1 /* Target-vector operations for controlling win32 child processes, for GDB.
2 Copyright 1995, 1996, 1997, 1998, 1999, 2000 Free Software Foundation, Inc.
3 Contributed by Cygnus Solutions, A Red Hat Company.
5 This file is part of GDB.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without eve nthe implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330,
20 Boston, MA 02111-1307, USA.
23 /* by Steve Chamberlain, sac@cygnus.com */
25 /* We assume we're being built with and will be used for cygwin. */
28 #include "frame.h" /* required by inferior.h */
34 #include <sys/types.h>
40 #else /* other WIN32 compiler */
48 #include "gdb_string.h"
49 #include "gdbthread.h"
51 #include <sys/param.h>
54 /* The ui's event loop. */
55 extern int (*ui_loop_hook) PARAMS ((int signo));
57 /* If we're not using the old Cygwin header file set, define the
58 following which never should have been in the generic Win32 API
59 headers in the first place since they were our own invention... */
60 #ifndef _GNU_H_WINDOWS_H
61 #define FLAG_TRACE_BIT 0x100
62 #define CONTEXT_DEBUGGER (CONTEXT_FULL | CONTEXT_FLOATING_POINT)
65 /* The string sent by cygwin when it processes a signal.
66 FIXME: This should be in a cygwin include file. */
67 #define CYGWIN_SIGNAL_STRING "cygwin: signal"
69 #define CHECK(x) check (x, __FILE__,__LINE__)
70 #define DEBUG_EXEC(x) if (debug_exec) printf x
71 #define DEBUG_EVENTS(x) if (debug_events) printf x
72 #define DEBUG_MEM(x) if (debug_memory) printf x
73 #define DEBUG_EXCEPT(x) if (debug_exceptions) printf x
75 /* Forward declaration */
76 extern struct target_ops child_ops;
78 static void child_stop PARAMS ((void));
79 static int win32_child_thread_alive PARAMS ((int));
80 void child_kill_inferior PARAMS ((void));
82 /* Thread information structure used to track information that is
83 not available in gdb's thread structure. */
84 typedef struct thread_info_struct
86 struct thread_info_struct *next;
95 static thread_info thread_head = {NULL};
97 /* The saved state for a continue after breaking back to gdb. */
98 static DWORD continue_status;
100 /* The process and thread handles for the above context. */
102 static DEBUG_EVENT current_event; /* The current debug event from
104 static HANDLE current_process_handle; /* Currently executing process */
105 static thread_info *current_thread; /* Info on currently selected thread */
106 static DWORD main_thread_id; /* Thread ID of the main thread */
108 /* Counts of things. */
109 static int exception_count = 0;
110 static int event_count = 0;
113 static int new_console = 0;
114 static int new_group = 1;
115 static int debug_exec = 0; /* show execution */
116 static int debug_events = 0; /* show events from kernel */
117 static int debug_memory = 0; /* show target memory accesses */
118 static int debug_exceptions = 0; /* show target exceptions */
120 /* This vector maps GDB's idea of a register's number into an address
121 in the win32 exception context vector.
