This is the mail archive of the
gdb-patches@sourceware.org
mailing list for the GDB project.
Post mortem debugging for Windows CE
- From: Danny Backx <danny dot backx at scarlet dot be>
- To: gdb-patches <gdb-patches at sourceware dot org>
- Date: Tue, 28 Apr 2009 16:45:01 +0200
- Subject: Post mortem debugging for Windows CE
- Reply-to: danny dot backx at scarlet dot be
Hi,
I wrote a program, see below, that can be used either on a development
host, or on a Windows CE target, to decode stuff from a dump file as
generated by CE.
I don't think gdb currently has this capability (to inspect postmortem
dump files) for debugging CE applications.
Is this something I should port into the gdb source tree and submit, or
is it not worth it ? If yes, please advise where this belongs.
Sources are in the SVN of the cegcc project
(https://cegcc.svn.sourceforge.net/svnroot/cegcc/trunk/cegcc/tools/cedump) .
Danny
dannypc: {1273} rsh
ipaq /temp/cedump /windows/system/dumpfiles/Ce042709-01/Ce042709-01.kdmp
Number of streams 10
stream 0, type 8001 (System info), size 72
System info :
arch 5, 1 processors
Proc type 2577 level 4 rev 1
Proc family 4 Platform 3
Locale id 2067 813
OEM {hp iPAQ 210}
stream 1, type 8002 (Exception), size 160
Exception : code C0000005, flags 0, address 1117C
Parameter 0 : [1]
Parameter 1 : [26000000]
stream 2, type 8003 (Module), size 336
Element 0 :
Name : NK.EXE
Base Ptr : 0x80001000
Element 1 :
Name : null2.exe
Base Ptr : 0x26010000
Element 2 :
Name : coredll.dll.0409.mui
Base Ptr : 0x7FFE0000
Element 3 :
Name : coredll.dll
Base Ptr : 0x03F4E000
stream 3, type 8004 (Process), size 208
Element 0 :
ProcSlot# : 0
Name : NK.EXE
VMBase : 0xC2000000
BasePtr : 0x80001000
pProcess : 0x8034D260
Element 1 :
ProcSlot# : 18
Name : null2.exe
VMBase : 0x26000000
BasePtr : 0x00010000
pProcess : 0x8034E340
stream 4, type 8005 (Thread), size 416
Element 0 :
pThread : 0x8172B640
RunState : Awak,Rung
hThread : 0x22CE3EAE
LastError : 0x00000000
PC : 0x0001117C
StkRetAddr : 0x00000000
stream 5, type 8006 (Thread Context), size 48
Element 0 :
ThreadID : 0x22ce3eae
stream 6, type 8007 (Thread Callstack), size 24
Thread Call Stack List : 1 entries
Process 22E4A1C6 thread 22CE3EAE, 1 frames
Frame 0 : RetAddr 0x2601117C FP 0x2611FE04
stream 7, type 800a (Bucket parameters), size 64
stream 8, type 8008 (Memory virtual list), size 56
stream 9, type 8009 (Memory physical list), size 8
--
Danny Backx ; danny.backx - at - scarlet.be ; http://danny.backx.info