* config/tc-ppc.c (md_apply_fix): Hoist code common to insn
[deliverable/binutils-gdb.git] / gdb / windows-nat.c
CommitLineData
dc05df57 1/* Target-vector operations for controlling windows child processes, for GDB.
0a65a603 2
8acc9f48 3 Copyright (C) 1995-2013 Free Software Foundation, Inc.
0a65a603 4
e6433c28 5 Contributed by Cygnus Solutions, A Red Hat Company.
e88c49c3 6
24e60978
SC
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
24e60978
SC
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
a9762ec7 15 but WITHOUT ANY WARRANTY; without even the implied warranty of
24e60978
SC
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
24e60978 21
dfe7f3ac 22/* Originally by Steve Chamberlain, sac@cygnus.com */
24e60978
SC
23
24#include "defs.h"
25#include "frame.h" /* required by inferior.h */
26#include "inferior.h"
27#include "target.h"
60250e8b 28#include "exceptions.h"
24e60978
SC
29#include "gdbcore.h"
30#include "command.h"
fa58ee11 31#include "completer.h"
4e052eda 32#include "regcache.h"
2a3d5645 33#include "top.h"
403d9909
CF
34#include <signal.h>
35#include <sys/types.h>
36#include <fcntl.h>
37#include <stdlib.h>
38#include <windows.h>
39#include <imagehlp.h>
2b008701 40#include <psapi.h>
10325bc5 41#ifdef __CYGWIN__
b7ff339d 42#include <wchar.h>
403d9909 43#include <sys/cygwin.h>
b7ff339d 44#include <cygwin/version.h>
10325bc5 45#endif
a244bdca 46#include <signal.h>
cad9cd60 47
24e60978 48#include "buildsym.h"
0ba1096a 49#include "filenames.h"
1ef980b9
SC
50#include "symfile.h"
51#include "objfiles.h"
92107356 52#include "gdb_bfd.h"
de1b3c3d 53#include "gdb_obstack.h"
24e60978 54#include "gdb_string.h"
fdfa3315 55#include "gdbthread.h"
24e60978 56#include "gdbcmd.h"
1750a5ef 57#include <sys/param.h>
1e37c281 58#include <unistd.h>
4646aa9d 59#include "exec.h"
3ee6f623 60#include "solist.h"
3cb8e7f6 61#include "solib.h"
de1b3c3d 62#include "xml-support.h"
24e60978 63
6c7de422
MK
64#include "i386-tdep.h"
65#include "i387-tdep.h"
66
31b060a2
CF
67#include "windows-tdep.h"
68#include "windows-nat.h"
9bb9e8ad 69#include "i386-nat.h"
ecc13e53 70#include "complaints.h"
de1b3c3d 71
418c6cb3 72#define AdjustTokenPrivileges dyn_AdjustTokenPrivileges
2b008701
CF
73#define DebugActiveProcessStop dyn_DebugActiveProcessStop
74#define DebugBreakProcess dyn_DebugBreakProcess
75#define DebugSetProcessKillOnExit dyn_DebugSetProcessKillOnExit
76#define EnumProcessModules dyn_EnumProcessModules
2b008701 77#define GetModuleInformation dyn_GetModuleInformation
418c6cb3
CF
78#define LookupPrivilegeValueA dyn_LookupPrivilegeValueA
79#define OpenProcessToken dyn_OpenProcessToken
cd44747c
PM
80#define GetConsoleFontSize dyn_GetConsoleFontSize
81#define GetCurrentConsoleFont dyn_GetCurrentConsoleFont
2b008701 82
418c6cb3
CF
83static BOOL WINAPI (*AdjustTokenPrivileges)(HANDLE, BOOL, PTOKEN_PRIVILEGES,
84 DWORD, PTOKEN_PRIVILEGES, PDWORD);
2b008701
CF
85static BOOL WINAPI (*DebugActiveProcessStop) (DWORD);
86static BOOL WINAPI (*DebugBreakProcess) (HANDLE);
87static BOOL WINAPI (*DebugSetProcessKillOnExit) (BOOL);
88static BOOL WINAPI (*EnumProcessModules) (HANDLE, HMODULE *, DWORD,
89 LPDWORD);
2b008701
CF
90static BOOL WINAPI (*GetModuleInformation) (HANDLE, HMODULE, LPMODULEINFO,
91 DWORD);
418c6cb3
CF
92static BOOL WINAPI (*LookupPrivilegeValueA)(LPCSTR, LPCSTR, PLUID);
93static BOOL WINAPI (*OpenProcessToken)(HANDLE, DWORD, PHANDLE);
581e13c1
MS
94static BOOL WINAPI (*GetCurrentConsoleFont) (HANDLE, BOOL,
95 CONSOLE_FONT_INFO *);
cd44747c 96static COORD WINAPI (*GetConsoleFontSize) (HANDLE, DWORD);
2b008701 97
dc05df57 98static struct target_ops windows_ops;
3ee6f623 99
b3c613f2
CF
100#undef STARTUPINFO
101#undef CreateProcess
102#undef GetModuleFileNameEx
103
104#ifndef __CYGWIN__
105# define __PMAX (MAX_PATH + 1)
106 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPSTR, DWORD);
107# define STARTUPINFO STARTUPINFOA
108# define CreateProcess CreateProcessA
109# define GetModuleFileNameEx_name "GetModuleFileNameExA"
110# define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
111#else
112# define __PMAX PATH_MAX
581e13c1 113/* The starting and ending address of the cygwin1.dll text segment. */
b3c613f2
CF
114 static CORE_ADDR cygwin_load_start;
115 static CORE_ADDR cygwin_load_end;
b3c613f2
CF
116# define __USEWIDE
117 typedef wchar_t cygwin_buf_t;
581e13c1
MS
118 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE,
119 LPWSTR, DWORD);
b3c613f2
CF
120# define STARTUPINFO STARTUPINFOW
121# define CreateProcess CreateProcessW
122# define GetModuleFileNameEx_name "GetModuleFileNameExW"
123# define bad_GetModuleFileNameEx bad_GetModuleFileNameExW
10325bc5 124#endif
a244bdca 125
581e13c1
MS
126static int have_saved_context; /* True if we've saved context from a
127 cygwin signal. */
128static CONTEXT saved_context; /* Containes the saved context from a
129 cygwin signal. */
a244bdca 130
0714f9bf
SS
131/* If we're not using the old Cygwin header file set, define the
132 following which never should have been in the generic Win32 API
581e13c1 133 headers in the first place since they were our own invention... */
0714f9bf 134#ifndef _GNU_H_WINDOWS_H
9d3789f7 135enum
8e860359
CF
136 {
137 FLAG_TRACE_BIT = 0x100,
138 CONTEXT_DEBUGGER = (CONTEXT_FULL | CONTEXT_FLOATING_POINT)
139 };
0714f9bf
SS
140#endif
141
5851ab76
JB
142#ifndef CONTEXT_EXTENDED_REGISTERS
143/* This macro is only defined on ia32. It only makes sense on this target,
144 so define it as zero if not already defined. */
145#define CONTEXT_EXTENDED_REGISTERS 0
146#endif
147
fa4ba8da
PM
148#define CONTEXT_DEBUGGER_DR CONTEXT_DEBUGGER | CONTEXT_DEBUG_REGISTERS \
149 | CONTEXT_EXTENDED_REGISTERS
97da3b20 150
41b4aadc 151static uintptr_t dr[8];
87a45c96
CF
152static int debug_registers_changed;
153static int debug_registers_used;
16d905e2
CF
154
155static int windows_initialization_done;
6537bb24 156#define DR6_CLEAR_VALUE 0xffff0ff0
97da3b20 157
3cee93ac 158/* The string sent by cygwin when it processes a signal.
581e13c1 159 FIXME: This should be in a cygwin include file. */
3929abe9
CF
160#ifndef _CYGWIN_SIGNAL_STRING
161#define _CYGWIN_SIGNAL_STRING "cYgSiGw00f"
162#endif
3cee93ac 163
29fe111d 164#define CHECK(x) check (x, __FILE__,__LINE__)
dfe7f3ac 165#define DEBUG_EXEC(x) if (debug_exec) printf_unfiltered x
4e52d31c
PM
166#define DEBUG_EVENTS(x) if (debug_events) printf_unfiltered x
167#define DEBUG_MEM(x) if (debug_memory) printf_unfiltered x
168#define DEBUG_EXCEPT(x) if (debug_exceptions) printf_unfiltered x
24e60978 169
dc05df57 170static void windows_stop (ptid_t);
02529b48 171static int windows_thread_alive (struct target_ops *, ptid_t);
7d85a9c0 172static void windows_kill_inferior (struct target_ops *);
3cee93ac 173
9bb9e8ad
PM
174static void cygwin_set_dr (int i, CORE_ADDR addr);
175static void cygwin_set_dr7 (unsigned long val);
a961bc18 176static CORE_ADDR cygwin_get_dr (int i);
9bb9e8ad 177static unsigned long cygwin_get_dr6 (void);
a961bc18 178static unsigned long cygwin_get_dr7 (void);
9bb9e8ad 179
a493e3e2 180static enum gdb_signal last_sig = GDB_SIGNAL_0;
581e13c1 181/* Set if a signal was received from the debugged process. */
7393af7c 182
3cee93ac 183/* Thread information structure used to track information that is
6537bb24 184 not available in gdb's thread structure. */
3cee93ac 185typedef struct thread_info_struct
3a4b77d8
JM
186 {
187 struct thread_info_struct *next;
188 DWORD id;
189 HANDLE h;
711e434b 190 CORE_ADDR thread_local_base;
3a4b77d8 191 char *name;
6537bb24 192 int suspended;
3ade5333 193 int reload_context;
3a4b77d8 194 CONTEXT context;
1e37c281 195 STACKFRAME sf;
8e860359
CF
196 }
197thread_info;
1e37c281 198
29fe111d 199static thread_info thread_head;
24e60978 200
581e13c1 201/* The process and thread handles for the above context. */
24e60978 202
3cee93ac
CF
203static DEBUG_EVENT current_event; /* The current debug event from
204 WaitForDebugEvent */
205static HANDLE current_process_handle; /* Currently executing process */
206static thread_info *current_thread; /* Info on currently selected thread */
349b409f 207static DWORD main_thread_id; /* Thread ID of the main thread */
24e60978 208
581e13c1 209/* Counts of things. */
24e60978
SC
210static int exception_count = 0;
211static int event_count = 0;
dfe7f3ac 212static int saw_create;
bf25528d 213static int open_process_used = 0;
24e60978 214
581e13c1 215/* User options. */
24e60978 216static int new_console = 0;
10325bc5 217#ifdef __CYGWIN__
09280ddf 218static int cygwin_exceptions = 0;
10325bc5 219#endif
1e37c281 220static int new_group = 1;
dfe7f3ac
CF
221static int debug_exec = 0; /* show execution */
222static int debug_events = 0; /* show events from kernel */
223static int debug_memory = 0; /* show target memory accesses */
1ef980b9 224static int debug_exceptions = 0; /* show target exceptions */
dfe7f3ac
CF
225static int useshell = 0; /* use shell for subprocesses */
226
7e63b4e4 227/* This vector maps GDB's idea of a register's number into an offset
dc05df57 228 in the windows exception context vector.
24e60978 229
3cee93ac 230 It also contains the bit mask needed to load the register in question.
24e60978 231
7e63b4e4
JB
232 The contents of this table can only be computed by the units
233 that provide CPU-specific support for Windows native debugging.
234 These units should set the table by calling
dc05df57 235 windows_set_context_register_offsets.
7e63b4e4 236
24e60978
SC
237 One day we could read a reg, we could inspect the context we
238 already have loaded, if it doesn't have the bit set that we need,
239 we read that set of registers in using GetThreadContext. If the
581e13c1 240 context already contains what we need, we just unpack it. Then to
24e60978
SC
241 write a register, first we have to ensure that the context contains
242 the other regs of the group, and then we copy the info in and set
581e13c1 243 out bit. */
24e60978 244
7e63b4e4 245static const int *mappings;
d3a09475 246
d40dc7a8
JB
247/* The function to use in order to determine whether a register is
248 a segment register or not. */
249static segment_register_p_ftype *segment_register_p;
250
24e60978 251/* This vector maps the target's idea of an exception (extracted
581e13c1 252 from the DEBUG_EVENT structure) to GDB's idea. */
24e60978
SC
253
254struct xlate_exception
255 {
256 int them;
2ea28649 257 enum gdb_signal us;
24e60978
SC
258 };
259
24e60978
SC
260static const struct xlate_exception
261 xlate[] =
262{
a493e3e2
PA
263 {EXCEPTION_ACCESS_VIOLATION, GDB_SIGNAL_SEGV},
264 {STATUS_STACK_OVERFLOW, GDB_SIGNAL_SEGV},
265 {EXCEPTION_BREAKPOINT, GDB_SIGNAL_TRAP},
266 {DBG_CONTROL_C, GDB_SIGNAL_INT},
267 {EXCEPTION_SINGLE_STEP, GDB_SIGNAL_TRAP},
268 {STATUS_FLOAT_DIVIDE_BY_ZERO, GDB_SIGNAL_FPE},
24e60978
SC
269 {-1, -1}};
270
7e63b4e4
JB
271/* Set the MAPPINGS static global to OFFSETS.
