1 <chapter id="debugger">
2 <title>Debugging Wine</title>
5 <title>Introduction</title>
8 Written by &name-eric-pouech; <email>&email-eric-pouech;</email>
9 (Last updated: 9/15/2002)
12 (Extracted from <filename>wine/documentation/winedbg</filename>)
16 <title>Processes and threads: in underlying OS and in Windows</title>
19 Before going into the depths of debugging in Wine, here's
20 a small overview of process and thread handling in Wine.
21 It has to be clear that there are two different beasts:
22 processes/threads from the Unix point of view and
23 processes/threads from a Windows point of view.
26 Each Windows' thread is implemented as a Unix process (under
27 Linux using the <function>clone</function> syscall), meaning
28 that all threads of a same Windows' process share the same
36 <para><varname>W-process</varname> means a process in Windows' terminology</para>
39 <para><varname>U-process</varname> means a process in Unix' terminology</para>
42 <para><varname>W-thread</varname> means a thread in Windows' terminology</para>
46 A <varname>W-process</varname> is made of one or several
47 <varname>W-threads</varname>. Each
48 <varname>W-thread</varname> is mapped to one and only one
49 <varname>U-process</varname>. All
50 <varname>U-processes</varname> of a same
51 <varname>W-process</varname> share the same address space.
54 Each Unix process can be identified by two values:
58 <para>the Unix process id (<varname>upid</varname> in the following)</para>
61 <para>the Windows's thread id (<varname>tid</varname>)</para>
65 Each Windows' process has also a Windows' process id
66 (<varname>wpid</varname> in the following). It must be clear
67 that <varname>upid</varname> and <varname>wpid</varname> are
68 different and shall not be used instead of the other.
71 <varname>Wpid</varname> and <varname>tid</varname> are
72 defined (Windows) system wide. They must not be confused
73 with process or thread handles which, as any handle, is an
74 indirection to a system object (in this case process or
75 thread). A same process can have several different handles
76 on the same kernel object. The handles can be defined as
77 local (the values is only valid in a process), or system
78 wide (the same handle can be used by any
79 <varname>W-process</varname>).
84 <title>Wine, debugging and WineDbg</title>
87 When talking of debugging in Wine, there are at least two
92 <para>the Windows' debugging API.</para>
95 <para>the Wine integrated debugger, dubbed
96 <command>WineDbg</command>.</para>
100 Wine implements most of the Windows' debugging API (the
101 part in <filename>KERNEL32.DLL</filename>, not the one in
102 <filename>IMAGEHLP.DLL</filename>), and allows any program
103 (emulated or Winelib) using that API to debug a
104 <varname>W-process</varname>.
107 <command>WineDbg</command> is a Winelib application making
108 use of this API to allow debugging both any Wine or Winelib
109 applications as well as Wine itself (kernel and all DLLs).
115 <sect1 id="dbg-modes">
116 <title>WineDbg's modes of invocation</title>
119 <title>Starting a process</title>
122 Any application (either a Windows' native executable, or a
123 Winelib application) can be run through
124 <command>WineDbg</command>. Command line options and tricks
125 are the same as for wine:
129 winedbg "hl.exe -windowed"
134 <title>Attaching</title>
137 <command>WineDbg</command> can also be launched without any
138 command line argument: <command>WineDbg</command> is started
139 without any attached process. You can get a list of running
140 <varname>W-processes</varname> (and their
141 <varname>wpid</varname>'s) using the <command>walk
142 process</command> command, and then, with the
143 <command>attach</command> command, pick up the
144 <varname>wpid</varname> of the <varname>W-process</varname>
145 you want to debug. This is (for now) a neat feature for the
150 <para>you can debug an already started application</para>
155 <sect2 id="dbg-on-exception">
156 <title id="dbg-exception-title">On exceptions</title>
159 When something goes wrong, Windows tracks this as an
160 exception. Exceptions exist for segmentation violation,
161 stack overflow, division by zero...
164 When an exception occurs, Wine checks if the <varname>W-process</varname> is
165 debugged. If so, the exception event is sent to the
166 debugger, which takes care of it: end of the story. This
167 mechanism is part of the standard Windows' debugging API.
170 If the <varname>W-process</varname> is not debugged, Wine
171 tries to launch a debugger. This debugger (normally
172 <command>WineDbg</command>, see III Configuration for more
173 details), at startup, attaches to the
174 <varname>W-process</varname> which generated the exception
175 event. In this case, you are able to look at the causes of
176 the exception, and either fix the causes (and continue
177 further the execution) or dig deeper to understand what went
181 If <command>WineDbg</command> is the standard debugger, the
182 <command>pass</command> and <command>cont</command> commands
183 are the two ways to let the process go further for the
184 handling of the exception event.
187 To be more precise on the way Wine (and Windows) generates
188 exception events, when a fault occurs (segmentation
189 violation, stack overflow...), the event is first sent to
190 the debugger (this is known as a first chance exception).
191 The debugger can give two answers:
196 <term>continue:</term>
199 the debugger had the ability to correct what's
200 generated the exception, and is now able to continue
209 the debugger couldn't correct the cause of the
210 first chance exception. Wine will now try to walk
211 the list of exception handlers to see if one of them
212 can handle the exception. If no exception handler is
213 found, the exception is sent once again to the
214 debugger to indicate the failure of the exception
222 since some of Wine's code uses exceptions and
223 <function>try/catch</function> blocks to provide some
224 functionality, <command>WineDbg</command> can be entered
225 in such cases with segv exceptions. This happens, for
226 example, with <function>IsBadReadPtr</function> function.
227 In that case, the <command>pass</command> command shall be
228 used, to let the handling of the exception to be done by
229 the <function>catch</function> block in
230 <function>IsBadReadPtr</function>.
235 <sect2 id="interrupt">
236 <title>Interrupting</title>
239 You can stop the debugger while it's running by hitting
240 Ctrl-C in its window. This will stop the debugged process,
241 and let you manipulate the current context
246 <title>Quitting</title>
249 Wine supports the new XP APIs, allowing for a debugger to
250 detach from a program being debugged (see
251 <command>detach</command> command). Unfortunately, as the
252 debugger cannot, for now, neither clear its internal
253 information, nor restart a new process, the debugger, after
254 detaching itself, cannot do much except being quited.
