11 stable releases

1.0.10 Jan 20, 2024
1.0.9 Aug 9, 2023
1.0.8 Nov 23, 2022
1.0.6 Aug 12, 2021
1.0.0 Jan 17, 2020

#56 in Memory management

Download history 13/week @ 2023-12-11 10/week @ 2024-01-08 16/week @ 2024-01-15 19/week @ 2024-01-22 35/week @ 2024-01-29 1/week @ 2024-02-05 13/week @ 2024-02-12 44/week @ 2024-02-19 187/week @ 2024-02-26 102/week @ 2024-03-04 79/week @ 2024-03-11

412 downloads per month

MIT license

38KB
701 lines

crates.io docs.rs license dependency status

I/O access to virtual memory contents of processes

Read and write data from/to the current process and other processes. This can be used for process monitoring, debugging, testing, communication, etc.

Examples

Reading the stack of the currently running process, through this library:

# fn main() -> Result<(), Box<dyn std::error::Error>> {
use process_vm_io::ProcessVirtualMemoryIO;
use std::io::Read;

// Perform I/O on this current process.
let process_id = std::process::id();
let address_of_pid = &process_id as *const _ as u64;
let mut process_io = unsafe { ProcessVirtualMemoryIO::new(process_id, address_of_pid) }?;

// Read the stack of this current thread.
let mut buffer = [0u8; std::mem::size_of::<u32>()];
process_io.read_exact(&mut buffer)?;
let also_pid = u32::from_ne_bytes(buffer);
assert_eq!(process_id, also_pid);
# Ok(())
# }

Writing to the heap of the currently running process, through this library:

# fn main() -> Result<(), Box<dyn std::error::Error>> {
use process_vm_io::ProcessVirtualMemoryIO;
use std::io::{Seek, Write};

// Perform I/O on this current process.
let process_id = std::process::id();
let mut process_io = unsafe { ProcessVirtualMemoryIO::new(process_id, 0) }?;

// Some location on the heap that we will write to.
let mut pid_on_the_heap = Box::new(0_u32);

// Seek to that location and write the PID there.
process_io.seek(std::io::SeekFrom::Start(pid_on_the_heap.as_mut() as *mut _ as u64))?;
process_io.write(&process_id.to_ne_bytes())?;

assert_eq!(process_id, *pid_on_the_heap);
# Ok(())
# }

Safety

Memory safety

Writing to the virtual memory of a process is a potentially unsafe operation because it may introduce memory unsafety in that process, and may lead to unexpected states in that process. This is even more dangerous when the target process is the currently running process.

Running processes

Performing I/O on a running process is not recommended, because the layout of its virtual memory can change at any time, or the process could simply terminate and vanish. Consider pausing all threads of the specified process before performing I/O on it. This can usually be done via the SIGSTOP and SIGCONT POSIX signals.

Platform-specific notes

For the moment, only Linux is supported.

Versioning

This project adheres to Semantic Versioning. The CHANGELOG.md file details notable changes over time.

License

Copyright (c) 2020-2023 MicroDoc Software GmbH.

See the LICENSE.txt file at the top-level directory of this distribution.

Licensed under the MIT license. This file may not be copied, modified, or distributed except according to those terms.

Dependencies

~2.5–3.5MB
~73K SLoC