1 <chapter id="debugger">
2 <title>Debugging Wine</title>
5 <title>Introduction</title>
8 Written by &name-eric-pouech; <email>&email-eric-pouech;</email>
9 (Last updated: 9/15/2002)
12 (Extracted from <filename>wine/documentation/winedbg</filename>)
16 <title>Processes and threads: in underlying OS and in Windows</title>
19 Before going into the depths of debugging in Wine, here's
20 a small overview of process and thread handling in Wine.
21 It has to be clear that there are two different beasts:
22 processes/threads from the Unix point of view and
23 processes/threads from a Windows point of view.
26 Each Windows' thread is implemented as a Unix process (under
27 Linux using the <function>clone</function> syscall), meaning
28 that all threads of a same Windows' process share the same
36 <para><varname>W-process</varname> means a process in Windows' terminology</para>
39 <para><varname>U-process</varname> means a process in Unix' terminology</para>
42 <para><varname>W-thread</varname> means a thread in Windows' terminology</para>
46 A <varname>W-process</varname> is made of one or several
47 <varname>W-threads</varname>. Each
48 <varname>W-thread</varname> is mapped to one and only one
49 <varname>U-process</varname>. All
50 <varname>U-processes</varname> of a same
51 <varname>W-process</varname> share the same address space.
54 Each Unix process can be identified by two values:
58 <para>the Unix process id (<varname>upid</varname> in the following)</para>
61 <para>the Windows's thread id (<varname>tid</varname>)</para>
65 Each Windows' process has also a Windows' process id
66 (<varname>wpid</varname> in the following). It must be clear
67 that <varname>upid</varname> and <varname>wpid</varname> are
68 different and shall not be used instead of the other.
71 <varname>Wpid</varname> and <varname>tid</varname> are
72 defined (Windows) system wide. They must not be confused
73 with process or thread handles which, as any handle, is an
74 indirection to a system object (in this case process or
75 thread). A same process can have several different handles
76 on the same kernel object. The handles can be defined as
77 local (the values is only valid in a process), or system
78 wide (the same handle can be used by any
79 <varname>W-process</varname>).
84 <title>Wine, debugging and WineDbg</title>
87 When talking of debugging in Wine, there are at least two
92 <para>the Windows' debugging API.</para>
95 <para>the Wine integrated debugger, dubbed
96 <command>WineDbg</command>.</para>
100 Wine implements most of the Windows' debugging API (the
101 part in <filename>KERNEL32.DLL</filename>, not the one in
102 <filename>IMAGEHLP.DLL</filename>), and allows any program
103 (emulated or Winelib) using that API to debug a
104 <varname>W-process</varname>.
107 <command>WineDbg</command> is a Winelib application making
108 use of this API to allow debugging both any Wine or Winelib
109 applications as well as Wine itself (kernel and all DLLs).
115 <sect1 id="dbg-modes">
116 <title>WineDbg's modes of invocation</title>
119 <title>Starting a process</title>
122 Any application (either a Windows' native executable, or a
123 Winelib application) can be run through
124 <command>WineDbg</command>. Command line options and tricks
125 are the same as for wine:
129 winedbg "hl.exe -windowed"
134 <title>Attaching</title>
137 <command>WineDbg</command> can also be launched without any
138 command line argument: <command>WineDbg</command> is started
139 without any attached process. You can get a list of running
140 <varname>W-processes</varname> (and their
141 <varname>wpid</varname>'s) using the <command>walk
142 process</command> command, and then, with the
143 <command>attach</command> command, pick up the
144 <varname>wpid</varname> of the <varname>W-process</varname>
145 you want to debug. This is (for now) a neat feature for the
150 <para>you can debug an already started application</para>
155 <sect2 id="dbg-on-exception">
156 <title id="dbg-exception-title">On exceptions</title>
159 When something goes wrong, Windows tracks this as an
160 exception. Exceptions exist for segmentation violation,
161 stack overflow, division by zero...
164 When an exception occurs, Wine checks if the <varname>W-process</varname> is
165 debugged. If so, the exception event is sent to the
166 debugger, which takes care of it: end of the story. This
167 mechanism is part of the standard Windows' debugging API.
170 If the <varname>W-process</varname> is not debugged, Wine
171 tries to launch a debugger. This debugger (normally
172 <command>WineDbg</command>, see III Configuration for more
173 details), at startup, attaches to the
174 <varname>W-process</varname> which generated the exception
175 event. In this case, you are able to look at the causes of
176 the exception, and either fix the causes (and continue
177 further the execution) or dig deeper to understand what went
181 If <command>WineDbg</command> is the standard debugger, the
182 <command>pass</command> and <command>cont</command> commands
183 are the two ways to let the process go further for the
184 handling of the exception event.
187 To be more precise on the way Wine (and Windows) generates
188 exception events, when a fault occurs (segmentation
189 violation, stack overflow...), the event is first sent to
190 the debugger (this is known as a first chance exception).
191 The debugger can give two answers:
196 <term>continue:</term>
199 the debugger had the ability to correct what's
200 generated the exception, and is now able to continue
209 the debugger couldn't correct the cause of the
210 first chance exception. Wine will now try to walk
211 the list of exception handlers to see if one of them
212 can handle the exception. If no exception handler is
213 found, the exception is sent once again to the
214 debugger to indicate the failure of the exception
222 since some of Wine's code uses exceptions and
223 <function>try/catch</function> blocks to provide some
224 functionality, <command>WineDbg</command> can be entered
225 in such cases with segv exceptions. This happens, for
226 example, with <function>IsBadReadPtr</function> function.
227 In that case, the <command>pass</command> command shall be
228 used, to let the handling of the exception to be done by
229 the <function>catch</function> block in
230 <function>IsBadReadPtr</function>.
