gdb: make use add_setshow_prefix_cmd in gnu-nat.c
[binutils-gdb.git] / gdb / windows-nat.c
1 /* Target-vector operations for controlling windows child processes, for GDB.
2
3 Copyright (C) 1995-2022 Free Software Foundation, Inc.
4
5 Contributed by Cygnus Solutions, A Red Hat Company.
6
7 This file is part of GDB.
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
21
22 /* Originally by Steve Chamberlain, sac@cygnus.com */
23
24 #include "defs.h"
25 #include "frame.h" /* required by inferior.h */
26 #include "inferior.h"
27 #include "infrun.h"
28 #include "target.h"
29 #include "gdbcore.h"
30 #include "command.h"
31 #include "completer.h"
32 #include "regcache.h"
33 #include "top.h"
34 #include <signal.h>
35 #include <sys/types.h>
36 #include <fcntl.h>
37 #include <windows.h>
38 #include <imagehlp.h>
39 #ifdef __CYGWIN__
40 #include <wchar.h>
41 #include <sys/cygwin.h>
42 #include <cygwin/version.h>
43 #endif
44 #include <algorithm>
45 #include <vector>
46
47 #include "filenames.h"
48 #include "symfile.h"
49 #include "objfiles.h"
50 #include "gdb_bfd.h"
51 #include "gdb_obstack.h"
52 #include "gdbthread.h"
53 #include "gdbcmd.h"
54 #include <unistd.h>
55 #include "exec.h"
56 #include "solist.h"
57 #include "solib.h"
58 #include "xml-support.h"
59 #include "inttypes.h"
60
61 #include "i386-tdep.h"
62 #include "i387-tdep.h"
63
64 #include "windows-tdep.h"
65 #include "windows-nat.h"
66 #include "x86-nat.h"
67 #include "complaints.h"
68 #include "inf-child.h"
69 #include "gdbsupport/gdb_tilde_expand.h"
70 #include "gdbsupport/pathstuff.h"
71 #include "gdbsupport/gdb_wait.h"
72 #include "nat/windows-nat.h"
73 #include "gdbsupport/symbol.h"
74
75 using namespace windows_nat;
76
77 #undef STARTUPINFO
78 #undef CreateProcess
79 #undef GetModuleFileNameEx
80
81 #ifndef __CYGWIN__
82 # define __PMAX (MAX_PATH + 1)
83 # define GetModuleFileNameEx GetModuleFileNameExA
84 # define STARTUPINFO STARTUPINFOA
85 # define CreateProcess CreateProcessA
86 #else
87 # define __PMAX PATH_MAX
88 /* The starting and ending address of the cygwin1.dll text segment. */
89 static CORE_ADDR cygwin_load_start;
90 static CORE_ADDR cygwin_load_end;
91 # define __USEWIDE
92 typedef wchar_t cygwin_buf_t;
93 # define GetModuleFileNameEx GetModuleFileNameExW
94 # define STARTUPINFO STARTUPINFOW
95 # define CreateProcess CreateProcessW
96 #endif
97
98 static int have_saved_context; /* True if we've saved context from a
99 cygwin signal. */
100 #ifdef __CYGWIN__
101 static CONTEXT saved_context; /* Contains the saved context from a
102 cygwin signal. */
103 #endif
104
105 /* If we're not using the old Cygwin header file set, define the
106 following which never should have been in the generic Win32 API
107 headers in the first place since they were our own invention... */
108 #ifndef _GNU_H_WINDOWS_H
109 enum
110 {
111 FLAG_TRACE_BIT = 0x100,
112 };
113 #endif
114
115 #ifndef CONTEXT_EXTENDED_REGISTERS
116 /* This macro is only defined on ia32. It only makes sense on this target,
117 so define it as zero if not already defined. */
118 #define CONTEXT_EXTENDED_REGISTERS 0
119 #endif
120
121 #define CONTEXT_DEBUGGER_DR CONTEXT_FULL | CONTEXT_FLOATING_POINT \
122 | CONTEXT_SEGMENTS | CONTEXT_DEBUG_REGISTERS \
123 | CONTEXT_EXTENDED_REGISTERS
124
125 static uintptr_t dr[8];
126
127 static int windows_initialization_done;
128 #define DR6_CLEAR_VALUE 0xffff0ff0
129
130 /* The string sent by cygwin when it processes a signal.
131 FIXME: This should be in a cygwin include file. */
132 #ifndef _CYGWIN_SIGNAL_STRING
133 #define _CYGWIN_SIGNAL_STRING "cYgSiGw00f"
134 #endif
135
136 #define CHECK(x) check (x, __FILE__,__LINE__)
137 #define DEBUG_EXEC(fmt, ...) \
138 debug_prefixed_printf_cond (debug_exec, "windows exec", fmt, ## __VA_ARGS__)
139 #define DEBUG_EVENTS(fmt, ...) \
140 debug_prefixed_printf_cond (debug_events, "windows events", fmt, \
141 ## __VA_ARGS__)
142 #define DEBUG_MEM(fmt, ...) \
143 debug_prefixed_printf_cond (debug_memory, "windows mem", fmt, \
144 ## __VA_ARGS__)
145 #define DEBUG_EXCEPT(fmt, ...) \
146 debug_prefixed_printf_cond (debug_exceptions, "windows except", fmt, \
147 ## __VA_ARGS__)
148
149 static void cygwin_set_dr (int i, CORE_ADDR addr);
150 static void cygwin_set_dr7 (unsigned long val);
151 static CORE_ADDR cygwin_get_dr (int i);
152 static unsigned long cygwin_get_dr6 (void);
153 static unsigned long cygwin_get_dr7 (void);
154
155 static std::vector<windows_thread_info *> thread_list;
156
157 /* Counts of things. */
158 static int saw_create;
159 static int open_process_used = 0;
160 #ifdef __x86_64__
161 static void *wow64_dbgbreak;
162 #endif
163
164 /* User options. */
165 static bool new_console = false;
166 #ifdef __CYGWIN__
167 static bool cygwin_exceptions = false;
168 #endif
169 static bool new_group = true;
170 static bool debug_exec = false; /* show execution */
171 static bool debug_events = false; /* show events from kernel */
172 static bool debug_memory = false; /* show target memory accesses */
173 static bool debug_exceptions = false; /* show target exceptions */
174 static bool useshell = false; /* use shell for subprocesses */
175
176 /* This vector maps GDB's idea of a register's number into an offset
177 in the windows exception context vector.
178
179 It also contains the bit mask needed to load the register in question.
180
181 The contents of this table can only be computed by the units
182 that provide CPU-specific support for Windows native debugging.
183 These units should set the table by calling
184 windows_set_context_register_offsets.
185
186 One day we could read a reg, we could inspect the context we
187 already have loaded, if it doesn't have the bit set that we need,
188 we read that set of registers in using GetThreadContext. If the
189 context already contains what we need, we just unpack it. Then to
190 write a register, first we have to ensure that the context contains
191 the other regs of the group, and then we copy the info in and set
192 out bit. */
193
194 static const int *mappings;
195
196 /* The function to use in order to determine whether a register is
197 a segment register or not. */
198 static segment_register_p_ftype *segment_register_p;
199
200 /* See windows_nat_target::resume to understand why this is commented
201 out. */
202 #if 0
203 /* This vector maps the target's idea of an exception (extracted
204 from the DEBUG_EVENT structure) to GDB's idea. */
205
206 struct xlate_exception
207 {
208 DWORD them;
209 enum gdb_signal us;
210 };
211
212 static const struct xlate_exception xlate[] =
213 {
214 {EXCEPTION_ACCESS_VIOLATION, GDB_SIGNAL_SEGV},
215 {STATUS_STACK_OVERFLOW, GDB_SIGNAL_SEGV},
216 {EXCEPTION_BREAKPOINT, GDB_SIGNAL_TRAP},
217 {DBG_CONTROL_C, GDB_SIGNAL_INT},
218 {EXCEPTION_SINGLE_STEP, GDB_SIGNAL_TRAP},
219 {STATUS_FLOAT_DIVIDE_BY_ZERO, GDB_SIGNAL_FPE}
220 };
221
222 #endif /* 0 */
223
224 struct windows_nat_target final : public x86_nat_target<inf_child_target>
225 {
226 void close () override;
227
228 void attach (const char *, int) override;
229
230 bool attach_no_wait () override
231 { return true; }
232
233 void detach (inferior *, int) override;
234
235 void resume (ptid_t, int , enum gdb_signal) override;
236
237 ptid_t wait (ptid_t, struct target_waitstatus *, target_wait_flags) override;
238
239 void fetch_registers (struct regcache *, int) override;
240 void store_registers (struct regcache *, int) override;
241
242 bool stopped_by_sw_breakpoint () override
243 {
244 windows_thread_info *th
245 = thread_rec (inferior_ptid, DONT_INVALIDATE_CONTEXT);
246 return th->stopped_at_software_breakpoint;
247 }
248
249 bool supports_stopped_by_sw_breakpoint () override
250 {
251 return true;
252 }
253
254 enum target_xfer_status xfer_partial (enum target_object object,
255 const char *annex,
256 gdb_byte *readbuf,
257 const gdb_byte *writebuf,
258 ULONGEST offset, ULONGEST len,
259 ULONGEST *xfered_len) override;
260
261 void files_info () override;
262
263 void kill () override;
264
265 void create_inferior (const char *, const std::string &,
266 char **, int) override;
267
268 void mourn_inferior () override;
269
270 bool thread_alive (ptid_t ptid) override;
271
272 std::string pid_to_str (ptid_t) override;
273
274 void interrupt () override;
275
276 char *pid_to_exec_file (int pid) override;
277
278 ptid_t get_ada_task_ptid (long lwp, ULONGEST thread) override;
279
280 bool get_tib_address (ptid_t ptid, CORE_ADDR *addr) override;
281
282 const char *thread_name (struct thread_info *) override;
283
284 int get_windows_debug_event (int pid, struct target_waitstatus *ourstatus);
285
286 void do_initial_windows_stuff (DWORD pid, bool attaching);
287 };
288
289 static windows_nat_target the_windows_nat_target;
290
291 /* Set the MAPPINGS static global to OFFSETS.
292 See the description of MAPPINGS for more details. */
293
294 static void
295 windows_set_context_register_offsets (const int *offsets)
296 {
297 mappings = offsets;
298 }
299
300 /* Set the function that should be used by this module to determine
301 whether a given register is a segment register or not. */
302
303 static void
304 windows_set_segment_register_p (segment_register_p_ftype *fun)
305 {
306 segment_register_p = fun;
307 }
308
309 static void
310 check (BOOL ok, const char *file, int line)
311 {
312 if (!ok)
313 printf_filtered ("error return %s:%d was %u\n", file, line,
314 (unsigned) GetLastError ());
315 }
316
317 /* See nat/windows-nat.h. */
318
319 windows_thread_info *
320 windows_nat::thread_rec (ptid_t ptid, thread_disposition_type disposition)
321 {
322 for (windows_thread_info *th : thread_list)
323 if (th->tid == ptid.lwp ())
324 {
325 if (!th->suspended)
326 {
327 switch (disposition)
328 {
329 case DONT_INVALIDATE_CONTEXT:
330 /* Nothing. */
331 break;
332 case INVALIDATE_CONTEXT:
333 if (ptid.lwp () != current_event.dwThreadId)
334 th->suspend ();
335 th->reload_context = true;
336 break;
337 case DONT_SUSPEND:
338 th->reload_context = true;
339 th->suspended = -1;
340 break;
341 }
342 }
343 return th;
344 }
345
346 return NULL;
347 }
348
349 /* Add a thread to the thread list.
350
351 PTID is the ptid of the thread to be added.
352 H is its Windows handle.
353 TLB is its thread local base.
354 MAIN_THREAD_P should be true if the thread to be added is
355 the main thread, false otherwise. */
356
357 static windows_thread_info *
358 windows_add_thread (ptid_t ptid, HANDLE h, void *tlb, bool main_thread_p)
359 {
360 windows_thread_info *th;
361
362 gdb_assert (ptid.lwp () != 0);
363
364 if ((th = thread_rec (ptid, DONT_INVALIDATE_CONTEXT)))
365 return th;
366
367 CORE_ADDR base = (CORE_ADDR) (uintptr_t) tlb;
368 #ifdef __x86_64__
369 /* For WOW64 processes, this is actually the pointer to the 64bit TIB,
370 and the 32bit TIB is exactly 2 pages after it. */
371 if (wow64_process)
372 base += 0x2000;
373 #endif
374 th = new windows_thread_info (ptid.lwp (), h, base);
375 thread_list.push_back (th);
376
377 /* Add this new thread to the list of threads.
378
379 To be consistent with what's done on other platforms, we add
380 the main thread silently (in reality, this thread is really
381 more of a process to the user than a thread). */
382 if (main_thread_p)
383 add_thread_silent (&the_windows_nat_target, ptid);
384 else
385 add_thread (&the_windows_nat_target, ptid);
386
387 /* It's simplest to always set this and update the debug
388 registers. */
389 th->debug_registers_changed = true;
390
391 return th;
392 }
393
394 /* Clear out any old thread list and reinitialize it to a
395 pristine state. */
396 static void
397 windows_init_thread_list (void)
398 {
399 DEBUG_EVENTS ("called");
400 init_thread_list ();
401
402 for (windows_thread_info *here : thread_list)
403 delete here;
404
405 thread_list.clear ();
406 }
407
408 /* Delete a thread from the list of threads.
409
410 PTID is the ptid of the thread to be deleted.
411 EXIT_CODE is the thread's exit code.
412 MAIN_THREAD_P should be true if the thread to be deleted is
413 the main thread, false otherwise. */
414
415 static void
416 windows_delete_thread (ptid_t ptid, DWORD exit_code, bool main_thread_p)
417 {
418 DWORD id;
419
420 gdb_assert (ptid.lwp () != 0);
421
422 id = ptid.lwp ();
423
424 /* Emit a notification about the thread being deleted.
425
426 Note that no notification was printed when the main thread
427 was created, and thus, unless in verbose mode, we should be
428 symmetrical, and avoid that notification for the main thread
429 here as well. */
430
431 if (info_verbose)
432 printf_unfiltered ("[Deleting %s]\n", target_pid_to_str (ptid).c_str ());
433 else if (print_thread_events && !main_thread_p)
434 printf_unfiltered (_("[%s exited with code %u]\n"),
435 target_pid_to_str (ptid).c_str (),
436 (unsigned) exit_code);
437
438 delete_thread (find_thread_ptid (&the_windows_nat_target, ptid));
439
440 auto iter = std::find_if (thread_list.begin (), thread_list.end (),
441 [=] (windows_thread_info *th)
442 {
443 return th->tid == id;
444 });
445
446 if (iter != thread_list.end ())
447 {
448 delete *iter;
449 thread_list.erase (iter);
450 }
451 }
452
453 /* Fetches register number R from the given windows_thread_info,
454 and supplies its value to the given regcache.
