1 /* Target-vector operations for controlling windows child processes, for GDB.
3 Copyright (C) 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
4 2005, 2006, 2007, 2008, 2009, 2010 Free Software Foundation, Inc.
6 Contributed by Cygnus Solutions, A Red Hat Company.
8 This file is part of GDB.
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
23 /* Originally by Steve Chamberlain, sac@cygnus.com */
26 #include "frame.h" /* required by inferior.h */
29 #include "exceptions.h"
32 #include "completer.h"
36 #include <sys/types.h>
43 #include <sys/cygwin.h>
44 #include <cygwin/version.h>
51 #include "gdb_obstack.h"
52 #include "gdb_string.h"
53 #include "gdbthread.h"
55 #include <sys/param.h>
60 #include "xml-support.h"
62 #include "i386-tdep.h"
63 #include "i387-tdep.h"
65 #include "windows-tdep.h"
66 #include "windows-nat.h"
68 #include "complaints.h"
70 #define AdjustTokenPrivileges dyn_AdjustTokenPrivileges
71 #define DebugActiveProcessStop dyn_DebugActiveProcessStop
72 #define DebugBreakProcess dyn_DebugBreakProcess
73 #define DebugSetProcessKillOnExit dyn_DebugSetProcessKillOnExit
74 #define EnumProcessModules dyn_EnumProcessModules
75 #define GetModuleInformation dyn_GetModuleInformation
76 #define LookupPrivilegeValueA dyn_LookupPrivilegeValueA
77 #define OpenProcessToken dyn_OpenProcessToken
79 static BOOL WINAPI (*AdjustTokenPrivileges)(HANDLE, BOOL, PTOKEN_PRIVILEGES,
80 DWORD, PTOKEN_PRIVILEGES, PDWORD);
81 static BOOL WINAPI (*DebugActiveProcessStop) (DWORD);
82 static BOOL WINAPI (*DebugBreakProcess) (HANDLE);
83 static BOOL WINAPI (*DebugSetProcessKillOnExit) (BOOL);
84 static BOOL WINAPI (*EnumProcessModules) (HANDLE, HMODULE *, DWORD,
86 static BOOL WINAPI (*GetModuleInformation) (HANDLE, HMODULE, LPMODULEINFO,
88 static BOOL WINAPI (*LookupPrivilegeValueA)(LPCSTR, LPCSTR, PLUID);
89 static BOOL WINAPI (*OpenProcessToken)(HANDLE, DWORD, PHANDLE);
91 static struct target_ops windows_ops;
95 #undef GetModuleFileNameEx
98 # define __PMAX (MAX_PATH + 1)
99 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPSTR, DWORD);
100 # define STARTUPINFO STARTUPINFOA
101 # define CreateProcess CreateProcessA
102 # define GetModuleFileNameEx_name "GetModuleFileNameExA"
103 # define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
105 # define __PMAX PATH_MAX
106 /* The starting and ending address of the cygwin1.dll text segment. */
107 static CORE_ADDR cygwin_load_start;
108 static CORE_ADDR cygwin_load_end;
109 # if CYGWIN_VERSION_DLL_MAKE_COMBINED(CYGWIN_VERSION_API_MAJOR,CYGWIN_VERSION_API_MINOR) >= 181
111 typedef wchar_t cygwin_buf_t;
112 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPWSTR, DWORD);
113 # define STARTUPINFO STARTUPINFOW
114 # define CreateProcess CreateProcessW
115 # define GetModuleFileNameEx_name "GetModuleFileNameExW"
116 # define bad_GetModuleFileNameEx bad_GetModuleFileNameExW
118 # define CCP_POSIX_TO_WIN_W 1
119 # define CCP_WIN_W_TO_POSIX 3
120 # define cygwin_conv_path(op, from, to, size) \
121 (op == CCP_WIN_W_TO_POSIX) ? \
122 cygwin_conv_to_full_posix_path (from, to) : \
123 cygwin_conv_to_win32_path (from, to)
124 # define cygwin_conv_path(op, from, to, size) cygwin_conv_to_full_posix_path (from, to)
125 typedef char cygwin_buf_t;
126 static DWORD WINAPI (*GetModuleFileNameEx) (HANDLE, HMODULE, LPSTR, DWORD);
127 # define STARTUPINFO STARTUPINFOA
128 # define CreateProcess CreateProcessA
129 # define GetModuleFileNameEx_name "GetModuleFileNameExA"
130 # define bad_GetModuleFileNameEx bad_GetModuleFileNameExA
131 # define CW_SET_DOS_FILE_WARNING -1 /* no-op this for older Cygwin */
135 static int have_saved_context; /* True if we've saved context from a cygwin signal. */
136 static CONTEXT saved_context; /* Containes the saved context from a cygwin signal. */
138 /* If we're not using the old Cygwin header file set, define the
139 following which never should have been in the generic Win32 API
140 headers in the first place since they were our own invention... */
141 #ifndef _GNU_H_WINDOWS_H
144 FLAG_TRACE_BIT = 0x100,
145 CONTEXT_DEBUGGER = (CONTEXT_FULL | CONTEXT_FLOATING_POINT)
149 #ifndef CONTEXT_EXTENDED_REGISTERS
150 /* This macro is only defined on ia32. It only makes sense on this target,
151 so define it as zero if not already defined. */
152 #define CONTEXT_EXTENDED_REGISTERS 0
155 #define CONTEXT_DEBUGGER_DR CONTEXT_DEBUGGER | CONTEXT_DEBUG_REGISTERS \
156 | CONTEXT_EXTENDED_REGISTERS
158 static uintptr_t dr[8];
159 static int debug_registers_changed;
160 static int debug_registers_used;
162 static int windows_initialization_done;
163 #define DR6_CLEAR_VALUE 0xffff0ff0
165 /* The string sent by cygwin when it processes a signal.
166 FIXME: This should be in a cygwin include file. */
167 #ifndef _CYGWIN_SIGNAL_STRING
168 #define _CYGWIN_SIGNAL_STRING "cYgSiGw00f"
171 #define CHECK(x) check (x, __FILE__,__LINE__)
172 #define DEBUG_EXEC(x) if (debug_exec) printf_unfiltered x
173 #define DEBUG_EVENTS(x) if (debug_events) printf_unfiltered x
174 #define DEBUG_MEM(x) if (debug_memory) printf_unfiltered x
175 #define DEBUG_EXCEPT(x) if (debug_exceptions) printf_unfiltered x
177 static void windows_stop (ptid_t);
178 static int windows_thread_alive (struct target_ops *, ptid_t);
179 static void windows_kill_inferior (struct target_ops *);
181 static void cygwin_set_dr (int i, CORE_ADDR addr);
182 static void cygwin_set_dr7 (unsigned long val);
183 static unsigned long cygwin_get_dr6 (void);
185 static enum target_signal last_sig = TARGET_SIGNAL_0;
186 /* Set if a signal was received from the debugged process */
188 /* Thread information structure used to track information that is
189 not available in gdb's thread structure. */
190 typedef struct thread_info_struct
192 struct thread_info_struct *next;
203 static thread_info thread_head;
205 /* The process and thread handles for the above context. */
207 static DEBUG_EVENT current_event; /* The current debug event from
209 static HANDLE current_process_handle; /* Currently executing process */
210 static thread_info *current_thread; /* Info on currently selected thread */
211 static DWORD main_thread_id; /* Thread ID of the main thread */
213 /* Counts of things. */
214 static int exception_count = 0;
215 static int event_count = 0;
216 static int saw_create;
217 static int open_process_used = 0;
220 static int new_console = 0;
222 static int cygwin_exceptions = 0;
224 static int new_group = 1;
225 static int debug_exec = 0; /* show execution */
226 static int debug_events = 0; /* show events from kernel */
227 static int debug_memory = 0; /* show target memory accesses */
228 static int debug_exceptions = 0; /* show target exceptions */
229 static int useshell = 0; /* use shell for subprocesses */
231 /* This vector maps GDB's idea of a register's number into an offset
232 in the windows exception context vector.
234 It also contains the bit mask needed to load the register in question.
236 The contents of this table can only be computed by the units
237 that provide CPU-specific support for Windows native debugging.
238 These units should set the table by calling
239 windows_set_context_register_offsets.
241 One day we could read a reg, we could inspect the context we
242 already have loaded, if it doesn't have the bit set that we need,
243 we read that set of registers in using GetThreadContext. If the
244 context already contains what we need, we just unpack it. Then to
245 write a register, first we have to ensure that the context contains
246 the other regs of the group, and then we copy the info in and set
249 static const int *mappings;
251 /* This vector maps the target's idea of an exception (extracted
252 from the DEBUG_EVENT structure) to GDB's idea. */
254 struct xlate_exception
257 enum target_signal us;
260 static const struct xlate_exception
263 {EXCEPTION_ACCESS_VIOLATION, TARGET_SIGNAL_SEGV},
264 {STATUS_STACK_OVERFLOW, TARGET_SIGNAL_SEGV},
265 {EXCEPTION_BREAKPOINT, TARGET_SIGNAL_TRAP},
266 {DBG_CONTROL_C, TARGET_SIGNAL_INT},
267 {EXCEPTION_SINGLE_STEP, TARGET_SIGNAL_TRAP},
268 {STATUS_FLOAT_DIVIDE_BY_ZERO, TARGET_SIGNAL_FPE},
271 /* Set the MAPPINGS static global to OFFSETS.
