*** empty log message ***
[deliverable/binutils-gdb.git] / gdb / windows-nat.c
CommitLineData
dc05df57 1/* Target-vector operations for controlling windows child processes, for GDB.
0a65a603 2
281b533b 3 Copyright (C) 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
7b6bb8da 4 2005, 2006, 2007, 2008, 2009, 2010, 2011 Free Software Foundation, Inc.
0a65a603 5
e6433c28 6 Contributed by Cygnus Solutions, A Red Hat Company.
e88c49c3 7
24e60978
SC
8 This file is part of GDB.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
a9762ec7 12 the Free Software Foundation; either version 3 of the License, or
24e60978
SC
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
a9762ec7 16 but WITHOUT ANY WARRANTY; without even the implied warranty of
24e60978
SC
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
a9762ec7 21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
24e60978 22
dfe7f3ac 23/* Originally by Steve Chamberlain, sac@cygnus.com */
24e60978
SC
24
25#include "defs.h"
26#include "frame.h" /* required by inferior.h */
27#include "inferior.h"
28#include "target.h"
60250e8b 29#include "exceptions.h"
24e60978
SC
30#include "gdbcore.h"
31#include "command.h"
fa58ee11 32#include "completer.h"
4e052eda 33#include "regcache.h"
2a3d5645 34#include "top.h"
403d9909
CF
35#include <signal.h>
36#include <sys/types.h>
37#include <fcntl.h>
38#include <stdlib.h>
39#include <windows.h>
40#include <imagehlp.h>
2b008701 41#include <psapi.h>
10325bc5 42#ifdef __CYGWIN__
403d9909 43#include <sys/cygwin.h>
b3c613f2 44#include <cygwin/version.h>
10325bc5 45#endif
a244bdca 46#include <signal.h>
cad9cd60 47
24e60978 48#include "buildsym.h"
1ef980b9
SC
49#include "symfile.h"
50#include "objfiles.h"
de1b3c3d 51#include "gdb_obstack.h"
24e60978 52#include "gdb_string.h"
fdfa3315 53#include "gdbthread.h"
24e60978 54#include "gdbcmd.h"
1750a5ef 55#include <sys/param.h>
1e37c281 56#include <unistd.h>
4646aa9d 57#include "exec.h"
3ee6f623 58#include "solist.h"
3cb8e7f6 59#include "solib.h"
de1b3c3d 60#include "xml-support.h"
24e60978 61
6c7de422
MK
62#include "i386-tdep.h"
63#include "i387-tdep.h"
64
31b060a2
CF
65#include "windows-tdep.h"
66#include "windows-nat.h"
9bb9e8ad 67#include "i386-nat.h"
ecc13e53 68#include "complaints.h"
de1b3c3d 69
418c6cb3 70#define AdjustTokenPrivileges dyn_AdjustTokenPrivileges
2b008701
CF
71#define DebugActiveProcessStop dyn_DebugActiveProcessStop
72#define DebugBreakProcess dyn_DebugBreakProcess
73#define DebugSetProcessKillOnExit dyn_DebugSetProcessKillOnExit
74#define EnumProcessModules dyn_EnumProcessModules
2b008701 75#define GetModuleInformation dyn_GetModuleInformation
418c6cb3
CF
76#define LookupPrivilegeValueA dyn_LookupPrivilegeValueA
77#define OpenProcessToken dyn_OpenProcessToken
cd44747c
PM
78#define GetConsoleFontSize dyn_GetConsoleFontSize
79#define GetCurrentConsoleFont dyn_GetCurrentConsoleFont
2b008701 80
418c6cb3
CF
81static BOOL WINAPI (*AdjustTokenPrivileges)(HANDLE, BOOL, PTOKEN_PRIVILEGES,
82 DWORD, PTOKEN_PRIVILEGES, PDWORD);
2b008701
CF
83static BOOL WINAPI (*DebugActiveProcessStop) (DWORD);
84static BOOL WINAPI (*DebugBreakProcess) (HANDLE);
85static BOOL WINAPI (*DebugSetProcessKillOnExit) (BOOL);
86static BOOL WINAPI (*EnumProcessModules) (HANDLE, HMODULE *, DWORD,
87 LPDWORD);
2b008701
CF
88static BOOL WINAPI (*GetModuleInformation) (HANDLE, HMODULE, LPMODULEINFO,
89 DWORD);
418c6cb3
CF
90static BOOL WINAPI (*LookupPrivilegeValueA)(LPCSTR, LPCSTR, PLUID);
91static BOOL WINAPI (*OpenProcessToken)(HANDLE, DWORD, PHANDLE);
cd44747c
PM
92static BOOL WINAPI (*GetCurrentConsoleFont) (HANDLE, BOOL, CONSOLE_FONT_INFO *);
93static COORD WINAPI (*GetConsoleFontSize) (HANDLE, DWORD);
2b008701 94
dc05df57 95static struct target_ops windows_ops;
3ee6f623 96
b3c613f2
CF
97#undef STARTUPINFO
98#undef CreateProcess
99#undef GetModuleFileNameEx
100
101#ifndef __CYGWIN__
102# define __PMAX (MAX_PATH + 1)
103 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPSTR, DWORD);
104# define STARTUPINFO STARTUPINFOA
105# define CreateProcess CreateProcessA
106# define GetModuleFileNameEx_name "GetModuleFileNameExA"
107# define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
108#else
109# define __PMAX PATH_MAX
a244bdca 110/* The starting and ending address of the cygwin1.dll text segment. */
b3c613f2
CF
111 static CORE_ADDR cygwin_load_start;
112 static CORE_ADDR cygwin_load_end;
113# if CYGWIN_VERSION_DLL_MAKE_COMBINED(CYGWIN_VERSION_API_MAJOR,CYGWIN_VERSION_API_MINOR) >= 181
114# define __USEWIDE
115 typedef wchar_t cygwin_buf_t;
116 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPWSTR, DWORD);
117# define STARTUPINFO STARTUPINFOW
118# define CreateProcess CreateProcessW
119# define GetModuleFileNameEx_name "GetModuleFileNameExW"
120# define bad_GetModuleFileNameEx bad_GetModuleFileNameExW
121# else
60c5c021
CF
122# define CCP_POSIX_TO_WIN_W 1
123# define CCP_WIN_W_TO_POSIX 3
124# define cygwin_conv_path(op, from, to, size) \
125 (op == CCP_WIN_W_TO_POSIX) ? \
126 cygwin_conv_to_full_posix_path (from, to) : \
127 cygwin_conv_to_win32_path (from, to)
b3c613f2
CF
128 typedef char cygwin_buf_t;
129 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPSTR, DWORD);
130# define STARTUPINFO STARTUPINFOA
131# define CreateProcess CreateProcessA
132# define GetModuleFileNameEx_name "GetModuleFileNameExA"
133# define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
60c5c021 134# define CW_SET_DOS_FILE_WARNING -1 /* no-op this for older Cygwin */
b3c613f2 135# endif
10325bc5 136#endif
a244bdca
CF
137
138static int have_saved_context; /* True if we've saved context from a cygwin signal. */
139static CONTEXT saved_context; /* Containes the saved context from a cygwin signal. */
140
0714f9bf
SS
141/* If we're not using the old Cygwin header file set, define the
142 following which never should have been in the generic Win32 API
143 headers in the first place since they were our own invention... */
144#ifndef _GNU_H_WINDOWS_H
9d3789f7 145enum
8e860359
CF
146 {
147 FLAG_TRACE_BIT = 0x100,
148 CONTEXT_DEBUGGER = (CONTEXT_FULL | CONTEXT_FLOATING_POINT)
149 };
0714f9bf
SS
150#endif
151
5851ab76
JB
152#ifndef CONTEXT_EXTENDED_REGISTERS
153/* This macro is only defined on ia32. It only makes sense on this target,
154 so define it as zero if not already defined. */
155#define CONTEXT_EXTENDED_REGISTERS 0
156#endif
157
fa4ba8da
PM
158#define CONTEXT_DEBUGGER_DR CONTEXT_DEBUGGER | CONTEXT_DEBUG_REGISTERS \
159 | CONTEXT_EXTENDED_REGISTERS
97da3b20 160
41b4aadc 161static uintptr_t dr[8];
87a45c96
CF
162static int debug_registers_changed;
163static int debug_registers_used;
16d905e2
CF
164
165static int windows_initialization_done;
6537bb24 166#define DR6_CLEAR_VALUE 0xffff0ff0
97da3b20 167
3cee93ac
CF
168/* The string sent by cygwin when it processes a signal.
169 FIXME: This should be in a cygwin include file. */
3929abe9
CF
170#ifndef _CYGWIN_SIGNAL_STRING
171#define _CYGWIN_SIGNAL_STRING "cYgSiGw00f"
172#endif
3cee93ac 173
29fe111d 174#define CHECK(x) check (x, __FILE__,__LINE__)
dfe7f3ac 175#define DEBUG_EXEC(x) if (debug_exec) printf_unfiltered x
4e52d31c
PM
176#define DEBUG_EVENTS(x) if (debug_events) printf_unfiltered x
177#define DEBUG_MEM(x) if (debug_memory) printf_unfiltered x
178#define DEBUG_EXCEPT(x) if (debug_exceptions) printf_unfiltered x
24e60978 179
dc05df57 180static void windows_stop (ptid_t);
02529b48 181static int windows_thread_alive (struct target_ops *, ptid_t);
7d85a9c0 182static void windows_kill_inferior (struct target_ops *);
3cee93ac 183
9bb9e8ad
PM
184static void cygwin_set_dr (int i, CORE_ADDR addr);
185static void cygwin_set_dr7 (unsigned long val);
186static unsigned long cygwin_get_dr6 (void);
187
7393af7c
PM
188static enum target_signal last_sig = TARGET_SIGNAL_0;
189/* Set if a signal was received from the debugged process */
190
3cee93ac 191/* Thread information structure used to track information that is
6537bb24 192 not available in gdb's thread structure. */
3cee93ac 193typedef struct thread_info_struct
3a4b77d8
JM
194 {
195 struct thread_info_struct *next;
196 DWORD id;
197 HANDLE h;
711e434b 198 CORE_ADDR thread_local_base;
3a4b77d8 199 char *name;
6537bb24 200 int suspended;
3ade5333 201 int reload_context;
3a4b77d8 202 CONTEXT context;
1e37c281 203 STACKFRAME sf;
8e860359
CF
204 }
205thread_info;
1e37c281 206
29fe111d 207static thread_info thread_head;
24e60978 208
24e60978
SC
209/* The process and thread handles for the above context. */
210
3cee93ac
CF
211static DEBUG_EVENT current_event; /* The current debug event from
212 WaitForDebugEvent */
213static HANDLE current_process_handle; /* Currently executing process */
214static thread_info *current_thread; /* Info on currently selected thread */
349b409f 215static DWORD main_thread_id; /* Thread ID of the main thread */
24e60978
SC
216
217/* Counts of things. */
218static int exception_count = 0;
219static int event_count = 0;
dfe7f3ac 220static int saw_create;
bf25528d 221static int open_process_used = 0;
24e60978
SC
222
223/* User options. */
224static int new_console = 0;
10325bc5 225#ifdef __CYGWIN__
09280ddf 226static int cygwin_exceptions = 0;
10325bc5 227#endif
1e37c281 228static int new_group = 1;
dfe7f3ac
CF
229static int debug_exec = 0; /* show execution */
230static int debug_events = 0; /* show events from kernel */
231static int debug_memory = 0; /* show target memory accesses */
1ef980b9 232static int debug_exceptions = 0; /* show target exceptions */
dfe7f3ac
CF
233static int useshell = 0; /* use shell for subprocesses */
234
7e63b4e4 235/* This vector maps GDB's idea of a register's number into an offset
dc05df57 236 in the windows exception context vector.
24e60978 237
3cee93ac 238 It also contains the bit mask needed to load the register in question.
24e60978 239
7e63b4e4
JB
240 The contents of this table can only be computed by the units
241 that provide CPU-specific support for Windows native debugging.
242 These units should set the table by calling
dc05df57 243 windows_set_context_register_offsets.
7e63b4e4 244
24e60978
SC
245 One day we could read a reg, we could inspect the context we
246 already have loaded, if it doesn't have the bit set that we need,
247 we read that set of registers in using GetThreadContext. If the
248 context already contains what we need, we just unpack it. Then to
249 write a register, first we have to ensure that the context contains
250 the other regs of the group, and then we copy the info in and set
251 out bit. */
252
7e63b4e4 253static const int *mappings;
d3a09475 254
24e60978
SC
255/* This vector maps the target's idea of an exception (extracted
256 from the DEBUG_EVENT structure) to GDB's idea. */
257
258struct xlate_exception
259 {
260 int them;
261 enum target_signal us;
262 };
263
24e60978
SC
264static const struct xlate_exception
265 xlate[] =
266{
267 {EXCEPTION_ACCESS_VIOLATION, TARGET_SIGNAL_SEGV},
9cbf6c0e 268 {STATUS_STACK_OVERFLOW, TARGET_SIGNAL_SEGV},
24e60978
SC
269 {EXCEPTION_BREAKPOINT, TARGET_SIGNAL_TRAP},
270 {DBG_CONTROL_C, TARGET_SIGNAL_INT},
271 {EXCEPTION_SINGLE_STEP, TARGET_SIGNAL_TRAP},
7393af7c 272 {STATUS_FLOAT_DIVIDE_BY_ZERO, TARGET_SIGNAL_FPE},
24e60978
SC
273 {-1, -1}};
274
7e63b4e4
JB
275/* Set the MAPPINGS static global to OFFSETS.