455
456 This function assumes that R is non-negative. A failed assertion
457 is raised if that is not true.
458
459 This function assumes that TH->RELOAD_CONTEXT is not set, meaning
460 that the windows_thread_info has an up-to-date context. A failed
461 assertion is raised if that assumption is violated. */
462
463 static void
464 windows_fetch_one_register (struct regcache *regcache,
465 windows_thread_info *th, int r)
466 {
467 gdb_assert (r >= 0);
468 gdb_assert (!th->reload_context);
469
470 char *context_ptr = (char *) &th->context;
471 #ifdef __x86_64__
472 if (wow64_process)
473 context_ptr = (char *) &th->wow64_context;
474 #endif
475
476 char *context_offset = context_ptr + mappings[r];
477 struct gdbarch *gdbarch = regcache->arch ();
478 i386_gdbarch_tdep *tdep = (i386_gdbarch_tdep *) gdbarch_tdep (gdbarch);
479
480 gdb_assert (!gdbarch_read_pc_p (gdbarch));
481 gdb_assert (gdbarch_pc_regnum (gdbarch) >= 0);
482 gdb_assert (!gdbarch_write_pc_p (gdbarch));
483
484 if (r == I387_FISEG_REGNUM (tdep))
485 {
486 long l = *((long *) context_offset) & 0xffff;
487 regcache->raw_supply (r, (char *) &l);
488 }
489 else if (r == I387_FOP_REGNUM (tdep))
490 {
491 long l = (*((long *) context_offset) >> 16) & ((1 << 11) - 1);
492 regcache->raw_supply (r, (char *) &l);
493 }
494 else if (segment_register_p (r))
495 {
496 /* GDB treats segment registers as 32bit registers, but they are
497 in fact only 16 bits long. Make sure we do not read extra
498 bits from our source buffer. */
499 long l = *((long *) context_offset) & 0xffff;
500 regcache->raw_supply (r, (char *) &l);
501 }
502 else
503 {
504 if (th->stopped_at_software_breakpoint
505 && !th->pc_adjusted
506 && r == gdbarch_pc_regnum (gdbarch))
507 {
508 int size = register_size (gdbarch, r);
509 if (size == 4)
510 {
511 uint32_t value;
512 memcpy (&value, context_offset, size);
513 value -= gdbarch_decr_pc_after_break (gdbarch);
514 memcpy (context_offset, &value, size);
515 }
516 else
517 {
518 gdb_assert (size == 8);
519 uint64_t value;
520 memcpy (&value, context_offset, size);
521 value -= gdbarch_decr_pc_after_break (gdbarch);
522 memcpy (context_offset, &value, size);
523 }
524 /* Make sure we only rewrite the PC a single time. */
525 th->pc_adjusted = true;
526 }
527 regcache->raw_supply (r, context_offset);
528 }
529 }
530
531 void
532 windows_nat_target::fetch_registers (struct regcache *regcache, int r)
533 {
534 windows_thread_info *th = thread_rec (regcache->ptid (), INVALIDATE_CONTEXT);
535
536 /* Check if TH exists. Windows sometimes uses a non-existent
537 thread id in its events. */
538 if (th == NULL)
539 return;
540
541 if (th->reload_context)
542 {
543 #ifdef __CYGWIN__
544 if (have_saved_context)
545 {
546 /* Lie about where the program actually is stopped since
547 cygwin has informed us that we should consider the signal
548 to have occurred at another location which is stored in
549 "saved_context. */
550 memcpy (&th->context, &saved_context,
551 __COPY_CONTEXT_SIZE);
552 have_saved_context = 0;
553 }
554 else
555 #endif
556 #ifdef __x86_64__
557 if (wow64_process)
558 {
559 th->wow64_context.ContextFlags = CONTEXT_DEBUGGER_DR;
560 CHECK (Wow64GetThreadContext (th->h, &th->wow64_context));
561 /* Copy dr values from that thread.
562 But only if there were not modified since last stop.
563 PR gdb/2388 */
564 if (!th->debug_registers_changed)
565 {
566 dr[0] = th->wow64_context.Dr0;
567 dr[1] = th->wow64_context.Dr1;
568 dr[2] = th->wow64_context.Dr2;
569 dr[3] = th->wow64_context.Dr3;
570 dr[6] = th->wow64_context.Dr6;
571 dr[7] = th->wow64_context.Dr7;
572 }
573 }
574 else
575 #endif
576 {
577 th->context.ContextFlags = CONTEXT_DEBUGGER_DR;
578 CHECK (GetThreadContext (th->h, &th->context));
579 /* Copy dr values from that thread.
580 But only if there were not modified since last stop.
581 PR gdb/2388 */
582 if (!th->debug_registers_changed)
583 {
584 dr[0] = th->context.Dr0;
585 dr[1] = th->context.Dr1;
586 dr[2] = th->context.Dr2;
587 dr[3] = th->context.Dr3;
588 dr[6] = th->context.Dr6;
589 dr[7] = th->context.Dr7;
590 }
591 }
592 th->reload_context = false;
593 }
594
595 if (r < 0)
596 for (r = 0; r < gdbarch_num_regs (regcache->arch()); r++)
597 windows_fetch_one_register (regcache, th, r);
598 else
599 windows_fetch_one_register (regcache, th, r);
600 }
601
602 /* Collect the register number R from the given regcache, and store
603 its value into the corresponding area of the given thread's context.
604
605 This function assumes that R is non-negative. A failed assertion
606 assertion is raised if that is not true. */
607
608 static void
609 windows_store_one_register (const struct regcache *regcache,
610 windows_thread_info *th, int r)
611 {
612 gdb_assert (r >= 0);
613
614 char *context_ptr = (char *) &th->context;
615 #ifdef __x86_64__
616 if (wow64_process)
617 context_ptr = (char *) &th->wow64_context;
618 #endif
619
620 regcache->raw_collect (r, context_ptr + mappings[r]);
621 }
622
623 /* Store a new register value into the context of the thread tied to
624 REGCACHE. */
625
626 void
627 windows_nat_target::store_registers (struct regcache *regcache, int r)
628 {
629 windows_thread_info *th = thread_rec (regcache->ptid (), INVALIDATE_CONTEXT);
630
631 /* Check if TH exists. Windows sometimes uses a non-existent
632 thread id in its events. */
633 if (th == NULL)
634 return;
635
636 if (r < 0)
637 for (r = 0; r < gdbarch_num_regs (regcache->arch ()); r++)
638 windows_store_one_register (regcache, th, r);
639 else
640 windows_store_one_register (regcache, th, r);
641 }
642
643 /* Maintain a linked list of "so" information. */
644 struct lm_info_windows : public lm_info_base
645 {
646 LPVOID load_addr = 0;
647 CORE_ADDR text_offset = 0;
648 };
649
650 static struct so_list solib_start, *solib_end;
651
652 static struct so_list *
653 windows_make_so (const char *name, LPVOID load_addr)
654 {
655 struct so_list *so;
656 char *p;
657 #ifndef __CYGWIN__
658 char buf[__PMAX];
659 char cwd[__PMAX];
660 WIN32_FIND_DATA w32_fd;
661 HANDLE h = FindFirstFile(name, &w32_fd);
662
663 if (h == INVALID_HANDLE_VALUE)
664 strcpy (buf, name);
665 else
666 {
667 FindClose (h);
668 strcpy (buf, name);
669 if (GetCurrentDirectory (MAX_PATH + 1, cwd))
670 {
671 p = strrchr (buf, '\\');
672 if (p)
673 p[1] = '\0';
674 SetCurrentDirectory (buf);
675 GetFullPathName (w32_fd.cFileName, MAX_PATH, buf, &p);
676 SetCurrentDirectory (cwd);
677 }
678 }
679 if (strcasecmp (buf, "ntdll.dll") == 0)
680 {
681 GetSystemDirectory (buf, sizeof (buf));
682 strcat (buf, "\\ntdll.dll");
683 }
684 #else
685 cygwin_buf_t buf[__PMAX];
686
687 buf[0] = 0;
688 if (access (name, F_OK) != 0)
689 {
690 if (strcasecmp (name, "ntdll.dll") == 0)
691 #ifdef __USEWIDE
692 {
693 GetSystemDirectoryW (buf, sizeof (buf) / sizeof (wchar_t));
694 wcscat (buf, L"\\ntdll.dll");
695 }
696 #else
697 {
698 GetSystemDirectoryA (buf, sizeof (buf) / sizeof (wchar_t));
699 strcat (buf, "\\ntdll.dll");
700 }
701 #endif
702 }
703 #endif
704 so = XCNEW (struct so_list);
705 lm_info_windows *li = new lm_info_windows;
706 so->lm_info = li;
707 li->load_addr = load_addr;
708 strcpy (so->so_original_name, name);
709 #ifndef __CYGWIN__
710 strcpy (so->so_name, buf);
711 #else
712 if (buf[0])
713 cygwin_conv_path (CCP_WIN_W_TO_POSIX, buf, so->so_name,
714 SO_NAME_MAX_PATH_SIZE);
715 else
716 {
717 char *rname = realpath (name, NULL);
718 if (rname && strlen (rname) < SO_NAME_MAX_PATH_SIZE)
719 {
720 strcpy (so->so_name, rname);
721 free (rname);
722 }
723 else
724 {
725 warning (_("dll path for \"%s\" too long or inaccessible"), name);
726 strcpy (so->so_name, so->so_original_name);
727 }
728 }
729 /* Record cygwin1.dll .text start/end. */
730 p = strchr (so->so_name, '\0') - (sizeof ("/cygwin1.dll") - 1);
731 if (p >= so->so_name && strcasecmp (p, "/cygwin1.dll") == 0)
732 {
733 asection *text = NULL;
734
735 gdb_bfd_ref_ptr abfd (gdb_bfd_open (so->so_name, "pei-i386"));
736
737 if (abfd == NULL)
738 return so;
739
740 if (bfd_check_format (abfd.get (), bfd_object))
741 text = bfd_get_section_by_name (abfd.get (), ".text");
742
743 if (!text)
744 return so;
745
746 /* The symbols in a dll are offset by 0x1000, which is the
747 offset from 0 of the first byte in an image - because of the
748 file header and the section alignment. */
749 cygwin_load_start = (CORE_ADDR) (uintptr_t) ((char *)
750 load_addr + 0x1000);
751 cygwin_load_end = cygwin_load_start + bfd_section_size (text);
752 }
753 #endif
754
755 return so;
756 }
757
758 /* See nat/windows-nat.h. */
759
760 void
761 windows_nat::handle_load_dll (const char *dll_name, LPVOID base)
762 {
763 solib_end->next = windows_make_so (dll_name, base);
764 solib_end = solib_end->next;
765
766 lm_info_windows *li = (lm_info_windows *) solib_end->lm_info;
767
768 DEBUG_EVENTS ("Loading dll \"%s\" at %s.", solib_end->so_name,
769 host_address_to_string (li->load_addr));
770 }
771
772 static void
773 windows_free_so (struct so_list *so)
774 {
775 lm_info_windows *li = (lm_info_windows *) so->lm_info;
776
777 delete li;
778 xfree (so);
779 }
780
781 /* See nat/windows-nat.h. */
782
783 void
784 windows_nat::handle_unload_dll ()
785 {
786 LPVOID lpBaseOfDll = current_event.u.UnloadDll.lpBaseOfDll;
787 struct so_list *so;
788
789 for (so = &solib_start; so->next != NULL; so = so->next)
790 {
791 lm_info_windows *li_next = (lm_info_windows *) so->next->lm_info;
792
793 if (li_next->load_addr == lpBaseOfDll)
794 {
795 struct so_list *sodel = so->next;
796
797 so->next = sodel->next;
798 if (!so->next)
799 solib_end = so;
800 DEBUG_EVENTS ("Unloading dll \"%s\".", sodel->so_name);
801
802 windows_free_so (sodel);
803 return;
804 }
805 }
806
807 /* We did not find any DLL that was previously loaded at this address,
808 so register a complaint. We do not report an error, because we have
809 observed that this may be happening under some circumstances. For
810 instance, running 32bit applications on x64 Windows causes us to receive
811 4 mysterious UNLOAD_DLL_DEBUG_EVENTs during the startup phase (these
812 events are apparently caused by the WOW layer, the interface between
813 32bit and 64bit worlds). */
814 complaint (_("dll starting at %s not found."),
815 host_address_to_string (lpBaseOfDll));
816 }
817
818 /* Call FUNC wrapped in a TRY/CATCH that swallows all GDB
819 exceptions. */
820
821 static void
822 catch_errors (void (*func) ())
823 {
824 try
825 {
826 func ();
827 }
828 catch (const gdb_exception &ex)
829 {
830 exception_print (gdb_stderr, ex);
831 }
832 }
833
834 /* Clear list of loaded DLLs. */
835 static void
836 windows_clear_solib (void)
837 {
838 struct so_list *so;
839
840 for (so = solib_start.next; so; so = solib_start.next)
841 {
842 solib_start.next = so->next;
843 windows_free_so (so);
844 }
845
846 solib_end = &solib_start;
847 }
848
849 static void
850 signal_event_command (const char *args, int from_tty)
851 {
852 uintptr_t event_id = 0;
853 char *endargs = NULL;
854
855 if (args == NULL)
856 error (_("signal-event requires an argument (integer event id)"));
857
858 event_id = strtoumax (args, &endargs, 10);
859
860 if ((errno == ERANGE) || (event_id == 0) || (event_id > UINTPTR_MAX) ||
861 ((HANDLE) event_id == INVALID_HANDLE_VALUE))
862 error (_("Failed to convert `%s' to event id"), args);
863
864 SetEvent ((HANDLE) event_id);
865 CloseHandle ((HANDLE) event_id);
866 }
867
868 /* See nat/windows-nat.h. */
869
870 int
871 windows_nat::handle_output_debug_string (struct target_waitstatus *ourstatus)
872 {
873 int retval = 0;
874
875 gdb::unique_xmalloc_ptr<char> s
876 = (target_read_string
877 ((CORE_ADDR) (uintptr_t) current_event.u.DebugString.lpDebugStringData,
878 1024));
879 if (s == nullptr || !*(s.get ()))
880 /* nothing to do */;
881 else if (!startswith (s.get (), _CYGWIN_SIGNAL_STRING))
882 {
883 #ifdef __CYGWIN__
884 if (!startswith (s.get (), "cYg"))
885 #endif
886 {
887 char *p = strchr (s.get (), '\0');
888
889 if (p > s.get () && *--p == '\n')
