Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(178)

Unified Diff: util/win/process_info.cc

Issue 1052813002: win: make CrashpadInfo retrievable (Closed) Base URL: https://chromium.googlesource.com/crashpad/crashpad@master
Patch Set: more fixes Created 5 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « util/win/process_info.h ('k') | util/win/process_info_test.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: util/win/process_info.cc
diff --git a/util/win/process_info.cc b/util/win/process_info.cc
index cc10fbc57ca11f936b9e7d88b2769dcb586fce24..73c9bf85ad5202e9ea9505c7162649d4322f46a8 100644
--- a/util/win/process_info.cc
+++ b/util/win/process_info.cc
@@ -80,7 +80,7 @@ bool ReadUnicodeString(HANDLE process,
return true;
}
-template <class T> bool ReadStruct(HANDLE process, uintptr_t at, T* into) {
+template <class T> bool ReadStruct(HANDLE process, WinVMAddress at, T* into) {
SIZE_T bytes_read;
if (!ReadProcessMemory(process,
reinterpret_cast<const void*>(at),
@@ -103,11 +103,11 @@ template <class T> bool ReadStruct(HANDLE process, uintptr_t at, T* into) {
template <class Traits>
bool ReadProcessData(HANDLE process,
- uintptr_t peb_address_uintptr,
+ WinVMAddress peb_address_vmaddr,
ProcessInfo* process_info) {
Traits::Pointer peb_address;
- if (!AssignIfInRange(&peb_address, peb_address_uintptr)) {
- LOG(ERROR) << "peb_address_uintptr " << peb_address_uintptr
+ if (!AssignIfInRange(&peb_address, peb_address_vmaddr)) {
+ LOG(ERROR) << "peb_address_vmaddr " << peb_address_vmaddr
<< " out of range";
return false;
}
@@ -131,13 +131,12 @@ bool ReadProcessData(HANDLE process,
if (!ReadStruct(process, peb.Ldr, &peb_ldr_data))
return false;
- std::wstring module;
process_types::LDR_DATA_TABLE_ENTRY<Traits> ldr_data_table_entry;
// Include the first module in the memory order list to get our the main
// executable's name, as it's not included in initialization order below.
if (!ReadStruct(process,
- reinterpret_cast<uintptr_t>(
+ reinterpret_cast<WinVMAddress>(
reinterpret_cast<const char*>(
peb_ldr_data.InMemoryOrderModuleList.Flink) -
offsetof(process_types::LDR_DATA_TABLE_ENTRY<Traits>,
@@ -145,8 +144,14 @@ bool ReadProcessData(HANDLE process,
&ldr_data_table_entry)) {
return false;
}
- if (!ReadUnicodeString(process, ldr_data_table_entry.FullDllName, &module))
+ ProcessInfo::Module module;
+ if (!ReadUnicodeString(
+ process, ldr_data_table_entry.FullDllName, &module.name)) {
return false;
+ }
+ module.dll_base = ldr_data_table_entry.DllBase;
+ module.size = ldr_data_table_entry.SizeOfImage;
+ module.timestamp = ldr_data_table_entry.TimeDateStamp;
process_info->modules_.push_back(module);
// Walk the PEB LDR structure (doubly-linked list) to get the list of loaded
@@ -161,16 +166,21 @@ bool ReadProcessData(HANDLE process,
// to read from the target, and also offset back to the beginning of the
// structure.
if (!ReadStruct(process,
- reinterpret_cast<uintptr_t>(
+ reinterpret_cast<WinVMAddress>(
reinterpret_cast<const char*>(cur) -
offsetof(process_types::LDR_DATA_TABLE_ENTRY<Traits>,
InInitializationOrderLinks)),
&ldr_data_table_entry)) {
break;
}
- // TODO(scottmg): Capture TimeDateStamp, Checksum, etc. too?
- if (!ReadUnicodeString(process, ldr_data_table_entry.FullDllName, &module))
+ // TODO(scottmg): Capture Checksum, etc. too?
+ if (!ReadUnicodeString(
+ process, ldr_data_table_entry.FullDllName, &module.name)) {
break;
+ }
+ module.dll_base = ldr_data_table_entry.DllBase;
+ module.size = ldr_data_table_entry.SizeOfImage;
+ module.timestamp = ldr_data_table_entry.TimeDateStamp;
process_info->modules_.push_back(module);
if (cur == last)
break;
@@ -179,6 +189,12 @@ bool ReadProcessData(HANDLE process,
return true;
}
+ProcessInfo::Module::Module() : name(), dll_base(0), size(0), timestamp() {
+}
+
+ProcessInfo::Module::~Module() {
+}
+
ProcessInfo::ProcessInfo()
: process_id_(),
inherited_from_process_id_(),
@@ -251,7 +267,7 @@ bool ProcessInfo::Initialize(HANDLE process) {
// PebBaseAddress as returned above is what we want for 64-on-64 and 32-on-32,
// but for Wow64, we want to read the 32 bit PEB (a Wow64 process has both).
// The address of this is found by a second call to NtQueryInformationProcess.
- uintptr_t peb_address = process_basic_information.PebBaseAddress;
+ WinVMAddress peb_address = process_basic_information.PebBaseAddress;
if (is_wow64_) {
ULONG_PTR wow64_peb_address;
status =
@@ -309,7 +325,7 @@ bool ProcessInfo::CommandLine(std::wstring* command_line) const {
return true;
}
-bool ProcessInfo::Modules(std::vector<std::wstring>* modules) const {
+bool ProcessInfo::Modules(std::vector<Module>* modules) const {
INITIALIZATION_STATE_DCHECK_VALID(initialized_);
*modules = modules_;
return true;
« no previous file with comments | « util/win/process_info.h ('k') | util/win/process_info_test.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698