123 It also contains the bit mask needed to load the register in question.
125 One day we could read a reg, we could inspect the context we
126 already have loaded, if it doesn't have the bit set that we need,
127 we read that set of registers in using GetThreadContext. If the
128 context already contains what we need, we just unpack it. Then to
129 write a register, first we have to ensure that the context contains
130 the other regs of the group, and then we copy the info in and set
133 #define context_offset(x) ((int)&(((CONTEXT *)NULL)->x))
134 static const int mappings[] =
136 context_offset (Eax),
137 context_offset (Ecx),
138 context_offset (Edx),
139 context_offset (Ebx),
140 context_offset (Esp),
141 context_offset (Ebp),
142 context_offset (Esi),
143 context_offset (Edi),
144 context_offset (Eip),
145 context_offset (EFlags),
146 context_offset (SegCs),
147 context_offset (SegSs),
148 context_offset (SegDs),
149 context_offset (SegEs),
150 context_offset (SegFs),
151 context_offset (SegGs),
152 context_offset (FloatSave.RegisterArea[0 * 10]),
153 context_offset (FloatSave.RegisterArea[1 * 10]),
154 context_offset (FloatSave.RegisterArea[2 * 10]),
155 context_offset (FloatSave.RegisterArea[3 * 10]),
156 context_offset (FloatSave.RegisterArea[4 * 10]),
157 context_offset (FloatSave.RegisterArea[5 * 10]),
158 context_offset (FloatSave.RegisterArea[6 * 10]),
159 context_offset (FloatSave.RegisterArea[7 * 10]),
160 context_offset (FloatSave.ControlWord),
161 context_offset (FloatSave.StatusWord),
162 context_offset (FloatSave.TagWord),
163 context_offset (FloatSave.ErrorSelector),
164 context_offset (FloatSave.ErrorOffset),
165 context_offset (FloatSave.DataSelector),
166 context_offset (FloatSave.DataOffset),
167 context_offset (FloatSave.ErrorSelector)
170 #undef context_offset
172 /* This vector maps the target's idea of an exception (extracted
173 from the DEBUG_EVENT structure) to GDB's idea. */
175 struct xlate_exception
178 enum target_signal us;
181 static const struct xlate_exception
184 {EXCEPTION_ACCESS_VIOLATION, TARGET_SIGNAL_SEGV},
185 {STATUS_STACK_OVERFLOW, TARGET_SIGNAL_SEGV},
186 {EXCEPTION_BREAKPOINT, TARGET_SIGNAL_TRAP},
187 {DBG_CONTROL_C, TARGET_SIGNAL_INT},
188 {EXCEPTION_SINGLE_STEP, TARGET_SIGNAL_TRAP},
191 /* Find a thread record given a thread id.
192 If get_context then also retrieve the context for this
195 thread_rec (DWORD id, int get_context)
199 for (th = &thread_head; (th = th->next) != NULL;)
202 if (!th->suspend_count && get_context)
205 th->suspend_count = SuspendThread (th->h) + 1;
206 else if (get_context < 0)
207 th->suspend_count = -1;
209 th->context.ContextFlags = CONTEXT_DEBUGGER;
210 GetThreadContext (th->h, &th->context);
218 /* Add a thread to the thread list */
220 child_add_thread (DWORD id, HANDLE h)
224 if ((th = thread_rec (id, FALSE)))
227 th = (thread_info *) xmalloc (sizeof (*th));
228 memset (th, 0, sizeof (*th));
231 th->next = thread_head.next;
232 thread_head.next = th;
237 /* Clear out any old thread list and reintialize it to a
240 child_init_thread_list ()
242 thread_info *th = &thread_head;
244 DEBUG_EVENTS (("gdb: child_init_thread_list\n"));
246 while (th->next != NULL)
248 thread_info *here = th->next;
249 th->next = here->next;
250 (void) CloseHandle (here->h);
255 /* Delete a thread from the list of threads */
257 child_delete_thread (DWORD id)
262 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (id));
265 for (th = &thread_head;
266 th->next != NULL && th->next->id != id;
270 if (th->next != NULL)
272 thread_info *here = th->next;
273 th->next = here->next;
274 CloseHandle (here->h);
280 check (BOOL ok, const char *file, int line)
283 printf_filtered ("error return %s:%d was %d\n", file, line, GetLastError ());
287 do_child_fetch_inferior_registers (int r)
289 char *context_offset = ((char *) ¤t_thread->context) + mappings[r];
293 l = *((long *)context_offset) & 0xffff;
294 supply_register (r, (char *) &l);
296 else if (r == FOP_REGNUM)
298 l = (*((long *)context_offset) >> 16) & ((1 << 11) - 1);
299 supply_register (r, (char *) &l);
302 supply_register (r, context_offset);
305 for (r = 0; r < NUM_REGS; r++)
306 do_child_fetch_inferior_registers (r);
311 child_fetch_inferior_registers (int r)
