+/* This vector maps GDB's idea of a register's number into an address
+ in the windows exception context vector. */
+
+static int i386_windows_gregset_reg_offset[] =
+{
+ 176, /* eax */
+ 172, /* ecx */
+ 168, /* edx */
+ 164, /* ebx */
+
+ 196, /* esp */
+ 180, /* ebp */
+ 160, /* esi */
+ 156, /* edi */
+
+ 184, /* eip */
+ 192, /* eflags */
+ 188, /* cs */
+ 200, /* ss */
+
+ 152, /* ds */
+ 148, /* es */
+ 144, /* fs */
+ 140, /* gs */
+
+ 56, /* FloatSave.RegisterArea[0 * 10] */
+ 66, /* FloatSave.RegisterArea[1 * 10] */
+ 76, /* FloatSave.RegisterArea[2 * 10] */
+ 86, /* FloatSave.RegisterArea[3 * 10] */
+ 96, /* FloatSave.RegisterArea[4 * 10] */
+ 106, /* FloatSave.RegisterArea[5 * 10] */
+ 116, /* FloatSave.RegisterArea[6 * 10] */
+ 126, /* FloatSave.RegisterArea[7 * 10] */
+
+ 28, /* FloatSave.ControlWord */
+ 32, /* FloatSave.StatusWord */
+ 36, /* FloatSave.TagWord */
+ 44, /* FloatSave.ErrorSelector */
+ 40, /* FloatSave.ErrorOffset */
+ 52, /* FloatSave.DataSelector */
+ 48, /* FloatSave.DataOffset */
+ 44, /* FloatSave.ErrorSelector */
+
+ /* XMM0-7 */
+ 364, /* ExtendedRegisters[10*16] */
+ 380, /* ExtendedRegisters[11*16] */
+ 396, /* ExtendedRegisters[12*16] */
+ 412, /* ExtendedRegisters[13*16] */
+ 428, /* ExtendedRegisters[14*16] */
+ 444, /* ExtendedRegisters[15*16] */
+ 460, /* ExtendedRegisters[16*16] */
+ 476, /* ExtendedRegisters[17*16] */
+
+ /* MXCSR */
+ 228 /* ExtendedRegisters[24] */
+};
+
+#define I386_WINDOWS_SIZEOF_GREGSET 716
+
+struct cpms_data
+{
+ struct gdbarch *gdbarch;
+ struct obstack *obstack;
+ int module_count;
+};
+
+static void
+core_process_module_section (bfd *abfd, asection *sect, void *obj)
+{
+ struct cpms_data *data = (struct cpms_data *) obj;
+ enum bfd_endian byte_order = gdbarch_byte_order (data->gdbarch);
+
+ char *module_name;
+ size_t module_name_size;
+ CORE_ADDR base_addr;
+
+ gdb_byte *buf = NULL;
+
+ if (!startswith (sect->name, ".module"))
+ return;
+
+ buf = (gdb_byte *) xmalloc (bfd_section_size (sect) + 1);
+ if (!buf)
+ {
+ printf_unfiltered ("memory allocation failed for %s\n", sect->name);
+ goto out;
+ }
+ if (!bfd_get_section_contents (abfd, sect,
+ buf, 0, bfd_section_size (sect)))
+ goto out;
+
+
+
+ /* A DWORD (data_type) followed by struct windows_core_module_info. */
+
+ base_addr =
+ extract_unsigned_integer (buf + 4, 4, byte_order);
+
+ module_name_size =
+ extract_unsigned_integer (buf + 8, 4, byte_order);
+
+ if (12 + module_name_size > bfd_section_size (sect))
+ goto out;
+ module_name = (char *) buf + 12;
+
+ /* The first module is the .exe itself. */
+ if (data->module_count != 0)
+ windows_xfer_shared_library (module_name, base_addr,
+ data->gdbarch, data->obstack);
+ data->module_count++;
+
+out:
+ if (buf)
+ xfree (buf);
+ return;
+}
+
+static ULONGEST
+windows_core_xfer_shared_libraries (struct gdbarch *gdbarch,
+ gdb_byte *readbuf,
+ ULONGEST offset, ULONGEST len)
+{
+ struct obstack obstack;
+ const char *buf;
+ ULONGEST len_avail;
+ struct cpms_data data = { gdbarch, &obstack, 0 };
+
+ obstack_init (&obstack);
+ obstack_grow_str (&obstack, "<library-list>\n");
+ bfd_map_over_sections (core_bfd,
+ core_process_module_section,
+ &data);
+ obstack_grow_str0 (&obstack, "</library-list>\n");
+
+ buf = (const char *) obstack_finish (&obstack);
+ len_avail = strlen (buf);
+ if (offset >= len_avail)
+ return 0;
+
+ if (len > len_avail - offset)
+ len = len_avail - offset;
+ memcpy (readbuf, buf + offset, len);
+
+ obstack_free (&obstack, NULL);
+ return len;
+}
+
+/* This is how we want PTIDs from core files to be printed. */
+
+static std::string
+i386_windows_core_pid_to_str (struct gdbarch *gdbarch, ptid_t ptid)
+{
+ if (ptid.lwp () != 0)
+ return string_printf ("Thread 0x%lx", ptid.lwp ());
+
+ return normal_pid_to_str (ptid);
+}