2012-05-24 Pedro Alves <palves@redhat.com>
[deliverable/binutils-gdb.git] / gdb / windows-nat.c
CommitLineData
dc05df57 1/* Target-vector operations for controlling windows child processes, for GDB.
0a65a603 2
c5a57081 3 Copyright (C) 1995-2012 Free Software Foundation, Inc.
0a65a603 4
e6433c28 5 Contributed by Cygnus Solutions, A Red Hat Company.
e88c49c3 6
24e60978
SC
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
24e60978
SC
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
a9762ec7 15 but WITHOUT ANY WARRANTY; without even the implied warranty of
24e60978
SC
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
24e60978 21
dfe7f3ac 22/* Originally by Steve Chamberlain, sac@cygnus.com */
24e60978
SC
23
24#include "defs.h"
25#include "frame.h" /* required by inferior.h */
26#include "inferior.h"
27#include "target.h"
60250e8b 28#include "exceptions.h"
24e60978
SC
29#include "gdbcore.h"
30#include "command.h"
fa58ee11 31#include "completer.h"
4e052eda 32#include "regcache.h"
2a3d5645 33#include "top.h"
403d9909
CF
34#include <signal.h>
35#include <sys/types.h>
36#include <fcntl.h>
37#include <stdlib.h>
38#include <windows.h>
39#include <imagehlp.h>
2b008701 40#include <psapi.h>
10325bc5 41#ifdef __CYGWIN__
b7ff339d 42#include <wchar.h>
403d9909 43#include <sys/cygwin.h>
b7ff339d 44#include <cygwin/version.h>
10325bc5 45#endif
a244bdca 46#include <signal.h>
cad9cd60 47
24e60978 48#include "buildsym.h"
0ba1096a 49#include "filenames.h"
1ef980b9
SC
50#include "symfile.h"
51#include "objfiles.h"
de1b3c3d 52#include "gdb_obstack.h"
24e60978 53#include "gdb_string.h"
fdfa3315 54#include "gdbthread.h"
24e60978 55#include "gdbcmd.h"
1750a5ef 56#include <sys/param.h>
1e37c281 57#include <unistd.h>
4646aa9d 58#include "exec.h"
3ee6f623 59#include "solist.h"
3cb8e7f6 60#include "solib.h"
de1b3c3d 61#include "xml-support.h"
24e60978 62
6c7de422
MK
63#include "i386-tdep.h"
64#include "i387-tdep.h"
65
31b060a2
CF
66#include "windows-tdep.h"
67#include "windows-nat.h"
9bb9e8ad 68#include "i386-nat.h"
ecc13e53 69#include "complaints.h"
de1b3c3d 70
418c6cb3 71#define AdjustTokenPrivileges dyn_AdjustTokenPrivileges
2b008701
CF
72#define DebugActiveProcessStop dyn_DebugActiveProcessStop
73#define DebugBreakProcess dyn_DebugBreakProcess
74#define DebugSetProcessKillOnExit dyn_DebugSetProcessKillOnExit
75#define EnumProcessModules dyn_EnumProcessModules
2b008701 76#define GetModuleInformation dyn_GetModuleInformation
418c6cb3
CF
77#define LookupPrivilegeValueA dyn_LookupPrivilegeValueA
78#define OpenProcessToken dyn_OpenProcessToken
cd44747c
PM
79#define GetConsoleFontSize dyn_GetConsoleFontSize
80#define GetCurrentConsoleFont dyn_GetCurrentConsoleFont
2b008701 81
418c6cb3
CF
82static BOOL WINAPI (*AdjustTokenPrivileges)(HANDLE, BOOL, PTOKEN_PRIVILEGES,
83 DWORD, PTOKEN_PRIVILEGES, PDWORD);
2b008701
CF
84static BOOL WINAPI (*DebugActiveProcessStop) (DWORD);
85static BOOL WINAPI (*DebugBreakProcess) (HANDLE);
86static BOOL WINAPI (*DebugSetProcessKillOnExit) (BOOL);
87static BOOL WINAPI (*EnumProcessModules) (HANDLE, HMODULE *, DWORD,
88 LPDWORD);
2b008701
CF
89static BOOL WINAPI (*GetModuleInformation) (HANDLE, HMODULE, LPMODULEINFO,
90 DWORD);
418c6cb3
CF
91static BOOL WINAPI (*LookupPrivilegeValueA)(LPCSTR, LPCSTR, PLUID);
92static BOOL WINAPI (*OpenProcessToken)(HANDLE, DWORD, PHANDLE);
581e13c1
MS
93static BOOL WINAPI (*GetCurrentConsoleFont) (HANDLE, BOOL,
94 CONSOLE_FONT_INFO *);
cd44747c 95static COORD WINAPI (*GetConsoleFontSize) (HANDLE, DWORD);
2b008701 96
dc05df57 97static struct target_ops windows_ops;
3ee6f623 98
b3c613f2
CF
99#undef STARTUPINFO
100#undef CreateProcess
101#undef GetModuleFileNameEx
102
103#ifndef __CYGWIN__
104# define __PMAX (MAX_PATH + 1)
105 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPSTR, DWORD);
106# define STARTUPINFO STARTUPINFOA
107# define CreateProcess CreateProcessA
108# define GetModuleFileNameEx_name "GetModuleFileNameExA"
109# define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
110#else
111# define __PMAX PATH_MAX
581e13c1 112/* The starting and ending address of the cygwin1.dll text segment. */
b3c613f2
CF
113 static CORE_ADDR cygwin_load_start;
114 static CORE_ADDR cygwin_load_end;
b3c613f2
CF
115# define __USEWIDE
116 typedef wchar_t cygwin_buf_t;
581e13c1
MS
117 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE,
118 LPWSTR, DWORD);
b3c613f2
CF
119# define STARTUPINFO STARTUPINFOW
120# define CreateProcess CreateProcessW
121# define GetModuleFileNameEx_name "GetModuleFileNameExW"
122# define bad_GetModuleFileNameEx bad_GetModuleFileNameExW
10325bc5 123#endif
a244bdca 124
581e13c1
MS
125static int have_saved_context; /* True if we've saved context from a
126 cygwin signal. */
127static CONTEXT saved_context; /* Containes the saved context from a
128 cygwin signal. */
a244bdca 129
0714f9bf
SS
130/* If we're not using the old Cygwin header file set, define the
131 following which never should have been in the generic Win32 API
581e13c1 132 headers in the first place since they were our own invention... */
0714f9bf 133#ifndef _GNU_H_WINDOWS_H
9d3789f7 134enum
8e860359
CF
135 {
136 FLAG_TRACE_BIT = 0x100,
137 CONTEXT_DEBUGGER = (CONTEXT_FULL | CONTEXT_FLOATING_POINT)
138 };
0714f9bf
SS
139#endif
140
5851ab76
JB
141#ifndef CONTEXT_EXTENDED_REGISTERS
142/* This macro is only defined on ia32. It only makes sense on this target,
143 so define it as zero if not already defined. */
144#define CONTEXT_EXTENDED_REGISTERS 0
145#endif
146
fa4ba8da
PM
147#define CONTEXT_DEBUGGER_DR CONTEXT_DEBUGGER | CONTEXT_DEBUG_REGISTERS \
148 | CONTEXT_EXTENDED_REGISTERS
97da3b20 149
41b4aadc 150static uintptr_t dr[8];
87a45c96
CF
151static int debug_registers_changed;
152static int debug_registers_used;
16d905e2
CF
153
154static int windows_initialization_done;
6537bb24 155#define DR6_CLEAR_VALUE 0xffff0ff0
97da3b20 156
3cee93ac 157/* The string sent by cygwin when it processes a signal.
581e13c1 158 FIXME: This should be in a cygwin include file. */
3929abe9
CF
159#ifndef _CYGWIN_SIGNAL_STRING
160#define _CYGWIN_SIGNAL_STRING "cYgSiGw00f"
161#endif
3cee93ac 162
29fe111d 163#define CHECK(x) check (x, __FILE__,__LINE__)
dfe7f3ac 164#define DEBUG_EXEC(x) if (debug_exec) printf_unfiltered x
4e52d31c
PM
165#define DEBUG_EVENTS(x) if (debug_events) printf_unfiltered x
166#define DEBUG_MEM(x) if (debug_memory) printf_unfiltered x
167#define DEBUG_EXCEPT(x) if (debug_exceptions) printf_unfiltered x
24e60978 168
dc05df57 169static void windows_stop (ptid_t);
02529b48 170static int windows_thread_alive (struct target_ops *, ptid_t);
7d85a9c0 171static void windows_kill_inferior (struct target_ops *);
3cee93ac 172
9bb9e8ad
PM
173static void cygwin_set_dr (int i, CORE_ADDR addr);
174static void cygwin_set_dr7 (unsigned long val);
a961bc18 175static CORE_ADDR cygwin_get_dr (int i);
9bb9e8ad 176static unsigned long cygwin_get_dr6 (void);
a961bc18 177static unsigned long cygwin_get_dr7 (void);
9bb9e8ad 178
7393af7c 179static enum target_signal last_sig = TARGET_SIGNAL_0;
581e13c1 180/* Set if a signal was received from the debugged process. */
7393af7c 181
3cee93ac 182/* Thread information structure used to track information that is
6537bb24 183 not available in gdb's thread structure. */
3cee93ac 184typedef struct thread_info_struct
3a4b77d8
JM
185 {
186 struct thread_info_struct *next;
187 DWORD id;
188 HANDLE h;
711e434b 189 CORE_ADDR thread_local_base;
3a4b77d8 190 char *name;
6537bb24 191 int suspended;
3ade5333 192 int reload_context;
3a4b77d8 193 CONTEXT context;
1e37c281 194 STACKFRAME sf;
8e860359
CF
195 }
196thread_info;
1e37c281 197
29fe111d 198static thread_info thread_head;
24e60978 199
581e13c1 200/* The process and thread handles for the above context. */
24e60978 201
3cee93ac
CF
202static DEBUG_EVENT current_event; /* The current debug event from
203 WaitForDebugEvent */
204static HANDLE current_process_handle; /* Currently executing process */
205static thread_info *current_thread; /* Info on currently selected thread */
349b409f 206static DWORD main_thread_id; /* Thread ID of the main thread */
24e60978 207
581e13c1 208/* Counts of things. */
24e60978
SC
209static int exception_count = 0;
210static int event_count = 0;
dfe7f3ac 211static int saw_create;
bf25528d 212static int open_process_used = 0;
24e60978 213
581e13c1 214/* User options. */
24e60978 215static int new_console = 0;
10325bc5 216#ifdef __CYGWIN__
09280ddf 217static int cygwin_exceptions = 0;
10325bc5 218#endif
1e37c281 219static int new_group = 1;
dfe7f3ac
CF
220static int debug_exec = 0; /* show execution */
221static int debug_events = 0; /* show events from kernel */
222static int debug_memory = 0; /* show target memory accesses */
1ef980b9 223static int debug_exceptions = 0; /* show target exceptions */
dfe7f3ac
CF
224static int useshell = 0; /* use shell for subprocesses */
225
7e63b4e4 226/* This vector maps GDB's idea of a register's number into an offset
dc05df57 227 in the windows exception context vector.
24e60978 228
3cee93ac 229 It also contains the bit mask needed to load the register in question.
24e60978 230
7e63b4e4
JB
231 The contents of this table can only be computed by the units
232 that provide CPU-specific support for Windows native debugging.
233 These units should set the table by calling
dc05df57 234 windows_set_context_register_offsets.
7e63b4e4 235
24e60978
SC
236 One day we could read a reg, we could inspect the context we
237 already have loaded, if it doesn't have the bit set that we need,
238 we read that set of registers in using GetThreadContext. If the
581e13c1 239 context already contains what we need, we just unpack it. Then to
24e60978
SC
240 write a register, first we have to ensure that the context contains
241 the other regs of the group, and then we copy the info in and set
581e13c1 242 out bit. */
24e60978 243
7e63b4e4 244static const int *mappings;
d3a09475 245
d40dc7a8
JB
246/* The function to use in order to determine whether a register is
247 a segment register or not. */
248static segment_register_p_ftype *segment_register_p;
249
24e60978 250/* This vector maps the target's idea of an exception (extracted
581e13c1 251 from the DEBUG_EVENT structure) to GDB's idea. */
24e60978
SC
252
253struct xlate_exception
254 {
255 int them;
256 enum target_signal us;
257 };
258
24e60978
SC
259static const struct xlate_exception
260 xlate[] =
261{
262 {EXCEPTION_ACCESS_VIOLATION, TARGET_SIGNAL_SEGV},
9cbf6c0e 263 {STATUS_STACK_OVERFLOW, TARGET_SIGNAL_SEGV},
24e60978
SC
264 {EXCEPTION_BREAKPOINT, TARGET_SIGNAL_TRAP},
265 {DBG_CONTROL_C, TARGET_SIGNAL_INT},
266 {EXCEPTION_SINGLE_STEP, TARGET_SIGNAL_TRAP},
7393af7c 267 {STATUS_FLOAT_DIVIDE_BY_ZERO, TARGET_SIGNAL_FPE},
24e60978
SC
268 {-1, -1}};
269
7e63b4e4
JB
270/* Set the MAPPINGS static global to OFFSETS.