235 <sect2 id="interrupt">
236 <title>Interrupting</title>
239 You can stop the debugger while it's running by hitting
240 Ctrl-C in its window. This will stop the debugged process,
241 and let you manipulate the current context
246 <title>Quitting</title>
249 Wine supports the new XP APIs, allowing for a debugger to
250 detach from a program being debugged (see
251 <command>detach</command> command). Unfortunately, as the
252 debugger cannot, for now, neither clear its internal
253 information, nor restart a new process, the debugger, after
254 detaching itself, cannot do much except being quited.
260 <sect1 id="wine-debugger">
261 <title>Using the Wine Debugger</title>
264 Written by &name-marcus-meissner; <email>&email-marcus-meissner;</email>,
268 (Extracted from <filename>wine/documentation/debugging</filename>)
272 This file describes where to start debugging Wine. If at any
273 point you get stuck and want to ask for help, please read the
274 <emphasis>How to Report A Bug</emphasis> section of the
275 <emphasis>Wine Users Guide</emphasis> for information on how to write
280 <title>Crashes</title>
283 These usually show up like this:
286 |Unexpected Windows program segfault - opcode = 8b
287 |Segmentation fault in Windows program 1b7:c41.
288 |Loading symbols from ELF file /root/wine/wine...
289 |....more Loading symbols from ...
292 | CS:01b7 SS:016f DS:0287 ES:0000
293 | IP:0c41 SP:878a BP:8796 FLAGS:0246
294 | AX:811e BX:0000 CX:0000 DX:0000 SI:0001 DI:ffff
296 |0x016f:0x878a: 0001 016f ffed 0000 0000 0287 890b 1e5b
297 |0x016f:0x879a: 01b7 0001 000d 1050 08b7 016f 0001 000d
298 |0x016f:0x87aa: 000a 0003 0004 0000 0007 0007 0190 0000
301 |0050: sel=0287 base=40211d30 limit=0b93f (bytes) 16-bit rw-
303 |0 0x01b7:0x0c41 (PXSRV_FONGETFACENAME+0x7c)
304 |1 0x01b7:0x1e5b (PXSRV_FONPUTCATFONT+0x2cd)
306 |3 0x01b7:0x0768 (PXSRV_FONINITFONTS+0x81)
307 |4 0x014f:0x03ed (PDOXWIN_@SQLCURCB$Q6CBTYPEULN8CBSCTYPE+0x1b1)
310 |0x01b7:0x0c41 (PXSRV_FONGETFACENAME+0x7c): movw %es:0x38(%bx),%dx
313 Steps to debug a crash. You may stop at any step, but please
314 report the bug and provide as much of the information
315 gathered to the bug report as feasible.
321 Get the reason for the crash. This is usually an access to
322 an invalid selector, an access to an out of range address
323 in a valid selector, popping a segmentregister from the
324 stack or the like. When reporting a crash, report this
325 <emphasis>whole</emphasis> crashdump even if it doesn't
329 (In this case it is access to an invalid selector, for
330 <systemitem>%es</systemitem> is <literal>0000</literal>, as
331 seen in the register dump).
336 Determine the cause of the crash. Since this is usually
337 a primary/secondary reaction to a failed or misbehaving
338 Wine function, rerun Wine with <parameter>-debugmsg
339 +relay</parameter> added to the commandline. This will
340 generate quite a lot of output, but usually the reason is
341 located in the last call(s). Those lines usually look like
345 |Call KERNEL.90: LSTRLEN(0227:0692 "text") ret=01e7:2ce7 ds=0227
346 ^^^^^^^^^ ^ ^^^^^^^^^ ^^^^^^ ^^^^^^^^^ ^^^^
347 | | | | | |Datasegment
348 | | | | |Return address
349 | | | |textual parameter
351 | | |Argument(s). This one is a win16 segmented pointer.
353 |The module, the function is called in. In this case it is KERNEL.
355 |Ret KERNEL.90: LSTRLEN() retval=0x0004 ret=01e7:2ce7 ds=0227
357 |Returnvalue is 16 bit and has the value 4.
362 If you have found a misbehaving function, try to find out
363 why it misbehaves. Find the function in the source code.
364 Try to make sense of the arguments passed. Usually there is
365 a <function>WINE_DEFAULT_DEBUG_CHANNEL(<channel>);</function>
366 at the beginning of the file. Rerun wine with
367 <parameter>-debugmsg +xyz,+relay</parameter> added to the
371 Occasionally there are additional debug channels defined at the
372 begining of the file in the form.
373 <function>WINE_DECLARE_DEBUG_CHANNEL(<channel>);</function>
374 If so the offending fuction may also uses one of these alternate
375 channels. Look through the the function for
376 <function>TRACE_(<channel>)(" ... /n");</function> and add any
377 additional channels to the commandline.
382 Additional information on how to debug using the internal
383 debugger can be found in
384 <filename>programs/winedbg/README</filename>.
389 If this information isn't clear enough or if you want to
390 know more about what's happening in the function itself,
391 try running wine with <parameter>-debugmsg
392 +all</parameter>, which dumps ALL included debug
398 If even that isn't enough, add more debug output for yourself
399 into the functions you find relevant. See The section on Debug
400 Logging in this guide for more information. You might
401 also try to run the program in <command>gdb</command>
402 instead of using the Wine debugger. If you do that, use
403 <parameter>handle SIGSEGV nostop noprint</parameter> to
404 disable the handling of seg faults inside
405 <command>gdb</command> (needed for Win16).
410 You can also set a breakpoint for that function. Start wine
411 useing <command>winedbg</command> instead of
412 <command>wine</command>. Once the debugger is is running enter
413 <command>break</command> <parameter>KERNEL_LSTRLEN</parameter>
414 (replace by function you want to debug, CASE IS RELEVANT)
415 to set a breakpoint. Then
416 use <command>continue</command> to start normal
417 program-execution. Wine will stop if it reaches the
418 breakpoint. If the program isn't yet at the crashing call
419 of that function, use <command>continue</command> again
420 until you are about to enter that function. You may now
421 proceed with single-stepping the function until you reach
422 the point of crash. Use the other debugger commands to
423 print registers and the like.
