delorie.com/archives/browse.cgi | search |
Mailing-List: | contact cygwin-developers-help AT sourceware DOT cygnus DOT com; run by ezmlm |
Sender: | cygwin-developers-owner AT sourceware DOT cygnus DOT com |
Delivered-To: | mailing list cygwin-developers AT sourceware DOT cygnus DOT com |
Date: | Sun, 9 May 1999 11:20:51 -0400 |
From: | Chris Faylor <cgf AT cygnus DOT com> |
To: | Egor Duda <deo AT logos-m DOT ru> |
Cc: | cygwin-developers <cygwin-developers AT sourceware DOT cygnus DOT com> |
Subject: | Re: new core files |
Message-ID: | <19990509112051.A598@cygnus.com> |
References: | <15662 DOT 990509 AT logos-m DOT ru> |
Mime-Version: | 1.0 |
X-Mailer: | Mutt 0.95.3i |
In-Reply-To: | <15662.990509@logos-m.ru>; from Egor Duda on Sun, May 09, 1999 at 03:54:36PM +0400 |
On Sun, May 09, 1999 at 03:54:36PM +0400, Egor Duda wrote: > The problem is to tell debug info from data segment by looking into > process's virtual memory. The only way i know is to try to find out > full path to dll or exe, which is mapped into given part of process's > address space, and to extract segment info from the image. But the > only "legal" way to do it, afaik, is to use microsoft's nt-only > psapi.dll. It's possible to do this by inspecting the tortuous chain of information in memory. There are hints of this in DejaNews but I've never seen actual code which does this. -chris
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |