| | | 1 | | using Microsoft.Win32.SafeHandles; |
| | | 2 | | using System; |
| | | 3 | | using System.Diagnostics; |
| | | 4 | | using System.IO; |
| | | 5 | | using System.Linq; |
| | | 6 | | using System.Runtime.CompilerServices; |
| | | 7 | | using System.Runtime.InteropServices; |
| | | 8 | | using static LockCheck.Windows.NativeMethods; |
| | | 9 | | |
| | | 10 | | namespace LockCheck.Windows; |
| | | 11 | | |
| | | 12 | | [DebuggerDisplay("{HasError} {ProcessId} {ExecutableFullPath}")] |
| | | 13 | | internal class Peb : IWin32ProcessDetails, IHasErrorState |
| | | 14 | | { |
| | | 15 | | #if DEBUG |
| | | 16 | | #pragma warning disable IDE0052 |
| | | 17 | | private string? _errorStack; |
| | | 18 | | private Exception? _errorCause; |
| | | 19 | | private int _errorCode; |
| | | 20 | | #pragma warning restore IDE0052 |
| | | 21 | | #endif |
| | | 22 | | |
| | 2 | 23 | | public int ProcessId { get; private set; } |
| | 2 | 24 | | public DateTime StartTime { get; private set; } |
| | 2 | 25 | | public int SessionId { get; private set; } |
| | 2 | 26 | | public int? ParentProcessId { get; private set; } |
| | 2 | 27 | | public string? ProcessName { get; private set; } |
| | 2 | 28 | | public string? CommandLine { get; private set; } |
| | 2 | 29 | | public string? CurrentDirectory { get; private set; } |
| | 2 | 30 | | public string? WindowTitle { get; private set; } |
| | 2 | 31 | | public string? ExecutableFullPath { get; private set; } |
| | 2 | 32 | | public string? DesktopInfo { get; private set; } |
| | 2 | 33 | | public string? Owner { get; private set; } |
| | 2 | 34 | | public bool HasError { get; private set; } |
| | 2 | 35 | | public bool? IsCritical { get; private set; } |
| | 2 | 36 | | public bool IsPseudoProcess { get; private set; } |
| | 2 | 37 | | public ulong? ProcessSequenceNumber { get; private set; } |
| | 2 | 38 | | public ulong? ProcessStartKey { get; private set; } |
| | | 39 | | |
| | | 40 | | public void SetError(Exception? ex = null, int errorCode = 0) |
| | | 41 | | { |
| | 2 | 42 | | if (!HasError) |
| | | 43 | | { |
| | 2 | 44 | | HasError = true; |
| | | 45 | | #if DEBUG |
| | | 46 | | if (Debugger.IsAttached) |
| | | 47 | | { |
| | | 48 | | // Support manual inspection at a later point |
| | | 49 | | _errorStack = Environment.StackTrace; |
| | | 50 | | _errorCause = ex; |
| | | 51 | | _errorCode = errorCode; |
| | | 52 | | } |
| | | 53 | | #endif |
| | | 54 | | } |
| | 2 | 55 | | } |
| | | 56 | | |
| | 2 | 57 | | internal Peb(SYSTEM_PROCESS_INFORMATION pi, ulong? processSequenceNumber) |
| | | 58 | | { |
| | | 59 | | // Convert as many members as possible, without actually needing to open the process handle. |
| | | 60 | | // Also, ProcessId/StartTime serve as identity. So it is "useful" to have them. |
| | 2 | 61 | | ProcessId = pi.UniqueProcessId.ToInt32(); |
