gas/testsuite/
[deliverable/binutils-gdb.git] / gdb / windows-nat.c
CommitLineData
dc05df57 1/* Target-vector operations for controlling windows child processes, for GDB.
0a65a603 2
8acc9f48 3 Copyright (C) 1995-2013 Free Software Foundation, Inc.
0a65a603 4
e6433c28 5 Contributed by Cygnus Solutions, A Red Hat Company.
e88c49c3 6
24e60978
SC
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
24e60978
SC
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
a9762ec7 15 but WITHOUT ANY WARRANTY; without even the implied warranty of
24e60978
SC
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
24e60978 21
dfe7f3ac 22/* Originally by Steve Chamberlain, sac@cygnus.com */
24e60978
SC
23
24#include "defs.h"
25#include "frame.h" /* required by inferior.h */
26#include "inferior.h"
27#include "target.h"
60250e8b 28#include "exceptions.h"
24e60978
SC
29#include "gdbcore.h"
30#include "command.h"
fa58ee11 31#include "completer.h"
4e052eda 32#include "regcache.h"
2a3d5645 33#include "top.h"
403d9909
CF
34#include <signal.h>
35#include <sys/types.h>
36#include <fcntl.h>
37#include <stdlib.h>
38#include <windows.h>
39#include <imagehlp.h>
2b008701 40#include <psapi.h>
10325bc5 41#ifdef __CYGWIN__
b7ff339d 42#include <wchar.h>
403d9909 43#include <sys/cygwin.h>
b7ff339d 44#include <cygwin/version.h>
10325bc5 45#endif
a244bdca 46#include <signal.h>
cad9cd60 47
24e60978 48#include "buildsym.h"
0ba1096a 49#include "filenames.h"
1ef980b9
SC
50#include "symfile.h"
51#include "objfiles.h"
92107356 52#include "gdb_bfd.h"
de1b3c3d 53#include "gdb_obstack.h"
24e60978 54#include "gdb_string.h"
fdfa3315 55#include "gdbthread.h"
24e60978 56#include "gdbcmd.h"
1750a5ef 57#include <sys/param.h>
1e37c281 58#include <unistd.h>
4646aa9d 59#include "exec.h"
3ee6f623 60#include "solist.h"
3cb8e7f6 61#include "solib.h"
de1b3c3d 62#include "xml-support.h"
24e60978 63
6c7de422
MK
64#include "i386-tdep.h"
65#include "i387-tdep.h"
66
31b060a2
CF
67#include "windows-tdep.h"
68#include "windows-nat.h"
9bb9e8ad 69#include "i386-nat.h"
ecc13e53 70#include "complaints.h"
de1b3c3d 71
418c6cb3 72#define AdjustTokenPrivileges dyn_AdjustTokenPrivileges
2b008701
CF
73#define DebugActiveProcessStop dyn_DebugActiveProcessStop
74#define DebugBreakProcess dyn_DebugBreakProcess
75#define DebugSetProcessKillOnExit dyn_DebugSetProcessKillOnExit
76#define EnumProcessModules dyn_EnumProcessModules
2b008701 77#define GetModuleInformation dyn_GetModuleInformation
418c6cb3
CF
78#define LookupPrivilegeValueA dyn_LookupPrivilegeValueA
79#define OpenProcessToken dyn_OpenProcessToken
cd44747c
PM
80#define GetConsoleFontSize dyn_GetConsoleFontSize
81#define GetCurrentConsoleFont dyn_GetCurrentConsoleFont
2b008701 82
418c6cb3
CF
83static BOOL WINAPI (*AdjustTokenPrivileges)(HANDLE, BOOL, PTOKEN_PRIVILEGES,
84 DWORD, PTOKEN_PRIVILEGES, PDWORD);
2b008701
CF
85static BOOL WINAPI (*DebugActiveProcessStop) (DWORD);
86static BOOL WINAPI (*DebugBreakProcess) (HANDLE);
87static BOOL WINAPI (*DebugSetProcessKillOnExit) (BOOL);
88static BOOL WINAPI (*EnumProcessModules) (HANDLE, HMODULE *, DWORD,
89 LPDWORD);
2b008701
CF
90static BOOL WINAPI (*GetModuleInformation) (HANDLE, HMODULE, LPMODULEINFO,
91 DWORD);
418c6cb3
CF
92static BOOL WINAPI (*LookupPrivilegeValueA)(LPCSTR, LPCSTR, PLUID);
93static BOOL WINAPI (*OpenProcessToken)(HANDLE, DWORD, PHANDLE);
581e13c1
MS
94static BOOL WINAPI (*GetCurrentConsoleFont) (HANDLE, BOOL,
95 CONSOLE_FONT_INFO *);
cd44747c 96static COORD WINAPI (*GetConsoleFontSize) (HANDLE, DWORD);
2b008701 97
dc05df57 98static struct target_ops windows_ops;
3ee6f623 99
b3c613f2
CF
100#undef STARTUPINFO
101#undef CreateProcess
102#undef GetModuleFileNameEx
103
104#ifndef __CYGWIN__
105# define __PMAX (MAX_PATH + 1)
106 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPSTR, DWORD);
107# define STARTUPINFO STARTUPINFOA
108# define CreateProcess CreateProcessA
109# define GetModuleFileNameEx_name "GetModuleFileNameExA"
110# define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
111#else
112# define __PMAX PATH_MAX
581e13c1 113/* The starting and ending address of the cygwin1.dll text segment. */
b3c613f2
CF
114 static CORE_ADDR cygwin_load_start;
115 static CORE_ADDR cygwin_load_end;
b3c613f2
CF
116# define __USEWIDE
117 typedef wchar_t cygwin_buf_t;
581e13c1
MS
118 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE,
119 LPWSTR, DWORD);
b3c613f2
CF
120# define STARTUPINFO STARTUPINFOW
121# define CreateProcess CreateProcessW
122# define GetModuleFileNameEx_name "GetModuleFileNameExW"
123# define bad_GetModuleFileNameEx bad_GetModuleFileNameExW
10325bc5 124#endif
a244bdca 125
581e13c1
MS
126static int have_saved_context; /* True if we've saved context from a
127 cygwin signal. */
128static CONTEXT saved_context; /* Containes the saved context from a
129 cygwin signal. */
a244bdca 130
0714f9bf
SS
131/* If we're not using the old Cygwin header file set, define the
132 following which never should have been in the generic Win32 API
581e13c1 133 headers in the first place since they were our own invention... */
0714f9bf 134#ifndef _GNU_H_WINDOWS_H
9d3789f7 135enum
8e860359
CF
136 {
137 FLAG_TRACE_BIT = 0x100,
138 CONTEXT_DEBUGGER = (CONTEXT_FULL | CONTEXT_FLOATING_POINT)
139 };
0714f9bf
SS
140#endif
141
5851ab76
JB
142#ifndef CONTEXT_EXTENDED_REGISTERS
143/* This macro is only defined on ia32. It only makes sense on this target,
144 so define it as zero if not already defined. */
145#define CONTEXT_EXTENDED_REGISTERS 0
146#endif
147
fa4ba8da
PM
148#define CONTEXT_DEBUGGER_DR CONTEXT_DEBUGGER | CONTEXT_DEBUG_REGISTERS \
149 | CONTEXT_EXTENDED_REGISTERS
97da3b20 150
41b4aadc 151static uintptr_t dr[8];
87a45c96
CF
152static int debug_registers_changed;
153static int debug_registers_used;
16d905e2
CF
154
155static int windows_initialization_done;
6537bb24 156#define DR6_CLEAR_VALUE 0xffff0ff0
97da3b20 157
3cee93ac 158/* The string sent by cygwin when it processes a signal.
581e13c1 159 FIXME: This should be in a cygwin include file. */
3929abe9
CF
160#ifndef _CYGWIN_SIGNAL_STRING
161#define _CYGWIN_SIGNAL_STRING "cYgSiGw00f"
162#endif
3cee93ac 163
29fe111d 164#define CHECK(x) check (x, __FILE__,__LINE__)
dfe7f3ac 165#define DEBUG_EXEC(x) if (debug_exec) printf_unfiltered x
4e52d31c
PM
166#define DEBUG_EVENTS(x) if (debug_events) printf_unfiltered x
167#define DEBUG_MEM(x) if (debug_memory) printf_unfiltered x
168#define DEBUG_EXCEPT(x) if (debug_exceptions) printf_unfiltered x
24e60978 169
dc05df57 170static void windows_stop (ptid_t);
02529b48 171static int windows_thread_alive (struct target_ops *, ptid_t);
7d85a9c0 172static void windows_kill_inferior (struct target_ops *);
3cee93ac 173
9bb9e8ad
PM
174static void cygwin_set_dr (int i, CORE_ADDR addr);
175static void cygwin_set_dr7 (unsigned long val);
a961bc18 176static CORE_ADDR cygwin_get_dr (int i);
9bb9e8ad 177static unsigned long cygwin_get_dr6 (void);
a961bc18 178static unsigned long cygwin_get_dr7 (void);
9bb9e8ad 179
a493e3e2 180static enum gdb_signal last_sig = GDB_SIGNAL_0;
581e13c1 181/* Set if a signal was received from the debugged process. */
7393af7c 182
3cee93ac 183/* Thread information structure used to track information that is
6537bb24 184 not available in gdb's thread structure. */
3cee93ac 185typedef struct thread_info_struct
3a4b77d8
JM
186 {
187 struct thread_info_struct *next;
188 DWORD id;
189 HANDLE h;
711e434b 190 CORE_ADDR thread_local_base;
3a4b77d8 191 char *name;
6537bb24 192 int suspended;
3ade5333 193 int reload_context;
3a4b77d8 194 CONTEXT context;
1e37c281 195 STACKFRAME sf;
8e860359
CF
196 }
197thread_info;
1e37c281 198
29fe111d 199static thread_info thread_head;
24e60978 200
581e13c1 201/* The process and thread handles for the above context. */
24e60978 202
3cee93ac
CF
203static DEBUG_EVENT current_event; /* The current debug event from
204 WaitForDebugEvent */
205static HANDLE current_process_handle; /* Currently executing process */
206static thread_info *current_thread; /* Info on currently selected thread */
349b409f 207static DWORD main_thread_id; /* Thread ID of the main thread */
24e60978 208
581e13c1 209/* Counts of things. */
24e60978
SC
210static int exception_count = 0;
211static int event_count = 0;
dfe7f3ac 212static int saw_create;
bf25528d 213static int open_process_used = 0;
24e60978 214
581e13c1 215/* User options. */
24e60978 216static int new_console = 0;
10325bc5 217#ifdef __CYGWIN__
09280ddf 218static int cygwin_exceptions = 0;
10325bc5 219#endif
1e37c281 220static int new_group = 1;
dfe7f3ac
CF
221static int debug_exec = 0; /* show execution */
222static int debug_events = 0; /* show events from kernel */
223static int debug_memory = 0; /* show target memory accesses */
1ef980b9 224static int debug_exceptions = 0; /* show target exceptions */
dfe7f3ac
CF
225static int useshell = 0; /* use shell for subprocesses */
226
7e63b4e4 227/* This vector maps GDB's idea of a register's number into an offset
dc05df57 228 in the windows exception context vector.
24e60978 229
3cee93ac 230 It also contains the bit mask needed to load the register in question.
24e60978 231
7e63b4e4
JB
232 The contents of this table can only be computed by the units
233 that provide CPU-specific support for Windows native debugging.
234 These units should set the table by calling
dc05df57 235 windows_set_context_register_offsets.
7e63b4e4 236
24e60978
SC
237 One day we could read a reg, we could inspect the context we
238 already have loaded, if it doesn't have the bit set that we need,
239 we read that set of registers in using GetThreadContext. If the
581e13c1 240 context already contains what we need, we just unpack it. Then to
24e60978
SC
241 write a register, first we have to ensure that the context contains
242 the other regs of the group, and then we copy the info in and set
581e13c1 243 out bit. */
24e60978 244
7e63b4e4 245static const int *mappings;
d3a09475 246
d40dc7a8
JB
247/* The function to use in order to determine whether a register is
248 a segment register or not. */
249static segment_register_p_ftype *segment_register_p;
250
24e60978 251/* This vector maps the target's idea of an exception (extracted
581e13c1 252 from the DEBUG_EVENT structure) to GDB's idea. */
24e60978
SC
253
254struct xlate_exception
255 {
256 int them;
2ea28649 257 enum gdb_signal us;
24e60978
SC
258 };
259
24e60978
SC
260static const struct xlate_exception
261 xlate[] =
262{
a493e3e2
PA
263 {EXCEPTION_ACCESS_VIOLATION, GDB_SIGNAL_SEGV},
264 {STATUS_STACK_OVERFLOW, GDB_SIGNAL_SEGV},
265 {EXCEPTION_BREAKPOINT, GDB_SIGNAL_TRAP},
266 {DBG_CONTROL_C, GDB_SIGNAL_INT},
267 {EXCEPTION_SINGLE_STEP, GDB_SIGNAL_TRAP},
268 {STATUS_FLOAT_DIVIDE_BY_ZERO, GDB_SIGNAL_FPE},
24e60978
SC
269 {-1, -1}};
270
7e63b4e4
JB
271/* Set the MAPPINGS static global to OFFSETS.
