Add target_ops argument to to_close
[deliverable/binutils-gdb.git] / gdb / windows-nat.c
CommitLineData
dc05df57 1/* Target-vector operations for controlling windows child processes, for GDB.
0a65a603 2
ecd75fc8 3 Copyright (C) 1995-2014 Free Software Foundation, Inc.
0a65a603 4
e6433c28 5 Contributed by Cygnus Solutions, A Red Hat Company.
e88c49c3 6
24e60978
SC
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
24e60978
SC
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
a9762ec7 15 but WITHOUT ANY WARRANTY; without even the implied warranty of
24e60978
SC
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
24e60978 21
dfe7f3ac 22/* Originally by Steve Chamberlain, sac@cygnus.com */
24e60978
SC
23
24#include "defs.h"
25#include "frame.h" /* required by inferior.h */
26#include "inferior.h"
27#include "target.h"
60250e8b 28#include "exceptions.h"
24e60978
SC
29#include "gdbcore.h"
30#include "command.h"
fa58ee11 31#include "completer.h"
4e052eda 32#include "regcache.h"
2a3d5645 33#include "top.h"
403d9909
CF
34#include <signal.h>
35#include <sys/types.h>
36#include <fcntl.h>
37#include <stdlib.h>
38#include <windows.h>
39#include <imagehlp.h>
2b008701 40#include <psapi.h>
10325bc5 41#ifdef __CYGWIN__
b7ff339d 42#include <wchar.h>
403d9909 43#include <sys/cygwin.h>
b7ff339d 44#include <cygwin/version.h>
10325bc5 45#endif
cad9cd60 46
24e60978 47#include "buildsym.h"
0ba1096a 48#include "filenames.h"
1ef980b9
SC
49#include "symfile.h"
50#include "objfiles.h"
92107356 51#include "gdb_bfd.h"
de1b3c3d 52#include "gdb_obstack.h"
0e9f083f 53#include <string.h>
fdfa3315 54#include "gdbthread.h"
24e60978 55#include "gdbcmd.h"
1e37c281 56#include <unistd.h>
4646aa9d 57#include "exec.h"
3ee6f623 58#include "solist.h"
3cb8e7f6 59#include "solib.h"
de1b3c3d 60#include "xml-support.h"
24e60978 61
6c7de422
MK
62#include "i386-tdep.h"
63#include "i387-tdep.h"
64
31b060a2
CF
65#include "windows-tdep.h"
66#include "windows-nat.h"
9bb9e8ad 67#include "i386-nat.h"
ecc13e53 68#include "complaints.h"
de1b3c3d 69
418c6cb3 70#define AdjustTokenPrivileges dyn_AdjustTokenPrivileges
2b008701
CF
71#define DebugActiveProcessStop dyn_DebugActiveProcessStop
72#define DebugBreakProcess dyn_DebugBreakProcess
73#define DebugSetProcessKillOnExit dyn_DebugSetProcessKillOnExit
74#define EnumProcessModules dyn_EnumProcessModules
2b008701 75#define GetModuleInformation dyn_GetModuleInformation
418c6cb3
CF
76#define LookupPrivilegeValueA dyn_LookupPrivilegeValueA
77#define OpenProcessToken dyn_OpenProcessToken
cd44747c
PM
78#define GetConsoleFontSize dyn_GetConsoleFontSize
79#define GetCurrentConsoleFont dyn_GetCurrentConsoleFont
2b008701 80
418c6cb3
CF
81static BOOL WINAPI (*AdjustTokenPrivileges)(HANDLE, BOOL, PTOKEN_PRIVILEGES,
82 DWORD, PTOKEN_PRIVILEGES, PDWORD);
2b008701
CF
83static BOOL WINAPI (*DebugActiveProcessStop) (DWORD);
84static BOOL WINAPI (*DebugBreakProcess) (HANDLE);
85static BOOL WINAPI (*DebugSetProcessKillOnExit) (BOOL);
86static BOOL WINAPI (*EnumProcessModules) (HANDLE, HMODULE *, DWORD,
87 LPDWORD);
2b008701
CF
88static BOOL WINAPI (*GetModuleInformation) (HANDLE, HMODULE, LPMODULEINFO,
89 DWORD);
418c6cb3
CF
90static BOOL WINAPI (*LookupPrivilegeValueA)(LPCSTR, LPCSTR, PLUID);
91static BOOL WINAPI (*OpenProcessToken)(HANDLE, DWORD, PHANDLE);
581e13c1
MS
92static BOOL WINAPI (*GetCurrentConsoleFont) (HANDLE, BOOL,
93 CONSOLE_FONT_INFO *);
cd44747c 94static COORD WINAPI (*GetConsoleFontSize) (HANDLE, DWORD);
2b008701 95
dc05df57 96static struct target_ops windows_ops;
3ee6f623 97
b3c613f2
CF
98#undef STARTUPINFO
99#undef CreateProcess
100#undef GetModuleFileNameEx
101
102#ifndef __CYGWIN__
103# define __PMAX (MAX_PATH + 1)
104 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPSTR, DWORD);
105# define STARTUPINFO STARTUPINFOA
106# define CreateProcess CreateProcessA
107# define GetModuleFileNameEx_name "GetModuleFileNameExA"
108# define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
109#else
110# define __PMAX PATH_MAX
581e13c1 111/* The starting and ending address of the cygwin1.dll text segment. */
b3c613f2
CF
112 static CORE_ADDR cygwin_load_start;
113 static CORE_ADDR cygwin_load_end;
b3c613f2
CF
114# define __USEWIDE
115 typedef wchar_t cygwin_buf_t;
581e13c1
MS
116 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE,
117 LPWSTR, DWORD);
b3c613f2
CF
118# define STARTUPINFO STARTUPINFOW
119# define CreateProcess CreateProcessW
120# define GetModuleFileNameEx_name "GetModuleFileNameExW"
121# define bad_GetModuleFileNameEx bad_GetModuleFileNameExW
10325bc5 122#endif
a244bdca 123
581e13c1
MS
124static int have_saved_context; /* True if we've saved context from a
125 cygwin signal. */
126static CONTEXT saved_context; /* Containes the saved context from a
127 cygwin signal. */
a244bdca 128
0714f9bf
SS
129/* If we're not using the old Cygwin header file set, define the
130 following which never should have been in the generic Win32 API
581e13c1 131 headers in the first place since they were our own invention... */
0714f9bf 132#ifndef _GNU_H_WINDOWS_H
9d3789f7 133enum
8e860359
CF
134 {
135 FLAG_TRACE_BIT = 0x100,
136 CONTEXT_DEBUGGER = (CONTEXT_FULL | CONTEXT_FLOATING_POINT)
137 };
0714f9bf
SS
138#endif
139
5851ab76
JB
140#ifndef CONTEXT_EXTENDED_REGISTERS
141/* This macro is only defined on ia32. It only makes sense on this target,
142 so define it as zero if not already defined. */
143#define CONTEXT_EXTENDED_REGISTERS 0
144#endif
145
fa4ba8da
PM
146#define CONTEXT_DEBUGGER_DR CONTEXT_DEBUGGER | CONTEXT_DEBUG_REGISTERS \
147 | CONTEXT_EXTENDED_REGISTERS
97da3b20 148
41b4aadc 149static uintptr_t dr[8];
87a45c96
CF
150static int debug_registers_changed;
151static int debug_registers_used;
16d905e2
CF
152
153static int windows_initialization_done;
6537bb24 154#define DR6_CLEAR_VALUE 0xffff0ff0
97da3b20 155
3cee93ac 156/* The string sent by cygwin when it processes a signal.
581e13c1 157 FIXME: This should be in a cygwin include file. */
3929abe9
CF
158#ifndef _CYGWIN_SIGNAL_STRING
159#define _CYGWIN_SIGNAL_STRING "cYgSiGw00f"
160#endif
3cee93ac 161
29fe111d 162#define CHECK(x) check (x, __FILE__,__LINE__)
dfe7f3ac 163#define DEBUG_EXEC(x) if (debug_exec) printf_unfiltered x
4e52d31c
PM
164#define DEBUG_EVENTS(x) if (debug_events) printf_unfiltered x
165#define DEBUG_MEM(x) if (debug_memory) printf_unfiltered x
166#define DEBUG_EXCEPT(x) if (debug_exceptions) printf_unfiltered x
24e60978 167
dc05df57 168static void windows_stop (ptid_t);
02529b48 169static int windows_thread_alive (struct target_ops *, ptid_t);
7d85a9c0 170static void windows_kill_inferior (struct target_ops *);
3cee93ac 171
9bb9e8ad
PM
172static void cygwin_set_dr (int i, CORE_ADDR addr);
173static void cygwin_set_dr7 (unsigned long val);
a961bc18 174static CORE_ADDR cygwin_get_dr (int i);
9bb9e8ad 175static unsigned long cygwin_get_dr6 (void);
a961bc18 176static unsigned long cygwin_get_dr7 (void);
9bb9e8ad 177
a493e3e2 178static enum gdb_signal last_sig = GDB_SIGNAL_0;
581e13c1 179/* Set if a signal was received from the debugged process. */
7393af7c 180
3cee93ac 181/* Thread information structure used to track information that is
6537bb24 182 not available in gdb's thread structure. */
3cee93ac 183typedef struct thread_info_struct
3a4b77d8
JM
184 {
185 struct thread_info_struct *next;
186 DWORD id;
187 HANDLE h;
711e434b 188 CORE_ADDR thread_local_base;
3a4b77d8 189 char *name;
6537bb24 190 int suspended;
3ade5333 191 int reload_context;
3a4b77d8 192 CONTEXT context;
1e37c281 193 STACKFRAME sf;
8e860359
CF
194 }
195thread_info;
1e37c281 196
29fe111d 197static thread_info thread_head;
24e60978 198
581e13c1 199/* The process and thread handles for the above context. */
24e60978 200
3cee93ac
CF
201static DEBUG_EVENT current_event; /* The current debug event from
202 WaitForDebugEvent */
203static HANDLE current_process_handle; /* Currently executing process */
204static thread_info *current_thread; /* Info on currently selected thread */
349b409f 205static DWORD main_thread_id; /* Thread ID of the main thread */
24e60978 206
581e13c1 207/* Counts of things. */
24e60978
SC
208static int exception_count = 0;
209static int event_count = 0;
dfe7f3ac 210static int saw_create;
bf25528d 211static int open_process_used = 0;
24e60978 212
581e13c1 213/* User options. */
24e60978 214static int new_console = 0;
10325bc5 215#ifdef __CYGWIN__
09280ddf 216static int cygwin_exceptions = 0;
10325bc5 217#endif
1e37c281 218static int new_group = 1;
dfe7f3ac
CF
219static int debug_exec = 0; /* show execution */
220static int debug_events = 0; /* show events from kernel */
221static int debug_memory = 0; /* show target memory accesses */
1ef980b9 222static int debug_exceptions = 0; /* show target exceptions */
dfe7f3ac
CF
223static int useshell = 0; /* use shell for subprocesses */
224
7e63b4e4 225/* This vector maps GDB's idea of a register's number into an offset
dc05df57 226 in the windows exception context vector.
24e60978 227
3cee93ac 228 It also contains the bit mask needed to load the register in question.
24e60978 229
7e63b4e4
JB
230 The contents of this table can only be computed by the units
231 that provide CPU-specific support for Windows native debugging.
232 These units should set the table by calling
dc05df57 233 windows_set_context_register_offsets.
7e63b4e4 234
24e60978
SC
235 One day we could read a reg, we could inspect the context we
236 already have loaded, if it doesn't have the bit set that we need,
237 we read that set of registers in using GetThreadContext. If the
581e13c1 238 context already contains what we need, we just unpack it. Then to
24e60978
SC
239 write a register, first we have to ensure that the context contains
240 the other regs of the group, and then we copy the info in and set
581e13c1 241 out bit. */
24e60978 242
7e63b4e4 243static const int *mappings;
d3a09475 244
d40dc7a8
JB
245/* The function to use in order to determine whether a register is
246 a segment register or not. */
247static segment_register_p_ftype *segment_register_p;
248
24e60978 249/* This vector maps the target's idea of an exception (extracted
581e13c1 250 from the DEBUG_EVENT structure) to GDB's idea. */
24e60978
SC
251
252struct xlate_exception
253 {
254 int them;
2ea28649 255 enum gdb_signal us;
24e60978
SC
256 };
257
24e60978
SC
258static const struct xlate_exception
259 xlate[] =
260{
a493e3e2
PA
261 {EXCEPTION_ACCESS_VIOLATION, GDB_SIGNAL_SEGV},
262 {STATUS_STACK_OVERFLOW, GDB_SIGNAL_SEGV},
263 {EXCEPTION_BREAKPOINT, GDB_SIGNAL_TRAP},
264 {DBG_CONTROL_C, GDB_SIGNAL_INT},
265 {EXCEPTION_SINGLE_STEP, GDB_SIGNAL_TRAP},
266 {STATUS_FLOAT_DIVIDE_BY_ZERO, GDB_SIGNAL_FPE},
24e60978
SC
267 {-1, -1}};
268
7e63b4e4
JB
269/* Set the MAPPINGS static global to OFFSETS.
270 See the description of MAPPINGS for more details. */
271
272void
dc05df57 273windows_set_context_register_offsets (const int *offsets)
7e63b4e4
JB
274{
275 mappings = offsets;
276}
277
d40dc7a8
JB
278/* See windows-nat.h. */
279
280void
281windows_set_segment_register_p (segment_register_p_ftype *fun)
282{
283 segment_register_p = fun;
284}
285
fa4ba8da
PM
286static void
287check (BOOL ok, const char *file, int line)
288{
289 if (!ok)
d50a0ce2
CV
290 printf_filtered ("error return %s:%d was %u\n", file, line,
291 (unsigned) GetLastError ());
fa4ba8da
PM
292}
293
6537bb24
PA
294/* Find a thread record given a thread id. If GET_CONTEXT is not 0,
295 then also retrieve the context for this thread. If GET_CONTEXT is
296 negative, then don't suspend the thread. */
3cee93ac
CF
297static thread_info *
298thread_rec (DWORD id, int get_context)
24e60978 299{
3cee93ac
CF
300 thread_info *th;
301
3a4b77d8 302 for (th = &thread_head; (th = th->next) != NULL;)
3cee93ac
CF
303 if (th->id == id)
304 {
6537bb24 305 if (!th->suspended && get_context)
3cee93ac 306 {
8a892701 307 if (get_context > 0 && id != current_event.dwThreadId)
6537bb24
PA
308 {
309 if (SuspendThread (th->h) == (DWORD) -1)
310 {
311 DWORD err = GetLastError ();
22128028 312
80e88e1a 313 warning (_("SuspendThread (tid=0x%x) failed."