272 See the description of MAPPINGS for more details. */
275 windows_set_context_register_offsets (const int *offsets)
281 check (BOOL ok, const char *file, int line)
284 printf_filtered ("error return %s:%d was %lu\n", file, line,
288 /* Find a thread record given a thread id. If GET_CONTEXT is not 0,
289 then also retrieve the context for this thread. If GET_CONTEXT is
290 negative, then don't suspend the thread. */
292 thread_rec (DWORD id, int get_context)
296 for (th = &thread_head; (th = th->next) != NULL;)
299 if (!th->suspended && get_context)
301 if (get_context > 0 && id != current_event.dwThreadId)
303 if (SuspendThread (th->h) == (DWORD) -1)
305 DWORD err = GetLastError ();
306 warning (_("SuspendThread failed. (winerr %d)"),
312 else if (get_context < 0)
314 th->reload_context = 1;
322 /* Add a thread to the thread list. */
324 windows_add_thread (ptid_t ptid, HANDLE h)
329 gdb_assert (ptid_get_tid (ptid) != 0);
331 id = ptid_get_tid (ptid);
333 if ((th = thread_rec (id, FALSE)))
336 th = XZALLOC (thread_info);
339 th->next = thread_head.next;
340 thread_head.next = th;
342 /* Set the debug registers for the new thread if they are used. */
343 if (debug_registers_used)
345 /* Only change the value of the debug registers. */
346 th->context.ContextFlags = CONTEXT_DEBUG_REGISTERS;
347 CHECK (GetThreadContext (th->h, &th->context));
348 th->context.Dr0 = dr[0];
349 th->context.Dr1 = dr[1];
350 th->context.Dr2 = dr[2];
351 th->context.Dr3 = dr[3];
352 th->context.Dr6 = DR6_CLEAR_VALUE;
353 th->context.Dr7 = dr[7];
354 CHECK (SetThreadContext (th->h, &th->context));
355 th->context.ContextFlags = 0;
360 /* Clear out any old thread list and reintialize it to a
363 windows_init_thread_list (void)
365 thread_info *th = &thread_head;
367 DEBUG_EVENTS (("gdb: windows_init_thread_list\n"));
369 while (th->next != NULL)
371 thread_info *here = th->next;
372 th->next = here->next;
375 thread_head.next = NULL;
378 /* Delete a thread from the list of threads */
380 windows_delete_thread (ptid_t ptid)
385 gdb_assert (ptid_get_tid (ptid) != 0);
387 id = ptid_get_tid (ptid);
390 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (ptid));
391 delete_thread (ptid);
393 for (th = &thread_head;
394 th->next != NULL && th->next->id != id;
398 if (th->next != NULL)
400 thread_info *here = th->next;
401 th->next = here->next;
407 do_windows_fetch_inferior_registers (struct regcache *regcache, int r)
409 char *context_offset = ((char *) ¤t_thread->context) + mappings[r];
410 struct gdbarch *gdbarch = get_regcache_arch (regcache);
411 struct gdbarch_tdep *tdep = gdbarch_tdep (gdbarch);
415 return; /* Windows sometimes uses a non-existent thread id in its
418 if (current_thread->reload_context)
420 #ifdef __COPY_CONTEXT_SIZE
421 if (have_saved_context)
423 /* Lie about where the program actually is stopped since cygwin has informed us that
424 we should consider the signal to have occurred at another location which is stored
425 in "saved_context. */
426 memcpy (¤t_thread->context, &saved_context, __COPY_CONTEXT_SIZE);
427 have_saved_context = 0;
432 thread_info *th = current_thread;
433 th->context.ContextFlags = CONTEXT_DEBUGGER_DR;
434 GetThreadContext (th->h, &th->context);
435 /* Copy dr values from that thread.
436 But only if there were not modified since last stop. PR gdb/2388 */
437 if (!debug_registers_changed)
439 dr[0] = th->context.Dr0;
440 dr[1] = th->context.Dr1;
441 dr[2] = th->context.Dr2;
442 dr[3] = th->context.Dr3;
443 dr[6] = th->context.Dr6;
444 dr[7] = th->context.Dr7;
447 current_thread->reload_context = 0;
450 if (r == I387_FISEG_REGNUM (tdep))
452 l = *((long *) context_offset) & 0xffff;
453 regcache_raw_supply (regcache, r, (char *) &l);
455 else if (r == I387_FOP_REGNUM (tdep))
457 l = (*((long *) context_offset) >> 16) & ((1 << 11) - 1);
458 regcache_raw_supply (regcache, r, (char *) &l);
461 regcache_raw_supply (regcache, r, context_offset);
464 for (r = 0; r < gdbarch_num_regs (gdbarch); r++)
465 do_windows_fetch_inferior_registers (regcache, r);
470 windows_fetch_inferior_registers (struct target_ops *ops,
471 struct regcache *regcache, int r)
473 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
474 /* Check if current_thread exists. Windows sometimes uses a non-existent
475 thread id in its events */
477 do_windows_fetch_inferior_registers (regcache, r);
481 do_windows_store_inferior_registers (const struct regcache *regcache, int r)
484 /* Windows sometimes uses a non-existent thread id in its events */;
486 regcache_raw_collect (regcache, r,
487 ((char *) ¤t_thread->context) + mappings[r]);
490 for (r = 0; r < gdbarch_num_regs (get_regcache_arch (regcache)); r++)
491 do_windows_store_inferior_registers (regcache, r);
495 /* Store a new register value into the current thread context */
497 windows_store_inferior_registers (struct target_ops *ops,
498 struct regcache *regcache, int r)
500 current_thread = thread_rec (ptid_get_tid (inferior_ptid), TRUE);
501 /* Check if current_thread exists. Windows sometimes uses a non-existent
502 thread id in its events */
504 do_windows_store_inferior_registers (regcache, r);
507 /* Get the name of a given module at at given base address. If base_address
508 is zero return the first loaded module (which is always the name of the
511 get_module_name (LPVOID base_address, char *dll_name_ret)
517 HMODULE *DllHandle = dh_buf; /* Set to temporary storage for initial query */
520 cygwin_buf_t pathbuf[__PMAX]; /* Temporary storage prior to converting to
521 posix form. __PMAX is always enough
522 as long as SO_NAME_MAX_PATH_SIZE is defined
527 /* Find size of buffer needed to handle list of modules loaded in inferior */
528 if (!EnumProcessModules (current_process_handle, DllHandle,
529 sizeof (HMODULE), &cbNeeded) || !cbNeeded)
532 /* Allocate correct amount of space for module list */
533 DllHandle = (HMODULE *) alloca (cbNeeded);
537 /* Get the list of modules */
538 if (!EnumProcessModules (current_process_handle, DllHandle, cbNeeded,
542 for (i = 0; i < (int) (cbNeeded / sizeof (HMODULE)); i++)
544 /* Get information on this module */
545 if (!GetModuleInformation (current_process_handle, DllHandle[i],
547 error (_("Can't get module info"));
549 if (!base_address || mi.lpBaseOfDll == base_address)
551 /* Try to find the name of the given module */
553 /* Cygwin prefers that the path be in /x/y/z format */
554 len = GetModuleFileNameEx (current_process_handle,
555 DllHandle[i], pathbuf, __PMAX);
557 error (_("Error getting dll name: %lu."), GetLastError ());
558 if (cygwin_conv_path (CCP_WIN_W_TO_POSIX, pathbuf, dll_name_ret,
560 error (_("Error converting dll name to POSIX: %d."), errno);
562 len = GetModuleFileNameEx (current_process_handle,
563 DllHandle[i], dll_name_ret, __PMAX);
565 error (_("Error getting dll name: %u."), (unsigned) GetLastError ());
567 return 1; /* success */
572 dll_name_ret[0] = '\0';
573 return 0; /* failure */
576 /* Encapsulate the information required in a call to
577 symbol_file_add_args */
578 struct safe_symbol_file_add_args
582 struct section_addr_info *addrs;
585 struct ui_file *err, *out;
589 /* Maintain a linked list of "so" information. */
595 static struct so_list solib_start, *solib_end;
597 /* Call symbol_file_add with stderr redirected. We don't care if there
600 safe_symbol_file_add_stub (void *argv)
602 #define p ((struct safe_symbol_file_add_args *) argv)
603 const int add_flags = ((p->from_tty ? SYMFILE_VERBOSE : 0)
604 | (p->mainline ? SYMFILE_MAINLINE : 0));
605 p->ret = symbol_file_add (p->name, add_flags, p->addrs, p->flags);
610 /* Restore gdb's stderr after calling symbol_file_add */
612 safe_symbol_file_add_cleanup (void *p)
614 #define sp ((struct safe_symbol_file_add_args *)p)
615 gdb_flush (gdb_stderr);
616 gdb_flush (gdb_stdout);
617 ui_file_delete (gdb_stderr);
618 ui_file_delete (gdb_stdout);
619 gdb_stderr = sp->err;
620 gdb_stdout = sp->out;
624 /* symbol_file_add wrapper that prevents errors from being displayed. */
625 static struct objfile *
626 safe_symbol_file_add (char *name, int from_tty,
627 struct section_addr_info *addrs,
628 int mainline, int flags)
630 struct safe_symbol_file_add_args p;
631 struct cleanup *cleanup;
633 cleanup = make_cleanup (safe_symbol_file_add_cleanup, &p);
637 gdb_flush (gdb_stderr);
638 gdb_flush (gdb_stdout);
639 gdb_stderr = ui_file_new ();
640 gdb_stdout = ui_file_new ();
642 p.from_tty = from_tty;
644 p.mainline = mainline;
646 catch_errors (safe_symbol_file_add_stub, &p, "", RETURN_MASK_ERROR);
648 do_cleanups (cleanup);
652 static struct so_list *
653 windows_make_so (const char *name, LPVOID load_addr)
660 WIN32_FIND_DATA w32_fd;
661 HANDLE h = FindFirstFile(name, &w32_fd);
663 if (h == INVALID_HANDLE_VALUE)
669 if (GetCurrentDirectory (MAX_PATH + 1, cwd))
671 p = strrchr (buf, '\\');
674 SetCurrentDirectory (buf);
675 GetFullPathName (w32_fd.cFileName, MAX_PATH, buf, &p);
676 SetCurrentDirectory (cwd);
679 if (strcasecmp (buf, "ntdll.dll") == 0)
681 GetSystemDirectory (buf, sizeof (buf));
682 strcat (buf, "\\ntdll.dll");
685 cygwin_buf_t buf[__PMAX];
688 if (access (name, F_OK) != 0)
690 if (strcasecmp (name, "ntdll.dll") == 0)
693 GetSystemDirectoryW (buf, sizeof (buf) / sizeof (wchar_t));
694 wcscat (buf, L"\\ntdll.dll");
698 GetSystemDirectoryA (buf, sizeof (buf) / sizeof (wchar_t));
699 strcat (buf, "\\ntdll.dll");
704 so = XZALLOC (struct so_list);
705 so->lm_info = (struct lm_info *) xmalloc (sizeof (struct lm_info));
706 so->lm_info->load_addr = load_addr;
707 strcpy (so->so_original_name, name);
709 strcpy (so->so_name, buf);
712 cygwin_conv_path (CCP_WIN_W_TO_POSIX, buf, so->so_name,
713 SO_NAME_MAX_PATH_SIZE);
716 char *rname = realpath (name, NULL);
717 if (rname && strlen (rname) < SO_NAME_MAX_PATH_SIZE)
719 strcpy (so->so_name, rname);
723 error (_("dll path too long"));
725 /* Record cygwin1.dll .text start/end. */
726 p = strchr (so->so_name, '\0') - (sizeof ("/cygwin1.dll") - 1);
727 if (p >= so->so_name && strcasecmp (p, "/cygwin1.dll") == 0)
730 asection *text = NULL;
733 abfd = bfd_openr (so->so_name, "pei-i386");
738 if (bfd_check_format (abfd, bfd_object))
739 text = bfd_get_section_by_name (abfd, ".text");
747 /* The symbols in a dll are offset by 0x1000, which is the the
748 offset from 0 of the first byte in an image - because of the
749 file header and the section alignment. */
750 cygwin_load_start = (CORE_ADDR) (uintptr_t) ((char *) load_addr + 0x1000);
751 cygwin_load_end = cygwin_load_start + bfd_section_size (abfd, text);
761 get_image_name (HANDLE h, void *address, int unicode)
764 static char buf[__PMAX];
766 static char buf[(2 * __PMAX) + 1];
768 DWORD size = unicode ? sizeof (WCHAR) : sizeof (char);
774 /* Attempt to read the name of the dll that was detected.
