Automatic date update in version.in
[deliverable/binutils-gdb.git] / gdb / windows-nat.c
1 /* Target-vector operations for controlling windows child processes, for GDB.
2
3 Copyright (C) 1995-2020 Free Software Foundation, Inc.
4
5 Contributed by Cygnus Solutions, A Red Hat Company.
6
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
21
22 /* Originally by Steve Chamberlain, sac@cygnus.com */
23
24 #include "defs.h"
25 #include "frame.h" /* required by inferior.h */
26 #include "inferior.h"
27 #include "infrun.h"
28 #include "target.h"
29 #include "gdbcore.h"
30 #include "command.h"
31 #include "completer.h"
32 #include "regcache.h"
33 #include "top.h"
34 #include <signal.h>
35 #include <sys/types.h>
36 #include <fcntl.h>
37 #include <windows.h>
38 #include <imagehlp.h>
39 #include <psapi.h>
40 #ifdef __CYGWIN__
41 #include <wchar.h>
42 #include <sys/cygwin.h>
43 #include <cygwin/version.h>
44 #endif
45 #include <algorithm>
46
47 #include "filenames.h"
48 #include "symfile.h"
49 #include "objfiles.h"
50 #include "gdb_bfd.h"
51 #include "gdb_obstack.h"
52 #include "gdbthread.h"
53 #include "gdbcmd.h"
54 #include <unistd.h>
55 #include "exec.h"
56 #include "solist.h"
57 #include "solib.h"
58 #include "xml-support.h"
59 #include "inttypes.h"
60
61 #include "i386-tdep.h"
62 #include "i387-tdep.h"
63
64 #include "windows-tdep.h"
65 #include "windows-nat.h"
66 #include "x86-nat.h"
67 #include "complaints.h"
68 #include "inf-child.h"
69 #include "gdbsupport/gdb_tilde_expand.h"
70 #include "gdbsupport/pathstuff.h"
71 #include "gdbsupport/gdb_wait.h"
72
73 #define AdjustTokenPrivileges dyn_AdjustTokenPrivileges
74 #define DebugActiveProcessStop dyn_DebugActiveProcessStop
75 #define DebugBreakProcess dyn_DebugBreakProcess
76 #define DebugSetProcessKillOnExit dyn_DebugSetProcessKillOnExit
77 #define EnumProcessModules dyn_EnumProcessModules
78 #define GetModuleInformation dyn_GetModuleInformation
79 #define LookupPrivilegeValueA dyn_LookupPrivilegeValueA
80 #define OpenProcessToken dyn_OpenProcessToken
81 #define GetConsoleFontSize dyn_GetConsoleFontSize
82 #define GetCurrentConsoleFont dyn_GetCurrentConsoleFont
83
84 typedef BOOL WINAPI (AdjustTokenPrivileges_ftype) (HANDLE, BOOL,
85 PTOKEN_PRIVILEGES,
86 DWORD, PTOKEN_PRIVILEGES,
87 PDWORD);
88 static AdjustTokenPrivileges_ftype *AdjustTokenPrivileges;
89
90 typedef BOOL WINAPI (DebugActiveProcessStop_ftype) (DWORD);
91 static DebugActiveProcessStop_ftype *DebugActiveProcessStop;
92
93 typedef BOOL WINAPI (DebugBreakProcess_ftype) (HANDLE);
94 static DebugBreakProcess_ftype *DebugBreakProcess;
95
96 typedef BOOL WINAPI (DebugSetProcessKillOnExit_ftype) (BOOL);
97 static DebugSetProcessKillOnExit_ftype *DebugSetProcessKillOnExit;
98
99 typedef BOOL WINAPI (EnumProcessModules_ftype) (HANDLE, HMODULE *, DWORD,
100 LPDWORD);
101 static EnumProcessModules_ftype *EnumProcessModules;
102
103 typedef BOOL WINAPI (GetModuleInformation_ftype) (HANDLE, HMODULE,
104 LPMODULEINFO, DWORD);
105 static GetModuleInformation_ftype *GetModuleInformation;
106
107 typedef BOOL WINAPI (LookupPrivilegeValueA_ftype) (LPCSTR, LPCSTR, PLUID);
108 static LookupPrivilegeValueA_ftype *LookupPrivilegeValueA;
109
110 typedef BOOL WINAPI (OpenProcessToken_ftype) (HANDLE, DWORD, PHANDLE);
111 static OpenProcessToken_ftype *OpenProcessToken;
112
113 typedef BOOL WINAPI (GetCurrentConsoleFont_ftype) (HANDLE, BOOL,
114 CONSOLE_FONT_INFO *);
115 static GetCurrentConsoleFont_ftype *GetCurrentConsoleFont;
116
117 typedef COORD WINAPI (GetConsoleFontSize_ftype) (HANDLE, DWORD);
118 static GetConsoleFontSize_ftype *GetConsoleFontSize;
119
120 #undef STARTUPINFO
121 #undef CreateProcess
122 #undef GetModuleFileNameEx
123
124 #ifndef __CYGWIN__
125 # define __PMAX (MAX_PATH + 1)
126 typedef DWORD WINAPI (GetModuleFileNameEx_ftype) (HANDLE, HMODULE, LPSTR, DWORD);
127 static GetModuleFileNameEx_ftype *GetModuleFileNameEx;
128 # define STARTUPINFO STARTUPINFOA
129 # define CreateProcess CreateProcessA
130 # define GetModuleFileNameEx_name "GetModuleFileNameExA"
131 # define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
132 #else
133 # define __PMAX PATH_MAX
134 /* The starting and ending address of the cygwin1.dll text segment. */
135 static CORE_ADDR cygwin_load_start;
136 static CORE_ADDR cygwin_load_end;
137 # define __USEWIDE
138 typedef wchar_t cygwin_buf_t;
139 typedef DWORD WINAPI (GetModuleFileNameEx_ftype) (HANDLE, HMODULE,
140 LPWSTR, DWORD);
141 static GetModuleFileNameEx_ftype *GetModuleFileNameEx;
142 # define STARTUPINFO STARTUPINFOW
143 # define CreateProcess CreateProcessW
144 # define GetModuleFileNameEx_name "GetModuleFileNameExW"
145 # define bad_GetModuleFileNameEx bad_GetModuleFileNameExW
146 #endif
147
148 static int have_saved_context; /* True if we've saved context from a
149 cygwin signal. */
150 #ifdef __CYGWIN__
151 static CONTEXT saved_context; /* Contains the saved context from a
152 cygwin signal. */
153 #endif
154
155 /* If we're not using the old Cygwin header file set, define the
156 following which never should have been in the generic Win32 API
157 headers in the first place since they were our own invention... */
158 #ifndef _GNU_H_WINDOWS_H
159 enum
160 {
161 FLAG_TRACE_BIT = 0x100,
162 };
163 #endif
164
165 #ifndef CONTEXT_EXTENDED_REGISTERS
166 /* This macro is only defined on ia32. It only makes sense on this target,
167 so define it as zero if not already defined. */
168 #define CONTEXT_EXTENDED_REGISTERS 0
169 #endif
170
171 #define CONTEXT_DEBUGGER_DR CONTEXT_FULL | CONTEXT_FLOATING_POINT \
172 | CONTEXT_SEGMENTS | CONTEXT_DEBUG_REGISTERS \
173 | CONTEXT_EXTENDED_REGISTERS
174
175 static uintptr_t dr[8];
176 static int debug_registers_changed;
177 static int debug_registers_used;
178
179 static int windows_initialization_done;
180 #define DR6_CLEAR_VALUE 0xffff0ff0
181
182 /* The exception thrown by a program to tell the debugger the name of
183 a thread. The exception record contains an ID of a thread and a
184 name to give it. This exception has no documented name, but MSDN
185 dubs it "MS_VC_EXCEPTION" in one code example. */
186 #define MS_VC_EXCEPTION 0x406d1388
187
188 typedef enum
189 {
190 HANDLE_EXCEPTION_UNHANDLED = 0,
191 HANDLE_EXCEPTION_HANDLED,
192 HANDLE_EXCEPTION_IGNORED
193 } handle_exception_result;
194
195 /* The string sent by cygwin when it processes a signal.
196 FIXME: This should be in a cygwin include file. */
197 #ifndef _CYGWIN_SIGNAL_STRING
198 #define _CYGWIN_SIGNAL_STRING "cYgSiGw00f"
199 #endif
200
201 #define CHECK(x) check (x, __FILE__,__LINE__)
202 #define DEBUG_EXEC(x) if (debug_exec) printf_unfiltered x
203 #define DEBUG_EVENTS(x) if (debug_events) printf_unfiltered x
204 #define DEBUG_MEM(x) if (debug_memory) printf_unfiltered x
205 #define DEBUG_EXCEPT(x) if (debug_exceptions) printf_unfiltered x
206
207 static void cygwin_set_dr (int i, CORE_ADDR addr);
208 static void cygwin_set_dr7 (unsigned long val);
209 static CORE_ADDR cygwin_get_dr (int i);
210 static unsigned long cygwin_get_dr6 (void);
211 static unsigned long cygwin_get_dr7 (void);
212
213 static enum gdb_signal last_sig = GDB_SIGNAL_0;
214 /* Set if a signal was received from the debugged process. */
215
216 /* Thread information structure used to track information that is
217 not available in gdb's thread structure. */
218 typedef struct windows_thread_info_struct
219 {
220 struct windows_thread_info_struct *next;
221 DWORD id;
222 HANDLE h;
223 CORE_ADDR thread_local_base;
224 char *name;
225 int suspended;
226 int reload_context;
227 CONTEXT context;
228 }
229 windows_thread_info;
230
231 static windows_thread_info thread_head;
232
233 /* The process and thread handles for the above context. */
234
235 static DEBUG_EVENT current_event; /* The current debug event from
236 WaitForDebugEvent */
237 static HANDLE current_process_handle; /* Currently executing process */
238 static windows_thread_info *current_thread; /* Info on currently selected thread */
239
240 /* Counts of things. */
241 static int exception_count = 0;
242 static int event_count = 0;
243 static int saw_create;
244 static int open_process_used = 0;
245
246 /* User options. */
247 static bool new_console = false;
248 #ifdef __CYGWIN__
249 static bool cygwin_exceptions = false;
250 #endif
251 static bool new_group = true;
252 static bool debug_exec = false; /* show execution */
253 static bool debug_events = false; /* show events from kernel */
254 static bool debug_memory = false; /* show target memory accesses */
255 static bool debug_exceptions = false; /* show target exceptions */
256 static bool useshell = false; /* use shell for subprocesses */
257
258 /* This vector maps GDB's idea of a register's number into an offset
259 in the windows exception context vector.
260
261 It also contains the bit mask needed to load the register in question.
262
263 The contents of this table can only be computed by the units
264 that provide CPU-specific support for Windows native debugging.
265 These units should set the table by calling
266 windows_set_context_register_offsets.
267
268 One day we could read a reg, we could inspect the context we
269 already have loaded, if it doesn't have the bit set that we need,
270 we read that set of registers in using GetThreadContext. If the
271 context already contains what we need, we just unpack it. Then to
272 write a register, first we have to ensure that the context contains
273 the other regs of the group, and then we copy the info in and set
274 out bit. */
275
276 static const int *mappings;
277
278 /* The function to use in order to determine whether a register is
279 a segment register or not. */
280 static segment_register_p_ftype *segment_register_p;
281
282 /* See windows_nat_target::resume to understand why this is commented
283 out. */
284 #if 0
285 /* This vector maps the target's idea of an exception (extracted
286 from the DEBUG_EVENT structure) to GDB's idea. */
287
288 struct xlate_exception
289 {
290 DWORD them;
291 enum gdb_signal us;
292 };
293
294 static const struct xlate_exception xlate[] =
295 {
296 {EXCEPTION_ACCESS_VIOLATION, GDB_SIGNAL_SEGV},
297 {STATUS_STACK_OVERFLOW, GDB_SIGNAL_SEGV},
298 {EXCEPTION_BREAKPOINT, GDB_SIGNAL_TRAP},
299 {DBG_CONTROL_C, GDB_SIGNAL_INT},
300 {EXCEPTION_SINGLE_STEP, GDB_SIGNAL_TRAP},
301 {STATUS_FLOAT_DIVIDE_BY_ZERO, GDB_SIGNAL_FPE}
302 };
303
304 #endif /* 0 */
305
306 struct windows_nat_target final : public x86_nat_target<inf_child_target>
307 {
308 void close () override;
309
310 void attach (const char *, int) override;
311
312 bool attach_no_wait () override
313 { return true; }
314
315 void detach (inferior *, int) override;
316
317 void resume (ptid_t, int , enum gdb_signal) override;
318
319 ptid_t wait (ptid_t, struct target_waitstatus *, int) override;
320
321 void fetch_registers (struct regcache *, int) override;
322 void store_registers (struct regcache *, int) override;
323
324 enum target_xfer_status xfer_partial (enum target_object object,
325 const char *annex,
326 gdb_byte *readbuf,
327 const gdb_byte *writebuf,
328 ULONGEST offset, ULONGEST len,
329 ULONGEST *xfered_len) override;
330
331 void files_info () override;
332
333 void kill () override;
334
335 void create_inferior (const char *, const std::string &,
336 char **, int) override;
337
338 void mourn_inferior () override;
339
340 bool thread_alive (ptid_t ptid) override;
341
342 std::string pid_to_str (ptid_t) override;
343
344 void interrupt () override;
345
346 char *pid_to_exec_file (int pid) override;
347
348 ptid_t get_ada_task_ptid (long lwp, long thread) override;
349
350 bool get_tib_address (ptid_t ptid, CORE_ADDR *addr) override;
351
352 const char *thread_name (struct thread_info *) override;
353
354 int get_windows_debug_event (int pid, struct target_waitstatus *ourstatus);
355 };
356
357 static windows_nat_target the_windows_nat_target;
358
359 /* Set the MAPPINGS static global to OFFSETS.
360 See the description of MAPPINGS for more details. */
361
362 void
363 windows_set_context_register_offsets (const int *offsets)
364 {
365 mappings = offsets;
366 }
367
368 /* See windows-nat.h. */
369
370 void
371 windows_set_segment_register_p (segment_register_p_ftype *fun)
372 {
373 segment_register_p = fun;
374 }
375
376 static void
377 check (BOOL ok, const char *file, int line)
378 {
379 if (!ok)
380 printf_filtered ("error return %s:%d was %u\n", file, line,
381 (unsigned) GetLastError ());
382 }
383
384 /* Find a thread record given a thread id. If GET_CONTEXT is not 0,
385 then also retrieve the context for this thread. If GET_CONTEXT is
386 negative, then don't suspend the thread. */
387 static windows_thread_info *
388 thread_rec (DWORD id, int get_context)
389 {
390 windows_thread_info *th;
391
392 for (th = &thread_head; (th = th->next) != NULL;)
393 if (th->id == id)
394 {
395 if (!th->suspended && get_context)
396 {
397 if (get_context > 0 && id != current_event.dwThreadId)
398 {
399 if (SuspendThread (th->h) == (DWORD) -1)
400 {
401 DWORD err = GetLastError ();
402
403 /* We get Access Denied (5) when trying to suspend
404 threads that Windows started on behalf of the
405 debuggee, usually when those threads are just
406 about to exit.
407 We can get Invalid Handle (6) if the main thread
408 has exited. */
409 if (err != ERROR_INVALID_HANDLE
410 && err != ERROR_ACCESS_DENIED)
411 warning (_("SuspendThread (tid=0x%x) failed."
