Index: sandbox/win/src/sandbox_policy.h |
diff --git a/sandbox/win/src/sandbox_policy.h b/sandbox/win/src/sandbox_policy.h |
index a9f124516218ae00cebb1f42cf58bd7250798234..4694fbed915f0167117b6a4d86620b07ee47bbc7 100644 |
--- a/sandbox/win/src/sandbox_policy.h |
+++ b/sandbox/win/src/sandbox_policy.h |
@@ -87,6 +87,12 @@ class TargetPolicy { |
// as possible. |
virtual ResultCode SetTokenLevel(TokenLevel initial, TokenLevel lockdown) = 0; |
+ // Returns the initial token level. |
+ virtual TokenLevel GetInitialTokenLevel() const = 0; |
+ |
+ // Returns the lockdown token level. |
+ virtual TokenLevel GetLockdownTokenLevel() const = 0; |
+ |
// Sets the security level of the Job Object to which the target process will |
// belong. This setting is permanent and cannot be changed once the target |
// process is spawned. The job controls the global security settings which |
@@ -144,6 +150,9 @@ class TargetPolicy { |
// to start. |
virtual ResultCode SetIntegrityLevel(IntegrityLevel level) = 0; |
+ // Returns the initial integrity level used. |
+ virtual IntegrityLevel GetIntegrityLevel() const = 0; |
+ |
// Sets the integrity level of the process in the sandbox. The integrity level |
// will not take effect before you call LowerToken. User Interface Privilege |
// Isolation is not affected by this setting and will remain off for the |
@@ -179,7 +188,7 @@ class TargetPolicy { |
virtual ResultCode SetDelayedProcessMitigations(MitigationFlags flags) = 0; |
// Returns the currently set delayed mitigation flags. |
- virtual MitigationFlags GetDelayedProcessMitigations() = 0; |
+ virtual MitigationFlags GetDelayedProcessMitigations() const = 0; |
// Sets the interceptions to operate in strict mode. By default, interceptions |
// are performed in "relaxed" mode, where if something inside NTDLL.DLL is |