| | 2 | 62 | | StartTime = DateTime.FromFileTime(pi.CreateTime); |
| | 2 | 63 | | ParentProcessId = pi.InheritedFromUniqueProcessId.ToInt32(); |
| | 2 | 64 | | ProcessSequenceNumber = processSequenceNumber; |
| | | 65 | | |
| | 2 | 66 | | if (pi.NamePtr != IntPtr.Zero) |
| | | 67 | | { |
| | | 68 | | // NamePtr will contain information not otherwise easily obtainable. |
| | | 69 | | // For example it will contain "System", "Secure System", "Registry", etc. |
| | | 70 | | // for those Windows pseudo processes. For regular processes it contains |
| | | 71 | | // the of the executable. |
| | 2 | 72 | | ProcessName = Marshal.PtrToStringUni(pi.NamePtr); |
| | | 73 | | } |
| | | 74 | | |
| | 2 | 75 | | Initialize(); |
| | 2 | 76 | | } |
| | | 77 | | |
| | 2 | 78 | | internal Peb(int processId, DateTime startTime) |
| | | 79 | | { |
| | 2 | 80 | | ProcessId = processId; |
| | 2 | 81 | | StartTime = startTime; |
| | | 82 | | |
| | 2 | 83 | | Initialize(); |
| | 2 | 84 | | } |
| | | 85 | | |
| | | 86 | | private void Initialize() |
| | | 87 | | { |
| | 2 | 88 | | if (NtDll.TryGetSystemPseudoProcess(ProcessId, out var pseudoPeb)) |
| | | 89 | | { |
| | | 90 | | // Common values for pseudo processes. All other fields don't really make sense for |
| | | 91 | | // these and also would cause access denied errors when attempting to read memory |
| | | 92 | | // or even "open" the "processes". |
| | | 93 | | |
| | 2 | 94 | | ProcessName ??= pseudoPeb.ProcessName; |
| | 2 | 95 | | IsPseudoProcess = pseudoPeb.IsPseudoProcess; |
| | 2 | 96 | | IsCritical = pseudoPeb.IsCritical; |
| | 2 | 97 | | ExecutableFullPath = pseudoPeb.ExecutableFullPath; |
| | 2 | 98 | | Owner = pseudoPeb.Owner; |
| | 2 | 99 | | SessionId = pseudoPeb.SessionId; |
| | 2 | 100 | | ParentProcessId = pseudoPeb.ParentProcessId; |
| | 2 | 101 | | ProcessSequenceNumber ??= pseudoPeb.ProcessSequenceNumber; |
| | | 102 | | } |
| | | 103 | | else |
| | | 104 | | { |
| | 2 | 105 | | using var process = OpenProcessRead(ProcessId); |
| | | 106 | | |
| | 2 | 107 | | if (!SUCCEEDED(!process.IsInvalid, this)) |
| | | 108 | | { |
| | | 109 | | // If if not a system pseudo process, this can still fail with access denied errors. |
| | 2 | 110 | | return; |
| | | 111 | | } |
| | | 112 | | |
| | | 113 | | // Need to check if either the current process, or the target process is 32bit or 64bit. |
| | | 114 | | // Additionally, if it is a 32bit process on a 64bit OS (WOW64). |
| | | 115 | | |
| | 2 | 116 | | bool os64 = Environment.Is64BitOperatingSystem; |
| | 2 | 117 | | bool self64 = Environment.Is64BitProcess; |
| | 2 | 118 | | bool target64 = false; |
| | | 119 | | |
| | 2 | 120 | | if (os64) |
| | | 121 | | { |
| | 2 | 122 | | if (!SUCCEEDED(IsWow64Process(process, out bool isWow64Target), this)) |
| | | 123 | | { |
| | 0 | 124 | | return; |
