
3cb8e7f6 61#include "solib.h"
de1b3c3d 62#include "xml-support.h"
24e60978 63
6c7de422
MK
64#include "i386-tdep.h"
65#include "i387-tdep.h"
66
31b060a2
CF
67#include "windows-tdep.h"
68#include "windows-nat.h"
9bb9e8ad 69#include "i386-nat.h"
ecc13e53 70#include "complaints.h"
de1b3c3d 71
418c6cb3 72#define AdjustTokenPrivileges dyn_AdjustTokenPrivileges
2b008701
CF
73#define DebugActiveProcessStop dyn_DebugActiveProcessStop
74#define DebugBreakProcess dyn_DebugBreakProcess
75#define DebugSetProcessKillOnExit dyn_DebugSetProcessKillOnExit
76#define EnumProcessModules dyn_EnumProcessModules
2b008701 77#define GetModuleInformation dyn_GetModuleInformation
418c6cb3
CF
78#define LookupPrivilegeValueA dyn_LookupPrivilegeValueA
79#define OpenProcessToken dyn_OpenProcessToken
cd44747c
PM
80#define GetConsoleFontSize dyn_GetConsoleFontSize
81#define GetCurrentConsoleFont dyn_GetCurrentConsoleFont
2b008701 82
418c6cb3
CF
83static BOOL WINAPI (*AdjustTokenPrivileges)(HANDLE, BOOL, PTOKEN_PRIVILEGES,
84 DWORD, PTOKEN_PRIVILEGES, PDWORD);
2b008701
CF
85static BOOL WINAPI (*DebugActiveProcessStop) (DWORD);
86static BOOL WINAPI (*DebugBreakProcess) (HANDLE);
87static BOOL WINAPI (*DebugSetProcessKillOnExit) (BOOL);
88static BOOL WINAPI (*EnumProcessModules) (HANDLE, HMODULE *, DWORD,
89 LPDWORD);
2b008701
CF
90static BOOL WINAPI (*GetModuleInformation) (HANDLE, HMODULE, LPMODULEINFO,
91 DWORD);
418c6cb3
CF
92static BOOL WINAPI (*LookupPrivilegeValueA)(LPCSTR, LPCSTR, PLUID);
93static BOOL WINAPI (*OpenProcessToken)(HANDLE, DWORD, PHANDLE);
581e13c1
MS
94static BOOL WINAPI (*GetCurrentConsoleFont) (HANDLE, BOOL,
95 CONSOLE_FONT_INFO *);
cd44747c 96static COORD WINAPI (*GetConsoleFontSize) (HANDLE, DWORD);
2b008701 97
dc05df57 98static struct target_ops windows_ops;
3ee6f623 99
b3c613f2
CF
100#undef STARTUPINFO
101#undef CreateProcess
102#undef GetModuleFileNameEx
103
104#ifndef __CYGWIN__
105# define __PMAX (MAX_PATH + 1)
106 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPSTR, DWORD);
107# define STARTUPINFO STARTUPINFOA
108# define CreateProcess CreateProcessA
109# define GetModuleFileNameEx_name "GetModuleFileNameExA"
110# define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
111#else
112# define __PMAX PATH_MAX
581e13c1 113/* The starting and ending address of the cygwin1.dll text segment. */
b3c613f2
CF
114 static CORE_ADDR cygwin_load_start;
115 static CORE_ADDR cygwin_load_end;
b3c613f2
CF
116# define __USEWIDE
117 typedef wchar_t cygwin_buf_t;
581e13c1
MS
118 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE,
119 LPWSTR, DWORD);
b3c613f2
CF
120# define STARTUPINFO STARTUPINFOW
121# define CreateProcess CreateProcessW
122# define GetModuleFileNameEx_name "GetModuleFileNameExW"
123# define bad_GetModuleFileNameEx bad_GetModuleFileNameExW
10325bc5 124#endif
a244bdca 125
581e13c1
MS
126static int have_saved_context; /* True if we've saved context from a
127 cygwin signal. */
128static CONTEXT saved_context; /* Containes the saved context from a
129 cygwin signal. */
a244bdca 130
0714f9bf
SS
131/* If we're not using the old Cygwin header file set, define the
132 following which never should have been in the generic Win32 API
581e13c1 133 headers in the first place since they were our own invention... */
0714f9bf 134#ifndef _GNU_H_WINDOWS_H
9d3789f7 135enum
8e860359
CF
136 {
137 FLAG_TRACE_BIT = 0x100,
138 CONTEXT_DEBUGGER = (CONTEXT_FULL | CONTEXT_FLOATING_POINT)
139 };
0714f9bf
SS
140#endif
141
5851ab76
JB
142#ifndef CONTEXT_EXTENDED_REGISTERS
143/* This macro is only defined on ia32. It only makes sense on this target,
144 so define it as zero if not already defined. */
145#define CONTEXT_EXTENDED_REGISTERS 0
146#endif
147
fa4ba8da
PM
148#define CONTEXT_DEBUGGER_DR CONTEXT_DEBUGGER | CONTEXT_DEBUG_REGISTERS \
149 | CONTEXT_EXTENDED_REGISTERS
97da3b20 150
41b4aadc 151static uintptr_t dr[8];
87a45c96
CF
152static int debug_registers_changed;
153static int debug_registers_used;
16d905e2
CF
154
155static int windows_initialization_done;
6537bb24 156#define DR6_CLEAR_VALUE 0xffff0ff0
97da3b20 157
3cee93ac 158/* The string sent by cygwin when it processes a signal.
581e13c1 159 FIXME: This should be in a cygwin include file. */
3929abe9
CF
160#ifndef _CYGWIN_SIGNAL_STRING
161#define _CYGWIN_SIGNAL_STRING "cYgSiGw00f"
162#endif
3cee93ac 163
29fe111d 164#define CHECK(x) check (x, __FILE__,__LINE__)
dfe7f3ac 165#define DEBUG_EXEC(x) if (debug_exec) printf_unfiltered x
4e52d31c
PM
166#define DEBUG_EVENTS(x) if (debug_events) printf_unfiltered x
167#define DEBUG_MEM(x) if (debug_memory) printf_unfiltered x
168#define DEBUG_EXCEPT(x) if (debug_exceptions) printf_unfiltered x
24e60978 169
dc05df57 170static void windows_stop (ptid_t);
02529b48 171static int windows_thread_alive (struct target_ops *, ptid_t);
7d85a9c0 172static void windows_kill_inferior (struct target_ops *);
3cee93ac 173
9bb9e8ad
PM
174static void cygwin_set_dr (int i, CORE_ADDR addr);
175static void cygwin_set_dr7 (unsigned long val);
a961bc18 176static CORE_ADDR cygwin_get_dr (int i);
9bb9e8ad 177static unsigned long cygwin_get_dr6 (void);
a961bc18 178static unsigned long cygwin_get_dr7 (void);
9bb9e8ad 179
a493e3e2 180static enum gdb_signal last_sig = GDB_SIGNAL_0;
581e13c1 181/* Set if a signal was received from the debugged process. */
7393af7c 182
3cee93ac 183/* Thread information structure used to track information that is
6537bb24 184 not available in gdb's thread structure. */
3cee93ac 185typedef struct thread_info_struct
3a4b77d8
JM
186 {
187 struct thread_info_struct *next;
188 DWORD id;
189 HANDLE h;
711e434b 190 CORE_ADDR thread_local_base;
3a4b77d8 191 char *name;
6537bb24 192 int suspended;
3ade5333 193 int reload_context;
3a4b77d8 194 CONTEXT context;
1e37c281 195 STACKFRAME sf;
8e860359
CF
196 }
197thread_info;
1e37c281 198
29fe111d 199static thread_info thread_head;
24e60978 200
581e13c1 201/* The process and thread handles for the above context. */
24e60978 202
3cee93ac
CF
203static DEBUG_EVENT current_event; /* The current debug event from
204 WaitForDebugEvent */
205static HANDLE current_process_handle; /* Currently executing process */
206static thread_info *current_thread; /* Info on currently selected thread */
349b409f 207static DWORD main_thread_id; /* Thread ID of the main thread */
24e60978 208
581e13c1 209/* Counts of things. */
24e60978
SC
210static int exception_count = 0;
211static int event_count = 0;
dfe7f3ac 212static int saw_create;
bf25528d 213static int open_process_used = 0;
24e60978 214
581e13c1 215/* User options. */
24e60978 216static int new_console = 0;
10325bc5 217#ifdef __CYGWIN__
09280ddf 218static int cygwin_exceptions = 0;
10325bc5 219#endif
1e37c281 220static int new_group = 1;
dfe7f3ac
CF
221static int debug_exec = 0; /* show execution */
222static int debug_events = 0; /* show events from kernel */
223static int debug_memory = 0; /* show target memory accesses */
1ef980b9 224static int debug_exceptions = 0; /* show target exceptions */
dfe7f3ac
CF
225static int useshell = 0; /* use shell for subprocesses */
226
7e63b4e4 227/* This vector maps GDB's idea of a register's number into an offset
dc05df57 228 in the windows exception context vector.
24e60978 229
3cee93ac 230 It also contains the bit mask needed to load the register in question.
24e60978 231
7e63b4e4
JB
232 The contents of this table can only be computed by the units
233 that provide CPU-specific support for Windows native debugging.
234 These units should set the table by calling
dc05df57 235 windows_set_context_register_offsets.
7e63b4e4 236
24e60978
SC
237 One day we could read a reg, we could inspect the context we
238 already have loaded, if it doesn't have the bit set that we need,
239 we read that set of registers in using GetThreadContext. If the
581e13c1 240 context already contains what we need, we just unpack it. Then to
24e60978
SC
241 write a register, first we have to ensure that the context contains
242 the other regs of the group, and then we copy the info in and set
581e13c1 243 out bit. */
24e60978 244
7e63b4e4 245static const int *mappings;
d3a09475 246
d40dc7a8
JB
247/* The function to use in order to determine whether a register is
248 a segment register or not. */
249static segment_register_p_ftype *segment_register_p;
250
24e60978 251/* This vector maps the target's idea of an exception (extracted
581e13c1 252 from the DEBUG_EVENT structure) to GDB's idea. */
24e60978
SC
253
254struct xlate_exception
255 {
256 int them;
2ea28649 257 enum gdb_signal us;
24e60978
SC
258 };
259
24e60978
SC
260static const struct xlate_exception
261 xlate[] =
262{
a493e3e2
PA
263 {EXCEPTION_ACCESS_VIOLATION, GDB_SIGNAL_SEGV},
264 {STATUS_STACK_OVERFLOW, GDB_SIGNAL_SEGV},
265 {EXCEPTION_BREAKPOINT, GDB_SIGNAL_TRAP},
266 {DBG_CONTROL_C, GDB_SIGNAL_INT},
267 {EXCEPTION_SINGLE_STEP, GDB_SIGNAL_TRAP},
268 {STATUS_FLOAT_DIVIDE_BY_ZERO, GDB_SIGNAL_FPE},
24e60978
SC
269 {-1, -1}};
270
7e63b4e4
JB
271/* Set the MAPPINGS static global to OFFSETS.
272 See the description of MAPPINGS for more details. */
273
274void
dc05df57 275windows_set_context_register_offsets (const int *offsets)
7e63b4e4
JB
276{
277 mappings = offsets;
278}
279
d40dc7a8
JB
280/* See windows-nat.h. */
281
282void
283windows_set_segment_register_p (segment_register_p_ftype *fun)
284{
285 segment_register_p = fun;
286}
287
fa4ba8da
PM
288static void
289check (BOOL ok, const char *file, int line)
290{
291 if (!ok)
d50a0ce2
CV
292 printf_filtered ("error return %s:%d was %u\n", file, line,
293 (unsigned) GetLastError ());
fa4ba8da
PM
294}
295
6537bb24
PA
296/* Find a thread record given a thread id. If GET_CONTEXT is not 0,
297 then also retrieve the context for this thread. If GET_CONTEXT is
298 negative, then don't suspend the thread. */
3cee93ac
CF
299static thread_info *
300thread_rec (DWORD id, int get_context)
24e60978 301{
3cee93ac
CF
302 thread_info *th;
303
3a4b77d8 304 for (th = &thread_head; (th = th->next) != NULL;)
3cee93ac
CF
305 if (th->id == id)
306 {
6537bb24 307 if (!th->suspended && get_context)
3cee93ac 308 {
8a892701 309 if (get_context > 0 && id != current_event.dwThreadId)
6537bb24
PA
310 {
311 if (SuspendThread (th->h) == (DWORD) -1)
312 {
313 DWORD err = GetLastError ();
d50a0ce2
CV
314 warning (_("SuspendThread failed. (winerr %u)"),
315 (unsigned) err);
6537bb24
PA
316 return NULL;
317 }
318 th->suspended = 1;
319 }
3cee93ac 320 else if (get_context < 0)
6537bb24 321 th->suspended = -1;
3ade5333 322 th->reload_context = 1;
3cee93ac
CF
323 }
324 return th;
325 }
326
327 return NULL;
328}
329
2dc38344 330/* Add a thread to the thread list. */
3cee93ac 331static thread_info *
711e434b 332windows_add_thread (ptid_t ptid, HANDLE h, void *tlb)
3cee93ac
CF
333{
334 thread_info *th;
2dc38344
PA
335 DWORD id;
336
337 gdb_assert (ptid_get_tid (ptid) != 0);
338
339 id = ptid_get_tid (ptid);
3cee93ac
CF
340
341 if ((th = thread_rec (id, FALSE)))
342 return th;
343
3929abe9 344 th = XZALLOC (thread_info);
3cee93ac
CF
345 th->id = id;
346 th->h = h;
711e434b 347 th->thread_local_base = (CORE_ADDR) (uintptr_t) tlb;
3cee93ac
CF
348 th->next = thread_head.next;
349 thread_head.next = th;
2dc38344
PA
350 add_thread (ptid);
351 /* Set the debug registers for the new thread if they are used. */
fa4ba8da
PM
352 if (debug_registers_used)
353 {
354 /* Only change the value of the debug registers. */
355 th->context.ContextFlags = CONTEXT_DEBUG_REGISTERS;
356 CHECK (GetThreadContext (th->h, &th->context));
357 th->context.Dr0 = dr[0];
358 th->context.Dr1 = dr[1];
359 th->context.Dr2 = dr[2];
360 th->context.Dr3 = dr[3];
6537bb24 361 th->context.Dr6 = DR6_CLEAR_VALUE;
fa4ba8da
PM
362 th->context.Dr7 = dr[7];
363 CHECK (SetThreadContext (th->h, &th->context));
364 th->context.ContextFlags = 0;
365 }
3cee93ac 366 return th;
24e60978
SC
367}
368
3cee93ac 369/* Clear out any old thread list and reintialize it to a
581e13c1 370 pristine state. */
24e60978 371static void
dc05df57 372windows_init_thread_list (void)
24e60978 373{
3cee93ac
CF
374 thread_info *th = &thread_head;
375
dc05df57 376 DEBUG_EVENTS (("gdb: windows_init_thread_list\n"));
3cee93ac
CF
377 init_thread_list ();
378 while (th->next != NULL)
24e60978 379 {
3cee93ac
CF
380 thread_info *here = th->next;
381 th->next = here->next;
b8c9b27d 382 xfree (here);
24e60978 383 }
059198c1 384 thread_head.next = NULL;
3cee93ac
CF
385}
386
581e13c1 387/* Delete a thread from the list of threads. */
3cee93ac 388static void
dc05df57 389windows_delete_thread (ptid_t ptid)
3cee93ac
CF
390{
391 thread_info *th;
2dc38344
PA
392 DWORD id;
393
394 gdb_assert (ptid_get_tid (ptid) != 0);
395
396 id = ptid_get_tid (ptid);
3cee93ac
CF
397
398 if (info_verbose)
2dc38344
PA
399 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (ptid));
400 delete_thread (ptid);
3cee93ac
CF
401
402 for (th = &thread_head;
403 th->next != NULL && th->next->id != id;
404 th = th->next)
405 continue;
406
407 if (th->next != NULL)
24e60978 408 {
3cee93ac
CF
409 thread_info *here = th->next;
410 th->next = here->next;
b8c9b27d 411 xfree (here);
24e60978
SC
412 }
413}
414
3cee93ac 415static void
dc05df57 416do_windows_fetch_inferior_registers (struct regcache *regcache, int r)
24e60978 417{
1e37c281 418 char *context_offset = ((char *) &current_thread->context) + mappings[r];
20a6ec49
MD
419 struct gdbarch *gdbarch = get_regcache_arch (regcache);
420 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
1e37c281 421 long l;
6c7de422 422
3ade5333 423 if (!current_thread)
d6dc8049 424 return; /* Windows sometimes uses a non-existent thread id in its
581e13c1 425 events. */
3ade5333
CF
426
427 if (current_thread->reload_context)
428 {
cb832706 429#ifdef __COPY_CONTEXT_SIZE
a244bdca
CF
430 if (have_saved_context)
431 {
581e13c1
MS
432 /* Lie about where the program actually is stopped since
433 cygwin has informed us that we should consider the signal
434 to have occurred at another location which is stored in
435 "saved_context. */
436 memcpy (&current_thread->context, &saved_context,
437 __COPY_CONTEXT_SIZE);
a244bdca
CF
438 have_saved_context = 0;
439 }
440 else
cb832706 441#endif
a244bdca
CF
442 {
443 thread_info *th = current_thread;
444 th->context.ContextFlags = CONTEXT_DEBUGGER_DR;
445 GetThreadContext (th->h, &th->context);
2b008701 446 /* Copy dr values from that thread.
