msi: Select the first item in the SelectionTree control.
[wine.git] / programs / winedbg / break.c
blob3a4c1e57056b631824c8fe1793292fb710835efe
1 /*
2 * Debugger break-points handling
4 * Copyright 1994 Martin von Loewis
5 * Copyright 1995 Alexandre Julliard
6 * Copyright 1999,2000 Eric Pouech
8 * This library is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public
10 * License as published by the Free Software Foundation; either
11 * version 2.1 of the License, or (at your option) any later version.
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * Lesser General Public License for more details.
18 * You should have received a copy of the GNU Lesser General Public
19 * License along with this library; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
23 #include "config.h"
24 #include "debugger.h"
25 #include "wine/debug.h"
27 WINE_DEFAULT_DEBUG_CHANNEL(winedbg);
29 static int is_xpoint_break(int bpnum)
31 int type = dbg_curr_process->bp[bpnum].xpoint_type;
33 if (type == be_xpoint_break || type == be_xpoint_watch_exec) return TRUE;
34 if (type == be_xpoint_watch_read || type == be_xpoint_watch_write) return FALSE;
35 RaiseException(DEBUG_STATUS_INTERNAL_ERROR, 0, 0, NULL);
36 return 0; /* never reached */
39 /***********************************************************************
40 * break_set_xpoints
42 * Set or remove all the breakpoints & watchpoints
44 void break_set_xpoints(BOOL set)
46 static BOOL last; /* = 0 = FALSE */
48 unsigned int i, ret, size;
49 void* addr;
50 struct dbg_breakpoint* bp = dbg_curr_process->bp;
52 if (set == last) return;
53 last = set;
55 for (i = 0; i < dbg_curr_process->next_bp; i++)
57 if (!bp[i].refcount || !bp[i].enabled) continue;
59 if (is_xpoint_break(i))
60 size = 0;
61 else
62 size = bp[i].w.len + 1;
63 addr = (void*)memory_to_linear_addr(&bp[i].addr);
65 if (set)
66 ret = be_cpu->insert_Xpoint(dbg_curr_process->handle,
67 dbg_curr_process->process_io,
68 &dbg_context, bp[i].xpoint_type, addr,
69 &bp[i].info, size);
70 else
71 ret = be_cpu->remove_Xpoint(dbg_curr_process->handle,
72 dbg_curr_process->process_io,
73 &dbg_context, bp[i].xpoint_type, addr,
74 bp[i].info, size);
75 if (!ret)
77 dbg_printf("Invalid address (");
78 print_address(&bp[i].addr, FALSE);
79 dbg_printf(") for breakpoint %d, disabling it\n", i);
80 bp[i].enabled = FALSE;
85 /***********************************************************************
86 * find_xpoint
88 * Find the breakpoint for a given address. Return the breakpoint
89 * number or -1 if none.
91 static int find_xpoint(const ADDRESS64* addr, enum be_xpoint_type type)
93 int i;
94 void* lin = memory_to_linear_addr(addr);
95 struct dbg_breakpoint* bp = dbg_curr_process->bp;
97 for (i = 0; i < dbg_curr_process->next_bp; i++)
99 if (bp[i].refcount && bp[i].enabled && bp[i].xpoint_type == type &&
100 memory_to_linear_addr(&bp[i].addr) == lin)
101 return i;
103 return -1;
106 /***********************************************************************
107 * init_xpoint
109 * Find an empty slot in BP table to add a new break/watch point
111 static int init_xpoint(int type, const ADDRESS64* addr)
113 int num;
114 struct dbg_breakpoint* bp = dbg_curr_process->bp;
116 for (num = (dbg_curr_process->next_bp < MAX_BREAKPOINTS) ?
117 dbg_curr_process->next_bp++ : 1;
118 num < MAX_BREAKPOINTS; num++)
120 if (bp[num].refcount == 0)
122 bp[num].refcount = 1;
123 bp[num].enabled = TRUE;
124 bp[num].xpoint_type = type;
125 bp[num].skipcount = 0;
126 bp[num].addr = *addr;
127 return num;
131 dbg_printf("Too many bp. Please delete some.\n");
132 return -1;
135 /***********************************************************************
136 * get_watched_value
138 * Returns the value watched by watch point 'num'.
