| Index: sandbox/win/src/top_level_dispatcher.h
 | 
| diff --git a/sandbox/win/src/top_level_dispatcher.h b/sandbox/win/src/top_level_dispatcher.h
 | 
| new file mode 100644
 | 
| index 0000000000000000000000000000000000000000..c9306de1cb283888dfeffbf68f80193b8620ef13
 | 
| --- /dev/null
 | 
| +++ b/sandbox/win/src/top_level_dispatcher.h
 | 
| @@ -0,0 +1,51 @@
 | 
| +// Copyright 2015 The Chromium Authors. All rights reserved.
 | 
| +// Use of this source code is governed by a BSD-style license that can be
 | 
| +// found in the LICENSE file.
 | 
| +
 | 
| +#ifndef SANDBOX_SRC_TOP_LEVEL_DISPATCHER_H__
 | 
| +#define SANDBOX_SRC_TOP_LEVEL_DISPATCHER_H__
 | 
| +
 | 
| +#include "base/macros.h"
 | 
| +#include "base/memory/scoped_ptr.h"
 | 
| +#include "sandbox/win/src/crosscall_server.h"
 | 
| +#include "sandbox/win/src/interception.h"
 | 
| +#include "sandbox/win/src/ipc_tags.h"
 | 
| +#include "sandbox/win/src/sandbox_policy_base.h"
 | 
| +
 | 
| +namespace sandbox {
 | 
| +
 | 
| +// Top level dispatcher which hands requests to the appropriate service
 | 
| +// dispatchers.
 | 
| +class TopLevelDispatcher : public Dispatcher {
 | 
| + public:
 | 
| +  // |policy| must outlive this class.
 | 
| +  explicit TopLevelDispatcher(PolicyBase* policy);
 | 
| +  ~TopLevelDispatcher() override;
 | 
| +
 | 
| +  Dispatcher* OnMessageReady(IPCParams* ipc,
 | 
| +                             CallbackGeneric* callback) override;
 | 
| +  bool SetupService(InterceptionManager* manager, int service) override;
 | 
| +
 | 
| + private:
 | 
| +  // Test IPC provider.
 | 
| +  bool Ping(IPCInfo* ipc, void* cookie);
 | 
| +
 | 
| +  // Returns a dispatcher from ipc_targets_.
 | 
| +  Dispatcher* GetDispatcher(int ipc_tag);
 | 
| +
 | 
| +  PolicyBase* policy_;
 | 
| +  scoped_ptr<Dispatcher> filesystem_dispatcher_;
 | 
| +  scoped_ptr<Dispatcher> named_pipe_dispatcher_;
 | 
| +  scoped_ptr<Dispatcher> thread_process_dispatcher_;
 | 
| +  scoped_ptr<Dispatcher> sync_dispatcher_;
 | 
| +  scoped_ptr<Dispatcher> registry_dispatcher_;
 | 
| +  scoped_ptr<Dispatcher> handle_dispatcher_;
 | 
| +  scoped_ptr<Dispatcher> process_mitigations_win32k_dispatcher_;
 | 
| +  Dispatcher* ipc_targets_[IPC_LAST_TAG];
 | 
| +
 | 
| +  DISALLOW_COPY_AND_ASSIGN(TopLevelDispatcher);
 | 
| +};
 | 
| +
 | 
| +}  // namespace sandbox
 | 
| +
 | 
| +#endif  // SANDBOX_SRC_TOP_LEVEL_DISPATCHER_H__
 | 
| 
 |