1 <chapter id="debugger">
2 <title>Debugging Wine</title>
5 <title>Introduction</title>
8 Written by &name-eric-pouech; <email>&email-eric-pouech;</email>
9 (Last updated: 9/15/2002)
12 (Extracted from <filename>wine/documentation/winedbg</filename>)
16 <title>Processes and threads: in underlying OS and in Windows</title>
19 Before going into the depths of debugging in Wine, here's
20 a small overview of process and thread handling in Wine.
21 It has to be clear that there are two different beasts:
22 processes/threads from the Unix point of view and
23 processes/threads from a Windows point of view.
26 Each Windows' thread is implemented as a Unix process (under
27 Linux using the <function>clone</function> syscall), meaning
28 that all threads of a same Windows' process share the same
37 <varname>W-process</varname> means a process in Windows' terminology
42 <varname>U-process</varname> means a process in Unix' terminology
47 <varname>W-thread</varname> means a thread in Windows' terminology
52 A <varname>W-process</varname> is made of one or several
53 <varname>W-threads</varname>. Each
54 <varname>W-thread</varname> is mapped to one and only one
55 <varname>U-process</varname>. All
56 <varname>U-processes</varname> of a same
57 <varname>W-process</varname> share the same address space.
60 Each Unix process can be identified by two values:
65 the Unix process id (<varname>upid</varname> in the following)
70 the Windows's thread id (<varname>tid</varname>)
75 Each Windows' process has also a Windows' process id
76 (<varname>wpid</varname> in the following). It must be clear
77 that <varname>upid</varname> and <varname>wpid</varname> are
78 different and shall not be used instead of the other.
81 <varname>Wpid</varname> and <varname>tid</varname> are
82 defined (Windows) system wide. They must not be confused
83 with process or thread handles which, as any handle, is an
84 indirection to a system object (in this case process or
85 thread). A same process can have several different handles
86 on the same kernel object. The handles can be defined as
87 local (the values is only valid in a process), or system
88 wide (the same handle can be used by any
89 <varname>W-process</varname>).
94 <title>Wine, debugging and WineDbg</title>
97 When talking of debugging in Wine, there are at least two
103 the Windows' debugging API.
108 the Wine integrated debugger, dubbed <command>WineDbg</command>.
113 Wine implements most of the Windows' debugging API (the
114 part in <filename>KERNEL32.DLL</filename>, not the one in
115 <filename>IMAGEHLP.DLL</filename>), and allows any program
116 (emulated or Winelib) using that API to debug a
117 <varname>W-process</varname>.
120 <command>WineDbg</command> is a Winelib application making
121 use of this API to allow debugging both any Wine or Winelib
122 applications as well as Wine itself (kernel and all DLLs).
128 <sect1 id="dbg-modes">
129 <title>WineDbg's modes of invocation</title>
132 <title>Starting a process</title>
135 Any application (either a Windows' native executable, or a
136 Winelib application) can be run through
137 <command>WineDbg</command>. Command line options and tricks
138 are the same as for wine:
142 winedbg "hl.exe -windowed"
147 <title>Attaching</title>
150 <command>WineDbg</command> can also be launched without any
151 command line argument: <command>WineDbg</command> is started
152 without any attached process. You can get a list of running
153 <varname>W-processes</varname> (and their
154 <varname>wpid</varname>'s) using the <command>walk
155 process</command> command, and then, with the
156 <command>attach</command> command, pick up the
157 <varname>wpid</varname> of the <varname>W-process</varname>
158 you want to debug. This is (for now) a neat feature for the
164 you can debug an already started application
170 <sect2 id="dbg-on-exception">
171 <title id="dbg-exception-title">On exceptions</title>
174 When something goes wrong, Windows tracks this as an
175 exception. Exceptions exist for segmentation violation,
176 stack overflow, division by zero...
179 When an exception occurs, Wine checks if the <varname>W-process</varname> is
180 debugged. If so, the exception event is sent to the
181 debugger, which takes care of it: end of the story. This
182 mechanism is part of the standard Windows' debugging API.
185 If the <varname>W-process</varname> is not debugged, Wine
186 tries to launch a debugger. This debugger (normally
187 <command>WineDbg</command>, see III Configuration for more
188 details), at startup, attaches to the
189 <varname>W-process</varname> which generated the exception
190 event. In this case, you are able to look at the causes of
191 the exception, and either fix the causes (and continue
192 further the execution) or dig deeper to understand what went
196 If <command>WineDbg</command> is the standard debugger, the
197 <command>pass</command> and <command>cont</command> commands
198 are the two ways to let the process go further for the
199 handling of the exception event.
202 To be more precise on the way Wine (and Windows) generates
203 exception events, when a fault occurs (segmentation
204 violation, stack overflow...), the event is first sent to
205 the debugger (this is known as a first chance exception).
206 The debugger can give two answers:
211 <term>continue:</term>
214 the debugger had the ability to correct what's
215 generated the exception, and is now able to continue
224 the debugger couldn't correct the cause of the
225 first chance exception. Wine will now try to walk
226 the list of exception handlers to see if one of them
227 can handle the exception. If no exception handler is
228 found, the exception is sent once again to the
229 debugger to indicate the failure of the exception
237 since some of Wine's code uses exceptions and
238 <function>try/catch</function> blocks to provide some
239 functionality, <command>WineDbg</command> can be entered
240 in such cases with segv exceptions. This happens, for
241 example, with <function>IsBadReadPtr</function> function.
242 In that case, the <command>pass</command> command shall be
243 used, to let the handling of the exception to be done by
244 the <function>catch</function> block in
245 <function>IsBadReadPtr</function>.
250 <sect2 id="interrupt">
251 <title>Interrupting</title>
254 You can stop the debugger while it's running by hitting
255 Ctrl-C in its window. This will stop the debugged process,
256 and let you manipulate the current context
261 <title>Quitting</title>
264 Wine supports the new XP APIs, allowing for a debugger to
265 detach from a program being debugged (see
266 <command>detach</command> command). Unfortunately, as the
267 debugger cannot, for now, neither clear its internal
268 information, nor restart a new process, the debugger, after
269 detaching itself, cannot do much except being quitted.
