1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 1.2 +++ b/security/sandbox/win/src/interceptors.h Wed Dec 31 06:09:35 2014 +0100 1.3 @@ -0,0 +1,54 @@ 1.4 +// Copyright (c) 2011 The Chromium Authors. All rights reserved. 1.5 +// Use of this source code is governed by a BSD-style license that can be 1.6 +// found in the LICENSE file. 1.7 + 1.8 +#ifndef SANDBOX_SRC_INTERCEPTORS_H_ 1.9 +#define SANDBOX_SRC_INTERCEPTORS_H_ 1.10 + 1.11 +#if defined(_WIN64) 1.12 +#include "sandbox/win/src/interceptors_64.h" 1.13 +#endif 1.14 + 1.15 +namespace sandbox { 1.16 + 1.17 +enum InterceptorId { 1.18 + // Internal use: 1.19 + MAP_VIEW_OF_SECTION_ID = 0, 1.20 + UNMAP_VIEW_OF_SECTION_ID, 1.21 + // Policy broker: 1.22 + SET_INFORMATION_THREAD_ID, 1.23 + OPEN_THREAD_TOKEN_ID, 1.24 + OPEN_THREAD_TOKEN_EX_ID, 1.25 + OPEN_TREAD_ID, 1.26 + OPEN_PROCESS_ID, 1.27 + OPEN_PROCESS_TOKEN_ID, 1.28 + OPEN_PROCESS_TOKEN_EX_ID, 1.29 + // Filesystem dispatcher: 1.30 + CREATE_FILE_ID, 1.31 + OPEN_FILE_ID, 1.32 + QUERY_ATTRIB_FILE_ID, 1.33 + QUERY_FULL_ATTRIB_FILE_ID, 1.34 + SET_INFO_FILE_ID, 1.35 + // Named pipe dispatcher: 1.36 + CREATE_NAMED_PIPE_ID, 1.37 + // Process-thread dispatcher: 1.38 + CREATE_PROCESSW_ID, 1.39 + CREATE_PROCESSA_ID, 1.40 + // Registry dispatcher: 1.41 + CREATE_KEY_ID, 1.42 + OPEN_KEY_ID, 1.43 + OPEN_KEY_EX_ID, 1.44 + // Sync dispatcher: 1.45 + CREATE_EVENT_ID, 1.46 + OPEN_EVENT_ID, 1.47 + // CSRSS bypasses for HandleCloser: 1.48 + CREATE_THREAD_ID, 1.49 + GET_USER_DEFAULT_LCID_ID, 1.50 + INTERCEPTOR_MAX_ID 1.51 +}; 1.52 + 1.53 +typedef void* OriginalFunctions[INTERCEPTOR_MAX_ID]; 1.54 + 1.55 +} // namespace sandbox 1.56 + 1.57 +#endif // SANDBOX_SRC_INTERCEPTORS_H_