| Index: sandbox/win/src/process_mitigations_win32k_dispatcher.h
|
| diff --git a/sandbox/win/src/process_mitigations_win32k_dispatcher.h b/sandbox/win/src/process_mitigations_win32k_dispatcher.h
|
| deleted file mode 100644
|
| index 55a84a76e78b65abb7ab998252239eb2594cffc6..0000000000000000000000000000000000000000
|
| --- a/sandbox/win/src/process_mitigations_win32k_dispatcher.h
|
| +++ /dev/null
|
| @@ -1,31 +0,0 @@
|
| -// Copyright 2014 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#ifndef SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_
|
| -#define SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_
|
| -
|
| -#include "base/macros.h"
|
| -#include "sandbox/win/src/sandbox_policy_base.h"
|
| -
|
| -namespace sandbox {
|
| -
|
| -// This class sets up intercepts for the Win32K lockdown policy which is set
|
| -// on Windows 8 and beyond.
|
| -class ProcessMitigationsWin32KDispatcher : public Dispatcher {
|
| - public:
|
| - explicit ProcessMitigationsWin32KDispatcher(PolicyBase* policy_base);
|
| - ~ProcessMitigationsWin32KDispatcher() override {}
|
| -
|
| - // Dispatcher interface.
|
| - bool SetupService(InterceptionManager* manager, int service) override;
|
| -
|
| - private:
|
| - PolicyBase* policy_base_;
|
| -
|
| - DISALLOW_COPY_AND_ASSIGN(ProcessMitigationsWin32KDispatcher);
|
| -};
|
| -
|
| -} // namespace sandbox
|
| -
|
| -#endif // SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_
|
|
|