260 <sect1 id="wine-debugger">
261 <title>Using the Wine Debugger</title>
264 Written by &name-marcus-meissner; <email>&email-marcus-meissner;</email>,
268 (Extracted from <filename>wine/documentation/debugging</filename>)
272 This file describes where to start debugging Wine. If at any
273 point you get stuck and want to ask for help, please read the
274 <emphasis>How to Report A Bug</emphasis> section of the
275 <emphasis>Wine Users Guide</emphasis> for information on how to write
280 <title>Crashes</title>
283 These usually show up like this:
286 |Unexpected Windows program segfault - opcode = 8b
287 |Segmentation fault in Windows program 1b7:c41.
288 |Loading symbols from ELF file /root/wine/wine...
289 |....more Loading symbols from ...
292 | CS:01b7 SS:016f DS:0287 ES:0000
293 | IP:0c41 SP:878a BP:8796 FLAGS:0246
294 | AX:811e BX:0000 CX:0000 DX:0000 SI:0001 DI:ffff
296 |0x016f:0x878a: 0001 016f ffed 0000 0000 0287 890b 1e5b
297 |0x016f:0x879a: 01b7 0001 000d 1050 08b7 016f 0001 000d
298 |0x016f:0x87aa: 000a 0003 0004 0000 0007 0007 0190 0000
301 |0050: sel=0287 base=40211d30 limit=0b93f (bytes) 16-bit rw-
303 |0 0x01b7:0x0c41 (PXSRV_FONGETFACENAME+0x7c)
304 |1 0x01b7:0x1e5b (PXSRV_FONPUTCATFONT+0x2cd)
306 |3 0x01b7:0x0768 (PXSRV_FONINITFONTS+0x81)
307 |4 0x014f:0x03ed (PDOXWIN_@SQLCURCB$Q6CBTYPEULN8CBSCTYPE+0x1b1)
310 |0x01b7:0x0c41 (PXSRV_FONGETFACENAME+0x7c): movw %es:0x38(%bx),%dx
313 Steps to debug a crash. You may stop at any step, but please
314 report the bug and provide as much of the information
315 gathered to the bug report as feasible.
321 Get the reason for the crash. This is usually an access to
322 an invalid selector, an access to an out of range address
323 in a valid selector, popping a segmentregister from the
324 stack or the like. When reporting a crash, report this
325 <emphasis>whole</emphasis> crashdump even if it doesn't
329 (In this case it is access to an invalid selector, for
330 <systemitem>%es</systemitem> is <literal>0000</literal>, as
331 seen in the register dump).
336 Determine the cause of the crash. Since this is usually
337 a primary/secondary reaction to a failed or misbehaving
338 Wine function, rerun Wine with <parameter>-debugmsg
339 +relay</parameter> added to the commandline. This will
340 generate quite a lot of output, but usually the reason is
341 located in the last call(s). Those lines usually look like
345 |Call KERNEL.90: LSTRLEN(0227:0692 "text") ret=01e7:2ce7 ds=0227
346 ^^^^^^^^^ ^ ^^^^^^^^^ ^^^^^^ ^^^^^^^^^ ^^^^
347 | | | | | |Datasegment
348 | | | | |Return address
349 | | | |textual parameter
351 | | |Argument(s). This one is a win16 segmented pointer.
353 |The module, the function is called in. In this case it is KERNEL.
355 |Ret KERNEL.90: LSTRLEN() retval=0x0004 ret=01e7:2ce7 ds=0227
357 |Returnvalue is 16 bit and has the value 4.
362 If you have found a misbehaving function, try to find out
363 why it misbehaves. Find the function in the source code.
364 Try to make sense of the arguments passed. Usually there is
365 a <function>WINE_DEFAULT_DEBUG_CHANNEL(<channel>);</function>
366 at the beginning of the file. Rerun wine with
367 <parameter>-debugmsg +xyz,+relay</parameter> added to the
371 Occasionally there are additional debug channels defined at the
372 begining of the file in the form.
373 <function>WINE_DECLARE_DEBUG_CHANNEL(<channel>);</function>
374 If so the offending fuction may also uses one of these alternate
375 channels. Look through the the function for
376 <function>TRACE_(<channel>)(" ... /n");</function> and add any
377 additional channels to the commandline.
382 Additional information on how to debug using the internal
383 debugger can be found in
384 <filename>programs/winedbg/README</filename>.
389 If this information isn't clear enough or if you want to
390 know more about what's happening in the function itself,
391 try running wine with <parameter>-debugmsg
392 +all</parameter>, which dumps ALL included debug
398 If even that isn't enough, add more debug output for yourself
399 into the functions you find relevant. See The section on Debug
400 Logging in this guide for more information. You might
401 also try to run the program in <command>gdb</command>
402 instead of using the Wine debugger. If you do that, use
403 <parameter>handle SIGSEGV nostop noprint</parameter> to
404 disable the handling of seg faults inside
405 <command>gdb</command> (needed for Win16).
410 You can also set a breakpoint for that function. Start wine
411 useing <command>winedbg</command> instead of
412 <command>wine</command>. Once the debugger is is running enter
413 <command>break</command> <parameter>KERNEL_LSTRLEN</parameter>
414 (replace by function you want to debug, CASE IS RELEVANT)
415 to set a breakpoint. Then
416 use <command>continue</command> to start normal
417 program-execution. Wine will stop if it reaches the
418 breakpoint. If the program isn't yet at the crashing call
419 of that function, use <command>continue</command> again
420 until you are about to enter that function. You may now
421 proceed with single-stepping the function until you reach
422 the point of crash. Use the other debugger commands to
423 print registers and the like.
