Index: sandbox/win/src/sandbox_policy.h |
=================================================================== |
--- sandbox/win/src/sandbox_policy.h (revision 156579) |
+++ sandbox/win/src/sandbox_policy.h (working copy) |
@@ -164,6 +164,22 @@ |
// Sets a capability to be enabled for the sandboxed process' AppContainer. |
virtual ResultCode SetCapability(const wchar_t* sid) = 0; |
+ // Sets the mitigations enabled when the process is created. Most of these |
+ // are implemented as attributes passed via STARTUPINFOEX. So they take |
+ // effect before any thread in the target executes. The declaration of |
+ // MitigationFlags is followed by a detailed description of each flag. |
+ virtual ResultCode SetProcessMitigations(MitigationFlags flags) = 0; |
+ |
+ // Returns the currently set mitigation flags. |
+ virtual MitigationFlags GetProcessMitigations() = 0; |
+ |
+ // Sets process mitigation flags that don't take effect before the call to |
+ // LowerToken(). |
+ virtual ResultCode SetDelayedProcessMitigations(MitigationFlags flags) = 0; |
+ |
+ // Returns the currently set delayed mitigation flags. |
+ virtual MitigationFlags GetDelayedProcessMitigations() = 0; |
+ |
// Sets the interceptions to operate in strict mode. By default, interceptions |
// are performed in "relaxed" mode, where if something inside NTDLL.DLL is |
// already patched we attempt to intercept it anyway. Setting interceptions |