gdbserver/Windows: Rely purely on event info when handling DLL load event
[deliverable/binutils-gdb.git] / gdb / gdbserver / win32-low.c
1 /* Low level interface to Windows debugging, for gdbserver.
2 Copyright (C) 2006-2014 Free Software Foundation, Inc.
3
4 Contributed by Leo Zayas. Based on "win32-nat.c" from GDB.
5
6 This file is part of GDB.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>. */
20
21 #include "server.h"
22 #include "regcache.h"
23 #include "gdb/signals.h"
24 #include "gdb/fileio.h"
25 #include "mem-break.h"
26 #include "win32-low.h"
27 #include "gdbthread.h"
28 #include "dll.h"
29 #include "hostio.h"
30
31 #include <stdint.h>
32 #include <windows.h>
33 #include <winnt.h>
34 #include <imagehlp.h>
35 #include <tlhelp32.h>
36 #include <psapi.h>
37 #include <process.h>
38
39 #ifndef USE_WIN32API
40 #include <sys/cygwin.h>
41 #endif
42
43 #define OUTMSG(X) do { printf X; fflush (stderr); } while (0)
44
45 #define OUTMSG2(X) \
46 do \
47 { \
48 if (debug_threads) \
49 { \
50 printf X; \
51 fflush (stderr); \
52 } \
53 } while (0)
54
55 #ifndef _T
56 #define _T(x) TEXT (x)
57 #endif
58
59 #ifndef COUNTOF
60 #define COUNTOF(STR) (sizeof (STR) / sizeof ((STR)[0]))
61 #endif
62
63 #ifdef _WIN32_WCE
64 # define GETPROCADDRESS(DLL, PROC) \
65 ((winapi_ ## PROC) GetProcAddress (DLL, TEXT (#PROC)))
66 #else
67 # define GETPROCADDRESS(DLL, PROC) \
68 ((winapi_ ## PROC) GetProcAddress (DLL, #PROC))
69 #endif
70
71 int using_threads = 1;
72
73 /* Globals. */
74 static int attaching = 0;
75 static HANDLE current_process_handle = NULL;
76 static DWORD current_process_id = 0;
77 static DWORD main_thread_id = 0;
78 static enum gdb_signal last_sig = GDB_SIGNAL_0;
79
80 /* The current debug event from WaitForDebugEvent. */
81 static DEBUG_EVENT current_event;
82
83 /* A status that hasn't been reported to the core yet, and so
84 win32_wait should return it next, instead of fetching the next
85 debug event off the win32 API. */
86 static struct target_waitstatus cached_status;
87
88 /* Non zero if an interrupt request is to be satisfied by suspending
89 all threads. */
90 static int soft_interrupt_requested = 0;
91
92 /* Non zero if the inferior is stopped in a simulated breakpoint done
93 by suspending all the threads. */
94 static int faked_breakpoint = 0;
95
96 const struct target_desc *win32_tdesc;
97
98 #define NUM_REGS (the_low_target.num_regs)
99
100 typedef BOOL (WINAPI *winapi_DebugActiveProcessStop) (DWORD dwProcessId);
101 typedef BOOL (WINAPI *winapi_DebugSetProcessKillOnExit) (BOOL KillOnExit);
102 typedef BOOL (WINAPI *winapi_DebugBreakProcess) (HANDLE);
103 typedef BOOL (WINAPI *winapi_GenerateConsoleCtrlEvent) (DWORD, DWORD);
104
105 static ptid_t win32_wait (ptid_t ptid, struct target_waitstatus *ourstatus,
106 int options);
107 static void win32_resume (struct thread_resume *resume_info, size_t n);
108 #ifndef _WIN32_WCE
109 static void win32_add_all_dlls (void);
110 #endif
111
112 /* Get the thread ID from the current selected inferior (the current
113 thread). */
114 static ptid_t
115 current_inferior_ptid (void)
116 {
117 return current_ptid;
118 }
119
120 /* The current debug event from WaitForDebugEvent. */
121 static ptid_t
122 debug_event_ptid (DEBUG_EVENT *event)
123 {
124 return ptid_build (event->dwProcessId, event->dwThreadId, 0);
125 }
126
127 /* Get the thread context of the thread associated with TH. */
128
129 static void
130 win32_get_thread_context (win32_thread_info *th)
131 {
132 memset (&th->context, 0, sizeof (CONTEXT));
133 (*the_low_target.get_thread_context) (th, &current_event);
134 #ifdef _WIN32_WCE
135 memcpy (&th->base_context, &th->context, sizeof (CONTEXT));
136 #endif
137 }
138
139 /* Set the thread context of the thread associated with TH. */
140
141 static void
142 win32_set_thread_context (win32_thread_info *th)
143 {
144 #ifdef _WIN32_WCE
145 /* Calling SuspendThread on a thread that is running kernel code
146 will report that the suspending was successful, but in fact, that
147 will often not be true. In those cases, the context returned by
148 GetThreadContext will not be correct by the time the thread
149 stops, hence we can't set that context back into the thread when
150 resuming - it will most likelly crash the inferior.
151 Unfortunately, there is no way to know when the thread will
152 really stop. To work around it, we'll only write the context
153 back to the thread when either the user or GDB explicitly change
154 it between stopping and resuming. */
155 if (memcmp (&th->context, &th->base_context, sizeof (CONTEXT)) != 0)
156 #endif
157 (*the_low_target.set_thread_context) (th, &current_event);
158 }
159
160 /* Find a thread record given a thread id. If GET_CONTEXT is set then
161 also retrieve the context for this thread. */
162 static win32_thread_info *
163 thread_rec (ptid_t ptid, int get_context)
164 {
165 struct thread_info *thread;
166 win32_thread_info *th;
167
168 thread = (struct thread_info *) find_inferior_id (&all_threads, ptid);
169 if (thread == NULL)
170 return NULL;
171
172 th = inferior_target_data (thread);
173 if (get_context && th->context.ContextFlags == 0)
174 {
175 if (!th->suspended)
176 {
177 if (SuspendThread (th->h) == (DWORD) -1)
178 {
179 DWORD err = GetLastError ();
180 OUTMSG (("warning: SuspendThread failed in thread_rec, "
181 "(error %d): %s\n", (int) err, strwinerror (err)));
182 }
183 else
184 th->suspended = 1;
185 }
186
187 win32_get_thread_context (th);
188 }
189
190 return th;
191 }
192
193 /* Add a thread to the thread list. */
194 static win32_thread_info *
195 child_add_thread (DWORD pid, DWORD tid, HANDLE h, void *tlb)
196 {
197 win32_thread_info *th;
198 ptid_t ptid = ptid_build (pid, tid, 0);
199
200 if ((th = thread_rec (ptid, FALSE)))
201 return th;
202
203 th = xcalloc (1, sizeof (*th));
204 th->tid = tid;
205 th->h = h;
206 th->thread_local_base = (CORE_ADDR) (uintptr_t) tlb;
207
208 add_thread (ptid, th);
209
210 if (the_low_target.thread_added != NULL)
211 (*the_low_target.thread_added) (th);
212
213 return th;
214 }
215
216 /* Delete a thread from the list of threads. */
217 static void
218 delete_thread_info (struct inferior_list_entry *thread)
219 {
220 win32_thread_info *th = inferior_target_data ((struct thread_info *) thread);
221
222 remove_thread ((struct thread_info *) thread);
223 CloseHandle (th->h);
224 free (th);
225 }
226
227 /* Delete a thread from the list of threads. */
228 static void
229 child_delete_thread (DWORD pid, DWORD tid)
230 {
231 struct inferior_list_entry *thread;
232 ptid_t ptid;
233
234 /* If the last thread is exiting, just return. */
235 if (one_inferior_p (&all_threads))
236 return;
237
238 ptid = ptid_build (pid, tid, 0);
239 thread = find_inferior_id (&all_threads, ptid);
240 if (thread == NULL)
241 return;
242
243 delete_thread_info (thread);
244 }
245