140 static BOOL get_watched_value(int num, LPDWORD val)
142 BYTE buf[4];
144 if (!dbg_read_memory(memory_to_linear_addr(&dbg_curr_process->bp[num].addr),
145 buf, dbg_curr_process->bp[num].w.len + 1))
146 return FALSE;
148 switch (dbg_curr_process->bp[num].w.len + 1)
150 case 4: *val = *(DWORD*)buf; break;
151 case 2: *val = *(WORD*)buf; break;
152 case 1: *val = *(BYTE*)buf; break;
153 default: RaiseException(DEBUG_STATUS_INTERNAL_ERROR, 0, 0, NULL);
155 return TRUE;
158 /***********************************************************************
159 * break_add_break
161 * Add a breakpoint.
163 BOOL break_add_break(const ADDRESS64* addr, BOOL verbose, BOOL swbp)
165 int num;
166 BYTE ch;
167 struct dbg_breakpoint* bp = dbg_curr_process->bp;
168 int type = swbp ? be_xpoint_break : be_xpoint_watch_exec;
170 if ((num = find_xpoint(addr, type)) >= 1)
172 bp[num].refcount++;
173 dbg_printf("Breakpoint %d at ", num);
174 print_address(&bp[num].addr, TRUE);
175 dbg_printf(" (refcount=%d)\n", bp[num].refcount);
176 return TRUE;
179 if (!dbg_read_memory(memory_to_linear_addr(addr), &ch, sizeof(ch)))
181 if (verbose)
183 dbg_printf("Invalid address ");
184 print_bare_address(addr);
185 dbg_printf(", can't set breakpoint\n");
187 return FALSE;
190 if ((num = init_xpoint(type, addr)) == -1)
191 return FALSE;
193 dbg_printf("Breakpoint %d at ", num);
194 print_address(&bp[num].addr, TRUE);
195 dbg_printf("\n");
197 return TRUE;
200 /***********************************************************************
201 * break_add_break_from_lvalue
203 * Add a breakpoint.
205 BOOL break_add_break_from_lvalue(const struct dbg_lvalue* lvalue, BOOL swbp)
207 ADDRESS64 addr;
209 types_extract_as_address(lvalue, &addr);
211 if (!break_add_break(&addr, TRUE, swbp))
213 if (!DBG_IVAR(CanDeferOnBPByAddr))
215 dbg_printf("Invalid address, can't set breakpoint\n"
216 "You can turn on deferring bp by address by setting $CanDeferOnBPByAddr to 1\n");
217 return FALSE;
219 dbg_printf("Unable to add breakpoint, will check again any time a new DLL is loaded\n");
220 dbg_curr_process->delayed_bp =
221 dbg_heap_realloc(dbg_curr_process->delayed_bp,
222 sizeof(struct dbg_delayed_bp) * ++dbg_curr_process->num_delayed_bp);
224 dbg_curr_process->delayed_bp[dbg_curr_process->num_delayed_bp - 1].is_symbol = FALSE;
225 dbg_curr_process->delayed_bp[dbg_curr_process->num_delayed_bp - 1].software_bp = swbp;
226 dbg_curr_process->delayed_bp[dbg_curr_process->num_delayed_bp - 1].u.addr = addr;
227 return TRUE;
229 return FALSE;
232 /***********************************************************************
233 * break_add_break_from_id
235 * Add a breakpoint from a function name (and eventually a line #)
237 void break_add_break_from_id(const char *name, int lineno, BOOL swbp)
239 struct dbg_lvalue lvalue;
240 int i;
242 switch (symbol_get_lvalue(name, lineno, &lvalue, TRUE))
244 case sglv_found:
245 break_add_break(&lvalue.addr, TRUE, swbp);
246 return;
247 case sglv_unknown:
248 break;
249 case sglv_aborted: /* user aborted symbol lookup */
250 return;
253 dbg_printf("Unable to add breakpoint, will check again when a new DLL is loaded\n");
254 for (i = 0; i < dbg_curr_process->num_delayed_bp; i++)
256 if (dbg_curr_process->delayed_bp[i].is_symbol &&
