1 <chapter id="debugger">
2 <title>Debugging Wine</title>
5 <title>Introduction</title>
8 Written by &name-eric-pouech; <email>&email-eric-pouech;</email>
9 (Last updated: 9/15/2002)
12 (Extracted from <filename>wine/documentation/winedbg</filename>)
16 <title>Processes and threads: in underlying OS and in Windows</title>
19 Before going into the depths of debugging in Wine, here's
20 a small overview of process and thread handling in Wine.
21 It has to be clear that there are two different beasts:
22 processes/threads from the Unix point of view and
23 processes/threads from a Windows point of view.
26 Each Windows' thread is implemented as a Unix process (under
27 Linux using the <function>clone</function> syscall), meaning
28 that all threads of a same Windows' process share the same
36 <para><varname>W-process</varname> means a process in Windows' terminology</para>
39 <para><varname>U-process</varname> means a process in Unix' terminology</para>
42 <para><varname>W-thread</varname> means a thread in Windows' terminology</para>
46 A <varname>W-process</varname> is made of one or several
47 <varname>W-threads</varname>. Each
48 <varname>W-thread</varname> is mapped to one and only one
49 <varname>U-process</varname>. All
50 <varname>U-processes</varname> of a same
51 <varname>W-process</varname> share the same address space.
54 Each Unix process can be identified by two values:
58 <para>the Unix process id (<varname>upid</varname> in the following)</para>
61 <para>the Windows's thread id (<varname>tid</varname>)</para>
65 Each Windows' process has also a Windows' process id
66 (<varname>wpid</varname> in the following). It must be clear
67 that <varname>upid</varname> and <varname>wpid</varname> are
68 different and shall not be used instead of the other.
71 <varname>Wpid</varname> and <varname>tid</varname> are
72 defined (Windows) system wide. They must not be confused
73 with process or thread handles which, as any handle, is an
74 indirection to a system object (in this case process or
75 thread). A same process can have several different handles
76 on the same kernel object. The handles can be defined as
77 local (the values is only valid in a process), or system
78 wide (the same handle can be used by any
79 <varname>W-process</varname>).
84 <title>Wine, debugging and WineDbg</title>
87 When talking of debugging in Wine, there are at least two
92 <para>the Windows' debugging API.</para>
95 <para>the Wine integrated debugger, dubbed
96 <command>WineDbg</command>.</para>
100 Wine implements most of the Windows' debugging API (the
101 part in <filename>KERNEL32.DLL</filename>, not the one in
102 <filename>IMAGEHLP.DLL</filename>), and allows any program
103 (emulated or Winelib) using that API to debug a
104 <varname>W-process</varname>.
107 <command>WineDbg</command> is a Winelib application making
108 use of this API to allow debugging both any Wine or Winelib
109 applications as well as Wine itself (kernel and all DLLs).
115 <sect1 id="dbg-modes">
116 <title>WineDbg's modes of invocation</title>
119 <title>Starting a process</title>
122 Any application (either a Windows' native executable, or a
123 Winelib application) can be run through
124 <command>WineDbg</command>. Command line options and tricks
125 are the same as for wine:
129 winedbg "hl.exe -windowed"
134 <title>Attaching</title>
137 <command>WineDbg</command> can also be launched without any
138 command line argument: <command>WineDbg</command> is started
139 without any attached process. You can get a list of running
140 <varname>W-processes</varname> (and their
141 <varname>wpid</varname>'s) using the <command>walk
142 process</command> command, and then, with the
143 <command>attach</command> command, pick up the
144 <varname>wpid</varname> of the <varname>W-process</varname>
145 you want to debug. This is (for now) a neat feature for the
150 <para>you can debug an already started application</para>
155 <sect2 id="dbg-on-exception">
156 <title id="dbg-exception-title">On exceptions</title>
159 When something goes wrong, Windows tracks this as an
160 exception. Exceptions exist for segmentation violation,
161 stack overflow, division by zero...
164 When an exception occurs, Wine checks if the <varname>W-process</varname> is
165 debugged. If so, the exception event is sent to the
166 debugger, which takes care of it: end of the story. This
167 mechanism is part of the standard Windows' debugging API.
170 If the <varname>W-process</varname> is not debugged, Wine
171 tries to launch a debugger. This debugger (normally
172 <command>WineDbg</command>, see III Configuration for more
173 details), at startup, attaches to the
174 <varname>W-process</varname> which generated the exception
175 event. In this case, you are able to look at the causes of
176 the exception, and either fix the causes (and continue
177 further the execution) or dig deeper to understand what went
181 If <command>WineDbg</command> is the standard debugger, the
182 <command>pass</command> and <command>cont</command> commands
183 are the two ways to let the process go further for the
184 handling of the exception event.
187 To be more precise on the way Wine (and Windows) generates
188 exception events, when a fault occurs (segmentation
189 violation, stack overflow...), the event is first sent to
190 the debugger (this is known as a first chance exception).
191 The debugger can give two answers:
196 <term>continue:</term>
199 the debugger had the ability to correct what's
200 generated the exception, and is now able to continue
209 the debugger couldn't correct the cause of the
210 first chance exception. Wine will now try to walk
211 the list of exception handlers to see if one of them
212 can handle the exception. If no exception handler is
213 found, the exception is sent once again to the
214 debugger to indicate the failure of the exception
222 since some of Wine's code uses exceptions and
223 <function>try/catch</function> blocks to provide some
224 functionality, <command>WineDbg</command> can be entered
225 in such cases with segv exceptions. This happens, for
226 example, with <function>IsBadReadPtr</function> function.
227 In that case, the <command>pass</command> command shall be
228 used, to let the handling of the exception to be done by
229 the <function>catch</function> block in
230 <function>IsBadReadPtr</function>.
235 <sect2 id="interrupt">
236 <title>Interrupting</title>
239 You can stop the debugger while it's running by hitting
240 Ctrl-C in its window. This will stop the debugged process,
241 and let you manipulate the current context
246 <title>Quitting</title>
249 Wine supports the new XP APIs, allowing for a debugger to
250 detach from a program being debugged (see
251 <command>detach</command> command). Unfortunately, as the
252 debugger cannot, for now, neither clear its internal
253 information, nor restart a new process, the debugger, after
254 detaching itself, cannot do much except being quited.
