Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(672)

Side by Side Diff: sandbox/win/src/process_mitigations_win32k_policy.cc

Issue 318603003: Sandbox policy and intercepts for the MITIGATION_WIN32K_DISABLE policy for renderer processes. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Code review comments tests Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "sandbox/win/src/process_mitigations_win32k_policy.h"
6
7 namespace sandbox {
8
9 bool ProcessMitigationsWin32KLockdownPolicy::GenerateRules(
10 const wchar_t* name,
rvargas (doing something else) 2014/06/10 03:11:18 nit: indent 4 spaces
ananta 2014/06/10 21:48:06 Done.
11 TargetPolicy::Semantics semantics,
12 LowLevelPolicy* policy) {
13
rvargas (doing something else) 2014/06/10 03:11:18 nit: remove this line
ananta 2014/06/10 21:48:06 Done.
14 PolicyRule rule(FAKE_SUCCESS);
15 if (!policy->AddRule(IPC_GDI_GDIDLLINITIALIZE_TAG, &rule))
16 return false;
17 if (!policy->AddRule(IPC_GDI_GETSTOCKOBJECT_TAG, &rule))
18 return false;
19 if (!policy->AddRule(IPC_USER_REGISTERCLASSW_TAG, &rule))
20 return false;
21 return true;
22 }
23
24 } // namespace sandbox
25
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698