Windows: Rely purely on event info when handling DLL load event
[deliverable/binutils-gdb.git] / gdb / windows-nat.c
CommitLineData
dc05df57 1/* Target-vector operations for controlling windows child processes, for GDB.
0a65a603 2
ecd75fc8 3 Copyright (C) 1995-2014 Free Software Foundation, Inc.
0a65a603 4
e6433c28 5 Contributed by Cygnus Solutions, A Red Hat Company.
e88c49c3 6
24e60978
SC
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
24e60978
SC
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
a9762ec7 15 but WITHOUT ANY WARRANTY; without even the implied warranty of
24e60978
SC
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
24e60978 21
dfe7f3ac 22/* Originally by Steve Chamberlain, sac@cygnus.com */
24e60978
SC
23
24#include "defs.h"
25#include "frame.h" /* required by inferior.h */
26#include "inferior.h"
27#include "target.h"
60250e8b 28#include "exceptions.h"
24e60978
SC
29#include "gdbcore.h"
30#include "command.h"
fa58ee11 31#include "completer.h"
4e052eda 32#include "regcache.h"
2a3d5645 33#include "top.h"
403d9909
CF
34#include <signal.h>
35#include <sys/types.h>
36#include <fcntl.h>
37#include <stdlib.h>
38#include <windows.h>
39#include <imagehlp.h>
2b008701 40#include <psapi.h>
10325bc5 41#ifdef __CYGWIN__
b7ff339d 42#include <wchar.h>
403d9909 43#include <sys/cygwin.h>
b7ff339d 44#include <cygwin/version.h>
10325bc5 45#endif
cad9cd60 46
24e60978 47#include "buildsym.h"
0ba1096a 48#include "filenames.h"
1ef980b9
SC
49#include "symfile.h"
50#include "objfiles.h"
92107356 51#include "gdb_bfd.h"
de1b3c3d 52#include "gdb_obstack.h"
0e9f083f 53#include <string.h>
fdfa3315 54#include "gdbthread.h"
24e60978 55#include "gdbcmd.h"
1e37c281 56#include <unistd.h>
4646aa9d 57#include "exec.h"
3ee6f623 58#include "solist.h"
3cb8e7f6 59#include "solib.h"
de1b3c3d 60#include "xml-support.h"
24e60978 61
6c7de422
MK
62#include "i386-tdep.h"
63#include "i387-tdep.h"
64
31b060a2
CF
65#include "windows-tdep.h"
66#include "windows-nat.h"
9bb9e8ad 67#include "i386-nat.h"
ecc13e53 68#include "complaints.h"
de1b3c3d 69
418c6cb3 70#define AdjustTokenPrivileges dyn_AdjustTokenPrivileges
2b008701
CF
71#define DebugActiveProcessStop dyn_DebugActiveProcessStop
72#define DebugBreakProcess dyn_DebugBreakProcess
73#define DebugSetProcessKillOnExit dyn_DebugSetProcessKillOnExit
74#define EnumProcessModules dyn_EnumProcessModules
2b008701 75#define GetModuleInformation dyn_GetModuleInformation
418c6cb3
CF
76#define LookupPrivilegeValueA dyn_LookupPrivilegeValueA
77#define OpenProcessToken dyn_OpenProcessToken
cd44747c
PM
78#define GetConsoleFontSize dyn_GetConsoleFontSize
79#define GetCurrentConsoleFont dyn_GetCurrentConsoleFont
2b008701 80
418c6cb3
CF
81static BOOL WINAPI (*AdjustTokenPrivileges)(HANDLE, BOOL, PTOKEN_PRIVILEGES,
82 DWORD, PTOKEN_PRIVILEGES, PDWORD);
2b008701
CF
83static BOOL WINAPI (*DebugActiveProcessStop) (DWORD);
84static BOOL WINAPI (*DebugBreakProcess) (HANDLE);
85static BOOL WINAPI (*DebugSetProcessKillOnExit) (BOOL);
86static BOOL WINAPI (*EnumProcessModules) (HANDLE, HMODULE *, DWORD,
87 LPDWORD);
2b008701
CF
88static BOOL WINAPI (*GetModuleInformation) (HANDLE, HMODULE, LPMODULEINFO,
89 DWORD);
418c6cb3
CF
90static BOOL WINAPI (*LookupPrivilegeValueA)(LPCSTR, LPCSTR, PLUID);
91static BOOL WINAPI (*OpenProcessToken)(HANDLE, DWORD, PHANDLE);
581e13c1
MS
92static BOOL WINAPI (*GetCurrentConsoleFont) (HANDLE, BOOL,
93 CONSOLE_FONT_INFO *);
cd44747c 94static COORD WINAPI (*GetConsoleFontSize) (HANDLE, DWORD);
2b008701 95
dc05df57 96static struct target_ops windows_ops;
3ee6f623 97
b3c613f2
CF
98#undef STARTUPINFO
99#undef CreateProcess
100#undef GetModuleFileNameEx
101
102#ifndef __CYGWIN__
103# define __PMAX (MAX_PATH + 1)
104 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPSTR, DWORD);
105# define STARTUPINFO STARTUPINFOA
106# define CreateProcess CreateProcessA
107# define GetModuleFileNameEx_name "GetModuleFileNameExA"
108# define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
109#else
110# define __PMAX PATH_MAX
581e13c1 111/* The starting and ending address of the cygwin1.dll text segment. */
b3c613f2
CF
112 static CORE_ADDR cygwin_load_start;
113 static CORE_ADDR cygwin_load_end;
b3c613f2
CF
114# define __USEWIDE
115 typedef wchar_t cygwin_buf_t;
581e13c1
MS
116 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE,
117 LPWSTR, DWORD);
b3c613f2
CF
118# define STARTUPINFO STARTUPINFOW
119# define CreateProcess CreateProcessW
120# define GetModuleFileNameEx_name "GetModuleFileNameExW"
121# define bad_GetModuleFileNameEx bad_GetModuleFileNameExW
10325bc5 122#endif
a244bdca 123
581e13c1
MS
124static int have_saved_context; /* True if we've saved context from a
125 cygwin signal. */
126static CONTEXT saved_context; /* Containes the saved context from a
127 cygwin signal. */
a244bdca 128
0714f9bf
SS
129/* If we're not using the old Cygwin header file set, define the
130 following which never should have been in the generic Win32 API
581e13c1 131 headers in the first place since they were our own invention... */
0714f9bf 132#ifndef _GNU_H_WINDOWS_H
9d3789f7 133enum
8e860359
CF
134 {
135 FLAG_TRACE_BIT = 0x100,
136 CONTEXT_DEBUGGER = (CONTEXT_FULL | CONTEXT_FLOATING_POINT)
137 };
0714f9bf
SS
138#endif
139
5851ab76
JB
140#ifndef CONTEXT_EXTENDED_REGISTERS
141/* This macro is only defined on ia32. It only makes sense on this target,
142 so define it as zero if not already defined. */
143#define CONTEXT_EXTENDED_REGISTERS 0
144#endif
145
fa4ba8da
PM
146#define CONTEXT_DEBUGGER_DR CONTEXT_DEBUGGER | CONTEXT_DEBUG_REGISTERS \
147 | CONTEXT_EXTENDED_REGISTERS
97da3b20 148
41b4aadc 149static uintptr_t dr[8];
87a45c96
CF
150static int debug_registers_changed;
151static int debug_registers_used;
16d905e2
CF
152
153static int windows_initialization_done;
6537bb24 154#define DR6_CLEAR_VALUE 0xffff0ff0
97da3b20 155
3cee93ac 156/* The string sent by cygwin when it processes a signal.
581e13c1 157 FIXME: This should be in a cygwin include file. */
3929abe9
CF
158#ifndef _CYGWIN_SIGNAL_STRING
159#define _CYGWIN_SIGNAL_STRING "cYgSiGw00f"
160#endif
3cee93ac 161
29fe111d 162#define CHECK(x) check (x, __FILE__,__LINE__)
dfe7f3ac 163#define DEBUG_EXEC(x) if (debug_exec) printf_unfiltered x
4e52d31c
PM
164#define DEBUG_EVENTS(x) if (debug_events) printf_unfiltered x
165#define DEBUG_MEM(x) if (debug_memory) printf_unfiltered x
166#define DEBUG_EXCEPT(x) if (debug_exceptions) printf_unfiltered x
24e60978 167
1eab8a48 168static void windows_stop (struct target_ops *self, ptid_t);
02529b48 169static int windows_thread_alive (struct target_ops *, ptid_t);
7d85a9c0 170static void windows_kill_inferior (struct target_ops *);
3cee93ac 171
9bb9e8ad
PM
172static void cygwin_set_dr (int i, CORE_ADDR addr);
173static void cygwin_set_dr7 (unsigned long val);
a961bc18 174static CORE_ADDR cygwin_get_dr (int i);
9bb9e8ad 175static unsigned long cygwin_get_dr6 (void);
a961bc18 176static unsigned long cygwin_get_dr7 (void);
9bb9e8ad 177
a493e3e2 178static enum gdb_signal last_sig = GDB_SIGNAL_0;
581e13c1 179/* Set if a signal was received from the debugged process. */
7393af7c 180
3cee93ac 181/* Thread information structure used to track information that is
6537bb24 182 not available in gdb's thread structure. */
3cee93ac 183typedef struct thread_info_struct
3a4b77d8
JM
184 {
185 struct thread_info_struct *next;
186 DWORD id;
187 HANDLE h;
711e434b 188 CORE_ADDR thread_local_base;
3a4b77d8 189 char *name;
6537bb24 190 int suspended;
3ade5333 191 int reload_context;
3a4b77d8 192 CONTEXT context;
1e37c281 193 STACKFRAME sf;
8e860359
CF
194 }
195thread_info;
1e37c281 196
29fe111d 197static thread_info thread_head;
24e60978 198
581e13c1 199/* The process and thread handles for the above context. */
24e60978 200
3cee93ac
CF
201static DEBUG_EVENT current_event; /* The current debug event from
202 WaitForDebugEvent */
203static HANDLE current_process_handle; /* Currently executing process */
204static thread_info *current_thread; /* Info on currently selected thread */
349b409f 205static DWORD main_thread_id; /* Thread ID of the main thread */
24e60978 206
581e13c1 207/* Counts of things. */
24e60978
SC
208static int exception_count = 0;
209static int event_count = 0;
dfe7f3ac 210static int saw_create;
bf25528d 211static int open_process_used = 0;
24e60978 212
581e13c1 213/* User options. */
24e60978 214static int new_console = 0;
10325bc5 215#ifdef __CYGWIN__
09280ddf 216static int cygwin_exceptions = 0;
10325bc5 217#endif
1e37c281 218static int new_group = 1;
dfe7f3ac
CF
219static int debug_exec = 0; /* show execution */
220static int debug_events = 0; /* show events from kernel */
221static int debug_memory = 0; /* show target memory accesses */
1ef980b9 222static int debug_exceptions = 0; /* show target exceptions */
dfe7f3ac
CF
223static int useshell = 0; /* use shell for subprocesses */
224
7e63b4e4 225/* This vector maps GDB's idea of a register's number into an offset
dc05df57 226 in the windows exception context vector.
24e60978 227
3cee93ac 228 It also contains the bit mask needed to load the register in question.
24e60978 229
7e63b4e4
JB
230 The contents of this table can only be computed by the units
231 that provide CPU-specific support for Windows native debugging.
232 These units should set the table by calling
dc05df57 233 windows_set_context_register_offsets.
7e63b4e4 234
24e60978
SC
235 One day we could read a reg, we could inspect the context we
236 already have loaded, if it doesn't have the bit set that we need,
237 we read that set of registers in using GetThreadContext. If the
581e13c1 238 context already contains what we need, we just unpack it. Then to
24e60978
SC
239 write a register, first we have to ensure that the context contains
240 the other regs of the group, and then we copy the info in and set
581e13c1 241 out bit. */
24e60978 242
7e63b4e4 243static const int *mappings;
d3a09475 244
d40dc7a8
JB
245/* The function to use in order to determine whether a register is
246 a segment register or not. */
247static segment_register_p_ftype *segment_register_p;
248
24e60978 249/* This vector maps the target's idea of an exception (extracted
581e13c1 250 from the DEBUG_EVENT structure) to GDB's idea. */
24e60978
SC
251
252struct xlate_exception
253 {
254 int them;
2ea28649 255 enum gdb_signal us;
24e60978
SC
256 };
257
24e60978
SC
258static const struct xlate_exception
259 xlate[] =
260{
a493e3e2
PA
261 {EXCEPTION_ACCESS_VIOLATION, GDB_SIGNAL_SEGV},
262 {STATUS_STACK_OVERFLOW, GDB_SIGNAL_SEGV},
263 {EXCEPTION_BREAKPOINT, GDB_SIGNAL_TRAP},
264 {DBG_CONTROL_C, GDB_SIGNAL_INT},
265 {EXCEPTION_SINGLE_STEP, GDB_SIGNAL_TRAP},
266 {STATUS_FLOAT_DIVIDE_BY_ZERO, GDB_SIGNAL_FPE},
24e60978
SC
267 {-1, -1}};
268
7e63b4e4
JB
269/* Set the MAPPINGS static global to OFFSETS.
270 See the description of MAPPINGS for more details. */
271
272void
dc05df57 273windows_set_context_register_offsets (const int *offsets)
7e63b4e4
JB
274{
275 mappings = offsets;
276}
277
d40dc7a8
JB
278/* See windows-nat.h. */
279
280void
281windows_set_segment_register_p (segment_register_p_ftype *fun)
282{
283 segment_register_p = fun;
284}
285
fa4ba8da
PM
286static void
287check (BOOL ok, const char *file, int line)
288{
289 if (!ok)
d50a0ce2
CV
290 printf_filtered ("error return %s:%d was %u\n", file, line,
291 (unsigned) GetLastError ());
fa4ba8da
PM
292}
293
6537bb24
PA
294/* Find a thread record given a thread id. If GET_CONTEXT is not 0,
295 then also retrieve the context for this thread. If GET_CONTEXT is
296 negative, then don't suspend the thread. */
3cee93ac
CF
297static thread_info *
298thread_rec (DWORD id, int get_context)
24e60978 299{
3cee93ac
CF
300 thread_info *th;
301
3a4b77d8 302 for (th = &thread_head; (th = th->next) != NULL;)
3cee93ac
CF
303 if (th->id == id)
304 {
6537bb24 305 if (!th->suspended && get_context)
3cee93ac 306 {
8a892701 307 if (get_context > 0 && id != current_event.dwThreadId)
6537bb24
PA
308 {
309 if (SuspendThread (th->h) == (DWORD) -1)
310 {
311 DWORD err = GetLastError ();
22128028 312
80e88e1a 313 warning (_("SuspendThread (tid=0x%x) failed."