| | | 125 | | } |
| | | 126 | | |
| | 2 | 127 | | target64 = !isWow64Target; |
| | | 128 | | } |
| | | 129 | | |
| | 2 | 130 | | var offsets = PebOffsets.Get(target64); |
| | | 131 | | |
| | 2 | 132 | | if (os64) |
| | | 133 | | { |
| | 2 | 134 | | if (!target64) |
| | | 135 | | { |
| | | 136 | | // os: 64bit, self: any, target: 32bit |
| | 2 | 137 | | InitTarget32SelfAny(process, offsets, this); |
| | | 138 | | } |
| | 2 | 139 | | else if (!self64) |
| | | 140 | | { |
| | | 141 | | // os: 64bit, self: 32bit, target: 64bit |
| | 0 | 142 | | InitTarget64Self32(process, offsets, this); |
| | | 143 | | } |
| | | 144 | | else |
| | | 145 | | { |
| | | 146 | | // os: 64bit, self: 64bit, target: 64bit |
| | 2 | 147 | | InitTargetAnySelfAny(process, offsets, this); |
| | | 148 | | } |
| | | 149 | | } |
| | | 150 | | else |
| | | 151 | | { |
| | | 152 | | // os: 32bit, self: 32bit, target: 32bit |
| | 0 | 153 | | InitTargetAnySelfAny(process, offsets, this); |
| | | 154 | | } |
| | | 155 | | |
| | | 156 | | // Make sure that the current directory always ends with a backslash. AFAICT that is always the case, |
| | | 157 | | // so this should really be a noop, but we need to make sure to ensure hassle free comparison later. |
| | 2 | 158 | | if (!string.IsNullOrEmpty(CurrentDirectory) && CurrentDirectory[CurrentDirectory.Length - 1] != '\\') |
| | | 159 | | { |
| | 0 | 160 | | CurrentDirectory += "\\"; |
| | | 161 | | } |
| | | 162 | | |
| | | 163 | | // Owner is not really part of the native PEB, but since we have the process handle |
| | | 164 | | // here anyway, and going to need this value later on, we get it here as well. |
| | 2 | 165 | | Owner = GetProcessOwner(process); |
| | 2 | 166 | | IsCritical = IsProcessCritical(process, this); |
| | 2 | 167 | | ProcessName ??= Path.GetFileName(ExecutableFullPath); |
| | | 168 | | } |
| | | 169 | | |
| | 2 | 170 | | if (ProcessStartKey == null && ProcessSequenceNumber != null) |
| | | 171 | | { |
| | 2 | 172 | | ProcessStartKey = GetProcessStartKey(ProcessSequenceNumber.Value); |
| | | 173 | | } |
| | 2 | 174 | | } |
| | | 175 | | |
| | | 176 | | private static void InitTargetAnySelfAny(SafeProcessHandle handle, PebOffsets offsets, Peb peb) |
| | | 177 | | { |
| | 2 | 178 | | var pbi = new PROCESS_BASIC_INFORMATION(); |
| | 2 | 179 | | if (SUCCEEDED(NtQueryInformationProcess(handle, PROCESS_INFORMATION_CLASS.ProcessBasicInformation, ref pbi, Mars |
| | | 180 | | { |
| | 2 | 181 | | peb.ParentProcessId ??= pbi.InheritedFromUniqueProcessId.ToInt32(); |
| | | 182 | | |
| | 2 | 183 | | var pp = new IntPtr(); |
| | 2 | 184 | | if (SUCCEEDED(ReadProcessMemory(handle, new IntPtr(pbi.PebBaseAddress.ToInt64() + offsets.ProcessParametersO |
| | | 185 | | { |
| | 2 | 186 | | peb.CommandLine = GetString(handle, pp, offsets.CommandLineOffset, peb); |
