2012-02-02 Pedro Alves <palves@redhat.com>
[deliverable/binutils-gdb.git] / gdb / windows-nat.c
CommitLineData
dc05df57 1/* Target-vector operations for controlling windows child processes, for GDB.
0a65a603 2
c5a57081 3 Copyright (C) 1995-2012 Free Software Foundation, Inc.
0a65a603 4
e6433c28 5 Contributed by Cygnus Solutions, A Red Hat Company.
e88c49c3 6
24e60978
SC
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
24e60978
SC
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
a9762ec7 15 but WITHOUT ANY WARRANTY; without even the implied warranty of
24e60978
SC
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
24e60978 21
dfe7f3ac 22/* Originally by Steve Chamberlain, sac@cygnus.com */
24e60978
SC
23
24#include "defs.h"
25#include "frame.h" /* required by inferior.h */
26#include "inferior.h"
27#include "target.h"
60250e8b 28#include "exceptions.h"
24e60978
SC
29#include "gdbcore.h"
30#include "command.h"
fa58ee11 31#include "completer.h"
4e052eda 32#include "regcache.h"
2a3d5645 33#include "top.h"
403d9909
CF
34#include <signal.h>
35#include <sys/types.h>
36#include <fcntl.h>
37#include <stdlib.h>
38#include <windows.h>
39#include <imagehlp.h>
2b008701 40#include <psapi.h>
10325bc5 41#ifdef __CYGWIN__
b7ff339d 42#include <wchar.h>
403d9909 43#include <sys/cygwin.h>
b7ff339d 44#include <cygwin/version.h>
10325bc5 45#endif
a244bdca 46#include <signal.h>
cad9cd60 47
24e60978 48#include "buildsym.h"
0ba1096a 49#include "filenames.h"
1ef980b9
SC
50#include "symfile.h"
51#include "objfiles.h"
de1b3c3d 52#include "gdb_obstack.h"
24e60978 53#include "gdb_string.h"
fdfa3315 54#include "gdbthread.h"
24e60978 55#include "gdbcmd.h"
1750a5ef 56#include <sys/param.h>
1e37c281 57#include <unistd.h>
4646aa9d 58#include "exec.h"
3ee6f623 59#include "solist.h"
3cb8e7f6 60#include "solib.h"
de1b3c3d 61#include "xml-support.h"
24e60978 62
6c7de422
MK
63#include "i386-tdep.h"
64#include "i387-tdep.h"
65
31b060a2
CF
66#include "windows-tdep.h"
67#include "windows-nat.h"
9bb9e8ad 68#include "i386-nat.h"
ecc13e53 69#include "complaints.h"
de1b3c3d 70
418c6cb3 71#define AdjustTokenPrivileges dyn_AdjustTokenPrivileges
2b008701
CF
72#define DebugActiveProcessStop dyn_DebugActiveProcessStop
73#define DebugBreakProcess dyn_DebugBreakProcess
74#define DebugSetProcessKillOnExit dyn_DebugSetProcessKillOnExit
75#define EnumProcessModules dyn_EnumProcessModules
2b008701 76#define GetModuleInformation dyn_GetModuleInformation
418c6cb3
CF
77#define LookupPrivilegeValueA dyn_LookupPrivilegeValueA
78#define OpenProcessToken dyn_OpenProcessToken
cd44747c
PM
79#define GetConsoleFontSize dyn_GetConsoleFontSize
80#define GetCurrentConsoleFont dyn_GetCurrentConsoleFont
2b008701 81
418c6cb3
CF
82static BOOL WINAPI (*AdjustTokenPrivileges)(HANDLE, BOOL, PTOKEN_PRIVILEGES,
83 DWORD, PTOKEN_PRIVILEGES, PDWORD);
2b008701
CF
84static BOOL WINAPI (*DebugActiveProcessStop) (DWORD);
85static BOOL WINAPI (*DebugBreakProcess) (HANDLE);
86static BOOL WINAPI (*DebugSetProcessKillOnExit) (BOOL);
87static BOOL WINAPI (*EnumProcessModules) (HANDLE, HMODULE *, DWORD,
88 LPDWORD);
2b008701
CF
89static BOOL WINAPI (*GetModuleInformation) (HANDLE, HMODULE, LPMODULEINFO,
90 DWORD);
418c6cb3
CF
91static BOOL WINAPI (*LookupPrivilegeValueA)(LPCSTR, LPCSTR, PLUID);
92static BOOL WINAPI (*OpenProcessToken)(HANDLE, DWORD, PHANDLE);
581e13c1
MS
93static BOOL WINAPI (*GetCurrentConsoleFont) (HANDLE, BOOL,
94 CONSOLE_FONT_INFO *);
cd44747c 95static COORD WINAPI (*GetConsoleFontSize) (HANDLE, DWORD);
2b008701 96
dc05df57 97static struct target_ops windows_ops;
3ee6f623 98
b3c613f2
CF
99#undef STARTUPINFO
100#undef CreateProcess
101#undef GetModuleFileNameEx
102
103#ifndef __CYGWIN__
104# define __PMAX (MAX_PATH + 1)
105 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPSTR, DWORD);
106# define STARTUPINFO STARTUPINFOA
107# define CreateProcess CreateProcessA
108# define GetModuleFileNameEx_name "GetModuleFileNameExA"
109# define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
110#else
111# define __PMAX PATH_MAX
581e13c1 112/* The starting and ending address of the cygwin1.dll text segment. */
b3c613f2
CF
113 static CORE_ADDR cygwin_load_start;
114 static CORE_ADDR cygwin_load_end;
b3c613f2
CF
115# define __USEWIDE
116 typedef wchar_t cygwin_buf_t;
581e13c1
MS
117 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE,
118 LPWSTR, DWORD);
b3c613f2
CF
119# define STARTUPINFO STARTUPINFOW
120# define CreateProcess CreateProcessW
121# define GetModuleFileNameEx_name "GetModuleFileNameExW"
122# define bad_GetModuleFileNameEx bad_GetModuleFileNameExW
10325bc5 123#endif
a244bdca 124
581e13c1
MS
125static int have_saved_context; /* True if we've saved context from a
126 cygwin signal. */
127static CONTEXT saved_context; /* Containes the saved context from a
128 cygwin signal. */
a244bdca 129
0714f9bf
SS
130/* If we're not using the old Cygwin header file set, define the
131 following which never should have been in the generic Win32 API
581e13c1 132 headers in the first place since they were our own invention... */
0714f9bf 133#ifndef _GNU_H_WINDOWS_H
9d3789f7 134enum
8e860359
CF
135 {
136 FLAG_TRACE_BIT = 0x100,
137 CONTEXT_DEBUGGER = (CONTEXT_FULL | CONTEXT_FLOATING_POINT)
138 };
0714f9bf
SS
139#endif
140
5851ab76
JB
141#ifndef CONTEXT_EXTENDED_REGISTERS
142/* This macro is only defined on ia32. It only makes sense on this target,
143 so define it as zero if not already defined. */
144#define CONTEXT_EXTENDED_REGISTERS 0
145#endif
146
fa4ba8da
PM
147#define CONTEXT_DEBUGGER_DR CONTEXT_DEBUGGER | CONTEXT_DEBUG_REGISTERS \
148 | CONTEXT_EXTENDED_REGISTERS
97da3b20 149
41b4aadc 150static uintptr_t dr[8];
87a45c96
CF
151static int debug_registers_changed;
152static int debug_registers_used;
16d905e2
CF
153
154static int windows_initialization_done;
6537bb24 155#define DR6_CLEAR_VALUE 0xffff0ff0
97da3b20 156
3cee93ac 157/* The string sent by cygwin when it processes a signal.
581e13c1 158 FIXME: This should be in a cygwin include file. */
3929abe9
CF
159#ifndef _CYGWIN_SIGNAL_STRING
160#define _CYGWIN_SIGNAL_STRING "cYgSiGw00f"
161#endif
3cee93ac 162
29fe111d 163#define CHECK(x) check (x, __FILE__,__LINE__)
dfe7f3ac 164#define DEBUG_EXEC(x) if (debug_exec) printf_unfiltered x
4e52d31c
PM
165#define DEBUG_EVENTS(x) if (debug_events) printf_unfiltered x
166#define DEBUG_MEM(x) if (debug_memory) printf_unfiltered x
167#define DEBUG_EXCEPT(x) if (debug_exceptions) printf_unfiltered x
24e60978 168
dc05df57 169static void windows_stop (ptid_t);
02529b48 170static int windows_thread_alive (struct target_ops *, ptid_t);
7d85a9c0 171static void windows_kill_inferior (struct target_ops *);
3cee93ac 172
9bb9e8ad
PM
173static void cygwin_set_dr (int i, CORE_ADDR addr);
174static void cygwin_set_dr7 (unsigned long val);
a961bc18 175static CORE_ADDR cygwin_get_dr (int i);
9bb9e8ad 176static unsigned long cygwin_get_dr6 (void);
a961bc18 177static unsigned long cygwin_get_dr7 (void);
9bb9e8ad 178
7393af7c 179static enum target_signal last_sig = TARGET_SIGNAL_0;
581e13c1 180/* Set if a signal was received from the debugged process. */
7393af7c 181
3cee93ac 182/* Thread information structure used to track information that is
6537bb24 183 not available in gdb's thread structure. */
3cee93ac 184typedef struct thread_info_struct
3a4b77d8
JM
185 {
186 struct thread_info_struct *next;
187 DWORD id;
188 HANDLE h;
711e434b 189 CORE_ADDR thread_local_base;
3a4b77d8 190 char *name;
6537bb24 191 int suspended;
3ade5333 192 int reload_context;
3a4b77d8 193 CONTEXT context;
1e37c281 194 STACKFRAME sf;
8e860359
CF
195 }
196thread_info;
1e37c281 197
29fe111d 198static thread_info thread_head;
24e60978 199
581e13c1 200/* The process and thread handles for the above context. */
24e60978 201
3cee93ac
CF
202static DEBUG_EVENT current_event; /* The current debug event from
203 WaitForDebugEvent */
204static HANDLE current_process_handle; /* Currently executing process */
205static thread_info *current_thread; /* Info on currently selected thread */
349b409f 206static DWORD main_thread_id; /* Thread ID of the main thread */
24e60978 207
581e13c1 208/* Counts of things. */
24e60978
SC
209static int exception_count = 0;
210static int event_count = 0;
dfe7f3ac 211static int saw_create;
bf25528d 212static int open_process_used = 0;
24e60978 213
581e13c1 214/* User options. */
24e60978 215static int new_console = 0;
10325bc5 216#ifdef __CYGWIN__
09280ddf 217static int cygwin_exceptions = 0;
10325bc5 218#endif
1e37c281 219static int new_group = 1;
dfe7f3ac
CF
220static int debug_exec = 0; /* show execution */
221static int debug_events = 0; /* show events from kernel */
222static int debug_memory = 0; /* show target memory accesses */
1ef980b9 223static int debug_exceptions = 0; /* show target exceptions */
dfe7f3ac
CF
224static int useshell = 0; /* use shell for subprocesses */
225
7e63b4e4 226/* This vector maps GDB's idea of a register's number into an offset
dc05df57 227 in the windows exception context vector.
24e60978 228
3cee93ac 229 It also contains the bit mask needed to load the register in question.
24e60978 230
7e63b4e4
JB
231 The contents of this table can only be computed by the units
232 that provide CPU-specific support for Windows native debugging.
233 These units should set the table by calling
dc05df57 234 windows_set_context_register_offsets.
7e63b4e4 235
24e60978
SC
236 One day we could read a reg, we could inspect the context we
237 already have loaded, if it doesn't have the bit set that we need,
238 we read that set of registers in using GetThreadContext. If the
581e13c1 239 context already contains what we need, we just unpack it. Then to
24e60978
SC
240 write a register, first we have to ensure that the context contains
241 the other regs of the group, and then we copy the info in and set
581e13c1 242 out bit. */
24e60978 243
7e63b4e4 244static const int *mappings;
d3a09475 245
24e60978 246/* This vector maps the target's idea of an exception (extracted
581e13c1 247 from the DEBUG_EVENT structure) to GDB's idea. */
24e60978
SC
248
249struct xlate_exception
250 {
251 int them;
252 enum target_signal us;
253 };
254
24e60978
SC
255static const struct xlate_exception
256 xlate[] =
257{
258 {EXCEPTION_ACCESS_VIOLATION, TARGET_SIGNAL_SEGV},
9cbf6c0e 259 {STATUS_STACK_OVERFLOW, TARGET_SIGNAL_SEGV},
24e60978
SC
260 {EXCEPTION_BREAKPOINT, TARGET_SIGNAL_TRAP},
261 {DBG_CONTROL_C, TARGET_SIGNAL_INT},
262 {EXCEPTION_SINGLE_STEP, TARGET_SIGNAL_TRAP},
7393af7c 263 {STATUS_FLOAT_DIVIDE_BY_ZERO, TARGET_SIGNAL_FPE},
24e60978
SC
264 {-1, -1}};
265
7e63b4e4
JB
266/* Set the MAPPINGS static global to OFFSETS.
267 See the description of MAPPINGS for more details. */
268
269void
dc05df57 270windows_set_context_register_offsets (const int *offsets)
7e63b4e4
JB
271{
272 mappings = offsets;
273}
274
fa4ba8da
PM
275static void
276check (BOOL ok, const char *file, int line)
277{
278 if (!ok)
dfe7f3ac 279 printf_filtered ("error return %s:%d was %lu\n", file, line,
fa4ba8da
PM
280 GetLastError ());
281}
282
6537bb24
PA
283/* Find a thread record given a thread id. If GET_CONTEXT is not 0,
284 then also retrieve the context for this thread. If GET_CONTEXT is
285 negative, then don't suspend the thread. */
3cee93ac
CF
286static thread_info *
287thread_rec (DWORD id, int get_context)
24e60978 288{
3cee93ac
CF
289 thread_info *th;
290
3a4b77d8 291 for (th = &thread_head; (th = th->next) != NULL;)
3cee93ac
CF
292 if (th->id == id)
293 {
6537bb24 294 if (!th->suspended && get_context)
3cee93ac 295 {
8a892701 296 if (get_context > 0 && id != current_event.dwThreadId)
6537bb24
PA
297 {
298 if (SuspendThread (th->h) == (DWORD) -1)
299 {
300 DWORD err = GetLastError ();
301 warning (_("SuspendThread failed. (winerr %d)"),
302 (int) err);
303 return NULL;
304 }
305 th->suspended = 1;
306 }
3cee93ac 307 else if (get_context < 0)
6537bb24 308 th->suspended = -1;
3ade5333 309 th->reload_context = 1;
3cee93ac
CF
310 }
311 return th;
312 }
313
314 return NULL;
315}
316
2dc38344 317/* Add a thread to the thread list. */
3cee93ac 318static thread_info *
711e434b 319windows_add_thread (ptid_t ptid, HANDLE h, void *tlb)
3cee93ac
CF
320{
321 thread_info *th;
2dc38344
PA
322 DWORD id;
323
324 gdb_assert (ptid_get_tid (ptid) != 0);
325
326 id = ptid_get_tid (ptid);
3cee93ac
CF
327
328 if ((th = thread_rec (id, FALSE)))
329 return th;
330
3929abe9 331 th = XZALLOC (thread_info);
3cee93ac
CF
332 th->id = id;
333 th->h = h;
711e434b 334 th->thread_local_base = (CORE_ADDR) (uintptr_t) tlb;
3cee93ac
CF
335 th->next = thread_head.next;
336 thread_head.next = th;
2dc38344
PA
337 add_thread (ptid);
338 /* Set the debug registers for the new thread if they are used. */
fa4ba8da
PM
339 if (debug_registers_used)
340 {
341 /* Only change the value of the debug registers. */
342 th->context.ContextFlags = CONTEXT_DEBUG_REGISTERS;
343 CHECK (GetThreadContext (th->h, &th->context));
344 th->context.Dr0 = dr[0];
345 th->context.Dr1 = dr[1];
346 th->context.Dr2 = dr[2];
347 th->context.Dr3 = dr[3];
6537bb24 348 th->context.Dr6 = DR6_CLEAR_VALUE;
fa4ba8da
PM
349 th->context.Dr7 = dr[7];
350 CHECK (SetThreadContext (th->h, &th->context));
351 th->context.ContextFlags = 0;
352 }
3cee93ac 353 return th;
24e60978
SC
354}
355
3cee93ac 356/* Clear out any old thread list and reintialize it to a
581e13c1 357 pristine state. */
24e60978 358static void
dc05df57 359windows_init_thread_list (void)
24e60978 360{
3cee93ac
CF
361 thread_info *th = &thread_head;
362
dc05df57 363 DEBUG_EVENTS (("gdb: windows_init_thread_list\n"));
3cee93ac
CF
364 init_thread_list ();
365 while (th->next != NULL)
24e60978 366 {
3cee93ac
CF
367 thread_info *here = th->next;
368 th->next = here->next;
b8c9b27d 369 xfree (here);
24e60978 370 }
059198c1 371 thread_head.next = NULL;
3cee93ac
CF
372}
373
581e13c1 374/* Delete a thread from the list of threads. */
3cee93ac 375static void
dc05df57 376windows_delete_thread (ptid_t ptid)
3cee93ac
CF
377{
378 thread_info *th;
2dc38344
PA
379 DWORD id;
380
381 gdb_assert (ptid_get_tid (ptid) != 0);
382
383 id = ptid_get_tid (ptid);
3cee93ac
CF
384
385 if (info_verbose)
2dc38344
PA
386 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (ptid));
387 delete_thread (ptid);
3cee93ac
CF
388
389 for (th = &thread_head;
390 th->next != NULL && th->next->id != id;
391 th = th->next)
392 continue;
393
394 if (th->next != NULL)
24e60978 395 {
3cee93ac
CF
396 thread_info *here = th->next;
397 th->next = here->next;
b8c9b27d 398 xfree (here);
24e60978
SC
399 }
400}
401
3cee93ac 402static void
dc05df57 403do_windows_fetch_inferior_registers (struct regcache *regcache, int r)
24e60978 404{
1e37c281 405 char *context_offset = ((char *) &current_thread->context) + mappings[r];
20a6ec49
MD
406 struct gdbarch *gdbarch = get_regcache_arch (regcache);
407 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
1e37c281 408 long l;
6c7de422 409
3ade5333 410 if (!current_thread)
d6dc8049 411 return; /* Windows sometimes uses a non-existent thread id in its
581e13c1 412 events. */
3ade5333
CF
413
414 if (current_thread->reload_context)
415 {
cb832706 416#ifdef __COPY_CONTEXT_SIZE
a244bdca
CF
417 if (have_saved_context)
418 {
581e13c1
MS
419 /* Lie about where the program actually is stopped since
420 cygwin has informed us that we should consider the signal
421 to have occurred at another location which is stored in
422 "saved_context. */
423 memcpy (&current_thread->context, &saved_context,
424 __COPY_CONTEXT_SIZE);
a244bdca
CF
425 have_saved_context = 0;
426 }
427 else
cb832706 428#endif
a244bdca
CF
429 {
430 thread_info *th = current_thread;
431 th->context.ContextFlags = CONTEXT_DEBUGGER_DR;
432 GetThreadContext (th->h, &th->context);
2b008701 433 /* Copy dr values from that thread.
581e13c1
MS
434 But only if there were not modified since last stop.
435 PR gdb/2388 */
88616312
PM
436 if (!debug_registers_changed)
437 {
438 dr[0] = th->context.Dr0;
439 dr[1] = th->context.Dr1;
440 dr[2] = th->context.Dr2;
441 dr[3] = th->context.Dr3;
442 dr[6] = th->context.Dr6;
443 dr[7] = th->context.Dr7;
444 }
a244bdca 445 }
3ade5333
CF
446 current_thread->reload_context = 0;
447 }
448
20a6ec49 449 if (r == I387_FISEG_REGNUM (tdep))
1e37c281 450 {
8e860359 451 l = *((long *) context_offset) & 0xffff;
56be3814 452 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 453 }
20a6ec49 454 else if (r == I387_FOP_REGNUM (tdep))
1e37c281 455 {
8e860359 456 l = (*((long *) context_offset) >> 16) & ((1 << 11) - 1);
56be3814 457 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281
JM
458 }
459 else if (r >= 0)
56be3814 460 regcache_raw_supply (regcache, r, context_offset);
3cee93ac 461 else
24e60978 462 {
20a6ec49 463 for (r = 0; r < gdbarch_num_regs (gdbarch); r++)
dc05df57 464 do_windows_fetch_inferior_registers (regcache, r);
24e60978 465 }
3cee93ac
CF
466}
467
468static void
28439f5e
PA
469windows_fetch_inferior_registers (struct target_ops *ops,
470 struct regcache *regcache, int r)
3cee93ac 471{
2dc38344 472 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 473 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 474 thread id in its events. */
3ade5333 475 if (current_thread)
dc05df57 476 do_windows_fetch_inferior_registers (regcache, r);
3cee93ac
CF
477}
478
479static void
dc05df57 480do_windows_store_inferior_registers (const struct regcache *regcache, int r)
3cee93ac 481{
3ade5333 482 if (!current_thread)
581e13c1 483 /* Windows sometimes uses a non-existent thread id in its events. */;
3ade5333 484 else if (r >= 0)
56be3814 485 regcache_raw_collect (regcache, r,
822c9732 486 ((char *) &current_thread->context) + mappings[r]);
24e60978
SC
487 else
488 {
40a6adc1 489 for (r = 0; r < gdbarch_num_regs (get_regcache_arch (regcache)); r++)
dc05df57 490 do_windows_store_inferior_registers (regcache, r);
24e60978
SC
491 }
492}
493
581e13c1 494/* Store a new register value into the current thread context. */
3cee93ac 495static void
28439f5e
PA
496windows_store_inferior_registers (struct target_ops *ops,
497 struct regcache *regcache, int r)
3cee93ac 498{
2dc38344 499 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 500 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 501 thread id in its events. */
3ade5333 502 if (current_thread)
dc05df57 503 do_windows_store_inferior_registers (regcache, r);
3cee93ac 504}
24e60978 505
7a9dd1b2 506/* Get the name of a given module at given base address. If base_address
33605d39
CF
507 is zero return the first loaded module (which is always the name of the
508 executable). */
3ee6f623 509static int
d3653bf6 510get_module_name (LPVOID base_address, char *dll_name_ret)
1e37c281
JM
511{
512 DWORD len;
513 MODULEINFO mi;
514 int i;
8e860359 515 HMODULE dh_buf[1];
581e13c1
MS
516 HMODULE *DllHandle = dh_buf; /* Set to temporary storage for
517 initial query. */
1e37c281 518 DWORD cbNeeded;
33605d39 519#ifdef __CYGWIN__
b3c613f2
CF
520 cygwin_buf_t pathbuf[__PMAX]; /* Temporary storage prior to converting to
521 posix form. __PMAX is always enough
d0d0ab16 522 as long as SO_NAME_MAX_PATH_SIZE is defined
581e13c1 523 as 512. */
33605d39 524#endif
1e37c281 525
1e37c281 526 cbNeeded = 0;
581e13c1
MS
527 /* Find size of buffer needed to handle list of modules loaded in
528 inferior. */
2b008701
CF
529 if (!EnumProcessModules (current_process_handle, DllHandle,
530 sizeof (HMODULE), &cbNeeded) || !cbNeeded)
1e37c281
JM
531 goto failed;
532
581e13c1 533 /* Allocate correct amount of space for module list. */
8e860359 534 DllHandle = (HMODULE *) alloca (cbNeeded);
1e37c281
JM
535 if (!DllHandle)
536 goto failed;
537
581e13c1 538 /* Get the list of modules. */
2b008701 539 if (!EnumProcessModules (current_process_handle, DllHandle, cbNeeded,
33605d39 540 &cbNeeded))
1e37c281
JM
541 goto failed;
542
29fe111d 543 for (i = 0; i < (int) (cbNeeded / sizeof (HMODULE)); i++)
1e37c281 544 {
581e13c1 545 /* Get information on this module. */
2b008701
CF
546 if (!GetModuleInformation (current_process_handle, DllHandle[i],
547 &mi, sizeof (mi)))
8a3fe4f8 548 error (_("Can't get module info"));
1e37c281 549
d3653bf6 550 if (!base_address || mi.lpBaseOfDll == base_address)
33605d39 551 {
581e13c1 552 /* Try to find the name of the given module. */
d0d0ab16 553#ifdef __CYGWIN__
581e13c1 554 /* Cygwin prefers that the path be in /x/y/z format. */
b3c613f2
CF
555 len = GetModuleFileNameEx (current_process_handle,
556 DllHandle[i], pathbuf, __PMAX);
d0d0ab16
CV
557 if (len == 0)
558 error (_("Error getting dll name: %lu."), GetLastError ());
559 if (cygwin_conv_path (CCP_WIN_W_TO_POSIX, pathbuf, dll_name_ret,
b3c613f2 560 __PMAX) < 0)
d0d0ab16
CV
561 error (_("Error converting dll name to POSIX: %d."), errno);
562#else
b3c613f2
CF
563 len = GetModuleFileNameEx (current_process_handle,
564 DllHandle[i], dll_name_ret, __PMAX);
33605d39 565 if (len == 0)
581e13c1
MS
566 error (_("Error getting dll name: %u."),
567 (unsigned) GetLastError ());
33605d39
CF
568#endif
569 return 1; /* success */
570 }
1e37c281
JM
571 }
572
573failed:
574 dll_name_ret[0] = '\0';
33605d39 575 return 0; /* failure */
1e37c281
JM
576}
577
450005e7 578/* Encapsulate the information required in a call to
581e13c1 579 symbol_file_add_args. */
8a892701
CF
580struct safe_symbol_file_add_args
581{
582 char *name;
583 int from_tty;
584 struct section_addr_info *addrs;
585 int mainline;
586 int flags;
7c5c87c0 587 struct ui_file *err, *out;
8a892701
CF
588 struct objfile *ret;
589};
590
581e13c1 591/* Maintain a linked list of "so" information. */
3ee6f623 592struct lm_info
02e423b9 593{
d3653bf6 594 LPVOID load_addr;
3ee6f623
CF
595};
596
597static struct so_list solib_start, *solib_end;
02e423b9 598
450005e7 599/* Call symbol_file_add with stderr redirected. We don't care if there
581e13c1 600 are errors. */
8a892701
CF
601static int
602safe_symbol_file_add_stub (void *argv)
603{
3ee6f623 604#define p ((struct safe_symbol_file_add_args *) argv)
7eedccfa
PP
605 const int add_flags = ((p->from_tty ? SYMFILE_VERBOSE : 0)
606 | (p->mainline ? SYMFILE_MAINLINE : 0));
607 p->ret = symbol_file_add (p->name, add_flags, p->addrs, p->flags);
8a892701
CF
608 return !!p->ret;
609#undef p
610}
611
581e13c1 612/* Restore gdb's stderr after calling symbol_file_add. */
8a892701 613static void
7c5c87c0 614safe_symbol_file_add_cleanup (void *p)
8a892701 615{
8e860359 616#define sp ((struct safe_symbol_file_add_args *)p)
450005e7 617 gdb_flush (gdb_stderr);
7c5c87c0 618 gdb_flush (gdb_stdout);
d3ff4a77 619 ui_file_delete (gdb_stderr);
7c5c87c0 620 ui_file_delete (gdb_stdout);
d3ff4a77 621 gdb_stderr = sp->err;
9d3789f7 622 gdb_stdout = sp->out;
8e860359 623#undef sp
8a892701
CF
624}
625
581e13c1 626/* symbol_file_add wrapper that prevents errors from being displayed. */
8a892701
CF
627static struct objfile *
628safe_symbol_file_add (char *name, int from_tty,
629 struct section_addr_info *addrs,
630 int mainline, int flags)
8a892701
CF
631{
632 struct safe_symbol_file_add_args p;
633 struct cleanup *cleanup;
634
7c5c87c0 635 cleanup = make_cleanup (safe_symbol_file_add_cleanup, &p);
8a892701 636
7c5c87c0
CF
637 p.err = gdb_stderr;
638 p.out = gdb_stdout;
450005e7 639 gdb_flush (gdb_stderr);
7c5c87c0 640 gdb_flush (gdb_stdout);
d3ff4a77 641 gdb_stderr = ui_file_new ();
7c5c87c0 642 gdb_stdout = ui_file_new ();
8a892701
CF
643 p.name = name;
644 p.from_tty = from_tty;
645 p.addrs = addrs;
646 p.mainline = mainline;
647 p.flags = flags;
648 catch_errors (safe_symbol_file_add_stub, &p, "", RETURN_MASK_ERROR);
649
650 do_cleanups (cleanup);
651 return p.ret;
652}
653
de1b3c3d 654static struct so_list *
dc05df57 655windows_make_so (const char *name, LPVOID load_addr)
8e860359 656{
3ee6f623 657 struct so_list *so;
d0d0ab16
CV
658 char *p;
659#ifndef __CYGWIN__
b3c613f2
CF
660 char buf[__PMAX];
661 char cwd[__PMAX];
3f8ad85b
CF
662 WIN32_FIND_DATA w32_fd;
663 HANDLE h = FindFirstFile(name, &w32_fd);
3f8ad85b 664
6badb179
CF
665 if (h == INVALID_HANDLE_VALUE)
666 strcpy (buf, name);
667 else
3f8ad85b 668 {
c914e0cc
CF
669 FindClose (h);
670 strcpy (buf, name);
671 if (GetCurrentDirectory (MAX_PATH + 1, cwd))
672 {
673 p = strrchr (buf, '\\');
674 if (p)
675 p[1] = '\0';
676 SetCurrentDirectory (buf);
677 GetFullPathName (w32_fd.cFileName, MAX_PATH, buf, &p);
678 SetCurrentDirectory (cwd);
679 }
3f8ad85b 680 }
3ee6f623
CF
681 if (strcasecmp (buf, "ntdll.dll") == 0)
682 {
683 GetSystemDirectory (buf, sizeof (buf));
684 strcat (buf, "\\ntdll.dll");
685 }
d0d0ab16 686#else
b3c613f2 687 cygwin_buf_t buf[__PMAX];
d0d0ab16 688
b3c613f2 689 buf[0] = 0;
d0d0ab16
CV
690 if (access (name, F_OK) != 0)
691 {
692 if (strcasecmp (name, "ntdll.dll") == 0)
b3c613f2 693#ifdef __USEWIDE
d0d0ab16
CV
694 {
695 GetSystemDirectoryW (buf, sizeof (buf) / sizeof (wchar_t));
696 wcscat (buf, L"\\ntdll.dll");
697 }
b3c613f2
CF
698#else
699 {
700 GetSystemDirectoryA (buf, sizeof (buf) / sizeof (wchar_t));
701 strcat (buf, "\\ntdll.dll");
702 }
703#endif
d0d0ab16
CV
704 }
705#endif
3929abe9 706 so = XZALLOC (struct so_list);
3ee6f623
CF
707 so->lm_info = (struct lm_info *) xmalloc (sizeof (struct lm_info));
708 so->lm_info->load_addr = load_addr;
de1b3c3d 709 strcpy (so->so_original_name, name);
10325bc5
PA
710#ifndef __CYGWIN__
711 strcpy (so->so_name, buf);
712#else
d0d0ab16
CV
713 if (buf[0])
714 cygwin_conv_path (CCP_WIN_W_TO_POSIX, buf, so->so_name,
715 SO_NAME_MAX_PATH_SIZE);
716 else
717 {
60c5c021 718 char *rname = realpath (name, NULL);
d0d0ab16
CV
719 if (rname && strlen (rname) < SO_NAME_MAX_PATH_SIZE)
720 {
721 strcpy (so->so_name, rname);
722 free (rname);
723 }
724 else
725 error (_("dll path too long"));
726 }
de1b3c3d
PA
727 /* Record cygwin1.dll .text start/end. */
728 p = strchr (so->so_name, '\0') - (sizeof ("/cygwin1.dll") - 1);
729 if (p >= so->so_name && strcasecmp (p, "/cygwin1.dll") == 0)
730 {
731 bfd *abfd;
732 asection *text = NULL;
733 CORE_ADDR text_vma;
8e860359 734
610dd7f9 735 abfd = bfd_openr (so->so_name, "pei-i386");
a244bdca 736
de1b3c3d
PA
737 if (!abfd)
738 return so;
739
740 if (bfd_check_format (abfd, bfd_object))
741 text = bfd_get_section_by_name (abfd, ".text");
742
743 if (!text)
744 {
745 bfd_close (abfd);
746 return so;
747 }
748
7a9dd1b2 749 /* The symbols in a dll are offset by 0x1000, which is the
de1b3c3d 750 offset from 0 of the first byte in an image - because of the
581e13c1
MS
751 file header and the section alignment. */
752 cygwin_load_start = (CORE_ADDR) (uintptr_t) ((char *)
753 load_addr + 0x1000);
dc05df57 754 cygwin_load_end = cygwin_load_start + bfd_section_size (abfd, text);
de1b3c3d
PA
755
756 bfd_close (abfd);
757 }
10325bc5 758#endif
de1b3c3d
PA
759
760 return so;
8e860359
CF
761}
762
3ee6f623 763static char *
dfe7f3ac
CF
764get_image_name (HANDLE h, void *address, int unicode)
765{
d0d0ab16 766#ifdef __CYGWIN__
b3c613f2 767 static char buf[__PMAX];
d0d0ab16 768#else
b3c613f2 769 static char buf[(2 * __PMAX) + 1];
d0d0ab16 770#endif
dfe7f3ac
CF
771 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
772 char *address_ptr;
773 int len = 0;
774 char b[2];
5732a500 775 SIZE_T done;
dfe7f3ac
CF
776
777 /* Attempt to read the name of the dll that was detected.
