NetBSD/gnu/dist/gdb/win32-nat.c
1999-02-10 22:06:10 +00:00

982 lines
28 KiB
C

/* Target-vector operations for controlling win32 child processes, for GDB.
Copyright 1995, 1996, 1997, 1998 Free Software Foundation, Inc.
Contributed by Cygnus Support.
This file is part of GDB.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without eve nthe implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
*/
/* by Steve Chamberlain, sac@cygnus.com */
/* We assume we're being built with and will be used for cygwin32. */
#include "defs.h"
#include "frame.h" /* required by inferior.h */
#include "inferior.h"
#include "target.h"
#include "wait.h"
#include "gdbcore.h"
#include "command.h"
#include <signal.h>
#include <sys/types.h>
#include <fcntl.h>
#include <stdlib.h>
#ifdef _MSC_VER
#include "windefs.h"
#else /* other WIN32 compiler */
#include <windows.h>
#endif
#include "buildsym.h"
#include "symfile.h"
#include "objfiles.h"
#include "gdb_string.h"
#include "gdbthread.h"
#include "gdbcmd.h"
#include <sys/param.h>
#include <unistd.h>
#define CHECK(x) check (x, __FILE__,__LINE__)
#define DEBUG_EXEC(x) if (debug_exec) printf x
#define DEBUG_EVENTS(x) if (debug_events) printf x
#define DEBUG_MEM(x) if (debug_memory) printf x
#define DEBUG_EXCEPT(x) if (debug_exceptions) printf x
/* Forward declaration */
extern struct target_ops child_ops;
static void child_stop PARAMS ((void));
/* The most recently read context. Inspect ContextFlags to see what
bits are valid. */
static CONTEXT context;
/* The process and thread handles for the above context. */
static HANDLE current_process;
static HANDLE current_thread;
static int current_process_id;
static int current_thread_id;
/* Counts of things. */
static int exception_count = 0;
static int event_count = 0;
/* User options. */
static int new_console = 0;
static int new_group = 0;
static int debug_exec = 0; /* show execution */
static int debug_events = 0; /* show events from kernel */
static int debug_memory = 0; /* show target memory accesses */
static int debug_exceptions = 0; /* show target exceptions */
/* This vector maps GDB's idea of a register's number into an address
in the win32 exception context vector.
It also contains the bit mask needed to load the register in question.
One day we could read a reg, we could inspect the context we
already have loaded, if it doesn't have the bit set that we need,
we read that set of registers in using GetThreadContext. If the
context already contains what we need, we just unpack it. Then to
write a register, first we have to ensure that the context contains
the other regs of the group, and then we copy the info in and set
out bit. */
struct regmappings
{
char *incontext;
int mask;
};
static const struct regmappings mappings[] =
{
#ifdef __PPC__
{(char *) &context.Gpr0, CONTEXT_INTEGER},
{(char *) &context.Gpr1, CONTEXT_INTEGER},
{(char *) &context.Gpr2, CONTEXT_INTEGER},
{(char *) &context.Gpr3, CONTEXT_INTEGER},
{(char *) &context.Gpr4, CONTEXT_INTEGER},
{(char *) &context.Gpr5, CONTEXT_INTEGER},
{(char *) &context.Gpr6, CONTEXT_INTEGER},
{(char *) &context.Gpr7, CONTEXT_INTEGER},
{(char *) &context.Gpr8, CONTEXT_INTEGER},
{(char *) &context.Gpr9, CONTEXT_INTEGER},
{(char *) &context.Gpr10, CONTEXT_INTEGER},
{(char *) &context.Gpr11, CONTEXT_INTEGER},
{(char *) &context.Gpr12, CONTEXT_INTEGER},
{(char *) &context.Gpr13, CONTEXT_INTEGER},
{(char *) &context.Gpr14, CONTEXT_INTEGER},
{(char *) &context.Gpr15, CONTEXT_INTEGER},
{(char *) &context.Gpr16, CONTEXT_INTEGER},
{(char *) &context.Gpr17, CONTEXT_INTEGER},