412 " (winerr %u)"),
413 (unsigned) id, (unsigned) err);
414 th->suspended = -1;
415 }
416 else
417 th->suspended = 1;
418 }
419 else if (get_context < 0)
420 th->suspended = -1;
421 th->reload_context = 1;
422 }
423 return th;
424 }
425
426 return NULL;
427 }
428
429 /* Add a thread to the thread list.
430
431 PTID is the ptid of the thread to be added.
432 H is its Windows handle.
433 TLB is its thread local base.
434 MAIN_THREAD_P should be true if the thread to be added is
435 the main thread, false otherwise. */
436
437 static windows_thread_info *
438 windows_add_thread (ptid_t ptid, HANDLE h, void *tlb, bool main_thread_p)
439 {
440 windows_thread_info *th;
441 DWORD id;
442
443 gdb_assert (ptid.tid () != 0);
444
445 id = ptid.tid ();
446
447 if ((th = thread_rec (id, FALSE)))
448 return th;
449
450 th = XCNEW (windows_thread_info);
451 th->id = id;
452 th->h = h;
453 th->thread_local_base = (CORE_ADDR) (uintptr_t) tlb;
454 th->next = thread_head.next;
455 thread_head.next = th;
456
457 /* Add this new thread to the list of threads.
458
459 To be consistent with what's done on other platforms, we add
460 the main thread silently (in reality, this thread is really
461 more of a process to the user than a thread). */
462 if (main_thread_p)
463 add_thread_silent (&the_windows_nat_target, ptid);
464 else
465 add_thread (&the_windows_nat_target, ptid);
466
467 /* Set the debug registers for the new thread if they are used. */
468 if (debug_registers_used)
469 {
470 /* Only change the value of the debug registers. */
471 th->context.ContextFlags = CONTEXT_DEBUG_REGISTERS;
472 CHECK (GetThreadContext (th->h, &th->context));
473 th->context.Dr0 = dr[0];
474 th->context.Dr1 = dr[1];
475 th->context.Dr2 = dr[2];
476 th->context.Dr3 = dr[3];
477 th->context.Dr6 = DR6_CLEAR_VALUE;
478 th->context.Dr7 = dr[7];
479 CHECK (SetThreadContext (th->h, &th->context));
480 th->context.ContextFlags = 0;
481 }
482 return th;
483 }
484
485 /* Clear out any old thread list and reinitialize it to a
486 pristine state. */
487 static void
488 windows_init_thread_list (void)
489 {
490 windows_thread_info *th = &thread_head;
491
492 DEBUG_EVENTS (("gdb: windows_init_thread_list\n"));
493 init_thread_list ();
494 while (th->next != NULL)
495 {
496 windows_thread_info *here = th->next;
497 th->next = here->next;
498 xfree (here);
499 }
500 thread_head.next = NULL;
501 }
502
503 /* Delete a thread from the list of threads.
504
505 PTID is the ptid of the thread to be deleted.
506 EXIT_CODE is the thread's exit code.
507 MAIN_THREAD_P should be true if the thread to be deleted is
508 the main thread, false otherwise. */
509
510 static void
511 windows_delete_thread (ptid_t ptid, DWORD exit_code, bool main_thread_p)
512 {
513 windows_thread_info *th;
514 DWORD id;
515
516 gdb_assert (ptid.tid () != 0);
517
518 id = ptid.tid ();
519
520 /* Emit a notification about the thread being deleted.
521
522 Note that no notification was printed when the main thread
523 was created, and thus, unless in verbose mode, we should be
524 symmetrical, and avoid that notification for the main thread
525 here as well. */
526
527 if (info_verbose)
528 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (ptid).c_str ());
529 else if (print_thread_events && !main_thread_p)
530 printf_unfiltered (_("[%s exited with code %u]\n"),
531 target_pid_to_str (ptid).c_str (),
532 (unsigned) exit_code);
533
534 delete_thread (find_thread_ptid (&the_windows_nat_target, ptid));
535
536 for (th = &thread_head;
537 th->next != NULL && th->next->id != id;
538 th = th->next)
539 continue;
540
541 if (th->next != NULL)
542 {
543 windows_thread_info *here = th->next;
544 th->next = here->next;
545 xfree (here->name);
546 xfree (here);
547 }
548 }
549
550 /* Fetches register number R from the given windows_thread_info,
551 and supplies its value to the given regcache.
552
553 This function assumes that R is non-negative. A failed assertion
554 is raised if that is not true.
555
556 This function assumes that TH->RELOAD_CONTEXT is not set, meaning
557 that the windows_thread_info has an up-to-date context. A failed
558 assertion is raised if that assumption is violated. */
559
560 static void
561 windows_fetch_one_register (struct regcache *regcache,
562 windows_thread_info *th, int r)
563 {
564 gdb_assert (r >= 0);
565 gdb_assert (!th->reload_context);
566
567 char *context_offset = ((char *) &th->context) + mappings[r];
568 struct gdbarch *gdbarch = regcache->arch ();
569 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
570
571 if (r == I387_FISEG_REGNUM (tdep))
572 {
573 long l = *((long *) context_offset) & 0xffff;
574 regcache->raw_supply (r, (char *) &l);
575 }
576 else if (r == I387_FOP_REGNUM (tdep))
577 {
578 long l = (*((long *) context_offset) >> 16) & ((1 << 11) - 1);
579 regcache->raw_supply (r, (char *) &l);
580 }
581 else if (segment_register_p (r))
582 {
583 /* GDB treats segment registers as 32bit registers, but they are
584 in fact only 16 bits long. Make sure we do not read extra
585 bits from our source buffer. */
586 long l = *((long *) context_offset) & 0xffff;
587 regcache->raw_supply (r, (char *) &l);
588 }
589 else
590 regcache->raw_supply (r, context_offset);
591 }
592
593 void
594 windows_nat_target::fetch_registers (struct regcache *regcache, int r)
595 {
596 DWORD tid = regcache->ptid ().tid ();
597 windows_thread_info *th = thread_rec (tid, TRUE);
598
599 /* Check if TH exists. Windows sometimes uses a non-existent
600 thread id in its events. */
601 if (th == NULL)
602 return;
603
604 if (th->reload_context)
605 {
606 #ifdef __CYGWIN__
607 if (have_saved_context)
608 {
609 /* Lie about where the program actually is stopped since
610 cygwin has informed us that we should consider the signal
611 to have occurred at another location which is stored in
612 "saved_context. */
613 memcpy (&th->context, &saved_context,
614 __COPY_CONTEXT_SIZE);
615 have_saved_context = 0;
616 }
617 else
618 #endif
619 {
620 th->context.ContextFlags = CONTEXT_DEBUGGER_DR;
621 CHECK (GetThreadContext (th->h, &th->context));
622 /* Copy dr values from that thread.
623 But only if there were not modified since last stop.
624 PR gdb/2388 */
625 if (!debug_registers_changed)
626 {
627 dr[0] = th->context.Dr0;
628 dr[1] = th->context.Dr1;
629 dr[2] = th->context.Dr2;
630 dr[3] = th->context.Dr3;
631 dr[6] = th->context.Dr6;
632 dr[7] = th->context.Dr7;
633 }
634 }
635 th->reload_context = 0;
636 }
637
638 if (r < 0)
639 for (r = 0; r < gdbarch_num_regs (regcache->arch()); r++)
640 windows_fetch_one_register (regcache, th, r);
641 else
642 windows_fetch_one_register (regcache, th, r);
643 }
644
645 /* Collect the register number R from the given regcache, and store
646 its value into the corresponding area of the given thread's context.
647
648 This function assumes that R is non-negative. A failed assertion
649 assertion is raised if that is not true. */
650
651 static void
652 windows_store_one_register (const struct regcache *regcache,
653 windows_thread_info *th, int r)
654 {
655 gdb_assert (r >= 0);
656
657 regcache->raw_collect (r, ((char *) &th->context) + mappings[r]);
658 }
659
660 /* Store a new register value into the context of the thread tied to
661 REGCACHE. */
662
663 void
664 windows_nat_target::store_registers (struct regcache *regcache, int r)
665 {
666 DWORD tid = regcache->ptid ().tid ();
667 windows_thread_info *th = thread_rec (tid, TRUE);
668
669 /* Check if TH exists. Windows sometimes uses a non-existent
670 thread id in its events. */
671 if (th == NULL)
672 return;
673
674 if (r < 0)
675 for (r = 0; r < gdbarch_num_regs (regcache->arch ()); r++)
676 windows_store_one_register (regcache, th, r);
677 else
678 windows_store_one_register (regcache, th, r);
679 }
680
681 /* Maintain a linked list of "so" information. */
682 struct lm_info_windows : public lm_info_base
683 {
684 LPVOID load_addr = 0;
685 CORE_ADDR text_offset = 0;
686 };
687
688 static struct so_list solib_start, *solib_end;
689
690 static struct so_list *
691 windows_make_so (const char *name, LPVOID load_addr)
692 {
693 struct so_list *so;
694 char *p;
695 #ifndef __CYGWIN__
696 char buf[__PMAX];
697 char cwd[__PMAX];
698 WIN32_FIND_DATA w32_fd;
699 HANDLE h = FindFirstFile(name, &w32_fd);
700
701 if (h == INVALID_HANDLE_VALUE)
702 strcpy (buf, name);
703 else
704 {
705 FindClose (h);
706 strcpy (buf, name);
707 if (GetCurrentDirectory (MAX_PATH + 1, cwd))
708 {
709 p = strrchr (buf, '\\');
710 if (p)
711 p[1] = '\0';
712 SetCurrentDirectory (buf);
713 GetFullPathName (w32_fd.cFileName, MAX_PATH, buf, &p);
714 SetCurrentDirectory (cwd);
715 }
716 }
717 if (strcasecmp (buf, "ntdll.dll") == 0)
718 {
719 GetSystemDirectory (buf, sizeof (buf));
720 strcat (buf, "\\ntdll.dll");
721 }
722 #else
723 cygwin_buf_t buf[__PMAX];
724
725 buf[0] = 0;
726 if (access (name, F_OK) != 0)
727 {
728 if (strcasecmp (name, "ntdll.dll") == 0)
729 #ifdef __USEWIDE
730 {
731 GetSystemDirectoryW (buf, sizeof (buf) / sizeof (wchar_t));
732 wcscat (buf, L"\\ntdll.dll");
733 }
734 #else
735 {
736 GetSystemDirectoryA (buf, sizeof (buf) / sizeof (wchar_t));
737 strcat (buf, "\\ntdll.dll");
738 }
739 #endif
740 }
741 #endif
742 so = XCNEW (struct so_list);
743 lm_info_windows *li = new lm_info_windows;
744 so->lm_info = li;
745 li->load_addr = load_addr;
746 strcpy (so->so_original_name, name);
747 #ifndef __CYGWIN__
748 strcpy (so->so_name, buf);
749 #else
750 if (buf[0])
751 cygwin_conv_path (CCP_WIN_W_TO_POSIX, buf, so->so_name,
752 SO_NAME_MAX_PATH_SIZE);
753 else
754 {
755 char *rname = realpath (name, NULL);
756 if (rname && strlen (rname) < SO_NAME_MAX_PATH_SIZE)
757 {
758 strcpy (so->so_name, rname);
759 free (rname);
760 }
761 else
762 error (_("dll path too long"));
763 }
764 /* Record cygwin1.dll .text start/end. */
765 p = strchr (so->so_name, '\0') - (sizeof ("/cygwin1.dll") - 1);
766 if (p >= so->so_name && strcasecmp (p, "/cygwin1.dll") == 0)
767 {
768 asection *text = NULL;
769
770 gdb_bfd_ref_ptr abfd (gdb_bfd_open (so->so_name, "pei-i386", -1));
771
772 if (abfd == NULL)
773 return so;
774
775 if (bfd_check_format (abfd.get (), bfd_object))
776 text = bfd_get_section_by_name (abfd.get (), ".text");
777
778 if (!text)
779 return so;
780
781 /* The symbols in a dll are offset by 0x1000, which is the
782 offset from 0 of the first byte in an image - because of the
783 file header and the section alignment. */
784 cygwin_load_start = (CORE_ADDR) (uintptr_t) ((char *)
785 load_addr + 0x1000);
786 cygwin_load_end = cygwin_load_start + bfd_section_size (text);
787 }
788 #endif
789
790 return so;
791 }
792
793 static char *
794 get_image_name (HANDLE h, void *address, int unicode)
795 {
796 #ifdef __CYGWIN__
797 static char buf[__PMAX];
798 #else
799 static char buf[(2 * __PMAX) + 1];
800 #endif
801 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
802 char *address_ptr;
803 int len = 0;
804 char b[2];
805 SIZE_T done;
806
807 /* Attempt to read the name of the dll that was detected.
808 This is documented to work only when actively debugging
809 a program. It will not work for attached processes. */
810 if (address == NULL)
811 return NULL;
812
813 /* See if we could read the address of a string, and that the
814 address isn't null. */
815 if (!ReadProcessMemory (h, address, &address_ptr,
816 sizeof (address_ptr), &done)
817 || done != sizeof (address_ptr) || !address_ptr)
818 return NULL;
819
820 /* Find the length of the string. */
821 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
822 && (b[0] != 0 || b[size - 1] != 0) && done == size)
823 continue;
824
825 if (!unicode)
826 ReadProcessMemory (h, address_ptr, buf, len, &done);
827 else
828 {
829 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
830 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
831 &done);
832 #ifdef __CYGWIN__
833 wcstombs (buf, unicode_address, __PMAX);
834 #else
835 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, sizeof buf,
836 0, 0);
837 #endif
838 }
839
840 return buf;
841 }
842
843 /* Handle a DLL load event, and return 1.
844
845 This function assumes that this event did not occur during inferior
846 initialization, where their event info may be incomplete (see
847 do_initial_windows_stuff and windows_add_all_dlls for more info
848 on how we handle DLL loading during that phase). */
849
850 static void
851 handle_load_dll ()
852 {
853 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
854 char *dll_name;
855
856 /* Try getting the DLL name via the lpImageName field of the event.
857 Note that Microsoft documents this fields as strictly optional,
858 in the sense that it might be NULL. And the first DLL event in
859 particular is explicitly documented as "likely not pass[ed]"
860 (source: MSDN LOAD_DLL_DEBUG_INFO structure). */
861 dll_name = get_image_name (current_process_handle,
862 event->lpImageName, event->fUnicode);
863 if (!dll_name)
864 return;
865
866 solib_end->next = windows_make_so (dll_name, event->lpBaseOfDll);
867 solib_end = solib_end->next;
868
869 lm_info_windows *li = (lm_info_windows *) solib_end->lm_info;
870
871 DEBUG_EVENTS (("gdb: Loading dll \"%s\" at %s.\n", solib_end->so_name,
872 host_address_to_string (li->load_addr)));
873 }
874
875 static void
876 windows_free_so (struct so_list *so)
877 {
878 lm_info_windows *li = (lm_info_windows *) so->lm_info;
879
880 delete li;
881 xfree (so);
882 }
883
884 /* Handle a DLL unload event.