2ed3e009 314 " (winerr %u)"),
80e88e1a 315 (unsigned) id, (unsigned) err);
6537bb24
PA
316 return NULL;
317 }
318 th->suspended = 1;
319 }
3cee93ac 320 else if (get_context < 0)
6537bb24 321 th->suspended = -1;
3ade5333 322 th->reload_context = 1;
3cee93ac
CF
323 }
324 return th;
325 }
326
327 return NULL;
328}
329
2dc38344 330/* Add a thread to the thread list. */
3cee93ac 331static thread_info *
711e434b 332windows_add_thread (ptid_t ptid, HANDLE h, void *tlb)
3cee93ac
CF
333{
334 thread_info *th;
2dc38344
PA
335 DWORD id;
336
337 gdb_assert (ptid_get_tid (ptid) != 0);
338
339 id = ptid_get_tid (ptid);
3cee93ac
CF
340
341 if ((th = thread_rec (id, FALSE)))
342 return th;
343
41bf6aca 344 th = XCNEW (thread_info);
3cee93ac
CF
345 th->id = id;
346 th->h = h;
711e434b 347 th->thread_local_base = (CORE_ADDR) (uintptr_t) tlb;
3cee93ac
CF
348 th->next = thread_head.next;
349 thread_head.next = th;
2dc38344
PA
350 add_thread (ptid);
351 /* Set the debug registers for the new thread if they are used. */
fa4ba8da
PM
352 if (debug_registers_used)
353 {
354 /* Only change the value of the debug registers. */
355 th->context.ContextFlags = CONTEXT_DEBUG_REGISTERS;
356 CHECK (GetThreadContext (th->h, &th->context));
357 th->context.Dr0 = dr[0];
358 th->context.Dr1 = dr[1];
359 th->context.Dr2 = dr[2];
360 th->context.Dr3 = dr[3];
6537bb24 361 th->context.Dr6 = DR6_CLEAR_VALUE;
fa4ba8da
PM
362 th->context.Dr7 = dr[7];
363 CHECK (SetThreadContext (th->h, &th->context));
364 th->context.ContextFlags = 0;
365 }
3cee93ac 366 return th;
24e60978
SC
367}
368
3cee93ac 369/* Clear out any old thread list and reintialize it to a
581e13c1 370 pristine state. */
24e60978 371static void
dc05df57 372windows_init_thread_list (void)
24e60978 373{
3cee93ac
CF
374 thread_info *th = &thread_head;
375
dc05df57 376 DEBUG_EVENTS (("gdb: windows_init_thread_list\n"));
3cee93ac
CF
377 init_thread_list ();
378 while (th->next != NULL)
24e60978 379 {
3cee93ac
CF
380 thread_info *here = th->next;
381 th->next = here->next;
b8c9b27d 382 xfree (here);
24e60978 383 }
059198c1 384 thread_head.next = NULL;
3cee93ac
CF
385}
386
581e13c1 387/* Delete a thread from the list of threads. */
3cee93ac 388static void
e0ea48a0 389windows_delete_thread (ptid_t ptid, DWORD exit_code)
3cee93ac
CF
390{
391 thread_info *th;
2dc38344
PA
392 DWORD id;
393
394 gdb_assert (ptid_get_tid (ptid) != 0);
395
396 id = ptid_get_tid (ptid);
3cee93ac
CF
397
398 if (info_verbose)
2dc38344 399 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (ptid));
e0ea48a0
EZ
400 else if (print_thread_events && id != main_thread_id)
401 printf_unfiltered (_("[%s exited with code %u]\n"),
564eac42 402 target_pid_to_str (ptid), (unsigned) exit_code);
2dc38344 403 delete_thread (ptid);
3cee93ac
CF
404
405 for (th = &thread_head;
406 th->next != NULL && th->next->id != id;
407 th = th->next)
408 continue;
409
410 if (th->next != NULL)
24e60978 411 {
3cee93ac
CF
412 thread_info *here = th->next;
413 th->next = here->next;
b8c9b27d 414 xfree (here);
24e60978
SC
415 }
416}
417
3cee93ac 418static void
dc05df57 419do_windows_fetch_inferior_registers (struct regcache *regcache, int r)
24e60978 420{
1e37c281 421 char *context_offset = ((char *) &current_thread->context) + mappings[r];
20a6ec49
MD
422 struct gdbarch *gdbarch = get_regcache_arch (regcache);
423 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
1e37c281 424 long l;
6c7de422 425
3ade5333 426 if (!current_thread)
d6dc8049 427 return; /* Windows sometimes uses a non-existent thread id in its
581e13c1 428 events. */
3ade5333
CF
429
430 if (current_thread->reload_context)
431 {
cb832706 432#ifdef __COPY_CONTEXT_SIZE
a244bdca
CF
433 if (have_saved_context)
434 {
581e13c1
MS
435 /* Lie about where the program actually is stopped since
436 cygwin has informed us that we should consider the signal
437 to have occurred at another location which is stored in
438 "saved_context. */
439 memcpy (&current_thread->context, &saved_context,
440 __COPY_CONTEXT_SIZE);
a244bdca
CF
441 have_saved_context = 0;
442 }
443 else
cb832706 444#endif
a244bdca
CF
445 {
446 thread_info *th = current_thread;
447 th->context.ContextFlags = CONTEXT_DEBUGGER_DR;
448 GetThreadContext (th->h, &th->context);
2b008701 449 /* Copy dr values from that thread.
581e13c1
MS
450 But only if there were not modified since last stop.
451 PR gdb/2388 */
88616312
PM
452 if (!debug_registers_changed)
453 {
454 dr[0] = th->context.Dr0;
455 dr[1] = th->context.Dr1;
456 dr[2] = th->context.Dr2;
457 dr[3] = th->context.Dr3;
458 dr[6] = th->context.Dr6;
459 dr[7] = th->context.Dr7;
460 }
a244bdca 461 }
3ade5333
CF
462 current_thread->reload_context = 0;
463 }
464
20a6ec49 465 if (r == I387_FISEG_REGNUM (tdep))
1e37c281 466 {
8e860359 467 l = *((long *) context_offset) & 0xffff;
56be3814 468 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 469 }
20a6ec49 470 else if (r == I387_FOP_REGNUM (tdep))
1e37c281 471 {
8e860359 472 l = (*((long *) context_offset) >> 16) & ((1 << 11) - 1);
56be3814 473 regcache_raw_supply (regcache, r, (char *) &l);
1e37c281 474 }
d40dc7a8
JB
475 else if (segment_register_p (r))
476 {
477 /* GDB treats segment registers as 32bit registers, but they are
478 in fact only 16 bits long. Make sure we do not read extra
479 bits from our source buffer. */
480 l = *((long *) context_offset) & 0xffff;
481 regcache_raw_supply (regcache, r, (char *) &l);
482 }
1e37c281 483 else if (r >= 0)
56be3814 484 regcache_raw_supply (regcache, r, context_offset);
3cee93ac 485 else
24e60978 486 {
20a6ec49 487 for (r = 0; r < gdbarch_num_regs (gdbarch); r++)
dc05df57 488 do_windows_fetch_inferior_registers (regcache, r);
24e60978 489 }
3cee93ac
CF
490}
491
492static void
28439f5e
PA
493windows_fetch_inferior_registers (struct target_ops *ops,
494 struct regcache *regcache, int r)
3cee93ac 495{
2dc38344 496 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 497 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 498 thread id in its events. */
3ade5333 499 if (current_thread)
dc05df57 500 do_windows_fetch_inferior_registers (regcache, r);
3cee93ac
CF
501}
502
503static void
dc05df57 504do_windows_store_inferior_registers (const struct regcache *regcache, int r)
3cee93ac 505{
3ade5333 506 if (!current_thread)
581e13c1 507 /* Windows sometimes uses a non-existent thread id in its events. */;
3ade5333 508 else if (r >= 0)
56be3814 509 regcache_raw_collect (regcache, r,
822c9732 510 ((char *) &current_thread->context) + mappings[r]);
24e60978
SC
511 else
512 {
40a6adc1 513 for (r = 0; r < gdbarch_num_regs (get_regcache_arch (regcache)); r++)
dc05df57 514 do_windows_store_inferior_registers (regcache, r);
24e60978
SC
515 }
516}
517
581e13c1 518/* Store a new register value into the current thread context. */
3cee93ac 519static void
28439f5e
PA
520windows_store_inferior_registers (struct target_ops *ops,
521 struct regcache *regcache, int r)
3cee93ac 522{
2dc38344 523 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
d6dc8049 524 /* Check if current_thread exists. Windows sometimes uses a non-existent
581e13c1 525 thread id in its events. */
3ade5333 526 if (current_thread)
dc05df57 527 do_windows_store_inferior_registers (regcache, r);
3cee93ac 528}
24e60978 529
7a9dd1b2 530/* Get the name of a given module at given base address. If base_address
33605d39
CF
531 is zero return the first loaded module (which is always the name of the
532 executable). */
3ee6f623 533static int
d3653bf6 534get_module_name (LPVOID base_address, char *dll_name_ret)
1e37c281
JM
535{
536 DWORD len;
537 MODULEINFO mi;
538 int i;
8e860359 539 HMODULE dh_buf[1];
581e13c1
MS
540 HMODULE *DllHandle = dh_buf; /* Set to temporary storage for
541 initial query. */
1e37c281 542 DWORD cbNeeded;
33605d39 543#ifdef __CYGWIN__
b3c613f2
CF
544 cygwin_buf_t pathbuf[__PMAX]; /* Temporary storage prior to converting to
545 posix form. __PMAX is always enough
d0d0ab16 546 as long as SO_NAME_MAX_PATH_SIZE is defined
581e13c1 547 as 512. */
33605d39 548#endif
1e37c281 549
1e37c281 550 cbNeeded = 0;
581e13c1
MS
551 /* Find size of buffer needed to handle list of modules loaded in
552 inferior. */
2b008701
CF
553 if (!EnumProcessModules (current_process_handle, DllHandle,
554 sizeof (HMODULE), &cbNeeded) || !cbNeeded)
1e37c281
JM
555 goto failed;
556
581e13c1 557 /* Allocate correct amount of space for module list. */
8e860359 558 DllHandle = (HMODULE *) alloca (cbNeeded);
1e37c281
JM
559 if (!DllHandle)
560 goto failed;
561
581e13c1 562 /* Get the list of modules. */
2b008701 563 if (!EnumProcessModules (current_process_handle, DllHandle, cbNeeded,
33605d39 564 &cbNeeded))
1e37c281
JM
565 goto failed;
566
29fe111d 567 for (i = 0; i < (int) (cbNeeded / sizeof (HMODULE)); i++)
1e37c281 568 {
581e13c1 569 /* Get information on this module. */
2b008701
CF
570 if (!GetModuleInformation (current_process_handle, DllHandle[i],
571 &mi, sizeof (mi)))
8a3fe4f8 572 error (_("Can't get module info"));
1e37c281 573
d3653bf6 574 if (!base_address || mi.lpBaseOfDll == base_address)
33605d39 575 {
581e13c1 576 /* Try to find the name of the given module. */
d0d0ab16 577#ifdef __CYGWIN__
581e13c1 578 /* Cygwin prefers that the path be in /x/y/z format. */
b3c613f2
CF
579 len = GetModuleFileNameEx (current_process_handle,
580 DllHandle[i], pathbuf, __PMAX);
d0d0ab16 581 if (len == 0)
d50a0ce2
CV
582 error (_("Error getting dll name: %u."),
583 (unsigned) GetLastError ());
d0d0ab16 584 if (cygwin_conv_path (CCP_WIN_W_TO_POSIX, pathbuf, dll_name_ret,
b3c613f2 585 __PMAX) < 0)
d0d0ab16
CV
586 error (_("Error converting dll name to POSIX: %d."), errno);
587#else
b3c613f2
CF
588 len = GetModuleFileNameEx (current_process_handle,
589 DllHandle[i], dll_name_ret, __PMAX);
33605d39 590 if (len == 0)
581e13c1
MS
591 error (_("Error getting dll name: %u."),
592 (unsigned) GetLastError ());
33605d39
CF
593#endif
594 return 1; /* success */
595 }
1e37c281
JM
596 }
597
598failed:
599 dll_name_ret[0] = '\0';
33605d39 600 return 0; /* failure */
1e37c281
JM
601}
602
450005e7 603/* Encapsulate the information required in a call to
581e13c1 604 symbol_file_add_args. */
8a892701
CF
605struct safe_symbol_file_add_args
606{
607 char *name;
608 int from_tty;
609 struct section_addr_info *addrs;
610 int mainline;
611 int flags;
7c5c87c0 612 struct ui_file *err, *out;
8a892701
CF
613 struct objfile *ret;
614};
615
581e13c1 616/* Maintain a linked list of "so" information. */
3ee6f623 617struct lm_info
02e423b9 618{
d3653bf6 619 LPVOID load_addr;
3ee6f623
CF
620};
621
622static struct so_list solib_start, *solib_end;
02e423b9 623
450005e7 624/* Call symbol_file_add with stderr redirected. We don't care if there
581e13c1 625 are errors. */
8a892701
CF
626static int
627safe_symbol_file_add_stub (void *argv)
628{
3ee6f623 629#define p ((struct safe_symbol_file_add_args *) argv)
7eedccfa
PP
630 const int add_flags = ((p->from_tty ? SYMFILE_VERBOSE : 0)
631 | (p->mainline ? SYMFILE_MAINLINE : 0));
632 p->ret = symbol_file_add (p->name, add_flags, p->addrs, p->flags);
8a892701
CF
633 return !!p->ret;
634#undef p
635}
636
581e13c1 637/* Restore gdb's stderr after calling symbol_file_add. */
8a892701 638static void
7c5c87c0 639safe_symbol_file_add_cleanup (void *p)
8a892701 640{
8e860359 641#define sp ((struct safe_symbol_file_add_args *)p)
450005e7 642 gdb_flush (gdb_stderr);
7c5c87c0 643 gdb_flush (gdb_stdout);
d3ff4a77 644 ui_file_delete (gdb_stderr);
7c5c87c0 645 ui_file_delete (gdb_stdout);
d3ff4a77 646 gdb_stderr = sp->err;
9d3789f7 647 gdb_stdout = sp->out;
8e860359 648#undef sp
8a892701
CF
649}
650
581e13c1 651/* symbol_file_add wrapper that prevents errors from being displayed. */
8a892701
CF
652static struct objfile *
653safe_symbol_file_add (char *name, int from_tty,
654 struct section_addr_info *addrs,
655 int mainline, int flags)
8a892701
CF
656{
657 struct safe_symbol_file_add_args p;
658 struct cleanup *cleanup;
659
7c5c87c0 660 cleanup = make_cleanup (safe_symbol_file_add_cleanup, &p);
8a892701 661
7c5c87c0
CF
662 p.err = gdb_stderr;
663 p.out = gdb_stdout;
450005e7 664 gdb_flush (gdb_stderr);
7c5c87c0 665 gdb_flush (gdb_stdout);
d3ff4a77 666 gdb_stderr = ui_file_new ();
7c5c87c0 667 gdb_stdout = ui_file_new ();
8a892701
CF
668 p.name = name;
669 p.from_tty = from_tty;
670 p.addrs = addrs;
671 p.mainline = mainline;
672 p.flags = flags;
673 catch_errors (safe_symbol_file_add_stub, &p, "", RETURN_MASK_ERROR);
674
675 do_cleanups (cleanup);
676 return p.ret;
677}
678
de1b3c3d 679static struct so_list *
dc05df57 680windows_make_so (const char *name, LPVOID load_addr)
8e860359 681{
3ee6f623 682 struct so_list *so;
d0d0ab16
CV
683 char *p;
684#ifndef __CYGWIN__
b3c613f2
CF
685 char buf[__PMAX];
686 char cwd[__PMAX];
3f8ad85b
CF
687 WIN32_FIND_DATA w32_fd;
688 HANDLE h = FindFirstFile(name, &w32_fd);
3f8ad85b 689
6badb179
CF
690 if (h == INVALID_HANDLE_VALUE)
691 strcpy (buf, name);
692 else
3f8ad85b 693 {
c914e0cc
CF
694 FindClose (h);
695 strcpy (buf, name);
696 if (GetCurrentDirectory (MAX_PATH + 1, cwd))
697 {
698 p = strrchr (buf, '\\');
699 if (p)
700 p[1] = '\0';
701 SetCurrentDirectory (buf);
702 GetFullPathName (w32_fd.cFileName, MAX_PATH, buf, &p);
703 SetCurrentDirectory (cwd);
704 }
3f8ad85b 705 }
3ee6f623
CF
706 if (strcasecmp (buf, "ntdll.dll") == 0)
707 {
708 GetSystemDirectory (buf, sizeof (buf));
709 strcat (buf, "\\ntdll.dll");
710 }
d0d0ab16 711#else
b3c613f2 712 cygwin_buf_t buf[__PMAX];
d0d0ab16 713
b3c613f2 714 buf[0] = 0;
d0d0ab16
CV
715 if (access (name, F_OK) != 0)
716 {
717 if (strcasecmp (name, "ntdll.dll") == 0)
b3c613f2 718#ifdef __USEWIDE
d0d0ab16
CV
719 {
720 GetSystemDirectoryW (buf, sizeof (buf) / sizeof (wchar_t));
721 wcscat (buf, L"\\ntdll.dll");
722 }
b3c613f2
CF
723#else
724 {
725 GetSystemDirectoryA (buf, sizeof (buf) / sizeof (wchar_t));
726 strcat (buf, "\\ntdll.dll");
727 }
728#endif
d0d0ab16
CV
729 }
730#endif
41bf6aca 731 so = XCNEW (struct so_list);
3ee6f623
CF
732 so->lm_info = (struct lm_info *) xmalloc (sizeof (struct lm_info));
733 so->lm_info->load_addr = load_addr;
de1b3c3d 734 strcpy (so->so_original_name, name);
10325bc5
PA
735#ifndef __CYGWIN__
736 strcpy (so->so_name, buf);
737#else
d0d0ab16
CV
738 if (buf[0])
739 cygwin_conv_path (CCP_WIN_W_TO_POSIX, buf, so->so_name,
740 SO_NAME_MAX_PATH_SIZE);
741 else
742 {
60c5c021 743 char *rname = realpath (name, NULL);
d0d0ab16
CV
744 if (rname && strlen (rname) < SO_NAME_MAX_PATH_SIZE)
745 {
746 strcpy (so->so_name, rname);
747 free (rname);
748 }
749 else
750 error (_("dll path too long"));
751 }
de1b3c3d
PA
752 /* Record cygwin1.dll .text start/end. */
753 p = strchr (so->so_name, '\0') - (sizeof ("/cygwin1.dll") - 1);
754 if (p >= so->so_name && strcasecmp (p, "/cygwin1.dll") == 0)
755 {
756 bfd *abfd;
757 asection *text = NULL;
758 CORE_ADDR text_vma;
8e860359 759
1c00ec6b 760 abfd = gdb_bfd_open (so->so_name, "pei-i386", -1);
a244bdca 761
de1b3c3d
PA
762 if (!abfd)
763 return so;
764
765 if (bfd_check_format (abfd, bfd_object))
766 text = bfd_get_section_by_name (abfd, ".text");
767
768 if (!text)
769 {
cbb099e8 770 gdb_bfd_unref (abfd);
de1b3c3d
PA
771 return so;
772 }
773
7a9dd1b2 774 /* The symbols in a dll are offset by 0x1000, which is the
de1b3c3d 775 offset from 0 of the first byte in an image - because of the
581e13c1
MS
776 file header and the section alignment. */
777 cygwin_load_start = (CORE_ADDR) (uintptr_t) ((char *)
778 load_addr + 0x1000);
dc05df57 779 cygwin_load_end = cygwin_load_start + bfd_section_size (abfd, text);
de1b3c3d 780
cbb099e8 781 gdb_bfd_unref (abfd);
de1b3c3d 782 }
10325bc5 783#endif
de1b3c3d
PA
784
785 return so;
8e860359
CF
786}
787
3ee6f623 788static char *
dfe7f3ac
CF
789get_image_name (HANDLE h, void *address, int unicode)
790{
d0d0ab16 791#ifdef __CYGWIN__
b3c613f2 792 static char buf[__PMAX];
d0d0ab16 793#else
b3c613f2 794 static char buf[(2 * __PMAX) + 1];
d0d0ab16 795#endif
dfe7f3ac
CF
796 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
797 char *address_ptr;
798 int len = 0;
799 char b[2];
5732a500 800 SIZE_T done;
dfe7f3ac
CF
801
802 /* Attempt to read the name of the dll that was detected.
