Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(655)

Side by Side Diff: sandbox/win/src/process_mitigations_win32k_policy.cc

Issue 318603003: Sandbox policy and intercepts for the MITIGATION_WIN32K_DISABLE policy for renderer processes. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Fixed presubmit warnings Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « sandbox/win/src/process_mitigations_win32k_policy.h ('k') | sandbox/win/src/sandbox_policy.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "sandbox/win/src/process_mitigations_win32k_policy.h"
6
7 namespace sandbox {
8
9 bool ProcessMitigationsWin32KLockdownPolicy::GenerateRules(
10 const wchar_t* name,
11 TargetPolicy::Semantics semantics,
12 LowLevelPolicy* policy) {
13 PolicyRule rule(FAKE_SUCCESS);
14 if (!policy->AddRule(IPC_GDI_GDIDLLINITIALIZE_TAG, &rule))
15 return false;
16 if (!policy->AddRule(IPC_GDI_GETSTOCKOBJECT_TAG, &rule))
17 return false;
18 if (!policy->AddRule(IPC_USER_REGISTERCLASSW_TAG, &rule))
19 return false;
20 return true;
21 }
22
23 } // namespace sandbox
24
OLDNEW
« no previous file with comments | « sandbox/win/src/process_mitigations_win32k_policy.h ('k') | sandbox/win/src/sandbox_policy.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698