--- utils.sgml-orig 2002-07-10 17:20:48.000000000 -0500 +++ utils.sgml 2002-07-10 19:42:55.000000000 -0500 @@ -5,7 +5,9 @@ used to manage the UNIX emulation portio While many of these reflect their UNIX counterparts, each was written specifically for Cygwin. You may use the long or short option names interchangeably; for example, --help and --h function identically. +-h function identically. All of the Cygwin +command-line utilities support the --help and +--version options. cygcheck @@ -522,7 +524,7 @@ and shares onto Cygwin's simulated POSIX done by mount commands on typical UNIX systems. Please see for more information on the concepts behind the Cygwin POSIX file system and strategies for using -mounts. +mounts. To remove mounts, use umount Using mount @@ -816,35 +818,449 @@ option. -umount +regtool -Usage: umount.exe [OPTION] [] - -A, --remove-all-mounts remove all mounts - -c, --remove-cygdrive-prefix remove cygdrive prefix - -h, --help output usage information and exit - -s, --system remove system mount (default) - -S, --remove-system-mounts remove all system mounts - -u, --user remove user mount - -U, --remove-user-mounts remove all user mounts - -v, --version output version information and exit +Usage: regtool.exe [OPTION] (add | check | get | list | remove | unset) KEY + +Actions: + add KEY\SUBKEY add new SUBKEY + check KEY exit 0 if KEY exists, 1 if not + get KEY\VALUE prints VALUE to stdout + list KEY list SUBKEYs and VALUEs + remove KEY remove KEY + set KEY\VALUE [data ...] set VALUE + unset KEY\VALUE removes VALUE from KEY + +Options for 'list' Action: + -k, --keys print only KEYs + -l, --list print only VALUEs + -p, --postfix like ls -p, appends '\' postfix to KEY names + +Options for 'set' Action: + -e, --expand-string set type to REG_EXPAND_SZ + -i, --integer set type to REG_DWORD + -m, --multi-string set type to REG_MULTI_SZ + -s, --string set type to REG_SZ + +Other Options: + -h, --help output usage information and exit + -q, --quiet no error output, just nonzero return if KEY/VALUE missing + -v, --verbose verbose output, including VALUE contents when applicable + -V, --version output version information and exit + +KEY is in the format [host]\prefix\KEY\KEY\VALUE, where host is optional +remote host in either \\hostname or hostname: format and prefix is any of: + root HKCR HKEY_CLASSES_ROOT (local only) + config HKCC HKEY_CURRENT_CONFIG (local only) + user HKCU HKEY_CURRENT_USER (local only) + machine HKLM HKEY_LOCAL_MACHINE + users HKU HKEY_USERS + +You can use forward slash ('/') as a separator instead of backslash, in +that case backslash is treated as escape character +Example: regtool.exe get '\user\software\Microsoft\Clock\iFormat' -The umount program removes mounts from the -mount table. If you specify a POSIX path that corresponds to a -current mount point, umount will remove it from the -user-specific registry area. The -s flag may be used to specify -removing the mount from the system-wide registry area instead -(Administrator priviledges are required). +The regtool program allows shell scripts +to access and modify the Windows registry. Note that modifying the +Windows registry is dangerous, and carelessness here can result +in an unusable system. Be careful. -The umount utility may also be used to remove -all mounts of a particular type. With the extended options it is -possible to remove all mounts, all automatically-mounted mounts, all -mounts in the current user's registry area, or all mounts in the -system-wide registry area (with Administrator privileges). +The -v option means "verbose". For most +commands, this causes additional or lengthier messages to be printed. +Conversely, the -q option supresses error messages, +so you can use the exit status of the program to detect if a key +exists or not (for example). + +You must provide regtool with an +action following options (if any). Currently, +the action must be add, set, +check, get, list, +remove, set, or unset. + + +The add action adds a new key. The +check action checks to see if a key exists (the +exit code of the program is zero if it does, nonzero if it does not). +The get action gets the value of a value of a key, +and prints it (and nothing else) to stdout. Note: if the value +doesn't exist, an error message is printed and the program returns a +non-zero exit code. If you give -q, it doesn't +print the message but does return the non-zero exit code. + + +The list action lists the subkeys and values +belonging to the given key. With list, the +-k option instructs regtool +to print only KEYs, and the -l option to print +only VALUEs. The -p option postfixes a +'/' to each KEY, but leave VALUEs with no +postfix. The remove action +removes a key. Note that you may need to remove everything in the key +before you may remove it, but don't rely on this stopping you from +accidentally removing too much. + + +The set action sets a value within a key. +-e means it's an expanding string (REG_EXPAND_SZ) +that contains embedded environment variables. +-i means the value is an integer (REG_DWORD). +-m means it's a multi-string (REG_MULTI_SZ). +-s means the value is a string (REG_SZ). +If you don't