260 <sect1 id="wine-debugger">
261 <title>Using the Wine Debugger</title>
264 Written by &name-marcus-meissner; <email>&email-marcus-meissner;</email>,
268 (Extracted from <filename>wine/documentation/debugging</filename>)
272 This file describes where to start debugging Wine. If at any
273 point you get stuck and want to ask for help, please read the
274 file <filename>documentation/bugreports</filename> for
275 information on how to write useful bug reports.
279 <title>Crashes</title>
282 These usually show up like this:
285 |Unexpected Windows program segfault - opcode = 8b
286 |Segmentation fault in Windows program 1b7:c41.
287 |Loading symbols from ELF file /root/wine/wine...
288 |....more Loading symbols from ...
291 | CS:01b7 SS:016f DS:0287 ES:0000
292 | IP:0c41 SP:878a BP:8796 FLAGS:0246
293 | AX:811e BX:0000 CX:0000 DX:0000 SI:0001 DI:ffff
295 |0x016f:0x878a: 0001 016f ffed 0000 0000 0287 890b 1e5b
296 |0x016f:0x879a: 01b7 0001 000d 1050 08b7 016f 0001 000d
297 |0x016f:0x87aa: 000a 0003 0004 0000 0007 0007 0190 0000
300 |0050: sel=0287 base=40211d30 limit=0b93f (bytes) 16-bit rw-
302 |0 0x01b7:0x0c41 (PXSRV_FONGETFACENAME+0x7c)
303 |1 0x01b7:0x1e5b (PXSRV_FONPUTCATFONT+0x2cd)
305 |3 0x01b7:0x0768 (PXSRV_FONINITFONTS+0x81)
306 |4 0x014f:0x03ed (PDOXWIN_@SQLCURCB$Q6CBTYPEULN8CBSCTYPE+0x1b1)
309 |0x01b7:0x0c41 (PXSRV_FONGETFACENAME+0x7c): movw %es:0x38(%bx),%dx
312 Steps to debug a crash. You may stop at any step, but please
313 report the bug and provide as much of the information
314 gathered to the newsgroup or the relevant developer as
321 Get the reason for the crash. This is usually an access to
322 an invalid selector, an access to an out of range address
323 in a valid selector, popping a segmentregister from the
324 stack or the like. When reporting a crash, report this
325 <emphasis>whole</emphasis> crashdump even if it doesn't
329 (In this case it is access to an invalid selector, for
330 <systemitem>%es</systemitem> is <literal>0000</literal>, as
331 seen in the register dump).
336 Determine the cause of the crash. Since this is usually
337 a primary/secondary reaction to a failed or misbehaving
338 Wine function, rerun Wine with <parameter>-debugmsg
339 +relay</parameter> added to the commandline. This will
340 generate quite a lot of output, but usually the reason is
341 located in the last call(s). Those lines usually look like
345 |Call KERNEL.90: LSTRLEN(0227:0692 "text") ret=01e7:2ce7 ds=0227
346 ^^^^^^^^^ ^ ^^^^^^^^^ ^^^^^^ ^^^^^^^^^ ^^^^
347 | | | | | |Datasegment
348 | | | | |Return address
349 | | | |textual parameter
351 | | |Argument(s). This one is a win16 segmented pointer.
353 |The module, the function is called in. In this case it is KERNEL.
355 |Ret KERNEL.90: LSTRLEN() retval=0x0004 ret=01e7:2ce7 ds=0227
357 |Returnvalue is 16 bit and has the value 4.
362 If you have found a misbehaving function, try to find out
363 why it misbehaves. Find the function in the source code.
364 Try to make sense of the arguments passed. Usually there is
365 a <function>TRACE(<channel>,"(...)\n");</function> at
366 the beginning of the function. Rerun wine with
367 <parameter>-debugmsg +xyz,+relay</parameter> added to the
373 Additional information on how to debug using the internal
374 debugger can be found in
375 <filename>debugger/README</filename>.
380 If this information isn't clear enough or if you want to
381 know more about what's happening in the function itself,
382 try running wine with <parameter>-debugmsg
383 +all</parameter>, which dumps ALL included debug
389 If even that isn't enough, add more debug output for
390 yourself into the functions you find relevant. See
391 <filename>documentation/debug-msgs</filename>. You might
392 also try to run the program in <command>gdb</command>
393 instead of using the WINE-debugger. If you do that, use
394 <parameter>handle SIGSEGV nostop noprint</parameter> to
395 disable the handling of seg faults inside
396 <command>gdb</command> (needed for Win16). If you don't use
397 the <parameter>--desktop</parameter> or
398 <parameter>--managed</parameter> option, start the WINE
399 process with <parameter>--sync</parameter>, or chances are
400 good to get X into an unusable state.
405 You can also set a breakpoint for that function. Start wine
406 with the <parameter>--debug</parameter> option added to the
407 commandline. After loading the executable wine will enter
408 the internal debugger. Use <parameter>break
409 KERNEL_LSTRLEN</parameter> (replace by function you want
410 to debug, CASE IS RELEVANT) to set a breakpoint. Then use
411 <command>continue</command> to start normal
412 program-execution. Wine will stop if it reaches the
413 breakpoint. If the program isn't yet at the crashing call
414 of that function, use <command>continue</command> again
415 until you are about to enter that function. You may now
416 proceed with single-stepping the function until you reach
417 the point of crash. Use the other debugger commands to
418 print registers and the like.
425 <title>Program hangs, nothing happens</title>
428 Switch to UNIX shell, get the process-ID using <command>ps -a |
429 grep wine</command>, and do a <command>kill -HUP
430 <pid></command> (without the < and >). Wine will
431 then enter its internal debugger and you can proceed as
432 explained above. Also, you can use
433 <parameter>--debug</parameter> switch and then you can get into
434 internal debugger by pressing
435 <keycombo><keycap>Ctrl</keycap><keycap>C</keycap></keycombo> in
436 the terminal where you run Wine.