890 *p = '\0';
891 warning (("%s"), s.get ());
892 }
893 }
894 #ifdef __CYGWIN__
895 else
896 {
897 /* Got a cygwin signal marker. A cygwin signal is followed by
898 the signal number itself and then optionally followed by the
899 thread id and address to saved context within the DLL. If
900 these are supplied, then the given thread is assumed to have
901 issued the signal and the context from the thread is assumed
902 to be stored at the given address in the inferior. Tell gdb
903 to treat this like a real signal. */
904 char *p;
905 int sig = strtol (s.get () + sizeof (_CYGWIN_SIGNAL_STRING) - 1, &p, 0);
906 gdb_signal gotasig = gdb_signal_from_host (sig);
907
908 if (gotasig)
909 {
910 LPCVOID x;
911 SIZE_T n;
912
913 ourstatus->set_stopped (gotasig);
914 retval = strtoul (p, &p, 0);
915 if (!retval)
916 retval = current_event.dwThreadId;
917 else if ((x = (LPCVOID) (uintptr_t) strtoull (p, NULL, 0))
918 && ReadProcessMemory (current_process_handle, x,
919 &saved_context,
920 __COPY_CONTEXT_SIZE, &n)
921 && n == __COPY_CONTEXT_SIZE)
922 have_saved_context = 1;
923 }
924 }
925 #endif
926
927 return retval;
928 }
929
930 static int
931 display_selector (HANDLE thread, DWORD sel)
932 {
933 LDT_ENTRY info;
934 BOOL ret;
935 #ifdef __x86_64__
936 if (wow64_process)
937 ret = Wow64GetThreadSelectorEntry (thread, sel, &info);
938 else
939 #endif
940 ret = GetThreadSelectorEntry (thread, sel, &info);
941 if (ret)
942 {
943 int base, limit;
944 printf_filtered ("0x%03x: ", (unsigned) sel);
945 if (!info.HighWord.Bits.Pres)
946 {
947 puts_filtered ("Segment not present\n");
948 return 0;
949 }
950 base = (info.HighWord.Bits.BaseHi << 24) +
951 (info.HighWord.Bits.BaseMid << 16)
952 + info.BaseLow;
953 limit = (info.HighWord.Bits.LimitHi << 16) + info.LimitLow;
954 if (info.HighWord.Bits.Granularity)
955 limit = (limit << 12) | 0xfff;
956 printf_filtered ("base=0x%08x limit=0x%08x", base, limit);
957 if (info.HighWord.Bits.Default_Big)
958 puts_filtered(" 32-bit ");
959 else
960 puts_filtered(" 16-bit ");
961 switch ((info.HighWord.Bits.Type & 0xf) >> 1)
962 {
963 case 0:
964 puts_filtered ("Data (Read-Only, Exp-up");
965 break;
966 case 1:
967 puts_filtered ("Data (Read/Write, Exp-up");
968 break;
969 case 2:
970 puts_filtered ("Unused segment (");
971 break;
972 case 3:
973 puts_filtered ("Data (Read/Write, Exp-down");
974 break;
975 case 4:
976 puts_filtered ("Code (Exec-Only, N.Conf");
977 break;
978 case 5:
979 puts_filtered ("Code (Exec/Read, N.Conf");
980 break;
981 case 6:
982 puts_filtered ("Code (Exec-Only, Conf");
983 break;
984 case 7:
985 puts_filtered ("Code (Exec/Read, Conf");
986 break;
987 default:
988 printf_filtered ("Unknown type 0x%lx",
989 (unsigned long) info.HighWord.Bits.Type);
990 }
991 if ((info.HighWord.Bits.Type & 0x1) == 0)
992 puts_filtered(", N.Acc");
993 puts_filtered (")\n");
994 if ((info.HighWord.Bits.Type & 0x10) == 0)
995 puts_filtered("System selector ");
996 printf_filtered ("Priviledge level = %ld. ",
997 (unsigned long) info.HighWord.Bits.Dpl);
998 if (info.HighWord.Bits.Granularity)
999 puts_filtered ("Page granular.\n");
1000 else
1001 puts_filtered ("Byte granular.\n");
1002 return 1;
1003 }
1004 else
1005 {
1006 DWORD err = GetLastError ();
1007 if (err == ERROR_NOT_SUPPORTED)
1008 printf_filtered ("Function not supported\n");
1009 else
1010 printf_filtered ("Invalid selector 0x%x.\n", (unsigned) sel);
1011 return 0;
1012 }
1013 }
1014
1015 static void
1016 display_selectors (const char * args, int from_tty)
1017 {
1018 if (inferior_ptid == null_ptid)
1019 {
1020 puts_filtered ("Impossible to display selectors now.\n");
1021 return;
1022 }
1023
1024 windows_thread_info *current_windows_thread
1025 = thread_rec (inferior_ptid, DONT_INVALIDATE_CONTEXT);
1026
1027 if (!args)
1028 {
1029 #ifdef __x86_64__
1030 if (wow64_process)
1031 {
1032 puts_filtered ("Selector $cs\n");
1033 display_selector (current_windows_thread->h,
1034 current_windows_thread->wow64_context.SegCs);
1035 puts_filtered ("Selector $ds\n");
1036 display_selector (current_windows_thread->h,
1037 current_windows_thread->wow64_context.SegDs);
1038 puts_filtered ("Selector $es\n");
1039 display_selector (current_windows_thread->h,
1040 current_windows_thread->wow64_context.SegEs);
1041 puts_filtered ("Selector $ss\n");
1042 display_selector (current_windows_thread->h,
1043 current_windows_thread->wow64_context.SegSs);
1044 puts_filtered ("Selector $fs\n");
1045 display_selector (current_windows_thread->h,
1046 current_windows_thread->wow64_context.SegFs);
1047 puts_filtered ("Selector $gs\n");
1048 display_selector (current_windows_thread->h,
1049 current_windows_thread->wow64_context.SegGs);
1050 }
1051 else
1052 #endif
1053 {
1054 puts_filtered ("Selector $cs\n");
1055 display_selector (current_windows_thread->h,
1056 current_windows_thread->context.SegCs);
1057 puts_filtered ("Selector $ds\n");
1058 display_selector (current_windows_thread->h,
1059 current_windows_thread->context.SegDs);
1060 puts_filtered ("Selector $es\n");
1061 display_selector (current_windows_thread->h,
1062 current_windows_thread->context.SegEs);
1063 puts_filtered ("Selector $ss\n");
1064 display_selector (current_windows_thread->h,
1065 current_windows_thread->context.SegSs);
1066 puts_filtered ("Selector $fs\n");
1067 display_selector (current_windows_thread->h,
1068 current_windows_thread->context.SegFs);
1069 puts_filtered ("Selector $gs\n");
1070 display_selector (current_windows_thread->h,
1071 current_windows_thread->context.SegGs);
1072 }
1073 }
1074 else
1075 {
1076 int sel;
1077 sel = parse_and_eval_long (args);
1078 printf_filtered ("Selector \"%s\"\n",args);
1079 display_selector (current_windows_thread->h, sel);
1080 }
1081 }
1082
1083 /* See nat/windows-nat.h. */
1084
1085 bool
1086 windows_nat::handle_ms_vc_exception (const EXCEPTION_RECORD *rec)
1087 {
1088 if (rec->NumberParameters >= 3
1089 && (rec->ExceptionInformation[0] & 0xffffffff) == 0x1000)
1090 {
1091 DWORD named_thread_id;
1092 windows_thread_info *named_thread;
1093 CORE_ADDR thread_name_target;
1094
1095 thread_name_target = rec->ExceptionInformation[1];
1096 named_thread_id = (DWORD) (0xffffffff & rec->ExceptionInformation[2]);
1097
1098 if (named_thread_id == (DWORD) -1)
1099 named_thread_id = current_event.dwThreadId;
1100
1101 named_thread = thread_rec (ptid_t (current_event.dwProcessId,
1102 named_thread_id, 0),
1103 DONT_INVALIDATE_CONTEXT);
1104 if (named_thread != NULL)
1105 {
1106 int thread_name_len;
1107 gdb::unique_xmalloc_ptr<char> thread_name
1108 = target_read_string (thread_name_target, 1025, &thread_name_len);
1109 if (thread_name_len > 0)
1110 {
1111 thread_name.get ()[thread_name_len - 1] = '\0';
1112 named_thread->name = std::move (thread_name);
1113 }
1114 }
1115
1116 return true;
1117 }
1118
1119 return false;
1120 }
1121
1122 /* See nat/windows-nat.h. */
1123
1124 bool
1125 windows_nat::handle_access_violation (const EXCEPTION_RECORD *rec)
1126 {
1127 #ifdef __CYGWIN__
1128 /* See if the access violation happened within the cygwin DLL
1129 itself. Cygwin uses a kind of exception handling to deal with
1130 passed-in invalid addresses. gdb should not treat these as real
1131 SEGVs since they will be silently handled by cygwin. A real SEGV
1132 will (theoretically) be caught by cygwin later in the process and
1133 will be sent as a cygwin-specific-signal. So, ignore SEGVs if
1134 they show up within the text segment of the DLL itself. */
1135 const char *fn;
1136 CORE_ADDR addr = (CORE_ADDR) (uintptr_t) rec->ExceptionAddress;
1137
1138 if ((!cygwin_exceptions && (addr >= cygwin_load_start
1139 && addr < cygwin_load_end))
1140 || (find_pc_partial_function (addr, &fn, NULL, NULL)
1141 && startswith (fn, "KERNEL32!IsBad")))
1142 return true;
1143 #endif
1144 return false;
1145 }
1146
1147 /* Resume thread specified by ID, or all artificially suspended
1148 threads, if we are continuing execution. KILLED non-zero means we
1149 have killed the inferior, so we should ignore weird errors due to
1150 threads shutting down. */
1151 static BOOL
1152 windows_continue (DWORD continue_status, int id, int killed)
1153 {
1154 BOOL res;
1155
1156 desired_stop_thread_id = id;
1157
1158 if (matching_pending_stop (debug_events))
1159 return TRUE;
1160
1161 for (windows_thread_info *th : thread_list)
1162 if (id == -1 || id == (int) th->tid)
1163 {
1164 #ifdef __x86_64__
1165 if (wow64_process)
1166 {
1167 if (th->debug_registers_changed)
1168 {
1169 th->wow64_context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1170 th->wow64_context.Dr0 = dr[0];
1171 th->wow64_context.Dr1 = dr[1];
1172 th->wow64_context.Dr2 = dr[2];
1173 th->wow64_context.Dr3 = dr[3];
1174 th->wow64_context.Dr6 = DR6_CLEAR_VALUE;
1175 th->wow64_context.Dr7 = dr[7];
1176 th->debug_registers_changed = false;
1177 }
1178 if (th->wow64_context.ContextFlags)
1179 {
1180 DWORD ec = 0;
1181
1182 if (GetExitCodeThread (th->h, &ec)
1183 && ec == STILL_ACTIVE)
1184 {
1185 BOOL status = Wow64SetThreadContext (th->h,
1186 &th->wow64_context);
1187
1188 if (!killed)
1189 CHECK (status);
1190 }
1191 th->wow64_context.ContextFlags = 0;
1192 }
1193 }
1194 else
1195 #endif
1196 {
1197 if (th->debug_registers_changed)
1198 {
1199 th->context.ContextFlags |= CONTEXT_DEBUG_REGISTERS;
1200 th->context.Dr0 = dr[0];
1201 th->context.Dr1 = dr[1];
1202 th->context.Dr2 = dr[2];
1203 th->context.Dr3 = dr[3];
1204 th->context.Dr6 = DR6_CLEAR_VALUE;
1205 th->context.Dr7 = dr[7];
1206 th->debug_registers_changed = false;
1207 }
1208 if (th->context.ContextFlags)
1209 {
1210 DWORD ec = 0;
1211
1212 if (GetExitCodeThread (th->h, &ec)
1213 && ec == STILL_ACTIVE)
1214 {
1215 BOOL status = SetThreadContext (th->h, &th->context);
1216
1217 if (!killed)
1218 CHECK (status);
1219 }
1220 th->context.ContextFlags = 0;
1221 }
1222 }
1223 th->resume ();
1224 }
1225 else
1226 {
1227 /* When single-stepping a specific thread, other threads must
1228 be suspended. */
1229 th->suspend ();
1230 }
1231
1232 res = continue_last_debug_event (continue_status, debug_events);
1233
1234 if (!res)
1235 error (_("Failed to resume program execution"
1236 " (ContinueDebugEvent failed, error %u)"),
1237 (unsigned int) GetLastError ());
1238
1239 return res;
1240 }
1241
1242 /* Called in pathological case where Windows fails to send a
1243 CREATE_PROCESS_DEBUG_EVENT after an attach. */
1244 static DWORD
1245 fake_create_process (void)
1246 {
1247 current_process_handle = OpenProcess (PROCESS_ALL_ACCESS, FALSE,
1248 current_event.dwProcessId);
1249 if (current_process_handle != NULL)
1250 open_process_used = 1;
1251 else
1252 {
1253 error (_("OpenProcess call failed, GetLastError = %u"),
1254 (unsigned) GetLastError ());
1255 /* We can not debug anything in that case. */
1256 }
1257 windows_add_thread (ptid_t (current_event.dwProcessId, 0,
1258 current_event.dwThreadId),
1259 current_event.u.CreateThread.hThread,
1260 current_event.u.CreateThread.lpThreadLocalBase,
1261 true /* main_thread_p */);
1262 return current_event.dwThreadId;
1263 }
1264
1265 void
1266 windows_nat_target::resume (ptid_t ptid, int step, enum gdb_signal sig)
1267 {
1268 windows_thread_info *th;
1269 DWORD continue_status = DBG_CONTINUE;
1270
1271 /* A specific PTID means `step only this thread id'. */
1272 int resume_all = ptid == minus_one_ptid;
1273
1274 /* If we're continuing all threads, it's the current inferior that
1275 should be handled specially. */
1276 if (resume_all)
1277 ptid = inferior_ptid;
1278
1279 if (sig != GDB_SIGNAL_0)
1280 {
1281 if (current_event.dwDebugEventCode != EXCEPTION_DEBUG_EVENT)
1282 {
1283 DEBUG_EXCEPT ("Cannot continue with signal %d here.", sig);
1284 }
1285 else if (sig == last_sig)
1286 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1287 else
1288 #if 0
1289 /* This code does not seem to work, because
1290 the kernel does probably not consider changes in the ExceptionRecord
1291 structure when passing the exception to the inferior.