276 See the description of MAPPINGS for more details. */
277
278void
dc05df57 279windows_set_context_register_offsets (const int *offsets)
7e63b4e4
JB
280{
281 mappings = offsets;
282}
283
fa4ba8da
PM
284static void
285check (BOOL ok, const char *file, int line)
286{
287 if (!ok)
dfe7f3ac 288 printf_filtered ("error return %s:%d was %lu\n", file, line,
fa4ba8da
PM
289 GetLastError ());
290}
291
6537bb24
PA
292/* Find a thread record given a thread id. If GET_CONTEXT is not 0,
293 then also retrieve the context for this thread. If GET_CONTEXT is
294 negative, then don't suspend the thread. */
3cee93ac
CF
295static thread_info *
296thread_rec (DWORD id, int get_context)
24e60978 297{
3cee93ac
CF
298 thread_info *th;
299
3a4b77d8 300 for (th = &thread_head; (th = th->next) != NULL;)
3cee93ac
CF
301 if (th->id == id)
302 {
6537bb24 303 if (!th->suspended && get_context)
3cee93ac 304 {
8a892701 305 if (get_context > 0 && id != current_event.dwThreadId)
6537bb24
PA
306 {
307 if (SuspendThread (th->h) == (DWORD) -1)
308 {
309 DWORD err = GetLastError ();
310 warning (_("SuspendThread failed. (winerr %d)"),
311 (int) err);
312 return NULL;
313 }
314 th->suspended = 1;
315 }
3cee93ac 316 else if (get_context < 0)
6537bb24 317 th->suspended = -1;
3ade5333 318 th->reload_context = 1;
3cee93ac
CF
319 }
320 return th;
321 }
322
323 return NULL;
324}
325
2dc38344 326/* Add a thread to the thread list. */
3cee93ac 327static thread_info *
711e434b 328windows_add_thread (ptid_t ptid, HANDLE h, void *tlb)
3cee93ac
CF
329{
330 thread_info *th;
2dc38344
PA
331 DWORD id;
332
333 gdb_assert (ptid_get_tid (ptid) != 0);
334
335 id = ptid_get_tid (ptid);
3cee93ac
CF
336
337 if ((th = thread_rec (id, FALSE)))
338 return th;
339
3929abe9 340 th = XZALLOC (thread_info);
3cee93ac
CF
341 th->id = id;
342 th->h = h;
711e434b 343 th->thread_local_base = (CORE_ADDR) (uintptr_t) tlb;
3cee93ac
CF
344 th->next = thread_head.next;
345 thread_head.next = th;
2dc38344
PA
346 add_thread (ptid);
347 /* Set the debug registers for the new thread if they are used. */
fa4ba8da
PM
348 if (debug_registers_used)
349 {
350 /* Only change the value of the debug registers. */
351 th->context.ContextFlags = CONTEXT_DEBUG_REGISTERS;
352 CHECK (GetThreadContext (th->h, &th->context));
353 th->context.Dr0 = dr[0];
354 th->context.Dr1 = dr[1];
355 th->context.Dr2 = dr[2];
356 th->context.Dr3 = dr[3];
6537bb24 357 th->context.Dr6 = DR6_CLEAR_VALUE;
fa4ba8da
PM
358 th->context.Dr7 = dr[7];
359 CHECK (SetThreadContext (th->h, &th->context));
360 th->context.ContextFlags = 0;
361 }
3cee93ac 362 return th;
24e60978
SC
363}
364
3cee93ac
CF
365/* Clear out any old thread list and reintialize it to a
366 pristine state. */
24e60978 367static void
dc05df57 368windows_init_thread_list (void)
24e60978 369{
3cee93ac
CF
370 thread_info *th = &thread_head;
371
dc05df57 372 DEBUG_EVENTS (("gdb: windows_init_thread_list\n"));
3cee93ac
CF
373 init_thread_list ();
374 while (th->next != NULL)
24e60978 375 {
3cee93ac
CF
376 thread_info *here = th->next;
377 th->next = here->next;
b8c9b27d 378 xfree (here);
24e60978 379 }
059198c1 380 thread_head.next = NULL;
3cee93ac
CF
381}
382
383/* Delete a thread from the list of threads */
384static void
dc05df57 385windows_delete_thread (ptid_t ptid)
3cee93ac
CF
386{
387 thread_info *th;
2dc38344
PA
388 DWORD id;
389
390 gdb_assert (ptid_get_tid (ptid) != 0);
391
392 id = ptid_get_tid (ptid);
3cee93ac
CF
393
394 if (info_verbose)
2dc38344
PA
395 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (ptid));
396 delete_thread (ptid);
3cee93ac
CF
397
398 for (th = &thread_head;
399 th->next != NULL && th->next->id != id;
400 th = th->next)
401 continue;
402
403 if (th->next != NULL)
24e60978 404 {
3cee93ac
CF
405 thread_info *here = th->next;
406 th->next = here->next;
b8c9b27d 407 xfree (here);
24e60978
SC
408 }
409}
410
3cee93ac 411static void
dc05df57 412do_windows_fetch_inferior_registers (struct regcache *regcache, int r)
24e60978 413{
1e37c281 414 char *context_offset = ((char *) &current_thread->context) + mappings[r];
20a6ec49
MD
415 struct gdbarch *gdbarch = get_regcache_arch (regcache);
416 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
1e37c281 417 long l;
6c7de422 418
3ade5333 419 if (!current_thread)
d6dc8049
CF
420 return; /* Windows sometimes uses a non-existent thread id in its
421 events */
3ade5333
CF
422
423 if (current_thread->reload_context)
424 {
cb832706 425#ifdef __COPY_CONTEXT_SIZE
a244bdca
CF
426 if (have_saved_context)
427 {
428 /* Lie about where the program actually is stopped since cygwin has informed us that
429 we should consider the signal to have occurred at another location which is stored
430 in "saved_context. */
431 memcpy (&current_thread->context, &saved_context, __COPY_CONTEXT_SIZE);
432 have_saved_context = 0;
433 }
434 else
cb832706 435#endif
a244bdca
CF
436 {
437 thread_info *th = current_thread;
438 th->context.ContextFlags = CONTEXT_DEBUGGER_DR;
439 GetThreadContext (th->h, &th->context);
2b008701 440 /* Copy dr values from that thread.
88616312
PM
441 But only if there were not modified since last stop. PR gdb/2388 */
442 if (!debug_registers_changed)
443 {
444 dr[0] = th->context.Dr0;
445 dr[1] = th->context.Dr1;
446 dr[2] = th->context.Dr2;
447 dr[3] = th->context.Dr3;
448 dr[6] = th->context.Dr6;
449 dr[7] = th->context.Dr7;
450 }
a244bdca 451 }
3ade5333
CF
452 current_thread->reload_context = 0;
453 }
454
20a6ec49 455 if (r == I387_FISEG_REGNUM (tdep))
1e37c281 456 {
8e860359 457 l = *((long *) context_offset) & 0xffff;
56be3814 458 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 459 }
20a6ec49 460 else if (r == I387_FOP_REGNUM (tdep))
1e37c281 461 {
8e860359 462 l = (*((long *) context_offset) >> 16) & ((1 << 11) - 1);
56be3814 463 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281
JM
464 }
465 else if (r >= 0)
56be3814 466 regcache_raw_supply (regcache, r, context_offset);
3cee93ac 467 else
24e60978 468 {
20a6ec49 469 for (r = 0; r < gdbarch_num_regs (gdbarch); r++)
dc05df57 470 do_windows_fetch_inferior_registers (regcache, r);
24e60978 471 }
3cee93ac
CF
472}
473
474static void
28439f5e
PA
475windows_fetch_inferior_registers (struct target_ops *ops,
476 struct regcache *regcache, int r)
3cee93ac 477{
2dc38344 478 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049
CF
479 /* Check if current_thread exists. Windows sometimes uses a non-existent
480 thread id in its events */
3ade5333 481 if (current_thread)
dc05df57 482 do_windows_fetch_inferior_registers (regcache, r);
3cee93ac
CF
483}
484
485static void
dc05df57 486do_windows_store_inferior_registers (const struct regcache *regcache, int r)
3cee93ac 487{
3ade5333 488 if (!current_thread)
d6dc8049 489 /* Windows sometimes uses a non-existent thread id in its events */;
3ade5333 490 else if (r >= 0)
56be3814 491 regcache_raw_collect (regcache, r,
822c9732 492 ((char *) &current_thread->context) + mappings[r]);
24e60978
SC
493 else
494 {
40a6adc1 495 for (r = 0; r < gdbarch_num_regs (get_regcache_arch (regcache)); r++)
dc05df57 496 do_windows_store_inferior_registers (regcache, r);
24e60978
SC
497 }
498}
499
3cee93ac
CF
500/* Store a new register value into the current thread context */
501static void
28439f5e
PA
502windows_store_inferior_registers (struct target_ops *ops,
503 struct regcache *regcache, int r)
3cee93ac 504{
2dc38344 505 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049
CF
506 /* Check if current_thread exists. Windows sometimes uses a non-existent
507 thread id in its events */
3ade5333 508 if (current_thread)
dc05df57 509 do_windows_store_inferior_registers (regcache, r);
3cee93ac 510}
24e60978 511
33605d39
CF
512/* Get the name of a given module at at given base address. If base_address
513 is zero return the first loaded module (which is always the name of the
514 executable). */
3ee6f623 515static int
d3653bf6 516get_module_name (LPVOID base_address, char *dll_name_ret)
1e37c281
JM
517{
518 DWORD len;
519 MODULEINFO mi;
520 int i;
8e860359 521 HMODULE dh_buf[1];
33605d39 522 HMODULE *DllHandle = dh_buf; /* Set to temporary storage for initial query */
1e37c281 523 DWORD cbNeeded;
33605d39 524#ifdef __CYGWIN__
b3c613f2
CF
525 cygwin_buf_t pathbuf[__PMAX]; /* Temporary storage prior to converting to
526 posix form. __PMAX is always enough
d0d0ab16
CV
527 as long as SO_NAME_MAX_PATH_SIZE is defined
528 as 512. */
33605d39 529#endif
1e37c281 530
1e37c281 531 cbNeeded = 0;
33605d39 532 /* Find size of buffer needed to handle list of modules loaded in inferior */
2b008701
CF
533 if (!EnumProcessModules (current_process_handle, DllHandle,
534 sizeof (HMODULE), &cbNeeded) || !cbNeeded)
1e37c281
JM
535 goto failed;
536
33605d39 537 /* Allocate correct amount of space for module list */
8e860359 538 DllHandle = (HMODULE *) alloca (cbNeeded);
1e37c281
JM
539 if (!DllHandle)
540 goto failed;
541
33605d39 542 /* Get the list of modules */
2b008701 543 if (!EnumProcessModules (current_process_handle, DllHandle, cbNeeded,
33605d39 544 &cbNeeded))
1e37c281
JM
545 goto failed;
546
29fe111d 547 for (i = 0; i < (int) (cbNeeded / sizeof (HMODULE)); i++)
1e37c281 548 {
33605d39 549 /* Get information on this module */
2b008701
CF
550 if (!GetModuleInformation (current_process_handle, DllHandle[i],
551 &mi, sizeof (mi)))
8a3fe4f8 552 error (_("Can't get module info"));
1e37c281 553
d3653bf6 554 if (!base_address || mi.lpBaseOfDll == base_address)
33605d39
CF
555 {
556 /* Try to find the name of the given module */
d0d0ab16
CV
557#ifdef __CYGWIN__
558 /* Cygwin prefers that the path be in /x/y/z format */
b3c613f2
CF
559 len = GetModuleFileNameEx (current_process_handle,
560 DllHandle[i], pathbuf, __PMAX);
d0d0ab16
CV
561 if (len == 0)
562 error (_("Error getting dll name: %lu."), GetLastError ());
563 if (cygwin_conv_path (CCP_WIN_W_TO_POSIX, pathbuf, dll_name_ret,
b3c613f2 564 __PMAX) < 0)
d0d0ab16
CV
565 error (_("Error converting dll name to POSIX: %d."), errno);
566#else
b3c613f2
CF
567 len = GetModuleFileNameEx (current_process_handle,
568 DllHandle[i], dll_name_ret, __PMAX);
33605d39
CF
569 if (len == 0)
570 error (_("Error getting dll name: %u."), (unsigned) GetLastError ());
33605d39
CF
571#endif
572 return 1; /* success */
573 }
1e37c281
JM
574 }
575
576failed:
577 dll_name_ret[0] = '\0';
33605d39 578 return 0; /* failure */
1e37c281
JM
579}
580
450005e7
CF
581/* Encapsulate the information required in a call to
582 symbol_file_add_args */
8a892701
CF
583struct safe_symbol_file_add_args
584{
585 char *name;
586 int from_tty;
587 struct section_addr_info *addrs;
588 int mainline;
589 int flags;
7c5c87c0 590 struct ui_file *err, *out;
8a892701
CF
591 struct objfile *ret;
592};
593
02e423b9 594/* Maintain a linked list of "so" information. */
3ee6f623 595struct lm_info
02e423b9 596{
d3653bf6 597 LPVOID load_addr;
3ee6f623
CF
598};
599
600static struct so_list solib_start, *solib_end;
02e423b9 601
450005e7
CF
602/* Call symbol_file_add with stderr redirected. We don't care if there
603 are errors. */
8a892701
CF
604static int
605safe_symbol_file_add_stub (void *argv)
606{
3ee6f623 607#define p ((struct safe_symbol_file_add_args *) argv)
7eedccfa
PP
608 const int add_flags = ((p->from_tty ? SYMFILE_VERBOSE : 0)
609 | (p->mainline ? SYMFILE_MAINLINE : 0));
610 p->ret = symbol_file_add (p->name, add_flags, p->addrs, p->flags);
8a892701
CF
611 return !!p->ret;
612#undef p
613}
614
450005e7 615/* Restore gdb's stderr after calling symbol_file_add */
8a892701 616static void
7c5c87c0 617safe_symbol_file_add_cleanup (void *p)
8a892701 618{
8e860359 619#define sp ((struct safe_symbol_file_add_args *)p)
450005e7 620 gdb_flush (gdb_stderr);
7c5c87c0 621 gdb_flush (gdb_stdout);
d3ff4a77 622 ui_file_delete (gdb_stderr);
7c5c87c0 623 ui_file_delete (gdb_stdout);
d3ff4a77 624 gdb_stderr = sp->err;
9d3789f7 625 gdb_stdout = sp->out;
8e860359 626#undef sp
8a892701
CF
627}
628
450005e7 629/* symbol_file_add wrapper that prevents errors from being displayed. */
8a892701
CF
630static struct objfile *
631safe_symbol_file_add (char *name, int from_tty,
632 struct section_addr_info *addrs,
633 int mainline, int flags)
8a892701
CF
634{
635 struct safe_symbol_file_add_args p;
636 struct cleanup *cleanup;
637
7c5c87c0 638 cleanup = make_cleanup (safe_symbol_file_add_cleanup, &p);
8a892701 639
7c5c87c0
CF
640 p.err = gdb_stderr;
641 p.out = gdb_stdout;
450005e7 642 gdb_flush (gdb_stderr);
7c5c87c0 643 gdb_flush (gdb_stdout);
d3ff4a77 644 gdb_stderr = ui_file_new ();
7c5c87c0 645 gdb_stdout = ui_file_new ();
8a892701
CF
646 p.name = name;
647 p.from_tty = from_tty;
648 p.addrs = addrs;
649 p.mainline = mainline;
650 p.flags = flags;
651 catch_errors (safe_symbol_file_add_stub, &p, "", RETURN_MASK_ERROR);
652
653 do_cleanups (cleanup);
654 return p.ret;
655}
656
de1b3c3d 657static struct so_list *
dc05df57 658windows_make_so (const char *name, LPVOID load_addr)
8e860359 659{
3ee6f623 660 struct so_list *so;
d0d0ab16
CV
661 char *p;
662#ifndef __CYGWIN__
b3c613f2
CF
663 char buf[__PMAX];
664 char cwd[__PMAX];
3f8ad85b
CF
665 WIN32_FIND_DATA w32_fd;
666 HANDLE h = FindFirstFile(name, &w32_fd);
3f8ad85b 667
6badb179
CF
668 if (h == INVALID_HANDLE_VALUE)
669 strcpy (buf, name);
670 else
3f8ad85b 671 {
c914e0cc
CF
672 FindClose (h);
673 strcpy (buf, name);
674 if (GetCurrentDirectory (MAX_PATH + 1, cwd))
675 {
676 p = strrchr (buf, '\\');
677 if (p)
678 p[1] = '\0';
679 SetCurrentDirectory (buf);
680 GetFullPathName (w32_fd.cFileName, MAX_PATH, buf, &p);
681 SetCurrentDirectory (cwd);
682 }
3f8ad85b 683 }
3ee6f623
CF
684 if (strcasecmp (buf, "ntdll.dll") == 0)
685 {
686 GetSystemDirectory (buf, sizeof (buf));
687 strcat (buf, "\\ntdll.dll");
688 }
d0d0ab16 689#else
b3c613f2 690 cygwin_buf_t buf[__PMAX];
d0d0ab16 691
b3c613f2 692 buf[0] = 0;
d0d0ab16
CV
693 if (access (name, F_OK) != 0)
694 {
695 if (strcasecmp (name, "ntdll.dll") == 0)
b3c613f2 696#ifdef __USEWIDE
d0d0ab16
CV
697 {
698 GetSystemDirectoryW (buf, sizeof (buf) / sizeof (wchar_t));
699 wcscat (buf, L"\\ntdll.dll");
700 }
b3c613f2
CF
701#else
702 {
703 GetSystemDirectoryA (buf, sizeof (buf) / sizeof (wchar_t));
704 strcat (buf, "\\ntdll.dll");
705 }
706#endif
d0d0ab16
CV
707 }
708#endif
3929abe9 709 so = XZALLOC (struct so_list);
3ee6f623
CF
710 so->lm_info = (struct lm_info *) xmalloc (sizeof (struct lm_info));
711 so->lm_info->load_addr = load_addr;
de1b3c3d 712 strcpy (so->so_original_name, name);
10325bc5
PA
713#ifndef __CYGWIN__
714 strcpy (so->so_name, buf);
715#else
d0d0ab16
CV
716 if (buf[0])
717 cygwin_conv_path (CCP_WIN_W_TO_POSIX, buf, so->so_name,
718 SO_NAME_MAX_PATH_SIZE);
719 else
720 {
60c5c021 721 char *rname = realpath (name, NULL);
d0d0ab16
CV
722 if (rname && strlen (rname) < SO_NAME_MAX_PATH_SIZE)
723 {
724 strcpy (so->so_name, rname);
725 free (rname);
726 }
727 else
728 error (_("dll path too long"));
729 }
de1b3c3d
PA
730 /* Record cygwin1.dll .text start/end. */
731 p = strchr (so->so_name, '\0') - (sizeof ("/cygwin1.dll") - 1);
732 if (p >= so->so_name && strcasecmp (p, "/cygwin1.dll") == 0)
733 {
734 bfd *abfd;
735 asection *text = NULL;
736 CORE_ADDR text_vma;
8e860359 737
610dd7f9 738 abfd = bfd_openr (so->so_name, "pei-i386");
a244bdca 739
de1b3c3d
PA
740 if (!abfd)
741 return so;
742
743 if (bfd_check_format (abfd, bfd_object))
744 text = bfd_get_section_by_name (abfd, ".text");
745
746 if (!text)
747 {
748 bfd_close (abfd);
749 return so;
750 }
751
752 /* The symbols in a dll are offset by 0x1000, which is the the
753 offset from 0 of the first byte in an image - because of the
754 file header and the section alignment. */
dc05df57
CF
755 cygwin_load_start = (CORE_ADDR) (uintptr_t) ((char *) load_addr + 0x1000);
756 cygwin_load_end = cygwin_load_start + bfd_section_size (abfd, text);
de1b3c3d
PA
757
758 bfd_close (abfd);
759 }
10325bc5 760#endif
de1b3c3d
PA
761
762 return so;
8e860359
CF
763}
764
3ee6f623 765static char *
dfe7f3ac
CF
766get_image_name (HANDLE h, void *address, int unicode)
767{
d0d0ab16 768#ifdef __CYGWIN__
b3c613f2 769 static char buf[__PMAX];
d0d0ab16 770#else
b3c613f2 771 static char buf[(2 * __PMAX) + 1];
d0d0ab16 772#endif
dfe7f3ac
CF
773 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
774 char *address_ptr;
775 int len = 0;
776 char b[2];
5732a500 777 SIZE_T done;
dfe7f3ac
CF
778
779 /* Attempt to read the name of the dll that was detected.
