+/* Implementation of `gdbarch_gdb_signal_to_target' for Windows. */
+
+static int
+windows_gdb_signal_to_target (struct gdbarch *gdbarch, enum gdb_signal signal)
+{
+ switch (signal)
+ {
+ case GDB_SIGNAL_0:
+ return 0;
+ case GDB_SIGNAL_HUP:
+ return WINDOWS_SIGHUP;
+ case GDB_SIGNAL_INT:
+ return WINDOWS_SIGINT;
+ case GDB_SIGNAL_QUIT:
+ return WINDOWS_SIGQUIT;
+ case GDB_SIGNAL_ILL:
+ return WINDOWS_SIGILL;
+ case GDB_SIGNAL_TRAP:
+ return WINDOWS_SIGTRAP;
+ case GDB_SIGNAL_ABRT:
+ return WINDOWS_SIGABRT;
+ case GDB_SIGNAL_EMT:
+ return WINDOWS_SIGEMT;
+ case GDB_SIGNAL_FPE:
+ return WINDOWS_SIGFPE;
+ case GDB_SIGNAL_KILL:
+ return WINDOWS_SIGKILL;
+ case GDB_SIGNAL_BUS:
+ return WINDOWS_SIGBUS;
+ case GDB_SIGNAL_SEGV:
+ return WINDOWS_SIGSEGV;
+ case GDB_SIGNAL_SYS:
+ return WINDOWS_SIGSYS;
+ case GDB_SIGNAL_PIPE:
+ return WINDOWS_SIGPIPE;
+ case GDB_SIGNAL_ALRM:
+ return WINDOWS_SIGALRM;
+ case GDB_SIGNAL_TERM:
+ return WINDOWS_SIGTERM;
+ }
+ return -1;
+}
+
+/* Implementation of `gdbarch_gdb_signal_to_target' for Cygwin. */
+
+static int
+cygwin_gdb_signal_to_target (struct gdbarch *gdbarch, enum gdb_signal signal)
+{
+ switch (signal)
+ {
+ case GDB_SIGNAL_0:
+ return 0;
+ case GDB_SIGNAL_HUP:
+ return CYGWIN_SIGHUP;
+ case GDB_SIGNAL_INT:
+ return CYGWIN_SIGINT;
+ case GDB_SIGNAL_QUIT:
+ return CYGWIN_SIGQUIT;
+ case GDB_SIGNAL_ILL:
+ return CYGWIN_SIGILL;
+ case GDB_SIGNAL_TRAP:
+ return CYGWIN_SIGTRAP;
+ case GDB_SIGNAL_ABRT:
+ return CYGWIN_SIGABRT;
+ case GDB_SIGNAL_EMT:
+ return CYGWIN_SIGEMT;
+ case GDB_SIGNAL_FPE:
+ return CYGWIN_SIGFPE;
+ case GDB_SIGNAL_KILL:
+ return CYGWIN_SIGKILL;
+ case GDB_SIGNAL_BUS:
+ return CYGWIN_SIGBUS;
+ case GDB_SIGNAL_SEGV:
+ return CYGWIN_SIGSEGV;
+ case GDB_SIGNAL_SYS:
+ return CYGWIN_SIGSYS;
+ case GDB_SIGNAL_PIPE:
+ return CYGWIN_SIGPIPE;
+ case GDB_SIGNAL_ALRM:
+ return CYGWIN_SIGALRM;
+ case GDB_SIGNAL_TERM:
+ return CYGWIN_SIGTERM;
+ case GDB_SIGNAL_URG:
+ return CYGWIN_SIGURG;
+ case GDB_SIGNAL_STOP:
+ return CYGWIN_SIGSTOP;
+ case GDB_SIGNAL_TSTP:
+ return CYGWIN_SIGTSTP;
+ case GDB_SIGNAL_CONT:
+ return CYGWIN_SIGCONT;
+ case GDB_SIGNAL_CHLD:
+ return CYGWIN_SIGCHLD;
+ case GDB_SIGNAL_TTIN:
+ return CYGWIN_SIGTTIN;
+ case GDB_SIGNAL_TTOU:
+ return CYGWIN_SIGTTOU;
+ case GDB_SIGNAL_IO:
+ return CYGWIN_SIGIO;
+ case GDB_SIGNAL_XCPU:
+ return CYGWIN_SIGXCPU;
+ case GDB_SIGNAL_XFSZ:
+ return CYGWIN_SIGXFSZ;
+ case GDB_SIGNAL_VTALRM:
+ return CYGWIN_SIGVTALRM;
+ case GDB_SIGNAL_PROF:
+ return CYGWIN_SIGPROF;
+ case GDB_SIGNAL_WINCH:
+ return CYGWIN_SIGWINCH;
+ case GDB_SIGNAL_PWR:
+ return CYGWIN_SIGLOST;
+ case GDB_SIGNAL_USR1:
+ return CYGWIN_SIGUSR1;
+ case GDB_SIGNAL_USR2:
+ return CYGWIN_SIGUSR2;
+ }
+ return -1;
+}
+
+struct enum_value_name
+{
+ uint32_t value;
+ const char *name;
+};
+
+/* Allocate a TYPE_CODE_ENUM type structure with its named values. */