246 /* These watchpoint related wrapper functions simply pass on the function call
247 if the low target has registered a corresponding function. */
248
249 static int
250 win32_insert_point (char type, CORE_ADDR addr, int len)
251 {
252 if (the_low_target.insert_point != NULL)
253 return the_low_target.insert_point (type, addr, len);
254 else
255 /* Unsupported (see target.h). */
256 return 1;
257 }
258
259 static int
260 win32_remove_point (char type, CORE_ADDR addr, int len)
261 {
262 if (the_low_target.remove_point != NULL)
263 return the_low_target.remove_point (type, addr, len);
264 else
265 /* Unsupported (see target.h). */
266 return 1;
267 }
268
269 static int
270 win32_stopped_by_watchpoint (void)
271 {
272 if (the_low_target.stopped_by_watchpoint != NULL)
273 return the_low_target.stopped_by_watchpoint ();
274 else
275 return 0;
276 }
277
278 static CORE_ADDR
279 win32_stopped_data_address (void)
280 {
281 if (the_low_target.stopped_data_address != NULL)
282 return the_low_target.stopped_data_address ();
283 else
284 return 0;
285 }
286
287
288 /* Transfer memory from/to the debugged process. */
289 static int
290 child_xfer_memory (CORE_ADDR memaddr, char *our, int len,
291 int write, struct target_ops *target)
292 {
293 BOOL success;
294 SIZE_T done = 0;
295 DWORD lasterror = 0;
296 uintptr_t addr = (uintptr_t) memaddr;
297
298 if (write)
299 {
300 success = WriteProcessMemory (current_process_handle, (LPVOID) addr,
301 (LPCVOID) our, len, &done);
302 if (!success)
303 lasterror = GetLastError ();
304 FlushInstructionCache (current_process_handle, (LPCVOID) addr, len);
305 }
306 else
307 {
308 success = ReadProcessMemory (current_process_handle, (LPCVOID) addr,
309 (LPVOID) our, len, &done);
310 if (!success)
311 lasterror = GetLastError ();
312 }
313 if (!success && lasterror == ERROR_PARTIAL_COPY && done > 0)
314 return done;
315 else
316 return success ? done : -1;
317 }
318
319 /* Clear out any old thread list and reinitialize it to a pristine
320 state. */
321 static void
322 child_init_thread_list (void)
323 {
324 for_each_inferior (&all_threads, delete_thread_info);
325 }
326
327 /* Zero during the child initialization phase, and nonzero otherwise. */
328
329 static int child_initialization_done = 0;
330
331 static void
332 do_initial_child_stuff (HANDLE proch, DWORD pid, int attached)
333 {
334 struct process_info *proc;
335
336 last_sig = GDB_SIGNAL_0;
337
338 current_process_handle = proch;
339 current_process_id = pid;
340 main_thread_id = 0;
341
342 soft_interrupt_requested = 0;
343 faked_breakpoint = 0;
344
345 memset (&current_event, 0, sizeof (current_event));
346
347 proc = add_process (pid, attached);
348 proc->tdesc = win32_tdesc;
349 child_init_thread_list ();
350 child_initialization_done = 0;
351
352 if (the_low_target.initial_stuff != NULL)
353 (*the_low_target.initial_stuff) ();
354
355 cached_status.kind = TARGET_WAITKIND_IGNORE;
356
357 /* Flush all currently pending debug events (thread and dll list) up
358 to the initial breakpoint. */
359 while (1)
360 {
361 struct target_waitstatus status;
362
363 win32_wait (minus_one_ptid, &status, 0);
364
365 /* Note win32_wait doesn't return thread events. */
366 if (status.kind != TARGET_WAITKIND_LOADED)
367 {
368 cached_status = status;
369 break;
370 }
371
372 {
373 struct thread_resume resume;
374
375 resume.thread = minus_one_ptid;
376 resume.kind = resume_continue;
377 resume.sig = 0;
378
379 win32_resume (&resume, 1);
380 }
381 }
382
383 #ifndef _WIN32_WCE
384 /* Now that the inferior has been started and all DLLs have been mapped,
385 we can iterate over all DLLs and load them in.
386
387 We avoid doing it any earlier because, on certain versions of Windows,
388 LOAD_DLL_DEBUG_EVENTs are sometimes not complete. In particular,
389 we have seen on Windows 8.1 that the ntdll.dll load event does not
390 include the DLL name, preventing us from creating an associated SO.
391 A possible explanation is that ntdll.dll might be mapped before
392 the SO info gets created by the Windows system -- ntdll.dll is
393 the first DLL to be reported via LOAD_DLL_DEBUG_EVENT and other DLLs
394 do not seem to suffer from that problem.
395
396 Rather than try to work around this sort of issue, it is much
397 simpler to just ignore DLL load/unload events during the startup
398 phase, and then process them all in one batch now. */
399 win32_add_all_dlls ();
400 #endif
401
402 child_initialization_done = 1;
403 }
404
405 /* Resume all artificially suspended threads if we are continuing
406 execution. */
407 static int
408 continue_one_thread (struct inferior_list_entry *this_thread, void *id_ptr)
409 {
410 struct thread_info *thread = (struct thread_info *) this_thread;
411 int thread_id = * (int *) id_ptr;
412 win32_thread_info *th = inferior_target_data (thread);
413
414 if ((thread_id == -1 || thread_id == th->tid)
415 && th->suspended)
416 {
417 if (th->context.ContextFlags)
418 {
419 win32_set_thread_context (th);
420 th->context.ContextFlags = 0;
421 }
422
423 if (ResumeThread (th->h) == (DWORD) -1)
424 {
425 DWORD err = GetLastError ();
426 OUTMSG (("warning: ResumeThread failed in continue_one_thread, "
427 "(error %d): %s\n", (int) err, strwinerror (err)));
428 }
429 th->suspended = 0;
430 }
431
432 return 0;
433 }
434
435 static BOOL
436 child_continue (DWORD continue_status, int thread_id)
437 {
438 /* The inferior will only continue after the ContinueDebugEvent
439 call. */
440 find_inferior (&all_threads, continue_one_thread, &thread_id);
441 faked_breakpoint = 0;
442
443 if (!ContinueDebugEvent (current_event.dwProcessId,
444 current_event.dwThreadId,
445 continue_status))
446 return FALSE;
447
448 return TRUE;
449 }
450
451 /* Fetch register(s) from the current thread context. */
452 static void
453 child_fetch_inferior_registers (struct regcache *regcache, int r)
454 {
455 int regno;
456 win32_thread_info *th = thread_rec (current_inferior_ptid (), TRUE);
457 if (r == -1 || r > NUM_REGS)
458 child_fetch_inferior_registers (regcache, NUM_REGS);
459 else
460 for (regno = 0; regno < r; regno++)
461 (*the_low_target.fetch_inferior_register) (regcache, th, regno);
462 }
463
464 /* Store a new register value into the current thread context. We don't
465 change the program's context until later, when we resume it. */
466 static void
467 child_store_inferior_registers (struct regcache *regcache, int r)
468 {
469 int regno;
470 win32_thread_info *th = thread_rec (current_inferior_ptid (), TRUE);
471 if (r == -1 || r == 0 || r > NUM_REGS)
472 child_store_inferior_registers (regcache, NUM_REGS);
473 else
474 for (regno = 0; regno < r; regno++)
475 (*the_low_target.store_inferior_register) (regcache, th, regno);
476 }
477
478 /* Map the Windows error number in ERROR to a locale-dependent error
479 message string and return a pointer to it. Typically, the values
480 for ERROR come from GetLastError.