803 This is documented to work only when actively debugging
581e13c1 804 a program. It will not work for attached processes. */
dfe7f3ac
CF
805 if (address == NULL)
806 return NULL;
807
dfe7f3ac 808 /* See if we could read the address of a string, and that the
581e13c1
MS
809 address isn't null. */
810 if (!ReadProcessMemory (h, address, &address_ptr,
811 sizeof (address_ptr), &done)
6f17862b 812 || done != sizeof (address_ptr) || !address_ptr)
dfe7f3ac
CF
813 return NULL;
814
581e13c1 815 /* Find the length of the string. */
6f17862b
CF
816 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
817 && (b[0] != 0 || b[size - 1] != 0) && done == size)
818 continue;
dfe7f3ac
CF
819
820 if (!unicode)
821 ReadProcessMemory (h, address_ptr, buf, len, &done);
822 else
823 {
824 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
825 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
826 &done);
d0d0ab16 827#ifdef __CYGWIN__
b3c613f2 828 wcstombs (buf, unicode_address, __PMAX);
d0d0ab16
CV
829#else
830 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, sizeof buf,
831 0, 0);
832#endif
dfe7f3ac
CF
833 }
834
835 return buf;
836}
837
24e60978
SC
838/* Wait for child to do something. Return pid of child, or -1 in case
839 of error; store status through argument pointer OURSTATUS. */
1750a5ef 840static int
0a65a603 841handle_load_dll (void *dummy)
24e60978 842{
3a4b77d8 843 LOAD_DLL_DEBUG_INFO *event = &current_event.u.LoadDll;
b3c613f2 844 char dll_buf[__PMAX];
450005e7 845 char *dll_name = NULL;
3cee93ac 846
3a4b77d8 847 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 848
94481b8c
JB
849 /* Try getting the DLL name by searching the list of known modules
850 and matching their base address against this new DLL's base address.
851
852 FIXME: brobecker/2013-12-10:
853 It seems odd to be going through this search if the DLL name could
854 simply be extracted via "event->lpImageName". Moreover, some
855 experimentation with various versions of Windows seem to indicate
856 that it might still be too early for this DLL to be listed when
857 querying the system about the current list of modules, thus making
858 this attempt pointless.
859
860 This code can therefore probably be removed. But at the time of
861 this writing, we are too close to creating the GDB 7.7 branch
862 for us to make such a change. We are therefore defering it. */
863
d3653bf6 864 if (!get_module_name (event->lpBaseOfDll, dll_buf))
8e860359 865 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
3cee93ac 866
1e37c281 867 dll_name = dll_buf;
24e60978 868
94481b8c
JB
869 /* Try getting the DLL name via the lpImageName field of the event.
870 Note that Microsoft documents this fields as strictly optional,
871 in the sense that it might be NULL. And the first DLL event in
872 particular is explicitly documented as "likely not pass[ed]"
873 (source: MSDN LOAD_DLL_DEBUG_INFO structure). */
dfe7f3ac 874 if (*dll_name == '\0')
de1b3c3d
PA
875 dll_name = get_image_name (current_process_handle,
876 event->lpImageName, event->fUnicode);
3cee93ac
CF
877 if (!dll_name)
878 return 1;
879
dc05df57 880 solib_end->next = windows_make_so (dll_name, event->lpBaseOfDll);
de1b3c3d 881 solib_end = solib_end->next;
450005e7 882
a74ce742
PM
883 DEBUG_EVENTS (("gdb: Loading dll \"%s\" at %s.\n", solib_end->so_name,
884 host_address_to_string (solib_end->lm_info->load_addr)));
7488902c 885
450005e7
CF
886 return 1;
887}
888
3ee6f623 889static void
dc05df57 890windows_free_so (struct so_list *so)
3ee6f623 891{
3ee6f623
CF
892 if (so->lm_info)
893 xfree (so->lm_info);
de1b3c3d 894 xfree (so);
3cb8e7f6
CF
895}
896
d3ff4a77 897static int
0a65a603 898handle_unload_dll (void *dummy)
d3ff4a77 899{
d3653bf6 900 LPVOID lpBaseOfDll = current_event.u.UnloadDll.lpBaseOfDll;
3ee6f623 901 struct so_list *so;
d3ff4a77
CF
902
903 for (so = &solib_start; so->next != NULL; so = so->next)
3ee6f623 904 if (so->next->lm_info->load_addr == lpBaseOfDll)
d3ff4a77 905 {
3ee6f623 906 struct so_list *sodel = so->next;
a25cd31f 907
d3ff4a77
CF
908 so->next = sodel->next;
909 if (!so->next)
910 solib_end = so;
7488902c
PM
911 DEBUG_EVENTS (("gdb: Unloading dll \"%s\".\n", sodel->so_name));
912
dc05df57 913 windows_free_so (sodel);
d3ff4a77
CF
914 return 1;
915 }
3929abe9 916
ecc13e53
JB
917 /* We did not find any DLL that was previously loaded at this address,
918 so register a complaint. We do not report an error, because we have
919 observed that this may be happening under some circumstances. For
920 instance, running 32bit applications on x64 Windows causes us to receive
921 4 mysterious UNLOAD_DLL_DEBUG_EVENTs during the startup phase (these
922 events are apparently caused by the WOW layer, the interface between
923 32bit and 64bit worlds). */
924 complaint (&symfile_complaints, _("dll starting at %s not found."),
925 host_address_to_string (lpBaseOfDll));
d3ff4a77
CF
926
927 return 0;
928}
929
581e13c1 930/* Clear list of loaded DLLs. */
3ee6f623 931static void
dc05df57 932windows_clear_solib (void)
450005e7 933{
450005e7
CF
934 solib_start.next = NULL;
935 solib_end = &solib_start;
450005e7 936}
295732ea 937
581e13c1 938/* Load DLL symbol info. */
d603d4b3 939static void
7470a420 940dll_symbol_command (char *args, int from_tty)
450005e7 941{
8e860359 942 int n;
450005e7 943 dont_repeat ();
8e860359 944
450005e7 945 if (args == NULL)
8a3fe4f8 946 error (_("dll-symbols requires a file name"));
450005e7 947
8e860359
CF
948 n = strlen (args);
949 if (n > 4 && strcasecmp (args + n - 4, ".dll") != 0)
950 {
951 char *newargs = (char *) alloca (n + 4 + 1);
952 strcpy (newargs, args);
953 strcat (newargs, ".dll");
954 args = newargs;
955 }
956
7470a420 957 safe_symbol_file_add (args, from_tty, NULL, 0, OBJF_SHARED | OBJF_USERLOADED);
8e860359 958}
450005e7 959
3cee93ac
CF
960/* Handle DEBUG_STRING output from child process.
961 Cygwin prepends its messages with a "cygwin:". Interpret this as
581e13c1 962 a Cygwin signal. Otherwise just print the string as a warning. */
3cee93ac
CF
963static int
964handle_output_debug_string (struct target_waitstatus *ourstatus)
965{
a244bdca
CF
966 char *s = NULL;
967 int retval = 0;
3cee93ac
CF
968
969 if (!target_read_string
2c647436
PM
970 ((CORE_ADDR) (uintptr_t) current_event.u.DebugString.lpDebugStringData,
971 &s, 1024, 0)
3cee93ac 972 || !s || !*s)
a244bdca 973 /* nothing to do */;
581e13c1
MS
974 else if (strncmp (s, _CYGWIN_SIGNAL_STRING,
975 sizeof (_CYGWIN_SIGNAL_STRING) - 1) != 0)
3cee93ac 976 {
10325bc5 977#ifdef __CYGWIN__
d3a09475 978 if (strncmp (s, "cYg", 3) != 0)
10325bc5 979#endif
8a3fe4f8 980 warning (("%s"), s);
3cee93ac 981 }
cb832706 982#ifdef __COPY_CONTEXT_SIZE
d3a09475 983 else
3cee93ac 984 {
581e13c1
MS
985 /* Got a cygwin signal marker. A cygwin signal is followed by
986 the signal number itself and then optionally followed by the
987 thread id and address to saved context within the DLL. If
988 these are supplied, then the given thread is assumed to have
989 issued the signal and the context from the thread is assumed
990 to be stored at the given address in the inferior. Tell gdb
991 to treat this like a real signal. */
3cee93ac 992 char *p;
3929abe9 993 int sig = strtol (s + sizeof (_CYGWIN_SIGNAL_STRING) - 1, &p, 0);
2ea28649 994 int gotasig = gdb_signal_from_host (sig);
c62fa0e2 995
0714f9bf
SS
996 ourstatus->value.sig = gotasig;
997 if (gotasig)
a244bdca
CF
998 {
999 LPCVOID x;
2c15ef43 1000 SIZE_T n;
c62fa0e2 1001
a244bdca
CF
1002 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1003 retval = strtoul (p, &p, 0);
1004 if (!retval)
1005 retval = main_thread_id;
40653b35 1006 else if ((x = (LPCVOID) (uintptr_t) strtoull (p, NULL, 0))
a244bdca 1007 && ReadProcessMemory (current_process_handle, x,
581e13c1
MS
1008 &saved_context,
1009 __COPY_CONTEXT_SIZE, &n)
a244bdca
CF
1010 && n == __COPY_CONTEXT_SIZE)
1011 have_saved_context = 1;
1012 current_event.dwThreadId = retval;
1013 }
3cee93ac 1014 }
cb832706 1015#endif
3cee93ac 1016
a244bdca
CF
1017 if (s)
1018 xfree (s);
1019 return retval;
3cee93ac 1020}
24e60978 1021
c1748f97
PM
1022static int
1023display_selector (HANDLE thread, DWORD sel)
1024{
1025 LDT_ENTRY info;
1026 if (GetThreadSelectorEntry (thread, sel, &info))
1027 {
1028 int base, limit;
d50a0ce2 1029 printf_filtered ("0x%03x: ", (unsigned) sel);
c1748f97 1030 if (!info.HighWord.Bits.Pres)
baa93fa6
CF
1031 {
1032 puts_filtered ("Segment not present\n");
1033 return 0;
1034 }
c1748f97
PM
1035 base = (info.HighWord.Bits.BaseHi << 24) +
1036 (info.HighWord.Bits.BaseMid << 16)
1037 + info.BaseLow;
1038 limit = (info.HighWord.Bits.LimitHi << 16) + info.LimitLow;
1039 if (info.HighWord.Bits.Granularity)
caad7706 1040 limit = (limit << 12) | 0xfff;
c1748f97
PM
1041 printf_filtered ("base=0x%08x limit=0x%08x", base, limit);
1042 if (info.HighWord.Bits.Default_Big)
baa93fa6 1043 puts_filtered(" 32-bit ");
c1748f97 1044 else
baa93fa6 1045 puts_filtered(" 16-bit ");
c1748f97
PM
1046 switch ((info.HighWord.Bits.Type & 0xf) >> 1)
1047 {
1048 case 0:
baa93fa6
CF
1049 puts_filtered ("Data (Read-Only, Exp-up");
1050 break;
c1748f97 1051 case 1:
baa93fa6
CF
1052 puts_filtered ("Data (Read/Write, Exp-up");
1053 break;
c1748f97 1054 case 2:
baa93fa6
CF
1055 puts_filtered ("Unused segment (");
1056 break;
c1748f97 1057 case 3:
baa93fa6
CF
1058 puts_filtered ("Data (Read/Write, Exp-down");
1059 break;
c1748f97 1060 case 4:
baa93fa6
CF
1061 puts_filtered ("Code (Exec-Only, N.Conf");
1062 break;
c1748f97 1063 case 5:
baa93fa6 1064 puts_filtered ("Code (Exec/Read, N.Conf");
c1748f97
PM
1065 break;
1066 case 6:
baa93fa6 1067 puts_filtered ("Code (Exec-Only, Conf");
c1748f97
PM
1068 break;
1069 case 7:
baa93fa6 1070 puts_filtered ("Code (Exec/Read, Conf");
c1748f97
PM
1071 break;
1072 default:
1073 printf_filtered ("Unknown type 0x%x",info.HighWord.Bits.Type);
1074 }
1075 if ((info.HighWord.Bits.Type & 0x1) == 0)
baa93fa6 1076 puts_filtered(", N.Acc");
c1748f97
PM
1077 puts_filtered (")\n");
1078 if ((info.HighWord.Bits.Type & 0x10) == 0)
1079 puts_filtered("System selector ");
1080 printf_filtered ("Priviledge level = %d. ", info.HighWord.Bits.Dpl);
1081 if (info.HighWord.Bits.Granularity)
baa93fa6 1082 puts_filtered ("Page granular.\n");
c1748f97
PM
1083 else
1084 puts_filtered ("Byte granular.\n");
1085 return 1;
1086 }
1087 else
1088 {
5572ce1f
PM
1089 DWORD err = GetLastError ();
1090 if (err == ERROR_NOT_SUPPORTED)
1091 printf_filtered ("Function not supported\n");
1092 else
d50a0ce2 1093 printf_filtered ("Invalid selector 0x%x.\n", (unsigned) sel);
c1748f97
PM
1094 return 0;
1095 }
1096}
1097
1098static void
1099display_selectors (char * args, int from_tty)
1100{
1101 if (!current_thread)
1102 {
1103 puts_filtered ("Impossible to display selectors now.\n");
1104 return;
1105 }
1106 if (!args)
1107 {
1108
1109 puts_filtered ("Selector $cs\n");
1110 display_selector (current_thread->h,
baa93fa6 1111 current_thread->context.SegCs);
c1748f97
PM
1112 puts_filtered ("Selector $ds\n");
1113 display_selector (current_thread->h,
baa93fa6 1114 current_thread->context.SegDs);
c1748f97
PM
1115 puts_filtered ("Selector $es\n");
1116 display_selector (current_thread->h,
baa93fa6 1117 current_thread->context.SegEs);
c1748f97
PM
1118 puts_filtered ("Selector $ss\n");
1119 display_selector (current_thread->h,
baa93fa6 1120 current_thread->context.SegSs);
c1748f97
PM
1121 puts_filtered ("Selector $fs\n");
1122 display_selector (current_thread->h,
1123 current_thread->context.SegFs);
1124 puts_filtered ("Selector $gs\n");
1125 display_selector (current_thread->h,
baa93fa6 1126 current_thread->context.SegGs);
c1748f97
PM
1127 }
1128 else
1129 {
1130 int sel;
1131 sel = parse_and_eval_long (args);
1132 printf_filtered ("Selector \"%s\"\n",args);
1133 display_selector (current_thread->h, sel);
1134 }
1135}
1136