2ed3e009 314 " (winerr %u)"),
80e88e1a 315 (unsigned) id, (unsigned) err);
6537bb24
PA
316 return NULL;
317 }
318 th->suspended = 1;
319 }
3cee93ac 320 else if (get_context < 0)
6537bb24 321 th->suspended = -1;
3ade5333 322 th->reload_context = 1;
3cee93ac
CF
323 }
324 return th;
325 }
326
327 return NULL;
328}
329
2dc38344 330/* Add a thread to the thread list. */
3cee93ac 331static thread_info *
711e434b 332windows_add_thread (ptid_t ptid, HANDLE h, void *tlb)
3cee93ac
CF
333{
334 thread_info *th;
2dc38344
PA
335 DWORD id;
336
337 gdb_assert (ptid_get_tid (ptid) != 0);
338
339 id = ptid_get_tid (ptid);
3cee93ac
CF
340
341 if ((th = thread_rec (id, FALSE)))
342 return th;
343
41bf6aca 344 th = XCNEW (thread_info);
3cee93ac
CF
345 th->id = id;
346 th->h = h;
711e434b 347 th->thread_local_base = (CORE_ADDR) (uintptr_t) tlb;
3cee93ac
CF
348 th->next = thread_head.next;
349 thread_head.next = th;
2dc38344
PA
350 add_thread (ptid);
351 /* Set the debug registers for the new thread if they are used. */
fa4ba8da
PM
352 if (debug_registers_used)
353 {
354 /* Only change the value of the debug registers. */
355 th->context.ContextFlags = CONTEXT_DEBUG_REGISTERS;
356 CHECK (GetThreadContext (th->h, &th->context));
357 th->context.Dr0 = dr[0];
358 th->context.Dr1 = dr[1];
359 th->context.Dr2 = dr[2];
360 th->context.Dr3 = dr[3];
6537bb24 361 th->context.Dr6 = DR6_CLEAR_VALUE;
fa4ba8da
PM
362 th->context.Dr7 = dr[7];
363 CHECK (SetThreadContext (th->h, &th->context));
364 th->context.ContextFlags = 0;
365 }
3cee93ac 366 return th;
24e60978
SC
367}
368
3cee93ac 369/* Clear out any old thread list and reintialize it to a
581e13c1 370 pristine state. */
24e60978 371static void
dc05df57 372windows_init_thread_list (void)
24e60978 373{
3cee93ac
CF
374 thread_info *th = &thread_head;
375
dc05df57 376 DEBUG_EVENTS (("gdb: windows_init_thread_list\n"));
3cee93ac
CF
377 init_thread_list ();
378 while (th->next != NULL)
24e60978 379 {
3cee93ac
CF
380 thread_info *here = th->next;
381 th->next = here->next;
b8c9b27d 382 xfree (here);
24e60978 383 }
059198c1 384 thread_head.next = NULL;
3cee93ac
CF
385}
386
581e13c1 387/* Delete a thread from the list of threads. */
3cee93ac 388static void
e0ea48a0 389windows_delete_thread (ptid_t ptid, DWORD exit_code)
3cee93ac
CF
390{
391 thread_info *th;
2dc38344
PA
392 DWORD id;
393
394 gdb_assert (ptid_get_tid (ptid) != 0);
395
396 id = ptid_get_tid (ptid);
3cee93ac
CF
397
398 if (info_verbose)
2dc38344 399 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (ptid));
e0ea48a0
EZ
400 else if (print_thread_events && id != main_thread_id)
401 printf_unfiltered (_("[%s exited with code %u]\n"),
564eac42 402 target_pid_to_str (ptid), (unsigned) exit_code);
2dc38344 403 delete_thread (ptid);
3cee93ac
CF
404
405 for (th = &thread_head;
406 th->next != NULL && th->next->id != id;
407 th = th->next)
408 continue;
409
410 if (th->next != NULL)
24e60978 411 {
3cee93ac
CF
412 thread_info *here = th->next;
413 th->next = here->next;
b8c9b27d 414 xfree (here);
24e60978
SC
415 }
416}
417
3cee93ac 418static void
dc05df57 419do_windows_fetch_inferior_registers (struct regcache *regcache, int r)
24e60978 420{
1e37c281 421 char *context_offset = ((char *) &current_thread->context) + mappings[r];
20a6ec49
MD
422 struct gdbarch *gdbarch = get_regcache_arch (regcache);
423 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
1e37c281 424 long l;
6c7de422 425
3ade5333 426 if (!current_thread)
d6dc8049 427 return; /* Windows sometimes uses a non-existent thread id in its
581e13c1 428 events. */
3ade5333
CF
429
430 if (current_thread->reload_context)
431 {
cb832706 432#ifdef __COPY_CONTEXT_SIZE
a244bdca
CF
433 if (have_saved_context)
434 {
581e13c1
MS
435 /* Lie about where the program actually is stopped since
436 cygwin has informed us that we should consider the signal
437 to have occurred at another location which is stored in
438 "saved_context. */
439 memcpy (&current_thread->context, &saved_context,
440 __COPY_CONTEXT_SIZE);
a244bdca
CF
441 have_saved_context = 0;
442 }
443 else
cb832706 444#endif
a244bdca
CF
445 {
446 thread_info *th = current_thread;
447 th->context.ContextFlags = CONTEXT_DEBUGGER_DR;
448 GetThreadContext (th->h, &th->context);
2b008701 449 /* Copy dr values from that thread.
581e13c1
MS
450 But only if there were not modified since last stop.
451 PR gdb/2388 */
88616312
PM
452 if (!debug_registers_changed)
453 {
454 dr[0] = th->context.Dr0;
455 dr[1] = th->context.Dr1;
456 dr[2] = th->context.Dr2;
457 dr[3] = th->context.Dr3;
458 dr[6] = th->context.Dr6;
459 dr[7] = th->context.Dr7;
460 }
a244bdca 461 }
3ade5333
CF
462 current_thread->reload_context = 0;
463 }
464
20a6ec49 465 if (r == I387_FISEG_REGNUM (tdep))
1e37c281 466 {
8e860359 467 l = *((long *) context_offset) & 0xffff;
56be3814 468 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 469 }
20a6ec49 470 else if (r == I387_FOP_REGNUM (tdep))
1e37c281 471 {
8e860359 472 l = (*((long *) context_offset) >> 16) & ((1 << 11) - 1);
56be3814 473 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 474 }
d40dc7a8
JB
475 else if (segment_register_p (r))
476 {
477 /* GDB treats segment registers as 32bit registers, but they are
478 in fact only 16 bits long. Make sure we do not read extra
479 bits from our source buffer. */
480 l = *((long *) context_offset) & 0xffff;
481 regcache_raw_supply (regcache, r, (char *) &l);
482 }
1e37c281 483 else if (r >= 0)
56be3814 484 regcache_raw_supply (regcache, r, context_offset);
3cee93ac 485 else
24e60978 486 {
20a6ec49 487 for (r = 0; r < gdbarch_num_regs (gdbarch); r++)
dc05df57 488 do_windows_fetch_inferior_registers (regcache, r);
24e60978 489 }
3cee93ac
CF
490}
491
492static void
28439f5e
PA
493windows_fetch_inferior_registers (struct target_ops *ops,
494 struct regcache *regcache, int r)
3cee93ac 495{
2dc38344 496 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 497 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 498 thread id in its events. */
3ade5333 499 if (current_thread)
dc05df57 500 do_windows_fetch_inferior_registers (regcache, r);
3cee93ac
CF
501}
502
503static void
dc05df57 504do_windows_store_inferior_registers (const struct regcache *regcache, int r)
3cee93ac 505{
3ade5333 506 if (!current_thread)
581e13c1 507 /* Windows sometimes uses a non-existent thread id in its events. */;
3ade5333 508 else if (r >= 0)
56be3814 509 regcache_raw_collect (regcache, r,
822c9732 510 ((char *) &current_thread->context) + mappings[r]);
24e60978
SC
511 else
512 {
40a6adc1 513 for (r = 0; r < gdbarch_num_regs (get_regcache_arch (regcache)); r++)
dc05df57 514 do_windows_store_inferior_registers (regcache, r);
24e60978
SC
515 }
516}
517
581e13c1 518/* Store a new register value into the current thread context. */
3cee93ac 519static void
28439f5e
PA
520windows_store_inferior_registers (struct target_ops *ops,
521 struct regcache *regcache, int r)
3cee93ac 522{
2dc38344 523 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 524 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 525 thread id in its events. */
3ade5333 526 if (current_thread)
dc05df57 527 do_windows_store_inferior_registers (regcache, r);
3cee93ac 528}
24e60978 529
7a9dd1b2 530/* Get the name of a given module at given base address. If base_address
33605d39
CF
531 is zero return the first loaded module (which is always the name of the
532 executable). */
3ee6f623 533static int
d3653bf6 534get_module_name (LPVOID base_address, char *dll_name_ret)
1e37c281
JM
535{
536 DWORD len;
537 MODULEINFO mi;
538 int i;
8e860359 539 HMODULE dh_buf[1];
581e13c1
MS
540 HMODULE *DllHandle = dh_buf; /* Set to temporary storage for
541 initial query. */
1e37c281 542 DWORD cbNeeded;
33605d39 543#ifdef __CYGWIN__
b3c613f2
CF
544 cygwin_buf_t pathbuf[__PMAX]; /* Temporary storage prior to converting to
545 posix form. __PMAX is always enough
d0d0ab16 546 as long as SO_NAME_MAX_PATH_SIZE is defined
581e13c1 547 as 512. */
33605d39 548#endif
1e37c281 549
1e37c281 550 cbNeeded = 0;
581e13c1
MS
551 /* Find size of buffer needed to handle list of modules loaded in
552 inferior. */
2b008701
CF
553 if (!EnumProcessModules (current_process_handle, DllHandle,
554 sizeof (HMODULE), &cbNeeded) || !cbNeeded)
1e37c281
JM
555 goto failed;
556
581e13c1 557 /* Allocate correct amount of space for module list. */
8e860359 558 DllHandle = (HMODULE *) alloca (cbNeeded);
1e37c281
JM
559 if (!DllHandle)
560 goto failed;
561
581e13c1 562 /* Get the list of modules. */
2b008701 563 if (!EnumProcessModules (current_process_handle, DllHandle, cbNeeded,
33605d39 564 &cbNeeded))
1e37c281
JM
565 goto failed;
566
29fe111d 567 for (i = 0; i < (int) (cbNeeded / sizeof (HMODULE)); i++)
1e37c281 568 {
581e13c1 569 /* Get information on this module. */
2b008701
CF
570 if (!GetModuleInformation (current_process_handle, DllHandle[i],
571 &mi, sizeof (mi)))
8a3fe4f8 572 error (_("Can't get module info"));
1e37c281 573
d3653bf6 574 if (!base_address || mi.lpBaseOfDll == base_address)
33605d39 575 {
581e13c1 576 /* Try to find the name of the given module. */
d0d0ab16 577#ifdef __CYGWIN__
581e13c1 578 /* Cygwin prefers that the path be in /x/y/z format. */
b3c613f2
CF
579 len = GetModuleFileNameEx (current_process_handle,
580 DllHandle[i], pathbuf, __PMAX);
d0d0ab16 581 if (len == 0)
d50a0ce2
CV
582 error (_("Error getting dll name: %u."),
583 (unsigned) GetLastError ());
d0d0ab16 584 if (cygwin_conv_path (CCP_WIN_W_TO_POSIX, pathbuf, dll_name_ret,
b3c613f2 585 __PMAX) < 0)
d0d0ab16
CV
586 error (_("Error converting dll name to POSIX: %d."), errno);
587#else
b3c613f2
CF
588 len = GetModuleFileNameEx (current_process_handle,
589 DllHandle[i], dll_name_ret, __PMAX);
33605d39 590 if (len == 0)
581e13c1
MS
591 error (_("Error getting dll name: %u."),
592 (unsigned) GetLastError ());
33605d39
CF
593#endif
594 return 1; /* success */
595 }
1e37c281
JM
596 }
597
598failed:
599 dll_name_ret[0] = '\0';
33605d39 600 return 0; /* failure */
1e37c281
JM
601}
602
450005e7 603/* Encapsulate the information required in a call to
581e13c1 604 symbol_file_add_args. */
8a892701
CF
605struct safe_symbol_file_add_args
606{
607 char *name;
608 int from_tty;
609 struct section_addr_info *addrs;
610 int mainline;
611 int flags;
7c5c87c0 612 struct ui_file *err, *out;
8a892701
CF
613 struct objfile *ret;
614};
615
581e13c1 616/* Maintain a linked list of "so" information. */
3ee6f623 617struct lm_info
02e423b9 618{
d3653bf6 619 LPVOID load_addr;
3ee6f623
CF
620};
621
622static struct so_list solib_start, *solib_end;
02e423b9 623
450005e7 624/* Call symbol_file_add with stderr redirected. We don't care if there
581e13c1 625 are errors. */
8a892701
CF
626static int
627safe_symbol_file_add_stub (void *argv)
628{
3ee6f623 629#define p ((struct safe_symbol_file_add_args *) argv)
7eedccfa
PP
630 const int add_flags = ((p->from_tty ? SYMFILE_VERBOSE : 0)
631 | (p->mainline ? SYMFILE_MAINLINE : 0));
632 p->ret = symbol_file_add (p->name, add_flags, p->addrs, p->flags);
8a892701
CF
633 return !!p->ret;
634#undef p
635}
636
581e13c1 637/* Restore gdb's stderr after calling symbol_file_add. */
8a892701 638static void
7c5c87c0 639safe_symbol_file_add_cleanup (void *p)
8a892701 640{
8e860359 641#define sp ((struct safe_symbol_file_add_args *)p)
450005e7 642 gdb_flush (gdb_stderr);
7c5c87c0 643 gdb_flush (gdb_stdout);
d3ff4a77 644 ui_file_delete (gdb_stderr);
7c5c87c0 645 ui_file_delete (gdb_stdout);
d3ff4a77 646 gdb_stderr = sp->err;
9d3789f7 647 gdb_stdout = sp->out;
8e860359 648#undef sp
8a892701
CF
649}
650
581e13c1 651/* symbol_file_add wrapper that prevents errors from being displayed. */
8a892701
CF
652static struct objfile *
653safe_symbol_file_add (char *name, int from_tty,
654 struct section_addr_info *addrs,
655 int mainline, int flags)
8a892701
CF
656{
657 struct safe_symbol_file_add_args p;
658 struct cleanup *cleanup;
659
7c5c87c0 660 cleanup = make_cleanup (safe_symbol_file_add_cleanup, &p);
8a892701 661
7c5c87c0
CF
662 p.err = gdb_stderr;
663 p.out = gdb_stdout;
450005e7 664 gdb_flush (gdb_stderr);
7c5c87c0 665 gdb_flush (gdb_stdout);
d3ff4a77 666 gdb_stderr = ui_file_new ();
7c5c87c0 667 gdb_stdout = ui_file_new ();
8a892701
CF
668 p.name = name;
669 p.from_tty = from_tty;
670 p.addrs = addrs;
671 p.mainline = mainline;
672 p.flags = flags;
673 catch_errors (safe_symbol_file_add_stub, &p, "", RETURN_MASK_ERROR);
674
675 do_cleanups (cleanup);
676 return p.ret;
677}
678
de1b3c3d 679static struct so_list *
dc05df57 680windows_make_so (const char *name, LPVOID load_addr)
8e860359 681{
3ee6f623 682 struct so_list *so;
d0d0ab16
CV
683 char *p;
684#ifndef __CYGWIN__
b3c613f2
CF
685 char buf[__PMAX];
686 char cwd[__PMAX];
3f8ad85b
CF
687 WIN32_FIND_DATA w32_fd;
688 HANDLE h = FindFirstFile(name, &w32_fd);
3f8ad85b 689
6badb179
CF
690 if (h == INVALID_HANDLE_VALUE)
691 strcpy (buf, name);
692 else
3f8ad85b 693 {
c914e0cc
CF
694 FindClose (h);
695 strcpy (buf, name);
696 if (GetCurrentDirectory (MAX_PATH + 1, cwd))
697 {
698 p = strrchr (buf, '\\');
699 if (p)
700 p[1] = '\0';
701 SetCurrentDirectory (buf);
702 GetFullPathName (w32_fd.cFileName, MAX_PATH, buf, &p);
703 SetCurrentDirectory (cwd);
704 }
3f8ad85b 705 }
3ee6f623
CF
706 if (strcasecmp (buf, "ntdll.dll") == 0)
707 {
708 GetSystemDirectory (buf, sizeof (buf));
709 strcat (buf, "\\ntdll.dll");
710 }
d0d0ab16 711#else
b3c613f2 712 cygwin_buf_t buf[__PMAX];
d0d0ab16 713
b3c613f2 714 buf[0] = 0;
d0d0ab16
CV
715 if (access (name, F_OK) != 0)
716 {
717 if (strcasecmp (name, "ntdll.dll") == 0)
b3c613f2 718#ifdef __USEWIDE
d0d0ab16
CV
719 {
720 GetSystemDirectoryW (buf, sizeof (buf) / sizeof (wchar_t));
721 wcscat (buf, L"\\ntdll.dll");
722 }
b3c613f2
CF
723#else
724 {
725 GetSystemDirectoryA (buf, sizeof (buf) / sizeof (wchar_t));
726 strcat (buf, "\\ntdll.dll");
727 }
728#endif
d0d0ab16
CV
729 }
730#endif
41bf6aca 731 so = XCNEW (struct so_list);
3ee6f623
CF
732 so->lm_info = (struct lm_info *) xmalloc (sizeof (struct lm_info));
733 so->lm_info->load_addr = load_addr;
de1b3c3d 734 strcpy (so->so_original_name, name);
10325bc5
PA
735#ifndef __CYGWIN__
736 strcpy (so->so_name, buf);
737#else
d0d0ab16
CV
738 if (buf[0])
739 cygwin_conv_path (CCP_WIN_W_TO_POSIX, buf, so->so_name,
740 SO_NAME_MAX_PATH_SIZE);
741 else
742 {
60c5c021 743 char *rname = realpath (name, NULL);
d0d0ab16
CV
744 if (rname && strlen (rname) < SO_NAME_MAX_PATH_SIZE)
745 {
746 strcpy (so->so_name, rname);
747 free (rname);
748 }
749 else
750 error (_("dll path too long"));
751 }
de1b3c3d
PA
752 /* Record cygwin1.dll .text start/end. */
753 p = strchr (so->so_name, '\0') - (sizeof ("/cygwin1.dll") - 1);
754 if (p >= so->so_name && strcasecmp (p, "/cygwin1.dll") == 0)
755 {
756 bfd *abfd;
757 asection *text = NULL;
758 CORE_ADDR text_vma;
8e860359 759
1c00ec6b 760 abfd = gdb_bfd_open (so->so_name, "pei-i386", -1);
a244bdca 761
de1b3c3d
PA
762 if (!abfd)
763 return so;
764
765 if (bfd_check_format (abfd, bfd_object))
766 text = bfd_get_section_by_name (abfd, ".text");
767
768 if (!text)
769 {
cbb099e8 770 gdb_bfd_unref (abfd);
de1b3c3d
PA
771 return so;
772 }
773
7a9dd1b2 774 /* The symbols in a dll are offset by 0x1000, which is the
de1b3c3d 775 offset from 0 of the first byte in an image - because of the
581e13c1
MS
776 file header and the section alignment. */
777 cygwin_load_start = (CORE_ADDR) (uintptr_t) ((char *)
778 load_addr + 0x1000);
dc05df57 779 cygwin_load_end = cygwin_load_start + bfd_section_size (abfd, text);
de1b3c3d 780
cbb099e8 781 gdb_bfd_unref (abfd);
de1b3c3d 782 }
10325bc5 783#endif
de1b3c3d
PA
784
785 return so;
8e860359
CF
786}
787
3ee6f623 788static char *
dfe7f3ac
CF
789get_image_name (HANDLE h, void *address, int unicode)
790{
d0d0ab16 791#ifdef __CYGWIN__
b3c613f2 792 static char buf[__PMAX];
d0d0ab16 793#else
b3c613f2 794 static char buf[(2 * __PMAX) + 1];
d0d0ab16 795#endif
dfe7f3ac
CF
796 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
797 char *address_ptr;
798 int len = 0;
799 char b[2];
5732a500 800 SIZE_T done;
dfe7f3ac
CF
801
802 /* Attempt to read the name of the dll that was detected.
