| Index: sandbox/win/src/security_level.h
|
| diff --git a/sandbox/win/src/security_level.h b/sandbox/win/src/security_level.h
|
| index 87abdebad57160841d24c59a458a8ff7115d35d0..d8524c1facc14ae8b565008529d0795f85ca37b2 100644
|
| --- a/sandbox/win/src/security_level.h
|
| +++ b/sandbox/win/src/security_level.h
|
| @@ -187,10 +187,14 @@ const MitigationFlags MITIGATION_STRICT_HANDLE_CHECKS = 0x00000100;
|
| // PROCESS_CREATION_MITIGATION_POLICY_WIN32K_SYSTEM_CALL_DISABLE_ALWAYS_ON.
|
| const MitigationFlags MITIGATION_WIN32K_DISABLE = 0x00000200;
|
|
|
| -// Disables common DLL injection methods (e.g. window hooks and
|
| -// App_InitDLLs). Corresponds to
|
| +// Prevents certain built-in third party extension points from being used.
|
| +// - App_Init DLLs
|
| +// - Winsock Layered Service Providers (LSPs)
|
| +// - Global Windows Hooks (NOT thread-targeted hooks)
|
| +// - Legacy Input Method Editors (IMEs).
|
| +// I.e.: Disable legacy hooking mechanisms. Corresponds to
|
| // PROCESS_CREATION_MITIGATION_POLICY_EXTENSION_POINT_DISABLE_ALWAYS_ON.
|
| -const MitigationFlags MITIGATION_EXTENSION_DLL_DISABLE = 0x00000400;
|
| +const MitigationFlags MITIGATION_EXTENSION_POINT_DISABLE = 0x00000400;
|
|
|
| // Prevents the process from loading non-system fonts into GDI.
|
| // Corresponds to
|
|
|