Copyright year update in most files of the GDB Project.
[deliverable/binutils-gdb.git] / gdb / windows-nat.c
CommitLineData
dc05df57 1/* Target-vector operations for controlling windows child processes, for GDB.
0a65a603 2
281b533b 3 Copyright (C) 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
7b6bb8da 4 2005, 2006, 2007, 2008, 2009, 2010, 2011 Free Software Foundation, Inc.
0a65a603 5
e6433c28 6 Contributed by Cygnus Solutions, A Red Hat Company.
e88c49c3 7
24e60978
SC
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
a9762ec7 12 the Free Software Foundation; either version 3 of the License, or
24e60978
SC
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
a9762ec7 16 but WITHOUT ANY WARRANTY; without even the implied warranty of
24e60978
SC
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
a9762ec7 21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
24e60978 22
dfe7f3ac 23/* Originally by Steve Chamberlain, sac@cygnus.com */
24e60978
SC
24
25#include "defs.h"
26#include "frame.h" /* required by inferior.h */
27#include "inferior.h"
28#include "target.h"
60250e8b 29#include "exceptions.h"
24e60978
SC
30#include "gdbcore.h"
31#include "command.h"
fa58ee11 32#include "completer.h"
4e052eda 33#include "regcache.h"
2a3d5645 34#include "top.h"
403d9909
CF
35#include <signal.h>
36#include <sys/types.h>
37#include <fcntl.h>
38#include <stdlib.h>
39#include <windows.h>
40#include <imagehlp.h>
2b008701 41#include <psapi.h>
10325bc5 42#ifdef __CYGWIN__
b7ff339d 43#include <wchar.h>
403d9909 44#include <sys/cygwin.h>
b7ff339d 45#include <cygwin/version.h>
10325bc5 46#endif
a244bdca 47#include <signal.h>
cad9cd60 48
24e60978 49#include "buildsym.h"
0ba1096a 50#include "filenames.h"
1ef980b9
SC
51#include "symfile.h"
52#include "objfiles.h"
de1b3c3d 53#include "gdb_obstack.h"
24e60978 54#include "gdb_string.h"
fdfa3315 55#include "gdbthread.h"
24e60978 56#include "gdbcmd.h"
1750a5ef 57#include <sys/param.h>
1e37c281 58#include <unistd.h>
4646aa9d 59#include "exec.h"
3ee6f623 60#include "solist.h"
3cb8e7f6 61#include "solib.h"
de1b3c3d 62#include "xml-support.h"
24e60978 63
6c7de422
MK
64#include "i386-tdep.h"
65#include "i387-tdep.h"
66
31b060a2
CF
67#include "windows-tdep.h"
68#include "windows-nat.h"
9bb9e8ad 69#include "i386-nat.h"
ecc13e53 70#include "complaints.h"
de1b3c3d 71
418c6cb3 72#define AdjustTokenPrivileges dyn_AdjustTokenPrivileges
2b008701
CF
73#define DebugActiveProcessStop dyn_DebugActiveProcessStop
74#define DebugBreakProcess dyn_DebugBreakProcess
75#define DebugSetProcessKillOnExit dyn_DebugSetProcessKillOnExit
76#define EnumProcessModules dyn_EnumProcessModules
2b008701 77#define GetModuleInformation dyn_GetModuleInformation
418c6cb3
CF
78#define LookupPrivilegeValueA dyn_LookupPrivilegeValueA
79#define OpenProcessToken dyn_OpenProcessToken
cd44747c
PM
80#define GetConsoleFontSize dyn_GetConsoleFontSize
81#define GetCurrentConsoleFont dyn_GetCurrentConsoleFont
2b008701 82
418c6cb3
CF
83static BOOL WINAPI (*AdjustTokenPrivileges)(HANDLE, BOOL, PTOKEN_PRIVILEGES,
84 DWORD, PTOKEN_PRIVILEGES, PDWORD);
2b008701
CF
85static BOOL WINAPI (*DebugActiveProcessStop) (DWORD);
86static BOOL WINAPI (*DebugBreakProcess) (HANDLE);
87static BOOL WINAPI (*DebugSetProcessKillOnExit) (BOOL);
88static BOOL WINAPI (*EnumProcessModules) (HANDLE, HMODULE *, DWORD,
89 LPDWORD);
2b008701
CF
90static BOOL WINAPI (*GetModuleInformation) (HANDLE, HMODULE, LPMODULEINFO,
91 DWORD);
418c6cb3
CF
92static BOOL WINAPI (*LookupPrivilegeValueA)(LPCSTR, LPCSTR, PLUID);
93static BOOL WINAPI (*OpenProcessToken)(HANDLE, DWORD, PHANDLE);
581e13c1
MS
94static BOOL WINAPI (*GetCurrentConsoleFont) (HANDLE, BOOL,
95 CONSOLE_FONT_INFO *);
cd44747c 96static COORD WINAPI (*GetConsoleFontSize) (HANDLE, DWORD);
2b008701 97
dc05df57 98static struct target_ops windows_ops;
3ee6f623 99
b3c613f2
CF
100#undef STARTUPINFO
101#undef CreateProcess
102#undef GetModuleFileNameEx
103
104#ifndef __CYGWIN__
105# define __PMAX (MAX_PATH + 1)
106 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPSTR, DWORD);
107# define STARTUPINFO STARTUPINFOA
108# define CreateProcess CreateProcessA
109# define GetModuleFileNameEx_name "GetModuleFileNameExA"
110# define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
111#else
112# define __PMAX PATH_MAX
581e13c1 113/* The starting and ending address of the cygwin1.dll text segment. */
b3c613f2
CF
114 static CORE_ADDR cygwin_load_start;
115 static CORE_ADDR cygwin_load_end;
b3c613f2
CF
116# define __USEWIDE
117 typedef wchar_t cygwin_buf_t;
581e13c1
MS
118 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE,
119 LPWSTR, DWORD);
b3c613f2
CF
120# define STARTUPINFO STARTUPINFOW
121# define CreateProcess CreateProcessW
122# define GetModuleFileNameEx_name "GetModuleFileNameExW"
123# define bad_GetModuleFileNameEx bad_GetModuleFileNameExW
10325bc5 124#endif
a244bdca 125
581e13c1
MS
126static int have_saved_context; /* True if we've saved context from a
127 cygwin signal. */
128static CONTEXT saved_context; /* Containes the saved context from a
129 cygwin signal. */
a244bdca 130
0714f9bf
SS
131/* If we're not using the old Cygwin header file set, define the
132 following which never should have been in the generic Win32 API
581e13c1 133 headers in the first place since they were our own invention... */
0714f9bf 134#ifndef _GNU_H_WINDOWS_H
9d3789f7 135enum
8e860359
CF
136 {
137 FLAG_TRACE_BIT = 0x100,
138 CONTEXT_DEBUGGER = (CONTEXT_FULL | CONTEXT_FLOATING_POINT)
139 };
0714f9bf
SS
140#endif
141
5851ab76
JB
142#ifndef CONTEXT_EXTENDED_REGISTERS
143/* This macro is only defined on ia32. It only makes sense on this target,
144 so define it as zero if not already defined. */
145#define CONTEXT_EXTENDED_REGISTERS 0
146#endif
147
fa4ba8da
PM
148#define CONTEXT_DEBUGGER_DR CONTEXT_DEBUGGER | CONTEXT_DEBUG_REGISTERS \
149 | CONTEXT_EXTENDED_REGISTERS
97da3b20 150
41b4aadc 151static uintptr_t dr[8];
87a45c96
CF
152static int debug_registers_changed;
153static int debug_registers_used;
16d905e2
CF
154
155static int windows_initialization_done;
6537bb24 156#define DR6_CLEAR_VALUE 0xffff0ff0
97da3b20 157
3cee93ac 158/* The string sent by cygwin when it processes a signal.
581e13c1 159 FIXME: This should be in a cygwin include file. */
3929abe9
CF
160#ifndef _CYGWIN_SIGNAL_STRING
161#define _CYGWIN_SIGNAL_STRING "cYgSiGw00f"
162#endif
3cee93ac 163
29fe111d 164#define CHECK(x) check (x, __FILE__,__LINE__)
dfe7f3ac 165#define DEBUG_EXEC(x) if (debug_exec) printf_unfiltered x
4e52d31c
PM
166#define DEBUG_EVENTS(x) if (debug_events) printf_unfiltered x
167#define DEBUG_MEM(x) if (debug_memory) printf_unfiltered x
168#define DEBUG_EXCEPT(x) if (debug_exceptions) printf_unfiltered x
24e60978 169
dc05df57 170static void windows_stop (ptid_t);
02529b48 171static int windows_thread_alive (struct target_ops *, ptid_t);
7d85a9c0 172static void windows_kill_inferior (struct target_ops *);
3cee93ac 173
9bb9e8ad
PM
174static void cygwin_set_dr (int i, CORE_ADDR addr);
175static void cygwin_set_dr7 (unsigned long val);
a961bc18 176static CORE_ADDR cygwin_get_dr (int i);
9bb9e8ad 177static unsigned long cygwin_get_dr6 (void);
a961bc18 178static unsigned long cygwin_get_dr7 (void);
9bb9e8ad 179
7393af7c 180static enum target_signal last_sig = TARGET_SIGNAL_0;
581e13c1 181/* Set if a signal was received from the debugged process. */
7393af7c 182
3cee93ac 183/* Thread information structure used to track information that is
6537bb24 184 not available in gdb's thread structure. */
3cee93ac 185typedef struct thread_info_struct
3a4b77d8
JM
186 {
187 struct thread_info_struct *next;
188 DWORD id;
189 HANDLE h;
711e434b 190 CORE_ADDR thread_local_base;
3a4b77d8 191 char *name;
6537bb24 192 int suspended;
3ade5333 193 int reload_context;
3a4b77d8 194 CONTEXT context;
1e37c281 195 STACKFRAME sf;
8e860359
CF
196 }
197thread_info;
1e37c281 198
29fe111d 199static thread_info thread_head;
24e60978 200
581e13c1 201/* The process and thread handles for the above context. */
24e60978 202
3cee93ac
CF
203static DEBUG_EVENT current_event; /* The current debug event from
204 WaitForDebugEvent */
205static HANDLE current_process_handle; /* Currently executing process */
206static thread_info *current_thread; /* Info on currently selected thread */
349b409f 207static DWORD main_thread_id; /* Thread ID of the main thread */
24e60978 208
581e13c1 209/* Counts of things. */
24e60978
SC
210static int exception_count = 0;
211static int event_count = 0;
dfe7f3ac 212static int saw_create;
bf25528d 213static int open_process_used = 0;
24e60978 214
581e13c1 215/* User options. */
24e60978 216static int new_console = 0;
10325bc5 217#ifdef __CYGWIN__
09280ddf 218static int cygwin_exceptions = 0;
10325bc5 219#endif
1e37c281 220static int new_group = 1;
dfe7f3ac
CF
221static int debug_exec = 0; /* show execution */
222static int debug_events = 0; /* show events from kernel */
223static int debug_memory = 0; /* show target memory accesses */
1ef980b9 224static int debug_exceptions = 0; /* show target exceptions */
dfe7f3ac
CF
225static int useshell = 0; /* use shell for subprocesses */
226
7e63b4e4 227/* This vector maps GDB's idea of a register's number into an offset
dc05df57 228 in the windows exception context vector.
24e60978 229
3cee93ac 230 It also contains the bit mask needed to load the register in question.
24e60978 231
7e63b4e4
JB
232 The contents of this table can only be computed by the units
233 that provide CPU-specific support for Windows native debugging.
234 These units should set the table by calling
dc05df57 235 windows_set_context_register_offsets.
7e63b4e4 236
24e60978
SC
237 One day we could read a reg, we could inspect the context we
238 already have loaded, if it doesn't have the bit set that we need,
239 we read that set of registers in using GetThreadContext. If the
581e13c1 240 context already contains what we need, we just unpack it. Then to
24e60978
SC
241 write a register, first we have to ensure that the context contains
242 the other regs of the group, and then we copy the info in and set
581e13c1 243 out bit. */
24e60978 244
7e63b4e4 245static const int *mappings;
d3a09475 246
24e60978 247/* This vector maps the target's idea of an exception (extracted
581e13c1 248 from the DEBUG_EVENT structure) to GDB's idea. */
24e60978
SC
249
250struct xlate_exception
251 {
252 int them;
253 enum target_signal us;
254 };
255
24e60978
SC
256static const struct xlate_exception
257 xlate[] =
258{
259 {EXCEPTION_ACCESS_VIOLATION, TARGET_SIGNAL_SEGV},
9cbf6c0e 260 {STATUS_STACK_OVERFLOW, TARGET_SIGNAL_SEGV},
24e60978
SC
261 {EXCEPTION_BREAKPOINT, TARGET_SIGNAL_TRAP},
262 {DBG_CONTROL_C, TARGET_SIGNAL_INT},
263 {EXCEPTION_SINGLE_STEP, TARGET_SIGNAL_TRAP},
7393af7c 264 {STATUS_FLOAT_DIVIDE_BY_ZERO, TARGET_SIGNAL_FPE},
24e60978
SC
265 {-1, -1}};
266
7e63b4e4
JB
267/* Set the MAPPINGS static global to OFFSETS.
