Index: base/process/process_handle_win.cc |
diff --git a/base/process/process_handle_win.cc b/base/process/process_handle_win.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..3bc3a125e0d46132586c7a4b3865706f970e680b |
--- /dev/null |
+++ b/base/process/process_handle_win.cc |
@@ -0,0 +1,126 @@ |
+// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "base/process/process_handle.h" |
+ |
+#include <windows.h> |
+ |
+#include "base/memory/scoped_ptr.h" |
+#include "base/win/scoped_handle.h" |
+#include "base/win/windows_version.h" |
+ |
+namespace base { |
+ |
+ProcessId GetCurrentProcId() { |
+ return ::GetCurrentProcessId(); |
+} |
+ |
+ProcessHandle GetCurrentProcessHandle() { |
+ return ::GetCurrentProcess(); |
+} |
+ |
+bool OpenProcessHandle(ProcessId pid, ProcessHandle* handle) { |
+ // We try to limit privileges granted to the handle. If you need this |
+ // for test code, consider using OpenPrivilegedProcessHandle instead of |
+ // adding more privileges here. |
+ ProcessHandle result = OpenProcess(PROCESS_TERMINATE | |
+ PROCESS_QUERY_INFORMATION | |
+ SYNCHRONIZE, |
+ FALSE, pid); |
+ |
+ if (result == NULL) |
+ return false; |
+ |
+ *handle = result; |
+ return true; |
+} |
+ |
+bool OpenPrivilegedProcessHandle(ProcessId pid, ProcessHandle* handle) { |
+ ProcessHandle result = OpenProcess(PROCESS_DUP_HANDLE | |
+ PROCESS_TERMINATE | |
+ PROCESS_QUERY_INFORMATION | |
+ PROCESS_VM_READ | |
+ SYNCHRONIZE, |
+ FALSE, pid); |
+ |
+ if (result == NULL) |
+ return false; |
+ |
+ *handle = result; |
+ return true; |
+} |
+ |
+bool OpenProcessHandleWithAccess(ProcessId pid, |
+ uint32 access_flags, |
+ ProcessHandle* handle) { |
+ ProcessHandle result = OpenProcess(access_flags, FALSE, pid); |
+ |
+ if (result == NULL) |
+ return false; |
+ |
+ *handle = result; |
+ return true; |
+} |
+ |
+void CloseProcessHandle(ProcessHandle process) { |
+ CloseHandle(process); |
+} |
+ |
+ProcessId GetProcId(ProcessHandle process) { |
+ // This returns 0 if we have insufficient rights to query the process handle. |
+ return GetProcessId(process); |
+} |
+ |
+bool GetProcessIntegrityLevel(ProcessHandle process, IntegrityLevel *level) { |
+ if (!level) |
+ return false; |
+ |
+ if (win::GetVersion() < base::win::VERSION_VISTA) |
+ return false; |
+ |
+ HANDLE process_token; |
+ if (!OpenProcessToken(process, TOKEN_QUERY | TOKEN_QUERY_SOURCE, |
+ &process_token)) |
+ return false; |
+ |
+ win::ScopedHandle scoped_process_token(process_token); |
+ |
+ DWORD token_info_length = 0; |
+ if (GetTokenInformation(process_token, TokenIntegrityLevel, NULL, 0, |
+ &token_info_length) || |
+ GetLastError() != ERROR_INSUFFICIENT_BUFFER) |
+ return false; |
+ |
+ scoped_ptr<char[]> token_label_bytes(new char[token_info_length]); |
+ if (!token_label_bytes.get()) |
+ return false; |
+ |
+ TOKEN_MANDATORY_LABEL* token_label = |
+ reinterpret_cast<TOKEN_MANDATORY_LABEL*>(token_label_bytes.get()); |
+ if (!token_label) |
+ return false; |
+ |
+ if (!GetTokenInformation(process_token, TokenIntegrityLevel, token_label, |
+ token_info_length, &token_info_length)) |
+ return false; |
+ |
+ DWORD integrity_level = *GetSidSubAuthority(token_label->Label.Sid, |
+ (DWORD)(UCHAR)(*GetSidSubAuthorityCount(token_label->Label.Sid)-1)); |
+ |
+ if (integrity_level < SECURITY_MANDATORY_MEDIUM_RID) { |
+ *level = LOW_INTEGRITY; |
+ } else if (integrity_level >= SECURITY_MANDATORY_MEDIUM_RID && |
+ integrity_level < SECURITY_MANDATORY_HIGH_RID) { |
+ *level = MEDIUM_INTEGRITY; |
+ } else if (integrity_level >= SECURITY_MANDATORY_HIGH_RID) { |
+ *level = HIGH_INTEGRITY; |
+ } else { |
+ NOTREACHED(); |
+ return false; |
+ } |
+ |
+ return true; |
+} |
+ |
+} // namespace base |