803 This is documented to work only when actively debugging
581e13c1 804 a program. It will not work for attached processes. */
dfe7f3ac
CF
805 if (address == NULL)
806 return NULL;
807
dfe7f3ac 808 /* See if we could read the address of a string, and that the
581e13c1
MS
809 address isn't null. */
810 if (!ReadProcessMemory (h, address, &address_ptr,
811 sizeof (address_ptr), &done)
6f17862b 812 || done != sizeof (address_ptr) || !address_ptr)
dfe7f3ac
CF
813 return NULL;
814
581e13c1 815 /* Find the length of the string. */
6f17862b
CF
816 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
817 && (b[0] != 0 || b[size - 1] != 0) && done == size)
818 continue;
dfe7f3ac
CF
819
820 if (!unicode)
821 ReadProcessMemory (h, address_ptr, buf, len, &done);
822 else
823 {
824 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
825 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
826 &done);
d0d0ab16 827#ifdef __CYGWIN__
b3c613f2 828 wcstombs (buf, unicode_address, __PMAX);
d0d0ab16
CV
829#else
830 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, sizeof buf,
831 0, 0);
832#endif
dfe7f3ac
CF
833 }
834
835 return buf;
836}
837
1cd9feab
JB
838/* Handle a DLL load event, and return 1.
839
840 This function assumes that this event did not occur during inferior
841 initialization, where their event info may be incomplete (see
842 do_initial_windows_stuff and windows_add_all_dlls for more info
843 on how we handle DLL loading during that phase). */
844
1750a5ef 845static int
0a65a603 846handle_load_dll (void *dummy)
24e60978 847{
3a4b77d8 848 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
1cd9feab 849 char *dll_name;
24e60978 850
94481b8c
JB
851 /* Try getting the DLL name via the lpImageName field of the event.
852 Note that Microsoft documents this fields as strictly optional,
853 in the sense that it might be NULL. And the first DLL event in
854 particular is explicitly documented as "likely not pass[ed]"
855 (source: MSDN LOAD_DLL_DEBUG_INFO structure). */
1cd9feab
JB
856 dll_name = get_image_name (current_process_handle,
857 event->lpImageName, event->fUnicode);
3cee93ac
CF
858 if (!dll_name)
859 return 1;
860
dc05df57 861 solib_end->next = windows_make_so (dll_name, event->lpBaseOfDll);
de1b3c3d 862 solib_end = solib_end->next;
450005e7 863
a74ce742
PM
864 DEBUG_EVENTS (("gdb: Loading dll \"%s\" at %s.\n", solib_end->so_name,
865 host_address_to_string (solib_end->lm_info->load_addr)));
7488902c 866
450005e7
CF
867 return 1;
868}
869
3ee6f623 870static void
dc05df57 871windows_free_so (struct so_list *so)
3ee6f623 872{
3ee6f623
CF
873 if (so->lm_info)
874 xfree (so->lm_info);
de1b3c3d 875 xfree (so);
3cb8e7f6
CF
876}
877
d3ff4a77 878static int
0a65a603 879handle_unload_dll (void *dummy)
d3ff4a77 880{
d3653bf6 881 LPVOID lpBaseOfDll = current_event.u.UnloadDll.lpBaseOfDll;
3ee6f623 882 struct so_list *so;
d3ff4a77
CF
883
884 for (so = &solib_start; so->next != NULL; so = so->next)
3ee6f623 885 if (so->next->lm_info->load_addr == lpBaseOfDll)
d3ff4a77 886 {
3ee6f623 887 struct so_list *sodel = so->next;
a25cd31f 888
d3ff4a77
CF
889 so->next = sodel->next;
890 if (!so->next)
891 solib_end = so;
7488902c
PM
892 DEBUG_EVENTS (("gdb: Unloading dll \"%s\".\n", sodel->so_name));
893
dc05df57 894 windows_free_so (sodel);
d3ff4a77
CF
895 return 1;
896 }
3929abe9 897
ecc13e53
JB
898 /* We did not find any DLL that was previously loaded at this address,
899 so register a complaint. We do not report an error, because we have
900 observed that this may be happening under some circumstances. For
901 instance, running 32bit applications on x64 Windows causes us to receive
902 4 mysterious UNLOAD_DLL_DEBUG_EVENTs during the startup phase (these
903 events are apparently caused by the WOW layer, the interface between
904 32bit and 64bit worlds). */
905 complaint (&symfile_complaints, _("dll starting at %s not found."),
906 host_address_to_string (lpBaseOfDll));
d3ff4a77
CF
907
908 return 0;
909}
910
581e13c1 911/* Clear list of loaded DLLs. */
3ee6f623 912static void
dc05df57 913windows_clear_solib (void)
450005e7 914{
450005e7
CF
915 solib_start.next = NULL;
916 solib_end = &solib_start;
450005e7 917}
295732ea 918
581e13c1 919/* Load DLL symbol info. */
d603d4b3 920static void
7470a420 921dll_symbol_command (char *args, int from_tty)
450005e7 922{
8e860359 923 int n;
450005e7 924 dont_repeat ();
8e860359 925
450005e7 926 if (args == NULL)
8a3fe4f8 927 error (_("dll-symbols requires a file name"));
450005e7 928
8e860359
CF
929 n = strlen (args);
930 if (n > 4 && strcasecmp (args + n - 4, ".dll") != 0)
931 {
932 char *newargs = (char *) alloca (n + 4 + 1);
933 strcpy (newargs, args);
934 strcat (newargs, ".dll");
935 args = newargs;
936 }
937
7470a420 938 safe_symbol_file_add (args, from_tty, NULL, 0, OBJF_SHARED | OBJF_USERLOADED);
8e860359 939}
450005e7 940
3cee93ac
CF
941/* Handle DEBUG_STRING output from child process.
942 Cygwin prepends its messages with a "cygwin:". Interpret this as
581e13c1 943 a Cygwin signal. Otherwise just print the string as a warning. */
3cee93ac
CF
944static int
945handle_output_debug_string (struct target_waitstatus *ourstatus)
946{
a244bdca
CF
947 char *s = NULL;
948 int retval = 0;
3cee93ac
CF
949
950 if (!target_read_string
2c647436
PM
951 ((CORE_ADDR) (uintptr_t) current_event.u.DebugString.lpDebugStringData,
952 &s, 1024, 0)
3cee93ac 953 || !s || !*s)
a244bdca 954 /* nothing to do */;
581e13c1
MS
955 else if (strncmp (s, _CYGWIN_SIGNAL_STRING,
956 sizeof (_CYGWIN_SIGNAL_STRING) - 1) != 0)
3cee93ac 957 {
10325bc5 958#ifdef __CYGWIN__
d3a09475 959 if (strncmp (s, "cYg", 3) != 0)
10325bc5 960#endif
8a3fe4f8 961 warning (("%s"), s);
3cee93ac 962 }
cb832706 963#ifdef __COPY_CONTEXT_SIZE
d3a09475 964 else
3cee93ac 965 {
581e13c1
MS
966 /* Got a cygwin signal marker. A cygwin signal is followed by
967 the signal number itself and then optionally followed by the
968 thread id and address to saved context within the DLL. If
969 these are supplied, then the given thread is assumed to have
970 issued the signal and the context from the thread is assumed
971 to be stored at the given address in the inferior. Tell gdb
972 to treat this like a real signal. */
3cee93ac 973 char *p;
3929abe9 974 int sig = strtol (s + sizeof (_CYGWIN_SIGNAL_STRING) - 1, &p, 0);
2ea28649 975 int gotasig = gdb_signal_from_host (sig);
c62fa0e2 976
0714f9bf
SS
977 ourstatus->value.sig = gotasig;
978 if (gotasig)
a244bdca
CF
979 {
980 LPCVOID x;
2c15ef43 981 SIZE_T n;
c62fa0e2 982
a244bdca
CF
983 ourstatus->kind = TARGET_WAITKIND_STOPPED;
984 retval = strtoul (p, &p, 0);
985 if (!retval)
986 retval = main_thread_id;
40653b35 987 else if ((x = (LPCVOID) (uintptr_t) strtoull (p, NULL, 0))
a244bdca 988 && ReadProcessMemory (current_process_handle, x,
581e13c1
MS
989 &saved_context,
990 __COPY_CONTEXT_SIZE, &n)
a244bdca
CF
991 && n == __COPY_CONTEXT_SIZE)
992 have_saved_context = 1;
993 current_event.dwThreadId = retval;
994 }
3cee93ac 995 }
cb832706 996#endif
3cee93ac 997
a244bdca
CF
998 if (s)
999 xfree (s);
1000 return retval;
3cee93ac 1001}
24e60978 1002
c1748f97
PM
1003static int
1004display_selector (HANDLE thread, DWORD sel)
1005{
1006 LDT_ENTRY info;
1007 if (GetThreadSelectorEntry (thread, sel, &info))
1008 {
1009 int base, limit;
d50a0ce2 1010 printf_filtered ("0x%03x: ", (unsigned) sel);
c1748f97 1011 if (!info.HighWord.Bits.Pres)
baa93fa6
CF
1012 {
1013 puts_filtered ("Segment not present\n");
1014 return 0;
1015 }
c1748f97
PM
1016 base = (info.HighWord.Bits.BaseHi << 24) +
1017 (info.HighWord.Bits.BaseMid << 16)
1018 + info.BaseLow;
1019 limit = (info.HighWord.Bits.LimitHi << 16) + info.LimitLow;
1020 if (info.HighWord.Bits.Granularity)
caad7706 1021 limit = (limit << 12) | 0xfff;
c1748f97
PM
1022 printf_filtered ("base=0x%08x limit=0x%08x", base, limit);
1023 if (info.HighWord.Bits.Default_Big)
baa93fa6 1024 puts_filtered(" 32-bit ");
c1748f97 1025 else
baa93fa6 1026 puts_filtered(" 16-bit ");
c1748f97
PM
1027 switch ((info.HighWord.Bits.Type & 0xf) >> 1)
1028 {
1029 case 0:
baa93fa6
CF
1030 puts_filtered ("Data (Read-Only, Exp-up");
1031 break;
c1748f97 1032 case 1:
baa93fa6
CF
1033 puts_filtered ("Data (Read/Write, Exp-up");
1034 break;
c1748f97 1035 case 2:
baa93fa6
CF
1036 puts_filtered ("Unused segment (");
1037 break;
c1748f97 1038 case 3:
baa93fa6
CF
1039 puts_filtered ("Data (Read/Write, Exp-down");
1040 break;
c1748f97 1041 case 4:
baa93fa6
CF
1042 puts_filtered ("Code (Exec-Only, N.Conf");
1043 break;
c1748f97 1044 case 5:
baa93fa6 1045 puts_filtered ("Code (Exec/Read, N.Conf");
c1748f97
PM
1046 break;
1047 case 6:
baa93fa6 1048 puts_filtered ("Code (Exec-Only, Conf");
c1748f97
PM
1049 break;
1050 case 7:
baa93fa6 1051 puts_filtered ("Code (Exec/Read, Conf");
c1748f97
PM
1052 break;
1053 default:
1054 printf_filtered ("Unknown type 0x%x",info.HighWord.Bits.Type);
1055 }
1056 if ((info.HighWord.Bits.Type & 0x1) == 0)
baa93fa6 1057 puts_filtered(", N.Acc");
c1748f97
PM
1058 puts_filtered (")\n");
1059 if ((info.HighWord.Bits.Type & 0x10) == 0)
1060 puts_filtered("System selector ");
1061 printf_filtered ("Priviledge level = %d. ", info.HighWord.Bits.Dpl);
1062 if (info.HighWord.Bits.Granularity)
baa93fa6 1063 puts_filtered ("Page granular.\n");
c1748f97
PM
1064 else
1065 puts_filtered ("Byte granular.\n");
1066 return 1;
1067 }
1068 else
1069 {
5572ce1f
PM
1070 DWORD err = GetLastError ();
1071 if (err == ERROR_NOT_SUPPORTED)
1072 printf_filtered ("Function not supported\n");
1073 else
d50a0ce2 1074 printf_filtered ("Invalid selector 0x%x.\n", (unsigned) sel);
c1748f97
PM
1075 return 0;
1076 }
1077}
1078
1079static void
1080display_selectors (char * args, int from_tty)
1081{
1082 if (!current_thread)
1083 {
1084 puts_filtered ("Impossible to display selectors now.\n");
1085 return;
1086 }
1087 if (!args)
1088 {
1089
1090 puts_filtered ("Selector $cs\n");
1091 display_selector (current_thread->h,
baa93fa6 1092 current_thread->context.SegCs);
c1748f97
PM
1093 puts_filtered ("Selector $ds\n");
1094 display_selector (current_thread->h,
baa93fa6 1095 current_thread->context.SegDs);
c1748f97
PM
1096 puts_filtered ("Selector $es\n");
1097 display_selector (current_thread->h,
baa93fa6 1098 current_thread->context.SegEs);
c1748f97
PM
1099 puts_filtered ("Selector $ss\n");
1100 display_selector (current_thread->h,
baa93fa6 1101 current_thread->context.SegSs);
c1748f97
PM
1102 puts_filtered ("Selector $fs\n");
1103 display_selector (current_thread->h,
1104 current_thread->context.SegFs);
1105 puts_filtered ("Selector $gs\n");
1106 display_selector (current_thread->h,
baa93fa6 1107 current_thread->context.SegGs);
c1748f97
PM
1108 }
1109 else
1110 {
1111 int sel;
1112 sel = parse_and_eval_long (args);
1113 printf_filtered ("Selector \"%s\"\n",args);
1114 display_selector (current_thread->h, sel);
1115 }
1116}
1117
7393af7c 1118#define DEBUG_EXCEPTION_SIMPLE(x) if (debug_exceptions) \
a74ce742
PM
1119 printf_unfiltered ("gdb: Target exception %s at %s\n", x, \
1120 host_address_to_string (\
1121 current_event.u.Exception.ExceptionRecord.ExceptionAddress))
7393af7c 1122
36339ecd 1123static int
450005e7 1124handle_exception (struct target_waitstatus *ourstatus)
24e60978 1125{
3cee93ac 1126 thread_info *th;
29fe111d 1127 DWORD code = current_event.u.Exception.ExceptionRecord.ExceptionCode;
3cee93ac 1128