272 See the description of MAPPINGS for more details. */
273
274void
dc05df57 275windows_set_context_register_offsets (const int *offsets)
7e63b4e4
JB
276{
277 mappings = offsets;
278}
279
d40dc7a8
JB
280/* See windows-nat.h. */
281
282void
283windows_set_segment_register_p (segment_register_p_ftype *fun)
284{
285 segment_register_p = fun;
286}
287
fa4ba8da
PM
288static void
289check (BOOL ok, const char *file, int line)
290{
291 if (!ok)
d50a0ce2
CV
292 printf_filtered ("error return %s:%d was %u\n", file, line,
293 (unsigned) GetLastError ());
fa4ba8da
PM
294}
295
6537bb24
PA
296/* Find a thread record given a thread id. If GET_CONTEXT is not 0,
297 then also retrieve the context for this thread. If GET_CONTEXT is
298 negative, then don't suspend the thread. */
3cee93ac
CF
299static thread_info *
300thread_rec (DWORD id, int get_context)
24e60978 301{
3cee93ac
CF
302 thread_info *th;
303
3a4b77d8 304 for (th = &thread_head; (th = th->next) != NULL;)
3cee93ac
CF
305 if (th->id == id)
306 {
6537bb24 307 if (!th->suspended && get_context)
3cee93ac 308 {
8a892701 309 if (get_context > 0 && id != current_event.dwThreadId)
6537bb24
PA
310 {
311 if (SuspendThread (th->h) == (DWORD) -1)
312 {
313 DWORD err = GetLastError ();
d50a0ce2
CV
314 warning (_("SuspendThread failed. (winerr %u)"),
315 (unsigned) err);
6537bb24
PA
316 return NULL;
317 }
318 th->suspended = 1;
319 }
3cee93ac 320 else if (get_context < 0)
6537bb24 321 th->suspended = -1;
3ade5333 322 th->reload_context = 1;
3cee93ac
CF
323 }
324 return th;
325 }
326
327 return NULL;
328}
329
2dc38344 330/* Add a thread to the thread list. */
3cee93ac 331static thread_info *
711e434b 332windows_add_thread (ptid_t ptid, HANDLE h, void *tlb)
3cee93ac
CF
333{
334 thread_info *th;
2dc38344
PA
335 DWORD id;
336
337 gdb_assert (ptid_get_tid (ptid) != 0);
338
339 id = ptid_get_tid (ptid);
3cee93ac
CF
340
341 if ((th = thread_rec (id, FALSE)))
342 return th;
343
3929abe9 344 th = XZALLOC (thread_info);
3cee93ac
CF
345 th->id = id;
346 th->h = h;
711e434b 347 th->thread_local_base = (CORE_ADDR) (uintptr_t) tlb;
3cee93ac
CF
348 th->next = thread_head.next;
349 thread_head.next = th;
2dc38344
PA
350 add_thread (ptid);
351 /* Set the debug registers for the new thread if they are used. */
fa4ba8da
PM
352 if (debug_registers_used)
353 {
354 /* Only change the value of the debug registers. */
355 th->context.ContextFlags = CONTEXT_DEBUG_REGISTERS;
356 CHECK (GetThreadContext (th->h, &th->context));
357 th->context.Dr0 = dr[0];
358 th->context.Dr1 = dr[1];
359 th->context.Dr2 = dr[2];
360 th->context.Dr3 = dr[3];
6537bb24 361 th->context.Dr6 = DR6_CLEAR_VALUE;
fa4ba8da
PM
362 th->context.Dr7 = dr[7];
363 CHECK (SetThreadContext (th->h, &th->context));
364 th->context.ContextFlags = 0;
365 }
3cee93ac 366 return th;
24e60978
SC
367}
368
3cee93ac 369/* Clear out any old thread list and reintialize it to a
581e13c1 370 pristine state. */
24e60978 371static void
dc05df57 372windows_init_thread_list (void)
24e60978 373{
3cee93ac
CF
374 thread_info *th = &thread_head;
375
dc05df57 376 DEBUG_EVENTS (("gdb: windows_init_thread_list\n"));
3cee93ac
CF
377 init_thread_list ();
378 while (th->next != NULL)
24e60978 379 {
3cee93ac
CF
380 thread_info *here = th->next;
381 th->next = here->next;
b8c9b27d 382 xfree (here);
24e60978 383 }
059198c1 384 thread_head.next = NULL;
3cee93ac
CF
385}
386
581e13c1 387/* Delete a thread from the list of threads. */
3cee93ac 388static void
dc05df57 389windows_delete_thread (ptid_t ptid)
3cee93ac
CF
390{
391 thread_info *th;
2dc38344
PA
392 DWORD id;
393
394 gdb_assert (ptid_get_tid (ptid) != 0);
395
396 id = ptid_get_tid (ptid);
3cee93ac
CF
397
398 if (info_verbose)
2dc38344
PA
399 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (ptid));
400 delete_thread (ptid);
3cee93ac
CF
401
402 for (th = &thread_head;
403 th->next != NULL && th->next->id != id;
404 th = th->next)
405 continue;
406
407 if (th->next != NULL)
24e60978 408 {
3cee93ac
CF
409 thread_info *here = th->next;
410 th->next = here->next;
b8c9b27d 411 xfree (here);
24e60978
SC
412 }
413}
414
3cee93ac 415static void
dc05df57 416do_windows_fetch_inferior_registers (struct regcache *regcache, int r)
24e60978 417{
1e37c281 418 char *context_offset = ((char *) &current_thread->context) + mappings[r];
20a6ec49
MD
419 struct gdbarch *gdbarch = get_regcache_arch (regcache);
420 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
1e37c281 421 long l;
6c7de422 422
3ade5333 423 if (!current_thread)
d6dc8049 424 return; /* Windows sometimes uses a non-existent thread id in its
581e13c1 425 events. */
3ade5333
CF
426
427 if (current_thread->reload_context)
428 {
cb832706 429#ifdef __COPY_CONTEXT_SIZE
a244bdca
CF
430 if (have_saved_context)
431 {
581e13c1
MS
432 /* Lie about where the program actually is stopped since
433 cygwin has informed us that we should consider the signal
434 to have occurred at another location which is stored in
435 "saved_context. */
436 memcpy (&current_thread->context, &saved_context,
437 __COPY_CONTEXT_SIZE);
a244bdca
CF
438 have_saved_context = 0;
439 }
440 else
cb832706 441#endif
a244bdca
CF
442 {
443 thread_info *th = current_thread;
444 th->context.ContextFlags = CONTEXT_DEBUGGER_DR;
445 GetThreadContext (th->h, &th->context);
2b008701 446 /* Copy dr values from that thread.
581e13c1
MS
447 But only if there were not modified since last stop.
448 PR gdb/2388 */
88616312
PM
449 if (!debug_registers_changed)
450 {
451 dr[0] = th->context.Dr0;
452 dr[1] = th->context.Dr1;
453 dr[2] = th->context.Dr2;
454 dr[3] = th->context.Dr3;
455 dr[6] = th->context.Dr6;
456 dr[7] = th->context.Dr7;
457 }
a244bdca 458 }
3ade5333
CF
459 current_thread->reload_context = 0;
460 }
461
20a6ec49 462 if (r == I387_FISEG_REGNUM (tdep))
1e37c281 463 {
8e860359 464 l = *((long *) context_offset) & 0xffff;
56be3814 465 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 466 }
20a6ec49 467 else if (r == I387_FOP_REGNUM (tdep))
1e37c281 468 {
8e860359 469 l = (*((long *) context_offset) >> 16) & ((1 << 11) - 1);
56be3814 470 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 471 }
d40dc7a8
JB
472 else if (segment_register_p (r))
473 {
474 /* GDB treats segment registers as 32bit registers, but they are
475 in fact only 16 bits long. Make sure we do not read extra
476 bits from our source buffer. */
477 l = *((long *) context_offset) & 0xffff;
478 regcache_raw_supply (regcache, r, (char *) &l);
479 }
1e37c281 480 else if (r >= 0)
56be3814 481 regcache_raw_supply (regcache, r, context_offset);
3cee93ac 482 else
24e60978 483 {
20a6ec49 484 for (r = 0; r < gdbarch_num_regs (gdbarch); r++)
dc05df57 485 do_windows_fetch_inferior_registers (regcache, r);
24e60978 486 }
3cee93ac
CF
487}
488
489static void
28439f5e
PA
490windows_fetch_inferior_registers (struct target_ops *ops,
491 struct regcache *regcache, int r)
3cee93ac 492{
2dc38344 493 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 494 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 495 thread id in its events. */
3ade5333 496 if (current_thread)
dc05df57 497 do_windows_fetch_inferior_registers (regcache, r);
3cee93ac
CF
498}
499
500static void
dc05df57 501do_windows_store_inferior_registers (const struct regcache *regcache, int r)
3cee93ac 502{
3ade5333 503 if (!current_thread)
581e13c1 504 /* Windows sometimes uses a non-existent thread id in its events. */;
3ade5333 505 else if (r >= 0)
56be3814 506 regcache_raw_collect (regcache, r,
822c9732 507 ((char *) &current_thread->context) + mappings[r]);
24e60978
SC
508 else
509 {
40a6adc1 510 for (r = 0; r < gdbarch_num_regs (get_regcache_arch (regcache)); r++)
dc05df57 511 do_windows_store_inferior_registers (regcache, r);
24e60978
SC
512 }
513}
514
581e13c1 515/* Store a new register value into the current thread context. */
3cee93ac 516static void
28439f5e
PA
517windows_store_inferior_registers (struct target_ops *ops,
518 struct regcache *regcache, int r)
3cee93ac 519{
2dc38344 520 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 521 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 522 thread id in its events. */
3ade5333 523 if (current_thread)
dc05df57 524 do_windows_store_inferior_registers (regcache, r);
3cee93ac 525}
24e60978 526
7a9dd1b2 527/* Get the name of a given module at given base address. If base_address
33605d39
CF
528 is zero return the first loaded module (which is always the name of the
529 executable). */
3ee6f623 530static int
d3653bf6 531get_module_name (LPVOID base_address, char *dll_name_ret)
1e37c281
JM
532{
533 DWORD len;
534 MODULEINFO mi;
535 int i;
8e860359 536 HMODULE dh_buf[1];
581e13c1
MS
537 HMODULE *DllHandle = dh_buf; /* Set to temporary storage for
538 initial query. */
1e37c281 539 DWORD cbNeeded;
33605d39 540#ifdef __CYGWIN__
b3c613f2
CF
541 cygwin_buf_t pathbuf[__PMAX]; /* Temporary storage prior to converting to
542 posix form. __PMAX is always enough
d0d0ab16 543 as long as SO_NAME_MAX_PATH_SIZE is defined
581e13c1 544 as 512. */
33605d39 545#endif
1e37c281 546
1e37c281 547 cbNeeded = 0;
581e13c1
MS
548 /* Find size of buffer needed to handle list of modules loaded in
549 inferior. */
2b008701
CF
550 if (!EnumProcessModules (current_process_handle, DllHandle,
551 sizeof (HMODULE), &cbNeeded) || !cbNeeded)
1e37c281
JM
552 goto failed;
553
581e13c1 554 /* Allocate correct amount of space for module list. */
8e860359 555 DllHandle = (HMODULE *) alloca (cbNeeded);
1e37c281
JM
556 if (!DllHandle)
557 goto failed;
558
581e13c1 559 /* Get the list of modules. */
2b008701 560 if (!EnumProcessModules (current_process_handle, DllHandle, cbNeeded,
33605d39 561 &cbNeeded))
1e37c281
JM
562 goto failed;
563
29fe111d 564 for (i = 0; i < (int) (cbNeeded / sizeof (HMODULE)); i++)
1e37c281 565 {
581e13c1 566 /* Get information on this module. */
2b008701
CF
567 if (!GetModuleInformation (current_process_handle, DllHandle[i],
568 &mi, sizeof (mi)))
8a3fe4f8 569 error (_("Can't get module info"));
1e37c281 570
d3653bf6 571 if (!base_address || mi.lpBaseOfDll == base_address)
33605d39 572 {
581e13c1 573 /* Try to find the name of the given module. */
d0d0ab16 574#ifdef __CYGWIN__
581e13c1 575 /* Cygwin prefers that the path be in /x/y/z format. */
b3c613f2
CF
576 len = GetModuleFileNameEx (current_process_handle,
577 DllHandle[i], pathbuf, __PMAX);
d0d0ab16 578 if (len == 0)
d50a0ce2
CV
579 error (_("Error getting dll name: %u."),
580 (unsigned) GetLastError ());
d0d0ab16 581 if (cygwin_conv_path (CCP_WIN_W_TO_POSIX, pathbuf, dll_name_ret,
b3c613f2 582 __PMAX) < 0)
d0d0ab16
CV
583 error (_("Error converting dll name to POSIX: %d."), errno);
584#else
b3c613f2
CF
585 len = GetModuleFileNameEx (current_process_handle,
586 DllHandle[i], dll_name_ret, __PMAX);
33605d39 587 if (len == 0)
581e13c1
MS
588 error (_("Error getting dll name: %u."),
589 (unsigned) GetLastError ());
33605d39
CF
590#endif
591 return 1; /* success */
592 }
1e37c281
JM
593 }
594
595failed:
596 dll_name_ret[0] = '\0';
33605d39 597 return 0; /* failure */
1e37c281
JM
598}
599
450005e7 600/* Encapsulate the information required in a call to
581e13c1 601 symbol_file_add_args. */
8a892701
CF
602struct safe_symbol_file_add_args
603{
604 char *name;
605 int from_tty;
606 struct section_addr_info *addrs;
607 int mainline;
608 int flags;
7c5c87c0 609 struct ui_file *err, *out;
8a892701
CF
610 struct objfile *ret;
611};
612
581e13c1 613/* Maintain a linked list of "so" information. */
3ee6f623 614struct lm_info
02e423b9 615{
d3653bf6 616 LPVOID load_addr;
3ee6f623
CF
617};
618
619static struct so_list solib_start, *solib_end;
02e423b9 620
450005e7 621/* Call symbol_file_add with stderr redirected. We don't care if there
581e13c1 622 are errors. */
8a892701
CF
623static int
624safe_symbol_file_add_stub (void *argv)
625{
3ee6f623 626#define p ((struct safe_symbol_file_add_args *) argv)
7eedccfa
PP
627 const int add_flags = ((p->from_tty ? SYMFILE_VERBOSE : 0)
628 | (p->mainline ? SYMFILE_MAINLINE : 0));
629 p->ret = symbol_file_add (p->name, add_flags, p->addrs, p->flags);
8a892701
CF
630 return !!p->ret;
631#undef p
632}
633
581e13c1 634/* Restore gdb's stderr after calling symbol_file_add. */
8a892701 635static void
7c5c87c0 636safe_symbol_file_add_cleanup (void *p)
8a892701 637{
8e860359 638#define sp ((struct safe_symbol_file_add_args *)p)
450005e7 639 gdb_flush (gdb_stderr);
7c5c87c0 640 gdb_flush (gdb_stdout);
d3ff4a77 641 ui_file_delete (gdb_stderr);
7c5c87c0 642 ui_file_delete (gdb_stdout);
d3ff4a77 643 gdb_stderr = sp->err;
9d3789f7 644 gdb_stdout = sp->out;
8e860359 645#undef sp
8a892701
CF
646}
647
581e13c1 648/* symbol_file_add wrapper that prevents errors from being displayed. */
8a892701
CF
649static struct objfile *
650safe_symbol_file_add (char *name, int from_tty,
651 struct section_addr_info *addrs,
652 int mainline, int flags)
8a892701
CF
653{
654 struct safe_symbol_file_add_args p;
655 struct cleanup *cleanup;
656
7c5c87c0 657 cleanup = make_cleanup (safe_symbol_file_add_cleanup, &p);
8a892701 658
7c5c87c0
CF
659 p.err = gdb_stderr;
660 p.out = gdb_stdout;
450005e7 661 gdb_flush (gdb_stderr);
7c5c87c0 662 gdb_flush (gdb_stdout);
d3ff4a77 663 gdb_stderr = ui_file_new ();
7c5c87c0 664 gdb_stdout = ui_file_new ();
8a892701
CF
665 p.name = name;
666 p.from_tty = from_tty;
667 p.addrs = addrs;
668 p.mainline = mainline;
669 p.flags = flags;
670 catch_errors (safe_symbol_file_add_stub, &p, "", RETURN_MASK_ERROR);
671
672 do_cleanups (cleanup);
673 return p.ret;
674}
675
de1b3c3d 676static struct so_list *
dc05df57 677windows_make_so (const char *name, LPVOID load_addr)
8e860359 678{
3ee6f623 679 struct so_list *so;
d0d0ab16
CV
680 char *p;
681#ifndef __CYGWIN__
b3c613f2
CF
682 char buf[__PMAX];
683 char cwd[__PMAX];
3f8ad85b
CF
684 WIN32_FIND_DATA w32_fd;
685 HANDLE h = FindFirstFile(name, &w32_fd);
3f8ad85b 686
6badb179
CF
687 if (h == INVALID_HANDLE_VALUE)
688 strcpy (buf, name);
689 else
3f8ad85b 690 {
c914e0cc
CF
691 FindClose (h);
692 strcpy (buf, name);
693 if (GetCurrentDirectory (MAX_PATH + 1, cwd))
694 {
695 p = strrchr (buf, '\\');
696 if (p)
697 p[1] = '\0';
698 SetCurrentDirectory (buf);
699 GetFullPathName (w32_fd.cFileName, MAX_PATH, buf, &p);
700 SetCurrentDirectory (cwd);
701 }
3f8ad85b 702 }
3ee6f623
CF
703 if (strcasecmp (buf, "ntdll.dll") == 0)
704 {
705 GetSystemDirectory (buf, sizeof (buf));
706 strcat (buf, "\\ntdll.dll");
707 }
d0d0ab16 708#else
b3c613f2 709 cygwin_buf_t buf[__PMAX];
d0d0ab16 710
b3c613f2 711 buf[0] = 0;
d0d0ab16
CV
712 if (access (name, F_OK) != 0)
713 {
714 if (strcasecmp (name, "ntdll.dll") == 0)
b3c613f2 715#ifdef __USEWIDE
d0d0ab16
CV
716 {
717 GetSystemDirectoryW (buf, sizeof (buf) / sizeof (wchar_t));
718 wcscat (buf, L"\\ntdll.dll");
719 }
b3c613f2
CF
720#else
721 {
722 GetSystemDirectoryA (buf, sizeof (buf) / sizeof (wchar_t));
723 strcat (buf, "\\ntdll.dll");
724 }
725#endif
d0d0ab16
CV
726 }
727#endif
3929abe9 728 so = XZALLOC (struct so_list);
3ee6f623
CF
729 so->lm_info = (struct lm_info *) xmalloc (sizeof (struct lm_info));
730 so->lm_info->load_addr = load_addr;
de1b3c3d 731 strcpy (so->so_original_name, name);
10325bc5
PA
732#ifndef __CYGWIN__
733 strcpy (so->so_name, buf);
734#else
d0d0ab16
CV
735 if (buf[0])
736 cygwin_conv_path (CCP_WIN_W_TO_POSIX, buf, so->so_name,
737 SO_NAME_MAX_PATH_SIZE);
738 else
739 {
60c5c021 740 char *rname = realpath (name, NULL);
d0d0ab16
CV
741 if (rname && strlen (rname) < SO_NAME_MAX_PATH_SIZE)
742 {
743 strcpy (so->so_name, rname);
744 free (rname);
745 }
746 else
747 error (_("dll path too long"));
748 }
de1b3c3d
PA
749 /* Record cygwin1.dll .text start/end. */
750 p = strchr (so->so_name, '\0') - (sizeof ("/cygwin1.dll") - 1);
751 if (p >= so->so_name && strcasecmp (p, "/cygwin1.dll") == 0)
752 {
753 bfd *abfd;
754 asection *text = NULL;
755 CORE_ADDR text_vma;
8e860359 756
1c00ec6b 757 abfd = gdb_bfd_open (so->so_name, "pei-i386", -1);
a244bdca 758
de1b3c3d
PA
759 if (!abfd)
760 return so;
761
762 if (bfd_check_format (abfd, bfd_object))
763 text = bfd_get_section_by_name (abfd, ".text");
764
765 if (!text)
766 {
cbb099e8 767 gdb_bfd_unref (abfd);
de1b3c3d
PA
768 return so;
769 }
770
7a9dd1b2 771 /* The symbols in a dll are offset by 0x1000, which is the
de1b3c3d 772 offset from 0 of the first byte in an image - because of the
581e13c1
MS
773 file header and the section alignment. */
774 cygwin_load_start = (CORE_ADDR) (uintptr_t) ((char *)
775 load_addr + 0x1000);
dc05df57 776 cygwin_load_end = cygwin_load_start + bfd_section_size (abfd, text);
de1b3c3d 777
cbb099e8 778 gdb_bfd_unref (abfd);
de1b3c3d 779 }
10325bc5 780#endif
de1b3c3d
PA
781
782 return so;
8e860359
CF
783}
784
3ee6f623 785static char *
dfe7f3ac
CF
786get_image_name (HANDLE h, void *address, int unicode)
787{
d0d0ab16 788#ifdef __CYGWIN__
b3c613f2 789 static char buf[__PMAX];
d0d0ab16 790#else
b3c613f2 791 static char buf[(2 * __PMAX) + 1];
d0d0ab16 792#endif
dfe7f3ac
CF
793 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
794 char *address_ptr;
795 int len = 0;
796 char b[2];
5732a500 797 SIZE_T done;
dfe7f3ac
CF
798
799 /* Attempt to read the name of the dll that was detected.