| | 2 | 187 | | peb.CurrentDirectory = GetString(handle, pp, offsets.CurrentDirectoryOffset, peb); |
| | 2 | 188 | | peb.ExecutableFullPath = GetString(handle, pp, offsets.ImagePathNameOffset, peb); |
| | 2 | 189 | | peb.WindowTitle = GetString(handle, pp, offsets.WindowTitleOffset, peb); |
| | 2 | 190 | | peb.DesktopInfo = GetString(handle, pp, offsets.DesktopInfoOffset, peb); |
| | | 191 | | } |
| | | 192 | | |
| | 2 | 193 | | peb.SessionId = GetInt32(handle, pbi.PebBaseAddress, offsets.SessionIdOffset, peb); |
| | | 194 | | } |
| | | 195 | | |
| | 2 | 196 | | if (SupportsProcessSequenceNumber && peb.ProcessSequenceNumber == null) |
| | | 197 | | { |
| | | 198 | | #if NET |
| | | 199 | | using var psn = new ScopedNativeMemory(stackalloc byte[sizeof(ulong)]); |
| | | 200 | | #else |
| | 2 | 201 | | using var psn = new ScopedNativeMemory(Marshal.SizeOf<ulong>()); |
| | | 202 | | #endif |
| | 2 | 203 | | var buffer = (IntPtr)psn; |
| | 2 | 204 | | if (SUCCEEDED(NtQueryInformationProcess(handle, PROCESS_INFORMATION_CLASS.ProcessSequenceNumber, ref buffer, |
| | | 205 | | { |
| | 2 | 206 | | peb.ProcessSequenceNumber = (ulong)buffer.ToInt64(); |
| | | 207 | | } |
| | | 208 | | } |
| | 2 | 209 | | } |
| | | 210 | | |
| | | 211 | | private static void InitTarget64Self32(SafeProcessHandle handle, PebOffsets offsets, Peb peb) |
| | | 212 | | { |
| | 0 | 213 | | var pbi = new PROCESS_BASIC_INFORMATION_WOW64(); |
| | 0 | 214 | | if (SUCCEEDED(NtWow64QueryInformationProcess64(handle, PROCESS_INFORMATION_CLASS.ProcessBasicInformation, ref pb |
| | | 215 | | { |
| | 0 | 216 | | peb.ParentProcessId ??= (int)pbi.InheritedFromUniqueProcessId; |
| | | 217 | | |
| | 0 | 218 | | long pp = 0; |
| | 0 | 219 | | if (SUCCEEDED(NtWow64ReadVirtualMemory64(handle, pbi.PebBaseAddress + offsets.ProcessParametersOffset, ref p |
| | | 220 | | { |
| | 0 | 221 | | peb.CommandLine = GetStringTarget64(handle, pp, offsets.CommandLineOffset, peb); |
| | 0 | 222 | | peb.CurrentDirectory = GetStringTarget64(handle, pp, offsets.CurrentDirectoryOffset, peb); |
| | 0 | 223 | | peb.ExecutableFullPath = GetStringTarget64(handle, pp, offsets.ImagePathNameOffset, peb); |
| | 0 | 224 | | peb.WindowTitle = GetStringTarget64(handle, pp, offsets.WindowTitleOffset, peb); |
| | 0 | 225 | | peb.DesktopInfo = GetStringTarget64(handle, pp, offsets.DesktopInfoOffset, peb); |
| | | 226 | | } |
| | | 227 | | |
| | 0 | 228 | | peb.SessionId = GetInt32Target64(handle, pbi.PebBaseAddress, offsets.SessionIdOffset, peb); |
| | | 229 | | } |
| | | 230 | | |
| | 0 | 231 | | if (SupportsProcessSequenceNumber && peb.ProcessSequenceNumber == null) |
| | | 232 | | { |
| | | 233 | | #if NET |
| | | 234 | | using var psn = new ScopedNativeMemory(stackalloc byte[sizeof(ulong)]); |
| | | 235 | | #else |
| | 0 | 236 | | using var psn = new ScopedNativeMemory(Marshal.SizeOf<ulong>()); |