885 Return 1 if successful, or zero otherwise.
886
887 This function assumes that this event did not occur during inferior
888 initialization, where their event info may be incomplete (see
889 do_initial_windows_stuff and windows_add_all_dlls for more info
890 on how we handle DLL loading during that phase). */
891
892 static void
893 handle_unload_dll ()
894 {
895 LPVOID lpBaseOfDll = current_event.u.UnloadDll.lpBaseOfDll;
896 struct so_list *so;
897
898 for (so = &solib_start; so->next != NULL; so = so->next)
899 {
900 lm_info_windows *li_next = (lm_info_windows *) so->next->lm_info;
901
902 if (li_next->load_addr == lpBaseOfDll)
903 {
904 struct so_list *sodel = so->next;
905
906 so->next = sodel->next;
907 if (!so->next)
908 solib_end = so;
909 DEBUG_EVENTS (("gdb: Unloading dll \"%s\".\n", sodel->so_name));
910
911 windows_free_so (sodel);
912 return;
913 }
914 }
915
916 /* We did not find any DLL that was previously loaded at this address,
917 so register a complaint. We do not report an error, because we have
918 observed that this may be happening under some circumstances. For
919 instance, running 32bit applications on x64 Windows causes us to receive
920 4 mysterious UNLOAD_DLL_DEBUG_EVENTs during the startup phase (these
921 events are apparently caused by the WOW layer, the interface between
922 32bit and 64bit worlds). */
923 complaint (_("dll starting at %s not found."),
924 host_address_to_string (lpBaseOfDll));
925 }
926
927 /* Call FUNC wrapped in a TRY/CATCH that swallows all GDB
928 exceptions. */
929
930 static void
931 catch_errors (void (*func) ())
932 {
933 try
934 {
935 func ();
936 }
937 catch (const gdb_exception &ex)
938 {
939 exception_print (gdb_stderr, ex);
940 }
941 }
942
943 /* Clear list of loaded DLLs. */
944 static void
945 windows_clear_solib (void)
946 {
947 struct so_list *so;
948
949 for (so = solib_start.next; so; so = solib_start.next)
950 {
951 solib_start.next = so->next;
952 windows_free_so (so);
953 }
954
955 solib_end = &solib_start;
956 }
957
958 static void
959 signal_event_command (const char *args, int from_tty)
960 {
961 uintptr_t event_id = 0;
962 char *endargs = NULL;
963
964 if (args == NULL)
965 error (_("signal-event requires an argument (integer event id)"));
966
967 event_id = strtoumax (args, &endargs, 10);
968
969 if ((errno == ERANGE) || (event_id == 0) || (event_id > UINTPTR_MAX) ||
970 ((HANDLE) event_id == INVALID_HANDLE_VALUE))
971 error (_("Failed to convert `%s' to event id"), args);
972
973 SetEvent ((HANDLE) event_id);
974 CloseHandle ((HANDLE) event_id);
975 }
976
977 /* Handle DEBUG_STRING output from child process.
978 Cygwin prepends its messages with a "cygwin:". Interpret this as
979 a Cygwin signal. Otherwise just print the string as a warning. */
980 static int
981 handle_output_debug_string (struct target_waitstatus *ourstatus)
982 {
983 gdb::unique_xmalloc_ptr<char> s;
984 int retval = 0;
985
986 if (!target_read_string
987 ((CORE_ADDR) (uintptr_t) current_event.u.DebugString.lpDebugStringData,
988 &s, 1024, 0)
989 || !s || !*(s.get ()))
990 /* nothing to do */;
991 else if (!startswith (s.get (), _CYGWIN_SIGNAL_STRING))
992 {
993 #ifdef __CYGWIN__
994 if (!startswith (s.get (), "cYg"))
995 #endif
996 {
997 char *p = strchr (s.get (), '\0');
998
999 if (p > s.get () && *--p == '\n')
1000 *p = '\0';
1001 warning (("%s"), s.get ());
1002 }
1003 }
1004 #ifdef __CYGWIN__
1005 else
1006 {
1007 /* Got a cygwin signal marker. A cygwin signal is followed by
1008 the signal number itself and then optionally followed by the
1009 thread id and address to saved context within the DLL. If
1010 these are supplied, then the given thread is assumed to have
1011 issued the signal and the context from the thread is assumed
1012 to be stored at the given address in the inferior. Tell gdb
1013 to treat this like a real signal. */
1014 char *p;
1015 int sig = strtol (s.get () + sizeof (_CYGWIN_SIGNAL_STRING) - 1, &p, 0);
1016 gdb_signal gotasig = gdb_signal_from_host (sig);
1017
1018 ourstatus->value.sig = gotasig;
1019 if (gotasig)
1020 {
1021 LPCVOID x;
1022 SIZE_T n;
1023
1024 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1025 retval = strtoul (p, &p, 0);
1026 if (!retval)
1027 retval = current_event.dwThreadId;
1028 else if ((x = (LPCVOID) (uintptr_t) strtoull (p, NULL, 0))
1029 && ReadProcessMemory (current_process_handle, x,
1030 &saved_context,
1031 __COPY_CONTEXT_SIZE, &n)
1032 && n == __COPY_CONTEXT_SIZE)
1033 have_saved_context = 1;
1034 }
1035 }
1036 #endif
1037
1038 return retval;
1039 }
1040
1041 static int
1042 display_selector (HANDLE thread, DWORD sel)
1043 {
1044 LDT_ENTRY info;
1045 if (GetThreadSelectorEntry (thread, sel, &info))
1046 {
1047 int base, limit;
1048 printf_filtered ("0x%03x: ", (unsigned) sel);
1049 if (!info.HighWord.Bits.Pres)
1050 {
1051 puts_filtered ("Segment not present\n");
1052 return 0;
1053 }
1054 base = (info.HighWord.Bits.BaseHi << 24) +
1055 (info.HighWord.Bits.BaseMid << 16)
1056 + info.BaseLow;
1057 limit = (info.HighWord.Bits.LimitHi << 16) + info.LimitLow;
1058 if (info.HighWord.Bits.Granularity)
1059 limit = (limit << 12) | 0xfff;
1060 printf_filtered ("base=0x%08x limit=0x%08x", base, limit);
1061 if (info.HighWord.Bits.Default_Big)
1062 puts_filtered(" 32-bit ");
1063 else
1064 puts_filtered(" 16-bit ");
1065 switch ((info.HighWord.Bits.Type & 0xf) >> 1)
1066 {
1067 case 0:
1068 puts_filtered ("Data (Read-Only, Exp-up");
1069 break;
1070 case 1:
1071 puts_filtered ("Data (Read/Write, Exp-up");
1072 break;
1073 case 2:
1074 puts_filtered ("Unused segment (");
1075 break;
1076 case 3:
1077 puts_filtered ("Data (Read/Write, Exp-down");
1078 break;
1079 case 4:
1080 puts_filtered ("Code (Exec-Only, N.Conf");
1081 break;
1082 case 5:
1083 puts_filtered ("Code (Exec/Read, N.Conf");
1084 break;
1085 case 6:
1086 puts_filtered ("Code (Exec-Only, Conf");
1087 break;
1088 case 7:
1089 puts_filtered ("Code (Exec/Read, Conf");
1090 break;
1091 default:
1092 printf_filtered ("Unknown type 0x%lx",
1093 (unsigned long) info.HighWord.Bits.Type);
1094 }
1095 if ((info.HighWord.Bits.Type & 0x1) == 0)
1096 puts_filtered(", N.Acc");
1097 puts_filtered (")\n");
1098 if ((info.HighWord.Bits.Type & 0x10) == 0)
1099 puts_filtered("System selector ");
1100 printf_filtered ("Priviledge level = %ld. ",
1101 (unsigned long) info.HighWord.Bits.Dpl);
1102 if (info.HighWord.Bits.Granularity)
1103 puts_filtered ("Page granular.\n");
1104 else
1105 puts_filtered ("Byte granular.\n");
1106 return 1;
1107 }
1108 else
1109 {
1110 DWORD err = GetLastError ();
1111 if (err == ERROR_NOT_SUPPORTED)
1112 printf_filtered ("Function not supported\n");
1113 else
1114 printf_filtered ("Invalid selector 0x%x.\n", (unsigned) sel);
1115 return 0;
1116 }
1117 }
1118
1119 static void
1120 display_selectors (const char * args, int from_tty)
1121 {
1122 if (!current_thread)
1123 {
1124 puts_filtered ("Impossible to display selectors now.\n");
1125 return;
1126 }
1127 if (!args)
1128 {
1129
1130 puts_filtered ("Selector $cs\n");
1131 display_selector (current_thread->h,
1132 current_thread->context.SegCs);
1133 puts_filtered ("Selector $ds\n");
1134 display_selector (current_thread->h,
1135 current_thread->context.SegDs);
1136 puts_filtered ("Selector $es\n");
1137 display_selector (current_thread->h,
1138 current_thread->context.SegEs);
1139 puts_filtered ("Selector $ss\n");
1140 display_selector (current_thread->h,
1141 current_thread->context.SegSs);
1142 puts_filtered ("Selector $fs\n");
1143 display_selector (current_thread->h,
1144 current_thread->context.SegFs);
1145 puts_filtered ("Selector $gs\n");
1146 display_selector (current_thread->h,
1147 current_thread->context.SegGs);
1148 }
1149 else
1150 {
1151 int sel;
1152 sel = parse_and_eval_long (args);
1153 printf_filtered ("Selector \"%s\"\n",args);
1154 display_selector (current_thread->h, sel);
1155 }
1156 }
1157
1158 #define DEBUG_EXCEPTION_SIMPLE(x) if (debug_exceptions) \
1159 printf_unfiltered ("gdb: Target exception %s at %s\n", x, \
1160 host_address_to_string (\
1161 current_event.u.Exception.ExceptionRecord.ExceptionAddress))
1162
1163 static handle_exception_result
1164 handle_exception (struct target_waitstatus *ourstatus)
1165 {
1166 EXCEPTION_RECORD *rec = &current_event.u.Exception.ExceptionRecord;
1167 DWORD code = rec->ExceptionCode;
1168 handle_exception_result result = HANDLE_EXCEPTION_HANDLED;
1169
1170 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1171
1172 /* Record the context of the current thread. */
1173 thread_rec (current_event.dwThreadId, -1);
1174
1175 switch (code)
1176 {
1177 case EXCEPTION_ACCESS_VIOLATION:
1178 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ACCESS_VIOLATION");
1179 ourstatus->value.sig = GDB_SIGNAL_SEGV;
1180 #ifdef __CYGWIN__
1181 {
1182 /* See if the access violation happened within the cygwin DLL
1183 itself. Cygwin uses a kind of exception handling to deal
1184 with passed-in invalid addresses. gdb should not treat
1185 these as real SEGVs since they will be silently handled by
1186 cygwin. A real SEGV will (theoretically) be caught by
1187 cygwin later in the process and will be sent as a
1188 cygwin-specific-signal. So, ignore SEGVs if they show up
1189 within the text segment of the DLL itself. */
1190 const char *fn;
1191 CORE_ADDR addr = (CORE_ADDR) (uintptr_t) rec->ExceptionAddress;
1192
1193 if ((!cygwin_exceptions && (addr >= cygwin_load_start
1194 && addr < cygwin_load_end))
1195 || (find_pc_partial_function (addr, &fn, NULL, NULL)
1196 && startswith (fn, "KERNEL32!IsBad")))
1197 return HANDLE_EXCEPTION_UNHANDLED;
1198 }
1199 #endif
1200 break;
1201 case STATUS_STACK_OVERFLOW:
1202 DEBUG_EXCEPTION_SIMPLE ("STATUS_STACK_OVERFLOW");
1203 ourstatus->value.sig = GDB_SIGNAL_SEGV;
1204 break;
1205 case STATUS_FLOAT_DENORMAL_OPERAND:
1206 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DENORMAL_OPERAND");
1207 ourstatus->value.sig = GDB_SIGNAL_FPE;
1208 break;
1209 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1210 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ARRAY_BOUNDS_EXCEEDED");
1211 ourstatus->value.sig = GDB_SIGNAL_FPE;
1212 break;
1213 case STATUS_FLOAT_INEXACT_RESULT:
1214 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INEXACT_RESULT");
1215 ourstatus->value.sig = GDB_SIGNAL_FPE;
1216 break;
1217 case STATUS_FLOAT_INVALID_OPERATION:
1218 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INVALID_OPERATION");
1219 ourstatus->value.sig = GDB_SIGNAL_FPE;
1220 break;
1221 case STATUS_FLOAT_OVERFLOW:
1222 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_OVERFLOW");
1223 ourstatus->value.sig = GDB_SIGNAL_FPE;
1224 break;
1225 case STATUS_FLOAT_STACK_CHECK:
1226 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_STACK_CHECK");
1227 ourstatus->value.sig = GDB_SIGNAL_FPE;
1228 break;
1229 case STATUS_FLOAT_UNDERFLOW:
1230 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_UNDERFLOW");
1231 ourstatus->value.sig = GDB_SIGNAL_FPE;
1232 break;
1233 case STATUS_FLOAT_DIVIDE_BY_ZERO:
1234 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DIVIDE_BY_ZERO");
1235 ourstatus->value.sig = GDB_SIGNAL_FPE;
1236 break;
1237 case STATUS_INTEGER_DIVIDE_BY_ZERO:
1238 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_DIVIDE_BY_ZERO");
1239 ourstatus->value.sig = GDB_SIGNAL_FPE;
1240 break;
1241 case STATUS_INTEGER_OVERFLOW:
1242 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_OVERFLOW");
1243 ourstatus->value.sig = GDB_SIGNAL_FPE;
1244 break;
1245 case EXCEPTION_BREAKPOINT:
1246 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_BREAKPOINT");
1247 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1248 break;
1249 case DBG_CONTROL_C:
1250 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_C");
1251 ourstatus->value.sig = GDB_SIGNAL_INT;
1252 break;
1253 case DBG_CONTROL_BREAK:
1254 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_BREAK");
1255 ourstatus->value.sig = GDB_SIGNAL_INT;
1256 break;
1257 case EXCEPTION_SINGLE_STEP:
1258 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_SINGLE_STEP");
1259 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1260 break;
1261 case EXCEPTION_ILLEGAL_INSTRUCTION:
1262 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ILLEGAL_INSTRUCTION");
1263 ourstatus->value.sig = GDB_SIGNAL_ILL;
1264 break;
1265 case EXCEPTION_PRIV_INSTRUCTION:
1266 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_PRIV_INSTRUCTION");
1267 ourstatus->value.sig = GDB_SIGNAL_ILL;
1268 break;
1269 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1270 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_NONCONTINUABLE_EXCEPTION");
1271 ourstatus->value.sig = GDB_SIGNAL_ILL;
1272 break;
1273 case MS_VC_EXCEPTION:
1274 if (rec->NumberParameters >= 3
1275 && (rec->ExceptionInformation[0] & 0xffffffff) == 0x1000)
1276 {
1277 DWORD named_thread_id;
1278 windows_thread_info *named_thread;
1279 CORE_ADDR thread_name_target;
1280
1281 DEBUG_EXCEPTION_SIMPLE ("MS_VC_EXCEPTION");
1282
1283 thread_name_target = rec->ExceptionInformation[1];
1284 named_thread_id = (DWORD) (0xffffffff & rec->ExceptionInformation[2]);
1285
1286 if (named_thread_id == (DWORD) -1)
1287 named_thread_id = current_event.dwThreadId;
1288
1289 named_thread = thread_rec (named_thread_id, 0);
1290 if (named_thread != NULL)
1291 {
1292 int thread_name_len;
1293 gdb::unique_xmalloc_ptr<char> thread_name;
1294
1295 thread_name_len = target_read_string (thread_name_target,
1296 &thread_name, 1025, NULL);
1297 if (thread_name_len > 0)
1298 {
1299 thread_name.get ()[thread_name_len - 1] = '\0';
1300 xfree (named_thread->name);
1301 named_thread->name = thread_name.release ();
1302 }
1303 }
1304 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1305 result = HANDLE_EXCEPTION_IGNORED;
1306 break;
1307 }
1308 /* treat improperly formed exception as unknown */
1309 /* FALLTHROUGH */
1310 default:
1311 /* Treat unhandled first chance exceptions specially. */
1312 if (current_event.u.Exception.dwFirstChance)
1313 return HANDLE_EXCEPTION_UNHANDLED;
1314 printf_unfiltered ("gdb: unknown target exception 0x%08x at %s\n",
1315 (unsigned) current_event.u.Exception.ExceptionRecord.ExceptionCode,
1316 host_address_to_string (
1317 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
1318 ourstatus->value.sig = GDB_SIGNAL_UNKNOWN;
1319 break;
1320 }
1321 exception_count++;
1322 last_sig = ourstatus->value.sig;
1323 return result;
1324 }
1325
1326 /* Resume thread specified by ID, or all artificially suspended
1327 threads, if we are continuing execution. KILLED non-zero means we
1328 have killed the inferior, so we should ignore weird errors due to
1329 threads shutting down. */
1330 static BOOL
1331 windows_continue (DWORD continue_status, int id, int killed)
1332 {
1333 windows_thread_info *th;
1334 BOOL res;
1335
1336 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%d, ctid=0x%x, %s);\n",
1337 (unsigned) current_event.dwProcessId,
1338 (unsigned) current_event.dwThreadId,
1339 continue_status == DBG_CONTINUE ?