481
482 The string pointed to shall not be modified by the application,
483 but may be overwritten by a subsequent call to strwinerror
484
485 The strwinerror function does not change the current setting
486 of GetLastError. */
487
488 char *
489 strwinerror (DWORD error)
490 {
491 static char buf[1024];
492 TCHAR *msgbuf;
493 DWORD lasterr = GetLastError ();
494 DWORD chars = FormatMessage (FORMAT_MESSAGE_FROM_SYSTEM
495 | FORMAT_MESSAGE_ALLOCATE_BUFFER,
496 NULL,
497 error,
498 0, /* Default language */
499 (LPVOID)&msgbuf,
500 0,
501 NULL);
502 if (chars != 0)
503 {
504 /* If there is an \r\n appended, zap it. */
505 if (chars >= 2
506 && msgbuf[chars - 2] == '\r'
507 && msgbuf[chars - 1] == '\n')
508 {
509 chars -= 2;
510 msgbuf[chars] = 0;
511 }
512
513 if (chars > ((COUNTOF (buf)) - 1))
514 {
515 chars = COUNTOF (buf) - 1;
516 msgbuf [chars] = 0;
517 }
518
519 #ifdef UNICODE
520 wcstombs (buf, msgbuf, chars + 1);
521 #else
522 strncpy (buf, msgbuf, chars + 1);
523 #endif
524 LocalFree (msgbuf);
525 }
526 else
527 sprintf (buf, "unknown win32 error (%u)", (unsigned) error);
528
529 SetLastError (lasterr);
530 return buf;
531 }
532
533 static BOOL
534 create_process (const char *program, char *args,
535 DWORD flags, PROCESS_INFORMATION *pi)
536 {
537 BOOL ret;
538
539 #ifdef _WIN32_WCE
540 wchar_t *p, *wprogram, *wargs;
541 size_t argslen;
542
543 wprogram = alloca ((strlen (program) + 1) * sizeof (wchar_t));
544 mbstowcs (wprogram, program, strlen (program) + 1);
545
546 for (p = wprogram; *p; ++p)
547 if (L'/' == *p)
548 *p = L'\\';
549
550 argslen = strlen (args);
551 wargs = alloca ((argslen + 1) * sizeof (wchar_t));
552 mbstowcs (wargs, args, argslen + 1);
553
554 ret = CreateProcessW (wprogram, /* image name */
555 wargs, /* command line */
556 NULL, /* security, not supported */
557 NULL, /* thread, not supported */
558 FALSE, /* inherit handles, not supported */
559 flags, /* start flags */
560 NULL, /* environment, not supported */
561 NULL, /* current directory, not supported */
562 NULL, /* start info, not supported */
563 pi); /* proc info */
564 #else
565 STARTUPINFOA si = { sizeof (STARTUPINFOA) };
566
567 ret = CreateProcessA (program, /* image name */
568 args, /* command line */
569 NULL, /* security */
570 NULL, /* thread */
571 TRUE, /* inherit handles */
572 flags, /* start flags */
573 NULL, /* environment */
574 NULL, /* current directory */
575 &si, /* start info */
576 pi); /* proc info */
577 #endif
578
579 return ret;
580 }
581
582 /* Start a new process.
583 PROGRAM is a path to the program to execute.
584 ARGS is a standard NULL-terminated array of arguments,
585 to be passed to the inferior as ``argv''.
586 Returns the new PID on success, -1 on failure. Registers the new
587 process with the process list. */
588 static int
589 win32_create_inferior (char *program, char **program_args)
590 {
591 #ifndef USE_WIN32API
592 char real_path[PATH_MAX];
593 char *orig_path, *new_path, *path_ptr;
594 #endif
595 BOOL ret;
596 DWORD flags;
597 char *args;
598 int argslen;
599 int argc;
600 PROCESS_INFORMATION pi;
601 DWORD err;
602
603 /* win32_wait needs to know we're not attaching. */
604 attaching = 0;
605
606 if (!program)
607 error ("No executable specified, specify executable to debug.\n");
608
609 flags = DEBUG_PROCESS | DEBUG_ONLY_THIS_PROCESS;
610
611 #ifndef USE_WIN32API
612 orig_path = NULL;
613 path_ptr = getenv ("PATH");
614 if (path_ptr)
615 {
616 int size = cygwin_conv_path_list (CCP_POSIX_TO_WIN_A, path_ptr, NULL, 0);
617 orig_path = alloca (strlen (path_ptr) + 1);
618 new_path = alloca (size);
619 strcpy (orig_path, path_ptr);
620 cygwin_conv_path_list (CCP_POSIX_TO_WIN_A, path_ptr, new_path, size);
621 setenv ("PATH", new_path, 1);
622 }
623 cygwin_conv_path (CCP_POSIX_TO_WIN_A, program, real_path, PATH_MAX);
624 program = real_path;
625 #endif
626
627 argslen = 1;
628 for (argc = 1; program_args[argc]; argc++)
629 argslen += strlen (program_args[argc]) + 1;
630 args = alloca (argslen);
631 args[0] = '\0';
632 for (argc = 1; program_args[argc]; argc++)
633 {
634 /* FIXME: Can we do better about quoting? How does Cygwin
635 handle this? */
636 strcat (args, " ");
637 strcat (args, program_args[argc]);
638 }
639 OUTMSG2 (("Command line is \"%s\"\n", args));
640
641 #ifdef CREATE_NEW_PROCESS_GROUP
642 flags |= CREATE_NEW_PROCESS_GROUP;
643 #endif
644
645 ret = create_process (program, args, flags, &pi);
646 err = GetLastError ();
647 if (!ret && err == ERROR_FILE_NOT_FOUND)
648 {
649 char *exename = alloca (strlen (program) + 5);
650 strcat (strcpy (exename, program), ".exe");
651 ret = create_process (exename, args, flags, &pi);
652 err = GetLastError ();
653 }
654
655 #ifndef USE_WIN32API
656 if (orig_path)
657 setenv ("PATH", orig_path, 1);
658 #endif
659
660 if (!ret)
661 {
662 error ("Error creating process \"%s%s\", (error %d): %s\n",
663 program, args, (int) err, strwinerror (err));
664 }
665 else
666 {
667 OUTMSG2 (("Process created: %s\n", (char *) args));
668 }
669
670 #ifndef _WIN32_WCE
671 /* On Windows CE this handle can't be closed. The OS reuses
672 it in the debug events, while the 9x/NT versions of Windows
673 probably use a DuplicateHandle'd one. */
674 CloseHandle (pi.hThread);
675 #endif
676
677 do_initial_child_stuff (pi.hProcess, pi.dwProcessId, 0);
678
679 return current_process_id;
680 }
681
682 /* Attach to a running process.
