OLD | NEW |
1 // Copyright (c) 2006-2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ | 5 #ifndef SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ |
6 #define SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ | 6 #define SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ |
7 | 7 |
8 namespace sandbox { | 8 namespace sandbox { |
9 | 9 |
10 // Operation result codes returned by the sandbox API. | 10 // Operation result codes returned by the sandbox API. |
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
47 SBOX_ERROR_LAST | 47 SBOX_ERROR_LAST |
48 }; | 48 }; |
49 | 49 |
50 // If the sandbox cannot create a secure environment for the target, the | 50 // If the sandbox cannot create a secure environment for the target, the |
51 // target will be forcibly terminated. These are the process exit codes. | 51 // target will be forcibly terminated. These are the process exit codes. |
52 enum TerminationCodes { | 52 enum TerminationCodes { |
53 SBOX_FATAL_INTEGRITY = 7006, // Could not set the integrity level. | 53 SBOX_FATAL_INTEGRITY = 7006, // Could not set the integrity level. |
54 SBOX_FATAL_DROPTOKEN = 7007, // Could not lower the token. | 54 SBOX_FATAL_DROPTOKEN = 7007, // Could not lower the token. |
55 SBOX_FATAL_FLUSHANDLES = 7008, // Failed to flush registry handles. | 55 SBOX_FATAL_FLUSHANDLES = 7008, // Failed to flush registry handles. |
56 SBOX_FATAL_CACHEDISABLE = 7009, // Failed to forbid HCKU caching. | 56 SBOX_FATAL_CACHEDISABLE = 7009, // Failed to forbid HCKU caching. |
57 SBOX_FATAL_CLOSEHANDLES = 7010 // Failed to close pending handles. | 57 SBOX_FATAL_CLOSEHANDLES = 7010, // Failed to close pending handles. |
| 58 SBOX_FATAL_MITIGATION = 7011 // Could not set the mitigation policy. |
58 }; | 59 }; |
59 | 60 |
60 class BrokerServices; | 61 class BrokerServices; |
61 class TargetServices; | 62 class TargetServices; |
62 | 63 |
63 // Contains the pointer to a target or broker service. | 64 // Contains the pointer to a target or broker service. |
64 struct SandboxInterfaceInfo { | 65 struct SandboxInterfaceInfo { |
65 BrokerServices* broker_services; | 66 BrokerServices* broker_services; |
66 TargetServices* target_services; | 67 TargetServices* target_services; |
67 }; | 68 }; |
(...skipping 10 matching lines...) Expand all Loading... |
78 INTERCEPTION_EAT, | 79 INTERCEPTION_EAT, |
79 INTERCEPTION_SIDESTEP, // Preamble patch | 80 INTERCEPTION_SIDESTEP, // Preamble patch |
80 INTERCEPTION_SMART_SIDESTEP, // Preamble patch but bypass internal calls | 81 INTERCEPTION_SMART_SIDESTEP, // Preamble patch but bypass internal calls |
81 INTERCEPTION_UNLOAD_MODULE, // Unload the module (don't patch) | 82 INTERCEPTION_UNLOAD_MODULE, // Unload the module (don't patch) |
82 INTERCEPTION_LAST // Placeholder for last item in the enumeration | 83 INTERCEPTION_LAST // Placeholder for last item in the enumeration |
83 }; | 84 }; |
84 | 85 |
85 } // namespace sandbox | 86 } // namespace sandbox |
86 | 87 |
87 #endif // SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ | 88 #endif // SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ |
OLD | NEW |