778 This is documented to work only when actively debugging
581e13c1 779 a program. It will not work for attached processes. */
dfe7f3ac
CF
780 if (address == NULL)
781 return NULL;
782
dfe7f3ac 783 /* See if we could read the address of a string, and that the
581e13c1
MS
784 address isn't null. */
785 if (!ReadProcessMemory (h, address, &address_ptr,
786 sizeof (address_ptr), &done)
6f17862b 787 || done != sizeof (address_ptr) || !address_ptr)
dfe7f3ac
CF
788 return NULL;
789
581e13c1 790 /* Find the length of the string. */
6f17862b
CF
791 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
792 && (b[0] != 0 || b[size - 1] != 0) && done == size)
793 continue;
dfe7f3ac
CF
794
795 if (!unicode)
796 ReadProcessMemory (h, address_ptr, buf, len, &done);
797 else
798 {
799 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
800 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
801 &done);
d0d0ab16 802#ifdef __CYGWIN__
b3c613f2 803 wcstombs (buf, unicode_address, __PMAX);
d0d0ab16
CV
804#else
805 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, sizeof buf,
806 0, 0);
807#endif
dfe7f3ac
CF
808 }
809
810 return buf;
811}
812
24e60978
SC
813/* Wait for child to do something. Return pid of child, or -1 in case
814 of error; store status through argument pointer OURSTATUS. */
1750a5ef 815static int
0a65a603 816handle_load_dll (void *dummy)
24e60978 817{
3a4b77d8 818 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
b3c613f2 819 char dll_buf[__PMAX];
450005e7 820 char *dll_name = NULL;
3cee93ac 821
3a4b77d8 822 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 823
d3653bf6 824 if (!get_module_name (event->lpBaseOfDll, dll_buf))
8e860359 825 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 826
1e37c281 827 dll_name = dll_buf;
24e60978 828
dfe7f3ac 829 if (*dll_name == '\0')
de1b3c3d
PA
830 dll_name = get_image_name (current_process_handle,
831 event->lpImageName, event->fUnicode);
3cee93ac
CF
832 if (!dll_name)
833 return 1;
834
dc05df57 835 solib_end->next = windows_make_so (dll_name, event->lpBaseOfDll);
de1b3c3d 836 solib_end = solib_end->next;
450005e7 837
a74ce742
PM
838 DEBUG_EVENTS (("gdb: Loading dll \"%s\" at %s.\n", solib_end->so_name,
839 host_address_to_string (solib_end->lm_info->load_addr)));
7488902c 840
450005e7
CF
841 return 1;
842}
843
3ee6f623 844static void
dc05df57 845windows_free_so (struct so_list *so)
3ee6f623 846{
3ee6f623
CF
847 if (so->lm_info)
848 xfree (so->lm_info);
de1b3c3d 849 xfree (so);
3cb8e7f6
CF
850}
851
d3ff4a77 852static int
0a65a603 853handle_unload_dll (void *dummy)
d3ff4a77 854{
d3653bf6 855 LPVOID lpBaseOfDll = current_event.u.UnloadDll.lpBaseOfDll;
3ee6f623 856 struct so_list *so;
d3ff4a77
CF
857
858 for (so = &solib_start; so->next != NULL; so = so->next)
3ee6f623 859 if (so->next->lm_info->load_addr == lpBaseOfDll)
d3ff4a77 860 {
3ee6f623 861 struct so_list *sodel = so->next;
d3ff4a77
CF
862 so->next = sodel->next;
863 if (!so->next)
864 solib_end = so;
7488902c
PM
865 DEBUG_EVENTS (("gdb: Unloading dll \"%s\".\n", sodel->so_name));
866
dc05df57 867 windows_free_so (sodel);
3929abe9 868 solib_add (NULL, 0, NULL, auto_solib_add);
d3ff4a77
CF
869 return 1;
870 }
3929abe9 871
ecc13e53
JB
872 /* We did not find any DLL that was previously loaded at this address,
873 so register a complaint. We do not report an error, because we have
874 observed that this may be happening under some circumstances. For
875 instance, running 32bit applications on x64 Windows causes us to receive
876 4 mysterious UNLOAD_DLL_DEBUG_EVENTs during the startup phase (these
877 events are apparently caused by the WOW layer, the interface between
878 32bit and 64bit worlds). */
879 complaint (&symfile_complaints, _("dll starting at %s not found."),
880 host_address_to_string (lpBaseOfDll));
d3ff4a77
CF
881
882 return 0;
883}
884
581e13c1 885/* Clear list of loaded DLLs. */
3ee6f623 886static void
dc05df57 887windows_clear_solib (void)
450005e7 888{
450005e7
CF
889 solib_start.next = NULL;
890 solib_end = &solib_start;
450005e7 891}
295732ea 892
581e13c1 893/* Load DLL symbol info. */
450005e7 894void
7470a420 895dll_symbol_command (char *args, int from_tty)
450005e7 896{
8e860359 897 int n;
450005e7 898 dont_repeat ();
8e860359 899
450005e7 900 if (args == NULL)
8a3fe4f8 901 error (_("dll-symbols requires a file name"));
450005e7 902
8e860359
CF
903 n = strlen (args);
904 if (n > 4 && strcasecmp (args + n - 4, ".dll") != 0)
905 {
906 char *newargs = (char *) alloca (n + 4 + 1);
907 strcpy (newargs, args);
908 strcat (newargs, ".dll");
909 args = newargs;
910 }
911
7470a420 912 safe_symbol_file_add (args, from_tty, NULL, 0, OBJF_SHARED | OBJF_USERLOADED);
8e860359 913}
450005e7 914
3cee93ac
CF
915/* Handle DEBUG_STRING output from child process.
916 Cygwin prepends its messages with a "cygwin:". Interpret this as
581e13c1 917 a Cygwin signal. Otherwise just print the string as a warning. */
3cee93ac
CF
918static int
919handle_output_debug_string (struct target_waitstatus *ourstatus)
920{
a244bdca
CF
921 char *s = NULL;
922 int retval = 0;
3cee93ac
CF
923
924 if (!target_read_string
2c647436
PM
925 ((CORE_ADDR) (uintptr_t) current_event.u.DebugString.lpDebugStringData,
926 &s, 1024, 0)
3cee93ac 927 || !s || !*s)
a244bdca 928 /* nothing to do */;
581e13c1
MS
929 else if (strncmp (s, _CYGWIN_SIGNAL_STRING,
930 sizeof (_CYGWIN_SIGNAL_STRING) - 1) != 0)
3cee93ac 931 {
10325bc5 932#ifdef __CYGWIN__
d3a09475 933 if (strncmp (s, "cYg", 3) != 0)
10325bc5 934#endif
8a3fe4f8 935 warning (("%s"), s);
3cee93ac 936 }
cb832706 937#ifdef __COPY_CONTEXT_SIZE
d3a09475 938 else
3cee93ac 939 {
581e13c1
MS
940 /* Got a cygwin signal marker. A cygwin signal is followed by
941 the signal number itself and then optionally followed by the
942 thread id and address to saved context within the DLL. If
943 these are supplied, then the given thread is assumed to have
944 issued the signal and the context from the thread is assumed
945 to be stored at the given address in the inferior. Tell gdb
946 to treat this like a real signal. */
3cee93ac 947 char *p;
3929abe9 948 int sig = strtol (s + sizeof (_CYGWIN_SIGNAL_STRING) - 1, &p, 0);
a244bdca 949 int gotasig = target_signal_from_host (sig);
0714f9bf
SS
950 ourstatus->value.sig = gotasig;
951 if (gotasig)
a244bdca
CF
952 {
953 LPCVOID x;
954 DWORD n;
955 ourstatus->kind = TARGET_WAITKIND_STOPPED;
956 retval = strtoul (p, &p, 0);
957 if (!retval)
958 retval = main_thread_id;
959 else if ((x = (LPCVOID) strtoul (p, &p, 0))
960 && ReadProcessMemory (current_process_handle, x,
581e13c1
MS
961 &saved_context,
962 __COPY_CONTEXT_SIZE, &n)
a244bdca
CF
963 && n == __COPY_CONTEXT_SIZE)
964 have_saved_context = 1;
965 current_event.dwThreadId = retval;
966 }
3cee93ac 967 }
cb832706 968#endif
3cee93ac 969
a244bdca
CF
970 if (s)
971 xfree (s);
972 return retval;
3cee93ac 973}
24e60978 974
c1748f97
PM
975static int
976display_selector (HANDLE thread, DWORD sel)
977{
978 LDT_ENTRY info;
979 if (GetThreadSelectorEntry (thread, sel, &info))
980 {
981 int base, limit;
982 printf_filtered ("0x%03lx: ", sel);
983 if (!info.HighWord.Bits.Pres)
baa93fa6
CF
984 {
985 puts_filtered ("Segment not present\n");
986 return 0;
987 }
c1748f97
PM
988 base = (info.HighWord.Bits.BaseHi << 24) +
989 (info.HighWord.Bits.BaseMid << 16)
990 + info.BaseLow;
991 limit = (info.HighWord.Bits.LimitHi << 16) + info.LimitLow;
992 if (info.HighWord.Bits.Granularity)
caad7706 993 limit = (limit << 12) | 0xfff;
c1748f97
PM
994 printf_filtered ("base=0x%08x limit=0x%08x", base, limit);
995 if (info.HighWord.Bits.Default_Big)
baa93fa6 996 puts_filtered(" 32-bit ");
c1748f97 997 else
baa93fa6 998 puts_filtered(" 16-bit ");
c1748f97
PM
999 switch ((info.HighWord.Bits.Type & 0xf) >> 1)
1000 {
1001 case 0:
baa93fa6
CF
1002 puts_filtered ("Data (Read-Only, Exp-up");
1003 break;
c1748f97 1004 case 1:
baa93fa6
CF
1005 puts_filtered ("Data (Read/Write, Exp-up");
1006 break;
c1748f97 1007 case 2:
baa93fa6
CF
1008 puts_filtered ("Unused segment (");
1009 break;
c1748f97 1010 case 3:
baa93fa6
CF
1011 puts_filtered ("Data (Read/Write, Exp-down");
1012 break;
c1748f97 1013 case 4:
baa93fa6
CF
1014 puts_filtered ("Code (Exec-Only, N.Conf");
1015 break;
c1748f97 1016 case 5:
baa93fa6 1017 puts_filtered ("Code (Exec/Read, N.Conf");
c1748f97
PM
1018 break;
1019 case 6:
baa93fa6 1020 puts_filtered ("Code (Exec-Only, Conf");
c1748f97
PM
1021 break;
1022 case 7:
baa93fa6 1023 puts_filtered ("Code (Exec/Read, Conf");
c1748f97
PM
1024 break;
1025 default:
1026 printf_filtered ("Unknown type 0x%x",info.HighWord.Bits.Type);
1027 }
1028 if ((info.HighWord.Bits.Type & 0x1) == 0)
baa93fa6 1029 puts_filtered(", N.Acc");
c1748f97
PM
1030 puts_filtered (")\n");
1031 if ((info.HighWord.Bits.Type & 0x10) == 0)
1032 puts_filtered("System selector ");
1033 printf_filtered ("Priviledge level = %d. ", info.HighWord.Bits.Dpl);
1034 if (info.HighWord.Bits.Granularity)
baa93fa6 1035 puts_filtered ("Page granular.\n");
c1748f97
PM
1036 else
1037 puts_filtered ("Byte granular.\n");
1038 return 1;
1039 }
1040 else
1041 {
5572ce1f
PM
1042 DWORD err = GetLastError ();
1043 if (err == ERROR_NOT_SUPPORTED)
1044 printf_filtered ("Function not supported\n");
1045 else
1046 printf_filtered ("Invalid selector 0x%lx.\n",sel);
c1748f97
PM
1047 return 0;
1048 }
1049}
1050
1051static void
1052display_selectors (char * args, int from_tty)
1053{
1054 if (!current_thread)
1055 {
1056 puts_filtered ("Impossible to display selectors now.\n");
1057 return;
1058 }
1059 if (!args)
1060 {
1061
1062 puts_filtered ("Selector $cs\n");
1063 display_selector (current_thread->h,
baa93fa6 1064 current_thread->context.SegCs);
c1748f97
PM
1065 puts_filtered ("Selector $ds\n");
1066 display_selector (current_thread->h,
baa93fa6 1067 current_thread->context.SegDs);
c1748f97
PM
1068 puts_filtered ("Selector $es\n");
1069 display_selector (current_thread->h,
baa93fa6 1070 current_thread->context.SegEs);
c1748f97
PM
1071 puts_filtered ("Selector $ss\n");
1072 display_selector (current_thread->h,
baa93fa6 1073 current_thread->context.SegSs);
c1748f97
PM
1074 puts_filtered ("Selector $fs\n");
1075 display_selector (current_thread->h,
1076 current_thread->context.SegFs);
1077 puts_filtered ("Selector $gs\n");
1078 display_selector (current_thread->h,
baa93fa6 1079 current_thread->context.SegGs);
c1748f97
PM
1080 }
1081 else
1082 {
1083 int sel;
1084 sel = parse_and_eval_long (args);
1085 printf_filtered ("Selector \"%s\"\n",args);
1086 display_selector (current_thread->h, sel);
1087 }
1088}
1089
7393af7c 1090#define DEBUG_EXCEPTION_SIMPLE(x) if (debug_exceptions) \
a74ce742
PM
1091 printf_unfiltered ("gdb: Target exception %s at %s\n", x, \
1092 host_address_to_string (\
1093 current_event.u.Exception.ExceptionRecord.ExceptionAddress))
7393af7c 1094
36339ecd 1095static int
450005e7 1096handle_exception (struct target_waitstatus *ourstatus)
24e60978 1097{
3cee93ac 1098 thread_info *th;
29fe111d 1099 DWORD code = current_event.u.Exception.ExceptionRecord.ExceptionCode;
3cee93ac 1100
29fe111d 1101 ourstatus->kind = TARGET_WAITKIND_STOPPED;
8a892701 1102
