Automatic date update in version.in
[deliverable/binutils-gdb.git] / gdb / windows-nat.c
CommitLineData
dc05df57 1/* Target-vector operations for controlling windows child processes, for GDB.
0a65a603 2
b811d2c2 3 Copyright (C) 1995-2020 Free Software Foundation, Inc.
0a65a603 4
e6433c28 5 Contributed by Cygnus Solutions, A Red Hat Company.
e88c49c3 6
24e60978
SC
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
24e60978
SC
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
a9762ec7 15 but WITHOUT ANY WARRANTY; without even the implied warranty of
24e60978
SC
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
24e60978 21
dfe7f3ac 22/* Originally by Steve Chamberlain, sac@cygnus.com */
24e60978
SC
23
24#include "defs.h"
25#include "frame.h" /* required by inferior.h */
26#include "inferior.h"
45741a9c 27#include "infrun.h"
24e60978 28#include "target.h"
24e60978
SC
29#include "gdbcore.h"
30#include "command.h"
fa58ee11 31#include "completer.h"
4e052eda 32#include "regcache.h"
2a3d5645 33#include "top.h"
403d9909
CF
34#include <signal.h>
35#include <sys/types.h>
36#include <fcntl.h>
403d9909
CF
37#include <windows.h>
38#include <imagehlp.h>
2b008701 39#include <psapi.h>
10325bc5 40#ifdef __CYGWIN__
b7ff339d 41#include <wchar.h>
403d9909 42#include <sys/cygwin.h>
b7ff339d 43#include <cygwin/version.h>
10325bc5 44#endif
a1b85d28 45#include <algorithm>
cad9cd60 46
0ba1096a 47#include "filenames.h"
1ef980b9
SC
48#include "symfile.h"
49#include "objfiles.h"
92107356 50#include "gdb_bfd.h"
de1b3c3d 51#include "gdb_obstack.h"
fdfa3315 52#include "gdbthread.h"
24e60978 53#include "gdbcmd.h"
1e37c281 54#include <unistd.h>
4646aa9d 55#include "exec.h"
3ee6f623 56#include "solist.h"
3cb8e7f6 57#include "solib.h"
de1b3c3d 58#include "xml-support.h"
463888ab 59#include "inttypes.h"
24e60978 60
6c7de422
MK
61#include "i386-tdep.h"
62#include "i387-tdep.h"
63
31b060a2
CF
64#include "windows-tdep.h"
65#include "windows-nat.h"
df7e5265 66#include "x86-nat.h"
ecc13e53 67#include "complaints.h"
51a9c8c5 68#include "inf-child.h"
268a13a5
TT
69#include "gdbsupport/gdb_tilde_expand.h"
70#include "gdbsupport/pathstuff.h"
559e7e50 71#include "gdbsupport/gdb_wait.h"
de1b3c3d 72
418c6cb3 73#define AdjustTokenPrivileges dyn_AdjustTokenPrivileges
2b008701
CF
74#define DebugActiveProcessStop dyn_DebugActiveProcessStop
75#define DebugBreakProcess dyn_DebugBreakProcess
76#define DebugSetProcessKillOnExit dyn_DebugSetProcessKillOnExit
77#define EnumProcessModules dyn_EnumProcessModules
2b008701 78#define GetModuleInformation dyn_GetModuleInformation
418c6cb3
CF
79#define LookupPrivilegeValueA dyn_LookupPrivilegeValueA
80#define OpenProcessToken dyn_OpenProcessToken
cd44747c
PM
81#define GetConsoleFontSize dyn_GetConsoleFontSize
82#define GetCurrentConsoleFont dyn_GetCurrentConsoleFont
2b008701 83
43499ea3
PA
84typedef BOOL WINAPI (AdjustTokenPrivileges_ftype) (HANDLE, BOOL,
85 PTOKEN_PRIVILEGES,
86 DWORD, PTOKEN_PRIVILEGES,
87 PDWORD);
88static AdjustTokenPrivileges_ftype *AdjustTokenPrivileges;
89
90typedef BOOL WINAPI (DebugActiveProcessStop_ftype) (DWORD);
91static DebugActiveProcessStop_ftype *DebugActiveProcessStop;
92
93typedef BOOL WINAPI (DebugBreakProcess_ftype) (HANDLE);
94static DebugBreakProcess_ftype *DebugBreakProcess;
95
96typedef BOOL WINAPI (DebugSetProcessKillOnExit_ftype) (BOOL);
97static DebugSetProcessKillOnExit_ftype *DebugSetProcessKillOnExit;
98
99typedef BOOL WINAPI (EnumProcessModules_ftype) (HANDLE, HMODULE *, DWORD,
100 LPDWORD);
101static EnumProcessModules_ftype *EnumProcessModules;
102
103typedef BOOL WINAPI (GetModuleInformation_ftype) (HANDLE, HMODULE,
104 LPMODULEINFO, DWORD);
105static GetModuleInformation_ftype *GetModuleInformation;
106
107typedef BOOL WINAPI (LookupPrivilegeValueA_ftype) (LPCSTR, LPCSTR, PLUID);
108static LookupPrivilegeValueA_ftype *LookupPrivilegeValueA;
109
110typedef BOOL WINAPI (OpenProcessToken_ftype) (HANDLE, DWORD, PHANDLE);
111static OpenProcessToken_ftype *OpenProcessToken;
112
113typedef BOOL WINAPI (GetCurrentConsoleFont_ftype) (HANDLE, BOOL,
114 CONSOLE_FONT_INFO *);
115static GetCurrentConsoleFont_ftype *GetCurrentConsoleFont;
116
117typedef COORD WINAPI (GetConsoleFontSize_ftype) (HANDLE, DWORD);
118static GetConsoleFontSize_ftype *GetConsoleFontSize;
2b008701 119
b3c613f2
CF
120#undef STARTUPINFO
121#undef CreateProcess
122#undef GetModuleFileNameEx
123
124#ifndef __CYGWIN__
125# define __PMAX (MAX_PATH + 1)
43499ea3
PA
126 typedef DWORD WINAPI (GetModuleFileNameEx_ftype) (HANDLE, HMODULE, LPSTR, DWORD);
127 static GetModuleFileNameEx_ftype *GetModuleFileNameEx;
b3c613f2
CF
128# define STARTUPINFO STARTUPINFOA
129# define CreateProcess CreateProcessA
130# define GetModuleFileNameEx_name "GetModuleFileNameExA"
131# define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
132#else
133# define __PMAX PATH_MAX
581e13c1 134/* The starting and ending address of the cygwin1.dll text segment. */
b3c613f2
CF
135 static CORE_ADDR cygwin_load_start;
136 static CORE_ADDR cygwin_load_end;
b3c613f2
CF
137# define __USEWIDE
138 typedef wchar_t cygwin_buf_t;
43499ea3
PA
139 typedef DWORD WINAPI (GetModuleFileNameEx_ftype) (HANDLE, HMODULE,
140 LPWSTR, DWORD);
141 static GetModuleFileNameEx_ftype *GetModuleFileNameEx;
b3c613f2
CF
142# define STARTUPINFO STARTUPINFOW
143# define CreateProcess CreateProcessW
144# define GetModuleFileNameEx_name "GetModuleFileNameExW"
145# define bad_GetModuleFileNameEx bad_GetModuleFileNameExW
10325bc5 146#endif
a244bdca 147
581e13c1
MS
148static int have_saved_context; /* True if we've saved context from a
149 cygwin signal. */
15766370 150#ifdef __CYGWIN__
85102364 151static CONTEXT saved_context; /* Contains the saved context from a
581e13c1 152 cygwin signal. */
15766370 153#endif
a244bdca 154
0714f9bf
SS
155/* If we're not using the old Cygwin header file set, define the
156 following which never should have been in the generic Win32 API
581e13c1 157 headers in the first place since they were our own invention... */
0714f9bf 158#ifndef _GNU_H_WINDOWS_H
9d3789f7 159enum
8e860359
CF
160 {
161 FLAG_TRACE_BIT = 0x100,
8e860359 162 };
0714f9bf
SS
163#endif
164
5851ab76
JB
165#ifndef CONTEXT_EXTENDED_REGISTERS
166/* This macro is only defined on ia32. It only makes sense on this target,
167 so define it as zero if not already defined. */
168#define CONTEXT_EXTENDED_REGISTERS 0
169#endif
170
f0666312
JT
171#define CONTEXT_DEBUGGER_DR CONTEXT_FULL | CONTEXT_FLOATING_POINT \
172 | CONTEXT_SEGMENTS | CONTEXT_DEBUG_REGISTERS \
173 | CONTEXT_EXTENDED_REGISTERS
97da3b20 174
41b4aadc 175static uintptr_t dr[8];
87a45c96
CF
176static int debug_registers_changed;
177static int debug_registers_used;
16d905e2
CF
178
179static int windows_initialization_done;
6537bb24 180#define DR6_CLEAR_VALUE 0xffff0ff0
97da3b20 181
24cdb46e
РИ
182/* The exception thrown by a program to tell the debugger the name of
183 a thread. The exception record contains an ID of a thread and a
184 name to give it. This exception has no documented name, but MSDN
185 dubs it "MS_VC_EXCEPTION" in one code example. */
186#define MS_VC_EXCEPTION 0x406d1388
187
188typedef enum
189{
190 HANDLE_EXCEPTION_UNHANDLED = 0,
191 HANDLE_EXCEPTION_HANDLED,
192 HANDLE_EXCEPTION_IGNORED
193} handle_exception_result;
194
3cee93ac 195/* The string sent by cygwin when it processes a signal.
581e13c1 196 FIXME: This should be in a cygwin include file. */
3929abe9
CF
197#ifndef _CYGWIN_SIGNAL_STRING
198#define _CYGWIN_SIGNAL_STRING "cYgSiGw00f"
199#endif
3cee93ac 200
29fe111d 201#define CHECK(x) check (x, __FILE__,__LINE__)
dfe7f3ac 202#define DEBUG_EXEC(x) if (debug_exec) printf_unfiltered x
4e52d31c
PM
203#define DEBUG_EVENTS(x) if (debug_events) printf_unfiltered x
204#define DEBUG_MEM(x) if (debug_memory) printf_unfiltered x
205#define DEBUG_EXCEPT(x) if (debug_exceptions) printf_unfiltered x
24e60978 206
9bb9e8ad
PM
207static void cygwin_set_dr (int i, CORE_ADDR addr);
208static void cygwin_set_dr7 (unsigned long val);
a961bc18 209static CORE_ADDR cygwin_get_dr (int i);
9bb9e8ad 210static unsigned long cygwin_get_dr6 (void);
a961bc18 211static unsigned long cygwin_get_dr7 (void);
9bb9e8ad 212
a493e3e2 213static enum gdb_signal last_sig = GDB_SIGNAL_0;
581e13c1 214/* Set if a signal was received from the debugged process. */
7393af7c 215
3cee93ac 216/* Thread information structure used to track information that is
6537bb24 217 not available in gdb's thread structure. */
876d1cd7 218typedef struct windows_thread_info_struct
3a4b77d8 219 {
876d1cd7 220 struct windows_thread_info_struct *next;
3a4b77d8
JM
221 DWORD id;
222 HANDLE h;
711e434b 223 CORE_ADDR thread_local_base;
3a4b77d8 224 char *name;
6537bb24 225 int suspended;
3ade5333 226 int reload_context;
3a4b77d8 227 CONTEXT context;
8e860359 228 }
876d1cd7 229windows_thread_info;
1e37c281 230
876d1cd7 231static windows_thread_info thread_head;
24e60978 232
581e13c1 233/* The process and thread handles for the above context. */
24e60978 234
3cee93ac
CF
235static DEBUG_EVENT current_event; /* The current debug event from
236 WaitForDebugEvent */
237static HANDLE current_process_handle; /* Currently executing process */
876d1cd7 238static windows_thread_info *current_thread; /* Info on currently selected thread */
24e60978 239
581e13c1 240/* Counts of things. */
24e60978
SC
241static int exception_count = 0;
242static int event_count = 0;
dfe7f3ac 243static int saw_create;
bf25528d 244static int open_process_used = 0;
24e60978 245
581e13c1 246/* User options. */
491144b5 247static bool new_console = false;
10325bc5 248#ifdef __CYGWIN__
491144b5 249static bool cygwin_exceptions = false;
10325bc5 250#endif
491144b5
CB
251static bool new_group = true;
252static bool debug_exec = false; /* show execution */
253static bool debug_events = false; /* show events from kernel */
254static bool debug_memory = false; /* show target memory accesses */
255static bool debug_exceptions = false; /* show target exceptions */
256static bool useshell = false; /* use shell for subprocesses */
dfe7f3ac 257
7e63b4e4 258/* This vector maps GDB's idea of a register's number into an offset
dc05df57 259 in the windows exception context vector.
24e60978 260
3cee93ac 261 It also contains the bit mask needed to load the register in question.
24e60978 262
7e63b4e4
JB
263 The contents of this table can only be computed by the units
264 that provide CPU-specific support for Windows native debugging.
265 These units should set the table by calling
dc05df57 266 windows_set_context_register_offsets.
7e63b4e4 267
24e60978
SC
268 One day we could read a reg, we could inspect the context we
269 already have loaded, if it doesn't have the bit set that we need,
270 we read that set of registers in using GetThreadContext. If the
581e13c1 271 context already contains what we need, we just unpack it. Then to
24e60978
SC
272 write a register, first we have to ensure that the context contains
273 the other regs of the group, and then we copy the info in and set
581e13c1 274 out bit. */
24e60978 275
7e63b4e4 276static const int *mappings;
d3a09475 277
d40dc7a8
JB
278/* The function to use in order to determine whether a register is
279 a segment register or not. */
280static segment_register_p_ftype *segment_register_p;
281
73c13fe6
TT
282/* See windows_nat_target::resume to understand why this is commented
283 out. */
284#if 0
24e60978 285/* This vector maps the target's idea of an exception (extracted
581e13c1 286 from the DEBUG_EVENT structure) to GDB's idea. */
24e60978
SC
287
288struct xlate_exception
289 {
73c13fe6 290 DWORD them;
2ea28649 291 enum gdb_signal us;
24e60978
SC
292 };
293
73c13fe6 294static const struct xlate_exception xlate[] =
24e60978 295{
a493e3e2
PA
296 {EXCEPTION_ACCESS_VIOLATION, GDB_SIGNAL_SEGV},
297 {STATUS_STACK_OVERFLOW, GDB_SIGNAL_SEGV},
298 {EXCEPTION_BREAKPOINT, GDB_SIGNAL_TRAP},
299 {DBG_CONTROL_C, GDB_SIGNAL_INT},
300 {EXCEPTION_SINGLE_STEP, GDB_SIGNAL_TRAP},
73c13fe6
TT
301 {STATUS_FLOAT_DIVIDE_BY_ZERO, GDB_SIGNAL_FPE}
302};
24e60978 303
73c13fe6 304#endif /* 0 */
f6ac5f3d
PA
305
306struct windows_nat_target final : public x86_nat_target<inf_child_target>
307{
308 void close () override;
309
310 void attach (const char *, int) override;
311
312 bool attach_no_wait () override
313 { return true; }
314
315 void detach (inferior *, int) override;
316
317 void resume (ptid_t, int , enum gdb_signal) override;
318
319 ptid_t wait (ptid_t, struct target_waitstatus *, int) override;
320
321 void fetch_registers (struct regcache *, int) override;
322 void store_registers (struct regcache *, int) override;
323
324 enum target_xfer_status xfer_partial (enum target_object object,
325 const char *annex,
326 gdb_byte *readbuf,
327 const gdb_byte *writebuf,
328 ULONGEST offset, ULONGEST len,
329 ULONGEST *xfered_len) override;
330
331 void files_info () override;
332
333 void kill () override;
334
335 void create_inferior (const char *, const std::string &,
336 char **, int) override;
337
338 void mourn_inferior () override;
339
57810aa7 340 bool thread_alive (ptid_t ptid) override;
f6ac5f3d 341
a068643d 342 std::string pid_to_str (ptid_t) override;
f6ac5f3d
PA
343
344 void interrupt () override;
345
346 char *pid_to_exec_file (int pid) override;
347
348 ptid_t get_ada_task_ptid (long lwp, long thread) override;
349
57810aa7 350 bool get_tib_address (ptid_t ptid, CORE_ADDR *addr) override;
f6ac5f3d
PA
351
352 const char *thread_name (struct thread_info *) override;
5b6d1e4f
PA
353
354 int get_windows_debug_event (int pid, struct target_waitstatus *ourstatus);
f6ac5f3d
PA
355};
356
357static windows_nat_target the_windows_nat_target;
358
7e63b4e4
JB
359/* Set the MAPPINGS static global to OFFSETS.
360 See the description of MAPPINGS for more details. */
361
362void
dc05df57 363windows_set_context_register_offsets (const int *offsets)
7e63b4e4
JB
364{
365 mappings = offsets;
366}
367
d40dc7a8
JB
368/* See windows-nat.h. */
369
370void
371windows_set_segment_register_p (segment_register_p_ftype *fun)
372{
373 segment_register_p = fun;
374}
375
fa4ba8da
PM
376static void
377check (BOOL ok, const char *file, int line)
378{
379 if (!ok)
d50a0ce2
CV
380 printf_filtered ("error return %s:%d was %u\n", file, line,
381 (unsigned) GetLastError ());
fa4ba8da
PM
382}
383
6537bb24
PA
384/* Find a thread record given a thread id. If GET_CONTEXT is not 0,
385 then also retrieve the context for this thread. If GET_CONTEXT is
386 negative, then don't suspend the thread. */
876d1cd7 387static windows_thread_info *
3cee93ac 388thread_rec (DWORD id, int get_context)
24e60978 389{
876d1cd7 390 windows_thread_info *th;
3cee93ac 391
3a4b77d8 392 for (th = &thread_head; (th = th->next) != NULL;)
3cee93ac
CF
393 if (th->id == id)
394 {
6537bb24 395 if (!th->suspended && get_context)
3cee93ac 396 {
8a892701 397 if (get_context > 0 && id != current_event.dwThreadId)
6537bb24
PA
398 {
399 if (SuspendThread (th->h) == (DWORD) -1)
400 {
401 DWORD err = GetLastError ();
22128028 402
17617f2d
EZ
403 /* We get Access Denied (5) when trying to suspend
404 threads that Windows started on behalf of the
405 debuggee, usually when those threads are just
5d9c55d3
JT
406 about to exit.
407 We can get Invalid Handle (6) if the main thread
408 has exited. */
409 if (err != ERROR_INVALID_HANDLE
410 && err != ERROR_ACCESS_DENIED)
17617f2d
EZ
411 warning (_("SuspendThread (tid=0x%x) failed."
