Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(342)

Side by Side Diff: sandbox/win/wow_helper/wow_helper.cc

Issue 821693003: replace COMPILE_ASSERT with static_assert in sandbox/ (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: rebase on master Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « sandbox/win/src/sharedmem_ipc_server.cc ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // Wow_helper.exe is a simple Win32 64-bit executable designed to help to 5 // Wow_helper.exe is a simple Win32 64-bit executable designed to help to
6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to 6 // sandbox a 32 bit application running on a 64 bit OS. The basic idea is to
7 // perform a 64 bit interception of the target process and notify the 32-bit 7 // perform a 64 bit interception of the target process and notify the 32-bit
8 // broker process whenever a DLL is being loaded. This allows the broker to 8 // broker process whenever a DLL is being loaded. This allows the broker to
9 // setup the interceptions (32-bit) properly on the target. 9 // setup the interceptions (32-bit) properly on the target.
10 10
(...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after
54 } // namespace sandbox 54 } // namespace sandbox
55 55
56 // We must receive two arguments: the process id of the target to intercept and 56 // We must receive two arguments: the process id of the target to intercept and
57 // the address of a page of memory on that process that will be used for the 57 // the address of a page of memory on that process that will be used for the
58 // interception. We receive the address because the broker will cleanup the 58 // interception. We receive the address because the broker will cleanup the
59 // patch when the work is performed. 59 // patch when the work is performed.
60 // 60 //
61 // It should be noted that we don't wait until the real work is done; this 61 // It should be noted that we don't wait until the real work is done; this
62 // program quits as soon as the 64-bit interception is performed. 62 // program quits as soon as the 64-bit interception is performed.
63 int wWinMain(HINSTANCE, HINSTANCE, wchar_t* command_line, int) { 63 int wWinMain(HINSTANCE, HINSTANCE, wchar_t* command_line, int) {
64 COMPILE_ASSERT(sizeof(void*) > sizeof(DWORD), unsupported_32_bits); 64 static_assert(sizeof(void*) > sizeof(DWORD), "unsupported 32 bits");
65 if (!command_line) 65 if (!command_line)
66 return 1; 66 return 1;
67 67
68 wchar_t* next; 68 wchar_t* next;
69 DWORD process_id = wcstoul(command_line, &next, 0); 69 DWORD process_id = wcstoul(command_line, &next, 0);
70 if (!process_id) 70 if (!process_id)
71 return 2; 71 return 2;
72 72
73 DWORD access = PROCESS_VM_OPERATION | PROCESS_VM_READ | PROCESS_VM_WRITE; 73 DWORD access = PROCESS_VM_OPERATION | PROCESS_VM_READ | PROCESS_VM_WRITE;
74 HANDLE child = ::OpenProcess(access, FALSE, process_id); 74 HANDLE child = ::OpenProcess(access, FALSE, process_id);
75 if (!child) 75 if (!child)
76 return 3; 76 return 3;
77 77
78 DWORD buffer = wcstoul(next, NULL, 0); 78 DWORD buffer = wcstoul(next, NULL, 0);
79 if (!buffer) 79 if (!buffer)
80 return 4; 80 return 4;
81 81
82 void* thunk = reinterpret_cast<void*>(static_cast<ULONG_PTR>(buffer)); 82 void* thunk = reinterpret_cast<void*>(static_cast<ULONG_PTR>(buffer));
83 83
84 const size_t kPageSize = 4096; 84 const size_t kPageSize = 4096;
85 return sandbox::PatchNtdll(child, thunk, kPageSize); 85 return sandbox::PatchNtdll(child, thunk, kPageSize);
86 } 86 }
OLDNEW
« no previous file with comments | « sandbox/win/src/sharedmem_ipc_server.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698