581e13c1 1103 /* Record the context of the current thread. */
3cee93ac 1104 th = thread_rec (current_event.dwThreadId, -1);
24e60978 1105
29fe111d 1106 switch (code)
24e60978 1107 {
1ef980b9 1108 case EXCEPTION_ACCESS_VIOLATION:
7393af7c
PM
1109 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ACCESS_VIOLATION");
1110 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
10325bc5 1111#ifdef __CYGWIN__
8da8e0b3 1112 {
581e13c1
MS
1113 /* See if the access violation happened within the cygwin DLL
1114 itself. Cygwin uses a kind of exception handling to deal
1115 with passed-in invalid addresses. gdb should not treat
1116 these as real SEGVs since they will be silently handled by
1117 cygwin. A real SEGV will (theoretically) be caught by
1118 cygwin later in the process and will be sent as a
1119 cygwin-specific-signal. So, ignore SEGVs if they show up
1120 within the text segment of the DLL itself. */
8da8e0b3 1121 char *fn;
581e13c1
MS
1122 CORE_ADDR addr = (CORE_ADDR) (uintptr_t)
1123 current_event.u.Exception.ExceptionRecord.ExceptionAddress;
1124
1125 if ((!cygwin_exceptions && (addr >= cygwin_load_start
1126 && addr < cygwin_load_end))
a244bdca 1127 || (find_pc_partial_function (addr, &fn, NULL, NULL)
581e13c1
MS
1128 && strncmp (fn, "KERNEL32!IsBad",
1129 strlen ("KERNEL32!IsBad")) == 0))
8da8e0b3
CF
1130 return 0;
1131 }
10325bc5 1132#endif
7393af7c
PM
1133 break;
1134 case STATUS_STACK_OVERFLOW:
1135 DEBUG_EXCEPTION_SIMPLE ("STATUS_STACK_OVERFLOW");
1ef980b9 1136 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
7393af7c
PM
1137 break;
1138 case STATUS_FLOAT_DENORMAL_OPERAND:
1139 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DENORMAL_OPERAND");
1140 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1141 break;
1142 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1143 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ARRAY_BOUNDS_EXCEEDED");
1144 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1145 break;
1146 case STATUS_FLOAT_INEXACT_RESULT:
1147 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INEXACT_RESULT");
1148 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1149 break;
1150 case STATUS_FLOAT_INVALID_OPERATION:
1151 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INVALID_OPERATION");
1152 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1153 break;
1154 case STATUS_FLOAT_OVERFLOW:
1155 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_OVERFLOW");
1156 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1157 break;
1158 case STATUS_FLOAT_STACK_CHECK:
1159 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_STACK_CHECK");
1160 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1ef980b9 1161 break;
3b7c8b74 1162 case STATUS_FLOAT_UNDERFLOW:
7393af7c
PM
1163 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_UNDERFLOW");
1164 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1165 break;
3b7c8b74 1166 case STATUS_FLOAT_DIVIDE_BY_ZERO:
7393af7c
PM
1167 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DIVIDE_BY_ZERO");
1168 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1169 break;
3b7c8b74 1170 case STATUS_INTEGER_DIVIDE_BY_ZERO:
7393af7c 1171 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_DIVIDE_BY_ZERO");
3b7c8b74 1172 ourstatus->value.sig = TARGET_SIGNAL_FPE;
3b7c8b74 1173 break;
7393af7c
PM
1174 case STATUS_INTEGER_OVERFLOW:
1175 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_OVERFLOW");
1176 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1ef980b9
SC
1177 break;
1178 case EXCEPTION_BREAKPOINT:
7393af7c 1179 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_BREAKPOINT");
1ef980b9
SC
1180 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
1181 break;
1182 case DBG_CONTROL_C:
7393af7c 1183 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_C");
1ef980b9 1184 ourstatus->value.sig = TARGET_SIGNAL_INT;
5b421780
PM
1185 break;
1186 case DBG_CONTROL_BREAK:
7393af7c 1187 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_BREAK");
5b421780 1188 ourstatus->value.sig = TARGET_SIGNAL_INT;
1ef980b9
SC
1189 break;
1190 case EXCEPTION_SINGLE_STEP:
7393af7c 1191 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_SINGLE_STEP");
1ef980b9
SC
1192 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
1193 break;
8227c82d 1194 case EXCEPTION_ILLEGAL_INSTRUCTION:
7393af7c
PM
1195 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ILLEGAL_INSTRUCTION");
1196 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1197 break;
1198 case EXCEPTION_PRIV_INSTRUCTION:
1199 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_PRIV_INSTRUCTION");
1200 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1201 break;
1202 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1203 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_NONCONTINUABLE_EXCEPTION");
8227c82d
CF
1204 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1205 break;
1ef980b9 1206 default:
581e13c1 1207 /* Treat unhandled first chance exceptions specially. */
02e423b9 1208 if (current_event.u.Exception.dwFirstChance)
a244bdca 1209 return -1;
a74ce742
PM
1210 printf_unfiltered ("gdb: unknown target exception 0x%08lx at %s\n",
1211 current_event.u.Exception.ExceptionRecord.ExceptionCode,
1212 host_address_to_string (
1213 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
24e60978 1214 ourstatus->value.sig = TARGET_SIGNAL_UNKNOWN;
1ef980b9 1215 break;
24e60978 1216 }
24e60978 1217 exception_count++;
7393af7c 1218 last_sig = ourstatus->value.sig;
36339ecd 1219 return 1;
24e60978
SC
1220}
1221
3cee93ac 1222/* Resume all artificially suspended threads if we are continuing
581e13c1 1223 execution. */
3cee93ac 1224static BOOL
dc05df57 1225windows_continue (DWORD continue_status, int id)
3cee93ac
CF
1226{
1227 int i;
1228 thread_info *th;
1229 BOOL res;
1230
1c1238a5 1231 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%ld, ctid=%lx, %s);\n",
7393af7c 1232 current_event.dwProcessId, current_event.dwThreadId,
dfe7f3ac 1233 continue_status == DBG_CONTINUE ?
7393af7c 1234 "DBG_CONTINUE" : "DBG_EXCEPTION_NOT_HANDLED"));
6537bb24
PA
1235
1236 for (th = &thread_head; (th = th->next) != NULL;)
1237 if ((id == -1 || id == (int) th->id)
1238 && th->suspended)
1239 {
1240 if (debug_registers_changed)
1241 {
1242 th->context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1243 th->context.Dr0 = dr[0];
1244 th->context.Dr1 = dr[1];
1245 th->context.Dr2 = dr[2];
1246 th->context.Dr3 = dr[3];
1247 th->context.Dr6 = DR6_CLEAR_VALUE;
1248 th->context.Dr7 = dr[7];
1249 }
1250 if (th->context.ContextFlags)
1251 {
1252 CHECK (SetThreadContext (th->h, &th->context));
1253 th->context.ContextFlags = 0;
1254 }
1255 if (th->suspended > 0)
1256 (void) ResumeThread (th->h);
1257 th->suspended = 0;
1258 }
1259
0714f9bf
SS
1260 res = ContinueDebugEvent (current_event.dwProcessId,
1261 current_event.dwThreadId,
1262 continue_status);
3cee93ac 1263
fa4ba8da 1264 debug_registers_changed = 0;
3cee93ac
CF
1265 return res;
1266}
1267
d6dc8049
CF
1268/* Called in pathological case where Windows fails to send a
1269 CREATE_PROCESS_DEBUG_EVENT after an attach. */
3ee6f623 1270static DWORD
5439edaa 1271fake_create_process (void)
3ade5333
CF
1272{
1273 current_process_handle = OpenProcess (PROCESS_ALL_ACCESS, FALSE,
1274 current_event.dwProcessId);
bf25528d
CF
1275 if (current_process_handle != NULL)
1276 open_process_used = 1;
1277 else
1278 {
b37520b6 1279 error (_("OpenProcess call failed, GetLastError = %lud"),
bf25528d
CF
1280 GetLastError ());
1281 /* We can not debug anything in that case. */
1282 }
3ade5333 1283 main_thread_id = current_event.dwThreadId;
711e434b
PM
1284 current_thread = windows_add_thread (
1285 ptid_build (current_event.dwProcessId, 0,
1286 current_event.dwThreadId),
1287 current_event.u.CreateThread.hThread,
1288 current_event.u.CreateThread.lpThreadLocalBase);
3ade5333
CF
1289 return main_thread_id;
1290}
1291
a244bdca 1292static void
28439f5e
PA
1293windows_resume (struct target_ops *ops,
1294 ptid_t ptid, int step, enum target_signal sig)
a244bdca
CF
1295{
1296 thread_info *th;
1297 DWORD continue_status = DBG_CONTINUE;
1298
2dc38344
PA
1299 /* A specific PTID means `step only this thread id'. */
1300 int resume_all = ptid_equal (ptid, minus_one_ptid);
1301
1302 /* If we're continuing all threads, it's the current inferior that
1303 should be handled specially. */
1304 if (resume_all)
1305 ptid = inferior_ptid;
a244bdca
CF
1306
1307 if (sig != TARGET_SIGNAL_0)
1308 {
1309 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
1310 {
1311 DEBUG_EXCEPT(("Cannot continue with signal %d here.\n",sig));
1312 }
1313 else if (sig == last_sig)
1314 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1315 else
1316#if 0
1317/* This code does not seem to work, because
1318 the kernel does probably not consider changes in the ExceptionRecord
1319 structure when passing the exception to the inferior.
1320 Note that this seems possible in the exception handler itself. */
1321 {
1322 int i;
1323 for (i = 0; xlate[i].them != -1; i++)
1324 if (xlate[i].us == sig)
1325 {
581e13c1
MS
1326 current_event.u.Exception.ExceptionRecord.ExceptionCode
1327 = xlate[i].them;
a244bdca
CF
1328 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1329 break;
1330 }
1331 if (continue_status == DBG_CONTINUE)
1332 {
1333 DEBUG_EXCEPT(("Cannot continue with signal %d.\n",sig));
1334 }
1335 }
1336#endif
1337 DEBUG_EXCEPT(("Can only continue with recieved signal %d.\n",
1338 last_sig));
1339 }
1340
1341 last_sig = TARGET_SIGNAL_0;
1342
dc05df57 1343 DEBUG_EXEC (("gdb: windows_resume (pid=%d, tid=%ld, step=%d, sig=%d);\n",
2dc38344 1344 ptid_get_pid (ptid), ptid_get_tid (ptid), step, sig));
a244bdca 1345
581e13c1 1346 /* Get context for currently selected thread. */
2dc38344 1347 th = thread_rec (ptid_get_tid (inferior_ptid), FALSE);
a244bdca
CF
1348 if (th)
1349 {
1350 if (step)
1351 {
581e13c1 1352 /* Single step by setting t bit. */
a97b0ac8
UW
1353 struct regcache *regcache = get_current_regcache ();
1354 struct gdbarch *gdbarch = get_regcache_arch (regcache);
1355 windows_fetch_inferior_registers (ops, regcache,
1356 gdbarch_ps_regnum (gdbarch));
a244bdca
CF
1357 th->context.EFlags |= FLAG_TRACE_BIT;
1358 }
1359
1360 if (th->context.ContextFlags)
1361 {
1362 if (debug_registers_changed)
1363 {
1364 th->context.Dr0 = dr[0];
1365 th->context.Dr1 = dr[1];
1366 th->context.Dr2 = dr[2];
1367 th->context.Dr3 = dr[3];
6537bb24 1368 th->context.Dr6 = DR6_CLEAR_VALUE;
a244bdca
CF
1369 th->context.Dr7 = dr[7];
1370 }
1371 CHECK (SetThreadContext (th->h, &th->context));
1372 th->context.ContextFlags = 0;
1373 }
1374 }
1375
1376 /* Allow continuing with the same signal that interrupted us.
581e13c1 1377 Otherwise complain. */
a244bdca 1378
2dc38344 1379 if (resume_all)
dc05df57 1380 windows_continue (continue_status, -1);
2dc38344 1381 else
dc05df57 1382 windows_continue (continue_status, ptid_get_tid (ptid));
a244bdca
CF
1383}
1384
695de547
CF
1385/* Ctrl-C handler used when the inferior is not run in the same console. The
1386 handler is in charge of interrupting the inferior using DebugBreakProcess.