{(char *) &context.Gpr18, CONTEXT_INTEGER},
{(char *) &context.Gpr19, CONTEXT_INTEGER},
{(char *) &context.Gpr20, CONTEXT_INTEGER},
{(char *) &context.Gpr21, CONTEXT_INTEGER},
{(char *) &context.Gpr22, CONTEXT_INTEGER},
{(char *) &context.Gpr23, CONTEXT_INTEGER},
{(char *) &context.Gpr24, CONTEXT_INTEGER},
{(char *) &context.Gpr25, CONTEXT_INTEGER},
{(char *) &context.Gpr26, CONTEXT_INTEGER},
{(char *) &context.Gpr27, CONTEXT_INTEGER},
{(char *) &context.Gpr28, CONTEXT_INTEGER},
{(char *) &context.Gpr29, CONTEXT_INTEGER},
{(char *) &context.Gpr30, CONTEXT_INTEGER},
{(char *) &context.Gpr31, CONTEXT_INTEGER},
{(char *) &context.Fpr0, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr1, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr2, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr3, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr4, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr5, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr6, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr7, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr8, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr9, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr10, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr11, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr12, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr13, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr14, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr15, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr16, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr17, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr18, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr19, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr20, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr21, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr22, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr23, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr24, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr25, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr26, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr27, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr28, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr29, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr30, CONTEXT_FLOATING_POINT},
{(char *) &context.Fpr31, CONTEXT_FLOATING_POINT},
{(char *) &context.Iar, CONTEXT_CONTROL},
{(char *) &context.Msr, CONTEXT_CONTROL},
{(char *) &context.Cr, CONTEXT_INTEGER},
{(char *) &context.Lr, CONTEXT_CONTROL},
{(char *) &context.Ctr, CONTEXT_CONTROL},
{(char *) &context.Xer, CONTEXT_INTEGER},
{0,0}, /* MQ, but there isn't one */
#else
{(char *) &context.Eax, CONTEXT_INTEGER},
{(char *) &context.Ecx, CONTEXT_INTEGER},
{(char *) &context.Edx, CONTEXT_INTEGER},
{(char *) &context.Ebx, CONTEXT_INTEGER},
{(char *) &context.Esp, CONTEXT_CONTROL},
{(char *) &context.Ebp, CONTEXT_CONTROL},
{(char *) &context.Esi, CONTEXT_INTEGER},
{(char *) &context.Edi, CONTEXT_INTEGER},
{(char *) &context.Eip, CONTEXT_CONTROL},
{(char *) &context.EFlags, CONTEXT_CONTROL},
{(char *) &context.SegCs, CONTEXT_SEGMENTS},
{(char *) &context.SegSs, CONTEXT_SEGMENTS},
{(char *) &context.SegDs, CONTEXT_SEGMENTS},
{(char *) &context.SegEs, CONTEXT_SEGMENTS},
{(char *) &context.SegFs, CONTEXT_SEGMENTS},
{(char *) &context.SegGs, CONTEXT_SEGMENTS},
{&context.FloatSave.RegisterArea[0 * 10], CONTEXT_FLOATING_POINT},
{&context.FloatSave.RegisterArea[1 * 10], CONTEXT_FLOATING_POINT},