29fe111d 1129 ourstatus->kind = TARGET_WAITKIND_STOPPED;
8a892701 1130
581e13c1 1131 /* Record the context of the current thread. */
3cee93ac 1132 th = thread_rec (current_event.dwThreadId, -1);
24e60978 1133
29fe111d 1134 switch (code)
24e60978 1135 {
1ef980b9 1136 case EXCEPTION_ACCESS_VIOLATION:
7393af7c 1137 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ACCESS_VIOLATION");
a493e3e2 1138 ourstatus->value.sig = GDB_SIGNAL_SEGV;
10325bc5 1139#ifdef __CYGWIN__
8da8e0b3 1140 {
581e13c1
MS
1141 /* See if the access violation happened within the cygwin DLL
1142 itself. Cygwin uses a kind of exception handling to deal
1143 with passed-in invalid addresses. gdb should not treat
1144 these as real SEGVs since they will be silently handled by
1145 cygwin. A real SEGV will (theoretically) be caught by
1146 cygwin later in the process and will be sent as a
1147 cygwin-specific-signal. So, ignore SEGVs if they show up
1148 within the text segment of the DLL itself. */
2c02bd72 1149 const char *fn;
581e13c1
MS
1150 CORE_ADDR addr = (CORE_ADDR) (uintptr_t)
1151 current_event.u.Exception.ExceptionRecord.ExceptionAddress;
1152
1153 if ((!cygwin_exceptions && (addr >= cygwin_load_start
1154 && addr < cygwin_load_end))
a244bdca 1155 || (find_pc_partial_function (addr, &fn, NULL, NULL)
581e13c1
MS
1156 && strncmp (fn, "KERNEL32!IsBad",
1157 strlen ("KERNEL32!IsBad")) == 0))
8da8e0b3
CF
1158 return 0;
1159 }
10325bc5 1160#endif
7393af7c
PM
1161 break;
1162 case STATUS_STACK_OVERFLOW:
1163 DEBUG_EXCEPTION_SIMPLE ("STATUS_STACK_OVERFLOW");
a493e3e2 1164 ourstatus->value.sig = GDB_SIGNAL_SEGV;
7393af7c
PM
1165 break;
1166 case STATUS_FLOAT_DENORMAL_OPERAND:
1167 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DENORMAL_OPERAND");
a493e3e2 1168 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1169 break;
1170 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1171 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ARRAY_BOUNDS_EXCEEDED");
a493e3e2 1172 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1173 break;
1174 case STATUS_FLOAT_INEXACT_RESULT:
1175 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INEXACT_RESULT");
a493e3e2 1176 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1177 break;
1178 case STATUS_FLOAT_INVALID_OPERATION:
1179 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INVALID_OPERATION");
a493e3e2 1180 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1181 break;
1182 case STATUS_FLOAT_OVERFLOW:
1183 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_OVERFLOW");
a493e3e2 1184 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1185 break;
1186 case STATUS_FLOAT_STACK_CHECK:
1187 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_STACK_CHECK");
a493e3e2 1188 ourstatus->value.sig = GDB_SIGNAL_FPE;
1ef980b9 1189 break;
3b7c8b74 1190 case STATUS_FLOAT_UNDERFLOW:
7393af7c 1191 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_UNDERFLOW");
a493e3e2 1192 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c 1193 break;
3b7c8b74 1194 case STATUS_FLOAT_DIVIDE_BY_ZERO:
7393af7c 1195 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DIVIDE_BY_ZERO");
a493e3e2 1196 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c 1197 break;
3b7c8b74 1198 case STATUS_INTEGER_DIVIDE_BY_ZERO:
7393af7c 1199 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_DIVIDE_BY_ZERO");
a493e3e2 1200 ourstatus->value.sig = GDB_SIGNAL_FPE;
3b7c8b74 1201 break;
7393af7c
PM
1202 case STATUS_INTEGER_OVERFLOW:
1203 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_OVERFLOW");
a493e3e2 1204 ourstatus->value.sig = GDB_SIGNAL_FPE;
1ef980b9
SC
1205 break;
1206 case EXCEPTION_BREAKPOINT:
7393af7c 1207 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_BREAKPOINT");
a493e3e2 1208 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1ef980b9
SC
1209 break;
1210 case DBG_CONTROL_C:
7393af7c 1211 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_C");
a493e3e2 1212 ourstatus->value.sig = GDB_SIGNAL_INT;
5b421780
PM
1213 break;
1214 case DBG_CONTROL_BREAK:
7393af7c 1215 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_BREAK");
a493e3e2 1216 ourstatus->value.sig = GDB_SIGNAL_INT;
1ef980b9
SC
1217 break;
1218 case EXCEPTION_SINGLE_STEP:
7393af7c 1219 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_SINGLE_STEP");
a493e3e2 1220 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1ef980b9 1221 break;
8227c82d 1222 case EXCEPTION_ILLEGAL_INSTRUCTION:
7393af7c 1223 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ILLEGAL_INSTRUCTION");
a493e3e2 1224 ourstatus->value.sig = GDB_SIGNAL_ILL;
7393af7c
PM
1225 break;
1226 case EXCEPTION_PRIV_INSTRUCTION:
1227 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_PRIV_INSTRUCTION");
a493e3e2 1228 ourstatus->value.sig = GDB_SIGNAL_ILL;
7393af7c
PM
1229 break;
1230 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1231 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_NONCONTINUABLE_EXCEPTION");
a493e3e2 1232 ourstatus->value.sig = GDB_SIGNAL_ILL;
8227c82d 1233 break;
1ef980b9 1234 default:
581e13c1 1235 /* Treat unhandled first chance exceptions specially. */
02e423b9 1236 if (current_event.u.Exception.dwFirstChance)
a244bdca 1237 return -1;
d50a0ce2
CV
1238 printf_unfiltered ("gdb: unknown target exception 0x%08x at %s\n",
1239 (unsigned) current_event.u.Exception.ExceptionRecord.ExceptionCode,
a74ce742
PM
1240 host_address_to_string (
1241 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
a493e3e2 1242 ourstatus->value.sig = GDB_SIGNAL_UNKNOWN;
1ef980b9 1243 break;
24e60978 1244 }
24e60978 1245 exception_count++;
7393af7c 1246 last_sig = ourstatus->value.sig;
36339ecd 1247 return 1;
24e60978
SC
1248}
1249
3cee93ac 1250/* Resume all artificially suspended threads if we are continuing
581e13c1 1251 execution. */
3cee93ac 1252static BOOL
dc05df57 1253windows_continue (DWORD continue_status, int id)
3cee93ac
CF
1254{
1255 int i;
1256 thread_info *th;
1257 BOOL res;
1258
0c3d84be 1259 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%d, ctid=0x%x, %s);\n",
d50a0ce2
CV
1260 (unsigned) current_event.dwProcessId,
1261 (unsigned) current_event.dwThreadId,
dfe7f3ac 1262 continue_status == DBG_CONTINUE ?
7393af7c 1263 "DBG_CONTINUE" : "DBG_EXCEPTION_NOT_HANDLED"));
6537bb24
PA
1264
1265 for (th = &thread_head; (th = th->next) != NULL;)
1266 if ((id == -1 || id == (int) th->id)
1267 && th->suspended)
1268 {
1269 if (debug_registers_changed)
1270 {
1271 th->context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1272 th->context.Dr0 = dr[0];
1273 th->context.Dr1 = dr[1];
1274 th->context.Dr2 = dr[2];
1275 th->context.Dr3 = dr[3];
1276 th->context.Dr6 = DR6_CLEAR_VALUE;
1277 th->context.Dr7 = dr[7];
1278 }
1279 if (th->context.ContextFlags)
1280 {
1281 CHECK (SetThreadContext (th->h, &th->context));
1282 th->context.ContextFlags = 0;
1283 }
1284 if (th->suspended > 0)
1285 (void) ResumeThread (th->h);
1286 th->suspended = 0;
1287 }
1288
0714f9bf
SS
1289 res = ContinueDebugEvent (current_event.dwProcessId,
1290 current_event.dwThreadId,
1291 continue_status);
3cee93ac 1292
fa4ba8da 1293 debug_registers_changed = 0;
3cee93ac
CF
1294 return res;
1295}
1296
d6dc8049
CF
1297/* Called in pathological case where Windows fails to send a
1298 CREATE_PROCESS_DEBUG_EVENT after an attach. */
3ee6f623 1299static DWORD
5439edaa 1300fake_create_process (void)
3ade5333
CF
1301{
1302 current_process_handle = OpenProcess (PROCESS_ALL_ACCESS, FALSE,
1303 current_event.dwProcessId);
bf25528d
CF
1304 if (current_process_handle != NULL)
1305 open_process_used = 1;
1306 else
1307 {
d50a0ce2
CV
1308 error (_("OpenProcess call failed, GetLastError = %u"),
1309 (unsigned) GetLastError ());
bf25528d
CF
1310 /* We can not debug anything in that case. */
1311 }
3ade5333 1312 main_thread_id = current_event.dwThreadId;
711e434b
PM
1313 current_thread = windows_add_thread (
1314 ptid_build (current_event.dwProcessId, 0,
1315 current_event.dwThreadId),
1316 current_event.u.CreateThread.hThread,
1317 current_event.u.CreateThread.lpThreadLocalBase);
3ade5333
CF
1318 return main_thread_id;
1319}
1320
a244bdca 1321static void
28439f5e 1322windows_resume (struct target_ops *ops,
2ea28649 1323 ptid_t ptid, int step, enum gdb_signal sig)
a244bdca
CF
1324{
1325 thread_info *th;
1326 DWORD continue_status = DBG_CONTINUE;
1327
2dc38344
PA
1328 /* A specific PTID means `step only this thread id'. */
1329 int resume_all = ptid_equal (ptid, minus_one_ptid);
1330
1331 /* If we're continuing all threads, it's the current inferior that
1332 should be handled specially. */
1333 if (resume_all)
1334 ptid = inferior_ptid;
a244bdca 1335
a493e3e2 1336 if (sig != GDB_SIGNAL_0)
a244bdca
CF
1337 {
1338 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
1339 {
1340 DEBUG_EXCEPT(("Cannot continue with signal %d here.\n",sig));
1341 }
1342 else if (sig == last_sig)
1343 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1344 else
1345#if 0
1346/* This code does not seem to work, because
1347 the kernel does probably not consider changes in the ExceptionRecord
1348 structure when passing the exception to the inferior.
1349 Note that this seems possible in the exception handler itself. */
1350 {
1351 int i;
1352 for (i = 0; xlate[i].them != -1; i++)
1353 if (xlate[i].us == sig)
1354 {
581e13c1
MS
1355 current_event.u.Exception.ExceptionRecord.ExceptionCode
1356 = xlate[i].them;
a244bdca
CF
1357 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1358 break;
1359 }
1360 if (continue_status == DBG_CONTINUE)
1361 {
1362 DEBUG_EXCEPT(("Cannot continue with signal %d.\n",sig));
1363 }
1364 }
1365#endif
1366 DEBUG_EXCEPT(("Can only continue with recieved signal %d.\n",
1367 last_sig));
1368 }
1369
a493e3e2 1370 last_sig = GDB_SIGNAL_0;
a244bdca 1371
dc05df57 1372 DEBUG_EXEC (("gdb: windows_resume (pid=%d, tid=%ld, step=%d, sig=%d);\n",
2dc38344 1373 ptid_get_pid (ptid), ptid_get_tid (ptid), step, sig));
a244bdca 1374
581e13c1 1375 /* Get context for currently selected thread. */
2dc38344 1376 th = thread_rec (ptid_get_tid (inferior_ptid), FALSE);
a244bdca
CF
1377 if (th)
1378 {
1379 if (step)
1380 {
581e13c1 1381 /* Single step by setting t bit. */
a97b0ac8
UW
1382 struct regcache *regcache = get_current_regcache ();
1383 struct gdbarch *gdbarch = get_regcache_arch (regcache);
1384 windows_fetch_inferior_registers (ops, regcache,
1385 gdbarch_ps_regnum (gdbarch));
a244bdca
CF
1386 th->context.EFlags |= FLAG_TRACE_BIT;
1387 }
1388
1389 if (th->context.ContextFlags)
1390 {
1391 if (debug_registers_changed)
1392 {
1393 th->context.Dr0 = dr[0];
1394 th->context.Dr1 = dr[1];
1395 th->context.Dr2 = dr[2];
1396 th->context.Dr3 = dr[3];
6537bb24 1397 th->context.Dr6 = DR6_CLEAR_VALUE;
a244bdca
CF
1398 th->context.Dr7 = dr[7];
1399 }
1400 CHECK (SetThreadContext (th->h, &th->context));
1401 th->context.ContextFlags = 0;
1402 }
1403 }
1404
1405 /* Allow continuing with the same signal that interrupted us.
581e13c1 1406 Otherwise complain. */
a244bdca 1407
2dc38344 1408 if (resume_all)
dc05df57 1409 windows_continue (continue_status, -1);
2dc38344 1410 else
dc05df57 1411 windows_continue (continue_status, ptid_get_tid (ptid));
a244bdca
CF
1412}
1413
695de547
CF
1414/* Ctrl-C handler used when the inferior is not run in the same console. The
1415 handler is in charge of interrupting the inferior using DebugBreakProcess.
