cryptdlg: Add Swedish translation.
[wine.git] / programs / winedbg / tgt_active.c
blobeb253296534afd4a8d10911750c2cc2d7a44445e
1 /*
2 * Wine debugger - back-end for an active target
4 * Copyright 2000-2006 Eric Pouech
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
21 #include "config.h"
23 #include <stdlib.h>
24 #include <stdio.h>
25 #include <string.h>
26 #include <stdarg.h>
28 #include "debugger.h"
29 #include "psapi.h"
30 #include "resource.h"
31 #include "winternl.h"
32 #include "wine/debug.h"
33 #include "wine/exception.h"
34 #include "wine/unicode.h"
36 WINE_DEFAULT_DEBUG_CHANNEL(winedbg);
38 static char* dbg_last_cmd_line;
39 static struct be_process_io be_process_active_io;
41 static void dbg_init_current_process(void)
45 static void dbg_init_current_thread(void* start)
47 if (start)
49 if (list_count(&dbg_curr_process->threads) == 1 /* first thread ? */ &&
50 DBG_IVAR(BreakAllThreadsStartup))
52 ADDRESS64 addr;
54 break_set_xpoints(FALSE);
55 addr.Mode = AddrModeFlat;
56 addr.Offset = (DWORD_PTR)start;
57 break_add_break(&addr, TRUE, TRUE);
58 break_set_xpoints(TRUE);
63 static unsigned dbg_handle_debug_event(DEBUG_EVENT* de);
65 /******************************************************************
66 * dbg_attach_debuggee
68 * Sets the debuggee to <pid>
69 * cofe instructs winedbg what to do when first exception is received
70 * (break=FALSE, continue=TRUE)
71 * wfe is set to TRUE if dbg_attach_debuggee should also proceed with all debug events
72 * until the first exception is received (aka: attach to an already running process)
74 BOOL dbg_attach_debuggee(DWORD pid, BOOL cofe)
76 if (!(dbg_curr_process = dbg_add_process(&be_process_active_io, pid, 0))) return FALSE;
78 if (!DebugActiveProcess(pid))
80 dbg_printf("Can't attach process %04x: error %u\n", pid, GetLastError());
81 dbg_del_process(dbg_curr_process);
82 return FALSE;
84 dbg_curr_process->continue_on_first_exception = cofe;
86 SetEnvironmentVariableA("DBGHELP_NOLIVE", NULL);
88 dbg_curr_process->active_debuggee = TRUE;
89 return TRUE;
92 static unsigned dbg_fetch_context(void)
94 dbg_context.ContextFlags = CONTEXT_CONTROL
95 | CONTEXT_INTEGER
96 #ifdef CONTEXT_FLOATING_POINT
97 | CONTEXT_FLOATING_POINT
98 #endif
99 #ifdef CONTEXT_SEGMENTS
100 | CONTEXT_SEGMENTS
101 #endif
102 #ifdef CONTEXT_DEBUG_REGISTERS
103 | CONTEXT_DEBUG_REGISTERS
104 #endif
106 if (!GetThreadContext(dbg_curr_thread->handle, &dbg_context))
108 WINE_WARN("Can't get thread's context\n");
109 return FALSE;
111 return TRUE;
114 /***********************************************************************
115 * dbg_exception_prolog
117 * Examine exception and decide if interactive mode is entered(return TRUE)
118 * or exception is silently continued(return FALSE)
119 * is_debug means the exception is a breakpoint or single step exception
121 static unsigned dbg_exception_prolog(BOOL is_debug, BOOL first_chance, const EXCEPTION_RECORD* rec)
123 ADDRESS64 addr;
124 BOOL is_break;
125 char hexbuf[MAX_OFFSET_TO_STR_LEN];
127 memory_get_current_pc(&addr);
128 break_suspend_execution();
129 dbg_curr_thread->excpt_record = *rec;
130 dbg_curr_thread->in_exception = TRUE;
132 if (!is_debug)
134 switch (addr.Mode)
136 case AddrModeFlat:
137 dbg_printf(" in %d-bit code (%s)",
138 be_cpu->pointer_size * 8,
139 memory_offset_to_string(hexbuf, addr.Offset, 0));
140 break;
141 case AddrModeReal:
142 dbg_printf(" in vm86 code (%04x:%04x)", addr.Segment, (unsigned) addr.Offset);
143 break;
144 case AddrMode1616:
145 dbg_printf(" in 16-bit code (%04x:%04x)", addr.Segment, (unsigned) addr.Offset);
146 break;
147 case AddrMode1632:
148 dbg_printf(" in segmented 32-bit code (%04x:%08lx)", addr.Segment, (unsigned long) addr.Offset);
149 break;
150 default: dbg_printf(" bad address");
152 dbg_printf(".\n");
155 /* this will resynchronize builtin dbghelp's internal ELF module list */
156 SymLoadModule(dbg_curr_process->handle, 0, 0, 0, 0, 0);
158 if (is_debug) break_adjust_pc(&addr, rec->ExceptionCode, first_chance, &is_break);
160 * Do a quiet backtrace so that we have an idea of what the situation
161 * is WRT the source files.