441 <title>Program reports an error with a Messagebox</title>
444 Sometimes programs are reporting failure using more or
445 less nondescript messageboxes. We can debug this using the
446 same method as Crashes, but there is one problem... For
447 setting up a message box the program also calls Wine
448 producing huge chunks of debug code.
451 Since the failure happens usually directly before setting up
452 the Messagebox you can start wine with
453 <parameter>--debug</parameter> added to the commandline, set a
454 breakpoint at <function>MessageBoxA</function> (called by win16
455 and win32 programs) and proceed with
456 <command>continue</command>. With <parameter>--debugmsg
457 +all</parameter> Wine will now stop directly before setting
458 up the Messagebox. Proceed as explained above.
461 You can also run wine using <command>wine -debugmsg +relay
462 program.exe 2>&1 | less -i</command> and in
463 <command>less</command> search for <quote>MessageBox</quote>.
468 <title>Disassembling programs:</title>
471 You may also try to disassemble the offending program to
472 check for undocumented features and/or use of them.
475 The best, freely available, disassembler for Win16 programs is
476 <application>Windows Codeback</application>, archivename
477 <filename>wcbxxx.zip</filename>, which usually can be found in
478 the <filename>Cica-Mirror</filename> subdirectory on the WINE
479 ftpsites. (See <filename>ANNOUNCE</filename>).
482 Disassembling win32 programs is possible using
483 <application>Windows Disassembler 32</application>, archivename
484 something like <filename>w32dsm87.zip</filename> (or similar)
485 on <systemitem class="systemname">ftp.winsite.com</systemitem>
486 and mirrors. The shareware version does not allow saving of
487 disassembly listings. You can also use the newer (and in the
488 full version better) <application>Interactive
489 Disassembler</application> (IDA) from the ftp sites mentioned
490 at the end of the document. Understanding disassembled code is
491 mostly a question of exercise.
494 Most code out there uses standard C function entries (for it
495 is usually written in C). Win16 function entries usually
502 retf XXXX <--------- XXXX is number of bytes of arguments
505 This is a <function>FAR</function> function with no local
506 storage. The arguments usually start at
507 <literal>[bp+6]</literal> with increasing offsets. Note, that
508 <literal>[bp+6]</literal> belongs to the
509 <emphasis>rightmost</emphasis> argument, for exported win16
510 functions use the PASCAL calling convention. So, if we use
511 <function>strcmp(a,b)</function> with <parameter>a</parameter>
512 and <parameter>b</parameter> both 32 bit variables
513 <parameter>b</parameter> would be at <literal>[bp+6]</literal>
514 and <parameter>a</parameter> at <literal>[bp+10]</literal>.
517 Most functions make also use of local storage in the stackframe:
521 ... function code ...
526 This does mostly the same as above, but also adds
527 <literal>0x86</literal> bytes of stackstorage, which is
528 accessed using <literal>[bp-xx]</literal>. Before calling a
529 function, arguments are pushed on the stack using something
533 push word ptr [bp-02] <- will be at [bp+8]
534 push di <- will be at [bp+6]
538 Here first the selector and then the offset to the passed
544 <title>Sample debugging session:</title>
547 Let's debug the infamous Word <filename>SHARE.EXE</filename>
551 |marcus@jet $ wine winword.exe
552 | +---------------------------------------------+
553 | | ! You must leave Windows and load SHARE.EXE|
554 | | before starting Word. |
555 | +---------------------------------------------+
558 |marcus@jet $ wine winword.exe -debugmsg +relay -debug
559 |CallTo32(wndproc=0x40065bc0,hwnd=000001ac,msg=00000081,wp=00000000,lp=00000000)
560 |Win16 task 'winword': Breakpoint 1 at 0x01d7:0x001a
561 |CallTo16(func=0127:0070,ds=0927)
562 |Call WPROCS.24: TASK_RESCHEDULE() ret=00b7:1456 ds=0927
563 |Ret WPROCS.24: TASK_RESCHEDULE() retval=0x8672 ret=00b7:1456 ds=0927
564 |CallTo16(func=01d7:001a,ds=0927)
565 | AX=0000 BX=3cb4 CX=1f40 DX=0000 SI=0000 DI=0927 BP=0000 ES=11f7
566 |Loading symbols: /home/marcus/wine/wine...
567 |Stopped on breakpoint 1 at 0x01d7:0x001a
569 |Wine-dbg>break MessageBoxA <---- Set Breakpoint
570 |Breakpoint 2 at 0x40189100 (MessageBoxA [msgbox.c:190])
571 |Wine-dbg>c <---- Continue
572 |Call KERNEL.91: INITTASK() ret=0157:0022 ds=08a7
573 | AX=0000 BX=3cb4 CX=1f40 DX=0000 SI=0000 DI=08a7 ES=11d7 EFL=00000286
574 |CallTo16(func=090f:085c,ds=0dcf,0x0000,0x0000,0x0000,0x0000,0x0800,0x0000,0x0000,0x0dcf)
575 |... <----- Much debugoutput
576 |Call KERNEL.136: GETDRIVETYPE(0x0000) ret=060f:097b ds=0927
578 |Ret KERNEL.136: GETDRIVETYPE() retval=0x0002 ret=060f:097b ds=0927
579 ^^^^^^ DRIVE_REMOVEABLE
580 (It is a floppy diskdrive.)
582 |Call KERNEL.136: GETDRIVETYPE(0x0001) ret=060f:097b ds=0927
584 |Ret KERNEL.136: GETDRIVETYPE() retval=0x0000 ret=060f:097b ds=0927
585 ^^^^^^ DRIVE_CANNOTDETERMINE
586 (I don't have drive B: assigned)
588 |Call KERNEL.136: GETDRIVETYPE(0x0002) ret=060f:097b ds=0927
590 |Ret KERNEL.136: GETDRIVETYPE() retval=0x0003 ret=060f:097b ds=0927
592 (specified as a harddisk)
594 |Call KERNEL.97: GETTEMPFILENAME(0x00c3,0x09278364"doc",0x0000,0927:8248) ret=060f:09b1 ds=0927
595 ^^^^^^ ^^^^^ ^^^^^^^^^
596 | | |buffer for fname
597 | |temporary name ~docXXXX.tmp
598 |Force use of Drive C:.
