| Index: sandbox/win/src/process_mitigations.cc
|
| diff --git a/sandbox/win/src/process_mitigations.cc b/sandbox/win/src/process_mitigations.cc
|
| index adcc17c9af91aa3cff6412be073941841df2b20f..841c50a54361ce723a47d143475cbfa8b318e5d4 100644
|
| --- a/sandbox/win/src/process_mitigations.cc
|
| +++ b/sandbox/win/src/process_mitigations.cc
|
| @@ -137,8 +137,8 @@ bool ApplyProcessMitigationsToCurrentProcess(MitigationFlags flags) {
|
| }
|
| }
|
|
|
| - // Enable dll extension policies.
|
| - if (flags & MITIGATION_EXTENSION_DLL_DISABLE) {
|
| + // Enable extension point policies.
|
| + if (flags & MITIGATION_EXTENSION_POINT_DISABLE) {
|
| PROCESS_MITIGATION_EXTENSION_POINT_DISABLE_POLICY policy = {};
|
| policy.DisableExtensionPoints = true;
|
|
|
| @@ -254,7 +254,7 @@ void ConvertProcessMitigationsToPolicy(MitigationFlags flags,
|
| PROCESS_CREATION_MITIGATION_POLICY_WIN32K_SYSTEM_CALL_DISABLE_ALWAYS_ON;
|
| }
|
|
|
| - if (flags & MITIGATION_EXTENSION_DLL_DISABLE) {
|
| + if (flags & MITIGATION_EXTENSION_POINT_DISABLE) {
|
| *policy_flags |=
|
| PROCESS_CREATION_MITIGATION_POLICY_EXTENSION_POINT_DISABLE_ALWAYS_ON;
|
| }
|
| @@ -326,20 +326,13 @@ bool CanSetProcessMitigationsPostStartup(MitigationFlags flags) {
|
| // All of these mitigations can be enabled after startup.
|
| return !(
|
| flags &
|
| - ~(MITIGATION_HEAP_TERMINATE |
|
| - MITIGATION_DEP |
|
| - MITIGATION_DEP_NO_ATL_THUNK |
|
| - MITIGATION_RELOCATE_IMAGE |
|
| - MITIGATION_RELOCATE_IMAGE_REQUIRED |
|
| - MITIGATION_BOTTOM_UP_ASLR |
|
| - MITIGATION_STRICT_HANDLE_CHECKS |
|
| - MITIGATION_EXTENSION_DLL_DISABLE |
|
| - MITIGATION_DLL_SEARCH_ORDER |
|
| - MITIGATION_HARDEN_TOKEN_IL_POLICY |
|
| - MITIGATION_WIN32K_DISABLE |
|
| - MITIGATION_NONSYSTEM_FONT_DISABLE |
|
| - MITIGATION_IMAGE_LOAD_NO_REMOTE |
|
| - MITIGATION_IMAGE_LOAD_NO_LOW_LABEL));
|
| + ~(MITIGATION_HEAP_TERMINATE | MITIGATION_DEP |
|
| + MITIGATION_DEP_NO_ATL_THUNK | MITIGATION_RELOCATE_IMAGE |
|
| + MITIGATION_RELOCATE_IMAGE_REQUIRED | MITIGATION_BOTTOM_UP_ASLR |
|
| + MITIGATION_STRICT_HANDLE_CHECKS | MITIGATION_EXTENSION_POINT_DISABLE |
|
| + MITIGATION_DLL_SEARCH_ORDER | MITIGATION_HARDEN_TOKEN_IL_POLICY |
|
| + MITIGATION_WIN32K_DISABLE | MITIGATION_NONSYSTEM_FONT_DISABLE |
|
| + MITIGATION_IMAGE_LOAD_NO_REMOTE | MITIGATION_IMAGE_LOAD_NO_LOW_LABEL));
|
| }
|
|
|
| bool CanSetProcessMitigationsPreStartup(MitigationFlags flags) {
|
|
|