1292 Note that this seems possible in the exception handler itself. */
1293 {
1294 for (const xlate_exception &x : xlate)
1295 if (x.us == sig)
1296 {
1297 current_event.u.Exception.ExceptionRecord.ExceptionCode
1298 = x.them;
1299 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1300 break;
1301 }
1302 if (continue_status == DBG_CONTINUE)
1303 {
1304 DEBUG_EXCEPT ("Cannot continue with signal %d.", sig);
1305 }
1306 }
1307 #endif
1308 DEBUG_EXCEPT ("Can only continue with received signal %d.",
1309 last_sig);
1310 }
1311
1312 last_sig = GDB_SIGNAL_0;
1313
1314 DEBUG_EXEC ("pid=%d, tid=0x%x, step=%d, sig=%d",
1315 ptid.pid (), (unsigned) ptid.lwp (), step, sig);
1316
1317 /* Get context for currently selected thread. */
1318 th = thread_rec (inferior_ptid, DONT_INVALIDATE_CONTEXT);
1319 if (th)
1320 {
1321 #ifdef __x86_64__
1322 if (wow64_process)
1323 {
1324 if (step)
1325 {
1326 /* Single step by setting t bit. */
1327 struct regcache *regcache = get_current_regcache ();
1328 struct gdbarch *gdbarch = regcache->arch ();
1329 fetch_registers (regcache, gdbarch_ps_regnum (gdbarch));
1330 th->wow64_context.EFlags |= FLAG_TRACE_BIT;
1331 }
1332
1333 if (th->wow64_context.ContextFlags)
1334 {
1335 if (th->debug_registers_changed)
1336 {
1337 th->wow64_context.Dr0 = dr[0];
1338 th->wow64_context.Dr1 = dr[1];
1339 th->wow64_context.Dr2 = dr[2];
1340 th->wow64_context.Dr3 = dr[3];
1341 th->wow64_context.Dr6 = DR6_CLEAR_VALUE;
1342 th->wow64_context.Dr7 = dr[7];
1343 th->debug_registers_changed = false;
1344 }
1345 CHECK (Wow64SetThreadContext (th->h, &th->wow64_context));
1346 th->wow64_context.ContextFlags = 0;
1347 }
1348 }
1349 else
1350 #endif
1351 {
1352 if (step)
1353 {
1354 /* Single step by setting t bit. */
1355 struct regcache *regcache = get_current_regcache ();
1356 struct gdbarch *gdbarch = regcache->arch ();
1357 fetch_registers (regcache, gdbarch_ps_regnum (gdbarch));
1358 th->context.EFlags |= FLAG_TRACE_BIT;
1359 }
1360
1361 if (th->context.ContextFlags)
1362 {
1363 if (th->debug_registers_changed)
1364 {
1365 th->context.Dr0 = dr[0];
1366 th->context.Dr1 = dr[1];
1367 th->context.Dr2 = dr[2];
1368 th->context.Dr3 = dr[3];
1369 th->context.Dr6 = DR6_CLEAR_VALUE;
1370 th->context.Dr7 = dr[7];
1371 th->debug_registers_changed = false;
1372 }
1373 CHECK (SetThreadContext (th->h, &th->context));
1374 th->context.ContextFlags = 0;
1375 }
1376 }
1377 }
1378
1379 /* Allow continuing with the same signal that interrupted us.
1380 Otherwise complain. */
1381
1382 if (resume_all)
1383 windows_continue (continue_status, -1, 0);
1384 else
1385 windows_continue (continue_status, ptid.lwp (), 0);
1386 }
1387
1388 /* Ctrl-C handler used when the inferior is not run in the same console. The
1389 handler is in charge of interrupting the inferior using DebugBreakProcess.
1390 Note that this function is not available prior to Windows XP. In this case
1391 we emit a warning. */
1392 static BOOL WINAPI
1393 ctrl_c_handler (DWORD event_type)
1394 {
1395 const int attach_flag = current_inferior ()->attach_flag;
1396
1397 /* Only handle Ctrl-C and Ctrl-Break events. Ignore others. */
1398 if (event_type != CTRL_C_EVENT && event_type != CTRL_BREAK_EVENT)
1399 return FALSE;
1400
1401 /* If the inferior and the debugger share the same console, do nothing as
1402 the inferior has also received the Ctrl-C event. */
1403 if (!new_console && !attach_flag)
1404 return TRUE;
1405
1406 #ifdef __x86_64__
1407 if (wow64_process)
1408 {
1409 /* Call DbgUiRemoteBreakin of the 32bit ntdll.dll in the target process.
1410 DebugBreakProcess would call the one of the 64bit ntdll.dll, which
1411 can't be correctly handled by gdb. */
1412 if (wow64_dbgbreak == nullptr)
1413 {
1414 CORE_ADDR addr;
1415 if (!find_minimal_symbol_address ("ntdll!DbgUiRemoteBreakin",
1416 &addr, 0))
1417 wow64_dbgbreak = (void *) addr;
1418 }
1419
1420 if (wow64_dbgbreak != nullptr)
1421 {
1422 HANDLE thread = CreateRemoteThread (current_process_handle, NULL,
1423 0, (LPTHREAD_START_ROUTINE)
1424 wow64_dbgbreak, NULL, 0, NULL);
1425 if (thread)
1426 CloseHandle (thread);
1427 }
1428 }
1429 else
1430 #endif
1431 {
1432 if (!DebugBreakProcess (current_process_handle))
1433 warning (_("Could not interrupt program. "
1434 "Press Ctrl-c in the program console."));
1435 }
1436
1437 /* Return true to tell that Ctrl-C has been handled. */
1438 return TRUE;
1439 }
1440
1441 /* Get the next event from the child. Returns a non-zero thread id if the event
1442 requires handling by WFI (or whatever). */
1443
1444 int
1445 windows_nat_target::get_windows_debug_event (int pid,
1446 struct target_waitstatus *ourstatus)
1447 {
1448 BOOL debug_event;
1449 DWORD continue_status, event_code;
1450 DWORD thread_id = 0;
1451
1452 /* If there is a relevant pending stop, report it now. See the
1453 comment by the definition of "pending_stops" for details on why
1454 this is needed. */
1455 gdb::optional<pending_stop> stop = fetch_pending_stop (debug_events);
1456 if (stop.has_value ())
1457 {
1458 thread_id = stop->thread_id;
1459 *ourstatus = stop->status;
1460
1461 ptid_t ptid (current_event.dwProcessId, thread_id);
1462 windows_thread_info *th = thread_rec (ptid, INVALIDATE_CONTEXT);
1463 th->reload_context = true;
1464
1465 return thread_id;
1466 }
1467
1468 last_sig = GDB_SIGNAL_0;
1469
1470 if (!(debug_event = wait_for_debug_event (&current_event, 1000)))
1471 goto out;
1472
1473 continue_status = DBG_CONTINUE;
1474
1475 event_code = current_event.dwDebugEventCode;
1476 ourstatus->set_spurious ();
1477 have_saved_context = 0;
1478
1479 switch (event_code)
1480 {
1481 case CREATE_THREAD_DEBUG_EVENT:
1482 DEBUG_EVENTS ("kernel event for pid=%u tid=0x%x code=%s",
1483 (unsigned) current_event.dwProcessId,
1484 (unsigned) current_event.dwThreadId,
1485 "CREATE_THREAD_DEBUG_EVENT");
1486 if (saw_create != 1)
1487 {
1488 inferior *inf = find_inferior_pid (this, current_event.dwProcessId);
1489 if (!saw_create && inf->attach_flag)
1490 {
1491 /* Kludge around a Windows bug where first event is a create
1492 thread event. Caused when attached process does not have
1493 a main thread. */
1494 thread_id = fake_create_process ();
1495 if (thread_id)
1496 saw_create++;
1497 }
1498 break;
1499 }
1500 /* Record the existence of this thread. */
1501 thread_id = current_event.dwThreadId;
1502 windows_add_thread
1503 (ptid_t (current_event.dwProcessId, current_event.dwThreadId, 0),
1504 current_event.u.CreateThread.hThread,
1505 current_event.u.CreateThread.lpThreadLocalBase,
1506 false /* main_thread_p */);
1507
1508 break;
1509
1510 case EXIT_THREAD_DEBUG_EVENT:
1511 DEBUG_EVENTS ("kernel event for pid=%u tid=0x%x code=%s",
1512 (unsigned) current_event.dwProcessId,
1513 (unsigned) current_event.dwThreadId,
1514 "EXIT_THREAD_DEBUG_EVENT");
1515 windows_delete_thread (ptid_t (current_event.dwProcessId,
1516 current_event.dwThreadId, 0),
1517 current_event.u.ExitThread.dwExitCode,
1518 false /* main_thread_p */);
1519 break;
1520
1521 case CREATE_PROCESS_DEBUG_EVENT:
1522 DEBUG_EVENTS ("kernel event for pid=%u tid=0x%x code=%s",
1523 (unsigned) current_event.dwProcessId,
1524 (unsigned) current_event.dwThreadId,
1525 "CREATE_PROCESS_DEBUG_EVENT");
1526 CloseHandle (current_event.u.CreateProcessInfo.hFile);
1527 if (++saw_create != 1)
1528 break;
1529
1530 current_process_handle = current_event.u.CreateProcessInfo.hProcess;
1531 /* Add the main thread. */
1532 windows_add_thread
1533 (ptid_t (current_event.dwProcessId,
1534 current_event.dwThreadId, 0),
1535 current_event.u.CreateProcessInfo.hThread,
1536 current_event.u.CreateProcessInfo.lpThreadLocalBase,
1537 true /* main_thread_p */);
1538 thread_id = current_event.dwThreadId;
1539 break;
1540
1541 case EXIT_PROCESS_DEBUG_EVENT:
1542 DEBUG_EVENTS ("kernel event for pid=%u tid=0x%x code=%s",
1543 (unsigned) current_event.dwProcessId,
1544 (unsigned) current_event.dwThreadId,
1545 "EXIT_PROCESS_DEBUG_EVENT");
1546 if (!windows_initialization_done)
1547 {
1548 target_terminal::ours ();
1549 target_mourn_inferior (inferior_ptid);
1550 error (_("During startup program exited with code 0x%x."),
1551 (unsigned int) current_event.u.ExitProcess.dwExitCode);
1552 }
1553 else if (saw_create == 1)
1554 {
1555 windows_delete_thread (ptid_t (current_event.dwProcessId,
1556 current_event.dwThreadId, 0),
1557 0, true /* main_thread_p */);
1558 DWORD exit_status = current_event.u.ExitProcess.dwExitCode;
1559 /* If the exit status looks like a fatal exception, but we
1560 don't recognize the exception's code, make the original
1561 exit status value available, to avoid losing
1562 information. */
1563 int exit_signal
1564 = WIFSIGNALED (exit_status) ? WTERMSIG (exit_status) : -1;
1565 if (exit_signal == -1)
1566 ourstatus->set_exited (exit_status);
1567 else
1568 ourstatus->set_signalled (gdb_signal_from_host (exit_signal));
1569
1570 thread_id = current_event.dwThreadId;
1571 }
1572 break;
1573
1574 case LOAD_DLL_DEBUG_EVENT:
1575 DEBUG_EVENTS ("kernel event for pid=%u tid=0x%x code=%s",
1576 (unsigned) current_event.dwProcessId,
1577 (unsigned) current_event.dwThreadId,
1578 "LOAD_DLL_DEBUG_EVENT");
1579 CloseHandle (current_event.u.LoadDll.hFile);
1580 if (saw_create != 1 || ! windows_initialization_done)
1581 break;
1582 catch_errors (dll_loaded_event);
1583 ourstatus->set_loaded ();
1584 thread_id = current_event.dwThreadId;
1585 break;
1586
1587 case UNLOAD_DLL_DEBUG_EVENT:
1588 DEBUG_EVENTS ("kernel event for pid=%u tid=0x%x code=%s",
1589 (unsigned) current_event.dwProcessId,
1590 (unsigned) current_event.dwThreadId,
1591 "UNLOAD_DLL_DEBUG_EVENT");
1592 if (saw_create != 1 || ! windows_initialization_done)
1593 break;
1594 catch_errors (handle_unload_dll);
1595 ourstatus->set_loaded ();
1596 thread_id = current_event.dwThreadId;
1597 break;
1598
1599 case EXCEPTION_DEBUG_EVENT:
1600 DEBUG_EVENTS ("kernel event for pid=%u tid=0x%x code=%s",
1601 (unsigned) current_event.dwProcessId,
1602 (unsigned) current_event.dwThreadId,
1603 "EXCEPTION_DEBUG_EVENT");
1604 if (saw_create != 1)
1605 break;
1606 switch (handle_exception (ourstatus, debug_exceptions))
1607 {
1608 case HANDLE_EXCEPTION_UNHANDLED:
1609 default:
1610 continue_status = DBG_EXCEPTION_NOT_HANDLED;
1611 break;
1612 case HANDLE_EXCEPTION_HANDLED:
1613 thread_id = current_event.dwThreadId;
1614 break;
1615 case HANDLE_EXCEPTION_IGNORED:
1616 continue_status = DBG_CONTINUE;
1617 break;
1618 }
1619 break;
1620
1621 case OUTPUT_DEBUG_STRING_EVENT: /* Message from the kernel. */
1622 DEBUG_EVENTS ("kernel event for pid=%u tid=0x%x code=%s",
1623 (unsigned) current_event.dwProcessId,
1624 (unsigned) current_event.dwThreadId,
1625 "OUTPUT_DEBUG_STRING_EVENT");
1626 if (saw_create != 1)
1627 break;
1628 thread_id = handle_output_debug_string (ourstatus);
1629 break;
1630
1631 default:
1632 if (saw_create != 1)
1633 break;
1634 printf_unfiltered ("gdb: kernel event for pid=%u tid=0x%x\n",
1635 (unsigned) current_event.dwProcessId,
1636 (unsigned) current_event.dwThreadId);
1637 printf_unfiltered (" unknown event code %u\n",
1638 (unsigned) current_event.dwDebugEventCode);
1639 break;
1640 }
1641
1642 if (!thread_id || saw_create != 1)
1643 {
1644 CHECK (windows_continue (continue_status, desired_stop_thread_id, 0));
1645 }
1646 else if (desired_stop_thread_id != -1 && desired_stop_thread_id != thread_id)
1647 {
1648 /* Pending stop. See the comment by the definition of
1649 "pending_stops" for details on why this is needed. */
1650 DEBUG_EVENTS ("get_windows_debug_event - "
1651 "unexpected stop in 0x%x (expecting 0x%x)",
1652 thread_id, desired_stop_thread_id);
1653
1654 if (current_event.dwDebugEventCode == EXCEPTION_DEBUG_EVENT
1655 && ((current_event.u.Exception.ExceptionRecord.ExceptionCode
1656 == EXCEPTION_BREAKPOINT)
1657 || (current_event.u.Exception.ExceptionRecord.ExceptionCode
1658 == STATUS_WX86_BREAKPOINT))
1659 && windows_initialization_done)
1660 {
1661 ptid_t ptid = ptid_t (current_event.dwProcessId, thread_id, 0);
1662 windows_thread_info *th = thread_rec (ptid, INVALIDATE_CONTEXT);
1663 th->stopped_at_software_breakpoint = true;
1664 th->pc_adjusted = false;
1665 }
1666 pending_stops.push_back ({thread_id, *ourstatus, current_event});
1667 thread_id = 0;
1668 CHECK (windows_continue (continue_status, desired_stop_thread_id, 0));
1669 }
1670
1671 out:
1672 return thread_id;
1673 }
1674
1675 /* Wait for interesting events to occur in the target process. */
1676 ptid_t
1677 windows_nat_target::wait (ptid_t ptid, struct target_waitstatus *ourstatus,
1678 target_wait_flags options)
1679 {
1680 int pid = -1;
1681
1682 /* We loop when we get a non-standard exception rather than return
1683 with a SPURIOUS because resume can try and step or modify things,
1684 which needs a current_thread->h. But some of these exceptions mark
1685 the birth or death of threads, which mean that the current thread
1686 isn't necessarily what you think it is. */
1687
1688 while (1)
1689 {
1690 int retval;
1691
1692 /* If the user presses Ctrl-c while the debugger is waiting
1693 for an event, he expects the debugger to interrupt his program
1694 and to get the prompt back. There are two possible situations:
1695
1696 - The debugger and the program do not share the console, in
1697 which case the Ctrl-c event only reached the debugger.