412 " (winerr %u)"),
413 (unsigned) id, (unsigned) err);
414 th->suspended = -1;
6537bb24 415 }
17617f2d
EZ
416 else
417 th->suspended = 1;
6537bb24 418 }
3cee93ac 419 else if (get_context < 0)
6537bb24 420 th->suspended = -1;
3ade5333 421 th->reload_context = 1;
3cee93ac
CF
422 }
423 return th;
424 }
425
426 return NULL;
427}
428
c559d709
JB
429/* Add a thread to the thread list.
430
431 PTID is the ptid of the thread to be added.
432 H is its Windows handle.
433 TLB is its thread local base.
434 MAIN_THREAD_P should be true if the thread to be added is
435 the main thread, false otherwise. */
436
876d1cd7 437static windows_thread_info *
c559d709 438windows_add_thread (ptid_t ptid, HANDLE h, void *tlb, bool main_thread_p)
3cee93ac 439{
876d1cd7 440 windows_thread_info *th;
2dc38344
PA
441 DWORD id;
442
cc6bcb54 443 gdb_assert (ptid.tid () != 0);
2dc38344 444
cc6bcb54 445 id = ptid.tid ();
3cee93ac
CF
446
447 if ((th = thread_rec (id, FALSE)))
448 return th;
449
876d1cd7 450 th = XCNEW (windows_thread_info);
3cee93ac
CF
451 th->id = id;
452 th->h = h;
711e434b 453 th->thread_local_base = (CORE_ADDR) (uintptr_t) tlb;
3cee93ac
CF
454 th->next = thread_head.next;
455 thread_head.next = th;
c559d709
JB
456
457 /* Add this new thread to the list of threads.
458
459 To be consistent with what's done on other platforms, we add
460 the main thread silently (in reality, this thread is really
461 more of a process to the user than a thread). */
462 if (main_thread_p)
5b6d1e4f 463 add_thread_silent (&the_windows_nat_target, ptid);
c559d709 464 else
5b6d1e4f 465 add_thread (&the_windows_nat_target, ptid);
c559d709 466
2dc38344 467 /* Set the debug registers for the new thread if they are used. */
fa4ba8da
PM
468 if (debug_registers_used)
469 {
470 /* Only change the value of the debug registers. */
471 th->context.ContextFlags = CONTEXT_DEBUG_REGISTERS;
472 CHECK (GetThreadContext (th->h, &th->context));
473 th->context.Dr0 = dr[0];
474 th->context.Dr1 = dr[1];
475 th->context.Dr2 = dr[2];
476 th->context.Dr3 = dr[3];
6537bb24 477 th->context.Dr6 = DR6_CLEAR_VALUE;
fa4ba8da
PM
478 th->context.Dr7 = dr[7];
479 CHECK (SetThreadContext (th->h, &th->context));
480 th->context.ContextFlags = 0;
481 }
3cee93ac 482 return th;
24e60978
SC
483}
484
26c4b26f 485/* Clear out any old thread list and reinitialize it to a
581e13c1 486 pristine state. */
24e60978 487static void
dc05df57 488windows_init_thread_list (void)
24e60978 489{
876d1cd7 490 windows_thread_info *th = &thread_head;
3cee93ac 491
dc05df57 492 DEBUG_EVENTS (("gdb: windows_init_thread_list\n"));
3cee93ac
CF
493 init_thread_list ();
494 while (th->next != NULL)
24e60978 495 {
876d1cd7 496 windows_thread_info *here = th->next;
3cee93ac 497 th->next = here->next;
b8c9b27d 498 xfree (here);
24e60978 499 }
059198c1 500 thread_head.next = NULL;
3cee93ac
CF
501}
502
c559d709
JB
503/* Delete a thread from the list of threads.
504
505 PTID is the ptid of the thread to be deleted.
506 EXIT_CODE is the thread's exit code.
507 MAIN_THREAD_P should be true if the thread to be deleted is
508 the main thread, false otherwise. */
509
3cee93ac 510static void
c559d709 511windows_delete_thread (ptid_t ptid, DWORD exit_code, bool main_thread_p)
3cee93ac 512{
876d1cd7 513 windows_thread_info *th;
2dc38344
PA
514 DWORD id;
515
cc6bcb54 516 gdb_assert (ptid.tid () != 0);
2dc38344 517
cc6bcb54 518 id = ptid.tid ();
3cee93ac 519
c559d709
JB
520 /* Emit a notification about the thread being deleted.
521
522 Note that no notification was printed when the main thread
523 was created, and thus, unless in verbose mode, we should be
85102364 524 symmetrical, and avoid that notification for the main thread
c559d709
JB
525 here as well. */
526
3cee93ac 527 if (info_verbose)
a068643d 528 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (ptid).c_str ());
c559d709 529 else if (print_thread_events && !main_thread_p)
e0ea48a0 530 printf_unfiltered (_("[%s exited with code %u]\n"),
a068643d
TT
531 target_pid_to_str (ptid).c_str (),
532 (unsigned) exit_code);
c559d709 533
5b6d1e4f 534 delete_thread (find_thread_ptid (&the_windows_nat_target, ptid));
3cee93ac
CF
535
536 for (th = &thread_head;
537 th->next != NULL && th->next->id != id;
538 th = th->next)
539 continue;
540
541 if (th->next != NULL)
24e60978 542 {
876d1cd7 543 windows_thread_info *here = th->next;
3cee93ac 544 th->next = here->next;
24cdb46e 545 xfree (here->name);
b8c9b27d 546 xfree (here);
24e60978
SC
547 }
548}
549
9a325b7b
JB
550/* Fetches register number R from the given windows_thread_info,
551 and supplies its value to the given regcache.
552
553 This function assumes that R is non-negative. A failed assertion
554 is raised if that is not true.
555
556 This function assumes that TH->RELOAD_CONTEXT is not set, meaning
557 that the windows_thread_info has an up-to-date context. A failed
558 assertion is raised if that assumption is violated. */
559
3cee93ac 560static void
9a325b7b
JB
561windows_fetch_one_register (struct regcache *regcache,
562 windows_thread_info *th, int r)
24e60978 563{
9a325b7b
JB
564 gdb_assert (r >= 0);
565 gdb_assert (!th->reload_context);
566
3de88e9a 567 char *context_offset = ((char *) &th->context) + mappings[r];
ac7936df 568 struct gdbarch *gdbarch = regcache->arch ();
20a6ec49 569 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
9a325b7b
JB
570
571 if (r == I387_FISEG_REGNUM (tdep))
572 {
573 long l = *((long *) context_offset) & 0xffff;
574 regcache->raw_supply (r, (char *) &l);
575 }
576 else if (r == I387_FOP_REGNUM (tdep))
577 {
578 long l = (*((long *) context_offset) >> 16) & ((1 << 11) - 1);
579 regcache->raw_supply (r, (char *) &l);
580 }
581 else if (segment_register_p (r))
582 {
583 /* GDB treats segment registers as 32bit registers, but they are
584 in fact only 16 bits long. Make sure we do not read extra
585 bits from our source buffer. */
586 long l = *((long *) context_offset) & 0xffff;
587 regcache->raw_supply (r, (char *) &l);
588 }
589 else
590 regcache->raw_supply (r, context_offset);
591}
592
593void
594windows_nat_target::fetch_registers (struct regcache *regcache, int r)
595{
96b49c5e
TT
596 DWORD tid = regcache->ptid ().tid ();
597 windows_thread_info *th = thread_rec (tid, TRUE);
9a325b7b
JB
598
599 /* Check if TH exists. Windows sometimes uses a non-existent
600 thread id in its events. */
601 if (th == NULL)
602 return;
6c7de422 603
3de88e9a 604 if (th->reload_context)
3ade5333 605 {
f20c58f5 606#ifdef __CYGWIN__
a244bdca
CF
607 if (have_saved_context)
608 {
581e13c1
MS
609 /* Lie about where the program actually is stopped since
610 cygwin has informed us that we should consider the signal
611 to have occurred at another location which is stored in
612 "saved_context. */
3de88e9a 613 memcpy (&th->context, &saved_context,
581e13c1 614 __COPY_CONTEXT_SIZE);
a244bdca
CF
615 have_saved_context = 0;
616 }
617 else
cb832706 618#endif
a244bdca 619 {
a244bdca 620 th->context.ContextFlags = CONTEXT_DEBUGGER_DR;
17617f2d 621 CHECK (GetThreadContext (th->h, &th->context));
2b008701 622 /* Copy dr values from that thread.
581e13c1
MS
623 But only if there were not modified since last stop.
624 PR gdb/2388 */
88616312
PM
625 if (!debug_registers_changed)
626 {
627 dr[0] = th->context.Dr0;
628 dr[1] = th->context.Dr1;
629 dr[2] = th->context.Dr2;
630 dr[3] = th->context.Dr3;
631 dr[6] = th->context.Dr6;
632 dr[7] = th->context.Dr7;
633 }
a244bdca 634 }
3de88e9a 635 th->reload_context = 0;
3ade5333
CF
636 }
637
9a325b7b
JB
638 if (r < 0)
639 for (r = 0; r < gdbarch_num_regs (regcache->arch()); r++)
640 windows_fetch_one_register (regcache, th, r);
3cee93ac 641 else
9a325b7b 642 windows_fetch_one_register (regcache, th, r);
3cee93ac
CF
643}
644
9a325b7b
JB
645/* Collect the register number R from the given regcache, and store
646 its value into the corresponding area of the given thread's context.
3de88e9a 647
9a325b7b
JB
648 This function assumes that R is non-negative. A failed assertion
649 assertion is raised if that is not true. */
3cee93ac
CF
650
651static void
9a325b7b
JB
652windows_store_one_register (const struct regcache *regcache,
653 windows_thread_info *th, int r)
3cee93ac 654{
9a325b7b
JB
655 gdb_assert (r >= 0);
656
657 regcache->raw_collect (r, ((char *) &th->context) + mappings[r]);
24e60978
SC
658}
659
3de88e9a
SM
660/* Store a new register value into the context of the thread tied to
661 REGCACHE. */
f6ac5f3d
PA
662
663void
664windows_nat_target::store_registers (struct regcache *regcache, int r)
3cee93ac 665{
96b49c5e
TT
666 DWORD tid = regcache->ptid ().tid ();
667 windows_thread_info *th = thread_rec (tid, TRUE);
3de88e9a
SM
668
669 /* Check if TH exists. Windows sometimes uses a non-existent
581e13c1 670 thread id in its events. */
9a325b7b
JB
671 if (th == NULL)
672 return;
673
674 if (r < 0)
675 for (r = 0; r < gdbarch_num_regs (regcache->arch ()); r++)
676 windows_store_one_register (regcache, th, r);
677 else
678 windows_store_one_register (regcache, th, r);
3cee93ac 679}
24e60978 680
581e13c1 681/* Maintain a linked list of "so" information. */
d0e449a1 682struct lm_info_windows : public lm_info_base
02e423b9 683{
f8fdb78e 684 LPVOID load_addr = 0;
c162ed3e 685 CORE_ADDR text_offset = 0;
3ee6f623
CF
686};
687
688static struct so_list solib_start, *solib_end;
02e423b9 689
de1b3c3d 690static struct so_list *
dc05df57 691windows_make_so (const char *name, LPVOID load_addr)
8e860359 692{
3ee6f623 693 struct so_list *so;
d0d0ab16
CV
694 char *p;
695#ifndef __CYGWIN__
b3c613f2
CF
696 char buf[__PMAX];
697 char cwd[__PMAX];
3f8ad85b
CF
698 WIN32_FIND_DATA w32_fd;
699 HANDLE h = FindFirstFile(name, &w32_fd);
3f8ad85b 700
6badb179
CF
701 if (h == INVALID_HANDLE_VALUE)
702 strcpy (buf, name);
703 else
3f8ad85b 704 {
c914e0cc
CF
705 FindClose (h);
706 strcpy (buf, name);
707 if (GetCurrentDirectory (MAX_PATH + 1, cwd))
708 {
709 p = strrchr (buf, '\\');
710 if (p)
711 p[1] = '\0';
712 SetCurrentDirectory (buf);
713 GetFullPathName (w32_fd.cFileName, MAX_PATH, buf, &p);
714 SetCurrentDirectory (cwd);
715 }
3f8ad85b 716 }
3ee6f623
CF
717 if (strcasecmp (buf, "ntdll.dll") == 0)
718 {
719 GetSystemDirectory (buf, sizeof (buf));
720 strcat (buf, "\\ntdll.dll");
721 }
d0d0ab16 722#else
b3c613f2 723 cygwin_buf_t buf[__PMAX];
d0d0ab16 724
b3c613f2 725 buf[0] = 0;
d0d0ab16
CV
726 if (access (name, F_OK) != 0)
727 {
728 if (strcasecmp (name, "ntdll.dll") == 0)
b3c613f2 729#ifdef __USEWIDE
d0d0ab16
CV
730 {
731 GetSystemDirectoryW (buf, sizeof (buf) / sizeof (wchar_t));
732 wcscat (buf, L"\\ntdll.dll");
733 }
b3c613f2
CF
734#else
735 {
736 GetSystemDirectoryA (buf, sizeof (buf) / sizeof (wchar_t));
737 strcat (buf, "\\ntdll.dll");
738 }
739#endif
d0d0ab16
CV
740 }
741#endif
41bf6aca 742 so = XCNEW (struct so_list);
f8fdb78e 743 lm_info_windows *li = new lm_info_windows;
d0e449a1
SM
744 so->lm_info = li;
745 li->load_addr = load_addr;
de1b3c3d 746 strcpy (so->so_original_name, name);
10325bc5
PA
747#ifndef __CYGWIN__
748 strcpy (so->so_name, buf);
749#else
d0d0ab16
CV
750 if (buf[0])
751 cygwin_conv_path (CCP_WIN_W_TO_POSIX, buf, so->so_name,
752 SO_NAME_MAX_PATH_SIZE);
753 else
754 {
60c5c021 755 char *rname = realpath (name, NULL);
d0d0ab16
CV
756 if (rname && strlen (rname) < SO_NAME_MAX_PATH_SIZE)
757 {
758 strcpy (so->so_name, rname);
759 free (rname);
760 }
761 else
762 error (_("dll path too long"));
763 }
de1b3c3d
PA
764 /* Record cygwin1.dll .text start/end. */
765 p = strchr (so->so_name, '\0') - (sizeof ("/cygwin1.dll") - 1);
766 if (p >= so->so_name && strcasecmp (p, "/cygwin1.dll") == 0)
767 {
de1b3c3d 768 asection *text = NULL;
8e860359 769
192b62ce 770 gdb_bfd_ref_ptr abfd (gdb_bfd_open (so->so_name, "pei-i386", -1));
a244bdca 771
192b62ce 772 if (abfd == NULL)
de1b3c3d
PA
773 return so;
774
192b62ce
TT
775 if (bfd_check_format (abfd.get (), bfd_object))
776 text = bfd_get_section_by_name (abfd.get (), ".text");
de1b3c3d
PA
777
778 if (!text)
192b62ce 779 return so;
de1b3c3d 780
7a9dd1b2 781 /* The symbols in a dll are offset by 0x1000, which is the
de1b3c3d 782 offset from 0 of the first byte in an image - because of the
581e13c1
MS
783 file header and the section alignment. */
784 cygwin_load_start = (CORE_ADDR) (uintptr_t) ((char *)
785 load_addr + 0x1000);
fd361982 786 cygwin_load_end = cygwin_load_start + bfd_section_size (text);
de1b3c3d 787 }
10325bc5 788#endif
de1b3c3d
PA
789
790 return so;
8e860359
CF
791}
792
3ee6f623 793static char *
dfe7f3ac
CF
794get_image_name (HANDLE h, void *address, int unicode)
795{
d0d0ab16 796#ifdef __CYGWIN__
b3c613f2 797 static char buf[__PMAX];
d0d0ab16 798#else
b3c613f2 799 static char buf[(2 * __PMAX) + 1];
d0d0ab16 800#endif
dfe7f3ac
CF
801 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
802 char *address_ptr;
803 int len = 0;
804 char b[2];
5732a500 805 SIZE_T done;
dfe7f3ac
CF
806
807 /* Attempt to read the name of the dll that was detected.
808 This is documented to work only when actively debugging
581e13c1 809 a program. It will not work for attached processes. */
dfe7f3ac
CF
810 if (address == NULL)
811 return NULL;
812
dfe7f3ac 813 /* See if we could read the address of a string, and that the
581e13c1
MS
814 address isn't null. */
815 if (!ReadProcessMemory (h, address, &address_ptr,
816 sizeof (address_ptr), &done)
6f17862b 817 || done != sizeof (address_ptr) || !address_ptr)
dfe7f3ac
CF
818 return NULL;
819
581e13c1 820 /* Find the length of the string. */
6f17862b
CF
821 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
822 && (b[0] != 0 || b[size - 1] != 0) && done == size)
823 continue;
dfe7f3ac
CF
824
825 if (!unicode)
826 ReadProcessMemory (h, address_ptr, buf, len, &done);
827 else
828 {
829 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
830 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
831 &done);
d0d0ab16 832#ifdef __CYGWIN__
b3c613f2 833 wcstombs (buf, unicode_address, __PMAX);
d0d0ab16
CV
834#else
835 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, sizeof buf,
836 0, 0);
837#endif
dfe7f3ac
CF
838 }
839
840 return buf;
841}
842
1cd9feab
JB
843/* Handle a DLL load event, and return 1.
844
845 This function assumes that this event did not occur during inferior
846 initialization, where their event info may be incomplete (see
847 do_initial_windows_stuff and windows_add_all_dlls for more info
848 on how we handle DLL loading during that phase). */
849
bf469271
PA
850static void
851handle_load_dll ()
24e60978 852{
3a4b77d8 853 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
1cd9feab 854 char *dll_name;
24e60978 855
94481b8c
JB
856 /* Try getting the DLL name via the lpImageName field of the event.