272 See the description of MAPPINGS for more details. */
273
274void
dc05df57 275windows_set_context_register_offsets (const int *offsets)
7e63b4e4
JB
276{
277 mappings = offsets;
278}
279
d40dc7a8
JB
280/* See windows-nat.h. */
281
282void
283windows_set_segment_register_p (segment_register_p_ftype *fun)
284{
285 segment_register_p = fun;
286}
287
fa4ba8da
PM
288static void
289check (BOOL ok, const char *file, int line)
290{
291 if (!ok)
d50a0ce2
CV
292 printf_filtered ("error return %s:%d was %u\n", file, line,
293 (unsigned) GetLastError ());
fa4ba8da
PM
294}
295
6537bb24
PA
296/* Find a thread record given a thread id. If GET_CONTEXT is not 0,
297 then also retrieve the context for this thread. If GET_CONTEXT is
298 negative, then don't suspend the thread. */
3cee93ac
CF
299static thread_info *
300thread_rec (DWORD id, int get_context)
24e60978 301{
3cee93ac
CF
302 thread_info *th;
303
3a4b77d8 304 for (th = &thread_head; (th = th->next) != NULL;)
3cee93ac
CF
305 if (th->id == id)
306 {
6537bb24 307 if (!th->suspended && get_context)
3cee93ac 308 {
8a892701 309 if (get_context > 0 && id != current_event.dwThreadId)
6537bb24
PA
310 {
311 if (SuspendThread (th->h) == (DWORD) -1)
312 {
313 DWORD err = GetLastError ();
d50a0ce2
CV
314 warning (_("SuspendThread failed. (winerr %u)"),
315 (unsigned) err);
6537bb24
PA
316 return NULL;
317 }
318 th->suspended = 1;
319 }
3cee93ac 320 else if (get_context < 0)
6537bb24 321 th->suspended = -1;
3ade5333 322 th->reload_context = 1;
3cee93ac
CF
323 }
324 return th;
325 }
326
327 return NULL;
328}
329
2dc38344 330/* Add a thread to the thread list. */
3cee93ac 331static thread_info *
711e434b 332windows_add_thread (ptid_t ptid, HANDLE h, void *tlb)
3cee93ac
CF
333{
334 thread_info *th;
2dc38344
PA
335 DWORD id;
336
337 gdb_assert (ptid_get_tid (ptid) != 0);
338
339 id = ptid_get_tid (ptid);
3cee93ac
CF
340
341 if ((th = thread_rec (id, FALSE)))
342 return th;
343
3929abe9 344 th = XZALLOC (thread_info);
3cee93ac
CF
345 th->id = id;
346 th->h = h;
711e434b 347 th->thread_local_base = (CORE_ADDR) (uintptr_t) tlb;
3cee93ac
CF
348 th->next = thread_head.next;
349 thread_head.next = th;
2dc38344
PA
350 add_thread (ptid);
351 /* Set the debug registers for the new thread if they are used. */
fa4ba8da
PM
352 if (debug_registers_used)
353 {
354 /* Only change the value of the debug registers. */
355 th->context.ContextFlags = CONTEXT_DEBUG_REGISTERS;
356 CHECK (GetThreadContext (th->h, &th->context));
357 th->context.Dr0 = dr[0];
358 th->context.Dr1 = dr[1];
359 th->context.Dr2 = dr[2];
360 th->context.Dr3 = dr[3];
6537bb24 361 th->context.Dr6 = DR6_CLEAR_VALUE;
fa4ba8da
PM
362 th->context.Dr7 = dr[7];
363 CHECK (SetThreadContext (th->h, &th->context));
364 th->context.ContextFlags = 0;
365 }
3cee93ac 366 return th;
24e60978
SC
367}
368
3cee93ac 369/* Clear out any old thread list and reintialize it to a
581e13c1 370 pristine state. */
24e60978 371static void
dc05df57 372windows_init_thread_list (void)
24e60978 373{
3cee93ac
CF
374 thread_info *th = &thread_head;
375
dc05df57 376 DEBUG_EVENTS (("gdb: windows_init_thread_list\n"));
3cee93ac
CF
377 init_thread_list ();
378 while (th->next != NULL)
24e60978 379 {
3cee93ac
CF
380 thread_info *here = th->next;
381 th->next = here->next;
b8c9b27d 382 xfree (here);
24e60978 383 }
059198c1 384 thread_head.next = NULL;
3cee93ac
CF
385}
386
581e13c1 387/* Delete a thread from the list of threads. */
3cee93ac 388static void
e0ea48a0 389windows_delete_thread (ptid_t ptid, DWORD exit_code)
3cee93ac
CF
390{
391 thread_info *th;
2dc38344
PA
392 DWORD id;
393
394 gdb_assert (ptid_get_tid (ptid) != 0);
395
396 id = ptid_get_tid (ptid);
3cee93ac
CF
397
398 if (info_verbose)
2dc38344 399 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (ptid));
e0ea48a0
EZ
400 else if (print_thread_events && id != main_thread_id)
401 printf_unfiltered (_("[%s exited with code %u]\n"),
402 target_pid_to_str (ptid), (unsigned)exit_code);
2dc38344 403 delete_thread (ptid);
3cee93ac
CF
404
405 for (th = &thread_head;
406 th->next != NULL && th->next->id != id;
407 th = th->next)
408 continue;
409
410 if (th->next != NULL)
24e60978 411 {
3cee93ac
CF
412 thread_info *here = th->next;
413 th->next = here->next;
b8c9b27d 414 xfree (here);
24e60978
SC
415 }
416}
417
3cee93ac 418static void
dc05df57 419do_windows_fetch_inferior_registers (struct regcache *regcache, int r)
24e60978 420{
1e37c281 421 char *context_offset = ((char *) &current_thread->context) + mappings[r];
20a6ec49
MD
422 struct gdbarch *gdbarch = get_regcache_arch (regcache);
423 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
1e37c281 424 long l;
6c7de422 425
3ade5333 426 if (!current_thread)
d6dc8049 427 return; /* Windows sometimes uses a non-existent thread id in its
581e13c1 428 events. */
3ade5333
CF
429
430 if (current_thread->reload_context)
431 {
cb832706 432#ifdef __COPY_CONTEXT_SIZE
a244bdca
CF
433 if (have_saved_context)
434 {
581e13c1
MS
435 /* Lie about where the program actually is stopped since
436 cygwin has informed us that we should consider the signal
437 to have occurred at another location which is stored in
438 "saved_context. */
439 memcpy (&current_thread->context, &saved_context,
440 __COPY_CONTEXT_SIZE);
a244bdca
CF
441 have_saved_context = 0;
442 }
443 else
cb832706 444#endif
a244bdca
CF
445 {
446 thread_info *th = current_thread;
447 th->context.ContextFlags = CONTEXT_DEBUGGER_DR;
448 GetThreadContext (th->h, &th->context);
2b008701 449 /* Copy dr values from that thread.
581e13c1
MS
450 But only if there were not modified since last stop.
451 PR gdb/2388 */
88616312
PM
452 if (!debug_registers_changed)
453 {
454 dr[0] = th->context.Dr0;
455 dr[1] = th->context.Dr1;
456 dr[2] = th->context.Dr2;
457 dr[3] = th->context.Dr3;
458 dr[6] = th->context.Dr6;
459 dr[7] = th->context.Dr7;
460 }
a244bdca 461 }
3ade5333
CF
462 current_thread->reload_context = 0;
463 }
464
20a6ec49 465 if (r == I387_FISEG_REGNUM (tdep))
1e37c281 466 {
8e860359 467 l = *((long *) context_offset) & 0xffff;
56be3814 468 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 469 }
20a6ec49 470 else if (r == I387_FOP_REGNUM (tdep))
1e37c281 471 {
8e860359 472 l = (*((long *) context_offset) >> 16) & ((1 << 11) - 1);
56be3814 473 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 474 }
d40dc7a8
JB
475 else if (segment_register_p (r))
476 {
477 /* GDB treats segment registers as 32bit registers, but they are
478 in fact only 16 bits long. Make sure we do not read extra
479 bits from our source buffer. */
480 l = *((long *) context_offset) & 0xffff;
481 regcache_raw_supply (regcache, r, (char *) &l);
482 }
1e37c281 483 else if (r >= 0)
56be3814 484 regcache_raw_supply (regcache, r, context_offset);
3cee93ac 485 else
24e60978 486 {
20a6ec49 487 for (r = 0; r < gdbarch_num_regs (gdbarch); r++)
dc05df57 488 do_windows_fetch_inferior_registers (regcache, r);
24e60978 489 }
3cee93ac
CF
490}
491
492static void
28439f5e
PA
493windows_fetch_inferior_registers (struct target_ops *ops,
494 struct regcache *regcache, int r)
3cee93ac 495{
2dc38344 496 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 497 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 498 thread id in its events. */
3ade5333 499 if (current_thread)
dc05df57 500 do_windows_fetch_inferior_registers (regcache, r);
3cee93ac
CF
501}
502
503static void
dc05df57 504do_windows_store_inferior_registers (const struct regcache *regcache, int r)
3cee93ac 505{
3ade5333 506 if (!current_thread)
581e13c1 507 /* Windows sometimes uses a non-existent thread id in its events. */;
3ade5333 508 else if (r >= 0)
56be3814 509 regcache_raw_collect (regcache, r,
822c9732 510 ((char *) &current_thread->context) + mappings[r]);
24e60978
SC
511 else
512 {
40a6adc1 513 for (r = 0; r < gdbarch_num_regs (get_regcache_arch (regcache)); r++)
dc05df57 514 do_windows_store_inferior_registers (regcache, r);
24e60978
SC
515 }
516}
517
581e13c1 518/* Store a new register value into the current thread context. */
3cee93ac 519static void
28439f5e
PA
520windows_store_inferior_registers (struct target_ops *ops,
521 struct regcache *regcache, int r)
3cee93ac 522{
2dc38344 523 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 524 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 525 thread id in its events. */
3ade5333 526 if (current_thread)
dc05df57 527 do_windows_store_inferior_registers (regcache, r);
3cee93ac 528}
24e60978 529
7a9dd1b2 530/* Get the name of a given module at given base address. If base_address
33605d39
CF
531 is zero return the first loaded module (which is always the name of the
532 executable). */
3ee6f623 533static int
d3653bf6 534get_module_name (LPVOID base_address, char *dll_name_ret)
1e37c281
JM
535{
536 DWORD len;
537 MODULEINFO mi;
538 int i;
8e860359 539 HMODULE dh_buf[1];
581e13c1
MS
540 HMODULE *DllHandle = dh_buf; /* Set to temporary storage for
541 initial query. */
1e37c281 542 DWORD cbNeeded;
33605d39 543#ifdef __CYGWIN__
b3c613f2
CF
544 cygwin_buf_t pathbuf[__PMAX]; /* Temporary storage prior to converting to
545 posix form. __PMAX is always enough
d0d0ab16 546 as long as SO_NAME_MAX_PATH_SIZE is defined
581e13c1 547 as 512. */
33605d39 548#endif
1e37c281 549
1e37c281 550 cbNeeded = 0;
581e13c1
MS
551 /* Find size of buffer needed to handle list of modules loaded in
552 inferior. */
2b008701
CF
553 if (!EnumProcessModules (current_process_handle, DllHandle,
554 sizeof (HMODULE), &cbNeeded) || !cbNeeded)
1e37c281
JM
555 goto failed;
556
581e13c1 557 /* Allocate correct amount of space for module list. */
8e860359 558 DllHandle = (HMODULE *) alloca (cbNeeded);
1e37c281
JM
559 if (!DllHandle)
560 goto failed;
561
581e13c1 562 /* Get the list of modules. */
2b008701 563 if (!EnumProcessModules (current_process_handle, DllHandle, cbNeeded,
33605d39 564 &cbNeeded))
1e37c281
JM
565 goto failed;
566
29fe111d 567 for (i = 0; i < (int) (cbNeeded / sizeof (HMODULE)); i++)
1e37c281 568 {
581e13c1 569 /* Get information on this module. */
2b008701
CF
570 if (!GetModuleInformation (current_process_handle, DllHandle[i],
571 &mi, sizeof (mi)))
8a3fe4f8 572 error (_("Can't get module info"));
1e37c281 573
d3653bf6 574 if (!base_address || mi.lpBaseOfDll == base_address)
33605d39 575 {
581e13c1 576 /* Try to find the name of the given module. */
d0d0ab16 577#ifdef __CYGWIN__
581e13c1 578 /* Cygwin prefers that the path be in /x/y/z format. */
b3c613f2
CF
579 len = GetModuleFileNameEx (current_process_handle,
580 DllHandle[i], pathbuf, __PMAX);
d0d0ab16 581 if (len == 0)
d50a0ce2
CV
582 error (_("Error getting dll name: %u."),
583 (unsigned) GetLastError ());
d0d0ab16 584 if (cygwin_conv_path (CCP_WIN_W_TO_POSIX, pathbuf, dll_name_ret,
b3c613f2 585 __PMAX) < 0)
d0d0ab16
CV
586 error (_("Error converting dll name to POSIX: %d."), errno);
587#else
b3c613f2
CF
588 len = GetModuleFileNameEx (current_process_handle,
589 DllHandle[i], dll_name_ret, __PMAX);
33605d39 590 if (len == 0)
581e13c1
MS
591 error (_("Error getting dll name: %u."),
592 (unsigned) GetLastError ());
33605d39
CF
593#endif
594 return 1; /* success */
595 }
1e37c281
JM
596 }
597
598failed:
599 dll_name_ret[0] = '\0';
33605d39 600 return 0; /* failure */
1e37c281
JM
601}
602
450005e7 603/* Encapsulate the information required in a call to
581e13c1 604 symbol_file_add_args. */
8a892701
CF
605struct safe_symbol_file_add_args
606{
607 char *name;
608 int from_tty;
609 struct section_addr_info *addrs;
610 int mainline;
611 int flags;
7c5c87c0 612 struct ui_file *err, *out;
8a892701
CF
613 struct objfile *ret;
614};
615
581e13c1 616/* Maintain a linked list of "so" information. */
3ee6f623 617struct lm_info
02e423b9 618{
d3653bf6 619 LPVOID load_addr;
3ee6f623
CF
620};
621
622static struct so_list solib_start, *solib_end;
02e423b9 623
450005e7 624/* Call symbol_file_add with stderr redirected. We don't care if there
581e13c1 625 are errors. */
8a892701
CF
626static int
627safe_symbol_file_add_stub (void *argv)
628{
3ee6f623 629#define p ((struct safe_symbol_file_add_args *) argv)
7eedccfa
PP
630 const int add_flags = ((p->from_tty ? SYMFILE_VERBOSE : 0)
631 | (p->mainline ? SYMFILE_MAINLINE : 0));
632 p->ret = symbol_file_add (p->name, add_flags, p->addrs, p->flags);
8a892701
CF
633 return !!p->ret;
634#undef p
635}
636
581e13c1 637/* Restore gdb's stderr after calling symbol_file_add. */
8a892701 638static void
7c5c87c0 639safe_symbol_file_add_cleanup (void *p)
8a892701 640{
8e860359 641#define sp ((struct safe_symbol_file_add_args *)p)
450005e7 642 gdb_flush (gdb_stderr);
7c5c87c0 643 gdb_flush (gdb_stdout);
d3ff4a77 644 ui_file_delete (gdb_stderr);
7c5c87c0 645 ui_file_delete (gdb_stdout);
d3ff4a77 646 gdb_stderr = sp->err;
9d3789f7 647 gdb_stdout = sp->out;
8e860359 648#undef sp
8a892701
CF
649}
650
581e13c1 651/* symbol_file_add wrapper that prevents errors from being displayed. */
8a892701
CF
652static struct objfile *
653safe_symbol_file_add (char *name, int from_tty,
654 struct section_addr_info *addrs,
655 int mainline, int flags)
8a892701
CF
656{
657 struct safe_symbol_file_add_args p;
658 struct cleanup *cleanup;
659
7c5c87c0 660 cleanup = make_cleanup (safe_symbol_file_add_cleanup, &p);
8a892701 661
7c5c87c0
CF
662 p.err = gdb_stderr;
663 p.out = gdb_stdout;
450005e7 664 gdb_flush (gdb_stderr);
7c5c87c0 665 gdb_flush (gdb_stdout);
d3ff4a77 666 gdb_stderr = ui_file_new ();
7c5c87c0 667 gdb_stdout = ui_file_new ();
8a892701
CF
668 p.name = name;
669 p.from_tty = from_tty;
670 p.addrs = addrs;
671 p.mainline = mainline;
672 p.flags = flags;
673 catch_errors (safe_symbol_file_add_stub, &p, "", RETURN_MASK_ERROR);
674
675 do_cleanups (cleanup);
676 return p.ret;
677}
678
de1b3c3d 679static struct so_list *
dc05df57 680windows_make_so (const char *name, LPVOID load_addr)
8e860359 681{
3ee6f623 682 struct so_list *so;
d0d0ab16
CV
683 char *p;
684#ifndef __CYGWIN__
b3c613f2
CF
685 char buf[__PMAX];
686 char cwd[__PMAX];
3f8ad85b
CF
687 WIN32_FIND_DATA w32_fd;
688 HANDLE h = FindFirstFile(name, &w32_fd);
3f8ad85b 689
6badb179
CF
690 if (h == INVALID_HANDLE_VALUE)
691 strcpy (buf, name);
692 else
3f8ad85b 693 {
c914e0cc
CF
694 FindClose (h);
695 strcpy (buf, name);
696 if (GetCurrentDirectory (MAX_PATH + 1, cwd))
697 {
698 p = strrchr (buf, '\\');
699 if (p)
700 p[1] = '\0';
701 SetCurrentDirectory (buf);
702 GetFullPathName (w32_fd.cFileName, MAX_PATH, buf, &p);
703 SetCurrentDirectory (cwd);
704 }
3f8ad85b 705 }
3ee6f623
CF
706 if (strcasecmp (buf, "ntdll.dll") == 0)
707 {
708 GetSystemDirectory (buf, sizeof (buf));
709 strcat (buf, "\\ntdll.dll");
710 }
d0d0ab16 711#else
b3c613f2 712 cygwin_buf_t buf[__PMAX];
d0d0ab16 713
b3c613f2 714 buf[0] = 0;
d0d0ab16
CV
715 if (access (name, F_OK) != 0)
716 {
717 if (strcasecmp (name, "ntdll.dll") == 0)
b3c613f2 718#ifdef __USEWIDE
d0d0ab16
CV
719 {
720 GetSystemDirectoryW (buf, sizeof (buf) / sizeof (wchar_t));
721 wcscat (buf, L"\\ntdll.dll");
722 }
b3c613f2
CF
723#else
724 {
725 GetSystemDirectoryA (buf, sizeof (buf) / sizeof (wchar_t));
726 strcat (buf, "\\ntdll.dll");
727 }
728#endif
d0d0ab16
CV
729 }
730#endif
3929abe9 731 so = XZALLOC (struct so_list);
3ee6f623
CF
732 so->lm_info = (struct lm_info *) xmalloc (sizeof (struct lm_info));
733 so->lm_info->load_addr = load_addr;
de1b3c3d 734 strcpy (so->so_original_name, name);
10325bc5
PA
735#ifndef __CYGWIN__
736 strcpy (so->so_name, buf);
737#else
d0d0ab16
CV
738 if (buf[0])
739 cygwin_conv_path (CCP_WIN_W_TO_POSIX, buf, so->so_name,
740 SO_NAME_MAX_PATH_SIZE);
741 else
742 {
60c5c021 743 char *rname = realpath (name, NULL);
d0d0ab16
CV
744 if (rname && strlen (rname) < SO_NAME_MAX_PATH_SIZE)
745 {
746 strcpy (so->so_name, rname);
747 free (rname);
748 }
749 else
750 error (_("dll path too long"));
751 }
de1b3c3d
PA
752 /* Record cygwin1.dll .text start/end. */
753 p = strchr (so->so_name, '\0') - (sizeof ("/cygwin1.dll") - 1);
754 if (p >= so->so_name && strcasecmp (p, "/cygwin1.dll") == 0)
755 {
756 bfd *abfd;
757 asection *text = NULL;
758 CORE_ADDR text_vma;
8e860359 759
1c00ec6b 760 abfd = gdb_bfd_open (so->so_name, "pei-i386", -1);
a244bdca 761
de1b3c3d
PA
762 if (!abfd)
763 return so;
764
765 if (bfd_check_format (abfd, bfd_object))
766 text = bfd_get_section_by_name (abfd, ".text");
767
768 if (!text)
769 {
cbb099e8 770 gdb_bfd_unref (abfd);
de1b3c3d
PA
771 return so;
772 }
773
7a9dd1b2 774 /* The symbols in a dll are offset by 0x1000, which is the
de1b3c3d 775 offset from 0 of the first byte in an image - because of the
581e13c1
MS
776 file header and the section alignment. */
777 cygwin_load_start = (CORE_ADDR) (uintptr_t) ((char *)
778 load_addr + 0x1000);
dc05df57 779 cygwin_load_end = cygwin_load_start + bfd_section_size (abfd, text);
de1b3c3d 780
cbb099e8 781 gdb_bfd_unref (abfd);
de1b3c3d 782 }
10325bc5 783#endif
de1b3c3d
PA
784
785 return so;
8e860359
CF
786}
787
3ee6f623 788static char *
dfe7f3ac
CF
789get_image_name (HANDLE h, void *address, int unicode)
790{
d0d0ab16 791#ifdef __CYGWIN__
b3c613f2 792 static char buf[__PMAX];
d0d0ab16 793#else
b3c613f2 794 static char buf[(2 * __PMAX) + 1];
d0d0ab16 795#endif
dfe7f3ac
CF
796 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
797 char *address_ptr;
798 int len = 0;
799 char b[2];
5732a500 800 SIZE_T done;
dfe7f3ac
CF
801
802 /* Attempt to read the name of the dll that was detected.