780 This is documented to work only when actively debugging
781 a program. It will not work for attached processes. */
782 if (address == NULL)
783 return NULL;
784
dfe7f3ac
CF
785 /* See if we could read the address of a string, and that the
786 address isn't null. */
9f476a01 787 if (!ReadProcessMemory (h, address, &address_ptr, sizeof (address_ptr), &done)
6f17862b 788 || done != sizeof (address_ptr) || !address_ptr)
dfe7f3ac
CF
789 return NULL;
790
791 /* Find the length of the string */
6f17862b
CF
792 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
793 && (b[0] != 0 || b[size - 1] != 0) && done == size)
794 continue;
dfe7f3ac
CF
795
796 if (!unicode)
797 ReadProcessMemory (h, address_ptr, buf, len, &done);
798 else
799 {
800 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
801 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
802 &done);
d0d0ab16 803#ifdef __CYGWIN__
b3c613f2 804 wcstombs (buf, unicode_address, __PMAX);
d0d0ab16
CV
805#else
806 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, sizeof buf,
807 0, 0);
808#endif
dfe7f3ac
CF
809 }
810
811 return buf;
812}
813
24e60978
SC
814/* Wait for child to do something. Return pid of child, or -1 in case
815 of error; store status through argument pointer OURSTATUS. */
1750a5ef 816static int
0a65a603 817handle_load_dll (void *dummy)
24e60978 818{
3a4b77d8 819 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
b3c613f2 820 char dll_buf[__PMAX];
450005e7 821 char *dll_name = NULL;
3cee93ac 822
3a4b77d8 823 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 824
d3653bf6 825 if (!get_module_name (event->lpBaseOfDll, dll_buf))
8e860359 826 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 827
1e37c281 828 dll_name = dll_buf;
24e60978 829
dfe7f3ac 830 if (*dll_name == '\0')
de1b3c3d
PA
831 dll_name = get_image_name (current_process_handle,
832 event->lpImageName, event->fUnicode);
3cee93ac
CF
833 if (!dll_name)
834 return 1;
835
dc05df57 836 solib_end->next = windows_make_so (dll_name, event->lpBaseOfDll);
de1b3c3d 837 solib_end = solib_end->next;
450005e7 838
a74ce742
PM
839 DEBUG_EVENTS (("gdb: Loading dll \"%s\" at %s.\n", solib_end->so_name,
840 host_address_to_string (solib_end->lm_info->load_addr)));
7488902c 841
450005e7
CF
842 return 1;
843}
844
3ee6f623 845static void
dc05df57 846windows_free_so (struct so_list *so)
3ee6f623 847{
3ee6f623
CF
848 if (so->lm_info)
849 xfree (so->lm_info);
de1b3c3d 850 xfree (so);
3cb8e7f6
CF
851}
852
d3ff4a77 853static int
0a65a603 854handle_unload_dll (void *dummy)
d3ff4a77 855{
d3653bf6 856 LPVOID lpBaseOfDll = current_event.u.UnloadDll.lpBaseOfDll;
3ee6f623 857 struct so_list *so;
d3ff4a77
CF
858
859 for (so = &solib_start; so->next != NULL; so = so->next)
3ee6f623 860 if (so->next->lm_info->load_addr == lpBaseOfDll)
d3ff4a77 861 {
3ee6f623 862 struct so_list *sodel = so->next;
d3ff4a77
CF
863 so->next = sodel->next;
864 if (!so->next)
865 solib_end = so;
7488902c
PM
866 DEBUG_EVENTS (("gdb: Unloading dll \"%s\".\n", sodel->so_name));
867
dc05df57 868 windows_free_so (sodel);
3929abe9 869 solib_add (NULL, 0, NULL, auto_solib_add);
d3ff4a77
CF
870 return 1;
871 }
3929abe9 872
ecc13e53
JB
873 /* We did not find any DLL that was previously loaded at this address,
874 so register a complaint. We do not report an error, because we have
875 observed that this may be happening under some circumstances. For
876 instance, running 32bit applications on x64 Windows causes us to receive
877 4 mysterious UNLOAD_DLL_DEBUG_EVENTs during the startup phase (these
878 events are apparently caused by the WOW layer, the interface between
879 32bit and 64bit worlds). */
880 complaint (&symfile_complaints, _("dll starting at %s not found."),
881 host_address_to_string (lpBaseOfDll));
d3ff4a77
CF
882
883 return 0;
884}
885
450005e7 886/* Clear list of loaded DLLs. */
3ee6f623 887static void
dc05df57 888windows_clear_solib (void)
450005e7 889{
450005e7
CF
890 solib_start.next = NULL;
891 solib_end = &solib_start;
450005e7 892}
295732ea 893
450005e7
CF
894/* Load DLL symbol info. */
895void
7470a420 896dll_symbol_command (char *args, int from_tty)
450005e7 897{
8e860359 898 int n;
450005e7 899 dont_repeat ();
8e860359 900
450005e7 901 if (args == NULL)
8a3fe4f8 902 error (_("dll-symbols requires a file name"));
450005e7 903
8e860359
CF
904 n = strlen (args);
905 if (n > 4 && strcasecmp (args + n - 4, ".dll") != 0)
906 {
907 char *newargs = (char *) alloca (n + 4 + 1);
908 strcpy (newargs, args);
909 strcat (newargs, ".dll");
910 args = newargs;
911 }
912
7470a420 913 safe_symbol_file_add (args, from_tty, NULL, 0, OBJF_SHARED | OBJF_USERLOADED);
8e860359 914}
450005e7 915
3cee93ac
CF
916/* Handle DEBUG_STRING output from child process.
917 Cygwin prepends its messages with a "cygwin:". Interpret this as
918 a Cygwin signal. Otherwise just print the string as a warning. */
919static int
920handle_output_debug_string (struct target_waitstatus *ourstatus)
921{
a244bdca
CF
922 char *s = NULL;
923 int retval = 0;
3cee93ac
CF
924
925 if (!target_read_string
2c647436
PM
926 ((CORE_ADDR) (uintptr_t) current_event.u.DebugString.lpDebugStringData,
927 &s, 1024, 0)
3cee93ac 928 || !s || !*s)
a244bdca
CF
929 /* nothing to do */;
930 else if (strncmp (s, _CYGWIN_SIGNAL_STRING, sizeof (_CYGWIN_SIGNAL_STRING) - 1) != 0)
3cee93ac 931 {
10325bc5 932#ifdef __CYGWIN__
d3a09475 933 if (strncmp (s, "cYg", 3) != 0)
10325bc5 934#endif
8a3fe4f8 935 warning (("%s"), s);
3cee93ac 936 }
cb832706 937#ifdef __COPY_CONTEXT_SIZE
d3a09475 938 else
3cee93ac 939 {
a244bdca
CF
940 /* Got a cygwin signal marker. A cygwin signal is followed by the signal number
941 itself and then optionally followed by the thread id and address to saved context
942 within the DLL. If these are supplied, then the given thread is assumed to have
943 issued the signal and the context from the thread is assumed to be stored at the
944 given address in the inferior. Tell gdb to treat this like a real signal. */
3cee93ac 945 char *p;
3929abe9 946 int sig = strtol (s + sizeof (_CYGWIN_SIGNAL_STRING) - 1, &p, 0);
a244bdca 947 int gotasig = target_signal_from_host (sig);
0714f9bf
SS
948 ourstatus->value.sig = gotasig;
949 if (gotasig)
a244bdca
CF
950 {
951 LPCVOID x;
952 DWORD n;
953 ourstatus->kind = TARGET_WAITKIND_STOPPED;
954 retval = strtoul (p, &p, 0);
955 if (!retval)
956 retval = main_thread_id;
957 else if ((x = (LPCVOID) strtoul (p, &p, 0))
958 && ReadProcessMemory (current_process_handle, x,
959 &saved_context, __COPY_CONTEXT_SIZE, &n)
960 && n == __COPY_CONTEXT_SIZE)
961 have_saved_context = 1;
962 current_event.dwThreadId = retval;
963 }
3cee93ac 964 }
cb832706 965#endif
3cee93ac 966
a244bdca
CF
967 if (s)
968 xfree (s);
969 return retval;
3cee93ac 970}
24e60978 971
c1748f97
PM
972static int
973display_selector (HANDLE thread, DWORD sel)
974{
975 LDT_ENTRY info;
976 if (GetThreadSelectorEntry (thread, sel, &info))
977 {
978 int base, limit;
979 printf_filtered ("0x%03lx: ", sel);
980 if (!info.HighWord.Bits.Pres)
baa93fa6
CF
981 {
982 puts_filtered ("Segment not present\n");
983 return 0;
984 }
c1748f97
PM
985 base = (info.HighWord.Bits.BaseHi << 24) +
986 (info.HighWord.Bits.BaseMid << 16)
987 + info.BaseLow;
988 limit = (info.HighWord.Bits.LimitHi << 16) + info.LimitLow;
989 if (info.HighWord.Bits.Granularity)
caad7706 990 limit = (limit << 12) | 0xfff;
c1748f97
PM
991 printf_filtered ("base=0x%08x limit=0x%08x", base, limit);
992 if (info.HighWord.Bits.Default_Big)
baa93fa6 993 puts_filtered(" 32-bit ");
c1748f97 994 else
baa93fa6 995 puts_filtered(" 16-bit ");
c1748f97
PM
996 switch ((info.HighWord.Bits.Type & 0xf) >> 1)
997 {
998 case 0:
baa93fa6
CF
999 puts_filtered ("Data (Read-Only, Exp-up");
1000 break;
c1748f97 1001 case 1:
baa93fa6
CF
1002 puts_filtered ("Data (Read/Write, Exp-up");
1003 break;
c1748f97 1004 case 2:
baa93fa6
CF
1005 puts_filtered ("Unused segment (");
1006 break;
c1748f97 1007 case 3:
baa93fa6
CF
1008 puts_filtered ("Data (Read/Write, Exp-down");
1009 break;
c1748f97 1010 case 4:
baa93fa6
CF
1011 puts_filtered ("Code (Exec-Only, N.Conf");
1012 break;
c1748f97 1013 case 5:
baa93fa6 1014 puts_filtered ("Code (Exec/Read, N.Conf");
c1748f97
PM
1015 break;
1016 case 6:
baa93fa6 1017 puts_filtered ("Code (Exec-Only, Conf");
c1748f97
PM
1018 break;
1019 case 7:
baa93fa6 1020 puts_filtered ("Code (Exec/Read, Conf");
c1748f97
PM
1021 break;
1022 default:
1023 printf_filtered ("Unknown type 0x%x",info.HighWord.Bits.Type);
1024 }
1025 if ((info.HighWord.Bits.Type & 0x1) == 0)
baa93fa6 1026 puts_filtered(", N.Acc");
c1748f97
PM
1027 puts_filtered (")\n");
1028 if ((info.HighWord.Bits.Type & 0x10) == 0)
1029 puts_filtered("System selector ");
1030 printf_filtered ("Priviledge level = %d. ", info.HighWord.Bits.Dpl);
1031 if (info.HighWord.Bits.Granularity)
baa93fa6 1032 puts_filtered ("Page granular.\n");
c1748f97
PM
1033 else
1034 puts_filtered ("Byte granular.\n");
1035 return 1;
1036 }
1037 else
1038 {
5572ce1f
PM
1039 DWORD err = GetLastError ();
1040 if (err == ERROR_NOT_SUPPORTED)
1041 printf_filtered ("Function not supported\n");
1042 else
1043 printf_filtered ("Invalid selector 0x%lx.\n",sel);
c1748f97
PM
1044 return 0;
1045 }
1046}
1047
1048static void
1049display_selectors (char * args, int from_tty)
1050{
1051 if (!current_thread)
1052 {
1053 puts_filtered ("Impossible to display selectors now.\n");
1054 return;
1055 }
1056 if (!args)
1057 {
1058
1059 puts_filtered ("Selector $cs\n");
1060 display_selector (current_thread->h,
baa93fa6 1061 current_thread->context.SegCs);
c1748f97
PM
1062 puts_filtered ("Selector $ds\n");
1063 display_selector (current_thread->h,
baa93fa6 1064 current_thread->context.SegDs);
c1748f97
PM
1065 puts_filtered ("Selector $es\n");
1066 display_selector (current_thread->h,
baa93fa6 1067 current_thread->context.SegEs);
c1748f97
PM
1068 puts_filtered ("Selector $ss\n");
1069 display_selector (current_thread->h,
baa93fa6 1070 current_thread->context.SegSs);
c1748f97
PM
1071 puts_filtered ("Selector $fs\n");
1072 display_selector (current_thread->h,
1073 current_thread->context.SegFs);
1074 puts_filtered ("Selector $gs\n");
1075 display_selector (current_thread->h,
baa93fa6 1076 current_thread->context.SegGs);
c1748f97
PM
1077 }
1078 else
1079 {
1080 int sel;
1081 sel = parse_and_eval_long (args);
1082 printf_filtered ("Selector \"%s\"\n",args);
1083 display_selector (current_thread->h, sel);
1084 }
1085}
1086
7393af7c 1087#define DEBUG_EXCEPTION_SIMPLE(x) if (debug_exceptions) \
a74ce742
PM
1088 printf_unfiltered ("gdb: Target exception %s at %s\n", x, \
1089 host_address_to_string (\
1090 current_event.u.Exception.ExceptionRecord.ExceptionAddress))
7393af7c 1091
36339ecd 1092static int
450005e7 1093handle_exception (struct target_waitstatus *ourstatus)
24e60978 1094{
3cee93ac 1095 thread_info *th;
29fe111d 1096 DWORD code = current_event.u.Exception.ExceptionRecord.ExceptionCode;
3cee93ac 1097
29fe111d 1098 ourstatus->kind = TARGET_WAITKIND_STOPPED;
8a892701 1099
3cee93ac
CF