271 See the description of MAPPINGS for more details. */
272
273void
dc05df57 274windows_set_context_register_offsets (const int *offsets)
7e63b4e4
JB
275{
276 mappings = offsets;
277}
278
d40dc7a8
JB
279/* See windows-nat.h. */
280
281void
282windows_set_segment_register_p (segment_register_p_ftype *fun)
283{
284 segment_register_p = fun;
285}
286
fa4ba8da
PM
287static void
288check (BOOL ok, const char *file, int line)
289{
290 if (!ok)
dfe7f3ac 291 printf_filtered ("error return %s:%d was %lu\n", file, line,
fa4ba8da
PM
292 GetLastError ());
293}
294
6537bb24
PA
295/* Find a thread record given a thread id. If GET_CONTEXT is not 0,
296 then also retrieve the context for this thread. If GET_CONTEXT is
297 negative, then don't suspend the thread. */
3cee93ac
CF
298static thread_info *
299thread_rec (DWORD id, int get_context)
24e60978 300{
3cee93ac
CF
301 thread_info *th;
302
3a4b77d8 303 for (th = &thread_head; (th = th->next) != NULL;)
3cee93ac
CF
304 if (th->id == id)
305 {
6537bb24 306 if (!th->suspended && get_context)
3cee93ac 307 {
8a892701 308 if (get_context > 0 && id != current_event.dwThreadId)
6537bb24
PA
309 {
310 if (SuspendThread (th->h) == (DWORD) -1)
311 {
312 DWORD err = GetLastError ();
313 warning (_("SuspendThread failed. (winerr %d)"),
314 (int) err);
315 return NULL;
316 }
317 th->suspended = 1;
318 }
3cee93ac 319 else if (get_context < 0)
6537bb24 320 th->suspended = -1;
3ade5333 321 th->reload_context = 1;
3cee93ac
CF
322 }
323 return th;
324 }
325
326 return NULL;
327}
328
2dc38344 329/* Add a thread to the thread list. */
3cee93ac 330static thread_info *
711e434b 331windows_add_thread (ptid_t ptid, HANDLE h, void *tlb)
3cee93ac
CF
332{
333 thread_info *th;
2dc38344
PA
334 DWORD id;
335
336 gdb_assert (ptid_get_tid (ptid) != 0);
337
338 id = ptid_get_tid (ptid);
3cee93ac
CF
339
340 if ((th = thread_rec (id, FALSE)))
341 return th;
342
3929abe9 343 th = XZALLOC (thread_info);
3cee93ac
CF
344 th->id = id;
345 th->h = h;
711e434b 346 th->thread_local_base = (CORE_ADDR) (uintptr_t) tlb;
3cee93ac
CF
347 th->next = thread_head.next;
348 thread_head.next = th;
2dc38344
PA
349 add_thread (ptid);
350 /* Set the debug registers for the new thread if they are used. */
fa4ba8da
PM
351 if (debug_registers_used)
352 {
353 /* Only change the value of the debug registers. */
354 th->context.ContextFlags = CONTEXT_DEBUG_REGISTERS;
355 CHECK (GetThreadContext (th->h, &th->context));
356 th->context.Dr0 = dr[0];
357 th->context.Dr1 = dr[1];
358 th->context.Dr2 = dr[2];
359 th->context.Dr3 = dr[3];
6537bb24 360 th->context.Dr6 = DR6_CLEAR_VALUE;
fa4ba8da
PM
361 th->context.Dr7 = dr[7];
362 CHECK (SetThreadContext (th->h, &th->context));
363 th->context.ContextFlags = 0;
364 }
3cee93ac 365 return th;
24e60978
SC
366}
367
3cee93ac 368/* Clear out any old thread list and reintialize it to a
581e13c1 369 pristine state. */
24e60978 370static void
dc05df57 371windows_init_thread_list (void)
24e60978 372{
3cee93ac
CF
373 thread_info *th = &thread_head;
374
dc05df57 375 DEBUG_EVENTS (("gdb: windows_init_thread_list\n"));
3cee93ac
CF
376 init_thread_list ();
377 while (th->next != NULL)
24e60978 378 {
3cee93ac
CF
379 thread_info *here = th->next;
380 th->next = here->next;
b8c9b27d 381 xfree (here);
24e60978 382 }
059198c1 383 thread_head.next = NULL;
3cee93ac
CF
384}
385
581e13c1 386/* Delete a thread from the list of threads. */
3cee93ac 387static void
dc05df57 388windows_delete_thread (ptid_t ptid)
3cee93ac
CF
389{
390 thread_info *th;
2dc38344
PA
391 DWORD id;
392
393 gdb_assert (ptid_get_tid (ptid) != 0);
394
395 id = ptid_get_tid (ptid);
3cee93ac
CF
396
397 if (info_verbose)
2dc38344
PA
398 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (ptid));
399 delete_thread (ptid);
3cee93ac
CF
400
401 for (th = &thread_head;
402 th->next != NULL && th->next->id != id;
403 th = th->next)
404 continue;
405
406 if (th->next != NULL)
24e60978 407 {
3cee93ac
CF
408 thread_info *here = th->next;
409 th->next = here->next;
b8c9b27d 410 xfree (here);
24e60978
SC
411 }
412}
413
3cee93ac 414static void
dc05df57 415do_windows_fetch_inferior_registers (struct regcache *regcache, int r)
24e60978 416{
1e37c281 417 char *context_offset = ((char *) &current_thread->context) + mappings[r];
20a6ec49
MD
418 struct gdbarch *gdbarch = get_regcache_arch (regcache);
419 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
1e37c281 420 long l;
6c7de422 421
3ade5333 422 if (!current_thread)
d6dc8049 423 return; /* Windows sometimes uses a non-existent thread id in its
581e13c1 424 events. */
3ade5333
CF
425
426 if (current_thread->reload_context)
427 {
cb832706 428#ifdef __COPY_CONTEXT_SIZE
a244bdca
CF
429 if (have_saved_context)
430 {
581e13c1
MS
431 /* Lie about where the program actually is stopped since
432 cygwin has informed us that we should consider the signal
433 to have occurred at another location which is stored in
434 "saved_context. */
435 memcpy (&current_thread->context, &saved_context,
436 __COPY_CONTEXT_SIZE);
a244bdca
CF
437 have_saved_context = 0;
438 }
439 else
cb832706 440#endif
a244bdca
CF
441 {
442 thread_info *th = current_thread;
443 th->context.ContextFlags = CONTEXT_DEBUGGER_DR;
444 GetThreadContext (th->h, &th->context);
2b008701 445 /* Copy dr values from that thread.
581e13c1
MS
446 But only if there were not modified since last stop.
447 PR gdb/2388 */
88616312
PM
448 if (!debug_registers_changed)
449 {
450 dr[0] = th->context.Dr0;
451 dr[1] = th->context.Dr1;
452 dr[2] = th->context.Dr2;
453 dr[3] = th->context.Dr3;
454 dr[6] = th->context.Dr6;
455 dr[7] = th->context.Dr7;
456 }
a244bdca 457 }
3ade5333
CF
458 current_thread->reload_context = 0;
459 }
460
20a6ec49 461 if (r == I387_FISEG_REGNUM (tdep))
1e37c281 462 {
8e860359 463 l = *((long *) context_offset) & 0xffff;
56be3814 464 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 465 }
20a6ec49 466 else if (r == I387_FOP_REGNUM (tdep))
1e37c281 467 {
8e860359 468 l = (*((long *) context_offset) >> 16) & ((1 << 11) - 1);
56be3814 469 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 470 }
d40dc7a8
JB
471 else if (segment_register_p (r))
472 {
473 /* GDB treats segment registers as 32bit registers, but they are
474 in fact only 16 bits long. Make sure we do not read extra
475 bits from our source buffer. */
476 l = *((long *) context_offset) & 0xffff;
477 regcache_raw_supply (regcache, r, (char *) &l);
478 }
1e37c281 479 else if (r >= 0)
56be3814 480 regcache_raw_supply (regcache, r, context_offset);
3cee93ac 481 else
24e60978 482 {
20a6ec49 483 for (r = 0; r < gdbarch_num_regs (gdbarch); r++)
dc05df57 484 do_windows_fetch_inferior_registers (regcache, r);
24e60978 485 }
3cee93ac
CF
486}
487
488static void
28439f5e
PA
489windows_fetch_inferior_registers (struct target_ops *ops,
490 struct regcache *regcache, int r)
3cee93ac 491{
2dc38344 492 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 493 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 494 thread id in its events. */
3ade5333 495 if (current_thread)
dc05df57 496 do_windows_fetch_inferior_registers (regcache, r);
3cee93ac
CF
497}
498
499static void
dc05df57 500do_windows_store_inferior_registers (const struct regcache *regcache, int r)
3cee93ac 501{
3ade5333 502 if (!current_thread)
581e13c1 503 /* Windows sometimes uses a non-existent thread id in its events. */;
3ade5333 504 else if (r >= 0)
56be3814 505 regcache_raw_collect (regcache, r,
822c9732 506 ((char *) &current_thread->context) + mappings[r]);
24e60978
SC
507 else
508 {
40a6adc1 509 for (r = 0; r < gdbarch_num_regs (get_regcache_arch (regcache)); r++)
dc05df57 510 do_windows_store_inferior_registers (regcache, r);
24e60978
SC
511 }
512}
513
581e13c1 514/* Store a new register value into the current thread context. */
3cee93ac 515static void
28439f5e
PA
516windows_store_inferior_registers (struct target_ops *ops,
517 struct regcache *regcache, int r)
3cee93ac 518{
2dc38344 519 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 520 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 521 thread id in its events. */
3ade5333 522 if (current_thread)
dc05df57 523 do_windows_store_inferior_registers (regcache, r);
3cee93ac 524}
24e60978 525
7a9dd1b2 526/* Get the name of a given module at given base address. If base_address
33605d39
CF
527 is zero return the first loaded module (which is always the name of the
528 executable). */
3ee6f623 529static int
d3653bf6 530get_module_name (LPVOID base_address, char *dll_name_ret)
1e37c281
JM
531{
532 DWORD len;
533 MODULEINFO mi;
534 int i;
8e860359 535 HMODULE dh_buf[1];
581e13c1
MS
536 HMODULE *DllHandle = dh_buf; /* Set to temporary storage for
537 initial query. */
1e37c281 538 DWORD cbNeeded;
33605d39 539#ifdef __CYGWIN__
b3c613f2
CF
540 cygwin_buf_t pathbuf[__PMAX]; /* Temporary storage prior to converting to
541 posix form. __PMAX is always enough
d0d0ab16 542 as long as SO_NAME_MAX_PATH_SIZE is defined
581e13c1 543 as 512. */
33605d39 544#endif
1e37c281 545
1e37c281 546 cbNeeded = 0;
581e13c1
MS
547 /* Find size of buffer needed to handle list of modules loaded in
548 inferior. */
2b008701
CF
549 if (!EnumProcessModules (current_process_handle, DllHandle,
550 sizeof (HMODULE), &cbNeeded) || !cbNeeded)
1e37c281
JM
551 goto failed;
552
581e13c1 553 /* Allocate correct amount of space for module list. */
8e860359 554 DllHandle = (HMODULE *) alloca (cbNeeded);
1e37c281
JM
555 if (!DllHandle)
556 goto failed;
557
581e13c1 558 /* Get the list of modules. */
2b008701 559 if (!EnumProcessModules (current_process_handle, DllHandle, cbNeeded,
33605d39 560 &cbNeeded))
1e37c281
JM
561 goto failed;
562
29fe111d 563 for (i = 0; i < (int) (cbNeeded / sizeof (HMODULE)); i++)
1e37c281 564 {
581e13c1 565 /* Get information on this module. */
2b008701
CF
566 if (!GetModuleInformation (current_process_handle, DllHandle[i],
567 &mi, sizeof (mi)))
8a3fe4f8 568 error (_("Can't get module info"));
1e37c281 569
d3653bf6 570 if (!base_address || mi.lpBaseOfDll == base_address)
33605d39 571 {
581e13c1 572 /* Try to find the name of the given module. */
d0d0ab16 573#ifdef __CYGWIN__
581e13c1 574 /* Cygwin prefers that the path be in /x/y/z format. */
b3c613f2
CF
575 len = GetModuleFileNameEx (current_process_handle,
576 DllHandle[i], pathbuf, __PMAX);
d0d0ab16
CV
577 if (len == 0)
578 error (_("Error getting dll name: %lu."), GetLastError ());
579 if (cygwin_conv_path (CCP_WIN_W_TO_POSIX, pathbuf, dll_name_ret,
b3c613f2 580 __PMAX) < 0)
d0d0ab16
CV
581 error (_("Error converting dll name to POSIX: %d."), errno);
582#else
b3c613f2
CF
583 len = GetModuleFileNameEx (current_process_handle,
584 DllHandle[i], dll_name_ret, __PMAX);
33605d39 585 if (len == 0)
581e13c1
MS
586 error (_("Error getting dll name: %u."),
587 (unsigned) GetLastError ());
33605d39
CF
588#endif
589 return 1; /* success */
590 }
1e37c281
JM
591 }
592
593failed:
594 dll_name_ret[0] = '\0';
33605d39 595 return 0; /* failure */
1e37c281
JM
596}
597
450005e7 598/* Encapsulate the information required in a call to
581e13c1 599 symbol_file_add_args. */
8a892701
CF
600struct safe_symbol_file_add_args
601{
602 char *name;
603 int from_tty;
604 struct section_addr_info *addrs;
605 int mainline;
606 int flags;
7c5c87c0 607 struct ui_file *err, *out;
8a892701
CF
608 struct objfile *ret;
609};
610
581e13c1 611/* Maintain a linked list of "so" information. */
3ee6f623 612struct lm_info
02e423b9 613{
d3653bf6 614 LPVOID load_addr;
3ee6f623
CF
615};
616
617static struct so_list solib_start, *solib_end;
02e423b9 618
450005e7 619/* Call symbol_file_add with stderr redirected. We don't care if there
581e13c1 620 are errors. */
8a892701
CF
621static int
622safe_symbol_file_add_stub (void *argv)
623{
3ee6f623 624#define p ((struct safe_symbol_file_add_args *) argv)
7eedccfa
PP
625 const int add_flags = ((p->from_tty ? SYMFILE_VERBOSE : 0)
626 | (p->mainline ? SYMFILE_MAINLINE : 0));
627 p->ret = symbol_file_add (p->name, add_flags, p->addrs, p->flags);
8a892701
CF
628 return !!p->ret;
629#undef p
630}
631
581e13c1 632/* Restore gdb's stderr after calling symbol_file_add. */
8a892701 633static void
7c5c87c0 634safe_symbol_file_add_cleanup (void *p)
8a892701 635{
8e860359 636#define sp ((struct safe_symbol_file_add_args *)p)
450005e7 637 gdb_flush (gdb_stderr);
7c5c87c0 638 gdb_flush (gdb_stdout);
d3ff4a77 639 ui_file_delete (gdb_stderr);
7c5c87c0 640 ui_file_delete (gdb_stdout);
d3ff4a77 641 gdb_stderr = sp->err;
9d3789f7 642 gdb_stdout = sp->out;
8e860359 643#undef sp
8a892701
CF
644}
645
581e13c1 646/* symbol_file_add wrapper that prevents errors from being displayed. */
8a892701
CF
647static struct objfile *
648safe_symbol_file_add (char *name, int from_tty,
649 struct section_addr_info *addrs,
650 int mainline, int flags)
8a892701
CF
651{
652 struct safe_symbol_file_add_args p;
653 struct cleanup *cleanup;
654
7c5c87c0 655 cleanup = make_cleanup (safe_symbol_file_add_cleanup, &p);
8a892701 656
7c5c87c0
CF
657 p.err = gdb_stderr;
658 p.out = gdb_stdout;
450005e7 659 gdb_flush (gdb_stderr);
7c5c87c0 660 gdb_flush (gdb_stdout);
d3ff4a77 661 gdb_stderr = ui_file_new ();
7c5c87c0 662 gdb_stdout = ui_file_new ();
8a892701
CF
663 p.name = name;
664 p.from_tty = from_tty;
665 p.addrs = addrs;
666 p.mainline = mainline;
667 p.flags = flags;
668 catch_errors (safe_symbol_file_add_stub, &p, "", RETURN_MASK_ERROR);
669
670 do_cleanups (cleanup);
671 return p.ret;
672}
673
de1b3c3d 674static struct so_list *
dc05df57 675windows_make_so (const char *name, LPVOID load_addr)
8e860359 676{
3ee6f623 677 struct so_list *so;
d0d0ab16
CV
678 char *p;
679#ifndef __CYGWIN__
b3c613f2
CF
680 char buf[__PMAX];
681 char cwd[__PMAX];
3f8ad85b
CF
682 WIN32_FIND_DATA w32_fd;
683 HANDLE h = FindFirstFile(name, &w32_fd);
3f8ad85b 684
6badb179
CF
685 if (h == INVALID_HANDLE_VALUE)
686 strcpy (buf, name);
687 else
3f8ad85b 688 {
c914e0cc
CF
689 FindClose (h);
690 strcpy (buf, name);
691 if (GetCurrentDirectory (MAX_PATH + 1, cwd))
692 {
693 p = strrchr (buf, '\\');
694 if (p)
695 p[1] = '\0';
696 SetCurrentDirectory (buf);
697 GetFullPathName (w32_fd.cFileName, MAX_PATH, buf, &p);
698 SetCurrentDirectory (cwd);
699 }
3f8ad85b 700 }
3ee6f623
CF
701 if (strcasecmp (buf, "ntdll.dll") == 0)
702 {
703 GetSystemDirectory (buf, sizeof (buf));
704 strcat (buf, "\\ntdll.dll");
705 }
d0d0ab16 706#else
b3c613f2 707 cygwin_buf_t buf[__PMAX];
d0d0ab16 708
b3c613f2 709 buf[0] = 0;
d0d0ab16
CV
710 if (access (name, F_OK) != 0)
711 {
712 if (strcasecmp (name, "ntdll.dll") == 0)
b3c613f2 713#ifdef __USEWIDE
d0d0ab16
CV
714 {
715 GetSystemDirectoryW (buf, sizeof (buf) / sizeof (wchar_t));
716 wcscat (buf, L"\\ntdll.dll");
717 }
b3c613f2
CF
718#else
719 {
720 GetSystemDirectoryA (buf, sizeof (buf) / sizeof (wchar_t));
721 strcat (buf, "\\ntdll.dll");
722 }
723#endif
d0d0ab16
CV
724 }
725#endif
3929abe9 726 so = XZALLOC (struct so_list);
3ee6f623
CF
727 so->lm_info = (struct lm_info *) xmalloc (sizeof (struct lm_info));
728 so->lm_info->load_addr = load_addr;
de1b3c3d 729 strcpy (so->so_original_name, name);
10325bc5
PA
730#ifndef __CYGWIN__
731 strcpy (so->so_name, buf);
732#else
d0d0ab16
CV
733 if (buf[0])
734 cygwin_conv_path (CCP_WIN_W_TO_POSIX, buf, so->so_name,
735 SO_NAME_MAX_PATH_SIZE);
736 else
737 {
60c5c021 738 char *rname = realpath (name, NULL);
d0d0ab16
CV
739 if (rname && strlen (rname) < SO_NAME_MAX_PATH_SIZE)
740 {
741 strcpy (so->so_name, rname);
742 free (rname);
743 }
744 else
745 error (_("dll path too long"));
746 }
de1b3c3d
PA
747 /* Record cygwin1.dll .text start/end. */
748 p = strchr (so->so_name, '\0') - (sizeof ("/cygwin1.dll") - 1);
749 if (p >= so->so_name && strcasecmp (p, "/cygwin1.dll") == 0)
750 {
751 bfd *abfd;
752 asection *text = NULL;
753 CORE_ADDR text_vma;
8e860359 754
610dd7f9 755 abfd = bfd_openr (so->so_name, "pei-i386");
a244bdca 756
de1b3c3d
PA
757 if (!abfd)
758 return so;
759
760 if (bfd_check_format (abfd, bfd_object))
761 text = bfd_get_section_by_name (abfd, ".text");
762
763 if (!text)
764 {
765 bfd_close (abfd);
766 return so;
767 }
768
7a9dd1b2 769 /* The symbols in a dll are offset by 0x1000, which is the
de1b3c3d 770 offset from 0 of the first byte in an image - because of the
581e13c1
MS
771 file header and the section alignment. */
772 cygwin_load_start = (CORE_ADDR) (uintptr_t) ((char *)
773 load_addr + 0x1000);
dc05df57 774 cygwin_load_end = cygwin_load_start + bfd_section_size (abfd, text);
de1b3c3d
PA
775
776 bfd_close (abfd);
777 }
10325bc5 778#endif
de1b3c3d
PA
779
780 return so;
8e860359
CF
781}
782
3ee6f623 783static char *
dfe7f3ac
CF
784get_image_name (HANDLE h, void *address, int unicode)
785{
d0d0ab16 786#ifdef __CYGWIN__
b3c613f2 787 static char buf[__PMAX];
d0d0ab16 788#else
b3c613f2 789 static char buf[(2 * __PMAX) + 1];
d0d0ab16 790#endif
dfe7f3ac
CF
791 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
792 char *address_ptr;
793 int len = 0;
794 char b[2];
5732a500 795 SIZE_T done;
dfe7f3ac
CF
796
797 /* Attempt to read the name of the dll that was detected.