803 This is documented to work only when actively debugging
581e13c1 804 a program. It will not work for attached processes. */
dfe7f3ac
CF
805 if (address == NULL)
806 return NULL;
807
dfe7f3ac 808 /* See if we could read the address of a string, and that the
581e13c1
MS
809 address isn't null. */
810 if (!ReadProcessMemory (h, address, &address_ptr,
811 sizeof (address_ptr), &done)
6f17862b 812 || done != sizeof (address_ptr) || !address_ptr)
dfe7f3ac
CF
813 return NULL;
814
581e13c1 815 /* Find the length of the string. */
6f17862b
CF
816 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
817 && (b[0] != 0 || b[size - 1] != 0) && done == size)
818 continue;
dfe7f3ac
CF
819
820 if (!unicode)
821 ReadProcessMemory (h, address_ptr, buf, len, &done);
822 else
823 {
824 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
825 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
826 &done);
d0d0ab16 827#ifdef __CYGWIN__
b3c613f2 828 wcstombs (buf, unicode_address, __PMAX);
d0d0ab16
CV
829#else
830 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, sizeof buf,
831 0, 0);
832#endif
dfe7f3ac
CF
833 }
834
835 return buf;
836}
837
24e60978
SC
838/* Wait for child to do something. Return pid of child, or -1 in case
839 of error; store status through argument pointer OURSTATUS. */
1750a5ef 840static int
0a65a603 841handle_load_dll (void *dummy)
24e60978 842{
3a4b77d8 843 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
b3c613f2 844 char dll_buf[__PMAX];
450005e7 845 char *dll_name = NULL;
3cee93ac 846
3a4b77d8 847 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 848
d3653bf6 849 if (!get_module_name (event->lpBaseOfDll, dll_buf))
8e860359 850 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 851
1e37c281 852 dll_name = dll_buf;
24e60978 853
dfe7f3ac 854 if (*dll_name == '\0')
de1b3c3d
PA
855 dll_name = get_image_name (current_process_handle,
856 event->lpImageName, event->fUnicode);
3cee93ac
CF
857 if (!dll_name)
858 return 1;
859
dc05df57 860 solib_end->next = windows_make_so (dll_name, event->lpBaseOfDll);
de1b3c3d 861 solib_end = solib_end->next;
450005e7 862
a74ce742
PM
863 DEBUG_EVENTS (("gdb: Loading dll \"%s\" at %s.\n", solib_end->so_name,
864 host_address_to_string (solib_end->lm_info->load_addr)));
7488902c 865
450005e7
CF
866 return 1;
867}
868
3ee6f623 869static void
dc05df57 870windows_free_so (struct so_list *so)
3ee6f623 871{
3ee6f623
CF
872 if (so->lm_info)
873 xfree (so->lm_info);
de1b3c3d 874 xfree (so);
3cb8e7f6
CF
875}
876
d3ff4a77 877static int
0a65a603 878handle_unload_dll (void *dummy)
d3ff4a77 879{
d3653bf6 880 LPVOID lpBaseOfDll = current_event.u.UnloadDll.lpBaseOfDll;
3ee6f623 881 struct so_list *so;
d3ff4a77
CF
882
883 for (so = &solib_start; so->next != NULL; so = so->next)
3ee6f623 884 if (so->next->lm_info->load_addr == lpBaseOfDll)
d3ff4a77 885 {
3ee6f623 886 struct so_list *sodel = so->next;
d3ff4a77
CF
887 so->next = sodel->next;
888 if (!so->next)
889 solib_end = so;
7488902c
PM
890 DEBUG_EVENTS (("gdb: Unloading dll \"%s\".\n", sodel->so_name));
891
dc05df57 892 windows_free_so (sodel);
3929abe9 893 solib_add (NULL, 0, NULL, auto_solib_add);
d3ff4a77
CF
894 return 1;
895 }
3929abe9 896
ecc13e53
JB
897 /* We did not find any DLL that was previously loaded at this address,
898 so register a complaint. We do not report an error, because we have
899 observed that this may be happening under some circumstances. For
900 instance, running 32bit applications on x64 Windows causes us to receive
901 4 mysterious UNLOAD_DLL_DEBUG_EVENTs during the startup phase (these
902 events are apparently caused by the WOW layer, the interface between
903 32bit and 64bit worlds). */
904 complaint (&symfile_complaints, _("dll starting at %s not found."),
905 host_address_to_string (lpBaseOfDll));
d3ff4a77
CF
906
907 return 0;
908}
909
581e13c1 910/* Clear list of loaded DLLs. */
3ee6f623 911static void
dc05df57 912windows_clear_solib (void)
450005e7 913{
450005e7
CF
914 solib_start.next = NULL;
915 solib_end = &solib_start;
450005e7 916}
295732ea 917
581e13c1 918/* Load DLL symbol info. */
d603d4b3 919static void
7470a420 920dll_symbol_command (char *args, int from_tty)
450005e7 921{
8e860359 922 int n;
450005e7 923 dont_repeat ();
8e860359 924
450005e7 925 if (args == NULL)
8a3fe4f8 926 error (_("dll-symbols requires a file name"));
450005e7 927
8e860359
CF
928 n = strlen (args);
929 if (n > 4 && strcasecmp (args + n - 4, ".dll") != 0)
930 {
931 char *newargs = (char *) alloca (n + 4 + 1);
932 strcpy (newargs, args);
933 strcat (newargs, ".dll");
934 args = newargs;
935 }
936
7470a420 937 safe_symbol_file_add (args, from_tty, NULL, 0, OBJF_SHARED | OBJF_USERLOADED);
8e860359 938}
450005e7 939
3cee93ac
CF
940/* Handle DEBUG_STRING output from child process.
941 Cygwin prepends its messages with a "cygwin:". Interpret this as
581e13c1 942 a Cygwin signal. Otherwise just print the string as a warning. */
3cee93ac
CF
943static int
944handle_output_debug_string (struct target_waitstatus *ourstatus)
945{
a244bdca
CF
946 char *s = NULL;
947 int retval = 0;
3cee93ac
CF
948
949 if (!target_read_string
2c647436
PM
950 ((CORE_ADDR) (uintptr_t) current_event.u.DebugString.lpDebugStringData,
951 &s, 1024, 0)
3cee93ac 952 || !s || !*s)
a244bdca 953 /* nothing to do */;
581e13c1
MS
954 else if (strncmp (s, _CYGWIN_SIGNAL_STRING,
955 sizeof (_CYGWIN_SIGNAL_STRING) - 1) != 0)
3cee93ac 956 {
10325bc5 957#ifdef __CYGWIN__
d3a09475 958 if (strncmp (s, "cYg", 3) != 0)
10325bc5 959#endif
8a3fe4f8 960 warning (("%s"), s);
3cee93ac 961 }
cb832706 962#ifdef __COPY_CONTEXT_SIZE
d3a09475 963 else
3cee93ac 964 {
581e13c1
MS
965 /* Got a cygwin signal marker. A cygwin signal is followed by
966 the signal number itself and then optionally followed by the
967 thread id and address to saved context within the DLL. If
968 these are supplied, then the given thread is assumed to have
969 issued the signal and the context from the thread is assumed
970 to be stored at the given address in the inferior. Tell gdb
971 to treat this like a real signal. */
3cee93ac 972 char *p;
3929abe9 973 int sig = strtol (s + sizeof (_CYGWIN_SIGNAL_STRING) - 1, &p, 0);
2ea28649 974 int gotasig = gdb_signal_from_host (sig);
c62fa0e2 975
0714f9bf
SS
976 ourstatus->value.sig = gotasig;
977 if (gotasig)
a244bdca
CF
978 {
979 LPCVOID x;
2c15ef43 980 SIZE_T n;
c62fa0e2 981
a244bdca
CF
982 ourstatus->kind = TARGET_WAITKIND_STOPPED;
983 retval = strtoul (p, &p, 0);
984 if (!retval)
985 retval = main_thread_id;
40653b35 986 else if ((x = (LPCVOID) (uintptr_t) strtoull (p, NULL, 0))
a244bdca 987 && ReadProcessMemory (current_process_handle, x,
581e13c1
MS
988 &saved_context,
989 __COPY_CONTEXT_SIZE, &n)
a244bdca
CF
990 && n == __COPY_CONTEXT_SIZE)
991 have_saved_context = 1;
992 current_event.dwThreadId = retval;
993 }
3cee93ac 994 }
cb832706 995#endif
3cee93ac 996
a244bdca
CF
997 if (s)
998 xfree (s);
999 return retval;
3cee93ac 1000}
24e60978 1001
c1748f97
PM
1002static int
1003display_selector (HANDLE thread, DWORD sel)
1004{
1005 LDT_ENTRY info;
1006 if (GetThreadSelectorEntry (thread, sel, &info))
1007 {
1008 int base, limit;
d50a0ce2 1009 printf_filtered ("0x%03x: ", (unsigned) sel);
c1748f97 1010 if (!info.HighWord.Bits.Pres)
baa93fa6
CF
1011 {
1012 puts_filtered ("Segment not present\n");
1013 return 0;
1014 }
c1748f97
PM
1015 base = (info.HighWord.Bits.BaseHi << 24) +
1016 (info.HighWord.Bits.BaseMid << 16)
1017 + info.BaseLow;
1018 limit = (info.HighWord.Bits.LimitHi << 16) + info.LimitLow;
1019 if (info.HighWord.Bits.Granularity)
caad7706 1020 limit = (limit << 12) | 0xfff;
c1748f97
PM
1021 printf_filtered ("base=0x%08x limit=0x%08x", base, limit);
1022 if (info.HighWord.Bits.Default_Big)
baa93fa6 1023 puts_filtered(" 32-bit ");
c1748f97 1024 else
baa93fa6 1025 puts_filtered(" 16-bit ");
c1748f97
PM
1026 switch ((info.HighWord.Bits.Type & 0xf) >> 1)
1027 {
1028 case 0:
baa93fa6
CF
1029 puts_filtered ("Data (Read-Only, Exp-up");
1030 break;
c1748f97 1031 case 1:
baa93fa6
CF
1032 puts_filtered ("Data (Read/Write, Exp-up");
1033 break;
c1748f97 1034 case 2:
baa93fa6
CF
1035 puts_filtered ("Unused segment (");
1036 break;
c1748f97 1037 case 3:
baa93fa6
CF
1038 puts_filtered ("Data (Read/Write, Exp-down");
1039 break;
c1748f97 1040 case 4:
baa93fa6
CF
1041 puts_filtered ("Code (Exec-Only, N.Conf");
1042 break;
c1748f97 1043 case 5:
baa93fa6 1044 puts_filtered ("Code (Exec/Read, N.Conf");
c1748f97
PM
1045 break;
1046 case 6:
baa93fa6 1047 puts_filtered ("Code (Exec-Only, Conf");
c1748f97
PM
1048 break;
1049 case 7:
baa93fa6 1050 puts_filtered ("Code (Exec/Read, Conf");
c1748f97
PM
1051 break;
1052 default:
1053 printf_filtered ("Unknown type 0x%x",info.HighWord.Bits.Type);
1054 }
1055 if ((info.HighWord.Bits.Type & 0x1) == 0)
baa93fa6 1056 puts_filtered(", N.Acc");
c1748f97
PM
1057 puts_filtered (")\n");
1058 if ((info.HighWord.Bits.Type & 0x10) == 0)
1059 puts_filtered("System selector ");
1060 printf_filtered ("Priviledge level = %d. ", info.HighWord.Bits.Dpl);
1061 if (info.HighWord.Bits.Granularity)
baa93fa6 1062 puts_filtered ("Page granular.\n");
c1748f97
PM
1063 else
1064 puts_filtered ("Byte granular.\n");
1065 return 1;
1066 }
1067 else
1068 {
5572ce1f
PM
1069 DWORD err = GetLastError ();
1070 if (err == ERROR_NOT_SUPPORTED)
1071 printf_filtered ("Function not supported\n");
1072 else
d50a0ce2 1073 printf_filtered ("Invalid selector 0x%x.\n", (unsigned) sel);
c1748f97
PM
1074 return 0;
1075 }
1076}
1077
1078static void
1079display_selectors (char * args, int from_tty)
1080{
1081 if (!current_thread)
1082 {
1083 puts_filtered ("Impossible to display selectors now.\n");
1084 return;
1085 }
1086 if (!args)
1087 {
1088
1089 puts_filtered ("Selector $cs\n");
1090 display_selector (current_thread->h,
baa93fa6 1091 current_thread->context.SegCs);
c1748f97
PM
1092 puts_filtered ("Selector $ds\n");
1093 display_selector (current_thread->h,
baa93fa6 1094 current_thread->context.SegDs);
c1748f97
PM
1095 puts_filtered ("Selector $es\n");
1096 display_selector (current_thread->h,
baa93fa6 1097 current_thread->context.SegEs);
c1748f97
PM
1098 puts_filtered ("Selector $ss\n");
1099 display_selector (current_thread->h,
baa93fa6 1100 current_thread->context.SegSs);
c1748f97
PM
1101 puts_filtered ("Selector $fs\n");
1102 display_selector (current_thread->h,
1103 current_thread->context.SegFs);
1104 puts_filtered ("Selector $gs\n");
1105 display_selector (current_thread->h,
baa93fa6 1106 current_thread->context.SegGs);
c1748f97
PM
1107 }
1108 else
1109 {
1110 int sel;
1111 sel = parse_and_eval_long (args);
1112 printf_filtered ("Selector \"%s\"\n",args);
1113 display_selector (current_thread->h, sel);
1114 }
1115}
1116
7393af7c 1117#define DEBUG_EXCEPTION_SIMPLE(x) if (debug_exceptions) \
a74ce742
PM
1118 printf_unfiltered ("gdb: Target exception %s at %s\n", x, \
1119 host_address_to_string (\
1120 current_event.u.Exception.ExceptionRecord.ExceptionAddress))
7393af7c 1121
36339ecd 1122static int
450005e7 1123handle_exception (struct target_waitstatus *ourstatus)
24e60978 1124{
3cee93ac 1125 thread_info *th;
29fe111d 1126 DWORD code = current_event.u.Exception.ExceptionRecord.ExceptionCode;
3cee93ac 1127
29fe111d 1128 ourstatus->kind = TARGET_WAITKIND_STOPPED;
8a892701 1129
