Chromium Code Reviews| Index: sandbox/win/src/sandbox_policy.h |
| diff --git a/sandbox/win/src/sandbox_policy.h b/sandbox/win/src/sandbox_policy.h |
| index a9f124516218ae00cebb1f42cf58bd7250798234..e4773c869d5b9368e4dce5a6a5ac544cb436cbb8 100644 |
| --- a/sandbox/win/src/sandbox_policy.h |
| +++ b/sandbox/win/src/sandbox_policy.h |
| @@ -26,7 +26,8 @@ class TargetPolicy { |
| SUBSYS_PROCESS, // Creation of child processes. |
| SUBSYS_REGISTRY, // Creation and opening of registry keys. |
| SUBSYS_SYNC, // Creation of named sync objects. |
| - SUBSYS_HANDLES // Duplication of handles to other processes. |
| + SUBSYS_HANDLES, // Duplication of handles to other processes. |
| + SUBSYS_WIN32K_LOCKDOWN // Win32K Lockdown related policy. |
| }; |
| // Allowable semantics when a rule is matched. |
| @@ -52,7 +53,12 @@ class TargetPolicy { |
| EVENTS_ALLOW_ANY, // Allows the creation of an event with full access. |
| EVENTS_ALLOW_READONLY, // Allows opening an even with synchronize access. |
| REG_ALLOW_READONLY, // Allows readonly access to a registry key. |
| - REG_ALLOW_ANY // Allows read and write access to a registry key. |
| + REG_ALLOW_ANY, // Allows read and write access to a registry key. |
| + FAKE_USER32_GDI32_INIT // Fakes user32 and gdi32 initialization. This is |
|
rvargas (doing something else)
2014/06/10 03:11:18
nit: can we get rid of the 32s? as in FAKE_USER_GD
ananta
2014/06/10 21:48:06
Done.
|
| + // used to get the sandboxed process to launch if |
|
rvargas (doing something else)
2014/06/10 03:11:18
How about:
"Fakes user32 and gdi32 initialization.
ananta
2014/06/10 21:48:06
Done.
|
| + // the Win32K lockdown mitigation is set. This |
| + // ensures that these dlls initialize without errors |
| + // which ensures that the target launches. |
| }; |
| // Increments the reference count of this object. The reference count must |