Code:
/ Net / Net / 3.5.50727.3053 / DEVDIV / depot / DevDiv / releases / whidbey / netfxsp / ndp / clr / src / BCL / System / Diagnostics / Debugger.cs / 1 / Debugger.cs
// ==++== // // Copyright (c) Microsoft Corporation. All rights reserved. // // ==--== // The Debugger class is a part of the System.Diagnostics package // and is used for communicating with a debugger. namespace System.Diagnostics { using System; using System.IO; using System.Collections; using System.Reflection; using System.Runtime.CompilerServices; using System.Security; using System.Security.Permissions; // No data, does not need to be marked with the serializable attribute [System.Runtime.InteropServices.ComVisible(true)] public sealed class Debugger { // Break causes a breakpoint to be signalled to an attached debugger. If no debugger // is attached, the user is asked if he wants to attach a debugger. If yes, then the // debugger is launched. public static void Break() { if (!IsDebuggerAttached()) { // Try and demand UnmanagedCodePermission. This is done in a try block because if this // fails we want to be able to silently eat the exception and just return so // that the call to Break does not possibly cause an unhandled exception. // The idea here is that partially trusted code shouldn't be able to launch a debugger // without the user going through Watson. try { new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand(); } // If we enter this block, we do not have permission to break into the debugger // and so we just return. catch (SecurityException) { return; } } // Causing a break is now allowed. BreakInternal(); } static void BreakCanThrow() { if (!IsDebuggerAttached()) { new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand(); } // Causing a break is now allowed. BreakInternal(); } [MethodImplAttribute(MethodImplOptions.InternalCall)] private static extern void BreakInternal(); // Launch launches & attaches a debugger to the process. If a debugger is already attached, // nothing happens. // public static bool Launch() { if (IsDebuggerAttached()) return (true); // Try and demand UnmanagedCodePermission. This is done in a try block because if this // fails we want to be able to silently eat the exception and just return so // that the call to Break does not possibly cause an unhandled exception. // The idea here is that partially trusted code shouldn't be able to launch a debugger // without the user going through Watson. try { new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand(); } // If we enter this block, we do not have permission to break into the debugger // and so we just return. catch (SecurityException) { return (false); } // Causing the debugger to launch is now allowed. return (LaunchInternal()); } [MethodImplAttribute(MethodImplOptions.InternalCall)] private static extern bool LaunchInternal(); // Returns whether or not a debugger is attached to the process. // public static bool IsAttached { get { return IsDebuggerAttached(); } } [MethodImplAttribute(MethodImplOptions.InternalCall)] private static extern bool IsDebuggerAttached(); // Constants representing the importance level of messages to be logged. // // An attached debugger can enable or disable which messages will // actually be reported to the user through the COM+ debugger // services API. This info is communicated to the runtime so only // desired events are actually reported to the debugger. // // Constant representing the default category public static readonly String DefaultCategory = null; // Posts a message for the attached debugger. If there is no // debugger attached, has no effect. The debugger may or may not // report the message depending on its settings. [MethodImplAttribute(MethodImplOptions.InternalCall)] public static extern void Log(int level, String category, String message); // Checks to see if an attached debugger has logging enabled // [MethodImplAttribute(MethodImplOptions.InternalCall)] public static extern bool IsLogging(); } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007. // ==++== // // Copyright (c) Microsoft Corporation. All rights reserved. // // ==--== // The Debugger class is a part of the System.Diagnostics package // and is used for communicating with a debugger. namespace System.Diagnostics { using System; using System.IO; using System.Collections; using System.Reflection; using System.Runtime.CompilerServices; using System.Security; using System.Security.Permissions; // No data, does not need to be marked with the serializable attribute [System.Runtime.InteropServices.ComVisible(true)] public sealed class Debugger { // Break causes a breakpoint to be signalled to an attached debugger. If no debugger // is attached, the user is asked if he wants to attach a debugger. If yes, then the // debugger is launched. public static void Break() { if (!IsDebuggerAttached()) { // Try and demand UnmanagedCodePermission. This is done in a try block because if this // fails we want to be able to silently eat the exception and just return so // that the call to Break does not possibly cause an unhandled exception. // The idea here is that partially trusted code shouldn't be able to launch a debugger // without the user going through Watson. try { new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand(); } // If we enter this block, we do not have permission to break into the debugger // and so we just return. catch (SecurityException) { return; } } // Causing a break is now allowed. BreakInternal(); } static void BreakCanThrow() { if (!IsDebuggerAttached()) { new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand(); } // Causing a break is now allowed. BreakInternal(); } [MethodImplAttribute(MethodImplOptions.InternalCall)] private static extern void BreakInternal(); // Launch launches & attaches a debugger to the process. If a debugger is already attached, // nothing happens. // public static bool Launch() { if (IsDebuggerAttached()) return (true); // Try and demand UnmanagedCodePermission. This is done in a try block because if this // fails we want to be able to silently eat the exception and just return so // that the call to Break does not possibly cause an unhandled exception. // The idea here is that partially trusted code shouldn't be able to launch a debugger // without the user going through Watson. try { new SecurityPermission(SecurityPermissionFlag.UnmanagedCode).Demand(); } // If we enter this block, we do not have permission to break into the debugger // and so we just return. catch (SecurityException) { return (false); } // Causing the debugger to launch is now allowed. return (LaunchInternal()); } [MethodImplAttribute(MethodImplOptions.InternalCall)] private static extern bool LaunchInternal(); // Returns whether or not a debugger is attached to the process. // public static bool IsAttached { get { return IsDebuggerAttached(); } } [MethodImplAttribute(MethodImplOptions.InternalCall)] private static extern bool IsDebuggerAttached(); // Constants representing the importance level of messages to be logged. // // An attached debugger can enable or disable which messages will // actually be reported to the user through the COM+ debugger // services API. This info is communicated to the runtime so only // desired events are actually reported to the debugger. // // Constant representing the default category public static readonly String DefaultCategory = null; // Posts a message for the attached debugger. If there is no // debugger attached, has no effect. The debugger may or may not // report the message depending on its settings. [MethodImplAttribute(MethodImplOptions.InternalCall)] public static extern void Log(int level, String category, String message); // Checks to see if an attached debugger has logging enabled // [MethodImplAttribute(MethodImplOptions.InternalCall)] public static extern bool IsLogging(); } } // File provided for Reference Use Only by Microsoft Corporation (c) 2007.
