mirror of
https://github.com/BOINC/boinc.git
synced 2025-02-26 20:45:07 +00:00

This will allow the core client to kill VirtualBox VM's launched indirectly by vboxwrapper. Vboxwrapper launches vboxsvc.exe which launches vboxheadless.exe. This should also take care of the core client being able to kill child processes of the regular wrapper as well. I don't know the full scope of this type of issue? Maybe the default ACLs for a process changed within the last couple of versions of Windows.
29 lines
1.0 KiB
C
29 lines
1.0 KiB
C
// This file is part of BOINC.
|
|
// http://boinc.berkeley.edu
|
|
// Copyright (C) 2008 University of California
|
|
//
|
|
// BOINC is free software; you can redistribute it and/or modify it
|
|
// under the terms of the GNU Lesser General Public License
|
|
// as published by the Free Software Foundation,
|
|
// either version 3 of the License, or (at your option) any later version.
|
|
//
|
|
// BOINC is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
|
// See the GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with BOINC. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
extern HANDLE sandbox_account_interactive_token;
|
|
extern HANDLE sandbox_account_service_token;
|
|
|
|
extern void get_sandbox_account_interactive_token();
|
|
extern void get_sandbox_account_service_token();
|
|
|
|
extern int run_app_windows(
|
|
const char* path, const char* cdir, int argc, char *const argv[], HANDLE&
|
|
);
|
|
|
|
|