Index: sandbox/win/src/security_level.h |
diff --git a/sandbox/win/src/security_level.h b/sandbox/win/src/security_level.h |
deleted file mode 100644 |
index 87abdebad57160841d24c59a458a8ff7115d35d0..0000000000000000000000000000000000000000 |
--- a/sandbox/win/src/security_level.h |
+++ /dev/null |
@@ -1,221 +0,0 @@ |
-// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#ifndef SANDBOX_SRC_SECURITY_LEVEL_H_ |
-#define SANDBOX_SRC_SECURITY_LEVEL_H_ |
- |
-#include <stdint.h> |
- |
-namespace sandbox { |
- |
-// List of all the integrity levels supported in the sandbox. This is used |
-// only on Windows Vista. You can't set the integrity level of the process |
-// in the sandbox to a level higher than yours. |
-enum IntegrityLevel { |
- INTEGRITY_LEVEL_SYSTEM, |
- INTEGRITY_LEVEL_HIGH, |
- INTEGRITY_LEVEL_MEDIUM, |
- INTEGRITY_LEVEL_MEDIUM_LOW, |
- INTEGRITY_LEVEL_LOW, |
- INTEGRITY_LEVEL_BELOW_LOW, |
- INTEGRITY_LEVEL_UNTRUSTED, |
- INTEGRITY_LEVEL_LAST |
-}; |
- |
-// The Token level specifies a set of security profiles designed to |
-// provide the bulk of the security of sandbox. |
-// |
-// TokenLevel |Restricting |Deny Only |Privileges| |
-// |Sids |Sids | | |
-// ----------------------------|--------------|----------------|----------| |
-// USER_LOCKDOWN | Null Sid | All | None | |
-// ----------------------------|--------------|----------------|----------| |
-// USER_RESTRICTED | RESTRICTED | All | Traverse | |
-// ----------------------------|--------------|----------------|----------| |
-// USER_LIMITED | Users | All except: | Traverse | |
-// | Everyone | Users | | |
-// | RESTRICTED | Everyone | | |
-// | | Interactive | | |
-// ----------------------------|--------------|----------------|----------| |
-// USER_INTERACTIVE | Users | All except: | Traverse | |
-// | Everyone | Users | | |
-// | RESTRICTED | Everyone | | |
-// | Owner | Interactive | | |
-// | | Local | | |
-// | | Authent-users | | |
-// | | User | | |
-// ----------------------------|--------------|----------------|----------| |
-// USER_NON_ADMIN | None | All except: | Traverse | |
-// | | Users | | |
-// | | Everyone | | |
-// | | Interactive | | |
-// | | Local | | |
-// | | Authent-users | | |
-// | | User | | |
-// ----------------------------|--------------|----------------|----------| |
-// USER_RESTRICTED_SAME_ACCESS | All | None | All | |
-// ----------------------------|--------------|----------------|----------| |
-// USER_UNPROTECTED | None | None | All | |
-// ----------------------------|--------------|----------------|----------| |
-// |
-// The above restrictions are actually a transformation that is applied to |
-// the existing broker process token. The resulting token that will be |
-// applied to the target process depends both on the token level selected |
-// and on the broker token itself. |
-// |
-// The LOCKDOWN and RESTRICTED are designed to allow access to almost |
-// nothing that has security associated with and they are the recommended |
-// levels to run sandboxed code specially if there is a chance that the |
-// broker is process might be started by a user that belongs to the Admins |
-// or power users groups. |
-enum TokenLevel { |
- USER_LOCKDOWN = 0, |
- USER_RESTRICTED, |
- USER_LIMITED, |
- USER_INTERACTIVE, |
- USER_NON_ADMIN, |
- USER_RESTRICTED_SAME_ACCESS, |
- USER_UNPROTECTED, |
- USER_LAST |
-}; |
- |
-// The Job level specifies a set of decreasing security profiles for the |