775 This is documented to work only when actively debugging
776 a program. It will not work for attached processes. */
780 /* See if we could read the address of a string, and that the
781 address isn't null. */
782 if (!ReadProcessMemory (h, address, &address_ptr, sizeof (address_ptr), &done)
783 || done != sizeof (address_ptr) || !address_ptr)
786 /* Find the length of the string */
787 while (ReadProcessMemory (h, address_ptr + len++ * size, &b, size, &done)
788 && (b[0] != 0 || b[size - 1] != 0) && done == size)
792 ReadProcessMemory (h, address_ptr, buf, len, &done);
795 WCHAR *unicode_address = (WCHAR *) alloca (len * sizeof (WCHAR));
796 ReadProcessMemory (h, address_ptr, unicode_address, len * sizeof (WCHAR),
799 wcstombs (buf, unicode_address, __PMAX);
801 WideCharToMultiByte (CP_ACP, 0, unicode_address, len, buf, sizeof buf,
809 /* Wait for child to do something. Return pid of child, or -1 in case
810 of error; store status through argument pointer OURSTATUS. */
812 handle_load_dll (void *dummy)
814 LOAD_DLL_DEBUG_INFO *event = ¤t_event.u.LoadDll;
815 char dll_buf[__PMAX];
816 char *dll_name = NULL;
818 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
820 if (!get_module_name (event->lpBaseOfDll, dll_buf))
821 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
825 if (*dll_name == '\0')
826 dll_name = get_image_name (current_process_handle,
827 event->lpImageName, event->fUnicode);
831 solib_end->next = windows_make_so (dll_name, event->lpBaseOfDll);
832 solib_end = solib_end->next;
834 DEBUG_EVENTS (("gdb: Loading dll \"%s\" at %s.\n", solib_end->so_name,
835 host_address_to_string (solib_end->lm_info->load_addr)));
841 windows_free_so (struct so_list *so)
849 handle_unload_dll (void *dummy)
851 LPVOID lpBaseOfDll = current_event.u.UnloadDll.lpBaseOfDll;
854 for (so = &solib_start; so->next != NULL; so = so->next)
855 if (so->next->lm_info->load_addr == lpBaseOfDll)
857 struct so_list *sodel = so->next;
858 so->next = sodel->next;
861 DEBUG_EVENTS (("gdb: Unloading dll \"%s\".\n", sodel->so_name));
863 windows_free_so (sodel);
864 solib_add (NULL, 0, NULL, auto_solib_add);
868 /* We did not find any DLL that was previously loaded at this address,
869 so register a complaint. We do not report an error, because we have
870 observed that this may be happening under some circumstances. For
871 instance, running 32bit applications on x64 Windows causes us to receive
872 4 mysterious UNLOAD_DLL_DEBUG_EVENTs during the startup phase (these
873 events are apparently caused by the WOW layer, the interface between
874 32bit and 64bit worlds). */
875 complaint (&symfile_complaints, _("dll starting at %s not found."),
876 host_address_to_string (lpBaseOfDll));
881 /* Clear list of loaded DLLs. */
883 windows_clear_solib (void)
885 solib_start.next = NULL;
886 solib_end = &solib_start;
889 /* Load DLL symbol info. */
891 dll_symbol_command (char *args, int from_tty)
897 error (_("dll-symbols requires a file name"));
900 if (n > 4 && strcasecmp (args + n - 4, ".dll") != 0)
902 char *newargs = (char *) alloca (n + 4 + 1);
903 strcpy (newargs, args);
904 strcat (newargs, ".dll");
908 safe_symbol_file_add (args, from_tty, NULL, 0, OBJF_SHARED | OBJF_USERLOADED);
911 /* Handle DEBUG_STRING output from child process.
912 Cygwin prepends its messages with a "cygwin:". Interpret this as
913 a Cygwin signal. Otherwise just print the string as a warning. */
915 handle_output_debug_string (struct target_waitstatus *ourstatus)
920 if (!target_read_string
921 ((CORE_ADDR) (uintptr_t) current_event.u.DebugString.lpDebugStringData,
925 else if (strncmp (s, _CYGWIN_SIGNAL_STRING, sizeof (_CYGWIN_SIGNAL_STRING) - 1) != 0)
928 if (strncmp (s, "cYg", 3) != 0)
932 #ifdef __COPY_CONTEXT_SIZE
935 /* Got a cygwin signal marker. A cygwin signal is followed by the signal number
936 itself and then optionally followed by the thread id and address to saved context
937 within the DLL. If these are supplied, then the given thread is assumed to have
938 issued the signal and the context from the thread is assumed to be stored at the
939 given address in the inferior. Tell gdb to treat this like a real signal. */
941 int sig = strtol (s + sizeof (_CYGWIN_SIGNAL_STRING) - 1, &p, 0);
942 int gotasig = target_signal_from_host (sig);
943 ourstatus->value.sig = gotasig;
948 ourstatus->kind = TARGET_WAITKIND_STOPPED;
949 retval = strtoul (p, &p, 0);
951 retval = main_thread_id;
952 else if ((x = (LPCVOID) strtoul (p, &p, 0))
953 && ReadProcessMemory (current_process_handle, x,
954 &saved_context, __COPY_CONTEXT_SIZE, &n)
955 && n == __COPY_CONTEXT_SIZE)
956 have_saved_context = 1;
957 current_event.dwThreadId = retval;
968 display_selector (HANDLE thread, DWORD sel)
971 if (GetThreadSelectorEntry (thread, sel, &info))
974 printf_filtered ("0x%03lx: ", sel);
975 if (!info.HighWord.Bits.Pres)
977 puts_filtered ("Segment not present\n");
980 base = (info.HighWord.Bits.BaseHi << 24) +
981 (info.HighWord.Bits.BaseMid << 16)
983 limit = (info.HighWord.Bits.LimitHi << 16) + info.LimitLow;
984 if (info.HighWord.Bits.Granularity)
985 limit = (limit << 12) | 0xfff;
986 printf_filtered ("base=0x%08x limit=0x%08x", base, limit);
987 if (info.HighWord.Bits.Default_Big)
988 puts_filtered(" 32-bit ");
990 puts_filtered(" 16-bit ");
991 switch ((info.HighWord.Bits.Type & 0xf) >> 1)
994 puts_filtered ("Data (Read-Only, Exp-up");
997 puts_filtered ("Data (Read/Write, Exp-up");
1000 puts_filtered ("Unused segment (");
1003 puts_filtered ("Data (Read/Write, Exp-down");
1006 puts_filtered ("Code (Exec-Only, N.Conf");
1009 puts_filtered ("Code (Exec/Read, N.Conf");
1012 puts_filtered ("Code (Exec-Only, Conf");
1015 puts_filtered ("Code (Exec/Read, Conf");
1018 printf_filtered ("Unknown type 0x%x",info.HighWord.Bits.Type);
1020 if ((info.HighWord.Bits.Type & 0x1) == 0)
1021 puts_filtered(", N.Acc");
1022 puts_filtered (")\n");
1023 if ((info.HighWord.Bits.Type & 0x10) == 0)
1024 puts_filtered("System selector ");
1025 printf_filtered ("Priviledge level = %d. ", info.HighWord.Bits.Dpl);
1026 if (info.HighWord.Bits.Granularity)
1027 puts_filtered ("Page granular.\n");
1029 puts_filtered ("Byte granular.\n");
1034 printf_filtered ("Invalid selector 0x%lx.\n",sel);
1040 display_selectors (char * args, int from_tty)
1042 if (!current_thread)
1044 puts_filtered ("Impossible to display selectors now.\n");
1050 puts_filtered ("Selector $cs\n");
1051 display_selector (current_thread->h,
1052 current_thread->context.SegCs);
1053 puts_filtered ("Selector $ds\n");
1054 display_selector (current_thread->h,
1055 current_thread->context.SegDs);
1056 puts_filtered ("Selector $es\n");
1057 display_selector (current_thread->h,
1058 current_thread->context.SegEs);
1059 puts_filtered ("Selector $ss\n");
1060 display_selector (current_thread->h,
1061 current_thread->context.SegSs);
1062 puts_filtered ("Selector $fs\n");
1063 display_selector (current_thread->h,
1064 current_thread->context.SegFs);
1065 puts_filtered ("Selector $gs\n");
1066 display_selector (current_thread->h,
1067 current_thread->context.SegGs);
1072 sel = parse_and_eval_long (args);
1073 printf_filtered ("Selector \"%s\"\n",args);
1074 display_selector (current_thread->h, sel);
1078 static struct cmd_list_element *info_w32_cmdlist = NULL;
1081 info_w32_command (char *args, int from_tty)
1083 help_list (info_w32_cmdlist, "info w32 ", class_info, gdb_stdout);
1087 #define DEBUG_EXCEPTION_SIMPLE(x) if (debug_exceptions) \
1088 printf_unfiltered ("gdb: Target exception %s at %s\n", x, \
1089 host_address_to_string (\
1090 current_event.u.Exception.ExceptionRecord.ExceptionAddress))
1093 handle_exception (struct target_waitstatus *ourstatus)
1096 DWORD code = current_event.u.Exception.ExceptionRecord.ExceptionCode;
1098 ourstatus->kind = TARGET_WAITKIND_STOPPED;
1100 /* Record the context of the current thread */
1101 th = thread_rec (current_event.dwThreadId, -1);
1105 case EXCEPTION_ACCESS_VIOLATION:
1106 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ACCESS_VIOLATION");
1107 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
1110 /* See if the access violation happened within the cygwin DLL itself. Cygwin uses
1111 a kind of exception handling to deal with passed-in invalid addresses. gdb
1112 should not treat these as real SEGVs since they will be silently handled by
1113 cygwin. A real SEGV will (theoretically) be caught by cygwin later in the process
1114 and will be sent as a cygwin-specific-signal. So, ignore SEGVs if they show up
1115 within the text segment of the DLL itself. */
1117 CORE_ADDR addr = (CORE_ADDR) (uintptr_t) current_event.u.Exception.ExceptionRecord.ExceptionAddress;
1118 if ((!cygwin_exceptions && (addr >= cygwin_load_start && addr < cygwin_load_end))
1119 || (find_pc_partial_function (addr, &fn, NULL, NULL)
1120 && strncmp (fn, "KERNEL32!IsBad", strlen ("KERNEL32!IsBad")) == 0))
1125 case STATUS_STACK_OVERFLOW:
1126 DEBUG_EXCEPTION_SIMPLE ("STATUS_STACK_OVERFLOW");
1127 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
1129 case STATUS_FLOAT_DENORMAL_OPERAND:
1130 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DENORMAL_OPERAND");
1131 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1133 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
1134 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ARRAY_BOUNDS_EXCEEDED");
1135 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1137 case STATUS_FLOAT_INEXACT_RESULT:
1138 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INEXACT_RESULT");
1139 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1141 case STATUS_FLOAT_INVALID_OPERATION:
1142 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_INVALID_OPERATION");
1143 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1145 case STATUS_FLOAT_OVERFLOW:
1146 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_OVERFLOW");
1147 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1149 case STATUS_FLOAT_STACK_CHECK:
1150 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_STACK_CHECK");
1151 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1153 case STATUS_FLOAT_UNDERFLOW:
1154 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_UNDERFLOW");
1155 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1157 case STATUS_FLOAT_DIVIDE_BY_ZERO:
1158 DEBUG_EXCEPTION_SIMPLE ("STATUS_FLOAT_DIVIDE_BY_ZERO");
1159 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1161 case STATUS_INTEGER_DIVIDE_BY_ZERO:
1162 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_DIVIDE_BY_ZERO");
1163 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1165 case STATUS_INTEGER_OVERFLOW:
1166 DEBUG_EXCEPTION_SIMPLE ("STATUS_INTEGER_OVERFLOW");
1167 ourstatus->value.sig = TARGET_SIGNAL_FPE;
1169 case EXCEPTION_BREAKPOINT:
1170 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_BREAKPOINT");
1171 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
1174 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_C");
1175 ourstatus->value.sig = TARGET_SIGNAL_INT;
1177 case DBG_CONTROL_BREAK:
1178 DEBUG_EXCEPTION_SIMPLE ("DBG_CONTROL_BREAK");
1179 ourstatus->value.sig = TARGET_SIGNAL_INT;
1181 case EXCEPTION_SINGLE_STEP:
1182 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_SINGLE_STEP");
1183 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
1185 case EXCEPTION_ILLEGAL_INSTRUCTION:
1186 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_ILLEGAL_INSTRUCTION");
1187 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1189 case EXCEPTION_PRIV_INSTRUCTION:
1190 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_PRIV_INSTRUCTION");
1191 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1193 case EXCEPTION_NONCONTINUABLE_EXCEPTION:
1194 DEBUG_EXCEPTION_SIMPLE ("EXCEPTION_NONCONTINUABLE_EXCEPTION");
1195 ourstatus->value.sig = TARGET_SIGNAL_ILL;
1198 /* Treat unhandled first chance exceptions specially. */
1199 if (current_event.u.Exception.dwFirstChance)
1201 printf_unfiltered ("gdb: unknown target exception 0x%08lx at %s\n",
1202 current_event.u.Exception.ExceptionRecord.ExceptionCode,
1203 host_address_to_string (
1204 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
1205 ourstatus->value.sig = TARGET_SIGNAL_UNKNOWN;
1209 last_sig = ourstatus->value.sig;
1213 /* Resume all artificially suspended threads if we are continuing
1216 windows_continue (DWORD continue_status, int id)
1222 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%ld, ctid=%lx, %s);\n",
1223 current_event.dwProcessId, current_event.dwThreadId,
1224 continue_status == DBG_CONTINUE ?
1225 "DBG_CONTINUE" : "DBG_EXCEPTION_NOT_HANDLED"));
1227 for (th = &thread_head; (th = th->next) != NULL;)
1228 if ((id == -1 || id == (int) th->id)
1231 if (debug_registers_changed)
1233 th->context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1234 th->context.Dr0 = dr[0];
1235 th->context.Dr1 = dr[1];
1236 th->context.Dr2 = dr[2];
1237 th->context.Dr3 = dr[3];
1238 th->context.Dr6 = DR6_CLEAR_VALUE;
1239 th->context.Dr7 = dr[7];
1241 if (th->context.ContextFlags)
1243 CHECK (SetThreadContext (th->h, &th->context));
1244 th->context.ContextFlags = 0;
1246 if (th->suspended > 0)
1247 (void) ResumeThread (th->h);
1251 res = ContinueDebugEvent (current_event.dwProcessId,
1252 current_event.dwThreadId,
1255 debug_registers_changed = 0;
1259 /* Called in pathological case where Windows fails to send a
1260 CREATE_PROCESS_DEBUG_EVENT after an attach. */
1262 fake_create_process (void)
1264 current_process_handle = OpenProcess (PROCESS_ALL_ACCESS, FALSE,
1265 current_event.dwProcessId);
1266 if (current_process_handle != NULL)
1267 open_process_used = 1;
1270 error (_("OpenProcess call failed, GetLastError = %lud\n"),
1272 /* We can not debug anything in that case. */
1274 main_thread_id = current_event.dwThreadId;
1275 current_thread = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
1276 current_event.dwThreadId),
1277 current_event.u.CreateThread.hThread);
1278 return main_thread_id;
1282 windows_resume (struct target_ops *ops,
1283 ptid_t ptid, int step, enum target_signal sig)
1286 DWORD continue_status = DBG_CONTINUE;
1288 /* A specific PTID means `step only this thread id'. */
1289 int resume_all = ptid_equal (ptid, minus_one_ptid);
1291 /* If we're continuing all threads, it's the current inferior that
1292 should be handled specially. */
1294 ptid = inferior_ptid;
1296 if (sig != TARGET_SIGNAL_0)
1298 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
1300 DEBUG_EXCEPT(("Cannot continue with signal %d here.\n",sig));
1302 else if (sig == last_sig)
1303 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1306 /* This code does not seem to work, because
1307 the kernel does probably not consider changes in the ExceptionRecord
1308 structure when passing the exception to the inferior.
