| Index: sandbox/win/src/process_mitigations_win32k_policy.h
|
| diff --git a/sandbox/win/src/process_mitigations_win32k_policy.h b/sandbox/win/src/process_mitigations_win32k_policy.h
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..078ed2bee151d23661dd7289f338a7df625182db
|
| --- /dev/null
|
| +++ b/sandbox/win/src/process_mitigations_win32k_policy.h
|
| @@ -0,0 +1,35 @@
|
| +// Copyright 2014 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#ifndef SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_
|
| +#define SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_
|
| +
|
| +#include "base/basictypes.h"
|
| +#include "sandbox/win/src/crosscall_server.h"
|
| +#include "sandbox/win/src/policy_low_level.h"
|
| +#include "sandbox/win/src/sandbox_policy.h"
|
| +
|
| +namespace sandbox {
|
| +
|
| +enum EvalResult;
|
| +
|
| +// This class centralizes most of the knowledge related to the process
|
| +// mitigations Win32K lockdown policy.
|
| +class ProcessMitigationsWin32KLockdownPolicy {
|
| + public:
|
| + // Creates the required low-level policy rules to evaluate a high-level
|
| + // policy rule for the Win32K process mitigation policy.
|
| + // name is the object name, semantics is the desired semantics for the
|
| + // open or create and policy is the policy generator to which the rules are
|
| + // going to be added.
|
| + static bool GenerateRules(const wchar_t* name,
|
| + TargetPolicy::Semantics semantics,
|
| + LowLevelPolicy* policy);
|
| +};
|
| +
|
| +} // namespace sandbox
|
| +
|
| +#endif // SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_POLICY_H_
|
| +
|
| +
|
|
|