Chromium Code Reviews| Index: snapshot/win/capture_context_memory.cc |
| diff --git a/snapshot/win/capture_context_memory.cc b/snapshot/win/capture_context_memory.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..1c69cc36674c159369045e790a9e58d4f05bf49a |
| --- /dev/null |
| +++ b/snapshot/win/capture_context_memory.cc |
| @@ -0,0 +1,78 @@ |
| +// Copyright 2015 The Crashpad Authors. All rights reserved. |
| +// |
| +// Licensed under the Apache License, Version 2.0 (the "License"); |
| +// you may not use this file except in compliance with the License. |
| +// You may obtain a copy of the License at |
| +// |
| +// http://www.apache.org/licenses/LICENSE-2.0 |
| +// |
| +// Unless required by applicable law or agreed to in writing, software |
| +// distributed under the License is distributed on an "AS IS" BASIS, |
| +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| +// See the License for the specific language governing permissions and |
| +// limitations under the License. |
| + |
| +#include "snapshot/win/capture_context_memory.h" |
| + |
| +#include "snapshot/win/memory_snapshot_win.h" |
| +#include "snapshot/win/process_reader_win.h" |
| + |
| +namespace crashpad { |
| +namespace internal { |
| + |
| +namespace { |
| + |
| +void MaybeCaptureMemoryAround(ProcessReaderWin* process_reader, |
| + WinVMAddress address, |
| + PointerVector<MemorySnapshotWin>* into) { |
| + if (address > 0x10000) { |
| + const WinVMSize kRegisterByteOffset = 32; |
| + const WinVMAddress target = address - kRegisterByteOffset; |
| + const WinVMSize size = 128; |
| + if (process_reader->GetProcessInfo().LoggingRangeIsFullyReadable( |
|
Mark Mentovai
2016/01/08 19:20:52
If the address is readable at all, we should do as
scottmg
2016/01/08 19:52:02
Done.
|
| + CheckedRange<WinVMAddress, WinVMSize>(target, size))) { |
| + internal::MemorySnapshotWin* snapshot = new internal::MemorySnapshotWin(); |
| + snapshot->Initialize(process_reader, target, size); |
| + into->push_back(snapshot); |
| + } |
| + } |
| +} |
| + |
| +} // namespace |
| + |
| +void CaptureMemoryPointedToByContext(const CPUContext& context, |
| + ProcessReaderWin* process_reader, |
| + PointerVector<MemorySnapshotWin>* into) { |
| +#if defined(ARCH_CPU_X86_64) |
| + if (context.architecture == kCPUArchitectureX86_64) { |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->rax, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->rbx, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->rcx, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->rdx, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->rdi, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->rsi, into); |
|
Mark Mentovai
2016/01/08 19:20:52
If bp doesn’t point to the thread’s stack, you sho
scottmg
2016/01/08 19:52:02
Done.
|
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->r8, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->r9, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->r10, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->r11, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->r12, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->r13, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->r14, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->r15, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86_64->rip, into); |
| + } else { |
| +#endif |
| + MaybeCaptureMemoryAround(process_reader, context.x86->eax, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86->ebx, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86->ecx, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86->edx, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86->edi, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86->esi, into); |
| + MaybeCaptureMemoryAround(process_reader, context.x86->eip, into); |
| +#if defined(ARCH_CPU_X86_64) |
| + } |
| +#endif |
| +} |
| + |
| +} // namespace internal |
| +} // namespace crashpad |