1309 Note that this seems possible in the exception handler itself. */
1312 for (i = 0; xlate[i].them != -1; i++)
1313 if (xlate[i].us == sig)
1315 current_event.u.Exception.ExceptionRecord.ExceptionCode =
1317 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1320 if (continue_status == DBG_CONTINUE)
1322 DEBUG_EXCEPT(("Cannot continue with signal %d.\n",sig));
1326 DEBUG_EXCEPT(("Can only continue with recieved signal %d.\n",
1330 last_sig = TARGET_SIGNAL_0;
1332 DEBUG_EXEC (("gdb: windows_resume (pid=%d, tid=%ld, step=%d, sig=%d);\n",
1333 ptid_get_pid (ptid), ptid_get_tid (ptid), step, sig));
1335 /* Get context for currently selected thread */
1336 th = thread_rec (ptid_get_tid (inferior_ptid), FALSE);
1341 /* Single step by setting t bit */
1342 struct regcache *regcache = get_current_regcache ();
1343 struct gdbarch *gdbarch = get_regcache_arch (regcache);
1344 windows_fetch_inferior_registers (ops, regcache,
1345 gdbarch_ps_regnum (gdbarch));
1346 th->context.EFlags |= FLAG_TRACE_BIT;
1349 if (th->context.ContextFlags)
1351 if (debug_registers_changed)
1353 th->context.Dr0 = dr[0];
1354 th->context.Dr1 = dr[1];
1355 th->context.Dr2 = dr[2];
1356 th->context.Dr3 = dr[3];
1357 th->context.Dr6 = DR6_CLEAR_VALUE;
1358 th->context.Dr7 = dr[7];
1360 CHECK (SetThreadContext (th->h, &th->context));
1361 th->context.ContextFlags = 0;
1365 /* Allow continuing with the same signal that interrupted us.
1366 Otherwise complain. */
1369 windows_continue (continue_status, -1);
1371 windows_continue (continue_status, ptid_get_tid (ptid));
1374 /* Ctrl-C handler used when the inferior is not run in the same console. The
1375 handler is in charge of interrupting the inferior using DebugBreakProcess.
1376 Note that this function is not available prior to Windows XP. In this case
1377 we emit a warning. */
1379 ctrl_c_handler (DWORD event_type)
1381 const int attach_flag = current_inferior ()->attach_flag;
1383 /* Only handle Ctrl-C and Ctrl-Break events. Ignore others. */
1384 if (event_type != CTRL_C_EVENT && event_type != CTRL_BREAK_EVENT)
1387 /* If the inferior and the debugger share the same console, do nothing as
1388 the inferior has also received the Ctrl-C event. */
1389 if (!new_console && !attach_flag)
1392 if (!DebugBreakProcess (current_process_handle))
1394 Could not interrupt program. Press Ctrl-c in the program console."));
1396 /* Return true to tell that Ctrl-C has been handled. */
1400 /* Get the next event from the child. Return 1 if the event requires
1401 handling by WFI (or whatever). */
1403 get_windows_debug_event (struct target_ops *ops,
1404 int pid, struct target_waitstatus *ourstatus)
1407 DWORD continue_status, event_code;
1409 static thread_info dummy_thread_info;
1412 last_sig = TARGET_SIGNAL_0;
1414 if (!(debug_event = WaitForDebugEvent (¤t_event, 1000)))
1418 continue_status = DBG_CONTINUE;
1420 event_code = current_event.dwDebugEventCode;
1421 ourstatus->kind = TARGET_WAITKIND_SPURIOUS;
1423 have_saved_context = 0;
1427 case CREATE_THREAD_DEBUG_EVENT:
1428 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
1429 (unsigned) current_event.dwProcessId,
1430 (unsigned) current_event.dwThreadId,
1431 "CREATE_THREAD_DEBUG_EVENT"));
1432 if (saw_create != 1)
1434 struct inferior *inf;
1435 inf = find_inferior_pid (current_event.dwProcessId);
1436 if (!saw_create && inf->attach_flag)
1438 /* Kludge around a Windows bug where first event is a create
1439 thread event. Caused when attached process does not have
1441 retval = fake_create_process ();
1447 /* Record the existence of this thread */
1448 retval = current_event.dwThreadId;
1449 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
1450 current_event.dwThreadId),
1451 current_event.u.CreateThread.hThread);
1454 case EXIT_THREAD_DEBUG_EVENT:
1455 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
1456 (unsigned) current_event.dwProcessId,
1457 (unsigned) current_event.dwThreadId,
1458 "EXIT_THREAD_DEBUG_EVENT"));
1460 if (current_event.dwThreadId != main_thread_id)
1462 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
1463 current_event.dwThreadId));
1464 th = &dummy_thread_info;
1468 case CREATE_PROCESS_DEBUG_EVENT:
1469 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
1470 (unsigned) current_event.dwProcessId,
1471 (unsigned) current_event.dwThreadId,
1472 "CREATE_PROCESS_DEBUG_EVENT"));
1473 CloseHandle (current_event.u.CreateProcessInfo.hFile);
1474 if (++saw_create != 1)
1477 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
1479 windows_delete_thread (ptid_build (current_event.dwProcessId, 0,
1481 main_thread_id = current_event.dwThreadId;
1482 /* Add the main thread */
1483 th = windows_add_thread (ptid_build (current_event.dwProcessId, 0,
1484 current_event.dwThreadId),
1485 current_event.u.CreateProcessInfo.hThread);
1486 retval = current_event.dwThreadId;
1489 case EXIT_PROCESS_DEBUG_EVENT:
1490 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
1491 (unsigned) current_event.dwProcessId,
1492 (unsigned) current_event.dwThreadId,
1493 "EXIT_PROCESS_DEBUG_EVENT"));
1494 if (!windows_initialization_done)
1496 target_terminal_ours ();
1497 target_mourn_inferior ();
1498 error (_("During startup program exited with code 0x%x."),
1499 (unsigned int) current_event.u.ExitProcess.dwExitCode);
1501 else if (saw_create == 1)
1503 ourstatus->kind = TARGET_WAITKIND_EXITED;
1504 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
1505 retval = main_thread_id;
1509 case LOAD_DLL_DEBUG_EVENT:
1510 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
1511 (unsigned) current_event.dwProcessId,
1512 (unsigned) current_event.dwThreadId,
1513 "LOAD_DLL_DEBUG_EVENT"));
1514 CloseHandle (current_event.u.LoadDll.hFile);
1515 if (saw_create != 1)
1517 catch_errors (handle_load_dll, NULL, (char *) "", RETURN_MASK_ALL);
1518 ourstatus->kind = TARGET_WAITKIND_LOADED;
1519 ourstatus->value.integer = 0;
1520 retval = main_thread_id;
1523 case UNLOAD_DLL_DEBUG_EVENT:
1524 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
1525 (unsigned) current_event.dwProcessId,
1526 (unsigned) current_event.dwThreadId,
1527 "UNLOAD_DLL_DEBUG_EVENT"));
1528 if (saw_create != 1)
1530 catch_errors (handle_unload_dll, NULL, (char *) "", RETURN_MASK_ALL);
1531 ourstatus->kind = TARGET_WAITKIND_LOADED;
1532 ourstatus->value.integer = 0;
1533 retval = main_thread_id;
1536 case EXCEPTION_DEBUG_EVENT:
1537 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
1538 (unsigned) current_event.dwProcessId,
1539 (unsigned) current_event.dwThreadId,
1540 "EXCEPTION_DEBUG_EVENT"));
1541 if (saw_create != 1)
1543 switch (handle_exception (ourstatus))
1546 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1549 retval = current_event.dwThreadId;
1553 continue_status = -1;
1558 case OUTPUT_DEBUG_STRING_EVENT: /* message from the kernel */
1559 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
1560 (unsigned) current_event.dwProcessId,
1561 (unsigned) current_event.dwThreadId,
1562 "OUTPUT_DEBUG_STRING_EVENT"));
1563 if (saw_create != 1)
1565 retval = handle_output_debug_string (ourstatus);
1569 if (saw_create != 1)
1571 printf_unfiltered ("gdb: kernel event for pid=%ld tid=%ld\n",
1572 (DWORD) current_event.dwProcessId,
1573 (DWORD) current_event.dwThreadId);
1574 printf_unfiltered (" unknown event code %ld\n",
1575 current_event.dwDebugEventCode);
1579 if (!retval || saw_create != 1)
1581 if (continue_status == -1)
1582 windows_resume (ops, minus_one_ptid, 0, 1);
1584 CHECK (windows_continue (continue_status, -1));
1588 inferior_ptid = ptid_build (current_event.dwProcessId, 0,
1590 current_thread = th ?: thread_rec (current_event.dwThreadId, TRUE);
1597 /* Wait for interesting events to occur in the target process. */
1599 windows_wait (struct target_ops *ops,
1600 ptid_t ptid, struct target_waitstatus *ourstatus, int options)
1604 target_terminal_ours ();
1606 /* We loop when we get a non-standard exception rather than return
1607 with a SPURIOUS because resume can try and step or modify things,
1608 which needs a current_thread->h. But some of these exceptions mark
1609 the birth or death of threads, which mean that the current thread
1610 isn't necessarily what you think it is. */
1616 /* If the user presses Ctrl-c while the debugger is waiting
1617 for an event, he expects the debugger to interrupt his program
1618 and to get the prompt back. There are two possible situations:
1620 - The debugger and the program do not share the console, in
1621 which case the Ctrl-c event only reached the debugger.
1622 In that case, the ctrl_c handler will take care of interrupting
1623 the inferior. Note that this case is working starting with
1624 Windows XP. For Windows 2000, Ctrl-C should be pressed in the
1627 - The debugger and the program share the same console, in which
1628 case both debugger and inferior will receive the Ctrl-c event.
1629 In that case the ctrl_c handler will ignore the event, as the
1630 Ctrl-c event generated inside the inferior will trigger the
1631 expected debug event.
1633 FIXME: brobecker/2008-05-20: If the inferior receives the
1634 signal first and the delay until GDB receives that signal
1635 is sufficiently long, GDB can sometimes receive the SIGINT
1636 after we have unblocked the CTRL+C handler. This would
1637 lead to the debugger stopping prematurely while handling
1638 the new-thread event that comes with the handling of the SIGINT
1639 inside the inferior, and then stop again immediately when
1640 the user tries to resume the execution in the inferior.