275 <sect1 id="wine-debugger">
276 <title>Using the Wine Debugger</title>
279 Written by &name-marcus-meissner; <email>&email-marcus-meissner;</email>,
283 (Extracted from <filename>wine/documentation/debugging</filename>)
287 This file describes where to start debugging Wine. If at any
288 point you get stuck and want to ask for help, please read the
289 <emphasis>How to Report A Bug</emphasis> section of the
290 <emphasis>Wine Users Guide</emphasis> for information on how to write
295 <title>Crashes</title>
298 These usually show up like this:
301 |Unexpected Windows program segfault - opcode = 8b
302 |Segmentation fault in Windows program 1b7:c41.
303 |Loading symbols from ELF file /root/wine/wine...
304 |....more Loading symbols from ...
307 | CS:01b7 SS:016f DS:0287 ES:0000
308 | IP:0c41 SP:878a BP:8796 FLAGS:0246
309 | AX:811e BX:0000 CX:0000 DX:0000 SI:0001 DI:ffff
311 |0x016f:0x878a: 0001 016f ffed 0000 0000 0287 890b 1e5b
312 |0x016f:0x879a: 01b7 0001 000d 1050 08b7 016f 0001 000d
313 |0x016f:0x87aa: 000a 0003 0004 0000 0007 0007 0190 0000
316 |0050: sel=0287 base=40211d30 limit=0b93f (bytes) 16-bit rw-
318 |0 0x01b7:0x0c41 (PXSRV_FONGETFACENAME+0x7c)
319 |1 0x01b7:0x1e5b (PXSRV_FONPUTCATFONT+0x2cd)
321 |3 0x01b7:0x0768 (PXSRV_FONINITFONTS+0x81)
322 |4 0x014f:0x03ed (PDOXWIN_@SQLCURCB$Q6CBTYPEULN8CBSCTYPE+0x1b1)
325 |0x01b7:0x0c41 (PXSRV_FONGETFACENAME+0x7c): movw %es:0x38(%bx),%dx
328 Steps to debug a crash. You may stop at any step, but please
329 report the bug and provide as much of the information
330 gathered to the bug report as feasible.
336 Get the reason for the crash. This is usually an access to
337 an invalid selector, an access to an out of range address
338 in a valid selector, popping a segment register from the
339 stack or the like. When reporting a crash, report this
340 <emphasis>whole</emphasis> crashdump even if it doesn't
344 (In this case it is access to an invalid selector, for
345 <systemitem>%es</systemitem> is <literal>0000</literal>, as
346 seen in the register dump).
351 Determine the cause of the crash. Since this is usually
352 a primary/secondary reaction to a failed or misbehaving
353 Wine function, rerun Wine with <parameter>-debugmsg
354 +relay</parameter> added to the commandline. This will
355 generate quite a lot of output, but usually the reason is
356 located in the last call(s). Those lines usually look like
360 |Call KERNEL.90: LSTRLEN(0227:0692 "text") ret=01e7:2ce7 ds=0227
361 ^^^^^^^^^ ^ ^^^^^^^^^ ^^^^^^ ^^^^^^^^^ ^^^^
362 | | | | | |Datasegment
363 | | | | |Return address
364 | | | |textual parameter
366 | | |Argument(s). This one is a win16 segmented pointer.
368 |The module, the function is called in. In this case it is KERNEL.
370 |Ret KERNEL.90: LSTRLEN() retval=0x0004 ret=01e7:2ce7 ds=0227
372 |Returnvalue is 16 bit and has the value 4.
377 If you have found a misbehaving function, try to find out
378 why it misbehaves. Find the function in the source code.
379 Try to make sense of the arguments passed. Usually there is
380 a <function>WINE_DEFAULT_DEBUG_CHANNEL(<channel>);</function>
381 at the beginning of the file. Rerun wine with
382 <parameter>-debugmsg +xyz,+relay</parameter> added to the
386 Occasionally there are additional debug channels defined at the
387 beginning of the file in the form.
388 <function>WINE_DECLARE_DEBUG_CHANNEL(<channel>);</function>
389 If so the offending function may also uses one of these alternate
390 channels. Look through the the function for
391 <function>TRACE_(<channel>)(" ... /n");</function> and add any
392 additional channels to the commandline.
397 Additional information on how to debug using the internal
398 debugger can be found in
399 <filename>programs/winedbg/README</filename>.
404 If this information isn't clear enough or if you want to
405 know more about what's happening in the function itself,
406 try running wine with <parameter>-debugmsg
407 +all</parameter>, which dumps ALL included debug
413 If even that isn't enough, add more debug output for yourself
414 into the functions you find relevant. See The section on Debug
415 Logging in this guide for more information. You might
416 also try to run the program in <command>gdb</command>
417 instead of using the Wine debugger. If you do that, use
418 <parameter>handle SIGSEGV nostop noprint</parameter> to
419 disable the handling of seg faults inside
420 <command>gdb</command> (needed for Win16).
425 You can also set a breakpoint for that function. Start wine
426 useing <command>winedbg</command> instead of
427 <command>wine</command>. Once the debugger is is running enter
428 <command>break</command> <parameter>KERNEL_LSTRLEN</parameter>
429 (replace by function you want to debug, CASE IS RELEVANT)
430 to set a breakpoint. Then
431 use <command>continue</command> to start normal
432 program-execution. Wine will stop if it reaches the
433 breakpoint. If the program isn't yet at the crashing call
434 of that function, use <command>continue</command> again
435 until you are about to enter that function. You may now
436 proceed with single-stepping the function until you reach
437 the point of crash. Use the other debugger commands to
438 print registers and the like.
445 <title>Program hangs, nothing happens</title>
448 Start the program with <command>winedbg</command> instead of
449 <command>wine</command>. When the program locks up switch to the
450 winedbg terminal and press
451 <keycombo><keycap>Ctrl</keycap><keycap>C</keycap></keycombo>. this
452 will stop the program and let you debug the program as you would for
458 <title>Program reports an error with a Messagebox</title>
461 Sometimes programs are reporting failure using more or
462 less nondescript messageboxes. We can debug this using the
463 same method as Crashes, but there is one problem... For
464 setting up a message box the program also calls Wine
465 producing huge chunks of debug code.
468 Since the failure happens usually directly before setting up
469 the Messagebox you can start winedbg and set a
470 breakpoint at <function>MessageBoxA</function> (called by win16
471 and win32 programs) and proceed with
472 <command>continue</command>. With <parameter>--debugmsg
473 +all</parameter> Wine will now stop directly before setting
474 up the Messagebox. Proceed as explained above.
477 You can also run wine using <command>wine -debugmsg +relay
478 program.exe 2>&1 | less -i</command> and in
479 <command>less</command> search for <quote>MessageBox</quote>.
484 <title>Disassembling programs:</title>
487 You may also try to disassemble the offending program to
488 check for undocumented features and/or use of them.
491 The best, freely available, disassembler for Win16 programs is
492 <application>Windows Codeback</application>, archive name
493 <filename>wcbxxx.zip</filename>, which usually can be found in
494 the <filename>Cica-Mirror</filename> subdirectory on the Wine
495 ftp sites. (See <filename>ANNOUNCE</filename>).
498 Disassembling win32 programs is possible using
499 <application>Windows Disassembler 32</application>, archive name
500 something like <filename>w32dsm87.zip</filename> (or similar)
501 on <systemitem class="systemname">ftp.winsite.com</systemitem>
502 and mirrors. The shareware version does not allow saving of
503 disassembly listings. You can also use the newer (and in the
504 full version better) <application>Interactive
505 Disassembler</application> (IDA) from the ftp sites mentioned
506 at the end of the document. Understanding disassembled code is
507 mostly a question of exercise.
510 Most code out there uses standard C function entries (for it
511 is usually written in C). Win16 function entries usually
518 retf XXXX <--------- XXXX is number of bytes of arguments
521 This is a <function>FAR</function> function with no local
522 storage. The arguments usually start at
523 <literal>[bp+6]</literal> with increasing offsets. Note, that
524 <literal>[bp+6]</literal> belongs to the
525 <emphasis>rightmost</emphasis> argument, for exported win16
526 functions use the PASCAL calling convention. So, if we use
527 <function>strcmp(a,b)</function> with <parameter>a</parameter>
528 and <parameter>b</parameter> both 32 bit variables
529 <parameter>b</parameter> would be at <literal>[bp+6]</literal>
530 and <parameter>a</parameter> at <literal>[bp+10]</literal>.
533 Most functions make also use of local storage in the stackframe:
537 ... function code ...
542 This does mostly the same as above, but also adds
543 <literal>0x86</literal> bytes of stackstorage, which is
544 accessed using <literal>[bp-xx]</literal>. Before calling a
545 function, arguments are pushed on the stack using something
549 push word ptr [bp-02] <- will be at [bp+8]
550 push di <- will be at [bp+6]
554 Here first the selector and then the offset to the passed
560 <title>Sample debugging session:</title>
563 Let's debug the infamous Word <filename>SHARE.EXE</filename>
567 |marcus@jet $ wine winword.exe
568 | +---------------------------------------------+
569 | | ! You must leave Windows and load SHARE.EXE|
570 | | before starting Word. |
571 | +---------------------------------------------+
574 |marcus@jet $ wine winword.exe -debugmsg +relay -debug
575 |CallTo32(wndproc=0x40065bc0,hwnd=000001ac,msg=00000081,wp=00000000,lp=00000000)
576 |Win16 task 'winword': Breakpoint 1 at 0x01d7:0x001a
577 |CallTo16(func=0127:0070,ds=0927)
578 |Call WPROCS.24: TASK_RESCHEDULE() ret=00b7:1456 ds=0927
579 |Ret WPROCS.24: TASK_RESCHEDULE() retval=0x8672 ret=00b7:1456 ds=0927
580 |CallTo16(func=01d7:001a,ds=0927)
581 | AX=0000 BX=3cb4 CX=1f40 DX=0000 SI=0000 DI=0927 BP=0000 ES=11f7
582 |Loading symbols: /home/marcus/wine/wine...
583 |Stopped on breakpoint 1 at 0x01d7:0x001a
585 |Wine-dbg>break MessageBoxA <---- Set Breakpoint
586 |Breakpoint 2 at 0x40189100 (MessageBoxA [msgbox.c:190])
587 |Wine-dbg>c <---- Continue
588 |Call KERNEL.91: INITTASK() ret=0157:0022 ds=08a7
589 | AX=0000 BX=3cb4 CX=1f40 DX=0000 SI=0000 DI=08a7 ES=11d7 EFL=00000286
590 |CallTo16(func=090f:085c,ds=0dcf,0x0000,0x0000,0x0000,0x0000,0x0800,0x0000,0x0000,0x0dcf)
591 |... <----- Much debugoutput
592 |Call KERNEL.136: GETDRIVETYPE(0x0000) ret=060f:097b ds=0927
594 |Ret KERNEL.136: GETDRIVETYPE() retval=0x0002 ret=060f:097b ds=0927
595 ^^^^^^ DRIVE_REMOVEABLE
596 (It is a floppy diskdrive.)
598 |Call KERNEL.136: GETDRIVETYPE(0x0001) ret=060f:097b ds=0927
600 |Ret KERNEL.136: GETDRIVETYPE() retval=0x0000 ret=060f:097b ds=0927
601 ^^^^^^ DRIVE_CANNOTDETERMINE
602 (I don't have drive B: assigned)
604 |Call KERNEL.136: GETDRIVETYPE(0x0002) ret=060f:097b ds=0927
606 |Ret KERNEL.136: GETDRIVETYPE() retval=0x0003 ret=060f:097b ds=0927
608 (specified as a harddisk)
610 |Call KERNEL.97: GETTEMPFILENAME(0x00c3,0x09278364"doc",0x0000,0927:8248) ret=060f:09b1 ds=0927
611 ^^^^^^ ^^^^^ ^^^^^^^^^
612 | | |buffer for fname
613 | |temporary name ~docXXXX.tmp
614 |Force use of Drive C:.