257 !strcmp(name, dbg_curr_process->delayed_bp[i].u.symbol.name) &&
258 lineno == dbg_curr_process->delayed_bp[i].u.symbol.lineno)
259 return;
261 dbg_curr_process->delayed_bp = dbg_heap_realloc(dbg_curr_process->delayed_bp,
262 sizeof(struct dbg_delayed_bp) * ++dbg_curr_process->num_delayed_bp);
264 dbg_curr_process->delayed_bp[dbg_curr_process->num_delayed_bp - 1].is_symbol = TRUE;
265 dbg_curr_process->delayed_bp[dbg_curr_process->num_delayed_bp - 1].software_bp = swbp;
266 dbg_curr_process->delayed_bp[dbg_curr_process->num_delayed_bp - 1].u.symbol.name = strcpy(HeapAlloc(GetProcessHeap(), 0, strlen(name) + 1), name);
267 dbg_curr_process->delayed_bp[dbg_curr_process->num_delayed_bp - 1].u.symbol.lineno = lineno;
270 struct cb_break_lineno
272 int lineno;
273 ADDRESS64 addr;
276 static BOOL CALLBACK line_cb(SRCCODEINFO* sci, void* user)
278 struct cb_break_lineno* bkln = user;
280 if (bkln->lineno == sci->LineNumber)
282 bkln->addr.Mode = AddrModeFlat;
283 bkln->addr.Offset = sci->Address;
284 return FALSE;
286 return TRUE;
289 /***********************************************************************
290 * break_add_break_from_lineno
292 * Add a breakpoint from a line number in current file
294 void break_add_break_from_lineno(int lineno, BOOL swbp)
296 struct cb_break_lineno bkln;
298 memory_get_current_pc(&bkln.addr);
300 if (lineno != -1)
302 IMAGEHLP_LINE il;
305 DWORD disp;
306 DWORD linear = (DWORD)memory_to_linear_addr(&bkln.addr);
308 il.SizeOfStruct = sizeof(il);
309 if (!SymGetLineFromAddr(dbg_curr_process->handle, linear, &disp, &il))
312 dbg_printf("Unable to add breakpoint (unknown address %lx)\n", linear);
313 return;
315 bkln.addr.Offset = 0;
316 bkln.lineno = lineno;
317 SymEnumLines(dbg_curr_process->handle, linear, NULL, il.FileName, line_cb, &bkln);
318 if (!bkln.addr.Offset)
320 dbg_printf("Unknown line number\n"
321 "(either out of file, or no code at given line number)\n");
322 return;
326 break_add_break(&bkln.addr, TRUE, swbp);
329 /***********************************************************************
330 * break_check_delayed_bp
332 * Check is a registered delayed BP is now available.
334 void break_check_delayed_bp(void)
336 struct dbg_lvalue lvalue;
337 int i;
338 struct dbg_delayed_bp* dbp = dbg_curr_process->delayed_bp;
339 char hexbuf[MAX_OFFSET_TO_STR_LEN];
341 for (i = 0; i < dbg_curr_process->num_delayed_bp; i++)
343 if (dbp[i].is_symbol)
345 if (symbol_get_lvalue(dbp[i].u.symbol.name, dbp[i].u.symbol.lineno,
346 &lvalue, TRUE) != sglv_found)
347 continue;
348 if (lvalue.cookie != DLV_TARGET) continue;
350 else
351 lvalue.addr = dbp[i].u.addr;
352 WINE_TRACE("trying to add delayed %s-bp\n", dbp[i].is_symbol ? "S" : "A");
353 if (!dbp[i].is_symbol)
354 WINE_TRACE("\t%04x:%s\n",
355 dbp[i].u.addr.Segment,
356 memory_offset_to_string(hexbuf, dbp[i].u.addr.Offset, 0));
357 else
358 WINE_TRACE("\t'%s' @ %d\n",
359 dbp[i].u.symbol.name, dbp[i].u.symbol.lineno);
361 if (break_add_break(&lvalue.addr, FALSE, dbp[i].software_bp))
362 memmove(&dbp[i], &dbp[i+1], (--dbg_curr_process->num_delayed_bp - i) * sizeof(*dbp));
366 /***********************************************************************
367 * break_add_watch
369 * Add a watchpoint.
