PR python/17364
[deliverable/binutils-gdb.git] / gdb / gdbserver / win32-low.c
CommitLineData
b80864fb 1/* Low level interface to Windows debugging, for gdbserver.
ecd75fc8 2 Copyright (C) 2006-2014 Free Software Foundation, Inc.
b80864fb
DJ
3
4 Contributed by Leo Zayas. Based on "win32-nat.c" from GDB.
5
6 This file is part of GDB.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
a9762ec7 10 the Free Software Foundation; either version 3 of the License, or
b80864fb
DJ
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
a9762ec7 19 along with this program. If not, see <http://www.gnu.org/licenses/>. */
b80864fb
DJ
20
21#include "server.h"
22#include "regcache.h"
59a016f0 23#include "gdb/fileio.h"
ed50f18f
PA
24#include "mem-break.h"
25#include "win32-low.h"
623b6bdf 26#include "gdbthread.h"
799cdc37 27#include "dll.h"
533b0600 28#include "hostio.h"
b80864fb 29
a959a88d 30#include <stdint.h>
b80864fb 31#include <windows.h>
ed50f18f 32#include <winnt.h>
b80864fb 33#include <imagehlp.h>
255e7678 34#include <tlhelp32.h>
b80864fb 35#include <psapi.h>
b80864fb
DJ
36#include <process.h>
37
38#ifndef USE_WIN32API
39#include <sys/cygwin.h>
40#endif
41
10357975
PA
42#define OUTMSG(X) do { printf X; fflush (stderr); } while (0)
43
44#define OUTMSG2(X) \
45 do \
46 { \
47 if (debug_threads) \
48 { \
49 printf X; \
50 fflush (stderr); \
51 } \
52 } while (0)
ed50f18f
PA
53
54#ifndef _T
55#define _T(x) TEXT (x)
56#endif
57
58#ifndef COUNTOF
59#define COUNTOF(STR) (sizeof (STR) / sizeof ((STR)[0]))
b80864fb
DJ
60#endif
61
bf914831
PA
62#ifdef _WIN32_WCE
63# define GETPROCADDRESS(DLL, PROC) \
64 ((winapi_ ## PROC) GetProcAddress (DLL, TEXT (#PROC)))
65#else
66# define GETPROCADDRESS(DLL, PROC) \
67 ((winapi_ ## PROC) GetProcAddress (DLL, #PROC))
68#endif
69
b80864fb
DJ
70int using_threads = 1;
71
72/* Globals. */
d97903b2 73static int attaching = 0;
b80864fb
DJ
74static HANDLE current_process_handle = NULL;
75static DWORD current_process_id = 0;
5ac588cf 76static DWORD main_thread_id = 0;
a493e3e2 77static enum gdb_signal last_sig = GDB_SIGNAL_0;
b80864fb
DJ
78
79/* The current debug event from WaitForDebugEvent. */
80static DEBUG_EVENT current_event;
81
4210d83e
PA
82/* A status that hasn't been reported to the core yet, and so
83 win32_wait should return it next, instead of fetching the next
84 debug event off the win32 API. */
85static struct target_waitstatus cached_status;
86
4d5d1aaa
PA
87/* Non zero if an interrupt request is to be satisfied by suspending
88 all threads. */
89static int soft_interrupt_requested = 0;
90
91/* Non zero if the inferior is stopped in a simulated breakpoint done
92 by suspending all the threads. */
93static int faked_breakpoint = 0;
94
3aee8918
PA
95const struct target_desc *win32_tdesc;
96
ed50f18f 97#define NUM_REGS (the_low_target.num_regs)
b80864fb 98
7a9a7487
MG
99typedef BOOL (WINAPI *winapi_DebugActiveProcessStop) (DWORD dwProcessId);
100typedef BOOL (WINAPI *winapi_DebugSetProcessKillOnExit) (BOOL KillOnExit);
101typedef BOOL (WINAPI *winapi_DebugBreakProcess) (HANDLE);
102typedef BOOL (WINAPI *winapi_GenerateConsoleCtrlEvent) (DWORD, DWORD);
b80864fb 103
4210d83e
PA
104static ptid_t win32_wait (ptid_t ptid, struct target_waitstatus *ourstatus,
105 int options);
2bd7c093 106static void win32_resume (struct thread_resume *resume_info, size_t n);
379a5e2d 107#ifndef _WIN32_WCE
f25b3fc3 108static void win32_add_all_dlls (void);
379a5e2d 109#endif
34b34921 110
b80864fb
DJ
111/* Get the thread ID from the current selected inferior (the current
112 thread). */
95954743 113static ptid_t
0bfdf32f 114current_thread_ptid (void)
b80864fb 115{
80894984 116 return current_ptid;
95954743
PA
117}
118
119/* The current debug event from WaitForDebugEvent. */
120static ptid_t
121debug_event_ptid (DEBUG_EVENT *event)
122{
123 return ptid_build (event->dwProcessId, event->dwThreadId, 0);
b80864fb
DJ
124}
125
9c6c8194
PA
126/* Get the thread context of the thread associated with TH. */
127
128static void
129win32_get_thread_context (win32_thread_info *th)
130{
131 memset (&th->context, 0, sizeof (CONTEXT));
132 (*the_low_target.get_thread_context) (th, &current_event);
133#ifdef _WIN32_WCE
134 memcpy (&th->base_context, &th->context, sizeof (CONTEXT));
135#endif
136}
137
138/* Set the thread context of the thread associated with TH. */
139
140static void
141win32_set_thread_context (win32_thread_info *th)
142{
143#ifdef _WIN32_WCE
144 /* Calling SuspendThread on a thread that is running kernel code
145 will report that the suspending was successful, but in fact, that
146 will often not be true. In those cases, the context returned by
147 GetThreadContext will not be correct by the time the thread
148 stops, hence we can't set that context back into the thread when
149 resuming - it will most likelly crash the inferior.
150 Unfortunately, there is no way to know when the thread will
151 really stop. To work around it, we'll only write the context
152 back to the thread when either the user or GDB explicitly change
153 it between stopping and resuming. */
154 if (memcmp (&th->context, &th->base_context, sizeof (CONTEXT)) != 0)
155#endif
156 (*the_low_target.set_thread_context) (th, &current_event);
157}
158
b80864fb
DJ
159/* Find a thread record given a thread id. If GET_CONTEXT is set then
160 also retrieve the context for this thread. */
41093d81 161static win32_thread_info *
95954743 162thread_rec (ptid_t ptid, int get_context)
b80864fb
DJ
163{
164 struct thread_info *thread;
41093d81 165 win32_thread_info *th;
b80864fb 166
95954743 167 thread = (struct thread_info *) find_inferior_id (&all_threads, ptid);
b80864fb
DJ
168 if (thread == NULL)
169 return NULL;
170
171 th = inferior_target_data (thread);
c436e841 172 if (get_context && th->context.ContextFlags == 0)
b80864fb 173 {
c436e841
PA
174 if (!th->suspended)
175 {
176 if (SuspendThread (th->h) == (DWORD) -1)
177 {
178 DWORD err = GetLastError ();
179 OUTMSG (("warning: SuspendThread failed in thread_rec, "
180 "(error %d): %s\n", (int) err, strwinerror (err)));
181 }
182 else
183 th->suspended = 1;
184 }
b80864fb 185
9c6c8194 186 win32_get_thread_context (th);
b80864fb
DJ
187 }
188
189 return th;
190}
191
192/* Add a thread to the thread list. */
41093d81 193static win32_thread_info *
711e434b 194child_add_thread (DWORD pid, DWORD tid, HANDLE h, void *tlb)
b80864fb 195{
41093d81 196 win32_thread_info *th;
95954743 197 ptid_t ptid = ptid_build (pid, tid, 0);
b80864fb 198
95954743 199 if ((th = thread_rec (ptid, FALSE)))
b80864fb
DJ
200 return th;
201
bca929d3 202 th = xcalloc (1, sizeof (*th));
b80864fb
DJ
203 th->tid = tid;
204 th->h = h;
711e434b 205 th->thread_local_base = (CORE_ADDR) (uintptr_t) tlb;
b80864fb 206
95954743 207 add_thread (ptid, th);
b80864fb 208
34b34921
PA
209 if (the_low_target.thread_added != NULL)
210 (*the_low_target.thread_added) (th);
b80864fb
DJ
211
212 return th;
213}
214
215/* Delete a thread from the list of threads. */
216static void
217delete_thread_info (struct inferior_list_entry *thread)
218{
41093d81 219 win32_thread_info *th = inferior_target_data ((struct thread_info *) thread);
b80864fb
DJ
220
221 remove_thread ((struct thread_info *) thread);
222 CloseHandle (th->h);
223 free (th);
224}
225
226/* Delete a thread from the list of threads. */
227static void
95954743 228child_delete_thread (DWORD pid, DWORD tid)
b80864fb
DJ
229{
230 struct inferior_list_entry *thread;
95954743 231 ptid_t ptid;
b80864fb
DJ
232
233 /* If the last thread is exiting, just return. */
649ebbca 234 if (one_inferior_p (&all_threads))
b80864fb
DJ
235 return;
236
95954743
PA
237 ptid = ptid_build (pid, tid, 0);
238 thread = find_inferior_id (&all_threads, ptid);
b80864fb
DJ
239 if (thread == NULL)
240 return;
241
242 delete_thread_info (thread);
243}
244
aa5ca48f
DE
245/* These watchpoint related wrapper functions simply pass on the function call
