Chromium Code Reviews| Index: sandbox/win/src/process_mitigations.cc |
| diff --git a/sandbox/win/src/process_mitigations.cc b/sandbox/win/src/process_mitigations.cc |
| index adcc17c9af91aa3cff6412be073941841df2b20f..f6c59c2e2fb82abb6028d9147fc32db3f5dc47fd 100644 |
| --- a/sandbox/win/src/process_mitigations.cc |
| +++ b/sandbox/win/src/process_mitigations.cc |
| @@ -137,8 +137,8 @@ bool ApplyProcessMitigationsToCurrentProcess(MitigationFlags flags) { |
| } |
| } |
| - // Enable dll extension policies. |
| - if (flags & MITIGATION_EXTENSION_DLL_DISABLE) { |
| + // Enable system call policies. |
|
Will Harris
2016/04/04 00:15:08
wrong comment?
penny
2016/04/11 22:11:58
Done.
|
| + if (flags & MITIGATION_EXTENSION_POINT_DISABLE) { |
| PROCESS_MITIGATION_EXTENSION_POINT_DISABLE_POLICY policy = {}; |
| policy.DisableExtensionPoints = true; |
| @@ -254,7 +254,7 @@ void ConvertProcessMitigationsToPolicy(MitigationFlags flags, |
| PROCESS_CREATION_MITIGATION_POLICY_WIN32K_SYSTEM_CALL_DISABLE_ALWAYS_ON; |
| } |
| - if (flags & MITIGATION_EXTENSION_DLL_DISABLE) { |
| + if (flags & MITIGATION_EXTENSION_POINT_DISABLE) { |
| *policy_flags |= |
| PROCESS_CREATION_MITIGATION_POLICY_EXTENSION_POINT_DISABLE_ALWAYS_ON; |
| } |
| @@ -333,7 +333,7 @@ bool CanSetProcessMitigationsPostStartup(MitigationFlags flags) { |
| MITIGATION_RELOCATE_IMAGE_REQUIRED | |
| MITIGATION_BOTTOM_UP_ASLR | |
| MITIGATION_STRICT_HANDLE_CHECKS | |
| - MITIGATION_EXTENSION_DLL_DISABLE | |
| + MITIGATION_EXTENSION_POINT_DISABLE | |
| MITIGATION_DLL_SEARCH_ORDER | |
| MITIGATION_HARDEN_TOKEN_IL_POLICY | |
| MITIGATION_WIN32K_DISABLE | |