7393af7c 1137#define DEBUG_EXCEPTION_SIMPLE(x) if (debug_exceptions) \
a74ce742
PM
1138 printf_unfiltered ("gdb: Target exception %s at %s\n", x, \
1139 host_address_to_string (\
1140 current_event.u.Exception.ExceptionRecord.ExceptionAddress))
7393af7c 1141
36339ecd 1142static int
450005e7 1143handle_exception (struct target_waitstatus *ourstatus)
24e60978 1144{
3cee93ac 1145 thread_info *th;
29fe111d 1146 DWORD code = current_event.u.Exception.ExceptionRecord.ExceptionCode;
3cee93ac 1147
29fe111d 1148 ourstatus->kind = TARGET_WAITKIND_STOPPED;
8a892701 1149
581e13c1 1150 /* Record the context of the current thread. */
3cee93ac 1151 th = thread_rec (current_event.dwThreadId, -1);
24e60978 1152
29fe111d 1153 switch (code)
24e60978 1154 {
1ef980b9 1155 case EXCEPTION_ACCESS_VIOLATION:
7393af7c 1156 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ACCESS_VIOLATION");
a493e3e2 1157 ourstatus->value.sig = GDB_SIGNAL_SEGV;
10325bc5 1158#ifdef __CYGWIN__
8da8e0b3 1159 {
581e13c1
MS
1160 /* See if the access violation happened within the cygwin DLL
1161 itself. Cygwin uses a kind of exception handling to deal
1162 with passed-in invalid addresses. gdb should not treat
1163 these as real SEGVs since they will be silently handled by
1164 cygwin. A real SEGV will (theoretically) be caught by
1165 cygwin later in the process and will be sent as a
1166 cygwin-specific-signal. So, ignore SEGVs if they show up
1167 within the text segment of the DLL itself. */
2c02bd72 1168 const char *fn;
581e13c1
MS
1169 CORE_ADDR addr = (CORE_ADDR) (uintptr_t)
1170 current_event.u.Exception.ExceptionRecord.ExceptionAddress;
1171
1172 if ((!cygwin_exceptions && (addr >= cygwin_load_start
1173 && addr < cygwin_load_end))
a244bdca 1174 || (find_pc_partial_function (addr, &fn, NULL, NULL)
581e13c1
MS
1175 && strncmp (fn, "KERNEL32!IsBad",
1176 strlen ("KERNEL32!IsBad")) == 0))
8da8e0b3
CF
1177 return 0;
1178 }
10325bc5 1179#endif
7393af7c
PM
1180 break;
1181 case STATUS_STACK_OVERFLOW:
1182 DEBUG_EXCEPTION_SIMPLE ("STATUS_STACK_OVERFLOW");
a493e3e2 1183 ourstatus->value.sig = GDB_SIGNAL_SEGV;
7393af7c
PM
1184 break;
1185 case STATUS_FLOAT_DENORMAL_OPERAND:
1186 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DENORMAL_OPERAND");
a493e3e2 1187 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1188 break;
1189 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1190 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ARRAY_BOUNDS_EXCEEDED");
a493e3e2 1191 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1192 break;
1193 case STATUS_FLOAT_INEXACT_RESULT:
1194 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INEXACT_RESULT");
a493e3e2 1195 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1196 break;
1197 case STATUS_FLOAT_INVALID_OPERATION:
1198 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INVALID_OPERATION");
a493e3e2 1199 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1200 break;
1201 case STATUS_FLOAT_OVERFLOW:
1202 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_OVERFLOW");
a493e3e2 1203 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c
PM
1204 break;
1205 case STATUS_FLOAT_STACK_CHECK:
1206 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_STACK_CHECK");
a493e3e2 1207 ourstatus->value.sig = GDB_SIGNAL_FPE;
1ef980b9 1208 break;
3b7c8b74 1209 case STATUS_FLOAT_UNDERFLOW:
7393af7c 1210 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_UNDERFLOW");
a493e3e2 1211 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c 1212 break;
3b7c8b74 1213 case STATUS_FLOAT_DIVIDE_BY_ZERO:
7393af7c 1214 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DIVIDE_BY_ZERO");
a493e3e2 1215 ourstatus->value.sig = GDB_SIGNAL_FPE;
7393af7c 1216 break;
3b7c8b74 1217 case STATUS_INTEGER_DIVIDE_BY_ZERO:
7393af7c 1218 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_DIVIDE_BY_ZERO");
a493e3e2 1219 ourstatus->value.sig = GDB_SIGNAL_FPE;
3b7c8b74 1220 break;
7393af7c
PM
1221 case STATUS_INTEGER_OVERFLOW:
1222 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_OVERFLOW");
a493e3e2 1223 ourstatus->value.sig = GDB_SIGNAL_FPE;
1ef980b9
SC
1224 break;
1225 case EXCEPTION_BREAKPOINT:
7393af7c 1226 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_BREAKPOINT");
a493e3e2 1227 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1ef980b9
SC
1228 break;
1229 case DBG_CONTROL_C:
7393af7c 1230 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_C");
a493e3e2 1231 ourstatus->value.sig = GDB_SIGNAL_INT;
5b421780
PM
1232 break;
1233 case DBG_CONTROL_BREAK:
7393af7c 1234 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_BREAK");
a493e3e2 1235 ourstatus->value.sig = GDB_SIGNAL_INT;
1ef980b9
SC
1236 break;
1237 case EXCEPTION_SINGLE_STEP:
7393af7c 1238 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_SINGLE_STEP");
a493e3e2 1239 ourstatus->value.sig = GDB_SIGNAL_TRAP;
1ef980b9 1240 break;
8227c82d 1241 case EXCEPTION_ILLEGAL_INSTRUCTION:
7393af7c 1242 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ILLEGAL_INSTRUCTION");
a493e3e2 1243 ourstatus->value.sig = GDB_SIGNAL_ILL;
7393af7c
PM
1244 break;
1245 case EXCEPTION_PRIV_INSTRUCTION:
1246 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_PRIV_INSTRUCTION");
a493e3e2 1247 ourstatus->value.sig = GDB_SIGNAL_ILL;
7393af7c
PM
1248 break;
1249 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1250 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_NONCONTINUABLE_EXCEPTION");
a493e3e2 1251 ourstatus->value.sig = GDB_SIGNAL_ILL;
8227c82d 1252 break;
1ef980b9 1253 default:
581e13c1 1254 /* Treat unhandled first chance exceptions specially. */
02e423b9 1255 if (current_event.u.Exception.dwFirstChance)
a244bdca 1256 return -1;
d50a0ce2
CV
1257 printf_unfiltered ("gdb: unknown target exception 0x%08x at %s\n",
1258 (unsigned) current_event.u.Exception.ExceptionRecord.ExceptionCode,
a74ce742
PM
1259 host_address_to_string (
1260 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
a493e3e2 1261 ourstatus->value.sig = GDB_SIGNAL_UNKNOWN;
1ef980b9 1262 break;
24e60978 1263 }
24e60978 1264 exception_count++;
7393af7c 1265 last_sig = ourstatus->value.sig;
36339ecd 1266 return 1;
24e60978
SC
1267}
1268
3cee93ac 1269/* Resume all artificially suspended threads if we are continuing
581e13c1 1270 execution. */
3cee93ac 1271static BOOL
dc05df57 1272windows_continue (DWORD continue_status, int id)
3cee93ac
CF
1273{
1274 int i;
1275 thread_info *th;
1276 BOOL res;
1277
0c3d84be 1278 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%d, ctid=0x%x, %s);\n",
d50a0ce2
CV
1279 (unsigned) current_event.dwProcessId,
1280 (unsigned) current_event.dwThreadId,
dfe7f3ac 1281 continue_status == DBG_CONTINUE ?
7393af7c 1282 "DBG_CONTINUE" : "DBG_EXCEPTION_NOT_HANDLED"));
6537bb24
PA
1283
1284 for (th = &thread_head; (th = th->next) != NULL;)
1285 if ((id == -1 || id == (int) th->id)
1286 && th->suspended)
1287 {
1288 if (debug_registers_changed)
1289 {
1290 th->context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1291 th->context.Dr0 = dr[0];
1292 th->context.Dr1 = dr[1];
1293 th->context.Dr2 = dr[2];
1294 th->context.Dr3 = dr[3];
1295 th->context.Dr6 = DR6_CLEAR_VALUE;
1296 th->context.Dr7 = dr[7];
1297 }
1298 if (th->context.ContextFlags)
1299 {
1300 CHECK (SetThreadContext (th->h, &th->context));
1301 th->context.ContextFlags = 0;
1302 }
1303 if (th->suspended > 0)
1304 (void) ResumeThread (th->h);
1305 th->suspended = 0;
1306 }
1307
0714f9bf
SS
1308 res = ContinueDebugEvent (current_event.dwProcessId,
1309 current_event.dwThreadId,
1310 continue_status);
3cee93ac 1311
fa4ba8da 1312 debug_registers_changed = 0;
3cee93ac
CF
1313 return res;
1314}
1315
d6dc8049
CF
1316/* Called in pathological case where Windows fails to send a
1317 CREATE_PROCESS_DEBUG_EVENT after an attach. */
3ee6f623 1318static DWORD
5439edaa 1319fake_create_process (void)
3ade5333
CF
1320{
1321 current_process_handle = OpenProcess (PROCESS_ALL_ACCESS, FALSE,
1322 current_event.dwProcessId);
bf25528d
CF
1323 if (current_process_handle != NULL)
1324 open_process_used = 1;
1325 else
1326 {
d50a0ce2
CV
1327 error (_("OpenProcess call failed, GetLastError = %u"),
1328 (unsigned) GetLastError ());
bf25528d
CF
1329 /* We can not debug anything in that case. */
1330 }
3ade5333 1331 main_thread_id = current_event.dwThreadId;
711e434b
PM
1332 current_thread = windows_add_thread (
1333 ptid_build (current_event.dwProcessId, 0,
1334 current_event.dwThreadId),
1335 current_event.u.CreateThread.hThread,
1336 current_event.u.CreateThread.lpThreadLocalBase);
3ade5333
CF
1337 return main_thread_id;
1338}
1339
a244bdca 1340static void
28439f5e 1341windows_resume (struct target_ops *ops,
2ea28649 1342 ptid_t ptid, int step, enum gdb_signal sig)
a244bdca
CF
1343{
1344 thread_info *th;
1345 DWORD continue_status = DBG_CONTINUE;
1346
2dc38344
PA
1347 /* A specific PTID means `step only this thread id'. */
1348 int resume_all = ptid_equal (ptid, minus_one_ptid);
1349
1350 /* If we're continuing all threads, it's the current inferior that
1351 should be handled specially. */
1352 if (resume_all)
1353 ptid = inferior_ptid;
a244bdca 1354
a493e3e2 1355 if (sig != GDB_SIGNAL_0)
a244bdca
CF
1356 {
1357 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
1358 {
1359 DEBUG_EXCEPT(("Cannot continue with signal %d here.\n",sig));
1360 }
1361 else if (sig == last_sig)
1362 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1363 else
1364#if 0
1365/* This code does not seem to work, because
1366 the kernel does probably not consider changes in the ExceptionRecord
1367 structure when passing the exception to the inferior.
1368 Note that this seems possible in the exception handler itself. */
1369 {
1370 int i;
1371 for (i = 0; xlate[i].them != -1; i++)
1372 if (xlate[i].us == sig)
1373 {
581e13c1
MS
1374 current_event.u.Exception.ExceptionRecord.ExceptionCode
1375 = xlate[i].them;
a244bdca
CF
1376 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1377 break;
1378 }
1379 if (continue_status == DBG_CONTINUE)
1380 {
1381 DEBUG_EXCEPT(("Cannot continue with signal %d.\n",sig));
1382 }
1383 }
1384#endif
1385 DEBUG_EXCEPT(("Can only continue with recieved signal %d.\n",
1386 last_sig));
1387 }
1388
a493e3e2 1389 last_sig = GDB_SIGNAL_0;
a244bdca 1390
dc05df57 1391 DEBUG_EXEC (("gdb: windows_resume (pid=%d, tid=%ld, step=%d, sig=%d);\n",
2dc38344 1392 ptid_get_pid (ptid), ptid_get_tid (ptid), step, sig));
a244bdca 1393
581e13c1 1394 /* Get context for currently selected thread. */
2dc38344 1395 th = thread_rec (ptid_get_tid (inferior_ptid), FALSE);
a244bdca
CF
1396 if (th)
1397 {
1398 if (step)
1399 {
581e13c1 1400 /* Single step by setting t bit. */
a97b0ac8
UW
1401 struct regcache *regcache = get_current_regcache ();
1402 struct gdbarch *gdbarch = get_regcache_arch (regcache);
1403 windows_fetch_inferior_registers (ops, regcache,
1404 gdbarch_ps_regnum (gdbarch));
a244bdca
CF
1405 th->context.EFlags |= FLAG_TRACE_BIT;
1406 }
1407
1408 if (th->context.ContextFlags)
1409 {
1410 if (debug_registers_changed)
1411 {
1412 th->context.Dr0 = dr[0];
1413 th->context.Dr1 = dr[1];
1414 th->context.Dr2 = dr[2];
1415 th->context.Dr3 = dr[3];
6537bb24 1416 th->context.Dr6 = DR6_CLEAR_VALUE;
a244bdca
CF
1417 th->context.Dr7 = dr[7];
1418 }
1419 CHECK (SetThreadContext (th->h, &th->context));
1420 th->context.ContextFlags = 0;
1421 }
1422 }
1423
1424 /* Allow continuing with the same signal that interrupted us.
581e13c1 1425 Otherwise complain. */
a244bdca 1426
2dc38344 1427 if (resume_all)
dc05df57 1428 windows_continue (continue_status, -1);
2dc38344 1429 else
dc05df57 1430 windows_continue (continue_status, ptid_get_tid (ptid));
a244bdca
CF
1431}
1432
695de547
CF
1433/* Ctrl-C handler used when the inferior is not run in the same console. The
1434 handler is in charge of interrupting the inferior using DebugBreakProcess.