798 This is documented to work only when actively debugging
581e13c1 799 a program. It will not work for attached processes. */
dfe7f3ac
CF
800 if (address == NULL)
801 return NULL;
802
dfe7f3ac 803 /* See if we could read the address of a string, and that the
581e13c1
MS
804 address isn't null. */
805 if (!ReadProcessMemory (h, address, &address_ptr,
806 sizeof (address_ptr), &done)
6f17862b 807 || done != sizeof (address_ptr) || !address_ptr)
dfe7f3ac
CF
808 return NULL;
809
581e13c1 810 /* Find the length of the string. */
6f17862b
CF
811 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
812 && (b[0] != 0 || b[size - 1] != 0) && done == size)
813 continue;
dfe7f3ac
CF
814
815 if (!unicode)
816 ReadProcessMemory (h, address_ptr, buf, len, &done);
817 else
818 {
819 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
820 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
821 &done);
d0d0ab16 822#ifdef __CYGWIN__
b3c613f2 823 wcstombs (buf, unicode_address, __PMAX);
d0d0ab16
CV
824#else
825 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, sizeof buf,
826 0, 0);
827#endif
dfe7f3ac
CF
828 }
829
830 return buf;
831}
832
24e60978
SC
833/* Wait for child to do something. Return pid of child, or -1 in case
834 of error; store status through argument pointer OURSTATUS. */
1750a5ef 835static int
0a65a603 836handle_load_dll (void *dummy)
24e60978 837{
3a4b77d8 838 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
b3c613f2 839 char dll_buf[__PMAX];
450005e7 840 char *dll_name = NULL;
3cee93ac 841
3a4b77d8 842 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 843
d3653bf6 844 if (!get_module_name (event->lpBaseOfDll, dll_buf))
8e860359 845 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 846
1e37c281 847 dll_name = dll_buf;
24e60978 848
dfe7f3ac 849 if (*dll_name == '\0')
de1b3c3d
PA
850 dll_name = get_image_name (current_process_handle,
851 event->lpImageName, event->fUnicode);
3cee93ac
CF
852 if (!dll_name)
853 return 1;
854
dc05df57 855 solib_end->next = windows_make_so (dll_name, event->lpBaseOfDll);
de1b3c3d 856 solib_end = solib_end->next;
450005e7 857
a74ce742
PM
858 DEBUG_EVENTS (("gdb: Loading dll \"%s\" at %s.\n", solib_end->so_name,
859 host_address_to_string (solib_end->lm_info->load_addr)));
7488902c 860
450005e7
CF
861 return 1;
862}
863
3ee6f623 864static void
dc05df57 865windows_free_so (struct so_list *so)
3ee6f623 866{
3ee6f623
CF
867 if (so->lm_info)
868 xfree (so->lm_info);
de1b3c3d 869 xfree (so);
3cb8e7f6
CF
870}
871
d3ff4a77 872static int
0a65a603 873handle_unload_dll (void *dummy)
d3ff4a77 874{
d3653bf6 875 LPVOID lpBaseOfDll = current_event.u.UnloadDll.lpBaseOfDll;
3ee6f623 876 struct so_list *so;
d3ff4a77
CF
877
878 for (so = &solib_start; so->next != NULL; so = so->next)
3ee6f623 879 if (so->next->lm_info->load_addr == lpBaseOfDll)
d3ff4a77 880 {
3ee6f623 881 struct so_list *sodel = so->next;
d3ff4a77
CF
882 so->next = sodel->next;
883 if (!so->next)
884 solib_end = so;
7488902c
PM
885 DEBUG_EVENTS (("gdb: Unloading dll \"%s\".\n", sodel->so_name));
886
dc05df57 887 windows_free_so (sodel);
3929abe9 888 solib_add (NULL, 0, NULL, auto_solib_add);
d3ff4a77
CF
889 return 1;
890 }
3929abe9 891
ecc13e53
JB
892 /* We did not find any DLL that was previously loaded at this address,
893 so register a complaint. We do not report an error, because we have
894 observed that this may be happening under some circumstances. For
895 instance, running 32bit applications on x64 Windows causes us to receive
896 4 mysterious UNLOAD_DLL_DEBUG_EVENTs during the startup phase (these
897 events are apparently caused by the WOW layer, the interface between
898 32bit and 64bit worlds). */
899 complaint (&symfile_complaints, _("dll starting at %s not found."),
900 host_address_to_string (lpBaseOfDll));
d3ff4a77
CF
901
902 return 0;
903}
904
581e13c1 905/* Clear list of loaded DLLs. */
3ee6f623 906static void
dc05df57 907windows_clear_solib (void)
450005e7 908{
450005e7
CF
909 solib_start.next = NULL;
910 solib_end = &solib_start;
450005e7 911}
295732ea 912
581e13c1 913/* Load DLL symbol info. */
d603d4b3 914static void
7470a420 915dll_symbol_command (char *args, int from_tty)
450005e7 916{
8e860359 917 int n;
450005e7 918 dont_repeat ();
8e860359 919
450005e7 920 if (args == NULL)
8a3fe4f8 921 error (_("dll-symbols requires a file name"));
450005e7 922
8e860359
CF
923 n = strlen (args);
924 if (n > 4 && strcasecmp (args + n - 4, ".dll") != 0)
925 {
926 char *newargs = (char *) alloca (n + 4 + 1);
927 strcpy (newargs, args);
928 strcat (newargs, ".dll");
929 args = newargs;
930 }
931
7470a420 932 safe_symbol_file_add (args, from_tty, NULL, 0, OBJF_SHARED | OBJF_USERLOADED);
8e860359 933}
450005e7 934
3cee93ac
CF
935/* Handle DEBUG_STRING output from child process.
936 Cygwin prepends its messages with a "cygwin:". Interpret this as
581e13c1 937 a Cygwin signal. Otherwise just print the string as a warning. */
3cee93ac
CF
938static int
939handle_output_debug_string (struct target_waitstatus *ourstatus)
940{
a244bdca
CF
941 char *s = NULL;
942 int retval = 0;
3cee93ac
CF
943
944 if (!target_read_string
2c647436
PM
945 ((CORE_ADDR) (uintptr_t) current_event.u.DebugString.lpDebugStringData,
946 &s, 1024, 0)
3cee93ac 947 || !s || !*s)
a244bdca 948 /* nothing to do */;
581e13c1
MS
949 else if (strncmp (s, _CYGWIN_SIGNAL_STRING,
950 sizeof (_CYGWIN_SIGNAL_STRING) - 1) != 0)
3cee93ac 951 {
10325bc5 952#ifdef __CYGWIN__
d3a09475 953 if (strncmp (s, "cYg", 3) != 0)
10325bc5 954#endif
8a3fe4f8 955 warning (("%s"), s);
3cee93ac 956 }
cb832706 957#ifdef __COPY_CONTEXT_SIZE
d3a09475 958 else
3cee93ac 959 {
581e13c1
MS
960 /* Got a cygwin signal marker. A cygwin signal is followed by
961 the signal number itself and then optionally followed by the
962 thread id and address to saved context within the DLL. If
963 these are supplied, then the given thread is assumed to have
964 issued the signal and the context from the thread is assumed
965 to be stored at the given address in the inferior. Tell gdb
966 to treat this like a real signal. */
3cee93ac 967 char *p;
3929abe9 968 int sig = strtol (s + sizeof (_CYGWIN_SIGNAL_STRING) - 1, &p, 0);
a244bdca 969 int gotasig = target_signal_from_host (sig);
0714f9bf
SS
970 ourstatus->value.sig = gotasig;
971 if (gotasig)
a244bdca
CF
972 {
973 LPCVOID x;
974 DWORD n;
975 ourstatus->kind = TARGET_WAITKIND_STOPPED;
976 retval = strtoul (p, &p, 0);
977 if (!retval)
978 retval = main_thread_id;
979 else if ((x = (LPCVOID) strtoul (p, &p, 0))
980 && ReadProcessMemory (current_process_handle, x,
581e13c1
MS
981 &saved_context,
982 __COPY_CONTEXT_SIZE, &n)
a244bdca
CF
983 && n == __COPY_CONTEXT_SIZE)
984 have_saved_context = 1;
985 current_event.dwThreadId = retval;
986 }
3cee93ac 987 }
cb832706 988#endif
3cee93ac 989
a244bdca
CF
990 if (s)
991 xfree (s);
992 return retval;
3cee93ac 993}
24e60978 994
c1748f97
PM
995static int
996display_selector (HANDLE thread, DWORD sel)
997{
998 LDT_ENTRY info;
999 if (GetThreadSelectorEntry (thread, sel, &info))
1000 {
1001 int base, limit;
1002 printf_filtered ("0x%03lx: ", sel);
1003 if (!info.HighWord.Bits.Pres)
baa93fa6
CF
1004 {
1005 puts_filtered ("Segment not present\n");
1006 return 0;
1007 }
c1748f97
PM
1008 base = (info.HighWord.Bits.BaseHi << 24) +
1009 (info.HighWord.Bits.BaseMid << 16)
1010 + info.BaseLow;
1011 limit = (info.HighWord.Bits.LimitHi << 16) + info.LimitLow;
1012 if (info.HighWord.Bits.Granularity)
caad7706 1013 limit = (limit << 12) | 0xfff;
c1748f97
PM
1014 printf_filtered ("base=0x%08x limit=0x%08x", base, limit);
1015 if (info.HighWord.Bits.Default_Big)
baa93fa6 1016 puts_filtered(" 32-bit ");
c1748f97 1017 else
baa93fa6 1018 puts_filtered(" 16-bit ");
c1748f97
PM
1019 switch ((info.HighWord.Bits.Type & 0xf) >> 1)
1020 {
1021 case 0:
baa93fa6
CF
1022 puts_filtered ("Data (Read-Only, Exp-up");
1023 break;
c1748f97 1024 case 1:
baa93fa6
CF
1025 puts_filtered ("Data (Read/Write, Exp-up");
1026 break;
c1748f97 1027 case 2:
baa93fa6
CF
1028 puts_filtered ("Unused segment (");
1029 break;
c1748f97 1030 case 3:
baa93fa6
CF
1031 puts_filtered ("Data (Read/Write, Exp-down");
1032 break;
c1748f97 1033 case 4:
baa93fa6
CF
1034 puts_filtered ("Code (Exec-Only, N.Conf");
1035 break;
c1748f97 1036 case 5:
baa93fa6 1037 puts_filtered ("Code (Exec/Read, N.Conf");
c1748f97
PM
1038 break;
1039 case 6:
baa93fa6 1040 puts_filtered ("Code (Exec-Only, Conf");
c1748f97
PM
1041 break;
1042 case 7:
baa93fa6 1043 puts_filtered ("Code (Exec/Read, Conf");
c1748f97
PM
1044 break;
1045 default:
1046 printf_filtered ("Unknown type 0x%x",info.HighWord.Bits.Type);
1047 }
1048 if ((info.HighWord.Bits.Type & 0x1) == 0)
baa93fa6 1049 puts_filtered(", N.Acc");
c1748f97
PM
1050 puts_filtered (")\n");
1051 if ((info.HighWord.Bits.Type & 0x10) == 0)
1052 puts_filtered("System selector ");
1053 printf_filtered ("Priviledge level = %d. ", info.HighWord.Bits.Dpl);
1054 if (info.HighWord.Bits.Granularity)
baa93fa6 1055 puts_filtered ("Page granular.\n");
c1748f97
PM
1056 else
1057 puts_filtered ("Byte granular.\n");
1058 return 1;
1059 }
1060 else
1061 {
5572ce1f
PM
1062 DWORD err = GetLastError ();
1063 if (err == ERROR_NOT_SUPPORTED)
1064 printf_filtered ("Function not supported\n");
1065 else
1066 printf_filtered ("Invalid selector 0x%lx.\n",sel);
c1748f97
PM
1067 return 0;
1068 }
1069}
1070
1071static void
1072display_selectors (char * args, int from_tty)
1073{
1074 if (!current_thread)
1075 {
1076 puts_filtered ("Impossible to display selectors now.\n");
1077 return;
1078 }
1079 if (!args)
1080 {
1081
1082 puts_filtered ("Selector $cs\n");
1083 display_selector (current_thread->h,
baa93fa6 1084 current_thread->context.SegCs);
c1748f97
PM
1085 puts_filtered ("Selector $ds\n");
1086 display_selector (current_thread->h,
baa93fa6 1087 current_thread->context.SegDs);
c1748f97
PM
1088 puts_filtered ("Selector $es\n");
1089 display_selector (current_thread->h,
baa93fa6 1090 current_thread->context.SegEs);
c1748f97
PM
1091 puts_filtered ("Selector $ss\n");
1092 display_selector (current_thread->h,
baa93fa6 1093 current_thread->context.SegSs);
c1748f97
PM
1094 puts_filtered ("Selector $fs\n");
1095 display_selector (current_thread->h,
1096 current_thread->context.SegFs);
1097 puts_filtered ("Selector $gs\n");
1098 display_selector (current_thread->h,
baa93fa6 1099 current_thread->context.SegGs);
c1748f97
PM
1100 }
1101 else
1102 {
1103 int sel;
1104 sel = parse_and_eval_long (args);
1105 printf_filtered ("Selector \"%s\"\n",args);
1106 display_selector (current_thread->h, sel);
1107 }
1108}
1109
7393af7c 1110#define DEBUG_EXCEPTION_SIMPLE(x) if (debug_exceptions) \
a74ce742
PM
1111 printf_unfiltered ("gdb: Target exception %s at %s\n", x, \
1112 host_address_to_string (\
1113 current_event.u.Exception.ExceptionRecord.ExceptionAddress))
7393af7c 1114
36339ecd 1115static int
450005e7 1116handle_exception (struct target_waitstatus *ourstatus)
24e60978 1117{
3cee93ac 1118 thread_info *th;
29fe111d 1119 DWORD code = current_event.u.Exception.ExceptionRecord.ExceptionCode;
3cee93ac 1120
29fe111d 1121 ourstatus->kind = TARGET_WAITKIND_STOPPED;
8a892701 1122