581e13c1
MS
447 But only if there were not modified since last stop.
448 PR gdb/2388 */
88616312
PM
449 if (!debug_registers_changed)
450 {
451 dr[0] = th->context.Dr0;
452 dr[1] = th->context.Dr1;
453 dr[2] = th->context.Dr2;
454 dr[3] = th->context.Dr3;
455 dr[6] = th->context.Dr6;
456 dr[7] = th->context.Dr7;
457 }
a244bdca 458 }
3ade5333
CF
459 current_thread->reload_context = 0;
460 }
461
20a6ec49 462 if (r == I387_FISEG_REGNUM (tdep))
1e37c281 463 {
8e860359 464 l = *((long *) context_offset) & 0xffff;
56be3814 465 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 466 }
20a6ec49 467 else if (r == I387_FOP_REGNUM (tdep))
1e37c281 468 {
8e860359 469 l = (*((long *) context_offset) >> 16) & ((1 << 11) - 1);
56be3814 470 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 471 }
d40dc7a8
JB
472 else if (segment_register_p (r))
473 {
474 /* GDB treats segment registers as 32bit registers, but they are
475 in fact only 16 bits long. Make sure we do not read extra
476 bits from our source buffer. */
477 l = *((long *) context_offset) & 0xffff;
478 regcache_raw_supply (regcache, r, (char *) &l);
479 }
1e37c281 480 else if (r >= 0)
56be3814 481 regcache_raw_supply (regcache, r, context_offset);
3cee93ac 482 else
24e60978 483 {
20a6ec49 484 for (r = 0; r < gdbarch_num_regs (gdbarch); r++)
dc05df57 485 do_windows_fetch_inferior_registers (regcache, r);
24e60978 486 }
3cee93ac
CF
487}
488
489static void
28439f5e
PA
490windows_fetch_inferior_registers (struct target_ops *ops,
491 struct regcache *regcache, int r)
3cee93ac 492{
2dc38344 493 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 494 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 495 thread id in its events. */
3ade5333 496 if (current_thread)
dc05df57 497 do_windows_fetch_inferior_registers (regcache, r);
3cee93ac
CF
498}
499
500static void
dc05df57 501do_windows_store_inferior_registers (const struct regcache *regcache, int r)
3cee93ac 502{
3ade5333 503 if (!current_thread)
581e13c1 504 /* Windows sometimes uses a non-existent thread id in its events. */;
3ade5333 505 else if (r >= 0)
56be3814 506 regcache_raw_collect (regcache, r,
822c9732 507 ((char *) &current_thread->context) + mappings[r]);
24e60978
SC
508 else
509 {
40a6adc1 510 for (r = 0; r < gdbarch_num_regs (get_regcache_arch (regcache)); r++)
dc05df57 511 do_windows_store_inferior_registers (regcache, r);
24e60978
SC
512 }
513}
514
581e13c1 515/* Store a new register value into the current thread context. */
3cee93ac 516static void
28439f5e
PA
517windows_store_inferior_registers (struct target_ops *ops,
518 struct regcache *regcache, int r)
3cee93ac 519{
2dc38344 520 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 521 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 522 thread id in its events. */
3ade5333 523 if (current_thread)
dc05df57 524 do_windows_store_inferior_registers (regcache, r);
3cee93ac 525}
24e60978 526
7a9dd1b2 527/* Get the name of a given module at given base address. If base_address
33605d39
CF
528 is zero return the first loaded module (which is always the name of the
529 executable). */
3ee6f623 530static int
d3653bf6 531get_module_name (LPVOID base_address, char *dll_name_ret)
1e37c281
JM
532{
533 DWORD len;
534 MODULEINFO mi;
535 int i;
8e860359 536 HMODULE dh_buf[1];
581e13c1
MS
537 HMODULE *DllHandle = dh_buf; /* Set to temporary storage for
538 initial query. */
1e37c281 539 DWORD cbNeeded;
33605d39 540#ifdef __CYGWIN__
b3c613f2
CF
541 cygwin_buf_t pathbuf[__PMAX]; /* Temporary storage prior to converting to
542 posix form. __PMAX is always enough
d0d0ab16 543 as long as SO_NAME_MAX_PATH_SIZE is defined
581e13c1 544 as 512. */
33605d39 545#endif
1e37c281 546
1e37c281 547 cbNeeded = 0;
581e13c1
MS
548 /* Find size of buffer needed to handle list of modules loaded in
549 inferior. */
2b008701
CF
550 if (!EnumProcessModules (current_process_handle, DllHandle,
551 sizeof (HMODULE), &cbNeeded) || !cbNeeded)
1e37c281
JM
552 goto failed;
553
581e13c1 554 /* Allocate correct amount of space for module list. */
8e860359 555 DllHandle = (HMODULE *) alloca (cbNeeded);
1e37c281
JM
556 if (!DllHandle)
557 goto failed;
558
581e13c1 559 /* Get the list of modules. */
2b008701 560 if (!EnumProcessModules (current_process_handle, DllHandle, cbNeeded,
33605d39 561 &cbNeeded))
1e37c281
JM
562 goto failed;
563
29fe111d 564 for (i = 0; i < (int) (cbNeeded / sizeof (HMODULE)); i++)
1e37c281 565 {
581e13c1 566 /* Get information on this module. */
2b008701
CF
567 if (!GetModuleInformation (current_process_handle, DllHandle[i],
568 &mi, sizeof (mi)))
8a3fe4f8 569 error (_("Can't get module info"));
1e37c281 570
d3653bf6 571 if (!base_address || mi.lpBaseOfDll == base_address)
33605d39 572 {
581e13c1 573 /* Try to find the name of the given module. */
d0d0ab16 574#ifdef __CYGWIN__
581e13c1 575 /* Cygwin prefers that the path be in /x/y/z format. */
b3c613f2
CF
576 len = GetModuleFileNameEx (current_process_handle,
577 DllHandle[i], pathbuf, __PMAX);
d0d0ab16 578 if (len == 0)
d50a0ce2
CV
579 error (_("Error getting dll name: %u."),
580 (unsigned) GetLastError ());
d0d0ab16 581 if (cygwin_conv_path (CCP_WIN_W_TO_POSIX, pathbuf, dll_name_ret,
b3c613f2 582 __PMAX) < 0)
d0d0ab16
CV
583 error (_("Error converting dll name to POSIX: %d."), errno);
584#else
b3c613f2
CF
585 len = GetModuleFileNameEx (current_process_handle,
586 DllHandle[i], dll_name_ret, __PMAX);
33605d39 587 if (len == 0)
581e13c1
MS
588 error (_("Error getting dll name: %u."),
589 (unsigned) GetLastError ());
33605d39
CF
590#endif
591 return 1; /* success */
592 }
1e37c281
JM
593 }
594
595failed:
596 dll_name_ret[0] = '\0';
33605d39 597 return 0; /* failure */
1e37c281
JM
598}
599
450005e7 600/* Encapsulate the information required in a call to
581e13c1 601 symbol_file_add_args. */
8a892701
CF
602struct safe_symbol_file_add_args
603{
604 char *name;
605 int from_tty;
606 struct section_addr_info *addrs;
607 int mainline;
608 int flags;
7c5c87c0 609 struct ui_file *err, *out;
8a892701
CF
610 struct objfile *ret;
611};
612
581e13c1 613/* Maintain a linked list of "so" information. */
3ee6f623 614struct lm_info
02e423b9 615{
d3653bf6 616 LPVOID load_addr;
3ee6f623
CF
617};
618
619static struct so_list solib_start, *solib_end;
02e423b9 620
450005e7 621/* Call symbol_file_add with stderr redirected. We don't care if there
581e13c1 622 are errors. */
8a892701
CF
623static int
624safe_symbol_file_add_stub (void *argv)
625{
3ee6f623 626#define p ((struct safe_symbol_file_add_args *) argv)
7eedccfa
PP
627 const int add_flags = ((p->from_tty ? SYMFILE_VERBOSE : 0)
628 | (p->mainline ? SYMFILE_MAINLINE : 0));
629 p->ret = symbol_file_add (p->name, add_flags, p->addrs, p->flags);
8a892701
CF
630 return !!p->ret;
631#undef p
632}
633
581e13c1 634/* Restore gdb's stderr after calling symbol_file_add. */
8a892701 635static void
7c5c87c0 636safe_symbol_file_add_cleanup (void *p)
8a892701 637{
8e860359 638#define sp ((struct safe_symbol_file_add_args *)p)
450005e7 639 gdb_flush (gdb_stderr);
7c5c87c0 640 gdb_flush (gdb_stdout);
d3ff4a77 641 ui_file_delete (gdb_stderr);
7c5c87c0 642 ui_file_delete (gdb_stdout);
d3ff4a77 643 gdb_stderr = sp->err;
9d3789f7 644 gdb_stdout = sp->out;
8e860359 645#undef sp
8a892701
CF
646}
647
581e13c1 648/* symbol_file_add wrapper that prevents errors from being displayed. */
8a892701
CF
649static struct objfile *
650safe_symbol_file_add (char *name, int from_tty,
651 struct section_addr_info *addrs,
652 int mainline, int flags)
8a892701
CF
653{
654 struct safe_symbol_file_add_args p;
655 struct cleanup *cleanup;
656
7c5c87c0 657 cleanup = make_cleanup (safe_symbol_file_add_cleanup, &p);
8a892701 658
7c5c87c0
CF
659 p.err = gdb_stderr;
660 p.out = gdb_stdout;
450005e7 661 gdb_flush (gdb_stderr);
7c5c87c0 662 gdb_flush (gdb_stdout);
d3ff4a77 663 gdb_stderr = ui_file_new ();
7c5c87c0 664 gdb_stdout = ui_file_new ();
8a892701
CF
665 p.name = name;
666 p.from_tty = from_tty;
667 p.addrs = addrs;
668 p.mainline = mainline;
669 p.flags = flags;
670 catch_errors (safe_symbol_file_add_stub, &p, "", RETURN_MASK_ERROR);
671
672 do_cleanups (cleanup);
673 return p.ret;
674}
675
de1b3c3d 676static struct so_list *
dc05df57 677windows_make_so (const char *name, LPVOID load_addr)
8e860359 678{
3ee6f623 679 struct so_list *so;
d0d0ab16
CV
680 char *p;
681#ifndef __CYGWIN__
b3c613f2
CF
682 char buf[__PMAX];
683 char cwd[__PMAX];
3f8ad85b
CF
684 WIN32_FIND_DATA w32_fd;
685 HANDLE h = FindFirstFile(name, &w32_fd);
3f8ad85b 686
6badb179
CF
687 if (h == INVALID_HANDLE_VALUE)
688 strcpy (buf, name);
689 else
3f8ad85b 690 {
c914e0cc
CF
691 FindClose (h);
692 strcpy (buf, name);
693 if (GetCurrentDirectory (MAX_PATH + 1, cwd))
694 {
695 p = strrchr (buf, '\\');
696 if (p)
697 p[1] = '\0';
698 SetCurrentDirectory (buf);
699 GetFullPathName (w32_fd.cFileName, MAX_PATH, buf, &p);
700 SetCurrentDirectory (cwd);
701 }
3f8ad85b 702 }
3ee6f623
CF
703 if (strcasecmp (buf, "ntdll.dll") == 0)
704 {
705 GetSystemDirectory (buf, sizeof (buf));
706 strcat (buf, "\\ntdll.dll");
707 }
d0d0ab16 708#else
b3c613f2 709 cygwin_buf_t buf[__PMAX];
d0d0ab16 710
b3c613f2 711 buf[0] = 0;
d0d0ab16
CV
712 if (access (name, F_OK) != 0)
713 {
714 if (strcasecmp (name, "ntdll.dll") == 0)
b3c613f2 715#ifdef __USEWIDE
d0d0ab16
CV
716 {
717 GetSystemDirectoryW (buf, sizeof (buf) / sizeof (wchar_t));
718 wcscat (buf, L"\\ntdll.dll");
719 }
b3c613f2
CF
720#else
721 {
722 GetSystemDirectoryA (buf, sizeof (buf) / sizeof (wchar_t));
723 strcat (buf, "\\ntdll.dll");
724 }
725#endif
d0d0ab16
CV
726 }
727#endif
3929abe9 728 so = XZALLOC (struct so_list);
3ee6f623
CF
729 so->lm_info = (struct lm_info *) xmalloc (sizeof (struct lm_info));
730 so->lm_info->load_addr = load_addr;
de1b3c3d 731 strcpy (so->so_original_name, name);
10325bc5
PA
732#ifndef __CYGWIN__
733 strcpy (so->so_name, buf);
734#else
d0d0ab16
CV
735 if (buf[0])
736 cygwin_conv_path (CCP_WIN_W_TO_POSIX, buf, so->so_name,
737 SO_NAME_MAX_PATH_SIZE);
738 else
739 {
60c5c021 740 char *rname = realpath (name, NULL);
d0d0ab16
CV
741 if (rname && strlen (rname) < SO_NAME_MAX_PATH_SIZE)
742 {
743 strcpy (so->so_name, rname);
744 free (rname);
745 }
746 else
747 error (_("dll path too long"));
748 }
de1b3c3d
PA
749 /* Record cygwin1.dll .text start/end. */
750 p = strchr (so->so_name, '\0') - (sizeof ("/cygwin1.dll") - 1);
751 if (p >= so->so_name && strcasecmp (p, "/cygwin1.dll") == 0)
752 {
753 bfd *abfd;
754 asection *text = NULL;
755 CORE_ADDR text_vma;
8e860359 756
1c00ec6b 757 abfd = gdb_bfd_open (so->so_name, "pei-i386", -1);
a244bdca 758
de1b3c3d
PA
759 if (!abfd)
760 return so;
761
762 if (bfd_check_format (abfd, bfd_object))
763 text = bfd_get_section_by_name (abfd, ".text");
764
765 if (!text)
766 {
cbb099e8 767 gdb_bfd_unref (abfd);
de1b3c3d
PA
768 return so;
769 }
770
7a9dd1b2 771 /* The symbols in a dll are offset by 0x1000, which is the
de1b3c3d 772 offset from 0 of the first byte in an image - because of the
581e13c1
MS
773 file header and the section alignment. */
774 cygwin_load_start = (CORE_ADDR) (uintptr_t) ((char *)
775 load_addr + 0x1000);
dc05df57 776 cygwin_load_end = cygwin_load_start + bfd_section_size (abfd, text);
de1b3c3d 777
cbb099e8 778 gdb_bfd_unref (abfd);
de1b3c3d 779 }
10325bc5 780#endif
de1b3c3d
PA
781
782 return so;
8e860359
CF
783}
784
3ee6f623 785static char *
dfe7f3ac
CF
786get_image_name (HANDLE h, void *address, int unicode)
787{
d0d0ab16 788#ifdef __CYGWIN__
b3c613f2 789 static char buf[__PMAX];
d0d0ab16 790#else
b3c613f2 791 static char buf[(2 * __PMAX) + 1];
d0d0ab16 792#endif
dfe7f3ac
CF
793 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
794 char *address_ptr;
795 int len = 0;
796 char b[2];
5732a500 797 SIZE_T done;
dfe7f3ac
CF
798
799 /* Attempt to read the name of the dll that was detected.