616 |Warning: GetTempFileName returns 'C:~doc9281.tmp', which doesn't seem to be writeable.
617 |Please check your configuration file if this generates a failure.
620 Whoops, it even detects that something is wrong!
623 |Ret KERNEL.97: GETTEMPFILENAME() retval=0x9281 ret=060f:09b1 ds=0927
624 ^^^^^^ Temporary storage ID
626 |Call KERNEL.74: OPENFILE(0x09278248"C:~doc9281.tmp",0927:82da,0x1012) ret=060f:09d8 ds=0927
627 ^^^^^^^^^^^^^^^^ ^^^^^^^^^ ^^^^^^^
628 |filename |OFSTRUCT |open mode:
630 OF_CREATE|OF_SHARE_EXCLUSIVE|OF_READWRITE
633 This fails, since my <medialabel>C:</medialabel> drive is in
634 this case mounted readonly.
637 |Ret KERNEL.74: OPENFILE() retval=0xffff ret=060f:09d8 ds=0927
638 ^^^^^^ HFILE_ERROR16, yes, it failed.
640 |Call USER.1: MESSAGEBOX(0x0000,0x09278376"You must close Windows and load SHARE.EXE before you start Word.",0x00000000,0x1030) ret=060f:084f ds=0927
646 |Stopped on breakpoint 2 at 0x40189100 (MessageBoxA [msgbox.c:190])
647 |190 { <- the sourceline
652 The code seems to find a writeable harddisk and tries to create
653 a file there. To work around this bug, you can define
654 <medialabel>C:</medialabel> as a networkdrive, which is ignored
660 <title>Debugging Tips</title>
663 Here are some useful debugging tips, added by Andreas Mohr:
669 If you have a program crashing at such an early loader phase that you can't
670 use the Wine debugger normally, but Wine already executes the program's
671 start code, then you may use a special trick. You should do a
673 wine --debugmsg +relay program
675 to get a listing of the functions the program calls in its start function.
682 This way, you get into <command>winedbg</command>. Now you
683 can set a breakpoint on any function the program calls in
684 the start function and just type <userinput>c</userinput>
685 to bypass the eventual calls of Winfile to this function
686 until you are finally at the place where this function gets
687 called by the crashing start function. Now you can proceed
688 with your debugging as usual.
693 If you try to run a program and it quits after showing an error messagebox,
694 the problem can usually be identified in the return value of one of the
695 functions executed before <function>MessageBox()</function>.
696 That's why you should re-run the program with e.g.
698 wine --debugmsg +relay <program name> &>relmsg
700 Then do a <command>more relmsg</command> and search for the
701 last occurrence of a call to the string "MESSAGEBOX". This is a line like
703 Call USER.1: MESSAGEBOX(0x0000,0x01ff1246 "Runtime error 219 at 0004:1056.",0x00000000,0x1010) ret=01f7:2160 ds=01ff
705 In my example the lines before the call to
706 <function>MessageBox()</function> look like that:
708 Call KERNEL.96: FREELIBRARY(0x0347) ret=01cf:1033 ds=01ff
709 CallTo16(func=033f:0072,ds=01ff,0x0000)
710 Ret KERNEL.96: FREELIBRARY() retval=0x0001 ret=01cf:1033 ds=01ff
711 Call KERNEL.96: FREELIBRARY(0x036f) ret=01cf:1043 ds=01ff
712 CallTo16(func=0367:0072,ds=01ff,0x0000)
713 Ret KERNEL.96: FREELIBRARY() retval=0x0001 ret=01cf:1043 ds=01ff
714 Call KERNEL.96: FREELIBRARY(0x031f) ret=01cf:105c ds=01ff
715 CallTo16(func=0317:0072,ds=01ff,0x0000)
716 Ret KERNEL.96: FREELIBRARY() retval=0x0001 ret=01cf:105c ds=01ff
717 Call USER.171: WINHELP(0x02ac,0x01ff05b4 "COMET.HLP",0x0002,0x00000000) ret=01cf:1070 ds=01ff
718 CallTo16(func=0117:0080,ds=01ff)
719 Call WPROCS.24: TASK_RESCHEDULE() ret=00a7:0a2d ds=002b
720 Ret WPROCS.24: TASK_RESCHEDULE() retval=0x0000 ret=00a7:0a2d ds=002b
721 Ret USER.171: WINHELP() retval=0x0001 ret=01cf:1070 ds=01ff
722 Call KERNEL.96: FREELIBRARY(0x01be) ret=01df:3e29 ds=01ff
723 Ret KERNEL.96: FREELIBRARY() retval=0x0000 ret=01df:3e29 ds=01ff
724 Call KERNEL.52: FREEPROCINSTANCE(0x02cf00ba) ret=01f7:1460 ds=01ff
725 Ret KERNEL.52: FREEPROCINSTANCE() retval=0x0001 ret=01f7:1460 ds=01ff
726 Call USER.1: MESSAGEBOX(0x0000,0x01ff1246 "Runtime error 219 at 0004:1056.",0x00000000,0x1010) ret=01f7:2160 ds=01ff
730 I think that the call to <function>MessageBox()</function>
731 in this example is <emphasis>not</emphasis> caused by a
732 wrong result value of some previously executed function
733 (it's happening quite often like that), but instead the
734 messagebox complains about a runtime error at
735 <literal>0x0004:0x1056</literal>.
738 As the segment value of the address is only
739 <literal>4</literal>, I think that that is only an internal
740 program value. But the offset address reveals something
741 quite interesting: Offset <literal>1056</literal> is
742 <emphasis>very</emphasis> close to the return address of
743 <function>FREELIBRARY()</function>:
745 Call KERNEL.96: FREELIBRARY(0x031f) ret=01cf:105c ds=01ff
750 Provided that segment <literal>0x0004</literal> is indeed segment
751 <literal>0x1cf</literal>, we now we can use IDA (available at
752 <ulink url="http://www.filelibrary.com:8080/cgi-bin/freedownload/DOS/h/72/ida35bx.zip">
753 http://www.filelibrary.com:8080/cgi-bin/freedownload/DOS/h/72/ida35bx.zip</ulink>) to
754 disassemble the part that caused the error. We just have to find the address of
755 the call to <function>FreeLibrary()</function>. Some lines before that the
756 runtime error occurred. But be careful! In some cases you don't have to
757 disassemble the main program, but instead some DLL called by it in order to find
758 the correct place where the runtime error occurred. That can be determined by
759 finding the origin of the segment value (in this case <literal>0x1cf</literal>).
