Index: sandbox/win/src/sandbox_nt_util.h |
diff --git a/sandbox/win/src/sandbox_nt_util.h b/sandbox/win/src/sandbox_nt_util.h |
index e5d45fa2f2ae24060e46a19e1462c356c5c033a5..fc7127e936611e9c64151ba82fa95b73b5f3f547 100644 |
--- a/sandbox/win/src/sandbox_nt_util.h |
+++ b/sandbox/win/src/sandbox_nt_util.h |
@@ -94,14 +94,6 @@ enum RequiredAccess { |
// write) |
bool ValidParameter(void* buffer, size_t size, RequiredAccess intent); |
- |
-// Copies data from a user buffer to our buffer. Returns the operation status. |
-NTSTATUS CopyData(void* destination, const void* source, size_t bytes); |
- |
-// Copies the name from an object attributes. |
-NTSTATUS AllocAndCopyName(const OBJECT_ATTRIBUTES* in_object, |
- wchar_t** out_name, uint32* attributes, HANDLE* root); |
- |
// Initializes our ntdll level heap |
bool InitHeap(); |
@@ -136,11 +128,6 @@ UNICODE_STRING* GetImageInfoFromModule(HMODULE module, uint32* flags); |
// be freed with a placement delete (see GetImageNameFromModule example). |
UNICODE_STRING* GetBackingFilePath(PVOID address); |
-// Returns the last component of a path that contains the module name. |
-// It will return NULL if the path ends with the path separator. The returned |
-// buffer must be freed with a placement delete (see GetImageNameFromModule |
-// example). |
-UNICODE_STRING* ExtractModuleName(const UNICODE_STRING* module_path); |
// Returns true if the parameters correspond to a dll mapped as code. |
bool IsValidImageSection(HANDLE section, PVOID *base, PLARGE_INTEGER offset, |
@@ -179,6 +166,12 @@ class AutoProtectMemory { |
bool IsSupportedRenameCall(FILE_RENAME_INFORMATION* file_info, DWORD length, |
uint32 file_info_class); |
+// Writes |length| bytes from the provided |buffer| into the address space of |
+// |child_process|, at the specified |address|, preserving the original write |
+// protection attributes. Returns true on success. |
+bool WriteProtectedChildMemory(HANDLE child_process, void* address, |
+ const void* buffer, size_t length); |
+ |
} // namespace sandbox |