| OLD | NEW |
| (Empty) |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #ifndef SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_ | |
| 6 #define SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_ | |
| 7 | |
| 8 #include "sandbox/win/src/crosscall_server.h" | |
| 9 #include "sandbox/win/src/policy_low_level.h" | |
| 10 #include "sandbox/win/src/sandbox_policy.h" | |
| 11 | |
| 12 namespace sandbox { | |
| 13 | |
| 14 enum EvalResult; | |
| 15 | |
| 16 // This class centralizes most of the knowledge related to the process | |
| 17 // mitigations Win32K lockdown policy. | |
| 18 class ProcessMitigationsWin32KLockdownPolicy { | |
| 19 public: | |
| 20 // Creates the required low-level policy rules to evaluate a high-level | |
| 21 // policy rule for the Win32K process mitigation policy. | |
| 22 // name is the object name, semantics is the desired semantics for the | |
| 23 // open or create and policy is the policy generator to which the rules are | |
| 24 // going to be added. | |
| 25 static bool GenerateRules(const wchar_t* name, | |
| 26 TargetPolicy::Semantics semantics, | |
| 27 LowLevelPolicy* policy); | |
| 28 }; | |
| 29 | |
| 30 } // namespace sandbox | |
| 31 | |
| 32 #endif // SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_ | |
| 33 | |
| 34 | |
| OLD | NEW |