800 This is documented to work only when actively debugging
581e13c1 801 a program. It will not work for attached processes. */
dfe7f3ac
CF
802 if (address == NULL)
803 return NULL;
804
dfe7f3ac 805 /* See if we could read the address of a string, and that the
581e13c1
MS
806 address isn't null. */
807 if (!ReadProcessMemory (h, address, &address_ptr,
808 sizeof (address_ptr), &done)
6f17862b 809 || done != sizeof (address_ptr) || !address_ptr)
dfe7f3ac
CF
810 return NULL;
811
581e13c1 812 /* Find the length of the string. */
6f17862b
CF
813 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
814 && (b[0] != 0 || b[size - 1] != 0) && done == size)
815 continue;
dfe7f3ac
CF
816
817 if (!unicode)
818 ReadProcessMemory (h, address_ptr, buf, len, &done);
819 else
820 {
821 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
822 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
823 &done);
d0d0ab16 824#ifdef __CYGWIN__
b3c613f2 825 wcstombs (buf, unicode_address, __PMAX);
d0d0ab16
CV
826#else
827 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, sizeof buf,
828 0, 0);
829#endif
dfe7f3ac
CF
830 }
831
832 return buf;
833}
834
24e60978
SC
835/* Wait for child to do something. Return pid of child, or -1 in case
836 of error; store status through argument pointer OURSTATUS. */
1750a5ef 837static int
0a65a603 838handle_load_dll (void *dummy)
24e60978 839{
3a4b77d8 840 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
b3c613f2 841 char dll_buf[__PMAX];
450005e7 842 char *dll_name = NULL;
3cee93ac 843
3a4b77d8 844 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 845
d3653bf6 846 if (!get_module_name (event->lpBaseOfDll, dll_buf))
8e860359 847 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 848
1e37c281 849 dll_name = dll_buf;
24e60978 850
dfe7f3ac 851 if (*dll_name == '\0')
de1b3c3d
PA
852 dll_name = get_image_name (current_process_handle,
853 event->lpImageName, event->fUnicode);
3cee93ac
CF
854 if (!dll_name)
855 return 1;
856
dc05df57 857 solib_end->next = windows_make_so (dll_name, event->lpBaseOfDll);
de1b3c3d 858 solib_end = solib_end->next;
450005e7 859
a74ce742
PM
860 DEBUG_EVENTS (("gdb: Loading dll \"%s\" at %s.\n", solib_end->so_name,
861 host_address_to_string (solib_end->lm_info->load_addr)));
7488902c 862
450005e7
CF
863 return 1;
864}
865
3ee6f623 866static void
dc05df57 867windows_free_so (struct so_list *so)
3ee6f623 868{
3ee6f623
CF
869 if (so->lm_info)
870 xfree (so->lm_info);
de1b3c3d 871 xfree (so);
3cb8e7f6
CF
872}
873
d3ff4a77 874static int
0a65a603 875handle_unload_dll (void *dummy)
d3ff4a77 876{
d3653bf6 877 LPVOID lpBaseOfDll = current_event.u.UnloadDll.lpBaseOfDll;
3ee6f623 878 struct so_list *so;
d3ff4a77
CF
879
880 for (so = &solib_start; so->next != NULL; so = so->next)
3ee6f623 881 if (so->next->lm_info->load_addr == lpBaseOfDll)
d3ff4a77 882 {
3ee6f623 883 struct so_list *sodel = so->next;
d3ff4a77
CF
884 so->next = sodel->next;
885 if (!so->next)
886 solib_end = so;
7488902c
PM
887 DEBUG_EVENTS (("gdb: Unloading dll \"%s\".\n", sodel->so_name));
888
dc05df57 889 windows_free_so (sodel);
3929abe9 890 solib_add (NULL, 0, NULL, auto_solib_add);
d3ff4a77
CF
891 return 1;
892 }
3929abe9 893
ecc13e53
JB
894 /* We did not find any DLL that was previously loaded at this address,
895 so register a complaint. We do not report an error, because we have
896 observed that this may be happening under some circumstances. For
897 instance, running 32bit applications on x64 Windows causes us to receive
898 4 mysterious UNLOAD_DLL_DEBUG_EVENTs during the startup phase (these
899 events are apparently caused by the WOW layer, the interface between
900 32bit and 64bit worlds). */
901 complaint (&symfile_complaints, _("dll starting at %s not found."),
902 host_address_to_string (lpBaseOfDll));
d3ff4a77
CF
903
904 return 0;
905}
906
581e13c1 907/* Clear list of loaded DLLs. */
3ee6f623 908static void
dc05df57 909windows_clear_solib (void)
450005e7 910{
450005e7
CF
911 solib_start.next = NULL;
912 solib_end = &solib_start;
450005e7 913}
295732ea 914
581e13c1 915/* Load DLL symbol info. */
d603d4b3 916static void
7470a420 917dll_symbol_command (char *args, int from_tty)
450005e7 918{
8e860359 919 int n;
450005e7 920 dont_repeat ();
8e860359 921
450005e7 922 if (args == NULL)
8a3fe4f8 923 error (_("dll-symbols requires a file name"));
450005e7 924
8e860359
CF
925 n = strlen (args);
926 if (n > 4 && strcasecmp (args + n - 4, ".dll") != 0)
927 {
928 char *newargs = (char *) alloca (n + 4 + 1);
929 strcpy (newargs, args);
930 strcat (newargs, ".dll");
931 args = newargs;
932 }
933
7470a420 934 safe_symbol_file_add (args, from_tty, NULL, 0, OBJF_SHARED | OBJF_USERLOADED);
8e860359 935}
450005e7 936
3cee93ac
CF
937/* Handle DEBUG_STRING output from child process.
938 Cygwin prepends its messages with a "cygwin:". Interpret this as
581e13c1 939 a Cygwin signal. Otherwise just print the string as a warning. */
3cee93ac
CF
940static int
941handle_output_debug_string (struct target_waitstatus *ourstatus)
942{
a244bdca
CF
943 char *s = NULL;
944 int retval = 0;
3cee93ac
CF
945
946 if (!target_read_string
2c647436
PM
947 ((CORE_ADDR) (uintptr_t) current_event.u.DebugString.lpDebugStringData,
948 &s, 1024, 0)
3cee93ac 949 || !s || !*s)
a244bdca 950 /* nothing to do */;
581e13c1
MS
951 else if (strncmp (s, _CYGWIN_SIGNAL_STRING,
952 sizeof (_CYGWIN_SIGNAL_STRING) - 1) != 0)
3cee93ac 953 {
10325bc5 954#ifdef __CYGWIN__
d3a09475 955 if (strncmp (s, "cYg", 3) != 0)
10325bc5 956#endif
8a3fe4f8 957 warning (("%s"), s);
3cee93ac 958 }
cb832706 959#ifdef __COPY_CONTEXT_SIZE
d3a09475 960 else
3cee93ac 961 {
581e13c1
MS
962 /* Got a cygwin signal marker. A cygwin signal is followed by
963 the signal number itself and then optionally followed by the
964 thread id and address to saved context within the DLL. If
965 these are supplied, then the given thread is assumed to have
966 issued the signal and the context from the thread is assumed
967 to be stored at the given address in the inferior. Tell gdb
968 to treat this like a real signal. */
3cee93ac 969 char *p;
3929abe9 970 int sig = strtol (s + sizeof (_CYGWIN_SIGNAL_STRING) - 1, &p, 0);
2ea28649 971 int gotasig = gdb_signal_from_host (sig);
0714f9bf
SS
972 ourstatus->value.sig = gotasig;
973 if (gotasig)
a244bdca
CF
974 {
975 LPCVOID x;
976 DWORD n;
977 ourstatus->kind = TARGET_WAITKIND_STOPPED;
978 retval = strtoul (p, &p, 0);
979 if (!retval)
980 retval = main_thread_id;
d50a0ce2 981 else if ((x = (LPCVOID) string_to_core_addr (p))
a244bdca 982 && ReadProcessMemory (current_process_handle, x,
581e13c1
MS
983 &saved_context,
984 __COPY_CONTEXT_SIZE, &n)
a244bdca
CF
985 && n == __COPY_CONTEXT_SIZE)
986 have_saved_context = 1;
987 current_event.dwThreadId = retval;
988 }
3cee93ac 989 }
cb832706 990#endif
3cee93ac 991
a244bdca
CF
992 if (s)
993 xfree (s);
994 return retval;
3cee93ac 995}
24e60978 996
c1748f97
PM
997static int
998display_selector (HANDLE thread, DWORD sel)
999{
1000 LDT_ENTRY info;
1001 if (GetThreadSelectorEntry (thread, sel, &info))
1002 {
1003 int base, limit;
d50a0ce2 1004 printf_filtered ("0x%03x: ", (unsigned) sel);
c1748f97 1005 if (!info.HighWord.Bits.Pres)
baa93fa6
CF
1006 {
1007 puts_filtered ("Segment not present\n");
1008 return 0;
1009 }
c1748f97
PM
1010 base = (info.HighWord.Bits.BaseHi << 24) +
1011 (info.HighWord.Bits.BaseMid << 16)
1012 + info.BaseLow;
1013 limit = (info.HighWord.Bits.LimitHi << 16) + info.LimitLow;
1014 if (info.HighWord.Bits.Granularity)
caad7706 1015 limit = (limit << 12) | 0xfff;
c1748f97
PM
1016 printf_filtered ("base=0x%08x limit=0x%08x", base, limit);
1017 if (info.HighWord.Bits.Default_Big)
baa93fa6 1018 puts_filtered(" 32-bit ");
c1748f97 1019 else
baa93fa6 1020 puts_filtered(" 16-bit ");
c1748f97
PM
1021 switch ((info.HighWord.Bits.Type & 0xf) >> 1)
1022 {
1023 case 0:
baa93fa6
CF
1024 puts_filtered ("Data (Read-Only, Exp-up");
1025 break;
c1748f97 1026 case 1:
baa93fa6
CF
1027 puts_filtered ("Data (Read/Write, Exp-up");
1028 break;
c1748f97 1029 case 2:
baa93fa6
CF
1030 puts_filtered ("Unused segment (");
1031 break;
c1748f97 1032 case 3:
baa93fa6
CF
1033 puts_filtered ("Data (Read/Write, Exp-down");
1034 break;
c1748f97 1035 case 4:
baa93fa6
CF
1036 puts_filtered ("Code (Exec-Only, N.Conf");
1037 break;
c1748f97 1038 case 5:
baa93fa6 1039 puts_filtered ("Code (Exec/Read, N.Conf");
c1748f97
PM
1040 break;
1041 case 6:
baa93fa6 1042 puts_filtered ("Code (Exec-Only, Conf");
c1748f97
PM
1043 break;
1044 case 7:
baa93fa6 1045 puts_filtered ("Code (Exec/Read, Conf");
c1748f97
PM
1046 break;
1047 default:
1048 printf_filtered ("Unknown type 0x%x",info.HighWord.Bits.Type);
1049 }
1050 if ((info.HighWord.Bits.Type & 0x1) == 0)
baa93fa6 1051 puts_filtered(", N.Acc");
c1748f97
PM
1052 puts_filtered (")\n");
1053 if ((info.HighWord.Bits.Type & 0x10) == 0)
1054 puts_filtered("System selector ");
1055 printf_filtered ("Priviledge level = %d. ", info.HighWord.Bits.Dpl);
1056 if (info.HighWord.Bits.Granularity)
baa93fa6 1057 puts_filtered ("Page granular.\n");
c1748f97
PM
1058 else
1059 puts_filtered ("Byte granular.\n");
1060 return 1;
1061 }
1062 else
1063 {
5572ce1f
PM
1064 DWORD err = GetLastError ();
1065 if (err == ERROR_NOT_SUPPORTED)
1066 printf_filtered ("Function not supported\n");
1067 else
d50a0ce2 1068 printf_filtered ("Invalid selector 0x%x.\n", (unsigned) sel);
c1748f97
PM
1069 return 0;
1070 }
1071}
1072
1073static void
1074display_selectors (char * args, int from_tty)
1075{
1076 if (!current_thread)
1077 {
1078 puts_filtered ("Impossible to display selectors now.\n");
1079 return;
1080 }
1081 if (!args)
1082 {
1083
1084 puts_filtered ("Selector $cs\n");
1085 display_selector (current_thread->h,
baa93fa6 1086 current_thread->context.SegCs);
c1748f97
PM
1087 puts_filtered ("Selector $ds\n");
1088 display_selector (current_thread->h,
baa93fa6 1089 current_thread->context.SegDs);
c1748f97
PM
1090 puts_filtered ("Selector $es\n");
1091 display_selector (current_thread->h,
baa93fa6 1092 current_thread->context.SegEs);
c1748f97
PM
1093 puts_filtered ("Selector $ss\n");
1094 display_selector (current_thread->h,
baa93fa6 1095 current_thread->context.SegSs);
c1748f97
PM
1096 puts_filtered ("Selector $fs\n");
1097 display_selector (current_thread->h,
1098 current_thread->context.SegFs);
1099 puts_filtered ("Selector $gs\n");
1100 display_selector (current_thread->h,
baa93fa6 1101 current_thread->context.SegGs);
c1748f97
PM
1102 }
1103 else
1104 {
1105 int sel;
1106 sel = parse_and_eval_long (args);
1107 printf_filtered ("Selector \"%s\"\n",args);
1108 display_selector (current_thread->h, sel);
1109 }
1110}
1111
7393af7c 1112#define DEBUG_EXCEPTION_SIMPLE(x) if (debug_exceptions) \
a74ce742
PM
1113 printf_unfiltered ("gdb: Target exception %s at %s\n", x, \
1114 host_address_to_string (\
1115 current_event.u.Exception.ExceptionRecord.ExceptionAddress))
7393af7c 1116
36339ecd 1117static int
450005e7 1118handle_exception (struct target_waitstatus *ourstatus)
24e60978 1119{
3cee93ac 1120 thread_info *th;
29fe111d 1121 DWORD code = current_event.u.Exception.ExceptionRecord.ExceptionCode;
3cee93ac 1122
29fe111d 1123 ourstatus->kind = TARGET_WAITKIND_STOPPED;
8a892701 1124
581e13c1 1125 /* Record the context of the current thread. */