1100 /* Record the context of the current thread */
1101 th = thread_rec (current_event.dwThreadId, -1);
24e60978 1102
29fe111d 1103 switch (code)
24e60978 1104 {
1ef980b9 1105 case EXCEPTION_ACCESS_VIOLATION:
7393af7c
PM
1106 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ACCESS_VIOLATION");
1107 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
10325bc5 1108#ifdef __CYGWIN__
8da8e0b3 1109 {
a244bdca
CF
1110 /* See if the access violation happened within the cygwin DLL itself. Cygwin uses
1111 a kind of exception handling to deal with passed-in invalid addresses. gdb
1112 should not treat these as real SEGVs since they will be silently handled by
1113 cygwin. A real SEGV will (theoretically) be caught by cygwin later in the process
1114 and will be sent as a cygwin-specific-signal. So, ignore SEGVs if they show up
1115 within the text segment of the DLL itself. */
8da8e0b3 1116 char *fn;
dc05df57 1117 CORE_ADDR addr = (CORE_ADDR) (uintptr_t) current_event.u.Exception.ExceptionRecord.ExceptionAddress;
09280ddf 1118 if ((!cygwin_exceptions && (addr >= cygwin_load_start && addr < cygwin_load_end))
a244bdca
CF
1119 || (find_pc_partial_function (addr, &fn, NULL, NULL)
1120 && strncmp (fn, "KERNEL32!IsBad", strlen ("KERNEL32!IsBad")) == 0))
8da8e0b3
CF
1121 return 0;
1122 }
10325bc5 1123#endif
7393af7c
PM
1124 break;
1125 case STATUS_STACK_OVERFLOW:
1126 DEBUG_EXCEPTION_SIMPLE ("STATUS_STACK_OVERFLOW");
1ef980b9 1127 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
7393af7c
PM
1128 break;
1129 case STATUS_FLOAT_DENORMAL_OPERAND:
1130 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DENORMAL_OPERAND");
1131 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1132 break;
1133 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1134 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ARRAY_BOUNDS_EXCEEDED");
1135 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1136 break;
1137 case STATUS_FLOAT_INEXACT_RESULT:
1138 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INEXACT_RESULT");
1139 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1140 break;
1141 case STATUS_FLOAT_INVALID_OPERATION:
1142 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INVALID_OPERATION");
1143 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1144 break;
1145 case STATUS_FLOAT_OVERFLOW:
1146 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_OVERFLOW");
1147 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1148 break;
1149 case STATUS_FLOAT_STACK_CHECK:
1150 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_STACK_CHECK");
1151 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1ef980b9 1152 break;
3b7c8b74 1153 case STATUS_FLOAT_UNDERFLOW:
7393af7c
PM
1154 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_UNDERFLOW");
1155 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1156 break;
3b7c8b74 1157 case STATUS_FLOAT_DIVIDE_BY_ZERO:
7393af7c
PM
1158 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DIVIDE_BY_ZERO");
1159 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1160 break;
3b7c8b74 1161 case STATUS_INTEGER_DIVIDE_BY_ZERO:
7393af7c 1162 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_DIVIDE_BY_ZERO");
3b7c8b74 1163 ourstatus->value.sig = TARGET_SIGNAL_FPE;
3b7c8b74 1164 break;
7393af7c
PM
1165 case STATUS_INTEGER_OVERFLOW:
1166 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_OVERFLOW");
1167 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1ef980b9
SC
1168 break;
1169 case EXCEPTION_BREAKPOINT:
7393af7c 1170 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_BREAKPOINT");
1ef980b9
SC
1171 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
1172 break;
1173 case DBG_CONTROL_C:
7393af7c 1174 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_C");
1ef980b9 1175 ourstatus->value.sig = TARGET_SIGNAL_INT;
5b421780
PM
1176 break;
1177 case DBG_CONTROL_BREAK:
7393af7c 1178 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_BREAK");
5b421780 1179 ourstatus->value.sig = TARGET_SIGNAL_INT;
1ef980b9
SC
1180 break;
1181 case EXCEPTION_SINGLE_STEP:
7393af7c 1182 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_SINGLE_STEP");
1ef980b9
SC
1183 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
1184 break;
8227c82d 1185 case EXCEPTION_ILLEGAL_INSTRUCTION:
7393af7c
PM
1186 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ILLEGAL_INSTRUCTION");
1187 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1188 break;
1189 case EXCEPTION_PRIV_INSTRUCTION:
1190 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_PRIV_INSTRUCTION");
1191 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1192 break;
1193 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1194 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_NONCONTINUABLE_EXCEPTION");
8227c82d
CF
1195 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1196 break;
1ef980b9 1197 default:
a244bdca 1198 /* Treat unhandled first chance exceptions specially. */
02e423b9 1199 if (current_event.u.Exception.dwFirstChance)
a244bdca 1200 return -1;
a74ce742
PM
1201 printf_unfiltered ("gdb: unknown target exception 0x%08lx at %s\n",
1202 current_event.u.Exception.ExceptionRecord.ExceptionCode,
1203 host_address_to_string (
1204 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
24e60978 1205 ourstatus->value.sig = TARGET_SIGNAL_UNKNOWN;
1ef980b9 1206 break;
24e60978 1207 }
24e60978 1208 exception_count++;
7393af7c 1209 last_sig = ourstatus->value.sig;
36339ecd 1210 return 1;
24e60978
SC
1211}
1212
3cee93ac
CF
1213/* Resume all artificially suspended threads if we are continuing
1214 execution */
1215static BOOL
dc05df57 1216windows_continue (DWORD continue_status, int id)
3cee93ac
CF
1217{
1218 int i;
1219 thread_info *th;
1220 BOOL res;
1221
1c1238a5 1222 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%ld, ctid=%lx, %s);\n",
7393af7c 1223 current_event.dwProcessId, current_event.dwThreadId,
dfe7f3ac 1224 continue_status == DBG_CONTINUE ?
7393af7c 1225 "DBG_CONTINUE" : "DBG_EXCEPTION_NOT_HANDLED"));
6537bb24
PA
1226
1227 for (th = &thread_head; (th = th->next) != NULL;)
1228 if ((id == -1 || id == (int) th->id)
1229 && th->suspended)
1230 {
1231 if (debug_registers_changed)
1232 {
1233 th->context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1234 th->context.Dr0 = dr[0];
1235 th->context.Dr1 = dr[1];
1236 th->context.Dr2 = dr[2];
1237 th->context.Dr3 = dr[3];
1238 th->context.Dr6 = DR6_CLEAR_VALUE;
1239 th->context.Dr7 = dr[7];
1240 }
1241 if (th->context.ContextFlags)
1242 {
1243 CHECK (SetThreadContext (th->h, &th->context));
1244 th->context.ContextFlags = 0;
1245 }
1246 if (th->suspended > 0)
1247 (void) ResumeThread (th->h);
1248 th->suspended = 0;
1249 }
1250
0714f9bf
SS
1251 res = ContinueDebugEvent (current_event.dwProcessId,
1252 current_event.dwThreadId,
1253 continue_status);
3cee93ac 1254
fa4ba8da 1255 debug_registers_changed = 0;
3cee93ac
CF
1256 return res;
1257}
1258
d6dc8049
CF
1259/* Called in pathological case where Windows fails to send a
1260 CREATE_PROCESS_DEBUG_EVENT after an attach. */
3ee6f623 1261static DWORD
5439edaa 1262fake_create_process (void)
3ade5333
CF
1263{
1264 current_process_handle = OpenProcess (PROCESS_ALL_ACCESS, FALSE,
1265 current_event.dwProcessId);
bf25528d
CF
1266 if (current_process_handle != NULL)
1267 open_process_used = 1;
1268 else
1269 {
1270 error (_("OpenProcess call failed, GetLastError = %lud\n"),
1271 GetLastError ());
1272 /* We can not debug anything in that case. */
1273 }
3ade5333 1274 main_thread_id = current_event.dwThreadId;
711e434b
PM
1275 current_thread = windows_add_thread (
1276 ptid_build (current_event.dwProcessId, 0,
1277 current_event.dwThreadId),
1278 current_event.u.CreateThread.hThread,
1279 current_event.u.CreateThread.lpThreadLocalBase);
3ade5333
CF
1280 return main_thread_id;
1281}
1282
a244bdca 1283static void
28439f5e
PA
1284windows_resume (struct target_ops *ops,
1285 ptid_t ptid, int step, enum target_signal sig)
a244bdca
CF
1286{
1287 thread_info *th;
1288 DWORD continue_status = DBG_CONTINUE;
1289
2dc38344
PA
1290 /* A specific PTID means `step only this thread id'. */
1291 int resume_all = ptid_equal (ptid, minus_one_ptid);
1292
1293 /* If we're continuing all threads, it's the current inferior that
1294 should be handled specially. */
1295 if (resume_all)
1296 ptid = inferior_ptid;
a244bdca
CF
1297
1298 if (sig != TARGET_SIGNAL_0)
1299 {
1300 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
1301 {
1302 DEBUG_EXCEPT(("Cannot continue with signal %d here.\n",sig));
1303 }
1304 else if (sig == last_sig)
1305 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1306 else
1307#if 0
1308/* This code does not seem to work, because
1309 the kernel does probably not consider changes in the ExceptionRecord
1310 structure when passing the exception to the inferior.
1311 Note that this seems possible in the exception handler itself. */
1312 {
1313 int i;
1314 for (i = 0; xlate[i].them != -1; i++)
1315 if (xlate[i].us == sig)
1316 {
1317 current_event.u.Exception.ExceptionRecord.ExceptionCode =
1318 xlate[i].them;
1319 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1320 break;
1321 }
1322 if (continue_status == DBG_CONTINUE)
1323 {
1324 DEBUG_EXCEPT(("Cannot continue with signal %d.\n",sig));
1325 }
1326 }
1327#endif
1328 DEBUG_EXCEPT(("Can only continue with recieved signal %d.\n",
1329 last_sig));
1330 }
1331
1332 last_sig = TARGET_SIGNAL_0;
1333
dc05df57 1334 DEBUG_EXEC (("gdb: windows_resume (pid=%d, tid=%ld, step=%d, sig=%d);\n",
2dc38344 1335 ptid_get_pid (ptid), ptid_get_tid (ptid), step, sig));
a244bdca
CF
1336
1337 /* Get context for currently selected thread */
2dc38344 1338 th = thread_rec (ptid_get_tid (inferior_ptid), FALSE);
a244bdca
CF
1339 if (th)
1340 {
1341 if (step)
1342 {
1343 /* Single step by setting t bit */
a97b0ac8
UW
1344 struct regcache *regcache = get_current_regcache ();
1345 struct gdbarch *gdbarch = get_regcache_arch (regcache);
1346 windows_fetch_inferior_registers (ops, regcache,
1347 gdbarch_ps_regnum (gdbarch));
a244bdca
CF
1348 th->context.EFlags |= FLAG_TRACE_BIT;
1349 }
1350
1351 if (th->context.ContextFlags)
1352 {
1353 if (debug_registers_changed)
1354 {
1355 th->context.Dr0 = dr[0];
1356 th->context.Dr1 = dr[1];
1357 th->context.Dr2 = dr[2];
1358 th->context.Dr3 = dr[3];
6537bb24 1359 th->context.Dr6 = DR6_CLEAR_VALUE;
a244bdca
CF
1360 th->context.Dr7 = dr[7];
1361 }
1362 CHECK (SetThreadContext (th->h, &th->context));
1363 th->context.ContextFlags = 0;
1364 }
1365 }
1366
1367 /* Allow continuing with the same signal that interrupted us.
1368 Otherwise complain. */
1369
2dc38344 1370 if (resume_all)
dc05df57 1371 windows_continue (continue_status, -1);
2dc38344 1372 else
dc05df57 1373 windows_continue (continue_status, ptid_get_tid (ptid));
a244bdca
CF
1374}
1375
695de547
CF
1376/* Ctrl-C handler used when the inferior is not run in the same console. The
1377 handler is in charge of interrupting the inferior using DebugBreakProcess.
