Skip to content

Commit 65e3ce2

Browse files
committed
revert original link fixes
1 parent 249da6b commit 65e3ce2

File tree

56 files changed

+384
-3233
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

56 files changed

+384
-3233
lines changed

docs/assembler/masm/dot-fpo.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,8 @@
11
---
2-
title: .FPO
3-
ms.date: 08/30/2018
4-
f1_keywords:
5-
- .FPO
6-
helpviewer_keywords:
7-
- .FPO directive
2+
title: ".FPO"
3+
ms.date: "08/30/2018"
4+
f1_keywords: [".FPO"]
5+
helpviewer_keywords: [".FPO directive"]
86
ms.assetid: 35f4cd61-32f9-4262-b657-73f04f775d09
97
---
108
# .FPO
@@ -33,8 +31,8 @@ Number registers saved.
3331
Indicates whether the EBP register has been allocated. either 0 or 1.
3432

3533
*cbFrame*<br/>
36-
Indicates the frame type. See [FPO_DATA](/windows/desktop/api/winnt/ns-winnt-fpo_data) for more information.
34+
Indicates the frame type. See [FPO_DATA](/windows/desktop/api/winnt/ns-winnt-_fpo_data) for more information.
3735

3836
## See also
3937

40-
[Directives Reference](../../assembler/masm/directives-reference.md)<br/>
38+
[Directives Reference](../../assembler/masm/directives-reference.md)<br/>

docs/atl/notifyhandler.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,8 @@
11
---
2-
title: NotifyHandler
3-
ms.date: 11/04/2016
4-
ms.topic: reference
5-
helpviewer_keywords:
6-
- NotifyHandler function
2+
title: "NotifyHandler"
3+
ms.date: "11/04/2016"
4+
ms.topic: "reference"
5+
helpviewer_keywords: ["NotifyHandler function"]
76
ms.assetid: 5ff953ec-de35-42bc-8b3c-d384d636c139
87
---
98
# NotifyHandler
@@ -25,7 +24,7 @@ LRESULT NotifyHandler(
2524
The identifier of the control sending the message.
2625
2726
*pnmh*<br/>
28-
Address of an [NMHDR](/windows/desktop/api/richedit/ns-richedit-nmhdr) structure that contains the notification code and additional information. For some notification messages, this parameter points to a larger structure that has the `NMHDR` structure as its first member.
27+
Address of an [NMHDR](/windows/desktop/api/richedit/ns-richedit-_nmhdr) structure that contains the notification code and additional information. For some notification messages, this parameter points to a larger structure that has the `NMHDR` structure as its first member.
2928
3029
*bHandled*<br/>
3130
The message map sets *bHandled* to TRUE before *NotifyHandler* is called. If *NotifyHandler* does not fully handle the message, it should set *bHandled* to **FALSE** to indicate the message needs further processing.