1435 Note that this function is not available prior to Windows XP. In this case
1436 we emit a warning. */
d603d4b3 1437static BOOL WINAPI
695de547
CF
1438ctrl_c_handler (DWORD event_type)
1439{
1440 const int attach_flag = current_inferior ()->attach_flag;
1441
bb0613a5
PM
1442 /* Only handle Ctrl-C and Ctrl-Break events. Ignore others. */
1443 if (event_type != CTRL_C_EVENT && event_type != CTRL_BREAK_EVENT)
695de547
CF
1444 return FALSE;
1445
1446 /* If the inferior and the debugger share the same console, do nothing as
1447 the inferior has also received the Ctrl-C event. */
1448 if (!new_console && !attach_flag)
1449 return TRUE;
1450
1451 if (!DebugBreakProcess (current_process_handle))
581e13c1
MS
1452 warning (_("Could not interrupt program. "
1453 "Press Ctrl-c in the program console."));
695de547
CF
1454
1455 /* Return true to tell that Ctrl-C has been handled. */
1456 return TRUE;
1457}
1458
8a892701 1459/* Get the next event from the child. Return 1 if the event requires
695de547 1460 handling by WFI (or whatever). */
1e37c281 1461static int
28439f5e
PA
1462get_windows_debug_event (struct target_ops *ops,
1463 int pid, struct target_waitstatus *ourstatus)
1e37c281
JM
1464{
1465 BOOL debug_event;
8a892701 1466 DWORD continue_status, event_code;
87a45c96 1467 thread_info *th;
8a892701 1468 static thread_info dummy_thread_info;
450005e7 1469 int retval = 0;
1e37c281 1470
a493e3e2 1471 last_sig = GDB_SIGNAL_0;
9d3789f7 1472
8a892701 1473 if (!(debug_event = WaitForDebugEvent (&current_event, 1000)))
29fe111d 1474 goto out;
1e37c281
JM
1475
1476 event_count++;
1477 continue_status = DBG_CONTINUE;
1e37c281 1478
8a892701 1479 event_code = current_event.dwDebugEventCode;
450005e7 1480 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
87a45c96 1481 th = NULL;
a244bdca 1482 have_saved_context = 0;
8a892701
CF
1483
1484 switch (event_code)
1e37c281
JM
1485 {
1486 case CREATE_THREAD_DEBUG_EVENT:
0c3d84be 1487 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1488 (unsigned) current_event.dwProcessId,
1489 (unsigned) current_event.dwThreadId,
1490 "CREATE_THREAD_DEBUG_EVENT"));
dfe7f3ac 1491 if (saw_create != 1)
3ade5333 1492 {
181e7f93
PA
1493 struct inferior *inf;
1494 inf = find_inferior_pid (current_event.dwProcessId);
1495 if (!saw_create && inf->attach_flag)
3ade5333 1496 {
d6dc8049
CF
1497 /* Kludge around a Windows bug where first event is a create
1498 thread event. Caused when attached process does not have
581e13c1 1499 a main thread. */
3a3e9ee3 1500 retval = fake_create_process ();
181e7f93
PA
1501 if (retval)
1502 saw_create++;
3ade5333
CF
1503 }
1504 break;
1505 }
581e13c1 1506 /* Record the existence of this thread. */
450005e7 1507 retval = current_event.dwThreadId;
dc05df57 1508 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
2dc38344 1509 current_event.dwThreadId),
711e434b
PM
1510 current_event.u.CreateThread.hThread,
1511 current_event.u.CreateThread.lpThreadLocalBase);
1512
1e37c281
JM
1513 break;
1514
1515 case EXIT_THREAD_DEBUG_EVENT:
0c3d84be 1516 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1517 (unsigned) current_event.dwProcessId,
1518 (unsigned) current_event.dwThreadId,
1519 "EXIT_THREAD_DEBUG_EVENT"));
b3c613f2 1520
87a45c96
CF
1521 if (current_event.dwThreadId != main_thread_id)
1522 {
dc05df57 1523 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
e0ea48a0
EZ
1524 current_event.dwThreadId),
1525 current_event.u.ExitThread.dwExitCode);
87a45c96
CF
1526 th = &dummy_thread_info;
1527 }
1e37c281
JM
1528 break;
1529
1530 case CREATE_PROCESS_DEBUG_EVENT:
0c3d84be 1531 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1532 (unsigned) current_event.dwProcessId,
1533 (unsigned) current_event.dwThreadId,
1534 "CREATE_PROCESS_DEBUG_EVENT"));
700b351b 1535 CloseHandle (current_event.u.CreateProcessInfo.hFile);
dfe7f3ac 1536 if (++saw_create != 1)
bf25528d 1537 break;
1e37c281 1538
dfe7f3ac 1539 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
87a45c96 1540 if (main_thread_id)
695de547 1541 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
e0ea48a0
EZ
1542 main_thread_id),
1543 0);
9d3789f7 1544 main_thread_id = current_event.dwThreadId;
581e13c1 1545 /* Add the main thread. */
dc05df57 1546 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
695de547 1547 current_event.dwThreadId),
711e434b
PM
1548 current_event.u.CreateProcessInfo.hThread,
1549 current_event.u.CreateProcessInfo.lpThreadLocalBase);
3a3e9ee3 1550 retval = current_event.dwThreadId;
1e37c281
JM
1551 break;
1552
1553 case EXIT_PROCESS_DEBUG_EVENT:
0c3d84be 1554 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1555 (unsigned) current_event.dwProcessId,
1556 (unsigned) current_event.dwThreadId,
1557 "EXIT_PROCESS_DEBUG_EVENT"));
16d905e2
CF
1558 if (!windows_initialization_done)
1559 {
1560 target_terminal_ours ();
1561 target_mourn_inferior ();
1562 error (_("During startup program exited with code 0x%x."),
1563 (unsigned int) current_event.u.ExitProcess.dwExitCode);
1564 }
1565 else if (saw_create == 1)
1566 {
1567 ourstatus->kind = TARGET_WAITKIND_EXITED;
1568 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
1569 retval = main_thread_id;
1570 }
8a892701 1571 break;
1e37c281
JM
1572
1573 case LOAD_DLL_DEBUG_EVENT:
0c3d84be 1574 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1575 (unsigned) current_event.dwProcessId,
1576 (unsigned) current_event.dwThreadId,
1577 "LOAD_DLL_DEBUG_EVENT"));
700b351b 1578 CloseHandle (current_event.u.LoadDll.hFile);
dfe7f3ac
CF
1579 if (saw_create != 1)
1580 break;
8a892701 1581 catch_errors (handle_load_dll, NULL, (char *) "", RETURN_MASK_ALL);
450005e7
CF
1582 ourstatus->kind = TARGET_WAITKIND_LOADED;
1583 ourstatus->value.integer = 0;
9d3789f7 1584 retval = main_thread_id;
1e37c281
JM
1585 break;
1586
1587 case UNLOAD_DLL_DEBUG_EVENT:
0c3d84be 1588 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1589 (unsigned) current_event.dwProcessId,
1590 (unsigned) current_event.dwThreadId,
1591 "UNLOAD_DLL_DEBUG_EVENT"));
dfe7f3ac
CF
1592 if (saw_create != 1)
1593 break;
d3ff4a77 1594 catch_errors (handle_unload_dll, NULL, (char *) "", RETURN_MASK_ALL);
de1b3c3d
PA
1595 ourstatus->kind = TARGET_WAITKIND_LOADED;
1596 ourstatus->value.integer = 0;
1597 retval = main_thread_id;
d3ff4a77 1598 break;
1e37c281
JM
1599
1600 case EXCEPTION_DEBUG_EVENT:
0c3d84be 1601 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1602 (unsigned) current_event.dwProcessId,
1603 (unsigned) current_event.dwThreadId,
1604 "EXCEPTION_DEBUG_EVENT"));
dfe7f3ac
CF
1605 if (saw_create != 1)
1606 break;
a244bdca
CF
1607 switch (handle_exception (ourstatus))
1608 {
1609 case 0:
1610 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1611 break;
1612 case 1:
1613 retval = current_event.dwThreadId;
1614 break;
1615 case -1:
1616 last_sig = 1;
1617 continue_status = -1;
1618 break;
1619 }
1e37c281
JM
1620 break;
1621
581e13c1 1622 case OUTPUT_DEBUG_STRING_EVENT: /* Message from the kernel. */
0c3d84be 1623 DEBUG_EVENTS (("gdb: kernel event for pid=%u tid=0x%x code=%s)\n",
8a892701
CF
1624 (unsigned) current_event.dwProcessId,
1625 (unsigned) current_event.dwThreadId,
1626 "OUTPUT_DEBUG_STRING_EVENT"));
dfe7f3ac
CF
1627 if (saw_create != 1)
1628 break;
a244bdca 1629 retval = handle_output_debug_string (ourstatus);
1e37c281 1630 break;
9d3789f7 1631
1e37c281 1632 default:
dfe7f3ac
CF
1633 if (saw_create != 1)
1634 break;
0c3d84be 1635 printf_unfiltered ("gdb: kernel event for pid=%u tid=0x%x\n",
d50a0ce2
CV
1636 (unsigned) current_event.dwProcessId,
1637 (unsigned) current_event.dwThreadId);
1638 printf_unfiltered (" unknown event code %u\n",
1639 (unsigned) current_event.dwDebugEventCode);
1e37c281
JM
1640 break;
1641 }
1642
dfe7f3ac 1643 if (!retval || saw_create != 1)
a244bdca
CF
1644 {
1645 if (continue_status == -1)
02529b48 1646 windows_resume (ops, minus_one_ptid, 0, 1);
a244bdca 1647 else
dc05df57 1648 CHECK (windows_continue (continue_status, -1));
a244bdca 1649 }
450005e7 1650 else
9d3789f7 1651 {
2dc38344
PA
1652 inferior_ptid = ptid_build (current_event.dwProcessId, 0,
1653 retval);
3ade5333 1654 current_thread = th ?: thread_rec (current_event.dwThreadId, TRUE);
9d3789f7 1655 }
1e37c281
JM
1656
1657out:
450005e7 1658 return retval;
1e37c281
JM
1659}
1660
2dc38344 1661/* Wait for interesting events to occur in the target process. */
39f77062 1662static ptid_t
117de6a9 1663windows_wait (struct target_ops *ops,
47608cb1 1664 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
24e60978 1665{
2dc38344 1666 int pid = -1;
39f77062 1667
c44537cf
CV
1668 target_terminal_ours ();
1669
24e60978
SC
1670 /* We loop when we get a non-standard exception rather than return
1671 with a SPURIOUS because resume can try and step or modify things,
3cee93ac 1672 which needs a current_thread->h. But some of these exceptions mark
24e60978 1673 the birth or death of threads, which mean that the current thread
581e13c1 1674 isn't necessarily what you think it is. */
24e60978
SC
1675
1676 while (1)
450005e7 1677 {
c57918b2 1678 int retval;
2b008701 1679
695de547
CF
1680 /* If the user presses Ctrl-c while the debugger is waiting
1681 for an event, he expects the debugger to interrupt his program
1682 and to get the prompt back. There are two possible situations:
1683
1684 - The debugger and the program do not share the console, in
1685 which case the Ctrl-c event only reached the debugger.
1686 In that case, the ctrl_c handler will take care of interrupting
581e13c1
MS
1687 the inferior. Note that this case is working starting with
1688 Windows XP. For Windows 2000, Ctrl-C should be pressed in the
695de547
CF
1689 inferior console.
1690
1691 - The debugger and the program share the same console, in which
1692 case both debugger and inferior will receive the Ctrl-c event.
1693 In that case the ctrl_c handler will ignore the event, as the
1694 Ctrl-c event generated inside the inferior will trigger the
1695 expected debug event.
1696
1697 FIXME: brobecker/2008-05-20: If the inferior receives the
1698 signal first and the delay until GDB receives that signal
1699 is sufficiently long, GDB can sometimes receive the SIGINT
1700 after we have unblocked the CTRL+C handler. This would
1701 lead to the debugger stopping prematurely while handling
1702 the new-thread event that comes with the handling of the SIGINT
1703 inside the inferior, and then stop again immediately when
1704 the user tries to resume the execution in the inferior.
1705 This is a classic race that we should try to fix one day. */
1706 SetConsoleCtrlHandler (&ctrl_c_handler, TRUE);
28439f5e 1707 retval = get_windows_debug_event (ops, pid, ourstatus);
695de547 1708 SetConsoleCtrlHandler (&ctrl_c_handler, FALSE);
c57918b2 1709
450005e7 1710 if (retval)
2dc38344 1711 return ptid_build (current_event.dwProcessId, 0, retval);
450005e7
CF
1712 else
1713 {
1714 int detach = 0;
3cee93ac 1715
98bbd631
AC
1716 if (deprecated_ui_loop_hook != NULL)
1717 detach = deprecated_ui_loop_hook (0);
0714f9bf 1718
450005e7 1719 if (detach)
7d85a9c0 1720 windows_kill_inferior (ops);
450005e7
CF
1721 }
1722 }
24e60978
SC
1723}
1724
94481b8c
JB
1725/* On certain versions of Windows, the information about ntdll.dll
1726 is not available yet at the time we get the LOAD_DLL_DEBUG_EVENT,
1727 thus preventing us from reporting this DLL as an SO. This has been
1728 witnessed on Windows 8.1, for instance. A possible explanation
1729 is that ntdll.dll might be mapped before the SO info gets created
1730 by the Windows system -- ntdll.dll is the first DLL to be reported
1731 via LOAD_DLL_DEBUG_EVENT and other DLLs do not seem to suffer from
1732 that problem.
1733
1734 If we indeed are missing ntdll.dll, this function tries to recover
1735 from this issue, after the fact. Do nothing if we encounter any
1736 issue trying to locate that DLL. */
1737
1738static void
1739windows_ensure_ntdll_loaded (void)
1740{
1741 struct so_list *so;
1742 HMODULE dummy_hmodule;
1743 DWORD cb_needed;
1744 HMODULE *hmodules;
1745 int i;
1746
1747 for (so = solib_start.next; so != NULL; so = so->next)
1748 if (FILENAME_CMP (lbasename (so->so_name), "ntdll.dll") == 0)
1749 return; /* ntdll.dll already loaded, nothing to do. */
1750
1751 if (EnumProcessModules (current_process_handle, &dummy_hmodule,
1752 sizeof (HMODULE), &cb_needed) == 0)
1753 return;
1754
1755 if (cb_needed < 1)
1756 return;
1757
1758 hmodules = (HMODULE *) alloca (cb_needed);
1759 if (EnumProcessModules (current_process_handle, hmodules,
1760 cb_needed, &cb_needed) == 0)
1761 return;
1762
1763 for (i = 0; i < (int) (cb_needed / sizeof (HMODULE)); i++)
1764 {
1765 MODULEINFO mi;
774f74c2
PM
1766#ifdef __USEWIDE
1767 wchar_t dll_name[__PMAX];
1768 char name[__PMAX];
1769#else
94481b8c 1770 char dll_name[__PMAX];
774f74c2
PM
1771 char *name;
1772#endif
94481b8c
JB
1773 if (GetModuleInformation (current_process_handle, hmodules[i],
1774 &mi, sizeof (mi)) == 0)
1775 continue;
1776 if (GetModuleFileNameEx (current_process_handle, hmodules[i],
1777 dll_name, sizeof (dll_name)) == 0)
1778 continue;
774f74c2
PM
1779#ifdef __USEWIDE
1780 wcstombs (name, dll_name, __PMAX);
1781#else
1782 name = dll_name;
1783#endif
1784 if (FILENAME_CMP (lbasename (name), "ntdll.dll") == 0)
94481b8c 1785 {
774f74c2 1786 solib_end->next = windows_make_so (name, mi.lpBaseOfDll);
94481b8c
JB
1787 solib_end = solib_end->next;
1788 return;
1789 }
1790 }
1791}
1792
9d3789f7 1793static void
dc05df57 1794do_initial_windows_stuff (struct target_ops *ops, DWORD pid, int attaching)
9d3789f7
CF
1795{
1796 extern int stop_after_trap;
fa4ba8da 1797 int i;
d6b48e9c 1798 struct inferior *inf;
2020b7ab 1799 struct thread_info *tp;
9d3789f7 1800
a493e3e2 1801 last_sig = GDB_SIGNAL_0;
9d3789f7
CF
1802 event_count = 0;
1803 exception_count = 0;
bf25528d 1804 open_process_used = 0;
fa4ba8da 1805 debug_registers_changed = 0;
dfe7f3ac 1806 debug_registers_used = 0;
fa4ba8da
PM
1807 for (i = 0; i < sizeof (dr) / sizeof (dr[0]); i++)
1808 dr[i] = 0;
10325bc5 1809#ifdef __CYGWIN__
de1b3c3d 1810 cygwin_load_start = cygwin_load_end = 0;
10325bc5 1811#endif
9d3789f7
CF
1812 current_event.dwProcessId = pid;
1813 memset (&current_event, 0, sizeof (current_event));
0795be10 1814 push_target (ops);
cb851954 1815 disable_breakpoints_in_shlibs ();
dc05df57 1816 windows_clear_solib ();
9d3789f7
CF
1817 clear_proceed_status ();
1818 init_wait_for_inferior ();
1819
6c95b8df
PA
1820 inf = current_inferior ();
1821 inferior_appeared (inf, pid);
181e7f93 1822 inf->attach_flag = attaching;
7f9f62ba 1823
9f9d052e
PM
1824 /* Make the new process the current inferior, so terminal handling
1825 can rely on it. When attaching, we don't know about any thread
1826 id here, but that's OK --- nothing should be referencing the
dc05df57 1827 current thread until we report an event out of windows_wait. */
9f9d052e
PM
1828 inferior_ptid = pid_to_ptid (pid);
1829
c44537cf 1830 terminal_init_inferior_with_pgrp (pid);
9d3789f7
CF
1831 target_terminal_inferior ();
1832
16d905e2 1833 windows_initialization_done = 0;
16c381f0 1834 inf->control.stop_soon = STOP_QUIETLY;
9d3789f7
CF
1835 while (1)
1836 {
1837 stop_after_trap = 1;
e4c8541f 1838 wait_for_inferior ();
2020b7ab 1839 tp = inferior_thread ();
a493e3e2 1840 if (tp->suspend.stop_signal != GDB_SIGNAL_TRAP)
16c381f0 1841 resume (0, tp->suspend.stop_signal);
9d3789f7
CF
1842 else
1843 break;
1844 }
eff8332b 1845
94481b8c
JB
1846 /* FIXME: brobecker/2013-12-10: We should try another approach where
1847 we first ignore all DLL load/unload events up until this point,
1848 and then iterate over all modules to create the associated shared
1849 objects. This is a fairly significant change, however, and we are
1850 close to creating a release branch, so we are delaying it a bit,
1851 after the branch is created. */
1852 windows_ensure_ntdll_loaded ();
1853
16d905e2 1854 windows_initialization_done = 1;
16c381f0 1855 inf->control.stop_soon = NO_STOP_QUIETLY;
9d3789f7
CF
1856 stop_after_trap = 0;
1857 return;
1858}
1859
616a9dc4
CV
1860/* Try to set or remove a user privilege to the current process. Return -1
1861 if that fails, the previous setting of that privilege otherwise.