800 This is documented to work only when actively debugging
581e13c1 801 a program. It will not work for attached processes. */
dfe7f3ac
CF
802 if (address == NULL)
803 return NULL;
804
dfe7f3ac 805 /* See if we could read the address of a string, and that the
581e13c1
MS
806 address isn't null. */
807 if (!ReadProcessMemory (h, address, &address_ptr,
808 sizeof (address_ptr), &done)
6f17862b 809 || done != sizeof (address_ptr) || !address_ptr)
dfe7f3ac
CF
810 return NULL;
811
581e13c1 812 /* Find the length of the string. */
6f17862b
CF
813 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
814 && (b[0] != 0 || b[size - 1] != 0) && done == size)
815 continue;
dfe7f3ac
CF
816
817 if (!unicode)
818 ReadProcessMemory (h, address_ptr, buf, len, &done);
819 else
820 {
821 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
822 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
823 &done);
d0d0ab16 824#ifdef __CYGWIN__
b3c613f2 825 wcstombs (buf, unicode_address, __PMAX);
d0d0ab16
CV
826#else
827 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, sizeof buf,
828 0, 0);
829#endif
dfe7f3ac
CF
830 }
831
832 return buf;
833}
834
24e60978
SC
835/* Wait for child to do something. Return pid of child, or -1 in case
836 of error; store status through argument pointer OURSTATUS. */
1750a5ef 837static int
0a65a603 838handle_load_dll (void *dummy)
24e60978 839{
3a4b77d8 840 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
b3c613f2 841 char dll_buf[__PMAX];
450005e7 842 char *dll_name = NULL;
3cee93ac 843
3a4b77d8 844 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 845
d3653bf6 846 if (!get_module_name (event->lpBaseOfDll, dll_buf))
8e860359 847 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 848
1e37c281 849 dll_name = dll_buf;
24e60978 850
dfe7f3ac 851 if (*dll_name == '\0')
de1b3c3d
PA
852 dll_name = get_image_name (current_process_handle,
853 event->lpImageName, event->fUnicode);
3cee93ac
CF
854 if (!dll_name)
855 return 1;
856
dc05df57 857 solib_end->next = windows_make_so (dll_name, event->lpBaseOfDll);
de1b3c3d 858 solib_end = solib_end->next;
450005e7 859
a74ce742
PM
860 DEBUG_EVENTS (("gdb: Loading dll \"%s\" at %s.\n", solib_end->so_name,
861 host_address_to_string (solib_end->lm_info->load_addr)));
7488902c 862
450005e7
CF
863 return 1;
864}
865
3ee6f623 866static void
dc05df57 867windows_free_so (struct so_list *so)
3ee6f623 868{
3ee6f623
CF
869 if (so->lm_info)
870 xfree (so->lm_info);
de1b3c3d 871 xfree (so);
3cb8e7f6
CF
872}
873
d3ff4a77 874static int
0a65a603 875handle_unload_dll (void *dummy)
d3ff4a77 876{
d3653bf6 877 LPVOID lpBaseOfDll = current_event.u.UnloadDll.lpBaseOfDll;
3ee6f623 878 struct so_list *so;
d3ff4a77
CF
879
880 for (so = &solib_start; so->next != NULL; so = so->next)
3ee6f623 881 if (so->next->lm_info->load_addr == lpBaseOfDll)
d3ff4a77 882 {
3ee6f623 883 struct so_list *sodel = so->next;
d3ff4a77
CF
884 so->next = sodel->next;
885 if (!so->next)
886 solib_end = so;
7488902c
PM
887 DEBUG_EVENTS (("gdb: Unloading dll \"%s\".\n", sodel->so_name));
888
dc05df57 889 windows_free_so (sodel);
3929abe9 890 solib_add (NULL, 0, NULL, auto_solib_add);
d3ff4a77
CF
891 return 1;
892 }
3929abe9 893
ecc13e53
JB
894 /* We did not find any DLL that was previously loaded at this address,
895 so register a complaint. We do not report an error, because we have
896 observed that this may be happening under some circumstances. For
897 instance, running 32bit applications on x64 Windows causes us to receive
898 4 mysterious UNLOAD_DLL_DEBUG_EVENTs during the startup phase (these
899 events are apparently caused by the WOW layer, the interface between
900 32bit and 64bit worlds). */
901 complaint (&symfile_complaints, _("dll starting at %s not found."),
902 host_address_to_string (lpBaseOfDll));
d3ff4a77
CF
903
904 return 0;
905}
906
581e13c1 907/* Clear list of loaded DLLs. */
3ee6f623 908static void
dc05df57 909windows_clear_solib (void)
450005e7 910{
450005e7
CF
911 solib_start.next = NULL;
912 solib_end = &solib_start;
450005e7 913}
295732ea 914
581e13c1 915/* Load DLL symbol info. */
d603d4b3 916static void
7470a420 917dll_symbol_command (char *args, int from_tty)
450005e7 918{
8e860359 919 int n;
450005e7 920 dont_repeat ();
8e860359 921
450005e7 922 if (args == NULL)
8a3fe4f8 923 error (_("dll-symbols requires a file name"));
450005e7 924
8e860359
CF
925 n = strlen (args);
926 if (n > 4 && strcasecmp (args + n - 4, ".dll") != 0)
927 {
928 char *newargs = (char *) alloca (n + 4 + 1);
929 strcpy (newargs, args);
930 strcat (newargs, ".dll");
931 args = newargs;
932 }
933
7470a420 934 safe_symbol_file_add (args, from_tty, NULL, 0, OBJF_SHARED | OBJF_USERLOADED);
8e860359 935}
450005e7 936
3cee93ac
CF
937/* Handle DEBUG_STRING output from child process.
938 Cygwin prepends its messages with a "cygwin:". Interpret this as
581e13c1 939 a Cygwin signal. Otherwise just print the string as a warning. */
3cee93ac
CF
940static int
941handle_output_debug_string (struct target_waitstatus *ourstatus)
942{
a244bdca
CF
943 char *s = NULL;
944 int retval = 0;
3cee93ac
CF
945
946 if (!target_read_string
2c647436
PM
947 ((CORE_ADDR) (uintptr_t) current_event.u.DebugString.lpDebugStringData,
948 &s, 1024, 0)
3cee93ac 949 || !s || !*s)
a244bdca 950 /* nothing to do */;
581e13c1
MS
951 else if (strncmp (s, _CYGWIN_SIGNAL_STRING,
952 sizeof (_CYGWIN_SIGNAL_STRING) - 1) != 0)
3cee93ac 953 {
10325bc5 954#ifdef __CYGWIN__
d3a09475 955 if (strncmp (s, "cYg", 3) != 0)
10325bc5 956#endif
8a3fe4f8 957 warning (("%s"), s);
3cee93ac 958 }
cb832706 959#ifdef __COPY_CONTEXT_SIZE
d3a09475 960 else
3cee93ac 961 {
581e13c1
MS
962 /* Got a cygwin signal marker. A cygwin signal is followed by
963 the signal number itself and then optionally followed by the
964 thread id and address to saved context within the DLL. If
965 these are supplied, then the given thread is assumed to have
966 issued the signal and the context from the thread is assumed
967 to be stored at the given address in the inferior. Tell gdb
968 to treat this like a real signal. */
3cee93ac 969 char *p;
3929abe9 970 int sig = strtol (s + sizeof (_CYGWIN_SIGNAL_STRING) - 1, &p, 0);
2ea28649 971 int gotasig = gdb_signal_from_host (sig);
c62fa0e2 972
0714f9bf
SS
973 ourstatus->value.sig = gotasig;
974 if (gotasig)
a244bdca
CF
975 {
976 LPCVOID x;
2c15ef43 977 SIZE_T n;
c62fa0e2 978
a244bdca
CF
979 ourstatus->kind = TARGET_WAITKIND_STOPPED;
980 retval = strtoul (p, &p, 0);
981 if (!retval)
982 retval = main_thread_id;
40653b35 983 else if ((x = (LPCVOID) (uintptr_t) strtoull (p, NULL, 0))
a244bdca 984 && ReadProcessMemory (current_process_handle, x,
581e13c1
MS
985 &saved_context,
986 __COPY_CONTEXT_SIZE, &n)
a244bdca
CF
987 && n == __COPY_CONTEXT_SIZE)
988 have_saved_context = 1;
989 current_event.dwThreadId = retval;
990 }
3cee93ac 991 }
cb832706 992#endif
3cee93ac 993
a244bdca
CF
994 if (s)
995 xfree (s);
996 return retval;
3cee93ac 997}
24e60978 998
c1748f97
PM
999static int
1000display_selector (HANDLE thread, DWORD sel)
1001{
1002 LDT_ENTRY info;
1003 if (GetThreadSelectorEntry (thread, sel, &info))
1004 {
1005 int base, limit;
d50a0ce2 1006 printf_filtered ("0x%03x: ", (unsigned) sel);
c1748f97 1007 if (!info.HighWord.Bits.Pres)
baa93fa6
CF
1008 {
1009 puts_filtered ("Segment not present\n");
1010 return 0;
1011 }
c1748f97
PM
1012 base = (info.HighWord.Bits.BaseHi << 24) +
1013 (info.HighWord.Bits.BaseMid << 16)
1014 + info.BaseLow;
1015 limit = (info.HighWord.Bits.LimitHi << 16) + info.LimitLow;
1016 if (info.HighWord.Bits.Granularity)
caad7706 1017 limit = (limit << 12) | 0xfff;
c1748f97
PM
1018 printf_filtered ("base=0x%08x limit=0x%08x", base, limit);
1019 if (info.HighWord.Bits.Default_Big)
baa93fa6 1020 puts_filtered(" 32-bit ");
c1748f97 1021 else
baa93fa6 1022 puts_filtered(" 16-bit ");
c1748f97
PM
1023 switch ((info.HighWord.Bits.Type & 0xf) >> 1)
1024 {
1025 case 0:
baa93fa6
CF
1026 puts_filtered ("Data (Read-Only, Exp-up");
1027 break;
c1748f97 1028 case 1:
baa93fa6
CF
1029 puts_filtered ("Data (Read/Write, Exp-up");
1030 break;
c1748f97 1031 case 2:
baa93fa6
CF
1032 puts_filtered ("Unused segment (");
1033 break;
c1748f97 1034 case 3:
baa93fa6
CF
1035 puts_filtered ("Data (Read/Write, Exp-down");
1036 break;
c1748f97 1037 case 4:
baa93fa6
CF
1038 puts_filtered ("Code (Exec-Only, N.Conf");
1039 break;
c1748f97 1040 case 5:
baa93fa6 1041 puts_filtered ("Code (Exec/Read, N.Conf");
c1748f97
PM
1042 break;
1043 case 6:
baa93fa6 1044 puts_filtered ("Code (Exec-Only, Conf");
c1748f97
PM
1045 break;
1046 case 7:
baa93fa6 1047 puts_filtered ("Code (Exec/Read, Conf");
c1748f97
PM
1048 break;
1049 default:
1050 printf_filtered ("Unknown type 0x%x",info.HighWord.Bits.Type);
1051 }
1052 if ((info.HighWord.Bits.Type & 0x1) == 0)
baa93fa6 1053 puts_filtered(", N.Acc");
c1748f97
PM
1054 puts_filtered (")\n");
1055 if ((info.HighWord.Bits.Type & 0x10) == 0)
1056 puts_filtered("System selector ");
1057 printf_filtered ("Priviledge level = %d. ", info.HighWord.Bits.Dpl);
1058 if (info.HighWord.Bits.Granularity)
baa93fa6 1059 puts_filtered ("Page granular.\n");
c1748f97
PM
1060 else
1061 puts_filtered ("Byte granular.\n");
1062 return 1;
1063 }
1064 else
1065 {
5572ce1f
PM
1066 DWORD err = GetLastError ();
1067 if (err == ERROR_NOT_SUPPORTED)
1068 printf_filtered ("Function not supported\n");
1069 else
d50a0ce2 1070 printf_filtered ("Invalid selector 0x%x.\n", (unsigned) sel);
c1748f97
PM
1071 return 0;
1072 }
1073}
1074
1075static void
1076display_selectors (char * args, int from_tty)
1077{
1078 if (!current_thread)
1079 {
1080 puts_filtered ("Impossible to display selectors now.\n");
1081 return;
1082 }
1083 if (!args)
1084 {
1085
1086 puts_filtered ("Selector $cs\n");
1087 display_selector (current_thread->h,
baa93fa6 1088 current_thread->context.SegCs);
c1748f97
PM
1089 puts_filtered ("Selector $ds\n");
1090 display_selector (current_thread->h,
baa93fa6 1091 current_thread->context.SegDs);
c1748f97
PM
1092 puts_filtered ("Selector $es\n");
1093 display_selector (current_thread->h,
baa93fa6 1094 current_thread->context.SegEs);
c1748f97
PM
1095 puts_filtered ("Selector $ss\n");
1096 display_selector (current_thread->h,
baa93fa6 1097 current_thread->context.SegSs);
c1748f97
PM
1098 puts_filtered ("Selector $fs\n");
1099 display_selector (current_thread->h,
1100 current_thread->context.SegFs);
1101 puts_filtered ("Selector $gs\n");
1102 display_selector (current_thread->h,
baa93fa6 1103 current_thread->context.SegGs);
c1748f97
PM
1104 }
1105 else
1106 {
1107 int sel;
1108 sel = parse_and_eval_long (args);
1109 printf_filtered ("Selector \"%s\"\n",args);
1110 display_selector (current_thread->h, sel);
1111 }
1112}
1113
7393af7c 1114#define DEBUG_EXCEPTION_SIMPLE(x) if (debug_exceptions) \
a74ce742
PM
1115 printf_unfiltered ("gdb: Target exception %s at %s\n", x, \
1116 host_address_to_string (\
1117 current_event.u.Exception.ExceptionRecord.ExceptionAddress))
7393af7c 1118
36339ecd 1119static int
450005e7 1120handle_exception (struct target_waitstatus *ourstatus)
24e60978 1121{
3cee93ac 1122 thread_info *th;
29fe111d 1123 DWORD code = current_event.u.Exception.ExceptionRecord.ExceptionCode;
3cee93ac 1124
29fe111d 1125 ourstatus->kind = TARGET_WAITKIND_STOPPED;
8a892701 1126