764 If you have created a relay file of some crashing
765 program and want to set a breakpoint at a certain
766 location which is not yet available as the program loads
767 the breakpoint's segment during execution, you may set a
768 breakpoint to <function>GetVersion16/32</function> as
769 those functions are called very often.
772 Then do a <userinput>c</userinput> until you are able to
773 set this breakpoint without error message.
778 Some useful programs:
783 <application>IDA</application>:
785 <ulink url="http://www.filelibrary.com:8080/cgi-bin/freedownload/DOS/h/72/ida35bx.zip">
786 http://www.filelibrary.com:8080/cgi-bin/freedownload/DOS/h/72/ida35bx.zip</ulink>
791 <emphasis>Very</emphasis> good DOS disassembler ! It's badly needed
792 for debugging Wine sometimes.
798 <application>XRAY</application>:
800 <ulink url="http://garbo.uwasa.fi/pub/pc/sysinfo/xray15.zip">
801 http://garbo.uwasa.fi/pub/pc/sysinfo/xray15.zip</ulink>
806 Traces DOS calls (Int 21h, DPMI, ...). Use it with
807 Windows to correct file management problems etc.
813 <application>pedump</application>:
815 <ulink url="ftp://ftp.simtel.net/pub/simtelnet/win95/prog/pedump.zip">
816 ftp://ftp.simtel.net/pub/simtelnet/win95/prog/pedump.zip</ulink>
821 Dumps the imports and exports of a PE (Portable
828 <application>winedump</application>:
832 Dumps the imports and exports of a PE (Portable
833 Executable) DLL (included in wine tree).
843 <title>Some basic debugger usages:</title>
846 After starting your program with
849 wine -debug myprog.exe
852 the program loads and you get a prompt at the program
853 starting point. Then you can set breakpoints:
856 b RoutineName (by outine name) OR
857 b *0x812575 (by address)
860 Then you hit <command>c</command> (continue) to run the
861 program. It stops at the breakpoint. You can type
864 step (to step one line) OR
865 stepi (to step one machine instruction at a time;
866 here, it helps to know the basic 386
868 info reg (to see registers)
869 info stack (to see hex values in the stack)
870 info local (to see local variables)
871 list <line number> (to list source code)
872 x <variable name> (to examine a variable; only works if code
873 is not compiled with optimization)
874 x 0x4269978 (to examine a memory location)
879 By hitting <keycap>Enter</keycap>, you repeat the last
886 <sect1 id="memory-addresses">
887 <title>Useful memory addresses</title>
889 Written by &name-andreas-mohr; <email>&email-andreas-mohr;</email>
892 Wine uses several different kinds of memory addresses.
897 Win32/"normal" Wine addresses/Linux: linear addresses.
901 Linear addresses can be everything from 0x0 up to
902 0xffffffff. In Wine on Linux they are often around
903 e.g. 0x08000000, 0x00400000 (std. Win32 program load
904 address), 0x40000000. Every Win32 process has its own
905 private 4GB address space (that is, from 0x0 up to
912 Win16 "enhanced mode": segmented addresses.
916 These are the "normal" Win16 addresses, called SEGPTR.
917 They have a segment:offset notation, e.g. 0x01d7:0x0012.
918 The segment part usually is a "selector", which
919 <emphasis>always</emphasis>
920 has the lowest 3 bits set. Some sample selectors are
921 0x1f7, 0x16f, 0x8f. If these bits are set except for
922 the lowest bit, as e.g. with 0x1f6,xi then it might be a
923 handle to global memory. Just set the lowest bit to get
924 the selector in these cases. A selector kind of
925 "points" to a certain linear (see above) base address.
926 It has more or less three important attributes: segment
927 base address, segment limit, segment access rights.
933 Selector 0x1f7 (0x40320000, 0x0000ffff, r-x) So 0x1f7
934 has a base address of 0x40320000, the segment's last
935 address is 0x4032ffff (limit 0xffff), and it's readable
936 and executable. So an address of 0x1f7:0x2300 would be
937 the linear address of 0x40322300.
943 DOS/Win16 "standard mode"
947 They, too, have a segment:offset notation. But they are
948 completely different from "normal" Win16 addresses, as
949 they just represent at most 1MB of memory: The segment
950 part can be anything from 0 to 0xffff, and it's the same
951 with the offset part.
954 Now the strange thing is the calculation that's behind
955 these addresses: Just calculate segment*16 + offset in
956 order to get a "linear DOS" address. So
957 e.g. 0x0f04:0x3628 results in 0xf040 + 0x3628 = 0x12668.
958 And the highest address you can get is 0xfffff (1MB), of
959 course. In Wine, this "linear DOS" address of 0x12668
960 has to be added to the linear base address of the
961 corresponding DOS memory allocated for dosmod in order
962 to get the true linear address of a DOS seg:offs
963 address. And make sure that you're doing this in the
964 correct process with the correct linear address space,
972 <sect1 id="dbg-config">
973 <title>Configuration</title>
976 <title>Registry configuration</title>
979 The Windows' debugging API uses a registry entry to know
980 which debugger to invoke when an unhandled exception occurs
981 (see <link endterm="dbg-exception-title"
982 linkend="dbg-on-exception"></link> for some details). Two
986 "MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug"
989 Determine the behavior:
993 <term>Debugger:</term>
996 this is the command line used to launch the debugger
997 (it uses two <function>printf</function> formats
998 (<literal>%ld</literal>) to pass context dependent
999 information to the debugger). You should put here a
1000 complete path to your debugger
1001 (<command>WineDbg</command> can of course be used, but
1002 any other Windows' debugging API aware debugger will
1004 The path to the debugger you chose to use must be reachable
1005 via a DOS drive in the Wine config file !
