Index: sandbox/win/src/security_level.h |
diff --git a/sandbox/win/src/security_level.h b/sandbox/win/src/security_level.h |
index 26ec306a621b9055fb6457a11f568e2ae710962f..87abdebad57160841d24c59a458a8ff7115d35d0 100644 |
--- a/sandbox/win/src/security_level.h |
+++ b/sandbox/win/src/security_level.h |
@@ -183,8 +183,7 @@ const MitigationFlags MITIGATION_HIGH_ENTROPY_ASLR = 0x00000080; |
// PROCESS_CREATION_MITIGATION_POLICY_STRICT_HANDLE_CHECKS_ALWAYS_ON. |
const MitigationFlags MITIGATION_STRICT_HANDLE_CHECKS = 0x00000100; |
-// Prevents the process from making Win32k calls. Must be enabled after |
-// startup. Corresponds to |
+// Prevents the process from making Win32k calls. Corresponds to |
// PROCESS_CREATION_MITIGATION_POLICY_WIN32K_SYSTEM_CALL_DISABLE_ALWAYS_ON. |
const MitigationFlags MITIGATION_WIN32K_DISABLE = 0x00000200; |
@@ -193,6 +192,11 @@ const MitigationFlags MITIGATION_WIN32K_DISABLE = 0x00000200; |
// PROCESS_CREATION_MITIGATION_POLICY_EXTENSION_POINT_DISABLE_ALWAYS_ON. |
const MitigationFlags MITIGATION_EXTENSION_DLL_DISABLE = 0x00000400; |
+// Prevents the process from loading non-system fonts into GDI. |
+// Corresponds to |
+// PROCESS_CREATION_MITIGATION_POLICY_FONT_DISABLE_ALWAYS_ON |
+const MitigationFlags MITIGATION_NONSYSTEM_FONT_DISABLE = 0x00000800; |
+ |
// Sets the DLL search order to LOAD_LIBRARY_SEARCH_DEFAULT_DIRS. Additional |
// directories can be added via the Windows AddDllDirectory() function. |
// http://msdn.microsoft.com/en-us/library/windows/desktop/hh310515 |
@@ -204,6 +208,14 @@ const MitigationFlags MITIGATION_DLL_SEARCH_ORDER = 0x00000001ULL << 32; |
// opening the process token for impersonate/duplicate/assignment. |
const MitigationFlags MITIGATION_HARDEN_TOKEN_IL_POLICY = 0x00000001ULL << 33; |
+// Blocks mapping of images from remote devices. Corresponds to |
+// PROCESS_CREATION_MITIGATION_POLICY_IMAGE_LOAD_NO_REMOTE_ALWAYS_ON. |
+const MitigationFlags MITIGATION_IMAGE_LOAD_NO_REMOTE = 0x00000001ULL << 52; |
+ |
+// Blocks mapping of images that have the low manditory label. Corresponds to |
+// PROCESS_CREATION_MITIGATION_POLICY_IMAGE_LOAD_NO_LOW_LABEL_ALWAYS_ON. |
+const MitigationFlags MITIGATION_IMAGE_LOAD_NO_LOW_LABEL = 0x00000001ULL << 56; |
+ |
} // namespace sandbox |
#endif // SANDBOX_SRC_SECURITY_LEVEL_H_ |