{&context.FloatSave.RegisterArea[2 * 10], CONTEXT_FLOATING_POINT},
{&context.FloatSave.RegisterArea[3 * 10], CONTEXT_FLOATING_POINT},
{&context.FloatSave.RegisterArea[4 * 10], CONTEXT_FLOATING_POINT},
{&context.FloatSave.RegisterArea[5 * 10], CONTEXT_FLOATING_POINT},
{&context.FloatSave.RegisterArea[6 * 10], CONTEXT_FLOATING_POINT},
{&context.FloatSave.RegisterArea[7 * 10], CONTEXT_FLOATING_POINT},
#endif
};
/* This vector maps the target's idea of an exception (extracted
from the DEBUG_EVENT structure) to GDB's idea. */
struct xlate_exception
{
int them;
enum target_signal us;
};
static const struct xlate_exception
xlate[] =
{
{EXCEPTION_ACCESS_VIOLATION, TARGET_SIGNAL_SEGV},
{STATUS_STACK_OVERFLOW, TARGET_SIGNAL_SEGV},
{EXCEPTION_BREAKPOINT, TARGET_SIGNAL_TRAP},
{DBG_CONTROL_C, TARGET_SIGNAL_INT},
{EXCEPTION_SINGLE_STEP, TARGET_SIGNAL_TRAP},
{-1, -1}};
static void
check (BOOL ok, const char *file, int line)
{
if (!ok)
printf_filtered ("error return %s:%d was %d\n", file, line, GetLastError ());
}
static void
child_fetch_inferior_registers (int r)
{
if (r < 0)
{
for (r = 0; r < NUM_REGS; r++)
child_fetch_inferior_registers (r);
}
else
{
supply_register (r, mappings[r].incontext);
}
}
static void
child_store_inferior_registers (int r)
{
if (r < 0)
{
for (r = 0; r < NUM_REGS; r++)
child_store_inferior_registers (r);
}
else
{
read_register_gen (r, mappings[r].incontext);
}
}
/* Wait for child to do something. Return pid of child, or -1 in case
of error; store status through argument pointer OURSTATUS. */
static int
handle_load_dll (char *eventp)
{
DEBUG_EVENT * event = (DEBUG_EVENT *)eventp;
DWORD dll_name_ptr;
DWORD done;
ReadProcessMemory (current_process,
(DWORD) event->u.LoadDll.lpImageName,
(char *) &dll_name_ptr,
sizeof (dll_name_ptr), &done);
/* See if we could read the address of a string, and that the
address isn't null. */
if (done == sizeof (dll_name_ptr) && dll_name_ptr)
{
char *dll_name, *dll_basename;
struct objfile *objfile;
char unix_dll_name[MAX_PATH];
int size = event->u.LoadDll.fUnicode ? sizeof (WCHAR) : sizeof (char);
int len = 0;
char b[2];
do
{
ReadProcessMemory (current_process,
dll_name_ptr + len * size,
&b,
size,
&done);
len++;
}
while ((b[0] != 0 || b[size - 1] != 0) && done == size);
dll_name = alloca (len);
if (event->u.LoadDll.fUnicode)
{
WCHAR *unicode_dll_name = (WCHAR *) alloca (len * sizeof (WCHAR));
ReadProcessMemory (current_process,
dll_name_ptr,
unicode_dll_name,
len * sizeof (WCHAR),
&done);
WideCharToMultiByte (CP_ACP, 0,
unicode_dll_name, len,
dll_name, len, 0, 0);
}
else
{
ReadProcessMemory (current_process,
dll_name_ptr,
dll_name,
len,
&done);
}
/* FIXME: Can we delete this call? */
cygwin32_conv_to_posix_path (dll_name, unix_dll_name);
/* FIXME!! It would be nice to define one symbol which pointed to the
front of the dll if we can't find any symbols. */
if (!(dll_basename = strrchr(dll_name, '\\')))
dll_basename = strrchr(dll_name, '/');
ALL_OBJFILES(objfile)
{
char *objfile_basename;
if (!(objfile_basename = strrchr(objfile->name, '\\')))
objfile_basename = strrchr(objfile->name, '/');
if (dll_basename && objfile_basename &&
strcmp(dll_basename+1, objfile_basename+1) == 0)
{
printf_unfiltered ("%s (symbols previously loaded)\n",
dll_basename + 1);
return 1;
}
}
context.ContextFlags = CONTEXT_FULL | CONTEXT_FLOATING_POINT;
GetThreadContext (current_thread, &context);
/* The symbols in a dll are offset by 0x1000, which is the
the offset from 0 of the first byte in an image - because
of the file header and the section alignment.