1416 Note that this function is not available prior to Windows XP. In this case
1417 we emit a warning. */
d603d4b3 1418static BOOL WINAPI
695de547
CF
1419ctrl_c_handler (DWORD event_type)
1420{
1421 const int attach_flag = current_inferior ()->attach_flag;
1422
bb0613a5
PM
1423 /* Only handle Ctrl-C and Ctrl-Break events. Ignore others. */
1424 if (event_type != CTRL_C_EVENT && event_type != CTRL_BREAK_EVENT)
695de547
CF
1425 return FALSE;
1426
1427 /* If the inferior and the debugger share the same console, do nothing as
1428 the inferior has also received the Ctrl-C event. */
1429 if (!new_console && !attach_flag)
1430 return TRUE;
1431
1432 if (!DebugBreakProcess (current_process_handle))
581e13c1
MS
1433 warning (_("Could not interrupt program. "
1434 "Press Ctrl-c in the program console."));
695de547
CF
1435
1436 /* Return true to tell that Ctrl-C has been handled. */
1437 return TRUE;
1438}
1439
8a892701 1440/* Get the next event from the child. Return 1 if the event requires
695de547 1441 handling by WFI (or whatever). */
1e37c281 1442static int
28439f5e
PA
1443get_windows_debug_event (struct target_ops *ops,
1444 int pid, struct target_waitstatus *ourstatus)
1e37c281
JM
1445{
1446 BOOL debug_event;
8a892701 1447 DWORD continue_status, event_code;
87a45c96 1448 thread_info *th;
8a892701 1449 static thread_info dummy_thread_info;
450005e7 1450 int retval = 0;
1e37c281 1451
a493e3e2 1452 last_sig = GDB_SIGNAL_0;
9d3789f7 1453
8a892701 1454 if (!(debug_event = WaitForDebugEvent (&current_event, 1000)))
29fe111d 1455 goto out;
1e37c281
JM
1456
1457 event_count++;
1458 continue_status = DBG_CONTINUE;
1e37c281 1459
8a892701 1460 event_code = current_event.dwDebugEventCode;
450005e7 1461 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
87a45c96 1462 th = NULL;
a244bdca 1463 have_saved_context = 0;
8a892701
CF
1464
1465 switch (event_code)
1e37c281
JM
1466 {
1467 case CREATE_THREAD_DEBUG_EVENT:
0c3d84be 1468 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1469 (unsigned) current_event.dwProcessId,
1470 (unsigned) current_event.dwThreadId,
1471 "CREATE_THREAD_DEBUG_EVENT"));
dfe7f3ac 1472 if (saw_create != 1)
3ade5333 1473 {
181e7f93
PA
1474 struct inferior *inf;
1475 inf = find_inferior_pid (current_event.dwProcessId);
1476 if (!saw_create && inf->attach_flag)
3ade5333 1477 {
d6dc8049
CF
1478 /* Kludge around a Windows bug where first event is a create
1479 thread event. Caused when attached process does not have
581e13c1 1480 a main thread. */
3a3e9ee3 1481 retval = fake_create_process ();
181e7f93
PA
1482 if (retval)
1483 saw_create++;
3ade5333
CF
1484 }
1485 break;
1486 }
581e13c1 1487 /* Record the existence of this thread. */
450005e7 1488 retval = current_event.dwThreadId;
dc05df57 1489 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1490 current_event.dwThreadId),
711e434b
PM
1491 current_event.u.CreateThread.hThread,
1492 current_event.u.CreateThread.lpThreadLocalBase);
1493
1e37c281
JM
1494 break;
1495
1496 case EXIT_THREAD_DEBUG_EVENT:
0c3d84be 1497 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1498 (unsigned) current_event.dwProcessId,
1499 (unsigned) current_event.dwThreadId,
1500 "EXIT_THREAD_DEBUG_EVENT"));
b3c613f2 1501
87a45c96
CF
1502 if (current_event.dwThreadId != main_thread_id)
1503 {
dc05df57 1504 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
e0ea48a0
EZ
1505 current_event.dwThreadId),
1506 current_event.u.ExitThread.dwExitCode);
87a45c96
CF
1507 th = &dummy_thread_info;
1508 }
1e37c281
JM
1509 break;
1510
1511 case CREATE_PROCESS_DEBUG_EVENT:
0c3d84be 1512 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1513 (unsigned) current_event.dwProcessId,
1514 (unsigned) current_event.dwThreadId,
1515 "CREATE_PROCESS_DEBUG_EVENT"));
700b351b 1516 CloseHandle (current_event.u.CreateProcessInfo.hFile);
dfe7f3ac 1517 if (++saw_create != 1)
bf25528d 1518 break;
1e37c281 1519
dfe7f3ac 1520 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
87a45c96 1521 if (main_thread_id)
695de547 1522 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
e0ea48a0
EZ
1523 main_thread_id),
1524 0);
9d3789f7 1525 main_thread_id = current_event.dwThreadId;
581e13c1 1526 /* Add the main thread. */
dc05df57 1527 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
695de547 1528 current_event.dwThreadId),
711e434b
PM
1529 current_event.u.CreateProcessInfo.hThread,
1530 current_event.u.CreateProcessInfo.lpThreadLocalBase);
3a3e9ee3 1531 retval = current_event.dwThreadId;
1e37c281
JM
1532 break;
1533
1534 case EXIT_PROCESS_DEBUG_EVENT:
0c3d84be 1535 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1536 (unsigned) current_event.dwProcessId,
1537 (unsigned) current_event.dwThreadId,
1538 "EXIT_PROCESS_DEBUG_EVENT"));
16d905e2
CF
1539 if (!windows_initialization_done)
1540 {
1541 target_terminal_ours ();
1542 target_mourn_inferior ();
1543 error (_("During startup program exited with code 0x%x."),
1544 (unsigned int) current_event.u.ExitProcess.dwExitCode);
1545 }
1546 else if (saw_create == 1)
1547 {
1548 ourstatus->kind = TARGET_WAITKIND_EXITED;
1549 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
1550 retval = main_thread_id;
1551 }
8a892701 1552 break;
1e37c281
JM
1553
1554 case LOAD_DLL_DEBUG_EVENT:
0c3d84be 1555 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1556 (unsigned) current_event.dwProcessId,
1557 (unsigned) current_event.dwThreadId,
1558 "LOAD_DLL_DEBUG_EVENT"));
700b351b 1559 CloseHandle (current_event.u.LoadDll.hFile);
ea39ad35 1560 if (saw_create != 1 || ! windows_initialization_done)
dfe7f3ac 1561 break;
8a892701 1562 catch_errors (handle_load_dll, NULL, (char *) "", RETURN_MASK_ALL);
450005e7
CF
1563 ourstatus->kind = TARGET_WAITKIND_LOADED;
1564 ourstatus->value.integer = 0;
9d3789f7 1565 retval = main_thread_id;
1e37c281
JM
1566 break;
1567
1568 case UNLOAD_DLL_DEBUG_EVENT:
0c3d84be 1569 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1570 (unsigned) current_event.dwProcessId,
1571 (unsigned) current_event.dwThreadId,
1572 "UNLOAD_DLL_DEBUG_EVENT"));
ea39ad35 1573 if (saw_create != 1 || ! windows_initialization_done)
dfe7f3ac 1574 break;
d3ff4a77 1575 catch_errors (handle_unload_dll, NULL, (char *) "", RETURN_MASK_ALL);
de1b3c3d
PA
1576 ourstatus->kind = TARGET_WAITKIND_LOADED;
1577 ourstatus->value.integer = 0;
1578 retval = main_thread_id;
d3ff4a77 1579 break;
1e37c281
JM
1580
1581 case EXCEPTION_DEBUG_EVENT:
0c3d84be 1582 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1583 (unsigned) current_event.dwProcessId,
1584 (unsigned) current_event.dwThreadId,
1585 "EXCEPTION_DEBUG_EVENT"));
dfe7f3ac
CF
1586 if (saw_create != 1)
1587 break;
a244bdca
CF
1588 switch (handle_exception (ourstatus))
1589 {
1590 case 0:
1591 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1592 break;
1593 case 1:
1594 retval = current_event.dwThreadId;
1595 break;
1596 case -1:
1597 last_sig = 1;
1598 continue_status = -1;
1599 break;
1600 }
1e37c281
JM
1601 break;
1602
581e13c1 1603 case OUTPUT_DEBUG_STRING_EVENT: /* Message from the kernel. */
0c3d84be 1604 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1605 (unsigned) current_event.dwProcessId,
1606 (unsigned) current_event.dwThreadId,
1607 "OUTPUT_DEBUG_STRING_EVENT"));
dfe7f3ac
CF
1608 if (saw_create != 1)
1609 break;
a244bdca 1610 retval = handle_output_debug_string (ourstatus);
1e37c281 1611 break;
9d3789f7 1612
1e37c281 1613 default:
dfe7f3ac
CF
1614 if (saw_create != 1)
1615 break;
0c3d84be 1616 printf_unfiltered ("gdb: kernel event for pid=%u tid=0x%x\n",
d50a0ce2
CV
1617 (unsigned) current_event.dwProcessId,
1618 (unsigned) current_event.dwThreadId);
1619 printf_unfiltered (" unknown event code %u\n",
1620 (unsigned) current_event.dwDebugEventCode);
1e37c281
JM
1621 break;
1622 }
1623
dfe7f3ac 1624 if (!retval || saw_create != 1)
a244bdca
CF
1625 {
1626 if (continue_status == -1)
02529b48 1627 windows_resume (ops, minus_one_ptid, 0, 1);
a244bdca 1628 else
dc05df57 1629 CHECK (windows_continue (continue_status, -1));
a244bdca 1630 }
450005e7 1631 else
9d3789f7 1632 {
2dc38344
PA
1633 inferior_ptid = ptid_build (current_event.dwProcessId, 0,
1634 retval);
3ade5333 1635 current_thread = th ?: thread_rec (current_event.dwThreadId, TRUE);
9d3789f7 1636 }
1e37c281
JM
1637
1638out:
450005e7 1639 return retval;
1e37c281
JM
1640}
1641
2dc38344 1642/* Wait for interesting events to occur in the target process. */
39f77062 1643static ptid_t
117de6a9 1644windows_wait (struct target_ops *ops,
47608cb1 1645 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
24e60978 1646{
2dc38344 1647 int pid = -1;
39f77062 1648
c44537cf
CV
1649 target_terminal_ours ();
1650
24e60978
SC
1651 /* We loop when we get a non-standard exception rather than return
1652 with a SPURIOUS because resume can try and step or modify things,
3cee93ac 1653 which needs a current_thread->h. But some of these exceptions mark
24e60978 1654 the birth or death of threads, which mean that the current thread
581e13c1 1655 isn't necessarily what you think it is. */
24e60978
SC
1656
1657 while (1)
450005e7 1658 {
c57918b2 1659 int retval;
2b008701 1660
695de547
CF
1661 /* If the user presses Ctrl-c while the debugger is waiting
1662 for an event, he expects the debugger to interrupt his program
1663 and to get the prompt back. There are two possible situations:
1664
1665 - The debugger and the program do not share the console, in
1666 which case the Ctrl-c event only reached the debugger.
1667 In that case, the ctrl_c handler will take care of interrupting
581e13c1
MS
1668 the inferior. Note that this case is working starting with
1669 Windows XP. For Windows 2000, Ctrl-C should be pressed in the
695de547
CF
1670 inferior console.
1671
1672 - The debugger and the program share the same console, in which
1673 case both debugger and inferior will receive the Ctrl-c event.
1674 In that case the ctrl_c handler will ignore the event, as the
1675 Ctrl-c event generated inside the inferior will trigger the
1676 expected debug event.
1677
1678 FIXME: brobecker/2008-05-20: If the inferior receives the
1679 signal first and the delay until GDB receives that signal
1680 is sufficiently long, GDB can sometimes receive the SIGINT
1681 after we have unblocked the CTRL+C handler. This would
1682 lead to the debugger stopping prematurely while handling
1683 the new-thread event that comes with the handling of the SIGINT
1684 inside the inferior, and then stop again immediately when
1685 the user tries to resume the execution in the inferior.
1686 This is a classic race that we should try to fix one day. */
1687 SetConsoleCtrlHandler (&ctrl_c_handler, TRUE);
28439f5e 1688 retval = get_windows_debug_event (ops, pid, ourstatus);
695de547 1689 SetConsoleCtrlHandler (&ctrl_c_handler, FALSE);
c57918b2 1690
450005e7 1691 if (retval)
2dc38344 1692 return ptid_build (current_event.dwProcessId, 0, retval);
450005e7
CF
1693 else
1694 {
1695 int detach = 0;
3cee93ac 1696
98bbd631
AC
1697 if (deprecated_ui_loop_hook != NULL)
1698 detach = deprecated_ui_loop_hook (0);
0714f9bf 1699
450005e7 1700 if (detach)
7d85a9c0 1701 windows_kill_inferior (ops);
450005e7
CF
1702 }
1703 }
24e60978
SC
1704}
1705
ea39ad35
JB
1706/* Iterate over all DLLs currently mapped by our inferior, and
1707 add them to our list of solibs. */
94481b8c
JB
1708
1709static void
ea39ad35 1710windows_add_all_dlls (void)
94481b8c
JB
1711{
1712 struct so_list *so;
1713 HMODULE dummy_hmodule;
1714 DWORD cb_needed;
1715 HMODULE *hmodules;
1716 int i;
1717
94481b8c
JB
1718 if (EnumProcessModules (current_process_handle, &dummy_hmodule,
1719 sizeof (HMODULE), &cb_needed) == 0)
1720 return;
1721
1722 if (cb_needed < 1)
1723 return;
1724
1725 hmodules = (HMODULE *) alloca (cb_needed);
1726 if (EnumProcessModules (current_process_handle, hmodules,
1727 cb_needed, &cb_needed) == 0)
1728 return;
1729
ea39ad35 1730 for (i = 1; i < (int) (cb_needed / sizeof (HMODULE)); i++)
94481b8c
JB
1731 {
1732 MODULEINFO mi;
774f74c2
PM
1733#ifdef __USEWIDE
1734 wchar_t dll_name[__PMAX];
1735 char name[__PMAX];
1736#else
94481b8c 1737 char dll_name[__PMAX];
774f74c2
PM
1738 char *name;
1739#endif
94481b8c
JB
1740 if (GetModuleInformation (current_process_handle, hmodules[i],
1741 &mi, sizeof (mi)) == 0)
1742 continue;
1743 if (GetModuleFileNameEx (current_process_handle, hmodules[i],
1744 dll_name, sizeof (dll_name)) == 0)
1745 continue;
774f74c2
PM
1746#ifdef __USEWIDE
1747 wcstombs (name, dll_name, __PMAX);
1748#else
1749 name = dll_name;
1750#endif
ea39ad35
JB
1751
1752 solib_end->next = windows_make_so (name, mi.lpBaseOfDll);
1753 solib_end = solib_end->next;
94481b8c
JB
1754 }
1755}
1756
9d3789f7 1757static void
dc05df57 1758do_initial_windows_stuff (struct target_ops *ops, DWORD pid, int attaching)
9d3789f7
CF
1759{
1760 extern int stop_after_trap;
fa4ba8da 1761 int i;
d6b48e9c 1762 struct inferior *inf;
2020b7ab 1763 struct thread_info *tp;
9d3789f7 1764
a493e3e2 1765 last_sig = GDB_SIGNAL_0;
9d3789f7
CF
1766 event_count = 0;
1767 exception_count = 0;
bf25528d 1768 open_process_used = 0;
fa4ba8da 1769 debug_registers_changed = 0;
dfe7f3ac 1770 debug_registers_used = 0;
fa4ba8da
PM
1771 for (i = 0; i < sizeof (dr) / sizeof (dr[0]); i++)
1772 dr[i] = 0;
10325bc5 1773#ifdef __CYGWIN__
de1b3c3d 1774 cygwin_load_start = cygwin_load_end = 0;
10325bc5 1775#endif
9d3789f7
CF
1776 current_event.dwProcessId = pid;
1777 memset (&current_event, 0, sizeof (current_event));
0795be10 1778 push_target (ops);
cb851954 1779 disable_breakpoints_in_shlibs ();
dc05df57 1780 windows_clear_solib ();
9d3789f7
CF
1781 clear_proceed_status ();
1782 init_wait_for_inferior ();
1783
6c95b8df
PA
1784 inf = current_inferior ();
1785 inferior_appeared (inf, pid);
181e7f93 1786 inf->attach_flag = attaching;
7f9f62ba 1787
9f9d052e
PM
1788 /* Make the new process the current inferior, so terminal handling
1789 can rely on it. When attaching, we don't know about any thread
1790 id here, but that's OK --- nothing should be referencing the
dc05df57 1791 current thread until we report an event out of windows_wait. */
9f9d052e
PM
1792 inferior_ptid = pid_to_ptid (pid);
1793
c44537cf 1794 terminal_init_inferior_with_pgrp (pid);
9d3789f7
CF
1795 target_terminal_inferior ();
1796
16d905e2 1797 windows_initialization_done = 0;
16c381f0 1798 inf->control.stop_soon = STOP_QUIETLY;
9d3789f7
CF
1799 while (1)
1800 {
1801 stop_after_trap = 1;
e4c8541f 1802 wait_for_inferior ();
2020b7ab 1803 tp = inferior_thread ();
a493e3e2 1804 if (tp->suspend.stop_signal != GDB_SIGNAL_TRAP)
16c381f0 1805 resume (0, tp->suspend.stop_signal);
9d3789f7
CF
1806 else
1807 break;
1808 }
eff8332b 1809
ea39ad35
JB
1810 /* Now that the inferior has been started and all DLLs have been mapped,
1811 we can iterate over all DLLs and load them in. */
1812 windows_add_all_dlls ();
94481b8c 1813
16d905e2 1814 windows_initialization_done = 1;
16c381f0 1815 inf->control.stop_soon = NO_STOP_QUIETLY;
9d3789f7
CF
1816 stop_after_trap = 0;
1817 return;
1818}
1819
616a9dc4
CV
1820/* Try to set or remove a user privilege to the current process. Return -1
1821 if that fails, the previous setting of that privilege otherwise.
