| Index: sandbox/win/src/sandbox_policy.h
|
| diff --git a/sandbox/win/src/sandbox_policy.h b/sandbox/win/src/sandbox_policy.h
|
| index edac55ec91e6e6c8cc1bba7644617cbb10c0e2a9..6b44e0eb64cb1d522e2c37e4f52b100c3cbb3a74 100644
|
| --- a/sandbox/win/src/sandbox_policy.h
|
| +++ b/sandbox/win/src/sandbox_policy.h
|
| @@ -54,9 +54,12 @@ class TargetPolicy {
|
| EVENTS_ALLOW_READONLY, // Allows opening an even with synchronize access.
|
| REG_ALLOW_READONLY, // Allows readonly access to a registry key.
|
| REG_ALLOW_ANY, // Allows read and write access to a registry key.
|
| - FAKE_USER_GDI_INIT // Fakes user32 and gdi32 initialization. This can
|
| + FAKE_USER_GDI_INIT, // Fakes user32 and gdi32 initialization. This can
|
| // be used to allow the DLLs to load and initialize
|
| // even if the process cannot access that subsystem.
|
| + IMPLEMENT_OPM_APIS // Implements FAKE_USER_GDI_INIT and also exposes
|
| + // IPC calls to handle Output Protection Manager
|
| + // APIs.
|
| };
|
|
|
| // Increments the reference count of this object. The reference count must
|
| @@ -259,6 +262,11 @@ class TargetPolicy {
|
| // to restrict what other processes are allowed to access a process' kernel
|
| // resources.
|
| virtual void SetLockdownDefaultDacl() = 0;
|
| +
|
| + // Enable OPM API redirection when in Win32k lockdown.
|
| + virtual void SetEnableOPMRedirection() = 0;
|
| + // Enable OPM API emulation when in Win32k lockdown.
|
| + virtual bool GetEnableOPMRedirection() = 0;
|
| };
|
|
|
| } // namespace sandbox
|
|
|