371 static void break_add_watch(const struct dbg_lvalue* lvalue, BOOL is_write)
373 int num;
374 DWORD64 l = 4;
376 num = init_xpoint((is_write) ? be_xpoint_watch_write : be_xpoint_watch_read,
377 &lvalue->addr);
378 if (num == -1) return;
380 if (lvalue->type.id != dbg_itype_none)
382 if (types_get_info(&lvalue->type, TI_GET_LENGTH, &l))
384 switch (l)
386 case 4: case 2: case 1: break;
387 default:
388 dbg_printf("Unsupported length (%s) for watch-points, defaulting to 4\n",
389 wine_dbgstr_longlong(l));
390 break;
393 else dbg_printf("Cannot get watch size, defaulting to 4\n");
395 dbg_curr_process->bp[num].w.len = (DWORD)l - 1;
397 if (!get_watched_value(num, &dbg_curr_process->bp[num].w.oldval))
399 dbg_printf("Bad address. Watchpoint not set\n");
400 dbg_curr_process->bp[num].refcount = 0;
401 return;
403 dbg_printf("Watchpoint %d at ", num);
404 print_address(&dbg_curr_process->bp[num].addr, TRUE);
405 dbg_printf("\n");
408 /******************************************************************
409 * break_add_watch_from_lvalue
411 * Adds a watch point from an address (stored in a lvalue)
413 void break_add_watch_from_lvalue(const struct dbg_lvalue* lvalue)
415 struct dbg_lvalue lval;
417 types_extract_as_address(lvalue, &lval.addr);
418 lval.type.id = dbg_itype_none;
420 break_add_watch(&lval, TRUE);
423 /***********************************************************************
424 * break_add_watch_from_id
426 * Add a watchpoint from a symbol name
428 void break_add_watch_from_id(const char *name)
430 struct dbg_lvalue lvalue;
432 switch (symbol_get_lvalue(name, -1, &lvalue, TRUE))
434 case sglv_found:
435 break_add_watch(&lvalue, 1);
436 break;
437 case sglv_unknown:
438 dbg_printf("Unable to add watchpoint\n");
439 break;
440 case sglv_aborted: /* user aborted symbol lookup */
441 break;
445 /***********************************************************************
446 * break_delete_xpoint
448 * Delete a breakpoint.
450 void break_delete_xpoint(int num)
452 struct dbg_breakpoint* bp = dbg_curr_process->bp;
454 if ((num <= 0) || (num >= dbg_curr_process->next_bp) ||
455 bp[num].refcount == 0)
457 dbg_printf("Invalid breakpoint number %d\n", num);
458 return;
461 if (--bp[num].refcount > 0)
462 return;
464 if (bp[num].condition != NULL)
466 expr_free(bp[num].condition);
467 bp[num].condition = NULL;
470 bp[num].enabled = FALSE;
471 bp[num].refcount = 0;
472 bp[num].skipcount = 0;
475 static inline BOOL module_is_container(const IMAGEHLP_MODULE* wmod_cntnr,
476 const IMAGEHLP_MODULE* wmod_child)
478 return wmod_cntnr->BaseOfImage <= wmod_child->BaseOfImage &&
479 (DWORD)wmod_cntnr->BaseOfImage + wmod_cntnr->ImageSize >=
480 (DWORD)wmod_child->BaseOfImage + wmod_child->ImageSize;
483 /******************************************************************
484 * break_delete_xpoints_from_module
486 * Remove all Xpoints from module which base is 'base'
488 void break_delete_xpoints_from_module(unsigned long base)
490 IMAGEHLP_MODULE im, im_elf;
491 int i;
492 DWORD linear;
493 struct dbg_breakpoint* bp = dbg_curr_process->bp;
495 /* FIXME: should do it also on the ELF sibbling if any */
496 im.SizeOfStruct = sizeof(im);
497 im_elf.SizeOfStruct = sizeof(im_elf);
498 if (!SymGetModuleInfo(dbg_curr_process->handle, base, &im)) return;
500 /* try to get in fact the underlying ELF module (if any) */
501 if (SymGetModuleInfo(dbg_curr_process->handle, im.BaseOfImage - 1, &im_elf) &&
502 im_elf.BaseOfImage <= im.BaseOfImage &&
503 (DWORD)im_elf.BaseOfImage + im_elf.ImageSize >= (DWORD)im.BaseOfImage + im.ImageSize)
504 im = im_elf;
506 for (i = 0; i < dbg_curr_process->next_bp; i++)
508 linear = (DWORD)memory_to_linear_addr(&bp[i].addr);
509 if (bp[i].refcount && bp[i].enabled &&
510 im.BaseOfImage <= linear && linear < im.BaseOfImage + im.ImageSize)
512 break_delete_xpoint(i);
517 /***********************************************************************
518 * break_enable_xpoint
520 * Enable or disable a break point.