1862
1863 This code is copied from the Cygwin source code and rearranged to allow
1864 dynamically loading of the needed symbols from advapi32 which is only
581e13c1 1865 available on NT/2K/XP. */
616a9dc4
CV
1866static int
1867set_process_privilege (const char *privilege, BOOL enable)
1868{
616a9dc4
CV
1869 HANDLE token_hdl = NULL;
1870 LUID restore_priv;
1871 TOKEN_PRIVILEGES new_priv, orig_priv;
1872 int ret = -1;
1873 DWORD size;
1874
616a9dc4
CV
1875 if (!OpenProcessToken (GetCurrentProcess (),
1876 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
1877 &token_hdl))
1878 goto out;
1879
418c6cb3 1880 if (!LookupPrivilegeValueA (NULL, privilege, &restore_priv))
616a9dc4
CV
1881 goto out;
1882
1883 new_priv.PrivilegeCount = 1;
1884 new_priv.Privileges[0].Luid = restore_priv;
1885 new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0;
1886
1887 if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv,
295732ea 1888 sizeof orig_priv, &orig_priv, &size))
616a9dc4
CV
1889 goto out;
1890#if 0
1891 /* Disabled, otherwise every `attach' in an unprivileged user session
1892 would raise the "Failed to get SE_DEBUG_NAME privilege" warning in
581e13c1 1893 windows_attach(). */
616a9dc4 1894 /* AdjustTokenPrivileges returns TRUE even if the privilege could not
581e13c1 1895 be enabled. GetLastError () returns an correct error code, though. */
616a9dc4
CV
1896 if (enable && GetLastError () == ERROR_NOT_ALL_ASSIGNED)
1897 goto out;
1898#endif
1899
1900 ret = orig_priv.Privileges[0].Attributes == SE_PRIVILEGE_ENABLED ? 1 : 0;
1901
1902out:
1903 if (token_hdl)
1904 CloseHandle (token_hdl);
1905
1906 return ret;
1907}
1908
02cc9f49 1909/* Attach to process PID, then initialize for debugging it. */
24e60978 1910static void
dc05df57 1911windows_attach (struct target_ops *ops, char *args, int from_tty)
24e60978
SC
1912{
1913 BOOL ok;
559e75c0 1914 DWORD pid;
24e60978 1915
74164c56 1916 pid = parse_pid_to_attach (args);
24e60978 1917
616a9dc4
CV
1918 if (set_process_privilege (SE_DEBUG_NAME, TRUE) < 0)
1919 {
1920 printf_unfiltered ("Warning: Failed to get SE_DEBUG_NAME privilege\n");
581e13c1
MS
1921 printf_unfiltered ("This can cause attach to "
1922 "fail on Windows NT/2K/XP\n");
616a9dc4
CV
1923 }
1924
dc05df57 1925 windows_init_thread_list ();
9d3789f7 1926 ok = DebugActiveProcess (pid);
91a175b3 1927 saw_create = 0;
24e60978 1928
10325bc5 1929#ifdef __CYGWIN__
24e60978 1930 if (!ok)
baa93fa6 1931 {
581e13c1 1932 /* Try fall back to Cygwin pid. */
baa93fa6
CF
1933 pid = cygwin_internal (CW_CYGWIN_PID_TO_WINPID, pid);
1934
1935 if (pid > 0)
1936 ok = DebugActiveProcess (pid);
10325bc5
PA
1937 }
1938#endif
baa93fa6 1939
10325bc5
PA
1940 if (!ok)
1941 error (_("Can't attach to process."));
24e60978 1942
2b008701 1943 DebugSetProcessKillOnExit (FALSE);
3ade5333 1944
24e60978
SC
1945 if (from_tty)
1946 {
1947 char *exec_file = (char *) get_exec_file (0);
1948
1949 if (exec_file)
1950 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
39f77062 1951 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1952 else
1953 printf_unfiltered ("Attaching to %s\n",
39f77062 1954 target_pid_to_str (pid_to_ptid (pid)));
24e60978
SC
1955
1956 gdb_flush (gdb_stdout);
1957 }
1958
dc05df57 1959 do_initial_windows_stuff (ops, pid, 1);
9d3789f7 1960 target_terminal_ours ();
24e60978
SC
1961}
1962
24e60978 1963static void
52554a0e 1964windows_detach (struct target_ops *ops, const char *args, int from_tty)
24e60978 1965{
02cc9f49
CV
1966 int detached = 1;
1967
2b008701 1968 ptid_t ptid = {-1};
a493e3e2 1969 windows_resume (ops, ptid, 0, GDB_SIGNAL_0);
96998ce7 1970
2b008701
CF
1971 if (!DebugActiveProcessStop (current_event.dwProcessId))
1972 {
d50a0ce2
CV
1973 error (_("Can't detach process %u (error %u)"),
1974 (unsigned) current_event.dwProcessId, (unsigned) GetLastError ());
2b008701 1975 detached = 0;
02cc9f49 1976 }
2b008701
CF
1977 DebugSetProcessKillOnExit (FALSE);
1978
02cc9f49 1979 if (detached && from_tty)
24e60978
SC
1980 {
1981 char *exec_file = get_exec_file (0);
1982 if (exec_file == 0)
1983 exec_file = "";
d50a0ce2
CV
1984 printf_unfiltered ("Detaching from program: %s, Pid %u\n", exec_file,
1985 (unsigned) current_event.dwProcessId);
24e60978
SC
1986 gdb_flush (gdb_stdout);
1987 }
7f9f62ba 1988
26cb8b7c 1989 i386_cleanup_dregs ();
39f77062 1990 inferior_ptid = null_ptid;
7f9f62ba
PA
1991 detach_inferior (current_event.dwProcessId);
1992
0795be10 1993 unpush_target (ops);
24e60978
SC
1994}
1995
3ee6f623 1996static char *
dc05df57 1997windows_pid_to_exec_file (int pid)
47216e51 1998{
b3c613f2 1999 static char path[__PMAX];
10325bc5 2000#ifdef __CYGWIN__
581e13c1 2001 /* Try to find exe name as symlink target of /proc/<pid>/exe. */
33605d39
CF
2002 int nchars;
2003 char procexe[sizeof ("/proc/4294967295/exe")];
08850b56
PM
2004
2005 xsnprintf (procexe, sizeof (procexe), "/proc/%u/exe", pid);
33605d39
CF
2006 nchars = readlink (procexe, path, sizeof(path));
2007 if (nchars > 0 && nchars < sizeof (path))
47216e51 2008 {
33605d39
CF
2009 path[nchars] = '\0'; /* Got it */
2010 return path;
47216e51 2011 }
10325bc5
PA
2012#endif
2013
33605d39 2014 /* If we get here then either Cygwin is hosed, this isn't a Cygwin version
581e13c1 2015 of gdb, or we're trying to debug a non-Cygwin windows executable. */
33605d39
CF
2016 if (!get_module_name (0, path))
2017 path[0] = '\0';
2018
2019 return path;
47216e51
CV
2020}
2021
24e60978
SC
2022/* Print status information about what we're accessing. */
2023
2024static void
dc05df57 2025windows_files_info (struct target_ops *ignore)
24e60978 2026{
181e7f93
PA
2027 struct inferior *inf = current_inferior ();
2028
24e60978 2029 printf_unfiltered ("\tUsing the running image of %s %s.\n",
181e7f93
PA
2030 inf->attach_flag ? "attached" : "child",
2031 target_pid_to_str (inferior_ptid));
24e60978
SC
2032}
2033
24e60978 2034static void
dc05df57 2035windows_open (char *arg, int from_tty)
24e60978 2036{
8a3fe4f8 2037 error (_("Use the \"run\" command to start a Unix child process."));
24e60978
SC
2038}
2039
cd44747c
PM
2040/* Modify CreateProcess parameters for use of a new separate console.
2041 Parameters are:
2042 *FLAGS: DWORD parameter for general process creation flags.
2043 *SI: STARTUPINFO structure, for which the console window size and
2044 console buffer size is filled in if GDB is running in a console.
2045 to create the new console.
2046 The size of the used font is not available on all versions of
2047 Windows OS. Furthermore, the current font might not be the default
2048 font, but this is still better than before.
2049 If the windows and buffer sizes are computed,
2050 SI->DWFLAGS is changed so that this information is used
2051 by CreateProcess function. */
2052
2053static void
2054windows_set_console_info (STARTUPINFO *si, DWORD *flags)
2055{
2056 HANDLE hconsole = CreateFile ("CONOUT$", GENERIC_READ | GENERIC_WRITE,
2057 FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, 0);
2058
2059 if (hconsole != INVALID_HANDLE_VALUE)
2060 {
2061 CONSOLE_SCREEN_BUFFER_INFO sbinfo;
2062 COORD font_size;
2063 CONSOLE_FONT_INFO cfi;
2064
2065 GetCurrentConsoleFont (hconsole, FALSE, &cfi);
2066 font_size = GetConsoleFontSize (hconsole, cfi.nFont);
2067 GetConsoleScreenBufferInfo(hconsole, &sbinfo);
2068 si->dwXSize = sbinfo.srWindow.Right - sbinfo.srWindow.Left + 1;
2069 si->dwYSize = sbinfo.srWindow.Bottom - sbinfo.srWindow.Top + 1;
2070 if (font_size.X)
2071 si->dwXSize *= font_size.X;
2072 else
2073 si->dwXSize *= 8;
2074 if (font_size.Y)
2075 si->dwYSize *= font_size.Y;
2076 else
2077 si->dwYSize *= 12;
2078 si->dwXCountChars = sbinfo.dwSize.X;
2079 si->dwYCountChars = sbinfo.dwSize.Y;
2080 si->dwFlags |= STARTF_USESIZE | STARTF_USECOUNTCHARS;
2081 }
2082 *flags |= CREATE_NEW_CONSOLE;
2083}
2084
c93dbcba
EZ
2085#ifndef __CYGWIN__
2086/* Function called by qsort to sort environment strings. */
2087
2088static int
2089envvar_cmp (const void *a, const void *b)
2090{
2091 const char **p = (const char **) a;
2092 const char **q = (const char **) b;
2093 return strcasecmp (*p, *q);
2094}
2095#endif
2096
b7ff339d
CV
2097#ifdef __CYGWIN__
2098static void
2099clear_win32_environment (char **env)
2100{
2101 int i;
2102 size_t len;
2103 wchar_t *copy = NULL, *equalpos;
2104
2105 for (i = 0; env[i] && *env[i]; i++)
2106 {
2107 len = mbstowcs (NULL, env[i], 0) + 1;
2108 copy = (wchar_t *) xrealloc (copy, len * sizeof (wchar_t));
2109 mbstowcs (copy, env[i], len);
2110 equalpos = wcschr (copy, L'=');
2111 if (equalpos)
2112 *equalpos = L'\0';
2113 SetEnvironmentVariableW (copy, NULL);
2114 }
2115 xfree (copy);
2116}
2117#endif
2118
dc05df57 2119/* Start an inferior windows child process and sets inferior_ptid to its pid.
24e60978
SC
2120 EXEC_FILE is the file to run.
2121 ALLARGS is a string containing the arguments to the program.
2122 ENV is the environment vector to pass. Errors reported with error(). */
2123
24e60978 2124static void
dc05df57 2125windows_create_inferior (struct target_ops *ops, char *exec_file,
136d6dae 2126 char *allargs, char **in_env, int from_tty)
24e60978 2127{
b3c613f2 2128 STARTUPINFO si;
41b4aadc 2129#ifdef __CYGWIN__
b3c613f2
CF
2130 cygwin_buf_t real_path[__PMAX];
2131 cygwin_buf_t shell[__PMAX]; /* Path to shell */
d0d0ab16 2132 const char *sh;
b3c613f2
CF
2133 cygwin_buf_t *toexec;
2134 cygwin_buf_t *cygallargs;
2135 cygwin_buf_t *args;
b7ff339d
CV
2136 char **old_env = NULL;
2137 PWCHAR w32_env;
d0d0ab16 2138 size_t len;
2becadee
CF
2139 int tty;
2140 int ostdin, ostdout, ostderr;
41b4aadc 2141#else
b3c613f2
CF
2142 char real_path[__PMAX];
2143 char shell[__PMAX]; /* Path to shell */
d0d0ab16
CV
2144 char *toexec;
2145 char *args;
8f205f9c 2146 size_t args_len;
41b4aadc 2147 HANDLE tty;
c93dbcba
EZ
2148 char *w32env;
2149 char *temp;
2150 size_t envlen;
2151 int i;
2152 size_t envsize;
2153 char **env;
41b4aadc 2154#endif
d0d0ab16
CV
2155 PROCESS_INFORMATION pi;
2156 BOOL ret;
2157 DWORD flags = 0;
3cb3b8df 2158 const char *inferior_io_terminal = get_inferior_io_terminal ();
24e60978
SC
2159
2160 if (!exec_file)
8a3fe4f8 2161 error (_("No executable specified, use `target exec'."));
24e60978
SC
2162
2163 memset (&si, 0, sizeof (si));
2164 si.cb = sizeof (si);
2165
d0d0ab16
CV
2166 if (new_group)
2167 flags |= CREATE_NEW_PROCESS_GROUP;
2168
2169 if (new_console)
cd44747c 2170 windows_set_console_info (&si, &flags);
d0d0ab16 2171
10325bc5 2172#ifdef __CYGWIN__
349b409f 2173 if (!useshell)
dfe7f3ac 2174 {
d0d0ab16
CV
2175 flags |= DEBUG_ONLY_THIS_PROCESS;
2176 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, exec_file, real_path,
b3c613f2 2177 __PMAX * sizeof (cygwin_buf_t)) < 0)
d0d0ab16 2178 error (_("Error starting executable: %d"), errno);
dfe7f3ac 2179 toexec = real_path;
b3c613f2 2180#ifdef __USEWIDE
d0d0ab16
CV
2181 len = mbstowcs (NULL, allargs, 0) + 1;
2182 if (len == (size_t) -1)
2183 error (_("Error starting executable: %d"), errno);
2184 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2185 mbstowcs (cygallargs, allargs, len);
60c5c021
CF
2186#else
2187 cygallargs = allargs;
b3c613f2 2188#endif
dfe7f3ac
CF
2189 }
2190 else
2191 {
349b409f
CF
2192 sh = getenv ("SHELL");
2193 if (!sh)
2194 sh = "/bin/sh";
b3c613f2 2195 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, sh, shell, __PMAX) < 0)
d0d0ab16 2196 error (_("Error starting executable via shell: %d"), errno);
b3c613f2 2197#ifdef __USEWIDE
d0d0ab16
CV
2198 len = sizeof (L" -c 'exec '") + mbstowcs (NULL, exec_file, 0)
2199 + mbstowcs (NULL, allargs, 0) + 2;
2200 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2201 swprintf (cygallargs, len, L" -c 'exec %s %s'", exec_file, allargs);
b3c613f2 2202#else
08850b56
PM
2203 len = (sizeof (" -c 'exec '") + strlen (exec_file)
2204 + strlen (allargs) + 2);
2205 cygallargs = (char *) alloca (len);
2206 xsnprintf (cygallargs, len, " -c 'exec %s %s'", exec_file, allargs);
b3c613f2 2207#endif
dfe7f3ac 2208 toexec = shell;
d0d0ab16 2209 flags |= DEBUG_PROCESS;
dfe7f3ac 2210 }
b3c613f2
CF
2211
2212#ifdef __USEWIDE
2213 args = (cygwin_buf_t *) alloca ((wcslen (toexec) + wcslen (cygallargs) + 2)
2214 * sizeof (wchar_t));
d0d0ab16
CV
2215 wcscpy (args, toexec);
2216 wcscat (args, L" ");
2217 wcscat (args, cygallargs);
b3c613f2
CF
2218#else
2219 args = (cygwin_buf_t *) alloca (strlen (toexec) + strlen (cygallargs) + 2);
2220 strcpy (args, toexec);
2221 strcat (args, " ");
2222 strcat (args, cygallargs);
2223#endif
2224
b7ff339d
CV
2225#ifdef CW_CVT_ENV_TO_WINENV
2226 /* First try to create a direct Win32 copy of the POSIX environment. */
2227 w32_env = (PWCHAR) cygwin_internal (CW_CVT_ENV_TO_WINENV, in_env);
2228 if (w32_env != (PWCHAR) -1)
2229 flags |= CREATE_UNICODE_ENVIRONMENT;
2230 else
2231 /* If that fails, fall back to old method tweaking GDB's environment. */
2232#endif
2233 {
2234 /* Reset all Win32 environment variables to avoid leftover on next run. */
2235 clear_win32_environment (environ);
2236 /* Prepare the environment vars for CreateProcess. */
2237 old_env = environ;
2238 environ = in_env;
2239 cygwin_internal (CW_SYNC_WINENV);
2240 w32_env = NULL;
2241 }
1750a5ef 2242
2becadee
CF
2243 if (!inferior_io_terminal)
2244 tty = ostdin = ostdout = ostderr = -1;
2245 else
2246 {
2247 tty = open (inferior_io_terminal, O_RDWR | O_NOCTTY);
2248 if (tty < 0)
2249 {
2250 print_sys_errmsg (inferior_io_terminal, errno);
2251 ostdin = ostdout = ostderr = -1;
2252 }
2253 else
2254 {
2255 ostdin = dup (0);
2256 ostdout = dup (1);
2257 ostderr = dup (2);
2258 dup2 (tty, 0);
2259 dup2 (tty, 1);
2260 dup2 (tty, 2);
2261 }
2262 }
d0d0ab16
CV
2263
2264 windows_init_thread_list ();
b3c613f2
CF
2265 ret = CreateProcess (0,
2266 args, /* command line */
2267 NULL, /* Security */
2268 NULL, /* thread */
2269 TRUE, /* inherit handles */
2270 flags, /* start flags */
b7ff339d 2271 w32_env, /* environment */
b3c613f2
CF
2272 NULL, /* current directory */
2273 &si,
2274 &pi);
b7ff339d
CV
2275 if (w32_env)
2276 /* Just free the Win32 environment, if it could be created. */
2277 free (w32_env);
2278 else
2279 {
2280 /* Reset all environment variables to avoid leftover on next run. */
2281 clear_win32_environment (in_env);
2282 /* Restore normal GDB environment variables. */
2283 environ = old_env;
2284 cygwin_internal (CW_SYNC_WINENV);
2285 }
2286
d0d0ab16
CV
2287 if (tty >= 0)
2288 {
2289 close (tty);
2290 dup2 (ostdin, 0);
2291 dup2 (ostdout, 1);
2292 dup2 (ostderr, 2);
2293 close (ostdin);
2294 close (ostdout);
2295 close (ostderr);
2296 }
41b4aadc 2297#else
b3c613f2 2298 toexec = exec_file;
8f205f9c
JB
2299 /* Build the command line, a space-separated list of tokens where
2300 the first token is the name of the module to be executed.