857 Note that Microsoft documents this fields as strictly optional,
858 in the sense that it might be NULL. And the first DLL event in
859 particular is explicitly documented as "likely not pass[ed]"
860 (source: MSDN LOAD_DLL_DEBUG_INFO structure). */
1cd9feab
JB
861 dll_name = get_image_name (current_process_handle,
862 event->lpImageName, event->fUnicode);
3cee93ac 863 if (!dll_name)
bf469271 864 return;
3cee93ac 865
dc05df57 866 solib_end->next = windows_make_so (dll_name, event->lpBaseOfDll);
de1b3c3d 867 solib_end = solib_end->next;
450005e7 868
d0e449a1
SM
869 lm_info_windows *li = (lm_info_windows *) solib_end->lm_info;
870
a74ce742 871 DEBUG_EVENTS (("gdb: Loading dll \"%s\" at %s.\n", solib_end->so_name,
d0e449a1 872 host_address_to_string (li->load_addr)));
450005e7
CF
873}
874
3ee6f623 875static void
dc05df57 876windows_free_so (struct so_list *so)
3ee6f623 877{
f8fdb78e
SM
878 lm_info_windows *li = (lm_info_windows *) so->lm_info;
879
880 delete li;
de1b3c3d 881 xfree (so);
3cb8e7f6
CF
882}
883
3be75f87
JB
884/* Handle a DLL unload event.
885 Return 1 if successful, or zero otherwise.
886
887 This function assumes that this event did not occur during inferior
888 initialization, where their event info may be incomplete (see
889 do_initial_windows_stuff and windows_add_all_dlls for more info
890 on how we handle DLL loading during that phase). */
891
bf469271
PA
892static void
893handle_unload_dll ()
d3ff4a77 894{
d3653bf6 895 LPVOID lpBaseOfDll = current_event.u.UnloadDll.lpBaseOfDll;
3ee6f623 896 struct so_list *so;
d3ff4a77
CF
897
898 for (so = &solib_start; so->next != NULL; so = so->next)
d0e449a1
SM
899 {
900 lm_info_windows *li_next = (lm_info_windows *) so->next->lm_info;
a25cd31f 901
d0e449a1
SM
902 if (li_next->load_addr == lpBaseOfDll)
903 {
904 struct so_list *sodel = so->next;
7488902c 905
d0e449a1
SM
906 so->next = sodel->next;
907 if (!so->next)
908 solib_end = so;
909 DEBUG_EVENTS (("gdb: Unloading dll \"%s\".\n", sodel->so_name));
910
911 windows_free_so (sodel);
bf469271 912 return;
d0e449a1
SM
913 }
914 }
3929abe9 915
ecc13e53
JB
916 /* We did not find any DLL that was previously loaded at this address,
917 so register a complaint. We do not report an error, because we have
918 observed that this may be happening under some circumstances. For
919 instance, running 32bit applications on x64 Windows causes us to receive
920 4 mysterious UNLOAD_DLL_DEBUG_EVENTs during the startup phase (these
921 events are apparently caused by the WOW layer, the interface between
922 32bit and 64bit worlds). */
b98664d3 923 complaint (_("dll starting at %s not found."),
ecc13e53 924 host_address_to_string (lpBaseOfDll));
bf469271
PA
925}
926
927/* Call FUNC wrapped in a TRY/CATCH that swallows all GDB
928 exceptions. */
d3ff4a77 929
bf469271
PA
930static void
931catch_errors (void (*func) ())
932{
a70b8144 933 try
bf469271
PA
934 {
935 func ();
936 }
230d2906 937 catch (const gdb_exception &ex)
bf469271
PA
938 {
939 exception_print (gdb_stderr, ex);
940 }
d3ff4a77
CF
941}
942
581e13c1 943/* Clear list of loaded DLLs. */
3ee6f623 944static void
dc05df57 945windows_clear_solib (void)
450005e7 946{
25057eb0
HD
947 struct so_list *so;
948
949 for (so = solib_start.next; so; so = solib_start.next)
950 {
951 solib_start.next = so->next;
952 windows_free_so (so);
953 }
954
450005e7 955 solib_end = &solib_start;
450005e7 956}
295732ea 957
463888ab 958static void
0b39b52e 959signal_event_command (const char *args, int from_tty)
463888ab
РИ
960{
961 uintptr_t event_id = 0;
962 char *endargs = NULL;
963
964 if (args == NULL)
965 error (_("signal-event requires an argument (integer event id)"));
966
967 event_id = strtoumax (args, &endargs, 10);
968
969 if ((errno == ERANGE) || (event_id == 0) || (event_id > UINTPTR_MAX) ||
970 ((HANDLE) event_id == INVALID_HANDLE_VALUE))
971 error (_("Failed to convert `%s' to event id"), args);
972
973 SetEvent ((HANDLE) event_id);
974 CloseHandle ((HANDLE) event_id);
975}
976
3cee93ac
CF
977/* Handle DEBUG_STRING output from child process.
978 Cygwin prepends its messages with a "cygwin:". Interpret this as
581e13c1 979 a Cygwin signal. Otherwise just print the string as a warning. */
3cee93ac
CF
980static int
981handle_output_debug_string (struct target_waitstatus *ourstatus)
982{
e83e4e24 983 gdb::unique_xmalloc_ptr<char> s;
a244bdca 984 int retval = 0;
3cee93ac
CF
985
986 if (!target_read_string
2c647436 987 ((CORE_ADDR) (uintptr_t) current_event.u.DebugString.lpDebugStringData,
e83e4e24
TT
988 &s, 1024, 0)
989 || !s || !*(s.get ()))
a244bdca 990 /* nothing to do */;
e83e4e24 991 else if (!startswith (s.get (), _CYGWIN_SIGNAL_STRING))
3cee93ac 992 {
10325bc5 993#ifdef __CYGWIN__
e83e4e24 994 if (!startswith (s.get (), "cYg"))
10325bc5 995#endif
040ea00b 996 {
e83e4e24 997 char *p = strchr (s.get (), '\0');
040ea00b 998
e83e4e24 999 if (p > s.get () && *--p == '\n')
040ea00b 1000 *p = '\0';
e83e4e24 1001 warning (("%s"), s.get ());
040ea00b 1002 }
3cee93ac 1003 }
f20c58f5 1004#ifdef __CYGWIN__
d3a09475 1005 else
3cee93ac 1006 {
581e13c1
MS
1007 /* Got a cygwin signal marker. A cygwin signal is followed by
1008 the signal number itself and then optionally followed by the
1009 thread id and address to saved context within the DLL. If
1010 these are supplied, then the given thread is assumed to have
1011 issued the signal and the context from the thread is assumed
1012 to be stored at the given address in the inferior. Tell gdb
1013 to treat this like a real signal. */
3cee93ac 1014 char *p;
e83e4e24 1015 int sig = strtol (s.get () + sizeof (_CYGWIN_SIGNAL_STRING) - 1, &p, 0);
0ae534d2 1016 gdb_signal gotasig = gdb_signal_from_host (sig);
c62fa0e2 1017
0714f9bf
SS
1018 ourstatus->value.sig = gotasig;
1019 if (gotasig)
a244bdca
CF
1020 {
1021 LPCVOID x;
2c15ef43 1022 SIZE_T n;
c62fa0e2 1023
a244bdca
CF
1024 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1025 retval = strtoul (p, &p, 0);
1026 if (!retval)
ab4ee614 1027 retval = current_event.dwThreadId;
40653b35 1028 else if ((x = (LPCVOID) (uintptr_t) strtoull (p, NULL, 0))
a244bdca 1029 && ReadProcessMemory (current_process_handle, x,
581e13c1
MS
1030 &saved_context,
1031 __COPY_CONTEXT_SIZE, &n)
a244bdca
CF
1032 && n == __COPY_CONTEXT_SIZE)
1033 have_saved_context = 1;
a244bdca 1034 }
3cee93ac 1035 }
cb832706 1036#endif
3cee93ac 1037
a244bdca 1038 return retval;
3cee93ac 1039}
24e60978 1040
c1748f97
PM
1041static int
1042display_selector (HANDLE thread, DWORD sel)
1043{
1044 LDT_ENTRY info;
1045 if (GetThreadSelectorEntry (thread, sel, &info))
1046 {
1047 int base, limit;
d50a0ce2 1048 printf_filtered ("0x%03x: ", (unsigned) sel);
c1748f97 1049 if (!info.HighWord.Bits.Pres)
baa93fa6
CF
1050 {
1051 puts_filtered ("Segment not present\n");
1052 return 0;
1053 }
c1748f97
PM
1054 base = (info.HighWord.Bits.BaseHi << 24) +
1055 (info.HighWord.Bits.BaseMid << 16)
1056 + info.BaseLow;
1057 limit = (info.HighWord.Bits.LimitHi << 16) + info.LimitLow;
1058 if (info.HighWord.Bits.Granularity)
caad7706 1059 limit = (limit << 12) | 0xfff;
c1748f97
PM
1060 printf_filtered ("base=0x%08x limit=0x%08x", base, limit);
1061 if (info.HighWord.Bits.Default_Big)
baa93fa6 1062 puts_filtered(" 32-bit ");
c1748f97 1063 else
baa93fa6 1064 puts_filtered(" 16-bit ");
c1748f97
PM
1065 switch ((info.HighWord.Bits.Type & 0xf) >> 1)
1066 {
1067 case 0:
baa93fa6
CF
1068 puts_filtered ("Data (Read-Only, Exp-up");
1069 break;
c1748f97 1070 case 1:
baa93fa6
CF
1071 puts_filtered ("Data (Read/Write, Exp-up");
1072 break;
c1748f97 1073 case 2:
baa93fa6
CF
1074 puts_filtered ("Unused segment (");
1075 break;
c1748f97 1076 case 3:
baa93fa6
CF
1077 puts_filtered ("Data (Read/Write, Exp-down");
1078 break;
c1748f97 1079 case 4:
baa93fa6
CF
1080 puts_filtered ("Code (Exec-Only, N.Conf");
1081 break;
c1748f97 1082 case 5:
baa93fa6 1083 puts_filtered ("Code (Exec/Read, N.Conf");
c1748f97
PM
1084 break;
1085 case 6:
baa93fa6 1086 puts_filtered ("Code (Exec-Only, Conf");
c1748f97
PM
1087 break;
1088 case 7:
baa93fa6 1089 puts_filtered ("Code (Exec/Read, Conf");
c1748f97
PM
1090 break;
1091 default:
e432ccf1
JT
1092 printf_filtered ("Unknown type 0x%lx",
1093 (unsigned long) info.HighWord.Bits.Type);
c1748f97
PM
1094 }
1095 if ((info.HighWord.Bits.Type & 0x1) == 0)
baa93fa6 1096 puts_filtered(", N.Acc");
c1748f97
PM
1097 puts_filtered (")\n");
1098 if ((info.HighWord.Bits.Type & 0x10) == 0)
1099 puts_filtered("System selector ");
e432ccf1
JT
1100 printf_filtered ("Priviledge level = %ld. ",
1101 (unsigned long) info.HighWord.Bits.Dpl);
c1748f97 1102 if (info.HighWord.Bits.Granularity)
baa93fa6 1103 puts_filtered ("Page granular.\n");
c1748f97
PM
1104 else
1105 puts_filtered ("Byte granular.\n");
1106 return 1;
1107 }
1108 else
1109 {
5572ce1f
PM
1110 DWORD err = GetLastError ();
1111 if (err == ERROR_NOT_SUPPORTED)
1112 printf_filtered ("Function not supported\n");
1113 else
d50a0ce2 1114 printf_filtered ("Invalid selector 0x%x.\n", (unsigned) sel);
c1748f97
PM
1115 return 0;
1116 }
1117}
1118
1119static void
5fed81ff 1120display_selectors (const char * args, int from_tty)
c1748f97
PM
1121{
1122 if (!current_thread)
1123 {
1124 puts_filtered ("Impossible to display selectors now.\n");
1125 return;
1126 }
1127 if (!args)
1128 {
1129
1130 puts_filtered ("Selector $cs\n");
1131 display_selector (current_thread->h,
baa93fa6 1132 current_thread->context.SegCs);
c1748f97
PM
1133 puts_filtered ("Selector $ds\n");
1134 display_selector (current_thread->h,
baa93fa6 1135 current_thread->context.SegDs);
c1748f97
PM
1136 puts_filtered ("Selector $es\n");
1137 display_selector (current_thread->h,
baa93fa6 1138 current_thread->context.SegEs);
c1748f97
PM
1139 puts_filtered ("Selector $ss\n");
1140 display_selector (current_thread->h,
baa93fa6 1141 current_thread->context.SegSs);
c1748f97
PM
1142 puts_filtered ("Selector $fs\n");
1143 display_selector (current_thread->h,
1144 current_thread->context.SegFs);
1145 puts_filtered ("Selector $gs\n");
1146 display_selector (current_thread->h,
baa93fa6 1147 current_thread->context.SegGs);
c1748f97
PM
1148 }
1149 else
1150 {
1151 int sel;
1152 sel = parse_and_eval_long (args);
1153 printf_filtered ("Selector \"%s\"\n",args);
1154 display_selector (current_thread->h, sel);
1155 }
1156}
1157
7393af7c 1158#define DEBUG_EXCEPTION_SIMPLE(x) if (debug_exceptions) \
a74ce742
PM
1159 printf_unfiltered ("gdb: Target exception %s at %s\n", x, \
1160 host_address_to_string (\
1161 current_event.u.Exception.ExceptionRecord.ExceptionAddress))
7393af7c 1162
24cdb46e 1163static handle_exception_result
450005e7 1164handle_exception (struct target_waitstatus *ourstatus)
24e60978 1165{
24cdb46e
РИ
1166 EXCEPTION_RECORD *rec = &current_event.u.Exception.ExceptionRecord;
1167 DWORD code = rec->ExceptionCode;
1168 handle_exception_result result = HANDLE_EXCEPTION_HANDLED;
3cee93ac 1169
29fe111d 1170 ourstatus->kind = TARGET_WAITKIND_STOPPED;
8a892701 1171
581e13c1 1172 /* Record the context of the current thread. */
c25b7cce 1173 thread_rec (current_event.dwThreadId, -1);
24e60978 1174
29fe111d 1175 switch (code)
24e60978 1176 {
1ef980b9 1177 case EXCEPTION_ACCESS_VIOLATION:
7393af7c 1178 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ACCESS_VIOLATION");
a493e3e2 1179 ourstatus->value.sig = GDB_SIGNAL_SEGV;
10325bc5 1180#ifdef __CYGWIN__
8da8e0b3 1181 {
581e13c1
MS
1182 /* See if the access violation happened within the cygwin DLL
1183 itself. Cygwin uses a kind of exception handling to deal
1184 with passed-in invalid addresses. gdb should not treat
1185 these as real SEGVs since they will be silently handled by
1186 cygwin. A real SEGV will (theoretically) be caught by
1187 cygwin later in the process and will be sent as a
1188 cygwin-specific-signal. So, ignore SEGVs if they show up
1189 within the text segment of the DLL itself. */
2c02bd72 1190 const char *fn;
24cdb46e 1191 CORE_ADDR addr = (CORE_ADDR) (uintptr_t) rec->ExceptionAddress;
581e13c1
MS
1192
1193 if ((!cygwin_exceptions && (addr >= cygwin_load_start
1194 && addr < cygwin_load_end))
a244bdca 1195 || (find_pc_partial_function (addr, &fn, NULL, NULL)
61012eef 1196 && startswith (fn, "KERNEL32!IsBad")))
24cdb46e 1197 return HANDLE_EXCEPTION_UNHANDLED;
8da8e0b3 1198 }
10325bc5 1199#endif
7393af7c
PM
1200 break;
1201 case STATUS_STACK_OVERFLOW:
1202 DEBUG_EXCEPTION_SIMPLE ("STATUS_STACK_OVERFLOW");
a493e3e2 1203 ourstatus->value.sig = GDB_SIGNAL_SEGV;
7393af7c
PM
1204 break;
1205 case STATUS_FLOAT_DENORMAL_OPERAND:
1206 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DENORMAL_OPERAND");
a493e3e2 1207 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1208 break;
1209 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1210 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ARRAY_BOUNDS_EXCEEDED");
a493e3e2 1211 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1212 break;
1213 case STATUS_FLOAT_INEXACT_RESULT:
1214 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INEXACT_RESULT");
a493e3e2 1215 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1216 break;
1217 case STATUS_FLOAT_INVALID_OPERATION:
1218 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INVALID_OPERATION");
a493e3e2 1219 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1220 break;
1221 case STATUS_FLOAT_OVERFLOW:
1222 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_OVERFLOW");
a493e3e2 1223 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1224 break;
1225 case STATUS_FLOAT_STACK_CHECK:
1226 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_STACK_CHECK");
a493e3e2 1227 ourstatus->value.sig = GDB_SIGNAL_FPE;
1ef980b9 1228 break;
3b7c8b74 1229 case STATUS_FLOAT_UNDERFLOW:
7393af7c 1230 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_UNDERFLOW");
a493e3e2 1231 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c 1232 break;
3b7c8b74 1233 case STATUS_FLOAT_DIVIDE_BY_ZERO:
7393af7c 1234 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DIVIDE_BY_ZERO");
a493e3e2 1235 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c 1236 break;
3b7c8b74 1237 case STATUS_INTEGER_DIVIDE_BY_ZERO:
7393af7c 1238 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_DIVIDE_BY_ZERO");
a493e3e2 1239 ourstatus->value.sig = GDB_SIGNAL_FPE;
3b7c8b74 1240 break;
7393af7c
PM
1241 case STATUS_INTEGER_OVERFLOW:
1242 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_OVERFLOW");
a493e3e2 1243 ourstatus->value.sig = GDB_SIGNAL_FPE;
1ef980b9
SC
1244 break;
1245 case EXCEPTION_BREAKPOINT:
7393af7c 1246 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_BREAKPOINT");
a493e3e2 1247 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1ef980b9
SC
1248 break;
1249 case DBG_CONTROL_C:
7393af7c 1250 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_C");
a493e3e2 1251 ourstatus->value.sig = GDB_SIGNAL_INT;
5b421780
PM
1252 break;
1253 case DBG_CONTROL_BREAK:
7393af7c 1254 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_BREAK");
a493e3e2 1255 ourstatus->value.sig = GDB_SIGNAL_INT;
1ef980b9
SC
1256 break;
1257 case EXCEPTION_SINGLE_STEP:
7393af7c 1258 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_SINGLE_STEP");
a493e3e2 1259 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1ef980b9 1260 break;
8227c82d 1261 case EXCEPTION_ILLEGAL_INSTRUCTION:
7393af7c 1262 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ILLEGAL_INSTRUCTION");
a493e3e2 1263 ourstatus->value.sig = GDB_SIGNAL_ILL;
7393af7c
PM
1264 break;
1265 case EXCEPTION_PRIV_INSTRUCTION:
1266 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_PRIV_INSTRUCTION");
a493e3e2 1267 ourstatus->value.sig = GDB_SIGNAL_ILL;
7393af7c
PM
1268 break;
1269 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1270 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_NONCONTINUABLE_EXCEPTION");
a493e3e2 1271 ourstatus->value.sig = GDB_SIGNAL_ILL;
8227c82d 1272 break;
24cdb46e
РИ
1273 case MS_VC_EXCEPTION:
1274 if (rec->NumberParameters >= 3
1275 && (rec->ExceptionInformation[0] & 0xffffffff) == 0x1000)
1276 {
1277 DWORD named_thread_id;
1278 windows_thread_info *named_thread;
1279 CORE_ADDR thread_name_target;
1280
1281 DEBUG_EXCEPTION_SIMPLE ("MS_VC_EXCEPTION");
1282
1283 thread_name_target = rec->ExceptionInformation[1];
1284 named_thread_id = (DWORD) (0xffffffff & rec->ExceptionInformation[2]);
1285
1286 if (named_thread_id == (DWORD) -1)
1287 named_thread_id = current_event.dwThreadId;
1288
1289 named_thread = thread_rec (named_thread_id, 0);
1290 if (named_thread != NULL)
1291 {
1292 int thread_name_len;
e83e4e24 1293 gdb::unique_xmalloc_ptr<char> thread_name;
24cdb46e
РИ
1294
1295 thread_name_len = target_read_string (thread_name_target,
1296 &thread_name, 1025, NULL);
1297 if (thread_name_len > 0)
1298 {
e83e4e24 1299 thread_name.get ()[thread_name_len - 1] = '\0';
24cdb46e 1300 xfree (named_thread->name);
e83e4e24 1301 named_thread->name = thread_name.release ();
24cdb46e 1302 }
24cdb46e
РИ
1303 }
1304 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1305 result = HANDLE_EXCEPTION_IGNORED;
1306 break;
1307 }
e7ec8713
TT
1308 /* treat improperly formed exception as unknown */
1309 /* FALLTHROUGH */
1ef980b9 1310 default:
581e13c1 1311 /* Treat unhandled first chance exceptions specially. */
02e423b9 1312 if (current_event.u.Exception.dwFirstChance)
24cdb46e 1313 return HANDLE_EXCEPTION_UNHANDLED;
d50a0ce2
CV
1314 printf_unfiltered ("gdb: unknown target exception 0x%08x at %s\n",
1315 (unsigned) current_event.u.Exception.ExceptionRecord.ExceptionCode,
a74ce742
PM
1316 host_address_to_string (
1317 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
a493e3e2 1318 ourstatus->value.sig = GDB_SIGNAL_UNKNOWN;
1ef980b9 1319 break;
24e60978 1320 }
24e60978 1321 exception_count++;
7393af7c 1322 last_sig = ourstatus->value.sig;
24cdb46e 1323 return result;
24e60978
SC
1324}
1325
17617f2d
EZ
1326/* Resume thread specified by ID, or all artificially suspended
1327 threads, if we are continuing execution. KILLED non-zero means we
1328 have killed the inferior, so we should ignore weird errors due to
1329 threads shutting down. */
3cee93ac 1330static BOOL
17617f2d 1331windows_continue (DWORD continue_status, int id, int killed)
3cee93ac 1332{
876d1cd7 1333 windows_thread_info *th;
3cee93ac
CF
1334 BOOL res;
1335
0c3d84be 1336 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%d, ctid=0x%x, %s);\n",
d50a0ce2
CV
1337 (unsigned) current_event.dwProcessId,
1338 (unsigned) current_event.dwThreadId,
dfe7f3ac 1339 continue_status == DBG_CONTINUE ?