430 <title>Program hangs, nothing happens</title>
433 Start the program with <command>winedbg</command> instead of
434 <command>wine</command>. When the program locks up switch to the
435 winedbg terminal and press
436 <keycombo><keycap>Ctrl</keycap><keycap>C</keycap></keycombo>. this
437 will stop the program and let you debug the program as you would for
443 <title>Program reports an error with a Messagebox</title>
446 Sometimes programs are reporting failure using more or
447 less nondescript messageboxes. We can debug this using the
448 same method as Crashes, but there is one problem... For
449 setting up a message box the program also calls Wine
450 producing huge chunks of debug code.
453 Since the failure happens usually directly before setting up
454 the Messagebox you can start winedbg and set a
455 breakpoint at <function>MessageBoxA</function> (called by win16
456 and win32 programs) and proceed with
457 <command>continue</command>. With <parameter>--debugmsg
458 +all</parameter> Wine will now stop directly before setting
459 up the Messagebox. Proceed as explained above.
462 You can also run wine using <command>wine -debugmsg +relay
463 program.exe 2>&1 | less -i</command> and in
464 <command>less</command> search for <quote>MessageBox</quote>.
469 <title>Disassembling programs:</title>
472 You may also try to disassemble the offending program to
473 check for undocumented features and/or use of them.
476 The best, freely available, disassembler for Win16 programs is
477 <application>Windows Codeback</application>, archive name
478 <filename>wcbxxx.zip</filename>, which usually can be found in
479 the <filename>Cica-Mirror</filename> subdirectory on the Wine
480 ftp sites. (See <filename>ANNOUNCE</filename>).
483 Disassembling win32 programs is possible using
484 <application>Windows Disassembler 32</application>, archive name
485 something like <filename>w32dsm87.zip</filename> (or similar)
486 on <systemitem class="systemname">ftp.winsite.com</systemitem>
487 and mirrors. The shareware version does not allow saving of
488 disassembly listings. You can also use the newer (and in the
489 full version better) <application>Interactive
490 Disassembler</application> (IDA) from the ftp sites mentioned
491 at the end of the document. Understanding disassembled code is
492 mostly a question of exercise.
495 Most code out there uses standard C function entries (for it
496 is usually written in C). Win16 function entries usually
503 retf XXXX <--------- XXXX is number of bytes of arguments
506 This is a <function>FAR</function> function with no local
507 storage. The arguments usually start at
508 <literal>[bp+6]</literal> with increasing offsets. Note, that
509 <literal>[bp+6]</literal> belongs to the
510 <emphasis>rightmost</emphasis> argument, for exported win16
511 functions use the PASCAL calling convention. So, if we use
512 <function>strcmp(a,b)</function> with <parameter>a</parameter>
513 and <parameter>b</parameter> both 32 bit variables
514 <parameter>b</parameter> would be at <literal>[bp+6]</literal>
515 and <parameter>a</parameter> at <literal>[bp+10]</literal>.
518 Most functions make also use of local storage in the stackframe:
522 ... function code ...
527 This does mostly the same as above, but also adds
528 <literal>0x86</literal> bytes of stackstorage, which is
529 accessed using <literal>[bp-xx]</literal>. Before calling a
530 function, arguments are pushed on the stack using something
534 push word ptr [bp-02] <- will be at [bp+8]
535 push di <- will be at [bp+6]
539 Here first the selector and then the offset to the passed
545 <title>Sample debugging session:</title>
548 Let's debug the infamous Word <filename>SHARE.EXE</filename>
552 |marcus@jet $ wine winword.exe
553 | +---------------------------------------------+
554 | | ! You must leave Windows and load SHARE.EXE|
555 | | before starting Word. |
556 | +---------------------------------------------+
559 |marcus@jet $ wine winword.exe -debugmsg +relay -debug
560 |CallTo32(wndproc=0x40065bc0,hwnd=000001ac,msg=00000081,wp=00000000,lp=00000000)
561 |Win16 task 'winword': Breakpoint 1 at 0x01d7:0x001a
562 |CallTo16(func=0127:0070,ds=0927)
563 |Call WPROCS.24: TASK_RESCHEDULE() ret=00b7:1456 ds=0927
564 |Ret WPROCS.24: TASK_RESCHEDULE() retval=0x8672 ret=00b7:1456 ds=0927
565 |CallTo16(func=01d7:001a,ds=0927)
566 | AX=0000 BX=3cb4 CX=1f40 DX=0000 SI=0000 DI=0927 BP=0000 ES=11f7
567 |Loading symbols: /home/marcus/wine/wine...
568 |Stopped on breakpoint 1 at 0x01d7:0x001a
570 |Wine-dbg>break MessageBoxA <---- Set Breakpoint
571 |Breakpoint 2 at 0x40189100 (MessageBoxA [msgbox.c:190])
572 |Wine-dbg>c <---- Continue
573 |Call KERNEL.91: INITTASK() ret=0157:0022 ds=08a7
574 | AX=0000 BX=3cb4 CX=1f40 DX=0000 SI=0000 DI=08a7 ES=11d7 EFL=00000286
575 |CallTo16(func=090f:085c,ds=0dcf,0x0000,0x0000,0x0000,0x0000,0x0800,0x0000,0x0000,0x0dcf)
576 |... <----- Much debugoutput
577 |Call KERNEL.136: GETDRIVETYPE(0x0000) ret=060f:097b ds=0927
579 |Ret KERNEL.136: GETDRIVETYPE() retval=0x0002 ret=060f:097b ds=0927
580 ^^^^^^ DRIVE_REMOVEABLE
581 (It is a floppy diskdrive.)