683 PID is the process ID to attach to, specified by the user
684 or a higher layer. */
685 static int
686 win32_attach (unsigned long pid)
687 {
688 HANDLE h;
689 winapi_DebugSetProcessKillOnExit DebugSetProcessKillOnExit = NULL;
690 DWORD err;
691 #ifdef _WIN32_WCE
692 HMODULE dll = GetModuleHandle (_T("COREDLL.DLL"));
693 #else
694 HMODULE dll = GetModuleHandle (_T("KERNEL32.DLL"));
695 #endif
696 DebugSetProcessKillOnExit = GETPROCADDRESS (dll, DebugSetProcessKillOnExit);
697
698 h = OpenProcess (PROCESS_ALL_ACCESS, FALSE, pid);
699 if (h != NULL)
700 {
701 if (DebugActiveProcess (pid))
702 {
703 if (DebugSetProcessKillOnExit != NULL)
704 DebugSetProcessKillOnExit (FALSE);
705
706 /* win32_wait needs to know we're attaching. */
707 attaching = 1;
708 do_initial_child_stuff (h, pid, 1);
709 return 0;
710 }
711
712 CloseHandle (h);
713 }
714
715 err = GetLastError ();
716 error ("Attach to process failed (error %d): %s\n",
717 (int) err, strwinerror (err));
718 }
719
720 /* Handle OUTPUT_DEBUG_STRING_EVENT from child process. */
721 static void
722 handle_output_debug_string (struct target_waitstatus *ourstatus)
723 {
724 #define READ_BUFFER_LEN 1024
725 CORE_ADDR addr;
726 char s[READ_BUFFER_LEN + 1] = { 0 };
727 DWORD nbytes = current_event.u.DebugString.nDebugStringLength;
728
729 if (nbytes == 0)
730 return;
731
732 if (nbytes > READ_BUFFER_LEN)
733 nbytes = READ_BUFFER_LEN;
734
735 addr = (CORE_ADDR) (size_t) current_event.u.DebugString.lpDebugStringData;
736
737 if (current_event.u.DebugString.fUnicode)
738 {
739 /* The event tells us how many bytes, not chars, even
740 in Unicode. */
741 WCHAR buffer[(READ_BUFFER_LEN + 1) / sizeof (WCHAR)] = { 0 };
742 if (read_inferior_memory (addr, (unsigned char *) buffer, nbytes) != 0)
743 return;
744 wcstombs (s, buffer, (nbytes + 1) / sizeof (WCHAR));
745 }
746 else
747 {
748 if (read_inferior_memory (addr, (unsigned char *) s, nbytes) != 0)
749 return;
750 }
751
752 if (strncmp (s, "cYg", 3) != 0)
753 {
754 if (!server_waiting)
755 {
756 OUTMSG2(("%s", s));
757 return;
758 }
759
760 monitor_output (s);
761 }
762 #undef READ_BUFFER_LEN
763 }
764
765 static void
766 win32_clear_inferiors (void)
767 {
768 if (current_process_handle != NULL)
769 CloseHandle (current_process_handle);
770
771 for_each_inferior (&all_threads, delete_thread_info);
772 clear_inferiors ();
773 }
774
775 /* Kill all inferiors. */
776 static int
777 win32_kill (int pid)
778 {
779 struct process_info *process;
780
781 if (current_process_handle == NULL)
782 return -1;
783
784 TerminateProcess (current_process_handle, 0);
785 for (;;)
786 {
787 if (!child_continue (DBG_CONTINUE, -1))
788 break;
789 if (!WaitForDebugEvent (&current_event, INFINITE))
790 break;
791 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
792 break;
793 else if (current_event.dwDebugEventCode == OUTPUT_DEBUG_STRING_EVENT)
794 {
795 struct target_waitstatus our_status = { 0 };
796 handle_output_debug_string (&our_status);
797 }
798 }
799
800 win32_clear_inferiors ();
801
802 process = find_process_pid (pid);
803 remove_process (process);
804 return 0;
805 }
806
807 /* Detach from inferior PID. */
808 static int
809 win32_detach (int pid)
810 {
811 struct process_info *process;
812 winapi_DebugActiveProcessStop DebugActiveProcessStop = NULL;
813 winapi_DebugSetProcessKillOnExit DebugSetProcessKillOnExit = NULL;
814 #ifdef _WIN32_WCE
815 HMODULE dll = GetModuleHandle (_T("COREDLL.DLL"));
816 #else
817 HMODULE dll = GetModuleHandle (_T("KERNEL32.DLL"));
818 #endif
819 DebugActiveProcessStop = GETPROCADDRESS (dll, DebugActiveProcessStop);
820 DebugSetProcessKillOnExit = GETPROCADDRESS (dll, DebugSetProcessKillOnExit);
821
822 if (DebugSetProcessKillOnExit == NULL
823 || DebugActiveProcessStop == NULL)
824 return -1;
825
826 {
827 struct thread_resume resume;
828 resume.thread = minus_one_ptid;
829 resume.kind = resume_continue;
830 resume.sig = 0;
831 win32_resume (&resume, 1);
832 }
833
834 if (!DebugActiveProcessStop (current_process_id))
835 return -1;
836
837 DebugSetProcessKillOnExit (FALSE);
838 process = find_process_pid (pid);
839 remove_process (process);
840
841 win32_clear_inferiors ();
842 return 0;
843 }
844
845 static void
846 win32_mourn (struct process_info *process)
847 {
848 remove_process (process);
849 }
850
851 /* Wait for inferiors to end. */
852 static void
853 win32_join (int pid)
854 {
855 HANDLE h = OpenProcess (PROCESS_ALL_ACCESS, FALSE, pid);
856 if (h != NULL)
857 {
858 WaitForSingleObject (h, INFINITE);
859 CloseHandle (h);
860 }
861 }
862
863 /* Return 1 iff the thread with thread ID TID is alive. */
864 static int
865 win32_thread_alive (ptid_t ptid)
866 {
867 int res;
868
869 /* Our thread list is reliable; don't bother to poll target
870 threads. */
871 if (find_inferior_id (&all_threads, ptid) != NULL)
872 res = 1;
873 else
874 res = 0;
875 return res;
876 }
877
878 /* Resume the inferior process. RESUME_INFO describes how we want
879 to resume. */
880 static void
881 win32_resume (struct thread_resume *resume_info, size_t n)
882 {
883 DWORD tid;
884 enum gdb_signal sig;
885 int step;
886 win32_thread_info *th;
887 DWORD continue_status = DBG_CONTINUE;
888 ptid_t ptid;
889
890 /* This handles the very limited set of resume packets that GDB can
891 currently produce. */
892
893 if (n == 1 && ptid_equal (resume_info[0].thread, minus_one_ptid))
894 tid = -1;
895 else if (n > 1)
896 tid = -1;
897 else
898 /* Yes, we're ignoring resume_info[0].thread. It'd be tricky to make
899 the Windows resume code do the right thing for thread switching. */
900 tid = current_event.dwThreadId;
901
902 if (!ptid_equal (resume_info[0].thread, minus_one_ptid))
903 {
904 sig = resume_info[0].sig;
905 step = resume_info[0].kind == resume_step;
906 }
907 else
908 {
909 sig = 0;
910 step = 0;
911 }
912
913 if (sig != GDB_SIGNAL_0)
914 {
915 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
916 {
917 OUTMSG (("Cannot continue with signal %d here.\n", sig));
918 }
919 else if (sig == last_sig)
920 continue_status = DBG_EXCEPTION_NOT_HANDLED;
921 else
922 OUTMSG (("Can only continue with recieved signal %d.\n", last_sig));
923 }
924
925 last_sig = GDB_SIGNAL_0;
926
927 /* Get context for the currently selected thread. */
928 ptid = debug_event_ptid (&current_event);
929 th = thread_rec (ptid, FALSE);
930 if (th)
931 {
932 if (th->context.ContextFlags)
933 {
934 /* Move register values from the inferior into the thread
935 context structure. */
936 regcache_invalidate ();
937
938 if (step)
939 {
940 if (the_low_target.single_step != NULL)
941 (*the_low_target.single_step) (th);
942 else
943 error ("Single stepping is not supported "
944 "in this configuration.\n");
945 }
946
947 win32_set_thread_context (th);
948 th->context.ContextFlags = 0;
949 }
950 }
951
952 /* Allow continuing with the same signal that interrupted us.
953 Otherwise complain. */
954
955 child_continue (continue_status, tid);
956 }
957
958 static void
959 win32_add_one_solib (const char *name, CORE_ADDR load_addr)
960 {
961 char buf[MAX_PATH + 1];
962 char buf2[MAX_PATH + 1];
963
964 #ifdef _WIN32_WCE
965 WIN32_FIND_DATA w32_fd;
966 WCHAR wname[MAX_PATH + 1];
967 mbstowcs (wname, name, MAX_PATH);
968 HANDLE h = FindFirstFile (wname, &w32_fd);
969 #else
970 WIN32_FIND_DATAA w32_fd;
971 HANDLE h = FindFirstFileA (name, &w32_fd);
972 #endif
973
974 /* The symbols in a dll are offset by 0x1000, which is the
975 offset from 0 of the first byte in an image - because
976 of the file header and the section alignment. */
977 load_addr += 0x1000;
978
979 if (h == INVALID_HANDLE_VALUE)
980 strcpy (buf, name);
981 else
982 {
983 FindClose (h);
984 strcpy (buf, name);
985 #ifndef _WIN32_WCE
986 {
987 char cwd[MAX_PATH + 1];
988 char *p;
989 if (GetCurrentDirectoryA (MAX_PATH + 1, cwd))
990 {
991 p = strrchr (buf, '\\');
992 if (p)
993 p[1] = '\0';
994 SetCurrentDirectoryA (buf);
995 GetFullPathNameA (w32_fd.cFileName, MAX_PATH, buf, &p);
996 SetCurrentDirectoryA (cwd);
997 }
998 }
999 #endif
1000 }
1001
1002 #ifndef _WIN32_WCE
1003 if (strcasecmp (buf, "ntdll.dll") == 0)
1004 {
1005 GetSystemDirectoryA (buf, sizeof (buf));
1006 strcat (buf, "\\ntdll.dll");
1007 }
1008 #endif
1009
1010 #ifdef __CYGWIN__
1011 cygwin_conv_path (CCP_WIN_A_TO_POSIX, buf, buf2, sizeof (buf2));
1012 #else
1013 strcpy (buf2, buf);
1014 #endif
1015
1016 loaded_dll (buf2, load_addr);
1017 }
1018
1019 static char *
1020 get_image_name (HANDLE h, void *address, int unicode)
1021 {
1022 static char buf[(2 * MAX_PATH) + 1];
1023 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
1024 char *address_ptr;
1025 int len = 0;
1026 char b[2];
1027 SIZE_T done;
1028
1029 /* Attempt to read the name of the dll that was detected.
