1
1
use std:: collections:: HashMap ;
2
2
use std:: ffi:: { c_void, OsString } ;
3
3
use std:: fmt:: Debug ;
4
- use std:: mem:: { self } ;
5
4
use std:: os:: windows:: ffi:: OsStringExt ;
6
5
use std:: path:: { Path , PathBuf } ;
7
6
use std:: { ptr, slice} ;
@@ -30,8 +29,8 @@ use windows::Win32::System::LibraryLoader::{
30
29
GetModuleFileNameW , GetModuleHandleExW , GetProcAddress , GET_MODULE_HANDLE_EX_FLAG_FROM_ADDRESS ,
31
30
} ;
32
31
use windows:: Win32 :: System :: Threading :: {
33
- CreateProcessAsUserW , CreateRemoteThread , GetCurrentProcess , GetExitCodeProcess , OpenProcess , OpenProcessToken ,
34
- QueryFullProcessImageNameW , TerminateProcess , WaitForSingleObject , CREATE_UNICODE_ENVIRONMENT ,
32
+ CreateProcessAsUserW , CreateRemoteThread , GetCurrentProcess , GetExitCodeProcess , GetProcessId , OpenProcess ,
33
+ OpenProcessToken , QueryFullProcessImageNameW , TerminateProcess , WaitForSingleObject , CREATE_UNICODE_ENVIRONMENT ,
35
34
EXTENDED_STARTUPINFO_PRESENT , INFINITE , LPPROC_THREAD_ATTRIBUTE_LIST , LPTHREAD_START_ROUTINE , PEB ,
36
35
PROCESS_ACCESS_RIGHTS , PROCESS_BASIC_INFORMATION , PROCESS_CREATION_FLAGS , PROCESS_INFORMATION , PROCESS_NAME_WIN32 ,
37
36
PROCESS_TERMINATE , STARTUPINFOEXW , STARTUPINFOW , STARTUPINFOW_FLAGS ,
@@ -122,7 +121,7 @@ impl Process {
122
121
let thread = self . create_thread (
123
122
// SAFETY: `LoadLibraryW` fits the type. It takes one argument that is the name of the library.
124
123
Some ( unsafe {
125
- mem:: transmute :: < * const c_void , unsafe extern "system" fn ( * mut c_void ) -> u32 > ( load_library)
124
+ core :: mem:: transmute :: < * const c_void , unsafe extern "system" fn ( * mut c_void ) -> u32 > ( load_library)
126
125
} ) ,
127
126
Some ( allocation. address ) ,
128
127
) ?;
@@ -152,7 +151,7 @@ impl Process {
152
151
) ?
153
152
} ;
154
153
155
- // SAFETY: The handle is owned by us, we opened the ressource above.
154
+ // SAFETY: The handle is owned by us, we opened the resource above.
156
155
let handle = unsafe { Handle :: new_owned ( handle) } ?;
157
156
158
157
Ok ( Thread :: from ( handle) )
@@ -242,6 +241,11 @@ impl Process {
242
241
} )
243
242
}
244
243
244
+ pub fn pid ( & self ) -> u32 {
245
+ // SAFETY: Safe to call with a valid process handle.
246
+ unsafe { GetProcessId ( self . handle . raw ( ) ) }
247
+ }
248
+
245
249
/// Reads process memory at a specified address into a buffer.
246
250
/// The buffer is not read.
247
251
/// Returns the number of bytes read.
@@ -266,13 +270,13 @@ impl Process {
266
270
Ok ( bytes_read)
267
271
}
268
272
269
- /// Reads a stucture from process memory at a specified address.
273
+ /// Reads a structure from process memory at a specified address.
270
274
///
271
275
/// # Safety
272
276
///
273
277
/// - `address` must point to a valid and correctly sized instance of the structure.
274
278
pub unsafe fn read_struct < T : Sized > ( & self , address : * const c_void ) -> Result < T > {
275
- let mut buf = vec ! [ 0 ; mem :: size_of:: <T >( ) ] ;
279
+ let mut buf = vec ! [ 0 ; size_of:: <T >( ) ] ;
276
280
277
281
// SAFETY: Based on the security requirements of the function, the `address` should
278
282
// point to a valid and correctly sized instance of `T`.
@@ -286,7 +290,7 @@ impl Process {
286
290
}
287
291
}
288
292
289
- /// Reads a continous array of a structure from process memory at a specified address.
293
+ /// Reads a continuous array of a structure from process memory at a specified address.
290
294
///
291
295
/// # Safety
292
296
///
@@ -301,10 +305,10 @@ impl Process {
301
305
// However, we assume that the data will be alined as `Vec` wants.
302
306
let data = unsafe { data. align_to_mut :: < u8 > ( ) . 1 } ;
303
307
304
- // SAFETY: `read_memory` does not read `data`, so we can safely pass an unitialized buffer.