430 <title>Program hangs, nothing happens</title>
433 Start the program with <command>winedbg</command> instead of
434 <command>wine</command>. When the program locks up switch to the
435 winedbg terminal and press
436 <keycombo><keycap>Ctrl</keycap><keycap>C</keycap></keycombo>. this
437 will stop the program and let you debug the program as you would for
443 <title>Program reports an error with a Messagebox</title>
446 Sometimes programs are reporting failure using more or
447 less nondescript messageboxes. We can debug this using the
448 same method as Crashes, but there is one problem... For
449 setting up a message box the program also calls Wine
450 producing huge chunks of debug code.
453 Since the failure happens usually directly before setting up
454 the Messagebox you can start winedbg and set a
455 breakpoint at <function>MessageBoxA</function> (called by win16
456 and win32 programs) and proceed with
457 <command>continue</command>. With <parameter>--debugmsg
458 +all</parameter> Wine will now stop directly before setting
459 up the Messagebox. Proceed as explained above.
462 You can also run wine using <command>wine -debugmsg +relay
463 program.exe 2>&1 | less -i</command> and in
464 <command>less</command> search for <quote>MessageBox</quote>.
469 <title>Disassembling programs:</title>
472 You may also try to disassemble the offending program to
473 check for undocumented features and/or use of them.
476 The best, freely available, disassembler for Win16 programs is
477 <application>Windows Codeback</application>, archive name
478 <filename>wcbxxx.zip</filename>, which usually can be found in
479 the <filename>Cica-Mirror</filename> subdirectory on the Wine
480 ftp sites. (See <filename>ANNOUNCE</filename>).
483 Disassembling win32 programs is possible using
484 <application>Windows Disassembler 32</application>, archive name
485 something like <filename>w32dsm87.zip</filename> (or similar)
486 on <systemitem class="systemname">ftp.winsite.com</systemitem>
487 and mirrors. The shareware version does not allow saving of
488 disassembly listings. You can also use the newer (and in the
489 full version better) <application>Interactive
490 Disassembler</application> (IDA) from the ftp sites mentioned
491 at the end of the document. Understanding disassembled code is
492 mostly a question of exercise.
495 Most code out there uses standard C function entries (for it
496 is usually written in C). Win16 function entries usually
503 retf XXXX <--------- XXXX is number of bytes of arguments
506 This is a <function>FAR</function> function with no local
507 storage. The arguments usually start at
508 <literal>[bp+6]</literal> with increasing offsets. Note, that
509 <literal>[bp+6]</literal> belongs to the
510 <emphasis>rightmost</emphasis> argument, for exported win16
511 functions use the PASCAL calling convention. So, if we use
512 <function>strcmp(a,b)</function> with <parameter>a</parameter>
513 and <parameter>b</parameter> both 32 bit variables
514 <parameter>b</parameter> would be at <literal>[bp+6]</literal>
515 and <parameter>a</parameter> at <literal>[bp+10]</literal>.
518 Most functions make also use of local storage in the stackframe:
522 ... function code ...
527 This does mostly the same as above, but also adds
528 <literal>0x86</literal> bytes of stackstorage, which is
529 accessed using <literal>[bp-xx]</literal>. Before calling a
530 function, arguments are pushed on the stack using something
534 push word ptr [bp-02] <- will be at [bp+8]
535 push di <- will be at [bp+6]
539 Here first the selector and then the offset to the passed
545 <title>Sample debugging session:</title>
548 Let's debug the infamous Word <filename>SHARE.EXE</filename>
552 |marcus@jet $ wine winword.exe
553 | +---------------------------------------------+
554 | | ! You must leave Windows and load SHARE.EXE|
555 | | before starting Word. |
556 | +---------------------------------------------+
559 |marcus@jet $ wine winword.exe -debugmsg +relay -debug
560 |CallTo32(wndproc=0x40065bc0,hwnd=000001ac,msg=00000081,wp=00000000,lp=00000000)
561 |Win16 task 'winword': Breakpoint 1 at 0x01d7:0x001a
562 |CallTo16(func=0127:0070,ds=0927)
563 |Call WPROCS.24: TASK_RESCHEDULE() ret=00b7:1456 ds=0927
564 |Ret WPROCS.24: TASK_RESCHEDULE() retval=0x8672 ret=00b7:1456 ds=0927
565 |CallTo16(func=01d7:001a,ds=0927)
566 | AX=0000 BX=3cb4 CX=1f40 DX=0000 SI=0000 DI=0927 BP=0000 ES=11f7
567 |Loading symbols: /home/marcus/wine/wine...
568 |Stopped on breakpoint 1 at 0x01d7:0x001a
570 |Wine-dbg>break MessageBoxA <---- Set Breakpoint
571 |Breakpoint 2 at 0x40189100 (MessageBoxA [msgbox.c:190])
572 |Wine-dbg>c <---- Continue
573 |Call KERNEL.91: INITTASK() ret=0157:0022 ds=08a7
574 | AX=0000 BX=3cb4 CX=1f40 DX=0000 SI=0000 DI=08a7 ES=11d7 EFL=00000286
575 |CallTo16(func=090f:085c,ds=0dcf,0x0000,0x0000,0x0000,0x0000,0x0800,0x0000,0x0000,0x0dcf)
576 |... <----- Much debugoutput
577 |Call KERNEL.136: GETDRIVETYPE(0x0000) ret=060f:097b ds=0927
579 |Ret KERNEL.136: GETDRIVETYPE() retval=0x0002 ret=060f:097b ds=0927
580 ^^^^^^ DRIVE_REMOVEABLE
581 (It is a floppy diskdrive.)
583 |Call KERNEL.136: GETDRIVETYPE(0x0001) ret=060f:097b ds=0927
585 |Ret KERNEL.136: GETDRIVETYPE() retval=0x0000 ret=060f:097b ds=0927
586 ^^^^^^ DRIVE_CANNOTDETERMINE
587 (I don't have drive B: assigned)
589 |Call KERNEL.136: GETDRIVETYPE(0x0002) ret=060f:097b ds=0927
591 |Ret KERNEL.136: GETDRIVETYPE() retval=0x0003 ret=060f:097b ds=0927
593 (specified as a harddisk)
595 |Call KERNEL.97: GETTEMPFILENAME(0x00c3,0x09278364"doc",0x0000,0927:8248) ret=060f:09b1 ds=0927
596 ^^^^^^ ^^^^^ ^^^^^^^^^
597 | | |buffer for fname
598 | |temporary name ~docXXXX.tmp
599 |Force use of Drive C:.