268 See the description of MAPPINGS for more details. */
269
270void
dc05df57 271windows_set_context_register_offsets (const int *offsets)
7e63b4e4
JB
272{
273 mappings = offsets;
274}
275
fa4ba8da
PM
276static void
277check (BOOL ok, const char *file, int line)
278{
279 if (!ok)
dfe7f3ac 280 printf_filtered ("error return %s:%d was %lu\n", file, line,
fa4ba8da
PM
281 GetLastError ());
282}
283
6537bb24
PA
284/* Find a thread record given a thread id. If GET_CONTEXT is not 0,
285 then also retrieve the context for this thread. If GET_CONTEXT is
286 negative, then don't suspend the thread. */
3cee93ac
CF
287static thread_info *
288thread_rec (DWORD id, int get_context)
24e60978 289{
3cee93ac
CF
290 thread_info *th;
291
3a4b77d8 292 for (th = &thread_head; (th = th->next) != NULL;)
3cee93ac
CF
293 if (th->id == id)
294 {
6537bb24 295 if (!th->suspended && get_context)
3cee93ac 296 {
8a892701 297 if (get_context > 0 && id != current_event.dwThreadId)
6537bb24
PA
298 {
299 if (SuspendThread (th->h) == (DWORD) -1)
300 {
301 DWORD err = GetLastError ();
302 warning (_("SuspendThread failed. (winerr %d)"),
303 (int) err);
304 return NULL;
305 }
306 th->suspended = 1;
307 }
3cee93ac 308 else if (get_context < 0)
6537bb24 309 th->suspended = -1;
3ade5333 310 th->reload_context = 1;
3cee93ac
CF
311 }
312 return th;
313 }
314
315 return NULL;
316}
317
2dc38344 318/* Add a thread to the thread list. */
3cee93ac 319static thread_info *
711e434b 320windows_add_thread (ptid_t ptid, HANDLE h, void *tlb)
3cee93ac
CF
321{
322 thread_info *th;
2dc38344
PA
323 DWORD id;
324
325 gdb_assert (ptid_get_tid (ptid) != 0);
326
327 id = ptid_get_tid (ptid);
3cee93ac
CF
328
329 if ((th = thread_rec (id, FALSE)))
330 return th;
331
3929abe9 332 th = XZALLOC (thread_info);
3cee93ac
CF
333 th->id = id;
334 th->h = h;
711e434b 335 th->thread_local_base = (CORE_ADDR) (uintptr_t) tlb;
3cee93ac
CF
336 th->next = thread_head.next;
337 thread_head.next = th;
2dc38344
PA
338 add_thread (ptid);
339 /* Set the debug registers for the new thread if they are used. */
fa4ba8da
PM
340 if (debug_registers_used)
341 {
342 /* Only change the value of the debug registers. */
343 th->context.ContextFlags = CONTEXT_DEBUG_REGISTERS;
344 CHECK (GetThreadContext (th->h, &th->context));
345 th->context.Dr0 = dr[0];
346 th->context.Dr1 = dr[1];
347 th->context.Dr2 = dr[2];
348 th->context.Dr3 = dr[3];
6537bb24 349 th->context.Dr6 = DR6_CLEAR_VALUE;
fa4ba8da
PM
350 th->context.Dr7 = dr[7];
351 CHECK (SetThreadContext (th->h, &th->context));
352 th->context.ContextFlags = 0;
353 }
3cee93ac 354 return th;
24e60978
SC
355}
356
3cee93ac 357/* Clear out any old thread list and reintialize it to a
581e13c1 358 pristine state. */
24e60978 359static void
dc05df57 360windows_init_thread_list (void)
24e60978 361{
3cee93ac
CF
362 thread_info *th = &thread_head;
363
dc05df57 364 DEBUG_EVENTS (("gdb: windows_init_thread_list\n"));
3cee93ac
CF
365 init_thread_list ();
366 while (th->next != NULL)
24e60978 367 {
3cee93ac
CF
368 thread_info *here = th->next;
369 th->next = here->next;
b8c9b27d 370 xfree (here);
24e60978 371 }
059198c1 372 thread_head.next = NULL;
3cee93ac
CF
373}
374
581e13c1 375/* Delete a thread from the list of threads. */
3cee93ac 376static void
dc05df57 377windows_delete_thread (ptid_t ptid)
3cee93ac
CF
378{
379 thread_info *th;
2dc38344
PA
380 DWORD id;
381
382 gdb_assert (ptid_get_tid (ptid) != 0);
383
384 id = ptid_get_tid (ptid);
3cee93ac
CF
385
386 if (info_verbose)
2dc38344
PA
387 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (ptid));
388 delete_thread (ptid);
3cee93ac
CF
389
390 for (th = &thread_head;
391 th->next != NULL && th->next->id != id;
392 th = th->next)
393 continue;
394
395 if (th->next != NULL)
24e60978 396 {
3cee93ac
CF
397 thread_info *here = th->next;
398 th->next = here->next;
b8c9b27d 399 xfree (here);
24e60978
SC
400 }
401}
402
3cee93ac 403static void
dc05df57 404do_windows_fetch_inferior_registers (struct regcache *regcache, int r)
24e60978 405{
1e37c281 406 char *context_offset = ((char *) &current_thread->context) + mappings[r];
20a6ec49
MD
407 struct gdbarch *gdbarch = get_regcache_arch (regcache);
408 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
1e37c281 409 long l;
6c7de422 410
3ade5333 411 if (!current_thread)
d6dc8049 412 return; /* Windows sometimes uses a non-existent thread id in its
581e13c1 413 events. */
3ade5333
CF
414
415 if (current_thread->reload_context)
416 {
cb832706 417#ifdef __COPY_CONTEXT_SIZE
a244bdca
CF
418 if (have_saved_context)
419 {
581e13c1
MS
420 /* Lie about where the program actually is stopped since
421 cygwin has informed us that we should consider the signal
422 to have occurred at another location which is stored in
423 "saved_context. */
424 memcpy (&current_thread->context, &saved_context,
425 __COPY_CONTEXT_SIZE);
a244bdca
CF
426 have_saved_context = 0;
427 }
428 else
cb832706 429#endif
a244bdca
CF
430 {
431 thread_info *th = current_thread;
432 th->context.ContextFlags = CONTEXT_DEBUGGER_DR;
433 GetThreadContext (th->h, &th->context);
2b008701 434 /* Copy dr values from that thread.
581e13c1
MS
435 But only if there were not modified since last stop.
436 PR gdb/2388 */
88616312
PM
437 if (!debug_registers_changed)
438 {
439 dr[0] = th->context.Dr0;
440 dr[1] = th->context.Dr1;
441 dr[2] = th->context.Dr2;
442 dr[3] = th->context.Dr3;
443 dr[6] = th->context.Dr6;
444 dr[7] = th->context.Dr7;
445 }
a244bdca 446 }
3ade5333
CF
447 current_thread->reload_context = 0;
448 }
449
20a6ec49 450 if (r == I387_FISEG_REGNUM (tdep))
1e37c281 451 {
8e860359 452 l = *((long *) context_offset) & 0xffff;
56be3814 453 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 454 }
20a6ec49 455 else if (r == I387_FOP_REGNUM (tdep))
1e37c281 456 {
8e860359 457 l = (*((long *) context_offset) >> 16) & ((1 << 11) - 1);
56be3814 458 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281
JM
459 }
460 else if (r >= 0)
56be3814 461 regcache_raw_supply (regcache, r, context_offset);
3cee93ac 462 else
24e60978 463 {
20a6ec49 464 for (r = 0; r < gdbarch_num_regs (gdbarch); r++)
dc05df57 465 do_windows_fetch_inferior_registers (regcache, r);
24e60978 466 }
3cee93ac
CF
467}
468
469static void
28439f5e
PA
470windows_fetch_inferior_registers (struct target_ops *ops,
471 struct regcache *regcache, int r)
3cee93ac 472{
2dc38344 473 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 474 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 475 thread id in its events. */
3ade5333 476 if (current_thread)
dc05df57 477 do_windows_fetch_inferior_registers (regcache, r);
3cee93ac
CF
478}
479
480static void
dc05df57 481do_windows_store_inferior_registers (const struct regcache *regcache, int r)
3cee93ac 482{
3ade5333 483 if (!current_thread)
581e13c1 484 /* Windows sometimes uses a non-existent thread id in its events. */;
3ade5333 485 else if (r >= 0)
56be3814 486 regcache_raw_collect (regcache, r,
822c9732 487 ((char *) &current_thread->context) + mappings[r]);
24e60978
SC
488 else
489 {
40a6adc1 490 for (r = 0; r < gdbarch_num_regs (get_regcache_arch (regcache)); r++)
dc05df57 491 do_windows_store_inferior_registers (regcache, r);
24e60978
SC
492 }
493}
494
581e13c1 495/* Store a new register value into the current thread context. */
3cee93ac 496static void
28439f5e
PA
497windows_store_inferior_registers (struct target_ops *ops,
498 struct regcache *regcache, int r)
3cee93ac 499{
2dc38344 500 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 501 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 502 thread id in its events. */
3ade5333 503 if (current_thread)
dc05df57 504 do_windows_store_inferior_registers (regcache, r);
3cee93ac 505}
24e60978 506
7a9dd1b2 507/* Get the name of a given module at given base address. If base_address
33605d39
CF
508 is zero return the first loaded module (which is always the name of the
509 executable). */
3ee6f623 510static int
d3653bf6 511get_module_name (LPVOID base_address, char *dll_name_ret)
1e37c281
JM
512{
513 DWORD len;
514 MODULEINFO mi;
515 int i;
8e860359 516 HMODULE dh_buf[1];
581e13c1
MS
517 HMODULE *DllHandle = dh_buf; /* Set to temporary storage for
518 initial query. */
1e37c281 519 DWORD cbNeeded;
33605d39 520#ifdef __CYGWIN__
b3c613f2
CF
521 cygwin_buf_t pathbuf[__PMAX]; /* Temporary storage prior to converting to
522 posix form. __PMAX is always enough
d0d0ab16 523 as long as SO_NAME_MAX_PATH_SIZE is defined
581e13c1 524 as 512. */
33605d39 525#endif
1e37c281 526
1e37c281 527 cbNeeded = 0;
581e13c1
MS
528 /* Find size of buffer needed to handle list of modules loaded in
529 inferior. */
2b008701
CF
530 if (!EnumProcessModules (current_process_handle, DllHandle,
531 sizeof (HMODULE), &cbNeeded) || !cbNeeded)
1e37c281
JM
532 goto failed;
533
581e13c1 534 /* Allocate correct amount of space for module list. */
8e860359 535 DllHandle = (HMODULE *) alloca (cbNeeded);
1e37c281
JM
536 if (!DllHandle)
537 goto failed;
538
581e13c1 539 /* Get the list of modules. */
2b008701 540 if (!EnumProcessModules (current_process_handle, DllHandle, cbNeeded,
33605d39 541 &cbNeeded))
1e37c281
JM
542 goto failed;
543
29fe111d 544 for (i = 0; i < (int) (cbNeeded / sizeof (HMODULE)); i++)
1e37c281 545 {
581e13c1 546 /* Get information on this module. */
2b008701
CF
547 if (!GetModuleInformation (current_process_handle, DllHandle[i],
548 &mi, sizeof (mi)))
8a3fe4f8 549 error (_("Can't get module info"));
1e37c281 550
d3653bf6 551 if (!base_address || mi.lpBaseOfDll == base_address)
33605d39 552 {
581e13c1 553 /* Try to find the name of the given module. */
d0d0ab16 554#ifdef __CYGWIN__
581e13c1 555 /* Cygwin prefers that the path be in /x/y/z format. */
b3c613f2
CF
556 len = GetModuleFileNameEx (current_process_handle,
557 DllHandle[i], pathbuf, __PMAX);
d0d0ab16
CV
558 if (len == 0)
559 error (_("Error getting dll name: %lu."), GetLastError ());
560 if (cygwin_conv_path (CCP_WIN_W_TO_POSIX, pathbuf, dll_name_ret,
b3c613f2 561 __PMAX) < 0)
d0d0ab16
CV
562 error (_("Error converting dll name to POSIX: %d."), errno);
563#else
b3c613f2
CF
564 len = GetModuleFileNameEx (current_process_handle,
565 DllHandle[i], dll_name_ret, __PMAX);
33605d39 566 if (len == 0)
581e13c1
MS
567 error (_("Error getting dll name: %u."),
568 (unsigned) GetLastError ());
33605d39
CF
569#endif
570 return 1; /* success */
571 }
1e37c281
JM
572 }
573
574failed:
575 dll_name_ret[0] = '\0';
33605d39 576 return 0; /* failure */
1e37c281
JM
577}
578
450005e7 579/* Encapsulate the information required in a call to
581e13c1 580 symbol_file_add_args. */
8a892701
CF
581struct safe_symbol_file_add_args
582{
583 char *name;
584 int from_tty;
585 struct section_addr_info *addrs;
586 int mainline;
587 int flags;
7c5c87c0 588 struct ui_file *err, *out;
8a892701
CF
589 struct objfile *ret;
590};
591
581e13c1 592/* Maintain a linked list of "so" information. */
3ee6f623 593struct lm_info
02e423b9 594{
d3653bf6 595 LPVOID load_addr;
3ee6f623
CF
596};
597
598static struct so_list solib_start, *solib_end;
02e423b9 599
450005e7 600/* Call symbol_file_add with stderr redirected. We don't care if there
581e13c1 601 are errors. */
8a892701
CF
602static int
603safe_symbol_file_add_stub (void *argv)
604{
3ee6f623 605#define p ((struct safe_symbol_file_add_args *) argv)
7eedccfa
PP
606 const int add_flags = ((p->from_tty ? SYMFILE_VERBOSE : 0)
607 | (p->mainline ? SYMFILE_MAINLINE : 0));
608 p->ret = symbol_file_add (p->name, add_flags, p->addrs, p->flags);
8a892701
CF
609 return !!p->ret;
610#undef p
611}
612
581e13c1 613/* Restore gdb's stderr after calling symbol_file_add. */
8a892701 614static void
7c5c87c0 615safe_symbol_file_add_cleanup (void *p)
8a892701 616{
8e860359 617#define sp ((struct safe_symbol_file_add_args *)p)
450005e7 618 gdb_flush (gdb_stderr);
7c5c87c0 619 gdb_flush (gdb_stdout);
d3ff4a77 620 ui_file_delete (gdb_stderr);
7c5c87c0 621 ui_file_delete (gdb_stdout);
d3ff4a77 622 gdb_stderr = sp->err;
9d3789f7 623 gdb_stdout = sp->out;
8e860359 624#undef sp
8a892701
CF
625}
626
581e13c1 627/* symbol_file_add wrapper that prevents errors from being displayed. */
8a892701
CF
628static struct objfile *
629safe_symbol_file_add (char *name, int from_tty,
630 struct section_addr_info *addrs,
631 int mainline, int flags)
8a892701
CF
632{
633 struct safe_symbol_file_add_args p;
634 struct cleanup *cleanup;
635
7c5c87c0 636 cleanup = make_cleanup (safe_symbol_file_add_cleanup, &p);
8a892701 637
7c5c87c0
CF
638 p.err = gdb_stderr;
639 p.out = gdb_stdout;
450005e7 640 gdb_flush (gdb_stderr);
7c5c87c0 641 gdb_flush (gdb_stdout);
d3ff4a77 642 gdb_stderr = ui_file_new ();
7c5c87c0 643 gdb_stdout = ui_file_new ();
8a892701
CF
644 p.name = name;
645 p.from_tty = from_tty;
646 p.addrs = addrs;
647 p.mainline = mainline;
648 p.flags = flags;
649 catch_errors (safe_symbol_file_add_stub, &p, "", RETURN_MASK_ERROR);
650
651 do_cleanups (cleanup);
652 return p.ret;
653}
654
de1b3c3d 655static struct so_list *
dc05df57 656windows_make_so (const char *name, LPVOID load_addr)
8e860359 657{
3ee6f623 658 struct so_list *so;
d0d0ab16
CV
659 char *p;
660#ifndef __CYGWIN__
b3c613f2
CF
661 char buf[__PMAX];
662 char cwd[__PMAX];
3f8ad85b
CF
663 WIN32_FIND_DATA w32_fd;
664 HANDLE h = FindFirstFile(name, &w32_fd);
3f8ad85b 665
6badb179
CF
666 if (h == INVALID_HANDLE_VALUE)
667 strcpy (buf, name);
668 else
3f8ad85b 669 {
c914e0cc
CF
670 FindClose (h);
671 strcpy (buf, name);
672 if (GetCurrentDirectory (MAX_PATH + 1, cwd))
673 {
674 p = strrchr (buf, '\\');
675 if (p)
676 p[1] = '\0';
677 SetCurrentDirectory (buf);
678 GetFullPathName (w32_fd.cFileName, MAX_PATH, buf, &p);
679 SetCurrentDirectory (cwd);
680 }
3f8ad85b 681 }
3ee6f623
CF
682 if (strcasecmp (buf, "ntdll.dll") == 0)
683 {
684 GetSystemDirectory (buf, sizeof (buf));
685 strcat (buf, "\\ntdll.dll");
686 }
d0d0ab16 687#else
b3c613f2 688 cygwin_buf_t buf[__PMAX];
d0d0ab16 689
b3c613f2 690 buf[0] = 0;
d0d0ab16
CV
691 if (access (name, F_OK) != 0)
692 {
693 if (strcasecmp (name, "ntdll.dll") == 0)
b3c613f2 694#ifdef __USEWIDE
d0d0ab16
CV
695 {
696 GetSystemDirectoryW (buf, sizeof (buf) / sizeof (wchar_t));
697 wcscat (buf, L"\\ntdll.dll");
698 }
b3c613f2
CF
699#else
700 {
701 GetSystemDirectoryA (buf, sizeof (buf) / sizeof (wchar_t));
702 strcat (buf, "\\ntdll.dll");
703 }
704#endif
d0d0ab16
CV
705 }
706#endif
3929abe9 707 so = XZALLOC (struct so_list);
3ee6f623
CF
708 so->lm_info = (struct lm_info *) xmalloc (sizeof (struct lm_info));
709 so->lm_info->load_addr = load_addr;
de1b3c3d 710 strcpy (so->so_original_name, name);
10325bc5
PA
711#ifndef __CYGWIN__
712 strcpy (so->so_name, buf);
713#else
d0d0ab16
CV
714 if (buf[0])
715 cygwin_conv_path (CCP_WIN_W_TO_POSIX, buf, so->so_name,
716 SO_NAME_MAX_PATH_SIZE);
717 else
718 {
60c5c021 719 char *rname = realpath (name, NULL);
d0d0ab16
CV
720 if (rname && strlen (rname) < SO_NAME_MAX_PATH_SIZE)
721 {
722 strcpy (so->so_name, rname);
723 free (rname);
724 }
725 else
726 error (_("dll path too long"));
727 }
de1b3c3d
PA
728 /* Record cygwin1.dll .text start/end. */
729 p = strchr (so->so_name, '\0') - (sizeof ("/cygwin1.dll") - 1);
730 if (p >= so->so_name && strcasecmp (p, "/cygwin1.dll") == 0)
731 {
732 bfd *abfd;
733 asection *text = NULL;
734 CORE_ADDR text_vma;
8e860359 735
610dd7f9 736 abfd = bfd_openr (so->so_name, "pei-i386");
a244bdca 737
de1b3c3d
PA
738 if (!abfd)
739 return so;
740
741 if (bfd_check_format (abfd, bfd_object))
742 text = bfd_get_section_by_name (abfd, ".text");
743
744 if (!text)
745 {
746 bfd_close (abfd);
747 return so;
748 }
749
7a9dd1b2 750 /* The symbols in a dll are offset by 0x1000, which is the
de1b3c3d 751 offset from 0 of the first byte in an image - because of the
581e13c1
MS
752 file header and the section alignment. */
753 cygwin_load_start = (CORE_ADDR) (uintptr_t) ((char *)
754 load_addr + 0x1000);
dc05df57 755 cygwin_load_end = cygwin_load_start + bfd_section_size (abfd, text);
de1b3c3d
PA
756
757 bfd_close (abfd);
758 }
10325bc5 759#endif
de1b3c3d
PA
760
761 return so;
8e860359
CF
762}
763
3ee6f623 764static char *
dfe7f3ac
CF
765get_image_name (HANDLE h, void *address, int unicode)
766{
d0d0ab16 767#ifdef __CYGWIN__
b3c613f2 768 static char buf[__PMAX];
d0d0ab16 769#else
b3c613f2 770 static char buf[(2 * __PMAX) + 1];
d0d0ab16 771#endif
dfe7f3ac
CF
772 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
773 char *address_ptr;
774 int len = 0;
775 char b[2];
5732a500 776 SIZE_T done;
dfe7f3ac
CF
777
778 /* Attempt to read the name of the dll that was detected.