-// Job object that the target process will be placed into. |
-// This table summarizes the security associated with each level: |
-// |
-// JobLevel |General |Quota | |
-// |restrictions |restrictions | |
-// -----------------|---------------------------------- |--------------------| |
-// JOB_NONE | No job is assigned to the | None | |
-// | sandboxed process. | | |
-// -----------------|---------------------------------- |--------------------| |
-// JOB_UNPROTECTED | None | *Kill on Job close.| |
-// -----------------|---------------------------------- |--------------------| |
-// JOB_INTERACTIVE | *Forbid system-wide changes using | | |
-// | SystemParametersInfo(). | *Kill on Job close.| |
-// | *Forbid the creation/switch of | | |
-// | Desktops. | | |
-// | *Forbids calls to ExitWindows(). | | |
-// -----------------|---------------------------------- |--------------------| |
-// JOB_LIMITED_USER | Same as INTERACTIVE_USER plus: | *One active process| |
-// | *Forbid changes to the display | limit. | |
-// | settings. | *Kill on Job close.| |
-// -----------------|---------------------------------- |--------------------| |
-// JOB_RESTRICTED | Same as LIMITED_USER plus: | *One active process| |
-// | * No read/write to the clipboard. | limit. | |
-// | * No access to User Handles that | *Kill on Job close.| |
-// | belong to other processes. | | |
-// | * Forbid message broadcasts. | | |
-// | * Forbid setting global hooks. | | |
-// | * No access to the global atoms | | |
-// | table. | | |
-// -----------------|-----------------------------------|--------------------| |
-// JOB_LOCKDOWN | Same as RESTRICTED | *One active process| |
-// | | limit. | |
-// | | *Kill on Job close.| |
-// | | *Kill on unhandled | |
-// | | exception. | |
-// | | | |
-// In the context of the above table, 'user handles' refers to the handles of |
-// windows, bitmaps, menus, etc. Files, treads and registry handles are kernel |
-// handles and are not affected by the job level settings. |
-enum JobLevel { |
- JOB_LOCKDOWN = 0, |
- JOB_RESTRICTED, |
- JOB_LIMITED_USER, |
- JOB_INTERACTIVE, |
- JOB_UNPROTECTED, |
- JOB_NONE |
-}; |
- |
-// These flags correspond to various process-level mitigations (eg. ASLR and |
-// DEP). Most are implemented via UpdateProcThreadAttribute() plus flags for |
-// the PROC_THREAD_ATTRIBUTE_MITIGATION_POLICY attribute argument; documented |
-// here: http://msdn.microsoft.com/en-us/library/windows/desktop/ms686880 |
-// Some mitigations are implemented directly by the sandbox or emulated to |
-// the greatest extent possible when not directly supported by the OS. |
-// Flags that are unsupported for the target OS will be silently ignored. |
-// Flags that are invalid for their application (pre or post startup) will |
-// return SBOX_ERROR_BAD_PARAMS. |
-typedef uint64_t MitigationFlags; |
- |
-// Permanently enables DEP for the target process. Corresponds to |
-// PROCESS_CREATION_MITIGATION_POLICY_DEP_ENABLE. |
-const MitigationFlags MITIGATION_DEP = 0x00000001; |
- |
-// Permanently Disables ATL thunk emulation when DEP is enabled. Valid |
-// only when MITIGATION_DEP is passed. Corresponds to not passing |
-// PROCESS_CREATION_MITIGATION_POLICY_DEP_ATL_THUNK_ENABLE. |
-const MitigationFlags MITIGATION_DEP_NO_ATL_THUNK = 0x00000002; |
- |
-// Enables Structured exception handling override prevention. Must be |
-// enabled prior to process start. Corresponds to |
-// PROCESS_CREATION_MITIGATION_POLICY_SEHOP_ENABLE. |