601 |Warning: GetTempFileName returns 'C:~doc9281.tmp', which doesn't seem to be writeable.
602 |Please check your configuration file if this generates a failure.
605 Whoops, it even detects that something is wrong!
608 |Ret KERNEL.97: GETTEMPFILENAME() retval=0x9281 ret=060f:09b1 ds=0927
609 ^^^^^^ Temporary storage ID
611 |Call KERNEL.74: OPENFILE(0x09278248"C:~doc9281.tmp",0927:82da,0x1012) ret=060f:09d8 ds=0927
612 ^^^^^^^^^^^^^^^^ ^^^^^^^^^ ^^^^^^^
613 |filename |OFSTRUCT |open mode:
615 OF_CREATE|OF_SHARE_EXCLUSIVE|OF_READWRITE
618 This fails, since my <medialabel>C:</medialabel> drive is in
619 this case mounted readonly.
622 |Ret KERNEL.74: OPENFILE() retval=0xffff ret=060f:09d8 ds=0927
623 ^^^^^^ HFILE_ERROR16, yes, it failed.
625 |Call USER.1: MESSAGEBOX(0x0000,0x09278376"Sie mussen Windows verlassen und SHARE.EXE laden bevor Sie Word starten.",0x00000000,0x1030) ret=060f:084f ds=0927
631 |Stopped on breakpoint 2 at 0x40189100 (MessageBoxA [msgbox.c:190])
632 |190 { <- the sourceline
637 The code seems to find a writeable harddisk and tries to create
638 a file there. To work around this bug, you can define
639 <medialabel>C:</medialabel> as a networkdrive, which is ignored
645 <title>Debugging Tips</title>
648 Here are some useful debugging tips, added by Andreas Mohr:
654 If you have a program crashing at such an early loader phase that you can't
655 use the Wine debugger normally, but Wine already executes the program's
656 start code, then you may use a special trick. You should do a
658 wine --debugmsg +relay program
660 to get a listing of the functions the program calls in its start function.
667 This way, you get into <command>winedbg</command>. Now you
668 can set a breakpoint on any function the program calls in
669 the start function and just type <userinput>c</userinput>
670 to bypass the eventual calls of Winfile to this function
671 until you are finally at the place where this function gets
672 called by the crashing start function. Now you can proceed
673 with your debugging as usual.
678 If you try to run a program and it quits after showing an error messagebox,
679 the problem can usually be identified in the return value of one of the
680 functions executed before <function>MessageBox()</function>.
681 That's why you should re-run the program with e.g.
683 wine --debugmsg +relay <program name> &>relmsg
685 Then do a <command>more relmsg</command> and search for the
686 last occurrence of a call to the string "MESSAGEBOX". This is a line like
688 Call USER.1: MESSAGEBOX(0x0000,0x01ff1246 "Runtime error 219 at 0004:1056.",0x00000000,0x1010) ret=01f7:2160 ds=01ff
690 In my example the lines before the call to
691 <function>MessageBox()</function> look like that:
693 Call KERNEL.96: FREELIBRARY(0x0347) ret=01cf:1033 ds=01ff
694 CallTo16(func=033f:0072,ds=01ff,0x0000)
695 Ret KERNEL.96: FREELIBRARY() retval=0x0001 ret=01cf:1033 ds=01ff
696 Call KERNEL.96: FREELIBRARY(0x036f) ret=01cf:1043 ds=01ff
697 CallTo16(func=0367:0072,ds=01ff,0x0000)
698 Ret KERNEL.96: FREELIBRARY() retval=0x0001 ret=01cf:1043 ds=01ff
699 Call KERNEL.96: FREELIBRARY(0x031f) ret=01cf:105c ds=01ff
700 CallTo16(func=0317:0072,ds=01ff,0x0000)
701 Ret KERNEL.96: FREELIBRARY() retval=0x0001 ret=01cf:105c ds=01ff
702 Call USER.171: WINHELP(0x02ac,0x01ff05b4 "COMET.HLP",0x0002,0x00000000) ret=01cf:1070 ds=01ff
703 CallTo16(func=0117:0080,ds=01ff)
704 Call WPROCS.24: TASK_RESCHEDULE() ret=00a7:0a2d ds=002b
705 Ret WPROCS.24: TASK_RESCHEDULE() retval=0x0000 ret=00a7:0a2d ds=002b
706 Ret USER.171: WINHELP() retval=0x0001 ret=01cf:1070 ds=01ff
707 Call KERNEL.96: FREELIBRARY(0x01be) ret=01df:3e29 ds=01ff
708 Ret KERNEL.96: FREELIBRARY() retval=0x0000 ret=01df:3e29 ds=01ff
709 Call KERNEL.52: FREEPROCINSTANCE(0x02cf00ba) ret=01f7:1460 ds=01ff
710 Ret KERNEL.52: FREEPROCINSTANCE() retval=0x0001 ret=01f7:1460 ds=01ff
711 Call USER.1: MESSAGEBOX(0x0000,0x01ff1246 "Runtime error 219 at 0004:1056.",0x00000000,0x1010) ret=01f7:2160 ds=01ff
715 I think that the call to <function>MessageBox()</function>
716 in this example is <emphasis>not</emphasis> caused by a
717 wrong result value of some previously executed function
718 (it's happening quite often like that), but instead the
719 messagebox complains about a runtime error at
720 <literal>0x0004:0x1056</literal>.
