| Index: sandbox/win/src/target_process.cc
|
| diff --git a/sandbox/win/src/target_process.cc b/sandbox/win/src/target_process.cc
|
| index 5f73adcd4f9b14a3d79268d29ba0b3f41aea9bdc..fea52b2a6885459b29e6fa671d32ba5705a331ea 100644
|
| --- a/sandbox/win/src/target_process.cc
|
| +++ b/sandbox/win/src/target_process.cc
|
| @@ -132,7 +132,7 @@ DWORD TargetProcess::Create(const wchar_t* exe_path,
|
| }
|
|
|
| PROCESS_INFORMATION temp_process_info = {};
|
| - if (!::CreateProcessAsUserW(lockdown_token_,
|
| + if (!::CreateProcessAsUserW(lockdown_token_.Get(),
|
| exe_path,
|
| cmd_line.get(),
|
| NULL, // No security attribute.
|
| @@ -164,7 +164,7 @@ DWORD TargetProcess::Create(const wchar_t* exe_path,
|
| // impersonation token with more rights. This allows the target to start;
|
| // otherwise it will crash too early for us to help.
|
| HANDLE temp_thread = process_info.thread_handle();
|
| - if (!::SetThreadToken(&temp_thread, initial_token_)) {
|
| + if (!::SetThreadToken(&temp_thread, initial_token_.Get())) {
|
| win_result = ::GetLastError();
|
| // It might be a security breach if we let the target run outside the job
|
| // so kill it before it causes damage.
|
| @@ -261,13 +261,13 @@ DWORD TargetProcess::Init(Dispatcher* ipc_dispatcher, void* policy,
|
|
|
| DWORD access = FILE_MAP_READ | FILE_MAP_WRITE;
|
| HANDLE target_shared_section;
|
| - if (!::DuplicateHandle(::GetCurrentProcess(), shared_section_,
|
| + if (!::DuplicateHandle(::GetCurrentProcess(), shared_section_.Get(),
|
| sandbox_process_info_.process_handle(),
|
| &target_shared_section, access, FALSE, 0)) {
|
| return ::GetLastError();
|
| }
|
|
|
| - void* shared_memory = ::MapViewOfFile(shared_section_,
|
| + void* shared_memory = ::MapViewOfFile(shared_section_.Get(),
|
| FILE_MAP_WRITE|FILE_MAP_READ,
|
| 0, 0, 0);
|
| if (NULL == shared_memory) {
|
|
|