522 void break_enable_xpoint(int num, BOOL enable)
524 if ((num <= 0) || (num >= dbg_curr_process->next_bp) ||
525 dbg_curr_process->bp[num].refcount == 0)
527 dbg_printf("Invalid breakpoint number %d\n", num);
528 return;
530 dbg_curr_process->bp[num].enabled = (enable) ? TRUE : FALSE;
531 dbg_curr_process->bp[num].skipcount = 0;
535 /***********************************************************************
536 * find_triggered_watch
538 * Lookup the watchpoints to see if one has been triggered
539 * Return >= (watch point index) if one is found and *oldval is set to
540 * the value watched before the TRAP
541 * Return -1 if none found (*oldval is undetermined)
543 * Unfortunately, Linux does *NOT* (A REAL PITA) report with ptrace
544 * the DR6 register value, so we have to look with our own need the
545 * cause of the TRAP.
546 * -EP
548 static int find_triggered_watch(LPDWORD oldval)
550 int found = -1;
551 int i;
552 struct dbg_breakpoint* bp = dbg_curr_process->bp;
554 /* Method 1 => get triggered watchpoint from context (doesn't work on Linux
555 * 2.2.x). This should be fixed in >= 2.2.16
557 for (i = 0; i < dbg_curr_process->next_bp; i++)
559 DWORD val = 0;
561 if (bp[i].refcount && bp[i].enabled && !is_xpoint_break(i) &&
562 (be_cpu->is_watchpoint_set(&dbg_context, bp[i].info)))
564 be_cpu->clear_watchpoint(&dbg_context, bp[i].info);
566 *oldval = bp[i].w.oldval;
567 if (get_watched_value(i, &val))
569 bp[i].w.oldval = val;
570 return i;
575 /* Method 1 failed, trying method 2 */
577 /* Method 2 => check if value has changed among registered watchpoints
578 * this really sucks, but this is how gdb 4.18 works on my linux box
579 * -EP
581 for (i = 0; i < dbg_curr_process->next_bp; i++)
583 DWORD val = 0;
585 if (bp[i].refcount && bp[i].enabled && !is_xpoint_break(i) &&
586 get_watched_value(i, &val))
588 *oldval = bp[i].w.oldval;
589 if (val != *oldval)
591 be_cpu->clear_watchpoint(&dbg_context, bp[i].info);
592 bp[i].w.oldval = val;
593 found = i;
594 /* cannot break, because two watch points may have been triggered on
595 * the same access
596 * only one will be reported to the user (FIXME ?)
601 return found;
604 /***********************************************************************
605 * break_info
607 * Display break & watch points information.