313 current_thread = thread_rec (inferior_pid, TRUE);
314 do_child_fetch_inferior_registers (r);
318 do_child_store_inferior_registers (int r)
321 read_register_gen (r, ((char *) ¤t_thread->context) + mappings[r]);
324 for (r = 0; r < NUM_REGS; r++)
325 do_child_store_inferior_registers (r);
329 /* Store a new register value into the current thread context */
331 child_store_inferior_registers (int r)
333 current_thread = thread_rec (inferior_pid, TRUE);
334 do_child_store_inferior_registers (r);
338 static int psapi_loaded = 0;
339 static HMODULE psapi_module_handle = NULL;
340 static BOOL WINAPI (*psapi_EnumProcessModules)(HANDLE, HMODULE*, DWORD, LPDWORD)= NULL;
341 static BOOL WINAPI (*psapi_GetModuleInformation) (HANDLE, HMODULE, LPMODULEINFO, DWORD)= NULL;
342 static DWORD WINAPI (*psapi_GetModuleFileNameExA) (HANDLE, HMODULE, LPSTR, DWORD)= NULL;
344 int psapi_get_dll_name (DWORD BaseAddress, char *dll_name_ret)
349 HMODULE dh_buf [ 1 ];
350 HMODULE* DllHandle = dh_buf;
355 psapi_EnumProcessModules == NULL ||
356 psapi_GetModuleInformation == NULL ||
357 psapi_GetModuleFileNameExA == NULL)
359 if (psapi_loaded)goto failed;
361 psapi_module_handle = LoadLibrary ("psapi.dll");
362 if (!psapi_module_handle)
364 /* printf_unfiltered ("error loading psapi.dll: %u", GetLastError ());*/
367 psapi_EnumProcessModules = GetProcAddress (psapi_module_handle, "EnumProcessModules" );
368 psapi_GetModuleInformation = GetProcAddress (psapi_module_handle, "GetModuleInformation");
369 psapi_GetModuleFileNameExA = (void *) GetProcAddress (psapi_module_handle,
370 "GetModuleFileNameExA");
371 if (psapi_EnumProcessModules == NULL ||
372 psapi_GetModuleInformation == NULL ||
373 psapi_GetModuleFileNameExA == NULL)
378 ok = (*psapi_EnumProcessModules) (current_process_handle,
383 if (!ok || !cbNeeded)
386 DllHandle = (HMODULE*) alloca (cbNeeded);
390 ok = (*psapi_EnumProcessModules) (current_process_handle,
397 for (i = 0; i < cbNeeded / sizeof (HMODULE); i++)
399 if (!(*psapi_GetModuleInformation) (current_process_handle,
403 error ("Can't get module info");
405 len = (*psapi_GetModuleFileNameExA) (current_process_handle,
410 error ("Error getting dll name: %u\n", GetLastError ());
412 if ((DWORD) (mi.lpBaseOfDll) == BaseAddress)
417 dll_name_ret[0] = '\0';
421 /* Wait for child to do something. Return pid of child, or -1 in case
422 of error; store status through argument pointer OURSTATUS. */
425 handle_load_dll (PTR dummy)
427 LOAD_DLL_DEBUG_INFO *event = ¤t_event.u.LoadDll;
430 char dll_buf[MAX_PATH + 1];
431 char *p, *dll_name = NULL;
432 struct objfile *objfile;
433 MEMORY_BASIC_INFORMATION minfo;
434 struct section_addr_info section_addrs;
436 memset (§ion_addrs, 0, sizeof (section_addrs));
437 dll_buf[0] = dll_buf[sizeof (dll_buf) - 1] = '\0';
439 if (!psapi_get_dll_name ((DWORD) (event->lpBaseOfDll), dll_buf))
440 dll_buf[0] = dll_buf[sizeof(dll_buf) - 1] = '\0';
444 /* Attempt to read the name of the dll that was detected.
445 This is documented to work only when actively debugging
446 a program. It will not work for attached processes. */
447 if (dll_name == NULL || *dll_name == '\0')
449 int size = event->fUnicode ? sizeof (WCHAR) : sizeof (char);
453 ReadProcessMemory (current_process_handle,
454 (LPCVOID) event->lpImageName,
455 (char *) &dll_name_ptr,
456 sizeof (dll_name_ptr), &done);
458 /* See if we could read the address of a string, and that the
459 address isn't null. */
461 if (done != sizeof (dll_name_ptr) || !dll_name_ptr)
466 ReadProcessMemory (current_process_handle,
467 (LPCVOID) (dll_name_ptr + len * size),
473 while ((b[0] != 0 || b[size - 1] != 0) && done == size);
475 dll_name = alloca (len);
479 WCHAR *unicode_dll_name = (WCHAR *) alloca (len * sizeof (WCHAR));
480 ReadProcessMemory (current_process_handle,
481 (LPCVOID) dll_name_ptr,
483 len * sizeof (WCHAR),
486 WideCharToMultiByte (CP_ACP, 0,
487 unicode_dll_name, len,
488 dll_name, len, 0, 0);
492 ReadProcessMemory (current_process_handle,
493 (LPCVOID) dll_name_ptr,
503 while ((p = strchr (dll_name, '\\')))
506 /* The symbols in a dll are offset by 0x1000, which is the
507 the offset from 0 of the first byte in an image - because
508 of the file header and the section alignment.