163 stack_fetch_frames(&dbg_context);
165 if (is_debug && !is_break && break_should_continue(&addr, rec->ExceptionCode))
166 return FALSE;
168 if (addr.Mode != dbg_curr_thread->addr_mode)
170 const char* name = NULL;
172 switch (addr.Mode)
174 case AddrMode1616: name = "16 bit"; break;
175 case AddrMode1632: name = "segmented 32 bit"; break;
176 case AddrModeReal: name = "vm86"; break;
177 case AddrModeFlat: name = be_cpu->pointer_size == 4 ? "32 bit" : "64 bit"; break;
179 dbg_printf("In %s mode.\n", name);
180 dbg_curr_thread->addr_mode = addr.Mode;
182 display_print();
184 if (!is_debug)
186 /* This is a real crash, dump some info */
187 be_cpu->print_context(dbg_curr_thread->handle, &dbg_context, 0);
188 stack_info(-1);
189 be_cpu->print_segment_info(dbg_curr_thread->handle, &dbg_context);
190 stack_backtrace(dbg_curr_tid);
192 else
194 static char* last_name;
195 static char* last_file;
197 char buffer[sizeof(SYMBOL_INFO) + 256];
198 SYMBOL_INFO* si = (SYMBOL_INFO*)buffer;
199 void* lin = memory_to_linear_addr(&addr);
200 DWORD64 disp64;
201 IMAGEHLP_LINE64 il;
202 DWORD disp;
204 si->SizeOfStruct = sizeof(*si);
205 si->MaxNameLen = 256;
206 il.SizeOfStruct = sizeof(il);
207 if (SymFromAddr(dbg_curr_process->handle, (DWORD_PTR)lin, &disp64, si) &&
208 SymGetLineFromAddr64(dbg_curr_process->handle, (DWORD_PTR)lin, &disp, &il))
210 if ((!last_name || strcmp(last_name, si->Name)) ||
211 (!last_file || strcmp(last_file, il.FileName)))
213 HeapFree(GetProcessHeap(), 0, last_name);
214 HeapFree(GetProcessHeap(), 0, last_file);
215 last_name = strcpy(HeapAlloc(GetProcessHeap(), 0, strlen(si->Name) + 1), si->Name);
216 last_file = strcpy(HeapAlloc(GetProcessHeap(), 0, strlen(il.FileName) + 1), il.FileName);
217 dbg_printf("%s () at %s:%u\n", last_name, last_file, il.LineNumber);
221 if (!is_debug || is_break ||
222 dbg_curr_thread->exec_mode == dbg_exec_step_over_insn ||
223 dbg_curr_thread->exec_mode == dbg_exec_step_into_insn)
225 ADDRESS64 tmp = addr;
226 /* Show where we crashed */
227 memory_disasm_one_insn(&tmp);
229 source_list_from_addr(&addr, 0);
231 return TRUE;
234 static void dbg_exception_epilog(void)
236 break_restart_execution(dbg_curr_thread->exec_count);
238 * This will have gotten absorbed into the breakpoint info
239 * if it was used. Otherwise it would have been ignored.
240 * In any case, we don't mess with it any more.