609 void break_info(void)
611 int i;
612 int nbp = 0, nwp = 0;
613 struct dbg_delayed_bp* dbp = dbg_curr_process->delayed_bp;
614 struct dbg_breakpoint* bp = dbg_curr_process->bp;
616 for (i = 1; i < dbg_curr_process->next_bp; i++)
618 if (bp[i].refcount)
620 if (is_xpoint_break(i)) nbp++; else nwp++;
624 if (nbp)
626 dbg_printf("Breakpoints:\n");
627 for (i = 1; i < dbg_curr_process->next_bp; i++)
629 if (!bp[i].refcount || !is_xpoint_break(i))
630 continue;
631 dbg_printf("%d: %c ", i, bp[i].enabled ? 'y' : 'n');
632 print_address(&bp[i].addr, TRUE);
633 dbg_printf(" (%u)%s\n", bp[i].refcount,
634 bp[i].xpoint_type == be_xpoint_watch_exec ? " (hardware assisted)" : "");
635 if (bp[i].condition != NULL)
637 dbg_printf("\t\tstop when ");
638 expr_print(bp[i].condition);
639 dbg_printf("\n");
643 else dbg_printf("No breakpoints\n");
644 if (nwp)
646 dbg_printf("Watchpoints:\n");
647 for (i = 1; i < dbg_curr_process->next_bp; i++)
649 if (!bp[i].refcount || is_xpoint_break(i))
650 continue;
651 dbg_printf("%d: %c ", i, bp[i].enabled ? 'y' : 'n');
652 print_address(&bp[i].addr, TRUE);
653 dbg_printf(" on %d byte%s (%c)\n",
654 bp[i].w.len + 1, bp[i].w.len > 0 ? "s" : "",
655 bp[i].xpoint_type == be_xpoint_watch_write ? 'W' : 'R');
656 if (bp[i].condition != NULL)
658 dbg_printf("\t\tstop when ");
659 expr_print(bp[i].condition);
660 dbg_printf("\n");
664 else dbg_printf("No watchpoints\n");
665 if (dbg_curr_process->num_delayed_bp)
667 dbg_printf("Delayed breakpoints:\n");
668 for (i = 0; i < dbg_curr_process->num_delayed_bp; i++)
670 if (dbp[i].is_symbol)
672 dbg_printf("%d: %s", i, dbp[i].u.symbol.name);
673 if (dbp[i].u.symbol.lineno != -1)
674 dbg_printf(" at line %u", dbp[i].u.symbol.lineno);
676 else
678 dbg_printf("%d: ", i);
679 print_address(&dbp[i].u.addr, FALSE);
681 dbg_printf("\n");
686 /***********************************************************************
687 * should_stop
689 * Check whether or not the condition (bp / skipcount) of a break/watch
690 * point are met.
692 static BOOL should_stop(int bpnum)
694 struct dbg_breakpoint* bp = &dbg_curr_process->bp[bpnum];
696 if (bp->condition != NULL)
698 struct dbg_lvalue lvalue = expr_eval(bp->condition);
700 if (lvalue.type.id == dbg_itype_none)
703 * Something wrong - unable to evaluate this expression.
705 dbg_printf("Unable to evaluate expression ");
706 expr_print(bp->condition);
707 dbg_printf("\nTurning off condition\n");
708 break_add_condition(bpnum, NULL);
710 else if (!types_extract_as_integer(&lvalue))
712 return FALSE;
716 if (bp->skipcount > 0) bp->skipcount--;
717 return bp->skipcount == 0;
720 /***********************************************************************
721 * break_should_continue
723 * Determine if we should continue execution after a SIGTRAP signal when
724 * executing in the given mode.
726 BOOL break_should_continue(ADDRESS64* addr, DWORD code, int* count, BOOL* is_break)
728 DWORD oldval = 0;
729 enum dbg_exec_mode mode = dbg_curr_thread->exec_mode;
731 *is_break = FALSE;
732 /* If not single-stepping, back up to the break instruction */
733 if (code == EXCEPTION_BREAKPOINT)
734 addr->Offset += be_cpu->adjust_pc_for_break(&dbg_context, TRUE);
736 dbg_curr_thread->stopped_xpoint = find_xpoint(addr, be_xpoint_break);
737 dbg_curr_process->bp[0].enabled = FALSE; /* disable the step-over breakpoint */
739 if (dbg_curr_thread->stopped_xpoint > 0)
741 if (!should_stop(dbg_curr_thread->stopped_xpoint)) return TRUE;
743 dbg_printf("Stopped on breakpoint %d at ", dbg_curr_thread->stopped_xpoint);
744 print_address(&dbg_curr_process->bp[dbg_curr_thread->stopped_xpoint].addr, TRUE);
745 dbg_printf("\n");
746 return FALSE;
749 if(dbg_curr_thread->stopped_xpoint < 0)
750 dbg_curr_thread->stopped_xpoint = find_xpoint(addr, be_xpoint_watch_exec);
751 if (dbg_curr_thread->stopped_xpoint > 0)
753 /* If not single-stepping, do not back up over the break instruction */
754 if (code == EXCEPTION_BREAKPOINT)
755 addr->Offset += be_cpu->adjust_pc_for_break(&dbg_context, FALSE);
757 if (!should_stop(dbg_curr_thread->stopped_xpoint)) return TRUE;
759 dbg_printf("Stopped on breakpoint %d at ", dbg_curr_thread->stopped_xpoint);
760 print_address(&dbg_curr_process->bp[dbg_curr_thread->stopped_xpoint].addr, TRUE);
761 dbg_printf("\n");
762 return FALSE;
765 if(dbg_curr_thread->stopped_xpoint < 0)
766 dbg_curr_thread->stopped_xpoint = find_triggered_watch(&oldval);
767 if (dbg_curr_thread->stopped_xpoint > 0)
769 /* If not single-stepping, do not back up over the break instruction */
770 if (code == EXCEPTION_BREAKPOINT)
771 addr->Offset += be_cpu->adjust_pc_for_break(&dbg_context, FALSE);
773 if (!should_stop(dbg_curr_thread->stopped_xpoint)) return TRUE;
775 dbg_printf("Stopped on watchpoint %d at ", dbg_curr_thread->stopped_xpoint);
776 print_address(addr, TRUE);
777 dbg_printf(" values: old=%lu new=%lu\n",
778 oldval, dbg_curr_process->bp[dbg_curr_thread->stopped_xpoint].w.oldval);
779 return FALSE;
783 * If our mode indicates that we are stepping line numbers,
784 * get the current function, and figure out if we are exactly
785 * on a line number or not.