779 This is documented to work only when actively debugging
581e13c1 780 a program. It will not work for attached processes. */
dfe7f3ac
CF
781 if (address == NULL)
782 return NULL;
783
dfe7f3ac 784 /* See if we could read the address of a string, and that the
581e13c1
MS
785 address isn't null. */
786 if (!ReadProcessMemory (h, address, &address_ptr,
787 sizeof (address_ptr), &done)
6f17862b 788 || done != sizeof (address_ptr) || !address_ptr)
dfe7f3ac
CF
789 return NULL;
790
581e13c1 791 /* Find the length of the string. */
6f17862b
CF
792 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
793 && (b[0] != 0 || b[size - 1] != 0) && done == size)
794 continue;
dfe7f3ac
CF
795
796 if (!unicode)
797 ReadProcessMemory (h, address_ptr, buf, len, &done);
798 else
799 {
800 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
801 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
802 &done);
d0d0ab16 803#ifdef __CYGWIN__
b3c613f2 804 wcstombs (buf, unicode_address, __PMAX);
d0d0ab16
CV
805#else
806 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, sizeof buf,
807 0, 0);
808#endif
dfe7f3ac
CF
809 }
810
811 return buf;
812}
813
24e60978
SC
814/* Wait for child to do something. Return pid of child, or -1 in case
815 of error; store status through argument pointer OURSTATUS. */
1750a5ef 816static int
0a65a603 817handle_load_dll (void *dummy)
24e60978 818{
3a4b77d8 819 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
b3c613f2 820 char dll_buf[__PMAX];
450005e7 821 char *dll_name = NULL;
3cee93ac 822
3a4b77d8 823 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 824
d3653bf6 825 if (!get_module_name (event->lpBaseOfDll, dll_buf))
8e860359 826 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 827
1e37c281 828 dll_name = dll_buf;
24e60978 829
dfe7f3ac 830 if (*dll_name == '\0')
de1b3c3d
PA
831 dll_name = get_image_name (current_process_handle,
832 event->lpImageName, event->fUnicode);
3cee93ac
CF
833 if (!dll_name)
834 return 1;
835
dc05df57 836 solib_end->next = windows_make_so (dll_name, event->lpBaseOfDll);
de1b3c3d 837 solib_end = solib_end->next;
450005e7 838
a74ce742
PM
839 DEBUG_EVENTS (("gdb: Loading dll \"%s\" at %s.\n", solib_end->so_name,
840 host_address_to_string (solib_end->lm_info->load_addr)));
7488902c 841
450005e7
CF
842 return 1;
843}
844
3ee6f623 845static void
dc05df57 846windows_free_so (struct so_list *so)
3ee6f623 847{
3ee6f623
CF
848 if (so->lm_info)
849 xfree (so->lm_info);
de1b3c3d 850 xfree (so);
3cb8e7f6
CF
851}
852
d3ff4a77 853static int
0a65a603 854handle_unload_dll (void *dummy)
d3ff4a77 855{
d3653bf6 856 LPVOID lpBaseOfDll = current_event.u.UnloadDll.lpBaseOfDll;
3ee6f623 857 struct so_list *so;
d3ff4a77
CF
858
859 for (so = &solib_start; so->next != NULL; so = so->next)
3ee6f623 860 if (so->next->lm_info->load_addr == lpBaseOfDll)
d3ff4a77 861 {
3ee6f623 862 struct so_list *sodel = so->next;
d3ff4a77
CF
863 so->next = sodel->next;
864 if (!so->next)
865 solib_end = so;
7488902c
PM
866 DEBUG_EVENTS (("gdb: Unloading dll \"%s\".\n", sodel->so_name));
867
dc05df57 868 windows_free_so (sodel);
3929abe9 869 solib_add (NULL, 0, NULL, auto_solib_add);
d3ff4a77
CF
870 return 1;
871 }
3929abe9 872
ecc13e53
JB
873 /* We did not find any DLL that was previously loaded at this address,
874 so register a complaint. We do not report an error, because we have
875 observed that this may be happening under some circumstances. For
876 instance, running 32bit applications on x64 Windows causes us to receive
877 4 mysterious UNLOAD_DLL_DEBUG_EVENTs during the startup phase (these
878 events are apparently caused by the WOW layer, the interface between
879 32bit and 64bit worlds). */
880 complaint (&symfile_complaints, _("dll starting at %s not found."),
881 host_address_to_string (lpBaseOfDll));
d3ff4a77
CF
882
883 return 0;
884}
885
581e13c1 886/* Clear list of loaded DLLs. */
3ee6f623 887static void
dc05df57 888windows_clear_solib (void)
450005e7 889{
450005e7
CF
890 solib_start.next = NULL;
891 solib_end = &solib_start;
450005e7 892}
295732ea 893
581e13c1 894/* Load DLL symbol info. */
450005e7 895void
7470a420 896dll_symbol_command (char *args, int from_tty)
450005e7 897{
8e860359 898 int n;
450005e7 899 dont_repeat ();
8e860359 900
450005e7 901 if (args == NULL)
8a3fe4f8 902 error (_("dll-symbols requires a file name"));
450005e7 903
8e860359
CF
904 n = strlen (args);
905 if (n > 4 && strcasecmp (args + n - 4, ".dll") != 0)
906 {
907 char *newargs = (char *) alloca (n + 4 + 1);
908 strcpy (newargs, args);
909 strcat (newargs, ".dll");
910 args = newargs;
911 }
912
7470a420 913 safe_symbol_file_add (args, from_tty, NULL, 0, OBJF_SHARED | OBJF_USERLOADED);
8e860359 914}
450005e7 915
3cee93ac
CF
916/* Handle DEBUG_STRING output from child process.
917 Cygwin prepends its messages with a "cygwin:". Interpret this as
581e13c1 918 a Cygwin signal. Otherwise just print the string as a warning. */
3cee93ac
CF
919static int
920handle_output_debug_string (struct target_waitstatus *ourstatus)
921{
a244bdca
CF
922 char *s = NULL;
923 int retval = 0;
3cee93ac
CF
924
925 if (!target_read_string
2c647436
PM
926 ((CORE_ADDR) (uintptr_t) current_event.u.DebugString.lpDebugStringData,
927 &s, 1024, 0)
3cee93ac 928 || !s || !*s)
a244bdca 929 /* nothing to do */;
581e13c1
MS
930 else if (strncmp (s, _CYGWIN_SIGNAL_STRING,
931 sizeof (_CYGWIN_SIGNAL_STRING) - 1) != 0)
3cee93ac 932 {
10325bc5 933#ifdef __CYGWIN__
d3a09475 934 if (strncmp (s, "cYg", 3) != 0)
10325bc5 935#endif
8a3fe4f8 936 warning (("%s"), s);
3cee93ac 937 }
cb832706 938#ifdef __COPY_CONTEXT_SIZE
d3a09475 939 else
3cee93ac 940 {
581e13c1
MS
941 /* Got a cygwin signal marker. A cygwin signal is followed by
942 the signal number itself and then optionally followed by the
943 thread id and address to saved context within the DLL. If
944 these are supplied, then the given thread is assumed to have
945 issued the signal and the context from the thread is assumed
946 to be stored at the given address in the inferior. Tell gdb
947 to treat this like a real signal. */
3cee93ac 948 char *p;
3929abe9 949 int sig = strtol (s + sizeof (_CYGWIN_SIGNAL_STRING) - 1, &p, 0);
a244bdca 950 int gotasig = target_signal_from_host (sig);
0714f9bf
SS
951 ourstatus->value.sig = gotasig;
952 if (gotasig)
a244bdca
CF
953 {
954 LPCVOID x;
955 DWORD n;
956 ourstatus->kind = TARGET_WAITKIND_STOPPED;
957 retval = strtoul (p, &p, 0);
958 if (!retval)
959 retval = main_thread_id;
960 else if ((x = (LPCVOID) strtoul (p, &p, 0))
961 && ReadProcessMemory (current_process_handle, x,
581e13c1
MS
962 &saved_context,
963 __COPY_CONTEXT_SIZE, &n)
a244bdca
CF
964 && n == __COPY_CONTEXT_SIZE)
965 have_saved_context = 1;
966 current_event.dwThreadId = retval;
967 }
3cee93ac 968 }
cb832706 969#endif
3cee93ac 970
a244bdca
CF
971 if (s)
972 xfree (s);
973 return retval;
3cee93ac 974}
24e60978 975
c1748f97
PM
976static int
977display_selector (HANDLE thread, DWORD sel)
978{
979 LDT_ENTRY info;
980 if (GetThreadSelectorEntry (thread, sel, &info))
981 {
982 int base, limit;
983 printf_filtered ("0x%03lx: ", sel);
984 if (!info.HighWord.Bits.Pres)
baa93fa6
CF
985 {
986 puts_filtered ("Segment not present\n");
987 return 0;
988 }
c1748f97
PM
989 base = (info.HighWord.Bits.BaseHi << 24) +
990 (info.HighWord.Bits.BaseMid << 16)
991 + info.BaseLow;
992 limit = (info.HighWord.Bits.LimitHi << 16) + info.LimitLow;
993 if (info.HighWord.Bits.Granularity)
caad7706 994 limit = (limit << 12) | 0xfff;
c1748f97
PM
995 printf_filtered ("base=0x%08x limit=0x%08x", base, limit);
996 if (info.HighWord.Bits.Default_Big)
baa93fa6 997 puts_filtered(" 32-bit ");
c1748f97 998 else
baa93fa6 999 puts_filtered(" 16-bit ");
c1748f97
PM
1000 switch ((info.HighWord.Bits.Type & 0xf) >> 1)
1001 {
1002 case 0:
baa93fa6
CF
1003 puts_filtered ("Data (Read-Only, Exp-up");
1004 break;
c1748f97 1005 case 1:
baa93fa6
CF
1006 puts_filtered ("Data (Read/Write, Exp-up");
1007 break;
c1748f97 1008 case 2:
baa93fa6
CF
1009 puts_filtered ("Unused segment (");
1010 break;
c1748f97 1011 case 3:
baa93fa6
CF
1012 puts_filtered ("Data (Read/Write, Exp-down");
1013 break;
c1748f97 1014 case 4:
baa93fa6
CF
1015 puts_filtered ("Code (Exec-Only, N.Conf");
1016 break;
c1748f97 1017 case 5:
baa93fa6 1018 puts_filtered ("Code (Exec/Read, N.Conf");
c1748f97
PM
1019 break;
1020 case 6:
baa93fa6 1021 puts_filtered ("Code (Exec-Only, Conf");
c1748f97
PM
1022 break;
1023 case 7:
baa93fa6 1024 puts_filtered ("Code (Exec/Read, Conf");
c1748f97
PM
1025 break;
1026 default:
1027 printf_filtered ("Unknown type 0x%x",info.HighWord.Bits.Type);
1028 }
1029 if ((info.HighWord.Bits.Type & 0x1) == 0)
baa93fa6 1030 puts_filtered(", N.Acc");
c1748f97
PM
1031 puts_filtered (")\n");
1032 if ((info.HighWord.Bits.Type & 0x10) == 0)
1033 puts_filtered("System selector ");
1034 printf_filtered ("Priviledge level = %d. ", info.HighWord.Bits.Dpl);
1035 if (info.HighWord.Bits.Granularity)
baa93fa6 1036 puts_filtered ("Page granular.\n");
c1748f97
PM
1037 else
1038 puts_filtered ("Byte granular.\n");
1039 return 1;
1040 }
1041 else
1042 {
5572ce1f
PM
1043 DWORD err = GetLastError ();
1044 if (err == ERROR_NOT_SUPPORTED)
1045 printf_filtered ("Function not supported\n");
1046 else
1047 printf_filtered ("Invalid selector 0x%lx.\n",sel);
c1748f97
PM
1048 return 0;
1049 }
1050}
1051
1052static void
1053display_selectors (char * args, int from_tty)
1054{
1055 if (!current_thread)
1056 {
1057 puts_filtered ("Impossible to display selectors now.\n");
1058 return;
1059 }
1060 if (!args)
1061 {
1062
1063 puts_filtered ("Selector $cs\n");
1064 display_selector (current_thread->h,
baa93fa6 1065 current_thread->context.SegCs);
c1748f97
PM
1066 puts_filtered ("Selector $ds\n");
1067 display_selector (current_thread->h,
baa93fa6 1068 current_thread->context.SegDs);
c1748f97
PM
1069 puts_filtered ("Selector $es\n");
1070 display_selector (current_thread->h,
baa93fa6 1071 current_thread->context.SegEs);
c1748f97
PM
1072 puts_filtered ("Selector $ss\n");
1073 display_selector (current_thread->h,
baa93fa6 1074 current_thread->context.SegSs);
c1748f97
PM
1075 puts_filtered ("Selector $fs\n");
1076 display_selector (current_thread->h,
1077 current_thread->context.SegFs);
1078 puts_filtered ("Selector $gs\n");
1079 display_selector (current_thread->h,
baa93fa6 1080 current_thread->context.SegGs);
c1748f97
PM
1081 }
1082 else
1083 {
1084 int sel;
1085 sel = parse_and_eval_long (args);
1086 printf_filtered ("Selector \"%s\"\n",args);
1087 display_selector (current_thread->h, sel);
1088 }
1089}
1090
7393af7c 1091#define DEBUG_EXCEPTION_SIMPLE(x) if (debug_exceptions) \
a74ce742
PM
1092 printf_unfiltered ("gdb: Target exception %s at %s\n", x, \
1093 host_address_to_string (\
1094 current_event.u.Exception.ExceptionRecord.ExceptionAddress))
7393af7c 1095
36339ecd 1096static int
450005e7 1097handle_exception (struct target_waitstatus *ourstatus)
24e60978 1098{
3cee93ac 1099 thread_info *th;
29fe111d 1100 DWORD code = current_event.u.Exception.ExceptionRecord.ExceptionCode;
3cee93ac 1101
29fe111d 1102 ourstatus->kind = TARGET_WAITKIND_STOPPED;
8a892701 1103