581e13c1 1123 /* Record the context of the current thread. */
3cee93ac 1124 th = thread_rec (current_event.dwThreadId, -1);
24e60978 1125
29fe111d 1126 switch (code)
24e60978 1127 {
1ef980b9 1128 case EXCEPTION_ACCESS_VIOLATION:
7393af7c
PM
1129 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ACCESS_VIOLATION");
1130 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
10325bc5 1131#ifdef __CYGWIN__
8da8e0b3 1132 {
581e13c1
MS
1133 /* See if the access violation happened within the cygwin DLL
1134 itself. Cygwin uses a kind of exception handling to deal
1135 with passed-in invalid addresses. gdb should not treat
1136 these as real SEGVs since they will be silently handled by
1137 cygwin. A real SEGV will (theoretically) be caught by
1138 cygwin later in the process and will be sent as a
1139 cygwin-specific-signal. So, ignore SEGVs if they show up
1140 within the text segment of the DLL itself. */
2c02bd72 1141 const char *fn;
581e13c1
MS
1142 CORE_ADDR addr = (CORE_ADDR) (uintptr_t)
1143 current_event.u.Exception.ExceptionRecord.ExceptionAddress;
1144
1145 if ((!cygwin_exceptions && (addr >= cygwin_load_start
1146 && addr < cygwin_load_end))
a244bdca 1147 || (find_pc_partial_function (addr, &fn, NULL, NULL)
581e13c1
MS
1148 && strncmp (fn, "KERNEL32!IsBad",
1149 strlen ("KERNEL32!IsBad")) == 0))
8da8e0b3
CF
1150 return 0;
1151 }
10325bc5 1152#endif
7393af7c
PM
1153 break;
1154 case STATUS_STACK_OVERFLOW:
1155 DEBUG_EXCEPTION_SIMPLE ("STATUS_STACK_OVERFLOW");
1ef980b9 1156 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
7393af7c
PM
1157 break;
1158 case STATUS_FLOAT_DENORMAL_OPERAND:
1159 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DENORMAL_OPERAND");
1160 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1161 break;
1162 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1163 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ARRAY_BOUNDS_EXCEEDED");
1164 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1165 break;
1166 case STATUS_FLOAT_INEXACT_RESULT:
1167 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INEXACT_RESULT");
1168 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1169 break;
1170 case STATUS_FLOAT_INVALID_OPERATION:
1171 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INVALID_OPERATION");
1172 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1173 break;
1174 case STATUS_FLOAT_OVERFLOW:
1175 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_OVERFLOW");
1176 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1177 break;
1178 case STATUS_FLOAT_STACK_CHECK:
1179 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_STACK_CHECK");
1180 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1ef980b9 1181 break;
3b7c8b74 1182 case STATUS_FLOAT_UNDERFLOW:
7393af7c
PM
1183 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_UNDERFLOW");
1184 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1185 break;
3b7c8b74 1186 case STATUS_FLOAT_DIVIDE_BY_ZERO:
7393af7c
PM
1187 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DIVIDE_BY_ZERO");
1188 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1189 break;
3b7c8b74 1190 case STATUS_INTEGER_DIVIDE_BY_ZERO:
7393af7c 1191 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_DIVIDE_BY_ZERO");
3b7c8b74 1192 ourstatus->value.sig = TARGET_SIGNAL_FPE;
3b7c8b74 1193 break;
7393af7c
PM
1194 case STATUS_INTEGER_OVERFLOW:
1195 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_OVERFLOW");
1196 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1ef980b9
SC
1197 break;
1198 case EXCEPTION_BREAKPOINT:
7393af7c 1199 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_BREAKPOINT");
1ef980b9
SC
1200 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
1201 break;
1202 case DBG_CONTROL_C:
7393af7c 1203 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_C");
1ef980b9 1204 ourstatus->value.sig = TARGET_SIGNAL_INT;
5b421780
PM
1205 break;
1206 case DBG_CONTROL_BREAK:
7393af7c 1207 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_BREAK");
5b421780 1208 ourstatus->value.sig = TARGET_SIGNAL_INT;
1ef980b9
SC
1209 break;
1210 case EXCEPTION_SINGLE_STEP:
7393af7c 1211 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_SINGLE_STEP");
1ef980b9
SC
1212 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
1213 break;
8227c82d 1214 case EXCEPTION_ILLEGAL_INSTRUCTION:
7393af7c
PM
1215 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ILLEGAL_INSTRUCTION");
1216 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1217 break;
1218 case EXCEPTION_PRIV_INSTRUCTION:
1219 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_PRIV_INSTRUCTION");
1220 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1221 break;
1222 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1223 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_NONCONTINUABLE_EXCEPTION");
8227c82d
CF
1224 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1225 break;
1ef980b9 1226 default:
581e13c1 1227 /* Treat unhandled first chance exceptions specially. */
02e423b9 1228 if (current_event.u.Exception.dwFirstChance)
a244bdca 1229 return -1;
a74ce742
PM
1230 printf_unfiltered ("gdb: unknown target exception 0x%08lx at %s\n",
1231 current_event.u.Exception.ExceptionRecord.ExceptionCode,
1232 host_address_to_string (
1233 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
24e60978 1234 ourstatus->value.sig = TARGET_SIGNAL_UNKNOWN;
1ef980b9 1235 break;
24e60978 1236 }
24e60978 1237 exception_count++;
7393af7c 1238 last_sig = ourstatus->value.sig;
36339ecd 1239 return 1;
24e60978
SC
1240}
1241
3cee93ac 1242/* Resume all artificially suspended threads if we are continuing
581e13c1 1243 execution. */
3cee93ac 1244static BOOL
dc05df57 1245windows_continue (DWORD continue_status, int id)
3cee93ac
CF
1246{
1247 int i;
1248 thread_info *th;
1249 BOOL res;
1250
1c1238a5 1251 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%ld, ctid=%lx, %s);\n",
7393af7c 1252 current_event.dwProcessId, current_event.dwThreadId,
dfe7f3ac 1253 continue_status == DBG_CONTINUE ?
7393af7c 1254 "DBG_CONTINUE" : "DBG_EXCEPTION_NOT_HANDLED"));
6537bb24
PA
1255
1256 for (th = &thread_head; (th = th->next) != NULL;)
1257 if ((id == -1 || id == (int) th->id)
1258 && th->suspended)
1259 {
1260 if (debug_registers_changed)
1261 {
1262 th->context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1263 th->context.Dr0 = dr[0];
1264 th->context.Dr1 = dr[1];
1265 th->context.Dr2 = dr[2];
1266 th->context.Dr3 = dr[3];
1267 th->context.Dr6 = DR6_CLEAR_VALUE;
1268 th->context.Dr7 = dr[7];
1269 }
1270 if (th->context.ContextFlags)
1271 {
1272 CHECK (SetThreadContext (th->h, &th->context));
1273 th->context.ContextFlags = 0;
1274 }
1275 if (th->suspended > 0)
1276 (void) ResumeThread (th->h);
1277 th->suspended = 0;
1278 }
1279
0714f9bf
SS
1280 res = ContinueDebugEvent (current_event.dwProcessId,
1281 current_event.dwThreadId,
1282 continue_status);
3cee93ac 1283
fa4ba8da 1284 debug_registers_changed = 0;
3cee93ac
CF
1285 return res;
1286}
1287
d6dc8049
CF
1288/* Called in pathological case where Windows fails to send a
1289 CREATE_PROCESS_DEBUG_EVENT after an attach. */
3ee6f623 1290static DWORD
5439edaa 1291fake_create_process (void)
3ade5333
CF
1292{
1293 current_process_handle = OpenProcess (PROCESS_ALL_ACCESS, FALSE,
1294 current_event.dwProcessId);
bf25528d
CF
1295 if (current_process_handle != NULL)
1296 open_process_used = 1;
1297 else
1298 {
b37520b6 1299 error (_("OpenProcess call failed, GetLastError = %lud"),
bf25528d
CF
1300 GetLastError ());
1301 /* We can not debug anything in that case. */
1302 }
3ade5333 1303 main_thread_id = current_event.dwThreadId;
711e434b
PM
1304 current_thread = windows_add_thread (
1305 ptid_build (current_event.dwProcessId, 0,
1306 current_event.dwThreadId),
1307 current_event.u.CreateThread.hThread,
1308 current_event.u.CreateThread.lpThreadLocalBase);
3ade5333
CF
1309 return main_thread_id;
1310}
1311
a244bdca 1312static void
28439f5e
PA
1313windows_resume (struct target_ops *ops,
1314 ptid_t ptid, int step, enum target_signal sig)
a244bdca
CF
1315{
1316 thread_info *th;
1317 DWORD continue_status = DBG_CONTINUE;
1318
2dc38344
PA
1319 /* A specific PTID means `step only this thread id'. */
1320 int resume_all = ptid_equal (ptid, minus_one_ptid);
1321
1322 /* If we're continuing all threads, it's the current inferior that
1323 should be handled specially. */
1324 if (resume_all)
1325 ptid = inferior_ptid;
a244bdca
CF
1326
1327 if (sig != TARGET_SIGNAL_0)
1328 {
1329 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
1330 {
1331 DEBUG_EXCEPT(("Cannot continue with signal %d here.\n",sig));
1332 }
1333 else if (sig == last_sig)
1334 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1335 else
1336#if 0
1337/* This code does not seem to work, because
1338 the kernel does probably not consider changes in the ExceptionRecord
1339 structure when passing the exception to the inferior.
1340 Note that this seems possible in the exception handler itself. */
1341 {
1342 int i;
1343 for (i = 0; xlate[i].them != -1; i++)
1344 if (xlate[i].us == sig)
1345 {
581e13c1
MS
1346 current_event.u.Exception.ExceptionRecord.ExceptionCode
1347 = xlate[i].them;
a244bdca
CF
1348 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1349 break;
1350 }
1351 if (continue_status == DBG_CONTINUE)
1352 {
1353 DEBUG_EXCEPT(("Cannot continue with signal %d.\n",sig));
1354 }
1355 }
1356#endif
1357 DEBUG_EXCEPT(("Can only continue with recieved signal %d.\n",
1358 last_sig));
1359 }
1360
1361 last_sig = TARGET_SIGNAL_0;
1362
dc05df57 1363 DEBUG_EXEC (("gdb: windows_resume (pid=%d, tid=%ld, step=%d, sig=%d);\n",
2dc38344 1364 ptid_get_pid (ptid), ptid_get_tid (ptid), step, sig));
a244bdca 1365
581e13c1 1366 /* Get context for currently selected thread. */
2dc38344 1367 th = thread_rec (ptid_get_tid (inferior_ptid), FALSE);
a244bdca
CF
1368 if (th)
1369 {
1370 if (step)
1371 {
581e13c1 1372 /* Single step by setting t bit. */
a97b0ac8
UW
1373 struct regcache *regcache = get_current_regcache ();
1374 struct gdbarch *gdbarch = get_regcache_arch (regcache);
1375 windows_fetch_inferior_registers (ops, regcache,
1376 gdbarch_ps_regnum (gdbarch));
a244bdca
CF
1377 th->context.EFlags |= FLAG_TRACE_BIT;
1378 }
1379
1380 if (th->context.ContextFlags)
1381 {
1382 if (debug_registers_changed)
1383 {
1384 th->context.Dr0 = dr[0];
1385 th->context.Dr1 = dr[1];
1386 th->context.Dr2 = dr[2];
1387 th->context.Dr3 = dr[3];
6537bb24 1388 th->context.Dr6 = DR6_CLEAR_VALUE;
a244bdca
CF
1389 th->context.Dr7 = dr[7];
1390 }
1391 CHECK (SetThreadContext (th->h, &th->context));
1392 th->context.ContextFlags = 0;
1393 }
1394 }
1395
1396 /* Allow continuing with the same signal that interrupted us.
581e13c1 1397 Otherwise complain. */
a244bdca 1398
2dc38344 1399 if (resume_all)
dc05df57 1400 windows_continue (continue_status, -1);
2dc38344 1401 else
dc05df57 1402 windows_continue (continue_status, ptid_get_tid (ptid));
a244bdca
CF
1403}
1404
695de547
CF
1405/* Ctrl-C handler used when the inferior is not run in the same console. The
1406 handler is in charge of interrupting the inferior using DebugBreakProcess.