| | | 237 | | #endif |
| | 0 | 238 | | var buffer = (IntPtr)psn; |
| | 0 | 239 | | if (SUCCEEDED(NtWow64QueryInformationProcess64(handle, PROCESS_INFORMATION_CLASS.ProcessSequenceNumber, ref |
| | | 240 | | { |
| | 0 | 241 | | peb.ProcessSequenceNumber = (ulong)buffer.ToInt64(); |
| | | 242 | | } |
| | | 243 | | } |
| | 0 | 244 | | } |
| | | 245 | | |
| | | 246 | | private static void InitTarget32SelfAny(SafeProcessHandle handle, PebOffsets offsets, Peb peb) |
| | | 247 | | { |
| | 2 | 248 | | var pbi = new PROCESS_BASIC_INFORMATION(); |
| | 2 | 249 | | if (SUCCEEDED(NtQueryInformationProcess(handle, PROCESS_INFORMATION_CLASS.ProcessBasicInformation, ref pbi, Mars |
| | | 250 | | { |
| | 2 | 251 | | peb.ParentProcessId ??= pbi.InheritedFromUniqueProcessId.ToInt32(); |
| | | 252 | | |
| | | 253 | | // A 32bit process on a 64bit OS has a separate PEB structure. |
| | 2 | 254 | | var peb32 = new IntPtr(); |
| | 2 | 255 | | if (SUCCEEDED(NtQueryInformationProcessWow64(handle, PROCESS_INFORMATION_CLASS.ProcessWow64Information, ref |
| | | 256 | | { |
| | 2 | 257 | | var pp = new IntPtr(); |
| | 2 | 258 | | if (SUCCEEDED(ReadProcessMemory(handle, new IntPtr(peb32.ToInt64() + offsets.ProcessParametersOffset), r |
| | | 259 | | { |
| | 2 | 260 | | peb.CommandLine = GetStringTarget32(handle, pp, offsets.CommandLineOffset, peb); |
| | 2 | 261 | | peb.CurrentDirectory = GetStringTarget32(handle, pp, offsets.CurrentDirectoryOffset, peb); |
| | 2 | 262 | | peb.ExecutableFullPath = GetStringTarget32(handle, pp, offsets.ImagePathNameOffset, peb); |
| | 2 | 263 | | peb.WindowTitle = GetStringTarget32(handle, pp, offsets.WindowTitleOffset, peb); |
| | 2 | 264 | | peb.DesktopInfo = GetStringTarget32(handle, pp, offsets.DesktopInfoOffset, peb); |
| | | 265 | | } |
| | | 266 | | |
| | 2 | 267 | | peb.SessionId = GetInt32Target32(handle, new IntPtr(peb32.ToInt64()), offsets.SessionIdOffset, peb); |
| | | 268 | | } |
| | | 269 | | |
| | 2 | 270 | | if (SupportsProcessSequenceNumber && peb.ProcessSequenceNumber == null) |
| | | 271 | | { |
| | | 272 | | #if NET |
| | | 273 | | using var psn = new ScopedNativeMemory(stackalloc byte[sizeof(ulong)]); |
| | | 274 | | #else |
| | 2 | 275 | | using var psn = new ScopedNativeMemory(Marshal.SizeOf<ulong>()); |
| | | 276 | | #endif |
| | 2 | 277 | | var buffer = (IntPtr)psn; |
| | 2 | 278 | | if (SUCCEEDED(NtQueryInformationProcessWow64(handle, PROCESS_INFORMATION_CLASS.ProcessSequenceNumber, re |
| | | 279 | | { |
| | 2 | 280 | | peb.ProcessSequenceNumber = (ulong)buffer.ToInt64(); |
| | | 281 | | } |
| | | 282 | | } |
| | | 283 | | } |
| | 2 | 284 | | } |
| | | 285 | | |
| | | 286 | | private static int GetInt32Target32(SafeProcessHandle handle, IntPtr pp, int offset, Peb he) |
| | | 287 | | { |
| | 2 | 288 | | var ptr = IntPtr.Zero; |
