OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "sandbox/win/src/handle_dispatcher.h" | 5 #include "sandbox/win/src/handle_dispatcher.h" |
6 | 6 |
7 #include "base/win/scoped_handle.h" | 7 #include "base/win/scoped_handle.h" |
8 #include "sandbox/win/src/handle_interception.h" | 8 #include "sandbox/win/src/handle_interception.h" |
9 #include "sandbox/win/src/handle_policy.h" | 9 #include "sandbox/win/src/handle_policy.h" |
10 #include "sandbox/win/src/ipc_tags.h" | 10 #include "sandbox/win/src/ipc_tags.h" |
11 #include "sandbox/win/src/policy_broker.h" | 11 #include "sandbox/win/src/policy_broker.h" |
12 #include "sandbox/win/src/policy_params.h" | 12 #include "sandbox/win/src/policy_params.h" |
13 #include "sandbox/win/src/sandbox.h" | 13 #include "sandbox/win/src/sandbox.h" |
14 #include "sandbox/win/src/sandbox_nt_util.h" | 14 #include "sandbox/win/src/sandbox_nt_util.h" |
15 #include "sandbox/win/src/sandbox_types.h" | 15 #include "sandbox/win/src/sandbox_types.h" |
16 #include "sandbox/win/src/sandbox_utils.h" | 16 #include "sandbox/win/src/sandbox_utils.h" |
17 | 17 |
18 namespace sandbox { | 18 namespace sandbox { |
19 | 19 |
20 HandleDispatcher::HandleDispatcher(PolicyBase* policy_base) | 20 HandleDispatcher::HandleDispatcher(TargetPolicy* policy) |
21 : policy_base_(policy_base) { | 21 : policy_(policy) { |
22 static const IPCCall duplicate_handle_proxy = { | 22 static const IPCCall duplicate_handle_proxy = { |
23 {IPC_DUPLICATEHANDLEPROXY_TAG, | 23 {IPC_DUPLICATEHANDLEPROXY_TAG, |
24 {VOIDPTR_TYPE, UINT32_TYPE, UINT32_TYPE, UINT32_TYPE}}, | 24 {VOIDPTR_TYPE, UINT32_TYPE, UINT32_TYPE, UINT32_TYPE}}, |
25 reinterpret_cast<CallbackGeneric>( | 25 reinterpret_cast<CallbackGeneric>( |
26 &HandleDispatcher::DuplicateHandleProxy)}; | 26 &HandleDispatcher::DuplicateHandleProxy)}; |
27 | 27 |
28 ipc_calls_.push_back(duplicate_handle_proxy); | 28 ipc_calls_.push_back(duplicate_handle_proxy); |
29 } | 29 } |
30 | 30 |
31 bool HandleDispatcher::SetupService(InterceptionManager* manager, | 31 bool HandleDispatcher::SetupService(InterceptionManager* manager, |
(...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
69 if (!NT_SUCCESS(error)) { | 69 if (!NT_SUCCESS(error)) { |
70 ipc->return_info.nt_status = error; | 70 ipc->return_info.nt_status = error; |
71 return false; | 71 return false; |
72 } | 72 } |
73 type_info->Name.Buffer[type_info->Name.Length / sizeof(wchar_t)] = L'\0'; | 73 type_info->Name.Buffer[type_info->Name.Length / sizeof(wchar_t)] = L'\0'; |
74 | 74 |
75 CountedParameterSet<HandleTarget> params; | 75 CountedParameterSet<HandleTarget> params; |
76 params[HandleTarget::NAME] = ParamPickerMake(type_info->Name.Buffer); | 76 params[HandleTarget::NAME] = ParamPickerMake(type_info->Name.Buffer); |
77 params[HandleTarget::TARGET] = ParamPickerMake(target_process_id); | 77 params[HandleTarget::TARGET] = ParamPickerMake(target_process_id); |
78 | 78 |
79 EvalResult eval = policy_base_->EvalPolicy(IPC_DUPLICATEHANDLEPROXY_TAG, | 79 EvalResult eval = |
80 params.GetBase()); | 80 policy_->EvalPolicy(IPC_DUPLICATEHANDLEPROXY_TAG, params.GetBase()); |
81 ipc->return_info.win32_result = | 81 ipc->return_info.win32_result = |
82 HandlePolicy::DuplicateHandleProxyAction(eval, handle.Get(), | 82 HandlePolicy::DuplicateHandleProxyAction(eval, handle.Get(), |
83 target_process_id, | 83 target_process_id, |
84 &ipc->return_info.handle, | 84 &ipc->return_info.handle, |
85 desired_access, options); | 85 desired_access, options); |
86 return true; | 86 return true; |
87 } | 87 } |
88 | 88 |
89 } // namespace sandbox | 89 } // namespace sandbox |
90 | 90 |
OLD | NEW |