+
+static struct type *
+create_enum (struct gdbarch *gdbarch, int bit, const char *name,
+ const struct enum_value_name *values, int count)
+{
+ struct type *type;
+ int i;
+
+ type = arch_type (gdbarch, TYPE_CODE_ENUM, bit, name);
+ type->set_num_fields (count);
+ type->set_fields
+ ((struct field *) TYPE_ZALLOC (type, sizeof (struct field) * count));
+ TYPE_UNSIGNED (type) = 1;
+
+ for (i = 0; i < count; i++)
+ {
+ TYPE_FIELD_NAME (type, i) = values[i].name;
+ SET_FIELD_ENUMVAL (type->field (i), values[i].value);
+ }
+
+ return type;
+}
+
+static const struct enum_value_name exception_values[] =
+{
+ { 0x40000015, "FATAL_APP_EXIT" },
+ { 0x4000001E, "WX86_SINGLE_STEP" },
+ { 0x4000001F, "WX86_BREAKPOINT" },
+ { 0x40010005, "DBG_CONTROL_C" },
+ { 0x40010008, "DBG_CONTROL_BREAK" },
+ { 0x80000002, "DATATYPE_MISALIGNMENT" },
+ { 0x80000003, "BREAKPOINT" },
+ { 0x80000004, "SINGLE_STEP" },
+ { 0xC0000005, "ACCESS_VIOLATION" },
+ { 0xC0000006, "IN_PAGE_ERROR" },
+ { 0xC000001D, "ILLEGAL_INSTRUCTION" },
+ { 0xC0000025, "NONCONTINUABLE_EXCEPTION" },
+ { 0xC0000026, "INVALID_DISPOSITION" },
+ { 0xC000008C, "ARRAY_BOUNDS_EXCEEDED" },
+ { 0xC000008D, "FLOAT_DENORMAL_OPERAND" },
+ { 0xC000008E, "FLOAT_DIVIDE_BY_ZERO" },
+ { 0xC000008F, "FLOAT_INEXACT_RESULT" },
+ { 0xC0000090, "FLOAT_INVALID_OPERATION" },
+ { 0xC0000091, "FLOAT_OVERFLOW" },
+ { 0xC0000092, "FLOAT_STACK_CHECK" },
+ { 0xC0000093, "FLOAT_UNDERFLOW" },
+ { 0xC0000094, "INTEGER_DIVIDE_BY_ZERO" },
+ { 0xC0000095, "INTEGER_OVERFLOW" },
+ { 0xC0000096, "PRIV_INSTRUCTION" },
+ { 0xC00000FD, "STACK_OVERFLOW" },
+ { 0xC0000409, "FAST_FAIL" },
+};
+
+static const struct enum_value_name violation_values[] =
+{
+ { 0, "READ_ACCESS_VIOLATION" },
+ { 1, "WRITE_ACCESS_VIOLATION" },
+ { 8, "DATA_EXECUTION_PREVENTION_VIOLATION" },
+};
+
+/* Implement the "get_siginfo_type" gdbarch method. */
+
+static struct type *
+windows_get_siginfo_type (struct gdbarch *gdbarch)
+{
+ struct windows_gdbarch_data *windows_gdbarch_data;
+ struct type *dword_type, *pvoid_type, *ulongptr_type;
+ struct type *code_enum, *violation_enum;
+ struct type *violation_type, *para_type, *siginfo_ptr_type, *siginfo_type;
+
+ windows_gdbarch_data = get_windows_gdbarch_data (gdbarch);
+ if (windows_gdbarch_data->siginfo_type != NULL)
+ return windows_gdbarch_data->siginfo_type;
+
+ dword_type = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
+ 1, "DWORD");
+ pvoid_type = arch_pointer_type (gdbarch, gdbarch_ptr_bit (gdbarch), "PVOID",
+ builtin_type (gdbarch)->builtin_void);
+ ulongptr_type = arch_integer_type (gdbarch, gdbarch_ptr_bit (gdbarch),
+ 1, "ULONG_PTR");
+
+ /* ExceptionCode value names */
+ code_enum = create_enum (gdbarch, gdbarch_int_bit (gdbarch),
+ "ExceptionCode", exception_values,
+ ARRAY_SIZE (exception_values));
+
