Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(4)

Side by Side Diff: sandbox/win/src/sandbox_policy_base.h

Issue 546903002: Added logging in PolicyBase::AddRule. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fri 09/05/2014 11:10:21.69 Created 6 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | sandbox/win/src/sandbox_policy_base.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef SANDBOX_WIN_SRC_SANDBOX_POLICY_BASE_H_ 5 #ifndef SANDBOX_WIN_SRC_SANDBOX_POLICY_BASE_H_
6 #define SANDBOX_WIN_SRC_SANDBOX_POLICY_BASE_H_ 6 #define SANDBOX_WIN_SRC_SANDBOX_POLICY_BASE_H_
7 7
8 #include <windows.h> 8 #include <windows.h>
9 9
10 #include <list> 10 #include <list>
(...skipping 97 matching lines...) Expand 10 before | Expand all | Expand 10 after
108 108
109 // Returns a dispatcher from ipc_targets_. 109 // Returns a dispatcher from ipc_targets_.
110 Dispatcher* GetDispatcher(int ipc_tag); 110 Dispatcher* GetDispatcher(int ipc_tag);
111 111
112 // Sets up interceptions for a new target. 112 // Sets up interceptions for a new target.
113 bool SetupAllInterceptions(TargetProcess* target); 113 bool SetupAllInterceptions(TargetProcess* target);
114 114
115 // Sets up the handle closer for a new target. 115 // Sets up the handle closer for a new target.
116 bool SetupHandleCloser(TargetProcess* target); 116 bool SetupHandleCloser(TargetProcess* target);
117 117
118 // Adds a policy rule effective for processes spawned using this policy.
rvargas (doing something else) 2014/09/05 18:50:36 nit: drop the comment, or replace with something l
Vitaly Buka (NO REVIEWS) 2014/09/06 22:41:42 Done.
119 ResultCode AddRuleInternal(SubSystem subsystem,
120 Semantics semantics,
121 const wchar_t* pattern);
122
118 // This lock synchronizes operations on the targets_ collection. 123 // This lock synchronizes operations on the targets_ collection.
119 CRITICAL_SECTION lock_; 124 CRITICAL_SECTION lock_;
120 // Maintains the list of target process associated with this policy. 125 // Maintains the list of target process associated with this policy.
121 // The policy takes ownership of them. 126 // The policy takes ownership of them.
122 typedef std::list<TargetProcess*> TargetSet; 127 typedef std::list<TargetProcess*> TargetSet;
123 TargetSet targets_; 128 TargetSet targets_;
124 // Standard object-lifetime reference counter. 129 // Standard object-lifetime reference counter.
125 volatile LONG ref_count; 130 volatile LONG ref_count;
126 // The user-defined global policy settings. 131 // The user-defined global policy settings.
127 TokenLevel lockdown_level_; 132 TokenLevel lockdown_level_;
(...skipping 30 matching lines...) Expand all
158 static HDESK alternate_desktop_handle_; 163 static HDESK alternate_desktop_handle_;
159 static HWINSTA alternate_winstation_handle_; 164 static HWINSTA alternate_winstation_handle_;
160 static IntegrityLevel alternate_desktop_integrity_level_label_; 165 static IntegrityLevel alternate_desktop_integrity_level_label_;
161 166
162 DISALLOW_COPY_AND_ASSIGN(PolicyBase); 167 DISALLOW_COPY_AND_ASSIGN(PolicyBase);
163 }; 168 };
164 169
165 } // namespace sandbox 170 } // namespace sandbox
166 171
167 #endif // SANDBOX_WIN_SRC_SANDBOX_POLICY_BASE_H_ 172 #endif // SANDBOX_WIN_SRC_SANDBOX_POLICY_BASE_H_
OLDNEW
« no previous file with comments | « no previous file | sandbox/win/src/sandbox_policy_base.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698