1387 Note that this function is not available prior to Windows XP. In this case
1388 we emit a warning. */
1389BOOL WINAPI
1390ctrl_c_handler (DWORD event_type)
1391{
1392 const int attach_flag = current_inferior ()->attach_flag;
1393
bb0613a5
PM
1394 /* Only handle Ctrl-C and Ctrl-Break events. Ignore others. */
1395 if (event_type != CTRL_C_EVENT && event_type != CTRL_BREAK_EVENT)
695de547
CF
1396 return FALSE;
1397
1398 /* If the inferior and the debugger share the same console, do nothing as
1399 the inferior has also received the Ctrl-C event. */
1400 if (!new_console && !attach_flag)
1401 return TRUE;
1402
1403 if (!DebugBreakProcess (current_process_handle))
581e13c1
MS
1404 warning (_("Could not interrupt program. "
1405 "Press Ctrl-c in the program console."));
695de547
CF
1406
1407 /* Return true to tell that Ctrl-C has been handled. */
1408 return TRUE;
1409}
1410
8a892701 1411/* Get the next event from the child. Return 1 if the event requires
695de547 1412 handling by WFI (or whatever). */
1e37c281 1413static int
28439f5e
PA
1414get_windows_debug_event (struct target_ops *ops,
1415 int pid, struct target_waitstatus *ourstatus)
1e37c281
JM
1416{
1417 BOOL debug_event;
8a892701 1418 DWORD continue_status, event_code;
87a45c96 1419 thread_info *th;
8a892701 1420 static thread_info dummy_thread_info;
450005e7 1421 int retval = 0;
1e37c281 1422
7393af7c 1423 last_sig = TARGET_SIGNAL_0;
9d3789f7 1424
8a892701 1425 if (!(debug_event = WaitForDebugEvent (&current_event, 1000)))
29fe111d 1426 goto out;
1e37c281
JM
1427
1428 event_count++;
1429 continue_status = DBG_CONTINUE;
1e37c281 1430
8a892701 1431 event_code = current_event.dwDebugEventCode;
450005e7 1432 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
87a45c96 1433 th = NULL;
a244bdca 1434 have_saved_context = 0;
8a892701
CF
1435
1436 switch (event_code)
1e37c281
JM
1437 {
1438 case CREATE_THREAD_DEBUG_EVENT:
1439 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1440 (unsigned) current_event.dwProcessId,
1441 (unsigned) current_event.dwThreadId,
1442 "CREATE_THREAD_DEBUG_EVENT"));
dfe7f3ac 1443 if (saw_create != 1)
3ade5333 1444 {
181e7f93
PA
1445 struct inferior *inf;
1446 inf = find_inferior_pid (current_event.dwProcessId);
1447 if (!saw_create && inf->attach_flag)
3ade5333 1448 {
d6dc8049
CF
1449 /* Kludge around a Windows bug where first event is a create
1450 thread event. Caused when attached process does not have
581e13c1 1451 a main thread. */
3a3e9ee3 1452 retval = fake_create_process ();
181e7f93
PA
1453 if (retval)
1454 saw_create++;
3ade5333
CF
1455 }
1456 break;
1457 }
581e13c1 1458 /* Record the existence of this thread. */
450005e7 1459 retval = current_event.dwThreadId;
dc05df57 1460 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1461 current_event.dwThreadId),
711e434b
PM
1462 current_event.u.CreateThread.hThread,
1463 current_event.u.CreateThread.lpThreadLocalBase);
1464
1e37c281
JM
1465 break;
1466
1467 case EXIT_THREAD_DEBUG_EVENT:
1c1238a5 1468 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1469 (unsigned) current_event.dwProcessId,
1470 (unsigned) current_event.dwThreadId,
1471 "EXIT_THREAD_DEBUG_EVENT"));
b3c613f2 1472
87a45c96
CF
1473 if (current_event.dwThreadId != main_thread_id)
1474 {
dc05df57 1475 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1476 current_event.dwThreadId));
87a45c96
CF
1477 th = &dummy_thread_info;
1478 }
1e37c281
JM
1479 break;
1480
1481 case CREATE_PROCESS_DEBUG_EVENT:
1c1238a5 1482 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1483 (unsigned) current_event.dwProcessId,
1484 (unsigned) current_event.dwThreadId,
1485 "CREATE_PROCESS_DEBUG_EVENT"));
700b351b 1486 CloseHandle (current_event.u.CreateProcessInfo.hFile);
dfe7f3ac 1487 if (++saw_create != 1)
bf25528d 1488 break;
1e37c281 1489
dfe7f3ac 1490 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
87a45c96 1491 if (main_thread_id)
695de547
CF
1492 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
1493 main_thread_id));
9d3789f7 1494 main_thread_id = current_event.dwThreadId;
581e13c1 1495 /* Add the main thread. */
dc05df57 1496 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
695de547 1497 current_event.dwThreadId),
711e434b
PM
1498 current_event.u.CreateProcessInfo.hThread,
1499 current_event.u.CreateProcessInfo.lpThreadLocalBase);
3a3e9ee3 1500 retval = current_event.dwThreadId;
1e37c281
JM
1501 break;
1502
1503 case EXIT_PROCESS_DEBUG_EVENT:
1c1238a5 1504 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1505 (unsigned) current_event.dwProcessId,
1506 (unsigned) current_event.dwThreadId,
1507 "EXIT_PROCESS_DEBUG_EVENT"));
16d905e2
CF
1508 if (!windows_initialization_done)
1509 {
1510 target_terminal_ours ();
1511 target_mourn_inferior ();
1512 error (_("During startup program exited with code 0x%x."),
1513 (unsigned int) current_event.u.ExitProcess.dwExitCode);
1514 }
1515 else if (saw_create == 1)
1516 {
1517 ourstatus->kind = TARGET_WAITKIND_EXITED;
1518 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
1519 retval = main_thread_id;
1520 }
8a892701 1521 break;
1e37c281
JM
1522
1523 case LOAD_DLL_DEBUG_EVENT:
1c1238a5 1524 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1525 (unsigned) current_event.dwProcessId,
1526 (unsigned) current_event.dwThreadId,
1527 "LOAD_DLL_DEBUG_EVENT"));
700b351b 1528 CloseHandle (current_event.u.LoadDll.hFile);
dfe7f3ac
CF
1529 if (saw_create != 1)
1530 break;
8a892701 1531 catch_errors (handle_load_dll, NULL, (char *) "", RETURN_MASK_ALL);
450005e7
CF
1532 ourstatus->kind = TARGET_WAITKIND_LOADED;
1533 ourstatus->value.integer = 0;
9d3789f7 1534 retval = main_thread_id;
1e37c281
JM
1535 break;
1536
1537 case UNLOAD_DLL_DEBUG_EVENT:
1c1238a5 1538 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1539 (unsigned) current_event.dwProcessId,
1540 (unsigned) current_event.dwThreadId,
1541 "UNLOAD_DLL_DEBUG_EVENT"));
dfe7f3ac
CF
1542 if (saw_create != 1)
1543 break;
d3ff4a77 1544 catch_errors (handle_unload_dll, NULL, (char *) "", RETURN_MASK_ALL);
de1b3c3d
PA
1545 ourstatus->kind = TARGET_WAITKIND_LOADED;
1546 ourstatus->value.integer = 0;
1547 retval = main_thread_id;
d3ff4a77 1548 break;
1e37c281
JM
1549
1550 case EXCEPTION_DEBUG_EVENT:
1c1238a5 1551 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1552 (unsigned) current_event.dwProcessId,
1553 (unsigned) current_event.dwThreadId,
1554 "EXCEPTION_DEBUG_EVENT"));
dfe7f3ac
CF
1555 if (saw_create != 1)
1556 break;
a244bdca
CF
1557 switch (handle_exception (ourstatus))
1558 {
1559 case 0:
1560 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1561 break;
1562 case 1:
1563 retval = current_event.dwThreadId;
1564 break;
1565 case -1:
1566 last_sig = 1;
1567 continue_status = -1;
1568 break;
1569 }
1e37c281
JM
1570 break;
1571
581e13c1 1572 case OUTPUT_DEBUG_STRING_EVENT: /* Message from the kernel. */
1c1238a5 1573 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1574 (unsigned) current_event.dwProcessId,
1575 (unsigned) current_event.dwThreadId,
1576 "OUTPUT_DEBUG_STRING_EVENT"));
dfe7f3ac
CF
1577 if (saw_create != 1)
1578 break;
a244bdca 1579 retval = handle_output_debug_string (ourstatus);
1e37c281 1580 break;
9d3789f7 1581
1e37c281 1582 default:
dfe7f3ac
CF
1583 if (saw_create != 1)
1584 break;
29fe111d
CF
1585 printf_unfiltered ("gdb: kernel event for pid=%ld tid=%ld\n",
1586 (DWORD) current_event.dwProcessId,
1587 (DWORD) current_event.dwThreadId);
1588 printf_unfiltered (" unknown event code %ld\n",
1e37c281
JM
1589 current_event.dwDebugEventCode);
1590 break;
1591 }
1592
dfe7f3ac 1593 if (!retval || saw_create != 1)
a244bdca
CF
1594 {
1595 if (continue_status == -1)
02529b48 1596 windows_resume (ops, minus_one_ptid, 0, 1);
a244bdca 1597 else
dc05df57 1598 CHECK (windows_continue (continue_status, -1));
a244bdca 1599 }
450005e7 1600 else
9d3789f7 1601 {
2dc38344
PA
1602 inferior_ptid = ptid_build (current_event.dwProcessId, 0,
1603 retval);
3ade5333 1604 current_thread = th ?: thread_rec (current_event.dwThreadId, TRUE);
9d3789f7 1605 }
1e37c281
JM
1606
1607out:
450005e7 1608 return retval;
1e37c281
JM
1609}
1610
2dc38344 1611/* Wait for interesting events to occur in the target process. */
39f77062 1612static ptid_t
117de6a9 1613windows_wait (struct target_ops *ops,
47608cb1 1614 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
24e60978 1615{
2dc38344 1616 int pid = -1;
39f77062 1617
c44537cf
CV
1618 target_terminal_ours ();
1619
24e60978
SC
1620 /* We loop when we get a non-standard exception rather than return
1621 with a SPURIOUS because resume can try and step or modify things,
3cee93ac 1622 which needs a current_thread->h. But some of these exceptions mark
24e60978 1623 the birth or death of threads, which mean that the current thread
581e13c1 1624 isn't necessarily what you think it is. */
24e60978
SC
1625
1626 while (1)
450005e7 1627 {
c57918b2 1628 int retval;
2b008701 1629
695de547
CF
1630 /* If the user presses Ctrl-c while the debugger is waiting
1631 for an event, he expects the debugger to interrupt his program
1632 and to get the prompt back. There are two possible situations:
1633
1634 - The debugger and the program do not share the console, in
1635 which case the Ctrl-c event only reached the debugger.
1636 In that case, the ctrl_c handler will take care of interrupting
581e13c1
MS
1637 the inferior. Note that this case is working starting with
1638 Windows XP. For Windows 2000, Ctrl-C should be pressed in the
695de547
CF
1639 inferior console.
1640
1641 - The debugger and the program share the same console, in which
1642 case both debugger and inferior will receive the Ctrl-c event.
1643 In that case the ctrl_c handler will ignore the event, as the
1644 Ctrl-c event generated inside the inferior will trigger the
1645 expected debug event.
1646
1647 FIXME: brobecker/2008-05-20: If the inferior receives the
1648 signal first and the delay until GDB receives that signal
1649 is sufficiently long, GDB can sometimes receive the SIGINT
1650 after we have unblocked the CTRL+C handler. This would
1651 lead to the debugger stopping prematurely while handling
1652 the new-thread event that comes with the handling of the SIGINT
1653 inside the inferior, and then stop again immediately when
1654 the user tries to resume the execution in the inferior.
1655 This is a classic race that we should try to fix one day. */
1656 SetConsoleCtrlHandler (&ctrl_c_handler, TRUE);
28439f5e 1657 retval = get_windows_debug_event (ops, pid, ourstatus);
695de547 1658 SetConsoleCtrlHandler (&ctrl_c_handler, FALSE);
c57918b2 1659
450005e7 1660 if (retval)
2dc38344 1661 return ptid_build (current_event.dwProcessId, 0, retval);
450005e7
CF
1662 else
1663 {
1664 int detach = 0;
3cee93ac 1665
98bbd631
AC
1666 if (deprecated_ui_loop_hook != NULL)
1667 detach = deprecated_ui_loop_hook (0);
0714f9bf 1668
450005e7 1669 if (detach)
7d85a9c0 1670 windows_kill_inferior (ops);
450005e7
CF
1671 }
1672 }
24e60978
SC
1673}
1674
9d3789f7 1675static void
dc05df57 1676do_initial_windows_stuff (struct target_ops *ops, DWORD pid, int attaching)
9d3789f7
CF
1677{
1678 extern int stop_after_trap;
fa4ba8da 1679 int i;
d6b48e9c 1680 struct inferior *inf;
2020b7ab 1681 struct thread_info *tp;
9d3789f7 1682
7393af7c 1683 last_sig = TARGET_SIGNAL_0;
9d3789f7
CF
1684 event_count = 0;
1685 exception_count = 0;
bf25528d 1686 open_process_used = 0;
fa4ba8da 1687 debug_registers_changed = 0;
dfe7f3ac 1688 debug_registers_used = 0;
fa4ba8da
PM
1689 for (i = 0; i < sizeof (dr) / sizeof (dr[0]); i++)
1690 dr[i] = 0;
10325bc5 1691#ifdef __CYGWIN__
de1b3c3d 1692 cygwin_load_start = cygwin_load_end = 0;
10325bc5 1693#endif
9d3789f7
CF
1694 current_event.dwProcessId = pid;
1695 memset (&current_event, 0, sizeof (current_event));
0795be10 1696 push_target (ops);
cb851954 1697 disable_breakpoints_in_shlibs ();
dc05df57 1698 windows_clear_solib ();
9d3789f7
CF
1699 clear_proceed_status ();
1700 init_wait_for_inferior ();
1701
6c95b8df
PA
1702 inf = current_inferior ();
1703 inferior_appeared (inf, pid);
181e7f93 1704 inf->attach_flag = attaching;
7f9f62ba 1705
9f9d052e
PM
1706 /* Make the new process the current inferior, so terminal handling
1707 can rely on it. When attaching, we don't know about any thread
1708 id here, but that's OK --- nothing should be referencing the
dc05df57 1709 current thread until we report an event out of windows_wait. */
9f9d052e
PM
1710 inferior_ptid = pid_to_ptid (pid);
1711
c44537cf 1712 terminal_init_inferior_with_pgrp (pid);
9d3789f7
CF
1713 target_terminal_inferior ();
1714
16d905e2 1715 windows_initialization_done = 0;
16c381f0 1716 inf->control.stop_soon = STOP_QUIETLY;
9d3789f7
CF
1717 while (1)
1718 {
1719 stop_after_trap = 1;
e4c8541f 1720 wait_for_inferior ();
2020b7ab 1721 tp = inferior_thread ();
16c381f0
JK
1722 if (tp->suspend.stop_signal != TARGET_SIGNAL_TRAP)
1723 resume (0, tp->suspend.stop_signal);
9d3789f7
CF
1724 else
1725 break;
1726 }
eff8332b 1727
16d905e2 1728 windows_initialization_done = 1;
16c381f0 1729 inf->control.stop_soon = NO_STOP_QUIETLY;
9d3789f7
CF
1730 stop_after_trap = 0;
1731 return;
1732}
1733
616a9dc4
CV
1734/* Try to set or remove a user privilege to the current process. Return -1
1735 if that fails, the previous setting of that privilege otherwise.