246 if the low target has registered a corresponding function. */
247
248static int
802e8e6d
PA
249win32_supports_z_point_type (char z_type)
250{
251 return (the_low_target.supports_z_point_type != NULL
252 && the_low_target.supports_z_point_type (z_type));
253}
254
255static int
256win32_insert_point (enum raw_bkpt_type type, CORE_ADDR addr,
257 int size, struct raw_breakpoint *bp)
aa5ca48f
DE
258{
259 if (the_low_target.insert_point != NULL)
802e8e6d 260 return the_low_target.insert_point (type, addr, size, bp);
aa5ca48f
DE
261 else
262 /* Unsupported (see target.h). */
263 return 1;
264}
265
266static int
802e8e6d
PA
267win32_remove_point (enum raw_bkpt_type type, CORE_ADDR addr,
268 int size, struct raw_breakpoint *bp)
aa5ca48f
DE
269{
270 if (the_low_target.remove_point != NULL)
802e8e6d 271 return the_low_target.remove_point (type, addr, size, bp);
aa5ca48f
DE
272 else
273 /* Unsupported (see target.h). */
274 return 1;
275}
276
277static int
278win32_stopped_by_watchpoint (void)
279{
280 if (the_low_target.stopped_by_watchpoint != NULL)
281 return the_low_target.stopped_by_watchpoint ();
282 else
283 return 0;
284}
285
286static CORE_ADDR
287win32_stopped_data_address (void)
288{
289 if (the_low_target.stopped_data_address != NULL)
290 return the_low_target.stopped_data_address ();
291 else
292 return 0;
293}
294
295
b80864fb
DJ
296/* Transfer memory from/to the debugged process. */
297static int
298child_xfer_memory (CORE_ADDR memaddr, char *our, int len,
299 int write, struct target_ops *target)
300{
cee83bcb
PM
301 BOOL success;
302 SIZE_T done = 0;
303 DWORD lasterror = 0;
e8f0053d 304 uintptr_t addr = (uintptr_t) memaddr;
b80864fb
DJ
305
306 if (write)
307 {
cee83bcb
PM
308 success = WriteProcessMemory (current_process_handle, (LPVOID) addr,
309 (LPCVOID) our, len, &done);
310 if (!success)
311 lasterror = GetLastError ();
b80864fb
DJ
312 FlushInstructionCache (current_process_handle, (LPCVOID) addr, len);
313 }
314 else
315 {
cee83bcb
PM
316 success = ReadProcessMemory (current_process_handle, (LPCVOID) addr,
317 (LPVOID) our, len, &done);
318 if (!success)
319 lasterror = GetLastError ();
b80864fb 320 }
cee83bcb
PM
321 if (!success && lasterror == ERROR_PARTIAL_COPY && done > 0)
322 return done;
323 else
324 return success ? done : -1;
b80864fb
DJ
325}
326
ed50f18f 327/* Clear out any old thread list and reinitialize it to a pristine
b80864fb
DJ
328 state. */
329static void
330child_init_thread_list (void)
331{
332 for_each_inferior (&all_threads, delete_thread_info);
333}
334
f25b3fc3
JB
335/* Zero during the child initialization phase, and nonzero otherwise. */
336
337static int child_initialization_done = 0;
338
b80864fb 339static void
95954743 340do_initial_child_stuff (HANDLE proch, DWORD pid, int attached)
b80864fb 341{
3aee8918
PA
342 struct process_info *proc;
343
a493e3e2 344 last_sig = GDB_SIGNAL_0;
b80864fb 345
5ac588cf
PA
346 current_process_handle = proch;
347 current_process_id = pid;
348 main_thread_id = 0;
349
350 soft_interrupt_requested = 0;
351 faked_breakpoint = 0;
352
b80864fb
DJ
353 memset (&current_event, 0, sizeof (current_event));
354
3aee8918
PA
355 proc = add_process (pid, attached);
356 proc->tdesc = win32_tdesc;
b80864fb 357 child_init_thread_list ();
f25b3fc3 358 child_initialization_done = 0;
ed50f18f
PA
359
360 if (the_low_target.initial_stuff != NULL)
361 (*the_low_target.initial_stuff) ();
4210d83e
PA
362
363 cached_status.kind = TARGET_WAITKIND_IGNORE;
364
365 /* Flush all currently pending debug events (thread and dll list) up
366 to the initial breakpoint. */
367 while (1)
368 {
369 struct target_waitstatus status;
370
371 win32_wait (minus_one_ptid, &status, 0);
372
373 /* Note win32_wait doesn't return thread events. */
374 if (status.kind != TARGET_WAITKIND_LOADED)
375 {
376 cached_status = status;
377 break;
378 }
379
380 {
381 struct thread_resume resume;
382
383 resume.thread = minus_one_ptid;
384 resume.kind = resume_continue;
385 resume.sig = 0;
386
387 win32_resume (&resume, 1);
388 }
389 }
379a5e2d
JB
390
391#ifndef _WIN32_WCE
f25b3fc3
JB
392 /* Now that the inferior has been started and all DLLs have been mapped,
393 we can iterate over all DLLs and load them in.
394
395 We avoid doing it any earlier because, on certain versions of Windows,
396 LOAD_DLL_DEBUG_EVENTs are sometimes not complete. In particular,
397 we have seen on Windows 8.1 that the ntdll.dll load event does not
398 include the DLL name, preventing us from creating an associated SO.
399 A possible explanation is that ntdll.dll might be mapped before
400 the SO info gets created by the Windows system -- ntdll.dll is
401 the first DLL to be reported via LOAD_DLL_DEBUG_EVENT and other DLLs
402 do not seem to suffer from that problem.
403
404 Rather than try to work around this sort of issue, it is much
405 simpler to just ignore DLL load/unload events during the startup
406 phase, and then process them all in one batch now. */
407 win32_add_all_dlls ();
379a5e2d 408#endif
f25b3fc3
JB
409
410 child_initialization_done = 1;
b80864fb
DJ
411}
412
413/* Resume all artificially suspended threads if we are continuing
414 execution. */
415static int
416continue_one_thread (struct inferior_list_entry *this_thread, void *id_ptr)
417{
418 struct thread_info *thread = (struct thread_info *) this_thread;
419 int thread_id = * (int *) id_ptr;
41093d81 420 win32_thread_info *th = inferior_target_data (thread);
b80864fb
DJ
421
422 if ((thread_id == -1 || thread_id == th->tid)
c436e841 423 && th->suspended)
b80864fb 424 {
34b34921 425 if (th->context.ContextFlags)
b80864fb 426 {
9c6c8194 427 win32_set_thread_context (th);
b80864fb
DJ
428 th->context.ContextFlags = 0;
429 }
34b34921 430
c436e841
PA
431 if (ResumeThread (th->h) == (DWORD) -1)
432 {
433 DWORD err = GetLastError ();
434 OUTMSG (("warning: ResumeThread failed in continue_one_thread, "
435 "(error %d): %s\n", (int) err, strwinerror (err)));
436 }
437 th->suspended = 0;
b80864fb
DJ
438 }
439
440 return 0;
441}
442
443static BOOL
444child_continue (DWORD continue_status, int thread_id)
445{
4d5d1aaa
PA
446 /* The inferior will only continue after the ContinueDebugEvent
447 call. */
448 find_inferior (&all_threads, continue_one_thread, &thread_id);
449 faked_breakpoint = 0;
b80864fb 450
4d5d1aaa
PA
451 if (!ContinueDebugEvent (current_event.dwProcessId,
452 current_event.dwThreadId,
453 continue_status))
454 return FALSE;
b80864fb 455
4d5d1aaa 456 return TRUE;
b80864fb
DJ
457}
458
b80864fb
DJ
459/* Fetch register(s) from the current thread context. */
460static void
442ea881 461child_fetch_inferior_registers (struct regcache *regcache, int r)
b80864fb
DJ
462{
463 int regno;
0bfdf32f 464 win32_thread_info *th = thread_rec (current_thread_ptid (), TRUE);
4463ce24 465 if (r == -1 || r > NUM_REGS)
442ea881 466 child_fetch_inferior_registers (regcache, NUM_REGS);
b80864fb
DJ
467 else
468 for (regno = 0; regno < r; regno++)
442ea881 469 (*the_low_target.fetch_inferior_register) (regcache, th, regno);
b80864fb
DJ
470}
471
472/* Store a new register value into the current thread context. We don't
473 change the program's context until later, when we resume it. */
474static void
442ea881 475child_store_inferior_registers (struct regcache *regcache, int r)
b80864fb
DJ
476{
477 int regno;
0bfdf32f 478 win32_thread_info *th = thread_rec (current_thread_ptid (), TRUE);
b80864fb 479 if (r == -1 || r == 0 || r > NUM_REGS)
442ea881 480 child_store_inferior_registers (regcache, NUM_REGS);
b80864fb
DJ
481 else
482 for (regno = 0; regno < r; regno++)
442ea881 483 (*the_low_target.store_inferior_register) (regcache, th, regno);
b80864fb
DJ
484}
485
ed50f18f
PA
486/* Map the Windows error number in ERROR to a locale-dependent error
487 message string and return a pointer to it. Typically, the values
488 for ERROR come from GetLastError.