7393af7c 1340 "DBG_CONTINUE" : "DBG_EXCEPTION_NOT_HANDLED"));
6537bb24
PA
1341
1342 for (th = &thread_head; (th = th->next) != NULL;)
1343 if ((id == -1 || id == (int) th->id)
1344 && th->suspended)
1345 {
1346 if (debug_registers_changed)
1347 {
1348 th->context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1349 th->context.Dr0 = dr[0];
1350 th->context.Dr1 = dr[1];
1351 th->context.Dr2 = dr[2];
1352 th->context.Dr3 = dr[3];
1353 th->context.Dr6 = DR6_CLEAR_VALUE;
1354 th->context.Dr7 = dr[7];
1355 }
1356 if (th->context.ContextFlags)
1357 {
17617f2d
EZ
1358 DWORD ec = 0;
1359
1360 if (GetExitCodeThread (th->h, &ec)
1361 && ec == STILL_ACTIVE)
1362 {
1363 BOOL status = SetThreadContext (th->h, &th->context);
1364
1365 if (!killed)
1366 CHECK (status);
1367 }
6537bb24
PA
1368 th->context.ContextFlags = 0;
1369 }
1370 if (th->suspended > 0)
1371 (void) ResumeThread (th->h);
1372 th->suspended = 0;
1373 }
1374
0714f9bf
SS
1375 res = ContinueDebugEvent (current_event.dwProcessId,
1376 current_event.dwThreadId,
1377 continue_status);
3cee93ac 1378
68ffc902
JT
1379 if (!res)
1380 error (_("Failed to resume program execution"
1381 " (ContinueDebugEvent failed, error %u)"),
1382 (unsigned int) GetLastError ());
1383
fa4ba8da 1384 debug_registers_changed = 0;
3cee93ac
CF
1385 return res;
1386}
1387
d6dc8049
CF
1388/* Called in pathological case where Windows fails to send a
1389 CREATE_PROCESS_DEBUG_EVENT after an attach. */
3ee6f623 1390static DWORD
5439edaa 1391fake_create_process (void)
3ade5333
CF
1392{
1393 current_process_handle = OpenProcess (PROCESS_ALL_ACCESS, FALSE,
1394 current_event.dwProcessId);
bf25528d
CF
1395 if (current_process_handle != NULL)
1396 open_process_used = 1;
1397 else
1398 {
d50a0ce2
CV
1399 error (_("OpenProcess call failed, GetLastError = %u"),
1400 (unsigned) GetLastError ());
bf25528d
CF
1401 /* We can not debug anything in that case. */
1402 }
c559d709
JB
1403 current_thread
1404 = windows_add_thread (ptid_t (current_event.dwProcessId, 0,
1405 current_event.dwThreadId),
1406 current_event.u.CreateThread.hThread,
1407 current_event.u.CreateThread.lpThreadLocalBase,
1408 true /* main_thread_p */);
ab4ee614 1409 return current_event.dwThreadId;
3ade5333
CF
1410}
1411
f6ac5f3d
PA
1412void
1413windows_nat_target::resume (ptid_t ptid, int step, enum gdb_signal sig)
a244bdca 1414{
876d1cd7 1415 windows_thread_info *th;
a244bdca
CF
1416 DWORD continue_status = DBG_CONTINUE;
1417
2dc38344 1418 /* A specific PTID means `step only this thread id'. */
d7e15655 1419 int resume_all = ptid == minus_one_ptid;
2dc38344
PA
1420
1421 /* If we're continuing all threads, it's the current inferior that
1422 should be handled specially. */
1423 if (resume_all)
1424 ptid = inferior_ptid;
a244bdca 1425
a493e3e2 1426 if (sig != GDB_SIGNAL_0)
a244bdca
CF
1427 {
1428 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
1429 {
1430 DEBUG_EXCEPT(("Cannot continue with signal %d here.\n",sig));
1431 }
1432 else if (sig == last_sig)
1433 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1434 else
1435#if 0
1436/* This code does not seem to work, because
1437 the kernel does probably not consider changes in the ExceptionRecord
1438 structure when passing the exception to the inferior.
1439 Note that this seems possible in the exception handler itself. */
1440 {
73c13fe6
TT
1441 for (const xlate_exception &x : xlate)
1442 if (x.us == sig)
a244bdca 1443 {
581e13c1 1444 current_event.u.Exception.ExceptionRecord.ExceptionCode
73c13fe6 1445 = x.them;
a244bdca
CF
1446 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1447 break;
1448 }
1449 if (continue_status == DBG_CONTINUE)
1450 {
1451 DEBUG_EXCEPT(("Cannot continue with signal %d.\n",sig));
1452 }
1453 }
1454#endif
23942819 1455 DEBUG_EXCEPT(("Can only continue with received signal %d.\n",
a244bdca
CF
1456 last_sig));
1457 }
1458
a493e3e2 1459 last_sig = GDB_SIGNAL_0;
a244bdca 1460
55dfc88f
TT
1461 DEBUG_EXEC (("gdb: windows_resume (pid=%d, tid=0x%x, step=%d, sig=%d);\n",
1462 ptid.pid (), (unsigned) ptid.tid (), step, sig));
a244bdca 1463
581e13c1 1464 /* Get context for currently selected thread. */
cc6bcb54 1465 th = thread_rec (inferior_ptid.tid (), FALSE);
a244bdca
CF
1466 if (th)
1467 {
1468 if (step)
1469 {
581e13c1 1470 /* Single step by setting t bit. */
a97b0ac8 1471 struct regcache *regcache = get_current_regcache ();
ac7936df 1472 struct gdbarch *gdbarch = regcache->arch ();
f6ac5f3d 1473 fetch_registers (regcache, gdbarch_ps_regnum (gdbarch));
a244bdca
CF
1474 th->context.EFlags |= FLAG_TRACE_BIT;
1475 }
1476
1477 if (th->context.ContextFlags)
1478 {
1479 if (debug_registers_changed)
1480 {
1481 th->context.Dr0 = dr[0];
1482 th->context.Dr1 = dr[1];
1483 th->context.Dr2 = dr[2];
1484 th->context.Dr3 = dr[3];
6537bb24 1485 th->context.Dr6 = DR6_CLEAR_VALUE;
a244bdca
CF
1486 th->context.Dr7 = dr[7];
1487 }
1488 CHECK (SetThreadContext (th->h, &th->context));
1489 th->context.ContextFlags = 0;
1490 }
1491 }
1492
1493 /* Allow continuing with the same signal that interrupted us.
581e13c1 1494 Otherwise complain. */
a244bdca 1495
2dc38344 1496 if (resume_all)
17617f2d 1497 windows_continue (continue_status, -1, 0);
2dc38344 1498 else
cc6bcb54 1499 windows_continue (continue_status, ptid.tid (), 0);
a244bdca
CF
1500}
1501
695de547
CF
1502/* Ctrl-C handler used when the inferior is not run in the same console. The
1503 handler is in charge of interrupting the inferior using DebugBreakProcess.
1504 Note that this function is not available prior to Windows XP. In this case
1505 we emit a warning. */
d603d4b3 1506static BOOL WINAPI
695de547
CF
1507ctrl_c_handler (DWORD event_type)
1508{
1509 const int attach_flag = current_inferior ()->attach_flag;
1510
bb0613a5
PM
1511 /* Only handle Ctrl-C and Ctrl-Break events. Ignore others. */
1512 if (event_type != CTRL_C_EVENT && event_type != CTRL_BREAK_EVENT)
695de547
CF
1513 return FALSE;
1514
1515 /* If the inferior and the debugger share the same console, do nothing as
1516 the inferior has also received the Ctrl-C event. */
1517 if (!new_console && !attach_flag)
1518 return TRUE;
1519
1520 if (!DebugBreakProcess (current_process_handle))
581e13c1
MS
1521 warning (_("Could not interrupt program. "
1522 "Press Ctrl-c in the program console."));
695de547
CF
1523
1524 /* Return true to tell that Ctrl-C has been handled. */
1525 return TRUE;
1526}
1527
e6ad66bd
JT
1528/* Get the next event from the child. Returns a non-zero thread id if the event
1529 requires handling by WFI (or whatever). */
5b6d1e4f
PA
1530
1531int
1532windows_nat_target::get_windows_debug_event (int pid,
1533 struct target_waitstatus *ourstatus)
1e37c281
JM
1534{
1535 BOOL debug_event;
8a892701 1536 DWORD continue_status, event_code;
876d1cd7
YZ
1537 windows_thread_info *th;
1538 static windows_thread_info dummy_thread_info;
e6ad66bd 1539 DWORD thread_id = 0;
1e37c281 1540
a493e3e2 1541 last_sig = GDB_SIGNAL_0;
9d3789f7 1542
8a892701 1543 if (!(debug_event = WaitForDebugEvent (&current_event, 1000)))
29fe111d 1544 goto out;
1e37c281
JM
1545
1546 event_count++;
1547 continue_status = DBG_CONTINUE;
1e37c281 1548
8a892701 1549 event_code = current_event.dwDebugEventCode;
450005e7 1550 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
87a45c96 1551 th = NULL;
a244bdca 1552 have_saved_context = 0;
8a892701
CF
1553
1554 switch (event_code)
1e37c281
JM
1555 {
1556 case CREATE_THREAD_DEBUG_EVENT:
0c3d84be 1557 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1558 (unsigned) current_event.dwProcessId,
1559 (unsigned) current_event.dwThreadId,
1560 "CREATE_THREAD_DEBUG_EVENT"));
dfe7f3ac 1561 if (saw_create != 1)
3ade5333 1562 {
5b6d1e4f 1563 inferior *inf = find_inferior_pid (this, current_event.dwProcessId);
181e7f93 1564 if (!saw_create && inf->attach_flag)
3ade5333 1565 {
d6dc8049
CF
1566 /* Kludge around a Windows bug where first event is a create
1567 thread event. Caused when attached process does not have
581e13c1 1568 a main thread. */
e6ad66bd
JT
1569 thread_id = fake_create_process ();
1570 if (thread_id)
181e7f93 1571 saw_create++;
3ade5333
CF
1572 }
1573 break;
1574 }
581e13c1 1575 /* Record the existence of this thread. */
e6ad66bd 1576 thread_id = current_event.dwThreadId;
c559d709
JB
1577 th = windows_add_thread
1578 (ptid_t (current_event.dwProcessId, 0, current_event.dwThreadId),
1579 current_event.u.CreateThread.hThread,
1580 current_event.u.CreateThread.lpThreadLocalBase,
1581 false /* main_thread_p */);
711e434b 1582
1e37c281
JM
1583 break;
1584
1585 case EXIT_THREAD_DEBUG_EVENT:
0c3d84be 1586 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1587 (unsigned) current_event.dwProcessId,
1588 (unsigned) current_event.dwThreadId,
1589 "EXIT_THREAD_DEBUG_EVENT"));
2eab46b1
JB
1590 windows_delete_thread (ptid_t (current_event.dwProcessId, 0,
1591 current_event.dwThreadId),
c559d709
JB
1592 current_event.u.ExitThread.dwExitCode,
1593 false /* main_thread_p */);
2eab46b1 1594 th = &dummy_thread_info;
1e37c281
JM
1595 break;
1596
1597 case CREATE_PROCESS_DEBUG_EVENT:
0c3d84be 1598 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1599 (unsigned) current_event.dwProcessId,
1600 (unsigned) current_event.dwThreadId,
1601 "CREATE_PROCESS_DEBUG_EVENT"));
700b351b 1602 CloseHandle (current_event.u.CreateProcessInfo.hFile);
dfe7f3ac 1603 if (++saw_create != 1)
bf25528d 1604 break;
1e37c281 1605
dfe7f3ac 1606 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
581e13c1 1607 /* Add the main thread. */
c559d709
JB
1608 th = windows_add_thread
1609 (ptid_t (current_event.dwProcessId, 0,
1610 current_event.dwThreadId),
1611 current_event.u.CreateProcessInfo.hThread,
1612 current_event.u.CreateProcessInfo.lpThreadLocalBase,
1613 true /* main_thread_p */);
e6ad66bd 1614 thread_id = current_event.dwThreadId;
1e37c281
JM
1615 break;
1616
1617 case EXIT_PROCESS_DEBUG_EVENT:
0c3d84be 1618 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1619 (unsigned) current_event.dwProcessId,
1620 (unsigned) current_event.dwThreadId,
1621 "EXIT_PROCESS_DEBUG_EVENT"));
16d905e2
CF
1622 if (!windows_initialization_done)
1623 {
223ffa71 1624 target_terminal::ours ();
bc1e6c81 1625 target_mourn_inferior (inferior_ptid);
16d905e2
CF
1626 error (_("During startup program exited with code 0x%x."),
1627 (unsigned int) current_event.u.ExitProcess.dwExitCode);
1628 }
1629 else if (saw_create == 1)
1630 {
2eab46b1 1631 windows_delete_thread (ptid_t (current_event.dwProcessId, 0,
8ed5b76e 1632 current_event.dwThreadId),
c559d709 1633 0, true /* main_thread_p */);
559e7e50
EZ
1634 DWORD exit_status = current_event.u.ExitProcess.dwExitCode;
1635 /* If the exit status looks like a fatal exception, but we
1636 don't recognize the exception's code, make the original
1637 exit status value available, to avoid losing
1638 information. */
1639 int exit_signal
1640 = WIFSIGNALED (exit_status) ? WTERMSIG (exit_status) : -1;
1641 if (exit_signal == -1)
1642 {
1643 ourstatus->kind = TARGET_WAITKIND_EXITED;
1644 ourstatus->value.integer = exit_status;
1645 }
1646 else
1647 {
1648 ourstatus->kind = TARGET_WAITKIND_SIGNALLED;
1649 ourstatus->value.sig = gdb_signal_from_host (exit_signal);
1650 }
8ed5b76e 1651 thread_id = current_event.dwThreadId;
16d905e2 1652 }
8a892701 1653 break;
1e37c281
JM
1654
1655 case LOAD_DLL_DEBUG_EVENT:
0c3d84be 1656 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1657 (unsigned) current_event.dwProcessId,
1658 (unsigned) current_event.dwThreadId,
1659 "LOAD_DLL_DEBUG_EVENT"));
700b351b 1660 CloseHandle (current_event.u.LoadDll.hFile);
ea39ad35 1661 if (saw_create != 1 || ! windows_initialization_done)
dfe7f3ac 1662 break;
bf469271 1663 catch_errors (handle_load_dll);
450005e7
CF
1664 ourstatus->kind = TARGET_WAITKIND_LOADED;
1665 ourstatus->value.integer = 0;
ab4ee614 1666 thread_id = current_event.dwThreadId;
1e37c281
JM
1667 break;
1668
1669 case UNLOAD_DLL_DEBUG_EVENT:
0c3d84be 1670 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1671 (unsigned) current_event.dwProcessId,
1672 (unsigned) current_event.dwThreadId,
1673 "UNLOAD_DLL_DEBUG_EVENT"));
ea39ad35 1674 if (saw_create != 1 || ! windows_initialization_done)
dfe7f3ac 1675 break;
bf469271 1676 catch_errors (handle_unload_dll);
de1b3c3d
PA
1677 ourstatus->kind = TARGET_WAITKIND_LOADED;
1678 ourstatus->value.integer = 0;
ab4ee614 1679 thread_id = current_event.dwThreadId;
d3ff4a77 1680 break;
1e37c281
JM
1681
1682 case EXCEPTION_DEBUG_EVENT:
0c3d84be 1683 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1684 (unsigned) current_event.dwProcessId,
1685 (unsigned) current_event.dwThreadId,
1686 "EXCEPTION_DEBUG_EVENT"));
dfe7f3ac
CF
1687 if (saw_create != 1)
1688 break;
24cdb46e
РИ
1689 switch (handle_exception (ourstatus))
1690 {
1691 case HANDLE_EXCEPTION_UNHANDLED:
1692 default:
1693 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1694 break;
1695 case HANDLE_EXCEPTION_HANDLED:
1696 thread_id = current_event.dwThreadId;
1697 break;
1698 case HANDLE_EXCEPTION_IGNORED:
1699 continue_status = DBG_CONTINUE;
1700 break;
1701 }
1e37c281
JM
1702 break;
1703
581e13c1 1704 case OUTPUT_DEBUG_STRING_EVENT: /* Message from the kernel. */
0c3d84be 1705 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1706 (unsigned) current_event.dwProcessId,
1707 (unsigned) current_event.dwThreadId,
1708 "OUTPUT_DEBUG_STRING_EVENT"));
dfe7f3ac
CF
1709 if (saw_create != 1)
1710 break;
e6ad66bd 1711 thread_id = handle_output_debug_string (ourstatus);
1e37c281 1712 break;
9d3789f7 1713
1e37c281 1714 default:
dfe7f3ac
CF
1715 if (saw_create != 1)
1716 break;
0c3d84be 1717 printf_unfiltered ("gdb: kernel event for pid=%u tid=0x%x\n",
d50a0ce2
CV
1718 (unsigned) current_event.dwProcessId,
1719 (unsigned) current_event.dwThreadId);
1720 printf_unfiltered (" unknown event code %u\n",
1721 (unsigned) current_event.dwDebugEventCode);
1e37c281
JM
1722 break;
1723 }
1724
e6ad66bd 1725 if (!thread_id || saw_create != 1)
a244bdca 1726 {
95824559 1727 CHECK (windows_continue (continue_status, -1, 0));
a244bdca 1728 }
450005e7 1729 else
9d3789f7 1730 {
fd79271b 1731 inferior_ptid = ptid_t (current_event.dwProcessId, 0, thread_id);
776704b9
JT
1732 current_thread = th;
1733 if (!current_thread)
f16eab5f 1734 current_thread = thread_rec (thread_id, TRUE);
9d3789f7 1735 }
1e37c281
JM
1736
1737out:
e6ad66bd 1738 return thread_id;
1e37c281
JM
1739}
1740
2dc38344 1741/* Wait for interesting events to occur in the target process. */
f6ac5f3d
PA
1742ptid_t
1743windows_nat_target::wait (ptid_t ptid, struct target_waitstatus *ourstatus,
1744 int options)
24e60978 1745{
2dc38344 1746 int pid = -1;
39f77062 1747
24e60978
SC
1748 /* We loop when we get a non-standard exception rather than return
1749 with a SPURIOUS because resume can try and step or modify things,
3cee93ac 1750 which needs a current_thread->h. But some of these exceptions mark
24e60978 1751 the birth or death of threads, which mean that the current thread
581e13c1 1752 isn't necessarily what you think it is. */
24e60978
SC
1753
1754 while (1)
450005e7 1755 {
c57918b2 1756 int retval;
2b008701 1757
695de547
CF
1758 /* If the user presses Ctrl-c while the debugger is waiting
1759 for an event, he expects the debugger to interrupt his program
1760 and to get the prompt back. There are two possible situations:
1761
1762 - The debugger and the program do not share the console, in
1763 which case the Ctrl-c event only reached the debugger.