600 |Warning: GetTempFileName returns 'C:~doc9281.tmp', which doesn't seem to be writeable.
601 |Please check your configuration file if this generates a failure.
604 Whoops, it even detects that something is wrong!
607 |Ret KERNEL.97: GETTEMPFILENAME() retval=0x9281 ret=060f:09b1 ds=0927
608 ^^^^^^ Temporary storage ID
610 |Call KERNEL.74: OPENFILE(0x09278248"C:~doc9281.tmp",0927:82da,0x1012) ret=060f:09d8 ds=0927
611 ^^^^^^^^^^^^^^^^ ^^^^^^^^^ ^^^^^^^
612 |filename |OFSTRUCT |open mode:
614 OF_CREATE|OF_SHARE_EXCLUSIVE|OF_READWRITE
617 This fails, since my <medialabel>C:</medialabel> drive is in
618 this case mounted readonly.
621 |Ret KERNEL.74: OPENFILE() retval=0xffff ret=060f:09d8 ds=0927
622 ^^^^^^ HFILE_ERROR16, yes, it failed.
624 |Call USER.1: MESSAGEBOX(0x0000,0x09278376"Sie mussen Windows verlassen und SHARE.EXE laden bevor Sie Word starten.",0x00000000,0x1030) ret=060f:084f ds=0927
630 |Stopped on breakpoint 2 at 0x40189100 (MessageBoxA [msgbox.c:190])
631 |190 { <- the sourceline
636 The code seems to find a writeable harddisk and tries to create
637 a file there. To work around this bug, you can define
638 <medialabel>C:</medialabel> as a networkdrive, which is ignored
644 <title>Debugging Tips</title>
647 Here are some useful debugging tips, added by Andreas Mohr:
653 If you have a program crashing at such an early loader phase that you can't
654 use the Wine debugger normally, but Wine already executes the program's
655 start code, then you may use a special trick. You should do a
657 wine --debugmsg +relay program
659 to get a listing of the functions the program calls in its start function.
662 wine --debug winfile.exe
666 This way, you get into <command>Wine-dbg</command>. Now you
667 can set a breakpoint on any function the program calls in
668 the start function and just type <userinput>c</userinput>
669 to bypass the eventual calls of Winfile to this function
670 until you are finally at the place where this function gets
671 called by the crashing start function. Now you can proceed
672 with your debugging as usual.
677 If you try to run a program and it quits after showing an error messagebox,
678 the problem can usually be identified in the return value of one of the
679 functions executed before <function>MessageBox()</function>.
680 That's why you should re-run the program with e.g.
682 wine --debugmsg +relay <program name> &>relmsg
684 Then do a <command>more relmsg</command> and search for the
685 last occurrence of a call to the string "MESSAGEBOX". This is a line like
687 Call USER.1: MESSAGEBOX(0x0000,0x01ff1246 "Runtime error 219 at 0004:1056.",0x00000000,0x1010) ret=01f7:2160 ds=01ff
689 In my example the lines before the call to
690 <function>MessageBox()</function> look like that:
692 Call KERNEL.96: FREELIBRARY(0x0347) ret=01cf:1033 ds=01ff
693 CallTo16(func=033f:0072,ds=01ff,0x0000)
694 Ret KERNEL.96: FREELIBRARY() retval=0x0001 ret=01cf:1033 ds=01ff
695 Call KERNEL.96: FREELIBRARY(0x036f) ret=01cf:1043 ds=01ff
696 CallTo16(func=0367:0072,ds=01ff,0x0000)
697 Ret KERNEL.96: FREELIBRARY() retval=0x0001 ret=01cf:1043 ds=01ff
698 Call KERNEL.96: FREELIBRARY(0x031f) ret=01cf:105c ds=01ff
699 CallTo16(func=0317:0072,ds=01ff,0x0000)
700 Ret KERNEL.96: FREELIBRARY() retval=0x0001 ret=01cf:105c ds=01ff
701 Call USER.171: WINHELP(0x02ac,0x01ff05b4 "COMET.HLP",0x0002,0x00000000) ret=01cf:1070 ds=01ff
702 CallTo16(func=0117:0080,ds=01ff)
703 Call WPROCS.24: TASK_RESCHEDULE() ret=00a7:0a2d ds=002b
704 Ret WPROCS.24: TASK_RESCHEDULE() retval=0x0000 ret=00a7:0a2d ds=002b
705 Ret USER.171: WINHELP() retval=0x0001 ret=01cf:1070 ds=01ff
706 Call KERNEL.96: FREELIBRARY(0x01be) ret=01df:3e29 ds=01ff
707 Ret KERNEL.96: FREELIBRARY() retval=0x0000 ret=01df:3e29 ds=01ff
708 Call KERNEL.52: FREEPROCINSTANCE(0x02cf00ba) ret=01f7:1460 ds=01ff
709 Ret KERNEL.52: FREEPROCINSTANCE() retval=0x0001 ret=01f7:1460 ds=01ff
710 Call USER.1: MESSAGEBOX(0x0000,0x01ff1246 "Runtime error 219 at 0004:1056.",0x00000000,0x1010) ret=01f7:2160 ds=01ff
714 I think that the call to <function>MessageBox()</function>
715 in this example is <emphasis>not</emphasis> caused by a
716 wrong result value of some previously executed function
717 (it's happening quite often like that), but instead the
718 messagebox complains about a runtime error at
719 <literal>0x0004:0x1056</literal>.
