security/sandbox/win/src/interceptors.h

changeset 0
6474c204b198
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/security/sandbox/win/src/interceptors.h	Wed Dec 31 06:09:35 2014 +0100
     1.3 @@ -0,0 +1,54 @@
     1.4 +// Copyright (c) 2011 The Chromium Authors. All rights reserved.
     1.5 +// Use of this source code is governed by a BSD-style license that can be
     1.6 +// found in the LICENSE file.
     1.7 +
     1.8 +#ifndef SANDBOX_SRC_INTERCEPTORS_H_
     1.9 +#define SANDBOX_SRC_INTERCEPTORS_H_
    1.10 +
    1.11 +#if defined(_WIN64)
    1.12 +#include "sandbox/win/src/interceptors_64.h"
    1.13 +#endif
    1.14 +
    1.15 +namespace sandbox {
    1.16 +
    1.17 +enum InterceptorId {
    1.18 +  // Internal use:
    1.19 +  MAP_VIEW_OF_SECTION_ID = 0,
    1.20 +  UNMAP_VIEW_OF_SECTION_ID,
    1.21 +  // Policy broker:
    1.22 +  SET_INFORMATION_THREAD_ID,
    1.23 +  OPEN_THREAD_TOKEN_ID,
    1.24 +  OPEN_THREAD_TOKEN_EX_ID,
    1.25 +  OPEN_TREAD_ID,
    1.26 +  OPEN_PROCESS_ID,
    1.27 +  OPEN_PROCESS_TOKEN_ID,
    1.28 +  OPEN_PROCESS_TOKEN_EX_ID,
    1.29 +  // Filesystem dispatcher:
    1.30 +  CREATE_FILE_ID,
    1.31 +  OPEN_FILE_ID,
    1.32 +  QUERY_ATTRIB_FILE_ID,
    1.33 +  QUERY_FULL_ATTRIB_FILE_ID,
    1.34 +  SET_INFO_FILE_ID,
    1.35 +  // Named pipe dispatcher:
    1.36 +  CREATE_NAMED_PIPE_ID,
    1.37 +  // Process-thread dispatcher:
    1.38 +  CREATE_PROCESSW_ID,
    1.39 +  CREATE_PROCESSA_ID,
    1.40 +  // Registry dispatcher:
    1.41 +  CREATE_KEY_ID,
    1.42 +  OPEN_KEY_ID,
    1.43 +  OPEN_KEY_EX_ID,
    1.44 +  // Sync dispatcher:
    1.45 +  CREATE_EVENT_ID,
    1.46 +  OPEN_EVENT_ID,
    1.47 +  // CSRSS bypasses for HandleCloser:
    1.48 +  CREATE_THREAD_ID,
    1.49 +  GET_USER_DEFAULT_LCID_ID,
    1.50 +  INTERCEPTOR_MAX_ID
    1.51 +};
    1.52 +
    1.53 +typedef void* OriginalFunctions[INTERCEPTOR_MAX_ID];
    1.54 +
    1.55 +}  // namespace sandbox
    1.56 +
    1.57 +#endif  // SANDBOX_SRC_INTERCEPTORS_H_

mercurial