specify one of these, regtool tries to +guess the type based on the value you give. If it looks like a +number, it's a DWORD. If it starts with a percent, it's an expanding +string. If you give multiple values, it's a multi-string. Else, it's +a regular string. +The unset action removes a value from a key. + + + + +setfacl + + +Usage: setfacl [-r] (-f ACL_FILE | -s acl_entries) FILE... + setfacl [-r] ([-d acl_entries] [-m acl_entries]) FILE... + +Modify file and directory access control lists (ACLs) + + -d, --delete delete one or more specified ACL entries + -f, --file set ACL entries for FILE to ACL entries read + from a ACL_FILE + -m, --modify modify one or more specified ACL entries + -r, --replace replace mask entry with maximum permissions + needed for the file group class + -s, --substitute substitute specified ACL entries for the + ACL of FILE + -h, --help output usage information and exit + -v, --version output version information and exit + +At least one of (-d, -f, -m, -s) must be specified + + + +For each file given as parameter, setfacl will +either replace its complete ACL (-s, -f), +or it will add, modify, or delete ACL entries. +For more information on Cygwin and Windows ACLs, see +see in the Cygwin User's Guide. + + + +Acl_entries are one or more comma-separated ACL entries +from the following list: + + u[ser]::perm + u[ser]:uid:perm + g[roup]::perm + g[roup]:gid:perm + m[ask]::perm + o[ther]::perm + +Default entries are like the above with the additional +default identifier. For example: + + d[efault]:u[ser]:uid:perm + + + + +perm is either a 3-char permissions string in the form +"rwx" with the character '-' for no permission +or it is the octal representation of the permissions, a +value from 0 (equivalent to "---") to 7 ("rwx"). +uid is a user name or a numerical uid. +gid is a group name or a numerical gid. + + + +The following options are supported: + + + +-d +Delete one or more specified entries from the file's ACL. +The owner, group and others entries must not be deleted. +Acl_entries to be deleted should be specified without +permissions, as in the following list: + + u[ser]:uid + g[roup]:gid + d[efault]:u[ser]:uid + d[efault]:g[roup]:gid + d[efault]:m[ask]: + d[efault]:o[ther]: + + + + +-f +Take the Acl_entries from ACL_FILE one per line. Whitespace +characters are ignored, and the character "#" may be used +to start a comment. The special filename "-" indicates +reading from stdin. Note that you can use this with +getfacl and setfacl to copy +ACLs from one file to another: + +$ getfacl source_file | setfacl -f - target_file + + + + +Required entries are: +one user entry for the owner of the file, +one group entry for the group of the file, and +one other entry. + + + +If additional user and group entries are given: +a mask entry for the file group class of the file, and +no duplicate user or group entries with the same uid/gid. + + + +If it is a directory: +one default user entry for the owner of the file, +one default group entry for the group of the file, +one default mask entry for the file group class, and +one default other entry. + + + +-m +Add or modify one or more specified ACL entries. Acl_entries is a +comma-separated list of entries from the same list as above. + + + +-r +Causes the permissions specified in the mask +entry to be ignored and replaced by the maximum permissions needed for +the file group class. + + + +-s +Like -f, but substitute the +file's ACL with Acl_entries specified in a comma-separated list on the +command line. + + + +While the -d and -m options may be used +in the same command, the -f and -s +options may be used only exclusively. + + + +Directories may contain default ACL entries. Files created +in a directory that contains default ACL entries will have +permissions according to the combination of the current umask, +the explicit permissions requested and the default ACL entries + + + +Limitations: Under Cygwin, the default ACL entries are not taken into +account currently. + + + + +ssp + + +Usage: ssp [options] low_pc high_pc command... + -c, --console-trace trace every EIP value to the console. *Lots* slower. + -d, --disable disable single-stepping by default; use + OutputDebugString ("ssp on") to enable stepping + -e, --enable enable single-stepping by default; use + OutputDebugString ("ssp off") to disable stepping + -h, --help output usage information and exit + -l, --dll enable dll profiling. A chart of relative DLL usage + is produced after the run. + -s, --sub-threads trace sub-threads too. Dangerous if you have + race conditions. + -t, --trace-eip trace every EIP value to a file TRACE.SSP. This + gets big *fast*. + -v, --verbose output verbose messages about debug events. + -V, --version output version information and exit + +Example: ssp 0x401000 0x403000 hello.exe + + + +SSP - The Single Step Profiler + + + +Original Author: DJ Delorie + + + +The SSP is a program that uses the Win32 debug API to run a program +one ASM instruction at a time. It records the location of each +instruction used, how many times that instruction is used, and all +function calls. The results are saved in a format that is usable by +the profiling program gprof, although +gprof will claim the values +are seconds, they really are instruction counts. More on that later. + + + +Because the SSP was originally designed to profile the cygwin DLL, it +does not automatically select a block of code to report statistics on. +You must specify the range of memory addresses to keep track of +manually, but it's not hard to figure out what to specify. Use the +"objdump" program to determine the bounds of the target's ".text" +section. Let's say we're profiling cygwin1.dll. Make sure you've +built it with debug symbols (else gprof won't run) +and run objdump like this: + + +$ objdump -h cygwin1.dll + + +It will print a report like this: + +cygwin1.dll: file format pei-i386 + +Sections: +Idx Name Size VMA LMA File off Algn + 0 .text 0007ea00 61001000 61001000 00000400 2**2 + CONTENTS, ALLOC, LOAD, READONLY, CODE, DATA + 1 .data 00008000 61080000 61080000 0007ee00 2**2 + CONTENTS, ALLOC, LOAD, DATA + . . . + + + + +The only information we're concerned with are the VMA of +the .text section and the VMA of the section after it +(sections are usually contiguous; you can also add the +Size to the VMA to get the end address). In this case, +the VMA is 0x61001000 and the ending address is either +0x61080000 (start of .data method) or 0x0x6107fa00 (VMA+Size +method). + + + +There are two basic ways to use SSP - either profiling a whole +program, or selectively profiling parts of the program. + + + +To profile a whole program, just run ssp without options. +By default, it will step the whole program. Here's a simple example, using +the numbers above: + + +$ ssp 0x61001000 0x61080000 hello.exe + + +This will step the whole program. It will take at least 8 minutes on +a PII/300 (yes, really). When it's done, it will create a file called +"gmon.out". You can turn this data file into a readable report with +gprof: + + +$ gprof -b cygwin1.dll + + +The "-b" means 'skip the help pages'. You can omit this until you're +familiar with the report layout. The gprof documentation +explains a lot about this report, but ssp changes a few +things. For example, the first part of the report reports the amount of time +spent in each function, like this: + + +Each sample counts as 0.01 seconds. + % cumulative self self total + time seconds seconds calls ms/call ms/call name + 10.02 231.22 72.43 46 1574.57 1574.57 strcspn + 7.95 288.70 57.48 130 442.15 442.15 strncasematch + + +The "seconds" columns are really CPU opcodes, 1/100 second per opcode. +So, "231.22" above means 23,122 opcodes. The ms/call values are 10x +too big; 1574.57 means 157.457 opcodes per call. Similar adjustments +need to be made for the "self" and "children" columns in the second +part of the report. + + + +OK, so now we've got a huge report that took a long time to generate, +and we've identified a spot we want to work on optimizing. Let's say +it's the time() function. We can use SSP to selectively profile this +function by using OutputDebugString() to control SSP from within the +program. Here's a sample program: + + + #include <windows.h> + main() + { + time_t t; + OutputDebugString("ssp on"); + time(&t); + OutputDebugString("ssp off"); + } + + + + +Then, add the -d option to ssp to default to +*disabling* profiling. The program will run at full speed until the first +OutputDebugString, then step until the second. +You can then use gprof (as usual) to see the performance +profile for just that portion of the program's execution. + + + +There are many options to ssp. Since step-profiling makes your +program run about 1,000 times slower than normal, it's best to +understand all the options so that you can narrow down the parts +of your program you need to single-step. + + + +-v - verbose. This prints messages about threads +starting and stopping, OutputDebugString calls, DLLs loading, etc. + + + +-t and -c - tracing. +With -t, *every* step's address is written +to the file "trace.ssp". This can be used to help debug functions, +since it can trace multiple threads. Clever use of scripts can match +addresses with disassembled opcodes if needed. Warning: creates +*huge* files, very quickly. -c prints each address to +the console, useful for debugging key chunks of assembler. Use +addr2line -C -f -s -e foo.exe < trace.ssp > lines.ssp +and then perl cvttrace to convert to symbolic traces. + + + +-s - subthreads. Usually, you only need to trace the +main thread, but sometimes you need to trace all threads, so this enables that. +It's also needed when you want to profile a function that only a +subthread calls. However, using OutputDebugString automatically +enables profiling on the thread that called it, not the main thread. + + + +-l - dll profiling. Generates a pretty table of how much +time was spent in each dll the program used. No sense optimizing a function in +your program if most of the time is spent in the DLL. +I usually use the -v, -s, and +-l options: + + +$ ssp -v -s -l -d 0x61001000 0x61080000 hello.exe + -See ) for more information on the mount -table. strace @@ -896,95 +1312,59 @@ Usage: strace.exe [OPTIONS] -p thread 0x40000 (_STRACE_THREAD) Thread-locking calls. - The