Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(146)

Side by Side Diff: sandbox/win/src/sandbox_types.h

Issue 2323443003: Implement new method to get process base address in Windows sandbox. (Closed)
Patch Set: Fix typo Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | sandbox/win/src/target_process.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ 5 #ifndef SANDBOX_WIN_SRC_SANDBOX_TYPES_H_
6 #define SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ 6 #define SANDBOX_WIN_SRC_SANDBOX_TYPES_H_
7 7
8 #include "base/process/kill.h" 8 #include "base/process/kill.h"
9 #include "base/process/launch.h" 9 #include "base/process/launch.h"
10 10
(...skipping 86 matching lines...) Expand 10 before | Expand all | Expand 10 after
97 // Cannot setup the interception manager config buffer. 97 // Cannot setup the interception manager config buffer.
98 SBOX_ERROR_CANNOT_SETUP_INTERCEPTION_CONFIG_BUFFER = 38, 98 SBOX_ERROR_CANNOT_SETUP_INTERCEPTION_CONFIG_BUFFER = 38,
99 // Cannot copy data to the child process. 99 // Cannot copy data to the child process.
100 SBOX_ERROR_CANNOT_COPY_DATA_TO_CHILD = 39, 100 SBOX_ERROR_CANNOT_COPY_DATA_TO_CHILD = 39,
101 // Cannot setup the interception thunk. 101 // Cannot setup the interception thunk.
102 SBOX_ERROR_CANNOT_SETUP_INTERCEPTION_THUNK = 40, 102 SBOX_ERROR_CANNOT_SETUP_INTERCEPTION_THUNK = 40,
103 // Cannot resolve the interception thunk. 103 // Cannot resolve the interception thunk.
104 SBOX_ERROR_CANNOT_RESOLVE_INTERCEPTION_THUNK = 41, 104 SBOX_ERROR_CANNOT_RESOLVE_INTERCEPTION_THUNK = 41,
105 // Cannot write interception thunk to child process. 105 // Cannot write interception thunk to child process.
106 SBOX_ERROR_CANNOT_WRITE_INTERCEPTION_THUNK = 42, 106 SBOX_ERROR_CANNOT_WRITE_INTERCEPTION_THUNK = 42,
107 // Cannot find the base address of the new process.
108 SBOX_ERROR_CANNOT_FIND_BASE_ADDRESS = 43,
107 // Placeholder for last item of the enum. 109 // Placeholder for last item of the enum.
108 SBOX_ERROR_LAST 110 SBOX_ERROR_LAST
109 }; 111 };
110 112
111 // If the sandbox cannot create a secure environment for the target, the 113 // If the sandbox cannot create a secure environment for the target, the
112 // target will be forcibly terminated. These are the process exit codes. 114 // target will be forcibly terminated. These are the process exit codes.
113 enum TerminationCodes { 115 enum TerminationCodes {
114 SBOX_FATAL_INTEGRITY = 7006, // Could not set the integrity level. 116 SBOX_FATAL_INTEGRITY = 7006, // Could not set the integrity level.
115 SBOX_FATAL_DROPTOKEN = 7007, // Could not lower the token. 117 SBOX_FATAL_DROPTOKEN = 7007, // Could not lower the token.
116 SBOX_FATAL_FLUSHANDLES = 7008, // Failed to flush registry handles. 118 SBOX_FATAL_FLUSHANDLES = 7008, // Failed to flush registry handles.
(...skipping 30 matching lines...) Expand all
147 INTERCEPTION_EAT, 149 INTERCEPTION_EAT,
148 INTERCEPTION_SIDESTEP, // Preamble patch 150 INTERCEPTION_SIDESTEP, // Preamble patch
149 INTERCEPTION_SMART_SIDESTEP, // Preamble patch but bypass internal calls 151 INTERCEPTION_SMART_SIDESTEP, // Preamble patch but bypass internal calls
150 INTERCEPTION_UNLOAD_MODULE, // Unload the module (don't patch) 152 INTERCEPTION_UNLOAD_MODULE, // Unload the module (don't patch)
151 INTERCEPTION_LAST // Placeholder for last item in the enumeration 153 INTERCEPTION_LAST // Placeholder for last item in the enumeration
152 }; 154 };
153 155
154 } // namespace sandbox 156 } // namespace sandbox
155 157
156 #endif // SANDBOX_WIN_SRC_SANDBOX_TYPES_H_ 158 #endif // SANDBOX_WIN_SRC_SANDBOX_TYPES_H_
OLDNEW
« no previous file with comments | « no previous file | sandbox/win/src/target_process.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698