489
490 The string pointed to shall not be modified by the application,
491 but may be overwritten by a subsequent call to strwinerror
492
493 The strwinerror function does not change the current setting
494 of GetLastError. */
495
496char *
497strwinerror (DWORD error)
498{
499 static char buf[1024];
500 TCHAR *msgbuf;
501 DWORD lasterr = GetLastError ();
502 DWORD chars = FormatMessage (FORMAT_MESSAGE_FROM_SYSTEM
503 | FORMAT_MESSAGE_ALLOCATE_BUFFER,
504 NULL,
505 error,
506 0, /* Default language */
507 (LPVOID)&msgbuf,
508 0,
509 NULL);
510 if (chars != 0)
511 {
512 /* If there is an \r\n appended, zap it. */
513 if (chars >= 2
514 && msgbuf[chars - 2] == '\r'
515 && msgbuf[chars - 1] == '\n')
516 {
517 chars -= 2;
518 msgbuf[chars] = 0;
519 }
520
521 if (chars > ((COUNTOF (buf)) - 1))
522 {
523 chars = COUNTOF (buf) - 1;
524 msgbuf [chars] = 0;
525 }
526
527#ifdef UNICODE
528 wcstombs (buf, msgbuf, chars + 1);
529#else
530 strncpy (buf, msgbuf, chars + 1);
531#endif
532 LocalFree (msgbuf);
533 }
534 else
dfe07582 535 sprintf (buf, "unknown win32 error (%u)", (unsigned) error);
ed50f18f
PA
536
537 SetLastError (lasterr);
538 return buf;
539}
540
aec18585
PA
541static BOOL
542create_process (const char *program, char *args,
543 DWORD flags, PROCESS_INFORMATION *pi)
544{
545 BOOL ret;
546
547#ifdef _WIN32_WCE
548 wchar_t *p, *wprogram, *wargs;
549 size_t argslen;
550
551 wprogram = alloca ((strlen (program) + 1) * sizeof (wchar_t));
552 mbstowcs (wprogram, program, strlen (program) + 1);
553
554 for (p = wprogram; *p; ++p)
555 if (L'/' == *p)
556 *p = L'\\';
557
558 argslen = strlen (args);
559 wargs = alloca ((argslen + 1) * sizeof (wchar_t));
560 mbstowcs (wargs, args, argslen + 1);
561
562 ret = CreateProcessW (wprogram, /* image name */
1b3f6016
PA
563 wargs, /* command line */
564 NULL, /* security, not supported */
565 NULL, /* thread, not supported */
566 FALSE, /* inherit handles, not supported */
567 flags, /* start flags */
568 NULL, /* environment, not supported */
569 NULL, /* current directory, not supported */
570 NULL, /* start info, not supported */
571 pi); /* proc info */
aec18585
PA
572#else
573 STARTUPINFOA si = { sizeof (STARTUPINFOA) };
574
575 ret = CreateProcessA (program, /* image name */
576 args, /* command line */
577 NULL, /* security */
578 NULL, /* thread */
579 TRUE, /* inherit handles */
580 flags, /* start flags */
581 NULL, /* environment */
582 NULL, /* current directory */
583 &si, /* start info */
584 pi); /* proc info */
585#endif
586
587 return ret;
588}
589
b80864fb
DJ
590/* Start a new process.
591 PROGRAM is a path to the program to execute.
592 ARGS is a standard NULL-terminated array of arguments,
593 to be passed to the inferior as ``argv''.
594 Returns the new PID on success, -1 on failure. Registers the new
595 process with the process list. */
596static int
597win32_create_inferior (char *program, char **program_args)
598{
599#ifndef USE_WIN32API
d8d2a3ee 600 char real_path[PATH_MAX];
b80864fb
DJ
601 char *orig_path, *new_path, *path_ptr;
602#endif
b80864fb
DJ
603 BOOL ret;
604 DWORD flags;
605 char *args;
606 int argslen;
607 int argc;
ed50f18f 608 PROCESS_INFORMATION pi;
aec18585 609 DWORD err;
b80864fb 610
d97903b2
PA
611 /* win32_wait needs to know we're not attaching. */
612 attaching = 0;
613
b80864fb
DJ
614 if (!program)
615 error ("No executable specified, specify executable to debug.\n");
616
b80864fb
DJ
617 flags = DEBUG_PROCESS | DEBUG_ONLY_THIS_PROCESS;
618
619#ifndef USE_WIN32API
620 orig_path = NULL;
621 path_ptr = getenv ("PATH");
622 if (path_ptr)
623 {
81239425 624 int size = cygwin_conv_path_list (CCP_POSIX_TO_WIN_A, path_ptr, NULL, 0);
b80864fb 625 orig_path = alloca (strlen (path_ptr) + 1);
81239425 626 new_path = alloca (size);
b80864fb 627 strcpy (orig_path, path_ptr);
81239425 628 cygwin_conv_path_list (CCP_POSIX_TO_WIN_A, path_ptr, new_path, size);
b80864fb 629 setenv ("PATH", new_path, 1);
81239425 630 }
d8d2a3ee 631 cygwin_conv_path (CCP_POSIX_TO_WIN_A, program, real_path, PATH_MAX);
b80864fb
DJ
632 program = real_path;
633#endif
634
ed50f18f 635 argslen = 1;
b80864fb
DJ
636 for (argc = 1; program_args[argc]; argc++)
637 argslen += strlen (program_args[argc]) + 1;
638 args = alloca (argslen);
ed50f18f 639 args[0] = '\0';
b80864fb
DJ
640 for (argc = 1; program_args[argc]; argc++)
641 {
642 /* FIXME: Can we do better about quoting? How does Cygwin
1b3f6016 643 handle this? */
b80864fb
DJ
644 strcat (args, " ");
645 strcat (args, program_args[argc]);
646 }
ed50f18f 647 OUTMSG2 (("Command line is \"%s\"\n", args));
b80864fb 648
ed50f18f 649#ifdef CREATE_NEW_PROCESS_GROUP
b80864fb 650 flags |= CREATE_NEW_PROCESS_GROUP;
ed50f18f 651#endif
b80864fb 652
aec18585
PA
653 ret = create_process (program, args, flags, &pi);
654 err = GetLastError ();
655 if (!ret && err == ERROR_FILE_NOT_FOUND)
656 {
657 char *exename = alloca (strlen (program) + 5);
658 strcat (strcpy (exename, program), ".exe");
659 ret = create_process (exename, args, flags, &pi);
660 err = GetLastError ();
661 }
b80864fb
DJ
662
663#ifndef USE_WIN32API
664 if (orig_path)
665 setenv ("PATH", orig_path, 1);
666#endif
667
668 if (!ret)
669 {
ed50f18f
PA
670 error ("Error creating process \"%s%s\", (error %d): %s\n",
671 program, args, (int) err, strwinerror (err));
b80864fb
DJ
672 }
673 else
674 {
675 OUTMSG2 (("Process created: %s\n", (char *) args));
676 }
677
ed50f18f
PA
678#ifndef _WIN32_WCE
679 /* On Windows CE this handle can't be closed. The OS reuses
680 it in the debug events, while the 9x/NT versions of Windows
681 probably use a DuplicateHandle'd one. */
b80864fb 682 CloseHandle (pi.hThread);
ed50f18f 683#endif
b80864fb 684
95954743 685 do_initial_child_stuff (pi.hProcess, pi.dwProcessId, 0);
b80864fb
DJ
686
687 return current_process_id;
688}
689
690/* Attach to a running process.