583 |Call KERNEL.136: GETDRIVETYPE(0x0001) ret=060f:097b ds=0927
585 |Ret KERNEL.136: GETDRIVETYPE() retval=0x0000 ret=060f:097b ds=0927
586 ^^^^^^ DRIVE_CANNOTDETERMINE
587 (I don't have drive B: assigned)
589 |Call KERNEL.136: GETDRIVETYPE(0x0002) ret=060f:097b ds=0927
591 |Ret KERNEL.136: GETDRIVETYPE() retval=0x0003 ret=060f:097b ds=0927
593 (specified as a harddisk)
595 |Call KERNEL.97: GETTEMPFILENAME(0x00c3,0x09278364"doc",0x0000,0927:8248) ret=060f:09b1 ds=0927
596 ^^^^^^ ^^^^^ ^^^^^^^^^
597 | | |buffer for fname
598 | |temporary name ~docXXXX.tmp
599 |Force use of Drive C:.
601 |Warning: GetTempFileName returns 'C:~doc9281.tmp', which doesn't seem to be writeable.
602 |Please check your configuration file if this generates a failure.
605 Whoops, it even detects that something is wrong!
608 |Ret KERNEL.97: GETTEMPFILENAME() retval=0x9281 ret=060f:09b1 ds=0927
609 ^^^^^^ Temporary storage ID
611 |Call KERNEL.74: OPENFILE(0x09278248"C:~doc9281.tmp",0927:82da,0x1012) ret=060f:09d8 ds=0927
612 ^^^^^^^^^^^^^^^^ ^^^^^^^^^ ^^^^^^^
613 |filename |OFSTRUCT |open mode:
615 OF_CREATE|OF_SHARE_EXCLUSIVE|OF_READWRITE
618 This fails, since my <medialabel>C:</medialabel> drive is in
619 this case mounted readonly.
622 |Ret KERNEL.74: OPENFILE() retval=0xffff ret=060f:09d8 ds=0927
623 ^^^^^^ HFILE_ERROR16, yes, it failed.
625 |Call USER.1: MESSAGEBOX(0x0000,0x09278376"Sie mussen Windows verlassen und SHARE.EXE laden bevor Sie Word starten.",0x00000000,0x1030) ret=060f:084f ds=0927
631 |Stopped on breakpoint 2 at 0x40189100 (MessageBoxA [msgbox.c:190])
632 |190 { <- the sourceline
637 The code seems to find a writeable harddisk and tries to create
638 a file there. To work around this bug, you can define
639 <medialabel>C:</medialabel> as a networkdrive, which is ignored
645 <title>Debugging Tips</title>
648 Here are some useful debugging tips, added by Andreas Mohr:
654 If you have a program crashing at such an early loader phase that you can't
655 use the Wine debugger normally, but Wine already executes the program's
656 start code, then you may use a special trick. You should do a
658 wine --debugmsg +relay program
660 to get a listing of the functions the program calls in its start function.
667 This way, you get into <command>winedbg</command>. Now you
668 can set a breakpoint on any function the program calls in
669 the start function and just type <userinput>c</userinput>
670 to bypass the eventual calls of Winfile to this function
671 until you are finally at the place where this function gets
672 called by the crashing start function. Now you can proceed
673 with your debugging as usual.
678 If you try to run a program and it quits after showing an error messagebox,
679 the problem can usually be identified in the return value of one of the
680 functions executed before <function>MessageBox()</function>.
681 That's why you should re-run the program with e.g.
683 wine --debugmsg +relay <program name> &>relmsg
685 Then do a <command>more relmsg</command> and search for the
686 last occurrence of a call to the string "MESSAGEBOX". This is a line like
688 Call USER.1: MESSAGEBOX(0x0000,0x01ff1246 "Runtime error 219 at 0004:1056.",0x00000000,0x1010) ret=01f7:2160 ds=01ff
690 In my example the lines before the call to
691 <function>MessageBox()</function> look like that:
693 Call KERNEL.96: FREELIBRARY(0x0347) ret=01cf:1033 ds=01ff
694 CallTo16(func=033f:0072,ds=01ff,0x0000)
695 Ret KERNEL.96: FREELIBRARY() retval=0x0001 ret=01cf:1033 ds=01ff
696 Call KERNEL.96: FREELIBRARY(0x036f) ret=01cf:1043 ds=01ff
697 CallTo16(func=0367:0072,ds=01ff,0x0000)
698 Ret KERNEL.96: FREELIBRARY() retval=0x0001 ret=01cf:1043 ds=01ff
699 Call KERNEL.96: FREELIBRARY(0x031f) ret=01cf:105c ds=01ff
700 CallTo16(func=0317:0072,ds=01ff,0x0000)
701 Ret KERNEL.96: FREELIBRARY() retval=0x0001 ret=01cf:105c ds=01ff
702 Call USER.171: WINHELP(0x02ac,0x01ff05b4 "COMET.HLP",0x0002,0x00000000) ret=01cf:1070 ds=01ff
703 CallTo16(func=0117:0080,ds=01ff)
704 Call WPROCS.24: TASK_RESCHEDULE() ret=00a7:0a2d ds=002b
705 Ret WPROCS.24: TASK_RESCHEDULE() retval=0x0000 ret=00a7:0a2d ds=002b
706 Ret USER.171: WINHELP() retval=0x0001 ret=01cf:1070 ds=01ff
707 Call KERNEL.96: FREELIBRARY(0x01be) ret=01df:3e29 ds=01ff
708 Ret KERNEL.96: FREELIBRARY() retval=0x0000 ret=01df:3e29 ds=01ff
709 Call KERNEL.52: FREEPROCINSTANCE(0x02cf00ba) ret=01f7:1460 ds=01ff
710 Ret KERNEL.52: FREEPROCINSTANCE() retval=0x0001 ret=01f7:1460 ds=01ff
711 Call USER.1: MESSAGEBOX(0x0000,0x01ff1246 "Runtime error 219 at 0004:1056.",0x00000000,0x1010) ret=01f7:2160 ds=01ff
715 I think that the call to <function>MessageBox()</function>
716 in this example is <emphasis>not</emphasis> caused by a
717 wrong result value of some previously executed function
718 (it's happening quite often like that), but instead the
719 messagebox complains about a runtime error at
720 <literal>0x0004:0x1056</literal>.