581e13c1 1130 /* Record the context of the current thread. */
3cee93ac 1131 th = thread_rec (current_event.dwThreadId, -1);
24e60978 1132
29fe111d 1133 switch (code)
24e60978 1134 {
1ef980b9 1135 case EXCEPTION_ACCESS_VIOLATION:
7393af7c 1136 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ACCESS_VIOLATION");
a493e3e2 1137 ourstatus->value.sig = GDB_SIGNAL_SEGV;
10325bc5 1138#ifdef __CYGWIN__
8da8e0b3 1139 {
581e13c1
MS
1140 /* See if the access violation happened within the cygwin DLL
1141 itself. Cygwin uses a kind of exception handling to deal
1142 with passed-in invalid addresses. gdb should not treat
1143 these as real SEGVs since they will be silently handled by
1144 cygwin. A real SEGV will (theoretically) be caught by
1145 cygwin later in the process and will be sent as a
1146 cygwin-specific-signal. So, ignore SEGVs if they show up
1147 within the text segment of the DLL itself. */
2c02bd72 1148 const char *fn;
581e13c1
MS
1149 CORE_ADDR addr = (CORE_ADDR) (uintptr_t)
1150 current_event.u.Exception.ExceptionRecord.ExceptionAddress;
1151
1152 if ((!cygwin_exceptions && (addr >= cygwin_load_start
1153 && addr < cygwin_load_end))
a244bdca 1154 || (find_pc_partial_function (addr, &fn, NULL, NULL)
581e13c1
MS
1155 && strncmp (fn, "KERNEL32!IsBad",
1156 strlen ("KERNEL32!IsBad")) == 0))
8da8e0b3
CF
1157 return 0;
1158 }
10325bc5 1159#endif
7393af7c
PM
1160 break;
1161 case STATUS_STACK_OVERFLOW:
1162 DEBUG_EXCEPTION_SIMPLE ("STATUS_STACK_OVERFLOW");
a493e3e2 1163 ourstatus->value.sig = GDB_SIGNAL_SEGV;
7393af7c
PM
1164 break;
1165 case STATUS_FLOAT_DENORMAL_OPERAND:
1166 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DENORMAL_OPERAND");
a493e3e2 1167 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1168 break;
1169 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1170 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ARRAY_BOUNDS_EXCEEDED");
a493e3e2 1171 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1172 break;
1173 case STATUS_FLOAT_INEXACT_RESULT:
1174 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INEXACT_RESULT");
a493e3e2 1175 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1176 break;
1177 case STATUS_FLOAT_INVALID_OPERATION:
1178 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INVALID_OPERATION");
a493e3e2 1179 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1180 break;
1181 case STATUS_FLOAT_OVERFLOW:
1182 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_OVERFLOW");
a493e3e2 1183 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1184 break;
1185 case STATUS_FLOAT_STACK_CHECK:
1186 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_STACK_CHECK");
a493e3e2 1187 ourstatus->value.sig = GDB_SIGNAL_FPE;
1ef980b9 1188 break;
3b7c8b74 1189 case STATUS_FLOAT_UNDERFLOW:
7393af7c 1190 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_UNDERFLOW");
a493e3e2 1191 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c 1192 break;
3b7c8b74 1193 case STATUS_FLOAT_DIVIDE_BY_ZERO:
7393af7c 1194 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DIVIDE_BY_ZERO");
a493e3e2 1195 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c 1196 break;
3b7c8b74 1197 case STATUS_INTEGER_DIVIDE_BY_ZERO:
7393af7c 1198 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_DIVIDE_BY_ZERO");
a493e3e2 1199 ourstatus->value.sig = GDB_SIGNAL_FPE;
3b7c8b74 1200 break;
7393af7c
PM
1201 case STATUS_INTEGER_OVERFLOW:
1202 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_OVERFLOW");
a493e3e2 1203 ourstatus->value.sig = GDB_SIGNAL_FPE;
1ef980b9
SC
1204 break;
1205 case EXCEPTION_BREAKPOINT:
7393af7c 1206 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_BREAKPOINT");
a493e3e2 1207 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1ef980b9
SC
1208 break;
1209 case DBG_CONTROL_C:
7393af7c 1210 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_C");
a493e3e2 1211 ourstatus->value.sig = GDB_SIGNAL_INT;
5b421780
PM
1212 break;
1213 case DBG_CONTROL_BREAK:
7393af7c 1214 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_BREAK");
a493e3e2 1215 ourstatus->value.sig = GDB_SIGNAL_INT;
1ef980b9
SC
1216 break;
1217 case EXCEPTION_SINGLE_STEP:
7393af7c 1218 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_SINGLE_STEP");
a493e3e2 1219 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1ef980b9 1220 break;
8227c82d 1221 case EXCEPTION_ILLEGAL_INSTRUCTION:
7393af7c 1222 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ILLEGAL_INSTRUCTION");
a493e3e2 1223 ourstatus->value.sig = GDB_SIGNAL_ILL;
7393af7c
PM
1224 break;
1225 case EXCEPTION_PRIV_INSTRUCTION:
1226 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_PRIV_INSTRUCTION");
a493e3e2 1227 ourstatus->value.sig = GDB_SIGNAL_ILL;
7393af7c
PM
1228 break;
1229 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1230 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_NONCONTINUABLE_EXCEPTION");
a493e3e2 1231 ourstatus->value.sig = GDB_SIGNAL_ILL;
8227c82d 1232 break;
1ef980b9 1233 default:
581e13c1 1234 /* Treat unhandled first chance exceptions specially. */
02e423b9 1235 if (current_event.u.Exception.dwFirstChance)
a244bdca 1236 return -1;
d50a0ce2
CV
1237 printf_unfiltered ("gdb: unknown target exception 0x%08x at %s\n",
1238 (unsigned) current_event.u.Exception.ExceptionRecord.ExceptionCode,
a74ce742
PM
1239 host_address_to_string (
1240 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
a493e3e2 1241 ourstatus->value.sig = GDB_SIGNAL_UNKNOWN;
1ef980b9 1242 break;
24e60978 1243 }
24e60978 1244 exception_count++;
7393af7c 1245 last_sig = ourstatus->value.sig;
36339ecd 1246 return 1;
24e60978
SC
1247}
1248
3cee93ac 1249/* Resume all artificially suspended threads if we are continuing
581e13c1 1250 execution. */
3cee93ac 1251static BOOL
dc05df57 1252windows_continue (DWORD continue_status, int id)
3cee93ac
CF
1253{
1254 int i;
1255 thread_info *th;
1256 BOOL res;
1257
d50a0ce2
CV
1258 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%d, ctid=%x, %s);\n",
1259 (unsigned) current_event.dwProcessId,
1260 (unsigned) current_event.dwThreadId,
dfe7f3ac 1261 continue_status == DBG_CONTINUE ?
7393af7c 1262 "DBG_CONTINUE" : "DBG_EXCEPTION_NOT_HANDLED"));
6537bb24
PA
1263
1264 for (th = &thread_head; (th = th->next) != NULL;)
1265 if ((id == -1 || id == (int) th->id)
1266 && th->suspended)
1267 {
1268 if (debug_registers_changed)
1269 {
1270 th->context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1271 th->context.Dr0 = dr[0];
1272 th->context.Dr1 = dr[1];
1273 th->context.Dr2 = dr[2];
1274 th->context.Dr3 = dr[3];
1275 th->context.Dr6 = DR6_CLEAR_VALUE;
1276 th->context.Dr7 = dr[7];
1277 }
1278 if (th->context.ContextFlags)
1279 {
1280 CHECK (SetThreadContext (th->h, &th->context));
1281 th->context.ContextFlags = 0;
1282 }
1283 if (th->suspended > 0)
1284 (void) ResumeThread (th->h);
1285 th->suspended = 0;
1286 }
1287
0714f9bf
SS
1288 res = ContinueDebugEvent (current_event.dwProcessId,
1289 current_event.dwThreadId,
1290 continue_status);
3cee93ac 1291
fa4ba8da 1292 debug_registers_changed = 0;
3cee93ac
CF
1293 return res;
1294}
1295
d6dc8049
CF
1296/* Called in pathological case where Windows fails to send a
1297 CREATE_PROCESS_DEBUG_EVENT after an attach. */
3ee6f623 1298static DWORD
5439edaa 1299fake_create_process (void)
3ade5333
CF
1300{
1301 current_process_handle = OpenProcess (PROCESS_ALL_ACCESS, FALSE,
1302 current_event.dwProcessId);
bf25528d
CF
1303 if (current_process_handle != NULL)
1304 open_process_used = 1;
1305 else
1306 {
d50a0ce2
CV
1307 error (_("OpenProcess call failed, GetLastError = %u"),
1308 (unsigned) GetLastError ());
bf25528d
CF
1309 /* We can not debug anything in that case. */
1310 }
3ade5333 1311 main_thread_id = current_event.dwThreadId;
711e434b
PM
1312 current_thread = windows_add_thread (
1313 ptid_build (current_event.dwProcessId, 0,
1314 current_event.dwThreadId),
1315 current_event.u.CreateThread.hThread,
1316 current_event.u.CreateThread.lpThreadLocalBase);
3ade5333
CF
1317 return main_thread_id;
1318}
1319
a244bdca 1320static void
28439f5e 1321windows_resume (struct target_ops *ops,
2ea28649 1322 ptid_t ptid, int step, enum gdb_signal sig)
a244bdca
CF
1323{
1324 thread_info *th;
1325 DWORD continue_status = DBG_CONTINUE;
1326
2dc38344
PA
1327 /* A specific PTID means `step only this thread id'. */
1328 int resume_all = ptid_equal (ptid, minus_one_ptid);
1329
1330 /* If we're continuing all threads, it's the current inferior that
1331 should be handled specially. */
1332 if (resume_all)
1333 ptid = inferior_ptid;
a244bdca 1334
a493e3e2 1335 if (sig != GDB_SIGNAL_0)
a244bdca
CF
1336 {
1337 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
1338 {
1339 DEBUG_EXCEPT(("Cannot continue with signal %d here.\n",sig));
1340 }
1341 else if (sig == last_sig)
1342 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1343 else
1344#if 0
1345/* This code does not seem to work, because
1346 the kernel does probably not consider changes in the ExceptionRecord
1347 structure when passing the exception to the inferior.
1348 Note that this seems possible in the exception handler itself. */
1349 {
1350 int i;
1351 for (i = 0; xlate[i].them != -1; i++)
1352 if (xlate[i].us == sig)
1353 {
581e13c1
MS
1354 current_event.u.Exception.ExceptionRecord.ExceptionCode
1355 = xlate[i].them;
a244bdca
CF
1356 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1357 break;
1358 }
1359 if (continue_status == DBG_CONTINUE)
1360 {
1361 DEBUG_EXCEPT(("Cannot continue with signal %d.\n",sig));
1362 }
1363 }
1364#endif
1365 DEBUG_EXCEPT(("Can only continue with recieved signal %d.\n",
1366 last_sig));
1367 }
1368
a493e3e2 1369 last_sig = GDB_SIGNAL_0;
a244bdca 1370
dc05df57 1371 DEBUG_EXEC (("gdb: windows_resume (pid=%d, tid=%ld, step=%d, sig=%d);\n",
2dc38344 1372 ptid_get_pid (ptid), ptid_get_tid (ptid), step, sig));
a244bdca 1373
581e13c1 1374 /* Get context for currently selected thread. */
2dc38344 1375 th = thread_rec (ptid_get_tid (inferior_ptid), FALSE);
a244bdca
CF
1376 if (th)
1377 {
1378 if (step)
1379 {
581e13c1 1380 /* Single step by setting t bit. */
a97b0ac8
UW
1381 struct regcache *regcache = get_current_regcache ();
1382 struct gdbarch *gdbarch = get_regcache_arch (regcache);
1383 windows_fetch_inferior_registers (ops, regcache,
1384 gdbarch_ps_regnum (gdbarch));
a244bdca
CF
1385 th->context.EFlags |= FLAG_TRACE_BIT;
1386 }
1387
1388 if (th->context.ContextFlags)
1389 {
1390 if (debug_registers_changed)
1391 {
1392 th->context.Dr0 = dr[0];
1393 th->context.Dr1 = dr[1];
1394 th->context.Dr2 = dr[2];
1395 th->context.Dr3 = dr[3];
6537bb24 1396 th->context.Dr6 = DR6_CLEAR_VALUE;
a244bdca
CF
1397 th->context.Dr7 = dr[7];
1398 }
1399 CHECK (SetThreadContext (th->h, &th->context));
1400 th->context.ContextFlags = 0;
1401 }
1402 }
1403
1404 /* Allow continuing with the same signal that interrupted us.
581e13c1 1405 Otherwise complain. */
a244bdca 1406
2dc38344 1407 if (resume_all)
dc05df57 1408 windows_continue (continue_status, -1);
2dc38344 1409 else
dc05df57 1410 windows_continue (continue_status, ptid_get_tid (ptid));
a244bdca
CF
1411}
1412
695de547
CF
1413/* Ctrl-C handler used when the inferior is not run in the same console. The
1414 handler is in charge of interrupting the inferior using DebugBreakProcess.