1764 In that case, the ctrl_c handler will take care of interrupting
581e13c1
MS
1765 the inferior. Note that this case is working starting with
1766 Windows XP. For Windows 2000, Ctrl-C should be pressed in the
695de547
CF
1767 inferior console.
1768
1769 - The debugger and the program share the same console, in which
1770 case both debugger and inferior will receive the Ctrl-c event.
1771 In that case the ctrl_c handler will ignore the event, as the
1772 Ctrl-c event generated inside the inferior will trigger the
1773 expected debug event.
1774
1775 FIXME: brobecker/2008-05-20: If the inferior receives the
1776 signal first and the delay until GDB receives that signal
1777 is sufficiently long, GDB can sometimes receive the SIGINT
1778 after we have unblocked the CTRL+C handler. This would
1779 lead to the debugger stopping prematurely while handling
1780 the new-thread event that comes with the handling of the SIGINT
1781 inside the inferior, and then stop again immediately when
1782 the user tries to resume the execution in the inferior.
1783 This is a classic race that we should try to fix one day. */
1784 SetConsoleCtrlHandler (&ctrl_c_handler, TRUE);
5b6d1e4f 1785 retval = get_windows_debug_event (pid, ourstatus);
695de547 1786 SetConsoleCtrlHandler (&ctrl_c_handler, FALSE);
c57918b2 1787
450005e7 1788 if (retval)
fd79271b 1789 return ptid_t (current_event.dwProcessId, 0, retval);
450005e7
CF
1790 else
1791 {
1792 int detach = 0;
3cee93ac 1793
98bbd631
AC
1794 if (deprecated_ui_loop_hook != NULL)
1795 detach = deprecated_ui_loop_hook (0);
0714f9bf 1796
450005e7 1797 if (detach)
f6ac5f3d 1798 kill ();
450005e7
CF
1799 }
1800 }
24e60978
SC
1801}
1802
ea39ad35
JB
1803/* Iterate over all DLLs currently mapped by our inferior, and
1804 add them to our list of solibs. */
94481b8c
JB
1805
1806static void
ea39ad35 1807windows_add_all_dlls (void)
94481b8c 1808{
94481b8c
JB
1809 HMODULE dummy_hmodule;
1810 DWORD cb_needed;
1811 HMODULE *hmodules;
1812 int i;
1813
94481b8c
JB
1814 if (EnumProcessModules (current_process_handle, &dummy_hmodule,
1815 sizeof (HMODULE), &cb_needed) == 0)
1816 return;
1817
1818 if (cb_needed < 1)
1819 return;
1820
1821 hmodules = (HMODULE *) alloca (cb_needed);
1822 if (EnumProcessModules (current_process_handle, hmodules,
1823 cb_needed, &cb_needed) == 0)
1824 return;
1825
ea39ad35 1826 for (i = 1; i < (int) (cb_needed / sizeof (HMODULE)); i++)
94481b8c
JB
1827 {
1828 MODULEINFO mi;
774f74c2
PM
1829#ifdef __USEWIDE
1830 wchar_t dll_name[__PMAX];
1831 char name[__PMAX];
1832#else
94481b8c 1833 char dll_name[__PMAX];
774f74c2
PM
1834 char *name;
1835#endif
94481b8c
JB
1836 if (GetModuleInformation (current_process_handle, hmodules[i],
1837 &mi, sizeof (mi)) == 0)
1838 continue;
1839 if (GetModuleFileNameEx (current_process_handle, hmodules[i],
1840 dll_name, sizeof (dll_name)) == 0)
1841 continue;
774f74c2
PM
1842#ifdef __USEWIDE
1843 wcstombs (name, dll_name, __PMAX);
1844#else
1845 name = dll_name;
1846#endif
ea39ad35
JB
1847
1848 solib_end->next = windows_make_so (name, mi.lpBaseOfDll);
1849 solib_end = solib_end->next;
94481b8c
JB
1850 }
1851}
1852
9d3789f7 1853static void
dc05df57 1854do_initial_windows_stuff (struct target_ops *ops, DWORD pid, int attaching)
9d3789f7 1855{
fa4ba8da 1856 int i;
d6b48e9c 1857 struct inferior *inf;
9d3789f7 1858
a493e3e2 1859 last_sig = GDB_SIGNAL_0;
9d3789f7
CF
1860 event_count = 0;
1861 exception_count = 0;
bf25528d 1862 open_process_used = 0;
fa4ba8da 1863 debug_registers_changed = 0;
dfe7f3ac 1864 debug_registers_used = 0;
fa4ba8da
PM
1865 for (i = 0; i < sizeof (dr) / sizeof (dr[0]); i++)
1866 dr[i] = 0;
10325bc5 1867#ifdef __CYGWIN__
de1b3c3d 1868 cygwin_load_start = cygwin_load_end = 0;
10325bc5 1869#endif
9d3789f7
CF
1870 current_event.dwProcessId = pid;
1871 memset (&current_event, 0, sizeof (current_event));
6a3cb8e8
PA
1872 if (!target_is_pushed (ops))
1873 push_target (ops);
cb851954 1874 disable_breakpoints_in_shlibs ();
dc05df57 1875 windows_clear_solib ();
88056fbb 1876 clear_proceed_status (0);
9d3789f7
CF
1877 init_wait_for_inferior ();
1878
6c95b8df
PA
1879 inf = current_inferior ();
1880 inferior_appeared (inf, pid);
181e7f93 1881 inf->attach_flag = attaching;
7f9f62ba 1882
9f9d052e
PM
1883 /* Make the new process the current inferior, so terminal handling
1884 can rely on it. When attaching, we don't know about any thread
1885 id here, but that's OK --- nothing should be referencing the
dc05df57 1886 current thread until we report an event out of windows_wait. */
f2907e49 1887 inferior_ptid = ptid_t (pid);
9f9d052e 1888
223ffa71
TT
1889 target_terminal::init ();
1890 target_terminal::inferior ();
9d3789f7 1891
16d905e2 1892 windows_initialization_done = 0;
c72f45d1 1893
9d3789f7
CF
1894 while (1)
1895 {
c72f45d1
PA
1896 struct target_waitstatus status;
1897
f6ac5f3d 1898 ops->wait (minus_one_ptid, &status, 0);
c72f45d1
PA
1899
1900 /* Note windows_wait returns TARGET_WAITKIND_SPURIOUS for thread
1901 events. */
1902 if (status.kind != TARGET_WAITKIND_LOADED
1903 && status.kind != TARGET_WAITKIND_SPURIOUS)
9d3789f7 1904 break;
c72f45d1 1905
f6ac5f3d 1906 ops->resume (minus_one_ptid, 0, GDB_SIGNAL_0);
9d3789f7 1907 }
eff8332b 1908
ea39ad35 1909 /* Now that the inferior has been started and all DLLs have been mapped,
3be75f87
JB
1910 we can iterate over all DLLs and load them in.
1911
1912 We avoid doing it any earlier because, on certain versions of Windows,
1913 LOAD_DLL_DEBUG_EVENTs are sometimes not complete. In particular,
1914 we have seen on Windows 8.1 that the ntdll.dll load event does not
1915 include the DLL name, preventing us from creating an associated SO.
1916 A possible explanation is that ntdll.dll might be mapped before
1917 the SO info gets created by the Windows system -- ntdll.dll is
1918 the first DLL to be reported via LOAD_DLL_DEBUG_EVENT and other DLLs
1919 do not seem to suffer from that problem.
1920
1921 Rather than try to work around this sort of issue, it is much
1922 simpler to just ignore DLL load/unload events during the startup
1923 phase, and then process them all in one batch now. */
ea39ad35 1924 windows_add_all_dlls ();
94481b8c 1925
16d905e2 1926 windows_initialization_done = 1;
9d3789f7
CF
1927 return;
1928}
1929
616a9dc4
CV
1930/* Try to set or remove a user privilege to the current process. Return -1
1931 if that fails, the previous setting of that privilege otherwise.
1932
1933 This code is copied from the Cygwin source code and rearranged to allow
1934 dynamically loading of the needed symbols from advapi32 which is only
581e13c1 1935 available on NT/2K/XP. */
616a9dc4
CV
1936static int
1937set_process_privilege (const char *privilege, BOOL enable)
1938{
616a9dc4
CV
1939 HANDLE token_hdl = NULL;
1940 LUID restore_priv;
1941 TOKEN_PRIVILEGES new_priv, orig_priv;
1942 int ret = -1;
1943 DWORD size;
1944
616a9dc4
CV
1945 if (!OpenProcessToken (GetCurrentProcess (),
1946 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
1947 &token_hdl))
1948 goto out;
1949
418c6cb3 1950 if (!LookupPrivilegeValueA (NULL, privilege, &restore_priv))
616a9dc4
CV
1951 goto out;
1952
1953 new_priv.PrivilegeCount = 1;
1954 new_priv.Privileges[0].Luid = restore_priv;
1955 new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0;
1956
1957 if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv,
295732ea 1958 sizeof orig_priv, &orig_priv, &size))
616a9dc4
CV
1959 goto out;
1960#if 0
1961 /* Disabled, otherwise every `attach' in an unprivileged user session
1962 would raise the "Failed to get SE_DEBUG_NAME privilege" warning in
581e13c1 1963 windows_attach(). */
616a9dc4 1964 /* AdjustTokenPrivileges returns TRUE even if the privilege could not
581e13c1 1965 be enabled. GetLastError () returns an correct error code, though. */
616a9dc4
CV
1966 if (enable && GetLastError () == ERROR_NOT_ALL_ASSIGNED)
1967 goto out;
1968#endif
1969
1970 ret = orig_priv.Privileges[0].Attributes == SE_PRIVILEGE_ENABLED ? 1 : 0;
1971
1972out:
1973 if (token_hdl)
1974 CloseHandle (token_hdl);
1975
1976 return ret;
1977}
1978
02cc9f49 1979/* Attach to process PID, then initialize for debugging it. */
f6ac5f3d
PA
1980
1981void
1982windows_nat_target::attach (const char *args, int from_tty)
24e60978
SC
1983{
1984 BOOL ok;
559e75c0 1985 DWORD pid;
24e60978 1986
74164c56 1987 pid = parse_pid_to_attach (args);
24e60978 1988
616a9dc4
CV
1989 if (set_process_privilege (SE_DEBUG_NAME, TRUE) < 0)
1990 {
1991 printf_unfiltered ("Warning: Failed to get SE_DEBUG_NAME privilege\n");
581e13c1
MS
1992 printf_unfiltered ("This can cause attach to "
1993 "fail on Windows NT/2K/XP\n");
616a9dc4
CV
1994 }
1995
dc05df57 1996 windows_init_thread_list ();
9d3789f7 1997 ok = DebugActiveProcess (pid);
91a175b3 1998 saw_create = 0;
24e60978 1999
10325bc5 2000#ifdef __CYGWIN__
24e60978 2001 if (!ok)
baa93fa6 2002 {
581e13c1 2003 /* Try fall back to Cygwin pid. */
baa93fa6
CF
2004 pid = cygwin_internal (CW_CYGWIN_PID_TO_WINPID, pid);
2005
2006 if (pid > 0)
2007 ok = DebugActiveProcess (pid);
10325bc5
PA
2008 }
2009#endif
baa93fa6 2010
10325bc5 2011 if (!ok)
c9739b6a
TT
2012 error (_("Can't attach to process %u (error %u)"),
2013 (unsigned) pid, (unsigned) GetLastError ());
24e60978 2014
2b008701 2015 DebugSetProcessKillOnExit (FALSE);
3ade5333 2016
24e60978
SC
2017 if (from_tty)
2018 {
d9fa87f4 2019 const char *exec_file = get_exec_file (0);
24e60978
SC
2020
2021 if (exec_file)
2022 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
a068643d 2023 target_pid_to_str (ptid_t (pid)).c_str ());
24e60978
SC
2024 else
2025 printf_unfiltered ("Attaching to %s\n",
a068643d 2026 target_pid_to_str (ptid_t (pid)).c_str ());
24e60978
SC
2027 }
2028
f6ac5f3d 2029 do_initial_windows_stuff (this, pid, 1);
223ffa71 2030 target_terminal::ours ();
24e60978
SC
2031}
2032
f6ac5f3d
PA
2033void
2034windows_nat_target::detach (inferior *inf, int from_tty)
24e60978 2035{
02cc9f49
CV
2036 int detached = 1;
2037
8473b447 2038 ptid_t ptid = minus_one_ptid;
f6ac5f3d 2039 resume (ptid, 0, GDB_SIGNAL_0);
96998ce7 2040
2b008701
CF
2041 if (!DebugActiveProcessStop (current_event.dwProcessId))
2042 {
d50a0ce2
CV
2043 error (_("Can't detach process %u (error %u)"),
2044 (unsigned) current_event.dwProcessId, (unsigned) GetLastError ());
2b008701 2045 detached = 0;
02cc9f49 2046 }
2b008701
CF
2047 DebugSetProcessKillOnExit (FALSE);
2048
02cc9f49 2049 if (detached && from_tty)
24e60978 2050 {
a121b7c1 2051 const char *exec_file = get_exec_file (0);
24e60978
SC
2052 if (exec_file == 0)
2053 exec_file = "";
d50a0ce2
CV
2054 printf_unfiltered ("Detaching from program: %s, Pid %u\n", exec_file,
2055 (unsigned) current_event.dwProcessId);
24e60978 2056 }
7f9f62ba 2057
df7e5265 2058 x86_cleanup_dregs ();
39f77062 2059 inferior_ptid = null_ptid;
b7a08269 2060 detach_inferior (inf);
7f9f62ba 2061
f6ac5f3d 2062 maybe_unpush_target ();
24e60978
SC
2063}
2064
47f7ffdb
JB
2065/* Try to determine the executable filename.
2066
2067 EXE_NAME_RET is a pointer to a buffer whose size is EXE_NAME_MAX_LEN.
2068
2069 Upon success, the filename is stored inside EXE_NAME_RET, and
2070 this function returns nonzero.