723 As the segment value of the address is only
724 <literal>4</literal>, I think that that is only an internal
725 program value. But the offset address reveals something
726 quite interesting: Offset <literal>1056</literal> is
727 <emphasis>very</emphasis> close to the return address of
728 <function>FREELIBRARY()</function>:
730 Call KERNEL.96: FREELIBRARY(0x031f) ret=01cf:105c ds=01ff
735 Provided that segment <literal>0x0004</literal> is indeed segment
736 <literal>0x1cf</literal>, we now we can use IDA (available at
737 <ulink url="ftp://ftp.uni-koeln.de/pc/msdos/programming/assembler/ida35bx.zip">
738 ftp://ftp.uni-koeln.de/pc/msdos/programming/assembler/ida35bx.zip</ulink>) to
739 disassemble the part that caused the error. We just have to find the address of
740 the call to <function>FreeLibrary()</function>. Some lines before that the
741 runtime error occurred. But be careful! In some cases you don't have to
742 disassemble the main program, but instead some DLL called by it in order to find
743 the correct place where the runtime error occurred. That can be determined by
744 finding the origin of the segment value (in this case <literal>0x1cf</literal>).
749 If you have created a relay file of some crashing
750 program and want to set a breakpoint at a certain
751 location which is not yet available as the program loads
752 the breakpoint's segment during execution, you may set a
753 breakpoint to <function>GetVersion16/32</function> as
754 those functions are called very often.
757 Then do a <userinput>c</userinput> until you are able to
758 set this breakpoint without error message.
763 Some useful programs:
768 <application>IDA</application>:
770 <ulink url="ftp://ftp.uni-koeln.de/pc/msdos/programming/assembler/ida35bx.zip">
771 ftp://ftp.uni-koeln.de/pc/msdos/programming/assembler/ida35bx.zip</ulink>
776 <emphasis>Very</emphasis> good DOS disassembler ! It's badly needed
777 for debugging Wine sometimes.
783 <application>XRAY</application>:
785 <ulink url="ftp://ftp.th-darmstadt.de/pub/machines/ms-dos/SimTel/msdos/asmutil/xray15.zip">
786 ftp://ftp.th-darmstadt.de/pub/machines/ms-dos/SimTel/msdos/asmutil/xray15.zip</ulink>
791 Traces DOS calls (Int 21h, DPMI, ...). Use it with
792 Windows to correct file management problems etc.
798 <application>pedump</application>:
800 <ulink url="http://oak.oakland.edu/pub/simtelnet/win95/prog/pedump.zip">
801 http://oak.oakland.edu/pub/simtelnet/win95/prog/pedump.zip</ulink>
806 Dumps the imports and exports of a PE (Portable
813 <application>winedump</application>:
817 Dumps the imports and exports of a PE (Portable
818 Executable) DLL (included in wine tree).
828 <title>Some basic debugger usages:</title>
831 After starting your program with
834 wine -debug myprog.exe
837 the program loads and you get a prompt at the program
838 starting point. Then you can set breakpoints:
841 b RoutineName (by outine name) OR
842 b *0x812575 (by address)
845 Then you hit <command>c</command> (continue) to run the
846 program. It stops at the breakpoint. You can type
849 step (to step one line) OR
850 stepi (to step one machine instruction at a time;
851 here, it helps to know the basic 386
853 info reg (to see registers)
854 info stack (to see hex values in the stack)
855 info local (to see local variables)
856 list <line number> (to list source code)
857 x <variable name> (to examine a variable; only works if code
858 is not compiled with optimization)
859 x 0x4269978 (to examine a memory location)
864 By hitting <keycap>Enter</keycap>, you repeat the last
871 <sect1 id="memory-addresses">
872 <title>Useful memory addresses</title>
874 Written by &name-andreas-mohr; <email>&email-andreas-mohr;</email>
877 Wine uses several different kinds of memory addresses.
882 Win32/"normal" Wine addresses/Linux: linear addresses.
886 Linear addresses can be everything from 0x0 up to
887 0xffffffff. In Wine on Linux they are often around
888 e.g. 0x08000000, 0x00400000 (std. Win32 program load
889 address), 0x40000000. Every Win32 process has its own
890 private 4GB address space (that is, from 0x0 up to
897 Win16 "enhanced mode": segmented addresses.
901 These are the "normal" Win16 addresses, called SEGPTR.
902 They have a segment:offset notation, e.g. 0x01d7:0x0012.
903 The segment part usually is a "selector", which *always*
904 has the lowest 3 bits set. Some sample selectors are
905 0x1f7, 0x16f, 0x8f. If these bits are set except for
906 the lowest bit, as e.g. with 0x1f6,xi then it might be a
907 handle to global memory. Just set the lowest bit to get
908 the selector in these cases. A selector kind of
909 "points" to a certain linear (see above) base address.
910 It has more or less three important attributes: segment
911 base address, segment limit, segment access rights.
917 Selector 0x1f7 (0x40320000, 0x0000ffff, r-x) So 0x1f7
918 has a base address of 0x40320000, the segment's last
919 address is 0x4032ffff (limit 0xffff), and it's readable
920 and executable. So an address of 0x1f7:0x2300 would be
921 the linear address of 0x40322300.
927 DOS/Win16 "standard mode"
931 They, too, have a segment:offset notation. But they are
932 completely different from "normal" Win16 addresses, as
933 they just represent at most 1MB of memory: The segment
934 part can be anything from 0 to 0xffff, and it's the same
935 with the offset part.
938 Now the strange thing is the calculation that's behind
939 these addresses: Just calculate segment*16 + offset in
940 order to get a "linear DOS" address. So
941 e.g. 0x0f04:0x3628 results in 0xf040 + 0x3628 = 0x12668.
942 And the highest address you can get is 0xfffff (1MB), of
943 course. In Wine, this "linear DOS" address of 0x12668
944 has to be added to the linear base address of the
945 corresponding DOS memory allocated for dosmod in order
946 to get the true linear address of a DOS seg:offs
947 address. And make sure that you're doing this in the
948 correct process with the correct linear address space,
956 <sect1 id="dbg-config">
957 <title>Configuration</title>
960 <title>Registry configuration</title>
963 The Windows' debugging API uses a registry entry to know
964 which debugger to invoke when an unhandled exception occurs
965 (see <link endterm="dbg-exception-title"
966 linkend="dbg-on-exception"></link> for some details). Two
970 "MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug"
973 Determine the behavior:
977 <term>Debugger:</term>
980 this is the command line used to launch the debugger
981 (it uses two <function>printf</function> formats
982 (<literal>%ld</literal>) to pass context dependent
983 information to the debugger). You should put here a
984 complete path to your debugger
985 (<command>WineDbg</command> can of course be used, but
986 any other Windows' debugging API aware debugger will
988 The path to the debugger you chose to use must be reachable
989 via a DOS drive in the Wine config file !