1030 This is documented to work only when actively debugging
1031 a program. It will not work for attached processes. */
1032 if (address == NULL)
1033 return NULL;
1034
1035 #ifdef _WIN32_WCE
1036 /* Windows CE reports the address of the image name,
1037 instead of an address of a pointer into the image name. */
1038 address_ptr = address;
1039 #else
1040 /* See if we could read the address of a string, and that the
1041 address isn't null. */
1042 if (!ReadProcessMemory (h, address, &address_ptr,
1043 sizeof (address_ptr), &done)
1044 || done != sizeof (address_ptr)
1045 || !address_ptr)
1046 return NULL;
1047 #endif
1048
1049 /* Find the length of the string */
1050 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
1051 && (b[0] != 0 || b[size - 1] != 0) && done == size)
1052 continue;
1053
1054 if (!unicode)
1055 ReadProcessMemory (h, address_ptr, buf, len, &done);
1056 else
1057 {
1058 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
1059 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
1060 &done);
1061
1062 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, len, 0, 0);
1063 }
1064
1065 return buf;
1066 }
1067
1068 typedef BOOL (WINAPI *winapi_EnumProcessModules) (HANDLE, HMODULE *,
1069 DWORD, LPDWORD);
1070 typedef BOOL (WINAPI *winapi_GetModuleInformation) (HANDLE, HMODULE,
1071 LPMODULEINFO, DWORD);
1072 typedef DWORD (WINAPI *winapi_GetModuleFileNameExA) (HANDLE, HMODULE,
1073 LPSTR, DWORD);
1074
1075 static winapi_EnumProcessModules win32_EnumProcessModules;
1076 static winapi_GetModuleInformation win32_GetModuleInformation;
1077 static winapi_GetModuleFileNameExA win32_GetModuleFileNameExA;
1078
1079 static BOOL
1080 load_psapi (void)
1081 {
1082 static int psapi_loaded = 0;
1083 static HMODULE dll = NULL;
1084
1085 if (!psapi_loaded)
1086 {
1087 psapi_loaded = 1;
1088 dll = LoadLibrary (TEXT("psapi.dll"));
1089 if (!dll)
1090 return FALSE;
1091 win32_EnumProcessModules =
1092 GETPROCADDRESS (dll, EnumProcessModules);
1093 win32_GetModuleInformation =
1094 GETPROCADDRESS (dll, GetModuleInformation);
1095 win32_GetModuleFileNameExA =
1096 GETPROCADDRESS (dll, GetModuleFileNameExA);
1097 }
1098
1099 return (win32_EnumProcessModules != NULL
1100 && win32_GetModuleInformation != NULL
1101 && win32_GetModuleFileNameExA != NULL);
1102 }
1103
1104 #ifndef _WIN32_WCE
1105
1106 /* Iterate over all DLLs currently mapped by our inferior, and
1107 add them to our list of solibs. */
1108
1109 static void
1110 win32_add_all_dlls (void)
1111 {
1112 size_t i;
1113 HMODULE dh_buf[1];
1114 HMODULE *DllHandle = dh_buf;
1115 DWORD cbNeeded;
1116 BOOL ok;
1117
1118 if (!load_psapi ())
1119 return;
1120
1121 cbNeeded = 0;
1122 ok = (*win32_EnumProcessModules) (current_process_handle,
1123 DllHandle,
1124 sizeof (HMODULE),
1125 &cbNeeded);
1126
1127 if (!ok || !cbNeeded)
1128 return;
1129
1130 DllHandle = (HMODULE *) alloca (cbNeeded);
1131 if (!DllHandle)
1132 return;
1133
1134 ok = (*win32_EnumProcessModules) (current_process_handle,
1135 DllHandle,
1136 cbNeeded,
1137 &cbNeeded);
1138 if (!ok)
1139 return;
1140
1141 for (i = 1; i < ((size_t) cbNeeded / sizeof (HMODULE)); i++)
1142 {
1143 MODULEINFO mi;
1144 char dll_name[MAX_PATH];
1145
1146 if (!(*win32_GetModuleInformation) (current_process_handle,
1147 DllHandle[i],
1148 &mi,
1149 sizeof (mi)))
1150 continue;
1151 if ((*win32_GetModuleFileNameExA) (current_process_handle,
1152 DllHandle[i],
1153 dll_name,
1154 MAX_PATH) == 0)
1155 continue;
1156 win32_add_one_solib (dll_name, (CORE_ADDR) (uintptr_t) mi.lpBaseOfDll);
1157 }
1158 }
1159 #endif
1160
1161 typedef HANDLE (WINAPI *winapi_CreateToolhelp32Snapshot) (DWORD, DWORD);
1162 typedef BOOL (WINAPI *winapi_Module32First) (HANDLE, LPMODULEENTRY32);
1163 typedef BOOL (WINAPI *winapi_Module32Next) (HANDLE, LPMODULEENTRY32);
1164
1165 /* Handle a DLL load event.
1166
1167 This function assumes that this event did not occur during inferior
1168 initialization, where their event info may be incomplete (see
1169 do_initial_child_stuff and win32_add_all_dlls for more info on
1170 how we handle DLL loading during that phase). */
1171
1172 static void
1173 handle_load_dll (void)
1174 {
1175 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
1176 char *dll_name;
1177
1178 dll_name = get_image_name (current_process_handle,
1179 event->lpImageName, event->fUnicode);
1180 if (!dll_name)
1181 return;
1182
1183 win32_add_one_solib (dll_name, (CORE_ADDR) (uintptr_t) event->lpBaseOfDll);
1184 }
1185
1186 /* Handle a DLL unload event.