1736
1737 This code is copied from the Cygwin source code and rearranged to allow
1738 dynamically loading of the needed symbols from advapi32 which is only
581e13c1 1739 available on NT/2K/XP. */
616a9dc4
CV
1740static int
1741set_process_privilege (const char *privilege, BOOL enable)
1742{
616a9dc4
CV
1743 HANDLE token_hdl = NULL;
1744 LUID restore_priv;
1745 TOKEN_PRIVILEGES new_priv, orig_priv;
1746 int ret = -1;
1747 DWORD size;
1748
616a9dc4
CV
1749 if (!OpenProcessToken (GetCurrentProcess (),
1750 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
1751 &token_hdl))
1752 goto out;
1753
418c6cb3 1754 if (!LookupPrivilegeValueA (NULL, privilege, &restore_priv))
616a9dc4
CV
1755 goto out;
1756
1757 new_priv.PrivilegeCount = 1;
1758 new_priv.Privileges[0].Luid = restore_priv;
1759 new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0;
1760
1761 if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv,
295732ea 1762 sizeof orig_priv, &orig_priv, &size))
616a9dc4
CV
1763 goto out;
1764#if 0
1765 /* Disabled, otherwise every `attach' in an unprivileged user session
1766 would raise the "Failed to get SE_DEBUG_NAME privilege" warning in
581e13c1 1767 windows_attach(). */
616a9dc4 1768 /* AdjustTokenPrivileges returns TRUE even if the privilege could not
581e13c1 1769 be enabled. GetLastError () returns an correct error code, though. */
616a9dc4
CV
1770 if (enable && GetLastError () == ERROR_NOT_ALL_ASSIGNED)
1771 goto out;
1772#endif
1773
1774 ret = orig_priv.Privileges[0].Attributes == SE_PRIVILEGE_ENABLED ? 1 : 0;
1775
1776out:
1777 if (token_hdl)
1778 CloseHandle (token_hdl);
1779
1780 return ret;
1781}
1782
02cc9f49 1783/* Attach to process PID, then initialize for debugging it. */
24e60978 1784static void
dc05df57 1785windows_attach (struct target_ops *ops, char *args, int from_tty)
24e60978
SC
1786{
1787 BOOL ok;
559e75c0 1788 DWORD pid;
24e60978 1789
74164c56 1790 pid = parse_pid_to_attach (args);
24e60978 1791
616a9dc4
CV
1792 if (set_process_privilege (SE_DEBUG_NAME, TRUE) < 0)
1793 {
1794 printf_unfiltered ("Warning: Failed to get SE_DEBUG_NAME privilege\n");
581e13c1
MS
1795 printf_unfiltered ("This can cause attach to "
1796 "fail on Windows NT/2K/XP\n");
616a9dc4
CV
1797 }
1798
dc05df57 1799 windows_init_thread_list ();
9d3789f7 1800 ok = DebugActiveProcess (pid);
91a175b3 1801 saw_create = 0;
24e60978 1802
10325bc5 1803#ifdef __CYGWIN__
24e60978 1804 if (!ok)
baa93fa6 1805 {
581e13c1 1806 /* Try fall back to Cygwin pid. */
baa93fa6
CF
1807 pid = cygwin_internal (CW_CYGWIN_PID_TO_WINPID, pid);
1808
1809 if (pid > 0)
1810 ok = DebugActiveProcess (pid);
10325bc5
PA
1811 }
1812#endif
baa93fa6 1813
10325bc5
PA
1814 if (!ok)
1815 error (_("Can't attach to process."));
24e60978 1816
2b008701 1817 DebugSetProcessKillOnExit (FALSE);
3ade5333 1818
24e60978
SC
1819 if (from_tty)
1820 {
1821 char *exec_file = (char *) get_exec_file (0);
1822
1823 if (exec_file)
1824 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
39f77062 1825 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1826 else
1827 printf_unfiltered ("Attaching to %s\n",
39f77062 1828 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1829
1830 gdb_flush (gdb_stdout);
1831 }
1832
dc05df57 1833 do_initial_windows_stuff (ops, pid, 1);
9d3789f7 1834 target_terminal_ours ();
24e60978
SC
1835}
1836
24e60978 1837static void
dc05df57 1838windows_detach (struct target_ops *ops, char *args, int from_tty)
24e60978 1839{
02cc9f49
CV
1840 int detached = 1;
1841
2b008701
CF
1842 ptid_t ptid = {-1};
1843 windows_resume (ops, ptid, 0, TARGET_SIGNAL_0);
96998ce7 1844
2b008701
CF
1845 if (!DebugActiveProcessStop (current_event.dwProcessId))
1846 {
1847 error (_("Can't detach process %lu (error %lu)"),
1848 current_event.dwProcessId, GetLastError ());
1849 detached = 0;
02cc9f49 1850 }
2b008701
CF
1851 DebugSetProcessKillOnExit (FALSE);
1852
02cc9f49 1853 if (detached && from_tty)
24e60978
SC
1854 {
1855 char *exec_file = get_exec_file (0);
1856 if (exec_file == 0)
1857 exec_file = "";
02cc9f49
CV
1858 printf_unfiltered ("Detaching from program: %s, Pid %lu\n", exec_file,
1859 current_event.dwProcessId);
24e60978
SC
1860 gdb_flush (gdb_stdout);
1861 }
7f9f62ba 1862
39f77062 1863 inferior_ptid = null_ptid;
7f9f62ba
PA
1864 detach_inferior (current_event.dwProcessId);
1865
0795be10 1866 unpush_target (ops);
24e60978
SC
1867}
1868
3ee6f623 1869static char *
dc05df57 1870windows_pid_to_exec_file (int pid)
47216e51 1871{
b3c613f2 1872 static char path[__PMAX];
10325bc5 1873#ifdef __CYGWIN__
581e13c1 1874 /* Try to find exe name as symlink target of /proc/<pid>/exe. */
33605d39
CF
1875 int nchars;
1876 char procexe[sizeof ("/proc/4294967295/exe")];
2dc38344 1877 sprintf (procexe, "/proc/%u/exe", pid);
33605d39
CF
1878 nchars = readlink (procexe, path, sizeof(path));
1879 if (nchars > 0 && nchars < sizeof (path))
47216e51 1880 {
33605d39
CF
1881 path[nchars] = '\0'; /* Got it */
1882 return path;
47216e51 1883 }
10325bc5
PA
1884#endif
1885
33605d39 1886 /* If we get here then either Cygwin is hosed, this isn't a Cygwin version
581e13c1 1887 of gdb, or we're trying to debug a non-Cygwin windows executable. */
33605d39
CF
1888 if (!get_module_name (0, path))
1889 path[0] = '\0';
1890
1891 return path;
47216e51
CV
1892}
1893
24e60978
SC
1894/* Print status information about what we're accessing. */
1895
1896static void
dc05df57 1897windows_files_info (struct target_ops *ignore)
24e60978 1898{
181e7f93
PA
1899 struct inferior *inf = current_inferior ();
1900
24e60978 1901 printf_unfiltered ("\tUsing the running image of %s %s.\n",
181e7f93
PA
1902 inf->attach_flag ? "attached" : "child",
1903 target_pid_to_str (inferior_ptid));
24e60978
SC
1904}
1905
24e60978 1906static void
dc05df57 1907windows_open (char *arg, int from_tty)
24e60978 1908{
8a3fe4f8 1909 error (_("Use the \"run\" command to start a Unix child process."));
24e60978
SC
1910}
1911
cd44747c
PM
1912/* Modify CreateProcess parameters for use of a new separate console.
1913 Parameters are:
1914 *FLAGS: DWORD parameter for general process creation flags.
1915 *SI: STARTUPINFO structure, for which the console window size and
1916 console buffer size is filled in if GDB is running in a console.
1917 to create the new console.
1918 The size of the used font is not available on all versions of
1919 Windows OS. Furthermore, the current font might not be the default
1920 font, but this is still better than before.
1921 If the windows and buffer sizes are computed,
1922 SI->DWFLAGS is changed so that this information is used
1923 by CreateProcess function. */
1924
1925static void
1926windows_set_console_info (STARTUPINFO *si, DWORD *flags)
1927{
1928 HANDLE hconsole = CreateFile ("CONOUT$", GENERIC_READ | GENERIC_WRITE,
1929 FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, 0);
1930
1931 if (hconsole != INVALID_HANDLE_VALUE)
1932 {
1933 CONSOLE_SCREEN_BUFFER_INFO sbinfo;
1934 COORD font_size;
1935 CONSOLE_FONT_INFO cfi;
1936
1937 GetCurrentConsoleFont (hconsole, FALSE, &cfi);
1938 font_size = GetConsoleFontSize (hconsole, cfi.nFont);
1939 GetConsoleScreenBufferInfo(hconsole, &sbinfo);
1940 si->dwXSize = sbinfo.srWindow.Right - sbinfo.srWindow.Left + 1;
1941 si->dwYSize = sbinfo.srWindow.Bottom - sbinfo.srWindow.Top + 1;
1942 if (font_size.X)
1943 si->dwXSize *= font_size.X;
1944 else
1945 si->dwXSize *= 8;
1946 if (font_size.Y)
1947 si->dwYSize *= font_size.Y;
1948 else
1949 si->dwYSize *= 12;
1950 si->dwXCountChars = sbinfo.dwSize.X;
1951 si->dwYCountChars = sbinfo.dwSize.Y;
1952 si->dwFlags |= STARTF_USESIZE | STARTF_USECOUNTCHARS;
1953 }
1954 *flags |= CREATE_NEW_CONSOLE;
1955}
1956
c93dbcba
EZ
1957#ifndef __CYGWIN__
1958/* Function called by qsort to sort environment strings. */
1959
1960static int
1961envvar_cmp (const void *a, const void *b)
1962{
1963 const char **p = (const char **) a;
1964 const char **q = (const char **) b;
1965 return strcasecmp (*p, *q);
1966}
1967#endif
1968
b7ff339d
CV
1969#ifdef __CYGWIN__
1970static void
1971clear_win32_environment (char **env)
1972{
1973 int i;
1974 size_t len;
1975 wchar_t *copy = NULL, *equalpos;
1976
1977 for (i = 0; env[i] && *env[i]; i++)
1978 {
1979 len = mbstowcs (NULL, env[i], 0) + 1;
1980 copy = (wchar_t *) xrealloc (copy, len * sizeof (wchar_t));
1981 mbstowcs (copy, env[i], len);
1982 equalpos = wcschr (copy, L'=');
1983 if (equalpos)
1984 *equalpos = L'\0';
1985 SetEnvironmentVariableW (copy, NULL);
1986 }
1987 xfree (copy);
1988}
1989#endif
1990
dc05df57 1991/* Start an inferior windows child process and sets inferior_ptid to its pid.
24e60978
SC
1992 EXEC_FILE is the file to run.
1993 ALLARGS is a string containing the arguments to the program.
1994 ENV is the environment vector to pass. Errors reported with error(). */
1995
24e60978 1996static void
dc05df57 1997windows_create_inferior (struct target_ops *ops, char *exec_file,
136d6dae 1998 char *allargs, char **in_env, int from_tty)
24e60978 1999{
b3c613f2 2000 STARTUPINFO si;
41b4aadc 2001#ifdef __CYGWIN__
b3c613f2
CF
2002 cygwin_buf_t real_path[__PMAX];
2003 cygwin_buf_t shell[__PMAX]; /* Path to shell */
d0d0ab16 2004 const char *sh;
b3c613f2
CF
2005 cygwin_buf_t *toexec;
2006 cygwin_buf_t *cygallargs;
2007 cygwin_buf_t *args;
b7ff339d
CV
2008 char **old_env = NULL;
2009 PWCHAR w32_env;
d0d0ab16 2010 size_t len;
2becadee
CF
2011 int tty;
2012 int ostdin, ostdout, ostderr;
41b4aadc 2013#else
b3c613f2
CF
2014 char real_path[__PMAX];
2015 char shell[__PMAX]; /* Path to shell */
d0d0ab16
CV
2016 char *toexec;
2017 char *args;
41b4aadc 2018 HANDLE tty;
c93dbcba
EZ
2019 char *w32env;
2020 char *temp;
2021 size_t envlen;
2022 int i;
2023 size_t envsize;
2024 char **env;
41b4aadc 2025#endif
d0d0ab16
CV
2026 PROCESS_INFORMATION pi;
2027 BOOL ret;
2028 DWORD flags = 0;
3cb3b8df 2029 const char *inferior_io_terminal = get_inferior_io_terminal ();
24e60978
SC
2030
2031 if (!exec_file)
8a3fe4f8 2032 error (_("No executable specified, use `target exec'."));
24e60978
SC
2033
2034 memset (&si, 0, sizeof (si));
2035 si.cb = sizeof (si);
2036
d0d0ab16
CV
2037 if (new_group)
2038 flags |= CREATE_NEW_PROCESS_GROUP;
2039
2040 if (new_console)
cd44747c 2041 windows_set_console_info (&si, &flags);
d0d0ab16 2042
10325bc5 2043#ifdef __CYGWIN__
349b409f 2044 if (!useshell)
dfe7f3ac 2045 {
d0d0ab16
CV
2046 flags |= DEBUG_ONLY_THIS_PROCESS;
2047 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, exec_file, real_path,
b3c613f2 2048 __PMAX * sizeof (cygwin_buf_t)) < 0)
d0d0ab16 2049 error (_("Error starting executable: %d"), errno);
dfe7f3ac 2050 toexec = real_path;
b3c613f2 2051#ifdef __USEWIDE
d0d0ab16
CV
2052 len = mbstowcs (NULL, allargs, 0) + 1;
2053 if (len == (size_t) -1)
2054 error (_("Error starting executable: %d"), errno);
2055 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2056 mbstowcs (cygallargs, allargs, len);
60c5c021
CF
2057#else
2058 cygallargs = allargs;
b3c613f2 2059#endif
dfe7f3ac
CF
2060 }
2061 else
2062 {
349b409f
CF
2063 sh = getenv ("SHELL");
2064 if (!sh)
2065 sh = "/bin/sh";
b3c613f2 2066 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, sh, shell, __PMAX) < 0)
d0d0ab16 2067 error (_("Error starting executable via shell: %d"), errno);
b3c613f2 2068#ifdef __USEWIDE
d0d0ab16
CV
2069 len = sizeof (L" -c 'exec '") + mbstowcs (NULL, exec_file, 0)
2070 + mbstowcs (NULL, allargs, 0) + 2;