docs/atl/reference/caccesstoken-class.md

Lines changed: 15 additions & 63 deletions
Original file line numberDiff line numberDiff line change
@@ -1,56 +1,8 @@
11
---
2-
title: CAccessToken Class
3-
ms.date: 07/02/2019
4-
f1_keywords:
5-
- CAccessToken
6-
- ATLSECURITY/ATL::CAccessToken
7-
- ATLSECURITY/ATL::CAccessToken::Attach
8-
- ATLSECURITY/ATL::CAccessToken::CheckTokenMembership
9-
- ATLSECURITY/ATL::CAccessToken::CreateImpersonationToken
10-
- ATLSECURITY/ATL::CAccessToken::CreatePrimaryToken
11-
- ATLSECURITY/ATL::CAccessToken::CreateProcessAsUser
12-
- ATLSECURITY/ATL::CAccessToken::CreateRestrictedToken
13-
- ATLSECURITY/ATL::CAccessToken::Detach
14-
- ATLSECURITY/ATL::CAccessToken::DisablePrivilege
15-
- ATLSECURITY/ATL::CAccessToken::DisablePrivileges
16-
- ATLSECURITY/ATL::CAccessToken::EnablePrivilege
17-
- ATLSECURITY/ATL::CAccessToken::EnablePrivileges
18-
- ATLSECURITY/ATL::CAccessToken::GetDefaultDacl
19-
- ATLSECURITY/ATL::CAccessToken::GetEffectiveToken
20-
- ATLSECURITY/ATL::CAccessToken::GetGroups
21-
- ATLSECURITY/ATL::CAccessToken::GetHandle
22-
- ATLSECURITY/ATL::CAccessToken::GetImpersonationLevel
23-
- ATLSECURITY/ATL::CAccessToken::GetLogonSessionId
24-
- ATLSECURITY/ATL::CAccessToken::GetLogonSid
25-
- ATLSECURITY/ATL::CAccessToken::GetOwner
26-
- ATLSECURITY/ATL::CAccessToken::GetPrimaryGroup
27-
- ATLSECURITY/ATL::CAccessToken::GetPrivileges
28-
- ATLSECURITY/ATL::CAccessToken::GetProcessToken
29-
- ATLSECURITY/ATL::CAccessToken::GetProfile
30-
- ATLSECURITY/ATL::CAccessToken::GetSource
31-
- ATLSECURITY/ATL::CAccessToken::GetStatistics
32-
- ATLSECURITY/ATL::CAccessToken::GetTerminalServicesSessionId
33-
- ATLSECURITY/ATL::CAccessToken::GetThreadToken
34-
- ATLSECURITY/ATL::CAccessToken::GetTokenId
35-
- ATLSECURITY/ATL::CAccessToken::GetType
36-
- ATLSECURITY/ATL::CAccessToken::GetUser
37-
- ATLSECURITY/ATL::CAccessToken::HKeyCurrentUser
38-
- ATLSECURITY/ATL::CAccessToken::Impersonate
39-
- ATLSECURITY/ATL::CAccessToken::ImpersonateLoggedOnUser
40-
- ATLSECURITY/ATL::CAccessToken::IsTokenRestricted
41-
- ATLSECURITY/ATL::CAccessToken::LoadUserProfile
42-
- ATLSECURITY/ATL::CAccessToken::LogonUser
43-
- ATLSECURITY/ATL::CAccessToken::OpenCOMClientToken
44-
- ATLSECURITY/ATL::CAccessToken::OpenNamedPipeClientToken
45-
- ATLSECURITY/ATL::CAccessToken::OpenRPCClientToken
46-
- ATLSECURITY/ATL::CAccessToken::OpenThreadToken
47-
- ATLSECURITY/ATL::CAccessToken::PrivilegeCheck
48-
- ATLSECURITY/ATL::CAccessToken::Revert
49-
- ATLSECURITY/ATL::CAccessToken::SetDefaultDacl
50-
- ATLSECURITY/ATL::CAccessToken::SetOwner
51-
- ATLSECURITY/ATL::CAccessToken::SetPrimaryGroup
52-
helpviewer_keywords:
53-
- CAccessToken class
2+
title: "CAccessToken Class"
3+
ms.date: "07/02/2019"
4+
f1_keywords: ["CAccessToken", "ATLSECURITY/ATL::CAccessToken", "ATLSECURITY/ATL::CAccessToken::Attach", "ATLSECURITY/ATL::CAccessToken::CheckTokenMembership", "ATLSECURITY/ATL::CAccessToken::CreateImpersonationToken", "ATLSECURITY/ATL::CAccessToken::CreatePrimaryToken", "ATLSECURITY/ATL::CAccessToken::CreateProcessAsUser", "ATLSECURITY/ATL::CAccessToken::CreateRestrictedToken", "ATLSECURITY/ATL::CAccessToken::Detach", "ATLSECURITY/ATL::CAccessToken::DisablePrivilege", "ATLSECURITY/ATL::CAccessToken::DisablePrivileges", "ATLSECURITY/ATL::CAccessToken::EnablePrivilege", "ATLSECURITY/ATL::CAccessToken::EnablePrivileges", "ATLSECURITY/ATL::CAccessToken::GetDefaultDacl", "ATLSECURITY/ATL::CAccessToken::GetEffectiveToken", "ATLSECURITY/ATL::CAccessToken::GetGroups", "ATLSECURITY/ATL::CAccessToken::GetHandle", "ATLSECURITY/ATL::CAccessToken::GetImpersonationLevel", "ATLSECURITY/ATL::CAccessToken::GetLogonSessionId", "ATLSECURITY/ATL::CAccessToken::GetLogonSid", "ATLSECURITY/ATL::CAccessToken::GetOwner", "ATLSECURITY/ATL::CAccessToken::GetPrimaryGroup", "ATLSECURITY/ATL::CAccessToken::GetPrivileges", "ATLSECURITY/ATL::CAccessToken::GetProcessToken", "ATLSECURITY/ATL::CAccessToken::GetProfile", "ATLSECURITY/ATL::CAccessToken::GetSource", "ATLSECURITY/ATL::CAccessToken::GetStatistics", "ATLSECURITY/ATL::CAccessToken::GetTerminalServicesSessionId", "ATLSECURITY/ATL::CAccessToken::GetThreadToken", "ATLSECURITY/ATL::CAccessToken::GetTokenId", "ATLSECURITY/ATL::CAccessToken::GetType", "ATLSECURITY/ATL::CAccessToken::GetUser", "ATLSECURITY/ATL::CAccessToken::HKeyCurrentUser", "ATLSECURITY/ATL::CAccessToken::Impersonate", "ATLSECURITY/ATL::CAccessToken::ImpersonateLoggedOnUser", "ATLSECURITY/ATL::CAccessToken::IsTokenRestricted", "ATLSECURITY/ATL::CAccessToken::LoadUserProfile", "ATLSECURITY/ATL::CAccessToken::LogonUser", "ATLSECURITY/ATL::CAccessToken::OpenCOMClientToken", "ATLSECURITY/ATL::CAccessToken::OpenNamedPipeClientToken", "ATLSECURITY/ATL::CAccessToken::OpenRPCClientToken", "ATLSECURITY/ATL::CAccessToken::OpenThreadToken", "ATLSECURITY/ATL::CAccessToken::PrivilegeCheck", "ATLSECURITY/ATL::CAccessToken::Revert", "ATLSECURITY/ATL::CAccessToken::SetDefaultDacl", "ATLSECURITY/ATL::CAccessToken::SetOwner", "ATLSECURITY/ATL::CAccessToken::SetPrimaryGroup"]
5+
helpviewer_keywords: ["CAccessToken class"]
546
ms.assetid: bb5c5945-56a5-4083-b442-76573cee83ab
557
---
568
# CAccessToken Class
@@ -210,7 +162,7 @@ bool CreateImpersonationToken(
210162
Pointer to the new `CAccessToken` object.
211163

