Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2812)

Unified Diff: sandbox/win/tests/integration_tests/hooking_dll.cc

Issue 1835003003: [Windows Sandbox] MITIGATION_EXTENSION_POINT_DISABLE support for children. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Final fixes and nits. Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « sandbox/win/src/security_level.h ('k') | sandbox/win/tests/integration_tests/hooking_win_proc.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: sandbox/win/tests/integration_tests/hooking_dll.cc
diff --git a/sandbox/win/tests/integration_tests/hooking_dll.cc b/sandbox/win/tests/integration_tests/hooking_dll.cc
new file mode 100644
index 0000000000000000000000000000000000000000..f275ae6e940208bc65b71ddeced35199cb7827a7
--- /dev/null
+++ b/sandbox/win/tests/integration_tests/hooking_dll.cc
@@ -0,0 +1,64 @@
+// Copyright 2016 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include <stdio.h>
+#include <windows.h>
+
+#define _DLL_EXPORTING
+#include "integration_tests_common.h"
+
+// This data section creates a common area that is accessible
+// to all instances of the DLL (in every process). They map to
+// the same physical memory location.
+// **Note that each instance of this DLL runs in the context of
+// the process it's injected into, so things like pointers and
+// addresses won't work.
+// **Note that any variables must be initialized to put them in
+// the specified segment, otherwise they will end up in the
+// default data segment.
+#pragma data_seg(".hook")
+HHOOK hook = NULL;
+bool hook_called = false;
+#pragma data_seg()
+#pragma comment(linker, "/SECTION:.hook,RWS")
+
+namespace {
+
+HANDLE event = NULL;
+}
+
+void SetHook(HHOOK hook_handle) {
+ hook = hook_handle;
+
+ return;
+}
+
+bool WasHookCalled() {
+ return hook_called;
+}
+
+LRESULT HookProc(int code, WPARAM w_param, LPARAM l_param) {
+ hook_called = true;
+ if (event)
+ ::SetEvent(event);
+
+ // Recent versions of Windows do not require the HHOOK to be passed along,
+ // but I'm doing it here to show the shared use of the HHOOK variable in
+ // the shared data segment. It is set by the instance of the DLL in the
+ // main test process.
+ return CallNextHookEx(hook, code, w_param, l_param);
+}
+
+BOOL WINAPI DllMain(HINSTANCE instance, DWORD reason, LPVOID reserved) {
+ if (reason == DLL_PROCESS_ATTACH) {
+ // The testing process should have set up this named event already
+ // (if the test needs this event to be signaled).
+ event = ::OpenEventW(EVENT_MODIFY_STATE, FALSE, g_hook_event);
+ }
+
+ if (reason == DLL_PROCESS_DETACH)
+ ::CloseHandle(event);
+
+ return TRUE;
+}
« no previous file with comments | « sandbox/win/src/security_level.h ('k') | sandbox/win/tests/integration_tests/hooking_win_proc.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698