1187
1188 This function assumes that this event did not occur during inferior
1189 initialization, where their event info may be incomplete (see
1190 do_initial_child_stuff and win32_add_one_solib for more info
1191 on how we handle DLL loading during that phase). */
1192
1193 static void
1194 handle_unload_dll (void)
1195 {
1196 CORE_ADDR load_addr =
1197 (CORE_ADDR) (uintptr_t) current_event.u.UnloadDll.lpBaseOfDll;
1198
1199 /* The symbols in a dll are offset by 0x1000, which is the
1200 offset from 0 of the first byte in an image - because
1201 of the file header and the section alignment. */
1202 load_addr += 0x1000;
1203 unloaded_dll (NULL, load_addr);
1204 }
1205
1206 static void
1207 handle_exception (struct target_waitstatus *ourstatus)
1208 {
1209 DWORD code = current_event.u.Exception.ExceptionRecord.ExceptionCode;
1210
1211 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1212
1213 switch (code)
1214 {
1215 case EXCEPTION_ACCESS_VIOLATION:
1216 OUTMSG2 (("EXCEPTION_ACCESS_VIOLATION"));
1217 ourstatus->value.sig = GDB_SIGNAL_SEGV;
1218 break;
1219 case STATUS_STACK_OVERFLOW:
1220 OUTMSG2 (("STATUS_STACK_OVERFLOW"));
1221 ourstatus->value.sig = GDB_SIGNAL_SEGV;
1222 break;
1223 case STATUS_FLOAT_DENORMAL_OPERAND:
1224 OUTMSG2 (("STATUS_FLOAT_DENORMAL_OPERAND"));
1225 ourstatus->value.sig = GDB_SIGNAL_FPE;
1226 break;
1227 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1228 OUTMSG2 (("EXCEPTION_ARRAY_BOUNDS_EXCEEDED"));
1229 ourstatus->value.sig = GDB_SIGNAL_FPE;
1230 break;
1231 case STATUS_FLOAT_INEXACT_RESULT:
1232 OUTMSG2 (("STATUS_FLOAT_INEXACT_RESULT"));
1233 ourstatus->value.sig = GDB_SIGNAL_FPE;
1234 break;
1235 case STATUS_FLOAT_INVALID_OPERATION:
1236 OUTMSG2 (("STATUS_FLOAT_INVALID_OPERATION"));
1237 ourstatus->value.sig = GDB_SIGNAL_FPE;
1238 break;
1239 case STATUS_FLOAT_OVERFLOW:
1240 OUTMSG2 (("STATUS_FLOAT_OVERFLOW"));
1241 ourstatus->value.sig = GDB_SIGNAL_FPE;
1242 break;
1243 case STATUS_FLOAT_STACK_CHECK:
1244 OUTMSG2 (("STATUS_FLOAT_STACK_CHECK"));
1245 ourstatus->value.sig = GDB_SIGNAL_FPE;
1246 break;
1247 case STATUS_FLOAT_UNDERFLOW:
1248 OUTMSG2 (("STATUS_FLOAT_UNDERFLOW"));
1249 ourstatus->value.sig = GDB_SIGNAL_FPE;
1250 break;
1251 case STATUS_FLOAT_DIVIDE_BY_ZERO:
1252 OUTMSG2 (("STATUS_FLOAT_DIVIDE_BY_ZERO"));
1253 ourstatus->value.sig = GDB_SIGNAL_FPE;
1254 break;
1255 case STATUS_INTEGER_DIVIDE_BY_ZERO:
1256 OUTMSG2 (("STATUS_INTEGER_DIVIDE_BY_ZERO"));
1257 ourstatus->value.sig = GDB_SIGNAL_FPE;
1258 break;
1259 case STATUS_INTEGER_OVERFLOW:
1260 OUTMSG2 (("STATUS_INTEGER_OVERFLOW"));
1261 ourstatus->value.sig = GDB_SIGNAL_FPE;
1262 break;
1263 case EXCEPTION_BREAKPOINT:
1264 OUTMSG2 (("EXCEPTION_BREAKPOINT"));
1265 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1266 #ifdef _WIN32_WCE
1267 /* Remove the initial breakpoint. */
1268 check_breakpoints ((CORE_ADDR) (long) current_event
1269 .u.Exception.ExceptionRecord.ExceptionAddress);
1270 #endif
1271 break;
1272 case DBG_CONTROL_C:
1273 OUTMSG2 (("DBG_CONTROL_C"));
1274 ourstatus->value.sig = GDB_SIGNAL_INT;
1275 break;
1276 case DBG_CONTROL_BREAK:
1277 OUTMSG2 (("DBG_CONTROL_BREAK"));
1278 ourstatus->value.sig = GDB_SIGNAL_INT;
1279 break;
1280 case EXCEPTION_SINGLE_STEP:
1281 OUTMSG2 (("EXCEPTION_SINGLE_STEP"));
1282 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1283 break;
1284 case EXCEPTION_ILLEGAL_INSTRUCTION:
1285 OUTMSG2 (("EXCEPTION_ILLEGAL_INSTRUCTION"));
1286 ourstatus->value.sig = GDB_SIGNAL_ILL;
1287 break;
1288 case EXCEPTION_PRIV_INSTRUCTION:
1289 OUTMSG2 (("EXCEPTION_PRIV_INSTRUCTION"));
1290 ourstatus->value.sig = GDB_SIGNAL_ILL;
1291 break;
1292 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1293 OUTMSG2 (("EXCEPTION_NONCONTINUABLE_EXCEPTION"));
1294 ourstatus->value.sig = GDB_SIGNAL_ILL;
1295 break;
1296 default:
1297 if (current_event.u.Exception.dwFirstChance)
1298 {
1299 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
1300 return;
1301 }
1302 OUTMSG2 (("gdbserver: unknown target exception 0x%08x at 0x%s",
1303 (unsigned) current_event.u.Exception.ExceptionRecord.ExceptionCode,
1304 phex_nz ((uintptr_t) current_event.u.Exception.ExceptionRecord.
1305 ExceptionAddress, sizeof (uintptr_t))));
1306 ourstatus->value.sig = GDB_SIGNAL_UNKNOWN;
1307 break;
1308 }
1309 OUTMSG2 (("\n"));
1310 last_sig = ourstatus->value.sig;
1311 }
1312
1313
1314 static void
1315 suspend_one_thread (struct inferior_list_entry *entry)
1316 {
1317 struct thread_info *thread = (struct thread_info *) entry;
1318 win32_thread_info *th = inferior_target_data (thread);
1319
1320 if (!th->suspended)
1321 {
1322 if (SuspendThread (th->h) == (DWORD) -1)
1323 {
1324 DWORD err = GetLastError ();
1325 OUTMSG (("warning: SuspendThread failed in suspend_one_thread, "
1326 "(error %d): %s\n", (int) err, strwinerror (err)));
1327 }
1328 else
1329 th->suspended = 1;
1330 }
1331 }
1332
1333 static void
1334 fake_breakpoint_event (void)
1335 {
1336 OUTMSG2(("fake_breakpoint_event\n"));
1337
1338 faked_breakpoint = 1;
1339
1340 memset (&current_event, 0, sizeof (current_event));
1341 current_event.dwThreadId = main_thread_id;
1342 current_event.dwDebugEventCode = EXCEPTION_DEBUG_EVENT;
1343 current_event.u.Exception.ExceptionRecord.ExceptionCode
1344 = EXCEPTION_BREAKPOINT;
1345
1346 for_each_inferior (&all_threads, suspend_one_thread);
1347 }
1348
1349 #ifdef _WIN32_WCE
1350 static int
1351 auto_delete_breakpoint (CORE_ADDR stop_pc)
1352 {
1353 return 1;
1354 }
1355 #endif
1356
1357 /* Get the next event from the child. */
1358
1359 static int
1360 get_child_debug_event (struct target_waitstatus *ourstatus)
1361 {
1362 ptid_t ptid;
1363
1364 last_sig = GDB_SIGNAL_0;
1365 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
1366
1367 /* Check if GDB sent us an interrupt request. */
1368 check_remote_input_interrupt_request ();
1369
1370 if (soft_interrupt_requested)
1371 {
1372 soft_interrupt_requested = 0;
1373 fake_breakpoint_event ();
1374 goto gotevent;
1375 }
1376
1377 #ifndef _WIN32_WCE
1378 attaching = 0;
1379 #else
1380 if (attaching)
1381 {
1382 /* WinCE doesn't set an initial breakpoint automatically. To
1383 stop the inferior, we flush all currently pending debug
1384 events -- the thread list and the dll list are always
1385 reported immediatelly without delay, then, we suspend all
1386 threads and pretend we saw a trap at the current PC of the
1387 main thread.