212164
*sil*<br/>
213-
Specifies a [SECURITY_IMPERSONATION_LEVEL](/windows/desktop/api/winnt/ne-winnt-security_impersonation_level) enumerated type that supplies the impersonation level of the new token.
165+
Specifies a [SECURITY_IMPERSONATION_LEVEL](/windows/desktop/api/winnt/ne-winnt-_security_impersonation_level) enumerated type that supplies the impersonation level of the new token.
214166

215167
### Return Value
216168

@@ -280,7 +232,7 @@ Pointer to a null-terminated string that specifies the command line to execute.
280232
Pointer to a [PROCESS_INFORMATION structure](/windows/win32/api/processthreadsapi/ns-processthreadsapi-process_information) that receives identification information about the new process.
281233

282234
*pStartupInfo*<br/>
283-
Pointer to a [STARTUPINFO](/windows/desktop/api/processthreadsapi/ns-processthreadsapi-startupinfoa) structure that specifies how the main window for the new process should appear.
235+
Pointer to a [STARTUPINFO](/windows/desktop/api/processthreadsapi/ns-processthreadsapi-_startupinfoa) structure that specifies how the main window for the new process should appear.
284236

285237
*dwCreationFlags*<br/>
286238
Specifies additional flags that control the priority class and the creation of the process. See the Win32 function [CreateProcessAsUser](/windows/desktop/api/processthreadsapi/nf-processthreadsapi-createprocessasusera) for a list of flags.
@@ -526,7 +478,7 @@ bool GetImpersonationLevel(
526478
### Parameters
527479

528480
*pImpersonationLevel*<br/>
529-
Pointer to a [SECURITY_IMPERSONATION_LEVEL](/windows/desktop/api/winnt/ne-winnt-security_impersonation_level) enumeration type which will receive the impersonation level information.
481+
Pointer to a [SECURITY_IMPERSONATION_LEVEL](/windows/desktop/api/winnt/ne-winnt-_security_impersonation_level) enumeration type which will receive the impersonation level information.
530482