1641 This is a classic race that we should try to fix one day. */
1642 SetConsoleCtrlHandler (&ctrl_c_handler, TRUE);
1643 retval = get_windows_debug_event (ops, pid, ourstatus);
1644 SetConsoleCtrlHandler (&ctrl_c_handler, FALSE);
1647 return ptid_build (current_event.dwProcessId, 0, retval);
1652 if (deprecated_ui_loop_hook != NULL)
1653 detach = deprecated_ui_loop_hook (0);
1656 windows_kill_inferior (ops);
1662 do_initial_windows_stuff (struct target_ops *ops, DWORD pid, int attaching)
1664 extern int stop_after_trap;
1666 struct inferior *inf;
1667 struct thread_info *tp;
1669 last_sig = TARGET_SIGNAL_0;
1671 exception_count = 0;
1672 open_process_used = 0;
1673 debug_registers_changed = 0;
1674 debug_registers_used = 0;
1675 for (i = 0; i < sizeof (dr) / sizeof (dr[0]); i++)
1678 cygwin_load_start = cygwin_load_end = 0;
1680 current_event.dwProcessId = pid;
1681 memset (¤t_event, 0, sizeof (current_event));
1683 disable_breakpoints_in_shlibs ();
1684 windows_clear_solib ();
1685 clear_proceed_status ();
1686 init_wait_for_inferior ();
1688 inf = current_inferior ();
1689 inferior_appeared (inf, pid);
1690 inf->attach_flag = attaching;
1692 /* Make the new process the current inferior, so terminal handling
1693 can rely on it. When attaching, we don't know about any thread
1694 id here, but that's OK --- nothing should be referencing the
1695 current thread until we report an event out of windows_wait. */
1696 inferior_ptid = pid_to_ptid (pid);
1698 terminal_init_inferior_with_pgrp (pid);
1699 target_terminal_inferior ();
1701 windows_initialization_done = 0;
1702 inf->stop_soon = STOP_QUIETLY;
1705 stop_after_trap = 1;
1706 wait_for_inferior (0);
1707 tp = inferior_thread ();
1708 if (tp->stop_signal != TARGET_SIGNAL_TRAP)
1709 resume (0, tp->stop_signal);
1714 windows_initialization_done = 1;
1715 inf->stop_soon = NO_STOP_QUIETLY;
1716 stop_after_trap = 0;
1720 /* Try to set or remove a user privilege to the current process. Return -1
1721 if that fails, the previous setting of that privilege otherwise.
1723 This code is copied from the Cygwin source code and rearranged to allow
1724 dynamically loading of the needed symbols from advapi32 which is only
1725 available on NT/2K/XP. */
1727 set_process_privilege (const char *privilege, BOOL enable)
1729 HANDLE token_hdl = NULL;
1731 TOKEN_PRIVILEGES new_priv, orig_priv;
1735 if (!OpenProcessToken (GetCurrentProcess (),
1736 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
1740 if (!LookupPrivilegeValueA (NULL, privilege, &restore_priv))
1743 new_priv.PrivilegeCount = 1;
1744 new_priv.Privileges[0].Luid = restore_priv;
1745 new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0;
1747 if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv,
1748 sizeof orig_priv, &orig_priv, &size))
1751 /* Disabled, otherwise every `attach' in an unprivileged user session
1752 would raise the "Failed to get SE_DEBUG_NAME privilege" warning in
1753 windows_attach(). */
1754 /* AdjustTokenPrivileges returns TRUE even if the privilege could not
1755 be enabled. GetLastError () returns an correct error code, though. */
1756 if (enable && GetLastError () == ERROR_NOT_ALL_ASSIGNED)
1760 ret = orig_priv.Privileges[0].Attributes == SE_PRIVILEGE_ENABLED ? 1 : 0;
1764 CloseHandle (token_hdl);
1769 /* Attach to process PID, then initialize for debugging it. */
1771 windows_attach (struct target_ops *ops, char *args, int from_tty)
1776 pid = parse_pid_to_attach (args);
1778 if (set_process_privilege (SE_DEBUG_NAME, TRUE) < 0)
1780 printf_unfiltered ("Warning: Failed to get SE_DEBUG_NAME privilege\n");
1781 printf_unfiltered ("This can cause attach to fail on Windows NT/2K/XP\n");
1784 windows_init_thread_list ();
1785 ok = DebugActiveProcess (pid);
1791 /* Try fall back to Cygwin pid */
1792 pid = cygwin_internal (CW_CYGWIN_PID_TO_WINPID, pid);
1795 ok = DebugActiveProcess (pid);
1800 error (_("Can't attach to process."));
1802 DebugSetProcessKillOnExit (FALSE);
1806 char *exec_file = (char *) get_exec_file (0);
1809 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
1810 target_pid_to_str (pid_to_ptid (pid)));
1812 printf_unfiltered ("Attaching to %s\n",
1813 target_pid_to_str (pid_to_ptid (pid)));
1815 gdb_flush (gdb_stdout);
1818 do_initial_windows_stuff (ops, pid, 1);
1819 target_terminal_ours ();
1823 windows_detach (struct target_ops *ops, char *args, int from_tty)
1828 windows_resume (ops, ptid, 0, TARGET_SIGNAL_0);
1830 if (!DebugActiveProcessStop (current_event.dwProcessId))
1832 error (_("Can't detach process %lu (error %lu)"),
1833 current_event.dwProcessId, GetLastError ());
1836 DebugSetProcessKillOnExit (FALSE);
1838 if (detached && from_tty)
1840 char *exec_file = get_exec_file (0);
1843 printf_unfiltered ("Detaching from program: %s, Pid %lu\n", exec_file,
1844 current_event.dwProcessId);
1845 gdb_flush (gdb_stdout);
1848 inferior_ptid = null_ptid;
1849 detach_inferior (current_event.dwProcessId);
1851 unpush_target (ops);
1855 windows_pid_to_exec_file (int pid)
1857 static char path[__PMAX];
1859 /* Try to find exe name as symlink target of /proc/<pid>/exe */
1861 char procexe[sizeof ("/proc/4294967295/exe")];
1862 sprintf (procexe, "/proc/%u/exe", pid);
1863 nchars = readlink (procexe, path, sizeof(path));
1864 if (nchars > 0 && nchars < sizeof (path))
1866 path[nchars] = '\0'; /* Got it */
1871 /* If we get here then either Cygwin is hosed, this isn't a Cygwin version
1872 of gdb, or we're trying to debug a non-Cygwin windows executable. */
1873 if (!get_module_name (0, path))
1879 /* Print status information about what we're accessing. */
1882 windows_files_info (struct target_ops *ignore)
1884 struct inferior *inf = current_inferior ();
1886 printf_unfiltered ("\tUsing the running image of %s %s.\n",
1887 inf->attach_flag ? "attached" : "child",
1888 target_pid_to_str (inferior_ptid));
1892 windows_open (char *arg, int from_tty)
1894 error (_("Use the \"run\" command to start a Unix child process."));
1897 /* Start an inferior windows child process and sets inferior_ptid to its pid.
