Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(56)

Side by Side Diff: sandbox/src/sandbox_policy.h

Issue 10389210: Add a sandbox policy for duplicating handles into the broker. (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: Created 8 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « sandbox/src/policy_params.h ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef SANDBOX_SRC_SANDBOX_POLICY_H_ 5 #ifndef SANDBOX_SRC_SANDBOX_POLICY_H_
6 #define SANDBOX_SRC_SANDBOX_POLICY_H_ 6 #define SANDBOX_SRC_SANDBOX_POLICY_H_
7 7
8 #include <string> 8 #include <string>
9 9
10 #include "base/basictypes.h" 10 #include "base/basictypes.h"
(...skipping 124 matching lines...) Expand 10 before | Expand all | Expand 10 after
135 // Allowable semantics when a rule is matched. 135 // Allowable semantics when a rule is matched.
136 enum Semantics { 136 enum Semantics {
137 FILES_ALLOW_ANY, // Allows open or create for any kind of access that 137 FILES_ALLOW_ANY, // Allows open or create for any kind of access that
138 // the file system supports. 138 // the file system supports.
139 FILES_ALLOW_READONLY, // Allows open or create with read access only. 139 FILES_ALLOW_READONLY, // Allows open or create with read access only.
140 FILES_ALLOW_QUERY, // Allows access to query the attributes of a file. 140 FILES_ALLOW_QUERY, // Allows access to query the attributes of a file.
141 FILES_ALLOW_DIR_ANY, // Allows open or create with directory semantics 141 FILES_ALLOW_DIR_ANY, // Allows open or create with directory semantics
142 // only. 142 // only.
143 HANDLES_DUP_ANY, // Allows duplicating handles opened with any 143 HANDLES_DUP_ANY, // Allows duplicating handles opened with any
144 // access permissions. 144 // access permissions.
145 HANDLES_DUP_BROKER, // Allows duplicating handles to the broker process.
145 NAMEDPIPES_ALLOW_ANY, // Allows creation of a named pipe. 146 NAMEDPIPES_ALLOW_ANY, // Allows creation of a named pipe.
146 PROCESS_MIN_EXEC, // Allows to create a process with minimal rights 147 PROCESS_MIN_EXEC, // Allows to create a process with minimal rights
147 // over the resulting process and thread handles. 148 // over the resulting process and thread handles.
148 // No other parameters besides the command line are 149 // No other parameters besides the command line are
149 // passed to the child process. 150 // passed to the child process.
150 PROCESS_ALL_EXEC, // Allows the creation of a process and return fill 151 PROCESS_ALL_EXEC, // Allows the creation of a process and return fill
151 // access on the returned handles. 152 // access on the returned handles.
152 // This flag can be used only when the main token of 153 // This flag can be used only when the main token of
153 // the sandboxed application is at least INTERACTIVE. 154 // the sandboxed application is at least INTERACTIVE.
154 EVENTS_ALLOW_ANY, // Allows the creation of an event with full access. 155 EVENTS_ALLOW_ANY, // Allows the creation of an event with full access.
(...skipping 25 matching lines...) Expand all
180 // A NULL value for handle_name indicates all handles of the specified type. 181 // A NULL value for handle_name indicates all handles of the specified type.
181 // An empty string for handle_name indicates the handle is unnamed. 182 // An empty string for handle_name indicates the handle is unnamed.
182 virtual ResultCode AddKernelObjectToClose(const wchar_t* handle_type, 183 virtual ResultCode AddKernelObjectToClose(const wchar_t* handle_type,
183 const wchar_t* handle_name) = 0; 184 const wchar_t* handle_name) = 0;
184 }; 185 };
185 186
186 } // namespace sandbox 187 } // namespace sandbox
187 188
188 189
189 #endif // SANDBOX_SRC_SANDBOX_POLICY_H_ 190 #endif // SANDBOX_SRC_SANDBOX_POLICY_H_
OLDNEW
« no previous file with comments | « sandbox/src/policy_params.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698