787 if (mode == dbg_exec_step_over_line || mode == dbg_exec_step_into_line)
789 if (symbol_get_function_line_status(addr) == dbg_on_a_line_number)
791 (*count)--;
794 else if (mode == dbg_exec_step_over_insn || mode == dbg_exec_step_into_insn)
796 (*count)--;
799 if (*count > 0 || mode == dbg_exec_finish)
802 * We still need to execute more instructions.
804 return TRUE;
807 /* If there's no breakpoint and we are not single-stepping, then
808 * either we must have encountered a break insn in the Windows program
809 * or someone is trying to stop us
811 if (dbg_curr_thread->stopped_xpoint == -1 && code == EXCEPTION_BREAKPOINT)
813 *is_break = TRUE;
814 addr->Offset += be_cpu->adjust_pc_for_break(&dbg_context, FALSE);
815 return FALSE;
818 /* no breakpoint, continue if in continuous mode */
819 return mode == dbg_exec_cont || mode == dbg_exec_finish;
822 /***********************************************************************
823 * break_suspend_execution
825 * Remove all bp before entering the debug loop
827 void break_suspend_execution(void)
829 break_set_xpoints(FALSE);
830 dbg_curr_process->bp[0] = dbg_curr_thread->step_over_bp;
833 /***********************************************************************
834 * break_restart_execution
836 * Set the bp to the correct state to restart execution
837 * in the given mode.
839 void break_restart_execution(int count)
841 ADDRESS64 addr;
842 enum dbg_line_status status;
843 enum dbg_exec_mode mode, ret_mode;
844 ADDRESS64 callee;
845 void* linear;
847 memory_get_current_pc(&addr);
848 linear = memory_to_linear_addr(&addr);
851 * This is the mode we will be running in after we finish. We would like
852 * to be able to modify this in certain cases.
854 ret_mode = mode = dbg_curr_thread->exec_mode;
856 /* we've stopped on a xpoint (other than step over) */
857 if (dbg_curr_thread->stopped_xpoint > 0)
860 * If we have set a new value, then save it in the BP number.
862 if (count != 0 && mode == dbg_exec_cont)
864 dbg_curr_process->bp[dbg_curr_thread->stopped_xpoint].skipcount = count;
866 /* If we've stopped on a breakpoint, single step over it (, then run) */
867 if (is_xpoint_break(dbg_curr_thread->stopped_xpoint))
868 mode = dbg_exec_step_into_insn;
870 else if (mode == dbg_exec_cont && count > 1)
872 dbg_printf("Not stopped at any breakpoint; argument ignored.\n");
875 if (mode == dbg_exec_finish && be_cpu->is_function_return(linear))
877 mode = ret_mode = dbg_exec_step_into_insn;
881 * See if the function we are stepping into has debug info
882 * and line numbers. If not, then we step over it instead.
883 * FIXME - we need to check for things like thunks or trampolines,
884 * as the actual function may in fact have debug info.
886 if (be_cpu->is_function_call(linear, &callee))
888 status = symbol_get_function_line_status(&callee);
889 #if 0
890 /* FIXME: we need to get the thunk type */
892 * Anytime we have a trampoline, step over it.