1898 EXEC_FILE is the file to run.
1899 ALLARGS is a string containing the arguments to the program.
1900 ENV is the environment vector to pass. Errors reported with error(). */
1903 windows_create_inferior (struct target_ops *ops, char *exec_file,
1904 char *allargs, char **in_env, int from_tty)
1908 cygwin_buf_t real_path[__PMAX];
1909 cygwin_buf_t shell[__PMAX]; /* Path to shell */
1911 cygwin_buf_t *toexec;
1912 cygwin_buf_t *cygallargs;
1916 int ostdin, ostdout, ostderr;
1918 char real_path[__PMAX];
1919 char shell[__PMAX]; /* Path to shell */
1924 PROCESS_INFORMATION pi;
1927 const char *inferior_io_terminal = get_inferior_io_terminal ();
1930 error (_("No executable specified, use `target exec'."));
1932 memset (&si, 0, sizeof (si));
1933 si.cb = sizeof (si);
1936 flags |= CREATE_NEW_PROCESS_GROUP;
1939 flags |= CREATE_NEW_CONSOLE;
1944 flags |= DEBUG_ONLY_THIS_PROCESS;
1945 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, exec_file, real_path,
1946 __PMAX * sizeof (cygwin_buf_t)) < 0)
1947 error (_("Error starting executable: %d"), errno);
1950 len = mbstowcs (NULL, allargs, 0) + 1;
1951 if (len == (size_t) -1)
1952 error (_("Error starting executable: %d"), errno);
1953 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
1954 mbstowcs (cygallargs, allargs, len);
1956 cygallargs = allargs;
1961 sh = getenv ("SHELL");
1964 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, sh, shell, __PMAX) < 0)
1965 error (_("Error starting executable via shell: %d"), errno);
1967 len = sizeof (L" -c 'exec '") + mbstowcs (NULL, exec_file, 0)
1968 + mbstowcs (NULL, allargs, 0) + 2;
1969 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
1970 swprintf (cygallargs, len, L" -c 'exec %s %s'", exec_file, allargs);
1972 cygallargs = (char *) alloca (sizeof (" -c 'exec '") + strlen (exec_file)
1973 + strlen (allargs) + 2);
1974 sprintf (cygallargs, " -c 'exec %s %s'", exec_file, allargs);
1977 flags |= DEBUG_PROCESS;
1981 args = (cygwin_buf_t *) alloca ((wcslen (toexec) + wcslen (cygallargs) + 2)
1982 * sizeof (wchar_t));
1983 wcscpy (args, toexec);
1984 wcscat (args, L" ");
1985 wcscat (args, cygallargs);
1987 args = (cygwin_buf_t *) alloca (strlen (toexec) + strlen (cygallargs) + 2);
1988 strcpy (args, toexec);
1990 strcat (args, cygallargs);
1993 /* Prepare the environment vars for CreateProcess. */
1994 cygwin_internal (CW_SYNC_WINENV);
1996 if (!inferior_io_terminal)
1997 tty = ostdin = ostdout = ostderr = -1;
2000 tty = open (inferior_io_terminal, O_RDWR | O_NOCTTY);
2003 print_sys_errmsg (inferior_io_terminal, errno);
2004 ostdin = ostdout = ostderr = -1;
2017 windows_init_thread_list ();
2018 ret = CreateProcess (0,
2019 args, /* command line */
2020 NULL, /* Security */
2022 TRUE, /* inherit handles */
2023 flags, /* start flags */
2024 NULL, /* environment */
2025 NULL, /* current directory */
2040 args = alloca (strlen (toexec) + strlen (allargs) + 2);
2041 strcpy (args, toexec);
2043 strcat (args, allargs);
2045 flags |= DEBUG_ONLY_THIS_PROCESS;
2047 if (!inferior_io_terminal)
2048 tty = INVALID_HANDLE_VALUE;
2051 SECURITY_ATTRIBUTES sa;
2052 sa.nLength = sizeof(sa);
2053 sa.lpSecurityDescriptor = 0;
2054 sa.bInheritHandle = TRUE;
2055 tty = CreateFileA (inferior_io_terminal, GENERIC_READ | GENERIC_WRITE,
2056 0, &sa, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
2057 if (tty == INVALID_HANDLE_VALUE)
2058 warning (_("Warning: Failed to open TTY %s, error %#x."),
2059 inferior_io_terminal, (unsigned) GetLastError ());
2063 si.hStdOutput = tty;
2065 si.dwFlags |= STARTF_USESTDHANDLES;
2069 windows_init_thread_list ();
2070 ret = CreateProcessA (0,
2071 args, /* command line */
2072 NULL, /* Security */
2074 TRUE, /* inherit handles */
2075 flags, /* start flags */
2076 NULL, /* environment */
2077 NULL, /* current directory */
2080 if (tty != INVALID_HANDLE_VALUE)
2085 error (_("Error creating process %s, (error %d)."),
2086 exec_file, (unsigned) GetLastError ());
2088 CloseHandle (pi.hThread);
2089 CloseHandle (pi.hProcess);
2091 if (useshell && shell[0] != '\0')
2096 do_initial_windows_stuff (ops, pi.dwProcessId, 0);
2098 /* windows_continue (DBG_CONTINUE, -1); */
2102 windows_mourn_inferior (struct target_ops *ops)
2104 (void) windows_continue (DBG_CONTINUE, -1);
2105 i386_cleanup_dregs();
2106 if (open_process_used)
2108 CHECK (CloseHandle (current_process_handle));
2109 open_process_used = 0;
2111 unpush_target (ops);
2112 generic_mourn_inferior ();
2115 /* Send a SIGINT to the process group. This acts just like the user typed a
2116 ^C on the controlling terminal. */
2119 windows_stop (ptid_t ptid)
2121 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
2122 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
2123 registers_changed (); /* refresh register state */
2127 windows_xfer_memory (CORE_ADDR memaddr, gdb_byte *our, int len,
2128 int write, struct mem_attrib *mem,
2129 struct target_ops *target)
2134 DEBUG_MEM (("gdb: write target memory, %d bytes at 0x%08lx\n",
2135 len, (DWORD) (uintptr_t) memaddr));
2136 if (!WriteProcessMemory (current_process_handle,
2137 (LPVOID) (uintptr_t) memaddr, our,
2140 FlushInstructionCache (current_process_handle,
2141 (LPCVOID) (uintptr_t) memaddr, len);
2145 DEBUG_MEM (("gdb: read target memory, %d bytes at 0x%08lx\n",
2146 len, (DWORD) (uintptr_t) memaddr));
2147 if (!ReadProcessMemory (current_process_handle,
2148 (LPCVOID) (uintptr_t) memaddr, our,
2156 windows_kill_inferior (struct target_ops *ops)
2158 CHECK (TerminateProcess (current_process_handle, 0));
2162 if (!windows_continue (DBG_CONTINUE, -1))
2164 if (!WaitForDebugEvent (¤t_event, INFINITE))
2166 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
2170 target_mourn_inferior (); /* or just windows_mourn_inferior? */
2174 windows_prepare_to_store (struct regcache *regcache)
2176 /* Do nothing, since we can store individual regs */
2180 windows_can_run (void)
2186 windows_close (int x)
2188 DEBUG_EVENTS (("gdb: windows_close, inferior_ptid=%d\n",
2189 PIDGET (inferior_ptid)));
2192 /* Convert pid to printable format. */
2194 windows_pid_to_str (struct target_ops *ops, ptid_t ptid)
2196 static char buf[80];
2198 if (ptid_get_tid (ptid) != 0)
2200 snprintf (buf, sizeof (buf), "Thread %d.0x%lx",
2201 ptid_get_pid (ptid), ptid_get_tid (ptid));
2205 return normal_pid_to_str (ptid);
2209 windows_xfer_shared_libraries (struct target_ops *ops,
2210 enum target_object object, const char *annex,
2211 gdb_byte *readbuf, const gdb_byte *writebuf,
2212 ULONGEST offset, LONGEST len)
2214 struct obstack obstack;
2222 obstack_init (&obstack);
2223 obstack_grow_str (&obstack, "<library-list>\n");
2224 for (so = solib_start.next; so; so = so->next)
2225 windows_xfer_shared_library (so->so_name, (CORE_ADDR) (uintptr_t) so->lm_info->load_addr,
2226 target_gdbarch, &obstack);
2227 obstack_grow_str0 (&obstack, "</library-list>\n");
2229 buf = obstack_finish (&obstack);
2230 len_avail = strlen (buf);
2231 if (offset >= len_avail)
2234 if (len > len_avail - offset)
2235 len = len_avail - offset;
2236 memcpy (readbuf, buf + offset, len);
2238 obstack_free (&obstack, NULL);
2243 windows_xfer_partial (struct target_ops *ops, enum target_object object,
2244 const char *annex, gdb_byte *readbuf,
2245 const gdb_byte *writebuf, ULONGEST offset, LONGEST len)
2249 case TARGET_OBJECT_MEMORY:
2251 return (*ops->deprecated_xfer_memory) (offset, readbuf,
2252 len, 0/*read*/, NULL, ops);
2254 return (*ops->deprecated_xfer_memory) (offset, (gdb_byte *) writebuf,
2255 len, 1/*write*/, NULL, ops);
2258 case TARGET_OBJECT_LIBRARIES:
2259 return windows_xfer_shared_libraries (ops, object, annex, readbuf,
2260 writebuf, offset, len);
2263 if (ops->beneath != NULL)
2264 return ops->beneath->to_xfer_partial (ops->beneath, object, annex,
2265 readbuf, writebuf, offset, len);
2271 windows_get_ada_task_ptid (long lwp, long thread)
2273 return ptid_build (ptid_get_pid (inferior_ptid), 0, lwp);
2277 init_windows_ops (void)
2279 windows_ops.to_shortname = "child";
2280 windows_ops.to_longname = "Win32 child process";
2281 windows_ops.to_doc = "Win32 child process (started by the \"run\" command).";
2282 windows_ops.to_open = windows_open;
2283 windows_ops.to_close = windows_close;
2284 windows_ops.to_attach = windows_attach;
2285 windows_ops.to_attach_no_wait = 1;
2286 windows_ops.to_detach = windows_detach;
2287 windows_ops.to_resume = windows_resume;
2288 windows_ops.to_wait = windows_wait;
2289 windows_ops.to_fetch_registers = windows_fetch_inferior_registers;
2290 windows_ops.to_store_registers = windows_store_inferior_registers;
2291 windows_ops.to_prepare_to_store = windows_prepare_to_store;
2292 windows_ops.deprecated_xfer_memory = windows_xfer_memory;
2293 windows_ops.to_xfer_partial = windows_xfer_partial;
2294 windows_ops.to_files_info = windows_files_info;
2295 windows_ops.to_insert_breakpoint = memory_insert_breakpoint;
2296 windows_ops.to_remove_breakpoint = memory_remove_breakpoint;
2297 windows_ops.to_terminal_init = terminal_init_inferior;
2298 windows_ops.to_terminal_inferior = terminal_inferior;
2299 windows_ops.to_terminal_ours_for_output = terminal_ours_for_output;
2300 windows_ops.to_terminal_ours = terminal_ours;
2301 windows_ops.to_terminal_save_ours = terminal_save_ours;
2302 windows_ops.to_terminal_info = child_terminal_info;
2303 windows_ops.to_kill = windows_kill_inferior;