510 FIXME: Is this the real reason that we need the 0x1000 ? */
512 printf_unfiltered ("%x:%s", event->lpBaseOfDll, dll_name);
513 section_addrs.text_addr = (int) event->lpBaseOfDll + 0x1000;
514 symbol_file_add (dll_name, 0, §ion_addrs, 0, OBJF_SHARED);
515 printf_unfiltered ("\n");
520 /* Handle DEBUG_STRING output from child process.
521 Cygwin prepends its messages with a "cygwin:". Interpret this as
522 a Cygwin signal. Otherwise just print the string as a warning. */
524 handle_output_debug_string (struct target_waitstatus *ourstatus)
529 if (!target_read_string
530 ((CORE_ADDR) current_event.u.DebugString.lpDebugStringData, &s, 1024, 0)
534 if (strncmp (s, CYGWIN_SIGNAL_STRING, sizeof (CYGWIN_SIGNAL_STRING) - 1) != 0)
536 if (strncmp (s, "cYg", 3) != 0)
542 int sig = strtol (s + sizeof (CYGWIN_SIGNAL_STRING) - 1, &p, 0);
543 gotasig = target_signal_from_host (sig);
544 ourstatus->value.sig = gotasig;
546 ourstatus->kind = TARGET_WAITKIND_STOPPED;
554 handle_exception (struct target_waitstatus *ourstatus)
560 ourstatus->kind = TARGET_WAITKIND_STOPPED;
562 /* Record the context of the current thread */
563 th = thread_rec (current_event.dwThreadId, -1);
565 switch (current_event.u.Exception.ExceptionRecord.ExceptionCode)
567 case EXCEPTION_ACCESS_VIOLATION:
568 DEBUG_EXCEPT (("gdb: Target exception ACCESS_VIOLATION at 0x%08x\n",
569 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
570 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
571 continue_status = DBG_EXCEPTION_NOT_HANDLED;
573 case STATUS_FLOAT_UNDERFLOW:
574 case STATUS_FLOAT_DIVIDE_BY_ZERO:
575 case STATUS_FLOAT_OVERFLOW:
576 case STATUS_INTEGER_DIVIDE_BY_ZERO:
577 DEBUG_EXCEPT (("gdb: Target exception STACK_OVERFLOW at 0x%08x\n",
578 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
579 ourstatus->value.sig = TARGET_SIGNAL_FPE;
580 continue_status = DBG_EXCEPTION_NOT_HANDLED;
582 case STATUS_STACK_OVERFLOW:
583 DEBUG_EXCEPT (("gdb: Target exception STACK_OVERFLOW at 0x%08x\n",
584 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
585 ourstatus->value.sig = TARGET_SIGNAL_SEGV;
586 continue_status = DBG_EXCEPTION_NOT_HANDLED;
588 case EXCEPTION_BREAKPOINT:
589 DEBUG_EXCEPT (("gdb: Target exception BREAKPOINT at 0x%08x\n",
590 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
591 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
594 DEBUG_EXCEPT (("gdb: Target exception CONTROL_C at 0x%08x\n",
595 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
596 ourstatus->value.sig = TARGET_SIGNAL_INT;
597 continue_status = DBG_EXCEPTION_NOT_HANDLED;
599 case EXCEPTION_SINGLE_STEP:
600 DEBUG_EXCEPT (("gdb: Target exception SINGLE_STEP at 0x%08x\n",
601 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
602 ourstatus->value.sig = TARGET_SIGNAL_TRAP;
604 case EXCEPTION_ILLEGAL_INSTRUCTION:
605 DEBUG_EXCEPT (("gdb: Target exception SINGLE_ILL at 0x%08x\n",
606 current_event.u.Exception.ExceptionRecord.ExceptionAddress));
607 ourstatus->value.sig = TARGET_SIGNAL_ILL;
610 /* This may be a structured exception handling exception. In
611 that case, we want to let the program try to handle it, and
612 only break if we see the exception a second time.