+ /* ACCESS_VIOLATION type names */
+ violation_enum = create_enum (gdbarch, gdbarch_ptr_bit (gdbarch),
+ "ViolationType", violation_values,
+ ARRAY_SIZE (violation_values));
+
+ /* ACCESS_VIOLATION information */
+ violation_type = arch_composite_type (gdbarch, NULL, TYPE_CODE_STRUCT);
+ append_composite_type_field (violation_type, "Type", violation_enum);
+ append_composite_type_field (violation_type, "Address", pvoid_type);
+
+ /* Unnamed union of the documented field ExceptionInformation,
+ and the alternative AccessViolationInformation (which displays
+ human-readable values for ExceptionCode ACCESS_VIOLATION). */
+ para_type = arch_composite_type (gdbarch, NULL, TYPE_CODE_UNION);
+ append_composite_type_field (para_type, "ExceptionInformation",
+ lookup_array_range_type (ulongptr_type, 0, 14));
+ append_composite_type_field (para_type, "AccessViolationInformation",
+ violation_type);
+
+ siginfo_type = arch_composite_type (gdbarch, "EXCEPTION_RECORD",
+ TYPE_CODE_STRUCT);
+ siginfo_ptr_type = arch_pointer_type (gdbarch, gdbarch_ptr_bit (gdbarch),
+ NULL, siginfo_type);
+
+ /* ExceptionCode is documented as type DWORD, but here a helper
+ enum type is used instead to display a human-readable value. */
+ append_composite_type_field (siginfo_type, "ExceptionCode", code_enum);
+ append_composite_type_field (siginfo_type, "ExceptionFlags", dword_type);
+ append_composite_type_field (siginfo_type, "ExceptionRecord",
+ siginfo_ptr_type);
+ append_composite_type_field (siginfo_type, "ExceptionAddress",
+ pvoid_type);
+ append_composite_type_field (siginfo_type, "NumberParameters", dword_type);
+ /* The 64-bit variant needs some padding. */
+ append_composite_type_field_aligned (siginfo_type, "",
+ para_type, TYPE_LENGTH (ulongptr_type));
+
+ windows_gdbarch_data->siginfo_type = siginfo_type;
+
+ return siginfo_type;
+}
+
+/* Implement the "solib_create_inferior_hook" target_so_ops method. */
+
+static void
+windows_solib_create_inferior_hook (int from_tty)
+{
+ CORE_ADDR exec_base = 0;
+
+ /* Find base address of main executable in
+ TIB->process_environment_block->image_base_address. */
+ struct gdbarch *gdbarch = target_gdbarch ();
+ enum bfd_endian byte_order = gdbarch_byte_order (gdbarch);
+ int ptr_bytes;
+ int peb_offset; /* Offset of process_environment_block in TIB. */
+ int base_offset; /* Offset of image_base_address in PEB. */
+ if (gdbarch_ptr_bit (gdbarch) == 32)
+ {
+ ptr_bytes = 4;
+ peb_offset = 48;
+ base_offset = 8;
+ }
+ else
+ {
+ ptr_bytes = 8;
+ peb_offset = 96;
+ base_offset = 16;
+ }
+ CORE_ADDR tlb;
+ gdb_byte buf[8];
+ if (target_has_execution
+ && target_get_tib_address (inferior_ptid, &tlb)
+ && !target_read_memory (tlb + peb_offset, buf, ptr_bytes))
+ {
+ CORE_ADDR peb = extract_unsigned_integer (buf, ptr_bytes, byte_order);
+ if (!target_read_memory (peb + base_offset, buf, ptr_bytes))