3cee93ac 1126 th = thread_rec (current_event.dwThreadId, -1);
24e60978 1127
29fe111d 1128 switch (code)
24e60978 1129 {
1ef980b9 1130 case EXCEPTION_ACCESS_VIOLATION:
7393af7c 1131 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ACCESS_VIOLATION");
a493e3e2 1132 ourstatus->value.sig = GDB_SIGNAL_SEGV;
10325bc5 1133#ifdef __CYGWIN__
8da8e0b3 1134 {
581e13c1
MS
1135 /* See if the access violation happened within the cygwin DLL
1136 itself. Cygwin uses a kind of exception handling to deal
1137 with passed-in invalid addresses. gdb should not treat
1138 these as real SEGVs since they will be silently handled by
1139 cygwin. A real SEGV will (theoretically) be caught by
1140 cygwin later in the process and will be sent as a
1141 cygwin-specific-signal. So, ignore SEGVs if they show up
1142 within the text segment of the DLL itself. */
2c02bd72 1143 const char *fn;
581e13c1
MS
1144 CORE_ADDR addr = (CORE_ADDR) (uintptr_t)
1145 current_event.u.Exception.ExceptionRecord.ExceptionAddress;
1146
1147 if ((!cygwin_exceptions && (addr >= cygwin_load_start
1148 && addr < cygwin_load_end))
a244bdca 1149 || (find_pc_partial_function (addr, &fn, NULL, NULL)
581e13c1
MS
1150 && strncmp (fn, "KERNEL32!IsBad",
1151 strlen ("KERNEL32!IsBad")) == 0))
8da8e0b3
CF
1152 return 0;
1153 }
10325bc5 1154#endif
7393af7c
PM
1155 break;
1156 case STATUS_STACK_OVERFLOW:
1157 DEBUG_EXCEPTION_SIMPLE ("STATUS_STACK_OVERFLOW");
a493e3e2 1158 ourstatus->value.sig = GDB_SIGNAL_SEGV;
7393af7c
PM
1159 break;
1160 case STATUS_FLOAT_DENORMAL_OPERAND:
1161 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DENORMAL_OPERAND");
a493e3e2 1162 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1163 break;
1164 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1165 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ARRAY_BOUNDS_EXCEEDED");
a493e3e2 1166 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1167 break;
1168 case STATUS_FLOAT_INEXACT_RESULT:
1169 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INEXACT_RESULT");
a493e3e2 1170 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1171 break;
1172 case STATUS_FLOAT_INVALID_OPERATION:
1173 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INVALID_OPERATION");
a493e3e2 1174 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1175 break;
1176 case STATUS_FLOAT_OVERFLOW:
1177 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_OVERFLOW");
a493e3e2 1178 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1179 break;
1180 case STATUS_FLOAT_STACK_CHECK:
1181 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_STACK_CHECK");
a493e3e2 1182 ourstatus->value.sig = GDB_SIGNAL_FPE;
1ef980b9 1183 break;
3b7c8b74 1184 case STATUS_FLOAT_UNDERFLOW:
7393af7c 1185 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_UNDERFLOW");
a493e3e2 1186 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c 1187 break;
3b7c8b74 1188 case STATUS_FLOAT_DIVIDE_BY_ZERO:
7393af7c 1189 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DIVIDE_BY_ZERO");
a493e3e2 1190 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c 1191 break;
3b7c8b74 1192 case STATUS_INTEGER_DIVIDE_BY_ZERO:
7393af7c 1193 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_DIVIDE_BY_ZERO");
a493e3e2 1194 ourstatus->value.sig = GDB_SIGNAL_FPE;
3b7c8b74 1195 break;
7393af7c
PM
1196 case STATUS_INTEGER_OVERFLOW:
1197 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_OVERFLOW");
a493e3e2 1198 ourstatus->value.sig = GDB_SIGNAL_FPE;
1ef980b9
SC
1199 break;
1200 case EXCEPTION_BREAKPOINT:
7393af7c 1201 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_BREAKPOINT");
a493e3e2 1202 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1ef980b9
SC
1203 break;
1204 case DBG_CONTROL_C:
7393af7c 1205 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_C");
a493e3e2 1206 ourstatus->value.sig = GDB_SIGNAL_INT;
5b421780
PM
1207 break;
1208 case DBG_CONTROL_BREAK:
7393af7c 1209 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_BREAK");
a493e3e2 1210 ourstatus->value.sig = GDB_SIGNAL_INT;
1ef980b9
SC
1211 break;
1212 case EXCEPTION_SINGLE_STEP:
7393af7c 1213 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_SINGLE_STEP");
a493e3e2 1214 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1ef980b9 1215 break;
8227c82d 1216 case EXCEPTION_ILLEGAL_INSTRUCTION:
7393af7c 1217 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ILLEGAL_INSTRUCTION");
a493e3e2 1218 ourstatus->value.sig = GDB_SIGNAL_ILL;
7393af7c
PM
1219 break;
1220 case EXCEPTION_PRIV_INSTRUCTION:
1221 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_PRIV_INSTRUCTION");
a493e3e2 1222 ourstatus->value.sig = GDB_SIGNAL_ILL;
7393af7c
PM
1223 break;
1224 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1225 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_NONCONTINUABLE_EXCEPTION");
a493e3e2 1226 ourstatus->value.sig = GDB_SIGNAL_ILL;
8227c82d 1227 break;
1ef980b9 1228 default:
581e13c1 1229 /* Treat unhandled first chance exceptions specially. */
02e423b9 1230 if (current_event.u.Exception.dwFirstChance)
a244bdca 1231 return -1;
d50a0ce2
CV
1232 printf_unfiltered ("gdb: unknown target exception 0x%08x at %s\n",
1233 (unsigned) current_event.u.Exception.ExceptionRecord.ExceptionCode,
a74ce742
PM
1234 host_address_to_string (
1235 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
a493e3e2 1236 ourstatus->value.sig = GDB_SIGNAL_UNKNOWN;
1ef980b9 1237 break;
24e60978 1238 }
24e60978 1239 exception_count++;
7393af7c 1240 last_sig = ourstatus->value.sig;
36339ecd 1241 return 1;
24e60978
SC
1242}
1243
3cee93ac 1244/* Resume all artificially suspended threads if we are continuing
581e13c1 1245 execution. */
3cee93ac 1246static BOOL
dc05df57 1247windows_continue (DWORD continue_status, int id)
3cee93ac
CF
1248{
1249 int i;
1250 thread_info *th;
1251 BOOL res;
1252
d50a0ce2
CV
1253 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%d, ctid=%x, %s);\n",
1254 (unsigned) current_event.dwProcessId,
1255 (unsigned) current_event.dwThreadId,
dfe7f3ac 1256 continue_status == DBG_CONTINUE ?
7393af7c 1257 "DBG_CONTINUE" : "DBG_EXCEPTION_NOT_HANDLED"));
6537bb24
PA
1258
1259 for (th = &thread_head; (th = th->next) != NULL;)
1260 if ((id == -1 || id == (int) th->id)
1261 && th->suspended)
1262 {
1263 if (debug_registers_changed)
1264 {
1265 th->context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1266 th->context.Dr0 = dr[0];
1267 th->context.Dr1 = dr[1];
1268 th->context.Dr2 = dr[2];
1269 th->context.Dr3 = dr[3];
1270 th->context.Dr6 = DR6_CLEAR_VALUE;
1271 th->context.Dr7 = dr[7];
1272 }
1273 if (th->context.ContextFlags)
1274 {
1275 CHECK (SetThreadContext (th->h, &th->context));
1276 th->context.ContextFlags = 0;
1277 }
1278 if (th->suspended > 0)
1279 (void) ResumeThread (th->h);
1280 th->suspended = 0;
1281 }
1282
0714f9bf
SS
1283 res = ContinueDebugEvent (current_event.dwProcessId,
1284 current_event.dwThreadId,
1285 continue_status);
3cee93ac 1286
fa4ba8da 1287 debug_registers_changed = 0;
3cee93ac
CF
1288 return res;
1289}
1290
d6dc8049
CF
1291/* Called in pathological case where Windows fails to send a
1292 CREATE_PROCESS_DEBUG_EVENT after an attach. */
3ee6f623 1293static DWORD
5439edaa 1294fake_create_process (void)
3ade5333
CF
1295{
1296 current_process_handle = OpenProcess (PROCESS_ALL_ACCESS, FALSE,
1297 current_event.dwProcessId);
bf25528d
CF
1298 if (current_process_handle != NULL)
1299 open_process_used = 1;
1300 else
1301 {
d50a0ce2
CV
1302 error (_("OpenProcess call failed, GetLastError = %u"),
1303 (unsigned) GetLastError ());
bf25528d
CF
1304 /* We can not debug anything in that case. */
1305 }
3ade5333 1306 main_thread_id = current_event.dwThreadId;
711e434b
PM
1307 current_thread = windows_add_thread (
1308 ptid_build (current_event.dwProcessId, 0,
1309 current_event.dwThreadId),
1310 current_event.u.CreateThread.hThread,
1311 current_event.u.CreateThread.lpThreadLocalBase);
3ade5333
CF
1312 return main_thread_id;
1313}
1314
a244bdca 1315static void
28439f5e 1316windows_resume (struct target_ops *ops,
2ea28649 1317 ptid_t ptid, int step, enum gdb_signal sig)
a244bdca
CF
1318{
1319 thread_info *th;
1320 DWORD continue_status = DBG_CONTINUE;
1321
2dc38344
PA
1322 /* A specific PTID means `step only this thread id'. */
1323 int resume_all = ptid_equal (ptid, minus_one_ptid);
1324
1325 /* If we're continuing all threads, it's the current inferior that
1326 should be handled specially. */
1327 if (resume_all)
1328 ptid = inferior_ptid;
a244bdca 1329
a493e3e2 1330 if (sig != GDB_SIGNAL_0)
a244bdca
CF
1331 {
1332 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
1333 {
1334 DEBUG_EXCEPT(("Cannot continue with signal %d here.\n",sig));
1335 }
1336 else if (sig == last_sig)
1337 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1338 else
1339#if 0
1340/* This code does not seem to work, because
1341 the kernel does probably not consider changes in the ExceptionRecord
1342 structure when passing the exception to the inferior.
1343 Note that this seems possible in the exception handler itself. */
1344 {
1345 int i;
1346 for (i = 0; xlate[i].them != -1; i++)
1347 if (xlate[i].us == sig)
1348 {
581e13c1
MS
1349 current_event.u.Exception.ExceptionRecord.ExceptionCode
1350 = xlate[i].them;
a244bdca
CF
1351 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1352 break;
1353 }
1354 if (continue_status == DBG_CONTINUE)
1355 {
1356 DEBUG_EXCEPT(("Cannot continue with signal %d.\n",sig));
1357 }
1358 }
1359#endif
1360 DEBUG_EXCEPT(("Can only continue with recieved signal %d.\n",
1361 last_sig));
1362 }
1363
a493e3e2 1364 last_sig = GDB_SIGNAL_0;
a244bdca 1365
dc05df57 1366 DEBUG_EXEC (("gdb: windows_resume (pid=%d, tid=%ld, step=%d, sig=%d);\n",
2dc38344 1367 ptid_get_pid (ptid), ptid_get_tid (ptid), step, sig));
a244bdca 1368
581e13c1 1369 /* Get context for currently selected thread. */
2dc38344 1370 th = thread_rec (ptid_get_tid (inferior_ptid), FALSE);
a244bdca
CF
1371 if (th)
1372 {
1373 if (step)
1374 {
581e13c1 1375 /* Single step by setting t bit. */
a97b0ac8
UW
1376 struct regcache *regcache = get_current_regcache ();
1377 struct gdbarch *gdbarch = get_regcache_arch (regcache);
1378 windows_fetch_inferior_registers (ops, regcache,
1379 gdbarch_ps_regnum (gdbarch));
a244bdca
CF
1380 th->context.EFlags |= FLAG_TRACE_BIT;
1381 }
1382
1383 if (th->context.ContextFlags)
1384 {
1385 if (debug_registers_changed)
1386 {
1387 th->context.Dr0 = dr[0];
1388 th->context.Dr1 = dr[1];
1389 th->context.Dr2 = dr[2];
1390 th->context.Dr3 = dr[3];
6537bb24 1391 th->context.Dr6 = DR6_CLEAR_VALUE;
a244bdca
CF
1392 th->context.Dr7 = dr[7];
1393 }
1394 CHECK (SetThreadContext (th->h, &th->context));
1395 th->context.ContextFlags = 0;
1396 }
1397 }
1398
1399 /* Allow continuing with the same signal that interrupted us.
581e13c1 1400 Otherwise complain. */
a244bdca 1401
2dc38344 1402 if (resume_all)
dc05df57 1403 windows_continue (continue_status, -1);
2dc38344 1404 else
dc05df57 1405 windows_continue (continue_status, ptid_get_tid (ptid));
a244bdca
CF
1406}
1407
695de547
CF
1408/* Ctrl-C handler used when the inferior is not run in the same console. The
1409 handler is in charge of interrupting the inferior using DebugBreakProcess.