242 if (dbg_curr_thread->exec_mode == dbg_exec_cont)
243 dbg_curr_thread->exec_count = 0;
244 dbg_curr_thread->in_exception = FALSE;
247 static DWORD dbg_handle_exception(const EXCEPTION_RECORD* rec, BOOL first_chance)
249 BOOL is_debug = FALSE;
250 const THREADNAME_INFO* pThreadName;
251 struct dbg_thread* pThread;
253 assert(dbg_curr_thread);
255 WINE_TRACE("exception=%x first_chance=%c\n",
256 rec->ExceptionCode, first_chance ? 'Y' : 'N');
258 switch (rec->ExceptionCode)
260 case EXCEPTION_BREAKPOINT:
261 case EXCEPTION_SINGLE_STEP:
262 is_debug = TRUE;
263 break;
264 case EXCEPTION_NAME_THREAD:
265 pThreadName = (const THREADNAME_INFO*)(rec->ExceptionInformation);
266 if (pThreadName->dwThreadID == -1)
267 pThread = dbg_curr_thread;
268 else
269 pThread = dbg_get_thread(dbg_curr_process, pThreadName->dwThreadID);
270 if(!pThread)
272 dbg_printf("Thread ID=%04x not in our list of threads -> can't rename\n", pThreadName->dwThreadID);
273 return DBG_CONTINUE;
275 if (dbg_read_memory(pThreadName->szName, pThread->name, 9))
276 dbg_printf("Thread ID=%04x renamed using MS VC6 extension (name==\"%.9s\")\n",
277 pThread->tid, pThread->name);
278 return DBG_CONTINUE;
281 if (first_chance && !is_debug && !DBG_IVAR(BreakOnFirstChance) &&
282 !(rec->ExceptionFlags & EH_STACK_INVALID))
284 /* pass exception to program except for debug exceptions */
285 return DBG_EXCEPTION_NOT_HANDLED;
288 if (!is_debug)
290 /* print some infos */
291 dbg_printf("%s: ",
292 first_chance ? "First chance exception" : "Unhandled exception");
293 switch (rec->ExceptionCode)
295 case EXCEPTION_INT_DIVIDE_BY_ZERO:
296 dbg_printf("divide by zero");
297 break;
298 case EXCEPTION_INT_OVERFLOW:
299 dbg_printf("overflow");
300 break;
301 case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
302 dbg_printf("array bounds");
303 break;
304 case EXCEPTION_ILLEGAL_INSTRUCTION:
305 dbg_printf("illegal instruction");
306 break;
307 case EXCEPTION_STACK_OVERFLOW:
308 dbg_printf("stack overflow");
309 break;
310 case EXCEPTION_PRIV_INSTRUCTION:
311 dbg_printf("privileged instruction");
312 break;
313 case EXCEPTION_ACCESS_VIOLATION:
314 if (rec->NumberParameters == 2)
315 dbg_printf("page fault on %s access to 0x%08lx",
316 rec->ExceptionInformation[0] == EXCEPTION_WRITE_FAULT ? "write" :
317 rec->ExceptionInformation[0] == EXCEPTION_EXECUTE_FAULT ? "execute" : "read",
318 rec->ExceptionInformation[1]);
319 else
320 dbg_printf("page fault");
321 break;
322 case EXCEPTION_DATATYPE_MISALIGNMENT:
323 dbg_printf("Alignment");
324 break;
325 case DBG_CONTROL_C:
326 dbg_printf("^C");
327 break;
328 case CONTROL_C_EXIT:
329 dbg_printf("^C");
330 break;
331 case STATUS_POSSIBLE_DEADLOCK:
333 ADDRESS64 addr;
335 addr.Mode = AddrModeFlat;
336 addr.Offset = rec->ExceptionInformation[0];
338 dbg_printf("wait failed on critical section ");
339 print_address(&addr, FALSE);
341 if (!DBG_IVAR(BreakOnCritSectTimeOut))
343 dbg_printf("\n");
344 return DBG_EXCEPTION_NOT_HANDLED;
346 break;
347 case EXCEPTION_WINE_STUB:
349 char dll[32], name[64];
350 memory_get_string(dbg_curr_process,
351 (void*)rec->ExceptionInformation[0], TRUE, FALSE,
352 dll, sizeof(dll));
353 if (HIWORD(rec->ExceptionInformation[1]))
354 memory_get_string(dbg_curr_process,
355 (void*)rec->ExceptionInformation[1], TRUE, FALSE,
356 name, sizeof(name));
357 else
358 sprintf( name, "%ld", rec->ExceptionInformation[1] );
359 dbg_printf("unimplemented function %s.%s called", dll, name);
361 break;
362 case EXCEPTION_WINE_ASSERTION:
363 dbg_printf("assertion failed");
364 break;
365 case EXCEPTION_VM86_INTx:
366 dbg_printf("interrupt %02lx in vm86 mode", rec->ExceptionInformation[0]);