723 As the segment value of the address is only
724 <literal>4</literal>, I think that that is only an internal
725 program value. But the offset address reveals something
726 quite interesting: Offset <literal>1056</literal> is
727 <emphasis>very</emphasis> close to the return address of
728 <function>FREELIBRARY()</function>:
730 Call KERNEL.96: FREELIBRARY(0x031f) ret=01cf:105c ds=01ff
735 Provided that segment <literal>0x0004</literal> is indeed segment
736 <literal>0x1cf</literal>, we now we can use IDA (available at
737 <ulink url="ftp://ftp.uni-koeln.de/pc/msdos/programming/assembler/ida35bx.zip">
738 ftp://ftp.uni-koeln.de/pc/msdos/programming/assembler/ida35bx.zip</ulink>) to
739 disassemble the part that caused the error. We just have to find the address of
740 the call to <function>FreeLibrary()</function>. Some lines before that the
741 runtime error occurred. But be careful! In some cases you don't have to
742 disassemble the main program, but instead some DLL called by it in order to find
743 the correct place where the runtime error occurred. That can be determined by
744 finding the origin of the segment value (in this case <literal>0x1cf</literal>).
749 If you have created a relay file of some crashing
750 program and want to set a breakpoint at a certain
751 location which is not yet available as the program loads
752 the breakpoint's segment during execution, you may set a
753 breakpoint to <function>GetVersion16/32</function> as
754 those functions are called very often.
757 Then do a <userinput>c</userinput> until you are able to
758 set this breakpoint without error message.
763 Some useful programs:
768 <application>IDA</application>:
770 <ulink url="ftp://ftp.uni-koeln.de/pc/msdos/programming/assembler/ida35bx.zip">
771 ftp://ftp.uni-koeln.de/pc/msdos/programming/assembler/ida35bx.zip</ulink>
776 <emphasis>Very</emphasis> good DOS disassembler ! It's badly needed
777 for debugging Wine sometimes.
783 <application>XRAY</application>:
785 <ulink url="ftp://ftp.th-darmstadt.de/pub/machines/ms-dos/SimTel/msdos/asmutil/xray15.zip">
786 ftp://ftp.th-darmstadt.de/pub/machines/ms-dos/SimTel/msdos/asmutil/xray15.zip</ulink>
791 Traces DOS calls (Int 21h, DPMI, ...). Use it with
792 Windows to correct file management problems etc.
798 <application>pedump</application>:
800 <ulink url="http://oak.oakland.edu/pub/simtelnet/win95/prog/pedump.zip">
801 http://oak.oakland.edu/pub/simtelnet/win95/prog/pedump.zip</ulink>
806 Dumps the imports and exports of a PE (Portable
813 <application>winedump</application>:
817 Dumps the imports and exports of a PE (Portable
818 Executable) DLL (included in wine tree).
828 <title>Some basic debugger usages:</title>
831 After starting your program with
834 wine -debug myprog.exe
837 the program loads and you get a prompt at the program
838 starting point. Then you can set breakpoints:
841 b RoutineName (by outine name) OR
842 b *0x812575 (by address)
845 Then you hit <command>c</command> (continue) to run the
846 program. It stops at the breakpoint. You can type
849 step (to step one line) OR
850 stepi (to step one machine instruction at a time;
851 here, it helps to know the basic 386
853 info reg (to see registers)
854 info stack (to see hex values in the stack)
855 info local (to see local variables)
856 list <line number> (to list source code)
857 x <variable name> (to examine a variable; only works if code
858 is not compiled with optimization)
859 x 0x4269978 (to examine a memory location)
864 By hitting <keycap>Enter</keycap>, you repeat the last
871 <sect1 id="memory-addresses">
872 <title>Useful memory addresses</title>
874 Written by &name-andreas-mohr; <email>&email-andreas-mohr;</email>
877 Wine uses several different kinds of memory addresses.
882 Win32/"normal" Wine addresses/Linux: linear addresses.
886 Linear addresses can be everything from 0x0 up to
887 0xffffffff. In Wine on Linux they are often around
888 e.g. 0x08000000, 0x00400000 (std. Win32 program load
889 address), 0x40000000. Every Win32 process has its own
890 private 4GB address space (that is, from 0x0 up to
897 Win16 "enhanced mode": segmented addresses.
901 These are the "normal" Win16 addresses, called SEGPTR.
902 They have a segment:offset notation, e.g. 0x01d7:0x0012.
903 The segment part usually is a "selector", which
904 <emphasis>always</emphasis>
905 has the lowest 3 bits set. Some sample selectors are
906 0x1f7, 0x16f, 0x8f. If these bits are set except for
907 the lowest bit, as e.g. with 0x1f6,xi then it might be a
908 handle to global memory. Just set the lowest bit to get
909 the selector in these cases. A selector kind of
910 "points" to a certain linear (see above) base address.
911 It has more or less three important attributes: segment
912 base address, segment limit, segment access rights.
918 Selector 0x1f7 (0x40320000, 0x0000ffff, r-x) So 0x1f7
919 has a base address of 0x40320000, the segment's last
920 address is 0x4032ffff (limit 0xffff), and it's readable
921 and executable. So an address of 0x1f7:0x2300 would be
922 the linear address of 0x40322300.
928 DOS/Win16 "standard mode"
932 They, too, have a segment:offset notation. But they are
933 completely different from "normal" Win16 addresses, as
934 they just represent at most 1MB of memory: The segment
935 part can be anything from 0 to 0xffff, and it's the same
936 with the offset part.
939 Now the strange thing is the calculation that's behind
940 these addresses: Just calculate segment*16 + offset in
941 order to get a "linear DOS" address. So
942 e.g. 0x0f04:0x3628 results in 0xf040 + 0x3628 = 0x12668.