1415 Note that this function is not available prior to Windows XP. In this case
1416 we emit a warning. */
d603d4b3 1417static BOOL WINAPI
695de547
CF
1418ctrl_c_handler (DWORD event_type)
1419{
1420 const int attach_flag = current_inferior ()->attach_flag;
1421
bb0613a5
PM
1422 /* Only handle Ctrl-C and Ctrl-Break events. Ignore others. */
1423 if (event_type != CTRL_C_EVENT && event_type != CTRL_BREAK_EVENT)
695de547
CF
1424 return FALSE;
1425
1426 /* If the inferior and the debugger share the same console, do nothing as
1427 the inferior has also received the Ctrl-C event. */
1428 if (!new_console && !attach_flag)
1429 return TRUE;
1430
1431 if (!DebugBreakProcess (current_process_handle))
581e13c1
MS
1432 warning (_("Could not interrupt program. "
1433 "Press Ctrl-c in the program console."));
695de547
CF
1434
1435 /* Return true to tell that Ctrl-C has been handled. */
1436 return TRUE;
1437}
1438
8a892701 1439/* Get the next event from the child. Return 1 if the event requires
695de547 1440 handling by WFI (or whatever). */
1e37c281 1441static int
28439f5e
PA
1442get_windows_debug_event (struct target_ops *ops,
1443 int pid, struct target_waitstatus *ourstatus)
1e37c281
JM
1444{
1445 BOOL debug_event;
8a892701 1446 DWORD continue_status, event_code;
87a45c96 1447 thread_info *th;
8a892701 1448 static thread_info dummy_thread_info;
450005e7 1449 int retval = 0;
1e37c281 1450
a493e3e2 1451 last_sig = GDB_SIGNAL_0;
9d3789f7 1452
8a892701 1453 if (!(debug_event = WaitForDebugEvent (&current_event, 1000)))
29fe111d 1454 goto out;
1e37c281
JM
1455
1456 event_count++;
1457 continue_status = DBG_CONTINUE;
1e37c281 1458
8a892701 1459 event_code = current_event.dwDebugEventCode;
450005e7 1460 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
87a45c96 1461 th = NULL;
a244bdca 1462 have_saved_context = 0;
8a892701
CF
1463
1464 switch (event_code)
1e37c281
JM
1465 {
1466 case CREATE_THREAD_DEBUG_EVENT:
d50a0ce2 1467 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1468 (unsigned) current_event.dwProcessId,
1469 (unsigned) current_event.dwThreadId,
1470 "CREATE_THREAD_DEBUG_EVENT"));
dfe7f3ac 1471 if (saw_create != 1)
3ade5333 1472 {
181e7f93
PA
1473 struct inferior *inf;
1474 inf = find_inferior_pid (current_event.dwProcessId);
1475 if (!saw_create && inf->attach_flag)
3ade5333 1476 {
d6dc8049
CF
1477 /* Kludge around a Windows bug where first event is a create
1478 thread event. Caused when attached process does not have
581e13c1 1479 a main thread. */
3a3e9ee3 1480 retval = fake_create_process ();
181e7f93
PA
1481 if (retval)
1482 saw_create++;
3ade5333
CF
1483 }
1484 break;
1485 }
581e13c1 1486 /* Record the existence of this thread. */
450005e7 1487 retval = current_event.dwThreadId;
dc05df57 1488 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1489 current_event.dwThreadId),
711e434b
PM
1490 current_event.u.CreateThread.hThread,
1491 current_event.u.CreateThread.lpThreadLocalBase);
1492
1e37c281
JM
1493 break;
1494
1495 case EXIT_THREAD_DEBUG_EVENT:
d50a0ce2 1496 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1497 (unsigned) current_event.dwProcessId,
1498 (unsigned) current_event.dwThreadId,
1499 "EXIT_THREAD_DEBUG_EVENT"));
b3c613f2 1500
87a45c96
CF
1501 if (current_event.dwThreadId != main_thread_id)
1502 {
dc05df57 1503 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
e0ea48a0
EZ
1504 current_event.dwThreadId),
1505 current_event.u.ExitThread.dwExitCode);
87a45c96
CF
1506 th = &dummy_thread_info;
1507 }
1e37c281
JM
1508 break;
1509
1510 case CREATE_PROCESS_DEBUG_EVENT:
d50a0ce2 1511 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1512 (unsigned) current_event.dwProcessId,
1513 (unsigned) current_event.dwThreadId,
1514 "CREATE_PROCESS_DEBUG_EVENT"));
700b351b 1515 CloseHandle (current_event.u.CreateProcessInfo.hFile);
dfe7f3ac 1516 if (++saw_create != 1)
bf25528d 1517 break;
1e37c281 1518
dfe7f3ac 1519 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
87a45c96 1520 if (main_thread_id)
695de547 1521 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
e0ea48a0
EZ
1522 main_thread_id),
1523 0);
9d3789f7 1524 main_thread_id = current_event.dwThreadId;
581e13c1 1525 /* Add the main thread. */
dc05df57 1526 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
695de547 1527 current_event.dwThreadId),
711e434b
PM
1528 current_event.u.CreateProcessInfo.hThread,
1529 current_event.u.CreateProcessInfo.lpThreadLocalBase);
3a3e9ee3 1530 retval = current_event.dwThreadId;
1e37c281
JM
1531 break;
1532
1533 case EXIT_PROCESS_DEBUG_EVENT:
d50a0ce2 1534 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1535 (unsigned) current_event.dwProcessId,
1536 (unsigned) current_event.dwThreadId,
1537 "EXIT_PROCESS_DEBUG_EVENT"));
16d905e2
CF
1538 if (!windows_initialization_done)
1539 {
1540 target_terminal_ours ();
1541 target_mourn_inferior ();
1542 error (_("During startup program exited with code 0x%x."),
1543 (unsigned int) current_event.u.ExitProcess.dwExitCode);
1544 }
1545 else if (saw_create == 1)
1546 {
1547 ourstatus->kind = TARGET_WAITKIND_EXITED;
1548 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
1549 retval = main_thread_id;
1550 }
8a892701 1551 break;
1e37c281
JM
1552
1553 case LOAD_DLL_DEBUG_EVENT:
d50a0ce2 1554 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1555 (unsigned) current_event.dwProcessId,
1556 (unsigned) current_event.dwThreadId,
1557 "LOAD_DLL_DEBUG_EVENT"));
700b351b 1558 CloseHandle (current_event.u.LoadDll.hFile);
dfe7f3ac
CF
1559 if (saw_create != 1)
1560 break;
8a892701 1561 catch_errors (handle_load_dll, NULL, (char *) "", RETURN_MASK_ALL);
450005e7
CF
1562 ourstatus->kind = TARGET_WAITKIND_LOADED;
1563 ourstatus->value.integer = 0;
9d3789f7 1564 retval = main_thread_id;
1e37c281
JM
1565 break;
1566
1567 case UNLOAD_DLL_DEBUG_EVENT:
d50a0ce2 1568 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1569 (unsigned) current_event.dwProcessId,
1570 (unsigned) current_event.dwThreadId,
1571 "UNLOAD_DLL_DEBUG_EVENT"));
dfe7f3ac
CF
1572 if (saw_create != 1)
1573 break;
d3ff4a77 1574 catch_errors (handle_unload_dll, NULL, (char *) "", RETURN_MASK_ALL);
de1b3c3d
PA
1575 ourstatus->kind = TARGET_WAITKIND_LOADED;
1576 ourstatus->value.integer = 0;
1577 retval = main_thread_id;
d3ff4a77 1578 break;
1e37c281
JM
1579
1580 case EXCEPTION_DEBUG_EVENT:
d50a0ce2 1581 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1582 (unsigned) current_event.dwProcessId,
1583 (unsigned) current_event.dwThreadId,
1584 "EXCEPTION_DEBUG_EVENT"));
dfe7f3ac
CF
1585 if (saw_create != 1)
1586 break;
a244bdca
CF
1587 switch (handle_exception (ourstatus))
1588 {
1589 case 0:
1590 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1591 break;
1592 case 1:
1593 retval = current_event.dwThreadId;
1594 break;
1595 case -1:
1596 last_sig = 1;
1597 continue_status = -1;
1598 break;
1599 }
1e37c281
JM
1600 break;
1601
581e13c1 1602 case OUTPUT_DEBUG_STRING_EVENT: /* Message from the kernel. */
d50a0ce2 1603 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=%x code=%s)\n",
8a892701
CF
1604 (unsigned) current_event.dwProcessId,
1605 (unsigned) current_event.dwThreadId,
1606 "OUTPUT_DEBUG_STRING_EVENT"));
dfe7f3ac
CF
1607 if (saw_create != 1)
1608 break;
a244bdca 1609 retval = handle_output_debug_string (ourstatus);
1e37c281 1610 break;
9d3789f7 1611
1e37c281 1612 default:
dfe7f3ac
CF
1613 if (saw_create != 1)
1614 break;
d50a0ce2
CV
1615 printf_unfiltered ("gdb: kernel event for pid=%u tid=%x\n",
1616 (unsigned) current_event.dwProcessId,
1617 (unsigned) current_event.dwThreadId);
1618 printf_unfiltered (" unknown event code %u\n",
1619 (unsigned) current_event.dwDebugEventCode);
1e37c281
JM
1620 break;
1621 }
1622
dfe7f3ac 1623 if (!retval || saw_create != 1)
a244bdca
CF
1624 {
1625 if (continue_status == -1)
02529b48 1626 windows_resume (ops, minus_one_ptid, 0, 1);
a244bdca 1627 else
dc05df57 1628 CHECK (windows_continue (continue_status, -1));
a244bdca 1629 }
450005e7 1630 else
9d3789f7 1631 {
2dc38344
PA
1632 inferior_ptid = ptid_build (current_event.dwProcessId, 0,
1633 retval);
3ade5333 1634 current_thread = th ?: thread_rec (current_event.dwThreadId, TRUE);
9d3789f7 1635 }
1e37c281
JM
1636
1637out:
450005e7 1638 return retval;
1e37c281
JM
1639}
1640
2dc38344 1641/* Wait for interesting events to occur in the target process. */
39f77062 1642static ptid_t
117de6a9 1643windows_wait (struct target_ops *ops,
47608cb1 1644 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
24e60978 1645{
2dc38344 1646 int pid = -1;
39f77062 1647
c44537cf
CV
1648 target_terminal_ours ();
1649
24e60978
SC
1650 /* We loop when we get a non-standard exception rather than return
1651 with a SPURIOUS because resume can try and step or modify things,
3cee93ac 1652 which needs a current_thread->h. But some of these exceptions mark
24e60978 1653 the birth or death of threads, which mean that the current thread
581e13c1 1654 isn't necessarily what you think it is. */
24e60978
SC
1655
1656 while (1)
450005e7 1657 {
c57918b2 1658 int retval;
2b008701 1659
695de547
CF
1660 /* If the user presses Ctrl-c while the debugger is waiting
1661 for an event, he expects the debugger to interrupt his program
1662 and to get the prompt back. There are two possible situations:
1663
1664 - The debugger and the program do not share the console, in
1665 which case the Ctrl-c event only reached the debugger.
1666 In that case, the ctrl_c handler will take care of interrupting
581e13c1
MS
1667 the inferior. Note that this case is working starting with
1668 Windows XP. For Windows 2000, Ctrl-C should be pressed in the
695de547
CF
1669 inferior console.
1670
1671 - The debugger and the program share the same console, in which
1672 case both debugger and inferior will receive the Ctrl-c event.
1673 In that case the ctrl_c handler will ignore the event, as the
1674 Ctrl-c event generated inside the inferior will trigger the
1675 expected debug event.
1676
1677 FIXME: brobecker/2008-05-20: If the inferior receives the
1678 signal first and the delay until GDB receives that signal
1679 is sufficiently long, GDB can sometimes receive the SIGINT
1680 after we have unblocked the CTRL+C handler. This would
1681 lead to the debugger stopping prematurely while handling
1682 the new-thread event that comes with the handling of the SIGINT
1683 inside the inferior, and then stop again immediately when
1684 the user tries to resume the execution in the inferior.
1685 This is a classic race that we should try to fix one day. */
1686 SetConsoleCtrlHandler (&ctrl_c_handler, TRUE);
28439f5e 1687 retval = get_windows_debug_event (ops, pid, ourstatus);
695de547 1688 SetConsoleCtrlHandler (&ctrl_c_handler, FALSE);
c57918b2 1689
450005e7 1690 if (retval)
2dc38344 1691 return ptid_build (current_event.dwProcessId, 0, retval);
450005e7
CF
1692 else
1693 {
1694 int detach = 0;
3cee93ac 1695
98bbd631
AC
1696 if (deprecated_ui_loop_hook != NULL)
1697 detach = deprecated_ui_loop_hook (0);
0714f9bf 1698
450005e7 1699 if (detach)
7d85a9c0 1700 windows_kill_inferior (ops);
450005e7
CF
1701 }
1702 }
24e60978
SC
1703}
1704
9d3789f7 1705static void
dc05df57 1706do_initial_windows_stuff (struct target_ops *ops, DWORD pid, int attaching)
9d3789f7
CF
1707{
1708 extern int stop_after_trap;
fa4ba8da 1709 int i;
d6b48e9c 1710 struct inferior *inf;
2020b7ab 1711 struct thread_info *tp;
9d3789f7 1712
a493e3e2 1713 last_sig = GDB_SIGNAL_0;
9d3789f7
CF
1714 event_count = 0;
1715 exception_count = 0;
bf25528d 1716 open_process_used = 0;
fa4ba8da 1717 debug_registers_changed = 0;
dfe7f3ac 1718 debug_registers_used = 0;
fa4ba8da
PM
1719 for (i = 0; i < sizeof (dr) / sizeof (dr[0]); i++)
1720 dr[i] = 0;
10325bc5 1721#ifdef __CYGWIN__
de1b3c3d 1722 cygwin_load_start = cygwin_load_end = 0;
10325bc5 1723#endif
9d3789f7
CF
1724 current_event.dwProcessId = pid;
1725 memset (&current_event, 0, sizeof (current_event));
0795be10 1726 push_target (ops);
cb851954 1727 disable_breakpoints_in_shlibs ();
dc05df57 1728 windows_clear_solib ();
9d3789f7
CF
1729 clear_proceed_status ();
1730 init_wait_for_inferior ();
1731
6c95b8df
PA
1732 inf = current_inferior ();
1733 inferior_appeared (inf, pid);
181e7f93 1734 inf->attach_flag = attaching;
7f9f62ba 1735
9f9d052e
PM
1736 /* Make the new process the current inferior, so terminal handling
1737 can rely on it. When attaching, we don't know about any thread
1738 id here, but that's OK --- nothing should be referencing the
dc05df57 1739 current thread until we report an event out of windows_wait. */
9f9d052e
PM
1740 inferior_ptid = pid_to_ptid (pid);
1741
c44537cf 1742 terminal_init_inferior_with_pgrp (pid);
9d3789f7
CF
1743 target_terminal_inferior ();
1744
16d905e2 1745 windows_initialization_done = 0;
16c381f0 1746 inf->control.stop_soon = STOP_QUIETLY;
9d3789f7
CF
1747 while (1)
1748 {
1749 stop_after_trap = 1;
e4c8541f 1750 wait_for_inferior ();
2020b7ab 1751 tp = inferior_thread ();
a493e3e2 1752 if (tp->suspend.stop_signal != GDB_SIGNAL_TRAP)
16c381f0 1753 resume (0, tp->suspend.stop_signal);
9d3789f7
CF
1754 else
1755 break;
1756 }
eff8332b 1757
16d905e2 1758 windows_initialization_done = 1;
16c381f0 1759 inf->control.stop_soon = NO_STOP_QUIETLY;
9d3789f7
CF
1760 stop_after_trap = 0;
1761 return;
1762}
1763
616a9dc4
CV
1764/* Try to set or remove a user privilege to the current process. Return -1
1765 if that fails, the previous setting of that privilege otherwise.