1698 In that case, the ctrl_c handler will take care of interrupting
1699 the inferior. Note that this case is working starting with
1700 Windows XP. For Windows 2000, Ctrl-C should be pressed in the
1701 inferior console.
1702
1703 - The debugger and the program share the same console, in which
1704 case both debugger and inferior will receive the Ctrl-c event.
1705 In that case the ctrl_c handler will ignore the event, as the
1706 Ctrl-c event generated inside the inferior will trigger the
1707 expected debug event.
1708
1709 FIXME: brobecker/2008-05-20: If the inferior receives the
1710 signal first and the delay until GDB receives that signal
1711 is sufficiently long, GDB can sometimes receive the SIGINT
1712 after we have unblocked the CTRL+C handler. This would
1713 lead to the debugger stopping prematurely while handling
1714 the new-thread event that comes with the handling of the SIGINT
1715 inside the inferior, and then stop again immediately when
1716 the user tries to resume the execution in the inferior.
1717 This is a classic race that we should try to fix one day. */
1718 SetConsoleCtrlHandler (&ctrl_c_handler, TRUE);
1719 retval = get_windows_debug_event (pid, ourstatus);
1720 SetConsoleCtrlHandler (&ctrl_c_handler, FALSE);
1721
1722 if (retval)
1723 {
1724 ptid_t result = ptid_t (current_event.dwProcessId, retval, 0);
1725
1726 if (ourstatus->kind () != TARGET_WAITKIND_EXITED
1727 && ourstatus->kind () != TARGET_WAITKIND_SIGNALLED)
1728 {
1729 windows_thread_info *th = thread_rec (result, INVALIDATE_CONTEXT);
1730
1731 if (th != nullptr)
1732 {
1733 th->stopped_at_software_breakpoint = false;
1734 if (current_event.dwDebugEventCode == EXCEPTION_DEBUG_EVENT
1735 && ((current_event.u.Exception.ExceptionRecord.ExceptionCode
1736 == EXCEPTION_BREAKPOINT)
1737 || (current_event.u.Exception.ExceptionRecord.ExceptionCode
1738 == STATUS_WX86_BREAKPOINT))
1739 && windows_initialization_done)
1740 {
1741 th->stopped_at_software_breakpoint = true;
1742 th->pc_adjusted = false;
1743 }
1744 }
1745 }
1746
1747 return result;
1748 }
1749 else
1750 {
1751 int detach = 0;
1752
1753 if (deprecated_ui_loop_hook != NULL)
1754 detach = deprecated_ui_loop_hook (0);
1755
1756 if (detach)
1757 kill ();
1758 }
1759 }
1760 }
1761
1762 void
1763 windows_nat_target::do_initial_windows_stuff (DWORD pid, bool attaching)
1764 {
1765 int i;
1766 struct inferior *inf;
1767
1768 last_sig = GDB_SIGNAL_0;
1769 open_process_used = 0;
1770 for (i = 0; i < sizeof (dr) / sizeof (dr[0]); i++)
1771 dr[i] = 0;
1772 #ifdef __CYGWIN__
1773 cygwin_load_start = cygwin_load_end = 0;
1774 #endif
1775 current_event.dwProcessId = pid;
1776 memset (&current_event, 0, sizeof (current_event));
1777 inf = current_inferior ();
1778 if (!inf->target_is_pushed (this))
1779 inf->push_target (this);
1780 disable_breakpoints_in_shlibs ();
1781 windows_clear_solib ();
1782 clear_proceed_status (0);
1783 init_wait_for_inferior ();
1784
1785 #ifdef __x86_64__
1786 ignore_first_breakpoint = !attaching && wow64_process;
1787
1788 if (!wow64_process)
1789 {
1790 windows_set_context_register_offsets (amd64_mappings);
1791 windows_set_segment_register_p (amd64_windows_segment_register_p);
1792 }
1793 else
1794 #endif
1795 {
1796 windows_set_context_register_offsets (i386_mappings);
1797 windows_set_segment_register_p (i386_windows_segment_register_p);
1798 }
1799
1800 inferior_appeared (inf, pid);
1801 inf->attach_flag = attaching;
1802
1803 target_terminal::init ();
1804 target_terminal::inferior ();
1805
1806 windows_initialization_done = 0;
1807
1808 ptid_t last_ptid;
1809
1810 while (1)
1811 {
1812 struct target_waitstatus status;
1813
1814 last_ptid = this->wait (minus_one_ptid, &status, 0);
1815
1816 /* Note windows_wait returns TARGET_WAITKIND_SPURIOUS for thread
1817 events. */
1818 if (status.kind () != TARGET_WAITKIND_LOADED
1819 && status.kind () != TARGET_WAITKIND_SPURIOUS)
1820 break;
1821
1822 this->resume (minus_one_ptid, 0, GDB_SIGNAL_0);
1823 }
1824
1825 switch_to_thread (find_thread_ptid (this, last_ptid));
1826
1827 /* Now that the inferior has been started and all DLLs have been mapped,
1828 we can iterate over all DLLs and load them in.
1829
1830 We avoid doing it any earlier because, on certain versions of Windows,
1831 LOAD_DLL_DEBUG_EVENTs are sometimes not complete. In particular,
1832 we have seen on Windows 8.1 that the ntdll.dll load event does not
1833 include the DLL name, preventing us from creating an associated SO.
1834 A possible explanation is that ntdll.dll might be mapped before
1835 the SO info gets created by the Windows system -- ntdll.dll is
1836 the first DLL to be reported via LOAD_DLL_DEBUG_EVENT and other DLLs
1837 do not seem to suffer from that problem.
1838
1839 Rather than try to work around this sort of issue, it is much
1840 simpler to just ignore DLL load/unload events during the startup
1841 phase, and then process them all in one batch now. */
1842 windows_add_all_dlls ();
1843
1844 windows_initialization_done = 1;
1845 return;
1846 }
1847
1848 /* Try to set or remove a user privilege to the current process. Return -1
1849 if that fails, the previous setting of that privilege otherwise.
1850
1851 This code is copied from the Cygwin source code and rearranged to allow
1852 dynamically loading of the needed symbols from advapi32 which is only
1853 available on NT/2K/XP. */
1854 static int
1855 set_process_privilege (const char *privilege, BOOL enable)
1856 {
1857 HANDLE token_hdl = NULL;
1858 LUID restore_priv;
1859 TOKEN_PRIVILEGES new_priv, orig_priv;
1860 int ret = -1;
1861 DWORD size;
1862
1863 if (!OpenProcessToken (GetCurrentProcess (),
1864 TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES,
1865 &token_hdl))
1866 goto out;
1867
1868 if (!LookupPrivilegeValueA (NULL, privilege, &restore_priv))
1869 goto out;
1870
1871 new_priv.PrivilegeCount = 1;
1872 new_priv.Privileges[0].Luid = restore_priv;
1873 new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0;
1874
1875 if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv,
1876 sizeof orig_priv, &orig_priv, &size))
1877 goto out;
1878 #if 0
1879 /* Disabled, otherwise every `attach' in an unprivileged user session
1880 would raise the "Failed to get SE_DEBUG_NAME privilege" warning in
1881 windows_attach(). */
1882 /* AdjustTokenPrivileges returns TRUE even if the privilege could not
1883 be enabled. GetLastError () returns an correct error code, though. */
1884 if (enable && GetLastError () == ERROR_NOT_ALL_ASSIGNED)
1885 goto out;
1886 #endif
1887
1888 ret = orig_priv.Privileges[0].Attributes == SE_PRIVILEGE_ENABLED ? 1 : 0;
1889
1890 out:
1891 if (token_hdl)
1892 CloseHandle (token_hdl);
1893
1894 return ret;
1895 }
1896
1897 /* Attach to process PID, then initialize for debugging it. */
1898
1899 void
1900 windows_nat_target::attach (const char *args, int from_tty)
1901 {
1902 BOOL ok;
1903 DWORD pid;
1904
1905 pid = parse_pid_to_attach (args);
1906
1907 if (set_process_privilege (SE_DEBUG_NAME, TRUE) < 0)
1908 warning ("Failed to get SE_DEBUG_NAME privilege\n"
1909 "This can cause attach to fail on Windows NT/2K/XP");
1910
1911 windows_init_thread_list ();
1912 ok = DebugActiveProcess (pid);
1913 saw_create = 0;
1914
1915 #ifdef __CYGWIN__
1916 if (!ok)
1917 {
1918 /* Try fall back to Cygwin pid. */
1919 pid = cygwin_internal (CW_CYGWIN_PID_TO_WINPID, pid);
1920
1921 if (pid > 0)
1922 ok = DebugActiveProcess (pid);
1923 }
1924 #endif
1925
1926 if (!ok)
1927 error (_("Can't attach to process %u (error %u)"),
1928 (unsigned) pid, (unsigned) GetLastError ());
1929
1930 DebugSetProcessKillOnExit (FALSE);
1931
1932 if (from_tty)
1933 {
1934 const char *exec_file = get_exec_file (0);
1935
1936 if (exec_file)
1937 printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
1938 target_pid_to_str (ptid_t (pid)).c_str ());
1939 else
1940 printf_unfiltered ("Attaching to %s\n",
1941 target_pid_to_str (ptid_t (pid)).c_str ());
1942 }
1943
1944 #ifdef __x86_64__
1945 HANDLE h = OpenProcess (PROCESS_QUERY_INFORMATION, FALSE, pid);
1946 if (h != NULL)
1947 {
1948 BOOL wow64;
1949 if (IsWow64Process (h, &wow64))
1950 wow64_process = wow64;
1951 CloseHandle (h);
1952 }
1953 #endif
1954
1955 do_initial_windows_stuff (pid, 1);
1956 target_terminal::ours ();
1957 }
1958
1959 void
1960 windows_nat_target::detach (inferior *inf, int from_tty)
1961 {
1962 int detached = 1;
1963
1964 ptid_t ptid = minus_one_ptid;
1965 resume (ptid, 0, GDB_SIGNAL_0);
1966
1967 if (!DebugActiveProcessStop (current_event.dwProcessId))
1968 {
1969 error (_("Can't detach process %u (error %u)"),
1970 (unsigned) current_event.dwProcessId, (unsigned) GetLastError ());
1971 detached = 0;
1972 }
1973 DebugSetProcessKillOnExit (FALSE);
1974
1975 if (detached && from_tty)
1976 {
1977 const char *exec_file = get_exec_file (0);
1978 if (exec_file == 0)
1979 exec_file = "";
1980 printf_unfiltered ("Detaching from program: %s, Pid %u\n", exec_file,
1981 (unsigned) current_event.dwProcessId);
1982 }
1983
1984 x86_cleanup_dregs ();
1985 switch_to_no_thread ();
1986 detach_inferior (inf);
1987
1988 maybe_unpush_target ();
1989 }
1990
1991 /* Try to determine the executable filename.
1992
1993 EXE_NAME_RET is a pointer to a buffer whose size is EXE_NAME_MAX_LEN.
1994
1995 Upon success, the filename is stored inside EXE_NAME_RET, and
1996 this function returns nonzero.
1997
1998 Otherwise, this function returns zero and the contents of
1999 EXE_NAME_RET is undefined. */
2000
2001 static int
2002 windows_get_exec_module_filename (char *exe_name_ret, size_t exe_name_max_len)
2003 {
2004 DWORD len;
2005 HMODULE dh_buf;
2006 DWORD cbNeeded;
2007
2008 cbNeeded = 0;
2009 #ifdef __x86_64__
2010 if (wow64_process)
2011 {
2012 if (!EnumProcessModulesEx (current_process_handle, &dh_buf,
2013 sizeof (HMODULE), &cbNeeded,
2014 LIST_MODULES_32BIT) || !cbNeeded)
2015 return 0;
2016 }
2017 else
2018 #endif
2019 {
2020 if (!EnumProcessModules (current_process_handle, &dh_buf,
2021 sizeof (HMODULE), &cbNeeded) || !cbNeeded)
2022 return 0;
2023 }
2024
2025 /* We know the executable is always first in the list of modules,
2026 which we just fetched. So no need to fetch more. */
2027
2028 #ifdef __CYGWIN__
2029 {
2030 /* Cygwin prefers that the path be in /x/y/z format, so extract
2031 the filename into a temporary buffer first, and then convert it
2032 to POSIX format into the destination buffer. */
2033 cygwin_buf_t *pathbuf = (cygwin_buf_t *) alloca (exe_name_max_len * sizeof (cygwin_buf_t));
2034
2035 len = GetModuleFileNameEx (current_process_handle,
2036 dh_buf, pathbuf, exe_name_max_len);
2037 if (len == 0)
2038 error (_("Error getting executable filename: %u."),
2039 (unsigned) GetLastError ());
2040 if (cygwin_conv_path (CCP_WIN_W_TO_POSIX, pathbuf, exe_name_ret,
2041 exe_name_max_len) < 0)
2042 error (_("Error converting executable filename to POSIX: %d."), errno);
2043 }
2044 #else
2045 len = GetModuleFileNameEx (current_process_handle,
2046 dh_buf, exe_name_ret, exe_name_max_len);
2047 if (len == 0)
2048 error (_("Error getting executable filename: %u."),
2049 (unsigned) GetLastError ());
2050 #endif
2051
2052 return 1; /* success */
2053 }
2054
2055 /* The pid_to_exec_file target_ops method for this platform. */
2056
2057 char *
2058 windows_nat_target::pid_to_exec_file (int pid)
2059 {
2060 static char path[__PMAX];
2061 #ifdef __CYGWIN__
2062 /* Try to find exe name as symlink target of /proc/<pid>/exe. */
2063 int nchars;
2064 char procexe[sizeof ("/proc/4294967295/exe")];
2065
2066 xsnprintf (procexe, sizeof (procexe), "/proc/%u/exe", pid);
2067 nchars = readlink (procexe, path, sizeof(path));
2068 if (nchars > 0 && nchars < sizeof (path))
2069 {
2070 path[nchars] = '\0'; /* Got it */
2071 return path;
2072 }
2073 #endif
2074
2075 /* If we get here then either Cygwin is hosed, this isn't a Cygwin version
2076 of gdb, or we're trying to debug a non-Cygwin windows executable. */
2077 if (!windows_get_exec_module_filename (path, sizeof (path)))
2078 path[0] = '\0';
2079
2080 return path;
2081 }
2082
2083 /* Print status information about what we're accessing. */
2084
2085 void
2086 windows_nat_target::files_info ()
2087 {
2088 struct inferior *inf = current_inferior ();
2089
2090 printf_filtered ("\tUsing the running image of %s %s.\n",
2091 inf->attach_flag ? "attached" : "child",
2092 target_pid_to_str (inferior_ptid).c_str ());
2093 }
2094
2095 /* Modify CreateProcess parameters for use of a new separate console.