1822
1823 This code is copied from the Cygwin source code and rearranged to allow
1824 dynamically loading of the needed symbols from advapi32 which is only
581e13c1 1825 available on NT/2K/XP. */
616a9dc4
CV
1826static int
1827set_process_privilege (const char *privilege, BOOL enable)
1828{
616a9dc4
CV
1829 HANDLE token_hdl = NULL;
1830 LUID restore_priv;
1831 TOKEN_PRIVILEGES new_priv, orig_priv;
1832 int ret = -1;
1833 DWORD size;
1834
616a9dc4
CV
1835 if (!OpenProcessToken (GetCurrentProcess (),
1836 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
1837 &token_hdl))
1838 goto out;
1839
418c6cb3 1840 if (!LookupPrivilegeValueA (NULL, privilege, &restore_priv))
616a9dc4
CV
1841 goto out;
1842
1843 new_priv.PrivilegeCount = 1;
1844 new_priv.Privileges[0].Luid = restore_priv;
1845 new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0;
1846
1847 if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv,
295732ea 1848 sizeof orig_priv, &orig_priv, &size))
616a9dc4
CV
1849 goto out;
1850#if 0
1851 /* Disabled, otherwise every `attach' in an unprivileged user session
1852 would raise the "Failed to get SE_DEBUG_NAME privilege" warning in
581e13c1 1853 windows_attach(). */
616a9dc4 1854 /* AdjustTokenPrivileges returns TRUE even if the privilege could not
581e13c1 1855 be enabled. GetLastError () returns an correct error code, though. */
616a9dc4
CV
1856 if (enable && GetLastError () == ERROR_NOT_ALL_ASSIGNED)
1857 goto out;
1858#endif
1859
1860 ret = orig_priv.Privileges[0].Attributes == SE_PRIVILEGE_ENABLED ? 1 : 0;
1861
1862out:
1863 if (token_hdl)
1864 CloseHandle (token_hdl);
1865
1866 return ret;
1867}
1868
02cc9f49 1869/* Attach to process PID, then initialize for debugging it. */
24e60978 1870static void
dc05df57 1871windows_attach (struct target_ops *ops, char *args, int from_tty)
24e60978
SC
1872{
1873 BOOL ok;
559e75c0 1874 DWORD pid;
24e60978 1875
74164c56 1876 pid = parse_pid_to_attach (args);
24e60978 1877
616a9dc4
CV
1878 if (set_process_privilege (SE_DEBUG_NAME, TRUE) < 0)
1879 {
1880 printf_unfiltered ("Warning: Failed to get SE_DEBUG_NAME privilege\n");
581e13c1
MS
1881 printf_unfiltered ("This can cause attach to "
1882 "fail on Windows NT/2K/XP\n");
616a9dc4
CV
1883 }
1884
dc05df57 1885 windows_init_thread_list ();
9d3789f7 1886 ok = DebugActiveProcess (pid);
91a175b3 1887 saw_create = 0;
24e60978 1888
10325bc5 1889#ifdef __CYGWIN__
24e60978 1890 if (!ok)
baa93fa6 1891 {
581e13c1 1892 /* Try fall back to Cygwin pid. */
baa93fa6
CF
1893 pid = cygwin_internal (CW_CYGWIN_PID_TO_WINPID, pid);
1894
1895 if (pid > 0)
1896 ok = DebugActiveProcess (pid);
10325bc5
PA
1897 }
1898#endif
baa93fa6 1899
10325bc5
PA
1900 if (!ok)
1901 error (_("Can't attach to process."));
24e60978 1902
2b008701 1903 DebugSetProcessKillOnExit (FALSE);
3ade5333 1904
24e60978
SC
1905 if (from_tty)
1906 {
1907 char *exec_file = (char *) get_exec_file (0);
1908
1909 if (exec_file)
1910 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
39f77062 1911 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1912 else
1913 printf_unfiltered ("Attaching to %s\n",
39f77062 1914 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1915
1916 gdb_flush (gdb_stdout);
1917 }
1918
dc05df57 1919 do_initial_windows_stuff (ops, pid, 1);
9d3789f7 1920 target_terminal_ours ();
24e60978
SC
1921}
1922
24e60978 1923static void
52554a0e 1924windows_detach (struct target_ops *ops, const char *args, int from_tty)
24e60978 1925{
02cc9f49
CV
1926 int detached = 1;
1927
2b008701 1928 ptid_t ptid = {-1};
a493e3e2 1929 windows_resume (ops, ptid, 0, GDB_SIGNAL_0);
96998ce7 1930
2b008701
CF
1931 if (!DebugActiveProcessStop (current_event.dwProcessId))
1932 {
d50a0ce2
CV
1933 error (_("Can't detach process %u (error %u)"),
1934 (unsigned) current_event.dwProcessId, (unsigned) GetLastError ());
2b008701 1935 detached = 0;
02cc9f49 1936 }
2b008701
CF
1937 DebugSetProcessKillOnExit (FALSE);
1938
02cc9f49 1939 if (detached && from_tty)
24e60978
SC
1940 {
1941 char *exec_file = get_exec_file (0);
1942 if (exec_file == 0)
1943 exec_file = "";
d50a0ce2
CV
1944 printf_unfiltered ("Detaching from program: %s, Pid %u\n", exec_file,
1945 (unsigned) current_event.dwProcessId);
24e60978
SC
1946 gdb_flush (gdb_stdout);
1947 }
7f9f62ba 1948
26cb8b7c 1949 i386_cleanup_dregs ();
39f77062 1950 inferior_ptid = null_ptid;
7f9f62ba
PA
1951 detach_inferior (current_event.dwProcessId);
1952
0795be10 1953 unpush_target (ops);
24e60978
SC
1954}
1955
3ee6f623 1956static char *
8dd27370 1957windows_pid_to_exec_file (struct target_ops *self, int pid)
47216e51 1958{
b3c613f2 1959 static char path[__PMAX];
10325bc5 1960#ifdef __CYGWIN__
581e13c1 1961 /* Try to find exe name as symlink target of /proc/<pid>/exe. */
33605d39
CF
1962 int nchars;
1963 char procexe[sizeof ("/proc/4294967295/exe")];
08850b56
PM
1964
1965 xsnprintf (procexe, sizeof (procexe), "/proc/%u/exe", pid);
33605d39
CF
1966 nchars = readlink (procexe, path, sizeof(path));
1967 if (nchars > 0 && nchars < sizeof (path))
47216e51 1968 {
33605d39
CF
1969 path[nchars] = '\0'; /* Got it */
1970 return path;
47216e51 1971 }
10325bc5
PA
1972#endif
1973
33605d39 1974 /* If we get here then either Cygwin is hosed, this isn't a Cygwin version
581e13c1 1975 of gdb, or we're trying to debug a non-Cygwin windows executable. */
33605d39
CF
1976 if (!get_module_name (0, path))
1977 path[0] = '\0';
1978
1979 return path;
47216e51
CV
1980}
1981
24e60978
SC
1982/* Print status information about what we're accessing. */
1983
1984static void
dc05df57 1985windows_files_info (struct target_ops *ignore)
24e60978 1986{
181e7f93
PA
1987 struct inferior *inf = current_inferior ();
1988
24e60978 1989 printf_unfiltered ("\tUsing the running image of %s %s.\n",
181e7f93
PA
1990 inf->attach_flag ? "attached" : "child",
1991 target_pid_to_str (inferior_ptid));
24e60978
SC
1992}
1993
24e60978 1994static void
dc05df57 1995windows_open (char *arg, int from_tty)
24e60978 1996{
8a3fe4f8 1997 error (_("Use the \"run\" command to start a Unix child process."));
24e60978
SC
1998}
1999
cd44747c
PM
2000/* Modify CreateProcess parameters for use of a new separate console.
2001 Parameters are:
2002 *FLAGS: DWORD parameter for general process creation flags.
2003 *SI: STARTUPINFO structure, for which the console window size and
2004 console buffer size is filled in if GDB is running in a console.
2005 to create the new console.
2006 The size of the used font is not available on all versions of
2007 Windows OS. Furthermore, the current font might not be the default
2008 font, but this is still better than before.
2009 If the windows and buffer sizes are computed,
2010 SI->DWFLAGS is changed so that this information is used
2011 by CreateProcess function. */
2012
2013static void
2014windows_set_console_info (STARTUPINFO *si, DWORD *flags)
2015{
2016 HANDLE hconsole = CreateFile ("CONOUT$", GENERIC_READ | GENERIC_WRITE,
2017 FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, 0);
2018
2019 if (hconsole != INVALID_HANDLE_VALUE)
2020 {
2021 CONSOLE_SCREEN_BUFFER_INFO sbinfo;
2022 COORD font_size;
2023 CONSOLE_FONT_INFO cfi;
2024
2025 GetCurrentConsoleFont (hconsole, FALSE, &cfi);
2026 font_size = GetConsoleFontSize (hconsole, cfi.nFont);
2027 GetConsoleScreenBufferInfo(hconsole, &sbinfo);
2028 si->dwXSize = sbinfo.srWindow.Right - sbinfo.srWindow.Left + 1;
2029 si->dwYSize = sbinfo.srWindow.Bottom - sbinfo.srWindow.Top + 1;
2030 if (font_size.X)
2031 si->dwXSize *= font_size.X;
2032 else
2033 si->dwXSize *= 8;
2034 if (font_size.Y)
2035 si->dwYSize *= font_size.Y;
2036 else
2037 si->dwYSize *= 12;
2038 si->dwXCountChars = sbinfo.dwSize.X;
2039 si->dwYCountChars = sbinfo.dwSize.Y;
2040 si->dwFlags |= STARTF_USESIZE | STARTF_USECOUNTCHARS;
2041 }
2042 *flags |= CREATE_NEW_CONSOLE;
2043}
2044
c93dbcba
EZ
2045#ifndef __CYGWIN__
2046/* Function called by qsort to sort environment strings. */
2047
2048static int
2049envvar_cmp (const void *a, const void *b)
2050{
2051 const char **p = (const char **) a;
2052 const char **q = (const char **) b;
2053 return strcasecmp (*p, *q);
2054}
2055#endif
2056
b7ff339d
CV
2057#ifdef __CYGWIN__
2058static void
2059clear_win32_environment (char **env)
2060{
2061 int i;
2062 size_t len;
2063 wchar_t *copy = NULL, *equalpos;
2064
2065 for (i = 0; env[i] && *env[i]; i++)
2066 {
2067 len = mbstowcs (NULL, env[i], 0) + 1;
2068 copy = (wchar_t *) xrealloc (copy, len * sizeof (wchar_t));
2069 mbstowcs (copy, env[i], len);
2070 equalpos = wcschr (copy, L'=');
2071 if (equalpos)
2072 *equalpos = L'\0';
2073 SetEnvironmentVariableW (copy, NULL);
2074 }
2075 xfree (copy);
2076}
2077#endif
2078
dc05df57 2079/* Start an inferior windows child process and sets inferior_ptid to its pid.
24e60978
SC
2080 EXEC_FILE is the file to run.
2081 ALLARGS is a string containing the arguments to the program.
2082 ENV is the environment vector to pass. Errors reported with error(). */
2083
24e60978 2084static void
dc05df57 2085windows_create_inferior (struct target_ops *ops, char *exec_file,
136d6dae 2086 char *allargs, char **in_env, int from_tty)
24e60978 2087{
b3c613f2 2088 STARTUPINFO si;
41b4aadc 2089#ifdef __CYGWIN__
b3c613f2
CF
2090 cygwin_buf_t real_path[__PMAX];
2091 cygwin_buf_t shell[__PMAX]; /* Path to shell */
d0d0ab16 2092 const char *sh;
b3c613f2
CF
2093 cygwin_buf_t *toexec;
2094 cygwin_buf_t *cygallargs;
2095 cygwin_buf_t *args;
b7ff339d
CV
2096 char **old_env = NULL;
2097 PWCHAR w32_env;
d0d0ab16 2098 size_t len;
2becadee
CF
2099 int tty;
2100 int ostdin, ostdout, ostderr;
41b4aadc 2101#else
b3c613f2
CF
2102 char real_path[__PMAX];
2103 char shell[__PMAX]; /* Path to shell */
d0d0ab16
CV
2104 char *toexec;
2105 char *args;
8f205f9c 2106 size_t args_len;
41b4aadc 2107 HANDLE tty;
c93dbcba
EZ
2108 char *w32env;
2109 char *temp;
2110 size_t envlen;
2111 int i;
2112 size_t envsize;
2113 char **env;
41b4aadc 2114#endif
d0d0ab16
CV
2115 PROCESS_INFORMATION pi;
2116 BOOL ret;
2117 DWORD flags = 0;
3cb3b8df 2118 const char *inferior_io_terminal = get_inferior_io_terminal ();
24e60978
SC
2119
2120 if (!exec_file)
8a3fe4f8 2121 error (_("No executable specified, use `target exec'."));
24e60978
SC
2122
2123 memset (&si, 0, sizeof (si));
2124 si.cb = sizeof (si);
2125
d0d0ab16
CV
2126 if (new_group)
2127 flags |= CREATE_NEW_PROCESS_GROUP;
2128
2129 if (new_console)
cd44747c 2130 windows_set_console_info (&si, &flags);
d0d0ab16 2131
10325bc5 2132#ifdef __CYGWIN__
349b409f 2133 if (!useshell)
dfe7f3ac 2134 {
d0d0ab16
CV
2135 flags |= DEBUG_ONLY_THIS_PROCESS;
2136 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, exec_file, real_path,
b3c613f2 2137 __PMAX * sizeof (cygwin_buf_t)) < 0)
d0d0ab16 2138 error (_("Error starting executable: %d"), errno);
dfe7f3ac 2139 toexec = real_path;
b3c613f2 2140#ifdef __USEWIDE
d0d0ab16
CV
2141 len = mbstowcs (NULL, allargs, 0) + 1;
2142 if (len == (size_t) -1)
2143 error (_("Error starting executable: %d"), errno);
2144 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2145 mbstowcs (cygallargs, allargs, len);
60c5c021
CF
2146#else
2147 cygallargs = allargs;
b3c613f2 2148#endif
dfe7f3ac
CF
2149 }
2150 else
2151 {
349b409f
CF
2152 sh = getenv ("SHELL");
2153 if (!sh)
2154 sh = "/bin/sh";
b3c613f2 2155 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, sh, shell, __PMAX) < 0)
d0d0ab16 2156 error (_("Error starting executable via shell: %d"), errno);
b3c613f2 2157#ifdef __USEWIDE
d0d0ab16
CV
2158 len = sizeof (L" -c 'exec '") + mbstowcs (NULL, exec_file, 0)
2159 + mbstowcs (NULL, allargs, 0) + 2;
2160 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2161 swprintf (cygallargs, len, L" -c 'exec %s %s'", exec_file, allargs);
b3c613f2 2162#else
08850b56
PM
2163 len = (sizeof (" -c 'exec '") + strlen (exec_file)
2164 + strlen (allargs) + 2);
2165 cygallargs = (char *) alloca (len);
2166 xsnprintf (cygallargs, len, " -c 'exec %s %s'", exec_file, allargs);
b3c613f2 2167#endif
dfe7f3ac 2168 toexec = shell;
d0d0ab16 2169 flags |= DEBUG_PROCESS;
dfe7f3ac 2170 }
b3c613f2
CF
2171
2172#ifdef __USEWIDE
2173 args = (cygwin_buf_t *) alloca ((wcslen (toexec) + wcslen (cygallargs) + 2)
2174 * sizeof (wchar_t));
d0d0ab16
CV
2175 wcscpy (args, toexec);
2176 wcscat (args, L" ");
2177 wcscat (args, cygallargs);
b3c613f2
CF
2178#else
2179 args = (cygwin_buf_t *) alloca (strlen (toexec) + strlen (cygallargs) + 2);
2180 strcpy (args, toexec);
2181 strcat (args, " ");
2182 strcat (args, cygallargs);
2183#endif
2184
b7ff339d
CV
2185#ifdef CW_CVT_ENV_TO_WINENV
2186 /* First try to create a direct Win32 copy of the POSIX environment. */
2187 w32_env = (PWCHAR) cygwin_internal (CW_CVT_ENV_TO_WINENV, in_env);
2188 if (w32_env != (PWCHAR) -1)
2189 flags |= CREATE_UNICODE_ENVIRONMENT;
2190 else
2191 /* If that fails, fall back to old method tweaking GDB's environment. */
2192#endif
2193 {
2194 /* Reset all Win32 environment variables to avoid leftover on next run. */
2195 clear_win32_environment (environ);
2196 /* Prepare the environment vars for CreateProcess. */
2197 old_env = environ;
2198 environ = in_env;
2199 cygwin_internal (CW_SYNC_WINENV);
2200 w32_env = NULL;
2201 }
1750a5ef 2202
2becadee
CF
2203 if (!inferior_io_terminal)
2204 tty = ostdin = ostdout = ostderr = -1;
2205 else
2206 {
2207 tty = open (inferior_io_terminal, O_RDWR | O_NOCTTY);
2208 if (tty < 0)
2209 {
2210 print_sys_errmsg (inferior_io_terminal, errno);
2211 ostdin = ostdout = ostderr = -1;
2212 }
2213 else
2214 {
2215 ostdin = dup (0);
2216 ostdout = dup (1);
2217 ostderr = dup (2);
2218 dup2 (tty, 0);
2219 dup2 (tty, 1);
2220 dup2 (tty, 2);
2221 }
2222 }
d0d0ab16
CV
2223
2224 windows_init_thread_list ();
b3c613f2
CF
2225 ret = CreateProcess (0,
2226 args, /* command line */
2227 NULL, /* Security */
2228 NULL, /* thread */
2229 TRUE, /* inherit handles */
2230 flags, /* start flags */
b7ff339d 2231 w32_env, /* environment */
b3c613f2
CF
2232 NULL, /* current directory */
2233 &si,
2234 &pi);
b7ff339d
CV
2235 if (w32_env)
2236 /* Just free the Win32 environment, if it could be created. */
2237 free (w32_env);
2238 else
2239 {
2240 /* Reset all environment variables to avoid leftover on next run. */
2241 clear_win32_environment (in_env);
2242 /* Restore normal GDB environment variables. */
2243 environ = old_env;
2244 cygwin_internal (CW_SYNC_WINENV);
2245 }
2246
d0d0ab16
CV
2247 if (tty >= 0)
2248 {
2249 close (tty);
2250 dup2 (ostdin, 0);
2251 dup2 (ostdout, 1);
2252 dup2 (ostderr, 2);
2253 close (ostdin);
2254 close (ostdout);
2255 close (ostderr);
2256 }
41b4aadc 2257#else
b3c613f2 2258 toexec = exec_file;
8f205f9c
JB
2259 /* Build the command line, a space-separated list of tokens where
2260 the first token is the name of the module to be executed.