581e13c1 1104 /* Record the context of the current thread. */
3cee93ac 1105 th = thread_rec (current_event.dwThreadId, -1);
24e60978 1106
29fe111d 1107 switch (code)
24e60978 1108 {
1ef980b9 1109 case EXCEPTION_ACCESS_VIOLATION:
7393af7c
PM
1110 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ACCESS_VIOLATION");
1111 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
10325bc5 1112#ifdef __CYGWIN__
8da8e0b3 1113 {
581e13c1
MS
1114 /* See if the access violation happened within the cygwin DLL
1115 itself. Cygwin uses a kind of exception handling to deal
1116 with passed-in invalid addresses. gdb should not treat
1117 these as real SEGVs since they will be silently handled by
1118 cygwin. A real SEGV will (theoretically) be caught by
1119 cygwin later in the process and will be sent as a
1120 cygwin-specific-signal. So, ignore SEGVs if they show up
1121 within the text segment of the DLL itself. */
8da8e0b3 1122 char *fn;
581e13c1
MS
1123 CORE_ADDR addr = (CORE_ADDR) (uintptr_t)
1124 current_event.u.Exception.ExceptionRecord.ExceptionAddress;
1125
1126 if ((!cygwin_exceptions && (addr >= cygwin_load_start
1127 && addr < cygwin_load_end))
a244bdca 1128 || (find_pc_partial_function (addr, &fn, NULL, NULL)
581e13c1
MS
1129 && strncmp (fn, "KERNEL32!IsBad",
1130 strlen ("KERNEL32!IsBad")) == 0))
8da8e0b3
CF
1131 return 0;
1132 }
10325bc5 1133#endif
7393af7c
PM
1134 break;
1135 case STATUS_STACK_OVERFLOW:
1136 DEBUG_EXCEPTION_SIMPLE ("STATUS_STACK_OVERFLOW");
1ef980b9 1137 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
7393af7c
PM
1138 break;
1139 case STATUS_FLOAT_DENORMAL_OPERAND:
1140 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DENORMAL_OPERAND");
1141 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1142 break;
1143 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1144 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ARRAY_BOUNDS_EXCEEDED");
1145 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1146 break;
1147 case STATUS_FLOAT_INEXACT_RESULT:
1148 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INEXACT_RESULT");
1149 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1150 break;
1151 case STATUS_FLOAT_INVALID_OPERATION:
1152 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INVALID_OPERATION");
1153 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1154 break;
1155 case STATUS_FLOAT_OVERFLOW:
1156 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_OVERFLOW");
1157 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1158 break;
1159 case STATUS_FLOAT_STACK_CHECK:
1160 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_STACK_CHECK");
1161 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1ef980b9 1162 break;
3b7c8b74 1163 case STATUS_FLOAT_UNDERFLOW:
7393af7c
PM
1164 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_UNDERFLOW");
1165 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1166 break;
3b7c8b74 1167 case STATUS_FLOAT_DIVIDE_BY_ZERO:
7393af7c
PM
1168 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DIVIDE_BY_ZERO");
1169 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1170 break;
3b7c8b74 1171 case STATUS_INTEGER_DIVIDE_BY_ZERO:
7393af7c 1172 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_DIVIDE_BY_ZERO");
3b7c8b74 1173 ourstatus->value.sig = TARGET_SIGNAL_FPE;
3b7c8b74 1174 break;
7393af7c
PM
1175 case STATUS_INTEGER_OVERFLOW:
1176 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_OVERFLOW");
1177 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1ef980b9
SC
1178 break;
1179 case EXCEPTION_BREAKPOINT:
7393af7c 1180 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_BREAKPOINT");
1ef980b9
SC
1181 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
1182 break;
1183 case DBG_CONTROL_C:
7393af7c 1184 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_C");
1ef980b9 1185 ourstatus->value.sig = TARGET_SIGNAL_INT;
5b421780
PM
1186 break;
1187 case DBG_CONTROL_BREAK:
7393af7c 1188 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_BREAK");
5b421780 1189 ourstatus->value.sig = TARGET_SIGNAL_INT;
1ef980b9
SC
1190 break;
1191 case EXCEPTION_SINGLE_STEP:
7393af7c 1192 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_SINGLE_STEP");
1ef980b9
SC
1193 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
1194 break;
8227c82d 1195 case EXCEPTION_ILLEGAL_INSTRUCTION:
7393af7c
PM
1196 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ILLEGAL_INSTRUCTION");
1197 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1198 break;
1199 case EXCEPTION_PRIV_INSTRUCTION:
1200 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_PRIV_INSTRUCTION");
1201 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1202 break;
1203 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1204 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_NONCONTINUABLE_EXCEPTION");
8227c82d
CF
1205 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1206 break;
1ef980b9 1207 default:
581e13c1 1208 /* Treat unhandled first chance exceptions specially. */
02e423b9 1209 if (current_event.u.Exception.dwFirstChance)
a244bdca 1210 return -1;
a74ce742
PM
1211 printf_unfiltered ("gdb: unknown target exception 0x%08lx at %s\n",
1212 current_event.u.Exception.ExceptionRecord.ExceptionCode,
1213 host_address_to_string (
1214 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
24e60978 1215 ourstatus->value.sig = TARGET_SIGNAL_UNKNOWN;
1ef980b9 1216 break;
24e60978 1217 }
24e60978 1218 exception_count++;
7393af7c 1219 last_sig = ourstatus->value.sig;
36339ecd 1220 return 1;
24e60978
SC
1221}
1222
3cee93ac 1223/* Resume all artificially suspended threads if we are continuing
581e13c1 1224 execution. */
3cee93ac 1225static BOOL
dc05df57 1226windows_continue (DWORD continue_status, int id)
3cee93ac
CF
1227{
1228 int i;
1229 thread_info *th;
1230 BOOL res;
1231
1c1238a5 1232 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%ld, ctid=%lx, %s);\n",
7393af7c 1233 current_event.dwProcessId, current_event.dwThreadId,
dfe7f3ac 1234 continue_status == DBG_CONTINUE ?
7393af7c 1235 "DBG_CONTINUE" : "DBG_EXCEPTION_NOT_HANDLED"));
6537bb24
PA
1236
1237 for (th = &thread_head; (th = th->next) != NULL;)
1238 if ((id == -1 || id == (int) th->id)
1239 && th->suspended)
1240 {
1241 if (debug_registers_changed)
1242 {
1243 th->context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1244 th->context.Dr0 = dr[0];
1245 th->context.Dr1 = dr[1];
1246 th->context.Dr2 = dr[2];
1247 th->context.Dr3 = dr[3];
1248 th->context.Dr6 = DR6_CLEAR_VALUE;
1249 th->context.Dr7 = dr[7];
1250 }
1251 if (th->context.ContextFlags)
1252 {
1253 CHECK (SetThreadContext (th->h, &th->context));
1254 th->context.ContextFlags = 0;
1255 }
1256 if (th->suspended > 0)
1257 (void) ResumeThread (th->h);
1258 th->suspended = 0;
1259 }
1260
0714f9bf
SS
1261 res = ContinueDebugEvent (current_event.dwProcessId,
1262 current_event.dwThreadId,
1263 continue_status);
3cee93ac 1264
fa4ba8da 1265 debug_registers_changed = 0;
3cee93ac
CF
1266 return res;
1267}
1268
d6dc8049
CF
1269/* Called in pathological case where Windows fails to send a
1270 CREATE_PROCESS_DEBUG_EVENT after an attach. */
3ee6f623 1271static DWORD
5439edaa 1272fake_create_process (void)
3ade5333
CF
1273{
1274 current_process_handle = OpenProcess (PROCESS_ALL_ACCESS, FALSE,
1275 current_event.dwProcessId);
bf25528d
CF
1276 if (current_process_handle != NULL)
1277 open_process_used = 1;
1278 else
1279 {
b37520b6 1280 error (_("OpenProcess call failed, GetLastError = %lud"),
bf25528d
CF
1281 GetLastError ());
1282 /* We can not debug anything in that case. */
1283 }
3ade5333 1284 main_thread_id = current_event.dwThreadId;
711e434b
PM
1285 current_thread = windows_add_thread (
1286 ptid_build (current_event.dwProcessId, 0,
1287 current_event.dwThreadId),
1288 current_event.u.CreateThread.hThread,
1289 current_event.u.CreateThread.lpThreadLocalBase);
3ade5333
CF
1290 return main_thread_id;
1291}
1292
a244bdca 1293static void
28439f5e
PA
1294windows_resume (struct target_ops *ops,
1295 ptid_t ptid, int step, enum target_signal sig)
a244bdca
CF
1296{
1297 thread_info *th;
1298 DWORD continue_status = DBG_CONTINUE;
1299
2dc38344
PA
1300 /* A specific PTID means `step only this thread id'. */
1301 int resume_all = ptid_equal (ptid, minus_one_ptid);
1302
1303 /* If we're continuing all threads, it's the current inferior that
1304 should be handled specially. */
1305 if (resume_all)
1306 ptid = inferior_ptid;
a244bdca
CF
1307
1308 if (sig != TARGET_SIGNAL_0)
1309 {
1310 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
1311 {
1312 DEBUG_EXCEPT(("Cannot continue with signal %d here.\n",sig));
1313 }
1314 else if (sig == last_sig)
1315 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1316 else
1317#if 0
1318/* This code does not seem to work, because
1319 the kernel does probably not consider changes in the ExceptionRecord
1320 structure when passing the exception to the inferior.
1321 Note that this seems possible in the exception handler itself. */
1322 {
1323 int i;
1324 for (i = 0; xlate[i].them != -1; i++)
1325 if (xlate[i].us == sig)
1326 {
581e13c1
MS
1327 current_event.u.Exception.ExceptionRecord.ExceptionCode
1328 = xlate[i].them;
a244bdca
CF
1329 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1330 break;
1331 }
1332 if (continue_status == DBG_CONTINUE)
1333 {
1334 DEBUG_EXCEPT(("Cannot continue with signal %d.\n",sig));
1335 }
1336 }
1337#endif
1338 DEBUG_EXCEPT(("Can only continue with recieved signal %d.\n",
1339 last_sig));
1340 }
1341
1342 last_sig = TARGET_SIGNAL_0;
1343
dc05df57 1344 DEBUG_EXEC (("gdb: windows_resume (pid=%d, tid=%ld, step=%d, sig=%d);\n",
2dc38344 1345 ptid_get_pid (ptid), ptid_get_tid (ptid), step, sig));
a244bdca 1346
581e13c1 1347 /* Get context for currently selected thread. */
2dc38344 1348 th = thread_rec (ptid_get_tid (inferior_ptid), FALSE);
a244bdca
CF
1349 if (th)
1350 {
1351 if (step)
1352 {
581e13c1 1353 /* Single step by setting t bit. */
a97b0ac8
UW
1354 struct regcache *regcache = get_current_regcache ();
1355 struct gdbarch *gdbarch = get_regcache_arch (regcache);
1356 windows_fetch_inferior_registers (ops, regcache,
1357 gdbarch_ps_regnum (gdbarch));
a244bdca
CF
1358 th->context.EFlags |= FLAG_TRACE_BIT;
1359 }
1360
1361 if (th->context.ContextFlags)
1362 {
1363 if (debug_registers_changed)
1364 {
1365 th->context.Dr0 = dr[0];
1366 th->context.Dr1 = dr[1];
1367 th->context.Dr2 = dr[2];
1368 th->context.Dr3 = dr[3];
6537bb24 1369 th->context.Dr6 = DR6_CLEAR_VALUE;
a244bdca
CF
1370 th->context.Dr7 = dr[7];
1371 }
1372 CHECK (SetThreadContext (th->h, &th->context));
1373 th->context.ContextFlags = 0;
1374 }
1375 }
1376
1377 /* Allow continuing with the same signal that interrupted us.
581e13c1 1378 Otherwise complain. */
a244bdca 1379
2dc38344 1380 if (resume_all)
dc05df57 1381 windows_continue (continue_status, -1);
2dc38344 1382 else
dc05df57 1383 windows_continue (continue_status, ptid_get_tid (ptid));
a244bdca
CF
1384}
1385
695de547
CF
1386/* Ctrl-C handler used when the inferior is not run in the same console. The
1387 handler is in charge of interrupting the inferior using DebugBreakProcess.
