| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ | 5 #ifndef SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ |
| 6 #define SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ | 6 #define SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ |
| 7 | 7 |
| 8 #include "base/process/kill.h" | 8 #include "base/process/kill.h" |
| 9 #include "base/process/launch.h" | 9 #include "base/process/launch.h" |
| 10 | 10 |
| (...skipping 86 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 97 // Cannot setup the interception manager config buffer. | 97 // Cannot setup the interception manager config buffer. |
| 98 SBOX_ERROR_CANNOT_SETUP_INTERCEPTION_CONFIG_BUFFER = 38, | 98 SBOX_ERROR_CANNOT_SETUP_INTERCEPTION_CONFIG_BUFFER = 38, |
| 99 // Cannot copy data to the child process. | 99 // Cannot copy data to the child process. |
| 100 SBOX_ERROR_CANNOT_COPY_DATA_TO_CHILD = 39, | 100 SBOX_ERROR_CANNOT_COPY_DATA_TO_CHILD = 39, |
| 101 // Cannot setup the interception thunk. | 101 // Cannot setup the interception thunk. |
| 102 SBOX_ERROR_CANNOT_SETUP_INTERCEPTION_THUNK = 40, | 102 SBOX_ERROR_CANNOT_SETUP_INTERCEPTION_THUNK = 40, |
| 103 // Cannot resolve the interception thunk. | 103 // Cannot resolve the interception thunk. |
| 104 SBOX_ERROR_CANNOT_RESOLVE_INTERCEPTION_THUNK = 41, | 104 SBOX_ERROR_CANNOT_RESOLVE_INTERCEPTION_THUNK = 41, |
| 105 // Cannot write interception thunk to child process. | 105 // Cannot write interception thunk to child process. |
| 106 SBOX_ERROR_CANNOT_WRITE_INTERCEPTION_THUNK = 42, | 106 SBOX_ERROR_CANNOT_WRITE_INTERCEPTION_THUNK = 42, |
| 107 // Cannot find the base address of the new process. |
| 108 SBOX_ERROR_CANNOT_FIND_BASE_ADDRESS = 43, |
| 107 // Placeholder for last item of the enum. | 109 // Placeholder for last item of the enum. |
| 108 SBOX_ERROR_LAST | 110 SBOX_ERROR_LAST |
| 109 }; | 111 }; |
| 110 | 112 |
| 111 // If the sandbox cannot create a secure environment for the target, the | 113 // If the sandbox cannot create a secure environment for the target, the |
| 112 // target will be forcibly terminated. These are the process exit codes. | 114 // target will be forcibly terminated. These are the process exit codes. |
| 113 enum TerminationCodes { | 115 enum TerminationCodes { |
| 114 SBOX_FATAL_INTEGRITY = 7006, // Could not set the integrity level. | 116 SBOX_FATAL_INTEGRITY = 7006, // Could not set the integrity level. |
| 115 SBOX_FATAL_DROPTOKEN = 7007, // Could not lower the token. | 117 SBOX_FATAL_DROPTOKEN = 7007, // Could not lower the token. |
| 116 SBOX_FATAL_FLUSHANDLES = 7008, // Failed to flush registry handles. | 118 SBOX_FATAL_FLUSHANDLES = 7008, // Failed to flush registry handles. |
| (...skipping 30 matching lines...) Expand all Loading... |
| 147 INTERCEPTION_EAT, | 149 INTERCEPTION_EAT, |
| 148 INTERCEPTION_SIDESTEP, // Preamble patch | 150 INTERCEPTION_SIDESTEP, // Preamble patch |
| 149 INTERCEPTION_SMART_SIDESTEP, // Preamble patch but bypass internal calls | 151 INTERCEPTION_SMART_SIDESTEP, // Preamble patch but bypass internal calls |
| 150 INTERCEPTION_UNLOAD_MODULE, // Unload the module (don't patch) | 152 INTERCEPTION_UNLOAD_MODULE, // Unload the module (don't patch) |
| 151 INTERCEPTION_LAST // Placeholder for last item in the enumeration | 153 INTERCEPTION_LAST // Placeholder for last item in the enumeration |
| 152 }; | 154 }; |
| 153 | 155 |
| 154 } // namespace sandbox | 156 } // namespace sandbox |
| 155 | 157 |
| 156 #endif // SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ | 158 #endif // SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ |
| OLD | NEW |