| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "sandbox/win/src/sandbox_policy_base.h" | 5 #include "sandbox/win/src/sandbox_policy_base.h" |
| 6 | 6 |
| 7 #include <sddl.h> | 7 #include <sddl.h> |
| 8 #include <stddef.h> | |
| 9 #include <stdint.h> | |
| 10 | 8 |
| 9 #include "base/basictypes.h" |
| 11 #include "base/callback.h" | 10 #include "base/callback.h" |
| 12 #include "base/logging.h" | 11 #include "base/logging.h" |
| 13 #include "base/macros.h" | 12 #include "base/macros.h" |
| 14 #include "base/stl_util.h" | 13 #include "base/stl_util.h" |
| 15 #include "base/strings/stringprintf.h" | 14 #include "base/strings/stringprintf.h" |
| 16 #include "base/win/windows_version.h" | 15 #include "base/win/windows_version.h" |
| 17 #include "sandbox/win/src/app_container.h" | 16 #include "sandbox/win/src/app_container.h" |
| 18 #include "sandbox/win/src/filesystem_policy.h" | 17 #include "sandbox/win/src/filesystem_policy.h" |
| 19 #include "sandbox/win/src/handle_policy.h" | 18 #include "sandbox/win/src/handle_policy.h" |
| 20 #include "sandbox/win/src/interception.h" | 19 #include "sandbox/win/src/interception.h" |
| (...skipping 155 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 176 } | 175 } |
| 177 | 176 |
| 178 TokenLevel PolicyBase::GetInitialTokenLevel() const { | 177 TokenLevel PolicyBase::GetInitialTokenLevel() const { |
| 179 return initial_level_; | 178 return initial_level_; |
| 180 } | 179 } |
| 181 | 180 |
| 182 TokenLevel PolicyBase::GetLockdownTokenLevel() const{ | 181 TokenLevel PolicyBase::GetLockdownTokenLevel() const{ |
| 183 return lockdown_level_; | 182 return lockdown_level_; |
| 184 } | 183 } |
| 185 | 184 |
| 186 ResultCode PolicyBase::SetJobLevel(JobLevel job_level, uint32_t ui_exceptions) { | 185 ResultCode PolicyBase::SetJobLevel(JobLevel job_level, uint32 ui_exceptions) { |
| 187 if (memory_limit_ && job_level == JOB_NONE) { | 186 if (memory_limit_ && job_level == JOB_NONE) { |
| 188 return SBOX_ERROR_BAD_PARAMS; | 187 return SBOX_ERROR_BAD_PARAMS; |
| 189 } | 188 } |
| 190 job_level_ = job_level; | 189 job_level_ = job_level; |
| 191 ui_exceptions_ = ui_exceptions; | 190 ui_exceptions_ = ui_exceptions; |
| 192 return SBOX_ALL_OK; | 191 return SBOX_ALL_OK; |
| 193 } | 192 } |
| 194 | 193 |
| 195 ResultCode PolicyBase::SetJobMemoryLimit(size_t memory_limit) { | 194 ResultCode PolicyBase::SetJobMemoryLimit(size_t memory_limit) { |
| 196 if (memory_limit && job_level_ == JOB_NONE) { | 195 if (memory_limit && job_level_ == JOB_NONE) { |
| (...skipping 564 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 761 break; | 760 break; |
| 762 } | 761 } |
| 763 | 762 |
| 764 default: { return SBOX_ERROR_UNSUPPORTED; } | 763 default: { return SBOX_ERROR_UNSUPPORTED; } |
| 765 } | 764 } |
| 766 | 765 |
| 767 return SBOX_ALL_OK; | 766 return SBOX_ALL_OK; |
| 768 } | 767 } |
| 769 | 768 |
| 770 } // namespace sandbox | 769 } // namespace sandbox |
| OLD | NEW |