Link Menu
This book is available now!
Buy at Amazon US or
Buy at Amazon UK
- WebPartDisplayMode.cs
- objectresult_tresulttype.cs
- SmiRecordBuffer.cs
- XPathSelectionIterator.cs
- NetPeerTcpBinding.cs
- WebPartChrome.cs
- DtrList.cs
- Itemizer.cs
- RegisteredArrayDeclaration.cs
- UserControlAutomationPeer.cs
- Point3DAnimationBase.cs
- MouseBinding.cs
- SQLDoubleStorage.cs
- XhtmlConformanceSection.cs
- DivideByZeroException.cs
- ColorAnimation.cs
- EventLogPermissionEntry.cs
- WinCategoryAttribute.cs
- ResourceAssociationTypeEnd.cs
- DateTimeConverter.cs
- BrowserCapabilitiesCompiler.cs
- WriteLineDesigner.xaml.cs
- MsmqTransportSecurityElement.cs
- WebPartTransformerAttribute.cs
- FrameworkElement.cs
- InputLanguage.cs
- COAUTHIDENTITY.cs
- TransactionScopeDesigner.cs
- TimeoutException.cs
- UrlMappingsSection.cs
- PrinterUnitConvert.cs
- ForeignConstraint.cs
- StatusBarItemAutomationPeer.cs
- Rect.cs
- CqlLexer.cs
- HostVisual.cs
- AppDomain.cs
- Int32AnimationUsingKeyFrames.cs
- IndividualDeviceConfig.cs
- WorkerRequest.cs
- ActivityCodeGenerator.cs
- RectKeyFrameCollection.cs
- IndicFontClient.cs
- ItemChangedEventArgs.cs
- Int32AnimationBase.cs
- SmtpDigestAuthenticationModule.cs
- ProxyWebPartConnectionCollection.cs
- HttpModuleAction.cs
- columnmapkeybuilder.cs
- DataGridViewTextBoxCell.cs
- handlecollector.cs
- ConfigurationSectionHelper.cs
- _LoggingObject.cs
- ClickablePoint.cs
- AnnotationResource.cs
- WebPartTracker.cs
- HttpContext.cs
- ProgressBar.cs
- HostProtectionException.cs
- FontStyles.cs
- ReachIDocumentPaginatorSerializer.cs
- CharEnumerator.cs
- WebPartsSection.cs
- HttpModuleActionCollection.cs
- NumericUpDownAccelerationCollection.cs
- ValueQuery.cs
- UITypeEditor.cs
- FileIOPermission.cs
- LayoutEngine.cs
- DSASignatureFormatter.cs
- ItemCheckEvent.cs
- ResourceFallbackManager.cs
- WizardPanel.cs
- ServiceOperation.cs
- EventHandlersStore.cs
- LinearQuaternionKeyFrame.cs
- SiteMapNodeItemEventArgs.cs
- SQLMoney.cs
- DelimitedListTraceListener.cs
- SmiEventSink_DeferedProcessing.cs
- CollectionsUtil.cs
- Bezier.cs
- ScrollProperties.cs
- QueryOptionExpression.cs
- AttachmentService.cs
- SqlOuterApplyReducer.cs
- XmlSerializer.cs
- ModelUIElement3D.cs
- panel.cs
- GridProviderWrapper.cs
- COM2TypeInfoProcessor.cs
- ProfileServiceManager.cs
- SelectionService.cs
- OverflowException.cs
- WriteableOnDemandStream.cs
- AnnotationMap.cs
- WeakEventManager.cs
- RoutedCommand.cs
- WindowsFormsLinkLabel.cs
- MemberProjectedSlot.cs