1013 if this value is zero, a message box will ask the
1014 user if he/she wishes to launch the debugger when an
1015 unhandled exception occurs. Otherwise, the debugger
1016 is automatically started.
1023 A regular Wine registry looks like:
1026 [MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug] 957636538
1027 "Auto"=dword:00000001
1028 "Debugger"="winedbg --debugmsg -all %ld %ld"
1032 <title>Note 1</title>
1034 creating this key is mandatory. Not doing so will not
1035 fire the debugger when an exception occurs.
1039 <title>Note 2</title>
1041 <command>wineinstall</command> (available in Wine source)
1042 sets up this correctly.
1043 However, due to some limitation of the registry installed,
1044 if a previous Wine installation exists, it's safer to
1048 [MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug]
1051 key before running again <command>wineinstall</command> to
1052 regenerate this key.
1058 <title>WineDbg configuration</title>
1061 <command>WineDbg</command> can be configured through a number
1062 of options. Those options are stored in the registry, on a
1063 per user basis. The key is (in <emphasis>my</emphasis> registry)
1066 [eric\\Software\\Wine\\WineDbg]
1069 Those options can be read/written while inside
1070 <command>WineDbg</command>, as part of the debugger
1071 expressions. To refer to one of these options, its name must
1072 be prefixed by a <literal>$</literal> sign. For example,
1075 set $BreakAllThreadsStartup = 1
1078 sets the option <varname>BreakAllThreadsStartup</varname> to
1079 <literal>TRUE</literal>.
1082 All the options are read from the registry when
1083 <command>WineDbg</command> starts (if no corresponding value
1084 is found, a default value is used), and are written back to
1085 the registry when <command>WineDbg</command> exits (hence,
1086 all modifications to those options are automatically saved
1087 when <command>WineDbg</command> terminates).
1090 Here's the list of all options:
1094 <title>Controlling when the debugger is entered</title>
1098 <term><varname>BreakAllThreadsStartup</varname></term>
1101 Set to <literal>TRUE</literal> if at all threads
1102 start-up the debugger stops set to
1103 <literal>FALSE</literal> if only at the first thread
1104 startup of a given process the debugger stops.
1105 <literal>FALSE</literal> by default.
1110 <term><varname>BreakOnCritSectTimeOut</varname></term>
1113 Set to <literal>TRUE</literal> if the debugger stops
1114 when a critical section times out (5 minutes);
1115 <literal>TRUE</literal> by default.
1120 <term><varname>BreakOnAttach</varname></term>
1123 Set to <literal>TRUE</literal> if when
1124 <command>WineDbg</command> attaches to an existing
1125 process after an unhandled exception,
1126 <command>WineDbg</command> shall be entered on the
1127 first attach event. Since the attach event is
1128 meaningless in the context of an exception event
1129 (the next event which is the exception event is of
1130 course relevant), that option is likely to be
1131 <literal>FALSE</literal>.
1136 <term><varname>BreakOnFirstChance</varname></term>
1139 An exception can generate two debug events. The
1140 first one is passed to the debugger (known as a
1141 first chance) just after the exception. The debugger
1142 can then decides either to resume execution (see
1143 <command>WineDbg</command>'s <command>cont</command>
1144 command) or pass the exception up to the exception
1145 handler chain in the program (if it exists)
1146 (<command>WineDbg</command> implements this through the
1147 <command>pass</command> command). If none of the
1148 exception handlers takes care of the exception, the
1149 exception event is sent again to the debugger (known
1150 as last chance exception). You cannot pass on a last
1152 <varname>BreakOnFirstChance</varname> exception is
1153 <literal>TRUE</literal>, then winedbg is entered for
1154 both first and last chance execptions (to
1155 <literal>FALSE</literal>, it's only entered for last
1161 <term><varname>BreakOnDllLoad</varname></term>
1164 Set to <literal>TRUE</literal> if the debugger stops
1165 when a DLL is loaded into memory; when the debugger
1166 is invoked after a crash, the DLLs already mapped in
1167 memory will not trigger this break.
1168 <literal>FALSE</literal> by default.
1176 <title>Output handling</title>
1180 <term><varname>ConChannelMask</varname></term>
1183 Mask of active debugger output channels on console
1188 <term><varname>StdChannelMask</varname></term>
1191 Mask of active debugger output channels on <filename>stderr</filename>
1198 Those last 2 variables are jointly used in two generic ways:
1207 ConChannelMask = DBG_CHN_MESG (1)
1211 In this case, all input/output goes into the
1212 debugger's console (either the standard unix console
1213 if winedbg is started from the command line, or a
1214 specific windowed-console if the debugger is started
1215 upon an exception in a running program. All debug
1216 messages <function>TRACE</function>,
1217 <function>WARN</function>... still goes to tty where
1223 To have all input/output go into the tty where Wine
1224 was started from (to be used in a X11-free
1229 StdChannelMask = DBG_CHN_MESG (1)
1236 <title>Context information</title>
1240 <term><varname>ThreadId</varname></term>
1243 ID of the <varname>W-thread</varname> currently
1244 examined by the debugger
1249 <term><varname>ProcessId</varname></term>
1252 ID of the <varname>W-thread</varname> currently
1253 examined by the debugger
1258 <term><registers></term>
1261 All CPU registers are also available
1268 The <varname>ThreadId</varname> and
1269 <varname>ProcessId</varname> variables can be handy to set
1270 conditional breakpoints on a given thread or process.
1277 <sect1 id="dbg-commands">
1278 <title>WineDbg Command Reference</title>
1284 abort aborts the debugger
1285 quit exits the debugger
1287 attach N attach to a W-process (N is its ID). IDs can be
1288 obtained using the walk process command
1289 detach detach from a W-process. WineDbg will exit (this may
1290 be changed later on)
1293 help prints some help on the commands
1294 help info prints some help on info commands
1297 mode 16 switch to 16 bit mode
1298 mode 32 switch to 32 bit mode
1303 <title>Flow control</title>
1306 cont continue execution until next breakpoint or exception.
1307 pass pass the exception event up to the filter chain.