FIXME: Is this the real reason that we need the 0x1000 ? */
symbol_file_add (unix_dll_name, 0,
(int) event->u.LoadDll.lpBaseOfDll + 0x1000, 0, 0, 0);
printf_unfiltered ("%x:%s\n", event->u.LoadDll.lpBaseOfDll,
unix_dll_name);
}
return 1;
}
static int
handle_exception (DEBUG_EVENT * event, struct target_waitstatus *ourstatus)
{
int i;
int done = 0;
ourstatus->kind = TARGET_WAITKIND_STOPPED;
switch (event->u.Exception.ExceptionRecord.ExceptionCode)
{
case EXCEPTION_ACCESS_VIOLATION:
DEBUG_EXCEPT (("gdb: Target exception ACCESS_VIOLATION at 0x%08x\n",
event->u.Exception.ExceptionRecord.ExceptionAddress));
ourstatus->value.sig = TARGET_SIGNAL_SEGV;
break;
case STATUS_STACK_OVERFLOW:
DEBUG_EXCEPT (("gdb: Target exception STACK_OVERFLOW at 0x%08x\n",
event->u.Exception.ExceptionRecord.ExceptionAddress));
ourstatus->value.sig = TARGET_SIGNAL_SEGV;
break;
case EXCEPTION_BREAKPOINT:
DEBUG_EXCEPT (("gdb: Target exception BREAKPOINT at 0x%08x\n",
event->u.Exception.ExceptionRecord.ExceptionAddress));
ourstatus->value.sig = TARGET_SIGNAL_TRAP;
break;
case DBG_CONTROL_C:
DEBUG_EXCEPT (("gdb: Target exception CONTROL_C at 0x%08x\n",
event->u.Exception.ExceptionRecord.ExceptionAddress));
ourstatus->value.sig = TARGET_SIGNAL_INT;
break;
case EXCEPTION_SINGLE_STEP:
DEBUG_EXCEPT (("gdb: Target exception SINGLE_STEP at 0x%08x\n",
event->u.Exception.ExceptionRecord.ExceptionAddress));
ourstatus->value.sig = TARGET_SIGNAL_TRAP;
break;
default:
/* This may be a structured exception handling exception. In
that case, we want to let the program try to handle it, and
only break if we see the exception a second time. */
if (event->u.Exception.dwFirstChance)
return 0;
printf_unfiltered ("gdb: unknown target exception 0x%08x at 0x%08x\n",
event->u.Exception.ExceptionRecord.ExceptionCode,
event->u.Exception.ExceptionRecord.ExceptionAddress);
ourstatus->value.sig = TARGET_SIGNAL_UNKNOWN;
break;
}
context.ContextFlags = CONTEXT_FULL | CONTEXT_FLOATING_POINT;
GetThreadContext (current_thread, &context);
exception_count++;
return 1;
}
static int
child_wait (int pid, struct target_waitstatus *ourstatus)
{
/* We loop when we get a non-standard exception rather than return
with a SPURIOUS because resume can try and step or modify things,
which needs a current_thread. But some of these exceptions mark
the birth or death of threads, which mean that the current thread
isn't necessarily what you think it is. */
while (1)
{
DEBUG_EVENT event;
BOOL t = WaitForDebugEvent (&event, INFINITE);
char *p;
DWORD continue_status;
event_count++;
current_thread_id = event.dwThreadId;
current_process_id = event.dwProcessId;
continue_status = DBG_CONTINUE;
switch (event.dwDebugEventCode)
{
case CREATE_THREAD_DEBUG_EVENT:
DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
event.dwProcessId, event.dwThreadId,
"CREATE_THREAD_DEBUG_EVENT"));
break;
case EXIT_THREAD_DEBUG_EVENT:
DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
event.dwProcessId, event.dwThreadId,
"EXIT_THREAD_DEBUG_EVENT"));
break;
case CREATE_PROCESS_DEBUG_EVENT:
DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
event.dwProcessId, event.dwThreadId,
"CREATE_PROCESS_DEBUG_EVENT"));
break;
case EXIT_PROCESS_DEBUG_EVENT:
DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
event.dwProcessId, event.dwThreadId,
"EXIT_PROCESS_DEBUG_EVENT"));
ourstatus->kind = TARGET_WAITKIND_EXITED;
ourstatus->value.integer = event.u.ExitProcess.dwExitCode;
CloseHandle (current_process);
CloseHandle (current_thread);
return current_process_id;
break;
case LOAD_DLL_DEBUG_EVENT:
DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
event.dwProcessId, event.dwThreadId,
"LOAD_DLL_DEBUG_EVENT"));
catch_errors (handle_load_dll,
(char*) &event,
"\n[failed reading symbols from DLL]\n",
RETURN_MASK_ALL);
registers_changed(); /* mark all regs invalid */
break;
case UNLOAD_DLL_DEBUG_EVENT:
DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
event.dwProcessId, event.dwThreadId,
"UNLOAD_DLL_DEBUG_EVENT"));
break; /* FIXME: don't know what to do here */
case EXCEPTION_DEBUG_EVENT:
DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
event.dwProcessId, event.dwThreadId,
"EXCEPTION_DEBUG_EVENT"));
if (handle_exception (&event, ourstatus))
return current_process_id;
continue_status = DBG_EXCEPTION_NOT_HANDLED;
break;
case OUTPUT_DEBUG_STRING_EVENT: /* message from the kernel */
DEBUG_EVENTS (("gdb: kernel event for pid=%d tid=%d code=%s)\n",
event.dwProcessId, event.dwThreadId,
"OUTPUT_DEBUG_STRING_EVENT"));
if (target_read_string
((CORE_ADDR) event.u.DebugString.lpDebugStringData,
&p, 1024, 0) && p && *p)
{
warning(p);
free(p);
}
break;
default:
printf_unfiltered ("gdb: kernel event for pid=%d tid=%d\n",
event.dwProcessId, event.dwThreadId);
printf_unfiltered (" unknown event code %d\n",
event.dwDebugEventCode);
break;
}
DEBUG_EVENTS (("ContinueDebugEvent (cpid=%d, ctid=%d, DBG_CONTINUE);\n",
current_process_id, current_thread_id));
CHECK (ContinueDebugEvent (current_process_id,
current_thread_id,
continue_status));
}
}
/* Attach to process PID, then initialize for debugging it. */
static void
child_attach (args, from_tty)
char *args;
int from_tty;
{
BOOL ok;
if (!args)
error_no_arg ("process-id to attach");
current_process_id = strtoul (args, 0, 0);
ok = DebugActiveProcess (current_process_id);
if (!ok)
error ("Can't attach to process.");
exception_count = 0;
event_count = 0;
if (from_tty)
{
char *exec_file = (char *) get_exec_file (0);
if (exec_file)
printf_unfiltered ("Attaching to program `%s', %s\n", exec_file,
target_pid_to_str (current_process_id));
else
printf_unfiltered ("Attaching to %s\n",
target_pid_to_str (current_process_id));
gdb_flush (gdb_stdout);
}
inferior_pid = current_process_id;
push_target (&child_ops);
}
static void
child_detach (args, from_tty)
char *args;
int from_tty;
{
if (from_tty)
{
char *exec_file = get_exec_file (0);
if (exec_file == 0)
exec_file = "";
printf_unfiltered ("Detaching from program: %s %s\n", exec_file,
target_pid_to_str (inferior_pid));
gdb_flush (gdb_stdout);
}
inferior_pid = 0;
unpush_target (&child_ops);
}
/* Print status information about what we're accessing. */
static void
child_files_info (ignore)
struct target_ops *ignore;
{
printf_unfiltered ("\tUsing the running image of %s %s.\n",
attach_flag ? "attached" : "child", target_pid_to_str (inferior_pid));
}
/* ARGSUSED */
static void
child_open (arg, from_tty)
char *arg;
int from_tty;
{
error ("Use the \"run\" command to start a Unix child process.");
}
/* Start an inferior win32 child process and sets inferior_pid to its pid.
EXEC_FILE is the file to run.
ALLARGS is a string containing the arguments to the program.
ENV is the environment vector to pass. Errors reported with error(). */
static void
child_create_inferior (exec_file, allargs, env)
char *exec_file;
char *allargs;
char **env;
{
char real_path[MAXPATHLEN];
char *winenv;
char *temp;
int envlen;
int i;
STARTUPINFO si;
PROCESS_INFORMATION pi;
struct target_waitstatus dummy;
BOOL ret;
DWORD flags;
char *args;
if (!exec_file)
{
error ("No executable specified, use `target exec'.\n");
}
memset (&si, 0, sizeof (si));
si.cb = sizeof (si);
cygwin32_conv_to_win32_path (exec_file, real_path);
flags = DEBUG_ONLY_THIS_PROCESS;
if (new_group)
flags |= CREATE_NEW_PROCESS_GROUP;
if (new_console)
flags |= CREATE_NEW_CONSOLE;
args = alloca (strlen (real_path) + strlen (allargs) + 2);
strcpy (args, real_path);
strcat (args, " ");
strcat (args, allargs);
/* Prepare the environment vars for CreateProcess. */
{
/* This code use to assume all env vars were file names and would
translate them all to win32 style. That obviously doesn't work in the
general case. The current rule is that we only translate PATH.