+ exec_base = extract_unsigned_integer (buf, ptr_bytes, byte_order);
+ }
+
+ /* Rebase executable if the base address changed because of ASLR. */
+ if (symfile_objfile != nullptr && exec_base != 0)
+ {
+ CORE_ADDR vmaddr = pe_data (exec_bfd)->pe_opthdr.ImageBase;
+ if (vmaddr != exec_base)
+ objfile_rebase (symfile_objfile, exec_base - vmaddr);
+ }
+}
+
+static struct target_so_ops windows_so_ops;
+
+/* Common parts for gdbarch initialization for the Windows and Cygwin OS
+ ABIs. */
+
+static void
+windows_init_abi_common (struct gdbarch_info info, struct gdbarch *gdbarch)
+{
+ set_gdbarch_wchar_bit (gdbarch, 16);
+ set_gdbarch_wchar_signed (gdbarch, 0);
+
+ /* Canonical paths on this target look like
+ `c:\Program Files\Foo App\mydll.dll', for example. */
+ set_gdbarch_has_dos_based_file_system (gdbarch, 1);
+
+ set_gdbarch_iterate_over_objfiles_in_search_order
+ (gdbarch, windows_iterate_over_objfiles_in_search_order);
+
+ windows_so_ops = solib_target_so_ops;
+ windows_so_ops.solib_create_inferior_hook
+ = windows_solib_create_inferior_hook;
+ set_solib_ops (gdbarch, &windows_so_ops);
+
+ set_gdbarch_get_siginfo_type (gdbarch, windows_get_siginfo_type);
+}
+
+/* See windows-tdep.h. */
+void
+windows_init_abi (struct gdbarch_info info, struct gdbarch *gdbarch)
+{
+ windows_init_abi_common (info, gdbarch);
+ set_gdbarch_gdb_signal_to_target (gdbarch, windows_gdb_signal_to_target);
+}
+
+/* See windows-tdep.h. */
+
+void
+cygwin_init_abi (struct gdbarch_info info, struct gdbarch *gdbarch)
+{
+ windows_init_abi_common (info, gdbarch);
+ set_gdbarch_gdb_signal_to_target (gdbarch, cygwin_gdb_signal_to_target);
+}
+
+/* Implementation of `tlb' variable. */
+
+static const struct internalvar_funcs tlb_funcs =
+{
+ tlb_make_value,
+ NULL,
+ NULL
+};
+
+/* Layout of an element of a PE's Import Directory Table. Based on:
+
+ https://docs.microsoft.com/en-us/windows/win32/debug/pe-format#import-directory-table
+ */
+
+struct pe_import_directory_entry
+{
+ uint32_t import_lookup_table_rva;
+ uint32_t timestamp;
+ uint32_t forwarder_chain;
+ uint32_t name_rva;
+ uint32_t import_address_table_rva;
+};
+
+gdb_static_assert (sizeof (pe_import_directory_entry) == 20);
+
+/* See windows-tdep.h. */
+
+bool
+is_linked_with_cygwin_dll (bfd *abfd)
+{
+ /* The list of DLLs a PE is linked to is in the .idata section. See:
+
+ https://docs.microsoft.com/en-us/windows/win32/debug/pe-format#the-idata-section
+ */
+ asection *idata_section = bfd_get_section_by_name (abfd, ".idata");
+ if (idata_section == nullptr)
+ return false;
+
+ bfd_size_type idata_section_size = bfd_section_size (idata_section);
+ internal_extra_pe_aouthdr *pe_extra = &pe_data (abfd)->pe_opthdr;
+ bfd_vma import_table_va = pe_extra->DataDirectory[PE_IMPORT_TABLE].VirtualAddress;
+ bfd_vma idata_section_va = bfd_section_vma (idata_section);