2071 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2072 swprintf (cygallargs, len, L" -c 'exec %s %s'", exec_file, allargs);
b3c613f2 2073#else
581e13c1
MS
2074 cygallargs = (char *)
2075 alloca (sizeof (" -c 'exec '") + strlen (exec_file)
b3c613f2
CF
2076 + strlen (allargs) + 2);
2077 sprintf (cygallargs, " -c 'exec %s %s'", exec_file, allargs);
2078#endif
dfe7f3ac 2079 toexec = shell;
d0d0ab16 2080 flags |= DEBUG_PROCESS;
dfe7f3ac 2081 }
b3c613f2
CF
2082
2083#ifdef __USEWIDE
2084 args = (cygwin_buf_t *) alloca ((wcslen (toexec) + wcslen (cygallargs) + 2)
2085 * sizeof (wchar_t));
d0d0ab16
CV
2086 wcscpy (args, toexec);
2087 wcscat (args, L" ");
2088 wcscat (args, cygallargs);
b3c613f2
CF
2089#else
2090 args = (cygwin_buf_t *) alloca (strlen (toexec) + strlen (cygallargs) + 2);
2091 strcpy (args, toexec);
2092 strcat (args, " ");
2093 strcat (args, cygallargs);
2094#endif
2095
b7ff339d
CV
2096#ifdef CW_CVT_ENV_TO_WINENV
2097 /* First try to create a direct Win32 copy of the POSIX environment. */
2098 w32_env = (PWCHAR) cygwin_internal (CW_CVT_ENV_TO_WINENV, in_env);
2099 if (w32_env != (PWCHAR) -1)
2100 flags |= CREATE_UNICODE_ENVIRONMENT;
2101 else
2102 /* If that fails, fall back to old method tweaking GDB's environment. */
2103#endif
2104 {
2105 /* Reset all Win32 environment variables to avoid leftover on next run. */
2106 clear_win32_environment (environ);
2107 /* Prepare the environment vars for CreateProcess. */
2108 old_env = environ;
2109 environ = in_env;
2110 cygwin_internal (CW_SYNC_WINENV);
2111 w32_env = NULL;
2112 }
1750a5ef 2113
2becadee
CF
2114 if (!inferior_io_terminal)
2115 tty = ostdin = ostdout = ostderr = -1;
2116 else
2117 {
2118 tty = open (inferior_io_terminal, O_RDWR | O_NOCTTY);
2119 if (tty < 0)
2120 {
2121 print_sys_errmsg (inferior_io_terminal, errno);
2122 ostdin = ostdout = ostderr = -1;
2123 }
2124 else
2125 {
2126 ostdin = dup (0);
2127 ostdout = dup (1);
2128 ostderr = dup (2);
2129 dup2 (tty, 0);
2130 dup2 (tty, 1);
2131 dup2 (tty, 2);
2132 }
2133 }
d0d0ab16
CV
2134
2135 windows_init_thread_list ();
b3c613f2
CF
2136 ret = CreateProcess (0,
2137 args, /* command line */
2138 NULL, /* Security */
2139 NULL, /* thread */
2140 TRUE, /* inherit handles */
2141 flags, /* start flags */
b7ff339d 2142 w32_env, /* environment */
b3c613f2
CF
2143 NULL, /* current directory */
2144 &si,
2145 &pi);
b7ff339d
CV
2146 if (w32_env)
2147 /* Just free the Win32 environment, if it could be created. */
2148 free (w32_env);
2149 else
2150 {
2151 /* Reset all environment variables to avoid leftover on next run. */
2152 clear_win32_environment (in_env);
2153 /* Restore normal GDB environment variables. */
2154 environ = old_env;
2155 cygwin_internal (CW_SYNC_WINENV);
2156 }
2157
d0d0ab16
CV
2158 if (tty >= 0)
2159 {
2160 close (tty);
2161 dup2 (ostdin, 0);
2162 dup2 (ostdout, 1);
2163 dup2 (ostderr, 2);
2164 close (ostdin);
2165 close (ostdout);
2166 close (ostderr);
2167 }
41b4aadc 2168#else
b3c613f2 2169 toexec = exec_file;
d0d0ab16
CV
2170 args = alloca (strlen (toexec) + strlen (allargs) + 2);
2171 strcpy (args, toexec);
2172 strcat (args, " ");
2173 strcat (args, allargs);
2174
d0d0ab16
CV
2175 flags |= DEBUG_ONLY_THIS_PROCESS;
2176
41b4aadc
CF
2177 if (!inferior_io_terminal)
2178 tty = INVALID_HANDLE_VALUE;
2179 else
2180 {
2181 SECURITY_ATTRIBUTES sa;
2182 sa.nLength = sizeof(sa);
2183 sa.lpSecurityDescriptor = 0;
2184 sa.bInheritHandle = TRUE;
2185 tty = CreateFileA (inferior_io_terminal, GENERIC_READ | GENERIC_WRITE,
2186 0, &sa, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
2187 if (tty == INVALID_HANDLE_VALUE)
2188 warning (_("Warning: Failed to open TTY %s, error %#x."),
2189 inferior_io_terminal, (unsigned) GetLastError ());
2190 else
2191 {
2192 si.hStdInput = tty;
2193 si.hStdOutput = tty;
2194 si.hStdError = tty;
2195 si.dwFlags |= STARTF_USESTDHANDLES;
2196 }
2197 }
2becadee 2198
c93dbcba
EZ
2199 /* CreateProcess takes the environment list as a null terminated set of
2200 strings (i.e. two nulls terminate the list). */
2201
2202 /* Get total size for env strings. */
2203 for (envlen = 0, i = 0; in_env[i] && *in_env[i]; i++)
2204 envlen += strlen (in_env[i]) + 1;
2205
2206 envsize = sizeof (in_env[0]) * (i + 1);
2207 env = (char **) alloca (envsize);
2208 memcpy (env, in_env, envsize);
2209 /* Windows programs expect the environment block to be sorted. */
2210 qsort (env, i, sizeof (char *), envvar_cmp);
2211
2212 w32env = alloca (envlen + 1);
2213
2214 /* Copy env strings into new buffer. */
2215 for (temp = w32env, i = 0; env[i] && *env[i]; i++)
2216 {
2217 strcpy (temp, env[i]);
2218 temp += strlen (temp) + 1;
2219 }
2220
2221 /* Final nil string to terminate new env. */
2222 *temp = 0;
2223
dc05df57 2224 windows_init_thread_list ();
d0d0ab16
CV
2225 ret = CreateProcessA (0,
2226 args, /* command line */
2227 NULL, /* Security */
2228 NULL, /* thread */
2229 TRUE, /* inherit handles */
2230 flags, /* start flags */
c93dbcba 2231 w32env, /* environment */
d0d0ab16
CV
2232 NULL, /* current directory */
2233 &si,
2234 &pi);
41b4aadc
CF
2235 if (tty != INVALID_HANDLE_VALUE)
2236 CloseHandle (tty);
10325bc5 2237#endif
2becadee 2238
24e60978 2239 if (!ret)
8a3fe4f8
AC
2240 error (_("Error creating process %s, (error %d)."),
2241 exec_file, (unsigned) GetLastError ());
24e60978 2242
c1766e7d
PM
2243 CloseHandle (pi.hThread);
2244 CloseHandle (pi.hProcess);
2245
dfe7f3ac
CF
2246 if (useshell && shell[0] != '\0')
2247 saw_create = -1;
2248 else
2249 saw_create = 0;
2250
dc05df57 2251 do_initial_windows_stuff (ops, pi.dwProcessId, 0);
d3a09475 2252
dc05df57 2253 /* windows_continue (DBG_CONTINUE, -1); */
24e60978
SC
2254}
2255
2256static void
dc05df57 2257windows_mourn_inferior (struct target_ops *ops)
24e60978 2258{
dc05df57 2259 (void) windows_continue (DBG_CONTINUE, -1);
fa4ba8da 2260 i386_cleanup_dregs();
bf25528d
CF
2261 if (open_process_used)
2262 {
2263 CHECK (CloseHandle (current_process_handle));
2264 open_process_used = 0;
2265 }
0795be10 2266 unpush_target (ops);
24e60978
SC
2267 generic_mourn_inferior ();
2268}
2269
24e60978 2270/* Send a SIGINT to the process group. This acts just like the user typed a
581e13c1 2271 ^C on the controlling terminal. */
24e60978 2272
b607efe7 2273static void
dc05df57 2274windows_stop (ptid_t ptid)
24e60978 2275{
1ef980b9 2276 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
1e37c281 2277 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
3a4b77d8 2278 registers_changed (); /* refresh register state */
24e60978
SC
2279}
2280
3ee6f623 2281static int
dc05df57 2282windows_xfer_memory (CORE_ADDR memaddr, gdb_byte *our, int len,
0a65a603
AC
2283 int write, struct mem_attrib *mem,
2284 struct target_ops *target)
24e60978 2285{
5732a500 2286 SIZE_T done = 0;
24e60978
SC
2287 if (write)
2288 {
29fe111d 2289 DEBUG_MEM (("gdb: write target memory, %d bytes at 0x%08lx\n",
2c647436 2290 len, (DWORD) (uintptr_t) memaddr));
2b008701 2291 if (!WriteProcessMemory (current_process_handle,
2c647436 2292 (LPVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2293 len, &done))
2294 done = 0;
2b008701 2295 FlushInstructionCache (current_process_handle,
2c647436 2296 (LPCVOID) (uintptr_t) memaddr, len);
24e60978
SC
2297 }
2298 else
2299 {
29fe111d 2300 DEBUG_MEM (("gdb: read target memory, %d bytes at 0x%08lx\n",
2c647436 2301 len, (DWORD) (uintptr_t) memaddr));
2b008701 2302 if (!ReadProcessMemory (current_process_handle,
2c647436 2303 (LPCVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2304 len, &done))
2305 done = 0;
24e60978
SC
2306 }
2307 return done;
2308}
2309
3ee6f623 2310static void
7d85a9c0 2311windows_kill_inferior (struct target_ops *ops)
24e60978 2312{
3cee93ac
CF
2313 CHECK (TerminateProcess (current_process_handle, 0));
2314
b5edcb45
ILT
2315 for (;;)
2316 {
dc05df57 2317 if (!windows_continue (DBG_CONTINUE, -1))
b5edcb45 2318 break;
3cee93ac 2319 if (!WaitForDebugEvent (&current_event, INFINITE))
b5edcb45 2320 break;
3cee93ac 2321 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
b5edcb45
ILT
2322 break;
2323 }
2324
581e13c1 2325 target_mourn_inferior (); /* Or just windows_mourn_inferior? */
24e60978
SC
2326}
2327
24e60978 2328static void
dc05df57 2329windows_prepare_to_store (struct regcache *regcache)
24e60978 2330{
581e13c1 2331 /* Do nothing, since we can store individual regs. */
24e60978
SC
2332}
2333
2334static int
dc05df57 2335windows_can_run (void)
24e60978
SC
2336{
2337 return 1;
2338}
2339
2340static void
dc05df57 2341windows_close (int x)
24e60978 2342{
dc05df57 2343 DEBUG_EVENTS (("gdb: windows_close, inferior_ptid=%d\n",
3bccec63 2344 PIDGET (inferior_ptid)));
24e60978 2345}
1ef980b9 2346
581e13c1 2347/* Convert pid to printable format. */
3ee6f623 2348static char *
117de6a9 2349windows_pid_to_str (struct target_ops *ops, ptid_t ptid)
24e60978 2350{
3ee6f623 2351 static char buf[80];
3ee6f623 2352
2dc38344
PA
2353 if (ptid_get_tid (ptid) != 0)
2354 {
2355 snprintf (buf, sizeof (buf), "Thread %d.0x%lx",
2356 ptid_get_pid (ptid), ptid_get_tid (ptid));
2357 return buf;
2358 }
2359
2360 return normal_pid_to_str (ptid);
3ee6f623
CF
2361}
2362
de1b3c3d 2363static LONGEST
dc05df57 2364windows_xfer_shared_libraries (struct target_ops *ops,
de1b3c3d
PA
2365 enum target_object object, const char *annex,
2366 gdb_byte *readbuf, const gdb_byte *writebuf,
2367 ULONGEST offset, LONGEST len)
3cb8e7f6 2368{
de1b3c3d
PA
2369 struct obstack obstack;
2370 const char *buf;
2371 LONGEST len_avail;
3cb8e7f6 2372 struct so_list *so;
3cb8e7f6 2373
de1b3c3d
PA
2374 if (writebuf)
2375 return -1;
3cb8e7f6 2376
de1b3c3d
PA
2377 obstack_init (&obstack);
2378 obstack_grow_str (&obstack, "<library-list>\n");
2379 for (so = solib_start.next; so; so = so->next)
581e13c1
MS
2380 windows_xfer_shared_library (so->so_name, (CORE_ADDR)
2381 (uintptr_t) so->lm_info->load_addr,
5af949e3 2382 target_gdbarch, &obstack);
de1b3c3d 2383 obstack_grow_str0 (&obstack, "</library-list>\n");
3cb8e7f6 2384
de1b3c3d
PA
2385 buf = obstack_finish (&obstack);
2386 len_avail = strlen (buf);
2387 if (offset >= len_avail)
2388 return 0;
3cb8e7f6 2389
de1b3c3d
PA
2390 if (len > len_avail - offset)
2391 len = len_avail - offset;
2392 memcpy (readbuf, buf + offset, len);
3cb8e7f6 2393
de1b3c3d
PA
2394 obstack_free (&obstack, NULL);
2395 return len;
3cb8e7f6
CF
2396}
2397
de1b3c3d 2398static LONGEST
dc05df57 2399windows_xfer_partial (struct target_ops *ops, enum target_object object,
de1b3c3d
PA
2400 const char *annex, gdb_byte *readbuf,
2401 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
3cb8e7f6 2402{
de1b3c3d 2403 switch (object)
3cb8e7f6 2404 {
de1b3c3d
PA
2405 case TARGET_OBJECT_MEMORY:
2406 if (readbuf)
2407 return (*ops->deprecated_xfer_memory) (offset, readbuf,
244e85c8 2408 len, 0/*read*/, NULL, ops);
de1b3c3d
PA
2409 if (writebuf)
2410 return (*ops->deprecated_xfer_memory) (offset, (gdb_byte *) writebuf,
2411 len, 1/*write*/, NULL, ops);
2412 return -1;
2413
2414 case TARGET_OBJECT_LIBRARIES:
dc05df57 2415 return windows_xfer_shared_libraries (ops, object, annex, readbuf,
de1b3c3d 2416 writebuf, offset, len);
3929abe9 2417
de1b3c3d
PA
2418 default:
2419 if (ops->beneath != NULL)
2420 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
2421 readbuf, writebuf, offset, len);
2422 return -1;
3929abe9 2423 }
02c5aecd
CF
2424}
2425
711e434b
PM
2426/* Provide thread local base, i.e. Thread Information Block address.