581e13c1 1127 /* Record the context of the current thread. */
3cee93ac 1128 th = thread_rec (current_event.dwThreadId, -1);
24e60978 1129
29fe111d 1130 switch (code)
24e60978 1131 {
1ef980b9 1132 case EXCEPTION_ACCESS_VIOLATION:
7393af7c 1133 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ACCESS_VIOLATION");
a493e3e2 1134 ourstatus->value.sig = GDB_SIGNAL_SEGV;
10325bc5 1135#ifdef __CYGWIN__
8da8e0b3 1136 {
581e13c1
MS
1137 /* See if the access violation happened within the cygwin DLL
1138 itself. Cygwin uses a kind of exception handling to deal
1139 with passed-in invalid addresses. gdb should not treat
1140 these as real SEGVs since they will be silently handled by
1141 cygwin. A real SEGV will (theoretically) be caught by
1142 cygwin later in the process and will be sent as a
1143 cygwin-specific-signal. So, ignore SEGVs if they show up
1144 within the text segment of the DLL itself. */
2c02bd72 1145 const char *fn;
581e13c1
MS
1146 CORE_ADDR addr = (CORE_ADDR) (uintptr_t)
1147 current_event.u.Exception.ExceptionRecord.ExceptionAddress;
1148
1149 if ((!cygwin_exceptions && (addr >= cygwin_load_start
1150 && addr < cygwin_load_end))
a244bdca 1151 || (find_pc_partial_function (addr, &fn, NULL, NULL)
581e13c1
MS
1152 && strncmp (fn, "KERNEL32!IsBad",
1153 strlen ("KERNEL32!IsBad")) == 0))
8da8e0b3
CF
1154 return 0;
1155 }
10325bc5 1156#endif
7393af7c
PM
1157 break;
1158 case STATUS_STACK_OVERFLOW:
1159 DEBUG_EXCEPTION_SIMPLE ("STATUS_STACK_OVERFLOW");
a493e3e2 1160 ourstatus->value.sig = GDB_SIGNAL_SEGV;
7393af7c
PM
1161 break;
1162 case STATUS_FLOAT_DENORMAL_OPERAND:
1163 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DENORMAL_OPERAND");
a493e3e2 1164 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1165 break;
1166 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1167 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ARRAY_BOUNDS_EXCEEDED");
a493e3e2 1168 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1169 break;
1170 case STATUS_FLOAT_INEXACT_RESULT:
1171 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INEXACT_RESULT");
a493e3e2 1172 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1173 break;
1174 case STATUS_FLOAT_INVALID_OPERATION:
1175 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INVALID_OPERATION");
a493e3e2 1176 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1177 break;
1178 case STATUS_FLOAT_OVERFLOW:
1179 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_OVERFLOW");
a493e3e2 1180 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1181 break;
1182 case STATUS_FLOAT_STACK_CHECK:
1183 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_STACK_CHECK");
a493e3e2 1184 ourstatus->value.sig = GDB_SIGNAL_FPE;
1ef980b9 1185 break;
3b7c8b74 1186 case STATUS_FLOAT_UNDERFLOW:
7393af7c 1187 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_UNDERFLOW");
a493e3e2 1188 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c 1189 break;
3b7c8b74 1190 case STATUS_FLOAT_DIVIDE_BY_ZERO:
7393af7c 1191 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DIVIDE_BY_ZERO");
a493e3e2 1192 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c 1193 break;
3b7c8b74 1194 case STATUS_INTEGER_DIVIDE_BY_ZERO:
7393af7c 1195 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_DIVIDE_BY_ZERO");
a493e3e2 1196 ourstatus->value.sig = GDB_SIGNAL_FPE;
3b7c8b74 1197 break;
7393af7c
PM
1198 case STATUS_INTEGER_OVERFLOW:
1199 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_OVERFLOW");
a493e3e2 1200 ourstatus->value.sig = GDB_SIGNAL_FPE;
1ef980b9
SC
1201 break;
1202 case EXCEPTION_BREAKPOINT:
7393af7c 1203 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_BREAKPOINT");
a493e3e2 1204 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1ef980b9
SC
1205 break;
1206 case DBG_CONTROL_C:
7393af7c 1207 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_C");
a493e3e2 1208 ourstatus->value.sig = GDB_SIGNAL_INT;
5b421780
PM
1209 break;
1210 case DBG_CONTROL_BREAK:
7393af7c 1211 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_BREAK");
a493e3e2 1212 ourstatus->value.sig = GDB_SIGNAL_INT;
1ef980b9
SC
1213 break;
1214 case EXCEPTION_SINGLE_STEP:
7393af7c 1215 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_SINGLE_STEP");
a493e3e2 1216 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1ef980b9 1217 break;
8227c82d 1218 case EXCEPTION_ILLEGAL_INSTRUCTION:
7393af7c 1219 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ILLEGAL_INSTRUCTION");
a493e3e2 1220 ourstatus->value.sig = GDB_SIGNAL_ILL;
7393af7c
PM
1221 break;
1222 case EXCEPTION_PRIV_INSTRUCTION:
1223 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_PRIV_INSTRUCTION");
a493e3e2 1224 ourstatus->value.sig = GDB_SIGNAL_ILL;
7393af7c
PM
1225 break;
1226 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1227 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_NONCONTINUABLE_EXCEPTION");
a493e3e2 1228 ourstatus->value.sig = GDB_SIGNAL_ILL;
8227c82d 1229 break;
1ef980b9 1230 default:
581e13c1 1231 /* Treat unhandled first chance exceptions specially. */
02e423b9 1232 if (current_event.u.Exception.dwFirstChance)
a244bdca 1233 return -1;
d50a0ce2
CV
1234 printf_unfiltered ("gdb: unknown target exception 0x%08x at %s\n",
1235 (unsigned) current_event.u.Exception.ExceptionRecord.ExceptionCode,
a74ce742
PM
1236 host_address_to_string (
1237 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
a493e3e2 1238 ourstatus->value.sig = GDB_SIGNAL_UNKNOWN;
1ef980b9 1239 break;
24e60978 1240 }
24e60978 1241 exception_count++;
7393af7c 1242 last_sig = ourstatus->value.sig;
36339ecd 1243 return 1;
24e60978
SC
1244}
1245
3cee93ac 1246/* Resume all artificially suspended threads if we are continuing
581e13c1 1247 execution. */
3cee93ac 1248static BOOL
dc05df57 1249windows_continue (DWORD continue_status, int id)
3cee93ac
CF
1250{
1251 int i;
1252 thread_info *th;
1253 BOOL res;
1254
d50a0ce2
CV
1255 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%d, ctid=%x, %s);\n",
1256 (unsigned) current_event.dwProcessId,
1257 (unsigned) current_event.dwThreadId,
dfe7f3ac 1258 continue_status == DBG_CONTINUE ?
7393af7c 1259 "DBG_CONTINUE" : "DBG_EXCEPTION_NOT_HANDLED"));
6537bb24
PA
1260
1261 for (th = &thread_head; (th = th->next) != NULL;)
1262 if ((id == -1 || id == (int) th->id)
1263 && th->suspended)
1264 {
1265 if (debug_registers_changed)
1266 {
1267 th->context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1268 th->context.Dr0 = dr[0];
1269 th->context.Dr1 = dr[1];
1270 th->context.Dr2 = dr[2];
1271 th->context.Dr3 = dr[3];
1272 th->context.Dr6 = DR6_CLEAR_VALUE;
1273 th->context.Dr7 = dr[7];
1274 }
1275 if (th->context.ContextFlags)
1276 {
1277 CHECK (SetThreadContext (th->h, &th->context));
1278 th->context.ContextFlags = 0;
1279 }
1280 if (th->suspended > 0)
1281 (void) ResumeThread (th->h);
1282 th->suspended = 0;
1283 }
1284
0714f9bf
SS
1285 res = ContinueDebugEvent (current_event.dwProcessId,
1286 current_event.dwThreadId,
1287 continue_status);
3cee93ac 1288
fa4ba8da 1289 debug_registers_changed = 0;
3cee93ac
CF
1290 return res;
1291}
1292
d6dc8049
CF
1293/* Called in pathological case where Windows fails to send a
1294 CREATE_PROCESS_DEBUG_EVENT after an attach. */
3ee6f623 1295static DWORD
5439edaa 1296fake_create_process (void)
3ade5333
CF
1297{
1298 current_process_handle = OpenProcess (PROCESS_ALL_ACCESS, FALSE,
1299 current_event.dwProcessId);
bf25528d
CF
1300 if (current_process_handle != NULL)
1301 open_process_used = 1;
1302 else
1303 {
d50a0ce2
CV
1304 error (_("OpenProcess call failed, GetLastError = %u"),
1305 (unsigned) GetLastError ());
bf25528d
CF
1306 /* We can not debug anything in that case. */
1307 }
3ade5333 1308 main_thread_id = current_event.dwThreadId;
711e434b
PM
1309 current_thread = windows_add_thread (
1310 ptid_build (current_event.dwProcessId, 0,
1311 current_event.dwThreadId),
1312 current_event.u.CreateThread.hThread,
1313 current_event.u.CreateThread.lpThreadLocalBase);
3ade5333
CF
1314 return main_thread_id;
1315}
1316
a244bdca 1317static void
28439f5e 1318windows_resume (struct target_ops *ops,
2ea28649 1319 ptid_t ptid, int step, enum gdb_signal sig)
a244bdca
CF
1320{
1321 thread_info *th;
1322 DWORD continue_status = DBG_CONTINUE;
1323
2dc38344
PA
1324 /* A specific PTID means `step only this thread id'. */
1325 int resume_all = ptid_equal (ptid, minus_one_ptid);
1326
1327 /* If we're continuing all threads, it's the current inferior that
1328 should be handled specially. */
1329 if (resume_all)
1330 ptid = inferior_ptid;
a244bdca 1331
a493e3e2 1332 if (sig != GDB_SIGNAL_0)
a244bdca
CF
1333 {
1334 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
1335 {
1336 DEBUG_EXCEPT(("Cannot continue with signal %d here.\n",sig));
1337 }
1338 else if (sig == last_sig)
1339 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1340 else
1341#if 0
1342/* This code does not seem to work, because
1343 the kernel does probably not consider changes in the ExceptionRecord
1344 structure when passing the exception to the inferior.
1345 Note that this seems possible in the exception handler itself. */
1346 {
1347 int i;
1348 for (i = 0; xlate[i].them != -1; i++)
1349 if (xlate[i].us == sig)
1350 {
581e13c1
MS
1351 current_event.u.Exception.ExceptionRecord.ExceptionCode
1352 = xlate[i].them;
a244bdca
CF
1353 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1354 break;
1355 }
1356 if (continue_status == DBG_CONTINUE)
1357 {
1358 DEBUG_EXCEPT(("Cannot continue with signal %d.\n",sig));
1359 }
1360 }
1361#endif
1362 DEBUG_EXCEPT(("Can only continue with recieved signal %d.\n",
1363 last_sig));
1364 }
1365
a493e3e2 1366 last_sig = GDB_SIGNAL_0;
a244bdca 1367
dc05df57 1368 DEBUG_EXEC (("gdb: windows_resume (pid=%d, tid=%ld, step=%d, sig=%d);\n",
2dc38344 1369 ptid_get_pid (ptid), ptid_get_tid (ptid), step, sig));
a244bdca 1370
581e13c1 1371 /* Get context for currently selected thread. */
2dc38344 1372 th = thread_rec (ptid_get_tid (inferior_ptid), FALSE);
a244bdca
CF
1373 if (th)
1374 {
1375 if (step)
1376 {
581e13c1 1377 /* Single step by setting t bit. */
a97b0ac8
UW
1378 struct regcache *regcache = get_current_regcache ();
1379 struct gdbarch *gdbarch = get_regcache_arch (regcache);
1380 windows_fetch_inferior_registers (ops, regcache,
1381 gdbarch_ps_regnum (gdbarch));
a244bdca
CF
1382 th->context.EFlags |= FLAG_TRACE_BIT;
1383 }
1384
1385 if (th->context.ContextFlags)
1386 {
1387 if (debug_registers_changed)
1388 {
1389 th->context.Dr0 = dr[0];
1390 th->context.Dr1 = dr[1];
1391 th->context.Dr2 = dr[2];
1392 th->context.Dr3 = dr[3];
6537bb24 1393 th->context.Dr6 = DR6_CLEAR_VALUE;
a244bdca
CF
1394 th->context.Dr7 = dr[7];
1395 }
1396 CHECK (SetThreadContext (th->h, &th->context));
1397 th->context.ContextFlags = 0;
1398 }
1399 }
1400
1401 /* Allow continuing with the same signal that interrupted us.
581e13c1 1402 Otherwise complain. */
a244bdca 1403
2dc38344 1404 if (resume_all)
dc05df57 1405 windows_continue (continue_status, -1);
2dc38344 1406 else
dc05df57 1407 windows_continue (continue_status, ptid_get_tid (ptid));
a244bdca
CF
1408}
1409
695de547
CF
1410/* Ctrl-C handler used when the inferior is not run in the same console. The
1411 handler is in charge of interrupting the inferior using DebugBreakProcess.
1412 Note that this function is not available prior to Windows XP. In this case
1413 we emit a warning. */
d603d4b3 1414static BOOL WINAPI
695de547
CF
1415ctrl_c_handler (DWORD event_type)
1416{
1417 const int attach_flag = current_inferior ()->attach_flag;
1418
bb0613a5
PM
1419 /* Only handle Ctrl-C and Ctrl-Break events. Ignore others. */
1420 if (event_type != CTRL_C_EVENT && event_type != CTRL_BREAK_EVENT)
695de547
CF
1421 return FALSE;
1422
1423 /* If the inferior and the debugger share the same console, do nothing as
1424 the inferior has also received the Ctrl-C event. */
1425 if (!new_console && !attach_flag)
1426 return TRUE;
1427
1428 if (!DebugBreakProcess (current_process_handle))
581e13c1
MS
1429 warning (_("Could not interrupt program. "
1430 "Press Ctrl-c in the program console."));
695de547
CF
1431
1432 /* Return true to tell that Ctrl-C has been handled. */
1433 return TRUE;
1434}
1435
8a892701 1436/* Get the next event from the child. Return 1 if the event requires
695de547 1437 handling by WFI (or whatever). */
1e37c281 1438static int
28439f5e
PA
1439get_windows_debug_event (struct target_ops *ops,
1440 int pid, struct target_waitstatus *ourstatus)
1e37c281
JM
1441{
1442 BOOL debug_event;
8a892701 1443 DWORD continue_status, event_code;
87a45c96 1444 thread_info *th;
8a892701 1445 static thread_info dummy_thread_info;
450005e7 1446 int retval = 0;
1e37c281 1447
a493e3e2 1448 last_sig = GDB_SIGNAL_0;
9d3789f7 1449
8a892701 1450 if (!(debug_event = WaitForDebugEvent (&current_event, 1000)))
29fe111d 1451 goto out;
1e37c281
JM
1452
1453 event_count++;
1454 continue_status = DBG_CONTINUE;
1e37c281 1455
8a892701 1456 event_code = current_event.dwDebugEventCode;
450005e7 1457 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
87a45c96 1458 th = NULL;
a244bdca 1459 have_saved_context = 0;
8a892701
CF
1460
1461 switch (event_code)
1e37c281
JM
1462 {
1463 case CREATE_THREAD_DEBUG_EVENT:
d50a0ce2 1464 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1465 (unsigned) current_event.dwProcessId,
1466 (unsigned) current_event.dwThreadId,
1467 "CREATE_THREAD_DEBUG_EVENT"));
dfe7f3ac 1468 if (saw_create != 1)
3ade5333 1469 {
181e7f93
PA
1470 struct inferior *inf;
1471 inf = find_inferior_pid (current_event.dwProcessId);
1472 if (!saw_create && inf->attach_flag)
3ade5333 1473 {
d6dc8049
CF
1474 /* Kludge around a Windows bug where first event is a create
1475 thread event. Caused when attached process does not have
581e13c1 1476 a main thread. */
3a3e9ee3 1477 retval = fake_create_process ();
181e7f93
PA
1478 if (retval)
1479 saw_create++;
3ade5333
CF
1480 }
1481 break;
1482 }
581e13c1 1483 /* Record the existence of this thread. */
450005e7 1484 retval = current_event.dwThreadId;
dc05df57 1485 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1486 current_event.dwThreadId),
711e434b
PM
1487 current_event.u.CreateThread.hThread,
1488 current_event.u.CreateThread.lpThreadLocalBase);
1489
1e37c281
JM
1490 break;
1491
1492 case EXIT_THREAD_DEBUG_EVENT:
d50a0ce2 1493 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1494 (unsigned) current_event.dwProcessId,
1495 (unsigned) current_event.dwThreadId,
1496 "EXIT_THREAD_DEBUG_EVENT"));
b3c613f2 1497
87a45c96
CF
1498 if (current_event.dwThreadId != main_thread_id)
1499 {
dc05df57 1500 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1501 current_event.dwThreadId));
87a45c96
CF
1502 th = &dummy_thread_info;
1503 }
1e37c281
JM
1504 break;
1505
1506 case CREATE_PROCESS_DEBUG_EVENT:
d50a0ce2 1507 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1508 (unsigned) current_event.dwProcessId,
1509 (unsigned) current_event.dwThreadId,
1510 "CREATE_PROCESS_DEBUG_EVENT"));
700b351b 1511 CloseHandle (current_event.u.CreateProcessInfo.hFile);
dfe7f3ac 1512 if (++saw_create != 1)
bf25528d 1513 break;
1e37c281 1514
dfe7f3ac 1515 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
87a45c96 1516 if (main_thread_id)
695de547
CF
1517 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
1518 main_thread_id));
9d3789f7 1519 main_thread_id = current_event.dwThreadId;
581e13c1 1520 /* Add the main thread. */
dc05df57 1521 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
695de547 1522 current_event.dwThreadId),
711e434b
PM
1523 current_event.u.CreateProcessInfo.hThread,
1524 current_event.u.CreateProcessInfo.lpThreadLocalBase);
3a3e9ee3 1525 retval = current_event.dwThreadId;
1e37c281
JM
1526 break;
1527
1528 case EXIT_PROCESS_DEBUG_EVENT:
d50a0ce2 1529 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1530 (unsigned) current_event.dwProcessId,
1531 (unsigned) current_event.dwThreadId,
1532 "EXIT_PROCESS_DEBUG_EVENT"));
16d905e2
CF
1533 if (!windows_initialization_done)
1534 {
1535 target_terminal_ours ();
1536 target_mourn_inferior ();
1537 error (_("During startup program exited with code 0x%x."),
1538 (unsigned int) current_event.u.ExitProcess.dwExitCode);
1539 }
1540 else if (saw_create == 1)
1541 {
1542 ourstatus->kind = TARGET_WAITKIND_EXITED;
1543 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
1544 retval = main_thread_id;
1545 }
8a892701 1546 break;
1e37c281
JM
1547
1548 case LOAD_DLL_DEBUG_EVENT:
d50a0ce2 1549 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1550 (unsigned) current_event.dwProcessId,
1551 (unsigned) current_event.dwThreadId,
1552 "LOAD_DLL_DEBUG_EVENT"));
700b351b 1553 CloseHandle (current_event.u.LoadDll.hFile);
dfe7f3ac
CF
1554 if (saw_create != 1)
1555 break;
8a892701 1556 catch_errors (handle_load_dll, NULL, (char *) "", RETURN_MASK_ALL);
450005e7
CF
1557 ourstatus->kind = TARGET_WAITKIND_LOADED;
1558 ourstatus->value.integer = 0;
9d3789f7 1559 retval = main_thread_id;
1e37c281
JM
1560 break;
1561
1562 case UNLOAD_DLL_DEBUG_EVENT:
d50a0ce2 1563 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1564 (unsigned) current_event.dwProcessId,
1565 (unsigned) current_event.dwThreadId,
1566 "UNLOAD_DLL_DEBUG_EVENT"));
dfe7f3ac
CF
1567 if (saw_create != 1)
1568 break;
d3ff4a77 1569 catch_errors (handle_unload_dll, NULL, (char *) "", RETURN_MASK_ALL);
de1b3c3d
PA
1570 ourstatus->kind = TARGET_WAITKIND_LOADED;
1571 ourstatus->value.integer = 0;
1572 retval = main_thread_id;
d3ff4a77 1573 break;
1e37c281
JM
1574
1575 case EXCEPTION_DEBUG_EVENT:
d50a0ce2 1576 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1577 (unsigned) current_event.dwProcessId,
1578 (unsigned) current_event.dwThreadId,
1579 "EXCEPTION_DEBUG_EVENT"));
dfe7f3ac
CF
1580 if (saw_create != 1)
1581 break;
a244bdca
CF
1582 switch (handle_exception (ourstatus))
1583 {
1584 case 0:
1585 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1586 break;
1587 case 1:
1588 retval = current_event.dwThreadId;
1589 break;
1590 case -1:
1591 last_sig = 1;
1592 continue_status = -1;
1593 break;
1594 }
1e37c281
JM
1595 break;
1596
581e13c1 1597 case OUTPUT_DEBUG_STRING_EVENT: /* Message from the kernel. */
d50a0ce2 1598 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1599 (unsigned) current_event.dwProcessId,
1600 (unsigned) current_event.dwThreadId,
1601 "OUTPUT_DEBUG_STRING_EVENT"));
dfe7f3ac
CF
1602 if (saw_create != 1)
1603 break;
a244bdca 1604 retval = handle_output_debug_string (ourstatus);
1e37c281 1605 break;
9d3789f7 1606
1e37c281 1607 default:
dfe7f3ac
CF
1608 if (saw_create != 1)
1609 break;
d50a0ce2
CV
1610 printf_unfiltered ("gdb: kernel event for pid=%u tid=%x\n",
1611 (unsigned) current_event.dwProcessId,
1612 (unsigned) current_event.dwThreadId);
1613 printf_unfiltered (" unknown event code %u\n",
1614 (unsigned) current_event.dwDebugEventCode);
1e37c281
JM
1615 break;
1616 }
1617
dfe7f3ac 1618 if (!retval || saw_create != 1)
a244bdca
CF
1619 {
1620 if (continue_status == -1)
02529b48 1621 windows_resume (ops, minus_one_ptid, 0, 1);
a244bdca 1622 else
dc05df57 1623 CHECK (windows_continue (continue_status, -1));
a244bdca 1624 }
450005e7 1625 else
9d3789f7 1626 {
2dc38344
PA
1627 inferior_ptid = ptid_build (current_event.dwProcessId, 0,
1628 retval);
3ade5333 1629 current_thread = th ?: thread_rec (current_event.dwThreadId, TRUE);
9d3789f7 1630 }
1e37c281
JM
1631
1632out:
450005e7 1633 return retval;
1e37c281
JM
1634}
1635
2dc38344 1636/* Wait for interesting events to occur in the target process. */
39f77062 1637static ptid_t
117de6a9 1638windows_wait (struct target_ops *ops,
47608cb1 1639 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
24e60978 1640{
2dc38344 1641 int pid = -1;
39f77062 1642
c44537cf
CV
1643 target_terminal_ours ();
1644
24e60978
SC
1645 /* We loop when we get a non-standard exception rather than return
1646 with a SPURIOUS because resume can try and step or modify things,
3cee93ac 1647 which needs a current_thread->h. But some of these exceptions mark
24e60978 1648 the birth or death of threads, which mean that the current thread
581e13c1 1649 isn't necessarily what you think it is. */
24e60978
SC
1650
1651 while (1)
450005e7 1652 {
c57918b2 1653 int retval;
2b008701 1654
695de547
CF
1655 /* If the user presses Ctrl-c while the debugger is waiting
1656 for an event, he expects the debugger to interrupt his program
1657 and to get the prompt back. There are two possible situations:
1658
1659 - The debugger and the program do not share the console, in
1660 which case the Ctrl-c event only reached the debugger.
1661 In that case, the ctrl_c handler will take care of interrupting
581e13c1
MS
1662 the inferior. Note that this case is working starting with
1663 Windows XP. For Windows 2000, Ctrl-C should be pressed in the
695de547
CF
1664 inferior console.
1665
1666 - The debugger and the program share the same console, in which
1667 case both debugger and inferior will receive the Ctrl-c event.
1668 In that case the ctrl_c handler will ignore the event, as the
1669 Ctrl-c event generated inside the inferior will trigger the
1670 expected debug event.
1671
1672 FIXME: brobecker/2008-05-20: If the inferior receives the
1673 signal first and the delay until GDB receives that signal
1674 is sufficiently long, GDB can sometimes receive the SIGINT
1675 after we have unblocked the CTRL+C handler. This would
1676 lead to the debugger stopping prematurely while handling
1677 the new-thread event that comes with the handling of the SIGINT
1678 inside the inferior, and then stop again immediately when
1679 the user tries to resume the execution in the inferior.
1680 This is a classic race that we should try to fix one day. */
1681 SetConsoleCtrlHandler (&ctrl_c_handler, TRUE);
28439f5e 1682 retval = get_windows_debug_event (ops, pid, ourstatus);
695de547 1683 SetConsoleCtrlHandler (&ctrl_c_handler, FALSE);
c57918b2 1684
450005e7 1685 if (retval)
2dc38344 1686 return ptid_build (current_event.dwProcessId, 0, retval);
450005e7
CF
1687 else
1688 {
1689 int detach = 0;
3cee93ac 1690
98bbd631
AC
1691 if (deprecated_ui_loop_hook != NULL)
1692 detach = deprecated_ui_loop_hook (0);
0714f9bf 1693
450005e7 1694 if (detach)
7d85a9c0 1695 windows_kill_inferior (ops);
450005e7
CF
1696 }
1697 }
24e60978
SC
1698}
1699
9d3789f7 1700static void
dc05df57 1701do_initial_windows_stuff (struct target_ops *ops, DWORD pid, int attaching)
9d3789f7
CF
1702{
1703 extern int stop_after_trap;
fa4ba8da 1704 int i;
d6b48e9c 1705 struct inferior *inf;
2020b7ab 1706 struct thread_info *tp;
9d3789f7 1707
a493e3e2 1708 last_sig = GDB_SIGNAL_0;
9d3789f7
CF
1709 event_count = 0;
1710 exception_count = 0;
bf25528d 1711 open_process_used = 0;
fa4ba8da 1712 debug_registers_changed = 0;
dfe7f3ac 1713 debug_registers_used = 0;
fa4ba8da
PM
1714 for (i = 0; i < sizeof (dr) / sizeof (dr[0]); i++)
1715 dr[i] = 0;
10325bc5 1716#ifdef __CYGWIN__
de1b3c3d 1717 cygwin_load_start = cygwin_load_end = 0;
10325bc5 1718#endif
9d3789f7
CF
1719 current_event.dwProcessId = pid;
1720 memset (&current_event, 0, sizeof (current_event));
0795be10 1721 push_target (ops);
cb851954 1722 disable_breakpoints_in_shlibs ();
dc05df57 1723 windows_clear_solib ();
9d3789f7
CF
1724 clear_proceed_status ();
1725 init_wait_for_inferior ();
1726
6c95b8df
PA
1727 inf = current_inferior ();
1728 inferior_appeared (inf, pid);
181e7f93 1729 inf->attach_flag = attaching;
7f9f62ba 1730
9f9d052e
PM
1731 /* Make the new process the current inferior, so terminal handling
1732 can rely on it. When attaching, we don't know about any thread
1733 id here, but that's OK --- nothing should be referencing the
dc05df57 1734 current thread until we report an event out of windows_wait. */
9f9d052e
PM
1735 inferior_ptid = pid_to_ptid (pid);
1736
c44537cf 1737 terminal_init_inferior_with_pgrp (pid);
9d3789f7
CF
1738 target_terminal_inferior ();
1739
16d905e2 1740 windows_initialization_done = 0;
16c381f0 1741 inf->control.stop_soon = STOP_QUIETLY;
9d3789f7
CF
1742 while (1)
1743 {
1744 stop_after_trap = 1;
e4c8541f 1745 wait_for_inferior ();
2020b7ab 1746 tp = inferior_thread ();
a493e3e2 1747 if (tp->suspend.stop_signal != GDB_SIGNAL_TRAP)
16c381f0 1748 resume (0, tp->suspend.stop_signal);
9d3789f7
CF
1749 else
1750 break;
1751 }
eff8332b 1752
16d905e2 1753 windows_initialization_done = 1;
16c381f0 1754 inf->control.stop_soon = NO_STOP_QUIETLY;
9d3789f7
CF
1755 stop_after_trap = 0;
1756 return;
1757}
1758
616a9dc4
CV
1759/* Try to set or remove a user privilege to the current process. Return -1
1760 if that fails, the previous setting of that privilege otherwise.
