Chromium Code Reviews| Index: sandbox/win/src/sandbox_policy.h |
| diff --git a/sandbox/win/src/sandbox_policy.h b/sandbox/win/src/sandbox_policy.h |
| index cc39c6283950ebc3ba6d29e38d0fbd1d58a2bed7..1f5644d851b23f08c9adb7cb7561fa4a8151efe2 100644 |
| --- a/sandbox/win/src/sandbox_policy.h |
| +++ b/sandbox/win/src/sandbox_policy.h |
| @@ -48,17 +48,17 @@ class TargetPolicy { |
| // over the resulting process and thread handles. |
| // No other parameters besides the command line are |
| // passed to the child process. |
| - PROCESS_ALL_EXEC, // Allows the creation of a process and return fill |
| + PROCESS_ALL_EXEC, // Allows the creation of a process and return full |
|
Will Harris
2016/02/02 05:45:33
add comment that PROCESS_MIN_EXEC and PROCESS_ALL_
liamjm (20p)
2016/02/02 20:43:45
Done.
|
| // access on the returned handles. |
| // This flag can be used only when the main token of |
| // the sandboxed application is at least INTERACTIVE. |
| EVENTS_ALLOW_ANY, // Allows the creation of an event with full access. |
| - EVENTS_ALLOW_READONLY, // Allows opening an even with synchronize access. |
| - REG_ALLOW_READONLY, // Allows readonly access to a registry key. |
| - REG_ALLOW_ANY, // Allows read and write access to a registry key. |
| - FAKE_USER_GDI_INIT // Fakes user32 and gdi32 initialization. This can |
| - // be used to allow the DLLs to load and initialize |
| - // even if the process cannot access that subsystem. |
| + EVENTS_ALLOW_READONLY, // Allows opening an even with synchronize access. |
| + REG_ALLOW_READONLY, // Allows readonly access to a registry key. |
| + REG_ALLOW_ANY, // Allows read and write access to a registry key. |
| + FAKE_USER_GDI_INIT // Fakes user32 and gdi32 initialization. This can |
| + // be used to allow the DLLs to load and initialize |
| + // even if the process cannot access that subsystem. |
| }; |
| // Increments the reference count of this object. The reference count must |