2304 windows_ops.to_create_inferior = windows_create_inferior;
2305 windows_ops.to_mourn_inferior = windows_mourn_inferior;
2306 windows_ops.to_can_run = windows_can_run;
2307 windows_ops.to_thread_alive = windows_thread_alive;
2308 windows_ops.to_pid_to_str = windows_pid_to_str;
2309 windows_ops.to_stop = windows_stop;
2310 windows_ops.to_stratum = process_stratum;
2311 windows_ops.to_has_all_memory = default_child_has_all_memory;
2312 windows_ops.to_has_memory = default_child_has_memory;
2313 windows_ops.to_has_stack = default_child_has_stack;
2314 windows_ops.to_has_registers = default_child_has_registers;
2315 windows_ops.to_has_execution = default_child_has_execution;
2316 windows_ops.to_pid_to_exec_file = windows_pid_to_exec_file;
2317 windows_ops.to_get_ada_task_ptid = windows_get_ada_task_ptid;
2319 i386_use_watchpoints (&windows_ops);
2321 i386_dr_low.set_control = cygwin_set_dr7;
2322 i386_dr_low.set_addr = cygwin_set_dr;
2323 i386_dr_low.reset_addr = NULL;
2324 i386_dr_low.get_status = cygwin_get_dr6;
2326 /* i386_dr_low.debug_register_length field is set by
2327 calling i386_set_debug_register_length function
2328 in processor windows specific native file. */
2330 windows_ops.to_magic = OPS_MAGIC;
2334 set_windows_aliases (char *argv0)
2336 add_info_alias ("dll", "sharedlibrary", 1);
2340 _initialize_windows_nat (void)
2342 struct cmd_list_element *c;
2344 init_windows_ops ();
2347 cygwin_internal (CW_SET_DOS_FILE_WARNING, 0);
2350 c = add_com ("dll-symbols", class_files, dll_symbol_command,
2351 _("Load dll library symbols from FILE."));
2352 set_cmd_completer (c, filename_completer);
2354 add_com_alias ("sharedlibrary", "dll-symbols", class_alias, 1);
2356 add_com_alias ("add-shared-symbol-files", "dll-symbols", class_alias, 1);
2358 add_com_alias ("assf", "dll-symbols", class_alias, 1);
2361 add_setshow_boolean_cmd ("shell", class_support, &useshell, _("\
2362 Set use of shell to start subprocess."), _("\
2363 Show use of shell to start subprocess."), NULL,
2365 NULL, /* FIXME: i18n: */
2366 &setlist, &showlist);
2368 add_setshow_boolean_cmd ("cygwin-exceptions", class_support, &cygwin_exceptions, _("\
2369 Break when an exception is detected in the Cygwin DLL itself."), _("\
2370 Show whether gdb breaks on exceptions in the Cygwin DLL itself."), NULL,
2372 NULL, /* FIXME: i18n: */
2373 &setlist, &showlist);
2376 add_setshow_boolean_cmd ("new-console", class_support, &new_console, _("\
2377 Set creation of new console when creating child process."), _("\
2378 Show creation of new console when creating child process."), NULL,
2380 NULL, /* FIXME: i18n: */
2381 &setlist, &showlist);
2383 add_setshow_boolean_cmd ("new-group", class_support, &new_group, _("\
2384 Set creation of new group when creating child process."), _("\
2385 Show creation of new group when creating child process."), NULL,
2387 NULL, /* FIXME: i18n: */
2388 &setlist, &showlist);
2390 add_setshow_boolean_cmd ("debugexec", class_support, &debug_exec, _("\
2391 Set whether to display execution in child process."), _("\
2392 Show whether to display execution in child process."), NULL,
2394 NULL, /* FIXME: i18n: */
2395 &setlist, &showlist);
2397 add_setshow_boolean_cmd ("debugevents", class_support, &debug_events, _("\
2398 Set whether to display kernel events in child process."), _("\
2399 Show whether to display kernel events in child process."), NULL,
2401 NULL, /* FIXME: i18n: */
2402 &setlist, &showlist);
2404 add_setshow_boolean_cmd ("debugmemory", class_support, &debug_memory, _("\
2405 Set whether to display memory accesses in child process."), _("\
2406 Show whether to display memory accesses in child process."), NULL,
2408 NULL, /* FIXME: i18n: */
2409 &setlist, &showlist);
2411 add_setshow_boolean_cmd ("debugexceptions", class_support,
2412 &debug_exceptions, _("\
2413 Set whether to display kernel exceptions in child process."), _("\
2414 Show whether to display kernel exceptions in child process."), NULL,
2416 NULL, /* FIXME: i18n: */
2417 &setlist, &showlist);
2419 add_prefix_cmd ("w32", class_info, info_w32_command,
2420 _("Print information specific to Win32 debugging."),
2421 &info_w32_cmdlist, "info w32 ", 0, &infolist);
2423 add_cmd ("selector", class_info, display_selectors,
2424 _("Display selectors infos."),
2426 add_target (&windows_ops);
2427 deprecated_init_ui_hook = set_windows_aliases;
2430 /* Hardware watchpoint support, adapted from go32-nat.c code. */
2432 /* Pass the address ADDR to the inferior in the I'th debug register.
2433 Here we just store the address in dr array, the registers will be
2434 actually set up when windows_continue is called. */
2436 cygwin_set_dr (int i, CORE_ADDR addr)
2439 internal_error (__FILE__, __LINE__,
2440 _("Invalid register %d in cygwin_set_dr.\n"), i);
2442 debug_registers_changed = 1;
2443 debug_registers_used = 1;
2446 /* Pass the value VAL to the inferior in the DR7 debug control
2447 register. Here we just store the address in D_REGS, the watchpoint
2448 will be actually set up in windows_wait. */
2450 cygwin_set_dr7 (unsigned long val)
2452 dr[7] = (CORE_ADDR) val;
2453 debug_registers_changed = 1;
2454 debug_registers_used = 1;
2457 /* Get the value of the DR6 debug status register from the inferior.
2458 Here we just return the value stored in dr[6]
2459 by the last call to thread_rec for current_event.dwThreadId id. */
2460 static unsigned long
2461 cygwin_get_dr6 (void)
2463 return (unsigned long) dr[6];
2466 /* Determine if the thread referenced by "ptid" is alive
2467 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
2468 it means that the thread has died. Otherwise it is assumed to be alive. */
2470 windows_thread_alive (struct target_ops *ops, ptid_t ptid)
2474 gdb_assert (ptid_get_tid (ptid) != 0);
2475 tid = ptid_get_tid (ptid);
2477 return WaitForSingleObject (thread_rec (tid, FALSE)->h, 0) == WAIT_OBJECT_0 ?
2482 _initialize_check_for_gdb_ini (void)
2485 if (inhibit_gdbinit)
2488 homedir = getenv ("HOME");
2492 char *oldini = (char *) alloca (strlen (homedir) +
2493 sizeof ("/gdb.ini"));
2494 strcpy (oldini, homedir);
2495 p = strchr (oldini, '\0');
2496 if (p > oldini && p[-1] != '/')
2498 strcpy (p, "gdb.ini");
2499 if (access (oldini, 0) == 0)
2501 int len = strlen (oldini);
2502 char *newini = alloca (len + 1);
2503 sprintf (newini, "%.*s.gdbinit",
2504 (int) (len - (sizeof ("gdb.ini") - 1)), oldini);
2505 warning (_("obsolete '%s' found. Rename to '%s'."), oldini, newini);
2510 /* Define dummy functions which always return error for the rare cases where
2511 these functions could not be found. */
2513 bad_DebugActiveProcessStop (DWORD w)
2518 bad_DebugBreakProcess (HANDLE w)
2523 bad_DebugSetProcessKillOnExit (BOOL w)
2528 bad_EnumProcessModules (HANDLE w, HMODULE *x, DWORD y, LPDWORD z)
2535 bad_GetModuleFileNameExW (HANDLE w, HMODULE x, LPWSTR y, DWORD z)
2541 bad_GetModuleFileNameExA (HANDLE w, HMODULE x, LPSTR y, DWORD z)
2548 bad_GetModuleInformation (HANDLE w, HMODULE x, LPMODULEINFO y, DWORD z)
2554 bad_OpenProcessToken (HANDLE w, DWORD x, PHANDLE y)
2559 /* Load any functions which may not be available in ancient versions
2562 _initialize_loadable (void)
2566 hm = LoadLibrary ("kernel32.dll");
2569 DebugActiveProcessStop = (void *)
2570 GetProcAddress (hm, "DebugActiveProcessStop");
2571 DebugBreakProcess = (void *)
2572 GetProcAddress (hm, "DebugBreakProcess");
2573 DebugSetProcessKillOnExit = (void *)
2574 GetProcAddress (hm, "DebugSetProcessKillOnExit");
2577 /* Set variables to dummy versions of these processes if the function
2578 wasn't found in kernel32.dll. */
2579 if (!DebugBreakProcess)
2580 DebugBreakProcess = bad_DebugBreakProcess;
2581 if (!DebugActiveProcessStop || !DebugSetProcessKillOnExit)
2583 DebugActiveProcessStop = bad_DebugActiveProcessStop;
2584 DebugSetProcessKillOnExit = bad_DebugSetProcessKillOnExit;
2587 /* Load optional functions used for retrieving filename information
2588 associated with the currently debugged process or its dlls. */
2589 hm = LoadLibrary ("psapi.dll");
2592 EnumProcessModules = (void *)
2593 GetProcAddress (hm, "EnumProcessModules");
2594 GetModuleInformation = (void *)
2595 GetProcAddress (hm, "GetModuleInformation");
2596 GetModuleFileNameEx = (void *)
2597 GetProcAddress (hm, GetModuleFileNameEx_name);
2600 if (!EnumProcessModules || !GetModuleInformation || !GetModuleFileNameEx)
2602 /* Set variables to dummy versions of these processes if the function
2603 wasn't found in psapi.dll. */
2604 EnumProcessModules = bad_EnumProcessModules;
2605 GetModuleInformation = bad_GetModuleInformation;
2606 GetModuleFileNameEx = bad_GetModuleFileNameEx;
2607 /* This will probably fail on Windows 9x/Me. Let the user know that we're
2608 missing some functionality. */
2609 warning(_("cannot automatically find executable file or library to read symbols.\nUse \"file\" or \"dll\" command to load executable/libraries directly."));
2612 hm = LoadLibrary ("advapi32.dll");
2615 OpenProcessToken = (void *) GetProcAddress (hm, "OpenProcessToken");
2616 LookupPrivilegeValueA = (void *)
2617 GetProcAddress (hm, "LookupPrivilegeValueA");
2618 AdjustTokenPrivileges = (void *)
2619 GetProcAddress (hm, "AdjustTokenPrivileges");
2620 /* Only need to set one of these since if OpenProcessToken fails nothing
2622 if (!OpenProcessToken || !LookupPrivilegeValueA || !AdjustTokenPrivileges)
2623 OpenProcessToken = bad_OpenProcessToken;