2096 Parameters are:
2097 *FLAGS: DWORD parameter for general process creation flags.
2098 *SI: STARTUPINFO structure, for which the console window size and
2099 console buffer size is filled in if GDB is running in a console.
2100 to create the new console.
2101 The size of the used font is not available on all versions of
2102 Windows OS. Furthermore, the current font might not be the default
2103 font, but this is still better than before.
2104 If the windows and buffer sizes are computed,
2105 SI->DWFLAGS is changed so that this information is used
2106 by CreateProcess function. */
2107
2108 static void
2109 windows_set_console_info (STARTUPINFO *si, DWORD *flags)
2110 {
2111 HANDLE hconsole = CreateFile ("CONOUT$", GENERIC_READ | GENERIC_WRITE,
2112 FILE_SHARE_READ, NULL, OPEN_EXISTING, 0, 0);
2113
2114 if (hconsole != INVALID_HANDLE_VALUE)
2115 {
2116 CONSOLE_SCREEN_BUFFER_INFO sbinfo;
2117 COORD font_size;
2118 CONSOLE_FONT_INFO cfi;
2119
2120 GetCurrentConsoleFont (hconsole, FALSE, &cfi);
2121 font_size = GetConsoleFontSize (hconsole, cfi.nFont);
2122 GetConsoleScreenBufferInfo(hconsole, &sbinfo);
2123 si->dwXSize = sbinfo.srWindow.Right - sbinfo.srWindow.Left + 1;
2124 si->dwYSize = sbinfo.srWindow.Bottom - sbinfo.srWindow.Top + 1;
2125 if (font_size.X)
2126 si->dwXSize *= font_size.X;
2127 else
2128 si->dwXSize *= 8;
2129 if (font_size.Y)
2130 si->dwYSize *= font_size.Y;
2131 else
2132 si->dwYSize *= 12;
2133 si->dwXCountChars = sbinfo.dwSize.X;
2134 si->dwYCountChars = sbinfo.dwSize.Y;
2135 si->dwFlags |= STARTF_USESIZE | STARTF_USECOUNTCHARS;
2136 }
2137 *flags |= CREATE_NEW_CONSOLE;
2138 }
2139
2140 #ifndef __CYGWIN__
2141 /* Function called by qsort to sort environment strings. */
2142
2143 static int
2144 envvar_cmp (const void *a, const void *b)
2145 {
2146 const char **p = (const char **) a;
2147 const char **q = (const char **) b;
2148 return strcasecmp (*p, *q);
2149 }
2150 #endif
2151
2152 #ifdef __CYGWIN__
2153 static void
2154 clear_win32_environment (char **env)
2155 {
2156 int i;
2157 size_t len;
2158 wchar_t *copy = NULL, *equalpos;
2159
2160 for (i = 0; env[i] && *env[i]; i++)
2161 {
2162 len = mbstowcs (NULL, env[i], 0) + 1;
2163 copy = (wchar_t *) xrealloc (copy, len * sizeof (wchar_t));
2164 mbstowcs (copy, env[i], len);
2165 equalpos = wcschr (copy, L'=');
2166 if (equalpos)
2167 *equalpos = L'\0';
2168 SetEnvironmentVariableW (copy, NULL);
2169 }
2170 xfree (copy);
2171 }
2172 #endif
2173
2174 #ifndef __CYGWIN__
2175
2176 /* Redirection of inferior I/O streams for native MS-Windows programs.
2177 Unlike on Unix, where this is handled by invoking the inferior via
2178 the shell, on MS-Windows we need to emulate the cmd.exe shell.
2179
2180 The official documentation of the cmd.exe redirection features is here:
2181
2182 http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/redirection.mspx
2183
2184 (That page talks about Windows XP, but there's no newer
2185 documentation, so we assume later versions of cmd.exe didn't change
2186 anything.)
2187
2188 Caveat: the documentation on that page seems to include a few lies.
2189 For example, it describes strange constructs 1<&2 and 2<&1, which
2190 seem to work only when 1>&2 resp. 2>&1 would make sense, and so I
2191 think the cmd.exe parser of the redirection symbols simply doesn't
2192 care about the < vs > distinction in these cases. Therefore, the
2193 supported features are explicitly documented below.
2194
2195 The emulation below aims at supporting all the valid use cases
2196 supported by cmd.exe, which include:
2197
2198 < FILE redirect standard input from FILE
2199 0< FILE redirect standard input from FILE
2200 <&N redirect standard input from file descriptor N
2201 0<&N redirect standard input from file descriptor N
2202 > FILE redirect standard output to FILE
2203 >> FILE append standard output to FILE
2204 1>> FILE append standard output to FILE
2205 >&N redirect standard output to file descriptor N
2206 1>&N redirect standard output to file descriptor N
2207 >>&N append standard output to file descriptor N
2208 1>>&N append standard output to file descriptor N
2209 2> FILE redirect standard error to FILE
2210 2>> FILE append standard error to FILE
2211 2>&N redirect standard error to file descriptor N
2212 2>>&N append standard error to file descriptor N
2213
2214 Note that using N > 2 in the above construct is supported, but
2215 requires that the corresponding file descriptor be open by some
2216 means elsewhere or outside GDB. Also note that using ">&0" or
2217 "<&2" will generally fail, because the file descriptor redirected
2218 from is normally open in an incompatible mode (e.g., FD 0 is open
2219 for reading only). IOW, use of such tricks is not recommended;
2220 you are on your own.
2221
2222 We do NOT support redirection of file descriptors above 2, as in
2223 "3>SOME-FILE", because MinGW compiled programs don't (supporting
2224 that needs special handling in the startup code that MinGW
2225 doesn't have). Pipes are also not supported.
2226
2227 As for invalid use cases, where the redirection contains some
2228 error, the emulation below will detect that and produce some
2229 error and/or failure. But the behavior in those cases is not
2230 bug-for-bug compatible with what cmd.exe does in those cases.
2231 That's because what cmd.exe does then is not well defined, and
2232 seems to be a side effect of the cmd.exe parsing of the command
2233 line more than anything else. For example, try redirecting to an
2234 invalid file name, as in "> foo:bar".
2235
2236 There are also minor syntactic deviations from what cmd.exe does
2237 in some corner cases. For example, it doesn't support the likes
2238 of "> &foo" to mean redirect to file named literally "&foo"; we
2239 do support that here, because that, too, sounds like some issue
2240 with the cmd.exe parser. Another nicety is that we support
2241 redirection targets that use file names with forward slashes,
2242 something cmd.exe doesn't -- this comes in handy since GDB
2243 file-name completion can be used when typing the command line for
2244 the inferior. */
2245
2246 /* Support routines for redirecting standard handles of the inferior. */
2247
2248 /* Parse a single redirection spec, open/duplicate the specified
2249 file/fd, and assign the appropriate value to one of the 3 standard
2250 file descriptors. */
2251 static int
2252 redir_open (const char *redir_string, int *inp, int *out, int *err)
2253 {
2254 int *fd, ref_fd = -2;
2255 int mode;
2256 const char *fname = redir_string + 1;
2257 int rc = *redir_string;
2258
2259 switch (rc)
2260 {
2261 case '0':
2262 fname++;
2263 /* FALLTHROUGH */
2264 case '<':
2265 fd = inp;
2266 mode = O_RDONLY;
2267 break;
2268 case '1': case '2':
2269 fname++;
2270 /* FALLTHROUGH */
2271 case '>':
2272 fd = (rc == '2') ? err : out;
2273 mode = O_WRONLY | O_CREAT;
2274 if (*fname == '>')
2275 {
2276 fname++;
2277 mode |= O_APPEND;
2278 }
2279 else
2280 mode |= O_TRUNC;
2281 break;
2282 default:
2283 return -1;
2284 }
2285
2286 if (*fname == '&' && '0' <= fname[1] && fname[1] <= '9')
2287 {
2288 /* A reference to a file descriptor. */
2289 char *fdtail;
2290 ref_fd = (int) strtol (fname + 1, &fdtail, 10);
2291 if (fdtail > fname + 1 && *fdtail == '\0')
2292 {
2293 /* Don't allow redirection when open modes are incompatible. */
2294 if ((ref_fd == 0 && (fd == out || fd == err))
2295 || ((ref_fd == 1 || ref_fd == 2) && fd == inp))
2296 {
2297 errno = EPERM;
2298 return -1;
2299 }
2300 if (ref_fd == 0)
2301 ref_fd = *inp;
2302 else if (ref_fd == 1)
2303 ref_fd = *out;
2304 else if (ref_fd == 2)
2305 ref_fd = *err;
2306 }
2307 else
2308 {
2309 errno = EBADF;
2310 return -1;
2311 }
2312 }
2313 else
2314 fname++; /* skip the separator space */
2315 /* If the descriptor is already open, close it. This allows
2316 multiple specs of redirections for the same stream, which is
2317 somewhat nonsensical, but still valid and supported by cmd.exe.
2318 (But cmd.exe only opens a single file in this case, the one
2319 specified by the last redirection spec on the command line.) */
2320 if (*fd >= 0)
2321 _close (*fd);
2322 if (ref_fd == -2)
2323 {
2324 *fd = _open (fname, mode, _S_IREAD | _S_IWRITE);
2325 if (*fd < 0)
2326 return -1;
2327 }
2328 else if (ref_fd == -1)
2329 *fd = -1; /* reset to default destination */
2330 else
2331 {
2332 *fd = _dup (ref_fd);
2333 if (*fd < 0)
2334 return -1;
2335 }
2336 /* _open just sets a flag for O_APPEND, which won't be passed to the
2337 inferior, so we need to actually move the file pointer. */
2338 if ((mode & O_APPEND) != 0)
2339 _lseek (*fd, 0L, SEEK_END);
2340 return 0;
2341 }
2342
2343 /* Canonicalize a single redirection spec and set up the corresponding
2344 file descriptor as specified. */
2345 static int
2346 redir_set_redirection (const char *s, int *inp, int *out, int *err)
2347 {
2348 char buf[__PMAX + 2 + 5]; /* extra space for quotes & redirection string */
2349 char *d = buf;
2350 const char *start = s;
2351 int quote = 0;
2352
2353 *d++ = *s++; /* copy the 1st character, < or > or a digit */
2354 if ((*start == '>' || *start == '1' || *start == '2')
2355 && *s == '>')
2356 {
2357 *d++ = *s++;
2358 if (*s == '>' && *start != '>')
2359 *d++ = *s++;
2360 }
2361 else if (*start == '0' && *s == '<')
2362 *d++ = *s++;
2363 /* cmd.exe recognizes "&N" only immediately after the redirection symbol. */
2364 if (*s != '&')
2365 {
2366 while (isspace (*s)) /* skip whitespace before file name */
2367 s++;
2368 *d++ = ' '; /* separate file name with a single space */
2369 }
2370
2371 /* Copy the file name. */
2372 while (*s)
2373 {
2374 /* Remove quoting characters from the file name in buf[]. */
2375 if (*s == '"') /* could support '..' quoting here */
2376 {
2377 if (!quote)
2378 quote = *s++;
2379 else if (*s == quote)
2380 {
2381 quote = 0;
2382 s++;
2383 }
2384 else
2385 *d++ = *s++;
2386 }
2387 else if (*s == '\\')
2388 {
2389 if (s[1] == '"') /* could support '..' here */
2390 s++;
2391 *d++ = *s++;
2392 }
2393 else if (isspace (*s) && !quote)
2394 break;
2395 else
2396 *d++ = *s++;
2397 if (d - buf >= sizeof (buf) - 1)
2398 {
2399 errno = ENAMETOOLONG;
2400 return 0;
2401 }
2402 }
2403 *d = '\0';
2404
2405 /* Windows doesn't allow redirection characters in file names, so we
2406 can bail out early if they use them, or if there's no target file
2407 name after the redirection symbol. */
2408 if (d[-1] == '>' || d[-1] == '<')
2409 {
2410 errno = ENOENT;
2411 return 0;
2412 }
2413 if (redir_open (buf, inp, out, err) == 0)
2414 return s - start;
2415 return 0;
2416 }
2417
2418 /* Parse the command line for redirection specs and prepare the file
2419 descriptors for the 3 standard streams accordingly. */
2420 static bool
2421 redirect_inferior_handles (const char *cmd_orig, char *cmd,
2422 int *inp, int *out, int *err)
2423 {
2424 const char *s = cmd_orig;
2425 char *d = cmd;
2426 int quote = 0;
2427 bool retval = false;
2428
2429 while (isspace (*s))
2430 *d++ = *s++;
2431
2432 while (*s)
2433 {
2434 if (*s == '"') /* could also support '..' quoting here */
2435 {
2436 if (!quote)
2437 quote = *s;
2438 else if (*s == quote)
2439 quote = 0;
2440 }
2441 else if (*s == '\\')
2442 {
2443 if (s[1] == '"') /* escaped quote char */
2444 s++;
2445 }
2446 else if (!quote)
2447 {
2448 /* Process a single redirection candidate. */
2449 if (*s == '<' || *s == '>'
2450 || ((*s == '1' || *s == '2') && s[1] == '>')
2451 || (*s == '0' && s[1] == '<'))
2452 {
2453 int skip = redir_set_redirection (s, inp, out, err);
2454
2455 if (skip <= 0)
2456 return false;
2457 retval = true;
2458 s += skip;
2459 }
2460 }
2461 if (*s)
2462 *d++ = *s++;
2463 }
2464 *d = '\0';
2465 return retval;
2466 }
2467 #endif /* !__CYGWIN__ */
2468
2469 /* Start an inferior windows child process and sets inferior_ptid to its pid.