1388 Note that this function is not available prior to Windows XP. In this case
1389 we emit a warning. */
1390BOOL WINAPI
1391ctrl_c_handler (DWORD event_type)
1392{
1393 const int attach_flag = current_inferior ()->attach_flag;
1394
bb0613a5
PM
1395 /* Only handle Ctrl-C and Ctrl-Break events. Ignore others. */
1396 if (event_type != CTRL_C_EVENT && event_type != CTRL_BREAK_EVENT)
695de547
CF
1397 return FALSE;
1398
1399 /* If the inferior and the debugger share the same console, do nothing as
1400 the inferior has also received the Ctrl-C event. */
1401 if (!new_console && !attach_flag)
1402 return TRUE;
1403
1404 if (!DebugBreakProcess (current_process_handle))
581e13c1
MS
1405 warning (_("Could not interrupt program. "
1406 "Press Ctrl-c in the program console."));
695de547
CF
1407
1408 /* Return true to tell that Ctrl-C has been handled. */
1409 return TRUE;
1410}
1411
8a892701 1412/* Get the next event from the child. Return 1 if the event requires
695de547 1413 handling by WFI (or whatever). */
1e37c281 1414static int
28439f5e
PA
1415get_windows_debug_event (struct target_ops *ops,
1416 int pid, struct target_waitstatus *ourstatus)
1e37c281
JM
1417{
1418 BOOL debug_event;
8a892701 1419 DWORD continue_status, event_code;
87a45c96 1420 thread_info *th;
8a892701 1421 static thread_info dummy_thread_info;
450005e7 1422 int retval = 0;
1e37c281 1423
7393af7c 1424 last_sig = TARGET_SIGNAL_0;
9d3789f7 1425
8a892701 1426 if (!(debug_event = WaitForDebugEvent (&current_event, 1000)))
29fe111d 1427 goto out;
1e37c281
JM
1428
1429 event_count++;
1430 continue_status = DBG_CONTINUE;
1e37c281 1431
8a892701 1432 event_code = current_event.dwDebugEventCode;
450005e7 1433 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
87a45c96 1434 th = NULL;
a244bdca 1435 have_saved_context = 0;
8a892701
CF
1436
1437 switch (event_code)
1e37c281
JM
1438 {
1439 case CREATE_THREAD_DEBUG_EVENT:
1440 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1441 (unsigned) current_event.dwProcessId,
1442 (unsigned) current_event.dwThreadId,
1443 "CREATE_THREAD_DEBUG_EVENT"));
dfe7f3ac 1444 if (saw_create != 1)
3ade5333 1445 {
181e7f93
PA
1446 struct inferior *inf;
1447 inf = find_inferior_pid (current_event.dwProcessId);
1448 if (!saw_create && inf->attach_flag)
3ade5333 1449 {
d6dc8049
CF
1450 /* Kludge around a Windows bug where first event is a create
1451 thread event. Caused when attached process does not have
581e13c1 1452 a main thread. */
3a3e9ee3 1453 retval = fake_create_process ();
181e7f93
PA
1454 if (retval)
1455 saw_create++;
3ade5333
CF
1456 }
1457 break;
1458 }
581e13c1 1459 /* Record the existence of this thread. */
450005e7 1460 retval = current_event.dwThreadId;
dc05df57 1461 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1462 current_event.dwThreadId),
711e434b
PM
1463 current_event.u.CreateThread.hThread,
1464 current_event.u.CreateThread.lpThreadLocalBase);
1465
1e37c281
JM
1466 break;
1467
1468 case EXIT_THREAD_DEBUG_EVENT:
1c1238a5 1469 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1470 (unsigned) current_event.dwProcessId,
1471 (unsigned) current_event.dwThreadId,
1472 "EXIT_THREAD_DEBUG_EVENT"));
b3c613f2 1473
87a45c96
CF
1474 if (current_event.dwThreadId != main_thread_id)
1475 {
dc05df57 1476 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1477 current_event.dwThreadId));
87a45c96
CF
1478 th = &dummy_thread_info;
1479 }
1e37c281
JM
1480 break;
1481
1482 case CREATE_PROCESS_DEBUG_EVENT:
1c1238a5 1483 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1484 (unsigned) current_event.dwProcessId,
1485 (unsigned) current_event.dwThreadId,
1486 "CREATE_PROCESS_DEBUG_EVENT"));
700b351b 1487 CloseHandle (current_event.u.CreateProcessInfo.hFile);
dfe7f3ac 1488 if (++saw_create != 1)
bf25528d 1489 break;
1e37c281 1490
dfe7f3ac 1491 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
87a45c96 1492 if (main_thread_id)
695de547
CF
1493 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
1494 main_thread_id));
9d3789f7 1495 main_thread_id = current_event.dwThreadId;
581e13c1 1496 /* Add the main thread. */
dc05df57 1497 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
695de547 1498 current_event.dwThreadId),
711e434b
PM
1499 current_event.u.CreateProcessInfo.hThread,
1500 current_event.u.CreateProcessInfo.lpThreadLocalBase);
3a3e9ee3 1501 retval = current_event.dwThreadId;
1e37c281
JM
1502 break;
1503
1504 case EXIT_PROCESS_DEBUG_EVENT:
1c1238a5 1505 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1506 (unsigned) current_event.dwProcessId,
1507 (unsigned) current_event.dwThreadId,
1508 "EXIT_PROCESS_DEBUG_EVENT"));
16d905e2
CF
1509 if (!windows_initialization_done)
1510 {
1511 target_terminal_ours ();
1512 target_mourn_inferior ();
1513 error (_("During startup program exited with code 0x%x."),
1514 (unsigned int) current_event.u.ExitProcess.dwExitCode);
1515 }
1516 else if (saw_create == 1)
1517 {
1518 ourstatus->kind = TARGET_WAITKIND_EXITED;
1519 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
1520 retval = main_thread_id;
1521 }
8a892701 1522 break;
1e37c281
JM
1523
1524 case LOAD_DLL_DEBUG_EVENT:
1c1238a5 1525 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1526 (unsigned) current_event.dwProcessId,
1527 (unsigned) current_event.dwThreadId,
1528 "LOAD_DLL_DEBUG_EVENT"));
700b351b 1529 CloseHandle (current_event.u.LoadDll.hFile);
dfe7f3ac
CF
1530 if (saw_create != 1)
1531 break;
8a892701 1532 catch_errors (handle_load_dll, NULL, (char *) "", RETURN_MASK_ALL);
450005e7
CF
1533 ourstatus->kind = TARGET_WAITKIND_LOADED;
1534 ourstatus->value.integer = 0;
9d3789f7 1535 retval = main_thread_id;
1e37c281
JM
1536 break;
1537
1538 case UNLOAD_DLL_DEBUG_EVENT:
1c1238a5 1539 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1540 (unsigned) current_event.dwProcessId,
1541 (unsigned) current_event.dwThreadId,
1542 "UNLOAD_DLL_DEBUG_EVENT"));
dfe7f3ac
CF
1543 if (saw_create != 1)
1544 break;
d3ff4a77 1545 catch_errors (handle_unload_dll, NULL, (char *) "", RETURN_MASK_ALL);
de1b3c3d
PA
1546 ourstatus->kind = TARGET_WAITKIND_LOADED;
1547 ourstatus->value.integer = 0;
1548 retval = main_thread_id;
d3ff4a77 1549 break;
1e37c281
JM
1550
1551 case EXCEPTION_DEBUG_EVENT:
1c1238a5 1552 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1553 (unsigned) current_event.dwProcessId,
1554 (unsigned) current_event.dwThreadId,
1555 "EXCEPTION_DEBUG_EVENT"));
dfe7f3ac
CF
1556 if (saw_create != 1)
1557 break;
a244bdca
CF
1558 switch (handle_exception (ourstatus))
1559 {
1560 case 0:
1561 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1562 break;
1563 case 1:
1564 retval = current_event.dwThreadId;
1565 break;
1566 case -1:
1567 last_sig = 1;
1568 continue_status = -1;
1569 break;
1570 }
1e37c281
JM
1571 break;
1572
581e13c1 1573 case OUTPUT_DEBUG_STRING_EVENT: /* Message from the kernel. */
1c1238a5 1574 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1575 (unsigned) current_event.dwProcessId,
1576 (unsigned) current_event.dwThreadId,
1577 "OUTPUT_DEBUG_STRING_EVENT"));
dfe7f3ac
CF
1578 if (saw_create != 1)
1579 break;
a244bdca 1580 retval = handle_output_debug_string (ourstatus);
1e37c281 1581 break;
9d3789f7 1582
1e37c281 1583 default:
dfe7f3ac
CF
1584 if (saw_create != 1)
1585 break;
29fe111d
CF
1586 printf_unfiltered ("gdb: kernel event for pid=%ld tid=%ld\n",
1587 (DWORD) current_event.dwProcessId,
1588 (DWORD) current_event.dwThreadId);
1589 printf_unfiltered (" unknown event code %ld\n",
1e37c281
JM
1590 current_event.dwDebugEventCode);
1591 break;
1592 }
1593
dfe7f3ac 1594 if (!retval || saw_create != 1)
a244bdca
CF
1595 {
1596 if (continue_status == -1)
02529b48 1597 windows_resume (ops, minus_one_ptid, 0, 1);
a244bdca 1598 else
dc05df57 1599 CHECK (windows_continue (continue_status, -1));
a244bdca 1600 }
450005e7 1601 else
9d3789f7 1602 {
2dc38344
PA
1603 inferior_ptid = ptid_build (current_event.dwProcessId, 0,
1604 retval);
3ade5333 1605 current_thread = th ?: thread_rec (current_event.dwThreadId, TRUE);
9d3789f7 1606 }
1e37c281
JM
1607
1608out:
450005e7 1609 return retval;
1e37c281
JM
1610}
1611
2dc38344 1612/* Wait for interesting events to occur in the target process. */
39f77062 1613static ptid_t
117de6a9 1614windows_wait (struct target_ops *ops,
47608cb1 1615 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
24e60978 1616{
2dc38344 1617 int pid = -1;
39f77062 1618
c44537cf
CV
1619 target_terminal_ours ();
1620
24e60978
SC
1621 /* We loop when we get a non-standard exception rather than return
1622 with a SPURIOUS because resume can try and step or modify things,
3cee93ac 1623 which needs a current_thread->h. But some of these exceptions mark
24e60978 1624 the birth or death of threads, which mean that the current thread
581e13c1 1625 isn't necessarily what you think it is. */
24e60978
SC
1626
1627 while (1)
450005e7 1628 {
c57918b2 1629 int retval;
2b008701 1630
695de547
CF
1631 /* If the user presses Ctrl-c while the debugger is waiting
1632 for an event, he expects the debugger to interrupt his program
1633 and to get the prompt back. There are two possible situations:
1634
1635 - The debugger and the program do not share the console, in
1636 which case the Ctrl-c event only reached the debugger.
1637 In that case, the ctrl_c handler will take care of interrupting
581e13c1
MS
1638 the inferior. Note that this case is working starting with
1639 Windows XP. For Windows 2000, Ctrl-C should be pressed in the
695de547
CF
1640 inferior console.
1641
1642 - The debugger and the program share the same console, in which
1643 case both debugger and inferior will receive the Ctrl-c event.
1644 In that case the ctrl_c handler will ignore the event, as the
1645 Ctrl-c event generated inside the inferior will trigger the
1646 expected debug event.
1647
1648 FIXME: brobecker/2008-05-20: If the inferior receives the
1649 signal first and the delay until GDB receives that signal
1650 is sufficiently long, GDB can sometimes receive the SIGINT
1651 after we have unblocked the CTRL+C handler. This would
1652 lead to the debugger stopping prematurely while handling
1653 the new-thread event that comes with the handling of the SIGINT
1654 inside the inferior, and then stop again immediately when
1655 the user tries to resume the execution in the inferior.
1656 This is a classic race that we should try to fix one day. */
1657 SetConsoleCtrlHandler (&ctrl_c_handler, TRUE);
28439f5e 1658 retval = get_windows_debug_event (ops, pid, ourstatus);
695de547 1659 SetConsoleCtrlHandler (&ctrl_c_handler, FALSE);
c57918b2 1660
450005e7 1661 if (retval)
2dc38344 1662 return ptid_build (current_event.dwProcessId, 0, retval);
450005e7
CF
1663 else
1664 {
1665 int detach = 0;
3cee93ac 1666
98bbd631
AC
1667 if (deprecated_ui_loop_hook != NULL)
1668 detach = deprecated_ui_loop_hook (0);
0714f9bf 1669
450005e7 1670 if (detach)
7d85a9c0 1671 windows_kill_inferior (ops);
450005e7
CF
1672 }
1673 }
24e60978
SC
1674}
1675
9d3789f7 1676static void
dc05df57 1677do_initial_windows_stuff (struct target_ops *ops, DWORD pid, int attaching)
9d3789f7
CF
1678{
1679 extern int stop_after_trap;
fa4ba8da 1680 int i;
d6b48e9c 1681 struct inferior *inf;
2020b7ab 1682 struct thread_info *tp;
9d3789f7 1683
7393af7c 1684 last_sig = TARGET_SIGNAL_0;
9d3789f7
CF
1685 event_count = 0;
1686 exception_count = 0;
bf25528d 1687 open_process_used = 0;
fa4ba8da 1688 debug_registers_changed = 0;
dfe7f3ac 1689 debug_registers_used = 0;
fa4ba8da
PM
1690 for (i = 0; i < sizeof (dr) / sizeof (dr[0]); i++)
1691 dr[i] = 0;
10325bc5 1692#ifdef __CYGWIN__
de1b3c3d 1693 cygwin_load_start = cygwin_load_end = 0;
10325bc5 1694#endif
9d3789f7
CF
1695 current_event.dwProcessId = pid;
1696 memset (&current_event, 0, sizeof (current_event));
0795be10 1697 push_target (ops);
cb851954 1698 disable_breakpoints_in_shlibs ();
dc05df57 1699 windows_clear_solib ();
9d3789f7
CF
1700 clear_proceed_status ();
1701 init_wait_for_inferior ();
1702
6c95b8df
PA
1703 inf = current_inferior ();
1704 inferior_appeared (inf, pid);
181e7f93 1705 inf->attach_flag = attaching;
7f9f62ba 1706
9f9d052e
PM
1707 /* Make the new process the current inferior, so terminal handling
1708 can rely on it. When attaching, we don't know about any thread
1709 id here, but that's OK --- nothing should be referencing the
dc05df57 1710 current thread until we report an event out of windows_wait. */
9f9d052e
PM
1711 inferior_ptid = pid_to_ptid (pid);
1712
c44537cf 1713 terminal_init_inferior_with_pgrp (pid);
9d3789f7
CF
1714 target_terminal_inferior ();
1715
16d905e2 1716 windows_initialization_done = 0;
16c381f0 1717 inf->control.stop_soon = STOP_QUIETLY;
9d3789f7
CF
1718 while (1)
1719 {
1720 stop_after_trap = 1;
e4c8541f 1721 wait_for_inferior ();
2020b7ab 1722 tp = inferior_thread ();
16c381f0
JK
1723 if (tp->suspend.stop_signal != TARGET_SIGNAL_TRAP)
1724 resume (0, tp->suspend.stop_signal);
9d3789f7
CF
1725 else
1726 break;
1727 }
eff8332b 1728
16d905e2 1729 windows_initialization_done = 1;
16c381f0 1730 inf->control.stop_soon = NO_STOP_QUIETLY;
9d3789f7
CF
1731 stop_after_trap = 0;
1732 return;
1733}
1734
616a9dc4
CV
1735/* Try to set or remove a user privilege to the current process. Return -1
1736 if that fails, the previous setting of that privilege otherwise.