943 And the highest address you can get is 0xfffff (1MB), of
944 course. In Wine, this "linear DOS" address of 0x12668
945 has to be added to the linear base address of the
946 corresponding DOS memory allocated for dosmod in order
947 to get the true linear address of a DOS seg:offs
948 address. And make sure that you're doing this in the
949 correct process with the correct linear address space,
957 <sect1 id="dbg-config">
958 <title>Configuration</title>
961 <title>Registry configuration</title>
964 The Windows' debugging API uses a registry entry to know
965 which debugger to invoke when an unhandled exception occurs
966 (see <link endterm="dbg-exception-title"
967 linkend="dbg-on-exception"></link> for some details). Two
971 "MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug"
974 Determine the behavior:
978 <term>Debugger:</term>
981 this is the command line used to launch the debugger
982 (it uses two <function>printf</function> formats
983 (<literal>%ld</literal>) to pass context dependent
984 information to the debugger). You should put here a
985 complete path to your debugger
986 (<command>WineDbg</command> can of course be used, but
987 any other Windows' debugging API aware debugger will
989 The path to the debugger you chose to use must be reachable
990 via a DOS drive in the Wine config file !
998 if this value is zero, a message box will ask the
999 user if he/she wishes to launch the debugger when an
1000 unhandled exception occurs. Otherwise, the debugger
1001 is automatically started.
1008 A regular Wine registry looks like:
1011 [MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug] 957636538
1012 "Auto"=dword:00000001
1013 "Debugger"="winedbg --debugmsg -all %ld %ld"
1017 <title>Note 1</title>
1019 creating this key is mandatory. Not doing so will not
1020 fire the debugger when an exception occurs.
1024 <title>Note 2</title>
1026 <command>wineinstall</command> (available in Wine source)
1027 sets up this correctly.
1028 However, due to some limitation of the registry installed,
1029 if a previous Wine installation exists, it's safer to
1033 [MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug]
1036 key before running again <command>wineinstall</command> to
1037 regenerate this key.
1043 <title>WineDbg configuration</title>
1046 <command>WineDbg</command> can be configured through a number
1047 of options. Those options are stored in the registry, on a
1048 per user basis. The key is (in <emphasis>my</emphasis> registry)
1051 [eric\\Software\\Wine\\WineDbg]
1054 Those options can be read/written while inside
1055 <command>WineDbg</command>, as part of the debugger
1056 expressions. To refer to one of these options, its name must
1057 be prefixed by a <literal>$</literal> sign. For example,
1060 set $BreakAllThreadsStartup = 1
1063 sets the option <varname>BreakAllThreadsStartup</varname> to
1064 <literal>TRUE</literal>.
1067 All the options are read from the registry when
1068 <command>WineDbg</command> starts (if no corresponding value
1069 is found, a default value is used), and are written back to
1070 the registry when <command>WineDbg</command> exits (hence,
1071 all modifications to those options are automatically saved
1072 when <command>WineDbg</command> terminates).
1075 Here's the list of all options:
1079 <title>Controlling when the debugger is entered</title>
1083 <term><varname>BreakAllThreadsStartup</varname></term>
1086 Set to <literal>TRUE</literal> if at all threads
1087 start-up the debugger stops set to
1088 <literal>FALSE</literal> if only at the first thread
1089 startup of a given process the debugger stops.
1090 <literal>FALSE</literal> by default.
1095 <term><varname>BreakOnCritSectTimeOut</varname></term>
1098 Set to <literal>TRUE</literal> if the debugger stops
1099 when a critical section times out (5 minutes);
1100 <literal>TRUE</literal> by default.
1105 <term><varname>BreakOnAttach</varname></term>
1108 Set to <literal>TRUE</literal> if when
1109 <command>WineDbg</command> attaches to an existing
1110 process after an unhandled exception,
1111 <command>WineDbg</command> shall be entered on the
1112 first attach event. Since the attach event is
1113 meaningless in the context of an exception event
1114 (the next event which is the exception event is of
1115 course relevant), that option is likely to be
1116 <literal>FALSE</literal>.
1121 <term><varname>BreakOnFirstChance</varname></term>
1124 An exception can generate two debug events. The
1125 first one is passed to the debugger (known as a
1126 first chance) just after the exception. The debugger
1127 can then decides either to resume execution (see
1128 <command>WineDbg</command>'s <command>cont</command>
1129 command) or pass the exception up to the exception
1130 handler chain in the program (if it exists)
1131 (<command>WineDbg</command> implements this through the
1132 <command>pass</command> command). If none of the
1133 exception handlers takes care of the exception, the
1134 exception event is sent again to the debugger (known
1135 as last chance exception). You cannot pass on a last
1137 <varname>BreakOnFirstChance</varname> exception is
1138 <literal>TRUE</literal>, then winedbg is entered for
1139 both first and last chance execptions (to
1140 <literal>FALSE</literal>, it's only entered for last
1146 <term><varname>BreakOnDllLoad</varname></term>
1149 Set to <literal>TRUE</literal> if the debugger stops
1150 when a DLL is loaded into memory; when the debugger
1151 is invoked after a crash, the DLLs already mapped in
1152 memory will not trigger this break.
1153 <literal>FALSE</literal> by default.
1161 <title>Output handling</title>
1165 <term><varname>ConChannelMask</varname></term>
1168 Mask of active debugger output channels on console
1173 <term><varname>StdChannelMask</varname></term>
1176 Mask of active debugger output channels on <filename>stderr</filename>
1183 Those last 2 variables are jointly used in two generic ways:
1188 <para>default</para>
1190 ConChannelMask = DBG_CHN_MESG (1)
1194 In this case, all input/output goes into the
1195 debugger's console (either the standard unix console
1196 if winedbg is started from the command line, or a
1197 specific windowed-console if the debugger is started
1198 upon an exception in a running program. All debug
1199 messages <function>TRACE</function>,
1200 <function>WARN</function>... still goes to tty where
1206 To have all input/output go into the tty where Wine
1207 was started from (to be used in a X11-free
1212 StdChannelMask = DBG_CHN_MESG (1)
1219 <title>Context information</title>
1223 <term><varname>ThreadId</varname></term>
1225 <para>ID of the <varname>W-thread</varname> currently
1226 examined by the debugger</para>
1230 <term><varname>ProcessId</varname></term>
1232 <para>ID of the <varname>W-thread</varname> currently
1233 examined by the debugger</para>
1237 <term><registers></term>
1239 <para>All CPU registers are also available</para>
1245 The <varname>ThreadId</varname> and
1246 <varname>ProcessId</varname> variables can be handy to set
1247 conditional breakpoints on a given thread or process.