1388
1389 Contrary to desktop Windows, Windows CE *does* report the dll
1390 names on LOAD_DLL_DEBUG_EVENTs resulting from a
1391 DebugActiveProcess call. This limits the way we can detect
1392 if all the dlls have already been reported. If we get a real
1393 debug event before leaving attaching, the worst that will
1394 happen is the user will see a spurious breakpoint. */
1395
1396 current_event.dwDebugEventCode = 0;
1397 if (!WaitForDebugEvent (&current_event, 0))
1398 {
1399 OUTMSG2(("no attach events left\n"));
1400 fake_breakpoint_event ();
1401 attaching = 0;
1402 }
1403 else
1404 OUTMSG2(("got attach event\n"));
1405 }
1406 else
1407 #endif
1408 {
1409 /* Keep the wait time low enough for confortable remote
1410 interruption, but high enough so gdbserver doesn't become a
1411 bottleneck. */
1412 if (!WaitForDebugEvent (&current_event, 250))
1413 {
1414 DWORD e = GetLastError();
1415
1416 if (e == ERROR_PIPE_NOT_CONNECTED)
1417 {
1418 /* This will happen if the loader fails to succesfully
1419 load the application, e.g., if the main executable
1420 tries to pull in a non-existing export from a
1421 DLL. */
1422 ourstatus->kind = TARGET_WAITKIND_EXITED;
1423 ourstatus->value.integer = 1;
1424 return 1;
1425 }
1426
1427 return 0;
1428 }
1429 }
1430
1431 gotevent:
1432
1433 switch (current_event.dwDebugEventCode)
1434 {
1435 case CREATE_THREAD_DEBUG_EVENT:
1436 OUTMSG2 (("gdbserver: kernel event CREATE_THREAD_DEBUG_EVENT "
1437 "for pid=%u tid=%x)\n",
1438 (unsigned) current_event.dwProcessId,
1439 (unsigned) current_event.dwThreadId));
1440
1441 /* Record the existence of this thread. */
1442 child_add_thread (current_event.dwProcessId,
1443 current_event.dwThreadId,
1444 current_event.u.CreateThread.hThread,
1445 current_event.u.CreateThread.lpThreadLocalBase);
1446 break;
1447
1448 case EXIT_THREAD_DEBUG_EVENT:
1449 OUTMSG2 (("gdbserver: kernel event EXIT_THREAD_DEBUG_EVENT "
1450 "for pid=%u tid=%x\n",
1451 (unsigned) current_event.dwProcessId,
1452 (unsigned) current_event.dwThreadId));
1453 child_delete_thread (current_event.dwProcessId,
1454 current_event.dwThreadId);
1455
1456 current_inferior = (struct thread_info *) all_threads.head;
1457 return 1;
1458
1459 case CREATE_PROCESS_DEBUG_EVENT:
1460 OUTMSG2 (("gdbserver: kernel event CREATE_PROCESS_DEBUG_EVENT "
1461 "for pid=%u tid=%x\n",
1462 (unsigned) current_event.dwProcessId,
1463 (unsigned) current_event.dwThreadId));
1464 CloseHandle (current_event.u.CreateProcessInfo.hFile);
1465
1466 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
1467 main_thread_id = current_event.dwThreadId;
1468
1469 ourstatus->kind = TARGET_WAITKIND_EXECD;
1470 ourstatus->value.execd_pathname = "Main executable";
1471
1472 /* Add the main thread. */
1473 child_add_thread (current_event.dwProcessId,
1474 main_thread_id,
1475 current_event.u.CreateProcessInfo.hThread,
1476 current_event.u.CreateProcessInfo.lpThreadLocalBase);
1477
1478 ourstatus->value.related_pid = debug_event_ptid (&current_event);
1479 #ifdef _WIN32_WCE
1480 if (!attaching)
1481 {
1482 /* Windows CE doesn't set the initial breakpoint
1483 automatically like the desktop versions of Windows do.
1484 We add it explicitly here. It will be removed as soon as
1485 it is hit. */
1486 set_breakpoint_at ((CORE_ADDR) (long) current_event.u
1487 .CreateProcessInfo.lpStartAddress,
1488 auto_delete_breakpoint);
1489 }
1490 #endif
1491 break;
1492
1493 case EXIT_PROCESS_DEBUG_EVENT:
1494 OUTMSG2 (("gdbserver: kernel event EXIT_PROCESS_DEBUG_EVENT "
1495 "for pid=%u tid=%x\n",
1496 (unsigned) current_event.dwProcessId,
1497 (unsigned) current_event.dwThreadId));
1498 ourstatus->kind = TARGET_WAITKIND_EXITED;
1499 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
1500 child_continue (DBG_CONTINUE, -1);
1501 CloseHandle (current_process_handle);
1502 current_process_handle = NULL;
1503 break;
1504
1505 case LOAD_DLL_DEBUG_EVENT:
1506 OUTMSG2 (("gdbserver: kernel event LOAD_DLL_DEBUG_EVENT "
1507 "for pid=%u tid=%x\n",
1508 (unsigned) current_event.dwProcessId,
1509 (unsigned) current_event.dwThreadId));
1510 CloseHandle (current_event.u.LoadDll.hFile);
1511 if (! child_initialization_done)
1512 break;
1513 handle_load_dll ();
1514
1515 ourstatus->kind = TARGET_WAITKIND_LOADED;
1516 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1517 break;
1518
1519 case UNLOAD_DLL_DEBUG_EVENT:
1520 OUTMSG2 (("gdbserver: kernel event UNLOAD_DLL_DEBUG_EVENT "
1521 "for pid=%u tid=%x\n",
1522 (unsigned) current_event.dwProcessId,
1523 (unsigned) current_event.dwThreadId));
1524 if (! child_initialization_done)
1525 break;
1526 handle_unload_dll ();
1527 ourstatus->kind = TARGET_WAITKIND_LOADED;
1528 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1529 break;
1530
1531 case EXCEPTION_DEBUG_EVENT:
1532 OUTMSG2 (("gdbserver: kernel event EXCEPTION_DEBUG_EVENT "
1533 "for pid=%u tid=%x\n",
1534 (unsigned) current_event.dwProcessId,
1535 (unsigned) current_event.dwThreadId));
1536 handle_exception (ourstatus);
1537 break;
1538
1539 case OUTPUT_DEBUG_STRING_EVENT:
1540 /* A message from the kernel (or Cygwin). */
1541 OUTMSG2 (("gdbserver: kernel event OUTPUT_DEBUG_STRING_EVENT "
1542 "for pid=%u tid=%x\n",
1543 (unsigned) current_event.dwProcessId,
1544 (unsigned) current_event.dwThreadId));
1545 handle_output_debug_string (ourstatus);
1546 break;
1547
1548 default:
1549 OUTMSG2 (("gdbserver: kernel event unknown "
1550 "for pid=%u tid=%x code=%x\n",
1551 (unsigned) current_event.dwProcessId,
1552 (unsigned) current_event.dwThreadId,
1553 (unsigned) current_event.dwDebugEventCode));
1554 break;
1555 }
1556
1557 ptid = debug_event_ptid (&current_event);
1558 current_inferior =
1559 (struct thread_info *) find_inferior_id (&all_threads, ptid);
1560 return 1;
1561 }
1562
1563 /* Wait for the inferior process to change state.
1564 STATUS will be filled in with a response code to send to GDB.
1565 Returns the signal which caused the process to stop. */
1566 static ptid_t
1567 win32_wait (ptid_t ptid, struct target_waitstatus *ourstatus, int options)
1568 {
1569 struct regcache *regcache;
1570
1571 if (cached_status.kind != TARGET_WAITKIND_IGNORE)
1572 {
1573 /* The core always does a wait after creating the inferior, and
1574 do_initial_child_stuff already ran the inferior to the
1575 initial breakpoint (or an exit, if creating the process
1576 fails). Report it now. */
1577 *ourstatus = cached_status;
1578 cached_status.kind = TARGET_WAITKIND_IGNORE;
1579 return debug_event_ptid (&current_event);
1580 }
1581
1582 while (1)
1583 {
1584 if (!get_child_debug_event (ourstatus))
1585 continue;
1586
1587 switch (ourstatus->kind)
1588 {
1589 case TARGET_WAITKIND_EXITED:
1590 OUTMSG2 (("Child exited with retcode = %x\n",
1591 ourstatus->value.integer));
1592 win32_clear_inferiors ();
1593 return pid_to_ptid (current_event.dwProcessId);
1594 case TARGET_WAITKIND_STOPPED:
1595 case TARGET_WAITKIND_LOADED:
1596 OUTMSG2 (("Child Stopped with signal = %d \n",
1597 ourstatus->value.sig));
1598
1599 regcache = get_thread_regcache (current_inferior, 1);
1600 child_fetch_inferior_registers (regcache, -1);
1601 return debug_event_ptid (&current_event);
1602 default:
1603 OUTMSG (("Ignoring unknown internal event, %d\n", ourstatus->kind));
1604 /* fall-through */
1605 case TARGET_WAITKIND_SPURIOUS:
1606 case TARGET_WAITKIND_EXECD:
1607 /* do nothing, just continue */
1608 child_continue (DBG_CONTINUE, -1);
1609 break;
1610 }
1611 }
1612 }
1613
1614 /* Fetch registers from the inferior process.