613 if (current_event.u.Exception.dwFirstChance)
618 printf_unfiltered ("gdb: unknown target exception 0x%08x at 0x%08x\n",
619 current_event.u.Exception.ExceptionRecord.ExceptionCode,
620 current_event.u.Exception.ExceptionRecord.ExceptionAddress);
621 ourstatus->value.sig = TARGET_SIGNAL_UNKNOWN;
622 continue_status = DBG_EXCEPTION_NOT_HANDLED;
629 /* Resume all artificially suspended threads if we are continuing
632 child_continue (int id)
638 DEBUG_EVENTS (("ContinueDebugEvent (cpid=%d, ctid=%d, DBG_CONTINUE);\n",
639 current_event.dwProcessId, current_event.dwThreadId));
640 res = ContinueDebugEvent (current_event.dwProcessId,
641 current_event.dwThreadId,
645 for (th = &thread_head; (th = th->next) != NULL;)
646 if (((id == -1) || (id == th->id)) && th->suspend_count)
648 for (i = 0; i < th->suspend_count; i++)
649 (void) ResumeThread (th->h);
650 th->suspend_count = 0;
657 get_child_debug_event (int pid, struct target_waitstatus *ourstatus,
658 DWORD *event_code, int *retval)
663 if (!(debug_event = WaitForDebugEvent (¤t_event, 20)))
665 breakout = *retval = *event_code = 0;
670 continue_status = DBG_CONTINUE;
673 switch (*event_code = current_event.dwDebugEventCode)
675 case CREATE_THREAD_DEBUG_EVENT:
676 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%x code=%s)\n",
677 (unsigned) current_event.dwProcessId,
678 (unsigned) current_event.dwThreadId,
679 "CREATE_THREAD_DEBUG_EVENT"));
680 /* Record the existence of this thread */
681 child_add_thread (current_event.dwThreadId,
682 current_event.u.CreateThread.hThread);
684 printf_unfiltered ("[New %s]\n",
685 target_pid_to_str (current_event.dwThreadId));
688 case EXIT_THREAD_DEBUG_EVENT:
689 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
690 (unsigned) current_event.dwProcessId,
691 (unsigned) current_event.dwThreadId,
692 "EXIT_THREAD_DEBUG_EVENT"));
693 child_delete_thread (current_event.dwThreadId);
696 case CREATE_PROCESS_DEBUG_EVENT:
697 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
698 (unsigned) current_event.dwProcessId,
699 (unsigned) current_event.dwThreadId,
700 "CREATE_PROCESS_DEBUG_EVENT"));
701 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
703 main_thread_id = inferior_pid = current_event.dwThreadId;
704 /* Add the main thread */
705 current_thread = child_add_thread (inferior_pid,
706 current_event.u.CreateProcessInfo.hThread);
709 case EXIT_PROCESS_DEBUG_EVENT:
710 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
711 (unsigned) current_event.dwProcessId,
712 (unsigned) current_event.dwThreadId,
713 "EXIT_PROCESS_DEBUG_EVENT"));
714 ourstatus->kind = TARGET_WAITKIND_EXITED;
715 ourstatus->value.integer = current_event.u.ExitProcess.dwExitCode;
716 CloseHandle (current_process_handle);
717 *retval = current_event.dwProcessId;
720 case LOAD_DLL_DEBUG_EVENT:
721 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
722 (unsigned) current_event.dwProcessId,
723 (unsigned) current_event.dwThreadId,
724 "LOAD_DLL_DEBUG_EVENT"));
725 catch_errors (handle_load_dll, NULL, "", RETURN_MASK_ALL);
726 registers_changed (); /* mark all regs invalid */
729 case UNLOAD_DLL_DEBUG_EVENT:
730 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
731 (unsigned) current_event.dwProcessId,
732 (unsigned) current_event.dwThreadId,
733 "UNLOAD_DLL_DEBUG_EVENT"));
734 break; /* FIXME: don't know what to do here */
736 case EXCEPTION_DEBUG_EVENT:
737 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
738 (unsigned) current_event.dwProcessId,
739 (unsigned) current_event.dwThreadId,
740 "EXCEPTION_DEBUG_EVENT"));