894 if ((mode == EXEC_STEP_OVER || mode == EXEC_STEPI_OVER)
895 && status == dbg_in_a_thunk)
897 WINE_WARN("Not stepping into trampoline at %p (no lines)\n",
898 memory_to_linear_addr(&callee));
899 mode = EXEC_STEP_OVER_TRAMPOLINE;
901 #endif
902 if (mode == dbg_exec_step_into_line && status == dbg_no_line_info)
904 WINE_WARN("Not stepping into function at %p (no lines)\n",
905 memory_to_linear_addr(&callee));
906 mode = dbg_exec_step_over_line;
910 if (mode == dbg_exec_step_into_line &&
911 symbol_get_function_line_status(&addr) == dbg_no_line_info)
913 dbg_printf("Single stepping until exit from function, \n"
914 "which has no line number information.\n");
915 ret_mode = mode = dbg_exec_finish;
918 switch (mode)
920 case dbg_exec_cont: /* Continuous execution */
921 be_cpu->single_step(&dbg_context, FALSE);
922 break_set_xpoints(TRUE);
923 break;
925 #if 0
926 case EXEC_STEP_OVER_TRAMPOLINE:
928 * This is the means by which we step over our conversion stubs
929 * in callfrom*.s and callto*.s. We dig the appropriate address
930 * off the stack, and we set the breakpoint there instead of the
931 * address just after the call.
933 be_cpu->get_addr(dbg_curr_thread->handle, &dbg_context,
934 be_cpu_addr_stack, &addr);
935 /* FIXME: we assume stack grows as on an i386 */
936 addr.Offset += 2 * sizeof(unsigned int);
937 dbg_read_memory(memory_to_linear_addr(&addr),
938 &addr.Offset, sizeof(addr.Offset));
939 dbg_curr_process->bp[0].addr = addr;
940 dbg_curr_process->bp[0].enabled = TRUE;
941 dbg_curr_process->bp[0].refcount = 1;
942 dbg_curr_process->bp[0].skipcount = 0;
943 dbg_curr_process->bp[0].xpoint_type = be_xpoint_break;
944 dbg_curr_process->bp[0].condition = NULL;
945 be_cpu->single_step(&dbg_context, FALSE);
946 break_set_xpoints(TRUE);
947 break;
948 #endif
950 case dbg_exec_finish:
951 case dbg_exec_step_over_insn: /* Stepping over a call */
952 case dbg_exec_step_over_line: /* Stepping over a call */
953 if (be_cpu->is_step_over_insn(linear))
955 be_cpu->disasm_one_insn(&addr, FALSE);
956 dbg_curr_process->bp[0].addr = addr;
957 dbg_curr_process->bp[0].enabled = TRUE;
958 dbg_curr_process->bp[0].refcount = 1;
959 dbg_curr_process->bp[0].skipcount = 0;
960 dbg_curr_process->bp[0].xpoint_type = be_xpoint_break;
961 dbg_curr_process->bp[0].condition = NULL;
962 be_cpu->single_step(&dbg_context, FALSE);
963 break_set_xpoints(TRUE);
964 break;
966 /* else fall through to single-stepping */
968 case dbg_exec_step_into_line: /* Single-stepping a line */
969 case dbg_exec_step_into_insn: /* Single-stepping an instruction */
970 be_cpu->single_step(&dbg_context, TRUE);
971 break;
972 default: RaiseException(DEBUG_STATUS_INTERNAL_ERROR, 0, 0, NULL);
974 dbg_curr_thread->step_over_bp = dbg_curr_process->bp[0];
975 dbg_curr_thread->exec_mode = ret_mode;
978 int break_add_condition(int num, struct expr* exp)
980 if (num <= 0 || num >= dbg_curr_process->next_bp ||
981 !dbg_curr_process->bp[num].refcount)
983 dbg_printf("Invalid breakpoint number %d\n", num);
984 return FALSE;
987 if (dbg_curr_process->bp[num].condition != NULL)
989 expr_free(dbg_curr_process->bp[num].condition);
990 dbg_curr_process->bp[num].condition = NULL;
993 if (exp != NULL) dbg_curr_process->bp[num].condition = expr_clone(exp, NULL);
995 return TRUE;