367 break;
368 case EXCEPTION_VM86_STI:
369 dbg_printf("sti in vm86 mode");
370 break;
371 case EXCEPTION_VM86_PICRETURN:
372 dbg_printf("PIC return in vm86 mode");
373 break;
374 case EXCEPTION_FLT_DENORMAL_OPERAND:
375 dbg_printf("denormal float operand");
376 break;
377 case EXCEPTION_FLT_DIVIDE_BY_ZERO:
378 dbg_printf("divide by zero");
379 break;
380 case EXCEPTION_FLT_INEXACT_RESULT:
381 dbg_printf("inexact float result");
382 break;
383 case EXCEPTION_FLT_INVALID_OPERATION:
384 dbg_printf("invalid float operation");
385 break;
386 case EXCEPTION_FLT_OVERFLOW:
387 dbg_printf("floating point overflow");
388 break;
389 case EXCEPTION_FLT_UNDERFLOW:
390 dbg_printf("floating point underflow");
391 break;
392 case EXCEPTION_FLT_STACK_CHECK:
393 dbg_printf("floating point stack check");
394 break;
395 case CXX_EXCEPTION:
396 if(rec->NumberParameters == 3 && rec->ExceptionInformation[0] == CXX_FRAME_MAGIC)
397 dbg_printf("C++ exception(object = 0x%08lx, type = 0x%08lx)",
398 rec->ExceptionInformation[1], rec->ExceptionInformation[2]);
399 else
400 dbg_printf("C++ exception with strange parameter count %d or magic 0x%08lx",
401 rec->NumberParameters, rec->ExceptionInformation[0]);
402 break;
403 default:
404 dbg_printf("0x%08x", rec->ExceptionCode);
405 break;
408 if( (rec->ExceptionFlags & EH_STACK_INVALID) ) {
409 dbg_printf( ", invalid program stack" );
412 if (dbg_exception_prolog(is_debug, first_chance, rec))
414 dbg_interactiveP = TRUE;
415 return 0;
417 dbg_exception_epilog();
419 return DBG_CONTINUE;
422 static BOOL tgt_process_active_close_process(struct dbg_process* pcs, BOOL kill);
424 static void fetch_module_name(void* name_addr, BOOL unicode, void* mod_addr,
425 WCHAR* buffer, size_t bufsz, BOOL is_pcs)
427 static WCHAR pcspid[] = {'P','r','o','c','e','s','s','_','%','0','8','x',0};
428 static WCHAR dlladdr[] = {'D','L','L','_','%','0','8','l','x',0};
430 memory_get_string_indirect(dbg_curr_process, name_addr, unicode, buffer, bufsz);
431 if (!buffer[0] &&
432 !GetModuleFileNameExW(dbg_curr_process->handle, mod_addr, buffer, bufsz))
434 if (is_pcs)
436 HMODULE h;
437 WORD (WINAPI *gpif)(HANDLE, LPWSTR, DWORD);
439 /* On Windows, when we get the process creation debug event for a process
440 * created by winedbg, the modules' list is not initialized yet. Hence,
441 * GetModuleFileNameExA (on the main module) will generate an error.
442 * Psapi (starting on XP) provides GetProcessImageFileName() which should
443 * give us the expected result
445 if (!(h = GetModuleHandleA("psapi")) ||
446 !(gpif = (void*)GetProcAddress(h, "GetProcessImageFileNameW")) ||
447 !(gpif)(dbg_curr_process->handle, buffer, bufsz))
448 snprintfW(buffer, bufsz, pcspid, dbg_curr_pid);
450 else
451 snprintfW(buffer, bufsz, dlladdr, (unsigned long)mod_addr);
455 static unsigned dbg_handle_debug_event(DEBUG_EVENT* de)
457 union {
458 char bufferA[256];
459 WCHAR buffer[256];
460 } u;
461 DWORD cont = DBG_CONTINUE;
463 dbg_curr_pid = de->dwProcessId;
464 dbg_curr_tid = de->dwThreadId;
466 if ((dbg_curr_process = dbg_get_process(de->dwProcessId)) != NULL)
467 dbg_curr_thread = dbg_get_thread(dbg_curr_process, de->dwThreadId);
468 else
469 dbg_curr_thread = NULL;
471 switch (de->dwDebugEventCode)
473 case EXCEPTION_DEBUG_EVENT:
474 if (!dbg_curr_thread)
476 WINE_ERR("%04x:%04x: not a registered process or thread (perhaps a 16 bit one ?)\n",
477 de->dwProcessId, de->dwThreadId);
478 break;
481 WINE_TRACE("%04x:%04x: exception code=%08x\n",
482 de->dwProcessId, de->dwThreadId,
483 de->u.Exception.ExceptionRecord.ExceptionCode);
485 if (dbg_curr_process->continue_on_first_exception)