1766
1767 This code is copied from the Cygwin source code and rearranged to allow
1768 dynamically loading of the needed symbols from advapi32 which is only
581e13c1 1769 available on NT/2K/XP. */
616a9dc4
CV
1770static int
1771set_process_privilege (const char *privilege, BOOL enable)
1772{
616a9dc4
CV
1773 HANDLE token_hdl = NULL;
1774 LUID restore_priv;
1775 TOKEN_PRIVILEGES new_priv, orig_priv;
1776 int ret = -1;
1777 DWORD size;
1778
616a9dc4
CV
1779 if (!OpenProcessToken (GetCurrentProcess (),
1780 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
1781 &token_hdl))
1782 goto out;
1783
418c6cb3 1784 if (!LookupPrivilegeValueA (NULL, privilege, &restore_priv))
616a9dc4
CV
1785 goto out;
1786
1787 new_priv.PrivilegeCount = 1;
1788 new_priv.Privileges[0].Luid = restore_priv;
1789 new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0;
1790
1791 if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv,
295732ea 1792 sizeof orig_priv, &orig_priv, &size))
616a9dc4
CV
1793 goto out;
1794#if 0
1795 /* Disabled, otherwise every `attach' in an unprivileged user session
1796 would raise the "Failed to get SE_DEBUG_NAME privilege" warning in
581e13c1 1797 windows_attach(). */
616a9dc4 1798 /* AdjustTokenPrivileges returns TRUE even if the privilege could not
581e13c1 1799 be enabled. GetLastError () returns an correct error code, though. */
616a9dc4
CV
1800 if (enable && GetLastError () == ERROR_NOT_ALL_ASSIGNED)
1801 goto out;
1802#endif
1803
1804 ret = orig_priv.Privileges[0].Attributes == SE_PRIVILEGE_ENABLED ? 1 : 0;
1805
1806out:
1807 if (token_hdl)
1808 CloseHandle (token_hdl);
1809
1810 return ret;
1811}
1812
02cc9f49 1813/* Attach to process PID, then initialize for debugging it. */
24e60978 1814static void
dc05df57 1815windows_attach (struct target_ops *ops, char *args, int from_tty)
24e60978
SC
1816{
1817 BOOL ok;
559e75c0 1818 DWORD pid;
24e60978 1819
74164c56 1820 pid = parse_pid_to_attach (args);
24e60978 1821
616a9dc4
CV
1822 if (set_process_privilege (SE_DEBUG_NAME, TRUE) < 0)
1823 {
1824 printf_unfiltered ("Warning: Failed to get SE_DEBUG_NAME privilege\n");
581e13c1
MS
1825 printf_unfiltered ("This can cause attach to "
1826 "fail on Windows NT/2K/XP\n");
616a9dc4
CV
1827 }
1828
dc05df57 1829 windows_init_thread_list ();
9d3789f7 1830 ok = DebugActiveProcess (pid);
91a175b3 1831 saw_create = 0;
24e60978 1832
10325bc5 1833#ifdef __CYGWIN__
24e60978 1834 if (!ok)
baa93fa6 1835 {
581e13c1 1836 /* Try fall back to Cygwin pid. */
baa93fa6
CF
1837 pid = cygwin_internal (CW_CYGWIN_PID_TO_WINPID, pid);
1838
1839 if (pid > 0)
1840 ok = DebugActiveProcess (pid);
10325bc5
PA
1841 }
1842#endif
baa93fa6 1843
10325bc5
PA
1844 if (!ok)
1845 error (_("Can't attach to process."));
24e60978 1846
2b008701 1847 DebugSetProcessKillOnExit (FALSE);
3ade5333 1848
24e60978
SC
1849 if (from_tty)
1850 {
1851 char *exec_file = (char *) get_exec_file (0);
1852
1853 if (exec_file)
1854 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
39f77062 1855 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1856 else
1857 printf_unfiltered ("Attaching to %s\n",
39f77062 1858 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1859
1860 gdb_flush (gdb_stdout);
1861 }
1862
dc05df57 1863 do_initial_windows_stuff (ops, pid, 1);
9d3789f7 1864 target_terminal_ours ();
24e60978
SC
1865}
1866
24e60978 1867static void
dc05df57 1868windows_detach (struct target_ops *ops, char *args, int from_tty)
24e60978 1869{
02cc9f49
CV
1870 int detached = 1;
1871
2b008701 1872 ptid_t ptid = {-1};
a493e3e2 1873 windows_resume (ops, ptid, 0, GDB_SIGNAL_0);
96998ce7 1874
2b008701
CF
1875 if (!DebugActiveProcessStop (current_event.dwProcessId))
1876 {
d50a0ce2
CV
1877 error (_("Can't detach process %u (error %u)"),
1878 (unsigned) current_event.dwProcessId, (unsigned) GetLastError ());
2b008701 1879 detached = 0;
02cc9f49 1880 }
2b008701
CF
1881 DebugSetProcessKillOnExit (FALSE);
1882
02cc9f49 1883 if (detached && from_tty)
24e60978
SC
1884 {
1885 char *exec_file = get_exec_file (0);
1886 if (exec_file == 0)
1887 exec_file = "";
d50a0ce2
CV
1888 printf_unfiltered ("Detaching from program: %s, Pid %u\n", exec_file,
1889 (unsigned) current_event.dwProcessId);
24e60978
SC
1890 gdb_flush (gdb_stdout);
1891 }
7f9f62ba 1892
26cb8b7c 1893 i386_cleanup_dregs ();
39f77062 1894 inferior_ptid = null_ptid;
7f9f62ba
PA
1895 detach_inferior (current_event.dwProcessId);
1896
0795be10 1897 unpush_target (ops);
24e60978
SC
1898}
1899
3ee6f623 1900static char *
dc05df57 1901windows_pid_to_exec_file (int pid)
47216e51 1902{
b3c613f2 1903 static char path[__PMAX];
10325bc5 1904#ifdef __CYGWIN__
581e13c1 1905 /* Try to find exe name as symlink target of /proc/<pid>/exe. */
33605d39
CF
1906 int nchars;
1907 char procexe[sizeof ("/proc/4294967295/exe")];
08850b56
PM
1908
1909 xsnprintf (procexe, sizeof (procexe), "/proc/%u/exe", pid);
33605d39
CF
1910 nchars = readlink (procexe, path, sizeof(path));
1911 if (nchars > 0 && nchars < sizeof (path))
47216e51 1912 {
33605d39
CF
1913 path[nchars] = '\0'; /* Got it */
1914 return path;
47216e51 1915 }
10325bc5
PA
1916#endif
1917
33605d39 1918 /* If we get here then either Cygwin is hosed, this isn't a Cygwin version
581e13c1 1919 of gdb, or we're trying to debug a non-Cygwin windows executable. */
33605d39
CF
1920 if (!get_module_name (0, path))
1921 path[0] = '\0';
1922
1923 return path;
47216e51
CV
1924}
1925
24e60978
SC
1926/* Print status information about what we're accessing. */
1927
1928static void
dc05df57 1929windows_files_info (struct target_ops *ignore)
24e60978 1930{
181e7f93
PA
1931 struct inferior *inf = current_inferior ();
1932
24e60978 1933 printf_unfiltered ("\tUsing the running image of %s %s.\n",
181e7f93
PA
1934 inf->attach_flag ? "attached" : "child",
1935 target_pid_to_str (inferior_ptid));
24e60978
SC
1936}
1937
24e60978 1938static void
dc05df57 1939windows_open (char *arg, int from_tty)
24e60978 1940{
8a3fe4f8 1941 error (_("Use the \"run\" command to start a Unix child process."));
24e60978
SC
1942}
1943
cd44747c
PM
1944/* Modify CreateProcess parameters for use of a new separate console.
1945 Parameters are:
1946 *FLAGS: DWORD parameter for general process creation flags.
1947 *SI: STARTUPINFO structure, for which the console window size and
1948 console buffer size is filled in if GDB is running in a console.
1949 to create the new console.
1950 The size of the used font is not available on all versions of
1951 Windows OS. Furthermore, the current font might not be the default
1952 font, but this is still better than before.
1953 If the windows and buffer sizes are computed,
1954 SI->DWFLAGS is changed so that this information is used
1955 by CreateProcess function. */
1956
1957static void
1958windows_set_console_info (STARTUPINFO *si, DWORD *flags)
1959{
1960 HANDLE hconsole = CreateFile ("CONOUT$", GENERIC_READ | GENERIC_WRITE,
1961 FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, 0);
1962
1963 if (hconsole != INVALID_HANDLE_VALUE)
1964 {
1965 CONSOLE_SCREEN_BUFFER_INFO sbinfo;
1966 COORD font_size;
1967 CONSOLE_FONT_INFO cfi;
1968
1969 GetCurrentConsoleFont (hconsole, FALSE, &cfi);
1970 font_size = GetConsoleFontSize (hconsole, cfi.nFont);
1971 GetConsoleScreenBufferInfo(hconsole, &sbinfo);
1972 si->dwXSize = sbinfo.srWindow.Right - sbinfo.srWindow.Left + 1;
1973 si->dwYSize = sbinfo.srWindow.Bottom - sbinfo.srWindow.Top + 1;
1974 if (font_size.X)
1975 si->dwXSize *= font_size.X;
1976 else
1977 si->dwXSize *= 8;
1978 if (font_size.Y)
1979 si->dwYSize *= font_size.Y;
1980 else
1981 si->dwYSize *= 12;
1982 si->dwXCountChars = sbinfo.dwSize.X;
1983 si->dwYCountChars = sbinfo.dwSize.Y;
1984 si->dwFlags |= STARTF_USESIZE | STARTF_USECOUNTCHARS;
1985 }
1986 *flags |= CREATE_NEW_CONSOLE;
1987}
1988
c93dbcba
EZ
1989#ifndef __CYGWIN__
1990/* Function called by qsort to sort environment strings. */
1991
1992static int
1993envvar_cmp (const void *a, const void *b)
1994{
1995 const char **p = (const char **) a;
1996 const char **q = (const char **) b;
1997 return strcasecmp (*p, *q);
1998}
1999#endif
2000
b7ff339d
CV
2001#ifdef __CYGWIN__
2002static void
2003clear_win32_environment (char **env)
2004{
2005 int i;
2006 size_t len;
2007 wchar_t *copy = NULL, *equalpos;
2008
2009 for (i = 0; env[i] && *env[i]; i++)
2010 {
2011 len = mbstowcs (NULL, env[i], 0) + 1;
2012 copy = (wchar_t *) xrealloc (copy, len * sizeof (wchar_t));
2013 mbstowcs (copy, env[i], len);
2014 equalpos = wcschr (copy, L'=');
2015 if (equalpos)
2016 *equalpos = L'\0';
2017 SetEnvironmentVariableW (copy, NULL);
2018 }
2019 xfree (copy);
2020}
2021#endif
2022
dc05df57 2023/* Start an inferior windows child process and sets inferior_ptid to its pid.
24e60978
SC
2024 EXEC_FILE is the file to run.
2025 ALLARGS is a string containing the arguments to the program.
2026 ENV is the environment vector to pass. Errors reported with error(). */
2027
24e60978 2028static void
dc05df57 2029windows_create_inferior (struct target_ops *ops, char *exec_file,
136d6dae 2030 char *allargs, char **in_env, int from_tty)
24e60978 2031{
b3c613f2 2032 STARTUPINFO si;
41b4aadc 2033#ifdef __CYGWIN__
b3c613f2
CF
2034 cygwin_buf_t real_path[__PMAX];
2035 cygwin_buf_t shell[__PMAX]; /* Path to shell */
d0d0ab16 2036 const char *sh;
b3c613f2
CF
2037 cygwin_buf_t *toexec;
2038 cygwin_buf_t *cygallargs;
2039 cygwin_buf_t *args;
b7ff339d
CV
2040 char **old_env = NULL;
2041 PWCHAR w32_env;
d0d0ab16 2042 size_t len;
2becadee
CF
2043 int tty;
2044 int ostdin, ostdout, ostderr;
41b4aadc 2045#else
b3c613f2
CF
2046 char real_path[__PMAX];
2047 char shell[__PMAX]; /* Path to shell */
d0d0ab16
CV
2048 char *toexec;
2049 char *args;
8f205f9c 2050 size_t args_len;
41b4aadc 2051 HANDLE tty;
c93dbcba
EZ
2052 char *w32env;
2053 char *temp;
2054 size_t envlen;
2055 int i;
2056 size_t envsize;
2057 char **env;
41b4aadc 2058#endif
d0d0ab16
CV
2059 PROCESS_INFORMATION pi;
2060 BOOL ret;
2061 DWORD flags = 0;
3cb3b8df 2062 const char *inferior_io_terminal = get_inferior_io_terminal ();
24e60978
SC
2063
2064 if (!exec_file)
8a3fe4f8 2065 error (_("No executable specified, use `target exec'."));
24e60978
SC
2066
2067 memset (&si, 0, sizeof (si));
2068 si.cb = sizeof (si);
2069
d0d0ab16
CV
2070 if (new_group)
2071 flags |= CREATE_NEW_PROCESS_GROUP;
2072
2073 if (new_console)
cd44747c 2074 windows_set_console_info (&si, &flags);
d0d0ab16 2075
10325bc5 2076#ifdef __CYGWIN__
349b409f 2077 if (!useshell)
dfe7f3ac 2078 {
d0d0ab16
CV
2079 flags |= DEBUG_ONLY_THIS_PROCESS;
2080 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, exec_file, real_path,
b3c613f2 2081 __PMAX * sizeof (cygwin_buf_t)) < 0)
d0d0ab16 2082 error (_("Error starting executable: %d"), errno);
dfe7f3ac 2083 toexec = real_path;
b3c613f2 2084#ifdef __USEWIDE
d0d0ab16
CV
2085 len = mbstowcs (NULL, allargs, 0) + 1;
2086 if (len == (size_t) -1)
2087 error (_("Error starting executable: %d"), errno);
2088 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2089 mbstowcs (cygallargs, allargs, len);
60c5c021
CF
2090#else
2091 cygallargs = allargs;
b3c613f2 2092#endif
dfe7f3ac
CF
2093 }
2094 else
2095 {
349b409f
CF
2096 sh = getenv ("SHELL");
2097 if (!sh)
2098 sh = "/bin/sh";
b3c613f2 2099 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, sh, shell, __PMAX) < 0)
d0d0ab16 2100 error (_("Error starting executable via shell: %d"), errno);
b3c613f2 2101#ifdef __USEWIDE
d0d0ab16
CV
2102 len = sizeof (L" -c 'exec '") + mbstowcs (NULL, exec_file, 0)
2103 + mbstowcs (NULL, allargs, 0) + 2;
2104 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2105 swprintf (cygallargs, len, L" -c 'exec %s %s'", exec_file, allargs);
b3c613f2 2106#else
08850b56
PM
2107 len = (sizeof (" -c 'exec '") + strlen (exec_file)
2108 + strlen (allargs) + 2);
2109 cygallargs = (char *) alloca (len);
2110 xsnprintf (cygallargs, len, " -c 'exec %s %s'", exec_file, allargs);
b3c613f2 2111#endif
dfe7f3ac 2112 toexec = shell;
d0d0ab16 2113 flags |= DEBUG_PROCESS;
dfe7f3ac 2114 }
b3c613f2
CF
2115
2116#ifdef __USEWIDE
2117 args = (cygwin_buf_t *) alloca ((wcslen (toexec) + wcslen (cygallargs) + 2)
2118 * sizeof (wchar_t));
d0d0ab16
CV
2119 wcscpy (args, toexec);
2120 wcscat (args, L" ");
2121 wcscat (args, cygallargs);
b3c613f2
CF
2122#else
2123 args = (cygwin_buf_t *) alloca (strlen (toexec) + strlen (cygallargs) + 2);
2124 strcpy (args, toexec);
2125 strcat (args, " ");
2126 strcat (args, cygallargs);
2127#endif
2128
b7ff339d
CV
2129#ifdef CW_CVT_ENV_TO_WINENV
2130 /* First try to create a direct Win32 copy of the POSIX environment. */
2131 w32_env = (PWCHAR) cygwin_internal (CW_CVT_ENV_TO_WINENV, in_env);
2132 if (w32_env != (PWCHAR) -1)
2133 flags |= CREATE_UNICODE_ENVIRONMENT;
2134 else
2135 /* If that fails, fall back to old method tweaking GDB's environment. */
2136#endif
2137 {
2138 /* Reset all Win32 environment variables to avoid leftover on next run. */
2139 clear_win32_environment (environ);
2140 /* Prepare the environment vars for CreateProcess. */
2141 old_env = environ;
2142 environ = in_env;
2143 cygwin_internal (CW_SYNC_WINENV);
2144 w32_env = NULL;
2145 }
1750a5ef 2146
2becadee
CF
2147 if (!inferior_io_terminal)
2148 tty = ostdin = ostdout = ostderr = -1;
2149 else
2150 {
2151 tty = open (inferior_io_terminal, O_RDWR | O_NOCTTY);
2152 if (tty < 0)
2153 {
2154 print_sys_errmsg (inferior_io_terminal, errno);
2155 ostdin = ostdout = ostderr = -1;
2156 }
2157 else
2158 {
2159 ostdin = dup (0);
2160 ostdout = dup (1);
2161 ostderr = dup (2);
2162 dup2 (tty, 0);
2163 dup2 (tty, 1);
2164 dup2 (tty, 2);
2165 }
2166 }
d0d0ab16
CV
2167
2168 windows_init_thread_list ();
b3c613f2
CF
2169 ret = CreateProcess (0,
2170 args, /* command line */
2171 NULL, /* Security */
2172 NULL, /* thread */
2173 TRUE, /* inherit handles */
2174 flags, /* start flags */
b7ff339d 2175 w32_env, /* environment */
b3c613f2
CF
2176 NULL, /* current directory */
2177 &si,
2178 &pi);
b7ff339d
CV
2179 if (w32_env)
2180 /* Just free the Win32 environment, if it could be created. */
2181 free (w32_env);
2182 else
2183 {
2184 /* Reset all environment variables to avoid leftover on next run. */
2185 clear_win32_environment (in_env);
2186 /* Restore normal GDB environment variables. */
2187 environ = old_env;
2188 cygwin_internal (CW_SYNC_WINENV);
2189 }
2190
d0d0ab16
CV
2191 if (tty >= 0)
2192 {
2193 close (tty);
2194 dup2 (ostdin, 0);
2195 dup2 (ostdout, 1);
2196 dup2 (ostderr, 2);
2197 close (ostdin);
2198 close (ostdout);
2199 close (ostderr);
2200 }
41b4aadc 2201#else
b3c613f2 2202 toexec = exec_file;
8f205f9c
JB
2203 /* Build the command line, a space-separated list of tokens where
2204 the first token is the name of the module to be executed.