691 PID is the process ID to attach to, specified by the user
692 or a higher layer. */
693static int
694win32_attach (unsigned long pid)
695{
5ca906e6 696 HANDLE h;
bf914831 697 winapi_DebugSetProcessKillOnExit DebugSetProcessKillOnExit = NULL;
5ca906e6 698 DWORD err;
ed50f18f
PA
699#ifdef _WIN32_WCE
700 HMODULE dll = GetModuleHandle (_T("COREDLL.DLL"));
701#else
702 HMODULE dll = GetModuleHandle (_T("KERNEL32.DLL"));
703#endif
bf914831 704 DebugSetProcessKillOnExit = GETPROCADDRESS (dll, DebugSetProcessKillOnExit);
b80864fb 705
5ca906e6
PA
706 h = OpenProcess (PROCESS_ALL_ACCESS, FALSE, pid);
707 if (h != NULL)
1d5315fe 708 {
5ca906e6
PA
709 if (DebugActiveProcess (pid))
710 {
711 if (DebugSetProcessKillOnExit != NULL)
712 DebugSetProcessKillOnExit (FALSE);
713
d97903b2 714 /* win32_wait needs to know we're attaching. */
1b3f6016 715 attaching = 1;
95954743 716 do_initial_child_stuff (h, pid, 1);
5ca906e6
PA
717 return 0;
718 }
719
720 CloseHandle (h);
b80864fb
DJ
721 }
722
5ca906e6
PA
723 err = GetLastError ();
724 error ("Attach to process failed (error %d): %s\n",
725 (int) err, strwinerror (err));
b80864fb
DJ
726}
727
bce7165d
PA
728/* Handle OUTPUT_DEBUG_STRING_EVENT from child process. */
729static void
730handle_output_debug_string (struct target_waitstatus *ourstatus)
731{
732#define READ_BUFFER_LEN 1024
733 CORE_ADDR addr;
734 char s[READ_BUFFER_LEN + 1] = { 0 };
735 DWORD nbytes = current_event.u.DebugString.nDebugStringLength;
736
737 if (nbytes == 0)
738 return;
739
740 if (nbytes > READ_BUFFER_LEN)
741 nbytes = READ_BUFFER_LEN;
742
743 addr = (CORE_ADDR) (size_t) current_event.u.DebugString.lpDebugStringData;
744
745 if (current_event.u.DebugString.fUnicode)
746 {
747 /* The event tells us how many bytes, not chars, even
1b3f6016 748 in Unicode. */
bce7165d
PA
749 WCHAR buffer[(READ_BUFFER_LEN + 1) / sizeof (WCHAR)] = { 0 };
750 if (read_inferior_memory (addr, (unsigned char *) buffer, nbytes) != 0)
751 return;
752 wcstombs (s, buffer, (nbytes + 1) / sizeof (WCHAR));
753 }
754 else
755 {
756 if (read_inferior_memory (addr, (unsigned char *) s, nbytes) != 0)
757 return;
758 }
759
760 if (strncmp (s, "cYg", 3) != 0)
45e2715e
PA
761 {
762 if (!server_waiting)
763 {
764 OUTMSG2(("%s", s));
765 return;
766 }
767
768 monitor_output (s);
769 }
bce7165d
PA
770#undef READ_BUFFER_LEN
771}
772
5ac588cf
PA
773static void
774win32_clear_inferiors (void)
775{
776 if (current_process_handle != NULL)
777 CloseHandle (current_process_handle);
778
779 for_each_inferior (&all_threads, delete_thread_info);
780 clear_inferiors ();
781}
782
b80864fb 783/* Kill all inferiors. */
95954743
PA
784static int
785win32_kill (int pid)
b80864fb 786{
95954743
PA
787 struct process_info *process;
788
9d606399 789 if (current_process_handle == NULL)
95954743 790 return -1;
9d606399 791
b80864fb
DJ
792 TerminateProcess (current_process_handle, 0);
793 for (;;)
794 {
795 if (!child_continue (DBG_CONTINUE, -1))
796 break;
797 if (!WaitForDebugEvent (&current_event, INFINITE))
798 break;
799 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
800 break;
bce7165d
PA
801 else if (current_event.dwDebugEventCode == OUTPUT_DEBUG_STRING_EVENT)
802 {
1b3f6016 803 struct target_waitstatus our_status = { 0 };
bce7165d 804 handle_output_debug_string (&our_status);
1b3f6016 805 }
b80864fb 806 }
ed50f18f 807
5ac588cf 808 win32_clear_inferiors ();
95954743
PA
809
810 process = find_process_pid (pid);
811 remove_process (process);
812 return 0;
b80864fb
DJ
813}
814
95954743 815/* Detach from inferior PID. */
444d6139 816static int
95954743 817win32_detach (int pid)
b80864fb 818{
95954743 819 struct process_info *process;
bf914831
PA
820 winapi_DebugActiveProcessStop DebugActiveProcessStop = NULL;
821 winapi_DebugSetProcessKillOnExit DebugSetProcessKillOnExit = NULL;
ed50f18f
PA
822#ifdef _WIN32_WCE
823 HMODULE dll = GetModuleHandle (_T("COREDLL.DLL"));
824#else
825 HMODULE dll = GetModuleHandle (_T("KERNEL32.DLL"));
826#endif
bf914831
PA
827 DebugActiveProcessStop = GETPROCADDRESS (dll, DebugActiveProcessStop);
828 DebugSetProcessKillOnExit = GETPROCADDRESS (dll, DebugSetProcessKillOnExit);
b80864fb 829
444d6139
PA
830 if (DebugSetProcessKillOnExit == NULL
831 || DebugActiveProcessStop == NULL)
832 return -1;
b80864fb 833
444d6139
PA
834 {
835 struct thread_resume resume;
95954743 836 resume.thread = minus_one_ptid;
bd99dc85 837 resume.kind = resume_continue;
444d6139 838 resume.sig = 0;
2bd7c093 839 win32_resume (&resume, 1);
444d6139
PA
840 }
841
842 if (!DebugActiveProcessStop (current_process_id))
5ac588cf
PA
843 return -1;
844
444d6139 845 DebugSetProcessKillOnExit (FALSE);
95954743
PA
846 process = find_process_pid (pid);
847 remove_process (process);
444d6139 848
5ac588cf 849 win32_clear_inferiors ();
444d6139
PA
850 return 0;
851}
852
505106cd
PA
853static void
854win32_mourn (struct process_info *process)
855{
856 remove_process (process);
857}
858
444d6139
PA
859/* Wait for inferiors to end. */
860static void
95954743 861win32_join (int pid)
444d6139 862{
95954743 863 HANDLE h = OpenProcess (PROCESS_ALL_ACCESS, FALSE, pid);
5ac588cf
PA
864 if (h != NULL)
865 {
866 WaitForSingleObject (h, INFINITE);
867 CloseHandle (h);
868 }
b80864fb
DJ
869}
870
871/* Return 1 iff the thread with thread ID TID is alive. */
872static int
95954743 873win32_thread_alive (ptid_t ptid)
b80864fb
DJ
874{
875 int res;
876
877 /* Our thread list is reliable; don't bother to poll target
878 threads. */
95954743 879 if (find_inferior_id (&all_threads, ptid) != NULL)
b80864fb
DJ
880 res = 1;
881 else
882 res = 0;
883 return res;
884}
885
886/* Resume the inferior process. RESUME_INFO describes how we want
887 to resume. */
888static void
2bd7c093 889win32_resume (struct thread_resume *resume_info, size_t n)
b80864fb
DJ
890{
891 DWORD tid;
2ea28649 892 enum gdb_signal sig;
b80864fb 893 int step;
41093d81 894 win32_thread_info *th;
b80864fb 895 DWORD continue_status = DBG_CONTINUE;
95954743 896 ptid_t ptid;
b80864fb
DJ
897
898 /* This handles the very limited set of resume packets that GDB can
899 currently produce. */
900
95954743 901 if (n == 1 && ptid_equal (resume_info[0].thread, minus_one_ptid))
b80864fb 902 tid = -1;
2bd7c093 903 else if (n > 1)
b80864fb
DJ
904 tid = -1;
905 else
906 /* Yes, we're ignoring resume_info[0].thread. It'd be tricky to make
907 the Windows resume code do the right thing for thread switching. */
908 tid = current_event.dwThreadId;
909
95954743 910 if (!ptid_equal (resume_info[0].thread, minus_one_ptid))
b80864fb
DJ
911 {
912 sig = resume_info[0].sig;
bd99dc85 913 step = resume_info[0].kind == resume_step;
b80864fb
DJ
914 }
915 else
916 {
917 sig = 0;
918 step = 0;
919 }
920
a493e3e2 921 if (sig != GDB_SIGNAL_0)
b80864fb
DJ
922 {
923 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
924 {
925 OUTMSG (("Cannot continue with signal %d here.\n", sig));
926 }
927 else if (sig == last_sig)
928 continue_status = DBG_EXCEPTION_NOT_HANDLED;
929 else
930 OUTMSG (("Can only continue with recieved signal %d.\n", last_sig));
931 }
932
a493e3e2 933 last_sig = GDB_SIGNAL_0;
b80864fb
DJ
934
935 /* Get context for the currently selected thread. */
95954743
PA
936 ptid = debug_event_ptid (&current_event);
937 th = thread_rec (ptid, FALSE);
b80864fb
DJ
938 if (th)
939 {
940 if (th->context.ContextFlags)
941 {
b80864fb
DJ
942 /* Move register values from the inferior into the thread
943 context structure. */
944 regcache_invalidate ();
945
946 if (step)
ed50f18f
PA
947 {
948 if (the_low_target.single_step != NULL)
949 (*the_low_target.single_step) (th);
950 else
951 error ("Single stepping is not supported "
952 "in this configuration.\n");
953 }
34b34921 954
9c6c8194 955 win32_set_thread_context (th);
b80864fb
DJ
956 th->context.ContextFlags = 0;
957 }
958 }
959
960 /* Allow continuing with the same signal that interrupted us.