1737
1738 This code is copied from the Cygwin source code and rearranged to allow
1739 dynamically loading of the needed symbols from advapi32 which is only
581e13c1 1740 available on NT/2K/XP. */
616a9dc4
CV
1741static int
1742set_process_privilege (const char *privilege, BOOL enable)
1743{
616a9dc4
CV
1744 HANDLE token_hdl = NULL;
1745 LUID restore_priv;
1746 TOKEN_PRIVILEGES new_priv, orig_priv;
1747 int ret = -1;
1748 DWORD size;
1749
616a9dc4
CV
1750 if (!OpenProcessToken (GetCurrentProcess (),
1751 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
1752 &token_hdl))
1753 goto out;
1754
418c6cb3 1755 if (!LookupPrivilegeValueA (NULL, privilege, &restore_priv))
616a9dc4
CV
1756 goto out;
1757
1758 new_priv.PrivilegeCount = 1;
1759 new_priv.Privileges[0].Luid = restore_priv;
1760 new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0;
1761
1762 if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv,
295732ea 1763 sizeof orig_priv, &orig_priv, &size))
616a9dc4
CV
1764 goto out;
1765#if 0
1766 /* Disabled, otherwise every `attach' in an unprivileged user session
1767 would raise the "Failed to get SE_DEBUG_NAME privilege" warning in
581e13c1 1768 windows_attach(). */
616a9dc4 1769 /* AdjustTokenPrivileges returns TRUE even if the privilege could not
581e13c1 1770 be enabled. GetLastError () returns an correct error code, though. */
616a9dc4
CV
1771 if (enable && GetLastError () == ERROR_NOT_ALL_ASSIGNED)
1772 goto out;
1773#endif
1774
1775 ret = orig_priv.Privileges[0].Attributes == SE_PRIVILEGE_ENABLED ? 1 : 0;
1776
1777out:
1778 if (token_hdl)
1779 CloseHandle (token_hdl);
1780
1781 return ret;
1782}
1783
02cc9f49 1784/* Attach to process PID, then initialize for debugging it. */
24e60978 1785static void
dc05df57 1786windows_attach (struct target_ops *ops, char *args, int from_tty)
24e60978
SC
1787{
1788 BOOL ok;
559e75c0 1789 DWORD pid;
24e60978 1790
74164c56 1791 pid = parse_pid_to_attach (args);
24e60978 1792
616a9dc4
CV
1793 if (set_process_privilege (SE_DEBUG_NAME, TRUE) < 0)
1794 {
1795 printf_unfiltered ("Warning: Failed to get SE_DEBUG_NAME privilege\n");
581e13c1
MS
1796 printf_unfiltered ("This can cause attach to "
1797 "fail on Windows NT/2K/XP\n");
616a9dc4
CV
1798 }
1799
dc05df57 1800 windows_init_thread_list ();
9d3789f7 1801 ok = DebugActiveProcess (pid);
91a175b3 1802 saw_create = 0;
24e60978 1803
10325bc5 1804#ifdef __CYGWIN__
24e60978 1805 if (!ok)
baa93fa6 1806 {
581e13c1 1807 /* Try fall back to Cygwin pid. */
baa93fa6
CF
1808 pid = cygwin_internal (CW_CYGWIN_PID_TO_WINPID, pid);
1809
1810 if (pid > 0)
1811 ok = DebugActiveProcess (pid);
10325bc5
PA
1812 }
1813#endif
baa93fa6 1814
10325bc5
PA
1815 if (!ok)
1816 error (_("Can't attach to process."));
24e60978 1817
2b008701 1818 DebugSetProcessKillOnExit (FALSE);
3ade5333 1819
24e60978
SC
1820 if (from_tty)
1821 {
1822 char *exec_file = (char *) get_exec_file (0);
1823
1824 if (exec_file)
1825 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
39f77062 1826 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1827 else
1828 printf_unfiltered ("Attaching to %s\n",
39f77062 1829 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1830
1831 gdb_flush (gdb_stdout);
1832 }
1833
dc05df57 1834 do_initial_windows_stuff (ops, pid, 1);
9d3789f7 1835 target_terminal_ours ();
24e60978
SC
1836}
1837
24e60978 1838static void
dc05df57 1839windows_detach (struct target_ops *ops, char *args, int from_tty)
24e60978 1840{
02cc9f49
CV
1841 int detached = 1;
1842
2b008701
CF
1843 ptid_t ptid = {-1};
1844 windows_resume (ops, ptid, 0, TARGET_SIGNAL_0);
96998ce7 1845
2b008701
CF
1846 if (!DebugActiveProcessStop (current_event.dwProcessId))
1847 {
1848 error (_("Can't detach process %lu (error %lu)"),
1849 current_event.dwProcessId, GetLastError ());
1850 detached = 0;
02cc9f49 1851 }
2b008701
CF
1852 DebugSetProcessKillOnExit (FALSE);
1853
02cc9f49 1854 if (detached && from_tty)
24e60978
SC
1855 {
1856 char *exec_file = get_exec_file (0);
1857 if (exec_file == 0)
1858 exec_file = "";
02cc9f49
CV
1859 printf_unfiltered ("Detaching from program: %s, Pid %lu\n", exec_file,
1860 current_event.dwProcessId);
24e60978
SC
1861 gdb_flush (gdb_stdout);
1862 }
7f9f62ba 1863
39f77062 1864 inferior_ptid = null_ptid;
7f9f62ba
PA
1865 detach_inferior (current_event.dwProcessId);
1866
0795be10 1867 unpush_target (ops);
24e60978
SC
1868}
1869
3ee6f623 1870static char *
dc05df57 1871windows_pid_to_exec_file (int pid)
47216e51 1872{
b3c613f2 1873 static char path[__PMAX];
10325bc5 1874#ifdef __CYGWIN__
581e13c1 1875 /* Try to find exe name as symlink target of /proc/<pid>/exe. */
33605d39
CF
1876 int nchars;
1877 char procexe[sizeof ("/proc/4294967295/exe")];
2dc38344 1878 sprintf (procexe, "/proc/%u/exe", pid);
33605d39
CF
1879 nchars = readlink (procexe, path, sizeof(path));
1880 if (nchars > 0 && nchars < sizeof (path))
47216e51 1881 {
33605d39
CF
1882 path[nchars] = '\0'; /* Got it */
1883 return path;
47216e51 1884 }
10325bc5
PA
1885#endif
1886
33605d39 1887 /* If we get here then either Cygwin is hosed, this isn't a Cygwin version
581e13c1 1888 of gdb, or we're trying to debug a non-Cygwin windows executable. */
33605d39
CF
1889 if (!get_module_name (0, path))
1890 path[0] = '\0';
1891
1892 return path;
47216e51
CV
1893}
1894
24e60978
SC
1895/* Print status information about what we're accessing. */
1896
1897static void
dc05df57 1898windows_files_info (struct target_ops *ignore)
24e60978 1899{
181e7f93
PA
1900 struct inferior *inf = current_inferior ();
1901
24e60978 1902 printf_unfiltered ("\tUsing the running image of %s %s.\n",
181e7f93
PA
1903 inf->attach_flag ? "attached" : "child",
1904 target_pid_to_str (inferior_ptid));
24e60978
SC
1905}
1906
24e60978 1907static void
dc05df57 1908windows_open (char *arg, int from_tty)
24e60978 1909{
8a3fe4f8 1910 error (_("Use the \"run\" command to start a Unix child process."));
24e60978
SC
1911}
1912
cd44747c
PM
1913/* Modify CreateProcess parameters for use of a new separate console.
1914 Parameters are:
1915 *FLAGS: DWORD parameter for general process creation flags.
1916 *SI: STARTUPINFO structure, for which the console window size and
1917 console buffer size is filled in if GDB is running in a console.
1918 to create the new console.
1919 The size of the used font is not available on all versions of
1920 Windows OS. Furthermore, the current font might not be the default
1921 font, but this is still better than before.
1922 If the windows and buffer sizes are computed,
1923 SI->DWFLAGS is changed so that this information is used
1924 by CreateProcess function. */
1925
1926static void
1927windows_set_console_info (STARTUPINFO *si, DWORD *flags)
1928{
1929 HANDLE hconsole = CreateFile ("CONOUT$", GENERIC_READ | GENERIC_WRITE,
1930 FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, 0);
1931
1932 if (hconsole != INVALID_HANDLE_VALUE)
1933 {
1934 CONSOLE_SCREEN_BUFFER_INFO sbinfo;
1935 COORD font_size;
1936 CONSOLE_FONT_INFO cfi;
1937
1938 GetCurrentConsoleFont (hconsole, FALSE, &cfi);
1939 font_size = GetConsoleFontSize (hconsole, cfi.nFont);
1940 GetConsoleScreenBufferInfo(hconsole, &sbinfo);
1941 si->dwXSize = sbinfo.srWindow.Right - sbinfo.srWindow.Left + 1;
1942 si->dwYSize = sbinfo.srWindow.Bottom - sbinfo.srWindow.Top + 1;
1943 if (font_size.X)
1944 si->dwXSize *= font_size.X;
1945 else
1946 si->dwXSize *= 8;
1947 if (font_size.Y)
1948 si->dwYSize *= font_size.Y;
1949 else
1950 si->dwYSize *= 12;
1951 si->dwXCountChars = sbinfo.dwSize.X;
1952 si->dwYCountChars = sbinfo.dwSize.Y;
1953 si->dwFlags |= STARTF_USESIZE | STARTF_USECOUNTCHARS;
1954 }
1955 *flags |= CREATE_NEW_CONSOLE;
1956}
1957
c93dbcba
EZ
1958#ifndef __CYGWIN__
1959/* Function called by qsort to sort environment strings. */
1960
1961static int
1962envvar_cmp (const void *a, const void *b)
1963{
1964 const char **p = (const char **) a;
1965 const char **q = (const char **) b;
1966 return strcasecmp (*p, *q);
1967}
1968#endif
1969
b7ff339d
CV
1970#ifdef __CYGWIN__
1971static void
1972clear_win32_environment (char **env)
1973{
1974 int i;
1975 size_t len;
1976 wchar_t *copy = NULL, *equalpos;
1977
1978 for (i = 0; env[i] && *env[i]; i++)
1979 {
1980 len = mbstowcs (NULL, env[i], 0) + 1;
1981 copy = (wchar_t *) xrealloc (copy, len * sizeof (wchar_t));
1982 mbstowcs (copy, env[i], len);
1983 equalpos = wcschr (copy, L'=');
1984 if (equalpos)
1985 *equalpos = L'\0';
1986 SetEnvironmentVariableW (copy, NULL);
1987 }
1988 xfree (copy);
1989}
1990#endif
1991
dc05df57 1992/* Start an inferior windows child process and sets inferior_ptid to its pid.
24e60978
SC
1993 EXEC_FILE is the file to run.
1994 ALLARGS is a string containing the arguments to the program.
1995 ENV is the environment vector to pass. Errors reported with error(). */
1996
24e60978 1997static void
dc05df57 1998windows_create_inferior (struct target_ops *ops, char *exec_file,
136d6dae 1999 char *allargs, char **in_env, int from_tty)
24e60978 2000{
b3c613f2 2001 STARTUPINFO si;
41b4aadc 2002#ifdef __CYGWIN__
b3c613f2
CF
2003 cygwin_buf_t real_path[__PMAX];
2004 cygwin_buf_t shell[__PMAX]; /* Path to shell */
d0d0ab16 2005 const char *sh;
b3c613f2
CF
2006 cygwin_buf_t *toexec;
2007 cygwin_buf_t *cygallargs;
2008 cygwin_buf_t *args;
b7ff339d
CV
2009 char **old_env = NULL;
2010 PWCHAR w32_env;
d0d0ab16 2011 size_t len;
2becadee
CF
2012 int tty;
2013 int ostdin, ostdout, ostderr;
41b4aadc 2014#else
b3c613f2
CF
2015 char real_path[__PMAX];
2016 char shell[__PMAX]; /* Path to shell */
d0d0ab16
CV
2017 char *toexec;
2018 char *args;
41b4aadc 2019 HANDLE tty;
c93dbcba
EZ
2020 char *w32env;
2021 char *temp;
2022 size_t envlen;
2023 int i;
2024 size_t envsize;
2025 char **env;
41b4aadc 2026#endif
d0d0ab16
CV
2027 PROCESS_INFORMATION pi;
2028 BOOL ret;
2029 DWORD flags = 0;
3cb3b8df 2030 const char *inferior_io_terminal = get_inferior_io_terminal ();
24e60978
SC
2031
2032 if (!exec_file)
8a3fe4f8 2033 error (_("No executable specified, use `target exec'."));
24e60978
SC
2034
2035 memset (&si, 0, sizeof (si));
2036 si.cb = sizeof (si);
2037
d0d0ab16
CV
2038 if (new_group)
2039 flags |= CREATE_NEW_PROCESS_GROUP;
2040
2041 if (new_console)
cd44747c 2042 windows_set_console_info (&si, &flags);
d0d0ab16 2043
10325bc5 2044#ifdef __CYGWIN__
349b409f 2045 if (!useshell)
dfe7f3ac 2046 {
d0d0ab16
CV
2047 flags |= DEBUG_ONLY_THIS_PROCESS;
2048 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, exec_file, real_path,
b3c613f2 2049 __PMAX * sizeof (cygwin_buf_t)) < 0)
d0d0ab16 2050 error (_("Error starting executable: %d"), errno);
dfe7f3ac 2051 toexec = real_path;
b3c613f2 2052#ifdef __USEWIDE
d0d0ab16
CV
2053 len = mbstowcs (NULL, allargs, 0) + 1;
2054 if (len == (size_t) -1)
2055 error (_("Error starting executable: %d"), errno);
2056 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2057 mbstowcs (cygallargs, allargs, len);
60c5c021
CF
2058#else
2059 cygallargs = allargs;
b3c613f2 2060#endif
dfe7f3ac
CF
2061 }
2062 else
2063 {
349b409f
CF
2064 sh = getenv ("SHELL");
2065 if (!sh)
2066 sh = "/bin/sh";
b3c613f2 2067 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, sh, shell, __PMAX) < 0)
d0d0ab16 2068 error (_("Error starting executable via shell: %d"), errno);
b3c613f2 2069#ifdef __USEWIDE
d0d0ab16
CV
2070 len = sizeof (L" -c 'exec '") + mbstowcs (NULL, exec_file, 0)
2071 + mbstowcs (NULL, allargs, 0) + 2;