997 if this value is zero, a message box will ask the
998 user if he/she wishes to launch the debugger when an
999 unhandled exception occurs. Otherwise, the debugger
1000 is automatically started.
1007 A regular Wine registry looks like:
1010 [MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug] 957636538
1011 "Auto"=dword:00000001
1012 "Debugger"="winedbg --debugmsg -all %ld %ld"
1016 <title>Note 1</title>
1018 creating this key is mandatory. Not doing so will not
1019 fire the debugger when an exception occurs.
1023 <title>Note 2</title>
1025 <command>wineinstall</command> (available in Wine source)
1026 sets up this correctly.
1027 However, due to some limitation of the registry installed,
1028 if a previous Wine installation exists, it's safer to
1032 [MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug]
1035 key before running again <command>wineinstall</command> to
1036 regenerate this key.
1042 <title>WineDbg configuration</title>
1045 <command>WineDbg</command> can be configured through a number
1046 of options. Those options are stored in the registry, on a
1047 per user basis. The key is (in <emphasis>my</emphasis> registry)
1050 [eric\\Software\\Wine\\WineDbg]
1053 Those options can be read/written while inside
1054 <command>WineDbg</command>, as part of the debugger
1055 expressions. To refer to one of these options, its name must
1056 be prefixed by a <literal>$</literal> sign. For example,
1059 set $BreakAllThreadsStartup = 1
1062 sets the option <varname>BreakAllThreadsStartup</varname> to
1063 <literal>TRUE</literal>.
1066 All the options are read from the registry when
1067 <command>WineDbg</command> starts (if no corresponding value
1068 is found, a default value is used), and are written back to
1069 the registry when <command>WineDbg</command> exits (hence,
1070 all modifications to those options are automatically saved
1071 when <command>WineDbg</command> terminates).
1074 Here's the list of all options:
1078 <title>Controlling when the debugger is entered</title>
1082 <term><varname>BreakAllThreadsStartup</varname></term>
1085 Set to <literal>TRUE</literal> if at all threads
1086 start-up the debugger stops set to
1087 <literal>FALSE</literal> if only at the first thread
1088 startup of a given process the debugger stops.
1089 <literal>FALSE</literal> by default.
1094 <term><varname>BreakOnCritSectTimeOut</varname></term>
1097 Set to <literal>TRUE</literal> if the debugger stops
1098 when a critical section times out (5 minutes);
1099 <literal>TRUE</literal> by default.
1104 <term><varname>BreakOnAttach</varname></term>
1107 Set to <literal>TRUE</literal> if when
1108 <command>WineDbg</command> attaches to an existing
1109 process after an unhandled exception,
1110 <command>WineDbg</command> shall be entered on the
1111 first attach event. Since the attach event is
1112 meaningless in the context of an exception event
1113 (the next event which is the exception event is of
1114 course relevant), that option is likely to be
1115 <literal>FALSE</literal>.
1120 <term><varname>BreakOnFirstChance</varname></term>
1123 An exception can generate two debug events. The
1124 first one is passed to the debugger (known as a
1125 first chance) just after the exception. The debugger
1126 can then decides either to resume execution (see
1127 <command>WineDbg</command>'s <command>cont</command>
1128 command) or pass the exception up to the exception
1129 handler chain in the program (if it exists)
1130 (<command>WineDbg</command> implements this through the
1131 <command>pass</command> command). If none of the
1132 exception handlers takes care of the exception, the
1133 exception event is sent again to the debugger (known
1134 as last chance exception). You cannot pass on a last
1136 <varname>BreakOnFirstChance</varname> exception is
1137 <literal>TRUE</literal>, then winedbg is entered for
1138 both first and last chance execptions (to
1139 <literal>FALSE</literal>, it's only entered for last
1145 <term><varname>BreakOnDllLoad</varname></term>
1148 Set to <literal>TRUE</literal> if the debugger stops
1149 when a DLL is loaded into memory; when the debugger
1150 is invoked after a crash, the DLLs already mapped in
1151 memory will not trigger this break.
1152 <literal>FALSE</literal> by default.
1160 <title>Output handling</title>
1164 <term><varname>ConChannelMask</varname></term>
1167 Mask of active debugger output channels on console
1172 <term><varname>StdChannelMask</varname></term>
1175 Mask of active debugger output channels on <filename>stderr</filename>
1180 <term><varname>UseXTerm</varname></term>
1183 Set to <literal>TRUE</literal> if the debugger uses
1184 its own <command>xterm</command> window for console
1185 input/output. Set to <literal>FALSE</literal> if
1186 the debugger uses the current Unix console for
1194 Those last 3 variables are jointly used in two generic ways:
1199 <para>default</para>
1201 ConChannelMask = DBG_CHN_MESG (1)
1206 In this case, all input/output goes into a specific
1207 <command>xterm</command> window (but all debug
1208 messages <function>TRACE</function>,
1209 <function>WARN</function>... still goes to tty where
1215 to have all input/output go into the tty where Wine
1216 was started from (to be used in a X11-free
1221 StdChannelMask = DBG_CHN_MESG (1)
1227 Those variables also allow, for example for debugging
1231 ConChannelMask = 0xfff
1232 StdChannelMask = 0xfff
1236 This allows to redirect all <function>WineDbg</function>
1237 output to both tty Wine was started from, and
1238 <command>xterm</command> debugging window. If Wine (or
1239 <command>WineDbg</command>) was started with a redirection
1240 of <filename>stdout</filename> and/or
1241 <filename>stderr</filename> to a file (with for
1242 example >& shell redirect command), you'll get in that
1243 file both outputs. It may be interesting to look in the
1244 relay trace for specific values which the process segv'ed
1250 <title>Context information</title>
1254 <term><varname>ThreadId</varname></term>
1256 <para>ID of the <varname>W-thread</varname> currently
1257 examined by the debugger</para>
1261 <term><varname>ProcessId</varname></term>
1263 <para>ID of the <varname>W-thread</varname> currently
1264 examined by the debugger</para>
1268 <term><registers></term>
1270 <para>All CPU registers are also available</para>
1276 The <varname>ThreadId</varname> and
1277 <varname>ProcessId</varname> variables can be handy to set
1278 conditional breakpoints on a given thread or process.