| | 2 | 289 | | if (SUCCEEDED(ReadProcessMemory(handle, pp + offset, ref ptr, new IntPtr(sizeof(int)), IntPtr.Zero), he)) |
| | | 290 | | { |
| | 2 | 291 | | return ptr.ToInt32(); |
| | | 292 | | } |
| | | 293 | | |
| | 0 | 294 | | return default; |
| | | 295 | | } |
| | | 296 | | |
| | | 297 | | private static string? GetStringTarget32(SafeProcessHandle handle, IntPtr pp, int offset, Peb he) |
| | | 298 | | { |
| | 2 | 299 | | var us = new UNICODE_STRING_32(); |
| | 2 | 300 | | if (SUCCEEDED(ReadProcessMemory(handle, pp + offset, ref us, new IntPtr(Marshal.SizeOf(us)), IntPtr.Zero), he)) |
| | | 301 | | { |
| | 2 | 302 | | if (us.Buffer != 0) |
| | | 303 | | { |
| | 2 | 304 | | if (us.Length == 0) |
| | | 305 | | { |
| | 0 | 306 | | return string.Empty; |
| | | 307 | | } |
| | | 308 | | |
| | 2 | 309 | | string lpBuffer = us.GetEmptyBuffer(); |
| | 2 | 310 | | if (SUCCEEDED(ReadProcessMemory(handle, new IntPtr(us.Buffer), lpBuffer, new IntPtr(us.Length), IntPtr.Z |
| | | 311 | | { |
| | 2 | 312 | | return lpBuffer; |
| | | 313 | | } |
| | | 314 | | } |
| | | 315 | | } |
| | | 316 | | |
| | 0 | 317 | | return null; |
| | | 318 | | } |
| | | 319 | | |
| | | 320 | | private static int GetInt32Target64(SafeProcessHandle handle, long pp, int offset, Peb he) |
| | | 321 | | { |
| | 0 | 322 | | var ptr = IntPtr.Zero; |
| | 0 | 323 | | uint buf = 0; |
| | 0 | 324 | | if (SUCCEEDED(NtWow64ReadVirtualMemory64(handle, pp + offset, ref buf, sizeof(uint), IntPtr.Zero), he)) |
| | | 325 | | { |
| | 0 | 326 | | ptr = new IntPtr(buf); |
| | 0 | 327 | | return ptr.ToInt32(); |
| | | 328 | | } |
| | | 329 | | |
| | 0 | 330 | | return default; |
| | | 331 | | } |
| | | 332 | | |
| | | 333 | | private static string? GetStringTarget64(SafeProcessHandle handle, long pp, int offset, Peb he) |
| | | 334 | | { |
| | 0 | 335 | | var us = new UNICODE_STRING_WOW64(); |
| | 0 | 336 | | if (SUCCEEDED(NtWow64ReadVirtualMemory64(handle, pp + offset, ref us, Marshal.SizeOf(us), IntPtr.Zero), he)) |
| | | 337 | | { |
| | 0 | 338 | | if (us.Buffer != 0) |
| | | 339 | | { |
| | 0 | 340 | | if (us.Length == 0) |
| | | 341 | | { |
| | 0 | 342 | | return string.Empty; |
| | | 343 | | } |
| | | 344 | | |
| | 0 | 345 | | string lpBuffer = us.GetEmptyBuffer(); |
| | 0 | 346 | | if (SUCCEEDED(NtWow64ReadVirtualMemory64(handle, us.Buffer, lpBuffer, us.Length, IntPtr.Zero), he)) |
| | | 347 | | { |
| | 0 | 348 | | return lpBuffer; |
| | | 349 | | } |
| | | 350 | | } |
| | | 351 | | } |
| | | 352 | | |
| | 0 | 353 | | return null; |
| | | 354 | | } |
| | | 355 | | |
| | | 356 | | private static int GetInt32(SafeProcessHandle handle, IntPtr pp, int offset, Peb he) |
| | | 357 | | { |
| | 2 | 358 | | var ptr = IntPtr.Zero; |
| | 2 | 359 | | if (SUCCEEDED(ReadProcessMemory(handle, pp + offset, ref ptr, new IntPtr(IntPtr.Size), IntPtr.Zero), he)) |