2072 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2073 swprintf (cygallargs, len, L" -c 'exec %s %s'", exec_file, allargs);
b3c613f2 2074#else
581e13c1
MS
2075 cygallargs = (char *)
2076 alloca (sizeof (" -c 'exec '") + strlen (exec_file)
b3c613f2
CF
2077 + strlen (allargs) + 2);
2078 sprintf (cygallargs, " -c 'exec %s %s'", exec_file, allargs);
2079#endif
dfe7f3ac 2080 toexec = shell;
d0d0ab16 2081 flags |= DEBUG_PROCESS;
dfe7f3ac 2082 }
b3c613f2
CF
2083
2084#ifdef __USEWIDE
2085 args = (cygwin_buf_t *) alloca ((wcslen (toexec) + wcslen (cygallargs) + 2)
2086 * sizeof (wchar_t));
d0d0ab16
CV
2087 wcscpy (args, toexec);
2088 wcscat (args, L" ");
2089 wcscat (args, cygallargs);
b3c613f2
CF
2090#else
2091 args = (cygwin_buf_t *) alloca (strlen (toexec) + strlen (cygallargs) + 2);
2092 strcpy (args, toexec);
2093 strcat (args, " ");
2094 strcat (args, cygallargs);
2095#endif
2096
b7ff339d
CV
2097#ifdef CW_CVT_ENV_TO_WINENV
2098 /* First try to create a direct Win32 copy of the POSIX environment. */
2099 w32_env = (PWCHAR) cygwin_internal (CW_CVT_ENV_TO_WINENV, in_env);
2100 if (w32_env != (PWCHAR) -1)
2101 flags |= CREATE_UNICODE_ENVIRONMENT;
2102 else
2103 /* If that fails, fall back to old method tweaking GDB's environment. */
2104#endif
2105 {
2106 /* Reset all Win32 environment variables to avoid leftover on next run. */
2107 clear_win32_environment (environ);
2108 /* Prepare the environment vars for CreateProcess. */
2109 old_env = environ;
2110 environ = in_env;
2111 cygwin_internal (CW_SYNC_WINENV);
2112 w32_env = NULL;
2113 }
1750a5ef 2114
2becadee
CF
2115 if (!inferior_io_terminal)
2116 tty = ostdin = ostdout = ostderr = -1;
2117 else
2118 {
2119 tty = open (inferior_io_terminal, O_RDWR | O_NOCTTY);
2120 if (tty < 0)
2121 {
2122 print_sys_errmsg (inferior_io_terminal, errno);
2123 ostdin = ostdout = ostderr = -1;
2124 }
2125 else
2126 {
2127 ostdin = dup (0);
2128 ostdout = dup (1);
2129 ostderr = dup (2);
2130 dup2 (tty, 0);
2131 dup2 (tty, 1);
2132 dup2 (tty, 2);
2133 }
2134 }
d0d0ab16
CV
2135
2136 windows_init_thread_list ();
b3c613f2
CF
2137 ret = CreateProcess (0,
2138 args, /* command line */
2139 NULL, /* Security */
2140 NULL, /* thread */
2141 TRUE, /* inherit handles */
2142 flags, /* start flags */
b7ff339d 2143 w32_env, /* environment */
b3c613f2
CF
2144 NULL, /* current directory */
2145 &si,
2146 &pi);
b7ff339d
CV
2147 if (w32_env)
2148 /* Just free the Win32 environment, if it could be created. */
2149 free (w32_env);
2150 else
2151 {
2152 /* Reset all environment variables to avoid leftover on next run. */
2153 clear_win32_environment (in_env);
2154 /* Restore normal GDB environment variables. */
2155 environ = old_env;
2156 cygwin_internal (CW_SYNC_WINENV);
2157 }
2158
d0d0ab16
CV
2159 if (tty >= 0)
2160 {
2161 close (tty);
2162 dup2 (ostdin, 0);
2163 dup2 (ostdout, 1);
2164 dup2 (ostderr, 2);
2165 close (ostdin);
2166 close (ostdout);
2167 close (ostderr);
2168 }
41b4aadc 2169#else
b3c613f2 2170 toexec = exec_file;
d0d0ab16
CV
2171 args = alloca (strlen (toexec) + strlen (allargs) + 2);
2172 strcpy (args, toexec);
2173 strcat (args, " ");
2174 strcat (args, allargs);
2175
d0d0ab16
CV
2176 flags |= DEBUG_ONLY_THIS_PROCESS;
2177
41b4aadc
CF
2178 if (!inferior_io_terminal)
2179 tty = INVALID_HANDLE_VALUE;
2180 else
2181 {
2182 SECURITY_ATTRIBUTES sa;
2183 sa.nLength = sizeof(sa);
2184 sa.lpSecurityDescriptor = 0;
2185 sa.bInheritHandle = TRUE;
2186 tty = CreateFileA (inferior_io_terminal, GENERIC_READ | GENERIC_WRITE,
2187 0, &sa, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
2188 if (tty == INVALID_HANDLE_VALUE)
2189 warning (_("Warning: Failed to open TTY %s, error %#x."),
2190 inferior_io_terminal, (unsigned) GetLastError ());
2191 else
2192 {
2193 si.hStdInput = tty;
2194 si.hStdOutput = tty;
2195 si.hStdError = tty;
2196 si.dwFlags |= STARTF_USESTDHANDLES;
2197 }
2198 }
2becadee 2199
c93dbcba
EZ
2200 /* CreateProcess takes the environment list as a null terminated set of
2201 strings (i.e. two nulls terminate the list). */
2202
2203 /* Get total size for env strings. */
2204 for (envlen = 0, i = 0; in_env[i] && *in_env[i]; i++)
2205 envlen += strlen (in_env[i]) + 1;
2206
2207 envsize = sizeof (in_env[0]) * (i + 1);
2208 env = (char **) alloca (envsize);
2209 memcpy (env, in_env, envsize);
2210 /* Windows programs expect the environment block to be sorted. */
2211 qsort (env, i, sizeof (char *), envvar_cmp);
2212
2213 w32env = alloca (envlen + 1);
2214
2215 /* Copy env strings into new buffer. */
2216 for (temp = w32env, i = 0; env[i] && *env[i]; i++)
2217 {
2218 strcpy (temp, env[i]);
2219 temp += strlen (temp) + 1;
2220 }
2221
2222 /* Final nil string to terminate new env. */
2223 *temp = 0;
2224
dc05df57 2225 windows_init_thread_list ();
d0d0ab16
CV
2226 ret = CreateProcessA (0,
2227 args, /* command line */
2228 NULL, /* Security */
2229 NULL, /* thread */
2230 TRUE, /* inherit handles */
2231 flags, /* start flags */
c93dbcba 2232 w32env, /* environment */
d0d0ab16
CV
2233 NULL, /* current directory */
2234 &si,
2235 &pi);
41b4aadc
CF
2236 if (tty != INVALID_HANDLE_VALUE)
2237 CloseHandle (tty);
10325bc5 2238#endif
2becadee 2239
24e60978 2240 if (!ret)
8a3fe4f8
AC
2241 error (_("Error creating process %s, (error %d)."),
2242 exec_file, (unsigned) GetLastError ());
24e60978 2243
c1766e7d
PM
2244 CloseHandle (pi.hThread);
2245 CloseHandle (pi.hProcess);
2246
dfe7f3ac
CF
2247 if (useshell && shell[0] != '\0')
2248 saw_create = -1;
2249 else
2250 saw_create = 0;
2251
dc05df57 2252 do_initial_windows_stuff (ops, pi.dwProcessId, 0);
d3a09475 2253
dc05df57 2254 /* windows_continue (DBG_CONTINUE, -1); */
24e60978
SC
2255}
2256
2257static void
dc05df57 2258windows_mourn_inferior (struct target_ops *ops)
24e60978 2259{
dc05df57 2260 (void) windows_continue (DBG_CONTINUE, -1);
fa4ba8da 2261 i386_cleanup_dregs();
bf25528d
CF
2262 if (open_process_used)
2263 {
2264 CHECK (CloseHandle (current_process_handle));
2265 open_process_used = 0;
2266 }
0795be10 2267 unpush_target (ops);
24e60978
SC
2268 generic_mourn_inferior ();
2269}
2270
24e60978 2271/* Send a SIGINT to the process group. This acts just like the user typed a
581e13c1 2272 ^C on the controlling terminal. */
24e60978 2273
b607efe7 2274static void
dc05df57 2275windows_stop (ptid_t ptid)
24e60978 2276{
1ef980b9 2277 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
1e37c281 2278 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
3a4b77d8 2279 registers_changed (); /* refresh register state */
24e60978
SC
2280}
2281
3ee6f623 2282static int
dc05df57 2283windows_xfer_memory (CORE_ADDR memaddr, gdb_byte *our, int len,
0a65a603
AC
2284 int write, struct mem_attrib *mem,
2285 struct target_ops *target)
24e60978 2286{
5732a500 2287 SIZE_T done = 0;
24e60978
SC
2288 if (write)
2289 {
29fe111d 2290 DEBUG_MEM (("gdb: write target memory, %d bytes at 0x%08lx\n",
2c647436 2291 len, (DWORD) (uintptr_t) memaddr));
2b008701 2292 if (!WriteProcessMemory (current_process_handle,
2c647436 2293 (LPVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2294 len, &done))
2295 done = 0;
2b008701 2296 FlushInstructionCache (current_process_handle,
2c647436 2297 (LPCVOID) (uintptr_t) memaddr, len);
24e60978
SC
2298 }
2299 else
2300 {
29fe111d 2301 DEBUG_MEM (("gdb: read target memory, %d bytes at 0x%08lx\n",
2c647436 2302 len, (DWORD) (uintptr_t) memaddr));
2b008701 2303 if (!ReadProcessMemory (current_process_handle,
2c647436 2304 (LPCVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2305 len, &done))
2306 done = 0;
24e60978
SC
2307 }
2308 return done;
2309}
2310
3ee6f623 2311static void
7d85a9c0 2312windows_kill_inferior (struct target_ops *ops)
24e60978 2313{
3cee93ac
CF
2314 CHECK (TerminateProcess (current_process_handle, 0));
2315
b5edcb45
ILT
2316 for (;;)
2317 {
dc05df57 2318 if (!windows_continue (DBG_CONTINUE, -1))
b5edcb45 2319 break;
3cee93ac 2320 if (!WaitForDebugEvent (&current_event, INFINITE))
b5edcb45 2321 break;
3cee93ac 2322 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
b5edcb45
ILT
2323 break;
2324 }
2325
581e13c1 2326 target_mourn_inferior (); /* Or just windows_mourn_inferior? */
24e60978
SC
2327}
2328
24e60978 2329static void
dc05df57 2330windows_prepare_to_store (struct regcache *regcache)
24e60978 2331{
581e13c1 2332 /* Do nothing, since we can store individual regs. */
24e60978
SC
2333}
2334
2335static int
dc05df57 2336windows_can_run (void)
24e60978
SC
2337{
2338 return 1;
2339}
2340
2341static void
dc05df57 2342windows_close (int x)
24e60978 2343{
dc05df57 2344 DEBUG_EVENTS (("gdb: windows_close, inferior_ptid=%d\n",
3bccec63 2345 PIDGET (inferior_ptid)));
24e60978 2346}
1ef980b9 2347
581e13c1 2348/* Convert pid to printable format. */
3ee6f623 2349static char *
117de6a9 2350windows_pid_to_str (struct target_ops *ops, ptid_t ptid)
24e60978 2351{
3ee6f623 2352 static char buf[80];
3ee6f623 2353
2dc38344
PA
2354 if (ptid_get_tid (ptid) != 0)
2355 {
2356 snprintf (buf, sizeof (buf), "Thread %d.0x%lx",
2357 ptid_get_pid (ptid), ptid_get_tid (ptid));
2358 return buf;
2359 }
2360
2361 return normal_pid_to_str (ptid);
3ee6f623
CF
2362}
2363
de1b3c3d 2364static LONGEST
dc05df57 2365windows_xfer_shared_libraries (struct target_ops *ops,
de1b3c3d
PA
2366 enum target_object object, const char *annex,
2367 gdb_byte *readbuf, const gdb_byte *writebuf,
2368 ULONGEST offset, LONGEST len)
3cb8e7f6 2369{
de1b3c3d
PA
2370 struct obstack obstack;
2371 const char *buf;
2372 LONGEST len_avail;
3cb8e7f6 2373 struct so_list *so;
3cb8e7f6 2374
de1b3c3d
PA
2375 if (writebuf)
2376 return -1;
3cb8e7f6 2377
de1b3c3d
PA
2378 obstack_init (&obstack);
2379 obstack_grow_str (&obstack, "<library-list>\n");
2380 for (so = solib_start.next; so; so = so->next)
581e13c1
MS
2381 windows_xfer_shared_library (so->so_name, (CORE_ADDR)
2382 (uintptr_t) so->lm_info->load_addr,
5af949e3 2383 target_gdbarch, &obstack);
de1b3c3d 2384 obstack_grow_str0 (&obstack, "</library-list>\n");
3cb8e7f6 2385
de1b3c3d
PA
2386 buf = obstack_finish (&obstack);
2387 len_avail = strlen (buf);
2388 if (offset >= len_avail)
2389 return 0;
3cb8e7f6 2390
de1b3c3d
PA
2391 if (len > len_avail - offset)
2392 len = len_avail - offset;
2393 memcpy (readbuf, buf + offset, len);
3cb8e7f6 2394
de1b3c3d
PA
2395 obstack_free (&obstack, NULL);
2396 return len;
3cb8e7f6
CF
2397}
2398
de1b3c3d 2399static LONGEST
dc05df57 2400windows_xfer_partial (struct target_ops *ops, enum target_object object,
de1b3c3d
PA
2401 const char *annex, gdb_byte *readbuf,
2402 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
3cb8e7f6 2403{
de1b3c3d 2404 switch (object)
3cb8e7f6 2405 {
de1b3c3d
PA
2406 case TARGET_OBJECT_MEMORY:
2407 if (readbuf)
2408 return (*ops->deprecated_xfer_memory) (offset, readbuf,
244e85c8 2409 len, 0/*read*/, NULL, ops);
de1b3c3d
PA
2410 if (writebuf)
2411 return (*ops->deprecated_xfer_memory) (offset, (gdb_byte *) writebuf,
2412 len, 1/*write*/, NULL, ops);
2413 return -1;
2414
2415 case TARGET_OBJECT_LIBRARIES:
dc05df57 2416 return windows_xfer_shared_libraries (ops, object, annex, readbuf,
de1b3c3d 2417 writebuf, offset, len);
3929abe9 2418
de1b3c3d
PA
2419 default:
2420 if (ops->beneath != NULL)
2421 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
2422 readbuf, writebuf, offset, len);
2423 return -1;
3929abe9 2424 }
02c5aecd
CF
2425}
2426
711e434b
PM
2427/* Provide thread local base, i.e. Thread Information Block address.