1407 Note that this function is not available prior to Windows XP. In this case
1408 we emit a warning. */
d603d4b3 1409static BOOL WINAPI
695de547
CF
1410ctrl_c_handler (DWORD event_type)
1411{
1412 const int attach_flag = current_inferior ()->attach_flag;
1413
bb0613a5
PM
1414 /* Only handle Ctrl-C and Ctrl-Break events. Ignore others. */
1415 if (event_type != CTRL_C_EVENT && event_type != CTRL_BREAK_EVENT)
695de547
CF
1416 return FALSE;
1417
1418 /* If the inferior and the debugger share the same console, do nothing as
1419 the inferior has also received the Ctrl-C event. */
1420 if (!new_console && !attach_flag)
1421 return TRUE;
1422
1423 if (!DebugBreakProcess (current_process_handle))
581e13c1
MS
1424 warning (_("Could not interrupt program. "
1425 "Press Ctrl-c in the program console."));
695de547
CF
1426
1427 /* Return true to tell that Ctrl-C has been handled. */
1428 return TRUE;
1429}
1430
8a892701 1431/* Get the next event from the child. Return 1 if the event requires
695de547 1432 handling by WFI (or whatever). */
1e37c281 1433static int
28439f5e
PA
1434get_windows_debug_event (struct target_ops *ops,
1435 int pid, struct target_waitstatus *ourstatus)
1e37c281
JM
1436{
1437 BOOL debug_event;
8a892701 1438 DWORD continue_status, event_code;
87a45c96 1439 thread_info *th;
8a892701 1440 static thread_info dummy_thread_info;
450005e7 1441 int retval = 0;
1e37c281 1442
7393af7c 1443 last_sig = TARGET_SIGNAL_0;
9d3789f7 1444
8a892701 1445 if (!(debug_event = WaitForDebugEvent (&current_event, 1000)))
29fe111d 1446 goto out;
1e37c281
JM
1447
1448 event_count++;
1449 continue_status = DBG_CONTINUE;
1e37c281 1450
8a892701 1451 event_code = current_event.dwDebugEventCode;
450005e7 1452 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
87a45c96 1453 th = NULL;
a244bdca 1454 have_saved_context = 0;
8a892701
CF
1455
1456 switch (event_code)
1e37c281
JM
1457 {
1458 case CREATE_THREAD_DEBUG_EVENT:
1459 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1460 (unsigned) current_event.dwProcessId,
1461 (unsigned) current_event.dwThreadId,
1462 "CREATE_THREAD_DEBUG_EVENT"));
dfe7f3ac 1463 if (saw_create != 1)
3ade5333 1464 {
181e7f93
PA
1465 struct inferior *inf;
1466 inf = find_inferior_pid (current_event.dwProcessId);
1467 if (!saw_create && inf->attach_flag)
3ade5333 1468 {
d6dc8049
CF
1469 /* Kludge around a Windows bug where first event is a create
1470 thread event. Caused when attached process does not have
581e13c1 1471 a main thread. */
3a3e9ee3 1472 retval = fake_create_process ();
181e7f93
PA
1473 if (retval)
1474 saw_create++;
3ade5333
CF
1475 }
1476 break;
1477 }
581e13c1 1478 /* Record the existence of this thread. */
450005e7 1479 retval = current_event.dwThreadId;
dc05df57 1480 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1481 current_event.dwThreadId),
711e434b
PM
1482 current_event.u.CreateThread.hThread,
1483 current_event.u.CreateThread.lpThreadLocalBase);
1484
1e37c281
JM
1485 break;
1486
1487 case EXIT_THREAD_DEBUG_EVENT:
1c1238a5 1488 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1489 (unsigned) current_event.dwProcessId,
1490 (unsigned) current_event.dwThreadId,
1491 "EXIT_THREAD_DEBUG_EVENT"));
b3c613f2 1492
87a45c96
CF
1493 if (current_event.dwThreadId != main_thread_id)
1494 {
dc05df57 1495 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1496 current_event.dwThreadId));
87a45c96
CF
1497 th = &dummy_thread_info;
1498 }
1e37c281
JM
1499 break;
1500
1501 case CREATE_PROCESS_DEBUG_EVENT:
1c1238a5 1502 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1503 (unsigned) current_event.dwProcessId,
1504 (unsigned) current_event.dwThreadId,
1505 "CREATE_PROCESS_DEBUG_EVENT"));
700b351b 1506 CloseHandle (current_event.u.CreateProcessInfo.hFile);
dfe7f3ac 1507 if (++saw_create != 1)
bf25528d 1508 break;
1e37c281 1509
dfe7f3ac 1510 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
87a45c96 1511 if (main_thread_id)
695de547
CF
1512 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
1513 main_thread_id));
9d3789f7 1514 main_thread_id = current_event.dwThreadId;
581e13c1 1515 /* Add the main thread. */
dc05df57 1516 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
695de547 1517 current_event.dwThreadId),
711e434b
PM
1518 current_event.u.CreateProcessInfo.hThread,
1519 current_event.u.CreateProcessInfo.lpThreadLocalBase);
3a3e9ee3 1520 retval = current_event.dwThreadId;
1e37c281
JM
1521 break;
1522
1523 case EXIT_PROCESS_DEBUG_EVENT:
1c1238a5 1524 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1525 (unsigned) current_event.dwProcessId,
1526 (unsigned) current_event.dwThreadId,
1527 "EXIT_PROCESS_DEBUG_EVENT"));
16d905e2
CF
1528 if (!windows_initialization_done)
1529 {
1530 target_terminal_ours ();
1531 target_mourn_inferior ();
1532 error (_("During startup program exited with code 0x%x."),
1533 (unsigned int) current_event.u.ExitProcess.dwExitCode);
1534 }
1535 else if (saw_create == 1)
1536 {
1537 ourstatus->kind = TARGET_WAITKIND_EXITED;
1538 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
1539 retval = main_thread_id;
1540 }
8a892701 1541 break;
1e37c281
JM
1542
1543 case LOAD_DLL_DEBUG_EVENT:
1c1238a5 1544 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1545 (unsigned) current_event.dwProcessId,
1546 (unsigned) current_event.dwThreadId,
1547 "LOAD_DLL_DEBUG_EVENT"));
700b351b 1548 CloseHandle (current_event.u.LoadDll.hFile);
dfe7f3ac
CF
1549 if (saw_create != 1)
1550 break;
8a892701 1551 catch_errors (handle_load_dll, NULL, (char *) "", RETURN_MASK_ALL);
450005e7
CF
1552 ourstatus->kind = TARGET_WAITKIND_LOADED;
1553 ourstatus->value.integer = 0;
9d3789f7 1554 retval = main_thread_id;
1e37c281
JM
1555 break;
1556
1557 case UNLOAD_DLL_DEBUG_EVENT:
1c1238a5 1558 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1559 (unsigned) current_event.dwProcessId,
1560 (unsigned) current_event.dwThreadId,
1561 "UNLOAD_DLL_DEBUG_EVENT"));
dfe7f3ac
CF
1562 if (saw_create != 1)
1563 break;
d3ff4a77 1564 catch_errors (handle_unload_dll, NULL, (char *) "", RETURN_MASK_ALL);
de1b3c3d
PA
1565 ourstatus->kind = TARGET_WAITKIND_LOADED;
1566 ourstatus->value.integer = 0;
1567 retval = main_thread_id;
d3ff4a77 1568 break;
1e37c281
JM
1569
1570 case EXCEPTION_DEBUG_EVENT:
1c1238a5 1571 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1572 (unsigned) current_event.dwProcessId,
1573 (unsigned) current_event.dwThreadId,
1574 "EXCEPTION_DEBUG_EVENT"));
dfe7f3ac
CF
1575 if (saw_create != 1)
1576 break;
a244bdca
CF
1577 switch (handle_exception (ourstatus))
1578 {
1579 case 0:
1580 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1581 break;
1582 case 1:
1583 retval = current_event.dwThreadId;
1584 break;
1585 case -1:
1586 last_sig = 1;
1587 continue_status = -1;
1588 break;
1589 }
1e37c281
JM
1590 break;
1591
581e13c1 1592 case OUTPUT_DEBUG_STRING_EVENT: /* Message from the kernel. */
1c1238a5 1593 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1594 (unsigned) current_event.dwProcessId,
1595 (unsigned) current_event.dwThreadId,
1596 "OUTPUT_DEBUG_STRING_EVENT"));
dfe7f3ac
CF
1597 if (saw_create != 1)
1598 break;
a244bdca 1599 retval = handle_output_debug_string (ourstatus);
1e37c281 1600 break;
9d3789f7 1601
1e37c281 1602 default:
dfe7f3ac
CF
1603 if (saw_create != 1)
1604 break;
29fe111d
CF
1605 printf_unfiltered ("gdb: kernel event for pid=%ld tid=%ld\n",
1606 (DWORD) current_event.dwProcessId,
1607 (DWORD) current_event.dwThreadId);
1608 printf_unfiltered (" unknown event code %ld\n",
1e37c281
JM
1609 current_event.dwDebugEventCode);
1610 break;
1611 }
1612
dfe7f3ac 1613 if (!retval || saw_create != 1)
a244bdca
CF
1614 {
1615 if (continue_status == -1)
02529b48 1616 windows_resume (ops, minus_one_ptid, 0, 1);
a244bdca 1617 else
dc05df57 1618 CHECK (windows_continue (continue_status, -1));
a244bdca 1619 }
450005e7 1620 else
9d3789f7 1621 {
2dc38344
PA
1622 inferior_ptid = ptid_build (current_event.dwProcessId, 0,
1623 retval);
3ade5333 1624 current_thread = th ?: thread_rec (current_event.dwThreadId, TRUE);
9d3789f7 1625 }
1e37c281
JM
1626
1627out:
450005e7 1628 return retval;
1e37c281
JM
1629}
1630
2dc38344 1631/* Wait for interesting events to occur in the target process. */
39f77062 1632static ptid_t
117de6a9 1633windows_wait (struct target_ops *ops,
47608cb1 1634 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
24e60978 1635{
2dc38344 1636 int pid = -1;
39f77062 1637
c44537cf
CV
1638 target_terminal_ours ();
1639
24e60978
SC
1640 /* We loop when we get a non-standard exception rather than return
1641 with a SPURIOUS because resume can try and step or modify things,
3cee93ac 1642 which needs a current_thread->h. But some of these exceptions mark
24e60978 1643 the birth or death of threads, which mean that the current thread
581e13c1 1644 isn't necessarily what you think it is. */
24e60978
SC
1645
1646 while (1)
450005e7 1647 {
c57918b2 1648 int retval;
2b008701 1649
695de547
CF
1650 /* If the user presses Ctrl-c while the debugger is waiting
1651 for an event, he expects the debugger to interrupt his program
1652 and to get the prompt back. There are two possible situations:
1653
1654 - The debugger and the program do not share the console, in
1655 which case the Ctrl-c event only reached the debugger.
1656 In that case, the ctrl_c handler will take care of interrupting
581e13c1
MS
1657 the inferior. Note that this case is working starting with
1658 Windows XP. For Windows 2000, Ctrl-C should be pressed in the
695de547
CF
1659 inferior console.
1660
1661 - The debugger and the program share the same console, in which
1662 case both debugger and inferior will receive the Ctrl-c event.
1663 In that case the ctrl_c handler will ignore the event, as the
1664 Ctrl-c event generated inside the inferior will trigger the
1665 expected debug event.
1666
1667 FIXME: brobecker/2008-05-20: If the inferior receives the
1668 signal first and the delay until GDB receives that signal
1669 is sufficiently long, GDB can sometimes receive the SIGINT
1670 after we have unblocked the CTRL+C handler. This would
1671 lead to the debugger stopping prematurely while handling
1672 the new-thread event that comes with the handling of the SIGINT
1673 inside the inferior, and then stop again immediately when
1674 the user tries to resume the execution in the inferior.
1675 This is a classic race that we should try to fix one day. */
1676 SetConsoleCtrlHandler (&ctrl_c_handler, TRUE);
28439f5e 1677 retval = get_windows_debug_event (ops, pid, ourstatus);
695de547 1678 SetConsoleCtrlHandler (&ctrl_c_handler, FALSE);
c57918b2 1679
450005e7 1680 if (retval)
2dc38344 1681 return ptid_build (current_event.dwProcessId, 0, retval);
450005e7
CF
1682 else
1683 {
1684 int detach = 0;
3cee93ac 1685
98bbd631
AC
1686 if (deprecated_ui_loop_hook != NULL)
1687 detach = deprecated_ui_loop_hook (0);
0714f9bf 1688
450005e7 1689 if (detach)
7d85a9c0 1690 windows_kill_inferior (ops);
450005e7
CF
1691 }
1692 }
24e60978
SC
1693}
1694
9d3789f7 1695static void
dc05df57 1696do_initial_windows_stuff (struct target_ops *ops, DWORD pid, int attaching)
9d3789f7
CF
1697{
1698 extern int stop_after_trap;
fa4ba8da 1699 int i;
d6b48e9c 1700 struct inferior *inf;
2020b7ab 1701 struct thread_info *tp;
9d3789f7 1702
7393af7c 1703 last_sig = TARGET_SIGNAL_0;
9d3789f7
CF
1704 event_count = 0;
1705 exception_count = 0;
bf25528d 1706 open_process_used = 0;
fa4ba8da 1707 debug_registers_changed = 0;
dfe7f3ac 1708 debug_registers_used = 0;
fa4ba8da
PM
1709 for (i = 0; i < sizeof (dr) / sizeof (dr[0]); i++)
1710 dr[i] = 0;
10325bc5 1711#ifdef __CYGWIN__
de1b3c3d 1712 cygwin_load_start = cygwin_load_end = 0;
10325bc5 1713#endif
9d3789f7
CF
1714 current_event.dwProcessId = pid;
1715 memset (&current_event, 0, sizeof (current_event));
0795be10 1716 push_target (ops);
cb851954 1717 disable_breakpoints_in_shlibs ();
dc05df57 1718 windows_clear_solib ();
9d3789f7
CF
1719 clear_proceed_status ();
1720 init_wait_for_inferior ();
1721
6c95b8df
PA
1722 inf = current_inferior ();
1723 inferior_appeared (inf, pid);
181e7f93 1724 inf->attach_flag = attaching;
7f9f62ba 1725
9f9d052e
PM
1726 /* Make the new process the current inferior, so terminal handling
1727 can rely on it. When attaching, we don't know about any thread
1728 id here, but that's OK --- nothing should be referencing the
dc05df57 1729 current thread until we report an event out of windows_wait. */
9f9d052e
PM
1730 inferior_ptid = pid_to_ptid (pid);
1731
c44537cf 1732 terminal_init_inferior_with_pgrp (pid);
9d3789f7
CF
1733 target_terminal_inferior ();
1734
16d905e2 1735 windows_initialization_done = 0;
16c381f0 1736 inf->control.stop_soon = STOP_QUIETLY;
9d3789f7
CF
1737 while (1)
1738 {
1739 stop_after_trap = 1;
e4c8541f 1740 wait_for_inferior ();
2020b7ab 1741 tp = inferior_thread ();
16c381f0
JK
1742 if (tp->suspend.stop_signal != TARGET_SIGNAL_TRAP)
1743 resume (0, tp->suspend.stop_signal);
9d3789f7
CF
1744 else
1745 break;
1746 }
eff8332b 1747
16d905e2 1748 windows_initialization_done = 1;
16c381f0 1749 inf->control.stop_soon = NO_STOP_QUIETLY;
9d3789f7
CF
1750 stop_after_trap = 0;
1751 return;
1752}
1753
616a9dc4
CV
1754/* Try to set or remove a user privilege to the current process. Return -1
1755 if that fails, the previous setting of that privilege otherwise.
