OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "sandbox/win/src/sandbox_policy_base.h" | 5 #include "sandbox/win/src/sandbox_policy_base.h" |
6 | 6 |
7 #include <sddl.h> | 7 #include <sddl.h> |
| 8 #include <stddef.h> |
| 9 #include <stdint.h> |
8 | 10 |
9 #include "base/basictypes.h" | |
10 #include "base/callback.h" | 11 #include "base/callback.h" |
11 #include "base/logging.h" | 12 #include "base/logging.h" |
12 #include "base/macros.h" | 13 #include "base/macros.h" |
13 #include "base/stl_util.h" | 14 #include "base/stl_util.h" |
14 #include "base/strings/stringprintf.h" | 15 #include "base/strings/stringprintf.h" |
15 #include "base/win/windows_version.h" | 16 #include "base/win/windows_version.h" |
16 #include "sandbox/win/src/app_container.h" | 17 #include "sandbox/win/src/app_container.h" |
17 #include "sandbox/win/src/filesystem_policy.h" | 18 #include "sandbox/win/src/filesystem_policy.h" |
18 #include "sandbox/win/src/handle_policy.h" | 19 #include "sandbox/win/src/handle_policy.h" |
19 #include "sandbox/win/src/interception.h" | 20 #include "sandbox/win/src/interception.h" |
(...skipping 155 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
175 } | 176 } |
176 | 177 |
177 TokenLevel PolicyBase::GetInitialTokenLevel() const { | 178 TokenLevel PolicyBase::GetInitialTokenLevel() const { |
178 return initial_level_; | 179 return initial_level_; |
179 } | 180 } |
180 | 181 |
181 TokenLevel PolicyBase::GetLockdownTokenLevel() const{ | 182 TokenLevel PolicyBase::GetLockdownTokenLevel() const{ |
182 return lockdown_level_; | 183 return lockdown_level_; |
183 } | 184 } |
184 | 185 |
185 ResultCode PolicyBase::SetJobLevel(JobLevel job_level, uint32 ui_exceptions) { | 186 ResultCode PolicyBase::SetJobLevel(JobLevel job_level, uint32_t ui_exceptions) { |
186 if (memory_limit_ && job_level == JOB_NONE) { | 187 if (memory_limit_ && job_level == JOB_NONE) { |
187 return SBOX_ERROR_BAD_PARAMS; | 188 return SBOX_ERROR_BAD_PARAMS; |
188 } | 189 } |
189 job_level_ = job_level; | 190 job_level_ = job_level; |
190 ui_exceptions_ = ui_exceptions; | 191 ui_exceptions_ = ui_exceptions; |
191 return SBOX_ALL_OK; | 192 return SBOX_ALL_OK; |
192 } | 193 } |
193 | 194 |
194 ResultCode PolicyBase::SetJobMemoryLimit(size_t memory_limit) { | 195 ResultCode PolicyBase::SetJobMemoryLimit(size_t memory_limit) { |
195 if (memory_limit && job_level_ == JOB_NONE) { | 196 if (memory_limit && job_level_ == JOB_NONE) { |
(...skipping 564 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
760 break; | 761 break; |
761 } | 762 } |
762 | 763 |
763 default: { return SBOX_ERROR_UNSUPPORTED; } | 764 default: { return SBOX_ERROR_UNSUPPORTED; } |
764 } | 765 } |
765 | 766 |
766 return SBOX_ALL_OK; | 767 return SBOX_ALL_OK; |
767 } | 768 } |
768 | 769 |
769 } // namespace sandbox | 770 } // namespace sandbox |
OLD | NEW |