-const MitigationFlags MITIGATION_SEHOP = 0x00000004; |
- |
-// Forces ASLR on all images in the child process. Corresponds to |
-// PROCESS_CREATION_MITIGATION_POLICY_FORCE_RELOCATE_IMAGES_ALWAYS_ON . |
-const MitigationFlags MITIGATION_RELOCATE_IMAGE = 0x00000008; |
- |
-// Refuses to load DLLs that cannot support ASLR. Corresponds to |
-// PROCESS_CREATION_MITIGATION_POLICY_FORCE_RELOCATE_IMAGES_ALWAYS_ON_REQ_RELOCS. |
-const MitigationFlags MITIGATION_RELOCATE_IMAGE_REQUIRED = 0x00000010; |
- |
-// Terminates the process on Windows heap corruption. Coresponds to |
-// PROCESS_CREATION_MITIGATION_POLICY_HEAP_TERMINATE_ALWAYS_ON. |
-const MitigationFlags MITIGATION_HEAP_TERMINATE = 0x00000020; |
- |
-// Sets a random lower bound as the minimum user address. Must be |
-// enabled prior to process start. On 32-bit processes this is |
-// emulated to a much smaller degree. Corresponds to |
-// PROCESS_CREATION_MITIGATION_POLICY_BOTTOM_UP_ASLR_ALWAYS_ON. |
-const MitigationFlags MITIGATION_BOTTOM_UP_ASLR = 0x00000040; |
- |
-// Increases the randomness range of bottom-up ASLR to up to 1TB. Must be |
-// enabled prior to process start and with MITIGATION_BOTTOM_UP_ASLR. |
-// Corresponds to |
-// PROCESS_CREATION_MITIGATION_POLICY_HIGH_ENTROPY_ASLR_ALWAYS_ON |
-const MitigationFlags MITIGATION_HIGH_ENTROPY_ASLR = 0x00000080; |
- |
-// Immediately raises an exception on a bad handle reference. Must be |
-// enabled after startup. Corresponds to |
-// PROCESS_CREATION_MITIGATION_POLICY_STRICT_HANDLE_CHECKS_ALWAYS_ON. |
-const MitigationFlags MITIGATION_STRICT_HANDLE_CHECKS = 0x00000100; |
- |
-// Prevents the process from making Win32k calls. Corresponds to |
-// PROCESS_CREATION_MITIGATION_POLICY_WIN32K_SYSTEM_CALL_DISABLE_ALWAYS_ON. |
-const MitigationFlags MITIGATION_WIN32K_DISABLE = 0x00000200; |
- |
-// Disables common DLL injection methods (e.g. window hooks and |
-// App_InitDLLs). Corresponds to |
-// PROCESS_CREATION_MITIGATION_POLICY_EXTENSION_POINT_DISABLE_ALWAYS_ON. |
-const MitigationFlags MITIGATION_EXTENSION_DLL_DISABLE = 0x00000400; |
- |
-// Prevents the process from loading non-system fonts into GDI. |
-// Corresponds to |
-// PROCESS_CREATION_MITIGATION_POLICY_FONT_DISABLE_ALWAYS_ON |
-const MitigationFlags MITIGATION_NONSYSTEM_FONT_DISABLE = 0x00000800; |
- |
-// Sets the DLL search order to LOAD_LIBRARY_SEARCH_DEFAULT_DIRS. Additional |
-// directories can be added via the Windows AddDllDirectory() function. |
-// http://msdn.microsoft.com/en-us/library/windows/desktop/hh310515 |
-// Must be enabled after startup. |
-const MitigationFlags MITIGATION_DLL_SEARCH_ORDER = 0x00000001ULL << 32; |
- |
-// Changes the mandatory integrity level policy on the current process' token |
-// to enable no-read and no-execute up. This prevents a lower IL process from |
-// opening the process token for impersonate/duplicate/assignment. |
-const MitigationFlags MITIGATION_HARDEN_TOKEN_IL_POLICY = 0x00000001ULL << 33; |
- |
-// Blocks mapping of images from remote devices. Corresponds to |
-// PROCESS_CREATION_MITIGATION_POLICY_IMAGE_LOAD_NO_REMOTE_ALWAYS_ON. |
-const MitigationFlags MITIGATION_IMAGE_LOAD_NO_REMOTE = 0x00000001ULL << 52; |
- |
-// Blocks mapping of images that have the low manditory label. Corresponds to |
-// PROCESS_CREATION_MITIGATION_POLICY_IMAGE_LOAD_NO_LOW_LABEL_ALWAYS_ON. |
-const MitigationFlags MITIGATION_IMAGE_LOAD_NO_LOW_LABEL = 0x00000001ULL << 56; |
- |
-} // namespace sandbox |
- |
-#endif // SANDBOX_SRC_SECURITY_LEVEL_H_ |