741 if (handle_exception (ourstatus)) /* sets continue_status */
743 *retval = current_event.dwThreadId;
748 case OUTPUT_DEBUG_STRING_EVENT:
749 DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
750 (unsigned) current_event.dwProcessId,
751 (unsigned) current_event.dwThreadId,
752 "OUTPUT_DEBUG_STRING_EVENT"));
753 if (handle_output_debug_string (ourstatus))
755 *retval = main_thread_id;
760 printf_unfiltered ("gdb: kernel event for pid=%d tid=%d\n",
761 current_event.dwProcessId,
762 current_event.dwThreadId);
763 printf_unfiltered (" unknown event code %d\n",
764 current_event.dwDebugEventCode);
769 CHECK (child_continue (-1));
777 /* Wait for interesting events to occur in the target process. */
779 child_wait (int pid, struct target_waitstatus *ourstatus)
784 /* We loop when we get a non-standard exception rather than return
785 with a SPURIOUS because resume can try and step or modify things,
786 which needs a current_thread->h. But some of these exceptions mark
787 the birth or death of threads, which mean that the current thread
788 isn't necessarily what you think it is. */
792 if (continue_status != 0)
793 CHECK (child_continue (-1));
794 if (get_child_debug_event (pid, ourstatus, &event_code, &retval))
800 if (ui_loop_hook != NULL)
801 detach = ui_loop_hook (0);
804 child_kill_inferior ();
809 /* Attach to process PID, then initialize for debugging it. */
812 child_attach (args, from_tty)
819 error_no_arg ("process-id to attach");
821 current_event.dwProcessId = strtoul (args, 0, 0);
823 ok = DebugActiveProcess (current_event.dwProcessId);
826 error ("Can't attach to process.");
833 char *exec_file = (char *) get_exec_file (0);
836 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
837 target_pid_to_str (current_event.dwProcessId));
839 printf_unfiltered ("Attaching to %s\n",
840 target_pid_to_str (current_event.dwProcessId));
842 gdb_flush (gdb_stdout);
845 push_target (&child_ops);
849 child_detach (args, from_tty)
855 char *exec_file = get_exec_file (0);
858 printf_unfiltered ("Detaching from program: %s %s\n", exec_file,
859 target_pid_to_str (inferior_pid));
860 gdb_flush (gdb_stdout);
863 unpush_target (&child_ops);
866 /* Print status information about what we're accessing. */
869 child_files_info (ignore)
870 struct target_ops *ignore;
872 printf_unfiltered ("\tUsing the running image of %s %s.\n",
873 attach_flag ? "attached" : "child", target_pid_to_str (inferior_pid));
878 child_open (arg, from_tty)
882 error ("Use the \"run\" command to start a Unix child process.");
885 /* Start an inferior win32 child process and sets inferior_pid to its pid.
886 EXEC_FILE is the file to run.
887 ALLARGS is a string containing the arguments to the program.
888 ENV is the environment vector to pass. Errors reported with error(). */
891 child_create_inferior (exec_file, allargs, env)
896 char real_path[MAXPATHLEN];
902 PROCESS_INFORMATION pi;
903 struct target_waitstatus dummy;
911 error ("No executable specified, use `target exec'.\n");
914 memset (&si, 0, sizeof (si));
917 cygwin32_conv_to_win32_path (exec_file, real_path);
919 flags = DEBUG_ONLY_THIS_PROCESS;
922 flags |= CREATE_NEW_PROCESS_GROUP;
925 flags |= CREATE_NEW_CONSOLE;
927 args = alloca (strlen (real_path) + strlen (allargs) + 2);
929 strcpy (args, real_path);
932 strcat (args, allargs);
934 /* Prepare the environment vars for CreateProcess. */
936 /* This code use to assume all env vars were file names and would
937 translate them all to win32 style. That obviously doesn't work in the
938 general case. The current rule is that we only translate PATH.