2428 Returns 1 if ptid is found and sets *ADDR to thread_local_base. */
2429
2430static int
2431windows_get_tib_address (ptid_t ptid, CORE_ADDR *addr)
2432{
2433 thread_info *th;
2434
2435 th = thread_rec (ptid_get_tid (ptid), 0);
2436 if (th == NULL)
2437 return 0;
2438
2439 if (addr != NULL)
2440 *addr = th->thread_local_base;
2441
2442 return 1;
2443}
2444
1e2f1c5c
JB
2445static ptid_t
2446windows_get_ada_task_ptid (long lwp, long thread)
2447{
2448 return ptid_build (ptid_get_pid (inferior_ptid), 0, lwp);
2449}
2450
3ee6f623 2451static void
dc05df57 2452init_windows_ops (void)
3ee6f623 2453{
dc05df57
CF
2454 windows_ops.to_shortname = "child";
2455 windows_ops.to_longname = "Win32 child process";
2456 windows_ops.to_doc = "Win32 child process (started by the \"run\" command).";
2457 windows_ops.to_open = windows_open;
2458 windows_ops.to_close = windows_close;
2459 windows_ops.to_attach = windows_attach;
2460 windows_ops.to_attach_no_wait = 1;
2461 windows_ops.to_detach = windows_detach;
2462 windows_ops.to_resume = windows_resume;
2463 windows_ops.to_wait = windows_wait;
2464 windows_ops.to_fetch_registers = windows_fetch_inferior_registers;
2465 windows_ops.to_store_registers = windows_store_inferior_registers;
2466 windows_ops.to_prepare_to_store = windows_prepare_to_store;
2467 windows_ops.deprecated_xfer_memory = windows_xfer_memory;
2468 windows_ops.to_xfer_partial = windows_xfer_partial;
2469 windows_ops.to_files_info = windows_files_info;
2470 windows_ops.to_insert_breakpoint = memory_insert_breakpoint;
2471 windows_ops.to_remove_breakpoint = memory_remove_breakpoint;
2472 windows_ops.to_terminal_init = terminal_init_inferior;
2473 windows_ops.to_terminal_inferior = terminal_inferior;
2474 windows_ops.to_terminal_ours_for_output = terminal_ours_for_output;
2475 windows_ops.to_terminal_ours = terminal_ours;
2476 windows_ops.to_terminal_save_ours = terminal_save_ours;
2477 windows_ops.to_terminal_info = child_terminal_info;
2478 windows_ops.to_kill = windows_kill_inferior;
2479 windows_ops.to_create_inferior = windows_create_inferior;
2480 windows_ops.to_mourn_inferior = windows_mourn_inferior;
2481 windows_ops.to_can_run = windows_can_run;
2482 windows_ops.to_thread_alive = windows_thread_alive;
2483 windows_ops.to_pid_to_str = windows_pid_to_str;
2484 windows_ops.to_stop = windows_stop;
2485 windows_ops.to_stratum = process_stratum;
c35b1492
PA
2486 windows_ops.to_has_all_memory = default_child_has_all_memory;
2487 windows_ops.to_has_memory = default_child_has_memory;
2488 windows_ops.to_has_stack = default_child_has_stack;
2489 windows_ops.to_has_registers = default_child_has_registers;
2490 windows_ops.to_has_execution = default_child_has_execution;
dc05df57 2491 windows_ops.to_pid_to_exec_file = windows_pid_to_exec_file;
1e2f1c5c 2492 windows_ops.to_get_ada_task_ptid = windows_get_ada_task_ptid;
711e434b 2493 windows_ops.to_get_tib_address = windows_get_tib_address;
9bb9e8ad 2494
5aca5a82
PM
2495 i386_use_watchpoints (&windows_ops);
2496
9bb9e8ad
PM
2497 i386_dr_low.set_control = cygwin_set_dr7;
2498 i386_dr_low.set_addr = cygwin_set_dr;
7b50312a 2499 i386_dr_low.get_addr = cygwin_get_dr;
9bb9e8ad 2500 i386_dr_low.get_status = cygwin_get_dr6;
7b50312a 2501 i386_dr_low.get_control = cygwin_get_dr7;
9bb9e8ad
PM
2502
2503 /* i386_dr_low.debug_register_length field is set by
2504 calling i386_set_debug_register_length function
2505 in processor windows specific native file. */
2506
dc05df57 2507 windows_ops.to_magic = OPS_MAGIC;
c719b714 2508}
24e60978 2509
3929abe9 2510static void
dc05df57 2511set_windows_aliases (char *argv0)
3929abe9
CF
2512{
2513 add_info_alias ("dll", "sharedlibrary", 1);
2514}
2515
24e60978 2516void
dc05df57 2517_initialize_windows_nat (void)
24e60978 2518{
fa58ee11
EZ
2519 struct cmd_list_element *c;
2520
dc05df57 2521 init_windows_ops ();
1ef980b9 2522
d0d0ab16
CV
2523#ifdef __CYGWIN__
2524 cygwin_internal (CW_SET_DOS_FILE_WARNING, 0);
2525#endif
2526
fa58ee11 2527 c = add_com ("dll-symbols", class_files, dll_symbol_command,
1bedd215 2528 _("Load dll library symbols from FILE."));
5ba2abeb 2529 set_cmd_completer (c, filename_completer);
450005e7
CF
2530
2531 add_com_alias ("sharedlibrary", "dll-symbols", class_alias, 1);
2532
70992597
PM
2533 add_com_alias ("add-shared-symbol-files", "dll-symbols", class_alias, 1);
2534
2535 add_com_alias ("assf", "dll-symbols", class_alias, 1);
2536
10325bc5 2537#ifdef __CYGWIN__
5bf193a2
AC
2538 add_setshow_boolean_cmd ("shell", class_support, &useshell, _("\
2539Set use of shell to start subprocess."), _("\
2540Show use of shell to start subprocess."), NULL,
2541 NULL,
2542 NULL, /* FIXME: i18n: */
2543 &setlist, &showlist);
2544
581e13c1
MS
2545 add_setshow_boolean_cmd ("cygwin-exceptions", class_support,
2546 &cygwin_exceptions, _("\
09280ddf
CF
2547Break when an exception is detected in the Cygwin DLL itself."), _("\
2548Show whether gdb breaks on exceptions in the Cygwin DLL itself."), NULL,
2549 NULL,
2550 NULL, /* FIXME: i18n: */
2551 &setlist, &showlist);
10325bc5 2552#endif
09280ddf 2553
5bf193a2
AC
2554 add_setshow_boolean_cmd ("new-console", class_support, &new_console, _("\
2555Set creation of new console when creating child process."), _("\
2556Show creation of new console when creating child process."), NULL,
2557 NULL,
2558 NULL, /* FIXME: i18n: */
2559 &setlist, &showlist);
2560
2561 add_setshow_boolean_cmd ("new-group", class_support, &new_group, _("\
2562Set creation of new group when creating child process."), _("\
2563Show creation of new group when creating child process."), NULL,
2564 NULL,
2565 NULL, /* FIXME: i18n: */
2566 &setlist, &showlist);
2567
2568 add_setshow_boolean_cmd ("debugexec", class_support, &debug_exec, _("\
2569Set whether to display execution in child process."), _("\
2570Show whether to display execution in child process."), NULL,
2571 NULL,
2572 NULL, /* FIXME: i18n: */
2573 &setlist, &showlist);
2574
2575 add_setshow_boolean_cmd ("debugevents", class_support, &debug_events, _("\
2576Set whether to display kernel events in child process."), _("\
2577Show whether to display kernel events in child process."), NULL,
2578 NULL,
2579 NULL, /* FIXME: i18n: */
2580 &setlist, &showlist);
2581
2582 add_setshow_boolean_cmd ("debugmemory", class_support, &debug_memory, _("\
2583Set whether to display memory accesses in child process."), _("\
2584Show whether to display memory accesses in child process."), NULL,
2585 NULL,
2586 NULL, /* FIXME: i18n: */
2587 &setlist, &showlist);
2588
2589 add_setshow_boolean_cmd ("debugexceptions", class_support,
2590 &debug_exceptions, _("\
2591Set whether to display kernel exceptions in child process."), _("\
2592Show whether to display kernel exceptions in child process."), NULL,
2593 NULL,
2594 NULL, /* FIXME: i18n: */
2595 &setlist, &showlist);
1ef980b9 2596
711e434b 2597 init_w32_command_list ();
c1748f97
PM
2598
2599 add_cmd ("selector", class_info, display_selectors,
1a966eab 2600 _("Display selectors infos."),
c1748f97 2601 &info_w32_cmdlist);
dc05df57
CF
2602 add_target (&windows_ops);
2603 deprecated_init_ui_hook = set_windows_aliases;
24e60978 2604}
3cee93ac 2605
fa4ba8da
PM
2606/* Hardware watchpoint support, adapted from go32-nat.c code. */
2607
2608/* Pass the address ADDR to the inferior in the I'th debug register.
2609 Here we just store the address in dr array, the registers will be
dc05df57 2610 actually set up when windows_continue is called. */
9bb9e8ad 2611static void
fa4ba8da
PM
2612cygwin_set_dr (int i, CORE_ADDR addr)
2613{
2614 if (i < 0 || i > 3)
2615 internal_error (__FILE__, __LINE__,
e2e0b3e5 2616 _("Invalid register %d in cygwin_set_dr.\n"), i);
41b4aadc 2617 dr[i] = addr;
fa4ba8da
PM
2618 debug_registers_changed = 1;
2619 debug_registers_used = 1;
2620}
2621
2622/* Pass the value VAL to the inferior in the DR7 debug control
2623 register. Here we just store the address in D_REGS, the watchpoint
dc05df57 2624 will be actually set up in windows_wait. */
9bb9e8ad
PM
2625static void
2626cygwin_set_dr7 (unsigned long val)
fa4ba8da 2627{
9bb9e8ad 2628 dr[7] = (CORE_ADDR) val;
fa4ba8da
PM
2629 debug_registers_changed = 1;
2630 debug_registers_used = 1;
2631}
2632
7b50312a
PA
2633/* Get the value of debug register I from the inferior. */
2634
2635static CORE_ADDR
2636cygwin_get_dr (int i)
2637{
2638 return dr[i];
2639}
2640
fa4ba8da
PM
2641/* Get the value of the DR6 debug status register from the inferior.
2642 Here we just return the value stored in dr[6]
2643 by the last call to thread_rec for current_event.dwThreadId id. */
9bb9e8ad 2644static unsigned long
fa4ba8da
PM
2645cygwin_get_dr6 (void)
2646{
9bb9e8ad 2647 return (unsigned long) dr[6];
fa4ba8da
PM
2648}
2649
7b50312a
PA
2650/* Get the value of the DR7 debug status register from the inferior.
2651 Here we just return the value stored in dr[7] by the last call to
2652 thread_rec for current_event.dwThreadId id. */
2653
2654static unsigned long
2655cygwin_get_dr7 (void)
2656{
2657 return (unsigned long) dr[7];
2658}
2659
2dc38344 2660/* Determine if the thread referenced by "ptid" is alive
3cee93ac 2661 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
581e13c1 2662 it means that the thread has died. Otherwise it is assumed to be alive. */
3cee93ac 2663static int
28439f5e 2664windows_thread_alive (struct target_ops *ops, ptid_t ptid)
3cee93ac 2665{
2dc38344
PA
2666 int tid;
2667
2668 gdb_assert (ptid_get_tid (ptid) != 0);
2669 tid = ptid_get_tid (ptid);
39f77062 2670
581e13c1
MS
2671 return WaitForSingleObject (thread_rec (tid, FALSE)->h, 0) == WAIT_OBJECT_0
2672 ? FALSE : TRUE;
3cee93ac
CF
2673}
2674
2a3d5645
CF
2675void
2676_initialize_check_for_gdb_ini (void)
2677{
2678 char *homedir;
2679 if (inhibit_gdbinit)
2680 return;
2681
2682 homedir = getenv ("HOME");
2683 if (homedir)
2684 {
2685 char *p;
2686 char *oldini = (char *) alloca (strlen (homedir) +
2687 sizeof ("/gdb.ini"));
2688 strcpy (oldini, homedir);
2689 p = strchr (oldini, '\0');
0ba1096a 2690 if (p > oldini && !IS_DIR_SEPARATOR (p[-1]))
2a3d5645
CF
2691 *p++ = '/';
2692 strcpy (p, "gdb.ini");
2693 if (access (oldini, 0) == 0)
2694 {
2695 int len = strlen (oldini);
2696 char *newini = alloca (len + 1);
dfe7f3ac 2697 sprintf (newini, "%.*s.gdbinit",
58fa08f0 2698 (int) (len - (sizeof ("gdb.ini") - 1)), oldini);
8a3fe4f8 2699 warning (_("obsolete '%s' found. Rename to '%s'."), oldini, newini);
2a3d5645
CF
2700 }
2701 }
2702}
33605d39 2703
2b008701 2704/* Define dummy functions which always return error for the rare cases where
581e13c1 2705 these functions could not be found. */
2b008701
CF
2706static BOOL WINAPI
2707bad_DebugActiveProcessStop (DWORD w)
2708{
2709 return FALSE;
2710}
2711static BOOL WINAPI
2712bad_DebugBreakProcess (HANDLE w)
2713{
2714 return FALSE;
2715}
2716static BOOL WINAPI
2717bad_DebugSetProcessKillOnExit (BOOL w)
2718{
2719 return FALSE;
2720}
2721static BOOL WINAPI
2722bad_EnumProcessModules (HANDLE w, HMODULE *x, DWORD y, LPDWORD z)
2723{
2724 return FALSE;
2725}
b3c613f2
CF
2726
2727#ifdef __USEWIDE
2b008701 2728static DWORD WINAPI
b3c613f2 2729bad_GetModuleFileNameExW (HANDLE w, HMODULE x, LPWSTR y, DWORD z)
2b008701
CF
2730{
2731 return 0;
2732}
d0d0ab16
CV
2733#else
2734static DWORD WINAPI
b3c613f2 2735bad_GetModuleFileNameExA (HANDLE w, HMODULE x, LPSTR y, DWORD z)
d0d0ab16
CV
2736{
2737 return 0;
2738}
2739#endif
b3c613f2 2740
2b008701
CF
2741static BOOL WINAPI
2742bad_GetModuleInformation (HANDLE w, HMODULE x, LPMODULEINFO y, DWORD z)
2743{
2744 return FALSE;
2745}
2746
418c6cb3
CF
2747static BOOL WINAPI
2748bad_OpenProcessToken (HANDLE w, DWORD x, PHANDLE y)
2749{
2750 return FALSE;
2751}
2752
cd44747c
PM
2753static BOOL WINAPI
2754bad_GetCurrentConsoleFont (HANDLE w, BOOL bMaxWindow, CONSOLE_FONT_INFO *f)
2755{
2756 f->nFont = 0;
2757 return 1;
2758}
2759static COORD WINAPI
2760bad_GetConsoleFontSize (HANDLE w, DWORD nFont)
2761{
2762 COORD size;
2763 size.X = 8;
2764 size.Y = 12;
2765 return size;
2766}
2767
2b008701 2768/* Load any functions which may not be available in ancient versions
581e13c1 2769 of Windows. */
33605d39 2770void
2b008701 2771_initialize_loadable (void)
33605d39 2772{
2b008701
CF
2773 HMODULE hm = NULL;
2774
2775 hm = LoadLibrary ("kernel32.dll");
2776 if (hm)
33605d39 2777 {
b3c613f2 2778 DebugActiveProcessStop = (void *)
2b008701 2779 GetProcAddress (hm, "DebugActiveProcessStop");
b3c613f2 2780 DebugBreakProcess = (void *)
2b008701 2781 GetProcAddress (hm, "DebugBreakProcess");
b3c613f2 2782 DebugSetProcessKillOnExit = (void *)
2b008701 2783 GetProcAddress (hm, "DebugSetProcessKillOnExit");
cd44747c
PM
2784 GetConsoleFontSize = (void *)
2785 GetProcAddress (hm, "GetConsoleFontSize");
2786 GetCurrentConsoleFont = (void *)
2787 GetProcAddress (hm, "GetCurrentConsoleFont");
2b008701 2788 }
33605d39 2789
2b008701 2790 /* Set variables to dummy versions of these processes if the function
581e13c1 2791 wasn't found in kernel32.dll. */
b3c613f2
CF
2792 if (!DebugBreakProcess)
2793 DebugBreakProcess = bad_DebugBreakProcess;
2794 if (!DebugActiveProcessStop || !DebugSetProcessKillOnExit)
2b008701 2795 {
b3c613f2
CF
2796 DebugActiveProcessStop = bad_DebugActiveProcessStop;
2797 DebugSetProcessKillOnExit = bad_DebugSetProcessKillOnExit;
2b008701 2798 }
cd44747c
PM
2799 if (!GetConsoleFontSize)
2800 GetConsoleFontSize = bad_GetConsoleFontSize;
2801 if (!GetCurrentConsoleFont)
2802 GetCurrentConsoleFont = bad_GetCurrentConsoleFont;
33605d39 2803
2b008701 2804 /* Load optional functions used for retrieving filename information
581e13c1 2805 associated with the currently debugged process or its dlls. */
2b008701
CF
2806 hm = LoadLibrary ("psapi.dll");
2807 if (hm)
2808 {
b3c613f2 2809 EnumProcessModules = (void *)
2b008701 2810 GetProcAddress (hm, "EnumProcessModules");
b3c613f2 2811 GetModuleInformation = (void *)
2b008701 2812 GetProcAddress (hm, "GetModuleInformation");
b3c613f2
CF
2813 GetModuleFileNameEx = (void *)
2814 GetProcAddress (hm, GetModuleFileNameEx_name);
33605d39
CF
2815 }
2816
b3c613f2 2817 if (!EnumProcessModules || !GetModuleInformation || !GetModuleFileNameEx)
2b008701
CF
2818 {
2819 /* Set variables to dummy versions of these processes if the function
581e13c1 2820 wasn't found in psapi.dll. */
b3c613f2
CF
2821 EnumProcessModules = bad_EnumProcessModules;
2822 GetModuleInformation = bad_GetModuleInformation;
2823 GetModuleFileNameEx = bad_GetModuleFileNameEx;
581e13c1
MS
2824 /* This will probably fail on Windows 9x/Me. Let the user know
2825 that we're missing some functionality. */
2826 warning(_("\
2827cannot automatically find executable file or library to read symbols.\n\
2828Use \"file\" or \"dll\" command to load executable/libraries directly."));
418c6cb3
CF
2829 }
2830
2831 hm = LoadLibrary ("advapi32.dll");
2832 if (hm)
2833 {
b3c613f2
CF
2834 OpenProcessToken = (void *) GetProcAddress (hm, "OpenProcessToken");
2835 LookupPrivilegeValueA = (void *)
418c6cb3 2836 GetProcAddress (hm, "LookupPrivilegeValueA");
b3c613f2 2837 AdjustTokenPrivileges = (void *)
418c6cb3
CF
2838 GetProcAddress (hm, "AdjustTokenPrivileges");
2839 /* Only need to set one of these since if OpenProcessToken fails nothing
581e13c1
MS
2840 else is needed. */
2841 if (!OpenProcessToken || !LookupPrivilegeValueA
2842 || !AdjustTokenPrivileges)
b3c613f2 2843 OpenProcessToken = bad_OpenProcessToken;
2b008701 2844 }
33605d39 2845}
This page took 1.691696 seconds and 4 git commands to generate.