22 releases

0.5.0 Oct 28, 2024
0.4.13 Nov 17, 2023
0.4.12 Jun 8, 2023
0.4.11 Dec 5, 2022
0.1.0 Jul 7, 2019

#45 in Operating systems

Download history 1256/week @ 2024-08-22 1414/week @ 2024-08-29 1845/week @ 2024-09-05 2056/week @ 2024-09-12 2171/week @ 2024-09-19 3134/week @ 2024-09-26 6527/week @ 2024-10-03 4877/week @ 2024-10-10 3109/week @ 2024-10-17 5786/week @ 2024-10-24 3242/week @ 2024-10-31 3628/week @ 2024-11-07 2141/week @ 2024-11-14 2176/week @ 2024-11-21 1175/week @ 2024-11-28 1532/week @ 2024-12-05

7,507 downloads per month
Used in 14 crates (10 directly)

MIT license

305KB
9K SLoC

remoteprocess

Build Status FreeBSD Build Status

This crate provides a cross platform way of querying information about other processes running on the system. This let's you build profiling and debugging tools.

Features:

  • Suspending the execution of the process
  • Getting the process executable name and current working directory
  • Get the command line of the process
  • Listing all the threads in the process
  • Get all the child processes of the process
  • Figure out if a thread is active or not
  • Read memory from the other processes (using read_proceses_memory crate)

By enabling the unwind feature you can also:

  • Get a stack trace for a thread in the target process
  • Resolve symbols for an address in the other process

This crate provides implementations for Linux, OSX, FreeBSD and Windows

Usage

To show a stack trace from each thread in a program

fn get_backtrace(pid: remoteprocess::Pid) -> Result<(), remoteprocess::Error> {
    // Create a new handle to the process
    let process = remoteprocess::Process::new(pid)?;

    // lock the process to get a consistent snapshot. Unwinding will fail otherwise
    let _lock = process.lock()?;

    // Create a stack unwind object, and use it to get the stack for each thread
    let unwinder = process.unwinder()?;
    for thread in process.threads()?.iter() {
        println!("Thread {}", thread);

        // Iterate over the callstack for the current thread
        for ip in unwinder.cursor(thread)? {
            let ip = ip?;

            // Lookup the current stack frame containing a filename/function/linenumber etc
            // for the current address
            unwinder.symbolicate(ip, &mut |sf| {
                println!("{}", sf);
            })?;
        }
    }
    Ok(())
}

A complete program with this code can be found in the examples folder.

Limitations

Currently we only have implementations for getting stack traces on some platforms:

Linux Windows OSX FreeBSD
i686
x86-64 yes yes
ARM yes
Aarch64 yes

Credits

This crate heavily relies on the gimli project. Gimli is an amazing tool for parsing DWARF debugging information, and we are using it here for looking up filename and line numbers given an instruction pointer.

Dependencies

~3–12MB
~144K SLoC