1378 Note that this function is not available prior to Windows XP. In this case
1379 we emit a warning. */
1380BOOL WINAPI
1381ctrl_c_handler (DWORD event_type)
1382{
1383 const int attach_flag = current_inferior ()->attach_flag;
1384
bb0613a5
PM
1385 /* Only handle Ctrl-C and Ctrl-Break events. Ignore others. */
1386 if (event_type != CTRL_C_EVENT && event_type != CTRL_BREAK_EVENT)
695de547
CF
1387 return FALSE;
1388
1389 /* If the inferior and the debugger share the same console, do nothing as
1390 the inferior has also received the Ctrl-C event. */
1391 if (!new_console && !attach_flag)
1392 return TRUE;
1393
1394 if (!DebugBreakProcess (current_process_handle))
1395 warning (_("\
1396Could not interrupt program. Press Ctrl-c in the program console."));
1397
1398 /* Return true to tell that Ctrl-C has been handled. */
1399 return TRUE;
1400}
1401
8a892701 1402/* Get the next event from the child. Return 1 if the event requires
695de547 1403 handling by WFI (or whatever). */
1e37c281 1404static int
28439f5e
PA
1405get_windows_debug_event (struct target_ops *ops,
1406 int pid, struct target_waitstatus *ourstatus)
1e37c281
JM
1407{
1408 BOOL debug_event;
8a892701 1409 DWORD continue_status, event_code;
87a45c96 1410 thread_info *th;
8a892701 1411 static thread_info dummy_thread_info;
450005e7 1412 int retval = 0;
1e37c281 1413
7393af7c 1414 last_sig = TARGET_SIGNAL_0;
9d3789f7 1415
8a892701 1416 if (!(debug_event = WaitForDebugEvent (&current_event, 1000)))
29fe111d 1417 goto out;
1e37c281
JM
1418
1419 event_count++;
1420 continue_status = DBG_CONTINUE;
1e37c281 1421
8a892701 1422 event_code = current_event.dwDebugEventCode;
450005e7 1423 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
87a45c96 1424 th = NULL;
a244bdca 1425 have_saved_context = 0;
8a892701
CF
1426
1427 switch (event_code)
1e37c281
JM
1428 {
1429 case CREATE_THREAD_DEBUG_EVENT:
1430 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1431 (unsigned) current_event.dwProcessId,
1432 (unsigned) current_event.dwThreadId,
1433 "CREATE_THREAD_DEBUG_EVENT"));
dfe7f3ac 1434 if (saw_create != 1)
3ade5333 1435 {
181e7f93
PA
1436 struct inferior *inf;
1437 inf = find_inferior_pid (current_event.dwProcessId);
1438 if (!saw_create && inf->attach_flag)
3ade5333 1439 {
d6dc8049
CF
1440 /* Kludge around a Windows bug where first event is a create
1441 thread event. Caused when attached process does not have
1442 a main thread. */
3a3e9ee3 1443 retval = fake_create_process ();
181e7f93
PA
1444 if (retval)
1445 saw_create++;
3ade5333
CF
1446 }
1447 break;
1448 }
1e37c281 1449 /* Record the existence of this thread */
450005e7 1450 retval = current_event.dwThreadId;
dc05df57 1451 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1452 current_event.dwThreadId),
711e434b
PM
1453 current_event.u.CreateThread.hThread,
1454 current_event.u.CreateThread.lpThreadLocalBase);
1455
1e37c281
JM
1456 break;
1457
1458 case EXIT_THREAD_DEBUG_EVENT:
1c1238a5 1459 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1460 (unsigned) current_event.dwProcessId,
1461 (unsigned) current_event.dwThreadId,
1462 "EXIT_THREAD_DEBUG_EVENT"));
b3c613f2 1463
87a45c96
CF
1464 if (current_event.dwThreadId != main_thread_id)
1465 {
dc05df57 1466 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1467 current_event.dwThreadId));
87a45c96
CF
1468 th = &dummy_thread_info;
1469 }
1e37c281
JM
1470 break;
1471
1472 case CREATE_PROCESS_DEBUG_EVENT:
1c1238a5 1473 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1474 (unsigned) current_event.dwProcessId,
1475 (unsigned) current_event.dwThreadId,
1476 "CREATE_PROCESS_DEBUG_EVENT"));
700b351b 1477 CloseHandle (current_event.u.CreateProcessInfo.hFile);
dfe7f3ac 1478 if (++saw_create != 1)
bf25528d 1479 break;
1e37c281 1480
dfe7f3ac 1481 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
87a45c96 1482 if (main_thread_id)
695de547
CF
1483 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
1484 main_thread_id));
9d3789f7 1485 main_thread_id = current_event.dwThreadId;
1e37c281 1486 /* Add the main thread */
dc05df57 1487 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
695de547 1488 current_event.dwThreadId),
711e434b
PM
1489 current_event.u.CreateProcessInfo.hThread,
1490 current_event.u.CreateProcessInfo.lpThreadLocalBase);
3a3e9ee3 1491 retval = current_event.dwThreadId;
1e37c281
JM
1492 break;
1493
1494 case EXIT_PROCESS_DEBUG_EVENT:
1c1238a5 1495 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1496 (unsigned) current_event.dwProcessId,
1497 (unsigned) current_event.dwThreadId,
1498 "EXIT_PROCESS_DEBUG_EVENT"));
16d905e2
CF
1499 if (!windows_initialization_done)
1500 {
1501 target_terminal_ours ();
1502 target_mourn_inferior ();
1503 error (_("During startup program exited with code 0x%x."),
1504 (unsigned int) current_event.u.ExitProcess.dwExitCode);
1505 }
1506 else if (saw_create == 1)
1507 {
1508 ourstatus->kind = TARGET_WAITKIND_EXITED;
1509 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
1510 retval = main_thread_id;
1511 }
8a892701 1512 break;
1e37c281
JM
1513
1514 case LOAD_DLL_DEBUG_EVENT:
1c1238a5 1515 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1516 (unsigned) current_event.dwProcessId,
1517 (unsigned) current_event.dwThreadId,
1518 "LOAD_DLL_DEBUG_EVENT"));
700b351b 1519 CloseHandle (current_event.u.LoadDll.hFile);
dfe7f3ac
CF
1520 if (saw_create != 1)
1521 break;
8a892701 1522 catch_errors (handle_load_dll, NULL, (char *) "", RETURN_MASK_ALL);
450005e7
CF
1523 ourstatus->kind = TARGET_WAITKIND_LOADED;
1524 ourstatus->value.integer = 0;
9d3789f7 1525 retval = main_thread_id;
1e37c281
JM
1526 break;
1527
1528 case UNLOAD_DLL_DEBUG_EVENT:
1c1238a5 1529 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1530 (unsigned) current_event.dwProcessId,
1531 (unsigned) current_event.dwThreadId,
1532 "UNLOAD_DLL_DEBUG_EVENT"));
dfe7f3ac
CF
1533 if (saw_create != 1)
1534 break;
d3ff4a77 1535 catch_errors (handle_unload_dll, NULL, (char *) "", RETURN_MASK_ALL);
de1b3c3d
PA
1536 ourstatus->kind = TARGET_WAITKIND_LOADED;
1537 ourstatus->value.integer = 0;
1538 retval = main_thread_id;
d3ff4a77 1539 break;
1e37c281
JM
1540
1541 case EXCEPTION_DEBUG_EVENT:
1c1238a5 1542 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1543 (unsigned) current_event.dwProcessId,
1544 (unsigned) current_event.dwThreadId,
1545 "EXCEPTION_DEBUG_EVENT"));
dfe7f3ac
CF
1546 if (saw_create != 1)
1547 break;
a244bdca
CF
1548 switch (handle_exception (ourstatus))
1549 {
1550 case 0:
1551 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1552 break;
1553 case 1:
1554 retval = current_event.dwThreadId;
1555 break;
1556 case -1:
1557 last_sig = 1;
1558 continue_status = -1;
1559 break;
1560 }
1e37c281
JM
1561 break;
1562
8a892701 1563 case OUTPUT_DEBUG_STRING_EVENT: /* message from the kernel */
1c1238a5 1564 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
8a892701
CF
1565 (unsigned) current_event.dwProcessId,
1566 (unsigned) current_event.dwThreadId,
1567 "OUTPUT_DEBUG_STRING_EVENT"));
dfe7f3ac
CF
1568 if (saw_create != 1)
1569 break;
a244bdca 1570 retval = handle_output_debug_string (ourstatus);
1e37c281 1571 break;
9d3789f7 1572
1e37c281 1573 default:
dfe7f3ac
CF
1574 if (saw_create != 1)
1575 break;
29fe111d
CF
1576 printf_unfiltered ("gdb: kernel event for pid=%ld tid=%ld\n",
1577 (DWORD) current_event.dwProcessId,
1578 (DWORD) current_event.dwThreadId);
1579 printf_unfiltered (" unknown event code %ld\n",
1e37c281
JM
1580 current_event.dwDebugEventCode);
1581 break;
1582 }
1583
dfe7f3ac 1584 if (!retval || saw_create != 1)
a244bdca
CF
1585 {
1586 if (continue_status == -1)
02529b48 1587 windows_resume (ops, minus_one_ptid, 0, 1);
a244bdca 1588 else
dc05df57 1589 CHECK (windows_continue (continue_status, -1));
a244bdca 1590 }
450005e7 1591 else
9d3789f7 1592 {
2dc38344
PA
1593 inferior_ptid = ptid_build (current_event.dwProcessId, 0,
1594 retval);
3ade5333 1595 current_thread = th ?: thread_rec (current_event.dwThreadId, TRUE);
9d3789f7 1596 }
1e37c281
JM
1597
1598out:
450005e7 1599 return retval;
1e37c281
JM
1600}
1601
2dc38344 1602/* Wait for interesting events to occur in the target process. */
39f77062 1603static ptid_t
117de6a9 1604windows_wait (struct target_ops *ops,
47608cb1 1605 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
24e60978 1606{
2dc38344 1607 int pid = -1;
39f77062 1608
c44537cf
CV
1609 target_terminal_ours ();
1610
24e60978
SC
1611 /* We loop when we get a non-standard exception rather than return
1612 with a SPURIOUS because resume can try and step or modify things,
3cee93ac 1613 which needs a current_thread->h. But some of these exceptions mark
24e60978
SC
1614 the birth or death of threads, which mean that the current thread
1615 isn't necessarily what you think it is. */
1616
1617 while (1)
450005e7 1618 {
c57918b2 1619 int retval;
2b008701 1620
695de547
CF
1621 /* If the user presses Ctrl-c while the debugger is waiting
1622 for an event, he expects the debugger to interrupt his program
1623 and to get the prompt back. There are two possible situations:
1624
1625 - The debugger and the program do not share the console, in
1626 which case the Ctrl-c event only reached the debugger.
1627 In that case, the ctrl_c handler will take care of interrupting
1628 the inferior. Note that this case is working starting with
1629 Windows XP. For Windows 2000, Ctrl-C should be pressed in the
1630 inferior console.
1631
1632 - The debugger and the program share the same console, in which
1633 case both debugger and inferior will receive the Ctrl-c event.
1634 In that case the ctrl_c handler will ignore the event, as the
1635 Ctrl-c event generated inside the inferior will trigger the
1636 expected debug event.
1637
1638 FIXME: brobecker/2008-05-20: If the inferior receives the
1639 signal first and the delay until GDB receives that signal
1640 is sufficiently long, GDB can sometimes receive the SIGINT
1641 after we have unblocked the CTRL+C handler. This would
1642 lead to the debugger stopping prematurely while handling
1643 the new-thread event that comes with the handling of the SIGINT
1644 inside the inferior, and then stop again immediately when
1645 the user tries to resume the execution in the inferior.
1646 This is a classic race that we should try to fix one day. */
1647 SetConsoleCtrlHandler (&ctrl_c_handler, TRUE);
28439f5e 1648 retval = get_windows_debug_event (ops, pid, ourstatus);
695de547 1649 SetConsoleCtrlHandler (&ctrl_c_handler, FALSE);
c57918b2 1650
450005e7 1651 if (retval)
2dc38344 1652 return ptid_build (current_event.dwProcessId, 0, retval);
450005e7
CF
1653 else
1654 {
1655 int detach = 0;
3cee93ac 1656
98bbd631
AC
1657 if (deprecated_ui_loop_hook != NULL)
1658 detach = deprecated_ui_loop_hook (0);
0714f9bf 1659
450005e7 1660 if (detach)
7d85a9c0 1661 windows_kill_inferior (ops);
450005e7
CF
1662 }
1663 }
24e60978
SC
1664}
1665
9d3789f7 1666static void
dc05df57 1667do_initial_windows_stuff (struct target_ops *ops, DWORD pid, int attaching)
9d3789f7
CF
1668{
1669 extern int stop_after_trap;
fa4ba8da 1670 int i;
d6b48e9c 1671 struct inferior *inf;
2020b7ab 1672 struct thread_info *tp;
9d3789f7 1673
7393af7c 1674 last_sig = TARGET_SIGNAL_0;
9d3789f7
CF
1675 event_count = 0;
1676 exception_count = 0;
bf25528d 1677 open_process_used = 0;
fa4ba8da 1678 debug_registers_changed = 0;
dfe7f3ac 1679 debug_registers_used = 0;
fa4ba8da
PM
1680 for (i = 0; i < sizeof (dr) / sizeof (dr[0]); i++)
1681 dr[i] = 0;
10325bc5 1682#ifdef __CYGWIN__
de1b3c3d 1683 cygwin_load_start = cygwin_load_end = 0;
10325bc5 1684#endif
9d3789f7
CF
1685 current_event.dwProcessId = pid;
1686 memset (&current_event, 0, sizeof (current_event));
0795be10 1687 push_target (ops);
cb851954 1688 disable_breakpoints_in_shlibs ();
dc05df57 1689 windows_clear_solib ();
9d3789f7
CF
1690 clear_proceed_status ();
1691 init_wait_for_inferior ();
1692
6c95b8df
PA
1693 inf = current_inferior ();
1694 inferior_appeared (inf, pid);
181e7f93 1695 inf->attach_flag = attaching;
7f9f62ba 1696
9f9d052e
PM
1697 /* Make the new process the current inferior, so terminal handling
1698 can rely on it. When attaching, we don't know about any thread
1699 id here, but that's OK --- nothing should be referencing the
dc05df57 1700 current thread until we report an event out of windows_wait. */
9f9d052e
PM
1701 inferior_ptid = pid_to_ptid (pid);
1702
c44537cf 1703 terminal_init_inferior_with_pgrp (pid);
9d3789f7
CF
1704 target_terminal_inferior ();
1705
16d905e2 1706 windows_initialization_done = 0;
16c381f0 1707 inf->control.stop_soon = STOP_QUIETLY;
9d3789f7
CF
1708 while (1)
1709 {
1710 stop_after_trap = 1;
ae123ec6 1711 wait_for_inferior (0);
2020b7ab 1712 tp = inferior_thread ();
16c381f0
JK
1713 if (tp->suspend.stop_signal != TARGET_SIGNAL_TRAP)
1714 resume (0, tp->suspend.stop_signal);
9d3789f7
CF
1715 else
1716 break;
1717 }
eff8332b 1718
16d905e2 1719 windows_initialization_done = 1;
16c381f0 1720 inf->control.stop_soon = NO_STOP_QUIETLY;
9d3789f7
CF
1721 stop_after_trap = 0;
1722 return;
1723}
1724
616a9dc4
CV
1725/* Try to set or remove a user privilege to the current process. Return -1
1726 if that fails, the previous setting of that privilege otherwise.
