Debugging Events
A
debugging event is an incident in the process being debugged that causes the kernel to notify
the debugger. Debugging events include creating a process, creating a thread,
loading a dynamic-link library (DLL), unloading a DLL, sending an output
string, and generating an exception.
If a debugging event occurs while a debugger is waiting for one, the kernel
fills the
DEBUG_EVENT structure specified by
WaitForDebugEvent with information describing the event.
When the kernel notifies the debugger of a debugging event, it also suspends
all threads in the affected process. The threads do not resume execution until
the debugger continues the debugging event by using
ContinueDebugEvent. The following debugging events may occur while a process is being debugged.
Debugging event
| Description
|
CREATE_PROCESS_DEBUG_EVENT
|
|
| Generated whenever a new process is created in a process being debugged or
whenever the debugger begins debugging an already active process. The kernel
generates this debugging event before the process begins to execute in user mode and
before the kernel generates any other debugging events for the new process.
|
| The DEBUG_EVENT structure contains a CREATE_PROCESS_DEBUG_INFO structure. This structure includes a handle of the new process, a handle of
the process's image file, a handle of the process's initial thread, and other
information that describes the new process.
|
| The handle of the process has PROCESS_VM_READ and PROCESS_VM_WRITE access. If
a debugger has these types of access to a thread, it can read and write to the
process's memory by using the ReadProcessMemory and WriteProcessMemory functions.
|
| The handle of the process's image file has GENERIC_READ access and is opened
for read-sharing.
|
| The handle of the process's initial thread has THREAD_GET_CONTEXT,
THREAD_SET_CONTEXT, and THREAD_SUSPEND_RESUME access to the thread. If a debugger has
these types of access to a thread, it can read from and write to the thread's
registers by using the GetThreadContext and SetThreadContext functions and can suspend and resume the thread by using the SuspendThread and ResumeThread functions.
|
CREATE_THREAD_DEBUG_EVENT
|
|
| Generated whenever a new thread is created in a process being debugged or
whenever the debugger begins debugging an already active process. This debugging
event is generated before the new thread begins to execute in user mode.
|
| The DEBUG_EVENT structure contains a CREATE_THREAD_DEBUG_INFO structure. This structure includes a handle of the new thread and the
thread's starting address. The handle has THREAD_GET_CONTEXT, THREAD_SET_CONTEXT, and
THREAD_SUSPEND_RESUME access to the thread. If a debugger has these types of
access to a thread, it can read from and write to the thread's registers by using
the GetThreadContext and SetThreadContext functions and can suspend and resume the thread by using the SuspendThread and ResumeThread functions.
|
| Generated whenever an exception occurs in the process being debugged. Possible
exceptions include attempting to access inaccessible memory, executing
breakpoint instructions, attempting to divide by zero, or any other exception noted in Structured Exception Handling.
|
| The DEBUG_EVENT structure contains an EXCEPTION_DEBUG_INFO structure. This structure describes the exception that caused the debugging
event.
|
| Besides the standard exception conditions, an additional exception code can
occur during console process debugging. The kernel generates a DBG_CONTROL_C
exception code when CTRL+C is input to a console process that handles CTRL+C signals and is being debugged. This exception code is not meant to be handled
by applications. An application should never use an exception handler to deal
with it. It is raised only for the benefit of the debugger and is only used when
a debugger is attached to the console process.
|
| If a process is not being debugged or if the debugger passes on the
DBG_CONTROL_C exception unhandled (through the gn command), the application's list of handler functions is searched, as
documented for the SetConsoleCtrlHandler function.
|
| If the debugger handles the DBG_CONTROL_C exception (through the gh command), an application will not notice the CTRL+C except in code like this.
|
| while ((inputChar = getchar()) != EOF) ...
while (gets(inputString)) ...
|
| Thus, the debugger cannot be used to stop the read wait in such code from
terminating.
|
| Generated whenever the last thread in a process being debugged exits. This
debugging event occurs immediately after the kernel unloads the process's DLLs and
updates the process's exit code.
|
| The DEBUG_EVENT structure contains an EXIT_PROCESS_DEBUG_INFO structure that specifies the exit code.
|
| The debugger deallocates any internal structures associated with the process
on receipt of this debugging event. The kernel closes the debugger's handle of
the exiting process and all of the process's threads.
|
| Generated whenever a thread that is part of a process being debugged exits.
The kernel generates this debugging event immediately after it updates the
thread's exit code.
|
| The DEBUG_EVENT structure contains an EXIT_THREAD_DEBUG_INFO structure that specifies the exit code.
|
| The debugger deallocates any internal structures associated with the thread on
receipt of this debugging event. The system closes the debugger's handle of
the exiting thread.
|
| This debugging event does not occur if the exiting thread is the last thread
of a process. In this case, the EXIT_PROCESS_DEBUG_EVENT debugging event occurs
instead.
|
| Generated whenever a process being debugged loads a DLL. This debugging event
occurs when the system loader resolves links to a DLL or when the debugged
process uses the LoadLibrary function. This debugging event only occurs the first time the kernel attaches
a DLL to the virtual address space of a process.
|
| The DEBUG_EVENT structure contains a LOAD_DLL_DEBUG_INFO structure. This structure includes a handle of the newly loaded DLL, the base
address of the DLL, and other information that describes the DLL.
|
| Typically, a debugger loads a symbol table associated with the DLL on receipt
of this debugging event.
|
OUTPUT_DEBUG_STRING_EVENT
|
|
| Generated whenever a process being debugged unloads a DLL by using the FreeLibrary function. This debugging event only occurs the last time a DLL is unloaded
from a process's address space (that is, when the DLL's usage count is zero).
|
| The DEBUG_EVENT structure contains an UNLOAD_DLL_DEBUG_INFO structure. This structure specifies the base address of the DLL in the
address space of the process that unloads the DLL.
|
| Typically, a debugger unloads a symbol table associated with the DLL upon
receiving this debugging event.
|
| When a process exits, the kernel automatically unloads the process's DLLs, but
does not generate an UNLOAD_DLL_DEBUG_EVENT debugging event.
|
- Software for developers
-
Delphi Components
.Net Components
Software for Android Developers
- More information resources
-
MegaDetailed.Net
Unix Manual Pages
Delphi Examples
- Databases for Amazon shops developers
-
Amazon Categories Database
Browse Nodes Database