2261 To avoid ambiguities introduced by spaces in the module name,
2262 we quote it. */
2263 args_len = strlen (toexec) + 2 /* quotes */ + strlen (allargs) + 2;
2264 args = alloca (args_len);
2265 xsnprintf (args, args_len, "\"%s\" %s", toexec, allargs);
d0d0ab16 2266
d0d0ab16
CV
2267 flags |= DEBUG_ONLY_THIS_PROCESS;
2268
41b4aadc
CF
2269 if (!inferior_io_terminal)
2270 tty = INVALID_HANDLE_VALUE;
2271 else
2272 {
2273 SECURITY_ATTRIBUTES sa;
2274 sa.nLength = sizeof(sa);
2275 sa.lpSecurityDescriptor = 0;
2276 sa.bInheritHandle = TRUE;
2277 tty = CreateFileA (inferior_io_terminal, GENERIC_READ | GENERIC_WRITE,
2278 0, &sa, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
2279 if (tty == INVALID_HANDLE_VALUE)
2280 warning (_("Warning: Failed to open TTY %s, error %#x."),
2281 inferior_io_terminal, (unsigned) GetLastError ());
2282 else
2283 {
2284 si.hStdInput = tty;
2285 si.hStdOutput = tty;
2286 si.hStdError = tty;
2287 si.dwFlags |= STARTF_USESTDHANDLES;
2288 }
2289 }
2becadee 2290
c93dbcba
EZ
2291 /* CreateProcess takes the environment list as a null terminated set of
2292 strings (i.e. two nulls terminate the list). */
2293
2294 /* Get total size for env strings. */
2295 for (envlen = 0, i = 0; in_env[i] && *in_env[i]; i++)
2296 envlen += strlen (in_env[i]) + 1;
2297
2298 envsize = sizeof (in_env[0]) * (i + 1);
2299 env = (char **) alloca (envsize);
2300 memcpy (env, in_env, envsize);
2301 /* Windows programs expect the environment block to be sorted. */
2302 qsort (env, i, sizeof (char *), envvar_cmp);
2303
2304 w32env = alloca (envlen + 1);
2305
2306 /* Copy env strings into new buffer. */
2307 for (temp = w32env, i = 0; env[i] && *env[i]; i++)
2308 {
2309 strcpy (temp, env[i]);
2310 temp += strlen (temp) + 1;
2311 }
2312
2313 /* Final nil string to terminate new env. */
2314 *temp = 0;
2315
dc05df57 2316 windows_init_thread_list ();
d0d0ab16
CV
2317 ret = CreateProcessA (0,
2318 args, /* command line */
2319 NULL, /* Security */
2320 NULL, /* thread */
2321 TRUE, /* inherit handles */
2322 flags, /* start flags */
c93dbcba 2323 w32env, /* environment */
d0d0ab16
CV
2324 NULL, /* current directory */
2325 &si,
2326 &pi);
41b4aadc
CF
2327 if (tty != INVALID_HANDLE_VALUE)
2328 CloseHandle (tty);
10325bc5 2329#endif
2becadee 2330
24e60978 2331 if (!ret)
d50a0ce2 2332 error (_("Error creating process %s, (error %u)."),
8a3fe4f8 2333 exec_file, (unsigned) GetLastError ());
24e60978 2334
c1766e7d
PM
2335 CloseHandle (pi.hThread);
2336 CloseHandle (pi.hProcess);
2337
dfe7f3ac
CF
2338 if (useshell && shell[0] != '\0')
2339 saw_create = -1;
2340 else
2341 saw_create = 0;
2342
dc05df57 2343 do_initial_windows_stuff (ops, pi.dwProcessId, 0);
d3a09475 2344
dc05df57 2345 /* windows_continue (DBG_CONTINUE, -1); */
24e60978
SC
2346}
2347
2348static void
dc05df57 2349windows_mourn_inferior (struct target_ops *ops)
24e60978 2350{
dc05df57 2351 (void) windows_continue (DBG_CONTINUE, -1);
fa4ba8da 2352 i386_cleanup_dregs();
bf25528d
CF
2353 if (open_process_used)
2354 {
2355 CHECK (CloseHandle (current_process_handle));
2356 open_process_used = 0;
2357 }
0795be10 2358 unpush_target (ops);
24e60978
SC
2359 generic_mourn_inferior ();
2360}
2361
24e60978 2362/* Send a SIGINT to the process group. This acts just like the user typed a
581e13c1 2363 ^C on the controlling terminal. */
24e60978 2364
b607efe7 2365static void
1eab8a48 2366windows_stop (struct target_ops *self, ptid_t ptid)
24e60978 2367{
1ef980b9 2368 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
1e37c281 2369 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
3a4b77d8 2370 registers_changed (); /* refresh register state */
24e60978
SC
2371}
2372
44f38867
PA
2373/* Helper for windows_xfer_partial that handles memory transfers.
2374 Arguments are like target_xfer_partial. */
2375
9b409511 2376static enum target_xfer_status
44f38867 2377windows_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
9b409511 2378 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
24e60978 2379{
5732a500 2380 SIZE_T done = 0;
44f38867 2381 BOOL success;
9e52adf9 2382 DWORD lasterror = 0;
44f38867
PA
2383
2384 if (writebuf != NULL)
24e60978 2385 {
a2388568 2386 DEBUG_MEM (("gdb: write target memory, %s bytes at %s\n",
b55e14c7 2387 pulongest (len), core_addr_to_string (memaddr)));
44f38867
PA
2388 success = WriteProcessMemory (current_process_handle,
2389 (LPVOID) (uintptr_t) memaddr, writebuf,
2390 len, &done);
9e52adf9 2391 if (!success)
7126d5c8 2392 lasterror = GetLastError ();
2b008701 2393 FlushInstructionCache (current_process_handle,
2c647436 2394 (LPCVOID) (uintptr_t) memaddr, len);
24e60978
SC
2395 }
2396 else
2397 {
a2388568 2398 DEBUG_MEM (("gdb: read target memory, %s bytes at %s\n",
b55e14c7 2399 pulongest (len), core_addr_to_string (memaddr)));
44f38867
PA
2400 success = ReadProcessMemory (current_process_handle,
2401 (LPCVOID) (uintptr_t) memaddr, readbuf,
2402 len, &done);
9e52adf9 2403 if (!success)
7126d5c8 2404 lasterror = GetLastError ();
24e60978 2405 }
9b409511 2406 *xfered_len = (ULONGEST) done;
9e52adf9 2407 if (!success && lasterror == ERROR_PARTIAL_COPY && done > 0)
9b409511 2408 return TARGET_XFER_OK;
9e52adf9 2409 else
9b409511 2410 return success ? TARGET_XFER_OK : TARGET_XFER_E_IO;
24e60978
SC
2411}
2412
3ee6f623 2413static void
7d85a9c0 2414windows_kill_inferior (struct target_ops *ops)
24e60978 2415{
3cee93ac
CF
2416 CHECK (TerminateProcess (current_process_handle, 0));
2417
b5edcb45
ILT
2418 for (;;)
2419 {
dc05df57 2420 if (!windows_continue (DBG_CONTINUE, -1))
b5edcb45 2421 break;
3cee93ac 2422 if (!WaitForDebugEvent (&current_event, INFINITE))
b5edcb45 2423 break;
3cee93ac 2424 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
b5edcb45
ILT
2425 break;
2426 }
2427
581e13c1 2428 target_mourn_inferior (); /* Or just windows_mourn_inferior? */
24e60978
SC
2429}
2430
24e60978 2431static void
f32dbf8c 2432windows_prepare_to_store (struct target_ops *self, struct regcache *regcache)
24e60978 2433{
581e13c1 2434 /* Do nothing, since we can store individual regs. */
24e60978
SC
2435}
2436
2437static int
da82bd6b 2438windows_can_run (struct target_ops *self)
24e60978
SC
2439{
2440 return 1;
2441}
2442
2443static void
de90e03d 2444windows_close (struct target_ops *self)
24e60978 2445{
dc05df57 2446 DEBUG_EVENTS (("gdb: windows_close, inferior_ptid=%d\n",
dfd4cc63 2447 ptid_get_pid (inferior_ptid)));
24e60978 2448}
1ef980b9 2449
581e13c1 2450/* Convert pid to printable format. */
3ee6f623 2451static char *
117de6a9 2452windows_pid_to_str (struct target_ops *ops, ptid_t ptid)
24e60978 2453{
3ee6f623 2454 static char buf[80];
3ee6f623 2455
2dc38344
PA
2456 if (ptid_get_tid (ptid) != 0)
2457 {
2458 snprintf (buf, sizeof (buf), "Thread %d.0x%lx",
2459 ptid_get_pid (ptid), ptid_get_tid (ptid));
2460 return buf;
2461 }
2462
2463 return normal_pid_to_str (ptid);
3ee6f623
CF
2464}
2465
9b409511 2466static enum target_xfer_status
dc05df57 2467windows_xfer_shared_libraries (struct target_ops *ops,
9b409511
YQ
2468 enum target_object object, const char *annex,
2469 gdb_byte *readbuf, const gdb_byte *writebuf,
2470 ULONGEST offset, ULONGEST len,
2471 ULONGEST *xfered_len)
3cb8e7f6 2472{
de1b3c3d
PA
2473 struct obstack obstack;
2474 const char *buf;
2475 LONGEST len_avail;
3cb8e7f6 2476 struct so_list *so;
3cb8e7f6 2477
de1b3c3d 2478 if (writebuf)
2ed4b548 2479 return TARGET_XFER_E_IO;
3cb8e7f6 2480
de1b3c3d
PA
2481 obstack_init (&obstack);
2482 obstack_grow_str (&obstack, "<library-list>\n");
2483 for (so = solib_start.next; so; so = so->next)
581e13c1
MS
2484 windows_xfer_shared_library (so->so_name, (CORE_ADDR)
2485 (uintptr_t) so->lm_info->load_addr,
f5656ead 2486 target_gdbarch (), &obstack);
de1b3c3d 2487 obstack_grow_str0 (&obstack, "</library-list>\n");
3cb8e7f6 2488
de1b3c3d
PA
2489 buf = obstack_finish (&obstack);
2490 len_avail = strlen (buf);
2491 if (offset >= len_avail)
49dc7f4b
PM
2492 len= 0;
2493 else
2494 {
2495 if (len > len_avail - offset)
2496 len = len_avail - offset;
2497 memcpy (readbuf, buf + offset, len);
2498 }
3cb8e7f6 2499
de1b3c3d 2500 obstack_free (&obstack, NULL);
9b409511
YQ
2501 *xfered_len = (ULONGEST) len;
2502 return TARGET_XFER_OK;
3cb8e7f6
CF
2503}
2504
9b409511 2505static enum target_xfer_status
dc05df57 2506windows_xfer_partial (struct target_ops *ops, enum target_object object,
9b409511
YQ
2507 const char *annex, gdb_byte *readbuf,
2508 const gdb_byte *writebuf, ULONGEST offset, ULONGEST len,
2509 ULONGEST *xfered_len)
3cb8e7f6 2510{
de1b3c3d 2511 switch (object)
3cb8e7f6 2512 {
de1b3c3d 2513 case TARGET_OBJECT_MEMORY:
9b409511 2514 return windows_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
de1b3c3d
PA
2515
2516 case TARGET_OBJECT_LIBRARIES:
dc05df57 2517 return windows_xfer_shared_libraries (ops, object, annex, readbuf,
9b409511 2518 writebuf, offset, len, xfered_len);
3929abe9 2519
de1b3c3d
PA
2520 default:
2521 if (ops->beneath != NULL)
2522 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
9b409511
YQ
2523 readbuf, writebuf, offset, len,
2524 xfered_len);
2ed4b548 2525 return TARGET_XFER_E_IO;
3929abe9 2526 }
02c5aecd
CF
2527}
2528
711e434b
PM
2529/* Provide thread local base, i.e. Thread Information Block address.