722 As the segment value of the address is only
723 <literal>4</literal>, I think that that is only an internal
724 program value. But the offset address reveals something
725 quite interesting: Offset <literal>1056</literal> is
726 <emphasis>very</emphasis> close to the return address of
727 <function>FREELIBRARY()</function>:
729 Call KERNEL.96: FREELIBRARY(0x031f) ret=01cf:105c ds=01ff
734 Provided that segment <literal>0x0004</literal> is indeed segment
735 <literal>0x1cf</literal>, we now we can use IDA (available at
736 <ulink url="ftp://ftp.uni-koeln.de/pc/msdos/programming/assembler/ida35bx.zip">
737 ftp://ftp.uni-koeln.de/pc/msdos/programming/assembler/ida35bx.zip</ulink>) to
738 disassemble the part that caused the error. We just have to find the address of
739 the call to <function>FreeLibrary()</function>. Some lines before that the
740 runtime error occurred. But be careful! In some cases you don't have to
741 disassemble the main program, but instead some DLL called by it in order to find
742 the correct place where the runtime error occurred. That can be determined by
743 finding the origin of the segment value (in this case <literal>0x1cf</literal>).
748 If you have created a relay file of some crashing
749 program and want to set a breakpoint at a certain
750 location which is not yet available as the program loads
751 the breakpoint's segment during execution, you may set a
752 breakpoint to <function>GetVersion16/32</function> as
753 those functions are called very often.
756 Then do a <userinput>c</userinput> until you are able to
757 set this breakpoint without error message.
762 Some useful programs:
767 <application>IDA</application>:
769 <ulink url="ftp://ftp.uni-koeln.de/pc/msdos/programming/assembler/ida35bx.zip">
770 ftp://ftp.uni-koeln.de/pc/msdos/programming/assembler/ida35bx.zip</ulink>
775 <emphasis>Very</emphasis> good DOS disassembler ! It's badly needed
776 for debugging Wine sometimes.
782 <application>XRAY</application>:
784 <ulink url="ftp://ftp.th-darmstadt.de/pub/machines/ms-dos/SimTel/msdos/asmutil/xray15.zip">
785 ftp://ftp.th-darmstadt.de/pub/machines/ms-dos/SimTel/msdos/asmutil/xray15.zip</ulink>
790 Traces DOS calls (Int 21h, DPMI, ...). Use it with
791 Windows to correct file management problems etc.
797 <application>pedump</application>:
799 <ulink url="http://oak.oakland.edu/pub/simtelnet/win95/prog/pedump.zip">
800 http://oak.oakland.edu/pub/simtelnet/win95/prog/pedump.zip</ulink>
805 Dumps the imports and exports of a PE (Portable
812 <application>winedump</application>:
816 Dumps the imports and exports of a PE (Portable
817 Executable) DLL (included in wine tree).
827 <title>Some basic debugger usages:</title>
830 After starting your program with
833 wine -debug myprog.exe
836 the program loads and you get a prompt at the program
837 starting point. Then you can set breakpoints:
840 b RoutineName (by outine name) OR
841 b *0x812575 (by address)
844 Then you hit <command>c</command> (continue) to run the
845 program. It stops at the breakpoint. You can type
848 step (to step one line) OR
849 stepi (to step one machine instruction at a time;
850 here, it helps to know the basic 386
852 info reg (to see registers)
853 info stack (to see hex values in the stack)
854 info local (to see local variables)
855 list <line number> (to list source code)
856 x <variable name> (to examine a variable; only works if code
857 is not compiled with optimization)
858 x 0x4269978 (to examine a memory location)
863 By hitting <keycap>Enter</keycap>, you repeat the last
870 <sect1 id="memory-addresses">
871 <title>Useful memory addresses</title>
873 Written by &name-andreas-mohr; <email>&email-andreas-mohr;</email>
876 Wine uses several different kinds of memory addresses.
881 Win32/"normal" Wine addresses/Linux: linear addresses.
885 Linear addresses can be everything from 0x0 up to
886 0xffffffff. In Wine on Linux they are often around
887 e.g. 0x08000000, 0x00400000 (std. Win32 program load
888 address), 0x40000000. Every Win32 process has its own
889 private 4GB address space (that is, from 0x0 up to
896 Win16 "enhanced mode": segmented addresses.
900 These are the "normal" Win16 addresses, called SEGPTR.
901 They have a segment:offset notation, e.g. 0x01d7:0x0012.
902 The segment part usually is a "selector", which *always*
903 has the lowest 3 bits set. Some sample selectors are
904 0x1f7, 0x16f, 0x8f. If these bits are set except for
905 the lowest bit, as e.g. with 0x1f6,xi then it might be a
906 handle to global memory. Just set the lowest bit to get
907 the selector in these cases. A selector kind of
908 "points" to a certain linear (see above) base address.
909 It has more or less three important attributes: segment
910 base address, segment limit, segment access rights.
916 Selector 0x1f7 (0x40320000, 0x0000ffff, r-x) So 0x1f7
917 has a base address of 0x40320000, the segment's last
918 address is 0x4032ffff (limit 0xffff), and it's readable
919 and executable. So an address of 0x1f7:0x2300 would be
920 the linear address of 0x40322300.
926 DOS/Win16 "standard mode"
930 They, too, have a segment:offset notation. But they are
931 completely different from "normal" Win16 addresses, as
932 they just represent at most 1MB of memory: The segment
933 part can be anything from 0 to 0xffff, and it's the same
934 with the offset part.
937 Now the strange thing is the calculation that's behind
938 these addresses: Just calculate segment*16 + offset in
939 order to get a "linear DOS" address. So
940 e.g. 0x0f04:0x3628 results in 0xf040 + 0x3628 = 0x12668.
941 And the highest address you can get is 0xfffff (1MB), of
942 course. In Wine, this "linear DOS" address of 0x12668
943 has to be added to the linear base address of the
944 corresponding DOS memory allocated for dosmod in order
945 to get the true linear address of a DOS seg:offs
946 address. And make sure that you're doing this in the
947 correct process with the correct linear address space,
955 <sect1 id="dbg-config">
956 <title>Configuration</title>
959 <title>Registry configuration</title>
962 The Windows' debugging API uses a registry entry to know
963 which debugger to invoke when an unhandled exception occurs
964 (see <link endterm="dbg-exception-title"
965 linkend="dbg-on-exception"></link> for some details). Two
969 "MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug"
972 Determine the behavior:
976 <term>Debugger:</term>
979 this is the command line used to launch the debugger
980 (it uses two <function>printf</function> formats
981 (<literal>%ld</literal>) to pass context dependent
982 information to the debugger). You should put here a
983 complete path to your debugger
984 (<command>WineDbg</command> can of course be used, but
985 any other Windows' debugging API aware debugger will
987 The path to the debugger you chose to use must be reachable
988 via a DOS drive in the Wine config file !
