Index: sandbox/win/src/sandbox_policy.h |
diff --git a/sandbox/win/src/sandbox_policy.h b/sandbox/win/src/sandbox_policy.h |
index e032444e7f18d5539186229eea4c8376ff5bc877..c0916ea6dec5b19c0c24481ccd182f59516e3a64 100644 |
--- a/sandbox/win/src/sandbox_policy.h |
+++ b/sandbox/win/src/sandbox_policy.h |
@@ -50,9 +50,12 @@ class TargetPolicy { |
EVENTS_ALLOW_READONLY, // Allows opening an even with synchronize access. |
REG_ALLOW_READONLY, // Allows readonly access to a registry key. |
REG_ALLOW_ANY, // Allows read and write access to a registry key. |
- FAKE_USER_GDI_INIT // Fakes user32 and gdi32 initialization. This can |
+ FAKE_USER_GDI_INIT, // Fakes user32 and gdi32 initialization. This can |
// be used to allow the DLLs to load and initialize |
// even if the process cannot access that subsystem. |
+ IMPLEMENT_OPM_APIS // Implements FAKE_USER_GDI_INIT and also exposes |
+ // IPC calls to handle Output Protection Manager |
+ // APIs. |
}; |
// Increments the reference count of this object. The reference count must |
@@ -244,6 +247,11 @@ class TargetPolicy { |
// to restrict what other processes are allowed to access a process' kernel |
// resources. |
virtual void SetLockdownDefaultDacl() = 0; |
+ |
+ // Enable OPM API redirection when in Win32k lockdown. |
+ virtual void SetEnableOPMRedirection() = 0; |
+ // Enable OPM API emulation when in Win32k lockdown. |
+ virtual bool GetEnableOPMRedirection() = 0; |
}; |
} // namespace sandbox |