1756
1757 This code is copied from the Cygwin source code and rearranged to allow
1758 dynamically loading of the needed symbols from advapi32 which is only
581e13c1 1759 available on NT/2K/XP. */
616a9dc4
CV
1760static int
1761set_process_privilege (const char *privilege, BOOL enable)
1762{
616a9dc4
CV
1763 HANDLE token_hdl = NULL;
1764 LUID restore_priv;
1765 TOKEN_PRIVILEGES new_priv, orig_priv;
1766 int ret = -1;
1767 DWORD size;
1768
616a9dc4
CV
1769 if (!OpenProcessToken (GetCurrentProcess (),
1770 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
1771 &token_hdl))
1772 goto out;
1773
418c6cb3 1774 if (!LookupPrivilegeValueA (NULL, privilege, &restore_priv))
616a9dc4
CV
1775 goto out;
1776
1777 new_priv.PrivilegeCount = 1;
1778 new_priv.Privileges[0].Luid = restore_priv;
1779 new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0;
1780
1781 if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv,
295732ea 1782 sizeof orig_priv, &orig_priv, &size))
616a9dc4
CV
1783 goto out;
1784#if 0
1785 /* Disabled, otherwise every `attach' in an unprivileged user session
1786 would raise the "Failed to get SE_DEBUG_NAME privilege" warning in
581e13c1 1787 windows_attach(). */
616a9dc4 1788 /* AdjustTokenPrivileges returns TRUE even if the privilege could not
581e13c1 1789 be enabled. GetLastError () returns an correct error code, though. */
616a9dc4
CV
1790 if (enable && GetLastError () == ERROR_NOT_ALL_ASSIGNED)
1791 goto out;
1792#endif
1793
1794 ret = orig_priv.Privileges[0].Attributes == SE_PRIVILEGE_ENABLED ? 1 : 0;
1795
1796out:
1797 if (token_hdl)
1798 CloseHandle (token_hdl);
1799
1800 return ret;
1801}
1802
02cc9f49 1803/* Attach to process PID, then initialize for debugging it. */
24e60978 1804static void
dc05df57 1805windows_attach (struct target_ops *ops, char *args, int from_tty)
24e60978
SC
1806{
1807 BOOL ok;
559e75c0 1808 DWORD pid;
24e60978 1809
74164c56 1810 pid = parse_pid_to_attach (args);
24e60978 1811
616a9dc4
CV
1812 if (set_process_privilege (SE_DEBUG_NAME, TRUE) < 0)
1813 {
1814 printf_unfiltered ("Warning: Failed to get SE_DEBUG_NAME privilege\n");
581e13c1
MS
1815 printf_unfiltered ("This can cause attach to "
1816 "fail on Windows NT/2K/XP\n");
616a9dc4
CV
1817 }
1818
dc05df57 1819 windows_init_thread_list ();
9d3789f7 1820 ok = DebugActiveProcess (pid);
91a175b3 1821 saw_create = 0;
24e60978 1822
10325bc5 1823#ifdef __CYGWIN__
24e60978 1824 if (!ok)
baa93fa6 1825 {
581e13c1 1826 /* Try fall back to Cygwin pid. */
baa93fa6
CF
1827 pid = cygwin_internal (CW_CYGWIN_PID_TO_WINPID, pid);
1828
1829 if (pid > 0)
1830 ok = DebugActiveProcess (pid);
10325bc5
PA
1831 }
1832#endif
baa93fa6 1833
10325bc5
PA
1834 if (!ok)
1835 error (_("Can't attach to process."));
24e60978 1836
2b008701 1837 DebugSetProcessKillOnExit (FALSE);
3ade5333 1838
24e60978
SC
1839 if (from_tty)
1840 {
1841 char *exec_file = (char *) get_exec_file (0);
1842
1843 if (exec_file)
1844 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
39f77062 1845 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1846 else
1847 printf_unfiltered ("Attaching to %s\n",
39f77062 1848 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1849
1850 gdb_flush (gdb_stdout);
1851 }
1852
dc05df57 1853 do_initial_windows_stuff (ops, pid, 1);
9d3789f7 1854 target_terminal_ours ();
24e60978
SC
1855}
1856
24e60978 1857static void
dc05df57 1858windows_detach (struct target_ops *ops, char *args, int from_tty)
24e60978 1859{
02cc9f49
CV
1860 int detached = 1;
1861
2b008701
CF
1862 ptid_t ptid = {-1};
1863 windows_resume (ops, ptid, 0, TARGET_SIGNAL_0);
96998ce7 1864
2b008701
CF
1865 if (!DebugActiveProcessStop (current_event.dwProcessId))
1866 {
1867 error (_("Can't detach process %lu (error %lu)"),
1868 current_event.dwProcessId, GetLastError ());
1869 detached = 0;
02cc9f49 1870 }
2b008701
CF
1871 DebugSetProcessKillOnExit (FALSE);
1872
02cc9f49 1873 if (detached && from_tty)
24e60978
SC
1874 {
1875 char *exec_file = get_exec_file (0);
1876 if (exec_file == 0)
1877 exec_file = "";
02cc9f49
CV
1878 printf_unfiltered ("Detaching from program: %s, Pid %lu\n", exec_file,
1879 current_event.dwProcessId);
24e60978
SC
1880 gdb_flush (gdb_stdout);
1881 }
7f9f62ba 1882
39f77062 1883 inferior_ptid = null_ptid;
7f9f62ba
PA
1884 detach_inferior (current_event.dwProcessId);
1885
0795be10 1886 unpush_target (ops);
24e60978
SC
1887}
1888
3ee6f623 1889static char *
dc05df57 1890windows_pid_to_exec_file (int pid)
47216e51 1891{
b3c613f2 1892 static char path[__PMAX];
10325bc5 1893#ifdef __CYGWIN__
581e13c1 1894 /* Try to find exe name as symlink target of /proc/<pid>/exe. */
33605d39
CF
1895 int nchars;
1896 char procexe[sizeof ("/proc/4294967295/exe")];
2dc38344 1897 sprintf (procexe, "/proc/%u/exe", pid);
33605d39
CF
1898 nchars = readlink (procexe, path, sizeof(path));
1899 if (nchars > 0 && nchars < sizeof (path))
47216e51 1900 {
33605d39
CF
1901 path[nchars] = '\0'; /* Got it */
1902 return path;
47216e51 1903 }
10325bc5
PA
1904#endif
1905
33605d39 1906 /* If we get here then either Cygwin is hosed, this isn't a Cygwin version
581e13c1 1907 of gdb, or we're trying to debug a non-Cygwin windows executable. */
33605d39
CF
1908 if (!get_module_name (0, path))
1909 path[0] = '\0';
1910
1911 return path;
47216e51
CV
1912}
1913
24e60978
SC
1914/* Print status information about what we're accessing. */
1915
1916static void
dc05df57 1917windows_files_info (struct target_ops *ignore)
24e60978 1918{
181e7f93
PA
1919 struct inferior *inf = current_inferior ();
1920
24e60978 1921 printf_unfiltered ("\tUsing the running image of %s %s.\n",
181e7f93
PA
1922 inf->attach_flag ? "attached" : "child",
1923 target_pid_to_str (inferior_ptid));
24e60978
SC
1924}
1925
24e60978 1926static void
dc05df57 1927windows_open (char *arg, int from_tty)
24e60978 1928{
8a3fe4f8 1929 error (_("Use the \"run\" command to start a Unix child process."));
24e60978
SC
1930}
1931
cd44747c
PM
1932/* Modify CreateProcess parameters for use of a new separate console.
1933 Parameters are:
1934 *FLAGS: DWORD parameter for general process creation flags.
1935 *SI: STARTUPINFO structure, for which the console window size and
1936 console buffer size is filled in if GDB is running in a console.
1937 to create the new console.
1938 The size of the used font is not available on all versions of
1939 Windows OS. Furthermore, the current font might not be the default
1940 font, but this is still better than before.
1941 If the windows and buffer sizes are computed,
1942 SI->DWFLAGS is changed so that this information is used
1943 by CreateProcess function. */
1944
1945static void
1946windows_set_console_info (STARTUPINFO *si, DWORD *flags)
1947{
1948 HANDLE hconsole = CreateFile ("CONOUT$", GENERIC_READ | GENERIC_WRITE,
1949 FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, 0);
1950
1951 if (hconsole != INVALID_HANDLE_VALUE)
1952 {
1953 CONSOLE_SCREEN_BUFFER_INFO sbinfo;
1954 COORD font_size;
1955 CONSOLE_FONT_INFO cfi;
1956
1957 GetCurrentConsoleFont (hconsole, FALSE, &cfi);
1958 font_size = GetConsoleFontSize (hconsole, cfi.nFont);
1959 GetConsoleScreenBufferInfo(hconsole, &sbinfo);
1960 si->dwXSize = sbinfo.srWindow.Right - sbinfo.srWindow.Left + 1;
1961 si->dwYSize = sbinfo.srWindow.Bottom - sbinfo.srWindow.Top + 1;
1962 if (font_size.X)
1963 si->dwXSize *= font_size.X;
1964 else
1965 si->dwXSize *= 8;
1966 if (font_size.Y)
1967 si->dwYSize *= font_size.Y;
1968 else
1969 si->dwYSize *= 12;
1970 si->dwXCountChars = sbinfo.dwSize.X;
1971 si->dwYCountChars = sbinfo.dwSize.Y;
1972 si->dwFlags |= STARTF_USESIZE | STARTF_USECOUNTCHARS;
1973 }
1974 *flags |= CREATE_NEW_CONSOLE;
1975}
1976
c93dbcba
EZ
1977#ifndef __CYGWIN__
1978/* Function called by qsort to sort environment strings. */
1979
1980static int
1981envvar_cmp (const void *a, const void *b)
1982{
1983 const char **p = (const char **) a;
1984 const char **q = (const char **) b;
1985 return strcasecmp (*p, *q);
1986}
1987#endif
1988
b7ff339d
CV
1989#ifdef __CYGWIN__
1990static void
1991clear_win32_environment (char **env)
1992{
1993 int i;
1994 size_t len;
1995 wchar_t *copy = NULL, *equalpos;
1996
1997 for (i = 0; env[i] && *env[i]; i++)
1998 {
1999 len = mbstowcs (NULL, env[i], 0) + 1;
2000 copy = (wchar_t *) xrealloc (copy, len * sizeof (wchar_t));
2001 mbstowcs (copy, env[i], len);
2002 equalpos = wcschr (copy, L'=');
2003 if (equalpos)
2004 *equalpos = L'\0';
2005 SetEnvironmentVariableW (copy, NULL);
2006 }
2007 xfree (copy);
2008}
2009#endif
2010
dc05df57 2011/* Start an inferior windows child process and sets inferior_ptid to its pid.
24e60978
SC
2012 EXEC_FILE is the file to run.
2013 ALLARGS is a string containing the arguments to the program.
2014 ENV is the environment vector to pass. Errors reported with error(). */
2015
24e60978 2016static void
dc05df57 2017windows_create_inferior (struct target_ops *ops, char *exec_file,
136d6dae 2018 char *allargs, char **in_env, int from_tty)
24e60978 2019{
b3c613f2 2020 STARTUPINFO si;
41b4aadc 2021#ifdef __CYGWIN__
b3c613f2
CF
2022 cygwin_buf_t real_path[__PMAX];
2023 cygwin_buf_t shell[__PMAX]; /* Path to shell */
d0d0ab16 2024 const char *sh;
b3c613f2
CF
2025 cygwin_buf_t *toexec;
2026 cygwin_buf_t *cygallargs;
2027 cygwin_buf_t *args;
b7ff339d
CV
2028 char **old_env = NULL;
2029 PWCHAR w32_env;
d0d0ab16 2030 size_t len;
2becadee
CF
2031 int tty;
2032 int ostdin, ostdout, ostderr;
41b4aadc 2033#else
b3c613f2
CF
2034 char real_path[__PMAX];
2035 char shell[__PMAX]; /* Path to shell */
d0d0ab16
CV
2036 char *toexec;
2037 char *args;
41b4aadc 2038 HANDLE tty;
c93dbcba
EZ
2039 char *w32env;
2040 char *temp;
2041 size_t envlen;
2042 int i;
2043 size_t envsize;
2044 char **env;
41b4aadc 2045#endif
d0d0ab16
CV
2046 PROCESS_INFORMATION pi;
2047 BOOL ret;
2048 DWORD flags = 0;
3cb3b8df 2049 const char *inferior_io_terminal = get_inferior_io_terminal ();
24e60978
SC
2050
2051 if (!exec_file)
8a3fe4f8 2052 error (_("No executable specified, use `target exec'."));
24e60978
SC
2053
2054 memset (&si, 0, sizeof (si));
2055 si.cb = sizeof (si);
2056
d0d0ab16
CV
2057 if (new_group)
2058 flags |= CREATE_NEW_PROCESS_GROUP;
2059
2060 if (new_console)
cd44747c 2061 windows_set_console_info (&si, &flags);
d0d0ab16 2062
10325bc5 2063#ifdef __CYGWIN__
349b409f 2064 if (!useshell)
dfe7f3ac 2065 {
d0d0ab16
CV
2066 flags |= DEBUG_ONLY_THIS_PROCESS;
2067 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, exec_file, real_path,
b3c613f2 2068 __PMAX * sizeof (cygwin_buf_t)) < 0)
d0d0ab16 2069 error (_("Error starting executable: %d"), errno);
dfe7f3ac 2070 toexec = real_path;
b3c613f2 2071#ifdef __USEWIDE
d0d0ab16
CV
2072 len = mbstowcs (NULL, allargs, 0) + 1;
2073 if (len == (size_t) -1)
2074 error (_("Error starting executable: %d"), errno);
2075 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2076 mbstowcs (cygallargs, allargs, len);
60c5c021
CF
2077#else
2078 cygallargs = allargs;
b3c613f2 2079#endif
dfe7f3ac
CF
2080 }
2081 else
2082 {
349b409f
CF
2083 sh = getenv ("SHELL");
2084 if (!sh)
2085 sh = "/bin/sh";
b3c613f2 2086 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, sh, shell, __PMAX) < 0)
d0d0ab16 2087 error (_("Error starting executable via shell: %d"), errno);
b3c613f2 2088#ifdef __USEWIDE
d0d0ab16
CV
2089 len = sizeof (L" -c 'exec '") + mbstowcs (NULL, exec_file, 0)
2090 + mbstowcs (NULL, allargs, 0) + 2;
