Index: snapshot/win/process_snapshot_win.cc |
diff --git a/snapshot/win/process_snapshot_win.cc b/snapshot/win/process_snapshot_win.cc |
index b9df62c0ab4c011109ab9054f5b556141958d658..e64d783d5b1ab4ef2b78d7894448b376b1c52b78 100644 |
--- a/snapshot/win/process_snapshot_win.cc |
+++ b/snapshot/win/process_snapshot_win.cc |
@@ -48,10 +48,11 @@ bool ProcessSnapshotWin::Initialize(HANDLE process, |
return false; |
system_.Initialize(&process_reader_); |
- WinVMAddress peb_address; |
- WinVMSize peb_size; |
- process_reader_.GetProcessInfo().Peb(&peb_address, &peb_size); |
- peb_.Initialize(&process_reader_, peb_address, peb_size); |
+ |
+ if (process_reader_.Is64Bit()) |
+ InitializePebData<process_types::internal::Traits64>(); |
+ else |
+ InitializePebData<process_types::internal::Traits32>(); |
InitializeThreads(); |
InitializeModules(); |
@@ -186,7 +187,8 @@ const ExceptionSnapshot* ProcessSnapshotWin::Exception() const { |
std::vector<const MemorySnapshot*> ProcessSnapshotWin::ExtraMemory() const { |
INITIALIZATION_STATE_DCHECK_VALID(initialized_); |
std::vector<const MemorySnapshot*> extra_memory; |
- extra_memory.push_back(&peb_); |
+ for (const auto& peb_memory : peb_memory_) |
+ extra_memory.push_back(peb_memory); |
return extra_memory; |
} |
@@ -214,4 +216,51 @@ void ProcessSnapshotWin::InitializeModules() { |
} |
} |
+template <class Traits> |
+void ProcessSnapshotWin::InitializePebData() { |
+ WinVMAddress peb_address; |
+ WinVMSize peb_size; |
+ process_reader_.GetProcessInfo().Peb(&peb_address, &peb_size); |
+ peb_memory_.push_back(CreateMemorySnapshot(peb_address, peb_size)); |
+ |
+ process_types::PEB<Traits> peb_data; |
+ if (!process_reader_.ReadMemory(peb_address, peb_size, &peb_data)) { |
+ LOG(ERROR) << "ReadMemory PEB"; |
+ return; |
+ } |
+ peb_memory_.push_back(CreateMemorySnapshot( |
+ peb_data.Ldr, sizeof(process_types::PEB_LDR_DATA<Traits>))); |
+ |
+ process_types::RTL_USER_PROCESS_PARAMETERS<Traits> process_parameters; |
+ if (!process_reader_.ReadMemory(peb_data.ProcessParameters, |
+ sizeof(process_parameters), |
+ &process_parameters)) { |
+ LOG(ERROR) << "ReadMemory RTL_USER_PROCESS_PARAMETERS"; |
+ return; |
+ } |
+ |
+ peb_memory_.push_back(CreateMemorySnapshotForUNICODE_STRING( |
+ process_parameters.CurrentDirectory.DosPath)); |
+ peb_memory_.push_back( |
+ CreateMemorySnapshotForUNICODE_STRING(process_parameters.DllPath)); |
Mark Mentovai
2015/09/25 21:10:16
The “now” section of the CL description seems to i
scottmg
2015/09/25 22:52:25
Yes, it's often null in a live process too. It's t
|
+ peb_memory_.push_back( |
+ CreateMemorySnapshotForUNICODE_STRING(process_parameters.ImagePathName)); |
+ peb_memory_.push_back( |
+ CreateMemorySnapshotForUNICODE_STRING(process_parameters.CommandLine)); |
+ // http://blogs.msdn.com/b/oldnewthing/archive/2010/02/03/9957320.aspx On |
+ // newer OSs there's no stated limit, but in practice grabbing 32k should be |
+ // more than enough. |
+ const int kMaxEnvironmentBlockSize = 32768; |
+ peb_memory_.push_back(CreateMemorySnapshot(process_parameters.Environment, |
+ kMaxEnvironmentBlockSize)); |
Mark Mentovai
2015/09/25 21:10:16
It might be worth trying to work out the actual si
scottmg
2015/09/25 22:52:25
I don't know of any way other than probing the tar
Mark Mentovai
2015/09/25 23:11:59
scottmg wrote:
scottmg
2015/09/26 00:07:38
Yeah, that was my thinking too. But then I was wor
|
+} |
+ |
+internal::MemorySnapshotWin* ProcessSnapshotWin::CreateMemorySnapshot( |
+ WinVMAddress address, |
+ WinVMAddress size) { |
Mark Mentovai
2015/09/25 21:10:16
If size is 0, it’s probably worth not creating any
scottmg
2015/09/25 22:52:25
Done.
|
+ internal::MemorySnapshotWin* ret = new internal::MemorySnapshotWin(); |
+ ret->Initialize(&process_reader_, address, size); |
+ return ret; |
+} |
+ |
} // namespace crashpad |