1308 step continue execution until next C line of code (enters
1310 next continue execution until next C line of code (doesn't
1311 enter function call)
1312 stepi execute next assembly instruction (enters function
1314 nexti execute next assembly instruction (doesn't enter
1316 finish do nexti commands until current function is exited
1319 cont, step, next, stepi, nexti can be postfixed by a
1320 number (N), meaning that the command must be executed N
1326 <title>Breakpoints, watch points</title>
1329 enable N enables (break|watch)point #N
1330 disable N disables (break|watch)point #N
1331 delete N deletes (break|watch)point #N
1332 cond N removes any a existing condition to (break|watch)point N
1333 cond N <expr> adds condition <expr> to (break|watch)point N. <expr>
1334 will be evaluated each time the breakpoint is hit. If
1335 the result is a zero value, the breakpoint isn't
1337 break * N adds a breakpoint at address N
1338 break <id> adds a breakpoint at the address of symbol <id>
1339 break <id> N adds a breakpoint at the address of symbol <id> (N ?)
1340 break N adds a breakpoint at line N of current source file
1341 break adds a breakpoint at current $pc address
1342 watch * N adds a watch command (on write) at address N (on 4 bytes)
1343 watch <id> adds a watch command (on write) at the address of
1345 info break lists all (break|watch)points (with state)
1348 When setting a breakpoint on an <id>, if several symbols with this
1349 <id> exist, the debugger will prompt for the symbol you want to use.
1350 Pick up the one you want from its number.
1353 Alternatively you can specify a DLL in the <id> (for example
1354 MYDLL.DLL.myFunc for function myFunc of
1355 <filename>G:\AnyPath\MyDll.dll)</filename>.
1358 You can use the symbol <emphasis>EntryPoint</emphasis> to stand for
1359 the entry point of the Dll.
1362 When setting a break/watch-point by <id>, if the symbol cannot be found (for example, the symbol is contained in a not yet loaded module), winedbg will
1363 recall the name of the symbol and will try to set the breakpoint each time a new module is loaded (until it succeeds).
1368 <title>Stack manipulation</title>
1371 bt print calling stack of current thread
1372 bt N print calling stack of thread of ID N (note: this
1373 doesn't change the position of the current frame as
1374 manipulated by the up & dn commands)
1375 up goes up one frame in current thread's stack
1376 up N goes up N frames in current thread's stack
1377 dn goes down one frame in current thread's stack
1378 dn N goes down N frames in current thread's stack
1379 frame N set N as the current frame for current thread's stack
1380 info local prints information on local variables for current
1386 <title>Directory & source file manipulation</title>
1390 dir <pathname>
1392 symbolfile <pathname> loads external symbol definition
1393 symbolfile <pathname> N loads external symbol definition
1394 (applying an offset of N to addresses)
1397 list lists 10 source lines from current position
1398 list - lists 10 source lines before current position
1399 list N lists 10 source lines from line N in current file
1400 list <path>:N lists 10 source lines from line N in file <path>
1401 list <id> lists 10 source lines of function <id>
1402 list * N lists 10 source lines from address N
1405 You can specify the end target (to change the 10 lines
1406 value) using the ','. For example:
1409 list 123, 234 lists source lines from line 123 up to line 234 in
1411 list foo.c:1,56 lists source lines from line 1 up to 56 in file foo.c
1416 <title>Displaying</title>
1419 A display is an expression that's evaluated and printed
1420 after the execution of any <command>WineDbg</command>
1424 display lists the active displays
1425 info display (same as above command)
1426 display <expr> adds a display for expression <expr>
1427 display /fmt <expr> adds a display for expression <expr>. Printing
1428 evaluated <expr> is done using the given format (see
1429 print command for more on formats)
1430 del display N deletes display #N
1431 undisplay N (same as del display)
1436 <title>Disassembly</title>
1439 disas disassemble from current position
1440 disas <expr> disassemble from address <expr>
1441 disas <expr>,<expr>disassembles code between addresses specified by
1442 the two <expr>
1447 <title>Information on Wine's internals</title>
1450 info class <id> prints information on Windows's class <id>
1451 walk class lists all Windows' class registered in Wine
1452 info share lists all the dynamic libraries loaded the debugged
1453 program (including .so files, NE and PE DLLs)
1454 info module <N> prints information on module of handle <N>
1455 walk module lists all modules loaded by debugged program
1456 info regs prints the value of CPU register
1457 info segment <N>prints information on segment <N>
1458 info segment lists all allocated segments
1459 info stack prints the values on top of the stack
1460 walk map lists all virtual mappings used by the debugged
1462 walk map <N> lists all virtual mappings used by the program of pid <N>
1463 info wnd <N> prints information of Window of handle <N>
1464 walk wnd lists all the window hierarchy starting from the
1466 walk wnd <N> lists all the window hierarchy starting from the
1467 window of handle <N>
1468 walk process lists all w-processes in Wine session
1469 walk thread lists all w-threads in Wine session
1470 walk exception lists the exception frames (starting from current
1476 <title>Memory (reading, writing, typing)</title>
1479 x <expr> examines memory at <expr> address
1480 x /fmt <expr> examines memory at <expr> address using format /fmt
1481 print <expr> prints the value of <expr> (possibly using its type)
1482 print /fmt <expr> prints the value of <expr> (possibly using its
1484 set <lval>=<expr> writes the value of <expr> in <lval>
1485 whatis <expr> prints the C type of expression <expr>
1488 <filename>/fmt</filename> is either <filename>/<letter></filename> or
1489 <filename>/<count><letter></filename> letter can be
1492 s => an ASCII string
1493 u => an Unicode UTF16 string
1494 i => instructions (disassemble)
1495 x => 32 bit unsigned hexadecimal integer
1496 d => 32 bit signed decimal integer
1497 w => 16 bit unsigned hexadecimal integer
1498 c => character (only printable 0x20-0x7f are actually printed)
1499 b => 8 bit unsigned hexadecimal integer
1505 <title>Expressions</title>
1508 Expressions in Wine Debugger are mostly written in a C form. However, there
1509 are a few discrepancies:
1513 Identifiers can take a '.' in their names. This allow
1514 mainly to access symbols from different DLLs like
1515 <function>USER32.DLL.CreateWindowA</function>.