2301 To avoid ambiguities introduced by spaces in the module name,
2302 we quote it. */
2303 args_len = strlen (toexec) + 2 /* quotes */ + strlen (allargs) + 2;
2304 args = alloca (args_len);
2305 xsnprintf (args, args_len, "\"%s\" %s", toexec, allargs);
d0d0ab16 2306
d0d0ab16
CV
2307 flags |= DEBUG_ONLY_THIS_PROCESS;
2308
41b4aadc
CF
2309 if (!inferior_io_terminal)
2310 tty = INVALID_HANDLE_VALUE;
2311 else
2312 {
2313 SECURITY_ATTRIBUTES sa;
2314 sa.nLength = sizeof(sa);
2315 sa.lpSecurityDescriptor = 0;
2316 sa.bInheritHandle = TRUE;
2317 tty = CreateFileA (inferior_io_terminal, GENERIC_READ | GENERIC_WRITE,
2318 0, &sa, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
2319 if (tty == INVALID_HANDLE_VALUE)
2320 warning (_("Warning: Failed to open TTY %s, error %#x."),
2321 inferior_io_terminal, (unsigned) GetLastError ());
2322 else
2323 {
2324 si.hStdInput = tty;
2325 si.hStdOutput = tty;
2326 si.hStdError = tty;
2327 si.dwFlags |= STARTF_USESTDHANDLES;
2328 }
2329 }
2becadee 2330
c93dbcba
EZ
2331 /* CreateProcess takes the environment list as a null terminated set of
2332 strings (i.e. two nulls terminate the list). */
2333
2334 /* Get total size for env strings. */
2335 for (envlen = 0, i = 0; in_env[i] && *in_env[i]; i++)
2336 envlen += strlen (in_env[i]) + 1;
2337
2338 envsize = sizeof (in_env[0]) * (i + 1);
2339 env = (char **) alloca (envsize);
2340 memcpy (env, in_env, envsize);
2341 /* Windows programs expect the environment block to be sorted. */
2342 qsort (env, i, sizeof (char *), envvar_cmp);
2343
2344 w32env = alloca (envlen + 1);
2345
2346 /* Copy env strings into new buffer. */
2347 for (temp = w32env, i = 0; env[i] && *env[i]; i++)
2348 {
2349 strcpy (temp, env[i]);
2350 temp += strlen (temp) + 1;
2351 }
2352
2353 /* Final nil string to terminate new env. */
2354 *temp = 0;
2355
dc05df57 2356 windows_init_thread_list ();
d0d0ab16
CV
2357 ret = CreateProcessA (0,
2358 args, /* command line */
2359 NULL, /* Security */
2360 NULL, /* thread */
2361 TRUE, /* inherit handles */
2362 flags, /* start flags */
c93dbcba 2363 w32env, /* environment */
d0d0ab16
CV
2364 NULL, /* current directory */
2365 &si,
2366 &pi);
41b4aadc
CF
2367 if (tty != INVALID_HANDLE_VALUE)
2368 CloseHandle (tty);
10325bc5 2369#endif
2becadee 2370
24e60978 2371 if (!ret)
d50a0ce2 2372 error (_("Error creating process %s, (error %u)."),
8a3fe4f8 2373 exec_file, (unsigned) GetLastError ());
24e60978 2374
c1766e7d
PM
2375 CloseHandle (pi.hThread);
2376 CloseHandle (pi.hProcess);
2377
dfe7f3ac
CF
2378 if (useshell && shell[0] != '\0')
2379 saw_create = -1;
2380 else
2381 saw_create = 0;
2382
dc05df57 2383 do_initial_windows_stuff (ops, pi.dwProcessId, 0);
d3a09475 2384
dc05df57 2385 /* windows_continue (DBG_CONTINUE, -1); */
24e60978
SC
2386}
2387
2388static void
dc05df57 2389windows_mourn_inferior (struct target_ops *ops)
24e60978 2390{
dc05df57 2391 (void) windows_continue (DBG_CONTINUE, -1);
fa4ba8da 2392 i386_cleanup_dregs();
bf25528d
CF
2393 if (open_process_used)
2394 {
2395 CHECK (CloseHandle (current_process_handle));
2396 open_process_used = 0;
2397 }
0795be10 2398 unpush_target (ops);
24e60978
SC
2399 generic_mourn_inferior ();
2400}
2401
24e60978 2402/* Send a SIGINT to the process group. This acts just like the user typed a
581e13c1 2403 ^C on the controlling terminal. */
24e60978 2404
b607efe7 2405static void
dc05df57 2406windows_stop (ptid_t ptid)
24e60978 2407{
1ef980b9 2408 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
1e37c281 2409 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
3a4b77d8 2410 registers_changed (); /* refresh register state */
24e60978
SC
2411}
2412
44f38867
PA
2413/* Helper for windows_xfer_partial that handles memory transfers.
2414 Arguments are like target_xfer_partial. */
2415
9b409511 2416static enum target_xfer_status
44f38867 2417windows_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
9b409511 2418 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
24e60978 2419{
5732a500 2420 SIZE_T done = 0;
44f38867 2421 BOOL success;
9e52adf9 2422 DWORD lasterror = 0;
44f38867
PA
2423
2424 if (writebuf != NULL)
24e60978 2425 {
a2388568 2426 DEBUG_MEM (("gdb: write target memory, %s bytes at %s\n",
b55e14c7 2427 pulongest (len), core_addr_to_string (memaddr)));
44f38867
PA
2428 success = WriteProcessMemory (current_process_handle,
2429 (LPVOID) (uintptr_t) memaddr, writebuf,
2430 len, &done);
9e52adf9 2431 if (!success)
7126d5c8 2432 lasterror = GetLastError ();
2b008701 2433 FlushInstructionCache (current_process_handle,
2c647436 2434 (LPCVOID) (uintptr_t) memaddr, len);
24e60978
SC
2435 }
2436 else
2437 {
a2388568 2438 DEBUG_MEM (("gdb: read target memory, %s bytes at %s\n",
b55e14c7 2439 pulongest (len), core_addr_to_string (memaddr)));
44f38867
PA
2440 success = ReadProcessMemory (current_process_handle,
2441 (LPCVOID) (uintptr_t) memaddr, readbuf,
2442 len, &done);
9e52adf9 2443 if (!success)
7126d5c8 2444 lasterror = GetLastError ();
24e60978 2445 }
9b409511 2446 *xfered_len = (ULONGEST) done;
9e52adf9 2447 if (!success && lasterror == ERROR_PARTIAL_COPY && done > 0)
9b409511 2448 return TARGET_XFER_OK;
9e52adf9 2449 else
9b409511 2450 return success ? TARGET_XFER_OK : TARGET_XFER_E_IO;
24e60978
SC
2451}
2452
3ee6f623 2453static void
7d85a9c0 2454windows_kill_inferior (struct target_ops *ops)
24e60978 2455{
3cee93ac
CF
2456 CHECK (TerminateProcess (current_process_handle, 0));
2457
b5edcb45
ILT
2458 for (;;)
2459 {
dc05df57 2460 if (!windows_continue (DBG_CONTINUE, -1))
b5edcb45 2461 break;
3cee93ac 2462 if (!WaitForDebugEvent (&current_event, INFINITE))
b5edcb45 2463 break;
3cee93ac 2464 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
b5edcb45
ILT
2465 break;
2466 }
2467
581e13c1 2468 target_mourn_inferior (); /* Or just windows_mourn_inferior? */
24e60978
SC
2469}
2470
24e60978 2471static void
f32dbf8c 2472windows_prepare_to_store (struct target_ops *self, struct regcache *regcache)
24e60978 2473{
581e13c1 2474 /* Do nothing, since we can store individual regs. */
24e60978
SC
2475}
2476
2477static int
dc05df57 2478windows_can_run (void)
24e60978
SC
2479{
2480 return 1;
2481}
2482
2483static void
de90e03d 2484windows_close (struct target_ops *self)
24e60978 2485{
dc05df57 2486 DEBUG_EVENTS (("gdb: windows_close, inferior_ptid=%d\n",
dfd4cc63 2487 ptid_get_pid (inferior_ptid)));
24e60978 2488}
1ef980b9 2489
581e13c1 2490/* Convert pid to printable format. */
3ee6f623 2491static char *
117de6a9 2492windows_pid_to_str (struct target_ops *ops, ptid_t ptid)
24e60978 2493{
3ee6f623 2494 static char buf[80];
3ee6f623 2495
2dc38344
PA
2496 if (ptid_get_tid (ptid) != 0)
2497 {
2498 snprintf (buf, sizeof (buf), "Thread %d.0x%lx",
2499 ptid_get_pid (ptid), ptid_get_tid (ptid));
2500 return buf;
2501 }
2502
2503 return normal_pid_to_str (ptid);
3ee6f623
CF
2504}
2505
9b409511 2506static enum target_xfer_status
dc05df57 2507windows_xfer_shared_libraries (struct target_ops *ops,
9b409511
YQ
2508 enum target_object object, const char *annex,
2509 gdb_byte *readbuf, const gdb_byte *writebuf,
2510 ULONGEST offset, ULONGEST len,
2511 ULONGEST *xfered_len)
3cb8e7f6 2512{
de1b3c3d
PA
2513 struct obstack obstack;
2514 const char *buf;
2515 LONGEST len_avail;
3cb8e7f6 2516 struct so_list *so;
3cb8e7f6 2517
de1b3c3d 2518 if (writebuf)
2ed4b548 2519 return TARGET_XFER_E_IO;
3cb8e7f6 2520
de1b3c3d
PA
2521 obstack_init (&obstack);
2522 obstack_grow_str (&obstack, "<library-list>\n");
2523 for (so = solib_start.next; so; so = so->next)
581e13c1
MS
2524 windows_xfer_shared_library (so->so_name, (CORE_ADDR)
2525 (uintptr_t) so->lm_info->load_addr,
f5656ead 2526 target_gdbarch (), &obstack);
de1b3c3d 2527 obstack_grow_str0 (&obstack, "</library-list>\n");
3cb8e7f6 2528
de1b3c3d
PA
2529 buf = obstack_finish (&obstack);
2530 len_avail = strlen (buf);
2531 if (offset >= len_avail)
49dc7f4b
PM
2532 len= 0;
2533 else
2534 {
2535 if (len > len_avail - offset)
2536 len = len_avail - offset;
2537 memcpy (readbuf, buf + offset, len);
2538 }
3cb8e7f6 2539
de1b3c3d 2540 obstack_free (&obstack, NULL);
9b409511
YQ
2541 *xfered_len = (ULONGEST) len;
2542 return TARGET_XFER_OK;
3cb8e7f6
CF
2543}
2544
9b409511 2545static enum target_xfer_status
dc05df57 2546windows_xfer_partial (struct target_ops *ops, enum target_object object,
9b409511
YQ
2547 const char *annex, gdb_byte *readbuf,
2548 const gdb_byte *writebuf, ULONGEST offset, ULONGEST len,
2549 ULONGEST *xfered_len)
3cb8e7f6 2550{
de1b3c3d 2551 switch (object)
3cb8e7f6 2552 {
de1b3c3d 2553 case TARGET_OBJECT_MEMORY:
9b409511 2554 return windows_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
de1b3c3d
PA
2555
2556 case TARGET_OBJECT_LIBRARIES:
dc05df57 2557 return windows_xfer_shared_libraries (ops, object, annex, readbuf,
9b409511 2558 writebuf, offset, len, xfered_len);
3929abe9 2559
de1b3c3d
PA
2560 default:
2561 if (ops->beneath != NULL)
2562 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
9b409511
YQ
2563 readbuf, writebuf, offset, len,
2564 xfered_len);
2ed4b548 2565 return TARGET_XFER_E_IO;
3929abe9 2566 }
02c5aecd
CF
2567}
2568
711e434b
PM
2569/* Provide thread local base, i.e. Thread Information Block address.