1410 Note that this function is not available prior to Windows XP. In this case
1411 we emit a warning. */
d603d4b3 1412static BOOL WINAPI
695de547
CF
1413ctrl_c_handler (DWORD event_type)
1414{
1415 const int attach_flag = current_inferior ()->attach_flag;
1416
bb0613a5
PM
1417 /* Only handle Ctrl-C and Ctrl-Break events. Ignore others. */
1418 if (event_type != CTRL_C_EVENT && event_type != CTRL_BREAK_EVENT)
695de547
CF
1419 return FALSE;
1420
1421 /* If the inferior and the debugger share the same console, do nothing as
1422 the inferior has also received the Ctrl-C event. */
1423 if (!new_console && !attach_flag)
1424 return TRUE;
1425
1426 if (!DebugBreakProcess (current_process_handle))
581e13c1
MS
1427 warning (_("Could not interrupt program. "
1428 "Press Ctrl-c in the program console."));
695de547
CF
1429
1430 /* Return true to tell that Ctrl-C has been handled. */
1431 return TRUE;
1432}
1433
8a892701 1434/* Get the next event from the child. Return 1 if the event requires
695de547 1435 handling by WFI (or whatever). */
1e37c281 1436static int
28439f5e
PA
1437get_windows_debug_event (struct target_ops *ops,
1438 int pid, struct target_waitstatus *ourstatus)
1e37c281
JM
1439{
1440 BOOL debug_event;
8a892701 1441 DWORD continue_status, event_code;
87a45c96 1442 thread_info *th;
8a892701 1443 static thread_info dummy_thread_info;
450005e7 1444 int retval = 0;
1e37c281 1445
a493e3e2 1446 last_sig = GDB_SIGNAL_0;
9d3789f7 1447
8a892701 1448 if (!(debug_event = WaitForDebugEvent (&current_event, 1000)))
29fe111d 1449 goto out;
1e37c281
JM
1450
1451 event_count++;
1452 continue_status = DBG_CONTINUE;
1e37c281 1453
8a892701 1454 event_code = current_event.dwDebugEventCode;
450005e7 1455 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
87a45c96 1456 th = NULL;
a244bdca 1457 have_saved_context = 0;
8a892701
CF
1458
1459 switch (event_code)
1e37c281
JM
1460 {
1461 case CREATE_THREAD_DEBUG_EVENT:
d50a0ce2 1462 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1463 (unsigned) current_event.dwProcessId,
1464 (unsigned) current_event.dwThreadId,
1465 "CREATE_THREAD_DEBUG_EVENT"));
dfe7f3ac 1466 if (saw_create != 1)
3ade5333 1467 {
181e7f93
PA
1468 struct inferior *inf;
1469 inf = find_inferior_pid (current_event.dwProcessId);
1470 if (!saw_create && inf->attach_flag)
3ade5333 1471 {
d6dc8049
CF
1472 /* Kludge around a Windows bug where first event is a create
1473 thread event. Caused when attached process does not have
581e13c1 1474 a main thread. */
3a3e9ee3 1475 retval = fake_create_process ();
181e7f93
PA
1476 if (retval)
1477 saw_create++;
3ade5333
CF
1478 }
1479 break;
1480 }
581e13c1 1481 /* Record the existence of this thread. */
450005e7 1482 retval = current_event.dwThreadId;
dc05df57 1483 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1484 current_event.dwThreadId),
711e434b
PM
1485 current_event.u.CreateThread.hThread,
1486 current_event.u.CreateThread.lpThreadLocalBase);
1487
1e37c281
JM
1488 break;
1489
1490 case EXIT_THREAD_DEBUG_EVENT:
d50a0ce2 1491 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1492 (unsigned) current_event.dwProcessId,
1493 (unsigned) current_event.dwThreadId,
1494 "EXIT_THREAD_DEBUG_EVENT"));
b3c613f2 1495
87a45c96
CF
1496 if (current_event.dwThreadId != main_thread_id)
1497 {
dc05df57 1498 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1499 current_event.dwThreadId));
87a45c96
CF
1500 th = &dummy_thread_info;
1501 }
1e37c281
JM
1502 break;
1503
1504 case CREATE_PROCESS_DEBUG_EVENT:
d50a0ce2 1505 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1506 (unsigned) current_event.dwProcessId,
1507 (unsigned) current_event.dwThreadId,
1508 "CREATE_PROCESS_DEBUG_EVENT"));
700b351b 1509 CloseHandle (current_event.u.CreateProcessInfo.hFile);
dfe7f3ac 1510 if (++saw_create != 1)
bf25528d 1511 break;
1e37c281 1512
dfe7f3ac 1513 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
87a45c96 1514 if (main_thread_id)
695de547
CF
1515 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
1516 main_thread_id));
9d3789f7 1517 main_thread_id = current_event.dwThreadId;
581e13c1 1518 /* Add the main thread. */
dc05df57 1519 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
695de547 1520 current_event.dwThreadId),
711e434b
PM
1521 current_event.u.CreateProcessInfo.hThread,
1522 current_event.u.CreateProcessInfo.lpThreadLocalBase);
3a3e9ee3 1523 retval = current_event.dwThreadId;
1e37c281
JM
1524 break;
1525
1526 case EXIT_PROCESS_DEBUG_EVENT:
d50a0ce2 1527 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1528 (unsigned) current_event.dwProcessId,
1529 (unsigned) current_event.dwThreadId,
1530 "EXIT_PROCESS_DEBUG_EVENT"));
16d905e2
CF
1531 if (!windows_initialization_done)
1532 {
1533 target_terminal_ours ();
1534 target_mourn_inferior ();
1535 error (_("During startup program exited with code 0x%x."),
1536 (unsigned int) current_event.u.ExitProcess.dwExitCode);
1537 }
1538 else if (saw_create == 1)
1539 {
1540 ourstatus->kind = TARGET_WAITKIND_EXITED;
1541 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
1542 retval = main_thread_id;
1543 }
8a892701 1544 break;
1e37c281
JM
1545
1546 case LOAD_DLL_DEBUG_EVENT:
d50a0ce2 1547 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1548 (unsigned) current_event.dwProcessId,
1549 (unsigned) current_event.dwThreadId,
1550 "LOAD_DLL_DEBUG_EVENT"));
700b351b 1551 CloseHandle (current_event.u.LoadDll.hFile);
dfe7f3ac
CF
1552 if (saw_create != 1)
1553 break;
8a892701 1554 catch_errors (handle_load_dll, NULL, (char *) "", RETURN_MASK_ALL);
450005e7
CF
1555 ourstatus->kind = TARGET_WAITKIND_LOADED;
1556 ourstatus->value.integer = 0;
9d3789f7 1557 retval = main_thread_id;
1e37c281
JM
1558 break;
1559
1560 case UNLOAD_DLL_DEBUG_EVENT:
d50a0ce2 1561 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1562 (unsigned) current_event.dwProcessId,
1563 (unsigned) current_event.dwThreadId,
1564 "UNLOAD_DLL_DEBUG_EVENT"));
dfe7f3ac
CF
1565 if (saw_create != 1)
1566 break;
d3ff4a77 1567 catch_errors (handle_unload_dll, NULL, (char *) "", RETURN_MASK_ALL);
de1b3c3d
PA
1568 ourstatus->kind = TARGET_WAITKIND_LOADED;
1569 ourstatus->value.integer = 0;
1570 retval = main_thread_id;
d3ff4a77 1571 break;
1e37c281
JM
1572
1573 case EXCEPTION_DEBUG_EVENT:
d50a0ce2 1574 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1575 (unsigned) current_event.dwProcessId,
1576 (unsigned) current_event.dwThreadId,
1577 "EXCEPTION_DEBUG_EVENT"));
dfe7f3ac
CF
1578 if (saw_create != 1)
1579 break;
a244bdca
CF
1580 switch (handle_exception (ourstatus))
1581 {
1582 case 0:
1583 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1584 break;
1585 case 1:
1586 retval = current_event.dwThreadId;
1587 break;
1588 case -1:
1589 last_sig = 1;
1590 continue_status = -1;
1591 break;
1592 }
1e37c281
JM
1593 break;
1594
581e13c1 1595 case OUTPUT_DEBUG_STRING_EVENT: /* Message from the kernel. */
d50a0ce2 1596 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1597 (unsigned) current_event.dwProcessId,
1598 (unsigned) current_event.dwThreadId,
1599 "OUTPUT_DEBUG_STRING_EVENT"));
dfe7f3ac
CF
1600 if (saw_create != 1)
1601 break;
a244bdca 1602 retval = handle_output_debug_string (ourstatus);
1e37c281 1603 break;
9d3789f7 1604
1e37c281 1605 default:
dfe7f3ac
CF
1606 if (saw_create != 1)
1607 break;
d50a0ce2
CV
1608 printf_unfiltered ("gdb: kernel event for pid=%u tid=%x\n",
1609 (unsigned) current_event.dwProcessId,
1610 (unsigned) current_event.dwThreadId);
1611 printf_unfiltered (" unknown event code %u\n",
1612 (unsigned) current_event.dwDebugEventCode);
1e37c281
JM
1613 break;
1614 }
1615
dfe7f3ac 1616 if (!retval || saw_create != 1)
a244bdca
CF
1617 {
1618 if (continue_status == -1)
02529b48 1619 windows_resume (ops, minus_one_ptid, 0, 1);
a244bdca 1620 else
dc05df57 1621 CHECK (windows_continue (continue_status, -1));
a244bdca 1622 }
450005e7 1623 else
9d3789f7 1624 {
2dc38344
PA
1625 inferior_ptid = ptid_build (current_event.dwProcessId, 0,
1626 retval);
3ade5333 1627 current_thread = th ?: thread_rec (current_event.dwThreadId, TRUE);
9d3789f7 1628 }
1e37c281
JM
1629
1630out:
450005e7 1631 return retval;
1e37c281
JM
1632}
1633
2dc38344 1634/* Wait for interesting events to occur in the target process. */
39f77062 1635static ptid_t
117de6a9 1636windows_wait (struct target_ops *ops,
47608cb1 1637 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
24e60978 1638{
2dc38344 1639 int pid = -1;
39f77062 1640
c44537cf
CV
1641 target_terminal_ours ();
1642
24e60978
SC
1643 /* We loop when we get a non-standard exception rather than return
1644 with a SPURIOUS because resume can try and step or modify things,
3cee93ac 1645 which needs a current_thread->h. But some of these exceptions mark
24e60978 1646 the birth or death of threads, which mean that the current thread
581e13c1 1647 isn't necessarily what you think it is. */
24e60978
SC
1648
1649 while (1)
450005e7 1650 {
c57918b2 1651 int retval;
2b008701 1652
695de547
CF
1653 /* If the user presses Ctrl-c while the debugger is waiting
1654 for an event, he expects the debugger to interrupt his program
1655 and to get the prompt back. There are two possible situations:
1656
1657 - The debugger and the program do not share the console, in
1658 which case the Ctrl-c event only reached the debugger.
1659 In that case, the ctrl_c handler will take care of interrupting
581e13c1
MS
1660 the inferior. Note that this case is working starting with
1661 Windows XP. For Windows 2000, Ctrl-C should be pressed in the
695de547
CF
1662 inferior console.
1663
1664 - The debugger and the program share the same console, in which
1665 case both debugger and inferior will receive the Ctrl-c event.
1666 In that case the ctrl_c handler will ignore the event, as the
1667 Ctrl-c event generated inside the inferior will trigger the
1668 expected debug event.
1669
1670 FIXME: brobecker/2008-05-20: If the inferior receives the
1671 signal first and the delay until GDB receives that signal
1672 is sufficiently long, GDB can sometimes receive the SIGINT
1673 after we have unblocked the CTRL+C handler. This would
1674 lead to the debugger stopping prematurely while handling
1675 the new-thread event that comes with the handling of the SIGINT
1676 inside the inferior, and then stop again immediately when
1677 the user tries to resume the execution in the inferior.
1678 This is a classic race that we should try to fix one day. */
1679 SetConsoleCtrlHandler (&ctrl_c_handler, TRUE);
28439f5e 1680 retval = get_windows_debug_event (ops, pid, ourstatus);
695de547 1681 SetConsoleCtrlHandler (&ctrl_c_handler, FALSE);
c57918b2 1682
450005e7 1683 if (retval)
2dc38344 1684 return ptid_build (current_event.dwProcessId, 0, retval);
450005e7
CF
1685 else
1686 {
1687 int detach = 0;
3cee93ac 1688
98bbd631
AC
1689 if (deprecated_ui_loop_hook != NULL)
1690 detach = deprecated_ui_loop_hook (0);
0714f9bf 1691
450005e7 1692 if (detach)
7d85a9c0 1693 windows_kill_inferior (ops);
450005e7
CF
1694 }
1695 }
24e60978
SC
1696}
1697
9d3789f7 1698static void
dc05df57 1699do_initial_windows_stuff (struct target_ops *ops, DWORD pid, int attaching)
9d3789f7
CF
1700{
1701 extern int stop_after_trap;
fa4ba8da 1702 int i;
d6b48e9c 1703 struct inferior *inf;
2020b7ab 1704 struct thread_info *tp;
9d3789f7 1705
a493e3e2 1706 last_sig = GDB_SIGNAL_0;
9d3789f7
CF
1707 event_count = 0;
1708 exception_count = 0;
bf25528d 1709 open_process_used = 0;
fa4ba8da 1710 debug_registers_changed = 0;
dfe7f3ac 1711 debug_registers_used = 0;
fa4ba8da
PM
1712 for (i = 0; i < sizeof (dr) / sizeof (dr[0]); i++)
1713 dr[i] = 0;
10325bc5 1714#ifdef __CYGWIN__
de1b3c3d 1715 cygwin_load_start = cygwin_load_end = 0;
10325bc5 1716#endif
9d3789f7
CF
1717 current_event.dwProcessId = pid;
1718 memset (&current_event, 0, sizeof (current_event));
0795be10 1719 push_target (ops);
cb851954 1720 disable_breakpoints_in_shlibs ();
dc05df57 1721 windows_clear_solib ();
9d3789f7
CF
1722 clear_proceed_status ();
1723 init_wait_for_inferior ();
1724
6c95b8df
PA
1725 inf = current_inferior ();
1726 inferior_appeared (inf, pid);
181e7f93 1727 inf->attach_flag = attaching;
7f9f62ba 1728
9f9d052e
PM
1729 /* Make the new process the current inferior, so terminal handling
1730 can rely on it. When attaching, we don't know about any thread
1731 id here, but that's OK --- nothing should be referencing the
dc05df57 1732 current thread until we report an event out of windows_wait. */
9f9d052e
PM
1733 inferior_ptid = pid_to_ptid (pid);
1734
c44537cf 1735 terminal_init_inferior_with_pgrp (pid);
9d3789f7
CF
1736 target_terminal_inferior ();
1737
16d905e2 1738 windows_initialization_done = 0;
16c381f0 1739 inf->control.stop_soon = STOP_QUIETLY;
9d3789f7
CF
1740 while (1)
1741 {
1742 stop_after_trap = 1;
e4c8541f 1743 wait_for_inferior ();
2020b7ab 1744 tp = inferior_thread ();
a493e3e2 1745 if (tp->suspend.stop_signal != GDB_SIGNAL_TRAP)
16c381f0 1746 resume (0, tp->suspend.stop_signal);
9d3789f7
CF
1747 else
1748 break;
1749 }
eff8332b 1750
16d905e2 1751 windows_initialization_done = 1;
16c381f0 1752 inf->control.stop_soon = NO_STOP_QUIETLY;
9d3789f7
CF
1753 stop_after_trap = 0;
1754 return;
1755}
1756
616a9dc4
CV
1757/* Try to set or remove a user privilege to the current process. Return -1
1758 if that fails, the previous setting of that privilege otherwise.