2071
2072 Otherwise, this function returns zero and the contents of
2073 EXE_NAME_RET is undefined. */
2074
2075static int
2076windows_get_exec_module_filename (char *exe_name_ret, size_t exe_name_max_len)
2077{
2078 DWORD len;
2079 HMODULE dh_buf;
2080 DWORD cbNeeded;
2081
2082 cbNeeded = 0;
2083 if (!EnumProcessModules (current_process_handle, &dh_buf,
2084 sizeof (HMODULE), &cbNeeded) || !cbNeeded)
2085 return 0;
2086
2087 /* We know the executable is always first in the list of modules,
2088 which we just fetched. So no need to fetch more. */
2089
2090#ifdef __CYGWIN__
2091 {
2092 /* Cygwin prefers that the path be in /x/y/z format, so extract
2093 the filename into a temporary buffer first, and then convert it
2094 to POSIX format into the destination buffer. */
0ae534d2 2095 cygwin_buf_t *pathbuf = (cygwin_buf_t *) alloca (exe_name_max_len * sizeof (cygwin_buf_t));
47f7ffdb
JB
2096
2097 len = GetModuleFileNameEx (current_process_handle,
2098 dh_buf, pathbuf, exe_name_max_len);
2099 if (len == 0)
2100 error (_("Error getting executable filename: %u."),
2101 (unsigned) GetLastError ());
2102 if (cygwin_conv_path (CCP_WIN_W_TO_POSIX, pathbuf, exe_name_ret,
2103 exe_name_max_len) < 0)
2104 error (_("Error converting executable filename to POSIX: %d."), errno);
2105 }
2106#else
2107 len = GetModuleFileNameEx (current_process_handle,
2108 dh_buf, exe_name_ret, exe_name_max_len);
2109 if (len == 0)
2110 error (_("Error getting executable filename: %u."),
2111 (unsigned) GetLastError ());
2112#endif
2113
2114 return 1; /* success */
2115}
2116
2117/* The pid_to_exec_file target_ops method for this platform. */
2118
f6ac5f3d
PA
2119char *
2120windows_nat_target::pid_to_exec_file (int pid)
47216e51 2121{
b3c613f2 2122 static char path[__PMAX];
10325bc5 2123#ifdef __CYGWIN__
581e13c1 2124 /* Try to find exe name as symlink target of /proc/<pid>/exe. */
33605d39
CF
2125 int nchars;
2126 char procexe[sizeof ("/proc/4294967295/exe")];
08850b56
PM
2127
2128 xsnprintf (procexe, sizeof (procexe), "/proc/%u/exe", pid);
33605d39
CF
2129 nchars = readlink (procexe, path, sizeof(path));
2130 if (nchars > 0 && nchars < sizeof (path))
47216e51 2131 {
33605d39
CF
2132 path[nchars] = '\0'; /* Got it */
2133 return path;
47216e51 2134 }
10325bc5
PA
2135#endif
2136
33605d39 2137 /* If we get here then either Cygwin is hosed, this isn't a Cygwin version
581e13c1 2138 of gdb, or we're trying to debug a non-Cygwin windows executable. */
47f7ffdb 2139 if (!windows_get_exec_module_filename (path, sizeof (path)))
33605d39
CF
2140 path[0] = '\0';
2141
2142 return path;
47216e51
CV
2143}
2144
24e60978
SC
2145/* Print status information about what we're accessing. */
2146
f6ac5f3d
PA
2147void
2148windows_nat_target::files_info ()
24e60978 2149{
181e7f93
PA
2150 struct inferior *inf = current_inferior ();
2151
24e60978 2152 printf_unfiltered ("\tUsing the running image of %s %s.\n",
181e7f93 2153 inf->attach_flag ? "attached" : "child",
a068643d 2154 target_pid_to_str (inferior_ptid).c_str ());
24e60978
SC
2155}
2156
cd44747c
PM
2157/* Modify CreateProcess parameters for use of a new separate console.
2158 Parameters are:
2159 *FLAGS: DWORD parameter for general process creation flags.
2160 *SI: STARTUPINFO structure, for which the console window size and
2161 console buffer size is filled in if GDB is running in a console.
2162 to create the new console.
2163 The size of the used font is not available on all versions of
2164 Windows OS. Furthermore, the current font might not be the default
2165 font, but this is still better than before.
2166 If the windows and buffer sizes are computed,
2167 SI->DWFLAGS is changed so that this information is used
2168 by CreateProcess function. */
2169
2170static void
2171windows_set_console_info (STARTUPINFO *si, DWORD *flags)
2172{
2173 HANDLE hconsole = CreateFile ("CONOUT$", GENERIC_READ | GENERIC_WRITE,
2174 FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, 0);
2175
2176 if (hconsole != INVALID_HANDLE_VALUE)
2177 {
2178 CONSOLE_SCREEN_BUFFER_INFO sbinfo;
2179 COORD font_size;
2180 CONSOLE_FONT_INFO cfi;
2181
2182 GetCurrentConsoleFont (hconsole, FALSE, &cfi);
2183 font_size = GetConsoleFontSize (hconsole, cfi.nFont);
2184 GetConsoleScreenBufferInfo(hconsole, &sbinfo);
2185 si->dwXSize = sbinfo.srWindow.Right - sbinfo.srWindow.Left + 1;
2186 si->dwYSize = sbinfo.srWindow.Bottom - sbinfo.srWindow.Top + 1;
2187 if (font_size.X)
2188 si->dwXSize *= font_size.X;
2189 else
2190 si->dwXSize *= 8;
2191 if (font_size.Y)
2192 si->dwYSize *= font_size.Y;
2193 else
2194 si->dwYSize *= 12;
2195 si->dwXCountChars = sbinfo.dwSize.X;
2196 si->dwYCountChars = sbinfo.dwSize.Y;
2197 si->dwFlags |= STARTF_USESIZE | STARTF_USECOUNTCHARS;
2198 }
2199 *flags |= CREATE_NEW_CONSOLE;
2200}
2201
c93dbcba
EZ
2202#ifndef __CYGWIN__
2203/* Function called by qsort to sort environment strings. */
2204
2205static int
2206envvar_cmp (const void *a, const void *b)
2207{
2208 const char **p = (const char **) a;
2209 const char **q = (const char **) b;
2210 return strcasecmp (*p, *q);
2211}
2212#endif
2213
b7ff339d
CV
2214#ifdef __CYGWIN__
2215static void
2216clear_win32_environment (char **env)
2217{
2218 int i;
2219 size_t len;
2220 wchar_t *copy = NULL, *equalpos;
2221
2222 for (i = 0; env[i] && *env[i]; i++)
2223 {
2224 len = mbstowcs (NULL, env[i], 0) + 1;
2225 copy = (wchar_t *) xrealloc (copy, len * sizeof (wchar_t));
2226 mbstowcs (copy, env[i], len);
2227 equalpos = wcschr (copy, L'=');
2228 if (equalpos)
2229 *equalpos = L'\0';
2230 SetEnvironmentVariableW (copy, NULL);
2231 }
2232 xfree (copy);
2233}
2234#endif
2235
8ba42bc5
EZ
2236#ifndef __CYGWIN__
2237
2238/* Redirection of inferior I/O streams for native MS-Windows programs.
2239 Unlike on Unix, where this is handled by invoking the inferior via
2240 the shell, on MS-Windows we need to emulate the cmd.exe shell.
2241
2242 The official documentation of the cmd.exe redirection features is here:
2243
2244 http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/redirection.mspx
2245
2246 (That page talks about Windows XP, but there's no newer
2247 documentation, so we assume later versions of cmd.exe didn't change
2248 anything.)
2249
2250 Caveat: the documentation on that page seems to include a few lies.
2251 For example, it describes strange constructs 1<&2 and 2<&1, which
2252 seem to work only when 1>&2 resp. 2>&1 would make sense, and so I
2253 think the cmd.exe parser of the redirection symbols simply doesn't
2254 care about the < vs > distinction in these cases. Therefore, the
2255 supported features are explicitly documented below.
2256
2257 The emulation below aims at supporting all the valid use cases
2258 supported by cmd.exe, which include:
2259
2260 < FILE redirect standard input from FILE
2261 0< FILE redirect standard input from FILE
2262 <&N redirect standard input from file descriptor N
2263 0<&N redirect standard input from file descriptor N
2264 > FILE redirect standard output to FILE
2265 >> FILE append standard output to FILE
2266 1>> FILE append standard output to FILE
2267 >&N redirect standard output to file descriptor N
2268 1>&N redirect standard output to file descriptor N
2269 >>&N append standard output to file descriptor N
2270 1>>&N append standard output to file descriptor N
2271 2> FILE redirect standard error to FILE
2272 2>> FILE append standard error to FILE
2273 2>&N redirect standard error to file descriptor N
2274 2>>&N append standard error to file descriptor N
2275
2276 Note that using N > 2 in the above construct is supported, but
2277 requires that the corresponding file descriptor be open by some
2278 means elsewhere or outside GDB. Also note that using ">&0" or
2279 "<&2" will generally fail, because the file descriptor redirected
2280 from is normally open in an incompatible mode (e.g., FD 0 is open
2281 for reading only). IOW, use of such tricks is not recommended;
2282 you are on your own.
2283
2284 We do NOT support redirection of file descriptors above 2, as in
2285 "3>SOME-FILE", because MinGW compiled programs don't (supporting
2286 that needs special handling in the startup code that MinGW
2287 doesn't have). Pipes are also not supported.
2288
2289 As for invalid use cases, where the redirection contains some
2290 error, the emulation below will detect that and produce some
2291 error and/or failure. But the behavior in those cases is not
2292 bug-for-bug compatible with what cmd.exe does in those cases.
2293 That's because what cmd.exe does then is not well defined, and
2294 seems to be a side effect of the cmd.exe parsing of the command
2295 line more than anything else. For example, try redirecting to an
2296 invalid file name, as in "> foo:bar".
2297
2298 There are also minor syntactic deviations from what cmd.exe does
2299 in some corner cases. For example, it doesn't support the likes
2300 of "> &foo" to mean redirect to file named literally "&foo"; we
2301 do support that here, because that, too, sounds like some issue
2302 with the cmd.exe parser. Another nicety is that we support
2303 redirection targets that use file names with forward slashes,
2304 something cmd.exe doesn't -- this comes in handy since GDB
2305 file-name completion can be used when typing the command line for
2306 the inferior. */
2307
2308/* Support routines for redirecting standard handles of the inferior. */
2309
2310/* Parse a single redirection spec, open/duplicate the specified
2311 file/fd, and assign the appropriate value to one of the 3 standard
2312 file descriptors. */
2313static int
2314redir_open (const char *redir_string, int *inp, int *out, int *err)
2315{
2316 int *fd, ref_fd = -2;
2317 int mode;
2318 const char *fname = redir_string + 1;
2319 int rc = *redir_string;
2320
2321 switch (rc)
2322 {
2323 case '0':
2324 fname++;
2325 /* FALLTHROUGH */
2326 case '<':
2327 fd = inp;
2328 mode = O_RDONLY;
2329 break;
2330 case '1': case '2':
2331 fname++;
2332 /* FALLTHROUGH */
2333 case '>':
2334 fd = (rc == '2') ? err : out;
2335 mode = O_WRONLY | O_CREAT;
2336 if (*fname == '>')
2337 {
2338 fname++;
2339 mode |= O_APPEND;
2340 }
2341 else
2342 mode |= O_TRUNC;
2343 break;
2344 default:
2345 return -1;
2346 }
2347
2348 if (*fname == '&' && '0' <= fname[1] && fname[1] <= '9')
2349 {
2350 /* A reference to a file descriptor. */
2351 char *fdtail;
2352 ref_fd = (int) strtol (fname + 1, &fdtail, 10);
2353 if (fdtail > fname + 1 && *fdtail == '\0')
2354 {
2355 /* Don't allow redirection when open modes are incompatible. */
2356 if ((ref_fd == 0 && (fd == out || fd == err))
2357 || ((ref_fd == 1 || ref_fd == 2) && fd == inp))
2358 {
2359 errno = EPERM;
2360 return -1;
2361 }
2362 if (ref_fd == 0)
2363 ref_fd = *inp;
2364 else if (ref_fd == 1)
2365 ref_fd = *out;
2366 else if (ref_fd == 2)
2367 ref_fd = *err;
2368 }
2369 else
2370 {
2371 errno = EBADF;
2372 return -1;
2373 }
2374 }
2375 else
2376 fname++; /* skip the separator space */
2377 /* If the descriptor is already open, close it. This allows
2378 multiple specs of redirections for the same stream, which is
2379 somewhat nonsensical, but still valid and supported by cmd.exe.
2380 (But cmd.exe only opens a single file in this case, the one
2381 specified by the last redirection spec on the command line.) */
2382 if (*fd >= 0)
2383 _close (*fd);
2384 if (ref_fd == -2)
2385 {
2386 *fd = _open (fname, mode, _S_IREAD | _S_IWRITE);
2387 if (*fd < 0)
2388 return -1;
2389 }
2390 else if (ref_fd == -1)
2391 *fd = -1; /* reset to default destination */
2392 else
2393 {
2394 *fd = _dup (ref_fd);
2395 if (*fd < 0)
2396 return -1;
2397 }
2398 /* _open just sets a flag for O_APPEND, which won't be passed to the
2399 inferior, so we need to actually move the file pointer. */
2400 if ((mode & O_APPEND) != 0)
2401 _lseek (*fd, 0L, SEEK_END);
2402 return 0;
2403}
2404
2405/* Canonicalize a single redirection spec and set up the corresponding
2406 file descriptor as specified. */
2407static int
2408redir_set_redirection (const char *s, int *inp, int *out, int *err)
2409{
2410 char buf[__PMAX + 2 + 5]; /* extra space for quotes & redirection string */
2411 char *d = buf;
2412 const char *start = s;
2413 int quote = 0;
2414
2415 *d++ = *s++; /* copy the 1st character, < or > or a digit */
2416 if ((*start == '>' || *start == '1' || *start == '2')
2417 && *s == '>')
2418 {
2419 *d++ = *s++;
2420 if (*s == '>' && *start != '>')
2421 *d++ = *s++;
2422 }
2423 else if (*start == '0' && *s == '<')
2424 *d++ = *s++;
2425 /* cmd.exe recognizes "&N" only immediately after the redirection symbol. */
2426 if (*s != '&')
2427 {
2428 while (isspace (*s)) /* skip whitespace before file name */
2429 s++;
2430 *d++ = ' '; /* separate file name with a single space */
2431 }
2432
2433 /* Copy the file name. */
2434 while (*s)
2435 {
2436 /* Remove quoting characters from the file name in buf[]. */
2437 if (*s == '"') /* could support '..' quoting here */
2438 {
2439 if (!quote)
2440 quote = *s++;
2441 else if (*s == quote)
2442 {
2443 quote = 0;
2444 s++;
2445 }
2446 else
2447 *d++ = *s++;
2448 }
2449 else if (*s == '\\')
2450 {
2451 if (s[1] == '"') /* could support '..' here */
2452 s++;
2453 *d++ = *s++;
2454 }
2455 else if (isspace (*s) && !quote)
2456 break;
2457 else
2458 *d++ = *s++;
2459 if (d - buf >= sizeof (buf) - 1)
2460 {
2461 errno = ENAMETOOLONG;
2462 return 0;
2463 }
2464 }
2465 *d = '\0';
2466
2467 /* Windows doesn't allow redirection characters in file names, so we
2468 can bail out early if they use them, or if there's no target file
2469 name after the redirection symbol. */
2470 if (d[-1] == '>' || d[-1] == '<')
2471 {
2472 errno = ENOENT;
2473 return 0;
2474 }
2475 if (redir_open (buf, inp, out, err) == 0)
2476 return s - start;
2477 return 0;
2478}
2479
2480/* Parse the command line for redirection specs and prepare the file
2481 descriptors for the 3 standard streams accordingly. */
2482static bool
2483redirect_inferior_handles (const char *cmd_orig, char *cmd,
2484 int *inp, int *out, int *err)
2485{
2486 const char *s = cmd_orig;
2487 char *d = cmd;
2488 int quote = 0;
2489 bool retval = false;
2490
2491 while (isspace (*s))
2492 *d++ = *s++;
2493
2494 while (*s)
2495 {
2496 if (*s == '"') /* could also support '..' quoting here */
2497 {
2498 if (!quote)
2499 quote = *s;
2500 else if (*s == quote)
2501 quote = 0;
2502 }
2503 else if (*s == '\\')
2504 {
2505 if (s[1] == '"') /* escaped quote char */
2506 s++;
2507 }
2508 else if (!quote)
2509 {
2510 /* Process a single redirection candidate. */
2511 if (*s == '<' || *s == '>'
2512 || ((*s == '1' || *s == '2') && s[1] == '>')
2513 || (*s == '0' && s[1] == '<'))
2514 {
2515 int skip = redir_set_redirection (s, inp, out, err);
2516
2517 if (skip <= 0)
2518 return false;
2519 retval = true;
2520 s += skip;
2521 }
2522 }
2523 if (*s)
2524 *d++ = *s++;
2525 }
2526 *d = '\0';
2527 return retval;
2528}
2529#endif /* !__CYGWIN__ */
2530
dc05df57 2531/* Start an inferior windows child process and sets inferior_ptid to its pid.