| | | 360 | | { |
| | 2 | 361 | | return ptr.ToInt32(); |
| | | 362 | | } |
| | | 363 | | |
| | 0 | 364 | | return 0; |
| | | 365 | | } |
| | | 366 | | |
| | | 367 | | private static string? GetString(SafeProcessHandle handle, IntPtr pp, int offset, Peb he) |
| | | 368 | | { |
| | 2 | 369 | | var us = new UNICODE_STRING(); |
| | 2 | 370 | | if (SUCCEEDED(ReadProcessMemory(handle, pp + offset, ref us, new IntPtr(Marshal.SizeOf(us)), IntPtr.Zero), he)) |
| | | 371 | | { |
| | 2 | 372 | | if (us.Buffer != IntPtr.Zero) |
| | | 373 | | { |
| | 2 | 374 | | if (us.Length == 0) |
| | | 375 | | { |
| | 2 | 376 | | return string.Empty; |
| | | 377 | | } |
| | | 378 | | |
| | 2 | 379 | | string lpBuffer = us.GetEmptyBuffer(); |
| | 2 | 380 | | if (SUCCEEDED(ReadProcessMemory(handle, us.Buffer, lpBuffer, new IntPtr(us.Length), IntPtr.Zero), he)) |
| | | 381 | | { |
| | 2 | 382 | | return lpBuffer; |
| | | 383 | | } |
| | | 384 | | } |
| | | 385 | | } |
| | | 386 | | |
| | 0 | 387 | | return null; |
| | | 388 | | } |
| | | 389 | | |
| | | 390 | | /// <summary> |
| | | 391 | | /// Checks if <paramref name="status"/> is success, otherwise sets <c><paramref name="he"/>.SetError(errorCode: <par |
| | | 392 | | /// </summary> |
| | | 393 | | private static bool SUCCEEDED(uint status, Peb he, [CallerMemberName] string? callerName = null, [CallerFilePath] st |
| | | 394 | | { |
| | 2 | 395 | | if (status != STATUS_SUCCESS) |
| | | 396 | | { |
| | 0 | 397 | | he.SetError(errorCode: (int)status); |
| | 0 | 398 | | return false; |
| | | 399 | | } |
| | | 400 | | |
| | 2 | 401 | | return true; |
| | | 402 | | } |
| | | 403 | | |
| | | 404 | | /// <summary> |
| | | 405 | | /// Checks if <paramref name="status"/> is success, otherwise sets <c><paramref name="he"/>.SetError(errorCode: <par |
| | | 406 | | /// </summary> |
| | | 407 | | private static bool SUCCEEDED(int status, Peb he, [CallerMemberName] string? callerName = null, [CallerFilePath] str |
| | | 408 | | { |
| | 2 | 409 | | if (status != STATUS_SUCCESS) |
| | | 410 | | { |
| | 0 | 411 | | he.SetError(errorCode: status); |
| | 0 | 412 | | return false; |
| | | 413 | | } |
| | | 414 | | |
| | 2 | 415 | | return true; |
| | | 416 | | } |
| | | 417 | | |
| | | 418 | | /// <summary> |
| | | 419 | | /// Checks if <paramref name="status"/> is success, otherwise sets <c><paramref name="he"/>.SetError(errorCode: <see |
| | | 420 | | /// </summary> |
| | | 421 | | private static bool SUCCEEDED(bool result, Peb he, [CallerMemberName] string? callerName = null, [CallerFilePath] st |
| | | 422 | | { |
| | 2 | 423 | | if (!result) |
| | | 424 | | { |
| | 2 | 425 | | he.SetError(errorCode: Marshal.GetLastWin32Error()); |
| | 2 | 426 | | return false; |
| | | 427 | | } |
| | | 428 | | |
| | 2 | 429 | | return true; |
| | | 430 | | } |
| | | 431 | | } |