531483
### Return Value
532484

@@ -543,7 +495,7 @@ bool GetLogonSessionId(LUID* pluid) const throw(...);
543495
### Parameters
544496

545497
*pluid*<br/>
546-
Pointer to a [LUID](/windows/desktop/api/winnt/ns-winnt-luid) which will receive the Logon Session ID.
498+
Pointer to a [LUID](/windows/desktop/api/winnt/ns-winnt-_luid) which will receive the Logon Session ID.
547499

548500
### Return Value
549501

@@ -680,7 +632,7 @@ bool GetSource(TOKEN_SOURCE* pSource) const throw(...);
680632
### Parameters
681633

682634
*pSource*<br/>
683-
Pointer to a [TOKEN_SOURCE](/windows/desktop/api/winnt/ns-winnt-token_source) structure.
635+
Pointer to a [TOKEN_SOURCE](/windows/desktop/api/winnt/ns-winnt-_token_source) structure.
684636

685637
### Return Value
686638

@@ -697,7 +649,7 @@ bool GetStatistics(TOKEN_STATISTICS* pStatistics) const throw(...);
697649
### Parameters
698650

699651
*pStatistics*<br/>
700-
Pointer to a [TOKEN_STATISTICS](/windows/desktop/api/winnt/ns-winnt-token_statistics) structure.
652+
Pointer to a [TOKEN_STATISTICS](/windows/desktop/api/winnt/ns-winnt-_token_statistics) structure.
701653

702654
### Return Value
703655

@@ -759,7 +711,7 @@ bool GetTokenId(LUID* pluid) const throw(...);
759711
### Parameters
760712

761713
*pluid*<br/>
762-
Pointer to a [LUID](/windows/desktop/api/winnt/ns-winnt-luid) which will receive the Token ID.
714+
Pointer to a [LUID](/windows/desktop/api/winnt/ns-winnt-_luid) which will receive the Token ID.
763715

764716
### Return Value
765717

@@ -776,7 +728,7 @@ bool GetType(TOKEN_TYPE* pType) const throw(...);
776728
### Parameters
777729

778730
*pType*<br/>
779-
Address of the [TOKEN_TYPE](/windows/desktop/api/winnt/ne-winnt-token_type) variable that, on success, receives the type of the token.
731+
Address of the [TOKEN_TYPE](/windows/desktop/api/winnt/ne-winnt-_token_type) variable that, on success, receives the type of the token.
780732

781733
### Return Value
782734

@@ -1051,7 +1003,7 @@ Indicates whether the access check is to be made against the security context of
10511003
If this parameter is FALSE, the access check is performed using the security context for the calling thread. If the thread is impersonating a client, this security context can be that of a client process. If this parameter is TRUE, the access check is made using the security context of the process for the calling thread.
10521004

10531005
*sil*<br/>
1054-
Specifies a [SECURITY_IMPERSONATION_LEVEL](/windows/desktop/api/winnt/ne-winnt-security_impersonation_level) enumerated type that supplies the impersonation level of the token.
1006+
Specifies a [SECURITY_IMPERSONATION_LEVEL](/windows/desktop/api/winnt/ne-winnt-_security_impersonation_level) enumerated type that supplies the impersonation level of the token.
10551007

10561008
### Return Value
10571009

@@ -1076,7 +1028,7 @@ bool PrivilegeCheck(
10761028
### Parameters
10771029

10781030
*RequiredPrivileges*<br/>
1079-
Pointer to a [PRIVILEGE_SET](/windows/desktop/api/winnt/ns-winnt-privilege_set) structure.
1031+
Pointer to a [PRIVILEGE_SET](/windows/desktop/api/winnt/ns-winnt-_privilege_set) structure.
10801032

10811033
*pbResult*<br/>
10821034
Pointer to a value the method sets to indicate whether any or all of the specified privilege are enabled in the `CAccessToken` object.
@@ -1087,7 +1039,7 @@ Returns TRUE on success, FALSE on failure.
10871039