2091 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2092 swprintf (cygallargs, len, L" -c 'exec %s %s'", exec_file, allargs);
b3c613f2 2093#else
581e13c1
MS
2094 cygallargs = (char *)
2095 alloca (sizeof (" -c 'exec '") + strlen (exec_file)
b3c613f2
CF
2096 + strlen (allargs) + 2);
2097 sprintf (cygallargs, " -c 'exec %s %s'", exec_file, allargs);
2098#endif
dfe7f3ac 2099 toexec = shell;
d0d0ab16 2100 flags |= DEBUG_PROCESS;
dfe7f3ac 2101 }
b3c613f2
CF
2102
2103#ifdef __USEWIDE
2104 args = (cygwin_buf_t *) alloca ((wcslen (toexec) + wcslen (cygallargs) + 2)
2105 * sizeof (wchar_t));
d0d0ab16
CV
2106 wcscpy (args, toexec);
2107 wcscat (args, L" ");
2108 wcscat (args, cygallargs);
b3c613f2
CF
2109#else
2110 args = (cygwin_buf_t *) alloca (strlen (toexec) + strlen (cygallargs) + 2);
2111 strcpy (args, toexec);
2112 strcat (args, " ");
2113 strcat (args, cygallargs);
2114#endif
2115
b7ff339d
CV
2116#ifdef CW_CVT_ENV_TO_WINENV
2117 /* First try to create a direct Win32 copy of the POSIX environment. */
2118 w32_env = (PWCHAR) cygwin_internal (CW_CVT_ENV_TO_WINENV, in_env);
2119 if (w32_env != (PWCHAR) -1)
2120 flags |= CREATE_UNICODE_ENVIRONMENT;
2121 else
2122 /* If that fails, fall back to old method tweaking GDB's environment. */
2123#endif
2124 {
2125 /* Reset all Win32 environment variables to avoid leftover on next run. */
2126 clear_win32_environment (environ);
2127 /* Prepare the environment vars for CreateProcess. */
2128 old_env = environ;
2129 environ = in_env;
2130 cygwin_internal (CW_SYNC_WINENV);
2131 w32_env = NULL;
2132 }
1750a5ef 2133
2becadee
CF
2134 if (!inferior_io_terminal)
2135 tty = ostdin = ostdout = ostderr = -1;
2136 else
2137 {
2138 tty = open (inferior_io_terminal, O_RDWR | O_NOCTTY);
2139 if (tty < 0)
2140 {
2141 print_sys_errmsg (inferior_io_terminal, errno);
2142 ostdin = ostdout = ostderr = -1;
2143 }
2144 else
2145 {
2146 ostdin = dup (0);
2147 ostdout = dup (1);
2148 ostderr = dup (2);
2149 dup2 (tty, 0);
2150 dup2 (tty, 1);
2151 dup2 (tty, 2);
2152 }
2153 }
d0d0ab16
CV
2154
2155 windows_init_thread_list ();
b3c613f2
CF
2156 ret = CreateProcess (0,
2157 args, /* command line */
2158 NULL, /* Security */
2159 NULL, /* thread */
2160 TRUE, /* inherit handles */
2161 flags, /* start flags */
b7ff339d 2162 w32_env, /* environment */
b3c613f2
CF
2163 NULL, /* current directory */
2164 &si,
2165 &pi);
b7ff339d
CV
2166 if (w32_env)
2167 /* Just free the Win32 environment, if it could be created. */
2168 free (w32_env);
2169 else
2170 {
2171 /* Reset all environment variables to avoid leftover on next run. */
2172 clear_win32_environment (in_env);
2173 /* Restore normal GDB environment variables. */
2174 environ = old_env;
2175 cygwin_internal (CW_SYNC_WINENV);
2176 }
2177
d0d0ab16
CV
2178 if (tty >= 0)
2179 {
2180 close (tty);
2181 dup2 (ostdin, 0);
2182 dup2 (ostdout, 1);
2183 dup2 (ostderr, 2);
2184 close (ostdin);
2185 close (ostdout);
2186 close (ostderr);
2187 }
41b4aadc 2188#else
b3c613f2 2189 toexec = exec_file;
d0d0ab16
CV
2190 args = alloca (strlen (toexec) + strlen (allargs) + 2);
2191 strcpy (args, toexec);
2192 strcat (args, " ");
2193 strcat (args, allargs);
2194
d0d0ab16
CV
2195 flags |= DEBUG_ONLY_THIS_PROCESS;
2196
41b4aadc
CF
2197 if (!inferior_io_terminal)
2198 tty = INVALID_HANDLE_VALUE;
2199 else
2200 {
2201 SECURITY_ATTRIBUTES sa;
2202 sa.nLength = sizeof(sa);
2203 sa.lpSecurityDescriptor = 0;
2204 sa.bInheritHandle = TRUE;
2205 tty = CreateFileA (inferior_io_terminal, GENERIC_READ | GENERIC_WRITE,
2206 0, &sa, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
2207 if (tty == INVALID_HANDLE_VALUE)
2208 warning (_("Warning: Failed to open TTY %s, error %#x."),
2209 inferior_io_terminal, (unsigned) GetLastError ());
2210 else
2211 {
2212 si.hStdInput = tty;
2213 si.hStdOutput = tty;
2214 si.hStdError = tty;
2215 si.dwFlags |= STARTF_USESTDHANDLES;
2216 }
2217 }
2becadee 2218
c93dbcba
EZ
2219 /* CreateProcess takes the environment list as a null terminated set of
2220 strings (i.e. two nulls terminate the list). */
2221
2222 /* Get total size for env strings. */
2223 for (envlen = 0, i = 0; in_env[i] && *in_env[i]; i++)
2224 envlen += strlen (in_env[i]) + 1;
2225
2226 envsize = sizeof (in_env[0]) * (i + 1);
2227 env = (char **) alloca (envsize);
2228 memcpy (env, in_env, envsize);
2229 /* Windows programs expect the environment block to be sorted. */
2230 qsort (env, i, sizeof (char *), envvar_cmp);
2231
2232 w32env = alloca (envlen + 1);
2233
2234 /* Copy env strings into new buffer. */
2235 for (temp = w32env, i = 0; env[i] && *env[i]; i++)
2236 {
2237 strcpy (temp, env[i]);
2238 temp += strlen (temp) + 1;
2239 }
2240
2241 /* Final nil string to terminate new env. */
2242 *temp = 0;
2243
dc05df57 2244 windows_init_thread_list ();
d0d0ab16
CV
2245 ret = CreateProcessA (0,
2246 args, /* command line */
2247 NULL, /* Security */
2248 NULL, /* thread */
2249 TRUE, /* inherit handles */
2250 flags, /* start flags */
c93dbcba 2251 w32env, /* environment */
d0d0ab16
CV
2252 NULL, /* current directory */
2253 &si,
2254 &pi);
41b4aadc
CF
2255 if (tty != INVALID_HANDLE_VALUE)
2256 CloseHandle (tty);
10325bc5 2257#endif
2becadee 2258
24e60978 2259 if (!ret)
8a3fe4f8
AC
2260 error (_("Error creating process %s, (error %d)."),
2261 exec_file, (unsigned) GetLastError ());
24e60978 2262
c1766e7d
PM
2263 CloseHandle (pi.hThread);
2264 CloseHandle (pi.hProcess);
2265
dfe7f3ac
CF
2266 if (useshell && shell[0] != '\0')
2267 saw_create = -1;
2268 else
2269 saw_create = 0;
2270
dc05df57 2271 do_initial_windows_stuff (ops, pi.dwProcessId, 0);
d3a09475 2272
dc05df57 2273 /* windows_continue (DBG_CONTINUE, -1); */
24e60978
SC
2274}
2275
2276static void
dc05df57 2277windows_mourn_inferior (struct target_ops *ops)
24e60978 2278{
dc05df57 2279 (void) windows_continue (DBG_CONTINUE, -1);
fa4ba8da 2280 i386_cleanup_dregs();
bf25528d
CF
2281 if (open_process_used)
2282 {
2283 CHECK (CloseHandle (current_process_handle));
2284 open_process_used = 0;
2285 }
0795be10 2286 unpush_target (ops);
24e60978
SC
2287 generic_mourn_inferior ();
2288}
2289
24e60978 2290/* Send a SIGINT to the process group. This acts just like the user typed a
581e13c1 2291 ^C on the controlling terminal. */
24e60978 2292
b607efe7 2293static void
dc05df57 2294windows_stop (ptid_t ptid)
24e60978 2295{
1ef980b9 2296 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
1e37c281 2297 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
3a4b77d8 2298 registers_changed (); /* refresh register state */
24e60978
SC
2299}
2300
3ee6f623 2301static int
dc05df57 2302windows_xfer_memory (CORE_ADDR memaddr, gdb_byte *our, int len,
0a65a603
AC
2303 int write, struct mem_attrib *mem,
2304 struct target_ops *target)
24e60978 2305{
5732a500 2306 SIZE_T done = 0;
24e60978
SC
2307 if (write)
2308 {
29fe111d 2309 DEBUG_MEM (("gdb: write target memory, %d bytes at 0x%08lx\n",
2c647436 2310 len, (DWORD) (uintptr_t) memaddr));
2b008701 2311 if (!WriteProcessMemory (current_process_handle,
2c647436 2312 (LPVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2313 len, &done))
2314 done = 0;
2b008701 2315 FlushInstructionCache (current_process_handle,
2c647436 2316 (LPCVOID) (uintptr_t) memaddr, len);
24e60978
SC
2317 }
2318 else
2319 {
29fe111d 2320 DEBUG_MEM (("gdb: read target memory, %d bytes at 0x%08lx\n",
2c647436 2321 len, (DWORD) (uintptr_t) memaddr));
2b008701 2322 if (!ReadProcessMemory (current_process_handle,
2c647436 2323 (LPCVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2324 len, &done))
2325 done = 0;
24e60978
SC
2326 }
2327 return done;
2328}
2329
3ee6f623 2330static void
7d85a9c0 2331windows_kill_inferior (struct target_ops *ops)
24e60978 2332{
3cee93ac
CF
2333 CHECK (TerminateProcess (current_process_handle, 0));
2334
b5edcb45
ILT
2335 for (;;)
2336 {
dc05df57 2337 if (!windows_continue (DBG_CONTINUE, -1))
b5edcb45 2338 break;
3cee93ac 2339 if (!WaitForDebugEvent (&current_event, INFINITE))
b5edcb45 2340 break;
3cee93ac 2341 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
b5edcb45
ILT
2342 break;
2343 }
2344
581e13c1 2345 target_mourn_inferior (); /* Or just windows_mourn_inferior? */
24e60978
SC
2346}
2347
24e60978 2348static void
dc05df57 2349windows_prepare_to_store (struct regcache *regcache)
24e60978 2350{
581e13c1 2351 /* Do nothing, since we can store individual regs. */
24e60978
SC
2352}
2353
2354static int
dc05df57 2355windows_can_run (void)
24e60978
SC
2356{
2357 return 1;
2358}
2359
2360static void
dc05df57 2361windows_close (int x)
24e60978 2362{
dc05df57 2363 DEBUG_EVENTS (("gdb: windows_close, inferior_ptid=%d\n",
3bccec63 2364 PIDGET (inferior_ptid)));
24e60978 2365}
1ef980b9 2366
581e13c1 2367/* Convert pid to printable format. */
3ee6f623 2368static char *
117de6a9 2369windows_pid_to_str (struct target_ops *ops, ptid_t ptid)
24e60978 2370{
3ee6f623 2371 static char buf[80];
3ee6f623 2372
2dc38344
PA
2373 if (ptid_get_tid (ptid) != 0)
2374 {
2375 snprintf (buf, sizeof (buf), "Thread %d.0x%lx",
2376 ptid_get_pid (ptid), ptid_get_tid (ptid));
2377 return buf;
2378 }
2379
2380 return normal_pid_to_str (ptid);
3ee6f623
CF
2381}
2382
de1b3c3d 2383static LONGEST
dc05df57 2384windows_xfer_shared_libraries (struct target_ops *ops,
de1b3c3d
PA
2385 enum target_object object, const char *annex,
2386 gdb_byte *readbuf, const gdb_byte *writebuf,
2387 ULONGEST offset, LONGEST len)
3cb8e7f6 2388{
de1b3c3d
PA
2389 struct obstack obstack;
2390 const char *buf;
2391 LONGEST len_avail;
3cb8e7f6 2392 struct so_list *so;
3cb8e7f6 2393
de1b3c3d
PA
2394 if (writebuf)
2395 return -1;
3cb8e7f6 2396
de1b3c3d
PA
2397 obstack_init (&obstack);
2398 obstack_grow_str (&obstack, "<library-list>\n");
2399 for (so = solib_start.next; so; so = so->next)
581e13c1
MS
2400 windows_xfer_shared_library (so->so_name, (CORE_ADDR)
2401 (uintptr_t) so->lm_info->load_addr,
5af949e3 2402 target_gdbarch, &obstack);
de1b3c3d 2403 obstack_grow_str0 (&obstack, "</library-list>\n");
3cb8e7f6 2404
de1b3c3d
PA
2405 buf = obstack_finish (&obstack);
2406 len_avail = strlen (buf);
2407 if (offset >= len_avail)
2408 return 0;
3cb8e7f6 2409
de1b3c3d
PA
2410 if (len > len_avail - offset)
2411 len = len_avail - offset;
2412 memcpy (readbuf, buf + offset, len);
3cb8e7f6 2413
de1b3c3d
PA
2414 obstack_free (&obstack, NULL);
2415 return len;
3cb8e7f6
CF
2416}
2417
de1b3c3d 2418static LONGEST
dc05df57 2419windows_xfer_partial (struct target_ops *ops, enum target_object object,
de1b3c3d
PA
2420 const char *annex, gdb_byte *readbuf,
2421 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
3cb8e7f6 2422{
de1b3c3d 2423 switch (object)
3cb8e7f6 2424 {
de1b3c3d
PA
2425 case TARGET_OBJECT_MEMORY:
2426 if (readbuf)
2427 return (*ops->deprecated_xfer_memory) (offset, readbuf,
244e85c8 2428 len, 0/*read*/, NULL, ops);
de1b3c3d
PA
2429 if (writebuf)
2430 return (*ops->deprecated_xfer_memory) (offset, (gdb_byte *) writebuf,
2431 len, 1/*write*/, NULL, ops);
2432 return -1;
2433
2434 case TARGET_OBJECT_LIBRARIES:
dc05df57 2435 return windows_xfer_shared_libraries (ops, object, annex, readbuf,
de1b3c3d 2436 writebuf, offset, len);
3929abe9 2437
de1b3c3d
PA
2438 default:
2439 if (ops->beneath != NULL)
2440 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
2441 readbuf, writebuf, offset, len);
2442 return -1;
3929abe9 2443 }
02c5aecd
CF
2444}
2445
711e434b
PM
2446/* Provide thread local base, i.e. Thread Information Block address.