1340 "DBG_CONTINUE" : "DBG_EXCEPTION_NOT_HANDLED"));
1341
1342 for (th = &thread_head; (th = th->next) != NULL;)
1343 if ((id == -1 || id == (int) th->id)
1344 && th->suspended)
1345 {
1346 if (debug_registers_changed)
1347 {
1348 th->context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1349 th->context.Dr0 = dr[0];
1350 th->context.Dr1 = dr[1];
1351 th->context.Dr2 = dr[2];
1352 th->context.Dr3 = dr[3];
1353 th->context.Dr6 = DR6_CLEAR_VALUE;
1354 th->context.Dr7 = dr[7];
1355 }
1356 if (th->context.ContextFlags)
1357 {
1358 DWORD ec = 0;
1359
1360 if (GetExitCodeThread (th->h, &ec)
1361 && ec == STILL_ACTIVE)
1362 {
1363 BOOL status = SetThreadContext (th->h, &th->context);
1364
1365 if (!killed)
1366 CHECK (status);
1367 }
1368 th->context.ContextFlags = 0;
1369 }
1370 if (th->suspended > 0)
1371 (void) ResumeThread (th->h);
1372 th->suspended = 0;
1373 }
1374
1375 res = ContinueDebugEvent (current_event.dwProcessId,
1376 current_event.dwThreadId,
1377 continue_status);
1378
1379 if (!res)
1380 error (_("Failed to resume program execution"
1381 " (ContinueDebugEvent failed, error %u)"),
1382 (unsigned int) GetLastError ());
1383
1384 debug_registers_changed = 0;
1385 return res;
1386 }
1387
1388 /* Called in pathological case where Windows fails to send a
1389 CREATE_PROCESS_DEBUG_EVENT after an attach. */
1390 static DWORD
1391 fake_create_process (void)
1392 {
1393 current_process_handle = OpenProcess (PROCESS_ALL_ACCESS, FALSE,
1394 current_event.dwProcessId);
1395 if (current_process_handle != NULL)
1396 open_process_used = 1;
1397 else
1398 {
1399 error (_("OpenProcess call failed, GetLastError = %u"),
1400 (unsigned) GetLastError ());
1401 /* We can not debug anything in that case. */
1402 }
1403 current_thread
1404 = windows_add_thread (ptid_t (current_event.dwProcessId, 0,
1405 current_event.dwThreadId),
1406 current_event.u.CreateThread.hThread,
1407 current_event.u.CreateThread.lpThreadLocalBase,
1408 true /* main_thread_p */);
1409 return current_event.dwThreadId;
1410 }
1411
1412 void
1413 windows_nat_target::resume (ptid_t ptid, int step, enum gdb_signal sig)
1414 {
1415 windows_thread_info *th;
1416 DWORD continue_status = DBG_CONTINUE;
1417
1418 /* A specific PTID means `step only this thread id'. */
1419 int resume_all = ptid == minus_one_ptid;
1420
1421 /* If we're continuing all threads, it's the current inferior that
1422 should be handled specially. */
1423 if (resume_all)
1424 ptid = inferior_ptid;
1425
1426 if (sig != GDB_SIGNAL_0)
1427 {
1428 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
1429 {
1430 DEBUG_EXCEPT(("Cannot continue with signal %d here.\n",sig));
1431 }
1432 else if (sig == last_sig)
1433 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1434 else
1435 #if 0
1436 /* This code does not seem to work, because
1437 the kernel does probably not consider changes in the ExceptionRecord
1438 structure when passing the exception to the inferior.
1439 Note that this seems possible in the exception handler itself. */
1440 {
1441 for (const xlate_exception &x : xlate)
1442 if (x.us == sig)
1443 {
1444 current_event.u.Exception.ExceptionRecord.ExceptionCode
1445 = x.them;
1446 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1447 break;
1448 }
1449 if (continue_status == DBG_CONTINUE)
1450 {
1451 DEBUG_EXCEPT(("Cannot continue with signal %d.\n",sig));
1452 }
1453 }
1454 #endif
1455 DEBUG_EXCEPT(("Can only continue with received signal %d.\n",
1456 last_sig));
1457 }
1458
1459 last_sig = GDB_SIGNAL_0;
1460
1461 DEBUG_EXEC (("gdb: windows_resume (pid=%d, tid=0x%x, step=%d, sig=%d);\n",
1462 ptid.pid (), (unsigned) ptid.tid (), step, sig));
1463
1464 /* Get context for currently selected thread. */
1465 th = thread_rec (inferior_ptid.tid (), FALSE);
1466 if (th)
1467 {
1468 if (step)
1469 {
1470 /* Single step by setting t bit. */
1471 struct regcache *regcache = get_current_regcache ();
1472 struct gdbarch *gdbarch = regcache->arch ();
1473 fetch_registers (regcache, gdbarch_ps_regnum (gdbarch));
1474 th->context.EFlags |= FLAG_TRACE_BIT;
1475 }
1476
1477 if (th->context.ContextFlags)
1478 {
1479 if (debug_registers_changed)
1480 {
1481 th->context.Dr0 = dr[0];
1482 th->context.Dr1 = dr[1];
1483 th->context.Dr2 = dr[2];
1484 th->context.Dr3 = dr[3];
1485 th->context.Dr6 = DR6_CLEAR_VALUE;
1486 th->context.Dr7 = dr[7];
1487 }
1488 CHECK (SetThreadContext (th->h, &th->context));
1489 th->context.ContextFlags = 0;
1490 }
1491 }
1492
1493 /* Allow continuing with the same signal that interrupted us.
1494 Otherwise complain. */
1495
1496 if (resume_all)
1497 windows_continue (continue_status, -1, 0);
1498 else
1499 windows_continue (continue_status, ptid.tid (), 0);
1500 }
1501
1502 /* Ctrl-C handler used when the inferior is not run in the same console. The
1503 handler is in charge of interrupting the inferior using DebugBreakProcess.
1504 Note that this function is not available prior to Windows XP. In this case
1505 we emit a warning. */
1506 static BOOL WINAPI
1507 ctrl_c_handler (DWORD event_type)
1508 {
1509 const int attach_flag = current_inferior ()->attach_flag;
1510
1511 /* Only handle Ctrl-C and Ctrl-Break events. Ignore others. */
1512 if (event_type != CTRL_C_EVENT && event_type != CTRL_BREAK_EVENT)
1513 return FALSE;
1514
1515 /* If the inferior and the debugger share the same console, do nothing as
1516 the inferior has also received the Ctrl-C event. */
1517 if (!new_console && !attach_flag)
1518 return TRUE;
1519
1520 if (!DebugBreakProcess (current_process_handle))
1521 warning (_("Could not interrupt program. "
1522 "Press Ctrl-c in the program console."));
1523
1524 /* Return true to tell that Ctrl-C has been handled. */
1525 return TRUE;
1526 }
1527
1528 /* Get the next event from the child. Returns a non-zero thread id if the event
1529 requires handling by WFI (or whatever). */
1530
1531 int
1532 windows_nat_target::get_windows_debug_event (int pid,
1533 struct target_waitstatus *ourstatus)
1534 {
1535 BOOL debug_event;
1536 DWORD continue_status, event_code;
1537 windows_thread_info *th;
1538 static windows_thread_info dummy_thread_info;
1539 DWORD thread_id = 0;
1540
1541 last_sig = GDB_SIGNAL_0;
1542
1543 if (!(debug_event = WaitForDebugEvent (&current_event, 1000)))
1544 goto out;
1545
1546 event_count++;
1547 continue_status = DBG_CONTINUE;
1548
1549 event_code = current_event.dwDebugEventCode;
1550 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
1551 th = NULL;
1552 have_saved_context = 0;
1553
1554 switch (event_code)
1555 {
1556 case CREATE_THREAD_DEBUG_EVENT:
1557 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
1558 (unsigned) current_event.dwProcessId,
1559 (unsigned) current_event.dwThreadId,
1560 "CREATE_THREAD_DEBUG_EVENT"));
1561 if (saw_create != 1)
1562 {
1563 inferior *inf = find_inferior_pid (this, current_event.dwProcessId);
1564 if (!saw_create && inf->attach_flag)
1565 {
1566 /* Kludge around a Windows bug where first event is a create
1567 thread event. Caused when attached process does not have
1568 a main thread. */
1569 thread_id = fake_create_process ();
1570 if (thread_id)
1571 saw_create++;
1572 }
1573 break;
1574 }
1575 /* Record the existence of this thread. */
1576 thread_id = current_event.dwThreadId;
1577 th = windows_add_thread
1578 (ptid_t (current_event.dwProcessId, 0, current_event.dwThreadId),
1579 current_event.u.CreateThread.hThread,
1580 current_event.u.CreateThread.lpThreadLocalBase,
1581 false /* main_thread_p */);
1582
1583 break;
1584
1585 case EXIT_THREAD_DEBUG_EVENT:
1586 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
1587 (unsigned) current_event.dwProcessId,
1588 (unsigned) current_event.dwThreadId,
1589 "EXIT_THREAD_DEBUG_EVENT"));
1590 windows_delete_thread (ptid_t (current_event.dwProcessId, 0,
1591 current_event.dwThreadId),
1592 current_event.u.ExitThread.dwExitCode,
1593 false /* main_thread_p */);
1594 th = &dummy_thread_info;
1595 break;
1596
1597 case CREATE_PROCESS_DEBUG_EVENT:
1598 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
1599 (unsigned) current_event.dwProcessId,
1600 (unsigned) current_event.dwThreadId,
1601 "CREATE_PROCESS_DEBUG_EVENT"));
1602 CloseHandle (current_event.u.CreateProcessInfo.hFile);
1603 if (++saw_create != 1)
1604 break;
1605
1606 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
1607 /* Add the main thread. */
1608 th = windows_add_thread
1609 (ptid_t (current_event.dwProcessId, 0,
1610 current_event.dwThreadId),
1611 current_event.u.CreateProcessInfo.hThread,
1612 current_event.u.CreateProcessInfo.lpThreadLocalBase,
1613 true /* main_thread_p */);
1614 thread_id = current_event.dwThreadId;
1615 break;
1616
1617 case EXIT_PROCESS_DEBUG_EVENT:
1618 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
1619 (unsigned) current_event.dwProcessId,
1620 (unsigned) current_event.dwThreadId,
1621 "EXIT_PROCESS_DEBUG_EVENT"));
1622 if (!windows_initialization_done)
1623 {
1624 target_terminal::ours ();
1625 target_mourn_inferior (inferior_ptid);
1626 error (_("During startup program exited with code 0x%x."),
1627 (unsigned int) current_event.u.ExitProcess.dwExitCode);
1628 }
1629 else if (saw_create == 1)
1630 {
1631 windows_delete_thread (ptid_t (current_event.dwProcessId, 0,
1632 current_event.dwThreadId),
1633 0, true /* main_thread_p */);
1634 DWORD exit_status = current_event.u.ExitProcess.dwExitCode;
1635 /* If the exit status looks like a fatal exception, but we
1636 don't recognize the exception's code, make the original
1637 exit status value available, to avoid losing
1638 information. */
1639 int exit_signal
1640 = WIFSIGNALED (exit_status) ? WTERMSIG (exit_status) : -1;
1641 if (exit_signal == -1)
1642 {
1643 ourstatus->kind = TARGET_WAITKIND_EXITED;
1644 ourstatus->value.integer = exit_status;
1645 }
1646 else
1647 {
1648 ourstatus->kind = TARGET_WAITKIND_SIGNALLED;
1649 ourstatus->value.sig = gdb_signal_from_host (exit_signal);
1650 }
1651 thread_id = current_event.dwThreadId;
1652 }
1653 break;
1654
1655 case LOAD_DLL_DEBUG_EVENT:
1656 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
1657 (unsigned) current_event.dwProcessId,
1658 (unsigned) current_event.dwThreadId,
1659 "LOAD_DLL_DEBUG_EVENT"));
1660 CloseHandle (current_event.u.LoadDll.hFile);
1661 if (saw_create != 1 || ! windows_initialization_done)
1662 break;
1663 catch_errors (handle_load_dll);
1664 ourstatus->kind = TARGET_WAITKIND_LOADED;
1665 ourstatus->value.integer = 0;
1666 thread_id = current_event.dwThreadId;
1667 break;
1668
1669 case UNLOAD_DLL_DEBUG_EVENT:
1670 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
1671 (unsigned) current_event.dwProcessId,
1672 (unsigned) current_event.dwThreadId,
1673 "UNLOAD_DLL_DEBUG_EVENT"));
1674 if (saw_create != 1 || ! windows_initialization_done)
1675 break;
1676 catch_errors (handle_unload_dll);
1677 ourstatus->kind = TARGET_WAITKIND_LOADED;
1678 ourstatus->value.integer = 0;
1679 thread_id = current_event.dwThreadId;
1680 break;
1681
1682 case EXCEPTION_DEBUG_EVENT:
1683 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
1684 (unsigned) current_event.dwProcessId,
1685 (unsigned) current_event.dwThreadId,
1686 "EXCEPTION_DEBUG_EVENT"));
1687 if (saw_create != 1)
1688 break;
1689 switch (handle_exception (ourstatus))
1690 {
1691 case HANDLE_EXCEPTION_UNHANDLED:
1692 default:
1693 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1694 break;
1695 case HANDLE_EXCEPTION_HANDLED:
1696 thread_id = current_event.dwThreadId;
1697 break;
1698 case HANDLE_EXCEPTION_IGNORED:
1699 continue_status = DBG_CONTINUE;
1700 break;
1701 }
1702 break;
1703
1704 case OUTPUT_DEBUG_STRING_EVENT: /* Message from the kernel. */
1705 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
1706 (unsigned) current_event.dwProcessId,
1707 (unsigned) current_event.dwThreadId,
1708 "OUTPUT_DEBUG_STRING_EVENT"));
1709 if (saw_create != 1)
1710 break;
1711 thread_id = handle_output_debug_string (ourstatus);
1712 break;
1713
1714 default:
1715 if (saw_create != 1)
1716 break;
1717 printf_unfiltered ("gdb: kernel event for pid=%u tid=0x%x\n",
1718 (unsigned) current_event.dwProcessId,
1719 (unsigned) current_event.dwThreadId);
1720 printf_unfiltered (" unknown event code %u\n",
1721 (unsigned) current_event.dwDebugEventCode);
1722 break;
1723 }
1724
1725 if (!thread_id || saw_create != 1)
1726 {
1727 CHECK (windows_continue (continue_status, -1, 0));
1728 }
1729 else
1730 {
1731 inferior_ptid = ptid_t (current_event.dwProcessId, 0, thread_id);
1732 current_thread = th;
1733 if (!current_thread)
1734 current_thread = thread_rec (thread_id, TRUE);
1735 }
1736
1737 out:
1738 return thread_id;
1739 }
1740
1741 /* Wait for interesting events to occur in the target process. */
1742 ptid_t
1743 windows_nat_target::wait (ptid_t ptid, struct target_waitstatus *ourstatus,
1744 int options)
1745 {
1746 int pid = -1;
1747
1748 /* We loop when we get a non-standard exception rather than return
1749 with a SPURIOUS because resume can try and step or modify things,
1750 which needs a current_thread->h. But some of these exceptions mark
1751 the birth or death of threads, which mean that the current thread
1752 isn't necessarily what you think it is. */
1753
1754 while (1)
1755 {
1756 int retval;
1757
1758 /* If the user presses Ctrl-c while the debugger is waiting
1759 for an event, he expects the debugger to interrupt his program
1760 and to get the prompt back. There are two possible situations:
1761
1762 - The debugger and the program do not share the console, in
1763 which case the Ctrl-c event only reached the debugger.
