Index: sandbox/win/src/process_mitigations_win32k_policy.h |
diff --git a/sandbox/win/src/process_mitigations_win32k_policy.h b/sandbox/win/src/process_mitigations_win32k_policy.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..078ed2bee151d23661dd7289f338a7df625182db |
--- /dev/null |
+++ b/sandbox/win/src/process_mitigations_win32k_policy.h |
@@ -0,0 +1,35 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_ |
+#define SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_ |
+ |
+#include "base/basictypes.h" |
+#include "sandbox/win/src/crosscall_server.h" |
+#include "sandbox/win/src/policy_low_level.h" |
+#include "sandbox/win/src/sandbox_policy.h" |
+ |
+namespace sandbox { |
+ |
+enum EvalResult; |
+ |
+// This class centralizes most of the knowledge related to the process |
+// mitigations Win32K lockdown policy. |
+class ProcessMitigationsWin32KLockdownPolicy { |
+ public: |
+ // Creates the required low-level policy rules to evaluate a high-level |
+ // policy rule for the Win32K process mitigation policy. |
+ // name is the object name, semantics is the desired semantics for the |
+ // open or create and policy is the policy generator to which the rules are |
+ // going to be added. |
+ static bool GenerateRules(const wchar_t* name, |
+ TargetPolicy::Semantics semantics, |
+ LowLevelPolicy* policy); |
+}; |
+ |
+} // namespace sandbox |
+ |
+#endif // SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_ |
+ |
+ |