487 dbg_curr_process->continue_on_first_exception = FALSE;
488 if (!DBG_IVAR(BreakOnAttach)) break;
490 if (dbg_fetch_context())
492 cont = dbg_handle_exception(&de->u.Exception.ExceptionRecord,
493 de->u.Exception.dwFirstChance);
494 if (cont && dbg_curr_thread)
496 SetThreadContext(dbg_curr_thread->handle, &dbg_context);
499 break;
501 case CREATE_PROCESS_DEBUG_EVENT:
502 dbg_curr_process = dbg_add_process(&be_process_active_io, de->dwProcessId,
503 de->u.CreateProcessInfo.hProcess);
504 if (dbg_curr_process == NULL)
506 WINE_ERR("Couldn't create process\n");
507 break;
509 fetch_module_name(de->u.CreateProcessInfo.lpImageName,
510 de->u.CreateProcessInfo.fUnicode,
511 de->u.CreateProcessInfo.lpBaseOfImage,
512 u.buffer, sizeof(u.buffer) / sizeof(WCHAR), TRUE);
514 WINE_TRACE("%04x:%04x: create process '%s'/%p @%p (%u<%u>)\n",
515 de->dwProcessId, de->dwThreadId,
516 wine_dbgstr_w(u.buffer),
517 de->u.CreateProcessInfo.lpImageName,
518 de->u.CreateProcessInfo.lpStartAddress,
519 de->u.CreateProcessInfo.dwDebugInfoFileOffset,
520 de->u.CreateProcessInfo.nDebugInfoSize);
521 dbg_set_process_name(dbg_curr_process, u.buffer);
523 if (!dbg_init(dbg_curr_process->handle, u.buffer, FALSE))
524 dbg_printf("Couldn't initiate DbgHelp\n");
525 if (!dbg_load_module(dbg_curr_process->handle, de->u.CreateProcessInfo.hFile, u.buffer,
526 (DWORD_PTR)de->u.CreateProcessInfo.lpBaseOfImage, 0))
527 dbg_printf("couldn't load main module (%u)\n", GetLastError());
529 WINE_TRACE("%04x:%04x: create thread I @%p\n",
530 de->dwProcessId, de->dwThreadId, de->u.CreateProcessInfo.lpStartAddress);
532 dbg_curr_thread = dbg_add_thread(dbg_curr_process,
533 de->dwThreadId,
534 de->u.CreateProcessInfo.hThread,
535 de->u.CreateProcessInfo.lpThreadLocalBase);
536 if (!dbg_curr_thread)
538 WINE_ERR("Couldn't create thread\n");
539 break;
541 dbg_init_current_process();
542 dbg_init_current_thread(de->u.CreateProcessInfo.lpStartAddress);
543 break;
545 case EXIT_PROCESS_DEBUG_EVENT:
546 WINE_TRACE("%04x:%04x: exit process (%d)\n",
547 de->dwProcessId, de->dwThreadId, de->u.ExitProcess.dwExitCode);
549 if (dbg_curr_process == NULL)
551 WINE_ERR("Unknown process\n");
552 break;
554 tgt_process_active_close_process(dbg_curr_process, FALSE);
555 dbg_printf("Process of pid=%04x has terminated\n", de->dwProcessId);
556 break;
558 case CREATE_THREAD_DEBUG_EVENT:
559 WINE_TRACE("%04x:%04x: create thread D @%p\n",
560 de->dwProcessId, de->dwThreadId, de->u.CreateThread.lpStartAddress);
562 if (dbg_curr_process == NULL)
564 WINE_ERR("Unknown process\n");
565 break;
567 if (dbg_get_thread(dbg_curr_process, de->dwThreadId) != NULL)
569 WINE_TRACE("Thread already listed, skipping\n");
570 break;
573 dbg_curr_thread = dbg_add_thread(dbg_curr_process,
574 de->dwThreadId,
575 de->u.CreateThread.hThread,
576 de->u.CreateThread.lpThreadLocalBase);
577 if (!dbg_curr_thread)
579 WINE_ERR("Couldn't create thread\n");
580 break;
582 dbg_init_current_thread(de->u.CreateThread.lpStartAddress);
583 break;
585 case EXIT_THREAD_DEBUG_EVENT:
586 WINE_TRACE("%04x:%04x: exit thread (%d)\n",
587 de->dwProcessId, de->dwThreadId, de->u.ExitThread.dwExitCode);
589 if (dbg_curr_thread == NULL)
591 WINE_ERR("Unknown thread\n");
592 break;
594 /* FIXME: remove break point set on thread startup */
595 dbg_del_thread(dbg_curr_thread);
596 break;
598 case LOAD_DLL_DEBUG_EVENT:
599 if (dbg_curr_thread == NULL)
601 WINE_ERR("Unknown thread\n");
602 break;
604 fetch_module_name(de->u.LoadDll.lpImageName,
605 de->u.LoadDll.fUnicode,
606 de->u.LoadDll.lpBaseOfDll,
607 u.buffer, sizeof(u.buffer) / sizeof(WCHAR), FALSE);
609 WINE_TRACE("%04x:%04x: loads DLL %s @%p (%u<%u>)\n",