996 if this value is zero, a message box will ask the
997 user if he/she wishes to launch the debugger when an
998 unhandled exception occurs. Otherwise, the debugger
999 is automatically started.
1006 A regular Wine registry looks like:
1009 [MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug] 957636538
1010 "Auto"=dword:00000001
1011 "Debugger"="winedbg --debugmsg -all %ld %ld"
1015 <title>Note 1</title>
1017 creating this key is mandatory. Not doing so will not
1018 fire the debugger when an exception occurs.
1022 <title>Note 2</title>
1024 <command>wineinstall</command> (available in Wine source)
1025 sets up this correctly.
1026 However, due to some limitation of the registry installed,
1027 if a previous Wine installation exists, it's safer to
1031 [MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AeDebug]
1034 key before running again <command>wineinstall</command> to
1035 regenerate this key.
1041 <title>WineDbg configuration</title>
1044 <command>WineDbg</command> can be configured through a number
1045 of options. Those options are stored in the registry, on a
1046 per user basis. The key is (in <emphasis>my</emphasis> registry)
1049 [eric\\Software\\Wine\\WineDbg]
1052 Those options can be read/written while inside
1053 <command>WineDbg</command>, as part of the debugger
1054 expressions. To refer to one of these options, its name must
1055 be prefixed by a <literal>$</literal> sign. For example,
1058 set $BreakAllThreadsStartup = 1
1061 sets the option <varname>BreakAllThreadsStartup</varname> to
1062 <literal>TRUE</literal>.
1065 All the options are read from the registry when
1066 <command>WineDbg</command> starts (if no corresponding value
1067 is found, a default value is used), and are written back to
1068 the registry when <command>WineDbg</command> exits (hence,
1069 all modifications to those options are automatically saved
1070 when <command>WineDbg</command> terminates).
1073 Here's the list of all options:
1077 <title>Controlling when the debugger is entered</title>
1081 <term><varname>BreakAllThreadsStartup</varname></term>
1084 Set to <literal>TRUE</literal> if at all threads
1085 start-up the debugger stops set to
1086 <literal>FALSE</literal> if only at the first thread
1087 startup of a given process the debugger stops.
1088 <literal>FALSE</literal> by default.
1093 <term><varname>BreakOnCritSectTimeOut</varname></term>
1096 Set to <literal>TRUE</literal> if the debugger stops
1097 when a critical section times out (5 minutes);
1098 <literal>TRUE</literal> by default.
1103 <term><varname>BreakOnAttach</varname></term>
1106 Set to <literal>TRUE</literal> if when
1107 <command>WineDbg</command> attaches to an existing
1108 process after an unhandled exception,
1109 <command>WineDbg</command> shall be entered on the
1110 first attach event. Since the attach event is
1111 meaningless in the context of an exception event
1112 (the next event which is the exception event is of
1113 course relevant), that option is likely to be
1114 <literal>FALSE</literal>.
1119 <term><varname>BreakOnFirstChance</varname></term>
1122 An exception can generate two debug events. The
1123 first one is passed to the debugger (known as a
1124 first chance) just after the exception. The debugger
1125 can then decides either to resume execution (see
1126 <command>WineDbg</command>'s <command>cont</command>
1127 command) or pass the exception up to the exception
1128 handler chain in the program (if it exists)
1129 (<command>WineDbg</command> implements this through the
1130 <command>pass</command> command). If none of the
1131 exception handlers takes care of the exception, the
1132 exception event is sent again to the debugger (known
1133 as last chance exception). You cannot pass on a last
1135 <varname>BreakOnFirstChance</varname> exception is
1136 <literal>TRUE</literal>, then winedbg is entered for
1137 both first and last chance execptions (to
1138 <literal>FALSE</literal>, it's only entered for last
1144 <term><varname>BreakOnDllLoad</varname></term>
1147 Set to <literal>TRUE</literal> if the debugger stops
1148 when a DLL is loaded into memory; when the debugger
1149 is invoked after a crash, the DLLs already mapped in
1150 memory will not trigger this break.
1151 <literal>FALSE</literal> by default.
1159 <title>Output handling</title>
1163 <term><varname>ConChannelMask</varname></term>
1166 Mask of active debugger output channels on console
1171 <term><varname>StdChannelMask</varname></term>
1174 Mask of active debugger output channels on <filename>stderr</filename>
1179 <term><varname>UseXTerm</varname></term>
1182 Set to <literal>TRUE</literal> if the debugger uses
1183 its own <command>xterm</command> window for console
1184 input/output. Set to <literal>FALSE</literal> if
1185 the debugger uses the current Unix console for
1193 Those last 3 variables are jointly used in two generic ways:
1198 <para>default</para>
1200 ConChannelMask = DBG_CHN_MESG (1)
1205 In this case, all input/output goes into a specific
1206 <command>xterm</command> window (but all debug
1207 messages <function>TRACE</function>,
1208 <function>WARN</function>... still goes to tty where
1214 to have all input/output go into the tty where Wine
1215 was started from (to be used in a X11-free
1220 StdChannelMask = DBG_CHN_MESG (1)
1226 Those variables also allow, for example for debugging
1230 ConChannelMask = 0xfff
1231 StdChannelMask = 0xfff
1235 This allows to redirect all <function>WineDbg</function>
1236 output to both tty Wine was started from, and
1237 <command>xterm</command> debugging window. If Wine (or
1238 <command>WineDbg</command>) was started with a redirection
1239 of <filename>stdout</filename> and/or
1240 <filename>stderr</filename> to a file (with for
1241 example >& shell redirect command), you'll get in that
1242 file both outputs. It may be interesting to look in the
1243 relay trace for specific values which the process segv'ed
1249 <title>Context information</title>
1253 <term><varname>ThreadId</varname></term>
1255 <para>ID of the <varname>W-thread</varname> currently
1256 examined by the debugger</para>
1260 <term><varname>ProcessId</varname></term>
1262 <para>ID of the <varname>W-thread</varname> currently
1263 examined by the debugger</para>
1267 <term><registers></term>
1269 <para>All CPU registers are also available</para>
1275 The <varname>ThreadId</varname> and
1276 <varname>ProcessId</varname> variables can be handy to set
1277 conditional breakpoints on a given thread or process.
