Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(747)

Unified Diff: sandbox/win/src/target_process.h

Issue 1851213002: Remove sandbox on Windows. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: fix nacl compile issues Created 4 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « sandbox/win/src/target_interceptions.cc ('k') | sandbox/win/src/target_process.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: sandbox/win/src/target_process.h
diff --git a/sandbox/win/src/target_process.h b/sandbox/win/src/target_process.h
deleted file mode 100644
index 547d4141f733dc09a75b0970ba8ca7c761d9907d..0000000000000000000000000000000000000000
--- a/sandbox/win/src/target_process.h
+++ /dev/null
@@ -1,144 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#ifndef SANDBOX_WIN_SRC_TARGET_PROCESS_H_
-#define SANDBOX_WIN_SRC_TARGET_PROCESS_H_
-
-#include <windows.h>
-#include <stddef.h>
-#include <stdint.h>
-
-#include "base/macros.h"
-#include "base/memory/free_deleter.h"
-#include "base/memory/scoped_ptr.h"
-#include "base/win/scoped_handle.h"
-#include "base/win/scoped_process_information.h"
-#include "sandbox/win/src/crosscall_server.h"
-#include "sandbox/win/src/sandbox_types.h"
-
-namespace base {
-namespace win {
-
-class StartupInformation;
-
-}; // namespace win
-}; // namespace base
-
-namespace sandbox {
-
-class AttributeList;
-class SharedMemIPCServer;
-class ThreadProvider;
-
-// TargetProcess models a target instance (child process). Objects of this
-// class are owned by the Policy used to create them.
-class TargetProcess {
- public:
- // The constructor takes ownership of |initial_token|, |lockdown_token|
- // and |lowbox_token|.
- TargetProcess(base::win::ScopedHandle initial_token,
- base::win::ScopedHandle lockdown_token,
- base::win::ScopedHandle lowbox_token,
- HANDLE job,
- ThreadProvider* thread_pool);
- ~TargetProcess();
-
- // TODO(cpu): Currently there does not seem to be a reason to implement
- // reference counting for this class since is internal, but kept the
- // the same interface so the interception framework does not need to be
- // touched at this point.
- void AddRef() {}
- void Release() {}
-
- // Creates the new target process. The process is created suspended.
- DWORD Create(const wchar_t* exe_path,
- const wchar_t* command_line,
- bool inherit_handles,
- const base::win::StartupInformation& startup_info,
- base::win::ScopedProcessInformation* target_info);
-
- // Destroys the target process.
- void Terminate();
-
- // Creates the IPC objects such as the BrokerDispatcher and the
- // IPC server. The IPC server uses the services of the thread_pool.
- DWORD Init(Dispatcher* ipc_dispatcher,
- void* policy,
- uint32_t shared_IPC_size,
- uint32_t shared_policy_size);
-
- // Returns the handle to the target process.
- HANDLE Process() const {
- return sandbox_process_info_.process_handle();
- }
-
- // Returns the handle to the job object that the target process belongs to.
- HANDLE Job() const {
- return job_;
- }
-
- // Returns the address of the target main exe. This is used by the
- // interceptions framework.
- HMODULE MainModule() const {
- return reinterpret_cast<HMODULE>(base_address_);
- }
-
- // Returns the name of the executable.
- const wchar_t* Name() const {
- return exe_name_.get();
- }
-
- // Returns the process id.
- DWORD ProcessId() const {
- return sandbox_process_info_.process_id();
- }
-
- // Returns the handle to the main thread.
- HANDLE MainThread() const {
- return sandbox_process_info_.thread_handle();
- }
-
- // Transfers a 32-bit variable between the broker and the target.
- ResultCode TransferVariable(const char* name, void* address, size_t size);
-
- private:
- // Details of the target process.
- base::win::ScopedProcessInformation sandbox_process_info_;
- // The token associated with the process. It provides the core of the
- // sbox security.
- base::win::ScopedHandle lockdown_token_;
- // The token given to the initial thread so that the target process can
- // start. It has more powers than the lockdown_token.
- base::win::ScopedHandle initial_token_;
- // The lowbox token associated with the process. This token is set after the
- // process creation.
- base::win::ScopedHandle lowbox_token_;
- // Kernel handle to the shared memory used by the IPC server.
- base::win::ScopedHandle shared_section_;
- // Job object containing the target process.
- HANDLE job_;
- // Reference to the IPC subsystem.
- scoped_ptr<SharedMemIPCServer> ipc_server_;
- // Provides the threads used by the IPC. This class does not own this pointer.
- ThreadProvider* thread_pool_;
- // Base address of the main executable
- void* base_address_;
- // Full name of the target executable.
- scoped_ptr<wchar_t, base::FreeDeleter> exe_name_;
-
- // Function used for testing.
- friend TargetProcess* MakeTestTargetProcess(HANDLE process,
- HMODULE base_address);
-
- DISALLOW_IMPLICIT_CONSTRUCTORS(TargetProcess);
-};
-
-// Creates a mock TargetProcess used for testing interceptions.
-// TODO(cpu): It seems that this method is not going to be used anymore.
-TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address);
-
-
-} // namespace sandbox
-
-#endif // SANDBOX_WIN_SRC_TARGET_PROCESS_H_
« no previous file with comments | « sandbox/win/src/target_interceptions.cc ('k') | sandbox/win/src/target_process.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698