OLD | NEW |
---|---|
(Empty) | |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #ifndef SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_ | |
6 #define SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_ | |
7 | |
8 #include "base/basictypes.h" | |
9 #include "sandbox/win/src/crosscall_server.h" | |
10 #include "sandbox/win/src/policy_low_level.h" | |
11 #include "sandbox/win/src/sandbox_policy.h" | |
12 #include "sandbox/win/src/security_level.h" | |
rvargas (doing something else)
2014/06/10 03:11:18
It doesn't look like this is needed by this header
ananta
2014/06/10 21:48:06
Done.
| |
13 | |
14 namespace sandbox { | |
15 | |
16 enum EvalResult; | |
17 | |
18 // This class centralizes most of the knowledge related to the process | |
19 // mitigations Win32K lockdown policy. | |
20 class ProcessMitigationsWin32KLockdownPolicy { | |
21 public: | |
22 // Creates the required low-level policy rules to evaluate a high-level | |
23 // policy rule for the Win32K process mitigation policy. | |
24 // name is the object name, semantics is the desired semantics for the | |
25 // open or create and policy is the policy generator to which the rules are | |
26 // going to be added. | |
27 static bool GenerateRules(const wchar_t* name, | |
28 TargetPolicy::Semantics semantics, | |
29 LowLevelPolicy* policy); | |
30 }; | |
31 | |
32 } // namespace sandbox | |
33 | |
34 #endif // SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_ | |
35 | |
36 | |
OLD | NEW |