| Index: sandbox/win/src/process_mitigations_win32k_dispatcher.h
|
| diff --git a/sandbox/win/src/process_mitigations_win32k_dispatcher.h b/sandbox/win/src/process_mitigations_win32k_dispatcher.h
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..65c9f77e559671d5cbaaf88c446425c71b0f9fdf
|
| --- /dev/null
|
| +++ b/sandbox/win/src/process_mitigations_win32k_dispatcher.h
|
| @@ -0,0 +1,31 @@
|
| +// Copyright 2014 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#ifndef SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_
|
| +#define SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_
|
| +
|
| +#include "base/basictypes.h"
|
| +#include "sandbox/win/src/sandbox_policy_base.h"
|
| +
|
| +namespace sandbox {
|
| +
|
| +// This class sets up intercepts for the Win32K lockdown policy which is set
|
| +// on Windows 8 and beyond.
|
| +class ProcessMitigationsWin32KDispatcher : public Dispatcher {
|
| + public:
|
| + explicit ProcessMitigationsWin32KDispatcher(PolicyBase* policy_base);
|
| + ~ProcessMitigationsWin32KDispatcher() {}
|
| +
|
| + // Dispatcher interface.
|
| + virtual bool SetupService(InterceptionManager* manager, int service);
|
| +
|
| + private:
|
| + PolicyBase* policy_base_;
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(ProcessMitigationsWin32KDispatcher);
|
| +};
|
| +
|
| +} // namespace sandbox
|
| +
|
| +#endif // SANDBOX_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_
|
|
|