1285 <sect1 id="dbg-commands">
1286 <title>WineDbg Command Reference</title>
1292 abort aborts the debugger
1293 quit exits the debugger
1295 attach N attach to a W-process (N is its ID). IDs can be
1296 obtained using the walk process command
1297 detach detach from a W-process. WineDbg will exit (this may
1298 be changed later on)
1301 help prints some help on the commands
1302 help info prints some help on info commands
1305 mode 16 switch to 16 bit mode
1306 mode 32 switch to 32 bit mode
1311 <title>Flow control</title>
1314 cont continue execution until next breakpoint or exception.
1315 pass pass the exception event up to the filter chain.
1316 step continue execution until next C line of code (enters
1318 next continue execution until next C line of code (doesn't
1319 enter function call)
1320 stepi execute next assembly instruction (enters function
1322 nexti execute next assembly instruction (doesn't enter
1324 finish do nexti commands until current function is exited
1327 cont, step, next, stepi, nexti can be postfixed by a
1328 number (N), meaning that the command must be executed N
1334 <title>Breakpoints, watch points</title>
1337 enable N enables (break|watch)point #N
1338 disable N disables (break|watch)point #N
1339 delete N deletes (break|watch)point #N
1340 cond N removes any a existing condition to (break|watch)point N
1341 cond N <expr> adds condition <expr> to (break|watch)point N. <expr>
1342 will be evaluated each time the breakpoint is hit. If
1343 the result is a zero value, the breakpoint isn't
1345 break * N adds a breakpoint at address N
1346 break <id> adds a breakpoint at the address of symbol <id>
1347 break <id> N adds a breakpoint at the address of symbol <id> (N ?)
1348 break N adds a breakpoint at line N of current source file
1349 break adds a breakpoint at current $pc address
1350 watch * N adds a watch command (on write) at address N (on 4 bytes)
1351 watch <id> adds a watch command (on write) at the address of
1353 info break lists all (break|watch)points (with state)
1356 When setting a breakpoint on an <id>, if several symbols with this
1357 <id> exist, the debugger will prompt for the symbol you want to use.
1358 Pick up the one you want from its number.
1361 Alternatively you can specify a DLL in the <id> (for example
1362 MYDLL.DLL.myFunc for function myFunc of
1363 <filename>G:\AnyPath\MyDll.dll)</filename>.
1366 You can use the symbol <emphasis>EntryPoint</emphasis> to stand for
1367 the entry point of the Dll.
1370 When setting a break/watch-point by <id>, if the symbol cannot be found (for example, the symbol is contained in a not yet loaded module), winedbg will
1371 recall the name of the symbol and will try to set the breakpoint each time a new module is loaded (until it succeeds).
1376 <title>Stack manipulation</title>
1379 bt print calling stack of current thread
1380 bt N print calling stack of thread of ID N (note: this
1381 doesn't change the position of the current frame as
1382 manipulated by the up & dn commands)
1383 up goes up one frame in current thread's stack
1384 up N goes up N frames in current thread's stack
1385 dn goes down one frame in current thread's stack
1386 dn N goes down N frames in current thread's stack
1387 frame N set N as the current frame for current thread's stack
1388 info local prints information on local variables for current
1394 <title>Directory & source file manipulation</title>
1398 dir <pathname>
1400 symbolfile <pathname> loads external symbol definition
1401 symbolfile <pathname> N loads external symbol definition
1402 (applying an offset of N to addresses)
1405 list lists 10 source lines from current position
1406 list - lists 10 source lines before current position
1407 list N lists 10 source lines from line N in current file
1408 list <path>:N lists 10 source lines from line N in file <path>
1409 list <id> lists 10 source lines of function <id>
1410 list * N lists 10 source lines from address N
1413 You can specify the end target (to change the 10 lines
1414 value) using the ','. For example:
1417 list 123, 234 lists source lines from line 123 up to line 234 in
1419 list foo.c:1,56 lists source lines from line 1 up to 56 in file foo.c
1424 <title>Displaying</title>
1427 A display is an expression that's evaluated and printed
1428 after the execution of any <command>WineDbg</command>
1432 display lists the active displays
1433 info display (same as above command)
1434 display <expr> adds a display for expression <expr>
1435 display /fmt <expr> adds a display for expression <expr>. Printing
1436 evaluated <expr> is done using the given format (see
1437 print command for more on formats)
1438 del display N deletes display #N
1439 undisplay N (same as del display)
1444 <title>Disassembly</title>
1447 disas disassemble from current position
1448 disas <expr> disassemble from address <expr>
1449 disas <expr>,<expr>disassembles code between addresses specified by
1450 the two <expr>
1455 <title>Information on Wine's internals</title>
1458 info class <id> prints information on Windows's class <id>
1459 walk class lists all Windows' class registered in Wine
1460 info share lists all the dynamic libraries loaded the debugged
1461 program (including .so files, NE and PE DLLs)
1462 info module N prints information on module of handle N
1463 walk module lists all modules loaded by debugged program
1464 info queue N prints information on Wine's queue N
1465 walk queue lists all queues allocated in Wine
1466 info regs prints the value of CPU register
1467 info segment N prints information on segment N
1468 info segment lists all allocated segments
1469 info stack prints the values on top of the stack
1470 info map lists all virtual mappings used by the debugged
1472 info wnd N prints information of Window of handle N
1473 walk wnd lists all the window hierarchy starting from the
1475 walk wnd N lists all the window hierarchy starting from the
1477 walk process lists all w-processes in Wine session
1478 walk thread lists all w-threads in Wine session
1479 walk modref (no longer avail)
1480 walk exception lists the exception frames (starting from current
1486 <title>Memory (reading, writing, typing)</title>
1489 x <expr> examines memory at <expr> address
1490 x /fmt <expr> examines memory at <expr> address using format /fmt
1491 print <expr> prints the value of <expr> (possibly using its type)
1492 print /fmt <expr> prints the value of <expr> (possibly using its
1494 set <lval>=<expr> writes the value of <expr> in <lval>
1495 whatis <expr> prints the C type of expression <expr>
1498 <filename>/fmt</filename> is either <filename>/<letter></filename> or
1499 <filename>/<count><letter></filename> letter can be
1502 s => an ASCII string
1503 u => an Unicode UTF16 string
1504 i => instructions (disassemble)
1505 x => 32 bit unsigned hexadecimal integer
1506 d => 32 bit signed decimal integer
1507 w => 16 bit unsigned hexadecimal integer
1508 c => character (only printable 0x20-0x7f are actuallyprinted)
1509 b => 8 bit unsigned hexadecimal integer
1515 <title>Expressions</title>
1518 Expressions in Wine Debugger are mostly written in a C form. However, there
1519 are a few discrepancies:
1523 Identifiers can take a '.' in their names. This allow
1524 mainly to access symbols from different DLLs like
1525 <function>USER32.DLL.CreateWindowA</function>.