610 de->dwProcessId, de->dwThreadId,
611 wine_dbgstr_w(u.buffer), de->u.LoadDll.lpBaseOfDll,
612 de->u.LoadDll.dwDebugInfoFileOffset,
613 de->u.LoadDll.nDebugInfoSize);
614 dbg_load_module(dbg_curr_process->handle, de->u.LoadDll.hFile, u.buffer,
615 (DWORD_PTR)de->u.LoadDll.lpBaseOfDll, 0);
616 break_set_xpoints(FALSE);
617 break_check_delayed_bp();
618 break_set_xpoints(TRUE);
619 if (DBG_IVAR(BreakOnDllLoad))
621 dbg_printf("Stopping on DLL %s loading at %p\n",
622 dbg_W2A(u.buffer, -1), de->u.LoadDll.lpBaseOfDll);
623 if (dbg_fetch_context()) cont = 0;
625 break;
627 case UNLOAD_DLL_DEBUG_EVENT:
628 WINE_TRACE("%04x:%04x: unload DLL @%p\n",
629 de->dwProcessId, de->dwThreadId,
630 de->u.UnloadDll.lpBaseOfDll);
631 break_delete_xpoints_from_module((DWORD_PTR)de->u.UnloadDll.lpBaseOfDll);
632 SymUnloadModule64(dbg_curr_process->handle, (DWORD_PTR)de->u.UnloadDll.lpBaseOfDll);
633 break;
635 case OUTPUT_DEBUG_STRING_EVENT:
636 if (dbg_curr_thread == NULL)
638 WINE_ERR("Unknown thread\n");
639 break;
642 memory_get_string(dbg_curr_process,
643 de->u.DebugString.lpDebugStringData, TRUE,
644 de->u.DebugString.fUnicode, u.bufferA, sizeof(u.bufferA));
645 WINE_TRACE("%04x:%04x: output debug string (%s)\n",
646 de->dwProcessId, de->dwThreadId, u.bufferA);
647 break;
649 case RIP_EVENT:
650 WINE_TRACE("%04x:%04x: rip error=%u type=%u\n",
651 de->dwProcessId, de->dwThreadId, de->u.RipInfo.dwError,
652 de->u.RipInfo.dwType);
653 break;
655 default:
656 WINE_TRACE("%04x:%04x: unknown event (%x)\n",
657 de->dwProcessId, de->dwThreadId, de->dwDebugEventCode);
659 if (!cont) return TRUE; /* stop execution */
660 ContinueDebugEvent(de->dwProcessId, de->dwThreadId, cont);
661 return FALSE; /* continue execution */
664 static void dbg_resume_debuggee(DWORD cont)
666 if (dbg_curr_thread->in_exception)
668 ADDRESS64 addr;
669 char hexbuf[MAX_OFFSET_TO_STR_LEN];
671 dbg_exception_epilog();
672 memory_get_current_pc(&addr);
673 WINE_TRACE("Exiting debugger PC=%s mode=%d count=%d\n",
674 memory_offset_to_string(hexbuf, addr.Offset, 0),
675 dbg_curr_thread->exec_mode,
676 dbg_curr_thread->exec_count);
677 if (dbg_curr_thread)
679 if (!SetThreadContext(dbg_curr_thread->handle, &dbg_context))
680 dbg_printf("Cannot set ctx on %04lx\n", dbg_curr_tid);
683 dbg_interactiveP = FALSE;
684 if (!ContinueDebugEvent(dbg_curr_pid, dbg_curr_tid, cont))
685 dbg_printf("Cannot continue on %04lx (%08x)\n", dbg_curr_tid, cont);
688 static void wait_exception(void)
690 DEBUG_EVENT de;
692 while (dbg_num_processes() && WaitForDebugEvent(&de, INFINITE))
694 if (dbg_handle_debug_event(&de)) break;
696 dbg_interactiveP = TRUE;
699 void dbg_wait_next_exception(DWORD cont, int count, int mode)
701 ADDRESS64 addr;
702 char hexbuf[MAX_OFFSET_TO_STR_LEN];
704 if (cont == DBG_CONTINUE)
706 dbg_curr_thread->exec_count = count;
707 dbg_curr_thread->exec_mode = mode;
709 dbg_resume_debuggee(cont);
711 wait_exception();
712 if (!dbg_curr_process) return;
714 memory_get_current_pc(&addr);
715 WINE_TRACE("Entering debugger PC=%s mode=%d count=%d\n",
716 memory_offset_to_string(hexbuf, addr.Offset, 0),
717 dbg_curr_thread->exec_mode,
718 dbg_curr_thread->exec_count);
721 void dbg_active_wait_for_first_exception(void)
723 dbg_interactiveP = FALSE;
724 /* wait for first exception */
725 wait_exception();
728 static unsigned dbg_start_debuggee(LPSTR cmdLine)
730 PROCESS_INFORMATION info;
731 STARTUPINFOA startup, current;
732 DWORD flags;
734 GetStartupInfoA(&current);
736 memset(&startup, 0, sizeof(startup));
737 startup.cb = sizeof(startup);
738 startup.dwFlags = STARTF_USESHOWWINDOW;
740 startup.wShowWindow = (current.dwFlags & STARTF_USESHOWWINDOW) ?