1759
1760 This code is copied from the Cygwin source code and rearranged to allow
1761 dynamically loading of the needed symbols from advapi32 which is only
581e13c1 1762 available on NT/2K/XP. */
616a9dc4
CV
1763static int
1764set_process_privilege (const char *privilege, BOOL enable)
1765{
616a9dc4
CV
1766 HANDLE token_hdl = NULL;
1767 LUID restore_priv;
1768 TOKEN_PRIVILEGES new_priv, orig_priv;
1769 int ret = -1;
1770 DWORD size;
1771
616a9dc4
CV
1772 if (!OpenProcessToken (GetCurrentProcess (),
1773 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
1774 &token_hdl))
1775 goto out;
1776
418c6cb3 1777 if (!LookupPrivilegeValueA (NULL, privilege, &restore_priv))
616a9dc4
CV
1778 goto out;
1779
1780 new_priv.PrivilegeCount = 1;
1781 new_priv.Privileges[0].Luid = restore_priv;
1782 new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0;
1783
1784 if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv,
295732ea 1785 sizeof orig_priv, &orig_priv, &size))
616a9dc4
CV
1786 goto out;
1787#if 0
1788 /* Disabled, otherwise every `attach' in an unprivileged user session
1789 would raise the "Failed to get SE_DEBUG_NAME privilege" warning in
581e13c1 1790 windows_attach(). */
616a9dc4 1791 /* AdjustTokenPrivileges returns TRUE even if the privilege could not
581e13c1 1792 be enabled. GetLastError () returns an correct error code, though. */
616a9dc4
CV
1793 if (enable && GetLastError () == ERROR_NOT_ALL_ASSIGNED)
1794 goto out;
1795#endif
1796
1797 ret = orig_priv.Privileges[0].Attributes == SE_PRIVILEGE_ENABLED ? 1 : 0;
1798
1799out:
1800 if (token_hdl)
1801 CloseHandle (token_hdl);
1802
1803 return ret;
1804}
1805
02cc9f49 1806/* Attach to process PID, then initialize for debugging it. */
24e60978 1807static void
dc05df57 1808windows_attach (struct target_ops *ops, char *args, int from_tty)
24e60978
SC
1809{
1810 BOOL ok;
559e75c0 1811 DWORD pid;
24e60978 1812
74164c56 1813 pid = parse_pid_to_attach (args);
24e60978 1814
616a9dc4
CV
1815 if (set_process_privilege (SE_DEBUG_NAME, TRUE) < 0)
1816 {
1817 printf_unfiltered ("Warning: Failed to get SE_DEBUG_NAME privilege\n");
581e13c1
MS
1818 printf_unfiltered ("This can cause attach to "
1819 "fail on Windows NT/2K/XP\n");
616a9dc4
CV
1820 }
1821
dc05df57 1822 windows_init_thread_list ();
9d3789f7 1823 ok = DebugActiveProcess (pid);
91a175b3 1824 saw_create = 0;
24e60978 1825
10325bc5 1826#ifdef __CYGWIN__
24e60978 1827 if (!ok)
baa93fa6 1828 {
581e13c1 1829 /* Try fall back to Cygwin pid. */
baa93fa6
CF
1830 pid = cygwin_internal (CW_CYGWIN_PID_TO_WINPID, pid);
1831
1832 if (pid > 0)
1833 ok = DebugActiveProcess (pid);
10325bc5
PA
1834 }
1835#endif
baa93fa6 1836
10325bc5
PA
1837 if (!ok)
1838 error (_("Can't attach to process."));
24e60978 1839
2b008701 1840 DebugSetProcessKillOnExit (FALSE);
3ade5333 1841
24e60978
SC
1842 if (from_tty)
1843 {
1844 char *exec_file = (char *) get_exec_file (0);
1845
1846 if (exec_file)
1847 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
39f77062 1848 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1849 else
1850 printf_unfiltered ("Attaching to %s\n",
39f77062 1851 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1852
1853 gdb_flush (gdb_stdout);
1854 }
1855
dc05df57 1856 do_initial_windows_stuff (ops, pid, 1);
9d3789f7 1857 target_terminal_ours ();
24e60978
SC
1858}
1859
24e60978 1860static void
dc05df57 1861windows_detach (struct target_ops *ops, char *args, int from_tty)
24e60978 1862{
02cc9f49
CV
1863 int detached = 1;
1864
2b008701 1865 ptid_t ptid = {-1};
a493e3e2 1866 windows_resume (ops, ptid, 0, GDB_SIGNAL_0);
96998ce7 1867
2b008701
CF
1868 if (!DebugActiveProcessStop (current_event.dwProcessId))
1869 {
d50a0ce2
CV
1870 error (_("Can't detach process %u (error %u)"),
1871 (unsigned) current_event.dwProcessId, (unsigned) GetLastError ());
2b008701 1872 detached = 0;
02cc9f49 1873 }
2b008701
CF
1874 DebugSetProcessKillOnExit (FALSE);
1875
02cc9f49 1876 if (detached && from_tty)
24e60978
SC
1877 {
1878 char *exec_file = get_exec_file (0);
1879 if (exec_file == 0)
1880 exec_file = "";
d50a0ce2
CV
1881 printf_unfiltered ("Detaching from program: %s, Pid %u\n", exec_file,
1882 (unsigned) current_event.dwProcessId);
24e60978
SC
1883 gdb_flush (gdb_stdout);
1884 }
7f9f62ba 1885
26cb8b7c 1886 i386_cleanup_dregs ();
39f77062 1887 inferior_ptid = null_ptid;
7f9f62ba
PA
1888 detach_inferior (current_event.dwProcessId);
1889
0795be10 1890 unpush_target (ops);
24e60978
SC
1891}
1892
3ee6f623 1893static char *
dc05df57 1894windows_pid_to_exec_file (int pid)
47216e51 1895{
b3c613f2 1896 static char path[__PMAX];
10325bc5 1897#ifdef __CYGWIN__
581e13c1 1898 /* Try to find exe name as symlink target of /proc/<pid>/exe. */
33605d39
CF
1899 int nchars;
1900 char procexe[sizeof ("/proc/4294967295/exe")];
08850b56
PM
1901
1902 xsnprintf (procexe, sizeof (procexe), "/proc/%u/exe", pid);
33605d39
CF
1903 nchars = readlink (procexe, path, sizeof(path));
1904 if (nchars > 0 && nchars < sizeof (path))
47216e51 1905 {
33605d39
CF
1906 path[nchars] = '\0'; /* Got it */
1907 return path;
47216e51 1908 }
10325bc5
PA
1909#endif
1910
33605d39 1911 /* If we get here then either Cygwin is hosed, this isn't a Cygwin version
581e13c1 1912 of gdb, or we're trying to debug a non-Cygwin windows executable. */
33605d39
CF
1913 if (!get_module_name (0, path))
1914 path[0] = '\0';
1915
1916 return path;
47216e51
CV
1917}
1918
24e60978
SC
1919/* Print status information about what we're accessing. */
1920
1921static void
dc05df57 1922windows_files_info (struct target_ops *ignore)
24e60978 1923{
181e7f93
PA
1924 struct inferior *inf = current_inferior ();
1925
24e60978 1926 printf_unfiltered ("\tUsing the running image of %s %s.\n",
181e7f93
PA
1927 inf->attach_flag ? "attached" : "child",
1928 target_pid_to_str (inferior_ptid));
24e60978
SC
1929}
1930
24e60978 1931static void
dc05df57 1932windows_open (char *arg, int from_tty)
24e60978 1933{
8a3fe4f8 1934 error (_("Use the \"run\" command to start a Unix child process."));
24e60978
SC
1935}
1936
cd44747c
PM
1937/* Modify CreateProcess parameters for use of a new separate console.
1938 Parameters are:
1939 *FLAGS: DWORD parameter for general process creation flags.
1940 *SI: STARTUPINFO structure, for which the console window size and
1941 console buffer size is filled in if GDB is running in a console.
1942 to create the new console.
1943 The size of the used font is not available on all versions of
1944 Windows OS. Furthermore, the current font might not be the default
1945 font, but this is still better than before.
1946 If the windows and buffer sizes are computed,
1947 SI->DWFLAGS is changed so that this information is used
1948 by CreateProcess function. */
1949
1950static void
1951windows_set_console_info (STARTUPINFO *si, DWORD *flags)
1952{
1953 HANDLE hconsole = CreateFile ("CONOUT$", GENERIC_READ | GENERIC_WRITE,
1954 FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, 0);
1955
1956 if (hconsole != INVALID_HANDLE_VALUE)
1957 {
1958 CONSOLE_SCREEN_BUFFER_INFO sbinfo;
1959 COORD font_size;
1960 CONSOLE_FONT_INFO cfi;
1961
1962 GetCurrentConsoleFont (hconsole, FALSE, &cfi);
1963 font_size = GetConsoleFontSize (hconsole, cfi.nFont);
1964 GetConsoleScreenBufferInfo(hconsole, &sbinfo);
1965 si->dwXSize = sbinfo.srWindow.Right - sbinfo.srWindow.Left + 1;
1966 si->dwYSize = sbinfo.srWindow.Bottom - sbinfo.srWindow.Top + 1;
1967 if (font_size.X)
1968 si->dwXSize *= font_size.X;
1969 else
1970 si->dwXSize *= 8;
1971 if (font_size.Y)
1972 si->dwYSize *= font_size.Y;
1973 else
1974 si->dwYSize *= 12;
1975 si->dwXCountChars = sbinfo.dwSize.X;
1976 si->dwYCountChars = sbinfo.dwSize.Y;
1977 si->dwFlags |= STARTF_USESIZE | STARTF_USECOUNTCHARS;
1978 }
1979 *flags |= CREATE_NEW_CONSOLE;
1980}
1981
c93dbcba
EZ
1982#ifndef __CYGWIN__
1983/* Function called by qsort to sort environment strings. */
1984
1985static int
1986envvar_cmp (const void *a, const void *b)
1987{
1988 const char **p = (const char **) a;
1989 const char **q = (const char **) b;
1990 return strcasecmp (*p, *q);
1991}
1992#endif
1993
b7ff339d
CV
1994#ifdef __CYGWIN__
1995static void
1996clear_win32_environment (char **env)
1997{
1998 int i;
1999 size_t len;
2000 wchar_t *copy = NULL, *equalpos;
2001
2002 for (i = 0; env[i] && *env[i]; i++)
2003 {
2004 len = mbstowcs (NULL, env[i], 0) + 1;
2005 copy = (wchar_t *) xrealloc (copy, len * sizeof (wchar_t));
2006 mbstowcs (copy, env[i], len);
2007 equalpos = wcschr (copy, L'=');
2008 if (equalpos)
2009 *equalpos = L'\0';
2010 SetEnvironmentVariableW (copy, NULL);
2011 }
2012 xfree (copy);
2013}
2014#endif
2015
dc05df57 2016/* Start an inferior windows child process and sets inferior_ptid to its pid.
24e60978
SC
2017 EXEC_FILE is the file to run.
2018 ALLARGS is a string containing the arguments to the program.
2019 ENV is the environment vector to pass. Errors reported with error(). */
2020
24e60978 2021static void
dc05df57 2022windows_create_inferior (struct target_ops *ops, char *exec_file,
136d6dae 2023 char *allargs, char **in_env, int from_tty)
24e60978 2024{
b3c613f2 2025 STARTUPINFO si;
41b4aadc 2026#ifdef __CYGWIN__
b3c613f2
CF
2027 cygwin_buf_t real_path[__PMAX];
2028 cygwin_buf_t shell[__PMAX]; /* Path to shell */
d0d0ab16 2029 const char *sh;
b3c613f2
CF
2030 cygwin_buf_t *toexec;
2031 cygwin_buf_t *cygallargs;
2032 cygwin_buf_t *args;
b7ff339d
CV
2033 char **old_env = NULL;
2034 PWCHAR w32_env;
d0d0ab16 2035 size_t len;
2becadee
CF
2036 int tty;
2037 int ostdin, ostdout, ostderr;
41b4aadc 2038#else
b3c613f2
CF
2039 char real_path[__PMAX];
2040 char shell[__PMAX]; /* Path to shell */
d0d0ab16
CV
2041 char *toexec;
2042 char *args;
8f205f9c 2043 size_t args_len;
41b4aadc 2044 HANDLE tty;
c93dbcba
EZ
2045 char *w32env;
2046 char *temp;
2047 size_t envlen;
2048 int i;
2049 size_t envsize;
2050 char **env;
41b4aadc 2051#endif
d0d0ab16
CV
2052 PROCESS_INFORMATION pi;
2053 BOOL ret;
2054 DWORD flags = 0;
3cb3b8df 2055 const char *inferior_io_terminal = get_inferior_io_terminal ();
24e60978
SC
2056
2057 if (!exec_file)
8a3fe4f8 2058 error (_("No executable specified, use `target exec'."));
24e60978
SC
2059
2060 memset (&si, 0, sizeof (si));
2061 si.cb = sizeof (si);
2062
d0d0ab16
CV
2063 if (new_group)
2064 flags |= CREATE_NEW_PROCESS_GROUP;
2065
2066 if (new_console)
cd44747c 2067 windows_set_console_info (&si, &flags);
d0d0ab16 2068
10325bc5 2069#ifdef __CYGWIN__
349b409f 2070 if (!useshell)
dfe7f3ac 2071 {
d0d0ab16
CV
2072 flags |= DEBUG_ONLY_THIS_PROCESS;
2073 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, exec_file, real_path,
b3c613f2 2074 __PMAX * sizeof (cygwin_buf_t)) < 0)
d0d0ab16 2075 error (_("Error starting executable: %d"), errno);
dfe7f3ac 2076 toexec = real_path;
b3c613f2 2077#ifdef __USEWIDE
d0d0ab16
CV
2078 len = mbstowcs (NULL, allargs, 0) + 1;
2079 if (len == (size_t) -1)
2080 error (_("Error starting executable: %d"), errno);
2081 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2082 mbstowcs (cygallargs, allargs, len);
60c5c021
CF
2083#else
2084 cygallargs = allargs;
b3c613f2 2085#endif
dfe7f3ac
CF
2086 }
2087 else
2088 {
349b409f
CF
2089 sh = getenv ("SHELL");
2090 if (!sh)
2091 sh = "/bin/sh";
b3c613f2 2092 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, sh, shell, __PMAX) < 0)
d0d0ab16 2093 error (_("Error starting executable via shell: %d"), errno);
b3c613f2 2094#ifdef __USEWIDE
d0d0ab16
CV
2095 len = sizeof (L" -c 'exec '") + mbstowcs (NULL, exec_file, 0)
2096 + mbstowcs (NULL, allargs, 0) + 2;
2097 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2098 swprintf (cygallargs, len, L" -c 'exec %s %s'", exec_file, allargs);
b3c613f2 2099#else
08850b56
PM
2100 len = (sizeof (" -c 'exec '") + strlen (exec_file)
2101 + strlen (allargs) + 2);
2102 cygallargs = (char *) alloca (len);
2103 xsnprintf (cygallargs, len, " -c 'exec %s %s'", exec_file, allargs);
b3c613f2 2104#endif
dfe7f3ac 2105 toexec = shell;
d0d0ab16 2106 flags |= DEBUG_PROCESS;
dfe7f3ac 2107 }
b3c613f2
CF
2108
2109#ifdef __USEWIDE
2110 args = (cygwin_buf_t *) alloca ((wcslen (toexec) + wcslen (cygallargs) + 2)
2111 * sizeof (wchar_t));
d0d0ab16
CV
2112 wcscpy (args, toexec);
2113 wcscat (args, L" ");
2114 wcscat (args, cygallargs);
b3c613f2
CF
2115#else
2116 args = (cygwin_buf_t *) alloca (strlen (toexec) + strlen (cygallargs) + 2);
2117 strcpy (args, toexec);
2118 strcat (args, " ");
2119 strcat (args, cygallargs);
2120#endif
2121
b7ff339d
CV
2122#ifdef CW_CVT_ENV_TO_WINENV
2123 /* First try to create a direct Win32 copy of the POSIX environment. */
2124 w32_env = (PWCHAR) cygwin_internal (CW_CVT_ENV_TO_WINENV, in_env);
2125 if (w32_env != (PWCHAR) -1)
2126 flags |= CREATE_UNICODE_ENVIRONMENT;
2127 else
2128 /* If that fails, fall back to old method tweaking GDB's environment. */
2129#endif
2130 {
2131 /* Reset all Win32 environment variables to avoid leftover on next run. */
2132 clear_win32_environment (environ);
2133 /* Prepare the environment vars for CreateProcess. */
2134 old_env = environ;
2135 environ = in_env;
2136 cygwin_internal (CW_SYNC_WINENV);
2137 w32_env = NULL;
2138 }
1750a5ef 2139
2becadee
CF
2140 if (!inferior_io_terminal)
2141 tty = ostdin = ostdout = ostderr = -1;
2142 else
2143 {
2144 tty = open (inferior_io_terminal, O_RDWR | O_NOCTTY);
2145 if (tty < 0)
2146 {
2147 print_sys_errmsg (inferior_io_terminal, errno);
2148 ostdin = ostdout = ostderr = -1;
2149 }
2150 else
2151 {
2152 ostdin = dup (0);
2153 ostdout = dup (1);
2154 ostderr = dup (2);
2155 dup2 (tty, 0);
2156 dup2 (tty, 1);
2157 dup2 (tty, 2);
2158 }
2159 }
d0d0ab16
CV
2160
2161 windows_init_thread_list ();
b3c613f2
CF
2162 ret = CreateProcess (0,
2163 args, /* command line */
2164 NULL, /* Security */
2165 NULL, /* thread */
2166 TRUE, /* inherit handles */
2167 flags, /* start flags */
b7ff339d 2168 w32_env, /* environment */
b3c613f2
CF
2169 NULL, /* current directory */
2170 &si,
2171 &pi);
b7ff339d
CV
2172 if (w32_env)
2173 /* Just free the Win32 environment, if it could be created. */
2174 free (w32_env);
2175 else
2176 {
2177 /* Reset all environment variables to avoid leftover on next run. */
2178 clear_win32_environment (in_env);
2179 /* Restore normal GDB environment variables. */
2180 environ = old_env;
2181 cygwin_internal (CW_SYNC_WINENV);
2182 }
2183
d0d0ab16
CV
2184 if (tty >= 0)
2185 {
2186 close (tty);
2187 dup2 (ostdin, 0);
2188 dup2 (ostdout, 1);
2189 dup2 (ostderr, 2);
2190 close (ostdin);
2191 close (ostdout);
2192 close (ostderr);
2193 }
41b4aadc 2194#else
b3c613f2 2195 toexec = exec_file;
8f205f9c
JB
2196 /* Build the command line, a space-separated list of tokens where
2197 the first token is the name of the module to be executed.
