OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "sandbox/src/target_services.h" | 5 #include "sandbox/win/src/target_services.h" |
6 | 6 |
7 #include <process.h> | 7 #include <process.h> |
8 | 8 |
9 #include "base/basictypes.h" | 9 #include "base/basictypes.h" |
10 #include "sandbox/src/crosscall_client.h" | 10 #include "sandbox/win/src/crosscall_client.h" |
11 #include "sandbox/src/handle_closer_agent.h" | 11 #include "sandbox/win/src/handle_closer_agent.h" |
12 #include "sandbox/src/handle_interception.h" | 12 #include "sandbox/win/src/handle_interception.h" |
13 #include "sandbox/src/ipc_tags.h" | 13 #include "sandbox/win/src/ipc_tags.h" |
14 #include "sandbox/src/restricted_token_utils.h" | 14 #include "sandbox/win/src/restricted_token_utils.h" |
15 #include "sandbox/src/sandbox.h" | 15 #include "sandbox/win/src/sandbox.h" |
16 #include "sandbox/src/sandbox_types.h" | 16 #include "sandbox/win/src/sandbox_types.h" |
17 #include "sandbox/src/sharedmem_ipc_client.h" | 17 #include "sandbox/win/src/sharedmem_ipc_client.h" |
18 #include "sandbox/src/sandbox_nt_util.h" | 18 #include "sandbox/win/src/sandbox_nt_util.h" |
19 | 19 |
20 namespace { | 20 namespace { |
21 | 21 |
22 // Flushing a cached key is triggered by just opening the key and closing the | 22 // Flushing a cached key is triggered by just opening the key and closing the |
23 // resulting handle. RegDisablePredefinedCache() is the documented way to flush | 23 // resulting handle. RegDisablePredefinedCache() is the documented way to flush |
24 // HKCU so do not use it with this function. | 24 // HKCU so do not use it with this function. |
25 bool FlushRegKey(HKEY root) { | 25 bool FlushRegKey(HKEY root) { |
26 HKEY key; | 26 HKEY key; |
27 if (ERROR_SUCCESS == ::RegOpenKeyExW(root, NULL, 0, MAXIMUM_ALLOWED, &key)) { | 27 if (ERROR_SUCCESS == ::RegOpenKeyExW(root, NULL, 0, MAXIMUM_ALLOWED, &key)) { |
28 if (ERROR_SUCCESS != ::RegCloseKey(key)) | 28 if (ERROR_SUCCESS != ::RegCloseKey(key)) |
(...skipping 150 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
179 ResultCode TargetServicesBase::DuplicateHandle(HANDLE source_handle, | 179 ResultCode TargetServicesBase::DuplicateHandle(HANDLE source_handle, |
180 DWORD target_process_id, | 180 DWORD target_process_id, |
181 HANDLE* target_handle, | 181 HANDLE* target_handle, |
182 DWORD desired_access, | 182 DWORD desired_access, |
183 DWORD options) { | 183 DWORD options) { |
184 return sandbox::DuplicateHandleProxy(source_handle, target_process_id, | 184 return sandbox::DuplicateHandleProxy(source_handle, target_process_id, |
185 target_handle, desired_access, options); | 185 target_handle, desired_access, options); |
186 } | 186 } |
187 | 187 |
188 } // namespace sandbox | 188 } // namespace sandbox |
OLD | NEW |