1764 In that case, the ctrl_c handler will take care of interrupting
1765 the inferior. Note that this case is working starting with
1766 Windows XP. For Windows 2000, Ctrl-C should be pressed in the
1767 inferior console.
1768
1769 - The debugger and the program share the same console, in which
1770 case both debugger and inferior will receive the Ctrl-c event.
1771 In that case the ctrl_c handler will ignore the event, as the
1772 Ctrl-c event generated inside the inferior will trigger the
1773 expected debug event.
1774
1775 FIXME: brobecker/2008-05-20: If the inferior receives the
1776 signal first and the delay until GDB receives that signal
1777 is sufficiently long, GDB can sometimes receive the SIGINT
1778 after we have unblocked the CTRL+C handler. This would
1779 lead to the debugger stopping prematurely while handling
1780 the new-thread event that comes with the handling of the SIGINT
1781 inside the inferior, and then stop again immediately when
1782 the user tries to resume the execution in the inferior.
1783 This is a classic race that we should try to fix one day. */
1784 SetConsoleCtrlHandler (&ctrl_c_handler, TRUE);
1785 retval = get_windows_debug_event (pid, ourstatus);
1786 SetConsoleCtrlHandler (&ctrl_c_handler, FALSE);
1787
1788 if (retval)
1789 return ptid_t (current_event.dwProcessId, 0, retval);
1790 else
1791 {
1792 int detach = 0;
1793
1794 if (deprecated_ui_loop_hook != NULL)
1795 detach = deprecated_ui_loop_hook (0);
1796
1797 if (detach)
1798 kill ();
1799 }
1800 }
1801 }
1802
1803 /* Iterate over all DLLs currently mapped by our inferior, and
1804 add them to our list of solibs. */
1805
1806 static void
1807 windows_add_all_dlls (void)
1808 {
1809 HMODULE dummy_hmodule;
1810 DWORD cb_needed;
1811 HMODULE *hmodules;
1812 int i;
1813
1814 if (EnumProcessModules (current_process_handle, &dummy_hmodule,
1815 sizeof (HMODULE), &cb_needed) == 0)
1816 return;
1817
1818 if (cb_needed < 1)
1819 return;
1820
1821 hmodules = (HMODULE *) alloca (cb_needed);
1822 if (EnumProcessModules (current_process_handle, hmodules,
1823 cb_needed, &cb_needed) == 0)
1824 return;
1825
1826 for (i = 1; i < (int) (cb_needed / sizeof (HMODULE)); i++)
1827 {
1828 MODULEINFO mi;
1829 #ifdef __USEWIDE
1830 wchar_t dll_name[__PMAX];
1831 char name[__PMAX];
1832 #else
1833 char dll_name[__PMAX];
1834 char *name;
1835 #endif
1836 if (GetModuleInformation (current_process_handle, hmodules[i],
1837 &mi, sizeof (mi)) == 0)
1838 continue;
1839 if (GetModuleFileNameEx (current_process_handle, hmodules[i],
1840 dll_name, sizeof (dll_name)) == 0)
1841 continue;
1842 #ifdef __USEWIDE
1843 wcstombs (name, dll_name, __PMAX);
1844 #else
1845 name = dll_name;
1846 #endif
1847
1848 solib_end->next = windows_make_so (name, mi.lpBaseOfDll);
1849 solib_end = solib_end->next;
1850 }
1851 }
1852
1853 static void
1854 do_initial_windows_stuff (struct target_ops *ops, DWORD pid, int attaching)
1855 {
1856 int i;
1857 struct inferior *inf;
1858
1859 last_sig = GDB_SIGNAL_0;
1860 event_count = 0;
1861 exception_count = 0;
1862 open_process_used = 0;
1863 debug_registers_changed = 0;
1864 debug_registers_used = 0;
1865 for (i = 0; i < sizeof (dr) / sizeof (dr[0]); i++)
1866 dr[i] = 0;
1867 #ifdef __CYGWIN__
1868 cygwin_load_start = cygwin_load_end = 0;
1869 #endif
1870 current_event.dwProcessId = pid;
1871 memset (&current_event, 0, sizeof (current_event));
1872 if (!target_is_pushed (ops))
1873 push_target (ops);
1874 disable_breakpoints_in_shlibs ();
1875 windows_clear_solib ();
1876 clear_proceed_status (0);
1877 init_wait_for_inferior ();
1878
1879 inf = current_inferior ();
1880 inferior_appeared (inf, pid);
1881 inf->attach_flag = attaching;
1882
1883 /* Make the new process the current inferior, so terminal handling
1884 can rely on it. When attaching, we don't know about any thread
1885 id here, but that's OK --- nothing should be referencing the
1886 current thread until we report an event out of windows_wait. */
1887 inferior_ptid = ptid_t (pid);
1888
1889 target_terminal::init ();
1890 target_terminal::inferior ();
1891
1892 windows_initialization_done = 0;
1893
1894 while (1)
1895 {
1896 struct target_waitstatus status;
1897
1898 ops->wait (minus_one_ptid, &status, 0);
1899
1900 /* Note windows_wait returns TARGET_WAITKIND_SPURIOUS for thread
1901 events. */
1902 if (status.kind != TARGET_WAITKIND_LOADED
1903 && status.kind != TARGET_WAITKIND_SPURIOUS)
1904 break;
1905
1906 ops->resume (minus_one_ptid, 0, GDB_SIGNAL_0);
1907 }
1908
1909 /* Now that the inferior has been started and all DLLs have been mapped,
1910 we can iterate over all DLLs and load them in.
1911
1912 We avoid doing it any earlier because, on certain versions of Windows,
1913 LOAD_DLL_DEBUG_EVENTs are sometimes not complete. In particular,
1914 we have seen on Windows 8.1 that the ntdll.dll load event does not
1915 include the DLL name, preventing us from creating an associated SO.
1916 A possible explanation is that ntdll.dll might be mapped before
1917 the SO info gets created by the Windows system -- ntdll.dll is
1918 the first DLL to be reported via LOAD_DLL_DEBUG_EVENT and other DLLs
1919 do not seem to suffer from that problem.
1920
1921 Rather than try to work around this sort of issue, it is much
1922 simpler to just ignore DLL load/unload events during the startup
1923 phase, and then process them all in one batch now. */
1924 windows_add_all_dlls ();
1925
1926 windows_initialization_done = 1;
1927 return;
1928 }
1929
1930 /* Try to set or remove a user privilege to the current process. Return -1
1931 if that fails, the previous setting of that privilege otherwise.
1932
1933 This code is copied from the Cygwin source code and rearranged to allow
1934 dynamically loading of the needed symbols from advapi32 which is only
1935 available on NT/2K/XP. */
1936 static int
1937 set_process_privilege (const char *privilege, BOOL enable)
1938 {
1939 HANDLE token_hdl = NULL;
1940 LUID restore_priv;
1941 TOKEN_PRIVILEGES new_priv, orig_priv;
1942 int ret = -1;
1943 DWORD size;
1944
1945 if (!OpenProcessToken (GetCurrentProcess (),
1946 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
1947 &token_hdl))
1948 goto out;
1949
1950 if (!LookupPrivilegeValueA (NULL, privilege, &restore_priv))
1951 goto out;
1952
1953 new_priv.PrivilegeCount = 1;
1954 new_priv.Privileges[0].Luid = restore_priv;
1955 new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0;
1956
1957 if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv,
1958 sizeof orig_priv, &orig_priv, &size))
1959 goto out;
1960 #if 0
1961 /* Disabled, otherwise every `attach' in an unprivileged user session
1962 would raise the "Failed to get SE_DEBUG_NAME privilege" warning in
1963 windows_attach(). */
1964 /* AdjustTokenPrivileges returns TRUE even if the privilege could not
1965 be enabled. GetLastError () returns an correct error code, though. */
1966 if (enable && GetLastError () == ERROR_NOT_ALL_ASSIGNED)
1967 goto out;
1968 #endif
1969
1970 ret = orig_priv.Privileges[0].Attributes == SE_PRIVILEGE_ENABLED ? 1 : 0;
1971
1972 out:
1973 if (token_hdl)
1974 CloseHandle (token_hdl);
1975
1976 return ret;
1977 }
1978
1979 /* Attach to process PID, then initialize for debugging it. */
1980
1981 void
1982 windows_nat_target::attach (const char *args, int from_tty)
1983 {
1984 BOOL ok;
1985 DWORD pid;
1986
1987 pid = parse_pid_to_attach (args);
1988
1989 if (set_process_privilege (SE_DEBUG_NAME, TRUE) < 0)
1990 {
1991 printf_unfiltered ("Warning: Failed to get SE_DEBUG_NAME privilege\n");
1992 printf_unfiltered ("This can cause attach to "
1993 "fail on Windows NT/2K/XP\n");
1994 }
1995
1996 windows_init_thread_list ();
1997 ok = DebugActiveProcess (pid);
1998 saw_create = 0;
1999
2000 #ifdef __CYGWIN__
2001 if (!ok)
2002 {
2003 /* Try fall back to Cygwin pid. */
2004 pid = cygwin_internal (CW_CYGWIN_PID_TO_WINPID, pid);
2005
2006 if (pid > 0)
2007 ok = DebugActiveProcess (pid);
2008 }
2009 #endif
2010
2011 if (!ok)
2012 error (_("Can't attach to process %u (error %u)"),
2013 (unsigned) pid, (unsigned) GetLastError ());
2014
2015 DebugSetProcessKillOnExit (FALSE);
2016
2017 if (from_tty)
2018 {
2019 const char *exec_file = get_exec_file (0);
2020
2021 if (exec_file)
2022 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
2023 target_pid_to_str (ptid_t (pid)).c_str ());
2024 else
2025 printf_unfiltered ("Attaching to %s\n",
2026 target_pid_to_str (ptid_t (pid)).c_str ());
2027 }
2028
2029 do_initial_windows_stuff (this, pid, 1);
2030 target_terminal::ours ();
2031 }
2032
2033 void
2034 windows_nat_target::detach (inferior *inf, int from_tty)
2035 {
2036 int detached = 1;
2037
2038 ptid_t ptid = minus_one_ptid;
2039 resume (ptid, 0, GDB_SIGNAL_0);
2040
2041 if (!DebugActiveProcessStop (current_event.dwProcessId))
2042 {
2043 error (_("Can't detach process %u (error %u)"),
2044 (unsigned) current_event.dwProcessId, (unsigned) GetLastError ());
2045 detached = 0;
2046 }
2047 DebugSetProcessKillOnExit (FALSE);
2048
2049 if (detached && from_tty)
2050 {
2051 const char *exec_file = get_exec_file (0);
2052 if (exec_file == 0)
2053 exec_file = "";
2054 printf_unfiltered ("Detaching from program: %s, Pid %u\n", exec_file,
2055 (unsigned) current_event.dwProcessId);
2056 }
2057
2058 x86_cleanup_dregs ();
2059 inferior_ptid = null_ptid;
2060 detach_inferior (inf);
2061
2062 maybe_unpush_target ();
2063 }
2064
2065 /* Try to determine the executable filename.
2066
2067 EXE_NAME_RET is a pointer to a buffer whose size is EXE_NAME_MAX_LEN.
2068
2069 Upon success, the filename is stored inside EXE_NAME_RET, and
2070 this function returns nonzero.
2071
2072 Otherwise, this function returns zero and the contents of
2073 EXE_NAME_RET is undefined. */
2074
2075 static int
2076 windows_get_exec_module_filename (char *exe_name_ret, size_t exe_name_max_len)
2077 {
2078 DWORD len;
2079 HMODULE dh_buf;
2080 DWORD cbNeeded;
2081
2082 cbNeeded = 0;
2083 if (!EnumProcessModules (current_process_handle, &dh_buf,
2084 sizeof (HMODULE), &cbNeeded) || !cbNeeded)
2085 return 0;
2086
2087 /* We know the executable is always first in the list of modules,
2088 which we just fetched. So no need to fetch more. */
2089
2090 #ifdef __CYGWIN__
2091 {
2092 /* Cygwin prefers that the path be in /x/y/z format, so extract
2093 the filename into a temporary buffer first, and then convert it
2094 to POSIX format into the destination buffer. */
2095 cygwin_buf_t *pathbuf = (cygwin_buf_t *) alloca (exe_name_max_len * sizeof (cygwin_buf_t));
2096
2097 len = GetModuleFileNameEx (current_process_handle,
2098 dh_buf, pathbuf, exe_name_max_len);
2099 if (len == 0)
2100 error (_("Error getting executable filename: %u."),
2101 (unsigned) GetLastError ());
2102 if (cygwin_conv_path (CCP_WIN_W_TO_POSIX, pathbuf, exe_name_ret,
2103 exe_name_max_len) < 0)
2104 error (_("Error converting executable filename to POSIX: %d."), errno);
2105 }
2106 #else
2107 len = GetModuleFileNameEx (current_process_handle,
2108 dh_buf, exe_name_ret, exe_name_max_len);
2109 if (len == 0)
2110 error (_("Error getting executable filename: %u."),
2111 (unsigned) GetLastError ());
2112 #endif
2113
2114 return 1; /* success */
2115 }
2116
2117 /* The pid_to_exec_file target_ops method for this platform. */
2118
2119 char *
2120 windows_nat_target::pid_to_exec_file (int pid)
2121 {
2122 static char path[__PMAX];
2123 #ifdef __CYGWIN__
2124 /* Try to find exe name as symlink target of /proc/<pid>/exe. */
2125 int nchars;
2126 char procexe[sizeof ("/proc/4294967295/exe")];
2127
2128 xsnprintf (procexe, sizeof (procexe), "/proc/%u/exe", pid);
2129 nchars = readlink (procexe, path, sizeof(path));
2130 if (nchars > 0 && nchars < sizeof (path))
2131 {
2132 path[nchars] = '\0'; /* Got it */
2133 return path;
2134 }
2135 #endif
2136
2137 /* If we get here then either Cygwin is hosed, this isn't a Cygwin version
2138 of gdb, or we're trying to debug a non-Cygwin windows executable. */
2139 if (!windows_get_exec_module_filename (path, sizeof (path)))
2140 path[0] = '\0';
2141
2142 return path;
2143 }
2144
2145 /* Print status information about what we're accessing. */
2146
2147 void
2148 windows_nat_target::files_info ()
2149 {
2150 struct inferior *inf = current_inferior ();
2151
2152 printf_unfiltered ("\tUsing the running image of %s %s.\n",
2153 inf->attach_flag ? "attached" : "child",
2154 target_pid_to_str (inferior_ptid).c_str ());
2155 }
2156
2157 /* Modify CreateProcess parameters for use of a new separate console.