2470 EXEC_FILE is the file to run.
2471 ALLARGS is a string containing the arguments to the program.
2472 ENV is the environment vector to pass. Errors reported with error(). */
2473
2474 void
2475 windows_nat_target::create_inferior (const char *exec_file,
2476 const std::string &origallargs,
2477 char **in_env, int from_tty)
2478 {
2479 STARTUPINFO si;
2480 #ifdef __CYGWIN__
2481 cygwin_buf_t real_path[__PMAX];
2482 cygwin_buf_t shell[__PMAX]; /* Path to shell */
2483 cygwin_buf_t infcwd[__PMAX];
2484 const char *sh;
2485 cygwin_buf_t *toexec;
2486 cygwin_buf_t *cygallargs;
2487 cygwin_buf_t *args;
2488 char **old_env = NULL;
2489 PWCHAR w32_env;
2490 size_t len;
2491 int tty;
2492 int ostdin, ostdout, ostderr;
2493 #else /* !__CYGWIN__ */
2494 char shell[__PMAX]; /* Path to shell */
2495 const char *toexec;
2496 char *args, *allargs_copy;
2497 size_t args_len, allargs_len;
2498 int fd_inp = -1, fd_out = -1, fd_err = -1;
2499 HANDLE tty = INVALID_HANDLE_VALUE;
2500 bool redirected = false;
2501 char *w32env;
2502 char *temp;
2503 size_t envlen;
2504 int i;
2505 size_t envsize;
2506 char **env;
2507 #endif /* !__CYGWIN__ */
2508 const char *allargs = origallargs.c_str ();
2509 PROCESS_INFORMATION pi;
2510 BOOL ret;
2511 DWORD flags = 0;
2512 const std::string &inferior_tty = current_inferior ()->tty ();
2513
2514 if (!exec_file)
2515 error (_("No executable specified, use `target exec'."));
2516
2517 const char *inferior_cwd = current_inferior ()->cwd ().c_str ();
2518 std::string expanded_infcwd;
2519 if (*inferior_cwd == '\0')
2520 inferior_cwd = nullptr;
2521 else
2522 {
2523 expanded_infcwd = gdb_tilde_expand (inferior_cwd);
2524 /* Mirror slashes on inferior's cwd. */
2525 std::replace (expanded_infcwd.begin (), expanded_infcwd.end (),
2526 '/', '\\');
2527 inferior_cwd = expanded_infcwd.c_str ();
2528 }
2529
2530 memset (&si, 0, sizeof (si));
2531 si.cb = sizeof (si);
2532
2533 if (new_group)
2534 flags |= CREATE_NEW_PROCESS_GROUP;
2535
2536 if (new_console)
2537 windows_set_console_info (&si, &flags);
2538
2539 #ifdef __CYGWIN__
2540 if (!useshell)
2541 {
2542 flags |= DEBUG_ONLY_THIS_PROCESS;
2543 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, exec_file, real_path,
2544 __PMAX * sizeof (cygwin_buf_t)) < 0)
2545 error (_("Error starting executable: %d"), errno);
2546 toexec = real_path;
2547 #ifdef __USEWIDE
2548 len = mbstowcs (NULL, allargs, 0) + 1;
2549 if (len == (size_t) -1)
2550 error (_("Error starting executable: %d"), errno);
2551 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2552 mbstowcs (cygallargs, allargs, len);
2553 #else /* !__USEWIDE */
2554 cygallargs = allargs;
2555 #endif
2556 }
2557 else
2558 {
2559 sh = get_shell ();
2560 if (cygwin_conv_path (CCP_POSIX_TO_WIN_W, sh, shell, __PMAX) < 0)
2561 error (_("Error starting executable via shell: %d"), errno);
2562 #ifdef __USEWIDE
2563 len = sizeof (L" -c 'exec '") + mbstowcs (NULL, exec_file, 0)
2564 + mbstowcs (NULL, allargs, 0) + 2;
2565 cygallargs = (wchar_t *) alloca (len * sizeof (wchar_t));
2566 swprintf (cygallargs, len, L" -c 'exec %s %s'", exec_file, allargs);
2567 #else /* !__USEWIDE */
2568 len = (sizeof (" -c 'exec '") + strlen (exec_file)
2569 + strlen (allargs) + 2);
2570 cygallargs = (char *) alloca (len);
2571 xsnprintf (cygallargs, len, " -c 'exec %s %s'", exec_file, allargs);
2572 #endif /* __USEWIDE */
2573 toexec = shell;
2574 flags |= DEBUG_PROCESS;
2575 }
2576
2577 if (inferior_cwd != NULL
2578 && cygwin_conv_path (CCP_POSIX_TO_WIN_W, inferior_cwd,
2579 infcwd, strlen (inferior_cwd)) < 0)
2580 error (_("Error converting inferior cwd: %d"), errno);
2581
2582 #ifdef __USEWIDE
2583 args = (cygwin_buf_t *) alloca ((wcslen (toexec) + wcslen (cygallargs) + 2)
2584 * sizeof (wchar_t));
2585 wcscpy (args, toexec);
2586 wcscat (args, L" ");
2587 wcscat (args, cygallargs);
2588 #else /* !__USEWIDE */
2589 args = (cygwin_buf_t *) alloca (strlen (toexec) + strlen (cygallargs) + 2);
2590 strcpy (args, toexec);
2591 strcat (args, " ");
2592 strcat (args, cygallargs);
2593 #endif /* !__USEWIDE */
2594
2595 #ifdef CW_CVT_ENV_TO_WINENV
2596 /* First try to create a direct Win32 copy of the POSIX environment. */
2597 w32_env = (PWCHAR) cygwin_internal (CW_CVT_ENV_TO_WINENV, in_env);
2598 if (w32_env != (PWCHAR) -1)
2599 flags |= CREATE_UNICODE_ENVIRONMENT;
2600 else
2601 /* If that fails, fall back to old method tweaking GDB's environment. */
2602 #endif /* CW_CVT_ENV_TO_WINENV */
2603 {
2604 /* Reset all Win32 environment variables to avoid leftover on next run. */
2605 clear_win32_environment (environ);
2606 /* Prepare the environment vars for CreateProcess. */
2607 old_env = environ;
2608 environ = in_env;
2609 cygwin_internal (CW_SYNC_WINENV);
2610 w32_env = NULL;
2611 }
2612
2613 if (inferior_tty.empty ())
2614 tty = ostdin = ostdout = ostderr = -1;
2615 else
2616 {
2617 tty = open (inferior_tty.c_str (), O_RDWR | O_NOCTTY);
2618 if (tty < 0)
2619 {
2620 print_sys_errmsg (inferior_tty.c_str (), errno);
2621 ostdin = ostdout = ostderr = -1;
2622 }
2623 else
2624 {
2625 ostdin = dup (0);
2626 ostdout = dup (1);
2627 ostderr = dup (2);
2628 dup2 (tty, 0);
2629 dup2 (tty, 1);
2630 dup2 (tty, 2);
2631 }
2632 }
2633
2634 windows_init_thread_list ();
2635 ret = CreateProcess (0,
2636 args, /* command line */
2637 NULL, /* Security */
2638 NULL, /* thread */
2639 TRUE, /* inherit handles */
2640 flags, /* start flags */
2641 w32_env, /* environment */
2642 inferior_cwd != NULL ? infcwd : NULL, /* current
2643 directory */
2644 &si,
2645 &pi);
2646 if (w32_env)
2647 /* Just free the Win32 environment, if it could be created. */
2648 free (w32_env);
2649 else
2650 {
2651 /* Reset all environment variables to avoid leftover on next run. */
2652 clear_win32_environment (in_env);
2653 /* Restore normal GDB environment variables. */
2654 environ = old_env;
2655 cygwin_internal (CW_SYNC_WINENV);
2656 }
2657
2658 if (tty >= 0)
2659 {
2660 ::close (tty);
2661 dup2 (ostdin, 0);
2662 dup2 (ostdout, 1);
2663 dup2 (ostderr, 2);
2664 ::close (ostdin);
2665 ::close (ostdout);
2666 ::close (ostderr);
2667 }
2668 #else /* !__CYGWIN__ */
2669 allargs_len = strlen (allargs);
2670 allargs_copy = strcpy ((char *) alloca (allargs_len + 1), allargs);
2671 if (strpbrk (allargs_copy, "<>") != NULL)
2672 {
2673 int e = errno;
2674 errno = 0;
2675 redirected =
2676 redirect_inferior_handles (allargs, allargs_copy,
2677 &fd_inp, &fd_out, &fd_err);
2678 if (errno)
2679 warning (_("Error in redirection: %s."), safe_strerror (errno));
2680 else
2681 errno = e;
2682 allargs_len = strlen (allargs_copy);
2683 }
2684 /* If not all the standard streams are redirected by the command
2685 line, use INFERIOR_TTY for those which aren't. */
2686 if (!inferior_tty.empty ()
2687 && !(fd_inp >= 0 && fd_out >= 0 && fd_err >= 0))
2688 {
2689 SECURITY_ATTRIBUTES sa;
2690 sa.nLength = sizeof(sa);
2691 sa.lpSecurityDescriptor = 0;
2692 sa.bInheritHandle = TRUE;
2693 tty = CreateFileA (inferior_tty.c_str (), GENERIC_READ | GENERIC_WRITE,
2694 0, &sa, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
2695 if (tty == INVALID_HANDLE_VALUE)
2696 warning (_("Warning: Failed to open TTY %s, error %#x."),
2697 inferior_tty.c_str (), (unsigned) GetLastError ());
2698 }
2699 if (redirected || tty != INVALID_HANDLE_VALUE)
2700 {
2701 if (fd_inp >= 0)
2702 si.hStdInput = (HANDLE) _get_osfhandle (fd_inp);
2703 else if (tty != INVALID_HANDLE_VALUE)
2704 si.hStdInput = tty;
2705 else
2706 si.hStdInput = GetStdHandle (STD_INPUT_HANDLE);
2707 if (fd_out >= 0)
2708 si.hStdOutput = (HANDLE) _get_osfhandle (fd_out);
2709 else if (tty != INVALID_HANDLE_VALUE)
2710 si.hStdOutput = tty;
2711 else
2712 si.hStdOutput = GetStdHandle (STD_OUTPUT_HANDLE);
2713 if (fd_err >= 0)
2714 si.hStdError = (HANDLE) _get_osfhandle (fd_err);
2715 else if (tty != INVALID_HANDLE_VALUE)
2716 si.hStdError = tty;
2717 else
2718 si.hStdError = GetStdHandle (STD_ERROR_HANDLE);
2719 si.dwFlags |= STARTF_USESTDHANDLES;
2720 }
2721
2722 toexec = exec_file;
2723 /* Build the command line, a space-separated list of tokens where
2724 the first token is the name of the module to be executed.
2725 To avoid ambiguities introduced by spaces in the module name,
2726 we quote it. */
2727 args_len = strlen (toexec) + 2 /* quotes */ + allargs_len + 2;
2728 args = (char *) alloca (args_len);
2729 xsnprintf (args, args_len, "\"%s\" %s", toexec, allargs_copy);
2730
2731 flags |= DEBUG_ONLY_THIS_PROCESS;
2732
2733 /* CreateProcess takes the environment list as a null terminated set of
2734 strings (i.e. two nulls terminate the list). */
2735
2736 /* Get total size for env strings. */
2737 for (envlen = 0, i = 0; in_env[i] && *in_env[i]; i++)
2738 envlen += strlen (in_env[i]) + 1;
2739
2740 envsize = sizeof (in_env[0]) * (i + 1);
2741 env = (char **) alloca (envsize);
2742 memcpy (env, in_env, envsize);
2743 /* Windows programs expect the environment block to be sorted. */
2744 qsort (env, i, sizeof (char *), envvar_cmp);
2745
2746 w32env = (char *) alloca (envlen + 1);
2747
2748 /* Copy env strings into new buffer. */
2749 for (temp = w32env, i = 0; env[i] && *env[i]; i++)
2750 {
2751 strcpy (temp, env[i]);
2752 temp += strlen (temp) + 1;
2753 }
2754
2755 /* Final nil string to terminate new env. */
2756 *temp = 0;
2757
2758 windows_init_thread_list ();
2759 ret = CreateProcessA (0,
2760 args, /* command line */
2761 NULL, /* Security */
2762 NULL, /* thread */
2763 TRUE, /* inherit handles */
2764 flags, /* start flags */
2765 w32env, /* environment */
2766 inferior_cwd, /* current directory */
2767 &si,
2768 &pi);
2769 if (tty != INVALID_HANDLE_VALUE)
2770 CloseHandle (tty);
2771 if (fd_inp >= 0)
2772 _close (fd_inp);
2773 if (fd_out >= 0)
2774 _close (fd_out);
2775 if (fd_err >= 0)
2776 _close (fd_err);
2777 #endif /* !__CYGWIN__ */
2778
2779 if (!ret)
2780 error (_("Error creating process %s, (error %u)."),
2781 exec_file, (unsigned) GetLastError ());
2782
2783 #ifdef __x86_64__
2784 BOOL wow64;
2785 if (IsWow64Process (pi.hProcess, &wow64))
2786 wow64_process = wow64;
2787 #endif
2788
2789 CloseHandle (pi.hThread);
2790 CloseHandle (pi.hProcess);
2791
2792 if (useshell && shell[0] != '\0')
2793 saw_create = -1;
2794 else
2795 saw_create = 0;
2796
2797 do_initial_windows_stuff (pi.dwProcessId, 0);
2798
2799 /* windows_continue (DBG_CONTINUE, -1, 0); */
2800 }
2801
2802 void
2803 windows_nat_target::mourn_inferior ()
2804 {
2805 (void) windows_continue (DBG_CONTINUE, -1, 0);
2806 x86_cleanup_dregs();
2807 if (open_process_used)
2808 {
2809 CHECK (CloseHandle (current_process_handle));
2810 open_process_used = 0;
2811 }
2812 siginfo_er.ExceptionCode = 0;
2813 inf_child_target::mourn_inferior ();
2814 }
2815
2816 /* Send a SIGINT to the process group. This acts just like the user typed a
2817 ^C on the controlling terminal. */
2818
2819 void
2820 windows_nat_target::interrupt ()
2821 {
2822 DEBUG_EVENTS ("GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)");
2823 CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, current_event.dwProcessId));
2824 registers_changed (); /* refresh register state */
2825 }
2826
2827 /* Helper for windows_xfer_partial that handles memory transfers.