1254 <sect1 id="dbg-commands">
1255 <title>WineDbg Command Reference</title>
1261 abort aborts the debugger
1262 quit exits the debugger
1264 attach N attach to a W-process (N is its ID). IDs can be
1265 obtained using the walk process command
1266 detach detach from a W-process. WineDbg will exit (this may
1267 be changed later on)
1270 help prints some help on the commands
1271 help info prints some help on info commands
1274 mode 16 switch to 16 bit mode
1275 mode 32 switch to 32 bit mode
1280 <title>Flow control</title>
1283 cont continue execution until next breakpoint or exception.
1284 pass pass the exception event up to the filter chain.
1285 step continue execution until next C line of code (enters
1287 next continue execution until next C line of code (doesn't
1288 enter function call)
1289 stepi execute next assembly instruction (enters function
1291 nexti execute next assembly instruction (doesn't enter
1293 finish do nexti commands until current function is exited
1296 cont, step, next, stepi, nexti can be postfixed by a
1297 number (N), meaning that the command must be executed N
1303 <title>Breakpoints, watch points</title>
1306 enable N enables (break|watch)point #N
1307 disable N disables (break|watch)point #N
1308 delete N deletes (break|watch)point #N
1309 cond N removes any a existing condition to (break|watch)point N
1310 cond N <expr> adds condition <expr> to (break|watch)point N. <expr>
1311 will be evaluated each time the breakpoint is hit. If
1312 the result is a zero value, the breakpoint isn't
1314 break * N adds a breakpoint at address N
1315 break <id> adds a breakpoint at the address of symbol <id>
1316 break <id> N adds a breakpoint at the address of symbol <id> (N ?)
1317 break N adds a breakpoint at line N of current source file
1318 break adds a breakpoint at current $pc address
1319 watch * N adds a watch command (on write) at address N (on 4 bytes)
1320 watch <id> adds a watch command (on write) at the address of
1322 info break lists all (break|watch)points (with state)
1325 When setting a breakpoint on an <id>, if several symbols with this
1326 <id> exist, the debugger will prompt for the symbol you want to use.
1327 Pick up the one you want from its number.
1330 Alternatively you can specify a DLL in the <id> (for example
1331 MYDLL.DLL.myFunc for function myFunc of
1332 <filename>G:\AnyPath\MyDll.dll)</filename>.
1335 You can use the symbol <emphasis>EntryPoint</emphasis> to stand for
1336 the entry point of the Dll.
1339 When setting a break/watch-point by <id>, if the symbol cannot be found (for example, the symbol is contained in a not yet loaded module), winedbg will
1340 recall the name of the symbol and will try to set the breakpoint each time a new module is loaded (until it succeeds).
1345 <title>Stack manipulation</title>
1348 bt print calling stack of current thread
1349 bt N print calling stack of thread of ID N (note: this
1350 doesn't change the position of the current frame as
1351 manipulated by the up & dn commands)
1352 up goes up one frame in current thread's stack
1353 up N goes up N frames in current thread's stack
1354 dn goes down one frame in current thread's stack
1355 dn N goes down N frames in current thread's stack
1356 frame N set N as the current frame for current thread's stack
1357 info local prints information on local variables for current
1363 <title>Directory & source file manipulation</title>
1367 dir <pathname>
1369 symbolfile <pathname> loads external symbol definition
1370 symbolfile <pathname> N loads external symbol definition
1371 (applying an offset of N to addresses)
1374 list lists 10 source lines from current position
1375 list - lists 10 source lines before current position
1376 list N lists 10 source lines from line N in current file
1377 list <path>:N lists 10 source lines from line N in file <path>
1378 list <id> lists 10 source lines of function <id>
1379 list * N lists 10 source lines from address N
1382 You can specify the end target (to change the 10 lines
1383 value) using the ','. For example:
1386 list 123, 234 lists source lines from line 123 up to line 234 in
1388 list foo.c:1,56 lists source lines from line 1 up to 56 in file foo.c
1393 <title>Displaying</title>
1396 A display is an expression that's evaluated and printed
1397 after the execution of any <command>WineDbg</command>
1401 display lists the active displays
1402 info display (same as above command)
1403 display <expr> adds a display for expression <expr>
1404 display /fmt <expr> adds a display for expression <expr>. Printing
1405 evaluated <expr> is done using the given format (see
1406 print command for more on formats)
1407 del display N deletes display #N
1408 undisplay N (same as del display)
1413 <title>Disassembly</title>
1416 disas disassemble from current position
1417 disas <expr> disassemble from address <expr>
1418 disas <expr>,<expr>disassembles code between addresses specified by
1419 the two <expr>
1424 <title>Information on Wine's internals</title>
1427 info class <id> prints information on Windows's class <id>
1428 walk class lists all Windows' class registered in Wine
1429 info share lists all the dynamic libraries loaded the debugged
1430 program (including .so files, NE and PE DLLs)
1431 info module <N> prints information on module of handle <N>
1432 walk module lists all modules loaded by debugged program
1433 info regs prints the value of CPU register
1434 info segment <N>prints information on segment <N>
1435 info segment lists all allocated segments
1436 info stack prints the values on top of the stack
1437 walk map lists all virtual mappings used by the debugged
1439 walk map <N> lists all virtual mappings used by the program of pid <N>
1440 info wnd <N> prints information of Window of handle <N>
1441 walk wnd lists all the window hierarchy starting from the
1443 walk wnd <N> lists all the window hierarchy starting from the
1444 window of handle <N>
1445 walk process lists all w-processes in Wine session
1446 walk thread lists all w-threads in Wine session
1447 walk exception lists the exception frames (starting from current
1453 <title>Memory (reading, writing, typing)</title>
1456 x <expr> examines memory at <expr> address
1457 x /fmt <expr> examines memory at <expr> address using format /fmt
1458 print <expr> prints the value of <expr> (possibly using its type)
1459 print /fmt <expr> prints the value of <expr> (possibly using its
1461 set <lval>=<expr> writes the value of <expr> in <lval>
1462 whatis <expr> prints the C type of expression <expr>
1465 <filename>/fmt</filename> is either <filename>/<letter></filename> or
1466 <filename>/<count><letter></filename> letter can be
1469 s => an ASCII string
1470 u => an Unicode UTF16 string
1471 i => instructions (disassemble)
1472 x => 32 bit unsigned hexadecimal integer
1473 d => 32 bit signed decimal integer
1474 w => 16 bit unsigned hexadecimal integer
1475 c => character (only printable 0x20-0x7f are actuallyprinted)
1476 b => 8 bit unsigned hexadecimal integer
1482 <title>Expressions</title>
1485 Expressions in Wine Debugger are mostly written in a C form. However, there
1486 are a few discrepancies:
1490 Identifiers can take a '.' in their names. This allow
1491 mainly to access symbols from different DLLs like
1492 <function>USER32.DLL.CreateWindowA</function>.