961 Otherwise complain. */
962
963 child_continue (continue_status, tid);
964}
965
255e7678
DJ
966static void
967win32_add_one_solib (const char *name, CORE_ADDR load_addr)
968{
969 char buf[MAX_PATH + 1];
970 char buf2[MAX_PATH + 1];
971
972#ifdef _WIN32_WCE
973 WIN32_FIND_DATA w32_fd;
974 WCHAR wname[MAX_PATH + 1];
975 mbstowcs (wname, name, MAX_PATH);
976 HANDLE h = FindFirstFile (wname, &w32_fd);
977#else
978 WIN32_FIND_DATAA w32_fd;
979 HANDLE h = FindFirstFileA (name, &w32_fd);
980#endif
981
850a0f76
JB
982 /* The symbols in a dll are offset by 0x1000, which is the
983 offset from 0 of the first byte in an image - because
984 of the file header and the section alignment. */
985 load_addr += 0x1000;
986
255e7678
DJ
987 if (h == INVALID_HANDLE_VALUE)
988 strcpy (buf, name);
989 else
990 {
991 FindClose (h);
992 strcpy (buf, name);
993#ifndef _WIN32_WCE
994 {
995 char cwd[MAX_PATH + 1];
996 char *p;
997 if (GetCurrentDirectoryA (MAX_PATH + 1, cwd))
998 {
999 p = strrchr (buf, '\\');
1000 if (p)
1001 p[1] = '\0';
1002 SetCurrentDirectoryA (buf);
1003 GetFullPathNameA (w32_fd.cFileName, MAX_PATH, buf, &p);
1004 SetCurrentDirectoryA (cwd);
1005 }
1006 }
1007#endif
1008 }
1009
cf6e3471
PA
1010#ifndef _WIN32_WCE
1011 if (strcasecmp (buf, "ntdll.dll") == 0)
1012 {
1013 GetSystemDirectoryA (buf, sizeof (buf));
1014 strcat (buf, "\\ntdll.dll");
1015 }
1016#endif
1017
255e7678 1018#ifdef __CYGWIN__
81239425 1019 cygwin_conv_path (CCP_WIN_A_TO_POSIX, buf, buf2, sizeof (buf2));
255e7678
DJ
1020#else
1021 strcpy (buf2, buf);
1022#endif
1023
1024 loaded_dll (buf2, load_addr);
1025}
1026
1027static char *
1028get_image_name (HANDLE h, void *address, int unicode)
1029{
1030 static char buf[(2 * MAX_PATH) + 1];
1031 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
1032 char *address_ptr;
1033 int len = 0;
1034 char b[2];
e8f0053d 1035 SIZE_T done;
255e7678
DJ
1036
1037 /* Attempt to read the name of the dll that was detected.
1038 This is documented to work only when actively debugging
1039 a program. It will not work for attached processes. */
1040 if (address == NULL)
1041 return NULL;
1042
1043#ifdef _WIN32_WCE
1044 /* Windows CE reports the address of the image name,
1045 instead of an address of a pointer into the image name. */
1046 address_ptr = address;
1047#else
1048 /* See if we could read the address of a string, and that the
1049 address isn't null. */
1050 if (!ReadProcessMemory (h, address, &address_ptr,
1051 sizeof (address_ptr), &done)
1052 || done != sizeof (address_ptr)
1053 || !address_ptr)
1054 return NULL;
1055#endif
1056
1057 /* Find the length of the string */
1058 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
1059 && (b[0] != 0 || b[size - 1] != 0) && done == size)
1060 continue;
1061
1062 if (!unicode)
1063 ReadProcessMemory (h, address_ptr, buf, len, &done);
1064 else
1065 {
1066 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
1067 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
1068 &done);
1069
1070 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, len, 0, 0);
1071 }
1072
1073 return buf;
1074}
1075
1076typedef BOOL (WINAPI *winapi_EnumProcessModules) (HANDLE, HMODULE *,
1077 DWORD, LPDWORD);
1078typedef BOOL (WINAPI *winapi_GetModuleInformation) (HANDLE, HMODULE,
1079 LPMODULEINFO, DWORD);
1080typedef DWORD (WINAPI *winapi_GetModuleFileNameExA) (HANDLE, HMODULE,
1081 LPSTR, DWORD);
1082
1083static winapi_EnumProcessModules win32_EnumProcessModules;
1084static winapi_GetModuleInformation win32_GetModuleInformation;
1085static winapi_GetModuleFileNameExA win32_GetModuleFileNameExA;
1086
1087static BOOL
1088load_psapi (void)
1089{
1090 static int psapi_loaded = 0;
1091 static HMODULE dll = NULL;
1092
1093 if (!psapi_loaded)
1094 {
1095 psapi_loaded = 1;
1096 dll = LoadLibrary (TEXT("psapi.dll"));
1097 if (!dll)
1098 return FALSE;
1099 win32_EnumProcessModules =
1100 GETPROCADDRESS (dll, EnumProcessModules);
1101 win32_GetModuleInformation =
1102 GETPROCADDRESS (dll, GetModuleInformation);
1103 win32_GetModuleFileNameExA =
1104 GETPROCADDRESS (dll, GetModuleFileNameExA);
1105 }
1106
1107 return (win32_EnumProcessModules != NULL
1108 && win32_GetModuleInformation != NULL
1109 && win32_GetModuleFileNameExA != NULL);
1110}
1111
379a5e2d 1112#ifndef _WIN32_WCE
649ebbca 1113
f25b3fc3
JB
1114/* Iterate over all DLLs currently mapped by our inferior, and
1115 add them to our list of solibs. */
379a5e2d
JB
1116
1117static void
f25b3fc3 1118win32_add_all_dlls (void)
379a5e2d 1119{
379a5e2d
JB
1120 size_t i;
1121 HMODULE dh_buf[1];
1122 HMODULE *DllHandle = dh_buf;
1123 DWORD cbNeeded;
1124 BOOL ok;
1125
379a5e2d
JB
1126 if (!load_psapi ())
1127 return;
1128
1129 cbNeeded = 0;
1130 ok = (*win32_EnumProcessModules) (current_process_handle,
1131 DllHandle,
1132 sizeof (HMODULE),
1133 &cbNeeded);
1134
1135 if (!ok || !cbNeeded)
1136 return;
1137
1138 DllHandle = (HMODULE *) alloca (cbNeeded);
1139 if (!DllHandle)
1140 return;
1141
1142 ok = (*win32_EnumProcessModules) (current_process_handle,
1143 DllHandle,
1144 cbNeeded,
1145 &cbNeeded);
1146 if (!ok)
1147 return;
1148
f25b3fc3 1149 for (i = 1; i < ((size_t) cbNeeded / sizeof (HMODULE)); i++)
379a5e2d
JB
1150 {
1151 MODULEINFO mi;
1152 char dll_name[MAX_PATH];
1153
1154 if (!(*win32_GetModuleInformation) (current_process_handle,
1155 DllHandle[i],
1156 &mi,
1157 sizeof (mi)))
1158 continue;
1159 if ((*win32_GetModuleFileNameExA) (current_process_handle,
1160 DllHandle[i],
1161 dll_name,
1162 MAX_PATH) == 0)
1163 continue;
850a0f76 1164 win32_add_one_solib (dll_name, (CORE_ADDR) (uintptr_t) mi.lpBaseOfDll);
379a5e2d
JB
1165 }
1166}
1167#endif
1168
255e7678
DJ
1169typedef HANDLE (WINAPI *winapi_CreateToolhelp32Snapshot) (DWORD, DWORD);
1170typedef BOOL (WINAPI *winapi_Module32First) (HANDLE, LPMODULEENTRY32);
1171typedef BOOL (WINAPI *winapi_Module32Next) (HANDLE, LPMODULEENTRY32);
1172
d763de10 1173/* Handle a DLL load event.
255e7678 1174
d763de10
JB
1175 This function assumes that this event did not occur during inferior
1176 initialization, where their event info may be incomplete (see
1177 do_initial_child_stuff and win32_add_all_dlls for more info on
1178 how we handle DLL loading during that phase). */
255e7678
DJ
1179
1180static void
1181handle_load_dll (void)
1182{
1183 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
d763de10 1184 char *dll_name;
255e7678 1185
d763de10
JB
1186 dll_name = get_image_name (current_process_handle,
1187 event->lpImageName, event->fUnicode);
255e7678
DJ
1188 if (!dll_name)
1189 return;
1190
850a0f76 1191 win32_add_one_solib (dll_name, (CORE_ADDR) (uintptr_t) event->lpBaseOfDll);
255e7678
DJ
1192}
1193
f25b3fc3
JB
1194/* Handle a DLL unload event.
