1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
//! Get virtual memory maps from another process
//!
//! This crate provides a function—[`get_process_maps`](linux_maps/fn.get_process_maps.html)
//! that returns a Vec of [`MapRange`](linux_maps/struct.MapRange.html) structs.
//!
//! This code works on Linux, OSX and Windows. Each operating system has different
//! implementations, but the functions and struct's for each OS share the same
//! interface - so this can be used generically across operating systems.
//!
//! Note: on OSX this requires root access, and even with root will still not
//! work on processes that have System Integrity Protection enabled
//! (anything in /usr/bin for example).
//!
//! # Example
//!
//! ```rust,no_run
//! use proc_maps::{get_process_maps, MapRange, Pid};
//!
//! let maps = get_process_maps(123456 as Pid).unwrap();
//! for map in maps {
//! println!("Filename {:?} Address {} Size {}", map.filename(), map.start(), map.size());
//! }
//! ```
extern crate libc;
extern crate failure;
#[cfg(target_os = "macos")]
extern crate mach;
#[cfg(target_os = "macos")]
extern crate libproc;
#[cfg(windows)]
extern crate winapi;
#[cfg(target_os = "macos")]
pub mod mac_maps;
#[cfg(target_os = "macos")]
pub use mac_maps::{get_process_maps, MapRange, Pid};
#[cfg(target_os = "linux")]
pub mod linux_maps;
#[cfg(target_os = "linux")]
pub use linux_maps::{get_process_maps, MapRange, Pid};
#[cfg(windows)]
pub mod win_maps;
#[cfg(windows)]
pub use win_maps::{get_process_maps, MapRange, Pid};
fn map_contain_addr(map: &MapRange, addr: usize) -> bool {
let start = map.start();
(addr >= start) && (addr < (start + map.size()))
}
/// Returns whether or not any MapRange contains the given address
/// Note: this will only work correctly on OSX and Linux.
pub fn maps_contain_addr(addr: usize, maps: &[MapRange]) -> bool {
maps.iter().any({ |map| map_contain_addr(map, addr) })
}