1761
1762 This code is copied from the Cygwin source code and rearranged to allow
1763 dynamically loading of the needed symbols from advapi32 which is only
581e13c1 1764 available on NT/2K/XP. */
616a9dc4
CV
1765static int
1766set_process_privilege (const char *privilege, BOOL enable)
1767{
616a9dc4
CV
1768 HANDLE token_hdl = NULL;
1769 LUID restore_priv;
1770 TOKEN_PRIVILEGES new_priv, orig_priv;
1771 int ret = -1;
1772 DWORD size;
1773
616a9dc4
CV
1774 if (!OpenProcessToken (GetCurrentProcess (),
1775 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
1776 &token_hdl))
1777 goto out;
1778
418c6cb3 1779 if (!LookupPrivilegeValueA (NULL, privilege, &restore_priv))
616a9dc4
CV
1780 goto out;
1781
1782 new_priv.PrivilegeCount = 1;
1783 new_priv.Privileges[0].Luid = restore_priv;
1784 new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0;
1785
1786 if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv,
295732ea 1787 sizeof orig_priv, &orig_priv, &size))
616a9dc4
CV
1788 goto out;
1789#if 0
1790 /* Disabled, otherwise every `attach' in an unprivileged user session
1791 would raise the "Failed to get SE_DEBUG_NAME privilege" warning in
581e13c1 1792 windows_attach(). */
616a9dc4 1793 /* AdjustTokenPrivileges returns TRUE even if the privilege could not
581e13c1 1794 be enabled. GetLastError () returns an correct error code, though. */
616a9dc4
CV
1795 if (enable && GetLastError () == ERROR_NOT_ALL_ASSIGNED)
1796 goto out;
1797#endif
1798
1799 ret = orig_priv.Privileges[0].Attributes == SE_PRIVILEGE_ENABLED ? 1 : 0;
1800
1801out:
1802 if (token_hdl)
1803 CloseHandle (token_hdl);
1804
1805 return ret;
1806}
1807
02cc9f49 1808/* Attach to process PID, then initialize for debugging it. */
24e60978 1809static void
dc05df57 1810windows_attach (struct target_ops *ops, char *args, int from_tty)
24e60978
SC
1811{
1812 BOOL ok;
559e75c0 1813 DWORD pid;
24e60978 1814
74164c56 1815 pid = parse_pid_to_attach (args);
24e60978 1816
616a9dc4
CV
1817 if (set_process_privilege (SE_DEBUG_NAME, TRUE) < 0)
1818 {
1819 printf_unfiltered ("Warning: Failed to get SE_DEBUG_NAME privilege\n");
581e13c1
MS
1820 printf_unfiltered ("This can cause attach to "
1821 "fail on Windows NT/2K/XP\n");
616a9dc4
CV
1822 }
1823
dc05df57 1824 windows_init_thread_list ();
9d3789f7 1825 ok = DebugActiveProcess (pid);
91a175b3 1826 saw_create = 0;
24e60978 1827
10325bc5 1828#ifdef __CYGWIN__
24e60978 1829 if (!ok)
baa93fa6 1830 {
581e13c1 1831 /* Try fall back to Cygwin pid. */
baa93fa6
CF
1832 pid = cygwin_internal (CW_CYGWIN_PID_TO_WINPID, pid);
1833
1834 if (pid > 0)
1835 ok = DebugActiveProcess (pid);
10325bc5
PA
1836 }
1837#endif
baa93fa6 1838
10325bc5
PA
1839 if (!ok)
1840 error (_("Can't attach to process."));
24e60978 1841
2b008701 1842 DebugSetProcessKillOnExit (FALSE);
3ade5333 1843
24e60978
SC
1844 if (from_tty)
1845 {
1846 char *exec_file = (char *) get_exec_file (0);
1847
1848 if (exec_file)
1849 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
39f77062 1850 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1851 else
1852 printf_unfiltered ("Attaching to %s\n",
39f77062 1853 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1854
1855 gdb_flush (gdb_stdout);
1856 }
1857
dc05df57 1858 do_initial_windows_stuff (ops, pid, 1);
9d3789f7 1859 target_terminal_ours ();
24e60978
SC
1860}
1861
24e60978 1862static void
dc05df57 1863windows_detach (struct target_ops *ops, char *args, int from_tty)
24e60978 1864{
02cc9f49
CV
1865 int detached = 1;
1866
2b008701 1867 ptid_t ptid = {-1};
a493e3e2 1868 windows_resume (ops, ptid, 0, GDB_SIGNAL_0);
96998ce7 1869
2b008701
CF
1870 if (!DebugActiveProcessStop (current_event.dwProcessId))
1871 {
d50a0ce2
CV
1872 error (_("Can't detach process %u (error %u)"),
1873 (unsigned) current_event.dwProcessId, (unsigned) GetLastError ());
2b008701 1874 detached = 0;
02cc9f49 1875 }
2b008701
CF
1876 DebugSetProcessKillOnExit (FALSE);
1877
02cc9f49 1878 if (detached && from_tty)
24e60978
SC
1879 {
1880 char *exec_file = get_exec_file (0);
1881 if (exec_file == 0)
1882 exec_file = "";
d50a0ce2
CV
1883 printf_unfiltered ("Detaching from program: %s, Pid %u\n", exec_file,
1884 (unsigned) current_event.dwProcessId);
24e60978
SC
1885 gdb_flush (gdb_stdout);
1886 }
7f9f62ba 1887
26cb8b7c 1888 i386_cleanup_dregs ();
39f77062 1889 inferior_ptid = null_ptid;
7f9f62ba
PA
1890 detach_inferior (current_event.dwProcessId);
1891
0795be10 1892 unpush_target (ops);
24e60978
SC
1893}
1894
3ee6f623 1895static char *
dc05df57 1896windows_pid_to_exec_file (int pid)
47216e51 1897{
b3c613f2 1898 static char path[__PMAX];
10325bc5 1899#ifdef __CYGWIN__
581e13c1 1900 /* Try to find exe name as symlink target of /proc/<pid>/exe. */
33605d39
CF
1901 int nchars;
1902 char procexe[sizeof ("/proc/4294967295/exe")];
08850b56
PM
1903
1904 xsnprintf (procexe, sizeof (procexe), "/proc/%u/exe", pid);
33605d39
CF
1905 nchars = readlink (procexe, path, sizeof(path));
1906 if (nchars > 0 && nchars < sizeof (path))
47216e51 1907 {
33605d39
CF
1908 path[nchars] = '\0'; /* Got it */
1909 return path;
47216e51 1910 }
10325bc5
PA
1911#endif
1912
33605d39 1913 /* If we get here then either Cygwin is hosed, this isn't a Cygwin version
581e13c1 1914 of gdb, or we're trying to debug a non-Cygwin windows executable. */
33605d39
CF
1915 if (!get_module_name (0, path))
1916 path[0] = '\0';
1917
1918 return path;
47216e51
CV
1919}
1920
24e60978
SC
1921/* Print status information about what we're accessing. */
1922
1923static void
dc05df57 1924windows_files_info (struct target_ops *ignore)
24e60978 1925{
181e7f93
PA
1926 struct inferior *inf = current_inferior ();
1927
24e60978 1928 printf_unfiltered ("\tUsing the running image of %s %s.\n",
181e7f93
PA
1929 inf->attach_flag ? "attached" : "child",
1930 target_pid_to_str (inferior_ptid));
24e60978
SC
1931}
1932
24e60978 1933static void
dc05df57 1934windows_open (char *arg, int from_tty)
24e60978 1935{
8a3fe4f8 1936 error (_("Use the \"run\" command to start a Unix child process."));
24e60978
SC
1937}
1938
cd44747c
PM
1939/* Modify CreateProcess parameters for use of a new separate console.
1940 Parameters are:
1941 *FLAGS: DWORD parameter for general process creation flags.
1942 *SI: STARTUPINFO structure, for which the console window size and
1943 console buffer size is filled in if GDB is running in a console.
1944 to create the new console.
1945 The size of the used font is not available on all versions of
1946 Windows OS. Furthermore, the current font might not be the default
1947 font, but this is still better than before.
1948 If the windows and buffer sizes are computed,
1949 SI->DWFLAGS is changed so that this information is used
1950 by CreateProcess function. */
1951
1952static void
1953windows_set_console_info (STARTUPINFO *si, DWORD *flags)
1954{
1955 HANDLE hconsole = CreateFile ("CONOUT$", GENERIC_READ | GENERIC_WRITE,
1956 FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, 0);
1957
1958 if (hconsole != INVALID_HANDLE_VALUE)
1959 {
1960 CONSOLE_SCREEN_BUFFER_INFO sbinfo;
1961 COORD font_size;
1962 CONSOLE_FONT_INFO cfi;
1963
1964 GetCurrentConsoleFont (hconsole, FALSE, &cfi);
1965 font_size = GetConsoleFontSize (hconsole, cfi.nFont);
1966 GetConsoleScreenBufferInfo(hconsole, &sbinfo);
1967 si->dwXSize = sbinfo.srWindow.Right - sbinfo.srWindow.Left + 1;
1968 si->dwYSize = sbinfo.srWindow.Bottom - sbinfo.srWindow.Top + 1;
1969 if (font_size.X)
1970 si->dwXSize *= font_size.X;
1971 else
1972 si->dwXSize *= 8;
1973 if (font_size.Y)
1974 si->dwYSize *= font_size.Y;
1975 else
1976 si->dwYSize *= 12;
1977 si->dwXCountChars = sbinfo.dwSize.X;
1978 si->dwYCountChars = sbinfo.dwSize.Y;
1979 si->dwFlags |= STARTF_USESIZE | STARTF_USECOUNTCHARS;
1980 }
1981 *flags |= CREATE_NEW_CONSOLE;
1982}
1983
c93dbcba
EZ
1984#ifndef __CYGWIN__
1985/* Function called by qsort to sort environment strings. */
1986
1987static int
1988envvar_cmp (const void *a, const void *b)
1989{
1990 const char **p = (const char **) a;
1991 const char **q = (const char **) b;
1992 return strcasecmp (*p, *q);
1993}
1994#endif
1995
b7ff339d
CV
1996#ifdef __CYGWIN__
1997static void
1998clear_win32_environment (char **env)
1999{
2000 int i;
2001 size_t len;
2002 wchar_t *copy = NULL, *equalpos;
2003
2004 for (i = 0; env[i] && *env[i]; i++)
2005 {
2006 len = mbstowcs (NULL, env[i], 0) + 1;
2007 copy = (wchar_t *) xrealloc (copy, len * sizeof (wchar_t));
2008 mbstowcs (copy, env[i], len);
2009 equalpos = wcschr (copy, L'=');
2010 if (equalpos)
2011 *equalpos = L'\0';
2012 SetEnvironmentVariableW (copy, NULL);
2013 }
2014 xfree (copy);
2015}
2016#endif
2017
dc05df57 2018/* Start an inferior windows child process and sets inferior_ptid to its pid.
24e60978
SC
2019 EXEC_FILE is the file to run.
2020 ALLARGS is a string containing the arguments to the program.
2021 ENV is the environment vector to pass. Errors reported with error(). */
2022
24e60978 2023static void
dc05df57 2024windows_create_inferior (struct target_ops *ops, char *exec_file,
136d6dae 2025 char *allargs, char **in_env, int from_tty)
24e60978 2026{
b3c613f2 2027 STARTUPINFO si;
41b4aadc 2028#ifdef __CYGWIN__
b3c613f2
CF
2029 cygwin_buf_t real_path[__PMAX];
2030 cygwin_buf_t shell[__PMAX]; /* Path to shell */
d0d0ab16 2031 const char *sh;
b3c613f2
CF
2032 cygwin_buf_t *toexec;
2033 cygwin_buf_t *cygallargs;
2034 cygwin_buf_t *args;
b7ff339d
CV
2035 char **old_env = NULL;
2036 PWCHAR w32_env;
d0d0ab16 2037 size_t len;
2becadee
CF
2038 int tty;
2039 int ostdin, ostdout, ostderr;
41b4aadc 2040#else
b3c613f2
CF
2041 char real_path[__PMAX];
2042 char shell[__PMAX]; /* Path to shell */
d0d0ab16
CV
2043 char *toexec;
2044 char *args;
8f205f9c 2045 size_t args_len;
41b4aadc 2046 HANDLE tty;
c93dbcba
EZ
2047 char *w32env;
2048 char *temp;
2049 size_t envlen;
2050 int i;
2051 size_t envsize;
2052 char **env;
41b4aadc 2053#endif
d0d0ab16
CV
2054 PROCESS_INFORMATION pi;
2055 BOOL ret;
2056 DWORD flags = 0;
3cb3b8df 2057 const char *inferior_io_terminal = get_inferior_io_terminal ();
24e60978
SC
2058
2059 if (!exec_file)
8a3fe4f8 2060 error (_("No executable specified, use `target exec'."));
24e60978
SC
2061
2062 memset (&si, 0, sizeof (si));
2063 si.cb = sizeof (si);
2064
d0d0ab16
CV
2065 if (new_group)
2066 flags |= CREATE_NEW_PROCESS_GROUP;
2067
2068 if (new_console)
cd44747c 2069 windows_set_console_info (&si, &flags);
d0d0ab16 2070
10325bc5 2071#ifdef __CYGWIN__
349b409f 2072 if (!useshell)
dfe7f3ac 2073 {
d0d0ab16
CV
2074 flags |= DEBUG_ONLY_THIS_PROCESS;
2075 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, exec_file, real_path,
b3c613f2 2076 __PMAX * sizeof (cygwin_buf_t)) < 0)
d0d0ab16 2077 error (_("Error starting executable: %d"), errno);
dfe7f3ac 2078 toexec = real_path;
b3c613f2 2079#ifdef __USEWIDE
d0d0ab16
CV
2080 len = mbstowcs (NULL, allargs, 0) + 1;
2081 if (len == (size_t) -1)
2082 error (_("Error starting executable: %d"), errno);
2083 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2084 mbstowcs (cygallargs, allargs, len);
60c5c021
CF
2085#else
2086 cygallargs = allargs;
b3c613f2 2087#endif
dfe7f3ac
CF
2088 }
2089 else
2090 {
349b409f
CF
2091 sh = getenv ("SHELL");
2092 if (!sh)
2093 sh = "/bin/sh";
b3c613f2 2094 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, sh, shell, __PMAX) < 0)
d0d0ab16 2095 error (_("Error starting executable via shell: %d"), errno);
b3c613f2 2096#ifdef __USEWIDE
d0d0ab16
CV
2097 len = sizeof (L" -c 'exec '") + mbstowcs (NULL, exec_file, 0)
2098 + mbstowcs (NULL, allargs, 0) + 2;
2099 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2100 swprintf (cygallargs, len, L" -c 'exec %s %s'", exec_file, allargs);
b3c613f2 2101#else
08850b56
PM
2102 len = (sizeof (" -c 'exec '") + strlen (exec_file)
2103 + strlen (allargs) + 2);
2104 cygallargs = (char *) alloca (len);
2105 xsnprintf (cygallargs, len, " -c 'exec %s %s'", exec_file, allargs);
b3c613f2 2106#endif
dfe7f3ac 2107 toexec = shell;
d0d0ab16 2108 flags |= DEBUG_PROCESS;
dfe7f3ac 2109 }
b3c613f2
CF
2110
2111#ifdef __USEWIDE
2112 args = (cygwin_buf_t *) alloca ((wcslen (toexec) + wcslen (cygallargs) + 2)
2113 * sizeof (wchar_t));
d0d0ab16
CV
2114 wcscpy (args, toexec);
2115 wcscat (args, L" ");
2116 wcscat (args, cygallargs);
b3c613f2
CF
2117#else
2118 args = (cygwin_buf_t *) alloca (strlen (toexec) + strlen (cygallargs) + 2);
2119 strcpy (args, toexec);
2120 strcat (args, " ");
2121 strcat (args, cygallargs);
2122#endif
2123
b7ff339d
CV
2124#ifdef CW_CVT_ENV_TO_WINENV
2125 /* First try to create a direct Win32 copy of the POSIX environment. */
2126 w32_env = (PWCHAR) cygwin_internal (CW_CVT_ENV_TO_WINENV, in_env);
2127 if (w32_env != (PWCHAR) -1)
2128 flags |= CREATE_UNICODE_ENVIRONMENT;
2129 else
2130 /* If that fails, fall back to old method tweaking GDB's environment. */
2131#endif
2132 {
2133 /* Reset all Win32 environment variables to avoid leftover on next run. */
2134 clear_win32_environment (environ);
2135 /* Prepare the environment vars for CreateProcess. */
2136 old_env = environ;
2137 environ = in_env;
2138 cygwin_internal (CW_SYNC_WINENV);
2139 w32_env = NULL;
2140 }
1750a5ef 2141
2becadee
CF
2142 if (!inferior_io_terminal)
2143 tty = ostdin = ostdout = ostderr = -1;
2144 else
2145 {
2146 tty = open (inferior_io_terminal, O_RDWR | O_NOCTTY);
2147 if (tty < 0)
2148 {
2149 print_sys_errmsg (inferior_io_terminal, errno);
2150 ostdin = ostdout = ostderr = -1;
2151 }
2152 else
2153 {
2154 ostdin = dup (0);
2155 ostdout = dup (1);
2156 ostderr = dup (2);
2157 dup2 (tty, 0);
2158 dup2 (tty, 1);
2159 dup2 (tty, 2);
2160 }
2161 }
d0d0ab16
CV
2162
2163 windows_init_thread_list ();
b3c613f2
CF
2164 ret = CreateProcess (0,
2165 args, /* command line */
2166 NULL, /* Security */
2167 NULL, /* thread */
2168 TRUE, /* inherit handles */
2169 flags, /* start flags */
b7ff339d 2170 w32_env, /* environment */
b3c613f2
CF
2171 NULL, /* current directory */
2172 &si,
2173 &pi);
b7ff339d
CV
2174 if (w32_env)
2175 /* Just free the Win32 environment, if it could be created. */
2176 free (w32_env);
2177 else
2178 {
2179 /* Reset all environment variables to avoid leftover on next run. */
2180 clear_win32_environment (in_env);
2181 /* Restore normal GDB environment variables. */
2182 environ = old_env;
2183 cygwin_internal (CW_SYNC_WINENV);
2184 }
2185
d0d0ab16
CV
2186 if (tty >= 0)
2187 {
2188 close (tty);
2189 dup2 (ostdin, 0);
2190 dup2 (ostdout, 1);
2191 dup2 (ostderr, 2);
2192 close (ostdin);
2193 close (ostdout);
2194 close (ostderr);
2195 }
41b4aadc 2196#else
b3c613f2 2197 toexec = exec_file;
8f205f9c
JB
2198 /* Build the command line, a space-separated list of tokens where
2199 the first token is the name of the module to be executed.