1195
1196 This function assumes that this event did not occur during inferior
1197 initialization, where their event info may be incomplete (see
1198 do_initial_child_stuff and win32_add_one_solib for more info
1199 on how we handle DLL loading during that phase). */
1200
255e7678
DJ
1201static void
1202handle_unload_dll (void)
1203{
1204 CORE_ADDR load_addr =
e8f0053d 1205 (CORE_ADDR) (uintptr_t) current_event.u.UnloadDll.lpBaseOfDll;
850a0f76
JB
1206
1207 /* The symbols in a dll are offset by 0x1000, which is the
1208 offset from 0 of the first byte in an image - because
1209 of the file header and the section alignment. */
255e7678
DJ
1210 load_addr += 0x1000;
1211 unloaded_dll (NULL, load_addr);
1212}
1213
34b34921 1214static void
b80864fb
DJ
1215handle_exception (struct target_waitstatus *ourstatus)
1216{
b80864fb
DJ
1217 DWORD code = current_event.u.Exception.ExceptionRecord.ExceptionCode;
1218
1219 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1220
b80864fb
DJ
1221 switch (code)
1222 {
1223 case EXCEPTION_ACCESS_VIOLATION:
1224 OUTMSG2 (("EXCEPTION_ACCESS_VIOLATION"));
a493e3e2 1225 ourstatus->value.sig = GDB_SIGNAL_SEGV;
b80864fb
DJ
1226 break;
1227 case STATUS_STACK_OVERFLOW:
1228 OUTMSG2 (("STATUS_STACK_OVERFLOW"));
a493e3e2 1229 ourstatus->value.sig = GDB_SIGNAL_SEGV;
b80864fb
DJ
1230 break;
1231 case STATUS_FLOAT_DENORMAL_OPERAND:
1232 OUTMSG2 (("STATUS_FLOAT_DENORMAL_OPERAND"));
a493e3e2 1233 ourstatus->value.sig = GDB_SIGNAL_FPE;
b80864fb
DJ
1234 break;
1235 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1236 OUTMSG2 (("EXCEPTION_ARRAY_BOUNDS_EXCEEDED"));
a493e3e2 1237 ourstatus->value.sig = GDB_SIGNAL_FPE;
b80864fb
DJ
1238 break;
1239 case STATUS_FLOAT_INEXACT_RESULT:
1240 OUTMSG2 (("STATUS_FLOAT_INEXACT_RESULT"));
a493e3e2 1241 ourstatus->value.sig = GDB_SIGNAL_FPE;
b80864fb
DJ
1242 break;
1243 case STATUS_FLOAT_INVALID_OPERATION:
1244 OUTMSG2 (("STATUS_FLOAT_INVALID_OPERATION"));
a493e3e2 1245 ourstatus->value.sig = GDB_SIGNAL_FPE;
b80864fb
DJ
1246 break;
1247 case STATUS_FLOAT_OVERFLOW:
1248 OUTMSG2 (("STATUS_FLOAT_OVERFLOW"));
a493e3e2 1249 ourstatus->value.sig = GDB_SIGNAL_FPE;
b80864fb
DJ
1250 break;
1251 case STATUS_FLOAT_STACK_CHECK:
1252 OUTMSG2 (("STATUS_FLOAT_STACK_CHECK"));
a493e3e2 1253 ourstatus->value.sig = GDB_SIGNAL_FPE;
b80864fb
DJ
1254 break;
1255 case STATUS_FLOAT_UNDERFLOW:
1256 OUTMSG2 (("STATUS_FLOAT_UNDERFLOW"));
a493e3e2 1257 ourstatus->value.sig = GDB_SIGNAL_FPE;
b80864fb
DJ
1258 break;
1259 case STATUS_FLOAT_DIVIDE_BY_ZERO:
1260 OUTMSG2 (("STATUS_FLOAT_DIVIDE_BY_ZERO"));
a493e3e2 1261 ourstatus->value.sig = GDB_SIGNAL_FPE;
b80864fb
DJ
1262 break;
1263 case STATUS_INTEGER_DIVIDE_BY_ZERO:
1264 OUTMSG2 (("STATUS_INTEGER_DIVIDE_BY_ZERO"));
a493e3e2 1265 ourstatus->value.sig = GDB_SIGNAL_FPE;
b80864fb
DJ
1266 break;
1267 case STATUS_INTEGER_OVERFLOW:
1268 OUTMSG2 (("STATUS_INTEGER_OVERFLOW"));
a493e3e2 1269 ourstatus->value.sig = GDB_SIGNAL_FPE;
b80864fb
DJ
1270 break;
1271 case EXCEPTION_BREAKPOINT:
1272 OUTMSG2 (("EXCEPTION_BREAKPOINT"));
a493e3e2 1273 ourstatus->value.sig = GDB_SIGNAL_TRAP;
ed50f18f
PA
1274#ifdef _WIN32_WCE
1275 /* Remove the initial breakpoint. */
1276 check_breakpoints ((CORE_ADDR) (long) current_event
1b3f6016 1277 .u.Exception.ExceptionRecord.ExceptionAddress);
ed50f18f 1278#endif
b80864fb
DJ
1279 break;
1280 case DBG_CONTROL_C:
1281 OUTMSG2 (("DBG_CONTROL_C"));
a493e3e2 1282 ourstatus->value.sig = GDB_SIGNAL_INT;
b80864fb
DJ
1283 break;
1284 case DBG_CONTROL_BREAK:
1285 OUTMSG2 (("DBG_CONTROL_BREAK"));
a493e3e2 1286 ourstatus->value.sig = GDB_SIGNAL_INT;
b80864fb
DJ
1287 break;
1288 case EXCEPTION_SINGLE_STEP:
1289 OUTMSG2 (("EXCEPTION_SINGLE_STEP"));
a493e3e2 1290 ourstatus->value.sig = GDB_SIGNAL_TRAP;
b80864fb
DJ
1291 break;
1292 case EXCEPTION_ILLEGAL_INSTRUCTION:
1293 OUTMSG2 (("EXCEPTION_ILLEGAL_INSTRUCTION"));
a493e3e2 1294 ourstatus->value.sig = GDB_SIGNAL_ILL;
b80864fb
DJ
1295 break;
1296 case EXCEPTION_PRIV_INSTRUCTION:
1297 OUTMSG2 (("EXCEPTION_PRIV_INSTRUCTION"));
a493e3e2 1298 ourstatus->value.sig = GDB_SIGNAL_ILL;
b80864fb
DJ
1299 break;
1300 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1301 OUTMSG2 (("EXCEPTION_NONCONTINUABLE_EXCEPTION"));
a493e3e2 1302 ourstatus->value.sig = GDB_SIGNAL_ILL;
b80864fb
DJ
1303 break;
1304 default:
1305 if (current_event.u.Exception.dwFirstChance)
34b34921
PA
1306 {
1307 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
1308 return;
1309 }
dfe07582
CV
1310 OUTMSG2 (("gdbserver: unknown target exception 0x%08x at 0x%s",
1311 (unsigned) current_event.u.Exception.ExceptionRecord.ExceptionCode,
1312 phex_nz ((uintptr_t) current_event.u.Exception.ExceptionRecord.
1313 ExceptionAddress, sizeof (uintptr_t))));
a493e3e2 1314 ourstatus->value.sig = GDB_SIGNAL_UNKNOWN;
b80864fb
DJ
1315 break;
1316 }
1317 OUTMSG2 (("\n"));
1318 last_sig = ourstatus->value.sig;
b80864fb
DJ
1319}
1320
4d5d1aaa 1321
34b34921 1322static void
4d5d1aaa
PA
1323suspend_one_thread (struct inferior_list_entry *entry)
1324{
1325 struct thread_info *thread = (struct thread_info *) entry;
1326 win32_thread_info *th = inferior_target_data (thread);
1327
1328 if (!th->suspended)
1329 {
1330 if (SuspendThread (th->h) == (DWORD) -1)
1331 {
1332 DWORD err = GetLastError ();
1333 OUTMSG (("warning: SuspendThread failed in suspend_one_thread, "
1334 "(error %d): %s\n", (int) err, strwinerror (err)));
1335 }
1336 else
1337 th->suspended = 1;
1338 }
1339}
1340
1341static void
1342fake_breakpoint_event (void)
b80864fb 1343{
4d5d1aaa 1344 OUTMSG2(("fake_breakpoint_event\n"));
b80864fb 1345
4d5d1aaa
PA
1346 faked_breakpoint = 1;
1347
1348 memset (&current_event, 0, sizeof (current_event));
1349 current_event.dwThreadId = main_thread_id;
1350 current_event.dwDebugEventCode = EXCEPTION_DEBUG_EVENT;
1351 current_event.u.Exception.ExceptionRecord.ExceptionCode
1352 = EXCEPTION_BREAKPOINT;
1353
1354 for_each_inferior (&all_threads, suspend_one_thread);
1355}
1356
b65d95c5
DJ
1357#ifdef _WIN32_WCE
1358static int
1359auto_delete_breakpoint (CORE_ADDR stop_pc)
1360{
1361 return 1;
1362}
1363#endif
1364
4d5d1aaa
PA
1365/* Get the next event from the child. */
1366
1367static int
1368get_child_debug_event (struct target_waitstatus *ourstatus)
1369{
95954743
PA
1370 ptid_t ptid;
1371
a493e3e2 1372 last_sig = GDB_SIGNAL_0;
b80864fb
DJ
1373 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
1374
4d5d1aaa
PA
1375 /* Check if GDB sent us an interrupt request. */
1376 check_remote_input_interrupt_request ();
1377
1378 if (soft_interrupt_requested)
1379 {
1380 soft_interrupt_requested = 0;
1381 fake_breakpoint_event ();
1382 goto gotevent;
1383 }
1384
d97903b2
PA
1385#ifndef _WIN32_WCE
1386 attaching = 0;
1387#else
1388 if (attaching)
1389 {
1390 /* WinCE doesn't set an initial breakpoint automatically. To
1b3f6016
PA
1391 stop the inferior, we flush all currently pending debug
1392 events -- the thread list and the dll list are always
1393 reported immediatelly without delay, then, we suspend all
1394 threads and pretend we saw a trap at the current PC of the
1395 main thread.
