Index: sandbox/win/src/process_mitigations.cc |
diff --git a/sandbox/win/src/process_mitigations.cc b/sandbox/win/src/process_mitigations.cc |
index adcc17c9af91aa3cff6412be073941841df2b20f..1fa52094039c1ec7a993b688267535daa8065b53 100644 |
--- a/sandbox/win/src/process_mitigations.cc |
+++ b/sandbox/win/src/process_mitigations.cc |
@@ -137,8 +137,8 @@ bool ApplyProcessMitigationsToCurrentProcess(MitigationFlags flags) { |
} |
} |
- // Enable dll extension policies. |
- if (flags & MITIGATION_EXTENSION_DLL_DISABLE) { |
+ // Enable extension point policies. |
+ if (flags & MITIGATION_EXTENSION_POINT_DISABLE) { |
PROCESS_MITIGATION_EXTENSION_POINT_DISABLE_POLICY policy = {}; |
policy.DisableExtensionPoints = true; |
@@ -254,7 +254,7 @@ void ConvertProcessMitigationsToPolicy(MitigationFlags flags, |
PROCESS_CREATION_MITIGATION_POLICY_WIN32K_SYSTEM_CALL_DISABLE_ALWAYS_ON; |
} |
- if (flags & MITIGATION_EXTENSION_DLL_DISABLE) { |
+ if (flags & MITIGATION_EXTENSION_POINT_DISABLE) { |
*policy_flags |= |
PROCESS_CREATION_MITIGATION_POLICY_EXTENSION_POINT_DISABLE_ALWAYS_ON; |
} |
@@ -333,7 +333,7 @@ bool CanSetProcessMitigationsPostStartup(MitigationFlags flags) { |
MITIGATION_RELOCATE_IMAGE_REQUIRED | |
MITIGATION_BOTTOM_UP_ASLR | |
MITIGATION_STRICT_HANDLE_CHECKS | |
- MITIGATION_EXTENSION_DLL_DISABLE | |
+ MITIGATION_EXTENSION_POINT_DISABLE | |
MITIGATION_DLL_SEARCH_ORDER | |
MITIGATION_HARDEN_TOKEN_IL_POLICY | |
MITIGATION_WIN32K_DISABLE | |