10881040
### Remarks
10891041

1090-
When `PrivilegeCheck` returns, the `Attributes` member of each [LUID_AND_ATTRIBUTES](/windows/desktop/api/winnt/ns-winnt-luid_and_attributes) structure is set to SE_PRIVILEGE_USED_FOR_ACCESS if the corresponding privilege is enabled. This method calls the [PrivilegeCheck](/windows/desktop/api/securitybaseapi/nf-securitybaseapi-privilegecheck) Win32 function.
1042+
When `PrivilegeCheck` returns, the `Attributes` member of each [LUID_AND_ATTRIBUTES](/windows/desktop/api/winnt/ns-winnt-_luid_and_attributes) structure is set to SE_PRIVILEGE_USED_FOR_ACCESS if the corresponding privilege is enabled. This method calls the [PrivilegeCheck](/windows/desktop/api/securitybaseapi/nf-securitybaseapi-privilegecheck) Win32 function.
10911043

10921044
## <a name="revert"></a> CAccessToken::Revert
10931045

docs/atl/reference/cacl-class.md

Lines changed: 8 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,8 @@
11
---
2-
title: CAcl Class
3-
ms.date: 11/04/2016
4-
f1_keywords:
5-
- CAcl
6-
- ATLSECURITY/ATL::CAcl
7-
- ATLSECURITY/ATL::CAcl::CAccessMaskArray
8-
- ATLSECURITY/ATL::CAcl::CAceFlagArray
9-
- ATLSECURITY/ATL::CAcl::CAceTypeArray
10-
- ATLSECURITY/ATL::CAcl::CAcl
11-
- ATLSECURITY/ATL::CAcl::GetAceCount
12-
- ATLSECURITY/ATL::CAcl::GetAclEntries
13-
- ATLSECURITY/ATL::CAcl::GetAclEntry
14-
- ATLSECURITY/ATL::CAcl::GetLength
15-
- ATLSECURITY/ATL::CAcl::GetPACL
16-
- ATLSECURITY/ATL::CAcl::IsEmpty
17-
- ATLSECURITY/ATL::CAcl::IsNull
18-
- ATLSECURITY/ATL::CAcl::RemoveAce
19-
- ATLSECURITY/ATL::CAcl::RemoveAces
20-
- ATLSECURITY/ATL::CAcl::SetEmpty
21-
- ATLSECURITY/ATL::CAcl::SetNull
22-
helpviewer_keywords:
23-
- CAcl class
2+
title: "CAcl Class"
3+
ms.date: "11/04/2016"
4+
f1_keywords: ["CAcl", "ATLSECURITY/ATL::CAcl", "ATLSECURITY/ATL::CAcl::CAccessMaskArray", "ATLSECURITY/ATL::CAcl::CAceFlagArray", "ATLSECURITY/ATL::CAcl::CAceTypeArray", "ATLSECURITY/ATL::CAcl::CAcl", "ATLSECURITY/ATL::CAcl::GetAceCount", "ATLSECURITY/ATL::CAcl::GetAclEntries", "ATLSECURITY/ATL::CAcl::GetAclEntry", "ATLSECURITY/ATL::CAcl::GetLength", "ATLSECURITY/ATL::CAcl::GetPACL", "ATLSECURITY/ATL::CAcl::IsEmpty", "ATLSECURITY/ATL::CAcl::IsNull", "ATLSECURITY/ATL::CAcl::RemoveAce", "ATLSECURITY/ATL::CAcl::RemoveAces", "ATLSECURITY/ATL::CAcl::SetEmpty", "ATLSECURITY/ATL::CAcl::SetNull"]
5+
helpviewer_keywords: ["CAcl class"]
246
ms.assetid: 20bcb9af-dc1c-4737-b923-3864776680d6
257
---
268
# CAcl Class
@@ -120,7 +102,7 @@ typedef CAtlArray<BYTE> CAceFlagArray;
120102

121103
### Remarks
122104

123-
This typedef specifies the array type used to define the access-control entry (ACE) type-specific control flags. See the [ACE_HEADER](/windows/desktop/api/winnt/ns-winnt-ace_header) definition for the complete list of possible flags.
105+
This typedef specifies the array type used to define the access-control entry (ACE) type-specific control flags. See the [ACE_HEADER](/windows/desktop/api/winnt/ns-winnt-_ace_header) definition for the complete list of possible flags.
124106

