Index: sandbox/win/src/sandbox_policy.h |
=================================================================== |
--- sandbox/win/src/sandbox_policy.h (revision 154997) |
+++ sandbox/win/src/sandbox_policy.h (working copy) |
@@ -164,6 +164,26 @@ |
// Sets a capability to be enabled for the sandboxed process' AppContainer. |
virtual ResultCode SetCapability(const wchar_t* sid) = 0; |
+ // Sets the mitigation flags used when starting the process. These flags are |
+ // defined in the PROC_THREAD_ATTRIBUTE_MITIGATION_POLICY attribute for the |
+ // UpdateProcThreadAttribute function. Flags that are invalid for the |
+ // target OS will be silently ignored. |
+ virtual ResultCode SetProcessMitigations(uint64 flags) = 0; |
+ |
cpu_(ooo_6.6-7.5)
2012/09/06 19:46:15
The flags are our flags but the comment can take
jschuh
2012/09/07 01:14:22
Done.
|
+ // Returns the currently set mitigation policy. |
+ virtual uint64 GetProcessMitigations() = 0; |
+ |
+ // Sets the process mitigation flags. These flags will not take effect |
+ // before you call LowerToken. These flags are are defined in the |
+ // PROC_THREAD_ATTRIBUTE_MITIGATION_POLICY attribute for the |
+ // UpdateProcThreadAttribute function. Flags that are invalid for the |
+ // target OS will be silently ignored. Flags that are invalid after process |
+ // startup will return SBOX_ERROR_BAD_PARAMS. |
+ virtual ResultCode SetDelayedProcessMitigations(uint64 flags) = 0; |
+ |
+ // Returns the currently set delayed mitigation policy. |
+ virtual uint64 GetDelayedProcessMitigations() = 0; |
+ |
// Sets the interceptions to operate in strict mode. By default, interceptions |
// are performed in "relaxed" mode, where if something inside NTDLL.DLL is |
// already patched we attempt to intercept it anyway. Setting interceptions |