2828 Arguments are like target_xfer_partial. */
2829
2830 static enum target_xfer_status
2831 windows_xfer_memory (gdb_byte *readbuf, const gdb_byte *writebuf,
2832 ULONGEST memaddr, ULONGEST len, ULONGEST *xfered_len)
2833 {
2834 SIZE_T done = 0;
2835 BOOL success;
2836 DWORD lasterror = 0;
2837
2838 if (writebuf != NULL)
2839 {
2840 DEBUG_MEM ("write target memory, %s bytes at %s",
2841 pulongest (len), core_addr_to_string (memaddr));
2842 success = WriteProcessMemory (current_process_handle,
2843 (LPVOID) (uintptr_t) memaddr, writebuf,
2844 len, &done);
2845 if (!success)
2846 lasterror = GetLastError ();
2847 FlushInstructionCache (current_process_handle,
2848 (LPCVOID) (uintptr_t) memaddr, len);
2849 }
2850 else
2851 {
2852 DEBUG_MEM ("read target memory, %s bytes at %s",
2853 pulongest (len), core_addr_to_string (memaddr));
2854 success = ReadProcessMemory (current_process_handle,
2855 (LPCVOID) (uintptr_t) memaddr, readbuf,
2856 len, &done);
2857 if (!success)
2858 lasterror = GetLastError ();
2859 }
2860 *xfered_len = (ULONGEST) done;
2861 if (!success && lasterror == ERROR_PARTIAL_COPY && done > 0)
2862 return TARGET_XFER_OK;
2863 else
2864 return success ? TARGET_XFER_OK : TARGET_XFER_E_IO;
2865 }
2866
2867 void
2868 windows_nat_target::kill ()
2869 {
2870 CHECK (TerminateProcess (current_process_handle, 0));
2871
2872 for (;;)
2873 {
2874 if (!windows_continue (DBG_CONTINUE, -1, 1))
2875 break;
2876 if (!wait_for_debug_event (&current_event, INFINITE))
2877 break;
2878 if (current_event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
2879 break;
2880 }
2881
2882 target_mourn_inferior (inferior_ptid); /* Or just windows_mourn_inferior? */
2883 }
2884
2885 void
2886 windows_nat_target::close ()
2887 {
2888 DEBUG_EVENTS ("inferior_ptid=%d\n", inferior_ptid.pid ());
2889 }
2890
2891 /* Convert pid to printable format. */
2892 std::string
2893 windows_nat_target::pid_to_str (ptid_t ptid)
2894 {
2895 if (ptid.lwp () != 0)
2896 return string_printf ("Thread %d.0x%lx", ptid.pid (), ptid.lwp ());
2897
2898 return normal_pid_to_str (ptid);
2899 }
2900
2901 static enum target_xfer_status
2902 windows_xfer_shared_libraries (struct target_ops *ops,
2903 enum target_object object, const char *annex,
2904 gdb_byte *readbuf, const gdb_byte *writebuf,
2905 ULONGEST offset, ULONGEST len,
2906 ULONGEST *xfered_len)
2907 {
2908 struct obstack obstack;
2909 const char *buf;
2910 LONGEST len_avail;
2911 struct so_list *so;
2912
2913 if (writebuf)
2914 return TARGET_XFER_E_IO;
2915
2916 obstack_init (&obstack);
2917 obstack_grow_str (&obstack, "<library-list>\n");
2918 for (so = solib_start.next; so; so = so->next)
2919 {
2920 lm_info_windows *li = (lm_info_windows *) so->lm_info;
2921
2922 windows_xfer_shared_library (so->so_name, (CORE_ADDR)
2923 (uintptr_t) li->load_addr,
2924 &li->text_offset,
2925 target_gdbarch (), &obstack);
2926 }
2927 obstack_grow_str0 (&obstack, "</library-list>\n");
2928
2929 buf = (const char *) obstack_finish (&obstack);
2930 len_avail = strlen (buf);
2931 if (offset >= len_avail)
2932 len= 0;
2933 else
2934 {
2935 if (len > len_avail - offset)
2936 len = len_avail - offset;
2937 memcpy (readbuf, buf + offset, len);
2938 }
2939
2940 obstack_free (&obstack, NULL);
2941 *xfered_len = (ULONGEST) len;
2942 return len != 0 ? TARGET_XFER_OK : TARGET_XFER_EOF;
2943 }
2944
2945 /* Helper for windows_nat_target::xfer_partial that handles signal info. */
2946
2947 static enum target_xfer_status
2948 windows_xfer_siginfo (gdb_byte *readbuf, ULONGEST offset, ULONGEST len,
2949 ULONGEST *xfered_len)
2950 {
2951 char *buf = (char *) &siginfo_er;
2952 size_t bufsize = sizeof (siginfo_er);
2953
2954 #ifdef __x86_64__
2955 EXCEPTION_RECORD32 er32;
2956 if (wow64_process)
2957 {
2958 buf = (char *) &er32;
2959 bufsize = sizeof (er32);
2960
2961 er32.ExceptionCode = siginfo_er.ExceptionCode;
2962 er32.ExceptionFlags = siginfo_er.ExceptionFlags;
2963 er32.ExceptionRecord = (uintptr_t) siginfo_er.ExceptionRecord;
2964 er32.ExceptionAddress = (uintptr_t) siginfo_er.ExceptionAddress;
2965 er32.NumberParameters = siginfo_er.NumberParameters;
2966 int i;
2967 for (i = 0; i < EXCEPTION_MAXIMUM_PARAMETERS; i++)
2968 er32.ExceptionInformation[i] = siginfo_er.ExceptionInformation[i];
2969 }
2970 #endif
2971
2972 if (siginfo_er.ExceptionCode == 0)
2973 return TARGET_XFER_E_IO;
2974
2975 if (readbuf == nullptr)
2976 return TARGET_XFER_E_IO;
2977
2978 if (offset > bufsize)
2979 return TARGET_XFER_E_IO;
2980
2981 if (offset + len > bufsize)
2982 len = bufsize - offset;
2983
2984 memcpy (readbuf, buf + offset, len);
2985 *xfered_len = len;
2986
2987 return TARGET_XFER_OK;
2988 }
2989
2990 enum target_xfer_status
2991 windows_nat_target::xfer_partial (enum target_object object,
2992 const char *annex, gdb_byte *readbuf,
2993 const gdb_byte *writebuf, ULONGEST offset,
2994 ULONGEST len, ULONGEST *xfered_len)
2995 {
2996 switch (object)
2997 {
2998 case TARGET_OBJECT_MEMORY:
2999 return windows_xfer_memory (readbuf, writebuf, offset, len, xfered_len);
3000
3001 case TARGET_OBJECT_LIBRARIES:
3002 return windows_xfer_shared_libraries (this, object, annex, readbuf,
3003 writebuf, offset, len, xfered_len);
3004
3005 case TARGET_OBJECT_SIGNAL_INFO:
3006 return windows_xfer_siginfo (readbuf, offset, len, xfered_len);
3007
3008 default:
3009 if (beneath () == NULL)
3010 {
3011 /* This can happen when requesting the transfer of unsupported
3012 objects before a program has been started (and therefore
3013 with the current_target having no target beneath). */
3014 return TARGET_XFER_E_IO;
3015 }
3016 return beneath ()->xfer_partial (object, annex,
3017 readbuf, writebuf, offset, len,
3018 xfered_len);
3019 }
3020 }
3021
3022 /* Provide thread local base, i.e. Thread Information Block address.
3023 Returns 1 if ptid is found and sets *ADDR to thread_local_base. */
3024
3025 bool
3026 windows_nat_target::get_tib_address (ptid_t ptid, CORE_ADDR *addr)
3027 {
3028 windows_thread_info *th;
3029
3030 th = thread_rec (ptid, DONT_INVALIDATE_CONTEXT);
3031 if (th == NULL)
3032 return false;
3033
3034 if (addr != NULL)
3035 *addr = th->thread_local_base;
3036
3037 return true;
3038 }
3039
3040 ptid_t
3041 windows_nat_target::get_ada_task_ptid (long lwp, ULONGEST thread)
3042 {
3043 return ptid_t (inferior_ptid.pid (), lwp, 0);
3044 }
3045
3046 /* Implementation of the to_thread_name method. */
3047
3048 const char *
3049 windows_nat_target::thread_name (struct thread_info *thr)
3050 {
3051 return thread_rec (thr->ptid, DONT_INVALIDATE_CONTEXT)->name.get ();
3052 }
3053
3054
3055 void _initialize_windows_nat ();
3056 void
3057 _initialize_windows_nat ()
3058 {
3059 x86_dr_low.set_control = cygwin_set_dr7;
3060 x86_dr_low.set_addr = cygwin_set_dr;
3061 x86_dr_low.get_addr = cygwin_get_dr;
3062 x86_dr_low.get_status = cygwin_get_dr6;
3063 x86_dr_low.get_control = cygwin_get_dr7;
3064
3065 /* x86_dr_low.debug_register_length field is set by
3066 calling x86_set_debug_register_length function
3067 in processor windows specific native file. */
3068
3069 add_inf_child_target (&the_windows_nat_target);
3070
3071 #ifdef __CYGWIN__
3072 cygwin_internal (CW_SET_DOS_FILE_WARNING, 0);
3073 #endif
3074
3075 add_com ("signal-event", class_run, signal_event_command, _("\
3076 Signal a crashed process with event ID, to allow its debugging.\n\
3077 This command is needed in support of setting up GDB as JIT debugger on \
3078 MS-Windows. The command should be invoked from the GDB command line using \
3079 the '-ex' command-line option. The ID of the event that blocks the \
3080 crashed process will be supplied by the Windows JIT debugging mechanism."));
3081
3082 #ifdef __CYGWIN__
3083 add_setshow_boolean_cmd ("shell", class_support, &useshell, _("\
3084 Set use of shell to start subprocess."), _("\
3085 Show use of shell to start subprocess."), NULL,
3086 NULL,
3087 NULL, /* FIXME: i18n: */
3088 &setlist, &showlist);
3089
3090 add_setshow_boolean_cmd ("cygwin-exceptions", class_support,
3091 &cygwin_exceptions, _("\
3092 Break when an exception is detected in the Cygwin DLL itself."), _("\
3093 Show whether gdb breaks on exceptions in the Cygwin DLL itself."), NULL,
3094 NULL,
3095 NULL, /* FIXME: i18n: */
3096 &setlist, &showlist);
3097 #endif
3098
3099 add_setshow_boolean_cmd ("new-console", class_support, &new_console, _("\
3100 Set creation of new console when creating child process."), _("\
3101 Show creation of new console when creating child process."), NULL,
3102 NULL,
3103 NULL, /* FIXME: i18n: */
3104 &setlist, &showlist);
3105
3106 add_setshow_boolean_cmd ("new-group", class_support, &new_group, _("\
3107 Set creation of new group when creating child process."), _("\
3108 Show creation of new group when creating child process."), NULL,
3109 NULL,
3110 NULL, /* FIXME: i18n: */
3111 &setlist, &showlist);
3112
3113 add_setshow_boolean_cmd ("debugexec", class_support, &debug_exec, _("\
3114 Set whether to display execution in child process."), _("\
3115 Show whether to display execution in child process."), NULL,
3116 NULL,
3117 NULL, /* FIXME: i18n: */
3118 &setlist, &showlist);
3119
3120 add_setshow_boolean_cmd ("debugevents", class_support, &debug_events, _("\
3121 Set whether to display kernel events in child process."), _("\
3122 Show whether to display kernel events in child process."), NULL,
3123 NULL,
3124 NULL, /* FIXME: i18n: */
3125 &setlist, &showlist);
3126
3127 add_setshow_boolean_cmd ("debugmemory", class_support, &debug_memory, _("\
3128 Set whether to display memory accesses in child process."), _("\
3129 Show whether to display memory accesses in child process."), NULL,
3130 NULL,
3131 NULL, /* FIXME: i18n: */
3132 &setlist, &showlist);
3133
3134 add_setshow_boolean_cmd ("debugexceptions", class_support,
3135 &debug_exceptions, _("\
3136 Set whether to display kernel exceptions in child process."), _("\
3137 Show whether to display kernel exceptions in child process."), NULL,
3138 NULL,
3139 NULL, /* FIXME: i18n: */
3140 &setlist, &showlist);
3141
3142 init_w32_command_list ();
3143
3144 add_cmd ("selector", class_info, display_selectors,
3145 _("Display selectors infos."),
3146 &info_w32_cmdlist);
3147
3148 if (!initialize_loadable ())
3149 {
3150 /* This will probably fail on Windows 9x/Me. Let the user know
3151 that we're missing some functionality. */
3152 warning(_("\
3153 cannot automatically find executable file or library to read symbols.\n\
3154 Use \"file\" or \"dll\" command to load executable/libraries directly."));
3155 }
3156 }
3157
3158 /* Hardware watchpoint support, adapted from go32-nat.c code. */
3159
3160 /* Pass the address ADDR to the inferior in the I'th debug register.
3161 Here we just store the address in dr array, the registers will be
3162 actually set up when windows_continue is called. */
3163 static void
3164 cygwin_set_dr (int i, CORE_ADDR addr)
3165 {
3166 if (i < 0 || i > 3)
3167 internal_error (__FILE__, __LINE__,
3168 _("Invalid register %d in cygwin_set_dr.\n"), i);
3169 dr[i] = addr;
3170
3171 for (windows_thread_info *th : thread_list)
3172 th->debug_registers_changed = true;
3173 }
3174
3175 /* Pass the value VAL to the inferior in the DR7 debug control
3176 register. Here we just store the address in D_REGS, the watchpoint
3177 will be actually set up in windows_wait. */
3178 static void
3179 cygwin_set_dr7 (unsigned long val)
3180 {
3181 dr[7] = (CORE_ADDR) val;
3182
3183 for (windows_thread_info *th : thread_list)
3184 th->debug_registers_changed = true;
3185 }
3186
3187 /* Get the value of debug register I from the inferior. */
3188
3189 static CORE_ADDR
3190 cygwin_get_dr (int i)
3191 {
3192 return dr[i];
3193 }
3194
3195 /* Get the value of the DR6 debug status register from the inferior.
3196 Here we just return the value stored in dr[6]
3197 by the last call to thread_rec for current_event.dwThreadId id. */
3198 static unsigned long
3199 cygwin_get_dr6 (void)
3200 {
3201 return (unsigned long) dr[6];
3202 }
3203
3204 /* Get the value of the DR7 debug status register from the inferior.
3205 Here we just return the value stored in dr[7] by the last call to
3206 thread_rec for current_event.dwThreadId id. */
3207
3208 static unsigned long
3209 cygwin_get_dr7 (void)
3210 {
3211 return (unsigned long) dr[7];
3212 }
3213
3214 /* Determine if the thread referenced by "ptid" is alive
3215 by "polling" it. If WaitForSingleObject returns WAIT_OBJECT_0
3216 it means that the thread has died. Otherwise it is assumed to be alive. */
3217
3218 bool
3219 windows_nat_target::thread_alive (ptid_t ptid)
3220 {
3221 gdb_assert (ptid.lwp () != 0);
3222
3223 return (WaitForSingleObject (thread_rec (ptid, DONT_INVALIDATE_CONTEXT)->h, 0)
3224 != WAIT_OBJECT_0);
3225 }
3226
3227 void _initialize_check_for_gdb_ini ();
3228 void
3229 _initialize_check_for_gdb_ini ()
3230 {
3231 char *homedir;
3232 if (inhibit_gdbinit)
3233 return;
3234
3235 homedir = getenv ("HOME");
3236 if (homedir)
3237 {
3238 char *p;
3239 char *oldini = (char *) alloca (strlen (homedir) +
3240 sizeof ("gdb.ini") + 1);
3241 strcpy (oldini, homedir);
3242 p = strchr (oldini, '\0');
3243 if (p > oldini && !IS_DIR_SEPARATOR (p[-1]))
3244 *p++ = '/';
3245 strcpy (p, "gdb.ini");
3246 if (access (oldini, 0) == 0)
3247 {
3248 int len = strlen (oldini);
3249 char *newini = (char *) alloca (len + 2);
3250
3251 xsnprintf (newini, len + 2, "%.*s.gdbinit",
3252 (int) (len - (sizeof ("gdb.ini") - 1)), oldini);
3253 warning (_("obsolete '%s' found. Rename to '%s'."), oldini, newini);
3254 }
3255 }
3256 }