2158 Parameters are:
2159 *FLAGS: DWORD parameter for general process creation flags.
2160 *SI: STARTUPINFO structure, for which the console window size and
2161 console buffer size is filled in if GDB is running in a console.
2162 to create the new console.
2163 The size of the used font is not available on all versions of
2164 Windows OS. Furthermore, the current font might not be the default
2165 font, but this is still better than before.
2166 If the windows and buffer sizes are computed,
2167 SI->DWFLAGS is changed so that this information is used
2168 by CreateProcess function. */
2169
2170 static void
2171 windows_set_console_info (STARTUPINFO *si, DWORD *flags)
2172 {
2173 HANDLE hconsole = CreateFile ("CONOUT$", GENERIC_READ | GENERIC_WRITE,
2174 FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, 0);
2175
2176 if (hconsole != INVALID_HANDLE_VALUE)
2177 {
2178 CONSOLE_SCREEN_BUFFER_INFO sbinfo;
2179 COORD font_size;
2180 CONSOLE_FONT_INFO cfi;
2181
2182 GetCurrentConsoleFont (hconsole, FALSE, &cfi);
2183 font_size = GetConsoleFontSize (hconsole, cfi.nFont);
2184 GetConsoleScreenBufferInfo(hconsole, &sbinfo);
2185 si->dwXSize = sbinfo.srWindow.Right - sbinfo.srWindow.Left + 1;
2186 si->dwYSize = sbinfo.srWindow.Bottom - sbinfo.srWindow.Top + 1;
2187 if (font_size.X)
2188 si->dwXSize *= font_size.X;
2189 else
2190 si->dwXSize *= 8;
2191 if (font_size.Y)
2192 si->dwYSize *= font_size.Y;
2193 else
2194 si->dwYSize *= 12;
2195 si->dwXCountChars = sbinfo.dwSize.X;
2196 si->dwYCountChars = sbinfo.dwSize.Y;
2197 si->dwFlags |= STARTF_USESIZE | STARTF_USECOUNTCHARS;
2198 }
2199 *flags |= CREATE_NEW_CONSOLE;
2200 }
2201
2202 #ifndef __CYGWIN__
2203 /* Function called by qsort to sort environment strings. */
2204
2205 static int
2206 envvar_cmp (const void *a, const void *b)
2207 {
2208 const char **p = (const char **) a;
2209 const char **q = (const char **) b;
2210 return strcasecmp (*p, *q);
2211 }
2212 #endif
2213
2214 #ifdef __CYGWIN__
2215 static void
2216 clear_win32_environment (char **env)
2217 {
2218 int i;
2219 size_t len;
2220 wchar_t *copy = NULL, *equalpos;
2221
2222 for (i = 0; env[i] && *env[i]; i++)
2223 {
2224 len = mbstowcs (NULL, env[i], 0) + 1;
2225 copy = (wchar_t *) xrealloc (copy, len * sizeof (wchar_t));
2226 mbstowcs (copy, env[i], len);
2227 equalpos = wcschr (copy, L'=');
2228 if (equalpos)
2229 *equalpos = L'\0';
2230 SetEnvironmentVariableW (copy, NULL);
2231 }
2232 xfree (copy);
2233 }
2234 #endif
2235
2236 #ifndef __CYGWIN__
2237
2238 /* Redirection of inferior I/O streams for native MS-Windows programs.
2239 Unlike on Unix, where this is handled by invoking the inferior via
2240 the shell, on MS-Windows we need to emulate the cmd.exe shell.
2241
2242 The official documentation of the cmd.exe redirection features is here:
2243
2244 http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/redirection.mspx
2245
2246 (That page talks about Windows XP, but there's no newer
2247 documentation, so we assume later versions of cmd.exe didn't change
2248 anything.)
2249
2250 Caveat: the documentation on that page seems to include a few lies.
2251 For example, it describes strange constructs 1<&2 and 2<&1, which
2252 seem to work only when 1>&2 resp. 2>&1 would make sense, and so I
2253 think the cmd.exe parser of the redirection symbols simply doesn't
2254 care about the < vs > distinction in these cases. Therefore, the
2255 supported features are explicitly documented below.
2256
2257 The emulation below aims at supporting all the valid use cases
2258 supported by cmd.exe, which include:
2259
2260 < FILE redirect standard input from FILE
2261 0< FILE redirect standard input from FILE
2262 <&N redirect standard input from file descriptor N
2263 0<&N redirect standard input from file descriptor N
2264 > FILE redirect standard output to FILE
2265 >> FILE append standard output to FILE
2266 1>> FILE append standard output to FILE
2267 >&N redirect standard output to file descriptor N
2268 1>&N redirect standard output to file descriptor N
2269 >>&N append standard output to file descriptor N
2270 1>>&N append standard output to file descriptor N
2271 2> FILE redirect standard error to FILE
2272 2>> FILE append standard error to FILE
2273 2>&N redirect standard error to file descriptor N
2274 2>>&N append standard error to file descriptor N
2275
2276 Note that using N > 2 in the above construct is supported, but
2277 requires that the corresponding file descriptor be open by some
2278 means elsewhere or outside GDB. Also note that using ">&0" or
2279 "<&2" will generally fail, because the file descriptor redirected
2280 from is normally open in an incompatible mode (e.g., FD 0 is open
2281 for reading only). IOW, use of such tricks is not recommended;
2282 you are on your own.
2283
2284 We do NOT support redirection of file descriptors above 2, as in
2285 "3>SOME-FILE", because MinGW compiled programs don't (supporting
2286 that needs special handling in the startup code that MinGW
2287 doesn't have). Pipes are also not supported.
2288
2289 As for invalid use cases, where the redirection contains some
2290 error, the emulation below will detect that and produce some
2291 error and/or failure. But the behavior in those cases is not
2292 bug-for-bug compatible with what cmd.exe does in those cases.
2293 That's because what cmd.exe does then is not well defined, and
2294 seems to be a side effect of the cmd.exe parsing of the command
2295 line more than anything else. For example, try redirecting to an
2296 invalid file name, as in "> foo:bar".
2297
2298 There are also minor syntactic deviations from what cmd.exe does
2299 in some corner cases. For example, it doesn't support the likes
2300 of "> &foo" to mean redirect to file named literally "&foo"; we
2301 do support that here, because that, too, sounds like some issue
2302 with the cmd.exe parser. Another nicety is that we support
2303 redirection targets that use file names with forward slashes,
2304 something cmd.exe doesn't -- this comes in handy since GDB
2305 file-name completion can be used when typing the command line for
2306 the inferior. */
2307
2308 /* Support routines for redirecting standard handles of the inferior. */
2309
2310 /* Parse a single redirection spec, open/duplicate the specified
2311 file/fd, and assign the appropriate value to one of the 3 standard
2312 file descriptors. */
2313 static int
2314 redir_open (const char *redir_string, int *inp, int *out, int *err)
2315 {
2316 int *fd, ref_fd = -2;
2317 int mode;
2318 const char *fname = redir_string + 1;
2319 int rc = *redir_string;
2320
2321 switch (rc)
2322 {
2323 case '0':
2324 fname++;
2325 /* FALLTHROUGH */
2326 case '<':
2327 fd = inp;
2328 mode = O_RDONLY;
2329 break;
2330 case '1': case '2':
2331 fname++;
2332 /* FALLTHROUGH */
2333 case '>':
2334 fd = (rc == '2') ? err : out;
2335 mode = O_WRONLY | O_CREAT;
2336 if (*fname == '>')
2337 {
2338 fname++;
2339 mode |= O_APPEND;
2340 }
2341 else
2342 mode |= O_TRUNC;
2343 break;
2344 default:
2345 return -1;
2346 }
2347
2348 if (*fname == '&' && '0' <= fname[1] && fname[1] <= '9')
2349 {
2350 /* A reference to a file descriptor. */
2351 char *fdtail;
2352 ref_fd = (int) strtol (fname + 1, &fdtail, 10);
2353 if (fdtail > fname + 1 && *fdtail == '\0')
2354 {
2355 /* Don't allow redirection when open modes are incompatible. */
2356 if ((ref_fd == 0 && (fd == out || fd == err))
2357 || ((ref_fd == 1 || ref_fd == 2) && fd == inp))
2358 {
2359 errno = EPERM;
2360 return -1;
2361 }
2362 if (ref_fd == 0)
2363 ref_fd = *inp;
2364 else if (ref_fd == 1)
2365 ref_fd = *out;
2366 else if (ref_fd == 2)
2367 ref_fd = *err;
2368 }
2369 else
2370 {
2371 errno = EBADF;
2372 return -1;
2373 }
2374 }
2375 else
2376 fname++; /* skip the separator space */
2377 /* If the descriptor is already open, close it. This allows
2378 multiple specs of redirections for the same stream, which is
2379 somewhat nonsensical, but still valid and supported by cmd.exe.
2380 (But cmd.exe only opens a single file in this case, the one
2381 specified by the last redirection spec on the command line.) */
2382 if (*fd >= 0)
2383 _close (*fd);
2384 if (ref_fd == -2)
2385 {
2386 *fd = _open (fname, mode, _S_IREAD | _S_IWRITE);
2387 if (*fd < 0)
2388 return -1;
2389 }
2390 else if (ref_fd == -1)
2391 *fd = -1; /* reset to default destination */
2392 else
2393 {
2394 *fd = _dup (ref_fd);
2395 if (*fd < 0)
2396 return -1;
2397 }
2398 /* _open just sets a flag for O_APPEND, which won't be passed to the
2399 inferior, so we need to actually move the file pointer. */
2400 if ((mode & O_APPEND) != 0)
2401 _lseek (*fd, 0L, SEEK_END);
2402 return 0;
2403 }
2404
2405 /* Canonicalize a single redirection spec and set up the corresponding
2406 file descriptor as specified. */
2407 static int
2408 redir_set_redirection (const char *s, int *inp, int *out, int *err)
2409 {
2410 char buf[__PMAX + 2 + 5]; /* extra space for quotes & redirection string */
2411 char *d = buf;
2412 const char *start = s;
2413 int quote = 0;
2414
2415 *d++ = *s++; /* copy the 1st character, < or > or a digit */
2416 if ((*start == '>' || *start == '1' || *start == '2')
2417 && *s == '>')
2418 {
2419 *d++ = *s++;
2420 if (*s == '>' && *start != '>')
2421 *d++ = *s++;
2422 }
2423 else if (*start == '0' && *s == '<')
2424 *d++ = *s++;
2425 /* cmd.exe recognizes "&N" only immediately after the redirection symbol. */
2426 if (*s != '&')
2427 {
2428 while (isspace (*s)) /* skip whitespace before file name */
2429 s++;
2430 *d++ = ' '; /* separate file name with a single space */
2431 }
2432
2433 /* Copy the file name. */
2434 while (*s)
2435 {
2436 /* Remove quoting characters from the file name in buf[]. */
2437 if (*s == '"') /* could support '..' quoting here */
2438 {
2439 if (!quote)
2440 quote = *s++;
2441 else if (*s == quote)
2442 {
2443 quote = 0;
2444 s++;
2445 }
2446 else
2447 *d++ = *s++;
2448 }
2449 else if (*s == '\\')
2450 {
2451 if (s[1] == '"') /* could support '..' here */
2452 s++;
2453 *d++ = *s++;
2454 }
2455 else if (isspace (*s) && !quote)
2456 break;
2457 else
2458 *d++ = *s++;
2459 if (d - buf >= sizeof (buf) - 1)
2460 {
2461 errno = ENAMETOOLONG;
2462 return 0;
2463 }
2464 }
2465 *d = '\0';
2466
2467 /* Windows doesn't allow redirection characters in file names, so we
2468 can bail out early if they use them, or if there's no target file
2469 name after the redirection symbol. */
2470 if (d[-1] == '>' || d[-1] == '<')
2471 {
2472 errno = ENOENT;
2473 return 0;
2474 }
2475 if (redir_open (buf, inp, out, err) == 0)
2476 return s - start;
2477 return 0;
2478 }
2479
2480 /* Parse the command line for redirection specs and prepare the file
2481 descriptors for the 3 standard streams accordingly. */
2482 static bool
2483 redirect_inferior_handles (const char *cmd_orig, char *cmd,
2484 int *inp, int *out, int *err)
2485 {
2486 const char *s = cmd_orig;
2487 char *d = cmd;
2488 int quote = 0;
2489 bool retval = false;
2490
2491 while (isspace (*s))
2492 *d++ = *s++;
2493
2494 while (*s)
2495 {
2496 if (*s == '"') /* could also support '..' quoting here */
2497 {
2498 if (!quote)
2499 quote = *s;
2500 else if (*s == quote)
2501 quote = 0;
2502 }
2503 else if (*s == '\\')
2504 {
2505 if (s[1] == '"') /* escaped quote char */
2506 s++;
2507 }
2508 else if (!quote)
2509 {
2510 /* Process a single redirection candidate. */
2511 if (*s == '<' || *s == '>'
2512 || ((*s == '1' || *s == '2') && s[1] == '>')
2513 || (*s == '0' && s[1] == '<'))
2514 {
2515 int skip = redir_set_redirection (s, inp, out, err);
2516
2517 if (skip <= 0)
2518 return false;
2519 retval = true;
2520 s += skip;
2521 }
2522 }
2523 if (*s)
2524 *d++ = *s++;
2525 }
2526 *d = '\0';
2527 return retval;
2528 }
2529 #endif /* !__CYGWIN__ */
2530
2531 /* Start an inferior windows child process and sets inferior_ptid to its pid.