1520 The debugger will try to distinguish this writing with structure operations.
1521 Therefore, you can only use the previous writing in operations manipulating
1522 symbols ({break|watch}points, type information command...).
1529 <title>Debug channels</title>
1531 It is possible to turn on and off debug messages as you are debugging using
1535 set + warn win => turn on warn on 'win' channel
1536 set + win => turn on warn/fixme/err/trace on 'win' channel
1537 set - win => turn off warn/fixme/err/trace on 'win' channel
1538 set - fixme => turn off the 'fixme' class
1544 <sect1 id="dbg-others">
1545 <title>Other debuggers</title>
1548 <title>GDB mode</title>
1551 WineDbg can act as a remote monitor for GDB. This allows to
1552 use all the power of GDB, but while debugging wine and/or
1553 any Win32 application. To enable this mode, just add
1554 <parameter>--gdb</parameter> to winedbg command line. You'll
1555 end up on a GDB prompt. You'll have to use the GDB commands
1560 However, some limitation in GDB while debugging wine (see
1561 below) don't appear in this mode:
1565 GDB will correctly present Win32 thread
1566 information and breakpoint behavior
1571 Moreover, it also provides support for the Dwarf II
1572 debug format (which became the default format (instead
1573 of stabs) in gcc 3.1).
1580 A few wine extensions available through the monitor command.
1582 monitor wnd lists all window in the Wine session
1583 monitor proc lists all processes in the Wine session
1584 monitor mem displays memory mapping of debugged process
1591 <title>Graphical frontends to gdb</title>
1594 This section will describe how you can debug wine using the
1595 GDB mode of winedbg and some graphical front ends to GDB for
1596 those of you who really like graphical debuggers.
1603 Use the following steps, in this order:
1607 Start the wine debugger with a command line
1610 winedbg -- --gdb --no-start <name_of_exe_to_debug.exe>
1621 In ddd, use the 'Open File' or 'Open Program' to
1622 point to the wine executable
1627 In the output of 1/, there's a line like
1629 target remote localhost:32878
1631 copy that line and paste into ddd command pane (the one with the (gdb)
1636 The program should now be loaded and up and running. If you want, you
1637 can also add in 1/ after the name of the exec all the needed
1645 Use the following steps, in this order:
1649 Start the wine debugger with a command line like:
1651 winedbg -- --gdb --no-start <name_of_exe_to_debug.exe>
1657 In the output of 1/, there's a line like
1659 target remote localhost:32878
1663 kdbg -r localhost:32878 wine
1665 localhost:32878 is not a fixed value, but has been printed in step
1666 1/. 'wine' should also be the full path to the wine executable.
1670 The program should now be loaded and up and running. If you want, you
1671 can also add in 1/ after the name of the exec all the needed
1678 <title>Using other Unix debuggers</title>
1681 You can also use other debuggers (like
1682 <command>gdb</command>), but you must be aware of a few
1686 You need to attach the unix debugger to the correct unix
1687 process (representing the correct windows thread) (you can
1688 "guess" it from a <command>ps fax</command> for example:
1689 When running the emulator, usually the first two
1690 <varname>upids</varname> are for the Windows' application
1691 running the desktop, the first thread of the application is
1692 generally the third <varname>upid</varname>; when running a
1693 Winelib program, the first thread of the application is
1694 generally the first <varname>upid</varname>)
1698 Even if latest <command>gdb</command> implements the
1699 notion of threads, it won't work with Wine because the
1700 thread abstraction used for implementing Windows' thread
1701 is not 100% mapped onto the Linux POSIX threads
1702 implementation. It means that you'll have to spawn a
1703 different <command>gdb</command> session for each Windows'
1704 thread you wish to debug.
1708 <!-- *** Extra content spliced in from article by Andreas Mohr *** -->
1710 Following text written by &name-andreas-mohr; <email>&email-andreas-mohr;</email>
1713 Here's how to get info about the current execution status of a
1714 certain Wine process:
1717 Change into your Wine source dir and enter:
1723 Switch to another console and enter <command>ps ax | grep
1724 wine</command> to find all wine processes. Inside
1725 <command>gdb</command>, repeat for all Wine processes:
1728 (gdb) attach <userinput>PID</userinput>
1731 with <userinput>PID</userinput> being the process ID of one of
1732 the Wine processes. Use
1738 to get the backtrace of the current Wine process, i.e. the
1739 function call history. That way you can find out what the
1740 current process is doing right now. And then you can use
1750 (gdb) b <userinput>SomeFunction</userinput>
1759 to set a breakpoint at a certain function and continue up to
1760 that function. Finally you can enter
1766 to detach from the Wine process.
1768 <!-- *** End of xtra content *** -->
1772 <title>Using other Windows debuggers</title>
1775 You can use any Windows' debugging API compliant debugger
1776 with Wine. Some reports have been made of success with
1777 VisualStudio debugger (in remote mode, only the hub runs
1778 in Wine). GoVest fully runs in Wine.
1783 <title>Main differences between winedbg and regular Unix debuggers</title>
1784 <table><title>Debuggers comparison</title>
1785 <tgroup cols=2 align="left">
1788 <entry>WineDbg</entry><entry>gdb</entry>
1792 WineDbg debugs a Windows' process: the various
1793 threads will be handled by the same WineDbg session,
1794 and a breakpoint will be triggered for any thread of
1798 gdb debugs a Windows' thread: a separate gdb session
1799 is needed for each thread of a Windows' process and
1800 a breakpoint will be triggered only for the w-thread
1806 WineDbg supports debug information from stabs
1807 (standard Unix format) and Microsoft's C, CodeView,
1811 GDB supports debug information from stabs (standard
1812 Unix format) and Dwarf II.
1822 <sect1 id="dbg-limits">
1823 <title>Limitations</title>
1828 16 bit processes are not supported (but calls to 16 bit
1829 code in 32 bit applications are).
1834 Function call in expression is no longer supported
1841 <!-- Keep this comment at the end of the file
1844 sgml-parent-document:("wine-devel.sgml" "set" "book" "part" "chapter" "")