1284 <sect1 id="dbg-commands">
1285 <title>WineDbg Command Reference</title>
1291 abort aborts the debugger
1292 quit exits the debugger
1294 attach N attach to a W-process (N is its ID). IDs can be
1295 obtained using the walk process command
1296 detach detach from a W-process. WineDbg will exit (this may
1297 be changed later on)
1300 help prints some help on the commands
1301 help info prints some help on info commands
1304 mode 16 switch to 16 bit mode
1305 mode 32 switch to 32 bit mode
1310 <title>Flow control</title>
1313 cont continue execution until next breakpoint or exception.
1314 pass pass the exception event up to the filter chain.
1315 step continue execution until next C line of code (enters
1317 next continue execution until next C line of code (doesn't
1318 enter function call)
1319 stepi execute next assembly instruction (enters function
1321 nexti execute next assembly instruction (doesn't enter
1323 finish do nexti commands until current function is exited
1326 cont, step, next, stepi, nexti can be postfixed by a
1327 number (N), meaning that the command must be executed N
1333 <title>Breakpoints, watch points</title>
1336 enable N enables (break|watch)point #N
1337 disable N disables (break|watch)point #N
1338 delete N deletes (break|watch)point #N
1339 cond N removes any a existing condition to (break|watch)point N
1340 cond N <expr> adds condition <expr> to (break|watch)point N. <expr>
1341 will be evaluated each time the breakpoint is hit. If
1342 the result is a zero value, the breakpoint isn't
1344 break * N adds a breakpoint at address N
1345 break <id> adds a breakpoint at the address of symbol <id>
1346 break <id> N adds a breakpoint at the address of symbol <id> (N ?)
1347 break N adds a breakpoint at line N of current source file
1348 break adds a breakpoint at current $pc address
1349 watch * N adds a watch command (on write) at address N (on 4 bytes)
1350 watch <id> adds a watch command (on write) at the address of
1352 info break lists all (break|watch)points (with state)
1355 When setting a breakpoint on an <id>, if several symbols with this
1356 <id> exist, the debugger will prompt for the symbol you want to use.
1357 Pick up the one you want from its number.
1360 Alternatively you can specify a DLL in the <id> (for example
1361 MYDLL.DLL.myFunc for function myFunc of
1362 <filename>G:\AnyPath\MyDll.dll)</filename>.
1365 You can use the symbol <emphasis>EntryPoint</emphasis> to stand for
1366 the entry point of the Dll.
1369 When setting a break/watch-point by <id>, if the symbol cannot be found (for example, the symbol is contained in a not yet loaded module), winedbg will
1370 recall the name of the symbol and will try to set the breakpoint each time a new module is loaded (until it succeeds).
1375 <title>Stack manipulation</title>
1378 bt print calling stack of current thread
1379 bt N print calling stack of thread of ID N (note: this
1380 doesn't change the position of the current frame as
1381 manipulated by the up & dn commands)
1382 up goes up one frame in current thread's stack
1383 up N goes up N frames in current thread's stack
1384 dn goes down one frame in current thread's stack
1385 dn N goes down N frames in current thread's stack
1386 frame N set N as the current frame for current thread's stack
1387 info local prints information on local variables for current
1393 <title>Directory & source file manipulation</title>
1397 dir <pathname>
1399 symbolfile <pathname> loads external symbol definition
1400 symbolfile <pathname> N loads external symbol definition
1401 (applying an offset of N to addresses)
1404 list lists 10 source lines from current position
1405 list - lists 10 source lines before current position
1406 list N lists 10 source lines from line N in current file
1407 list <path>:N lists 10 source lines from line N in file <path>
1408 list <id> lists 10 source lines of function <id>
1409 list * N lists 10 source lines from address N
1412 You can specify the end target (to change the 10 lines
1413 value) using the ','. For example:
1416 list 123, 234 lists source lines from line 123 up to line 234 in
1418 list foo.c:1,56 lists source lines from line 1 up to 56 in file foo.c
1423 <title>Displaying</title>
1426 A display is an expression that's evaluated and printed
1427 after the execution of any <command>WineDbg</command>
1431 display lists the active displays
1432 info display (same as above command)
1433 display <expr> adds a display for expression <expr>
1434 display /fmt <expr> adds a display for expression <expr>. Printing
1435 evaluated <expr> is done using the given format (see
1436 print command for more on formats)
1437 del display N deletes display #N
1438 undisplay N (same as del display)
1443 <title>Disassembly</title>
1446 disas disassemble from current position
1447 disas <expr> disassemble from address <expr>
1448 disas <expr>,<expr>disassembles code between addresses specified by
1449 the two <expr>
1454 <title>Information on Wine's internals</title>
1457 info class <id> prints information on Windows's class <id>
1458 walk class lists all Windows' class registered in Wine
1459 info share lists all the dynamic libraries loaded the debugged
1460 program (including .so files, NE and PE DLLs)
1461 info module N prints information on module of handle N
1462 walk module lists all modules loaded by debugged program
1463 info queue N prints information on Wine's queue N
1464 walk queue lists all queues allocated in Wine
1465 info regs prints the value of CPU register
1466 info segment N prints information on segment N
1467 info segment lists all allocated segments
1468 info stack prints the values on top of the stack
1469 info map lists all virtual mappings used by the debugged
1471 info wnd N prints information of Window of handle N
1472 walk wnd lists all the window hierarchy starting from the
1474 walk wnd N lists all the window hierarchy starting from the
1476 walk process lists all w-processes in Wine session
1477 walk thread lists all w-threads in Wine session
1478 walk modref (no longer avail)
1479 walk exception lists the exception frames (starting from current
1485 <title>Memory (reading, writing, typing)</title>
1488 x <expr> examines memory at <expr> address
1489 x /fmt <expr> examines memory at <expr> address using format /fmt
1490 print <expr> prints the value of <expr> (possibly using its type)
1491 print /fmt <expr> prints the value of <expr> (possibly using its
1493 set <lval>=<expr> writes the value of <expr> in <lval>
1494 whatis <expr> prints the C type of expression <expr>
1497 <filename>/fmt</filename> is either <filename>/<letter></filename> or
1498 <filename>/<count><letter></filename> letter can be
1501 s => an ASCII string
1502 u => an Unicode UTF16 string
1503 i => instructions (disassemble)
1504 x => 32 bit unsigned hexadecimal integer
1505 d => 32 bit signed decimal integer
1506 w => 16 bit unsigned hexadecimal integer
1507 c => character (only printable 0x20-0x7f are actuallyprinted)
1508 b => 8 bit unsigned hexadecimal integer
1514 <title>Expressions</title>
1517 Expressions in Wine Debugger are mostly written in a C form. However, there
1518 are a few discrepancies:
1522 Identifiers can take a '.' in their names. This allow
1523 mainly to access symbols from different DLLs like
1524 <function>USER32.DLL.CreateWindowA</function>.