1530 The debugger will try to distinguish this writing with structure operations.
1531 Therefore, you can only use the previous writing in operations manipulating
1532 symbols ({break|watch}points, type information command...).
1539 <title>Debug channels</title>
1541 It is possible to turn on and off debug messages as you are debuging using
1545 set + warn win => turn on warn on 'win' channel
1546 set + win => turn on warn/fixme/err/trace on 'win' channel
1547 set - win => turn off warn/fixme/err/trace on 'win' channel
1548 set - fixme => turn off the 'fixme' class
1554 <sect1 id="dbg-others">
1555 <title>Other debuggers</title>
1558 <title>GDB mode</title>
1561 WineDbg can act as a remote monitor for GDB. This allows to
1562 use all the power of GDB, but while debugging wine and/or
1563 any Win32 application. To enable this mode, just add
1564 <parameter>--gdb</parameter> to winedbg command line. You'll
1565 end up on a GDB prompt. You'll have to use the GDB commands
1570 However, some limitation in GDB while debugging wine (see
1571 below) don't ppear in this mode:
1575 GDB will correctly present Win32 thread
1576 information and breakpoint behavior
1581 Moreover, it also provides support for the Dwarf II
1582 debug format (which became the default format (instead
1583 of stabs) in gcc 3.1).
1590 A few wine extensions available through the monitor command.
1592 monitor wnd lists all window in the Wine session
1593 monitor proc lists all processes in the Wine session
1594 monitor mem displays memory mapping of debugged process
1601 <title>Using other Unix debuggers</title>
1604 You can also use other debuggers (like
1605 <command>gdb</command>), but you must be aware of a few
1609 You need to attach the unix debugger to the correct unix
1610 process (representing the correct windows thread) (you can
1611 "guess" it from a <command>ps fax</command> for example:
1612 When running the emulator, usually the first two
1613 <varname>upids</varname> are for the Windows' application
1614 running the desktop, the first thread of the application is
1615 generally the third <varname>upid</varname>; when running a
1616 Winelib program, the first thread of the application is
1617 generally the first <varname>upid</varname>)
1621 Even if latest <command>gdb</command> implements the
1622 notion of threads, it won't work with Wine because the
1623 thread abstraction used for implementing Windows' thread
1624 is not 100% mapped onto the linux posix threads
1625 implementation. It means that you'll have to spawn a
1626 different <command>gdb</command> session for each Windows'
1627 thread you wish to debug.
1631 <!-- *** Extra content spliced in from article by Andreas Mohr *** -->
1633 Following text written by &name-andreas-mohr; <email>&email-andreas-mohr;</email>
1636 Here's how to get info about the current execution status of a
1637 certain Wine process:
1640 Change into your Wine source dir and enter:
1646 Switch to another console and enter <command>ps ax | grep
1647 wine</command> to find all wine processes. Inside
1648 <command>gdb</command>, repeat for all Wine processes:
1651 (gdb) attach <userinput>PID</userinput>
1654 with <userinput>PID</userinput> being the process ID of one of
1655 the Wine processes. Use
1661 to get the backtrace of the current Wine process, i.e. the
1662 function call history. That way you can find out what the
1663 current process is doing right now. And then you can use
1673 (gdb) b <userinput>SomeFunction</userinput>
1682 to set a breakpoint at a certain function and continue up to
1683 that function. Finally you can enter
1689 to detach from the Wine process.
1691 <!-- *** End of xtra content *** -->
1695 <title>Using other Windows debuggers</title>
1698 You can use any Windows' debugging API compliant debugger
1699 with Wine. Some reports have been made of success with
1700 VisualStudio debugger (in remote mode, only the hub runs
1701 in Wine). GoVest fully runs in Wine.
1706 <title>Main differences between winedbg and regular Unix debuggers</title>
1707 <table><title>Debuggers comparison</title>
1708 <tgroup cols=2 align="left">
1711 <entry>WineDbg</entry><entry>gdb</entry>
1715 WineDbg debugs a Windows' process: the various
1716 threads will be handled by the same WineDbg session,
1717 and a breakpoint will be triggered for any thread of
1721 gdb debugs a Windows' thread: a separate gdb session
1722 is needed for each thread of a Windows' process and
1723 a breakpoint will be triggered only for the w-thread
1729 WineDbg supports debug information from stabs
1730 (standard Unix format) and Microsoft's C, CodeView,
1734 GDB supports debug information from stabs (standard
1735 Unix format) and Dwarf II.
1745 <sect1 id="dbg-limits">
1746 <title>Limitations</title>
1751 16 bit processes are not supported (but calls to 16 bit
1752 code in 32 bit applications are).
1757 Function call in expression is no longer supported
1764 <!-- Keep this comment at the end of the file
1767 sgml-parent-document:("wine-doc.sgml" "set" "book" "part" "chapter" "")