1727
1728 This code is copied from the Cygwin source code and rearranged to allow
1729 dynamically loading of the needed symbols from advapi32 which is only
1730 available on NT/2K/XP. */
1731static int
1732set_process_privilege (const char *privilege, BOOL enable)
1733{
616a9dc4
CV
1734 HANDLE token_hdl = NULL;
1735 LUID restore_priv;
1736 TOKEN_PRIVILEGES new_priv, orig_priv;
1737 int ret = -1;
1738 DWORD size;
1739
616a9dc4
CV
1740 if (!OpenProcessToken (GetCurrentProcess (),
1741 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
1742 &token_hdl))
1743 goto out;
1744
418c6cb3 1745 if (!LookupPrivilegeValueA (NULL, privilege, &restore_priv))
616a9dc4
CV
1746 goto out;
1747
1748 new_priv.PrivilegeCount = 1;
1749 new_priv.Privileges[0].Luid = restore_priv;
1750 new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0;
1751
1752 if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv,
295732ea 1753 sizeof orig_priv, &orig_priv, &size))
616a9dc4
CV
1754 goto out;
1755#if 0
1756 /* Disabled, otherwise every `attach' in an unprivileged user session
1757 would raise the "Failed to get SE_DEBUG_NAME privilege" warning in
dc05df57 1758 windows_attach(). */
616a9dc4
CV
1759 /* AdjustTokenPrivileges returns TRUE even if the privilege could not
1760 be enabled. GetLastError () returns an correct error code, though. */
1761 if (enable && GetLastError () == ERROR_NOT_ALL_ASSIGNED)
1762 goto out;
1763#endif
1764
1765 ret = orig_priv.Privileges[0].Attributes == SE_PRIVILEGE_ENABLED ? 1 : 0;
1766
1767out:
1768 if (token_hdl)
1769 CloseHandle (token_hdl);
1770
1771 return ret;
1772}
1773
02cc9f49 1774/* Attach to process PID, then initialize for debugging it. */
24e60978 1775static void
dc05df57 1776windows_attach (struct target_ops *ops, char *args, int from_tty)
24e60978
SC
1777{
1778 BOOL ok;
559e75c0 1779 DWORD pid;
24e60978 1780
74164c56 1781 pid = parse_pid_to_attach (args);
24e60978 1782
616a9dc4
CV
1783 if (set_process_privilege (SE_DEBUG_NAME, TRUE) < 0)
1784 {
1785 printf_unfiltered ("Warning: Failed to get SE_DEBUG_NAME privilege\n");
1786 printf_unfiltered ("This can cause attach to fail on Windows NT/2K/XP\n");
1787 }
1788
dc05df57 1789 windows_init_thread_list ();
9d3789f7 1790 ok = DebugActiveProcess (pid);
91a175b3 1791 saw_create = 0;
24e60978 1792
10325bc5 1793#ifdef __CYGWIN__
24e60978 1794 if (!ok)
baa93fa6
CF
1795 {
1796 /* Try fall back to Cygwin pid */
1797 pid = cygwin_internal (CW_CYGWIN_PID_TO_WINPID, pid);
1798
1799 if (pid > 0)
1800 ok = DebugActiveProcess (pid);
10325bc5
PA
1801 }
1802#endif
baa93fa6 1803
10325bc5
PA
1804 if (!ok)
1805 error (_("Can't attach to process."));
24e60978 1806
2b008701 1807 DebugSetProcessKillOnExit (FALSE);
3ade5333 1808
24e60978
SC
1809 if (from_tty)
1810 {
1811 char *exec_file = (char *) get_exec_file (0);
1812
1813 if (exec_file)
1814 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
39f77062 1815 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1816 else
1817 printf_unfiltered ("Attaching to %s\n",
39f77062 1818 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1819
1820 gdb_flush (gdb_stdout);
1821 }
1822
dc05df57 1823 do_initial_windows_stuff (ops, pid, 1);
9d3789f7 1824 target_terminal_ours ();
24e60978
SC
1825}
1826
24e60978 1827static void
dc05df57 1828windows_detach (struct target_ops *ops, char *args, int from_tty)
24e60978 1829{
02cc9f49
CV
1830 int detached = 1;
1831
2b008701
CF
1832 ptid_t ptid = {-1};
1833 windows_resume (ops, ptid, 0, TARGET_SIGNAL_0);
96998ce7 1834
2b008701
CF
1835 if (!DebugActiveProcessStop (current_event.dwProcessId))
1836 {
1837 error (_("Can't detach process %lu (error %lu)"),
1838 current_event.dwProcessId, GetLastError ());
1839 detached = 0;
02cc9f49 1840 }
2b008701
CF
1841 DebugSetProcessKillOnExit (FALSE);
1842
02cc9f49 1843 if (detached && from_tty)
24e60978
SC
1844 {
1845 char *exec_file = get_exec_file (0);
1846 if (exec_file == 0)
1847 exec_file = "";
02cc9f49
CV
1848 printf_unfiltered ("Detaching from program: %s, Pid %lu\n", exec_file,
1849 current_event.dwProcessId);
24e60978
SC
1850 gdb_flush (gdb_stdout);
1851 }
7f9f62ba 1852
39f77062 1853 inferior_ptid = null_ptid;
7f9f62ba
PA
1854 detach_inferior (current_event.dwProcessId);
1855
0795be10 1856 unpush_target (ops);
24e60978
SC
1857}
1858
3ee6f623 1859static char *
dc05df57 1860windows_pid_to_exec_file (int pid)
47216e51 1861{
b3c613f2 1862 static char path[__PMAX];
10325bc5 1863#ifdef __CYGWIN__
33605d39
CF
1864 /* Try to find exe name as symlink target of /proc/<pid>/exe */
1865 int nchars;
1866 char procexe[sizeof ("/proc/4294967295/exe")];
2dc38344 1867 sprintf (procexe, "/proc/%u/exe", pid);
33605d39
CF
1868 nchars = readlink (procexe, path, sizeof(path));
1869 if (nchars > 0 && nchars < sizeof (path))
47216e51 1870 {
33605d39
CF
1871 path[nchars] = '\0'; /* Got it */
1872 return path;
47216e51 1873 }
10325bc5
PA
1874#endif
1875
33605d39
CF
1876 /* If we get here then either Cygwin is hosed, this isn't a Cygwin version
1877 of gdb, or we're trying to debug a non-Cygwin windows executable. */
1878 if (!get_module_name (0, path))
1879 path[0] = '\0';
1880
1881 return path;
47216e51
CV
1882}
1883
24e60978
SC
1884/* Print status information about what we're accessing. */
1885
1886static void
dc05df57 1887windows_files_info (struct target_ops *ignore)
24e60978 1888{
181e7f93
PA
1889 struct inferior *inf = current_inferior ();
1890
24e60978 1891 printf_unfiltered ("\tUsing the running image of %s %s.\n",
181e7f93
PA
1892 inf->attach_flag ? "attached" : "child",
1893 target_pid_to_str (inferior_ptid));
24e60978
SC
1894}
1895
24e60978 1896static void
dc05df57 1897windows_open (char *arg, int from_tty)
24e60978 1898{
8a3fe4f8 1899 error (_("Use the \"run\" command to start a Unix child process."));
24e60978
SC
1900}
1901
cd44747c
PM
1902/* Modify CreateProcess parameters for use of a new separate console.
1903 Parameters are:
1904 *FLAGS: DWORD parameter for general process creation flags.
1905 *SI: STARTUPINFO structure, for which the console window size and
1906 console buffer size is filled in if GDB is running in a console.
1907 to create the new console.
1908 The size of the used font is not available on all versions of
1909 Windows OS. Furthermore, the current font might not be the default
1910 font, but this is still better than before.
1911 If the windows and buffer sizes are computed,
1912 SI->DWFLAGS is changed so that this information is used
1913 by CreateProcess function. */
1914
1915static void
1916windows_set_console_info (STARTUPINFO *si, DWORD *flags)
1917{
1918 HANDLE hconsole = CreateFile ("CONOUT$", GENERIC_READ | GENERIC_WRITE,
1919 FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, 0);
1920
1921 if (hconsole != INVALID_HANDLE_VALUE)
1922 {
1923 CONSOLE_SCREEN_BUFFER_INFO sbinfo;
1924 COORD font_size;
1925 CONSOLE_FONT_INFO cfi;
1926
1927 GetCurrentConsoleFont (hconsole, FALSE, &cfi);
1928 font_size = GetConsoleFontSize (hconsole, cfi.nFont);
1929 GetConsoleScreenBufferInfo(hconsole, &sbinfo);
1930 si->dwXSize = sbinfo.srWindow.Right - sbinfo.srWindow.Left + 1;
1931 si->dwYSize = sbinfo.srWindow.Bottom - sbinfo.srWindow.Top + 1;
1932 if (font_size.X)
1933 si->dwXSize *= font_size.X;
1934 else
1935 si->dwXSize *= 8;
1936 if (font_size.Y)
1937 si->dwYSize *= font_size.Y;
1938 else
1939 si->dwYSize *= 12;
1940 si->dwXCountChars = sbinfo.dwSize.X;
1941 si->dwYCountChars = sbinfo.dwSize.Y;
1942 si->dwFlags |= STARTF_USESIZE | STARTF_USECOUNTCHARS;
1943 }
1944 *flags |= CREATE_NEW_CONSOLE;
1945}
1946
dc05df57 1947/* Start an inferior windows child process and sets inferior_ptid to its pid.
24e60978
SC
1948 EXEC_FILE is the file to run.
1949 ALLARGS is a string containing the arguments to the program.
1950 ENV is the environment vector to pass. Errors reported with error(). */
1951
24e60978 1952static void
dc05df57 1953windows_create_inferior (struct target_ops *ops, char *exec_file,
136d6dae 1954 char *allargs, char **in_env, int from_tty)
24e60978 1955{
b3c613f2 1956 STARTUPINFO si;
41b4aadc 1957#ifdef __CYGWIN__
b3c613f2
CF
1958 cygwin_buf_t real_path[__PMAX];
1959 cygwin_buf_t shell[__PMAX]; /* Path to shell */
d0d0ab16 1960 const char *sh;
b3c613f2
CF
1961 cygwin_buf_t *toexec;
1962 cygwin_buf_t *cygallargs;
1963 cygwin_buf_t *args;
d0d0ab16 1964 size_t len;
2becadee
CF
1965 int tty;
1966 int ostdin, ostdout, ostderr;
41b4aadc 1967#else
b3c613f2
CF
1968 char real_path[__PMAX];
1969 char shell[__PMAX]; /* Path to shell */
d0d0ab16
CV
1970 char *toexec;
1971 char *args;
41b4aadc
CF
1972 HANDLE tty;
1973#endif
d0d0ab16
CV
1974 PROCESS_INFORMATION pi;
1975 BOOL ret;
1976 DWORD flags = 0;
3cb3b8df 1977 const char *inferior_io_terminal = get_inferior_io_terminal ();
24e60978
SC
1978
1979 if (!exec_file)
8a3fe4f8 1980 error (_("No executable specified, use `target exec'."));
24e60978
SC
1981
1982 memset (&si, 0, sizeof (si));
1983 si.cb = sizeof (si);
1984
d0d0ab16
CV
1985 if (new_group)
1986 flags |= CREATE_NEW_PROCESS_GROUP;
1987
1988 if (new_console)
cd44747c 1989 windows_set_console_info (&si, &flags);
d0d0ab16 1990
10325bc5 1991#ifdef __CYGWIN__
349b409f 1992 if (!useshell)
dfe7f3ac 1993 {
d0d0ab16
CV
1994 flags |= DEBUG_ONLY_THIS_PROCESS;
1995 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, exec_file, real_path,
b3c613f2 1996 __PMAX * sizeof (cygwin_buf_t)) < 0)
d0d0ab16 1997 error (_("Error starting executable: %d"), errno);
dfe7f3ac 1998 toexec = real_path;
b3c613f2 1999#ifdef __USEWIDE
d0d0ab16
CV
2000 len = mbstowcs (NULL, allargs, 0) + 1;
2001 if (len == (size_t) -1)
2002 error (_("Error starting executable: %d"), errno);
2003 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2004 mbstowcs (cygallargs, allargs, len);
60c5c021
CF
2005#else
2006 cygallargs = allargs;
b3c613f2 2007#endif
dfe7f3ac
CF
2008 }
2009 else
2010 {
349b409f
CF
2011 sh = getenv ("SHELL");
2012 if (!sh)