2447 Returns 1 if ptid is found and sets *ADDR to thread_local_base. */
2448
2449static int
2450windows_get_tib_address (ptid_t ptid, CORE_ADDR *addr)
2451{
2452 thread_info *th;
2453
2454 th = thread_rec (ptid_get_tid (ptid), 0);
2455 if (th == NULL)
2456 return 0;
2457
2458 if (addr != NULL)
2459 *addr = th->thread_local_base;
2460
2461 return 1;
2462}
2463
1e2f1c5c
JB
2464static ptid_t
2465windows_get_ada_task_ptid (long lwp, long thread)
2466{
2467 return ptid_build (ptid_get_pid (inferior_ptid), 0, lwp);
2468}
2469
3ee6f623 2470static void
dc05df57 2471init_windows_ops (void)
3ee6f623 2472{
dc05df57
CF
2473 windows_ops.to_shortname = "child";
2474 windows_ops.to_longname = "Win32 child process";
2475 windows_ops.to_doc = "Win32 child process (started by the \"run\" command).";
2476 windows_ops.to_open = windows_open;
2477 windows_ops.to_close = windows_close;
2478 windows_ops.to_attach = windows_attach;
2479 windows_ops.to_attach_no_wait = 1;
2480 windows_ops.to_detach = windows_detach;
2481 windows_ops.to_resume = windows_resume;
2482 windows_ops.to_wait = windows_wait;
2483 windows_ops.to_fetch_registers = windows_fetch_inferior_registers;
2484 windows_ops.to_store_registers = windows_store_inferior_registers;
2485 windows_ops.to_prepare_to_store = windows_prepare_to_store;
2486 windows_ops.deprecated_xfer_memory = windows_xfer_memory;
2487 windows_ops.to_xfer_partial = windows_xfer_partial;
2488 windows_ops.to_files_info = windows_files_info;
2489 windows_ops.to_insert_breakpoint = memory_insert_breakpoint;
2490 windows_ops.to_remove_breakpoint = memory_remove_breakpoint;
2491 windows_ops.to_terminal_init = terminal_init_inferior;
2492 windows_ops.to_terminal_inferior = terminal_inferior;
2493 windows_ops.to_terminal_ours_for_output = terminal_ours_for_output;
2494 windows_ops.to_terminal_ours = terminal_ours;
2495 windows_ops.to_terminal_save_ours = terminal_save_ours;
2496 windows_ops.to_terminal_info = child_terminal_info;
2497 windows_ops.to_kill = windows_kill_inferior;
2498 windows_ops.to_create_inferior = windows_create_inferior;
2499 windows_ops.to_mourn_inferior = windows_mourn_inferior;
2500 windows_ops.to_can_run = windows_can_run;
2501 windows_ops.to_thread_alive = windows_thread_alive;
2502 windows_ops.to_pid_to_str = windows_pid_to_str;
2503 windows_ops.to_stop = windows_stop;
2504 windows_ops.to_stratum = process_stratum;
c35b1492
PA
2505 windows_ops.to_has_all_memory = default_child_has_all_memory;
2506 windows_ops.to_has_memory = default_child_has_memory;
2507 windows_ops.to_has_stack = default_child_has_stack;
2508 windows_ops.to_has_registers = default_child_has_registers;
2509 windows_ops.to_has_execution = default_child_has_execution;
dc05df57 2510 windows_ops.to_pid_to_exec_file = windows_pid_to_exec_file;
1e2f1c5c 2511 windows_ops.to_get_ada_task_ptid = windows_get_ada_task_ptid;
711e434b 2512 windows_ops.to_get_tib_address = windows_get_tib_address;
9bb9e8ad 2513
5aca5a82
PM
2514 i386_use_watchpoints (&windows_ops);
2515
9bb9e8ad
PM
2516 i386_dr_low.set_control = cygwin_set_dr7;
2517 i386_dr_low.set_addr = cygwin_set_dr;
7b50312a 2518 i386_dr_low.get_addr = cygwin_get_dr;
9bb9e8ad 2519 i386_dr_low.get_status = cygwin_get_dr6;
7b50312a 2520 i386_dr_low.get_control = cygwin_get_dr7;
9bb9e8ad
PM
2521
2522 /* i386_dr_low.debug_register_length field is set by
2523 calling i386_set_debug_register_length function
2524 in processor windows specific native file. */
2525
dc05df57 2526 windows_ops.to_magic = OPS_MAGIC;
c719b714 2527}
24e60978 2528
3929abe9 2529static void
dc05df57 2530set_windows_aliases (char *argv0)
3929abe9
CF
2531{
2532 add_info_alias ("dll", "sharedlibrary", 1);
2533}
2534
d603d4b3
JK
2535/* -Wmissing-prototypes */
2536extern initialize_file_ftype _initialize_windows_nat;
2537
24e60978 2538void
dc05df57 2539_initialize_windows_nat (void)
24e60978 2540{
fa58ee11
EZ
2541 struct cmd_list_element *c;
2542
dc05df57 2543 init_windows_ops ();
1ef980b9 2544
d0d0ab16
CV
2545#ifdef __CYGWIN__
2546 cygwin_internal (CW_SET_DOS_FILE_WARNING, 0);
2547#endif
2548
fa58ee11 2549 c = add_com ("dll-symbols", class_files, dll_symbol_command,
1bedd215 2550 _("Load dll library symbols from FILE."));
5ba2abeb 2551 set_cmd_completer (c, filename_completer);
450005e7
CF
2552
2553 add_com_alias ("sharedlibrary", "dll-symbols", class_alias, 1);
2554
70992597
PM
2555 add_com_alias ("add-shared-symbol-files", "dll-symbols", class_alias, 1);
2556
2557 add_com_alias ("assf", "dll-symbols", class_alias, 1);
2558
10325bc5 2559#ifdef __CYGWIN__
5bf193a2
AC
2560 add_setshow_boolean_cmd ("shell", class_support, &useshell, _("\
2561Set use of shell to start subprocess."), _("\
2562Show use of shell to start subprocess."), NULL,
2563 NULL,
2564 NULL, /* FIXME: i18n: */
2565 &setlist, &showlist);
2566
581e13c1
MS
2567 add_setshow_boolean_cmd ("cygwin-exceptions", class_support,
2568 &cygwin_exceptions, _("\
09280ddf
CF
2569Break when an exception is detected in the Cygwin DLL itself."), _("\
2570Show whether gdb breaks on exceptions in the Cygwin DLL itself."), NULL,
2571 NULL,
2572 NULL, /* FIXME: i18n: */
2573 &setlist, &showlist);
10325bc5 2574#endif
09280ddf 2575
5bf193a2
AC
2576 add_setshow_boolean_cmd ("new-console", class_support, &new_console, _("\
2577Set creation of new console when creating child process."), _("\
2578Show creation of new console when creating child process."), NULL,
2579 NULL,
2580 NULL, /* FIXME: i18n: */
2581 &setlist, &showlist);
2582
2583 add_setshow_boolean_cmd ("new-group", class_support, &new_group, _("\
2584Set creation of new group when creating child process."), _("\
2585Show creation of new group when creating child process."), NULL,
2586 NULL,
2587 NULL, /* FIXME: i18n: */
2588 &setlist, &showlist);
2589
2590 add_setshow_boolean_cmd ("debugexec", class_support, &debug_exec, _("\
2591Set whether to display execution in child process."), _("\
2592Show whether to display execution in child process."), NULL,
2593 NULL,
2594 NULL, /* FIXME: i18n: */
2595 &setlist, &showlist);
2596
2597 add_setshow_boolean_cmd ("debugevents", class_support, &debug_events, _("\
2598Set whether to display kernel events in child process."), _("\
2599Show whether to display kernel events in child process."), NULL,
2600 NULL,
2601 NULL, /* FIXME: i18n: */
2602 &setlist, &showlist);
2603
2604 add_setshow_boolean_cmd ("debugmemory", class_support, &debug_memory, _("\
2605Set whether to display memory accesses in child process."), _("\
2606Show whether to display memory accesses in child process."), NULL,
2607 NULL,
2608 NULL, /* FIXME: i18n: */
2609 &setlist, &showlist);
2610
2611 add_setshow_boolean_cmd ("debugexceptions", class_support,
2612 &debug_exceptions, _("\
2613Set whether to display kernel exceptions in child process."), _("\
2614Show whether to display kernel exceptions in child process."), NULL,
2615 NULL,
2616 NULL, /* FIXME: i18n: */
2617 &setlist, &showlist);
1ef980b9 2618
711e434b 2619 init_w32_command_list ();
c1748f97
PM
2620
2621 add_cmd ("selector", class_info, display_selectors,
1a966eab 2622 _("Display selectors infos."),
c1748f97 2623 &info_w32_cmdlist);
dc05df57
CF
2624 add_target (&windows_ops);
2625 deprecated_init_ui_hook = set_windows_aliases;
24e60978 2626}
3cee93ac 2627
fa4ba8da
PM
2628/* Hardware watchpoint support, adapted from go32-nat.c code. */
2629
2630/* Pass the address ADDR to the inferior in the I'th debug register.
2631 Here we just store the address in dr array, the registers will be
dc05df57 2632 actually set up when windows_continue is called. */
9bb9e8ad 2633static void
fa4ba8da
PM
2634cygwin_set_dr (int i, CORE_ADDR addr)
2635{
2636 if (i < 0 || i > 3)
2637 internal_error (__FILE__, __LINE__,
e2e0b3e5 2638 _("Invalid register %d in cygwin_set_dr.\n"), i);
41b4aadc 2639 dr[i] = addr;
fa4ba8da
PM
2640 debug_registers_changed = 1;
2641 debug_registers_used = 1;
2642}
2643
2644/* Pass the value VAL to the inferior in the DR7 debug control
2645 register. Here we just store the address in D_REGS, the watchpoint
dc05df57 2646 will be actually set up in windows_wait. */
9bb9e8ad
PM
2647static void
2648cygwin_set_dr7 (unsigned long val)
fa4ba8da 2649{
9bb9e8ad 2650 dr[7] = (CORE_ADDR) val;
fa4ba8da
PM
2651 debug_registers_changed = 1;
2652 debug_registers_used = 1;
2653}
2654
7b50312a
PA
2655/* Get the value of debug register I from the inferior. */
2656
2657static CORE_ADDR
2658cygwin_get_dr (int i)
2659{
2660 return dr[i];
2661}
2662
fa4ba8da
PM
2663/* Get the value of the DR6 debug status register from the inferior.
2664 Here we just return the value stored in dr[6]
2665 by the last call to thread_rec for current_event.dwThreadId id. */
9bb9e8ad 2666static unsigned long
fa4ba8da
PM
2667cygwin_get_dr6 (void)
2668{
9bb9e8ad 2669 return (unsigned long) dr[6];
fa4ba8da
PM
2670}
2671
7b50312a
PA
2672/* Get the value of the DR7 debug status register from the inferior.
2673 Here we just return the value stored in dr[7] by the last call to
2674 thread_rec for current_event.dwThreadId id. */
2675
2676static unsigned long
2677cygwin_get_dr7 (void)
2678{
2679 return (unsigned long) dr[7];
2680}
2681
2dc38344 2682/* Determine if the thread referenced by "ptid" is alive
3cee93ac 2683 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
581e13c1 2684 it means that the thread has died. Otherwise it is assumed to be alive. */
3cee93ac 2685static int
28439f5e 2686windows_thread_alive (struct target_ops *ops, ptid_t ptid)
3cee93ac 2687{
2dc38344
PA
2688 int tid;
2689
2690 gdb_assert (ptid_get_tid (ptid) != 0);
2691 tid = ptid_get_tid (ptid);
39f77062 2692
581e13c1
MS
2693 return WaitForSingleObject (thread_rec (tid, FALSE)->h, 0) == WAIT_OBJECT_0
2694 ? FALSE : TRUE;
3cee93ac
CF
2695}
2696
d603d4b3
JK
2697/* -Wmissing-prototypes */
2698extern initialize_file_ftype _initialize_check_for_gdb_ini;
2699
2a3d5645
CF
2700void
2701_initialize_check_for_gdb_ini (void)
2702{
2703 char *homedir;
2704 if (inhibit_gdbinit)
2705 return;
2706
2707 homedir = getenv ("HOME");
2708 if (homedir)
2709 {
2710 char *p;
2711 char *oldini = (char *) alloca (strlen (homedir) +
2712 sizeof ("/gdb.ini"));
2713 strcpy (oldini, homedir);
2714 p = strchr (oldini, '\0');
0ba1096a 2715 if (p > oldini && !IS_DIR_SEPARATOR (p[-1]))
2a3d5645
CF
2716 *p++ = '/';
2717 strcpy (p, "gdb.ini");
2718 if (access (oldini, 0) == 0)
2719 {
2720 int len = strlen (oldini);
2721 char *newini = alloca (len + 1);
dfe7f3ac 2722 sprintf (newini, "%.*s.gdbinit",
58fa08f0 2723 (int) (len - (sizeof ("gdb.ini") - 1)), oldini);
8a3fe4f8 2724 warning (_("obsolete '%s' found. Rename to '%s'."), oldini, newini);
2a3d5645
CF
2725 }
2726 }
2727}
33605d39 2728
2b008701 2729/* Define dummy functions which always return error for the rare cases where
581e13c1 2730 these functions could not be found. */
2b008701
CF
2731static BOOL WINAPI
2732bad_DebugActiveProcessStop (DWORD w)
2733{
2734 return FALSE;
2735}
2736static BOOL WINAPI
2737bad_DebugBreakProcess (HANDLE w)
2738{
2739 return FALSE;
2740}
2741static BOOL WINAPI
2742bad_DebugSetProcessKillOnExit (BOOL w)
2743{
2744 return FALSE;
2745}
2746static BOOL WINAPI
2747bad_EnumProcessModules (HANDLE w, HMODULE *x, DWORD y, LPDWORD z)
2748{
2749 return FALSE;
2750}
b3c613f2
CF
2751
2752#ifdef __USEWIDE
2b008701 2753static DWORD WINAPI
b3c613f2 2754bad_GetModuleFileNameExW (HANDLE w, HMODULE x, LPWSTR y, DWORD z)
2b008701
CF
2755{
2756 return 0;
2757}
d0d0ab16
CV
2758#else
2759static DWORD WINAPI
b3c613f2 2760bad_GetModuleFileNameExA (HANDLE w, HMODULE x, LPSTR y, DWORD z)
d0d0ab16
CV
2761{
2762 return 0;
2763}
2764#endif
b3c613f2 2765
2b008701
CF
2766static BOOL WINAPI
2767bad_GetModuleInformation (HANDLE w, HMODULE x, LPMODULEINFO y, DWORD z)
2768{
2769 return FALSE;
2770}
2771
418c6cb3
CF
2772static BOOL WINAPI
2773bad_OpenProcessToken (HANDLE w, DWORD x, PHANDLE y)
2774{
2775 return FALSE;
2776}
2777
cd44747c
PM
2778static BOOL WINAPI
2779bad_GetCurrentConsoleFont (HANDLE w, BOOL bMaxWindow, CONSOLE_FONT_INFO *f)
2780{
2781 f->nFont = 0;
2782 return 1;
2783}
2784static COORD WINAPI
2785bad_GetConsoleFontSize (HANDLE w, DWORD nFont)
2786{
2787 COORD size;
2788 size.X = 8;
2789 size.Y = 12;
2790 return size;
2791}
2792
d603d4b3
JK
2793/* -Wmissing-prototypes */
2794extern initialize_file_ftype _initialize_loadable;
2795
2b008701 2796/* Load any functions which may not be available in ancient versions
581e13c1 2797 of Windows. */
d603d4b3 2798
33605d39 2799void
2b008701 2800_initialize_loadable (void)
33605d39 2801{
2b008701
CF
2802 HMODULE hm = NULL;
2803
2804 hm = LoadLibrary ("kernel32.dll");
2805 if (hm)
33605d39 2806 {
b3c613f2 2807 DebugActiveProcessStop = (void *)
2b008701 2808 GetProcAddress (hm, "DebugActiveProcessStop");
b3c613f2 2809 DebugBreakProcess = (void *)
2b008701 2810 GetProcAddress (hm, "DebugBreakProcess");
b3c613f2 2811 DebugSetProcessKillOnExit = (void *)
2b008701 2812 GetProcAddress (hm, "DebugSetProcessKillOnExit");
cd44747c
PM
2813 GetConsoleFontSize = (void *)
2814 GetProcAddress (hm, "GetConsoleFontSize");
2815 GetCurrentConsoleFont = (void *)
2816 GetProcAddress (hm, "GetCurrentConsoleFont");
2b008701 2817 }
33605d39 2818
2b008701 2819 /* Set variables to dummy versions of these processes if the function
581e13c1 2820 wasn't found in kernel32.dll. */
b3c613f2
CF
2821 if (!DebugBreakProcess)
2822 DebugBreakProcess = bad_DebugBreakProcess;
2823 if (!DebugActiveProcessStop || !DebugSetProcessKillOnExit)
2b008701 2824 {
b3c613f2
CF
2825 DebugActiveProcessStop = bad_DebugActiveProcessStop;
2826 DebugSetProcessKillOnExit = bad_DebugSetProcessKillOnExit;
2b008701 2827 }
cd44747c
PM
2828 if (!GetConsoleFontSize)
2829 GetConsoleFontSize = bad_GetConsoleFontSize;
2830 if (!GetCurrentConsoleFont)
2831 GetCurrentConsoleFont = bad_GetCurrentConsoleFont;
33605d39 2832
2b008701 2833 /* Load optional functions used for retrieving filename information
581e13c1 2834 associated with the currently debugged process or its dlls. */
2b008701
CF
2835 hm = LoadLibrary ("psapi.dll");
2836 if (hm)
2837 {
b3c613f2 2838 EnumProcessModules = (void *)
2b008701 2839 GetProcAddress (hm, "EnumProcessModules");
b3c613f2 2840 GetModuleInformation = (void *)
2b008701 2841 GetProcAddress (hm, "GetModuleInformation");
b3c613f2
CF
2842 GetModuleFileNameEx = (void *)
2843 GetProcAddress (hm, GetModuleFileNameEx_name);
33605d39
CF
2844 }
2845
b3c613f2 2846 if (!EnumProcessModules || !GetModuleInformation || !GetModuleFileNameEx)
2b008701
CF
2847 {
2848 /* Set variables to dummy versions of these processes if the function
581e13c1 2849 wasn't found in psapi.dll. */
b3c613f2
CF
2850 EnumProcessModules = bad_EnumProcessModules;
2851 GetModuleInformation = bad_GetModuleInformation;
2852 GetModuleFileNameEx = bad_GetModuleFileNameEx;
581e13c1
MS
2853 /* This will probably fail on Windows 9x/Me. Let the user know
2854 that we're missing some functionality. */
2855 warning(_("\
2856cannot automatically find executable file or library to read symbols.\n\
2857Use \"file\" or \"dll\" command to load executable/libraries directly."));
418c6cb3
CF
2858 }
2859
2860 hm = LoadLibrary ("advapi32.dll");
2861 if (hm)
2862 {
b3c613f2
CF
2863 OpenProcessToken = (void *) GetProcAddress (hm, "OpenProcessToken");
2864 LookupPrivilegeValueA = (void *)
418c6cb3 2865 GetProcAddress (hm, "LookupPrivilegeValueA");
b3c613f2 2866 AdjustTokenPrivileges = (void *)
418c6cb3
CF
2867 GetProcAddress (hm, "AdjustTokenPrivileges");
2868 /* Only need to set one of these since if OpenProcessToken fails nothing
581e13c1
MS
2869 else is needed. */
2870 if (!OpenProcessToken || !LookupPrivilegeValueA
2871 || !AdjustTokenPrivileges)
b3c613f2 2872 OpenProcessToken = bad_OpenProcessToken;
2b008701 2873 }
33605d39 2874}
This page took 2.746942 seconds and 4 git commands to generate.