741 current.wShowWindow : SW_SHOWNORMAL;
743 /* FIXME: shouldn't need the CREATE_NEW_CONSOLE, but as usual CUI:s need it
744 * while GUI:s don't
746 flags = DEBUG_PROCESS | CREATE_NEW_CONSOLE;
747 if (!DBG_IVAR(AlsoDebugProcChild)) flags |= DEBUG_ONLY_THIS_PROCESS;
749 if (!CreateProcessA(NULL, cmdLine, NULL, NULL, FALSE, flags,
750 NULL, NULL, &startup, &info))
752 dbg_printf("Couldn't start process '%s'\n", cmdLine);
753 return FALSE;
755 if (!info.dwProcessId)
757 /* this happens when the program being run is not a Wine binary
758 * (for example, a shell wrapper around a WineLib app)
760 /* Current fix: list running processes and let the user attach
761 * to one of them (sic)
762 * FIXME: implement a real fix => grab the process (from the
763 * running processes) from its name
765 dbg_printf("Debuggee has been started (%s)\n"
766 "But WineDbg isn't attached to it. Maybe you're trying to debug a winelib wrapper ??\n"
767 "Try to attach to one of those processes:\n", cmdLine);
768 /* FIXME: (HACK) we need some time before the wrapper executes the winelib app */
769 Sleep(100);
770 info_win32_processes();
771 return TRUE;
773 dbg_curr_pid = info.dwProcessId;
774 if (!(dbg_curr_process = dbg_add_process(&be_process_active_io, dbg_curr_pid, 0))) return FALSE;
775 dbg_curr_process->active_debuggee = TRUE;
777 return TRUE;
780 void dbg_run_debuggee(const char* args)
782 if (args)
784 WINE_FIXME("Re-running current program with %s as args is broken\n", wine_dbgstr_a(args));
785 return;
787 else
789 if (!dbg_last_cmd_line)
791 dbg_printf("Cannot find previously used command line.\n");
792 return;
794 dbg_start_debuggee(dbg_last_cmd_line);
795 dbg_active_wait_for_first_exception();
796 source_list_from_addr(NULL, 0);
800 static BOOL str2int(const char* str, DWORD_PTR* val)
802 char* ptr;
804 *val = strtol(str, &ptr, 10);
805 return str < ptr && !*ptr;
809 /******************************************************************
810 * dbg_active_attach
812 * Tries to attach to a running process
813 * Handles the <pid> or <pid> <evt> forms
815 enum dbg_start dbg_active_attach(int argc, char* argv[])
817 DWORD_PTR pid, evt;
819 /* try the form <myself> pid */
820 if (argc == 1 && str2int(argv[0], &pid) && pid != 0)
822 if (!dbg_attach_debuggee(pid, FALSE))
823 return start_error_init;
825 /* try the form <myself> pid evt (Win32 JIT debugger) */
826 else if (argc == 2 && str2int(argv[0], &pid) && pid != 0 &&
827 str2int(argv[1], &evt) && evt != 0)
829 if (!dbg_attach_debuggee(pid, TRUE))
831 /* don't care about result */
832 SetEvent((HANDLE)evt);
833 return start_error_init;
835 if (!SetEvent((HANDLE)evt))
837 WINE_ERR("Invalid event handle: %lx\n", evt);
838 return start_error_init;
840 CloseHandle((HANDLE)evt);
842 else return start_error_parse;
844 dbg_curr_pid = pid;
845 return start_ok;
848 /******************************************************************
849 * dbg_active_launch
851 * Launches a debuggee (with its arguments) from argc/argv
853 enum dbg_start dbg_active_launch(int argc, char* argv[])
855 int i, len;
856 LPSTR cmd_line;
858 if (argc == 0) return start_error_parse;
860 if (!(cmd_line = HeapAlloc(GetProcessHeap(), 0, len = 1)))
862 oom_leave:
863 dbg_printf("Out of memory\n");
864 return start_error_init;
866 cmd_line[0] = '\0';
868 for (i = 0; i < argc; i++)
870 len += strlen(argv[i]) + 1;
871 if (!(cmd_line = HeapReAlloc(GetProcessHeap(), 0, cmd_line, len)))
872 goto oom_leave;
873 strcat(cmd_line, argv[i]);
874 cmd_line[len - 2] = ' ';
875 cmd_line[len - 1] = '\0';
878 if (!dbg_start_debuggee(cmd_line))
880 HeapFree(GetProcessHeap(), 0, cmd_line);
881 return start_error_init;