We need to handle PATH because we're about to call CreateProcess and
it uses PATH to find DLL's. Fortunately PATH has a well-defined value
in both posix and win32 environments. cygwin.dll will change it back
to posix style if necessary. */
static const char *conv_path_names[] =
{
"PATH=",
0
};
/* CreateProcess takes the environment list as a null terminated set of
strings (i.e. two nulls terminate the list). */
/* Get total size for env strings. */
for (envlen = 0, i = 0; env[i] && *env[i]; i++)
{
int j, len;
for (j = 0; conv_path_names[j]; j++)
{
len = strlen (conv_path_names[j]);
if (strncmp (conv_path_names[j], env[i], len) == 0)
{
if (cygwin32_posix_path_list_p (env[i] + len))
envlen += len
+ cygwin32_posix_to_win32_path_list_buf_size (env[i] + len);
else
envlen += strlen (env[i]) + 1;
break;
}
}
if (conv_path_names[j] == NULL)
envlen += strlen (env[i]) + 1;
}
winenv = alloca (envlen + 1);
/* Copy env strings into new buffer. */
for (temp = winenv, i = 0; env[i] && *env[i]; i++)
{
int j, len;
for (j = 0; conv_path_names[j]; j++)
{
len = strlen (conv_path_names[j]);
if (strncmp (conv_path_names[j], env[i], len) == 0)
{
if (cygwin32_posix_path_list_p (env[i] + len))
{
memcpy (temp, env[i], len);
cygwin32_posix_to_win32_path_list (env[i] + len, temp + len);
}
else
strcpy (temp, env[i]);
break;
}
}
if (conv_path_names[j] == NULL)
strcpy (temp, env[i]);
temp += strlen (temp) + 1;
}
/* Final nil string to terminate new env. */
*temp = 0;
}
ret = CreateProcess (0,
args, /* command line */
NULL, /* Security */
NULL, /* thread */
TRUE, /* inherit handles */
flags, /* start flags */
winenv,
NULL, /* current directory */
&si,
&pi);
if (!ret)
error ("Error creating process %s, (error %d)\n", exec_file, GetLastError());
exception_count = 0;
event_count = 0;
inferior_pid = pi.dwProcessId;
current_process = pi.hProcess;
current_thread = pi.hThread;
current_process_id = pi.dwProcessId;
current_thread_id = pi.dwThreadId;
push_target (&child_ops);
init_thread_list ();
init_wait_for_inferior ();
clear_proceed_status ();
target_terminal_init ();
target_terminal_inferior ();
/* Ignore the first trap */
child_wait (inferior_pid, &dummy);
proceed ((CORE_ADDR) - 1, TARGET_SIGNAL_0, 0);
}
static void
child_mourn_inferior ()
{
(void) ContinueDebugEvent (current_process_id,
current_thread_id,
DBG_CONTINUE);
unpush_target (&child_ops);
generic_mourn_inferior ();
}
/* Send a SIGINT to the process group. This acts just like the user typed a
^C on the controlling terminal. */
static void
child_stop ()
{
DEBUG_EVENTS (("gdb: GenerateConsoleCtrlEvent (CTRLC_EVENT, 0)\n"));
CHECK (GenerateConsoleCtrlEvent (CTRL_C_EVENT, 0));
registers_changed(); /* refresh register state */
}
int
child_xfer_memory (CORE_ADDR memaddr, char *our, int len,
int write, struct target_ops *target)
{
DWORD done;
if (write)
{
DEBUG_MEM (("gdb: write target memory, %d bytes at 0x%08x\n",
len, memaddr));
WriteProcessMemory (current_process, memaddr, our, len, &done);
FlushInstructionCache (current_process, memaddr, len);
}
else
{
DEBUG_MEM (("gdb: read target memory, %d bytes at 0x%08x\n",
len, memaddr));
ReadProcessMemory (current_process, memaddr, our, len, &done);
}
return done;
}
void
child_kill_inferior (void)
{
CHECK (TerminateProcess (current_process, 0));
for (;;)
{
DEBUG_EVENT event;
if (!ContinueDebugEvent (current_process_id,
current_thread_id,
DBG_CONTINUE))
break;
if (!WaitForDebugEvent (&event, INFINITE))
break;
current_thread_id = event.dwThreadId;
current_process_id = event.dwProcessId;
if (event.dwDebugEventCode == EXIT_PROCESS_DEBUG_EVENT)
break;
}
CHECK (CloseHandle (current_process));
CHECK (CloseHandle (current_thread));