2198 To avoid ambiguities introduced by spaces in the module name,
2199 we quote it. */
2200 args_len = strlen (toexec) + 2 /* quotes */ + strlen (allargs) + 2;
2201 args = alloca (args_len);
2202 xsnprintf (args, args_len, "\"%s\" %s", toexec, allargs);
d0d0ab16 2203
d0d0ab16
CV
2204 flags |= DEBUG_ONLY_THIS_PROCESS;
2205
41b4aadc
CF
2206 if (!inferior_io_terminal)
2207 tty = INVALID_HANDLE_VALUE;
2208 else
2209 {
2210 SECURITY_ATTRIBUTES sa;
2211 sa.nLength = sizeof(sa);
2212 sa.lpSecurityDescriptor = 0;
2213 sa.bInheritHandle = TRUE;
2214 tty = CreateFileA (inferior_io_terminal, GENERIC_READ | GENERIC_WRITE,
2215 0, &sa, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
2216 if (tty == INVALID_HANDLE_VALUE)
2217 warning (_("Warning: Failed to open TTY %s, error %#x."),
2218 inferior_io_terminal, (unsigned) GetLastError ());
2219 else
2220 {
2221 si.hStdInput = tty;
2222 si.hStdOutput = tty;
2223 si.hStdError = tty;
2224 si.dwFlags |= STARTF_USESTDHANDLES;
2225 }
2226 }
2becadee 2227
c93dbcba
EZ
2228 /* CreateProcess takes the environment list as a null terminated set of
2229 strings (i.e. two nulls terminate the list). */
2230
2231 /* Get total size for env strings. */
2232 for (envlen = 0, i = 0; in_env[i] && *in_env[i]; i++)
2233 envlen += strlen (in_env[i]) + 1;
2234
2235 envsize = sizeof (in_env[0]) * (i + 1);
2236 env = (char **) alloca (envsize);
2237 memcpy (env, in_env, envsize);
2238 /* Windows programs expect the environment block to be sorted. */
2239 qsort (env, i, sizeof (char *), envvar_cmp);
2240
2241 w32env = alloca (envlen + 1);
2242
2243 /* Copy env strings into new buffer. */
2244 for (temp = w32env, i = 0; env[i] && *env[i]; i++)
2245 {
2246 strcpy (temp, env[i]);
2247 temp += strlen (temp) + 1;
2248 }
2249
2250 /* Final nil string to terminate new env. */
2251 *temp = 0;
2252
dc05df57 2253 windows_init_thread_list ();
d0d0ab16
CV
2254 ret = CreateProcessA (0,
2255 args, /* command line */
2256 NULL, /* Security */
2257 NULL, /* thread */
2258 TRUE, /* inherit handles */
2259 flags, /* start flags */
c93dbcba 2260 w32env, /* environment */
d0d0ab16
CV
2261 NULL, /* current directory */
2262 &si,
2263 &pi);
41b4aadc
CF
2264 if (tty != INVALID_HANDLE_VALUE)
2265 CloseHandle (tty);
10325bc5 2266#endif
2becadee 2267
24e60978 2268 if (!ret)
d50a0ce2 2269 error (_("Error creating process %s, (error %u)."),
8a3fe4f8 2270 exec_file, (unsigned) GetLastError ());
24e60978 2271
c1766e7d
PM
2272 CloseHandle (pi.hThread);
2273 CloseHandle (pi.hProcess);
2274
dfe7f3ac
CF
2275 if (useshell && shell[0] != '\0')
2276 saw_create = -1;
2277 else
2278 saw_create = 0;
2279
dc05df57 2280 do_initial_windows_stuff (ops, pi.dwProcessId, 0);
d3a09475 2281
dc05df57 2282 /* windows_continue (DBG_CONTINUE, -1); */
24e60978
SC
2283}
2284
2285static void
dc05df57 2286windows_mourn_inferior (struct target_ops *ops)
24e60978 2287{
dc05df57 2288 (void) windows_continue (DBG_CONTINUE, -1);
fa4ba8da 2289 i386_cleanup_dregs();
bf25528d
CF
2290 if (open_process_used)
2291 {
2292 CHECK (CloseHandle (current_process_handle));
2293 open_process_used = 0;
2294 }
0795be10 2295 unpush_target (ops);
24e60978
SC
2296 generic_mourn_inferior ();
2297}
2298
24e60978 2299/* Send a SIGINT to the process group. This acts just like the user typed a
581e13c1 2300 ^C on the controlling terminal. */
24e60978 2301
b607efe7 2302static void
dc05df57 2303windows_stop (ptid_t ptid)
24e60978 2304{
1ef980b9 2305 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
1e37c281 2306 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
3a4b77d8 2307 registers_changed (); /* refresh register state */
24e60978
SC
2308}
2309
3ee6f623 2310static int
dc05df57 2311windows_xfer_memory (CORE_ADDR memaddr, gdb_byte *our, int len,
0a65a603
AC
2312 int write, struct mem_attrib *mem,
2313 struct target_ops *target)
24e60978 2314{
5732a500 2315 SIZE_T done = 0;
24e60978
SC
2316 if (write)
2317 {
42f45f1a
KT
2318 DEBUG_MEM (("gdb: write target memory, %d bytes at %s\n",
2319 len, core_addr_to_string (memaddr)));
2b008701 2320 if (!WriteProcessMemory (current_process_handle,
2c647436 2321 (LPVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2322 len, &done))
2323 done = 0;
2b008701 2324 FlushInstructionCache (current_process_handle,
2c647436 2325 (LPCVOID) (uintptr_t) memaddr, len);
24e60978
SC
2326 }
2327 else
2328 {
42f45f1a
KT
2329 DEBUG_MEM (("gdb: read target memory, %d bytes at %s\n",
2330 len, core_addr_to_string (memaddr)));
2b008701 2331 if (!ReadProcessMemory (current_process_handle,
2c647436 2332 (LPCVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2333 len, &done))
2334 done = 0;
24e60978
SC
2335 }
2336 return done;
2337}
2338
3ee6f623 2339static void
7d85a9c0 2340windows_kill_inferior (struct target_ops *ops)
24e60978 2341{
3cee93ac
CF
2342 CHECK (TerminateProcess (current_process_handle, 0));
2343
b5edcb45
ILT
2344 for (;;)
2345 {
dc05df57 2346 if (!windows_continue (DBG_CONTINUE, -1))
b5edcb45 2347 break;
3cee93ac 2348 if (!WaitForDebugEvent (&current_event, INFINITE))
b5edcb45 2349 break;
3cee93ac 2350 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
b5edcb45
ILT
2351 break;
2352 }
2353
581e13c1 2354 target_mourn_inferior (); /* Or just windows_mourn_inferior? */
24e60978
SC
2355}
2356
24e60978 2357static void
dc05df57 2358windows_prepare_to_store (struct regcache *regcache)
24e60978 2359{
581e13c1 2360 /* Do nothing, since we can store individual regs. */
24e60978
SC
2361}
2362
2363static int
dc05df57 2364windows_can_run (void)
24e60978
SC
2365{
2366 return 1;
2367}
2368
2369static void
dc05df57 2370windows_close (int x)
24e60978 2371{
dc05df57 2372 DEBUG_EVENTS (("gdb: windows_close, inferior_ptid=%d\n",
3bccec63 2373 PIDGET (inferior_ptid)));
24e60978 2374}
1ef980b9 2375
581e13c1 2376/* Convert pid to printable format. */
3ee6f623 2377static char *
117de6a9 2378windows_pid_to_str (struct target_ops *ops, ptid_t ptid)
24e60978 2379{
3ee6f623 2380 static char buf[80];
3ee6f623 2381
2dc38344
PA
2382 if (ptid_get_tid (ptid) != 0)
2383 {
2384 snprintf (buf, sizeof (buf), "Thread %d.0x%lx",
2385 ptid_get_pid (ptid), ptid_get_tid (ptid));
2386 return buf;
2387 }
2388
2389 return normal_pid_to_str (ptid);
3ee6f623
CF
2390}
2391
de1b3c3d 2392static LONGEST
dc05df57 2393windows_xfer_shared_libraries (struct target_ops *ops,
de1b3c3d
PA
2394 enum target_object object, const char *annex,
2395 gdb_byte *readbuf, const gdb_byte *writebuf,
2396 ULONGEST offset, LONGEST len)
3cb8e7f6 2397{
de1b3c3d
PA
2398 struct obstack obstack;
2399 const char *buf;
2400 LONGEST len_avail;
3cb8e7f6 2401 struct so_list *so;
3cb8e7f6 2402
de1b3c3d
PA
2403 if (writebuf)
2404 return -1;
3cb8e7f6 2405
de1b3c3d
PA
2406 obstack_init (&obstack);
2407 obstack_grow_str (&obstack, "<library-list>\n");
2408 for (so = solib_start.next; so; so = so->next)
581e13c1
MS
2409 windows_xfer_shared_library (so->so_name, (CORE_ADDR)
2410 (uintptr_t) so->lm_info->load_addr,
f5656ead 2411 target_gdbarch (), &obstack);
de1b3c3d 2412 obstack_grow_str0 (&obstack, "</library-list>\n");
3cb8e7f6 2413
de1b3c3d
PA
2414 buf = obstack_finish (&obstack);
2415 len_avail = strlen (buf);
2416 if (offset >= len_avail)
49dc7f4b
PM
2417 len= 0;
2418 else
2419 {
2420 if (len > len_avail - offset)
2421 len = len_avail - offset;
2422 memcpy (readbuf, buf + offset, len);
2423 }
3cb8e7f6 2424
de1b3c3d
PA
2425 obstack_free (&obstack, NULL);
2426 return len;
3cb8e7f6
CF
2427}
2428
de1b3c3d 2429static LONGEST
dc05df57 2430windows_xfer_partial (struct target_ops *ops, enum target_object object,
de1b3c3d
PA
2431 const char *annex, gdb_byte *readbuf,
2432 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
3cb8e7f6 2433{
de1b3c3d 2434 switch (object)
3cb8e7f6 2435 {
de1b3c3d
PA
2436 case TARGET_OBJECT_MEMORY:
2437 if (readbuf)
2438 return (*ops->deprecated_xfer_memory) (offset, readbuf,
244e85c8 2439 len, 0/*read*/, NULL, ops);
de1b3c3d
PA
2440 if (writebuf)
2441 return (*ops->deprecated_xfer_memory) (offset, (gdb_byte *) writebuf,
2442 len, 1/*write*/, NULL, ops);
2443 return -1;
2444
2445 case TARGET_OBJECT_LIBRARIES:
dc05df57 2446 return windows_xfer_shared_libraries (ops, object, annex, readbuf,
de1b3c3d 2447 writebuf, offset, len);
3929abe9 2448
de1b3c3d
PA
2449 default:
2450 if (ops->beneath != NULL)
2451 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
2452 readbuf, writebuf, offset, len);
2453 return -1;
3929abe9 2454 }
02c5aecd
CF
2455}
2456
711e434b
PM
2457/* Provide thread local base, i.e. Thread Information Block address.