2532 EXEC_FILE is the file to run.
2533 ALLARGS is a string containing the arguments to the program.
2534 ENV is the environment vector to pass. Errors reported with error(). */
2535
2536 void
2537 windows_nat_target::create_inferior (const char *exec_file,
2538 const std::string &origallargs,
2539 char **in_env, int from_tty)
2540 {
2541 STARTUPINFO si;
2542 #ifdef __CYGWIN__
2543 cygwin_buf_t real_path[__PMAX];
2544 cygwin_buf_t shell[__PMAX]; /* Path to shell */
2545 cygwin_buf_t infcwd[__PMAX];
2546 const char *sh;
2547 cygwin_buf_t *toexec;
2548 cygwin_buf_t *cygallargs;
2549 cygwin_buf_t *args;
2550 char **old_env = NULL;
2551 PWCHAR w32_env;
2552 size_t len;
2553 int tty;
2554 int ostdin, ostdout, ostderr;
2555 #else /* !__CYGWIN__ */
2556 char shell[__PMAX]; /* Path to shell */
2557 const char *toexec;
2558 char *args, *allargs_copy;
2559 size_t args_len, allargs_len;
2560 int fd_inp = -1, fd_out = -1, fd_err = -1;
2561 HANDLE tty = INVALID_HANDLE_VALUE;
2562 bool redirected = false;
2563 char *w32env;
2564 char *temp;
2565 size_t envlen;
2566 int i;
2567 size_t envsize;
2568 char **env;
2569 #endif /* !__CYGWIN__ */
2570 const char *allargs = origallargs.c_str ();
2571 PROCESS_INFORMATION pi;
2572 BOOL ret;
2573 DWORD flags = 0;
2574 const char *inferior_io_terminal = get_inferior_io_terminal ();
2575
2576 if (!exec_file)
2577 error (_("No executable specified, use `target exec'."));
2578
2579 const char *inferior_cwd = get_inferior_cwd ();
2580 std::string expanded_infcwd;
2581 if (inferior_cwd != NULL)
2582 {
2583 expanded_infcwd = gdb_tilde_expand (inferior_cwd);
2584 /* Mirror slashes on inferior's cwd. */
2585 std::replace (expanded_infcwd.begin (), expanded_infcwd.end (),
2586 '/', '\\');
2587 inferior_cwd = expanded_infcwd.c_str ();
2588 }
2589
2590 memset (&si, 0, sizeof (si));
2591 si.cb = sizeof (si);
2592
2593 if (new_group)
2594 flags |= CREATE_NEW_PROCESS_GROUP;
2595
2596 if (new_console)
2597 windows_set_console_info (&si, &flags);
2598
2599 #ifdef __CYGWIN__
2600 if (!useshell)
2601 {
2602 flags |= DEBUG_ONLY_THIS_PROCESS;
2603 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, exec_file, real_path,
2604 __PMAX * sizeof (cygwin_buf_t)) < 0)
2605 error (_("Error starting executable: %d"), errno);
2606 toexec = real_path;
2607 #ifdef __USEWIDE
2608 len = mbstowcs (NULL, allargs, 0) + 1;
2609 if (len == (size_t) -1)
2610 error (_("Error starting executable: %d"), errno);
2611 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2612 mbstowcs (cygallargs, allargs, len);
2613 #else /* !__USEWIDE */
2614 cygallargs = allargs;
2615 #endif
2616 }
2617 else
2618 {
2619 sh = get_shell ();
2620 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, sh, shell, __PMAX) < 0)
2621 error (_("Error starting executable via shell: %d"), errno);
2622 #ifdef __USEWIDE
2623 len = sizeof (L" -c 'exec '") + mbstowcs (NULL, exec_file, 0)
2624 + mbstowcs (NULL, allargs, 0) + 2;
2625 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2626 swprintf (cygallargs, len, L" -c 'exec %s %s'", exec_file, allargs);
2627 #else /* !__USEWIDE */
2628 len = (sizeof (" -c 'exec '") + strlen (exec_file)
2629 + strlen (allargs) + 2);
2630 cygallargs = (char *) alloca (len);
2631 xsnprintf (cygallargs, len, " -c 'exec %s %s'", exec_file, allargs);
2632 #endif /* __USEWIDE */
2633 toexec = shell;
2634 flags |= DEBUG_PROCESS;
2635 }
2636
2637 if (inferior_cwd != NULL
2638 && cygwin_conv_path (CCP_POSIX_TO_WIN_W, inferior_cwd,
2639 infcwd, strlen (inferior_cwd)) < 0)
2640 error (_("Error converting inferior cwd: %d"), errno);
2641
2642 #ifdef __USEWIDE
2643 args = (cygwin_buf_t *) alloca ((wcslen (toexec) + wcslen (cygallargs) + 2)
2644 * sizeof (wchar_t));
2645 wcscpy (args, toexec);
2646 wcscat (args, L" ");
2647 wcscat (args, cygallargs);
2648 #else /* !__USEWIDE */
2649 args = (cygwin_buf_t *) alloca (strlen (toexec) + strlen (cygallargs) + 2);
2650 strcpy (args, toexec);
2651 strcat (args, " ");
2652 strcat (args, cygallargs);
2653 #endif /* !__USEWIDE */
2654
2655 #ifdef CW_CVT_ENV_TO_WINENV
2656 /* First try to create a direct Win32 copy of the POSIX environment. */
2657 w32_env = (PWCHAR) cygwin_internal (CW_CVT_ENV_TO_WINENV, in_env);
2658 if (w32_env != (PWCHAR) -1)
2659 flags |= CREATE_UNICODE_ENVIRONMENT;
2660 else
2661 /* If that fails, fall back to old method tweaking GDB's environment. */
2662 #endif /* CW_CVT_ENV_TO_WINENV */
2663 {
2664 /* Reset all Win32 environment variables to avoid leftover on next run. */
2665 clear_win32_environment (environ);
2666 /* Prepare the environment vars for CreateProcess. */
2667 old_env = environ;
2668 environ = in_env;
2669 cygwin_internal (CW_SYNC_WINENV);
2670 w32_env = NULL;
2671 }
2672
2673 if (!inferior_io_terminal)
2674 tty = ostdin = ostdout = ostderr = -1;
2675 else
2676 {
2677 tty = open (inferior_io_terminal, O_RDWR | O_NOCTTY);
2678 if (tty < 0)
2679 {
2680 print_sys_errmsg (inferior_io_terminal, errno);
2681 ostdin = ostdout = ostderr = -1;
2682 }
2683 else
2684 {
2685 ostdin = dup (0);
2686 ostdout = dup (1);
2687 ostderr = dup (2);
2688 dup2 (tty, 0);
2689 dup2 (tty, 1);
2690 dup2 (tty, 2);
2691 }
2692 }
2693
2694 windows_init_thread_list ();
2695 ret = CreateProcess (0,
2696 args, /* command line */
2697 NULL, /* Security */
2698 NULL, /* thread */
2699 TRUE, /* inherit handles */
2700 flags, /* start flags */
2701 w32_env, /* environment */
2702 inferior_cwd != NULL ? infcwd : NULL, /* current
2703 directory */
2704 &si,
2705 &pi);
2706 if (w32_env)
2707 /* Just free the Win32 environment, if it could be created. */
2708 free (w32_env);
2709 else
2710 {
2711 /* Reset all environment variables to avoid leftover on next run. */
2712 clear_win32_environment (in_env);
2713 /* Restore normal GDB environment variables. */
2714 environ = old_env;
2715 cygwin_internal (CW_SYNC_WINENV);
2716 }
2717
2718 if (tty >= 0)
2719 {
2720 ::close (tty);
2721 dup2 (ostdin, 0);
2722 dup2 (ostdout, 1);
2723 dup2 (ostderr, 2);
2724 ::close (ostdin);
2725 ::close (ostdout);
2726 ::close (ostderr);
2727 }
2728 #else /* !__CYGWIN__ */
2729 allargs_len = strlen (allargs);
2730 allargs_copy = strcpy ((char *) alloca (allargs_len + 1), allargs);
2731 if (strpbrk (allargs_copy, "<>") != NULL)
2732 {
2733 int e = errno;
2734 errno = 0;
2735 redirected =
2736 redirect_inferior_handles (allargs, allargs_copy,
2737 &fd_inp, &fd_out, &fd_err);
2738 if (errno)
2739 warning (_("Error in redirection: %s."), safe_strerror (errno));
2740 else
2741 errno = e;
2742 allargs_len = strlen (allargs_copy);
2743 }
2744 /* If not all the standard streams are redirected by the command
2745 line, use inferior_io_terminal for those which aren't. */
2746 if (inferior_io_terminal
2747 && !(fd_inp >= 0 && fd_out >= 0 && fd_err >= 0))
2748 {
2749 SECURITY_ATTRIBUTES sa;
2750 sa.nLength = sizeof(sa);
2751 sa.lpSecurityDescriptor = 0;
2752 sa.bInheritHandle = TRUE;
2753 tty = CreateFileA (inferior_io_terminal, GENERIC_READ | GENERIC_WRITE,
2754 0, &sa, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
2755 if (tty == INVALID_HANDLE_VALUE)
2756 warning (_("Warning: Failed to open TTY %s, error %#x."),
2757 inferior_io_terminal, (unsigned) GetLastError ());
2758 }
2759 if (redirected || tty != INVALID_HANDLE_VALUE)
2760 {
2761 if (fd_inp >= 0)
2762 si.hStdInput = (HANDLE) _get_osfhandle (fd_inp);
2763 else if (tty != INVALID_HANDLE_VALUE)
2764 si.hStdInput = tty;
2765 else
2766 si.hStdInput = GetStdHandle (STD_INPUT_HANDLE);
2767 if (fd_out >= 0)
2768 si.hStdOutput = (HANDLE) _get_osfhandle (fd_out);
2769 else if (tty != INVALID_HANDLE_VALUE)
2770 si.hStdOutput = tty;
2771 else
2772 si.hStdOutput = GetStdHandle (STD_OUTPUT_HANDLE);
2773 if (fd_err >= 0)
2774 si.hStdError = (HANDLE) _get_osfhandle (fd_err);
2775 else if (tty != INVALID_HANDLE_VALUE)
2776 si.hStdError = tty;
2777 else
2778 si.hStdError = GetStdHandle (STD_ERROR_HANDLE);
2779 si.dwFlags |= STARTF_USESTDHANDLES;
2780 }
2781
2782 toexec = exec_file;
2783 /* Build the command line, a space-separated list of tokens where
2784 the first token is the name of the module to be executed.
2785 To avoid ambiguities introduced by spaces in the module name,
2786 we quote it. */
2787 args_len = strlen (toexec) + 2 /* quotes */ + allargs_len + 2;
2788 args = (char *) alloca (args_len);
2789 xsnprintf (args, args_len, "\"%s\" %s", toexec, allargs_copy);
2790
2791 flags |= DEBUG_ONLY_THIS_PROCESS;
2792
2793 /* CreateProcess takes the environment list as a null terminated set of
2794 strings (i.e. two nulls terminate the list). */
2795
2796 /* Get total size for env strings. */
2797 for (envlen = 0, i = 0; in_env[i] && *in_env[i]; i++)
2798 envlen += strlen (in_env[i]) + 1;
2799
2800 envsize = sizeof (in_env[0]) * (i + 1);
2801 env = (char **) alloca (envsize);
2802 memcpy (env, in_env, envsize);
2803 /* Windows programs expect the environment block to be sorted. */
2804 qsort (env, i, sizeof (char *), envvar_cmp);
2805
2806 w32env = (char *) alloca (envlen + 1);
2807
2808 /* Copy env strings into new buffer. */
2809 for (temp = w32env, i = 0; env[i] && *env[i]; i++)
2810 {
2811 strcpy (temp, env[i]);
2812 temp += strlen (temp) + 1;
2813 }
2814
2815 /* Final nil string to terminate new env. */
2816 *temp = 0;
2817
2818 windows_init_thread_list ();
2819 ret = CreateProcessA (0,
2820 args, /* command line */
2821 NULL, /* Security */
2822 NULL, /* thread */
2823 TRUE, /* inherit handles */
2824 flags, /* start flags */
2825 w32env, /* environment */
2826 inferior_cwd, /* current directory */
2827 &si,
2828 &pi);
2829 if (tty != INVALID_HANDLE_VALUE)
2830 CloseHandle (tty);
2831 if (fd_inp >= 0)
2832 _close (fd_inp);
2833 if (fd_out >= 0)
2834 _close (fd_out);
2835 if (fd_err >= 0)
2836 _close (fd_err);
2837 #endif /* !__CYGWIN__ */
2838
2839 if (!ret)
2840 error (_("Error creating process %s, (error %u)."),
2841 exec_file, (unsigned) GetLastError ());
2842
2843 CloseHandle (pi.hThread);
2844 CloseHandle (pi.hProcess);
2845
2846 if (useshell && shell[0] != '\0')
2847 saw_create = -1;
2848 else
2849 saw_create = 0;
2850
2851 do_initial_windows_stuff (this, pi.dwProcessId, 0);
2852
2853 /* windows_continue (DBG_CONTINUE, -1, 0); */
2854 }
2855
2856 void
2857 windows_nat_target::mourn_inferior ()
2858 {
2859 (void) windows_continue (DBG_CONTINUE, -1, 0);
2860 x86_cleanup_dregs();
2861 if (open_process_used)
2862 {
2863 CHECK (CloseHandle (current_process_handle));
2864 open_process_used = 0;
2865 }
2866 inf_child_target::mourn_inferior ();
2867 }
2868
2869 /* Send a SIGINT to the process group. This acts just like the user typed a
2870 ^C on the controlling terminal. */
2871
2872 void
2873 windows_nat_target::interrupt ()
2874 {
2875 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
2876 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
2877 registers_changed (); /* refresh register state */
2878 }
2879
2880 /* Helper for windows_xfer_partial that handles memory transfers.
2881 Arguments are like target_xfer_partial. */
2882
2883 static enum target_xfer_status
2884 windows_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
2885 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
2886 {
2887 SIZE_T done = 0;
2888 BOOL success;
2889 DWORD lasterror = 0;
2890
2891 if (writebuf != NULL)
2892 {
2893 DEBUG_MEM (("gdb: write target memory, %s bytes at %s\n",
2894 pulongest (len), core_addr_to_string (memaddr)));
2895 success = WriteProcessMemory (current_process_handle,
2896 (LPVOID) (uintptr_t) memaddr, writebuf,
2897 len, &done);
2898 if (!success)
2899 lasterror = GetLastError ();
2900 FlushInstructionCache (current_process_handle,
2901 (LPCVOID) (uintptr_t) memaddr, len);
2902 }
2903 else
2904 {
2905 DEBUG_MEM (("gdb: read target memory, %s bytes at %s\n",
2906 pulongest (len), core_addr_to_string (memaddr)));
2907 success = ReadProcessMemory (current_process_handle,
2908 (LPCVOID) (uintptr_t) memaddr, readbuf,
2909 len, &done);
2910 if (!success)
2911 lasterror = GetLastError ();
2912 }
2913 *xfered_len = (ULONGEST) done;
2914 if (!success && lasterror == ERROR_PARTIAL_COPY && done > 0)
2915 return TARGET_XFER_OK;
2916 else
2917 return success ? TARGET_XFER_OK : TARGET_XFER_E_IO;
2918 }
2919
2920 void
2921 windows_nat_target::kill ()
2922 {
2923 CHECK (TerminateProcess (current_process_handle, 0));
2924
2925 for (;;)
2926 {
2927 if (!windows_continue (DBG_CONTINUE, -1, 1))
2928 break;
2929 if (!WaitForDebugEvent (&current_event, INFINITE))
2930 break;
2931 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
2932 break;
2933 }
2934
2935 target_mourn_inferior (inferior_ptid); /* Or just windows_mourn_inferior? */
2936 }
2937
2938 void
2939 windows_nat_target::close ()
2940 {
2941 DEBUG_EVENTS (("gdb: windows_close, inferior_ptid=%d\n",
2942 inferior_ptid.pid ()));
2943 }
2944
2945 /* Convert pid to printable format. */
2946 std::string
2947 windows_nat_target::pid_to_str (ptid_t ptid)
2948 {
2949 if (ptid.tid () != 0)
2950 return string_printf ("Thread %d.0x%lx", ptid.pid (), ptid.tid ());
2951
2952 return normal_pid_to_str (ptid);
2953 }
2954
2955 static enum target_xfer_status
2956 windows_xfer_shared_libraries (struct target_ops *ops,
2957 enum target_object object, const char *annex,
2958 gdb_byte *readbuf, const gdb_byte *writebuf,
2959 ULONGEST offset, ULONGEST len,
2960 ULONGEST *xfered_len)
2961 {
2962 struct obstack obstack;
2963 const char *buf;
2964 LONGEST len_avail;
2965 struct so_list *so;
2966
2967 if (writebuf)
2968 return TARGET_XFER_E_IO;
2969
2970 obstack_init (&obstack);
2971 obstack_grow_str (&obstack, "<library-list>\n");
2972 for (so = solib_start.next; so; so = so->next)
2973 {
2974 lm_info_windows *li = (lm_info_windows *) so->lm_info;
2975
2976 windows_xfer_shared_library (so->so_name, (CORE_ADDR)
2977 (uintptr_t) li->load_addr,
2978 &li->text_offset,
2979 target_gdbarch (), &obstack);
2980 }
2981 obstack_grow_str0 (&obstack, "</library-list>\n");
2982
2983 buf = (const char *) obstack_finish (&obstack);
2984 len_avail = strlen (buf);
2985 if (offset >= len_avail)
2986 len= 0;
2987 else
2988 {
2989 if (len > len_avail - offset)
2990 len = len_avail - offset;
2991 memcpy (readbuf, buf + offset, len);
2992 }
2993
2994 obstack_free (&obstack, NULL);
2995 *xfered_len = (ULONGEST) len;
2996 return len != 0 ? TARGET_XFER_OK : TARGET_XFER_EOF;
2997 }
2998
2999 enum target_xfer_status
3000 windows_nat_target::xfer_partial (enum target_object object,
3001 const char *annex, gdb_byte *readbuf,
3002 const gdb_byte *writebuf, ULONGEST offset,
3003 ULONGEST len, ULONGEST *xfered_len)
3004 {
3005 switch (object)
3006 {
3007 case TARGET_OBJECT_MEMORY:
3008 return windows_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
3009
3010 case TARGET_OBJECT_LIBRARIES:
3011 return windows_xfer_shared_libraries (this, object, annex, readbuf,
3012 writebuf, offset, len, xfered_len);
3013
3014 default:
3015 if (beneath () == NULL)
3016 {
3017 /* This can happen when requesting the transfer of unsupported
3018 objects before a program has been started (and therefore
3019 with the current_target having no target beneath). */
3020 return TARGET_XFER_E_IO;
3021 }
3022 return beneath ()->xfer_partial (object, annex,
3023 readbuf, writebuf, offset, len,
3024 xfered_len);
3025 }
3026 }
3027
3028 /* Provide thread local base, i.e. Thread Information Block address.