2200 To avoid ambiguities introduced by spaces in the module name,
2201 we quote it. */
2202 args_len = strlen (toexec) + 2 /* quotes */ + strlen (allargs) + 2;
2203 args = alloca (args_len);
2204 xsnprintf (args, args_len, "\"%s\" %s", toexec, allargs);
d0d0ab16 2205
d0d0ab16
CV
2206 flags |= DEBUG_ONLY_THIS_PROCESS;
2207
41b4aadc
CF
2208 if (!inferior_io_terminal)
2209 tty = INVALID_HANDLE_VALUE;
2210 else
2211 {
2212 SECURITY_ATTRIBUTES sa;
2213 sa.nLength = sizeof(sa);
2214 sa.lpSecurityDescriptor = 0;
2215 sa.bInheritHandle = TRUE;
2216 tty = CreateFileA (inferior_io_terminal, GENERIC_READ | GENERIC_WRITE,
2217 0, &sa, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
2218 if (tty == INVALID_HANDLE_VALUE)
2219 warning (_("Warning: Failed to open TTY %s, error %#x."),
2220 inferior_io_terminal, (unsigned) GetLastError ());
2221 else
2222 {
2223 si.hStdInput = tty;
2224 si.hStdOutput = tty;
2225 si.hStdError = tty;
2226 si.dwFlags |= STARTF_USESTDHANDLES;
2227 }
2228 }
2becadee 2229
c93dbcba
EZ
2230 /* CreateProcess takes the environment list as a null terminated set of
2231 strings (i.e. two nulls terminate the list). */
2232
2233 /* Get total size for env strings. */
2234 for (envlen = 0, i = 0; in_env[i] && *in_env[i]; i++)
2235 envlen += strlen (in_env[i]) + 1;
2236
2237 envsize = sizeof (in_env[0]) * (i + 1);
2238 env = (char **) alloca (envsize);
2239 memcpy (env, in_env, envsize);
2240 /* Windows programs expect the environment block to be sorted. */
2241 qsort (env, i, sizeof (char *), envvar_cmp);
2242
2243 w32env = alloca (envlen + 1);
2244
2245 /* Copy env strings into new buffer. */
2246 for (temp = w32env, i = 0; env[i] && *env[i]; i++)
2247 {
2248 strcpy (temp, env[i]);
2249 temp += strlen (temp) + 1;
2250 }
2251
2252 /* Final nil string to terminate new env. */
2253 *temp = 0;
2254
dc05df57 2255 windows_init_thread_list ();
d0d0ab16
CV
2256 ret = CreateProcessA (0,
2257 args, /* command line */
2258 NULL, /* Security */
2259 NULL, /* thread */
2260 TRUE, /* inherit handles */
2261 flags, /* start flags */
c93dbcba 2262 w32env, /* environment */
d0d0ab16
CV
2263 NULL, /* current directory */
2264 &si,
2265 &pi);
41b4aadc
CF
2266 if (tty != INVALID_HANDLE_VALUE)
2267 CloseHandle (tty);
10325bc5 2268#endif
2becadee 2269
24e60978 2270 if (!ret)
d50a0ce2 2271 error (_("Error creating process %s, (error %u)."),
8a3fe4f8 2272 exec_file, (unsigned) GetLastError ());
24e60978 2273
c1766e7d
PM
2274 CloseHandle (pi.hThread);
2275 CloseHandle (pi.hProcess);
2276
dfe7f3ac
CF
2277 if (useshell && shell[0] != '\0')
2278 saw_create = -1;
2279 else
2280 saw_create = 0;
2281
dc05df57 2282 do_initial_windows_stuff (ops, pi.dwProcessId, 0);
d3a09475 2283
dc05df57 2284 /* windows_continue (DBG_CONTINUE, -1); */
24e60978
SC
2285}
2286
2287static void
dc05df57 2288windows_mourn_inferior (struct target_ops *ops)
24e60978 2289{
dc05df57 2290 (void) windows_continue (DBG_CONTINUE, -1);
fa4ba8da 2291 i386_cleanup_dregs();
bf25528d
CF
2292 if (open_process_used)
2293 {
2294 CHECK (CloseHandle (current_process_handle));
2295 open_process_used = 0;
2296 }
0795be10 2297 unpush_target (ops);
24e60978
SC
2298 generic_mourn_inferior ();
2299}
2300
24e60978 2301/* Send a SIGINT to the process group. This acts just like the user typed a
581e13c1 2302 ^C on the controlling terminal. */
24e60978 2303
b607efe7 2304static void
dc05df57 2305windows_stop (ptid_t ptid)
24e60978 2306{
1ef980b9 2307 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
1e37c281 2308 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
3a4b77d8 2309 registers_changed (); /* refresh register state */
24e60978
SC
2310}
2311
3ee6f623 2312static int
dc05df57 2313windows_xfer_memory (CORE_ADDR memaddr, gdb_byte *our, int len,
0a65a603
AC
2314 int write, struct mem_attrib *mem,
2315 struct target_ops *target)
24e60978 2316{
5732a500 2317 SIZE_T done = 0;
24e60978
SC
2318 if (write)
2319 {
42f45f1a
KT
2320 DEBUG_MEM (("gdb: write target memory, %d bytes at %s\n",
2321 len, core_addr_to_string (memaddr)));
2b008701 2322 if (!WriteProcessMemory (current_process_handle,
2c647436 2323 (LPVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2324 len, &done))
2325 done = 0;
2b008701 2326 FlushInstructionCache (current_process_handle,
2c647436 2327 (LPCVOID) (uintptr_t) memaddr, len);
24e60978
SC
2328 }
2329 else
2330 {
42f45f1a
KT
2331 DEBUG_MEM (("gdb: read target memory, %d bytes at %s\n",
2332 len, core_addr_to_string (memaddr)));
2b008701 2333 if (!ReadProcessMemory (current_process_handle,
2c647436 2334 (LPCVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2335 len, &done))
2336 done = 0;
24e60978
SC
2337 }
2338 return done;
2339}
2340
3ee6f623 2341static void
7d85a9c0 2342windows_kill_inferior (struct target_ops *ops)
24e60978 2343{
3cee93ac
CF
2344 CHECK (TerminateProcess (current_process_handle, 0));
2345
b5edcb45
ILT
2346 for (;;)
2347 {
dc05df57 2348 if (!windows_continue (DBG_CONTINUE, -1))
b5edcb45 2349 break;
3cee93ac 2350 if (!WaitForDebugEvent (&current_event, INFINITE))
b5edcb45 2351 break;
3cee93ac 2352 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
b5edcb45
ILT
2353 break;
2354 }
2355
581e13c1 2356 target_mourn_inferior (); /* Or just windows_mourn_inferior? */
24e60978
SC
2357}
2358
24e60978 2359static void
dc05df57 2360windows_prepare_to_store (struct regcache *regcache)
24e60978 2361{
581e13c1 2362 /* Do nothing, since we can store individual regs. */
24e60978
SC
2363}
2364
2365static int
dc05df57 2366windows_can_run (void)
24e60978
SC
2367{
2368 return 1;
2369}
2370
2371static void
460014f5 2372windows_close (void)
24e60978 2373{
dc05df57 2374 DEBUG_EVENTS (("gdb: windows_close, inferior_ptid=%d\n",
3bccec63 2375 PIDGET (inferior_ptid)));
24e60978 2376}
1ef980b9 2377
581e13c1 2378/* Convert pid to printable format. */
3ee6f623 2379static char *
117de6a9 2380windows_pid_to_str (struct target_ops *ops, ptid_t ptid)
24e60978 2381{
3ee6f623 2382 static char buf[80];
3ee6f623 2383
2dc38344
PA
2384 if (ptid_get_tid (ptid) != 0)
2385 {
2386 snprintf (buf, sizeof (buf), "Thread %d.0x%lx",
2387 ptid_get_pid (ptid), ptid_get_tid (ptid));
2388 return buf;
2389 }
2390
2391 return normal_pid_to_str (ptid);
3ee6f623
CF
2392}
2393
de1b3c3d 2394static LONGEST
dc05df57 2395windows_xfer_shared_libraries (struct target_ops *ops,
de1b3c3d
PA
2396 enum target_object object, const char *annex,
2397 gdb_byte *readbuf, const gdb_byte *writebuf,
2398 ULONGEST offset, LONGEST len)
3cb8e7f6 2399{
de1b3c3d
PA
2400 struct obstack obstack;
2401 const char *buf;
2402 LONGEST len_avail;
3cb8e7f6 2403 struct so_list *so;
3cb8e7f6 2404
de1b3c3d
PA
2405 if (writebuf)
2406 return -1;
3cb8e7f6 2407
de1b3c3d
PA
2408 obstack_init (&obstack);
2409 obstack_grow_str (&obstack, "<library-list>\n");
2410 for (so = solib_start.next; so; so = so->next)
581e13c1
MS
2411 windows_xfer_shared_library (so->so_name, (CORE_ADDR)
2412 (uintptr_t) so->lm_info->load_addr,
f5656ead 2413 target_gdbarch (), &obstack);
de1b3c3d 2414 obstack_grow_str0 (&obstack, "</library-list>\n");
3cb8e7f6 2415
de1b3c3d
PA
2416 buf = obstack_finish (&obstack);
2417 len_avail = strlen (buf);
2418 if (offset >= len_avail)
49dc7f4b
PM
2419 len= 0;
2420 else
2421 {
2422 if (len > len_avail - offset)
2423 len = len_avail - offset;
2424 memcpy (readbuf, buf + offset, len);
2425 }
3cb8e7f6 2426
de1b3c3d
PA
2427 obstack_free (&obstack, NULL);
2428 return len;
3cb8e7f6
CF
2429}
2430
de1b3c3d 2431static LONGEST
dc05df57 2432windows_xfer_partial (struct target_ops *ops, enum target_object object,
de1b3c3d
PA
2433 const char *annex, gdb_byte *readbuf,
2434 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
3cb8e7f6 2435{
de1b3c3d 2436 switch (object)
3cb8e7f6 2437 {
de1b3c3d
PA
2438 case TARGET_OBJECT_MEMORY:
2439 if (readbuf)
2440 return (*ops->deprecated_xfer_memory) (offset, readbuf,
244e85c8 2441 len, 0/*read*/, NULL, ops);
de1b3c3d
PA
2442 if (writebuf)
2443 return (*ops->deprecated_xfer_memory) (offset, (gdb_byte *) writebuf,
2444 len, 1/*write*/, NULL, ops);
2445 return -1;
2446
2447 case TARGET_OBJECT_LIBRARIES:
dc05df57 2448 return windows_xfer_shared_libraries (ops, object, annex, readbuf,
de1b3c3d 2449 writebuf, offset, len);
3929abe9 2450
de1b3c3d
PA
2451 default:
2452 if (ops->beneath != NULL)
2453 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
2454 readbuf, writebuf, offset, len);
2455 return -1;
3929abe9 2456 }
02c5aecd
CF
2457}
2458
711e434b
PM
2459/* Provide thread local base, i.e. Thread Information Block address.