target_mourn_inferior(); /* or just child_mourn_inferior? */
}
void
child_resume (int pid, int step, enum target_signal signal)
{
DEBUG_EXEC (("gdb: child_resume (pid=%d, step=%d, signal=%d);\n",
pid, step, signal));
if (step)
{
#ifdef __PPC__
warning ("Single stepping not done.\n");
#endif
#ifdef i386
/* Single step by setting t bit */
child_fetch_inferior_registers (PS_REGNUM);
context.EFlags |= FLAG_TRACE_BIT;
#endif
}
if (context.ContextFlags)
{
CHECK (SetThreadContext (current_thread, &context));
context.ContextFlags = 0;
}
if (signal)
{
fprintf_unfiltered (gdb_stderr, "Can't send signals to the child.\n");
}
DEBUG_EVENTS (("gdb: ContinueDebugEvent (cpid=%d, ctid=%d, DBG_CONTINUE);\n",
current_process_id, current_thread_id));
CHECK (ContinueDebugEvent (current_process_id,
current_thread_id,
DBG_CONTINUE));
}
static void
child_prepare_to_store ()
{
/* Do nothing, since we can store individual regs */
}
static int
child_can_run ()
{
return 1;
}
static void
child_close ()
{
DEBUG_EVENTS (("gdb: child_close, inferior_pid=%d\n", inferior_pid));
}
struct target_ops child_ops =
{
"child", /* to_shortname */
"Win32 child process", /* to_longname */
"Win32 child process (started by the \"run\" command).", /* to_doc */
child_open, /* to_open */
child_close, /* to_close */
child_attach, /* to_attach */
child_detach, /* to_detach */
child_resume, /* to_resume */
child_wait, /* to_wait */
child_fetch_inferior_registers,/* to_fetch_registers */
child_store_inferior_registers,/* to_store_registers */
child_prepare_to_store, /* to_child_prepare_to_store */
child_xfer_memory, /* to_xfer_memory */
child_files_info, /* to_files_info */
memory_insert_breakpoint, /* to_insert_breakpoint */
memory_remove_breakpoint, /* to_remove_breakpoint */
terminal_init_inferior, /* to_terminal_init */
terminal_inferior, /* to_terminal_inferior */
terminal_ours_for_output, /* to_terminal_ours_for_output */
terminal_ours, /* to_terminal_ours */
child_terminal_info, /* to_terminal_info */
child_kill_inferior, /* to_kill */
0, /* to_load */
0, /* to_lookup_symbol */
child_create_inferior, /* to_create_inferior */
child_mourn_inferior, /* to_mourn_inferior */
child_can_run, /* to_can_run */
0, /* to_notice_signals */
0, /* to_thread_alive */
child_stop, /* to_stop */
process_stratum, /* to_stratum */
0, /* to_next */
1, /* to_has_all_memory */
1, /* to_has_memory */
1, /* to_has_stack */
1, /* to_has_registers */
1, /* to_has_execution */
0, /* to_sections */
0, /* to_sections_end */
OPS_MAGIC /* to_magic */
};
void
_initialize_inftarg ()
{
struct cmd_list_element *c;
add_show_from_set
(add_set_cmd ("new-console", class_support, var_boolean,
(char *) &new_console,
"Set creation of new console when creating child process.",
&setlist),
&showlist);
add_show_from_set
(add_set_cmd ("new-group", class_support, var_boolean,
(char *) &new_group,
"Set creation of new group when creating child process.",
&setlist),
&showlist);
add_show_from_set
(add_set_cmd ("debugexec", class_support, var_boolean,
(char *) &debug_exec,
"Set whether to display execution in child process.",
&setlist),
&showlist);
add_show_from_set
(add_set_cmd ("debugevents", class_support, var_boolean,
(char *) &debug_events,
"Set whether to display kernel events in child process.",
&setlist),
&showlist);
add_show_from_set
(add_set_cmd ("debugmemory", class_support, var_boolean,
(char *) &debug_memory,
"Set whether to display memory accesses in child process.",
&setlist),
&showlist);
add_show_from_set
(add_set_cmd ("debugexceptions", class_support, var_boolean,
(char *) &debug_exceptions,
"Set whether to display kernel exceptions in child process.",
&setlist),
&showlist);
add_target (&child_ops);
}