1396
1397 Contrary to desktop Windows, Windows CE *does* report the dll
1398 names on LOAD_DLL_DEBUG_EVENTs resulting from a
1399 DebugActiveProcess call. This limits the way we can detect
1400 if all the dlls have already been reported. If we get a real
1401 debug event before leaving attaching, the worst that will
1402 happen is the user will see a spurious breakpoint. */
d97903b2
PA
1403
1404 current_event.dwDebugEventCode = 0;
1405 if (!WaitForDebugEvent (&current_event, 0))
1b3f6016
PA
1406 {
1407 OUTMSG2(("no attach events left\n"));
1408 fake_breakpoint_event ();
1409 attaching = 0;
1410 }
d97903b2 1411 else
1b3f6016 1412 OUTMSG2(("got attach event\n"));
d97903b2
PA
1413 }
1414 else
1415#endif
1416 {
1417 /* Keep the wait time low enough for confortable remote
1b3f6016
PA
1418 interruption, but high enough so gdbserver doesn't become a
1419 bottleneck. */
d97903b2 1420 if (!WaitForDebugEvent (&current_event, 250))
912cf4ba
PA
1421 {
1422 DWORD e = GetLastError();
1423
1424 if (e == ERROR_PIPE_NOT_CONNECTED)
1425 {
1426 /* This will happen if the loader fails to succesfully
1427 load the application, e.g., if the main executable
1428 tries to pull in a non-existing export from a
1429 DLL. */
1430 ourstatus->kind = TARGET_WAITKIND_EXITED;
1431 ourstatus->value.integer = 1;
1432 return 1;
1433 }
1434
1435 return 0;
1436 }
d97903b2 1437 }
4d5d1aaa
PA
1438
1439 gotevent:
b80864fb 1440
34b34921 1441 switch (current_event.dwDebugEventCode)
b80864fb
DJ
1442 {
1443 case CREATE_THREAD_DEBUG_EVENT:
1444 OUTMSG2 (("gdbserver: kernel event CREATE_THREAD_DEBUG_EVENT "
dfe07582 1445 "for pid=%u tid=%x)\n",
b80864fb
DJ
1446 (unsigned) current_event.dwProcessId,
1447 (unsigned) current_event.dwThreadId));
1448
1449 /* Record the existence of this thread. */
95954743
PA
1450 child_add_thread (current_event.dwProcessId,
1451 current_event.dwThreadId,
711e434b
PM
1452 current_event.u.CreateThread.hThread,
1453 current_event.u.CreateThread.lpThreadLocalBase);
b80864fb
DJ
1454 break;
1455
1456 case EXIT_THREAD_DEBUG_EVENT:
1457 OUTMSG2 (("gdbserver: kernel event EXIT_THREAD_DEBUG_EVENT "
dfe07582 1458 "for pid=%u tid=%x\n",
b80864fb
DJ
1459 (unsigned) current_event.dwProcessId,
1460 (unsigned) current_event.dwThreadId));
95954743
PA
1461 child_delete_thread (current_event.dwProcessId,
1462 current_event.dwThreadId);
aeeb81d1 1463
0bfdf32f 1464 current_thread = (struct thread_info *) all_threads.head;
aeeb81d1 1465 return 1;
b80864fb
DJ
1466
1467 case CREATE_PROCESS_DEBUG_EVENT:
1468 OUTMSG2 (("gdbserver: kernel event CREATE_PROCESS_DEBUG_EVENT "
dfe07582 1469 "for pid=%u tid=%x\n",
b80864fb
DJ
1470 (unsigned) current_event.dwProcessId,
1471 (unsigned) current_event.dwThreadId));
1472 CloseHandle (current_event.u.CreateProcessInfo.hFile);
1473
1474 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
1475 main_thread_id = current_event.dwThreadId;
1476
1477 ourstatus->kind = TARGET_WAITKIND_EXECD;
1478 ourstatus->value.execd_pathname = "Main executable";
1479
1480 /* Add the main thread. */
95954743
PA
1481 child_add_thread (current_event.dwProcessId,
1482 main_thread_id,
711e434b
PM
1483 current_event.u.CreateProcessInfo.hThread,
1484 current_event.u.CreateProcessInfo.lpThreadLocalBase);
b80864fb 1485
95954743 1486 ourstatus->value.related_pid = debug_event_ptid (&current_event);
ed50f18f 1487#ifdef _WIN32_WCE
d97903b2
PA
1488 if (!attaching)
1489 {
1490 /* Windows CE doesn't set the initial breakpoint
1491 automatically like the desktop versions of Windows do.
1492 We add it explicitly here. It will be removed as soon as
1493 it is hit. */
1494 set_breakpoint_at ((CORE_ADDR) (long) current_event.u
1495 .CreateProcessInfo.lpStartAddress,
b65d95c5 1496 auto_delete_breakpoint);
d97903b2 1497 }
ed50f18f 1498#endif
b80864fb
DJ
1499 break;
1500
1501 case EXIT_PROCESS_DEBUG_EVENT:
1502 OUTMSG2 (("gdbserver: kernel event EXIT_PROCESS_DEBUG_EVENT "
dfe07582 1503 "for pid=%u tid=%x\n",
b80864fb
DJ
1504 (unsigned) current_event.dwProcessId,
1505 (unsigned) current_event.dwThreadId));
1506 ourstatus->kind = TARGET_WAITKIND_EXITED;
1507 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
18aae699 1508 child_continue (DBG_CONTINUE, -1);
b80864fb 1509 CloseHandle (current_process_handle);
9d606399 1510 current_process_handle = NULL;
b80864fb
DJ
1511 break;
1512
1513 case LOAD_DLL_DEBUG_EVENT:
1514 OUTMSG2 (("gdbserver: kernel event LOAD_DLL_DEBUG_EVENT "
dfe07582 1515 "for pid=%u tid=%x\n",
b80864fb
DJ
1516 (unsigned) current_event.dwProcessId,
1517 (unsigned) current_event.dwThreadId));
1518 CloseHandle (current_event.u.LoadDll.hFile);
f25b3fc3
JB
1519 if (! child_initialization_done)
1520 break;
255e7678 1521 handle_load_dll ();
b80864fb
DJ
1522
1523 ourstatus->kind = TARGET_WAITKIND_LOADED;
a493e3e2 1524 ourstatus->value.sig = GDB_SIGNAL_TRAP;
b80864fb
DJ
1525 break;
1526
1527 case UNLOAD_DLL_DEBUG_EVENT:
1528 OUTMSG2 (("gdbserver: kernel event UNLOAD_DLL_DEBUG_EVENT "
dfe07582 1529 "for pid=%u tid=%x\n",
b80864fb
DJ
1530 (unsigned) current_event.dwProcessId,
1531 (unsigned) current_event.dwThreadId));
f25b3fc3
JB
1532 if (! child_initialization_done)
1533 break;
255e7678
DJ
1534 handle_unload_dll ();
1535 ourstatus->kind = TARGET_WAITKIND_LOADED;
a493e3e2 1536 ourstatus->value.sig = GDB_SIGNAL_TRAP;
b80864fb
DJ
1537 break;
1538
1539 case EXCEPTION_DEBUG_EVENT:
1540 OUTMSG2 (("gdbserver: kernel event EXCEPTION_DEBUG_EVENT "
dfe07582 1541 "for pid=%u tid=%x\n",
b80864fb
DJ
1542 (unsigned) current_event.dwProcessId,
1543 (unsigned) current_event.dwThreadId));
34b34921 1544 handle_exception (ourstatus);
b80864fb
DJ
1545 break;
1546
1547 case OUTPUT_DEBUG_STRING_EVENT:
1548 /* A message from the kernel (or Cygwin). */
1549 OUTMSG2 (("gdbserver: kernel event OUTPUT_DEBUG_STRING_EVENT "
dfe07582 1550 "for pid=%u tid=%x\n",
b80864fb
DJ
1551 (unsigned) current_event.dwProcessId,
1552 (unsigned) current_event.dwThreadId));
bce7165d 1553 handle_output_debug_string (ourstatus);
b80864fb
DJ
1554 break;
1555
1556 default:
1557 OUTMSG2 (("gdbserver: kernel event unknown "
dfe07582 1558 "for pid=%u tid=%x code=%x\n",
b80864fb
DJ
1559 (unsigned) current_event.dwProcessId,
1560 (unsigned) current_event.dwThreadId,
dfe07582 1561 (unsigned) current_event.dwDebugEventCode));
b80864fb
DJ
1562 break;
1563 }
1564
aeeb81d1 1565 ptid = debug_event_ptid (&current_event);
0bfdf32f 1566 current_thread =
95954743 1567 (struct thread_info *) find_inferior_id (&all_threads, ptid);
4d5d1aaa 1568 return 1;
b80864fb
DJ
1569}
1570
1571/* Wait for the inferior process to change state.
1572 STATUS will be filled in with a response code to send to GDB.
1573 Returns the signal which caused the process to stop. */
95954743
PA
1574static ptid_t
1575win32_wait (ptid_t ptid, struct target_waitstatus *ourstatus, int options)
b80864fb 1576{
442ea881 1577 struct regcache *regcache;
95954743 1578
4210d83e
PA
1579 if (cached_status.kind != TARGET_WAITKIND_IGNORE)
1580 {
1581 /* The core always does a wait after creating the inferior, and
1582 do_initial_child_stuff already ran the inferior to the
1583 initial breakpoint (or an exit, if creating the process
1584 fails). Report it now. */
1585 *ourstatus = cached_status;
1586 cached_status.kind = TARGET_WAITKIND_IGNORE;
1587 return debug_event_ptid (&current_event);
1588 }
1589
b80864fb
DJ
1590 while (1)
1591 {
5b1c542e 1592 if (!get_child_debug_event (ourstatus))
4d5d1aaa 1593 continue;
b80864fb 1594
5b1c542e 1595 switch (ourstatus->kind)
b80864fb 1596 {
34b34921 1597 case TARGET_WAITKIND_EXITED:
b80864fb 1598 OUTMSG2 (("Child exited with retcode = %x\n",
5b1c542e 1599 ourstatus->value.integer));
5ac588cf 1600 win32_clear_inferiors ();
95954743 1601 return pid_to_ptid (current_event.dwProcessId);
34b34921 1602 case TARGET_WAITKIND_STOPPED:
1b3f6016 1603 case TARGET_WAITKIND_LOADED:
f72f3e60 1604 OUTMSG2 (("Child Stopped with signal = %d \n",
10357975 1605 ourstatus->value.sig));
b80864fb 1606
0bfdf32f 1607 regcache = get_thread_regcache (current_thread, 1);
442ea881 1608 child_fetch_inferior_registers (regcache, -1);
95954743 1609 return debug_event_ptid (&current_event);
1b3f6016 1610 default:
5b1c542e 1611 OUTMSG (("Ignoring unknown internal event, %d\n", ourstatus->kind));
1b3f6016
PA
1612 /* fall-through */
1613 case TARGET_WAITKIND_SPURIOUS:
1614 case TARGET_WAITKIND_EXECD:
34b34921
PA
1615 /* do nothing, just continue */
1616 child_continue (DBG_CONTINUE, -1);
1617 break;
b80864fb 1618 }
b80864fb
DJ
1619 }
1620}
1621
1622/* Fetch registers from the inferior process.