2458 Returns 1 if ptid is found and sets *ADDR to thread_local_base. */
2459
2460static int
2461windows_get_tib_address (ptid_t ptid, CORE_ADDR *addr)
2462{
2463 thread_info *th;
2464
2465 th = thread_rec (ptid_get_tid (ptid), 0);
2466 if (th == NULL)
2467 return 0;
2468
2469 if (addr != NULL)
2470 *addr = th->thread_local_base;
2471
2472 return 1;
2473}
2474
1e2f1c5c
JB
2475static ptid_t
2476windows_get_ada_task_ptid (long lwp, long thread)
2477{
2478 return ptid_build (ptid_get_pid (inferior_ptid), 0, lwp);
2479}
2480
3ee6f623 2481static void
dc05df57 2482init_windows_ops (void)
3ee6f623 2483{
dc05df57
CF
2484 windows_ops.to_shortname = "child";
2485 windows_ops.to_longname = "Win32 child process";
2486 windows_ops.to_doc = "Win32 child process (started by the \"run\" command).";
2487 windows_ops.to_open = windows_open;
2488 windows_ops.to_close = windows_close;
2489 windows_ops.to_attach = windows_attach;
2490 windows_ops.to_attach_no_wait = 1;
2491 windows_ops.to_detach = windows_detach;
2492 windows_ops.to_resume = windows_resume;
2493 windows_ops.to_wait = windows_wait;
2494 windows_ops.to_fetch_registers = windows_fetch_inferior_registers;
2495 windows_ops.to_store_registers = windows_store_inferior_registers;
2496 windows_ops.to_prepare_to_store = windows_prepare_to_store;
2497 windows_ops.deprecated_xfer_memory = windows_xfer_memory;
2498 windows_ops.to_xfer_partial = windows_xfer_partial;
2499 windows_ops.to_files_info = windows_files_info;
2500 windows_ops.to_insert_breakpoint = memory_insert_breakpoint;
2501 windows_ops.to_remove_breakpoint = memory_remove_breakpoint;
2502 windows_ops.to_terminal_init = terminal_init_inferior;
2503 windows_ops.to_terminal_inferior = terminal_inferior;
2504 windows_ops.to_terminal_ours_for_output = terminal_ours_for_output;
2505 windows_ops.to_terminal_ours = terminal_ours;
2506 windows_ops.to_terminal_save_ours = terminal_save_ours;
2507 windows_ops.to_terminal_info = child_terminal_info;
2508 windows_ops.to_kill = windows_kill_inferior;
2509 windows_ops.to_create_inferior = windows_create_inferior;
2510 windows_ops.to_mourn_inferior = windows_mourn_inferior;
2511 windows_ops.to_can_run = windows_can_run;
2512 windows_ops.to_thread_alive = windows_thread_alive;
2513 windows_ops.to_pid_to_str = windows_pid_to_str;
2514 windows_ops.to_stop = windows_stop;
2515 windows_ops.to_stratum = process_stratum;
c35b1492
PA
2516 windows_ops.to_has_all_memory = default_child_has_all_memory;
2517 windows_ops.to_has_memory = default_child_has_memory;
2518 windows_ops.to_has_stack = default_child_has_stack;
2519 windows_ops.to_has_registers = default_child_has_registers;
2520 windows_ops.to_has_execution = default_child_has_execution;
dc05df57 2521 windows_ops.to_pid_to_exec_file = windows_pid_to_exec_file;
1e2f1c5c 2522 windows_ops.to_get_ada_task_ptid = windows_get_ada_task_ptid;
711e434b 2523 windows_ops.to_get_tib_address = windows_get_tib_address;
9bb9e8ad 2524
5aca5a82
PM
2525 i386_use_watchpoints (&windows_ops);
2526
9bb9e8ad
PM
2527 i386_dr_low.set_control = cygwin_set_dr7;
2528 i386_dr_low.set_addr = cygwin_set_dr;
7b50312a 2529 i386_dr_low.get_addr = cygwin_get_dr;
9bb9e8ad 2530 i386_dr_low.get_status = cygwin_get_dr6;
7b50312a 2531 i386_dr_low.get_control = cygwin_get_dr7;
9bb9e8ad
PM
2532
2533 /* i386_dr_low.debug_register_length field is set by
2534 calling i386_set_debug_register_length function
2535 in processor windows specific native file. */
2536
dc05df57 2537 windows_ops.to_magic = OPS_MAGIC;
c719b714 2538}
24e60978 2539
3929abe9 2540static void
dc05df57 2541set_windows_aliases (char *argv0)
3929abe9
CF
2542{
2543 add_info_alias ("dll", "sharedlibrary", 1);
2544}
2545
d603d4b3
JK
2546/* -Wmissing-prototypes */
2547extern initialize_file_ftype _initialize_windows_nat;
2548
24e60978 2549void
dc05df57 2550_initialize_windows_nat (void)
24e60978 2551{
fa58ee11
EZ
2552 struct cmd_list_element *c;
2553
dc05df57 2554 init_windows_ops ();
1ef980b9 2555
d0d0ab16
CV
2556#ifdef __CYGWIN__
2557 cygwin_internal (CW_SET_DOS_FILE_WARNING, 0);
2558#endif
2559
fa58ee11 2560 c = add_com ("dll-symbols", class_files, dll_symbol_command,
1bedd215 2561 _("Load dll library symbols from FILE."));
5ba2abeb 2562 set_cmd_completer (c, filename_completer);
450005e7
CF
2563
2564 add_com_alias ("sharedlibrary", "dll-symbols", class_alias, 1);
2565
70992597
PM
2566 add_com_alias ("add-shared-symbol-files", "dll-symbols", class_alias, 1);
2567
2568 add_com_alias ("assf", "dll-symbols", class_alias, 1);
2569
10325bc5 2570#ifdef __CYGWIN__
5bf193a2
AC
2571 add_setshow_boolean_cmd ("shell", class_support, &useshell, _("\
2572Set use of shell to start subprocess."), _("\
2573Show use of shell to start subprocess."), NULL,
2574 NULL,
2575 NULL, /* FIXME: i18n: */
2576 &setlist, &showlist);
2577
581e13c1
MS
2578 add_setshow_boolean_cmd ("cygwin-exceptions", class_support,
2579 &cygwin_exceptions, _("\
09280ddf
CF
2580Break when an exception is detected in the Cygwin DLL itself."), _("\
2581Show whether gdb breaks on exceptions in the Cygwin DLL itself."), NULL,
2582 NULL,
2583 NULL, /* FIXME: i18n: */
2584 &setlist, &showlist);
10325bc5 2585#endif
09280ddf 2586
5bf193a2
AC
2587 add_setshow_boolean_cmd ("new-console", class_support, &new_console, _("\
2588Set creation of new console when creating child process."), _("\
2589Show creation of new console when creating child process."), NULL,
2590 NULL,
2591 NULL, /* FIXME: i18n: */
2592 &setlist, &showlist);
2593
2594 add_setshow_boolean_cmd ("new-group", class_support, &new_group, _("\
2595Set creation of new group when creating child process."), _("\
2596Show creation of new group when creating child process."), NULL,
2597 NULL,
2598 NULL, /* FIXME: i18n: */
2599 &setlist, &showlist);
2600
2601 add_setshow_boolean_cmd ("debugexec", class_support, &debug_exec, _("\
2602Set whether to display execution in child process."), _("\
2603Show whether to display execution in child process."), NULL,
2604 NULL,
2605 NULL, /* FIXME: i18n: */
2606 &setlist, &showlist);
2607
2608 add_setshow_boolean_cmd ("debugevents", class_support, &debug_events, _("\
2609Set whether to display kernel events in child process."), _("\
2610Show whether to display kernel events in child process."), NULL,
2611 NULL,
2612 NULL, /* FIXME: i18n: */
2613 &setlist, &showlist);
2614
2615 add_setshow_boolean_cmd ("debugmemory", class_support, &debug_memory, _("\
2616Set whether to display memory accesses in child process."), _("\
2617Show whether to display memory accesses in child process."), NULL,
2618 NULL,
2619 NULL, /* FIXME: i18n: */
2620 &setlist, &showlist);
2621
2622 add_setshow_boolean_cmd ("debugexceptions", class_support,
2623 &debug_exceptions, _("\
2624Set whether to display kernel exceptions in child process."), _("\
2625Show whether to display kernel exceptions in child process."), NULL,
2626 NULL,
2627 NULL, /* FIXME: i18n: */
2628 &setlist, &showlist);
1ef980b9 2629
711e434b 2630 init_w32_command_list ();
c1748f97
PM
2631
2632 add_cmd ("selector", class_info, display_selectors,
1a966eab 2633 _("Display selectors infos."),
c1748f97 2634 &info_w32_cmdlist);
dc05df57
CF
2635 add_target (&windows_ops);
2636 deprecated_init_ui_hook = set_windows_aliases;
24e60978 2637}
3cee93ac 2638
fa4ba8da
PM
2639/* Hardware watchpoint support, adapted from go32-nat.c code. */
2640
2641/* Pass the address ADDR to the inferior in the I'th debug register.
2642 Here we just store the address in dr array, the registers will be
dc05df57 2643 actually set up when windows_continue is called. */
9bb9e8ad 2644static void
fa4ba8da
PM
2645cygwin_set_dr (int i, CORE_ADDR addr)
2646{
2647 if (i < 0 || i > 3)
2648 internal_error (__FILE__, __LINE__,
e2e0b3e5 2649 _("Invalid register %d in cygwin_set_dr.\n"), i);
41b4aadc 2650 dr[i] = addr;
fa4ba8da
PM
2651 debug_registers_changed = 1;
2652 debug_registers_used = 1;
2653}
2654
2655/* Pass the value VAL to the inferior in the DR7 debug control
2656 register. Here we just store the address in D_REGS, the watchpoint
dc05df57 2657 will be actually set up in windows_wait. */
9bb9e8ad
PM
2658static void
2659cygwin_set_dr7 (unsigned long val)
fa4ba8da 2660{
9bb9e8ad 2661 dr[7] = (CORE_ADDR) val;
fa4ba8da
PM
2662 debug_registers_changed = 1;
2663 debug_registers_used = 1;
2664}
2665
7b50312a
PA
2666/* Get the value of debug register I from the inferior. */
2667
2668static CORE_ADDR
2669cygwin_get_dr (int i)
2670{
2671 return dr[i];
2672}
2673
fa4ba8da
PM
2674/* Get the value of the DR6 debug status register from the inferior.
2675 Here we just return the value stored in dr[6]
2676 by the last call to thread_rec for current_event.dwThreadId id. */
9bb9e8ad 2677static unsigned long
fa4ba8da
PM
2678cygwin_get_dr6 (void)
2679{
9bb9e8ad 2680 return (unsigned long) dr[6];
fa4ba8da
PM
2681}
2682
7b50312a
PA
2683/* Get the value of the DR7 debug status register from the inferior.
2684 Here we just return the value stored in dr[7] by the last call to
2685 thread_rec for current_event.dwThreadId id. */
2686
2687static unsigned long
2688cygwin_get_dr7 (void)
2689{
2690 return (unsigned long) dr[7];
2691}
2692
2dc38344 2693/* Determine if the thread referenced by "ptid" is alive
3cee93ac 2694 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
581e13c1 2695 it means that the thread has died. Otherwise it is assumed to be alive. */
3cee93ac 2696static int
28439f5e 2697windows_thread_alive (struct target_ops *ops, ptid_t ptid)
3cee93ac 2698{
2dc38344
PA
2699 int tid;
2700
2701 gdb_assert (ptid_get_tid (ptid) != 0);
2702 tid = ptid_get_tid (ptid);
39f77062 2703
581e13c1
MS
2704 return WaitForSingleObject (thread_rec (tid, FALSE)->h, 0) == WAIT_OBJECT_0
2705 ? FALSE : TRUE;
3cee93ac
CF
2706}
2707
d603d4b3
JK
2708/* -Wmissing-prototypes */
2709extern initialize_file_ftype _initialize_check_for_gdb_ini;
2710
2a3d5645
CF
2711void
2712_initialize_check_for_gdb_ini (void)
2713{
2714 char *homedir;
2715 if (inhibit_gdbinit)
2716 return;
2717
2718 homedir = getenv ("HOME");
2719 if (homedir)
2720 {
2721 char *p;
2722 char *oldini = (char *) alloca (strlen (homedir) +
2723 sizeof ("/gdb.ini"));
2724 strcpy (oldini, homedir);
2725 p = strchr (oldini, '\0');
0ba1096a 2726 if (p > oldini && !IS_DIR_SEPARATOR (p[-1]))
2a3d5645
CF
2727 *p++ = '/';
2728 strcpy (p, "gdb.ini");
2729 if (access (oldini, 0) == 0)
2730 {
2731 int len = strlen (oldini);
2732 char *newini = alloca (len + 1);
08850b56
PM
2733
2734 xsnprintf (newini, len + 1, "%.*s.gdbinit",
2735 (int) (len - (sizeof ("gdb.ini") - 1)), oldini);
8a3fe4f8 2736 warning (_("obsolete '%s' found. Rename to '%s'."), oldini, newini);
2a3d5645
CF
2737 }
2738 }
2739}
33605d39 2740
2b008701 2741/* Define dummy functions which always return error for the rare cases where
581e13c1 2742 these functions could not be found. */
2b008701
CF
2743static BOOL WINAPI
2744bad_DebugActiveProcessStop (DWORD w)
2745{
2746 return FALSE;
2747}
2748static BOOL WINAPI
2749bad_DebugBreakProcess (HANDLE w)
2750{
2751 return FALSE;
2752}
2753static BOOL WINAPI
2754bad_DebugSetProcessKillOnExit (BOOL w)
2755{
2756 return FALSE;
2757}
2758static BOOL WINAPI
2759bad_EnumProcessModules (HANDLE w, HMODULE *x, DWORD y, LPDWORD z)
2760{
2761 return FALSE;
2762}
b3c613f2
CF
2763
2764#ifdef __USEWIDE
2b008701 2765static DWORD WINAPI
b3c613f2 2766bad_GetModuleFileNameExW (HANDLE w, HMODULE x, LPWSTR y, DWORD z)
2b008701
CF
2767{
2768 return 0;
2769}
d0d0ab16
CV
2770#else
2771static DWORD WINAPI
b3c613f2 2772bad_GetModuleFileNameExA (HANDLE w, HMODULE x, LPSTR y, DWORD z)
d0d0ab16
CV
2773{
2774 return 0;
2775}
2776#endif
b3c613f2 2777
2b008701
CF
2778static BOOL WINAPI
2779bad_GetModuleInformation (HANDLE w, HMODULE x, LPMODULEINFO y, DWORD z)
2780{
2781 return FALSE;
2782}
2783
418c6cb3
CF
2784static BOOL WINAPI
2785bad_OpenProcessToken (HANDLE w, DWORD x, PHANDLE y)
2786{
2787 return FALSE;
2788}
2789
cd44747c
PM
2790static BOOL WINAPI
2791bad_GetCurrentConsoleFont (HANDLE w, BOOL bMaxWindow, CONSOLE_FONT_INFO *f)
2792{
2793 f->nFont = 0;
2794 return 1;
2795}
2796static COORD WINAPI
2797bad_GetConsoleFontSize (HANDLE w, DWORD nFont)
2798{
2799 COORD size;
2800 size.X = 8;
2801 size.Y = 12;
2802 return size;
2803}
2804
d603d4b3
JK
2805/* -Wmissing-prototypes */
2806extern initialize_file_ftype _initialize_loadable;
2807
2b008701 2808/* Load any functions which may not be available in ancient versions
581e13c1 2809 of Windows. */
d603d4b3 2810
33605d39 2811void
2b008701 2812_initialize_loadable (void)
33605d39 2813{
2b008701
CF
2814 HMODULE hm = NULL;
2815
2816 hm = LoadLibrary ("kernel32.dll");
2817 if (hm)
33605d39 2818 {
b3c613f2 2819 DebugActiveProcessStop = (void *)
2b008701 2820 GetProcAddress (hm, "DebugActiveProcessStop");
b3c613f2 2821 DebugBreakProcess = (void *)
2b008701 2822 GetProcAddress (hm, "DebugBreakProcess");
b3c613f2 2823 DebugSetProcessKillOnExit = (void *)
2b008701 2824 GetProcAddress (hm, "DebugSetProcessKillOnExit");
cd44747c
PM
2825 GetConsoleFontSize = (void *)
2826 GetProcAddress (hm, "GetConsoleFontSize");
2827 GetCurrentConsoleFont = (void *)
2828 GetProcAddress (hm, "GetCurrentConsoleFont");
2b008701 2829 }
33605d39 2830
2b008701 2831 /* Set variables to dummy versions of these processes if the function
581e13c1 2832 wasn't found in kernel32.dll. */
b3c613f2
CF
2833 if (!DebugBreakProcess)
2834 DebugBreakProcess = bad_DebugBreakProcess;
2835 if (!DebugActiveProcessStop || !DebugSetProcessKillOnExit)
2b008701 2836 {
b3c613f2
CF
2837 DebugActiveProcessStop = bad_DebugActiveProcessStop;
2838 DebugSetProcessKillOnExit = bad_DebugSetProcessKillOnExit;
2b008701 2839 }
cd44747c
PM
2840 if (!GetConsoleFontSize)
2841 GetConsoleFontSize = bad_GetConsoleFontSize;
2842 if (!GetCurrentConsoleFont)
2843 GetCurrentConsoleFont = bad_GetCurrentConsoleFont;
33605d39 2844
2b008701 2845 /* Load optional functions used for retrieving filename information
581e13c1 2846 associated with the currently debugged process or its dlls. */
2b008701
CF
2847 hm = LoadLibrary ("psapi.dll");
2848 if (hm)
2849 {
b3c613f2 2850 EnumProcessModules = (void *)
2b008701 2851 GetProcAddress (hm, "EnumProcessModules");
b3c613f2 2852 GetModuleInformation = (void *)
2b008701 2853 GetProcAddress (hm, "GetModuleInformation");
b3c613f2
CF
2854 GetModuleFileNameEx = (void *)
2855 GetProcAddress (hm, GetModuleFileNameEx_name);
33605d39
CF
2856 }
2857
b3c613f2 2858 if (!EnumProcessModules || !GetModuleInformation || !GetModuleFileNameEx)
2b008701
CF
2859 {
2860 /* Set variables to dummy versions of these processes if the function
581e13c1 2861 wasn't found in psapi.dll. */
b3c613f2
CF
2862 EnumProcessModules = bad_EnumProcessModules;
2863 GetModuleInformation = bad_GetModuleInformation;
2864 GetModuleFileNameEx = bad_GetModuleFileNameEx;
581e13c1
MS
2865 /* This will probably fail on Windows 9x/Me. Let the user know
2866 that we're missing some functionality. */
2867 warning(_("\
2868cannot automatically find executable file or library to read symbols.\n\
2869Use \"file\" or \"dll\" command to load executable/libraries directly."));
418c6cb3
CF
2870 }
2871
2872 hm = LoadLibrary ("advapi32.dll");
2873 if (hm)
2874 {
b3c613f2
CF
2875 OpenProcessToken = (void *) GetProcAddress (hm, "OpenProcessToken");
2876 LookupPrivilegeValueA = (void *)
418c6cb3 2877 GetProcAddress (hm, "LookupPrivilegeValueA");
b3c613f2 2878 AdjustTokenPrivileges = (void *)
418c6cb3
CF
2879 GetProcAddress (hm, "AdjustTokenPrivileges");
2880 /* Only need to set one of these since if OpenProcessToken fails nothing
581e13c1
MS
2881 else is needed. */
2882 if (!OpenProcessToken || !LookupPrivilegeValueA
2883 || !AdjustTokenPrivileges)
b3c613f2 2884 OpenProcessToken = bad_OpenProcessToken;
2b008701 2885 }
33605d39 2886}
This page took 1.711224 seconds and 4 git commands to generate.