308
+ // SAFETY: `read_memory` does not read `data`, so we can safely pass an uninitialized buffer.
305
309
let read_bytes = unsafe { self . read_memory ( address. cast ( ) , data) } ?;
306
310
307
- if count * mem :: size_of :: < T > ( ) == read_bytes {
311
+ if count * size_of :: < T > ( ) == read_bytes {
308
312
// SAFETY: Buffer can hold `count` items and was filled up to that point.
309
313
unsafe { buf. set_len ( count) } ;
310
314
@@ -380,31 +384,31 @@ impl Peb<'_> {
380
384
let image_path_name = unsafe {
381
385
self . process . read_array (
382
386
raw_params. ImagePathName . Buffer . as_ptr ( ) ,
383
- raw_params. ImagePathName . Length as usize / mem :: size_of :: < u16 > ( ) ,
387
+ raw_params. ImagePathName . Length as usize / size_of :: < u16 > ( ) ,
384
388
) ?
385
389
} ;
386
390
387
391
// SAFETY: We assume `raw_params.CommandLine` is truthful and valid.
388
392
let command_line = unsafe {
389
393
self . process . read_array (
390
394
raw_params. CommandLine . Buffer . as_ptr ( ) ,
391
- raw_params. CommandLine . Length as usize / mem :: size_of :: < u16 > ( ) ,
395
+ raw_params. CommandLine . Length as usize / size_of :: < u16 > ( ) ,
392
396
) ?
393
397
} ;
394
398
395
399
// SAFETY: We assume `raw_params.DesktopInfo` is truthful and valid.
396
400
let desktop = unsafe {
397
401
self . process . read_array (
398
402
raw_params. DesktopInfo . Buffer . as_ptr ( ) ,
399
- raw_params. DesktopInfo . Length as usize / mem :: size_of :: < u16 > ( ) ,
403
+ raw_params. DesktopInfo . Length as usize / size_of :: < u16 > ( ) ,
400
404
) ?
401
405
} ;
402
406
403
407
// SAFETY: We assume `raw_params.CurrentDirectory` is truthful and valid.
404
408
let working_directory = unsafe {
405
409
self . process . read_array (
406
410
raw_params. CurrentDirectory . DosPath . Buffer . as_ptr ( ) ,
407
- raw_params. CurrentDirectory . DosPath . Length as usize / mem :: size_of :: < u16 > ( ) ,
411
+ raw_params. CurrentDirectory . DosPath . Length as usize / size_of :: < u16 > ( ) ,
408
412
) ?
409
413
} ;
410
414
@@ -579,8 +583,8 @@ impl ProcessEntry32Iterator {
579
583
} ;
580
584
581
585
// SAFETY: It is safe to zero out the structure as it is a simple POD type.
582
- let mut process_entry: PROCESSENTRY32W = unsafe { mem:: zeroed ( ) } ;
583
- process_entry. dwSize = mem :: size_of :: < PROCESSENTRY32W > ( )
586
+ let mut process_entry: PROCESSENTRY32W = unsafe { core :: mem:: zeroed ( ) } ;
587
+ process_entry. dwSize = size_of :: < PROCESSENTRY32W > ( )
584
588
. try_into ( )
585
589
. expect ( "BUG: PROCESSENTRY32W size always fits in u32" ) ;
586
590
@@ -700,7 +704,7 @@ pub fn create_process_as_user(
700
704
// SAFETY: As per `CreateEnvironmentBlock` documentation: We must specify
701
705
// `CREATE_UNICODE_ENVIRONMENT` and call `DestroyEnvironmentBlock` after
702
706
// `CreateProcessAsUser` call.
703
- // - `CREATE_UNICODE_ENVIRONMENT` is always set unconditionaly .
707
+ // - `CREATE_UNICODE_ENVIRONMENT` is always set unconditionally .
704
708
// - `DestroyEnvironmentBlock` is called in the `ProcessEnvironment` destructor.
705
709
//
706
710
// Therefore, all preconditions are met to safely call `CreateEnvironmentBlock`.
@@ -742,10 +746,10 @@ pub fn create_process_as_user(
742
746
)
743
747
} ?;
744
748
745
- // SAFETY: The handle is owned by us, we opened the ressource above.
749
+ // SAFETY: The handle is owned by us, we opened the resource above.
746
750
let process = unsafe { Handle :: new_owned ( raw_process_information. hProcess ) . map ( Process :: from) ? } ;
747
751
748
- // SAFETY: The handle is owned by us, we opened the ressource above.
752
+ // SAFETY: The handle is owned by us, we opened the resource above.
749
753
let thread = unsafe { Handle :: new_owned ( raw_process_information. hThread ) . map ( Thread :: from) ? } ;
750
754
751
755
Ok ( ProcessInformation {
0 commit comments