24e60978
SC
2532 EXEC_FILE is the file to run.
2533 ALLARGS is a string containing the arguments to the program.
2534 ENV is the environment vector to pass. Errors reported with error(). */
2535
f6ac5f3d
PA
2536void
2537windows_nat_target::create_inferior (const char *exec_file,
2538 const std::string &origallargs,
2539 char **in_env, int from_tty)
24e60978 2540{
b3c613f2 2541 STARTUPINFO si;
41b4aadc 2542#ifdef __CYGWIN__
b3c613f2
CF
2543 cygwin_buf_t real_path[__PMAX];
2544 cygwin_buf_t shell[__PMAX]; /* Path to shell */
d092c5a2 2545 cygwin_buf_t infcwd[__PMAX];
d0d0ab16 2546 const char *sh;
b3c613f2
CF
2547 cygwin_buf_t *toexec;
2548 cygwin_buf_t *cygallargs;
2549 cygwin_buf_t *args;
b7ff339d
CV
2550 char **old_env = NULL;
2551 PWCHAR w32_env;
d0d0ab16 2552 size_t len;
2becadee
CF
2553 int tty;
2554 int ostdin, ostdout, ostderr;
8ba42bc5 2555#else /* !__CYGWIN__ */
b3c613f2 2556 char shell[__PMAX]; /* Path to shell */
5430098f 2557 const char *toexec;
8ba42bc5
EZ
2558 char *args, *allargs_copy;
2559 size_t args_len, allargs_len;
2560 int fd_inp = -1, fd_out = -1, fd_err = -1;
2561 HANDLE tty = INVALID_HANDLE_VALUE;
8ba42bc5 2562 bool redirected = false;
c93dbcba
EZ
2563 char *w32env;
2564 char *temp;
2565 size_t envlen;
2566 int i;
2567 size_t envsize;
2568 char **env;
8ba42bc5 2569#endif /* !__CYGWIN__ */
096c92dd 2570 const char *allargs = origallargs.c_str ();
d0d0ab16
CV
2571 PROCESS_INFORMATION pi;
2572 BOOL ret;
2573 DWORD flags = 0;
3cb3b8df 2574 const char *inferior_io_terminal = get_inferior_io_terminal ();
24e60978
SC
2575
2576 if (!exec_file)
8a3fe4f8 2577 error (_("No executable specified, use `target exec'."));
24e60978 2578
d092c5a2
SDJ
2579 const char *inferior_cwd = get_inferior_cwd ();
2580 std::string expanded_infcwd;
2581 if (inferior_cwd != NULL)
2582 {
2583 expanded_infcwd = gdb_tilde_expand (inferior_cwd);
2584 /* Mirror slashes on inferior's cwd. */
2585 std::replace (expanded_infcwd.begin (), expanded_infcwd.end (),
2586 '/', '\\');
2587 inferior_cwd = expanded_infcwd.c_str ();
2588 }
2589
24e60978
SC
2590 memset (&si, 0, sizeof (si));
2591 si.cb = sizeof (si);
2592
d0d0ab16
CV
2593 if (new_group)
2594 flags |= CREATE_NEW_PROCESS_GROUP;
2595
2596 if (new_console)
cd44747c 2597 windows_set_console_info (&si, &flags);
d0d0ab16 2598
10325bc5 2599#ifdef __CYGWIN__
349b409f 2600 if (!useshell)
dfe7f3ac 2601 {
d0d0ab16
CV
2602 flags |= DEBUG_ONLY_THIS_PROCESS;
2603 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, exec_file, real_path,
b3c613f2 2604 __PMAX * sizeof (cygwin_buf_t)) < 0)
d0d0ab16 2605 error (_("Error starting executable: %d"), errno);
dfe7f3ac 2606 toexec = real_path;
b3c613f2 2607#ifdef __USEWIDE
d0d0ab16
CV
2608 len = mbstowcs (NULL, allargs, 0) + 1;
2609 if (len == (size_t) -1)
2610 error (_("Error starting executable: %d"), errno);
2611 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2612 mbstowcs (cygallargs, allargs, len);
8ba42bc5 2613#else /* !__USEWIDE */
60c5c021 2614 cygallargs = allargs;
b3c613f2 2615#endif
dfe7f3ac
CF
2616 }
2617 else
2618 {
974e6844 2619 sh = get_shell ();
b3c613f2 2620 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, sh, shell, __PMAX) < 0)
d0d0ab16 2621 error (_("Error starting executable via shell: %d"), errno);
b3c613f2 2622#ifdef __USEWIDE
d0d0ab16
CV
2623 len = sizeof (L" -c 'exec '") + mbstowcs (NULL, exec_file, 0)
2624 + mbstowcs (NULL, allargs, 0) + 2;
2625 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2626 swprintf (cygallargs, len, L" -c 'exec %s %s'", exec_file, allargs);
8ba42bc5 2627#else /* !__USEWIDE */
08850b56
PM
2628 len = (sizeof (" -c 'exec '") + strlen (exec_file)
2629 + strlen (allargs) + 2);
2630 cygallargs = (char *) alloca (len);
2631 xsnprintf (cygallargs, len, " -c 'exec %s %s'", exec_file, allargs);
8ba42bc5 2632#endif /* __USEWIDE */
dfe7f3ac 2633 toexec = shell;
d0d0ab16 2634 flags |= DEBUG_PROCESS;
dfe7f3ac 2635 }
b3c613f2 2636
d092c5a2
SDJ
2637 if (inferior_cwd != NULL
2638 && cygwin_conv_path (CCP_POSIX_TO_WIN_W, inferior_cwd,
2639 infcwd, strlen (inferior_cwd)) < 0)
2640 error (_("Error converting inferior cwd: %d"), errno);
2641
b3c613f2
CF
2642#ifdef __USEWIDE
2643 args = (cygwin_buf_t *) alloca ((wcslen (toexec) + wcslen (cygallargs) + 2)
2644 * sizeof (wchar_t));
d0d0ab16
CV
2645 wcscpy (args, toexec);
2646 wcscat (args, L" ");
2647 wcscat (args, cygallargs);
8ba42bc5 2648#else /* !__USEWIDE */
b3c613f2
CF
2649 args = (cygwin_buf_t *) alloca (strlen (toexec) + strlen (cygallargs) + 2);
2650 strcpy (args, toexec);
2651 strcat (args, " ");
2652 strcat (args, cygallargs);
8ba42bc5 2653#endif /* !__USEWIDE */
b3c613f2 2654
b7ff339d
CV
2655#ifdef CW_CVT_ENV_TO_WINENV
2656 /* First try to create a direct Win32 copy of the POSIX environment. */
2657 w32_env = (PWCHAR) cygwin_internal (CW_CVT_ENV_TO_WINENV, in_env);
2658 if (w32_env != (PWCHAR) -1)
2659 flags |= CREATE_UNICODE_ENVIRONMENT;
2660 else
2661 /* If that fails, fall back to old method tweaking GDB's environment. */
8ba42bc5 2662#endif /* CW_CVT_ENV_TO_WINENV */
b7ff339d
CV
2663 {
2664 /* Reset all Win32 environment variables to avoid leftover on next run. */
2665 clear_win32_environment (environ);
2666 /* Prepare the environment vars for CreateProcess. */
2667 old_env = environ;
2668 environ = in_env;
2669 cygwin_internal (CW_SYNC_WINENV);
2670 w32_env = NULL;
2671 }
1750a5ef 2672
2becadee
CF
2673 if (!inferior_io_terminal)
2674 tty = ostdin = ostdout = ostderr = -1;
2675 else
2676 {
2677 tty = open (inferior_io_terminal, O_RDWR | O_NOCTTY);
2678 if (tty < 0)
2679 {
2680 print_sys_errmsg (inferior_io_terminal, errno);
2681 ostdin = ostdout = ostderr = -1;
2682 }
2683 else
2684 {
2685 ostdin = dup (0);
2686 ostdout = dup (1);
2687 ostderr = dup (2);
2688 dup2 (tty, 0);
2689 dup2 (tty, 1);
2690 dup2 (tty, 2);
2691 }
2692 }
d0d0ab16
CV
2693
2694 windows_init_thread_list ();
b3c613f2
CF
2695 ret = CreateProcess (0,
2696 args, /* command line */
2697 NULL, /* Security */
2698 NULL, /* thread */
2699 TRUE, /* inherit handles */
2700 flags, /* start flags */
b7ff339d 2701 w32_env, /* environment */
d092c5a2
SDJ
2702 inferior_cwd != NULL ? infcwd : NULL, /* current
2703 directory */
b3c613f2
CF
2704 &si,
2705 &pi);
b7ff339d
CV
2706 if (w32_env)
2707 /* Just free the Win32 environment, if it could be created. */
2708 free (w32_env);
2709 else
2710 {
2711 /* Reset all environment variables to avoid leftover on next run. */
2712 clear_win32_environment (in_env);
2713 /* Restore normal GDB environment variables. */
2714 environ = old_env;
2715 cygwin_internal (CW_SYNC_WINENV);
2716 }
2717
d0d0ab16
CV
2718 if (tty >= 0)
2719 {
6af79d7b 2720 ::close (tty);
d0d0ab16
CV
2721 dup2 (ostdin, 0);
2722 dup2 (ostdout, 1);
2723 dup2 (ostderr, 2);
6af79d7b
JT
2724 ::close (ostdin);
2725 ::close (ostdout);
2726 ::close (ostderr);
d0d0ab16 2727 }
8ba42bc5
EZ
2728#else /* !__CYGWIN__ */
2729 allargs_len = strlen (allargs);
2730 allargs_copy = strcpy ((char *) alloca (allargs_len + 1), allargs);
2731 if (strpbrk (allargs_copy, "<>") != NULL)
2732 {
2733 int e = errno;
2734 errno = 0;
2735 redirected =
2736 redirect_inferior_handles (allargs, allargs_copy,
2737 &fd_inp, &fd_out, &fd_err);
2738 if (errno)
6d91ce9a 2739 warning (_("Error in redirection: %s."), safe_strerror (errno));
8ba42bc5
EZ
2740 else
2741 errno = e;
2742 allargs_len = strlen (allargs_copy);
2743 }
2744 /* If not all the standard streams are redirected by the command
2745 line, use inferior_io_terminal for those which aren't. */
2746 if (inferior_io_terminal
2747 && !(fd_inp >= 0 && fd_out >= 0 && fd_err >= 0))
41b4aadc
CF
2748 {
2749 SECURITY_ATTRIBUTES sa;
2750 sa.nLength = sizeof(sa);
2751 sa.lpSecurityDescriptor = 0;
2752 sa.bInheritHandle = TRUE;
2753 tty = CreateFileA (inferior_io_terminal, GENERIC_READ | GENERIC_WRITE,
2754 0, &sa, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
2755 if (tty == INVALID_HANDLE_VALUE)
2756 warning (_("Warning: Failed to open TTY %s, error %#x."),
2757 inferior_io_terminal, (unsigned) GetLastError ());
8ba42bc5
EZ
2758 }
2759 if (redirected || tty != INVALID_HANDLE_VALUE)
2760 {
2761 if (fd_inp >= 0)
2762 si.hStdInput = (HANDLE) _get_osfhandle (fd_inp);
2763 else if (tty != INVALID_HANDLE_VALUE)
2764 si.hStdInput = tty;
41b4aadc 2765 else
8ba42bc5
EZ
2766 si.hStdInput = GetStdHandle (STD_INPUT_HANDLE);
2767 if (fd_out >= 0)
2768 si.hStdOutput = (HANDLE) _get_osfhandle (fd_out);
2769 else if (tty != INVALID_HANDLE_VALUE)
2770 si.hStdOutput = tty;
2771 else
2772 si.hStdOutput = GetStdHandle (STD_OUTPUT_HANDLE);
2773 if (fd_err >= 0)
2774 si.hStdError = (HANDLE) _get_osfhandle (fd_err);
2775 else if (tty != INVALID_HANDLE_VALUE)
2776 si.hStdError = tty;
2777 else
2778 si.hStdError = GetStdHandle (STD_ERROR_HANDLE);
2779 si.dwFlags |= STARTF_USESTDHANDLES;
41b4aadc 2780 }
2becadee 2781
8ba42bc5
EZ
2782 toexec = exec_file;
2783 /* Build the command line, a space-separated list of tokens where
2784 the first token is the name of the module to be executed.
2785 To avoid ambiguities introduced by spaces in the module name,
2786 we quote it. */
2787 args_len = strlen (toexec) + 2 /* quotes */ + allargs_len + 2;
2788 args = (char *) alloca (args_len);
2789 xsnprintf (args, args_len, "\"%s\" %s", toexec, allargs_copy);
2790
2791 flags |= DEBUG_ONLY_THIS_PROCESS;
2792
c93dbcba
EZ
2793 /* CreateProcess takes the environment list as a null terminated set of
2794 strings (i.e. two nulls terminate the list). */
2795
2796 /* Get total size for env strings. */
2797 for (envlen = 0, i = 0; in_env[i] && *in_env[i]; i++)
2798 envlen += strlen (in_env[i]) + 1;
2799
2800 envsize = sizeof (in_env[0]) * (i + 1);
2801 env = (char **) alloca (envsize);
2802 memcpy (env, in_env, envsize);
2803 /* Windows programs expect the environment block to be sorted. */
2804 qsort (env, i, sizeof (char *), envvar_cmp);
2805
0ae1c716 2806 w32env = (char *) alloca (envlen + 1);
c93dbcba
EZ
2807
2808 /* Copy env strings into new buffer. */
2809 for (temp = w32env, i = 0; env[i] && *env[i]; i++)
2810 {
2811 strcpy (temp, env[i]);
2812 temp += strlen (temp) + 1;
2813 }
2814
2815 /* Final nil string to terminate new env. */
2816 *temp = 0;
2817
dc05df57 2818 windows_init_thread_list ();
d0d0ab16
CV
2819 ret = CreateProcessA (0,
2820 args, /* command line */
2821 NULL, /* Security */
2822 NULL, /* thread */
2823 TRUE, /* inherit handles */
2824 flags, /* start flags */
c93dbcba 2825 w32env, /* environment */
d092c5a2 2826 inferior_cwd, /* current directory */
d0d0ab16
CV
2827 &si,
2828 &pi);
41b4aadc
CF
2829 if (tty != INVALID_HANDLE_VALUE)
2830 CloseHandle (tty);
8ba42bc5
EZ
2831 if (fd_inp >= 0)
2832 _close (fd_inp);
2833 if (fd_out >= 0)
2834 _close (fd_out);
2835 if (fd_err >= 0)
2836 _close (fd_err);
2837#endif /* !__CYGWIN__ */
2becadee 2838
24e60978 2839 if (!ret)
d50a0ce2 2840 error (_("Error creating process %s, (error %u)."),
8a3fe4f8 2841 exec_file, (unsigned) GetLastError ());
24e60978 2842
c1766e7d
PM
2843 CloseHandle (pi.hThread);
2844 CloseHandle (pi.hProcess);
2845
dfe7f3ac
CF
2846 if (useshell && shell[0] != '\0')
2847 saw_create = -1;
2848 else
2849 saw_create = 0;
2850
f6ac5f3d 2851 do_initial_windows_stuff (this, pi.dwProcessId, 0);
d3a09475 2852
17617f2d 2853 /* windows_continue (DBG_CONTINUE, -1, 0); */
24e60978
SC
2854}
2855
f6ac5f3d
PA
2856void
2857windows_nat_target::mourn_inferior ()
24e60978 2858{
17617f2d 2859 (void) windows_continue (DBG_CONTINUE, -1, 0);
df7e5265 2860 x86_cleanup_dregs();
bf25528d
CF
2861 if (open_process_used)
2862 {
2863 CHECK (CloseHandle (current_process_handle));
2864 open_process_used = 0;
2865 }
f6ac5f3d 2866 inf_child_target::mourn_inferior ();
24e60978
SC
2867}
2868
24e60978 2869/* Send a SIGINT to the process group. This acts just like the user typed a
581e13c1 2870 ^C on the controlling terminal. */
24e60978 2871
f6ac5f3d
PA
2872void
2873windows_nat_target::interrupt ()
24e60978 2874{
1ef980b9 2875 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
1e37c281 2876 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
3a4b77d8 2877 registers_changed (); /* refresh register state */
24e60978
SC
2878}
2879
44f38867
PA
2880/* Helper for windows_xfer_partial that handles memory transfers.
2881 Arguments are like target_xfer_partial. */
2882
9b409511 2883static enum target_xfer_status
44f38867 2884windows_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
9b409511 2885 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
24e60978 2886{
5732a500 2887 SIZE_T done = 0;
44f38867 2888 BOOL success;
9e52adf9 2889 DWORD lasterror = 0;
44f38867
PA
2890
2891 if (writebuf != NULL)
24e60978 2892 {
a2388568 2893 DEBUG_MEM (("gdb: write target memory, %s bytes at %s\n",
b55e14c7 2894 pulongest (len), core_addr_to_string (memaddr)));
44f38867
PA
2895 success = WriteProcessMemory (current_process_handle,
2896 (LPVOID) (uintptr_t) memaddr, writebuf,
2897 len, &done);
9e52adf9 2898 if (!success)
7126d5c8 2899 lasterror = GetLastError ();
2b008701 2900 FlushInstructionCache (current_process_handle,
2c647436 2901 (LPCVOID) (uintptr_t) memaddr, len);
24e60978
SC
2902 }
2903 else
2904 {
a2388568 2905 DEBUG_MEM (("gdb: read target memory, %s bytes at %s\n",
b55e14c7 2906 pulongest (len), core_addr_to_string (memaddr)));
44f38867
PA
2907 success = ReadProcessMemory (current_process_handle,
2908 (LPCVOID) (uintptr_t) memaddr, readbuf,
2909 len, &done);
9e52adf9 2910 if (!success)
7126d5c8 2911 lasterror = GetLastError ();
24e60978 2912 }
9b409511 2913 *xfered_len = (ULONGEST) done;
9e52adf9 2914 if (!success && lasterror == ERROR_PARTIAL_COPY && done > 0)
9b409511 2915 return TARGET_XFER_OK;
9e52adf9 2916 else
9b409511 2917 return success ? TARGET_XFER_OK : TARGET_XFER_E_IO;
24e60978
SC
2918}
2919
f6ac5f3d
PA
2920void
2921windows_nat_target::kill ()
24e60978 2922{
3cee93ac
CF
2923 CHECK (TerminateProcess (current_process_handle, 0));
2924
b5edcb45
ILT
2925 for (;;)
2926 {
17617f2d 2927 if (!windows_continue (DBG_CONTINUE, -1, 1))
b5edcb45 2928 break;
3cee93ac 2929 if (!WaitForDebugEvent (&current_event, INFINITE))
b5edcb45 2930 break;
3cee93ac 2931 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
b5edcb45
ILT
2932 break;
2933 }
2934
9eee20eb 2935 target_mourn_inferior (inferior_ptid); /* Or just windows_mourn_inferior? */
24e60978
SC
2936}
2937
f6ac5f3d
PA
2938void
2939windows_nat_target::close ()
24e60978 2940{
dc05df57 2941 DEBUG_EVENTS (("gdb: windows_close, inferior_ptid=%d\n",
e99b03dc 2942 inferior_ptid.pid ()));
24e60978 2943}
1ef980b9 2944
581e13c1 2945/* Convert pid to printable format. */
a068643d 2946std::string
f6ac5f3d 2947windows_nat_target::pid_to_str (ptid_t ptid)
24e60978 2948{
cc6bcb54 2949 if (ptid.tid () != 0)
a068643d 2950 return string_printf ("Thread %d.0x%lx", ptid.pid (), ptid.tid ());
2dc38344
PA
2951
2952 return normal_pid_to_str (ptid);
3ee6f623
CF
2953}
2954
9b409511 2955static enum target_xfer_status
dc05df57 2956windows_xfer_shared_libraries (struct target_ops *ops,
9b409511
YQ
2957 enum target_object object, const char *annex,
2958 gdb_byte *readbuf, const gdb_byte *writebuf,
2959 ULONGEST offset, ULONGEST len,
2960 ULONGEST *xfered_len)
3cb8e7f6 2961{
de1b3c3d
PA
2962 struct obstack obstack;
2963 const char *buf;
2964 LONGEST len_avail;
3cb8e7f6 2965 struct so_list *so;
3cb8e7f6 2966
de1b3c3d 2967 if (writebuf)
2ed4b548 2968 return TARGET_XFER_E_IO;
3cb8e7f6 2969
de1b3c3d
PA
2970 obstack_init (&obstack);
2971 obstack_grow_str (&obstack, "<library-list>\n");
2972 for (so = solib_start.next; so; so = so->next)
d0e449a1
SM
2973 {
2974 lm_info_windows *li = (lm_info_windows *) so->lm_info;
2975
2976 windows_xfer_shared_library (so->so_name, (CORE_ADDR)
2977 (uintptr_t) li->load_addr,
c162ed3e 2978 &li->text_offset,
d0e449a1
SM
2979 target_gdbarch (), &obstack);
2980 }
de1b3c3d 2981 obstack_grow_str0 (&obstack, "</library-list>\n");
3cb8e7f6 2982
0ae1c716 2983 buf = (const char *) obstack_finish (&obstack);
de1b3c3d
PA
2984 len_avail = strlen (buf);
2985 if (offset >= len_avail)
49dc7f4b
PM
2986 len= 0;
2987 else
2988 {
2989 if (len > len_avail - offset)
2990 len = len_avail - offset;
2991 memcpy (readbuf, buf + offset, len);
2992 }
3cb8e7f6 2993
de1b3c3d 2994 obstack_free (&obstack, NULL);
9b409511 2995 *xfered_len = (ULONGEST) len;
0837c976 2996 return len != 0 ? TARGET_XFER_OK : TARGET_XFER_EOF;
3cb8e7f6
CF
2997}
2998
f6ac5f3d
PA
2999enum target_xfer_status
3000windows_nat_target::xfer_partial (enum target_object object,
3001 const char *annex, gdb_byte *readbuf,
2f4f025f
TT
3002 const gdb_byte *writebuf, ULONGEST offset,
3003 ULONGEST len, ULONGEST *xfered_len)
3cb8e7f6 3004{
de1b3c3d 3005 switch (object)
3cb8e7f6 3006 {
de1b3c3d 3007 case TARGET_OBJECT_MEMORY:
9b409511 3008 return windows_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
de1b3c3d
PA
3009
3010 case TARGET_OBJECT_LIBRARIES:
f6ac5f3d 3011 return windows_xfer_shared_libraries (this, object, annex, readbuf,
9b409511 3012 writebuf, offset, len, xfered_len);
3929abe9 3013
de1b3c3d 3014 default:
2f4f025f 3015 if (beneath () == NULL)
178d6a63
JB
3016 {
3017 /* This can happen when requesting the transfer of unsupported
3018 objects before a program has been started (and therefore
3019 with the current_target having no target beneath). */
3020 return TARGET_XFER_E_IO;
3021 }
2f4f025f
TT
3022 return beneath ()->xfer_partial (object, annex,
3023 readbuf, writebuf, offset, len,
3024 xfered_len);
3929abe9 3025 }
02c5aecd
CF
3026}
3027
711e434b
PM
3028/* Provide thread local base, i.e. Thread Information Block address.
3029 Returns 1 if ptid is found and sets *ADDR to thread_local_base. */
3030
57810aa7 3031bool
f6ac5f3d 3032windows_nat_target::get_tib_address (ptid_t ptid, CORE_ADDR *addr)
711e434b 3033{
876d1cd7 3034 windows_thread_info *th;
711e434b 3035
cc6bcb54 3036 th = thread_rec (ptid.tid (), 0);
711e434b 3037 if (th == NULL)
57810aa7 3038 return false;
711e434b
PM
3039
3040 if (addr != NULL)
3041 *addr = th->thread_local_base;
3042
57810aa7 3043 return true;
711e434b
PM
3044}
3045
f6ac5f3d
PA
3046ptid_t
3047windows_nat_target::get_ada_task_ptid (long lwp, long thread)
1e2f1c5c 3048{
e99b03dc 3049 return ptid_t (inferior_ptid.pid (), 0, lwp);
1e2f1c5c
JB
3050}
3051
24cdb46e
РИ
3052/* Implementation of the to_thread_name method. */
3053
f6ac5f3d
PA
3054const char *
3055windows_nat_target::thread_name (struct thread_info *thr)
24cdb46e 3056{
cc6bcb54 3057 return thread_rec (thr->ptid.tid (), 0)->name;
24cdb46e
РИ
3058}
3059
24e60978 3060
6c265988 3061void _initialize_windows_nat ();
24e60978 3062void
6c265988 3063_initialize_windows_nat ()
24e60978 3064{
df7e5265
GB
3065 x86_dr_low.set_control = cygwin_set_dr7;
3066 x86_dr_low.set_addr = cygwin_set_dr;
3067 x86_dr_low.get_addr = cygwin_get_dr;
3068 x86_dr_low.get_status = cygwin_get_dr6;
3069 x86_dr_low.get_control = cygwin_get_dr7;
51a9c8c5 3070
df7e5265
GB
3071 /* x86_dr_low.debug_register_length field is set by
3072 calling x86_set_debug_register_length function
51a9c8c5 3073 in processor windows specific native file. */
fa58ee11 3074
d9f719f1 3075 add_inf_child_target (&the_windows_nat_target);
1ef980b9 3076
d0d0ab16
CV
3077#ifdef __CYGWIN__
3078 cygwin_internal (CW_SET_DOS_FILE_WARNING, 0);
3079#endif
3080
463888ab
РИ
3081 add_com ("signal-event", class_run, signal_event_command, _("\
3082Signal a crashed process with event ID, to allow its debugging.\n\
3083This command is needed in support of setting up GDB as JIT debugger on \
3084MS-Windows. The command should be invoked from the GDB command line using \
3085the '-ex' command-line option. The ID of the event that blocks the \
3086crashed process will be supplied by the Windows JIT debugging mechanism."));
3087
10325bc5 3088#ifdef __CYGWIN__
5bf193a2
AC
3089 add_setshow_boolean_cmd ("shell", class_support, &useshell, _("\
3090Set use of shell to start subprocess."), _("\
3091Show use of shell to start subprocess."), NULL,
3092 NULL,
3093 NULL, /* FIXME: i18n: */
3094 &setlist, &showlist);
3095
581e13c1
MS
3096 add_setshow_boolean_cmd ("cygwin-exceptions", class_support,
3097 &cygwin_exceptions, _("\
09280ddf
CF
3098Break when an exception is detected in the Cygwin DLL itself."), _("\
3099Show whether gdb breaks on exceptions in the Cygwin DLL itself."), NULL,
3100 NULL,
3101 NULL, /* FIXME: i18n: */
3102 &setlist, &showlist);
10325bc5 3103#endif
09280ddf 3104
5bf193a2
AC
3105 add_setshow_boolean_cmd ("new-console", class_support, &new_console, _("\
3106Set creation of new console when creating child process."), _("\
3107Show creation of new console when creating child process."), NULL,
3108 NULL,
3109 NULL, /* FIXME: i18n: */
3110 &setlist, &showlist);
3111
3112 add_setshow_boolean_cmd ("new-group", class_support, &new_group, _("\
3113Set creation of new group when creating child process."), _("\
3114Show creation of new group when creating child process."), NULL,
3115 NULL,
3116 NULL, /* FIXME: i18n: */
3117 &setlist, &showlist);
3118
3119 add_setshow_boolean_cmd ("debugexec", class_support, &debug_exec, _("\
3120Set whether to display execution in child process."), _("\
3121Show whether to display execution in child process."), NULL,
3122 NULL,
3123 NULL, /* FIXME: i18n: */
3124 &setlist, &showlist);
3125
3126 add_setshow_boolean_cmd ("debugevents", class_support, &debug_events, _("\
3127Set whether to display kernel events in child process."), _("\
3128Show whether to display kernel events in child process."), NULL,
3129 NULL,
3130 NULL, /* FIXME: i18n: */
3131 &setlist, &showlist);
3132
3133 add_setshow_boolean_cmd ("debugmemory", class_support, &debug_memory, _("\
3134Set whether to display memory accesses in child process."), _("\
3135Show whether to display memory accesses in child process."), NULL,
3136 NULL,
3137 NULL, /* FIXME: i18n: */
3138 &setlist, &showlist);
3139
3140 add_setshow_boolean_cmd ("debugexceptions", class_support,
3141 &debug_exceptions, _("\
3142Set whether to display kernel exceptions in child process."), _("\
3143Show whether to display kernel exceptions in child process."), NULL,
3144 NULL,
3145 NULL, /* FIXME: i18n: */
3146 &setlist, &showlist);
1ef980b9 3147
711e434b 3148 init_w32_command_list ();
c1748f97
PM
3149
3150 add_cmd ("selector", class_info, display_selectors,
1a966eab 3151 _("Display selectors infos."),
c1748f97 3152 &info_w32_cmdlist);
24e60978 3153}
3cee93ac 3154
fa4ba8da
PM
3155/* Hardware watchpoint support, adapted from go32-nat.c code. */
3156
3157/* Pass the address ADDR to the inferior in the I'th debug register.
3158 Here we just store the address in dr array, the registers will be
dc05df57 3159 actually set up when windows_continue is called. */
9bb9e8ad 3160static void
fa4ba8da
PM
3161cygwin_set_dr (int i, CORE_ADDR addr)
3162{
3163 if (i < 0 || i > 3)
3164 internal_error (__FILE__, __LINE__,
e2e0b3e5 3165 _("Invalid register %d in cygwin_set_dr.\n"), i);
41b4aadc 3166 dr[i] = addr;
fa4ba8da
PM
3167 debug_registers_changed = 1;
3168 debug_registers_used = 1;
3169}
3170
3171/* Pass the value VAL to the inferior in the DR7 debug control
3172 register. Here we just store the address in D_REGS, the watchpoint
dc05df57 3173 will be actually set up in windows_wait. */
9bb9e8ad
PM
3174static void
3175cygwin_set_dr7 (unsigned long val)
fa4ba8da 3176{
9bb9e8ad 3177 dr[7] = (CORE_ADDR) val;
fa4ba8da
PM
3178 debug_registers_changed = 1;
3179 debug_registers_used = 1;
3180}
3181
7b50312a
PA
3182/* Get the value of debug register I from the inferior. */
3183
3184static CORE_ADDR
3185cygwin_get_dr (int i)
3186{
3187 return dr[i];
3188}
3189
fa4ba8da
PM
3190/* Get the value of the DR6 debug status register from the inferior.
3191 Here we just return the value stored in dr[6]
3192 by the last call to thread_rec for current_event.dwThreadId id. */
9bb9e8ad 3193static unsigned long
fa4ba8da
PM
3194cygwin_get_dr6 (void)
3195{
9bb9e8ad 3196 return (unsigned long) dr[6];
fa4ba8da
PM
3197}
3198
7b50312a
PA
3199/* Get the value of the DR7 debug status register from the inferior.
3200 Here we just return the value stored in dr[7] by the last call to
3201 thread_rec for current_event.dwThreadId id. */
3202
3203static unsigned long
3204cygwin_get_dr7 (void)
3205{
3206 return (unsigned long) dr[7];
3207}
3208
2dc38344 3209/* Determine if the thread referenced by "ptid" is alive
3cee93ac 3210 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
581e13c1 3211 it means that the thread has died. Otherwise it is assumed to be alive. */
f6ac5f3d 3212
57810aa7 3213bool
f6ac5f3d 3214windows_nat_target::thread_alive (ptid_t ptid)
3cee93ac 3215{
2dc38344
PA
3216 int tid;
3217
cc6bcb54
TT
3218 gdb_assert (ptid.tid () != 0);
3219 tid = ptid.tid ();
39f77062 3220
57810aa7 3221 return WaitForSingleObject (thread_rec (tid, FALSE)->h, 0) != WAIT_OBJECT_0;
3cee93ac
CF
3222}
3223
6c265988 3224void _initialize_check_for_gdb_ini ();
2a3d5645 3225void
6c265988 3226_initialize_check_for_gdb_ini ()
2a3d5645
CF
3227{
3228 char *homedir;
3229 if (inhibit_gdbinit)
3230 return;
3231
3232 homedir = getenv ("HOME");
3233 if (homedir)
3234 {
3235 char *p;
3236 char *oldini = (char *) alloca (strlen (homedir) +
1270fac6 3237 sizeof ("gdb.ini") + 1);
2a3d5645
CF
3238 strcpy (oldini, homedir);
3239 p = strchr (oldini, '\0');
0ba1096a 3240 if (p > oldini && !IS_DIR_SEPARATOR (p[-1]))
2a3d5645
CF
3241 *p++ = '/';
3242 strcpy (p, "gdb.ini");
3243 if (access (oldini, 0) == 0)
3244 {
3245 int len = strlen (oldini);
1270fac6 3246 char *newini = (char *) alloca (len + 2);
08850b56 3247
1270fac6 3248 xsnprintf (newini, len + 2, "%.*s.gdbinit",
08850b56 3249 (int) (len - (sizeof ("gdb.ini") - 1)), oldini);
8a3fe4f8 3250 warning (_("obsolete '%s' found. Rename to '%s'."), oldini, newini);
2a3d5645
CF
3251 }
3252 }
3253}
33605d39 3254
2b008701 3255/* Define dummy functions which always return error for the rare cases where
581e13c1 3256 these functions could not be found. */
2b008701
CF
3257static BOOL WINAPI
3258bad_DebugActiveProcessStop (DWORD w)
3259{
3260 return FALSE;
3261}
3262static BOOL WINAPI
3263bad_DebugBreakProcess (HANDLE w)
3264{
3265 return FALSE;
3266}
3267static BOOL WINAPI
3268bad_DebugSetProcessKillOnExit (BOOL w)
3269{
3270 return FALSE;
3271}
3272static BOOL WINAPI
3273bad_EnumProcessModules (HANDLE w, HMODULE *x, DWORD y, LPDWORD z)
3274{
3275 return FALSE;
3276}
b3c613f2
CF
3277
3278#ifdef __USEWIDE
2b008701 3279static DWORD WINAPI
b3c613f2 3280bad_GetModuleFileNameExW (HANDLE w, HMODULE x, LPWSTR y, DWORD z)
2b008701
CF
3281{
3282 return 0;
3283}
d0d0ab16
CV
3284#else
3285static DWORD WINAPI
b3c613f2 3286bad_GetModuleFileNameExA (HANDLE w, HMODULE x, LPSTR y, DWORD z)
d0d0ab16
CV
3287{
3288 return 0;
3289}
3290#endif
b3c613f2 3291
2b008701
CF
3292static BOOL WINAPI
3293bad_GetModuleInformation (HANDLE w, HMODULE x, LPMODULEINFO y, DWORD z)
3294{
3295 return FALSE;
3296}
3297
418c6cb3
CF
3298static BOOL WINAPI
3299bad_OpenProcessToken (HANDLE w, DWORD x, PHANDLE y)
3300{
3301 return FALSE;
3302}
3303
cd44747c
PM
3304static BOOL WINAPI
3305bad_GetCurrentConsoleFont (HANDLE w, BOOL bMaxWindow, CONSOLE_FONT_INFO *f)
3306{
3307 f->nFont = 0;
3308 return 1;
3309}
3310static COORD WINAPI
3311bad_GetConsoleFontSize (HANDLE w, DWORD nFont)
3312{
3313 COORD size;
3314 size.X = 8;
3315 size.Y = 12;
3316 return size;
3317}
3318
2b008701 3319/* Load any functions which may not be available in ancient versions
581e13c1 3320 of Windows. */
d603d4b3 3321
6c265988 3322void _initialize_loadable ();
33605d39 3323void
6c265988 3324_initialize_loadable ()
33605d39 3325{
2b008701
CF
3326 HMODULE hm = NULL;
3327
43499ea3
PA
3328#define GPA(m, func) \
3329 func = (func ## _ftype *) GetProcAddress (m, #func)
3330
2b008701
CF
3331 hm = LoadLibrary ("kernel32.dll");
3332 if (hm)
33605d39 3333 {
43499ea3
PA
3334 GPA (hm, DebugActiveProcessStop);
3335 GPA (hm, DebugBreakProcess);
3336 GPA (hm, DebugSetProcessKillOnExit);
3337 GPA (hm, GetConsoleFontSize);
3338 GPA (hm, DebugActiveProcessStop);
3339 GPA (hm, GetCurrentConsoleFont);
2b008701 3340 }
33605d39 3341
2b008701 3342 /* Set variables to dummy versions of these processes if the function
581e13c1 3343 wasn't found in kernel32.dll. */
b3c613f2
CF
3344 if (!DebugBreakProcess)
3345 DebugBreakProcess = bad_DebugBreakProcess;
3346 if (!DebugActiveProcessStop || !DebugSetProcessKillOnExit)
2b008701 3347 {
b3c613f2
CF
3348 DebugActiveProcessStop = bad_DebugActiveProcessStop;
3349 DebugSetProcessKillOnExit = bad_DebugSetProcessKillOnExit;
2b008701 3350 }
cd44747c
PM
3351 if (!GetConsoleFontSize)
3352 GetConsoleFontSize = bad_GetConsoleFontSize;
3353 if (!GetCurrentConsoleFont)
3354 GetCurrentConsoleFont = bad_GetCurrentConsoleFont;
33605d39 3355
2b008701 3356 /* Load optional functions used for retrieving filename information
581e13c1 3357 associated with the currently debugged process or its dlls. */
2b008701
CF
3358 hm = LoadLibrary ("psapi.dll");
3359 if (hm)
3360 {
43499ea3
PA
3361 GPA (hm, EnumProcessModules);
3362 GPA (hm, GetModuleInformation);
aec47d1d
JB
3363 GetModuleFileNameEx = (GetModuleFileNameEx_ftype *)
3364 GetProcAddress (hm, GetModuleFileNameEx_name);
33605d39
CF
3365 }
3366
b3c613f2 3367 if (!EnumProcessModules || !GetModuleInformation || !GetModuleFileNameEx)
2b008701
CF
3368 {
3369 /* Set variables to dummy versions of these processes if the function
581e13c1 3370 wasn't found in psapi.dll. */
b3c613f2
CF
3371 EnumProcessModules = bad_EnumProcessModules;
3372 GetModuleInformation = bad_GetModuleInformation;
3373 GetModuleFileNameEx = bad_GetModuleFileNameEx;
581e13c1
MS
3374 /* This will probably fail on Windows 9x/Me. Let the user know
3375 that we're missing some functionality. */
3376 warning(_("\
3377cannot automatically find executable file or library to read symbols.\n\
3378Use \"file\" or \"dll\" command to load executable/libraries directly."));
418c6cb3
CF
3379 }
3380
3381 hm = LoadLibrary ("advapi32.dll");
3382 if (hm)
3383 {
43499ea3
PA
3384 GPA (hm, OpenProcessToken);
3385 GPA (hm, LookupPrivilegeValueA);
3386 GPA (hm, AdjustTokenPrivileges);
418c6cb3 3387 /* Only need to set one of these since if OpenProcessToken fails nothing
581e13c1
MS
3388 else is needed. */
3389 if (!OpenProcessToken || !LookupPrivilegeValueA
3390 || !AdjustTokenPrivileges)
b3c613f2 3391 OpenProcessToken = bad_OpenProcessToken;
2b008701 3392 }
43499ea3
PA
3393
3394#undef GPA
33605d39 3395}
This page took 3.947205 seconds and 4 git commands to generate.