125107
## <a name="cacetypearray"></a> CAcl::CAceTypeArray
126108

@@ -132,7 +114,7 @@ typedef CAtlArray<BYTE> CAceTypeArray;
132114

133115
### Remarks
134116

135-
This typedef specifies the array type used to define the nature of the access-control entry (ACE) objects, such as ACCESS_ALLOWED_ACE_TYPE or ACCESS_DENIED_ACE_TYPE. See the [ACE_HEADER](/windows/desktop/api/winnt/ns-winnt-ace_header) definition for the complete list of possible types.
117+
This typedef specifies the array type used to define the nature of the access-control entry (ACE) objects, such as ACCESS_ALLOWED_ACE_TYPE or ACCESS_DENIED_ACE_TYPE. See the [ACE_HEADER](/windows/desktop/api/winnt/ns-winnt-_ace_header) definition for the complete list of possible types.
136118

137119
## <a name="cacl"></a> CAcl::CAcl
138120

@@ -208,7 +190,7 @@ This method fills the array parameters with the details of every ACE object cont
208190

209191
The contents of each array correspond to each other, that is, the first element of the `CAccessMaskArray` array corresponds to the first element in the `CSidArray` array, and so on.
210192

211-
See [ACE_HEADER](/windows/desktop/api/winnt/ns-winnt-ace_header) for more details on ACE types and flags.
193+
See [ACE_HEADER](/windows/desktop/api/winnt/ns-winnt-_ace_header) for more details on ACE types and flags.
212194

213195
## <a name="getaclentry"></a> CAcl::GetAclEntry
214196

@@ -252,7 +234,7 @@ The inherited object type. This will be set to GUID_NULL if the inherited object
252234

253235
This method will retrieve all of the information about an individual ACE, providing more information than [CAcl::GetAclEntries](#getaclentries) alone makes available.
254236

255-
See [ACE_HEADER](/windows/desktop/api/winnt/ns-winnt-ace_header) for more details on ACE types and flags.
237+
See [ACE_HEADER](/windows/desktop/api/winnt/ns-winnt-_ace_header) for more details on ACE types and flags.
256238

