From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 32473 invoked by alias); 28 Apr 2009 14:45:18 -0000 Received: (qmail 32458 invoked by uid 22791); 28 Apr 2009 14:45:16 -0000 X-SWARE-Spam-Status: No, hits=-1.8 required=5.0 tests=AWL,BAYES_00,J_CHICKENPOX_44,J_CHICKENPOX_55,RCVD_IN_DNSWL_LOW,SPF_PASS X-Spam-Check-By: sourceware.org Received: from sif.is.scarlet.be (HELO sif.is.scarlet.be) (193.74.71.28) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Tue, 28 Apr 2009 14:45:08 +0000 Received: from [172.17.1.2] (ip-62-235-147-185.dsl.scarlet.be [62.235.147.185] (may be forged)) by sif.is.scarlet.be (8.14.2/8.14.2) with ESMTP id n3SEj2S3012130; Tue, 28 Apr 2009 16:45:02 +0200 Subject: Post mortem debugging for Windows CE From: Danny Backx Reply-To: danny.backx@scarlet.be To: gdb-patches Content-Type: text/plain Date: Tue, 28 Apr 2009 14:45:00 -0000 Message-Id: <1240929901.29047.110.camel@dannypc> Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-DCC-scarlet.be-Metrics: sif 20001; Body=2 Fuz1=2 Fuz2=2 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org X-SW-Source: 2009-04/txt/msg00757.txt.bz2 Hi, I wrote a program, see below, that can be used either on a development host, or on a Windows CE target, to decode stuff from a dump file as generated by CE. I don't think gdb currently has this capability (to inspect postmortem dump files) for debugging CE applications. Is this something I should port into the gdb source tree and submit, or is it not worth it ? If yes, please advise where this belongs. Sources are in the SVN of the cegcc project (https://cegcc.svn.sourceforge.net/svnroot/cegcc/trunk/cegcc/tools/cedump) . Danny dannypc: {1273} rsh ipaq /temp/cedump /windows/system/dumpfiles/Ce042709-01/Ce042709-01.kdmp Number of streams 10 stream 0, type 8001 (System info), size 72 System info : arch 5, 1 processors Proc type 2577 level 4 rev 1 Proc family 4 Platform 3 Locale id 2067 813 OEM {hp iPAQ 210} stream 1, type 8002 (Exception), size 160 Exception : code C0000005, flags 0, address 1117C Parameter 0 : [1] Parameter 1 : [26000000] stream 2, type 8003 (Module), size 336 Element 0 : Name : NK.EXE Base Ptr : 0x80001000 Element 1 : Name : null2.exe Base Ptr : 0x26010000 Element 2 : Name : coredll.dll.0409.mui Base Ptr : 0x7FFE0000 Element 3 : Name : coredll.dll Base Ptr : 0x03F4E000 stream 3, type 8004 (Process), size 208 Element 0 : ProcSlot# : 0 Name : NK.EXE VMBase : 0xC2000000 BasePtr : 0x80001000 pProcess : 0x8034D260 Element 1 : ProcSlot# : 18 Name : null2.exe VMBase : 0x26000000 BasePtr : 0x00010000 pProcess : 0x8034E340 stream 4, type 8005 (Thread), size 416 Element 0 : pThread : 0x8172B640 RunState : Awak,Rung hThread : 0x22CE3EAE LastError : 0x00000000 PC : 0x0001117C StkRetAddr : 0x00000000 stream 5, type 8006 (Thread Context), size 48 Element 0 : ThreadID : 0x22ce3eae stream 6, type 8007 (Thread Callstack), size 24 Thread Call Stack List : 1 entries Process 22E4A1C6 thread 22CE3EAE, 1 frames Frame 0 : RetAddr 0x2601117C FP 0x2611FE04 stream 7, type 800a (Bucket parameters), size 64 stream 8, type 8008 (Memory virtual list), size 56 stream 9, type 8009 (Memory physical list), size 8 -- Danny Backx ; danny.backx - at - scarlet.be ; http://danny.backx.info