2427 Returns 1 if ptid is found and sets *ADDR to thread_local_base. */
2428
2429static int
2430windows_get_tib_address (ptid_t ptid, CORE_ADDR *addr)
2431{
2432 thread_info *th;
2433
2434 th = thread_rec (ptid_get_tid (ptid), 0);
2435 if (th == NULL)
2436 return 0;
2437
2438 if (addr != NULL)
2439 *addr = th->thread_local_base;
2440
2441 return 1;
2442}
2443
1e2f1c5c
JB
2444static ptid_t
2445windows_get_ada_task_ptid (long lwp, long thread)
2446{
2447 return ptid_build (ptid_get_pid (inferior_ptid), 0, lwp);
2448}
2449
3ee6f623 2450static void
dc05df57 2451init_windows_ops (void)
3ee6f623 2452{
dc05df57
CF
2453 windows_ops.to_shortname = "child";
2454 windows_ops.to_longname = "Win32 child process";
2455 windows_ops.to_doc = "Win32 child process (started by the \"run\" command).";
2456 windows_ops.to_open = windows_open;
2457 windows_ops.to_close = windows_close;
2458 windows_ops.to_attach = windows_attach;
2459 windows_ops.to_attach_no_wait = 1;
2460 windows_ops.to_detach = windows_detach;
2461 windows_ops.to_resume = windows_resume;
2462 windows_ops.to_wait = windows_wait;
2463 windows_ops.to_fetch_registers = windows_fetch_inferior_registers;
2464 windows_ops.to_store_registers = windows_store_inferior_registers;
2465 windows_ops.to_prepare_to_store = windows_prepare_to_store;
2466 windows_ops.deprecated_xfer_memory = windows_xfer_memory;
2467 windows_ops.to_xfer_partial = windows_xfer_partial;
2468 windows_ops.to_files_info = windows_files_info;
2469 windows_ops.to_insert_breakpoint = memory_insert_breakpoint;
2470 windows_ops.to_remove_breakpoint = memory_remove_breakpoint;
2471 windows_ops.to_terminal_init = terminal_init_inferior;
2472 windows_ops.to_terminal_inferior = terminal_inferior;
2473 windows_ops.to_terminal_ours_for_output = terminal_ours_for_output;
2474 windows_ops.to_terminal_ours = terminal_ours;
2475 windows_ops.to_terminal_save_ours = terminal_save_ours;
2476 windows_ops.to_terminal_info = child_terminal_info;
2477 windows_ops.to_kill = windows_kill_inferior;
2478 windows_ops.to_create_inferior = windows_create_inferior;
2479 windows_ops.to_mourn_inferior = windows_mourn_inferior;
2480 windows_ops.to_can_run = windows_can_run;
2481 windows_ops.to_thread_alive = windows_thread_alive;
2482 windows_ops.to_pid_to_str = windows_pid_to_str;
2483 windows_ops.to_stop = windows_stop;
2484 windows_ops.to_stratum = process_stratum;
c35b1492
PA
2485 windows_ops.to_has_all_memory = default_child_has_all_memory;
2486 windows_ops.to_has_memory = default_child_has_memory;
2487 windows_ops.to_has_stack = default_child_has_stack;
2488 windows_ops.to_has_registers = default_child_has_registers;
2489 windows_ops.to_has_execution = default_child_has_execution;
dc05df57 2490 windows_ops.to_pid_to_exec_file = windows_pid_to_exec_file;
1e2f1c5c 2491 windows_ops.to_get_ada_task_ptid = windows_get_ada_task_ptid;
711e434b 2492 windows_ops.to_get_tib_address = windows_get_tib_address;
9bb9e8ad 2493
5aca5a82
PM
2494 i386_use_watchpoints (&windows_ops);
2495
9bb9e8ad
PM
2496 i386_dr_low.set_control = cygwin_set_dr7;
2497 i386_dr_low.set_addr = cygwin_set_dr;
7b50312a 2498 i386_dr_low.get_addr = cygwin_get_dr;
9bb9e8ad 2499 i386_dr_low.get_status = cygwin_get_dr6;
7b50312a 2500 i386_dr_low.get_control = cygwin_get_dr7;
9bb9e8ad
PM
2501
2502 /* i386_dr_low.debug_register_length field is set by
2503 calling i386_set_debug_register_length function
2504 in processor windows specific native file. */
2505
dc05df57 2506 windows_ops.to_magic = OPS_MAGIC;
c719b714 2507}
24e60978 2508
3929abe9 2509static void
dc05df57 2510set_windows_aliases (char *argv0)
3929abe9
CF
2511{
2512 add_info_alias ("dll", "sharedlibrary", 1);
2513}
2514
24e60978 2515void
dc05df57 2516_initialize_windows_nat (void)
24e60978 2517{
fa58ee11
EZ
2518 struct cmd_list_element *c;
2519
dc05df57 2520 init_windows_ops ();
1ef980b9 2521
d0d0ab16
CV
2522#ifdef __CYGWIN__
2523 cygwin_internal (CW_SET_DOS_FILE_WARNING, 0);
2524#endif
2525
fa58ee11 2526 c = add_com ("dll-symbols", class_files, dll_symbol_command,
1bedd215 2527 _("Load dll library symbols from FILE."));
5ba2abeb 2528 set_cmd_completer (c, filename_completer);
450005e7
CF
2529
2530 add_com_alias ("sharedlibrary", "dll-symbols", class_alias, 1);
2531
70992597
PM
2532 add_com_alias ("add-shared-symbol-files", "dll-symbols", class_alias, 1);
2533
2534 add_com_alias ("assf", "dll-symbols", class_alias, 1);
2535
10325bc5 2536#ifdef __CYGWIN__
5bf193a2
AC
2537 add_setshow_boolean_cmd ("shell", class_support, &useshell, _("\
2538Set use of shell to start subprocess."), _("\
2539Show use of shell to start subprocess."), NULL,
2540 NULL,
2541 NULL, /* FIXME: i18n: */
2542 &setlist, &showlist);
2543
581e13c1
MS
2544 add_setshow_boolean_cmd ("cygwin-exceptions", class_support,
2545 &cygwin_exceptions, _("\
09280ddf
CF
2546Break when an exception is detected in the Cygwin DLL itself."), _("\
2547Show whether gdb breaks on exceptions in the Cygwin DLL itself."), NULL,
2548 NULL,
2549 NULL, /* FIXME: i18n: */
2550 &setlist, &showlist);
10325bc5 2551#endif
09280ddf 2552
5bf193a2
AC
2553 add_setshow_boolean_cmd ("new-console", class_support, &new_console, _("\
2554Set creation of new console when creating child process."), _("\
2555Show creation of new console when creating child process."), NULL,
2556 NULL,
2557 NULL, /* FIXME: i18n: */
2558 &setlist, &showlist);
2559
2560 add_setshow_boolean_cmd ("new-group", class_support, &new_group, _("\
2561Set creation of new group when creating child process."), _("\
2562Show creation of new group when creating child process."), NULL,
2563 NULL,
2564 NULL, /* FIXME: i18n: */
2565 &setlist, &showlist);
2566
2567 add_setshow_boolean_cmd ("debugexec", class_support, &debug_exec, _("\
2568Set whether to display execution in child process."), _("\
2569Show whether to display execution in child process."), NULL,
2570 NULL,
2571 NULL, /* FIXME: i18n: */
2572 &setlist, &showlist);
2573
2574 add_setshow_boolean_cmd ("debugevents", class_support, &debug_events, _("\
2575Set whether to display kernel events in child process."), _("\
2576Show whether to display kernel events in child process."), NULL,
2577 NULL,
2578 NULL, /* FIXME: i18n: */
2579 &setlist, &showlist);
2580
2581 add_setshow_boolean_cmd ("debugmemory", class_support, &debug_memory, _("\
2582Set whether to display memory accesses in child process."), _("\
2583Show whether to display memory accesses in child process."), NULL,
2584 NULL,
2585 NULL, /* FIXME: i18n: */
2586 &setlist, &showlist);
2587
2588 add_setshow_boolean_cmd ("debugexceptions", class_support,
2589 &debug_exceptions, _("\
2590Set whether to display kernel exceptions in child process."), _("\
2591Show whether to display kernel exceptions in child process."), NULL,
2592 NULL,
2593 NULL, /* FIXME: i18n: */
2594 &setlist, &showlist);
1ef980b9 2595
711e434b 2596 init_w32_command_list ();
c1748f97
PM
2597
2598 add_cmd ("selector", class_info, display_selectors,
1a966eab 2599 _("Display selectors infos."),
c1748f97 2600 &info_w32_cmdlist);
dc05df57
CF
2601 add_target (&windows_ops);
2602 deprecated_init_ui_hook = set_windows_aliases;
24e60978 2603}
3cee93ac 2604
fa4ba8da
PM
2605/* Hardware watchpoint support, adapted from go32-nat.c code. */
2606
2607/* Pass the address ADDR to the inferior in the I'th debug register.
2608 Here we just store the address in dr array, the registers will be
dc05df57 2609 actually set up when windows_continue is called. */
9bb9e8ad 2610static void
fa4ba8da
PM
2611cygwin_set_dr (int i, CORE_ADDR addr)
2612{
2613 if (i < 0 || i > 3)
2614 internal_error (__FILE__, __LINE__,
e2e0b3e5 2615 _("Invalid register %d in cygwin_set_dr.\n"), i);
41b4aadc 2616 dr[i] = addr;
fa4ba8da
PM
2617 debug_registers_changed = 1;
2618 debug_registers_used = 1;
2619}
2620
2621/* Pass the value VAL to the inferior in the DR7 debug control
2622 register. Here we just store the address in D_REGS, the watchpoint
dc05df57 2623 will be actually set up in windows_wait. */
9bb9e8ad
PM
2624static void
2625cygwin_set_dr7 (unsigned long val)
fa4ba8da 2626{
9bb9e8ad 2627 dr[7] = (CORE_ADDR) val;
fa4ba8da
PM
2628 debug_registers_changed = 1;
2629 debug_registers_used = 1;
2630}
2631
7b50312a
PA
2632/* Get the value of debug register I from the inferior. */
2633
2634static CORE_ADDR
2635cygwin_get_dr (int i)
2636{
2637 return dr[i];
2638}
2639
fa4ba8da
PM
2640/* Get the value of the DR6 debug status register from the inferior.
2641 Here we just return the value stored in dr[6]
2642 by the last call to thread_rec for current_event.dwThreadId id. */
9bb9e8ad 2643static unsigned long
fa4ba8da
PM
2644cygwin_get_dr6 (void)
2645{
9bb9e8ad 2646 return (unsigned long) dr[6];
fa4ba8da
PM
2647}
2648
7b50312a
PA
2649/* Get the value of the DR7 debug status register from the inferior.
2650 Here we just return the value stored in dr[7] by the last call to
2651 thread_rec for current_event.dwThreadId id. */
2652
2653static unsigned long
2654cygwin_get_dr7 (void)
2655{
2656 return (unsigned long) dr[7];
2657}
2658
2dc38344 2659/* Determine if the thread referenced by "ptid" is alive
3cee93ac 2660 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
581e13c1 2661 it means that the thread has died. Otherwise it is assumed to be alive. */
3cee93ac 2662static int
28439f5e 2663windows_thread_alive (struct target_ops *ops, ptid_t ptid)
3cee93ac 2664{
2dc38344
PA
2665 int tid;
2666
2667 gdb_assert (ptid_get_tid (ptid) != 0);
2668 tid = ptid_get_tid (ptid);
39f77062 2669
581e13c1
MS
2670 return WaitForSingleObject (thread_rec (tid, FALSE)->h, 0) == WAIT_OBJECT_0
2671 ? FALSE : TRUE;
3cee93ac
CF
2672}
2673
2a3d5645
CF
2674void
2675_initialize_check_for_gdb_ini (void)
2676{
2677 char *homedir;
2678 if (inhibit_gdbinit)
2679 return;
2680
2681 homedir = getenv ("HOME");
2682 if (homedir)
2683 {
2684 char *p;
2685 char *oldini = (char *) alloca (strlen (homedir) +
2686 sizeof ("/gdb.ini"));
2687 strcpy (oldini, homedir);
2688 p = strchr (oldini, '\0');
0ba1096a 2689 if (p > oldini && !IS_DIR_SEPARATOR (p[-1]))
2a3d5645
CF
2690 *p++ = '/';
2691 strcpy (p, "gdb.ini");
2692 if (access (oldini, 0) == 0)
2693 {
2694 int len = strlen (oldini);
2695 char *newini = alloca (len + 1);
dfe7f3ac 2696 sprintf (newini, "%.*s.gdbinit",
58fa08f0 2697 (int) (len - (sizeof ("gdb.ini") - 1)), oldini);
8a3fe4f8 2698 warning (_("obsolete '%s' found. Rename to '%s'."), oldini, newini);
2a3d5645
CF
2699 }
2700 }
2701}
33605d39 2702
2b008701 2703/* Define dummy functions which always return error for the rare cases where
581e13c1 2704 these functions could not be found. */
2b008701
CF
2705static BOOL WINAPI
2706bad_DebugActiveProcessStop (DWORD w)
2707{
2708 return FALSE;
2709}
2710static BOOL WINAPI
2711bad_DebugBreakProcess (HANDLE w)
2712{
2713 return FALSE;
2714}
2715static BOOL WINAPI
2716bad_DebugSetProcessKillOnExit (BOOL w)
2717{
2718 return FALSE;
2719}
2720static BOOL WINAPI
2721bad_EnumProcessModules (HANDLE w, HMODULE *x, DWORD y, LPDWORD z)
2722{
2723 return FALSE;
2724}
b3c613f2
CF
2725
2726#ifdef __USEWIDE
2b008701 2727static DWORD WINAPI
b3c613f2 2728bad_GetModuleFileNameExW (HANDLE w, HMODULE x, LPWSTR y, DWORD z)
2b008701
CF
2729{
2730 return 0;
2731}
d0d0ab16
CV
2732#else
2733static DWORD WINAPI
b3c613f2 2734bad_GetModuleFileNameExA (HANDLE w, HMODULE x, LPSTR y, DWORD z)
d0d0ab16
CV
2735{
2736 return 0;
2737}
2738#endif
b3c613f2 2739
2b008701
CF
2740static BOOL WINAPI
2741bad_GetModuleInformation (HANDLE w, HMODULE x, LPMODULEINFO y, DWORD z)
2742{
2743 return FALSE;
2744}
2745
418c6cb3
CF
2746static BOOL WINAPI
2747bad_OpenProcessToken (HANDLE w, DWORD x, PHANDLE y)
2748{
2749 return FALSE;
2750}
2751
cd44747c
PM
2752static BOOL WINAPI
2753bad_GetCurrentConsoleFont (HANDLE w, BOOL bMaxWindow, CONSOLE_FONT_INFO *f)
2754{
2755 f->nFont = 0;
2756 return 1;
2757}
2758static COORD WINAPI
2759bad_GetConsoleFontSize (HANDLE w, DWORD nFont)
2760{
2761 COORD size;
2762 size.X = 8;
2763 size.Y = 12;
2764 return size;
2765}
2766
2b008701 2767/* Load any functions which may not be available in ancient versions
581e13c1 2768 of Windows. */
33605d39 2769void
2b008701 2770_initialize_loadable (void)
33605d39 2771{
2b008701
CF
2772 HMODULE hm = NULL;
2773
2774 hm = LoadLibrary ("kernel32.dll");
2775 if (hm)
33605d39 2776 {
b3c613f2 2777 DebugActiveProcessStop = (void *)
2b008701 2778 GetProcAddress (hm, "DebugActiveProcessStop");
b3c613f2 2779 DebugBreakProcess = (void *)
2b008701 2780 GetProcAddress (hm, "DebugBreakProcess");
b3c613f2 2781 DebugSetProcessKillOnExit = (void *)
2b008701 2782 GetProcAddress (hm, "DebugSetProcessKillOnExit");
cd44747c
PM
2783 GetConsoleFontSize = (void *)
2784 GetProcAddress (hm, "GetConsoleFontSize");
2785 GetCurrentConsoleFont = (void *)
2786 GetProcAddress (hm, "GetCurrentConsoleFont");
2b008701 2787 }
33605d39 2788
2b008701 2789 /* Set variables to dummy versions of these processes if the function
581e13c1 2790 wasn't found in kernel32.dll. */
b3c613f2
CF
2791 if (!DebugBreakProcess)
2792 DebugBreakProcess = bad_DebugBreakProcess;
2793 if (!DebugActiveProcessStop || !DebugSetProcessKillOnExit)
2b008701 2794 {
b3c613f2
CF
2795 DebugActiveProcessStop = bad_DebugActiveProcessStop;
2796 DebugSetProcessKillOnExit = bad_DebugSetProcessKillOnExit;
2b008701 2797 }
cd44747c
PM
2798 if (!GetConsoleFontSize)
2799 GetConsoleFontSize = bad_GetConsoleFontSize;
2800 if (!GetCurrentConsoleFont)
2801 GetCurrentConsoleFont = bad_GetCurrentConsoleFont;
33605d39 2802
2b008701 2803 /* Load optional functions used for retrieving filename information
581e13c1 2804 associated with the currently debugged process or its dlls. */
2b008701
CF
2805 hm = LoadLibrary ("psapi.dll");
2806 if (hm)
2807 {
b3c613f2 2808 EnumProcessModules = (void *)
2b008701 2809 GetProcAddress (hm, "EnumProcessModules");
b3c613f2 2810 GetModuleInformation = (void *)
2b008701 2811 GetProcAddress (hm, "GetModuleInformation");
b3c613f2
CF
2812 GetModuleFileNameEx = (void *)
2813 GetProcAddress (hm, GetModuleFileNameEx_name);
33605d39
CF
2814 }
2815
b3c613f2 2816 if (!EnumProcessModules || !GetModuleInformation || !GetModuleFileNameEx)
2b008701
CF
2817 {
2818 /* Set variables to dummy versions of these processes if the function
581e13c1 2819 wasn't found in psapi.dll. */
b3c613f2
CF
2820 EnumProcessModules = bad_EnumProcessModules;
2821 GetModuleInformation = bad_GetModuleInformation;
2822 GetModuleFileNameEx = bad_GetModuleFileNameEx;
581e13c1
MS
2823 /* This will probably fail on Windows 9x/Me. Let the user know
2824 that we're missing some functionality. */
2825 warning(_("\
2826cannot automatically find executable file or library to read symbols.\n\
2827Use \"file\" or \"dll\" command to load executable/libraries directly."));
418c6cb3
CF
2828 }
2829
2830 hm = LoadLibrary ("advapi32.dll");
2831 if (hm)
2832 {
b3c613f2
CF
2833 OpenProcessToken = (void *) GetProcAddress (hm, "OpenProcessToken");
2834 LookupPrivilegeValueA = (void *)
418c6cb3 2835 GetProcAddress (hm, "LookupPrivilegeValueA");
b3c613f2 2836 AdjustTokenPrivileges = (void *)
418c6cb3
CF
2837 GetProcAddress (hm, "AdjustTokenPrivileges");
2838 /* Only need to set one of these since if OpenProcessToken fails nothing
581e13c1
MS
2839 else is needed. */
2840 if (!OpenProcessToken || !LookupPrivilegeValueA
2841 || !AdjustTokenPrivileges)
b3c613f2 2842 OpenProcessToken = bad_OpenProcessToken;
2b008701 2843 }
33605d39 2844}
This page took 1.586769 seconds and 4 git commands to generate.