2013 sh = "/bin/sh";
b3c613f2 2014 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, sh, shell, __PMAX) < 0)
d0d0ab16 2015 error (_("Error starting executable via shell: %d"), errno);
b3c613f2 2016#ifdef __USEWIDE
d0d0ab16
CV
2017 len = sizeof (L" -c 'exec '") + mbstowcs (NULL, exec_file, 0)
2018 + mbstowcs (NULL, allargs, 0) + 2;
2019 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2020 swprintf (cygallargs, len, L" -c 'exec %s %s'", exec_file, allargs);
b3c613f2
CF
2021#else
2022 cygallargs = (char *) alloca (sizeof (" -c 'exec '") + strlen (exec_file)
2023 + strlen (allargs) + 2);
2024 sprintf (cygallargs, " -c 'exec %s %s'", exec_file, allargs);
2025#endif
dfe7f3ac 2026 toexec = shell;
d0d0ab16 2027 flags |= DEBUG_PROCESS;
dfe7f3ac 2028 }
b3c613f2
CF
2029
2030#ifdef __USEWIDE
2031 args = (cygwin_buf_t *) alloca ((wcslen (toexec) + wcslen (cygallargs) + 2)
2032 * sizeof (wchar_t));
d0d0ab16
CV
2033 wcscpy (args, toexec);
2034 wcscat (args, L" ");
2035 wcscat (args, cygallargs);
b3c613f2
CF
2036#else
2037 args = (cygwin_buf_t *) alloca (strlen (toexec) + strlen (cygallargs) + 2);
2038 strcpy (args, toexec);
2039 strcat (args, " ");
2040 strcat (args, cygallargs);
2041#endif
2042
e88c49c3 2043 /* Prepare the environment vars for CreateProcess. */
002c07a9 2044 cygwin_internal (CW_SYNC_WINENV);
1750a5ef 2045
2becadee
CF
2046 if (!inferior_io_terminal)
2047 tty = ostdin = ostdout = ostderr = -1;
2048 else
2049 {
2050 tty = open (inferior_io_terminal, O_RDWR | O_NOCTTY);
2051 if (tty < 0)
2052 {
2053 print_sys_errmsg (inferior_io_terminal, errno);
2054 ostdin = ostdout = ostderr = -1;
2055 }
2056 else
2057 {
2058 ostdin = dup (0);
2059 ostdout = dup (1);
2060 ostderr = dup (2);
2061 dup2 (tty, 0);
2062 dup2 (tty, 1);
2063 dup2 (tty, 2);
2064 }
2065 }
d0d0ab16
CV
2066
2067 windows_init_thread_list ();
b3c613f2
CF
2068 ret = CreateProcess (0,
2069 args, /* command line */
2070 NULL, /* Security */
2071 NULL, /* thread */
2072 TRUE, /* inherit handles */
2073 flags, /* start flags */
2074 NULL, /* environment */
2075 NULL, /* current directory */
2076 &si,
2077 &pi);
d0d0ab16
CV
2078 if (tty >= 0)
2079 {
2080 close (tty);
2081 dup2 (ostdin, 0);
2082 dup2 (ostdout, 1);
2083 dup2 (ostderr, 2);
2084 close (ostdin);
2085 close (ostdout);
2086 close (ostderr);
2087 }
41b4aadc 2088#else
b3c613f2 2089 toexec = exec_file;
d0d0ab16
CV
2090 args = alloca (strlen (toexec) + strlen (allargs) + 2);
2091 strcpy (args, toexec);
2092 strcat (args, " ");
2093 strcat (args, allargs);
2094
d0d0ab16
CV
2095 flags |= DEBUG_ONLY_THIS_PROCESS;
2096
41b4aadc
CF
2097 if (!inferior_io_terminal)
2098 tty = INVALID_HANDLE_VALUE;
2099 else
2100 {
2101 SECURITY_ATTRIBUTES sa;
2102 sa.nLength = sizeof(sa);
2103 sa.lpSecurityDescriptor = 0;
2104 sa.bInheritHandle = TRUE;
2105 tty = CreateFileA (inferior_io_terminal, GENERIC_READ | GENERIC_WRITE,
2106 0, &sa, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
2107 if (tty == INVALID_HANDLE_VALUE)
2108 warning (_("Warning: Failed to open TTY %s, error %#x."),
2109 inferior_io_terminal, (unsigned) GetLastError ());
2110 else
2111 {
2112 si.hStdInput = tty;
2113 si.hStdOutput = tty;
2114 si.hStdError = tty;
2115 si.dwFlags |= STARTF_USESTDHANDLES;
2116 }
2117 }
2becadee 2118
dc05df57 2119 windows_init_thread_list ();
d0d0ab16
CV
2120 ret = CreateProcessA (0,
2121 args, /* command line */
2122 NULL, /* Security */
2123 NULL, /* thread */
2124 TRUE, /* inherit handles */
2125 flags, /* start flags */
2126 NULL, /* environment */
2127 NULL, /* current directory */
2128 &si,
2129 &pi);
41b4aadc
CF
2130 if (tty != INVALID_HANDLE_VALUE)
2131 CloseHandle (tty);
10325bc5 2132#endif
2becadee 2133
24e60978 2134 if (!ret)
8a3fe4f8
AC
2135 error (_("Error creating process %s, (error %d)."),
2136 exec_file, (unsigned) GetLastError ());
24e60978 2137
c1766e7d
PM
2138 CloseHandle (pi.hThread);
2139 CloseHandle (pi.hProcess);
2140
dfe7f3ac
CF
2141 if (useshell && shell[0] != '\0')
2142 saw_create = -1;
2143 else
2144 saw_create = 0;
2145
dc05df57 2146 do_initial_windows_stuff (ops, pi.dwProcessId, 0);
d3a09475 2147
dc05df57 2148 /* windows_continue (DBG_CONTINUE, -1); */
24e60978
SC
2149}
2150
2151static void
dc05df57 2152windows_mourn_inferior (struct target_ops *ops)
24e60978 2153{
dc05df57 2154 (void) windows_continue (DBG_CONTINUE, -1);
fa4ba8da 2155 i386_cleanup_dregs();
bf25528d
CF
2156 if (open_process_used)
2157 {
2158 CHECK (CloseHandle (current_process_handle));
2159 open_process_used = 0;
2160 }
0795be10 2161 unpush_target (ops);
24e60978
SC
2162 generic_mourn_inferior ();
2163}
2164
24e60978
SC
2165/* Send a SIGINT to the process group. This acts just like the user typed a
2166 ^C on the controlling terminal. */
2167
b607efe7 2168static void
dc05df57 2169windows_stop (ptid_t ptid)
24e60978 2170{
1ef980b9 2171 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
1e37c281 2172 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
3a4b77d8 2173 registers_changed (); /* refresh register state */
24e60978
SC
2174}
2175
3ee6f623 2176static int
dc05df57 2177windows_xfer_memory (CORE_ADDR memaddr, gdb_byte *our, int len,
0a65a603
AC
2178 int write, struct mem_attrib *mem,
2179 struct target_ops *target)
24e60978 2180{
5732a500 2181 SIZE_T done = 0;
24e60978
SC
2182 if (write)
2183 {
29fe111d 2184 DEBUG_MEM (("gdb: write target memory, %d bytes at 0x%08lx\n",
2c647436 2185 len, (DWORD) (uintptr_t) memaddr));
2b008701 2186 if (!WriteProcessMemory (current_process_handle,
2c647436 2187 (LPVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2188 len, &done))
2189 done = 0;
2b008701 2190 FlushInstructionCache (current_process_handle,
2c647436 2191 (LPCVOID) (uintptr_t) memaddr, len);
24e60978
SC
2192 }
2193 else
2194 {
29fe111d 2195 DEBUG_MEM (("gdb: read target memory, %d bytes at 0x%08lx\n",
2c647436 2196 len, (DWORD) (uintptr_t) memaddr));
2b008701 2197 if (!ReadProcessMemory (current_process_handle,
2c647436 2198 (LPCVOID) (uintptr_t) memaddr, our,
6f17862b
CF
2199 len, &done))
2200 done = 0;
24e60978
SC
2201 }
2202 return done;
2203}
2204
3ee6f623 2205static void
7d85a9c0 2206windows_kill_inferior (struct target_ops *ops)
24e60978 2207{
3cee93ac
CF
2208 CHECK (TerminateProcess (current_process_handle, 0));
2209
b5edcb45
ILT
2210 for (;;)
2211 {
dc05df57 2212 if (!windows_continue (DBG_CONTINUE, -1))
b5edcb45 2213 break;
3cee93ac 2214 if (!WaitForDebugEvent (&current_event, INFINITE))
b5edcb45 2215 break;
3cee93ac 2216 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
b5edcb45
ILT
2217 break;
2218 }
2219
dc05df57 2220 target_mourn_inferior (); /* or just windows_mourn_inferior? */
24e60978
SC
2221}
2222
24e60978 2223static void
dc05df57 2224windows_prepare_to_store (struct regcache *regcache)
24e60978
SC
2225{
2226 /* Do nothing, since we can store individual regs */
2227}
2228
2229static int
dc05df57 2230windows_can_run (void)
24e60978
SC
2231{
2232 return 1;
2233}
2234
2235static void
dc05df57 2236windows_close (int x)
24e60978 2237{
dc05df57 2238 DEBUG_EVENTS (("gdb: windows_close, inferior_ptid=%d\n",
3bccec63 2239 PIDGET (inferior_ptid)));
24e60978 2240}
1ef980b9 2241
3ee6f623
CF
2242/* Convert pid to printable format. */
2243static char *
117de6a9 2244windows_pid_to_str (struct target_ops *ops, ptid_t ptid)
24e60978 2245{
3ee6f623 2246 static char buf[80];
3ee6f623 2247
2dc38344
PA
2248 if (ptid_get_tid (ptid) != 0)
2249 {
2250 snprintf (buf, sizeof (buf), "Thread %d.0x%lx",
2251 ptid_get_pid (ptid), ptid_get_tid (ptid));
2252 return buf;
2253 }
2254
2255 return normal_pid_to_str (ptid);
3ee6f623
CF
2256}
2257
de1b3c3d 2258static LONGEST
dc05df57 2259windows_xfer_shared_libraries (struct target_ops *ops,
de1b3c3d
PA
2260 enum target_object object, const char *annex,
2261 gdb_byte *readbuf, const gdb_byte *writebuf,
2262 ULONGEST offset, LONGEST len)
3cb8e7f6 2263{
de1b3c3d
PA
2264 struct obstack obstack;
2265 const char *buf;
2266 LONGEST len_avail;
3cb8e7f6 2267 struct so_list *so;
3cb8e7f6 2268
de1b3c3d
PA
2269 if (writebuf)
2270 return -1;
3cb8e7f6 2271
de1b3c3d
PA
2272 obstack_init (&obstack);
2273 obstack_grow_str (&obstack, "<library-list>\n");
2274 for (so = solib_start.next; so; so = so->next)
dc05df57 2275 windows_xfer_shared_library (so->so_name, (CORE_ADDR) (uintptr_t) so->lm_info->load_addr,
5af949e3 2276 target_gdbarch, &obstack);
de1b3c3d 2277 obstack_grow_str0 (&obstack, "</library-list>\n");
3cb8e7f6 2278
de1b3c3d
PA
2279 buf = obstack_finish (&obstack);
2280 len_avail = strlen (buf);
2281 if (offset >= len_avail)
2282 return 0;
3cb8e7f6 2283
de1b3c3d
PA
2284 if (len > len_avail - offset)
2285 len = len_avail - offset;
2286 memcpy (readbuf, buf + offset, len);
3cb8e7f6 2287
de1b3c3d
PA
2288 obstack_free (&obstack, NULL);
2289 return len;
3cb8e7f6
CF
2290}
2291
de1b3c3d 2292static LONGEST
dc05df57 2293windows_xfer_partial (struct target_ops *ops, enum target_object object,
de1b3c3d
PA
2294 const char *annex, gdb_byte *readbuf,
2295 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
3cb8e7f6 2296{
de1b3c3d 2297 switch (object)
3cb8e7f6 2298 {
de1b3c3d
PA
2299 case TARGET_OBJECT_MEMORY:
2300 if (readbuf)
2301 return (*ops->deprecated_xfer_memory) (offset, readbuf,
244e85c8 2302 len, 0/*read*/, NULL, ops);
de1b3c3d
PA
2303 if (writebuf)
2304 return (*ops->deprecated_xfer_memory) (offset, (gdb_byte *) writebuf,
2305 len, 1/*write*/, NULL, ops);
2306 return -1;
2307
2308 case TARGET_OBJECT_LIBRARIES:
dc05df57 2309 return windows_xfer_shared_libraries (ops, object, annex, readbuf,
de1b3c3d 2310 writebuf, offset, len);
3929abe9 2311
de1b3c3d
PA
2312 default:
2313 if (ops->beneath != NULL)
2314 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
2315 readbuf, writebuf, offset, len);
2316 return -1;
3929abe9 2317 }
02c5aecd
CF
2318}
2319
711e434b
PM
2320/* Provide thread local base, i.e. Thread Information Block address.