2205 To avoid ambiguities introduced by spaces in the module name,
2206 we quote it. */
2207 args_len = strlen (toexec) + 2 /* quotes */ + strlen (allargs) + 2;
2208 args = alloca (args_len);
2209 xsnprintf (args, args_len, "\"%s\" %s", toexec, allargs);
d0d0ab16 2210
d0d0ab16
CV
2211 flags |= DEBUG_ONLY_THIS_PROCESS;
2212
41b4aadc
CF
2213 if (!inferior_io_terminal)
2214 tty = INVALID_HANDLE_VALUE;
2215 else
2216 {
2217 SECURITY_ATTRIBUTES sa;
2218 sa.nLength = sizeof(sa);
2219 sa.lpSecurityDescriptor = 0;
2220 sa.bInheritHandle = TRUE;
2221 tty = CreateFileA (inferior_io_terminal, GENERIC_READ | GENERIC_WRITE,
2222 0, &sa, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
2223 if (tty == INVALID_HANDLE_VALUE)
2224 warning (_("Warning: Failed to open TTY %s, error %#x."),
2225 inferior_io_terminal, (unsigned) GetLastError ());
2226 else
2227 {
2228 si.hStdInput = tty;
2229 si.hStdOutput = tty;
2230 si.hStdError = tty;
2231 si.dwFlags |= STARTF_USESTDHANDLES;
2232 }
2233 }
2becadee 2234
c93dbcba
EZ
2235 /* CreateProcess takes the environment list as a null terminated set of
2236 strings (i.e. two nulls terminate the list). */
2237
2238 /* Get total size for env strings. */
2239 for (envlen = 0, i = 0; in_env[i] && *in_env[i]; i++)
2240 envlen += strlen (in_env[i]) + 1;
2241
2242 envsize = sizeof (in_env[0]) * (i + 1);
2243 env = (char **) alloca (envsize);
2244 memcpy (env, in_env, envsize);
2245 /* Windows programs expect the environment block to be sorted. */
2246 qsort (env, i, sizeof (char *), envvar_cmp);
2247
2248 w32env = alloca (envlen + 1);
2249
2250 /* Copy env strings into new buffer. */
2251 for (temp = w32env, i = 0; env[i] && *env[i]; i++)
2252 {
2253 strcpy (temp, env[i]);
2254 temp += strlen (temp) + 1;
2255 }
2256
2257 /* Final nil string to terminate new env. */
2258 *temp = 0;
2259
dc05df57 2260 windows_init_thread_list ();
d0d0ab16
CV
2261 ret = CreateProcessA (0,
2262 args, /* command line */
2263 NULL, /* Security */
2264 NULL, /* thread */
2265 TRUE, /* inherit handles */
2266 flags, /* start flags */
c93dbcba 2267 w32env, /* environment */
d0d0ab16
CV
2268 NULL, /* current directory */
2269 &si,
2270 &pi);
41b4aadc
CF
2271 if (tty != INVALID_HANDLE_VALUE)
2272 CloseHandle (tty);
10325bc5 2273#endif
2becadee 2274
24e60978 2275 if (!ret)
d50a0ce2 2276 error (_("Error creating process %s, (error %u)."),
8a3fe4f8 2277 exec_file, (unsigned) GetLastError ());
24e60978 2278
c1766e7d
PM
2279 CloseHandle (pi.hThread);
2280 CloseHandle (pi.hProcess);
2281
dfe7f3ac
CF
2282 if (useshell && shell[0] != '\0')
2283 saw_create = -1;
2284 else
2285 saw_create = 0;
2286
dc05df57 2287 do_initial_windows_stuff (ops, pi.dwProcessId, 0);
d3a09475 2288
dc05df57 2289 /* windows_continue (DBG_CONTINUE, -1); */
24e60978
SC
2290}
2291
2292static void
dc05df57 2293windows_mourn_inferior (struct target_ops *ops)
24e60978 2294{
dc05df57 2295 (void) windows_continue (DBG_CONTINUE, -1);
fa4ba8da 2296 i386_cleanup_dregs();
bf25528d
CF
2297 if (open_process_used)
2298 {
2299 CHECK (CloseHandle (current_process_handle));
2300 open_process_used = 0;
2301 }
0795be10 2302 unpush_target (ops);
24e60978
SC
2303 generic_mourn_inferior ();
2304}
2305
24e60978 2306/* Send a SIGINT to the process group. This acts just like the user typed a
581e13c1 2307 ^C on the controlling terminal. */
24e60978 2308
b607efe7 2309static void
dc05df57 2310windows_stop (ptid_t ptid)
24e60978 2311{
1ef980b9 2312 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
1e37c281 2313 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
3a4b77d8 2314 registers_changed (); /* refresh register state */
24e60978
SC
2315}
2316
3ee6f623 2317static int
dc05df57 2318windows_xfer_memory (CORE_ADDR memaddr, gdb_byte *our, int len,
0a65a603
AC
2319 int write, struct mem_attrib *mem,
2320 struct target_ops *target)
24e60978 2321{
5732a500 2322 SIZE_T done = 0;
24e60978
SC
2323 if (write)
2324 {
42f45f1a
KT
2325 DEBUG_MEM (("gdb: write target memory, %d bytes at %s\n",
2326 len, core_addr_to_string (memaddr)));
2b008701 2327 if (!WriteProcessMemory (current_process_handle,
2c647436 2328 (LPVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2329 len, &done))
2330 done = 0;
2b008701 2331 FlushInstructionCache (current_process_handle,
2c647436 2332 (LPCVOID) (uintptr_t) memaddr, len);
24e60978
SC
2333 }
2334 else
2335 {
42f45f1a
KT
2336 DEBUG_MEM (("gdb: read target memory, %d bytes at %s\n",
2337 len, core_addr_to_string (memaddr)));
2b008701 2338 if (!ReadProcessMemory (current_process_handle,
2c647436 2339 (LPCVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2340 len, &done))
2341 done = 0;
24e60978
SC
2342 }
2343 return done;
2344}
2345
3ee6f623 2346static void
7d85a9c0 2347windows_kill_inferior (struct target_ops *ops)
24e60978 2348{
3cee93ac
CF
2349 CHECK (TerminateProcess (current_process_handle, 0));
2350
b5edcb45
ILT
2351 for (;;)
2352 {
dc05df57 2353 if (!windows_continue (DBG_CONTINUE, -1))
b5edcb45 2354 break;
3cee93ac 2355 if (!WaitForDebugEvent (&current_event, INFINITE))
b5edcb45 2356 break;
3cee93ac 2357 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
b5edcb45
ILT
2358 break;
2359 }
2360
581e13c1 2361 target_mourn_inferior (); /* Or just windows_mourn_inferior? */
24e60978
SC
2362}
2363
24e60978 2364static void
dc05df57 2365windows_prepare_to_store (struct regcache *regcache)
24e60978 2366{
581e13c1 2367 /* Do nothing, since we can store individual regs. */
24e60978
SC
2368}
2369
2370static int
dc05df57 2371windows_can_run (void)
24e60978
SC
2372{
2373 return 1;
2374}
2375
2376static void
460014f5 2377windows_close (void)
24e60978 2378{
dc05df57 2379 DEBUG_EVENTS (("gdb: windows_close, inferior_ptid=%d\n",
3bccec63 2380 PIDGET (inferior_ptid)));
24e60978 2381}
1ef980b9 2382
581e13c1 2383/* Convert pid to printable format. */
3ee6f623 2384static char *
117de6a9 2385windows_pid_to_str (struct target_ops *ops, ptid_t ptid)
24e60978 2386{
3ee6f623 2387 static char buf[80];
3ee6f623 2388
2dc38344
PA
2389 if (ptid_get_tid (ptid) != 0)
2390 {
2391 snprintf (buf, sizeof (buf), "Thread %d.0x%lx",
2392 ptid_get_pid (ptid), ptid_get_tid (ptid));
2393 return buf;
2394 }
2395
2396 return normal_pid_to_str (ptid);
3ee6f623
CF
2397}
2398
de1b3c3d 2399static LONGEST
dc05df57 2400windows_xfer_shared_libraries (struct target_ops *ops,
de1b3c3d
PA
2401 enum target_object object, const char *annex,
2402 gdb_byte *readbuf, const gdb_byte *writebuf,
2403 ULONGEST offset, LONGEST len)
3cb8e7f6 2404{
de1b3c3d
PA
2405 struct obstack obstack;
2406 const char *buf;
2407 LONGEST len_avail;
3cb8e7f6 2408 struct so_list *so;
3cb8e7f6 2409
de1b3c3d
PA
2410 if (writebuf)
2411 return -1;
3cb8e7f6 2412
de1b3c3d
PA
2413 obstack_init (&obstack);
2414 obstack_grow_str (&obstack, "<library-list>\n");
2415 for (so = solib_start.next; so; so = so->next)
581e13c1
MS
2416 windows_xfer_shared_library (so->so_name, (CORE_ADDR)
2417 (uintptr_t) so->lm_info->load_addr,
f5656ead 2418 target_gdbarch (), &obstack);
de1b3c3d 2419 obstack_grow_str0 (&obstack, "</library-list>\n");
3cb8e7f6 2420
de1b3c3d
PA
2421 buf = obstack_finish (&obstack);
2422 len_avail = strlen (buf);
2423 if (offset >= len_avail)
49dc7f4b
PM
2424 len= 0;
2425 else
2426 {
2427 if (len > len_avail - offset)
2428 len = len_avail - offset;
2429 memcpy (readbuf, buf + offset, len);
2430 }
3cb8e7f6 2431
de1b3c3d
PA
2432 obstack_free (&obstack, NULL);
2433 return len;
3cb8e7f6
CF
2434}
2435
de1b3c3d 2436static LONGEST
dc05df57 2437windows_xfer_partial (struct target_ops *ops, enum target_object object,
de1b3c3d
PA
2438 const char *annex, gdb_byte *readbuf,
2439 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
3cb8e7f6 2440{
de1b3c3d 2441 switch (object)
3cb8e7f6 2442 {
de1b3c3d
PA
2443 case TARGET_OBJECT_MEMORY:
2444 if (readbuf)
2445 return (*ops->deprecated_xfer_memory) (offset, readbuf,
244e85c8 2446 len, 0/*read*/, NULL, ops);
de1b3c3d
PA
2447 if (writebuf)
2448 return (*ops->deprecated_xfer_memory) (offset, (gdb_byte *) writebuf,
2449 len, 1/*write*/, NULL, ops);
2450 return -1;
2451
2452 case TARGET_OBJECT_LIBRARIES:
dc05df57 2453 return windows_xfer_shared_libraries (ops, object, annex, readbuf,
de1b3c3d 2454 writebuf, offset, len);
3929abe9 2455
de1b3c3d
PA
2456 default:
2457 if (ops->beneath != NULL)
2458 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
2459 readbuf, writebuf, offset, len);
2460 return -1;
3929abe9 2461 }
02c5aecd
CF
2462}
2463
711e434b
PM
2464/* Provide thread local base, i.e. Thread Information Block address.