1623 If REGNO is -1, fetch all registers; otherwise, fetch at least REGNO. */
1624static void
442ea881 1625win32_fetch_inferior_registers (struct regcache *regcache, int regno)
b80864fb 1626{
442ea881 1627 child_fetch_inferior_registers (regcache, regno);
b80864fb
DJ
1628}
1629
1630/* Store registers to the inferior process.
1631 If REGNO is -1, store all registers; otherwise, store at least REGNO. */
1632static void
442ea881 1633win32_store_inferior_registers (struct regcache *regcache, int regno)
b80864fb 1634{
442ea881 1635 child_store_inferior_registers (regcache, regno);
b80864fb
DJ
1636}
1637
1638/* Read memory from the inferior process. This should generally be
1639 called through read_inferior_memory, which handles breakpoint shadowing.
1640 Read LEN bytes at MEMADDR into a buffer at MYADDR. */
1641static int
1642win32_read_inferior_memory (CORE_ADDR memaddr, unsigned char *myaddr, int len)
1643{
ed50f18f 1644 return child_xfer_memory (memaddr, (char *) myaddr, len, 0, 0) != len;
b80864fb
DJ
1645}
1646
1647/* Write memory to the inferior process. This should generally be
1648 called through write_inferior_memory, which handles breakpoint shadowing.
1649 Write LEN bytes from the buffer at MYADDR to MEMADDR.
1650 Returns 0 on success and errno on failure. */
1651static int
1652win32_write_inferior_memory (CORE_ADDR memaddr, const unsigned char *myaddr,
1653 int len)
1654{
1655 return child_xfer_memory (memaddr, (char *) myaddr, len, 1, 0) != len;
1656}
1657
7390519e
PA
1658/* Send an interrupt request to the inferior process. */
1659static void
1660win32_request_interrupt (void)
1661{
1662 winapi_DebugBreakProcess DebugBreakProcess;
1663 winapi_GenerateConsoleCtrlEvent GenerateConsoleCtrlEvent;
1664
1665#ifdef _WIN32_WCE
1666 HMODULE dll = GetModuleHandle (_T("COREDLL.DLL"));
1667#else
1668 HMODULE dll = GetModuleHandle (_T("KERNEL32.DLL"));
1669#endif
1670
1671 GenerateConsoleCtrlEvent = GETPROCADDRESS (dll, GenerateConsoleCtrlEvent);
1672
1673 if (GenerateConsoleCtrlEvent != NULL
1674 && GenerateConsoleCtrlEvent (CTRL_BREAK_EVENT, current_process_id))
1675 return;
1676
1677 /* GenerateConsoleCtrlEvent can fail if process id being debugged is
1678 not a process group id.
1679 Fallback to XP/Vista 'DebugBreakProcess', which generates a
1680 breakpoint exception in the interior process. */
1681
1682 DebugBreakProcess = GETPROCADDRESS (dll, DebugBreakProcess);
1683
1684 if (DebugBreakProcess != NULL
1685 && DebugBreakProcess (current_process_handle))
1686 return;
1687
4d5d1aaa
PA
1688 /* Last resort, suspend all threads manually. */
1689 soft_interrupt_requested = 1;
7390519e
PA
1690}
1691
59a016f0
PA
1692#ifdef _WIN32_WCE
1693int
1694win32_error_to_fileio_error (DWORD err)
1695{
1696 switch (err)
1697 {
1698 case ERROR_BAD_PATHNAME:
1699 case ERROR_FILE_NOT_FOUND:
1700 case ERROR_INVALID_NAME:
1701 case ERROR_PATH_NOT_FOUND:
1702 return FILEIO_ENOENT;
1703 case ERROR_CRC:
1704 case ERROR_IO_DEVICE:
1705 case ERROR_OPEN_FAILED:
1706 return FILEIO_EIO;
1707 case ERROR_INVALID_HANDLE:
1708 return FILEIO_EBADF;
1709 case ERROR_ACCESS_DENIED:
1710 case ERROR_SHARING_VIOLATION:
1711 return FILEIO_EACCES;
1712 case ERROR_NOACCESS:
1713 return FILEIO_EFAULT;
1714 case ERROR_BUSY:
1715 return FILEIO_EBUSY;
1716 case ERROR_ALREADY_EXISTS:
1717 case ERROR_FILE_EXISTS:
1718 return FILEIO_EEXIST;
1719 case ERROR_BAD_DEVICE:
1720 return FILEIO_ENODEV;
1721 case ERROR_DIRECTORY:
1722 return FILEIO_ENOTDIR;
1723 case ERROR_FILENAME_EXCED_RANGE:
1724 case ERROR_INVALID_DATA:
1725 case ERROR_INVALID_PARAMETER:
1726 case ERROR_NEGATIVE_SEEK:
1727 return FILEIO_EINVAL;
1728 case ERROR_TOO_MANY_OPEN_FILES:
1729 return FILEIO_EMFILE;
1730 case ERROR_HANDLE_DISK_FULL:
1731 case ERROR_DISK_FULL:
1732 return FILEIO_ENOSPC;
1733 case ERROR_WRITE_PROTECT:
1734 return FILEIO_EROFS;
1735 case ERROR_NOT_SUPPORTED:
1736 return FILEIO_ENOSYS;
1737 }
1738
1739 return FILEIO_EUNKNOWN;
1740}
1741
1742static void
1743wince_hostio_last_error (char *buf)
1744{
1745 DWORD winerr = GetLastError ();
1746 int fileio_err = win32_error_to_fileio_error (winerr);
1747 sprintf (buf, "F-1,%x", fileio_err);
1748}
1749#endif
1750
711e434b
PM
1751/* Write Windows OS Thread Information Block address. */
1752
1753static int
1754win32_get_tib_address (ptid_t ptid, CORE_ADDR *addr)
1755{
1756 win32_thread_info *th;
1757 th = thread_rec (ptid, 0);
1758 if (th == NULL)
1759 return 0;
1760 if (addr != NULL)
1761 *addr = th->thread_local_base;
1762 return 1;
1763}
1764
b80864fb
DJ
1765static struct target_ops win32_target_ops = {
1766 win32_create_inferior,
1767 win32_attach,
1768 win32_kill,
1769 win32_detach,
505106cd 1770 win32_mourn,
444d6139 1771 win32_join,
b80864fb
DJ
1772 win32_thread_alive,
1773 win32_resume,
1774 win32_wait,
1775 win32_fetch_inferior_registers,
1776 win32_store_inferior_registers,
90d74c30 1777 NULL, /* prepare_to_access_memory */
0146f85b 1778 NULL, /* done_accessing_memory */
b80864fb
DJ
1779 win32_read_inferior_memory,
1780 win32_write_inferior_memory,
711e434b 1781 NULL, /* lookup_symbols */
7390519e 1782 win32_request_interrupt,
711e434b 1783 NULL, /* read_auxv */
802e8e6d 1784 win32_supports_z_point_type,
aa5ca48f
DE
1785 win32_insert_point,
1786 win32_remove_point,
1787 win32_stopped_by_watchpoint,
1788 win32_stopped_data_address,
711e434b
PM
1789 NULL, /* read_offsets */
1790 NULL, /* get_tls_address */
1791 NULL, /* qxfer_spu */
59a016f0
PA
1792#ifdef _WIN32_WCE
1793 wince_hostio_last_error,
1794#else
1795 hostio_last_error_from_errno,
1796#endif
711e434b
PM
1797 NULL, /* qxfer_osdata */
1798 NULL, /* qxfer_siginfo */
1799 NULL, /* supports_non_stop */
1800 NULL, /* async */
1801 NULL, /* start_non_stop */
1802 NULL, /* supports_multi_process */
1803 NULL, /* handle_monitor_command */
1804 NULL, /* core_of_thread */
881127c9 1805 NULL, /* read_loadmap */
711e434b
PM
1806 NULL, /* process_qsupported */
1807 NULL, /* supports_tracepoints */
1808 NULL, /* read_pc */
1809 NULL, /* write_pc */
1810 NULL, /* thread_stopped */
7984d532 1811 win32_get_tib_address
b80864fb
DJ
1812};
1813
1814/* Initialize the Win32 backend. */
1815void
1816initialize_low (void)
1817{
1818 set_target_ops (&win32_target_ops);
ed50f18f
PA
1819 if (the_low_target.breakpoint != NULL)
1820 set_breakpoint_data (the_low_target.breakpoint,
1821 the_low_target.breakpoint_len);
d05b4ac3 1822 the_low_target.arch_setup ();
b80864fb 1823}
This page took 1.04393 seconds and 4 git commands to generate.