2321 Returns 1 if ptid is found and sets *ADDR to thread_local_base. */
2322
2323static int
2324windows_get_tib_address (ptid_t ptid, CORE_ADDR *addr)
2325{
2326 thread_info *th;
2327
2328 th = thread_rec (ptid_get_tid (ptid), 0);
2329 if (th == NULL)
2330 return 0;
2331
2332 if (addr != NULL)
2333 *addr = th->thread_local_base;
2334
2335 return 1;
2336}
2337
1e2f1c5c
JB
2338static ptid_t
2339windows_get_ada_task_ptid (long lwp, long thread)
2340{
2341 return ptid_build (ptid_get_pid (inferior_ptid), 0, lwp);
2342}
2343
3ee6f623 2344static void
dc05df57 2345init_windows_ops (void)
3ee6f623 2346{
dc05df57
CF
2347 windows_ops.to_shortname = "child";
2348 windows_ops.to_longname = "Win32 child process";
2349 windows_ops.to_doc = "Win32 child process (started by the \"run\" command).";
2350 windows_ops.to_open = windows_open;
2351 windows_ops.to_close = windows_close;
2352 windows_ops.to_attach = windows_attach;
2353 windows_ops.to_attach_no_wait = 1;
2354 windows_ops.to_detach = windows_detach;
2355 windows_ops.to_resume = windows_resume;
2356 windows_ops.to_wait = windows_wait;
2357 windows_ops.to_fetch_registers = windows_fetch_inferior_registers;
2358 windows_ops.to_store_registers = windows_store_inferior_registers;
2359 windows_ops.to_prepare_to_store = windows_prepare_to_store;
2360 windows_ops.deprecated_xfer_memory = windows_xfer_memory;
2361 windows_ops.to_xfer_partial = windows_xfer_partial;
2362 windows_ops.to_files_info = windows_files_info;
2363 windows_ops.to_insert_breakpoint = memory_insert_breakpoint;
2364 windows_ops.to_remove_breakpoint = memory_remove_breakpoint;
2365 windows_ops.to_terminal_init = terminal_init_inferior;
2366 windows_ops.to_terminal_inferior = terminal_inferior;
2367 windows_ops.to_terminal_ours_for_output = terminal_ours_for_output;
2368 windows_ops.to_terminal_ours = terminal_ours;
2369 windows_ops.to_terminal_save_ours = terminal_save_ours;
2370 windows_ops.to_terminal_info = child_terminal_info;
2371 windows_ops.to_kill = windows_kill_inferior;
2372 windows_ops.to_create_inferior = windows_create_inferior;
2373 windows_ops.to_mourn_inferior = windows_mourn_inferior;
2374 windows_ops.to_can_run = windows_can_run;
2375 windows_ops.to_thread_alive = windows_thread_alive;
2376 windows_ops.to_pid_to_str = windows_pid_to_str;
2377 windows_ops.to_stop = windows_stop;
2378 windows_ops.to_stratum = process_stratum;
c35b1492
PA
2379 windows_ops.to_has_all_memory = default_child_has_all_memory;
2380 windows_ops.to_has_memory = default_child_has_memory;
2381 windows_ops.to_has_stack = default_child_has_stack;
2382 windows_ops.to_has_registers = default_child_has_registers;
2383 windows_ops.to_has_execution = default_child_has_execution;
dc05df57 2384 windows_ops.to_pid_to_exec_file = windows_pid_to_exec_file;
1e2f1c5c 2385 windows_ops.to_get_ada_task_ptid = windows_get_ada_task_ptid;
711e434b 2386 windows_ops.to_get_tib_address = windows_get_tib_address;
9bb9e8ad 2387
5aca5a82
PM
2388 i386_use_watchpoints (&windows_ops);
2389
9bb9e8ad
PM
2390 i386_dr_low.set_control = cygwin_set_dr7;
2391 i386_dr_low.set_addr = cygwin_set_dr;
2392 i386_dr_low.reset_addr = NULL;
2393 i386_dr_low.get_status = cygwin_get_dr6;
2394
2395 /* i386_dr_low.debug_register_length field is set by
2396 calling i386_set_debug_register_length function
2397 in processor windows specific native file. */
2398
dc05df57 2399 windows_ops.to_magic = OPS_MAGIC;
c719b714 2400}
24e60978 2401
3929abe9 2402static void
dc05df57 2403set_windows_aliases (char *argv0)
3929abe9
CF
2404{
2405 add_info_alias ("dll", "sharedlibrary", 1);
2406}
2407
24e60978 2408void
dc05df57 2409_initialize_windows_nat (void)
24e60978 2410{
fa58ee11
EZ
2411 struct cmd_list_element *c;
2412
dc05df57 2413 init_windows_ops ();
1ef980b9 2414
d0d0ab16
CV
2415#ifdef __CYGWIN__
2416 cygwin_internal (CW_SET_DOS_FILE_WARNING, 0);
2417#endif
2418
fa58ee11 2419 c = add_com ("dll-symbols", class_files, dll_symbol_command,
1bedd215 2420 _("Load dll library symbols from FILE."));
5ba2abeb 2421 set_cmd_completer (c, filename_completer);
450005e7
CF
2422
2423 add_com_alias ("sharedlibrary", "dll-symbols", class_alias, 1);
2424
70992597
PM
2425 add_com_alias ("add-shared-symbol-files", "dll-symbols", class_alias, 1);
2426
2427 add_com_alias ("assf", "dll-symbols", class_alias, 1);
2428
10325bc5 2429#ifdef __CYGWIN__
5bf193a2
AC
2430 add_setshow_boolean_cmd ("shell", class_support, &useshell, _("\
2431Set use of shell to start subprocess."), _("\
2432Show use of shell to start subprocess."), NULL,
2433 NULL,
2434 NULL, /* FIXME: i18n: */
2435 &setlist, &showlist);
2436
09280ddf
CF
2437 add_setshow_boolean_cmd ("cygwin-exceptions", class_support, &cygwin_exceptions, _("\
2438Break when an exception is detected in the Cygwin DLL itself."), _("\
2439Show whether gdb breaks on exceptions in the Cygwin DLL itself."), NULL,
2440 NULL,
2441 NULL, /* FIXME: i18n: */
2442 &setlist, &showlist);
10325bc5 2443#endif
09280ddf 2444
5bf193a2
AC
2445 add_setshow_boolean_cmd ("new-console", class_support, &new_console, _("\
2446Set creation of new console when creating child process."), _("\
2447Show creation of new console when creating child process."), NULL,
2448 NULL,
2449 NULL, /* FIXME: i18n: */
2450 &setlist, &showlist);
2451
2452 add_setshow_boolean_cmd ("new-group", class_support, &new_group, _("\
2453Set creation of new group when creating child process."), _("\
2454Show creation of new group when creating child process."), NULL,
2455 NULL,
2456 NULL, /* FIXME: i18n: */
2457 &setlist, &showlist);
2458
2459 add_setshow_boolean_cmd ("debugexec", class_support, &debug_exec, _("\
2460Set whether to display execution in child process."), _("\
2461Show whether to display execution in child process."), NULL,
2462 NULL,
2463 NULL, /* FIXME: i18n: */
2464 &setlist, &showlist);
2465
2466 add_setshow_boolean_cmd ("debugevents", class_support, &debug_events, _("\
2467Set whether to display kernel events in child process."), _("\
2468Show whether to display kernel events in child process."), NULL,
2469 NULL,
2470 NULL, /* FIXME: i18n: */
2471 &setlist, &showlist);
2472
2473 add_setshow_boolean_cmd ("debugmemory", class_support, &debug_memory, _("\
2474Set whether to display memory accesses in child process."), _("\
2475Show whether to display memory accesses in child process."), NULL,
2476 NULL,
2477 NULL, /* FIXME: i18n: */
2478 &setlist, &showlist);
2479
2480 add_setshow_boolean_cmd ("debugexceptions", class_support,
2481 &debug_exceptions, _("\
2482Set whether to display kernel exceptions in child process."), _("\
2483Show whether to display kernel exceptions in child process."), NULL,
2484 NULL,
2485 NULL, /* FIXME: i18n: */
2486 &setlist, &showlist);
1ef980b9 2487
711e434b 2488 init_w32_command_list ();
c1748f97
PM
2489
2490 add_cmd ("selector", class_info, display_selectors,
1a966eab 2491 _("Display selectors infos."),
c1748f97 2492 &info_w32_cmdlist);
dc05df57
CF
2493 add_target (&windows_ops);
2494 deprecated_init_ui_hook = set_windows_aliases;
24e60978 2495}
3cee93ac 2496
fa4ba8da
PM
2497/* Hardware watchpoint support, adapted from go32-nat.c code. */
2498
2499/* Pass the address ADDR to the inferior in the I'th debug register.
2500 Here we just store the address in dr array, the registers will be
dc05df57 2501 actually set up when windows_continue is called. */
9bb9e8ad 2502static void
fa4ba8da
PM
2503cygwin_set_dr (int i, CORE_ADDR addr)
2504{
2505 if (i < 0 || i > 3)
2506 internal_error (__FILE__, __LINE__,
e2e0b3e5 2507 _("Invalid register %d in cygwin_set_dr.\n"), i);
41b4aadc 2508 dr[i] = addr;
fa4ba8da
PM
2509 debug_registers_changed = 1;
2510 debug_registers_used = 1;
2511}
2512
2513/* Pass the value VAL to the inferior in the DR7 debug control
2514 register. Here we just store the address in D_REGS, the watchpoint
dc05df57 2515 will be actually set up in windows_wait. */
9bb9e8ad
PM
2516static void
2517cygwin_set_dr7 (unsigned long val)
fa4ba8da 2518{
9bb9e8ad 2519 dr[7] = (CORE_ADDR) val;
fa4ba8da
PM
2520 debug_registers_changed = 1;
2521 debug_registers_used = 1;
2522}
2523
2524/* Get the value of the DR6 debug status register from the inferior.
2525 Here we just return the value stored in dr[6]
2526 by the last call to thread_rec for current_event.dwThreadId id. */
9bb9e8ad 2527static unsigned long
fa4ba8da
PM
2528cygwin_get_dr6 (void)
2529{
9bb9e8ad 2530 return (unsigned long) dr[6];
fa4ba8da
PM
2531}
2532
2dc38344 2533/* Determine if the thread referenced by "ptid" is alive
3cee93ac 2534 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
2dc38344 2535 it means that the thread has died. Otherwise it is assumed to be alive. */
3cee93ac 2536static int
28439f5e 2537windows_thread_alive (struct target_ops *ops, ptid_t ptid)
3cee93ac 2538{
2dc38344
PA
2539 int tid;
2540
2541 gdb_assert (ptid_get_tid (ptid) != 0);
2542 tid = ptid_get_tid (ptid);
39f77062 2543
2dc38344 2544 return WaitForSingleObject (thread_rec (tid, FALSE)->h, 0) == WAIT_OBJECT_0 ?
3a4b77d8 2545 FALSE : TRUE;
3cee93ac
CF
2546}
2547
2a3d5645
CF
2548void
2549_initialize_check_for_gdb_ini (void)
2550{
2551 char *homedir;
2552 if (inhibit_gdbinit)
2553 return;
2554
2555 homedir = getenv ("HOME");
2556 if (homedir)
2557 {
2558 char *p;
2559 char *oldini = (char *) alloca (strlen (homedir) +
2560 sizeof ("/gdb.ini"));
2561 strcpy (oldini, homedir);
2562 p = strchr (oldini, '\0');
2563 if (p > oldini && p[-1] != '/')
2564 *p++ = '/';
2565 strcpy (p, "gdb.ini");
2566 if (access (oldini, 0) == 0)
2567 {
2568 int len = strlen (oldini);
2569 char *newini = alloca (len + 1);
dfe7f3ac 2570 sprintf (newini, "%.*s.gdbinit",
58fa08f0 2571 (int) (len - (sizeof ("gdb.ini") - 1)), oldini);
8a3fe4f8 2572 warning (_("obsolete '%s' found. Rename to '%s'."), oldini, newini);
2a3d5645
CF
2573 }
2574 }
2575}
33605d39 2576
2b008701
CF
2577/* Define dummy functions which always return error for the rare cases where
2578 these functions could not be found. */
2579static BOOL WINAPI
2580bad_DebugActiveProcessStop (DWORD w)
2581{
2582 return FALSE;
2583}
2584static BOOL WINAPI
2585bad_DebugBreakProcess (HANDLE w)
2586{
2587 return FALSE;
2588}
2589static BOOL WINAPI
2590bad_DebugSetProcessKillOnExit (BOOL w)
2591{
2592 return FALSE;
2593}
2594static BOOL WINAPI
2595bad_EnumProcessModules (HANDLE w, HMODULE *x, DWORD y, LPDWORD z)
2596{
2597 return FALSE;
2598}
b3c613f2
CF
2599
2600#ifdef __USEWIDE
2b008701 2601static DWORD WINAPI
b3c613f2 2602bad_GetModuleFileNameExW (HANDLE w, HMODULE x, LPWSTR y, DWORD z)
2b008701
CF
2603{
2604 return 0;
2605}
d0d0ab16
CV
2606#else
2607static DWORD WINAPI
b3c613f2 2608bad_GetModuleFileNameExA (HANDLE w, HMODULE x, LPSTR y, DWORD z)
d0d0ab16
CV
2609{
2610 return 0;
2611}
2612#endif
b3c613f2 2613
2b008701
CF
2614static BOOL WINAPI
2615bad_GetModuleInformation (HANDLE w, HMODULE x, LPMODULEINFO y, DWORD z)
2616{
2617 return FALSE;
2618}
2619
418c6cb3
CF
2620static BOOL WINAPI
2621bad_OpenProcessToken (HANDLE w, DWORD x, PHANDLE y)
2622{
2623 return FALSE;
2624}
2625
cd44747c
PM
2626static BOOL WINAPI
2627bad_GetCurrentConsoleFont (HANDLE w, BOOL bMaxWindow, CONSOLE_FONT_INFO *f)
2628{
2629 f->nFont = 0;
2630 return 1;
2631}
2632static COORD WINAPI
2633bad_GetConsoleFontSize (HANDLE w, DWORD nFont)
2634{
2635 COORD size;
2636 size.X = 8;
2637 size.Y = 12;
2638 return size;
2639}
2640
2b008701
CF
2641/* Load any functions which may not be available in ancient versions
2642 of Windows. */
33605d39 2643void
2b008701 2644_initialize_loadable (void)
33605d39 2645{
2b008701
CF
2646 HMODULE hm = NULL;
2647
2648 hm = LoadLibrary ("kernel32.dll");
2649 if (hm)
33605d39 2650 {
b3c613f2 2651 DebugActiveProcessStop = (void *)
2b008701 2652 GetProcAddress (hm, "DebugActiveProcessStop");
b3c613f2 2653 DebugBreakProcess = (void *)
2b008701 2654 GetProcAddress (hm, "DebugBreakProcess");
b3c613f2 2655 DebugSetProcessKillOnExit = (void *)
2b008701 2656 GetProcAddress (hm, "DebugSetProcessKillOnExit");
cd44747c
PM
2657 GetConsoleFontSize = (void *)
2658 GetProcAddress (hm, "GetConsoleFontSize");
2659 GetCurrentConsoleFont = (void *)
2660 GetProcAddress (hm, "GetCurrentConsoleFont");
2b008701 2661 }
33605d39 2662
2b008701
CF
2663 /* Set variables to dummy versions of these processes if the function
2664 wasn't found in kernel32.dll. */
b3c613f2
CF
2665 if (!DebugBreakProcess)
2666 DebugBreakProcess = bad_DebugBreakProcess;
2667 if (!DebugActiveProcessStop || !DebugSetProcessKillOnExit)
2b008701 2668 {
b3c613f2
CF
2669 DebugActiveProcessStop = bad_DebugActiveProcessStop;
2670 DebugSetProcessKillOnExit = bad_DebugSetProcessKillOnExit;
2b008701 2671 }
cd44747c
PM
2672 if (!GetConsoleFontSize)
2673 GetConsoleFontSize = bad_GetConsoleFontSize;
2674 if (!GetCurrentConsoleFont)
2675 GetCurrentConsoleFont = bad_GetCurrentConsoleFont;
33605d39 2676
2b008701
CF
2677 /* Load optional functions used for retrieving filename information
2678 associated with the currently debugged process or its dlls. */
2679 hm = LoadLibrary ("psapi.dll");
2680 if (hm)
2681 {
b3c613f2 2682 EnumProcessModules = (void *)
2b008701 2683 GetProcAddress (hm, "EnumProcessModules");
b3c613f2 2684 GetModuleInformation = (void *)
2b008701 2685 GetProcAddress (hm, "GetModuleInformation");
b3c613f2
CF
2686 GetModuleFileNameEx = (void *)
2687 GetProcAddress (hm, GetModuleFileNameEx_name);
33605d39
CF
2688 }
2689
b3c613f2 2690 if (!EnumProcessModules || !GetModuleInformation || !GetModuleFileNameEx)
2b008701
CF
2691 {
2692 /* Set variables to dummy versions of these processes if the function
2693 wasn't found in psapi.dll. */
b3c613f2
CF
2694 EnumProcessModules = bad_EnumProcessModules;
2695 GetModuleInformation = bad_GetModuleInformation;
2696 GetModuleFileNameEx = bad_GetModuleFileNameEx;
2b008701
CF
2697 /* This will probably fail on Windows 9x/Me. Let the user know that we're
2698 missing some functionality. */
418c6cb3
CF
2699 warning(_("cannot automatically find executable file or library to read symbols.\nUse \"file\" or \"dll\" command to load executable/libraries directly."));
2700 }
2701
2702 hm = LoadLibrary ("advapi32.dll");
2703 if (hm)
2704 {
b3c613f2
CF
2705 OpenProcessToken = (void *) GetProcAddress (hm, "OpenProcessToken");
2706 LookupPrivilegeValueA = (void *)
418c6cb3 2707 GetProcAddress (hm, "LookupPrivilegeValueA");
b3c613f2 2708 AdjustTokenPrivileges = (void *)
418c6cb3
CF
2709 GetProcAddress (hm, "AdjustTokenPrivileges");
2710 /* Only need to set one of these since if OpenProcessToken fails nothing
2711 else is needed. */
b3c613f2
CF
2712 if (!OpenProcessToken || !LookupPrivilegeValueA || !AdjustTokenPrivileges)
2713 OpenProcessToken = bad_OpenProcessToken;
2b008701 2714 }
33605d39 2715}
This page took 1.848297 seconds and 4 git commands to generate.