1615 If REGNO is -1, fetch all registers; otherwise, fetch at least REGNO. */
1616 static void
1617 win32_fetch_inferior_registers (struct regcache *regcache, int regno)
1618 {
1619 child_fetch_inferior_registers (regcache, regno);
1620 }
1621
1622 /* Store registers to the inferior process.
1623 If REGNO is -1, store all registers; otherwise, store at least REGNO. */
1624 static void
1625 win32_store_inferior_registers (struct regcache *regcache, int regno)
1626 {
1627 child_store_inferior_registers (regcache, regno);
1628 }
1629
1630 /* Read memory from the inferior process. This should generally be
1631 called through read_inferior_memory, which handles breakpoint shadowing.
1632 Read LEN bytes at MEMADDR into a buffer at MYADDR. */
1633 static int
1634 win32_read_inferior_memory (CORE_ADDR memaddr, unsigned char *myaddr, int len)
1635 {
1636 return child_xfer_memory (memaddr, (char *) myaddr, len, 0, 0) != len;
1637 }
1638
1639 /* Write memory to the inferior process. This should generally be
1640 called through write_inferior_memory, which handles breakpoint shadowing.
1641 Write LEN bytes from the buffer at MYADDR to MEMADDR.
1642 Returns 0 on success and errno on failure. */
1643 static int
1644 win32_write_inferior_memory (CORE_ADDR memaddr, const unsigned char *myaddr,
1645 int len)
1646 {
1647 return child_xfer_memory (memaddr, (char *) myaddr, len, 1, 0) != len;
1648 }
1649
1650 /* Send an interrupt request to the inferior process. */
1651 static void
1652 win32_request_interrupt (void)
1653 {
1654 winapi_DebugBreakProcess DebugBreakProcess;
1655 winapi_GenerateConsoleCtrlEvent GenerateConsoleCtrlEvent;
1656
1657 #ifdef _WIN32_WCE
1658 HMODULE dll = GetModuleHandle (_T("COREDLL.DLL"));
1659 #else
1660 HMODULE dll = GetModuleHandle (_T("KERNEL32.DLL"));
1661 #endif
1662
1663 GenerateConsoleCtrlEvent = GETPROCADDRESS (dll, GenerateConsoleCtrlEvent);
1664
1665 if (GenerateConsoleCtrlEvent != NULL
1666 && GenerateConsoleCtrlEvent (CTRL_BREAK_EVENT, current_process_id))
1667 return;
1668
1669 /* GenerateConsoleCtrlEvent can fail if process id being debugged is
1670 not a process group id.
1671 Fallback to XP/Vista 'DebugBreakProcess', which generates a
1672 breakpoint exception in the interior process. */
1673
1674 DebugBreakProcess = GETPROCADDRESS (dll, DebugBreakProcess);
1675
1676 if (DebugBreakProcess != NULL
1677 && DebugBreakProcess (current_process_handle))
1678 return;
1679
1680 /* Last resort, suspend all threads manually. */
1681 soft_interrupt_requested = 1;
1682 }
1683
1684 #ifdef _WIN32_WCE
1685 int
1686 win32_error_to_fileio_error (DWORD err)
1687 {
1688 switch (err)
1689 {
1690 case ERROR_BAD_PATHNAME:
1691 case ERROR_FILE_NOT_FOUND:
1692 case ERROR_INVALID_NAME:
1693 case ERROR_PATH_NOT_FOUND:
1694 return FILEIO_ENOENT;
1695 case ERROR_CRC:
1696 case ERROR_IO_DEVICE:
1697 case ERROR_OPEN_FAILED:
1698 return FILEIO_EIO;
1699 case ERROR_INVALID_HANDLE:
1700 return FILEIO_EBADF;
1701 case ERROR_ACCESS_DENIED:
1702 case ERROR_SHARING_VIOLATION:
1703 return FILEIO_EACCES;
1704 case ERROR_NOACCESS:
1705 return FILEIO_EFAULT;
1706 case ERROR_BUSY:
1707 return FILEIO_EBUSY;
1708 case ERROR_ALREADY_EXISTS:
1709 case ERROR_FILE_EXISTS:
1710 return FILEIO_EEXIST;
1711 case ERROR_BAD_DEVICE:
1712 return FILEIO_ENODEV;
1713 case ERROR_DIRECTORY:
1714 return FILEIO_ENOTDIR;
1715 case ERROR_FILENAME_EXCED_RANGE:
1716 case ERROR_INVALID_DATA:
1717 case ERROR_INVALID_PARAMETER:
1718 case ERROR_NEGATIVE_SEEK:
1719 return FILEIO_EINVAL;
1720 case ERROR_TOO_MANY_OPEN_FILES:
1721 return FILEIO_EMFILE;
1722 case ERROR_HANDLE_DISK_FULL:
1723 case ERROR_DISK_FULL:
1724 return FILEIO_ENOSPC;
1725 case ERROR_WRITE_PROTECT:
1726 return FILEIO_EROFS;
1727 case ERROR_NOT_SUPPORTED:
1728 return FILEIO_ENOSYS;
1729 }
1730
1731 return FILEIO_EUNKNOWN;
1732 }
1733
1734 static void
1735 wince_hostio_last_error (char *buf)
1736 {
1737 DWORD winerr = GetLastError ();
1738 int fileio_err = win32_error_to_fileio_error (winerr);
1739 sprintf (buf, "F-1,%x", fileio_err);
1740 }
1741 #endif
1742
1743 /* Write Windows OS Thread Information Block address. */
1744
1745 static int
1746 win32_get_tib_address (ptid_t ptid, CORE_ADDR *addr)
1747 {
1748 win32_thread_info *th;
1749 th = thread_rec (ptid, 0);
1750 if (th == NULL)
1751 return 0;
1752 if (addr != NULL)
1753 *addr = th->thread_local_base;
1754 return 1;
1755 }
1756
1757 static struct target_ops win32_target_ops = {
1758 win32_create_inferior,
1759 win32_attach,
1760 win32_kill,
1761 win32_detach,
1762 win32_mourn,
1763 win32_join,
1764 win32_thread_alive,
1765 win32_resume,
1766 win32_wait,
1767 win32_fetch_inferior_registers,
1768 win32_store_inferior_registers,
1769 NULL, /* prepare_to_access_memory */
1770 NULL, /* done_accessing_memory */
1771 win32_read_inferior_memory,
1772 win32_write_inferior_memory,
1773 NULL, /* lookup_symbols */
1774 win32_request_interrupt,
1775 NULL, /* read_auxv */
1776 win32_insert_point,
1777 win32_remove_point,
1778 win32_stopped_by_watchpoint,
1779 win32_stopped_data_address,
1780 NULL, /* read_offsets */
1781 NULL, /* get_tls_address */
1782 NULL, /* qxfer_spu */
1783 #ifdef _WIN32_WCE
1784 wince_hostio_last_error,
1785 #else
1786 hostio_last_error_from_errno,
1787 #endif
1788 NULL, /* qxfer_osdata */
1789 NULL, /* qxfer_siginfo */
1790 NULL, /* supports_non_stop */
1791 NULL, /* async */
1792 NULL, /* start_non_stop */
1793 NULL, /* supports_multi_process */
1794 NULL, /* handle_monitor_command */
1795 NULL, /* core_of_thread */
1796 NULL, /* read_loadmap */
1797 NULL, /* process_qsupported */
1798 NULL, /* supports_tracepoints */
1799 NULL, /* read_pc */
1800 NULL, /* write_pc */
1801 NULL, /* thread_stopped */
1802 win32_get_tib_address
1803 };
1804
1805 /* Initialize the Win32 backend. */
1806 void
1807 initialize_low (void)
1808 {
1809 set_target_ops (&win32_target_ops);
1810 if (the_low_target.breakpoint != NULL)
1811 set_breakpoint_data (the_low_target.breakpoint,
1812 the_low_target.breakpoint_len);
1813 the_low_target.arch_setup ();
1814 }
This page took 0.070008 seconds and 5 git commands to generate.