1497 The debugger will try to distinguish this writing with structure operations.
1498 Therefore, you can only use the previous writing in operations manipulating
1499 symbols ({break|watch}points, type information command...).
1506 <title>Debug channels</title>
1508 It is possible to turn on and off debug messages as you are debuging using
1512 set + warn win => turn on warn on 'win' channel
1513 set + win => turn on warn/fixme/err/trace on 'win' channel
1514 set - win => turn off warn/fixme/err/trace on 'win' channel
1515 set - fixme => turn off the 'fixme' class
1521 <sect1 id="dbg-others">
1522 <title>Other debuggers</title>
1525 <title>GDB mode</title>
1528 WineDbg can act as a remote monitor for GDB. This allows to
1529 use all the power of GDB, but while debugging wine and/or
1530 any Win32 application. To enable this mode, just add
1531 <parameter>--gdb</parameter> to winedbg command line. You'll
1532 end up on a GDB prompt. You'll have to use the GDB commands
1537 However, some limitation in GDB while debugging wine (see
1538 below) don't ppear in this mode:
1542 GDB will correctly present Win32 thread
1543 information and breakpoint behavior
1548 Moreover, it also provides support for the Dwarf II
1549 debug format (which became the default format (instead
1550 of stabs) in gcc 3.1).
1557 A few wine extensions available through the monitor command.
1559 monitor wnd lists all window in the Wine session
1560 monitor proc lists all processes in the Wine session
1561 monitor mem displays memory mapping of debugged process
1568 <title>Using other Unix debuggers</title>
1571 You can also use other debuggers (like
1572 <command>gdb</command>), but you must be aware of a few
1576 You need to attach the unix debugger to the correct unix
1577 process (representing the correct windows thread) (you can
1578 "guess" it from a <command>ps fax</command> for example:
1579 When running the emulator, usually the first two
1580 <varname>upids</varname> are for the Windows' application
1581 running the desktop, the first thread of the application is
1582 generally the third <varname>upid</varname>; when running a
1583 Winelib program, the first thread of the application is
1584 generally the first <varname>upid</varname>)
1588 Even if latest <command>gdb</command> implements the
1589 notion of threads, it won't work with Wine because the
1590 thread abstraction used for implementing Windows' thread
1591 is not 100% mapped onto the Linux POSIX threads
1592 implementation. It means that you'll have to spawn a
1593 different <command>gdb</command> session for each Windows'
1594 thread you wish to debug.
1598 <!-- *** Extra content spliced in from article by Andreas Mohr *** -->
1600 Following text written by &name-andreas-mohr; <email>&email-andreas-mohr;</email>
1603 Here's how to get info about the current execution status of a
1604 certain Wine process:
1607 Change into your Wine source dir and enter:
1613 Switch to another console and enter <command>ps ax | grep
1614 wine</command> to find all wine processes. Inside
1615 <command>gdb</command>, repeat for all Wine processes:
1618 (gdb) attach <userinput>PID</userinput>
1621 with <userinput>PID</userinput> being the process ID of one of
1622 the Wine processes. Use
1628 to get the backtrace of the current Wine process, i.e. the
1629 function call history. That way you can find out what the
1630 current process is doing right now. And then you can use
1640 (gdb) b <userinput>SomeFunction</userinput>
1649 to set a breakpoint at a certain function and continue up to
1650 that function. Finally you can enter
1656 to detach from the Wine process.
1658 <!-- *** End of xtra content *** -->
1662 <title>Using other Windows debuggers</title>
1665 You can use any Windows' debugging API compliant debugger
1666 with Wine. Some reports have been made of success with
1667 VisualStudio debugger (in remote mode, only the hub runs
1668 in Wine). GoVest fully runs in Wine.
1673 <title>Main differences between winedbg and regular Unix debuggers</title>
1674 <table><title>Debuggers comparison</title>
1675 <tgroup cols=2 align="left">
1678 <entry>WineDbg</entry><entry>gdb</entry>
1682 WineDbg debugs a Windows' process: the various
1683 threads will be handled by the same WineDbg session,
1684 and a breakpoint will be triggered for any thread of
1688 gdb debugs a Windows' thread: a separate gdb session
1689 is needed for each thread of a Windows' process and
1690 a breakpoint will be triggered only for the w-thread
1696 WineDbg supports debug information from stabs
1697 (standard Unix format) and Microsoft's C, CodeView,
1701 GDB supports debug information from stabs (standard
1702 Unix format) and Dwarf II.
1712 <sect1 id="dbg-limits">
1713 <title>Limitations</title>
1718 16 bit processes are not supported (but calls to 16 bit
1719 code in 32 bit applications are).
1724 Function call in expression is no longer supported
1731 <!-- Keep this comment at the end of the file
1734 sgml-parent-document:("wine-devel.sgml" "set" "book" "part" "chapter" "")