2460 Returns 1 if ptid is found and sets *ADDR to thread_local_base. */
2461
2462static int
2463windows_get_tib_address (ptid_t ptid, CORE_ADDR *addr)
2464{
2465 thread_info *th;
2466
2467 th = thread_rec (ptid_get_tid (ptid), 0);
2468 if (th == NULL)
2469 return 0;
2470
2471 if (addr != NULL)
2472 *addr = th->thread_local_base;
2473
2474 return 1;
2475}
2476
1e2f1c5c
JB
2477static ptid_t
2478windows_get_ada_task_ptid (long lwp, long thread)
2479{
2480 return ptid_build (ptid_get_pid (inferior_ptid), 0, lwp);
2481}
2482
3ee6f623 2483static void
dc05df57 2484init_windows_ops (void)
3ee6f623 2485{
dc05df57
CF
2486 windows_ops.to_shortname = "child";
2487 windows_ops.to_longname = "Win32 child process";
2488 windows_ops.to_doc = "Win32 child process (started by the \"run\" command).";
2489 windows_ops.to_open = windows_open;
2490 windows_ops.to_close = windows_close;
2491 windows_ops.to_attach = windows_attach;
2492 windows_ops.to_attach_no_wait = 1;
2493 windows_ops.to_detach = windows_detach;
2494 windows_ops.to_resume = windows_resume;
2495 windows_ops.to_wait = windows_wait;
2496 windows_ops.to_fetch_registers = windows_fetch_inferior_registers;
2497 windows_ops.to_store_registers = windows_store_inferior_registers;
2498 windows_ops.to_prepare_to_store = windows_prepare_to_store;
2499 windows_ops.deprecated_xfer_memory = windows_xfer_memory;
2500 windows_ops.to_xfer_partial = windows_xfer_partial;
2501 windows_ops.to_files_info = windows_files_info;
2502 windows_ops.to_insert_breakpoint = memory_insert_breakpoint;
2503 windows_ops.to_remove_breakpoint = memory_remove_breakpoint;
2504 windows_ops.to_terminal_init = terminal_init_inferior;
2505 windows_ops.to_terminal_inferior = terminal_inferior;
2506 windows_ops.to_terminal_ours_for_output = terminal_ours_for_output;
2507 windows_ops.to_terminal_ours = terminal_ours;
2508 windows_ops.to_terminal_save_ours = terminal_save_ours;
2509 windows_ops.to_terminal_info = child_terminal_info;
2510 windows_ops.to_kill = windows_kill_inferior;
2511 windows_ops.to_create_inferior = windows_create_inferior;
2512 windows_ops.to_mourn_inferior = windows_mourn_inferior;
2513 windows_ops.to_can_run = windows_can_run;
2514 windows_ops.to_thread_alive = windows_thread_alive;
2515 windows_ops.to_pid_to_str = windows_pid_to_str;
2516 windows_ops.to_stop = windows_stop;
2517 windows_ops.to_stratum = process_stratum;
c35b1492
PA
2518 windows_ops.to_has_all_memory = default_child_has_all_memory;
2519 windows_ops.to_has_memory = default_child_has_memory;
2520 windows_ops.to_has_stack = default_child_has_stack;
2521 windows_ops.to_has_registers = default_child_has_registers;
2522 windows_ops.to_has_execution = default_child_has_execution;
dc05df57 2523 windows_ops.to_pid_to_exec_file = windows_pid_to_exec_file;
1e2f1c5c 2524 windows_ops.to_get_ada_task_ptid = windows_get_ada_task_ptid;
711e434b 2525 windows_ops.to_get_tib_address = windows_get_tib_address;
9bb9e8ad 2526
5aca5a82
PM
2527 i386_use_watchpoints (&windows_ops);
2528
9bb9e8ad
PM
2529 i386_dr_low.set_control = cygwin_set_dr7;
2530 i386_dr_low.set_addr = cygwin_set_dr;
7b50312a 2531 i386_dr_low.get_addr = cygwin_get_dr;
9bb9e8ad 2532 i386_dr_low.get_status = cygwin_get_dr6;
7b50312a 2533 i386_dr_low.get_control = cygwin_get_dr7;
9bb9e8ad
PM
2534
2535 /* i386_dr_low.debug_register_length field is set by
2536 calling i386_set_debug_register_length function
2537 in processor windows specific native file. */
2538
dc05df57 2539 windows_ops.to_magic = OPS_MAGIC;
c719b714 2540}
24e60978 2541
3929abe9 2542static void
dc05df57 2543set_windows_aliases (char *argv0)
3929abe9
CF
2544{
2545 add_info_alias ("dll", "sharedlibrary", 1);
2546}
2547
d603d4b3
JK
2548/* -Wmissing-prototypes */
2549extern initialize_file_ftype _initialize_windows_nat;
2550
24e60978 2551void
dc05df57 2552_initialize_windows_nat (void)
24e60978 2553{
fa58ee11
EZ
2554 struct cmd_list_element *c;
2555
dc05df57 2556 init_windows_ops ();
1ef980b9 2557
d0d0ab16
CV
2558#ifdef __CYGWIN__
2559 cygwin_internal (CW_SET_DOS_FILE_WARNING, 0);
2560#endif
2561
fa58ee11 2562 c = add_com ("dll-symbols", class_files, dll_symbol_command,
1bedd215 2563 _("Load dll library symbols from FILE."));
5ba2abeb 2564 set_cmd_completer (c, filename_completer);
450005e7
CF
2565
2566 add_com_alias ("sharedlibrary", "dll-symbols", class_alias, 1);
2567
70992597
PM
2568 add_com_alias ("add-shared-symbol-files", "dll-symbols", class_alias, 1);
2569
2570 add_com_alias ("assf", "dll-symbols", class_alias, 1);
2571
10325bc5 2572#ifdef __CYGWIN__
5bf193a2
AC
2573 add_setshow_boolean_cmd ("shell", class_support, &useshell, _("\
2574Set use of shell to start subprocess."), _("\
2575Show use of shell to start subprocess."), NULL,
2576 NULL,
2577 NULL, /* FIXME: i18n: */
2578 &setlist, &showlist);
2579
581e13c1
MS
2580 add_setshow_boolean_cmd ("cygwin-exceptions", class_support,
2581 &cygwin_exceptions, _("\
09280ddf
CF
2582Break when an exception is detected in the Cygwin DLL itself."), _("\
2583Show whether gdb breaks on exceptions in the Cygwin DLL itself."), NULL,
2584 NULL,
2585 NULL, /* FIXME: i18n: */
2586 &setlist, &showlist);
10325bc5 2587#endif
09280ddf 2588
5bf193a2
AC
2589 add_setshow_boolean_cmd ("new-console", class_support, &new_console, _("\
2590Set creation of new console when creating child process."), _("\
2591Show creation of new console when creating child process."), NULL,
2592 NULL,
2593 NULL, /* FIXME: i18n: */
2594 &setlist, &showlist);
2595
2596 add_setshow_boolean_cmd ("new-group", class_support, &new_group, _("\
2597Set creation of new group when creating child process."), _("\
2598Show creation of new group when creating child process."), NULL,
2599 NULL,
2600 NULL, /* FIXME: i18n: */
2601 &setlist, &showlist);
2602
2603 add_setshow_boolean_cmd ("debugexec", class_support, &debug_exec, _("\
2604Set whether to display execution in child process."), _("\
2605Show whether to display execution in child process."), NULL,
2606 NULL,
2607 NULL, /* FIXME: i18n: */
2608 &setlist, &showlist);
2609
2610 add_setshow_boolean_cmd ("debugevents", class_support, &debug_events, _("\
2611Set whether to display kernel events in child process."), _("\
2612Show whether to display kernel events in child process."), NULL,
2613 NULL,
2614 NULL, /* FIXME: i18n: */
2615 &setlist, &showlist);
2616
2617 add_setshow_boolean_cmd ("debugmemory", class_support, &debug_memory, _("\
2618Set whether to display memory accesses in child process."), _("\
2619Show whether to display memory accesses in child process."), NULL,
2620 NULL,
2621 NULL, /* FIXME: i18n: */
2622 &setlist, &showlist);
2623
2624 add_setshow_boolean_cmd ("debugexceptions", class_support,
2625 &debug_exceptions, _("\
2626Set whether to display kernel exceptions in child process."), _("\
2627Show whether to display kernel exceptions in child process."), NULL,
2628 NULL,
2629 NULL, /* FIXME: i18n: */
2630 &setlist, &showlist);
1ef980b9 2631
711e434b 2632 init_w32_command_list ();
c1748f97
PM
2633
2634 add_cmd ("selector", class_info, display_selectors,
1a966eab 2635 _("Display selectors infos."),
c1748f97 2636 &info_w32_cmdlist);
dc05df57
CF
2637 add_target (&windows_ops);
2638 deprecated_init_ui_hook = set_windows_aliases;
24e60978 2639}
3cee93ac 2640
fa4ba8da
PM
2641/* Hardware watchpoint support, adapted from go32-nat.c code. */
2642
2643/* Pass the address ADDR to the inferior in the I'th debug register.
2644 Here we just store the address in dr array, the registers will be
dc05df57 2645 actually set up when windows_continue is called. */
9bb9e8ad 2646static void
fa4ba8da
PM
2647cygwin_set_dr (int i, CORE_ADDR addr)
2648{
2649 if (i < 0 || i > 3)
2650 internal_error (__FILE__, __LINE__,
e2e0b3e5 2651 _("Invalid register %d in cygwin_set_dr.\n"), i);
41b4aadc 2652 dr[i] = addr;
fa4ba8da
PM
2653 debug_registers_changed = 1;
2654 debug_registers_used = 1;
2655}
2656
2657/* Pass the value VAL to the inferior in the DR7 debug control
2658 register. Here we just store the address in D_REGS, the watchpoint
dc05df57 2659 will be actually set up in windows_wait. */
9bb9e8ad
PM
2660static void
2661cygwin_set_dr7 (unsigned long val)
fa4ba8da 2662{
9bb9e8ad 2663 dr[7] = (CORE_ADDR) val;
fa4ba8da
PM
2664 debug_registers_changed = 1;
2665 debug_registers_used = 1;
2666}
2667
7b50312a
PA
2668/* Get the value of debug register I from the inferior. */
2669
2670static CORE_ADDR
2671cygwin_get_dr (int i)
2672{
2673 return dr[i];
2674}
2675
fa4ba8da
PM
2676/* Get the value of the DR6 debug status register from the inferior.
2677 Here we just return the value stored in dr[6]
2678 by the last call to thread_rec for current_event.dwThreadId id. */
9bb9e8ad 2679static unsigned long
fa4ba8da
PM
2680cygwin_get_dr6 (void)
2681{
9bb9e8ad 2682 return (unsigned long) dr[6];
fa4ba8da
PM
2683}
2684
7b50312a
PA
2685/* Get the value of the DR7 debug status register from the inferior.
2686 Here we just return the value stored in dr[7] by the last call to
2687 thread_rec for current_event.dwThreadId id. */
2688
2689static unsigned long
2690cygwin_get_dr7 (void)
2691{
2692 return (unsigned long) dr[7];
2693}
2694
2dc38344 2695/* Determine if the thread referenced by "ptid" is alive
3cee93ac 2696 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
581e13c1 2697 it means that the thread has died. Otherwise it is assumed to be alive. */
3cee93ac 2698static int
28439f5e 2699windows_thread_alive (struct target_ops *ops, ptid_t ptid)
3cee93ac 2700{
2dc38344
PA
2701 int tid;
2702
2703 gdb_assert (ptid_get_tid (ptid) != 0);
2704 tid = ptid_get_tid (ptid);
39f77062 2705
581e13c1
MS
2706 return WaitForSingleObject (thread_rec (tid, FALSE)->h, 0) == WAIT_OBJECT_0
2707 ? FALSE : TRUE;
3cee93ac
CF
2708}
2709
d603d4b3
JK
2710/* -Wmissing-prototypes */
2711extern initialize_file_ftype _initialize_check_for_gdb_ini;
2712
2a3d5645
CF
2713void
2714_initialize_check_for_gdb_ini (void)
2715{
2716 char *homedir;
2717 if (inhibit_gdbinit)
2718 return;
2719
2720 homedir = getenv ("HOME");
2721 if (homedir)
2722 {
2723 char *p;
2724 char *oldini = (char *) alloca (strlen (homedir) +
2725 sizeof ("/gdb.ini"));
2726 strcpy (oldini, homedir);
2727 p = strchr (oldini, '\0');
0ba1096a 2728 if (p > oldini && !IS_DIR_SEPARATOR (p[-1]))
2a3d5645
CF
2729 *p++ = '/';
2730 strcpy (p, "gdb.ini");
2731 if (access (oldini, 0) == 0)
2732 {
2733 int len = strlen (oldini);
2734 char *newini = alloca (len + 1);
08850b56
PM
2735
2736 xsnprintf (newini, len + 1, "%.*s.gdbinit",
2737 (int) (len - (sizeof ("gdb.ini") - 1)), oldini);
8a3fe4f8 2738 warning (_("obsolete '%s' found. Rename to '%s'."), oldini, newini);
2a3d5645
CF
2739 }
2740 }
2741}
33605d39 2742
2b008701 2743/* Define dummy functions which always return error for the rare cases where
581e13c1 2744 these functions could not be found. */
2b008701
CF
2745static BOOL WINAPI
2746bad_DebugActiveProcessStop (DWORD w)
2747{
2748 return FALSE;
2749}
2750static BOOL WINAPI
2751bad_DebugBreakProcess (HANDLE w)
2752{
2753 return FALSE;
2754}
2755static BOOL WINAPI
2756bad_DebugSetProcessKillOnExit (BOOL w)
2757{
2758 return FALSE;
2759}
2760static BOOL WINAPI
2761bad_EnumProcessModules (HANDLE w, HMODULE *x, DWORD y, LPDWORD z)
2762{
2763 return FALSE;
2764}
b3c613f2
CF
2765
2766#ifdef __USEWIDE
2b008701 2767static DWORD WINAPI
b3c613f2 2768bad_GetModuleFileNameExW (HANDLE w, HMODULE x, LPWSTR y, DWORD z)
2b008701
CF
2769{
2770 return 0;
2771}
d0d0ab16
CV
2772#else
2773static DWORD WINAPI
b3c613f2 2774bad_GetModuleFileNameExA (HANDLE w, HMODULE x, LPSTR y, DWORD z)
d0d0ab16
CV
2775{
2776 return 0;
2777}
2778#endif
b3c613f2 2779
2b008701
CF
2780static BOOL WINAPI
2781bad_GetModuleInformation (HANDLE w, HMODULE x, LPMODULEINFO y, DWORD z)
2782{
2783 return FALSE;
2784}
2785
418c6cb3
CF
2786static BOOL WINAPI
2787bad_OpenProcessToken (HANDLE w, DWORD x, PHANDLE y)
2788{
2789 return FALSE;
2790}
2791
cd44747c
PM
2792static BOOL WINAPI
2793bad_GetCurrentConsoleFont (HANDLE w, BOOL bMaxWindow, CONSOLE_FONT_INFO *f)
2794{
2795 f->nFont = 0;
2796 return 1;
2797}
2798static COORD WINAPI
2799bad_GetConsoleFontSize (HANDLE w, DWORD nFont)
2800{
2801 COORD size;
2802 size.X = 8;
2803 size.Y = 12;
2804 return size;
2805}
2806
d603d4b3
JK
2807/* -Wmissing-prototypes */
2808extern initialize_file_ftype _initialize_loadable;
2809
2b008701 2810/* Load any functions which may not be available in ancient versions
581e13c1 2811 of Windows. */
d603d4b3 2812
33605d39 2813void
2b008701 2814_initialize_loadable (void)
33605d39 2815{
2b008701
CF
2816 HMODULE hm = NULL;
2817
2818 hm = LoadLibrary ("kernel32.dll");
2819 if (hm)
33605d39 2820 {
b3c613f2 2821 DebugActiveProcessStop = (void *)
2b008701 2822 GetProcAddress (hm, "DebugActiveProcessStop");
b3c613f2 2823 DebugBreakProcess = (void *)
2b008701 2824 GetProcAddress (hm, "DebugBreakProcess");
b3c613f2 2825 DebugSetProcessKillOnExit = (void *)
2b008701 2826 GetProcAddress (hm, "DebugSetProcessKillOnExit");
cd44747c
PM
2827 GetConsoleFontSize = (void *)
2828 GetProcAddress (hm, "GetConsoleFontSize");
2829 GetCurrentConsoleFont = (void *)
2830 GetProcAddress (hm, "GetCurrentConsoleFont");
2b008701 2831 }
33605d39 2832
2b008701 2833 /* Set variables to dummy versions of these processes if the function
581e13c1 2834 wasn't found in kernel32.dll. */
b3c613f2
CF
2835 if (!DebugBreakProcess)
2836 DebugBreakProcess = bad_DebugBreakProcess;
2837 if (!DebugActiveProcessStop || !DebugSetProcessKillOnExit)
2b008701 2838 {
b3c613f2
CF
2839 DebugActiveProcessStop = bad_DebugActiveProcessStop;
2840 DebugSetProcessKillOnExit = bad_DebugSetProcessKillOnExit;
2b008701 2841 }
cd44747c
PM
2842 if (!GetConsoleFontSize)
2843 GetConsoleFontSize = bad_GetConsoleFontSize;
2844 if (!GetCurrentConsoleFont)
2845 GetCurrentConsoleFont = bad_GetCurrentConsoleFont;
33605d39 2846
2b008701 2847 /* Load optional functions used for retrieving filename information
581e13c1 2848 associated with the currently debugged process or its dlls. */
2b008701
CF
2849 hm = LoadLibrary ("psapi.dll");
2850 if (hm)
2851 {
b3c613f2 2852 EnumProcessModules = (void *)
2b008701 2853 GetProcAddress (hm, "EnumProcessModules");
b3c613f2 2854 GetModuleInformation = (void *)
2b008701 2855 GetProcAddress (hm, "GetModuleInformation");
b3c613f2
CF
2856 GetModuleFileNameEx = (void *)
2857 GetProcAddress (hm, GetModuleFileNameEx_name);
33605d39
CF
2858 }
2859
b3c613f2 2860 if (!EnumProcessModules || !GetModuleInformation || !GetModuleFileNameEx)
2b008701
CF
2861 {
2862 /* Set variables to dummy versions of these processes if the function
581e13c1 2863 wasn't found in psapi.dll. */
b3c613f2
CF
2864 EnumProcessModules = bad_EnumProcessModules;
2865 GetModuleInformation = bad_GetModuleInformation;
2866 GetModuleFileNameEx = bad_GetModuleFileNameEx;
581e13c1
MS
2867 /* This will probably fail on Windows 9x/Me. Let the user know
2868 that we're missing some functionality. */
2869 warning(_("\
2870cannot automatically find executable file or library to read symbols.\n\
2871Use \"file\" or \"dll\" command to load executable/libraries directly."));
418c6cb3
CF
2872 }
2873
2874 hm = LoadLibrary ("advapi32.dll");
2875 if (hm)
2876 {
b3c613f2
CF
2877 OpenProcessToken = (void *) GetProcAddress (hm, "OpenProcessToken");
2878 LookupPrivilegeValueA = (void *)
418c6cb3 2879 GetProcAddress (hm, "LookupPrivilegeValueA");
b3c613f2 2880 AdjustTokenPrivileges = (void *)
418c6cb3
CF
2881 GetProcAddress (hm, "AdjustTokenPrivileges");
2882 /* Only need to set one of these since if OpenProcessToken fails nothing
581e13c1
MS
2883 else is needed. */
2884 if (!OpenProcessToken || !LookupPrivilegeValueA
2885 || !AdjustTokenPrivileges)
b3c613f2 2886 OpenProcessToken = bad_OpenProcessToken;
2b008701 2887 }
33605d39 2888}
This page took 1.877156 seconds and 4 git commands to generate.