Index: sandbox/win/src/process_mitigations_win32k_dispatcher.h |
diff --git a/sandbox/win/src/process_mitigations_win32k_dispatcher.h b/sandbox/win/src/process_mitigations_win32k_dispatcher.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..6a8ee11701b3d8b3eff13a32a903078ebee32c4b |
--- /dev/null |
+++ b/sandbox/win/src/process_mitigations_win32k_dispatcher.h |
@@ -0,0 +1,31 @@ |
+// Copyright (c) 2014 The Chromium Authors. All rights reserved. |
rvargas (doing something else)
2014/06/06 21:22:24
nit: No (c) for new files
ananta
2014/06/06 23:57:35
Done.
|
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_ |
+#define SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_ |
+ |
+#include "base/basictypes.h" |
+#include "sandbox/win/src/sandbox_policy_base.h" |
+ |
+namespace sandbox { |
+ |
+// This class sets up intercepts for the Win32K lockdown policy which is set |
+// on Windows 8 and beyond. |
+class ProcessMitigationsWin32KDispatcher : public Dispatcher { |
+ public: |
+ explicit ProcessMitigationsWin32KDispatcher(PolicyBase* policy_base); |
+ ~ProcessMitigationsWin32KDispatcher() {} |
+ |
+ // Dispatcher interface. |
+ virtual bool SetupService(InterceptionManager* manager, int service); |
+ |
+ private: |
+ PolicyBase* policy_base_; |
+ |
+ DISALLOW_COPY_AND_ASSIGN(ProcessMitigationsWin32KDispatcher); |
+}; |
+ |
+} // namespace sandbox |
+ |
+#endif // SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_ |