939 We need to handle PATH because we're about to call CreateProcess and
940 it uses PATH to find DLL's. Fortunately PATH has a well-defined value
941 in both posix and win32 environments. cygwin.dll will change it back
942 to posix style if necessary. */
944 static const char *conv_path_names[] =
950 /* CreateProcess takes the environment list as a null terminated set of
951 strings (i.e. two nulls terminate the list). */
953 /* Get total size for env strings. */
954 for (envlen = 0, i = 0; env[i] && *env[i]; i++)
958 for (j = 0; conv_path_names[j]; j++)
960 len = strlen (conv_path_names[j]);
961 if (strncmp (conv_path_names[j], env[i], len) == 0)
963 if (cygwin32_posix_path_list_p (env[i] + len))
965 + cygwin32_posix_to_win32_path_list_buf_size (env[i] + len);
967 envlen += strlen (env[i]) + 1;
971 if (conv_path_names[j] == NULL)
972 envlen += strlen (env[i]) + 1;
975 winenv = alloca (envlen + 1);
977 /* Copy env strings into new buffer. */
978 for (temp = winenv, i = 0; env[i] && *env[i]; i++)
982 for (j = 0; conv_path_names[j]; j++)
984 len = strlen (conv_path_names[j]);
985 if (strncmp (conv_path_names[j], env[i], len) == 0)
987 if (cygwin32_posix_path_list_p (env[i] + len))
989 memcpy (temp, env[i], len);
990 cygwin32_posix_to_win32_path_list (env[i] + len, temp + len);
993 strcpy (temp, env[i]);
997 if (conv_path_names[j] == NULL)
998 strcpy (temp, env[i]);
1000 temp += strlen (temp) + 1;
1003 /* Final nil string to terminate new env. */
1007 ret = CreateProcess (0,
1008 args, /* command line */
1009 NULL, /* Security */
1011 TRUE, /* inherit handles */
1012 flags, /* start flags */
1014 NULL, /* current directory */
1018 error ("Error creating process %s, (error %d)\n", exec_file, GetLastError ());
1020 exception_count = 0;
1023 current_process_handle = pi.hProcess;
1024 current_event.dwProcessId = pi.dwProcessId;
1025 memset (¤t_event, 0, sizeof (current_event));
1026 inferior_pid = current_event.dwThreadId = pi.dwThreadId;
1027 push_target (&child_ops);
1028 child_init_thread_list ();
1029 init_wait_for_inferior ();
1030 clear_proceed_status ();
1031 target_terminal_init ();
1032 target_terminal_inferior ();
1034 /* Run until process and threads are loaded */
1036 get_child_debug_event (inferior_pid, &dummy, &event_code, &ret);
1037 while (event_code != EXCEPTION_DEBUG_EVENT);
1039 SymSetOptions (SYMOPT_DEFERRED_LOADS);
1040 SymInitialize (current_process_handle, NULL, TRUE);
1042 proceed ((CORE_ADDR) - 1, TARGET_SIGNAL_0, 0);
1046 child_mourn_inferior ()
1048 continue_status = DBG_CONTINUE;
1049 (void) child_continue (-1);
1050 unpush_target (&child_ops);
1051 generic_mourn_inferior ();
1054 /* Send a SIGINT to the process group. This acts just like the user typed a
1055 ^C on the controlling terminal. */
1060 DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
1061 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
1062 registers_changed (); /* refresh register state */
1066 child_xfer_memory (CORE_ADDR memaddr, char *our, int len,
1067 int write, struct target_ops *target)
1072 DEBUG_MEM (("gdb: write target memory, %d bytes at 0x%08x\n",
1074 WriteProcessMemory (current_process_handle, (LPVOID) memaddr, our,
1076 FlushInstructionCache (current_process_handle, (LPCVOID) memaddr, len);
1080 DEBUG_MEM (("gdb: read target memory, %d bytes at 0x%08x\n",
1082 ReadProcessMemory (current_process_handle, (LPCVOID) memaddr, our, len,
1089 child_kill_inferior (void)
1091 CHECK (TerminateProcess (current_process_handle, 0));
1095 continue_status = DBG_CONTINUE;
1096 if (!child_continue (-1))
1098 if (!WaitForDebugEvent (¤t_event, INFINITE))
1100 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
1104 CHECK (CloseHandle (current_process_handle));
1106 /* this may fail in an attached process so don't check. */
1107 (void) CloseHandle (current_thread->h);
1108 target_mourn_inferior (); /* or just child_mourn_inferior? */
1112 child_resume (int pid, int step, enum target_signal sig)
1117 DEBUG_EXEC (("gdb: child_resume (pid=%d, step=%d, sig=%d);\n",
1120 /* Get context for currently selected thread */
1121 th = thread_rec (current_event.dwThreadId, FALSE);
1125 /* Single step by setting t bit */
1126 child_fetch_inferior_registers (PS_REGNUM);
1127 th->context.EFlags |= FLAG_TRACE_BIT;
1131 if (th->context.ContextFlags)
1133 CHECK (SetThreadContext (th->h, &th->context));
1134 th->context.ContextFlags = 0;
1137 /* Allow continuing with the same signal that interrupted us.