2570 Returns 1 if ptid is found and sets *ADDR to thread_local_base. */
2571
2572static int
2573windows_get_tib_address (ptid_t ptid, CORE_ADDR *addr)
2574{
2575 thread_info *th;
2576
2577 th = thread_rec (ptid_get_tid (ptid), 0);
2578 if (th == NULL)
2579 return 0;
2580
2581 if (addr != NULL)
2582 *addr = th->thread_local_base;
2583
2584 return 1;
2585}
2586
1e2f1c5c
JB
2587static ptid_t
2588windows_get_ada_task_ptid (long lwp, long thread)
2589{
2590 return ptid_build (ptid_get_pid (inferior_ptid), 0, lwp);
2591}
2592
3ee6f623 2593static void
dc05df57 2594init_windows_ops (void)
3ee6f623 2595{
dc05df57
CF
2596 windows_ops.to_shortname = "child";
2597 windows_ops.to_longname = "Win32 child process";
2598 windows_ops.to_doc = "Win32 child process (started by the \"run\" command).";
2599 windows_ops.to_open = windows_open;
2600 windows_ops.to_close = windows_close;
2601 windows_ops.to_attach = windows_attach;
2602 windows_ops.to_attach_no_wait = 1;
2603 windows_ops.to_detach = windows_detach;
2604 windows_ops.to_resume = windows_resume;
2605 windows_ops.to_wait = windows_wait;
2606 windows_ops.to_fetch_registers = windows_fetch_inferior_registers;
2607 windows_ops.to_store_registers = windows_store_inferior_registers;
2608 windows_ops.to_prepare_to_store = windows_prepare_to_store;
dc05df57
CF
2609 windows_ops.to_xfer_partial = windows_xfer_partial;
2610 windows_ops.to_files_info = windows_files_info;
2611 windows_ops.to_insert_breakpoint = memory_insert_breakpoint;
2612 windows_ops.to_remove_breakpoint = memory_remove_breakpoint;
2613 windows_ops.to_terminal_init = terminal_init_inferior;
2614 windows_ops.to_terminal_inferior = terminal_inferior;
2615 windows_ops.to_terminal_ours_for_output = terminal_ours_for_output;
2616 windows_ops.to_terminal_ours = terminal_ours;
2617 windows_ops.to_terminal_save_ours = terminal_save_ours;
2618 windows_ops.to_terminal_info = child_terminal_info;
2619 windows_ops.to_kill = windows_kill_inferior;
2620 windows_ops.to_create_inferior = windows_create_inferior;
2621 windows_ops.to_mourn_inferior = windows_mourn_inferior;
2622 windows_ops.to_can_run = windows_can_run;
2623 windows_ops.to_thread_alive = windows_thread_alive;
2624 windows_ops.to_pid_to_str = windows_pid_to_str;
2625 windows_ops.to_stop = windows_stop;
2626 windows_ops.to_stratum = process_stratum;
c35b1492
PA
2627 windows_ops.to_has_all_memory = default_child_has_all_memory;
2628 windows_ops.to_has_memory = default_child_has_memory;
2629 windows_ops.to_has_stack = default_child_has_stack;
2630 windows_ops.to_has_registers = default_child_has_registers;
2631 windows_ops.to_has_execution = default_child_has_execution;
dc05df57 2632 windows_ops.to_pid_to_exec_file = windows_pid_to_exec_file;
1e2f1c5c 2633 windows_ops.to_get_ada_task_ptid = windows_get_ada_task_ptid;
711e434b 2634 windows_ops.to_get_tib_address = windows_get_tib_address;
9bb9e8ad 2635
5aca5a82
PM
2636 i386_use_watchpoints (&windows_ops);
2637
9bb9e8ad
PM
2638 i386_dr_low.set_control = cygwin_set_dr7;
2639 i386_dr_low.set_addr = cygwin_set_dr;
7b50312a 2640 i386_dr_low.get_addr = cygwin_get_dr;
9bb9e8ad 2641 i386_dr_low.get_status = cygwin_get_dr6;
7b50312a 2642 i386_dr_low.get_control = cygwin_get_dr7;
9bb9e8ad
PM
2643
2644 /* i386_dr_low.debug_register_length field is set by
2645 calling i386_set_debug_register_length function
2646 in processor windows specific native file. */
2647
dc05df57 2648 windows_ops.to_magic = OPS_MAGIC;
c719b714 2649}
24e60978 2650
3929abe9 2651static void
dc05df57 2652set_windows_aliases (char *argv0)
3929abe9
CF
2653{
2654 add_info_alias ("dll", "sharedlibrary", 1);
2655}
2656
d603d4b3
JK
2657/* -Wmissing-prototypes */
2658extern initialize_file_ftype _initialize_windows_nat;
2659
24e60978 2660void
dc05df57 2661_initialize_windows_nat (void)
24e60978 2662{
fa58ee11
EZ
2663 struct cmd_list_element *c;
2664
dc05df57 2665 init_windows_ops ();
1ef980b9 2666
d0d0ab16
CV
2667#ifdef __CYGWIN__
2668 cygwin_internal (CW_SET_DOS_FILE_WARNING, 0);
2669#endif
2670
fa58ee11 2671 c = add_com ("dll-symbols", class_files, dll_symbol_command,
1bedd215 2672 _("Load dll library symbols from FILE."));
5ba2abeb 2673 set_cmd_completer (c, filename_completer);
450005e7
CF
2674
2675 add_com_alias ("sharedlibrary", "dll-symbols", class_alias, 1);
2676
70992597
PM
2677 add_com_alias ("add-shared-symbol-files", "dll-symbols", class_alias, 1);
2678
2679 add_com_alias ("assf", "dll-symbols", class_alias, 1);
2680
10325bc5 2681#ifdef __CYGWIN__
5bf193a2
AC
2682 add_setshow_boolean_cmd ("shell", class_support, &useshell, _("\
2683Set use of shell to start subprocess."), _("\
2684Show use of shell to start subprocess."), NULL,
2685 NULL,
2686 NULL, /* FIXME: i18n: */
2687 &setlist, &showlist);
2688
581e13c1
MS
2689 add_setshow_boolean_cmd ("cygwin-exceptions", class_support,
2690 &cygwin_exceptions, _("\
09280ddf
CF
2691Break when an exception is detected in the Cygwin DLL itself."), _("\
2692Show whether gdb breaks on exceptions in the Cygwin DLL itself."), NULL,
2693 NULL,
2694 NULL, /* FIXME: i18n: */
2695 &setlist, &showlist);
10325bc5 2696#endif
09280ddf 2697
5bf193a2
AC
2698 add_setshow_boolean_cmd ("new-console", class_support, &new_console, _("\
2699Set creation of new console when creating child process."), _("\
2700Show creation of new console when creating child process."), NULL,
2701 NULL,
2702 NULL, /* FIXME: i18n: */
2703 &setlist, &showlist);
2704
2705 add_setshow_boolean_cmd ("new-group", class_support, &new_group, _("\
2706Set creation of new group when creating child process."), _("\
2707Show creation of new group when creating child process."), NULL,
2708 NULL,
2709 NULL, /* FIXME: i18n: */
2710 &setlist, &showlist);
2711
2712 add_setshow_boolean_cmd ("debugexec", class_support, &debug_exec, _("\
2713Set whether to display execution in child process."), _("\
2714Show whether to display execution in child process."), NULL,
2715 NULL,
2716 NULL, /* FIXME: i18n: */
2717 &setlist, &showlist);
2718
2719 add_setshow_boolean_cmd ("debugevents", class_support, &debug_events, _("\
2720Set whether to display kernel events in child process."), _("\
2721Show whether to display kernel events in child process."), NULL,
2722 NULL,
2723 NULL, /* FIXME: i18n: */
2724 &setlist, &showlist);
2725
2726 add_setshow_boolean_cmd ("debugmemory", class_support, &debug_memory, _("\
2727Set whether to display memory accesses in child process."), _("\
2728Show whether to display memory accesses in child process."), NULL,
2729 NULL,
2730 NULL, /* FIXME: i18n: */
2731 &setlist, &showlist);
2732
2733 add_setshow_boolean_cmd ("debugexceptions", class_support,
2734 &debug_exceptions, _("\
2735Set whether to display kernel exceptions in child process."), _("\
2736Show whether to display kernel exceptions in child process."), NULL,
2737 NULL,
2738 NULL, /* FIXME: i18n: */
2739 &setlist, &showlist);
1ef980b9 2740
711e434b 2741 init_w32_command_list ();
c1748f97
PM
2742
2743 add_cmd ("selector", class_info, display_selectors,
1a966eab 2744 _("Display selectors infos."),
c1748f97 2745 &info_w32_cmdlist);
dc05df57
CF
2746 add_target (&windows_ops);
2747 deprecated_init_ui_hook = set_windows_aliases;
24e60978 2748}
3cee93ac 2749
fa4ba8da
PM
2750/* Hardware watchpoint support, adapted from go32-nat.c code. */
2751
2752/* Pass the address ADDR to the inferior in the I'th debug register.
2753 Here we just store the address in dr array, the registers will be
dc05df57 2754 actually set up when windows_continue is called. */
9bb9e8ad 2755static void
fa4ba8da
PM
2756cygwin_set_dr (int i, CORE_ADDR addr)
2757{
2758 if (i < 0 || i > 3)
2759 internal_error (__FILE__, __LINE__,
e2e0b3e5 2760 _("Invalid register %d in cygwin_set_dr.\n"), i);
41b4aadc 2761 dr[i] = addr;
fa4ba8da
PM
2762 debug_registers_changed = 1;
2763 debug_registers_used = 1;
2764}
2765
2766/* Pass the value VAL to the inferior in the DR7 debug control
2767 register. Here we just store the address in D_REGS, the watchpoint
dc05df57 2768 will be actually set up in windows_wait. */
9bb9e8ad
PM
2769static void
2770cygwin_set_dr7 (unsigned long val)
fa4ba8da 2771{
9bb9e8ad 2772 dr[7] = (CORE_ADDR) val;
fa4ba8da
PM
2773 debug_registers_changed = 1;
2774 debug_registers_used = 1;
2775}
2776
7b50312a
PA
2777/* Get the value of debug register I from the inferior. */
2778
2779static CORE_ADDR
2780cygwin_get_dr (int i)
2781{
2782 return dr[i];
2783}
2784
fa4ba8da
PM
2785/* Get the value of the DR6 debug status register from the inferior.
2786 Here we just return the value stored in dr[6]
2787 by the last call to thread_rec for current_event.dwThreadId id. */
9bb9e8ad 2788static unsigned long
fa4ba8da
PM
2789cygwin_get_dr6 (void)
2790{
9bb9e8ad 2791 return (unsigned long) dr[6];
fa4ba8da
PM
2792}
2793
7b50312a
PA
2794/* Get the value of the DR7 debug status register from the inferior.
2795 Here we just return the value stored in dr[7] by the last call to
2796 thread_rec for current_event.dwThreadId id. */
2797
2798static unsigned long
2799cygwin_get_dr7 (void)
2800{
2801 return (unsigned long) dr[7];
2802}
2803
2dc38344 2804/* Determine if the thread referenced by "ptid" is alive
3cee93ac 2805 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
581e13c1 2806 it means that the thread has died. Otherwise it is assumed to be alive. */
3cee93ac 2807static int
28439f5e 2808windows_thread_alive (struct target_ops *ops, ptid_t ptid)
3cee93ac 2809{
2dc38344
PA
2810 int tid;
2811
2812 gdb_assert (ptid_get_tid (ptid) != 0);
2813 tid = ptid_get_tid (ptid);
39f77062 2814
581e13c1
MS
2815 return WaitForSingleObject (thread_rec (tid, FALSE)->h, 0) == WAIT_OBJECT_0
2816 ? FALSE : TRUE;
3cee93ac
CF
2817}
2818
d603d4b3
JK
2819/* -Wmissing-prototypes */
2820extern initialize_file_ftype _initialize_check_for_gdb_ini;
2821
2a3d5645
CF
2822void
2823_initialize_check_for_gdb_ini (void)
2824{
2825 char *homedir;
2826 if (inhibit_gdbinit)
2827 return;
2828
2829 homedir = getenv ("HOME");
2830 if (homedir)
2831 {
2832 char *p;
2833 char *oldini = (char *) alloca (strlen (homedir) +
2834 sizeof ("/gdb.ini"));
2835 strcpy (oldini, homedir);
2836 p = strchr (oldini, '\0');
0ba1096a 2837 if (p > oldini && !IS_DIR_SEPARATOR (p[-1]))
2a3d5645
CF
2838 *p++ = '/';
2839 strcpy (p, "gdb.ini");
2840 if (access (oldini, 0) == 0)
2841 {
2842 int len = strlen (oldini);
2843 char *newini = alloca (len + 1);
08850b56
PM
2844
2845 xsnprintf (newini, len + 1, "%.*s.gdbinit",
2846 (int) (len - (sizeof ("gdb.ini") - 1)), oldini);
8a3fe4f8 2847 warning (_("obsolete '%s' found. Rename to '%s'."), oldini, newini);
2a3d5645
CF
2848 }
2849 }
2850}
33605d39 2851
2b008701 2852/* Define dummy functions which always return error for the rare cases where
581e13c1 2853 these functions could not be found. */
2b008701
CF
2854static BOOL WINAPI
2855bad_DebugActiveProcessStop (DWORD w)
2856{
2857 return FALSE;
2858}
2859static BOOL WINAPI
2860bad_DebugBreakProcess (HANDLE w)
2861{
2862 return FALSE;
2863}
2864static BOOL WINAPI
2865bad_DebugSetProcessKillOnExit (BOOL w)
2866{
2867 return FALSE;
2868}
2869static BOOL WINAPI
2870bad_EnumProcessModules (HANDLE w, HMODULE *x, DWORD y, LPDWORD z)
2871{
2872 return FALSE;
2873}
b3c613f2
CF
2874
2875#ifdef __USEWIDE
2b008701 2876static DWORD WINAPI
b3c613f2 2877bad_GetModuleFileNameExW (HANDLE w, HMODULE x, LPWSTR y, DWORD z)
2b008701
CF
2878{
2879 return 0;
2880}
d0d0ab16
CV
2881#else
2882static DWORD WINAPI
b3c613f2 2883bad_GetModuleFileNameExA (HANDLE w, HMODULE x, LPSTR y, DWORD z)
d0d0ab16
CV
2884{
2885 return 0;
2886}
2887#endif
b3c613f2 2888
2b008701
CF
2889static BOOL WINAPI
2890bad_GetModuleInformation (HANDLE w, HMODULE x, LPMODULEINFO y, DWORD z)
2891{
2892 return FALSE;
2893}
2894
418c6cb3
CF
2895static BOOL WINAPI
2896bad_OpenProcessToken (HANDLE w, DWORD x, PHANDLE y)
2897{
2898 return FALSE;
2899}
2900
cd44747c
PM
2901static BOOL WINAPI
2902bad_GetCurrentConsoleFont (HANDLE w, BOOL bMaxWindow, CONSOLE_FONT_INFO *f)
2903{
2904 f->nFont = 0;
2905 return 1;
2906}
2907static COORD WINAPI
2908bad_GetConsoleFontSize (HANDLE w, DWORD nFont)
2909{
2910 COORD size;
2911 size.X = 8;
2912 size.Y = 12;
2913 return size;
2914}
2915
d603d4b3
JK
2916/* -Wmissing-prototypes */
2917extern initialize_file_ftype _initialize_loadable;
2918
2b008701 2919/* Load any functions which may not be available in ancient versions
581e13c1 2920 of Windows. */
d603d4b3 2921
33605d39 2922void
2b008701 2923_initialize_loadable (void)
33605d39 2924{
2b008701
CF
2925 HMODULE hm = NULL;
2926
2927 hm = LoadLibrary ("kernel32.dll");
2928 if (hm)
33605d39 2929 {
b3c613f2 2930 DebugActiveProcessStop = (void *)
2b008701 2931 GetProcAddress (hm, "DebugActiveProcessStop");
b3c613f2 2932 DebugBreakProcess = (void *)
2b008701 2933 GetProcAddress (hm, "DebugBreakProcess");
b3c613f2 2934 DebugSetProcessKillOnExit = (void *)
2b008701 2935 GetProcAddress (hm, "DebugSetProcessKillOnExit");
cd44747c
PM
2936 GetConsoleFontSize = (void *)
2937 GetProcAddress (hm, "GetConsoleFontSize");
2938 GetCurrentConsoleFont = (void *)
2939 GetProcAddress (hm, "GetCurrentConsoleFont");
2b008701 2940 }
33605d39 2941
2b008701 2942 /* Set variables to dummy versions of these processes if the function
581e13c1 2943 wasn't found in kernel32.dll. */
b3c613f2
CF
2944 if (!DebugBreakProcess)
2945 DebugBreakProcess = bad_DebugBreakProcess;
2946 if (!DebugActiveProcessStop || !DebugSetProcessKillOnExit)
2b008701 2947 {
b3c613f2
CF
2948 DebugActiveProcessStop = bad_DebugActiveProcessStop;
2949 DebugSetProcessKillOnExit = bad_DebugSetProcessKillOnExit;
2b008701 2950 }
cd44747c
PM
2951 if (!GetConsoleFontSize)
2952 GetConsoleFontSize = bad_GetConsoleFontSize;
2953 if (!GetCurrentConsoleFont)
2954 GetCurrentConsoleFont = bad_GetCurrentConsoleFont;
33605d39 2955
2b008701 2956 /* Load optional functions used for retrieving filename information
581e13c1 2957 associated with the currently debugged process or its dlls. */
2b008701
CF
2958 hm = LoadLibrary ("psapi.dll");
2959 if (hm)
2960 {
b3c613f2 2961 EnumProcessModules = (void *)
2b008701 2962 GetProcAddress (hm, "EnumProcessModules");
b3c613f2 2963 GetModuleInformation = (void *)
2b008701 2964 GetProcAddress (hm, "GetModuleInformation");
b3c613f2
CF
2965 GetModuleFileNameEx = (void *)
2966 GetProcAddress (hm, GetModuleFileNameEx_name);
33605d39
CF
2967 }
2968
b3c613f2 2969 if (!EnumProcessModules || !GetModuleInformation || !GetModuleFileNameEx)
2b008701
CF
2970 {
2971 /* Set variables to dummy versions of these processes if the function
581e13c1 2972 wasn't found in psapi.dll. */
b3c613f2
CF
2973 EnumProcessModules = bad_EnumProcessModules;
2974 GetModuleInformation = bad_GetModuleInformation;
2975 GetModuleFileNameEx = bad_GetModuleFileNameEx;
581e13c1
MS
2976 /* This will probably fail on Windows 9x/Me. Let the user know
2977 that we're missing some functionality. */
2978 warning(_("\
2979cannot automatically find executable file or library to read symbols.\n\
2980Use \"file\" or \"dll\" command to load executable/libraries directly."));
418c6cb3
CF
2981 }
2982
2983 hm = LoadLibrary ("advapi32.dll");
2984 if (hm)
2985 {
b3c613f2
CF
2986 OpenProcessToken = (void *) GetProcAddress (hm, "OpenProcessToken");
2987 LookupPrivilegeValueA = (void *)
418c6cb3 2988 GetProcAddress (hm, "LookupPrivilegeValueA");
b3c613f2 2989 AdjustTokenPrivileges = (void *)
418c6cb3
CF
2990 GetProcAddress (hm, "AdjustTokenPrivileges");
2991 /* Only need to set one of these since if OpenProcessToken fails nothing
581e13c1
MS
2992 else is needed. */
2993 if (!OpenProcessToken || !LookupPrivilegeValueA
2994 || !AdjustTokenPrivileges)
b3c613f2 2995 OpenProcessToken = bad_OpenProcessToken;
2b008701 2996 }
33605d39 2997}
This page took 1.833652 seconds and 4 git commands to generate.