Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(5)

Side by Side Diff: sandbox/win/src/sandbox_types.h

Issue 10690058: Add sandbox support for Windows process mitigations (Closed) Base URL: https://src.chromium.org/svn/trunk/src/
Patch Set: Created 8 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2006-2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2006-2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ 5 #ifndef SANDBOX_WIN_SRC_SANDBOX_TYPES_H_
6 #define SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ 6 #define SANDBOX_WIN_SRC_SANDBOX_TYPES_H_
7 7
8 namespace sandbox { 8 namespace sandbox {
9 9
10 // Operation result codes returned by the sandbox API. 10 // Operation result codes returned by the sandbox API.
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after
47 SBOX_ERROR_LAST 47 SBOX_ERROR_LAST
48 }; 48 };
49 49
50 // If the sandbox cannot create a secure environment for the target, the 50 // If the sandbox cannot create a secure environment for the target, the
51 // target will be forcibly terminated. These are the process exit codes. 51 // target will be forcibly terminated. These are the process exit codes.
52 enum TerminationCodes { 52 enum TerminationCodes {
53 SBOX_FATAL_INTEGRITY = 7006, // Could not set the integrity level. 53 SBOX_FATAL_INTEGRITY = 7006, // Could not set the integrity level.
54 SBOX_FATAL_DROPTOKEN = 7007, // Could not lower the token. 54 SBOX_FATAL_DROPTOKEN = 7007, // Could not lower the token.
55 SBOX_FATAL_FLUSHANDLES = 7008, // Failed to flush registry handles. 55 SBOX_FATAL_FLUSHANDLES = 7008, // Failed to flush registry handles.
56 SBOX_FATAL_CACHEDISABLE = 7009, // Failed to forbid HCKU caching. 56 SBOX_FATAL_CACHEDISABLE = 7009, // Failed to forbid HCKU caching.
57 SBOX_FATAL_CLOSEHANDLES = 7010 // Failed to close pending handles. 57 SBOX_FATAL_CLOSEHANDLES = 7010, // Failed to close pending handles.
58 SBOX_FATAL_MITIGATION = 7011 // Could not set the mitigation policy.
58 }; 59 };
59 60
60 class BrokerServices; 61 class BrokerServices;
61 class TargetServices; 62 class TargetServices;
62 63
63 // Contains the pointer to a target or broker service. 64 // Contains the pointer to a target or broker service.
64 struct SandboxInterfaceInfo { 65 struct SandboxInterfaceInfo {
65 BrokerServices* broker_services; 66 BrokerServices* broker_services;
66 TargetServices* target_services; 67 TargetServices* target_services;
67 }; 68 };
(...skipping 10 matching lines...) Expand all
78 INTERCEPTION_EAT, 79 INTERCEPTION_EAT,
79 INTERCEPTION_SIDESTEP, // Preamble patch 80 INTERCEPTION_SIDESTEP, // Preamble patch
80 INTERCEPTION_SMART_SIDESTEP, // Preamble patch but bypass internal calls 81 INTERCEPTION_SMART_SIDESTEP, // Preamble patch but bypass internal calls
81 INTERCEPTION_UNLOAD_MODULE, // Unload the module (don't patch) 82 INTERCEPTION_UNLOAD_MODULE, // Unload the module (don't patch)
82 INTERCEPTION_LAST // Placeholder for last item in the enumeration 83 INTERCEPTION_LAST // Placeholder for last item in the enumeration
83 }; 84 };
84 85
85 } // namespace sandbox 86 } // namespace sandbox
86 87
87 #endif // SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ 88 #endif // SANDBOX_WIN_SRC_SANDBOX_TYPES_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698