3029 Returns 1 if ptid is found and sets *ADDR to thread_local_base. */
3030
3031 bool
3032 windows_nat_target::get_tib_address (ptid_t ptid, CORE_ADDR *addr)
3033 {
3034 windows_thread_info *th;
3035
3036 th = thread_rec (ptid.tid (), 0);
3037 if (th == NULL)
3038 return false;
3039
3040 if (addr != NULL)
3041 *addr = th->thread_local_base;
3042
3043 return true;
3044 }
3045
3046 ptid_t
3047 windows_nat_target::get_ada_task_ptid (long lwp, long thread)
3048 {
3049 return ptid_t (inferior_ptid.pid (), 0, lwp);
3050 }
3051
3052 /* Implementation of the to_thread_name method. */
3053
3054 const char *
3055 windows_nat_target::thread_name (struct thread_info *thr)
3056 {
3057 return thread_rec (thr->ptid.tid (), 0)->name;
3058 }
3059
3060
3061 void _initialize_windows_nat ();
3062 void
3063 _initialize_windows_nat ()
3064 {
3065 x86_dr_low.set_control = cygwin_set_dr7;
3066 x86_dr_low.set_addr = cygwin_set_dr;
3067 x86_dr_low.get_addr = cygwin_get_dr;
3068 x86_dr_low.get_status = cygwin_get_dr6;
3069 x86_dr_low.get_control = cygwin_get_dr7;
3070
3071 /* x86_dr_low.debug_register_length field is set by
3072 calling x86_set_debug_register_length function
3073 in processor windows specific native file. */
3074
3075 add_inf_child_target (&the_windows_nat_target);
3076
3077 #ifdef __CYGWIN__
3078 cygwin_internal (CW_SET_DOS_FILE_WARNING, 0);
3079 #endif
3080
3081 add_com ("signal-event", class_run, signal_event_command, _("\
3082 Signal a crashed process with event ID, to allow its debugging.\n\
3083 This command is needed in support of setting up GDB as JIT debugger on \
3084 MS-Windows. The command should be invoked from the GDB command line using \
3085 the '-ex' command-line option. The ID of the event that blocks the \
3086 crashed process will be supplied by the Windows JIT debugging mechanism."));
3087
3088 #ifdef __CYGWIN__
3089 add_setshow_boolean_cmd ("shell", class_support, &useshell, _("\
3090 Set use of shell to start subprocess."), _("\
3091 Show use of shell to start subprocess."), NULL,
3092 NULL,
3093 NULL, /* FIXME: i18n: */
3094 &setlist, &showlist);
3095
3096 add_setshow_boolean_cmd ("cygwin-exceptions", class_support,
3097 &cygwin_exceptions, _("\
3098 Break when an exception is detected in the Cygwin DLL itself."), _("\
3099 Show whether gdb breaks on exceptions in the Cygwin DLL itself."), NULL,
3100 NULL,
3101 NULL, /* FIXME: i18n: */
3102 &setlist, &showlist);
3103 #endif
3104
3105 add_setshow_boolean_cmd ("new-console", class_support, &new_console, _("\
3106 Set creation of new console when creating child process."), _("\
3107 Show creation of new console when creating child process."), NULL,
3108 NULL,
3109 NULL, /* FIXME: i18n: */
3110 &setlist, &showlist);
3111
3112 add_setshow_boolean_cmd ("new-group", class_support, &new_group, _("\
3113 Set creation of new group when creating child process."), _("\
3114 Show creation of new group when creating child process."), NULL,
3115 NULL,
3116 NULL, /* FIXME: i18n: */
3117 &setlist, &showlist);
3118
3119 add_setshow_boolean_cmd ("debugexec", class_support, &debug_exec, _("\
3120 Set whether to display execution in child process."), _("\
3121 Show whether to display execution in child process."), NULL,
3122 NULL,
3123 NULL, /* FIXME: i18n: */
3124 &setlist, &showlist);
3125
3126 add_setshow_boolean_cmd ("debugevents", class_support, &debug_events, _("\
3127 Set whether to display kernel events in child process."), _("\
3128 Show whether to display kernel events in child process."), NULL,
3129 NULL,
3130 NULL, /* FIXME: i18n: */
3131 &setlist, &showlist);
3132
3133 add_setshow_boolean_cmd ("debugmemory", class_support, &debug_memory, _("\
3134 Set whether to display memory accesses in child process."), _("\
3135 Show whether to display memory accesses in child process."), NULL,
3136 NULL,
3137 NULL, /* FIXME: i18n: */
3138 &setlist, &showlist);
3139
3140 add_setshow_boolean_cmd ("debugexceptions", class_support,
3141 &debug_exceptions, _("\
3142 Set whether to display kernel exceptions in child process."), _("\
3143 Show whether to display kernel exceptions in child process."), NULL,
3144 NULL,
3145 NULL, /* FIXME: i18n: */
3146 &setlist, &showlist);
3147
3148 init_w32_command_list ();
3149
3150 add_cmd ("selector", class_info, display_selectors,
3151 _("Display selectors infos."),
3152 &info_w32_cmdlist);
3153 }
3154
3155 /* Hardware watchpoint support, adapted from go32-nat.c code. */
3156
3157 /* Pass the address ADDR to the inferior in the I'th debug register.
3158 Here we just store the address in dr array, the registers will be
3159 actually set up when windows_continue is called. */
3160 static void
3161 cygwin_set_dr (int i, CORE_ADDR addr)
3162 {
3163 if (i < 0 || i > 3)
3164 internal_error (__FILE__, __LINE__,
3165 _("Invalid register %d in cygwin_set_dr.\n"), i);
3166 dr[i] = addr;
3167 debug_registers_changed = 1;
3168 debug_registers_used = 1;
3169 }
3170
3171 /* Pass the value VAL to the inferior in the DR7 debug control
3172 register. Here we just store the address in D_REGS, the watchpoint
3173 will be actually set up in windows_wait. */
3174 static void
3175 cygwin_set_dr7 (unsigned long val)
3176 {
3177 dr[7] = (CORE_ADDR) val;
3178 debug_registers_changed = 1;
3179 debug_registers_used = 1;
3180 }
3181
3182 /* Get the value of debug register I from the inferior. */
3183
3184 static CORE_ADDR
3185 cygwin_get_dr (int i)
3186 {
3187 return dr[i];
3188 }
3189
3190 /* Get the value of the DR6 debug status register from the inferior.
3191 Here we just return the value stored in dr[6]
3192 by the last call to thread_rec for current_event.dwThreadId id. */
3193 static unsigned long
3194 cygwin_get_dr6 (void)
3195 {
3196 return (unsigned long) dr[6];
3197 }
3198
3199 /* Get the value of the DR7 debug status register from the inferior.
3200 Here we just return the value stored in dr[7] by the last call to
3201 thread_rec for current_event.dwThreadId id. */
3202
3203 static unsigned long
3204 cygwin_get_dr7 (void)
3205 {
3206 return (unsigned long) dr[7];
3207 }
3208
3209 /* Determine if the thread referenced by "ptid" is alive
3210 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
3211 it means that the thread has died. Otherwise it is assumed to be alive. */
3212
3213 bool
3214 windows_nat_target::thread_alive (ptid_t ptid)
3215 {
3216 int tid;
3217
3218 gdb_assert (ptid.tid () != 0);
3219 tid = ptid.tid ();
3220
3221 return WaitForSingleObject (thread_rec (tid, FALSE)->h, 0) != WAIT_OBJECT_0;
3222 }
3223
3224 void _initialize_check_for_gdb_ini ();
3225 void
3226 _initialize_check_for_gdb_ini ()
3227 {
3228 char *homedir;
3229 if (inhibit_gdbinit)
3230 return;
3231
3232 homedir = getenv ("HOME");
3233 if (homedir)
3234 {
3235 char *p;
3236 char *oldini = (char *) alloca (strlen (homedir) +
3237 sizeof ("gdb.ini") + 1);
3238 strcpy (oldini, homedir);
3239 p = strchr (oldini, '\0');
3240 if (p > oldini && !IS_DIR_SEPARATOR (p[-1]))
3241 *p++ = '/';
3242 strcpy (p, "gdb.ini");
3243 if (access (oldini, 0) == 0)
3244 {
3245 int len = strlen (oldini);
3246 char *newini = (char *) alloca (len + 2);
3247
3248 xsnprintf (newini, len + 2, "%.*s.gdbinit",
3249 (int) (len - (sizeof ("gdb.ini") - 1)), oldini);
3250 warning (_("obsolete '%s' found. Rename to '%s'."), oldini, newini);
3251 }
3252 }
3253 }
3254
3255 /* Define dummy functions which always return error for the rare cases where
3256 these functions could not be found. */
3257 static BOOL WINAPI
3258 bad_DebugActiveProcessStop (DWORD w)
3259 {
3260 return FALSE;
3261 }
3262 static BOOL WINAPI
3263 bad_DebugBreakProcess (HANDLE w)
3264 {
3265 return FALSE;
3266 }
3267 static BOOL WINAPI
3268 bad_DebugSetProcessKillOnExit (BOOL w)
3269 {
3270 return FALSE;
3271 }
3272 static BOOL WINAPI
3273 bad_EnumProcessModules (HANDLE w, HMODULE *x, DWORD y, LPDWORD z)
3274 {
3275 return FALSE;
3276 }
3277
3278 #ifdef __USEWIDE
3279 static DWORD WINAPI
3280 bad_GetModuleFileNameExW (HANDLE w, HMODULE x, LPWSTR y, DWORD z)
3281 {
3282 return 0;
3283 }
3284 #else
3285 static DWORD WINAPI
3286 bad_GetModuleFileNameExA (HANDLE w, HMODULE x, LPSTR y, DWORD z)
3287 {
3288 return 0;
3289 }
3290 #endif
3291
3292 static BOOL WINAPI
3293 bad_GetModuleInformation (HANDLE w, HMODULE x, LPMODULEINFO y, DWORD z)
3294 {
3295 return FALSE;
3296 }
3297
3298 static BOOL WINAPI
3299 bad_OpenProcessToken (HANDLE w, DWORD x, PHANDLE y)
3300 {
3301 return FALSE;
3302 }
3303
3304 static BOOL WINAPI
3305 bad_GetCurrentConsoleFont (HANDLE w, BOOL bMaxWindow, CONSOLE_FONT_INFO *f)
3306 {
3307 f->nFont = 0;
3308 return 1;
3309 }
3310 static COORD WINAPI
3311 bad_GetConsoleFontSize (HANDLE w, DWORD nFont)
3312 {
3313 COORD size;
3314 size.X = 8;
3315 size.Y = 12;
3316 return size;
3317 }
3318
3319 /* Load any functions which may not be available in ancient versions
3320 of Windows. */
3321
3322 void _initialize_loadable ();
3323 void
3324 _initialize_loadable ()
3325 {
3326 HMODULE hm = NULL;
3327
3328 #define GPA(m, func) \
3329 func = (func ## _ftype *) GetProcAddress (m, #func)
3330
3331 hm = LoadLibrary ("kernel32.dll");
3332 if (hm)
3333 {
3334 GPA (hm, DebugActiveProcessStop);
3335 GPA (hm, DebugBreakProcess);
3336 GPA (hm, DebugSetProcessKillOnExit);
3337 GPA (hm, GetConsoleFontSize);
3338 GPA (hm, DebugActiveProcessStop);
3339 GPA (hm, GetCurrentConsoleFont);
3340 }
3341
3342 /* Set variables to dummy versions of these processes if the function
3343 wasn't found in kernel32.dll. */
3344 if (!DebugBreakProcess)
3345 DebugBreakProcess = bad_DebugBreakProcess;
3346 if (!DebugActiveProcessStop || !DebugSetProcessKillOnExit)
3347 {
3348 DebugActiveProcessStop = bad_DebugActiveProcessStop;
3349 DebugSetProcessKillOnExit = bad_DebugSetProcessKillOnExit;
3350 }
3351 if (!GetConsoleFontSize)
3352 GetConsoleFontSize = bad_GetConsoleFontSize;
3353 if (!GetCurrentConsoleFont)
3354 GetCurrentConsoleFont = bad_GetCurrentConsoleFont;
3355
3356 /* Load optional functions used for retrieving filename information
3357 associated with the currently debugged process or its dlls. */
3358 hm = LoadLibrary ("psapi.dll");
3359 if (hm)
3360 {
3361 GPA (hm, EnumProcessModules);
3362 GPA (hm, GetModuleInformation);
3363 GetModuleFileNameEx = (GetModuleFileNameEx_ftype *)
3364 GetProcAddress (hm, GetModuleFileNameEx_name);
3365 }
3366
3367 if (!EnumProcessModules || !GetModuleInformation || !GetModuleFileNameEx)
3368 {
3369 /* Set variables to dummy versions of these processes if the function
3370 wasn't found in psapi.dll. */
3371 EnumProcessModules = bad_EnumProcessModules;
3372 GetModuleInformation = bad_GetModuleInformation;
3373 GetModuleFileNameEx = bad_GetModuleFileNameEx;
3374 /* This will probably fail on Windows 9x/Me. Let the user know
3375 that we're missing some functionality. */
3376 warning(_("\
3377 cannot automatically find executable file or library to read symbols.\n\
3378 Use \"file\" or \"dll\" command to load executable/libraries directly."));
3379 }
3380
3381 hm = LoadLibrary ("advapi32.dll");
3382 if (hm)
3383 {
3384 GPA (hm, OpenProcessToken);
3385 GPA (hm, LookupPrivilegeValueA);
3386 GPA (hm, AdjustTokenPrivileges);
3387 /* Only need to set one of these since if OpenProcessToken fails nothing
3388 else is needed. */
3389 if (!OpenProcessToken || !LookupPrivilegeValueA
3390 || !AdjustTokenPrivileges)
3391 OpenProcessToken = bad_OpenProcessToken;
3392 }
3393
3394 #undef GPA
3395 }
This page took 0.114497 seconds and 4 git commands to generate.