1529 The debugger will try to distinguish this writing with structure operations.
1530 Therefore, you can only use the previous writing in operations manipulating
1531 symbols ({break|watch}points, type information command...).
1538 <title>Debug channels</title>
1540 It is possible to turn on and off debug messages as you are debuging using
1544 set + warn win => turn on warn on 'win' channel
1545 set + win => turn on warn/fixme/err/trace on 'win' channel
1546 set - win => turn off warn/fixme/err/trace on 'win' channel
1547 set - fixme => turn off the 'fixme' class
1553 <sect1 id="dbg-others">
1554 <title>Other debuggers</title>
1557 <title>GDB mode</title>
1560 WineDbg can act as a remote monitor for GDB. This allows to
1561 use all the power of GDB, but while debugging wine and/or
1562 any Win32 application. To enable this mode, just add
1563 <parameter>--gdb</parameter> to winedbg command line. You'll
1564 end up on a GDB prompt. You'll have to use the GDB commands
1569 However, some limitation in GDB while debugging wine (see
1570 below) don't ppear in this mode:
1574 GDB will correctly present Win32 thread
1575 information and breakpoint behavior
1580 Moreover, it also provides support for the Dwarf II
1581 debug format (which became the default format (instead
1582 of stabs) in gcc 3.1).
1589 A few wine extensions available through the monitor command.
1591 monitor wnd lists all window in the Wine session
1592 monitor proc lists all processes in the Wine session
1593 monitor mem displays memory mapping of debugged process
1600 <title>Using other Unix debuggers</title>
1603 You can also use other debuggers (like
1604 <command>gdb</command>), but you must be aware of a few
1608 You need to attach the unix debugger to the correct unix
1609 process (representing the correct windows thread) (you can
1610 "guess" it from a <command>ps fax</command> for example:
1611 When running the emulator, usually the first two
1612 <varname>upids</varname> are for the Windows' application
1613 running the desktop, the first thread of the application is
1614 generally the third <varname>upid</varname>; when running a
1615 Winelib program, the first thread of the application is
1616 generally the first <varname>upid</varname>)
1620 Even if latest <command>gdb</command> implements the
1621 notion of threads, it won't work with Wine because the
1622 thread abstraction used for implementing Windows' thread
1623 is not 100% mapped onto the linux posix threads
1624 implementation. It means that you'll have to spawn a
1625 different <command>gdb</command> session for each Windows'
1626 thread you wish to debug.
1630 <!-- *** Extra content spliced in from article by Andreas Mohr *** -->
1632 Following text written by &name-andreas-mohr; <email>&email-andreas-mohr;</email>
1635 Here's how to get info about the current execution status of a
1636 certain Wine process:
1639 Change into your Wine source dir and enter:
1645 Switch to another console and enter <command>ps ax | grep
1646 wine</command> to find all wine processes. Inside
1647 <command>gdb</command>, repeat for all Wine processes:
1650 (gdb) attach <userinput>PID</userinput>
1653 with <userinput>PID</userinput> being the process ID of one of
1654 the Wine processes. Use
1660 to get the backtrace of the current Wine process, i.e. the
1661 function call history. That way you can find out what the
1662 current process is doing right now. And then you can use
1672 (gdb) b <userinput>SomeFunction</userinput>
1681 to set a breakpoint at a certain function and continue up to
1682 that function. Finally you can enter
1688 to detach from the Wine process.
1690 <!-- *** End of xtra content *** -->
1694 <title>Using other Windows debuggers</title>
1697 You can use any Windows' debugging API compliant debugger
1698 with Wine. Some reports have been made of success with
1699 VisualStudio debugger (in remote mode, only the hub runs
1700 in Wine). GoVest fully runs in Wine.
1705 <title>Main differences between winedbg and regular Unix debuggers</title>
1706 <table><title>Debuggers comparison</title>
1707 <tgroup cols=2 align="left">
1710 <entry>WineDbg</entry><entry>gdb</entry>
1714 WineDbg debugs a Windows' process: the various
1715 threads will be handled by the same WineDbg session,
1716 and a breakpoint will be triggered for any thread of
1720 gdb debugs a Windows' thread: a separate gdb session
1721 is needed for each thread of a Windows' process and
1722 a breakpoint will be triggered only for the w-thread
1728 WineDbg supports debug information from stabs
1729 (standard Unix format) and Microsoft's C, CodeView,
1733 GDB supports debug information from stabs (standard
1734 Unix format) and Dwarf II.
1744 <sect1 id="dbg-limits">
1745 <title>Limitations</title>
1750 16 bit processes are not supported (but calls to 16 bit
1751 code in 32 bit applications are).
1756 Function call in expression is no longer supported
1763 <!-- Keep this comment at the end of the file
1766 sgml-parent-document:("wine-doc.sgml" "set" "book" "part" "chapter" "")