strace program executes a program, and optionally the children of the program, reporting any Cygwin DLL output -from the program(s) to file. This program is mainly useful for debugging -the Cygwin DLL itself. - - -regtool +from the program(s) to stdout, or to a file with the -o +option. With the -w option, you can start an strace +session in a new window, for example: -Usage: regtool.exe [OPTION] (add | check | get | list | remove | unset) KEY - -Actions: - add KEY\SUBKEY add new SUBKEY - check KEY exit 0 if KEY exists, 1 if not - get KEY\VALUE prints VALUE to stdout - list KEY list SUBKEYs and VALUEs - remove KEY remove KEY - set KEY\VALUE [data ...] set VALUE - unset KEY\VALUE removes VALUE from KEY - -Options for 'list' Action: - -k, --keys print only KEYs - -l, --list print only VALUEs - -p, --postfix like ls -p, appends '\' postfix to KEY names +$ strace -o tracing_output -w sh -c 'while true; do echo "tracing..."; done' & + +This is particularly useful for strace sessions that +take a long time to complete. + -Options for 'set' Action: - -e, --expand-string set type to REG_EXPAND_SZ - -i, --integer set type to REG_DWORD - -m, --multi-string set type to REG_MULTI_SZ - -s, --string set type to REG_SZ + +Note that strace is a standalone Windows program and so does +not rely on the Cygwin DLL itself (you can verify this with +cygcheck). As a result it does not understand POSIX +pathnames or symlinks. This program is mainly useful for debugging the +Cygwin DLL itself. -Other Options: - -h, --help output usage information and exit - -q, --quiet no error output, just nonzero return if KEY/VALUE missing - -v, --verbose verbose output, including VALUE contents when applicable - -V, --version output version information and exit + -KEY is in the format [host]\prefix\KEY\KEY\VALUE, where host is optional -remote host in either \\hostname or hostname: format and prefix is any of: - root HKCR HKEY_CLASSES_ROOT (local only) - config HKCC HKEY_CURRENT_CONFIG (local only) - user HKCU HKEY_CURRENT_USER (local only) - machine HKLM HKEY_LOCAL_MACHINE - users HKU HKEY_USERS +umount -You can use forward slash ('/') as a separator instead of backslash, in -that case backslash is treated as escape character -Example: regtool.exe get '\user\software\Microsoft\Clock\iFormat' + +Usage: umount.exe [OPTION] [] + -A, --remove-all-mounts remove all mounts + -c, --remove-cygdrive-prefix remove cygdrive prefix + -h, --help output usage information and exit + -s, --system remove system mount (default) + -S, --remove-system-mounts remove all system mounts + -u, --user remove user mount + -U, --remove-user-mounts remove all user mounts + -v, --version output version information and exit -The regtool program allows shell scripts -to access and modify the Windows registry. Note that modifying the -Windows registry is dangerous, and carelessness here can result -in an unusable system. Be careful. - -The -v option means "verbose". For most -commands, this causes additional or lengthier messages to be printed. -Conversely, the -q option supresses error messages, -so you can use the exit status of the program to detect if a key -exists or not (for example). - -The list command lists the subkeys and values -belonging to the given key. The add command adds a -new key. The remove command removes a key. Note -that you may need to remove everything in the key before you may -remove it, but don't rely on this stopping you from accidentally -removing too much. The check command checks to see -if a key exists (the exit code of the program is zero if it does, -nonzero if it does not). - -The set command sets a value within a key. --i means the value is an integer (DWORD). --s means the value is a string. --e means it's an expanding string (it contains -embedded environment variables). -m means it's a -multi-string (list). If you don't specify one of these, it tries to -guess the type based on the value you give. If it looks like a -number, it's a number. If it starts with a percent, it's an expanding -string. If you give multiple values, it's a multi-string. Else, it's -a regular string. +The umount program removes mounts from the +mount table. If you specify a POSIX path that corresponds to a +current mount point, umount will remove it from the +system registry area. (Administrator priviledges are required). +The -u flag may be used to specify removing the mount +from the user-specific registry area instead. -The unset command removes a value from a key. -The get command gets the value of a value of a key, -and prints it (and nothing else) to stdout. Note: if the value -doesn't exist, an error message is printed and the program returns a -non-zero exit code. If you give -q, it doesn't -print the message but does return the non-zero exit code. +The umount utility may also be used to remove +all mounts of a particular type. With the extended options it is +possible to remove all mounts (-A), all +cygdrive automatically-mounted mounts (-c), all +mounts in the current user's registry area (-U), +or all mounts in the system-wide registry area (-S) +(with Administrator privileges). +See for more information on the mount +table.