2465 Returns 1 if ptid is found and sets *ADDR to thread_local_base. */
2466
2467static int
2468windows_get_tib_address (ptid_t ptid, CORE_ADDR *addr)
2469{
2470 thread_info *th;
2471
2472 th = thread_rec (ptid_get_tid (ptid), 0);
2473 if (th == NULL)
2474 return 0;
2475
2476 if (addr != NULL)
2477 *addr = th->thread_local_base;
2478
2479 return 1;
2480}
2481
1e2f1c5c
JB
2482static ptid_t
2483windows_get_ada_task_ptid (long lwp, long thread)
2484{
2485 return ptid_build (ptid_get_pid (inferior_ptid), 0, lwp);
2486}
2487
3ee6f623 2488static void
dc05df57 2489init_windows_ops (void)
3ee6f623 2490{
dc05df57
CF
2491 windows_ops.to_shortname = "child";
2492 windows_ops.to_longname = "Win32 child process";
2493 windows_ops.to_doc = "Win32 child process (started by the \"run\" command).";
2494 windows_ops.to_open = windows_open;
2495 windows_ops.to_close = windows_close;
2496 windows_ops.to_attach = windows_attach;
2497 windows_ops.to_attach_no_wait = 1;
2498 windows_ops.to_detach = windows_detach;
2499 windows_ops.to_resume = windows_resume;
2500 windows_ops.to_wait = windows_wait;
2501 windows_ops.to_fetch_registers = windows_fetch_inferior_registers;
2502 windows_ops.to_store_registers = windows_store_inferior_registers;
2503 windows_ops.to_prepare_to_store = windows_prepare_to_store;
2504 windows_ops.deprecated_xfer_memory = windows_xfer_memory;
2505 windows_ops.to_xfer_partial = windows_xfer_partial;
2506 windows_ops.to_files_info = windows_files_info;
2507 windows_ops.to_insert_breakpoint = memory_insert_breakpoint;
2508 windows_ops.to_remove_breakpoint = memory_remove_breakpoint;
2509 windows_ops.to_terminal_init = terminal_init_inferior;
2510 windows_ops.to_terminal_inferior = terminal_inferior;
2511 windows_ops.to_terminal_ours_for_output = terminal_ours_for_output;
2512 windows_ops.to_terminal_ours = terminal_ours;
2513 windows_ops.to_terminal_save_ours = terminal_save_ours;
2514 windows_ops.to_terminal_info = child_terminal_info;
2515 windows_ops.to_kill = windows_kill_inferior;
2516 windows_ops.to_create_inferior = windows_create_inferior;
2517 windows_ops.to_mourn_inferior = windows_mourn_inferior;
2518 windows_ops.to_can_run = windows_can_run;
2519 windows_ops.to_thread_alive = windows_thread_alive;
2520 windows_ops.to_pid_to_str = windows_pid_to_str;
2521 windows_ops.to_stop = windows_stop;
2522 windows_ops.to_stratum = process_stratum;
c35b1492
PA
2523 windows_ops.to_has_all_memory = default_child_has_all_memory;
2524 windows_ops.to_has_memory = default_child_has_memory;
2525 windows_ops.to_has_stack = default_child_has_stack;
2526 windows_ops.to_has_registers = default_child_has_registers;
2527 windows_ops.to_has_execution = default_child_has_execution;
dc05df57 2528 windows_ops.to_pid_to_exec_file = windows_pid_to_exec_file;
1e2f1c5c 2529 windows_ops.to_get_ada_task_ptid = windows_get_ada_task_ptid;
711e434b 2530 windows_ops.to_get_tib_address = windows_get_tib_address;
9bb9e8ad 2531
5aca5a82
PM
2532 i386_use_watchpoints (&windows_ops);
2533
9bb9e8ad
PM
2534 i386_dr_low.set_control = cygwin_set_dr7;
2535 i386_dr_low.set_addr = cygwin_set_dr;
7b50312a 2536 i386_dr_low.get_addr = cygwin_get_dr;
9bb9e8ad 2537 i386_dr_low.get_status = cygwin_get_dr6;
7b50312a 2538 i386_dr_low.get_control = cygwin_get_dr7;
9bb9e8ad
PM
2539
2540 /* i386_dr_low.debug_register_length field is set by
2541 calling i386_set_debug_register_length function
2542 in processor windows specific native file. */
2543
dc05df57 2544 windows_ops.to_magic = OPS_MAGIC;
c719b714 2545}
24e60978 2546
3929abe9 2547static void
dc05df57 2548set_windows_aliases (char *argv0)
3929abe9
CF
2549{
2550 add_info_alias ("dll", "sharedlibrary", 1);
2551}
2552
d603d4b3
JK
2553/* -Wmissing-prototypes */
2554extern initialize_file_ftype _initialize_windows_nat;
2555
24e60978 2556void
dc05df57 2557_initialize_windows_nat (void)
24e60978 2558{
fa58ee11
EZ
2559 struct cmd_list_element *c;
2560
dc05df57 2561 init_windows_ops ();
1ef980b9 2562
d0d0ab16
CV
2563#ifdef __CYGWIN__
2564 cygwin_internal (CW_SET_DOS_FILE_WARNING, 0);
2565#endif
2566
fa58ee11 2567 c = add_com ("dll-symbols", class_files, dll_symbol_command,
1bedd215 2568 _("Load dll library symbols from FILE."));
5ba2abeb 2569 set_cmd_completer (c, filename_completer);
450005e7
CF
2570
2571 add_com_alias ("sharedlibrary", "dll-symbols", class_alias, 1);
2572
70992597
PM
2573 add_com_alias ("add-shared-symbol-files", "dll-symbols", class_alias, 1);
2574
2575 add_com_alias ("assf", "dll-symbols", class_alias, 1);
2576
10325bc5 2577#ifdef __CYGWIN__
5bf193a2
AC
2578 add_setshow_boolean_cmd ("shell", class_support, &useshell, _("\
2579Set use of shell to start subprocess."), _("\
2580Show use of shell to start subprocess."), NULL,
2581 NULL,
2582 NULL, /* FIXME: i18n: */
2583 &setlist, &showlist);
2584
581e13c1
MS
2585 add_setshow_boolean_cmd ("cygwin-exceptions", class_support,
2586 &cygwin_exceptions, _("\
09280ddf
CF
2587Break when an exception is detected in the Cygwin DLL itself."), _("\
2588Show whether gdb breaks on exceptions in the Cygwin DLL itself."), NULL,
2589 NULL,
2590 NULL, /* FIXME: i18n: */
2591 &setlist, &showlist);
10325bc5 2592#endif
09280ddf 2593
5bf193a2
AC
2594 add_setshow_boolean_cmd ("new-console", class_support, &new_console, _("\
2595Set creation of new console when creating child process."), _("\
2596Show creation of new console when creating child process."), NULL,
2597 NULL,
2598 NULL, /* FIXME: i18n: */
2599 &setlist, &showlist);
2600
2601 add_setshow_boolean_cmd ("new-group", class_support, &new_group, _("\
2602Set creation of new group when creating child process."), _("\
2603Show creation of new group when creating child process."), NULL,
2604 NULL,
2605 NULL, /* FIXME: i18n: */
2606 &setlist, &showlist);
2607
2608 add_setshow_boolean_cmd ("debugexec", class_support, &debug_exec, _("\
2609Set whether to display execution in child process."), _("\
2610Show whether to display execution in child process."), NULL,
2611 NULL,
2612 NULL, /* FIXME: i18n: */
2613 &setlist, &showlist);
2614
2615 add_setshow_boolean_cmd ("debugevents", class_support, &debug_events, _("\
2616Set whether to display kernel events in child process."), _("\
2617Show whether to display kernel events in child process."), NULL,
2618 NULL,
2619 NULL, /* FIXME: i18n: */
2620 &setlist, &showlist);
2621
2622 add_setshow_boolean_cmd ("debugmemory", class_support, &debug_memory, _("\
2623Set whether to display memory accesses in child process."), _("\
2624Show whether to display memory accesses in child process."), NULL,
2625 NULL,
2626 NULL, /* FIXME: i18n: */
2627 &setlist, &showlist);
2628
2629 add_setshow_boolean_cmd ("debugexceptions", class_support,
2630 &debug_exceptions, _("\
2631Set whether to display kernel exceptions in child process."), _("\
2632Show whether to display kernel exceptions in child process."), NULL,
2633 NULL,
2634 NULL, /* FIXME: i18n: */
2635 &setlist, &showlist);
1ef980b9 2636
711e434b 2637 init_w32_command_list ();
c1748f97
PM
2638
2639 add_cmd ("selector", class_info, display_selectors,
1a966eab 2640 _("Display selectors infos."),
c1748f97 2641 &info_w32_cmdlist);
dc05df57
CF
2642 add_target (&windows_ops);
2643 deprecated_init_ui_hook = set_windows_aliases;
24e60978 2644}
3cee93ac 2645
fa4ba8da
PM
2646/* Hardware watchpoint support, adapted from go32-nat.c code. */
2647
2648/* Pass the address ADDR to the inferior in the I'th debug register.
2649 Here we just store the address in dr array, the registers will be
dc05df57 2650 actually set up when windows_continue is called. */
9bb9e8ad 2651static void
fa4ba8da
PM
2652cygwin_set_dr (int i, CORE_ADDR addr)
2653{
2654 if (i < 0 || i > 3)
2655 internal_error (__FILE__, __LINE__,
e2e0b3e5 2656 _("Invalid register %d in cygwin_set_dr.\n"), i);
41b4aadc 2657 dr[i] = addr;
fa4ba8da
PM
2658 debug_registers_changed = 1;
2659 debug_registers_used = 1;
2660}
2661
2662/* Pass the value VAL to the inferior in the DR7 debug control
2663 register. Here we just store the address in D_REGS, the watchpoint
dc05df57 2664 will be actually set up in windows_wait. */
9bb9e8ad
PM
2665static void
2666cygwin_set_dr7 (unsigned long val)
fa4ba8da 2667{
9bb9e8ad 2668 dr[7] = (CORE_ADDR) val;
fa4ba8da
PM
2669 debug_registers_changed = 1;
2670 debug_registers_used = 1;
2671}
2672
7b50312a
PA
2673/* Get the value of debug register I from the inferior. */
2674
2675static CORE_ADDR
2676cygwin_get_dr (int i)
2677{
2678 return dr[i];
2679}
2680
fa4ba8da
PM
2681/* Get the value of the DR6 debug status register from the inferior.
2682 Here we just return the value stored in dr[6]
2683 by the last call to thread_rec for current_event.dwThreadId id. */
9bb9e8ad 2684static unsigned long
fa4ba8da
PM
2685cygwin_get_dr6 (void)
2686{
9bb9e8ad 2687 return (unsigned long) dr[6];
fa4ba8da
PM
2688}
2689
7b50312a
PA
2690/* Get the value of the DR7 debug status register from the inferior.
2691 Here we just return the value stored in dr[7] by the last call to
2692 thread_rec for current_event.dwThreadId id. */
2693
2694static unsigned long
2695cygwin_get_dr7 (void)
2696{
2697 return (unsigned long) dr[7];
2698}
2699
2dc38344 2700/* Determine if the thread referenced by "ptid" is alive
3cee93ac 2701 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
581e13c1 2702 it means that the thread has died. Otherwise it is assumed to be alive. */
3cee93ac 2703static int
28439f5e 2704windows_thread_alive (struct target_ops *ops, ptid_t ptid)
3cee93ac 2705{
2dc38344
PA
2706 int tid;
2707
2708 gdb_assert (ptid_get_tid (ptid) != 0);
2709 tid = ptid_get_tid (ptid);
39f77062 2710
581e13c1
MS
2711 return WaitForSingleObject (thread_rec (tid, FALSE)->h, 0) == WAIT_OBJECT_0
2712 ? FALSE : TRUE;
3cee93ac
CF
2713}
2714
d603d4b3
JK
2715/* -Wmissing-prototypes */
2716extern initialize_file_ftype _initialize_check_for_gdb_ini;
2717
2a3d5645
CF
2718void
2719_initialize_check_for_gdb_ini (void)
2720{
2721 char *homedir;
2722 if (inhibit_gdbinit)
2723 return;
2724
2725 homedir = getenv ("HOME");
2726 if (homedir)
2727 {
2728 char *p;
2729 char *oldini = (char *) alloca (strlen (homedir) +
2730 sizeof ("/gdb.ini"));
2731 strcpy (oldini, homedir);
2732 p = strchr (oldini, '\0');
0ba1096a 2733 if (p > oldini && !IS_DIR_SEPARATOR (p[-1]))
2a3d5645
CF
2734 *p++ = '/';
2735 strcpy (p, "gdb.ini");
2736 if (access (oldini, 0) == 0)
2737 {
2738 int len = strlen (oldini);
2739 char *newini = alloca (len + 1);
08850b56
PM
2740
2741 xsnprintf (newini, len + 1, "%.*s.gdbinit",
2742 (int) (len - (sizeof ("gdb.ini") - 1)), oldini);
8a3fe4f8 2743 warning (_("obsolete '%s' found. Rename to '%s'."), oldini, newini);
2a3d5645
CF
2744 }
2745 }
2746}
33605d39 2747
2b008701 2748/* Define dummy functions which always return error for the rare cases where
581e13c1 2749 these functions could not be found. */
2b008701
CF
2750static BOOL WINAPI
2751bad_DebugActiveProcessStop (DWORD w)
2752{
2753 return FALSE;
2754}
2755static BOOL WINAPI
2756bad_DebugBreakProcess (HANDLE w)
2757{
2758 return FALSE;
2759}
2760static BOOL WINAPI
2761bad_DebugSetProcessKillOnExit (BOOL w)
2762{
2763 return FALSE;
2764}
2765static BOOL WINAPI
2766bad_EnumProcessModules (HANDLE w, HMODULE *x, DWORD y, LPDWORD z)
2767{
2768 return FALSE;
2769}
b3c613f2
CF
2770
2771#ifdef __USEWIDE
2b008701 2772static DWORD WINAPI
b3c613f2 2773bad_GetModuleFileNameExW (HANDLE w, HMODULE x, LPWSTR y, DWORD z)
2b008701
CF
2774{
2775 return 0;
2776}
d0d0ab16
CV
2777#else
2778static DWORD WINAPI
b3c613f2 2779bad_GetModuleFileNameExA (HANDLE w, HMODULE x, LPSTR y, DWORD z)
d0d0ab16
CV
2780{
2781 return 0;
2782}
2783#endif
b3c613f2 2784
2b008701
CF
2785static BOOL WINAPI
2786bad_GetModuleInformation (HANDLE w, HMODULE x, LPMODULEINFO y, DWORD z)
2787{
2788 return FALSE;
2789}
2790
418c6cb3
CF
2791static BOOL WINAPI
2792bad_OpenProcessToken (HANDLE w, DWORD x, PHANDLE y)
2793{
2794 return FALSE;
2795}
2796
cd44747c
PM
2797static BOOL WINAPI
2798bad_GetCurrentConsoleFont (HANDLE w, BOOL bMaxWindow, CONSOLE_FONT_INFO *f)
2799{
2800 f->nFont = 0;
2801 return 1;
2802}
2803static COORD WINAPI
2804bad_GetConsoleFontSize (HANDLE w, DWORD nFont)
2805{
2806 COORD size;
2807 size.X = 8;
2808 size.Y = 12;
2809 return size;
2810}
2811
d603d4b3
JK
2812/* -Wmissing-prototypes */
2813extern initialize_file_ftype _initialize_loadable;
2814
2b008701 2815/* Load any functions which may not be available in ancient versions
581e13c1 2816 of Windows. */
d603d4b3 2817
33605d39 2818void
2b008701 2819_initialize_loadable (void)
33605d39 2820{
2b008701
CF
2821 HMODULE hm = NULL;
2822
2823 hm = LoadLibrary ("kernel32.dll");
2824 if (hm)
33605d39 2825 {
b3c613f2 2826 DebugActiveProcessStop = (void *)
2b008701 2827 GetProcAddress (hm, "DebugActiveProcessStop");
b3c613f2 2828 DebugBreakProcess = (void *)
2b008701 2829 GetProcAddress (hm, "DebugBreakProcess");
b3c613f2 2830 DebugSetProcessKillOnExit = (void *)
2b008701 2831 GetProcAddress (hm, "DebugSetProcessKillOnExit");
cd44747c
PM
2832 GetConsoleFontSize = (void *)
2833 GetProcAddress (hm, "GetConsoleFontSize");
2834 GetCurrentConsoleFont = (void *)
2835 GetProcAddress (hm, "GetCurrentConsoleFont");
2b008701 2836 }
33605d39 2837
2b008701 2838 /* Set variables to dummy versions of these processes if the function
581e13c1 2839 wasn't found in kernel32.dll. */
b3c613f2
CF
2840 if (!DebugBreakProcess)
2841 DebugBreakProcess = bad_DebugBreakProcess;
2842 if (!DebugActiveProcessStop || !DebugSetProcessKillOnExit)
2b008701 2843 {
b3c613f2
CF
2844 DebugActiveProcessStop = bad_DebugActiveProcessStop;
2845 DebugSetProcessKillOnExit = bad_DebugSetProcessKillOnExit;
2b008701 2846 }
cd44747c
PM
2847 if (!GetConsoleFontSize)
2848 GetConsoleFontSize = bad_GetConsoleFontSize;
2849 if (!GetCurrentConsoleFont)
2850 GetCurrentConsoleFont = bad_GetCurrentConsoleFont;
33605d39 2851
2b008701 2852 /* Load optional functions used for retrieving filename information
581e13c1 2853 associated with the currently debugged process or its dlls. */
2b008701
CF
2854 hm = LoadLibrary ("psapi.dll");
2855 if (hm)
2856 {
b3c613f2 2857 EnumProcessModules = (void *)
2b008701 2858 GetProcAddress (hm, "EnumProcessModules");
b3c613f2 2859 GetModuleInformation = (void *)
2b008701 2860 GetProcAddress (hm, "GetModuleInformation");
b3c613f2
CF
2861 GetModuleFileNameEx = (void *)
2862 GetProcAddress (hm, GetModuleFileNameEx_name);
33605d39
CF
2863 }
2864
b3c613f2 2865 if (!EnumProcessModules || !GetModuleInformation || !GetModuleFileNameEx)
2b008701
CF
2866 {
2867 /* Set variables to dummy versions of these processes if the function
581e13c1 2868 wasn't found in psapi.dll. */
b3c613f2
CF
2869 EnumProcessModules = bad_EnumProcessModules;
2870 GetModuleInformation = bad_GetModuleInformation;
2871 GetModuleFileNameEx = bad_GetModuleFileNameEx;
581e13c1
MS
2872 /* This will probably fail on Windows 9x/Me. Let the user know
2873 that we're missing some functionality. */
2874 warning(_("\
2875cannot automatically find executable file or library to read symbols.\n\
2876Use \"file\" or \"dll\" command to load executable/libraries directly."));
418c6cb3
CF
2877 }
2878
2879 hm = LoadLibrary ("advapi32.dll");
2880 if (hm)
2881 {
b3c613f2
CF
2882 OpenProcessToken = (void *) GetProcAddress (hm, "OpenProcessToken");
2883 LookupPrivilegeValueA = (void *)
418c6cb3 2884 GetProcAddress (hm, "LookupPrivilegeValueA");
b3c613f2 2885 AdjustTokenPrivileges = (void *)
418c6cb3
CF
2886 GetProcAddress (hm, "AdjustTokenPrivileges");
2887 /* Only need to set one of these since if OpenProcessToken fails nothing
581e13c1
MS
2888 else is needed. */
2889 if (!OpenProcessToken || !LookupPrivilegeValueA
2890 || !AdjustTokenPrivileges)
b3c613f2 2891 OpenProcessToken = bad_OpenProcessToken;
2b008701 2892 }
33605d39 2893}
This page took 1.769023 seconds and 4 git commands to generate.