2530 Returns 1 if ptid is found and sets *ADDR to thread_local_base. */
2531
2532static int
bd7ae0f5
TT
2533windows_get_tib_address (struct target_ops *self,
2534 ptid_t ptid, CORE_ADDR *addr)
711e434b
PM
2535{
2536 thread_info *th;
2537
2538 th = thread_rec (ptid_get_tid (ptid), 0);
2539 if (th == NULL)
2540 return 0;
2541
2542 if (addr != NULL)
2543 *addr = th->thread_local_base;
2544
2545 return 1;
2546}
2547
1e2f1c5c 2548static ptid_t
1e6b91a4 2549windows_get_ada_task_ptid (struct target_ops *self, long lwp, long thread)
1e2f1c5c
JB
2550{
2551 return ptid_build (ptid_get_pid (inferior_ptid), 0, lwp);
2552}
2553
3ee6f623 2554static void
dc05df57 2555init_windows_ops (void)
3ee6f623 2556{
dc05df57
CF
2557 windows_ops.to_shortname = "child";
2558 windows_ops.to_longname = "Win32 child process";
2559 windows_ops.to_doc = "Win32 child process (started by the \"run\" command).";
2560 windows_ops.to_open = windows_open;
2561 windows_ops.to_close = windows_close;
2562 windows_ops.to_attach = windows_attach;
2563 windows_ops.to_attach_no_wait = 1;
2564 windows_ops.to_detach = windows_detach;
2565 windows_ops.to_resume = windows_resume;
2566 windows_ops.to_wait = windows_wait;
2567 windows_ops.to_fetch_registers = windows_fetch_inferior_registers;
2568 windows_ops.to_store_registers = windows_store_inferior_registers;
2569 windows_ops.to_prepare_to_store = windows_prepare_to_store;
dc05df57
CF
2570 windows_ops.to_xfer_partial = windows_xfer_partial;
2571 windows_ops.to_files_info = windows_files_info;
2572 windows_ops.to_insert_breakpoint = memory_insert_breakpoint;
2573 windows_ops.to_remove_breakpoint = memory_remove_breakpoint;
2574 windows_ops.to_terminal_init = terminal_init_inferior;
2575 windows_ops.to_terminal_inferior = terminal_inferior;
2576 windows_ops.to_terminal_ours_for_output = terminal_ours_for_output;
2577 windows_ops.to_terminal_ours = terminal_ours;
2578 windows_ops.to_terminal_save_ours = terminal_save_ours;
2579 windows_ops.to_terminal_info = child_terminal_info;
2580 windows_ops.to_kill = windows_kill_inferior;
2581 windows_ops.to_create_inferior = windows_create_inferior;
2582 windows_ops.to_mourn_inferior = windows_mourn_inferior;
2583 windows_ops.to_can_run = windows_can_run;
2584 windows_ops.to_thread_alive = windows_thread_alive;
2585 windows_ops.to_pid_to_str = windows_pid_to_str;
2586 windows_ops.to_stop = windows_stop;
2587 windows_ops.to_stratum = process_stratum;
c35b1492
PA
2588 windows_ops.to_has_all_memory = default_child_has_all_memory;
2589 windows_ops.to_has_memory = default_child_has_memory;
2590 windows_ops.to_has_stack = default_child_has_stack;
2591 windows_ops.to_has_registers = default_child_has_registers;
2592 windows_ops.to_has_execution = default_child_has_execution;
dc05df57 2593 windows_ops.to_pid_to_exec_file = windows_pid_to_exec_file;
1e2f1c5c 2594 windows_ops.to_get_ada_task_ptid = windows_get_ada_task_ptid;
711e434b 2595 windows_ops.to_get_tib_address = windows_get_tib_address;
9bb9e8ad 2596
5aca5a82
PM
2597 i386_use_watchpoints (&windows_ops);
2598
9bb9e8ad
PM
2599 i386_dr_low.set_control = cygwin_set_dr7;
2600 i386_dr_low.set_addr = cygwin_set_dr;
7b50312a 2601 i386_dr_low.get_addr = cygwin_get_dr;
9bb9e8ad 2602 i386_dr_low.get_status = cygwin_get_dr6;
7b50312a 2603 i386_dr_low.get_control = cygwin_get_dr7;
9bb9e8ad
PM
2604
2605 /* i386_dr_low.debug_register_length field is set by
2606 calling i386_set_debug_register_length function
2607 in processor windows specific native file. */
2608
dc05df57 2609 windows_ops.to_magic = OPS_MAGIC;
c719b714 2610}
24e60978 2611
3929abe9 2612static void
dc05df57 2613set_windows_aliases (char *argv0)
3929abe9
CF
2614{
2615 add_info_alias ("dll", "sharedlibrary", 1);
2616}
2617
d603d4b3
JK
2618/* -Wmissing-prototypes */
2619extern initialize_file_ftype _initialize_windows_nat;
2620
24e60978 2621void
dc05df57 2622_initialize_windows_nat (void)
24e60978 2623{
fa58ee11
EZ
2624 struct cmd_list_element *c;
2625
dc05df57 2626 init_windows_ops ();
1ef980b9 2627
d0d0ab16
CV
2628#ifdef __CYGWIN__
2629 cygwin_internal (CW_SET_DOS_FILE_WARNING, 0);
2630#endif
2631
fa58ee11 2632 c = add_com ("dll-symbols", class_files, dll_symbol_command,
1bedd215 2633 _("Load dll library symbols from FILE."));
5ba2abeb 2634 set_cmd_completer (c, filename_completer);
95060284 2635 deprecate_cmd (c, "sharedlibrary");
450005e7 2636
95060284
JB
2637 c = add_com ("add-shared-symbol-files", class_files, dll_symbol_command,
2638 _("Load dll library symbols from FILE."));
2639 set_cmd_completer (c, filename_completer);
2640 deprecate_cmd (c, "sharedlibrary");
70992597 2641
95060284
JB
2642 c = add_com ("assf", class_files, dll_symbol_command,
2643 _("Load dll library symbols from FILE."));
2644 set_cmd_completer (c, filename_completer);
2645 deprecate_cmd (c, "sharedlibrary");
70992597 2646
10325bc5 2647#ifdef __CYGWIN__
5bf193a2
AC
2648 add_setshow_boolean_cmd ("shell", class_support, &useshell, _("\
2649Set use of shell to start subprocess."), _("\
2650Show use of shell to start subprocess."), NULL,
2651 NULL,
2652 NULL, /* FIXME: i18n: */
2653 &setlist, &showlist);
2654
581e13c1
MS
2655 add_setshow_boolean_cmd ("cygwin-exceptions", class_support,
2656 &cygwin_exceptions, _("\
09280ddf
CF
2657Break when an exception is detected in the Cygwin DLL itself."), _("\
2658Show whether gdb breaks on exceptions in the Cygwin DLL itself."), NULL,
2659 NULL,
2660 NULL, /* FIXME: i18n: */
2661 &setlist, &showlist);
10325bc5 2662#endif
09280ddf 2663
5bf193a2
AC
2664 add_setshow_boolean_cmd ("new-console", class_support, &new_console, _("\
2665Set creation of new console when creating child process."), _("\
2666Show creation of new console when creating child process."), NULL,
2667 NULL,
2668 NULL, /* FIXME: i18n: */
2669 &setlist, &showlist);
2670
2671 add_setshow_boolean_cmd ("new-group", class_support, &new_group, _("\
2672Set creation of new group when creating child process."), _("\
2673Show creation of new group when creating child process."), NULL,
2674 NULL,
2675 NULL, /* FIXME: i18n: */
2676 &setlist, &showlist);
2677
2678 add_setshow_boolean_cmd ("debugexec", class_support, &debug_exec, _("\
2679Set whether to display execution in child process."), _("\
2680Show whether to display execution in child process."), NULL,
2681 NULL,
2682 NULL, /* FIXME: i18n: */
2683 &setlist, &showlist);
2684
2685 add_setshow_boolean_cmd ("debugevents", class_support, &debug_events, _("\
2686Set whether to display kernel events in child process."), _("\
2687Show whether to display kernel events in child process."), NULL,
2688 NULL,
2689 NULL, /* FIXME: i18n: */
2690 &setlist, &showlist);
2691
2692 add_setshow_boolean_cmd ("debugmemory", class_support, &debug_memory, _("\
2693Set whether to display memory accesses in child process."), _("\
2694Show whether to display memory accesses in child process."), NULL,
2695 NULL,
2696 NULL, /* FIXME: i18n: */
2697 &setlist, &showlist);
2698
2699 add_setshow_boolean_cmd ("debugexceptions", class_support,
2700 &debug_exceptions, _("\
2701Set whether to display kernel exceptions in child process."), _("\
2702Show whether to display kernel exceptions in child process."), NULL,
2703 NULL,
2704 NULL, /* FIXME: i18n: */
2705 &setlist, &showlist);
1ef980b9 2706
711e434b 2707 init_w32_command_list ();
c1748f97
PM
2708
2709 add_cmd ("selector", class_info, display_selectors,
1a966eab 2710 _("Display selectors infos."),
c1748f97 2711 &info_w32_cmdlist);
dc05df57
CF
2712 add_target (&windows_ops);
2713 deprecated_init_ui_hook = set_windows_aliases;
24e60978 2714}
3cee93ac 2715
fa4ba8da
PM
2716/* Hardware watchpoint support, adapted from go32-nat.c code. */
2717
2718/* Pass the address ADDR to the inferior in the I'th debug register.
2719 Here we just store the address in dr array, the registers will be
dc05df57 2720 actually set up when windows_continue is called. */
9bb9e8ad 2721static void
fa4ba8da
PM
2722cygwin_set_dr (int i, CORE_ADDR addr)
2723{
2724 if (i < 0 || i > 3)
2725 internal_error (__FILE__, __LINE__,
e2e0b3e5 2726 _("Invalid register %d in cygwin_set_dr.\n"), i);
41b4aadc 2727 dr[i] = addr;
fa4ba8da
PM
2728 debug_registers_changed = 1;
2729 debug_registers_used = 1;
2730}
2731
2732/* Pass the value VAL to the inferior in the DR7 debug control
2733 register. Here we just store the address in D_REGS, the watchpoint
dc05df57 2734 will be actually set up in windows_wait. */
9bb9e8ad
PM
2735static void
2736cygwin_set_dr7 (unsigned long val)
fa4ba8da 2737{
9bb9e8ad 2738 dr[7] = (CORE_ADDR) val;
fa4ba8da
PM
2739 debug_registers_changed = 1;
2740 debug_registers_used = 1;
2741}
2742
7b50312a
PA
2743/* Get the value of debug register I from the inferior. */
2744
2745static CORE_ADDR
2746cygwin_get_dr (int i)
2747{
2748 return dr[i];
2749}
2750
fa4ba8da
PM
2751/* Get the value of the DR6 debug status register from the inferior.
2752 Here we just return the value stored in dr[6]
2753 by the last call to thread_rec for current_event.dwThreadId id. */
9bb9e8ad 2754static unsigned long
fa4ba8da
PM
2755cygwin_get_dr6 (void)
2756{
9bb9e8ad 2757 return (unsigned long) dr[6];
fa4ba8da
PM
2758}
2759
7b50312a
PA
2760/* Get the value of the DR7 debug status register from the inferior.
2761 Here we just return the value stored in dr[7] by the last call to
2762 thread_rec for current_event.dwThreadId id. */
2763
2764static unsigned long
2765cygwin_get_dr7 (void)
2766{
2767 return (unsigned long) dr[7];
2768}
2769
2dc38344 2770/* Determine if the thread referenced by "ptid" is alive
3cee93ac 2771 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
581e13c1 2772 it means that the thread has died. Otherwise it is assumed to be alive. */
3cee93ac 2773static int
28439f5e 2774windows_thread_alive (struct target_ops *ops, ptid_t ptid)
3cee93ac 2775{
2dc38344
PA
2776 int tid;
2777
2778 gdb_assert (ptid_get_tid (ptid) != 0);
2779 tid = ptid_get_tid (ptid);
39f77062 2780
581e13c1
MS
2781 return WaitForSingleObject (thread_rec (tid, FALSE)->h, 0) == WAIT_OBJECT_0
2782 ? FALSE : TRUE;
3cee93ac
CF
2783}
2784
d603d4b3
JK
2785/* -Wmissing-prototypes */
2786extern initialize_file_ftype _initialize_check_for_gdb_ini;
2787
2a3d5645
CF
2788void
2789_initialize_check_for_gdb_ini (void)
2790{
2791 char *homedir;
2792 if (inhibit_gdbinit)
2793 return;
2794
2795 homedir = getenv ("HOME");
2796 if (homedir)
2797 {
2798 char *p;
2799 char *oldini = (char *) alloca (strlen (homedir) +
2800 sizeof ("/gdb.ini"));
2801 strcpy (oldini, homedir);
2802 p = strchr (oldini, '\0');
0ba1096a 2803 if (p > oldini && !IS_DIR_SEPARATOR (p[-1]))
2a3d5645
CF
2804 *p++ = '/';
2805 strcpy (p, "gdb.ini");
2806 if (access (oldini, 0) == 0)
2807 {
2808 int len = strlen (oldini);
2809 char *newini = alloca (len + 1);
08850b56
PM
2810
2811 xsnprintf (newini, len + 1, "%.*s.gdbinit",
2812 (int) (len - (sizeof ("gdb.ini") - 1)), oldini);
8a3fe4f8 2813 warning (_("obsolete '%s' found. Rename to '%s'."), oldini, newini);
2a3d5645
CF
2814 }
2815 }
2816}
33605d39 2817
2b008701 2818/* Define dummy functions which always return error for the rare cases where
581e13c1 2819 these functions could not be found. */
2b008701
CF
2820static BOOL WINAPI
2821bad_DebugActiveProcessStop (DWORD w)
2822{
2823 return FALSE;
2824}
2825static BOOL WINAPI
2826bad_DebugBreakProcess (HANDLE w)
2827{
2828 return FALSE;
2829}
2830static BOOL WINAPI
2831bad_DebugSetProcessKillOnExit (BOOL w)
2832{
2833 return FALSE;
2834}
2835static BOOL WINAPI
2836bad_EnumProcessModules (HANDLE w, HMODULE *x, DWORD y, LPDWORD z)
2837{
2838 return FALSE;
2839}
b3c613f2
CF
2840
2841#ifdef __USEWIDE
2b008701 2842static DWORD WINAPI
b3c613f2 2843bad_GetModuleFileNameExW (HANDLE w, HMODULE x, LPWSTR y, DWORD z)
2b008701
CF
2844{
2845 return 0;
2846}
d0d0ab16
CV
2847#else
2848static DWORD WINAPI
b3c613f2 2849bad_GetModuleFileNameExA (HANDLE w, HMODULE x, LPSTR y, DWORD z)
d0d0ab16
CV
2850{
2851 return 0;
2852}
2853#endif
b3c613f2 2854
2b008701
CF
2855static BOOL WINAPI
2856bad_GetModuleInformation (HANDLE w, HMODULE x, LPMODULEINFO y, DWORD z)
2857{
2858 return FALSE;
2859}
2860
418c6cb3
CF
2861static BOOL WINAPI
2862bad_OpenProcessToken (HANDLE w, DWORD x, PHANDLE y)
2863{
2864 return FALSE;
2865}
2866
cd44747c
PM
2867static BOOL WINAPI
2868bad_GetCurrentConsoleFont (HANDLE w, BOOL bMaxWindow, CONSOLE_FONT_INFO *f)
2869{
2870 f->nFont = 0;
2871 return 1;
2872}
2873static COORD WINAPI
2874bad_GetConsoleFontSize (HANDLE w, DWORD nFont)
2875{
2876 COORD size;
2877 size.X = 8;
2878 size.Y = 12;
2879 return size;
2880}
2881
d603d4b3
JK
2882/* -Wmissing-prototypes */
2883extern initialize_file_ftype _initialize_loadable;
2884
2b008701 2885/* Load any functions which may not be available in ancient versions
581e13c1 2886 of Windows. */
d603d4b3 2887
33605d39 2888void
2b008701 2889_initialize_loadable (void)
33605d39 2890{
2b008701
CF
2891 HMODULE hm = NULL;
2892
2893 hm = LoadLibrary ("kernel32.dll");
2894 if (hm)
33605d39 2895 {
b3c613f2 2896 DebugActiveProcessStop = (void *)
2b008701 2897 GetProcAddress (hm, "DebugActiveProcessStop");
b3c613f2 2898 DebugBreakProcess = (void *)
2b008701 2899 GetProcAddress (hm, "DebugBreakProcess");
b3c613f2 2900 DebugSetProcessKillOnExit = (void *)
2b008701 2901 GetProcAddress (hm, "DebugSetProcessKillOnExit");
cd44747c
PM
2902 GetConsoleFontSize = (void *)
2903 GetProcAddress (hm, "GetConsoleFontSize");
2904 GetCurrentConsoleFont = (void *)
2905 GetProcAddress (hm, "GetCurrentConsoleFont");
2b008701 2906 }
33605d39 2907
2b008701 2908 /* Set variables to dummy versions of these processes if the function
581e13c1 2909 wasn't found in kernel32.dll. */
b3c613f2
CF
2910 if (!DebugBreakProcess)
2911 DebugBreakProcess = bad_DebugBreakProcess;
2912 if (!DebugActiveProcessStop || !DebugSetProcessKillOnExit)
2b008701 2913 {
b3c613f2
CF
2914 DebugActiveProcessStop = bad_DebugActiveProcessStop;
2915 DebugSetProcessKillOnExit = bad_DebugSetProcessKillOnExit;
2b008701 2916 }
cd44747c
PM
2917 if (!GetConsoleFontSize)
2918 GetConsoleFontSize = bad_GetConsoleFontSize;
2919 if (!GetCurrentConsoleFont)
2920 GetCurrentConsoleFont = bad_GetCurrentConsoleFont;
33605d39 2921
2b008701 2922 /* Load optional functions used for retrieving filename information
581e13c1 2923 associated with the currently debugged process or its dlls. */
2b008701
CF
2924 hm = LoadLibrary ("psapi.dll");
2925 if (hm)
2926 {
b3c613f2 2927 EnumProcessModules = (void *)
2b008701 2928 GetProcAddress (hm, "EnumProcessModules");
b3c613f2 2929 GetModuleInformation = (void *)
2b008701 2930 GetProcAddress (hm, "GetModuleInformation");
b3c613f2
CF
2931 GetModuleFileNameEx = (void *)
2932 GetProcAddress (hm, GetModuleFileNameEx_name);
33605d39
CF
2933 }
2934
b3c613f2 2935 if (!EnumProcessModules || !GetModuleInformation || !GetModuleFileNameEx)
2b008701
CF
2936 {
2937 /* Set variables to dummy versions of these processes if the function
581e13c1 2938 wasn't found in psapi.dll. */
b3c613f2
CF
2939 EnumProcessModules = bad_EnumProcessModules;
2940 GetModuleInformation = bad_GetModuleInformation;
2941 GetModuleFileNameEx = bad_GetModuleFileNameEx;
581e13c1
MS
2942 /* This will probably fail on Windows 9x/Me. Let the user know
2943 that we're missing some functionality. */
2944 warning(_("\
2945cannot automatically find executable file or library to read symbols.\n\
2946Use \"file\" or \"dll\" command to load executable/libraries directly."));
418c6cb3
CF
2947 }
2948
2949 hm = LoadLibrary ("advapi32.dll");
2950 if (hm)
2951 {
b3c613f2
CF
2952 OpenProcessToken = (void *) GetProcAddress (hm, "OpenProcessToken");
2953 LookupPrivilegeValueA = (void *)
418c6cb3 2954 GetProcAddress (hm, "LookupPrivilegeValueA");
b3c613f2 2955 AdjustTokenPrivileges = (void *)
418c6cb3
CF
2956 GetProcAddress (hm, "AdjustTokenPrivileges");
2957 /* Only need to set one of these since if OpenProcessToken fails nothing
581e13c1
MS
2958 else is needed. */
2959 if (!OpenProcessToken || !LookupPrivilegeValueA
2960 || !AdjustTokenPrivileges)
b3c613f2 2961 OpenProcessToken = bad_OpenProcessToken;
2b008701 2962 }
33605d39 2963}
This page took 2.129742 seconds and 4 git commands to generate.