883 HeapFree(GetProcessHeap(), 0, dbg_last_cmd_line);
884 dbg_last_cmd_line = cmd_line;
885 return start_ok;
888 /******************************************************************
889 * dbg_active_auto
891 * Starts (<pid> or <pid> <evt>) in automatic mode
893 enum dbg_start dbg_active_auto(int argc, char* argv[])
895 HANDLE hFile;
896 enum dbg_start ds = start_error_parse;
898 if (!strcmp(argv[0], "--auto"))
900 /* auto mode */
901 argc--; argv++;
902 ds = dbg_active_attach(argc, argv);
903 if (ds != start_ok) {
904 msgbox_res_id(NULL, IDS_INVALID_PARAMS, IDS_AUTO_CAPTION, MB_OK);
905 return ds;
907 if (!display_crash_dialog()) {
908 dbg_init_console();
909 dbg_start_interactive(INVALID_HANDLE_VALUE);
910 return start_ok;
913 hFile = parser_generate_command_file("echo Modules:", "info share",
914 "echo Threads:", "info threads",
915 "backtrace", "detach", NULL);
917 else if (!strcmp(argv[0], "--minidump"))
919 const char* file = NULL;
920 char tmp[8 + 1 + MAX_PATH]; /* minidump <file> */
922 argc--; argv++;
923 /* hard stuff now ; we can get things like:
924 * --minidump <pid> 1 arg
925 * --minidump <pid> <evt> 2 args
926 * --minidump <file> <pid> 2 args
927 * --minidump <file> <pid> <evt> 3 args
929 switch (argc)
931 case 1:
932 ds = dbg_active_attach(argc, argv);
933 break;
934 case 2:
935 if ((ds = dbg_active_attach(argc, argv)) != start_ok)
937 file = argv[0];
938 ds = dbg_active_attach(argc - 1, argv + 1);
940 break;
941 case 3:
942 file = argv[0];
943 ds = dbg_active_attach(argc - 1, argv + 1);
944 break;
945 default:
946 return start_error_parse;
948 if (ds != start_ok) return ds;
949 memcpy(tmp, "minidump \"", 10);
950 if (!file)
952 char path[MAX_PATH];
954 GetTempPathA(sizeof(path), path);
955 GetTempFileNameA(path, "WD", 0, tmp + 10);
957 else strcpy(tmp + 10, file);
958 strcat(tmp, "\"");
959 if (!file)
961 /* FIXME: should generate unix name as well */
962 dbg_printf("Capturing program state in %s\n", tmp + 9);
964 hFile = parser_generate_command_file(tmp, "detach", NULL);
966 else return start_error_parse;
967 if (hFile == INVALID_HANDLE_VALUE) return start_error_parse;
969 if (dbg_curr_process->active_debuggee)
970 dbg_active_wait_for_first_exception();
972 dbg_interactiveP = TRUE;
973 parser_handle(hFile);
975 return start_ok;
978 static BOOL tgt_process_active_close_process(struct dbg_process* pcs, BOOL kill)
980 if (pcs == dbg_curr_process)
982 /* remove all set breakpoints in debuggee code */
983 break_set_xpoints(FALSE);
984 /* needed for single stepping (ugly).
985 * should this be handled inside the server ???
987 be_cpu->single_step(&dbg_context, FALSE);
988 if (dbg_curr_thread->in_exception)
990 SetThreadContext(dbg_curr_thread->handle, &dbg_context);
991 ContinueDebugEvent(dbg_curr_pid, dbg_curr_tid, DBG_CONTINUE);
994 if (kill)
996 TerminateProcess(pcs->handle, 0);
998 else
1000 if (!DebugActiveProcessStop(pcs->pid)) return FALSE;
1002 SymCleanup(pcs->handle);
1003 dbg_del_process(pcs);
1005 return TRUE;
1008 static BOOL tgt_process_active_read(HANDLE hProcess, const void* addr,
1009 void* buffer, SIZE_T len, SIZE_T* rlen)
1011 return ReadProcessMemory( hProcess, addr, buffer, len, rlen );
1014 static BOOL tgt_process_active_write(HANDLE hProcess, void* addr,
1015 const void* buffer, SIZE_T len, SIZE_T* wlen)
1017 return WriteProcessMemory( hProcess, addr, buffer, len, wlen );
1020 static BOOL tgt_process_active_get_selector(HANDLE hThread, DWORD sel, LDT_ENTRY* le)
1022 return GetThreadSelectorEntry( hThread, sel, le );
1025 static struct be_process_io be_process_active_io =
1027 tgt_process_active_close_process,
1028 tgt_process_active_read,
1029 tgt_process_active_write,
1030 tgt_process_active_get_selector