1138 Otherwise complain. */
1140 child_continue (pid);
1144 child_prepare_to_store ()
1146 /* Do nothing, since we can store individual regs */
1158 DEBUG_EVENTS (("gdb: child_close, inferior_pid=%d\n", inferior_pid));
1161 struct target_ops child_ops;
1164 init_child_ops (void)
1166 child_ops.to_shortname = "child";
1167 child_ops.to_longname = "Win32 child process";
1168 child_ops.to_doc = "Win32 child process (started by the \"run\" command).";
1169 child_ops.to_open = child_open;
1170 child_ops.to_close = child_close;
1171 child_ops.to_attach = child_attach;
1172 child_ops.to_detach = child_detach;
1173 child_ops.to_resume = child_resume;
1174 child_ops.to_wait = child_wait;
1175 child_ops.to_fetch_registers = child_fetch_inferior_registers;
1176 child_ops.to_store_registers = child_store_inferior_registers;
1177 child_ops.to_prepare_to_store = child_prepare_to_store;
1178 child_ops.to_xfer_memory = child_xfer_memory;
1179 child_ops.to_files_info = child_files_info;
1180 child_ops.to_insert_breakpoint = memory_insert_breakpoint;
1181 child_ops.to_remove_breakpoint = memory_remove_breakpoint;
1182 child_ops.to_terminal_init = terminal_init_inferior;
1183 child_ops.to_terminal_inferior = terminal_inferior;
1184 child_ops.to_terminal_ours_for_output = terminal_ours_for_output;
1185 child_ops.to_terminal_ours = terminal_ours;
1186 child_ops.to_terminal_info = child_terminal_info;
1187 child_ops.to_kill = child_kill_inferior;
1188 child_ops.to_load = 0;
1189 child_ops.to_lookup_symbol = 0;
1190 child_ops.to_create_inferior = child_create_inferior;
1191 child_ops.to_mourn_inferior = child_mourn_inferior;
1192 child_ops.to_can_run = child_can_run;
1193 child_ops.to_notice_signals = 0;
1194 child_ops.to_thread_alive = win32_child_thread_alive;
1195 child_ops.to_pid_to_str = cygwin_pid_to_str;
1196 child_ops.to_stop = child_stop;
1197 child_ops.to_stratum = process_stratum;
1198 child_ops.DONT_USE = 0;
1199 child_ops.to_has_all_memory = 1;
1200 child_ops.to_has_memory = 1;
1201 child_ops.to_has_stack = 1;
1202 child_ops.to_has_registers = 1;
1203 child_ops.to_has_execution = 1;
1204 child_ops.to_sections = 0;
1205 child_ops.to_sections_end = 0;
1206 child_ops.to_magic = OPS_MAGIC;
1210 _initialize_inftarg ()
1212 struct cmd_list_element *c;
1216 (add_set_cmd ("new-console", class_support, var_boolean,
1217 (char *) &new_console,
1218 "Set creation of new console when creating child process.",
1223 (add_set_cmd ("new-group", class_support, var_boolean,
1224 (char *) &new_group,
1225 "Set creation of new group when creating child process.",
1230 (add_set_cmd ("debugexec", class_support, var_boolean,
1231 (char *) &debug_exec,
1232 "Set whether to display execution in child process.",
1237 (add_set_cmd ("debugevents", class_support, var_boolean,
1238 (char *) &debug_events,
1239 "Set whether to display kernel events in child process.",
1244 (add_set_cmd ("debugmemory", class_support, var_boolean,
1245 (char *) &debug_memory,
1246 "Set whether to display memory accesses in child process.",
1251 (add_set_cmd ("debugexceptions", class_support, var_boolean,
1252 (char *) &debug_exceptions,
1253 "Set whether to display kernel exceptions in child process.",
1257 add_target (&child_ops);
1260 /* Determine if the thread referenced by "pid" is alive
1261 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
1262 it means that the pid has died. Otherwise it is assumed to be alive. */
1264 win32_child_thread_alive (int pid)
1266 return WaitForSingleObject (thread_rec (pid, FALSE)->h, 0) == WAIT_OBJECT_0 ?
1270 /* Convert pid to printable format. */
1272 cygwin_pid_to_str (int pid)
1274 static char buf[80];
1275 if (pid == current_event.dwProcessId)
1276 sprintf (buf, "process %d", pid);
1278 sprintf (buf, "thread %d.0x%x", current_event.dwProcessId, pid);