257239
## <a name="getlength"></a> CAcl::GetLength
258240

docs/atl/reference/catlservicemodulet-class.md

Lines changed: 6 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -1,39 +1,8 @@
11
---
2-
title: CAtlServiceModuleT Class
3-
ms.date: 05/06/2019
4-
f1_keywords:
5-
- CAtlServiceModuleT
6-
- ATLBASE/ATL::CAtlServiceModuleT
7-
- ATLBASE/ATL::CAtlServiceModuleT::CAtlServiceModuleT
8-
- ATLBASE/ATL::CAtlServiceModuleT::Handler
9-
- ATLBASE/ATL::CAtlServiceModuleT::InitializeSecurity
10-
- ATLBASE/ATL::CAtlServiceModuleT::Install
11-
- ATLBASE/ATL::CAtlServiceModuleT::IsInstalled
12-
- ATLBASE/ATL::CAtlServiceModuleT::LogEvent
13-
- ATLBASE/ATL::CAtlServiceModuleT::OnContinue
14-
- ATLBASE/ATL::CAtlServiceModuleT::OnInterrogate
15-
- ATLBASE/ATL::CAtlServiceModuleT::OnPause
16-
- ATLBASE/ATL::CAtlServiceModuleT::OnShutdown
17-
- ATLBASE/ATL::CAtlServiceModuleT::OnStop
18-
- ATLBASE/ATL::CAtlServiceModuleT::OnUnknownRequest
19-
- ATLBASE/ATL::CAtlServiceModuleT::ParseCommandLine
20-
- ATLBASE/ATL::CAtlServiceModuleT::PreMessageLoop
21-
- ATLBASE/ATL::CAtlServiceModuleT::RegisterAppId
22-
- ATLBASE/ATL::CAtlServiceModuleT::Run
23-
- ATLBASE/ATL::CAtlServiceModuleT::ServiceMain
24-
- ATLBASE/ATL::CAtlServiceModuleT::SetServiceStatus
25-
- ATLBASE/ATL::CAtlServiceModuleT::Start
26-
- ATLBASE/ATL::CAtlServiceModuleT::Uninstall
27-
- ATLBASE/ATL::CAtlServiceModuleT::Unlock
28-
- ATLBASE/ATL::CAtlServiceModuleT::UnregisterAppId
29-
- ATLBASE/ATL::CAtlServiceModuleT::WinMain
30-
- ATLBASE/ATL::CAtlServiceModuleT::m_bService
31-
- ATLBASE/ATL::CAtlServiceModuleT::m_dwThreadID
32-
- ATLBASE/ATL::CAtlServiceModuleT::m_hServiceStatus
33-
- ATLBASE/ATL::CAtlServiceModuleT::m_status
34-
- ATLBASE/ATL::CAtlServiceModuleT::m_szServiceName
35-
helpviewer_keywords:
36-
- CAtlServiceModuleT class
2+
title: "CAtlServiceModuleT Class"
3+
ms.date: "05/06/2019"
4+
f1_keywords: ["CAtlServiceModuleT", "ATLBASE/ATL::CAtlServiceModuleT", "ATLBASE/ATL::CAtlServiceModuleT::CAtlServiceModuleT", "ATLBASE/ATL::CAtlServiceModuleT::Handler", "ATLBASE/ATL::CAtlServiceModuleT::InitializeSecurity", "ATLBASE/ATL::CAtlServiceModuleT::Install", "ATLBASE/ATL::CAtlServiceModuleT::IsInstalled", "ATLBASE/ATL::CAtlServiceModuleT::LogEvent", "ATLBASE/ATL::CAtlServiceModuleT::OnContinue", "ATLBASE/ATL::CAtlServiceModuleT::OnInterrogate", "ATLBASE/ATL::CAtlServiceModuleT::OnPause", "ATLBASE/ATL::CAtlServiceModuleT::OnShutdown", "ATLBASE/ATL::CAtlServiceModuleT::OnStop", "ATLBASE/ATL::CAtlServiceModuleT::OnUnknownRequest", "ATLBASE/ATL::CAtlServiceModuleT::ParseCommandLine", "ATLBASE/ATL::CAtlServiceModuleT::PreMessageLoop", "ATLBASE/ATL::CAtlServiceModuleT::RegisterAppId", "ATLBASE/ATL::CAtlServiceModuleT::Run", "ATLBASE/ATL::CAtlServiceModuleT::ServiceMain", "ATLBASE/ATL::CAtlServiceModuleT::SetServiceStatus", "ATLBASE/ATL::CAtlServiceModuleT::Start", "ATLBASE/ATL::CAtlServiceModuleT::Uninstall", "ATLBASE/ATL::CAtlServiceModuleT::Unlock", "ATLBASE/ATL::CAtlServiceModuleT::UnregisterAppId", "ATLBASE/ATL::CAtlServiceModuleT::WinMain", "ATLBASE/ATL::CAtlServiceModuleT::m_bService", "ATLBASE/ATL::CAtlServiceModuleT::m_dwThreadID", "ATLBASE/ATL::CAtlServiceModuleT::m_hServiceStatus", "ATLBASE/ATL::CAtlServiceModuleT::m_status", "ATLBASE/ATL::CAtlServiceModuleT::m_szServiceName"]
5+
helpviewer_keywords: ["CAtlServiceModuleT class"]
376
ms.assetid: 8fc753ce-4a50-402b-9b4a-0a4ce5dd496c
387
---
398
# CAtlServiceModuleT Class
@@ -274,7 +243,7 @@ SERVICE_STATUS_HANDLE m_hServiceStatus;
274243

275244
### Remarks
276245

277-
The [SERVICE_STATUS](/windows/desktop/api/winsvc/ns-winsvc-service_status) structure contains information about a service.
246+
The [SERVICE_STATUS](/windows/desktop/api/winsvc/ns-winsvc-_service_status) structure contains information about a service.
278247

279248
## <a name="m_status"></a> CAtlServiceModuleT::m_status
280249

@@ -286,7 +255,7 @@ SERVICE_STATUS m_status;
286255

287256
### Remarks
288257

289-
The [SERVICE_STATUS](/windows/desktop/api/winsvc/ns-winsvc-service_status) structure contains information about a service.
258+
The [SERVICE_STATUS](/windows/desktop/api/winsvc/ns-winsvc-_service_status) structure contains information about a service.
290259

291260
## <a name="m_szservicename"></a> CAtlServiceModuleT::m_szServiceName
292261

0 commit comments

Comments
 (0)