+
+ /* The section's virtual address as reported by BFD has the image base applied,
+ remove it. */
+ gdb_assert (idata_section_va >= pe_extra->ImageBase);
+ idata_section_va -= pe_extra->ImageBase;
+
+ bfd_vma idata_section_end_va = idata_section_va + idata_section_size;
+
+ /* Make sure that the import table is indeed within the .idata section's range. */
+ if (import_table_va < idata_section_va
+ || import_table_va >= idata_section_end_va)
+ {
+ warning (_("\
+%s: import table's virtual address (0x%" BFD_VMA_FMT "x) is outside .idata \
+section's range [0x%" BFD_VMA_FMT "x, 0x%" BFD_VMA_FMT "x[."),
+ bfd_get_filename (abfd), import_table_va, idata_section_va,
+ idata_section_end_va);
+ return false;
+ }
+
+ /* The import table starts at this offset into the .idata section. */
+ bfd_vma import_table_offset_in_sect = import_table_va - idata_section_va;
+
+ /* Get the section's data. */
+ gdb::byte_vector idata_contents;
+ if (!gdb_bfd_get_full_section_contents (abfd, idata_section, &idata_contents))
+ {
+ warning (_("%s: failed to get contents of .idata section."),
+ bfd_get_filename (abfd));
+ return false;
+ }
+
+ gdb_assert (idata_contents.size () == idata_section_size);
+
+ const gdb_byte *iter = idata_contents.data () + import_table_offset_in_sect;
+ const gdb_byte *end = idata_contents.data () + idata_section_size;
+ const pe_import_directory_entry null_dir_entry = { 0 };
+
+ /* Iterate through all directory entries. */
+ while (true)
+ {
+ /* Is there enough space left in the section for another entry? */
+ if (iter + sizeof (pe_import_directory_entry) > end)
+ {
+ warning (_("%s: unexpected end of .idata section."),
+ bfd_get_filename (abfd));
+ break;
+ }
+
+ pe_import_directory_entry *dir_entry = (pe_import_directory_entry *) iter;
+
+ /* Is it the end of list marker? */
+ if (memcmp (dir_entry, &null_dir_entry,
+ sizeof (pe_import_directory_entry)) == 0)
+ break;
+
+ bfd_vma name_va = dir_entry->name_rva;
+
+ /* If the name's virtual address is smaller than the section's virtual
+ address, there's a problem. */
+ if (name_va < idata_section_va || name_va >= idata_section_end_va)
+ {
+ warning (_("\
+%s: name's virtual address (0x%" BFD_VMA_FMT "x) is outside .idata section's \
+range [0x%" BFD_VMA_FMT "x, 0x%" BFD_VMA_FMT "x[."),
+ bfd_get_filename (abfd), name_va, idata_section_va,
+ idata_section_end_va);
+ break;
+ }
+
+ const gdb_byte *name = &idata_contents[name_va - idata_section_va];
+
+ /* Make sure we don't overshoot the end of the section with the
+ streq. */
+ if (name + sizeof (CYGWIN_DLL_NAME) <= end)
+ {
+ /* Finally, check if this is the dll name we are looking for. */
+ if (streq ((const char *) name, CYGWIN_DLL_NAME))
+ return true;
+ }
+
+ iter += sizeof (pe_import_directory_entry);
+ }
+
+ return false;
+}
+
+void _initialize_windows_tdep ();