Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1335)

Side by Side Diff: sandbox/win/wow_helper/wow_helper.cc

Issue 121123002: Update uses of UTF conversions in ppapi/, printing/, remoting/, rlz/, sandbox/, skia/, sql/, sync/,… (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 12 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « rlz/win/lib/rlz_value_store_registry.cc ('k') | skia/ext/image_operations_bench.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // Wow_helper.exe is a simple Win32 64-bit executable designed to help to 5 // Wow_helper.exe is a simple Win32 64-bit executable designed to help to
6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to 6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to
7 // perform a 64 bit interception of the target process and notify the 32-bit 7 // perform a 64 bit interception of the target process and notify the 32-bit
8 // broker process whenever a DLL is being loaded. This allows the broker to 8 // broker process whenever a DLL is being loaded. This allows the broker to
9 // setup the interceptions (32-bit) properly on the target. 9 // setup the interceptions (32-bit) properly on the target.
10 10
11 #include <windows.h> 11 #include <windows.h>
12 12
13 #include <string> 13 #include <string>
14 14
15 #include "sandbox/win/wow_helper/service64_resolver.h" 15 #include "sandbox/win/wow_helper/service64_resolver.h"
16 #include "sandbox/win/wow_helper/target_code.h" 16 #include "sandbox/win/wow_helper/target_code.h"
17 17
18 namespace {
19
20 // Grabbed from base/strings/string_util.h
21 template <class string_type>
22 inline typename string_type::value_type* WriteInto(string_type* str,
23 size_t length_with_null) {
24 str->reserve(length_with_null);
25 str->resize(length_with_null - 1);
26 return &((*str)[0]);
27 }
28
29 // Grabbed from base/string_util.cc
30 std::string WideToMultiByte(const base::string16& wide, UINT code_page) {
31 if (wide.length() == 0)
32 return std::string();
33
34 // compute the length of the buffer we'll need
35 int charcount = WideCharToMultiByte(code_page, 0, wide.c_str(), -1,
36 NULL, 0, NULL, NULL);
37 if (charcount == 0)
38 return std::string();
39
40 // convert
41 std::string mb;
42 WideCharToMultiByte(code_page, 0, wide.c_str(), -1,
43 WriteInto(&mb, charcount), charcount, NULL, NULL);
44
45 return mb;
46 }
47
48 // Grabbed from base/string_util.cc
49 std::string WideToUTF8(const base::string16& wide) {
50 return WideToMultiByte(wide, CP_UTF8);
51 }
52
53 } // namespace
54
55 namespace sandbox { 18 namespace sandbox {
56 19
57 // Performs the interception of NtMapViewOfSection on the 64-bit version of 20 // Performs the interception of NtMapViewOfSection on the 64-bit version of
58 // ntdll.dll. 'thunk' is the buffer on the address space of process 'child', 21 // ntdll.dll. 'thunk' is the buffer on the address space of process 'child',
59 // that will be used to store the information about the patch. 22 // that will be used to store the information about the patch.
60 int PatchNtdll(HANDLE child, void* thunk, size_t thunk_bytes) { 23 int PatchNtdll(HANDLE child, void* thunk, size_t thunk_bytes) {
61 wchar_t* ntdll_name = L"ntdll.dll"; 24 wchar_t* ntdll_name = L"ntdll.dll";
62 HMODULE ntdll_base = ::GetModuleHandle(ntdll_name); 25 HMODULE ntdll_base = ::GetModuleHandle(ntdll_name);
63 if (!ntdll_base) 26 if (!ntdll_base)
64 return 100; 27 return 100;
(...skipping 49 matching lines...) Expand 10 before | Expand all | Expand 10 after
114 77
115 DWORD buffer = wcstoul(next, NULL, 0); 78 DWORD buffer = wcstoul(next, NULL, 0);
116 if (!buffer) 79 if (!buffer)
117 return 4; 80 return 4;
118 81
119 void* thunk = reinterpret_cast<void*>(static_cast<ULONG_PTR>(buffer)); 82 void* thunk = reinterpret_cast<void*>(static_cast<ULONG_PTR>(buffer));
120 83
121 const size_t kPageSize = 4096; 84 const size_t kPageSize = 4096;
122 return sandbox::PatchNtdll(child, thunk, kPageSize); 85 return sandbox::PatchNtdll(child, thunk, kPageSize);
123 } 86 }
OLDNEW
« no previous file with comments | « rlz/win/lib/rlz_value_store_registry.cc ('k') | skia/ext/image_operations_bench.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698