blob: 01b05cf0e988533a30b11422ca2b1a2ff46df960 [file] [log] [blame]
// Copyright 2014 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef SANDBOX_WIN_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_
#define SANDBOX_WIN_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_
#include "base/memory/raw_ptr.h"
#include "base/synchronization/lock.h"
#include "sandbox/win/src/crosscall_server.h"
#include "sandbox/win/src/ipc_tags.h"
#include "sandbox/win/src/sandbox_policy_base.h"
namespace sandbox {
// This class sets up intercepts for the Win32K lockdown policy.
class ProcessMitigationsWin32KDispatcher : public Dispatcher {
public:
explicit ProcessMitigationsWin32KDispatcher(PolicyBase* policy_base);
ProcessMitigationsWin32KDispatcher(
const ProcessMitigationsWin32KDispatcher&) = delete;
ProcessMitigationsWin32KDispatcher& operator=(
const ProcessMitigationsWin32KDispatcher&) = delete;
~ProcessMitigationsWin32KDispatcher() override;
// Dispatcher interface.
bool SetupService(InterceptionManager* manager, IpcTag service) override;
private:
raw_ptr<PolicyBase> policy_base_;
};
} // namespace sandbox
#endif // SANDBOX_WIN_SRC_PROCESS_MITIGATIONS_WIN32K_DISPATCHER_H_